e404a21e92making it even more obvious that we *want* an ipsec cert
master
toby
2019-05-03 15:34:53 +0000
4177964e8fbetter help output on qemu-ifup-public
toby
2019-05-01 23:48:45 +0000
78a2a7b13fbetter comments on firewall rules
toby
2019-05-01 05:04:29 +0000
313ea1085fadding local connections for zebra/frr to the individual services. I can't believe I have not yet noticed this. seems like-frr reload is however relying on this
toby
2019-05-01 04:37:44 +0000
05bc412860MAJOR: static hostname assignments in favor of disabling ipv4 on mgmt1, frr reload, and simple rename of a couple of files to make it simpler
toby
2019-05-01 03:49:00 +0000
b37d2b5c74adding new 3300 port for ceph msgr2 protocol
toby
2019-04-29 07:06:51 +0000
e907220280apperently interfaces can't have comments
toby
2019-04-27 05:21:56 +0000
e1eac9c8c7quick if test so one can just synlink trunk uplinks using qemu-ifup-TRUNKNAME syntax and be done with it
toby
2019-04-26 18:34:16 +0000
0493a328ffre-addign ipv4 dhcp for mgmt1, still need it for the hostname for, but prob gonna hardcode the dns/sntp/hostname at this point soon
toby
2019-04-23 06:42:40 +0000
c5ecd31709nicer output on ifdown... being anal
toby
2019-04-22 23:56:23 +0000
ff5df9e336swtiching to statleless dhcp6 and trying to disable ipv4 now that mirrors is ipv6 it should work in theory. we'll have to fix SNTP dhcp client script probably though
toby
2019-04-19 19:12:12 +0000
f293436c67just like I assumed, SAN header not needed for ipsec and moved the CA handler to mirrors
toby
2019-04-18 05:33:21 +0000
4f0c28d56bstarting to migrate to a more meaningfull DN for ipsec
toby
2019-04-17 02:42:36 +0000
99773128d3we're ready now to roll out ikev2 as a given
toby
2019-04-16 23:20:23 +0000
60b16ebddcforcing the curl to be over IPv6, allows us to close the firewall for ipv4
toby
2019-04-16 21:48:29 +0000
182de8533fremoving ipsec reload upon cert *creation*, no point in doing it, we don't have the signed cert yet. we just risk breaking a working setup while being sure we won't get it working right away. the cron job, pulling the actual signed cert will be doing this part
toby
2019-04-16 21:21:29 +0000
d3f593888eremove some dependencies, that aren't really needed. we should move them to optional package
toby
2019-04-12 04:34:50 +0000
54b08d2f38upping the char limit by 1
toby
2019-04-10 22:46:48 +0000
0d20e9c028removing the default publicmac value to be sure it's always set. it just NEEDS to match what libvirt/qemu thinks it is
toby
2019-04-10 22:03:01 +0000
0bed52d345conffiles name is not variable after all :)
toby
2019-04-10 22:02:22 +0000
8f76828d0bnot sure if this is needed - actually I know its not - but it seems like a good idea as it may be needed for compat level 12+?... who knows
toby
2019-04-10 04:30:09 +0000
fa496d25c5making sure the new cert is tried to be pulled over the mgmt vrf since it doesn't have connectivity on the frontend without a cert
toby
2019-04-09 23:26:37 +0000
a000b9e2defirewall: moving the http rule to ipv6 - doh - and killing the etcd/stackapi rules again since we decided to go without them
toby
2019-04-09 22:47:57 +0000
47b2e0b3e6adding firewall http over VPN rule for bastion cert exchange and possibly more in the future
toby
2019-04-09 21:27:28 +0000
c53f3e2219making sysctl tweaks more versatile and just reload sysctl settings
toby
2019-04-09 21:00:11 +0000
1c38fef482updateting qemu-ifup to support the VNI passed in the ifname
toby
2019-04-09 20:38:44 +0000
ebc7c6a5ffscrew it, allowing undefined vars for now, will fix that eventually
toby
2019-03-29 18:46:22 +0000
3a08cb5182trying to be more specific on the variables and fail if var has not been defined, also fixing some drone stuff
toby
2019-03-29 18:33:34 +0000
22008293c5updating .drone file for mirrors
toby
2019-03-29 18:07:01 +0000
ec5869cba8adding ipsec node cerd self generation and sign req to bastion
toby
2019-03-29 17:57:21 +0000
2b6992eec1qemu-ifup: use variable for consistency
toby
2019-03-22 19:55:03 +0000
ff8f9fa025default frr logging verbosity to debug. so when debug is enabled it's actually logged as well
toby
2019-03-18 22:58:00 +0000
9fa840a956fixing typo in firewall rules
toby
2019-03-13 01:32:01 +0000
73b2389f08adding iptables comments to all rules
toby
2019-03-13 00:14:17 +0000
0c2e02c1b8removing old prometheus rules that were once hosted in aws
toby
2019-03-11 21:51:06 +0000
c760ae7c2cfirewall: updating mirrors.wit.com to allow the new location in usw1 over ipv6
toby
2019-03-11 21:48:58 +0000
eeb6cedbf6bugfix wit-gc: changing the way to quickly add the blackhole route. this way it does not get advertised over BGP (it's considered invalid) and so it doesn't create any hickups if the same route would already be used somewhere else
toby
2019-03-11 19:30:52 +0000
73ae7b9680accepting up to /56 on ipv6 and bugfixing for wit-gc
toby
2019-03-11 18:59:24 +0000
2e9317222eminor bugfix on wit-gc... more to come on stale routes
toby
2019-03-11 07:19:09 +0000
5be0d4b8fcupdated qemu scripts and wit-gc to support new ipv4 forwarding
toby
2019-03-11 02:16:33 +0000
bc47af367awe definitely wanna support more than /64 on ipv6, upping it to /60 for now, but prob wanna do more eventually
toby
2019-03-09 13:13:36 -0800
f44ff9304edisabling arp on the vm interface all together. we have the static entries from the unnumbered system, reduces the attack surface and DOS potentially on the hypervisor
toby
2019-03-09 12:05:45 -0800
268dd01421another attempt at the rules file
toby
2019-03-08 23:21:18 -0800
cfeef0de5b... seriously,... running out of ideas ...
toby
2019-03-08 23:19:39 -0800
396b2899ae... seriously,... running out of ideas ...
toby
2019-03-08 22:53:21 -0800
b63d21ba83... seriously,... running out of ideas ...
toby
2019-03-08 22:42:11 -0800
2b1c7b34a6trying a whole new approach, seems like it worked on my wit-vm-router-config package, lets see what it does here ...
toby
2019-03-08 22:14:00 -0800
1cf4ef12f7migrating to the more conventional static arp/unnumbered ipv4 routing based on the BGP unnumbered RFC just without the BGP ;) ... its nice this way cause if we do decide to add BGP on top on a later time it will look essentially the same, just dynamic... for now it's static though ;)
toby
2019-03-08 20:09:13 +0000
22b4da07a3removing jumbo frames from uplinks. it aint happening....
toby
2019-02-23 06:22:12 +0000
fb96f1daa8adding more resiliancy to the ifup-public script. we want it to maybe fail if it doesn't know what to do with the variable. not just silently continue
toby
2019-02-21 01:02:35 +0000
13be20d519writing out ipsec.secrets through postinst again since apparmor blocks any type of hide/displace action
toby
2019-02-14 22:15:36 -0800
477b89aa0efixing major bug in ipsec.secrets
toby
2019-02-14 17:46:50 -0800
3003509bf4trying yet again a different approach to update files correctly upon install
toby
2019-02-14 16:43:13 -0800
a3934b7014evidently everything is breaking right now, so trying a different approach
toby
2019-02-14 14:43:53 -0800
1066e48dc7evidently everything is breaking right now, so trying a different approach
toby
2019-02-14 14:38:06 -0800
7ef14c0794adding some comments to the dynamic files
toby
2019-02-14 13:24:08 -0800
db0f639547switching the debian install around: all 'templates' are modified in the local folder and are than installed when already modified using isc-dhcp-server as an example in hope to imporove upgrade-consistency.
toby
2019-02-14 12:35:33 -0800
94b3a68407allow Default fallback route by default on eBGPv6-IN as well
toby
2019-02-14 03:25:27 -0800
30ac6534a3adding first very very basic old-school vlan support
root
2019-02-14 08:34:11 +0000
5363feff09firewall: adding new approach to stackapi over VPN, ipsec.conf: no changes, just nicer grouping
toby
2019-02-09 19:48:51 -0800
90e3484f5cfirewall: adding TTL hop-check on the BGP firewall rules. this makes it a bit more secure on fairly wide open BGP rules
toby
2019-02-05 20:42:36 -0800
b9d53909b8starting to use ceph on ipv6 as well ....
toby
2019-02-05 20:23:44 -0800
c99727567dfrr.conf: setting timers manually that would be set by the --enable-datacenter flag on frr. this way we don't have to compile our own frr. --enable-cumulus at this point only enables and alias for bgp address-family of evpn vs address-family l2vpn evpn. which we don't use anyway or already do it the right way
toby
2019-02-05 19:16:03 -0800
48abb08b5asetting loopback source IP on all bgp routes for IPv6 as well - did this on ipv4 but may need patching as I wanted to use only the public IP for public routes on IPv4. may still break if for whatever reason it prefers the mgmtgw/ipmigw IP like it just happened on ipv6
toby
2019-02-04 18:09:28 -0800
d8245c2223limiting lldp to only mgmt interfaces and avoid VMs to see lldp neigh requests
toby
2019-01-30 11:36:56 -0800
78d6e4d4ffless output on qemu ifup scripts
toby
2019-01-29 22:31:07 -0800
2af76bb4e8qemu-ifup/public scritps, replaced dig loopback lookup with ip, for more stability and better all round support for outside of libvirt
toby
2019-01-29 18:51:02 +0000
39d7830086IPsec: ipsec.conf config items typoed. auth vs authby need to make sure it does't break but this shuold be the right way
toby
2019-01-24 14:12:41 -0800
c3df5d6f12just some comments and to test the new signing machinery ...
toby
2019-01-23 14:50:54 -0800
a1d5439422firewall: allowing ipmi calles to be routed so that VPN clients and other boxes can make calls to ipmi
toby
2019-01-11 18:09:37 +0100
0de30974affixing the copyright in debian to be GPLv3
toby
2019-01-09 23:20:40 +0100
277cd58eaacompletely removing grub left overs
toby
2019-01-08 21:00:46 +0100
afdcd416b7removing ssh-password less which is now default anyway, and also remove grub config which needs to be broken out since it differes on various platforms like arm and s86
toby
2019-01-08 19:11:29 +0100
643519147dremoving grub-pc from dependencies again, PXE has more issues anyway and we wanna work towards the EFI boot options and it bites grub-efi
toby
2019-01-03 15:48:13 +0100
6114dffa19Merge branch 'prometheus-exporters' of netops/wit-network-config into master
toby
2018-12-20 08:21:00 +0000
dfa58f6089Allow hosts to communicate with prometheus exporters
Tim Sogard
2018-12-20 02:27:37 -0500
fcfdc8b19cmistakenly commited initial work for customer peering. so fixing the problem now by disabling the parts that would break things
toby
2018-12-20 00:01:59 +0100
279648eeb3adding frr-pythontools and grub-pc as dependencies
toby
2018-12-19 23:53:35 +0100