Age | Commit message (Collapse) | Author | |
---|---|---|---|
2018-08-26 | tftp_server.py: change umask for created files | Christian Poessinger | |
2018-08-26 | Merge remote-tracking branch 'upstream/current' into current | hagbard | |
2018-08-26 | tftp_server.py: fix copy-paste comment | Christian Poessinger | |
2018-08-26 | tftp_server.py: fix indention and add more verbose comments | Christian Poessinger | |
2018-08-26 | T792: add TFTP server functionality | Christian Poessinger | |
2018-08-26 | ssh.py: start/stop service via systemctl | Christian Poessinger | |
2018-08-26 | ntp.py: start/stop service via systemctl | Christian Poessinger | |
2018-08-25 | Merge remote-tracking branch 'upstream/current' into current | hagbard | |
2018-08-25 | idents fixed (sonarcloud complains) | hagbard | |
2018-08-25 | ntp.py: fix typo in comment | Christian Poessinger | |
2018-08-24 | T791: endpoint pattern doesn't need to be checked, wg returns an error ↵ | hagbard | |
message if it's not IP:port | |||
2018-08-24 | T791: mtu size implementation | hagbard | |
2018-08-23 | T793: fwmark implementation | hagbard | |
2018-08-23 | listen-port for update mode needs to be 0 to switch back to randomly chosen ↵ | hagbard | |
if previously configured | |||
2018-08-23 | T791: implementation | hagbard | |
TODO: fwmark, mtu and pre-shared key | |||
2018-08-20 | bugfix: if config and effective value are equal, there is no change ↵ | hagbard | |
required, deleting it from the dict will result in a keyerror if not aset at all | |||
2018-08-17 | T783: to disable keepalive is has to be set to 0. | hagbard | |
2018-08-17 | T783: conf mode persistent-keepalive implementation | hagbard | |
2018-08-17 | T427: endpoint is only required for client mode, it's now an optional parameter | hagbard | |
2018-08-17 | remove endpoint check, which is optional. server mode find the endpoint from ↵ | hagbard | |
an authenticated package. | |||
2018-08-14 | Merge pull request #27 from hagbard-01/current | Daniil Baturin | |
T427, T773 adding wirguard support | |||
2018-08-12 | T427: wireguard support | hagbard | |
2018-08-12 | T772: fixup for keepalived not understanding escaped quotes. | Daniil Baturin | |
Since it does not understand escaped quotes inside notify_* options, until we fix that, we have to put the script and its arguments in positional arguments and join inside the transition script runner. | |||
2018-08-10 | T666, T616: fix messed up variables in hello source/peer address checking. | Daniil Baturin | |
2018-08-07 | T733: snmp.py: set IPv6 community string | Jules Taplin | |
Also fixed it to correctly set an IPv6 community string, even if you don't specify the network it's working on. | |||
2018-08-05 | T71: rename IPsec "settings" to "options" for consistency with the rest of ↵ | Daniil Baturin | |
the system. | |||
2018-08-05 | T71: initial implementation of global IPsec settings. | Daniil Baturin | |
Only disable-route-autoinstall (install_routes = yes/no) for now. | |||
2018-08-02 | T754: add DNSSEC to DNS forwarder | mb300sd | |
2018-07-29 | Merge branch 'dyndns-refactoring' into current | Christian Poessinger | |
* dyndns-refactoring: T758: refactor ddclient configuration file amd startup T758: add configuration validator T758: XML/Python implementation for 'service dns dynamic' | |||
2018-07-29 | T758: refactor ddclient configuration file amd startup | Christian Poessinger | |
Since version 3.8.0 ddclient support the update of multiple ip's. The need for running multiple ddclient instances with different configuration files is thus no longer necessary. More information can be found on the ddclient forum: https://sourceforge.net/p/ddclient/mailman/message/20383414/ | |||
2018-07-29 | T758: add configuration validator | Christian Poessinger | |
2018-07-30 | Merge branch 'current' into current | Daniil Baturin | |
2018-07-29 | T758: XML/Python implementation for 'service dns dynamic' | Christian Poessinger | |
2018-07-27 | T666, T616: new implementation of the VRRP CLI. | Daniil Baturin | |
2018-07-24 | T736: bugfix, if facility is not set by the user, it defaults to *.err,in ↵ | hagbard | |
hosts proto wouldn't have a default, actually it wouldn't exist. | |||
2018-07-24 | T736: import order changed, invoke-rc.d replaced by systemctl command | hagbard | |
2018-07-24 | T736: Rewrite remote logging (syslog) to XML/Python | hagbard | |
2018-07-05 | T733: snmp.py: set IPv6 community string | jules-vyos | |
* Fixed snmp.py to correctly supply 'community6' community strings, so that ipv6 will work. | |||
2018-07-02 | T652: SNMP: bugfix initial specification of v3 engine id missing | Christian Poessinger | |
2018-07-02 | T713: bugfix incorrect parsing of seclevel | Christian Poessinger | |
... there was a coding error in the if clause. | |||
2018-07-02 | T652: SNMP: bugfix for default auth and priv type | Christian Poessinger | |
If no auth or no priv type was specified for a v3 user this resulted in a commit error, but CLI said there would be ssane defaults. * auth type defaults to 'md5' * priv type defaults to 'des' | |||
2018-06-30 | T714: SNMP: make user auth type mandatory | Christian Poessinger | |
... if seclevel for group is auth or priv where the user belongs to | |||
2018-06-30 | T713: bugfix incorrect parsing of seclevel | Christian Poessinger | |
SNMP v3 group seclevel was not taken into account when validating existance of user auth or priv keys. | |||
2018-06-30 | T652: SNMP: bugfix preserving users engineid | Christian Poessinger | |
In VyOS 1.1.x every user was forced to the systems engine ID when using SNMPv3, even when a user wanted to have a custom engineID, thus the node 'service snmp v3 user foo engineid' itself is useless. | |||
2018-06-24 | T201: remove systemd dependency which is unneeded | Christian Poessinger | |
2018-06-24 | T201: implementation of system beep | hagbard | |
Depends on debian 'beep' package | |||
2018-06-08 | T652: import SNMP keys from volatile into nonvolatile location | Christian Poessinger | |
2018-06-08 | T652: user encrypted-key not possible without engineid | Christian Poessinger | |
2018-06-07 | T652: snmp.py: support SNMPv3 write groups | Christian Poessinger | |
2018-06-06 | T652: snmp.py: bugfix writing encrypted keys to config | Christian Poessinger | |
... in the past an encrypted key was encrypted again b/c we only used createUser in /var/lib/snmp/snmpd.conf nad not usmUser in addition. |