<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
  <channel>
    <title>VyOS - Blog</title>
    <link>https://blog.vyos.io</link>
    <description>VyOS Platform Project news and updates 
All about development and project life in  our blog</description>
    <language>en</language>
    <pubDate>Thu, 03 Apr 2025 16:28:13 GMT</pubDate>
    <dc:date>2025-04-03T16:28:13Z</dc:date>
    <dc:language>en</dc:language>
    <item>
      <title>VyOS 1.4.2 release</title>
      <link>https://blog.vyos.io/vyos-1.4.2-release</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.vyos.io/vyos-1.4.2-release" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.vyos.io/hubfs/vyos_blogpost_img_release_1.4.2_option_1.png" alt="VyOS 1.4.2 release" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Hello, Community! VyOS 1.4.2 release images and the corresponding source tarball are now available for download to customers and holders of contributor subscriptions.&lt;/p&gt; 
&lt;p&gt;This release includes a fix for a security issue that made console server users vulnerable to MitM attacks, over forty bug fixes, a few improvements in BRAS functionality, performance optimizations that can improve BGP convergence time by as much as 5-10 minutes in some scenarios, and other improvements. Additionally, FastNetMon is now deprecated and is scheduled to be removed in the future 1.5 release, and we are also finally phasing out legacy GnuPG signatures in favor of minisign. Read on for details!&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.vyos.io/vyos-1.4.2-release" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.vyos.io/hubfs/vyos_blogpost_img_release_1.4.2_option_1.png" alt="VyOS 1.4.2 release" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Hello, Community! VyOS 1.4.2 release images and the corresponding source tarball are now available for download to customers and holders of contributor subscriptions.&lt;/p&gt; 
&lt;p&gt;This release includes a fix for a security issue that made console server users vulnerable to MitM attacks, over forty bug fixes, a few improvements in BRAS functionality, performance optimizations that can improve BGP convergence time by as much as 5-10 minutes in some scenarios, and other improvements. Additionally, FastNetMon is now deprecated and is scheduled to be removed in the future 1.5 release, and we are also finally phasing out legacy GnuPG signatures in favor of minisign. Read on for details!&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4129050&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.vyos.io%2Fvyos-1.4.2-release&amp;amp;bu=https%253A%252F%252Fblog.vyos.io&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>bgp</category>
      <category>qos</category>
      <category>release</category>
      <category>1.4</category>
      <category>pppoe</category>
      <category>ipoe</category>
      <pubDate>Thu, 03 Apr 2025 16:28:13 GMT</pubDate>
      <author>daniil@sentrium.io (Daniil Baturin)</author>
      <guid>https://blog.vyos.io/vyos-1.4.2-release</guid>
      <dc:date>2025-04-03T16:28:13Z</dc:date>
    </item>
    <item>
      <title>VyOS Project December 2024 Update</title>
      <link>https://blog.vyos.io/vyos-project-december-2024-update</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.vyos.io/vyos-project-december-2024-update" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.vyos.io/hubfs/vyos_blogpost_img_december_2.png" alt="VyOS Project December 2024 Update" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Hello, Community!&lt;/p&gt; 
&lt;p&gt;The December update is here! The biggest highlight of this month is the 1.4.1 release but there was lots of work in the rolling release as well, both from the maintainers team and from our contributor community. One of the biggest news in the rolling release is that we are ready to update FRR — our routing protocol stack — to the latest 10.2 release. That will allow us to get rid of the legacy OpenNHRP daemon that we use for DMVPN and use FRR's built-in NHRP implementation, among other things.&lt;/p&gt; 
&lt;p&gt;Apart from that, there are many more bug fixes and improvements made in November and December, especially in QoS, IPoE server, and other areas — read on for details!&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.vyos.io/vyos-project-december-2024-update" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.vyos.io/hubfs/vyos_blogpost_img_december_2.png" alt="VyOS Project December 2024 Update" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Hello, Community!&lt;/p&gt; 
&lt;p&gt;The December update is here! The biggest highlight of this month is the 1.4.1 release but there was lots of work in the rolling release as well, both from the maintainers team and from our contributor community. One of the biggest news in the rolling release is that we are ready to update FRR — our routing protocol stack — to the latest 10.2 release. That will allow us to get rid of the legacy OpenNHRP daemon that we use for DMVPN and use FRR's built-in NHRP implementation, among other things.&lt;/p&gt; 
&lt;p&gt;Apart from that, there are many more bug fixes and improvements made in November and December, especially in QoS, IPoE server, and other areas — read on for details!&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4129050&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.vyos.io%2Fvyos-project-december-2024-update&amp;amp;bu=https%253A%252F%252Fblog.vyos.io&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>qos</category>
      <category>project updates</category>
      <category>1.5</category>
      <category>ipoe</category>
      <category>containers</category>
      <pubDate>Mon, 30 Dec 2024 15:56:27 GMT</pubDate>
      <author>daniil@sentrium.io (Daniil Baturin)</author>
      <guid>https://blog.vyos.io/vyos-project-december-2024-update</guid>
      <dc:date>2024-12-30T15:56:27Z</dc:date>
    </item>
    <item>
      <title>VyOS 1.4.1 release</title>
      <link>https://blog.vyos.io/vyos-1.4.1-release</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.vyos.io/vyos-1.4.1-release" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.vyos.io/hubfs/vyos_blogpost_img_release_1.png" alt="VyOS 1.4.1 release" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Hello, Community!&lt;/p&gt; 
&lt;p&gt;VyOS 1.4.1 release is now available to customers and community members with contributor subscriptions. Its source code is available as a tarball upon request to everyone who legitimately received a binary image for us.&amp;nbsp; Fixes for CVE-2023-32728 (Zabbix agent SMART plugin RCE) and CVE-2024-6387 (regreSSHion) that were already available as hotfixes are integrated in the image, and there is a fix for a potential DoS in the HTTP API caused by a vulnerability in the python-multipart library (CVE-2024-53981). This release also includes multiple bug fixes and a few improvements, including support for Base64-encoded IPsec secrets, VXLAN VNI to VLAN range mappings, reject routes, and more — read on for details!&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.vyos.io/vyos-1.4.1-release" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.vyos.io/hubfs/vyos_blogpost_img_release_1.png" alt="VyOS 1.4.1 release" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Hello, Community!&lt;/p&gt; 
&lt;p&gt;VyOS 1.4.1 release is now available to customers and community members with contributor subscriptions. Its source code is available as a tarball upon request to everyone who legitimately received a binary image for us.&amp;nbsp; Fixes for CVE-2023-32728 (Zabbix agent SMART plugin RCE) and CVE-2024-6387 (regreSSHion) that were already available as hotfixes are integrated in the image, and there is a fix for a potential DoS in the HTTP API caused by a vulnerability in the python-multipart library (CVE-2024-53981). This release also includes multiple bug fixes and a few improvements, including support for Base64-encoded IPsec secrets, VXLAN VNI to VLAN range mappings, reject routes, and more — read on for details!&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4129050&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.vyos.io%2Fvyos-1.4.1-release&amp;amp;bu=https%253A%252F%252Fblog.vyos.io&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>ipsec</category>
      <category>qos</category>
      <category>release</category>
      <category>security</category>
      <category>1.4</category>
      <pubDate>Fri, 20 Dec 2024 16:55:59 GMT</pubDate>
      <author>daniil@sentrium.io (Daniil Baturin)</author>
      <guid>https://blog.vyos.io/vyos-1.4.1-release</guid>
      <dc:date>2024-12-20T16:55:59Z</dc:date>
    </item>
    <item>
      <title>Using the "policy route" and packet marking for custom QoS matches</title>
      <link>https://blog.vyos.io/using-the-policy-route-and-packet-marking-for-custom-qos-matches</link>
      <description>&lt;div class="posthaven-post-body"&gt; 
 &lt;p&gt;There is only that much you can do in a QoS rules to describe the traffic you want it to match. There's DCP, source/destination, and protocol, and that's enough to cover most of the use cases. Most, but not all. Fortunately, they can also match &lt;i&gt;packet marks &lt;/i&gt;and that's what enables creating custom matches.&lt;/p&gt; 
 &lt;p&gt;Packet marks are numeric values set by Netfilter rules that are local to the router and can be used as match criteria in other Netfilter rules and many other components of the Linux kernel (ip, tc, and so on).&lt;br&gt;&lt;/p&gt; 
 &lt;p&gt;Suppose you have a few phones in the office and you want to prioritize their VoIP traffic. You could create a QoS match for each of them, but it's quite some config duplication, which will only get worse when you add more phones. If you find a way to group those addresses in one match, wouldn't it be nice? Sadly, there's no such option in QoS. Firewall can use address groups though, so we can make the QoS rule match a packet mark (e.g. 100) and set that mark to traffic from the phones.&lt;br&gt;&lt;/p&gt; 
 &lt;pre&gt;# show traffic-policy&lt;br&gt;
 priority-queue VoIP {&lt;br&gt;
     class 7 {&lt;br&gt;
         match SIP {&lt;br&gt;
             mark 100&lt;br&gt;
         }&lt;br&gt;
         queue-type drop-tail&lt;br&gt;
     }&lt;br&gt;
     default {&lt;br&gt;
         queue-type fair-queue&lt;br&gt;
     }&lt;br&gt;
 }
&lt;/pre&gt; 
 &lt;p&gt;Now the confusing bit. Where do we set the mark? Around Vyatta 6.5, an unfortunate design decision was made: "firewall modify" was moved under overly narrow and not so obvious "policy route". Sadly we are stuck with it for the time being because it's not so easy to automatically convert the syntax for upgrades. But, its odd name notwithstanding, it still does the job.&lt;/p&gt; 
 &lt;p&gt;Let's create an address group and a "policy route" instance that sets the mark 100:&lt;/p&gt; 
 &lt;pre&gt;# show firewall group&lt;br&gt;
 address-group Phones {&lt;br&gt;
     address 10.4.5.10&lt;br&gt;
     address 10.4.5.11&lt;br&gt;
     address 10.4.5.12&lt;br&gt;
 }&lt;br&gt;
[edit]&lt;br&gt;
# show policy route&lt;br&gt;
 route VoIP {&lt;br&gt;
     rule 10 {&lt;br&gt;
         set {&lt;br&gt;
             mark 100&lt;br&gt;
         }&lt;br&gt;
         source {&lt;br&gt;
             group {&lt;br&gt;
                 address-group Phones&lt;br&gt;
             }&lt;br&gt;
         }&lt;br&gt;
     }&lt;br&gt;
 }
&lt;/pre&gt; 
 &lt;p&gt;Now we need to assign the QoS ruleset to our WAN and the "policy route" instance to our LAN interface:&lt;/p&gt; 
 &lt;pre&gt;set interfaces ethernet eth0 policy route VoIP&lt;br&gt;
set interfaces ethernet eth1 traffic-policy out VoIP
&lt;/pre&gt; 
 &lt;p&gt;You can as well take advantage of "policy route" ruleset options for time-based filtering or matching related connections. Besides, you can use it to set DSCP values in case your QoS setup is on a different router:&lt;/p&gt; 
 &lt;pre&gt;set policy route Foo rule 10 set dscp 46
&lt;/pre&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="posthaven-post-body"&gt; 
 &lt;p&gt;There is only that much you can do in a QoS rules to describe the traffic you want it to match. There's DCP, source/destination, and protocol, and that's enough to cover most of the use cases. Most, but not all. Fortunately, they can also match &lt;i&gt;packet marks &lt;/i&gt;and that's what enables creating custom matches.&lt;/p&gt; 
 &lt;p&gt;Packet marks are numeric values set by Netfilter rules that are local to the router and can be used as match criteria in other Netfilter rules and many other components of the Linux kernel (ip, tc, and so on).&lt;br&gt;&lt;/p&gt; 
 &lt;p&gt;Suppose you have a few phones in the office and you want to prioritize their VoIP traffic. You could create a QoS match for each of them, but it's quite some config duplication, which will only get worse when you add more phones. If you find a way to group those addresses in one match, wouldn't it be nice? Sadly, there's no such option in QoS. Firewall can use address groups though, so we can make the QoS rule match a packet mark (e.g. 100) and set that mark to traffic from the phones.&lt;br&gt;&lt;/p&gt; 
 &lt;pre&gt;# show traffic-policy&lt;br&gt;
 priority-queue VoIP {&lt;br&gt;
     class 7 {&lt;br&gt;
         match SIP {&lt;br&gt;
             mark 100&lt;br&gt;
         }&lt;br&gt;
         queue-type drop-tail&lt;br&gt;
     }&lt;br&gt;
     default {&lt;br&gt;
         queue-type fair-queue&lt;br&gt;
     }&lt;br&gt;
 }
&lt;/pre&gt; 
 &lt;p&gt;Now the confusing bit. Where do we set the mark? Around Vyatta 6.5, an unfortunate design decision was made: "firewall modify" was moved under overly narrow and not so obvious "policy route". Sadly we are stuck with it for the time being because it's not so easy to automatically convert the syntax for upgrades. But, its odd name notwithstanding, it still does the job.&lt;/p&gt; 
 &lt;p&gt;Let's create an address group and a "policy route" instance that sets the mark 100:&lt;/p&gt; 
 &lt;pre&gt;# show firewall group&lt;br&gt;
 address-group Phones {&lt;br&gt;
     address 10.4.5.10&lt;br&gt;
     address 10.4.5.11&lt;br&gt;
     address 10.4.5.12&lt;br&gt;
 }&lt;br&gt;
[edit]&lt;br&gt;
# show policy route&lt;br&gt;
 route VoIP {&lt;br&gt;
     rule 10 {&lt;br&gt;
         set {&lt;br&gt;
             mark 100&lt;br&gt;
         }&lt;br&gt;
         source {&lt;br&gt;
             group {&lt;br&gt;
                 address-group Phones&lt;br&gt;
             }&lt;br&gt;
         }&lt;br&gt;
     }&lt;br&gt;
 }
&lt;/pre&gt; 
 &lt;p&gt;Now we need to assign the QoS ruleset to our WAN and the "policy route" instance to our LAN interface:&lt;/p&gt; 
 &lt;pre&gt;set interfaces ethernet eth0 policy route VoIP&lt;br&gt;
set interfaces ethernet eth1 traffic-policy out VoIP
&lt;/pre&gt; 
 &lt;p&gt;You can as well take advantage of "policy route" ruleset options for time-based filtering or matching related connections. Besides, you can use it to set DSCP values in case your QoS setup is on a different router:&lt;/p&gt; 
 &lt;pre&gt;set policy route Foo rule 10 set dscp 46
&lt;/pre&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4129050&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.vyos.io%2Fusing-the-policy-route-and-packet-marking-for-custom-qos-matches&amp;amp;bu=https%253A%252F%252Fblog.vyos.io&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>firewall</category>
      <category>qos</category>
      <category>Uncategorized</category>
      <pubDate>Fri, 02 Mar 2018 03:14:44 GMT</pubDate>
      <author>daniil@sentrium.io (Daniil Baturin)</author>
      <guid>https://blog.vyos.io/using-the-policy-route-and-packet-marking-for-custom-qos-matches</guid>
      <dc:date>2018-03-02T03:14:44Z</dc:date>
    </item>
  </channel>
</rss>
