<feed xmlns='http://www.w3.org/2005/Atom'>
<title>vyos-1x.git/data/templates/ssh, branch 1.4.0-rc2</title>
<subtitle>VyOS command definitions, scripts, and utilities (mirror of https://github.com/vyos/vyos-1x.git)
</subtitle>
<id>https://git.amelek.net/vyos/vyos-1x.git/atom?h=1.4.0-rc2</id>
<link rel='self' href='https://git.amelek.net/vyos/vyos-1x.git/atom?h=1.4.0-rc2'/>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/'/>
<updated>2024-01-01T08:25:32+00:00</updated>
<entry>
<title>T5474: establish common file name pattern for XML conf mode commands</title>
<updated>2024-01-01T08:25:32+00:00</updated>
<author>
<name>Christian Breunig</name>
<email>christian@breunig.cc</email>
</author>
<published>2023-12-30T22:25:20+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=c9eaafd9f808aba8d29be73054e11d37577e539a'/>
<id>urn:sha1:c9eaafd9f808aba8d29be73054e11d37577e539a</id>
<content type='text'>
We will use _ as CLI level divider. The XML definition filename and also
the Python helper should match the CLI node.

Example:
set interfaces ethernet -&gt; interfaces_ethernet.xml.in
set interfaces bond -&gt; interfaces_bond.xml.in
set service dhcp-server -&gt; service_dhcp-server-xml.in

(cherry picked from commit 4ef110fd2c501b718344c72d495ad7e16d2bd465)
</content>
</entry>
<entry>
<title>login: T4943: Fixed 2FA + RADIUS compatibility</title>
<updated>2023-02-24T18:07:18+00:00</updated>
<author>
<name>zsdc</name>
<email>taras@vyos.io</email>
</author>
<published>2023-02-24T18:07:18+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=32a4415191ca725be9b3ca4c5f664123a0e767eb'/>
<id>urn:sha1:32a4415191ca725be9b3ca4c5f664123a0e767eb</id>
<content type='text'>
MFA requires KbdInteractiveAuthentication to ask a second factor, and the RADIUS
module for PAM does not like it, which makes them incompatible.

This commit:

* disables KbdInteractiveAuthentication
* changes order for PAM modules - make it first, before `pam_unix` or
`pam_radius_auth`
* enables the `forward_pass` option for `pam_google_authenticator` to accept
both password and MFA in a single input

As a result, local, RADIUS, and MFA work together.

Important change: MFA should be entered together with a password.

Before:

```
vyos login: &lt;USERNAME&gt;
Password: &lt;PASSWORD&gt;
Verification code: &lt;MFA&gt;
```

Now:
```
vyos login: &lt;USERNAME&gt;
Password &amp; verification code: &lt;PASSWORD&gt;&lt;MFA&gt;
```
</content>
</entry>
<entry>
<title>ssh: T4720: Ability to configure SSH-server HostKeyAlgorithms</title>
<updated>2022-10-17T12:15:22+00:00</updated>
<author>
<name>Viacheslav Hletenko</name>
<email>v.gletenko@vyos.io</email>
</author>
<published>2022-10-17T12:15:22+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=85f04237160a6ea98eea4ec58f1ccab9f6bfc31a'/>
<id>urn:sha1:85f04237160a6ea98eea4ec58f1ccab9f6bfc31a</id>
<content type='text'>
Ability to configure SSH-server HostKeyAlgorithms.
Specifies the host key signature algorithms that the server
offers. Can accept multiple values.
</content>
</entry>
<entry>
<title>Merge pull request #1555 from goodNETnick/ssh_otp</title>
<updated>2022-10-12T07:02:37+00:00</updated>
<author>
<name>Christian Poessinger</name>
<email>christian@poessinger.com</email>
</author>
<published>2022-10-12T07:02:37+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=6951fa7ef6ea4a2715b9083d654f6cf3f3b60213'/>
<id>urn:sha1:6951fa7ef6ea4a2715b9083d654f6cf3f3b60213</id>
<content type='text'>
system login: T874: add 2FA support for local and ssh authentication</content>
</entry>
<entry>
<title>system login: T874: add 2FA support for local and ssh authentication</title>
<updated>2022-10-11T23:56:45+00:00</updated>
<author>
<name>goodNETnick</name>
<email>pknet@ya.ru</email>
</author>
<published>2022-09-22T06:03:04+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=765f84386b6e94984ff79db2eab36d51f759159b'/>
<id>urn:sha1:765f84386b6e94984ff79db2eab36d51f759159b</id>
<content type='text'>
</content>
</entry>
<entry>
<title>ssh: T4716: Ablity to configure RekeyLimit data and time</title>
<updated>2022-10-10T12:52:54+00:00</updated>
<author>
<name>Viacheslav Hletenko</name>
<email>v.gletenko@vyos.io</email>
</author>
<published>2022-09-27T16:06:52+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=b9de775a5b4f017f9d164a127d93f55ce9053756'/>
<id>urn:sha1:b9de775a5b4f017f9d164a127d93f55ce9053756</id>
<content type='text'>
Ability to configure SSH RekeyLimit data (in Megabytes) and
time (in Minutes)

set service ssh rekey data 1024
set service ssh rekey time 60
</content>
</entry>
<entry>
<title>ssh: T3212: do not load systemd EnvironmentFile</title>
<updated>2022-07-22T21:16:13+00:00</updated>
<author>
<name>Christian Poessinger</name>
<email>christian@poessinger.com</email>
</author>
<published>2022-07-22T21:05:25+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=8c7cd6f181a4bbb5aee99f50e6c32eb1f4f37c3d'/>
<id>urn:sha1:8c7cd6f181a4bbb5aee99f50e6c32eb1f4f37c3d</id>
<content type='text'>
</content>
</entry>
<entry>
<title>sshguard: T4408: rename whitelist-address -&gt; allow-from</title>
<updated>2022-05-13T16:43:09+00:00</updated>
<author>
<name>Christian Poessinger</name>
<email>christian@poessinger.com</email>
</author>
<published>2022-05-13T16:43:07+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=37a08888d103556326ecd13e4738301ac901c861'/>
<id>urn:sha1:37a08888d103556326ecd13e4738301ac901c861</id>
<content type='text'>
We do not only allow individual host addresses but also prefixes.
</content>
</entry>
<entry>
<title>sshguard: T4408: Add service ssh dynamic-protection</title>
<updated>2022-05-12T17:27:38+00:00</updated>
<author>
<name>Viacheslav Hletenko</name>
<email>v.gletenko@vyos.io</email>
</author>
<published>2022-05-10T15:14:19+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=2e81f9e057f598a9a9e5c2d617e3d0818005d850'/>
<id>urn:sha1:2e81f9e057f598a9a9e5c2d617e3d0818005d850</id>
<content type='text'>
Sshguard protects hosts from brute-force attacks
Can inspect logs and block "bad" addresses by threshold
Auto-generate rules for nftables
When service stopped all generated rules are deleted
nft "type filter hook input priority filter - 10"

set service ssh dynamic-protection
set service ssh dynamic-protection block-time 120
set service ssh dynamic-protection detect-time 1800
set service ssh dynamic-protection threshold 30
set service ssh dynamic-protection whitelist-address 192.0.2.1
</content>
</entry>
<entry>
<title>ssh: T4353: fix Jinja2 linting errors</title>
<updated>2022-04-14T19:34:52+00:00</updated>
<author>
<name>Christian Poessinger</name>
<email>christian@poessinger.com</email>
</author>
<published>2022-04-14T19:34:52+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=dbfc2add3434638628b43ecfa097fbd166c85db7'/>
<id>urn:sha1:dbfc2add3434638628b43ecfa097fbd166c85db7</id>
<content type='text'>
</content>
</entry>
</feed>
