<feed xmlns='http://www.w3.org/2005/Atom'>
<title>vyos-1x.git/interface-definitions/include/firewall, branch sever-sever-patch-1</title>
<subtitle>VyOS command definitions, scripts, and utilities (mirror of https://github.com/vyos/vyos-1x.git)
</subtitle>
<id>https://git.amelek.net/vyos/vyos-1x.git/atom?h=sever-sever-patch-1</id>
<link rel='self' href='https://git.amelek.net/vyos/vyos-1x.git/atom?h=sever-sever-patch-1'/>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/'/>
<updated>2024-12-17T03:03:53+00:00</updated>
<entry>
<title>T6918: Fix punctuation</title>
<updated>2024-12-17T03:03:53+00:00</updated>
<author>
<name>opswill</name>
<email>will@nixops.org</email>
</author>
<published>2024-12-17T03:03:53+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=833d5866b69dc346d8127845f32ebdcf9b647e59'/>
<id>urn:sha1:833d5866b69dc346d8127845f32ebdcf9b647e59</id>
<content type='text'>
Co-authored-by: Daniil Baturin &lt;daniil@baturin.org&gt;</content>
</entry>
<entry>
<title>T6918: Accept invalid PPPoE Session in stateful bridge firewall.</title>
<updated>2024-12-13T07:50:06+00:00</updated>
<author>
<name>opswill</name>
<email>root@opswill.com</email>
</author>
<published>2024-12-13T03:25:01+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=c94dabede31447f3d1eaded08b448f944087539d'/>
<id>urn:sha1:c94dabede31447f3d1eaded08b448f944087539d</id>
<content type='text'>
</content>
</entry>
<entry>
<title>xml: T6430: add re-usable vrf CLI node for firewall and pbr</title>
<updated>2024-10-07T15:17:42+00:00</updated>
<author>
<name>Christian Breunig</name>
<email>christian@breunig.cc</email>
</author>
<published>2024-10-07T15:13:14+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=9c291d115d987cc635d1ef56898119c7d2bdfee6'/>
<id>urn:sha1:9c291d115d987cc635d1ef56898119c7d2bdfee6</id>
<content type='text'>
</content>
</entry>
<entry>
<title>T6760: firewall: add packet modifications existing in policy route to regular firewall ruleset.</title>
<updated>2024-10-03T14:51:55+00:00</updated>
<author>
<name>Nicolas Fort</name>
<email>nicolasfort1988@gmail.com</email>
</author>
<published>2024-10-03T14:51:55+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=e846d2c1500df83742eb803684980396857cc0f1'/>
<id>urn:sha1:e846d2c1500df83742eb803684980396857cc0f1</id>
<content type='text'>
</content>
</entry>
<entry>
<title>T6698: firewall: add matcher for vlan type. (#4027)</title>
<updated>2024-09-10T06:56:18+00:00</updated>
<author>
<name>Nicolás Fort</name>
<email>95703796+nicolas-fort@users.noreply.github.com</email>
</author>
<published>2024-09-10T06:56:18+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=ec3ebe8890c60bbb6f657335c212ac7078dc731c'/>
<id>urn:sha1:ec3ebe8890c60bbb6f657335c212ac7078dc731c</id>
<content type='text'>
</content>
</entry>
<entry>
<title>T6647: firewall. Introduce patch for accepting ARP and DHCP replies on stateful bridge firewall. This patch is needed because ARP and DHCP are marked as invalid connections. Also, add ehternet-type matcher in bridge firewall.</title>
<updated>2024-08-28T12:19:19+00:00</updated>
<author>
<name>Nicolas Fort</name>
<email>nicolasfort1988@gmail.com</email>
</author>
<published>2024-08-26T18:10:01+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=8e0e1a99e5510c7575ab8a09145d6b4354692d55'/>
<id>urn:sha1:8e0e1a99e5510c7575ab8a09145d6b4354692d55</id>
<content type='text'>
</content>
</entry>
<entry>
<title>firewall: T4694: fix GRE key include path in XML</title>
<updated>2024-08-05T05:44:29+00:00</updated>
<author>
<name>Christian Breunig</name>
<email>christian@breunig.cc</email>
</author>
<published>2024-08-05T05:44:29+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=6e910723ed9bd7f510f39379298bd98375608bfa'/>
<id>urn:sha1:6e910723ed9bd7f510f39379298bd98375608bfa</id>
<content type='text'>
</content>
</entry>
<entry>
<title>firewall: T4694: Adding GRE flags &amp; fields matches to firewall rules</title>
<updated>2024-08-04T07:52:57+00:00</updated>
<author>
<name>Andrew Topp</name>
<email>andrewt@telekinetica.net</email>
</author>
<published>2024-08-04T07:52:57+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=60b0614296874c144665417130d4881461114db0'/>
<id>urn:sha1:60b0614296874c144665417130d4881461114db0</id>
<content type='text'>
* Only matching flags and fields used by modern RFC2890 "extended GRE" -
  this is backwards-compatible, but does not match all possible flags.
* There are no nftables helpers for the GRE key field, which is critical
  to match individual tunnel sessions (more detail in the forum post)
  * nft expression syntax is not flexible enough for multiple field
    matches in a single rule and the key offset changes depending on flags.
  * Thus, clumsy compromise in requiring an explicit match on the "checksum"
    flag if a key is present, so we know where key will be. In most cases,
    nobody uses the checksum, but assuming it to be off or automatically
    adding a "not checksum" match unless told otherwise would be confusing
  * The automatic "flags key" check when specifying a key doesn't have similar
    validation, I added it first and it makes sense. I would still like
    to find a workaround to the "checksum" offset problem.
  * If we could add 2 rules from 1 config definition, we could match
    both cases with appropriate offsets, but this would break existing
    FW generation logic, logging, etc.
* Added a "test_gre_match" smoketest
</content>
</entry>
<entry>
<title>T4072: change same helpers in xml definitions; add notrack action for prerouting chain; re introduce &lt;set vrf&gt; in policy; change global options for passing traffic to IPvX firewall; update smoketest</title>
<updated>2024-08-02T12:50:26+00:00</updated>
<author>
<name>Nicolas Fort</name>
<email>nicolasfort1988@gmail.com</email>
</author>
<published>2024-07-31T12:42:25+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=c33cd6157ebc5c08dc1e3ff1aa36f2d2fbb9ca83'/>
<id>urn:sha1:c33cd6157ebc5c08dc1e3ff1aa36f2d2fbb9ca83</id>
<content type='text'>
</content>
</entry>
<entry>
<title>T6570: firewall: add global-option to configure sysctl parameter for enabling/disabling sending traffic from bridge layer to ipvX layer</title>
<updated>2024-08-01T16:25:39+00:00</updated>
<author>
<name>Nicolas Fort</name>
<email>nicolasfort1988@gmail.com</email>
</author>
<published>2024-07-24T17:40:28+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=a8a9cfe750da719605ab90ce8c83c42276ab07f3'/>
<id>urn:sha1:a8a9cfe750da719605ab90ce8c83c42276ab07f3</id>
<content type='text'>
</content>
</entry>
</feed>
