Page MenuHomeVyOS Platform
Feed Advanced Search

Oct 1 2019

kroy added a comment to T1700: Wireguard FQDN endpoint doesn't work after reboot.

This is going to become more and more of a problem as wireguard adoption continues. Most major Wireguard VPN services provide a FQDN as their endpoint, not IP:

Oct 1 2019, 1:58 PM · Rejected
runar added a comment to T1700: Wireguard FQDN endpoint doesn't work after reboot.

As for openvpn i dont know, but if the app itself does dns queries on connect it will work quite fint (as i think it does)

Oct 1 2019, 6:54 AM · Rejected
runar added a comment to T1700: Wireguard FQDN endpoint doesn't work after reboot.

As i tried to say, this fix will only work in some scenarios, and this comes down to the implementation of the app were configuring. And to be clear, wireguard does NOT support dns, but the wg config utillity does. On execution time it reads the dns name and tries to resolve it once, and only once. When it fails things would not work.. this is the same with eg. Nhrp that works exactly the same.. using this has raise conditions with getting ip up and running and not only on the host file. We do not wait for dhcp to delegate an address or dns servers.. these could come many ms/sec after wireguard is configured.. this is even true in the case when you change the priority.. and the length of the config/execution time also comes in as an parameter in this raise condition.. so, if you ask me, revert the priority and instead create a dns daemon thing that could read the config and populate the entry when it has failed.

Oct 1 2019, 6:53 AM · Rejected
c-po added a comment to T1700: Wireguard FQDN endpoint doesn't work after reboot.

Shouldn‘t OpenVPN have a similar problem?

Oct 1 2019, 6:28 AM · Rejected
kroy added a comment to T1700: Wireguard FQDN endpoint doesn't work after reboot.

This should be reverted, as the change is breaking. After more testing, I found some problems due to things like static routing being applied before wireguard now. So the wireguard tunnel works, but in some cases any routing that shouldbe going over the tunnel does not work.

Oct 1 2019, 1:20 AM · Rejected

Sep 30 2019

hagbard added a comment to T1700: Wireguard FQDN endpoint doesn't work after reboot.

http://dev.packages.vyos.net/repositories/current/vyos/pool/main/v/vyos-1x/vyos-1x_1.3.0-16_all.deb or next rolling release should fix the issue.

Sep 30 2019, 10:20 PM · Rejected
hagbard moved T1700: Wireguard FQDN endpoint doesn't work after reboot from Need Triage to In Progress on the VyOS 1.3 Equuleus board.
Sep 30 2019, 10:18 PM · Rejected
hagbard changed the status of T1700: Wireguard FQDN endpoint doesn't work after reboot from Open to Needs testing.
Sep 30 2019, 10:18 PM · Rejected
hagbard triaged T1700: Wireguard FQDN endpoint doesn't work after reboot as Normal priority.
Sep 30 2019, 10:18 PM · Rejected
hagbard claimed T1700: Wireguard FQDN endpoint doesn't work after reboot.
Sep 30 2019, 10:14 PM · Rejected
kroy added a comment to T1700: Wireguard FQDN endpoint doesn't work after reboot.

Yep. Changing the priority fixes the issue completely

Sep 30 2019, 9:55 PM · Rejected
hagbard added a comment to T1700: Wireguard FQDN endpoint doesn't work after reboot.

@kroy You can quickly test it via setting Priority to 999 in /opt/vyatta/share/vyatta-cfg/templates/interfaces/wireguard/node.def. It's currently 459. Let me know your results, please.

Sep 30 2019, 9:30 PM · Rejected
kroy added a comment to T1700: Wireguard FQDN endpoint doesn't work after reboot.

@runar This isn't a routing issue though.

Sep 30 2019, 8:31 PM · Rejected
runar added a comment to T1700: Wireguard FQDN endpoint doesn't work after reboot.

Changing the priority will only change a portion of this. It.. could fix the situation there the user have static ip and a default route, but will not give effect when the user has dhcp or uses bgp el.. so my wote goes to not changing priorities on this. This is a loosing race as long as we dont have a daemon el. That manages the connections..

Sep 30 2019, 5:44 PM · Rejected
c-po added a comment to T1700: Wireguard FQDN endpoint doesn't work after reboot.

Could we raise WireGuard Priority to 999? So it is launched very late?

Sep 30 2019, 5:21 PM · Rejected
hagbard added a comment to T1700: Wireguard FQDN endpoint doesn't work after reboot.

There is not really an up or down, there is only a verified handshake and the transferred bytes. If you haven't sent and received anything, the interface is in 'unknown' state in terms of wireguard, even if it's 'up' if you look via iproute2. All can could do it checking if the endpoint resolves and if it does, send a packet and see if the handshake completes.

Sep 30 2019, 5:06 PM · Rejected
kroy added a comment to T1700: Wireguard FQDN endpoint doesn't work after reboot.

Changing when the tunnel comes up isn’t an option? For whatever reason the tunnel comes up before DNS resolution works. Using a hostname when the system is running works perfectly

Sep 30 2019, 4:22 PM · Rejected
hagbard added a comment to T1700: Wireguard FQDN endpoint doesn't work after reboot.

yes, you need to be either able to resolve your endpoints name or have it in /etc/hosts mapped. The name is being resolved (or tried) when the wg command configures the tunnel. There is unfortunately not too much I can do against, unless implementing a probe service or something like that ( could be as simple as ping).

Sep 30 2019, 3:01 PM · Rejected

Sep 29 2019

Unknown Object (User) changed the status of T1701: Delete domain-name and domain-search won't work from Open to In progress.
Sep 29 2019, 10:19 PM · VyOS 1.2 Crux (VyOS 1.2.4)
Unknown Object (User) added a comment to T1701: Delete domain-name and domain-search won't work.

PR #142

Sep 29 2019, 10:19 PM · VyOS 1.2 Crux (VyOS 1.2.4)
Unknown Object (User) created T1701: Delete domain-name and domain-search won't work.
Sep 29 2019, 10:15 PM · VyOS 1.2 Crux (VyOS 1.2.4)
kroy added a comment to T1700: Wireguard FQDN endpoint doesn't work after reboot.

Guess? Wireguard coming up before vyos-hostsd?

Sep 29 2019, 8:12 PM · Rejected
kroy created T1700: Wireguard FQDN endpoint doesn't work after reboot.
Sep 29 2019, 8:03 PM · Rejected
kroy added a comment to T1697: Configurable FQDN at vbash prompt.
Sep 29 2019, 7:55 PM · VyOS 1.3 Equuleus (1.3.0)
c-po added a comment to T1697: Configurable FQDN at vbash prompt.

\h is the short hostname, I thought we want to have the full one (\H)

Sep 29 2019, 4:00 PM · VyOS 1.3 Equuleus (1.3.0)
Unknown Object (User) added a comment to T1697: Configurable FQDN at vbash prompt.

Sorry for duplicate, after T1531 seems this feature broken.
Proposed solution: change for vbash PS1='${debian_chroot:+($debian_chroot)}\u@\H:\w\$ ' to PS1='${debian_chroot:+($debian_chroot)}\u@$(hostname -f):\w\$ '

Sep 29 2019, 12:39 PM · VyOS 1.3 Equuleus (1.3.0)

Sep 28 2019

c-po added a comment to T1697: Configurable FQDN at vbash prompt.

Duplicate of T1310. It worked in 1.2.2 but its not working as expected in 1.2.3 after using vyos-hostsd

Sep 28 2019, 6:27 PM · VyOS 1.3 Equuleus (1.3.0)
Unknown Object (User) created T1697: Configurable FQDN at vbash prompt.
Sep 28 2019, 6:21 PM · VyOS 1.3 Equuleus (1.3.0)

Sep 27 2019

phoenix updated the task description for T1694: NTPd: Do not listen on all interfaces by default.
Sep 27 2019, 11:14 AM · VyOS 1.2 Crux (VyOS 1.2.4)
phoenix created T1694: NTPd: Do not listen on all interfaces by default.
Sep 27 2019, 11:02 AM · VyOS 1.2 Crux (VyOS 1.2.4)
DWilly92 created T1693: DNS Forwarding Services not responding with Allow-From.
Sep 27 2019, 2:26 AM · VyOS 1.3 Equuleus (1.3.0)

Sep 26 2019

Woodster1975 closed T1687: Compare function producing error as Resolved.

I have rebuilt the router and this appears to be working as expected now. Marking as resolved.

Sep 26 2019, 9:10 AM · Invalid
Woodster1975 created T1687: Compare function producing error.
Sep 26 2019, 8:51 AM · Invalid

Sep 24 2019

Unknown Object (User) added a comment to T1678: hostfile-update missing line feed.

PR https://github.com/vyos/vyos-1x/pull/137, using vyos-hostsd-client instead of typical adding record to /etc/hosts

Sep 24 2019, 5:03 PM · VyOS 1.2 Crux (VyOS 1.2.4)
Unknown Object (User) claimed T1678: hostfile-update missing line feed.
Sep 24 2019, 4:09 PM · VyOS 1.2 Crux (VyOS 1.2.4)

Sep 23 2019

maznu added a comment to T1679: during bootup: invalid literal for int() with base 10.

Symptoms which cause no configuration of the device after booting into 1.2:

Sep 23 2019, 3:01 PM · VyOS 1.3 Equuleus (1.3.0)
maznu added a comment to T1679: during bootup: invalid literal for int() with base 10.

PR to fix this: https://github.com/vyos/vyos-1x/pull/136

Sep 23 2019, 3:00 PM · VyOS 1.3 Equuleus (1.3.0)
maznu created T1679: during bootup: invalid literal for int() with base 10.
Sep 23 2019, 2:56 PM · VyOS 1.3 Equuleus (1.3.0)
Unknown Object (User) changed Difficulty level from easy to normal on T1678: hostfile-update missing line feed.
Sep 23 2019, 2:49 PM · VyOS 1.2 Crux (VyOS 1.2.4)
Unknown Object (User) added a comment to T1678: hostfile-update missing line feed.

Also exist additional issue, if we add system static host-mapping all dhcp records will be erased.

Sep 23 2019, 2:48 PM · VyOS 1.2 Crux (VyOS 1.2.4)
Unknown Object (User) created T1678: hostfile-update missing line feed.
Sep 23 2019, 2:03 PM · VyOS 1.2 Crux (VyOS 1.2.4)

Sep 21 2019

c-po added a comment to T1675: OpenVPN - Specify minimum TLS version.

Thanks for the contribution, Please use VyOS 1.3 tag as this won't be backported to crux easily

Sep 21 2019, 8:06 AM · VyOS 1.3 Equuleus (1.3.0)
vindenesen closed T1675: OpenVPN - Specify minimum TLS version as Resolved.
Sep 21 2019, 5:44 AM · VyOS 1.3 Equuleus (1.3.0)

Sep 20 2019

vindenesen added a comment to T1675: OpenVPN - Specify minimum TLS version.

Pull request created: https://github.com/vyos/vyos-1x/pull/133

Sep 20 2019, 11:07 AM · VyOS 1.3 Equuleus (1.3.0)
vindenesen changed the status of T1675: OpenVPN - Specify minimum TLS version from Open to In progress.
Sep 20 2019, 10:46 AM · VyOS 1.3 Equuleus (1.3.0)
vindenesen claimed T1675: OpenVPN - Specify minimum TLS version.
Sep 20 2019, 10:46 AM · VyOS 1.3 Equuleus (1.3.0)
vindenesen created T1675: OpenVPN - Specify minimum TLS version.
Sep 20 2019, 10:45 AM · VyOS 1.3 Equuleus (1.3.0)

Sep 19 2019

hagbard closed T1670: OpenVPN option for tls-auth as Resolved.

PR merged https://github.com/vyos/vyos-1x/pull/131

Sep 19 2019, 8:24 PM · VyOS 1.3 Equuleus (1.3.0)
c-po added a comment to T1673: vif bridge-group not migrated to bridge member interface.

Please share a pre and post-commit config block for me for testing.

Sep 19 2019, 8:16 PM · VyOS 1.3 Equuleus (1.3.0)
mb300sd added a comment to T1673: vif bridge-group not migrated to bridge member interface.

The loading error is caused by bridging a l2tpv3 interface, didn't see the cause at first because of the other errors. Since the bridge is now created at priority 470, and l2tpv3 is 800, when before an interface would be added to the bridge as it is created.

Sep 19 2019, 7:56 PM · VyOS 1.3 Equuleus (1.3.0)
vindenesen added a comment to T1670: OpenVPN option for tls-auth.

Pull request added: https://github.com/vyos/vyos-1x/pull/131

Sep 19 2019, 7:44 PM · VyOS 1.3 Equuleus (1.3.0)
hagbard changed the status of T1672: Wireguard keys not automatically moved from Open to Confirmed.
Sep 19 2019, 7:32 PM · VyOS 1.3 Equuleus (1.3.0)
hagbard claimed T1672: Wireguard keys not automatically moved.
Sep 19 2019, 7:31 PM · VyOS 1.3 Equuleus (1.3.0)
mb300sd added a comment to T1673: vif bridge-group not migrated to bridge member interface.

After adding the vif to bridge member interfaces, I get a config load error on boot. Running config, load, commit, works. Something to do with the order the configs get applied?

Sep 19 2019, 7:04 PM · VyOS 1.3 Equuleus (1.3.0)
mb300sd renamed T1673: vif bridge-group not migrated to bridge member interface from bridge-group missing from vif to vif bridge-group not migrated to bridge member interface.
Sep 19 2019, 6:59 PM · VyOS 1.3 Equuleus (1.3.0)
mb300sd changed Is it a breaking change? from behavior to syntax on T1673: vif bridge-group not migrated to bridge member interface.
Sep 19 2019, 6:55 PM · VyOS 1.3 Equuleus (1.3.0)
mb300sd added a comment to T1673: vif bridge-group not migrated to bridge member interface.

Just noticed bridge has a member interface parameter now. The vif bridge-group config was not migrated.

Sep 19 2019, 6:55 PM · VyOS 1.3 Equuleus (1.3.0)
mb300sd created T1673: vif bridge-group not migrated to bridge member interface.
Sep 19 2019, 6:51 PM · VyOS 1.3 Equuleus (1.3.0)
mb300sd created T1672: Wireguard keys not automatically moved.
Sep 19 2019, 6:49 PM · VyOS 1.3 Equuleus (1.3.0)
vindenesen updated the task description for T1670: OpenVPN option for tls-auth.
Sep 19 2019, 5:55 PM · VyOS 1.3 Equuleus (1.3.0)
vindenesen added a comment to T1670: OpenVPN option for tls-auth.
Sep 19 2019, 4:03 PM · VyOS 1.3 Equuleus (1.3.0)
vindenesen triaged T1670: OpenVPN option for tls-auth as Low priority.
Sep 19 2019, 3:48 PM · VyOS 1.3 Equuleus (1.3.0)
vindenesen updated the task description for T1670: OpenVPN option for tls-auth.
Sep 19 2019, 3:42 PM · VyOS 1.3 Equuleus (1.3.0)
vindenesen claimed T1670: OpenVPN option for tls-auth.
Sep 19 2019, 3:42 PM · VyOS 1.3 Equuleus (1.3.0)
vindenesen created T1670: OpenVPN option for tls-auth.
Sep 19 2019, 3:41 PM · VyOS 1.3 Equuleus (1.3.0)
hagbard moved T1664: Ipoe with bond per vlan don't work from Need Triage to Finished on the VyOS 1.3 Equuleus board.
Sep 19 2019, 3:19 PM · VyOS 1.3 Equuleus (1.3.0)
hagbard added a project to T1664: Ipoe with bond per vlan don't work: VyOS 1.3 Equuleus.
Sep 19 2019, 3:19 PM · VyOS 1.3 Equuleus (1.3.0)
hagbard moved T1664: Ipoe with bond per vlan don't work from Finished to Backlog on the VyOS 1.2 Crux board.
Sep 19 2019, 3:18 PM · VyOS 1.3 Equuleus (1.3.0)
hagbard closed T1664: Ipoe with bond per vlan don't work as Resolved.

Thanks for testing.

Sep 19 2019, 3:18 PM · VyOS 1.3 Equuleus (1.3.0)
sever added a comment to T1664: Ipoe with bond per vlan don't work.

@hagbard
In VyOS 1.2-rolling-201909190545 all work. Fixed. Thank's.

Sep 19 2019, 8:52 AM · VyOS 1.3 Equuleus (1.3.0)

Sep 18 2019

kroy created T1668: Integration between VyOS installs and a centralized repository..
Sep 18 2019, 11:20 PM · vyConductor
hagbard added a comment to T1664: Ipoe with bond per vlan don't work.

@sever I see that the new package hasn't been autobuild in our CI, I see to get that fixed. If you are in urgent need of the change, please build and install vyos-1x manually.

Sep 18 2019, 3:42 PM · VyOS 1.3 Equuleus (1.3.0)
sever added a comment to T1664: Ipoe with bond per vlan don't work.

In release VyOS 1.2-rolling-201909180118 I dont see this command

Sep 18 2019, 2:11 PM · VyOS 1.3 Equuleus (1.3.0)

Sep 16 2019

hagbard changed the status of T1664: Ipoe with bond per vlan don't work from In progress to Needs testing.
Sep 16 2019, 9:41 PM · VyOS 1.3 Equuleus (1.3.0)
hagbard added a comment to T1664: Ipoe with bond per vlan don't work.

Tomorrows rolling ISO will have the patch applied.
Please test and let me know how it goes.

Sep 16 2019, 9:36 PM · VyOS 1.3 Equuleus (1.3.0)
hagbard changed the status of T1664: Ipoe with bond per vlan don't work from Confirmed to In progress.

@sever Issue found and working on a patch.

ifname  | called-sid |    calling-sid    |     ip      | ip6 | ip6-dp | rate-limit | state  |  uptime  |        sid       
----------+------------+-------------------+-------------+-----+--------+------------+--------+----------+------------------
 bond0.51 | bond0.51   | 08:00:27:82:43:ae | 192.168.0.2 |     |        |            | active | 00:01:03 | d060220ce77252a9

Auto creation of vlans failed.

Sep 16 2019, 9:28 PM · VyOS 1.3 Equuleus (1.3.0)
hagbard changed the status of T1664: Ipoe with bond per vlan don't work from Open to Confirmed.
Sep 16 2019, 5:33 PM · VyOS 1.3 Equuleus (1.3.0)
sever added a comment to T1664: Ipoe with bond per vlan don't work.

@hagbard in first my message actual config for bond1 with client-subnet 10.3.0.0/23 and authentication mode "local".
I plan to use several vlan's for several services.
You use it without vlans.

Sep 16 2019, 4:19 PM · VyOS 1.3 Equuleus (1.3.0)
hagbard added a comment to T1664: Ipoe with bond per vlan don't work.

everything works without issue as far a I see.

Sep 16 2019, 4:16 PM · VyOS 1.3 Equuleus (1.3.0)
hagbard added a comment to T1664: Ipoe with bond per vlan don't work.

@sever Yeah, sorry about the typo. You need to define an IP pool and an authentication method if you are not using a RADIUS server for that.
(I have bond0 in my lab so you need to change that to bond1 if you copy).

Sep 16 2019, 4:09 PM · VyOS 1.3 Equuleus (1.3.0)
sever added a comment to T1664: Ipoe with bond per vlan don't work.

@hagbard bond0 - is WAN interface without vlans/tags. For DHCP listening I use bond1 interface, not PPP.
A try man https://vyos.readthedocs.io/en/latest/services/ipoe-server.html

Sep 16 2019, 3:54 PM · VyOS 1.3 Equuleus (1.3.0)
hagbard added a comment to T1664: Ipoe with bond per vlan don't work.

@sever Can you please try: set service pppoe-server interface bond0 vlan-id 55. And have a look into /var/log/messages what accel is reporting there once the dhcp reply arrives. I'm going to lab up your config and test as well.
Also you need to define an IP pool a client can get an IP address from.
https://vyos.readthedocs.io/en/latest/services/ipoe-server.html
(btw: show config comands gives you a nicer config overview)

Sep 16 2019, 3:43 PM · VyOS 1.3 Equuleus (1.3.0)
sever added a comment to T1664: Ipoe with bond per vlan don't work.

@sever Can you please also share your pppoe-server config?

Sep 16 2019, 3:29 PM · VyOS 1.3 Equuleus (1.3.0)
hagbard added a comment to T1664: Ipoe with bond per vlan don't work.

@sever Can you please also share your pppoe-server config?

Sep 16 2019, 3:12 PM · VyOS 1.3 Equuleus (1.3.0)
hagbard claimed T1664: Ipoe with bond per vlan don't work.
Sep 16 2019, 3:10 PM · VyOS 1.3 Equuleus (1.3.0)
sever created T1664: Ipoe with bond per vlan don't work.
Sep 16 2019, 8:03 AM · VyOS 1.3 Equuleus (1.3.0)
sever added a comment to T1660: Bonding dont’t work on VyOS 1.2-rolling-201909120338.
In T1660#43438, @c-po wrote:

Please test again with the rolling release from 2019-09-14. Thanks for reporting the issue.

Sep 16 2019, 7:02 AM · VyOS 1.3 Equuleus (1.3.0)

Sep 13 2019

c-po added a comment to T1660: Bonding dont’t work on VyOS 1.2-rolling-201909120338.

Please test again with the rolling release from 2019-09-14. Thanks for reporting the issue.

Sep 13 2019, 6:44 PM · VyOS 1.3 Equuleus (1.3.0)
c-po added a parent task for T1660: Bonding dont’t work on VyOS 1.2-rolling-201909120338: T1614: Rewrite bonding interface in new style XML syntax.
Sep 13 2019, 6:41 PM · VyOS 1.3 Equuleus (1.3.0)
c-po closed T1660: Bonding dont’t work on VyOS 1.2-rolling-201909120338 as Resolved.
Sep 13 2019, 6:40 PM · VyOS 1.3 Equuleus (1.3.0)
hagbard reassigned T1660: Bonding dont’t work on VyOS 1.2-rolling-201909120338 from hagbard to Unknown Object (User).
Sep 13 2019, 4:06 PM · VyOS 1.3 Equuleus (1.3.0)
Unknown Object (User) added a comment to T1660: Bonding dont’t work on VyOS 1.2-rolling-201909120338.

PR https://github.com/vyos/vyos-1x/pull/128

Sep 13 2019, 4:02 PM · VyOS 1.3 Equuleus (1.3.0)
hagbard claimed T1660: Bonding dont’t work on VyOS 1.2-rolling-201909120338.
Sep 13 2019, 3:49 PM · VyOS 1.3 Equuleus (1.3.0)
sever created T1660: Bonding dont’t work on VyOS 1.2-rolling-201909120338.
Sep 13 2019, 3:41 PM · VyOS 1.3 Equuleus (1.3.0)

Sep 11 2019

hagbard changed the status of T770: Bonded interfaces get updated with incorrect hw-id in config. from Confirmed to In progress.
Sep 11 2019, 5:16 PM · VyOS 1.3 Equuleus (1.3.0-epa1)
zsdc changed the status of T1654: sFlow: multiple "sflow server" not work, and "disable-imt" could break configuration from Open to Confirmed.
Sep 11 2019, 4:07 PM · VyOS 1.3 Equuleus (1.3.0)
zsdc created T1654: sFlow: multiple "sflow server" not work, and "disable-imt" could break configuration.
Sep 11 2019, 4:06 PM · VyOS 1.3 Equuleus (1.3.0)

Sep 10 2019

hagbard closed T1644: Wireguard listen ports lower than 1024 as Wontfix.

I think encapsulate the udp based traffic into tcp is more than counter productive and makes it an easy DoS target.

Sep 10 2019, 3:36 AM · Rejected
Asteroza added a comment to T1644: Wireguard listen ports lower than 1024.

Actually somebody made a nifty websocket tunnel named wstunnel (similar to stunnel conceptually, but websockets is more natural for tunneling generic binary protocols thanks to webRTC...) that seems to work alright for Wireguard.

Sep 10 2019, 1:06 AM · Rejected
trystan added a comment to T1644: Wireguard listen ports lower than 1024.

I was thinking some more along the lines of stunnel and wrapping wireguard that way but it would require additional packaging and integration on the vyos side. Luckily whatever outbound filtering is in place for this specific implementation seems to be relatively basic and limited to port blocking/whitelisting.

Sep 10 2019, 12:51 AM · Rejected