<feed xmlns='http://www.w3.org/2005/Atom'>
<title>vyos-1x.git/interface-definitions/include/version, branch sever-sever</title>
<subtitle>VyOS command definitions, scripts, and utilities (mirror of https://github.com/vyos/vyos-1x.git)
</subtitle>
<id>https://git.amelek.net/vyos/vyos-1x.git/atom?h=sever-sever</id>
<link rel='self' href='https://git.amelek.net/vyos/vyos-1x.git/atom?h=sever-sever'/>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/'/>
<updated>2024-08-15T16:12:37+00:00</updated>
<entry>
<title>T6649: Accel-ppp separate vlan-mon from listen interfaces</title>
<updated>2024-08-15T16:12:37+00:00</updated>
<author>
<name>Nataliia Solomko</name>
<email>natalirs1985@gmail.com</email>
</author>
<published>2024-08-15T10:20:31+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=663e468de2b431f771534b4e3a2d00a5924b98fe'/>
<id>urn:sha1:663e468de2b431f771534b4e3a2d00a5924b98fe</id>
<content type='text'>
</content>
</entry>
<entry>
<title>T6648: dhcpv6-server: align stateless DHCPv6 options with stateful</title>
<updated>2024-08-12T20:23:52+00:00</updated>
<author>
<name>Lucas Christian</name>
<email>lucas@lucasec.com</email>
</author>
<published>2024-08-11T22:18:38+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=a2b6098e6f9c1915a61a9aebc8f9852bd897387c'/>
<id>urn:sha1:a2b6098e6f9c1915a61a9aebc8f9852bd897387c</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Merge pull request #3823 from srividya0208/T6571</title>
<updated>2024-07-29T16:10:30+00:00</updated>
<author>
<name>Daniil Baturin</name>
<email>daniil@vyos.io</email>
</author>
<published>2024-07-29T16:10:30+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=9149c657dfdb4d8297aba3ef1ed1346e670b071b'/>
<id>urn:sha1:9149c657dfdb4d8297aba3ef1ed1346e670b071b</id>
<content type='text'>
OpenVPN CLI-option: T6571: rename ncp-ciphers with data-ciphers</content>
</entry>
<entry>
<title>firewall: T4694: Adding rt ipsec exists/missing match to firewall configs (#3616)</title>
<updated>2024-07-28T11:47:07+00:00</updated>
<author>
<name>talmakion</name>
<email>andrewt@telekinetica.net</email>
</author>
<published>2024-07-28T11:47:07+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=e2bf8812f73a75356f56274968be8859a2186d73'/>
<id>urn:sha1:e2bf8812f73a75356f56274968be8859a2186d73</id>
<content type='text'>
* Change ipsec match-ipsec/none to match-ipsec-in and match-none-in for
   fw rules
 * Add ipsec match-ipsec-out and match-none-out
 * Change all the points where the match-ipsec.xml.i include was used
   before, making sure the new includes (match-ipsec-in/out.xml.i) are
   used appropriately. There were a handful of spots where match-ipsec.xml.i
   had snuck back in for output hooked chains already
   (the common-rule-* includes)
 * Add the -out generators to rendered templates
 * Heavy modification to firewall config validators:
   * I needed to check for ipsec-in matches no matter how deeply nested
     under an output-hook chain(via jump-target) - this always generates
     an error.
   * Ended up retrofitting the jump-targets validator from root chains
     and for named custom chains. It checks for recursive loops and improper
     IPsec matches.
 * Added "test_ipsec_metadata_match" and "test_cyclic_jump_validation"
   smoketests</content>
</entry>
<entry>
<title>OpenVPN CLI-option: T6571: rename ncp-ciphers with data-ciphers</title>
<updated>2024-07-25T10:07:02+00:00</updated>
<author>
<name>srividya0208</name>
<email>a.srividya@vyos.io</email>
</author>
<published>2024-07-15T10:30:00+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=b62b2f5f8a9c4f0a7dc26bce1f15843651119256'/>
<id>urn:sha1:b62b2f5f8a9c4f0a7dc26bce1f15843651119256</id>
<content type='text'>
</content>
</entry>
<entry>
<title>openvpn: T6591: deprecate OpenVPN server net30 topology (#3825)</title>
<updated>2024-07-18T18:33:24+00:00</updated>
<author>
<name>Daniil Baturin</name>
<email>daniil@vyos.io</email>
</author>
<published>2024-07-18T18:33:24+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=e2b05343b30d2f989968532106e792cbaf75ecf6'/>
<id>urn:sha1:e2b05343b30d2f989968532106e792cbaf75ecf6</id>
<content type='text'>
</content>
</entry>
<entry>
<title>wireless: T6318: move country-code to a system wide configuration</title>
<updated>2024-06-16T07:22:28+00:00</updated>
<author>
<name>Christian Breunig</name>
<email>christian@breunig.cc</email>
</author>
<published>2024-06-15T19:40:04+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=9e22ab6b2aee48029d3455f65880e45c558cf1da'/>
<id>urn:sha1:9e22ab6b2aee48029d3455f65880e45c558cf1da</id>
<content type='text'>
Wireless devices are subject to regulations issued by authorities. For any
given AP or router, there will most likely be no case where one wireless NIC is
located in one country and another wireless NIC in the same device is located
in another country, resulting in different regulatory domains to apply to the
same box.

Currently, wireless regulatory domains in VyOS need to be configured per-NIC:
  set interfaces wireless wlan0 country-code us

This leads to several side-effects:
* When operating multiple WiFi NICs, they all can have different regulatory
  domains configured which might offend legislation.
* Some NICs need additional entries to /etc/modprobe.d/cfg80211.conf to apply
  regulatory domain settings, such as: "options cfg80211 ieee80211_regdom=US"
  This is true for the Compex WLE600VX. This setting cannot be done
  per-interface.

Migrate the first found wireless module country-code from the wireless
interface CLI to: "system wireless country-code"
</content>
</entry>
<entry>
<title>openvpn: T5487:  Remove eprecated option --cipher for server and client mode</title>
<updated>2024-06-11T15:04:18+00:00</updated>
<author>
<name>Nataliia Solomko</name>
<email>natalirs1985@gmail.com</email>
</author>
<published>2024-06-11T15:04:18+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=0f669a22615a18c3cd8da2f65f3ed79686992320'/>
<id>urn:sha1:0f669a22615a18c3cd8da2f65f3ed79686992320</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Merge pull request #3578 from nicolas-fort/raw-hook</title>
<updated>2024-06-06T15:19:01+00:00</updated>
<author>
<name>Daniil Baturin</name>
<email>daniil@vyos.io</email>
</author>
<published>2024-06-06T15:19:01+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=85da43aa26470e0657ba68437a297ed11045d132'/>
<id>urn:sha1:85da43aa26470e0657ba68437a297ed11045d132</id>
<content type='text'>
T3900: Add support for raw tables in firewall</content>
</entry>
<entry>
<title>T3900: T6394: extend functionalities in firewall; move netfilter sysctl timeout parameters defined in conntrack to firewall global-opton section.</title>
<updated>2024-06-04T13:22:24+00:00</updated>
<author>
<name>Nicolas Fort</name>
<email>nicolasfort1988@gmail.com</email>
</author>
<published>2024-05-24T16:44:41+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=770edf016838523c248e3c8a36c5f327a0b98415'/>
<id>urn:sha1:770edf016838523c248e3c8a36c5f327a0b98415</id>
<content type='text'>
</content>
</entry>
</feed>
