- User Since
- May 6 2021, 3:27 PM (37 w, 3 d)
Fri, Jan 21
PR + migration: https://github.com/vyos/vyos-1x/pull/1184
I can't reproduce this issue on latest rolling
Tue, Jan 18
Okay, thanks for the update. I have found a conntrack issue in the code. Will have a fix in shortly.
Fixed in 1.4 PR: https://github.com/vyos/vyos-1x/pull/1176
Mon, Jan 17
You need to remove the state new match on the rule and it'll work.
Included those flags in PR: https://github.com/vyos/vyos-1x/pull/1174
Included in PR: https://github.com/vyos/vyos-1x/pull/1174
Sun, Jan 16
Thanks, will include a fix in a PR shortly
Thu, Jan 13
Thanks for the report, working on the fix now.
Wed, Jan 12
Tue, Jan 11
Forgot that my PR for WLB was still a draft. That the jump does seem to be created properly with this PR in place.
That build at 08:11 UTC was a couple of hours before the commit was merged: https://github.com/vyos/vyos-1x/commit/f97144259335102c3d96b232cbb0af4970120d62
Seems to be working on my latest build?
Thanks, I really like the include idea and have implemented it in the attached PR. Also added a check in firewall.py to reload policy-route script to keep any group changes updated.
PR removes the empty line when there are no group members, also adds a warning message when empty groups are used in rules.
@Viacheslav Not using exact ipset format, however addresses are sorted and output one per line.
Should resolve the rest of the error messages.
Mon, Jan 10
IPv4 address range error messages are included in PR: https://github.com/vyos/vyos-1x/pull/1152
Thanks for catching that!
Thu, Jan 6
Updates the vyatta-conntrack package to work without legacy firewall and fixes the op-mode commands. Should also fix some conntrack functionality (untested).
Wed, Jan 5
Tue, Jan 4
Duplicate of T4130
Mon, Jan 3
Nov 4 2021
Nov 3 2021
Oct 31 2021
Included this feature in the firewall/zone-policy rewrite: https://github.com/vyos/vyos-1x/pull/1033
Oct 20 2021
Oct 19 2021
Sep 24 2021
Sep 14 2021
Good shout, fixed in following PR: https://github.com/vyos/vyos-1x/pull/1005
Sep 13 2021
Aug 13 2021
Aug 10 2021
Jul 22 2021
Jul 21 2021
Jul 20 2021
Jul 19 2021
PKI Wireguard PR: https://github.com/vyos/vyos-1x/pull/929
Jul 16 2021
Jul 13 2021
This error occurs because the ipsec module blindly updates the l2tp module after a commit change to ensure any l2tp via ipsec config is then refreshed also.
Jul 7 2021
vpn rsa-keys migrated: https://github.com/vyos/vyos-1x/pull/912
Jul 2 2021
Should be resolved in PR: https://github.com/vyos/vyos-1x/pull/903
Fixed in PR: https://github.com/vyos/vyos-1x/pull/903
Jun 29 2021
PR is in: https://github.com/vyos/vyos-1x/pull/901
I should soon have a PR ready for this, including an update to IPSec config to show how to port existing configs to use PKI.
Jun 26 2021
When using show pki ... commands you would be able to see the relation between certificates and CAs.