summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2018-11-14T835: accel-ppp pppoe implemetaionhagbard
- ipv6 DNS, ippv6pool, ipv6 PD, ipv6 inf IDs - snmp subagent and master mode - connlimits configurable - more ppp options configurable (mppe, lcp-echo intervals, mtu, mru etc.) - radius extended options (for HA etc.)
2018-11-12migration/l2tp: fix file commentChristian Poessinger
2018-11-12T987: Unclutter PPTP/IPSec RADIUS configuration nodesChristian Poessinger
In other words, remove top level tag nodes from radius-server and introduce a regular "radius" node, thus we can add additional features, too. A migration script is provided in vyos-1x which takes care of this config migration. Change VyOS CLI from: vyos@vyos# show vpn pptp remote-access { authentication { mode radius radius-server 172.16.100.10 { key barbarbar } radius-server 172.16.100.20 { key foofoofoo } } To: vyos@vyos# show vpn l2tp remote-access { authentication { mode radius radius { server 172.16.100.10 { key barbarbar } server 172.16.100.20 { key foofoofoo } } }
2018-11-11T998: "service dns dynamic" does now honor the "use-web" statementChristian Poessinger
This bug was present since the old Vyatta days as the use-web statement was only put into action when also "use-web skip" was defined. The service https://ipinfo.io/ip does not place any crap in front of the IP address so the skip statement was not used and made no sense.
2018-11-11T987: Unclutter L2TP/IPSec RADIUS configuration nodesChristian Poessinger
In other words, remove top level tag nodes from radius-server and introduce a regular "radius" node, thus we can add additional features, too. A migration script is provided in vyos-1x which takes care of this config migration. Change VyOS CLI from: vyos@vyos# show vpn l2tp remote-access { authentication { mode radius radius-server 172.16.100.10 { key barbarbar } radius-server 172.16.100.20 { key foofoofoo } radius-source-address 172.16.254.100 } To: vyos@vyos# show vpn l2tp remote-access { authentication { mode radius radius { server 172.16.100.10 { key barbarbar } server 172.16.100.20 { key foofoofoo } source-address 172.16.254.100 } }
2018-11-09T835: pppoe-server adding radius server back inhagbard
2018-11-09T835: accel-ppp pppoe implementationhagbard
2018-11-09Merge pull request #58 from gsadams/currentChristian Poessinger
T978: Support PowerDNS Recursor outbound queries over IPv6.
2018-11-08T978: Support PowerDNS Recursor outbound queries over IPv6.Geoff Adams
This requires adding a query-local-address6 setting to enable outbound IPv6 queries in general, and also formatting upstream nameserver IPv6 addresses in such a way that Recursor can parse them.
2018-11-08Merge pull request #57 from thinkl33t/T976-fix-update-hostfilehagbard-01
Fixes T976: dhcp - move commit hook into shared-network
2018-11-08dhcp - move commit hook into shared-networkBob
Move the on commit in a generated dhcpd.conf into the shared-network to fix hostfile-update not working.
2018-11-08Merge pull request #56 from bswinnerton/fix-regex-for-wg-interface-descriptionshagbard-01
Fixes T979: Allow spaces in wireguard interface description
2018-11-08cleanup: move files from vyos-build repo to vyos-1x where they are requiredChristian Poessinger
2018-11-08T974: bugfix dns forwarder not listening on IPv6 addressesChristian Poessinger
By default PowerDNS only allows 10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16 for incoming DNS queries - we changed this to 0.0.0.0/0 to be reachable by everyone. This only covered the IPv4 address space and any IPv6 related query was not handled by the server.
2018-11-07Add back trailing whitespace for smaller diffBrooks Swinnerton
2018-11-07T979: Allow spaces in wireguard interface descrsBrooks Swinnerton
Previous to this commit, setting a Wireguard interface description would result in a validation error similar to the following: ``` brooks@border# set interfaces wireguard wg0 description "Tunnel" [edit] brooks@border# set interfaces wireguard wg0 description "Tunnel tunnel tunnel" interface description is too long (limit 100 characters) Value validation failed Set failed [edit] ``` This commit makes the regex less restrictive up to 100 characters.
2018-11-07Merge branch 'igmproxy' into currentChristian Poessinger
* igmproxy: T959: XML/Python rewrite of "protocol igmp-proxy" and op-mode commands show-raid.xml: fixup indention Add missing VyOS copyright notices
2018-11-05T965: Fix Wireguard configuration inconsistencieshagbard
- pubkey updates now work - removing peers or interfaces work, was related tothe fact that tag nodes are called multiple times
2018-11-05T966: Traceback when deleting wireguard interfacehagbard
2018-11-05T288: add a script for normalizing IP(v6) addresses so that they can be ↵Daniil Baturin
safely passed to iproute2.
2018-11-05Merge branch 'current' of https://github.com/vyos/vyos-1x into currentDaniil Baturin
2018-11-05T950: make sure agentx is enabled in FRR only when SNMP is setup, and ↵Daniil Baturin
supress duplicate error messages.
2018-11-04T959: XML/Python rewrite of "protocol igmp-proxy" and op-mode commandsChristian Poessinger
Examples: ========= CFG commands: vyos@vyos# set protocols igmp-proxy disable-quickleave vyos@vyos# set protocols igmp-proxy interface eth0 alt-subnet '172.16.35.0/24' vyos@vyos# set protocols igmp-proxy interface eth0 alt-subnet '172.31.0.0/24' vyos@vyos# set protocols igmp-proxy interface eth0 role 'upstream' vyos@vyos# set protocols igmp-proxy interface eth1 role 'downstream' vyos@vyos# show protocols igmp-proxy { disable-quickleave interface eth0 { alt-subnet 172.16.35.0/24 alt-subnet 172.31.0.0/24 role upstream } interface eth1 { role downstream } } OP mode commands: ----------------- vyos@vyos:~$ show ip multicast interface Interface BytesIn PktsIn BytesOut PktsOut Local eth0 0.0b 0 0.0b 0 xxx.xxx.xxx.65 eth1 0.0b 0 0.0b 0 xxx.xxx.xx.201 vyos@vyos:~$ show ip multicast mfc Group Origin Pkts Bytes Wrong In Out xxx.x.xx.1 xxx.xx.0.1 10 9.81KB 0 eth0 eth1 xxx.x.xx.2 xxx.xx.0.1 --
2018-11-04show-raid.xml: fixup indentionChristian Poessinger
2018-11-04Add missing VyOS copyright noticesChristian Poessinger
2018-11-03T958: Problems with wireguard descriptionhagbard
2018-11-02T949: config issue when creating multiple wg interfaces at the same time.hagbard
2018-11-02T939: Remove possibility to specify DHCP relay portChristian Poessinger
2018-10-31Merge pull request #35 from ovsiannikov/componentversionsDaniil Baturin
T688: parsing component version string
2018-10-29T240: system integrity checkhagbard
2018-10-29T240: system integrity checkhagbard
2018-10-28T923: enable AgentX in FRR after SNMP is configured.Daniil Baturin
2018-10-28T931: fix passing arguments to tcpdump filter option.Daniil Baturin
We need to pass all completion words rather than just the first since filters can contain whitespace.
2018-10-26T886: validation logic in `interfaces wireguard wgX address x.x.x.x brokenhagbard
- removed ip-host from tree, iproute2 will detect faulty addresses and return exit 1
2018-10-25T938: do not bind DHCP relay to default port if unspecifiedChristian Poessinger
Binding isc-dhcp-relay to its default port (67 e.g. for IPv4) will result in an error when starting up the service: bad: ---- $ dhcrelay -q -4 -p 67 -c 10 -A 576 -m discard -i eth0.21 -i eth0 10.253.253.1 binding to user-specified port 67 good: ----- $ dhcrelay -q -4 -c 10 -A 576 -m discard -i eth0.21 -i eth0 10.253.253.1 Setting removed from the IPv6 implementation, too!
2018-10-25T937: proper handle IPv6 link-local addresses in vyos.validate moduleChristian Poessinger
The problem is that some IPv6 addresses reported by the system (mainly link-local addresses) contain an interface suffix like %eth0, this was not properly handeled in the validator script. Remove any given interface attribute on passed IPv6 addresses. If no interface suffix is added - there is no problem.
2018-10-25T933: vrrp split brain while using unicast mode and virtual mac addresshagbard
- adding vmac_xmit_base to keepalived.conf when use_vmac is being used otherwise both nodes will become master
2018-10-21T634: remove 'service ssh allow-root'Christian Poessinger
2018-10-20SNMP: update comments in Python generatorChristian Poessinger
2018-10-20T923: support SNMP integration with FRR routing daemonChristian Poessinger
2018-10-19Merge branch 'dhcp-relay' into currentChristian Poessinger
* dhcp-relay: dhcpv6-relay: added missing verify() step for listen and upstream interfaces T913: DHCP relay service XML/Python rewrite for IPv6 T913: DHCP relay service XML/Python rewrite for IPv4 vyos-1x now depends on isc-dhcp-relay dns-forwarding: fix XML interface indenting
2018-10-19dhcpv6-relay: added missing verify() step for listen and upstream interfacesChristian Poessinger
2018-10-19Add Client keepalive option for use with cloud-initUnicronNL
Add option to specify multiple listening ports Clean up template generation layout
2018-10-17Fixing check for local IP, using validator --is-any-host.hagbard
2018-10-17T913: DHCP relay service XML/Python rewrite for IPv6Christian Poessinger
2018-10-17T913: DHCP relay service XML/Python rewrite for IPv4Christian Poessinger
2018-10-17vyos-1x now depends on isc-dhcp-relayChristian Poessinger
2018-10-17dns-forwarding: fix XML interface indentingChristian Poessinger
2018-10-17Update show-bridge.xmlDaniil Baturin
2018-10-14T896: Fix dynamic DNS for CUSTOM providerChristian Poessinger
JINJA2 templated missed the 'server=' statement when generating custom dynamic DNS entries in the resulting ddclient.conf.