<feed xmlns='http://www.w3.org/2005/Atom'>
<title>vyos-1x.git/data/templates/ssh, branch 1.4.0</title>
<subtitle>VyOS command definitions, scripts, and utilities (mirror of https://github.com/vyos/vyos-1x.git)
</subtitle>
<id>https://git.amelek.net/vyos/vyos-1x.git/atom?h=1.4.0</id>
<link rel='self' href='https://git.amelek.net/vyos/vyos-1x.git/atom?h=1.4.0'/>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/'/>
<updated>2024-04-02T16:33:59+00:00</updated>
<entry>
<title>ssh: T6192: allow binding to multiple VRF instances</title>
<updated>2024-04-02T16:33:59+00:00</updated>
<author>
<name>Christian Breunig</name>
<email>christian@breunig.cc</email>
</author>
<published>2024-04-01T18:40:16+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=cc208d74567e44d6cffa4fc9fd58bd9bcf050930'/>
<id>urn:sha1:cc208d74567e44d6cffa4fc9fd58bd9bcf050930</id>
<content type='text'>
Currently VyOS only supports binding a service to one individual VRF. It might
become handy to have the services (initially it will be VRF, NTP and SNMP) be
bound to multiple VRFs.

Changed VRF from leafNode to multi leafNode with defaultValue: default - which
is the name of the default VRF.

(cherry picked from commit e5af1f0905991103b12302892e6f0070bbb7b770)
</content>
</entry>
<entry>
<title>T5474: establish common file name pattern for XML conf mode commands</title>
<updated>2024-01-01T08:25:32+00:00</updated>
<author>
<name>Christian Breunig</name>
<email>christian@breunig.cc</email>
</author>
<published>2023-12-30T22:25:20+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=c9eaafd9f808aba8d29be73054e11d37577e539a'/>
<id>urn:sha1:c9eaafd9f808aba8d29be73054e11d37577e539a</id>
<content type='text'>
We will use _ as CLI level divider. The XML definition filename and also
the Python helper should match the CLI node.

Example:
set interfaces ethernet -&gt; interfaces_ethernet.xml.in
set interfaces bond -&gt; interfaces_bond.xml.in
set service dhcp-server -&gt; service_dhcp-server-xml.in

(cherry picked from commit 4ef110fd2c501b718344c72d495ad7e16d2bd465)
</content>
</entry>
<entry>
<title>login: T4943: Fixed 2FA + RADIUS compatibility</title>
<updated>2023-02-24T18:07:18+00:00</updated>
<author>
<name>zsdc</name>
<email>taras@vyos.io</email>
</author>
<published>2023-02-24T18:07:18+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=32a4415191ca725be9b3ca4c5f664123a0e767eb'/>
<id>urn:sha1:32a4415191ca725be9b3ca4c5f664123a0e767eb</id>
<content type='text'>
MFA requires KbdInteractiveAuthentication to ask a second factor, and the RADIUS
module for PAM does not like it, which makes them incompatible.

This commit:

* disables KbdInteractiveAuthentication
* changes order for PAM modules - make it first, before `pam_unix` or
`pam_radius_auth`
* enables the `forward_pass` option for `pam_google_authenticator` to accept
both password and MFA in a single input

As a result, local, RADIUS, and MFA work together.

Important change: MFA should be entered together with a password.

Before:

```
vyos login: &lt;USERNAME&gt;
Password: &lt;PASSWORD&gt;
Verification code: &lt;MFA&gt;
```

Now:
```
vyos login: &lt;USERNAME&gt;
Password &amp; verification code: &lt;PASSWORD&gt;&lt;MFA&gt;
```
</content>
</entry>
<entry>
<title>ssh: T4720: Ability to configure SSH-server HostKeyAlgorithms</title>
<updated>2022-10-17T12:15:22+00:00</updated>
<author>
<name>Viacheslav Hletenko</name>
<email>v.gletenko@vyos.io</email>
</author>
<published>2022-10-17T12:15:22+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=85f04237160a6ea98eea4ec58f1ccab9f6bfc31a'/>
<id>urn:sha1:85f04237160a6ea98eea4ec58f1ccab9f6bfc31a</id>
<content type='text'>
Ability to configure SSH-server HostKeyAlgorithms.
Specifies the host key signature algorithms that the server
offers. Can accept multiple values.
</content>
</entry>
<entry>
<title>Merge pull request #1555 from goodNETnick/ssh_otp</title>
<updated>2022-10-12T07:02:37+00:00</updated>
<author>
<name>Christian Poessinger</name>
<email>christian@poessinger.com</email>
</author>
<published>2022-10-12T07:02:37+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=6951fa7ef6ea4a2715b9083d654f6cf3f3b60213'/>
<id>urn:sha1:6951fa7ef6ea4a2715b9083d654f6cf3f3b60213</id>
<content type='text'>
system login: T874: add 2FA support for local and ssh authentication</content>
</entry>
<entry>
<title>system login: T874: add 2FA support for local and ssh authentication</title>
<updated>2022-10-11T23:56:45+00:00</updated>
<author>
<name>goodNETnick</name>
<email>pknet@ya.ru</email>
</author>
<published>2022-09-22T06:03:04+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=765f84386b6e94984ff79db2eab36d51f759159b'/>
<id>urn:sha1:765f84386b6e94984ff79db2eab36d51f759159b</id>
<content type='text'>
</content>
</entry>
<entry>
<title>ssh: T4716: Ablity to configure RekeyLimit data and time</title>
<updated>2022-10-10T12:52:54+00:00</updated>
<author>
<name>Viacheslav Hletenko</name>
<email>v.gletenko@vyos.io</email>
</author>
<published>2022-09-27T16:06:52+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=b9de775a5b4f017f9d164a127d93f55ce9053756'/>
<id>urn:sha1:b9de775a5b4f017f9d164a127d93f55ce9053756</id>
<content type='text'>
Ability to configure SSH RekeyLimit data (in Megabytes) and
time (in Minutes)

set service ssh rekey data 1024
set service ssh rekey time 60
</content>
</entry>
<entry>
<title>ssh: T3212: do not load systemd EnvironmentFile</title>
<updated>2022-07-22T21:16:13+00:00</updated>
<author>
<name>Christian Poessinger</name>
<email>christian@poessinger.com</email>
</author>
<published>2022-07-22T21:05:25+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=8c7cd6f181a4bbb5aee99f50e6c32eb1f4f37c3d'/>
<id>urn:sha1:8c7cd6f181a4bbb5aee99f50e6c32eb1f4f37c3d</id>
<content type='text'>
</content>
</entry>
<entry>
<title>sshguard: T4408: rename whitelist-address -&gt; allow-from</title>
<updated>2022-05-13T16:43:09+00:00</updated>
<author>
<name>Christian Poessinger</name>
<email>christian@poessinger.com</email>
</author>
<published>2022-05-13T16:43:07+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=37a08888d103556326ecd13e4738301ac901c861'/>
<id>urn:sha1:37a08888d103556326ecd13e4738301ac901c861</id>
<content type='text'>
We do not only allow individual host addresses but also prefixes.
</content>
</entry>
<entry>
<title>sshguard: T4408: Add service ssh dynamic-protection</title>
<updated>2022-05-12T17:27:38+00:00</updated>
<author>
<name>Viacheslav Hletenko</name>
<email>v.gletenko@vyos.io</email>
</author>
<published>2022-05-10T15:14:19+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=2e81f9e057f598a9a9e5c2d617e3d0818005d850'/>
<id>urn:sha1:2e81f9e057f598a9a9e5c2d617e3d0818005d850</id>
<content type='text'>
Sshguard protects hosts from brute-force attacks
Can inspect logs and block "bad" addresses by threshold
Auto-generate rules for nftables
When service stopped all generated rules are deleted
nft "type filter hook input priority filter - 10"

set service ssh dynamic-protection
set service ssh dynamic-protection block-time 120
set service ssh dynamic-protection detect-time 1800
set service ssh dynamic-protection threshold 30
set service ssh dynamic-protection whitelist-address 192.0.2.1
</content>
</entry>
</feed>
