summaryrefslogtreecommitdiff
path: root/src/conf_mode/vpn_sstp.py
diff options
context:
space:
mode:
authorChristian Poessinger <christian@poessinger.com>2020-03-20 23:07:43 +0100
committerChristian Poessinger <christian@poessinger.com>2020-03-20 23:25:05 +0100
commita8920a1f13e6091355d33541802b1486c0cfa653 (patch)
tree8aa98337ce740f38bd0402c42dcfe384c45d9c3e /src/conf_mode/vpn_sstp.py
parent86e47301786da64a035156edd24ed2ec89918a49 (diff)
downloadvyos-1x-a8920a1f13e6091355d33541802b1486c0cfa653.tar.gz
vyos-1x-a8920a1f13e6091355d33541802b1486c0cfa653.zip
sstp: T2008: remove req-limit config node
Limiting the amount of requests passed to a server seems to be the wrong way to tackle a problem.
Diffstat (limited to 'src/conf_mode/vpn_sstp.py')
-rwxr-xr-xsrc/conf_mode/vpn_sstp.py8
1 files changed, 2 insertions, 6 deletions
diff --git a/src/conf_mode/vpn_sstp.py b/src/conf_mode/vpn_sstp.py
index e8c5155dd..09de7d112 100755
--- a/src/conf_mode/vpn_sstp.py
+++ b/src/conf_mode/vpn_sstp.py
@@ -100,7 +100,7 @@ chap-secrets=/etc/accel-ppp/sstp/chap-secrets
[radius]
verbose=1
{% for r in radius_server %}
-server={{ r.server }},{{ r.key }},auth-port={{ r.port }},req-limit={{ r.req_limit }},fail-time={{ r.fail_time }}
+server={{ r.server }},{{ r.key }},auth-port={{ r.port }},req-limit=0,fail-time={{ r.fail_time }}
{% endfor -%}
acct-timeout={{ radius_acct_tmo }}
@@ -286,8 +286,7 @@ def get_config():
'server' : server,
'key' : '',
'fail_time' : 0,
- 'port' : '1812',
- 'req_limit' : 0
+ 'port' : '1812'
}
conf.set_level(base_path + ['authentication', 'radius', 'server', server])
@@ -298,9 +297,6 @@ def get_config():
if conf.exists(['port']):
radius['port'] = conf.return_value(['port'])
- if conf.exists(['req-limit']):
- radius['req_limit'] = conf.return_value(['req-limit'])
-
if conf.exists(['key']):
radius['key'] = conf.return_value(['key'])