Page MenuHomeVyOS Platform

sskaje (sskaje)
User

Projects

User does not belong to any projects.

User Details

User Since
Mar 29 2023, 2:49 AM (109 w, 21 h)

Recent Activity

Tue, Apr 22

sskaje committed rVYOSONEX8f20f0ef7863: geoip: T5636: add smoketest for pbr geoip.
Tue, Apr 22, 3:22 PM
sskaje committed rVYOSONEX795154d9009b: geoip: T5636: Add geoip for policy route/route6.
Tue, Apr 22, 3:22 PM

Thu, Apr 10

sskaje committed rVYOSONEX8e6feea09c04: dns: T7277 fix service/dns/forwarding/dhcp not parsed.
Thu, Apr 10, 2:09 PM

Mar 30 2025

sskaje added a comment to T7289: Add libvyosconfig as git submodule of vyos-1x for stream builds.

also failed in PR

Mar 30 2025, 6:07 PM · VyOS 1.5 Circinus, VyOS Rolling
sskaje added a comment to T7289: Add libvyosconfig as git submodule of vyos-1x for stream builds.

Using relative url in .gitmodules will get forked repos difficult to build if not modify .gitmodules manually.

Mar 30 2025, 6:43 AM · VyOS 1.5 Circinus, VyOS Rolling

Mar 28 2025

sskaje added a comment to T5636: Need geoip option for policy route.

PR: https://github.com/vyos/vyos-1x/pull/4419

Mar 28 2025, 7:51 AM · VyOS 1.5 Circinus, VyOS Rolling

Mar 23 2025

sskaje added a comment to T7277: service/dns/forwarding/dhcp not parsed .

PR: https://github.com/vyos/vyos-1x/pull/4410

Mar 23 2025, 4:31 AM · VyOS Rolling
sskaje claimed T7277: service/dns/forwarding/dhcp not parsed .
Mar 23 2025, 4:31 AM · VyOS Rolling
sskaje created T7277: service/dns/forwarding/dhcp not parsed .
Mar 23 2025, 3:39 AM · VyOS Rolling

Mar 17 2025

sskaje added a comment to T5623: Add tunnel over Socks5 proxy .

hev-socks5-tunnel in container

Mar 17 2025, 11:25 AM · VyOS Rolling

Mar 16 2025

sskaje added a comment to T7246: Wireguard: Traceback error received if the public-key starts with //.

FYI: https://lists.zx2c4.com/pipermail/wireguard/2020-December/006222.html by Jason A. Donenfeld

Mar 16 2025, 12:50 PM · VyOS 1.5 Circinus, VyOS Rolling, VyOS 1.4 Sagitta (1.4.3)
sskaje renamed T7251: Route loading error if with custom device name from Route loading error if with device created from container to Route loading error if with custom device name.
Mar 16 2025, 12:36 PM · VyOS Rolling
sskaje added a comment to T7251: Route loading error if with custom device name.

A new test, I read include/constraint/interface-name.xml.i, see there is a regex for interface names, so I rename the clash container created interface to tun0 which matches the regex, no error.

Mar 16 2025, 12:33 PM · VyOS Rolling
sskaje updated the task description for T7251: Route loading error if with custom device name.
Mar 16 2025, 12:20 PM · VyOS Rolling
sskaje updated the task description for T7251: Route loading error if with custom device name.
Mar 16 2025, 12:17 PM · VyOS Rolling
sskaje created T7251: Route loading error if with custom device name.
Mar 16 2025, 12:17 PM · VyOS Rolling

Mar 15 2025

sskaje updated the task description for T7243: Add NAT OUTPUT.
Mar 15 2025, 2:58 PM · VyOS Rolling

Mar 14 2025

sskaje added a comment to T7243: Add NAT OUTPUT.

Case 1: Forward 127.0.0.1:53 to 127.0.0.1:7874

Mar 14 2025, 1:51 PM · VyOS Rolling
sskaje created T7243: Add NAT OUTPUT.
Mar 14 2025, 11:32 AM · VyOS Rolling

Mar 11 2025

sskaje committed rVYOSONEX77b53f1ab2c2: T7092: Update interface-definitions/container.xml.in.
Mar 11 2025, 4:22 PM
sskaje committed rVYOSONEXa8e0f015ea91: T7092: Change validators: regex to host-name|address + port + path.
Mar 11 2025, 4:22 PM
sskaje committed rVYOSONEX24ed4567dc3d: T7092: Update help message.
Mar 11 2025, 4:22 PM
sskaje committed rVYOSONEXf0d67d3a56ae: T7092: Regex for registry location.
Mar 11 2025, 4:22 PM
sskaje committed rVYOSONEX1dc3e8e87fd6: T7092: Add Container Registry Mirror.
Mar 11 2025, 4:22 PM

Feb 9 2025

sskaje updated the task description for T7147: Import Large Network Sets to Firewall Group From File.
Feb 9 2025, 6:25 AM · VyOS Rolling

Feb 8 2025

sskaje updated the task description for T7147: Import Large Network Sets to Firewall Group From File.
Feb 8 2025, 6:13 PM · VyOS Rolling
sskaje updated the task description for T7147: Import Large Network Sets to Firewall Group From File.
Feb 8 2025, 6:12 PM · VyOS Rolling
sskaje created T7147: Import Large Network Sets to Firewall Group From File.
Feb 8 2025, 6:12 PM · VyOS Rolling

Jan 28 2025

sskaje committed rVYOSONEX1b831d438d0e: T7089: Fix Indentation.
Jan 28 2025, 10:05 AM
sskaje committed rVYOSONEX4dd4ffd24b42: T7089: Fix static route when using PPPoE default route.
Jan 28 2025, 10:05 AM
sskaje updated the task description for T7092: Add Container Registry Mirror.
Jan 28 2025, 9:10 AM · VyOS 1.4 Sagitta (1.4.3), VyOS 1.5 Circinus, VyOS Rolling

Jan 27 2025

sskaje updated the task description for T7089: Static Route not working when PPPoE configured.
Jan 27 2025, 12:03 PM · VyOS 1.5 Circinus, VyOS Rolling

Jan 26 2025

sskaje added a comment to T7092: Add Container Registry Mirror.

Background infomation

  • docker.io blocked in China.
  • 192.168.50.40:8088 is a docker registry mirror set up by nexus, http only
  • mirror.conf above is disabled.
Jan 26 2025, 8:49 PM · VyOS 1.4 Sagitta (1.4.3), VyOS 1.5 Circinus, VyOS Rolling
sskaje claimed T7092: Add Container Registry Mirror.
Jan 26 2025, 8:02 PM · VyOS 1.4 Sagitta (1.4.3), VyOS 1.5 Circinus, VyOS Rolling
sskaje created T7092: Add Container Registry Mirror.
Jan 26 2025, 8:01 PM · VyOS 1.4 Sagitta (1.4.3), VyOS 1.5 Circinus, VyOS Rolling
sskaje added a comment to T7089: Static Route not working when PPPoE configured.

As I tested, the endfor changes is the better way, because two pppoe interfaces would cause

Jan 26 2025, 7:12 PM · VyOS 1.5 Circinus, VyOS Rolling
sskaje added a comment to T7089: Static Route not working when PPPoE configured.

I tried two ways in staticd.frr.j2

Jan 26 2025, 7:07 PM · VyOS 1.5 Circinus, VyOS Rolling
sskaje added a comment to T7089: Static Route not working when PPPoE configured.
vyos# exit
root@vyos:/home/vyos# cat /run/frr/config/vyos.frr.conf 
!
!
!
ip route 192.168.10.0/24 192.168.12.1
ip route 192.168.51.0/24 lo
ip route 192.168.52.0/24 192.168.12.1
ip  route 0.0.0.0/0 192.168.12.1 eth0 tag 210 210
ip  route 0.0.0.0/0 pppoe0 tag 210 1!
!
!
!
ip forwarding
!
!
!
!
ipv6 forwarding
!
!
!root@vyos:/home/vyos# 
exit
[edit]
vyos@vyos# set interfaces pppoe pppoe0 no-default-route 
[edit]
vyos@vyos# commit
[edit]
vyos@vyos# sudo su
root@vyos:/home/vyos# cat /run/frr/config/vyos.frr.conf 
!
!
!
ip route 192.168.10.0/24 192.168.12.1
ip route 192.168.51.0/24 lo
ip route 192.168.52.0/24 192.168.12.1
ip  route 0.0.0.0/0 192.168.12.1 eth0 tag 210 210
!
!
!
!
ip forwarding
!
!
!
!
ipv6 forwarding
!
!
!root@vyos:/home/vyos#
Jan 26 2025, 6:49 PM · VyOS 1.5 Circinus, VyOS Rolling
sskaje added a comment to T7089: Static Route not working when PPPoE configured.

full config using 1.5-rolling-202501250006 live image

Jan 26 2025, 6:10 AM · VyOS 1.5 Circinus, VyOS Rolling
sskaje created T7089: Static Route not working when PPPoE configured.
Jan 26 2025, 6:07 AM · VyOS 1.5 Circinus, VyOS Rolling

Dec 8 2024

sskaje added a comment to T4930: Allow WireGuard peers via DNS hostname.
In T4930#209720, @runar wrote:

Routgh idea:

If peer is created with hostname over IP, do not add it during commit

I would insist only not adding endpoint, let peer be ready if they have configured with hostname endpoint.

The peer should be pre-provisioned with everything needed to be accessible externally for a remote peer to reconnect prior to dns resolution.
To allow for this the peer can be added with a endpoint of 0.0.0.0. (if a wireguard peer is not able to be provisioned without a endpoint at least)
This can then be used to "abort" a DNS resolution if the remote end has reconnected.
Only the "resolve dns" part should then be the blocking part, and only that part needs to be moved out of the commit loop.

Dec 8 2024, 1:58 PM · VyOS 1.5 Circinus, VyOS Rolling

Dec 6 2024

sskaje added a comment to T6928: Support for custom interface type or custom config node.

I create drafted PR https://github.com/vyos/vyos-1x/pull/4224

Dec 6 2024, 3:34 AM · VyOS Rolling

Dec 3 2024

sskaje created T6930: if 'shutdown_required' in pppoe.py always True.
Dec 3 2024, 7:51 AM · VyOS 1.5 Circinus, VyOS Rolling

Dec 1 2024

sskaje added a comment to T6928: Support for custom interface type or custom config node.

I came up with a possible solution:

Dec 1 2024, 3:46 PM · VyOS Rolling
sskaje added a comment to T6928: Support for custom interface type or custom config node.

Here are some config commands I used with my ubnt plugin

Dec 1 2024, 3:26 PM · VyOS Rolling
sskaje updated the task description for T6928: Support for custom interface type or custom config node.
Dec 1 2024, 3:23 PM · VyOS Rolling
sskaje created T6928: Support for custom interface type or custom config node.
Dec 1 2024, 3:19 PM · VyOS Rolling

Nov 30 2024

sskaje added a comment to T4930: Allow WireGuard peers via DNS hostname.

Code committed.

Nov 30 2024, 4:52 PM · VyOS 1.5 Circinus, VyOS Rolling

Nov 28 2024

sskaje added a comment to T4930: Allow WireGuard peers via DNS hostname.

Here is how to get the latest-handshakes in seconds:

Nov 28 2024, 4:54 PM · VyOS 1.5 Circinus, VyOS Rolling
sskaje added a comment to T4930: Allow WireGuard peers via DNS hostname.
In T4930#208881, @c-po wrote:

@runar @sskaje

In general I like the idea and it's a very useful addition. Given the current implementation and design of wireguard to be easy, lightweight and not messed with 1000 of config options the design choice is to move everything requiring brain out of the WG core code.

Nov 28 2024, 7:40 AM · VyOS 1.5 Circinus, VyOS Rolling

Nov 25 2024

sskaje added a comment to T4930: Allow WireGuard peers via DNS hostname.
In T4930#208505, @runar wrote:

Hi!

I do not like the concept that this should be done inline while in the middle of a commit.
As this will halt the commit phase for potentially a long time (relative) if dns is not up'n'running.
This in itself is not that critical, but if this is done the same on multiple sub-systems you potentially can have an exponentionall increase of boot time because of this.
And in a time where we are optimising milliseconds of code to get shorter boot and commit times in other subsystems i feel this is not the correct way to do it.

Nov 25 2024, 5:38 PM · VyOS 1.5 Circinus, VyOS Rolling

Nov 19 2024

sskaje added a comment to T4930: Allow WireGuard peers via DNS hostname.

5 endpoints using domain, limit retry to 5 times, total start costs around 5 * 10 = 50 seconds.

Nov 19 2024, 3:25 PM · VyOS 1.5 Circinus, VyOS Rolling
sskaje added a comment to T4930: Allow WireGuard peers via DNS hostname.
In T4930#208083, @runar wrote:

Hi @sskaje!

In reference to T1700 and other tickets, there are things in wireguard that is not implemented the "best way".
For the first as noted earlier, the Wireguard kernel module have NO information of the existance of a "DNS peer", DNS to IP mappings are done by the wg config utillity at the moment the command is executed on the device.. this means that entering a DNS name as a peer address will execute a DNS request ONCE and its never retried .

Nov 19 2024, 10:41 AM · VyOS 1.5 Circinus, VyOS Rolling
sskaje added a comment to T4930: Allow WireGuard peers via DNS hostname.

I thought dns look up causes the block. So I made some changes like:

Nov 19 2024, 8:00 AM · VyOS 1.5 Circinus, VyOS Rolling
sskaje added a comment to T4930: Allow WireGuard peers via DNS hostname.

@Viacheslav I made is based on T6490, PR here: https://github.com/vyos/vyos-1x/pull/4194
This PR makes peers no longer required, so WireGuard interfaces will be created on boot, with or without Internet connection, with or without DNS resolution.

Nov 19 2024, 2:56 AM · VyOS 1.5 Circinus, VyOS Rolling

Nov 18 2024

sskaje added a comment to T4930: Allow WireGuard peers via DNS hostname.

Code commit here: https://github.com/sskaje/vyos-1x/tree/T4930

Nov 18 2024, 5:06 PM · VyOS 1.5 Circinus, VyOS Rolling

Nov 15 2024

sskaje added a comment to T4930: Allow WireGuard peers via DNS hostname.

I simply added hostname/fqdn to address and here is my test result:

Nov 15 2024, 3:32 PM · VyOS 1.5 Circinus, VyOS Rolling
sskaje added a comment to T4930: Allow WireGuard peers via DNS hostname.

I'm migrating my EdgeRouter to VyOS, its module 'https://github.com/WireGuard/wireguard-vyatta-ubnt/releases' supports endpoint as domain:port, which is same as wg set or wg-quick.

Nov 15 2024, 12:03 PM · VyOS 1.5 Circinus, VyOS Rolling
sskaje added a comment to T6490: Allow creation of wireguard interfaces without requiring peers.

I created a PR https://github.com/vyos/vyos-1x/pull/4194

Nov 15 2024, 11:33 AM · VyOS Rolling

Apr 10 2023

sskaje added a comment to T5122: Move "archive-areas" to defaults.toml to support "non-free-firmware" repository.

My fault, the double quotes were mis-removed in the PR when cleaning code.

Apr 10 2023, 2:07 PM · VyOS 1.4 Sagitta (1.4.0-epa1)

Mar 29 2023

sskaje added a comment to T5121: Incorrect "architecture" config loaded.

I've made some changes but not sure if the logic is what VyOS team accept.

Mar 29 2023, 11:15 AM · VyOS 1.4 Sagitta (1.4.0-epa2)
sskaje added a comment to T5120: Override all debian mirror server name in url.

Code changed, to override all settings in build_config instead of args from cli only.

Mar 29 2023, 9:02 AM
sskaje created T5122: Move "archive-areas" to defaults.toml to support "non-free-firmware" repository.
Mar 29 2023, 8:44 AM · VyOS 1.4 Sagitta (1.4.0-epa1)
sskaje changed Version from - to 1.4- on T5121: Incorrect "architecture" config loaded.
Mar 29 2023, 8:38 AM · VyOS 1.4 Sagitta (1.4.0-epa2)
sskaje created T5121: Incorrect "architecture" config loaded.
Mar 29 2023, 8:38 AM · VyOS 1.4 Sagitta (1.4.0-epa2)
sskaje changed Issue type from unspecified to improvement on T5120: Override all debian mirror server name in url.
Mar 29 2023, 7:56 AM
sskaje created T5120: Override all debian mirror server name in url.
Mar 29 2023, 7:43 AM