-
Notifications
You must be signed in to change notification settings - Fork 395
ipsec: T7594: Rename respond connection-type in IPSec peer settings to trap
#4881
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
|
👍 |
7c4c3e1 to
5b1f1d0
Compare
sever-sever
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@zdc I'm confused
We rename respond => trap,
But migration commands will replace respond => None ?
Yes, it will do what it is expected to do, but how many configs can this migration affect?
Wouldn't it be better to migrate the old syntax so as not to affect the current IPsec peer logic?
sarthurdev
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Change makes sense, passes smoketests. Not tested locally.
Just the one minor suggestion.
Original config file for smoketests were returned
5b1f1d0 to
cad4b3f
Compare
|
I agree with @sever-sever. Changing behavior can lead to customers' problems. I think migration should be from respond to trap |
dmbaturin
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This is a complicated situation. According to @zdc and the support team, this will solve problems for more customers than it will break configs for, and there's no solution that will fix what's broken and not touch what's working. If that's the case, I think we have to go with that.
dmbaturin
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@nicolas-fort is for making trap the new default, and I trust his judgement on that as the head of support.
cad4b3f to
3555dee
Compare
… to `trap` The previous 'connection-type respond' option in IPsec site-to-site peers was misleading - instead of passively waiting for peer initiation, it would initiate negotiation when matching traffic appeared, potentially causing SA duplication and renegotiation loops.
3555dee to
2dc91c0
Compare
dmbaturin
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Let's got with @nicolas-fort's judgement and migrate to trap. We should discuss what the new default for fresh installations should be (@zdc has concerns about making trap the default), but that's a different story.
|
CI integration 👍 passed! Details
|
Change summary
This config item is a continuous source of confusion and misconfigurations, and it is understandable. While CLI says this:
The
respondactually does not do what is noted in the description:vyos-1x/data/templates/ipsec/swanctl/peer.j2
Lines 96 to 97 in 22c6a81
In a pair of IPSec peers, to avoid SA duplication, one must keep silent and the other attempt to connect. With the
initiate/respondpair, one peer will actively try to initiate a connection, and another will be silent, but only if there is no traffic that matches a traffic selector for a peer. If such traffic occurs, it will try to connect as well.The risk is relatively low, but if this happens, such peers may loop into an endless renegotiation process.
To avoid confusion, @zdc suggests:
1. Rename
respondtotrapand fix the description.2. Migrate all
respondtonone, so the system does what is configured in the CLI.Types of changes
Related Task(s)
Related PR(s)
trapfor all peers and configurations vyos-documentation#1719How to test / Smoketest result
Step 1: configure site-to-site peer with connection type 'respond'
Step 2: upgrade the router on new version
Step 3: verify configuration after reboot the router
Checklist: