vyos@oobm:~$ cat /var/run/accel-pppd/l2tp.conf ### generated by accel_l2tp.py ### [modules] log_syslog l2tp chap-secrets auth_mschap_v2
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
All Stories
Dec 31 2020
@alainlamar We aren't going to remove web proxy support! I was only talking about the old package specifically—it's been rewritten in the new style.
We can add a new <constraintGroup> element. If you put multiple <constraint> elements inside a <constraintGroup>, they work like logical AND.
Looks like it's not an issue anymore in latest iso.
show mpls table was outputting data.
I've never configured MPLS on anything.
I've loaded the latest release from yesterday, and I'm no longer seeing the issue?
That's v.odd.
As for encrypted DNS, it should cover standard solutions rather than be limited to a certain service provider. The standard solutions are as follows (although in general, there may not be many people using encrypted recursive DNS)
I used dnsdist and dnscrypt-proxy before but currently I settled with:
On server, what is in /var/run/accel-pppd/l2tp.conf ?
The setting should read ppp-max-mtu=1454 under l2tp section
Also I'd expect something is wrong on the client side, can you see the PPP config options the Teltonika is using?
The MTU setting is well described "max-mtu", i.e. a lower one can be negotiated.
Can you capture the LCP stage of PPP negotiation from either the client or server, it sounds like it's negotiating a smaller one for some reason.
Dec 30 2020
I am wondering if these are Zebra errors as they *seem* like Zebra errors.
vyatta-config-migrate removed in branches referenced in:
T3161 Consider removing ConfigLoad.pm
In testing.
Changes in branches here:
https://github.com/vyos/vyatta-cfg/compare/current...jestabro:T3161
https://github.com/vyos/vyatta-cfg-system/compare/current...jestabro:T3161
https://github.com/vyos/vyatta-wanloadbalance/compare/current...jestabro:T3161
This will need reasonable testing before commit, although all pieces had previously been implemented
I've added the two binary defense components oustanding:
Similar task T2045
@jack9603301 if you mean option "--clamp-mss-to-pmtu" so it was in wrong chain/hook T2868
Is there a way to support pmtu in interface configuration
Fix typo in script description
PR https://github.com/vyos/vyos-1x/pull/663
Dec 29 2020
Taras confirms that the functionality of
vyatta-cfg-system/etc/init.d/ec2-vyos-init
is replaced by that of cloud-init tools, so this legacy invocation will be removed, allowing for the removal of ConfigLoad.pm, since the other scripts have already been rewritten.
Tested and working for me today on VyOS 1.3-rolling-202012291104.
This was discussed briefly in last week's meeting: we would like to drop this package, however, the problem remains that the two scripts in vyatta-cfg-system
EAPoL will be part of any rolling release after vyos-1.3-rolling-202012290217-amd64.iso, please give this a spin and feedback any change requests.
@c-po Can we consider reviewing it again
Here you have mate. :)
Dec 28 2020
My ISP uses EAP-TLS. I have a script in firstboot.d that sets up auth on eth0 (my WAN). Its worked for the past year of rolling releases (up to at least VyOS 1.3-rolling-202012260217 that I am currently on.)
Please share the content of your myconfig.conf file, lets see of we can finally add this.
Please try again with latest rolling
We keep the proxy for authentication and filtering
need to use wpa_supplicant on a wired interface. Currently running on 1.3 rolling 2020-08-01 and used a manual entry in /etc/network/interfaces 'wpa-driver wired' . Attempted on rolling 2020-12-24 and it seems that VyOS no longer respects settings in /etc/network/interfaces so would require this capability. On boot, running sudo /usr/sbin/wpa_supplicant -Dwired -ieth0 -c /config/myconfig.conf works but no survivable on reboot