Age | Commit message (Collapse) | Author | |
---|---|---|---|
2021-07-23 | Merge pull request #939 from sarthurdev/pki_file | Christian Poessinger | |
pki: T3642: Add ability to write generated certificates/keys to files | |||
2021-07-23 | frr: T2175: remove no longer required loop when removing routing protocols | Christian Poessinger | |
2021-07-23 | login: T3699: verify system username does not conflict with Linux base users | Christian Poessinger | |
(cherry picked from commit 7292631373ea50f9908796ef2eda32e672d1df2e) | |||
2021-07-23 | pki: T3642: Add ability to write generated certificates/keys to specified ↵ | sarthurdev | |
filenames | |||
2021-07-22 | op-mode: xml: rename definition file for "generate wireguard" command | Christian Poessinger | |
2021-07-22 | pki: wireguard: T3642: remove obsolete op-mode script | Christian Poessinger | |
As the keys are now stored inside the CLI configuration and no longer in a file on the filesystem, this command is no longer required. Also there are dedicated CLI commands available to display the additional Wireguard information. - show interfaces wireguard wg10 - show interfaces wireguard wg10 summary | |||
2021-07-22 | pki: wireguard: T3642: remove obsolete "show wireguard keypairs" command | Christian Poessinger | |
As the keys are now stored inside the CLI configuration and no longer in a file on the filesystem, this command is no longer required. | |||
2021-07-22 | pki: wireguard: T3642: remove obsolete "delete wireguard keypair" command | Christian Poessinger | |
As the keys are now stored inside the CLI configuration and no longer in a file on the filesystem, this command is no longer required. | |||
2021-07-22 | Merge pull request #937 from jack9603301/T3698 | Christian Poessinger | |
bridge: op-mode: T3698: Support bridge monitoring | |||
2021-07-22 | pki: wireguard: T3642: add new op-mode command for public-key | Christian Poessinger | |
Per interface public-key can now be retrieved via: vyos@vyos:~$ show interfaces wireguard wg10 public-key +XZr0oUjYRQuB/kcO1f+puOjKkiOWBG8eZX1Jpyq2n0= | |||
2021-07-22 | xml: op-mode: move "show interfaces wireguard" to dedicated file | Christian Poessinger | |
2021-07-23 | bridge: op-mode: T3698: Support bridge monitoring | jack9603301 | |
2021-07-22 | ipsec: T2816: remove "auto-update" CLI option | Christian Poessinger | |
Update/refresh of DNS records is now handled internally by Strongswan. | |||
2021-07-22 | xml: add building block for "local-users" | Christian Poessinger | |
2021-07-22 | Merge pull request #936 from jack9603301/T3667 | Christian Poessinger | |
bridge: op-mode: T3667: Fix displaying members of a specific bridge interface | |||
2021-07-22 | Merge pull request #935 from sarthurdev/pki_https | Christian Poessinger | |
pki: https: T3642: Migrate HTTPS to use PKI configuration | |||
2021-07-23 | bridge: op-mode: T3667: Fix displaying members of a specific bridge interface | jack9603301 | |
2021-07-22 | pki: https: T3642: Migrate HTTPS to use PKI configuration | sarthurdev | |
2021-07-22 | Merge pull request #934 from sarthurdev/pki_openvpn | Christian Poessinger | |
pki: openvpn: T3642: Migrate OpenVPN to PKI and refactor | |||
2021-07-21 | pki: openvpn: T3642: Migrate OpenVPN to PKI and refactor | sarthurdev | |
2021-07-20 | ipsec: T1210: create uuid from empty string in ios profile | Christian Poessinger | |
2021-07-20 | ipsec: T1210: add op-mode command for macOS and iOS profile generation | Christian Poessinger | |
generate ipsec mac-ios-profile <connection> remote <ip|fqdn> will generate a matching IPSec profile which can be loaded on an iOS device. | |||
2021-07-20 | Merge pull request #931 from sarthurdev/pki_eapol | Christian Poessinger | |
pki: eapol: T3642: Migrate EAPoL to use PKI configuration | |||
2021-07-20 | pki: eapol: T3642: Migrate EAPoL to use PKI configuration | sarthurdev | |
2021-07-20 | pki: T3642: Fix Wireguard migration comment | sarthurdev | |
2021-07-20 | Merge pull request #930 from sarthurdev/pki_migration | Christian Poessinger | |
pki: openconnect: sstp: T3642: Migrate OpenConnect and SSTP to PKI configuration | |||
2021-07-20 | pki: sstp: T3642: Migrate SSTP to PKI configuration | sarthurdev | |
2021-07-20 | pki: openconnect: T3642: Migrate OpenConnect SSL to PKI configuration | sarthurdev | |
2021-07-19 | vrf: T3655: fix potential error when removing VRF connection tracking table | Christian Poessinger | |
This extends commit 22791e26 ("VRF: T3655: proper connection tracking for VRFs") so that when the netfilter table is removed, we first check if it exists at all, and if it does not exist we do not remove it. This fixes the smoketest error: PermissionError: [Errno 1] failed to run command: nft delete table inet vrf_zones | |||
2021-07-19 | Merge pull request #929 from sarthurdev/pki_wg | Christian Poessinger | |
pki: wireguard: T3642: Migrate Wireguard private key directly into CLI | |||
2021-07-19 | pki: wireguard: T3642: Replace/remove old Wireguard op-mode commands | sarthurdev | |
2021-07-19 | pki: wireguard: T3642: Migrate Wireguard private key directly into CLI | sarthurdev | |
Also renames peer pubkey to public-key for consistency | |||
2021-07-19 | ipsec: T1210: add "unique" option to specify how to handle multiple connections | Christian Poessinger | |
Connection uniqueness policy to enforce. To avoid multiple connections from the same user, a uniqueness policy can be enforced. * never: never enforce such a policy, even if a peer included INITIAL_CONTACT notification * keep: reject new connection attempts if the same user already has an active connection * replace: delete any existing connection if a new one for the same user gets established To compare connections for uniqueness, the remote IKE identity is used. If EAP or XAuth authentication is involved, the EAP-Identity or XAuth username is used to enforce the uniqueness policy instead. | |||
2021-07-19 | ipsec: T1210: split out pool from remote-access configuration | Christian Poessinger | |
Remote access IP pools can now be defined at a global level and referenced in IPSec remote-access connections. To defined a pool use: set vpn ipsec remote-access pool global-ipv4 name-server '172.16.1.1' set vpn ipsec remote-access pool global-ipv4 prefix '192.168.0.0/24' set vpn ipsec remote-access pool global-ipv6 name-server '2001:db8::1' set vpn ipsec remote-access pool global-ipv6 prefix '2001:db8:1000::/64' A connection can then reference the pool: set vpn ipsec remote-access connection foo pool 'global-ipv4' set vpn ipsec remote-access connection foo pool 'global-ipv6' | |||
2021-07-18 | ipsec: T1210: remote-access pools can not hold both IPv4 and IPv6 prefixes | Christian Poessinger | |
... this enables a dual-stack IKEv2 VPN deployment. | |||
2021-07-18 | ipsec: T2816: limit remote-access nameservers to two IPv4 and two for IPv6 | Christian Poessinger | |
2021-07-18 | ipsec: l2tp: T2816: use common if 'key' in dict pattern | Christian Poessinger | |
2021-07-18 | Revert "T3641: fastnetmon package is not available for Debian Bullseye" | Christian Poessinger | |
This reverts commit 70f7f06e778efa4bd3c2ad127d66c080e1db80c5. | |||
2021-07-18 | smoketest: ospf: extend passive-interface debugging with kernel log | Christian Poessinger | |
2021-07-18 | bridge: remove obsolete helper script | Christian Poessinger | |
2021-07-17 | ipsec: T2816: add missing +x permission on Python helper | Christian Poessinger | |
2021-07-17 | Merge pull request #927 from zdc/T3655-sagitta | Christian Poessinger | |
VRF: T3655: proper connection tracking for VRFs | |||
2021-07-17 | VRF: T3655: proper connection tracking for VRFs | zsdc | |
Currently, all VRFs share the same connection tracking table, which can lead to problems: - traffic leaks to a wrong VRF - improper NAT rules handling when multiple VRFs contain the same IP networks - stateful firewall rules issues The commit implements connection tracking zones support. Each VRF utilizes its own zone, so connections will never mix up. It also adds some restrictions to VRF names and assigned table numbers, because of nftables and conntrack requirements: - VRF name should always start from a letter (interfaces that start from numbers are not supported in nftables rules) - table number must be in the 100-65535 range because conntrack supports only 65535 zones | |||
2021-07-17 | ipsec: T2816: restore erroneous deleted file | Christian Poessinger | |
Commit 22739144 ('ipsec: T2816: migrate "ipsec interfaces" to "interface"') by accident deleted the vpn_ipsec.py Python handler. Handler was restored. | |||
2021-07-17 | Revert "openvpn: T56: remove strict checks for tls cert-file and key-file" | Christian Poessinger | |
This reverts commit c414479fdf1d5ad77170f977481fb9197c9559ae. This commit broke the smoketests and also OpenVPN complains: Options error: You must define certificate file (--cert) or PKCS#12 file (--pkcs12) | |||
2021-07-17 | vxlan: T3683: bugfix on MTU calculation for IPv6 underlay | Christian Poessinger | |
2021-07-17 | ipsec: T2816: migrate "ipsec interfaces" to "interface" | Christian Poessinger | |
2021-07-17 | xml: provide common "pre-shared-secret" include block | Christian Poessinger | |
2021-07-17 | xml: provide common "dhcp-interface" include block | Christian Poessinger | |
2021-07-17 | Merge pull request #924 from sarthurdev/ipsec_l2tp_pki | Christian Poessinger | |
pki: ipsec: l2tp: T2816: T3642: Move IPSec/L2TP code into vpn_ipsec.py and update to use PKI. |