diff --git a/.github/workflows/build_rns.yml b/.github/workflows/build_rns.yml index 151004fc16..e47cc43850 100644 --- a/.github/workflows/build_rns.yml +++ b/.github/workflows/build_rns.yml @@ -3,7 +3,7 @@ name: 'Release Note Publisher' on: push: branches: - - rn-stage + - stage jobs: release-notes: diff --git a/build_trigger.txt b/build_trigger.txt index 2567e86464..a132f34023 100644 --- a/build_trigger.txt +++ b/build_trigger.txt @@ -1 +1 @@ -build.. +build... diff --git a/content/cumulus-linux-37/Layer-2/Multi-Chassis-Link-Aggregation-MLAG.md b/content/cumulus-linux-37/Layer-2/Multi-Chassis-Link-Aggregation-MLAG.md index c5083b59be..a8524e7531 100644 --- a/content/cumulus-linux-37/Layer-2/Multi-Chassis-Link-Aggregation-MLAG.md +++ b/content/cumulus-linux-37/Layer-2/Multi-Chassis-Link-Aggregation-MLAG.md @@ -1008,7 +1008,7 @@ Peer priority and id: 32768 44:38:39:00:00:12; Peer role: secondary ``` {{%notice note%}} -The MLAG healthCheck module listens on UDP port 5342. If you have not configured a backup VRF, the module listens on all VRFs, which is normal UDP socket behaviour. Make sure to configure a backup link and backup VRF so that the MLAG healtcheck module only listens on the backup VRF. +The MLAG healthCheck module listens on UDP port 5342. If you have not configured a backup VRF, the module listens on all VRFs, which is normal UDP socket behavior. Make sure to configure a backup link and backup VRF so that the MLAG healthcheck module only listens on the backup VRF. {{%/notice%}} **Comparing VRF and Management VRF Configurations** diff --git a/content/cumulus-linux-37/Layer-2/Spanning-Tree-and-Rapid-Spanning-Tree.md b/content/cumulus-linux-37/Layer-2/Spanning-Tree-and-Rapid-Spanning-Tree.md index 99687c7fcd..b09004fef8 100644 --- a/content/cumulus-linux-37/Layer-2/Spanning-Tree-and-Rapid-Spanning-Tree.md +++ b/content/cumulus-linux-37/Layer-2/Spanning-Tree-and-Rapid-Spanning-Tree.md @@ -48,7 +48,7 @@ RSTP works with MST seamlessly, creating a single instance of spanning tree that RSTP treats the MST domain as one giant switch, whereas MST treats the RSTP domain as a different region. To enable proper communication between the regions, MST creates a Common Spanning Tree (CST) that connects all the boundary switches and forms the overall view of the MST domain. Because changes in the CST need to be reflected in all regions, the RSTP tree is included in the CST to ensure that changes on the RSTP domain are reflected in the CST domain. This does cause topology changes on the RSTP domain to impact the rest of the network but keeps the MST domain informed of every change occurring in the RSTP domain, ensuring a loop-free network. -Configure the root bridge within the MST domain by changing the priority on the relevant MST switch. When MST detects an RSTP link, it falls back into RSTP mode. The MST domain choses the switch with the lowest cost to the CST root bridge as the CIST root bridge. +Configure the root bridge within the MST domain by changing the priority on the relevant MST switch. When MST detects an RSTP link, it falls back into RSTP mode. The MST domain chooses the switch with the lowest cost to the CST root bridge as the CIST root bridge. ### RSTP with MLAG diff --git a/content/cumulus-linux-37/Layer-3/Policy-based-Routing.md b/content/cumulus-linux-37/Layer-3/Policy-based-Routing.md index 8da3430e3d..74ac21ef0a 100644 --- a/content/cumulus-linux-37/Layer-3/Policy-based-Routing.md +++ b/content/cumulus-linux-37/Layer-3/Policy-based-Routing.md @@ -33,7 +33,7 @@ A PBR policy contains one or more policy maps. Each policy map: - A set rule determines the PBR nexthop for the policy. The set rule can contain a single nexthop IP address or it can contain a nexthop group. A nexthop group has more than one nexthop IP address so that you can use multiple interfaces to forward traffic. To use ECMP, you configure a nexthop group. -To use PBR in Cumulus linux, you define a PBR policy and apply it to the ingress interface (the interface must already have an IP address assigned). Traffic is matched against the match rules in sequential order and forwarded according to the set rule in the first match. Traffic that does not match any rule is passed onto the normal destination based routing mechanism. +To use PBR in Cumulus Linux, you define a PBR policy and apply it to the ingress interface (the interface must already have an IP address assigned). Traffic is matched against the match rules in sequential order and forwarded according to the set rule in the first match. Traffic that does not match any rule is passed onto the normal destination based routing mechanism. {{%notice note%}} diff --git a/content/cumulus-linux-37/Monitoring-and-Troubleshooting/FRRouting-Log-Message-Reference.md b/content/cumulus-linux-37/Monitoring-and-Troubleshooting/FRRouting-Log-Message-Reference.md index 2c014a67af..3f32e07d39 100644 --- a/content/cumulus-linux-37/Monitoring-and-Troubleshooting/FRRouting-Log-Message-Reference.md +++ b/content/cumulus-linux-37/Monitoring-and-Troubleshooting/FRRouting-Log-Message-Reference.md @@ -14,13 +14,13 @@ by FRRouting. These messages appear in `/var/log/frr/frr.log`. | Babel | HIGH | 16777218 | BABEL Packet Error | Babel has detected a packet encode/decode problem. | Collect the relevant log files and report the issue for troubleshooting. | | Babel | HIGH | 16777219 | BABEL Configuration Error | Babel has detected a configuration error of some sort. | Ensure that the configuration is correct. | | Babel | HIGH | 16777220 | BABEL Route Error | Babel has detected a routing error and is in an inconsistent state. | Gather data to report the issue for troubleshooting. Restart FRR. | -| BGP | HIGH | 33554433 | BGP attribute flag is incorrect | BGP attribute flag is set to the wrong value (Optional/Transitive/Partial). | Determine the soure of the attribute and determine why the attribute flag has been set incorrectly. | -| BGP | HIGH | 33554434 | BGP attribute length is incorrect | BGP attribute length is incorrect. | Determine the soure of the attribute and determine why the attribute length has been set incorrectly. | -| BGP | HIGH | 33554435 | BGP attribute origin value invalid | BGP attribute origin value is invalid. | Determine the soure of the attribute and determine why the origin attribute has been set incorrectly. | -| BGP | HIGH | 33554436 | BGP as path is invalid | BGP AS path has been malformed. | Determine the soure of the update and determine why the AS path has been set incorrectly. | -| BGP | HIGH | 33554437 | BGP as path first as is invalid | BGP update has invalid first AS in AS path. | Determine the soure of the update and determine why the AS path first AS value has been set incorrectly. | -| BGP | HIGH | 33554439 | BGP PMSI tunnel attribute type is invalid | BGP update has invalid type for PMSI tunnel. | Determine the soure of the update and determine why the PMSI tunnel attribute type has been set incorrectly. | -| BGP | HIGH | 33554440 | BGP PMSI tunnel attribute length is invalid | BGP update has invalid length for PMSI tunnel. | Determine the soure of the update and determine why the PMSI tunnel attribute length has been set incorrectly. | +| BGP | HIGH | 33554433 | BGP attribute flag is incorrect | BGP attribute flag is set to the wrong value (Optional/Transitive/Partial). | Determine the source of the attribute and determine why the attribute flag has been set incorrectly. | +| BGP | HIGH | 33554434 | BGP attribute length is incorrect | BGP attribute length is incorrect. | Determine the source of the attribute and determine why the attribute length has been set incorrectly. | +| BGP | HIGH | 33554435 | BGP attribute origin value invalid | BGP attribute origin value is invalid. | Determine the source of the attribute and determine why the origin attribute has been set incorrectly. | +| BGP | HIGH | 33554436 | BGP as path is invalid | BGP AS path has been malformed. | Determine the source of the update and determine why the AS path has been set incorrectly. | +| BGP | HIGH | 33554437 | BGP as path first as is invalid | BGP update has invalid first AS in AS path. | Determine the source of the update and determine why the AS path first AS value has been set incorrectly. | +| BGP | HIGH | 33554439 | BGP PMSI tunnel attribute type is invalid | BGP update has invalid type for PMSI tunnel. | Determine the source of the update and determine why the PMSI tunnel attribute type has been set incorrectly. | +| BGP | HIGH | 33554440 | BGP PMSI tunnel attribute length is invalid | BGP update has invalid length for PMSI tunnel. | Determine the source of the update and determine why the PMSI tunnel attribute length has been set incorrectly. | | BGP | HIGH | 33554442 | BGP peergroup operated on in error | BGP operating on peer-group instead of peers included. | Ensure the configuration doesn't contain peer-groups contained within peer-groups. | | BGP | HIGH | 33554443 | BGP failed to delete peer structure | BGP was unable to delete the peer structure when the address-family was removed. | Determine if all expected peers are removed and restart FRR if not. This is most likely a bug. | | BGP | HIGH | 33554444 | BGP failed to get table chunk memory | BGP unable to get chunk memory for table manager. | Ensure there is adequate memory on the device to support the table requirements. | @@ -39,8 +39,8 @@ by FRRouting. These messages appear in `/var/log/frr/frr.log`. | BGP | HIGH | 33554457 | BGP error receiving keepalive packet | BGP unable to process a keepalive packet. | BGP keepalive received while in a stopped state. If the problem persists, report it for troubleshooting. | | BGP | HIGH | 33554458 | BGP error receiving route refresh message | BGP unable to process route refresh message. | BGP route refresh received while in a stopped state. If the problem persists, report it for troubleshooting. | | BGP | HIGH | 33554459 | BGP error capability message | BGP unable to process received capability. | BGP capability message received while in a stopped state. If the problem persists, report it for troubleshooting. | -| BGP | HIGH | 33554460 | BGP error with nexthopo update | BGP unable to process nexthop update. | BGP received the nexthop update but the nexthop is not reachable in this BGP instance. Report the problem for troubleshooting. | -| BGP | HIGH | 33554461 | Failure to apply label | BGP attempted to attempted to apply a label but could not do so. | This is most likely a bug. If the problem persists, report it for troubleshooting. | +| BGP | HIGH | 33554460 | BGP error with nexthop update | BGP unable to process nexthop update. | BGP received the nexthop update but the nexthop is not reachable in this BGP instance. Report the problem for troubleshooting. | +| BGP | HIGH | 33554461 | Failure to apply label | BGP attempted to apply a label but could not do so. | This is most likely a bug. If the problem persists, report it for troubleshooting. | | BGP | HIGH | 33554462 | Multipath specified is invalid | BGP was started with an invalid ECMP/multipath value. | Correct the ECMP/multipath value supplied when starting the BGP daemon. | | BGP | HIGH | 33554463 | Failure to process a packet | BGP attempted to process a received packet but could not do so. | This is most likely a bug. If the problem persists, report it for troubleshooting. | | BGP | HIGH | 33554464 | Failure to connect to peer | BGP attempted to send open to a peer but couldn't connect. | This is most likely a bug. If the problem persists, report it for troubleshooting. | @@ -63,7 +63,7 @@ by FRRouting. These messages appear in `/var/log/frr/frr.log`. | EIGRP | HIGH | 50331650 | EIGRP Configuration Error | EIGRP has detected a configuration error. | Correct the configuration issue. If it still persists, report the issue for troubleshooting. | | General | HIGH | 100663297 | Failure to raise or lower privileges | FRR attempted to raise or lower its privileges and was unable to do so. | Ensure that you are running FRR as the frr user and that the user has sufficient privileges to properly access root privileges. | | General | HIGH | 100663298 | VRF Failure on Start | Upon startup, FRR failed to properly initialize and start up the VRF subsystem. | Ensure that there is sufficient memory to start processes, then restart FRR. | -| General | HIGH | 100663299 | Socket Error | When attempting to access a socket, a system error occured and FRR was unable to properly complete the request. | Ensure that there are sufficient system resources available and ensure that the frr user has sufficient permisions to work. | +| General | HIGH | 100663299 | Socket Error | When attempting to access a socket, a system error occurred and FRR was unable to properly complete the request. | Ensure that there are sufficient system resources available and ensure that the frr user has sufficient permissions to work. | | General | HIGH | 100663303 | System Call Error | FRR has detected an error from using a vital system call and has probably already exited. | Ensure permissions are correct for FRR users and groups. Additionally, check that sufficient system resources are available. | | General | HIGH | 100663304 | VTY Subsystem Error | FRR has detected a problem with the specified configuration file. | Ensure the configuration file exists and has the correct permissions for operations. Additionally, ensure that all config lines are correct as well. | | General | HIGH | 100663305 | SNMP Subsystem Error | FRR has detected a problem with the SNMP library it uses. A callback from this subsystem has indicated some error. | Examine the callback message and ensure SNMP is properly set up and working. | @@ -87,7 +87,7 @@ by FRRouting. These messages appear in `/var/log/frr/frr.log`. | OSPF | HIGH | 134217729 | Failure to process a packet | OSPF attempted to process a received packet but could not do so. | This is most likely a bug. If the problem persists, report it for troubleshooting. | | OSPF | HIGH | 134217730 | Failure to process Router LSA | OSPF attempted to process a router LSA, but there was an advertising ID mismtach with the link ID. | Check the OSPF network configuration for any configuration issue. If the problem persists, report it for troubleshooting. | | OSPF | HIGH | 134217731 | OSPF Domain Corruption | OSPF attempted to process a router LSA, but there was an advertising ID mismtach with the link ID. | Check OSPF network database for a corrupted LSA. If the problem persists, shut down the OSPF domain and report the problem for troubleshooting. | -| OSPF | HIGH | 134217732 | OSPF Initialization failure | OSPF failed to initialized the OSPF default instance. | Ensure there is adequate memory on the device. If the problem persists, report it for troubleshooting. | +| OSPF | HIGH | 134217732 | OSPF Initialization failure | OSPF failed to initialize the OSPF default instance. | Ensure there is adequate memory on the device. If the problem persists, report it for troubleshooting. | | OSPF | HIGH | 134217733 | OSPF SR Invalid DB | OSPF segment routing database is invalid. | This is most likely a bug. If the problem persists, report it for troubleshooting. | | OSPF | HIGH | 134217734 | OSPF SR hash node creation failed | OSPF segment routing node creation failed. | This is most likely a bug. If the problem persists, report it for troubleshooting. | | OSPF | HIGH | 134217735 | OSPF SR Invalid lsa id | OSPF segment routing invalid LSA ID. | Restart the OSPF instance. If the problem persists, report it for troubleshooting. | diff --git a/content/cumulus-linux-37/Monitoring-and-Troubleshooting/Simple-Network-Management-Protocol-SNMP/_index.md b/content/cumulus-linux-37/Monitoring-and-Troubleshooting/Simple-Network-Management-Protocol-SNMP/_index.md index cae743ada8..dac9edcf63 100644 --- a/content/cumulus-linux-37/Monitoring-and-Troubleshooting/Simple-Network-Management-Protocol-SNMP/_index.md +++ b/content/cumulus-linux-37/Monitoring-and-Troubleshooting/Simple-Network-Management-Protocol-SNMP/_index.md @@ -1080,7 +1080,7 @@ way: OPTIONS - There are various options to control the behaviour of the monitored expression. These include: + There are various options to control the behavior of the monitored expression. These include: -D indicates that the expression should be evaluated using delta differences between sample values (rather than the values themselves). -d OID or -di OID @@ -1109,7 +1109,7 @@ way: -S indicates that the monitor expression should not be evaluated when the agent first starts up. The first evaluation will be done once the first repeat interval has expired. -s indicates that the monitor expression should be evaluated when the agent first starts up. - This is the default behaviour. + This is the default behavior. Note: Notifications triggered by this initial evaluation will be sent before the coldStart trap. -u SECNAME specifies a security name to use for scanning the local host, instead of the default diff --git a/content/cumulus-linux-37/Whats-New/rn.md b/content/cumulus-linux-37/Whats-New/rn.md index 14f80e1b5c..bc42649770 100644 --- a/content/cumulus-linux-37/Whats-New/rn.md +++ b/content/cumulus-linux-37/Whats-New/rn.md @@ -14,8 +14,8 @@ pdfhidden: True | Issue ID | Description | Affects | Fixed | |--- |--- |--- |--- | -| [3418046](#3418046)
None | If MLAG is configured but disconnected from an MLAG peer for an extended period of time (days or more), there is a long delay (up to a minute per day) before traffic forwarding stabilizes after the MLAG peer connection re-establishes. | 3.7.0-5.4.0 | 5.5.0-5.6.0| -| [3376798](#3376798)
| On Broadcom switches, Cumulus Linux does not create the hardware bridging domain for a traditional bridge with a VXLAN interface during switchd restart. The /var/log/switchd.log file includes the following exception logs shortly after switchd restarts:
switchd[30158]: hal_bcm_l3.c:1617 find_egr_path_if_vxlan_overlay:vxlan overlay : nh PORT: port <#>, vlan . not yet ready
MAC learning looks correct, but traffic does not flow as expected. | 3.7.0-3.7.16, 4.3.1-4.4.5 | | +| [3418046](#3418046)
None | If MLAG is configured but disconnected from an MLAG peer for an extended period of time (days or more), there is a long delay (up to a minute per day) before traffic forwarding stabilizes after the MLAG peer connection re-establishes. | 3.7.0-4.3.1 | 4.3.2-4.4.5, 5.5.0-5.6.0| +| [3376798](#3376798)
| On Broadcom switches, Cumulus Linux does not create the hardware bridging domain for a traditional bridge with a VXLAN interface during switchd restart. The /var/log/switchd.log file includes the following exception logs shortly after switchd restarts:
switchd[30158]: hal_bcm_l3.c:1617 find_egr_path_if_vxlan_overlay:vxlan overlay : nh PORT: port <#>, vlan . not yet ready
MAC learning looks correct, but traffic does not flow as expected. | 3.7.0-4.3.1 | 4.3.2-4.4.5| | [3330705](#3330705)
| When using TACACS+, a TACACS+ server name that returns more than one IP address, such as an IPv6 and IPv4 address, is counted many times against the limit of seven TACACS+ servers, which might cause some of the later listed servers to be ignored as over the limit. To work around this issue, you can set the prefer_ip_version configuration option (the default value is 4) to choose between an IPv4 or IPv6 address if both are present. | 3.7.0-5.3.1 | 5.4.0-5.6.0| | [3327477](#3327477)
| If you use su to change to a user specified through TACACS+, the user becomes the local tacacs0 thru tacacs15 user instead of the named user to run sudo commands. As a result, the named user password might not match the local tacacs0 thru tacacs15 user password. | 3.7.0-3.7.16, 4.0.0-4.4.5, 5.0.0-5.6.0 | | | [3216922](#3216922)
None | RADIUS authenticated users with read-only access to NCLU commands (users in the users_with_show list) can run edit commands if a username for a non-local account is on the users_with_edit line of the /etc/netd.conf file. To work around this issue, make sure that all usernames on the users_with_edit line of the /etc/netd.conf file are configured local users for the system (real Linux users). | 3.7.0-5.2.1 | 5.3.0-5.6.0| @@ -67,7 +67,7 @@ pdfhidden: True | [2656291](#2656291)
| The following CVEs affect the linux kernel package:
CVE-2019-14821 CVE-2019-14835 CVE-2019-15117 CVE-2019-15118 CVE-2019-15902
Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information
leaks.
For the detailed security status of linux, refer to its security tracker page at:
https://security-tracker.debian.org/tracker/linux | 3.7.12-3.7.16 | 4.0.0-4.4.5| | [2653400](#2653400)
None | When 802.1x MAB and a parking VLAN are configured on an interface, hostapd might install a static fdb entry if the interface is down. To work around this issue, delete 802.1x from the interface with the net del interface dot1x command, then add back the 802.1x configuration. | 3.7.10-3.7.16 | | | [2652003](#2652003)
| When 802.1x MAB and a parking VLAN are configured on an interface, hostapd might install a static FDB entry if the interface is down. To work around this issue, delete 802.1x from the interface with the net del interface dot1x command, then add back the 802.1x configuration. | 3.7.10-4.3.0 | 4.3.1-4.4.5| -| [2648658](#2648658)
| If you try to use more than one percent of max-ecmp-nexthops, you get an error indicating a failure. | 3.7.15-4.3.1 | 4.4.0-4.4.5| +| [2648658](#2648658)
| If you try to use more than one percent of max-ecmp-nexthops, you get an error indicating a failure. | 3.7.15-4.3.2 | 4.4.0-4.4.5| | [2638137](#2638137)
| When you delete a static route using NCLU, the configuration is not deleted from the running configuration or from the /etc/frr/frr.conf file. | 3.7.13-3.7.16 | | | [2633245](#2633245)
| On the Dell N3048EP-ON switch, the SPF+ ports remain down after a power cycle. | 3.7.10-3.7.16 | | | [2607965](#2607965)
| On the EdgeCore AS7726 switch, when you run the NCLU net show system command, you see the error Command not found. | 3.7.14.2-3.7.16 | | @@ -75,7 +75,7 @@ pdfhidden: True | [2556037](#2556037)
CM-33012 | After you add an interface to the bridge, an OSPF session flap might occur
| 3.7.9-4.2.0 | 4.2.1-4.4.5| | [2555908](#2555908)
CM-32940 | If the you add the MLAG backup IP address to the MLAG peer in the secondary role while the peer link is down, the LACP sys-mac does not use the MLAG system MAC address (clagd-sys-mac) when the peer link comes back up
To work around this issue, wait until the peer link is up to add the MLAG backup IP address. To recover from this condition, restart clagd with the sudo systemctl restart clagd command. | 3.7.12-4.0.1 | 4.1.0-4.4.5| | [2555528](#2555528)
CM-32750 | In an EVPN Active/Active configuration, when one of the peers reboots and begins to refresh IP neighbor entries shared by the MLAG peer, some of these ARP messages might be dropped by the MLAG peer's ARP policer.
To work around this issue, increase the burst value of the ARP policers to 200 or higher. | 3.7.14-4.2.1 | 4.3.0-4.4.5| -| [2555175](#2555175)
CM-32528 | Control Plane Traffic (example - BGP peering from Leaf to Spine) goes down on Leaf due to Hold Down Timer Expiration of peer following prolonged link flaps on downlinks when vxlan enabled vlans are carried on the flapping link. | 3.7.15-3.7.16, 4.2.1-4.4.5 | | +| [2555175](#2555175)
CM-32528 | Control plane traffic (such as BGP peering from leaf to spine) goes down on the leaf due to the peer Hold Down timer expiration following prolonged link flaps on down links when VXLAN enabled VLANs are carried on the flapping link. Be sure to correct layer 1 issues, configuration issues, or misbehaving link partners that are causing the link flaps. | 3.7.15-4.3.1 | 4.3.2-4.4.5| | [2554785](#2554785)
CM-32275 | After you reboot a Broadcom switch, switchd might fail to restart and you see logs in switchd.log similar to the following:
Nov 12 12:20:05.063876 leaf01 switchd[9867]:Nov 12 12:20:05.064310 leaf01 switchd[9867]: hal_bcm_console.c:294 0:system_init:Nov 12 12:20:05.064428 leaf01 switchd[9867]: hal_bcm_console.c:294 system_init: Misc init failed: Operation timed outNov 12 12:20:05.064464 leaf01 switchd[9867]:Nov 12 12:20:05.091995 leaf01 switchd[9867]: hal_bcm_console.c:294 LED: Loading 256 bytes into LED program memoryNov 12 12:20:05.092029 leaf01 switchd[9867]:Nov 12 12:20:05.099547 leaf01 switchd[9867]: hal_bcm_console.c:294 PORT: Error: bcm ports not initializedNov 12 12:20:05.099579 leaf01 switchd[9867]:Nov 12 12:20:05.099646 leaf01 switchd[9867]: hal_bcm_console.c:294 Error: file /var/lib/cumulus/rc.datapath_0: line 81 (error code -1): script terminatedNov 12 12:20:05.099667 leaf01 switchd[9867]:Nov 12 12:20:05.099775 leaf01 switchd[9867]: hal_bcm_console.c:294 Error: file /etc/bcm.d/rc.soc: line 70 (error code -1): script terminatedNov 12 12:20:05.099798 leaf01 switchd[9867]:Nov 12 12:20:05.099871 leaf01 switchd[9867]: hal_bcm_console.c:294 ERROR loading rc script on unit 0Nov 12 12:20:05.099892 leaf01 switchd[9867]:Nov 12 12:20:05.099943 leaf01 switchd[9867]: hal_bcm_console.c:299 CRIT loading of rc script failed, aborting!
To work around this issue, configure Cumulus Linux to boot with the ntel_iommu=off kernel command option:1. Open the /etc/default/grub file with a text editor
2. Edit the GRUB_CMDLINE_LINUX variable by adding the string intel_iommu=off at the end. For example: GRUB_CMDLINE_LINUX="cl_platform=cel_e1031 console=ttyS1,115200n8 intel_iommu=off"3. Run the update-grub command
4. Reboot the switch. | 3.7.11-4.2.1 | 4.3.0-4.4.5| | [2554709](#2554709)
CM-32217 | The IP address specified in the ip pim use-source command configured on the loopback interface should be inherited by unnumbered interfaces during their Primary IP address selection process. If ip pim use-source is configured on the loopback after an unnumbered interface has already selected their Primary IP address, the unnumbered interface does not update its Primary IP address to be the new use-source value until after there is a netlink update for that interface.
To work around this issue, configure ip pim use-source on each unnumbered interface directly or ensure ip pim use-source is applied to the loopback before other unnumbered interfaces are enabled for PIM. | 3.7.13-3.7.16, 4.2.1-4.4.5 | | | [2554588](#2554588)
CM-32149 | If you try to reconfigure a DHCP server after you delete the switch configuration with the net del all command, the dhcpd service fails because a duplicate process is running
To work around this issue, edit the /usr/lib/python2.7/dist-packages/nclu/plugins/dhcp.py file to change:
DHCPD_PID="-pf {0}" 
to:
DHCPD_PID="-pf {1}"
| 3.7.13-4.2.1 | 4.3.0-4.4.5| @@ -115,7 +115,7 @@ pdfhidden: True | [2549782](#2549782)
CM-29519 | The JSON format output of the net show bgp l2vpn evpn summary command shows the incorrect neighbour state. | 3.7.12-3.7.16, 4.0.0-4.4.5 | | | [2549731](#2549731)
CM-29492 | When you create SPAN or ERSPAN rules in ebtables, the action fails to install if it is not in lowercase. Make sure that the SPAN or ERSPAN action is all lowercase; for example:

[ebtables]
-A FORWARD --in-interface swp10 -j span --dport swp1
| 3.7.12-3.7.16, 4.1.1-4.4.5 | | | [2549472](#2549472)
CM-29367 | On switches with the Trident3 ASIC, PFC is not working as expected. If you set the PFC for only one CoS, pause frames are sent for all CoS traffic. | 3.7.11-4.1.1 | 4.2.0-4.4.5| -| [2549371](#2549371)
CM-29309 | When Optimized Multicast Flooding (OMF) is enabled with the bridge.optimized_mcast_flood = TRUE setting in the /etc/cumulus/switchd.conf file, the switch continues to flood IPv6 multicast traffic to all slave ports when there is no MLD join receive. | 3.7.11-4.3.1 | 4.4.0-4.4.5| +| [2549371](#2549371)
CM-29309 | When Optimized Multicast Flooding (OMF) is enabled with the bridge.optimized_mcast_flood = TRUE setting in the /etc/cumulus/switchd.conf file, the switch continues to flood IPv6 multicast traffic to all slave ports when there is no MLD join receive. | 3.7.11-4.3.2 | 4.4.0-4.4.5| | [2549307](#2549307)
| The following vulnerabilities affect git, which is available in the repository for optional installation:
CVE-2020-5260: Felix Wilhelm of Google Project Zero discovered a flaw in git, a fast, scalable, distributed revision control system. With a crafted URL that contains a newline, the credential helper machinery can be fooled to return credential information for a wrong host.
CVE-2020-11008: Carlo Arenas discovered a flaw in git, a fast, scalable, distributed revision control system. With a crafted URL that contains a newline or empty host, or lacks a scheme, the credential helper machinery can be fooled into providing credential information that is not appropriate for the protocol in use and host being contacted. | 3.7.12-4.1.1 | 4.2.0-4.4.5| | [2548962](#2548962)
CM-29165 | With FRR or OSPF, you might see an inconsistent link-state advertisement. For example, when you configure the OSPF default originate route as metric-type 1 with a specific metric, Cumulus Linux shows the default originate route as an external metric-type 2 route with the default metric in the database. This issue typically occurs when both IPv4 and IPv6 default routes exist in the routing table. | 3.7.12-4.1.1 | 4.2.0-4.4.5| | [2548930](#2548930)
CM-29148 | On Mellanox Spectrum switches that contain an OSPF IP unnumbered neighborship with a high scale of prefixes being learned, a link flap might cause the neighbor entry to not be programmed in hardware. | 3.7.11-4.2.1 | 4.3.0-4.4.5| @@ -308,7 +308,7 @@ pdfhidden: True | [2699464](#2699464)
| In a VXLAN fabric with ToR switches configured in a MLAG pair, BUM traffic received on a VXLAN tunnel is decapsulated and forwarded on the peer link bond. The BUM traffic is then encapsulated by the peer switch and sent back to the fabric. The issue has been seen in environments where the following conditions exist at the same time:1) high VNI scale2) switchd is busy processing updates3) clagd is in a transition state, such as Up, then Down, then Up. For example, when clagd restarts, the switch reboots, and so on
The problem is seen on the switch that experiences the clagd state transition. | 3.7.12-3.7.15 | | | [2690100](#2690100)
| When you run the vtysh show ip bgp vrf statistics command, the bgpd service crashes if you use vrf all. For example:
spine01# show ip bgp vrf all statistics vtysh: error reading from bgpd: Success (0)Warning: closing connection to bgpd because of an I/O error!
To workaround this issue, run the command against each VRF independently. | 3.7.15, 4.0.0-4.3.0 | | | [2684404](#2684404)
| CVE-2017-20005: NGINX has a buffer overflow for years that exceed four digits, as demonstrated by a file with a modification date in 1969 that causes an integer overflow (or a false modification date far in the future), when encountered by the autoindex module
Vulnerable: <= 1.6.2-5+deb8u8Fixed: 1.6.2-5+deb8u9 | 3.7.0-3.7.15 | | -| [2679950](#2679950)
| CVE-2021-25217: parsing of stored leases by dhclient or dhcpd has an incorrect length check that may cause a crash
Vulnerable: <= 4.3.1-6-cl3.7.14u1Fixed: 4.3.1-6-cl3.7.16u1 | 3.7.0-3.7.15, 4.0.0-4.3.1 | | +| [2679950](#2679950)
| CVE-2021-25217: parsing of stored leases by dhclient or dhcpd has an incorrect length check that may cause a crash
Vulnerable: <= 4.3.1-6-cl3.7.14u1Fixed: 4.3.1-6-cl3.7.16u1 | 3.7.0-3.7.15, 4.0.0-4.3.2 | | | [2677063](#2677063)
| CVE-2021-3541: "Parameter Laughs" attack related to parameter entities expansion
Vulnerable: <= 2.9.1+dfsg1-5+deb8u10Fixed: 2.9.1+dfsg1-5+deb8u11 | 3.7.0-3.7.15 | | | [2677061](#2677061)
| CVE-2021-23017: off-by-one in Nginx, a high-performance web and reverse proxy server, which could result in denial of service and potentially the execution of arbitrary code
Vulnerable: <= 1.6.2-5+deb8u7Fixed: 1.6.2-5+deb8u8 | 3.7.0-3.7.15 | | | [2677060](#2677060)
| CVE-2021-23336: Python2.7 is vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter
Vulnerable: <= 2.7.9-2-ds1-1+deb8u6Fixed: 2.7.9-2-ds1-1+deb8u7 | 3.7.0-3.7.15 | | @@ -332,8 +332,8 @@ pdfhidden: True | Issue ID | Description | Affects | Fixed | |--- |--- |--- |--- | -| [3418046](#3418046)
None | If MLAG is configured but disconnected from an MLAG peer for an extended period of time (days or more), there is a long delay (up to a minute per day) before traffic forwarding stabilizes after the MLAG peer connection re-establishes. | 3.7.0-5.4.0 | 5.5.0-5.6.0| -| [3376798](#3376798)
| On Broadcom switches, Cumulus Linux does not create the hardware bridging domain for a traditional bridge with a VXLAN interface during switchd restart. The /var/log/switchd.log file includes the following exception logs shortly after switchd restarts:
switchd[30158]: hal_bcm_l3.c:1617 find_egr_path_if_vxlan_overlay:vxlan overlay : nh PORT: port <#>, vlan . not yet ready
MAC learning looks correct, but traffic does not flow as expected. | 3.7.0-3.7.16, 4.3.1-4.4.5 | | +| [3418046](#3418046)
None | If MLAG is configured but disconnected from an MLAG peer for an extended period of time (days or more), there is a long delay (up to a minute per day) before traffic forwarding stabilizes after the MLAG peer connection re-establishes. | 3.7.0-4.3.1 | 4.3.2-4.4.5, 5.5.0-5.6.0| +| [3376798](#3376798)
| On Broadcom switches, Cumulus Linux does not create the hardware bridging domain for a traditional bridge with a VXLAN interface during switchd restart. The /var/log/switchd.log file includes the following exception logs shortly after switchd restarts:
switchd[30158]: hal_bcm_l3.c:1617 find_egr_path_if_vxlan_overlay:vxlan overlay : nh PORT: port <#>, vlan . not yet ready
MAC learning looks correct, but traffic does not flow as expected. | 3.7.0-4.3.1 | 4.3.2-4.4.5| | [3330705](#3330705)
| When using TACACS+, a TACACS+ server name that returns more than one IP address, such as an IPv6 and IPv4 address, is counted many times against the limit of seven TACACS+ servers, which might cause some of the later listed servers to be ignored as over the limit. To work around this issue, you can set the prefer_ip_version configuration option (the default value is 4) to choose between an IPv4 or IPv6 address if both are present. | 3.7.0-5.3.1 | 5.4.0-5.6.0| | [3327477](#3327477)
| If you use su to change to a user specified through TACACS+, the user becomes the local tacacs0 thru tacacs15 user instead of the named user to run sudo commands. As a result, the named user password might not match the local tacacs0 thru tacacs15 user password. | 3.7.0-3.7.16, 4.0.0-4.4.5, 5.0.0-5.6.0 | | | [3216922](#3216922)
None | RADIUS authenticated users with read-only access to NCLU commands (users in the users_with_show list) can run edit commands if a username for a non-local account is on the users_with_edit line of the /etc/netd.conf file. To work around this issue, make sure that all usernames on the users_with_edit line of the /etc/netd.conf file are configured local users for the system (real Linux users). | 3.7.0-5.2.1 | 5.3.0-5.6.0| @@ -448,7 +448,7 @@ pdfhidden: True | [2687332](#2687332)
| When you configure BGP aggregate-address summary-only and any component route within the summary updates, all component routes within the summary update in the RIB on the device advertising the summary. This condition might result in increased CPU usage
To workaround this issue, remove the aggregate-address summary-only configuration, add a static route to Null0 for the prefix, and configure an outbound route map to restrict anything more specific than the desired prefix from being advertised. For example: Before:
address-family ipv4 unicast
aggregate-address 10.10.0.0/16 summary-only
redistribute connected
After:
ip route 10.10.0.0/16 Null0
!
address-family ipv4 unicast
redistribute connected route-map DENY-COMPONENTS
redistribute static
exit-address-family
ip prefix-list NO-COMPONENTS seq 5 permit 10.10.0.0/16 ge 17
!
route-map DENY-COMPONENTS deny 10
match ip address prefix-list NO-COMPONENTS
!
route-map DENY-COMPONENTS permit 20
This example assumes no other static routes are present. Otherwise, you might need to configure additional route maps to limit the static routes being redistributed. | 3.7.12-4.2.1 | 4.3.0-4.4.5| | [2684452](#2684452)
| When a VTEP is rebooted, MAC address entries might become out of sync between the kernel fdb table and the EVPN MAC VNI table on remote VTEPs. The impacted MAC entries will be installed against the rebooted VTEP IP in the kernel fdb and the correct VTEP IP will be present in the EVPN MAC VNI table
You can work around this issue with the following steps:1. Clear all corrupted mac entries in the kernel FDB with the bridge fdb del
dev [dst\|via] command2. Add "vxlan-learning": "off" under /etc/network/ifupdown2/policy.d/vxlan.json
$ cat /etc/network/ifupdown2/policy.d/vxlan.json
{
"vxlan": {
"module_globals": { "vxlan-purge-remotes": "no" },
"defaults": {
"vxlan-ageing": "1800",
"vxlan-port": "4789", <==== This comma needs to be added at the end of this line
"vxlan-learning": "off" <= This line needs to be added
}
}
}
3. Reboot the affected switch(es) | 3.7.12-3.7.16 | | | [2684404](#2684404)
| CVE-2017-20005: NGINX has a buffer overflow for years that exceed four digits, as demonstrated by a file with a modification date in 1969 that causes an integer overflow (or a false modification date far in the future), when encountered by the autoindex module
Vulnerable: <= 1.6.2-5+deb8u8Fixed: 1.6.2-5+deb8u9 | 3.7.0-3.7.15 | 3.7.16| -| [2679950](#2679950)
| CVE-2021-25217: parsing of stored leases by dhclient or dhcpd has an incorrect length check that may cause a crash
Vulnerable: <= 4.3.1-6-cl3.7.14u1Fixed: 4.3.1-6-cl3.7.16u1 | 3.7.0-3.7.15, 4.0.0-4.3.1 | 3.7.16, 4.4.0-4.4.5| +| [2679950](#2679950)
| CVE-2021-25217: parsing of stored leases by dhclient or dhcpd has an incorrect length check that may cause a crash
Vulnerable: <= 4.3.1-6-cl3.7.14u1Fixed: 4.3.1-6-cl3.7.16u1 | 3.7.0-3.7.15, 4.0.0-4.3.2 | 3.7.16, 4.4.0-4.4.5| | [2677063](#2677063)
| CVE-2021-3541: "Parameter Laughs" attack related to parameter entities expansion
Vulnerable: <= 2.9.1+dfsg1-5+deb8u10Fixed: 2.9.1+dfsg1-5+deb8u11 | 3.7.0-3.7.15 | 3.7.16| | [2677061](#2677061)
| CVE-2021-23017: off-by-one in Nginx, a high-performance web and reverse proxy server, which could result in denial of service and potentially the execution of arbitrary code
Vulnerable: <= 1.6.2-5+deb8u7Fixed: 1.6.2-5+deb8u8 | 3.7.0-3.7.15 | 3.7.16| | [2677060](#2677060)
| CVE-2021-23336: Python2.7 is vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter
Vulnerable: <= 2.7.9-2-ds1-1+deb8u6Fixed: 2.7.9-2-ds1-1+deb8u7 | 3.7.0-3.7.15 | 3.7.16| @@ -464,7 +464,7 @@ pdfhidden: True | [2653521](#2653521)
| CVE-2018-25009 CVE-2018-25010 CVE-2018-25011 CVE-2018-25012 CVE-2018-25013 CVE-2018-25014 CVE-2020-36328 CVE-2020-36329 CVE-2020-36330 CVE-2020-36331: Several security vulnerabilities were discovered in libwebp, a lossy compression library for digital photographic images. Heap-based buffer overflows may lead to a denial-of-service or potentially the execution of arbitrary code
Vulnerable: 0.4.1-1.2Fixed: 0.4.1-1.2+deb8u1 | 3.7.0-3.7.15 | 3.7.16| | [2653400](#2653400)
None | When 802.1x MAB and a parking VLAN are configured on an interface, hostapd might install a static fdb entry if the interface is down. To work around this issue, delete 802.1x from the interface with the net del interface dot1x command, then add back the 802.1x configuration. | 3.7.10-3.7.16 | | | [2652003](#2652003)
| When 802.1x MAB and a parking VLAN are configured on an interface, hostapd might install a static FDB entry if the interface is down. To work around this issue, delete 802.1x from the interface with the net del interface dot1x command, then add back the 802.1x configuration. | 3.7.10-4.3.0 | 4.3.1-4.4.5| -| [2648658](#2648658)
| If you try to use more than one percent of max-ecmp-nexthops, you get an error indicating a failure. | 3.7.15-4.3.1 | 4.4.0-4.4.5| +| [2648658](#2648658)
| If you try to use more than one percent of max-ecmp-nexthops, you get an error indicating a failure. | 3.7.15-4.3.2 | 4.4.0-4.4.5| | [2646974](#2646974)
| The following vulnerabilities have been announced in bind9:CVE-2021-25214: a malformed incoming IXFR transfercould trigger an assertion failure in named, resulting in denial of service
CVE-2021-25215: named could crash when a DNAME record placed in the ANSWER section during DNAME chasing turned out to be the final answer to a client query
CVE-2021-25216: the SPNEGO implementation used by BIND is prone to a buffer overflow vulnerability. This update switches to use the SPNEGO implementation from the Kerberos libraries
Vulnerable: <= 9.9.5.dfsg-9+deb8u21Fixed: 9.9.5.dfsg-9+deb8u22 | 3.7.0-3.7.15 | 3.7.16| | [2646968](#2646968)
| CVE-2021-20312: A flaw was found in ImageMagick, where an integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c may trigger undefined behavior via a crafted image file that is submitted by an attacker and processed by an application using ImageMagick. This could lead to a denial-of-service
Vulnerable: <= 6.8.9.9-5+deb8u23Fixed: 6.8.9.9-5+deb8u24 | 3.7.0-3.7.15 | 3.7.16| | [2645846](#2645846)
| When 802.1x MAB and a parking VLAN are configured on an interface, hostapd might install a static fdb entry if the interface is down. To work around this issue, delete 802.1x from the interface with the net del interface dot1x command, then add back the 802.1x configuration. | 3.7.10-3.7.15 | 3.7.16, 4.3.1-4.4.5| @@ -477,7 +477,7 @@ pdfhidden: True | [2556037](#2556037)
CM-33012 | After you add an interface to the bridge, an OSPF session flap might occur
| 3.7.9-4.2.0 | 4.2.1-4.4.5| | [2555908](#2555908)
CM-32940 | If the you add the MLAG backup IP address to the MLAG peer in the secondary role while the peer link is down, the LACP sys-mac does not use the MLAG system MAC address (clagd-sys-mac) when the peer link comes back up
To work around this issue, wait until the peer link is up to add the MLAG backup IP address. To recover from this condition, restart clagd with the sudo systemctl restart clagd command. | 3.7.12-4.0.1 | 4.1.0-4.4.5| | [2555528](#2555528)
CM-32750 | In an EVPN Active/Active configuration, when one of the peers reboots and begins to refresh IP neighbor entries shared by the MLAG peer, some of these ARP messages might be dropped by the MLAG peer's ARP policer.
To work around this issue, increase the burst value of the ARP policers to 200 or higher. | 3.7.14-4.2.1 | 4.3.0-4.4.5| -| [2555175](#2555175)
CM-32528 | Control Plane Traffic (example - BGP peering from Leaf to Spine) goes down on Leaf due to Hold Down Timer Expiration of peer following prolonged link flaps on downlinks when vxlan enabled vlans are carried on the flapping link. | 3.7.15-3.7.16, 4.2.1-4.4.5 | | +| [2555175](#2555175)
CM-32528 | Control plane traffic (such as BGP peering from leaf to spine) goes down on the leaf due to the peer Hold Down timer expiration following prolonged link flaps on down links when VXLAN enabled VLANs are carried on the flapping link. Be sure to correct layer 1 issues, configuration issues, or misbehaving link partners that are causing the link flaps. | 3.7.15-4.3.1 | 4.3.2-4.4.5| | [2554785](#2554785)
CM-32275 | After you reboot a Broadcom switch, switchd might fail to restart and you see logs in switchd.log similar to the following:
Nov 12 12:20:05.063876 leaf01 switchd[9867]:Nov 12 12:20:05.064310 leaf01 switchd[9867]: hal_bcm_console.c:294 0:system_init:Nov 12 12:20:05.064428 leaf01 switchd[9867]: hal_bcm_console.c:294 system_init: Misc init failed: Operation timed outNov 12 12:20:05.064464 leaf01 switchd[9867]:Nov 12 12:20:05.091995 leaf01 switchd[9867]: hal_bcm_console.c:294 LED: Loading 256 bytes into LED program memoryNov 12 12:20:05.092029 leaf01 switchd[9867]:Nov 12 12:20:05.099547 leaf01 switchd[9867]: hal_bcm_console.c:294 PORT: Error: bcm ports not initializedNov 12 12:20:05.099579 leaf01 switchd[9867]:Nov 12 12:20:05.099646 leaf01 switchd[9867]: hal_bcm_console.c:294 Error: file /var/lib/cumulus/rc.datapath_0: line 81 (error code -1): script terminatedNov 12 12:20:05.099667 leaf01 switchd[9867]:Nov 12 12:20:05.099775 leaf01 switchd[9867]: hal_bcm_console.c:294 Error: file /etc/bcm.d/rc.soc: line 70 (error code -1): script terminatedNov 12 12:20:05.099798 leaf01 switchd[9867]:Nov 12 12:20:05.099871 leaf01 switchd[9867]: hal_bcm_console.c:294 ERROR loading rc script on unit 0Nov 12 12:20:05.099892 leaf01 switchd[9867]:Nov 12 12:20:05.099943 leaf01 switchd[9867]: hal_bcm_console.c:299 CRIT loading of rc script failed, aborting!
To work around this issue, configure Cumulus Linux to boot with the ntel_iommu=off kernel command option:1. Open the /etc/default/grub file with a text editor
2. Edit the GRUB_CMDLINE_LINUX variable by adding the string intel_iommu=off at the end. For example: GRUB_CMDLINE_LINUX="cl_platform=cel_e1031 console=ttyS1,115200n8 intel_iommu=off"3. Run the update-grub command
4. Reboot the switch. | 3.7.11-4.2.1 | 4.3.0-4.4.5| | [2554709](#2554709)
CM-32217 | The IP address specified in the ip pim use-source command configured on the loopback interface should be inherited by unnumbered interfaces during their Primary IP address selection process. If ip pim use-source is configured on the loopback after an unnumbered interface has already selected their Primary IP address, the unnumbered interface does not update its Primary IP address to be the new use-source value until after there is a netlink update for that interface.
To work around this issue, configure ip pim use-source on each unnumbered interface directly or ensure ip pim use-source is applied to the loopback before other unnumbered interfaces are enabled for PIM. | 3.7.13-3.7.16, 4.2.1-4.4.5 | | | [2554588](#2554588)
CM-32149 | If you try to reconfigure a DHCP server after you delete the switch configuration with the net del all command, the dhcpd service fails because a duplicate process is running
To work around this issue, edit the /usr/lib/python2.7/dist-packages/nclu/plugins/dhcp.py file to change:
DHCPD_PID="-pf {0}" 
to:
DHCPD_PID="-pf {1}"
| 3.7.13-4.2.1 | 4.3.0-4.4.5| @@ -517,7 +517,7 @@ pdfhidden: True | [2549782](#2549782)
CM-29519 | The JSON format output of the net show bgp l2vpn evpn summary command shows the incorrect neighbour state. | 3.7.12-3.7.16, 4.0.0-4.4.5 | | | [2549731](#2549731)
CM-29492 | When you create SPAN or ERSPAN rules in ebtables, the action fails to install if it is not in lowercase. Make sure that the SPAN or ERSPAN action is all lowercase; for example:

[ebtables]
-A FORWARD --in-interface swp10 -j span --dport swp1
| 3.7.12-3.7.16, 4.1.1-4.4.5 | | | [2549472](#2549472)
CM-29367 | On switches with the Trident3 ASIC, PFC is not working as expected. If you set the PFC for only one CoS, pause frames are sent for all CoS traffic. | 3.7.11-4.1.1 | 4.2.0-4.4.5| -| [2549371](#2549371)
CM-29309 | When Optimized Multicast Flooding (OMF) is enabled with the bridge.optimized_mcast_flood = TRUE setting in the /etc/cumulus/switchd.conf file, the switch continues to flood IPv6 multicast traffic to all slave ports when there is no MLD join receive. | 3.7.11-4.3.1 | 4.4.0-4.4.5| +| [2549371](#2549371)
CM-29309 | When Optimized Multicast Flooding (OMF) is enabled with the bridge.optimized_mcast_flood = TRUE setting in the /etc/cumulus/switchd.conf file, the switch continues to flood IPv6 multicast traffic to all slave ports when there is no MLD join receive. | 3.7.11-4.3.2 | 4.4.0-4.4.5| | [2549307](#2549307)
| The following vulnerabilities affect git, which is available in the repository for optional installation:
CVE-2020-5260: Felix Wilhelm of Google Project Zero discovered a flaw in git, a fast, scalable, distributed revision control system. With a crafted URL that contains a newline, the credential helper machinery can be fooled to return credential information for a wrong host.
CVE-2020-11008: Carlo Arenas discovered a flaw in git, a fast, scalable, distributed revision control system. With a crafted URL that contains a newline or empty host, or lacks a scheme, the credential helper machinery can be fooled into providing credential information that is not appropriate for the protocol in use and host being contacted. | 3.7.12-4.1.1 | 4.2.0-4.4.5| | [2548962](#2548962)
CM-29165 | With FRR or OSPF, you might see an inconsistent link-state advertisement. For example, when you configure the OSPF default originate route as metric-type 1 with a specific metric, Cumulus Linux shows the default originate route as an external metric-type 2 route with the default metric in the database. This issue typically occurs when both IPv4 and IPv6 default routes exist in the routing table. | 3.7.12-4.1.1 | 4.2.0-4.4.5| | [2548930](#2548930)
CM-29148 | On Mellanox Spectrum switches that contain an OSPF IP unnumbered neighborship with a high scale of prefixes being learned, a link flap might cause the neighbor entry to not be programmed in hardware. | 3.7.11-4.2.1 | 4.3.0-4.4.5| @@ -641,7 +641,7 @@ pdfhidden: True | Issue ID | Description | Affects | |--- |--- |--- | | [2635951](#2635951)
| The following vulnerability has been announced for the libgstreamer-plugins-base1.0-0 package. There is no CVE number yet; the Debian advisory number is ELA-412-1
Multiple vulnerabilities were discovered in plugins for the GStreamer media framework, which may result in denial of service or potentially the execution of arbitrary code if a malformed media file is opened
Vulnerable: <= 1.4.4-2+deb8u2Fixed: 1.4.4-2+deb8u3 | 3.7.0-3.7.14.2 | | -| [2628515](#2628515)
| CVE-2020-12695: hostapd does not properly handle UPnP subscribe messages under certain conditions, allowing an attacker to cause a denial of service
Vulnerable: <= 2.8.0-cl3.7.15u2Fixed: 2.8.0-cl3.7.15u3 | 3.7.14-3.7.14.2, 4.3.0-4.3.1 | | +| [2628515](#2628515)
| CVE-2020-12695: hostapd does not properly handle UPnP subscribe messages under certain conditions, allowing an attacker to cause a denial of service
Vulnerable: <= 2.8.0-cl3.7.15u2Fixed: 2.8.0-cl3.7.15u3 | 3.7.14-3.7.14.2, 4.3.0-4.3.2 | | | [2617009](#2617009)
| CVE-2021-23358: missing input sanitising in the template() function of the Underscore JavaScript library could result in the execution of arbitrary code
Vulnerable: 1.7.0~dfsg-1Fixed: 1.7.0~dfsg-1+deb8u1 | 3.7.0-3.7.14.2 | | | [2617008](#2617008)
| CVE-2021-28831: The gunzip decompressor of Busybox, tiny utilities for small and embedded systems, mishandled the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data
Vulnerable: <= 1.22.0-9+deb8u4Fixed: 1.22.0-9+deb8u5 | 3.7.0-3.7.14.2 | | | [2617007](#2617007)
| CVE-2021-3443 CVE-2021-3467: Two issues have been found in jasper, a JPEG-2000 runtime library. Both issues are related to jpeg 2000 decoding, where a null pointer dereference and a missing check of valid component numbers referenced by CDEF box, could be exploited
Vulnerable: <= 1.900.1-debian1-2.4+deb8u9Fixed: 1.900.1-debian1-2.4+deb8u10 | 3.7.0-3.7.14.2 | | @@ -655,12 +655,12 @@ pdfhidden: True | [2589570](#2589570)
| The following denial-of-service vulnerability has been announced in Pygments, a syntax highlighting library for Python:CVE-2021-27291: A number of regular expressions had exponential or cubic worst-case complexity which could cause a remote denial of service (DoS) when provided with malicious input
Vulnerable: <= 2.0.1+dfsg-1.1+deb8u2Fixed: 2.0.1+dfsg-1.1+deb8u3 | 3.7.0-3.7.14.2 | | | [2589567](#2589567)
| The following vulnerabilities have been announced in Pillow, a Python imaging library, which can be used to cause a denial-of-service attack with crafted image files:CVE-2020-35653: PcxDecode has a buffer over-read when decoding a crafted PCX file because the user-supplied stride value is trusted for buffer calculations
CVE-2021-25290: In TiffDecode.c, there is a negative-offset memcpy with an invalid size
Vulnerable: <= 2.6.1-2+deb8u5FIxed: 2.6.1-2+deb8u6 | 3.7.0-3.7.14.2 | | | [2574294](#2574294)
| CVE-2021-3410: A buffer overflow issue in caca_resize function in libcaca/caca/canvas.c may lead to local execution of arbitrary code in the user context
Vulnerable: <= 0.99.beta19-2+deb8u1Fixed: 0.99.beta19-2+deb8u2 | 3.7.14-3.7.14.2 | | -| [2566880](#2566880)
| CVE-2021-27803: A vulnerability was discovered in how p2p/p2p_pd.c in wpa_supplicant before 2.10 processes P2P (Wi-Fi Direct) provision discovery requests. It could result in denial of service or other impact (potentially execution of arbitrary code), for an attacker within radio range. | 3.7.14-3.7.14.2, 4.0.0-4.3.1 | | +| [2566880](#2566880)
| CVE-2021-27803: A vulnerability was discovered in how p2p/p2p_pd.c in wpa_supplicant before 2.10 processes P2P (Wi-Fi Direct) provision discovery requests. It could result in denial of service or other impact (potentially execution of arbitrary code), for an attacker within radio range. | 3.7.14-3.7.14.2, 4.0.0-4.3.2 | | | [2562511](#2562511)
| hostapd does not fail over to secondary RADIUS servers for 802.1x authentication when the primary radius is reachable but not responding to Access-Requests
If the primary RADIUS server is having a problem servicing requests, you can remove it from the configuration temporarily to force requests to be sent to alternate servers. | 3.7.10-3.7.14.2 | | | [2562396](#2562396)
| CVE-2020-27824: Global buffer overflow on irreversible conversion when too many decomposition levels are specified.
CVE-2020-27841: Crafted input to be processed by the openjpeg encoder could cause an out-of-bounds read.
CVE-2020-27845: Crafted input can cause out-of-bounds-read.
Vulnerable: <= 2.1.0-2+deb8u11
Fixed: 2.1.0-2+deb8u12 | 3.7.14-3.7.14.2 | | | [2562301](#2562301)
| CVE-2021-26937: encoding.c in GNU Screen through 4.8.0 allows remote attackers to cause a denial of service (invalid write access and application crash) or possibly have unspecified other impact via a crafted UTF-8 character sequence.
Vulnerable: <= 4.2.1-3+deb8u1
Fixed: 4.2.1-3+deb8u2 | 3.7.14-3.7.14.2 | | | [2556815](#2556815)
CM-33419 | When ARP suppression is enabled, RARP packets sometimes get dropped and are not flooded by the local VTEP.
To work around this issue, disable ARP suppression. | 3.7.14-3.7.14.2, 4.3.0 | | -| [2556782](#2556782)
CM-33398 | CVE-2021-0326: An issue has been found in wpa, a set of tools to support WPA and WPA2 (IEEE 802.11i). Missing validation of data can result in a buffer over-write, which might lead to a DoS of the wpa_supplicant process or potentially arbitrary code execution.
Vulnerable: <= 2.8.0-cl3.7.14u1, <= 2.8.0-cl4.2.1u1 | 3.7.14-3.7.14.2, 4.0.0-4.3.1 | | +| [2556782](#2556782)
CM-33398 | CVE-2021-0326: An issue has been found in wpa, a set of tools to support WPA and WPA2 (IEEE 802.11i). Missing validation of data can result in a buffer over-write, which might lead to a DoS of the wpa_supplicant process or potentially arbitrary code execution.
Vulnerable: <= 2.8.0-cl3.7.14u1, <= 2.8.0-cl4.2.1u1 | 3.7.14-3.7.14.2, 4.0.0-4.3.2 | | | [2556780](#2556780)
CM-33397 | CVE-2021-27212: A vulnerability in the Certificate List Exact Assertion validation was discovered in OpenLDAP, a free implementation of the Lightweight Directory Access Protocol. An unauthenticated remote attacker can take advantage of this flaw to cause a denial of service (slapd daemon crash) via specially crafted packets.
Vulnerable: <= 2.4.40+dfsg-1+deb8u9
Fixed: 2.4.40+dfsg-1+deb8u10 | 3.7.14-3.7.14.2 | | | [2556779](#2556779)
CM-33396 | CVE-2020-8625: Buffer overflow attack in the bind9 DNS server caused by an issue in the GSSAPI (“Generic Security Services”) security policy negotiation.
Vulnerable: <= 9.9.5.dfsg-9+deb8u20
Fixed: 9.9.5.dfsg-9+deb8u21 | 3.7.14-3.7.14.2 | | | [2556763](#2556763)
CM-33385 | In a configuration with both traditional and vlan-aware bridges, the VLAN membership check on a vlan-aware switch does not drop PVST BPBUs that come from a traditional bridge. | 3.7.14-3.7.14.2, 4.0.0-4.3.0 | | @@ -707,8 +707,8 @@ pdfhidden: True | Issue ID | Description | Affects | Fixed | |--- |--- |--- |--- | -| [3418046](#3418046)
None | If MLAG is configured but disconnected from an MLAG peer for an extended period of time (days or more), there is a long delay (up to a minute per day) before traffic forwarding stabilizes after the MLAG peer connection re-establishes. | 3.7.0-5.4.0 | 5.5.0-5.6.0| -| [3376798](#3376798)
| On Broadcom switches, Cumulus Linux does not create the hardware bridging domain for a traditional bridge with a VXLAN interface during switchd restart. The /var/log/switchd.log file includes the following exception logs shortly after switchd restarts:
switchd[30158]: hal_bcm_l3.c:1617 find_egr_path_if_vxlan_overlay:vxlan overlay : nh PORT: port <#>, vlan . not yet ready
MAC learning looks correct, but traffic does not flow as expected. | 3.7.0-3.7.16, 4.3.1-4.4.5 | | +| [3418046](#3418046)
None | If MLAG is configured but disconnected from an MLAG peer for an extended period of time (days or more), there is a long delay (up to a minute per day) before traffic forwarding stabilizes after the MLAG peer connection re-establishes. | 3.7.0-4.3.1 | 4.3.2-4.4.5, 5.5.0-5.6.0| +| [3376798](#3376798)
| On Broadcom switches, Cumulus Linux does not create the hardware bridging domain for a traditional bridge with a VXLAN interface during switchd restart. The /var/log/switchd.log file includes the following exception logs shortly after switchd restarts:
switchd[30158]: hal_bcm_l3.c:1617 find_egr_path_if_vxlan_overlay:vxlan overlay : nh PORT: port <#>, vlan . not yet ready
MAC learning looks correct, but traffic does not flow as expected. | 3.7.0-4.3.1 | 4.3.2-4.4.5| | [3330705](#3330705)
| When using TACACS+, a TACACS+ server name that returns more than one IP address, such as an IPv6 and IPv4 address, is counted many times against the limit of seven TACACS+ servers, which might cause some of the later listed servers to be ignored as over the limit. To work around this issue, you can set the prefer_ip_version configuration option (the default value is 4) to choose between an IPv4 or IPv6 address if both are present. | 3.7.0-5.3.1 | 5.4.0-5.6.0| | [3327477](#3327477)
| If you use su to change to a user specified through TACACS+, the user becomes the local tacacs0 thru tacacs15 user instead of the named user to run sudo commands. As a result, the named user password might not match the local tacacs0 thru tacacs15 user password. | 3.7.0-3.7.16, 4.0.0-4.4.5, 5.0.0-5.6.0 | | | [3216922](#3216922)
None | RADIUS authenticated users with read-only access to NCLU commands (users in the users_with_show list) can run edit commands if a username for a non-local account is on the users_with_edit line of the /etc/netd.conf file. To work around this issue, make sure that all usernames on the users_with_edit line of the /etc/netd.conf file are configured local users for the system (real Linux users). | 3.7.0-5.2.1 | 5.3.0-5.6.0| @@ -783,7 +783,7 @@ pdfhidden: True | [2687332](#2687332)
| When you configure BGP aggregate-address summary-only and any component route within the summary updates, all component routes within the summary update in the RIB on the device advertising the summary. This condition might result in increased CPU usage
To workaround this issue, remove the aggregate-address summary-only configuration, add a static route to Null0 for the prefix, and configure an outbound route map to restrict anything more specific than the desired prefix from being advertised. For example: Before:
address-family ipv4 unicast
aggregate-address 10.10.0.0/16 summary-only
redistribute connected
After:
ip route 10.10.0.0/16 Null0
!
address-family ipv4 unicast
redistribute connected route-map DENY-COMPONENTS
redistribute static
exit-address-family
ip prefix-list NO-COMPONENTS seq 5 permit 10.10.0.0/16 ge 17
!
route-map DENY-COMPONENTS deny 10
match ip address prefix-list NO-COMPONENTS
!
route-map DENY-COMPONENTS permit 20
This example assumes no other static routes are present. Otherwise, you might need to configure additional route maps to limit the static routes being redistributed. | 3.7.12-4.2.1 | 4.3.0-4.4.5| | [2684452](#2684452)
| When a VTEP is rebooted, MAC address entries might become out of sync between the kernel fdb table and the EVPN MAC VNI table on remote VTEPs. The impacted MAC entries will be installed against the rebooted VTEP IP in the kernel fdb and the correct VTEP IP will be present in the EVPN MAC VNI table
You can work around this issue with the following steps:1. Clear all corrupted mac entries in the kernel FDB with the bridge fdb del
dev [dst\|via] command2. Add "vxlan-learning": "off" under /etc/network/ifupdown2/policy.d/vxlan.json
$ cat /etc/network/ifupdown2/policy.d/vxlan.json
{
"vxlan": {
"module_globals": { "vxlan-purge-remotes": "no" },
"defaults": {
"vxlan-ageing": "1800",
"vxlan-port": "4789", <==== This comma needs to be added at the end of this line
"vxlan-learning": "off" <= This line needs to be added
}
}
}
3. Reboot the affected switch(es) | 3.7.12-3.7.16 | | | [2684404](#2684404)
| CVE-2017-20005: NGINX has a buffer overflow for years that exceed four digits, as demonstrated by a file with a modification date in 1969 that causes an integer overflow (or a false modification date far in the future), when encountered by the autoindex module
Vulnerable: <= 1.6.2-5+deb8u8Fixed: 1.6.2-5+deb8u9 | 3.7.0-3.7.15 | 3.7.16| -| [2679950](#2679950)
| CVE-2021-25217: parsing of stored leases by dhclient or dhcpd has an incorrect length check that may cause a crash
Vulnerable: <= 4.3.1-6-cl3.7.14u1Fixed: 4.3.1-6-cl3.7.16u1 | 3.7.0-3.7.15, 4.0.0-4.3.1 | 3.7.16, 4.4.0-4.4.5| +| [2679950](#2679950)
| CVE-2021-25217: parsing of stored leases by dhclient or dhcpd has an incorrect length check that may cause a crash
Vulnerable: <= 4.3.1-6-cl3.7.14u1Fixed: 4.3.1-6-cl3.7.16u1 | 3.7.0-3.7.15, 4.0.0-4.3.2 | 3.7.16, 4.4.0-4.4.5| | [2677063](#2677063)
| CVE-2021-3541: "Parameter Laughs" attack related to parameter entities expansion
Vulnerable: <= 2.9.1+dfsg1-5+deb8u10Fixed: 2.9.1+dfsg1-5+deb8u11 | 3.7.0-3.7.15 | 3.7.16| | [2677061](#2677061)
| CVE-2021-23017: off-by-one in Nginx, a high-performance web and reverse proxy server, which could result in denial of service and potentially the execution of arbitrary code
Vulnerable: <= 1.6.2-5+deb8u7Fixed: 1.6.2-5+deb8u8 | 3.7.0-3.7.15 | 3.7.16| | [2677060](#2677060)
| CVE-2021-23336: Python2.7 is vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter
Vulnerable: <= 2.7.9-2-ds1-1+deb8u6Fixed: 2.7.9-2-ds1-1+deb8u7 | 3.7.0-3.7.15 | 3.7.16| @@ -804,7 +804,7 @@ pdfhidden: True | [2638137](#2638137)
| When you delete a static route using NCLU, the configuration is not deleted from the running configuration or from the /etc/frr/frr.conf file. | 3.7.13-3.7.16 | | | [2635951](#2635951)
| The following vulnerability has been announced for the libgstreamer-plugins-base1.0-0 package. There is no CVE number yet; the Debian advisory number is ELA-412-1
Multiple vulnerabilities were discovered in plugins for the GStreamer media framework, which may result in denial of service or potentially the execution of arbitrary code if a malformed media file is opened
Vulnerable: <= 1.4.4-2+deb8u2Fixed: 1.4.4-2+deb8u3 | 3.7.0-3.7.14.2 | 3.7.15-3.7.16| | [2633245](#2633245)
| On the Dell N3048EP-ON switch, the SPF+ ports remain down after a power cycle. | 3.7.10-3.7.16 | | -| [2628515](#2628515)
| CVE-2020-12695: hostapd does not properly handle UPnP subscribe messages under certain conditions, allowing an attacker to cause a denial of service
Vulnerable: <= 2.8.0-cl3.7.15u2Fixed: 2.8.0-cl3.7.15u3 | 3.7.14-3.7.14.2, 4.3.0-4.3.1 | 3.7.15-3.7.16, 4.4.0-4.4.5| +| [2628515](#2628515)
| CVE-2020-12695: hostapd does not properly handle UPnP subscribe messages under certain conditions, allowing an attacker to cause a denial of service
Vulnerable: <= 2.8.0-cl3.7.15u2Fixed: 2.8.0-cl3.7.15u3 | 3.7.14-3.7.14.2, 4.3.0-4.3.2 | 3.7.15-3.7.16, 4.4.0-4.4.5| | [2617009](#2617009)
| CVE-2021-23358: missing input sanitising in the template() function of the Underscore JavaScript library could result in the execution of arbitrary code
Vulnerable: 1.7.0~dfsg-1Fixed: 1.7.0~dfsg-1+deb8u1 | 3.7.0-3.7.14.2 | 3.7.15-3.7.16| | [2617008](#2617008)
| CVE-2021-28831: The gunzip decompressor of Busybox, tiny utilities for small and embedded systems, mishandled the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data
Vulnerable: <= 1.22.0-9+deb8u4Fixed: 1.22.0-9+deb8u5 | 3.7.0-3.7.14.2 | 3.7.15-3.7.16| | [2617007](#2617007)
| CVE-2021-3443 CVE-2021-3467: Two issues have been found in jasper, a JPEG-2000 runtime library. Both issues are related to jpeg 2000 decoding, where a null pointer dereference and a missing check of valid component numbers referenced by CDEF box, could be exploited
Vulnerable: <= 1.900.1-debian1-2.4+deb8u9Fixed: 1.900.1-debian1-2.4+deb8u10 | 3.7.0-3.7.14.2 | 3.7.15-3.7.16| @@ -819,13 +819,13 @@ pdfhidden: True | [2589567](#2589567)
| The following vulnerabilities have been announced in Pillow, a Python imaging library, which can be used to cause a denial-of-service attack with crafted image files:CVE-2020-35653: PcxDecode has a buffer over-read when decoding a crafted PCX file because the user-supplied stride value is trusted for buffer calculations
CVE-2021-25290: In TiffDecode.c, there is a negative-offset memcpy with an invalid size
Vulnerable: <= 2.6.1-2+deb8u5FIxed: 2.6.1-2+deb8u6 | 3.7.0-3.7.14.2 | 3.7.15-3.7.16| | [2581473](#2581473)
| When netq-agent is installed on the Dell N3048EP platform, switchd might crash if pluggables are installed in the SFP+ ports. | 3.7.13-3.7.15 | 3.7.16| | [2574294](#2574294)
| CVE-2021-3410: A buffer overflow issue in caca_resize function in libcaca/caca/canvas.c may lead to local execution of arbitrary code in the user context
Vulnerable: <= 0.99.beta19-2+deb8u1Fixed: 0.99.beta19-2+deb8u2 | 3.7.14-3.7.14.2 | 3.7.15-3.7.16| -| [2566880](#2566880)
| CVE-2021-27803: A vulnerability was discovered in how p2p/p2p_pd.c in wpa_supplicant before 2.10 processes P2P (Wi-Fi Direct) provision discovery requests. It could result in denial of service or other impact (potentially execution of arbitrary code), for an attacker within radio range. | 3.7.14-3.7.14.2, 4.0.0-4.3.1 | 3.7.15-3.7.16, 4.4.0-4.4.5| +| [2566880](#2566880)
| CVE-2021-27803: A vulnerability was discovered in how p2p/p2p_pd.c in wpa_supplicant before 2.10 processes P2P (Wi-Fi Direct) provision discovery requests. It could result in denial of service or other impact (potentially execution of arbitrary code), for an attacker within radio range. | 3.7.14-3.7.14.2, 4.0.0-4.3.2 | 3.7.15-3.7.16, 4.4.0-4.4.5| | [2562511](#2562511)
| hostapd does not fail over to secondary RADIUS servers for 802.1x authentication when the primary radius is reachable but not responding to Access-Requests
If the primary RADIUS server is having a problem servicing requests, you can remove it from the configuration temporarily to force requests to be sent to alternate servers. | 3.7.10-3.7.14.2 | 3.7.15-3.7.16| | [2562396](#2562396)
| CVE-2020-27824: Global buffer overflow on irreversible conversion when too many decomposition levels are specified.
CVE-2020-27841: Crafted input to be processed by the openjpeg encoder could cause an out-of-bounds read.
CVE-2020-27845: Crafted input can cause out-of-bounds-read.
Vulnerable: <= 2.1.0-2+deb8u11
Fixed: 2.1.0-2+deb8u12 | 3.7.14-3.7.14.2 | 3.7.15-3.7.16| | [2562347](#2562347)
| When you bring VXLAN interfaces up and down physically or administratively, the MTU for the SVIs changes to 1550 (the default value). | 3.7.14.2-3.7.16 | | | [2562301](#2562301)
| CVE-2021-26937: encoding.c in GNU Screen through 4.8.0 allows remote attackers to cause a denial of service (invalid write access and application crash) or possibly have unspecified other impact via a crafted UTF-8 character sequence.
Vulnerable: <= 4.2.1-3+deb8u1
Fixed: 4.2.1-3+deb8u2 | 3.7.14-3.7.14.2 | 3.7.15-3.7.16| | [2556815](#2556815)
CM-33419 | When ARP suppression is enabled, RARP packets sometimes get dropped and are not flooded by the local VTEP.
To work around this issue, disable ARP suppression. | 3.7.14-4.3.0 | 4.3.1-4.4.5, 4.4.0-4.4.5| -| [2556782](#2556782)
CM-33398 | CVE-2021-0326: An issue has been found in wpa, a set of tools to support WPA and WPA2 (IEEE 802.11i). Missing validation of data can result in a buffer over-write, which might lead to a DoS of the wpa_supplicant process or potentially arbitrary code execution.
Vulnerable: <= 2.8.0-cl3.7.14u1, <= 2.8.0-cl4.2.1u1 | 3.7.14-3.7.14.2, 4.0.0-4.3.1 | 3.7.15-3.7.16, 4.4.0-4.4.5| +| [2556782](#2556782)
CM-33398 | CVE-2021-0326: An issue has been found in wpa, a set of tools to support WPA and WPA2 (IEEE 802.11i). Missing validation of data can result in a buffer over-write, which might lead to a DoS of the wpa_supplicant process or potentially arbitrary code execution.
Vulnerable: <= 2.8.0-cl3.7.14u1, <= 2.8.0-cl4.2.1u1 | 3.7.14-3.7.14.2, 4.0.0-4.3.2 | 3.7.15-3.7.16, 4.4.0-4.4.5| | [2556780](#2556780)
CM-33397 | CVE-2021-27212: A vulnerability in the Certificate List Exact Assertion validation was discovered in OpenLDAP, a free implementation of the Lightweight Directory Access Protocol. An unauthenticated remote attacker can take advantage of this flaw to cause a denial of service (slapd daemon crash) via specially crafted packets.
Vulnerable: <= 2.4.40+dfsg-1+deb8u9
Fixed: 2.4.40+dfsg-1+deb8u10 | 3.7.14-3.7.14.2 | 3.7.15-3.7.16| | [2556779](#2556779)
CM-33396 | CVE-2020-8625: Buffer overflow attack in the bind9 DNS server caused by an issue in the GSSAPI (“Generic Security Services”) security policy negotiation.
Vulnerable: <= 9.9.5.dfsg-9+deb8u20
Fixed: 9.9.5.dfsg-9+deb8u21 | 3.7.14-3.7.14.2 | 3.7.15-3.7.16| | [2556763](#2556763)
CM-33385 | In a configuration with both traditional and vlan-aware bridges, the VLAN membership check on a vlan-aware switch does not drop PVST BPBUs that come from a traditional bridge. | 3.7.14-4.3.0 | 4.3.1-4.4.5, 4.4.0-4.4.5| @@ -899,7 +899,7 @@ pdfhidden: True | [2549782](#2549782)
CM-29519 | The JSON format output of the net show bgp l2vpn evpn summary command shows the incorrect neighbour state. | 3.7.12-3.7.16, 4.0.0-4.4.5 | | | [2549731](#2549731)
CM-29492 | When you create SPAN or ERSPAN rules in ebtables, the action fails to install if it is not in lowercase. Make sure that the SPAN or ERSPAN action is all lowercase; for example:

[ebtables]
-A FORWARD --in-interface swp10 -j span --dport swp1
| 3.7.12-3.7.16, 4.1.1-4.4.5 | | | [2549472](#2549472)
CM-29367 | On switches with the Trident3 ASIC, PFC is not working as expected. If you set the PFC for only one CoS, pause frames are sent for all CoS traffic. | 3.7.11-4.1.1 | 4.2.0-4.4.5| -| [2549371](#2549371)
CM-29309 | When Optimized Multicast Flooding (OMF) is enabled with the bridge.optimized_mcast_flood = TRUE setting in the /etc/cumulus/switchd.conf file, the switch continues to flood IPv6 multicast traffic to all slave ports when there is no MLD join receive. | 3.7.11-4.3.1 | 4.4.0-4.4.5| +| [2549371](#2549371)
CM-29309 | When Optimized Multicast Flooding (OMF) is enabled with the bridge.optimized_mcast_flood = TRUE setting in the /etc/cumulus/switchd.conf file, the switch continues to flood IPv6 multicast traffic to all slave ports when there is no MLD join receive. | 3.7.11-4.3.2 | 4.4.0-4.4.5| | [2549307](#2549307)
| The following vulnerabilities affect git, which is available in the repository for optional installation:
CVE-2020-5260: Felix Wilhelm of Google Project Zero discovered a flaw in git, a fast, scalable, distributed revision control system. With a crafted URL that contains a newline, the credential helper machinery can be fooled to return credential information for a wrong host.
CVE-2020-11008: Carlo Arenas discovered a flaw in git, a fast, scalable, distributed revision control system. With a crafted URL that contains a newline or empty host, or lacks a scheme, the credential helper machinery can be fooled into providing credential information that is not appropriate for the protocol in use and host being contacted. | 3.7.12-4.1.1 | 4.2.0-4.4.5| | [2549226](#2549226)
CM-29259 | You might see the following gport error messages in switchd.log:

2020-04-10T19:50:01.011224+09:00 E1PDX0V1ELF0001 6 switchd[925]: hal_bcm_mdb.c:530 gport 0x800007a find failed
2020-04-10T19:50:01.011631+09:00 E1PDX0V1ELF0001 6 switchd[925]: hal_bcm_mdb.c:530 gport 0x8000009 find failed

These messages are harmless and can be ignored. | 3.7.12-3.7.14.2, 4.0.0-4.2.1 | 3.7.15-3.7.16, 4.3.0-4.4.5| | [2548962](#2548962)
CM-29165 | With FRR or OSPF, you might see an inconsistent link-state advertisement. For example, when you configure the OSPF default originate route as metric-type 1 with a specific metric, Cumulus Linux shows the default originate route as an external metric-type 2 route with the default metric in the database. This issue typically occurs when both IPv4 and IPv6 default routes exist in the routing table. | 3.7.12-4.1.1 | 4.2.0-4.4.5| @@ -1037,8 +1037,8 @@ pdfhidden: True | Issue ID | Description | Affects | Fixed | |--- |--- |--- |--- | -| [3418046](#3418046)
None | If MLAG is configured but disconnected from an MLAG peer for an extended period of time (days or more), there is a long delay (up to a minute per day) before traffic forwarding stabilizes after the MLAG peer connection re-establishes. | 3.7.0-5.4.0 | 5.5.0-5.6.0| -| [3376798](#3376798)
| On Broadcom switches, Cumulus Linux does not create the hardware bridging domain for a traditional bridge with a VXLAN interface during switchd restart. The /var/log/switchd.log file includes the following exception logs shortly after switchd restarts:
switchd[30158]: hal_bcm_l3.c:1617 find_egr_path_if_vxlan_overlay:vxlan overlay : nh PORT: port <#>, vlan . not yet ready
MAC learning looks correct, but traffic does not flow as expected. | 3.7.0-3.7.16, 4.3.1-4.4.5 | | +| [3418046](#3418046)
None | If MLAG is configured but disconnected from an MLAG peer for an extended period of time (days or more), there is a long delay (up to a minute per day) before traffic forwarding stabilizes after the MLAG peer connection re-establishes. | 3.7.0-4.3.1 | 4.3.2-4.4.5, 5.5.0-5.6.0| +| [3376798](#3376798)
| On Broadcom switches, Cumulus Linux does not create the hardware bridging domain for a traditional bridge with a VXLAN interface during switchd restart. The /var/log/switchd.log file includes the following exception logs shortly after switchd restarts:
switchd[30158]: hal_bcm_l3.c:1617 find_egr_path_if_vxlan_overlay:vxlan overlay : nh PORT: port <#>, vlan . not yet ready
MAC learning looks correct, but traffic does not flow as expected. | 3.7.0-4.3.1 | 4.3.2-4.4.5| | [3330705](#3330705)
| When using TACACS+, a TACACS+ server name that returns more than one IP address, such as an IPv6 and IPv4 address, is counted many times against the limit of seven TACACS+ servers, which might cause some of the later listed servers to be ignored as over the limit. To work around this issue, you can set the prefer_ip_version configuration option (the default value is 4) to choose between an IPv4 or IPv6 address if both are present. | 3.7.0-5.3.1 | 5.4.0-5.6.0| | [3327477](#3327477)
| If you use su to change to a user specified through TACACS+, the user becomes the local tacacs0 thru tacacs15 user instead of the named user to run sudo commands. As a result, the named user password might not match the local tacacs0 thru tacacs15 user password. | 3.7.0-3.7.16, 4.0.0-4.4.5, 5.0.0-5.6.0 | | | [3216922](#3216922)
None | RADIUS authenticated users with read-only access to NCLU commands (users in the users_with_show list) can run edit commands if a username for a non-local account is on the users_with_edit line of the /etc/netd.conf file. To work around this issue, make sure that all usernames on the users_with_edit line of the /etc/netd.conf file are configured local users for the system (real Linux users). | 3.7.0-5.2.1 | 5.3.0-5.6.0| @@ -1106,7 +1106,7 @@ pdfhidden: True | [2687332](#2687332)
| When you configure BGP aggregate-address summary-only and any component route within the summary updates, all component routes within the summary update in the RIB on the device advertising the summary. This condition might result in increased CPU usage
To workaround this issue, remove the aggregate-address summary-only configuration, add a static route to Null0 for the prefix, and configure an outbound route map to restrict anything more specific than the desired prefix from being advertised. For example: Before:
address-family ipv4 unicast
aggregate-address 10.10.0.0/16 summary-only
redistribute connected
After:
ip route 10.10.0.0/16 Null0
!
address-family ipv4 unicast
redistribute connected route-map DENY-COMPONENTS
redistribute static
exit-address-family
ip prefix-list NO-COMPONENTS seq 5 permit 10.10.0.0/16 ge 17
!
route-map DENY-COMPONENTS deny 10
match ip address prefix-list NO-COMPONENTS
!
route-map DENY-COMPONENTS permit 20
This example assumes no other static routes are present. Otherwise, you might need to configure additional route maps to limit the static routes being redistributed. | 3.7.12-4.2.1 | 4.3.0-4.4.5| | [2684452](#2684452)
| When a VTEP is rebooted, MAC address entries might become out of sync between the kernel fdb table and the EVPN MAC VNI table on remote VTEPs. The impacted MAC entries will be installed against the rebooted VTEP IP in the kernel fdb and the correct VTEP IP will be present in the EVPN MAC VNI table
You can work around this issue with the following steps:1. Clear all corrupted mac entries in the kernel FDB with the bridge fdb del
dev [dst\|via] command2. Add "vxlan-learning": "off" under /etc/network/ifupdown2/policy.d/vxlan.json
$ cat /etc/network/ifupdown2/policy.d/vxlan.json
{
"vxlan": {
"module_globals": { "vxlan-purge-remotes": "no" },
"defaults": {
"vxlan-ageing": "1800",
"vxlan-port": "4789", <==== This comma needs to be added at the end of this line
"vxlan-learning": "off" <= This line needs to be added
}
}
}
3. Reboot the affected switch(es) | 3.7.12-3.7.16 | | | [2684404](#2684404)
| CVE-2017-20005: NGINX has a buffer overflow for years that exceed four digits, as demonstrated by a file with a modification date in 1969 that causes an integer overflow (or a false modification date far in the future), when encountered by the autoindex module
Vulnerable: <= 1.6.2-5+deb8u8Fixed: 1.6.2-5+deb8u9 | 3.7.0-3.7.15 | 3.7.16| -| [2679950](#2679950)
| CVE-2021-25217: parsing of stored leases by dhclient or dhcpd has an incorrect length check that may cause a crash
Vulnerable: <= 4.3.1-6-cl3.7.14u1Fixed: 4.3.1-6-cl3.7.16u1 | 3.7.0-3.7.15, 4.0.0-4.3.1 | 3.7.16, 4.4.0-4.4.5| +| [2679950](#2679950)
| CVE-2021-25217: parsing of stored leases by dhclient or dhcpd has an incorrect length check that may cause a crash
Vulnerable: <= 4.3.1-6-cl3.7.14u1Fixed: 4.3.1-6-cl3.7.16u1 | 3.7.0-3.7.15, 4.0.0-4.3.2 | 3.7.16, 4.4.0-4.4.5| | [2677063](#2677063)
| CVE-2021-3541: "Parameter Laughs" attack related to parameter entities expansion
Vulnerable: <= 2.9.1+dfsg1-5+deb8u10Fixed: 2.9.1+dfsg1-5+deb8u11 | 3.7.0-3.7.15 | 3.7.16| | [2677061](#2677061)
| CVE-2021-23017: off-by-one in Nginx, a high-performance web and reverse proxy server, which could result in denial of service and potentially the execution of arbitrary code
Vulnerable: <= 1.6.2-5+deb8u7Fixed: 1.6.2-5+deb8u8 | 3.7.0-3.7.15 | 3.7.16| | [2677060](#2677060)
| CVE-2021-23336: Python2.7 is vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter
Vulnerable: <= 2.7.9-2-ds1-1+deb8u6Fixed: 2.7.9-2-ds1-1+deb8u7 | 3.7.0-3.7.15 | 3.7.16| @@ -1126,7 +1126,7 @@ pdfhidden: True | [2638137](#2638137)
| When you delete a static route using NCLU, the configuration is not deleted from the running configuration or from the /etc/frr/frr.conf file. | 3.7.13-3.7.16 | | | [2635951](#2635951)
| The following vulnerability has been announced for the libgstreamer-plugins-base1.0-0 package. There is no CVE number yet; the Debian advisory number is ELA-412-1
Multiple vulnerabilities were discovered in plugins for the GStreamer media framework, which may result in denial of service or potentially the execution of arbitrary code if a malformed media file is opened
Vulnerable: <= 1.4.4-2+deb8u2Fixed: 1.4.4-2+deb8u3 | 3.7.0-3.7.14.2 | 3.7.15-3.7.16| | [2633245](#2633245)
| On the Dell N3048EP-ON switch, the SPF+ ports remain down after a power cycle. | 3.7.10-3.7.16 | | -| [2628515](#2628515)
| CVE-2020-12695: hostapd does not properly handle UPnP subscribe messages under certain conditions, allowing an attacker to cause a denial of service
Vulnerable: <= 2.8.0-cl3.7.15u2Fixed: 2.8.0-cl3.7.15u3 | 3.7.14-3.7.14.2, 4.3.0-4.3.1 | 3.7.15-3.7.16, 4.4.0-4.4.5| +| [2628515](#2628515)
| CVE-2020-12695: hostapd does not properly handle UPnP subscribe messages under certain conditions, allowing an attacker to cause a denial of service
Vulnerable: <= 2.8.0-cl3.7.15u2Fixed: 2.8.0-cl3.7.15u3 | 3.7.14-3.7.14.2, 4.3.0-4.3.2 | 3.7.15-3.7.16, 4.4.0-4.4.5| | [2617009](#2617009)
| CVE-2021-23358: missing input sanitising in the template() function of the Underscore JavaScript library could result in the execution of arbitrary code
Vulnerable: 1.7.0~dfsg-1Fixed: 1.7.0~dfsg-1+deb8u1 | 3.7.0-3.7.14.2 | 3.7.15-3.7.16| | [2617008](#2617008)
| CVE-2021-28831: The gunzip decompressor of Busybox, tiny utilities for small and embedded systems, mishandled the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data
Vulnerable: <= 1.22.0-9+deb8u4Fixed: 1.22.0-9+deb8u5 | 3.7.0-3.7.14.2 | 3.7.15-3.7.16| | [2617007](#2617007)
| CVE-2021-3443 CVE-2021-3467: Two issues have been found in jasper, a JPEG-2000 runtime library. Both issues are related to jpeg 2000 decoding, where a null pointer dereference and a missing check of valid component numbers referenced by CDEF box, could be exploited
Vulnerable: <= 1.900.1-debian1-2.4+deb8u9Fixed: 1.900.1-debian1-2.4+deb8u10 | 3.7.0-3.7.14.2 | 3.7.15-3.7.16| @@ -1140,12 +1140,12 @@ pdfhidden: True | [2589567](#2589567)
| The following vulnerabilities have been announced in Pillow, a Python imaging library, which can be used to cause a denial-of-service attack with crafted image files:CVE-2020-35653: PcxDecode has a buffer over-read when decoding a crafted PCX file because the user-supplied stride value is trusted for buffer calculations
CVE-2021-25290: In TiffDecode.c, there is a negative-offset memcpy with an invalid size
Vulnerable: <= 2.6.1-2+deb8u5FIxed: 2.6.1-2+deb8u6 | 3.7.0-3.7.14.2 | 3.7.15-3.7.16| | [2581473](#2581473)
| When netq-agent is installed on the Dell N3048EP platform, switchd might crash if pluggables are installed in the SFP+ ports. | 3.7.13-3.7.15 | 3.7.16| | [2574294](#2574294)
| CVE-2021-3410: A buffer overflow issue in caca_resize function in libcaca/caca/canvas.c may lead to local execution of arbitrary code in the user context
Vulnerable: <= 0.99.beta19-2+deb8u1Fixed: 0.99.beta19-2+deb8u2 | 3.7.14-3.7.14.2 | 3.7.15-3.7.16| -| [2566880](#2566880)
| CVE-2021-27803: A vulnerability was discovered in how p2p/p2p_pd.c in wpa_supplicant before 2.10 processes P2P (Wi-Fi Direct) provision discovery requests. It could result in denial of service or other impact (potentially execution of arbitrary code), for an attacker within radio range. | 3.7.14-3.7.14.2, 4.0.0-4.3.1 | 3.7.15-3.7.16, 4.4.0-4.4.5| +| [2566880](#2566880)
| CVE-2021-27803: A vulnerability was discovered in how p2p/p2p_pd.c in wpa_supplicant before 2.10 processes P2P (Wi-Fi Direct) provision discovery requests. It could result in denial of service or other impact (potentially execution of arbitrary code), for an attacker within radio range. | 3.7.14-3.7.14.2, 4.0.0-4.3.2 | 3.7.15-3.7.16, 4.4.0-4.4.5| | [2562511](#2562511)
| hostapd does not fail over to secondary RADIUS servers for 802.1x authentication when the primary radius is reachable but not responding to Access-Requests
If the primary RADIUS server is having a problem servicing requests, you can remove it from the configuration temporarily to force requests to be sent to alternate servers. | 3.7.10-3.7.14.2 | 3.7.15-3.7.16| | [2562396](#2562396)
| CVE-2020-27824: Global buffer overflow on irreversible conversion when too many decomposition levels are specified.
CVE-2020-27841: Crafted input to be processed by the openjpeg encoder could cause an out-of-bounds read.
CVE-2020-27845: Crafted input can cause out-of-bounds-read.
Vulnerable: <= 2.1.0-2+deb8u11
Fixed: 2.1.0-2+deb8u12 | 3.7.14-3.7.14.2 | 3.7.15-3.7.16| | [2562301](#2562301)
| CVE-2021-26937: encoding.c in GNU Screen through 4.8.0 allows remote attackers to cause a denial of service (invalid write access and application crash) or possibly have unspecified other impact via a crafted UTF-8 character sequence.
Vulnerable: <= 4.2.1-3+deb8u1
Fixed: 4.2.1-3+deb8u2 | 3.7.14-3.7.14.2 | 3.7.15-3.7.16| | [2556815](#2556815)
CM-33419 | When ARP suppression is enabled, RARP packets sometimes get dropped and are not flooded by the local VTEP.
To work around this issue, disable ARP suppression. | 3.7.14-4.3.0 | 4.3.1-4.4.5, 4.4.0-4.4.5| -| [2556782](#2556782)
CM-33398 | CVE-2021-0326: An issue has been found in wpa, a set of tools to support WPA and WPA2 (IEEE 802.11i). Missing validation of data can result in a buffer over-write, which might lead to a DoS of the wpa_supplicant process or potentially arbitrary code execution.
Vulnerable: <= 2.8.0-cl3.7.14u1, <= 2.8.0-cl4.2.1u1 | 3.7.14-3.7.14.2, 4.0.0-4.3.1 | 3.7.15-3.7.16, 4.4.0-4.4.5| +| [2556782](#2556782)
CM-33398 | CVE-2021-0326: An issue has been found in wpa, a set of tools to support WPA and WPA2 (IEEE 802.11i). Missing validation of data can result in a buffer over-write, which might lead to a DoS of the wpa_supplicant process or potentially arbitrary code execution.
Vulnerable: <= 2.8.0-cl3.7.14u1, <= 2.8.0-cl4.2.1u1 | 3.7.14-3.7.14.2, 4.0.0-4.3.2 | 3.7.15-3.7.16, 4.4.0-4.4.5| | [2556780](#2556780)
CM-33397 | CVE-2021-27212: A vulnerability in the Certificate List Exact Assertion validation was discovered in OpenLDAP, a free implementation of the Lightweight Directory Access Protocol. An unauthenticated remote attacker can take advantage of this flaw to cause a denial of service (slapd daemon crash) via specially crafted packets.
Vulnerable: <= 2.4.40+dfsg-1+deb8u9
Fixed: 2.4.40+dfsg-1+deb8u10 | 3.7.14-3.7.14.2 | 3.7.15-3.7.16| | [2556779](#2556779)
CM-33396 | CVE-2020-8625: Buffer overflow attack in the bind9 DNS server caused by an issue in the GSSAPI (“Generic Security Services”) security policy negotiation.
Vulnerable: <= 9.9.5.dfsg-9+deb8u20
Fixed: 9.9.5.dfsg-9+deb8u21 | 3.7.14-3.7.14.2 | 3.7.15-3.7.16| | [2556763](#2556763)
CM-33385 | In a configuration with both traditional and vlan-aware bridges, the VLAN membership check on a vlan-aware switch does not drop PVST BPBUs that come from a traditional bridge. | 3.7.14-4.3.0 | 4.3.1-4.4.5, 4.4.0-4.4.5| @@ -1227,7 +1227,7 @@ pdfhidden: True | [2549782](#2549782)
CM-29519 | The JSON format output of the net show bgp l2vpn evpn summary command shows the incorrect neighbour state. | 3.7.12-3.7.16, 4.0.0-4.4.5 | | | [2549731](#2549731)
CM-29492 | When you create SPAN or ERSPAN rules in ebtables, the action fails to install if it is not in lowercase. Make sure that the SPAN or ERSPAN action is all lowercase; for example:

[ebtables]
-A FORWARD --in-interface swp10 -j span --dport swp1
| 3.7.12-3.7.16, 4.1.1-4.4.5 | | | [2549472](#2549472)
CM-29367 | On switches with the Trident3 ASIC, PFC is not working as expected. If you set the PFC for only one CoS, pause frames are sent for all CoS traffic. | 3.7.11-4.1.1 | 4.2.0-4.4.5| -| [2549371](#2549371)
CM-29309 | When Optimized Multicast Flooding (OMF) is enabled with the bridge.optimized_mcast_flood = TRUE setting in the /etc/cumulus/switchd.conf file, the switch continues to flood IPv6 multicast traffic to all slave ports when there is no MLD join receive. | 3.7.11-4.3.1 | 4.4.0-4.4.5| +| [2549371](#2549371)
CM-29309 | When Optimized Multicast Flooding (OMF) is enabled with the bridge.optimized_mcast_flood = TRUE setting in the /etc/cumulus/switchd.conf file, the switch continues to flood IPv6 multicast traffic to all slave ports when there is no MLD join receive. | 3.7.11-4.3.2 | 4.4.0-4.4.5| | [2549307](#2549307)
| The following vulnerabilities affect git, which is available in the repository for optional installation:
CVE-2020-5260: Felix Wilhelm of Google Project Zero discovered a flaw in git, a fast, scalable, distributed revision control system. With a crafted URL that contains a newline, the credential helper machinery can be fooled to return credential information for a wrong host.
CVE-2020-11008: Carlo Arenas discovered a flaw in git, a fast, scalable, distributed revision control system. With a crafted URL that contains a newline or empty host, or lacks a scheme, the credential helper machinery can be fooled into providing credential information that is not appropriate for the protocol in use and host being contacted. | 3.7.12-4.1.1 | 4.2.0-4.4.5| | [2549226](#2549226)
CM-29259 | You might see the following gport error messages in switchd.log:

2020-04-10T19:50:01.011224+09:00 E1PDX0V1ELF0001 6 switchd[925]: hal_bcm_mdb.c:530 gport 0x800007a find failed
2020-04-10T19:50:01.011631+09:00 E1PDX0V1ELF0001 6 switchd[925]: hal_bcm_mdb.c:530 gport 0x8000009 find failed

These messages are harmless and can be ignored. | 3.7.12-3.7.14.2, 4.0.0-4.2.1 | 3.7.15-3.7.16, 4.3.0-4.4.5| | [2548962](#2548962)
CM-29165 | With FRR or OSPF, you might see an inconsistent link-state advertisement. For example, when you configure the OSPF default originate route as metric-type 1 with a specific metric, Cumulus Linux shows the default originate route as an external metric-type 2 route with the default metric in the database. This issue typically occurs when both IPv4 and IPv6 default routes exist in the routing table. | 3.7.12-4.1.1 | 4.2.0-4.4.5| @@ -1417,8 +1417,8 @@ pdfhidden: True | Issue ID | Description | Affects | Fixed | |--- |--- |--- |--- | -| [3418046](#3418046)
None | If MLAG is configured but disconnected from an MLAG peer for an extended period of time (days or more), there is a long delay (up to a minute per day) before traffic forwarding stabilizes after the MLAG peer connection re-establishes. | 3.7.0-5.4.0 | 5.5.0-5.6.0| -| [3376798](#3376798)
| On Broadcom switches, Cumulus Linux does not create the hardware bridging domain for a traditional bridge with a VXLAN interface during switchd restart. The /var/log/switchd.log file includes the following exception logs shortly after switchd restarts:
switchd[30158]: hal_bcm_l3.c:1617 find_egr_path_if_vxlan_overlay:vxlan overlay : nh PORT: port <#>, vlan . not yet ready
MAC learning looks correct, but traffic does not flow as expected. | 3.7.0-3.7.16, 4.3.1-4.4.5 | | +| [3418046](#3418046)
None | If MLAG is configured but disconnected from an MLAG peer for an extended period of time (days or more), there is a long delay (up to a minute per day) before traffic forwarding stabilizes after the MLAG peer connection re-establishes. | 3.7.0-4.3.1 | 4.3.2-4.4.5, 5.5.0-5.6.0| +| [3376798](#3376798)
| On Broadcom switches, Cumulus Linux does not create the hardware bridging domain for a traditional bridge with a VXLAN interface during switchd restart. The /var/log/switchd.log file includes the following exception logs shortly after switchd restarts:
switchd[30158]: hal_bcm_l3.c:1617 find_egr_path_if_vxlan_overlay:vxlan overlay : nh PORT: port <#>, vlan . not yet ready
MAC learning looks correct, but traffic does not flow as expected. | 3.7.0-4.3.1 | 4.3.2-4.4.5| | [3330705](#3330705)
| When using TACACS+, a TACACS+ server name that returns more than one IP address, such as an IPv6 and IPv4 address, is counted many times against the limit of seven TACACS+ servers, which might cause some of the later listed servers to be ignored as over the limit. To work around this issue, you can set the prefer_ip_version configuration option (the default value is 4) to choose between an IPv4 or IPv6 address if both are present. | 3.7.0-5.3.1 | 5.4.0-5.6.0| | [3327477](#3327477)
| If you use su to change to a user specified through TACACS+, the user becomes the local tacacs0 thru tacacs15 user instead of the named user to run sudo commands. As a result, the named user password might not match the local tacacs0 thru tacacs15 user password. | 3.7.0-3.7.16, 4.0.0-4.4.5, 5.0.0-5.6.0 | | | [3216922](#3216922)
None | RADIUS authenticated users with read-only access to NCLU commands (users in the users_with_show list) can run edit commands if a username for a non-local account is on the users_with_edit line of the /etc/netd.conf file. To work around this issue, make sure that all usernames on the users_with_edit line of the /etc/netd.conf file are configured local users for the system (real Linux users). | 3.7.0-5.2.1 | 5.3.0-5.6.0| @@ -1486,7 +1486,7 @@ pdfhidden: True | [2687332](#2687332)
| When you configure BGP aggregate-address summary-only and any component route within the summary updates, all component routes within the summary update in the RIB on the device advertising the summary. This condition might result in increased CPU usage
To workaround this issue, remove the aggregate-address summary-only configuration, add a static route to Null0 for the prefix, and configure an outbound route map to restrict anything more specific than the desired prefix from being advertised. For example: Before:
address-family ipv4 unicast
aggregate-address 10.10.0.0/16 summary-only
redistribute connected
After:
ip route 10.10.0.0/16 Null0
!
address-family ipv4 unicast
redistribute connected route-map DENY-COMPONENTS
redistribute static
exit-address-family
ip prefix-list NO-COMPONENTS seq 5 permit 10.10.0.0/16 ge 17
!
route-map DENY-COMPONENTS deny 10
match ip address prefix-list NO-COMPONENTS
!
route-map DENY-COMPONENTS permit 20
This example assumes no other static routes are present. Otherwise, you might need to configure additional route maps to limit the static routes being redistributed. | 3.7.12-4.2.1 | 4.3.0-4.4.5| | [2684452](#2684452)
| When a VTEP is rebooted, MAC address entries might become out of sync between the kernel fdb table and the EVPN MAC VNI table on remote VTEPs. The impacted MAC entries will be installed against the rebooted VTEP IP in the kernel fdb and the correct VTEP IP will be present in the EVPN MAC VNI table
You can work around this issue with the following steps:1. Clear all corrupted mac entries in the kernel FDB with the bridge fdb del
dev [dst\|via] command2. Add "vxlan-learning": "off" under /etc/network/ifupdown2/policy.d/vxlan.json
$ cat /etc/network/ifupdown2/policy.d/vxlan.json
{
"vxlan": {
"module_globals": { "vxlan-purge-remotes": "no" },
"defaults": {
"vxlan-ageing": "1800",
"vxlan-port": "4789", <==== This comma needs to be added at the end of this line
"vxlan-learning": "off" <= This line needs to be added
}
}
}
3. Reboot the affected switch(es) | 3.7.12-3.7.16 | | | [2684404](#2684404)
| CVE-2017-20005: NGINX has a buffer overflow for years that exceed four digits, as demonstrated by a file with a modification date in 1969 that causes an integer overflow (or a false modification date far in the future), when encountered by the autoindex module
Vulnerable: <= 1.6.2-5+deb8u8Fixed: 1.6.2-5+deb8u9 | 3.7.0-3.7.15 | 3.7.16| -| [2679950](#2679950)
| CVE-2021-25217: parsing of stored leases by dhclient or dhcpd has an incorrect length check that may cause a crash
Vulnerable: <= 4.3.1-6-cl3.7.14u1Fixed: 4.3.1-6-cl3.7.16u1 | 3.7.0-3.7.15, 4.0.0-4.3.1 | 3.7.16, 4.4.0-4.4.5| +| [2679950](#2679950)
| CVE-2021-25217: parsing of stored leases by dhclient or dhcpd has an incorrect length check that may cause a crash
Vulnerable: <= 4.3.1-6-cl3.7.14u1Fixed: 4.3.1-6-cl3.7.16u1 | 3.7.0-3.7.15, 4.0.0-4.3.2 | 3.7.16, 4.4.0-4.4.5| | [2677063](#2677063)
| CVE-2021-3541: "Parameter Laughs" attack related to parameter entities expansion
Vulnerable: <= 2.9.1+dfsg1-5+deb8u10Fixed: 2.9.1+dfsg1-5+deb8u11 | 3.7.0-3.7.15 | 3.7.16| | [2677061](#2677061)
| CVE-2021-23017: off-by-one in Nginx, a high-performance web and reverse proxy server, which could result in denial of service and potentially the execution of arbitrary code
Vulnerable: <= 1.6.2-5+deb8u7Fixed: 1.6.2-5+deb8u8 | 3.7.0-3.7.15 | 3.7.16| | [2677060](#2677060)
| CVE-2021-23336: Python2.7 is vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter
Vulnerable: <= 2.7.9-2-ds1-1+deb8u6Fixed: 2.7.9-2-ds1-1+deb8u7 | 3.7.0-3.7.15 | 3.7.16| @@ -1606,7 +1606,7 @@ pdfhidden: True | [2549782](#2549782)
CM-29519 | The JSON format output of the net show bgp l2vpn evpn summary command shows the incorrect neighbour state. | 3.7.12-3.7.16, 4.0.0-4.4.5 | | | [2549731](#2549731)
CM-29492 | When you create SPAN or ERSPAN rules in ebtables, the action fails to install if it is not in lowercase. Make sure that the SPAN or ERSPAN action is all lowercase; for example:

[ebtables]
-A FORWARD --in-interface swp10 -j span --dport swp1
| 3.7.12-3.7.16, 4.1.1-4.4.5 | | | [2549472](#2549472)
CM-29367 | On switches with the Trident3 ASIC, PFC is not working as expected. If you set the PFC for only one CoS, pause frames are sent for all CoS traffic. | 3.7.11-4.1.1 | 4.2.0-4.4.5| -| [2549371](#2549371)
CM-29309 | When Optimized Multicast Flooding (OMF) is enabled with the bridge.optimized_mcast_flood = TRUE setting in the /etc/cumulus/switchd.conf file, the switch continues to flood IPv6 multicast traffic to all slave ports when there is no MLD join receive. | 3.7.11-4.3.1 | 4.4.0-4.4.5| +| [2549371](#2549371)
CM-29309 | When Optimized Multicast Flooding (OMF) is enabled with the bridge.optimized_mcast_flood = TRUE setting in the /etc/cumulus/switchd.conf file, the switch continues to flood IPv6 multicast traffic to all slave ports when there is no MLD join receive. | 3.7.11-4.3.2 | 4.4.0-4.4.5| | [2549307](#2549307)
| The following vulnerabilities affect git, which is available in the repository for optional installation:
CVE-2020-5260: Felix Wilhelm of Google Project Zero discovered a flaw in git, a fast, scalable, distributed revision control system. With a crafted URL that contains a newline, the credential helper machinery can be fooled to return credential information for a wrong host.
CVE-2020-11008: Carlo Arenas discovered a flaw in git, a fast, scalable, distributed revision control system. With a crafted URL that contains a newline or empty host, or lacks a scheme, the credential helper machinery can be fooled into providing credential information that is not appropriate for the protocol in use and host being contacted. | 3.7.12-4.1.1 | 4.2.0-4.4.5| | [2549226](#2549226)
CM-29259 | You might see the following gport error messages in switchd.log:

2020-04-10T19:50:01.011224+09:00 E1PDX0V1ELF0001 6 switchd[925]: hal_bcm_mdb.c:530 gport 0x800007a find failed
2020-04-10T19:50:01.011631+09:00 E1PDX0V1ELF0001 6 switchd[925]: hal_bcm_mdb.c:530 gport 0x8000009 find failed

These messages are harmless and can be ignored. | 3.7.12-3.7.14.2, 4.0.0-4.2.1 | 3.7.15-3.7.16, 4.3.0-4.4.5| | [2548962](#2548962)
CM-29165 | With FRR or OSPF, you might see an inconsistent link-state advertisement. For example, when you configure the OSPF default originate route as metric-type 1 with a specific metric, Cumulus Linux shows the default originate route as an external metric-type 2 route with the default metric in the database. This issue typically occurs when both IPv4 and IPv6 default routes exist in the routing table. | 3.7.12-4.1.1 | 4.2.0-4.4.5| @@ -1799,8 +1799,8 @@ pdfhidden: True | Issue ID | Description | Affects | Fixed | |--- |--- |--- |--- | -| [3418046](#3418046)
None | If MLAG is configured but disconnected from an MLAG peer for an extended period of time (days or more), there is a long delay (up to a minute per day) before traffic forwarding stabilizes after the MLAG peer connection re-establishes. | 3.7.0-5.4.0 | 5.5.0-5.6.0| -| [3376798](#3376798)
| On Broadcom switches, Cumulus Linux does not create the hardware bridging domain for a traditional bridge with a VXLAN interface during switchd restart. The /var/log/switchd.log file includes the following exception logs shortly after switchd restarts:
switchd[30158]: hal_bcm_l3.c:1617 find_egr_path_if_vxlan_overlay:vxlan overlay : nh PORT: port <#>, vlan . not yet ready
MAC learning looks correct, but traffic does not flow as expected. | 3.7.0-3.7.16, 4.3.1-4.4.5 | | +| [3418046](#3418046)
None | If MLAG is configured but disconnected from an MLAG peer for an extended period of time (days or more), there is a long delay (up to a minute per day) before traffic forwarding stabilizes after the MLAG peer connection re-establishes. | 3.7.0-4.3.1 | 4.3.2-4.4.5, 5.5.0-5.6.0| +| [3376798](#3376798)
| On Broadcom switches, Cumulus Linux does not create the hardware bridging domain for a traditional bridge with a VXLAN interface during switchd restart. The /var/log/switchd.log file includes the following exception logs shortly after switchd restarts:
switchd[30158]: hal_bcm_l3.c:1617 find_egr_path_if_vxlan_overlay:vxlan overlay : nh PORT: port <#>, vlan . not yet ready
MAC learning looks correct, but traffic does not flow as expected. | 3.7.0-4.3.1 | 4.3.2-4.4.5| | [3330705](#3330705)
| When using TACACS+, a TACACS+ server name that returns more than one IP address, such as an IPv6 and IPv4 address, is counted many times against the limit of seven TACACS+ servers, which might cause some of the later listed servers to be ignored as over the limit. To work around this issue, you can set the prefer_ip_version configuration option (the default value is 4) to choose between an IPv4 or IPv6 address if both are present. | 3.7.0-5.3.1 | 5.4.0-5.6.0| | [3327477](#3327477)
| If you use su to change to a user specified through TACACS+, the user becomes the local tacacs0 thru tacacs15 user instead of the named user to run sudo commands. As a result, the named user password might not match the local tacacs0 thru tacacs15 user password. | 3.7.0-3.7.16, 4.0.0-4.4.5, 5.0.0-5.6.0 | | | [3216922](#3216922)
None | RADIUS authenticated users with read-only access to NCLU commands (users in the users_with_show list) can run edit commands if a username for a non-local account is on the users_with_edit line of the /etc/netd.conf file. To work around this issue, make sure that all usernames on the users_with_edit line of the /etc/netd.conf file are configured local users for the system (real Linux users). | 3.7.0-5.2.1 | 5.3.0-5.6.0| @@ -1867,7 +1867,7 @@ pdfhidden: True | [2687332](#2687332)
| When you configure BGP aggregate-address summary-only and any component route within the summary updates, all component routes within the summary update in the RIB on the device advertising the summary. This condition might result in increased CPU usage
To workaround this issue, remove the aggregate-address summary-only configuration, add a static route to Null0 for the prefix, and configure an outbound route map to restrict anything more specific than the desired prefix from being advertised. For example: Before:
address-family ipv4 unicast
aggregate-address 10.10.0.0/16 summary-only
redistribute connected
After:
ip route 10.10.0.0/16 Null0
!
address-family ipv4 unicast
redistribute connected route-map DENY-COMPONENTS
redistribute static
exit-address-family
ip prefix-list NO-COMPONENTS seq 5 permit 10.10.0.0/16 ge 17
!
route-map DENY-COMPONENTS deny 10
match ip address prefix-list NO-COMPONENTS
!
route-map DENY-COMPONENTS permit 20
This example assumes no other static routes are present. Otherwise, you might need to configure additional route maps to limit the static routes being redistributed. | 3.7.12-4.2.1 | 4.3.0-4.4.5| | [2684452](#2684452)
| When a VTEP is rebooted, MAC address entries might become out of sync between the kernel fdb table and the EVPN MAC VNI table on remote VTEPs. The impacted MAC entries will be installed against the rebooted VTEP IP in the kernel fdb and the correct VTEP IP will be present in the EVPN MAC VNI table
You can work around this issue with the following steps:1. Clear all corrupted mac entries in the kernel FDB with the bridge fdb del
dev [dst\|via] command2. Add "vxlan-learning": "off" under /etc/network/ifupdown2/policy.d/vxlan.json
$ cat /etc/network/ifupdown2/policy.d/vxlan.json
{
"vxlan": {
"module_globals": { "vxlan-purge-remotes": "no" },
"defaults": {
"vxlan-ageing": "1800",
"vxlan-port": "4789", <==== This comma needs to be added at the end of this line
"vxlan-learning": "off" <= This line needs to be added
}
}
}
3. Reboot the affected switch(es) | 3.7.12-3.7.16 | | | [2684404](#2684404)
| CVE-2017-20005: NGINX has a buffer overflow for years that exceed four digits, as demonstrated by a file with a modification date in 1969 that causes an integer overflow (or a false modification date far in the future), when encountered by the autoindex module
Vulnerable: <= 1.6.2-5+deb8u8Fixed: 1.6.2-5+deb8u9 | 3.7.0-3.7.15 | 3.7.16| -| [2679950](#2679950)
| CVE-2021-25217: parsing of stored leases by dhclient or dhcpd has an incorrect length check that may cause a crash
Vulnerable: <= 4.3.1-6-cl3.7.14u1Fixed: 4.3.1-6-cl3.7.16u1 | 3.7.0-3.7.15, 4.0.0-4.3.1 | 3.7.16, 4.4.0-4.4.5| +| [2679950](#2679950)
| CVE-2021-25217: parsing of stored leases by dhclient or dhcpd has an incorrect length check that may cause a crash
Vulnerable: <= 4.3.1-6-cl3.7.14u1Fixed: 4.3.1-6-cl3.7.16u1 | 3.7.0-3.7.15, 4.0.0-4.3.2 | 3.7.16, 4.4.0-4.4.5| | [2677063](#2677063)
| CVE-2021-3541: "Parameter Laughs" attack related to parameter entities expansion
Vulnerable: <= 2.9.1+dfsg1-5+deb8u10Fixed: 2.9.1+dfsg1-5+deb8u11 | 3.7.0-3.7.15 | 3.7.16| | [2677061](#2677061)
| CVE-2021-23017: off-by-one in Nginx, a high-performance web and reverse proxy server, which could result in denial of service and potentially the execution of arbitrary code
Vulnerable: <= 1.6.2-5+deb8u7Fixed: 1.6.2-5+deb8u8 | 3.7.0-3.7.15 | 3.7.16| | [2677060](#2677060)
| CVE-2021-23336: Python2.7 is vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter
Vulnerable: <= 2.7.9-2-ds1-1+deb8u6Fixed: 2.7.9-2-ds1-1+deb8u7 | 3.7.0-3.7.15 | 3.7.16| @@ -1985,7 +1985,7 @@ pdfhidden: True | [2549676](#2549676)
CM-29471 | After you add or remove a bridge VLAN identifier (VID) on a trunk port, the layer 2 VNI is put into VLAN 1.
To work around this issue, revert the configuration change. | 3.7.10-4.1.1 | 4.2.0-4.4.5| | [2549472](#2549472)
CM-29367 | On switches with the Trident3 ASIC, PFC is not working as expected. If you set the PFC for only one CoS, pause frames are sent for all CoS traffic. | 3.7.11-4.1.1 | 4.2.0-4.4.5| | [2549397](#2549397)
CM-29322 | When the BGP Multi-protocol Unreach NLRI attribute is received in a BGP update without a next hop attribute, the BGP session is brought down unexpectedly. RFC 4760 defines that the next-hop attribute is not required for updates containing MP_UNREACH_NLRI. | 3.7.12 | 3.7.13-3.7.16, 4.0.0-4.4.5| -| [2549371](#2549371)
CM-29309 | When Optimized Multicast Flooding (OMF) is enabled with the bridge.optimized_mcast_flood = TRUE setting in the /etc/cumulus/switchd.conf file, the switch continues to flood IPv6 multicast traffic to all slave ports when there is no MLD join receive. | 3.7.11-4.3.1 | 4.4.0-4.4.5| +| [2549371](#2549371)
CM-29309 | When Optimized Multicast Flooding (OMF) is enabled with the bridge.optimized_mcast_flood = TRUE setting in the /etc/cumulus/switchd.conf file, the switch continues to flood IPv6 multicast traffic to all slave ports when there is no MLD join receive. | 3.7.11-4.3.2 | 4.4.0-4.4.5| | [2549307](#2549307)
| The following vulnerabilities affect git, which is available in the repository for optional installation:
CVE-2020-5260: Felix Wilhelm of Google Project Zero discovered a flaw in git, a fast, scalable, distributed revision control system. With a crafted URL that contains a newline, the credential helper machinery can be fooled to return credential information for a wrong host.
CVE-2020-11008: Carlo Arenas discovered a flaw in git, a fast, scalable, distributed revision control system. With a crafted URL that contains a newline or empty host, or lacks a scheme, the credential helper machinery can be fooled into providing credential information that is not appropriate for the protocol in use and host being contacted. | 3.7.12-4.1.1 | 4.2.0-4.4.5| | [2549226](#2549226)
CM-29259 | You might see the following gport error messages in switchd.log:

2020-04-10T19:50:01.011224+09:00 E1PDX0V1ELF0001 6 switchd[925]: hal_bcm_mdb.c:530 gport 0x800007a find failed
2020-04-10T19:50:01.011631+09:00 E1PDX0V1ELF0001 6 switchd[925]: hal_bcm_mdb.c:530 gport 0x8000009 find failed

These messages are harmless and can be ignored. | 3.7.12-3.7.14.2, 4.0.0-4.2.1 | 3.7.15-3.7.16, 4.3.0-4.4.5| | [2548962](#2548962)
CM-29165 | With FRR or OSPF, you might see an inconsistent link-state advertisement. For example, when you configure the OSPF default originate route as metric-type 1 with a specific metric, Cumulus Linux shows the default originate route as an external metric-type 2 route with the default metric in the database. This issue typically occurs when both IPv4 and IPv6 default routes exist in the routing table. | 3.7.12-4.1.1 | 4.2.0-4.4.5| @@ -2180,8 +2180,8 @@ pdfhidden: True | Issue ID | Description | Affects | Fixed | |--- |--- |--- |--- | -| [3418046](#3418046)
None | If MLAG is configured but disconnected from an MLAG peer for an extended period of time (days or more), there is a long delay (up to a minute per day) before traffic forwarding stabilizes after the MLAG peer connection re-establishes. | 3.7.0-5.4.0 | 5.5.0-5.6.0| -| [3376798](#3376798)
| On Broadcom switches, Cumulus Linux does not create the hardware bridging domain for a traditional bridge with a VXLAN interface during switchd restart. The /var/log/switchd.log file includes the following exception logs shortly after switchd restarts:
switchd[30158]: hal_bcm_l3.c:1617 find_egr_path_if_vxlan_overlay:vxlan overlay : nh PORT: port <#>, vlan . not yet ready
MAC learning looks correct, but traffic does not flow as expected. | 3.7.0-3.7.16, 4.3.1-4.4.5 | | +| [3418046](#3418046)
None | If MLAG is configured but disconnected from an MLAG peer for an extended period of time (days or more), there is a long delay (up to a minute per day) before traffic forwarding stabilizes after the MLAG peer connection re-establishes. | 3.7.0-4.3.1 | 4.3.2-4.4.5, 5.5.0-5.6.0| +| [3376798](#3376798)
| On Broadcom switches, Cumulus Linux does not create the hardware bridging domain for a traditional bridge with a VXLAN interface during switchd restart. The /var/log/switchd.log file includes the following exception logs shortly after switchd restarts:
switchd[30158]: hal_bcm_l3.c:1617 find_egr_path_if_vxlan_overlay:vxlan overlay : nh PORT: port <#>, vlan . not yet ready
MAC learning looks correct, but traffic does not flow as expected. | 3.7.0-4.3.1 | 4.3.2-4.4.5| | [3330705](#3330705)
| When using TACACS+, a TACACS+ server name that returns more than one IP address, such as an IPv6 and IPv4 address, is counted many times against the limit of seven TACACS+ servers, which might cause some of the later listed servers to be ignored as over the limit. To work around this issue, you can set the prefer_ip_version configuration option (the default value is 4) to choose between an IPv4 or IPv6 address if both are present. | 3.7.0-5.3.1 | 5.4.0-5.6.0| | [3327477](#3327477)
| If you use su to change to a user specified through TACACS+, the user becomes the local tacacs0 thru tacacs15 user instead of the named user to run sudo commands. As a result, the named user password might not match the local tacacs0 thru tacacs15 user password. | 3.7.0-3.7.16, 4.0.0-4.4.5, 5.0.0-5.6.0 | | | [3216922](#3216922)
None | RADIUS authenticated users with read-only access to NCLU commands (users in the users_with_show list) can run edit commands if a username for a non-local account is on the users_with_edit line of the /etc/netd.conf file. To work around this issue, make sure that all usernames on the users_with_edit line of the /etc/netd.conf file are configured local users for the system (real Linux users). | 3.7.0-5.2.1 | 5.3.0-5.6.0| @@ -2234,7 +2234,7 @@ pdfhidden: True | [2705168](#2705168)
| CVE-2020-26558: Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.
CVE-2021-0129: Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access
Vulnerable: <= 5.43-2+deb9u2~deb8u2Fixed: 5.43-2+deb9u2~deb8u3 | 3.7.0-3.7.15 | 3.7.16| | [2702519](#2702519)
| CVE-2021-33560: Mishandling of ElGamal encryption results in a possible side-channel attack and an interoperability problem with keys not generated by GnuPG/libgcrypt
Vulnerable: <= 1.6.3-2+deb8u8Fixed: 1.6.2-2+dev8u9 | 3.7.0-3.7.15 | 3.7.16| | [2684404](#2684404)
| CVE-2017-20005: NGINX has a buffer overflow for years that exceed four digits, as demonstrated by a file with a modification date in 1969 that causes an integer overflow (or a false modification date far in the future), when encountered by the autoindex module
Vulnerable: <= 1.6.2-5+deb8u8Fixed: 1.6.2-5+deb8u9 | 3.7.0-3.7.15 | 3.7.16| -| [2679950](#2679950)
| CVE-2021-25217: parsing of stored leases by dhclient or dhcpd has an incorrect length check that may cause a crash
Vulnerable: <= 4.3.1-6-cl3.7.14u1Fixed: 4.3.1-6-cl3.7.16u1 | 3.7.0-3.7.15, 4.0.0-4.3.1 | 3.7.16, 4.4.0-4.4.5| +| [2679950](#2679950)
| CVE-2021-25217: parsing of stored leases by dhclient or dhcpd has an incorrect length check that may cause a crash
Vulnerable: <= 4.3.1-6-cl3.7.14u1Fixed: 4.3.1-6-cl3.7.16u1 | 3.7.0-3.7.15, 4.0.0-4.3.2 | 3.7.16, 4.4.0-4.4.5| | [2677063](#2677063)
| CVE-2021-3541: "Parameter Laughs" attack related to parameter entities expansion
Vulnerable: <= 2.9.1+dfsg1-5+deb8u10Fixed: 2.9.1+dfsg1-5+deb8u11 | 3.7.0-3.7.15 | 3.7.16| | [2677061](#2677061)
| CVE-2021-23017: off-by-one in Nginx, a high-performance web and reverse proxy server, which could result in denial of service and potentially the execution of arbitrary code
Vulnerable: <= 1.6.2-5+deb8u7Fixed: 1.6.2-5+deb8u8 | 3.7.0-3.7.15 | 3.7.16| | [2677060](#2677060)
| CVE-2021-23336: Python2.7 is vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter
Vulnerable: <= 2.7.9-2-ds1-1+deb8u6Fixed: 2.7.9-2-ds1-1+deb8u7 | 3.7.0-3.7.15 | 3.7.16| @@ -2288,7 +2288,7 @@ pdfhidden: True | [2549794](#2549794)
CM-29525 | The asic-monitor.service fails when you configure /etc/cumulus/datapath/monitor.conf with monitor.histogram_pg.collect.port_group_list = [all_packet_pg] and there is traffic passing through the buffer. When the service fails, you see the following traceback in journalctl:

asic-monitor[7389]: asic-monitor-module INFO: 2020-05-01 18:28:12.548734: Egress queue(s) greater than 500 bytes in monitor port group histogram_pg
asic-monitor[7389]: asic-monitor ERROR: ASIC monitor exception: sx_api_port_counter_tc_get failed: Parameter Error
asic-monitor[7389]: File "/usr/bin/asic-monitor", line 139, in
asic-monitor[7389]: main(sys.argv[1:])
asic-monitor[7389]: File "/usr/bin/asic-monitor", line 126, in main
asic-monitor[7389]: traceback.print_stack()
asic-monitor[7389]: Traceback (most recent call last):
asic-monitor[7389]: File "/usr/bin/asic-monitor", line 117, in main
asic-monitor[7389]: monitor.run()
asic-monitor[7389]: File "/usr/lib/python2.7/dist-packages/cumulus/asic_monitor.py", line 158, in run
...
| 3.7.11-3.7.13, 4.1.1-4.2.0 | 3.7.14-3.7.16, 4.2.1-4.4.5| | [2549676](#2549676)
CM-29471 | After you add or remove a bridge VLAN identifier (VID) on a trunk port, the layer 2 VNI is put into VLAN 1.
To work around this issue, revert the configuration change. | 3.7.10-4.1.1 | 4.2.0-4.4.5| | [2549472](#2549472)
CM-29367 | On switches with the Trident3 ASIC, PFC is not working as expected. If you set the PFC for only one CoS, pause frames are sent for all CoS traffic. | 3.7.11-4.1.1 | 4.2.0-4.4.5| -| [2549371](#2549371)
CM-29309 | When Optimized Multicast Flooding (OMF) is enabled with the bridge.optimized_mcast_flood = TRUE setting in the /etc/cumulus/switchd.conf file, the switch continues to flood IPv6 multicast traffic to all slave ports when there is no MLD join receive. | 3.7.11-4.3.1 | 4.4.0-4.4.5| +| [2549371](#2549371)
CM-29309 | When Optimized Multicast Flooding (OMF) is enabled with the bridge.optimized_mcast_flood = TRUE setting in the /etc/cumulus/switchd.conf file, the switch continues to flood IPv6 multicast traffic to all slave ports when there is no MLD join receive. | 3.7.11-4.3.2 | 4.4.0-4.4.5| | [2548930](#2548930)
CM-29148 | On Mellanox Spectrum switches that contain an OSPF IP unnumbered neighborship with a high scale of prefixes being learned, a link flap might cause the neighbor entry to not be programmed in hardware. | 3.7.11-4.2.1 | 4.3.0-4.4.5| | [2548746](#2548746)
CM-29068 | On the Broadcom switch with the Trident3 ASIC, packet priority remark values assigned from each internal CoS value continue to work with default values; if you change the internal CoS value, the change does not take effect. | 3.7.11-4.1.1 | 4.2.0-4.4.5| | [2548673](#2548673)
CM-29044 | A large number of flapping peers causes FRR to require a corresponding update to internal data structures that track peer information. Updating this internal data structure does not delete links that are down due to the flapping. The size of this array then grows to contain both current peers as well as peers that should have been deleted during the flap processing. The contents of this array is processed by FRR to poll the links, which consumes CPU for all items in the array. This additional polling consumes more CPU than necessary but has no functional impact.
To work around this issue, restart FRR. | 3.7.11-4.1.1 | 4.2.0-4.4.5| @@ -2530,8 +2530,8 @@ pdfhidden: True | Issue ID | Description | Affects | Fixed | |--- |--- |--- |--- | -| [3418046](#3418046)
None | If MLAG is configured but disconnected from an MLAG peer for an extended period of time (days or more), there is a long delay (up to a minute per day) before traffic forwarding stabilizes after the MLAG peer connection re-establishes. | 3.7.0-5.4.0 | 5.5.0-5.6.0| -| [3376798](#3376798)
| On Broadcom switches, Cumulus Linux does not create the hardware bridging domain for a traditional bridge with a VXLAN interface during switchd restart. The /var/log/switchd.log file includes the following exception logs shortly after switchd restarts:
switchd[30158]: hal_bcm_l3.c:1617 find_egr_path_if_vxlan_overlay:vxlan overlay : nh PORT: port <#>, vlan . not yet ready
MAC learning looks correct, but traffic does not flow as expected. | 3.7.0-3.7.16, 4.3.1-4.4.5 | | +| [3418046](#3418046)
None | If MLAG is configured but disconnected from an MLAG peer for an extended period of time (days or more), there is a long delay (up to a minute per day) before traffic forwarding stabilizes after the MLAG peer connection re-establishes. | 3.7.0-4.3.1 | 4.3.2-4.4.5, 5.5.0-5.6.0| +| [3376798](#3376798)
| On Broadcom switches, Cumulus Linux does not create the hardware bridging domain for a traditional bridge with a VXLAN interface during switchd restart. The /var/log/switchd.log file includes the following exception logs shortly after switchd restarts:
switchd[30158]: hal_bcm_l3.c:1617 find_egr_path_if_vxlan_overlay:vxlan overlay : nh PORT: port <#>, vlan . not yet ready
MAC learning looks correct, but traffic does not flow as expected. | 3.7.0-4.3.1 | 4.3.2-4.4.5| | [3330705](#3330705)
| When using TACACS+, a TACACS+ server name that returns more than one IP address, such as an IPv6 and IPv4 address, is counted many times against the limit of seven TACACS+ servers, which might cause some of the later listed servers to be ignored as over the limit. To work around this issue, you can set the prefer_ip_version configuration option (the default value is 4) to choose between an IPv4 or IPv6 address if both are present. | 3.7.0-5.3.1 | 5.4.0-5.6.0| | [3327477](#3327477)
| If you use su to change to a user specified through TACACS+, the user becomes the local tacacs0 thru tacacs15 user instead of the named user to run sudo commands. As a result, the named user password might not match the local tacacs0 thru tacacs15 user password. | 3.7.0-3.7.16, 4.0.0-4.4.5, 5.0.0-5.6.0 | | | [3216922](#3216922)
None | RADIUS authenticated users with read-only access to NCLU commands (users in the users_with_show list) can run edit commands if a username for a non-local account is on the users_with_edit line of the /etc/netd.conf file. To work around this issue, make sure that all usernames on the users_with_edit line of the /etc/netd.conf file are configured local users for the system (real Linux users). | 3.7.0-5.2.1 | 5.3.0-5.6.0| @@ -2584,7 +2584,7 @@ pdfhidden: True | [2705168](#2705168)
| CVE-2020-26558: Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.
CVE-2021-0129: Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access
Vulnerable: <= 5.43-2+deb9u2~deb8u2Fixed: 5.43-2+deb9u2~deb8u3 | 3.7.0-3.7.15 | 3.7.16| | [2702519](#2702519)
| CVE-2021-33560: Mishandling of ElGamal encryption results in a possible side-channel attack and an interoperability problem with keys not generated by GnuPG/libgcrypt
Vulnerable: <= 1.6.3-2+deb8u8Fixed: 1.6.2-2+dev8u9 | 3.7.0-3.7.15 | 3.7.16| | [2684404](#2684404)
| CVE-2017-20005: NGINX has a buffer overflow for years that exceed four digits, as demonstrated by a file with a modification date in 1969 that causes an integer overflow (or a false modification date far in the future), when encountered by the autoindex module
Vulnerable: <= 1.6.2-5+deb8u8Fixed: 1.6.2-5+deb8u9 | 3.7.0-3.7.15 | 3.7.16| -| [2679950](#2679950)
| CVE-2021-25217: parsing of stored leases by dhclient or dhcpd has an incorrect length check that may cause a crash
Vulnerable: <= 4.3.1-6-cl3.7.14u1Fixed: 4.3.1-6-cl3.7.16u1 | 3.7.0-3.7.15, 4.0.0-4.3.1 | 3.7.16, 4.4.0-4.4.5| +| [2679950](#2679950)
| CVE-2021-25217: parsing of stored leases by dhclient or dhcpd has an incorrect length check that may cause a crash
Vulnerable: <= 4.3.1-6-cl3.7.14u1Fixed: 4.3.1-6-cl3.7.16u1 | 3.7.0-3.7.15, 4.0.0-4.3.2 | 3.7.16, 4.4.0-4.4.5| | [2677063](#2677063)
| CVE-2021-3541: "Parameter Laughs" attack related to parameter entities expansion
Vulnerable: <= 2.9.1+dfsg1-5+deb8u10Fixed: 2.9.1+dfsg1-5+deb8u11 | 3.7.0-3.7.15 | 3.7.16| | [2677061](#2677061)
| CVE-2021-23017: off-by-one in Nginx, a high-performance web and reverse proxy server, which could result in denial of service and potentially the execution of arbitrary code
Vulnerable: <= 1.6.2-5+deb8u7Fixed: 1.6.2-5+deb8u8 | 3.7.0-3.7.15 | 3.7.16| | [2677060](#2677060)
| CVE-2021-23336: Python2.7 is vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter
Vulnerable: <= 2.7.9-2-ds1-1+deb8u6Fixed: 2.7.9-2-ds1-1+deb8u7 | 3.7.0-3.7.15 | 3.7.16| @@ -2818,8 +2818,8 @@ pdfhidden: True | Issue ID | Description | Affects | Fixed | |--- |--- |--- |--- | -| [3418046](#3418046)
None | If MLAG is configured but disconnected from an MLAG peer for an extended period of time (days or more), there is a long delay (up to a minute per day) before traffic forwarding stabilizes after the MLAG peer connection re-establishes. | 3.7.0-5.4.0 | 5.5.0-5.6.0| -| [3376798](#3376798)
| On Broadcom switches, Cumulus Linux does not create the hardware bridging domain for a traditional bridge with a VXLAN interface during switchd restart. The /var/log/switchd.log file includes the following exception logs shortly after switchd restarts:
switchd[30158]: hal_bcm_l3.c:1617 find_egr_path_if_vxlan_overlay:vxlan overlay : nh PORT: port <#>, vlan . not yet ready
MAC learning looks correct, but traffic does not flow as expected. | 3.7.0-3.7.16, 4.3.1-4.4.5 | | +| [3418046](#3418046)
None | If MLAG is configured but disconnected from an MLAG peer for an extended period of time (days or more), there is a long delay (up to a minute per day) before traffic forwarding stabilizes after the MLAG peer connection re-establishes. | 3.7.0-4.3.1 | 4.3.2-4.4.5, 5.5.0-5.6.0| +| [3376798](#3376798)
| On Broadcom switches, Cumulus Linux does not create the hardware bridging domain for a traditional bridge with a VXLAN interface during switchd restart. The /var/log/switchd.log file includes the following exception logs shortly after switchd restarts:
switchd[30158]: hal_bcm_l3.c:1617 find_egr_path_if_vxlan_overlay:vxlan overlay : nh PORT: port <#>, vlan . not yet ready
MAC learning looks correct, but traffic does not flow as expected. | 3.7.0-4.3.1 | 4.3.2-4.4.5| | [3330705](#3330705)
| When using TACACS+, a TACACS+ server name that returns more than one IP address, such as an IPv6 and IPv4 address, is counted many times against the limit of seven TACACS+ servers, which might cause some of the later listed servers to be ignored as over the limit. To work around this issue, you can set the prefer_ip_version configuration option (the default value is 4) to choose between an IPv4 or IPv6 address if both are present. | 3.7.0-5.3.1 | 5.4.0-5.6.0| | [3327477](#3327477)
| If you use su to change to a user specified through TACACS+, the user becomes the local tacacs0 thru tacacs15 user instead of the named user to run sudo commands. As a result, the named user password might not match the local tacacs0 thru tacacs15 user password. | 3.7.0-3.7.16, 4.0.0-4.4.5, 5.0.0-5.6.0 | | | [3216922](#3216922)
None | RADIUS authenticated users with read-only access to NCLU commands (users in the users_with_show list) can run edit commands if a username for a non-local account is on the users_with_edit line of the /etc/netd.conf file. To work around this issue, make sure that all usernames on the users_with_edit line of the /etc/netd.conf file are configured local users for the system (real Linux users). | 3.7.0-5.2.1 | 5.3.0-5.6.0| @@ -2871,7 +2871,7 @@ pdfhidden: True | [2705168](#2705168)
| CVE-2020-26558: Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.
CVE-2021-0129: Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access
Vulnerable: <= 5.43-2+deb9u2~deb8u2Fixed: 5.43-2+deb9u2~deb8u3 | 3.7.0-3.7.15 | 3.7.16| | [2702519](#2702519)
| CVE-2021-33560: Mishandling of ElGamal encryption results in a possible side-channel attack and an interoperability problem with keys not generated by GnuPG/libgcrypt
Vulnerable: <= 1.6.3-2+deb8u8Fixed: 1.6.2-2+dev8u9 | 3.7.0-3.7.15 | 3.7.16| | [2684404](#2684404)
| CVE-2017-20005: NGINX has a buffer overflow for years that exceed four digits, as demonstrated by a file with a modification date in 1969 that causes an integer overflow (or a false modification date far in the future), when encountered by the autoindex module
Vulnerable: <= 1.6.2-5+deb8u8Fixed: 1.6.2-5+deb8u9 | 3.7.0-3.7.15 | 3.7.16| -| [2679950](#2679950)
| CVE-2021-25217: parsing of stored leases by dhclient or dhcpd has an incorrect length check that may cause a crash
Vulnerable: <= 4.3.1-6-cl3.7.14u1Fixed: 4.3.1-6-cl3.7.16u1 | 3.7.0-3.7.15, 4.0.0-4.3.1 | 3.7.16, 4.4.0-4.4.5| +| [2679950](#2679950)
| CVE-2021-25217: parsing of stored leases by dhclient or dhcpd has an incorrect length check that may cause a crash
Vulnerable: <= 4.3.1-6-cl3.7.14u1Fixed: 4.3.1-6-cl3.7.16u1 | 3.7.0-3.7.15, 4.0.0-4.3.2 | 3.7.16, 4.4.0-4.4.5| | [2677063](#2677063)
| CVE-2021-3541: "Parameter Laughs" attack related to parameter entities expansion
Vulnerable: <= 2.9.1+dfsg1-5+deb8u10Fixed: 2.9.1+dfsg1-5+deb8u11 | 3.7.0-3.7.15 | 3.7.16| | [2677061](#2677061)
| CVE-2021-23017: off-by-one in Nginx, a high-performance web and reverse proxy server, which could result in denial of service and potentially the execution of arbitrary code
Vulnerable: <= 1.6.2-5+deb8u7Fixed: 1.6.2-5+deb8u8 | 3.7.0-3.7.15 | 3.7.16| | [2677060](#2677060)
| CVE-2021-23336: Python2.7 is vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter
Vulnerable: <= 2.7.9-2-ds1-1+deb8u6Fixed: 2.7.9-2-ds1-1+deb8u7 | 3.7.0-3.7.15 | 3.7.16| @@ -3117,8 +3117,8 @@ pdfhidden: True | Issue ID | Description | Affects | Fixed | |--- |--- |--- |--- | -| [3418046](#3418046)
None | If MLAG is configured but disconnected from an MLAG peer for an extended period of time (days or more), there is a long delay (up to a minute per day) before traffic forwarding stabilizes after the MLAG peer connection re-establishes. | 3.7.0-5.4.0 | 5.5.0-5.6.0| -| [3376798](#3376798)
| On Broadcom switches, Cumulus Linux does not create the hardware bridging domain for a traditional bridge with a VXLAN interface during switchd restart. The /var/log/switchd.log file includes the following exception logs shortly after switchd restarts:
switchd[30158]: hal_bcm_l3.c:1617 find_egr_path_if_vxlan_overlay:vxlan overlay : nh PORT: port <#>, vlan . not yet ready
MAC learning looks correct, but traffic does not flow as expected. | 3.7.0-3.7.16, 4.3.1-4.4.5 | | +| [3418046](#3418046)
None | If MLAG is configured but disconnected from an MLAG peer for an extended period of time (days or more), there is a long delay (up to a minute per day) before traffic forwarding stabilizes after the MLAG peer connection re-establishes. | 3.7.0-4.3.1 | 4.3.2-4.4.5, 5.5.0-5.6.0| +| [3376798](#3376798)
| On Broadcom switches, Cumulus Linux does not create the hardware bridging domain for a traditional bridge with a VXLAN interface during switchd restart. The /var/log/switchd.log file includes the following exception logs shortly after switchd restarts:
switchd[30158]: hal_bcm_l3.c:1617 find_egr_path_if_vxlan_overlay:vxlan overlay : nh PORT: port <#>, vlan . not yet ready
MAC learning looks correct, but traffic does not flow as expected. | 3.7.0-4.3.1 | 4.3.2-4.4.5| | [3330705](#3330705)
| When using TACACS+, a TACACS+ server name that returns more than one IP address, such as an IPv6 and IPv4 address, is counted many times against the limit of seven TACACS+ servers, which might cause some of the later listed servers to be ignored as over the limit. To work around this issue, you can set the prefer_ip_version configuration option (the default value is 4) to choose between an IPv4 or IPv6 address if both are present. | 3.7.0-5.3.1 | 5.4.0-5.6.0| | [3327477](#3327477)
| If you use su to change to a user specified through TACACS+, the user becomes the local tacacs0 thru tacacs15 user instead of the named user to run sudo commands. As a result, the named user password might not match the local tacacs0 thru tacacs15 user password. | 3.7.0-3.7.16, 4.0.0-4.4.5, 5.0.0-5.6.0 | | | [3216922](#3216922)
None | RADIUS authenticated users with read-only access to NCLU commands (users in the users_with_show list) can run edit commands if a username for a non-local account is on the users_with_edit line of the /etc/netd.conf file. To work around this issue, make sure that all usernames on the users_with_edit line of the /etc/netd.conf file are configured local users for the system (real Linux users). | 3.7.0-5.2.1 | 5.3.0-5.6.0| @@ -3170,7 +3170,7 @@ pdfhidden: True | [2705168](#2705168)
| CVE-2020-26558: Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.
CVE-2021-0129: Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access
Vulnerable: <= 5.43-2+deb9u2~deb8u2Fixed: 5.43-2+deb9u2~deb8u3 | 3.7.0-3.7.15 | 3.7.16| | [2702519](#2702519)
| CVE-2021-33560: Mishandling of ElGamal encryption results in a possible side-channel attack and an interoperability problem with keys not generated by GnuPG/libgcrypt
Vulnerable: <= 1.6.3-2+deb8u8Fixed: 1.6.2-2+dev8u9 | 3.7.0-3.7.15 | 3.7.16| | [2684404](#2684404)
| CVE-2017-20005: NGINX has a buffer overflow for years that exceed four digits, as demonstrated by a file with a modification date in 1969 that causes an integer overflow (or a false modification date far in the future), when encountered by the autoindex module
Vulnerable: <= 1.6.2-5+deb8u8Fixed: 1.6.2-5+deb8u9 | 3.7.0-3.7.15 | 3.7.16| -| [2679950](#2679950)
| CVE-2021-25217: parsing of stored leases by dhclient or dhcpd has an incorrect length check that may cause a crash
Vulnerable: <= 4.3.1-6-cl3.7.14u1Fixed: 4.3.1-6-cl3.7.16u1 | 3.7.0-3.7.15, 4.0.0-4.3.1 | 3.7.16, 4.4.0-4.4.5| +| [2679950](#2679950)
| CVE-2021-25217: parsing of stored leases by dhclient or dhcpd has an incorrect length check that may cause a crash
Vulnerable: <= 4.3.1-6-cl3.7.14u1Fixed: 4.3.1-6-cl3.7.16u1 | 3.7.0-3.7.15, 4.0.0-4.3.2 | 3.7.16, 4.4.0-4.4.5| | [2677063](#2677063)
| CVE-2021-3541: "Parameter Laughs" attack related to parameter entities expansion
Vulnerable: <= 2.9.1+dfsg1-5+deb8u10Fixed: 2.9.1+dfsg1-5+deb8u11 | 3.7.0-3.7.15 | 3.7.16| | [2677061](#2677061)
| CVE-2021-23017: off-by-one in Nginx, a high-performance web and reverse proxy server, which could result in denial of service and potentially the execution of arbitrary code
Vulnerable: <= 1.6.2-5+deb8u7Fixed: 1.6.2-5+deb8u8 | 3.7.0-3.7.15 | 3.7.16| | [2677060](#2677060)
| CVE-2021-23336: Python2.7 is vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter
Vulnerable: <= 2.7.9-2-ds1-1+deb8u6Fixed: 2.7.9-2-ds1-1+deb8u7 | 3.7.0-3.7.15 | 3.7.16| @@ -3368,8 +3368,8 @@ pdfhidden: True | Issue ID | Description | Affects | Fixed | |--- |--- |--- |--- | -| [3418046](#3418046)
None | If MLAG is configured but disconnected from an MLAG peer for an extended period of time (days or more), there is a long delay (up to a minute per day) before traffic forwarding stabilizes after the MLAG peer connection re-establishes. | 3.7.0-5.4.0 | 5.5.0-5.6.0| -| [3376798](#3376798)
| On Broadcom switches, Cumulus Linux does not create the hardware bridging domain for a traditional bridge with a VXLAN interface during switchd restart. The /var/log/switchd.log file includes the following exception logs shortly after switchd restarts:
switchd[30158]: hal_bcm_l3.c:1617 find_egr_path_if_vxlan_overlay:vxlan overlay : nh PORT: port <#>, vlan . not yet ready
MAC learning looks correct, but traffic does not flow as expected. | 3.7.0-3.7.16, 4.3.1-4.4.5 | | +| [3418046](#3418046)
None | If MLAG is configured but disconnected from an MLAG peer for an extended period of time (days or more), there is a long delay (up to a minute per day) before traffic forwarding stabilizes after the MLAG peer connection re-establishes. | 3.7.0-4.3.1 | 4.3.2-4.4.5, 5.5.0-5.6.0| +| [3376798](#3376798)
| On Broadcom switches, Cumulus Linux does not create the hardware bridging domain for a traditional bridge with a VXLAN interface during switchd restart. The /var/log/switchd.log file includes the following exception logs shortly after switchd restarts:
switchd[30158]: hal_bcm_l3.c:1617 find_egr_path_if_vxlan_overlay:vxlan overlay : nh PORT: port <#>, vlan . not yet ready
MAC learning looks correct, but traffic does not flow as expected. | 3.7.0-4.3.1 | 4.3.2-4.4.5| | [3330705](#3330705)
| When using TACACS+, a TACACS+ server name that returns more than one IP address, such as an IPv6 and IPv4 address, is counted many times against the limit of seven TACACS+ servers, which might cause some of the later listed servers to be ignored as over the limit. To work around this issue, you can set the prefer_ip_version configuration option (the default value is 4) to choose between an IPv4 or IPv6 address if both are present. | 3.7.0-5.3.1 | 5.4.0-5.6.0| | [3327477](#3327477)
| If you use su to change to a user specified through TACACS+, the user becomes the local tacacs0 thru tacacs15 user instead of the named user to run sudo commands. As a result, the named user password might not match the local tacacs0 thru tacacs15 user password. | 3.7.0-3.7.16, 4.0.0-4.4.5, 5.0.0-5.6.0 | | | [3216922](#3216922)
None | RADIUS authenticated users with read-only access to NCLU commands (users in the users_with_show list) can run edit commands if a username for a non-local account is on the users_with_edit line of the /etc/netd.conf file. To work around this issue, make sure that all usernames on the users_with_edit line of the /etc/netd.conf file are configured local users for the system (real Linux users). | 3.7.0-5.2.1 | 5.3.0-5.6.0| @@ -3421,7 +3421,7 @@ pdfhidden: True | [2705168](#2705168)
| CVE-2020-26558: Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.
CVE-2021-0129: Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access
Vulnerable: <= 5.43-2+deb9u2~deb8u2Fixed: 5.43-2+deb9u2~deb8u3 | 3.7.0-3.7.15 | 3.7.16| | [2702519](#2702519)
| CVE-2021-33560: Mishandling of ElGamal encryption results in a possible side-channel attack and an interoperability problem with keys not generated by GnuPG/libgcrypt
Vulnerable: <= 1.6.3-2+deb8u8Fixed: 1.6.2-2+dev8u9 | 3.7.0-3.7.15 | 3.7.16| | [2684404](#2684404)
| CVE-2017-20005: NGINX has a buffer overflow for years that exceed four digits, as demonstrated by a file with a modification date in 1969 that causes an integer overflow (or a false modification date far in the future), when encountered by the autoindex module
Vulnerable: <= 1.6.2-5+deb8u8Fixed: 1.6.2-5+deb8u9 | 3.7.0-3.7.15 | 3.7.16| -| [2679950](#2679950)
| CVE-2021-25217: parsing of stored leases by dhclient or dhcpd has an incorrect length check that may cause a crash
Vulnerable: <= 4.3.1-6-cl3.7.14u1Fixed: 4.3.1-6-cl3.7.16u1 | 3.7.0-3.7.15, 4.0.0-4.3.1 | 3.7.16, 4.4.0-4.4.5| +| [2679950](#2679950)
| CVE-2021-25217: parsing of stored leases by dhclient or dhcpd has an incorrect length check that may cause a crash
Vulnerable: <= 4.3.1-6-cl3.7.14u1Fixed: 4.3.1-6-cl3.7.16u1 | 3.7.0-3.7.15, 4.0.0-4.3.2 | 3.7.16, 4.4.0-4.4.5| | [2677063](#2677063)
| CVE-2021-3541: "Parameter Laughs" attack related to parameter entities expansion
Vulnerable: <= 2.9.1+dfsg1-5+deb8u10Fixed: 2.9.1+dfsg1-5+deb8u11 | 3.7.0-3.7.15 | 3.7.16| | [2677061](#2677061)
| CVE-2021-23017: off-by-one in Nginx, a high-performance web and reverse proxy server, which could result in denial of service and potentially the execution of arbitrary code
Vulnerable: <= 1.6.2-5+deb8u7Fixed: 1.6.2-5+deb8u8 | 3.7.0-3.7.15 | 3.7.16| | [2677060](#2677060)
| CVE-2021-23336: Python2.7 is vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter
Vulnerable: <= 2.7.9-2-ds1-1+deb8u6Fixed: 2.7.9-2-ds1-1+deb8u7 | 3.7.0-3.7.15 | 3.7.16| @@ -3657,8 +3657,8 @@ pdfhidden: True | Issue ID | Description | Affects | Fixed | |--- |--- |--- |--- | -| [3418046](#3418046)
None | If MLAG is configured but disconnected from an MLAG peer for an extended period of time (days or more), there is a long delay (up to a minute per day) before traffic forwarding stabilizes after the MLAG peer connection re-establishes. | 3.7.0-5.4.0 | 5.5.0-5.6.0| -| [3376798](#3376798)
| On Broadcom switches, Cumulus Linux does not create the hardware bridging domain for a traditional bridge with a VXLAN interface during switchd restart. The /var/log/switchd.log file includes the following exception logs shortly after switchd restarts:
switchd[30158]: hal_bcm_l3.c:1617 find_egr_path_if_vxlan_overlay:vxlan overlay : nh PORT: port <#>, vlan . not yet ready
MAC learning looks correct, but traffic does not flow as expected. | 3.7.0-3.7.16, 4.3.1-4.4.5 | | +| [3418046](#3418046)
None | If MLAG is configured but disconnected from an MLAG peer for an extended period of time (days or more), there is a long delay (up to a minute per day) before traffic forwarding stabilizes after the MLAG peer connection re-establishes. | 3.7.0-4.3.1 | 4.3.2-4.4.5, 5.5.0-5.6.0| +| [3376798](#3376798)
| On Broadcom switches, Cumulus Linux does not create the hardware bridging domain for a traditional bridge with a VXLAN interface during switchd restart. The /var/log/switchd.log file includes the following exception logs shortly after switchd restarts:
switchd[30158]: hal_bcm_l3.c:1617 find_egr_path_if_vxlan_overlay:vxlan overlay : nh PORT: port <#>, vlan . not yet ready
MAC learning looks correct, but traffic does not flow as expected. | 3.7.0-4.3.1 | 4.3.2-4.4.5| | [3330705](#3330705)
| When using TACACS+, a TACACS+ server name that returns more than one IP address, such as an IPv6 and IPv4 address, is counted many times against the limit of seven TACACS+ servers, which might cause some of the later listed servers to be ignored as over the limit. To work around this issue, you can set the prefer_ip_version configuration option (the default value is 4) to choose between an IPv4 or IPv6 address if both are present. | 3.7.0-5.3.1 | 5.4.0-5.6.0| | [3327477](#3327477)
| If you use su to change to a user specified through TACACS+, the user becomes the local tacacs0 thru tacacs15 user instead of the named user to run sudo commands. As a result, the named user password might not match the local tacacs0 thru tacacs15 user password. | 3.7.0-3.7.16, 4.0.0-4.4.5, 5.0.0-5.6.0 | | | [3216922](#3216922)
None | RADIUS authenticated users with read-only access to NCLU commands (users in the users_with_show list) can run edit commands if a username for a non-local account is on the users_with_edit line of the /etc/netd.conf file. To work around this issue, make sure that all usernames on the users_with_edit line of the /etc/netd.conf file are configured local users for the system (real Linux users). | 3.7.0-5.2.1 | 5.3.0-5.6.0| @@ -3710,7 +3710,7 @@ pdfhidden: True | [2705168](#2705168)
| CVE-2020-26558: Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.
CVE-2021-0129: Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access
Vulnerable: <= 5.43-2+deb9u2~deb8u2Fixed: 5.43-2+deb9u2~deb8u3 | 3.7.0-3.7.15 | 3.7.16| | [2702519](#2702519)
| CVE-2021-33560: Mishandling of ElGamal encryption results in a possible side-channel attack and an interoperability problem with keys not generated by GnuPG/libgcrypt
Vulnerable: <= 1.6.3-2+deb8u8Fixed: 1.6.2-2+dev8u9 | 3.7.0-3.7.15 | 3.7.16| | [2684404](#2684404)
| CVE-2017-20005: NGINX has a buffer overflow for years that exceed four digits, as demonstrated by a file with a modification date in 1969 that causes an integer overflow (or a false modification date far in the future), when encountered by the autoindex module
Vulnerable: <= 1.6.2-5+deb8u8Fixed: 1.6.2-5+deb8u9 | 3.7.0-3.7.15 | 3.7.16| -| [2679950](#2679950)
| CVE-2021-25217: parsing of stored leases by dhclient or dhcpd has an incorrect length check that may cause a crash
Vulnerable: <= 4.3.1-6-cl3.7.14u1Fixed: 4.3.1-6-cl3.7.16u1 | 3.7.0-3.7.15, 4.0.0-4.3.1 | 3.7.16, 4.4.0-4.4.5| +| [2679950](#2679950)
| CVE-2021-25217: parsing of stored leases by dhclient or dhcpd has an incorrect length check that may cause a crash
Vulnerable: <= 4.3.1-6-cl3.7.14u1Fixed: 4.3.1-6-cl3.7.16u1 | 3.7.0-3.7.15, 4.0.0-4.3.2 | 3.7.16, 4.4.0-4.4.5| | [2677063](#2677063)
| CVE-2021-3541: "Parameter Laughs" attack related to parameter entities expansion
Vulnerable: <= 2.9.1+dfsg1-5+deb8u10Fixed: 2.9.1+dfsg1-5+deb8u11 | 3.7.0-3.7.15 | 3.7.16| | [2677061](#2677061)
| CVE-2021-23017: off-by-one in Nginx, a high-performance web and reverse proxy server, which could result in denial of service and potentially the execution of arbitrary code
Vulnerable: <= 1.6.2-5+deb8u7Fixed: 1.6.2-5+deb8u8 | 3.7.0-3.7.15 | 3.7.16| | [2677060](#2677060)
| CVE-2021-23336: Python2.7 is vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter
Vulnerable: <= 2.7.9-2-ds1-1+deb8u6Fixed: 2.7.9-2-ds1-1+deb8u7 | 3.7.0-3.7.15 | 3.7.16| @@ -3919,8 +3919,8 @@ pdfhidden: True | Issue ID | Description | Affects | Fixed | |--- |--- |--- |--- | -| [3418046](#3418046)
None | If MLAG is configured but disconnected from an MLAG peer for an extended period of time (days or more), there is a long delay (up to a minute per day) before traffic forwarding stabilizes after the MLAG peer connection re-establishes. | 3.7.0-5.4.0 | 5.5.0-5.6.0| -| [3376798](#3376798)
| On Broadcom switches, Cumulus Linux does not create the hardware bridging domain for a traditional bridge with a VXLAN interface during switchd restart. The /var/log/switchd.log file includes the following exception logs shortly after switchd restarts:
switchd[30158]: hal_bcm_l3.c:1617 find_egr_path_if_vxlan_overlay:vxlan overlay : nh PORT: port <#>, vlan . not yet ready
MAC learning looks correct, but traffic does not flow as expected. | 3.7.0-3.7.16, 4.3.1-4.4.5 | | +| [3418046](#3418046)
None | If MLAG is configured but disconnected from an MLAG peer for an extended period of time (days or more), there is a long delay (up to a minute per day) before traffic forwarding stabilizes after the MLAG peer connection re-establishes. | 3.7.0-4.3.1 | 4.3.2-4.4.5, 5.5.0-5.6.0| +| [3376798](#3376798)
| On Broadcom switches, Cumulus Linux does not create the hardware bridging domain for a traditional bridge with a VXLAN interface during switchd restart. The /var/log/switchd.log file includes the following exception logs shortly after switchd restarts:
switchd[30158]: hal_bcm_l3.c:1617 find_egr_path_if_vxlan_overlay:vxlan overlay : nh PORT: port <#>, vlan . not yet ready
MAC learning looks correct, but traffic does not flow as expected. | 3.7.0-4.3.1 | 4.3.2-4.4.5| | [3330705](#3330705)
| When using TACACS+, a TACACS+ server name that returns more than one IP address, such as an IPv6 and IPv4 address, is counted many times against the limit of seven TACACS+ servers, which might cause some of the later listed servers to be ignored as over the limit. To work around this issue, you can set the prefer_ip_version configuration option (the default value is 4) to choose between an IPv4 or IPv6 address if both are present. | 3.7.0-5.3.1 | 5.4.0-5.6.0| | [3327477](#3327477)
| If you use su to change to a user specified through TACACS+, the user becomes the local tacacs0 thru tacacs15 user instead of the named user to run sudo commands. As a result, the named user password might not match the local tacacs0 thru tacacs15 user password. | 3.7.0-3.7.16, 4.0.0-4.4.5, 5.0.0-5.6.0 | | | [3216922](#3216922)
None | RADIUS authenticated users with read-only access to NCLU commands (users in the users_with_show list) can run edit commands if a username for a non-local account is on the users_with_edit line of the /etc/netd.conf file. To work around this issue, make sure that all usernames on the users_with_edit line of the /etc/netd.conf file are configured local users for the system (real Linux users). | 3.7.0-5.2.1 | 5.3.0-5.6.0| @@ -3972,7 +3972,7 @@ pdfhidden: True | [2705168](#2705168)
| CVE-2020-26558: Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.
CVE-2021-0129: Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access
Vulnerable: <= 5.43-2+deb9u2~deb8u2Fixed: 5.43-2+deb9u2~deb8u3 | 3.7.0-3.7.15 | 3.7.16| | [2702519](#2702519)
| CVE-2021-33560: Mishandling of ElGamal encryption results in a possible side-channel attack and an interoperability problem with keys not generated by GnuPG/libgcrypt
Vulnerable: <= 1.6.3-2+deb8u8Fixed: 1.6.2-2+dev8u9 | 3.7.0-3.7.15 | 3.7.16| | [2684404](#2684404)
| CVE-2017-20005: NGINX has a buffer overflow for years that exceed four digits, as demonstrated by a file with a modification date in 1969 that causes an integer overflow (or a false modification date far in the future), when encountered by the autoindex module
Vulnerable: <= 1.6.2-5+deb8u8Fixed: 1.6.2-5+deb8u9 | 3.7.0-3.7.15 | 3.7.16| -| [2679950](#2679950)
| CVE-2021-25217: parsing of stored leases by dhclient or dhcpd has an incorrect length check that may cause a crash
Vulnerable: <= 4.3.1-6-cl3.7.14u1Fixed: 4.3.1-6-cl3.7.16u1 | 3.7.0-3.7.15, 4.0.0-4.3.1 | 3.7.16, 4.4.0-4.4.5| +| [2679950](#2679950)
| CVE-2021-25217: parsing of stored leases by dhclient or dhcpd has an incorrect length check that may cause a crash
Vulnerable: <= 4.3.1-6-cl3.7.14u1Fixed: 4.3.1-6-cl3.7.16u1 | 3.7.0-3.7.15, 4.0.0-4.3.2 | 3.7.16, 4.4.0-4.4.5| | [2677063](#2677063)
| CVE-2021-3541: "Parameter Laughs" attack related to parameter entities expansion
Vulnerable: <= 2.9.1+dfsg1-5+deb8u10Fixed: 2.9.1+dfsg1-5+deb8u11 | 3.7.0-3.7.15 | 3.7.16| | [2677061](#2677061)
| CVE-2021-23017: off-by-one in Nginx, a high-performance web and reverse proxy server, which could result in denial of service and potentially the execution of arbitrary code
Vulnerable: <= 1.6.2-5+deb8u7Fixed: 1.6.2-5+deb8u8 | 3.7.0-3.7.15 | 3.7.16| | [2677060](#2677060)
| CVE-2021-23336: Python2.7 is vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter
Vulnerable: <= 2.7.9-2-ds1-1+deb8u6Fixed: 2.7.9-2-ds1-1+deb8u7 | 3.7.0-3.7.15 | 3.7.16| @@ -4136,8 +4136,8 @@ pdfhidden: True | Issue ID | Description | Affects | Fixed | |--- |--- |--- |--- | -| [3418046](#3418046)
None | If MLAG is configured but disconnected from an MLAG peer for an extended period of time (days or more), there is a long delay (up to a minute per day) before traffic forwarding stabilizes after the MLAG peer connection re-establishes. | 3.7.0-5.4.0 | 5.5.0-5.6.0| -| [3376798](#3376798)
| On Broadcom switches, Cumulus Linux does not create the hardware bridging domain for a traditional bridge with a VXLAN interface during switchd restart. The /var/log/switchd.log file includes the following exception logs shortly after switchd restarts:
switchd[30158]: hal_bcm_l3.c:1617 find_egr_path_if_vxlan_overlay:vxlan overlay : nh PORT: port <#>, vlan . not yet ready
MAC learning looks correct, but traffic does not flow as expected. | 3.7.0-3.7.16, 4.3.1-4.4.5 | | +| [3418046](#3418046)
None | If MLAG is configured but disconnected from an MLAG peer for an extended period of time (days or more), there is a long delay (up to a minute per day) before traffic forwarding stabilizes after the MLAG peer connection re-establishes. | 3.7.0-4.3.1 | 4.3.2-4.4.5, 5.5.0-5.6.0| +| [3376798](#3376798)
| On Broadcom switches, Cumulus Linux does not create the hardware bridging domain for a traditional bridge with a VXLAN interface during switchd restart. The /var/log/switchd.log file includes the following exception logs shortly after switchd restarts:
switchd[30158]: hal_bcm_l3.c:1617 find_egr_path_if_vxlan_overlay:vxlan overlay : nh PORT: port <#>, vlan . not yet ready
MAC learning looks correct, but traffic does not flow as expected. | 3.7.0-4.3.1 | 4.3.2-4.4.5| | [3330705](#3330705)
| When using TACACS+, a TACACS+ server name that returns more than one IP address, such as an IPv6 and IPv4 address, is counted many times against the limit of seven TACACS+ servers, which might cause some of the later listed servers to be ignored as over the limit. To work around this issue, you can set the prefer_ip_version configuration option (the default value is 4) to choose between an IPv4 or IPv6 address if both are present. | 3.7.0-5.3.1 | 5.4.0-5.6.0| | [3327477](#3327477)
| If you use su to change to a user specified through TACACS+, the user becomes the local tacacs0 thru tacacs15 user instead of the named user to run sudo commands. As a result, the named user password might not match the local tacacs0 thru tacacs15 user password. | 3.7.0-3.7.16, 4.0.0-4.4.5, 5.0.0-5.6.0 | | | [3216922](#3216922)
None | RADIUS authenticated users with read-only access to NCLU commands (users in the users_with_show list) can run edit commands if a username for a non-local account is on the users_with_edit line of the /etc/netd.conf file. To work around this issue, make sure that all usernames on the users_with_edit line of the /etc/netd.conf file are configured local users for the system (real Linux users). | 3.7.0-5.2.1 | 5.3.0-5.6.0| @@ -4189,7 +4189,7 @@ pdfhidden: True | [2705168](#2705168)
| CVE-2020-26558: Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.
CVE-2021-0129: Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access
Vulnerable: <= 5.43-2+deb9u2~deb8u2Fixed: 5.43-2+deb9u2~deb8u3 | 3.7.0-3.7.15 | 3.7.16| | [2702519](#2702519)
| CVE-2021-33560: Mishandling of ElGamal encryption results in a possible side-channel attack and an interoperability problem with keys not generated by GnuPG/libgcrypt
Vulnerable: <= 1.6.3-2+deb8u8Fixed: 1.6.2-2+dev8u9 | 3.7.0-3.7.15 | 3.7.16| | [2684404](#2684404)
| CVE-2017-20005: NGINX has a buffer overflow for years that exceed four digits, as demonstrated by a file with a modification date in 1969 that causes an integer overflow (or a false modification date far in the future), when encountered by the autoindex module
Vulnerable: <= 1.6.2-5+deb8u8Fixed: 1.6.2-5+deb8u9 | 3.7.0-3.7.15 | 3.7.16| -| [2679950](#2679950)
| CVE-2021-25217: parsing of stored leases by dhclient or dhcpd has an incorrect length check that may cause a crash
Vulnerable: <= 4.3.1-6-cl3.7.14u1Fixed: 4.3.1-6-cl3.7.16u1 | 3.7.0-3.7.15, 4.0.0-4.3.1 | 3.7.16, 4.4.0-4.4.5| +| [2679950](#2679950)
| CVE-2021-25217: parsing of stored leases by dhclient or dhcpd has an incorrect length check that may cause a crash
Vulnerable: <= 4.3.1-6-cl3.7.14u1Fixed: 4.3.1-6-cl3.7.16u1 | 3.7.0-3.7.15, 4.0.0-4.3.2 | 3.7.16, 4.4.0-4.4.5| | [2677063](#2677063)
| CVE-2021-3541: "Parameter Laughs" attack related to parameter entities expansion
Vulnerable: <= 2.9.1+dfsg1-5+deb8u10Fixed: 2.9.1+dfsg1-5+deb8u11 | 3.7.0-3.7.15 | 3.7.16| | [2677061](#2677061)
| CVE-2021-23017: off-by-one in Nginx, a high-performance web and reverse proxy server, which could result in denial of service and potentially the execution of arbitrary code
Vulnerable: <= 1.6.2-5+deb8u7Fixed: 1.6.2-5+deb8u8 | 3.7.0-3.7.15 | 3.7.16| | [2677060](#2677060)
| CVE-2021-23336: Python2.7 is vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter
Vulnerable: <= 2.7.9-2-ds1-1+deb8u6Fixed: 2.7.9-2-ds1-1+deb8u7 | 3.7.0-3.7.15 | 3.7.16| @@ -4362,8 +4362,8 @@ pdfhidden: True | Issue ID | Description | Affects | Fixed | |--- |--- |--- |--- | -| [3418046](#3418046)
None | If MLAG is configured but disconnected from an MLAG peer for an extended period of time (days or more), there is a long delay (up to a minute per day) before traffic forwarding stabilizes after the MLAG peer connection re-establishes. | 3.7.0-5.4.0 | 5.5.0-5.6.0| -| [3376798](#3376798)
| On Broadcom switches, Cumulus Linux does not create the hardware bridging domain for a traditional bridge with a VXLAN interface during switchd restart. The /var/log/switchd.log file includes the following exception logs shortly after switchd restarts:
switchd[30158]: hal_bcm_l3.c:1617 find_egr_path_if_vxlan_overlay:vxlan overlay : nh PORT: port <#>, vlan . not yet ready
MAC learning looks correct, but traffic does not flow as expected. | 3.7.0-3.7.16, 4.3.1-4.4.5 | | +| [3418046](#3418046)
None | If MLAG is configured but disconnected from an MLAG peer for an extended period of time (days or more), there is a long delay (up to a minute per day) before traffic forwarding stabilizes after the MLAG peer connection re-establishes. | 3.7.0-4.3.1 | 4.3.2-4.4.5, 5.5.0-5.6.0| +| [3376798](#3376798)
| On Broadcom switches, Cumulus Linux does not create the hardware bridging domain for a traditional bridge with a VXLAN interface during switchd restart. The /var/log/switchd.log file includes the following exception logs shortly after switchd restarts:
switchd[30158]: hal_bcm_l3.c:1617 find_egr_path_if_vxlan_overlay:vxlan overlay : nh PORT: port <#>, vlan . not yet ready
MAC learning looks correct, but traffic does not flow as expected. | 3.7.0-4.3.1 | 4.3.2-4.4.5| | [3330705](#3330705)
| When using TACACS+, a TACACS+ server name that returns more than one IP address, such as an IPv6 and IPv4 address, is counted many times against the limit of seven TACACS+ servers, which might cause some of the later listed servers to be ignored as over the limit. To work around this issue, you can set the prefer_ip_version configuration option (the default value is 4) to choose between an IPv4 or IPv6 address if both are present. | 3.7.0-5.3.1 | 5.4.0-5.6.0| | [3327477](#3327477)
| If you use su to change to a user specified through TACACS+, the user becomes the local tacacs0 thru tacacs15 user instead of the named user to run sudo commands. As a result, the named user password might not match the local tacacs0 thru tacacs15 user password. | 3.7.0-3.7.16, 4.0.0-4.4.5, 5.0.0-5.6.0 | | | [3216922](#3216922)
None | RADIUS authenticated users with read-only access to NCLU commands (users in the users_with_show list) can run edit commands if a username for a non-local account is on the users_with_edit line of the /etc/netd.conf file. To work around this issue, make sure that all usernames on the users_with_edit line of the /etc/netd.conf file are configured local users for the system (real Linux users). | 3.7.0-5.2.1 | 5.3.0-5.6.0| @@ -4415,7 +4415,7 @@ pdfhidden: True | [2705168](#2705168)
| CVE-2020-26558: Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.
CVE-2021-0129: Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access
Vulnerable: <= 5.43-2+deb9u2~deb8u2Fixed: 5.43-2+deb9u2~deb8u3 | 3.7.0-3.7.15 | 3.7.16| | [2702519](#2702519)
| CVE-2021-33560: Mishandling of ElGamal encryption results in a possible side-channel attack and an interoperability problem with keys not generated by GnuPG/libgcrypt
Vulnerable: <= 1.6.3-2+deb8u8Fixed: 1.6.2-2+dev8u9 | 3.7.0-3.7.15 | 3.7.16| | [2684404](#2684404)
| CVE-2017-20005: NGINX has a buffer overflow for years that exceed four digits, as demonstrated by a file with a modification date in 1969 that causes an integer overflow (or a false modification date far in the future), when encountered by the autoindex module
Vulnerable: <= 1.6.2-5+deb8u8Fixed: 1.6.2-5+deb8u9 | 3.7.0-3.7.15 | 3.7.16| -| [2679950](#2679950)
| CVE-2021-25217: parsing of stored leases by dhclient or dhcpd has an incorrect length check that may cause a crash
Vulnerable: <= 4.3.1-6-cl3.7.14u1Fixed: 4.3.1-6-cl3.7.16u1 | 3.7.0-3.7.15, 4.0.0-4.3.1 | 3.7.16, 4.4.0-4.4.5| +| [2679950](#2679950)
| CVE-2021-25217: parsing of stored leases by dhclient or dhcpd has an incorrect length check that may cause a crash
Vulnerable: <= 4.3.1-6-cl3.7.14u1Fixed: 4.3.1-6-cl3.7.16u1 | 3.7.0-3.7.15, 4.0.0-4.3.2 | 3.7.16, 4.4.0-4.4.5| | [2677063](#2677063)
| CVE-2021-3541: "Parameter Laughs" attack related to parameter entities expansion
Vulnerable: <= 2.9.1+dfsg1-5+deb8u10Fixed: 2.9.1+dfsg1-5+deb8u11 | 3.7.0-3.7.15 | 3.7.16| | [2677061](#2677061)
| CVE-2021-23017: off-by-one in Nginx, a high-performance web and reverse proxy server, which could result in denial of service and potentially the execution of arbitrary code
Vulnerable: <= 1.6.2-5+deb8u7Fixed: 1.6.2-5+deb8u8 | 3.7.0-3.7.15 | 3.7.16| | [2677060](#2677060)
| CVE-2021-23336: Python2.7 is vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter
Vulnerable: <= 2.7.9-2-ds1-1+deb8u6Fixed: 2.7.9-2-ds1-1+deb8u7 | 3.7.0-3.7.15 | 3.7.16| @@ -4602,8 +4602,8 @@ pdfhidden: True | Issue ID | Description | Affects | Fixed | |--- |--- |--- |--- | -| [3418046](#3418046)
None | If MLAG is configured but disconnected from an MLAG peer for an extended period of time (days or more), there is a long delay (up to a minute per day) before traffic forwarding stabilizes after the MLAG peer connection re-establishes. | 3.7.0-5.4.0 | 5.5.0-5.6.0| -| [3376798](#3376798)
| On Broadcom switches, Cumulus Linux does not create the hardware bridging domain for a traditional bridge with a VXLAN interface during switchd restart. The /var/log/switchd.log file includes the following exception logs shortly after switchd restarts:
switchd[30158]: hal_bcm_l3.c:1617 find_egr_path_if_vxlan_overlay:vxlan overlay : nh PORT: port <#>, vlan . not yet ready
MAC learning looks correct, but traffic does not flow as expected. | 3.7.0-3.7.16, 4.3.1-4.4.5 | | +| [3418046](#3418046)
None | If MLAG is configured but disconnected from an MLAG peer for an extended period of time (days or more), there is a long delay (up to a minute per day) before traffic forwarding stabilizes after the MLAG peer connection re-establishes. | 3.7.0-4.3.1 | 4.3.2-4.4.5, 5.5.0-5.6.0| +| [3376798](#3376798)
| On Broadcom switches, Cumulus Linux does not create the hardware bridging domain for a traditional bridge with a VXLAN interface during switchd restart. The /var/log/switchd.log file includes the following exception logs shortly after switchd restarts:
switchd[30158]: hal_bcm_l3.c:1617 find_egr_path_if_vxlan_overlay:vxlan overlay : nh PORT: port <#>, vlan . not yet ready
MAC learning looks correct, but traffic does not flow as expected. | 3.7.0-4.3.1 | 4.3.2-4.4.5| | [3330705](#3330705)
| When using TACACS+, a TACACS+ server name that returns more than one IP address, such as an IPv6 and IPv4 address, is counted many times against the limit of seven TACACS+ servers, which might cause some of the later listed servers to be ignored as over the limit. To work around this issue, you can set the prefer_ip_version configuration option (the default value is 4) to choose between an IPv4 or IPv6 address if both are present. | 3.7.0-5.3.1 | 5.4.0-5.6.0| | [3327477](#3327477)
| If you use su to change to a user specified through TACACS+, the user becomes the local tacacs0 thru tacacs15 user instead of the named user to run sudo commands. As a result, the named user password might not match the local tacacs0 thru tacacs15 user password. | 3.7.0-3.7.16, 4.0.0-4.4.5, 5.0.0-5.6.0 | | | [3216922](#3216922)
None | RADIUS authenticated users with read-only access to NCLU commands (users in the users_with_show list) can run edit commands if a username for a non-local account is on the users_with_edit line of the /etc/netd.conf file. To work around this issue, make sure that all usernames on the users_with_edit line of the /etc/netd.conf file are configured local users for the system (real Linux users). | 3.7.0-5.2.1 | 5.3.0-5.6.0| @@ -4655,7 +4655,7 @@ pdfhidden: True | [2705168](#2705168)
| CVE-2020-26558: Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.
CVE-2021-0129: Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access
Vulnerable: <= 5.43-2+deb9u2~deb8u2Fixed: 5.43-2+deb9u2~deb8u3 | 3.7.0-3.7.15 | 3.7.16| | [2702519](#2702519)
| CVE-2021-33560: Mishandling of ElGamal encryption results in a possible side-channel attack and an interoperability problem with keys not generated by GnuPG/libgcrypt
Vulnerable: <= 1.6.3-2+deb8u8Fixed: 1.6.2-2+dev8u9 | 3.7.0-3.7.15 | 3.7.16| | [2684404](#2684404)
| CVE-2017-20005: NGINX has a buffer overflow for years that exceed four digits, as demonstrated by a file with a modification date in 1969 that causes an integer overflow (or a false modification date far in the future), when encountered by the autoindex module
Vulnerable: <= 1.6.2-5+deb8u8Fixed: 1.6.2-5+deb8u9 | 3.7.0-3.7.15 | 3.7.16| -| [2679950](#2679950)
| CVE-2021-25217: parsing of stored leases by dhclient or dhcpd has an incorrect length check that may cause a crash
Vulnerable: <= 4.3.1-6-cl3.7.14u1Fixed: 4.3.1-6-cl3.7.16u1 | 3.7.0-3.7.15, 4.0.0-4.3.1 | 3.7.16, 4.4.0-4.4.5| +| [2679950](#2679950)
| CVE-2021-25217: parsing of stored leases by dhclient or dhcpd has an incorrect length check that may cause a crash
Vulnerable: <= 4.3.1-6-cl3.7.14u1Fixed: 4.3.1-6-cl3.7.16u1 | 3.7.0-3.7.15, 4.0.0-4.3.2 | 3.7.16, 4.4.0-4.4.5| | [2677063](#2677063)
| CVE-2021-3541: "Parameter Laughs" attack related to parameter entities expansion
Vulnerable: <= 2.9.1+dfsg1-5+deb8u10Fixed: 2.9.1+dfsg1-5+deb8u11 | 3.7.0-3.7.15 | 3.7.16| | [2677061](#2677061)
| CVE-2021-23017: off-by-one in Nginx, a high-performance web and reverse proxy server, which could result in denial of service and potentially the execution of arbitrary code
Vulnerable: <= 1.6.2-5+deb8u7Fixed: 1.6.2-5+deb8u8 | 3.7.0-3.7.15 | 3.7.16| | [2677060](#2677060)
| CVE-2021-23336: Python2.7 is vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter
Vulnerable: <= 2.7.9-2-ds1-1+deb8u6Fixed: 2.7.9-2-ds1-1+deb8u7 | 3.7.0-3.7.15 | 3.7.16| @@ -4835,8 +4835,8 @@ pdfhidden: True | Issue ID | Description | Affects | Fixed | |--- |--- |--- |--- | -| [3418046](#3418046)
None | If MLAG is configured but disconnected from an MLAG peer for an extended period of time (days or more), there is a long delay (up to a minute per day) before traffic forwarding stabilizes after the MLAG peer connection re-establishes. | 3.7.0-5.4.0 | 5.5.0-5.6.0| -| [3376798](#3376798)
| On Broadcom switches, Cumulus Linux does not create the hardware bridging domain for a traditional bridge with a VXLAN interface during switchd restart. The /var/log/switchd.log file includes the following exception logs shortly after switchd restarts:
switchd[30158]: hal_bcm_l3.c:1617 find_egr_path_if_vxlan_overlay:vxlan overlay : nh PORT: port <#>, vlan . not yet ready
MAC learning looks correct, but traffic does not flow as expected. | 3.7.0-3.7.16, 4.3.1-4.4.5 | | +| [3418046](#3418046)
None | If MLAG is configured but disconnected from an MLAG peer for an extended period of time (days or more), there is a long delay (up to a minute per day) before traffic forwarding stabilizes after the MLAG peer connection re-establishes. | 3.7.0-4.3.1 | 4.3.2-4.4.5, 5.5.0-5.6.0| +| [3376798](#3376798)
| On Broadcom switches, Cumulus Linux does not create the hardware bridging domain for a traditional bridge with a VXLAN interface during switchd restart. The /var/log/switchd.log file includes the following exception logs shortly after switchd restarts:
switchd[30158]: hal_bcm_l3.c:1617 find_egr_path_if_vxlan_overlay:vxlan overlay : nh PORT: port <#>, vlan . not yet ready
MAC learning looks correct, but traffic does not flow as expected. | 3.7.0-4.3.1 | 4.3.2-4.4.5| | [3330705](#3330705)
| When using TACACS+, a TACACS+ server name that returns more than one IP address, such as an IPv6 and IPv4 address, is counted many times against the limit of seven TACACS+ servers, which might cause some of the later listed servers to be ignored as over the limit. To work around this issue, you can set the prefer_ip_version configuration option (the default value is 4) to choose between an IPv4 or IPv6 address if both are present. | 3.7.0-5.3.1 | 5.4.0-5.6.0| | [3327477](#3327477)
| If you use su to change to a user specified through TACACS+, the user becomes the local tacacs0 thru tacacs15 user instead of the named user to run sudo commands. As a result, the named user password might not match the local tacacs0 thru tacacs15 user password. | 3.7.0-3.7.16, 4.0.0-4.4.5, 5.0.0-5.6.0 | | | [3216922](#3216922)
None | RADIUS authenticated users with read-only access to NCLU commands (users in the users_with_show list) can run edit commands if a username for a non-local account is on the users_with_edit line of the /etc/netd.conf file. To work around this issue, make sure that all usernames on the users_with_edit line of the /etc/netd.conf file are configured local users for the system (real Linux users). | 3.7.0-5.2.1 | 5.3.0-5.6.0| @@ -4888,7 +4888,7 @@ pdfhidden: True | [2705168](#2705168)
| CVE-2020-26558: Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.
CVE-2021-0129: Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access
Vulnerable: <= 5.43-2+deb9u2~deb8u2Fixed: 5.43-2+deb9u2~deb8u3 | 3.7.0-3.7.15 | 3.7.16| | [2702519](#2702519)
| CVE-2021-33560: Mishandling of ElGamal encryption results in a possible side-channel attack and an interoperability problem with keys not generated by GnuPG/libgcrypt
Vulnerable: <= 1.6.3-2+deb8u8Fixed: 1.6.2-2+dev8u9 | 3.7.0-3.7.15 | 3.7.16| | [2684404](#2684404)
| CVE-2017-20005: NGINX has a buffer overflow for years that exceed four digits, as demonstrated by a file with a modification date in 1969 that causes an integer overflow (or a false modification date far in the future), when encountered by the autoindex module
Vulnerable: <= 1.6.2-5+deb8u8Fixed: 1.6.2-5+deb8u9 | 3.7.0-3.7.15 | 3.7.16| -| [2679950](#2679950)
| CVE-2021-25217: parsing of stored leases by dhclient or dhcpd has an incorrect length check that may cause a crash
Vulnerable: <= 4.3.1-6-cl3.7.14u1Fixed: 4.3.1-6-cl3.7.16u1 | 3.7.0-3.7.15, 4.0.0-4.3.1 | 3.7.16, 4.4.0-4.4.5| +| [2679950](#2679950)
| CVE-2021-25217: parsing of stored leases by dhclient or dhcpd has an incorrect length check that may cause a crash
Vulnerable: <= 4.3.1-6-cl3.7.14u1Fixed: 4.3.1-6-cl3.7.16u1 | 3.7.0-3.7.15, 4.0.0-4.3.2 | 3.7.16, 4.4.0-4.4.5| | [2677063](#2677063)
| CVE-2021-3541: "Parameter Laughs" attack related to parameter entities expansion
Vulnerable: <= 2.9.1+dfsg1-5+deb8u10Fixed: 2.9.1+dfsg1-5+deb8u11 | 3.7.0-3.7.15 | 3.7.16| | [2677061](#2677061)
| CVE-2021-23017: off-by-one in Nginx, a high-performance web and reverse proxy server, which could result in denial of service and potentially the execution of arbitrary code
Vulnerable: <= 1.6.2-5+deb8u7Fixed: 1.6.2-5+deb8u8 | 3.7.0-3.7.15 | 3.7.16| | [2677060](#2677060)
| CVE-2021-23336: Python2.7 is vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter
Vulnerable: <= 2.7.9-2-ds1-1+deb8u6Fixed: 2.7.9-2-ds1-1+deb8u7 | 3.7.0-3.7.15 | 3.7.16| @@ -4987,8 +4987,8 @@ pdfhidden: True | Issue ID | Description | Affects | Fixed | |--- |--- |--- |--- | -| [3418046](#3418046)
None | If MLAG is configured but disconnected from an MLAG peer for an extended period of time (days or more), there is a long delay (up to a minute per day) before traffic forwarding stabilizes after the MLAG peer connection re-establishes. | 3.7.0-5.4.0 | 5.5.0-5.6.0| -| [3376798](#3376798)
| On Broadcom switches, Cumulus Linux does not create the hardware bridging domain for a traditional bridge with a VXLAN interface during switchd restart. The /var/log/switchd.log file includes the following exception logs shortly after switchd restarts:
switchd[30158]: hal_bcm_l3.c:1617 find_egr_path_if_vxlan_overlay:vxlan overlay : nh PORT: port <#>, vlan . not yet ready
MAC learning looks correct, but traffic does not flow as expected. | 3.7.0-3.7.16, 4.3.1-4.4.5 | | +| [3418046](#3418046)
None | If MLAG is configured but disconnected from an MLAG peer for an extended period of time (days or more), there is a long delay (up to a minute per day) before traffic forwarding stabilizes after the MLAG peer connection re-establishes. | 3.7.0-4.3.1 | 4.3.2-4.4.5, 5.5.0-5.6.0| +| [3376798](#3376798)
| On Broadcom switches, Cumulus Linux does not create the hardware bridging domain for a traditional bridge with a VXLAN interface during switchd restart. The /var/log/switchd.log file includes the following exception logs shortly after switchd restarts:
switchd[30158]: hal_bcm_l3.c:1617 find_egr_path_if_vxlan_overlay:vxlan overlay : nh PORT: port <#>, vlan . not yet ready
MAC learning looks correct, but traffic does not flow as expected. | 3.7.0-4.3.1 | 4.3.2-4.4.5| | [3330705](#3330705)
| When using TACACS+, a TACACS+ server name that returns more than one IP address, such as an IPv6 and IPv4 address, is counted many times against the limit of seven TACACS+ servers, which might cause some of the later listed servers to be ignored as over the limit. To work around this issue, you can set the prefer_ip_version configuration option (the default value is 4) to choose between an IPv4 or IPv6 address if both are present. | 3.7.0-5.3.1 | 5.4.0-5.6.0| | [3327477](#3327477)
| If you use su to change to a user specified through TACACS+, the user becomes the local tacacs0 thru tacacs15 user instead of the named user to run sudo commands. As a result, the named user password might not match the local tacacs0 thru tacacs15 user password. | 3.7.0-3.7.16, 4.0.0-4.4.5, 5.0.0-5.6.0 | | | [3216922](#3216922)
None | RADIUS authenticated users with read-only access to NCLU commands (users in the users_with_show list) can run edit commands if a username for a non-local account is on the users_with_edit line of the /etc/netd.conf file. To work around this issue, make sure that all usernames on the users_with_edit line of the /etc/netd.conf file are configured local users for the system (real Linux users). | 3.7.0-5.2.1 | 5.3.0-5.6.0| @@ -5040,7 +5040,7 @@ pdfhidden: True | [2705168](#2705168)
| CVE-2020-26558: Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.
CVE-2021-0129: Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access
Vulnerable: <= 5.43-2+deb9u2~deb8u2Fixed: 5.43-2+deb9u2~deb8u3 | 3.7.0-3.7.15 | 3.7.16| | [2702519](#2702519)
| CVE-2021-33560: Mishandling of ElGamal encryption results in a possible side-channel attack and an interoperability problem with keys not generated by GnuPG/libgcrypt
Vulnerable: <= 1.6.3-2+deb8u8Fixed: 1.6.2-2+dev8u9 | 3.7.0-3.7.15 | 3.7.16| | [2684404](#2684404)
| CVE-2017-20005: NGINX has a buffer overflow for years that exceed four digits, as demonstrated by a file with a modification date in 1969 that causes an integer overflow (or a false modification date far in the future), when encountered by the autoindex module
Vulnerable: <= 1.6.2-5+deb8u8Fixed: 1.6.2-5+deb8u9 | 3.7.0-3.7.15 | 3.7.16| -| [2679950](#2679950)
| CVE-2021-25217: parsing of stored leases by dhclient or dhcpd has an incorrect length check that may cause a crash
Vulnerable: <= 4.3.1-6-cl3.7.14u1Fixed: 4.3.1-6-cl3.7.16u1 | 3.7.0-3.7.15, 4.0.0-4.3.1 | 3.7.16, 4.4.0-4.4.5| +| [2679950](#2679950)
| CVE-2021-25217: parsing of stored leases by dhclient or dhcpd has an incorrect length check that may cause a crash
Vulnerable: <= 4.3.1-6-cl3.7.14u1Fixed: 4.3.1-6-cl3.7.16u1 | 3.7.0-3.7.15, 4.0.0-4.3.2 | 3.7.16, 4.4.0-4.4.5| | [2677063](#2677063)
| CVE-2021-3541: "Parameter Laughs" attack related to parameter entities expansion
Vulnerable: <= 2.9.1+dfsg1-5+deb8u10Fixed: 2.9.1+dfsg1-5+deb8u11 | 3.7.0-3.7.15 | 3.7.16| | [2677061](#2677061)
| CVE-2021-23017: off-by-one in Nginx, a high-performance web and reverse proxy server, which could result in denial of service and potentially the execution of arbitrary code
Vulnerable: <= 1.6.2-5+deb8u7Fixed: 1.6.2-5+deb8u8 | 3.7.0-3.7.15 | 3.7.16| | [2677060](#2677060)
| CVE-2021-23336: Python2.7 is vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter
Vulnerable: <= 2.7.9-2-ds1-1+deb8u6Fixed: 2.7.9-2-ds1-1+deb8u7 | 3.7.0-3.7.15 | 3.7.16| diff --git a/content/cumulus-linux-37/rn.xml b/content/cumulus-linux-37/rn.xml index 0532ee4e34..3d6bd99031 100644 --- a/content/cumulus-linux-37/rn.xml +++ b/content/cumulus-linux-37/rn.xml @@ -9,8 +9,8 @@ 3418046 If MLAG is configured but disconnected from an MLAG peer for an extended period of time (days or more), there is a long delay (up to a minute per day) before traffic forwarding stabilizes after the MLAG peer connection re-establishes. -3.7.0-5.4.0 -5.5.0-5.6.0 +3.7.0-4.3.1 +4.3.2-4.4.5, 5.5.0-5.6.0 3376798 @@ -19,8 +19,8 @@ switchd[30158]: hal_bcm_l3.c:1617 find_egr_path_if_vxlan_overlay:vxlan overlay : nh PORT: port <#>, vlan <x>.<y> not yet ready MAC learning looks correct, but traffic does not flow as expected. -3.7.0-3.7.16, 4.3.1-4.4.5 - +3.7.0-4.3.1 +4.3.2-4.4.5 3330705 @@ -478,7 +478,7 @@ https://security-tracker.debian.org/tracker/linux 2648658 If you try to use more than one percent of {{max-ecmp-nexthops}}, you get an error indicating a failure. -3.7.15-4.3.1 +3.7.15-4.3.2 4.4.0-4.4.5 @@ -530,9 +530,9 @@ To work around this issue, increase the burst value of the ARP policers to 200 o 2555175 -Control Plane Traffic (example - BGP peering from Leaf to Spine) goes down on Leaf due to Hold Down Timer Expiration of peer following prolonged link flaps on downlinks when vxlan enabled vlans are carried on the flapping link. -3.7.15-3.7.16, 4.2.1-4.4.5 - +Control plane traffic (such as BGP peering from leaf to spine) goes down on the leaf due to the peer Hold Down timer expiration following prolonged link flaps on down links when VXLAN enabled VLANs are carried on the flapping link. Be sure to correct layer 1 issues, configuration issues, or misbehaving link partners that are causing the link flaps. +3.7.15-4.3.1 +4.3.2-4.4.5 2554785 @@ -893,7 +893,7 @@ If you flap the link with the {{ip link set vni10100 down; ip link set vni10100 2549371 When Optimized Multicast Flooding (OMF) is enabled with the {{bridge.optimized_mcast_flood = TRUE}} setting in the {{/etc/cumulus/switchd.conf}} file, the switch continues to flood IPv6 multicast traffic to all slave ports when there is no MLD join receive. -3.7.11-4.3.1 +3.7.11-4.3.2 4.4.0-4.4.5 @@ -2361,7 +2361,7 @@ Fixed: 1.6.2-5+deb8u9 CVE-2021-25217: parsing of stored leases by dhclient or dhcpd has an incorrect length check that may cause a crash. Vulnerable: <= 4.3.1-6-cl3.7.14u1 Fixed: 4.3.1-6-cl3.7.16u1 -3.7.0-3.7.15, 4.0.0-4.3.1 +3.7.0-3.7.15, 4.0.0-4.3.2 2677063 @@ -2493,8 +2493,8 @@ Fixed: 6.8.9.9-5+deb8u24 3418046 If MLAG is configured but disconnected from an MLAG peer for an extended period of time (days or more), there is a long delay (up to a minute per day) before traffic forwarding stabilizes after the MLAG peer connection re-establishes. -3.7.0-5.4.0 -5.5.0-5.6.0 +3.7.0-4.3.1 +4.3.2-4.4.5, 5.5.0-5.6.0 3376798 @@ -2503,8 +2503,8 @@ Fixed: 6.8.9.9-5+deb8u24 switchd[30158]: hal_bcm_l3.c:1617 find_egr_path_if_vxlan_overlay:vxlan overlay : nh PORT: port <#>, vlan <x>.<y> not yet ready MAC learning looks correct, but traffic does not flow as expected. -3.7.0-3.7.16, 4.3.1-4.4.5 - +3.7.0-4.3.1 +4.3.2-4.4.5 3330705 @@ -3472,7 +3472,7 @@ Fixed: 1.6.2-5+deb8u9 CVE-2021-25217: parsing of stored leases by dhclient or dhcpd has an incorrect length check that may cause a crash. Vulnerable: <= 4.3.1-6-cl3.7.14u1 Fixed: 4.3.1-6-cl3.7.16u1 -3.7.0-3.7.15, 4.0.0-4.3.1 +3.7.0-3.7.15, 4.0.0-4.3.2 3.7.16, 4.4.0-4.4.5 @@ -3602,7 +3602,7 @@ Fixed: 0.4.1-1.2+deb8u1 2648658 If you try to use more than one percent of {{max-ecmp-nexthops}}, you get an error indicating a failure. -3.7.15-4.3.1 +3.7.15-4.3.2 4.4.0-4.4.5 @@ -3691,9 +3691,9 @@ To work around this issue, increase the burst value of the ARP policers to 200 o 2555175 -Control Plane Traffic (example - BGP peering from Leaf to Spine) goes down on Leaf due to Hold Down Timer Expiration of peer following prolonged link flaps on downlinks when vxlan enabled vlans are carried on the flapping link. -3.7.15-3.7.16, 4.2.1-4.4.5 - +Control plane traffic (such as BGP peering from leaf to spine) goes down on the leaf due to the peer Hold Down timer expiration following prolonged link flaps on down links when VXLAN enabled VLANs are carried on the flapping link. Be sure to correct layer 1 issues, configuration issues, or misbehaving link partners that are causing the link flaps. +3.7.15-4.3.1 +4.3.2-4.4.5 2554785 @@ -4054,7 +4054,7 @@ If you flap the link with the {{ip link set vni10100 down; ip link set vni10100 2549371 When Optimized Multicast Flooding (OMF) is enabled with the {{bridge.optimized_mcast_flood = TRUE}} setting in the {{/etc/cumulus/switchd.conf}} file, the switch continues to flood IPv6 multicast traffic to all slave ports when there is no MLD join receive. -3.7.11-4.3.1 +3.7.11-4.3.2 4.4.0-4.4.5 @@ -5043,7 +5043,7 @@ Fixed: 1.4.4-2+deb8u3 CVE-2020-12695: hostapd does not properly handle UPnP subscribe messages under certain conditions, allowing an attacker to cause a denial of service. Vulnerable: <= 2.8.0-cl3.7.15u2 Fixed: 2.8.0-cl3.7.15u3 -3.7.14-3.7.14.2, 4.3.0-4.3.1 +3.7.14-3.7.14.2, 4.3.0-4.3.2 2617009 @@ -5134,7 +5134,7 @@ Fixed: 0.99.beta19-2+deb8u2 2566880 CVE-2021-27803: A vulnerability was discovered in how p2p/p2p_pd.c in wpa_supplicant before 2.10 processes P2P (Wi-Fi Direct) provision discovery requests. It could result in denial of service or other impact (potentially execution of arbitrary code), for an attacker within radio range. -3.7.14-3.7.14.2, 4.0.0-4.3.1 +3.7.14-3.7.14.2, 4.0.0-4.3.2 2562511 @@ -5168,7 +5168,7 @@ To work around this issue, disable ARP suppression. 2556782 CVE-2021-0326: An issue has been found in wpa, a set of tools to support WPA and WPA2 (IEEE 802.11i). Missing validation of data can result in a buffer over-write, which might lead to a DoS of the wpa_supplicant process or potentially arbitrary code execution. Vulnerable: <= 2.8.0-cl3.7.14u1, <= 2.8.0-cl4.2.1u1 -3.7.14-3.7.14.2, 4.0.0-4.3.1 +3.7.14-3.7.14.2, 4.0.0-4.3.2 2556780 @@ -5472,8 +5472,8 @@ These messages are harmless and can be ignored. 3418046 If MLAG is configured but disconnected from an MLAG peer for an extended period of time (days or more), there is a long delay (up to a minute per day) before traffic forwarding stabilizes after the MLAG peer connection re-establishes. -3.7.0-5.4.0 -5.5.0-5.6.0 +3.7.0-4.3.1 +4.3.2-4.4.5, 5.5.0-5.6.0 3376798 @@ -5482,8 +5482,8 @@ These messages are harmless and can be ignored. switchd[30158]: hal_bcm_l3.c:1617 find_egr_path_if_vxlan_overlay:vxlan overlay : nh PORT: port <#>, vlan <x>.<y> not yet ready MAC learning looks correct, but traffic does not flow as expected. -3.7.0-3.7.16, 4.3.1-4.4.5 - +3.7.0-4.3.1 +4.3.2-4.4.5 3330705 @@ -6137,7 +6137,7 @@ Fixed: 1.6.2-5+deb8u9 CVE-2021-25217: parsing of stored leases by dhclient or dhcpd has an incorrect length check that may cause a crash. Vulnerable: <= 4.3.1-6-cl3.7.14u1 Fixed: 4.3.1-6-cl3.7.16u1 -3.7.0-3.7.15, 4.0.0-4.3.1 +3.7.0-3.7.15, 4.0.0-4.3.2 3.7.16, 4.4.0-4.4.5 @@ -6309,7 +6309,7 @@ Fixed: 1.4.4-2+deb8u3 CVE-2020-12695: hostapd does not properly handle UPnP subscribe messages under certain conditions, allowing an attacker to cause a denial of service. Vulnerable: <= 2.8.0-cl3.7.15u2 Fixed: 2.8.0-cl3.7.15u3 -3.7.14-3.7.14.2, 4.3.0-4.3.1 +3.7.14-3.7.14.2, 4.3.0-4.3.2 3.7.15-3.7.16, 4.4.0-4.4.5 @@ -6420,7 +6420,7 @@ Fixed: 0.99.beta19-2+deb8u2 2566880 CVE-2021-27803: A vulnerability was discovered in how p2p/p2p_pd.c in wpa_supplicant before 2.10 processes P2P (Wi-Fi Direct) provision discovery requests. It could result in denial of service or other impact (potentially execution of arbitrary code), for an attacker within radio range. -3.7.14-3.7.14.2, 4.0.0-4.3.1 +3.7.14-3.7.14.2, 4.0.0-4.3.2 3.7.15-3.7.16, 4.4.0-4.4.5 @@ -6465,7 +6465,7 @@ To work around this issue, disable ARP suppression. 2556782 CVE-2021-0326: An issue has been found in wpa, a set of tools to support WPA and WPA2 (IEEE 802.11i). Missing validation of data can result in a buffer over-write, which might lead to a DoS of the wpa_supplicant process or potentially arbitrary code execution. Vulnerable: <= 2.8.0-cl3.7.14u1, <= 2.8.0-cl4.2.1u1 -3.7.14-3.7.14.2, 4.0.0-4.3.1 +3.7.14-3.7.14.2, 4.0.0-4.3.2 3.7.15-3.7.16, 4.4.0-4.4.5 @@ -7108,7 +7108,7 @@ If you flap the link with the {{ip link set vni10100 down; ip link set vni10100 2549371 When Optimized Multicast Flooding (OMF) is enabled with the {{bridge.optimized_mcast_flood = TRUE}} setting in the {{/etc/cumulus/switchd.conf}} file, the switch continues to flood IPv6 multicast traffic to all slave ports when there is no MLD join receive. -3.7.11-4.3.1 +3.7.11-4.3.2 4.4.0-4.4.5 @@ -8160,8 +8160,8 @@ You can see the temperature reading in the output of the {{sensors}} command. 3418046 If MLAG is configured but disconnected from an MLAG peer for an extended period of time (days or more), there is a long delay (up to a minute per day) before traffic forwarding stabilizes after the MLAG peer connection re-establishes. -3.7.0-5.4.0 -5.5.0-5.6.0 +3.7.0-4.3.1 +4.3.2-4.4.5, 5.5.0-5.6.0 3376798 @@ -8170,8 +8170,8 @@ You can see the temperature reading in the output of the {{sensors}} command. -3.7.0-3.7.16, 4.3.1-4.4.5 - +3.7.0-4.3.1 +4.3.2-4.4.5 3330705 @@ -8782,7 +8782,7 @@ Fixed: 1.6.2-5+deb8u9 CVE-2021-25217: parsing of stored leases by dhclient or dhcpd has an incorrect length check that may cause a crash. Vulnerable: <= 4.3.1-6-cl3.7.14u1 Fixed: 4.3.1-6-cl3.7.16u1 -3.7.0-3.7.15, 4.0.0-4.3.1 +3.7.0-3.7.15, 4.0.0-4.3.2 3.7.16, 4.4.0-4.4.5 @@ -8943,7 +8943,7 @@ Fixed: 1.4.4-2+deb8u3 CVE-2020-12695: hostapd does not properly handle UPnP subscribe messages under certain conditions, allowing an attacker to cause a denial of service. Vulnerable: <= 2.8.0-cl3.7.15u2 Fixed: 2.8.0-cl3.7.15u3 -3.7.14-3.7.14.2, 4.3.0-4.3.1 +3.7.14-3.7.14.2, 4.3.0-4.3.2 3.7.15-3.7.16, 4.4.0-4.4.5 @@ -9048,7 +9048,7 @@ Fixed: 0.99.beta19-2+deb8u2 2566880 CVE-2021-27803: A vulnerability was discovered in how p2p/p2p_pd.c in wpa_supplicant before 2.10 processes P2P (Wi-Fi Direct) provision discovery requests. It could result in denial of service or other impact (potentially execution of arbitrary code), for an attacker within radio range. -3.7.14-3.7.14.2, 4.0.0-4.3.1 +3.7.14-3.7.14.2, 4.0.0-4.3.2 3.7.15-3.7.16, 4.4.0-4.4.5 @@ -9087,7 +9087,7 @@ To work around this issue, disable ARP suppression. 2556782 CVE-2021-0326: An issue has been found in wpa, a set of tools to support WPA and WPA2 (IEEE 802.11i). Missing validation of data can result in a buffer over-write, which might lead to a DoS of the wpa_supplicant process or potentially arbitrary code execution. Vulnerable: <= 2.8.0-cl3.7.14u1, <= 2.8.0-cl4.2.1u1 -3.7.14-3.7.14.2, 4.0.0-4.3.1 +3.7.14-3.7.14.2, 4.0.0-4.3.2 3.7.15-3.7.16, 4.4.0-4.4.5 @@ -9792,7 +9792,7 @@ If you flap the link with the {{ip link set vni10100 down; ip link set vni10100 2549371 When Optimized Multicast Flooding (OMF) is enabled with the {{bridge.optimized_mcast_flood = TRUE}} setting in the {{/etc/cumulus/switchd.conf}} file, the switch continues to flood IPv6 multicast traffic to all slave ports when there is no MLD join receive. -3.7.11-4.3.1 +3.7.11-4.3.2 4.4.0-4.4.5 @@ -11214,8 +11214,8 @@ To work around this issue, modify the routing design or policy such that routes 3418046 If MLAG is configured but disconnected from an MLAG peer for an extended period of time (days or more), there is a long delay (up to a minute per day) before traffic forwarding stabilizes after the MLAG peer connection re-establishes. -3.7.0-5.4.0 -5.5.0-5.6.0 +3.7.0-4.3.1 +4.3.2-4.4.5, 5.5.0-5.6.0 3376798 @@ -11224,8 +11224,8 @@ To work around this issue, modify the routing design or policy such that routes switchd[30158]: hal_bcm_l3.c:1617 find_egr_path_if_vxlan_overlay:vxlan overlay : nh PORT: port <#>, vlan <x>.<y> not yet ready MAC learning looks correct, but traffic does not flow as expected. -3.7.0-3.7.16, 4.3.1-4.4.5 - +3.7.0-4.3.1 +4.3.2-4.4.5 3330705 @@ -11836,7 +11836,7 @@ Fixed: 1.6.2-5+deb8u9 CVE-2021-25217: parsing of stored leases by dhclient or dhcpd has an incorrect length check that may cause a crash. Vulnerable: <= 4.3.1-6-cl3.7.14u1 Fixed: 4.3.1-6-cl3.7.16u1 -3.7.0-3.7.15, 4.0.0-4.3.1 +3.7.0-3.7.15, 4.0.0-4.3.2 3.7.16, 4.4.0-4.4.5 @@ -12836,7 +12836,7 @@ asic-monitor[7389]: File "/usr/lib/python2.7/dist-packages/cumulus/asic_monitor. 2549371 When Optimized Multicast Flooding (OMF) is enabled with the {{bridge.optimized_mcast_flood = TRUE}} setting in the {{/etc/cumulus/switchd.conf}} file, the switch continues to flood IPv6 multicast traffic to all slave ports when there is no MLD join receive. -3.7.11-4.3.1 +3.7.11-4.3.2 4.4.0-4.4.5 @@ -14323,8 +14323,8 @@ Typically, the destination MAC address 01:00:5e:xx:xx:xx is used only for PIM/IG 3418046 If MLAG is configured but disconnected from an MLAG peer for an extended period of time (days or more), there is a long delay (up to a minute per day) before traffic forwarding stabilizes after the MLAG peer connection re-establishes. -3.7.0-5.4.0 -5.5.0-5.6.0 +3.7.0-4.3.1 +4.3.2-4.4.5, 5.5.0-5.6.0 3376798 @@ -14333,8 +14333,8 @@ Typically, the destination MAC address 01:00:5e:xx:xx:xx is used only for PIM/IG switchd[30158]: hal_bcm_l3.c:1617 find_egr_path_if_vxlan_overlay:vxlan overlay : nh PORT: port <#>, vlan <x>.<y> not yet ready MAC learning looks correct, but traffic does not flow as expected. -3.7.0-3.7.16, 4.3.1-4.4.5 - +3.7.0-4.3.1 +4.3.2-4.4.5 3330705 @@ -14938,7 +14938,7 @@ Fixed: 1.6.2-5+deb8u9 CVE-2021-25217: parsing of stored leases by dhclient or dhcpd has an incorrect length check that may cause a crash. Vulnerable: <= 4.3.1-6-cl3.7.14u1 Fixed: 4.3.1-6-cl3.7.16u1 -3.7.0-3.7.15, 4.0.0-4.3.1 +3.7.0-3.7.15, 4.0.0-4.3.2 3.7.16, 4.4.0-4.4.5 @@ -15928,7 +15928,7 @@ To work around this issue, revert the configuration change. 2549371 When Optimized Multicast Flooding (OMF) is enabled with the {{bridge.optimized_mcast_flood = TRUE}} setting in the {{/etc/cumulus/switchd.conf}} file, the switch continues to flood IPv6 multicast traffic to all slave ports when there is no MLD join receive. -3.7.11-4.3.1 +3.7.11-4.3.2 4.4.0-4.4.5 @@ -17397,8 +17397,8 @@ net.ipv6.ip6frag_high_thresh = 262144 3418046 If MLAG is configured but disconnected from an MLAG peer for an extended period of time (days or more), there is a long delay (up to a minute per day) before traffic forwarding stabilizes after the MLAG peer connection re-establishes. -3.7.0-5.4.0 -5.5.0-5.6.0 +3.7.0-4.3.1 +4.3.2-4.4.5, 5.5.0-5.6.0 3376798 @@ -17407,8 +17407,8 @@ net.ipv6.ip6frag_high_thresh = 262144 switchd[30158]: hal_bcm_l3.c:1617 find_egr_path_if_vxlan_overlay:vxlan overlay : nh PORT: port <#>, vlan <x>.<y> not yet ready MAC learning looks correct, but traffic does not flow as expected. -3.7.0-3.7.16, 4.3.1-4.4.5 - +3.7.0-4.3.1 +4.3.2-4.4.5 3330705 @@ -17834,7 +17834,7 @@ Fixed: 1.6.2-5+deb8u9 CVE-2021-25217: parsing of stored leases by dhclient or dhcpd has an incorrect length check that may cause a crash. Vulnerable: <= 4.3.1-6-cl3.7.14u1 Fixed: 4.3.1-6-cl3.7.16u1 -3.7.0-3.7.15, 4.0.0-4.3.1 +3.7.0-3.7.15, 4.0.0-4.3.2 3.7.16, 4.4.0-4.4.5 @@ -18274,7 +18274,7 @@ To work around this issue, revert the configuration change. 2549371 When Optimized Multicast Flooding (OMF) is enabled with the {{bridge.optimized_mcast_flood = TRUE}} setting in the {{/etc/cumulus/switchd.conf}} file, the switch continues to flood IPv6 multicast traffic to all slave ports when there is no MLD join receive. -3.7.11-4.3.1 +3.7.11-4.3.2 4.4.0-4.4.5 @@ -20098,8 +20098,8 @@ To work around this issue, use {{net show interface}} command for LLDP output wh 3418046 If MLAG is configured but disconnected from an MLAG peer for an extended period of time (days or more), there is a long delay (up to a minute per day) before traffic forwarding stabilizes after the MLAG peer connection re-establishes. -3.7.0-5.4.0 -5.5.0-5.6.0 +3.7.0-4.3.1 +4.3.2-4.4.5, 5.5.0-5.6.0 3376798 @@ -20108,8 +20108,8 @@ To work around this issue, use {{net show interface}} command for LLDP output wh switchd[30158]: hal_bcm_l3.c:1617 find_egr_path_if_vxlan_overlay:vxlan overlay : nh PORT: port <#>, vlan <x>.<y> not yet ready MAC learning looks correct, but traffic does not flow as expected. -3.7.0-3.7.16, 4.3.1-4.4.5 - +3.7.0-4.3.1 +4.3.2-4.4.5 3330705 @@ -20535,7 +20535,7 @@ Fixed: 1.6.2-5+deb8u9 CVE-2021-25217: parsing of stored leases by dhclient or dhcpd has an incorrect length check that may cause a crash. Vulnerable: <= 4.3.1-6-cl3.7.14u1 Fixed: 4.3.1-6-cl3.7.16u1 -3.7.0-3.7.15, 4.0.0-4.3.1 +3.7.0-3.7.15, 4.0.0-4.3.2 3.7.16, 4.4.0-4.4.5 @@ -22330,8 +22330,8 @@ To work around this issue, use {{net show interface}} command for LLDP output wh 3418046 If MLAG is configured but disconnected from an MLAG peer for an extended period of time (days or more), there is a long delay (up to a minute per day) before traffic forwarding stabilizes after the MLAG peer connection re-establishes. -3.7.0-5.4.0 -5.5.0-5.6.0 +3.7.0-4.3.1 +4.3.2-4.4.5, 5.5.0-5.6.0 3376798 @@ -22340,8 +22340,8 @@ To work around this issue, use {{net show interface}} command for LLDP output wh switchd[30158]: hal_bcm_l3.c:1617 find_egr_path_if_vxlan_overlay:vxlan overlay : nh PORT: port <#>, vlan <x>.<y> not yet ready MAC learning looks correct, but traffic does not flow as expected. -3.7.0-3.7.16, 4.3.1-4.4.5 - +3.7.0-4.3.1 +4.3.2-4.4.5 3330705 @@ -22760,7 +22760,7 @@ Fixed: 1.6.2-5+deb8u9 CVE-2021-25217: parsing of stored leases by dhclient or dhcpd has an incorrect length check that may cause a crash. Vulnerable: <= 4.3.1-6-cl3.7.14u1 Fixed: 4.3.1-6-cl3.7.16u1 -3.7.0-3.7.15, 4.0.0-4.3.1 +3.7.0-3.7.15, 4.0.0-4.3.2 3.7.16, 4.4.0-4.4.5 @@ -24883,8 +24883,8 @@ To work around this issue, run the {{sudo ethtool -S swp1}} command to collect i 3418046 If MLAG is configured but disconnected from an MLAG peer for an extended period of time (days or more), there is a long delay (up to a minute per day) before traffic forwarding stabilizes after the MLAG peer connection re-establishes. -3.7.0-5.4.0 -5.5.0-5.6.0 +3.7.0-4.3.1 +4.3.2-4.4.5, 5.5.0-5.6.0 3376798 @@ -24893,8 +24893,8 @@ To work around this issue, run the {{sudo ethtool -S swp1}} command to collect i switchd[30158]: hal_bcm_l3.c:1617 find_egr_path_if_vxlan_overlay:vxlan overlay : nh PORT: port <#>, vlan <x>.<y> not yet ready MAC learning looks correct, but traffic does not flow as expected. -3.7.0-3.7.16, 4.3.1-4.4.5 - +3.7.0-4.3.1 +4.3.2-4.4.5 3330705 @@ -25313,7 +25313,7 @@ Fixed: 1.6.2-5+deb8u9 CVE-2021-25217: parsing of stored leases by dhclient or dhcpd has an incorrect length check that may cause a crash. Vulnerable: <= 4.3.1-6-cl3.7.14u1 Fixed: 4.3.1-6-cl3.7.16u1 -3.7.0-3.7.15, 4.0.0-4.3.1 +3.7.0-3.7.15, 4.0.0-4.3.2 3.7.16, 4.4.0-4.4.5 @@ -26863,8 +26863,8 @@ To work around this issue, use {{net show interface}} command for LLDP output wh 3418046 If MLAG is configured but disconnected from an MLAG peer for an extended period of time (days or more), there is a long delay (up to a minute per day) before traffic forwarding stabilizes after the MLAG peer connection re-establishes. -3.7.0-5.4.0 -5.5.0-5.6.0 +3.7.0-4.3.1 +4.3.2-4.4.5, 5.5.0-5.6.0 3376798 @@ -26873,8 +26873,8 @@ To work around this issue, use {{net show interface}} command for LLDP output wh switchd[30158]: hal_bcm_l3.c:1617 find_egr_path_if_vxlan_overlay:vxlan overlay : nh PORT: port <#>, vlan <x>.<y> not yet ready MAC learning looks correct, but traffic does not flow as expected. -3.7.0-3.7.16, 4.3.1-4.4.5 - +3.7.0-4.3.1 +4.3.2-4.4.5 3330705 @@ -27293,7 +27293,7 @@ Fixed: 1.6.2-5+deb8u9 CVE-2021-25217: parsing of stored leases by dhclient or dhcpd has an incorrect length check that may cause a crash. Vulnerable: <= 4.3.1-6-cl3.7.14u1 Fixed: 4.3.1-6-cl3.7.16u1 -3.7.0-3.7.15, 4.0.0-4.3.1 +3.7.0-3.7.15, 4.0.0-4.3.2 3.7.16, 4.4.0-4.4.5 @@ -29182,8 +29182,8 @@ If you need link pause or PFC functionality, you must use a switch that does not 3418046 If MLAG is configured but disconnected from an MLAG peer for an extended period of time (days or more), there is a long delay (up to a minute per day) before traffic forwarding stabilizes after the MLAG peer connection re-establishes. -3.7.0-5.4.0 -5.5.0-5.6.0 +3.7.0-4.3.1 +4.3.2-4.4.5, 5.5.0-5.6.0 3376798 @@ -29192,8 +29192,8 @@ If you need link pause or PFC functionality, you must use a switch that does not switchd[30158]: hal_bcm_l3.c:1617 find_egr_path_if_vxlan_overlay:vxlan overlay : nh PORT: port <#>, vlan <x>.<y> not yet ready MAC learning looks correct, but traffic does not flow as expected. -3.7.0-3.7.16, 4.3.1-4.4.5 - +3.7.0-4.3.1 +4.3.2-4.4.5 3330705 @@ -29612,7 +29612,7 @@ Fixed: 1.6.2-5+deb8u9 CVE-2021-25217: parsing of stored leases by dhclient or dhcpd has an incorrect length check that may cause a crash. Vulnerable: <= 4.3.1-6-cl3.7.14u1 Fixed: 4.3.1-6-cl3.7.16u1 -3.7.0-3.7.15, 4.0.0-4.3.1 +3.7.0-3.7.15, 4.0.0-4.3.2 3.7.16, 4.4.0-4.4.5 @@ -31246,8 +31246,8 @@ This issue was discovered on the Helix4 switch but applies to all switches. 3418046 If MLAG is configured but disconnected from an MLAG peer for an extended period of time (days or more), there is a long delay (up to a minute per day) before traffic forwarding stabilizes after the MLAG peer connection re-establishes. -3.7.0-5.4.0 -5.5.0-5.6.0 +3.7.0-4.3.1 +4.3.2-4.4.5, 5.5.0-5.6.0 3376798 @@ -31256,8 +31256,8 @@ This issue was discovered on the Helix4 switch but applies to all switches. switchd[30158]: hal_bcm_l3.c:1617 find_egr_path_if_vxlan_overlay:vxlan overlay : nh PORT: port <#>, vlan <x>.<y> not yet ready MAC learning looks correct, but traffic does not flow as expected. -3.7.0-3.7.16, 4.3.1-4.4.5 - +3.7.0-4.3.1 +4.3.2-4.4.5 3330705 @@ -31676,7 +31676,7 @@ Fixed: 1.6.2-5+deb8u9 CVE-2021-25217: parsing of stored leases by dhclient or dhcpd has an incorrect length check that may cause a crash. Vulnerable: <= 4.3.1-6-cl3.7.14u1 Fixed: 4.3.1-6-cl3.7.16u1 -3.7.0-3.7.15, 4.0.0-4.3.1 +3.7.0-3.7.15, 4.0.0-4.3.2 3.7.16, 4.4.0-4.4.5 @@ -32955,8 +32955,8 @@ The NetQ agent has been removed from Cumulus VX 3.7.7. The NetQ agent will be bu 3418046 If MLAG is configured but disconnected from an MLAG peer for an extended period of time (days or more), there is a long delay (up to a minute per day) before traffic forwarding stabilizes after the MLAG peer connection re-establishes. -3.7.0-5.4.0 -5.5.0-5.6.0 +3.7.0-4.3.1 +4.3.2-4.4.5, 5.5.0-5.6.0 3376798 @@ -32965,8 +32965,8 @@ The NetQ agent has been removed from Cumulus VX 3.7.7. The NetQ agent will be bu switchd[30158]: hal_bcm_l3.c:1617 find_egr_path_if_vxlan_overlay:vxlan overlay : nh PORT: port <#>, vlan <x>.<y> not yet ready MAC learning looks correct, but traffic does not flow as expected. -3.7.0-3.7.16, 4.3.1-4.4.5 - +3.7.0-4.3.1 +4.3.2-4.4.5 3330705 @@ -33385,7 +33385,7 @@ Fixed: 1.6.2-5+deb8u9 CVE-2021-25217: parsing of stored leases by dhclient or dhcpd has an incorrect length check that may cause a crash. Vulnerable: <= 4.3.1-6-cl3.7.14u1 Fixed: 4.3.1-6-cl3.7.16u1 -3.7.0-3.7.15, 4.0.0-4.3.1 +3.7.0-3.7.15, 4.0.0-4.3.2 3.7.16, 4.4.0-4.4.5 @@ -34691,8 +34691,8 @@ The NetQ agent has been removed from Cumulus VX 3.7.7. The NetQ agent will be bu 3418046 If MLAG is configured but disconnected from an MLAG peer for an extended period of time (days or more), there is a long delay (up to a minute per day) before traffic forwarding stabilizes after the MLAG peer connection re-establishes. -3.7.0-5.4.0 -5.5.0-5.6.0 +3.7.0-4.3.1 +4.3.2-4.4.5, 5.5.0-5.6.0 3376798 @@ -34701,8 +34701,8 @@ The NetQ agent has been removed from Cumulus VX 3.7.7. The NetQ agent will be bu switchd[30158]: hal_bcm_l3.c:1617 find_egr_path_if_vxlan_overlay:vxlan overlay : nh PORT: port <#>, vlan <x>.<y> not yet ready MAC learning looks correct, but traffic does not flow as expected. -3.7.0-3.7.16, 4.3.1-4.4.5 - +3.7.0-4.3.1 +4.3.2-4.4.5 3330705 @@ -35121,7 +35121,7 @@ Fixed: 1.6.2-5+deb8u9 CVE-2021-25217: parsing of stored leases by dhclient or dhcpd has an incorrect length check that may cause a crash. Vulnerable: <= 4.3.1-6-cl3.7.14u1 Fixed: 4.3.1-6-cl3.7.16u1 -3.7.0-3.7.15, 4.0.0-4.3.1 +3.7.0-3.7.15, 4.0.0-4.3.2 3.7.16, 4.4.0-4.4.5 @@ -36527,8 +36527,8 @@ The NetQ agent has been removed from Cumulus VX 3.7.7. The NetQ agent will be bu 3418046 If MLAG is configured but disconnected from an MLAG peer for an extended period of time (days or more), there is a long delay (up to a minute per day) before traffic forwarding stabilizes after the MLAG peer connection re-establishes. -3.7.0-5.4.0 -5.5.0-5.6.0 +3.7.0-4.3.1 +4.3.2-4.4.5, 5.5.0-5.6.0 3376798 @@ -36537,8 +36537,8 @@ The NetQ agent has been removed from Cumulus VX 3.7.7. The NetQ agent will be bu switchd[30158]: hal_bcm_l3.c:1617 find_egr_path_if_vxlan_overlay:vxlan overlay : nh PORT: port <#>, vlan <x>.<y> not yet ready MAC learning looks correct, but traffic does not flow as expected. -3.7.0-3.7.16, 4.3.1-4.4.5 - +3.7.0-4.3.1 +4.3.2-4.4.5 3330705 @@ -36957,7 +36957,7 @@ Fixed: 1.6.2-5+deb8u9 CVE-2021-25217: parsing of stored leases by dhclient or dhcpd has an incorrect length check that may cause a crash. Vulnerable: <= 4.3.1-6-cl3.7.14u1 Fixed: 4.3.1-6-cl3.7.16u1 -3.7.0-3.7.15, 4.0.0-4.3.1 +3.7.0-3.7.15, 4.0.0-4.3.2 3.7.16, 4.4.0-4.4.5 @@ -38406,8 +38406,8 @@ Permanent MAC address sync between MLAG peers is now supported. 3418046 If MLAG is configured but disconnected from an MLAG peer for an extended period of time (days or more), there is a long delay (up to a minute per day) before traffic forwarding stabilizes after the MLAG peer connection re-establishes. -3.7.0-5.4.0 -5.5.0-5.6.0 +3.7.0-4.3.1 +4.3.2-4.4.5, 5.5.0-5.6.0 3376798 @@ -38416,8 +38416,8 @@ Permanent MAC address sync between MLAG peers is now supported. switchd[30158]: hal_bcm_l3.c:1617 find_egr_path_if_vxlan_overlay:vxlan overlay : nh PORT: port <#>, vlan <x>.<y> not yet ready MAC learning looks correct, but traffic does not flow as expected. -3.7.0-3.7.16, 4.3.1-4.4.5 - +3.7.0-4.3.1 +4.3.2-4.4.5 3330705 @@ -38836,7 +38836,7 @@ Fixed: 1.6.2-5+deb8u9 CVE-2021-25217: parsing of stored leases by dhclient or dhcpd has an incorrect length check that may cause a crash. Vulnerable: <= 4.3.1-6-cl3.7.14u1 Fixed: 4.3.1-6-cl3.7.16u1 -3.7.0-3.7.15, 4.0.0-4.3.1 +3.7.0-3.7.15, 4.0.0-4.3.2 3.7.16, 4.4.0-4.4.5 @@ -39598,8 +39598,8 @@ To work around this issue, remove the matching {{network}} statement. 3418046 If MLAG is configured but disconnected from an MLAG peer for an extended period of time (days or more), there is a long delay (up to a minute per day) before traffic forwarding stabilizes after the MLAG peer connection re-establishes. -3.7.0-5.4.0 -5.5.0-5.6.0 +3.7.0-4.3.1 +4.3.2-4.4.5, 5.5.0-5.6.0 3376798 @@ -39608,8 +39608,8 @@ To work around this issue, remove the matching {{network}} statement. switchd[30158]: hal_bcm_l3.c:1617 find_egr_path_if_vxlan_overlay:vxlan overlay : nh PORT: port <#>, vlan <x>.<y> not yet ready MAC learning looks correct, but traffic does not flow as expected. -3.7.0-3.7.16, 4.3.1-4.4.5 - +3.7.0-4.3.1 +4.3.2-4.4.5 3330705 @@ -40028,7 +40028,7 @@ Fixed: 1.6.2-5+deb8u9 CVE-2021-25217: parsing of stored leases by dhclient or dhcpd has an incorrect length check that may cause a crash. Vulnerable: <= 4.3.1-6-cl3.7.14u1 Fixed: 4.3.1-6-cl3.7.16u1 -3.7.0-3.7.15, 4.0.0-4.3.1 +3.7.0-3.7.15, 4.0.0-4.3.2 3.7.16, 4.4.0-4.4.5 diff --git a/content/cumulus-linux-40/Layer-2/Spanning-Tree-and-Rapid-Spanning-Tree.md b/content/cumulus-linux-40/Layer-2/Spanning-Tree-and-Rapid-Spanning-Tree.md index 9ad72feee0..f8cdd50a41 100644 --- a/content/cumulus-linux-40/Layer-2/Spanning-Tree-and-Rapid-Spanning-Tree.md +++ b/content/cumulus-linux-40/Layer-2/Spanning-Tree-and-Rapid-Spanning-Tree.md @@ -48,7 +48,7 @@ RSTP works with MST seamlessly, creating a single instance of spanning tree that RSTP treats the MST domain as one giant switch, whereas MST treats the RSTP domain as a different region. To enable proper communication between the regions, MST creates a Common Spanning Tree (CST) that connects all the boundary switches and forms the overall view of the MST domain. Because changes in the CST need to be reflected in all regions, the RSTP tree is included in the CST to ensure that changes on the RSTP domain are reflected in the CST domain. This does cause topology changes on the RSTP domain to impact the rest of the network but keeps the MST domain informed of every change occurring in the RSTP domain, ensuring a loop-free network. -Configure the root bridge within the MST domain by changing the priority on the relevant MST switch. When MST detects an RSTP link, it falls back into RSTP mode. The MST domain choses the switch with the lowest cost to the CST root bridge as the CIST root bridge. +Configure the root bridge within the MST domain by changing the priority on the relevant MST switch. When MST detects an RSTP link, it falls back into RSTP mode. The MST domain chooses the switch with the lowest cost to the CST root bridge as the CIST root bridge. ### RSTP with MLAG diff --git a/content/cumulus-linux-40/Layer-3/Border-Gateway-Protocol-BGP/Optional-BGP-Configuration.md b/content/cumulus-linux-40/Layer-3/Border-Gateway-Protocol-BGP/Optional-BGP-Configuration.md index a98e894dd8..3ad931decb 100644 --- a/content/cumulus-linux-40/Layer-3/Border-Gateway-Protocol-BGP/Optional-BGP-Configuration.md +++ b/content/cumulus-linux-40/Layer-3/Border-Gateway-Protocol-BGP/Optional-BGP-Configuration.md @@ -391,7 +391,7 @@ cumulus@switch:~$ net add bgp neighbor swp51 remove-private-AS replace-AS ## ECMP -BGP supports equal-cost multipathing ({{}}). If a BGP node hears a certain prefix from multiple peers, it has all the information necessary to program the routing table and forward traffic for that prefix through all of these peers. BGP typically choses one best path for each prefix and installs that route in the forwarding table. +BGP supports equal-cost multipathing ({{}}). If a BGP node hears a certain prefix from multiple peers, it has all the information necessary to program the routing table and forward traffic for that prefix through all of these peers. BGP typically chooses one best path for each prefix and installs that route in the forwarding table. In Cumulus Linux, the *BGP multipath* option is enabled by default with the maximum number of paths set to 64 so that the switch can install multiple equal-cost BGP paths to the forwarding table and load balance traffic across multiple links. You can change the number of paths allowed, according to your needs. diff --git a/content/cumulus-linux-40/Layer-3/Policy-based-Routing.md b/content/cumulus-linux-40/Layer-3/Policy-based-Routing.md index 01935433cd..65ce75cffc 100644 --- a/content/cumulus-linux-40/Layer-3/Policy-based-Routing.md +++ b/content/cumulus-linux-40/Layer-3/Policy-based-Routing.md @@ -30,7 +30,7 @@ A PBR policy contains one or more policy maps. Each policy map: - To match on a source and destination address, a policy map can contain both match source and match destination IP rules. - A set rule determines the PBR next hop for the policy. The set rule can contain a single next hop IP address or it can contain a next hop group. A next hop group has more than one next hop IP address so that you can use multiple interfaces to forward traffic. To use ECMP, you configure a next hop group. -To use PBR in Cumulus linux, you define a PBR policy and apply it to the ingress interface (the interface must already have an IP address assigned). Traffic is matched against the match rules in sequential order and forwarded according to the set rule in the first match. Traffic that does not match any rule is passed onto the normal destination based routing mechanism. +To use PBR in Cumulus Linux, you define a PBR policy and apply it to the ingress interface (the interface must already have an IP address assigned). Traffic is matched against the match rules in sequential order and forwarded according to the set rule in the first match. Traffic that does not match any rule is passed onto the normal destination based routing mechanism. {{%notice note%}} diff --git a/content/cumulus-linux-40/Layer-3/Routing.md b/content/cumulus-linux-40/Layer-3/Routing.md index dcc50c58cd..a7b6a9c726 100644 --- a/content/cumulus-linux-40/Layer-3/Routing.md +++ b/content/cumulus-linux-40/Layer-3/Routing.md @@ -468,7 +468,7 @@ When {{}}). If a BGP node hears a certain prefix from multiple peers, it has all the information necessary to program the routing table and forward traffic for that prefix through all of these peers. BGP typically choses one best path for each prefix and installs that route in the forwarding table. +BGP supports equal-cost multipathing ({{}}). If a BGP node hears a certain prefix from multiple peers, it has all the information necessary to program the routing table and forward traffic for that prefix through all of these peers. BGP typically chooses one best path for each prefix and installs that route in the forwarding table. In Cumulus Linux, the *BGP multipath* option is enabled by default with the maximum number of paths set to 64 so that the switch can install multiple equal-cost BGP paths to the forwarding table and load balance traffic across multiple links. You can change the number of paths allowed, according to your needs. diff --git a/content/cumulus-linux-41/Layer-3/Policy-based-Routing.md b/content/cumulus-linux-41/Layer-3/Policy-based-Routing.md index 78b6377506..f700e2525b 100644 --- a/content/cumulus-linux-41/Layer-3/Policy-based-Routing.md +++ b/content/cumulus-linux-41/Layer-3/Policy-based-Routing.md @@ -30,7 +30,7 @@ A PBR policy contains one or more policy maps. Each policy map: - To match on a source and destination address, a policy map can contain both match source and match destination IP rules. - A set rule determines the PBR next hop for the policy. The set rule can contain a single next hop IP address or it can contain a next hop group. A next hop group has more than one next hop IP address so that you can use multiple interfaces to forward traffic. To use ECMP, you configure a next hop group. -To use PBR in Cumulus linux, you define a PBR policy and apply it to the ingress interface (the interface must already have an IP address assigned). Traffic is matched against the match rules in sequential order and forwarded according to the set rule in the first match. Traffic that does not match any rule is passed onto the normal destination based routing mechanism. +To use PBR in Cumulus Linux, you define a PBR policy and apply it to the ingress interface (the interface must already have an IP address assigned). Traffic is matched against the match rules in sequential order and forwarded according to the set rule in the first match. Traffic that does not match any rule is passed onto the normal destination based routing mechanism. {{%notice note%}} diff --git a/content/cumulus-linux-41/Layer-3/Routing.md b/content/cumulus-linux-41/Layer-3/Routing.md index 07c01ef194..ddbbc44da5 100644 --- a/content/cumulus-linux-41/Layer-3/Routing.md +++ b/content/cumulus-linux-41/Layer-3/Routing.md @@ -505,7 +505,7 @@ When {{}}). If a BGP node hears a certain prefix from multiple peers, it has all the information necessary to program the routing table and forward traffic for that prefix through all of these peers. BGP typically choses one best path for each prefix and installs that route in the forwarding table. +BGP supports equal-cost multipathing ({{}}). If a BGP node hears a certain prefix from multiple peers, it has all the information necessary to program the routing table and forward traffic for that prefix through all of these peers. BGP typically chooses one best path for each prefix and installs that route in the forwarding table. In Cumulus Linux, the *BGP multipath* option is enabled by default with the maximum number of paths set to 64 so that the switch can install multiple equal-cost BGP paths to the forwarding table and load balance traffic across multiple links. You can change the number of paths allowed, according to your needs. diff --git a/content/cumulus-linux-42/Layer-3/Routing/Policy-based-Routing.md b/content/cumulus-linux-42/Layer-3/Routing/Policy-based-Routing.md index ba46216b8e..6680e865a8 100644 --- a/content/cumulus-linux-42/Layer-3/Routing/Policy-based-Routing.md +++ b/content/cumulus-linux-42/Layer-3/Routing/Policy-based-Routing.md @@ -30,7 +30,7 @@ A PBR policy contains one or more policy maps. Each policy map: - To match on a source and destination address, a policy map can contain both match source and match destination IP rules. - A set rule determines the PBR next hop for the policy. The set rule can contain a single next hop IP address or it can contain a next hop group. A next hop group has more than one next hop IP address so that you can use multiple interfaces to forward traffic. To use ECMP, you configure a next hop group. -To use PBR in Cumulus linux, you define a PBR policy and apply it to the ingress interface (the interface must already have an IP address assigned). Traffic is matched against the match rules in sequential order and forwarded according to the set rule in the first match. Traffic that does not match any rule is passed onto the normal destination based routing mechanism. +To use PBR in Cumulus Linux, you define a PBR policy and apply it to the ingress interface (the interface must already have an IP address assigned). Traffic is matched against the match rules in sequential order and forwarded according to the set rule in the first match. Traffic that does not match any rule is passed onto the normal destination based routing mechanism. {{%notice note%}} diff --git a/content/cumulus-linux-42/Layer-3/Routing/Supported-Route-Table-Entries.md b/content/cumulus-linux-42/Layer-3/Routing/Supported-Route-Table-Entries.md index b94b50e521..1df5e196ab 100644 --- a/content/cumulus-linux-42/Layer-3/Routing/Supported-Route-Table-Entries.md +++ b/content/cumulus-linux-42/Layer-3/Routing/Supported-Route-Table-Entries.md @@ -46,10 +46,8 @@ After you specify a different profile, {{%link url="Configuring-switchd#restart- The following tables list the number of MAC addresses, layer 3 neighbors, and LPM routes validated for each forwarding table profile for supported platforms. If you do not specify any profiles as described above, the switch uses the *default* values. -{{%notice tip%}} - -The values in the following tables reflect results from testing on supported platforms, which might differ from published manufacturer specifications. - +{{%notice note%}} +The values provided in the profiles below are the maximum values that Cumulus Linux software allocates; the theoretical hardware limits might be higher. These limits refer to values that have been validated as part of the unidimensional scale validation. If you try to achieve maximum scalability with multiple features enabled, results might differ from the values listed in this guide. {{%/notice%}} ### Mellanox Spectrum Switches @@ -129,4 +127,4 @@ When {{}} -{{< tab "Upgrade to Cumulus Linux 4.3.1 ">}} +{{< tab "Upgrade to Cumulus Linux 4.3.1 and later ">}} To ensure that 4.3.1 package update is available only for Broadcom switches, you must either run `apt update` and `apt upgrade` twice *or* manually edit the `sources.list` file, then run `apt update` and `apt upgrade` once. Both procedures are below. diff --git a/content/cumulus-linux-43/Layer-1-and-Switch-Ports/DHCP/DHCP-Relays.md b/content/cumulus-linux-43/Layer-1-and-Switch-Ports/DHCP/DHCP-Relays.md index 5080ade623..9b7617b8c2 100644 --- a/content/cumulus-linux-43/Layer-1-and-Switch-Ports/DHCP/DHCP-Relays.md +++ b/content/cumulus-linux-43/Layer-1-and-Switch-Ports/DHCP/DHCP-Relays.md @@ -109,7 +109,7 @@ NCLU commands are not currently available to configure IPv6 relays. Use the Linu ## Optional Configuration -This section describes optional DHCP relay configuration. The steps provided in this section assume that you already done basic DHCP relay configuration, described above. +This section describes optional DHCP relay configurations. The steps provided in this section assume that you have already configured basic DHCP relay, as described above. ### DHCP Agent Information Option (Option 82) diff --git a/content/cumulus-linux-43/Layer-2/Spanning-Tree-and-Rapid-Spanning-Tree.md b/content/cumulus-linux-43/Layer-2/Spanning-Tree-and-Rapid-Spanning-Tree.md index f704f3781e..2848b32c55 100644 --- a/content/cumulus-linux-43/Layer-2/Spanning-Tree-and-Rapid-Spanning-Tree.md +++ b/content/cumulus-linux-43/Layer-2/Spanning-Tree-and-Rapid-Spanning-Tree.md @@ -48,7 +48,7 @@ RSTP works with MST seamlessly, creating a single instance of spanning tree that RSTP treats the MST domain as one giant switch, whereas MST treats the RSTP domain as a different region. To enable proper communication between the regions, MST creates a Common Spanning Tree (CST) that connects all the boundary switches and forms the overall view of the MST domain. Because changes in the CST need to be reflected in all regions, the RSTP tree is included in the CST to ensure that changes on the RSTP domain are reflected in the CST domain. This does cause topology changes on the RSTP domain to impact the rest of the network but keeps the MST domain informed of every change occurring in the RSTP domain, ensuring a loop-free network. -Configure the root bridge within the MST domain by changing the priority on the relevant MST switch. When MST detects an RSTP link, it falls back into RSTP mode. The MST domain choses the switch with the lowest cost to the CST root bridge as the CIST root bridge. +Configure the root bridge within the MST domain by changing the priority on the relevant MST switch. When MST detects an RSTP link, it falls back into RSTP mode. The MST domain chooses the switch with the lowest cost to the CST root bridge as the CIST root bridge. ### RSTP with MLAG diff --git a/content/cumulus-linux-43/Layer-3/Border-Gateway-Protocol-BGP/Optional-BGP-Configuration.md b/content/cumulus-linux-43/Layer-3/Border-Gateway-Protocol-BGP/Optional-BGP-Configuration.md index fdf3258a2c..11058b05c2 100644 --- a/content/cumulus-linux-43/Layer-3/Border-Gateway-Protocol-BGP/Optional-BGP-Configuration.md +++ b/content/cumulus-linux-43/Layer-3/Border-Gateway-Protocol-BGP/Optional-BGP-Configuration.md @@ -634,7 +634,7 @@ Total number of neighbors 1 ## ECMP -BGP supports equal-cost multipathing ({{}}). If a BGP node hears a certain prefix from multiple peers, it has all the information necessary to program the routing table and forward traffic for that prefix through all of these peers. BGP typically choses one best path for each prefix and installs that route in the forwarding table. +BGP supports equal-cost multipathing ({{}}). If a BGP node hears a certain prefix from multiple peers, it has all the information necessary to program the routing table and forward traffic for that prefix through all of these peers. BGP typically chooses one best path for each prefix and installs that route in the forwarding table. In Cumulus Linux, the *BGP multipath* option is enabled by default with the maximum number of paths set to 64 so that the switch can install multiple equal-cost BGP paths to the forwarding table and load balance traffic across multiple links. You can change the number of paths allowed, according to your needs. diff --git a/content/cumulus-linux-43/Layer-3/Routing/Policy-based-Routing.md b/content/cumulus-linux-43/Layer-3/Routing/Policy-based-Routing.md index ea5ef8dcdf..b17ea06cc5 100644 --- a/content/cumulus-linux-43/Layer-3/Routing/Policy-based-Routing.md +++ b/content/cumulus-linux-43/Layer-3/Routing/Policy-based-Routing.md @@ -30,7 +30,7 @@ A PBR policy contains one or more policy maps. Each policy map: - To match on a source and destination address, a policy map can contain both match source and match destination IP rules. - A set rule determines the PBR next hop for the policy. The set rule can contain a single next hop IP address or it can contain a next hop group. A next hop group has more than one next hop IP address so that you can use multiple interfaces to forward traffic. To use ECMP, you configure a next hop group. -To use PBR in Cumulus linux, you define a PBR policy and apply it to the ingress interface (the interface must already have an IP address assigned). Traffic is matched against the match rules in sequential order and forwarded according to the set rule in the first match. Traffic that does not match any rule is passed onto the normal destination based routing mechanism. +To use PBR in Cumulus Linux, you define a PBR policy and apply it to the ingress interface (the interface must already have an IP address assigned). Traffic is matched against the match rules in sequential order and forwarded according to the set rule in the first match. Traffic that does not match any rule is passed onto the normal destination based routing mechanism. {{%notice note%}} diff --git a/content/cumulus-linux-43/Layer-3/Routing/Supported-Route-Table-Entries.md b/content/cumulus-linux-43/Layer-3/Routing/Supported-Route-Table-Entries.md index 39fe19ebdb..869361b9bf 100644 --- a/content/cumulus-linux-43/Layer-3/Routing/Supported-Route-Table-Entries.md +++ b/content/cumulus-linux-43/Layer-3/Routing/Supported-Route-Table-Entries.md @@ -46,10 +46,8 @@ After you specify a different profile, {{%link url="Configuring-switchd#restart- The following tables list the number of MAC addresses, layer 3 neighbors, and LPM routes validated for each forwarding table profile for supported platforms. If you do not specify any profiles as described above, the switch uses the *default* values. -{{%notice tip%}} - -The values in the following tables reflect results from testing on supported platforms, which might differ from published manufacturer specifications. - +{{%notice note%}} +The values provided in the profiles below are the maximum values that Cumulus Linux software allocates; the theoretical hardware limits might be higher. These limits refer to values that have been validated as part of the unidimensional scale validation. If you try to achieve maximum scalability with multiple features enabled, results might differ from the values listed in this guide. {{%/notice%}} ### Mellanox Spectrum Switches @@ -129,4 +127,4 @@ When {{MIB Name | Suggested Uses | | -------- | -------------- | | {{}}
{{}}
{{}}
{{}} | You can enable FRRouting SNMP support to provide support for OSPF-MIB (RFC-1850), OSPFV3-MIB (RFC-5643), and BGP4-MIB (RFC-1657). See the FRRouting section above. | -| {{}} | Cumulus Linux also includes its own BGP unnumbered MIB for BGP unnumbered peers, defined in `/usr/share/snmp/mibs/Cumulus-BGPUN-MIB.txt`, which has the OID `1.3.6.1.4.1.40310.7`. CUMULUS-BGPVRF-MIB replaces CUMULUS-BGPUN-MIB.| +| {{}} | Cumulus Linux also includes its own BGP unnumbered MIB for BGP unnumbered peers, defined in `/usr/share/snmp/mibs/Cumulus-BGPUN-MIB.txt`, which has the OID `1.3.6.1.4.1.40310.7`.| | {{}} | Discard counters: Cumulus Linux also includes its own counters MIB, defined in `/usr/share/snmp/mibs/Cumulus-Counters-MIB.txt`. It has the OID `.1.3.6.1.4.1.40310.2`. | | {{}} | The custom {{}} defined in the `/usr/share/snmp/mibs/Cumulus-POE-MIB.txt` file. For devices that provide PoE, this provides users with the system wide power information in `poeSystemValues` as well as per interface `PoeObjectsEntry` values for the `poeObjectsTable`. Most of this information comes from the `poectl` command. To enable this MIB, uncomment the following line in `/etc/snmp/snmpd.conf`:
#pass_persist .1.3.6.1.4.1.40310.3 /usr/share/snmp/cl_poe_pp.py
| | {{}} | Cumulus Linux includes its own resource utilization MIB, which is similar to using `cl-resource-query`. This MIB monitors layer 3 entries by host, route, nexthops, ECMP groups, and layer 2 MAC/BDPU entries. The MIB is defined in `/usr/share/snmp/mibs/Cumulus-Resource-Query-MIB.txt` and has the OID `.1.3.6.1.4.1.40310.1`. | diff --git a/content/cumulus-linux-43/Network-Solutions/Docker-on-Cumulus-Linux.md b/content/cumulus-linux-43/Network-Solutions/Docker-on-Cumulus-Linux.md index 126591afe5..86f781da3d 100644 --- a/content/cumulus-linux-43/Network-Solutions/Docker-on-Cumulus-Linux.md +++ b/content/cumulus-linux-43/Network-Solutions/Docker-on-Cumulus-Linux.md @@ -69,7 +69,7 @@ Do you want to continue? [Y/n] cumulus@switch:mgmt:~$ sudo systemctl daemon-reload ``` -3. In the managment VRF, enable the Docker service. Docker pulls container images from the internet, which requires internet access through the management VRF. +3. In the management VRF, enable the Docker service. Docker pulls container images from the internet, which requires internet access through the management VRF. ``` cumulus@switch:mgmt:~$ sudo systemctl enable --now docker@mgmt.service diff --git a/content/cumulus-linux-43/Network-Virtualization/Ethernet-Virtual-Private-Network-EVPN/Inter-subnet-Routing.md b/content/cumulus-linux-43/Network-Virtualization/Ethernet-Virtual-Private-Network-EVPN/Inter-subnet-Routing.md index 892ddaf575..63864cd912 100644 --- a/content/cumulus-linux-43/Network-Virtualization/Ethernet-Virtual-Private-Network-EVPN/Inter-subnet-Routing.md +++ b/content/cumulus-linux-43/Network-Virtualization/Ethernet-Virtual-Private-Network-EVPN/Inter-subnet-Routing.md @@ -815,7 +815,7 @@ In an EVPN centralized routing configuration, where the layer 2 network extends In EVPN symmetric routing, if you use the same SVI IP address across racks; for example, if the SVI IP address for a specific VLAN interface (such as vlan100) is the same on all VTEPs where this SVI is present, be aware of the following: -- You cannot use ping between SVI IP adresses to verify connectivity between VTEPs because either the local rack itself uses the ping destination IP address or many remote racks use the ping destination IP address. +- You cannot use ping between SVI IP addresses to verify connectivity between VTEPs because either the local rack itself uses the ping destination IP address or many remote racks use the ping destination IP address. - If you use ping from a host to the SVI IP address, the local VTEP (gateway) might not reply if the host has an ARP entry from a remote gateway. There are no issues with host-to-host traffic. diff --git a/content/cumulus-linux-43/Whats-New/_index.md b/content/cumulus-linux-43/Whats-New/_index.md index 416a02c0ce..1646a7769f 100644 --- a/content/cumulus-linux-43/Whats-New/_index.md +++ b/content/cumulus-linux-43/Whats-New/_index.md @@ -10,6 +10,16 @@ This document supports the Cumulus Linux 4.3 release, and lists new platforms an - For a list of open and fixed issues in Cumulus Linux 4.3, see the {{}}. - To upgrade to Cumulus Linux 4.3, follow the steps in {{}}. +## What's New in Cumulus Linux 4.3.2 + +Cumulus Linux 4.3.2 provides bug fixes. + +{{%notice note%}} +Cumulus Linux 4.3.2 is supported on Broadcom switches only. You cannot upgrade to Cumulus Linux 4.3.2 on a Mellanox switch. +- NVIDIA does not provide a Cumulus Linux 4.3.2 image for Mellanox switches. +- To upgrade a Broadcom switch to Cumulus Linux 4.3.2 with `apt upgrade`, see {{}}. +{{%/notice%}} + ## What's New in Cumulus Linux 4.3.1 Cumulus Linux 4.3.1 provides bug fixes. @@ -17,7 +27,7 @@ Cumulus Linux 4.3.1 provides bug fixes. {{%notice note%}} Cumulus Linux 4.3.1 is supported on Broadcom switches only. You cannot upgrade to Cumulus Linux 4.3.1 on a Mellanox switch. - NVIDIA does not provide a Cumulus Linux 4.3.1 image for Mellanox switches. -- To upgrade a Broadcom switch to Cumulus Linux 4.3.1 with `apt upgrade`, see {{}}. +- To upgrade a Broadcom switch to Cumulus Linux 4.3.1 with `apt upgrade`, see {{}}. {{%/notice%}} ## What's New in Cumulus Linux 4.3.0 diff --git a/content/cumulus-linux-43/Whats-New/foss.md b/content/cumulus-linux-43/Whats-New/foss.md index 9a7e88c914..69155b7888 100644 --- a/content/cumulus-linux-43/Whats-New/foss.md +++ b/content/cumulus-linux-43/Whats-New/foss.md @@ -7,7 +7,7 @@ version: "4.3" toc: 1 pdfhidden: True --- -## 4.3.1 Open Source Software Licenses +## 4.3.2 Open Source Software Licenses | Package | Version | License(s) | |--- |--- |--- | | {{}} | 1.7-1.1 | GPL | @@ -36,18 +36,19 @@ pdfhidden: True | {{}} | 0.19.8.1-9 | GFDL; GPL; LGPL | | {{}} | 20180224.1 | GPL | | {{}} | 1.5.6-2+deb10u1 | GPL; GPL-2; GPL-3; GPL-3+; LGPL-2.1; MIT | -| {{}} | 10.3+deb10u12 | GPL | +| {{}} | 10.3+deb10u13 | GPL | | {{}} | 3.5.46 | GPL-2(update-passwd.c | | {{}} | 5.0-4 | GPL; GPL-3 | | {{}} | 2.8-6 | GPL-2+(* ); GPL-2+(debian/* ); GPL-2+(debian/* ) | | {{}} | 1.07.1-2+b1 | GPL-2.0+(* ); permissive(doc/dc.info); permissive'(doc/bc.texi); GPL-2.0+ with Texinfo exception(doc/texinfo.tex); X11 and public-domain(install-sh); GPL-2.0+(debian/* ); GPL-2.0+(debian/* ) | -| {{}} | 6.5.14-cl4u4 | Cumulus Networks Proprietary(* ); GPL-2(debian/* ) | -| {{}} | 6.5.14-cl4u4 | Cumulus Networks Proprietary(* ); GPL-2(debian/* ) | -| {{}} | 6.5.14-cl4u4 | Cumulus Networks Proprietary(* ); GPL-2(debian/* ) | -| {{}} | 6.5.14-cl4u4 | Cumulus Networks Proprietary(* ); GPL-2(debian/* ) | -| {{}} | 6.5.14-cl4u4 | Cumulus Networks Proprietary(* ); GPL-2(debian/* ) | -| {{}} | 9.11.5.P4+dfsg-5.1+deb10u7 | ISC and BSD-2-clause and BSD-3-clause and BSD-4-clause(* ); MPL-2.0 or ISC(bin/tests/system/chain/); BSD-2-clause(unit/atf-src/); BSD-4-clause(contrib/idn/); ISC or MPL-2.0(debian/); ISC(debian/); BSD-2-clause(debian/); BSD-3-clause(debian/); BSD-4-clause(debian/); MPL-2.0(debian/) | -| {{}} | 9.11.5.P4+dfsg-5.1+deb10u7 | ISC and BSD-2-clause and BSD-3-clause and BSD-4-clause(* ); MPL-2.0 or ISC(bin/tests/system/chain/); BSD-2-clause(unit/atf-src/); BSD-4-clause(contrib/idn/); ISC or MPL-2.0(debian/); ISC(debian/); BSD-2-clause(debian/); BSD-3-clause(debian/); BSD-4-clause(debian/); MPL-2.0(debian/) | +| {{}} | 6.5.14-cl4u5 | Cumulus Networks Proprietary(* ); GPL-2(debian/* ) | +| {{}} | 6.5.14-cl4u5 | Cumulus Networks Proprietary(* ); GPL-2(debian/* ) | +| {{}} | 6.5.14-cl4u5 | Cumulus Networks Proprietary(* ); GPL-2(debian/* ) | +| {{}} | 6.5.14-cl4u5 | Cumulus Networks Proprietary(* ); GPL-2(debian/* ) | +| {{}} | 6.5.14-cl4u5 | Cumulus Networks Proprietary(* ); GPL-2(debian/* ) | +| {{}} | 9.11.5.P4+dfsg-5.1+deb10u9 | ISC and BSD-2-clause and BSD-3-clause and BSD-4-clause(* ); MPL-2.0 or ISC(bin/tests/system/chain/); BSD-2-clause(unit/atf-src/); BSD-4-clause(contrib/idn/); ISC or MPL-2.0(debian/); ISC(debian/); BSD-2-clause(debian/); BSD-3-clause(debian/); BSD-4-clause(debian/); MPL-2.0(debian/) | +| {{}} | 9.11.5.P4+dfsg-5.1+deb10u9 | ISC and BSD-2-clause and BSD-3-clause and BSD-4-clause(* ); MPL-2.0 or ISC(bin/tests/system/chain/); BSD-2-clause(unit/atf-src/); BSD-4-clause(contrib/idn/); ISC or MPL-2.0(debian/); ISC(debian/); BSD-2-clause(debian/); BSD-3-clause(debian/); BSD-4-clause(debian/); MPL-2.0(debian/) | +| {{}} | 9.11.5.P4+dfsg-5.1+deb10u9 | ISC and BSD-2-clause and BSD-3-clause and BSD-4-clause(* ); MPL-2.0 or ISC(bin/tests/system/chain/); BSD-2-clause(unit/atf-src/); BSD-4-clause(contrib/idn/); ISC or MPL-2.0(debian/); ISC(debian/); BSD-2-clause(debian/); BSD-3-clause(debian/); BSD-4-clause(debian/); MPL-2.0(debian/) | | {{}} | 2.2.0-2 | GPL-3+(* ) | | {{}} | 2.31.1-16 | GFDL; GPL; LGPL | | {{}} | 2.31.1-16 | GFDL; GPL; LGPL | @@ -71,7 +72,7 @@ pdfhidden: True | {{}} | 0.41-8.1 | LGPL-2.1(* ); BSD-3-clause or GPL-2 | | {{}} | 0.41-8.1 | LGPL-2.1(* ); BSD-3-clause or GPL-2 | | {{}} | 0.16-2+b1 | GPL | -| {{}} | 1.4.0-cl4.3.1u10 | Cumulus Networks Proprietary(* ); GPL-2(debian/* ); Cumulus Networks Proprietary(debian/* ); GPL-2(debian/* ) | +| {{}} | 1.4.0-cl4.3.2u11 | Cumulus Networks Proprietary(* ); GPL-2(debian/* ); Cumulus Networks Proprietary(debian/* ); GPL-2(debian/* ) | | {{}} | 7.0-47 | GPL | | {{}} | 7.0.1-8+deb10u2 | U-OF-I-BSD-LIKE(* ); LLVM(* /install-sh); Expat(clang/lib/Headers/* ); Expat(clang/lib/Headers/iso646.h); Expat(clang/lib/Headers/limits.h); Expat(clang/lib/Headers/stdarg.h); Expat(clang/lib/Headers/stdbool.h); Expat(clang/lib/Headers/stddef.h); Expat(clang/lib/Headers/stdint.h); Expat(clang/lib/Headers/tgmath.h); U-OF-I-BSD-LIKE or MIT(compiler-rt/* ); MIT(compiler-rt/lib/BlocksRuntime/Block.h); MIT(compiler-rt/lib/BlocksRuntime/Block_private.h); MIT(compiler-rt/lib/BlocksRuntime/data.c); MIT(compiler-rt/lib/BlocksRuntime/runtime.c); U-OF-I-BSD-LIKE(include/llvm/Support/* ); BSD-3-clause(lib/Support/reg* ); solar-public-domain(lib/Support/MD5.cpp llvm/include/llvm/Support/MD5.h); ARM(lib/Target/ARM/* ); NCSA(lldb/* ); Expat(lldb/test/pexpect-2.4/* ); Expat(lldb/test/pexpect-2.4/* ); Python(lldb/test/unittest2/* ); Polly(polly/* ); public-domain(polly/lib/JSON/* ); U-OF-I-BSD-LIKE or MIT(polly/tools/GPURuntime/* ); MIT(test/YAMLParser/* ); Apple(lldb/tools/debugserver/source/MacOSX/stack_logging.h); BSD-3-Clause(utils/unittest/googletest/* ); BSD-3-Clause(libcxx/* ); NCSA or MIT(libcxx* /* ); U-OF-I-BSD-LIKE(openmp/* ); U-OF-I-BSD-LIKE(openmp/* ); MIT(openmp/* ) | | {{}} | 4.0-cl4.3.1u2 | Cumulus Networks Proprietary(* ); GPL-2(debian/* ) | @@ -83,7 +84,7 @@ pdfhidden: True | {{}} | 5.5 | GPL-2+(* ); Expat(displace.sh.in); Expat(examples/* ); Expat(examples/* ) | | {{}} | 1.4.5-2 | GPL-2+(* ); GPL-2+(src/cache.c src/cache-ct.c src/cache-exp.c src/external_cache.c src/external_inject.c src/internal_bypass.c src/internal_cache.c src/main.c src/netlink.c src/network.c src/parse.c src/run.c src/stats-mode.c src/sync-alarm.c src/sync-ftfw.c src/sync-mode.c src/sync-notrack.c); GPL-2+(src/filter.c); GPL-2+(src/rbtree.c); GPL-2+(src/utils.c); GPL-2+(src/conntrack.c); GPL-2+(src/systemd.c conntrackd.conf.5); GPL-2+(src/systemd.c conntrackd.conf.5) | | {{}} | 1.193~deb10u1 | NO COPYRIGHT FILE | -| {{}} | 1.6.8-1 | Apache-2.0(* ); Apache-2.0(debian/* ); Apache-2.0(debian/* ) | +| {{}} | 1.6.24-1 | Apache-2.0(* ); Apache-2.0(debian/* ); Apache-2.0(debian/* ) | | {{}} | 1.1.0-13+b1 | LGPL-2.1(debian/* ); GPL-2+(conf* * am * in ac* lt* missing); MIT/X(install-sh); LGPL-2.1(install-sh) | | {{}} | 8.30-3 | GPL; GPL-3 | | {{}} | 2.12+dfsg-9 | GPL; GPL-3 | @@ -95,47 +96,48 @@ pdfhidden: True | {{}} | 7.2.8-1+cl4u1 | NO COPYRIGHT FILE | | {{}} | 3.0pl1-133-cl4.3.1u4 | Paul-Vixie's-license(* ); Paul-Vixie's-license and GPL-2+ and ISC(database.c); GPL-2+(debian/examples/cron-stats.pl); GPL-2+(debian/examples/cron-tasks-review.sh); Artistic(debian/examples/crontab2english.pl); Paul-Vixie's-license(debian/examples/crontab2english.pl); GPL-2+(debian/examples/crontab2english.pl); Artistic(debian/examples/crontab2english.pl); ISC(debian/examples/crontab2english.pl) | | {{}} | 3.0pl1-133-cl4.3.1u4 | NO COPYRIGHT FILE | -| {{}} | 1.0-cl4.3.1u1 | Cumulus Networks Proprietary(* ); GPL-2(debian/* ) | -| {{}} | 1.0-cl4.3.1u1 | Cumulus Networks Proprietary(* ); GPL-2(debian/* ) | +| {{}} | 1.0-cl4.3.2u1 | Cumulus Networks Proprietary(* ); GPL-2(debian/* ) | +| {{}} | 1.0-cl4.3.2u1 | Cumulus Networks Proprietary(* ); GPL-2(debian/* ) | | {{}} | 1.5-1+b2 | LGPL-2-with-linking-exception(* ); GPL-2+(debian/* ) | | {{}} | 4-cl4.3.1u2 | Cumulus Networks Proprietary | -| {{}} | 4.3.1 | GPL-2(* ) | +| {{}} | 4.3.2 | GPL-2(* ) | | {{}} | 1.0-cl4.3.1u2 | Cumulus Networks Proprietary(* ); GPL-2(debian/* ) | | {{}} | 0.1-cl4.3.1u2 | Cumulus Networks Proprietary(* ); GPL-2(debian/* ) | | {{}} | 4.0-cl4.3.0u1 | GPL-2(* ); GPL-2(debian/* ); GPL-2(debian/* ) | | {{}} | 4.0-cl4.3.1u4 | GPL-2(* ) | | {{}} | 4.0-cl4.3.1u2 | LGPL-2.1(* ); LGPL-2.1(dist-packages/eeprom_ipmi_fru.py); GPL-2(debian/* ) | | {{}} | 1.0.0-cl4.3.1u16 | Cumulus Networks Proprietary(* ); GPL-2(debian/* ) | -| {{}} | 1-cl4.3.1u4 | Cumulus Networks Proprietary(* ); GPL-2(debian/* ) | -| {{}} | 1.0.0-cl4.3.1u9 | GPL-3.0+(* ); GPL-3.0+(debian/* ); GPL-3.0+(debian/* ) | -| {{}} | 1.0.0-cl4.3.1u9 | GPL-3.0+(* ); GPL-3.0+(debian/* ); GPL-3.0+(debian/* ) | -| {{}} | 1.0.0-cl4.3.1u9 | GPL-3.0+(* ); GPL-3.0+(debian/* ); GPL-3.0+(debian/* ) | +| {{}} | 1-cl4.3.2u4 | Cumulus Networks Proprietary(* ); GPL-2(debian/* ) | +| {{}} | 1.0.0-cl4.3.1u14 | GPL-3.0+(* ); GPL-3.0+(debian/* ); GPL-3.0+(debian/* ) | +| {{}} | 1.0.0-cl4.3.1u14 | GPL-3.0+(* ); GPL-3.0+(debian/* ); GPL-3.0+(debian/* ) | +| {{}} | 1.0.0-cl4.3.1u14 | GPL-3.0+(* ); GPL-3.0+(debian/* ); GPL-3.0+(debian/* ) | | {{}} | 0.12-cl4.3.0u1 | GPL-2+(* ) | | {{}} | 0.12-cl4.3.0u1 | GPL-2+(* ) | -| {{}} | 4.0-cl4.3.1u2 | Cumulus Networks Proprietary(* ); GPL-2(debian/* ) | -| {{}} | 4.0-cl4.3.1u4 | Cumulus Networks Proprietary(* ); LGPL-2.1(dist-packages/eeprom_ipmi_fru.py); Elagin(dist-packages/cumulus/sdnotify.py); MIT(dist-packages/ordereddict.py); GPL-2(debian/* ) | -| {{}} | 4.0-cl4.3.1u2 | Cumulus Networks Proprietary(* ); LGPL-2.1(dist-packages/eeprom_ipmi_fru.py); Elagin(dist-packages/cumulus/sdnotify.py); MIT(dist-packages/ordereddict.py); GPL-2(debian/* ) | +| {{}} | 4.0-cl4.3.2u1 | Cumulus Networks Proprietary(* ); GPL-2(debian/* ) | +| {{}} | 4.0-cl4.3.2u2 | Cumulus Networks Proprietary(* ); LGPL-2.1(dist-packages/eeprom_ipmi_fru.py); Elagin(dist-packages/cumulus/sdnotify.py); MIT(dist-packages/ordereddict.py); GPL-2(debian/* ) | +| {{}} | 4.0-cl4.3.2u1 | Cumulus Networks Proprietary(* ); LGPL-2.1(dist-packages/eeprom_ipmi_fru.py); Elagin(dist-packages/cumulus/sdnotify.py); MIT(dist-packages/ordereddict.py); GPL-2(debian/* ) | | {{}} | 4.0-cl4.3.0u1 | NO COPYRIGHT FILE | -| {{}} | 4.0-cl4.3.1u2 | Cumulus Networks Proprietary(* ); LGPL-2.1(dist-packages/eeprom_ipmi_fru.py); Elagin(dist-packages/cumulus/sdnotify.py); MIT(dist-packages/ordereddict.py); GPL-2(debian/* ) | -| {{}} | 4.0-cl4.3.1u2 | NO COPYRIGHT FILE | +| {{}} | 4.0-cl4.3.2u1 | Cumulus Networks Proprietary(* ); LGPL-2.1(dist-packages/eeprom_ipmi_fru.py); Elagin(dist-packages/cumulus/sdnotify.py); MIT(dist-packages/ordereddict.py); GPL-2(debian/* ) | +| {{}} | 4.0-cl4.3.2u1 | NO COPYRIGHT FILE | | {{}} | 4.0-cl4u5 | Cumulus Networks Proprietary(* ); GPL-2(debian/* ) | | {{}} | 4.0-cl4u5 | Cumulus Networks Proprietary(* ); GPL-2(debian/* ) | | {{}} | 4.0-cl4u5 | NO COPYRIGHT FILE | -| {{}} | 4.0-cl4.3.1u6 | Cumulus Networks Proprietary(* ); GPL-2(debian/* ); Cumulus Networks Proprietary(debian/* .8 debian/* .service) | -| {{}} | 4.0-cl4.3.1u1 | Cumulus Networks Proprietary(* ); GPL-2(debian/* ); Cumulus Networks Proprietary(debian/* .8 debian/* .service) | -| {{}} | 4.0-cl4.3.1u1 | NO COPYRIGHT FILE | -| {{}} | 7.64.0-4+deb10u2 | curl(* ); curl(lib/vtls/darwinssl.* ); curl(lib/curl_rtmp.* ); curl(lib/vtls/schannel.* ); ISC(lib/inet_pton.c); BSD-3-Clause(lib/krb5.c); public-domain(lib/md4.c); curl(lib/openldap.* ); curl(lib/vtls/polarssl.* ); curl(lib/socks_gssapi.c); curl(tests/certs/scripts/genroot.sh); BSD-4-Clause(tests/server/tftpd.c); curl(tests/server/fake_ntlm.c); BSD-3-Clause(docs/examples/fopen.c); BSD-3-Clause(docs/examples/rtsp.c); curl(docs/examples/curlgtk.c); other(docs/examples/curlx.c); other(src/macos/src/macos_main.cpp); curl(debian/* ); curl(debian/* ); BSD-3-Clause(debian/* ); BSD-4-Clause(debian/* ); ISC(debian/* ) | +| {{}} | 4.0-cl4.3.2u2 | Cumulus Networks Proprietary(* ); GPL-2(debian/* ); Cumulus Networks Proprietary(debian/* .8 debian/* .service) | +| {{}} | 4.0-cl4.3.2u1 | Cumulus Networks Proprietary(* ); GPL-2(debian/* ); Cumulus Networks Proprietary(debian/* .8 debian/* .service) | +| {{}} | 4.0-cl4.3.2u1 | NO COPYRIGHT FILE | +| {{}} | 7.64.0-4+deb10u7 | curl(* ); curl(lib/vtls/darwinssl.* ); curl(lib/curl_rtmp.* ); curl(lib/vtls/schannel.* ); ISC(lib/inet_pton.c); BSD-3-Clause(lib/krb5.c); public-domain(lib/md4.c); curl(lib/openldap.* ); curl(lib/vtls/polarssl.* ); curl(lib/socks_gssapi.c); curl(tests/certs/scripts/genroot.sh); BSD-4-Clause(tests/server/tftpd.c); curl(tests/server/fake_ntlm.c); BSD-3-Clause(docs/examples/fopen.c); BSD-3-Clause(docs/examples/rtsp.c); curl(docs/examples/curlgtk.c); other(docs/examples/curlx.c); other(src/macos/src/macos_main.cpp); curl(debian/* ); curl(debian/* ); BSD-3-Clause(debian/* ); BSD-4-Clause(debian/* ); ISC(debian/* ) | +| {{}} | 7.64.0-4+deb10u6 | NO COPYRIGHT FILE | | {{}} | 0.29.2-2 | Apache-2.0(* ); Apache-2.0(debian/* ); Apache-2.0(debian/* ) | | {{}} | 0.29.2-2 | Apache-2.0(* ); Apache-2.0(debian/* ); Apache-2.0(debian/* ) | | {{}} | 0.5.10.2-5 | GPL | -| {{}} | 1.12.20-0+deb10u1 | GPL-2+ or AFL-2.1(* ); GPL-2+(Files:); Expat(Files:); BSD-3-clause(tools/strto* ll.c); BSD-3-clause-generic(Files:); GPL-2+ or AFL-2.1 | -| {{}} | 1.12.20-0+deb10u1 | GPL-2+ or AFL-2.1(* ); GPL-2+(Files:); Expat(Files:); BSD-3-clause(tools/strto* ll.c); BSD-3-clause-generic(Files:); GPL-2+ or AFL-2.1 | +| {{}} | 1.12.24-0+deb10u1 | GPL-2+ or AFL-2.1(* ); GPL-2+(Files:); Expat(Files:); BSD-3-clause(tools/strto* ll.c); BSD-3-clause-generic(Files:); GPL-2+ or AFL-2.1 | +| {{}} | 1.12.24-0+deb10u1 | GPL-2+ or AFL-2.1(* ); GPL-2+(Files:); Expat(Files:); BSD-3-clause(tools/strto* ll.c); BSD-3-clause-generic(Files:); GPL-2+ or AFL-2.1 | | {{}} | 1.5.71+deb10u1 | BSD-2-clause(* ); BSD-2-clause(Debconf/FrontEnd/Passthrough.pm); BSD-2-clause(Debconf/FrontEnd/Qt* Debconf/Element/Qt* ); BSD-2-clause(Debconf/FrontEnd/Kde.pm); BSD-2-clause(Debconf/FrontEnd/Gnome.pm); BSD-2-clause(Debconf/DbDriver/LDAP.pm); BSD-2-clause(debconf.py); BSD-2-clause(debconf-show); BSD-2-clause(debconf-get-selections debconf-set-selections); BSD-2-clause(Test/* ); BSD-2-clause(debconf-apt-progress); BSD-2-clause(debconf-apt-progress) | | {{}} | 1.5.71+deb10u1 | NO COPYRIGHT FILE | | {{}} | 12.1.1 | GPL-2+(* ); public-domain(examples/* autoscripts/* ); GPL-2+(dh_perl); GPL-2+(dh_installcatalogs); GPL-2+(dh_usrlocal); GPL-2+(dh_installlogcheck); GPL-2+(dh_installudev); GPL-2+(dh_lintian); GPL-2+(dh_md5sums); GPL-2+(dh_bugfiles); GPL-3+(dh_installinit); GPL-2+(dh_installgsettings); GPL-2+(dh_ucf); BSD-3-clause(dh_systemd_enable dh_systemd_start); GPL-2+(lib/Debian/Debhelper/Buildsystem* lib/Debian/Debhelper/Dh_Buildsystems.pm); GPL-2+(lib/Debian/Debhelper/Buildsystem/qmake.pm); GPL-2+(man/po4a/po/fr.po); GPL-2+(man/po4a/po/es.po); GPL-2+(man/po4a/po/de.po); GPL-2+(man/po4a/po/de.po); GPL-3+(man/po4a/po/de.po); BSD-3-clause(man/po4a/po/de.po) | | {{}} | 2019.1+deb10u1 | GPL | | {{}} | 4.8.6.1 | GPL; public domain | -| {{}} | 1.0.114 | BSD | +| {{}} | 1.0.114+deb10u1 | BSD | | {{}} | 2.2.3 | GPL(* ); GPL-2+(rdebsums) | | {{}} | 1.0.5 | GPL-2+(debian/* ); GPL-2+(doc/* ); GPL-2+(doc/* ) | | {{}} | 1.6.2-1 | GPL; GPL-2; GPL-2+; GPL-3; MIT | @@ -155,13 +157,13 @@ pdfhidden: True | {{}} | 2.2.12-1+deb10u2 | GPL-3+(* ); GPL-3+(agent/command.c); permissive(autogen.sh); permissive(common/gc-opt-flags.h); LGPL-2.1+(common/localename.c); Expat(dirmngr/dns.c); GPL-3+(doc/yat2m.c); GPL-3+ or BSD-3-clause(scd/ccid-driver.h); LGPL-3+(tools/rfc822parse.c); GPL-3+(tools/sockprox.c); RFC-Reference(doc/OpenPGP); TinySCHEME(tests/gpgscm/* ); GPL-3+(debian/* ); CC0-1.0(debian/org.gnupg.scdaemon.metainfo.xml); TinySCHEME(debian/org.gnupg.scdaemon.metainfo.xml); permissive(debian/org.gnupg.scdaemon.metainfo.xml); RFC-Reference(debian/org.gnupg.scdaemon.metainfo.xml); GPL-3+(debian/org.gnupg.scdaemon.metainfo.xml); LGPL-3+(debian/org.gnupg.scdaemon.metainfo.xml); LGPL-2.1+(debian/org.gnupg.scdaemon.metainfo.xml); BSD-3-clause(debian/org.gnupg.scdaemon.metainfo.xml); Expat(debian/org.gnupg.scdaemon.metainfo.xml); CC0-1.0(debian/org.gnupg.scdaemon.metainfo.xml) | | {{}} | 2.1.2-8 | GPL | | {{}} | 2.2013.01.11 | public domain | -| {{}} | 0.41+deb10u4 | ISC(* ) | +| {{}} | 0.41+deb10u5 | ISC(* ) | | {{}} | 1.02.155-3 | GPL-2.0(* ); LGPL-2.1(Files:); BSD-2-Clause(Files:); GPL-2.0+(debian/* ) | | {{}} | 3.0-cl3u4 | GPL-2(* ); GPL-2(debian/* ) | | {{}} | 1.02.155-3 | GPL-2.0(* ); LGPL-2.1(Files:); BSD-2-Clause(Files:); GPL-2.0+(debian/* ) | | {{}} | 2.80-1+deb10u1 | NO COPYRIGHT FILE | | {{}} | 2.80-1+deb10u1 | GPL; GPL-2; GPL-3 | -| {{}} | 9.11.5.P4+dfsg-5.1+deb10u7 | ISC and BSD-2-clause and BSD-3-clause and BSD-4-clause(* ); MPL-2.0 or ISC(bin/tests/system/chain/); BSD-2-clause(unit/atf-src/); BSD-4-clause(contrib/idn/); ISC or MPL-2.0(debian/); ISC(debian/); BSD-2-clause(debian/); BSD-3-clause(debian/); BSD-4-clause(debian/); MPL-2.0(debian/) | +| {{}} | 9.11.5.P4+dfsg-5.1+deb10u9 | ISC and BSD-2-clause and BSD-3-clause and BSD-4-clause(* ); MPL-2.0 or ISC(bin/tests/system/chain/); BSD-2-clause(unit/atf-src/); BSD-4-clause(contrib/idn/); ISC or MPL-2.0(debian/); ISC(debian/); BSD-2-clause(debian/); BSD-3-clause(debian/); BSD-4-clause(debian/); MPL-2.0(debian/) | | {{}} | 4.5-6 | GPL; GPL-2 | | {{}} | 1.79-9.1 | GPL; GPL-2 | | {{}} | 2.0.0-42 | MIT(* ); GPL-2+(debian/* ) | @@ -191,10 +193,10 @@ pdfhidden: True | {{}} | 15-1 | GPL-2.0+(* ); GPL-2.0+(debian/* ); GPL-2.0+(debian/* ) | | {{}} | 37-2+deb10u1 | LGPL-2.0+(* ); GPL-2.0+(debian/* ); LGPL-2.0+(debian/* ); GPL-2.0+(debian/* ) | | {{}} | 2.1.5+deb1+cvs20081104-13.2 | GPL; GPL-2 | -| {{}} | 26.1+1-3.2+deb10u2 | GPL-3+(* ); License:(Files:); License:(build-aux/install-sh); GPL plus Ian(debian/rules); manpage license(doc/man/ebrowse.1); manpage license(doc/man/emacs.1); manpage license(doc/man/etags.1); efaq.texi license(doc/misc/efaq.texi); efaq-w32.texi license(doc/misc/efaq-w32.texi); LGPL-2+(Files:); GPL-2+(Files:); same as corresponding file in /etc/images(etc/images/low-color/* ); GPL-2+(Files:); GPL-2+(Files:); MPL-2.0(etc/publicsuffix.txt); License:(Files:); meese.el license(Files:); gnulib-comp.m4 license(Files:); pkg.m4 license(Files:); m4 license(Files:); sedadmin.inp license(Files:); nt/inc/dirent.h license(Files:); License:(Files:); License:(Files:); License:(Files:); MPL-2.0(Files:); manpage license(Files:) | +| {{}} | 26.1+1-3.2+deb10u4 | GPL-3+(* ); License:(Files:); License:(build-aux/install-sh); GPL plus Ian(debian/rules); manpage license(doc/man/ebrowse.1); manpage license(doc/man/emacs.1); manpage license(doc/man/etags.1); efaq.texi license(doc/misc/efaq.texi); efaq-w32.texi license(doc/misc/efaq-w32.texi); LGPL-2+(Files:); GPL-2+(Files:); same as corresponding file in /etc/images(etc/images/low-color/* ); GPL-2+(Files:); GPL-2+(Files:); MPL-2.0(etc/publicsuffix.txt); License:(Files:); meese.el license(Files:); gnulib-comp.m4 license(Files:); pkg.m4 license(Files:); m4 license(Files:); sedadmin.inp license(Files:); nt/inc/dirent.h license(Files:); License:(Files:); License:(Files:); License:(Files:); MPL-2.0(Files:); manpage license(Files:) | | {{}} | 26.1+1-3.2+deb10u2 | GPL-3+(* ); License:(Files:); License:(build-aux/install-sh); GPL plus Ian(debian/rules); manpage license(doc/man/ebrowse.1); manpage license(doc/man/emacs.1); manpage license(doc/man/etags.1); efaq.texi license(doc/misc/efaq.texi); efaq-w32.texi license(doc/misc/efaq-w32.texi); LGPL-2+(Files:); GPL-2+(Files:); same as corresponding file in /etc/images(etc/images/low-color/* ); GPL-2+(Files:); GPL-2+(Files:); MPL-2.0(etc/publicsuffix.txt); License:(Files:); meese.el license(Files:); gnulib-comp.m4 license(Files:); pkg.m4 license(Files:); m4 license(Files:); sedadmin.inp license(Files:); nt/inc/dirent.h license(Files:); License:(Files:); License:(Files:); License:(Files:); MPL-2.0(Files:); manpage license(Files:) | | {{}} | 3.0.4 | GPL | -| {{}} | 26.1+1-3.2+deb10u2 | NO COPYRIGHT FILE | +| {{}} | 26.1+1-3.2+deb10u4 | NO COPYRIGHT FILE | | {{}} | 2.2.0 | GPL-2+(* ) | | {{}} | 1.18.10-1 | GPL-2+(* ); BSD-2-clause(pkgng/* ) | | {{}} | 4.19.0-cl4.3.1u4 | GPL; GPL-2 | @@ -214,15 +216,15 @@ pdfhidden: True | {{}} | 2.004.5-6 | GPL; GPL-2; public domain | | {{}} | 1.100263+20170512-1 | Apache-2.0( * ) | | {{}} | 1.6.3-1.1 | GPL-3+(* ); LGPL-3+(common/src/portability/freeipmi-argp* ); LGPL-3+(debian/* ); LGPL-3+(debian/* ) | -| {{}} | 2.9.1-3+deb10u2 | GPL-2+ or FTL(* ); FTL and Catharon-OSL and MIT(vms_make.com); FTL(builds/amiga/* builds/amiga/include/config/* ); FTL(builds/amiga/src/base/* ); BSD-3-Clause(builds/cmake/FindHarfBuzz.cmake); FTL(builds/mac/ftmac.c); FTL(builds/mac/README); FSFULLR and GPL-2+(builds/unix/aclocal.m4); FSFUL and GPL-2+(builds/unix/configure); Permissive and GPL-3+(builds/unix/config.guess builds/unix/config.sub); MIT(builds/unix/install-sh); GPL-2+ and GPL-3+(builds/unix/ltmain.sh); GPL-2+(builds/unix/pkg.m4); GPL-2+(debian/* ); FTL(docs/INSTALL.CROSS); MIT or GPL-2+(ft2docs/docs/js/jquery.ba-resize.min.js); MIT(ft2docs/docs/js/jquery-1.11.0.min.js); Public-Domain(ft2docs/docs/tutorial/example2.cpp); MIT(ft2docs/docs/tutorial/example5.cpp); FTL(ft2demos/Jamfile); FTL(ft2demos/graph/beos/grbeos.cpp); FTL(ft2demos/graph/mac/grmac.c); FTL(ft2demos/graph/win32/grwin32.c ft2demos/graph/win32/grwin32.h); FTL(ft2demos/graph/graph.h); Public-Domain(ft2demos/graph/grswizzle.c); FTL(ft2demos/mac/ftoldmac.c); MIT(ft2demos/mac/getargv.c); Public-Domain(ft2demos/src/mlgetopt.c ft2demos/src/mlgetopt.h); FTL(ft2demos/src/ftinspect/* ); FTL(include/freetype/ftbzip2.h); FTL(include/freetype/ftcid.h); FTL(include/freetype/ftgxval.h); MIT(include/freetype/internal/fthash.h); FTL(include/freetype/internal/ftrfork.h); FTL(include/freetype/internal/ftpic.h); FTL(include/freetype/internal/services/svttglyf.h); FTL(src/autofit/afindic.c src/autofit/afindic.h); FTL(src/base/ftbase.h); Public-Domain(src/base/md5.c src/base/md5.h); MIT(src/bdf/bdf.c); MIT(src/bdf/bdf.h src/bdf/bdflib.c); FTL(src/gxvalid/* ); FTL(src/gxvalid/Jamfile); Zlib(src/gzip/adler32.c); Zlib(src/gzip/ftzconf.h); Zlib(src/gzip/zlib.h); FTL(src/lzw/ftlzw.c src/lzw/rules.mk); OpenGroup-BSD-like(src/pcf/pcfutil.c); FTL(src/psaux/psarrst.c src/psaux/psarrst.h); FTL(src/sfnt/pngshim.c src/sfnt/pngshim.h); FTL(src/sfnt/ttsbit.c); Public-Domain(src/tools/apinames.c src/tools/chktrcmp.py); FTL(src/tools/update-copyright-year); BSD-3-Clause(src/tools/ftrandom/ftrandom.c); FTL(src/truetype/ttgxvar.c src/truetype/ttgxvar.h); FTL(src/type42/t42drivr.c src/type42/t42drivr.h); FTL(src/winfonts/winfnt.c); FTL(src/winfonts/winfnt.h); BSD-3-Clause(src/winfonts/winfnt.h); Catharon-OSL(src/winfonts/winfnt.h); FSFUL(src/winfonts/winfnt.h); FSFULLR(src/winfonts/winfnt.h); FTL(src/winfonts/winfnt.h); GPL-2+(src/winfonts/winfnt.h); GPL-3+(src/winfonts/winfnt.h); MIT(src/winfonts/winfnt.h); OpenGroup-BSD-like(src/winfonts/winfnt.h); Permissive(src/winfonts/winfnt.h); Zlib(src/winfonts/winfnt.h) | -| {{}} | 7.5+cl4.3.1u14 | GPL-2+(* ); LGPL-2.1+(lib/strl* .c); BSD-0-clause(lib/skiplist.* ); BSD-2-clause(lib/sha256.* ); ISC(lib/qobj.h lib/monotime.h lib/memory.* lib/hook.* lib/frratomic.h lib/ferr.* lib/compiler.h lib/module.* ); MIT(nhrpd/nhrp_protocol.h); MIT(babeld/* ); GPL-2+(babeld/babel_errors.* ); ISC(ldpd/* ); GPL-2+(ldpd/ldp_debug.* ldpd/ldp_vty* ldpd/ldp_zebra.c); FRR-docs(doc/user/* .rst doc/figures/fig* ); BSD-3-clause(lib/freebsd-queue.h lib/openbsd-queue.h lib/md5.* ); BSD-2-clause(lib/openbsd-tree.* ); ISC(lib/imsg* ); ISC(qpb/qpb.proto fpm/fpm.proto); ISC(doc/extra/frrlexer.py); MIT(tests/helpers/python/frrsix.py); GPL-2+(tests/helpers/python/frrsix.py); LGPL-2.1+(tests/helpers/python/frrsix.py); BSD-0-clause(tests/helpers/python/frrsix.py); BSD-2-clause(tests/helpers/python/frrsix.py); BSD-3-clause(tests/helpers/python/frrsix.py); ISC(tests/helpers/python/frrsix.py); MIT(tests/helpers/python/frrsix.py) | -| {{}} | 7.5+cl4.3.1u14 | NO COPYRIGHT FILE | -| {{}} | 7.5+cl4.3.1u14 | GPL-2+(* ); LGPL-2.1+(lib/strl* .c); BSD-0-clause(lib/skiplist.* ); BSD-2-clause(lib/sha256.* ); ISC(lib/qobj.h lib/monotime.h lib/memory.* lib/hook.* lib/frratomic.h lib/ferr.* lib/compiler.h lib/module.* ); MIT(nhrpd/nhrp_protocol.h); MIT(babeld/* ); GPL-2+(babeld/babel_errors.* ); ISC(ldpd/* ); GPL-2+(ldpd/ldp_debug.* ldpd/ldp_vty* ldpd/ldp_zebra.c); FRR-docs(doc/user/* .rst doc/figures/fig* ); BSD-3-clause(lib/freebsd-queue.h lib/openbsd-queue.h lib/md5.* ); BSD-2-clause(lib/openbsd-tree.* ); ISC(lib/imsg* ); ISC(qpb/qpb.proto fpm/fpm.proto); ISC(doc/extra/frrlexer.py); MIT(tests/helpers/python/frrsix.py); GPL-2+(tests/helpers/python/frrsix.py); LGPL-2.1+(tests/helpers/python/frrsix.py); BSD-0-clause(tests/helpers/python/frrsix.py); BSD-2-clause(tests/helpers/python/frrsix.py); BSD-3-clause(tests/helpers/python/frrsix.py); ISC(tests/helpers/python/frrsix.py); MIT(tests/helpers/python/frrsix.py) | -| {{}} | 7.5+cl4.3.1u14 | GPL-2+(* ); LGPL-2.1+(lib/strl* .c); BSD-0-clause(lib/skiplist.* ); BSD-2-clause(lib/sha256.* ); ISC(lib/qobj.h lib/monotime.h lib/memory.* lib/hook.* lib/frratomic.h lib/ferr.* lib/compiler.h lib/module.* ); MIT(nhrpd/nhrp_protocol.h); MIT(babeld/* ); GPL-2+(babeld/babel_errors.* ); ISC(ldpd/* ); GPL-2+(ldpd/ldp_debug.* ldpd/ldp_vty* ldpd/ldp_zebra.c); FRR-docs(doc/user/* .rst doc/figures/fig* ); BSD-3-clause(lib/freebsd-queue.h lib/openbsd-queue.h lib/md5.* ); BSD-2-clause(lib/openbsd-tree.* ); ISC(lib/imsg* ); ISC(qpb/qpb.proto fpm/fpm.proto); ISC(doc/extra/frrlexer.py); MIT(tests/helpers/python/frrsix.py); GPL-2+(tests/helpers/python/frrsix.py); LGPL-2.1+(tests/helpers/python/frrsix.py); BSD-0-clause(tests/helpers/python/frrsix.py); BSD-2-clause(tests/helpers/python/frrsix.py); BSD-3-clause(tests/helpers/python/frrsix.py); ISC(tests/helpers/python/frrsix.py); MIT(tests/helpers/python/frrsix.py) | -| {{}} | 7.5+cl4.3.1u14 | GPL-2+(* ); LGPL-2.1+(lib/strl* .c); BSD-0-clause(lib/skiplist.* ); BSD-2-clause(lib/sha256.* ); ISC(lib/qobj.h lib/monotime.h lib/memory.* lib/hook.* lib/frratomic.h lib/ferr.* lib/compiler.h lib/module.* ); MIT(nhrpd/nhrp_protocol.h); MIT(babeld/* ); GPL-2+(babeld/babel_errors.* ); ISC(ldpd/* ); GPL-2+(ldpd/ldp_debug.* ldpd/ldp_vty* ldpd/ldp_zebra.c); FRR-docs(doc/user/* .rst doc/figures/fig* ); BSD-3-clause(lib/freebsd-queue.h lib/openbsd-queue.h lib/md5.* ); BSD-2-clause(lib/openbsd-tree.* ); ISC(lib/imsg* ); ISC(qpb/qpb.proto fpm/fpm.proto); ISC(doc/extra/frrlexer.py); MIT(tests/helpers/python/frrsix.py); GPL-2+(tests/helpers/python/frrsix.py); LGPL-2.1+(tests/helpers/python/frrsix.py); BSD-0-clause(tests/helpers/python/frrsix.py); BSD-2-clause(tests/helpers/python/frrsix.py); BSD-3-clause(tests/helpers/python/frrsix.py); ISC(tests/helpers/python/frrsix.py); MIT(tests/helpers/python/frrsix.py) | -| {{}} | 7.5+cl4.3.1u14 | NO COPYRIGHT FILE | -| {{}} | 7.5+cl4.3.1u14 | GPL-2+(* ); LGPL-2.1+(lib/strl* .c); BSD-0-clause(lib/skiplist.* ); BSD-2-clause(lib/sha256.* ); ISC(lib/qobj.h lib/monotime.h lib/memory.* lib/hook.* lib/frratomic.h lib/ferr.* lib/compiler.h lib/module.* ); MIT(nhrpd/nhrp_protocol.h); MIT(babeld/* ); GPL-2+(babeld/babel_errors.* ); ISC(ldpd/* ); GPL-2+(ldpd/ldp_debug.* ldpd/ldp_vty* ldpd/ldp_zebra.c); FRR-docs(doc/user/* .rst doc/figures/fig* ); BSD-3-clause(lib/freebsd-queue.h lib/openbsd-queue.h lib/md5.* ); BSD-2-clause(lib/openbsd-tree.* ); ISC(lib/imsg* ); ISC(qpb/qpb.proto fpm/fpm.proto); ISC(doc/extra/frrlexer.py); MIT(tests/helpers/python/frrsix.py); GPL-2+(tests/helpers/python/frrsix.py); LGPL-2.1+(tests/helpers/python/frrsix.py); BSD-0-clause(tests/helpers/python/frrsix.py); BSD-2-clause(tests/helpers/python/frrsix.py); BSD-3-clause(tests/helpers/python/frrsix.py); ISC(tests/helpers/python/frrsix.py); MIT(tests/helpers/python/frrsix.py) | -| {{}} | 7.5+cl4.3.1u14 | NO COPYRIGHT FILE | +| {{}} | 2.9.1-3+deb10u3 | GPL-2+ or FTL(* ); FTL and Catharon-OSL and MIT(vms_make.com); FTL(builds/amiga/* builds/amiga/include/config/* ); FTL(builds/amiga/src/base/* ); BSD-3-Clause(builds/cmake/FindHarfBuzz.cmake); FTL(builds/mac/ftmac.c); FTL(builds/mac/README); FSFULLR and GPL-2+(builds/unix/aclocal.m4); FSFUL and GPL-2+(builds/unix/configure); Permissive and GPL-3+(builds/unix/config.guess builds/unix/config.sub); MIT(builds/unix/install-sh); GPL-2+ and GPL-3+(builds/unix/ltmain.sh); GPL-2+(builds/unix/pkg.m4); GPL-2+(debian/* ); FTL(docs/INSTALL.CROSS); MIT or GPL-2+(ft2docs/docs/js/jquery.ba-resize.min.js); MIT(ft2docs/docs/js/jquery-1.11.0.min.js); Public-Domain(ft2docs/docs/tutorial/example2.cpp); MIT(ft2docs/docs/tutorial/example5.cpp); FTL(ft2demos/Jamfile); FTL(ft2demos/graph/beos/grbeos.cpp); FTL(ft2demos/graph/mac/grmac.c); FTL(ft2demos/graph/win32/grwin32.c ft2demos/graph/win32/grwin32.h); FTL(ft2demos/graph/graph.h); Public-Domain(ft2demos/graph/grswizzle.c); FTL(ft2demos/mac/ftoldmac.c); MIT(ft2demos/mac/getargv.c); Public-Domain(ft2demos/src/mlgetopt.c ft2demos/src/mlgetopt.h); FTL(ft2demos/src/ftinspect/* ); FTL(include/freetype/ftbzip2.h); FTL(include/freetype/ftcid.h); FTL(include/freetype/ftgxval.h); MIT(include/freetype/internal/fthash.h); FTL(include/freetype/internal/ftrfork.h); FTL(include/freetype/internal/ftpic.h); FTL(include/freetype/internal/services/svttglyf.h); FTL(src/autofit/afindic.c src/autofit/afindic.h); FTL(src/base/ftbase.h); Public-Domain(src/base/md5.c src/base/md5.h); MIT(src/bdf/bdf.c); MIT(src/bdf/bdf.h src/bdf/bdflib.c); FTL(src/gxvalid/* ); FTL(src/gxvalid/Jamfile); Zlib(src/gzip/adler32.c); Zlib(src/gzip/ftzconf.h); Zlib(src/gzip/zlib.h); FTL(src/lzw/ftlzw.c src/lzw/rules.mk); OpenGroup-BSD-like(src/pcf/pcfutil.c); FTL(src/psaux/psarrst.c src/psaux/psarrst.h); FTL(src/sfnt/pngshim.c src/sfnt/pngshim.h); FTL(src/sfnt/ttsbit.c); Public-Domain(src/tools/apinames.c src/tools/chktrcmp.py); FTL(src/tools/update-copyright-year); BSD-3-Clause(src/tools/ftrandom/ftrandom.c); FTL(src/truetype/ttgxvar.c src/truetype/ttgxvar.h); FTL(src/type42/t42drivr.c src/type42/t42drivr.h); FTL(src/winfonts/winfnt.c); FTL(src/winfonts/winfnt.h); BSD-3-Clause(src/winfonts/winfnt.h); Catharon-OSL(src/winfonts/winfnt.h); FSFUL(src/winfonts/winfnt.h); FSFULLR(src/winfonts/winfnt.h); FTL(src/winfonts/winfnt.h); GPL-2+(src/winfonts/winfnt.h); GPL-3+(src/winfonts/winfnt.h); MIT(src/winfonts/winfnt.h); OpenGroup-BSD-like(src/winfonts/winfnt.h); Permissive(src/winfonts/winfnt.h); Zlib(src/winfonts/winfnt.h) | +| {{}} | 7.5+cl4.3.2u4 | GPL-2+(* ); LGPL-2.1+(lib/strl* .c); BSD-0-clause(lib/skiplist.* ); BSD-2-clause(lib/sha256.* ); ISC(lib/qobj.h lib/monotime.h lib/memory.* lib/hook.* lib/frratomic.h lib/ferr.* lib/compiler.h lib/module.* ); MIT(nhrpd/nhrp_protocol.h); MIT(babeld/* ); GPL-2+(babeld/babel_errors.* ); ISC(ldpd/* ); GPL-2+(ldpd/ldp_debug.* ldpd/ldp_vty* ldpd/ldp_zebra.c); FRR-docs(doc/user/* .rst doc/figures/fig* ); BSD-3-clause(lib/freebsd-queue.h lib/openbsd-queue.h lib/md5.* ); BSD-2-clause(lib/openbsd-tree.* ); ISC(lib/imsg* ); ISC(qpb/qpb.proto fpm/fpm.proto); ISC(doc/extra/frrlexer.py); MIT(tests/helpers/python/frrsix.py); GPL-2+(tests/helpers/python/frrsix.py); LGPL-2.1+(tests/helpers/python/frrsix.py); BSD-0-clause(tests/helpers/python/frrsix.py); BSD-2-clause(tests/helpers/python/frrsix.py); BSD-3-clause(tests/helpers/python/frrsix.py); ISC(tests/helpers/python/frrsix.py); MIT(tests/helpers/python/frrsix.py) | +| {{}} | 7.5+cl4.3.2u4 | NO COPYRIGHT FILE | +| {{}} | 7.5+cl4.3.2u4 | GPL-2+(* ); LGPL-2.1+(lib/strl* .c); BSD-0-clause(lib/skiplist.* ); BSD-2-clause(lib/sha256.* ); ISC(lib/qobj.h lib/monotime.h lib/memory.* lib/hook.* lib/frratomic.h lib/ferr.* lib/compiler.h lib/module.* ); MIT(nhrpd/nhrp_protocol.h); MIT(babeld/* ); GPL-2+(babeld/babel_errors.* ); ISC(ldpd/* ); GPL-2+(ldpd/ldp_debug.* ldpd/ldp_vty* ldpd/ldp_zebra.c); FRR-docs(doc/user/* .rst doc/figures/fig* ); BSD-3-clause(lib/freebsd-queue.h lib/openbsd-queue.h lib/md5.* ); BSD-2-clause(lib/openbsd-tree.* ); ISC(lib/imsg* ); ISC(qpb/qpb.proto fpm/fpm.proto); ISC(doc/extra/frrlexer.py); MIT(tests/helpers/python/frrsix.py); GPL-2+(tests/helpers/python/frrsix.py); LGPL-2.1+(tests/helpers/python/frrsix.py); BSD-0-clause(tests/helpers/python/frrsix.py); BSD-2-clause(tests/helpers/python/frrsix.py); BSD-3-clause(tests/helpers/python/frrsix.py); ISC(tests/helpers/python/frrsix.py); MIT(tests/helpers/python/frrsix.py) | +| {{}} | 7.5+cl4.3.2u4 | GPL-2+(* ); LGPL-2.1+(lib/strl* .c); BSD-0-clause(lib/skiplist.* ); BSD-2-clause(lib/sha256.* ); ISC(lib/qobj.h lib/monotime.h lib/memory.* lib/hook.* lib/frratomic.h lib/ferr.* lib/compiler.h lib/module.* ); MIT(nhrpd/nhrp_protocol.h); MIT(babeld/* ); GPL-2+(babeld/babel_errors.* ); ISC(ldpd/* ); GPL-2+(ldpd/ldp_debug.* ldpd/ldp_vty* ldpd/ldp_zebra.c); FRR-docs(doc/user/* .rst doc/figures/fig* ); BSD-3-clause(lib/freebsd-queue.h lib/openbsd-queue.h lib/md5.* ); BSD-2-clause(lib/openbsd-tree.* ); ISC(lib/imsg* ); ISC(qpb/qpb.proto fpm/fpm.proto); ISC(doc/extra/frrlexer.py); MIT(tests/helpers/python/frrsix.py); GPL-2+(tests/helpers/python/frrsix.py); LGPL-2.1+(tests/helpers/python/frrsix.py); BSD-0-clause(tests/helpers/python/frrsix.py); BSD-2-clause(tests/helpers/python/frrsix.py); BSD-3-clause(tests/helpers/python/frrsix.py); ISC(tests/helpers/python/frrsix.py); MIT(tests/helpers/python/frrsix.py) | +| {{}} | 7.5+cl4.3.2u4 | GPL-2+(* ); LGPL-2.1+(lib/strl* .c); BSD-0-clause(lib/skiplist.* ); BSD-2-clause(lib/sha256.* ); ISC(lib/qobj.h lib/monotime.h lib/memory.* lib/hook.* lib/frratomic.h lib/ferr.* lib/compiler.h lib/module.* ); MIT(nhrpd/nhrp_protocol.h); MIT(babeld/* ); GPL-2+(babeld/babel_errors.* ); ISC(ldpd/* ); GPL-2+(ldpd/ldp_debug.* ldpd/ldp_vty* ldpd/ldp_zebra.c); FRR-docs(doc/user/* .rst doc/figures/fig* ); BSD-3-clause(lib/freebsd-queue.h lib/openbsd-queue.h lib/md5.* ); BSD-2-clause(lib/openbsd-tree.* ); ISC(lib/imsg* ); ISC(qpb/qpb.proto fpm/fpm.proto); ISC(doc/extra/frrlexer.py); MIT(tests/helpers/python/frrsix.py); GPL-2+(tests/helpers/python/frrsix.py); LGPL-2.1+(tests/helpers/python/frrsix.py); BSD-0-clause(tests/helpers/python/frrsix.py); BSD-2-clause(tests/helpers/python/frrsix.py); BSD-3-clause(tests/helpers/python/frrsix.py); ISC(tests/helpers/python/frrsix.py); MIT(tests/helpers/python/frrsix.py) | +| {{}} | 7.5+cl4.3.2u4 | NO COPYRIGHT FILE | +| {{}} | 7.5+cl4.3.2u4 | GPL-2+(* ); LGPL-2.1+(lib/strl* .c); BSD-0-clause(lib/skiplist.* ); BSD-2-clause(lib/sha256.* ); ISC(lib/qobj.h lib/monotime.h lib/memory.* lib/hook.* lib/frratomic.h lib/ferr.* lib/compiler.h lib/module.* ); MIT(nhrpd/nhrp_protocol.h); MIT(babeld/* ); GPL-2+(babeld/babel_errors.* ); ISC(ldpd/* ); GPL-2+(ldpd/ldp_debug.* ldpd/ldp_vty* ldpd/ldp_zebra.c); FRR-docs(doc/user/* .rst doc/figures/fig* ); BSD-3-clause(lib/freebsd-queue.h lib/openbsd-queue.h lib/md5.* ); BSD-2-clause(lib/openbsd-tree.* ); ISC(lib/imsg* ); ISC(qpb/qpb.proto fpm/fpm.proto); ISC(doc/extra/frrlexer.py); MIT(tests/helpers/python/frrsix.py); GPL-2+(tests/helpers/python/frrsix.py); LGPL-2.1+(tests/helpers/python/frrsix.py); BSD-0-clause(tests/helpers/python/frrsix.py); BSD-2-clause(tests/helpers/python/frrsix.py); BSD-3-clause(tests/helpers/python/frrsix.py); ISC(tests/helpers/python/frrsix.py); MIT(tests/helpers/python/frrsix.py) | +| {{}} | 7.5+cl4.3.2u4 | NO COPYRIGHT FILE | | {{}} | 8.3.0-1 | NO COPYRIGHT FILE | | {{}} | 8.3.0-6 | NO COPYRIGHT FILE | | {{}} | 4.2.1+dfsg-1 | GPL-3+(* ); GPL-3+(debian/* ); GPL-3+(debian/* ) | @@ -238,8 +240,8 @@ pdfhidden: True | {{}} | 1.0.3-1.1 | LGPL-2.0+(* ); LGPL-2.0+(debian/* ); LGPL-2.0+(crc32.cc crc32.h); LGPL-2.0+(crc32.cc crc32.h) | | {{}} | 0.19.8.1-9 | GFDL; GPL; LGPL | | {{}} | 0.19.8.1-9 | GFDL; GPL; LGPL | -| {{}} | 2.20.1-2+deb10u3 | GPL-2(* ); LGPL-2.1+(xdiff/* ); EDL-1.0(xdiff/xhistogram.c); GPL-2+(ewah/* ); Expat(sha1dc/* ); GPL-2+(gitk-git/* ); GPL-2(gitk-git/po/bg.po); GPL-2+(git-gui/* ); GPL-2(git-gui/po/bg.po git-gui/po/de.po git-gui/po/fr.po git-gui/po/glossary/* ); GPL-2+(git-gui/po/glossary/el.po git-gui/po/glossary/pt_br.po); GPL-2+(gitweb/static/js/* ); Expat(git-p4); GPL-2+(git-svn.perl); BSD-2-clause(vcs-svn/* ); GPL-2+(imap-send.c); GPL-2+(perl/Git.pm); GPL-1+ or Artistic-1(perl/private-Error.pm); GPL-2+(kwset.c kwset.h); Expat(khash.h); GPL-2+(trace.c); GPL-2+(sh-i18n--envsubst.c); GPL-2+(t/test-lib.sh); ISC(compat/inet_ntop.c compat/inet_pton.c); GPL-2+(compat/poll/poll.c compat/poll/poll.h); mingw-runtime(compat/vcbuild/include/sys/utime.h); Boost(compat/nedmalloc/* ); dlmalloc(compat/nedmalloc/malloc.c.h); LGPL-2.1+(compat/regex/* ); LGPL-2.1+(compat/obstack.c compat/obstack.h); Apache-2.0(contrib/persistent-https/* ); GPL-2+(contrib/credential/gnome-keyring/git-credential-gnome-keyring.c); GPL-2+(contrib/hg-to-git/hg-to-git.py); GPL-2+(contrib/mw-to-git/git-* .perl contrib/mw-to-git/t/t* ); GPL-2(debian/* ); GPL-2(debian/* ); GPL-2+(debian/* ); LGPL-2+(debian/* ); LGPL-2.1+(debian/* ); Apache-2.0(debian/* ); BSD-2-clause(debian/* ); ISC(debian/* ); Expat(debian/* ); EDL-1.0(debian/* ); mingw-runtime(debian/* ); Boost(debian/* ); dlmalloc(debian/* ) | -| {{}} | 2.20.1-2+deb10u3 | GPL-2(* ); LGPL-2.1+(xdiff/* ); EDL-1.0(xdiff/xhistogram.c); GPL-2+(ewah/* ); Expat(sha1dc/* ); GPL-2+(gitk-git/* ); GPL-2(gitk-git/po/bg.po); GPL-2+(git-gui/* ); GPL-2(git-gui/po/bg.po git-gui/po/de.po git-gui/po/fr.po git-gui/po/glossary/* ); GPL-2+(git-gui/po/glossary/el.po git-gui/po/glossary/pt_br.po); GPL-2+(gitweb/static/js/* ); Expat(git-p4); GPL-2+(git-svn.perl); BSD-2-clause(vcs-svn/* ); GPL-2+(imap-send.c); GPL-2+(perl/Git.pm); GPL-1+ or Artistic-1(perl/private-Error.pm); GPL-2+(kwset.c kwset.h); Expat(khash.h); GPL-2+(trace.c); GPL-2+(sh-i18n--envsubst.c); GPL-2+(t/test-lib.sh); ISC(compat/inet_ntop.c compat/inet_pton.c); GPL-2+(compat/poll/poll.c compat/poll/poll.h); mingw-runtime(compat/vcbuild/include/sys/utime.h); Boost(compat/nedmalloc/* ); dlmalloc(compat/nedmalloc/malloc.c.h); LGPL-2.1+(compat/regex/* ); LGPL-2.1+(compat/obstack.c compat/obstack.h); Apache-2.0(contrib/persistent-https/* ); GPL-2+(contrib/credential/gnome-keyring/git-credential-gnome-keyring.c); GPL-2+(contrib/hg-to-git/hg-to-git.py); GPL-2+(contrib/mw-to-git/git-* .perl contrib/mw-to-git/t/t* ); GPL-2(debian/* ); GPL-2(debian/* ); GPL-2+(debian/* ); LGPL-2+(debian/* ); LGPL-2.1+(debian/* ); Apache-2.0(debian/* ); BSD-2-clause(debian/* ); ISC(debian/* ); Expat(debian/* ); EDL-1.0(debian/* ); mingw-runtime(debian/* ); Boost(debian/* ); dlmalloc(debian/* ) | +| {{}} | 2.20.1-2+deb10u8 | GPL-2(* ); LGPL-2.1+(xdiff/* ); EDL-1.0(xdiff/xhistogram.c); GPL-2+(ewah/* ); Expat(sha1dc/* ); GPL-2+(gitk-git/* ); GPL-2(gitk-git/po/bg.po); GPL-2+(git-gui/* ); GPL-2(git-gui/po/bg.po git-gui/po/de.po git-gui/po/fr.po git-gui/po/glossary/* ); GPL-2+(git-gui/po/glossary/el.po git-gui/po/glossary/pt_br.po); GPL-2+(gitweb/static/js/* ); Expat(git-p4); GPL-2+(git-svn.perl); BSD-2-clause(vcs-svn/* ); GPL-2+(imap-send.c); GPL-2+(perl/Git.pm); GPL-1+ or Artistic-1(perl/private-Error.pm); GPL-2+(kwset.c kwset.h); Expat(khash.h); GPL-2+(trace.c); GPL-2+(sh-i18n--envsubst.c); GPL-2+(t/test-lib.sh); ISC(compat/inet_ntop.c compat/inet_pton.c); GPL-2+(compat/poll/poll.c compat/poll/poll.h); mingw-runtime(compat/vcbuild/include/sys/utime.h); Boost(compat/nedmalloc/* ); dlmalloc(compat/nedmalloc/malloc.c.h); LGPL-2.1+(compat/regex/* ); LGPL-2.1+(compat/obstack.c compat/obstack.h); Apache-2.0(contrib/persistent-https/* ); GPL-2+(contrib/credential/gnome-keyring/git-credential-gnome-keyring.c); GPL-2+(contrib/hg-to-git/hg-to-git.py); GPL-2+(contrib/mw-to-git/git-* .perl contrib/mw-to-git/t/t* ); GPL-2(debian/* ); GPL-2(debian/* ); GPL-2+(debian/* ); LGPL-2+(debian/* ); LGPL-2.1+(debian/* ); Apache-2.0(debian/* ); BSD-2-clause(debian/* ); ISC(debian/* ); Expat(debian/* ); EDL-1.0(debian/* ); mingw-runtime(debian/* ); Boost(debian/* ); dlmalloc(debian/* ) | +| {{}} | 2.20.1-2+deb10u8 | GPL-2(* ); LGPL-2.1+(xdiff/* ); EDL-1.0(xdiff/xhistogram.c); GPL-2+(ewah/* ); Expat(sha1dc/* ); GPL-2+(gitk-git/* ); GPL-2(gitk-git/po/bg.po); GPL-2+(git-gui/* ); GPL-2(git-gui/po/bg.po git-gui/po/de.po git-gui/po/fr.po git-gui/po/glossary/* ); GPL-2+(git-gui/po/glossary/el.po git-gui/po/glossary/pt_br.po); GPL-2+(gitweb/static/js/* ); Expat(git-p4); GPL-2+(git-svn.perl); BSD-2-clause(vcs-svn/* ); GPL-2+(imap-send.c); GPL-2+(perl/Git.pm); GPL-1+ or Artistic-1(perl/private-Error.pm); GPL-2+(kwset.c kwset.h); Expat(khash.h); GPL-2+(trace.c); GPL-2+(sh-i18n--envsubst.c); GPL-2+(t/test-lib.sh); ISC(compat/inet_ntop.c compat/inet_pton.c); GPL-2+(compat/poll/poll.c compat/poll/poll.h); mingw-runtime(compat/vcbuild/include/sys/utime.h); Boost(compat/nedmalloc/* ); dlmalloc(compat/nedmalloc/malloc.c.h); LGPL-2.1+(compat/regex/* ); LGPL-2.1+(compat/obstack.c compat/obstack.h); Apache-2.0(contrib/persistent-https/* ); GPL-2+(contrib/credential/gnome-keyring/git-credential-gnome-keyring.c); GPL-2+(contrib/hg-to-git/hg-to-git.py); GPL-2+(contrib/mw-to-git/git-* .perl contrib/mw-to-git/t/t* ); GPL-2(debian/* ); GPL-2(debian/* ); GPL-2+(debian/* ); LGPL-2+(debian/* ); LGPL-2.1+(debian/* ); Apache-2.0(debian/* ); BSD-2-clause(debian/* ); ISC(debian/* ); Expat(debian/* ); EDL-1.0(debian/* ); mingw-runtime(debian/* ); Boost(debian/* ); dlmalloc(debian/* ) | | {{}} | 3.0.9-1 | BSD-3-clause-HP(* ); BSD-2-clause-Intel(inc/* lib/* ); BSD-3-clause-HP(lib/Makefile lib/x86_64/callwrap.c); Expat(inc/efipoint.h); BSD-4-clause-Intel(inc/protocol/efidbg.h inc/protocol/ia64/eficontext.h); BSD-2-clause-Linaro or GPL-2+(inc/aarch64/efibind.h inc/arm/efibind.h); BSD-2-clause-Linaro(inc/aarch64/efibind.h inc/arm/efibind.h); BSD-3-clause-HP(inc/aarch64/efibind.h inc/arm/efibind.h); BSD-2-clause-Intel(inc/aarch64/efibind.h inc/arm/efibind.h); BSD-4-clause-Intel(inc/aarch64/efibind.h inc/arm/efibind.h); Expat(inc/aarch64/efibind.h inc/arm/efibind.h); GPL-2+(inc/aarch64/efibind.h inc/arm/efibind.h) | | {{}} | 2.2.12-1+deb10u2 | GPL-3+(* ); GPL-3+(agent/command.c); permissive(autogen.sh); permissive(common/gc-opt-flags.h); LGPL-2.1+(common/localename.c); Expat(dirmngr/dns.c); GPL-3+(doc/yat2m.c); GPL-3+ or BSD-3-clause(scd/ccid-driver.h); LGPL-3+(tools/rfc822parse.c); GPL-3+(tools/sockprox.c); RFC-Reference(doc/OpenPGP); TinySCHEME(tests/gpgscm/* ); GPL-3+(debian/* ); CC0-1.0(debian/org.gnupg.scdaemon.metainfo.xml); TinySCHEME(debian/org.gnupg.scdaemon.metainfo.xml); permissive(debian/org.gnupg.scdaemon.metainfo.xml); RFC-Reference(debian/org.gnupg.scdaemon.metainfo.xml); GPL-3+(debian/org.gnupg.scdaemon.metainfo.xml); LGPL-3+(debian/org.gnupg.scdaemon.metainfo.xml); LGPL-2.1+(debian/org.gnupg.scdaemon.metainfo.xml); BSD-3-clause(debian/org.gnupg.scdaemon.metainfo.xml); Expat(debian/org.gnupg.scdaemon.metainfo.xml); CC0-1.0(debian/org.gnupg.scdaemon.metainfo.xml) | | {{}} | 2.2.12-1+deb10u2 | GPL-3+(* ); GPL-3+(agent/command.c); permissive(autogen.sh); permissive(common/gc-opt-flags.h); LGPL-2.1+(common/localename.c); Expat(dirmngr/dns.c); GPL-3+(doc/yat2m.c); GPL-3+ or BSD-3-clause(scd/ccid-driver.h); LGPL-3+(tools/rfc822parse.c); GPL-3+(tools/sockprox.c); RFC-Reference(doc/OpenPGP); TinySCHEME(tests/gpgscm/* ); GPL-3+(debian/* ); CC0-1.0(debian/org.gnupg.scdaemon.metainfo.xml); TinySCHEME(debian/org.gnupg.scdaemon.metainfo.xml); permissive(debian/org.gnupg.scdaemon.metainfo.xml); RFC-Reference(debian/org.gnupg.scdaemon.metainfo.xml); GPL-3+(debian/org.gnupg.scdaemon.metainfo.xml); LGPL-3+(debian/org.gnupg.scdaemon.metainfo.xml); LGPL-2.1+(debian/org.gnupg.scdaemon.metainfo.xml); BSD-3-clause(debian/org.gnupg.scdaemon.metainfo.xml); Expat(debian/org.gnupg.scdaemon.metainfo.xml); CC0-1.0(debian/org.gnupg.scdaemon.metainfo.xml) | @@ -259,20 +261,20 @@ pdfhidden: True | {{}} | 3.3-1 | GPL-3+(* ); GPL-3+(debian/* ); GPL-3+(debian/* ) | | {{}} | 1.22.4-3+deb10u1 | NO COPYRIGHT FILE | | {{}} | 1.22.4-3+deb10u1 | BSD; GFDL-1; GPL; GPL-3; MIT; public domain | -| {{}} | 2.02+dfsg1-20+deb10u4 | NO COPYRIGHT FILE | -| {{}} | 2.02+dfsg1-20+deb10u4 | NO COPYRIGHT FILE | +| {{}} | 2.06-3~deb10u4 | NO COPYRIGHT FILE | +| {{}} | 2.02+dfsg1-cl4.2.1u1 | GPL-3+(* ); GPL-3+(debian/* ); GPL-3+(debian/grub-extras/* ); CC-BY-SA-3.0(themes/starfield/* ); Expat(themes/starfield/theme.txt); GPL-3+(themes/starfield/theme.txt); CC-BY-SA-3.0(themes/starfield/theme.txt); selected by Licensor and indicated in the title of this License:(themes/starfield/theme.txt); Expat(themes/starfield/theme.txt) | | {{}} | 2.02+dfsg1-cl4.2.1u1 | NO COPYRIGHT FILE | -| {{}} | 2.02+dfsg1-20+deb10u4 | GPL-3+(* ); GPL-3+(debian/* ); GPL-3+(debian/grub-extras/* ); CC-BY-SA-3.0(themes/starfield/* ); Expat(themes/starfield/theme.txt); GPL-3+(themes/starfield/theme.txt); CC-BY-SA-3.0(themes/starfield/theme.txt); selected by Licensor and indicated in the title of this License:(themes/starfield/theme.txt); Expat(themes/starfield/theme.txt) | +| {{}} | 2.02+dfsg1-cl4.2.1u1 | GPL-3+(* ); GPL-3+(debian/* ); GPL-3+(debian/grub-extras/* ); CC-BY-SA-3.0(themes/starfield/* ); Expat(themes/starfield/theme.txt); GPL-3+(themes/starfield/theme.txt); CC-BY-SA-3.0(themes/starfield/theme.txt); selected by Licensor and indicated in the title of this License:(themes/starfield/theme.txt); Expat(themes/starfield/theme.txt) | | {{}} | 2.02+dfsg1-cl4.2.1u1 | NO COPYRIGHT FILE | -| {{}} | 2.02+dfsg1-20+deb10u4 | NO COPYRIGHT FILE | -| {{}} | 2.02+dfsg1-20+deb10u4 | NO COPYRIGHT FILE | -| {{}} | 2.02+dfsg1-20+deb10u4 | GPL-3+(* ); GPL-3+(debian/* ); GPL-3+(debian/grub-extras/* ); CC-BY-SA-3.0(themes/starfield/* ); Expat(themes/starfield/theme.txt); GPL-3+(themes/starfield/theme.txt); CC-BY-SA-3.0(themes/starfield/theme.txt); selected by Licensor and indicated in the title of this License:(themes/starfield/theme.txt); Expat(themes/starfield/theme.txt) | +| {{}} | 2.06-3~deb10u4 | NO COPYRIGHT FILE | +| {{}} | 2.06-3~deb10u4 | NO COPYRIGHT FILE | +| {{}} | 2.06-3~deb10u4 | GPL-3+(* ); GPL-3+(debian/* ); GPL-3+(debian/grub-extras/* ); CC-BY-SA-3.0(themes/starfield/* ); Expat(themes/starfield/theme.txt); GPL-3+(themes/starfield/theme.txt); CC-BY-SA-3.0(themes/starfield/theme.txt); selected by Licensor and indicated in the title of this License:(themes/starfield/theme.txt); Expat(themes/starfield/theme.txt) | | {{}} | 2.02+dfsg1-cl4.2.1u1 | GPL-3+(* ); GPL-3+(debian/* ); GPL-3+(debian/grub-extras/* ); CC-BY-SA-3.0(themes/starfield/* ); Expat(themes/starfield/theme.txt); GPL-3+(themes/starfield/theme.txt); CC-BY-SA-3.0(themes/starfield/theme.txt); selected by Licensor and indicated in the title of this License:(themes/starfield/theme.txt); Expat(themes/starfield/theme.txt) | | {{}} | 2.02+dfsg1-cl4.2.1u1 | GPL-3+(* ); GPL-3+(debian/* ); GPL-3+(debian/grub-extras/* ); CC-BY-SA-3.0(themes/starfield/* ); Expat(themes/starfield/theme.txt); GPL-3+(themes/starfield/theme.txt); CC-BY-SA-3.0(themes/starfield/theme.txt); selected by Licensor and indicated in the title of this License:(themes/starfield/theme.txt); Expat(themes/starfield/theme.txt) | | {{}} | 2.02+dfsg1-cl4.2.1u1 | GPL-3+(* ); GPL-3+(debian/* ); GPL-3+(debian/grub-extras/* ); CC-BY-SA-3.0(themes/starfield/* ); Expat(themes/starfield/theme.txt); GPL-3+(themes/starfield/theme.txt); CC-BY-SA-3.0(themes/starfield/theme.txt); selected by Licensor and indicated in the title of this License:(themes/starfield/theme.txt); Expat(themes/starfield/theme.txt) | | {{}} | 2.02+dfsg1-cl4.2.1u1 | NO COPYRIGHT FILE | -| {{}} | 2.02+dfsg1-20+deb10u4 | NO COPYRIGHT FILE | -| {{}} | 2.02+dfsg1-20+deb10u4 | NO COPYRIGHT FILE | +| {{}} | 2.06-3~deb10u4 | NO COPYRIGHT FILE | +| {{}} | 2.06-3~deb10u4 | NO COPYRIGHT FILE | | {{}} | 2.02+dfsg1-cl4.2.1u1 | GPL-3+(* ); GPL-3+(debian/* ); GPL-3+(debian/grub-extras/* ); CC-BY-SA-3.0(themes/starfield/* ); Expat(themes/starfield/theme.txt); GPL-3+(themes/starfield/theme.txt); CC-BY-SA-3.0(themes/starfield/theme.txt); selected by Licensor and indicated in the title of this License:(themes/starfield/theme.txt); Expat(themes/starfield/theme.txt) | | {{}} | 2.02+dfsg1-cl4.2.1u1 | GPL-3+(* ); GPL-3+(debian/* ); GPL-3+(debian/grub-extras/* ); CC-BY-SA-3.0(themes/starfield/* ); Expat(themes/starfield/theme.txt); GPL-3+(themes/starfield/theme.txt); CC-BY-SA-3.0(themes/starfield/theme.txt); selected by Licensor and indicated in the title of this License:(themes/starfield/theme.txt); Expat(themes/starfield/theme.txt) | | {{}} | 2.02+dfsg1-cl4.2.1u1 | GPL-3+(* ); GPL-3+(debian/* ); GPL-3+(debian/grub-extras/* ); CC-BY-SA-3.0(themes/starfield/* ); Expat(themes/starfield/theme.txt); GPL-3+(themes/starfield/theme.txt); CC-BY-SA-3.0(themes/starfield/theme.txt); selected by Licensor and indicated in the title of this License:(themes/starfield/theme.txt); Expat(themes/starfield/theme.txt) | @@ -295,7 +297,7 @@ pdfhidden: True | {{}} | 63.1-6+deb10u3 | BSD | | {{}} | 20180805.1 | WTFPL-2(* ); other(iab.* mam.* oui36.* oui.* oui.* ); GPL-2+(debian/* ); GPL-2+(debian/* ) | | {{}} | 0.28-19.4 | GPL; GPL-2 | -| {{}} | 3.2.0-cl4.3.1u2 | GPL-2(* ); GPL-2(debian/* ); GPL-2(debian/* ) | +| {{}} | 3.2.0-cl4.3.1u3 | GPL-2(* ); GPL-2(debian/* ); GPL-2(debian/* ) | | {{}} | 1.56+nmu1 | BSD-3-clause(* ); BSD-3-clause(debian/* ); GPL-2+(script/service man8/service.rst); GPL-2+(script/invoke-rc.d man8/invoke-rc.d.rst); GPL-2+(script/update-rc.d man8/update-rc.d.rst); GPL-2+(script/update-rc.d man8/update-rc.d.rst); BSD-3-clause(script/update-rc.d man8/update-rc.d.rst) | | {{}} | 0.133+deb10u1 | GPL; GPL-2 | | {{}} | 0.133+deb10u1 | GPL; GPL-2 | @@ -306,14 +308,14 @@ pdfhidden: True | {{}} | 0.35.0+20060710.5 | GPL-2(* ); GPL-2+(intltool-bin/intltool-extract); GPL-2+(debian/* ); GPL-2(debian/* ); GPL-2+(debian/* ) | | {{}} | 0.6-24-g733f3f8-1 | GPL-2+(* ); GPL-2+(debian/* ); GPL-2+(debian/* ) | | {{}} | 2.0.12+dfsg1-2 | BSD-3-clause(* ); BSD-3-clause(include/checksums.h include/histogram.h include/isochronous.hpp include/pdfs.h src/checkisoch.cpp src/checkpdfs.c src/checksums.c src/histogram.c src/ioctls.c src/isochronous.cpp src/pdfs.c); GPL-2+(aclocal.m4 * Makefile.in configure config.guess config.sub depcomp missing); MIT(install-sh); ISC(compat/inet_ntop.* ); LGPL-2+(include/gnu_getopt.h src/gnu_getopt.c src/gnu_getopt_long.c); GPL-2+(debian/* ); GPL-2+(debian/* ); BSD-3-clause(debian/* ) | -| {{}} | 3.6-2 | BSD-3-clause(* ); NCSA(src/units.c); BSD-2-clause(src/dscp.c); MIT/X11(src/cjson.* ); GPL-2+(aclocal.m4 * Makefile.in config/* configure); GPL-3(config/config.* ); BSD-3-clause(docs/_esnet/* ); MIT(config/install-sh); permissive(config/ax_check_openssl.m4); public-domain(config/mkinstalldirs); public-domain(src/portable_endian.h); GPL-2+(debian/* ); GPL-2+(debian/* ); GPL-3(debian/* ); NCSA(debian/* ); BSD-2-clause(debian/* ); BSD-3-clause(debian/* ) | +| {{}} | 3.6-2+deb10u1 | BSD-3-clause(* ); NCSA(src/units.c); BSD-2-clause(src/dscp.c); MIT/X11(src/cjson.* ); GPL-2+(aclocal.m4 * Makefile.in config/* configure); GPL-3(config/config.* ); BSD-3-clause(docs/_esnet/* ); MIT(config/install-sh); permissive(config/ax_check_openssl.m4); public-domain(config/mkinstalldirs); public-domain(src/portable_endian.h); GPL-2+(debian/* ); GPL-2+(debian/* ); GPL-3(debian/* ); NCSA(debian/* ); BSD-2-clause(debian/* ); BSD-3-clause(debian/* ) | | {{}} | 1.8.18-6+deb10u1 | BSD; BSD-3-clause | | {{}} | 4.19.0-cl4.3.0u1 | GPL-2(* ); GPL-2(debian/* ); GPL-2(debian/* ) | | {{}} | 4.19.0-cl4.3.0u1 | NO COPYRIGHT FILE | | {{}} | 4.19.0-cl4.3.1u14 | GPL-2(* ); GPL-2(debian/* ); GPL-2(debian/* ) | -| {{}} | 1.8.2-3-cl4.3.1u7 | GPL-2(* ); GPL-2(extensions/libebt_802_3.c); GPL-2(extensions/libebt_ip.c extensions/libebt_log.c extensions/libebt_mark* .c); GPL-2(extensions/libebt_limit.c); GPL-2(extensions/libebt_nflog.c); GPL-2(extensions/libip6t_DNAT.c); GPL-2(extensions/libip6t_DNPT.c); GPL-2(extensions/libip6t_MASQUERADE.c); GPL-2(extensions/libip6t_NETMAP.c); GPL-2(extensions/libip6t_REDIRECT.c); GPL-2(extensions/libip6t_REJECT.c); GPL-2(extensions/libip6t_SNAT.c); GPL-2(extensions/libip6t_SNPT.c); GPL-2(extensions/libip6t_mh.c); GPL-2(extensions/libipt_CLUSTERIP.c); GPL-2(extensions/libipt_ECN.c); GPL-2(extensions/libipt_REJECT.c); GPL-2(extensions/libipt_TTL.c); GPL-2(extensions/libipt_ULOG.c); GPL-2(extensions/libipt_ttl.c); GPL-2(extensions/libxt_AUDIT.c); GPL-2(extensions/libxt_CHECKSUM.c); GPL-2(extensions/libxt_CLASSIFY.c); GPL-2(extensions/libxt_CONNMARK.c); GPL-2(extensions/libxt_CONNSECMARK.c); GPL-2(extensions/libxt_CT.c); GPL-2(extensions/libxt_DSCP.c); GPL-2(extensions/libxt_HMARK.c); GPL-2(extensions/libxt_IDLETIMER.c); GPL-2(extensions/libxt_LED.c); GPL-2(extensions/libxt_NFQUEUE.c); GPL-2(extensions/libxt_RATEEST.c); GPL-2(extensions/libxt_SECMARK.c); GPL-2(extensions/libxt_SET.c); GPL-2(extensions/libxt_SYNPROXY.c); GPL-2(extensions/libxt_TCPMSS.c); GPL-2(extensions/libxt_TCPOPTSTRIP.c); GPL-2(extensions/libxt_TEE.c); GPL-2(extensions/libxt_TOS.c); GPL-2(extensions/libxt_TPROXY.c); GPL-2(extensions/libxt_addrtype.c); GPL-2(extensions/libxt_bpf.c); GPL-2(extensions/libxt_cluster.c); GPL-2(extensions/libxt_connmark.c); GPL-2(extensions/libxt_conntrack.c); GPL-2(extensions/libxt_dccp.c); GPL-2(extensions/libxt_devgroup.c); GPL-2(extensions/libxt_dscp.c); GPL-2(extensions/libxt_ecn.c); GPL-2(extensions/libxt_hashlimit.c); GPL-2(extensions/libxt_osf.c); GPL-2(extensions/libxt_owner.c); GPL-2(extensions/libxt_policy.c); GPL-2(extensions/libxt_rateest.c); GPL-2(extensions/libxt_sctp.c); GPL-2(extensions/libxt_set.c); GPL-2(extensions/libxt_socket.c); GPL-2(extensions/libxt_statistic.c); GPL-2(extensions/libxt_string.c); GPL-2(extensions/libxt_time.c); GPL-2(extensions/libxt_tos.c); GPL-2(extensions/libxt_u32.c); GPL-2(include/linux/netfilter/ipset/ip_set.h); GPL-2(include/linux/netfilter/xt_AUDIT.h); GPL-2(include/linux/netfilter/xt_CHECKSUM.h); GPL-2(include/linux/netfilter/xt_DSCP.h); GPL-2(include/linux/netfilter/xt_IDLETIMER.h); GPL-2(include/linux/netfilter/xt_NFQUEUE.h); GPL-2(include/linux/netfilter/xt_connmark.h); GPL-2(include/linux/netfilter/xt_conntrack.h); GPL-2(include/linux/netfilter/xt_dscp.h); GPL-2(include/linux/netfilter/xt_ecn.h); GPL-2(include/linux/netfilter/xt_osf.h); GPL-2(include/linux/netfilter_ipv4.h); GPL-2(include/linux/netfilter_ipv4/ip_queue.h); GPL-2(include/linux/netfilter_ipv4/ipt_ECN.h); GPL-2(include/linux/netfilter_ipv4/ipt_TTL.h); GPL-2(include/linux/netfilter_ipv4/ipt_ULOG.h); GPL-2(include/linux/netfilter_ipv4/ipt_ttl.h); GPL-2(include/linux/netfilter_ipv6.h); Artistic-2(iptables/iptables-apply); GPL-2(iptables/iptables-save.c); GPL-2(iptables/iptables-xml.c); GPL-2+(iptables/nft.c); GPL-2+(iptables/nft-arp.c); GPL-2+(iptables/nft-bridge.c); GPL-2+(iptables/nft-ipv4.c iptables/nft-ipv6.c iptables/nft-shared.c); GPL-2+(iptables/xtables-arp.c iptables/xtables-eb.c); GPL-2(libiptc/libip4tc.c); GPL-2(libiptc/libip6tc.c); GPL-2(libiptc/libiptc.c); GPL-2(libxtables/xtables.c); GPL-2(libxtables/xtoptions.c); GPL-2(utils/nfsynproxy.c); custom(utils/pf.os); GPL-2(utils/pf.os); GPL-2+(utils/pf.os); Artistic-2(utils/pf.os) | -| {{}} | 1.8.2-3-cl4.3.1u7 | NO COPYRIGHT FILE | -| {{}} | 1.8.2-3-cl4.3.1u7 | GPL-2(* ); GPL-2(extensions/libebt_802_3.c); GPL-2(extensions/libebt_ip.c extensions/libebt_log.c extensions/libebt_mark* .c); GPL-2(extensions/libebt_limit.c); GPL-2(extensions/libebt_nflog.c); GPL-2(extensions/libip6t_DNAT.c); GPL-2(extensions/libip6t_DNPT.c); GPL-2(extensions/libip6t_MASQUERADE.c); GPL-2(extensions/libip6t_NETMAP.c); GPL-2(extensions/libip6t_REDIRECT.c); GPL-2(extensions/libip6t_REJECT.c); GPL-2(extensions/libip6t_SNAT.c); GPL-2(extensions/libip6t_SNPT.c); GPL-2(extensions/libip6t_mh.c); GPL-2(extensions/libipt_CLUSTERIP.c); GPL-2(extensions/libipt_ECN.c); GPL-2(extensions/libipt_REJECT.c); GPL-2(extensions/libipt_TTL.c); GPL-2(extensions/libipt_ULOG.c); GPL-2(extensions/libipt_ttl.c); GPL-2(extensions/libxt_AUDIT.c); GPL-2(extensions/libxt_CHECKSUM.c); GPL-2(extensions/libxt_CLASSIFY.c); GPL-2(extensions/libxt_CONNMARK.c); GPL-2(extensions/libxt_CONNSECMARK.c); GPL-2(extensions/libxt_CT.c); GPL-2(extensions/libxt_DSCP.c); GPL-2(extensions/libxt_HMARK.c); GPL-2(extensions/libxt_IDLETIMER.c); GPL-2(extensions/libxt_LED.c); GPL-2(extensions/libxt_NFQUEUE.c); GPL-2(extensions/libxt_RATEEST.c); GPL-2(extensions/libxt_SECMARK.c); GPL-2(extensions/libxt_SET.c); GPL-2(extensions/libxt_SYNPROXY.c); GPL-2(extensions/libxt_TCPMSS.c); GPL-2(extensions/libxt_TCPOPTSTRIP.c); GPL-2(extensions/libxt_TEE.c); GPL-2(extensions/libxt_TOS.c); GPL-2(extensions/libxt_TPROXY.c); GPL-2(extensions/libxt_addrtype.c); GPL-2(extensions/libxt_bpf.c); GPL-2(extensions/libxt_cluster.c); GPL-2(extensions/libxt_connmark.c); GPL-2(extensions/libxt_conntrack.c); GPL-2(extensions/libxt_dccp.c); GPL-2(extensions/libxt_devgroup.c); GPL-2(extensions/libxt_dscp.c); GPL-2(extensions/libxt_ecn.c); GPL-2(extensions/libxt_hashlimit.c); GPL-2(extensions/libxt_osf.c); GPL-2(extensions/libxt_owner.c); GPL-2(extensions/libxt_policy.c); GPL-2(extensions/libxt_rateest.c); GPL-2(extensions/libxt_sctp.c); GPL-2(extensions/libxt_set.c); GPL-2(extensions/libxt_socket.c); GPL-2(extensions/libxt_statistic.c); GPL-2(extensions/libxt_string.c); GPL-2(extensions/libxt_time.c); GPL-2(extensions/libxt_tos.c); GPL-2(extensions/libxt_u32.c); GPL-2(include/linux/netfilter/ipset/ip_set.h); GPL-2(include/linux/netfilter/xt_AUDIT.h); GPL-2(include/linux/netfilter/xt_CHECKSUM.h); GPL-2(include/linux/netfilter/xt_DSCP.h); GPL-2(include/linux/netfilter/xt_IDLETIMER.h); GPL-2(include/linux/netfilter/xt_NFQUEUE.h); GPL-2(include/linux/netfilter/xt_connmark.h); GPL-2(include/linux/netfilter/xt_conntrack.h); GPL-2(include/linux/netfilter/xt_dscp.h); GPL-2(include/linux/netfilter/xt_ecn.h); GPL-2(include/linux/netfilter/xt_osf.h); GPL-2(include/linux/netfilter_ipv4.h); GPL-2(include/linux/netfilter_ipv4/ip_queue.h); GPL-2(include/linux/netfilter_ipv4/ipt_ECN.h); GPL-2(include/linux/netfilter_ipv4/ipt_TTL.h); GPL-2(include/linux/netfilter_ipv4/ipt_ULOG.h); GPL-2(include/linux/netfilter_ipv4/ipt_ttl.h); GPL-2(include/linux/netfilter_ipv6.h); Artistic-2(iptables/iptables-apply); GPL-2(iptables/iptables-save.c); GPL-2(iptables/iptables-xml.c); GPL-2+(iptables/nft.c); GPL-2+(iptables/nft-arp.c); GPL-2+(iptables/nft-bridge.c); GPL-2+(iptables/nft-ipv4.c iptables/nft-ipv6.c iptables/nft-shared.c); GPL-2+(iptables/xtables-arp.c iptables/xtables-eb.c); GPL-2(libiptc/libip4tc.c); GPL-2(libiptc/libip6tc.c); GPL-2(libiptc/libiptc.c); GPL-2(libxtables/xtables.c); GPL-2(libxtables/xtoptions.c); GPL-2(utils/nfsynproxy.c); custom(utils/pf.os); GPL-2(utils/pf.os); GPL-2+(utils/pf.os); Artistic-2(utils/pf.os) | +| {{}} | 1.8.2-3-cl4.3.2u1 | GPL-2(* ); GPL-2(extensions/libebt_802_3.c); GPL-2(extensions/libebt_ip.c extensions/libebt_log.c extensions/libebt_mark* .c); GPL-2(extensions/libebt_limit.c); GPL-2(extensions/libebt_nflog.c); GPL-2(extensions/libip6t_DNAT.c); GPL-2(extensions/libip6t_DNPT.c); GPL-2(extensions/libip6t_MASQUERADE.c); GPL-2(extensions/libip6t_NETMAP.c); GPL-2(extensions/libip6t_REDIRECT.c); GPL-2(extensions/libip6t_REJECT.c); GPL-2(extensions/libip6t_SNAT.c); GPL-2(extensions/libip6t_SNPT.c); GPL-2(extensions/libip6t_mh.c); GPL-2(extensions/libipt_CLUSTERIP.c); GPL-2(extensions/libipt_ECN.c); GPL-2(extensions/libipt_REJECT.c); GPL-2(extensions/libipt_TTL.c); GPL-2(extensions/libipt_ULOG.c); GPL-2(extensions/libipt_ttl.c); GPL-2(extensions/libxt_AUDIT.c); GPL-2(extensions/libxt_CHECKSUM.c); GPL-2(extensions/libxt_CLASSIFY.c); GPL-2(extensions/libxt_CONNMARK.c); GPL-2(extensions/libxt_CONNSECMARK.c); GPL-2(extensions/libxt_CT.c); GPL-2(extensions/libxt_DSCP.c); GPL-2(extensions/libxt_HMARK.c); GPL-2(extensions/libxt_IDLETIMER.c); GPL-2(extensions/libxt_LED.c); GPL-2(extensions/libxt_NFQUEUE.c); GPL-2(extensions/libxt_RATEEST.c); GPL-2(extensions/libxt_SECMARK.c); GPL-2(extensions/libxt_SET.c); GPL-2(extensions/libxt_SYNPROXY.c); GPL-2(extensions/libxt_TCPMSS.c); GPL-2(extensions/libxt_TCPOPTSTRIP.c); GPL-2(extensions/libxt_TEE.c); GPL-2(extensions/libxt_TOS.c); GPL-2(extensions/libxt_TPROXY.c); GPL-2(extensions/libxt_addrtype.c); GPL-2(extensions/libxt_bpf.c); GPL-2(extensions/libxt_cluster.c); GPL-2(extensions/libxt_connmark.c); GPL-2(extensions/libxt_conntrack.c); GPL-2(extensions/libxt_dccp.c); GPL-2(extensions/libxt_devgroup.c); GPL-2(extensions/libxt_dscp.c); GPL-2(extensions/libxt_ecn.c); GPL-2(extensions/libxt_hashlimit.c); GPL-2(extensions/libxt_osf.c); GPL-2(extensions/libxt_owner.c); GPL-2(extensions/libxt_policy.c); GPL-2(extensions/libxt_rateest.c); GPL-2(extensions/libxt_sctp.c); GPL-2(extensions/libxt_set.c); GPL-2(extensions/libxt_socket.c); GPL-2(extensions/libxt_statistic.c); GPL-2(extensions/libxt_string.c); GPL-2(extensions/libxt_time.c); GPL-2(extensions/libxt_tos.c); GPL-2(extensions/libxt_u32.c); GPL-2(include/linux/netfilter/ipset/ip_set.h); GPL-2(include/linux/netfilter/xt_AUDIT.h); GPL-2(include/linux/netfilter/xt_CHECKSUM.h); GPL-2(include/linux/netfilter/xt_DSCP.h); GPL-2(include/linux/netfilter/xt_IDLETIMER.h); GPL-2(include/linux/netfilter/xt_NFQUEUE.h); GPL-2(include/linux/netfilter/xt_connmark.h); GPL-2(include/linux/netfilter/xt_conntrack.h); GPL-2(include/linux/netfilter/xt_dscp.h); GPL-2(include/linux/netfilter/xt_ecn.h); GPL-2(include/linux/netfilter/xt_osf.h); GPL-2(include/linux/netfilter_ipv4.h); GPL-2(include/linux/netfilter_ipv4/ip_queue.h); GPL-2(include/linux/netfilter_ipv4/ipt_ECN.h); GPL-2(include/linux/netfilter_ipv4/ipt_TTL.h); GPL-2(include/linux/netfilter_ipv4/ipt_ULOG.h); GPL-2(include/linux/netfilter_ipv4/ipt_ttl.h); GPL-2(include/linux/netfilter_ipv6.h); Artistic-2(iptables/iptables-apply); GPL-2(iptables/iptables-save.c); GPL-2(iptables/iptables-xml.c); GPL-2+(iptables/nft.c); GPL-2+(iptables/nft-arp.c); GPL-2+(iptables/nft-bridge.c); GPL-2+(iptables/nft-ipv4.c iptables/nft-ipv6.c iptables/nft-shared.c); GPL-2+(iptables/xtables-arp.c iptables/xtables-eb.c); GPL-2(libiptc/libip4tc.c); GPL-2(libiptc/libip6tc.c); GPL-2(libiptc/libiptc.c); GPL-2(libxtables/xtables.c); GPL-2(libxtables/xtoptions.c); GPL-2(utils/nfsynproxy.c); custom(utils/pf.os); GPL-2(utils/pf.os); GPL-2+(utils/pf.os); Artistic-2(utils/pf.os) | +| {{}} | 1.8.2-3-cl4.3.2u1 | NO COPYRIGHT FILE | +| {{}} | 1.8.2-3-cl4.3.2u1 | GPL-2(* ); GPL-2(extensions/libebt_802_3.c); GPL-2(extensions/libebt_ip.c extensions/libebt_log.c extensions/libebt_mark* .c); GPL-2(extensions/libebt_limit.c); GPL-2(extensions/libebt_nflog.c); GPL-2(extensions/libip6t_DNAT.c); GPL-2(extensions/libip6t_DNPT.c); GPL-2(extensions/libip6t_MASQUERADE.c); GPL-2(extensions/libip6t_NETMAP.c); GPL-2(extensions/libip6t_REDIRECT.c); GPL-2(extensions/libip6t_REJECT.c); GPL-2(extensions/libip6t_SNAT.c); GPL-2(extensions/libip6t_SNPT.c); GPL-2(extensions/libip6t_mh.c); GPL-2(extensions/libipt_CLUSTERIP.c); GPL-2(extensions/libipt_ECN.c); GPL-2(extensions/libipt_REJECT.c); GPL-2(extensions/libipt_TTL.c); GPL-2(extensions/libipt_ULOG.c); GPL-2(extensions/libipt_ttl.c); GPL-2(extensions/libxt_AUDIT.c); GPL-2(extensions/libxt_CHECKSUM.c); GPL-2(extensions/libxt_CLASSIFY.c); GPL-2(extensions/libxt_CONNMARK.c); GPL-2(extensions/libxt_CONNSECMARK.c); GPL-2(extensions/libxt_CT.c); GPL-2(extensions/libxt_DSCP.c); GPL-2(extensions/libxt_HMARK.c); GPL-2(extensions/libxt_IDLETIMER.c); GPL-2(extensions/libxt_LED.c); GPL-2(extensions/libxt_NFQUEUE.c); GPL-2(extensions/libxt_RATEEST.c); GPL-2(extensions/libxt_SECMARK.c); GPL-2(extensions/libxt_SET.c); GPL-2(extensions/libxt_SYNPROXY.c); GPL-2(extensions/libxt_TCPMSS.c); GPL-2(extensions/libxt_TCPOPTSTRIP.c); GPL-2(extensions/libxt_TEE.c); GPL-2(extensions/libxt_TOS.c); GPL-2(extensions/libxt_TPROXY.c); GPL-2(extensions/libxt_addrtype.c); GPL-2(extensions/libxt_bpf.c); GPL-2(extensions/libxt_cluster.c); GPL-2(extensions/libxt_connmark.c); GPL-2(extensions/libxt_conntrack.c); GPL-2(extensions/libxt_dccp.c); GPL-2(extensions/libxt_devgroup.c); GPL-2(extensions/libxt_dscp.c); GPL-2(extensions/libxt_ecn.c); GPL-2(extensions/libxt_hashlimit.c); GPL-2(extensions/libxt_osf.c); GPL-2(extensions/libxt_owner.c); GPL-2(extensions/libxt_policy.c); GPL-2(extensions/libxt_rateest.c); GPL-2(extensions/libxt_sctp.c); GPL-2(extensions/libxt_set.c); GPL-2(extensions/libxt_socket.c); GPL-2(extensions/libxt_statistic.c); GPL-2(extensions/libxt_string.c); GPL-2(extensions/libxt_time.c); GPL-2(extensions/libxt_tos.c); GPL-2(extensions/libxt_u32.c); GPL-2(include/linux/netfilter/ipset/ip_set.h); GPL-2(include/linux/netfilter/xt_AUDIT.h); GPL-2(include/linux/netfilter/xt_CHECKSUM.h); GPL-2(include/linux/netfilter/xt_DSCP.h); GPL-2(include/linux/netfilter/xt_IDLETIMER.h); GPL-2(include/linux/netfilter/xt_NFQUEUE.h); GPL-2(include/linux/netfilter/xt_connmark.h); GPL-2(include/linux/netfilter/xt_conntrack.h); GPL-2(include/linux/netfilter/xt_dscp.h); GPL-2(include/linux/netfilter/xt_ecn.h); GPL-2(include/linux/netfilter/xt_osf.h); GPL-2(include/linux/netfilter_ipv4.h); GPL-2(include/linux/netfilter_ipv4/ip_queue.h); GPL-2(include/linux/netfilter_ipv4/ipt_ECN.h); GPL-2(include/linux/netfilter_ipv4/ipt_TTL.h); GPL-2(include/linux/netfilter_ipv4/ipt_ULOG.h); GPL-2(include/linux/netfilter_ipv4/ipt_ttl.h); GPL-2(include/linux/netfilter_ipv6.h); Artistic-2(iptables/iptables-apply); GPL-2(iptables/iptables-save.c); GPL-2(iptables/iptables-xml.c); GPL-2+(iptables/nft.c); GPL-2+(iptables/nft-arp.c); GPL-2+(iptables/nft-bridge.c); GPL-2+(iptables/nft-ipv4.c iptables/nft-ipv6.c iptables/nft-shared.c); GPL-2+(iptables/xtables-arp.c iptables/xtables-eb.c); GPL-2(libiptc/libip4tc.c); GPL-2(libiptc/libip6tc.c); GPL-2(libiptc/libiptc.c); GPL-2(libxtables/xtables.c); GPL-2(libxtables/xtoptions.c); GPL-2(utils/nfsynproxy.c); custom(utils/pf.os); GPL-2(utils/pf.os); GPL-2+(utils/pf.os); Artistic-2(utils/pf.os) | | {{}} | 1.1.4-6+b1 | GPL-2(* ); GPL-2(debian/* ); GPL-2(debian/* ) | | {{}} | 20180629-2+cl4.3.1u4 | BSD; GPL | | {{}} | 20180629-2+cl4.3.1u4 | NO COPYRIGHT FILE | @@ -350,8 +352,8 @@ pdfhidden: True | {{}} | 1.193~deb10u1 | GPL; GPL-2; public domain | | {{}} | 2.0.6-1+deb10u1 | NO COPYRIGHT FILE | | {{}} | 26-1 | NO COPYRIGHT FILE | -| {{}} | 1.17-3+deb10u3 | BSD; GPL; GPL-2; MIT | -| {{}} | 1.17-3+deb10u3 | BSD; GPL; GPL-2; MIT | +| {{}} | 1.17-3+deb10u4 | BSD; GPL; GPL-2; MIT | +| {{}} | 1.17-3+deb10u5 | BSD; GPL; GPL-2; MIT | | {{}} | 4.0-cl4.3.1u2 | Cumulus Networks Proprietary(* ); GPL-2(debian/* ) | | {{}} | 2.4.47+dfsg-3+deb10u7 | ISC; MIT | | {{}} | 487-0.1+b1 | GPL; GPL-3 | @@ -371,7 +373,7 @@ pdfhidden: True | {{}} | 1.8.2.3 | GPL; GPL-2; GPLv2+ | | {{}} | 1.8.2.3 | GPL; GPL-2; GPLv2+ | | {{}} | 0.1.34+b1 | GPL | -| {{}} | 3.3.3-4+deb10u1 | BSD-2-clause(* ); BSD-2-clause(cat/* ); Apache-2.0(contrib/android/* ); BSD-4-clause-UCB(contrib/shar/shar.1); BSD-2-clause(contrib/shar/shar.c); BSD-2-clause and BSD-1-clause-UCB(cpio/cpio_windows.c); BSD-2-clause(cpio/cpio_windows.h); BSD-2-clause(cpio/test/* ); Expat(doc/mdoc2man.awk); BSD-2-clause(libarchive/* ); BSD-2-clause and BSD-124-clause-UCB(libarchive/archive_entry.c); PD(libarchive/archive_ppmd7.c); BSD-2-clause and Expat(libarchive/archive_random.c); BSD-2-clause and BSD-1-clause-UCB(libarchive/archive_windows.c); BSD-2-clause and BSD-3-clause-UCB(libarchive/archive_write_add_filter_compress.c); BSD-124-clause-UCB(libarchive/mtree.5); BSD-2-clause(libarchive_fe/err.h); BSD-2-clause(libarchive_fe/line_reader.c); BSD-2-clause and Expat(libarchive_fe/passphrase.c); BSD-2-clause(test_utils/test_utils.c); BSD-2-clause(debian/* ); BSD-2-clause(debian/* ); Apache-2.0(debian/* ); BSD-1-clause-UCB(debian/* ); BSD-124-clause-UCB(debian/* ); BSD-3-clause-UCB(debian/* ); BSD-4-clause-UCB(debian/* ); Expat(debian/* ) | +| {{}} | 3.3.3-4+deb10u3 | BSD-2-clause(* ); BSD-2-clause(cat/* ); Apache-2.0(contrib/android/* ); BSD-4-clause-UCB(contrib/shar/shar.1); BSD-2-clause(contrib/shar/shar.c); BSD-2-clause and BSD-1-clause-UCB(cpio/cpio_windows.c); BSD-2-clause(cpio/cpio_windows.h); BSD-2-clause(cpio/test/* ); Expat(doc/mdoc2man.awk); BSD-2-clause(libarchive/* ); BSD-2-clause and BSD-124-clause-UCB(libarchive/archive_entry.c); PD(libarchive/archive_ppmd7.c); BSD-2-clause and Expat(libarchive/archive_random.c); BSD-2-clause and BSD-1-clause-UCB(libarchive/archive_windows.c); BSD-2-clause and BSD-3-clause-UCB(libarchive/archive_write_add_filter_compress.c); BSD-124-clause-UCB(libarchive/mtree.5); BSD-2-clause(libarchive_fe/err.h); BSD-2-clause(libarchive_fe/line_reader.c); BSD-2-clause and Expat(libarchive_fe/passphrase.c); BSD-2-clause(test_utils/test_utils.c); BSD-2-clause(debian/* ); BSD-2-clause(debian/* ); Apache-2.0(debian/* ); BSD-1-clause-UCB(debian/* ); BSD-124-clause-UCB(debian/* ); BSD-3-clause-UCB(debian/* ); BSD-4-clause-UCB(debian/* ); Expat(debian/* ) | | {{}} | 1.64-1 | Artistic or GPL-1+(* ); Artistic and Info-ZIP(lib/Archive/Zip/Member.pm); Artistic or GPL-1+(debian/* ); Artistic(debian/* ); GPL-1+(debian/* ); Info-ZIP(debian/* ) | | {{}} | 0~20171227-0.2 | CC0 or Apache-2.0(* ); CC0 or Apache-2.0(src/blake2/* ); CC0 or Apache-2.0(src/encoding.c); CC0(debian/* ); CC0(debian/argon2.1); CC0(debian/argon2.1); Apache-2.0(debian/argon2.1) | | {{}} | 7.4.0-6 | NO COPYRIGHT FILE | @@ -402,14 +404,15 @@ pdfhidden: True | {{}} | 1.5.6-2+deb10u1 | GPL; GPL-2; GPL-3; GPL-3+; LGPL-2.1; MIT | | {{}} | 1.5.6-2+deb10u1 | GPL; GPL-2; GPL-3; GPL-3+; LGPL-2.1; MIT | | {{}} | 0.22-1+b1 | Artistic or GPL-1+(* ); Artistic or GPL-1+(ppport.h); Artistic or GPL-1+(debian/* ); Artistic(debian/* ); GPL-1+(debian/* ) | -| {{}} | 9.11.5.P4+dfsg-5.1+deb10u7 | ISC and BSD-2-clause and BSD-3-clause and BSD-4-clause(* ); MPL-2.0 or ISC(bin/tests/system/chain/); BSD-2-clause(unit/atf-src/); BSD-4-clause(contrib/idn/); ISC or MPL-2.0(debian/); ISC(debian/); BSD-2-clause(debian/); BSD-3-clause(debian/); BSD-4-clause(debian/); MPL-2.0(debian/) | -| {{}} | 9.11.5.P4+dfsg-5.1+deb10u7 | ISC and BSD-2-clause and BSD-3-clause and BSD-4-clause(* ); MPL-2.0 or ISC(bin/tests/system/chain/); BSD-2-clause(unit/atf-src/); BSD-4-clause(contrib/idn/); ISC or MPL-2.0(debian/); ISC(debian/); BSD-2-clause(debian/); BSD-3-clause(debian/); BSD-4-clause(debian/); MPL-2.0(debian/) | +| {{}} | 9.11.5.P4+dfsg-5.1+deb10u9 | ISC and BSD-2-clause and BSD-3-clause and BSD-4-clause(* ); MPL-2.0 or ISC(bin/tests/system/chain/); BSD-2-clause(unit/atf-src/); BSD-4-clause(contrib/idn/); ISC or MPL-2.0(debian/); ISC(debian/); BSD-2-clause(debian/); BSD-3-clause(debian/); BSD-4-clause(debian/); MPL-2.0(debian/) | +| {{}} | 9.11.5.P4+dfsg-5.1+deb10u9 | ISC and BSD-2-clause and BSD-3-clause and BSD-4-clause(* ); MPL-2.0 or ISC(bin/tests/system/chain/); BSD-2-clause(unit/atf-src/); BSD-4-clause(contrib/idn/); ISC or MPL-2.0(debian/); ISC(debian/); BSD-2-clause(debian/); BSD-3-clause(debian/); BSD-4-clause(debian/); MPL-2.0(debian/) | +| {{}} | 9.11.5.P4+dfsg-5.1+deb10u9 | ISC and BSD-2-clause and BSD-3-clause and BSD-4-clause(* ); MPL-2.0 or ISC(bin/tests/system/chain/); BSD-2-clause(unit/atf-src/); BSD-4-clause(contrib/idn/); ISC or MPL-2.0(debian/); ISC(debian/); BSD-2-clause(debian/); BSD-3-clause(debian/); BSD-4-clause(debian/); MPL-2.0(debian/) | | {{}} | 2.31.1-16 | NO COPYRIGHT FILE | | {{}} | 3.3.2.dfsg-1 | GPL-3+(* ); GPL-2+(debian/* ) | | {{}} | 3.8.0-2 | BSD-3-clause(* ); BSD-3-clause(CMAKE/FindGcov.cmake); BSD-3-clause-intel(LAPACKE/* ); BSD-3-clause(debian/* ); BSD-3-clause(debian/* ) | | {{}} | 2.33.1-0.1 | GPL-2+(* ); GPL-2(schedutils/ionice.c); GPL-2(schedutils/chrt.c); GPL-2(disk-utils/raw.c); GPL-2(sys-utils/nsenter.c); GPL-2(disk-utils/mkfs.minix.c); public-domain(lib/at.c); BSD-4-clause(login-utils/vipw.c); MIT(text-utils/tailf.c); MIT(sys-utils/flock.c); BSD-2-clause(text-utils/pg.c); BSD-2-clause(login-utils/last-deprecated.c); BSD-2-clause(login-utils/login.c); BSD-3-clause(login-utils/logindefs.c); BSD-3-clause(libuuid/* ); LGPL-2+(lib/procutils.c); LGPL-2+(* /colors.* ); LGPL-2+(login-utils/setpwnam.h); LGPL-2.1+(libfdisk/* ); LGPL-2.1+(lib/cpuset.c); LGPL-2.1+(* /mbsalign.* ); GPL-3+(* /readutmp.* ); LGPL-2.1+(* /timeutils.* ); LGPL(include/list.h); LGPL-2.1+(libblkid/* ); LGPL(include/cpuset.h); LGPL(misc-utils/blkid.c); LGPL-2.1+(libmount/* ); LGPL-3+(libmount/python/* ); LGPL(libsmartcols/* ); GPL-2+(debian/* ); public-domain(debian/* ); GPL-2(debian/* ); GPL-2+(debian/* ); GPL-3+(debian/* ); BSD-2-clause(debian/* ); BSD-3-clause(debian/* ); BSD-4-clause(debian/* ); LGPL(debian/* ); LGPL-2+(debian/* ); LGPL-2.1+(debian/* ); LGPL-3+(debian/* ); MIT(debian/* ) | | {{}} | 2.33.1-0.1 | GPL-2+(* ); GPL-2(schedutils/ionice.c); GPL-2(schedutils/chrt.c); GPL-2(disk-utils/raw.c); GPL-2(sys-utils/nsenter.c); GPL-2(disk-utils/mkfs.minix.c); public-domain(lib/at.c); BSD-4-clause(login-utils/vipw.c); MIT(text-utils/tailf.c); MIT(sys-utils/flock.c); BSD-2-clause(text-utils/pg.c); BSD-2-clause(login-utils/last-deprecated.c); BSD-2-clause(login-utils/login.c); BSD-3-clause(login-utils/logindefs.c); BSD-3-clause(libuuid/* ); LGPL-2+(lib/procutils.c); LGPL-2+(* /colors.* ); LGPL-2+(login-utils/setpwnam.h); LGPL-2.1+(libfdisk/* ); LGPL-2.1+(lib/cpuset.c); LGPL-2.1+(* /mbsalign.* ); GPL-3+(* /readutmp.* ); LGPL-2.1+(* /timeutils.* ); LGPL(include/list.h); LGPL-2.1+(libblkid/* ); LGPL(include/cpuset.h); LGPL(misc-utils/blkid.c); LGPL-2.1+(libmount/* ); LGPL-3+(libmount/python/* ); LGPL(libsmartcols/* ); GPL-2+(debian/* ); public-domain(debian/* ); GPL-2(debian/* ); GPL-2+(debian/* ); GPL-3+(debian/* ); BSD-2-clause(debian/* ); BSD-3-clause(debian/* ); BSD-4-clause(debian/* ); LGPL(debian/* ); LGPL-2+(debian/* ); LGPL-2.1+(debian/* ); LGPL-3+(debian/* ); MIT(debian/* ) | -| {{}} | 5.50-1.2~deb10u2 | GPL-2+(* ); LGPL-2.1+(android/* ); Apache-2.0(android/audio_utils/* ); GPL-2+(android/avctp.c); GPL-2+(android/avctp.h); GPL-2+(android/avdtptest.c); Apache-2.0(android/bluetoothd-wrapper.c); Apache-2.0(android/client/* ); GPL-2+(android/compat/* ); LGPL-2.1+(android/compat/wordexp.h); Apache-2.0(android/hal-audio-aptx.c); Apache-2.0(android/hardware/* ); LGPL-2.1+(android/health.c); GPL-2+(android/log.c); Apache-2.0(android/system/* ); GPL-2+(attrib/* ); GPL-2+(attrib/att-database.h); GPL-2+(attrib/gatttool.h); GPL-2+(btio/* ); LGPL-2.1+(emulator/* ); GPL-2+(emulator/b1ee.c); LGPL-2.1+(emulator/hciemu.c); LGPL-2.1+(emulator/smp.c); GPL-2+(gdbus/* ); GPL-2+(lib/* ); GPL-2+(lib/a2mp.h); GPL-2(lib/amp.h); GPL-2+(lib/bnep.h); GPL-2+(lib/cmtp.h); GPL-2+(lib/l2cap.h); GPL-2+(lib/mgmt.h); GPL-2+(lib/sdp.c); LGPL-2.1+(monitor/* ); LGPL-2.1+(monitor/a2dp.c); LGPL-2.1+(monitor/tty.h); GPL-2+(obexd/* ); GPL-2+(obexd/client/bluetooth.c); GPL-2(obexd/client/dbus.c); GPL-2+(obexd/client/map-event.c); GPL-2+(obexd/client/map.c); GPL-2+(obexd/client/pbap.c); GPL-2+(obexd/client/session.c); GPL-2+(obexd/plugins/* ); GPL-2+(obexd/plugins/filesystem.c); GPL-2+(obexd/plugins/filesystem.h); GPL-2+(obexd/plugins/irmc.c); GPL-2+(obexd/plugins/mas.c); GPL-2+(obexd/plugins/vcard.c); GPL-2+(obexd/src/manager.h); GPL-2+(obexd/src/obex-priv.h); LGPL-2.1+(peripheral/* ); GPL-2+(plugins/autopair.c); GPL-2+(plugins/external-dummy.c); GPL-2+(plugins/gatt-example.c); GPL-2+(plugins/hostname.c); GPL-2+(plugins/neard.c); GPL-2+(plugins/sixaxis.c); GPL-2+(plugins/wiimote.c); GPL-2+(profiles/* ); GPL-2+(profiles/audio/* ); LGPL-2.1+(profiles/audio/a2dp-codecs.h); GPL-2+(profiles/audio/a2dp.c); GPL-2+(profiles/audio/avctp.c); GPL-2+(profiles/audio/player.c); GPL-2+(profiles/audio/source.c); LGPL-2.1+(profiles/battery/* ); LGPL-2.1+(profiles/deviceinfo/* ); GPL-2+(profiles/deviceinfo/deviceinfo.c); GPL-2+(profiles/deviceinfo/dis.c); GPL-2+(profiles/gap/* ); GPL-2+(profiles/health/* ); GPL-2+(profiles/health/mcap.c); GPL-2+(profiles/input/device.c); GPL-2+(profiles/input/hog-lib.c); LGPL-2.1+(profiles/input/hog-lib.h); GPL-2+(profiles/input/hog.c); GPL-2+(profiles/input/suspend-dummy.c); GPL-2+(profiles/input/uhid_copy.h); GPL-2+(profiles/sap/* ); GPL-2+(profiles/sap/sap-dummy.c); GPL-2(profiles/sap/sap-u8500.c); GPL-2+(profiles/sap/sap.h); GPL-2+(profiles/sap/server.c); GPL-2+(profiles/sap/server.h); GPL-2+(profiles/scanparam/* ); LGPL-2.1+(profiles/scanparam/scpp.h); GPL-2+(profiles/thermometer/* ); GPL-2+(profiles/time/* ); GPL-2+(src/* ); GPL-2+(src/adapter.c); GPL-2+(src/advertising.c); GPL-2+(src/dbus-common.c); GPL-2+(src/error.c); GPL-2+(src/hcid.h); GPL-2+(src/profile.c); GPL-2+(src/sdpd-database.c); GPL-2+(src/service.c); LGPL-2.1+(src/shared/* ); LGPL-2.1+(src/shared/ad.c); BSD-2-clause(src/shared/ecc.c); LGPL-2.1+(src/shared/hci-crypto.c); LGPL-2.1+(src/shared/mainloop.c); GPL-2+(test/* ); GPL-2+(tools/amptest.c); GPL-2+(tools/avinfo.c); GPL-2+(tools/bccmd.c); GPL-2+(tools/bneptest.c); GPL-2+(tools/btgatt-client.c); GPL-2+(tools/gatt-service.c); GPL-2+(tools/hciattach.c); GPL-2+(tools/hciattach_ath3k.c); GPL-2+(tools/hciattach_qualcomm.c); GPL-2+(tools/hciattach_ti.c); GPL-2+(tools/hcidump.c); GPL-2+(tools/hid2hci.c); GPL-2(tools/obex-client-tool.c); GPL-2+(tools/parser/* ); GPL-2+(tools/parser/amp.c); GPL-2+(tools/parser/att.c); GPL-2+(tools/parser/bnep.c); GPL-2+(tools/parser/hci.c); GPL-2+(tools/parser/rfcomm.c); GPL-2+(tools/parser/sap.c); GPL-2+(tools/parser/sdp.c); GPL-2+(tools/sdptool.c); LGPL-2.1+(tools/test-runner.c); Expat(tools/ubcsp.c); GPL-2+(unit/test-crc.c); BSD-2-clause(unit/test-ecc.c); GPL-2+(unit/test-gattrib.c); GPL-2+(unit/test-lib.c); GPL-2+(unit/test-textfile.c); GPL-2(unit/util.c); GPL-2+(debian/* ); Apache-2.0(debian/* ); BSD-2-clause(debian/* ); Expat(debian/* ); GPL-2(debian/* ); GPL-2+(debian/* ); LGPL-2.1+(debian/* ) | +| {{}} | 5.50-1.2~deb10u3 | GPL-2+(* ); LGPL-2.1+(android/* ); Apache-2.0(android/audio_utils/* ); GPL-2+(android/avctp.c); GPL-2+(android/avctp.h); GPL-2+(android/avdtptest.c); Apache-2.0(android/bluetoothd-wrapper.c); Apache-2.0(android/client/* ); GPL-2+(android/compat/* ); LGPL-2.1+(android/compat/wordexp.h); Apache-2.0(android/hal-audio-aptx.c); Apache-2.0(android/hardware/* ); LGPL-2.1+(android/health.c); GPL-2+(android/log.c); Apache-2.0(android/system/* ); GPL-2+(attrib/* ); GPL-2+(attrib/att-database.h); GPL-2+(attrib/gatttool.h); GPL-2+(btio/* ); LGPL-2.1+(emulator/* ); GPL-2+(emulator/b1ee.c); LGPL-2.1+(emulator/hciemu.c); LGPL-2.1+(emulator/smp.c); GPL-2+(gdbus/* ); GPL-2+(lib/* ); GPL-2+(lib/a2mp.h); GPL-2(lib/amp.h); GPL-2+(lib/bnep.h); GPL-2+(lib/cmtp.h); GPL-2+(lib/l2cap.h); GPL-2+(lib/mgmt.h); GPL-2+(lib/sdp.c); LGPL-2.1+(monitor/* ); LGPL-2.1+(monitor/a2dp.c); LGPL-2.1+(monitor/tty.h); GPL-2+(obexd/* ); GPL-2+(obexd/client/bluetooth.c); GPL-2(obexd/client/dbus.c); GPL-2+(obexd/client/map-event.c); GPL-2+(obexd/client/map.c); GPL-2+(obexd/client/pbap.c); GPL-2+(obexd/client/session.c); GPL-2+(obexd/plugins/* ); GPL-2+(obexd/plugins/filesystem.c); GPL-2+(obexd/plugins/filesystem.h); GPL-2+(obexd/plugins/irmc.c); GPL-2+(obexd/plugins/mas.c); GPL-2+(obexd/plugins/vcard.c); GPL-2+(obexd/src/manager.h); GPL-2+(obexd/src/obex-priv.h); LGPL-2.1+(peripheral/* ); GPL-2+(plugins/autopair.c); GPL-2+(plugins/external-dummy.c); GPL-2+(plugins/gatt-example.c); GPL-2+(plugins/hostname.c); GPL-2+(plugins/neard.c); GPL-2+(plugins/sixaxis.c); GPL-2+(plugins/wiimote.c); GPL-2+(profiles/* ); GPL-2+(profiles/audio/* ); LGPL-2.1+(profiles/audio/a2dp-codecs.h); GPL-2+(profiles/audio/a2dp.c); GPL-2+(profiles/audio/avctp.c); GPL-2+(profiles/audio/player.c); GPL-2+(profiles/audio/source.c); LGPL-2.1+(profiles/battery/* ); LGPL-2.1+(profiles/deviceinfo/* ); GPL-2+(profiles/deviceinfo/deviceinfo.c); GPL-2+(profiles/deviceinfo/dis.c); GPL-2+(profiles/gap/* ); GPL-2+(profiles/health/* ); GPL-2+(profiles/health/mcap.c); GPL-2+(profiles/input/device.c); GPL-2+(profiles/input/hog-lib.c); LGPL-2.1+(profiles/input/hog-lib.h); GPL-2+(profiles/input/hog.c); GPL-2+(profiles/input/suspend-dummy.c); GPL-2+(profiles/input/uhid_copy.h); GPL-2+(profiles/sap/* ); GPL-2+(profiles/sap/sap-dummy.c); GPL-2(profiles/sap/sap-u8500.c); GPL-2+(profiles/sap/sap.h); GPL-2+(profiles/sap/server.c); GPL-2+(profiles/sap/server.h); GPL-2+(profiles/scanparam/* ); LGPL-2.1+(profiles/scanparam/scpp.h); GPL-2+(profiles/thermometer/* ); GPL-2+(profiles/time/* ); GPL-2+(src/* ); GPL-2+(src/adapter.c); GPL-2+(src/advertising.c); GPL-2+(src/dbus-common.c); GPL-2+(src/error.c); GPL-2+(src/hcid.h); GPL-2+(src/profile.c); GPL-2+(src/sdpd-database.c); GPL-2+(src/service.c); LGPL-2.1+(src/shared/* ); LGPL-2.1+(src/shared/ad.c); BSD-2-clause(src/shared/ecc.c); LGPL-2.1+(src/shared/hci-crypto.c); LGPL-2.1+(src/shared/mainloop.c); GPL-2+(test/* ); GPL-2+(tools/amptest.c); GPL-2+(tools/avinfo.c); GPL-2+(tools/bccmd.c); GPL-2+(tools/bneptest.c); GPL-2+(tools/btgatt-client.c); GPL-2+(tools/gatt-service.c); GPL-2+(tools/hciattach.c); GPL-2+(tools/hciattach_ath3k.c); GPL-2+(tools/hciattach_qualcomm.c); GPL-2+(tools/hciattach_ti.c); GPL-2+(tools/hcidump.c); GPL-2+(tools/hid2hci.c); GPL-2(tools/obex-client-tool.c); GPL-2+(tools/parser/* ); GPL-2+(tools/parser/amp.c); GPL-2+(tools/parser/att.c); GPL-2+(tools/parser/bnep.c); GPL-2+(tools/parser/hci.c); GPL-2+(tools/parser/rfcomm.c); GPL-2+(tools/parser/sap.c); GPL-2+(tools/parser/sdp.c); GPL-2+(tools/sdptool.c); LGPL-2.1+(tools/test-runner.c); Expat(tools/ubcsp.c); GPL-2+(unit/test-crc.c); BSD-2-clause(unit/test-ecc.c); GPL-2+(unit/test-gattrib.c); GPL-2+(unit/test-lib.c); GPL-2+(unit/test-textfile.c); GPL-2(unit/util.c); GPL-2+(debian/* ); Apache-2.0(debian/* ); BSD-2-clause(debian/* ); Expat(debian/* ); GPL-2(debian/* ); GPL-2+(debian/* ); LGPL-2.1+(debian/* ) | | {{}} | 1.67.0-13+deb10u1 | BSL-1.0(* ); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); Zlib(Files:); boehm_gc(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0 and SGI(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0 and OldBoost1(Files:); BSL-1.0 and OldBoost1(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0 and SGI(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0 and OldBoost1(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0 and Perforce(Files:); BSL-1.0 and Perforce(Files:); BSL-1.0 and Perforce(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); OldBoost2(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); OldBoost1(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); Perforce(Files:); BSL-1.0 and Perforce(Files:); BSL-1.0 and Perforce(Files:); BSL-1.0 and Perforce(Files:); BSL-1.0 and Perforce(Files:); BSL-1.0(Files:); BSL-1.0 and Perforce(Files:); BSL-1.0 and Perforce(Files:); Perforce(Files:); Perforce(Files:); Perforce(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0 and SGI(Files:); BSL-1.0(Files:); BSL-1.0 and SGI(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0 and OldBoost4(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); OldBoost1(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0 and SGI(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); OldBoost1(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); OldBoost2(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0 and SGI(Files:); BSL-1.0(Files:); BSL-1.0 and SGI(Files:); BSL-1.0 and SGI(Files:); SGI(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); OldBoost1(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0 and OldBoost1(Files:); BSL-1.0 and SGI(Files:); BSL-1.0(Files:); BSL-1.0 and SGI(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); OldBoost1(Files:); SGI(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); OldBoost3 and SGI(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); OldBoost1(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); PSF(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0 and SGI(Files:); OldBoost1(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); OldBoost1(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); Perforce(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSDRegex(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); OldBoost1(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSL-1.0(Files:); BSDRegex(Files:); BSL-1.0(Files:); OldBoost1(Files:); OldBoost2(Files:); OldBoost3(Files:); OldBoost4(Files:); Perforce(Files:); PSF(Files:); SGI(Files:) | | {{}} | 1.67.0.1 | BSD | | {{}} | 5.6-10+deb10u1 | LGPL-2 | @@ -422,10 +425,10 @@ pdfhidden: True | {{}} | 2.28-10+deb10u1 | BSD; GPL; GPL-2; ISC; LGPL-2 | | {{}} | 2.28-10+deb10u1 | BSD; GPL; GPL-2; ISC; LGPL-2 | | {{}} | 2.28-10+deb10u1 | BSD; GPL; GPL-2; ISC; LGPL-2 | -| {{}} | 2.28-10+deb10u1 | BSD; GPL; GPL-2; ISC; LGPL-2 | -| {{}} | 2.28-10+deb10u1 | BSD; GPL; GPL-2; ISC; LGPL-2 | -| {{}} | 2.28-10+deb10u1 | BSD; GPL; GPL-2; ISC; LGPL-2 | -| {{}} | 2.28-10+deb10u1 | BSD; GPL; GPL-2; ISC; LGPL-2 | +| {{}} | 2.28-10+deb10u2 | BSD; GPL; GPL-2; ISC; LGPL-2 | +| {{}} | 2.28-10+deb10u2 | BSD; GPL; GPL-2; ISC; LGPL-2 | +| {{}} | 2.28-10+deb10u2 | BSD; GPL; GPL-2; ISC; LGPL-2 | +| {{}} | 2.28-10+deb10u2 | BSD; GPL; GPL-2; ISC; LGPL-2 | | {{}} | 0.99.beta19-2.1 | LGPL | | {{}} | 0.99.beta19-2.1 | LGPL | | {{}} | 2.6.1-1 | LGPL-2.1+( * ); auto-permissive( m4/* ); GPL-3.0+ with autoconf exception( m4/ax_append_compile_flags.m4); GPL-2.0+( src/glib-compat.h); LGPL-2.1+( m4/ax_code_coverage.m4); GPL-2+(debian/* ); LGPL-2.1+(debian/* ) | @@ -437,9 +440,10 @@ pdfhidden: True | {{}} | 0.7.9-2 | GPL; GPL-2; GPL-3; LGPL-2 | | {{}} | 4.0.1+really+3.0.5-1 | BSD-3-clause(* ); BSD_LLVM(arch/AArch64/AArch64BaseInfo.c); GPL-2+(debian/* ); BSD-3-clause(debian/* ); BSD_LLVM(debian/* ) | | {{}} | 0.48-1 | Apache-2.0(* ); Apache-2.0 or Artistic or GPL-1+(debian/* ); Apache-2.0(debian/* ); Artistic(debian/* ); GPL-1+(debian/* ) | -| {{}} | 1.14.0-1+deb10u1 | GPL; MIT | -| {{}} | 1.14.0-1+deb10u1 | GPL; MIT | +| {{}} | 1.14.0-1+deb10u4 | GPL; MIT | +| {{}} | 1.14.0-1+deb10u4 | GPL; MIT | | {{}} | 2.28-10+deb10u1 | BSD; GPL; GPL-2; ISC; LGPL-2 | +| {{}} | 0.5.0+dfsg-2 | Expat(* ); Expat(src/cbor/internal/unicode.c); Apache-2.0(docs/stylesheets/github-light.css); Expat(debian/* ); Expat(debian/* ) | | {{}} | 8.3.0-6 | NO COPYRIGHT FILE | | {{}} | 1.4.30-1 | LGPL-2 | | {{}} | 2.28-10+deb10u1 | BSD; GPL; GPL-2; ISC; LGPL-2 | @@ -463,10 +467,13 @@ pdfhidden: True | {{}} | 2.9.6-2 | LGPL-2.1(* ); LGPL-2.1(debian/* ); LGPL-2.1(debian/* ) | | {{}} | 0.6.12-3 | LGPL | | {{}} | 2.1.0-5+deb10u2 | GPL-2+ with OpenSSL exception(* ); GPL-2+(debian/* ); GPL-2+(debian/askpass.c debian/scripts/passdev.c); GPL-2+(debian/initramfs/cryptroot-unlock); GPL-2+(debian/README.opensc); GPL-2+(debian/scripts/cryptdisks_start); GPL-2+(debian/scripts/luksformat); GPL-2+(debian/scripts/decrypt_gnupg-sc debian/README.gnupg-sc debian/initramfs/hooks/cryptgnupg-sc debian/initramfs/scripts/local-bottom/cryptgnupg-sc); LGPL-2.1+(docs/examples/* ); GPL-2+(lib/base64.c); LGPL-2.1+(lib/crypto_backend/* lib/loopaes/* lib/tcrypt/* lib/verity/* ); LGPL-2.1+ with OpenSSL exception(lib/crypto_backend/crypto_openssl.c); CC0 or Apache-2.0(lib/crypto_backend/argon2/* ); CC0 or Apache-2.0(lib/crypto_backend/argon2/encoding.c); public-domain(lib/crypto_backend/crc32.c); GPL-2+(lib/crypto_backend/crc32.c); GPL-2+ with OpenSSL exception(lib/crypto_backend/crc32.c); LGPL-2.1+(lib/crypto_backend/crc32.c); LGPL-2.1+ with OpenSSL exception(lib/crypto_backend/crc32.c); CC0(lib/crypto_backend/crc32.c); Apache-2.0(lib/crypto_backend/crc32.c) | -| {{}} | 2.2.10-6+deb10u6 | GPL-2.0 with AOSDL exception(* ); LGPL-2.0 with AOSDL exception(cups/* filter/* ); Zlib(cups/md5-private.h); BSD-2-clause(scheduler/colorman.c); GPL-2.0 with AOSDL exception(scheduler/colorman.c); LGPL-2.0 with AOSDL exception(scheduler/colorman.c); Zlib(scheduler/colorman.c) | -| {{}} | 2.2.10-6+deb10u6 | GPL-2.0 with AOSDL exception(* ); LGPL-2.0 with AOSDL exception(cups/* filter/* ); Zlib(cups/md5-private.h); BSD-2-clause(scheduler/colorman.c); GPL-2.0 with AOSDL exception(scheduler/colorman.c); LGPL-2.0 with AOSDL exception(scheduler/colorman.c); Zlib(scheduler/colorman.c) | -| {{}} | 7.64.0-4+deb10u2 | curl(* ); curl(lib/vtls/darwinssl.* ); curl(lib/curl_rtmp.* ); curl(lib/vtls/schannel.* ); ISC(lib/inet_pton.c); BSD-3-Clause(lib/krb5.c); public-domain(lib/md4.c); curl(lib/openldap.* ); curl(lib/vtls/polarssl.* ); curl(lib/socks_gssapi.c); curl(tests/certs/scripts/genroot.sh); BSD-4-Clause(tests/server/tftpd.c); curl(tests/server/fake_ntlm.c); BSD-3-Clause(docs/examples/fopen.c); BSD-3-Clause(docs/examples/rtsp.c); curl(docs/examples/curlgtk.c); other(docs/examples/curlx.c); other(src/macos/src/macos_main.cpp); curl(debian/* ); curl(debian/* ); BSD-3-Clause(debian/* ); BSD-4-Clause(debian/* ); ISC(debian/* ) | -| {{}} | 7.64.0-4+deb10u2 | curl(* ); curl(lib/vtls/darwinssl.* ); curl(lib/curl_rtmp.* ); curl(lib/vtls/schannel.* ); ISC(lib/inet_pton.c); BSD-3-Clause(lib/krb5.c); public-domain(lib/md4.c); curl(lib/openldap.* ); curl(lib/vtls/polarssl.* ); curl(lib/socks_gssapi.c); curl(tests/certs/scripts/genroot.sh); BSD-4-Clause(tests/server/tftpd.c); curl(tests/server/fake_ntlm.c); BSD-3-Clause(docs/examples/fopen.c); BSD-3-Clause(docs/examples/rtsp.c); curl(docs/examples/curlgtk.c); other(docs/examples/curlx.c); other(src/macos/src/macos_main.cpp); curl(debian/* ); curl(debian/* ); BSD-3-Clause(debian/* ); BSD-4-Clause(debian/* ); ISC(debian/* ) | +| {{}} | 2.2.10-6+deb10u8 | GPL-2.0 with AOSDL exception(* ); LGPL-2.0 with AOSDL exception(cups/* filter/* ); Zlib(cups/md5-private.h); BSD-2-clause(scheduler/colorman.c); GPL-2.0 with AOSDL exception(scheduler/colorman.c); LGPL-2.0 with AOSDL exception(scheduler/colorman.c); Zlib(scheduler/colorman.c) | +| {{}} | 2.2.10-6+deb10u8 | GPL-2.0 with AOSDL exception(* ); LGPL-2.0 with AOSDL exception(cups/* filter/* ); Zlib(cups/md5-private.h); BSD-2-clause(scheduler/colorman.c); GPL-2.0 with AOSDL exception(scheduler/colorman.c); LGPL-2.0 with AOSDL exception(scheduler/colorman.c); Zlib(scheduler/colorman.c) | +| {{}} | 7.64.0-4+deb10u7 | curl(* ); curl(lib/vtls/darwinssl.* ); curl(lib/curl_rtmp.* ); curl(lib/vtls/schannel.* ); ISC(lib/inet_pton.c); BSD-3-Clause(lib/krb5.c); public-domain(lib/md4.c); curl(lib/openldap.* ); curl(lib/vtls/polarssl.* ); curl(lib/socks_gssapi.c); curl(tests/certs/scripts/genroot.sh); BSD-4-Clause(tests/server/tftpd.c); curl(tests/server/fake_ntlm.c); BSD-3-Clause(docs/examples/fopen.c); BSD-3-Clause(docs/examples/rtsp.c); curl(docs/examples/curlgtk.c); other(docs/examples/curlx.c); other(src/macos/src/macos_main.cpp); curl(debian/* ); curl(debian/* ); BSD-3-Clause(debian/* ); BSD-4-Clause(debian/* ); ISC(debian/* ) | +| {{}} | 7.64.0-4+deb10u6 | curl(* ); curl(lib/vtls/darwinssl.* ); curl(lib/curl_rtmp.* ); curl(lib/vtls/schannel.* ); ISC(lib/inet_pton.c); BSD-3-Clause(lib/krb5.c); public-domain(lib/md4.c); curl(lib/openldap.* ); curl(lib/vtls/polarssl.* ); curl(lib/socks_gssapi.c); curl(tests/certs/scripts/genroot.sh); BSD-4-Clause(tests/server/tftpd.c); curl(tests/server/fake_ntlm.c); BSD-3-Clause(docs/examples/fopen.c); BSD-3-Clause(docs/examples/rtsp.c); curl(docs/examples/curlgtk.c); other(docs/examples/curlx.c); other(src/macos/src/macos_main.cpp); curl(debian/* ); curl(debian/* ); BSD-3-Clause(debian/* ); BSD-4-Clause(debian/* ); ISC(debian/* ) | +| {{}} | 7.64.0-4+deb10u6 | NO COPYRIGHT FILE | +| {{}} | 7.64.0-4+deb10u7 | curl(* ); curl(lib/vtls/darwinssl.* ); curl(lib/curl_rtmp.* ); curl(lib/vtls/schannel.* ); ISC(lib/inet_pton.c); BSD-3-Clause(lib/krb5.c); public-domain(lib/md4.c); curl(lib/openldap.* ); curl(lib/vtls/polarssl.* ); curl(lib/socks_gssapi.c); curl(tests/certs/scripts/genroot.sh); BSD-4-Clause(tests/server/tftpd.c); curl(tests/server/fake_ntlm.c); BSD-3-Clause(docs/examples/fopen.c); BSD-3-Clause(docs/examples/rtsp.c); curl(docs/examples/curlgtk.c); other(docs/examples/curlx.c); other(src/macos/src/macos_main.cpp); curl(debian/* ); curl(debian/* ); BSD-3-Clause(debian/* ); BSD-4-Clause(debian/* ); ISC(debian/* ) | +| {{}} | 7.64.0-4+deb10u6 | curl(* ); curl(lib/vtls/darwinssl.* ); curl(lib/curl_rtmp.* ); curl(lib/vtls/schannel.* ); ISC(lib/inet_pton.c); BSD-3-Clause(lib/krb5.c); public-domain(lib/md4.c); curl(lib/openldap.* ); curl(lib/vtls/polarssl.* ); curl(lib/socks_gssapi.c); curl(tests/certs/scripts/genroot.sh); BSD-4-Clause(tests/server/tftpd.c); curl(tests/server/fake_ntlm.c); BSD-3-Clause(docs/examples/fopen.c); BSD-3-Clause(docs/examples/rtsp.c); curl(docs/examples/curlgtk.c); other(docs/examples/curlx.c); other(src/macos/src/macos_main.cpp); curl(debian/* ); curl(debian/* ); BSD-3-Clause(debian/* ); BSD-4-Clause(debian/* ); ISC(debian/* ) | | {{}} | 4.2.0-2 | MPL-2.0(* ); BSD-3-clause(src/foreign/sha1/* ); Beerware(src/foreign/slre/* ); MPL-2.0(debian/* ); BSD-3-clause(debian/* ); Beerware(debian/* ); MPL-2.0(debian/* ) | | {{}} | 4.2.0-2 | MPL-2.0(* ); BSD-3-clause(src/foreign/sha1/* ); Beerware(src/foreign/slre/* ); MPL-2.0(debian/* ); BSD-3-clause(debian/* ); Beerware(debian/* ); MPL-2.0(debian/* ) | | {{}} | 0.14-7 | GPL; GPL-2; LGPL | @@ -474,8 +481,8 @@ pdfhidden: True | {{}} | 5.3.28+dfsg1-0.5 | BSD | | {{}} | 1.62-3 | Artistic or GPL-1+(* ); public-domain(dbdimp.* sqlite3* ); public-domain(fts3_tokenizer.h); Artistic or GPL-1+(ppport.h); Artistic or GPL-1+(inc/Test/NoWarnings.pm); Artistic or GPL-1+(lib/DBD/SQLite/Fulltext_search.pod); Artistic or GPL-1+(debian/* ); Artistic(debian/* ); GPL-1+(debian/* ) | | {{}} | 1.642-1+deb10u2 | Artistic or GPL-1+(* ); Artistic or GPL-1+(Driver.xst); Artistic or GPL-1+(dbd_xsh.h); Artistic or GPL-1+(dbipport.h); Artistic or GPL-1+(dbiprof.PL); Artistic or GPL-1+(dbiproxy.PL); Artistic or GPL-1+(lib/DBI/DBD.pm); Artistic or GPL-1+(lib/DBD/DBM.pm); Artistic or GPL-1+(lib/DBD/Mem.pm); Artistic or GPL-1+(lib/DBI/SQL/Nano.pm); Artistic or GPL-1+(lib/DBI/ProfileData.pm); Artistic or GPL-1+(lib/DBI/DBD/Metadata.pm); Artistic or GPL-1+(lib/DBI/DBD/SqlEngine.pm); Artistic or GPL-1+(lib/DBD/File.pm); Artistic or GPL-1+(lib/DBD/Proxy.pm); Artistic or GPL-1+(lib/DBD/File/HowTo.pod); Artistic or GPL-1+(lib/DBI/DBD/SqlEngine/Developers.pod); Artistic or GPL-1+(debian/* ); Artistic(debian/* ); GPL-1+(debian/* ) | -| {{}} | 1.12.20-0+deb10u1 | GPL-2+ or AFL-2.1(* ); GPL-2+(Files:); Expat(Files:); BSD-3-clause(tools/strto* ll.c); BSD-3-clause-generic(Files:); GPL-2+ or AFL-2.1 | -| {{}} | 1.12.20-0+deb10u1 | GPL-2+ or AFL-2.1(* ); GPL-2+(Files:); Expat(Files:); BSD-3-clause(tools/strto* ll.c); BSD-3-clause-generic(Files:); GPL-2+ or AFL-2.1 | +| {{}} | 1.12.24-0+deb10u1 | GPL-2+ or AFL-2.1(* ); GPL-2+(Files:); Expat(Files:); BSD-3-clause(tools/strto* ll.c); BSD-3-clause-generic(Files:); GPL-2+ or AFL-2.1 | +| {{}} | 1.12.24-0+deb10u1 | GPL-2+ or AFL-2.1(* ); GPL-2+(Files:); Expat(Files:); BSD-3-clause(tools/strto* ll.c); BSD-3-clause-generic(Files:); GPL-2+ or AFL-2.1 | | {{}} | 0.249 | public domain | | {{}} | 0.249 | public domain | | {{}} | 0.008-1 | Artistic or GPL-1+(* ); GPL-3+(debian/* ); Artistic(debian/* ); GPL-1+(debian/* ); GPL-3+(debian/* ) | @@ -488,8 +495,8 @@ pdfhidden: True | {{}} | 2.1.2-8 | GPL | | {{}} | 2.65+b1 | LGPL | | {{}} | 2.65+b1 | LGPL | -| {{}} | 9.11.5.P4+dfsg-5.1+deb10u7 | ISC and BSD-2-clause and BSD-3-clause and BSD-4-clause(* ); MPL-2.0 or ISC(bin/tests/system/chain/); BSD-2-clause(unit/atf-src/); BSD-4-clause(contrib/idn/); ISC or MPL-2.0(debian/); ISC(debian/); BSD-2-clause(debian/); BSD-3-clause(debian/); BSD-4-clause(debian/); MPL-2.0(debian/) | -| {{}} | 9.11.5.P4+dfsg-5.1+deb10u7 | ISC and BSD-2-clause and BSD-3-clause and BSD-4-clause(* ); MPL-2.0 or ISC(bin/tests/system/chain/); BSD-2-clause(unit/atf-src/); BSD-4-clause(contrib/idn/); ISC or MPL-2.0(debian/); ISC(debian/); BSD-2-clause(debian/); BSD-3-clause(debian/); BSD-4-clause(debian/); MPL-2.0(debian/) | +| {{}} | 9.11.5.P4+dfsg-5.1+deb10u9 | ISC and BSD-2-clause and BSD-3-clause and BSD-4-clause(* ); MPL-2.0 or ISC(bin/tests/system/chain/); BSD-2-clause(unit/atf-src/); BSD-4-clause(contrib/idn/); ISC or MPL-2.0(debian/); ISC(debian/); BSD-2-clause(debian/); BSD-3-clause(debian/); BSD-4-clause(debian/); MPL-2.0(debian/) | +| {{}} | 9.11.5.P4+dfsg-5.1+deb10u9 | ISC and BSD-2-clause and BSD-3-clause and BSD-4-clause(* ); MPL-2.0 or ISC(bin/tests/system/chain/); BSD-2-clause(unit/atf-src/); BSD-4-clause(contrib/idn/); ISC or MPL-2.0(debian/); ISC(debian/); BSD-2-clause(debian/); BSD-3-clause(debian/); BSD-4-clause(debian/); MPL-2.0(debian/) | | {{}} | 1.19.8 | GPL-2+(* ); GPL-2+(Files:); GPL-2(Files:); BSD-2-clause(Files:); public-domain-s-s-d(Files:); public-domain-md5(lib/compat/md5.* ); GPL-2+(lib/compat/md5.* ); GPL-2(lib/compat/md5.* ); BSD-2-clause(lib/compat/md5.* ) | | {{}} | 2.4.97-1 | BSD | | {{}} | 2.4.97-1 | BSD | @@ -502,8 +509,8 @@ pdfhidden: True | {{}} | 2.4.97-1 | BSD | | {{}} | 2.4.97-1 | BSD | | {{}} | 1.12-8 | BSD | -| {{}} | 0.176-1.1 | GPL; GPL-2; GPL-3; LGPL- | -| {{}} | 0.176-1.1 | GPL; GPL-2; GPL-3; LGPL- | +| {{}} | 0.176-1.1+deb10u1 | GPL; GPL-2; GPL-3; LGPL- | +| {{}} | 0.176-1.1+deb10u1 | GPL; GPL-2; GPL-3; LGPL- | | {{}} | 0.003-1 | Artistic or GPL-1+(* ); GPL-3+(debian/* ); Artistic(debian/* ); GPL-1+(debian/* ); GPL-3+(debian/* ) | | {{}} | 105-7 | GPL-3+(* ); GPL-3+(debian/* ); GPL-3+(debian/* ) | | {{}} | 3.1-20181209-1 | BSD-3-clause(Files:) | @@ -514,8 +521,8 @@ pdfhidden: True | {{}} | 37-2+deb10u1 | LGPL-2.0+(* ); GPL-2.0+(debian/* ); LGPL-2.0+(debian/* ); GPL-2.0+(debian/* ) | | {{}} | 1.1.0-1 | MIT(* ); MIT(include/c99_compat.h); MIT(include/glvnd_list.h); MIT(Files: include/KHR/khrplatform.h); MIT(Files: include/compiler.h); MIT(Files: include/GL/glx.h); public-domain(m4/ax_check_enable_debug.m4); GPL-3+(m4/ax_check_link_flag.m4); GPL-3+(m4/ax_pthread.m4); MIT(Files: src/generate/gen_gldispatch_mapi.py); MIT(Files: src/GLdispatch/vnd-glapi/entry.h); MIT(Files: src/GLdispatch/vnd-glapi/u_current_tsd.c); MIT(Files: src/GLdispatch/vnd-glapi/mapi_glapi.c); MIT(Files: src/util/cJSON* ); BSD-1-clause(Files: src/util/uthash/* ); MIT(debian/* ); MIT(debian/* ); BSD-1-clause(debian/* ); GPL-3+(debian/* ) | | {{}} | 18.3.6-2+deb10u1 | MIT(* ); BSD-3-clause(include/EGL/eglextchromium.h:); Khronos(include/GL/glcorearb.h); Apache-2.0(include/GLES/egl.h); BSL(include/c11/* ); MLAA(src/gallium/auxiliary/postprocess/pp_mlaa* ); SGI(src/glx/clientattrib.c); BSD-2-clause(src/getopt); BSD-3-clause(src/gtest/include src/gtest/src); GPL(debian); MIT(debian); Khronos(debian); SGI(debian); Apache-2.0(debian); BSL(debian); MLAA(debian); GPL(debian); BSD-3-clause(debian); BSD-2-clause(debian) | -| {{}} | 0.176-1.1 | GPL; GPL-2; GPL-3; LGPL- | -| {{}} | 0.176-1.1 | GPL; GPL-2; GPL-3; LGPL- | +| {{}} | 0.176-1.1+deb10u1 | GPL; GPL-2; GPL-3; LGPL- | +| {{}} | 0.176-1.1+deb10u1 | GPL; GPL-2; GPL-3; LGPL- | | {{}} | 1.202-1 | Artistic or GPL-1+(* ); Artistic or GPL-1+(debian/* ); Artistic(debian/* ); GPL-1+(debian/* ) | | {{}} | 1.05-1 | Artistic or GPL-1+(* ); Artistic or GPL-1+(debian/* ); Artistic(debian/* ); GPL-1+(debian/* ) | | {{}} | 1.5.3-0.1 | Expat(* ); Expat(registry/* ); Expat(registry/* ) | @@ -527,30 +534,31 @@ pdfhidden: True | {{}} | 2.1.8-stable-4 | BSD | | {{}} | 2.1.8-stable-4 | BSD | | {{}} | 2.1.8-stable-4 | BSD | -| {{}} | 2.2.6-2+deb10u4 | MIT(* ); MIT(debian/* ); MIT(debian/* ) | -| {{}} | 2.2.6-2+deb10u4 | MIT(* ); MIT(debian/* ); MIT(debian/* ) | +| {{}} | 2.2.6-2+deb10u6 | MIT(* ); MIT(debian/* ); MIT(debian/* ) | +| {{}} | 2.2.6-2+deb10u6 | MIT(* ); MIT(debian/* ); MIT(debian/* ) | | {{}} | 1.002001-1 | Artistic or GPL-1+(* ); License:(* ); GPL-3+(debian/* ); Artistic(debian/* ); GPL-1+(debian/* ); GPL-3+(debian/* ) | | {{}} | 1.44.5-1+deb10u3 | BSD; GPL; GPL-2; LGPL-2; MIT | | {{}} | 1.44.5-1+deb10u3 | BSD; GPL; GPL-2; LGPL-2; MIT | | {{}} | 1.23-1 | Artistic; GPL; GPL-3 | -| {{}} | 0.99.8-2 | Expat(* ); Apache-2.0(atomic.h); Expat(atomic.h); Apache-2.0(atomic.h) | +| {{}} | 0.99.8-2+deb10u1 | Expat(* ); Apache-2.0(atomic.h); Expat(atomic.h); Apache-2.0(atomic.h) | | {{}} | 2.33.1-0.1 | GPL-2+(* ); GPL-2(schedutils/ionice.c); GPL-2(schedutils/chrt.c); GPL-2(disk-utils/raw.c); GPL-2(sys-utils/nsenter.c); GPL-2(disk-utils/mkfs.minix.c); public-domain(lib/at.c); BSD-4-clause(login-utils/vipw.c); MIT(text-utils/tailf.c); MIT(sys-utils/flock.c); BSD-2-clause(text-utils/pg.c); BSD-2-clause(login-utils/last-deprecated.c); BSD-2-clause(login-utils/login.c); BSD-3-clause(login-utils/logindefs.c); BSD-3-clause(libuuid/* ); LGPL-2+(lib/procutils.c); LGPL-2+(* /colors.* ); LGPL-2+(login-utils/setpwnam.h); LGPL-2.1+(libfdisk/* ); LGPL-2.1+(lib/cpuset.c); LGPL-2.1+(* /mbsalign.* ); GPL-3+(* /readutmp.* ); LGPL-2.1+(* /timeutils.* ); LGPL(include/list.h); LGPL-2.1+(libblkid/* ); LGPL(include/cpuset.h); LGPL(misc-utils/blkid.c); LGPL-2.1+(libmount/* ); LGPL-3+(libmount/python/* ); LGPL(libsmartcols/* ); GPL-2+(debian/* ); public-domain(debian/* ); GPL-2(debian/* ); GPL-2+(debian/* ); GPL-3+(debian/* ); BSD-2-clause(debian/* ); BSD-3-clause(debian/* ); BSD-4-clause(debian/* ); LGPL(debian/* ); LGPL-2+(debian/* ); LGPL-2.1+(debian/* ); LGPL-3+(debian/* ); MIT(debian/* ) | | {{}} | 1.4.7-4 | GPL-2+(* ); GPL-2+(debian/* ); GPL-2+ or BSD-2-clause(libfdt/* ); LGPL-2.1+(tests/* ); GPL-2+(tests/dumptrees.c); GPL-2+(tests/dumptrees.c); LGPL-2.1+(tests/dumptrees.c); BSD-2-clause(tests/dumptrees.c) | | {{}} | 3.2.1-9 | GPL | | {{}} | 3.2.1-9 | NO COPYRIGHT FILE | +| {{}} | 1.5.0-2~bpo10+1 | BSD-2-clause(* ); BSD-2-clause(debian/* ); ISC(openbsd-compat/strlcpy.c openbsd-compat/strlcat.c); ISC(openbsd-compat/timingsafe_bcmp.c); public-domain(Files:); ISC(openbsd-compat/recallocarray.c); ISC(openbsd-compat/readpassphrase.h); ISC(openbsd-compat/readpassphrase.c); BSD-2-clause(openbsd-compat/getopt.h); ISC and BSD-2-clause(openbsd-compat/getopt_long.c); BSD-2-clause(openbsd-compat/getopt_long.c); public-domain(openbsd-compat/getopt_long.c); ISC(openbsd-compat/getopt_long.c) | | {{}} | 0.02-2+b6 | Artistic or GPL-1+(* ); Artistic or GPL-1+(ppport.h); Artistic or GPL-1+(debian/* ); Artistic(debian/* ); GPL-1+(debian/* ) | | {{}} | 1.004-1 | Artistic or GPL-1+(* ); Artistic or GPL-1+(debian/* ); Artistic(debian/* ); GPL-1+(debian/* ) | | {{}} | 6.04-1 | Artistic; GPL; GPL-1; GPL-1+ | | {{}} | 1.1.2-1 | GPL-3+(* ); GPL-3+(* ) | | {{}} | 1.23-1 | GPL-1+ or Artistic(* ); GPL-1+ or Artistic(debian/* ); Artistic(debian/* ); GPL-1+(debian/* ) | | {{}} | 2.6.4-6.2 | FLEX(* ); GPL-3+(debian/* ); FLEX(m4/* ); FSFAP(m4/ax_prog_cc_for_build.m4); GPL(m4/libtool.m4); FLEX(m4/ltoptions.m4); FLEX(m4/nls.m4); GPL(po/Makefile.in.in); FLEX(po/Makevars); FLEX(src/* ); FLEX(src/Makefile.am); LGPL-2+(src/gettext.h); GPL-3+(src/parse.c); GPL-2+(tools/git2cl); GPL-3+(tools/git2cl) | -| {{}} | 1.3.2-3+deb10u1 | GPL-2+ or LGPL-2.1+(* ); GFDL-1.1+(doc/* ); GPL-2+(examples/* ); BSD-3-clause(include/FLAC++/* ); LGPL-2.1+(include/share/grabbag.h); LGPL-2+(include/share/getopt.h); Public-domain(src/libFLAC/include/private/md5.h); ISC(src/flac/local_string_utils.c); GPL-2+(debian/* ); GPL-2+(debian/* ); LGPL-2.1+(debian/* ) | +| {{}} | 1.3.2-3+deb10u2 | GPL-2+ or LGPL-2.1+(* ); GFDL-1.1+(doc/* ); GPL-2+(examples/* ); BSD-3-clause(include/FLAC++/* ); LGPL-2.1+(include/share/grabbag.h); LGPL-2+(include/share/getopt.h); Public-domain(src/libFLAC/include/private/md5.h); ISC(src/flac/local_string_utils.c); GPL-2+(debian/* ); GPL-2+(debian/* ); LGPL-2.1+(debian/* ) | | {{}} | 2.13.1-2 | BSD-like | | {{}} | 1.1.3-1+b2 | BSD | | {{}} | 1.6.3-1.1 | NO COPYRIGHT FILE | -| {{}} | 2.9.1-3+deb10u2 | GPL-2+ or FTL(* ); FTL and Catharon-OSL and MIT(vms_make.com); FTL(builds/amiga/* builds/amiga/include/config/* ); FTL(builds/amiga/src/base/* ); BSD-3-Clause(builds/cmake/FindHarfBuzz.cmake); FTL(builds/mac/ftmac.c); FTL(builds/mac/README); FSFULLR and GPL-2+(builds/unix/aclocal.m4); FSFUL and GPL-2+(builds/unix/configure); Permissive and GPL-3+(builds/unix/config.guess builds/unix/config.sub); MIT(builds/unix/install-sh); GPL-2+ and GPL-3+(builds/unix/ltmain.sh); GPL-2+(builds/unix/pkg.m4); GPL-2+(debian/* ); FTL(docs/INSTALL.CROSS); MIT or GPL-2+(ft2docs/docs/js/jquery.ba-resize.min.js); MIT(ft2docs/docs/js/jquery-1.11.0.min.js); Public-Domain(ft2docs/docs/tutorial/example2.cpp); MIT(ft2docs/docs/tutorial/example5.cpp); FTL(ft2demos/Jamfile); FTL(ft2demos/graph/beos/grbeos.cpp); FTL(ft2demos/graph/mac/grmac.c); FTL(ft2demos/graph/win32/grwin32.c ft2demos/graph/win32/grwin32.h); FTL(ft2demos/graph/graph.h); Public-Domain(ft2demos/graph/grswizzle.c); FTL(ft2demos/mac/ftoldmac.c); MIT(ft2demos/mac/getargv.c); Public-Domain(ft2demos/src/mlgetopt.c ft2demos/src/mlgetopt.h); FTL(ft2demos/src/ftinspect/* ); FTL(include/freetype/ftbzip2.h); FTL(include/freetype/ftcid.h); FTL(include/freetype/ftgxval.h); MIT(include/freetype/internal/fthash.h); FTL(include/freetype/internal/ftrfork.h); FTL(include/freetype/internal/ftpic.h); FTL(include/freetype/internal/services/svttglyf.h); FTL(src/autofit/afindic.c src/autofit/afindic.h); FTL(src/base/ftbase.h); Public-Domain(src/base/md5.c src/base/md5.h); MIT(src/bdf/bdf.c); MIT(src/bdf/bdf.h src/bdf/bdflib.c); FTL(src/gxvalid/* ); FTL(src/gxvalid/Jamfile); Zlib(src/gzip/adler32.c); Zlib(src/gzip/ftzconf.h); Zlib(src/gzip/zlib.h); FTL(src/lzw/ftlzw.c src/lzw/rules.mk); OpenGroup-BSD-like(src/pcf/pcfutil.c); FTL(src/psaux/psarrst.c src/psaux/psarrst.h); FTL(src/sfnt/pngshim.c src/sfnt/pngshim.h); FTL(src/sfnt/ttsbit.c); Public-Domain(src/tools/apinames.c src/tools/chktrcmp.py); FTL(src/tools/update-copyright-year); BSD-3-Clause(src/tools/ftrandom/ftrandom.c); FTL(src/truetype/ttgxvar.c src/truetype/ttgxvar.h); FTL(src/type42/t42drivr.c src/type42/t42drivr.h); FTL(src/winfonts/winfnt.c); FTL(src/winfonts/winfnt.h); BSD-3-Clause(src/winfonts/winfnt.h); Catharon-OSL(src/winfonts/winfnt.h); FSFUL(src/winfonts/winfnt.h); FSFULLR(src/winfonts/winfnt.h); FTL(src/winfonts/winfnt.h); GPL-2+(src/winfonts/winfnt.h); GPL-3+(src/winfonts/winfnt.h); MIT(src/winfonts/winfnt.h); OpenGroup-BSD-like(src/winfonts/winfnt.h); Permissive(src/winfonts/winfnt.h); Zlib(src/winfonts/winfnt.h) | -| {{}} | 2.9.1-3+deb10u2 | GPL-2+ or FTL(* ); FTL and Catharon-OSL and MIT(vms_make.com); FTL(builds/amiga/* builds/amiga/include/config/* ); FTL(builds/amiga/src/base/* ); BSD-3-Clause(builds/cmake/FindHarfBuzz.cmake); FTL(builds/mac/ftmac.c); FTL(builds/mac/README); FSFULLR and GPL-2+(builds/unix/aclocal.m4); FSFUL and GPL-2+(builds/unix/configure); Permissive and GPL-3+(builds/unix/config.guess builds/unix/config.sub); MIT(builds/unix/install-sh); GPL-2+ and GPL-3+(builds/unix/ltmain.sh); GPL-2+(builds/unix/pkg.m4); GPL-2+(debian/* ); FTL(docs/INSTALL.CROSS); MIT or GPL-2+(ft2docs/docs/js/jquery.ba-resize.min.js); MIT(ft2docs/docs/js/jquery-1.11.0.min.js); Public-Domain(ft2docs/docs/tutorial/example2.cpp); MIT(ft2docs/docs/tutorial/example5.cpp); FTL(ft2demos/Jamfile); FTL(ft2demos/graph/beos/grbeos.cpp); FTL(ft2demos/graph/mac/grmac.c); FTL(ft2demos/graph/win32/grwin32.c ft2demos/graph/win32/grwin32.h); FTL(ft2demos/graph/graph.h); Public-Domain(ft2demos/graph/grswizzle.c); FTL(ft2demos/mac/ftoldmac.c); MIT(ft2demos/mac/getargv.c); Public-Domain(ft2demos/src/mlgetopt.c ft2demos/src/mlgetopt.h); FTL(ft2demos/src/ftinspect/* ); FTL(include/freetype/ftbzip2.h); FTL(include/freetype/ftcid.h); FTL(include/freetype/ftgxval.h); MIT(include/freetype/internal/fthash.h); FTL(include/freetype/internal/ftrfork.h); FTL(include/freetype/internal/ftpic.h); FTL(include/freetype/internal/services/svttglyf.h); FTL(src/autofit/afindic.c src/autofit/afindic.h); FTL(src/base/ftbase.h); Public-Domain(src/base/md5.c src/base/md5.h); MIT(src/bdf/bdf.c); MIT(src/bdf/bdf.h src/bdf/bdflib.c); FTL(src/gxvalid/* ); FTL(src/gxvalid/Jamfile); Zlib(src/gzip/adler32.c); Zlib(src/gzip/ftzconf.h); Zlib(src/gzip/zlib.h); FTL(src/lzw/ftlzw.c src/lzw/rules.mk); OpenGroup-BSD-like(src/pcf/pcfutil.c); FTL(src/psaux/psarrst.c src/psaux/psarrst.h); FTL(src/sfnt/pngshim.c src/sfnt/pngshim.h); FTL(src/sfnt/ttsbit.c); Public-Domain(src/tools/apinames.c src/tools/chktrcmp.py); FTL(src/tools/update-copyright-year); BSD-3-Clause(src/tools/ftrandom/ftrandom.c); FTL(src/truetype/ttgxvar.c src/truetype/ttgxvar.h); FTL(src/type42/t42drivr.c src/type42/t42drivr.h); FTL(src/winfonts/winfnt.c); FTL(src/winfonts/winfnt.h); BSD-3-Clause(src/winfonts/winfnt.h); Catharon-OSL(src/winfonts/winfnt.h); FSFUL(src/winfonts/winfnt.h); FSFULLR(src/winfonts/winfnt.h); FTL(src/winfonts/winfnt.h); GPL-2+(src/winfonts/winfnt.h); GPL-3+(src/winfonts/winfnt.h); MIT(src/winfonts/winfnt.h); OpenGroup-BSD-like(src/winfonts/winfnt.h); Permissive(src/winfonts/winfnt.h); Zlib(src/winfonts/winfnt.h) | -| {{}} | 1.0.5-3.1+deb10u1 | LGPL-2.1+(* ); LGPL-2.1+(debian/* ); LGPL-2.1+(debian/* ) | +| {{}} | 2.9.1-3+deb10u3 | GPL-2+ or FTL(* ); FTL and Catharon-OSL and MIT(vms_make.com); FTL(builds/amiga/* builds/amiga/include/config/* ); FTL(builds/amiga/src/base/* ); BSD-3-Clause(builds/cmake/FindHarfBuzz.cmake); FTL(builds/mac/ftmac.c); FTL(builds/mac/README); FSFULLR and GPL-2+(builds/unix/aclocal.m4); FSFUL and GPL-2+(builds/unix/configure); Permissive and GPL-3+(builds/unix/config.guess builds/unix/config.sub); MIT(builds/unix/install-sh); GPL-2+ and GPL-3+(builds/unix/ltmain.sh); GPL-2+(builds/unix/pkg.m4); GPL-2+(debian/* ); FTL(docs/INSTALL.CROSS); MIT or GPL-2+(ft2docs/docs/js/jquery.ba-resize.min.js); MIT(ft2docs/docs/js/jquery-1.11.0.min.js); Public-Domain(ft2docs/docs/tutorial/example2.cpp); MIT(ft2docs/docs/tutorial/example5.cpp); FTL(ft2demos/Jamfile); FTL(ft2demos/graph/beos/grbeos.cpp); FTL(ft2demos/graph/mac/grmac.c); FTL(ft2demos/graph/win32/grwin32.c ft2demos/graph/win32/grwin32.h); FTL(ft2demos/graph/graph.h); Public-Domain(ft2demos/graph/grswizzle.c); FTL(ft2demos/mac/ftoldmac.c); MIT(ft2demos/mac/getargv.c); Public-Domain(ft2demos/src/mlgetopt.c ft2demos/src/mlgetopt.h); FTL(ft2demos/src/ftinspect/* ); FTL(include/freetype/ftbzip2.h); FTL(include/freetype/ftcid.h); FTL(include/freetype/ftgxval.h); MIT(include/freetype/internal/fthash.h); FTL(include/freetype/internal/ftrfork.h); FTL(include/freetype/internal/ftpic.h); FTL(include/freetype/internal/services/svttglyf.h); FTL(src/autofit/afindic.c src/autofit/afindic.h); FTL(src/base/ftbase.h); Public-Domain(src/base/md5.c src/base/md5.h); MIT(src/bdf/bdf.c); MIT(src/bdf/bdf.h src/bdf/bdflib.c); FTL(src/gxvalid/* ); FTL(src/gxvalid/Jamfile); Zlib(src/gzip/adler32.c); Zlib(src/gzip/ftzconf.h); Zlib(src/gzip/zlib.h); FTL(src/lzw/ftlzw.c src/lzw/rules.mk); OpenGroup-BSD-like(src/pcf/pcfutil.c); FTL(src/psaux/psarrst.c src/psaux/psarrst.h); FTL(src/sfnt/pngshim.c src/sfnt/pngshim.h); FTL(src/sfnt/ttsbit.c); Public-Domain(src/tools/apinames.c src/tools/chktrcmp.py); FTL(src/tools/update-copyright-year); BSD-3-Clause(src/tools/ftrandom/ftrandom.c); FTL(src/truetype/ttgxvar.c src/truetype/ttgxvar.h); FTL(src/type42/t42drivr.c src/type42/t42drivr.h); FTL(src/winfonts/winfnt.c); FTL(src/winfonts/winfnt.h); BSD-3-Clause(src/winfonts/winfnt.h); Catharon-OSL(src/winfonts/winfnt.h); FSFUL(src/winfonts/winfnt.h); FSFULLR(src/winfonts/winfnt.h); FTL(src/winfonts/winfnt.h); GPL-2+(src/winfonts/winfnt.h); GPL-3+(src/winfonts/winfnt.h); MIT(src/winfonts/winfnt.h); OpenGroup-BSD-like(src/winfonts/winfnt.h); Permissive(src/winfonts/winfnt.h); Zlib(src/winfonts/winfnt.h) | +| {{}} | 2.9.1-3+deb10u3 | GPL-2+ or FTL(* ); FTL and Catharon-OSL and MIT(vms_make.com); FTL(builds/amiga/* builds/amiga/include/config/* ); FTL(builds/amiga/src/base/* ); BSD-3-Clause(builds/cmake/FindHarfBuzz.cmake); FTL(builds/mac/ftmac.c); FTL(builds/mac/README); FSFULLR and GPL-2+(builds/unix/aclocal.m4); FSFUL and GPL-2+(builds/unix/configure); Permissive and GPL-3+(builds/unix/config.guess builds/unix/config.sub); MIT(builds/unix/install-sh); GPL-2+ and GPL-3+(builds/unix/ltmain.sh); GPL-2+(builds/unix/pkg.m4); GPL-2+(debian/* ); FTL(docs/INSTALL.CROSS); MIT or GPL-2+(ft2docs/docs/js/jquery.ba-resize.min.js); MIT(ft2docs/docs/js/jquery-1.11.0.min.js); Public-Domain(ft2docs/docs/tutorial/example2.cpp); MIT(ft2docs/docs/tutorial/example5.cpp); FTL(ft2demos/Jamfile); FTL(ft2demos/graph/beos/grbeos.cpp); FTL(ft2demos/graph/mac/grmac.c); FTL(ft2demos/graph/win32/grwin32.c ft2demos/graph/win32/grwin32.h); FTL(ft2demos/graph/graph.h); Public-Domain(ft2demos/graph/grswizzle.c); FTL(ft2demos/mac/ftoldmac.c); MIT(ft2demos/mac/getargv.c); Public-Domain(ft2demos/src/mlgetopt.c ft2demos/src/mlgetopt.h); FTL(ft2demos/src/ftinspect/* ); FTL(include/freetype/ftbzip2.h); FTL(include/freetype/ftcid.h); FTL(include/freetype/ftgxval.h); MIT(include/freetype/internal/fthash.h); FTL(include/freetype/internal/ftrfork.h); FTL(include/freetype/internal/ftpic.h); FTL(include/freetype/internal/services/svttglyf.h); FTL(src/autofit/afindic.c src/autofit/afindic.h); FTL(src/base/ftbase.h); Public-Domain(src/base/md5.c src/base/md5.h); MIT(src/bdf/bdf.c); MIT(src/bdf/bdf.h src/bdf/bdflib.c); FTL(src/gxvalid/* ); FTL(src/gxvalid/Jamfile); Zlib(src/gzip/adler32.c); Zlib(src/gzip/ftzconf.h); Zlib(src/gzip/zlib.h); FTL(src/lzw/ftlzw.c src/lzw/rules.mk); OpenGroup-BSD-like(src/pcf/pcfutil.c); FTL(src/psaux/psarrst.c src/psaux/psarrst.h); FTL(src/sfnt/pngshim.c src/sfnt/pngshim.h); FTL(src/sfnt/ttsbit.c); Public-Domain(src/tools/apinames.c src/tools/chktrcmp.py); FTL(src/tools/update-copyright-year); BSD-3-Clause(src/tools/ftrandom/ftrandom.c); FTL(src/truetype/ttgxvar.c src/truetype/ttgxvar.h); FTL(src/type42/t42drivr.c src/type42/t42drivr.h); FTL(src/winfonts/winfnt.c); FTL(src/winfonts/winfnt.h); BSD-3-Clause(src/winfonts/winfnt.h); Catharon-OSL(src/winfonts/winfnt.h); FSFUL(src/winfonts/winfnt.h); FSFULLR(src/winfonts/winfnt.h); FTL(src/winfonts/winfnt.h); GPL-2+(src/winfonts/winfnt.h); GPL-3+(src/winfonts/winfnt.h); MIT(src/winfonts/winfnt.h); OpenGroup-BSD-like(src/winfonts/winfnt.h); Permissive(src/winfonts/winfnt.h); Zlib(src/winfonts/winfnt.h) | +| {{}} | 1.0.5-3.1+deb10u2 | LGPL-2.1+(* ); LGPL-2.1+(debian/* ); LGPL-2.1+(debian/* ) | | {{}} | 0.4.0-1 | Apache-2.0(* ); Gray-Watson(libmy/argv.c libmy/argv.h libmy/argv_loc.h); Apache-2.0(libmy/argv.c libmy/argv.h libmy/argv_loc.h); Gray-Watson(libmy/argv.c libmy/argv.h libmy/argv_loc.h) | | {{}} | 2.9.9-1+deb10u1 | GPL-2(* ); LGPL-2(lib/* ); GPL-2+(debian/* ); GPL-2(debian/* ); GPL-2+(debian/* ); LGPL-2(debian/* ) | | {{}} | 2.9.9-1+deb10u1 | GPL-2(* ); LGPL-2(lib/* ); GPL-2+(debian/* ); GPL-2(debian/* ); GPL-2+(debian/* ); LGPL-2(debian/* ) | @@ -590,11 +598,11 @@ pdfhidden: True | {{}} | 6.1.2+dfsg-4+deb10u1 | GPL; GPL-2; GPL-3; LGPL-3 | | {{}} | 6.1.2+dfsg-4+deb10u1 | GPL; GPL-2; GPL-3; LGPL-3 | | {{}} | 6.1.2+dfsg-4+deb10u1 | GPL; GPL-2; GPL-3; LGPL-3 | -| {{}} | 3.6.7-4+deb10u7 | Apache-2; CC0 license; GFDL-1; GPL; GPL-3); GPLv3+; LGPL; LGPL-3; LGPLv3+_or_GPLv2+; MIT; The main library is licensed under GNU Lesser; The MIT License (MIT) | -| {{}} | 3.6.7-4+deb10u7 | Apache-2; CC0 license; GFDL-1; GPL; GPL-3); GPLv3+; LGPL; LGPL-3; LGPLv3+_or_GPLv2+; MIT; The main library is licensed under GNU Lesser; The MIT License (MIT) | -| {{}} | 3.6.7-4+deb10u7 | Apache-2; CC0 license; GFDL-1; GPL; GPL-3); GPLv3+; LGPL; LGPL-3; LGPLv3+_or_GPLv2+; MIT; The main library is licensed under GNU Lesser; The MIT License (MIT) | -| {{}} | 3.6.7-4+deb10u7 | Apache-2; CC0 license; GFDL-1; GPL; GPL-3); GPLv3+; LGPL; LGPL-3; LGPLv3+_or_GPLv2+; MIT; The main library is licensed under GNU Lesser; The MIT License (MIT) | -| {{}} | 3.6.7-4+deb10u7 | NO COPYRIGHT FILE | +| {{}} | 3.6.7-4+deb10u10 | Apache-2; CC0 license; GFDL-1; GPL; GPL-3); GPLv3+; LGPL; LGPL-3; LGPLv3+_or_GPLv2+; MIT; The main library is licensed under GNU Lesser; The MIT License (MIT) | +| {{}} | 3.6.7-4+deb10u10 | Apache-2; CC0 license; GFDL-1; GPL; GPL-3); GPLv3+; LGPL; LGPL-3; LGPLv3+_or_GPLv2+; MIT; The main library is licensed under GNU Lesser; The MIT License (MIT) | +| {{}} | 3.6.7-4+deb10u10 | Apache-2; CC0 license; GFDL-1; GPL; GPL-3); GPLv3+; LGPL; LGPL-3; LGPLv3+_or_GPLv2+; MIT; The main library is licensed under GNU Lesser; The MIT License (MIT) | +| {{}} | 3.6.7-4+deb10u10 | Apache-2; CC0 license; GFDL-1; GPL; GPL-3); GPLv3+; LGPL; LGPL-3; LGPLv3+_or_GPLv2+; MIT; The main library is licensed under GNU Lesser; The MIT License (MIT) | +| {{}} | 3.6.7-4+deb10u10 | NO COPYRIGHT FILE | | {{}} | 8.3.0-6 | NO COPYRIGHT FILE | | {{}} | 2.7-1 | BSD-3-clause(* ); GPL-2+(debian/* ) | | {{}} | 1.35-1 | LGPL-2.1+(* ); LGPL-2.1+(src/b64dec.c); LGPL-2.1+ or BSD-3-clause(src/estream-printf.h src/estream-printf.c src/estream.c); LGPL-2.1+(src/w32-estream.c); LGPL-2.1+(src/gettext.h); g10-permissive(src/gpg-error-config.in); g10-permissive(src/mkheader.c); LGPL-2.1+(src/posix-lock.c); LGPL-2.1+(src/w32-gettext.c); GPL-3+(doc/yat2m.c); g10-permissive(potomo); g10-permissive(potomo); LGPL-2.1+(potomo); GPL-3+(potomo); BSD-3-clause(potomo) | @@ -607,10 +615,10 @@ pdfhidden: True | {{}} | 1.16.1-1 | Apache-2.0(* ); GPL-2+(debian/* ); Zlib(third_party/nanopb/* ); Expat(third_party/rake-compiler-dock/* ); Apache-2.0(src/php/tests/bootstrap.php); BSD-3-clause(third_party/address_sorting/* ); Apache-2.0(third_party/address_sorting/* ) | | {{}} | 1.16.1-1 | Apache-2.0(* ); GPL-2+(debian/* ); Zlib(third_party/nanopb/* ); Expat(third_party/rake-compiler-dock/* ); Apache-2.0(src/php/tests/bootstrap.php); BSD-3-clause(third_party/address_sorting/* ); Apache-2.0(third_party/address_sorting/* ) | | {{}} | 1.16.1-1 | Apache-2.0(* ); GPL-2+(debian/* ); Zlib(third_party/nanopb/* ); Expat(third_party/rake-compiler-dock/* ); Apache-2.0(src/php/tests/bootstrap.php); BSD-3-clause(third_party/address_sorting/* ); Apache-2.0(third_party/address_sorting/* ) | -| {{}} | 9.27~dfsg-2+deb10u5 | AGPL-3+(Files:); BSD-3-Clause~Adobe(Resource/CMap/* ); AGPL-3+(Resource/CMap/Identity-UTF16-H); LGPL-2.1(contrib/pcl3/* ); FTL(Files:); GPL(contrib/gdevlx7.c); GPL(contrib/japanese/* ); AGPL-3+ with font exception(Resource/Font/* ); GPL(contrib/lips4/* ); GPL(Files:); GAP~configure(configure); GPL-2+(Files:); GPL(cups/gdevcups.c); GPL-2+(contrib/gdevbjc[_a].[ch]); ZLIB(Files:); BSD-3-Clause(Files:); BSD-3-Clause(Files:); Expat~SunSoft with SunSoft exception(Files:); Expat(Files:); public-domain(doc/Hershey.htm); Apache-2.0(Files:); Apache-2.0(Resource/CIDFSubst/DroidSansFallback.ttf); AGPL-3+(Files:); ISC(base/gsstrl.c); GPL-2+(cups/cups.mak); GPL-2+(contrib/gdevdj9.c); GPL-2+(contrib/gdevcd8.c); GPL-2+(contrib/opvp/gdevopvp.c); GPL-2+(contrib/gdevlx32.c); GPL-2+(lib/afmdiff.awk); Expat~Ghostgum(lib/ghostpdf.ppd); NTP~Open(contrib/opvp/opvp.h); other(Resource/Init/pdf_sec.ps); GPL(contrib/eplaser/gdevescv.[ch]); NTP~Lucent(devices/gdevifno.c); NTP~WSU(devices/gdev4693.c); ZLIB(lib/fixmswrd.pl); GPL-3+(debian/* ); GPL(debian/update-gsfontmap); AGPL-3(debian/update-gsfontmap); GPL-3+(debian/update-gsfontmap); GPL-2+(debian/update-gsfontmap); GPL-2(debian/update-gsfontmap); GPL(debian/update-gsfontmap); LGPL-2.1(debian/update-gsfontmap); Apache-2.0(debian/update-gsfontmap); GAP~configure(debian/update-gsfontmap); Expat(debian/update-gsfontmap); Expat~SunSoft(debian/update-gsfontmap); Expat~Ghostgum(debian/update-gsfontmap); NTP~Open(debian/update-gsfontmap); NTP~WSU(debian/update-gsfontmap); NTP~Lucent(debian/update-gsfontmap); BSD-3-Clause(debian/update-gsfontmap); BSD-3-Clause~Adobe(debian/update-gsfontmap); FTL(debian/update-gsfontmap); ZLIB(debian/update-gsfontmap); ISC(debian/update-gsfontmap) | +| {{}} | 9.27~dfsg-2+deb10u8 | AGPL-3+(Files:); BSD-3-Clause~Adobe(Resource/CMap/* ); AGPL-3+(Resource/CMap/Identity-UTF16-H); LGPL-2.1(contrib/pcl3/* ); FTL(Files:); GPL(contrib/gdevlx7.c); GPL(contrib/japanese/* ); AGPL-3+ with font exception(Resource/Font/* ); GPL(contrib/lips4/* ); GPL(Files:); GAP~configure(configure); GPL-2+(Files:); GPL(cups/gdevcups.c); GPL-2+(contrib/gdevbjc[_a].[ch]); ZLIB(Files:); BSD-3-Clause(Files:); BSD-3-Clause(Files:); Expat~SunSoft with SunSoft exception(Files:); Expat(Files:); public-domain(doc/Hershey.htm); Apache-2.0(Files:); Apache-2.0(Resource/CIDFSubst/DroidSansFallback.ttf); AGPL-3+(Files:); ISC(base/gsstrl.c); GPL-2+(cups/cups.mak); GPL-2+(contrib/gdevdj9.c); GPL-2+(contrib/gdevcd8.c); GPL-2+(contrib/opvp/gdevopvp.c); GPL-2+(contrib/gdevlx32.c); GPL-2+(lib/afmdiff.awk); Expat~Ghostgum(lib/ghostpdf.ppd); NTP~Open(contrib/opvp/opvp.h); other(Resource/Init/pdf_sec.ps); GPL(contrib/eplaser/gdevescv.[ch]); NTP~Lucent(devices/gdevifno.c); NTP~WSU(devices/gdev4693.c); ZLIB(lib/fixmswrd.pl); GPL-3+(debian/* ); GPL(debian/update-gsfontmap); AGPL-3(debian/update-gsfontmap); GPL-3+(debian/update-gsfontmap); GPL-2+(debian/update-gsfontmap); GPL-2(debian/update-gsfontmap); GPL(debian/update-gsfontmap); LGPL-2.1(debian/update-gsfontmap); Apache-2.0(debian/update-gsfontmap); GAP~configure(debian/update-gsfontmap); Expat(debian/update-gsfontmap); Expat~SunSoft(debian/update-gsfontmap); Expat~Ghostgum(debian/update-gsfontmap); NTP~Open(debian/update-gsfontmap); NTP~WSU(debian/update-gsfontmap); NTP~Lucent(debian/update-gsfontmap); BSD-3-Clause(debian/update-gsfontmap); BSD-3-Clause~Adobe(debian/update-gsfontmap); FTL(debian/update-gsfontmap); ZLIB(debian/update-gsfontmap); ISC(debian/update-gsfontmap) | | {{}} | 9.27~dfsg-2+deb10u5 | AGPL-3+(Files:); BSD-3-Clause~Adobe(Resource/CMap/* ); AGPL-3+(Resource/CMap/Identity-UTF16-H); LGPL-2.1(contrib/pcl3/* ); FTL(Files:); GPL(contrib/gdevlx7.c); GPL(contrib/japanese/* ); AGPL-3+ with font exception(Resource/Font/* ); GPL(contrib/lips4/* ); GPL(Files:); GAP~configure(configure); GPL-2+(Files:); GPL(cups/gdevcups.c); GPL-2+(contrib/gdevbjc[_a].[ch]); ZLIB(Files:); BSD-3-Clause(Files:); BSD-3-Clause(Files:); Expat~SunSoft with SunSoft exception(Files:); Expat(Files:); public-domain(doc/Hershey.htm); Apache-2.0(Files:); Apache-2.0(Resource/CIDFSubst/DroidSansFallback.ttf); AGPL-3+(Files:); ISC(base/gsstrl.c); GPL-2+(cups/cups.mak); GPL-2+(contrib/gdevdj9.c); GPL-2+(contrib/gdevcd8.c); GPL-2+(contrib/opvp/gdevopvp.c); GPL-2+(contrib/gdevlx32.c); GPL-2+(lib/afmdiff.awk); Expat~Ghostgum(lib/ghostpdf.ppd); NTP~Open(contrib/opvp/opvp.h); other(Resource/Init/pdf_sec.ps); GPL(contrib/eplaser/gdevescv.[ch]); NTP~Lucent(devices/gdevifno.c); NTP~WSU(devices/gdev4693.c); ZLIB(lib/fixmswrd.pl); GPL-3+(debian/* ); GPL(debian/update-gsfontmap); AGPL-3(debian/update-gsfontmap); GPL-3+(debian/update-gsfontmap); GPL-2+(debian/update-gsfontmap); GPL-2(debian/update-gsfontmap); GPL(debian/update-gsfontmap); LGPL-2.1(debian/update-gsfontmap); Apache-2.0(debian/update-gsfontmap); GAP~configure(debian/update-gsfontmap); Expat(debian/update-gsfontmap); Expat~SunSoft(debian/update-gsfontmap); Expat~Ghostgum(debian/update-gsfontmap); NTP~Open(debian/update-gsfontmap); NTP~WSU(debian/update-gsfontmap); NTP~Lucent(debian/update-gsfontmap); BSD-3-Clause(debian/update-gsfontmap); BSD-3-Clause~Adobe(debian/update-gsfontmap); FTL(debian/update-gsfontmap); ZLIB(debian/update-gsfontmap); ISC(debian/update-gsfontmap) | -| {{}} | 1.17-3+deb10u3 | BSD; GPL; GPL-2; MIT | -| {{}} | 1.17-3+deb10u3 | BSD; GPL; GPL-2; MIT | +| {{}} | 1.17-3+deb10u5 | BSD; GPL; GPL-2; MIT | +| {{}} | 1.17-3+deb10u5 | BSD; GPL; GPL-2; MIT | | {{}} | 1.14.4-1 | LGPL-2+(gst/gst.c); LGPL-2.1+(libs/gst/check/libcheck/check.c); LGPL-2+(gst/gstparamspecs.c); LGPL-2+(gst/gsttaglist.c); LGPL-2+(debian/gst-codec-info.c); LGPL-2+(gst/gstchildproxy.c); LGPL-2+(tests/check/elements/fakesink.c); LGPL-2+(libs/gst/net/gstnet.h); LGPL-2+(gst/gstbufferpool.c); LGPL-2+(gst/gstbus.c); LGPL-2+(gst/gsttoc.c); LGPL-2+(gst/gstcontrolsource.c); LGPL-2+(gst/gstcontrolbinding.c); LGPL-2+(gst/gsterror.h); LGPL-2+(gst/gstcaps.c); LGPL-2+(libs/gst/base/gstadapter.c); LGPL-2+(gst/gst-i18n-app.h); GPL-2+(common/coverage/coverage-report-entry.pl); LGPL-2+(gst/gstmacros.h); LGPL-2+(tests/check/generic/sinks.c); LGPL-2+(gst/gsttaskpool.h); LGPL-2+(gst/gstbufferlist.c); LGPL-2+(gst/gstcaps.h); LGPL-2+(gst/glib-compat-private.h); LGPL-2+(plugins/elements/gstdataqueue.c); LGPL-2+(gst/gstpluginloader.c); LGPL-2+(plugins/elements/gstoutputselector.c); LGPL-2+(gst/gstmemory.c); LGPL-2+(tests/check/gst/gstcontroller.c); LGPL-2+(tests/check/libs/bitreader.c); LGPL-2+(libs/gst/net/gstnetaddressmeta.c); LGPL-2+(tests/check/gst/gstclock.c); LGPL-2+(libs/gst/check/gstbufferstraw.c); LGPL-2+(plugins/elements/gstvalve.c); LGPL-2+(libs/gst/net/gstnetclientclock.c); LGPL-2+(gst/gstatomicqueue.c); LGPL-2+(gst/gstinfo.c); LGPL-2+(libs/gst/base/gsttypefindhelper.c); LGPL-2+(tests/check/gst/gstevent.c); LGPL-2+(gst/gstquark.c); LGPL-2+(gst/gstregistrybinary.c); LGPL-2+(gst/gstregistrybinary.h); LGPL-2+(libs/gst/base/gstbytereader.c); LGPL-2+(gst/gstiterator.c); LGPL-2+(gst/gstdatetime.c); LGPL-2.1+(plugins/elements/gstfunnel.c); GPL-2+(ltmain.sh); GPL-3+(gst/parse/grammar.tab.h); LGPL-2+(tests/check/gst/gstquery.c); LGPL-2+(tests/benchmarks/gstpollstress.c); LGPL-2+(tests/check/gst/gstvalue.c); LGPL-2+(tests/check/gst/gstobject.c); LGPL-2+(libs/gst/check/gstcheck.h); LGPL-2+(tests/check/elements/fdsrc.c); LGPL-2+(tests/examples/typefind/typefind.c); LGPL-2+(tests/check/gst/gstminiobject.c); LGPL-2+(tests/check/gst/gstutils.c); LGPL-2+(tests/check/pipelines/parse-launch.c); LGPL-2+(tests/check/gst/gstcaps.c); LGPL-2+(tests/check/elements/queue.c); LGPL-2+(tests/check/gst/gstpoll.c); LGPL-2+(tests/check/elements/tee.c); LGPL-2+(tests/check/elements/capsfilter.c); LGPL-2+(tests/benchmarks/gstbufferstress.c); LGPL-2+(tests/check/libs/bytewriter.c); LGPL-2+(tests/benchmarks/gstclockstress.c); LGPL-2+(tests/check/gst/gstatomicqueue.c); LGPL-2+(tests/check/gst/gstmemory.c); LGPL-2+(tests/check/libs/collectpads2.c); LGPL-2+(tests/benchmarks/complexity.c); LGPL-2+(libs/gst/net/gstnettimeprovider.h); LGPL-2+(libs/gst/net/gstnettimepacket.c); LGPL-2+(plugins/elements/gstinputselector.c); LGPL-2+(tests/check/gst/gstbus.c); LGPL-2+(tests/check/gst/gstdatetime.c); LGPL-2+(tests/check/pipelines/seek.c); LGPL-2+(tests/check/elements/valve.c); LGPL-2+(tests/check/gst/gstplugin.c); LGPL-2+(libs/gst/check/gstconsistencychecker.c); LGPL-2+(gst/gstatomicqueue.h); LGPL-2+(plugins/elements/gstmultiqueue.c); LGPL-2+(gst/gstpoll.c); LGPL-2+(gst/gstpoll.h); LGPL-2+(gst/gettext.h); LGPL-2+(libs/gst/base/gstbaseparse.c); LGPL-2+(plugins/elements/gstinputselector.h); LGPL-2+(tests/check/pipelines/queue-error.c); LGPL-2+(libs/gst/base/gstcollectpads2.c); LGPL-2+(libs/gst/base/gstcollectpads2.h); LGPL-2+(tests/check/gst/gstpreset.c); LGPL-2+(libs/gst/base/gstbaseparse.h); LGPL-2+(gst/glib-compat.h); LGPL-2+(libs/gst/base/gstindex.c); LGPL-2+(tests/benchmarks/init.c); LGPL-2+(libs/gst/check/gstcheck.c); LGPL-2+(tests/check/elements/filesink.c); LGPL-2+(tests/check/gst/gstbin.c); LGPL-2.1+(tests/check/elements/funnel.c) | | {{}} | 1.14.4-2+deb10u1 | LGPL-2+(ext/alsa/gstalsa.c); LGPL-2+(ext/cdparanoia/gstcdparanoiasrc.c); LGPL-2+(gst-libs/gst/audio/mixer.c); LGPL-2+(ext/pango/gsttextoverlay.h); LGPL-2+(ext/alsa/gstalsasink.h); LGPL-2+(ext/cdparanoia/gstcdparanoiasrc.h); BSD (2 clause)(gst-libs/gst/fft/_kiss_fft_guts_f32.h); LGPL-2+(gst/gdp/gstgdp.c); MIT/X11 (BSD like) LGPL-2+(gst-libs/gst/rtsp/gstrtspdefs.c); LGPL-2+(gst-libs/gst/rtsp/gstrtsp.h); LGPL-2+(gst-libs/gst/fft/gstfft.c); LGPL-2+(gst-libs/gst/rtp/gstrtppayloads.c); LGPL-2+(gst-libs/gst/pbutils/encoding-profile.c); LGPL-2+(sys/ximage/ximagepool.c); LGPL-2+(ext/alsa/gstalsamixer.c); LGPL-2+(gst/gdp/dp-private.h); LGPL-2+(gst-libs/gst/audio/gstaudiometa.c); LGPL-2+(ext/theora/gsttheora.c); LGPL-2+(gst/gio/gstgio.c); LGPL-2+(gst/gio/gstgio.h); LGPL-2+(gst-libs/gst/tag/gstexiftag.c); BSD (2 clause)(gst/videoscale/vs_4tap.h); LGPL-2+(tests/check/elements/adder.c); LGPL-2+(ext/ogg/gstoggstream.h); BSD (3 clause)(gst/audioresample/arch.h); LGPL-2+(gst/tcp/gstmultihandlesink.h); LGPL-2+(gst-libs/gst/pbutils/gstdiscoverer.c); LGPL-2+(ext/pango/gstclockoverlay.c); LGPL-2+(gst/playback/gstplaysinkaudioconvert.c); LGPL-2+(gst/audioconvert/plugin.c); LGPL-2+(ext/vorbis/gstvorbisdeclib.c); LGPL-2+(gst/audioconvert/gstaudioquantize.c); LGPL-2+(gst/audiotestsrc/gstaudiotestsrc.c); GPL-2+(common/coverage/coverage-report-entry.pl); LGPL-2+(gst/subparse/gstsubparse.h); LGPL-2+(ext/theora/gsttheoraparse.c); LGPL-2+(tests/examples/dynamic/sprinkle.c); LGPL-2+(ext/alsa/gstalsa.h); BSD (2 clause)(gst/videoscale/vs_fill_borders.c); LGPL-2+(gst/tcp/gstmultihandlesink.c); LGPL-2+(sys/ximage/ximage.c); LGPL-2+(gst-libs/gst/video/gstvideosink.c); LGPL-2+(ext/vorbis/gstvorbisparse.h); LGPL-2+(gst-libs/gst/rtp/gstrtpbasedepayload.h); LGPL-2+(gst-libs/gst/rtp/gstrtpbasepayload.c); LGPL-2+(gst-libs/gst/rtp/gstrtpbaseaudiopayload.c); LGPL-2+(gst-libs/gst/rtp/gstrtcpbuffer.c); LGPL-2+(tests/icles/test-colorkey.c); LGPL-2+(tests/check/elements/encodebin.c); LGPL-2+(tests/examples/overlay/qtgv-videooverlay.cpp); LGPL-2+(tests/examples/encoding/gstcapslist.c); LGPL-2+(tests/examples/overlay/gtk-videooverlay.c); LGPL-2+(gst-libs/gst/pbutils/codec-utils.c); LGPL-2+(gst-libs/gst/app/gstappsink.c); LGPL-2+(gst-libs/gst/audio/gstaudiodecoder.c); LGPL-2+(gst-libs/gst/audio/gstaudioiec61937.c); LGPL-2+(gst-libs/gst/tag/gsttagdemux.c); LGPL-2+(tests/check/libs/mixer.c); LGPL-2+(gst/subparse/mpl2parse.c); LGPL-2+(ext/ogg/gstogmparse.c); LGPL-2+(gst-libs/gst/pbutils/install-plugins.c); LGPL-2+(tests/check/elements/playbin-compressed.c); LGPL-2+(ext/ogg/gstoggmux.c); LGPL-2+(gst/audioconvert/audioconvert.c); BSD (2 clause)(gst/videoscale/vs_4tap.c); BSD (3 clause)(gst/audioresample/fixed_bfin.h); BSD (3 clause)(ext/ogg/vorbis_parse.c); BSD (3 clause)(gst/audioresample/resample_sse.h); BSD (3 clause)(gst/audioresample/speex_resampler.h); BSD (3 clause)(gst/audioresample/resample.c); GPL-2+(ltmain.sh); LGPL-2+(gst/playback/gstplaysink.c); LGPL-2+(gst-libs/gst/video/gstvideofilter.c); LGPL-2+(ext/pango/gstbasetextoverlay.c); LGPL-2+(ext/pango/gsttextoverlay.c); LGPL-2+(gst-libs/gst/audio/gstaudiofilter.c); LGPL-2+(ext/pango/gsttextrender.c); LGPL-2+(gst/tcp/gstmultifdsink.c); LGPL-2+(gst/audioresample/gstaudioresample.h); LGPL-2+(tests/icles/playback/test.c); LGPL-2+(gst-libs/gst/video/video.c); LGPL-2+(gst/videoscale/gstvideoscale.c); LGPL-2+(gst/videoconvert/gstvideoconvert.c); LGPL-2+(gst/videoconvert/gstvideoconvert.h); LGPL-2+(gst/subparse/gstsubparse.c); LGPL-2+(gst/volume/gstvolume.h); LGPL-2+(gst/gdp/dataprotocol.c); LGPL-2+(gst/videotestsrc/videotestsrc.h); LGPL-2+(tests/check/libs/video.c); LGPL-2+(gst-libs/gst/rtp/gstrtpbasedepayload.c); LGPL-2+(gst-libs/gst/rtp/gstrtpbuffer.c); LGPL-2+(tests/check/elements/audioresample.c); LGPL-2+(tests/check/elements/videotestsrc.c); LGPL-2+(tests/check/elements/audioconvert.c); LGPL-2+(tests/check/libs/audiocdsrc.c); LGPL-2+(tests/check/generic/clock-selection.c); LGPL-2+(gst/playback/gstdecodebin2.c); LGPL-2+(ext/vorbis/gstvorbistag.h); LGPL-2+(tests/examples/dynamic/addstream.c); LGPL-2+(gst/playback/gstplaybin2.c); LGPL-2+(tests/examples/dynamic/codec-select.c); LGPL-2+(tests/check/elements/videoscale.c); LGPL-2+(gst/playback/gstrawcaps.h); LGPL-2+(gst/encoding/gstsmartencoder.h); LGPL-2+(gst/encoding/gstsmartencoder.c); LGPL-2+(gst/playback/gstplaysinkconvertbin.h); LGPL-2+(gst/playback/gstplaysinkconvertbin.c); LGPL-2+(ext/alsa/gstalsadeviceprobe.c); LGPL-2+(tests/check/libs/rtsp.c); LGPL-2+(tests/check/pipelines/simple-launch-lines.c); LGPL-2+(gst/volume/gstvolume.c); LGPL-2+(tests/check/elements/appsink.c); LGPL-2+(gst/typefind/gsttypefindfunctions.c); LGPL-2+(gst/audioconvert/gstaudioconvert.c); LGPL-2+(gst-libs/gst/tag/tag.h); LGPL-2+(ext/libvisual/visual.c); LGPL-2+(gst-libs/gst/video/convertframe.c); LGPL-2+(gst-libs/gst/tag/gsttagmux.c); LGPL-2+(gst-libs/gst/tag/gsttagmux.h); LGPL-2+(gst-libs/gst/pbutils/gstdiscoverer-types.c); LGPL-2+(gst/audioresample/gstaudioresample.c); LGPL-2+(gst-libs/gst/interfaces/navigation.h); LGPL-2+(gst/videoconvert/videoconvert.c); LGPL-2+(ext/ogg/gstoggstream.c); LGPL-2+(gst/gdp/dataprotocol.h); LGPL-2+(gst-libs/gst/gettext.h); LGPL-2+(tests/check/elements/decodebin.c); LGPL-2+(tests/check/pipelines/oggmux.c); LGPL-2+(ext/vorbis/gstvorbistag.c); LGPL-2+(gst-libs/gst/tag/id3v2.h); LGPL-2+(gst-libs/gst/tag/id3v2.c); LGPL-2+(gst-libs/gst/tag/id3v2frames.c); LGPL-2+(gst-libs/gst/interfaces/navigation.c); LGPL-2+(tests/icles/input-selector-test.c); LGPL-2+(gst-libs/gst/video/videooverlay.h); LGPL-2+(tests/check/pipelines/basetime.c); LGPL-2+(ext/ogg/gstoggparse.c); LGPL-2+(gst-libs/gst/video/videoorientation.h); LGPL-2+(gst-libs/gst/video/videoorientation.c); LGPL-2+(gst/audioconvert/gstchannelmix.c); LGPL-2+(gst-libs/gst/video/videooverlay.c); LGPL-2+(gst-libs/gst/tag/tags.c); LGPL-2+(gst-libs/gst/tag/gstxmptag.c); LGPL-2+(tests/examples/audio/audiomix.c); LGPL-2+(gst/subparse/qttextparse.h); LGPL-2+(gst/subparse/qttextparse.c); LGPL-2+(gst-libs/gst/gst-i18n-plugin.h); LGPL-2+(tests/check/elements/libvisual.c); LGPL-2+(ext/alsa/gstalsasink.c); LGPL-2+(tests/examples/playrec/playrec.c); LGPL-2+(gst/subparse/samiparse.c); LGPL-2+(gst/subparse/samiparse.h); MIT/X11 (BSD like) LGPL-2+(gst-libs/gst/rtsp/gstrtspconnection.h); MIT/X11 (BSD like) LGPL-2+(gst-libs/gst/rtsp/gstrtsptransport.c); MIT/X11 (BSD like) LGPL-2+(gst-libs/gst/rtsp/gstrtspconnection.c) | | {{}} | 2.24.32-3 | LGPL-2; other | @@ -648,26 +656,26 @@ pdfhidden: True | {{}} | 1.08-1.1+b5 | Artistic; GPL | | {{}} | 2.060-3 | Artistic or GPL-1+(* ); Artistic or GPL-1+(debian/* ); Artistic(debian/* ); GPL-1+(debian/* ) | | {{}} | 1.08-3 | Artistic; GPL; GPL-1 | -| {{}} | 1.8.2-3-cl4.3.1u7 | GPL-2(* ); GPL-2(extensions/libebt_802_3.c); GPL-2(extensions/libebt_ip.c extensions/libebt_log.c extensions/libebt_mark* .c); GPL-2(extensions/libebt_limit.c); GPL-2(extensions/libebt_nflog.c); GPL-2(extensions/libip6t_DNAT.c); GPL-2(extensions/libip6t_DNPT.c); GPL-2(extensions/libip6t_MASQUERADE.c); GPL-2(extensions/libip6t_NETMAP.c); GPL-2(extensions/libip6t_REDIRECT.c); GPL-2(extensions/libip6t_REJECT.c); GPL-2(extensions/libip6t_SNAT.c); GPL-2(extensions/libip6t_SNPT.c); GPL-2(extensions/libip6t_mh.c); GPL-2(extensions/libipt_CLUSTERIP.c); GPL-2(extensions/libipt_ECN.c); GPL-2(extensions/libipt_REJECT.c); GPL-2(extensions/libipt_TTL.c); GPL-2(extensions/libipt_ULOG.c); GPL-2(extensions/libipt_ttl.c); GPL-2(extensions/libxt_AUDIT.c); GPL-2(extensions/libxt_CHECKSUM.c); GPL-2(extensions/libxt_CLASSIFY.c); GPL-2(extensions/libxt_CONNMARK.c); GPL-2(extensions/libxt_CONNSECMARK.c); GPL-2(extensions/libxt_CT.c); GPL-2(extensions/libxt_DSCP.c); GPL-2(extensions/libxt_HMARK.c); GPL-2(extensions/libxt_IDLETIMER.c); GPL-2(extensions/libxt_LED.c); GPL-2(extensions/libxt_NFQUEUE.c); GPL-2(extensions/libxt_RATEEST.c); GPL-2(extensions/libxt_SECMARK.c); GPL-2(extensions/libxt_SET.c); GPL-2(extensions/libxt_SYNPROXY.c); GPL-2(extensions/libxt_TCPMSS.c); GPL-2(extensions/libxt_TCPOPTSTRIP.c); GPL-2(extensions/libxt_TEE.c); GPL-2(extensions/libxt_TOS.c); GPL-2(extensions/libxt_TPROXY.c); GPL-2(extensions/libxt_addrtype.c); GPL-2(extensions/libxt_bpf.c); GPL-2(extensions/libxt_cluster.c); GPL-2(extensions/libxt_connmark.c); GPL-2(extensions/libxt_conntrack.c); GPL-2(extensions/libxt_dccp.c); GPL-2(extensions/libxt_devgroup.c); GPL-2(extensions/libxt_dscp.c); GPL-2(extensions/libxt_ecn.c); GPL-2(extensions/libxt_hashlimit.c); GPL-2(extensions/libxt_osf.c); GPL-2(extensions/libxt_owner.c); GPL-2(extensions/libxt_policy.c); GPL-2(extensions/libxt_rateest.c); GPL-2(extensions/libxt_sctp.c); GPL-2(extensions/libxt_set.c); GPL-2(extensions/libxt_socket.c); GPL-2(extensions/libxt_statistic.c); GPL-2(extensions/libxt_string.c); GPL-2(extensions/libxt_time.c); GPL-2(extensions/libxt_tos.c); GPL-2(extensions/libxt_u32.c); GPL-2(include/linux/netfilter/ipset/ip_set.h); GPL-2(include/linux/netfilter/xt_AUDIT.h); GPL-2(include/linux/netfilter/xt_CHECKSUM.h); GPL-2(include/linux/netfilter/xt_DSCP.h); GPL-2(include/linux/netfilter/xt_IDLETIMER.h); GPL-2(include/linux/netfilter/xt_NFQUEUE.h); GPL-2(include/linux/netfilter/xt_connmark.h); GPL-2(include/linux/netfilter/xt_conntrack.h); GPL-2(include/linux/netfilter/xt_dscp.h); GPL-2(include/linux/netfilter/xt_ecn.h); GPL-2(include/linux/netfilter/xt_osf.h); GPL-2(include/linux/netfilter_ipv4.h); GPL-2(include/linux/netfilter_ipv4/ip_queue.h); GPL-2(include/linux/netfilter_ipv4/ipt_ECN.h); GPL-2(include/linux/netfilter_ipv4/ipt_TTL.h); GPL-2(include/linux/netfilter_ipv4/ipt_ULOG.h); GPL-2(include/linux/netfilter_ipv4/ipt_ttl.h); GPL-2(include/linux/netfilter_ipv6.h); Artistic-2(iptables/iptables-apply); GPL-2(iptables/iptables-save.c); GPL-2(iptables/iptables-xml.c); GPL-2+(iptables/nft.c); GPL-2+(iptables/nft-arp.c); GPL-2+(iptables/nft-bridge.c); GPL-2+(iptables/nft-ipv4.c iptables/nft-ipv6.c iptables/nft-shared.c); GPL-2+(iptables/xtables-arp.c iptables/xtables-eb.c); GPL-2(libiptc/libip4tc.c); GPL-2(libiptc/libip6tc.c); GPL-2(libiptc/libiptc.c); GPL-2(libxtables/xtables.c); GPL-2(libxtables/xtoptions.c); GPL-2(utils/nfsynproxy.c); custom(utils/pf.os); GPL-2(utils/pf.os); GPL-2+(utils/pf.os); Artistic-2(utils/pf.os) | -| {{}} | 1.8.2-3-cl4.3.1u7 | NO COPYRIGHT FILE | -| {{}} | 1.8.2-3-cl4.3.1u7 | GPL-2(* ); GPL-2(extensions/libebt_802_3.c); GPL-2(extensions/libebt_ip.c extensions/libebt_log.c extensions/libebt_mark* .c); GPL-2(extensions/libebt_limit.c); GPL-2(extensions/libebt_nflog.c); GPL-2(extensions/libip6t_DNAT.c); GPL-2(extensions/libip6t_DNPT.c); GPL-2(extensions/libip6t_MASQUERADE.c); GPL-2(extensions/libip6t_NETMAP.c); GPL-2(extensions/libip6t_REDIRECT.c); GPL-2(extensions/libip6t_REJECT.c); GPL-2(extensions/libip6t_SNAT.c); GPL-2(extensions/libip6t_SNPT.c); GPL-2(extensions/libip6t_mh.c); GPL-2(extensions/libipt_CLUSTERIP.c); GPL-2(extensions/libipt_ECN.c); GPL-2(extensions/libipt_REJECT.c); GPL-2(extensions/libipt_TTL.c); GPL-2(extensions/libipt_ULOG.c); GPL-2(extensions/libipt_ttl.c); GPL-2(extensions/libxt_AUDIT.c); GPL-2(extensions/libxt_CHECKSUM.c); GPL-2(extensions/libxt_CLASSIFY.c); GPL-2(extensions/libxt_CONNMARK.c); GPL-2(extensions/libxt_CONNSECMARK.c); GPL-2(extensions/libxt_CT.c); GPL-2(extensions/libxt_DSCP.c); GPL-2(extensions/libxt_HMARK.c); GPL-2(extensions/libxt_IDLETIMER.c); GPL-2(extensions/libxt_LED.c); GPL-2(extensions/libxt_NFQUEUE.c); GPL-2(extensions/libxt_RATEEST.c); GPL-2(extensions/libxt_SECMARK.c); GPL-2(extensions/libxt_SET.c); GPL-2(extensions/libxt_SYNPROXY.c); GPL-2(extensions/libxt_TCPMSS.c); GPL-2(extensions/libxt_TCPOPTSTRIP.c); GPL-2(extensions/libxt_TEE.c); GPL-2(extensions/libxt_TOS.c); GPL-2(extensions/libxt_TPROXY.c); GPL-2(extensions/libxt_addrtype.c); GPL-2(extensions/libxt_bpf.c); GPL-2(extensions/libxt_cluster.c); GPL-2(extensions/libxt_connmark.c); GPL-2(extensions/libxt_conntrack.c); GPL-2(extensions/libxt_dccp.c); GPL-2(extensions/libxt_devgroup.c); GPL-2(extensions/libxt_dscp.c); GPL-2(extensions/libxt_ecn.c); GPL-2(extensions/libxt_hashlimit.c); GPL-2(extensions/libxt_osf.c); GPL-2(extensions/libxt_owner.c); GPL-2(extensions/libxt_policy.c); GPL-2(extensions/libxt_rateest.c); GPL-2(extensions/libxt_sctp.c); GPL-2(extensions/libxt_set.c); GPL-2(extensions/libxt_socket.c); GPL-2(extensions/libxt_statistic.c); GPL-2(extensions/libxt_string.c); GPL-2(extensions/libxt_time.c); GPL-2(extensions/libxt_tos.c); GPL-2(extensions/libxt_u32.c); GPL-2(include/linux/netfilter/ipset/ip_set.h); GPL-2(include/linux/netfilter/xt_AUDIT.h); GPL-2(include/linux/netfilter/xt_CHECKSUM.h); GPL-2(include/linux/netfilter/xt_DSCP.h); GPL-2(include/linux/netfilter/xt_IDLETIMER.h); GPL-2(include/linux/netfilter/xt_NFQUEUE.h); GPL-2(include/linux/netfilter/xt_connmark.h); GPL-2(include/linux/netfilter/xt_conntrack.h); GPL-2(include/linux/netfilter/xt_dscp.h); GPL-2(include/linux/netfilter/xt_ecn.h); GPL-2(include/linux/netfilter/xt_osf.h); GPL-2(include/linux/netfilter_ipv4.h); GPL-2(include/linux/netfilter_ipv4/ip_queue.h); GPL-2(include/linux/netfilter_ipv4/ipt_ECN.h); GPL-2(include/linux/netfilter_ipv4/ipt_TTL.h); GPL-2(include/linux/netfilter_ipv4/ipt_ULOG.h); GPL-2(include/linux/netfilter_ipv4/ipt_ttl.h); GPL-2(include/linux/netfilter_ipv6.h); Artistic-2(iptables/iptables-apply); GPL-2(iptables/iptables-save.c); GPL-2(iptables/iptables-xml.c); GPL-2+(iptables/nft.c); GPL-2+(iptables/nft-arp.c); GPL-2+(iptables/nft-bridge.c); GPL-2+(iptables/nft-ipv4.c iptables/nft-ipv6.c iptables/nft-shared.c); GPL-2+(iptables/xtables-arp.c iptables/xtables-eb.c); GPL-2(libiptc/libip4tc.c); GPL-2(libiptc/libip6tc.c); GPL-2(libiptc/libiptc.c); GPL-2(libxtables/xtables.c); GPL-2(libxtables/xtoptions.c); GPL-2(utils/nfsynproxy.c); custom(utils/pf.os); GPL-2(utils/pf.os); GPL-2+(utils/pf.os); Artistic-2(utils/pf.os) | -| {{}} | 1.8.2-3-cl4.3.1u7 | GPL-2(* ); GPL-2(extensions/libebt_802_3.c); GPL-2(extensions/libebt_ip.c extensions/libebt_log.c extensions/libebt_mark* .c); GPL-2(extensions/libebt_limit.c); GPL-2(extensions/libebt_nflog.c); GPL-2(extensions/libip6t_DNAT.c); GPL-2(extensions/libip6t_DNPT.c); GPL-2(extensions/libip6t_MASQUERADE.c); GPL-2(extensions/libip6t_NETMAP.c); GPL-2(extensions/libip6t_REDIRECT.c); GPL-2(extensions/libip6t_REJECT.c); GPL-2(extensions/libip6t_SNAT.c); GPL-2(extensions/libip6t_SNPT.c); GPL-2(extensions/libip6t_mh.c); GPL-2(extensions/libipt_CLUSTERIP.c); GPL-2(extensions/libipt_ECN.c); GPL-2(extensions/libipt_REJECT.c); GPL-2(extensions/libipt_TTL.c); GPL-2(extensions/libipt_ULOG.c); GPL-2(extensions/libipt_ttl.c); GPL-2(extensions/libxt_AUDIT.c); GPL-2(extensions/libxt_CHECKSUM.c); GPL-2(extensions/libxt_CLASSIFY.c); GPL-2(extensions/libxt_CONNMARK.c); GPL-2(extensions/libxt_CONNSECMARK.c); GPL-2(extensions/libxt_CT.c); GPL-2(extensions/libxt_DSCP.c); GPL-2(extensions/libxt_HMARK.c); GPL-2(extensions/libxt_IDLETIMER.c); GPL-2(extensions/libxt_LED.c); GPL-2(extensions/libxt_NFQUEUE.c); GPL-2(extensions/libxt_RATEEST.c); GPL-2(extensions/libxt_SECMARK.c); GPL-2(extensions/libxt_SET.c); GPL-2(extensions/libxt_SYNPROXY.c); GPL-2(extensions/libxt_TCPMSS.c); GPL-2(extensions/libxt_TCPOPTSTRIP.c); GPL-2(extensions/libxt_TEE.c); GPL-2(extensions/libxt_TOS.c); GPL-2(extensions/libxt_TPROXY.c); GPL-2(extensions/libxt_addrtype.c); GPL-2(extensions/libxt_bpf.c); GPL-2(extensions/libxt_cluster.c); GPL-2(extensions/libxt_connmark.c); GPL-2(extensions/libxt_conntrack.c); GPL-2(extensions/libxt_dccp.c); GPL-2(extensions/libxt_devgroup.c); GPL-2(extensions/libxt_dscp.c); GPL-2(extensions/libxt_ecn.c); GPL-2(extensions/libxt_hashlimit.c); GPL-2(extensions/libxt_osf.c); GPL-2(extensions/libxt_owner.c); GPL-2(extensions/libxt_policy.c); GPL-2(extensions/libxt_rateest.c); GPL-2(extensions/libxt_sctp.c); GPL-2(extensions/libxt_set.c); GPL-2(extensions/libxt_socket.c); GPL-2(extensions/libxt_statistic.c); GPL-2(extensions/libxt_string.c); GPL-2(extensions/libxt_time.c); GPL-2(extensions/libxt_tos.c); GPL-2(extensions/libxt_u32.c); GPL-2(include/linux/netfilter/ipset/ip_set.h); GPL-2(include/linux/netfilter/xt_AUDIT.h); GPL-2(include/linux/netfilter/xt_CHECKSUM.h); GPL-2(include/linux/netfilter/xt_DSCP.h); GPL-2(include/linux/netfilter/xt_IDLETIMER.h); GPL-2(include/linux/netfilter/xt_NFQUEUE.h); GPL-2(include/linux/netfilter/xt_connmark.h); GPL-2(include/linux/netfilter/xt_conntrack.h); GPL-2(include/linux/netfilter/xt_dscp.h); GPL-2(include/linux/netfilter/xt_ecn.h); GPL-2(include/linux/netfilter/xt_osf.h); GPL-2(include/linux/netfilter_ipv4.h); GPL-2(include/linux/netfilter_ipv4/ip_queue.h); GPL-2(include/linux/netfilter_ipv4/ipt_ECN.h); GPL-2(include/linux/netfilter_ipv4/ipt_TTL.h); GPL-2(include/linux/netfilter_ipv4/ipt_ULOG.h); GPL-2(include/linux/netfilter_ipv4/ipt_ttl.h); GPL-2(include/linux/netfilter_ipv6.h); Artistic-2(iptables/iptables-apply); GPL-2(iptables/iptables-save.c); GPL-2(iptables/iptables-xml.c); GPL-2+(iptables/nft.c); GPL-2+(iptables/nft-arp.c); GPL-2+(iptables/nft-bridge.c); GPL-2+(iptables/nft-ipv4.c iptables/nft-ipv6.c iptables/nft-shared.c); GPL-2+(iptables/xtables-arp.c iptables/xtables-eb.c); GPL-2(libiptc/libip4tc.c); GPL-2(libiptc/libip6tc.c); GPL-2(libiptc/libiptc.c); GPL-2(libxtables/xtables.c); GPL-2(libxtables/xtoptions.c); GPL-2(utils/nfsynproxy.c); custom(utils/pf.os); GPL-2(utils/pf.os); GPL-2+(utils/pf.os); Artistic-2(utils/pf.os) | -| {{}} | 1.8.2-3-cl4.3.1u7 | NO COPYRIGHT FILE | -| {{}} | 1.8.2-3-cl4.3.1u7 | GPL-2(* ); GPL-2(extensions/libebt_802_3.c); GPL-2(extensions/libebt_ip.c extensions/libebt_log.c extensions/libebt_mark* .c); GPL-2(extensions/libebt_limit.c); GPL-2(extensions/libebt_nflog.c); GPL-2(extensions/libip6t_DNAT.c); GPL-2(extensions/libip6t_DNPT.c); GPL-2(extensions/libip6t_MASQUERADE.c); GPL-2(extensions/libip6t_NETMAP.c); GPL-2(extensions/libip6t_REDIRECT.c); GPL-2(extensions/libip6t_REJECT.c); GPL-2(extensions/libip6t_SNAT.c); GPL-2(extensions/libip6t_SNPT.c); GPL-2(extensions/libip6t_mh.c); GPL-2(extensions/libipt_CLUSTERIP.c); GPL-2(extensions/libipt_ECN.c); GPL-2(extensions/libipt_REJECT.c); GPL-2(extensions/libipt_TTL.c); GPL-2(extensions/libipt_ULOG.c); GPL-2(extensions/libipt_ttl.c); GPL-2(extensions/libxt_AUDIT.c); GPL-2(extensions/libxt_CHECKSUM.c); GPL-2(extensions/libxt_CLASSIFY.c); GPL-2(extensions/libxt_CONNMARK.c); GPL-2(extensions/libxt_CONNSECMARK.c); GPL-2(extensions/libxt_CT.c); GPL-2(extensions/libxt_DSCP.c); GPL-2(extensions/libxt_HMARK.c); GPL-2(extensions/libxt_IDLETIMER.c); GPL-2(extensions/libxt_LED.c); GPL-2(extensions/libxt_NFQUEUE.c); GPL-2(extensions/libxt_RATEEST.c); GPL-2(extensions/libxt_SECMARK.c); GPL-2(extensions/libxt_SET.c); GPL-2(extensions/libxt_SYNPROXY.c); GPL-2(extensions/libxt_TCPMSS.c); GPL-2(extensions/libxt_TCPOPTSTRIP.c); GPL-2(extensions/libxt_TEE.c); GPL-2(extensions/libxt_TOS.c); GPL-2(extensions/libxt_TPROXY.c); GPL-2(extensions/libxt_addrtype.c); GPL-2(extensions/libxt_bpf.c); GPL-2(extensions/libxt_cluster.c); GPL-2(extensions/libxt_connmark.c); GPL-2(extensions/libxt_conntrack.c); GPL-2(extensions/libxt_dccp.c); GPL-2(extensions/libxt_devgroup.c); GPL-2(extensions/libxt_dscp.c); GPL-2(extensions/libxt_ecn.c); GPL-2(extensions/libxt_hashlimit.c); GPL-2(extensions/libxt_osf.c); GPL-2(extensions/libxt_owner.c); GPL-2(extensions/libxt_policy.c); GPL-2(extensions/libxt_rateest.c); GPL-2(extensions/libxt_sctp.c); GPL-2(extensions/libxt_set.c); GPL-2(extensions/libxt_socket.c); GPL-2(extensions/libxt_statistic.c); GPL-2(extensions/libxt_string.c); GPL-2(extensions/libxt_time.c); GPL-2(extensions/libxt_tos.c); GPL-2(extensions/libxt_u32.c); GPL-2(include/linux/netfilter/ipset/ip_set.h); GPL-2(include/linux/netfilter/xt_AUDIT.h); GPL-2(include/linux/netfilter/xt_CHECKSUM.h); GPL-2(include/linux/netfilter/xt_DSCP.h); GPL-2(include/linux/netfilter/xt_IDLETIMER.h); GPL-2(include/linux/netfilter/xt_NFQUEUE.h); GPL-2(include/linux/netfilter/xt_connmark.h); GPL-2(include/linux/netfilter/xt_conntrack.h); GPL-2(include/linux/netfilter/xt_dscp.h); GPL-2(include/linux/netfilter/xt_ecn.h); GPL-2(include/linux/netfilter/xt_osf.h); GPL-2(include/linux/netfilter_ipv4.h); GPL-2(include/linux/netfilter_ipv4/ip_queue.h); GPL-2(include/linux/netfilter_ipv4/ipt_ECN.h); GPL-2(include/linux/netfilter_ipv4/ipt_TTL.h); GPL-2(include/linux/netfilter_ipv4/ipt_ULOG.h); GPL-2(include/linux/netfilter_ipv4/ipt_ttl.h); GPL-2(include/linux/netfilter_ipv6.h); Artistic-2(iptables/iptables-apply); GPL-2(iptables/iptables-save.c); GPL-2(iptables/iptables-xml.c); GPL-2+(iptables/nft.c); GPL-2+(iptables/nft-arp.c); GPL-2+(iptables/nft-bridge.c); GPL-2+(iptables/nft-ipv4.c iptables/nft-ipv6.c iptables/nft-shared.c); GPL-2+(iptables/xtables-arp.c iptables/xtables-eb.c); GPL-2(libiptc/libip4tc.c); GPL-2(libiptc/libip6tc.c); GPL-2(libiptc/libiptc.c); GPL-2(libxtables/xtables.c); GPL-2(libxtables/xtoptions.c); GPL-2(utils/nfsynproxy.c); custom(utils/pf.os); GPL-2(utils/pf.os); GPL-2+(utils/pf.os); Artistic-2(utils/pf.os) | +| {{}} | 1.8.2-3-cl4.3.2u1 | GPL-2(* ); GPL-2(extensions/libebt_802_3.c); GPL-2(extensions/libebt_ip.c extensions/libebt_log.c extensions/libebt_mark* .c); GPL-2(extensions/libebt_limit.c); GPL-2(extensions/libebt_nflog.c); GPL-2(extensions/libip6t_DNAT.c); GPL-2(extensions/libip6t_DNPT.c); GPL-2(extensions/libip6t_MASQUERADE.c); GPL-2(extensions/libip6t_NETMAP.c); GPL-2(extensions/libip6t_REDIRECT.c); GPL-2(extensions/libip6t_REJECT.c); GPL-2(extensions/libip6t_SNAT.c); GPL-2(extensions/libip6t_SNPT.c); GPL-2(extensions/libip6t_mh.c); GPL-2(extensions/libipt_CLUSTERIP.c); GPL-2(extensions/libipt_ECN.c); GPL-2(extensions/libipt_REJECT.c); GPL-2(extensions/libipt_TTL.c); GPL-2(extensions/libipt_ULOG.c); GPL-2(extensions/libipt_ttl.c); GPL-2(extensions/libxt_AUDIT.c); GPL-2(extensions/libxt_CHECKSUM.c); GPL-2(extensions/libxt_CLASSIFY.c); GPL-2(extensions/libxt_CONNMARK.c); GPL-2(extensions/libxt_CONNSECMARK.c); GPL-2(extensions/libxt_CT.c); GPL-2(extensions/libxt_DSCP.c); GPL-2(extensions/libxt_HMARK.c); GPL-2(extensions/libxt_IDLETIMER.c); GPL-2(extensions/libxt_LED.c); GPL-2(extensions/libxt_NFQUEUE.c); GPL-2(extensions/libxt_RATEEST.c); GPL-2(extensions/libxt_SECMARK.c); GPL-2(extensions/libxt_SET.c); GPL-2(extensions/libxt_SYNPROXY.c); GPL-2(extensions/libxt_TCPMSS.c); GPL-2(extensions/libxt_TCPOPTSTRIP.c); GPL-2(extensions/libxt_TEE.c); GPL-2(extensions/libxt_TOS.c); GPL-2(extensions/libxt_TPROXY.c); GPL-2(extensions/libxt_addrtype.c); GPL-2(extensions/libxt_bpf.c); GPL-2(extensions/libxt_cluster.c); GPL-2(extensions/libxt_connmark.c); GPL-2(extensions/libxt_conntrack.c); GPL-2(extensions/libxt_dccp.c); GPL-2(extensions/libxt_devgroup.c); GPL-2(extensions/libxt_dscp.c); GPL-2(extensions/libxt_ecn.c); GPL-2(extensions/libxt_hashlimit.c); GPL-2(extensions/libxt_osf.c); GPL-2(extensions/libxt_owner.c); GPL-2(extensions/libxt_policy.c); GPL-2(extensions/libxt_rateest.c); GPL-2(extensions/libxt_sctp.c); GPL-2(extensions/libxt_set.c); GPL-2(extensions/libxt_socket.c); GPL-2(extensions/libxt_statistic.c); GPL-2(extensions/libxt_string.c); GPL-2(extensions/libxt_time.c); GPL-2(extensions/libxt_tos.c); GPL-2(extensions/libxt_u32.c); GPL-2(include/linux/netfilter/ipset/ip_set.h); GPL-2(include/linux/netfilter/xt_AUDIT.h); GPL-2(include/linux/netfilter/xt_CHECKSUM.h); GPL-2(include/linux/netfilter/xt_DSCP.h); GPL-2(include/linux/netfilter/xt_IDLETIMER.h); GPL-2(include/linux/netfilter/xt_NFQUEUE.h); GPL-2(include/linux/netfilter/xt_connmark.h); GPL-2(include/linux/netfilter/xt_conntrack.h); GPL-2(include/linux/netfilter/xt_dscp.h); GPL-2(include/linux/netfilter/xt_ecn.h); GPL-2(include/linux/netfilter/xt_osf.h); GPL-2(include/linux/netfilter_ipv4.h); GPL-2(include/linux/netfilter_ipv4/ip_queue.h); GPL-2(include/linux/netfilter_ipv4/ipt_ECN.h); GPL-2(include/linux/netfilter_ipv4/ipt_TTL.h); GPL-2(include/linux/netfilter_ipv4/ipt_ULOG.h); GPL-2(include/linux/netfilter_ipv4/ipt_ttl.h); GPL-2(include/linux/netfilter_ipv6.h); Artistic-2(iptables/iptables-apply); GPL-2(iptables/iptables-save.c); GPL-2(iptables/iptables-xml.c); GPL-2+(iptables/nft.c); GPL-2+(iptables/nft-arp.c); GPL-2+(iptables/nft-bridge.c); GPL-2+(iptables/nft-ipv4.c iptables/nft-ipv6.c iptables/nft-shared.c); GPL-2+(iptables/xtables-arp.c iptables/xtables-eb.c); GPL-2(libiptc/libip4tc.c); GPL-2(libiptc/libip6tc.c); GPL-2(libiptc/libiptc.c); GPL-2(libxtables/xtables.c); GPL-2(libxtables/xtoptions.c); GPL-2(utils/nfsynproxy.c); custom(utils/pf.os); GPL-2(utils/pf.os); GPL-2+(utils/pf.os); Artistic-2(utils/pf.os) | +| {{}} | 1.8.2-3-cl4.3.2u1 | NO COPYRIGHT FILE | +| {{}} | 1.8.2-3-cl4.3.2u1 | GPL-2(* ); GPL-2(extensions/libebt_802_3.c); GPL-2(extensions/libebt_ip.c extensions/libebt_log.c extensions/libebt_mark* .c); GPL-2(extensions/libebt_limit.c); GPL-2(extensions/libebt_nflog.c); GPL-2(extensions/libip6t_DNAT.c); GPL-2(extensions/libip6t_DNPT.c); GPL-2(extensions/libip6t_MASQUERADE.c); GPL-2(extensions/libip6t_NETMAP.c); GPL-2(extensions/libip6t_REDIRECT.c); GPL-2(extensions/libip6t_REJECT.c); GPL-2(extensions/libip6t_SNAT.c); GPL-2(extensions/libip6t_SNPT.c); GPL-2(extensions/libip6t_mh.c); GPL-2(extensions/libipt_CLUSTERIP.c); GPL-2(extensions/libipt_ECN.c); GPL-2(extensions/libipt_REJECT.c); GPL-2(extensions/libipt_TTL.c); GPL-2(extensions/libipt_ULOG.c); GPL-2(extensions/libipt_ttl.c); GPL-2(extensions/libxt_AUDIT.c); GPL-2(extensions/libxt_CHECKSUM.c); GPL-2(extensions/libxt_CLASSIFY.c); GPL-2(extensions/libxt_CONNMARK.c); GPL-2(extensions/libxt_CONNSECMARK.c); GPL-2(extensions/libxt_CT.c); GPL-2(extensions/libxt_DSCP.c); GPL-2(extensions/libxt_HMARK.c); GPL-2(extensions/libxt_IDLETIMER.c); GPL-2(extensions/libxt_LED.c); GPL-2(extensions/libxt_NFQUEUE.c); GPL-2(extensions/libxt_RATEEST.c); GPL-2(extensions/libxt_SECMARK.c); GPL-2(extensions/libxt_SET.c); GPL-2(extensions/libxt_SYNPROXY.c); GPL-2(extensions/libxt_TCPMSS.c); GPL-2(extensions/libxt_TCPOPTSTRIP.c); GPL-2(extensions/libxt_TEE.c); GPL-2(extensions/libxt_TOS.c); GPL-2(extensions/libxt_TPROXY.c); GPL-2(extensions/libxt_addrtype.c); GPL-2(extensions/libxt_bpf.c); GPL-2(extensions/libxt_cluster.c); GPL-2(extensions/libxt_connmark.c); GPL-2(extensions/libxt_conntrack.c); GPL-2(extensions/libxt_dccp.c); GPL-2(extensions/libxt_devgroup.c); GPL-2(extensions/libxt_dscp.c); GPL-2(extensions/libxt_ecn.c); GPL-2(extensions/libxt_hashlimit.c); GPL-2(extensions/libxt_osf.c); GPL-2(extensions/libxt_owner.c); GPL-2(extensions/libxt_policy.c); GPL-2(extensions/libxt_rateest.c); GPL-2(extensions/libxt_sctp.c); GPL-2(extensions/libxt_set.c); GPL-2(extensions/libxt_socket.c); GPL-2(extensions/libxt_statistic.c); GPL-2(extensions/libxt_string.c); GPL-2(extensions/libxt_time.c); GPL-2(extensions/libxt_tos.c); GPL-2(extensions/libxt_u32.c); GPL-2(include/linux/netfilter/ipset/ip_set.h); GPL-2(include/linux/netfilter/xt_AUDIT.h); GPL-2(include/linux/netfilter/xt_CHECKSUM.h); GPL-2(include/linux/netfilter/xt_DSCP.h); GPL-2(include/linux/netfilter/xt_IDLETIMER.h); GPL-2(include/linux/netfilter/xt_NFQUEUE.h); GPL-2(include/linux/netfilter/xt_connmark.h); GPL-2(include/linux/netfilter/xt_conntrack.h); GPL-2(include/linux/netfilter/xt_dscp.h); GPL-2(include/linux/netfilter/xt_ecn.h); GPL-2(include/linux/netfilter/xt_osf.h); GPL-2(include/linux/netfilter_ipv4.h); GPL-2(include/linux/netfilter_ipv4/ip_queue.h); GPL-2(include/linux/netfilter_ipv4/ipt_ECN.h); GPL-2(include/linux/netfilter_ipv4/ipt_TTL.h); GPL-2(include/linux/netfilter_ipv4/ipt_ULOG.h); GPL-2(include/linux/netfilter_ipv4/ipt_ttl.h); GPL-2(include/linux/netfilter_ipv6.h); Artistic-2(iptables/iptables-apply); GPL-2(iptables/iptables-save.c); GPL-2(iptables/iptables-xml.c); GPL-2+(iptables/nft.c); GPL-2+(iptables/nft-arp.c); GPL-2+(iptables/nft-bridge.c); GPL-2+(iptables/nft-ipv4.c iptables/nft-ipv6.c iptables/nft-shared.c); GPL-2+(iptables/xtables-arp.c iptables/xtables-eb.c); GPL-2(libiptc/libip4tc.c); GPL-2(libiptc/libip6tc.c); GPL-2(libiptc/libiptc.c); GPL-2(libxtables/xtables.c); GPL-2(libxtables/xtoptions.c); GPL-2(utils/nfsynproxy.c); custom(utils/pf.os); GPL-2(utils/pf.os); GPL-2+(utils/pf.os); Artistic-2(utils/pf.os) | +| {{}} | 1.8.2-3-cl4.3.2u1 | GPL-2(* ); GPL-2(extensions/libebt_802_3.c); GPL-2(extensions/libebt_ip.c extensions/libebt_log.c extensions/libebt_mark* .c); GPL-2(extensions/libebt_limit.c); GPL-2(extensions/libebt_nflog.c); GPL-2(extensions/libip6t_DNAT.c); GPL-2(extensions/libip6t_DNPT.c); GPL-2(extensions/libip6t_MASQUERADE.c); GPL-2(extensions/libip6t_NETMAP.c); GPL-2(extensions/libip6t_REDIRECT.c); GPL-2(extensions/libip6t_REJECT.c); GPL-2(extensions/libip6t_SNAT.c); GPL-2(extensions/libip6t_SNPT.c); GPL-2(extensions/libip6t_mh.c); GPL-2(extensions/libipt_CLUSTERIP.c); GPL-2(extensions/libipt_ECN.c); GPL-2(extensions/libipt_REJECT.c); GPL-2(extensions/libipt_TTL.c); GPL-2(extensions/libipt_ULOG.c); GPL-2(extensions/libipt_ttl.c); GPL-2(extensions/libxt_AUDIT.c); GPL-2(extensions/libxt_CHECKSUM.c); GPL-2(extensions/libxt_CLASSIFY.c); GPL-2(extensions/libxt_CONNMARK.c); GPL-2(extensions/libxt_CONNSECMARK.c); GPL-2(extensions/libxt_CT.c); GPL-2(extensions/libxt_DSCP.c); GPL-2(extensions/libxt_HMARK.c); GPL-2(extensions/libxt_IDLETIMER.c); GPL-2(extensions/libxt_LED.c); GPL-2(extensions/libxt_NFQUEUE.c); GPL-2(extensions/libxt_RATEEST.c); GPL-2(extensions/libxt_SECMARK.c); GPL-2(extensions/libxt_SET.c); GPL-2(extensions/libxt_SYNPROXY.c); GPL-2(extensions/libxt_TCPMSS.c); GPL-2(extensions/libxt_TCPOPTSTRIP.c); GPL-2(extensions/libxt_TEE.c); GPL-2(extensions/libxt_TOS.c); GPL-2(extensions/libxt_TPROXY.c); GPL-2(extensions/libxt_addrtype.c); GPL-2(extensions/libxt_bpf.c); GPL-2(extensions/libxt_cluster.c); GPL-2(extensions/libxt_connmark.c); GPL-2(extensions/libxt_conntrack.c); GPL-2(extensions/libxt_dccp.c); GPL-2(extensions/libxt_devgroup.c); GPL-2(extensions/libxt_dscp.c); GPL-2(extensions/libxt_ecn.c); GPL-2(extensions/libxt_hashlimit.c); GPL-2(extensions/libxt_osf.c); GPL-2(extensions/libxt_owner.c); GPL-2(extensions/libxt_policy.c); GPL-2(extensions/libxt_rateest.c); GPL-2(extensions/libxt_sctp.c); GPL-2(extensions/libxt_set.c); GPL-2(extensions/libxt_socket.c); GPL-2(extensions/libxt_statistic.c); GPL-2(extensions/libxt_string.c); GPL-2(extensions/libxt_time.c); GPL-2(extensions/libxt_tos.c); GPL-2(extensions/libxt_u32.c); GPL-2(include/linux/netfilter/ipset/ip_set.h); GPL-2(include/linux/netfilter/xt_AUDIT.h); GPL-2(include/linux/netfilter/xt_CHECKSUM.h); GPL-2(include/linux/netfilter/xt_DSCP.h); GPL-2(include/linux/netfilter/xt_IDLETIMER.h); GPL-2(include/linux/netfilter/xt_NFQUEUE.h); GPL-2(include/linux/netfilter/xt_connmark.h); GPL-2(include/linux/netfilter/xt_conntrack.h); GPL-2(include/linux/netfilter/xt_dscp.h); GPL-2(include/linux/netfilter/xt_ecn.h); GPL-2(include/linux/netfilter/xt_osf.h); GPL-2(include/linux/netfilter_ipv4.h); GPL-2(include/linux/netfilter_ipv4/ip_queue.h); GPL-2(include/linux/netfilter_ipv4/ipt_ECN.h); GPL-2(include/linux/netfilter_ipv4/ipt_TTL.h); GPL-2(include/linux/netfilter_ipv4/ipt_ULOG.h); GPL-2(include/linux/netfilter_ipv4/ipt_ttl.h); GPL-2(include/linux/netfilter_ipv6.h); Artistic-2(iptables/iptables-apply); GPL-2(iptables/iptables-save.c); GPL-2(iptables/iptables-xml.c); GPL-2+(iptables/nft.c); GPL-2+(iptables/nft-arp.c); GPL-2+(iptables/nft-bridge.c); GPL-2+(iptables/nft-ipv4.c iptables/nft-ipv6.c iptables/nft-shared.c); GPL-2+(iptables/xtables-arp.c iptables/xtables-eb.c); GPL-2(libiptc/libip4tc.c); GPL-2(libiptc/libip6tc.c); GPL-2(libiptc/libiptc.c); GPL-2(libxtables/xtables.c); GPL-2(libxtables/xtoptions.c); GPL-2(utils/nfsynproxy.c); custom(utils/pf.os); GPL-2(utils/pf.os); GPL-2+(utils/pf.os); Artistic-2(utils/pf.os) | +| {{}} | 1.8.2-3-cl4.3.2u1 | NO COPYRIGHT FILE | +| {{}} | 1.8.2-3-cl4.3.2u1 | GPL-2(* ); GPL-2(extensions/libebt_802_3.c); GPL-2(extensions/libebt_ip.c extensions/libebt_log.c extensions/libebt_mark* .c); GPL-2(extensions/libebt_limit.c); GPL-2(extensions/libebt_nflog.c); GPL-2(extensions/libip6t_DNAT.c); GPL-2(extensions/libip6t_DNPT.c); GPL-2(extensions/libip6t_MASQUERADE.c); GPL-2(extensions/libip6t_NETMAP.c); GPL-2(extensions/libip6t_REDIRECT.c); GPL-2(extensions/libip6t_REJECT.c); GPL-2(extensions/libip6t_SNAT.c); GPL-2(extensions/libip6t_SNPT.c); GPL-2(extensions/libip6t_mh.c); GPL-2(extensions/libipt_CLUSTERIP.c); GPL-2(extensions/libipt_ECN.c); GPL-2(extensions/libipt_REJECT.c); GPL-2(extensions/libipt_TTL.c); GPL-2(extensions/libipt_ULOG.c); GPL-2(extensions/libipt_ttl.c); GPL-2(extensions/libxt_AUDIT.c); GPL-2(extensions/libxt_CHECKSUM.c); GPL-2(extensions/libxt_CLASSIFY.c); GPL-2(extensions/libxt_CONNMARK.c); GPL-2(extensions/libxt_CONNSECMARK.c); GPL-2(extensions/libxt_CT.c); GPL-2(extensions/libxt_DSCP.c); GPL-2(extensions/libxt_HMARK.c); GPL-2(extensions/libxt_IDLETIMER.c); GPL-2(extensions/libxt_LED.c); GPL-2(extensions/libxt_NFQUEUE.c); GPL-2(extensions/libxt_RATEEST.c); GPL-2(extensions/libxt_SECMARK.c); GPL-2(extensions/libxt_SET.c); GPL-2(extensions/libxt_SYNPROXY.c); GPL-2(extensions/libxt_TCPMSS.c); GPL-2(extensions/libxt_TCPOPTSTRIP.c); GPL-2(extensions/libxt_TEE.c); GPL-2(extensions/libxt_TOS.c); GPL-2(extensions/libxt_TPROXY.c); GPL-2(extensions/libxt_addrtype.c); GPL-2(extensions/libxt_bpf.c); GPL-2(extensions/libxt_cluster.c); GPL-2(extensions/libxt_connmark.c); GPL-2(extensions/libxt_conntrack.c); GPL-2(extensions/libxt_dccp.c); GPL-2(extensions/libxt_devgroup.c); GPL-2(extensions/libxt_dscp.c); GPL-2(extensions/libxt_ecn.c); GPL-2(extensions/libxt_hashlimit.c); GPL-2(extensions/libxt_osf.c); GPL-2(extensions/libxt_owner.c); GPL-2(extensions/libxt_policy.c); GPL-2(extensions/libxt_rateest.c); GPL-2(extensions/libxt_sctp.c); GPL-2(extensions/libxt_set.c); GPL-2(extensions/libxt_socket.c); GPL-2(extensions/libxt_statistic.c); GPL-2(extensions/libxt_string.c); GPL-2(extensions/libxt_time.c); GPL-2(extensions/libxt_tos.c); GPL-2(extensions/libxt_u32.c); GPL-2(include/linux/netfilter/ipset/ip_set.h); GPL-2(include/linux/netfilter/xt_AUDIT.h); GPL-2(include/linux/netfilter/xt_CHECKSUM.h); GPL-2(include/linux/netfilter/xt_DSCP.h); GPL-2(include/linux/netfilter/xt_IDLETIMER.h); GPL-2(include/linux/netfilter/xt_NFQUEUE.h); GPL-2(include/linux/netfilter/xt_connmark.h); GPL-2(include/linux/netfilter/xt_conntrack.h); GPL-2(include/linux/netfilter/xt_dscp.h); GPL-2(include/linux/netfilter/xt_ecn.h); GPL-2(include/linux/netfilter/xt_osf.h); GPL-2(include/linux/netfilter_ipv4.h); GPL-2(include/linux/netfilter_ipv4/ip_queue.h); GPL-2(include/linux/netfilter_ipv4/ipt_ECN.h); GPL-2(include/linux/netfilter_ipv4/ipt_TTL.h); GPL-2(include/linux/netfilter_ipv4/ipt_ULOG.h); GPL-2(include/linux/netfilter_ipv4/ipt_ttl.h); GPL-2(include/linux/netfilter_ipv6.h); Artistic-2(iptables/iptables-apply); GPL-2(iptables/iptables-save.c); GPL-2(iptables/iptables-xml.c); GPL-2+(iptables/nft.c); GPL-2+(iptables/nft-arp.c); GPL-2+(iptables/nft-bridge.c); GPL-2+(iptables/nft-ipv4.c iptables/nft-ipv6.c iptables/nft-shared.c); GPL-2+(iptables/xtables-arp.c iptables/xtables-eb.c); GPL-2(libiptc/libip4tc.c); GPL-2(libiptc/libip6tc.c); GPL-2(libiptc/libiptc.c); GPL-2(libxtables/xtables.c); GPL-2(libxtables/xtoptions.c); GPL-2(utils/nfsynproxy.c); custom(utils/pf.os); GPL-2(utils/pf.os); GPL-2+(utils/pf.os); Artistic-2(utils/pf.os) | | {{}} | 20180523.0-1 | Artistic or GPL-1+(* ); Artistic or GPL-2(lib/IPC/Run/Win32* .pm); Artistic or GPL-1+(debian/* ); Artistic(debian/* ); GPL-1+(debian/* ); GPL-2(debian/* ) | -| {{}} | 3.6-2 | BSD-3-clause(* ); NCSA(src/units.c); BSD-2-clause(src/dscp.c); MIT/X11(src/cjson.* ); GPL-2+(aclocal.m4 * Makefile.in config/* configure); GPL-3(config/config.* ); BSD-3-clause(docs/_esnet/* ); MIT(config/install-sh); permissive(config/ax_check_openssl.m4); public-domain(config/mkinstalldirs); public-domain(src/portable_endian.h); GPL-2+(debian/* ); GPL-2+(debian/* ); GPL-3(debian/* ); NCSA(debian/* ); BSD-2-clause(debian/* ); BSD-3-clause(debian/* ) | +| {{}} | 3.6-2+deb10u1 | BSD-3-clause(* ); NCSA(src/units.c); BSD-2-clause(src/dscp.c); MIT/X11(src/cjson.* ); GPL-2+(aclocal.m4 * Makefile.in config/* configure); GPL-3(config/config.* ); BSD-3-clause(docs/_esnet/* ); MIT(config/install-sh); permissive(config/ax_check_openssl.m4); public-domain(config/mkinstalldirs); public-domain(src/portable_endian.h); GPL-2+(debian/* ); GPL-2+(debian/* ); GPL-3(debian/* ); NCSA(debian/* ); BSD-2-clause(debian/* ); BSD-3-clause(debian/* ) | | {{}} | 2.0-2 | Expat(* ); Expat(debian/* ); Expat(debian/* ) | -| {{}} | 1.8.2-3-cl4.3.1u7 | GPL-2(* ); GPL-2(extensions/libebt_802_3.c); GPL-2(extensions/libebt_ip.c extensions/libebt_log.c extensions/libebt_mark* .c); GPL-2(extensions/libebt_limit.c); GPL-2(extensions/libebt_nflog.c); GPL-2(extensions/libip6t_DNAT.c); GPL-2(extensions/libip6t_DNPT.c); GPL-2(extensions/libip6t_MASQUERADE.c); GPL-2(extensions/libip6t_NETMAP.c); GPL-2(extensions/libip6t_REDIRECT.c); GPL-2(extensions/libip6t_REJECT.c); GPL-2(extensions/libip6t_SNAT.c); GPL-2(extensions/libip6t_SNPT.c); GPL-2(extensions/libip6t_mh.c); GPL-2(extensions/libipt_CLUSTERIP.c); GPL-2(extensions/libipt_ECN.c); GPL-2(extensions/libipt_REJECT.c); GPL-2(extensions/libipt_TTL.c); GPL-2(extensions/libipt_ULOG.c); GPL-2(extensions/libipt_ttl.c); GPL-2(extensions/libxt_AUDIT.c); GPL-2(extensions/libxt_CHECKSUM.c); GPL-2(extensions/libxt_CLASSIFY.c); GPL-2(extensions/libxt_CONNMARK.c); GPL-2(extensions/libxt_CONNSECMARK.c); GPL-2(extensions/libxt_CT.c); GPL-2(extensions/libxt_DSCP.c); GPL-2(extensions/libxt_HMARK.c); GPL-2(extensions/libxt_IDLETIMER.c); GPL-2(extensions/libxt_LED.c); GPL-2(extensions/libxt_NFQUEUE.c); GPL-2(extensions/libxt_RATEEST.c); GPL-2(extensions/libxt_SECMARK.c); GPL-2(extensions/libxt_SET.c); GPL-2(extensions/libxt_SYNPROXY.c); GPL-2(extensions/libxt_TCPMSS.c); GPL-2(extensions/libxt_TCPOPTSTRIP.c); GPL-2(extensions/libxt_TEE.c); GPL-2(extensions/libxt_TOS.c); GPL-2(extensions/libxt_TPROXY.c); GPL-2(extensions/libxt_addrtype.c); GPL-2(extensions/libxt_bpf.c); GPL-2(extensions/libxt_cluster.c); GPL-2(extensions/libxt_connmark.c); GPL-2(extensions/libxt_conntrack.c); GPL-2(extensions/libxt_dccp.c); GPL-2(extensions/libxt_devgroup.c); GPL-2(extensions/libxt_dscp.c); GPL-2(extensions/libxt_ecn.c); GPL-2(extensions/libxt_hashlimit.c); GPL-2(extensions/libxt_osf.c); GPL-2(extensions/libxt_owner.c); GPL-2(extensions/libxt_policy.c); GPL-2(extensions/libxt_rateest.c); GPL-2(extensions/libxt_sctp.c); GPL-2(extensions/libxt_set.c); GPL-2(extensions/libxt_socket.c); GPL-2(extensions/libxt_statistic.c); GPL-2(extensions/libxt_string.c); GPL-2(extensions/libxt_time.c); GPL-2(extensions/libxt_tos.c); GPL-2(extensions/libxt_u32.c); GPL-2(include/linux/netfilter/ipset/ip_set.h); GPL-2(include/linux/netfilter/xt_AUDIT.h); GPL-2(include/linux/netfilter/xt_CHECKSUM.h); GPL-2(include/linux/netfilter/xt_DSCP.h); GPL-2(include/linux/netfilter/xt_IDLETIMER.h); GPL-2(include/linux/netfilter/xt_NFQUEUE.h); GPL-2(include/linux/netfilter/xt_connmark.h); GPL-2(include/linux/netfilter/xt_conntrack.h); GPL-2(include/linux/netfilter/xt_dscp.h); GPL-2(include/linux/netfilter/xt_ecn.h); GPL-2(include/linux/netfilter/xt_osf.h); GPL-2(include/linux/netfilter_ipv4.h); GPL-2(include/linux/netfilter_ipv4/ip_queue.h); GPL-2(include/linux/netfilter_ipv4/ipt_ECN.h); GPL-2(include/linux/netfilter_ipv4/ipt_TTL.h); GPL-2(include/linux/netfilter_ipv4/ipt_ULOG.h); GPL-2(include/linux/netfilter_ipv4/ipt_ttl.h); GPL-2(include/linux/netfilter_ipv6.h); Artistic-2(iptables/iptables-apply); GPL-2(iptables/iptables-save.c); GPL-2(iptables/iptables-xml.c); GPL-2+(iptables/nft.c); GPL-2+(iptables/nft-arp.c); GPL-2+(iptables/nft-bridge.c); GPL-2+(iptables/nft-ipv4.c iptables/nft-ipv6.c iptables/nft-shared.c); GPL-2+(iptables/xtables-arp.c iptables/xtables-eb.c); GPL-2(libiptc/libip4tc.c); GPL-2(libiptc/libip6tc.c); GPL-2(libiptc/libiptc.c); GPL-2(libxtables/xtables.c); GPL-2(libxtables/xtoptions.c); GPL-2(utils/nfsynproxy.c); custom(utils/pf.os); GPL-2(utils/pf.os); GPL-2+(utils/pf.os); Artistic-2(utils/pf.os) | -| {{}} | 1.8.2-3-cl4.3.1u7 | NO COPYRIGHT FILE | -| {{}} | 1.8.2-3-cl4.3.1u7 | GPL-2(* ); GPL-2(extensions/libebt_802_3.c); GPL-2(extensions/libebt_ip.c extensions/libebt_log.c extensions/libebt_mark* .c); GPL-2(extensions/libebt_limit.c); GPL-2(extensions/libebt_nflog.c); GPL-2(extensions/libip6t_DNAT.c); GPL-2(extensions/libip6t_DNPT.c); GPL-2(extensions/libip6t_MASQUERADE.c); GPL-2(extensions/libip6t_NETMAP.c); GPL-2(extensions/libip6t_REDIRECT.c); GPL-2(extensions/libip6t_REJECT.c); GPL-2(extensions/libip6t_SNAT.c); GPL-2(extensions/libip6t_SNPT.c); GPL-2(extensions/libip6t_mh.c); GPL-2(extensions/libipt_CLUSTERIP.c); GPL-2(extensions/libipt_ECN.c); GPL-2(extensions/libipt_REJECT.c); GPL-2(extensions/libipt_TTL.c); GPL-2(extensions/libipt_ULOG.c); GPL-2(extensions/libipt_ttl.c); GPL-2(extensions/libxt_AUDIT.c); GPL-2(extensions/libxt_CHECKSUM.c); GPL-2(extensions/libxt_CLASSIFY.c); GPL-2(extensions/libxt_CONNMARK.c); GPL-2(extensions/libxt_CONNSECMARK.c); GPL-2(extensions/libxt_CT.c); GPL-2(extensions/libxt_DSCP.c); GPL-2(extensions/libxt_HMARK.c); GPL-2(extensions/libxt_IDLETIMER.c); GPL-2(extensions/libxt_LED.c); GPL-2(extensions/libxt_NFQUEUE.c); GPL-2(extensions/libxt_RATEEST.c); GPL-2(extensions/libxt_SECMARK.c); GPL-2(extensions/libxt_SET.c); GPL-2(extensions/libxt_SYNPROXY.c); GPL-2(extensions/libxt_TCPMSS.c); GPL-2(extensions/libxt_TCPOPTSTRIP.c); GPL-2(extensions/libxt_TEE.c); GPL-2(extensions/libxt_TOS.c); GPL-2(extensions/libxt_TPROXY.c); GPL-2(extensions/libxt_addrtype.c); GPL-2(extensions/libxt_bpf.c); GPL-2(extensions/libxt_cluster.c); GPL-2(extensions/libxt_connmark.c); GPL-2(extensions/libxt_conntrack.c); GPL-2(extensions/libxt_dccp.c); GPL-2(extensions/libxt_devgroup.c); GPL-2(extensions/libxt_dscp.c); GPL-2(extensions/libxt_ecn.c); GPL-2(extensions/libxt_hashlimit.c); GPL-2(extensions/libxt_osf.c); GPL-2(extensions/libxt_owner.c); GPL-2(extensions/libxt_policy.c); GPL-2(extensions/libxt_rateest.c); GPL-2(extensions/libxt_sctp.c); GPL-2(extensions/libxt_set.c); GPL-2(extensions/libxt_socket.c); GPL-2(extensions/libxt_statistic.c); GPL-2(extensions/libxt_string.c); GPL-2(extensions/libxt_time.c); GPL-2(extensions/libxt_tos.c); GPL-2(extensions/libxt_u32.c); GPL-2(include/linux/netfilter/ipset/ip_set.h); GPL-2(include/linux/netfilter/xt_AUDIT.h); GPL-2(include/linux/netfilter/xt_CHECKSUM.h); GPL-2(include/linux/netfilter/xt_DSCP.h); GPL-2(include/linux/netfilter/xt_IDLETIMER.h); GPL-2(include/linux/netfilter/xt_NFQUEUE.h); GPL-2(include/linux/netfilter/xt_connmark.h); GPL-2(include/linux/netfilter/xt_conntrack.h); GPL-2(include/linux/netfilter/xt_dscp.h); GPL-2(include/linux/netfilter/xt_ecn.h); GPL-2(include/linux/netfilter/xt_osf.h); GPL-2(include/linux/netfilter_ipv4.h); GPL-2(include/linux/netfilter_ipv4/ip_queue.h); GPL-2(include/linux/netfilter_ipv4/ipt_ECN.h); GPL-2(include/linux/netfilter_ipv4/ipt_TTL.h); GPL-2(include/linux/netfilter_ipv4/ipt_ULOG.h); GPL-2(include/linux/netfilter_ipv4/ipt_ttl.h); GPL-2(include/linux/netfilter_ipv6.h); Artistic-2(iptables/iptables-apply); GPL-2(iptables/iptables-save.c); GPL-2(iptables/iptables-xml.c); GPL-2+(iptables/nft.c); GPL-2+(iptables/nft-arp.c); GPL-2+(iptables/nft-bridge.c); GPL-2+(iptables/nft-ipv4.c iptables/nft-ipv6.c iptables/nft-shared.c); GPL-2+(iptables/xtables-arp.c iptables/xtables-eb.c); GPL-2(libiptc/libip4tc.c); GPL-2(libiptc/libip6tc.c); GPL-2(libiptc/libiptc.c); GPL-2(libxtables/xtables.c); GPL-2(libxtables/xtoptions.c); GPL-2(utils/nfsynproxy.c); custom(utils/pf.os); GPL-2(utils/pf.os); GPL-2+(utils/pf.os); Artistic-2(utils/pf.os) | -| {{}} | 9.11.5.P4+dfsg-5.1+deb10u7 | ISC and BSD-2-clause and BSD-3-clause and BSD-4-clause(* ); MPL-2.0 or ISC(bin/tests/system/chain/); BSD-2-clause(unit/atf-src/); BSD-4-clause(contrib/idn/); ISC or MPL-2.0(debian/); ISC(debian/); BSD-2-clause(debian/); BSD-3-clause(debian/); BSD-4-clause(debian/); MPL-2.0(debian/) | -| {{}} | 9.11.5.P4+dfsg-5.1+deb10u7 | ISC and BSD-2-clause and BSD-3-clause and BSD-4-clause(* ); MPL-2.0 or ISC(bin/tests/system/chain/); BSD-2-clause(unit/atf-src/); BSD-4-clause(contrib/idn/); ISC or MPL-2.0(debian/); ISC(debian/); BSD-2-clause(debian/); BSD-3-clause(debian/); BSD-4-clause(debian/); MPL-2.0(debian/) | -| {{}} | 9.11.5.P4+dfsg-5.1+deb10u7 | ISC and BSD-2-clause and BSD-3-clause and BSD-4-clause(* ); MPL-2.0 or ISC(bin/tests/system/chain/); BSD-2-clause(unit/atf-src/); BSD-4-clause(contrib/idn/); ISC or MPL-2.0(debian/); ISC(debian/); BSD-2-clause(debian/); BSD-3-clause(debian/); BSD-4-clause(debian/); MPL-2.0(debian/) | -| {{}} | 9.11.5.P4+dfsg-5.1+deb10u7 | ISC and BSD-2-clause and BSD-3-clause and BSD-4-clause(* ); MPL-2.0 or ISC(bin/tests/system/chain/); BSD-2-clause(unit/atf-src/); BSD-4-clause(contrib/idn/); ISC or MPL-2.0(debian/); ISC(debian/); BSD-2-clause(debian/); BSD-3-clause(debian/); BSD-4-clause(debian/); MPL-2.0(debian/) | -| {{}} | 9.11.5.P4+dfsg-5.1+deb10u7 | ISC and BSD-2-clause and BSD-3-clause and BSD-4-clause(* ); MPL-2.0 or ISC(bin/tests/system/chain/); BSD-2-clause(unit/atf-src/); BSD-4-clause(contrib/idn/); ISC or MPL-2.0(debian/); ISC(debian/); BSD-2-clause(debian/); BSD-3-clause(debian/); BSD-4-clause(debian/); MPL-2.0(debian/) | -| {{}} | 9.11.5.P4+dfsg-5.1+deb10u7 | ISC and BSD-2-clause and BSD-3-clause and BSD-4-clause(* ); MPL-2.0 or ISC(bin/tests/system/chain/); BSD-2-clause(unit/atf-src/); BSD-4-clause(contrib/idn/); ISC or MPL-2.0(debian/); ISC(debian/); BSD-2-clause(debian/); BSD-3-clause(debian/); BSD-4-clause(debian/); MPL-2.0(debian/) | -| {{}} | 9.11.5.P4+dfsg-5.1+deb10u7 | ISC and BSD-2-clause and BSD-3-clause and BSD-4-clause(* ); MPL-2.0 or ISC(bin/tests/system/chain/); BSD-2-clause(unit/atf-src/); BSD-4-clause(contrib/idn/); ISC or MPL-2.0(debian/); ISC(debian/); BSD-2-clause(debian/); BSD-3-clause(debian/); BSD-4-clause(debian/); MPL-2.0(debian/) | -| {{}} | 9.11.5.P4+dfsg-5.1+deb10u7 | ISC and BSD-2-clause and BSD-3-clause and BSD-4-clause(* ); MPL-2.0 or ISC(bin/tests/system/chain/); BSD-2-clause(unit/atf-src/); BSD-4-clause(contrib/idn/); ISC or MPL-2.0(debian/); ISC(debian/); BSD-2-clause(debian/); BSD-3-clause(debian/); BSD-4-clause(debian/); MPL-2.0(debian/) | +| {{}} | 1.8.2-3-cl4.3.2u1 | GPL-2(* ); GPL-2(extensions/libebt_802_3.c); GPL-2(extensions/libebt_ip.c extensions/libebt_log.c extensions/libebt_mark* .c); GPL-2(extensions/libebt_limit.c); GPL-2(extensions/libebt_nflog.c); GPL-2(extensions/libip6t_DNAT.c); GPL-2(extensions/libip6t_DNPT.c); GPL-2(extensions/libip6t_MASQUERADE.c); GPL-2(extensions/libip6t_NETMAP.c); GPL-2(extensions/libip6t_REDIRECT.c); GPL-2(extensions/libip6t_REJECT.c); GPL-2(extensions/libip6t_SNAT.c); GPL-2(extensions/libip6t_SNPT.c); GPL-2(extensions/libip6t_mh.c); GPL-2(extensions/libipt_CLUSTERIP.c); GPL-2(extensions/libipt_ECN.c); GPL-2(extensions/libipt_REJECT.c); GPL-2(extensions/libipt_TTL.c); GPL-2(extensions/libipt_ULOG.c); GPL-2(extensions/libipt_ttl.c); GPL-2(extensions/libxt_AUDIT.c); GPL-2(extensions/libxt_CHECKSUM.c); GPL-2(extensions/libxt_CLASSIFY.c); GPL-2(extensions/libxt_CONNMARK.c); GPL-2(extensions/libxt_CONNSECMARK.c); GPL-2(extensions/libxt_CT.c); GPL-2(extensions/libxt_DSCP.c); GPL-2(extensions/libxt_HMARK.c); GPL-2(extensions/libxt_IDLETIMER.c); GPL-2(extensions/libxt_LED.c); GPL-2(extensions/libxt_NFQUEUE.c); GPL-2(extensions/libxt_RATEEST.c); GPL-2(extensions/libxt_SECMARK.c); GPL-2(extensions/libxt_SET.c); GPL-2(extensions/libxt_SYNPROXY.c); GPL-2(extensions/libxt_TCPMSS.c); GPL-2(extensions/libxt_TCPOPTSTRIP.c); GPL-2(extensions/libxt_TEE.c); GPL-2(extensions/libxt_TOS.c); GPL-2(extensions/libxt_TPROXY.c); GPL-2(extensions/libxt_addrtype.c); GPL-2(extensions/libxt_bpf.c); GPL-2(extensions/libxt_cluster.c); GPL-2(extensions/libxt_connmark.c); GPL-2(extensions/libxt_conntrack.c); GPL-2(extensions/libxt_dccp.c); GPL-2(extensions/libxt_devgroup.c); GPL-2(extensions/libxt_dscp.c); GPL-2(extensions/libxt_ecn.c); GPL-2(extensions/libxt_hashlimit.c); GPL-2(extensions/libxt_osf.c); GPL-2(extensions/libxt_owner.c); GPL-2(extensions/libxt_policy.c); GPL-2(extensions/libxt_rateest.c); GPL-2(extensions/libxt_sctp.c); GPL-2(extensions/libxt_set.c); GPL-2(extensions/libxt_socket.c); GPL-2(extensions/libxt_statistic.c); GPL-2(extensions/libxt_string.c); GPL-2(extensions/libxt_time.c); GPL-2(extensions/libxt_tos.c); GPL-2(extensions/libxt_u32.c); GPL-2(include/linux/netfilter/ipset/ip_set.h); GPL-2(include/linux/netfilter/xt_AUDIT.h); GPL-2(include/linux/netfilter/xt_CHECKSUM.h); GPL-2(include/linux/netfilter/xt_DSCP.h); GPL-2(include/linux/netfilter/xt_IDLETIMER.h); GPL-2(include/linux/netfilter/xt_NFQUEUE.h); GPL-2(include/linux/netfilter/xt_connmark.h); GPL-2(include/linux/netfilter/xt_conntrack.h); GPL-2(include/linux/netfilter/xt_dscp.h); GPL-2(include/linux/netfilter/xt_ecn.h); GPL-2(include/linux/netfilter/xt_osf.h); GPL-2(include/linux/netfilter_ipv4.h); GPL-2(include/linux/netfilter_ipv4/ip_queue.h); GPL-2(include/linux/netfilter_ipv4/ipt_ECN.h); GPL-2(include/linux/netfilter_ipv4/ipt_TTL.h); GPL-2(include/linux/netfilter_ipv4/ipt_ULOG.h); GPL-2(include/linux/netfilter_ipv4/ipt_ttl.h); GPL-2(include/linux/netfilter_ipv6.h); Artistic-2(iptables/iptables-apply); GPL-2(iptables/iptables-save.c); GPL-2(iptables/iptables-xml.c); GPL-2+(iptables/nft.c); GPL-2+(iptables/nft-arp.c); GPL-2+(iptables/nft-bridge.c); GPL-2+(iptables/nft-ipv4.c iptables/nft-ipv6.c iptables/nft-shared.c); GPL-2+(iptables/xtables-arp.c iptables/xtables-eb.c); GPL-2(libiptc/libip4tc.c); GPL-2(libiptc/libip6tc.c); GPL-2(libiptc/libiptc.c); GPL-2(libxtables/xtables.c); GPL-2(libxtables/xtoptions.c); GPL-2(utils/nfsynproxy.c); custom(utils/pf.os); GPL-2(utils/pf.os); GPL-2+(utils/pf.os); Artistic-2(utils/pf.os) | +| {{}} | 1.8.2-3-cl4.3.2u1 | NO COPYRIGHT FILE | +| {{}} | 1.8.2-3-cl4.3.2u1 | GPL-2(* ); GPL-2(extensions/libebt_802_3.c); GPL-2(extensions/libebt_ip.c extensions/libebt_log.c extensions/libebt_mark* .c); GPL-2(extensions/libebt_limit.c); GPL-2(extensions/libebt_nflog.c); GPL-2(extensions/libip6t_DNAT.c); GPL-2(extensions/libip6t_DNPT.c); GPL-2(extensions/libip6t_MASQUERADE.c); GPL-2(extensions/libip6t_NETMAP.c); GPL-2(extensions/libip6t_REDIRECT.c); GPL-2(extensions/libip6t_REJECT.c); GPL-2(extensions/libip6t_SNAT.c); GPL-2(extensions/libip6t_SNPT.c); GPL-2(extensions/libip6t_mh.c); GPL-2(extensions/libipt_CLUSTERIP.c); GPL-2(extensions/libipt_ECN.c); GPL-2(extensions/libipt_REJECT.c); GPL-2(extensions/libipt_TTL.c); GPL-2(extensions/libipt_ULOG.c); GPL-2(extensions/libipt_ttl.c); GPL-2(extensions/libxt_AUDIT.c); GPL-2(extensions/libxt_CHECKSUM.c); GPL-2(extensions/libxt_CLASSIFY.c); GPL-2(extensions/libxt_CONNMARK.c); GPL-2(extensions/libxt_CONNSECMARK.c); GPL-2(extensions/libxt_CT.c); GPL-2(extensions/libxt_DSCP.c); GPL-2(extensions/libxt_HMARK.c); GPL-2(extensions/libxt_IDLETIMER.c); GPL-2(extensions/libxt_LED.c); GPL-2(extensions/libxt_NFQUEUE.c); GPL-2(extensions/libxt_RATEEST.c); GPL-2(extensions/libxt_SECMARK.c); GPL-2(extensions/libxt_SET.c); GPL-2(extensions/libxt_SYNPROXY.c); GPL-2(extensions/libxt_TCPMSS.c); GPL-2(extensions/libxt_TCPOPTSTRIP.c); GPL-2(extensions/libxt_TEE.c); GPL-2(extensions/libxt_TOS.c); GPL-2(extensions/libxt_TPROXY.c); GPL-2(extensions/libxt_addrtype.c); GPL-2(extensions/libxt_bpf.c); GPL-2(extensions/libxt_cluster.c); GPL-2(extensions/libxt_connmark.c); GPL-2(extensions/libxt_conntrack.c); GPL-2(extensions/libxt_dccp.c); GPL-2(extensions/libxt_devgroup.c); GPL-2(extensions/libxt_dscp.c); GPL-2(extensions/libxt_ecn.c); GPL-2(extensions/libxt_hashlimit.c); GPL-2(extensions/libxt_osf.c); GPL-2(extensions/libxt_owner.c); GPL-2(extensions/libxt_policy.c); GPL-2(extensions/libxt_rateest.c); GPL-2(extensions/libxt_sctp.c); GPL-2(extensions/libxt_set.c); GPL-2(extensions/libxt_socket.c); GPL-2(extensions/libxt_statistic.c); GPL-2(extensions/libxt_string.c); GPL-2(extensions/libxt_time.c); GPL-2(extensions/libxt_tos.c); GPL-2(extensions/libxt_u32.c); GPL-2(include/linux/netfilter/ipset/ip_set.h); GPL-2(include/linux/netfilter/xt_AUDIT.h); GPL-2(include/linux/netfilter/xt_CHECKSUM.h); GPL-2(include/linux/netfilter/xt_DSCP.h); GPL-2(include/linux/netfilter/xt_IDLETIMER.h); GPL-2(include/linux/netfilter/xt_NFQUEUE.h); GPL-2(include/linux/netfilter/xt_connmark.h); GPL-2(include/linux/netfilter/xt_conntrack.h); GPL-2(include/linux/netfilter/xt_dscp.h); GPL-2(include/linux/netfilter/xt_ecn.h); GPL-2(include/linux/netfilter/xt_osf.h); GPL-2(include/linux/netfilter_ipv4.h); GPL-2(include/linux/netfilter_ipv4/ip_queue.h); GPL-2(include/linux/netfilter_ipv4/ipt_ECN.h); GPL-2(include/linux/netfilter_ipv4/ipt_TTL.h); GPL-2(include/linux/netfilter_ipv4/ipt_ULOG.h); GPL-2(include/linux/netfilter_ipv4/ipt_ttl.h); GPL-2(include/linux/netfilter_ipv6.h); Artistic-2(iptables/iptables-apply); GPL-2(iptables/iptables-save.c); GPL-2(iptables/iptables-xml.c); GPL-2+(iptables/nft.c); GPL-2+(iptables/nft-arp.c); GPL-2+(iptables/nft-bridge.c); GPL-2+(iptables/nft-ipv4.c iptables/nft-ipv6.c iptables/nft-shared.c); GPL-2+(iptables/xtables-arp.c iptables/xtables-eb.c); GPL-2(libiptc/libip4tc.c); GPL-2(libiptc/libip6tc.c); GPL-2(libiptc/libiptc.c); GPL-2(libxtables/xtables.c); GPL-2(libxtables/xtoptions.c); GPL-2(utils/nfsynproxy.c); custom(utils/pf.os); GPL-2(utils/pf.os); GPL-2+(utils/pf.os); Artistic-2(utils/pf.os) | +| {{}} | 9.11.5.P4+dfsg-5.1+deb10u9 | ISC and BSD-2-clause and BSD-3-clause and BSD-4-clause(* ); MPL-2.0 or ISC(bin/tests/system/chain/); BSD-2-clause(unit/atf-src/); BSD-4-clause(contrib/idn/); ISC or MPL-2.0(debian/); ISC(debian/); BSD-2-clause(debian/); BSD-3-clause(debian/); BSD-4-clause(debian/); MPL-2.0(debian/) | +| {{}} | 9.11.5.P4+dfsg-5.1+deb10u9 | ISC and BSD-2-clause and BSD-3-clause and BSD-4-clause(* ); MPL-2.0 or ISC(bin/tests/system/chain/); BSD-2-clause(unit/atf-src/); BSD-4-clause(contrib/idn/); ISC or MPL-2.0(debian/); ISC(debian/); BSD-2-clause(debian/); BSD-3-clause(debian/); BSD-4-clause(debian/); MPL-2.0(debian/) | +| {{}} | 9.11.5.P4+dfsg-5.1+deb10u9 | ISC and BSD-2-clause and BSD-3-clause and BSD-4-clause(* ); MPL-2.0 or ISC(bin/tests/system/chain/); BSD-2-clause(unit/atf-src/); BSD-4-clause(contrib/idn/); ISC or MPL-2.0(debian/); ISC(debian/); BSD-2-clause(debian/); BSD-3-clause(debian/); BSD-4-clause(debian/); MPL-2.0(debian/) | +| {{}} | 9.11.5.P4+dfsg-5.1+deb10u9 | ISC and BSD-2-clause and BSD-3-clause and BSD-4-clause(* ); MPL-2.0 or ISC(bin/tests/system/chain/); BSD-2-clause(unit/atf-src/); BSD-4-clause(contrib/idn/); ISC or MPL-2.0(debian/); ISC(debian/); BSD-2-clause(debian/); BSD-3-clause(debian/); BSD-4-clause(debian/); MPL-2.0(debian/) | +| {{}} | 9.11.5.P4+dfsg-5.1+deb10u9 | ISC and BSD-2-clause and BSD-3-clause and BSD-4-clause(* ); MPL-2.0 or ISC(bin/tests/system/chain/); BSD-2-clause(unit/atf-src/); BSD-4-clause(contrib/idn/); ISC or MPL-2.0(debian/); ISC(debian/); BSD-2-clause(debian/); BSD-3-clause(debian/); BSD-4-clause(debian/); MPL-2.0(debian/) | +| {{}} | 9.11.5.P4+dfsg-5.1+deb10u9 | ISC and BSD-2-clause and BSD-3-clause and BSD-4-clause(* ); MPL-2.0 or ISC(bin/tests/system/chain/); BSD-2-clause(unit/atf-src/); BSD-4-clause(contrib/idn/); ISC or MPL-2.0(debian/); ISC(debian/); BSD-2-clause(debian/); BSD-3-clause(debian/); BSD-4-clause(debian/); MPL-2.0(debian/) | +| {{}} | 9.11.5.P4+dfsg-5.1+deb10u9 | ISC and BSD-2-clause and BSD-3-clause and BSD-4-clause(* ); MPL-2.0 or ISC(bin/tests/system/chain/); BSD-2-clause(unit/atf-src/); BSD-4-clause(contrib/idn/); ISC or MPL-2.0(debian/); ISC(debian/); BSD-2-clause(debian/); BSD-3-clause(debian/); BSD-4-clause(debian/); MPL-2.0(debian/) | +| {{}} | 9.11.5.P4+dfsg-5.1+deb10u9 | ISC and BSD-2-clause and BSD-3-clause and BSD-4-clause(* ); MPL-2.0 or ISC(bin/tests/system/chain/); BSD-2-clause(unit/atf-src/); BSD-4-clause(contrib/idn/); ISC or MPL-2.0(debian/); ISC(debian/); BSD-2-clause(debian/); BSD-3-clause(debian/); BSD-4-clause(debian/); MPL-2.0(debian/) | | {{}} | 0.20-2 | BSD; BSD-2-clause; LGPL-2; LGPL-2.1+; MIT | | {{}} | 1.5.0-1 | GPL-2+(* ); GPL-2+(INSTALL); GPL-2+(aclocal.m4); GPL-3(texinfo.tex); FSFUL(configure); BSD-2-clause(frontend/xorriso-tcltk); GPL-2(debian/* ); GPL-2+(releng/* ); GPL-2(releng/* ); GPL-2+(releng/* ); GPL-3(releng/* ); BSD-2-clause(releng/* ); FSFUL(releng/* ) | | {{}} | 1.5.0-1 | GPL-2+(* ); GPL-2+(COPYRIGHT); GPL-2+(INSTALL); GPL-2+(compile); FSFUL(configure); GPL-2(debian/* ); GPL-2+(demo/* ); GPL-2+(libisofs/* ); GPL-2+(libisofs/aaip-os-dummy.c); GPL-2+(libisofs/buffer.c); GPL-2+(libisofs/ecma119.c); GPL-2+(libisofs/filters/* ); GPL-2+(libisofs/hfsplus.c); GPL-2+(libisofs/hfsplus.h); GPL-2+(libisofs/hfsplus_case.c); GPL-2+(libisofs/make_isohybrid_mbr.c); GPL-2+(libisofs/hfsplus_classes.c); GPL-2+(libisofs/hfsplus_decompose.c); GPL-2+(libisofs/joliet.h); GPL-2+(libisofs/libiso_msgs.c); GPL-2+(libisofs/libisofs.h); GPL-2+(libtool.m4); GPL-2+(ltoptions.m4); GPL-2(ltoptions.m4); GPL-2+(ltoptions.m4); FSFUL(ltoptions.m4) | @@ -690,18 +698,19 @@ pdfhidden: True | {{}} | 1.8.4-1 | BSD-2-clause(* ); BSD-2-clause(debian/dh-sphinxdoc/dh_sphinxdoc); BSD-2-clause(sphinx/ext/apidoc.py); BSD-2-clause(sphinx/ext/napoleon/docstring.py); Expat(sphinx/themes/basic/static/jquery* .js); Expat(sphinx/themes/basic/static/underscore* .js); BSD-3-clause(sphinx/util/smartypants.py); public-domain(sphinx/util/stemmer/porter.py); BSD-2-clause(sphinx/util/stemmer/porter.py); BSD-3-clause(sphinx/util/stemmer/porter.py); Expat(sphinx/util/stemmer/porter.py) | | {{}} | 1.9.1~dfsg-1+deb10u1 | Expat(* ); BSD-3-clause(docs/docco.css); GPL-3+(debian/* ); Expat(debian/* ); BSD-3-clause(debian/* ); GPL-3+(debian/* ) | | {{}} | 1.21-1 | GPL; GPL-2; LGPL-2 | -| {{}} | 1.17-3+deb10u3 | BSD; GPL; GPL-2; MIT | -| {{}} | 1.17-3+deb10u3 | BSD; GPL; GPL-2; MIT | -| {{}} | 1.17-3+deb10u3 | BSD; GPL; GPL-2; MIT | -| {{}} | 1.17-3+deb10u3 | BSD; GPL; GPL-2; MIT | +| {{}} | 1.17-3+deb10u5 | BSD; GPL; GPL-2; MIT | +| {{}} | 1.17-3+deb10u5 | BSD; GPL; GPL-2; MIT | +| {{}} | 1.17-3+deb10u5 | BSD; GPL; GPL-2; MIT | +| {{}} | 1.17-3+deb10u5 | BSD; GPL; GPL-2; MIT | | {{}} | 1.6-6 | GPL-2+(* ); LGPL-2+(keyutils.* ); LGPL-2+(debian/* ); GPL-2+(debian/* ); LGPL-2+(debian/* ) | | {{}} | 2.0.6-1+deb10u1 | BSD; GPL; GPL-2 | | {{}} | 26-1 | GPL; GPL-2; LGPL-2 | -| {{}} | 2018.20181218.49446-1 | BSD; Common Public License; GPL; MIT | -| {{}} | 1.17-3+deb10u3 | BSD; GPL; GPL-2; MIT | -| {{}} | 1.17-3+deb10u3 | BSD; GPL; GPL-2; MIT | -| {{}} | 1.17-3+deb10u3 | BSD; GPL; GPL-2; MIT | -| {{}} | 1.3.5-2 | GPL; GPL-3 | +| {{}} | 2018.20181218.49446-1+deb10u2 | BSD; Common Public License; GPL; MIT | +| {{}} | 1.17-3+deb10u5 | BSD; GPL; GPL-2; MIT | +| {{}} | 1.17-3+deb10u5 | BSD; GPL; GPL-2; MIT | +| {{}} | 1.17-3+deb10u5 | BSD; GPL; GPL-2; MIT | +| {{}} | 1.17-3+deb10u5 | BSD; GPL; GPL-2; MIT | +| {{}} | 1.3.5-2+deb10u2 | GPL; GPL-3 | | {{}} | 2.40.1-6+deb10u1 | EPL-1.0(* ); MIT(cmd/smyrna/arcball.[ch]); zlib-style(cmd/smyrna/md5.[ch]); X/MIT(cmd/smyrna/trackball.[ch]); EPL-1.0(debian/* ); EPL-1.0(debian/* ) | | {{}} | 2.9-3 | MIT(* ); GPL-2+(debian/* ) | | {{}} | 2.4.47+dfsg-3+deb10u7 | ISC; MIT | @@ -729,7 +738,7 @@ pdfhidden: True | {{}} | 2.03.02-3 | GPL-2.0(* ); LGPL-2.1(Files:); BSD-2-Clause(Files:); GPL-2.0+(debian/* ) | | {{}} | 6.02-1 | Artistic; GPL; GPL-1; GPL-1+ | | {{}} | 6.07-2 | Artistic or GPL-1+(* ); Artistic or GPL-1+(debian/* ); Artistic(debian/* ); GPL-1+(debian/* ) | -| {{}} | 9.11.5.P4+dfsg-5.1+deb10u7 | ISC and BSD-2-clause and BSD-3-clause and BSD-4-clause(* ); MPL-2.0 or ISC(bin/tests/system/chain/); BSD-2-clause(unit/atf-src/); BSD-4-clause(contrib/idn/); ISC or MPL-2.0(debian/); ISC(debian/); BSD-2-clause(debian/); BSD-3-clause(debian/); BSD-4-clause(debian/); MPL-2.0(debian/) | +| {{}} | 9.11.5.P4+dfsg-5.1+deb10u9 | ISC and BSD-2-clause and BSD-3-clause and BSD-4-clause(* ); MPL-2.0 or ISC(bin/tests/system/chain/); BSD-2-clause(unit/atf-src/); BSD-4-clause(contrib/idn/); ISC or MPL-2.0(debian/); ISC(debian/); BSD-2-clause(debian/); BSD-3-clause(debian/); BSD-4-clause(debian/); MPL-2.0(debian/) | | {{}} | 1.8.3-1+deb10u1 | BSD-2-clause(* ); BSD-2-clause(lib/* ); BSD-2-clause(lib/liblz4.pc.in); BSD-2-clause(lib/lz4frame.c); GPL-2+(programs/* ); GPL-2+(programs/lz4io.c); GPL-2+(programs/platform.h); GPL-2+(programs/util.h); GPL-2(./examples/printVersion.c); GPL-2(./examples/blockStreaming_lineByLine.c); GPL-2(./examples/HCStreaming_ringBuffer.c); BSD-2-clause(./examples/compress_functions.c); GPL-2+(debian/* ); GPL-2(debian/* ); GPL-2+(debian/* ); BSD-2-clause(debian/* ) | | {{}} | 5.2.4-1+deb10u1 | PD(* ); probably-PD(INSTALL NEWS PACKAGERS); GPL-2+(src/scripts/* lib/* extra/scanlzma/scanlzma.c); PD(src/scripts/Makefile.am src/scripts/xzless.1); PD(doc/examples/xz_pipe_comp.c doc/examples/xz_pipe_decomp.c); LGPL-2.1+(lib/getopt.c lib/getopt1.c lib/getopt.in.h); permissive-fsf(m4/getopt.m4 m4/posix-shell.m4); Autoconf(m4/acx_pthread.m4); permissive-nowarranty(m4/acx_pthread.m4); GPL-2(Doxyfile.in); none(src/liblzma/check/crc32_table_?e.h); none(.gitignore m4/.gitignore po/.gitignore po/LINGUAS po/POTFILES.in); PD(tests/compress_prepared_bcj_* ); PD(po/cs.po po/de.po po/fr.po); PD(po/it.po po/pl.po); permissive-nowarranty(INSTALL.generic); config-h(dos/config.h); LGPL-2.1+(po/Makevars); noderivs(COPYING.GPLv2 COPYING.GPLv3 COPYING.LGPLv2.1); PD-debian(debian/* ); LGPL-2.1+(debian/* ); GPL-2(debian/* ); GPL-2+(debian/* ); Autoconf(debian/* ); permissive-fsf(debian/* ); permissive-nowarranty(debian/* ) | | {{}} | 5.2.4-1+deb10u1 | PD(* ); probably-PD(INSTALL NEWS PACKAGERS); GPL-2+(src/scripts/* lib/* extra/scanlzma/scanlzma.c); PD(src/scripts/Makefile.am src/scripts/xzless.1); PD(doc/examples/xz_pipe_comp.c doc/examples/xz_pipe_decomp.c); LGPL-2.1+(lib/getopt.c lib/getopt1.c lib/getopt.in.h); permissive-fsf(m4/getopt.m4 m4/posix-shell.m4); Autoconf(m4/acx_pthread.m4); permissive-nowarranty(m4/acx_pthread.m4); GPL-2(Doxyfile.in); none(src/liblzma/check/crc32_table_?e.h); none(.gitignore m4/.gitignore po/.gitignore po/LINGUAS po/POTFILES.in); PD(tests/compress_prepared_bcj_* ); PD(po/cs.po po/de.po po/fr.po); PD(po/it.po po/pl.po); permissive-nowarranty(INSTALL.generic); config-h(dos/config.h); LGPL-2.1+(po/Makevars); noderivs(COPYING.GPLv2 COPYING.GPLv3 COPYING.LGPLv2.1); PD-debian(debian/* ); LGPL-2.1+(debian/* ); GPL-2(debian/* ); GPL-2+(debian/* ); Autoconf(debian/* ); permissive-fsf(debian/* ); permissive-nowarranty(debian/* ) | @@ -753,9 +762,10 @@ pdfhidden: True | {{}} | 4.0.2-1 | GFDL-1; LGPL-3 | | {{}} | 8.3.0-6 | NO COPYRIGHT FILE | | {{}} | 0.10.1-1 | LGPL-2.1(* ); LGPL-2.1(mspack/qtm* mspack/lzx* ); LGPL-2.1(mspack/qtm* mspack/lzx* ) | -| {{}} | 6.1+20181013-2+deb10u2 | NO COPYRIGHT FILE | -| {{}} | 6.1+20181013-2+deb10u2 | NO COPYRIGHT FILE | -| {{}} | 6.1+20181013-2+deb10u2 | NO COPYRIGHT FILE | +| {{}} | 6.1+20181013-2+deb10u4 | NO COPYRIGHT FILE | +| {{}} | 6.1+20181013-2+deb10u4 | NO COPYRIGHT FILE | +| {{}} | 6.1+20181013-2+deb10u4 | NO COPYRIGHT FILE | +| {{}} | 6.1+20181013-2+deb10u4 | NO COPYRIGHT FILE | | {{}} | 1.1.6+dfsg-3.1 | BSD-2(debian/* ); BSD-4(include/bpf.h); BSD-3(include/ifaddrlist.h); BSD-2 or other(include/libnet/libnet-asn1.h); BSD-2(sample/bgp4* ); BSD-2(sample/icmp_redirect.c); BSD-2(sample/icmp_timeexceed.c); BSD-2(sample/ospf* ); BSD-2(sample/ping_of_death.c); BSD-3 or other(srct/libnet_asn1.c); BSD-2(src/libnet_build_fddi.c); BSD-2(src/libnet_build_ipsec.c); BSD-2(src/libnet_build_link.c); BSD-2(src/libnet_dll.c); BSD-3(src/libnet_link_dlpi.c); BSD-3(src/libnet_link_nit.c); BSD-3(src/libnet_link_snit.c); BSD-2(src/libnet_link_win32.c); BSD-2(* ); BSD-2(* ); BSD-3(* ); BSD-4(* ); other(* ) | | {{}} | 1.1.6+dfsg-3.1 | BSD-2(debian/* ); BSD-4(include/bpf.h); BSD-3(include/ifaddrlist.h); BSD-2 or other(include/libnet/libnet-asn1.h); BSD-2(sample/bgp4* ); BSD-2(sample/icmp_redirect.c); BSD-2(sample/icmp_timeexceed.c); BSD-2(sample/ospf* ); BSD-2(sample/ping_of_death.c); BSD-3 or other(srct/libnet_asn1.c); BSD-2(src/libnet_build_fddi.c); BSD-2(src/libnet_build_ipsec.c); BSD-2(src/libnet_build_link.c); BSD-2(src/libnet_dll.c); BSD-3(src/libnet_link_dlpi.c); BSD-3(src/libnet_link_nit.c); BSD-3(src/libnet_link_snit.c); BSD-2(src/libnet_link_win32.c); BSD-2(* ); BSD-2(* ); BSD-3(* ); BSD-4(* ); other(* ) | | {{}} | 1.19-1 | Artistic or GPL-1+(* ); Artistic or GPL-1+(debian/* ); Artistic(debian/* ); GPL-1+(debian/* ) | @@ -766,7 +776,7 @@ pdfhidden: True | {{}} | 6.18-1 | Artistic or GPL-1+(* ); Artistic or GPL-1+(debian/* ); Artistic(debian/* ); GPL-1+(debian/* ) | | {{}} | 1.26-2 | Artistic or GPL-1+(* ); Expat(ipcount); Expat(IP.pm); Artistic or GPL-1+(debian/* ); Artistic(debian/* ); Expat(debian/* ); GPL-1+(debian/* ) | | {{}} | 0.12.ds-3+b1 | Artistic or GPL-1+(* ); Artistic or GPL-1+(debian/* ); Artistic(debian/* ); GPL-1+(debian/* ) | -| {{}} | 1.85-2+b1 | Artistic-2.0(* ); Artistic or GPL-1+(ppport.h); Artistic or GPL-1+(inc/Module/* ); Artistic or GPL-1+(debian/* ); Artistic-2.0(Files:); Artistic(Files:); GPL-1+(Files:); Artistic-2.0(Files:) | +| {{}} | 1.85-2+deb10u1 | Artistic-2.0(* ); Artistic or GPL-1+(ppport.h); Artistic or GPL-1+(inc/Module/* ); Artistic or GPL-1+(debian/* ); Artistic-2.0(Files:); Artistic(Files:); GPL-1+(Files:); Artistic-2.0(Files:) | | {{}} | 3.4.1-1+deb10u1 | LGPL-2.1+(* ); LGPL-2.1+(aes-set-* ); LGPL-2.1+(arctwo* ); LGPL-2.1+(base64.h base64-meta.c); LGPL-2.1+(blowfish.c); LGPL-2.1+(blowfish.h); LGPL-2.1+(camellia-table.c camellia-crypt-internal.c); LGPL-2.1+(der2dsa.c); LGPL-2+(desCode.h descode.README desdata.c desinfo.c); LGPL-2.1+(des.c des.h); LGPL-2.1+(gcm.c gcm.h); LGPL-2.1+(md2.c); LGPL-2.1+(md4.c); LGPL-2.1+(md5.c md5-compress.c); LGPL-2.1+(memxor.c); LGPL-2.1+(ripemd160.c ripemd160-compress.c); LGPL-2.1+(ripemd160-meta.c ripemd160.h); LGPL-2.1+(serpent-encrypt.c serpent-decrypt.c serpent-set-key.c); LGPL-2.1+(sha* ); LGPL-2.1+(twofish* ); LGPL-2.1+(dsa2sexp.c); other(testsuite/des-compat-test.c); LGPL-2.1+(tools/pkcs1-conv.c); LGPL-2.1+(x86* /aes-* -internal.asm); GPL-2+(tools/getopt* ); GPL-2+ with Autoconf exception(config.guess config.sub); public-domain(debian/* ); GPL-2(debian/sexp-conv.1); GAP(debian/pkcs1-conv.1 debian/nettle-lfib-stream.1); LGPL-2.1+(debian/pkcs1-conv.1 debian/nettle-lfib-stream.1); GPL-2+(debian/pkcs1-conv.1 debian/nettle-lfib-stream.1) | | {{}} | 0.52.20-8 | LGPL-2 | | {{}} | 0.52.20-8 | LGPL-2 | @@ -775,46 +785,45 @@ pdfhidden: True | {{}} | 1.1.2-2 | GPL-2+(* ); GPL-2+(tests/nft-chain-test.c tests/nft-expr_* -test.c tests/nft-rule-test.c tests/nft-set-test.c tests/nft-table-test.c); GPL-2+(debian/* ); GPL-2+(src/ruleset.c); GPL-2+(src/utils.c); GPL-2+(src/jansson.c); GPL-2+(src/expr/masq.c src/expr/redir.c); GPL-2+(src/expr/queue.c); GPL-2+(src/expr/nat.c); GPL-2+(examples/nft-chain-parse-add.c examples/nft-rule-parse-add.c examples/nft-table-parse-add.c examples/nft-set-parse-add.c); GPL-2(examples/nft-ruleset-get.c); GPL-2+(examples/nft-ruleset-get.c); GPL-2(examples/nft-ruleset-get.c) | | {{}} | 1.1.2-2 | GPL-2+(* ); GPL-2+(tests/nft-chain-test.c tests/nft-expr_* -test.c tests/nft-rule-test.c tests/nft-set-test.c tests/nft-table-test.c); GPL-2+(debian/* ); GPL-2+(src/ruleset.c); GPL-2+(src/utils.c); GPL-2+(src/jansson.c); GPL-2+(src/expr/masq.c src/expr/redir.c); GPL-2+(src/expr/queue.c); GPL-2+(src/expr/nat.c); GPL-2+(examples/nft-chain-parse-add.c examples/nft-rule-parse-add.c examples/nft-table-parse-add.c examples/nft-set-parse-add.c); GPL-2(examples/nft-ruleset-get.c); GPL-2+(examples/nft-ruleset-get.c); GPL-2(examples/nft-ruleset-get.c) | | {{}} | 1.36.0-2+deb10u1 | Expat(* ); Expat(third-party/http-parser/http_parser.h); MIT(third-party/http-parser/http_parser.c); MIT(third-party/mruby/* ); Expat(tests/nghttp2_npn_test.* ); all-permissive(m4/ax_cxx_compile_stdcxx_11.m4); GPL-3+ with autoconf exception(m4/ax_python_devel.m4); MIT(doc/_themes/sphinx_rtd_theme/* ); BSD-2-clause(doc/_themes/sphinx_rtd_theme/layout_old.html doc/_themes/sphinx_rtd_theme/search.html); SIL-OFL-1.1(doc/_themes/sphinx_rtd_theme/static/fonts/FontAwesome.otf); Expat(doc/_themes/sphinx_rtd_theme/static/fonts/FontAwesome.otf); MIT(doc/_themes/sphinx_rtd_theme/static/fonts/FontAwesome.otf); GPL-3+ with autoconf exception(doc/_themes/sphinx_rtd_theme/static/fonts/FontAwesome.otf); all-permissive(doc/_themes/sphinx_rtd_theme/static/fonts/FontAwesome.otf); BSD-2-clause(doc/_themes/sphinx_rtd_theme/static/fonts/FontAwesome.otf); SIL-OFL-1.1(doc/_themes/sphinx_rtd_theme/static/fonts/FontAwesome.otf) | -| {{}} | 1.14.2-2+deb10u4 | BSD-2-clause(* ); BSD-2-clause(src/core/ngx_murmurhash.c); BSD-2-clause(src/http/modules/ngx_http_scgi_module.c); BSD-2-clause(contrib/geo2nginx.pl); BSD-2-clause(debian/* ); BSD-2-clause(debian/modules/http-headers-more-filter/* ); BSD-3-clause(debian/modules/http-ndk/* ); BSD-4-clause(debian/modules/http-ndk/src/hash/md5.h); BSD-2-clause(debian/modules/http-auth-pam/* ); BSD-2-clause(debian/modules/http-echo/* ); BSD-2-clause(debian/modules/http-lua/* ); BSD-2-clause(debian/modules/http-upstream-fair/* ); MIT(debian/modules/nchan/* ); MIT(debian/modules/nchan/src/store/redis/cmp.* ); BSD-2-clause(debian/modules/http-uploadprogress/* ); BSD-2-clause(debian/modules/http-cache-purge/* ); BSD-2-clause(debian/modules/http-dav-ext/* ); BSD-2-clause(debian/modules/http-fancyindex/* ); BSD-2-clause(debian/modules/http-subs-filter/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-3-clause(debian/modules/rtmp/* ); BSD-4-clause(debian/modules/rtmp/* ); MIT(debian/modules/rtmp/* ) | -| {{}} | 1.14.2-2+deb10u4 | BSD-2-clause(* ); BSD-2-clause(src/core/ngx_murmurhash.c); BSD-2-clause(src/http/modules/ngx_http_scgi_module.c); BSD-2-clause(contrib/geo2nginx.pl); BSD-2-clause(debian/* ); BSD-2-clause(debian/modules/http-headers-more-filter/* ); BSD-3-clause(debian/modules/http-ndk/* ); BSD-4-clause(debian/modules/http-ndk/src/hash/md5.h); BSD-2-clause(debian/modules/http-auth-pam/* ); BSD-2-clause(debian/modules/http-echo/* ); BSD-2-clause(debian/modules/http-lua/* ); BSD-2-clause(debian/modules/http-upstream-fair/* ); MIT(debian/modules/nchan/* ); MIT(debian/modules/nchan/src/store/redis/cmp.* ); BSD-2-clause(debian/modules/http-uploadprogress/* ); BSD-2-clause(debian/modules/http-cache-purge/* ); BSD-2-clause(debian/modules/http-dav-ext/* ); BSD-2-clause(debian/modules/http-fancyindex/* ); BSD-2-clause(debian/modules/http-subs-filter/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-3-clause(debian/modules/rtmp/* ); BSD-4-clause(debian/modules/rtmp/* ); MIT(debian/modules/rtmp/* ) | -| {{}} | 1.14.2-2+deb10u4 | BSD-2-clause(* ); BSD-2-clause(src/core/ngx_murmurhash.c); BSD-2-clause(src/http/modules/ngx_http_scgi_module.c); BSD-2-clause(contrib/geo2nginx.pl); BSD-2-clause(debian/* ); BSD-2-clause(debian/modules/http-headers-more-filter/* ); BSD-3-clause(debian/modules/http-ndk/* ); BSD-4-clause(debian/modules/http-ndk/src/hash/md5.h); BSD-2-clause(debian/modules/http-auth-pam/* ); BSD-2-clause(debian/modules/http-echo/* ); BSD-2-clause(debian/modules/http-lua/* ); BSD-2-clause(debian/modules/http-upstream-fair/* ); MIT(debian/modules/nchan/* ); MIT(debian/modules/nchan/src/store/redis/cmp.* ); BSD-2-clause(debian/modules/http-uploadprogress/* ); BSD-2-clause(debian/modules/http-cache-purge/* ); BSD-2-clause(debian/modules/http-dav-ext/* ); BSD-2-clause(debian/modules/http-fancyindex/* ); BSD-2-clause(debian/modules/http-subs-filter/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-3-clause(debian/modules/rtmp/* ); BSD-4-clause(debian/modules/rtmp/* ); MIT(debian/modules/rtmp/* ) | -| {{}} | 1.14.2-2+deb10u4 | BSD-2-clause(* ); BSD-2-clause(src/core/ngx_murmurhash.c); BSD-2-clause(src/http/modules/ngx_http_scgi_module.c); BSD-2-clause(contrib/geo2nginx.pl); BSD-2-clause(debian/* ); BSD-2-clause(debian/modules/http-headers-more-filter/* ); BSD-3-clause(debian/modules/http-ndk/* ); BSD-4-clause(debian/modules/http-ndk/src/hash/md5.h); BSD-2-clause(debian/modules/http-auth-pam/* ); BSD-2-clause(debian/modules/http-echo/* ); BSD-2-clause(debian/modules/http-lua/* ); BSD-2-clause(debian/modules/http-upstream-fair/* ); MIT(debian/modules/nchan/* ); MIT(debian/modules/nchan/src/store/redis/cmp.* ); BSD-2-clause(debian/modules/http-uploadprogress/* ); BSD-2-clause(debian/modules/http-cache-purge/* ); BSD-2-clause(debian/modules/http-dav-ext/* ); BSD-2-clause(debian/modules/http-fancyindex/* ); BSD-2-clause(debian/modules/http-subs-filter/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-3-clause(debian/modules/rtmp/* ); BSD-4-clause(debian/modules/rtmp/* ); MIT(debian/modules/rtmp/* ) | -| {{}} | 1.14.2-2+deb10u4 | BSD-2-clause(* ); BSD-2-clause(src/core/ngx_murmurhash.c); BSD-2-clause(src/http/modules/ngx_http_scgi_module.c); BSD-2-clause(contrib/geo2nginx.pl); BSD-2-clause(debian/* ); BSD-2-clause(debian/modules/http-headers-more-filter/* ); BSD-3-clause(debian/modules/http-ndk/* ); BSD-4-clause(debian/modules/http-ndk/src/hash/md5.h); BSD-2-clause(debian/modules/http-auth-pam/* ); BSD-2-clause(debian/modules/http-echo/* ); BSD-2-clause(debian/modules/http-lua/* ); BSD-2-clause(debian/modules/http-upstream-fair/* ); MIT(debian/modules/nchan/* ); MIT(debian/modules/nchan/src/store/redis/cmp.* ); BSD-2-clause(debian/modules/http-uploadprogress/* ); BSD-2-clause(debian/modules/http-cache-purge/* ); BSD-2-clause(debian/modules/http-dav-ext/* ); BSD-2-clause(debian/modules/http-fancyindex/* ); BSD-2-clause(debian/modules/http-subs-filter/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-3-clause(debian/modules/rtmp/* ); BSD-4-clause(debian/modules/rtmp/* ); MIT(debian/modules/rtmp/* ) | -| {{}} | 1.14.2-2+deb10u4 | BSD-2-clause(* ); BSD-2-clause(src/core/ngx_murmurhash.c); BSD-2-clause(src/http/modules/ngx_http_scgi_module.c); BSD-2-clause(contrib/geo2nginx.pl); BSD-2-clause(debian/* ); BSD-2-clause(debian/modules/http-headers-more-filter/* ); BSD-3-clause(debian/modules/http-ndk/* ); BSD-4-clause(debian/modules/http-ndk/src/hash/md5.h); BSD-2-clause(debian/modules/http-auth-pam/* ); BSD-2-clause(debian/modules/http-echo/* ); BSD-2-clause(debian/modules/http-lua/* ); BSD-2-clause(debian/modules/http-upstream-fair/* ); MIT(debian/modules/nchan/* ); MIT(debian/modules/nchan/src/store/redis/cmp.* ); BSD-2-clause(debian/modules/http-uploadprogress/* ); BSD-2-clause(debian/modules/http-cache-purge/* ); BSD-2-clause(debian/modules/http-dav-ext/* ); BSD-2-clause(debian/modules/http-fancyindex/* ); BSD-2-clause(debian/modules/http-subs-filter/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-3-clause(debian/modules/rtmp/* ); BSD-4-clause(debian/modules/rtmp/* ); MIT(debian/modules/rtmp/* ) | -| {{}} | 1.14.2-2+deb10u4 | BSD-2-clause(* ); BSD-2-clause(src/core/ngx_murmurhash.c); BSD-2-clause(src/http/modules/ngx_http_scgi_module.c); BSD-2-clause(contrib/geo2nginx.pl); BSD-2-clause(debian/* ); BSD-2-clause(debian/modules/http-headers-more-filter/* ); BSD-3-clause(debian/modules/http-ndk/* ); BSD-4-clause(debian/modules/http-ndk/src/hash/md5.h); BSD-2-clause(debian/modules/http-auth-pam/* ); BSD-2-clause(debian/modules/http-echo/* ); BSD-2-clause(debian/modules/http-lua/* ); BSD-2-clause(debian/modules/http-upstream-fair/* ); MIT(debian/modules/nchan/* ); MIT(debian/modules/nchan/src/store/redis/cmp.* ); BSD-2-clause(debian/modules/http-uploadprogress/* ); BSD-2-clause(debian/modules/http-cache-purge/* ); BSD-2-clause(debian/modules/http-dav-ext/* ); BSD-2-clause(debian/modules/http-fancyindex/* ); BSD-2-clause(debian/modules/http-subs-filter/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-3-clause(debian/modules/rtmp/* ); BSD-4-clause(debian/modules/rtmp/* ); MIT(debian/modules/rtmp/* ) | -| {{}} | 1.14.2-2+deb10u4 | BSD-2-clause(* ); BSD-2-clause(src/core/ngx_murmurhash.c); BSD-2-clause(src/http/modules/ngx_http_scgi_module.c); BSD-2-clause(contrib/geo2nginx.pl); BSD-2-clause(debian/* ); BSD-2-clause(debian/modules/http-headers-more-filter/* ); BSD-3-clause(debian/modules/http-ndk/* ); BSD-4-clause(debian/modules/http-ndk/src/hash/md5.h); BSD-2-clause(debian/modules/http-auth-pam/* ); BSD-2-clause(debian/modules/http-echo/* ); BSD-2-clause(debian/modules/http-lua/* ); BSD-2-clause(debian/modules/http-upstream-fair/* ); MIT(debian/modules/nchan/* ); MIT(debian/modules/nchan/src/store/redis/cmp.* ); BSD-2-clause(debian/modules/http-uploadprogress/* ); BSD-2-clause(debian/modules/http-cache-purge/* ); BSD-2-clause(debian/modules/http-dav-ext/* ); BSD-2-clause(debian/modules/http-fancyindex/* ); BSD-2-clause(debian/modules/http-subs-filter/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-3-clause(debian/modules/rtmp/* ); BSD-4-clause(debian/modules/rtmp/* ); MIT(debian/modules/rtmp/* ) | -| {{}} | 1.14.2-2+deb10u4 | BSD-2-clause(* ); BSD-2-clause(src/core/ngx_murmurhash.c); BSD-2-clause(src/http/modules/ngx_http_scgi_module.c); BSD-2-clause(contrib/geo2nginx.pl); BSD-2-clause(debian/* ); BSD-2-clause(debian/modules/http-headers-more-filter/* ); BSD-3-clause(debian/modules/http-ndk/* ); BSD-4-clause(debian/modules/http-ndk/src/hash/md5.h); BSD-2-clause(debian/modules/http-auth-pam/* ); BSD-2-clause(debian/modules/http-echo/* ); BSD-2-clause(debian/modules/http-lua/* ); BSD-2-clause(debian/modules/http-upstream-fair/* ); MIT(debian/modules/nchan/* ); MIT(debian/modules/nchan/src/store/redis/cmp.* ); BSD-2-clause(debian/modules/http-uploadprogress/* ); BSD-2-clause(debian/modules/http-cache-purge/* ); BSD-2-clause(debian/modules/http-dav-ext/* ); BSD-2-clause(debian/modules/http-fancyindex/* ); BSD-2-clause(debian/modules/http-subs-filter/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-3-clause(debian/modules/rtmp/* ); BSD-4-clause(debian/modules/rtmp/* ); MIT(debian/modules/rtmp/* ) | -| {{}} | 1.14.2-2+deb10u4 | BSD-2-clause(* ); BSD-2-clause(src/core/ngx_murmurhash.c); BSD-2-clause(src/http/modules/ngx_http_scgi_module.c); BSD-2-clause(contrib/geo2nginx.pl); BSD-2-clause(debian/* ); BSD-2-clause(debian/modules/http-headers-more-filter/* ); BSD-3-clause(debian/modules/http-ndk/* ); BSD-4-clause(debian/modules/http-ndk/src/hash/md5.h); BSD-2-clause(debian/modules/http-auth-pam/* ); BSD-2-clause(debian/modules/http-echo/* ); BSD-2-clause(debian/modules/http-lua/* ); BSD-2-clause(debian/modules/http-upstream-fair/* ); MIT(debian/modules/nchan/* ); MIT(debian/modules/nchan/src/store/redis/cmp.* ); BSD-2-clause(debian/modules/http-uploadprogress/* ); BSD-2-clause(debian/modules/http-cache-purge/* ); BSD-2-clause(debian/modules/http-dav-ext/* ); BSD-2-clause(debian/modules/http-fancyindex/* ); BSD-2-clause(debian/modules/http-subs-filter/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-3-clause(debian/modules/rtmp/* ); BSD-4-clause(debian/modules/rtmp/* ); MIT(debian/modules/rtmp/* ) | -| {{}} | 1.14.2-2+deb10u4 | BSD-2-clause(* ); BSD-2-clause(src/core/ngx_murmurhash.c); BSD-2-clause(src/http/modules/ngx_http_scgi_module.c); BSD-2-clause(contrib/geo2nginx.pl); BSD-2-clause(debian/* ); BSD-2-clause(debian/modules/http-headers-more-filter/* ); BSD-3-clause(debian/modules/http-ndk/* ); BSD-4-clause(debian/modules/http-ndk/src/hash/md5.h); BSD-2-clause(debian/modules/http-auth-pam/* ); BSD-2-clause(debian/modules/http-echo/* ); BSD-2-clause(debian/modules/http-lua/* ); BSD-2-clause(debian/modules/http-upstream-fair/* ); MIT(debian/modules/nchan/* ); MIT(debian/modules/nchan/src/store/redis/cmp.* ); BSD-2-clause(debian/modules/http-uploadprogress/* ); BSD-2-clause(debian/modules/http-cache-purge/* ); BSD-2-clause(debian/modules/http-dav-ext/* ); BSD-2-clause(debian/modules/http-fancyindex/* ); BSD-2-clause(debian/modules/http-subs-filter/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-3-clause(debian/modules/rtmp/* ); BSD-4-clause(debian/modules/rtmp/* ); MIT(debian/modules/rtmp/* ) | -| {{}} | 1.14.2-2+deb10u4 | BSD-2-clause(* ); BSD-2-clause(src/core/ngx_murmurhash.c); BSD-2-clause(src/http/modules/ngx_http_scgi_module.c); BSD-2-clause(contrib/geo2nginx.pl); BSD-2-clause(debian/* ); BSD-2-clause(debian/modules/http-headers-more-filter/* ); BSD-3-clause(debian/modules/http-ndk/* ); BSD-4-clause(debian/modules/http-ndk/src/hash/md5.h); BSD-2-clause(debian/modules/http-auth-pam/* ); BSD-2-clause(debian/modules/http-echo/* ); BSD-2-clause(debian/modules/http-lua/* ); BSD-2-clause(debian/modules/http-upstream-fair/* ); MIT(debian/modules/nchan/* ); MIT(debian/modules/nchan/src/store/redis/cmp.* ); BSD-2-clause(debian/modules/http-uploadprogress/* ); BSD-2-clause(debian/modules/http-cache-purge/* ); BSD-2-clause(debian/modules/http-dav-ext/* ); BSD-2-clause(debian/modules/http-fancyindex/* ); BSD-2-clause(debian/modules/http-subs-filter/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-3-clause(debian/modules/rtmp/* ); BSD-4-clause(debian/modules/rtmp/* ); MIT(debian/modules/rtmp/* ) | -| {{}} | 1.14.2-2+deb10u4 | BSD-2-clause(* ); BSD-2-clause(src/core/ngx_murmurhash.c); BSD-2-clause(src/http/modules/ngx_http_scgi_module.c); BSD-2-clause(contrib/geo2nginx.pl); BSD-2-clause(debian/* ); BSD-2-clause(debian/modules/http-headers-more-filter/* ); BSD-3-clause(debian/modules/http-ndk/* ); BSD-4-clause(debian/modules/http-ndk/src/hash/md5.h); BSD-2-clause(debian/modules/http-auth-pam/* ); BSD-2-clause(debian/modules/http-echo/* ); BSD-2-clause(debian/modules/http-lua/* ); BSD-2-clause(debian/modules/http-upstream-fair/* ); MIT(debian/modules/nchan/* ); MIT(debian/modules/nchan/src/store/redis/cmp.* ); BSD-2-clause(debian/modules/http-uploadprogress/* ); BSD-2-clause(debian/modules/http-cache-purge/* ); BSD-2-clause(debian/modules/http-dav-ext/* ); BSD-2-clause(debian/modules/http-fancyindex/* ); BSD-2-clause(debian/modules/http-subs-filter/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-3-clause(debian/modules/rtmp/* ); BSD-4-clause(debian/modules/rtmp/* ); MIT(debian/modules/rtmp/* ) | -| {{}} | 1.14.2-2+deb10u4 | BSD-2-clause(* ); BSD-2-clause(src/core/ngx_murmurhash.c); BSD-2-clause(src/http/modules/ngx_http_scgi_module.c); BSD-2-clause(contrib/geo2nginx.pl); BSD-2-clause(debian/* ); BSD-2-clause(debian/modules/http-headers-more-filter/* ); BSD-3-clause(debian/modules/http-ndk/* ); BSD-4-clause(debian/modules/http-ndk/src/hash/md5.h); BSD-2-clause(debian/modules/http-auth-pam/* ); BSD-2-clause(debian/modules/http-echo/* ); BSD-2-clause(debian/modules/http-lua/* ); BSD-2-clause(debian/modules/http-upstream-fair/* ); MIT(debian/modules/nchan/* ); MIT(debian/modules/nchan/src/store/redis/cmp.* ); BSD-2-clause(debian/modules/http-uploadprogress/* ); BSD-2-clause(debian/modules/http-cache-purge/* ); BSD-2-clause(debian/modules/http-dav-ext/* ); BSD-2-clause(debian/modules/http-fancyindex/* ); BSD-2-clause(debian/modules/http-subs-filter/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-3-clause(debian/modules/rtmp/* ); BSD-4-clause(debian/modules/rtmp/* ); MIT(debian/modules/rtmp/* ) | -| {{}} | 1.14.2-2+deb10u4 | BSD-2-clause(* ); BSD-2-clause(src/core/ngx_murmurhash.c); BSD-2-clause(src/http/modules/ngx_http_scgi_module.c); BSD-2-clause(contrib/geo2nginx.pl); BSD-2-clause(debian/* ); BSD-2-clause(debian/modules/http-headers-more-filter/* ); BSD-3-clause(debian/modules/http-ndk/* ); BSD-4-clause(debian/modules/http-ndk/src/hash/md5.h); BSD-2-clause(debian/modules/http-auth-pam/* ); BSD-2-clause(debian/modules/http-echo/* ); BSD-2-clause(debian/modules/http-lua/* ); BSD-2-clause(debian/modules/http-upstream-fair/* ); MIT(debian/modules/nchan/* ); MIT(debian/modules/nchan/src/store/redis/cmp.* ); BSD-2-clause(debian/modules/http-uploadprogress/* ); BSD-2-clause(debian/modules/http-cache-purge/* ); BSD-2-clause(debian/modules/http-dav-ext/* ); BSD-2-clause(debian/modules/http-fancyindex/* ); BSD-2-clause(debian/modules/http-subs-filter/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-3-clause(debian/modules/rtmp/* ); BSD-4-clause(debian/modules/rtmp/* ); MIT(debian/modules/rtmp/* ) | -| {{}} | 1.14.2-2+deb10u4 | BSD-2-clause(* ); BSD-2-clause(src/core/ngx_murmurhash.c); BSD-2-clause(src/http/modules/ngx_http_scgi_module.c); BSD-2-clause(contrib/geo2nginx.pl); BSD-2-clause(debian/* ); BSD-2-clause(debian/modules/http-headers-more-filter/* ); BSD-3-clause(debian/modules/http-ndk/* ); BSD-4-clause(debian/modules/http-ndk/src/hash/md5.h); BSD-2-clause(debian/modules/http-auth-pam/* ); BSD-2-clause(debian/modules/http-echo/* ); BSD-2-clause(debian/modules/http-lua/* ); BSD-2-clause(debian/modules/http-upstream-fair/* ); MIT(debian/modules/nchan/* ); MIT(debian/modules/nchan/src/store/redis/cmp.* ); BSD-2-clause(debian/modules/http-uploadprogress/* ); BSD-2-clause(debian/modules/http-cache-purge/* ); BSD-2-clause(debian/modules/http-dav-ext/* ); BSD-2-clause(debian/modules/http-fancyindex/* ); BSD-2-clause(debian/modules/http-subs-filter/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-3-clause(debian/modules/rtmp/* ); BSD-4-clause(debian/modules/rtmp/* ); MIT(debian/modules/rtmp/* ) | -| {{}} | 1.14.2-2+deb10u4 | BSD-2-clause(* ); BSD-2-clause(src/core/ngx_murmurhash.c); BSD-2-clause(src/http/modules/ngx_http_scgi_module.c); BSD-2-clause(contrib/geo2nginx.pl); BSD-2-clause(debian/* ); BSD-2-clause(debian/modules/http-headers-more-filter/* ); BSD-3-clause(debian/modules/http-ndk/* ); BSD-4-clause(debian/modules/http-ndk/src/hash/md5.h); BSD-2-clause(debian/modules/http-auth-pam/* ); BSD-2-clause(debian/modules/http-echo/* ); BSD-2-clause(debian/modules/http-lua/* ); BSD-2-clause(debian/modules/http-upstream-fair/* ); MIT(debian/modules/nchan/* ); MIT(debian/modules/nchan/src/store/redis/cmp.* ); BSD-2-clause(debian/modules/http-uploadprogress/* ); BSD-2-clause(debian/modules/http-cache-purge/* ); BSD-2-clause(debian/modules/http-dav-ext/* ); BSD-2-clause(debian/modules/http-fancyindex/* ); BSD-2-clause(debian/modules/http-subs-filter/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-3-clause(debian/modules/rtmp/* ); BSD-4-clause(debian/modules/rtmp/* ); MIT(debian/modules/rtmp/* ) | -| {{}} | 1.14.2-2+deb10u4 | BSD-2-clause(* ); BSD-2-clause(src/core/ngx_murmurhash.c); BSD-2-clause(src/http/modules/ngx_http_scgi_module.c); BSD-2-clause(contrib/geo2nginx.pl); BSD-2-clause(debian/* ); BSD-2-clause(debian/modules/http-headers-more-filter/* ); BSD-3-clause(debian/modules/http-ndk/* ); BSD-4-clause(debian/modules/http-ndk/src/hash/md5.h); BSD-2-clause(debian/modules/http-auth-pam/* ); BSD-2-clause(debian/modules/http-echo/* ); BSD-2-clause(debian/modules/http-lua/* ); BSD-2-clause(debian/modules/http-upstream-fair/* ); MIT(debian/modules/nchan/* ); MIT(debian/modules/nchan/src/store/redis/cmp.* ); BSD-2-clause(debian/modules/http-uploadprogress/* ); BSD-2-clause(debian/modules/http-cache-purge/* ); BSD-2-clause(debian/modules/http-dav-ext/* ); BSD-2-clause(debian/modules/http-fancyindex/* ); BSD-2-clause(debian/modules/http-subs-filter/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-3-clause(debian/modules/rtmp/* ); BSD-4-clause(debian/modules/rtmp/* ); MIT(debian/modules/rtmp/* ) | -| {{}} | 3.2.27-cl4.3.1u16 | GPL; GPL-2; LGPL-2 | -| {{}} | 3.2.27-cl4.3.1u16 | GPL; GPL-2; LGPL-2 | -| {{}} | 3.2.27-cl4.3.1u16 | NO COPYRIGHT FILE | -| {{}} | 3.2.27-cl4.3.1u16 | GPL; GPL-2; LGPL-2 | -| {{}} | 3.2.27-cl4.3.1u16 | GPL; GPL-2; LGPL-2 | -| {{}} | 3.2.27-cl4.3.1u16 | GPL; GPL-2; LGPL-2 | -| {{}} | 3.2.27-cl4.3.1u16 | GPL; GPL-2; LGPL-2 | -| {{}} | 3.2.27-cl4.3.1u16 | NO COPYRIGHT FILE | -| {{}} | 3.2.27-cl4.3.1u16 | GPL; GPL-2; LGPL-2 | -| {{}} | 3.2.27-cl4.3.1u16 | GPL; GPL-2; LGPL-2 | -| {{}} | 3.2.27-cl4.3.1u16 | GPL; GPL-2; LGPL-2 | -| {{}} | 3.2.27-cl4.3.1u16 | GPL; GPL-2; LGPL-2 | -| {{}} | 3.2.27-cl4.3.1u16 | GPL; GPL-2; LGPL-2 | -| {{}} | 3.2.27-cl4.3.1u16 | GPL; GPL-2; LGPL-2 | -| {{}} | 3.2.27-cl4.3.1u16 | GPL; GPL-2; LGPL-2 | -| {{}} | 3.2.27-cl4.3.1u16 | GPL; GPL-2; LGPL-2 | +| {{}} | 1.14.2-2+deb10u5 | BSD-2-clause(* ); BSD-2-clause(src/core/ngx_murmurhash.c); BSD-2-clause(src/http/modules/ngx_http_scgi_module.c); BSD-2-clause(contrib/geo2nginx.pl); BSD-2-clause(debian/* ); BSD-2-clause(debian/modules/http-headers-more-filter/* ); BSD-3-clause(debian/modules/http-ndk/* ); BSD-4-clause(debian/modules/http-ndk/src/hash/md5.h); BSD-2-clause(debian/modules/http-auth-pam/* ); BSD-2-clause(debian/modules/http-echo/* ); BSD-2-clause(debian/modules/http-lua/* ); BSD-2-clause(debian/modules/http-upstream-fair/* ); MIT(debian/modules/nchan/* ); MIT(debian/modules/nchan/src/store/redis/cmp.* ); BSD-2-clause(debian/modules/http-uploadprogress/* ); BSD-2-clause(debian/modules/http-cache-purge/* ); BSD-2-clause(debian/modules/http-dav-ext/* ); BSD-2-clause(debian/modules/http-fancyindex/* ); BSD-2-clause(debian/modules/http-subs-filter/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-3-clause(debian/modules/rtmp/* ); BSD-4-clause(debian/modules/rtmp/* ); MIT(debian/modules/rtmp/* ) | +| {{}} | 1.14.2-2+deb10u5 | BSD-2-clause(* ); BSD-2-clause(src/core/ngx_murmurhash.c); BSD-2-clause(src/http/modules/ngx_http_scgi_module.c); BSD-2-clause(contrib/geo2nginx.pl); BSD-2-clause(debian/* ); BSD-2-clause(debian/modules/http-headers-more-filter/* ); BSD-3-clause(debian/modules/http-ndk/* ); BSD-4-clause(debian/modules/http-ndk/src/hash/md5.h); BSD-2-clause(debian/modules/http-auth-pam/* ); BSD-2-clause(debian/modules/http-echo/* ); BSD-2-clause(debian/modules/http-lua/* ); BSD-2-clause(debian/modules/http-upstream-fair/* ); MIT(debian/modules/nchan/* ); MIT(debian/modules/nchan/src/store/redis/cmp.* ); BSD-2-clause(debian/modules/http-uploadprogress/* ); BSD-2-clause(debian/modules/http-cache-purge/* ); BSD-2-clause(debian/modules/http-dav-ext/* ); BSD-2-clause(debian/modules/http-fancyindex/* ); BSD-2-clause(debian/modules/http-subs-filter/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-3-clause(debian/modules/rtmp/* ); BSD-4-clause(debian/modules/rtmp/* ); MIT(debian/modules/rtmp/* ) | +| {{}} | 1.14.2-2+deb10u5 | BSD-2-clause(* ); BSD-2-clause(src/core/ngx_murmurhash.c); BSD-2-clause(src/http/modules/ngx_http_scgi_module.c); BSD-2-clause(contrib/geo2nginx.pl); BSD-2-clause(debian/* ); BSD-2-clause(debian/modules/http-headers-more-filter/* ); BSD-3-clause(debian/modules/http-ndk/* ); BSD-4-clause(debian/modules/http-ndk/src/hash/md5.h); BSD-2-clause(debian/modules/http-auth-pam/* ); BSD-2-clause(debian/modules/http-echo/* ); BSD-2-clause(debian/modules/http-lua/* ); BSD-2-clause(debian/modules/http-upstream-fair/* ); MIT(debian/modules/nchan/* ); MIT(debian/modules/nchan/src/store/redis/cmp.* ); BSD-2-clause(debian/modules/http-uploadprogress/* ); BSD-2-clause(debian/modules/http-cache-purge/* ); BSD-2-clause(debian/modules/http-dav-ext/* ); BSD-2-clause(debian/modules/http-fancyindex/* ); BSD-2-clause(debian/modules/http-subs-filter/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-3-clause(debian/modules/rtmp/* ); BSD-4-clause(debian/modules/rtmp/* ); MIT(debian/modules/rtmp/* ) | +| {{}} | 1.14.2-2+deb10u5 | BSD-2-clause(* ); BSD-2-clause(src/core/ngx_murmurhash.c); BSD-2-clause(src/http/modules/ngx_http_scgi_module.c); BSD-2-clause(contrib/geo2nginx.pl); BSD-2-clause(debian/* ); BSD-2-clause(debian/modules/http-headers-more-filter/* ); BSD-3-clause(debian/modules/http-ndk/* ); BSD-4-clause(debian/modules/http-ndk/src/hash/md5.h); BSD-2-clause(debian/modules/http-auth-pam/* ); BSD-2-clause(debian/modules/http-echo/* ); BSD-2-clause(debian/modules/http-lua/* ); BSD-2-clause(debian/modules/http-upstream-fair/* ); MIT(debian/modules/nchan/* ); MIT(debian/modules/nchan/src/store/redis/cmp.* ); BSD-2-clause(debian/modules/http-uploadprogress/* ); BSD-2-clause(debian/modules/http-cache-purge/* ); BSD-2-clause(debian/modules/http-dav-ext/* ); BSD-2-clause(debian/modules/http-fancyindex/* ); BSD-2-clause(debian/modules/http-subs-filter/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-3-clause(debian/modules/rtmp/* ); BSD-4-clause(debian/modules/rtmp/* ); MIT(debian/modules/rtmp/* ) | +| {{}} | 1.14.2-2+deb10u5 | BSD-2-clause(* ); BSD-2-clause(src/core/ngx_murmurhash.c); BSD-2-clause(src/http/modules/ngx_http_scgi_module.c); BSD-2-clause(contrib/geo2nginx.pl); BSD-2-clause(debian/* ); BSD-2-clause(debian/modules/http-headers-more-filter/* ); BSD-3-clause(debian/modules/http-ndk/* ); BSD-4-clause(debian/modules/http-ndk/src/hash/md5.h); BSD-2-clause(debian/modules/http-auth-pam/* ); BSD-2-clause(debian/modules/http-echo/* ); BSD-2-clause(debian/modules/http-lua/* ); BSD-2-clause(debian/modules/http-upstream-fair/* ); MIT(debian/modules/nchan/* ); MIT(debian/modules/nchan/src/store/redis/cmp.* ); BSD-2-clause(debian/modules/http-uploadprogress/* ); BSD-2-clause(debian/modules/http-cache-purge/* ); BSD-2-clause(debian/modules/http-dav-ext/* ); BSD-2-clause(debian/modules/http-fancyindex/* ); BSD-2-clause(debian/modules/http-subs-filter/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-3-clause(debian/modules/rtmp/* ); BSD-4-clause(debian/modules/rtmp/* ); MIT(debian/modules/rtmp/* ) | +| {{}} | 1.14.2-2+deb10u5 | BSD-2-clause(* ); BSD-2-clause(src/core/ngx_murmurhash.c); BSD-2-clause(src/http/modules/ngx_http_scgi_module.c); BSD-2-clause(contrib/geo2nginx.pl); BSD-2-clause(debian/* ); BSD-2-clause(debian/modules/http-headers-more-filter/* ); BSD-3-clause(debian/modules/http-ndk/* ); BSD-4-clause(debian/modules/http-ndk/src/hash/md5.h); BSD-2-clause(debian/modules/http-auth-pam/* ); BSD-2-clause(debian/modules/http-echo/* ); BSD-2-clause(debian/modules/http-lua/* ); BSD-2-clause(debian/modules/http-upstream-fair/* ); MIT(debian/modules/nchan/* ); MIT(debian/modules/nchan/src/store/redis/cmp.* ); BSD-2-clause(debian/modules/http-uploadprogress/* ); BSD-2-clause(debian/modules/http-cache-purge/* ); BSD-2-clause(debian/modules/http-dav-ext/* ); BSD-2-clause(debian/modules/http-fancyindex/* ); BSD-2-clause(debian/modules/http-subs-filter/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-3-clause(debian/modules/rtmp/* ); BSD-4-clause(debian/modules/rtmp/* ); MIT(debian/modules/rtmp/* ) | +| {{}} | 1.14.2-2+deb10u5 | BSD-2-clause(* ); BSD-2-clause(src/core/ngx_murmurhash.c); BSD-2-clause(src/http/modules/ngx_http_scgi_module.c); BSD-2-clause(contrib/geo2nginx.pl); BSD-2-clause(debian/* ); BSD-2-clause(debian/modules/http-headers-more-filter/* ); BSD-3-clause(debian/modules/http-ndk/* ); BSD-4-clause(debian/modules/http-ndk/src/hash/md5.h); BSD-2-clause(debian/modules/http-auth-pam/* ); BSD-2-clause(debian/modules/http-echo/* ); BSD-2-clause(debian/modules/http-lua/* ); BSD-2-clause(debian/modules/http-upstream-fair/* ); MIT(debian/modules/nchan/* ); MIT(debian/modules/nchan/src/store/redis/cmp.* ); BSD-2-clause(debian/modules/http-uploadprogress/* ); BSD-2-clause(debian/modules/http-cache-purge/* ); BSD-2-clause(debian/modules/http-dav-ext/* ); BSD-2-clause(debian/modules/http-fancyindex/* ); BSD-2-clause(debian/modules/http-subs-filter/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-3-clause(debian/modules/rtmp/* ); BSD-4-clause(debian/modules/rtmp/* ); MIT(debian/modules/rtmp/* ) | +| {{}} | 1.14.2-2+deb10u5 | BSD-2-clause(* ); BSD-2-clause(src/core/ngx_murmurhash.c); BSD-2-clause(src/http/modules/ngx_http_scgi_module.c); BSD-2-clause(contrib/geo2nginx.pl); BSD-2-clause(debian/* ); BSD-2-clause(debian/modules/http-headers-more-filter/* ); BSD-3-clause(debian/modules/http-ndk/* ); BSD-4-clause(debian/modules/http-ndk/src/hash/md5.h); BSD-2-clause(debian/modules/http-auth-pam/* ); BSD-2-clause(debian/modules/http-echo/* ); BSD-2-clause(debian/modules/http-lua/* ); BSD-2-clause(debian/modules/http-upstream-fair/* ); MIT(debian/modules/nchan/* ); MIT(debian/modules/nchan/src/store/redis/cmp.* ); BSD-2-clause(debian/modules/http-uploadprogress/* ); BSD-2-clause(debian/modules/http-cache-purge/* ); BSD-2-clause(debian/modules/http-dav-ext/* ); BSD-2-clause(debian/modules/http-fancyindex/* ); BSD-2-clause(debian/modules/http-subs-filter/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-3-clause(debian/modules/rtmp/* ); BSD-4-clause(debian/modules/rtmp/* ); MIT(debian/modules/rtmp/* ) | +| {{}} | 1.14.2-2+deb10u5 | BSD-2-clause(* ); BSD-2-clause(src/core/ngx_murmurhash.c); BSD-2-clause(src/http/modules/ngx_http_scgi_module.c); BSD-2-clause(contrib/geo2nginx.pl); BSD-2-clause(debian/* ); BSD-2-clause(debian/modules/http-headers-more-filter/* ); BSD-3-clause(debian/modules/http-ndk/* ); BSD-4-clause(debian/modules/http-ndk/src/hash/md5.h); BSD-2-clause(debian/modules/http-auth-pam/* ); BSD-2-clause(debian/modules/http-echo/* ); BSD-2-clause(debian/modules/http-lua/* ); BSD-2-clause(debian/modules/http-upstream-fair/* ); MIT(debian/modules/nchan/* ); MIT(debian/modules/nchan/src/store/redis/cmp.* ); BSD-2-clause(debian/modules/http-uploadprogress/* ); BSD-2-clause(debian/modules/http-cache-purge/* ); BSD-2-clause(debian/modules/http-dav-ext/* ); BSD-2-clause(debian/modules/http-fancyindex/* ); BSD-2-clause(debian/modules/http-subs-filter/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-3-clause(debian/modules/rtmp/* ); BSD-4-clause(debian/modules/rtmp/* ); MIT(debian/modules/rtmp/* ) | +| {{}} | 1.14.2-2+deb10u5 | BSD-2-clause(* ); BSD-2-clause(src/core/ngx_murmurhash.c); BSD-2-clause(src/http/modules/ngx_http_scgi_module.c); BSD-2-clause(contrib/geo2nginx.pl); BSD-2-clause(debian/* ); BSD-2-clause(debian/modules/http-headers-more-filter/* ); BSD-3-clause(debian/modules/http-ndk/* ); BSD-4-clause(debian/modules/http-ndk/src/hash/md5.h); BSD-2-clause(debian/modules/http-auth-pam/* ); BSD-2-clause(debian/modules/http-echo/* ); BSD-2-clause(debian/modules/http-lua/* ); BSD-2-clause(debian/modules/http-upstream-fair/* ); MIT(debian/modules/nchan/* ); MIT(debian/modules/nchan/src/store/redis/cmp.* ); BSD-2-clause(debian/modules/http-uploadprogress/* ); BSD-2-clause(debian/modules/http-cache-purge/* ); BSD-2-clause(debian/modules/http-dav-ext/* ); BSD-2-clause(debian/modules/http-fancyindex/* ); BSD-2-clause(debian/modules/http-subs-filter/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-3-clause(debian/modules/rtmp/* ); BSD-4-clause(debian/modules/rtmp/* ); MIT(debian/modules/rtmp/* ) | +| {{}} | 1.14.2-2+deb10u5 | BSD-2-clause(* ); BSD-2-clause(src/core/ngx_murmurhash.c); BSD-2-clause(src/http/modules/ngx_http_scgi_module.c); BSD-2-clause(contrib/geo2nginx.pl); BSD-2-clause(debian/* ); BSD-2-clause(debian/modules/http-headers-more-filter/* ); BSD-3-clause(debian/modules/http-ndk/* ); BSD-4-clause(debian/modules/http-ndk/src/hash/md5.h); BSD-2-clause(debian/modules/http-auth-pam/* ); BSD-2-clause(debian/modules/http-echo/* ); BSD-2-clause(debian/modules/http-lua/* ); BSD-2-clause(debian/modules/http-upstream-fair/* ); MIT(debian/modules/nchan/* ); MIT(debian/modules/nchan/src/store/redis/cmp.* ); BSD-2-clause(debian/modules/http-uploadprogress/* ); BSD-2-clause(debian/modules/http-cache-purge/* ); BSD-2-clause(debian/modules/http-dav-ext/* ); BSD-2-clause(debian/modules/http-fancyindex/* ); BSD-2-clause(debian/modules/http-subs-filter/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-3-clause(debian/modules/rtmp/* ); BSD-4-clause(debian/modules/rtmp/* ); MIT(debian/modules/rtmp/* ) | +| {{}} | 1.14.2-2+deb10u5 | BSD-2-clause(* ); BSD-2-clause(src/core/ngx_murmurhash.c); BSD-2-clause(src/http/modules/ngx_http_scgi_module.c); BSD-2-clause(contrib/geo2nginx.pl); BSD-2-clause(debian/* ); BSD-2-clause(debian/modules/http-headers-more-filter/* ); BSD-3-clause(debian/modules/http-ndk/* ); BSD-4-clause(debian/modules/http-ndk/src/hash/md5.h); BSD-2-clause(debian/modules/http-auth-pam/* ); BSD-2-clause(debian/modules/http-echo/* ); BSD-2-clause(debian/modules/http-lua/* ); BSD-2-clause(debian/modules/http-upstream-fair/* ); MIT(debian/modules/nchan/* ); MIT(debian/modules/nchan/src/store/redis/cmp.* ); BSD-2-clause(debian/modules/http-uploadprogress/* ); BSD-2-clause(debian/modules/http-cache-purge/* ); BSD-2-clause(debian/modules/http-dav-ext/* ); BSD-2-clause(debian/modules/http-fancyindex/* ); BSD-2-clause(debian/modules/http-subs-filter/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-3-clause(debian/modules/rtmp/* ); BSD-4-clause(debian/modules/rtmp/* ); MIT(debian/modules/rtmp/* ) | +| {{}} | 1.14.2-2+deb10u5 | BSD-2-clause(* ); BSD-2-clause(src/core/ngx_murmurhash.c); BSD-2-clause(src/http/modules/ngx_http_scgi_module.c); BSD-2-clause(contrib/geo2nginx.pl); BSD-2-clause(debian/* ); BSD-2-clause(debian/modules/http-headers-more-filter/* ); BSD-3-clause(debian/modules/http-ndk/* ); BSD-4-clause(debian/modules/http-ndk/src/hash/md5.h); BSD-2-clause(debian/modules/http-auth-pam/* ); BSD-2-clause(debian/modules/http-echo/* ); BSD-2-clause(debian/modules/http-lua/* ); BSD-2-clause(debian/modules/http-upstream-fair/* ); MIT(debian/modules/nchan/* ); MIT(debian/modules/nchan/src/store/redis/cmp.* ); BSD-2-clause(debian/modules/http-uploadprogress/* ); BSD-2-clause(debian/modules/http-cache-purge/* ); BSD-2-clause(debian/modules/http-dav-ext/* ); BSD-2-clause(debian/modules/http-fancyindex/* ); BSD-2-clause(debian/modules/http-subs-filter/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-3-clause(debian/modules/rtmp/* ); BSD-4-clause(debian/modules/rtmp/* ); MIT(debian/modules/rtmp/* ) | +| {{}} | 1.14.2-2+deb10u5 | BSD-2-clause(* ); BSD-2-clause(src/core/ngx_murmurhash.c); BSD-2-clause(src/http/modules/ngx_http_scgi_module.c); BSD-2-clause(contrib/geo2nginx.pl); BSD-2-clause(debian/* ); BSD-2-clause(debian/modules/http-headers-more-filter/* ); BSD-3-clause(debian/modules/http-ndk/* ); BSD-4-clause(debian/modules/http-ndk/src/hash/md5.h); BSD-2-clause(debian/modules/http-auth-pam/* ); BSD-2-clause(debian/modules/http-echo/* ); BSD-2-clause(debian/modules/http-lua/* ); BSD-2-clause(debian/modules/http-upstream-fair/* ); MIT(debian/modules/nchan/* ); MIT(debian/modules/nchan/src/store/redis/cmp.* ); BSD-2-clause(debian/modules/http-uploadprogress/* ); BSD-2-clause(debian/modules/http-cache-purge/* ); BSD-2-clause(debian/modules/http-dav-ext/* ); BSD-2-clause(debian/modules/http-fancyindex/* ); BSD-2-clause(debian/modules/http-subs-filter/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-3-clause(debian/modules/rtmp/* ); BSD-4-clause(debian/modules/rtmp/* ); MIT(debian/modules/rtmp/* ) | +| {{}} | 1.14.2-2+deb10u5 | BSD-2-clause(* ); BSD-2-clause(src/core/ngx_murmurhash.c); BSD-2-clause(src/http/modules/ngx_http_scgi_module.c); BSD-2-clause(contrib/geo2nginx.pl); BSD-2-clause(debian/* ); BSD-2-clause(debian/modules/http-headers-more-filter/* ); BSD-3-clause(debian/modules/http-ndk/* ); BSD-4-clause(debian/modules/http-ndk/src/hash/md5.h); BSD-2-clause(debian/modules/http-auth-pam/* ); BSD-2-clause(debian/modules/http-echo/* ); BSD-2-clause(debian/modules/http-lua/* ); BSD-2-clause(debian/modules/http-upstream-fair/* ); MIT(debian/modules/nchan/* ); MIT(debian/modules/nchan/src/store/redis/cmp.* ); BSD-2-clause(debian/modules/http-uploadprogress/* ); BSD-2-clause(debian/modules/http-cache-purge/* ); BSD-2-clause(debian/modules/http-dav-ext/* ); BSD-2-clause(debian/modules/http-fancyindex/* ); BSD-2-clause(debian/modules/http-subs-filter/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-3-clause(debian/modules/rtmp/* ); BSD-4-clause(debian/modules/rtmp/* ); MIT(debian/modules/rtmp/* ) | +| {{}} | 1.14.2-2+deb10u5 | BSD-2-clause(* ); BSD-2-clause(src/core/ngx_murmurhash.c); BSD-2-clause(src/http/modules/ngx_http_scgi_module.c); BSD-2-clause(contrib/geo2nginx.pl); BSD-2-clause(debian/* ); BSD-2-clause(debian/modules/http-headers-more-filter/* ); BSD-3-clause(debian/modules/http-ndk/* ); BSD-4-clause(debian/modules/http-ndk/src/hash/md5.h); BSD-2-clause(debian/modules/http-auth-pam/* ); BSD-2-clause(debian/modules/http-echo/* ); BSD-2-clause(debian/modules/http-lua/* ); BSD-2-clause(debian/modules/http-upstream-fair/* ); MIT(debian/modules/nchan/* ); MIT(debian/modules/nchan/src/store/redis/cmp.* ); BSD-2-clause(debian/modules/http-uploadprogress/* ); BSD-2-clause(debian/modules/http-cache-purge/* ); BSD-2-clause(debian/modules/http-dav-ext/* ); BSD-2-clause(debian/modules/http-fancyindex/* ); BSD-2-clause(debian/modules/http-subs-filter/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-3-clause(debian/modules/rtmp/* ); BSD-4-clause(debian/modules/rtmp/* ); MIT(debian/modules/rtmp/* ) | +| {{}} | 1.14.2-2+deb10u5 | BSD-2-clause(* ); BSD-2-clause(src/core/ngx_murmurhash.c); BSD-2-clause(src/http/modules/ngx_http_scgi_module.c); BSD-2-clause(contrib/geo2nginx.pl); BSD-2-clause(debian/* ); BSD-2-clause(debian/modules/http-headers-more-filter/* ); BSD-3-clause(debian/modules/http-ndk/* ); BSD-4-clause(debian/modules/http-ndk/src/hash/md5.h); BSD-2-clause(debian/modules/http-auth-pam/* ); BSD-2-clause(debian/modules/http-echo/* ); BSD-2-clause(debian/modules/http-lua/* ); BSD-2-clause(debian/modules/http-upstream-fair/* ); MIT(debian/modules/nchan/* ); MIT(debian/modules/nchan/src/store/redis/cmp.* ); BSD-2-clause(debian/modules/http-uploadprogress/* ); BSD-2-clause(debian/modules/http-cache-purge/* ); BSD-2-clause(debian/modules/http-dav-ext/* ); BSD-2-clause(debian/modules/http-fancyindex/* ); BSD-2-clause(debian/modules/http-subs-filter/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-3-clause(debian/modules/rtmp/* ); BSD-4-clause(debian/modules/rtmp/* ); MIT(debian/modules/rtmp/* ) | +| {{}} | 1.14.2-2+deb10u5 | BSD-2-clause(* ); BSD-2-clause(src/core/ngx_murmurhash.c); BSD-2-clause(src/http/modules/ngx_http_scgi_module.c); BSD-2-clause(contrib/geo2nginx.pl); BSD-2-clause(debian/* ); BSD-2-clause(debian/modules/http-headers-more-filter/* ); BSD-3-clause(debian/modules/http-ndk/* ); BSD-4-clause(debian/modules/http-ndk/src/hash/md5.h); BSD-2-clause(debian/modules/http-auth-pam/* ); BSD-2-clause(debian/modules/http-echo/* ); BSD-2-clause(debian/modules/http-lua/* ); BSD-2-clause(debian/modules/http-upstream-fair/* ); MIT(debian/modules/nchan/* ); MIT(debian/modules/nchan/src/store/redis/cmp.* ); BSD-2-clause(debian/modules/http-uploadprogress/* ); BSD-2-clause(debian/modules/http-cache-purge/* ); BSD-2-clause(debian/modules/http-dav-ext/* ); BSD-2-clause(debian/modules/http-fancyindex/* ); BSD-2-clause(debian/modules/http-subs-filter/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-3-clause(debian/modules/rtmp/* ); BSD-4-clause(debian/modules/rtmp/* ); MIT(debian/modules/rtmp/* ) | +| {{}} | 1.14.2-2+deb10u5 | BSD-2-clause(* ); BSD-2-clause(src/core/ngx_murmurhash.c); BSD-2-clause(src/http/modules/ngx_http_scgi_module.c); BSD-2-clause(contrib/geo2nginx.pl); BSD-2-clause(debian/* ); BSD-2-clause(debian/modules/http-headers-more-filter/* ); BSD-3-clause(debian/modules/http-ndk/* ); BSD-4-clause(debian/modules/http-ndk/src/hash/md5.h); BSD-2-clause(debian/modules/http-auth-pam/* ); BSD-2-clause(debian/modules/http-echo/* ); BSD-2-clause(debian/modules/http-lua/* ); BSD-2-clause(debian/modules/http-upstream-fair/* ); MIT(debian/modules/nchan/* ); MIT(debian/modules/nchan/src/store/redis/cmp.* ); BSD-2-clause(debian/modules/http-uploadprogress/* ); BSD-2-clause(debian/modules/http-cache-purge/* ); BSD-2-clause(debian/modules/http-dav-ext/* ); BSD-2-clause(debian/modules/http-fancyindex/* ); BSD-2-clause(debian/modules/http-subs-filter/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-3-clause(debian/modules/rtmp/* ); BSD-4-clause(debian/modules/rtmp/* ); MIT(debian/modules/rtmp/* ) | +| {{}} | 3.2.27-cl4.3.2u2 | GPL; GPL-2; LGPL-2 | +| {{}} | 3.2.27-cl4.3.2u2 | GPL; GPL-2; LGPL-2 | +| {{}} | 3.2.27-cl4.3.2u2 | GPL; GPL-2; LGPL-2 | +| {{}} | 3.2.27-cl4.3.2u2 | GPL; GPL-2; LGPL-2 | +| {{}} | 3.2.27-cl4.3.2u2 | GPL; GPL-2; LGPL-2 | +| {{}} | 3.2.27-cl4.3.2u2 | GPL; GPL-2; LGPL-2 | +| {{}} | 3.2.27-cl4.3.2u2 | GPL; GPL-2; LGPL-2 | +| {{}} | 3.2.27-cl4.3.2u2 | GPL; GPL-2; LGPL-2 | +| {{}} | 3.2.27-cl4.3.2u2 | GPL; GPL-2; LGPL-2 | +| {{}} | 3.2.27-cl4.3.2u2 | GPL; GPL-2; LGPL-2 | +| {{}} | 3.2.27-cl4.3.2u2 | GPL; GPL-2; LGPL-2 | +| {{}} | 3.2.27-cl4.3.2u2 | GPL; GPL-2; LGPL-2 | +| {{}} | 3.2.27-cl4.3.2u2 | GPL; GPL-2; LGPL-2 | +| {{}} | 3.2.27-cl4.3.2u2 | GPL; GPL-2; LGPL-2 | | {{}} | 1.5.8+dfsg2-1 | NRL-2-clause(* ); NRL-2-clause(src/sim/opnet/11.5/norm_protolib.pr.cpp); NRL-3-clause(src/unix/unixPostProcess.cpp); NRL-3-clause(include/galois.h); BSD-2-clause(src/common/normEncoderRS16.cpp); BSD-4-clause-UC(protolib/src/sim/ns/ns233/* ); BSD-3-clause(waf); BSD-3-clause(debian/* ); NRL-2-clause(debian/* ); NRL-3-clause(debian/* ); BSD-3-clause(debian/* ) | | {{}} | 1.5.8+dfsg2-1 | NRL-2-clause(* ); NRL-2-clause(src/sim/opnet/11.5/norm_protolib.pr.cpp); NRL-3-clause(src/unix/unixPostProcess.cpp); NRL-3-clause(include/galois.h); BSD-2-clause(src/common/normEncoderRS16.cpp); BSD-4-clause-UC(protolib/src/sim/ns/ns233/* ); BSD-3-clause(waf); BSD-3-clause(debian/* ); NRL-2-clause(debian/* ); NRL-3-clause(debian/* ); BSD-3-clause(debian/* ) | | {{}} | 1.6-1 | LGPL-2.1+(* ); LGPL-2.1+(debian/* ); LGPL-2.1+(debian/* ) | | {{}} | 4.20-1 | MPL-2.0(* ) | -| {{}} | 3.42.1-1+deb10u5 | MPL-2.0(* ); Zlib(nss/lib/zlib/* ); BSD-3(nss/lib/dbm/* ); public-domain(nss/lib/sqlite/sqlite3.c | -| {{}} | 3.42.1-1+deb10u5 | MPL-2.0(* ); Zlib(nss/lib/zlib/* ); BSD-3(nss/lib/dbm/* ); public-domain(nss/lib/sqlite/sqlite3.c | +| {{}} | 3.42.1-1+deb10u6 | MPL-2.0(* ); Zlib(nss/lib/zlib/* ); BSD-3(nss/lib/dbm/* ); public-domain(nss/lib/sqlite/sqlite3.c | +| {{}} | 3.42.1-1+deb10u6 | MPL-2.0(* ); Zlib(nss/lib/zlib/* ); BSD-3(nss/lib/dbm/* ); public-domain(nss/lib/sqlite/sqlite3.c | | {{}} | 0.9.10-2 | GPL; LGPL-2 | | {{}} | 1.1.0-cl4u1 | GPL-2+(* ) | | {{}} | 1.1.0-cl4u1 | NO COPYRIGHT FILE | @@ -884,36 +893,36 @@ pdfhidden: True | {{}} | 5.2.122~dfsg-3 | LGPL-2.1(* ); LGPL-2.1(debian/* ); LGPL-2.1(debian/* ); LGPL-2+(openpgm/pgm/md5.c* ); BSD-3-clause and ISC(openpgm/pgm/include/impl/ip.h); BSD-3-clause(openpgm/pgm/include/impl/ip.h); ISC(openpgm/pgm/include/impl/ip.h) | | {{}} | 5.2.122~dfsg-3 | LGPL-2.1(* ); LGPL-2.1(debian/* ); LGPL-2.1(debian/* ); LGPL-2+(openpgm/pgm/md5.c* ); BSD-3-clause and ISC(openpgm/pgm/include/impl/ip.h); BSD-3-clause(openpgm/pgm/include/impl/ip.h); ISC(openpgm/pgm/include/impl/ip.h) | | {{}} | 1.5.1-2 | GPL-2+(* ); GPL-3+(gnulib/* ); GPL-2+(lib/appendstr.c); GPL-2+(lib/debug.c); GPL-2+(lib/pipeline* ); GPL-2+(lib/pipeline* ); GPL-3+(lib/pipeline* ) | -| {{}} | 0.36.0-1 | MIT | +| {{}} | 0.36.0-1+deb10u1 | MIT | | {{}} | 1.6.36-6 | libpng(* ); libpng(arm/arm_init.c); expat(contrib/pngminus/* ); libpng(contrib/tools/* ); libpng(pngwutil.c pngstruct.h pngwrite.c pnginfo.h pngrio.c png.h); GPL-2+ or BSD-like-with-advertising-clause(contrib/gregbook/rpng-win.c contrib/gregbook/rpng2-x.c contrib/gregbook/rpng-x.c); GPL-2+ or BSD-like-with-advertising-clause(contrib/gregbook/writepng.h contrib/gregbook/readppm.c); libpng(contrib/visupng/PngFile.c contrib/visupng/PngFile.h); libpng(contrib/libtests/tarith.c); libpng OR Apache-2.0 OR BSD-3-clause(contrib/oss-fuzz/* ); Apache-2.0(contrib/oss-fuzz/Dockerfile); GPL-2+(debian/* ); expat(debian/* ); GPL-2+(debian/* ); BSD-like-with-advertising-clause(debian/* ); libpng(debian/* ); Apache-2.0(debian/* ); BSD-3-clause(debian/* ) | | {{}} | 1.6.36-6 | libpng(* ); libpng(arm/arm_init.c); expat(contrib/pngminus/* ); libpng(contrib/tools/* ); libpng(pngwutil.c pngstruct.h pngwrite.c pnginfo.h pngrio.c png.h); GPL-2+ or BSD-like-with-advertising-clause(contrib/gregbook/rpng-win.c contrib/gregbook/rpng2-x.c contrib/gregbook/rpng-x.c); GPL-2+ or BSD-like-with-advertising-clause(contrib/gregbook/writepng.h contrib/gregbook/readppm.c); libpng(contrib/visupng/PngFile.c contrib/visupng/PngFile.h); libpng(contrib/libtests/tarith.c); libpng OR Apache-2.0 OR BSD-3-clause(contrib/oss-fuzz/* ); Apache-2.0(contrib/oss-fuzz/Dockerfile); GPL-2+(debian/* ); expat(debian/* ); GPL-2+(debian/* ); BSD-like-with-advertising-clause(debian/* ); libpng(debian/* ); Apache-2.0(debian/* ); BSD-3-clause(debian/* ) | | {{}} | 1.16-12 | X-Consortium(* ); GPL-2+(debian/* ) | | {{}} | 1.15-1 | GPL-2+(* ); GPL-2+(debian/* ); GPL-2+(debian/* ) | | {{}} | 3.3.15-2 | LGPL-2.1+(* ); LGPL-2.0+(top/* ); GPL-2.0+(pgrep.* ); GPL-2.0+(pidof.* ); GPL-2.0+(free.* ); GPL-2.0+(sysctl.* ); GPL-2.0+(debian/* ); GPL-2.0+(debian/* ); LGPL-2.0+(debian/* ); LGPL-2.1+(debian/* ) | -| {{}} | 3.6.1.3-2 | BSD-3-Clause~Google(* ); BSD-3-Clause~Bloomberg(Files:); BSD-3-Clause~RedHat(Files:); GPLWithACException(m4/acx_pthread.m4); Apache-2.0(Files:); Public-Domain or Expat(conformance/third_party/jsoncpp/* ); GPL-3(debian/* ); Public-Domain(debian/* ); Expat(debian/* ); BSD-3-Clause~Google(debian/* ); BSD-3-Clause~Bloomberg(debian/* ); BSD-3-Clause~RedHat(debian/* ); Apache-2.0(debian/* ); GPL-3(debian/* ) | +| {{}} | 3.6.1.3-2+deb10u1 | BSD-3-Clause~Google(* ); BSD-3-Clause~Bloomberg(Files:); BSD-3-Clause~RedHat(Files:); GPLWithACException(m4/acx_pthread.m4); Apache-2.0(Files:); Public-Domain or Expat(conformance/third_party/jsoncpp/* ); GPL-3(debian/* ); Public-Domain(debian/* ); Expat(debian/* ); BSD-3-Clause~Google(debian/* ); BSD-3-Clause~Bloomberg(debian/* ); BSD-3-Clause~RedHat(debian/* ); Apache-2.0(debian/* ); GPL-3(debian/* ) | | {{}} | 1.3.1-1+b1 | BSD-2-Clause(* ); BSD-3-Clause(protoc-c/* ); permissive(debian/* ) | | {{}} | 1.3.1-1+b1 | BSD-2-Clause(* ); BSD-3-Clause(protoc-c/* ); permissive(debian/* ) | -| {{}} | 3.6.1.3-2 | NO COPYRIGHT FILE | -| {{}} | 3.6.1.3-2 | BSD-3-Clause~Google(* ); BSD-3-Clause~Bloomberg(Files:); BSD-3-Clause~RedHat(Files:); GPLWithACException(m4/acx_pthread.m4); Apache-2.0(Files:); Public-Domain or Expat(conformance/third_party/jsoncpp/* ); GPL-3(debian/* ); Public-Domain(debian/* ); Expat(debian/* ); BSD-3-Clause~Google(debian/* ); BSD-3-Clause~Bloomberg(debian/* ); BSD-3-Clause~RedHat(debian/* ); Apache-2.0(debian/* ); GPL-3(debian/* ) | -| {{}} | 3.6.1.3-2 | BSD-3-Clause~Google(* ); BSD-3-Clause~Bloomberg(Files:); BSD-3-Clause~RedHat(Files:); GPLWithACException(m4/acx_pthread.m4); Apache-2.0(Files:); Public-Domain or Expat(conformance/third_party/jsoncpp/* ); GPL-3(debian/* ); Public-Domain(debian/* ); Expat(debian/* ); BSD-3-Clause~Google(debian/* ); BSD-3-Clause~Bloomberg(debian/* ); BSD-3-Clause~RedHat(debian/* ); Apache-2.0(debian/* ); GPL-3(debian/* ) | +| {{}} | 3.6.1.3-2+deb10u1 | NO COPYRIGHT FILE | +| {{}} | 3.6.1.3-2+deb10u1 | BSD-3-Clause~Google(* ); BSD-3-Clause~Bloomberg(Files:); BSD-3-Clause~RedHat(Files:); GPLWithACException(m4/acx_pthread.m4); Apache-2.0(Files:); Public-Domain or Expat(conformance/third_party/jsoncpp/* ); GPL-3(debian/* ); Public-Domain(debian/* ); Expat(debian/* ); BSD-3-Clause~Google(debian/* ); BSD-3-Clause~Bloomberg(debian/* ); BSD-3-Clause~RedHat(debian/* ); Apache-2.0(debian/* ); GPL-3(debian/* ) | +| {{}} | 3.6.1.3-2+deb10u1 | BSD-3-Clause~Google(* ); BSD-3-Clause~Bloomberg(Files:); BSD-3-Clause~RedHat(Files:); GPLWithACException(m4/acx_pthread.m4); Apache-2.0(Files:); Public-Domain or Expat(conformance/third_party/jsoncpp/* ); GPL-3(debian/* ); Public-Domain(debian/* ); Expat(debian/* ); BSD-3-Clause~Google(debian/* ); BSD-3-Clause~Bloomberg(debian/* ); BSD-3-Clause~RedHat(debian/* ); Apache-2.0(debian/* ); GPL-3(debian/* ) | | {{}} | 0.20.2-2 | MIT(* ); MIT(debian/* ); Chromium(src/psl-make-dafsa src/lookup_string_in_fixed_set.c); MIT(src/psl-make-dafsa src/lookup_string_in_fixed_set.c); Chromium(src/psl-make-dafsa src/lookup_string_in_fixed_set.c) | -| {{}} | 2018.20181218.49446-1 | BSD; Common Public License; GPL; MIT | +| {{}} | 2018.20181218.49446-1+deb10u2 | BSD; Common Public License; GPL; MIT | | {{}} | 0.4-1 | BSD | -| {{}} | 4.0-cl4.3.1u4 | EPL-1(* ); GPL-2(debian/* ) | +| {{}} | 4.0-cl4.3.2u2 | EPL-1(* ); GPL-2(debian/* ) | | {{}} | 12.2-4+deb10u1 | GPL; GPL-2; GPL-2+; LGPL-2; LGPL-2+; LGPL-2.1+ | | {{}} | 12.2-4+deb10u1 | GPL; GPL-2; GPL-2+; LGPL-2; LGPL-2+; LGPL-2.1+ | | {{}} | 12.2-4+deb10u1 | GPL; GPL-2; GPL-2+; LGPL-2; LGPL-2+; LGPL-2.1+ | -| {{}} | 2.7.16-2+deb10u1 | NO COPYRIGHT FILE | -| {{}} | 2.7.16-2+deb10u1 | NO COPYRIGHT FILE | -| {{}} | 2.7.16-2+deb10u1 | Apache-2; BEOPEN; BSD; CNRI; GPL; GPL-2; ISC; OpenSSL; Python; SSLeay; zlib | -| {{}} | 2.7.16-2+deb10u1 | NO COPYRIGHT FILE | +| {{}} | 2.7.16-2+deb10u3 | NO COPYRIGHT FILE | +| {{}} | 2.7.16-2+deb10u3 | NO COPYRIGHT FILE | +| {{}} | 2.7.16-2+deb10u3 | Apache-2; BEOPEN; BSD; CNRI; GPL; GPL-2; ISC; OpenSSL; Python; SSLeay; zlib | +| {{}} | 2.7.16-2+deb10u3 | NO COPYRIGHT FILE | | {{}} | 2.7.16-1 | BEOPEN; CNRI; GPL; Python | | {{}} | 2.7.16-1 | BEOPEN; CNRI; GPL; Python | -| {{}} | 3.7.3-2+deb10u3 | NO COPYRIGHT FILE | -| {{}} | 3.7.3-2+deb10u3 | NO COPYRIGHT FILE | -| {{}} | 3.7.3-2+deb10u3 | NO COPYRIGHT FILE | -| {{}} | 3.7.3-2+deb10u3 | BEOPEN; BSD; CNRI; GPL; GPL-2; OpenSSL; Python; SSLeay; zlib | -| {{}} | 3.7.3-2+deb10u3 | NO COPYRIGHT FILE | +| {{}} | 3.7.3-2+deb10u6 | NO COPYRIGHT FILE | +| {{}} | 3.7.3-2+deb10u6 | NO COPYRIGHT FILE | +| {{}} | 3.7.3-2+deb10u6 | NO COPYRIGHT FILE | +| {{}} | 3.7.3-2+deb10u6 | BEOPEN; BSD; CNRI; GPL; GPL-2; OpenSSL; Python; SSLeay; zlib | +| {{}} | 3.7.3-2+deb10u6 | NO COPYRIGHT FILE | | {{}} | 3.7.3-1 | NO COPYRIGHT FILE | | {{}} | 3.7.3-1 | NO COPYRIGHT FILE | | {{}} | 3.7.3-1 | BEOPEN; CNRI; GPL; Python | @@ -921,22 +930,22 @@ pdfhidden: True | {{}} | 3.7.3-1 | BEOPEN; CNRI; GPL; Python | | {{}} | 2.7.16-1 | BEOPEN; CNRI; GPL; Python | | {{}} | 2.7.16-1 | BEOPEN; CNRI; GPL; Python | -| {{}} | 4.8.7+dfsg-18+deb10u1 | BSD; GPL; GPL-2; GPL-3; LGPL-2 | -| {{}} | 4.8.7+dfsg-18+deb10u1 | BSD; GPL; GPL-2; GPL-3; LGPL-2 | -| {{}} | 4.8.7+dfsg-18+deb10u1 | BSD; GPL; GPL-2; GPL-3; LGPL-2 | -| {{}} | 4.8.7+dfsg-18+deb10u1 | BSD; GPL; GPL-2; GPL-3; LGPL-2 | -| {{}} | 4.8.7+dfsg-18+deb10u1 | BSD; GPL; GPL-2; GPL-3; LGPL-2 | -| {{}} | 4.8.7+dfsg-18+deb10u1 | BSD; GPL; GPL-2; GPL-3; LGPL-2 | -| {{}} | 4.8.7+dfsg-18+deb10u1 | BSD; GPL; GPL-2; GPL-3; LGPL-2 | -| {{}} | 4.8.7+dfsg-18+deb10u1 | BSD; GPL; GPL-2; GPL-3; LGPL-2 | -| {{}} | 4.8.7+dfsg-18+deb10u1 | BSD; GPL; GPL-2; GPL-3; LGPL-2 | -| {{}} | 4.8.7+dfsg-18+deb10u1 | BSD; GPL; GPL-2; GPL-3; LGPL-2 | -| {{}} | 4.8.7+dfsg-18+deb10u1 | BSD; GPL; GPL-2; GPL-3; LGPL-2 | -| {{}} | 4.8.7+dfsg-18+deb10u1 | BSD; GPL; GPL-2; GPL-3; LGPL-2 | +| {{}} | 4.8.7+dfsg-18+deb10u2 | BSD; GPL; GPL-2; GPL-3; LGPL-2 | +| {{}} | 4.8.7+dfsg-18+deb10u2 | BSD; GPL; GPL-2; GPL-3; LGPL-2 | +| {{}} | 4.8.7+dfsg-18+deb10u2 | BSD; GPL; GPL-2; GPL-3; LGPL-2 | +| {{}} | 4.8.7+dfsg-18+deb10u2 | BSD; GPL; GPL-2; GPL-3; LGPL-2 | +| {{}} | 4.8.7+dfsg-18+deb10u2 | BSD; GPL; GPL-2; GPL-3; LGPL-2 | +| {{}} | 4.8.7+dfsg-18+deb10u2 | BSD; GPL; GPL-2; GPL-3; LGPL-2 | +| {{}} | 4.8.7+dfsg-18+deb10u2 | BSD; GPL; GPL-2; GPL-3; LGPL-2 | +| {{}} | 4.8.7+dfsg-18+deb10u2 | BSD; GPL; GPL-2; GPL-3; LGPL-2 | +| {{}} | 4.8.7+dfsg-18+deb10u2 | BSD; GPL; GPL-2; GPL-3; LGPL-2 | +| {{}} | 4.8.7+dfsg-18+deb10u2 | BSD; GPL; GPL-2; GPL-3; LGPL-2 | +| {{}} | 4.8.7+dfsg-18+deb10u2 | BSD; GPL; GPL-2; GPL-3; LGPL-2 | +| {{}} | 4.8.7+dfsg-18+deb10u2 | BSD; GPL; GPL-2; GPL-3; LGPL-2 | | {{}} | 4.6.3-7+b1 | GPL; GPL-3; LGPL-2 | -| {{}} | 4.8.7+dfsg-18+deb10u1 | BSD; GPL; GPL-2; GPL-3; LGPL-2 | -| {{}} | 4.8.7+dfsg-18+deb10u1 | BSD; GPL; GPL-2; GPL-3; LGPL-2 | -| {{}} | 4.8.7+dfsg-18+deb10u1 | BSD; GPL; GPL-2; GPL-3; LGPL-2 | +| {{}} | 4.8.7+dfsg-18+deb10u2 | BSD; GPL; GPL-2; GPL-3; LGPL-2 | +| {{}} | 4.8.7+dfsg-18+deb10u2 | BSD; GPL; GPL-2; GPL-3; LGPL-2 | +| {{}} | 4.8.7+dfsg-18+deb10u2 | BSD; GPL; GPL-2; GPL-3; LGPL-2 | | {{}} | 8.3.0-6 | NO COPYRIGHT FILE | | {{}} | 22.1-1 | BSD-MIT or GPL-2(* ); GPL-2+(debian/* ); BSD-MIT or GPL-2(CMakeLists.txt); BSD-MIT or GPL-2(buildlib/* ); BSD-2-clause(buildlib/fixup-include/stdatomic.h); CC0(ccan/* ); MIT(ccan/list.* ); BSD-MIT(ibacm/* ); BSD-2-clause(ibacm/man/* ); BSD-MIT or GPL-2(ibacm/CMakeLists.txt); BSD-MIT or GPL-2(iwpmd/* ); GPL-2 or BSD-2-clause(kernel-headers/* ); GPL-2(kernel-headers/rdma/rdma_netlink.h); GPL-2 or BSD-3-clause(kernel-headers/rdma/hfi/* ); BSD-MIT or GPL-2(libibumad/* ); BSD-2-clause(libibumad/man/* ); BSD-MIT or GPL-2(libibverbs/* ); BSD-2-clause(libibverbs/man/* ); BSD-MIT or GPL-2(librdmacm/* ); BSD-MIT(librdmacm/examples/cmtime.c); BSD-2-clause(librdmacm/docs/rsocket); BSD-2-clause(librdmacm/man/* ); BSD-2-clause or GPL-2(providers/bnxt_re/* ); BSD-MIT or GPL-2(providers/cxgb3/* ); BSD-3-clause or GPL-2(providers/hfi1verbs/* ); BSD-MIT or GPL-2(providers/hns/* ); BSD-MIT or GPL-2(providers/i40iw/* ); BSD-MIT or GPL-2(providers/ipathverbs/* ); BSD-MIT or GPL-2(providers/mlx4/* ); BSD-MIT or GPL-2(providers/mlx5/* ); BSD-MIT(providers/mlx5/man/* .3); BSD-MIT or GPL-2(providers/mthca/* ); BSD-MIT or GPL-2(providers/nes/* ); BSD-2-clause or GPL-2(providers/ocrdma/* ); BSD-MIT or GPL-2(providers/qedr/* ); BSD-MIT or GPL-2(providers/rxe/* ); BSD-2-clause or GPL-2(providers/vmw_pvrdma/* ); BSD-MIT or GPL-2(rdma-ndd/* ); GPL-2(redhat/* ); BSD-MIT or GPL-2(srp_daemon/* ); CPL-1.0 or BSD-2-clause or GPL-2(srp_daemon/srp_daemon.1.in); BSD-2-clause(srp_daemon/srpd.in); BSD-MIT or GPL-2(util/udma_barrier.h); BSD-MIT(util/udma_barrier.h); BSD-2-clause(util/udma_barrier.h); BSD-3-clause(util/udma_barrier.h); GPL-2(util/udma_barrier.h); CC0(util/udma_barrier.h); MIT(util/udma_barrier.h); CPL-1.0(util/udma_barrier.h) | | {{}} | 5.2+dfsg-3+b13 | GPL; GPL-2 | @@ -944,12 +953,12 @@ pdfhidden: True | {{}} | 7.0-5 | NO COPYRIGHT FILE | | {{}} | 1.3.8-1 | RHash(* ); RHash(bindings/* ); RHash(bindings/* ) | | {{}} | 2.000006-1 | Artistic or GPL-1+(* ); Artistic or GPL-1+(debian/* ); Artistic(debian/* ); GPL-1+(debian/* ) | -| {{}} | 2.44.10-2.1 | LGPL-2+(* ); BSD-3-clause(Files:); Expat or Unlicense(Files:); Apache-2.0 or Expat(Files:); Apache-2.0(Files:); MPL-2.0(Files:); Expat(Files:); BSD-2-clause(Files:); BSD-3-clause(Files:); Sun-permissive(Files:); Apache-2.0 or Boost-1.0(Files:); LGPL-2+(Files:); Apache-2.0(Files:); Expat(Files:); MPL-2.0(Files:); Unlicense(Files:); BSD-2-clause(Files:); BSD-3-clause(Files:); Sun-permissive(Files:); Boost-1.0(Files:) | -| {{}} | 2.44.10-2.1 | LGPL-2+(* ); BSD-3-clause(Files:); Expat or Unlicense(Files:); Apache-2.0 or Expat(Files:); Apache-2.0(Files:); MPL-2.0(Files:); Expat(Files:); BSD-2-clause(Files:); BSD-3-clause(Files:); Sun-permissive(Files:); Apache-2.0 or Boost-1.0(Files:); LGPL-2+(Files:); Apache-2.0(Files:); Expat(Files:); MPL-2.0(Files:); Unlicense(Files:); BSD-2-clause(Files:); BSD-3-clause(Files:); Sun-permissive(Files:); Boost-1.0(Files:) | +| {{}} | 2.44.10-2.1+deb10u3 | LGPL-2+(* ); BSD-3-clause(Files:); Expat or Unlicense(Files:); Apache-2.0 or Expat(Files:); Apache-2.0(Files:); MPL-2.0(Files:); Expat(Files:); BSD-2-clause(Files:); BSD-3-clause(Files:); Sun-permissive(Files:); Apache-2.0 or Boost-1.0(Files:); LGPL-2+(Files:); Apache-2.0(Files:); Expat(Files:); MPL-2.0(Files:); Unlicense(Files:); BSD-2-clause(Files:); BSD-3-clause(Files:); Sun-permissive(Files:); Boost-1.0(Files:) | +| {{}} | 2.44.10-2.1+deb10u3 | LGPL-2+(* ); BSD-3-clause(Files:); Expat or Unlicense(Files:); Apache-2.0 or Expat(Files:); Apache-2.0(Files:); MPL-2.0(Files:); Expat(Files:); BSD-2-clause(Files:); BSD-3-clause(Files:); Sun-permissive(Files:); Apache-2.0 or Boost-1.0(Files:); LGPL-2+(Files:); Apache-2.0(Files:); Expat(Files:); MPL-2.0(Files:); Unlicense(Files:); BSD-2-clause(Files:); BSD-3-clause(Files:); Sun-permissive(Files:); Boost-1.0(Files:) | | {{}} | 2.4+20151223.gitfa8646d.1-2 | GPL; GPL-2; LGPL-2 | | {{}} | 0.6.3-1 | Expat(* ); Expat(debian/* ); BSD-2-clause(rtrlib/spki/hashtable/tommyds-1.8/* ); GPL-2(scripts/checkpatch.pl scripts/spelling.txt); GPL-3+(cmake/modules/FindGcov.cmake cmake/modules/FindLcov.cmake); Expat(cmake/modules/FindGcov.cmake cmake/modules/FindLcov.cmake); BSD-2-clause(cmake/modules/FindGcov.cmake cmake/modules/FindLcov.cmake); GPL-2(cmake/modules/FindGcov.cmake cmake/modules/FindLcov.cmake); GPL-3+(cmake/modules/FindGcov.cmake cmake/modules/FindLcov.cmake) | | {{}} | 0.6.3-1 | Expat(* ); Expat(debian/* ); BSD-2-clause(rtrlib/spki/hashtable/tommyds-1.8/* ); GPL-2(scripts/checkpatch.pl scripts/spelling.txt); GPL-3+(cmake/modules/FindGcov.cmake cmake/modules/FindLcov.cmake); Expat(cmake/modules/FindGcov.cmake cmake/modules/FindLcov.cmake); BSD-2-clause(cmake/modules/FindGcov.cmake cmake/modules/FindLcov.cmake); GPL-2(cmake/modules/FindGcov.cmake cmake/modules/FindLcov.cmake); GPL-3+(cmake/modules/FindGcov.cmake cmake/modules/FindLcov.cmake) | -| {{}} | 2.5.5-3+deb10u4 | BSD-2-clause or Ruby(* ); BSD-2-clause(Files:); Expat(Files:); BSD-2-clause(enc/* .c); BSD-2-clause(enc/ascii.c enc/euc_jp.c enc/shift_jis.c enc/windows_31j.c); BSD-2-clause(enc/gb18030.c); BSD-2-clause(enc/encdb.c); BSD-2-clause(enc/windows_1250.c enc/windows_1252.c); BSD-2-clause(enc/windows_1251.c); GPL-3+(misc/ruby-mode.el); BSD-2-clause(lib/rdoc/generator/darkfish.rb lib/rdoc/generator/template/darkfish/* ); SIL-1.1(lib/rdoc/generator/template/darkfish/fonts/SourceCodePro* ); SIL-1.1(lib/rdoc/generator/template/darkfish/fonts/Lato* ); CC-BY-3.0-famfamfam(lib/rdoc/generator/template/darkfish/images/* ); Expat(lib/rdoc/generator/json_index.rb lib/rdoc/generator/template/json_index/* ); Expat or Ruby(lib/rubygems.rb lib/rubygems/* ); PreserveNotice(util.c); BSD-2-clause(random.c); 3C-BSD(vsnprintf.c); PublicDomain(Files:); 3C-BSD(missing/crypt.c); 3C-BSD(missing/setproctitle.c); BSD-3-clause(missing/strlcat.c missing/strlcpy.c); AllPermissions(missing/langinfo.c); PartialGplArtisticAndRuby(win32/win32.* ); zlib/libpng(ext/digest/md5/md5.c ext/digest/md5/md5.h); BSD-3-clause(ext/digest/rmd160/rmd160.c ext/digest/rmd160/rmd160.h); BSD-3-clause(ext/digest/sha2/sha2.c ext/digest/sha2/sha2.h); zlib/libpng(ext/nkf/nkf-utf8/config.h ext/nkf/nkf-utf8/nkf.c ext/nkf/nkf-utf8/utf8tbl.c); BSD-3-clause(ext/socket/addrinfo.h ext/socket/getaddrinfo.c ext/socket/getnameinfo.c); GPL-1+ or Artistic(ext/win32ole/win32ole.c); Expat(ccan/list/list.h); CC0(Files:); Unicode(Files:); Permissive(Files:); Permissive(Files:); BSD-2-clause or Ruby(debian/* ); Artistic(debian/* ); BSD-2-clause(debian/* ); 3C-BSD(debian/* ); BSD-3-clause(debian/* ); Expat(debian/* ); GPL-1+(debian/* ); Ruby(debian/* ); SIL-1.1(debian/* ); zlib/libpng(debian/* ); CC0(debian/* ); Unicode(debian/* ); Permissive(debian/* ); GPL-3+(debian/* ); CC-BY-3.0-famfamfam(debian/* ) | +| {{}} | 2.5.5-3+deb10u6 | BSD-2-clause or Ruby(* ); BSD-2-clause(Files:); Expat(Files:); BSD-2-clause(enc/* .c); BSD-2-clause(enc/ascii.c enc/euc_jp.c enc/shift_jis.c enc/windows_31j.c); BSD-2-clause(enc/gb18030.c); BSD-2-clause(enc/encdb.c); BSD-2-clause(enc/windows_1250.c enc/windows_1252.c); BSD-2-clause(enc/windows_1251.c); GPL-3+(misc/ruby-mode.el); BSD-2-clause(lib/rdoc/generator/darkfish.rb lib/rdoc/generator/template/darkfish/* ); SIL-1.1(lib/rdoc/generator/template/darkfish/fonts/SourceCodePro* ); SIL-1.1(lib/rdoc/generator/template/darkfish/fonts/Lato* ); CC-BY-3.0-famfamfam(lib/rdoc/generator/template/darkfish/images/* ); Expat(lib/rdoc/generator/json_index.rb lib/rdoc/generator/template/json_index/* ); Expat or Ruby(lib/rubygems.rb lib/rubygems/* ); PreserveNotice(util.c); BSD-2-clause(random.c); 3C-BSD(vsnprintf.c); PublicDomain(Files:); 3C-BSD(missing/crypt.c); 3C-BSD(missing/setproctitle.c); BSD-3-clause(missing/strlcat.c missing/strlcpy.c); AllPermissions(missing/langinfo.c); PartialGplArtisticAndRuby(win32/win32.* ); zlib/libpng(ext/digest/md5/md5.c ext/digest/md5/md5.h); BSD-3-clause(ext/digest/rmd160/rmd160.c ext/digest/rmd160/rmd160.h); BSD-3-clause(ext/digest/sha2/sha2.c ext/digest/sha2/sha2.h); zlib/libpng(ext/nkf/nkf-utf8/config.h ext/nkf/nkf-utf8/nkf.c ext/nkf/nkf-utf8/utf8tbl.c); BSD-3-clause(ext/socket/addrinfo.h ext/socket/getaddrinfo.c ext/socket/getnameinfo.c); GPL-1+ or Artistic(ext/win32ole/win32ole.c); Expat(ccan/list/list.h); CC0(Files:); Unicode(Files:); Permissive(Files:); Permissive(Files:); BSD-2-clause or Ruby(debian/* ); Artistic(debian/* ); BSD-2-clause(debian/* ); 3C-BSD(debian/* ); BSD-3-clause(debian/* ); Expat(debian/* ); GPL-1+(debian/* ); Ruby(debian/* ); SIL-1.1(debian/* ); zlib/libpng(debian/* ); CC0(debian/* ); Unicode(debian/* ); Permissive(debian/* ); GPL-3+(debian/* ); CC-BY-3.0-famfamfam(debian/* ) | | {{}} | 2.1.27+dfsg-1+deb10u2 | BSD-4-clause(* ); GPL-3+(debian/* ); GPL-3+(debian/saslfinger/* ); GPL-3+(debian/gen-auth/* ); GPL-3+(debian/gen-auth/* ); BSD-4-clause(debian/gen-auth/* ) | | {{}} | 2.1.27+dfsg-1+deb10u2 | BSD-4-clause(* ); GPL-3+(debian/* ); GPL-3+(debian/saslfinger/* ); GPL-3+(debian/gen-auth/* ); GPL-3+(debian/gen-auth/* ); BSD-4-clause(debian/gen-auth/* ) | | {{}} | 2.1.27+dfsg-1+deb10u2 | BSD-4-clause(* ); GPL-3+(debian/* ); GPL-3+(debian/saslfinger/* ); GPL-3+(debian/gen-auth/* ); GPL-3+(debian/gen-auth/* ); BSD-4-clause(debian/gen-auth/* ) | @@ -976,7 +985,7 @@ pdfhidden: True | {{}} | 0.4.8+dfsg2-16 | BSD | | {{}} | 1.1.7-1 | Google | | {{}} | 1.1.7-1 | Google | -| {{}} | 1.0.28-6+deb10u1 | LGPL-2.1+(* ); LGPL-2.1+(src/* ); gsm(src/GSM610/* ); Apache-2.0(src/ALAC/* ); LGPL-2.1+(src/ALAC/shift.h); sun(src/G72x/* ); GPL-2+(src/G72x/g72x_test.c); LGPL-2+(src/* ima_oki* ); LGPL-2.1+(src/aiff.c); BSD-3-clause(src/* .py); BSD-3-clause(src/sndfile.hh); BSD-3-clause and LGPL-2.1+(src/ogg_vorbis.c); LGPL-2.1+(src/ogg.c); LGPL-2.1+(src/flac.c); LGPL-2.1+(src/cart.c); LGPL-2.1+(src/chunk.c); LGPL-2.1+(src/sd2.c); LGPL-2.1+(src/broadcast.c); LGPL-2.1+(src/wve.c); LGPL-2.1+(src/file_io.c); LGPL-2.1+(src/rf64.c); BSD-3-clause(programs/* ); BSD-3-clause(programs/common.c); BSD-3-clause(programs/sndfile-cmp.c); GPL-2+(programs/sndfile-play-beos.cpp); BSD-3-clause(examples/* ); GPL-2+(examples/sndfilehandle.cc); GPL-2+(Octave/sndfile_load.m); GPL-2+(tests/* ); BSD-3-clause(tests/* .sh.in); GPL-2+(regtest/* ); BSD-3-clause(Scripts/android-configure.sh); BSD-3-clause(M4/stack_protect.m4); FSFAP(M4/ax_add_fortify_source.m4); GPL-2+(M4/extra_pkg.m4); LGPL-2.1+(debian/* ); LGPL-2.1+(debian/* ); LGPL-2+(debian/* ); GPL-2+(debian/* ); BSD-3-clause(debian/* ); Apache-2.0(debian/* ) | +| {{}} | 1.0.28-6+deb10u2 | LGPL-2.1+(* ); LGPL-2.1+(src/* ); gsm(src/GSM610/* ); Apache-2.0(src/ALAC/* ); LGPL-2.1+(src/ALAC/shift.h); sun(src/G72x/* ); GPL-2+(src/G72x/g72x_test.c); LGPL-2+(src/* ima_oki* ); LGPL-2.1+(src/aiff.c); BSD-3-clause(src/* .py); BSD-3-clause(src/sndfile.hh); BSD-3-clause and LGPL-2.1+(src/ogg_vorbis.c); LGPL-2.1+(src/ogg.c); LGPL-2.1+(src/flac.c); LGPL-2.1+(src/cart.c); LGPL-2.1+(src/chunk.c); LGPL-2.1+(src/sd2.c); LGPL-2.1+(src/broadcast.c); LGPL-2.1+(src/wve.c); LGPL-2.1+(src/file_io.c); LGPL-2.1+(src/rf64.c); BSD-3-clause(programs/* ); BSD-3-clause(programs/common.c); BSD-3-clause(programs/sndfile-cmp.c); GPL-2+(programs/sndfile-play-beos.cpp); BSD-3-clause(examples/* ); GPL-2+(examples/sndfilehandle.cc); GPL-2+(Octave/sndfile_load.m); GPL-2+(tests/* ); BSD-3-clause(tests/* .sh.in); GPL-2+(regtest/* ); BSD-3-clause(Scripts/android-configure.sh); BSD-3-clause(M4/stack_protect.m4); FSFAP(M4/ax_add_fortify_source.m4); GPL-2+(M4/extra_pkg.m4); LGPL-2.1+(debian/* ); LGPL-2.1+(debian/* ); LGPL-2+(debian/* ); GPL-2+(debian/* ); BSD-3-clause(debian/* ); Apache-2.0(debian/* ) | | {{}} | 5.7.3+dfsg-5+deb10u2 | BSD-LIKE and BSD-3-clause(* ); BSD-3-clause(debian/* ); GPL-2+ or Artistic-1.0(perl/* ); BSD-3-clause(python/* ); BSD-3-clause(snmplib/winpipe.c); BSD-3-clause(snmplib/sd-daemon.c); BSD-3-clause(apps/snmppcap.c); BSD-LIKE(apps/snmppcap.c); BSD-3-clause(apps/snmppcap.c); Artistic-1.0(apps/snmppcap.c); GPL-2.0+(apps/snmppcap.c) | | {{}} | 5.8.0-cl4.3.0u1 | BSD | | {{}} | 5.8.0-cl4.3.0u1 | NO COPYRIGHT FILE | @@ -995,8 +1004,10 @@ pdfhidden: True | {{}} | 0.8.7-1+deb10u1 | LGPL-2.1+~OpenSSL(* ); LGPL-2.1+~OpenSSL(include/libssh/auth.h); LGPL-2.1+~OpenSSL(examples/exec.c); public-domain(examples/authentication.c); public-domain(src/external/curve25519_ref.c); LGPL-2.1+~OpenSSL(tests/pkd/pkd_client.h); LGPL-2.1+~OpenSSL(src/channels.c); LGPL-2.1+~OpenSSL(include/libssh/agent.h); LGPL-2.1(include/libssh/curve25519.h); LGPL-2.1+~OpenSSL(include/libssh/callbacks.h); BSD-2-clause(src/match.c); LGPL-2.1(include/libssh/knownhosts.h); LGPL-2.1+~OpenSSL(src/poll.c); LGPL-2.1+~OpenSSL(src/dh.c); LGPL-2.1+~OpenSSL(src/auth.c); LGPL-2.1+~OpenSSL(src/getpass.c); LGPL-2.1+~OpenSSL(src/gssapi.c); BSD-3-clause(cmake/Modules/DefineCMakeDefaults.cmake); BSD-3-clause(cmake/Modules/AddCMockaTest.cmake); LGPL-2.1+~OpenSSL or BSD-2-clause or BSD-3-clause(debian/* ); LGPL-2.1+~OpenSSL(debian/* ); LGPL-2.1(debian/* ); BSD-2-clause(debian/* ); BSD-3-clause(debian/* ) | | {{}} | 0.8.7-1+deb10u1 | LGPL-2.1+~OpenSSL(* ); LGPL-2.1+~OpenSSL(include/libssh/auth.h); LGPL-2.1+~OpenSSL(examples/exec.c); public-domain(examples/authentication.c); public-domain(src/external/curve25519_ref.c); LGPL-2.1+~OpenSSL(tests/pkd/pkd_client.h); LGPL-2.1+~OpenSSL(src/channels.c); LGPL-2.1+~OpenSSL(include/libssh/agent.h); LGPL-2.1(include/libssh/curve25519.h); LGPL-2.1+~OpenSSL(include/libssh/callbacks.h); BSD-2-clause(src/match.c); LGPL-2.1(include/libssh/knownhosts.h); LGPL-2.1+~OpenSSL(src/poll.c); LGPL-2.1+~OpenSSL(src/dh.c); LGPL-2.1+~OpenSSL(src/auth.c); LGPL-2.1+~OpenSSL(src/getpass.c); LGPL-2.1+~OpenSSL(src/gssapi.c); BSD-3-clause(cmake/Modules/DefineCMakeDefaults.cmake); BSD-3-clause(cmake/Modules/AddCMockaTest.cmake); LGPL-2.1+~OpenSSL or BSD-2-clause or BSD-3-clause(debian/* ); LGPL-2.1+~OpenSSL(debian/* ); LGPL-2.1(debian/* ); BSD-2-clause(debian/* ); BSD-3-clause(debian/* ) | | {{}} | 0.8.7-1+deb10u1 | LGPL-2.1+~OpenSSL(* ); LGPL-2.1+~OpenSSL(include/libssh/auth.h); LGPL-2.1+~OpenSSL(examples/exec.c); public-domain(examples/authentication.c); public-domain(src/external/curve25519_ref.c); LGPL-2.1+~OpenSSL(tests/pkd/pkd_client.h); LGPL-2.1+~OpenSSL(src/channels.c); LGPL-2.1+~OpenSSL(include/libssh/agent.h); LGPL-2.1(include/libssh/curve25519.h); LGPL-2.1+~OpenSSL(include/libssh/callbacks.h); BSD-2-clause(src/match.c); LGPL-2.1(include/libssh/knownhosts.h); LGPL-2.1+~OpenSSL(src/poll.c); LGPL-2.1+~OpenSSL(src/dh.c); LGPL-2.1+~OpenSSL(src/auth.c); LGPL-2.1+~OpenSSL(src/getpass.c); LGPL-2.1+~OpenSSL(src/gssapi.c); BSD-3-clause(cmake/Modules/DefineCMakeDefaults.cmake); BSD-3-clause(cmake/Modules/AddCMockaTest.cmake); LGPL-2.1+~OpenSSL or BSD-2-clause or BSD-3-clause(debian/* ); LGPL-2.1+~OpenSSL(debian/* ); LGPL-2.1(debian/* ); BSD-2-clause(debian/* ); BSD-3-clause(debian/* ) | -| {{}} | 1.1.1n-0+deb10u3 | BSD; OpenSSL; SSLeay | -| {{}} | 1.1.1n-0+deb10u3 | BSD; OpenSSL; SSLeay | +| {{}} | 1.1.1n-0+deb10u6 | BSD; OpenSSL; SSLeay | +| {{}} | 1.1.1n-0+deb10u5 | NO COPYRIGHT FILE | +| {{}} | 1.1.1n-0+deb10u6 | BSD; OpenSSL; SSLeay | +| {{}} | 1.1.1n-0+deb10u5 | BSD; OpenSSL; SSLeay | | {{}} | 8.3.0-6 | NO COPYRIGHT FILE | | {{}} | 8.3.0-6 | NO COPYRIGHT FILE | | {{}} | 2.000005-1 | Artistic or GPL-1+(* ); Artistic or GPL-1+(inc/ExtUtils/HasCompiler.pm); Artistic or GPL-1+(debian/* ); Artistic(debian/* ); GPL-1+(debian/* ) | @@ -1004,9 +1015,9 @@ pdfhidden: True | {{}} | 0.001013-1 | Artistic or GPL-1+(* ); Artistic or GPL-1+(debian/* ); Artistic(debian/* ); GPL-1+(debian/* ) | | {{}} | 0.21-1+b3 | Artistic or GPL-1+(* ); Artistic or GPL-1+(ppport.h); Artistic or GPL-1+(debian/* ); Artistic(debian/* ); GPL-1+(debian/* ) | | {{}} | 2.005001-1 | Artistic or GPL-1+(* ); Artistic or GPL-1+(debian/* ); Artistic(debian/* ); GPL-1+(debian/* ) | -| {{}} | 2018.20181218.49446-1 | BSD; Common Public License; GPL; MIT | -| {{}} | 241-7~deb10u8 | LGPL-2.1+(* ); CC0-1.0(src/basic/siphash24.h); GPL-2(src/basic/securebits.h); GPL-2(src/basic/ioprio.h); GPL-2+(src/shared/linux/auto_dev-ioctl.h); Expat(src/basic/sparse-endian.h); public-domain(src/journal/lookup3.c); GPL-2+(src/udev/* ); LGPL-2.1+(src/udev/udev-ctrl.c); GPL-2(src/udev/scsi_id/scsi.h); LGPL-2.1+(debian/* ); Expat(debian/* ); GPL-2(debian/* ); GPL-2+(debian/* ); LGPL-2.1+(debian/* ); CC0-1.0(debian/* ) | -| {{}} | 241-7~deb10u8 | LGPL-2.1+(* ); CC0-1.0(src/basic/siphash24.h); GPL-2(src/basic/securebits.h); GPL-2(src/basic/ioprio.h); GPL-2+(src/shared/linux/auto_dev-ioctl.h); Expat(src/basic/sparse-endian.h); public-domain(src/journal/lookup3.c); GPL-2+(src/udev/* ); LGPL-2.1+(src/udev/udev-ctrl.c); GPL-2(src/udev/scsi_id/scsi.h); LGPL-2.1+(debian/* ); Expat(debian/* ); GPL-2(debian/* ); GPL-2+(debian/* ); LGPL-2.1+(debian/* ); CC0-1.0(debian/* ) | +| {{}} | 2018.20181218.49446-1+deb10u2 | BSD; Common Public License; GPL; MIT | +| {{}} | 247.3-6~bpo10+1 | LGPL-2.1+(* ); CC0-1.0(src/basic/siphash24.h); GPL-2(src/basic/ioprio.h); GPL-2 with Linux-syscall-note exception(src/shared/linux/* ); Expat(src/basic/sparse-endian.h); public-domain(src/journal/lookup3.c); GPL-2+(src/udev/ata_id/ata_id.c); GPL-2+(src/udev/scsi_id/* ); LGPL-2.1+(debian/* ); Expat(debian/* ); GPL-2(debian/* ); GPL-2 with Linux-syscall-note exception(debian/* ); GPL-2+(debian/* ); LGPL-2.1+(debian/* ); CC0-1.0(debian/* ) | +| {{}} | 247.3-6~bpo10+1 | LGPL-2.1+(* ); CC0-1.0(src/basic/siphash24.h); GPL-2(src/basic/ioprio.h); GPL-2 with Linux-syscall-note exception(src/shared/linux/* ); Expat(src/basic/sparse-endian.h); public-domain(src/journal/lookup3.c); GPL-2+(src/udev/ata_id/ata_id.c); GPL-2+(src/udev/scsi_id/* ); LGPL-2.1+(debian/* ); Expat(debian/* ); GPL-2(debian/* ); GPL-2 with Linux-syscall-note exception(debian/* ); GPL-2+(debian/* ); LGPL-2.1+(debian/* ); CC0-1.0(debian/* ) | | {{}} | 1.4.3-cl4u1 | GPL; GPL-2 | | {{}} | 1.4.3-cl4u1 | GPL; GPL-2 | | {{}} | 1.4.3-cl4u1 | NO COPYRIGHT FILE | @@ -1015,14 +1026,14 @@ pdfhidden: True | {{}} | 1.0.1-cl4u1 | GPL-2+(* ); GPL-2+(* ) | | {{}} | 1.0.1-cl4u1 | NO COPYRIGHT FILE | | {{}} | 1.0.1-cl4u1 | GPL-2+(* ); GPL-2+(* ) | -| {{}} | 4.13-3 | GFDL-1; GPL; GPL-3; LGPL; LGPL-2 | -| {{}} | 4.13-3 | GFDL-1; GPL; GPL-3; LGPL; LGPL-2 | +| {{}} | 4.13-3+deb10u1 | GFDL-1; GPL; GPL-3; LGPL; LGPL-2 | +| {{}} | 4.13-3+deb10u1 | GFDL-1; GPL; GPL-3; LGPL; LGPL-2 | | {{}} | 8.6.9+dfsg-2 | BSD | | {{}} | 2.7-1 | BSD-3-clause(* ); GPL-2+(debian/* ) | | {{}} | 2.5.8+ds2-5 | LGPL-2.1+ or CPL-0.5+(* ); LGPL-2.1+ or GPL-2+ or MPL-1.1(SFconv/UtfCodec.* ); LGPL-2.1+(debian* /* ); LGPL-2.1+(debian* /* ); GPL-2+(debian* /* ); MPL-1.1(debian* /* ); CPL-0.5+(debian* /* ) | -| {{}} | 2018.20181218.49446-1 | BSD; Common Public License; GPL; MIT | -| {{}} | 2018.20181218.49446-1 | BSD; Common Public License; GPL; MIT | -| {{}} | 2018.20181218.49446-1 | BSD; Common Public License; GPL; MIT | +| {{}} | 2018.20181218.49446-1+deb10u2 | BSD; Common Public License; GPL; MIT | +| {{}} | 2018.20181218.49446-1+deb10u2 | BSD; Common Public License; GPL; MIT | +| {{}} | 2018.20181218.49446-1+deb10u2 | BSD; Common Public License; GPL; MIT | | {{}} | 0.04-7.1+b1 | Artistic; GPL; GPL-2 | | {{}} | 1.7-5+b7 | Artistic; GPL; GPL-2 | | {{}} | 0.13-1 | Artistic or GPL-1+(* ); Artistic or GPL-1+(debian/* ); Artistic(debian/* ); GPL-1+(debian/* ) | @@ -1030,10 +1041,10 @@ pdfhidden: True | {{}} | 0.06-7.1 | Artistic; GPL | | {{}} | 0.1.28-2 | LGPL-2.1+(* ); GPL-2+(debian/* ) | | {{}} | 0.1.28-2 | LGPL-2.1+(* ); GPL-2+(debian/* ) | -| {{}} | 4.1.0+git191117-2~deb10u4 | Hylafax(* ); Hylafax(debian/* ); Hylafax(debian/* ) | +| {{}} | 4.1.0+git191117-2~deb10u8 | Hylafax(* ); Hylafax(debian/* ); Hylafax(debian/* ) | | {{}} | 2.3000-2+deb10u1 | Artistic or GPL-1+(* ); Artistic or GPL-1+(lib/Date/Language/Bulgarian.pm); Artistic or GPL-1+(debian/* ); Artistic(debian/* ); GPL-1+(debian/* ) | -| {{}} | 6.1+20181013-2+deb10u2 | Dickey; MIT | -| {{}} | 6.1+20181013-2+deb10u2 | Dickey; MIT | +| {{}} | 6.1+20181013-2+deb10u4 | Dickey; MIT | +| {{}} | 6.1+20181013-2+deb10u4 | Dickey; MIT | | {{}} | 2.4.6-9 | GFDL; GPL | | {{}} | 2.4.6-9 | GFDL; GPL | | {{}} | 0.30-1 | Expat(* ); Expat(debian/* ); Expat(debian/* ) | @@ -1041,9 +1052,9 @@ pdfhidden: True | {{}} | 7.4.0-6 | NO COPYRIGHT FILE | | {{}} | 8.3.0-6 | NO COPYRIGHT FILE | | {{}} | 0.0.6-3 | MPL-1.1 or GPL-2+ or LGPL-2.1+(* ); GPL-2+(debian/* ); GPL-2+(debian/* ); LGPL-2.1+(debian/* ); MPL-1.1(debian/* ) | -| {{}} | 241-7~deb10u8 | LGPL-2.1+(* ); CC0-1.0(src/basic/siphash24.h); GPL-2(src/basic/securebits.h); GPL-2(src/basic/ioprio.h); GPL-2+(src/shared/linux/auto_dev-ioctl.h); Expat(src/basic/sparse-endian.h); public-domain(src/journal/lookup3.c); GPL-2+(src/udev/* ); LGPL-2.1+(src/udev/udev-ctrl.c); GPL-2(src/udev/scsi_id/scsi.h); LGPL-2.1+(debian/* ); Expat(debian/* ); GPL-2(debian/* ); GPL-2+(debian/* ); LGPL-2.1+(debian/* ); CC0-1.0(debian/* ) | -| {{}} | 241-7~deb10u8 | LGPL-2.1+(* ); CC0-1.0(src/basic/siphash24.h); GPL-2(src/basic/securebits.h); GPL-2(src/basic/ioprio.h); GPL-2+(src/shared/linux/auto_dev-ioctl.h); Expat(src/basic/sparse-endian.h); public-domain(src/journal/lookup3.c); GPL-2+(src/udev/* ); LGPL-2.1+(src/udev/udev-ctrl.c); GPL-2(src/udev/scsi_id/scsi.h); LGPL-2.1+(debian/* ); Expat(debian/* ); GPL-2(debian/* ); GPL-2+(debian/* ); LGPL-2.1+(debian/* ); CC0-1.0(debian/* ) | -| {{}} | 1.9.0-2+deb10u2 | BSD-3-NLnetLabs(* ); GPL-3(debian/* ); ISC(compat/arc4random.c); BSD-3-WIDE(compat/fake-rfc2553.c); ISC(compat/getentropy_linux.c); BSD-3-Regents-DEC(compat/inet_aton.c); ISC(compat/inet_ntop.c compat/inet_pton.c); ISC(compat/reallocarray.c); BSD-3-ADG(compat/sha512.c); BSD-3-Todd-Miller(compat/strlcat.c); ISC(compat/strlcpy.c); BSD-3-NLnetLabs-Mekking(compat/strptime.c); BSD-3-Viagénie(dns64/dns64.c); BSD-3-Farsight(dnstap/dnstap.c); BSD-3-VUT(libunbound/python/* ); BSD-2-VUT(libunbound/python/examples/* ); BSD-3-CZ.NIC(libunbound/python/file_py3.i); GPL-3+ with Bison exception(util/configparser.c); ISC(util/random.c); public-domain(util/storage/lookup3.c); ISC(util/storage/lookup3.c) | +| {{}} | 247.3-6~bpo10+1 | LGPL-2.1+(* ); CC0-1.0(src/basic/siphash24.h); GPL-2(src/basic/ioprio.h); GPL-2 with Linux-syscall-note exception(src/shared/linux/* ); Expat(src/basic/sparse-endian.h); public-domain(src/journal/lookup3.c); GPL-2+(src/udev/ata_id/ata_id.c); GPL-2+(src/udev/scsi_id/* ); LGPL-2.1+(debian/* ); Expat(debian/* ); GPL-2(debian/* ); GPL-2 with Linux-syscall-note exception(debian/* ); GPL-2+(debian/* ); LGPL-2.1+(debian/* ); CC0-1.0(debian/* ) | +| {{}} | 247.3-6~bpo10+1 | LGPL-2.1+(* ); CC0-1.0(src/basic/siphash24.h); GPL-2(src/basic/ioprio.h); GPL-2 with Linux-syscall-note exception(src/shared/linux/* ); Expat(src/basic/sparse-endian.h); public-domain(src/journal/lookup3.c); GPL-2+(src/udev/ata_id/ata_id.c); GPL-2+(src/udev/scsi_id/* ); LGPL-2.1+(debian/* ); Expat(debian/* ); GPL-2(debian/* ); GPL-2 with Linux-syscall-note exception(debian/* ); GPL-2+(debian/* ); LGPL-2.1+(debian/* ); CC0-1.0(debian/* ) | +| {{}} | 1.9.0-2+deb10u3 | BSD-3-NLnetLabs(* ); GPL-3(debian/* ); ISC(compat/arc4random.c); BSD-3-WIDE(compat/fake-rfc2553.c); ISC(compat/getentropy_linux.c); BSD-3-Regents-DEC(compat/inet_aton.c); ISC(compat/inet_ntop.c compat/inet_pton.c); ISC(compat/reallocarray.c); BSD-3-ADG(compat/sha512.c); BSD-3-Todd-Miller(compat/strlcat.c); ISC(compat/strlcpy.c); BSD-3-NLnetLabs-Mekking(compat/strptime.c); BSD-3-Viagénie(dns64/dns64.c); BSD-3-Farsight(dnstap/dnstap.c); BSD-3-VUT(libunbound/python/* ); BSD-2-VUT(libunbound/python/examples/* ); BSD-3-CZ.NIC(libunbound/python/file_py3.i); GPL-3+ with Bison exception(util/configparser.c); ISC(util/random.c); public-domain(util/storage/lookup3.c); ISC(util/storage/lookup3.c) | | {{}} | 0.9.10-1 | FreeSoftware; GFDL-1; GFDL-1.2+; GPL; GPL-2; GPL-2+; GPL-2+ with distribution exception; GPL-3; GPL-3+; LGPL-3; LGPL-3+; MIT | | {{}} | 1.2.1-10~deb10u1 | Expat(* ); Expat(src/arm/* ); Expat(src/mi/strerror.c); Expat(src/mips/* ); Expat(src/os-freebsd.c src/x86/* -freebsd.* ); Expat(src/ppc* /* ); Expat(src/ptrace/_UPT_access_* ); Expat(src/unwind/GetIPInfo.c); Expat(src/x86/getcontext-linux.S); Expat(src/x86_64/Gstash_frame.c src/x86_64/Gtrace.c); Expat(src/x86_64/* context.S); Expat(tests/Gtest-nocalloc.c tests/Gtest-nomalloc.c); Expat(tests/Gtest-trace.c); Expat(tests/Ltest-cxx-exceptions.cxx); GPL-2+(debian/* ); Expat(debian/* ) | | {{}} | 1.2.1-10~deb10u1 | Expat(* ); Expat(src/arm/* ); Expat(src/mi/strerror.c); Expat(src/mips/* ); Expat(src/os-freebsd.c src/x86/* -freebsd.* ); Expat(src/ppc* /* ); Expat(src/ptrace/_UPT_access_* ); Expat(src/unwind/GetIPInfo.c); Expat(src/x86/getcontext-linux.S); Expat(src/x86_64/Gstash_frame.c src/x86_64/Gtrace.c); Expat(src/x86_64/* context.S); Expat(tests/Gtest-nocalloc.c tests/Gtest-nomalloc.c); Expat(tests/Gtest-trace.c); Expat(tests/Ltest-cxx-exceptions.cxx); GPL-2+(debian/* ); Expat(debian/* ) | @@ -1062,22 +1073,22 @@ pdfhidden: True | {{}} | 1.3.6-2 | BSD-3-Clause(* ); RFC-special(doc/rfc5215.* ); BSD-3-Clause(debian/* ); BSD-3-Clause(debian/* ) | | {{}} | 1.16.0-1 | X11 | | {{}} | 1.16.0-1 | X11 | -| {{}} | 0.6.1-2+deb10u1 | Apache-2 | -| {{}} | 2.6.20-0+deb10u3 | GPL-2+(* ); GPL-2+(debian/* ); public-domain(wsutil/g711.c:); LGPL-2+(wsutil/strptime.c); LGPL-2+(tools/lemon/lempar.c); FSL-Kaz(epan/except.c); Free Software License:(epan/except.c); BSD-3-clause(epan/in_cksum.c); ISC(wsutil/inet_ntop.c); BSD-2-clause(epan/dissectors/packet-enc.c); BSD-2-clause-no-conditions(epan/dissectors/packet-pflog.c:); BSD-3-clause-Endance(wiretap/erf.c); BSD-2-clause(wiretap/i4b_trace.h); GPL-3+(epan/dissectors/pidl/rfr/rfr.idl); GPL-3+(tools/pidl/idl.yp); BSD-2-clause(tools/pidl/idl.yp); GPL-2+(tools/pidl/idl.yp); GPL-3+(tools/pidl/idl.yp); ISC(tools/pidl/idl.yp); LGPL-2+(tools/pidl/idl.yp) | -| {{}} | 2.6.20-0+deb10u3 | GPL-2+(* ); GPL-2+(debian/* ); public-domain(wsutil/g711.c:); LGPL-2+(wsutil/strptime.c); LGPL-2+(tools/lemon/lempar.c); FSL-Kaz(epan/except.c); Free Software License:(epan/except.c); BSD-3-clause(epan/in_cksum.c); ISC(wsutil/inet_ntop.c); BSD-2-clause(epan/dissectors/packet-enc.c); BSD-2-clause-no-conditions(epan/dissectors/packet-pflog.c:); BSD-3-clause-Endance(wiretap/erf.c); BSD-2-clause(wiretap/i4b_trace.h); GPL-3+(epan/dissectors/pidl/rfr/rfr.idl); GPL-3+(tools/pidl/idl.yp); BSD-2-clause(tools/pidl/idl.yp); GPL-2+(tools/pidl/idl.yp); GPL-3+(tools/pidl/idl.yp); ISC(tools/pidl/idl.yp); LGPL-2+(tools/pidl/idl.yp) | -| {{}} | 2.6.20-0+deb10u3 | GPL-2+(* ); GPL-2+(debian/* ); public-domain(wsutil/g711.c:); LGPL-2+(wsutil/strptime.c); LGPL-2+(tools/lemon/lempar.c); FSL-Kaz(epan/except.c); Free Software License:(epan/except.c); BSD-3-clause(epan/in_cksum.c); ISC(wsutil/inet_ntop.c); BSD-2-clause(epan/dissectors/packet-enc.c); BSD-2-clause-no-conditions(epan/dissectors/packet-pflog.c:); BSD-3-clause-Endance(wiretap/erf.c); BSD-2-clause(wiretap/i4b_trace.h); GPL-3+(epan/dissectors/pidl/rfr/rfr.idl); GPL-3+(tools/pidl/idl.yp); BSD-2-clause(tools/pidl/idl.yp); GPL-2+(tools/pidl/idl.yp); GPL-3+(tools/pidl/idl.yp); ISC(tools/pidl/idl.yp); LGPL-2+(tools/pidl/idl.yp) | +| {{}} | 0.6.1-2+deb10u3 | Apache-2 | +| {{}} | 2.6.20-0+deb10u4 | GPL-2+(* ); GPL-2+(debian/* ); public-domain(wsutil/g711.c:); LGPL-2+(wsutil/strptime.c); LGPL-2+(tools/lemon/lempar.c); FSL-Kaz(epan/except.c); Free Software License:(epan/except.c); BSD-3-clause(epan/in_cksum.c); ISC(wsutil/inet_ntop.c); BSD-2-clause(epan/dissectors/packet-enc.c); BSD-2-clause-no-conditions(epan/dissectors/packet-pflog.c:); BSD-3-clause-Endance(wiretap/erf.c); BSD-2-clause(wiretap/i4b_trace.h); GPL-3+(epan/dissectors/pidl/rfr/rfr.idl); GPL-3+(tools/pidl/idl.yp); BSD-2-clause(tools/pidl/idl.yp); GPL-2+(tools/pidl/idl.yp); GPL-3+(tools/pidl/idl.yp); ISC(tools/pidl/idl.yp); LGPL-2+(tools/pidl/idl.yp) | +| {{}} | 2.6.20-0+deb10u4 | GPL-2+(* ); GPL-2+(debian/* ); public-domain(wsutil/g711.c:); LGPL-2+(wsutil/strptime.c); LGPL-2+(tools/lemon/lempar.c); FSL-Kaz(epan/except.c); Free Software License:(epan/except.c); BSD-3-clause(epan/in_cksum.c); ISC(wsutil/inet_ntop.c); BSD-2-clause(epan/dissectors/packet-enc.c); BSD-2-clause-no-conditions(epan/dissectors/packet-pflog.c:); BSD-3-clause-Endance(wiretap/erf.c); BSD-2-clause(wiretap/i4b_trace.h); GPL-3+(epan/dissectors/pidl/rfr/rfr.idl); GPL-3+(tools/pidl/idl.yp); BSD-2-clause(tools/pidl/idl.yp); GPL-2+(tools/pidl/idl.yp); GPL-3+(tools/pidl/idl.yp); ISC(tools/pidl/idl.yp); LGPL-2+(tools/pidl/idl.yp) | +| {{}} | 2.6.20-0+deb10u4 | GPL-2+(* ); GPL-2+(debian/* ); public-domain(wsutil/g711.c:); LGPL-2+(wsutil/strptime.c); LGPL-2+(tools/lemon/lempar.c); FSL-Kaz(epan/except.c); Free Software License:(epan/except.c); BSD-3-clause(epan/in_cksum.c); ISC(wsutil/inet_ntop.c); BSD-2-clause(epan/dissectors/packet-enc.c); BSD-2-clause-no-conditions(epan/dissectors/packet-pflog.c:); BSD-3-clause-Endance(wiretap/erf.c); BSD-2-clause(wiretap/i4b_trace.h); GPL-3+(epan/dissectors/pidl/rfr/rfr.idl); GPL-3+(tools/pidl/idl.yp); BSD-2-clause(tools/pidl/idl.yp); GPL-2+(tools/pidl/idl.yp); GPL-3+(tools/pidl/idl.yp); ISC(tools/pidl/idl.yp); LGPL-2+(tools/pidl/idl.yp) | | {{}} | 1.0.2-1 | Expat( * ); Expat( CMakeLists.txt); Expat( CMakeLists.txt) | | {{}} | 7.6.q-28 | BSD | | {{}} | 7.6.q-28 | NO COPYRIGHT FILE | -| {{}} | 2.6.20-0+deb10u3 | GPL-2+(* ); GPL-2+(debian/* ); public-domain(wsutil/g711.c:); LGPL-2+(wsutil/strptime.c); LGPL-2+(tools/lemon/lempar.c); FSL-Kaz(epan/except.c); Free Software License:(epan/except.c); BSD-3-clause(epan/in_cksum.c); ISC(wsutil/inet_ntop.c); BSD-2-clause(epan/dissectors/packet-enc.c); BSD-2-clause-no-conditions(epan/dissectors/packet-pflog.c:); BSD-3-clause-Endance(wiretap/erf.c); BSD-2-clause(wiretap/i4b_trace.h); GPL-3+(epan/dissectors/pidl/rfr/rfr.idl); GPL-3+(tools/pidl/idl.yp); BSD-2-clause(tools/pidl/idl.yp); GPL-2+(tools/pidl/idl.yp); GPL-3+(tools/pidl/idl.yp); ISC(tools/pidl/idl.yp); LGPL-2+(tools/pidl/idl.yp) | -| {{}} | 2.6.20-0+deb10u3 | GPL-2+(* ); GPL-2+(debian/* ); public-domain(wsutil/g711.c:); LGPL-2+(wsutil/strptime.c); LGPL-2+(tools/lemon/lempar.c); FSL-Kaz(epan/except.c); Free Software License:(epan/except.c); BSD-3-clause(epan/in_cksum.c); ISC(wsutil/inet_ntop.c); BSD-2-clause(epan/dissectors/packet-enc.c); BSD-2-clause-no-conditions(epan/dissectors/packet-pflog.c:); BSD-3-clause-Endance(wiretap/erf.c); BSD-2-clause(wiretap/i4b_trace.h); GPL-3+(epan/dissectors/pidl/rfr/rfr.idl); GPL-3+(tools/pidl/idl.yp); BSD-2-clause(tools/pidl/idl.yp); GPL-2+(tools/pidl/idl.yp); GPL-3+(tools/pidl/idl.yp); ISC(tools/pidl/idl.yp); LGPL-2+(tools/pidl/idl.yp) | +| {{}} | 2.6.20-0+deb10u4 | GPL-2+(* ); GPL-2+(debian/* ); public-domain(wsutil/g711.c:); LGPL-2+(wsutil/strptime.c); LGPL-2+(tools/lemon/lempar.c); FSL-Kaz(epan/except.c); Free Software License:(epan/except.c); BSD-3-clause(epan/in_cksum.c); ISC(wsutil/inet_ntop.c); BSD-2-clause(epan/dissectors/packet-enc.c); BSD-2-clause-no-conditions(epan/dissectors/packet-pflog.c:); BSD-3-clause-Endance(wiretap/erf.c); BSD-2-clause(wiretap/i4b_trace.h); GPL-3+(epan/dissectors/pidl/rfr/rfr.idl); GPL-3+(tools/pidl/idl.yp); BSD-2-clause(tools/pidl/idl.yp); GPL-2+(tools/pidl/idl.yp); GPL-3+(tools/pidl/idl.yp); ISC(tools/pidl/idl.yp); LGPL-2+(tools/pidl/idl.yp) | +| {{}} | 2.6.20-0+deb10u4 | GPL-2+(* ); GPL-2+(debian/* ); public-domain(wsutil/g711.c:); LGPL-2+(wsutil/strptime.c); LGPL-2+(tools/lemon/lempar.c); FSL-Kaz(epan/except.c); Free Software License:(epan/except.c); BSD-3-clause(epan/in_cksum.c); ISC(wsutil/inet_ntop.c); BSD-2-clause(epan/dissectors/packet-enc.c); BSD-2-clause-no-conditions(epan/dissectors/packet-pflog.c:); BSD-3-clause-Endance(wiretap/erf.c); BSD-2-clause(wiretap/i4b_trace.h); GPL-3+(epan/dissectors/pidl/rfr/rfr.idl); GPL-3+(tools/pidl/idl.yp); BSD-2-clause(tools/pidl/idl.yp); GPL-2+(tools/pidl/idl.yp); GPL-3+(tools/pidl/idl.yp); ISC(tools/pidl/idl.yp); LGPL-2+(tools/pidl/idl.yp) | | {{}} | 6.36-2 | Artistic or GPL-1+(* ); Artistic or GPL-1+(lib/LWP.pm); Artistic or GPL-1+(lib/LWP/Authen/Ntlm.pm); Artistic or GPL-1+(lwptut.pod); Artistic or GPL-1+(debian/* ); Artistic(debian/* ); GPL-1+(debian/* ) | | {{}} | 6.02-1 | Artistic or GPL-1+(* ); Artistic or GPL-1+(debian/* ); Artistic(debian/* ); GPL-1+(debian/* ) | -| {{}} | 1.6.7-1+deb10u2 | MIT | +| {{}} | 1.6.7-1+deb10u4 | MIT | | {{}} | 1.6.7-1+deb10u2 | MIT | -| {{}} | 1.6.7-1+deb10u2 | MIT | -| {{}} | 1.6.7-1+deb10u2 | MIT | -| {{}} | 1.6.7-1+deb10u2 | MIT | +| {{}} | 1.6.7-1+deb10u4 | MIT | +| {{}} | 1.6.7-1+deb10u4 | MIT | +| {{}} | 1.6.7-1+deb10u4 | MIT | | {{}} | 8.3.0-6 | NO COPYRIGHT FILE | | {{}} | 8.3.0-6 | NO COPYRIGHT FILE | | {{}} | 8.3.0-6 | NO COPYRIGHT FILE | @@ -1133,9 +1144,9 @@ pdfhidden: True | {{}} | 5.0.3-1 | BSD | | {{}} | 1.7.9-1 | BSD | | {{}} | 1.1.4-2 | BSD | -| {{}} | 2.9.4+dfsg1-7+deb10u4 | ISC; MIT; MIT-1 | -| {{}} | 2.9.4+dfsg1-7+deb10u4 | ISC; MIT; MIT-1 | -| {{}} | 2.9.4+dfsg1-7+deb10u4 | ISC; MIT; MIT-1 | +| {{}} | 2.9.4+dfsg1-7+deb10u6 | ISC; MIT; MIT-1 | +| {{}} | 2.9.4+dfsg1-7+deb10u6 | ISC; MIT; MIT-1 | +| {{}} | 2.9.4+dfsg1-7+deb10u6 | ISC; MIT; MIT-1 | | {{}} | 2.0134+dfsg-1 | Artistic or GPL-1+(* ); Artistic or GPL-1+(Devel.xs); Expat(scripts/Test.pm-to-Test-More.pl); Expat(t/48_reader_undef_warning_on_empty_str_rt106830.t); Expat(example/create-sample-html-document.pl); Artistic or GPL-1+(inc/Devel/CheckLib.pm); Artistic or GPL-1+(ppport.h); Artistic or GPL-1+(debian/* ); Artistic(debian/* ); GPL-1+(debian/* ); Expat(debian/* ) | | {{}} | 1.12-1 | Artistic or GPL-1+(* ); Artistic or GPL-1+(debian/* ); Artistic(debian/* ); GPL-1+(debian/* ) | | {{}} | 1.09-1 | Artistic or GPL-1+(* ); Artistic or GPL-1+(debian/* ); Artistic(debian/* ); GPL-1+(debian/* ) | @@ -1144,16 +1155,17 @@ pdfhidden: True | {{}} | 1.2.27-2 | BSD | | {{}} | 2.25-1 | Artistic or GPL-1+(* ); Artistic or GPL-1+(debian/* ); Artistic(debian/* ); GPL-1+(debian/* ) | | {{}} | 1.1.2-2+b3 | BSD | -| {{}} | 3.5.12-1 | BSD | +| {{}} | 3.5.12-1+deb10u2 | BSD | +| {{}} | 3.5.12-1+deb10u2 | BSD | | {{}} | 1.5.1-1 | BSD-like | | {{}} | 0.9.10-1 | BSD-like | | {{}} | 1.3-1 | BSD-like | | {{}} | 1.3-1 | BSD-like | | {{}} | 1.1.32-2.2~deb10u1 | BSD | | {{}} | 1.1.5-1+b3 | MIT | -| {{}} | 1.8.2-3-cl4.3.1u7 | GPL-2(* ); GPL-2(extensions/libebt_802_3.c); GPL-2(extensions/libebt_ip.c extensions/libebt_log.c extensions/libebt_mark* .c); GPL-2(extensions/libebt_limit.c); GPL-2(extensions/libebt_nflog.c); GPL-2(extensions/libip6t_DNAT.c); GPL-2(extensions/libip6t_DNPT.c); GPL-2(extensions/libip6t_MASQUERADE.c); GPL-2(extensions/libip6t_NETMAP.c); GPL-2(extensions/libip6t_REDIRECT.c); GPL-2(extensions/libip6t_REJECT.c); GPL-2(extensions/libip6t_SNAT.c); GPL-2(extensions/libip6t_SNPT.c); GPL-2(extensions/libip6t_mh.c); GPL-2(extensions/libipt_CLUSTERIP.c); GPL-2(extensions/libipt_ECN.c); GPL-2(extensions/libipt_REJECT.c); GPL-2(extensions/libipt_TTL.c); GPL-2(extensions/libipt_ULOG.c); GPL-2(extensions/libipt_ttl.c); GPL-2(extensions/libxt_AUDIT.c); GPL-2(extensions/libxt_CHECKSUM.c); GPL-2(extensions/libxt_CLASSIFY.c); GPL-2(extensions/libxt_CONNMARK.c); GPL-2(extensions/libxt_CONNSECMARK.c); GPL-2(extensions/libxt_CT.c); GPL-2(extensions/libxt_DSCP.c); GPL-2(extensions/libxt_HMARK.c); GPL-2(extensions/libxt_IDLETIMER.c); GPL-2(extensions/libxt_LED.c); GPL-2(extensions/libxt_NFQUEUE.c); GPL-2(extensions/libxt_RATEEST.c); GPL-2(extensions/libxt_SECMARK.c); GPL-2(extensions/libxt_SET.c); GPL-2(extensions/libxt_SYNPROXY.c); GPL-2(extensions/libxt_TCPMSS.c); GPL-2(extensions/libxt_TCPOPTSTRIP.c); GPL-2(extensions/libxt_TEE.c); GPL-2(extensions/libxt_TOS.c); GPL-2(extensions/libxt_TPROXY.c); GPL-2(extensions/libxt_addrtype.c); GPL-2(extensions/libxt_bpf.c); GPL-2(extensions/libxt_cluster.c); GPL-2(extensions/libxt_connmark.c); GPL-2(extensions/libxt_conntrack.c); GPL-2(extensions/libxt_dccp.c); GPL-2(extensions/libxt_devgroup.c); GPL-2(extensions/libxt_dscp.c); GPL-2(extensions/libxt_ecn.c); GPL-2(extensions/libxt_hashlimit.c); GPL-2(extensions/libxt_osf.c); GPL-2(extensions/libxt_owner.c); GPL-2(extensions/libxt_policy.c); GPL-2(extensions/libxt_rateest.c); GPL-2(extensions/libxt_sctp.c); GPL-2(extensions/libxt_set.c); GPL-2(extensions/libxt_socket.c); GPL-2(extensions/libxt_statistic.c); GPL-2(extensions/libxt_string.c); GPL-2(extensions/libxt_time.c); GPL-2(extensions/libxt_tos.c); GPL-2(extensions/libxt_u32.c); GPL-2(include/linux/netfilter/ipset/ip_set.h); GPL-2(include/linux/netfilter/xt_AUDIT.h); GPL-2(include/linux/netfilter/xt_CHECKSUM.h); GPL-2(include/linux/netfilter/xt_DSCP.h); GPL-2(include/linux/netfilter/xt_IDLETIMER.h); GPL-2(include/linux/netfilter/xt_NFQUEUE.h); GPL-2(include/linux/netfilter/xt_connmark.h); GPL-2(include/linux/netfilter/xt_conntrack.h); GPL-2(include/linux/netfilter/xt_dscp.h); GPL-2(include/linux/netfilter/xt_ecn.h); GPL-2(include/linux/netfilter/xt_osf.h); GPL-2(include/linux/netfilter_ipv4.h); GPL-2(include/linux/netfilter_ipv4/ip_queue.h); GPL-2(include/linux/netfilter_ipv4/ipt_ECN.h); GPL-2(include/linux/netfilter_ipv4/ipt_TTL.h); GPL-2(include/linux/netfilter_ipv4/ipt_ULOG.h); GPL-2(include/linux/netfilter_ipv4/ipt_ttl.h); GPL-2(include/linux/netfilter_ipv6.h); Artistic-2(iptables/iptables-apply); GPL-2(iptables/iptables-save.c); GPL-2(iptables/iptables-xml.c); GPL-2+(iptables/nft.c); GPL-2+(iptables/nft-arp.c); GPL-2+(iptables/nft-bridge.c); GPL-2+(iptables/nft-ipv4.c iptables/nft-ipv6.c iptables/nft-shared.c); GPL-2+(iptables/xtables-arp.c iptables/xtables-eb.c); GPL-2(libiptc/libip4tc.c); GPL-2(libiptc/libip6tc.c); GPL-2(libiptc/libiptc.c); GPL-2(libxtables/xtables.c); GPL-2(libxtables/xtoptions.c); GPL-2(utils/nfsynproxy.c); custom(utils/pf.os); GPL-2(utils/pf.os); GPL-2+(utils/pf.os); Artistic-2(utils/pf.os) | -| {{}} | 1.8.2-3-cl4.3.1u7 | NO COPYRIGHT FILE | -| {{}} | 1.8.2-3-cl4.3.1u7 | GPL-2(* ); GPL-2(extensions/libebt_802_3.c); GPL-2(extensions/libebt_ip.c extensions/libebt_log.c extensions/libebt_mark* .c); GPL-2(extensions/libebt_limit.c); GPL-2(extensions/libebt_nflog.c); GPL-2(extensions/libip6t_DNAT.c); GPL-2(extensions/libip6t_DNPT.c); GPL-2(extensions/libip6t_MASQUERADE.c); GPL-2(extensions/libip6t_NETMAP.c); GPL-2(extensions/libip6t_REDIRECT.c); GPL-2(extensions/libip6t_REJECT.c); GPL-2(extensions/libip6t_SNAT.c); GPL-2(extensions/libip6t_SNPT.c); GPL-2(extensions/libip6t_mh.c); GPL-2(extensions/libipt_CLUSTERIP.c); GPL-2(extensions/libipt_ECN.c); GPL-2(extensions/libipt_REJECT.c); GPL-2(extensions/libipt_TTL.c); GPL-2(extensions/libipt_ULOG.c); GPL-2(extensions/libipt_ttl.c); GPL-2(extensions/libxt_AUDIT.c); GPL-2(extensions/libxt_CHECKSUM.c); GPL-2(extensions/libxt_CLASSIFY.c); GPL-2(extensions/libxt_CONNMARK.c); GPL-2(extensions/libxt_CONNSECMARK.c); GPL-2(extensions/libxt_CT.c); GPL-2(extensions/libxt_DSCP.c); GPL-2(extensions/libxt_HMARK.c); GPL-2(extensions/libxt_IDLETIMER.c); GPL-2(extensions/libxt_LED.c); GPL-2(extensions/libxt_NFQUEUE.c); GPL-2(extensions/libxt_RATEEST.c); GPL-2(extensions/libxt_SECMARK.c); GPL-2(extensions/libxt_SET.c); GPL-2(extensions/libxt_SYNPROXY.c); GPL-2(extensions/libxt_TCPMSS.c); GPL-2(extensions/libxt_TCPOPTSTRIP.c); GPL-2(extensions/libxt_TEE.c); GPL-2(extensions/libxt_TOS.c); GPL-2(extensions/libxt_TPROXY.c); GPL-2(extensions/libxt_addrtype.c); GPL-2(extensions/libxt_bpf.c); GPL-2(extensions/libxt_cluster.c); GPL-2(extensions/libxt_connmark.c); GPL-2(extensions/libxt_conntrack.c); GPL-2(extensions/libxt_dccp.c); GPL-2(extensions/libxt_devgroup.c); GPL-2(extensions/libxt_dscp.c); GPL-2(extensions/libxt_ecn.c); GPL-2(extensions/libxt_hashlimit.c); GPL-2(extensions/libxt_osf.c); GPL-2(extensions/libxt_owner.c); GPL-2(extensions/libxt_policy.c); GPL-2(extensions/libxt_rateest.c); GPL-2(extensions/libxt_sctp.c); GPL-2(extensions/libxt_set.c); GPL-2(extensions/libxt_socket.c); GPL-2(extensions/libxt_statistic.c); GPL-2(extensions/libxt_string.c); GPL-2(extensions/libxt_time.c); GPL-2(extensions/libxt_tos.c); GPL-2(extensions/libxt_u32.c); GPL-2(include/linux/netfilter/ipset/ip_set.h); GPL-2(include/linux/netfilter/xt_AUDIT.h); GPL-2(include/linux/netfilter/xt_CHECKSUM.h); GPL-2(include/linux/netfilter/xt_DSCP.h); GPL-2(include/linux/netfilter/xt_IDLETIMER.h); GPL-2(include/linux/netfilter/xt_NFQUEUE.h); GPL-2(include/linux/netfilter/xt_connmark.h); GPL-2(include/linux/netfilter/xt_conntrack.h); GPL-2(include/linux/netfilter/xt_dscp.h); GPL-2(include/linux/netfilter/xt_ecn.h); GPL-2(include/linux/netfilter/xt_osf.h); GPL-2(include/linux/netfilter_ipv4.h); GPL-2(include/linux/netfilter_ipv4/ip_queue.h); GPL-2(include/linux/netfilter_ipv4/ipt_ECN.h); GPL-2(include/linux/netfilter_ipv4/ipt_TTL.h); GPL-2(include/linux/netfilter_ipv4/ipt_ULOG.h); GPL-2(include/linux/netfilter_ipv4/ipt_ttl.h); GPL-2(include/linux/netfilter_ipv6.h); Artistic-2(iptables/iptables-apply); GPL-2(iptables/iptables-save.c); GPL-2(iptables/iptables-xml.c); GPL-2+(iptables/nft.c); GPL-2+(iptables/nft-arp.c); GPL-2+(iptables/nft-bridge.c); GPL-2+(iptables/nft-ipv4.c iptables/nft-ipv6.c iptables/nft-shared.c); GPL-2+(iptables/xtables-arp.c iptables/xtables-eb.c); GPL-2(libiptc/libip4tc.c); GPL-2(libiptc/libip6tc.c); GPL-2(libiptc/libiptc.c); GPL-2(libxtables/xtables.c); GPL-2(libxtables/xtoptions.c); GPL-2(utils/nfsynproxy.c); custom(utils/pf.os); GPL-2(utils/pf.os); GPL-2+(utils/pf.os); Artistic-2(utils/pf.os) | +| {{}} | 1.8.2-3-cl4.3.2u1 | GPL-2(* ); GPL-2(extensions/libebt_802_3.c); GPL-2(extensions/libebt_ip.c extensions/libebt_log.c extensions/libebt_mark* .c); GPL-2(extensions/libebt_limit.c); GPL-2(extensions/libebt_nflog.c); GPL-2(extensions/libip6t_DNAT.c); GPL-2(extensions/libip6t_DNPT.c); GPL-2(extensions/libip6t_MASQUERADE.c); GPL-2(extensions/libip6t_NETMAP.c); GPL-2(extensions/libip6t_REDIRECT.c); GPL-2(extensions/libip6t_REJECT.c); GPL-2(extensions/libip6t_SNAT.c); GPL-2(extensions/libip6t_SNPT.c); GPL-2(extensions/libip6t_mh.c); GPL-2(extensions/libipt_CLUSTERIP.c); GPL-2(extensions/libipt_ECN.c); GPL-2(extensions/libipt_REJECT.c); GPL-2(extensions/libipt_TTL.c); GPL-2(extensions/libipt_ULOG.c); GPL-2(extensions/libipt_ttl.c); GPL-2(extensions/libxt_AUDIT.c); GPL-2(extensions/libxt_CHECKSUM.c); GPL-2(extensions/libxt_CLASSIFY.c); GPL-2(extensions/libxt_CONNMARK.c); GPL-2(extensions/libxt_CONNSECMARK.c); GPL-2(extensions/libxt_CT.c); GPL-2(extensions/libxt_DSCP.c); GPL-2(extensions/libxt_HMARK.c); GPL-2(extensions/libxt_IDLETIMER.c); GPL-2(extensions/libxt_LED.c); GPL-2(extensions/libxt_NFQUEUE.c); GPL-2(extensions/libxt_RATEEST.c); GPL-2(extensions/libxt_SECMARK.c); GPL-2(extensions/libxt_SET.c); GPL-2(extensions/libxt_SYNPROXY.c); GPL-2(extensions/libxt_TCPMSS.c); GPL-2(extensions/libxt_TCPOPTSTRIP.c); GPL-2(extensions/libxt_TEE.c); GPL-2(extensions/libxt_TOS.c); GPL-2(extensions/libxt_TPROXY.c); GPL-2(extensions/libxt_addrtype.c); GPL-2(extensions/libxt_bpf.c); GPL-2(extensions/libxt_cluster.c); GPL-2(extensions/libxt_connmark.c); GPL-2(extensions/libxt_conntrack.c); GPL-2(extensions/libxt_dccp.c); GPL-2(extensions/libxt_devgroup.c); GPL-2(extensions/libxt_dscp.c); GPL-2(extensions/libxt_ecn.c); GPL-2(extensions/libxt_hashlimit.c); GPL-2(extensions/libxt_osf.c); GPL-2(extensions/libxt_owner.c); GPL-2(extensions/libxt_policy.c); GPL-2(extensions/libxt_rateest.c); GPL-2(extensions/libxt_sctp.c); GPL-2(extensions/libxt_set.c); GPL-2(extensions/libxt_socket.c); GPL-2(extensions/libxt_statistic.c); GPL-2(extensions/libxt_string.c); GPL-2(extensions/libxt_time.c); GPL-2(extensions/libxt_tos.c); GPL-2(extensions/libxt_u32.c); GPL-2(include/linux/netfilter/ipset/ip_set.h); GPL-2(include/linux/netfilter/xt_AUDIT.h); GPL-2(include/linux/netfilter/xt_CHECKSUM.h); GPL-2(include/linux/netfilter/xt_DSCP.h); GPL-2(include/linux/netfilter/xt_IDLETIMER.h); GPL-2(include/linux/netfilter/xt_NFQUEUE.h); GPL-2(include/linux/netfilter/xt_connmark.h); GPL-2(include/linux/netfilter/xt_conntrack.h); GPL-2(include/linux/netfilter/xt_dscp.h); GPL-2(include/linux/netfilter/xt_ecn.h); GPL-2(include/linux/netfilter/xt_osf.h); GPL-2(include/linux/netfilter_ipv4.h); GPL-2(include/linux/netfilter_ipv4/ip_queue.h); GPL-2(include/linux/netfilter_ipv4/ipt_ECN.h); GPL-2(include/linux/netfilter_ipv4/ipt_TTL.h); GPL-2(include/linux/netfilter_ipv4/ipt_ULOG.h); GPL-2(include/linux/netfilter_ipv4/ipt_ttl.h); GPL-2(include/linux/netfilter_ipv6.h); Artistic-2(iptables/iptables-apply); GPL-2(iptables/iptables-save.c); GPL-2(iptables/iptables-xml.c); GPL-2+(iptables/nft.c); GPL-2+(iptables/nft-arp.c); GPL-2+(iptables/nft-bridge.c); GPL-2+(iptables/nft-ipv4.c iptables/nft-ipv6.c iptables/nft-shared.c); GPL-2+(iptables/xtables-arp.c iptables/xtables-eb.c); GPL-2(libiptc/libip4tc.c); GPL-2(libiptc/libip6tc.c); GPL-2(libiptc/libiptc.c); GPL-2(libxtables/xtables.c); GPL-2(libxtables/xtoptions.c); GPL-2(utils/nfsynproxy.c); custom(utils/pf.os); GPL-2(utils/pf.os); GPL-2+(utils/pf.os); Artistic-2(utils/pf.os) | +| {{}} | 1.8.2-3-cl4.3.2u1 | NO COPYRIGHT FILE | +| {{}} | 1.8.2-3-cl4.3.2u1 | GPL-2(* ); GPL-2(extensions/libebt_802_3.c); GPL-2(extensions/libebt_ip.c extensions/libebt_log.c extensions/libebt_mark* .c); GPL-2(extensions/libebt_limit.c); GPL-2(extensions/libebt_nflog.c); GPL-2(extensions/libip6t_DNAT.c); GPL-2(extensions/libip6t_DNPT.c); GPL-2(extensions/libip6t_MASQUERADE.c); GPL-2(extensions/libip6t_NETMAP.c); GPL-2(extensions/libip6t_REDIRECT.c); GPL-2(extensions/libip6t_REJECT.c); GPL-2(extensions/libip6t_SNAT.c); GPL-2(extensions/libip6t_SNPT.c); GPL-2(extensions/libip6t_mh.c); GPL-2(extensions/libipt_CLUSTERIP.c); GPL-2(extensions/libipt_ECN.c); GPL-2(extensions/libipt_REJECT.c); GPL-2(extensions/libipt_TTL.c); GPL-2(extensions/libipt_ULOG.c); GPL-2(extensions/libipt_ttl.c); GPL-2(extensions/libxt_AUDIT.c); GPL-2(extensions/libxt_CHECKSUM.c); GPL-2(extensions/libxt_CLASSIFY.c); GPL-2(extensions/libxt_CONNMARK.c); GPL-2(extensions/libxt_CONNSECMARK.c); GPL-2(extensions/libxt_CT.c); GPL-2(extensions/libxt_DSCP.c); GPL-2(extensions/libxt_HMARK.c); GPL-2(extensions/libxt_IDLETIMER.c); GPL-2(extensions/libxt_LED.c); GPL-2(extensions/libxt_NFQUEUE.c); GPL-2(extensions/libxt_RATEEST.c); GPL-2(extensions/libxt_SECMARK.c); GPL-2(extensions/libxt_SET.c); GPL-2(extensions/libxt_SYNPROXY.c); GPL-2(extensions/libxt_TCPMSS.c); GPL-2(extensions/libxt_TCPOPTSTRIP.c); GPL-2(extensions/libxt_TEE.c); GPL-2(extensions/libxt_TOS.c); GPL-2(extensions/libxt_TPROXY.c); GPL-2(extensions/libxt_addrtype.c); GPL-2(extensions/libxt_bpf.c); GPL-2(extensions/libxt_cluster.c); GPL-2(extensions/libxt_connmark.c); GPL-2(extensions/libxt_conntrack.c); GPL-2(extensions/libxt_dccp.c); GPL-2(extensions/libxt_devgroup.c); GPL-2(extensions/libxt_dscp.c); GPL-2(extensions/libxt_ecn.c); GPL-2(extensions/libxt_hashlimit.c); GPL-2(extensions/libxt_osf.c); GPL-2(extensions/libxt_owner.c); GPL-2(extensions/libxt_policy.c); GPL-2(extensions/libxt_rateest.c); GPL-2(extensions/libxt_sctp.c); GPL-2(extensions/libxt_set.c); GPL-2(extensions/libxt_socket.c); GPL-2(extensions/libxt_statistic.c); GPL-2(extensions/libxt_string.c); GPL-2(extensions/libxt_time.c); GPL-2(extensions/libxt_tos.c); GPL-2(extensions/libxt_u32.c); GPL-2(include/linux/netfilter/ipset/ip_set.h); GPL-2(include/linux/netfilter/xt_AUDIT.h); GPL-2(include/linux/netfilter/xt_CHECKSUM.h); GPL-2(include/linux/netfilter/xt_DSCP.h); GPL-2(include/linux/netfilter/xt_IDLETIMER.h); GPL-2(include/linux/netfilter/xt_NFQUEUE.h); GPL-2(include/linux/netfilter/xt_connmark.h); GPL-2(include/linux/netfilter/xt_conntrack.h); GPL-2(include/linux/netfilter/xt_dscp.h); GPL-2(include/linux/netfilter/xt_ecn.h); GPL-2(include/linux/netfilter/xt_osf.h); GPL-2(include/linux/netfilter_ipv4.h); GPL-2(include/linux/netfilter_ipv4/ip_queue.h); GPL-2(include/linux/netfilter_ipv4/ipt_ECN.h); GPL-2(include/linux/netfilter_ipv4/ipt_TTL.h); GPL-2(include/linux/netfilter_ipv4/ipt_ULOG.h); GPL-2(include/linux/netfilter_ipv4/ipt_ttl.h); GPL-2(include/linux/netfilter_ipv6.h); Artistic-2(iptables/iptables-apply); GPL-2(iptables/iptables-save.c); GPL-2(iptables/iptables-xml.c); GPL-2+(iptables/nft.c); GPL-2+(iptables/nft-arp.c); GPL-2+(iptables/nft-bridge.c); GPL-2+(iptables/nft-ipv4.c iptables/nft-ipv6.c iptables/nft-shared.c); GPL-2+(iptables/xtables-arp.c iptables/xtables-eb.c); GPL-2(libiptc/libip4tc.c); GPL-2(libiptc/libip6tc.c); GPL-2(libiptc/libiptc.c); GPL-2(libxtables/xtables.c); GPL-2(libxtables/xtoptions.c); GPL-2(utils/nfsynproxy.c); custom(utils/pf.os); GPL-2(utils/pf.os); GPL-2+(utils/pf.os); Artistic-2(utils/pf.os) | | {{}} | 1.2.3-1 | MIT; NCD | | {{}} | 1.1.4-1+b2 | BSD | | {{}} | 1.1.4-1+b2 | BSD | @@ -1170,41 +1182,42 @@ pdfhidden: True | {{}} | 0.16.105-1+deb10u1 | BSD-3-clause(* ); BSD-3-clause(swig/* ); BSD-3-clause(swig/java/* ); BSD-3-clause AND Apache-2.0(swig/python/config.py.in swig/python/tests/test_libyang.py swig/python/tests/test_tree_data.py swig/python/tests/test_tree_schema.py); IETF-BSD-3-clause(* /iana-* .yin * /iana-* .yang * /ietf-* .yin * /ietf-* .yang * /ietf-* .h); BSD-2-clause(linenoise/* ); Expat(swig/cpp/tests/microtest.h); BSD-3-clause(swig/java/tests/hamcrest-core-1.3.jar); EPL-1.0(swig/java/tests/junit-4.12.jar); GPL-3(swig/* .deb); BSD-3-clause(debian/* ); BSD-3-clause(debian/* ); Apache-2.0(debian/* ) | | {{}} | 4.3.1-4+deb10u2 | LGPL-3.0+(* ); LGPL-3.0+(src/xreq.cpp); LGPL-3.0+(src/msg.hpp); LGPL-3.0+(src/pgm_receiver.* ); LGPL-2.0+(debian/* ); MIT(debian/zmq.hpp); LGPL-2.0+(debian/zmq.hpp); LGPL-3.0+(debian/zmq.hpp); MIT(debian/zmq.hpp) | | {{}} | 4.3.1-4+deb10u2 | LGPL-3.0+(* ); LGPL-3.0+(src/xreq.cpp); LGPL-3.0+(src/msg.hpp); LGPL-3.0+(src/pgm_receiver.* ); LGPL-2.0+(debian/* ); MIT(debian/zmq.hpp); LGPL-2.0+(debian/zmq.hpp); LGPL-3.0+(debian/zmq.hpp); MIT(debian/zmq.hpp) | -| {{}} | 1.3.8+dfsg-3+deb10u2 | BSD-3-clause and GPL-2(* ); zlib(zlibWrapper/examples/* .c); zlib(zlibWrapper/gz* .c); zlib(zlibWrapper/gz* .c); GPL-2+(contrib/linux-kernel/fs/squashfs/* ); Expat(lib/dictBuilder/divsufsort.* ); BSD-3-clause and GPL-2(examples/* ); Expat(debian/* ); Expat(debian/* ); GPL-2(debian/* ); BSD-3-clause(debian/* ) | +| {{}} | 1.4.4+dfsg-3~bpo10+1 | BSD-3-clause and GPL-2(* ); zlib(zlibWrapper/examples/* .c); zlib(zlibWrapper/gz* .c); zlib(zlibWrapper/gz* .c); GPL-2+(contrib/linux-kernel/fs/squashfs/* ); Expat(lib/dictBuilder/divsufsort.* ); BSD-3-clause and GPL-2(examples/* ); Expat(debian/* ); Expat(debian/* ); GPL-2(debian/* ); BSD-3-clause(debian/* ) | +| {{}} | 1.4.4+dfsg-3~bpo10+1 | BSD-3-clause and GPL-2(* ); zlib(zlibWrapper/examples/* .c); zlib(zlibWrapper/gz* .c); zlib(zlibWrapper/gz* .c); GPL-2+(contrib/linux-kernel/fs/squashfs/* ); Expat(lib/dictBuilder/divsufsort.* ); BSD-3-clause and GPL-2(examples/* ); Expat(debian/* ); Expat(debian/* ); GPL-2(debian/* ); BSD-3-clause(debian/* ) | | {{}} | 0.13.62-3.2+deb10u1 | LGPL-2 | | {{}} | 2.15.0 | GPL-2+(* ) | | {{}} | 4.6 | GPL; GPL-2 | -| {{}} | 4.19.257-1+cl4.3.1u1 | GPL-2(* ); GPL-2(debian/* ); Unicode-data(fs/nls/mac-* ); Xen-interface(include/xen/interface/* ) | -| {{}} | 4.19.257-1+cl4.3.1u2 | GPL-2(* ); GPL-2(debian/* ); Unicode-data(fs/nls/mac-* ); Xen-interface(include/xen/interface/* ) | -| {{}} | 4.19.257-1+cl4.3.1u1 | GPL-2(* ); GPL-2(debian/* ); Unicode-data(fs/nls/mac-* ); Xen-interface(include/xen/interface/* ) | -| {{}} | 4.19.257-1+cl4.3.1u2 | NO COPYRIGHT FILE | -| {{}} | 4.19.257-1+cl4.3.1u1 | GPL-2(* ); GPL-2(debian/* ); Unicode-data(fs/nls/mac-* ); Xen-interface(include/xen/interface/* ) | -| {{}} | 4.19.257-1+cl4.3.1u1 | GPL-2(* ); GPL-2(debian/* ); Unicode-data(fs/nls/mac-* ); Xen-interface(include/xen/interface/* ) | -| {{}} | 4.19.257-1+cl4.3.1u2 | NO COPYRIGHT FILE | -| {{}} | 4.19.257-1+cl4.3.1u1 | NO COPYRIGHT FILE | -| {{}} | 4.19.257-1+cl4.3.1u1 | NO COPYRIGHT FILE | +| {{}} | 4.19.273-1+cl4.3.2u4 | GPL-2(* ); GPL-2(debian/* ); Unicode-data(fs/nls/mac-* ); Xen-interface(include/xen/interface/* ) | +| {{}} | 4.19.273-1+cl4.3.2u4 | GPL-2(* ); GPL-2(debian/* ); Unicode-data(fs/nls/mac-* ); Xen-interface(include/xen/interface/* ) | +| {{}} | 4.19.273-1+cl4.3.2u4 | GPL-2(* ); GPL-2(debian/* ); Unicode-data(fs/nls/mac-* ); Xen-interface(include/xen/interface/* ) | +| {{}} | 4.19.273-1+cl4.3.2u4 | NO COPYRIGHT FILE | +| {{}} | 4.19.273-1+cl4.3.2u4 | GPL-2(* ); GPL-2(debian/* ); Unicode-data(fs/nls/mac-* ); Xen-interface(include/xen/interface/* ) | +| {{}} | 4.19.273-1+cl4.3.2u4 | GPL-2(* ); GPL-2(debian/* ); Unicode-data(fs/nls/mac-* ); Xen-interface(include/xen/interface/* ) | +| {{}} | 4.19.273-1+cl4.3.2u4 | NO COPYRIGHT FILE | +| {{}} | 4.19.273-1+cl4.3.2u4 | NO COPYRIGHT FILE | +| {{}} | 4.19.273-1+cl4.3.2u4 | NO COPYRIGHT FILE | | {{}} | 4.19+63+cl4u1 | GPL; GPL-2 | | {{}} | 4.19+63+cl4u1 | GPL; GPL-2 | -| {{}} | 4.19.257-1+cl4.3.1u2 | GPL-2(* ); GPL-2(debian/* ); Unicode-data(fs/nls/mac-* ); Xen-interface(include/xen/interface/* ) | -| {{}} | 4.19.257-1+cl4.3.1u2 | GPL-2(* ); GPL-2(debian/* ); Unicode-data(fs/nls/mac-* ); Xen-interface(include/xen/interface/* ) | -| {{}} | 4.19.257-1+cl4.3.1u2 | GPL-2(* ); GPL-2(debian/* ); Unicode-data(fs/nls/mac-* ); Xen-interface(include/xen/interface/* ) | -| {{}} | 4.19.257-1+cl4.3.1u2 | GPL-2(* ); GPL-2(debian/* ); Unicode-data(fs/nls/mac-* ); Xen-interface(include/xen/interface/* ) | -| {{}} | 4.19.257-1+cl4.3.1u1 | GPL-2(* ); GPL-2(debian/* ); Unicode-data(fs/nls/mac-* ); Xen-interface(include/xen/interface/* ) | -| {{}} | 4.19.257-1+cl4.3.1u1 | GPL-2(* ); GPL-2(debian/* ); Unicode-data(fs/nls/mac-* ); Xen-interface(include/xen/interface/* ) | -| {{}} | 4.19.257-1+cl4.3.1u1 | GPL-2(* ); GPL-2(debian/* ); Unicode-data(fs/nls/mac-* ); Xen-interface(include/xen/interface/* ) | -| {{}} | 4.19.257-1+cl4.3.1u1 | GPL-2(* ); GPL-2(debian/* ); Unicode-data(fs/nls/mac-* ); Xen-interface(include/xen/interface/* ) | +| {{}} | 4.19.273-1+cl4.3.2u4 | GPL-2(* ); GPL-2(debian/* ); Unicode-data(fs/nls/mac-* ); Xen-interface(include/xen/interface/* ) | +| {{}} | 4.19.273-1+cl4.3.2u4 | GPL-2(* ); GPL-2(debian/* ); Unicode-data(fs/nls/mac-* ); Xen-interface(include/xen/interface/* ) | +| {{}} | 4.19.273-1+cl4.3.2u4 | GPL-2(* ); GPL-2(debian/* ); Unicode-data(fs/nls/mac-* ); Xen-interface(include/xen/interface/* ) | +| {{}} | 4.19.273-1+cl4.3.2u4 | GPL-2(* ); GPL-2(debian/* ); Unicode-data(fs/nls/mac-* ); Xen-interface(include/xen/interface/* ) | +| {{}} | 4.19.273-1+cl4.3.2u4 | GPL-2(* ); GPL-2(debian/* ); Unicode-data(fs/nls/mac-* ); Xen-interface(include/xen/interface/* ) | +| {{}} | 4.19.273-1+cl4.3.2u4 | GPL-2(* ); GPL-2(debian/* ); Unicode-data(fs/nls/mac-* ); Xen-interface(include/xen/interface/* ) | +| {{}} | 4.19.273-1+cl4.3.2u4 | GPL-2(* ); GPL-2(debian/* ); Unicode-data(fs/nls/mac-* ); Xen-interface(include/xen/interface/* ) | +| {{}} | 4.19.273-1+cl4.3.2u4 | GPL-2(* ); GPL-2(debian/* ); Unicode-data(fs/nls/mac-* ); Xen-interface(include/xen/interface/* ) | | {{}} | 4.19+63+cl4u1 | GPL; GPL-2 | | {{}} | 4.19+63+cl4u1 | GPL; GPL-2 | | {{}} | 4.19+63+cl4u1 | GPL; GPL-2 | | {{}} | 4.19+63+cl4u1 | GPL; GPL-2 | | {{}} | 4.19.37-5+deb10u2 | GPL-2(* ); GPL-2(debian/* ); LGPL-2.1(debian/rules.d/tools/hv/check-hyperv.c); GPL-2+ or X11(Files:); CRYPTOGAMS(drivers/crypto/vmx/* .pl); Unicode-data(fs/nls/mac-* ); Xen-interface(include/xen/interface/* ); LGPL-2.1(scripts/extract-cert.c scripts/sign-file.c); GPL-2(scripts/extract-cert.c scripts/sign-file.c); LGPL-2.1(scripts/extract-cert.c scripts/sign-file.c); GPL-2+ or X11(scripts/extract-cert.c scripts/sign-file.c) | -| {{}} | 4.19.257-1+cl4.3.1u1 | GPL-2(* ); GPL-2(debian/* ); Unicode-data(fs/nls/mac-* ); Xen-interface(include/xen/interface/* ) | +| {{}} | 4.19.273-1+cl4.3.2u4 | GPL-2(* ); GPL-2(debian/* ); Unicode-data(fs/nls/mac-* ); Xen-interface(include/xen/interface/* ) | | {{}} | 4.19+105+deb10u16 | GPL; GPL-2 | | {{}} | 4.19.249-2 | GPL-2(* ); GPL-2(debian/* ); LGPL-2.1(debian/rules.d/tools/hv/check-hyperv.c); GPL-2+ or X11(Files:); CRYPTOGAMS(drivers/crypto/vmx/* .pl); Unicode-data(fs/nls/mac-* ); Xen-interface(include/xen/interface/* ); LGPL-2.1(scripts/extract-cert.c scripts/sign-file.c); GPL-2(scripts/extract-cert.c scripts/sign-file.c); LGPL-2.1(scripts/extract-cert.c scripts/sign-file.c); GPL-2+ or X11(scripts/extract-cert.c scripts/sign-file.c) | -| {{}} | 1.8-cl4.3.1u4 | GPL-2(* ); GPL-2(fault.c fault.h); GPL-2(phc_ctl.c); GPL-2(clockadj.h); GPL-2(address.h notification.h); GPL-2(debian/* ); GPL-2(debian/* .service) | -| {{}} | 1.8-cl4.3.1u4 | NO COPYRIGHT FILE | -| {{}} | 4.19.257-1+cl4.3.1u2 | GPL-2(* ); GPL-2(debian/* ); Unicode-data(fs/nls/mac-* ); Xen-interface(include/xen/interface/* ) | -| {{}} | 4.19.257-1+cl4.3.1u2 | GPL-2(* ); GPL-2(debian/* ); Unicode-data(fs/nls/mac-* ); Xen-interface(include/xen/interface/* ) | +| {{}} | 1.8-cl4.3.2u1 | GPL-2(* ); GPL-2(fault.c fault.h); GPL-2(phc_ctl.c); GPL-2(clockadj.h); GPL-2(address.h notification.h); GPL-2(debian/* ); GPL-2(debian/* .service) | +| {{}} | 1.8-cl4.3.2u1 | NO COPYRIGHT FILE | +| {{}} | 4.19.273-1+cl4.3.2u4 | GPL-2(* ); GPL-2(debian/* ); Unicode-data(fs/nls/mac-* ); Xen-interface(include/xen/interface/* ) | +| {{}} | 4.19.273-1+cl4.3.2u4 | GPL-2(* ); GPL-2(debian/* ); Unicode-data(fs/nls/mac-* ); Xen-interface(include/xen/interface/* ) | | {{}} | 1.0.3-1+b1 | APSL-2; BSD; BSD-2-clause; BSD-3-clause; Expat; GPL; GPL-2; GPL-2+; GPL-2+ with Autoconf exception; ISC; permissive | | {{}} | 1.0.4-0-cl4.3.0u2 | APSL-2; BSD; BSD-2-clause; BSD-3-clause; Expat; GPL; GPL-2; GPL-2+; GPL-2+ with Autoconf exception; ISC; permissive | | {{}} | 7.0-47 | GPL | @@ -1248,7 +1261,7 @@ pdfhidden: True | {{}} | 3.62 | ad-hoc(* ); Bellcore(mailcap.man) | | {{}} | 4.2-1.0.1.0.g75959ea | GPL-2(* ) | | {{}} | 4.2-1.0.1.0 | Proprietary(* ) | -| {{}} | 0.3.0+1538710437.fb6250f-1 | GPL-3+ with OpenSSL exception(* ) | +| {{}} | 0.6.0-2~deb10u1 | GPL-3+ with OpenSSL exception(* ) | | {{}} | 2.33.1-0.1 | GPL-2+(* ); GPL-2(schedutils/ionice.c); GPL-2(schedutils/chrt.c); GPL-2(disk-utils/raw.c); GPL-2(sys-utils/nsenter.c); GPL-2(disk-utils/mkfs.minix.c); public-domain(lib/at.c); BSD-4-clause(login-utils/vipw.c); MIT(text-utils/tailf.c); MIT(sys-utils/flock.c); BSD-2-clause(text-utils/pg.c); BSD-2-clause(login-utils/last-deprecated.c); BSD-2-clause(login-utils/login.c); BSD-3-clause(login-utils/logindefs.c); BSD-3-clause(libuuid/* ); LGPL-2+(lib/procutils.c); LGPL-2+(* /colors.* ); LGPL-2+(login-utils/setpwnam.h); LGPL-2.1+(libfdisk/* ); LGPL-2.1+(lib/cpuset.c); LGPL-2.1+(* /mbsalign.* ); GPL-3+(* /readutmp.* ); LGPL-2.1+(* /timeutils.* ); LGPL(include/list.h); LGPL-2.1+(libblkid/* ); LGPL(include/cpuset.h); LGPL(misc-utils/blkid.c); LGPL-2.1+(libmount/* ); LGPL-3+(libmount/python/* ); LGPL(libsmartcols/* ); GPL-2+(debian/* ); public-domain(debian/* ); GPL-2(debian/* ); GPL-2+(debian/* ); GPL-3+(debian/* ); BSD-2-clause(debian/* ); BSD-3-clause(debian/* ); BSD-4-clause(debian/* ); LGPL(debian/* ); LGPL-2+(debian/* ); LGPL-2.1+(debian/* ); LGPL-3+(debian/* ); MIT(debian/* ) | | {{}} | 4.8.0-1.4.g501cec1.42100 | GPL; GPL-2; GPL-2+; | | {{}} | 0.r37-cl4.3.1u4 | GPL; GPL-2; GPLv2. | @@ -1260,22 +1273,22 @@ pdfhidden: True | {{}} | 0.40-1.1+b1 | GPL; GPL-2; GPL-2+ | | {{}} | 3.2-3 | GPL-3+(* ); GFDL-NIV+ or GPL-3+(doc/* .1 doc/* .5 doc/* .texi); GPL-3+(debian/* ); GPL-3+(debian/* ); GFDL-NIV+(debian/* ) | | {{}} | 1.13-1+b1 | GPL; MIT | -| {{}} | 1.0-cl4.3.1u6 | Cumulus Networks Proprietary(* ); GPL-2(debian/* ); Cumulus Networks Proprietary(debian/* .8 | +| {{}} | 1.0-cl4.3.1u7 | Cumulus Networks Proprietary(* ); GPL-2(debian/* ); Cumulus Networks Proprietary(debian/* .8 | | {{}} | 6.1+20181013-2+deb10u2 | Dickey; MIT | -| {{}} | 6.1+20181013-2+deb10u2 | Dickey; MIT | +| {{}} | 6.1+20181013-2+deb10u4 | Dickey; MIT | | {{}} | 4.0-cl4.3.1u3 | Cumulus Networks Proprietary(* ); GPL-2(debian/* ) | | {{}} | 5.6 | GPL; GPL-2 | | {{}} | 3.6.1-1 | NGPL(* ); NGPL and BSD-3-clause(include/winlisp.h); NTP-Wisconsin-Madison(win/X11/dialogs.c); NTP(win/share/gifread.c); NGPL(debian/* ); BSD-3-clause(debian/* ); NGPL(debian/* ); NTP(debian/* ); NTP-Wisconsin-Madison(debian/* ) | | {{}} | 3.6.1-1 | NGPL(* ); NGPL and BSD-3-clause(include/winlisp.h); NTP-Wisconsin-Madison(win/X11/dialogs.c); NTP(win/share/gifread.c); NGPL(debian/* ); BSD-3-clause(debian/* ); NGPL(debian/* ); NTP(debian/* ); NTP-Wisconsin-Madison(debian/* ) | -| {{}} | 4.3.0-cl4u39~1659297587.34aa65d5 | NO COPYRIGHT FILE | -| {{}} | 4.3.0-cl4u39~1659297587.34aa65d5 | NO COPYRIGHT FILE | +| {{}} | 4.7.0-cl4u43~1690981360.9d32c7a0 | NO COPYRIGHT FILE | +| {{}} | 4.7.0-cl4u43~1690981360.9d32c7a0 | NO COPYRIGHT FILE | | {{}} | 3.4.1-1+deb10u1 | LGPL-2.1+(* ); LGPL-2.1+(aes-set-* ); LGPL-2.1+(arctwo* ); LGPL-2.1+(base64.h base64-meta.c); LGPL-2.1+(blowfish.c); LGPL-2.1+(blowfish.h); LGPL-2.1+(camellia-table.c camellia-crypt-internal.c); LGPL-2.1+(der2dsa.c); LGPL-2+(desCode.h descode.README desdata.c desinfo.c); LGPL-2.1+(des.c des.h); LGPL-2.1+(gcm.c gcm.h); LGPL-2.1+(md2.c); LGPL-2.1+(md4.c); LGPL-2.1+(md5.c md5-compress.c); LGPL-2.1+(memxor.c); LGPL-2.1+(ripemd160.c ripemd160-compress.c); LGPL-2.1+(ripemd160-meta.c ripemd160.h); LGPL-2.1+(serpent-encrypt.c serpent-decrypt.c serpent-set-key.c); LGPL-2.1+(sha* ); LGPL-2.1+(twofish* ); LGPL-2.1+(dsa2sexp.c); other(testsuite/des-compat-test.c); LGPL-2.1+(tools/pkcs1-conv.c); LGPL-2.1+(x86* /aes-* -internal.asm); GPL-2+(tools/getopt* ); GPL-2+ with Autoconf exception(config.guess config.sub); public-domain(debian/* ); GPL-2(debian/sexp-conv.1); GAP(debian/pkcs1-conv.1 debian/nettle-lfib-stream.1); LGPL-2.1+(debian/pkcs1-conv.1 debian/nettle-lfib-stream.1); GPL-2+(debian/pkcs1-conv.1 debian/nettle-lfib-stream.1) | | {{}} | 1.60-cl4.3.1u4 | GPL-2+(* ); GPL-2+(debian/* ); GPL-2+(debian/iptunnel.8); GPL-2+(debian/iptunnel.8) | | {{}} | 1.60-cl4.3.1u4 | NO COPYRIGHT FILE | | {{}} | 3.0.1-cl4u1 | Apache-2(* ) | -| {{}} | 1.14.2-2+deb10u4 | BSD-2-clause(* ); BSD-2-clause(src/core/ngx_murmurhash.c); BSD-2-clause(src/http/modules/ngx_http_scgi_module.c); BSD-2-clause(contrib/geo2nginx.pl); BSD-2-clause(debian/* ); BSD-2-clause(debian/modules/http-headers-more-filter/* ); BSD-3-clause(debian/modules/http-ndk/* ); BSD-4-clause(debian/modules/http-ndk/src/hash/md5.h); BSD-2-clause(debian/modules/http-auth-pam/* ); BSD-2-clause(debian/modules/http-echo/* ); BSD-2-clause(debian/modules/http-lua/* ); BSD-2-clause(debian/modules/http-upstream-fair/* ); MIT(debian/modules/nchan/* ); MIT(debian/modules/nchan/src/store/redis/cmp.* ); BSD-2-clause(debian/modules/http-uploadprogress/* ); BSD-2-clause(debian/modules/http-cache-purge/* ); BSD-2-clause(debian/modules/http-dav-ext/* ); BSD-2-clause(debian/modules/http-fancyindex/* ); BSD-2-clause(debian/modules/http-subs-filter/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-3-clause(debian/modules/rtmp/* ); BSD-4-clause(debian/modules/rtmp/* ); MIT(debian/modules/rtmp/* ) | -| {{}} | 1.14.2-2+deb10u4 | BSD-2-clause(* ); BSD-2-clause(src/core/ngx_murmurhash.c); BSD-2-clause(src/http/modules/ngx_http_scgi_module.c); BSD-2-clause(contrib/geo2nginx.pl); BSD-2-clause(debian/* ); BSD-2-clause(debian/modules/http-headers-more-filter/* ); BSD-3-clause(debian/modules/http-ndk/* ); BSD-4-clause(debian/modules/http-ndk/src/hash/md5.h); BSD-2-clause(debian/modules/http-auth-pam/* ); BSD-2-clause(debian/modules/http-echo/* ); BSD-2-clause(debian/modules/http-lua/* ); BSD-2-clause(debian/modules/http-upstream-fair/* ); MIT(debian/modules/nchan/* ); MIT(debian/modules/nchan/src/store/redis/cmp.* ); BSD-2-clause(debian/modules/http-uploadprogress/* ); BSD-2-clause(debian/modules/http-cache-purge/* ); BSD-2-clause(debian/modules/http-dav-ext/* ); BSD-2-clause(debian/modules/http-fancyindex/* ); BSD-2-clause(debian/modules/http-subs-filter/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-3-clause(debian/modules/rtmp/* ); BSD-4-clause(debian/modules/rtmp/* ); MIT(debian/modules/rtmp/* ) | -| {{}} | 1.14.2-2+deb10u4 | BSD-2-clause(* ); BSD-2-clause(src/core/ngx_murmurhash.c); BSD-2-clause(src/http/modules/ngx_http_scgi_module.c); BSD-2-clause(contrib/geo2nginx.pl); BSD-2-clause(debian/* ); BSD-2-clause(debian/modules/http-headers-more-filter/* ); BSD-3-clause(debian/modules/http-ndk/* ); BSD-4-clause(debian/modules/http-ndk/src/hash/md5.h); BSD-2-clause(debian/modules/http-auth-pam/* ); BSD-2-clause(debian/modules/http-echo/* ); BSD-2-clause(debian/modules/http-lua/* ); BSD-2-clause(debian/modules/http-upstream-fair/* ); MIT(debian/modules/nchan/* ); MIT(debian/modules/nchan/src/store/redis/cmp.* ); BSD-2-clause(debian/modules/http-uploadprogress/* ); BSD-2-clause(debian/modules/http-cache-purge/* ); BSD-2-clause(debian/modules/http-dav-ext/* ); BSD-2-clause(debian/modules/http-fancyindex/* ); BSD-2-clause(debian/modules/http-subs-filter/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-3-clause(debian/modules/rtmp/* ); BSD-4-clause(debian/modules/rtmp/* ); MIT(debian/modules/rtmp/* ) | +| {{}} | 1.14.2-2+deb10u5 | BSD-2-clause(* ); BSD-2-clause(src/core/ngx_murmurhash.c); BSD-2-clause(src/http/modules/ngx_http_scgi_module.c); BSD-2-clause(contrib/geo2nginx.pl); BSD-2-clause(debian/* ); BSD-2-clause(debian/modules/http-headers-more-filter/* ); BSD-3-clause(debian/modules/http-ndk/* ); BSD-4-clause(debian/modules/http-ndk/src/hash/md5.h); BSD-2-clause(debian/modules/http-auth-pam/* ); BSD-2-clause(debian/modules/http-echo/* ); BSD-2-clause(debian/modules/http-lua/* ); BSD-2-clause(debian/modules/http-upstream-fair/* ); MIT(debian/modules/nchan/* ); MIT(debian/modules/nchan/src/store/redis/cmp.* ); BSD-2-clause(debian/modules/http-uploadprogress/* ); BSD-2-clause(debian/modules/http-cache-purge/* ); BSD-2-clause(debian/modules/http-dav-ext/* ); BSD-2-clause(debian/modules/http-fancyindex/* ); BSD-2-clause(debian/modules/http-subs-filter/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-3-clause(debian/modules/rtmp/* ); BSD-4-clause(debian/modules/rtmp/* ); MIT(debian/modules/rtmp/* ) | +| {{}} | 1.14.2-2+deb10u5 | BSD-2-clause(* ); BSD-2-clause(src/core/ngx_murmurhash.c); BSD-2-clause(src/http/modules/ngx_http_scgi_module.c); BSD-2-clause(contrib/geo2nginx.pl); BSD-2-clause(debian/* ); BSD-2-clause(debian/modules/http-headers-more-filter/* ); BSD-3-clause(debian/modules/http-ndk/* ); BSD-4-clause(debian/modules/http-ndk/src/hash/md5.h); BSD-2-clause(debian/modules/http-auth-pam/* ); BSD-2-clause(debian/modules/http-echo/* ); BSD-2-clause(debian/modules/http-lua/* ); BSD-2-clause(debian/modules/http-upstream-fair/* ); MIT(debian/modules/nchan/* ); MIT(debian/modules/nchan/src/store/redis/cmp.* ); BSD-2-clause(debian/modules/http-uploadprogress/* ); BSD-2-clause(debian/modules/http-cache-purge/* ); BSD-2-clause(debian/modules/http-dav-ext/* ); BSD-2-clause(debian/modules/http-fancyindex/* ); BSD-2-clause(debian/modules/http-subs-filter/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-3-clause(debian/modules/rtmp/* ); BSD-4-clause(debian/modules/rtmp/* ); MIT(debian/modules/rtmp/* ) | +| {{}} | 1.14.2-2+deb10u5 | BSD-2-clause(* ); BSD-2-clause(src/core/ngx_murmurhash.c); BSD-2-clause(src/http/modules/ngx_http_scgi_module.c); BSD-2-clause(contrib/geo2nginx.pl); BSD-2-clause(debian/* ); BSD-2-clause(debian/modules/http-headers-more-filter/* ); BSD-3-clause(debian/modules/http-ndk/* ); BSD-4-clause(debian/modules/http-ndk/src/hash/md5.h); BSD-2-clause(debian/modules/http-auth-pam/* ); BSD-2-clause(debian/modules/http-echo/* ); BSD-2-clause(debian/modules/http-lua/* ); BSD-2-clause(debian/modules/http-upstream-fair/* ); MIT(debian/modules/nchan/* ); MIT(debian/modules/nchan/src/store/redis/cmp.* ); BSD-2-clause(debian/modules/http-uploadprogress/* ); BSD-2-clause(debian/modules/http-cache-purge/* ); BSD-2-clause(debian/modules/http-dav-ext/* ); BSD-2-clause(debian/modules/http-fancyindex/* ); BSD-2-clause(debian/modules/http-subs-filter/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-2-clause(debian/modules/rtmp/* ); BSD-3-clause(debian/modules/rtmp/* ); BSD-4-clause(debian/modules/rtmp/* ); MIT(debian/modules/rtmp/* ) | | {{}} | 0.1.1-3+b3 | GPL | | {{}} | 7.70+dfsg1-6+deb10u2 | nmap-GPL-2(* ); nmap-GPL-2(debian/* ); nmap-GPL-2(aclocal.m4 configure depcomp ltmain.sh nbase/configure ncat/Makefile.in); BSD-3-clause-author1(docs/nmap.xsl docs/nmap-fo.xsl); retain-copyright-cisco(docs/nmap.dtd); unlimited-retain-copyright(docs/style/* ); BSD-3-clause-authors-copyright-holders(libdnet-stripped/* ); BSD-3-clause-authors-copyright-holders(libdnet-stripped/Makefile.in libdnet-stripped/aclocal.m4); BSD-4-clause(libdnet-stripped/include/err.h libdnet-stripped/include/queue.h); BSD-3-clause-author2(libdnet-stripped/src/strlcat.c); Expat(lpeg.c nselib/re.lua); Expat(nbase/getopt.c); ISC(nbase/inet_ntop.c); nmap-GPL-2(nbase/nbase_rnd.c); BSD-3-clause-institute(nbase/snprintf.c); BSD-like-SVN(nmap-update/svn_auth.c); Expat(nse_fs.cc); Expat(nselib/base32.lua nselib/base64.lua); Expat(nselib/slaxml.lua); preserve-copyright(nsock/src/acinclude.m4); GPL-2+(shtool); BSD-3-clause-copyright-holders-contributors(libssh2/* ); BSD-3-clause-copyright-holders-contributors(libssh2/Makefile.in libssh2/aclocal.m4 libssh2/configure libssh2/m4/* ); BSD-3-clause-copyright-holders-contributors(libssh2/m4/autobuild.m4); BSD-3-clause-copyright-holders-contributors(libssh2/nw/* ); BSD-3-clause-copyright-holders-contributors(libssh2/os400/* libssh2/src/os400qc3.c libssh2/src/os400qc3.h); BSD-3-clause-copyright-holders-contributors(libssh2/src/libssh2_config_cmake.h.in); BSD-3-clause-copyright-holders-contributors(libssh2/src/wincng.c); nmap-GPL-2(libssh2/src/wincng.c); BSD-3-clause-author1(libssh2/src/wincng.c); BSD-3-clause-author2(libssh2/src/wincng.c); BSD-3-clause-authors-copyright-holders(libssh2/src/wincng.c); BSD-3-clause-institute(libssh2/src/wincng.c); BSD-3-clause-copyright-holders-contributors(libssh2/src/wincng.c); BSD-4-clause(libssh2/src/wincng.c); retain-copyright-cisco(libssh2/src/wincng.c); unlimited-retain-copyright(libssh2/src/wincng.c); Expat(libssh2/src/wincng.c); preserve-copyright(libssh2/src/wincng.c); GPL-2+(libssh2/src/wincng.c); BSD-like-SVN(libssh2/src/wincng.c); ISC(libssh2/src/wincng.c) | | {{}} | 7.70+dfsg1-6+deb10u2 | nmap-GPL-2(* ); nmap-GPL-2(debian/* ); nmap-GPL-2(aclocal.m4 configure depcomp ltmain.sh nbase/configure ncat/Makefile.in); BSD-3-clause-author1(docs/nmap.xsl docs/nmap-fo.xsl); retain-copyright-cisco(docs/nmap.dtd); unlimited-retain-copyright(docs/style/* ); BSD-3-clause-authors-copyright-holders(libdnet-stripped/* ); BSD-3-clause-authors-copyright-holders(libdnet-stripped/Makefile.in libdnet-stripped/aclocal.m4); BSD-4-clause(libdnet-stripped/include/err.h libdnet-stripped/include/queue.h); BSD-3-clause-author2(libdnet-stripped/src/strlcat.c); Expat(lpeg.c nselib/re.lua); Expat(nbase/getopt.c); ISC(nbase/inet_ntop.c); nmap-GPL-2(nbase/nbase_rnd.c); BSD-3-clause-institute(nbase/snprintf.c); BSD-like-SVN(nmap-update/svn_auth.c); Expat(nse_fs.cc); Expat(nselib/base32.lua nselib/base64.lua); Expat(nselib/slaxml.lua); preserve-copyright(nsock/src/acinclude.m4); GPL-2+(shtool); BSD-3-clause-copyright-holders-contributors(libssh2/* ); BSD-3-clause-copyright-holders-contributors(libssh2/Makefile.in libssh2/aclocal.m4 libssh2/configure libssh2/m4/* ); BSD-3-clause-copyright-holders-contributors(libssh2/m4/autobuild.m4); BSD-3-clause-copyright-holders-contributors(libssh2/nw/* ); BSD-3-clause-copyright-holders-contributors(libssh2/os400/* libssh2/src/os400qc3.c libssh2/src/os400qc3.h); BSD-3-clause-copyright-holders-contributors(libssh2/src/libssh2_config_cmake.h.in); BSD-3-clause-copyright-holders-contributors(libssh2/src/wincng.c); nmap-GPL-2(libssh2/src/wincng.c); BSD-3-clause-author1(libssh2/src/wincng.c); BSD-3-clause-author2(libssh2/src/wincng.c); BSD-3-clause-authors-copyright-holders(libssh2/src/wincng.c); BSD-3-clause-institute(libssh2/src/wincng.c); BSD-3-clause-copyright-holders-contributors(libssh2/src/wincng.c); BSD-4-clause(libssh2/src/wincng.c); retain-copyright-cisco(libssh2/src/wincng.c); unlimited-retain-copyright(libssh2/src/wincng.c); Expat(libssh2/src/wincng.c); preserve-copyright(libssh2/src/wincng.c); GPL-2+(libssh2/src/wincng.c); BSD-like-SVN(libssh2/src/wincng.c); ISC(libssh2/src/wincng.c) | @@ -1294,22 +1307,23 @@ pdfhidden: True | {{}} | 0.19.0-1+deb10u1 | LGPL-2.1+(* ); LGPL-2.1+(src/libopensc/authentic.h); LGPL-2.1+(src/libopensc/card-gpk.c); LGPL-2.1+(src/libopensc/card-dnie.c); LGPL-2.1+(src/pkcs11/framework-pkcs15.c); LGPL-2.1+(src/scconf/* ); LGPL-2.1+(src/libopensc/card-entersafe.c); LGPL-2.1+(src/libopensc/card-muscle.c); LGPL-2.1+(src/tests/lottery.c); LGPL-2.1+(src/libopensc/card-westcos.c); LGPL-2.1+(src/libopensc/card-sc-hsm.h); LGPL-2.1+(src/libopensc/ef-atr.c); LGPL-2.1+(src/pkcs11/pkcs11-display.c); public-domain(src/common/compat_getopt_main.c); Expat(src/common/compat_getopt.c); ISC(src/common/simclist.c); LGPL-2.1+(src/libopensc/card-rtecp.c); LGPL-2.1+(src/libopensc/log.c); LGPL-2.1+(src/libopensc/card-asepcos.c); LGPL-2.1+(src/libopensc/card-myeid.c); LGPL-2.1+(src/libopensc/card-rutoken.c); LGPL-2.1+(src/libopensc/card-atrust-acos.c); LGPL-2.1+(src/libopensc/pkcs15-skey.c); LGPL-2.1+(src/common/libpkcs11.h); LGPL-2.1+(src/libopensc/apdu.c); LGPL-2.1+(src/libopensc/sm.c); LGPL-2.1+(src/libopensc/card-epass2003.c); BSD-3-clause(src/common/compat_strlcat.c); GPL-2+(src/scconf/test-conf.c); ISC(src/common/compat_strlcpy.c); LGPL-2+(src/libopensc/ctbcs.h); LGPL-2.1+(src/libopensc/pkcs15-piv.c); LGPL-2.1+(src/libopensc/pace.h); LGPL-2.1+(src/libopensc/pkcs15-dnie.c); LGPL-2.1+(src/libopensc/pkcs15-actalis.c); LGPL-2.1+(src/libopensc/pkcs15-oberthur.c); LGPL-2.1+(src/libopensc/card-itacns.c); LGPL-2.1+(src/tools/cardos-tool.c); LGPL-2.1+(src/tools/pkcs15-tool.c); LGPL-2.1+(src/libopensc/card-cardos.c); LGPL-2.1+(src/libopensc/card-incrypto34.c); LGPL-2.1+(src/libopensc/card-sc-hsm.c); LGPL-2.1+(src/libopensc/pkcs15-esteid.c); LGPL-2.1+(src/libopensc/pkcs15-postecert.c); LGPL-2.1+(src/libopensc/pkcs15-infocamere.c); LGPL-2.1+(src/libopensc/cards.h); LGPL-2.1+(src/libopensc/card-setcos.c); LGPL-2.1+(src/libopensc/card-jcop.c); LGPL-2.1+(src/pkcs15init/pkcs15-jcop.c); LGPL-2.1+(src/libopensc/pkcs15-data.c); LGPL-2.1+(src/libopensc/pkcs15-gemsafeGPK.c); LGPL-2.1+(src/libopensc/card-piv.c); LGPL-2.1+(src/tools/piv-tool.c); LGPL-2.1+(src/libopensc/pkcs15-itacns.c); LGPL-2.1+(src/libopensc/card-acos5.c); LGPL-2.1+(src/libopensc/card-ias.c); LGPL-2.1+(src/libopensc/pkcs15-pteid.c); LGPL-2.1+(src/pkcs15init/pkcs15-oberthur-awp.c); LGPL-2.1+(src/libopensc/card-mcrd.c); LGPL-2.1+(src/libopensc/reader-pcsc.c); LGPL-2.1+(src/libopensc/padding.c); LGPL-2.1+(src/libopensc/pkcs15-sec.c); LGPL-2.1+(src/libopensc/card-tcos.c); LGPL-2.1+(src/tools/iasecc-tool.c); LGPL-2.1+(src/libopensc/card-oberthur.c); LGPL-2.1+(src/tools/sc-hsm-tool.c); LGPL-2.1+(src/libopensc/card-starcos.c); LGPL-2.1+(src/pkcs11/slot.c); LGPL-2.1+(src/pkcs15init/pkcs15-openpgp.c); LGPL-2.1+(src/libopensc/pkcs15-starcert.c); LGPL-2.1+(src/pkcs15init/pkcs15-cardos.c); LGPL-2.1+(src/pkcs15init/pkcs15-incrypto34.c); LGPL-2.1+(src/tools/util.c); LGPL-2.1+(src/libopensc/pkcs15-tcos.c); LGPL-2.1+(src/tools/openpgp-tool.c); LGPL-2.1+(src/libopensc/card-akis.c); LGPL-2.1+(src/libopensc/card-iasecc.c); LGPL-2.1+(src/pkcs15init/pkcs15-setcos.c); LGPL-2.1+(src/libopensc/card-belpic.c); LGPL-2.1+(src/common/compat_strlcpy.h); permissive(src/pkcs11/pkcs11.h); LGPL-2.1+(src/pkcs11/pkcs11.h); ISC(src/pkcs11/pkcs11.h) | | {{}} | 0.19.0-1+deb10u1 | LGPL-2.1+(* ); LGPL-2.1+(src/libopensc/authentic.h); LGPL-2.1+(src/libopensc/card-gpk.c); LGPL-2.1+(src/libopensc/card-dnie.c); LGPL-2.1+(src/pkcs11/framework-pkcs15.c); LGPL-2.1+(src/scconf/* ); LGPL-2.1+(src/libopensc/card-entersafe.c); LGPL-2.1+(src/libopensc/card-muscle.c); LGPL-2.1+(src/tests/lottery.c); LGPL-2.1+(src/libopensc/card-westcos.c); LGPL-2.1+(src/libopensc/card-sc-hsm.h); LGPL-2.1+(src/libopensc/ef-atr.c); LGPL-2.1+(src/pkcs11/pkcs11-display.c); public-domain(src/common/compat_getopt_main.c); Expat(src/common/compat_getopt.c); ISC(src/common/simclist.c); LGPL-2.1+(src/libopensc/card-rtecp.c); LGPL-2.1+(src/libopensc/log.c); LGPL-2.1+(src/libopensc/card-asepcos.c); LGPL-2.1+(src/libopensc/card-myeid.c); LGPL-2.1+(src/libopensc/card-rutoken.c); LGPL-2.1+(src/libopensc/card-atrust-acos.c); LGPL-2.1+(src/libopensc/pkcs15-skey.c); LGPL-2.1+(src/common/libpkcs11.h); LGPL-2.1+(src/libopensc/apdu.c); LGPL-2.1+(src/libopensc/sm.c); LGPL-2.1+(src/libopensc/card-epass2003.c); BSD-3-clause(src/common/compat_strlcat.c); GPL-2+(src/scconf/test-conf.c); ISC(src/common/compat_strlcpy.c); LGPL-2+(src/libopensc/ctbcs.h); LGPL-2.1+(src/libopensc/pkcs15-piv.c); LGPL-2.1+(src/libopensc/pace.h); LGPL-2.1+(src/libopensc/pkcs15-dnie.c); LGPL-2.1+(src/libopensc/pkcs15-actalis.c); LGPL-2.1+(src/libopensc/pkcs15-oberthur.c); LGPL-2.1+(src/libopensc/card-itacns.c); LGPL-2.1+(src/tools/cardos-tool.c); LGPL-2.1+(src/tools/pkcs15-tool.c); LGPL-2.1+(src/libopensc/card-cardos.c); LGPL-2.1+(src/libopensc/card-incrypto34.c); LGPL-2.1+(src/libopensc/card-sc-hsm.c); LGPL-2.1+(src/libopensc/pkcs15-esteid.c); LGPL-2.1+(src/libopensc/pkcs15-postecert.c); LGPL-2.1+(src/libopensc/pkcs15-infocamere.c); LGPL-2.1+(src/libopensc/cards.h); LGPL-2.1+(src/libopensc/card-setcos.c); LGPL-2.1+(src/libopensc/card-jcop.c); LGPL-2.1+(src/pkcs15init/pkcs15-jcop.c); LGPL-2.1+(src/libopensc/pkcs15-data.c); LGPL-2.1+(src/libopensc/pkcs15-gemsafeGPK.c); LGPL-2.1+(src/libopensc/card-piv.c); LGPL-2.1+(src/tools/piv-tool.c); LGPL-2.1+(src/libopensc/pkcs15-itacns.c); LGPL-2.1+(src/libopensc/card-acos5.c); LGPL-2.1+(src/libopensc/card-ias.c); LGPL-2.1+(src/libopensc/pkcs15-pteid.c); LGPL-2.1+(src/pkcs15init/pkcs15-oberthur-awp.c); LGPL-2.1+(src/libopensc/card-mcrd.c); LGPL-2.1+(src/libopensc/reader-pcsc.c); LGPL-2.1+(src/libopensc/padding.c); LGPL-2.1+(src/libopensc/pkcs15-sec.c); LGPL-2.1+(src/libopensc/card-tcos.c); LGPL-2.1+(src/tools/iasecc-tool.c); LGPL-2.1+(src/libopensc/card-oberthur.c); LGPL-2.1+(src/tools/sc-hsm-tool.c); LGPL-2.1+(src/libopensc/card-starcos.c); LGPL-2.1+(src/pkcs11/slot.c); LGPL-2.1+(src/pkcs15init/pkcs15-openpgp.c); LGPL-2.1+(src/libopensc/pkcs15-starcert.c); LGPL-2.1+(src/pkcs15init/pkcs15-cardos.c); LGPL-2.1+(src/pkcs15init/pkcs15-incrypto34.c); LGPL-2.1+(src/tools/util.c); LGPL-2.1+(src/libopensc/pkcs15-tcos.c); LGPL-2.1+(src/tools/openpgp-tool.c); LGPL-2.1+(src/libopensc/card-akis.c); LGPL-2.1+(src/libopensc/card-iasecc.c); LGPL-2.1+(src/pkcs15init/pkcs15-setcos.c); LGPL-2.1+(src/libopensc/card-belpic.c); LGPL-2.1+(src/common/compat_strlcpy.h); permissive(src/pkcs11/pkcs11.h); LGPL-2.1+(src/pkcs11/pkcs11.h); ISC(src/pkcs11/pkcs11.h) | | {{}} | 1.5.2-13+b1 | GPL | -| {{}} | 7.9p1-10+deb10u2 | OpenSSH(* ); Mazieres-BSD-style(ssh-keyscan.* ); public-domain(rijndael.* ); BSD-3-clause(loginrec.c openbsd-compat/* scp.c); Beer-ware(md5crypt.* ); Powell-BSD-style(openbsd-compat/bsd-snprintf.c); Expat-with-advertising-restriction(openbsd-compat/sigact.* ); BSD-2-clause(debian/* ) | -| {{}} | 7.9p1-10+deb10u2 | NO COPYRIGHT FILE | -| {{}} | 7.9p1-10+deb10u2 | NO COPYRIGHT FILE | -| {{}} | 1.1.1n-0+deb10u3 | BSD; OpenSSL; SSLeay | -| {{}} | 10.3.10-1+deb10u3 | LGPL-2.1(* ); GPL-2(* /Makefile* modules/* ); BSD-3(lib/include/bsd* lib/string/bsd* ); MIT(* )(lib/misc/base64.c); MIT(* * )(Files:); GPL-2+(debian/* ); BSD-3(debian/* ); GPL-2(debian/* ); GPL-2+(debian/* ); LGPL-2.1(debian/* ); MIT(* )(debian/* ); MIT(* * )(debian/* ) | -| {{}} | 2.8.90-1-cl4.3.1u4 | Apache | -| {{}} | 2.8.90-1-cl4.3.1u4 | Apache | -| {{}} | 2.8.90-1-cl4.3.1u4 | Apache | -| {{}} | 2.8.90-1-cl4.3.1u4 | Apache | -| {{}} | 2.8.90-1-cl4.3.1u4 | GPL2 | -| {{}} | 2.8.90-1-cl4.3.1u4 | Apache | -| {{}} | 2.8.90-1-cl4.3.1u4 | Apache | -| {{}} | 2.8.90-1-cl4.3.1u4 | Apache | -| {{}} | 2.8.90-1-cl4.3.1u4 | Apache | -| {{}} | 2.8.90-1-cl4.3.1u4 | Apache | -| {{}} | 2.8.90-1-cl4.3.1u4 | Apache | +| {{}} | 8.4p1-2~bpo10+1 | OpenSSH(* ); Mazieres-BSD-style(ssh-keyscan.* ); public-domain(rijndael.* ); BSD-3-clause(loginrec.c openbsd-compat/* scp.c); Beer-ware(md5crypt.* ); Powell-BSD-style(openbsd-compat/bsd-snprintf.c); Expat-with-advertising-restriction(openbsd-compat/sigact.* ); BSD-2-clause(debian/* ) | +| {{}} | 8.4p1-2~bpo10+1 | NO COPYRIGHT FILE | +| {{}} | 8.4p1-2~bpo10+1 | NO COPYRIGHT FILE | +| {{}} | 1.1.1n-0+deb10u6 | BSD; OpenSSL; SSLeay | +| {{}} | 1.1.1n-0+deb10u5 | NO COPYRIGHT FILE | +| {{}} | 10.3.10-1+deb10u5 | LGPL-2.1(* ); GPL-2(* /Makefile* modules/* ); BSD-3(lib/include/bsd* lib/string/bsd* ); MIT(* )(lib/misc/base64.c); MIT(* * )(Files:); GPL-2+(debian/* ); BSD-3(debian/* ); GPL-2(debian/* ); GPL-2+(debian/* ); LGPL-2.1(debian/* ); MIT(* )(debian/* ); MIT(* * )(debian/* ) | +| {{}} | 2.8.90-1-cl4.3.2u1 | Apache | +| {{}} | 2.8.90-1-cl4.3.2u1 | Apache | +| {{}} | 2.8.90-1-cl4.3.2u1 | Apache | +| {{}} | 2.8.90-1-cl4.3.2u1 | Apache | +| {{}} | 2.8.90-1-cl4.3.2u1 | GPL2 | +| {{}} | 2.8.90-1-cl4.3.2u1 | Apache | +| {{}} | 2.8.90-1-cl4.3.2u1 | Apache | +| {{}} | 2.8.90-1-cl4.3.2u1 | Apache | +| {{}} | 2.8.90-1-cl4.3.2u1 | Apache | +| {{}} | 2.8.90-1-cl4.3.2u1 | Apache | +| {{}} | 2.8.90-1-cl4.3.2u1 | Apache | | {{}} | 1.3.4+dfsg-4+b1 | MPL-2.0(* ); MPL-2.0(debian/* ); Expat(post-processor/compress/* ); Expat(post-processor/checksum/* ); Expat(builder/azure/* ); BSD-3-Clause(builder/azure/pkcs12/pkcs8_test.go); Expat(debian/vendor/github.com/mitchellh/mapstructure/* ); BSD-3-Clause(debian/vendor/github.com/mitchellh/mapstructure/* ); MPL-2.0(debian/vendor/github.com/mitchellh/mapstructure/* ); Expat(debian/vendor/github.com/mitchellh/mapstructure/* ) | | {{}} | 3.2-25 | GPL; GPL-3 | | {{}} | 4.5-1.1 | BSD; GPL; GPL-2 | @@ -1324,10 +1338,10 @@ pdfhidden: True | {{}} | 0.112-5 | GPL-2.0+(* ); GPL-2.0+(debian/* ); GPL-2.0+(debian/test-certs.tgz); GPL-2.0+(debian/test-certs.tgz) | | {{}} | 1.1.0-2 | GPL-2+(* ); GPL-2+(fltk/* ); GPL-2+(tqt/Makefile.am tqt/main.cpp tqt/pinentrydialog.h tqt/pinentrydialog.cpp); GPL-2(tqt/secqinternal.cpp tqt/secqinternal_p.h); GPL-2(tqt/secqlineedit.cpp tqt/secqlineedit.h tqt/secqstring.cpp tqt/secqstring.h); GPL-2+(build-aux/* depcomp doc/mdate-sh doc/texinfo.tex m4/curses.m4 m4/iconv.m4 missing secmem/secmem.c); X11(install-sh); GPL-2+(gtk+-2/pinentry-gtk-2.c); GPL-2+(m4/pkg.m4); GPL-2+(m4/qt.m4); LGPL-3+ or GPL-2+(pinentry/argparse.c); GPL-2+(configure.ac secmem/util.* ); GPL-2+(secmem/memory.h); GPL-2+(secmem/secmem++.h); GPL-2+(tty/pinentry-tty.c); GPL-2+(qt/pinentrydialog.* ); GPL-2+(qt/pinentryconfirm.* ); GPL-2+(qt/main.cpp); GPL-2+(qt/Makefile.am); GPL-2+(debian/* ); X11(debian/* ); GPL-2+(debian/* ); GPL-2(debian/* ); LGPL-3+(debian/* ) | | {{}} | 0.29-6 | GPL | -| {{}} | 4.19-cl4.3.1u1 | Cumulus Networks Proprietary(* ); GPL-2(debian/* ) | -| {{}} | 4.19-cl4.3.1u1 | Cumulus Networks Proprietary(* ); GPL-2(debian/* ) | -| {{}} | 4.19-cl4.3.1u1 | Cumulus Networks Proprietary(* ); GPL-2(debian/* ) | -| {{}} | 4.19-cl4.3.1u1 | Cumulus Networks Proprietary(* ); GPL-2(debian/* ) | +| {{}} | 4.19-cl4.3.2u1 | Cumulus Networks Proprietary(* ); GPL-2(debian/* ) | +| {{}} | 4.19-cl4.3.2u1 | Cumulus Networks Proprietary(* ); GPL-2(debian/* ) | +| {{}} | 4.19-cl4.3.2u1 | Cumulus Networks Proprietary(* ); GPL-2(debian/* ) | +| {{}} | 4.19-cl4.3.2u1 | Cumulus Networks Proprietary(* ); GPL-2(debian/* ) | | {{}} | 4.19-cl4.3.1u1 | Cumulus Networks Proprietary(* ); GPL-2(debian/* ) | | {{}} | 4.19-cl4.3.1u1 | Cumulus Networks Proprietary(* ); GPL-2(debian/* ) | | {{}} | 4.19-cl4.3.1u1 | Cumulus Networks Proprietary(* ); GPL-2(debian/* ) | @@ -1339,26 +1353,27 @@ pdfhidden: True | {{}} | 11.91-2 | GPL-3+(* ); GPL-3+(debian/* ); GFDL-NIV-1.3(doc/auctex.texi); permissive(doc/intro.texi); preserve-notice(doc/tex-ref.tex); MIT(install-sh); publicdomain(mkinstalldirs); tobeclarified(style/j-article.el); tobeclarified(style/amsbsy.el style/amstext.el); tobeclarified(style/amsart.el style/amsbook.el style/article.el style/book.el); tobeclarified(style/dk.el style/dutch.el style/plfonts.el style/plhb.el); GFDL-NIV-1.3(style/dk.el style/dutch.el style/plfonts.el style/plhb.el); GPL-3+(style/dk.el style/dutch.el style/plfonts.el style/plhb.el); MIT(style/dk.el style/dutch.el style/plfonts.el style/plhb.el); permissive(style/dk.el style/dutch.el style/plfonts.el style/plhb.el); preserve-notice(style/dk.el style/dutch.el style/plfonts.el style/plhb.el); publicdomain(style/dk.el style/dutch.el style/plfonts.el style/plhb.el); tobeclarified(style/dk.el style/dutch.el style/plfonts.el style/plhb.el) | | {{}} | 3.3.15-2 | LGPL-2.1+(* ); LGPL-2.0+(top/* ); GPL-2.0+(pgrep.* ); GPL-2.0+(pidof.* ); GPL-2.0+(free.* ); GPL-2.0+(sysctl.* ); GPL-2.0+(debian/* ); GPL-2.0+(debian/* ); LGPL-2.0+(debian/* ); LGPL-2.1+(debian/* ) | | {{}} | 1.3.1-1+b1 | BSD-2-Clause(* ); BSD-3-Clause(protoc-c/* ); permissive(debian/* ) | -| {{}} | 3.6.1.3-2 | BSD-3-Clause~Google(* ); BSD-3-Clause~Bloomberg(Files:); BSD-3-Clause~RedHat(Files:); GPLWithACException(m4/acx_pthread.m4); Apache-2.0(Files:); Public-Domain or Expat(conformance/third_party/jsoncpp/* ); GPL-3(debian/* ); Public-Domain(debian/* ); Expat(debian/* ); BSD-3-Clause~Google(debian/* ); BSD-3-Clause~Bloomberg(debian/* ); BSD-3-Clause~RedHat(debian/* ); Apache-2.0(debian/* ); GPL-3(debian/* ) | +| {{}} | 3.6.1.3-2+deb10u1 | BSD-3-Clause~Google(* ); BSD-3-Clause~Bloomberg(Files:); BSD-3-Clause~RedHat(Files:); GPLWithACException(m4/acx_pthread.m4); Apache-2.0(Files:); Public-Domain or Expat(conformance/third_party/jsoncpp/* ); GPL-3(debian/* ); Public-Domain(debian/* ); Expat(debian/* ); BSD-3-Clause~Google(debian/* ); BSD-3-Clause~Bloomberg(debian/* ); BSD-3-Clause~RedHat(debian/* ); Apache-2.0(debian/* ); GPL-3(debian/* ) | | {{}} | 1.16.1-1 | Apache-2.0(* ); GPL-2+(debian/* ); Zlib(third_party/nanopb/* ); Expat(third_party/rake-compiler-dock/* ); Apache-2.0(src/php/tests/bootstrap.php); BSD-3-clause(third_party/address_sorting/* ); Apache-2.0(third_party/address_sorting/* ) | | {{}} | 23.2-1+deb10u1 | GPL-2+(* ); GPL-2+(src/lists.h); GPL-2+(src/peekfd.c); GPL-2+(src/peekfd.c) | -| {{}} | 4.0-cl4.3.1u4 | EPL-1(* ); GPL-2(debian/* ) | +| {{}} | 4.0-cl4.3.2u2 | EPL-1(* ); GPL-2(debian/* ) | | {{}} | 2.3.1-debian1-4 | BSD | -| {{}} | 20211109.1735-0+deb10u1 | MPL-2.0(* ); MPL-2.0(debian/* ); CC0(tests/test_psl.txt); MPL-2.0(tests/test_psl.txt); CC0(tests/test_psl.txt) | +| {{}} | 20220811.1734-0+deb10u1 | MPL-2.0(* ); MPL-2.0(debian/* ); CC0(tests/test_psl.txt); MPL-2.0(tests/test_psl.txt); CC0(tests/test_psl.txt) | | {{}} | 1.6.6-1 | Artistic(* ); GPL-2+(debian/* ) | | {{}} | 4.999.99~beta5+gitfcfea93-5 | GPL-2(* ); GPL-2(debian/* ); GPL-2(debian/* ) | | {{}} | 2.7.16-1 | BEOPEN; CNRI; GPL; Python | | {{}} | 2.7.16-1 | BEOPEN; CNRI; GPL; Python | -| {{}} | 2.7.16-2+deb10u1 | Apache-2; BEOPEN; BSD; CNRI; GPL; GPL-2; ISC; OpenSSL; Python; SSLeay; zlib | -| {{}} | 2.7.16-2+deb10u1 | NO COPYRIGHT FILE | -| {{}} | 2.7.16-2+deb10u1 | Apache-2; BEOPEN; BSD; CNRI; GPL; GPL-2; ISC; OpenSSL; Python; SSLeay; zlib | +| {{}} | 2.7.16-2+deb10u3 | Apache-2; BEOPEN; BSD; CNRI; GPL; GPL-2; ISC; OpenSSL; Python; SSLeay; zlib | +| {{}} | 2.7.16-2+deb10u3 | NO COPYRIGHT FILE | +| {{}} | 2.7.16-2+deb10u3 | Apache-2; BEOPEN; BSD; CNRI; GPL; GPL-2; ISC; OpenSSL; Python; SSLeay; zlib | | {{}} | 2.7.16-1 | NO COPYRIGHT FILE | | {{}} | 2.7.16-1 | BEOPEN; CNRI; GPL; Python | | {{}} | 3.7.3-1 | BEOPEN; CNRI; GPL; Python | -| {{}} | 3.7.3-2+deb10u3 | BEOPEN; BSD; CNRI; GPL; GPL-2; OpenSSL; Python; SSLeay; zlib | -| {{}} | 3.7.3-2+deb10u3 | NO COPYRIGHT FILE | -| {{}} | 3.7.3-2+deb10u3 | NO COPYRIGHT FILE | -| {{}} | 3.7.3-2+deb10u3 | BEOPEN; BSD; CNRI; GPL; GPL-2; OpenSSL; Python; SSLeay; zlib | +| {{}} | 3.7.3-2+deb10u6 | BEOPEN; BSD; CNRI; GPL; GPL-2; OpenSSL; Python; SSLeay; zlib | +| {{}} | 3.7.3-2+deb10u6 | NO COPYRIGHT FILE | +| {{}} | 3.7.3-2+deb10u6 | NO COPYRIGHT FILE | +| {{}} | 3.7.3-2+deb10u6 | BEOPEN; BSD; CNRI; GPL; GPL-2; OpenSSL; Python; SSLeay; zlib | +| {{}} | 3.7.3-2+deb10u6 | BEOPEN; BSD; CNRI; GPL; GPL-2; OpenSSL; Python; SSLeay; zlib | | {{}} | 0.7.8-1 | BSD-3-clause( MANIFEST.in); permissive(debian/* ) | | {{}} | 3.7.3-1 | NO COPYRIGHT FILE | | {{}} | 3.7.3-1 | NO COPYRIGHT FILE | @@ -1373,7 +1388,7 @@ pdfhidden: True | {{}} | 1.12.2-1 | Expat(* ); Expat(c/libffi_msvc/* ); Expat(debian/* ); Expat(debian/* ) | | {{}} | 1.12.2-1 | Expat(* ); Expat(c/libffi_msvc/* ); Expat(debian/* ); Expat(debian/* ) | | {{}} | 3.0.4-3 | LGPL-2.1+(* ); LGPL-2.1+(chardet/cli/chardetect.py); LGPL-2.1+(debian/* ); LGPL-2.1+(debian/* ) | -| {{}} | 1.4.0-cl4.3.1u10 | Cumulus Networks Proprietary(* ); GPL-2(debian/* ); Cumulus Networks Proprietary(debian/* ); GPL-2(debian/* ) | +| {{}} | 1.4.0-cl4.3.2u11 | Cumulus Networks Proprietary(* ); GPL-2(debian/* ); Cumulus Networks Proprietary(debian/* ); GPL-2(debian/* ) | | {{}} | 7.0-1 | BSD-3-clause(* ); BSD-3-clause(click/parser.py); BSD-3-clause(debian/* ); BSD-3-clause(debian/* ) | | {{}} | 1.2.2-cl4.3u1 | NO COPYRIGHT FILE | | {{}} | 0.3.7-1 | BSD-3(* ); GPL-2+(debian/* ) | @@ -1412,15 +1427,17 @@ pdfhidden: True | {{}} | 0.2.7-cl4.3.1u4 | Apache-2.0(* ); Expat(debian/* ); Apache-2.0(debian/* ); Expat(debian/* ) | | {{}} | 19.0-1 | Apache-2.0(* ); BSD-3-clause(debian/* ); BSD-3-clause(debian/* ) | | {{}} | 4.2.0-5 | Apache-2(* ); BSD-2-clause(doc/source/semver.rst); BSD-3-clause(pbr/tests/testpackage/* ); Apache-2(debian/* ); Apache-2(debian/* ); BSD-2-clause(debian/* ); BSD-3-clause(debian/* ) | +| {{}} | 18.1-5 | Expat(* ); public-domain(pip/cacert.pem); Expat(debian/* ); Expat(debian/* ) | | {{}} | 40.8.0-1 | BEOPEN; CNRI; GPL | | {{}} | 0.8.0-1 | MIT/Expat(* ); Expat(debian/* ) | | {{}} | 3.11-3 | BSD-3-clause(* ); BSD-3-clause(debian/* ); BSD-3-clause(debian/* ) | -| {{}} | 3.6.1.3-2 | BSD-3-Clause~Google(* ); BSD-3-Clause~Bloomberg(Files:); BSD-3-Clause~RedHat(Files:); GPLWithACException(m4/acx_pthread.m4); Apache-2.0(Files:); Public-Domain or Expat(conformance/third_party/jsoncpp/* ); GPL-3(debian/* ); Public-Domain(debian/* ); Expat(debian/* ); BSD-3-Clause~Google(debian/* ); BSD-3-Clause~Bloomberg(debian/* ); BSD-3-Clause~RedHat(debian/* ); Apache-2.0(debian/* ); GPL-3(debian/* ) | +| {{}} | 3.6.1.3-2+deb10u1 | BSD-3-Clause~Google(* ); BSD-3-Clause~Bloomberg(Files:); BSD-3-Clause~RedHat(Files:); GPLWithACException(m4/acx_pthread.m4); Apache-2.0(Files:); Public-Domain or Expat(conformance/third_party/jsoncpp/* ); GPL-3(debian/* ); Public-Domain(debian/* ); Expat(debian/* ); BSD-3-Clause~Google(debian/* ); BSD-3-Clause~Bloomberg(debian/* ); BSD-3-Clause~RedHat(debian/* ); Apache-2.0(debian/* ); GPL-3(debian/* ) | | {{}} | 5.5.1-1 | BSD-3-clause(* ); BSD-3-clause(debian/* ); BSD-3-clause(debian/* ) | | {{}} | 5.5.1-1 | BSD-3-clause(* ); BSD-3-clause(debian/* ); BSD-3-clause(debian/* ) | | {{}} | 1.7.0-2 | Expat(* ); Expat(debian/* ); Expat(debian/* ) | | {{}} | 2.4.0-2 | Expat(* ); Expat(debian/* ); Expat(debian/* ) | | {{}} | 2.19-1 | bsd-3-bendersky(* ); bsd-3-dabeaz(pycparser/ply/* ); bsd-3-bendersky(debian/* ); bsd-3-bendersky(debian/* ); bsd-3-dabeaz(debian/* ) | +| {{}} | 7.43.0.2-0.1 | LGPL-2.1(* ); MIT(* ); MIT(tests/ext/test-lib.sh); MIT(debian/* ) | | {{}} | 4.7.5-cl4.3.1u4 | Expat(* ); Expat(debian/* ); Expat(debian/* ) | | {{}} | 2.0.0-1 | MIT(* ); MIT(debian/* ); MIT(debian/* ) | | {{}} | 2.3.1+dfsg-1+deb10u2 | Apache-2; BSD | @@ -1434,13 +1451,17 @@ pdfhidden: True | {{}} | 0.15.34-1+b1 | Expat(* ); Expat(debian/* ); Expat(debian/* ) | | {{}} | 0.2.0-3-cl4.3.1u6 | Expat(* ); Expat(debian/* ); Expat(debian/* ) | | {{}} | 0.2.0-3-cl4.3.1u6 | NO COPYRIGHT FILE | +| {{}} | 2.4.0-2 | GPL; GPL-2 | | {{}} | 40.8.0-1 | BEOPEN; CNRI; GPL | | {{}} | 1.12.14-1.1 | Expat(* ); Expat(debian/* ); Expat(debian/* ) | | {{}} | 3.16.0-1 | MIT(* ); MIT(debian/* ); MIT(debian/* ) | | {{}} | 1.12.0-1 | Expat(* ); Expat(debian/* ); Expat(debian/* ) | | {{}} | 1.8.4-1 | BSD-2-clause(* ); BSD-2-clause(debian/dh-sphinxdoc/dh_sphinxdoc); BSD-2-clause(sphinx/ext/apidoc.py); BSD-2-clause(sphinx/ext/napoleon/docstring.py); Expat(sphinx/themes/basic/static/jquery* .js); Expat(sphinx/themes/basic/static/underscore* .js); BSD-3-clause(sphinx/util/smartypants.py); public-domain(sphinx/util/stemmer/porter.py); BSD-2-clause(sphinx/util/stemmer/porter.py); BSD-3-clause(sphinx/util/stemmer/porter.py); Expat(sphinx/util/stemmer/porter.py) | +| {{}} | 234-2+b1 | LGPL-2.1+(* ); LGPL-2.1+(debian/* ); LGPL-2.1+(debian/* ) | | {{}} | 0.8.2-1 | Expat(* ); Expat(debian/* ); Expat(debian/* ) | | {{}} | 3.1.0-2 | MIT(* ); MIT(debian/* ); MIT(debian/* ) | +| {{}} | 1.6.0-1 | Expat(* ); LGPL-2.1+(debian/* ); Expat(debian/* ); LGPL-2.1+(debian/* ) | +| {{}} | 3.7.4.1-1~bpo10+1 | PSF(* ); PSF(debian/* ); PSF(debian/* ) | | {{}} | 2019.1-1 | Expat(* ) | | {{}} | 1.24.1-1 | Expat(* ); Expat(src/urllib3/contrib/_securetransport/* ); PSF-2(src/urllib3/packages/backports/makefile.py); Expat(src/urllib3/packages/six.py); PSF-2(src/urllib3/packages/ssl_match_hostname/__init__.py); Expat(debian/* ); Expat(debian/* ); PSF-2(debian/* ) | | {{}} | 15.1.0+ds-2+deb10u1 | Expat(* ); Expat(debian/* ); Expat(debian/* ) | @@ -1468,8 +1489,7 @@ pdfhidden: True | {{}} | 15.1.0-1 | MIT(* ); CC0(versioneer.py); MIT(debian/* ); MIT(debian/* ); CC0(debian/* ) | | {{}} | 4.5.2+dfsg.1-1 | Apache-2(* ); GPL-2(coverage/htmlfiles/jquery.hotkeys.js); Expat(coverage/htmlfiles/jquery.isonscreen.js); GPL-3+(debian/* ); Apache-2(debian/* ); Expat(debian/* ); GPL-2(debian/* ); GPL-3+(debian/* ) | | {{}} | 2.6.1-9+b1 | public-domain(* ); BSD-3-clause(debian/* ) | -| {{}} | 2.6.1-3+deb10u2 | Apache(* ); Expat(debian/* ); Apache(debian/* ); Expat(debian/* ) | -| {{}} | 0.1-cl4.3.1u2 | Cumulus Networks Proprietary(* ); GPL-2(debian/* ); Cumulus Networks Proprietary(debian/* .{service | +| {{}} | 2.6.1-3+deb10u4 | Apache(* ); Expat(debian/* ); Apache(debian/* ); Expat(debian/* ) | | {{}} | 2.2.3-1 | Apache-2(* ); GPL-3+(setup.py); GPL-3+(debian/* ); Apache-2(debian/* ); GPL-3+(debian/* ) | | {{}} | 1.20.0-2 | Apache-2(* ); Apache-2(debian/* ); Apache-2(debian/* ) | | {{}} | 2.7.16-1 | NO COPYRIGHT FILE | @@ -1502,9 +1522,9 @@ pdfhidden: True | {{}} | 5.8.0-cl4.3.0u1 | NO COPYRIGHT FILE | | {{}} | 5.8.0-cl4.3.0u1 | NO COPYRIGHT FILE | | {{}} | 0.1.11-cl4.3.1u1 | GPL-2+(* ) | -| {{}} | 4.2-cl4.3.1u2 | GPL; GPL-2 | +| {{}} | 4.2-cl4.3.2u1 | GPL; GPL-2 | | {{}} | 19.0.0-1 | Apache-2.0(* ); Apache-2.0(debian/* ); Apache-2.0(debian/* ); Apache-2.0(examples/simple/* .py examples/certgen.py src/OpenSSL/version.py); public-domain(examples/SecureXMLRPCServer.py); Apache-2.0(examples/proxy.py); Apache-2.0(tests/test_rand.py); Apache-2.0(tests/util.py); Apache-2.0(src/OpenSSL/__init__.py); Apache-2.0(tests/conftest.py) | -| {{}} | 2.8.90-1-cl4.3.1u4 | Apache | +| {{}} | 2.8.90-1-cl4.3.2u1 | Apache | | {{}} | 6.4.1-1 | Apache-2.0(* ); Apache-2.0(debian/* ); Apache-2.0(debian/* ) | | {{}} | 3.21.0-2 | Apache-2(* ); Apache-2(debian/* ); Apache-2(debian/* ) | | {{}} | 19.0-1 | Apache-2.0(* ); BSD-3-clause(debian/* ); BSD-3-clause(debian/* ) | @@ -1514,7 +1534,7 @@ pdfhidden: True | {{}} | 18.1-5 | Expat(* ); public-domain(pip/cacert.pem); Expat(debian/* ); Expat(debian/* ) | | {{}} | 40.8.0-1 | BEOPEN; CNRI; GPL | | {{}} | 0.8.0-1 | MIT/Expat(* ); Expat(debian/* ) | -| {{}} | 3.6.1.3-2 | BSD-3-Clause~Google(* ); BSD-3-Clause~Bloomberg(Files:); BSD-3-Clause~RedHat(Files:); GPLWithACException(m4/acx_pthread.m4); Apache-2.0(Files:); Public-Domain or Expat(conformance/third_party/jsoncpp/* ); GPL-3(debian/* ); Public-Domain(debian/* ); Expat(debian/* ); BSD-3-Clause~Google(debian/* ); BSD-3-Clause~Bloomberg(debian/* ); BSD-3-Clause~RedHat(debian/* ); Apache-2.0(debian/* ); GPL-3(debian/* ) | +| {{}} | 3.6.1.3-2+deb10u1 | BSD-3-Clause~Google(* ); BSD-3-Clause~Bloomberg(Files:); BSD-3-Clause~RedHat(Files:); GPLWithACException(m4/acx_pthread.m4); Apache-2.0(Files:); Public-Domain or Expat(conformance/third_party/jsoncpp/* ); GPL-3(debian/* ); Public-Domain(debian/* ); Expat(debian/* ); BSD-3-Clause~Google(debian/* ); BSD-3-Clause~Bloomberg(debian/* ); BSD-3-Clause~RedHat(debian/* ); Apache-2.0(debian/* ); GPL-3(debian/* ) | | {{}} | 1.7.0-2 | Expat(* ); Expat(debian/* ); Expat(debian/* ) | | {{}} | 0.4.2-3 | BSD-2-clause(* ); GPL-2+(debian/* ); BSD-2-clause(debian/* ) | | {{}} | 0.2.1-0.2 | BSD; BSD-2-Clause; BSD-3-Clause | @@ -1537,9 +1557,9 @@ pdfhidden: True | {{}} | 1.29.0-2 | Apache-2.0(* ); Apache-2.0(debian/* ); Apache-2.0(debian/* ) | | {{}} | 0.8.2-1 | Expat(* ); Expat(debian/* ); Expat(debian/* ) | | {{}} | 1.1.0-2 | MIT(debian/* ); MIT(* ); MIT(* ) | -| {{}} | 18.9.0-3 | BSD | -| {{}} | 18.9.0-3 | BSD | -| {{}} | 18.9.0-3 | BSD | +| {{}} | 18.9.0-3+deb10u1 | BSD | +| {{}} | 18.9.0-3+deb10u1 | BSD | +| {{}} | 18.9.0-3+deb10u1 | BSD | | {{}} | 3.6.6-1 | PSF(* ); GPL-2(debian/* ); PSF(debian/* ) | | {{}} | 2019.1-1 | Expat(* ) | | {{}} | 1.24.1-1 | Expat(* ); Expat(src/urllib3/contrib/_securetransport/* ); PSF-2(src/urllib3/packages/backports/makefile.py); Expat(src/urllib3/packages/six.py); PSF-2(src/urllib3/packages/ssl_match_hostname/__init__.py); Expat(debian/* ); Expat(debian/* ); PSF-2(debian/* ) | @@ -1548,14 +1568,14 @@ pdfhidden: True | {{}} | 3.13-2 | BSD | | {{}} | 17.1.2-2+deb10u1 | BSD-3-clause(* ); BSD-3-clause(examples/mongodb/* ); LGPL-3+link(examples/chat/* ); LGPL-3+link(zmq/backend/cython/* ); LGPL-3+link(zmq/devices/monitoredqueue.pxd); LGPL-3+link(perf/* ); LGPL-2.1(zmq/ssh/forward.py); Apache-2.0(zmq/eventloop/zmqstream.py zmq/eventloop/minitornado/* ); LGPL-3+link(debian/* ); BSD-3-clause(debian/* ); LGPL-3+link(debian/* ); LGPL-2.1(debian/* ); Apache-2.0(debian/* ) | | {{}} | 4.3.2-1+b2 | Zope-2.1(* ) | -| {{}} | 4.8.7+dfsg-18+deb10u1 | BSD; GPL; GPL-2; GPL-3; LGPL-2 | -| {{}} | 3.1+dfsg-8+deb10u8 | BSD; GPL; GPL-2; LGPL-2; MIT | -| {{}} | 3.1+dfsg-8+deb10u8 | BSD; GPL; GPL-2; LGPL-2; MIT | -| {{}} | 3.1+dfsg-8+deb10u8 | BSD; GPL; GPL-2; LGPL-2; MIT | -| {{}} | 3.1+dfsg-8+deb10u8 | BSD; GPL; GPL-2; LGPL-2; MIT | -| {{}} | 3.1+dfsg-8+deb10u8 | BSD; GPL; GPL-2; LGPL-2; MIT | -| {{}} | 3.1+dfsg-8+deb10u8 | BSD; GPL; GPL-2; LGPL-2; MIT | -| {{}} | 3.1+dfsg-8+deb10u8 | BSD; GPL; GPL-2; LGPL-2; MIT | +| {{}} | 4.8.7+dfsg-18+deb10u2 | BSD; GPL; GPL-2; GPL-3; LGPL-2 | +| {{}} | 3.1+dfsg-8+deb10u11 | BSD; GPL; GPL-2; LGPL-2; MIT | +| {{}} | 3.1+dfsg-8+deb10u11 | BSD; GPL; GPL-2; LGPL-2; MIT | +| {{}} | 3.1+dfsg-8+deb10u11 | BSD; GPL; GPL-2; LGPL-2; MIT | +| {{}} | 3.1+dfsg-8+deb10u11 | BSD; GPL; GPL-2; LGPL-2; MIT | +| {{}} | 3.1+dfsg-8+deb10u11 | BSD; GPL; GPL-2; LGPL-2; MIT | +| {{}} | 3.1+dfsg-8+deb10u11 | BSD; GPL; GPL-2; LGPL-2; MIT | +| {{}} | 3.1+dfsg-8+deb10u11 | BSD; GPL; GPL-2; LGPL-2; MIT | | {{}} | 66-2 | LGPL-2.1 with Digia-1.1 exception or GPL-3(* ); BSD-3-clause(scripts/* ); LGPL-2.1(debian/* ); LGPL-2.1 with Digia-1.1 exception(debian/* ); GPL-3(debian/* ); LGPL-2.1(debian/* ); BSD-3-clause(debian/* ) | | {{}} | 4.8.7+dfsg-18+deb10u1 | BSD; GPL; GPL-2; GPL-3; LGPL-2 | | {{}} | 0.65-3 | GPL; GPL-2 | @@ -1570,7 +1590,7 @@ pdfhidden: True | {{}} | 3.1.3-6 | GPL; GPL-3 | | {{}} | 8.1901.0-1+deb10u2 | GPL-3.0+ and Apache-2.0(* ); LGPL-3.0+ and Apache-2.0(runtime/* ); BSD-3-clause(runtime/hashtable* ); GPL-3.0+(plugins/imklog/ksym* ); GPL-3.0+(debian/* ); Apache-2.0(debian/* ); LGPL-3.0+(debian/* ); GPL-3.0+(debian/* ); BSD-3-clause(debian/* ) | | {{}} | 2.5.1 | RubyLicense(* ) | -| {{}} | 2.5.5-3+deb10u4 | BSD-2-clause or Ruby(* ); BSD-2-clause(Files:); Expat(Files:); BSD-2-clause(enc/* .c); BSD-2-clause(enc/ascii.c enc/euc_jp.c enc/shift_jis.c enc/windows_31j.c); BSD-2-clause(enc/gb18030.c); BSD-2-clause(enc/encdb.c); BSD-2-clause(enc/windows_1250.c enc/windows_1252.c); BSD-2-clause(enc/windows_1251.c); GPL-3+(misc/ruby-mode.el); BSD-2-clause(lib/rdoc/generator/darkfish.rb lib/rdoc/generator/template/darkfish/* ); SIL-1.1(lib/rdoc/generator/template/darkfish/fonts/SourceCodePro* ); SIL-1.1(lib/rdoc/generator/template/darkfish/fonts/Lato* ); CC-BY-3.0-famfamfam(lib/rdoc/generator/template/darkfish/images/* ); Expat(lib/rdoc/generator/json_index.rb lib/rdoc/generator/template/json_index/* ); Expat or Ruby(lib/rubygems.rb lib/rubygems/* ); PreserveNotice(util.c); BSD-2-clause(random.c); 3C-BSD(vsnprintf.c); PublicDomain(Files:); 3C-BSD(missing/crypt.c); 3C-BSD(missing/setproctitle.c); BSD-3-clause(missing/strlcat.c missing/strlcpy.c); AllPermissions(missing/langinfo.c); PartialGplArtisticAndRuby(win32/win32.* ); zlib/libpng(ext/digest/md5/md5.c ext/digest/md5/md5.h); BSD-3-clause(ext/digest/rmd160/rmd160.c ext/digest/rmd160/rmd160.h); BSD-3-clause(ext/digest/sha2/sha2.c ext/digest/sha2/sha2.h); zlib/libpng(ext/nkf/nkf-utf8/config.h ext/nkf/nkf-utf8/nkf.c ext/nkf/nkf-utf8/utf8tbl.c); BSD-3-clause(ext/socket/addrinfo.h ext/socket/getaddrinfo.c ext/socket/getnameinfo.c); GPL-1+ or Artistic(ext/win32ole/win32ole.c); Expat(ccan/list/list.h); CC0(Files:); Unicode(Files:); Permissive(Files:); Permissive(Files:); BSD-2-clause or Ruby(debian/* ); Artistic(debian/* ); BSD-2-clause(debian/* ); 3C-BSD(debian/* ); BSD-3-clause(debian/* ); Expat(debian/* ); GPL-1+(debian/* ); Ruby(debian/* ); SIL-1.1(debian/* ); zlib/libpng(debian/* ); CC0(debian/* ); Unicode(debian/* ); Permissive(debian/* ); GPL-3+(debian/* ); CC-BY-3.0-famfamfam(debian/* ) | +| {{}} | 2.5.5-3+deb10u6 | BSD-2-clause or Ruby(* ); BSD-2-clause(Files:); Expat(Files:); BSD-2-clause(enc/* .c); BSD-2-clause(enc/ascii.c enc/euc_jp.c enc/shift_jis.c enc/windows_31j.c); BSD-2-clause(enc/gb18030.c); BSD-2-clause(enc/encdb.c); BSD-2-clause(enc/windows_1250.c enc/windows_1252.c); BSD-2-clause(enc/windows_1251.c); GPL-3+(misc/ruby-mode.el); BSD-2-clause(lib/rdoc/generator/darkfish.rb lib/rdoc/generator/template/darkfish/* ); SIL-1.1(lib/rdoc/generator/template/darkfish/fonts/SourceCodePro* ); SIL-1.1(lib/rdoc/generator/template/darkfish/fonts/Lato* ); CC-BY-3.0-famfamfam(lib/rdoc/generator/template/darkfish/images/* ); Expat(lib/rdoc/generator/json_index.rb lib/rdoc/generator/template/json_index/* ); Expat or Ruby(lib/rubygems.rb lib/rubygems/* ); PreserveNotice(util.c); BSD-2-clause(random.c); 3C-BSD(vsnprintf.c); PublicDomain(Files:); 3C-BSD(missing/crypt.c); 3C-BSD(missing/setproctitle.c); BSD-3-clause(missing/strlcat.c missing/strlcpy.c); AllPermissions(missing/langinfo.c); PartialGplArtisticAndRuby(win32/win32.* ); zlib/libpng(ext/digest/md5/md5.c ext/digest/md5/md5.h); BSD-3-clause(ext/digest/rmd160/rmd160.c ext/digest/rmd160/rmd160.h); BSD-3-clause(ext/digest/sha2/sha2.c ext/digest/sha2/sha2.h); zlib/libpng(ext/nkf/nkf-utf8/config.h ext/nkf/nkf-utf8/nkf.c ext/nkf/nkf-utf8/utf8tbl.c); BSD-3-clause(ext/socket/addrinfo.h ext/socket/getaddrinfo.c ext/socket/getnameinfo.c); GPL-1+ or Artistic(ext/win32ole/win32ole.c); Expat(ccan/list/list.h); CC0(Files:); Unicode(Files:); Permissive(Files:); Permissive(Files:); BSD-2-clause or Ruby(debian/* ); Artistic(debian/* ); BSD-2-clause(debian/* ); 3C-BSD(debian/* ); BSD-3-clause(debian/* ); Expat(debian/* ); GPL-1+(debian/* ); Ruby(debian/* ); SIL-1.1(debian/* ); zlib/libpng(debian/* ); CC0(debian/* ); Unicode(debian/* ); Permissive(debian/* ); GPL-3+(debian/* ); CC-BY-3.0-famfamfam(debian/* ) | | {{}} | 1.5.8-1 | Expat(* ); Expat(debian/* ); Expat(debian/* ) | | {{}} | 1.2.1-1 | Expat(* ); Expat(debian/* ); Expat(debian/* ) | | {{}} | 1.11+deb10u1 | Expat(* ) | @@ -1592,7 +1612,7 @@ pdfhidden: True | {{}} | 2.0.11 | GPL; GPL-2; MIT | | {{}} | 1.03ii-36 | GPL-2+(* ); GPL-2+(debian/* ); GPL-2+(debian/* ) | | {{}} | 1.10-1 | GPL | -| {{}} | 6.6-1 | GPL-2+(* ); GPL-2(debian/* ); GPL-2+(debian/* ); GPL-2(debian/* ) | +| {{}} | 7.2-1~bpo10+1 | GPL-2+(* ); GPL-2(Files:); GPL-2+(Files:); LGPL-2.1+(Files:); Expat-like(Files:); BSD-2-Clause(Files:); BSD-2-Clause and GPL-2+(Files:); GPL-2(debian/* ); GPL-2+(debian/* ); GPL-2(debian/* ); LGPL-2.1+(debian/* ); BSD-2-Clause(debian/* ) | | {{}} | 5.8.0-cl4.3.0u1 | NO COPYRIGHT FILE | | {{}} | 5.8.0-cl4.3.0u1 | NO COPYRIGHT FILE | | {{}} | 5.8.0-cl4.3.0u1 | NO COPYRIGHT FILE | @@ -1606,28 +1626,30 @@ pdfhidden: True | {{}} | 1.8.4-1 | BSD-2-clause(* ); BSD-2-clause(debian/dh-sphinxdoc/dh_sphinxdoc); BSD-2-clause(sphinx/ext/apidoc.py); BSD-2-clause(sphinx/ext/napoleon/docstring.py); Expat(sphinx/themes/basic/static/jquery* .js); Expat(sphinx/themes/basic/static/underscore* .js); BSD-3-clause(sphinx/util/smartypants.py); public-domain(sphinx/util/stemmer/porter.py); BSD-2-clause(sphinx/util/stemmer/porter.py); BSD-3-clause(sphinx/util/stemmer/porter.py); Expat(sphinx/util/stemmer/porter.py) | | {{}} | 0.4.3+dfsg-1 | Expat(* ); BSD-2-clause(sphinx_rtd_theme/search.html); Expat(debian/* ); Expat(debian/missing-sources/bourbon/* ); Expat(debian/missing-sources/neat/* ); Expat(debian/missing-sources/wyrm/* ); Expat(debian/missing-sources/wyrm/* ) | | {{}} | 3.27.2-3+deb10u1 | public-domain(* ); GPL-2+(debian/* ) | +| {{}} | 8.4p1-2~bpo10+1 | OpenSSH(* ); Mazieres-BSD-style(ssh-keyscan.* ); public-domain(rijndael.* ); BSD-3-clause(loginrec.c openbsd-compat/* scp.c); Beer-ware(md5crypt.* ); Powell-BSD-style(openbsd-compat/bsd-snprintf.c); Expat-with-advertising-restriction(openbsd-compat/sigact.* ); BSD-2-clause(debian/* ) | | {{}} | 1.06-1 | GPL-2+(* ) | | {{}} | 1.0.39 | BSD-3-clause(* ); BSD-3-clause(* ) | | {{}} | 0.18-1 | GPL; GPL-2 | | {{}} | 4.26-0.2 | BSD | -| {{}} | 1.8.27-1+deb10u3 | ISC | +| {{}} | 1.8.27-1+deb10u5 | ISC | | {{}} | 3.0.12-2 | GPL; GPL-3 | | {{}} | 3.0.12-2 | GPL; GPL-3 | -| {{}} | 1.0-cl4.3.1u33 | Cumulus Networks Proprietary(* ); GPL-2(debian/* ); The MIT License(include/kvec.h); CC0-1.0(lib/ccan/* ) | -| {{}} | 1.0-cl4.3.1u1 | Cumulus Networks Proprietary(* ); GPL-2(debian/* ) | -| {{}} | 1.0-cl4.3.1u33 | Cumulus Networks Proprietary(* ); GPL-2(debian/* ); The MIT License(include/kvec.h); CC0-1.0(lib/ccan/* ) | -| {{}} | 1.0-cl4.3.1u1 | Cumulus Networks Proprietary(* ); GPL-2(debian/* ) | -| {{}} | 1.0-cl4.3.1u38 | Cumulus Networks Proprietary(* ); GPL-2(debian/* ); The MIT License(include/kvec.h); CC0-1.0(lib/ccan/* ) | -| {{}} | 1.0-cl4.3.1u38 | Cumulus Networks Proprietary(* ); GPL-2(debian/* ); The MIT License(include/kvec.h); CC0-1.0(lib/ccan/* ) | -| {{}} | 1.mlnx.4.4.2224-cl4.3.1u12 | NO OR UNKNOWN LICENSE FOUND IN COPYRIGHT FILE | -| {{}} | 1.mlnx.4.4.2224-cl4.3.1u12 | Mellanox Proprietary(* ) | +| {{}} | 1.0-cl4.3.2u5 | Cumulus Networks Proprietary(* ); GPL-2(debian/* ); The MIT License(include/kvec.h); CC0-1.0(lib/ccan/* ) | +| {{}} | 1.0-cl4.3.2u9 | Cumulus Networks Proprietary(* ); GPL-2(debian/* ) | +| {{}} | 1.0-cl4.3.2u5 | Cumulus Networks Proprietary(* ); GPL-2(debian/* ); The MIT License(include/kvec.h); CC0-1.0(lib/ccan/* ) | +| {{}} | 1.0-cl4.3.2u9 | Cumulus Networks Proprietary(* ); GPL-2(debian/* ) | +| {{}} | 1.0-cl4.3.2u5 | Cumulus Networks Proprietary(* ); GPL-2(debian/* ); The MIT License(include/kvec.h); CC0-1.0(lib/ccan/* ) | +| {{}} | 1.0-cl4.3.2u5 | Cumulus Networks Proprietary(* ); GPL-2(debian/* ); The MIT License(include/kvec.h); CC0-1.0(lib/ccan/* ) | +| {{}} | 1.mlnx.4.4.2224-cl4.3.1u12 | NO OR UNKNOWN LICENSE FOUND IN COPYRIGHT FILE | +| {{}} | 1.mlnx.4.4.2224-cl4.3.1u12 | Mellanox Proprietary(* ) | | {{}} | 1.mlnx.4.4.2224-cl4.3.1u12 | NO OR UNKNOWN LICENSE FOUND IN COPYRIGHT FILE | | {{}} | 1.mlnx.4.4.2224-cl4.3.1u12 | Mellanox Proprietary(* ) | | {{}} | 1.mlnx.4.4.2224-cl4.3.1u12 | Mellanox Proprietary(* ) | | {{}} | 1.mlnx.4.4.2224-cl4.3.1u12 | Mellanox Proprietary(* ) | -| {{}} | 12.0.3-2 | GPL-2+(* ); GPL-2+(cifsiostat.c ioconf.c); GPL-2+(tapestat.c); GPL-2+(contrib/isag/* ); GPL-2+(debian/* ); GPL-2+(debian/* ) | -| {{}} | 241-7~deb10u8 | LGPL-2.1+(* ); CC0-1.0(src/basic/siphash24.h); GPL-2(src/basic/securebits.h); GPL-2(src/basic/ioprio.h); GPL-2+(src/shared/linux/auto_dev-ioctl.h); Expat(src/basic/sparse-endian.h); public-domain(src/journal/lookup3.c); GPL-2+(src/udev/* ); LGPL-2.1+(src/udev/udev-ctrl.c); GPL-2(src/udev/scsi_id/scsi.h); LGPL-2.1+(debian/* ); Expat(debian/* ); GPL-2(debian/* ); GPL-2+(debian/* ); LGPL-2.1+(debian/* ); CC0-1.0(debian/* ) | -| {{}} | 241-7~deb10u8 | LGPL-2.1+(* ); CC0-1.0(src/basic/siphash24.h); GPL-2(src/basic/securebits.h); GPL-2(src/basic/ioprio.h); GPL-2+(src/shared/linux/auto_dev-ioctl.h); Expat(src/basic/sparse-endian.h); public-domain(src/journal/lookup3.c); GPL-2+(src/udev/* ); LGPL-2.1+(src/udev/udev-ctrl.c); GPL-2(src/udev/scsi_id/scsi.h); LGPL-2.1+(debian/* ); Expat(debian/* ); GPL-2(debian/* ); GPL-2+(debian/* ); LGPL-2.1+(debian/* ); CC0-1.0(debian/* ) | +| {{}} | 12.0.3-2+deb10u2 | GPL-2+(* ); GPL-2+(cifsiostat.c ioconf.c); GPL-2+(tapestat.c); GPL-2+(contrib/isag/* ); GPL-2+(debian/* ); GPL-2+(debian/* ) | +| {{}} | 247.3-6~bpo10+1 | LGPL-2.1+(* ); CC0-1.0(src/basic/siphash24.h); GPL-2(src/basic/ioprio.h); GPL-2 with Linux-syscall-note exception(src/shared/linux/* ); Expat(src/basic/sparse-endian.h); public-domain(src/journal/lookup3.c); GPL-2+(src/udev/ata_id/ata_id.c); GPL-2+(src/udev/scsi_id/* ); LGPL-2.1+(debian/* ); Expat(debian/* ); GPL-2(debian/* ); GPL-2 with Linux-syscall-note exception(debian/* ); GPL-2+(debian/* ); LGPL-2.1+(debian/* ); CC0-1.0(debian/* ) | +| {{}} | 241-7~deb10u10 | LGPL-2.1+(* ); CC0-1.0(src/basic/siphash24.h); GPL-2(src/basic/securebits.h); GPL-2(src/basic/ioprio.h); GPL-2+(src/shared/linux/auto_dev-ioctl.h); Expat(src/basic/sparse-endian.h); public-domain(src/journal/lookup3.c); GPL-2+(src/udev/* ); LGPL-2.1+(src/udev/udev-ctrl.c); GPL-2(src/udev/scsi_id/scsi.h); LGPL-2.1+(debian/* ); Expat(debian/* ); GPL-2(debian/* ); GPL-2+(debian/* ); LGPL-2.1+(debian/* ); CC0-1.0(debian/* ) | +| {{}} | 247.3-6~bpo10+1 | LGPL-2.1+(* ); CC0-1.0(src/basic/siphash24.h); GPL-2(src/basic/ioprio.h); GPL-2 with Linux-syscall-note exception(src/shared/linux/* ); Expat(src/basic/sparse-endian.h); public-domain(src/journal/lookup3.c); GPL-2+(src/udev/ata_id/ata_id.c); GPL-2+(src/udev/scsi_id/* ); LGPL-2.1+(debian/* ); Expat(debian/* ); GPL-2(debian/* ); GPL-2 with Linux-syscall-note exception(debian/* ); GPL-2+(debian/* ); LGPL-2.1+(debian/* ); CC0-1.0(debian/* ) | | {{}} | 2.93-8 | GPL-2+(* ); GPL-2+(debian/* ); GPL-2+(debian/* ) | | {{}} | 1.41-3 | MIT | | {{}} | 1.0.4-cl4u1 | GPL-2+(* ); GPL-2+(* ) | @@ -1645,7 +1667,7 @@ pdfhidden: True | {{}} | 6.11 | GPL; GPL-2 | | {{}} | 6.5.0.dfsg.1-4+b1 | GPL; GPL-3 | | {{}} | 2018.20190227-2 | TeX-various | -| {{}} | 2018.20181218.49446-1 | TeX-various | +| {{}} | 2018.20181218.49446-1+deb10u2 | TeX-various | | {{}} | 2018.20190227-2 | TeX-various | | {{}} | 2018.20190227-2 | TeX-various | | {{}} | 2018.20190227-2 | TeX-various | @@ -1654,17 +1676,18 @@ pdfhidden: True | {{}} | 2018.20190227-2 | TeX-various | | {{}} | 2018.20190227-2 | TeX-various | | {{}} | 2018.20190227-2 | TeX-various | +| {{}} | 1.7-25.1+b1 | GPL-2+(* ); GPL-2+(debian/* ); freely redistributable(debian/time.1); GPL-2+(debian/time.1) | | {{}} | 1.3-20 | GPL; LPPL | | {{}} | 2.8-3 | BSD; BSD-2; BSD-3 | | {{}} | 2.6.1-0.1 | GPL-2(* ); LGPL-2.1(list.h parse-* plugin_* trace-cmd.h trace-cmd.local); LGPL-2.1(event-parse.c); LGPL-2.1(plugin_hrtimer.c); LGPL-2.1(plugin_mac80211.c); GPL-2(trace-view-store.c); GPL-2(tracecmdgui.py tracecmd.py); GPL-2(Documentation/trace-cmd-check-events.1.txt); GPL-2(debian/* ); GPL-2(debian/* ); LGPL-2.1(debian/* ) | | {{}} | 2.1.0-2 | GPL-2+(* ); LGPL-2.1+(libsupp/* ); GPL-2+(debian/* ); GPL-2+(debian/* ); LGPL-2.1+(debian/* ) | | {{}} | 1.8.0-1 | GPL; GPL-2 | -| {{}} | 2.6.20-0+deb10u3 | GPL-2+(* ); GPL-2+(debian/* ); public-domain(wsutil/g711.c:); LGPL-2+(wsutil/strptime.c); LGPL-2+(tools/lemon/lempar.c); FSL-Kaz(epan/except.c); Free Software License:(epan/except.c); BSD-3-clause(epan/in_cksum.c); ISC(wsutil/inet_ntop.c); BSD-2-clause(epan/dissectors/packet-enc.c); BSD-2-clause-no-conditions(epan/dissectors/packet-pflog.c:); BSD-3-clause-Endance(wiretap/erf.c); BSD-2-clause(wiretap/i4b_trace.h); GPL-3+(epan/dissectors/pidl/rfr/rfr.idl); GPL-3+(tools/pidl/idl.yp); BSD-2-clause(tools/pidl/idl.yp); GPL-2+(tools/pidl/idl.yp); GPL-3+(tools/pidl/idl.yp); ISC(tools/pidl/idl.yp); LGPL-2+(tools/pidl/idl.yp) | +| {{}} | 2.6.20-0+deb10u4 | GPL-2+(* ); GPL-2+(debian/* ); public-domain(wsutil/g711.c:); LGPL-2+(wsutil/strptime.c); LGPL-2+(tools/lemon/lempar.c); FSL-Kaz(epan/except.c); Free Software License:(epan/except.c); BSD-3-clause(epan/in_cksum.c); ISC(wsutil/inet_ntop.c); BSD-2-clause(epan/dissectors/packet-enc.c); BSD-2-clause-no-conditions(epan/dissectors/packet-pflog.c:); BSD-3-clause-Endance(wiretap/erf.c); BSD-2-clause(wiretap/i4b_trace.h); GPL-3+(epan/dissectors/pidl/rfr/rfr.idl); GPL-3+(tools/pidl/idl.yp); BSD-2-clause(tools/pidl/idl.yp); GPL-2+(tools/pidl/idl.yp); GPL-3+(tools/pidl/idl.yp); ISC(tools/pidl/idl.yp); LGPL-2+(tools/pidl/idl.yp) | | {{}} | 2.37-1 | bitstream-vera(* ); GPL-2+(debian/* ) | -| {{}} | 2021a-0+deb10u6 | public domain | +| {{}} | 2021a-0+deb10u11 | public domain | | {{}} | 2019.01+dfsg-7 | GPL-2(* ); GPL-2+(Files:); GPL-2+(debian/* ); LGPL-2.1(fs/yaffs2/yaffs_allocator.h); LGPL-2.1(lib/sha1.c); bzlib-BSD-3(include/bzlib.h); GPL-2(drivers/usb/musb-new/musb_host.h); Beerware(net/dns.c); libfdt-BSD-GPL(scripts/dtc/libfdt/* ); MPL-GPL(include/pcmcia/yenta.h); MPL-GPL(include/pcmcia/yenta.h); libfdt-BSD-GPL(include/pcmcia/yenta.h); Beerware(include/pcmcia/yenta.h); GPL-2(include/pcmcia/yenta.h); bzlib-BSD-3(include/pcmcia/yenta.h); GPL-2+(include/pcmcia/yenta.h); LGPL-2.1(include/pcmcia/yenta.h) | | {{}} | 3.0038+nmu1 | GPL-2(* ); GPL-2(debian/po/ca.po); GPL-2(debian/po/cs.po); GPL-2(debian/po/da.po); GPL-2(debian/po/de.po); GPL-2(debian/po/es.po); GPL-2(debian/po/eu.po); GPL-2(debian/po/fi.po); GPL-2(debian/po/fr.po); GPL-2(debian/po/gl.po); GPL-2(debian/po/it.po); GPL-2(debian/po/ja.po); GPL-2(debian/po/nl.po); GPL-2(debian/po/pl.po); GPL-2(debian/po/pt_BR.po); GPL-2(debian/po/pt.po); GPL-2(debian/po/ru.po); GPL-2(debian/po/sk.po); GPL-2(debian/po/sv.po); GPL-2(debian/po/vi.po); GPL-2(debian/po/vi.po) | -| {{}} | 241-7~deb10u8 | LGPL-2.1+(* ); CC0-1.0(src/basic/siphash24.h); GPL-2(src/basic/securebits.h); GPL-2(src/basic/ioprio.h); GPL-2+(src/shared/linux/auto_dev-ioctl.h); Expat(src/basic/sparse-endian.h); public-domain(src/journal/lookup3.c); GPL-2+(src/udev/* ); LGPL-2.1+(src/udev/udev-ctrl.c); GPL-2(src/udev/scsi_id/scsi.h); LGPL-2.1+(debian/* ); Expat(debian/* ); GPL-2(debian/* ); GPL-2+(debian/* ); LGPL-2.1+(debian/* ); CC0-1.0(debian/* ) | +| {{}} | 247.3-6~bpo10+1 | LGPL-2.1+(* ); CC0-1.0(src/basic/siphash24.h); GPL-2(src/basic/ioprio.h); GPL-2 with Linux-syscall-note exception(src/shared/linux/* ); Expat(src/basic/sparse-endian.h); public-domain(src/journal/lookup3.c); GPL-2+(src/udev/ata_id/ata_id.c); GPL-2+(src/udev/scsi_id/* ); LGPL-2.1+(debian/* ); Expat(debian/* ); GPL-2(debian/* ); GPL-2 with Linux-syscall-note exception(debian/* ); GPL-2+(debian/* ); LGPL-2.1+(debian/* ); CC0-1.0(debian/* ) | | {{}} | 6.0-23+deb10u2 | BSD | | {{}} | 4.49 | GPL-2+(Files:) | | {{}} | 2019.07.27-0+deb10u1 | BSD; GPL | @@ -1672,17 +1695,17 @@ pdfhidden: True | {{}} | 2.33.1-0.1 | GPL-2+(* ); GPL-2(schedutils/ionice.c); GPL-2(schedutils/chrt.c); GPL-2(disk-utils/raw.c); GPL-2(sys-utils/nsenter.c); GPL-2(disk-utils/mkfs.minix.c); public-domain(lib/at.c); BSD-4-clause(login-utils/vipw.c); MIT(text-utils/tailf.c); MIT(sys-utils/flock.c); BSD-2-clause(text-utils/pg.c); BSD-2-clause(login-utils/last-deprecated.c); BSD-2-clause(login-utils/login.c); BSD-3-clause(login-utils/logindefs.c); BSD-3-clause(libuuid/* ); LGPL-2+(lib/procutils.c); LGPL-2+(* /colors.* ); LGPL-2+(login-utils/setpwnam.h); LGPL-2.1+(libfdisk/* ); LGPL-2.1+(lib/cpuset.c); LGPL-2.1+(* /mbsalign.* ); GPL-3+(* /readutmp.* ); LGPL-2.1+(* /timeutils.* ); LGPL(include/list.h); LGPL-2.1+(libblkid/* ); LGPL(include/cpuset.h); LGPL(misc-utils/blkid.c); LGPL-2.1+(libmount/* ); LGPL-3+(libmount/python/* ); LGPL(libsmartcols/* ); GPL-2+(debian/* ); public-domain(debian/* ); GPL-2(debian/* ); GPL-2+(debian/* ); GPL-3+(debian/* ); BSD-2-clause(debian/* ); BSD-3-clause(debian/* ); BSD-4-clause(debian/* ); LGPL(debian/* ); LGPL-2+(debian/* ); LGPL-2.1+(debian/* ); LGPL-3+(debian/* ); MIT(debian/* ) | | {{}} | 2.33.1-0.1 | GPL-2+(* ); GPL-2(schedutils/ionice.c); GPL-2(schedutils/chrt.c); GPL-2(disk-utils/raw.c); GPL-2(sys-utils/nsenter.c); GPL-2(disk-utils/mkfs.minix.c); public-domain(lib/at.c); BSD-4-clause(login-utils/vipw.c); MIT(text-utils/tailf.c); MIT(sys-utils/flock.c); BSD-2-clause(text-utils/pg.c); BSD-2-clause(login-utils/last-deprecated.c); BSD-2-clause(login-utils/login.c); BSD-3-clause(login-utils/logindefs.c); BSD-3-clause(libuuid/* ); LGPL-2+(lib/procutils.c); LGPL-2+(* /colors.* ); LGPL-2+(login-utils/setpwnam.h); LGPL-2.1+(libfdisk/* ); LGPL-2.1+(lib/cpuset.c); LGPL-2.1+(* /mbsalign.* ); GPL-3+(* /readutmp.* ); LGPL-2.1+(* /timeutils.* ); LGPL(include/list.h); LGPL-2.1+(libblkid/* ); LGPL(include/cpuset.h); LGPL(misc-utils/blkid.c); LGPL-2.1+(libmount/* ); LGPL-3+(libmount/python/* ); LGPL(libsmartcols/* ); GPL-2+(debian/* ); public-domain(debian/* ); GPL-2(debian/* ); GPL-2+(debian/* ); GPL-3+(debian/* ); BSD-2-clause(debian/* ); BSD-3-clause(debian/* ); BSD-4-clause(debian/* ); LGPL(debian/* ); LGPL-2+(debian/* ); LGPL-2.1+(debian/* ); LGPL-3+(debian/* ); MIT(debian/* ) | | {{}} | 2.33.1-0.1 | GPL-2+(* ); GPL-2(schedutils/ionice.c); GPL-2(schedutils/chrt.c); GPL-2(disk-utils/raw.c); GPL-2(sys-utils/nsenter.c); GPL-2(disk-utils/mkfs.minix.c); public-domain(lib/at.c); BSD-4-clause(login-utils/vipw.c); MIT(text-utils/tailf.c); MIT(sys-utils/flock.c); BSD-2-clause(text-utils/pg.c); BSD-2-clause(login-utils/last-deprecated.c); BSD-2-clause(login-utils/login.c); BSD-3-clause(login-utils/logindefs.c); BSD-3-clause(libuuid/* ); LGPL-2+(lib/procutils.c); LGPL-2+(* /colors.* ); LGPL-2+(login-utils/setpwnam.h); LGPL-2.1+(libfdisk/* ); LGPL-2.1+(lib/cpuset.c); LGPL-2.1+(* /mbsalign.* ); GPL-3+(* /readutmp.* ); LGPL-2.1+(* /timeutils.* ); LGPL(include/list.h); LGPL-2.1+(libblkid/* ); LGPL(include/cpuset.h); LGPL(misc-utils/blkid.c); LGPL-2.1+(libmount/* ); LGPL-3+(libmount/python/* ); LGPL(libsmartcols/* ); GPL-2+(debian/* ); public-domain(debian/* ); GPL-2(debian/* ); GPL-2+(debian/* ); GPL-3+(debian/* ); BSD-2-clause(debian/* ); BSD-3-clause(debian/* ); BSD-4-clause(debian/* ); LGPL(debian/* ); LGPL-2+(debian/* ); LGPL-2.1+(debian/* ); LGPL-3+(debian/* ); MIT(debian/* ) | -| {{}} | 8.1.0875-5+deb10u2 | Vim(* ); OPL-1+(runtime/doc/* ); BSD-3-clause(runtime/syntax/cmake.vim); Expat(runtime/ftplugin/wast.vim); BSD-2-clause(runtime/syntax/tmux.vim); Apache or Expat(runtime/syntax/rust.vim); GPL-1+ or Artistic-1(runtime/tools/efm_perl.pl); Expat(src/libvterm/* ); Vim-Regexp(src/regexp.c); UC(src/if_xcmdsrv.c); public-domain(src/tee/tee.c); Expat or GPL-2(src/xxd/* ); SRA(src/gui_at_fs.c); X11(src/gui_at_sb.* src/install-sh); Compaq(src/gui_gtk_vms.h); GPL-2+(src/pty.c); Expat or Vim(src/iscygpty.* ); XPM(src/xpm/* ); LGPL-2.1+(src/xdiff/* ); EDL-1(src/xdiff/xhistogram.c); Vim(src/xdiff/xhistogram.c); OPL-1+(src/xdiff/xhistogram.c); GPL-2(src/xdiff/xhistogram.c); GPL-2+(src/xdiff/xhistogram.c); GPL-1+(src/xdiff/xhistogram.c); LGPL-2.1+(src/xdiff/xhistogram.c); Artistic-1(src/xdiff/xhistogram.c); Vim-Regexp(src/xdiff/xhistogram.c); Apache(src/xdiff/xhistogram.c); Expat(src/xdiff/xhistogram.c); SRA(src/xdiff/xhistogram.c); X11(src/xdiff/xhistogram.c); UC(src/xdiff/xhistogram.c); public-domain(src/xdiff/xhistogram.c); Compaq(src/xdiff/xhistogram.c); XPM(src/xdiff/xhistogram.c); BSD-3-clause(src/xdiff/xhistogram.c); BSD-2-clause(src/xdiff/xhistogram.c); EDL-1(src/xdiff/xhistogram.c) | -| {{}} | 8.1.0875-5+deb10u2 | Vim(* ); OPL-1+(runtime/doc/* ); BSD-3-clause(runtime/syntax/cmake.vim); Expat(runtime/ftplugin/wast.vim); BSD-2-clause(runtime/syntax/tmux.vim); Apache or Expat(runtime/syntax/rust.vim); GPL-1+ or Artistic-1(runtime/tools/efm_perl.pl); Expat(src/libvterm/* ); Vim-Regexp(src/regexp.c); UC(src/if_xcmdsrv.c); public-domain(src/tee/tee.c); Expat or GPL-2(src/xxd/* ); SRA(src/gui_at_fs.c); X11(src/gui_at_sb.* src/install-sh); Compaq(src/gui_gtk_vms.h); GPL-2+(src/pty.c); Expat or Vim(src/iscygpty.* ); XPM(src/xpm/* ); LGPL-2.1+(src/xdiff/* ); EDL-1(src/xdiff/xhistogram.c); Vim(src/xdiff/xhistogram.c); OPL-1+(src/xdiff/xhistogram.c); GPL-2(src/xdiff/xhistogram.c); GPL-2+(src/xdiff/xhistogram.c); GPL-1+(src/xdiff/xhistogram.c); LGPL-2.1+(src/xdiff/xhistogram.c); Artistic-1(src/xdiff/xhistogram.c); Vim-Regexp(src/xdiff/xhistogram.c); Apache(src/xdiff/xhistogram.c); Expat(src/xdiff/xhistogram.c); SRA(src/xdiff/xhistogram.c); X11(src/xdiff/xhistogram.c); UC(src/xdiff/xhistogram.c); public-domain(src/xdiff/xhistogram.c); Compaq(src/xdiff/xhistogram.c); XPM(src/xdiff/xhistogram.c); BSD-3-clause(src/xdiff/xhistogram.c); BSD-2-clause(src/xdiff/xhistogram.c); EDL-1(src/xdiff/xhistogram.c) | -| {{}} | 8.1.0875-5+deb10u2 | Vim(* ); OPL-1+(runtime/doc/* ); BSD-3-clause(runtime/syntax/cmake.vim); Expat(runtime/ftplugin/wast.vim); BSD-2-clause(runtime/syntax/tmux.vim); Apache or Expat(runtime/syntax/rust.vim); GPL-1+ or Artistic-1(runtime/tools/efm_perl.pl); Expat(src/libvterm/* ); Vim-Regexp(src/regexp.c); UC(src/if_xcmdsrv.c); public-domain(src/tee/tee.c); Expat or GPL-2(src/xxd/* ); SRA(src/gui_at_fs.c); X11(src/gui_at_sb.* src/install-sh); Compaq(src/gui_gtk_vms.h); GPL-2+(src/pty.c); Expat or Vim(src/iscygpty.* ); XPM(src/xpm/* ); LGPL-2.1+(src/xdiff/* ); EDL-1(src/xdiff/xhistogram.c); Vim(src/xdiff/xhistogram.c); OPL-1+(src/xdiff/xhistogram.c); GPL-2(src/xdiff/xhistogram.c); GPL-2+(src/xdiff/xhistogram.c); GPL-1+(src/xdiff/xhistogram.c); LGPL-2.1+(src/xdiff/xhistogram.c); Artistic-1(src/xdiff/xhistogram.c); Vim-Regexp(src/xdiff/xhistogram.c); Apache(src/xdiff/xhistogram.c); Expat(src/xdiff/xhistogram.c); SRA(src/xdiff/xhistogram.c); X11(src/xdiff/xhistogram.c); UC(src/xdiff/xhistogram.c); public-domain(src/xdiff/xhistogram.c); Compaq(src/xdiff/xhistogram.c); XPM(src/xdiff/xhistogram.c); BSD-3-clause(src/xdiff/xhistogram.c); BSD-2-clause(src/xdiff/xhistogram.c); EDL-1(src/xdiff/xhistogram.c) | -| {{}} | 8.1.0875-5+deb10u2 | Vim(* ); OPL-1+(runtime/doc/* ); BSD-3-clause(runtime/syntax/cmake.vim); Expat(runtime/ftplugin/wast.vim); BSD-2-clause(runtime/syntax/tmux.vim); Apache or Expat(runtime/syntax/rust.vim); GPL-1+ or Artistic-1(runtime/tools/efm_perl.pl); Expat(src/libvterm/* ); Vim-Regexp(src/regexp.c); UC(src/if_xcmdsrv.c); public-domain(src/tee/tee.c); Expat or GPL-2(src/xxd/* ); SRA(src/gui_at_fs.c); X11(src/gui_at_sb.* src/install-sh); Compaq(src/gui_gtk_vms.h); GPL-2+(src/pty.c); Expat or Vim(src/iscygpty.* ); XPM(src/xpm/* ); LGPL-2.1+(src/xdiff/* ); EDL-1(src/xdiff/xhistogram.c); Vim(src/xdiff/xhistogram.c); OPL-1+(src/xdiff/xhistogram.c); GPL-2(src/xdiff/xhistogram.c); GPL-2+(src/xdiff/xhistogram.c); GPL-1+(src/xdiff/xhistogram.c); LGPL-2.1+(src/xdiff/xhistogram.c); Artistic-1(src/xdiff/xhistogram.c); Vim-Regexp(src/xdiff/xhistogram.c); Apache(src/xdiff/xhistogram.c); Expat(src/xdiff/xhistogram.c); SRA(src/xdiff/xhistogram.c); X11(src/xdiff/xhistogram.c); UC(src/xdiff/xhistogram.c); public-domain(src/xdiff/xhistogram.c); Compaq(src/xdiff/xhistogram.c); XPM(src/xdiff/xhistogram.c); BSD-3-clause(src/xdiff/xhistogram.c); BSD-2-clause(src/xdiff/xhistogram.c); EDL-1(src/xdiff/xhistogram.c) | +| {{}} | 8.1.0875-5+deb10u6 | Vim(* ); OPL-1+(runtime/doc/* ); BSD-3-clause(runtime/syntax/cmake.vim); Expat(runtime/ftplugin/wast.vim); BSD-2-clause(runtime/syntax/tmux.vim); Apache or Expat(runtime/syntax/rust.vim); GPL-1+ or Artistic-1(runtime/tools/efm_perl.pl); Expat(src/libvterm/* ); Vim-Regexp(src/regexp.c); UC(src/if_xcmdsrv.c); public-domain(src/tee/tee.c); Expat or GPL-2(src/xxd/* ); SRA(src/gui_at_fs.c); X11(src/gui_at_sb.* src/install-sh); Compaq(src/gui_gtk_vms.h); GPL-2+(src/pty.c); Expat or Vim(src/iscygpty.* ); XPM(src/xpm/* ); LGPL-2.1+(src/xdiff/* ); EDL-1(src/xdiff/xhistogram.c); Vim(src/xdiff/xhistogram.c); OPL-1+(src/xdiff/xhistogram.c); GPL-2(src/xdiff/xhistogram.c); GPL-2+(src/xdiff/xhistogram.c); GPL-1+(src/xdiff/xhistogram.c); LGPL-2.1+(src/xdiff/xhistogram.c); Artistic-1(src/xdiff/xhistogram.c); Vim-Regexp(src/xdiff/xhistogram.c); Apache(src/xdiff/xhistogram.c); Expat(src/xdiff/xhistogram.c); SRA(src/xdiff/xhistogram.c); X11(src/xdiff/xhistogram.c); UC(src/xdiff/xhistogram.c); public-domain(src/xdiff/xhistogram.c); Compaq(src/xdiff/xhistogram.c); XPM(src/xdiff/xhistogram.c); BSD-3-clause(src/xdiff/xhistogram.c); BSD-2-clause(src/xdiff/xhistogram.c); EDL-1(src/xdiff/xhistogram.c) | +| {{}} | 8.1.0875-5+deb10u6 | Vim(* ); OPL-1+(runtime/doc/* ); BSD-3-clause(runtime/syntax/cmake.vim); Expat(runtime/ftplugin/wast.vim); BSD-2-clause(runtime/syntax/tmux.vim); Apache or Expat(runtime/syntax/rust.vim); GPL-1+ or Artistic-1(runtime/tools/efm_perl.pl); Expat(src/libvterm/* ); Vim-Regexp(src/regexp.c); UC(src/if_xcmdsrv.c); public-domain(src/tee/tee.c); Expat or GPL-2(src/xxd/* ); SRA(src/gui_at_fs.c); X11(src/gui_at_sb.* src/install-sh); Compaq(src/gui_gtk_vms.h); GPL-2+(src/pty.c); Expat or Vim(src/iscygpty.* ); XPM(src/xpm/* ); LGPL-2.1+(src/xdiff/* ); EDL-1(src/xdiff/xhistogram.c); Vim(src/xdiff/xhistogram.c); OPL-1+(src/xdiff/xhistogram.c); GPL-2(src/xdiff/xhistogram.c); GPL-2+(src/xdiff/xhistogram.c); GPL-1+(src/xdiff/xhistogram.c); LGPL-2.1+(src/xdiff/xhistogram.c); Artistic-1(src/xdiff/xhistogram.c); Vim-Regexp(src/xdiff/xhistogram.c); Apache(src/xdiff/xhistogram.c); Expat(src/xdiff/xhistogram.c); SRA(src/xdiff/xhistogram.c); X11(src/xdiff/xhistogram.c); UC(src/xdiff/xhistogram.c); public-domain(src/xdiff/xhistogram.c); Compaq(src/xdiff/xhistogram.c); XPM(src/xdiff/xhistogram.c); BSD-3-clause(src/xdiff/xhistogram.c); BSD-2-clause(src/xdiff/xhistogram.c); EDL-1(src/xdiff/xhistogram.c) | +| {{}} | 8.1.0875-5+deb10u6 | Vim(* ); OPL-1+(runtime/doc/* ); BSD-3-clause(runtime/syntax/cmake.vim); Expat(runtime/ftplugin/wast.vim); BSD-2-clause(runtime/syntax/tmux.vim); Apache or Expat(runtime/syntax/rust.vim); GPL-1+ or Artistic-1(runtime/tools/efm_perl.pl); Expat(src/libvterm/* ); Vim-Regexp(src/regexp.c); UC(src/if_xcmdsrv.c); public-domain(src/tee/tee.c); Expat or GPL-2(src/xxd/* ); SRA(src/gui_at_fs.c); X11(src/gui_at_sb.* src/install-sh); Compaq(src/gui_gtk_vms.h); GPL-2+(src/pty.c); Expat or Vim(src/iscygpty.* ); XPM(src/xpm/* ); LGPL-2.1+(src/xdiff/* ); EDL-1(src/xdiff/xhistogram.c); Vim(src/xdiff/xhistogram.c); OPL-1+(src/xdiff/xhistogram.c); GPL-2(src/xdiff/xhistogram.c); GPL-2+(src/xdiff/xhistogram.c); GPL-1+(src/xdiff/xhistogram.c); LGPL-2.1+(src/xdiff/xhistogram.c); Artistic-1(src/xdiff/xhistogram.c); Vim-Regexp(src/xdiff/xhistogram.c); Apache(src/xdiff/xhistogram.c); Expat(src/xdiff/xhistogram.c); SRA(src/xdiff/xhistogram.c); X11(src/xdiff/xhistogram.c); UC(src/xdiff/xhistogram.c); public-domain(src/xdiff/xhistogram.c); Compaq(src/xdiff/xhistogram.c); XPM(src/xdiff/xhistogram.c); BSD-3-clause(src/xdiff/xhistogram.c); BSD-2-clause(src/xdiff/xhistogram.c); EDL-1(src/xdiff/xhistogram.c) | +| {{}} | 8.1.0875-5+deb10u6 | Vim(* ); OPL-1+(runtime/doc/* ); BSD-3-clause(runtime/syntax/cmake.vim); Expat(runtime/ftplugin/wast.vim); BSD-2-clause(runtime/syntax/tmux.vim); Apache or Expat(runtime/syntax/rust.vim); GPL-1+ or Artistic-1(runtime/tools/efm_perl.pl); Expat(src/libvterm/* ); Vim-Regexp(src/regexp.c); UC(src/if_xcmdsrv.c); public-domain(src/tee/tee.c); Expat or GPL-2(src/xxd/* ); SRA(src/gui_at_fs.c); X11(src/gui_at_sb.* src/install-sh); Compaq(src/gui_gtk_vms.h); GPL-2+(src/pty.c); Expat or Vim(src/iscygpty.* ); XPM(src/xpm/* ); LGPL-2.1+(src/xdiff/* ); EDL-1(src/xdiff/xhistogram.c); Vim(src/xdiff/xhistogram.c); OPL-1+(src/xdiff/xhistogram.c); GPL-2(src/xdiff/xhistogram.c); GPL-2+(src/xdiff/xhistogram.c); GPL-1+(src/xdiff/xhistogram.c); LGPL-2.1+(src/xdiff/xhistogram.c); Artistic-1(src/xdiff/xhistogram.c); Vim-Regexp(src/xdiff/xhistogram.c); Apache(src/xdiff/xhistogram.c); Expat(src/xdiff/xhistogram.c); SRA(src/xdiff/xhistogram.c); X11(src/xdiff/xhistogram.c); UC(src/xdiff/xhistogram.c); public-domain(src/xdiff/xhistogram.c); Compaq(src/xdiff/xhistogram.c); XPM(src/xdiff/xhistogram.c); BSD-3-clause(src/xdiff/xhistogram.c); BSD-2-clause(src/xdiff/xhistogram.c); EDL-1(src/xdiff/xhistogram.c) | | {{}} | 15.1.0+ds-2+deb10u1 | Expat(* ); Expat(debian/* ); Expat(debian/* ) | | {{}} | 1.19-1 | GPL-2+(* ); GPL-2+(debian/* ); GPL-2+(debian/* ) | | {{}} | 2.0.5 | GPL-2+(vconfig); GPL-2+(debian/* ); GPL-2+(vconfig.8); GPL-2+(vconfig.8) | | {{}} | 1.0-cl4.2.1+u1 | GPL-2(* ); GPL-2(debian/* ) | | {{}} | 1.0-cl4.2.1+u1 | NO COPYRIGHT FILE | | {{}} | 4.0-cl4u5 | Cumulus Networks Proprietary(* ); GPLv2(debian/* ) | -| {{}} | 0.5.3-37 | w3m(* ); w3m(* ); permissive-Str(Str.* ); copyleft-matrix-c(matrix.c); permissive-matrix-h(matrix.h); w3m(w3mimg/fb/* ); w3m(islang.c); X11(scrsize.c); Unicode-Data-Files(libwc/EastAsianWidth.txt); X11-install-sh(install-sh); Ruby and w3m(doc-jp/README.SSL); Ruby(doc-jp/README.SSL); Ruby's License:(doc-jp/README.SSL); GPL-3+ with Autoconf exception(config.guess config.sub); permissive-aclocal(aclocal.m4 config.rpath); permissive-configure(configure); permissive-po(po/Makefile.in.in); w3m(po/* .po* ); public-domain(alloc.h); permissive-debian(debian/* ); permissive-gitlog2changelog(debian/gitlog2changelog) | +| {{}} | 0.5.3-37+deb10u1 | w3m(* ); w3m(* ); permissive-Str(Str.* ); copyleft-matrix-c(matrix.c); permissive-matrix-h(matrix.h); w3m(w3mimg/fb/* ); w3m(islang.c); X11(scrsize.c); Unicode-Data-Files(libwc/EastAsianWidth.txt); X11-install-sh(install-sh); Ruby and w3m(doc-jp/README.SSL); Ruby(doc-jp/README.SSL); Ruby's License:(doc-jp/README.SSL); GPL-3+ with Autoconf exception(config.guess config.sub); permissive-aclocal(aclocal.m4 config.rpath); permissive-configure(configure); permissive-po(po/Makefile.in.in); w3m(po/* .po* ); public-domain(alloc.h); permissive-debian(debian/* ); permissive-gitlog2changelog(debian/gitlog2changelog) | | {{}} | 2018.04.16-1 | public domain | | {{}} | 5.14-cl4.3.1u4 | GPL | | {{}} | 5.14-cl4.3.1u4 | NO COPYRIGHT FILE | @@ -1690,7 +1713,7 @@ pdfhidden: True | {{}} | 1.20.1-1.1 | GFDL-1; GPL; GPL-3 | | {{}} | 1.3.0-cl4.3.0u1 | NO COPYRIGHT FILE | | {{}} | 0.52.20-8 | LGPL-2 | -| {{}} | 2.6.20-0+deb10u3 | GPL-2+(* ); GPL-2+(debian/* ); public-domain(wsutil/g711.c:); LGPL-2+(wsutil/strptime.c); LGPL-2+(tools/lemon/lempar.c); FSL-Kaz(epan/except.c); Free Software License:(epan/except.c); BSD-3-clause(epan/in_cksum.c); ISC(wsutil/inet_ntop.c); BSD-2-clause(epan/dissectors/packet-enc.c); BSD-2-clause-no-conditions(epan/dissectors/packet-pflog.c:); BSD-3-clause-Endance(wiretap/erf.c); BSD-2-clause(wiretap/i4b_trace.h); GPL-3+(epan/dissectors/pidl/rfr/rfr.idl); GPL-3+(tools/pidl/idl.yp); BSD-2-clause(tools/pidl/idl.yp); GPL-2+(tools/pidl/idl.yp); GPL-3+(tools/pidl/idl.yp); ISC(tools/pidl/idl.yp); LGPL-2+(tools/pidl/idl.yp) | +| {{}} | 2.6.20-0+deb10u4 | GPL-2+(* ); GPL-2+(debian/* ); public-domain(wsutil/g711.c:); LGPL-2+(wsutil/strptime.c); LGPL-2+(tools/lemon/lempar.c); FSL-Kaz(epan/except.c); Free Software License:(epan/except.c); BSD-3-clause(epan/in_cksum.c); ISC(wsutil/inet_ntop.c); BSD-2-clause(epan/dissectors/packet-enc.c); BSD-2-clause-no-conditions(epan/dissectors/packet-pflog.c:); BSD-3-clause-Endance(wiretap/erf.c); BSD-2-clause(wiretap/i4b_trace.h); GPL-3+(epan/dissectors/pidl/rfr/rfr.idl); GPL-3+(tools/pidl/idl.yp); BSD-2-clause(tools/pidl/idl.yp); GPL-2+(tools/pidl/idl.yp); GPL-3+(tools/pidl/idl.yp); ISC(tools/pidl/idl.yp); LGPL-2+(tools/pidl/idl.yp) | | {{}} | 7.7+19 | GPL | | {{}} | 2018.4-4 | MIT(* ); SGI(include/GL/* ); MIT(debian); MIT(debian); SGI(debian) | | {{}} | 2018.4-4 | MIT(* ); SGI(include/GL/* ); MIT(debian); MIT(debian); SGI(debian) | @@ -1712,7 +1735,7 @@ pdfhidden: True | {{}} | 1.1.32-2.2~deb10u1 | BSD | | {{}} | 344-1+deb10u2 | Dickey; MIT | | {{}} | 1.3.5-1 | BSD | -| {{}} | 8.1.0875-5+deb10u2 | Vim(* ); OPL-1+(runtime/doc/* ); BSD-3-clause(runtime/syntax/cmake.vim); Expat(runtime/ftplugin/wast.vim); BSD-2-clause(runtime/syntax/tmux.vim); Apache or Expat(runtime/syntax/rust.vim); GPL-1+ or Artistic-1(runtime/tools/efm_perl.pl); Expat(src/libvterm/* ); Vim-Regexp(src/regexp.c); UC(src/if_xcmdsrv.c); public-domain(src/tee/tee.c); Expat or GPL-2(src/xxd/* ); SRA(src/gui_at_fs.c); X11(src/gui_at_sb.* src/install-sh); Compaq(src/gui_gtk_vms.h); GPL-2+(src/pty.c); Expat or Vim(src/iscygpty.* ); XPM(src/xpm/* ); LGPL-2.1+(src/xdiff/* ); EDL-1(src/xdiff/xhistogram.c); Vim(src/xdiff/xhistogram.c); OPL-1+(src/xdiff/xhistogram.c); GPL-2(src/xdiff/xhistogram.c); GPL-2+(src/xdiff/xhistogram.c); GPL-1+(src/xdiff/xhistogram.c); LGPL-2.1+(src/xdiff/xhistogram.c); Artistic-1(src/xdiff/xhistogram.c); Vim-Regexp(src/xdiff/xhistogram.c); Apache(src/xdiff/xhistogram.c); Expat(src/xdiff/xhistogram.c); SRA(src/xdiff/xhistogram.c); X11(src/xdiff/xhistogram.c); UC(src/xdiff/xhistogram.c); public-domain(src/xdiff/xhistogram.c); Compaq(src/xdiff/xhistogram.c); XPM(src/xdiff/xhistogram.c); BSD-3-clause(src/xdiff/xhistogram.c); BSD-2-clause(src/xdiff/xhistogram.c); EDL-1(src/xdiff/xhistogram.c) | +| {{}} | 8.1.0875-5+deb10u6 | Vim(* ); OPL-1+(runtime/doc/* ); BSD-3-clause(runtime/syntax/cmake.vim); Expat(runtime/ftplugin/wast.vim); BSD-2-clause(runtime/syntax/tmux.vim); Apache or Expat(runtime/syntax/rust.vim); GPL-1+ or Artistic-1(runtime/tools/efm_perl.pl); Expat(src/libvterm/* ); Vim-Regexp(src/regexp.c); UC(src/if_xcmdsrv.c); public-domain(src/tee/tee.c); Expat or GPL-2(src/xxd/* ); SRA(src/gui_at_fs.c); X11(src/gui_at_sb.* src/install-sh); Compaq(src/gui_gtk_vms.h); GPL-2+(src/pty.c); Expat or Vim(src/iscygpty.* ); XPM(src/xpm/* ); LGPL-2.1+(src/xdiff/* ); EDL-1(src/xdiff/xhistogram.c); Vim(src/xdiff/xhistogram.c); OPL-1+(src/xdiff/xhistogram.c); GPL-2(src/xdiff/xhistogram.c); GPL-2+(src/xdiff/xhistogram.c); GPL-1+(src/xdiff/xhistogram.c); LGPL-2.1+(src/xdiff/xhistogram.c); Artistic-1(src/xdiff/xhistogram.c); Vim-Regexp(src/xdiff/xhistogram.c); Apache(src/xdiff/xhistogram.c); Expat(src/xdiff/xhistogram.c); SRA(src/xdiff/xhistogram.c); X11(src/xdiff/xhistogram.c); UC(src/xdiff/xhistogram.c); public-domain(src/xdiff/xhistogram.c); Compaq(src/xdiff/xhistogram.c); XPM(src/xdiff/xhistogram.c); BSD-3-clause(src/xdiff/xhistogram.c); BSD-2-clause(src/xdiff/xhistogram.c); EDL-1(src/xdiff/xhistogram.c) | | {{}} | 5.2.4-1+deb10u1 | PD(* ); probably-PD(INSTALL NEWS PACKAGERS); GPL-2+(src/scripts/* lib/* extra/scanlzma/scanlzma.c); PD(src/scripts/Makefile.am src/scripts/xzless.1); PD(doc/examples/xz_pipe_comp.c doc/examples/xz_pipe_decomp.c); LGPL-2.1+(lib/getopt.c lib/getopt1.c lib/getopt.in.h); permissive-fsf(m4/getopt.m4 m4/posix-shell.m4); Autoconf(m4/acx_pthread.m4); permissive-nowarranty(m4/acx_pthread.m4); GPL-2(Doxyfile.in); none(src/liblzma/check/crc32_table_?e.h); none(.gitignore m4/.gitignore po/.gitignore po/LINGUAS po/POTFILES.in); PD(tests/compress_prepared_bcj_* ); PD(po/cs.po po/de.po po/fr.po); PD(po/it.po po/pl.po); permissive-nowarranty(INSTALL.generic); config-h(dos/config.h); LGPL-2.1+(po/Makevars); noderivs(COPYING.GPLv2 COPYING.GPLv3 COPYING.LGPLv2.1); PD-debian(debian/* ); LGPL-2.1+(debian/* ); GPL-2(debian/* ); GPL-2+(debian/* ); Autoconf(debian/* ); permissive-fsf(debian/* ); permissive-nowarranty(debian/* ) | | {{}} | 1.0.184-2+cl4.3.0u1 | BSD-3-clause(* ); BSD-3-clause(swig/* ); BSD-3-clause(swig/java/* ); BSD-3-clause AND Apache-2.0(swig/python/config.py.in swig/python/tests/test_libyang.py swig/python/tests/test_tree_data.py swig/python/tests/test_tree_schema.py); IETF-BSD-3-clause(* /iana-* .yin * /iana-* .yang * /ietf-* .yin * /ietf-* .yang * /ietf-* .h); BSD-2-clause(linenoise/* ); Expat(swig/cpp/tests/microtest.h); BSD-3-clause(swig/java/tests/hamcrest-core-1.3.jar); EPL-1.0(swig/java/tests/junit-4.12.jar); GPL-3(swig/* .deb); BSD-3-clause(debian/* ); BSD-3-clause(debian/* ); Apache-2.0(debian/* ) | | {{}} | 1.0.184-2+cl4.3.0u1 | NO COPYRIGHT FILE | @@ -1720,4 +1743,6 @@ pdfhidden: True | {{}} | 3.0-11+b1 | BSD | | {{}} | 1.2.11.dfsg-1+deb10u1 | Zlib(* ); Zlib(amiga/Makefile.pup); Zlib(contrib/minizip/* ); Zlib(debian/* ); Zlib(debian/* ) | | {{}} | 1.2.11.dfsg-1+deb10u1 | Zlib(* ); Zlib(amiga/Makefile.pup); Zlib(contrib/minizip/* ); Zlib(debian/* ); Zlib(debian/* ) | +| {{}} | 5.7.1-1+deb10u1 | Zsh(* ); Expat(debian/* ); BSD-3(Src/compat.c); Zsh(Completion/Unix/Command/_hg); GPL-2+(Completion/Unix/Command/_darcs); GPL-2(Completion/openSUSE/Command/_osc); GPL-2(Completion/openSUSE/Command/_zypper); Artistic or GPL-1+ or Zsh(Misc/make-zsh-urls); PWS-Zsh-FAQ(Etc/FAQ.yo); Zsh(Etc/FAQ.yo); Expat(Etc/FAQ.yo); BSD-3(Etc/FAQ.yo); GPL-2+(Etc/FAQ.yo); GPL-2(Etc/FAQ.yo); GPL-1+(Etc/FAQ.yo); Artistic(Etc/FAQ.yo) | +| {{}} | 5.7.1-1+deb10u1 | Zsh(* ); Expat(debian/* ); BSD-3(Src/compat.c); Zsh(Completion/Unix/Command/_hg); GPL-2+(Completion/Unix/Command/_darcs); GPL-2(Completion/openSUSE/Command/_osc); GPL-2(Completion/openSUSE/Command/_zypper); Artistic or GPL-1+ or Zsh(Misc/make-zsh-urls); PWS-Zsh-FAQ(Etc/FAQ.yo); Zsh(Etc/FAQ.yo); Expat(Etc/FAQ.yo); BSD-3(Etc/FAQ.yo); GPL-2+(Etc/FAQ.yo); GPL-2(Etc/FAQ.yo); GPL-1+(Etc/FAQ.yo); Artistic(Etc/FAQ.yo) | diff --git a/content/cumulus-linux-43/Whats-New/licenses/bind9.txt b/content/cumulus-linux-43/Whats-New/licenses/bind9.txt new file mode 100644 index 0000000000..3b0579c5f2 --- /dev/null +++ b/content/cumulus-linux-43/Whats-New/licenses/bind9.txt @@ -0,0 +1,159 @@ +Format: https://www.debian.org/doc/packaging-manuals/copyright-format/1.0/ +Upstream-Name: BIND +Upstream-Contact: Internet Systems Consortium +Source: https://ftp.isc.org/isc/bind9/ +Files-Excluded: contrib/idn + contrib/dnsperf-2.1.0.0-1 + contrib/nslint-3.0a2 + contrib/query-loc-0.4.0 + contrib/queryperf + contrib/zkt-1.1.3 + doc/arm/Bv9ARM.pdf + +Files: * +Copyright: 2004-2017, Internet Systems Consortium, Inc. ("ISC") + 1996-2003, Internet Software Consortium + 2012, Vadim Goncharov + 2009-2012, John Eaglesham + 2008, Damien Miller + 2004, 2008, Nominet, Ltd. + 2004, Masarykova universita + 1997-2003, Kungliga Tekniska Högskolan + 2002, Nuno M. Rodrigues. + 2002, Stichting NLnet, Netherlands + 2000-2002, Japan Network Information Center. + 2001, Jake Burkholder + 1996-2001, Nominum, Inc. + 1995-2000, Network Associates, Inc. + 2000, Aaron D. Gifford + 1999-2000, Nortel Networks Corporation + 1996, David Mazieres + 1993, Digital Equipment Corporation. + 1990, 1993, The Regents of the University of California. +License: ISC and BSD-2-clause and BSD-3-clause and BSD-4-clause + +Files: bin/tests/system/chain/ + doc/misc/docbook-options.pl +Copyright: 2016-2017, Internet Systems Consortium, Inc. ("ISC") +License: MPL-2.0 or ISC + +Files: unit/atf-src/ +Copyright: 2007-2012, The NetBSD Foundation, Inc. +License: BSD-2-clause + +Files: contrib/idn/ +Copyright: 2000-2002, Japan Network Information Center +License: BSD-4-clause + +Files: debian/ +Copyright: 2007-2017 LaMont Jones + 2013-2017 Michael Gilbert + 2017 Ondřej Surý + 2008-2016 Jamie Strandboge +License: ISC or MPL-2.0 + +License: ISC + Permission to use, copy, modify, and/or distribute this software for any + purpose with or without fee is hereby granted, provided that the above + copyright notice and this permission notice appear in all copies. + . + THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH + REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY + AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT, + INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM + LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE + OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR + PERFORMANCE OF THIS SOFTWARE. + +License: BSD-2-clause + Redistribution and use in source and binary forms, with or without + modification, are permitted provided that the following conditions + are met: + . + 1. Redistributions of source code must retain the above copyright + notice, this list of conditions and the following disclaimer. + . + 2. Redistributions in binary form must reproduce the above copyright + notice, this list of conditions and the following disclaimer in the + documentation and/or other materials provided with the distribution. + . + THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS + "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT + LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR + A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT + HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, + INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, + BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS + OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED + AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT + LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY + WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE + POSSIBILITY OF SUCH DAMAGE. + +License: BSD-3-clause + Redistribution and use in source and binary forms, with or without + modification, are permitted provided that the following conditions + are met: + . + 1. Redistributions of source code must retain the above copyright + notice, this list of conditions and the following disclaimer. + . + 2. Redistributions in binary form must reproduce the above copyright + notice, this list of conditions and the following disclaimer in the + documentation and/or other materials provided with the distribution. + . + 3. Neither the name of the copyright holder nor the names of its + contributors may be used to endorse or promote products derived from + this software without specific prior written permission. + . + THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS + "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT + LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR + A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT + HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, + INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, + BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS + OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED + AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT + LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY + WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE + POSSIBILITY OF SUCH DAMAGE. + +License: BSD-4-clause + Redistribution and use in source and binary forms, with or without + modification, are permitted provided that the following conditions + are met: + . + 1. Redistributions of source code must retain the above copyright + notice, this list of conditions and the following disclaimer. + . + 2. Redistributions in binary form must reproduce the above copyright + notice, this list of conditions and the following disclaimer in the + documentation and/or other materials provided with the distribution. + . + 3. All advertising materials mentioning features or use of this + software must display the following acknowledgement: This product + includes software developed by the the organization . + . + 4. Neither the name of the copyright holder nor the names of its + contributors may be used to endorse or promote products derived from + this software without specific prior written permission. + . + THIS SOFTWARE IS PROVIDED BY COPYRIGHT HOLDER "AS IS" AND ANY EXPRESS + OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED + WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE + ARE DISCLAIMED. IN NO EVENT SHALL COPYRIGHT HOLDER BE LIABLE FOR ANY + DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL + DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE + GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS + INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER + IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR + OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN + IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. + +License: MPL-2.0 + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. + . + On Debian systems, the full copy of MPL-2.0 can be found at + /usr/share/common-licenses/MPL-2.0 diff --git a/content/cumulus-linux-43/Whats-New/licenses/curl-dbgsym.txt b/content/cumulus-linux-43/Whats-New/licenses/curl-dbgsym.txt new file mode 100644 index 0000000000..992ef45a13 --- /dev/null +++ b/content/cumulus-linux-43/Whats-New/licenses/curl-dbgsym.txt @@ -0,0 +1 @@ +curl-dbgsym has no copyright file diff --git a/content/cumulus-linux-43/Whats-New/licenses/grub-efi-amd64-signed-template.txt b/content/cumulus-linux-43/Whats-New/licenses/grub-efi-amd64-signed-template.txt index a6caeb5296..20be383284 100644 --- a/content/cumulus-linux-43/Whats-New/licenses/grub-efi-amd64-signed-template.txt +++ b/content/cumulus-linux-43/Whats-New/licenses/grub-efi-amd64-signed-template.txt @@ -1,7 +1,6 @@ Format: https://www.debian.org/doc/packaging-manuals/copyright-format/1.0/ Upstream-Name: GNU GRUB Source: https://www.gnu.org/software/grub/ -Files-Excluded: grub-core/lib/libgcrypt*/cipher/crc.c Files: * Copyright: 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009 Free Software Foundation, Inc @@ -10,9 +9,9 @@ License: GPL-3+ Files: debian/* Copyright: 2003, 2004, 2005, 2006, 2007, 2008, 2009, Robert Millan - 2005, 2006, 2007, Otavio Salvador - 2008, 2009, Felix Zielcke - 2009, Jordi Mallach + 2005, 2006, 2007, Otavio Salvador + 2008, 2009, Felix Zielcke + 2009, Jordi Mallach License: GPL-3+ Files: debian/grub-extras/* @@ -163,21 +162,21 @@ License: CC-BY-SA-3.0 to Distribute and Publicly Perform Adaptations. . For the avoidance of doubt: - Non-waivable Compulsory License Schemes. In those jurisdictions in - which the right to collect royalties through any statutory or - compulsory licensing scheme cannot be waived, the Licensor reserves - the exclusive right to collect such royalties for any exercise by - You of the rights granted under this License; - Waivable Compulsory License Schemes. In those jurisdictions in which - the right to collect royalties through any statutory or compulsory - licensing scheme can be waived, the Licensor waives the exclusive - right to collect such royalties for any exercise by You of the - rights granted under this License; and, - Voluntary License Schemes. The Licensor waives the right to collect - royalties, whether individually or, in the event that the Licensor - is a member of a collecting society that administers voluntary - licensing schemes, via that society, from any exercise by You of the - rights granted under this License. + Non-waivable Compulsory License Schemes. In those jurisdictions in + which the right to collect royalties through any statutory or + compulsory licensing scheme cannot be waived, the Licensor reserves + the exclusive right to collect such royalties for any exercise by + You of the rights granted under this License; + Waivable Compulsory License Schemes. In those jurisdictions in which + the right to collect royalties through any statutory or compulsory + licensing scheme can be waived, the Licensor waives the exclusive + right to collect such royalties for any exercise by You of the + rights granted under this License; and, + Voluntary License Schemes. The Licensor waives the right to collect + royalties, whether individually or, in the event that the Licensor + is a member of a collecting society that administers voluntary + licensing schemes, via that society, from any exercise by You of the + rights granted under this License. . The above rights may be exercised in all media and formats whether now known or hereafter devised. The above rights include the right to make such diff --git a/content/cumulus-linux-43/Whats-New/licenses/grub2-common.txt b/content/cumulus-linux-43/Whats-New/licenses/grub2-common.txt index 19e2ee0d81..a6caeb5296 100644 --- a/content/cumulus-linux-43/Whats-New/licenses/grub2-common.txt +++ b/content/cumulus-linux-43/Whats-New/licenses/grub2-common.txt @@ -1 +1,376 @@ -grub2-common has no copyright file +Format: https://www.debian.org/doc/packaging-manuals/copyright-format/1.0/ +Upstream-Name: GNU GRUB +Source: https://www.gnu.org/software/grub/ +Files-Excluded: grub-core/lib/libgcrypt*/cipher/crc.c + +Files: * +Copyright: 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009 Free Software Foundation, Inc +License: GPL-3+ + + +Files: debian/* +Copyright: 2003, 2004, 2005, 2006, 2007, 2008, 2009, Robert Millan + 2005, 2006, 2007, Otavio Salvador + 2008, 2009, Felix Zielcke + 2009, Jordi Mallach +License: GPL-3+ + +Files: debian/grub-extras/* +Copyright: Nathan Coulson + 2003, 2007 Free Software Foundation, Inc + 2003 NIIBE Yutaka +License: GPL-3+ + +Files: themes/starfield/* +Copyright: 2012 Free Software Foundation, Inc +License: CC-BY-SA-3.0 + +Files: themes/starfield/theme.txt +Copyright: 2011 Daniel Tschudi +License: Expat + +License: GPL-3+ + On Debian systems the full text of the GNU General Public + License can be found in the `/usr/share/common-licenses/GPL-3' + file. + +License: CC-BY-SA-3.0 + CREATIVE COMMONS CORPORATION IS NOT A LAW FIRM AND DOES NOT PROVIDE LEGAL + SERVICES. DISTRIBUTION OF THIS LICENSE DOES NOT CREATE AN ATTORNEY-CLIENT + RELATIONSHIP. CREATIVE COMMONS PROVIDES THIS INFORMATION ON AN "AS-IS" + BASIS. CREATIVE COMMONS MAKES NO WARRANTIES REGARDING THE INFORMATION + PROVIDED, AND DISCLAIMS LIABILITY FOR DAMAGES RESULTING FROM ITS USE. + . + License + . + THE WORK (AS DEFINED BELOW) IS PROVIDED UNDER THE TERMS OF THIS CREATIVE + COMMONS PUBLIC LICENSE ("CCPL" OR "LICENSE"). THE WORK IS PROTECTED BY + COPYRIGHT AND/OR OTHER APPLICABLE LAW. ANY USE OF THE WORK OTHER THAN AS + AUTHORIZED UNDER THIS LICENSE OR COPYRIGHT LAW IS PROHIBITED. + . + BY EXERCISING ANY RIGHTS TO THE WORK PROVIDED HERE, YOU ACCEPT AND AGREE TO + BE BOUND BY THE TERMS OF THIS LICENSE. TO THE EXTENT THIS LICENSE MAY BE + CONSIDERED TO BE A CONTRACT, THE LICENSOR GRANTS YOU THE RIGHTS CONTAINED + HERE IN CONSIDERATION OF YOUR ACCEPTANCE OF SUCH TERMS AND CONDITIONS. + . + 1. Definitions + "Adaptation" means a work based upon the Work, or upon the Work and + other pre-existing works, such as a translation, adaptation, derivative + work, arrangement of music or other alterations of a literary or + artistic work, or phonogram or performance and includes cinematographic + adaptations or any other form in which the Work may be recast, + transformed, or adapted including in any form recognizably derived from + the original, except that a work that constitutes a Collection will not + be considered an Adaptation for the purpose of this License. For the + avoidance of doubt, where the Work is a musical work, performance or + phonogram, the synchronization of the Work in timed-relation with a + moving image ("synching") will be considered an Adaptation for the + purpose of this License. + "Collection" means a collection of literary or artistic works, such as + encyclopedias and anthologies, or performances, phonograms or + broadcasts, or other works or subject matter other than works listed in + Section 1(f) below, which, by reason of the selection and arrangement of + their contents, constitute intellectual creations, in which the Work is + included in its entirety in unmodified form along with one or more other + contributions, each constituting separate and independent works in + themselves, which together are assembled into a collective whole. A work + that constitutes a Collection will not be considered an Adaptation (as + defined below) for the purposes of this License. + "Creative Commons Compatible License" means a license that is listed at + http://creativecommons.org/compatiblelicenses that has been approved by + Creative Commons as being essentially equivalent to this License, + including, at a minimum, because that license: (i) contains terms that + have the same purpose, meaning and effect as the License Elements of + this License; and, (ii) explicitly permits the relicensing of + adaptations of works made available under that license under this + License or a Creative Commons jurisdiction license with the same License + Elements as this License. + "Distribute" means to make available to the public the original and + copies of the Work or Adaptation, as appropriate, through sale or other + transfer of ownership. + "License Elements" means the following high-level license attributes as + selected by Licensor and indicated in the title of this License: + Attribution, ShareAlike. + "Licensor" means the individual, individuals, entity or entities that + offer(s) the Work under the terms of this License. + "Original Author" means, in the case of a literary or artistic work, the + individual, individuals, entity or entities who created the Work or if + no individual or entity can be identified, the publisher; and in + addition (i) in the case of a performance the actors, singers, + musicians, dancers, and other persons who act, sing, deliver, declaim, + play in, interpret or otherwise perform literary or artistic works or + expressions of folklore; (ii) in the case of a phonogram the producer + being the person or legal entity who first fixes the sounds of a + performance or other sounds; and, (iii) in the case of broadcasts, the + organization that transmits the broadcast. + "Work" means the literary and/or artistic work offered under the terms + of this License including without limitation any production in the + literary, scientific and artistic domain, whatever may be the mode or + form of its expression including digital form, such as a book, pamphlet + and other writing; a lecture, address, sermon or other work of the same + nature; a dramatic or dramatico-musical work; a choreographic work or + entertainment in dumb show; a musical composition with or without words; + a cinematographic work to which are assimilated works expressed by a + process analogous to cinematography; a work of drawing, painting, + architecture, sculpture, engraving or lithography; a photographic work + to which are assimilated works expressed by a process analogous to + photography; a work of applied art; an illustration, map, plan, sketch + or three-dimensional work relative to geography, topography, + architecture or science; a performance; a broadcast; a phonogram; a + compilation of data to the extent it is protected as a copyrightable + work; or a work performed by a variety or circus performer to the extent + it is not otherwise considered a literary or artistic work. + "You" means an individual or entity exercising rights under this License + who has not previously violated the terms of this License with respect + to the Work, or who has received express permission from the Licensor to + exercise rights under this License despite a previous violation. + "Publicly Perform" means to perform public recitations of the Work and + to communicate to the public those public recitations, by any means or + process, including by wire or wireless means or public digital + performances; to make available to the public Works in such a way that + members of the public may access these Works from a place and at a place + individually chosen by them; to perform the Work to the public by any + means or process and the communication to the public of the performances + of the Work, including by public digital performance; to broadcast and + rebroadcast the Work by any means including signs, sounds or images. + "Reproduce" means to make copies of the Work by any means including + without limitation by sound or visual recordings and the right of + fixation and reproducing fixations of the Work, including storage of a + protected performance or phonogram in digital form or other electronic + medium. + . + 2. Fair Dealing Rights. Nothing in this License is intended to reduce, + limit, or restrict any uses free from copyright or rights arising from + limitations or exceptions that are provided for in connection with the + copyright protection under copyright law or other applicable laws. + . + 3. License Grant. Subject to the terms and conditions of this License, + Licensor hereby grants You a worldwide, royalty-free, non-exclusive, + perpetual (for the duration of the applicable copyright) license to + exercise the rights in the Work as stated below: + . + to Reproduce the Work, to incorporate the Work into one or more + Collections, and to Reproduce the Work as incorporated in the + Collections; + to create and Reproduce Adaptations provided that any such Adaptation, + including any translation in any medium, takes reasonable steps to + clearly label, demarcate or otherwise identify that changes were made to + the original Work. For example, a translation could be marked "The + original work was translated from English to Spanish," or a modification + could indicate "The original work has been modified."; + to Distribute and Publicly Perform the Work including as incorporated in + Collections; and, + to Distribute and Publicly Perform Adaptations. + . + For the avoidance of doubt: + Non-waivable Compulsory License Schemes. In those jurisdictions in + which the right to collect royalties through any statutory or + compulsory licensing scheme cannot be waived, the Licensor reserves + the exclusive right to collect such royalties for any exercise by + You of the rights granted under this License; + Waivable Compulsory License Schemes. In those jurisdictions in which + the right to collect royalties through any statutory or compulsory + licensing scheme can be waived, the Licensor waives the exclusive + right to collect such royalties for any exercise by You of the + rights granted under this License; and, + Voluntary License Schemes. The Licensor waives the right to collect + royalties, whether individually or, in the event that the Licensor + is a member of a collecting society that administers voluntary + licensing schemes, via that society, from any exercise by You of the + rights granted under this License. + . + The above rights may be exercised in all media and formats whether now + known or hereafter devised. The above rights include the right to make such + modifications as are technically necessary to exercise the rights in other + media and formats. Subject to Section 8(f), all rights not expressly + granted by Licensor are hereby reserved. + . + 4. Restrictions. The license granted in Section 3 above is expressly made + subject to and limited by the following restrictions: + . + You may Distribute or Publicly Perform the Work only under the terms of + this License. You must include a copy of, or the Uniform Resource + Identifier (URI) for, this License with every copy of the Work You + Distribute or Publicly Perform. You may not offer or impose any terms on + the Work that restrict the terms of this License or the ability of the + recipient of the Work to exercise the rights granted to that recipient + under the terms of the License. You may not sublicense the Work. You + must keep intact all notices that refer to this License and to the + disclaimer of warranties with every copy of the Work You Distribute or + Publicly Perform. When You Distribute or Publicly Perform the Work, You + may not impose any effective technological measures on the Work that + restrict the ability of a recipient of the Work from You to exercise the + rights granted to that recipient under the terms of the License. This + Section 4(a) applies to the Work as incorporated in a Collection, but + this does not require the Collection apart from the Work itself to be + made subject to the terms of this License. If You create a Collection, + upon notice from any Licensor You must, to the extent practicable, + remove from the Collection any credit as required by Section 4(c), as + requested. If You create an Adaptation, upon notice from any Licensor + You must, to the extent practicable, remove from the Adaptation any + credit as required by Section 4(c), as requested. + You may Distribute or Publicly Perform an Adaptation only under the + terms of: (i) this License; (ii) a later version of this License with + the same License Elements as this License; (iii) a Creative Commons + jurisdiction license (either this or a later license version) that + contains the same License Elements as this License (e.g., + Attribution-ShareAlike 3.0 US)); (iv) a Creative Commons Compatible + License. If you license the Adaptation under one of the licenses + mentioned in (iv), you must comply with the terms of that license. If + you license the Adaptation under the terms of any of the licenses + mentioned in (i), (ii) or (iii) (the "Applicable License"), you must + comply with the terms of the Applicable License generally and the + following provisions: (I) You must include a copy of, or the URI for, + the Applicable License with every copy of each Adaptation You Distribute + or Publicly Perform; (II) You may not offer or impose any terms on the + Adaptation that restrict the terms of the Applicable License or the + ability of the recipient of the Adaptation to exercise the rights + granted to that recipient under the terms of the Applicable License; + (III) You must keep intact all notices that refer to the Applicable + License and to the disclaimer of warranties with every copy of the Work + as included in the Adaptation You Distribute or Publicly Perform; (IV) + when You Distribute or Publicly Perform the Adaptation, You may not + impose any effective technological measures on the Adaptation that + restrict the ability of a recipient of the Adaptation from You to + exercise the rights granted to that recipient under the terms of the + Applicable License. This Section 4(b) applies to the Adaptation as + incorporated in a Collection, but this does not require the Collection + apart from the Adaptation itself to be made subject to the terms of the + Applicable License. + If You Distribute, or Publicly Perform the Work or any Adaptations or + Collections, You must, unless a request has been made pursuant to + Section 4(a), keep intact all copyright notices for the Work and + provide, reasonable to the medium or means You are utilizing: (i) the + name of the Original Author (or pseudonym, if applicable) if supplied, + and/or if the Original Author and/or Licensor designate another party or + parties (e.g., a sponsor institute, publishing entity, journal) for + attribution ("Attribution Parties") in Licensor's copyright notice, + terms of service or by other reasonable means, the name of such party or + parties; (ii) the title of the Work if supplied; (iii) to the extent + reasonably practicable, the URI, if any, that Licensor specifies to be + associated with the Work, unless such URI does not refer to the + copyright notice or licensing information for the Work; and (iv) , + consistent with Ssection 3(b), in the case of an Adaptation, a credit + identifying the use of the Work in the Adaptation (e.g., "French + translation of the Work by Original Author," or "Screenplay based on + original Work by Original Author"). The credit required by this Section + 4(c) may be implemented in any reasonable manner; provided, however, + that in the case of a Adaptation or Collection, at a minimum such credit + will appear, if a credit for all contributing authors of the Adaptation + or Collection appears, then as part of these credits and in a manner at + least as prominent as the credits for the other contributing authors. + For the avoidance of doubt, You may only use the credit required by this + Section for the purpose of attribution in the manner set out above and, + by exercising Your rights under this License, You may not implicitly or + explicitly assert or imply any connection with, sponsorship or + endorsement by the Original Author, Licensor and/or Attribution Parties, + as appropriate, of You or Your use of the Work, without the separate, + express prior written permission of the Original Author, Licensor and/or + Attribution Parties. + Except as otherwise agreed in writing by the Licensor or as may be + otherwise permitted by applicable law, if You Reproduce, Distribute or + Publicly Perform the Work either by itself or as part of any Adaptations + or Collections, You must not distort, mutilate, modify or take other + derogatory action in relation to the Work which would be prejudicial to + the Original Author's honor or reputation. Licensor agrees that in those + jurisdictions (e.g. Japan), in which any exercise of the right granted + in Section 3(b) of this License (the right to make Adaptations) would be + deemed to be a distortion, mutilation, modification or other derogatory + action prejudicial to the Original Author's honor and reputation, the + Licensor will waive or not assert, as appropriate, this Section, to the + fullest extent permitted by the applicable national law, to enable You + to reasonably exercise Your right under Section 3(b) of this License + (right to make Adaptations) but not otherwise. + . + 5. Representations, Warranties and Disclaimer + . + UNLESS OTHERWISE MUTUALLY AGREED TO BY THE PARTIES IN WRITING, LICENSOR + OFFERS THE WORK AS-IS AND MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY + KIND CONCERNING THE WORK, EXPRESS, IMPLIED, STATUTORY OR OTHERWISE, + INCLUDING, WITHOUT LIMITATION, WARRANTIES OF TITLE, MERCHANTIBILITY, + FITNESS FOR A PARTICULAR PURPOSE, NONINFRINGEMENT, OR THE ABSENCE OF LATENT + OR OTHER DEFECTS, ACCURACY, OR THE PRESENCE OF ABSENCE OF ERRORS, WHETHER + OR NOT DISCOVERABLE. SOME JURISDICTIONS DO NOT ALLOW THE EXCLUSION OF + IMPLIED WARRANTIES, SO SUCH EXCLUSION MAY NOT APPLY TO YOU. + . + 6. Limitation on Liability. EXCEPT TO THE EXTENT REQUIRED BY APPLICABLE + LAW, IN NO EVENT WILL LICENSOR BE LIABLE TO YOU ON ANY LEGAL THEORY FOR ANY + SPECIAL, INCIDENTAL, CONSEQUENTIAL, PUNITIVE OR EXEMPLARY DAMAGES ARISING + OUT OF THIS LICENSE OR THE USE OF THE WORK, EVEN IF LICENSOR HAS BEEN + ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. + . + 7. Termination + . + This License and the rights granted hereunder will terminate + automatically upon any breach by You of the terms of this License. + Individuals or entities who have received Adaptations or Collections + from You under this License, however, will not have their licenses + terminated provided such individuals or entities remain in full + compliance with those licenses. Sections 1, 2, 5, 6, 7, and 8 will + survive any termination of this License. + Subject to the above terms and conditions, the license granted here is + perpetual (for the duration of the applicable copyright in the Work). + Notwithstanding the above, Licensor reserves the right to release the + Work under different license terms or to stop distributing the Work at + any time; provided, however that any such election will not serve to + withdraw this License (or any other license that has been, or is + required to be, granted under the terms of this License), and this + License will continue in full force and effect unless terminated as + stated above. + . + 8. Miscellaneous + . + Each time You Distribute or Publicly Perform the Work or a Collection, + the Licensor offers to the recipient a license to the Work on the same + terms and conditions as the license granted to You under this License. + Each time You Distribute or Publicly Perform an Adaptation, Licensor + offers to the recipient a license to the original Work on the same terms + and conditions as the license granted to You under this License. + If any provision of this License is invalid or unenforceable under + applicable law, it shall not affect the validity or enforceability of + the remainder of the terms of this License, and without further action + by the parties to this agreement, such provision shall be reformed to + the minimum extent necessary to make such provision valid and + enforceable. + No term or provision of this License shall be deemed waived and no + breach consented to unless such waiver or consent shall be in writing + and signed by the party to be charged with such waiver or consent. + This License constitutes the entire agreement between the parties with + respect to the Work licensed here. There are no understandings, + agreements or representations with respect to the Work not specified + here. Licensor shall not be bound by any additional provisions that may + appear in any communication from You. This License may not be modified + without the mutual written agreement of the Licensor and You. + The rights granted under, and the subject matter referenced, in this + License were drafted utilizing the terminology of the Berne Convention + for the Protection of Literary and Artistic Works (as amended on + September 28, 1979), the Rome Convention of 1961, the WIPO Copyright + Treaty of 1996, the WIPO Performances and Phonograms Treaty of 1996 and + the Universal Copyright Convention (as revised on July 24, 1971). These + rights and subject matter take effect in the relevant jurisdiction in + which the License terms are sought to be enforced according to the + corresponding provisions of the implementation of those treaty + provisions in the applicable national law. If the standard suite of + rights granted under applicable copyright law includes additional rights + not granted under this License, such additional rights are deemed to be + included in the License; this License is not intended to restrict the + license of any rights under applicable law. + +License: Expat + Permission is hereby granted, free of charge, to any person obtaining a copy + of this software and associated documentation files (the "Software"), to deal + in the Software without restriction, including without limitation the rights + to use, copy, modify, merge, publish, distribute, sublicense, and/or sell + copies of the Software, and to permit persons to whom the Software is + furnished to do so, subject to the following conditions: + . + The above copyright notice and this permission notice shall be included in + all copies or substantial portions of the Software. + . + THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR + IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, + FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE + AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER + LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, + OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN + THE SOFTWARE. diff --git a/content/cumulus-linux-43/Whats-New/licenses/libbind-dev.txt b/content/cumulus-linux-43/Whats-New/licenses/libbind-dev.txt new file mode 100644 index 0000000000..3b0579c5f2 --- /dev/null +++ b/content/cumulus-linux-43/Whats-New/licenses/libbind-dev.txt @@ -0,0 +1,159 @@ +Format: https://www.debian.org/doc/packaging-manuals/copyright-format/1.0/ +Upstream-Name: BIND +Upstream-Contact: Internet Systems Consortium +Source: https://ftp.isc.org/isc/bind9/ +Files-Excluded: contrib/idn + contrib/dnsperf-2.1.0.0-1 + contrib/nslint-3.0a2 + contrib/query-loc-0.4.0 + contrib/queryperf + contrib/zkt-1.1.3 + doc/arm/Bv9ARM.pdf + +Files: * +Copyright: 2004-2017, Internet Systems Consortium, Inc. ("ISC") + 1996-2003, Internet Software Consortium + 2012, Vadim Goncharov + 2009-2012, John Eaglesham + 2008, Damien Miller + 2004, 2008, Nominet, Ltd. + 2004, Masarykova universita + 1997-2003, Kungliga Tekniska Högskolan + 2002, Nuno M. Rodrigues. + 2002, Stichting NLnet, Netherlands + 2000-2002, Japan Network Information Center. + 2001, Jake Burkholder + 1996-2001, Nominum, Inc. + 1995-2000, Network Associates, Inc. + 2000, Aaron D. Gifford + 1999-2000, Nortel Networks Corporation + 1996, David Mazieres + 1993, Digital Equipment Corporation. + 1990, 1993, The Regents of the University of California. +License: ISC and BSD-2-clause and BSD-3-clause and BSD-4-clause + +Files: bin/tests/system/chain/ + doc/misc/docbook-options.pl +Copyright: 2016-2017, Internet Systems Consortium, Inc. ("ISC") +License: MPL-2.0 or ISC + +Files: unit/atf-src/ +Copyright: 2007-2012, The NetBSD Foundation, Inc. +License: BSD-2-clause + +Files: contrib/idn/ +Copyright: 2000-2002, Japan Network Information Center +License: BSD-4-clause + +Files: debian/ +Copyright: 2007-2017 LaMont Jones + 2013-2017 Michael Gilbert + 2017 Ondřej Surý + 2008-2016 Jamie Strandboge +License: ISC or MPL-2.0 + +License: ISC + Permission to use, copy, modify, and/or distribute this software for any + purpose with or without fee is hereby granted, provided that the above + copyright notice and this permission notice appear in all copies. + . + THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH + REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY + AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT, + INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM + LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE + OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR + PERFORMANCE OF THIS SOFTWARE. + +License: BSD-2-clause + Redistribution and use in source and binary forms, with or without + modification, are permitted provided that the following conditions + are met: + . + 1. Redistributions of source code must retain the above copyright + notice, this list of conditions and the following disclaimer. + . + 2. Redistributions in binary form must reproduce the above copyright + notice, this list of conditions and the following disclaimer in the + documentation and/or other materials provided with the distribution. + . + THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS + "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT + LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR + A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT + HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, + INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, + BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS + OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED + AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT + LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY + WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE + POSSIBILITY OF SUCH DAMAGE. + +License: BSD-3-clause + Redistribution and use in source and binary forms, with or without + modification, are permitted provided that the following conditions + are met: + . + 1. Redistributions of source code must retain the above copyright + notice, this list of conditions and the following disclaimer. + . + 2. Redistributions in binary form must reproduce the above copyright + notice, this list of conditions and the following disclaimer in the + documentation and/or other materials provided with the distribution. + . + 3. Neither the name of the copyright holder nor the names of its + contributors may be used to endorse or promote products derived from + this software without specific prior written permission. + . + THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS + "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT + LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR + A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT + HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, + INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, + BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS + OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED + AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT + LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY + WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE + POSSIBILITY OF SUCH DAMAGE. + +License: BSD-4-clause + Redistribution and use in source and binary forms, with or without + modification, are permitted provided that the following conditions + are met: + . + 1. Redistributions of source code must retain the above copyright + notice, this list of conditions and the following disclaimer. + . + 2. Redistributions in binary form must reproduce the above copyright + notice, this list of conditions and the following disclaimer in the + documentation and/or other materials provided with the distribution. + . + 3. All advertising materials mentioning features or use of this + software must display the following acknowledgement: This product + includes software developed by the the organization . + . + 4. Neither the name of the copyright holder nor the names of its + contributors may be used to endorse or promote products derived from + this software without specific prior written permission. + . + THIS SOFTWARE IS PROVIDED BY COPYRIGHT HOLDER "AS IS" AND ANY EXPRESS + OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED + WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE + ARE DISCLAIMED. IN NO EVENT SHALL COPYRIGHT HOLDER BE LIABLE FOR ANY + DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL + DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE + GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS + INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER + IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR + OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN + IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. + +License: MPL-2.0 + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. + . + On Debian systems, the full copy of MPL-2.0 can be found at + /usr/share/common-licenses/MPL-2.0 diff --git a/content/cumulus-linux-43/Whats-New/licenses/libcbor0.txt b/content/cumulus-linux-43/Whats-New/licenses/libcbor0.txt new file mode 100644 index 0000000000..7e91b4b407 --- /dev/null +++ b/content/cumulus-linux-43/Whats-New/licenses/libcbor0.txt @@ -0,0 +1,54 @@ +Format: http://www.debian.org/doc/packaging-manuals/copyright-format/1.0/ +Upstream-Name: libcbor +Source: https://github.com/PJK/libcbor +Files-Excluded: docs/doxygen + +Files: * +Copyright: Copyright (c) Pavel Kalvoda, 2014-2017 +License: Expat + +Files: src/cbor/internal/unicode.c +Copyright: (c) Pavel Kalvoda, 2014, 2015 + (c) 2008-2009 Bjoern Hoehrmann +License: Expat + +Files: docs/stylesheets/github-light.css +Copyright: 2014 GitHub Inc +License: Apache-2.0 + Licensed under the Apache License, Version 2.0 (the "License"); + you may not use this file except in compliance with the License. + You may obtain a copy of the License at + . + http://www.apache.org/licenses/LICENSE-2.0 + . + Unless required by applicable law or agreed to in writing, software + distributed under the License is distributed on an "AS IS" BASIS, + WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + See the License for the specific language governing permissions and + limitations under the License. + . + On Debian systems, the full license can be found in + /usr/share/common-licenses/Apache-2.0. + +Files: debian/* +Copyright: 2015 Vincent Bernat +License: Expat + +License: Expat + Permission is hereby granted, free of charge, to any person obtaining a copy + of this software and associated documentation files (the "Software"), to deal + in the Software without restriction, including without limitation the rights + to use, copy, modify, merge, publish, distribute, sublicense, and/or sell + copies of the Software, and to permit persons to whom the Software is + furnished to do so, subject to the following conditions: + . + The above copyright notice and this permission notice shall be included in + all copies or substantial portions of the Software. + . + THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR + IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, + FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE + AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER + LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, + OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN + THE SOFTWARE. diff --git a/content/cumulus-linux-43/Whats-New/licenses/libcurl3-nss-dbgsym.txt b/content/cumulus-linux-43/Whats-New/licenses/libcurl3-nss-dbgsym.txt new file mode 100644 index 0000000000..79b92944ca --- /dev/null +++ b/content/cumulus-linux-43/Whats-New/licenses/libcurl3-nss-dbgsym.txt @@ -0,0 +1 @@ +libcurl3-nss-dbgsym has no copyright file diff --git a/content/cumulus-linux-43/Whats-New/licenses/libcurl3-nss.txt b/content/cumulus-linux-43/Whats-New/licenses/libcurl3-nss.txt new file mode 100644 index 0000000000..fa6f07daa9 --- /dev/null +++ b/content/cumulus-linux-43/Whats-New/licenses/libcurl3-nss.txt @@ -0,0 +1,241 @@ +Format: https://www.debian.org/doc/packaging-manuals/copyright-format/1.0/ +Upstream-Name: curl +Source: http://curl.haxx.se + +Files: * +Copyright: 1996-2015, Daniel Stenberg +License: curl + +Files: lib/vtls/darwinssl.* +Copyright: 2012-2014, Nick Zitzmann + 2012-2015, Daniel Stenberg +License: curl + +Files: lib/curl_rtmp.* +Copyright: 2010, Howard Chu +License: curl + +Files: lib/vtls/schannel.* +Copyright: 2012-2014, Marc Hoersken + 2012, Mark Salisbury + 2012-2015, Daniel Stenberg +License: curl + +Files: lib/inet_pton.c + lib/inet_ntop.c +Copyright: 1996-2001 Internet Software Consortium +License: ISC + +Files: lib/krb5.c + lib/security.c +Copyright: 2004-2015 Daniel Stenberg + 1995-1999 Kungliga Tekniska Högskolan +License: BSD-3-Clause + +Files: lib/md4.c +Copyright: 2001, Solar Designer +License: public-domain + +Files: lib/openldap.* +Copyright: 2011-2015, Daniel Stenberg + 2010, Howard Chu +License: curl + +Files: lib/vtls/polarssl.* +Copyright: 2010-2011, Hoi-Ho Chan + 2012-2015, Daniel Stenberg +License: curl + +Files: lib/socks_gssapi.c + lib/socks_sspi.* +Copyright: 2009, 2011, Markus Moeller, + 2012-2015, Daniel Stenberg, +License: curl + +Files: tests/certs/scripts/genroot.sh + tests/certs/scripts/genserv.sh +Copyright: 2000-2009, EdelWeb for EdelKey and OpenEvidence +License: curl + +Files: tests/server/tftpd.c +Copyright: 1983 Regents of the University of California +License: BSD-4-Clause + +Files: tests/server/fake_ntlm.c +Copyright: 2010, Mandy Wu + 2011-2013, Daniel Stenberg +License: curl + +Files: docs/examples/fopen.c +Copyright: 2003, Simtec Electronics +License: BSD-3-Clause + +Files: docs/examples/rtsp.c +Copyright: 2011, Jim Hollinger +License: BSD-3-Clause + +Files: docs/examples/curlgtk.c +Copyright: 2003, The OpenEvidence Project +License: curl + +Files: docs/examples/curlx.c +Copyright: 2003, The OpenEvidence Project +License: other + Redistribution and use in source and binary forms, with or without + modification, are permitted provided that the following conditions + are met: + . + 1. Redistributions of source code must retain the above copyright + notice, this list of conditions, the following disclaimer, + and the original OpenSSL and SSLeay Licences below. + . + 2. Redistributions in binary form must reproduce the above copyright + notice, this list of conditions, the following disclaimer + and the original OpenSSL and SSLeay Licences below in + the documentation and/or other materials provided with the + distribution. + . + 3. All advertising materials mentioning features or use of this + software must display the following acknowledgments: + "This product includes software developed by the Openevidence Project + for use in the OpenEvidence Toolkit. (http://www.openevidence.org/)" + This product includes software developed by the OpenSSL Project + for use in the OpenSSL Toolkit (http://www.openssl.org/)" + This product includes cryptographic software written by Eric Young + (eay@cryptsoft.com). This product includes software written by Tim + Hudson (tjh@cryptsoft.com)." + . + 4. The names "OpenEvidence Toolkit" and "OpenEvidence Project" must not be + used to endorse or promote products derived from this software without + prior written permission. For written permission, please contact + openevidence-core@openevidence.org. + . + 5. Products derived from this software may not be called "OpenEvidence" + nor may "OpenEvidence" appear in their names without prior written + permission of the OpenEvidence Project. + . + 6. Redistributions of any form whatsoever must retain the following + acknowledgments: + "This product includes software developed by the OpenEvidence Project + for use in the OpenEvidence Toolkit (http://www.openevidence.org/) + This product includes software developed by the OpenSSL Project + for use in the OpenSSL Toolkit (http://www.openssl.org/)" + This product includes cryptographic software written by Eric Young + (eay@cryptsoft.com). This product includes software written by Tim + Hudson (tjh@cryptsoft.com)." + . + THIS SOFTWARE IS PROVIDED BY THE OpenEvidence PROJECT ``AS IS'' AND ANY + EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE + IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR + PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenEvidence PROJECT OR + ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, + SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT + NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; + LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) + HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, + STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) + ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED + OF THE POSSIBILITY OF SUCH DAMAGE. + +Files: src/macos/src/macos_main.cpp +Copyright: 2001, Eric Lavigne +License: other + Permission is granted to anyone to use this software for any purpose on any computer system, and to redistribute it freely, subject to the following restrictions: - The author is not responsible for the consequences of use of this software, no matter how awful, even if they arise from defects in it. - The origin of this software must not be misrepresented, either by explicit claim or by omission. - You are allowed to distributed modified copies of the software, in source and binary form, provided they are marked plainly as altered versions, and are not misrepresented as being the original software. + +Files: debian/* +Copyright: 2000-2010, Domenico Andreoli + 2010-2011, Ramakrishnan Muthukrishnan + 2011, Alessandro Ghedini +License: curl + +License: curl + All rights reserved. + . + Permission to use, copy, modify, and distribute this software for any purpose + with or without fee is hereby granted, provided that the above copyright + notice and this permission notice appear in all copies. + . + THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR + IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, + FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS. IN + NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, + DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR + OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE + OR OTHER DEALINGS IN THE SOFTWARE. + . + Except as contained in this notice, the name of a copyright holder shall not + be used in advertising or otherwise to promote the sale, use or other dealings + in this Software without prior written authorization of the copyright holder. + +License: BSD-3-Clause + Redistribution and use in source and binary forms, with or without + modification, are permitted provided that the following conditions + are met: + . + 1. Redistributions of source code must retain the above copyright + notice, this list of conditions and the following disclaimer. + . + 2. Redistributions in binary form must reproduce the above copyright + notice, this list of conditions and the following disclaimer in the + documentation and/or other materials provided with the distribution. + . + 3. Neither the name of the Institute nor the names of its contributors + may be used to endorse or promote products derived from this software + without specific prior written permission. + . + THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND + ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE + IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE + ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE + FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL + DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS + OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) + HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT + LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY + OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF + SUCH DAMAGE. + +License: BSD-4-Clause + Redistribution and use in source and binary forms, with or without + modification, are permitted provided that the following conditions + are met: + . + 1. Redistributions of source code must retain the above copyright + notice, this list of conditions and the following disclaimer. + . + 2. Redistributions in binary form must reproduce the above copyright + notice, this list of conditions and the following disclaimer in the + documentation and/or other materials provided with the distribution. + . + 3. Neither the name of the Institute nor the names of its contributors + may be used to endorse or promote products derived from this software + without specific prior written permission. + . + 4. Neither the name of the nor the + names of its contributors may be used to endorse or promote products + derived from this software without specific prior written permission. + . + THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND + ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE + IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE + ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE + FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL + DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS + OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) + HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT + LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY + OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF + SUCH DAMAGE. + +License: ISC + Permission to use, copy, modify, and/or distribute this software for any + purpose with or without fee is hereby granted, provided that the above + copyright notice and this permission notice appear in all copies. + . + THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES + WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF + MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR + ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES + WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN + ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF + OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. diff --git a/content/cumulus-linux-43/Whats-New/licenses/libcurl4-doc.txt b/content/cumulus-linux-43/Whats-New/licenses/libcurl4-doc.txt new file mode 100644 index 0000000000..fa6f07daa9 --- /dev/null +++ b/content/cumulus-linux-43/Whats-New/licenses/libcurl4-doc.txt @@ -0,0 +1,241 @@ +Format: https://www.debian.org/doc/packaging-manuals/copyright-format/1.0/ +Upstream-Name: curl +Source: http://curl.haxx.se + +Files: * +Copyright: 1996-2015, Daniel Stenberg +License: curl + +Files: lib/vtls/darwinssl.* +Copyright: 2012-2014, Nick Zitzmann + 2012-2015, Daniel Stenberg +License: curl + +Files: lib/curl_rtmp.* +Copyright: 2010, Howard Chu +License: curl + +Files: lib/vtls/schannel.* +Copyright: 2012-2014, Marc Hoersken + 2012, Mark Salisbury + 2012-2015, Daniel Stenberg +License: curl + +Files: lib/inet_pton.c + lib/inet_ntop.c +Copyright: 1996-2001 Internet Software Consortium +License: ISC + +Files: lib/krb5.c + lib/security.c +Copyright: 2004-2015 Daniel Stenberg + 1995-1999 Kungliga Tekniska Högskolan +License: BSD-3-Clause + +Files: lib/md4.c +Copyright: 2001, Solar Designer +License: public-domain + +Files: lib/openldap.* +Copyright: 2011-2015, Daniel Stenberg + 2010, Howard Chu +License: curl + +Files: lib/vtls/polarssl.* +Copyright: 2010-2011, Hoi-Ho Chan + 2012-2015, Daniel Stenberg +License: curl + +Files: lib/socks_gssapi.c + lib/socks_sspi.* +Copyright: 2009, 2011, Markus Moeller, + 2012-2015, Daniel Stenberg, +License: curl + +Files: tests/certs/scripts/genroot.sh + tests/certs/scripts/genserv.sh +Copyright: 2000-2009, EdelWeb for EdelKey and OpenEvidence +License: curl + +Files: tests/server/tftpd.c +Copyright: 1983 Regents of the University of California +License: BSD-4-Clause + +Files: tests/server/fake_ntlm.c +Copyright: 2010, Mandy Wu + 2011-2013, Daniel Stenberg +License: curl + +Files: docs/examples/fopen.c +Copyright: 2003, Simtec Electronics +License: BSD-3-Clause + +Files: docs/examples/rtsp.c +Copyright: 2011, Jim Hollinger +License: BSD-3-Clause + +Files: docs/examples/curlgtk.c +Copyright: 2003, The OpenEvidence Project +License: curl + +Files: docs/examples/curlx.c +Copyright: 2003, The OpenEvidence Project +License: other + Redistribution and use in source and binary forms, with or without + modification, are permitted provided that the following conditions + are met: + . + 1. Redistributions of source code must retain the above copyright + notice, this list of conditions, the following disclaimer, + and the original OpenSSL and SSLeay Licences below. + . + 2. Redistributions in binary form must reproduce the above copyright + notice, this list of conditions, the following disclaimer + and the original OpenSSL and SSLeay Licences below in + the documentation and/or other materials provided with the + distribution. + . + 3. All advertising materials mentioning features or use of this + software must display the following acknowledgments: + "This product includes software developed by the Openevidence Project + for use in the OpenEvidence Toolkit. (http://www.openevidence.org/)" + This product includes software developed by the OpenSSL Project + for use in the OpenSSL Toolkit (http://www.openssl.org/)" + This product includes cryptographic software written by Eric Young + (eay@cryptsoft.com). This product includes software written by Tim + Hudson (tjh@cryptsoft.com)." + . + 4. The names "OpenEvidence Toolkit" and "OpenEvidence Project" must not be + used to endorse or promote products derived from this software without + prior written permission. For written permission, please contact + openevidence-core@openevidence.org. + . + 5. Products derived from this software may not be called "OpenEvidence" + nor may "OpenEvidence" appear in their names without prior written + permission of the OpenEvidence Project. + . + 6. Redistributions of any form whatsoever must retain the following + acknowledgments: + "This product includes software developed by the OpenEvidence Project + for use in the OpenEvidence Toolkit (http://www.openevidence.org/) + This product includes software developed by the OpenSSL Project + for use in the OpenSSL Toolkit (http://www.openssl.org/)" + This product includes cryptographic software written by Eric Young + (eay@cryptsoft.com). This product includes software written by Tim + Hudson (tjh@cryptsoft.com)." + . + THIS SOFTWARE IS PROVIDED BY THE OpenEvidence PROJECT ``AS IS'' AND ANY + EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE + IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR + PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenEvidence PROJECT OR + ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, + SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT + NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; + LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) + HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, + STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) + ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED + OF THE POSSIBILITY OF SUCH DAMAGE. + +Files: src/macos/src/macos_main.cpp +Copyright: 2001, Eric Lavigne +License: other + Permission is granted to anyone to use this software for any purpose on any computer system, and to redistribute it freely, subject to the following restrictions: - The author is not responsible for the consequences of use of this software, no matter how awful, even if they arise from defects in it. - The origin of this software must not be misrepresented, either by explicit claim or by omission. - You are allowed to distributed modified copies of the software, in source and binary form, provided they are marked plainly as altered versions, and are not misrepresented as being the original software. + +Files: debian/* +Copyright: 2000-2010, Domenico Andreoli + 2010-2011, Ramakrishnan Muthukrishnan + 2011, Alessandro Ghedini +License: curl + +License: curl + All rights reserved. + . + Permission to use, copy, modify, and distribute this software for any purpose + with or without fee is hereby granted, provided that the above copyright + notice and this permission notice appear in all copies. + . + THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR + IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, + FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS. IN + NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, + DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR + OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE + OR OTHER DEALINGS IN THE SOFTWARE. + . + Except as contained in this notice, the name of a copyright holder shall not + be used in advertising or otherwise to promote the sale, use or other dealings + in this Software without prior written authorization of the copyright holder. + +License: BSD-3-Clause + Redistribution and use in source and binary forms, with or without + modification, are permitted provided that the following conditions + are met: + . + 1. Redistributions of source code must retain the above copyright + notice, this list of conditions and the following disclaimer. + . + 2. Redistributions in binary form must reproduce the above copyright + notice, this list of conditions and the following disclaimer in the + documentation and/or other materials provided with the distribution. + . + 3. Neither the name of the Institute nor the names of its contributors + may be used to endorse or promote products derived from this software + without specific prior written permission. + . + THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND + ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE + IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE + ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE + FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL + DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS + OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) + HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT + LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY + OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF + SUCH DAMAGE. + +License: BSD-4-Clause + Redistribution and use in source and binary forms, with or without + modification, are permitted provided that the following conditions + are met: + . + 1. Redistributions of source code must retain the above copyright + notice, this list of conditions and the following disclaimer. + . + 2. Redistributions in binary form must reproduce the above copyright + notice, this list of conditions and the following disclaimer in the + documentation and/or other materials provided with the distribution. + . + 3. Neither the name of the Institute nor the names of its contributors + may be used to endorse or promote products derived from this software + without specific prior written permission. + . + 4. Neither the name of the nor the + names of its contributors may be used to endorse or promote products + derived from this software without specific prior written permission. + . + THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND + ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE + IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE + ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE + FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL + DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS + OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) + HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT + LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY + OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF + SUCH DAMAGE. + +License: ISC + Permission to use, copy, modify, and/or distribute this software for any + purpose with or without fee is hereby granted, provided that the above + copyright notice and this permission notice appear in all copies. + . + THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES + WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF + MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR + ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES + WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN + ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF + OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. diff --git a/content/cumulus-linux-43/Whats-New/licenses/libfido2-1.txt b/content/cumulus-linux-43/Whats-New/licenses/libfido2-1.txt new file mode 100644 index 0000000000..f1469c1089 --- /dev/null +++ b/content/cumulus-linux-43/Whats-New/licenses/libfido2-1.txt @@ -0,0 +1,91 @@ +Format: https://www.debian.org/doc/packaging-manuals/copyright-format/1.0/ +Upstream-Name: libfido2 +Upstream-Contact: Yubico Open Source Maintainers +Source: https://github.com/yubico/libfido2 + +Files: * +Copyright: 2018-2019 Yubico AB +License: BSD-2-clause + +Files: debian/* +Copyright: 2018-2019 Yubico AB + 2020 nicoo +License: BSD-2-clause + +Files: openbsd-compat/strlcpy.c openbsd-compat/strlcat.c +Copyright: 1998 Todd C. Miller +License: ISC + +Files: openbsd-compat/timingsafe_bcmp.c +Copyright: 2010 Damien Miller +License: ISC + +Files: + openbsd-compat/bsd-getpagesize.c + openbsd-compat/err.h + openbsd-compat/explicit_bzero.c + openbsd-compat/explicit_bzero_win32.c + openbsd-compat/types.h +Copyright: Public domain +License: public-domain + +Files: openbsd-compat/recallocarray.c +Copyright: 2008, 2017 Otto Moerbeek +License: ISC + +Files: openbsd-compat/readpassphrase.h +Copyright: 2000, 2002 Todd C. Miller +License: ISC + +Files: openbsd-compat/readpassphrase.c +Copyright: 2000-2002, 2007, 2010 Todd C. Miller +License: ISC + +Files: openbsd-compat/getopt.h +Copyright: 2000 The NetBSD Foundation, Inc. All rights reserved. +License: BSD-2-clause + +Files: openbsd-compat/getopt_long.c +Copyright: 2002 Todd C. Miller + 2000 The NetBSD Foundation, Inc. All rights reserved. +License: ISC and BSD-2-clause + +License: BSD-2-clause + Redistribution and use in source and binary forms, with or without + modification, are permitted provided that the following conditions are + met: + . + 1. Redistributions of source code must retain the above copyright + notice, this list of conditions and the following disclaimer. + 2. Redistributions in binary form must reproduce the above copyright + notice, this list of conditions and the following disclaimer in + the documentation and/or other materials provided with the + distribution. + . + THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS + "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT + LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR + A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT + HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, + SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT + LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, + DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY + THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT + (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE + OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. + +License: public-domain + Public domain. + +License: ISC + Permission to use, copy, modify, and distribute this software for any + purpose with or without fee is hereby granted, provided that the above + copyright notice and this permission notice appear in all copies. + . + THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES + WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF + MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR + ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES + WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN + ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF + OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. diff --git a/content/cumulus-linux-43/Whats-New/licenses/libkrb5-dbg.txt b/content/cumulus-linux-43/Whats-New/licenses/libkrb5-dbg.txt new file mode 100644 index 0000000000..a36e7d2e5e --- /dev/null +++ b/content/cumulus-linux-43/Whats-New/licenses/libkrb5-dbg.txt @@ -0,0 +1,1338 @@ +This package was debianized by Sam Hartman on +Thu, 19 Oct 2000 16:05:06 -0400. + +It was downloaded from: + + + +Upstream Maintainers: + + MIT Kerberos Team + +Copyright: + +Copyright (C) 1985-2018 by the Massachusetts Institute of Technology. + +All rights reserved. + +Redistribution and use in source and binary forms, with or without +modification, are permitted provided that the following conditions are +met: + +* Redistributions of source code must retain the above copyright + notice, this list of conditions and the following disclaimer. + +* Redistributions in binary form must reproduce the above copyright + notice, this list of conditions and the following disclaimer in the + documentation and/or other materials provided with the distribution. + +THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS +"AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT +LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR +A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT +HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, +SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT +LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, +DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY +THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT +(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE +OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. + +Downloading of this software may constitute an export of cryptographic +software from the United States of America that is subject to the +United States Export Administration Regulations (EAR), 15 CFR 730-774. +Additional laws or regulations may apply. It is the responsibility of +the person or entity contemplating export to comply with all +applicable export laws and regulations, including obtaining any +required license from the U.S. government. + +The U.S. government prohibits export of encryption source code to +certain countries and individuals, including, but not limited to, the +countries of Cuba, Iran, North Korea, Sudan, Syria, and residents and +nationals of those countries. + +Documentation components of this software distribution are licensed +under a Creative Commons Attribution-ShareAlike 3.0 Unported License. +(http://creativecommons.org/licenses/by-sa/3.0/) + +Individual source code files are copyright MIT, Cygnus Support, +Novell, OpenVision Technologies, Oracle, Red Hat, Sun Microsystems, +FundsXpress, and others. + +Project Athena, Athena, Athena MUSE, Discuss, Hesiod, Kerberos, Moira, +and Zephyr are trademarks of the Massachusetts Institute of Technology +(MIT). No commercial use of these trademarks may be made without +prior written permission of MIT. + +"Commercial use" means use of a name in a product or other for-profit +manner. It does NOT prevent a commercial firm from referring to the +MIT trademarks in order to convey information (although in doing so, +recognition of their trademark status should be given). + +====================================================================== + +The following copyright and permission notice applies to the +OpenVision Kerberos Administration system located in "kadmin/create", +"kadmin/dbutil", "kadmin/passwd", "kadmin/server", "lib/kadm5", and +portions of "lib/rpc": + + Copyright, OpenVision Technologies, Inc., 1993-1996, All Rights + Reserved + + WARNING: Retrieving the OpenVision Kerberos Administration system + source code, as described below, indicates your acceptance of the + following terms. If you do not agree to the following terms, do + not retrieve the OpenVision Kerberos administration system. + + You may freely use and distribute the Source Code and Object Code + compiled from it, with or without modification, but this Source + Code is provided to you "AS IS" EXCLUSIVE OF ANY WARRANTY, + INCLUDING, WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY OR + FITNESS FOR A PARTICULAR PURPOSE, OR ANY OTHER WARRANTY, WHETHER + EXPRESS OR IMPLIED. IN NO EVENT WILL OPENVISION HAVE ANY LIABILITY + FOR ANY LOST PROFITS, LOSS OF DATA OR COSTS OF PROCUREMENT OF + SUBSTITUTE GOODS OR SERVICES, OR FOR ANY SPECIAL, INDIRECT, OR + CONSEQUENTIAL DAMAGES ARISING OUT OF THIS AGREEMENT, INCLUDING, + WITHOUT LIMITATION, THOSE RESULTING FROM THE USE OF THE SOURCE + CODE, OR THE FAILURE OF THE SOURCE CODE TO PERFORM, OR FOR ANY + OTHER REASON. + + OpenVision retains all copyrights in the donated Source Code. + OpenVision also retains copyright to derivative works of the Source + Code, whether created by OpenVision or by a third party. The + OpenVision copyright notice must be preserved if derivative works + are made based on the donated Source Code. + + OpenVision Technologies, Inc. has donated this Kerberos + Administration system to MIT for inclusion in the standard Kerberos + 5 distribution. This donation underscores our commitment to + continuing Kerberos technology development and our gratitude for + the valuable work which has been performed by MIT and the Kerberos + community. + +====================================================================== + + Portions contributed by Matt Crawford "crawdad@fnal.gov" were work + performed at Fermi National Accelerator Laboratory, which is + operated by Universities Research Association, Inc., under contract + DE-AC02-76CHO3000 with the U.S. Department of Energy. + +====================================================================== + +Portions of "src/lib/crypto" have the following copyright: + + Copyright (C) 1998 by the FundsXpress, INC. + + All rights reserved. + + Export of this software from the United States of America may + require a specific license from the United States Government. + It is the responsibility of any person or organization + contemplating export to obtain such a license before exporting. + + WITHIN THAT CONSTRAINT, permission to use, copy, modify, and + distribute this software and its documentation for any purpose and + without fee is hereby granted, provided that the above copyright + notice appear in all copies and that both that copyright notice and + this permission notice appear in supporting documentation, and that + the name of FundsXpress. not be used in advertising or publicity + pertaining to distribution of the software without specific, + written prior permission. FundsXpress makes no representations + about the suitability of this software for any purpose. It is + provided "as is" without express or implied warranty. + + THIS SOFTWARE IS PROVIDED "AS IS" AND WITHOUT ANY EXPRESS OR + IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED + WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE. + +====================================================================== + +The implementation of the AES encryption algorithm in +"src/lib/crypto/builtin/aes" has the following copyright: + + Copyright (C) 2001, Dr Brian Gladman "brg@gladman.uk.net", Worcester, UK. + All rights reserved. + + LICENSE TERMS + + The free distribution and use of this software in both source and + binary form is allowed (with or without changes) provided that: + + 1. distributions of this source code include the above copyright + notice, this list of conditions and the following disclaimer; + + 2. distributions in binary form include the above copyright notice, + this list of conditions and the following disclaimer in the + documentation and/or other associated materials; + + 3. the copyright holder's name is not used to endorse products + built using this software without specific written permission. + + DISCLAIMER + + This software is provided 'as is' with no explcit or implied + warranties in respect of any properties, including, but not limited + to, correctness and fitness for purpose. + +====================================================================== + +Portions contributed by Red Hat, including the pre-authentication +plug-in framework and the NSS crypto implementation, contain the +following copyright: + + Copyright (C) 2006 Red Hat, Inc. + Portions copyright (C) 2006 Massachusetts Institute of Technology + All Rights Reserved. + + Redistribution and use in source and binary forms, with or without + modification, are permitted provided that the following conditions + are met: + + * Redistributions of source code must retain the above copyright + notice, this list of conditions and the following disclaimer. + + * Redistributions in binary form must reproduce the above copyright + notice, this list of conditions and the following disclaimer in + the documentation and/or other materials provided with the + distribution. + + * Neither the name of Red Hat, Inc., nor the names of its + contributors may be used to endorse or promote products derived + from this software without specific prior written permission. + + THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS + "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT + LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS + FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE + COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, + INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES + (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR + SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) + HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, + STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) + ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED + OF THE POSSIBILITY OF SUCH DAMAGE. + +====================================================================== + +The bundled verto source code is subject to the following license: + + Copyright 2011 Red Hat, Inc. + + Permission is hereby granted, free of charge, to any person + obtaining a copy of this software and associated documentation + files (the "Software"), to deal in the Software without + restriction, including without limitation the rights to use, copy, + modify, merge, publish, distribute, sublicense, and/or sell copies + of the Software, and to permit persons to whom the Software is + furnished to do so, subject to the following conditions: + + The above copyright notice and this permission notice shall be + included in all copies or substantial portions of the Software. + + THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, + EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF + MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND + NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT + HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, + WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, + OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER + DEALINGS IN THE SOFTWARE. + +====================================================================== + +The MS-KKDCP client implementation has the following copyright: + + Copyright 2013,2014 Red Hat, Inc. + + Redistribution and use in source and binary forms, with or without + modification, are permitted provided that the following conditions + are met: + + 1. Redistributions of source code must retain the above + copyright notice, this list of conditions and the following + disclaimer. + + 2. Redistributions in binary form must reproduce the above + copyright notice, this list of conditions and the following + disclaimer in the documentation and/or other materials + provided with the distribution. + + THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS + "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT + LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS + FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE + COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, + INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES + (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR + SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) + HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, + STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) + ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED + OF THE POSSIBILITY OF SUCH DAMAGE. + +====================================================================== + +The implementations of GSSAPI mechglue in GSSAPI-SPNEGO in +"src/lib/gssapi", including the following files: + + lib/gssapi/generic/gssapi_err_generic.et + lib/gssapi/mechglue/g_accept_sec_context.c + lib/gssapi/mechglue/g_acquire_cred.c + lib/gssapi/mechglue/g_canon_name.c + lib/gssapi/mechglue/g_compare_name.c + lib/gssapi/mechglue/g_context_time.c + lib/gssapi/mechglue/g_delete_sec_context.c + lib/gssapi/mechglue/g_dsp_name.c + lib/gssapi/mechglue/g_dsp_status.c + lib/gssapi/mechglue/g_dup_name.c + lib/gssapi/mechglue/g_exp_sec_context.c + lib/gssapi/mechglue/g_export_name.c + lib/gssapi/mechglue/g_glue.c + lib/gssapi/mechglue/g_imp_name.c + lib/gssapi/mechglue/g_imp_sec_context.c + lib/gssapi/mechglue/g_init_sec_context.c + lib/gssapi/mechglue/g_initialize.c + lib/gssapi/mechglue/g_inquire_context.c + lib/gssapi/mechglue/g_inquire_cred.c + lib/gssapi/mechglue/g_inquire_names.c + lib/gssapi/mechglue/g_process_context.c + lib/gssapi/mechglue/g_rel_buffer.c + lib/gssapi/mechglue/g_rel_cred.c + lib/gssapi/mechglue/g_rel_name.c + lib/gssapi/mechglue/g_rel_oid_set.c + lib/gssapi/mechglue/g_seal.c + lib/gssapi/mechglue/g_sign.c + lib/gssapi/mechglue/g_store_cred.c + lib/gssapi/mechglue/g_unseal.c + lib/gssapi/mechglue/g_userok.c + lib/gssapi/mechglue/g_utils.c + lib/gssapi/mechglue/g_verify.c + lib/gssapi/mechglue/gssd_pname_to_uid.c + lib/gssapi/mechglue/mglueP.h + lib/gssapi/mechglue/oid_ops.c + lib/gssapi/spnego/gssapiP_spnego.h + lib/gssapi/spnego/spnego_mech.c + +and the initial implementation of incremental propagation, including +the following new or changed files: + + include/iprop_hdr.h + kadmin/server/ipropd_svc.c + lib/kdb/iprop.x + lib/kdb/kdb_convert.c + lib/kdb/kdb_log.c + lib/kdb/kdb_log.h + lib/krb5/error_tables/kdb5_err.et + slave/kpropd_rpc.c + slave/kproplog.c + +are subject to the following license: + + Copyright (C) 2004 Sun Microsystems, Inc. + + Permission is hereby granted, free of charge, to any person + obtaining a copy of this software and associated documentation + files (the "Software"), to deal in the Software without + restriction, including without limitation the rights to use, copy, + modify, merge, publish, distribute, sublicense, and/or sell copies + of the Software, and to permit persons to whom the Software is + furnished to do so, subject to the following conditions: + + The above copyright notice and this permission notice shall be + included in all copies or substantial portions of the Software. + + THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, + EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF + MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND + NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS + BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN + ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN + CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE + SOFTWARE. + +====================================================================== + +Kerberos V5 includes documentation and software developed at the +University of California at Berkeley, which includes this copyright +notice: + + Copyright (C) 1983 Regents of the University of California. + All rights reserved. + + Redistribution and use in source and binary forms, with or without + modification, are permitted provided that the following conditions + are met: + + 1. Redistributions of source code must retain the above copyright + notice, this list of conditions and the following disclaimer. + + 2. Redistributions in binary form must reproduce the above + copyright notice, this list of conditions and the following + disclaimer in the documentation and/or other materials provided + with the distribution. + + 3. Neither the name of the University nor the names of its + contributors may be used to endorse or promote products derived + from this software without specific prior written permission. + + THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS "AS IS" + AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED + TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A + PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS + OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, + SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT + LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF + USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND + ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, + OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT + OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF + SUCH DAMAGE. + +====================================================================== + +Portions contributed by Novell, Inc., including the LDAP database +backend, are subject to the following license: + + Copyright (C) 2004-2005, Novell, Inc. + All rights reserved. + + Redistribution and use in source and binary forms, with or without + modification, are permitted provided that the following conditions + are met: + + * Redistributions of source code must retain the above copyright + notice, this list of conditions and the following disclaimer. + + * Redistributions in binary form must reproduce the above copyright + notice, this list of conditions and the following disclaimer in + the documentation and/or other materials provided with the + distribution. + + * The copyright holder's name is not used to endorse or promote + products derived from this software without specific prior + written permission. + + THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS + "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT + LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS + FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE + COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, + INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES + (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR + SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) + HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, + STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) + ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED + OF THE POSSIBILITY OF SUCH DAMAGE. + +====================================================================== + +Portions funded by Sandia National Laboratory and developed by the +University of Michigan's Center for Information Technology +Integration, including the PKINIT implementation, are subject to the +following license: + + COPYRIGHT (C) 2006-2007 + THE REGENTS OF THE UNIVERSITY OF MICHIGAN + ALL RIGHTS RESERVED + + Permission is granted to use, copy, create derivative works and + redistribute this software and such derivative works for any + purpose, so long as the name of The University of Michigan is not + used in any advertising or publicity pertaining to the use of + distribution of this software without specific, written prior + authorization. If the above copyright notice or any other + identification of the University of Michigan is included in any + copy of any portion of this software, then the disclaimer below + must also be included. + + THIS SOFTWARE IS PROVIDED AS IS, WITHOUT REPRESENTATION FROM THE + UNIVERSITY OF MICHIGAN AS TO ITS FITNESS FOR ANY PURPOSE, AND + WITHOUT WARRANTY BY THE UNIVERSITY OF MICHIGAN OF ANY KIND, EITHER + EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION THE IMPLIED + WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. + THE REGENTS OF THE UNIVERSITY OF MICHIGAN SHALL NOT BE LIABLE FOR + ANY DAMAGES, INCLUDING SPECIAL, INDIRECT, INCIDENTAL, OR + CONSEQUENTIAL DAMAGES, WITH RESPECT TO ANY CLAIM ARISING OUT OF OR + IN CONNECTION WITH THE USE OF THE SOFTWARE, EVEN IF IT HAS BEEN OR + IS HEREAFTER ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. + +====================================================================== + +The pkcs11.h file included in the PKINIT code has the following +license: + + Copyright 2006 g10 Code GmbH + Copyright 2006 Andreas Jellinghaus + + This file is free software; as a special exception the author gives + unlimited permission to copy and/or distribute it, with or without + modifications, as long as this notice is preserved. + + This file is distributed in the hope that it will be useful, but + WITHOUT ANY WARRANTY, to the extent permitted by law; without even + the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR + PURPOSE. + +====================================================================== + +Portions contributed by Apple Inc. are subject to the following +license: + + Copyright 2004-2008 Apple Inc. All Rights Reserved. + + Export of this software from the United States of America may + require a specific license from the United States Government. + It is the responsibility of any person or organization + contemplating export to obtain such a license before exporting. + + WITHIN THAT CONSTRAINT, permission to use, copy, modify, and + distribute this software and its documentation for any purpose and + without fee is hereby granted, provided that the above copyright + notice appear in all copies and that both that copyright notice and + this permission notice appear in supporting documentation, and that + the name of Apple Inc. not be used in advertising or publicity + pertaining to distribution of the software without specific, + written prior permission. Apple Inc. makes no representations + about the suitability of this software for any purpose. It is + provided "as is" without express or implied warranty. + + THIS SOFTWARE IS PROVIDED "AS IS" AND WITHOUT ANY EXPRESS OR + IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED + WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE. + +====================================================================== + +The implementations of UTF-8 string handling in src/util/support and +src/lib/krb5/unicode are subject to the following copyright and +permission notice: + + The OpenLDAP Public License + Version 2.8, 17 August 2003 + + Redistribution and use of this software and associated + documentation ("Software"), with or without modification, are + permitted provided that the following conditions are met: + + 1. Redistributions in source form must retain copyright statements + and notices, + + 2. Redistributions in binary form must reproduce applicable + copyright statements and notices, this list of conditions, and + the following disclaimer in the documentation and/or other + materials provided with the distribution, and + + 3. Redistributions must contain a verbatim copy of this document. + + The OpenLDAP Foundation may revise this license from time to time. + Each revision is distinguished by a version number. You may use + this Software under terms of this license revision or under the + terms of any subsequent revision of the license. + + THIS SOFTWARE IS PROVIDED BY THE OPENLDAP FOUNDATION AND ITS + CONTRIBUTORS "AS IS" AND ANY EXPRESSED OR IMPLIED WARRANTIES, + INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF + MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE + DISCLAIMED. IN NO EVENT SHALL THE OPENLDAP FOUNDATION, ITS + CONTRIBUTORS, OR THE AUTHOR(S) OR OWNER(S) OF THE SOFTWARE BE + LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR + CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT + OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR + BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF + LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT + (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE + USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH + DAMAGE. + + The names of the authors and copyright holders must not be used in + advertising or otherwise to promote the sale, use or other dealing + in this Software without specific, written prior permission. Title + to copyright in this Software shall at all times remain with + copyright holders. + + OpenLDAP is a registered trademark of the OpenLDAP Foundation. + + Copyright 1999-2003 The OpenLDAP Foundation, Redwood City, + California, USA. All Rights Reserved. Permission to copy and + distribute verbatim copies of this document is granted. + +====================================================================== + +Marked test programs in src/lib/krb5/krb have the following copyright: + + Copyright (C) 2006 Kungliga Tekniska Högskola + (Royal Institute of Technology, Stockholm, Sweden). + All rights reserved. + + Redistribution and use in source and binary forms, with or without + modification, are permitted provided that the following conditions + are met: + + 1. Redistributions of source code must retain the above copyright + notice, this list of conditions and the following disclaimer. + + 2. Redistributions in binary form must reproduce the above + copyright notice, this list of conditions and the following + disclaimer in the documentation and/or other materials provided + with the distribution. + + 3. Neither the name of KTH nor the names of its contributors may be + used to endorse or promote products derived from this software + without specific prior written permission. + + THIS SOFTWARE IS PROVIDED BY KTH AND ITS CONTRIBUTORS "AS IS" AND + ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, + THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A + PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL KTH OR ITS + CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, + SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT + LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF + USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND + ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, + OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT + OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF + SUCH DAMAGE. + +====================================================================== + +The KCM Mach RPC definition file used on OS X has the following +copyright: + + Copyright (C) 2009 Kungliga Tekniska Högskola + (Royal Institute of Technology, Stockholm, Sweden). + All rights reserved. + + Portions Copyright (C) 2009 Apple Inc. All rights reserved. + + Redistribution and use in source and binary forms, with or without + modification, are permitted provided that the following conditions + are met: + + 1. Redistributions of source code must retain the above + copyright notice, this list of conditions and the following + disclaimer. + + 2. Redistributions in binary form must reproduce the above + copyright notice, this list of conditions and the following + disclaimer in the documentation and/or other materials provided + with the distribution. + + 3. Neither the name of the Institute nor the names of its + contributors may be used to endorse or promote products derived + from this software without specific prior written permission. + + THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS "AS IS" + AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED + TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A + PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE + OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, + SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT + LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF + USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND + ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, + OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT + OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF + SUCH DAMAGE. + +====================================================================== + +Portions of the RPC implementation in src/lib/rpc and +src/include/gssrpc have the following copyright and permission notice: + + Copyright (C) 2010, Oracle America, Inc. + + All rights reserved. + + Redistribution and use in source and binary forms, with or without + modification, are permitted provided that the following conditions + are met: + + 1. Redistributions of source code must retain the above copyright + notice, this list of conditions and the following disclaimer. + + 2. Redistributions in binary form must reproduce the above + copyright notice, this list of conditions and the following + disclaimer in the documentation and/or other materials provided + with the distribution. + + 3. Neither the name of the "Oracle America, Inc." nor the names of + its contributors may be used to endorse or promote products + derived from this software without specific prior written + permission. + + THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS + "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT + LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS + FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE + COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, + INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES + (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR + SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) + HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, + STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) + ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED + OF THE POSSIBILITY OF SUCH DAMAGE. + +====================================================================== + + Copyright (C) 2006,2007,2009 NTT (Nippon Telegraph and Telephone + Corporation). All rights reserved. + + Redistribution and use in source and binary forms, with or without + modification, are permitted provided that the following conditions + are met: + + 1. Redistributions of source code must retain the above copyright + notice, this list of conditions and the following disclaimer as + the first lines of this file unmodified. + + 2. Redistributions in binary form must reproduce the above + copyright notice, this list of conditions and the following + disclaimer in the documentation and/or other materials provided + with the distribution. + + THIS SOFTWARE IS PROVIDED BY NTT "AS IS" AND ANY EXPRESS OR IMPLIED + WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES + OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE + DISCLAIMED. IN NO EVENT SHALL NTT BE LIABLE FOR ANY DIRECT, + INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES + (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR + SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) + HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, + STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) + ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED + OF THE POSSIBILITY OF SUCH DAMAGE. + +====================================================================== + + Copyright 2000 by Carnegie Mellon University + + All Rights Reserved + + Permission to use, copy, modify, and distribute this software and + its documentation for any purpose and without fee is hereby + granted, provided that the above copyright notice appear in all + copies and that both that copyright notice and this permission + notice appear in supporting documentation, and that the name of + Carnegie Mellon University not be used in advertising or publicity + pertaining to distribution of the software without specific, + written prior permission. + + CARNEGIE MELLON UNIVERSITY DISCLAIMS ALL WARRANTIES WITH REGARD TO + THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY + AND FITNESS, IN NO EVENT SHALL CARNEGIE MELLON UNIVERSITY BE LIABLE + FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES + WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN + AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING + OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS + SOFTWARE. + +====================================================================== + + Copyright (C) 2002 Naval Research Laboratory (NRL/CCS) + + Permission to use, copy, modify and distribute this software and + its documentation is hereby granted, provided that both the + copyright notice and this permission notice appear in all copies of + the software, derivative works or modified versions, and any + portions thereof. + + NRL ALLOWS FREE USE OF THIS SOFTWARE IN ITS "AS IS" CONDITION AND + DISCLAIMS ANY LIABILITY OF ANY KIND FOR ANY DAMAGES WHATSOEVER + RESULTING FROM THE USE OF THIS SOFTWARE. + +====================================================================== + +Portions extracted from Internet RFCs have the following copyright +notice: + + Copyright (C) The Internet Society (2006). + + This document is subject to the rights, licenses and restrictions + contained in BCP 78, and except as set forth therein, the authors + retain all their rights. + + This document and the information contained herein are provided on + an "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE + REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND + THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, + EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT + THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR + ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A + PARTICULAR PURPOSE. + +====================================================================== + + Copyright (C) 1991, 1992, 1994 by Cygnus Support. + + Permission to use, copy, modify, and distribute this software and + its documentation for any purpose and without fee is hereby + granted, provided that the above copyright notice appear in all + copies and that both that copyright notice and this permission + notice appear in supporting documentation. Cygnus Support makes no + representations about the suitability of this software for any + purpose. It is provided "as is" without express or implied + warranty. + +====================================================================== + + Copyright (C) 2006 Secure Endpoints Inc. + + Permission is hereby granted, free of charge, to any person + obtaining a copy of this software and associated documentation + files (the "Software"), to deal in the Software without + restriction, including without limitation the rights to use, copy, + modify, merge, publish, distribute, sublicense, and/or sell copies + of the Software, and to permit persons to whom the Software is + furnished to do so, subject to the following conditions: + + The above copyright notice and this permission notice shall be + included in all copies or substantial portions of the Software. + + THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, + EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF + MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND + NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS + BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN + ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN + CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE + SOFTWARE. + +====================================================================== + +Portions of the implementation of the Fortuna-like PRNG are subject to +the following notice: + + Copyright (C) 2005 Marko Kreen + All rights reserved. + + Redistribution and use in source and binary forms, with or without + modification, are permitted provided that the following conditions + are met: + + 1. Redistributions of source code must retain the above copyright + notice, this list of conditions and the following disclaimer. + + 2. Redistributions in binary form must reproduce the above + copyright notice, this list of conditions and the following + disclaimer in the documentation and/or other materials provided + with the distribution. + + THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS "AS IS" + AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED + TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A + PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR + CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, + SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT + LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF + USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND + ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, + OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT + OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF + SUCH DAMAGE. + + Copyright (C) 1994 by the University of Southern California + + EXPORT OF THIS SOFTWARE from the United States of America may + require a specific license from the United States Government. It + is the responsibility of any person or organization + contemplating export to obtain such a license before exporting. + + WITHIN THAT CONSTRAINT, permission to copy, modify, and distribute + this software and its documentation in source and binary forms is + hereby granted, provided that any documentation or other materials + related to such distribution or use acknowledge that the software + was developed by the University of Southern California. + + DISCLAIMER OF WARRANTY. THIS SOFTWARE IS PROVIDED "AS IS". The + University of Southern California MAKES NO REPRESENTATIONS OR + WARRANTIES, EXPRESS OR IMPLIED. By way of example, but not + limitation, the University of Southern California MAKES NO + REPRESENTATIONS OR WARRANTIES OF MERCHANTABILITY OR FITNESS FOR ANY + PARTICULAR PURPOSE. The University of Southern California shall not + be held liable for any liability nor for any direct, indirect, or + consequential damages with respect to any claim by the user or + distributor of the ksu software. + +====================================================================== + + Copyright (C) 1995 + The President and Fellows of Harvard University + + This code is derived from software contributed to Harvard by Jeremy + Rassen. + + Redistribution and use in source and binary forms, with or without + modification, are permitted provided that the following conditions + are met: + + 1. Redistributions of source code must retain the above copyright + notice, this list of conditions and the following disclaimer. + + 2. Redistributions in binary form must reproduce the above + copyright notice, this list of conditions and the following + disclaimer in the documentation and/or other materials provided + with the distribution. + + 3. All advertising materials mentioning features or use of this + software must display the following acknowledgement: + + This product includes software developed by the University of + California, Berkeley and its contributors. + + 4. Neither the name of the University nor the names of its + contributors may be used to endorse or promote products derived + from this software without specific prior written permission. + + THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS "AS IS" + AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED + TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A + PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS + OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, + SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT + LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF + USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND + ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, + OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT + OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF + SUCH DAMAGE. + +====================================================================== + + Copyright (C) 2008 by the Massachusetts Institute of Technology. + Copyright 1995 by Richard P. Basch. All Rights Reserved. + Copyright 1995 by Lehman Brothers, Inc. All Rights Reserved. + + Export of this software from the United States of America may + require a specific license from the United States Government. It + is the responsibility of any person or organization + contemplating export to obtain such a license before exporting. + + WITHIN THAT CONSTRAINT, permission to use, copy, modify, and + distribute this software and its documentation for any purpose and + without fee is hereby granted, provided that the above copyright + notice appear in all copies and that both that copyright notice and + this permission notice appear in supporting documentation, and that + the name of Richard P. Basch, Lehman Brothers and M.I.T. not be + used in advertising or publicity pertaining to distribution of the + software without specific, written prior permission. Richard P. + Basch, Lehman Brothers and M.I.T. make no representations about the + suitability of this software for any purpose. It is provided "as + is" without express or implied warranty. + +====================================================================== + +The following notice applies to "src/lib/krb5/krb/strptime.c" and +"src/include/k5-queue.h". + + Copyright (C) 1997, 1998 The NetBSD Foundation, Inc. + All rights reserved. + + This code was contributed to The NetBSD Foundation by Klaus Klein. + + Redistribution and use in source and binary forms, with or without + modification, are permitted provided that the following conditions + are met: + + 1. Redistributions of source code must retain the above copyright + notice, this list of conditions and the following disclaimer. + + 2. Redistributions in binary form must reproduce the above + copyright notice, this list of conditions and the following + disclaimer in the documentation and/or other materials provided + with the distribution. + + 3. All advertising materials mentioning features or use of this + software must display the following acknowledgement: + + This product includes software developed by the NetBSD + Foundation, Inc. and its contributors. + + 4. Neither the name of The NetBSD Foundation nor the names of its + contributors may be used to endorse or promote products derived + from this software without specific prior written permission. + + THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND + CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, + INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF + MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE + DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS BE + LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR + CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT + OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR + BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF + LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT + (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE + USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH + DAMAGE. + +====================================================================== + +The following notice applies to Unicode library files in +"src/lib/krb5/unicode": + + Copyright 1997, 1998, 1999 Computing Research Labs, + New Mexico State University + + Permission is hereby granted, free of charge, to any person + obtaining a copy of this software and associated documentation + files (the "Software"), to deal in the Software without + restriction, including without limitation the rights to use, copy, + modify, merge, publish, distribute, sublicense, and/or sell copies + of the Software, and to permit persons to whom the Software is + furnished to do so, subject to the following conditions: + + The above copyright notice and this permission notice shall be + included in all copies or substantial portions of the Software. + + THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, + EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF + MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND + NONINFRINGEMENT. IN NO EVENT SHALL THE COMPUTING RESEARCH LAB OR + NEW MEXICO STATE UNIVERSITY BE LIABLE FOR ANY CLAIM, DAMAGES OR + OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR + OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE + OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. + +====================================================================== + +The following notice applies to "src/util/support/strlcpy.c": + + Copyright (C) 1998 Todd C. Miller "Todd.Miller@courtesan.com" + + Permission to use, copy, modify, and distribute this software for + any purpose with or without fee is hereby granted, provided that + the above copyright notice and this permission notice appear in all + copies. + + THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL + WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED + WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE + AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR + CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS + OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, + NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN + CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. + +====================================================================== + +The following notice applies to "src/util/profile/argv_parse.c" and +"src/util/profile/argv_parse.h": + + Copyright 1999 by Theodore Ts'o. + + Permission to use, copy, modify, and distribute this software for + any purpose with or without fee is hereby granted, provided that + the above copyright notice and this permission notice appear in all + copies. THE SOFTWARE IS PROVIDED "AS IS" AND THEODORE TS'O (THE + AUTHOR) DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, + INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN + NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, + INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER + RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION + OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR + IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. (Isn't + it sick that the U.S. culture of lawsuit-happy lawyers requires + this kind of disclaimer?) + +====================================================================== + +The following notice applies to SWIG-generated code in +"src/util/profile/profile_tcl.c": + + Copyright (C) 1999-2000, The University of Chicago + + This file may be freely redistributed without license or fee + provided this copyright message remains intact. + +====================================================================== + +The following notice applies to portiions of "src/lib/rpc" and +"src/include/gssrpc": + + Copyright (C) 2000 The Regents of the University of Michigan. All + rights reserved. + + Copyright (C) 2000 Dug Song "dugsong@UMICH.EDU". All rights + reserved, all wrongs reversed. + + Redistribution and use in source and binary forms, with or without + modification, are permitted provided that the following conditions + are met: + + 1. Redistributions of source code must retain the above copyright + notice, this list of conditions and the following disclaimer. + + 2. Redistributions in binary form must reproduce the above + copyright notice, this list of conditions and the following + disclaimer in the documentation and/or other materials provided + with the distribution. + + 3. Neither the name of the University nor the names of its + contributors may be used to endorse or promote products derived + from this software without specific prior written permission. + + THIS SOFTWARE IS PROVIDED "AS IS" AND ANY EXPRESS OR IMPLIED + WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES + OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE + DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE + FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR + CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT + OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR + BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF + LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT + (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE + USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH + DAMAGE. + +====================================================================== + +Implementations of the MD4 algorithm are subject to the following +notice: + + Copyright (C) 1990, RSA Data Security, Inc. All rights reserved. + + License to copy and use this software is granted provided that it + is identified as the "RSA Data Security, Inc. MD4 Message Digest + Algorithm" in all material mentioning or referencing this software + or this function. + + License is also granted to make and use derivative works provided + that such works are identified as "derived from the RSA Data + Security, Inc. MD4 Message Digest Algorithm" in all material + mentioning or referencing the derived work. + + RSA Data Security, Inc. makes no representations concerning either + the merchantability of this software or the suitability of this + software for any particular purpose. It is provided "as is" + without express or implied warranty of any kind. + + These notices must be retained in any copies of any part of this + documentation and/or software. + +====================================================================== + +Implementations of the MD5 algorithm are subject to the following +notice: + + Copyright (C) 1990, RSA Data Security, Inc. All rights reserved. + + License to copy and use this software is granted provided that it + is identified as the "RSA Data Security, Inc. MD5 Message- Digest + Algorithm" in all material mentioning or referencing this software + or this function. + + License is also granted to make and use derivative works provided + that such works are identified as "derived from the RSA Data + Security, Inc. MD5 Message-Digest Algorithm" in all material + mentioning or referencing the derived work. + + RSA Data Security, Inc. makes no representations concerning either + the merchantability of this software or the suitability of this + software for any particular purpose. It is provided "as is" + without express or implied warranty of any kind. + + These notices must be retained in any copies of any part of this + documentation and/or software. + +====================================================================== + +The following notice applies to +"src/lib/crypto/crypto_tests/t_mddriver.c": + + Copyright (C) 1990-2, RSA Data Security, Inc. Created 1990. All + rights reserved. + + RSA Data Security, Inc. makes no representations concerning either + the merchantability of this software or the suitability of this + software for any particular purpose. It is provided "as is" without + express or implied warranty of any kind. + + These notices must be retained in any copies of any part of this + documentation and/or software. + +====================================================================== + +Portions of "src/lib/krb5" are subject to the following notice: + + Copyright (C) 1994 CyberSAFE Corporation. + Copyright 1990,1991,2007,2008 by the Massachusetts Institute of Technology. + All Rights Reserved. + + Export of this software from the United States of America may + require a specific license from the United States Government. It + is the responsibility of any person or organization + contemplating export to obtain such a license before exporting. + + WITHIN THAT CONSTRAINT, permission to use, copy, modify, and + distribute this software and its documentation for any purpose and + without fee is hereby granted, provided that the above copyright + notice appear in all copies and that both that copyright notice and + this permission notice appear in supporting documentation, and that + the name of M.I.T. not be used in advertising or publicity + pertaining to distribution of the software without specific, + written prior permission. Furthermore if you modify this software + you must label your software as modified software and not + distribute it in such a fashion that it might be confused with the + original M.I.T. software. Neither M.I.T., the Open Computing + Security Group, nor CyberSAFE Corporation make any representations + about the suitability of this software for any purpose. It is + provided "as is" without express or implied warranty. + +====================================================================== + +Portions contributed by PADL Software are subject to the following +license: + + Copyright (c) 2011, PADL Software Pty Ltd. All rights reserved. + + Redistribution and use in source and binary forms, with or without + modification, are permitted provided that the following conditions + are met: + + 1. Redistributions of source code must retain the above copyright + notice, this list of conditions and the following disclaimer. + + 2. Redistributions in binary form must reproduce the above + copyright notice, this list of conditions and the following + disclaimer in the documentation and/or other materials provided + with the distribution. + + 3. Neither the name of PADL Software nor the names of its + contributors may be used to endorse or promote products derived + from this software without specific prior written permission. + + THIS SOFTWARE IS PROVIDED BY PADL SOFTWARE AND CONTRIBUTORS "AS IS" + AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED + TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A + PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL PADL SOFTWARE + OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, + SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT + LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF + USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND + ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, + OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT + OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF + SUCH DAMAGE. + +====================================================================== + +The bundled libev source code is subject to the following license: + + All files in libev are Copyright (C)2007,2008,2009 Marc Alexander + Lehmann. + + Redistribution and use in source and binary forms, with or without + modification, are permitted provided that the following conditions + are met: + + * Redistributions of source code must retain the above copyright + notice, this list of conditions and the following disclaimer. + + * Redistributions in binary form must reproduce the above copyright + notice, this list of conditions and the following disclaimer in + the documentation and/or other materials provided with the + distribution. + + THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS + "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT + LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS + FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE + COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, + INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES + (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR + SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) + HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, + STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) + ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED + OF THE POSSIBILITY OF SUCH DAMAGE. + + Alternatively, the contents of this package may be used under the + terms of the GNU General Public License ("GPL") version 2 or any + later version, in which case the provisions of the GPL are + applicable instead of the above. If you wish to allow the use of + your version of this package only under the terms of the GPL and + not to allow others to use your version of this file under the BSD + license, indicate your decision by deleting the provisions above + and replace them with the notice and other provisions required by + the GPL in this and the other files of this package. If you do not + delete the provisions above, a recipient may use your version of + this file under either the BSD or the GPL. + + On Debian systems, the complete text of the GNU General Public License + version 2 can be found in `/usr/share/common-licenses/GPL-2'. + +====================================================================== + +Files copied from the Intel AESNI Sample Library are subject to the +following license: + + Copyright (C) 2010, Intel Corporation + All rights reserved. + + Redistribution and use in source and binary forms, with or without + modification, are permitted provided that the following conditions + are met: + + * Redistributions of source code must retain the above copyright + notice, this list of conditions and the following disclaimer. + + * Redistributions in binary form must reproduce the above + copyright notice, this list of conditions and the following + disclaimer in the documentation and/or other materials + provided with the distribution. + + * Neither the name of Intel Corporation nor the names of its + contributors may be used to endorse or promote products + derived from this software without specific prior written + permission. + + THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS + "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT + LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS + FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE + COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, + INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES + (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR + SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) + HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, + STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) + ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED + OF THE POSSIBILITY OF SUCH DAMAGE. + +====================================================================== + +The following notice applies to +"src/ccapi/common/win/OldCC/autolock.hxx": + + Copyright (C) 1998 by Danilo Almeida. All rights reserved. + + Redistribution and use in source and binary forms, with or without + modification, are permitted provided that the following conditions + are met: + + * Redistributions of source code must retain the above copyright + notice, this list of conditions and the following disclaimer. + + * Redistributions in binary form must reproduce the above + copyright notice, this list of conditions and the following + disclaimer in the documentation and/or other materials provided + with the distribution. + + THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS + "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT + LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS + FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE + COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, + INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES + (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR + SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) + HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, + STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) + ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED + OF THE POSSIBILITY OF SUCH DAMAGE. + +====================================================================== + +The Debian Packaging is licensed under the same terms as MIT Kerberos. diff --git a/content/cumulus-linux-43/Whats-New/licenses/libncursesw6-dbg.txt b/content/cumulus-linux-43/Whats-New/licenses/libncursesw6-dbg.txt new file mode 100644 index 0000000000..9ad8f1a1f2 --- /dev/null +++ b/content/cumulus-linux-43/Whats-New/licenses/libncursesw6-dbg.txt @@ -0,0 +1 @@ +libncursesw6-dbg has no copyright file diff --git a/content/cumulus-linux-43/Whats-New/licenses/libnginx-mod-rtmp.txt b/content/cumulus-linux-43/Whats-New/licenses/libnginx-mod-rtmp.txt new file mode 100644 index 0000000000..66a44d870a --- /dev/null +++ b/content/cumulus-linux-43/Whats-New/licenses/libnginx-mod-rtmp.txt @@ -0,0 +1,201 @@ +Format: https://www.debian.org/doc/packaging-manuals/copyright-format/1.0/ +Upstream-Name: nginx +Source: https://nginx.org/en/download.html + +Files: * +Copyright: 2002-2014 Igor Sysoev + 2011-2014 Nginx, Inc. + Maxim Dounin + Valentin V. Bartenev + Roman Arutyunyan + Ruslan Ermilov +License: BSD-2-clause + +Files: src/core/ngx_murmurhash.c +Copyright: Copyright (C) Austin Appleby +License: BSD-2-clause + +Files: src/http/modules/ngx_http_scgi_module.c + src/http/modules/ngx_http_uwsgi_module.c +Copyright: Copyright (C) Igor Sysoev + Copyright (C) Nginx, Inc. + 2009-2010 Unbit S.a.s. + 2008 Manlio Perillo (manlio.perillo@gmail.com) +License: BSD-2-clause + +Files: contrib/geo2nginx.pl +Copyright: 2005, Andrei Nigmatulin +License: BSD-2-clause + +Files: debian/* +Copyright: 2007-2009, Fabio Tranchitella + 2008, Jose Parrella + 2009-2014, Kartik Mistry + 2010-2014, Michael Lustfield + 2011 Dmitry E. Oboukhov + 2011-2013, Cyril Lavier + 2013-2016, Christos Trochalakis +License: BSD-2-clause + +Files: debian/modules/http-headers-more-filter/* +Copyright: Copyright (c) 2009-2014, Yichun "agentzh" Zhang (章亦春) , CloudFlare Inc. + Copyright (c) 2010-2013, Bernd Dorn + Copyright (c) Igor Sysoev +License: BSD-2-clause + +Files: debian/modules/http-ndk/* +Copyright: Marcus Clyne +License: BSD-3-clause + +Files: debian/modules/http-ndk/src/hash/md5.h + debian/modules/http-ndk/src/hash/sha.h +Copyright: Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) +License: BSD-4-clause + +Files: debian/modules/http-auth-pam/* +Copyright: 2008-2013, Sergio Talens Oliag +License: BSD-2-clause + +Files: debian/modules/http-echo/* +Copyright: Copyright (c) 2009-2014, Yichun "agentzh" Zhang +License: BSD-2-clause + +Files: debian/modules/http-lua/* +Copyright: Copyright (C) 2009-2014, by Xiaozhe Wang (chaoslawful) . + Copyright (C) 2009-2014, by Yichun "agentzh" Zhang (章亦春) , CloudFlare Inc. +License: BSD-2-clause + +Files: debian/modules/http-upstream-fair/* +Copyright: Copyright (c) 2007 Grzegorz Nosek + Igor Sysoev +License: BSD-2-clause + +Files: debian/modules/nchan/* +Copyright: 2009-2016 Leo Ponomarev +License: MIT + +Files: debian/modules/nchan/src/store/redis/cmp.* +Copyright: 2015 Charles Gunyon +License: MIT + +Files: debian/modules/http-uploadprogress/* +Copyright: Brice Figureau + 2002-2007, Igor Sysoev +License: BSD-2-clause + +Files: debian/modules/http-cache-purge/* +Copyright: 2009-2012, FRiCKLE , + 2009-2012, Piotr Sikora +License: BSD-2-clause + +Files: debian/modules/http-dav-ext/* +Copyright: Arutyunyan Roman +License: BSD-2-clause + +Files: debian/modules/http-fancyindex/* +Copyright: Copyright (c) Adrian Perez +License: BSD-2-clause + +Files: debian/modules/http-subs-filter/* +Copyright: Copyright (C) 2014 by Weibin Yao +License: BSD-2-clause + +Files: debian/modules/rtmp/* +Copyright: Copyright (C) 2012-2014, Roman Arutyunyan +License: BSD-2-clause + +License: BSD-2-clause + All rights reserved. + . + Redistribution and use in source and binary forms, with or without + modification, are permitted provided that the following conditions are + met: + . + 1. Redistributions of source code must retain the above copyright + notice, this list of conditions and the following disclaimer. + 2. Redistributions in binary form must reproduce the above copyright + notice, this list of conditions and the following disclaimer in the + documentation and/or other materials provided with the distribution. + . + THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS + IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED + TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A + PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT + OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, + SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT + LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, + DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY + THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT + (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE + OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. + +License: BSD-3-clause + All rights reserved. + . + Redistribution and use in source and binary forms, with or without + modification, are permitted provided that the following conditions are + met: + 1. Redistributions of source code must retain the above copyright + notice, this list of conditions and the following disclaimer. + 2. Redistributions in binary form must reproduce the above copyright + notice, this list of conditions and the following disclaimer in the + documentation and/or other materials provided with the distribution. + 3. Neither the name of the University nor the names of its contributors + may be used to endorse or promote products derived from this + software without specific prior written permission. + . + THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND + ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE + IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR + PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS + BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR + CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF + SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR + BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, + WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR + OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF + ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. + +License: BSD-4-clause + Redistribution and use in source and binary forms, with or without + modification, are permitted provided that the following conditions + are met: + 1. Redistributions of source code must retain the above copyright + notice, this list of conditions and the following disclaimer. + 2. Redistributions in binary form must reproduce the above copyright + notice, this list of conditions and the following disclaimer in the + documentation and/or other materials provided with the distribution. + 4. Neither the name of the University nor the names of its contributors + may be used to endorse or promote products derived from this software + without specific prior written permission. + . + THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND + ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE + IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE + ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE + FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL + DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS + OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) + HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT + LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY + OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF + SUCH DAMAGE. + +License: MIT + Permission is hereby granted, free of charge, to any person obtaining a copy + of this software and associated documentation files (the "Software"), to + deal in the Software without restriction, including without limitation the + rights to use, copy, modify, merge, publish, distribute, sublicense, and/or + sell copies of the Software, and to permit persons to whom the Software is + furnished to do so, subject to the following conditions: + . + The above copyright notice and this permission notice shall be included in + all copies or substantial portions of the Software. + . + THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR + IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, + FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE + AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER + LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING + FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS + IN THE SOFTWARE. diff --git a/content/cumulus-linux-43/Whats-New/licenses/libssl-doc.txt b/content/cumulus-linux-43/Whats-New/licenses/libssl-doc.txt new file mode 100644 index 0000000000..496bdfdbce --- /dev/null +++ b/content/cumulus-linux-43/Whats-New/licenses/libssl-doc.txt @@ -0,0 +1,135 @@ +This package was debianized by Christoph Martin martin@uni-mainz.de on +Fri, 22 Nov 1996 21:29:51 +0100. + +Copyright (c) 1998-2004 The OpenSSL Project +Copyright (c) 1995-1998 Eric A. Young, Tim J. Hudson + +The upstream sources were obtained from https://www.openssl.org/ + + + LICENSE ISSUES + ============== + + The OpenSSL toolkit stays under a dual license, i.e. both the conditions of + the OpenSSL License and the original SSLeay license apply to the toolkit. + See below for the actual license texts. Actually both licenses are BSD-style + Open Source licenses. In case of any license issues related to OpenSSL + please contact openssl-core@openssl.org. + + OpenSSL License + --------------- + +/* ==================================================================== + * Copyright (c) 1998-2004 The OpenSSL Project. All rights reserved. + * + * Redistribution and use in source and binary forms, with or without + * modification, are permitted provided that the following conditions + * are met: + * + * 1. Redistributions of source code must retain the above copyright + * notice, this list of conditions and the following disclaimer. + * + * 2. Redistributions in binary form must reproduce the above copyright + * notice, this list of conditions and the following disclaimer in + * the documentation and/or other materials provided with the + * distribution. + * + * 3. All advertising materials mentioning features or use of this + * software must display the following acknowledgment: + * "This product includes software developed by the OpenSSL Project + * for use in the OpenSSL Toolkit. (http://www.openssl.org/)" + * + * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to + * endorse or promote products derived from this software without + * prior written permission. For written permission, please contact + * openssl-core@openssl.org. + * + * 5. Products derived from this software may not be called "OpenSSL" + * nor may "OpenSSL" appear in their names without prior written + * permission of the OpenSSL Project. + * + * 6. Redistributions of any form whatsoever must retain the following + * acknowledgment: + * "This product includes software developed by the OpenSSL Project + * for use in the OpenSSL Toolkit (http://www.openssl.org/)" + * + * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY + * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE + * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR + * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR + * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, + * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT + * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; + * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) + * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, + * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) + * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED + * OF THE POSSIBILITY OF SUCH DAMAGE. + * ==================================================================== + * + * This product includes cryptographic software written by Eric Young + * (eay@cryptsoft.com). This product includes software written by Tim + * Hudson (tjh@cryptsoft.com). + * + */ + + Original SSLeay License + ----------------------- + +/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) + * All rights reserved. + * + * This package is an SSL implementation written + * by Eric Young (eay@cryptsoft.com). + * The implementation was written so as to conform with Netscapes SSL. + * + * This library is free for commercial and non-commercial use as long as + * the following conditions are aheared to. The following conditions + * apply to all code found in this distribution, be it the RC4, RSA, + * lhash, DES, etc., code; not just the SSL code. The SSL documentation + * included with this distribution is covered by the same copyright terms + * except that the holder is Tim Hudson (tjh@cryptsoft.com). + * + * Copyright remains Eric Young's, and as such any Copyright notices in + * the code are not to be removed. + * If this package is used in a product, Eric Young should be given attribution + * as the author of the parts of the library used. + * This can be in the form of a textual message at program startup or + * in documentation (online or textual) provided with the package. + * + * Redistribution and use in source and binary forms, with or without + * modification, are permitted provided that the following conditions + * are met: + * 1. Redistributions of source code must retain the copyright + * notice, this list of conditions and the following disclaimer. + * 2. Redistributions in binary form must reproduce the above copyright + * notice, this list of conditions and the following disclaimer in the + * documentation and/or other materials provided with the distribution. + * 3. All advertising materials mentioning features or use of this software + * must display the following acknowledgement: + * "This product includes cryptographic software written by + * Eric Young (eay@cryptsoft.com)" + * The word 'cryptographic' can be left out if the rouines from the library + * being used are not cryptographic related :-). + * 4. If you include any Windows specific code (or a derivative thereof) from + * the apps directory (application code) you must include an acknowledgement: + * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" + * + * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND + * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE + * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE + * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE + * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL + * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS + * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) + * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT + * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY + * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF + * SUCH DAMAGE. + * + * The licence and distribution terms for any publically available version or + * derivative of this code cannot be changed. i.e. this code cannot simply be + * copied and put under another distribution licence + * [including the GNU Public Licence.] + */ + diff --git a/content/cumulus-linux-43/Whats-New/licenses/libssl1.1-dbgsym.txt b/content/cumulus-linux-43/Whats-New/licenses/libssl1.1-dbgsym.txt new file mode 100644 index 0000000000..09a06b2f5d --- /dev/null +++ b/content/cumulus-linux-43/Whats-New/licenses/libssl1.1-dbgsym.txt @@ -0,0 +1 @@ +libssl1.1-dbgsym has no copyright file diff --git a/content/cumulus-linux-43/Whats-New/licenses/libsystemd-dev.txt b/content/cumulus-linux-43/Whats-New/licenses/libsystemd-dev.txt index 1f66c2054a..8dc9bd1380 100644 --- a/content/cumulus-linux-43/Whats-New/licenses/libsystemd-dev.txt +++ b/content/cumulus-linux-43/Whats-New/licenses/libsystemd-dev.txt @@ -38,18 +38,33 @@ Copyright: 2012 Jean-Philippe Aumasson 2012 Daniel J. Bernstein License: CC0-1.0 -Files: src/basic/securebits.h -Copyright: Linus Torvalds -License: GPL-2 - Files: src/basic/ioprio.h Copyright: Jens Axboe License: GPL-2 -Files: src/shared/linux/auto_dev-ioctl.h -Copyright: 2008 Red Hat, Inc. +Files: src/shared/linux/* + src/basic/linux/* +Copyright: 2004-2009 Red Hat, Inc. + 2011-2014 PLUMgrid + 2001-2003 Sistina Software (UK) Limited. 2008 Ian Kent -License: GPL-2+ + 1998 David S. Miller >davem@redhat.com> + 2001 Jeff Garzik + 2006-2010 Johannes Berg + 2008 Luis Carlos Cobo + 2008 Michael Buesch + 2008, 2009 Luis R. Rodriguez + 2008 Jouni Malinen + 2008 Colin McCabe + 2018-2019 Intel Corporation + 2007 Oracle. + 2009 Wolfgang Grandegger + 1999 Thomas Davis + 2015 Sabrina Dubroca + 1999-2000 Maxim Krasnyansky + 2015-2019 Jason A. Donenfeld +License: GPL-2 with Linux-syscall-note exception Files: src/basic/sparse-endian.h Copyright: 2012 Josh Triplett @@ -62,7 +77,44 @@ License: public-domain You can use this free for any purpose. It's in the public domain. It has no warranty. -Files: src/udev/* +Files: src/udev/ata_id/ata_id.c + src/udev/cdrom_id/cdrom_id.c + src/udev/mtd_probe/mtd_probe.c + src/udev/mtd_probe/mtd_probe.h + src/udev/mtd_probe/probe_smartmedia.c + src/udev/scsi_id/scsi.h + src/udev/scsi_id/scsi_id.c + src/udev/scsi_id/scsi_id.h + src/udev/scsi_id/scsi_serial.c + src/udev/udevadm.c + src/udev/udevadm-control.c + src/udev/udevadm.h + src/udev/udevadm-info.c + src/udev/udevadm-monitor.c + src/udev/udevadm-settle.c + src/udev/udevadm-test-builtin.c + src/udev/udevadm-test.c + src/udev/udevadm-trigger.c + src/udev/udevadm-util.c + src/udev/udevadm-util.h + src/udev/udev-builtin-blkid.c + src/udev/udev-builtin.h + src/udev/udev-builtin-input_id.c + src/udev/udev-builtin-kmod.c + src/udev/udev-builtin-path_id.c + src/udev/udev-builtin-uaccess.c + src/udev/udev-builtin-usb_id.c + src/udev/udev-ctrl.h + src/udev/udevd.c + src/udev/udev-event.c + src/udev/udev-event.h + src/udev/udev-node.c + src/udev/udev-node.h + src/udev/udev-rules.c + src/udev/udev-rules.h + src/udev/udev-watch.c + src/udev/udev-watch.h + src/udev/v4l_id/v4l_id.c Copyright: 2003-2012 Kay Sievers 2003-2004 Greg Kroah-Hartman 2004 Chris Friesen @@ -84,25 +136,9 @@ Copyright: 2003-2012 Kay Sievers 2014 Carlos Garnacho License: GPL-2+ -Files: src/udev/udev-ctrl.c - src/udev/udevadm-hwdb.c - src/udev/udev-builtin.c - src/udev/udev-builtin-net_id.c - src/udev/udev-builtin-net_setup_link.c - src/udev/udev-builtin-hwdb.c - src/udev/udev-builtin-btrfs.c - src/udev/udev-builtin-keyboard.c - src/udev/net/link-config.h - src/udev/net/link-config.c - src/udev/net/ethtool-util.c - src/udev/net/ethtool-util.h -Copyright: 2007-2013 Kay Sievers - 2013 Tom Gundersen -License: LGPL-2.1+ - -Files: src/udev/scsi_id/scsi.h +Files: src/udev/scsi_id/* Copyright: 2003 IBM Corp. -License: GPL-2 +License: GPL-2+ Files: debian/* Copyright: 2010-2013 Tollef Fog Heen @@ -147,6 +183,37 @@ License: GPL-2 License version 2 can be found in the file `/usr/share/common-licenses/GPL-2` +License: GPL-2 with Linux-syscall-note exception + NOTE! This copyright does *not* cover user programs that use kernel services + by normal system calls - this is merely considered normal use of the kernel, + and does *not* fall under the heading of "derived work". Also note that the + GPL below is copyrighted by the Free Software Foundation, but the instance of + code that it refers to (the Linux kernel) is copyrighted by me and others who + actually wrote it. + . + Also note that the only valid version of the GPL as far as the kernel is + concerned is _this_ particular version of the license (ie v2, not v2.2 or v3.x + or whatever), unless explicitly otherwise stated. + . + Linus Torvalds + . + This program is free software; you can redistribute it and/or modify + it under the terms of the GNU General Public License as published by + the Free Software Foundation; version 2 of the License. + . + This program is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU General Public License for more details. + . + You should have received a copy of the GNU General Public License + along with this program; if not, write to the Free Software Foundation, Inc., + 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA. + . + On Debian and systems the full text of the GNU General Public + License version 2 can be found in the file + `/usr/share/common-licenses/GPL-2` + License: GPL-2+ This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by diff --git a/content/cumulus-linux-43/Whats-New/licenses/libsystemd0.txt b/content/cumulus-linux-43/Whats-New/licenses/libsystemd0.txt index 1f66c2054a..8dc9bd1380 100644 --- a/content/cumulus-linux-43/Whats-New/licenses/libsystemd0.txt +++ b/content/cumulus-linux-43/Whats-New/licenses/libsystemd0.txt @@ -38,18 +38,33 @@ Copyright: 2012 Jean-Philippe Aumasson 2012 Daniel J. Bernstein License: CC0-1.0 -Files: src/basic/securebits.h -Copyright: Linus Torvalds -License: GPL-2 - Files: src/basic/ioprio.h Copyright: Jens Axboe License: GPL-2 -Files: src/shared/linux/auto_dev-ioctl.h -Copyright: 2008 Red Hat, Inc. +Files: src/shared/linux/* + src/basic/linux/* +Copyright: 2004-2009 Red Hat, Inc. + 2011-2014 PLUMgrid + 2001-2003 Sistina Software (UK) Limited. 2008 Ian Kent -License: GPL-2+ + 1998 David S. Miller >davem@redhat.com> + 2001 Jeff Garzik + 2006-2010 Johannes Berg + 2008 Luis Carlos Cobo + 2008 Michael Buesch + 2008, 2009 Luis R. Rodriguez + 2008 Jouni Malinen + 2008 Colin McCabe + 2018-2019 Intel Corporation + 2007 Oracle. + 2009 Wolfgang Grandegger + 1999 Thomas Davis + 2015 Sabrina Dubroca + 1999-2000 Maxim Krasnyansky + 2015-2019 Jason A. Donenfeld +License: GPL-2 with Linux-syscall-note exception Files: src/basic/sparse-endian.h Copyright: 2012 Josh Triplett @@ -62,7 +77,44 @@ License: public-domain You can use this free for any purpose. It's in the public domain. It has no warranty. -Files: src/udev/* +Files: src/udev/ata_id/ata_id.c + src/udev/cdrom_id/cdrom_id.c + src/udev/mtd_probe/mtd_probe.c + src/udev/mtd_probe/mtd_probe.h + src/udev/mtd_probe/probe_smartmedia.c + src/udev/scsi_id/scsi.h + src/udev/scsi_id/scsi_id.c + src/udev/scsi_id/scsi_id.h + src/udev/scsi_id/scsi_serial.c + src/udev/udevadm.c + src/udev/udevadm-control.c + src/udev/udevadm.h + src/udev/udevadm-info.c + src/udev/udevadm-monitor.c + src/udev/udevadm-settle.c + src/udev/udevadm-test-builtin.c + src/udev/udevadm-test.c + src/udev/udevadm-trigger.c + src/udev/udevadm-util.c + src/udev/udevadm-util.h + src/udev/udev-builtin-blkid.c + src/udev/udev-builtin.h + src/udev/udev-builtin-input_id.c + src/udev/udev-builtin-kmod.c + src/udev/udev-builtin-path_id.c + src/udev/udev-builtin-uaccess.c + src/udev/udev-builtin-usb_id.c + src/udev/udev-ctrl.h + src/udev/udevd.c + src/udev/udev-event.c + src/udev/udev-event.h + src/udev/udev-node.c + src/udev/udev-node.h + src/udev/udev-rules.c + src/udev/udev-rules.h + src/udev/udev-watch.c + src/udev/udev-watch.h + src/udev/v4l_id/v4l_id.c Copyright: 2003-2012 Kay Sievers 2003-2004 Greg Kroah-Hartman 2004 Chris Friesen @@ -84,25 +136,9 @@ Copyright: 2003-2012 Kay Sievers 2014 Carlos Garnacho License: GPL-2+ -Files: src/udev/udev-ctrl.c - src/udev/udevadm-hwdb.c - src/udev/udev-builtin.c - src/udev/udev-builtin-net_id.c - src/udev/udev-builtin-net_setup_link.c - src/udev/udev-builtin-hwdb.c - src/udev/udev-builtin-btrfs.c - src/udev/udev-builtin-keyboard.c - src/udev/net/link-config.h - src/udev/net/link-config.c - src/udev/net/ethtool-util.c - src/udev/net/ethtool-util.h -Copyright: 2007-2013 Kay Sievers - 2013 Tom Gundersen -License: LGPL-2.1+ - -Files: src/udev/scsi_id/scsi.h +Files: src/udev/scsi_id/* Copyright: 2003 IBM Corp. -License: GPL-2 +License: GPL-2+ Files: debian/* Copyright: 2010-2013 Tollef Fog Heen @@ -147,6 +183,37 @@ License: GPL-2 License version 2 can be found in the file `/usr/share/common-licenses/GPL-2` +License: GPL-2 with Linux-syscall-note exception + NOTE! This copyright does *not* cover user programs that use kernel services + by normal system calls - this is merely considered normal use of the kernel, + and does *not* fall under the heading of "derived work". Also note that the + GPL below is copyrighted by the Free Software Foundation, but the instance of + code that it refers to (the Linux kernel) is copyrighted by me and others who + actually wrote it. + . + Also note that the only valid version of the GPL as far as the kernel is + concerned is _this_ particular version of the license (ie v2, not v2.2 or v3.x + or whatever), unless explicitly otherwise stated. + . + Linus Torvalds + . + This program is free software; you can redistribute it and/or modify + it under the terms of the GNU General Public License as published by + the Free Software Foundation; version 2 of the License. + . + This program is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU General Public License for more details. + . + You should have received a copy of the GNU General Public License + along with this program; if not, write to the Free Software Foundation, Inc., + 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA. + . + On Debian and systems the full text of the GNU General Public + License version 2 can be found in the file + `/usr/share/common-licenses/GPL-2` + License: GPL-2+ This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by diff --git a/content/cumulus-linux-43/Whats-New/licenses/libudev-dev.txt b/content/cumulus-linux-43/Whats-New/licenses/libudev-dev.txt index 1f66c2054a..8dc9bd1380 100644 --- a/content/cumulus-linux-43/Whats-New/licenses/libudev-dev.txt +++ b/content/cumulus-linux-43/Whats-New/licenses/libudev-dev.txt @@ -38,18 +38,33 @@ Copyright: 2012 Jean-Philippe Aumasson 2012 Daniel J. Bernstein License: CC0-1.0 -Files: src/basic/securebits.h -Copyright: Linus Torvalds -License: GPL-2 - Files: src/basic/ioprio.h Copyright: Jens Axboe License: GPL-2 -Files: src/shared/linux/auto_dev-ioctl.h -Copyright: 2008 Red Hat, Inc. +Files: src/shared/linux/* + src/basic/linux/* +Copyright: 2004-2009 Red Hat, Inc. + 2011-2014 PLUMgrid + 2001-2003 Sistina Software (UK) Limited. 2008 Ian Kent -License: GPL-2+ + 1998 David S. Miller >davem@redhat.com> + 2001 Jeff Garzik + 2006-2010 Johannes Berg + 2008 Luis Carlos Cobo + 2008 Michael Buesch + 2008, 2009 Luis R. Rodriguez + 2008 Jouni Malinen + 2008 Colin McCabe + 2018-2019 Intel Corporation + 2007 Oracle. + 2009 Wolfgang Grandegger + 1999 Thomas Davis + 2015 Sabrina Dubroca + 1999-2000 Maxim Krasnyansky + 2015-2019 Jason A. Donenfeld +License: GPL-2 with Linux-syscall-note exception Files: src/basic/sparse-endian.h Copyright: 2012 Josh Triplett @@ -62,7 +77,44 @@ License: public-domain You can use this free for any purpose. It's in the public domain. It has no warranty. -Files: src/udev/* +Files: src/udev/ata_id/ata_id.c + src/udev/cdrom_id/cdrom_id.c + src/udev/mtd_probe/mtd_probe.c + src/udev/mtd_probe/mtd_probe.h + src/udev/mtd_probe/probe_smartmedia.c + src/udev/scsi_id/scsi.h + src/udev/scsi_id/scsi_id.c + src/udev/scsi_id/scsi_id.h + src/udev/scsi_id/scsi_serial.c + src/udev/udevadm.c + src/udev/udevadm-control.c + src/udev/udevadm.h + src/udev/udevadm-info.c + src/udev/udevadm-monitor.c + src/udev/udevadm-settle.c + src/udev/udevadm-test-builtin.c + src/udev/udevadm-test.c + src/udev/udevadm-trigger.c + src/udev/udevadm-util.c + src/udev/udevadm-util.h + src/udev/udev-builtin-blkid.c + src/udev/udev-builtin.h + src/udev/udev-builtin-input_id.c + src/udev/udev-builtin-kmod.c + src/udev/udev-builtin-path_id.c + src/udev/udev-builtin-uaccess.c + src/udev/udev-builtin-usb_id.c + src/udev/udev-ctrl.h + src/udev/udevd.c + src/udev/udev-event.c + src/udev/udev-event.h + src/udev/udev-node.c + src/udev/udev-node.h + src/udev/udev-rules.c + src/udev/udev-rules.h + src/udev/udev-watch.c + src/udev/udev-watch.h + src/udev/v4l_id/v4l_id.c Copyright: 2003-2012 Kay Sievers 2003-2004 Greg Kroah-Hartman 2004 Chris Friesen @@ -84,25 +136,9 @@ Copyright: 2003-2012 Kay Sievers 2014 Carlos Garnacho License: GPL-2+ -Files: src/udev/udev-ctrl.c - src/udev/udevadm-hwdb.c - src/udev/udev-builtin.c - src/udev/udev-builtin-net_id.c - src/udev/udev-builtin-net_setup_link.c - src/udev/udev-builtin-hwdb.c - src/udev/udev-builtin-btrfs.c - src/udev/udev-builtin-keyboard.c - src/udev/net/link-config.h - src/udev/net/link-config.c - src/udev/net/ethtool-util.c - src/udev/net/ethtool-util.h -Copyright: 2007-2013 Kay Sievers - 2013 Tom Gundersen -License: LGPL-2.1+ - -Files: src/udev/scsi_id/scsi.h +Files: src/udev/scsi_id/* Copyright: 2003 IBM Corp. -License: GPL-2 +License: GPL-2+ Files: debian/* Copyright: 2010-2013 Tollef Fog Heen @@ -147,6 +183,37 @@ License: GPL-2 License version 2 can be found in the file `/usr/share/common-licenses/GPL-2` +License: GPL-2 with Linux-syscall-note exception + NOTE! This copyright does *not* cover user programs that use kernel services + by normal system calls - this is merely considered normal use of the kernel, + and does *not* fall under the heading of "derived work". Also note that the + GPL below is copyrighted by the Free Software Foundation, but the instance of + code that it refers to (the Linux kernel) is copyrighted by me and others who + actually wrote it. + . + Also note that the only valid version of the GPL as far as the kernel is + concerned is _this_ particular version of the license (ie v2, not v2.2 or v3.x + or whatever), unless explicitly otherwise stated. + . + Linus Torvalds + . + This program is free software; you can redistribute it and/or modify + it under the terms of the GNU General Public License as published by + the Free Software Foundation; version 2 of the License. + . + This program is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU General Public License for more details. + . + You should have received a copy of the GNU General Public License + along with this program; if not, write to the Free Software Foundation, Inc., + 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA. + . + On Debian and systems the full text of the GNU General Public + License version 2 can be found in the file + `/usr/share/common-licenses/GPL-2` + License: GPL-2+ This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by diff --git a/content/cumulus-linux-43/Whats-New/licenses/libudev1.txt b/content/cumulus-linux-43/Whats-New/licenses/libudev1.txt index 1f66c2054a..8dc9bd1380 100644 --- a/content/cumulus-linux-43/Whats-New/licenses/libudev1.txt +++ b/content/cumulus-linux-43/Whats-New/licenses/libudev1.txt @@ -38,18 +38,33 @@ Copyright: 2012 Jean-Philippe Aumasson 2012 Daniel J. Bernstein License: CC0-1.0 -Files: src/basic/securebits.h -Copyright: Linus Torvalds -License: GPL-2 - Files: src/basic/ioprio.h Copyright: Jens Axboe License: GPL-2 -Files: src/shared/linux/auto_dev-ioctl.h -Copyright: 2008 Red Hat, Inc. +Files: src/shared/linux/* + src/basic/linux/* +Copyright: 2004-2009 Red Hat, Inc. + 2011-2014 PLUMgrid + 2001-2003 Sistina Software (UK) Limited. 2008 Ian Kent -License: GPL-2+ + 1998 David S. Miller >davem@redhat.com> + 2001 Jeff Garzik + 2006-2010 Johannes Berg + 2008 Luis Carlos Cobo + 2008 Michael Buesch + 2008, 2009 Luis R. Rodriguez + 2008 Jouni Malinen + 2008 Colin McCabe + 2018-2019 Intel Corporation + 2007 Oracle. + 2009 Wolfgang Grandegger + 1999 Thomas Davis + 2015 Sabrina Dubroca + 1999-2000 Maxim Krasnyansky + 2015-2019 Jason A. Donenfeld +License: GPL-2 with Linux-syscall-note exception Files: src/basic/sparse-endian.h Copyright: 2012 Josh Triplett @@ -62,7 +77,44 @@ License: public-domain You can use this free for any purpose. It's in the public domain. It has no warranty. -Files: src/udev/* +Files: src/udev/ata_id/ata_id.c + src/udev/cdrom_id/cdrom_id.c + src/udev/mtd_probe/mtd_probe.c + src/udev/mtd_probe/mtd_probe.h + src/udev/mtd_probe/probe_smartmedia.c + src/udev/scsi_id/scsi.h + src/udev/scsi_id/scsi_id.c + src/udev/scsi_id/scsi_id.h + src/udev/scsi_id/scsi_serial.c + src/udev/udevadm.c + src/udev/udevadm-control.c + src/udev/udevadm.h + src/udev/udevadm-info.c + src/udev/udevadm-monitor.c + src/udev/udevadm-settle.c + src/udev/udevadm-test-builtin.c + src/udev/udevadm-test.c + src/udev/udevadm-trigger.c + src/udev/udevadm-util.c + src/udev/udevadm-util.h + src/udev/udev-builtin-blkid.c + src/udev/udev-builtin.h + src/udev/udev-builtin-input_id.c + src/udev/udev-builtin-kmod.c + src/udev/udev-builtin-path_id.c + src/udev/udev-builtin-uaccess.c + src/udev/udev-builtin-usb_id.c + src/udev/udev-ctrl.h + src/udev/udevd.c + src/udev/udev-event.c + src/udev/udev-event.h + src/udev/udev-node.c + src/udev/udev-node.h + src/udev/udev-rules.c + src/udev/udev-rules.h + src/udev/udev-watch.c + src/udev/udev-watch.h + src/udev/v4l_id/v4l_id.c Copyright: 2003-2012 Kay Sievers 2003-2004 Greg Kroah-Hartman 2004 Chris Friesen @@ -84,25 +136,9 @@ Copyright: 2003-2012 Kay Sievers 2014 Carlos Garnacho License: GPL-2+ -Files: src/udev/udev-ctrl.c - src/udev/udevadm-hwdb.c - src/udev/udev-builtin.c - src/udev/udev-builtin-net_id.c - src/udev/udev-builtin-net_setup_link.c - src/udev/udev-builtin-hwdb.c - src/udev/udev-builtin-btrfs.c - src/udev/udev-builtin-keyboard.c - src/udev/net/link-config.h - src/udev/net/link-config.c - src/udev/net/ethtool-util.c - src/udev/net/ethtool-util.h -Copyright: 2007-2013 Kay Sievers - 2013 Tom Gundersen -License: LGPL-2.1+ - -Files: src/udev/scsi_id/scsi.h +Files: src/udev/scsi_id/* Copyright: 2003 IBM Corp. -License: GPL-2 +License: GPL-2+ Files: debian/* Copyright: 2010-2013 Tollef Fog Heen @@ -147,6 +183,37 @@ License: GPL-2 License version 2 can be found in the file `/usr/share/common-licenses/GPL-2` +License: GPL-2 with Linux-syscall-note exception + NOTE! This copyright does *not* cover user programs that use kernel services + by normal system calls - this is merely considered normal use of the kernel, + and does *not* fall under the heading of "derived work". Also note that the + GPL below is copyrighted by the Free Software Foundation, but the instance of + code that it refers to (the Linux kernel) is copyrighted by me and others who + actually wrote it. + . + Also note that the only valid version of the GPL as far as the kernel is + concerned is _this_ particular version of the license (ie v2, not v2.2 or v3.x + or whatever), unless explicitly otherwise stated. + . + Linus Torvalds + . + This program is free software; you can redistribute it and/or modify + it under the terms of the GNU General Public License as published by + the Free Software Foundation; version 2 of the License. + . + This program is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU General Public License for more details. + . + You should have received a copy of the GNU General Public License + along with this program; if not, write to the Free Software Foundation, Inc., + 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA. + . + On Debian and systems the full text of the GNU General Public + License version 2 can be found in the file + `/usr/share/common-licenses/GPL-2` + License: GPL-2+ This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by diff --git a/content/cumulus-linux-43/Whats-New/licenses/libxpm-dev.txt b/content/cumulus-linux-43/Whats-New/licenses/libxpm-dev.txt new file mode 100644 index 0000000000..ed6e05bf93 --- /dev/null +++ b/content/cumulus-linux-43/Whats-New/licenses/libxpm-dev.txt @@ -0,0 +1,71 @@ +This package was downloaded from +https://xorg.freedesktop.org/releases/individual/lib/ + +Copyright (C) 1989-95 GROUPE BULL + +Permission is hereby granted, free of charge, to any person obtaining a copy +of this software and associated documentation files (the "Software"), to +deal in the Software without restriction, including without limitation the +rights to use, copy, modify, merge, publish, distribute, sublicense, and/or +sell copies of the Software, and to permit persons to whom the Software is +furnished to do so, subject to the following conditions: + +The above copyright notice and this permission notice shall be included in +all copies or substantial portions of the Software. + +THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR +IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, +FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL +GROUPE BULL BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN +AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN +CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. + +Except as contained in this notice, the name of GROUPE BULL shall not be +used in advertising or otherwise to promote the sale, use or other dealings +in this Software without prior written authorization from GROUPE BULL. + +Copyright (C) 1998 Arnaud LE HORS + +Permission is hereby granted, free of charge, to any person obtaining a copy +of this software and associated documentation files (the "Software"), to +deal in the Software without restriction, including without limitation the +rights to use, copy, modify, merge, publish, distribute, sublicense, and/or +sell copies of the Software, and to permit persons to whom the Software is +furnished to do so, subject to the following conditions: + +The above copyright notice and this permission notice shall be included in +all copies or substantial portions of the Software. + +THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR +IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, +FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL +Arnaud LE HORS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER +IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN +CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. + +Except as contained in this notice, the name of Arnaud LE HORS shall not be +used in advertising or otherwise to promote the sale, use or other dealings +in this Software without prior written authorization from Arnaud LE HORS. + +Copyright (C) 19896 Lorens Younes + +Permission is hereby granted, free of charge, to any person obtaining a copy +of this software and associated documentation files (the "Software"), to +deal in the Software without restriction, including without limitation the +rights to use, copy, modify, merge, publish, distribute, sublicense, and/or +sell copies of the Software, and to permit persons to whom the Software is +furnished to do so, subject to the following conditions: + +The above copyright notice and this permission notice shall be included in +all copies or substantial portions of the Software. + +THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR +IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, +FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL +Lorens Younes BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER +IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN +CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. + +Except as contained in this notice, the name of Lorens Younes shall not be +used in advertising or otherwise to promote the sale, use or other dealings +in this Software without prior written authorization from Lorens Younes. diff --git a/content/cumulus-linux-43/Whats-New/licenses/libzstd-dev.txt b/content/cumulus-linux-43/Whats-New/licenses/libzstd-dev.txt new file mode 100644 index 0000000000..65461ac92e --- /dev/null +++ b/content/cumulus-linux-43/Whats-New/licenses/libzstd-dev.txt @@ -0,0 +1,133 @@ +Format: https://www.debian.org/doc/packaging-manuals/copyright-format/1.0/ +Upstream-Name: Zstd +Source: https://github.com/facebook/zstd +Files-Excluded: appveyor.yml + build/* + programs/windres/* + .travis.yml + .buckversion + .buckconfig + .circleci/* + .cirrus.yml + +Files: * +Copyright: 2013-2018, Yann Collet + 2016, Przemyslaw Skibinski + 2016-2018, Facebook, Inc. +License: BSD-3-clause and GPL-2 +Comment: Starting from 1.3.1 zstd's patent claim is removed + see: https://github.com/facebook/zstd/pull/801 + +Files: zlibWrapper/examples/*.c +Copyright: 1995-2006, 2011 Jean-loup Gailly +License: zlib + +Files: zlibWrapper/gz*.c +Copyright: (C) 2004, 2005, 2010, 2011, 2012, 2013 Mark Adler +License: zlib + +License: zlib + This software is provided 'as-is', without any express or implied + warranty. In no event will the authors be held liable for any damages + arising from the use of this software. + . + Permission is granted to anyone to use this software for any purpose, + including commercial applications, and to alter it and redistribute it + freely, subject to the following restrictions: + . + 1. The origin of this software must not be misrepresented; you must not + claim that you wrote the original software. If you use this software + in a product, an acknowledgement in the product documentation would be + appreciated but is not required. + 2. Altered source versions must be plainly marked as such, and must not be + misrepresented as being the original software. + 3. This notice may not be removed or altered from any source distribution. + +Files: contrib/linux-kernel/fs/squashfs/* +Copyright: 2017 Facebook +License: GPL-2+ + This program is free software; you can redistribute it and/or + modify it under the terms of the GNU General Public License + as published by the Free Software Foundation; either version 2, + or (at your option) any later version. + . + This program is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU General Public License for more details. + . + On Debian systems you can find a full copy of the GNU General Public + License version 2 at /usr/share/common-licenses/GPL-2. + +Files: lib/dictBuilder/divsufsort.* +Copyright: 2003-2008, Yuta Mori +License: Expat + +Files: examples/* +Copyright: 2016-present, Yann Collet, Facebook, Inc. +License: BSD-3-clause and GPL-2 + +Files: debian/* +Copyright: 2015-2016 Kevin Murray +License: Expat + +License: Expat + Permission is hereby granted, free of charge, to any person obtaining + a copy of this software and associated documentation files (the + "Software"), to deal in the Software without restriction, including + without limitation the rights to use, copy, modify, merge, publish, + distribute, sublicense, and/or sell copies of the Software, and to + permit persons to whom the Software is furnished to do so, subject to + the following conditions: + . + The above copyright notice and this permission notice shall be + included in all copies or substantial portions of the Software. + . + THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, + EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF + MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND + NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS + BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN + ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN + CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE + SOFTWARE. + +License: GPL-2 + This program is free software; you can redistribute it and/or modify + it under the terms of the GNU General Public License, v2, as + published by the Free Software Foundation + . + This program is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU General Public License for more details. + . + You should have received a copy of the GNU General Public License along + with this program; if not, write to the Free Software Foundation, Inc., + 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. + . + On Debian systems, the complete text of the GNU General Public + License version 2 can be found in `/usr/share/common-licenses/GPL-2'. + +License: BSD-3-clause + Redistribution and use in source and binary forms, with or without + modification, are permitted provided that the following conditions are met: + * Redistributions of source code must retain the above copyright + notice, this list of conditions and the following disclaimer. + * Redistributions in binary form must reproduce the above copyright + notice, this list of conditions and the following disclaimer in the + documentation and/or other materials provided with the distribution. + * Neither the name of cereal nor the + names of its contributors may be used to endorse or promote products + derived from this software without specific prior written permission. + . + THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND + ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED + WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE + DISCLAIMED. IN NO EVENT SHALL RANDOLPH VOORHIES OR SHANE GRANT BE LIABLE FOR ANY + DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES + (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; + LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND + ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT + (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS + SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. diff --git a/content/cumulus-linux-43/Whats-New/licenses/libzstd1.txt b/content/cumulus-linux-43/Whats-New/licenses/libzstd1.txt index 4242179ead..65461ac92e 100644 --- a/content/cumulus-linux-43/Whats-New/licenses/libzstd1.txt +++ b/content/cumulus-linux-43/Whats-New/licenses/libzstd1.txt @@ -2,13 +2,13 @@ Format: https://www.debian.org/doc/packaging-manuals/copyright-format/1.0/ Upstream-Name: Zstd Source: https://github.com/facebook/zstd Files-Excluded: appveyor.yml - circle.yml build/* programs/windres/* .travis.yml .buckversion .buckconfig .circleci/* + .cirrus.yml Files: * Copyright: 2013-2018, Yann Collet diff --git a/content/cumulus-linux-43/Whats-New/licenses/openssl-dbgsym.txt b/content/cumulus-linux-43/Whats-New/licenses/openssl-dbgsym.txt new file mode 100644 index 0000000000..44c119229e --- /dev/null +++ b/content/cumulus-linux-43/Whats-New/licenses/openssl-dbgsym.txt @@ -0,0 +1 @@ +openssl-dbgsym has no copyright file diff --git a/content/cumulus-linux-43/Whats-New/licenses/python3-pip.txt b/content/cumulus-linux-43/Whats-New/licenses/python3-pip.txt new file mode 100644 index 0000000000..1293be681c --- /dev/null +++ b/content/cumulus-linux-43/Whats-New/licenses/python3-pip.txt @@ -0,0 +1,111 @@ +Format: https://www.debian.org/doc/packaging-manuals/copyright-format/1.0/ +Source: http://www.pip-installer.org/ + +Files: * +Copyright: Copyright © 2008-2013 The pip developers: + Alex Grönholm + Alex Morega + Alexandre Conrad + Andrey Bulgakov + Antti Kaihola + Armin Ronacher + Aziz Köksal + Ben Rosser + Brian Rosner + Carl Meyer + Chris McDonough + Christian Oudard + Clay McClure + Cody Soyland + Daniel Holth + Dave Abrahams + David (d1b) + Dmitry Gladkov + Donald Stufft + Francesco + Geoffrey Lehée + Georgi Valkov + Hugo Lopes Tavares + Ian Bicking + Igor Sobreira + Ionel Maries Cristian + Jakub Vysoky + James Cleveland + Jannis Leidel + Jay Graves + John-Scott Atlakson + Jon Parise + Jonas Nockert + Josh Bronson + Kamal Bin Mustafa + Kelsey Hightower + Kenneth Belitzky + Kumar McMillan + Luke Macken + Masklinn + Marc Abramowitz + Marcus Smith + Markus Hametner + Matt Maker + Maxime R. + Miguel Araujo + Nick Stenning + Nowell Strite + Oliver Tonnhofer + Olivier Girardot + Patrick Jenkins + Paul Moore + Paul Nasrat + Paul Oswald + Paul van der Linden + Peter Waller + Phil Whelan + Piet Delport + Przemek Wrzos + Qiangning Hong + Rafael Caricio + Rene Dudfield + Roey Berman + Ronny Pfannschmidt + Rory McCann + Simon Cross + Stavros Korokithakis + Thomas Fenzl + Thomas Johansson + Vinay Sajip + Vitaly Babiy + W Trevor King + Wil Tan + Hsiaoming Yang +License: Expat + +Files: pip/cacert.pem +Copyright: No copyrightable material +License: public-domain + Upstream declares that this bundle is licensed, but it seems unreasonable + to think that CA certificates would be protected by copyright. + Forwarded: https://github.com/pypa/pip/pull/971 + +Files: debian/* +Copyright: Copyright 2009 Jeff Licquia +License: Expat + +License: Expat + Permission is hereby granted, free of charge, to any person obtaining + a copy of this software and associated documentation files (the + "Software"), to deal in the Software without restriction, including + without limitation the rights to use, copy, modify, merge, publish, + distribute, sublicense, and/or sell copies of the Software, and to + permit persons to whom the Software is furnished to do so, subject to + the following conditions: + . + The above copyright notice and this permission notice shall be + included in all copies or substantial portions of the Software. + . + THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, + EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF + MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND + NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE + LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION + OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION + WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. diff --git a/content/cumulus-linux-43/Whats-New/licenses/python3-pycurl.txt b/content/cumulus-linux-43/Whats-New/licenses/python3-pycurl.txt new file mode 100644 index 0000000000..7674f114a4 --- /dev/null +++ b/content/cumulus-linux-43/Whats-New/licenses/python3-pycurl.txt @@ -0,0 +1,42 @@ +Format: https://www.debian.org/doc/packaging-manuals/copyright-format/1.0/ +Upstream-Name: pycurl +Source: http://pycurl.sourceforge.net + +Files: * +Copyright: + Copyright (C) 2001-2008 by Kjetil Jacobsen + Copyright (C) 2001-2008 by Markus F.X.J. Oberhumer + Copyright (C) 2013-2014 by Oleg Pudeyev +License: LGPL-2.1 + PycURL is dual licensed under the LGPL (either version 2.1 or later) + and an MIT/X derivative license based on the cURL license. You can + redistribute and/or modify PycURL according to the terms of either + license. + . + On Debian GNU/Linux systems, the complete text of the GNU Lesser General + Public License can be found in '/usr/share/common-licenses/LGPL-2.1'. + +License: MIT + Permission to use, copy, modify, and distribute this software for any purpose + with or without fee is hereby granted, provided that the above copyright + notice and this permission notice appear in all copies. + . + THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR + IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, + FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS. IN + NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, + DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR + OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE + OR OTHER DEALINGS IN THE SOFTWARE. + . + Except as contained in this notice, the name of a copyright holder shall not + be used in advertising or otherwise to promote the sale, use or other dealings + in this Software without prior written authorization of the copyright holder. + +Files: tests/ext/test-lib.sh +Copyright: Copyright (c) 2010 Ryan Tomayko +License: MIT + +Files: debian/* +Copyright: 2008-2014 Sandro Tosi +License: MIT diff --git a/content/cumulus-linux-43/Whats-New/licenses/python3-scapy.txt b/content/cumulus-linux-43/Whats-New/licenses/python3-scapy.txt new file mode 100644 index 0000000000..40ccd04460 --- /dev/null +++ b/content/cumulus-linux-43/Whats-New/licenses/python3-scapy.txt @@ -0,0 +1,27 @@ +This package was debianized by Alberto Gonzalez Iniesta on +Thu, 08 May 2003 15:22:45 +0200 + +It was downloaded from http://www.secdev.org/projects/scapy/files/ + +Upstream Authors: Philippe Biondi + +Copyright (C) 2003 Philippe Biondi + + This program is free software; you can redistribute it and/or modify it + under the terms of the GNU General Public License version 2 as + published by the Free Software Foundation. + + This program is distributed in the hope that it will be useful, but + WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU + General Public License for more details. + + You should have received a copy of the GNU General Public License along + with this program; if not, write to the Free Software Foundation, Inc., + 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. + +On Debian GNU/Linux systems, the complete text of the GNU General +Public License can be found in `/usr/share/common-licenses/GPL-2'. + +The Debian packaging is (C) 2007,2008 David Villa and +is licensed under the GPL. diff --git a/content/cumulus-linux-43/Whats-New/licenses/python3-systemd.txt b/content/cumulus-linux-43/Whats-New/licenses/python3-systemd.txt new file mode 100644 index 0000000000..ec954d2f01 --- /dev/null +++ b/content/cumulus-linux-43/Whats-New/licenses/python3-systemd.txt @@ -0,0 +1,33 @@ +Format: https://www.debian.org/doc/packaging-manuals/copyright-format/1.0/ +Upstream-Name: python-systemd +Upstream-Contact: systemd-devel@lists.freedesktop.org +Source: https://github.com/systemd/python-systemd + +Files: * +Copyright: 2012 David Strauss + 2012-2013 Zbigniew Jędrzejewski-Szmek + 2010 Lennart Poettering + 2012 Marti Raudsepp +License: LGPL-2.1+ + +Files: debian/* +Copyright: 2015 Michael Biebl +License: LGPL-2.1+ + +License: LGPL-2.1+ + This program is free software; you can redistribute it and/or modify + it under the terms of the GNU Lesser General Public License as published by + the Free Software Foundation; either version 2.1, or (at your option) + any later version. + . + This program is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU Lesser General Public License for more details. + . + You should have received a copy of the GNU Lesser General Public License along + with this program; if not, write to the Free Software Foundation, + Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA. + . + On Debian systems, the complete text of the GNU Lesser General Public + License version 2.1 can be found in ‘/usr/share/common-licenses/LGPL-2.1’. diff --git a/content/cumulus-linux-43/Whats-New/licenses/python3-texttable.txt b/content/cumulus-linux-43/Whats-New/licenses/python3-texttable.txt new file mode 100644 index 0000000000..03b44acebc --- /dev/null +++ b/content/cumulus-linux-43/Whats-New/licenses/python3-texttable.txt @@ -0,0 +1,50 @@ +Format: https://www.debian.org/doc/packaging-manuals/copyright-format/1.0/ +Upstream-Name: texttable +Source: https://pypi.python.org/pypi/texttable + +Files: * +Copyright: 2018 Gerome Fournier +License: Expat + +Files: debian/* +Copyright: 2013 Léo Cavaillé + 2016 Sergio Durigan Junior +License: LGPL-2.1+ + +License: Expat + Permission is hereby granted, free of charge, to any person obtaining + a copy of this software and associated documentation files (the + "Software"), to deal in the Software without restriction, including + without limitation the rights to use, copy, modify, merge, publish, + distribute, sublicense, and/or sell copies of the Software, and to + permit persons to whom the Software is furnished to do so, subject to + the following conditions: + . + The above copyright notice and this permission notice shall be + included in all copies or substantial portions of the Software. + . + THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, + EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF + MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND + NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE + LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION + OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION + WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. + +License: LGPL-2.1+ + texttable is free software; you can redistribute it and/or + modify it under the terms of the GNU Lesser General Public + License as published by the Free Software Foundation; either + version 2.1 of the License, or (at your option) any later version. + . + texttable is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU + Lesser General Public License for more details. + . + You should have received a copy of the GNU Lesser General Public + License along with texttable; if not, write to the Free Software + Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA + . + On Debian systems, a copy of the license can be found at + `/usr/share/common-licenses/LGPL-2.1`. diff --git a/content/cumulus-linux-43/Whats-New/licenses/python3-typing-extensions.txt b/content/cumulus-linux-43/Whats-New/licenses/python3-typing-extensions.txt new file mode 100644 index 0000000000..3264d29b4f --- /dev/null +++ b/content/cumulus-linux-43/Whats-New/licenses/python3-typing-extensions.txt @@ -0,0 +1,57 @@ +Format: https://www.debian.org/doc/packaging-manuals/copyright-format/1.0/ +Upstream-Name: typing-extensions +Source: https://pypi.python.org/pypi/typing-extensions + +Files: * +Copyright: 2016 Python Software Foundation +License: PSF + +Files: debian/* +Copyright: 2018 Michael R. Crusoe +License: PSF + +License: PSF + 1. This LICENSE AGREEMENT is between the Python Software Foundation + ("PSF"), and the Individual or Organization ("Licensee") accessing and + otherwise using this software ("Python") in source or binary form and + its associated documentation. + . + 2. Subject to the terms and conditions of this License Agreement, PSF hereby + grants Licensee a nonexclusive, royalty-free, world-wide license to reproduce, + analyze, test, perform and/or display publicly, prepare derivative works, + distribute, and otherwise use Python alone or in any derivative version, + provided, however, that PSF's License Agreement and PSF's notice of copyright, + i.e., "Copyright (c) 2001, 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009, 2010, + 2011, 2012, 2013, 2014 Python Software Foundation; All Rights Reserved" are + retained in Python alone or in any derivative version prepared by Licensee. + . + 3. In the event Licensee prepares a derivative work that is based on + or incorporates Python or any part thereof, and wants to make + the derivative work available to others as provided herein, then + Licensee hereby agrees to include in any such work a brief summary of + the changes made to Python. + . + 4. PSF is making Python available to Licensee on an "AS IS" + basis. PSF MAKES NO REPRESENTATIONS OR WARRANTIES, EXPRESS OR + IMPLIED. BY WAY OF EXAMPLE, BUT NOT LIMITATION, PSF MAKES NO AND + DISCLAIMS ANY REPRESENTATION OR WARRANTY OF MERCHANTABILITY OR FITNESS + FOR ANY PARTICULAR PURPOSE OR THAT THE USE OF PYTHON WILL NOT + INFRINGE ANY THIRD PARTY RIGHTS. + . + 5. PSF SHALL NOT BE LIABLE TO LICENSEE OR ANY OTHER USERS OF PYTHON + FOR ANY INCIDENTAL, SPECIAL, OR CONSEQUENTIAL DAMAGES OR LOSS AS + A RESULT OF MODIFYING, DISTRIBUTING, OR OTHERWISE USING PYTHON, + OR ANY DERIVATIVE THEREOF, EVEN IF ADVISED OF THE POSSIBILITY THEREOF. + . + 6. This License Agreement will automatically terminate upon a material + breach of its terms and conditions. + . + 7. Nothing in this License Agreement shall be deemed to create any + relationship of agency, partnership, or joint venture between PSF and + Licensee. This License Agreement does not grant permission to use PSF + trademarks or trade name in a trademark sense to endorse or promote + products or services of Licensee, or any third party. + . + 8. By copying, installing or otherwise using Python, Licensee + agrees to be bound by the terms and conditions of this License + Agreement. diff --git a/content/cumulus-linux-43/Whats-New/licenses/python3.7-doc.txt b/content/cumulus-linux-43/Whats-New/licenses/python3.7-doc.txt new file mode 100644 index 0000000000..1655fbe09c --- /dev/null +++ b/content/cumulus-linux-43/Whats-New/licenses/python3.7-doc.txt @@ -0,0 +1,995 @@ +This package was put together by Klee Dienes from +sources from ftp.python.org:/pub/python, based on the Debianization by +the previous maintainers Bernd S. Brentrup and +Bruce Perens. Current maintainer is Matthias Klose . + +It was downloaded from http://python.org/ + +Copyright: + +Upstream Author: Guido van Rossum and others. + +License: + +The following text includes the Python license and licenses and +acknowledgements for incorporated software. The licenses can be read +in the HTML and texinfo versions of the documentation as well, after +installing the pythonx.y-doc package. Licenses for files not licensed +under the Python Licenses are found at the end of this file. + + +Python License +============== + +A. HISTORY OF THE SOFTWARE +========================== + +Python was created in the early 1990s by Guido van Rossum at Stichting +Mathematisch Centrum (CWI, see http://www.cwi.nl) in the Netherlands +as a successor of a language called ABC. Guido remains Python's +principal author, although it includes many contributions from others. + +In 1995, Guido continued his work on Python at the Corporation for +National Research Initiatives (CNRI, see http://www.cnri.reston.va.us) +in Reston, Virginia where he released several versions of the +software. + +In May 2000, Guido and the Python core development team moved to +BeOpen.com to form the BeOpen PythonLabs team. In October of the same +year, the PythonLabs team moved to Digital Creations (now Zope +Corporation, see http://www.zope.com). In 2001, the Python Software +Foundation (PSF, see http://www.python.org/psf/) was formed, a +non-profit organization created specifically to own Python-related +Intellectual Property. Zope Corporation is a sponsoring member of +the PSF. + +All Python releases are Open Source (see http://www.opensource.org for +the Open Source Definition). Historically, most, but not all, Python +releases have also been GPL-compatible; the table below summarizes +the various releases. + + Release Derived Year Owner GPL- + from compatible? (1) + + 0.9.0 thru 1.2 1991-1995 CWI yes + 1.3 thru 1.5.2 1.2 1995-1999 CNRI yes + 1.6 1.5.2 2000 CNRI no + 2.0 1.6 2000 BeOpen.com no + 1.6.1 1.6 2001 CNRI yes (2) + 2.1 2.0+1.6.1 2001 PSF no + 2.0.1 2.0+1.6.1 2001 PSF yes + 2.1.1 2.1+2.0.1 2001 PSF yes + 2.2 2.1.1 2001 PSF yes + 2.1.2 2.1.1 2002 PSF yes + 2.1.3 2.1.2 2002 PSF yes + 2.2 and above 2.1.1 2001-now PSF yes + +Footnotes: + +(1) GPL-compatible doesn't mean that we're distributing Python under + the GPL. All Python licenses, unlike the GPL, let you distribute + a modified version without making your changes open source. The + GPL-compatible licenses make it possible to combine Python with + other software that is released under the GPL; the others don't. + +(2) According to Richard Stallman, 1.6.1 is not GPL-compatible, + because its license has a choice of law clause. According to + CNRI, however, Stallman's lawyer has told CNRI's lawyer that 1.6.1 + is "not incompatible" with the GPL. + +Thanks to the many outside volunteers who have worked under Guido's +direction to make these releases possible. + + +B. TERMS AND CONDITIONS FOR ACCESSING OR OTHERWISE USING PYTHON +=============================================================== + +PYTHON SOFTWARE FOUNDATION LICENSE VERSION 2 +-------------------------------------------- + +1. This LICENSE AGREEMENT is between the Python Software Foundation +("PSF"), and the Individual or Organization ("Licensee") accessing and +otherwise using this software ("Python") in source or binary form and +its associated documentation. + +2. Subject to the terms and conditions of this License Agreement, PSF +hereby grants Licensee a nonexclusive, royalty-free, world-wide +license to reproduce, analyze, test, perform and/or display publicly, +prepare derivative works, distribute, and otherwise use Python alone +or in any derivative version, provided, however, that PSF's License +Agreement and PSF's notice of copyright, i.e., "Copyright (c) 2001, +2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009, 2010, 2011, 2012, +2013, 2014 Python Software Foundation; All Rights Reserved" are +retained in Python alone or in any derivative version prepared by +Licensee. + +3. In the event Licensee prepares a derivative work that is based on +or incorporates Python or any part thereof, and wants to make +the derivative work available to others as provided herein, then +Licensee hereby agrees to include in any such work a brief summary of +the changes made to Python. + +4. PSF is making Python available to Licensee on an "AS IS" +basis. PSF MAKES NO REPRESENTATIONS OR WARRANTIES, EXPRESS OR +IMPLIED. BY WAY OF EXAMPLE, BUT NOT LIMITATION, PSF MAKES NO AND +DISCLAIMS ANY REPRESENTATION OR WARRANTY OF MERCHANTABILITY OR FITNESS +FOR ANY PARTICULAR PURPOSE OR THAT THE USE OF PYTHON WILL NOT +INFRINGE ANY THIRD PARTY RIGHTS. + +5. PSF SHALL NOT BE LIABLE TO LICENSEE OR ANY OTHER USERS OF PYTHON +FOR ANY INCIDENTAL, SPECIAL, OR CONSEQUENTIAL DAMAGES OR LOSS AS +A RESULT OF MODIFYING, DISTRIBUTING, OR OTHERWISE USING PYTHON, +OR ANY DERIVATIVE THEREOF, EVEN IF ADVISED OF THE POSSIBILITY THEREOF. + +6. This License Agreement will automatically terminate upon a material +breach of its terms and conditions. + +7. Nothing in this License Agreement shall be deemed to create any +relationship of agency, partnership, or joint venture between PSF and +Licensee. This License Agreement does not grant permission to use PSF +trademarks or trade name in a trademark sense to endorse or promote +products or services of Licensee, or any third party. + +8. By copying, installing or otherwise using Python, Licensee +agrees to be bound by the terms and conditions of this License +Agreement. + + +BEOPEN.COM LICENSE AGREEMENT FOR PYTHON 2.0 +------------------------------------------- + +BEOPEN PYTHON OPEN SOURCE LICENSE AGREEMENT VERSION 1 + +1. This LICENSE AGREEMENT is between BeOpen.com ("BeOpen"), having an +office at 160 Saratoga Avenue, Santa Clara, CA 95051, and the +Individual or Organization ("Licensee") accessing and otherwise using +this software in source or binary form and its associated +documentation ("the Software"). + +2. Subject to the terms and conditions of this BeOpen Python License +Agreement, BeOpen hereby grants Licensee a non-exclusive, +royalty-free, world-wide license to reproduce, analyze, test, perform +and/or display publicly, prepare derivative works, distribute, and +otherwise use the Software alone or in any derivative version, +provided, however, that the BeOpen Python License is retained in the +Software, alone or in any derivative version prepared by Licensee. + +3. BeOpen is making the Software available to Licensee on an "AS IS" +basis. BEOPEN MAKES NO REPRESENTATIONS OR WARRANTIES, EXPRESS OR +IMPLIED. BY WAY OF EXAMPLE, BUT NOT LIMITATION, BEOPEN MAKES NO AND +DISCLAIMS ANY REPRESENTATION OR WARRANTY OF MERCHANTABILITY OR FITNESS +FOR ANY PARTICULAR PURPOSE OR THAT THE USE OF THE SOFTWARE WILL NOT +INFRINGE ANY THIRD PARTY RIGHTS. + +4. BEOPEN SHALL NOT BE LIABLE TO LICENSEE OR ANY OTHER USERS OF THE +SOFTWARE FOR ANY INCIDENTAL, SPECIAL, OR CONSEQUENTIAL DAMAGES OR LOSS +AS A RESULT OF USING, MODIFYING OR DISTRIBUTING THE SOFTWARE, OR ANY +DERIVATIVE THEREOF, EVEN IF ADVISED OF THE POSSIBILITY THEREOF. + +5. This License Agreement will automatically terminate upon a material +breach of its terms and conditions. + +6. This License Agreement shall be governed by and interpreted in all +respects by the law of the State of California, excluding conflict of +law provisions. Nothing in this License Agreement shall be deemed to +create any relationship of agency, partnership, or joint venture +between BeOpen and Licensee. This License Agreement does not grant +permission to use BeOpen trademarks or trade names in a trademark +sense to endorse or promote products or services of Licensee, or any +third party. As an exception, the "BeOpen Python" logos available at +http://www.pythonlabs.com/logos.html may be used according to the +permissions granted on that web page. + +7. By copying, installing or otherwise using the software, Licensee +agrees to be bound by the terms and conditions of this License +Agreement. + + +CNRI LICENSE AGREEMENT FOR PYTHON 1.6.1 +--------------------------------------- + +1. This LICENSE AGREEMENT is between the Corporation for National +Research Initiatives, having an office at 1895 Preston White Drive, +Reston, VA 20191 ("CNRI"), and the Individual or Organization +("Licensee") accessing and otherwise using Python 1.6.1 software in +source or binary form and its associated documentation. + +2. Subject to the terms and conditions of this License Agreement, CNRI +hereby grants Licensee a nonexclusive, royalty-free, world-wide +license to reproduce, analyze, test, perform and/or display publicly, +prepare derivative works, distribute, and otherwise use Python 1.6.1 +alone or in any derivative version, provided, however, that CNRI's +License Agreement and CNRI's notice of copyright, i.e., "Copyright (c) +1995-2001 Corporation for National Research Initiatives; All Rights +Reserved" are retained in Python 1.6.1 alone or in any derivative +version prepared by Licensee. Alternately, in lieu of CNRI's License +Agreement, Licensee may substitute the following text (omitting the +quotes): "Python 1.6.1 is made available subject to the terms and +conditions in CNRI's License Agreement. This Agreement together with +Python 1.6.1 may be located on the Internet using the following +unique, persistent identifier (known as a handle): 1895.22/1013. This +Agreement may also be obtained from a proxy server on the Internet +using the following URL: http://hdl.handle.net/1895.22/1013". + +3. In the event Licensee prepares a derivative work that is based on +or incorporates Python 1.6.1 or any part thereof, and wants to make +the derivative work available to others as provided herein, then +Licensee hereby agrees to include in any such work a brief summary of +the changes made to Python 1.6.1. + +4. CNRI is making Python 1.6.1 available to Licensee on an "AS IS" +basis. CNRI MAKES NO REPRESENTATIONS OR WARRANTIES, EXPRESS OR +IMPLIED. BY WAY OF EXAMPLE, BUT NOT LIMITATION, CNRI MAKES NO AND +DISCLAIMS ANY REPRESENTATION OR WARRANTY OF MERCHANTABILITY OR FITNESS +FOR ANY PARTICULAR PURPOSE OR THAT THE USE OF PYTHON 1.6.1 WILL NOT +INFRINGE ANY THIRD PARTY RIGHTS. + +5. CNRI SHALL NOT BE LIABLE TO LICENSEE OR ANY OTHER USERS OF PYTHON +1.6.1 FOR ANY INCIDENTAL, SPECIAL, OR CONSEQUENTIAL DAMAGES OR LOSS AS +A RESULT OF MODIFYING, DISTRIBUTING, OR OTHERWISE USING PYTHON 1.6.1, +OR ANY DERIVATIVE THEREOF, EVEN IF ADVISED OF THE POSSIBILITY THEREOF. + +6. This License Agreement will automatically terminate upon a material +breach of its terms and conditions. + +7. This License Agreement shall be governed by the federal +intellectual property law of the United States, including without +limitation the federal copyright law, and, to the extent such +U.S. federal law does not apply, by the law of the Commonwealth of +Virginia, excluding Virginia's conflict of law provisions. +Notwithstanding the foregoing, with regard to derivative works based +on Python 1.6.1 that incorporate non-separable material that was +previously distributed under the GNU General Public License (GPL), the +law of the Commonwealth of Virginia shall govern this License +Agreement only as to issues arising under or with respect to +Paragraphs 4, 5, and 7 of this License Agreement. Nothing in this +License Agreement shall be deemed to create any relationship of +agency, partnership, or joint venture between CNRI and Licensee. This +License Agreement does not grant permission to use CNRI trademarks or +trade name in a trademark sense to endorse or promote products or +services of Licensee, or any third party. + +8. By clicking on the "ACCEPT" button where indicated, or by copying, +installing or otherwise using Python 1.6.1, Licensee agrees to be +bound by the terms and conditions of this License Agreement. + + ACCEPT + + +CWI LICENSE AGREEMENT FOR PYTHON 0.9.0 THROUGH 1.2 +-------------------------------------------------- + +Copyright (c) 1991 - 1995, Stichting Mathematisch Centrum Amsterdam, +The Netherlands. All rights reserved. + +Permission to use, copy, modify, and distribute this software and its +documentation for any purpose and without fee is hereby granted, +provided that the above copyright notice appear in all copies and that +both that copyright notice and this permission notice appear in +supporting documentation, and that the name of Stichting Mathematisch +Centrum or CWI not be used in advertising or publicity pertaining to +distribution of the software without specific, written prior +permission. + +STICHTING MATHEMATISCH CENTRUM DISCLAIMS ALL WARRANTIES WITH REGARD TO +THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND +FITNESS, IN NO EVENT SHALL STICHTING MATHEMATISCH CENTRUM BE LIABLE +FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES +WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN +ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT +OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. + + +Licenses and Acknowledgements for Incorporated Software +======================================================= + +Mersenne Twister +---------------- + +The `_random' module includes code based on a download from +`http://www.math.keio.ac.jp/~matumoto/MT2002/emt19937ar.html'. The +following are the verbatim comments from the original code: + + A C-program for MT19937, with initialization improved 2002/1/26. + Coded by Takuji Nishimura and Makoto Matsumoto. + + Before using, initialize the state by using init_genrand(seed) + or init_by_array(init_key, key_length). + + Copyright (C) 1997 - 2002, Makoto Matsumoto and Takuji Nishimura, + All rights reserved. + + Redistribution and use in source and binary forms, with or without + modification, are permitted provided that the following conditions + are met: + + 1. Redistributions of source code must retain the above copyright + notice, this list of conditions and the following disclaimer. + + 2. Redistributions in binary form must reproduce the above copyright + notice, this list of conditions and the following disclaimer in the + documentation and/or other materials provided with the distribution. + + 3. The names of its contributors may not be used to endorse or promote + products derived from this software without specific prior written + permission. + + THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS + "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT + LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR + A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT + OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, + SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED + TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR + PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF + LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING + NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS + SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. + + Any feedback is very welcome. + http://www.math.keio.ac.jp/matumoto/emt.html + email: matumoto@math.keio.ac.jp + + +Sockets +------- + +The `socket' module uses the functions, `getaddrinfo', and +`getnameinfo', which are coded in separate source files from the WIDE +Project, `http://www.wide.ad.jp/about/index.html'. + + Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project. + All rights reserved. + + Redistribution and use in source and binary forms, with or without + modification, are permitted provided that the following conditions + are met: + 1. Redistributions of source code must retain the above copyright + notice, this list of conditions and the following disclaimer. + 2. Redistributions in binary form must reproduce the above copyright + notice, this list of conditions and the following disclaimer in the + documentation and/or other materials provided with the distribution. + 3. Neither the name of the project nor the names of its contributors + may be used to endorse or promote products derived from this software + without specific prior written permission. + + THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND + GAI_ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE + IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE + ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE + FOR GAI_ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR + CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF + SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS + INTERRUPTION) HOWEVER CAUSED AND ON GAI_ANY THEORY OF LIABILITY, WHETHER + IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) + ARISING IN GAI_ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED + OF THE POSSIBILITY OF SUCH DAMAGE. + + +Floating point exception control +-------------------------------- + +The source for the `fpectl' module includes the following notice: + + --------------------------------------------------------------------- + / Copyright (c) 1996. \ + | The Regents of the University of California. | + | All rights reserved. | + | | + | Permission to use, copy, modify, and distribute this software for | + | any purpose without fee is hereby granted, provided that this en- | + | tire notice is included in all copies of any software which is or | + | includes a copy or modification of this software and in all | + | copies of the supporting documentation for such software. | + | | + | This work was produced at the University of California, Lawrence | + | Livermore National Laboratory under contract no. W-7405-ENG-48 | + | between the U.S. Department of Energy and The Regents of the | + | University of California for the operation of UC LLNL. | + | | + | DISCLAIMER | + | | + | This software was prepared as an account of work sponsored by an | + | agency of the United States Government. Neither the United States | + | Government nor the University of California nor any of their em- | + | ployees, makes any warranty, express or implied, or assumes any | + | liability or responsibility for the accuracy, completeness, or | + | usefulness of any information, apparatus, product, or process | + | disclosed, or represents that its use would not infringe | + | privately-owned rights. Reference herein to any specific commer- | + | cial products, process, or service by trade name, trademark, | + | manufacturer, or otherwise, does not necessarily constitute or | + | imply its endorsement, recommendation, or favoring by the United | + | States Government or the University of California. The views and | + | opinions of authors expressed herein do not necessarily state or | + | reflect those of the United States Government or the University | + | of California, and shall not be used for advertising or product | + \ endorsement purposes. / + --------------------------------------------------------------------- + + +Cookie management +----------------- + +The `Cookie' module contains the following notice: + + Copyright 2000 by Timothy O'Malley + + All Rights Reserved + + Permission to use, copy, modify, and distribute this software + and its documentation for any purpose and without fee is hereby + granted, provided that the above copyright notice appear in all + copies and that both that copyright notice and this permission + notice appear in supporting documentation, and that the name of + Timothy O'Malley not be used in advertising or publicity + pertaining to distribution of the software without specific, written + prior permission. + + Timothy O'Malley DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS + SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY + AND FITNESS, IN NO EVENT SHALL Timothy O'Malley BE LIABLE FOR + ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES + WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, + WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS + ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR + PERFORMANCE OF THIS SOFTWARE. + + +Execution tracing +----------------- + +The `trace' module contains the following notice: + + portions copyright 2001, Autonomous Zones Industries, Inc., all rights... + err... reserved and offered to the public under the terms of the + Python 2.2 license. + Author: Zooko O'Whielacronx + http://zooko.com/ + mailto:zooko@zooko.com + + Copyright 2000, Mojam Media, Inc., all rights reserved. + Author: Skip Montanaro + + Copyright 1999, Bioreason, Inc., all rights reserved. + Author: Andrew Dalke + + Copyright 1995-1997, Automatrix, Inc., all rights reserved. + Author: Skip Montanaro + + Copyright 1991-1995, Stichting Mathematisch Centrum, all rights reserved. + + Permission to use, copy, modify, and distribute this Python software and + its associated documentation for any purpose without fee is hereby + granted, provided that the above copyright notice appears in all copies, + and that both that copyright notice and this permission notice appear in + supporting documentation, and that the name of neither Automatrix, + Bioreason or Mojam Media be used in advertising or publicity pertaining + to distribution of the software without specific, written prior + permission. + + +UUencode and UUdecode functions +------------------------------- + +The `uu' module contains the following notice: + + Copyright 1994 by Lance Ellinghouse + Cathedral City, California Republic, United States of America. + All Rights Reserved + Permission to use, copy, modify, and distribute this software and its + documentation for any purpose and without fee is hereby granted, + provided that the above copyright notice appear in all copies and that + both that copyright notice and this permission notice appear in + supporting documentation, and that the name of Lance Ellinghouse + not be used in advertising or publicity pertaining to distribution + of the software without specific, written prior permission. + LANCE ELLINGHOUSE DISCLAIMS ALL WARRANTIES WITH REGARD TO + THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND + FITNESS, IN NO EVENT SHALL LANCE ELLINGHOUSE CENTRUM BE LIABLE + FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES + WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN + ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT + OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. + + Modified by Jack Jansen, CWI, July 1995: + - Use binascii module to do the actual line-by-line conversion + between ascii and binary. This results in a 1000-fold speedup. The C + version is still 5 times faster, though. + - Arguments more compliant with python standard + + +XML Remote Procedure Calls +-------------------------- + +The `xmlrpclib' module contains the following notice: + + The XML-RPC client interface is + + Copyright (c) 1999-2002 by Secret Labs AB + Copyright (c) 1999-2002 by Fredrik Lundh + + By obtaining, using, and/or copying this software and/or its + associated documentation, you agree that you have read, understood, + and will comply with the following terms and conditions: + + Permission to use, copy, modify, and distribute this software and + its associated documentation for any purpose and without fee is + hereby granted, provided that the above copyright notice appears in + all copies, and that both that copyright notice and this permission + notice appear in supporting documentation, and that the name of + Secret Labs AB or the author not be used in advertising or publicity + pertaining to distribution of the software without specific, written + prior permission. + + SECRET LABS AB AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH REGARD + TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANT- + ABILITY AND FITNESS. IN NO EVENT SHALL SECRET LABS AB OR THE AUTHOR + BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY + DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, + WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS + ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE + OF THIS SOFTWARE. + +Licenses for Software linked to +=============================== + +Note that the choice of GPL compatibility outlined above doesn't extend +to modules linked to particular libraries, since they change the +effective License of the module binary. + + +GNU Readline +------------ + +The 'readline' module makes use of GNU Readline. + + The GNU Readline Library is free software; you can redistribute it + and/or modify it under the terms of the GNU General Public License as + published by the Free Software Foundation; either version 2, or (at + your option) any later version. + + On Debian systems, you can find the complete statement in + /usr/share/doc/readline-common/copyright'. A copy of the GNU General + Public License is available in /usr/share/common-licenses/GPL-2'. + + +OpenSSL +------- + +The '_ssl' module makes use of OpenSSL. + + The OpenSSL toolkit stays under a dual license, i.e. both the + conditions of the OpenSSL License and the original SSLeay license + apply to the toolkit. Actually both licenses are BSD-style Open + Source licenses. Note that both licenses are incompatible with + the GPL. + + On Debian systems, you can find the complete license text in + /usr/share/doc/openssl/copyright'. + + +Files with other licenses than the Python License +------------------------------------------------- + +Files: Include/dynamic_annotations.h +Files: Python/dynamic_annotations.c +Copyright: (c) 2008-2009, Google Inc. +License: Redistribution and use in source and binary forms, with or without + modification, are permitted provided that the following conditions are + met: + + * Redistributions of source code must retain the above copyright + notice, this list of conditions and the following disclaimer. + * Neither the name of Google Inc. nor the names of its + contributors may be used to endorse or promote products derived from + this software without specific prior written permission. + + THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS + "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT + LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR + A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT + OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, + SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT + LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, + DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY + THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT + (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE + OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. + +Files: Include/unicodeobject.h +Copyright: (c) Corporation for National Research Initiatives. +Copyright: (c) 1999 by Secret Labs AB. +Copyright: (c) 1999 by Fredrik Lundh. +License: By obtaining, using, and/or copying this software and/or its + associated documentation, you agree that you have read, understood, + and will comply with the following terms and conditions: + + Permission to use, copy, modify, and distribute this software and its + associated documentation for any purpose and without fee is hereby + granted, provided that the above copyright notice appears in all + copies, and that both that copyright notice and this permission notice + appear in supporting documentation, and that the name of Secret Labs + AB or the author not be used in advertising or publicity pertaining to + distribution of the software without specific, written prior + permission. + + SECRET LABS AB AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH REGARD TO + THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND + FITNESS. IN NO EVENT SHALL SECRET LABS AB OR THE AUTHOR BE LIABLE FOR + ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES + WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN + ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT + OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. + +Files: Lib/logging/* +Copyright: 2001-2010 by Vinay Sajip. All Rights Reserved. +License: Permission to use, copy, modify, and distribute this software and + its documentation for any purpose and without fee is hereby granted, + provided that the above copyright notice appear in all copies and that + both that copyright notice and this permission notice appear in + supporting documentation, and that the name of Vinay Sajip + not be used in advertising or publicity pertaining to distribution + of the software without specific, written prior permission. + VINAY SAJIP DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING + ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL + VINAY SAJIP BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR + ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER + IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT + OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. + +Files: Lib/multiprocessing/* +Files: Modules/_multiprocessing/* +Copyright: (c) 2006-2008, R Oudkerk. All rights reserved. +License: Redistribution and use in source and binary forms, with or without + modification, are permitted provided that the following conditions + are met: + + 1. Redistributions of source code must retain the above copyright + notice, this list of conditions and the following disclaimer. + 2. Redistributions in binary form must reproduce the above copyright + notice, this list of conditions and the following disclaimer in the + documentation and/or other materials provided with the distribution. + 3. Neither the name of author nor the names of any contributors may be + used to endorse or promote products derived from this software + without specific prior written permission. + + THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS "AS IS" AND + ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE + IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE + ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE + FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL + DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS + OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) + HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT + LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY + OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF + SUCH DAMAGE. + +Files: Lib/sqlite3/* +Files: Modules/_sqlite/* +Copyright: (C) 2004-2005 Gerhard Häring +License: This software is provided 'as-is', without any express or implied + warranty. In no event will the authors be held liable for any damages + arising from the use of this software. + + Permission is granted to anyone to use this software for any purpose, + including commercial applications, and to alter it and redistribute it + freely, subject to the following restrictions: + + 1. The origin of this software must not be misrepresented; you must not + claim that you wrote the original software. If you use this software + in a product, an acknowledgment in the product documentation would be + appreciated but is not required. + 2. Altered source versions must be plainly marked as such, and must not be + misrepresented as being the original software. + 3. This notice may not be removed or altered from any source distribution. + +Files: Lib/async* +Copyright: Copyright 1996 by Sam Rushing +License: Permission to use, copy, modify, and distribute this software and + its documentation for any purpose and without fee is hereby + granted, provided that the above copyright notice appear in all + copies and that both that copyright notice and this permission + notice appear in supporting documentation, and that the name of Sam + Rushing not be used in advertising or publicity pertaining to + distribution of the software without specific, written prior + permission. + + SAM RUSHING DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, + INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS, IN + NO EVENT SHALL SAM RUSHING BE LIABLE FOR ANY SPECIAL, INDIRECT OR + CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS + OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, + NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN + CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. + +Files: Lib/tarfile.py +Copyright: (C) 2002 Lars Gustaebel +License: Permission is hereby granted, free of charge, to any person + obtaining a copy of this software and associated documentation + files (the "Software"), to deal in the Software without + restriction, including without limitation the rights to use, + copy, modify, merge, publish, distribute, sublicense, and/or sell + copies of the Software, and to permit persons to whom the + Software is furnished to do so, subject to the following + conditions: + + The above copyright notice and this permission notice shall be + included in all copies or substantial portions of the Software. + + THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, + EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES + OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND + NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT + HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, + WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING + FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR + OTHER DEALINGS IN THE SOFTWARE. + +Files: Lib/turtle.py +Copyright: (C) 2006 - 2010 Gregor Lingl +License: This software is provided 'as-is', without any express or implied + warranty. In no event will the authors be held liable for any damages + arising from the use of this software. + + Permission is granted to anyone to use this software for any purpose, + including commercial applications, and to alter it and redistribute it + freely, subject to the following restrictions: + + 1. The origin of this software must not be misrepresented; you must not + claim that you wrote the original software. If you use this software + in a product, an acknowledgment in the product documentation would be + appreciated but is not required. + 2. Altered source versions must be plainly marked as such, and must not be + misrepresented as being the original software. + 3. This notice may not be removed or altered from any source distribution. + + is copyright Gregor Lingl and licensed under a BSD-like license + +Files: Modules/_ctypes/libffi/* +Copyright: Copyright (C) 1996-2011 Red Hat, Inc and others. + Copyright (C) 1996-2011 Anthony Green + Copyright (C) 1996-2010 Free Software Foundation, Inc + Copyright (c) 2003, 2004, 2006, 2007, 2008 Kaz Kojima + Copyright (c) 2010, 2011, Plausible Labs Cooperative , Inc. + Copyright (c) 2010 CodeSourcery + Copyright (c) 1998 Andreas Schwab + Copyright (c) 2000 Hewlett Packard Company + Copyright (c) 2009 Bradley Smith + Copyright (c) 2008 David Daney + Copyright (c) 2004 Simon Posnjak + Copyright (c) 2005 Axis Communications AB + Copyright (c) 1998 Cygnus Solutions + Copyright (c) 2004 Renesas Technology + Copyright (c) 2002, 2007 Bo Thorsen + Copyright (c) 2002 Ranjit Mathew + Copyright (c) 2002 Roger Sayle + Copyright (c) 2000, 2007 Software AG + Copyright (c) 2003 Jakub Jelinek + Copyright (c) 2000, 2001 John Hornkvist + Copyright (c) 1998 Geoffrey Keating + Copyright (c) 2008 Björn König + +License: Permission is hereby granted, free of charge, to any person obtaining + a copy of this software and associated documentation files (the + ``Software''), to deal in the Software without restriction, including + without limitation the rights to use, copy, modify, merge, publish, + distribute, sublicense, and/or sell copies of the Software, and to + permit persons to whom the Software is furnished to do so, subject to + the following conditions: + + The above copyright notice and this permission notice shall be included + in all copies or substantial portions of the Software. + + THE SOFTWARE IS PROVIDED ``AS IS'', WITHOUT WARRANTY OF ANY KIND, + EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF + MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND + NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT + HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, + WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, + OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER + DEALINGS IN THE SOFTWARE. + + Documentation: + Permission is granted to copy, distribute and/or modify this document + under the terms of the GNU General Public License as published by the + Free Software Foundation; either version 2, or (at your option) any + later version. A copy of the license is included in the + section entitled ``GNU General Public License''. + +Files: Modules/_gestalt.c +Copyright: 1991-1997 by Stichting Mathematisch Centrum, Amsterdam. +License: Permission to use, copy, modify, and distribute this software and its + documentation for any purpose and without fee is hereby granted, + provided that the above copyright notice appear in all copies and that + both that copyright notice and this permission notice appear in + supporting documentation, and that the names of Stichting Mathematisch + Centrum or CWI not be used in advertising or publicity pertaining to + distribution of the software without specific, written prior permission. + + STICHTING MATHEMATISCH CENTRUM DISCLAIMS ALL WARRANTIES WITH REGARD TO + THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND + FITNESS, IN NO EVENT SHALL STICHTING MATHEMATISCH CENTRUM BE LIABLE + FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES + WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN + ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT + OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. + +Files: Modules/syslogmodule.c +Copyright: 1994 by Lance Ellinghouse +License: Permission to use, copy, modify, and distribute this software and its + documentation for any purpose and without fee is hereby granted, + provided that the above copyright notice appear in all copies and that + both that copyright notice and this permission notice appear in + supporting documentation, and that the name of Lance Ellinghouse + not be used in advertising or publicity pertaining to distribution + of the software without specific, written prior permission. + + LANCE ELLINGHOUSE DISCLAIMS ALL WARRANTIES WITH REGARD TO + THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND + FITNESS, IN NO EVENT SHALL LANCE ELLINGHOUSE BE LIABLE FOR ANY SPECIAL, + INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING + FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, + NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION + WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. + +Files: Modules/zlib/* +Copyright: (C) 1995-2010 Jean-loup Gailly and Mark Adler +License: This software is provided 'as-is', without any express or implied + warranty. In no event will the authors be held liable for any damages + arising from the use of this software. + + Permission is granted to anyone to use this software for any purpose, + including commercial applications, and to alter it and redistribute it + freely, subject to the following restrictions: + + 1. The origin of this software must not be misrepresented; you must not + claim that you wrote the original software. If you use this software + in a product, an acknowledgment in the product documentation would be + appreciated but is not required. + 2. Altered source versions must be plainly marked as such, and must not be + misrepresented as being the original software. + 3. This notice may not be removed or altered from any source distribution. + + Jean-loup Gailly Mark Adler + jloup@gzip.org madler@alumni.caltech.edu + + If you use the zlib library in a product, we would appreciate *not* receiving + lengthy legal documents to sign. The sources are provided for free but without + warranty of any kind. The library has been entirely written by Jean-loup + Gailly and Mark Adler; it does not include third-party code. + +Files: Modules/expat/* +Copyright: Copyright (c) 1998, 1999, 2000 Thai Open Source Software Center Ltd + and Clark Cooper + Copyright (c) 2001, 2002, 2003, 2004, 2005, 2006 Expat maintainers +License: Permission is hereby granted, free of charge, to any person obtaining + a copy of this software and associated documentation files (the + "Software"), to deal in the Software without restriction, including + without limitation the rights to use, copy, modify, merge, publish, + distribute, sublicense, and/or sell copies of the Software, and to + permit persons to whom the Software is furnished to do so, subject to + the following conditions: + + The above copyright notice and this permission notice shall be included + in all copies or substantial portions of the Software. + + THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, + EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF + MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. + IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY + CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, + TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE + SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. + +Files: Modules/_decimal/libmpdec/* +Copyright: Copyright (c) 2008-2012 Stefan Krah. All rights reserved. +License: Redistribution and use in source and binary forms, with or without + modification, are permitted provided that the following conditions + are met: + . + 1. Redistributions of source code must retain the above copyright + notice, this list of conditions and the following disclaimer. + . + 2. Redistributions in binary form must reproduce the above copyright + notice, this list of conditions and the following disclaimer in the + documentation and/or other materials provided with the distribution. + , + THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS "AS IS" AND + ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE + IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE + ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE + FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL + DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS + OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) + HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT + LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY + OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF + SUCH DAMAGE. + +Files: Misc/python-mode.el +Copyright: Copyright (C) 1992,1993,1994 Tim Peters +License: This software is provided as-is, without express or implied + warranty. Permission to use, copy, modify, distribute or sell this + software, without fee, for any purpose and by any individual or + organization, is hereby granted, provided that the above copyright + notice and this paragraph appear in all copies. + +Files: Python/dtoa.c +Copyright: (c) 1991, 2000, 2001 by Lucent Technologies. +License: Permission to use, copy, modify, and distribute this software for any + purpose without fee is hereby granted, provided that this entire notice + is included in all copies of any software which is or includes a copy + or modification of this software and in all copies of the supporting + documentation for such software. + + THIS SOFTWARE IS BEING PROVIDED "AS IS", WITHOUT ANY EXPRESS OR IMPLIED + WARRANTY. IN PARTICULAR, NEITHER THE AUTHOR NOR LUCENT MAKES ANY + REPRESENTATION OR WARRANTY OF ANY KIND CONCERNING THE MERCHANTABILITY + OF THIS SOFTWARE OR ITS FITNESS FOR ANY PARTICULAR PURPOSE. + +Files: Python/getopt.c +Copyright: 1992-1994, David Gottner +License: Permission to use, copy, modify, and distribute this software and its + documentation for any purpose and without fee is hereby granted, + provided that the above copyright notice, this permission notice and + the following disclaimer notice appear unmodified in all copies. + + I DISCLAIM ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL + IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL I + BE LIABLE FOR ANY SPECIAL, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY + DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA, OR PROFITS, WHETHER + IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT + OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. + +Files: PC/_subprocess.c +Copyright: Copyright (c) 2004 by Fredrik Lundh + Copyright (c) 2004 by Secret Labs AB, http://www.pythonware.com + Copyright (c) 2004 by Peter Astrand +License: + * Permission to use, copy, modify, and distribute this software and + * its associated documentation for any purpose and without fee is + * hereby granted, provided that the above copyright notice appears in + * all copies, and that both that copyright notice and this permission + * notice appear in supporting documentation, and that the name of the + * authors not be used in advertising or publicity pertaining to + * distribution of the software without specific, written prior + * permission. + * + * THE AUTHORS DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, + * INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. + * IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR ANY SPECIAL, INDIRECT OR + * CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS + * OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, + * NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION + * WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. + +Files: PC/winsound.c +Copyright: Copyright (c) 1999 Toby Dickenson +License: * Permission to use this software in any way is granted without + * fee, provided that the copyright notice above appears in all + * copies. This software is provided "as is" without any warranty. + */ + +/* Modified by Guido van Rossum */ +/* Beep added by Mark Hammond */ +/* Win9X Beep and platform identification added by Uncle Timmy */ + +Files: Tools/pybench/* +Copyright: (c), 1997-2006, Marc-Andre Lemburg (mal@lemburg.com) + (c), 2000-2006, eGenix.com Software GmbH (info@egenix.com) +License: Permission to use, copy, modify, and distribute this software and its + documentation for any purpose and without fee or royalty is hereby + granted, provided that the above copyright notice appear in all copies + and that both that copyright notice and this permission notice appear + in supporting documentation or portions thereof, including + modifications, that you make. + + THE AUTHOR MARC-ANDRE LEMBURG DISCLAIMS ALL WARRANTIES WITH REGARD TO + THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND + FITNESS, IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL, + INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING + FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, + NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION + WITH THE USE OR PERFORMANCE OF THIS SOFTWARE ! diff --git a/content/cumulus-linux-43/Whats-New/licenses/smartmontools.txt b/content/cumulus-linux-43/Whats-New/licenses/smartmontools.txt index 476b25a4ce..560f8ff4a8 100644 --- a/content/cumulus-linux-43/Whats-New/licenses/smartmontools.txt +++ b/content/cumulus-linux-43/Whats-New/licenses/smartmontools.txt @@ -1,19 +1,103 @@ -Format: http://www.debian.org/doc/packaging-manuals/copyright-format/1.0/ +Format: https://www.debian.org/doc/packaging-manuals/copyright-format/1.0/ Upstream-Name: smartmontools +Upstream-Contact: Christian Franke Source: http://smartmontools.sourceforge.net/ Files: * -Copyright: Copyright (C) 2002-8 Bruce Allen - Copyright (C) 2004-15 Christian Franke +Copyright: + 2004-2020 Christian Franke + 2016 Casey Biemiller + 2014 Alex Samorukov + 2000 Andre Hedrick + 1999-2000 Michael Cornwell + 2002-2018 Bruce Allen + 2003-2015 Casper Dik + 2004-2010 David Snyder + 2003-2020 Douglas Gilbert + 2003-2010 Eduard Martinescu + 2012 Hank Wu + 2013 Hannes von Haugwitz + 2018 Harry Mallon + 2004-2008 Geoff Keating + 2007 Joerg Hering + 2008 Jordan Hargrave + 2016 Kimihiro Nonaka + 2015 Nidhi Malhotra + 2008 Oliver Bock + 2003-2008 Philip Williams + 2014 Raghava Aditya + 2003-2008 Sergey Svishchev + 2003-2008 SAWADA Keiji + 2004-2008 Yuri Dario + 1999-2003 3ware Inc. License: GPL-2+ +Files: + linux_nvme_ioctl.h +Copyright: + 2011-2014 Intel Corporation. +License: GPL-2 + +Files: + m4/pkg.m4 +Copyright: + 2004 Scott James Remnant . + 2012-2015 Dan Nicholson +License: GPL-2+ + +Files: + getopt/* + regex/* +Copyright: + 1987-2018 Free Software Foundation, Inc. +License: LGPL-2.1+ + +Files: + netbsd_nvme_ioctl.h +Copyright: 2014 David Gwynne +License: Expat-like + Permission to use, copy, modify, and distribute this software for any + purpose with or without fee is hereby granted, provided that the above + copyright notice and this permission notice appear in all copies. + . + THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES + WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF + MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR + ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES + WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN + ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF + OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. + +Files: + cissio_freebsd.h + freebsd_nvme_ioctl.h + sg_unaligned.h +Copyright: + 2014-2018 Douglas Gilbert + 2012-2013 Intel Corporation + 2001 Michael Smith +License: BSD-2-Clause + +Files: + os_freebsd.h +Copyright: + 2000 BSDi + 2000 Michael Smith + 2003-2005 Vinod Kashyap + 2003-2010 Eduard Martinescu + 2003 Paul Saab + 2004-2005 Applied Micro Circuits Corporation. +License: BSD-2-Clause and GPL-2+ + Files: debian/* -Copyright: 2003-2009 Guido Guenther - 2009-2015 Giuseppe Iuculano - 2010 Florian Weimer - 2014 Eric Dorland - 2015 Tobias Frost - 2015-2016 Jonathan Dowland +Copyright: + 2019-2021 Dmitry Smirnov + 2003-2009 Guido Guenther + 2009-2015 Giuseppe Iuculano + 2010 Florian Weimer + 2014 Eric Dorland + 2015 Tobias Frost + 2015-2016 Jonathan Dowland License: GPL-2 License: GPL-2+ @@ -32,3 +116,38 @@ License: GPL-2 . On Debian systems, the complete text of the GNU General Public License version 2 can be found in "/usr/share/common-licenses/GPL-2". + +License: LGPL-2.1+ + This library is free software; you can redistribute it and/or + modify it under the terms of the GNU Lesser General Public + License as published by the Free Software Foundation; either + version 2.1 of the License, or (at your option) any later version. + ․ + This library is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU + Lesser General Public License for more details. + ․ + On Debian systems, the complete text of the GNU Lesser General Public + License Version 2.1 can be found in "/usr/share/common-licenses/LGPL-2.1". + +License: BSD-2-Clause + Redistribution and use in source and binary forms, with or without + modification, are permitted provided that the following conditions are met: + . + 1. Redistributions of source code must retain the above copyright notice, this + list of conditions and the following disclaimer. + 2. Redistributions in binary form must reproduce the above copyright notice, + this list of conditions and the following disclaimer in the documentation + and/or other materials provided with the distribution. + . + THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND + ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED + WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE + DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR + ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES + (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; + LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND + ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT + (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS + SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. diff --git a/content/cumulus-linux-43/Whats-New/licenses/ssh.txt b/content/cumulus-linux-43/Whats-New/licenses/ssh.txt new file mode 100644 index 0000000000..ef1bc8e69c --- /dev/null +++ b/content/cumulus-linux-43/Whats-New/licenses/ssh.txt @@ -0,0 +1,247 @@ +Format: https://www.debian.org/doc/packaging-manuals/copyright-format/1.0/ +Upstream-Name: OpenSSH +Upstream-Contact: openssh-unix-dev@mindrot.org +Source: http://www.openssh.com/portable.html +Comment: + The overall licence of the OpenSSH upstream code amounts to BSD-3-clause or + various less restrictive licences, with the additional restrictions that + derived versions must be clearly marked as such and that if derived works + are incompatible with the RFC-specified protocol then they must be called + by a name other than "ssh" or "Secure Shell". + +Files: * +Copyright: + 1995 Tatu Ylonen , Espoo, Finland + Markus Friedl + Theo de Raadt + Niels Provos + Dug Song + Aaron Campbell + Damien Miller + Kevin Steves + Daniel Kouril + Wesley Griffin + Per Allansson + Nils Nordman + Simon Wilkinson + Ben Lindstrom + Tim Rice + Andre Lucas + Chris Adams + Corinna Vinschen + Cray Inc. + Denis Parker + Gert Doering + Jakob Schlyter + Jason Downs + Juha Yrjölä + Michael Stone + Networks Associates Technology, Inc. + Solar Designer + Todd C. Miller + Wayne Schroeder + William Jones + Darren Tucker + Sun Microsystems + The SCO Group + Daniel Walsh + Red Hat, Inc + Simon Vallet / Genoscope + Internet Software Consortium + Reyk Floeter + Chad Mynhier +License: OpenSSH + Tatu Ylonen's original licence is as follows (excluding some terms about + third-party code which are no longer relevant; see the LICENCE file for + details): + . + As far as I am concerned, the code I have written for this software + can be used freely for any purpose. Any derived versions of this + software must be clearly marked as such, and if the derived work is + incompatible with the protocol description in the RFC file, it must be + called by a name other than "ssh" or "Secure Shell". + . + Note that any information and cryptographic algorithms used in this + software are publicly available on the Internet and at any major + bookstore, scientific library, and patent office worldwide. More + information can be found e.g. at "http://www.cs.hut.fi/crypto". + . + The legal status of this program is some combination of all these + permissions and restrictions. Use only at your own responsibility. + You will be responsible for any legal consequences yourself; I am not + making any claims whether possessing or using this is legal or not in + your country, and I am not taking any responsibility on your behalf. + . + Most remaining components of the software are provided under a standard + 2-term BSD licence: + . + Redistribution and use in source and binary forms, with or without + modification, are permitted provided that the following conditions + are met: + 1. Redistributions of source code must retain the above copyright + notice, this list of conditions and the following disclaimer. + 2. Redistributions in binary form must reproduce the above copyright + notice, this list of conditions and the following disclaimer in the + documentation and/or other materials provided with the distribution. + . + THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR + IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES + OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. + IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, + INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT + NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, + DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY + THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT + (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF + THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. + . + Some code is licensed under an ISC-style license, to the following + copyright holders: + . + Permission to use, copy, modify, and distribute this software for any + purpose with or without fee is hereby granted, provided that the above + copyright notice and this permission notice appear in all copies. + . + THE SOFTWARE IS PROVIDED "AS IS" AND TODD C. MILLER DISCLAIMS ALL + WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES + OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL TODD C. MILLER BE LIABLE + FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES + WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION + OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN + CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. + +Files: ssh-keyscan.* +Copyright: 1995, 1996 David Mazieres +License: Mazieres-BSD-style + Modification and redistribution in source and binary forms is + permitted provided that due credit is given to the author and the + OpenBSD project by leaving this copyright notice intact. + +Files: rijndael.* +License: public-domain + This code is from a reference implementation of the Rijndael cipher which + has been dedicated to the public domain. + . + @version 3.0 (December 2000) + . + Optimised ANSI C code for the Rijndael cipher (now AES) + . + @author Vincent Rijmen + @author Antoon Bosselaers + @author Paulo Barreto + . + This code is hereby placed in the public domain. + . + THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS + OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED + WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE + ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE + LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR + CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF + SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR + BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, + WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE + OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, + EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. + +Files: loginrec.c openbsd-compat/* scp.c +Copyright: + 1983, 1995-1997 Eric P. Allman + 1999 Aaron Campbell + 1993 by Digital Equipment Corporation + 2000 Andre Lucas + 1999-2010 Damien Miller + 1997-2010 Todd C. Miller + 1995, 1996, 1998, 1999, 2008 Theo de Raadt + 2003 Constantin S. Svintsoff + 1980, 1983, 1987, 1988, 1989, 1990, 1991, 1992, 1993, 1994, 1995 The Regents of the University of California +License: BSD-3-clause + Redistribution and use in source and binary forms, with or without + modification, are permitted provided that the following conditions + are met: + 1. Redistributions of source code must retain the above copyright + notice, this list of conditions and the following disclaimer. + 2. Redistributions in binary form must reproduce the above copyright + notice, this list of conditions and the following disclaimer in the + documentation and/or other materials provided with the distribution. + 3. Neither the name of the University nor the names of its contributors + may be used to endorse or promote products derived from this software + without specific prior written permission. + . + THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND + ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE + IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE + ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE + FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL + DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS + OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) + HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT + LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY + OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF + SUCH DAMAGE. + +Files: md5crypt.* +Copyright: Poul-Henning Kamp +License: Beer-ware + "THE BEER-WARE LICENSE" (Revision 42): + wrote this file. As long as you retain this + notice you can do whatever you want with this stuff. If we meet + some day, and you think this stuff is worth it, you can buy me a + beer in return. Poul-Henning Kamp + +Files: openbsd-compat/bsd-snprintf.c +Copyright: 1995 Patrick Powell +License: Powell-BSD-style + This code is based on code written by Patrick Powell + (papowell@astart.com) It may be used for any purpose as long as this + notice remains intact on all source code distributions + +Files: openbsd-compat/sigact.* +Copyright: 1998, 2000 Free Software Foundation, Inc. +License: Expat-with-advertising-restriction + Permission is hereby granted, free of charge, to any person obtaining a + copy of this software and associated documentation files (the + "Software"), to deal in the Software without restriction, including + without limitation the rights to use, copy, modify, merge, publish, + distribute, distribute with modifications, sublicense, and/or sell + copies of the Software, and to permit persons to whom the Software is + furnished to do so, subject to the following conditions: + . + The above copyright notice and this permission notice shall be included + in all copies or substantial portions of the Software. + . + THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS + OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF + MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. + IN NO EVENT SHALL THE ABOVE COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, + DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR + OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR + THE USE OR OTHER DEALINGS IN THE SOFTWARE. + . + Except as contained in this notice, the name(s) of the above copyright + holders shall not be used in advertising or otherwise to promote the + sale, use or other dealings in this Software without prior written + authorization. + +Files: debian/* +Copyright: Matthew Vernon, Colin Watson +License: BSD-2-clause + Redistribution and use in source and binary forms, with or without + modification, are permitted provided that the following conditions + are met: + 1. Redistributions of source code must retain the above copyright + notice, this list of conditions and the following disclaimer. + 2. Redistributions in binary form must reproduce the above copyright + notice, this list of conditions and the following disclaimer in the + documentation and/or other materials provided with the distribution. + . + THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR + IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES + OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. + IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, + INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT + NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, + DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY + THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT + (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF + THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. diff --git a/content/cumulus-linux-43/Whats-New/licenses/systemd-timesyncd.txt b/content/cumulus-linux-43/Whats-New/licenses/systemd-timesyncd.txt new file mode 100644 index 0000000000..8dc9bd1380 --- /dev/null +++ b/content/cumulus-linux-43/Whats-New/licenses/systemd-timesyncd.txt @@ -0,0 +1,262 @@ +Format: https://www.debian.org/doc/packaging-manuals/copyright-format/1.0/ +Upstream-Name: systemd +Upstream-Contact: systemd-devel@lists.freedesktop.org +Source: https://www.freedesktop.org/wiki/Software/systemd/ + +Files: * +Copyright: 2008-2015 Kay Sievers + 2010-2015 Lennart Poettering + 2012-2015 Zbigniew Jędrzejewski-Szmek + 2013-2015 Tom Gundersen + 2013-2015 Daniel Mack + 2010-2015 Harald Hoyer + 2013-2015 David Herrmann + 2013, 2014 Thomas H.P. Andersen + 2013, 2014 Daniel Buch + 2014 Susant Sahani + 2009-2015 Intel Corporation + 2000, 2005 Red Hat, Inc. + 2009 Alan Jenkins + 2010 ProFUSION embedded systems + 2010 Maarten Lankhorst + 1995-2004 Miquel van Smoorenburg + 1999 Tom Tromey + 2011 Michal Schmidt + 2012 B. Poettering + 2012 Holger Hans Peter Freyther + 2012 Dan Walsh + 2012 Roberto Sassu + 2013 David Strauss + 2013 Marius Vollmer + 2013 Jan Janssen + 2013 Simon Peeters +License: LGPL-2.1+ + +Files: src/basic/siphash24.h + src/basic/siphash24.c +Copyright: 2012 Jean-Philippe Aumasson + 2012 Daniel J. Bernstein +License: CC0-1.0 + +Files: src/basic/ioprio.h +Copyright: Jens Axboe +License: GPL-2 + +Files: src/shared/linux/* + src/basic/linux/* +Copyright: 2004-2009 Red Hat, Inc. + 2011-2014 PLUMgrid + 2001-2003 Sistina Software (UK) Limited. + 2008 Ian Kent + 1998 David S. Miller >davem@redhat.com> + 2001 Jeff Garzik + 2006-2010 Johannes Berg + 2008 Luis Carlos Cobo + 2008 Michael Buesch + 2008, 2009 Luis R. Rodriguez + 2008 Jouni Malinen + 2008 Colin McCabe + 2018-2019 Intel Corporation + 2007 Oracle. + 2009 Wolfgang Grandegger + 1999 Thomas Davis + 2015 Sabrina Dubroca + 1999-2000 Maxim Krasnyansky + 2015-2019 Jason A. Donenfeld +License: GPL-2 with Linux-syscall-note exception + +Files: src/basic/sparse-endian.h +Copyright: 2012 Josh Triplett +License: Expat + +Files: src/journal/lookup3.c + src/journal/lookup3.h +Copyright: none +License: public-domain + You can use this free for any purpose. It's in the public domain. It has no + warranty. + +Files: src/udev/ata_id/ata_id.c + src/udev/cdrom_id/cdrom_id.c + src/udev/mtd_probe/mtd_probe.c + src/udev/mtd_probe/mtd_probe.h + src/udev/mtd_probe/probe_smartmedia.c + src/udev/scsi_id/scsi.h + src/udev/scsi_id/scsi_id.c + src/udev/scsi_id/scsi_id.h + src/udev/scsi_id/scsi_serial.c + src/udev/udevadm.c + src/udev/udevadm-control.c + src/udev/udevadm.h + src/udev/udevadm-info.c + src/udev/udevadm-monitor.c + src/udev/udevadm-settle.c + src/udev/udevadm-test-builtin.c + src/udev/udevadm-test.c + src/udev/udevadm-trigger.c + src/udev/udevadm-util.c + src/udev/udevadm-util.h + src/udev/udev-builtin-blkid.c + src/udev/udev-builtin.h + src/udev/udev-builtin-input_id.c + src/udev/udev-builtin-kmod.c + src/udev/udev-builtin-path_id.c + src/udev/udev-builtin-uaccess.c + src/udev/udev-builtin-usb_id.c + src/udev/udev-ctrl.h + src/udev/udevd.c + src/udev/udev-event.c + src/udev/udev-event.h + src/udev/udev-node.c + src/udev/udev-node.h + src/udev/udev-rules.c + src/udev/udev-rules.h + src/udev/udev-watch.c + src/udev/udev-watch.h + src/udev/v4l_id/v4l_id.c +Copyright: 2003-2012 Kay Sievers + 2003-2004 Greg Kroah-Hartman + 2004 Chris Friesen + 2004, 2009, 2010 David Zeuthen + 2005, 2006 SUSE Linux Products GmbH + 2003 IBM Corp. + 2007 Hannes Reinecke + 2009 Canonical Ltd. + 2009 Scott James Remnant + 2009 Martin Pitt + 2009 Piter Punk + 2009, 2010 Lennart Poettering + 2009 Filippo Argiolas + 2010 Maxim Levitsky + 2011 ProFUSION embedded systems + 2011 Karel Zak + 2014 Zbigniew Jędrzejewski-Szmek + 2014 David Herrmann + 2014 Carlos Garnacho +License: GPL-2+ + +Files: src/udev/scsi_id/* +Copyright: 2003 IBM Corp. +License: GPL-2+ + +Files: debian/* +Copyright: 2010-2013 Tollef Fog Heen + 2013-2018 Michael Biebl + 2013 Michael Stapelberg +License: LGPL-2.1+ + +License: Expat + Permission is hereby granted, free of charge, to any person obtaining a copy + of this software and associated documentation files (the "Software"), to + deal in the Software without restriction, including without limitation the + rights to use, copy, modify, merge, publish, distribute, sublicense, and/or + sell copies of the Software, and to permit persons to whom the Software is + furnished to do so, subject to the following conditions: + . + The above copyright notice and this permission notice shall be included in + all copies or substantial portions of the Software. + . + THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR + IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, + FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE + AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER + LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING + FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS + IN THE SOFTWARE. + +License: GPL-2 + This program is free software; you can redistribute it and/or modify + it under the terms of the GNU General Public License as published by + the Free Software Foundation; version 2 of the License. + . + This program is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU General Public License for more details. + . + You should have received a copy of the GNU General Public License + along with this program; if not, write to the Free Software Foundation, Inc., + 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA. + . + On Debian and systems the full text of the GNU General Public + License version 2 can be found in the file + `/usr/share/common-licenses/GPL-2` + +License: GPL-2 with Linux-syscall-note exception + NOTE! This copyright does *not* cover user programs that use kernel services + by normal system calls - this is merely considered normal use of the kernel, + and does *not* fall under the heading of "derived work". Also note that the + GPL below is copyrighted by the Free Software Foundation, but the instance of + code that it refers to (the Linux kernel) is copyrighted by me and others who + actually wrote it. + . + Also note that the only valid version of the GPL as far as the kernel is + concerned is _this_ particular version of the license (ie v2, not v2.2 or v3.x + or whatever), unless explicitly otherwise stated. + . + Linus Torvalds + . + This program is free software; you can redistribute it and/or modify + it under the terms of the GNU General Public License as published by + the Free Software Foundation; version 2 of the License. + . + This program is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU General Public License for more details. + . + You should have received a copy of the GNU General Public License + along with this program; if not, write to the Free Software Foundation, Inc., + 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA. + . + On Debian and systems the full text of the GNU General Public + License version 2 can be found in the file + `/usr/share/common-licenses/GPL-2` + +License: GPL-2+ + This program is free software; you can redistribute it and/or modify + it under the terms of the GNU General Public License as published by + the Free Software Foundation; either version 2, or (at your option) + any later version. + . + This program is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU General Public License for more details. + . + You should have received a copy of the GNU General Public License along + with this program; if not, write to the Free Software Foundation, + Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA. + . + On Debian systems, the complete text of the GNU General Public License + version 2 can be found in ‘/usr/share/common-licenses/GPL-2’. + +License: LGPL-2.1+ + This program is free software; you can redistribute it and/or modify + it under the terms of the GNU Lesser General Public License as published by + the Free Software Foundation; either version 2.1, or (at your option) + any later version. + . + This program is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU Lesser General Public License for more details. + . + You should have received a copy of the GNU Lesser General Public License along + with this program; if not, write to the Free Software Foundation, + Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA. + . + On Debian systems, the complete text of the GNU Lesser General Public + License version 2.1 can be found in ‘/usr/share/common-licenses/LGPL-2.1’. + +License: CC0-1.0 + To the extent possible under law, the author(s) have dedicated all copyright + and related and neighboring rights to this software to the public domain + worldwide. This software is distributed without any warranty. + . + You should have received a copy of the CC0 Public Domain Dedication along with + this software. If not, see . + . + On Debian systems, the complete text of the CC0 1.0 Universal license can be + found in ‘/usr/share/common-licenses/CC0-1.0’. diff --git a/content/cumulus-linux-43/Whats-New/licenses/systemd.txt b/content/cumulus-linux-43/Whats-New/licenses/systemd.txt index 1f66c2054a..8dc9bd1380 100644 --- a/content/cumulus-linux-43/Whats-New/licenses/systemd.txt +++ b/content/cumulus-linux-43/Whats-New/licenses/systemd.txt @@ -38,18 +38,33 @@ Copyright: 2012 Jean-Philippe Aumasson 2012 Daniel J. Bernstein License: CC0-1.0 -Files: src/basic/securebits.h -Copyright: Linus Torvalds -License: GPL-2 - Files: src/basic/ioprio.h Copyright: Jens Axboe License: GPL-2 -Files: src/shared/linux/auto_dev-ioctl.h -Copyright: 2008 Red Hat, Inc. +Files: src/shared/linux/* + src/basic/linux/* +Copyright: 2004-2009 Red Hat, Inc. + 2011-2014 PLUMgrid + 2001-2003 Sistina Software (UK) Limited. 2008 Ian Kent -License: GPL-2+ + 1998 David S. Miller >davem@redhat.com> + 2001 Jeff Garzik + 2006-2010 Johannes Berg + 2008 Luis Carlos Cobo + 2008 Michael Buesch + 2008, 2009 Luis R. Rodriguez + 2008 Jouni Malinen + 2008 Colin McCabe + 2018-2019 Intel Corporation + 2007 Oracle. + 2009 Wolfgang Grandegger + 1999 Thomas Davis + 2015 Sabrina Dubroca + 1999-2000 Maxim Krasnyansky + 2015-2019 Jason A. Donenfeld +License: GPL-2 with Linux-syscall-note exception Files: src/basic/sparse-endian.h Copyright: 2012 Josh Triplett @@ -62,7 +77,44 @@ License: public-domain You can use this free for any purpose. It's in the public domain. It has no warranty. -Files: src/udev/* +Files: src/udev/ata_id/ata_id.c + src/udev/cdrom_id/cdrom_id.c + src/udev/mtd_probe/mtd_probe.c + src/udev/mtd_probe/mtd_probe.h + src/udev/mtd_probe/probe_smartmedia.c + src/udev/scsi_id/scsi.h + src/udev/scsi_id/scsi_id.c + src/udev/scsi_id/scsi_id.h + src/udev/scsi_id/scsi_serial.c + src/udev/udevadm.c + src/udev/udevadm-control.c + src/udev/udevadm.h + src/udev/udevadm-info.c + src/udev/udevadm-monitor.c + src/udev/udevadm-settle.c + src/udev/udevadm-test-builtin.c + src/udev/udevadm-test.c + src/udev/udevadm-trigger.c + src/udev/udevadm-util.c + src/udev/udevadm-util.h + src/udev/udev-builtin-blkid.c + src/udev/udev-builtin.h + src/udev/udev-builtin-input_id.c + src/udev/udev-builtin-kmod.c + src/udev/udev-builtin-path_id.c + src/udev/udev-builtin-uaccess.c + src/udev/udev-builtin-usb_id.c + src/udev/udev-ctrl.h + src/udev/udevd.c + src/udev/udev-event.c + src/udev/udev-event.h + src/udev/udev-node.c + src/udev/udev-node.h + src/udev/udev-rules.c + src/udev/udev-rules.h + src/udev/udev-watch.c + src/udev/udev-watch.h + src/udev/v4l_id/v4l_id.c Copyright: 2003-2012 Kay Sievers 2003-2004 Greg Kroah-Hartman 2004 Chris Friesen @@ -84,25 +136,9 @@ Copyright: 2003-2012 Kay Sievers 2014 Carlos Garnacho License: GPL-2+ -Files: src/udev/udev-ctrl.c - src/udev/udevadm-hwdb.c - src/udev/udev-builtin.c - src/udev/udev-builtin-net_id.c - src/udev/udev-builtin-net_setup_link.c - src/udev/udev-builtin-hwdb.c - src/udev/udev-builtin-btrfs.c - src/udev/udev-builtin-keyboard.c - src/udev/net/link-config.h - src/udev/net/link-config.c - src/udev/net/ethtool-util.c - src/udev/net/ethtool-util.h -Copyright: 2007-2013 Kay Sievers - 2013 Tom Gundersen -License: LGPL-2.1+ - -Files: src/udev/scsi_id/scsi.h +Files: src/udev/scsi_id/* Copyright: 2003 IBM Corp. -License: GPL-2 +License: GPL-2+ Files: debian/* Copyright: 2010-2013 Tollef Fog Heen @@ -147,6 +183,37 @@ License: GPL-2 License version 2 can be found in the file `/usr/share/common-licenses/GPL-2` +License: GPL-2 with Linux-syscall-note exception + NOTE! This copyright does *not* cover user programs that use kernel services + by normal system calls - this is merely considered normal use of the kernel, + and does *not* fall under the heading of "derived work". Also note that the + GPL below is copyrighted by the Free Software Foundation, but the instance of + code that it refers to (the Linux kernel) is copyrighted by me and others who + actually wrote it. + . + Also note that the only valid version of the GPL as far as the kernel is + concerned is _this_ particular version of the license (ie v2, not v2.2 or v3.x + or whatever), unless explicitly otherwise stated. + . + Linus Torvalds + . + This program is free software; you can redistribute it and/or modify + it under the terms of the GNU General Public License as published by + the Free Software Foundation; version 2 of the License. + . + This program is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU General Public License for more details. + . + You should have received a copy of the GNU General Public License + along with this program; if not, write to the Free Software Foundation, Inc., + 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA. + . + On Debian and systems the full text of the GNU General Public + License version 2 can be found in the file + `/usr/share/common-licenses/GPL-2` + License: GPL-2+ This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by diff --git a/content/cumulus-linux-43/Whats-New/licenses/time.txt b/content/cumulus-linux-43/Whats-New/licenses/time.txt new file mode 100644 index 0000000000..1f17a2a42d --- /dev/null +++ b/content/cumulus-linux-43/Whats-New/licenses/time.txt @@ -0,0 +1,54 @@ +Format: http://www.debian.org/doc/packaging-manuals/copyright-format/1.0/ +Upstream-Name: time +Upstream-Contact: bug-gnu-utils@gnu.org +Source: http://ftp.gnu.org/pub/gnu/time/time-1.7.tar.gz +Comment: + This is Debian GNU/Linux's prepackaged version of the FSF's GNU time utility. + `time' is a program that measures many of the CPU resources, such as time and + memory, that other programs use. It was written by David Keppel. It + was subsequently maintained and improved by David MacKenzie with help + from Arne Henrik Juul, and Francois Pinard. + . + This package was put together by Dirk Eddelbuettel from the previous + Debian package time-1.6-2 (from ftp.debian.org) and the GNU sources + for time-1.6. The package was subsequently maintained and updated by + Tollef Fog Heen, Salvatore Bonaccorso, and Bob Proulx. + +Files: * +Copyright: Copyright 1987-1996 Free Software Foundation, Inc. +License: GPL-2+ + +Files: debian/* +Copyright: Copyright 1995 Peter Tobias + Copyright 1995-2004 Dirk Eddelbuettel + Copyright 2005, 2008 Tollef Fog Heen + Copyright 2010 Salvatore Bonaccorso + Copyright 2012 Bob Proulx +License: GPL-2+ + +Files: debian/time.1 +Copyright: Copyright 1996 Dirk Eddelbuettel +License: freely redistributable + Copyright Dirk Eddelbuettel but freely redistributable + +License: GPL-2+ + This program is free software; you can redistribute it + and/or modify it under the terms of the GNU General Public + License as published by the Free Software Foundation; either + version 2 of the License, or (at your option) any later + version. + . + This program is distributed in the hope that it will be + useful, but WITHOUT ANY WARRANTY; without even the implied + warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR + PURPOSE. See the GNU General Public License for more + details. + . + You should have received a copy of the GNU General Public + License along with this package; if not, write to the Free + Software Foundation, Inc., 51 Franklin St, Fifth Floor, + Boston, MA 02110-1301 USA + . + On Debian systems, the full text of the GNU General Public + License version 2 can be found in the file + `/usr/share/common-licenses/GPL-2'. diff --git a/content/cumulus-linux-43/Whats-New/licenses/udev.txt b/content/cumulus-linux-43/Whats-New/licenses/udev.txt index 1f66c2054a..8dc9bd1380 100644 --- a/content/cumulus-linux-43/Whats-New/licenses/udev.txt +++ b/content/cumulus-linux-43/Whats-New/licenses/udev.txt @@ -38,18 +38,33 @@ Copyright: 2012 Jean-Philippe Aumasson 2012 Daniel J. Bernstein License: CC0-1.0 -Files: src/basic/securebits.h -Copyright: Linus Torvalds -License: GPL-2 - Files: src/basic/ioprio.h Copyright: Jens Axboe License: GPL-2 -Files: src/shared/linux/auto_dev-ioctl.h -Copyright: 2008 Red Hat, Inc. +Files: src/shared/linux/* + src/basic/linux/* +Copyright: 2004-2009 Red Hat, Inc. + 2011-2014 PLUMgrid + 2001-2003 Sistina Software (UK) Limited. 2008 Ian Kent -License: GPL-2+ + 1998 David S. Miller >davem@redhat.com> + 2001 Jeff Garzik + 2006-2010 Johannes Berg + 2008 Luis Carlos Cobo + 2008 Michael Buesch + 2008, 2009 Luis R. Rodriguez + 2008 Jouni Malinen + 2008 Colin McCabe + 2018-2019 Intel Corporation + 2007 Oracle. + 2009 Wolfgang Grandegger + 1999 Thomas Davis + 2015 Sabrina Dubroca + 1999-2000 Maxim Krasnyansky + 2015-2019 Jason A. Donenfeld +License: GPL-2 with Linux-syscall-note exception Files: src/basic/sparse-endian.h Copyright: 2012 Josh Triplett @@ -62,7 +77,44 @@ License: public-domain You can use this free for any purpose. It's in the public domain. It has no warranty. -Files: src/udev/* +Files: src/udev/ata_id/ata_id.c + src/udev/cdrom_id/cdrom_id.c + src/udev/mtd_probe/mtd_probe.c + src/udev/mtd_probe/mtd_probe.h + src/udev/mtd_probe/probe_smartmedia.c + src/udev/scsi_id/scsi.h + src/udev/scsi_id/scsi_id.c + src/udev/scsi_id/scsi_id.h + src/udev/scsi_id/scsi_serial.c + src/udev/udevadm.c + src/udev/udevadm-control.c + src/udev/udevadm.h + src/udev/udevadm-info.c + src/udev/udevadm-monitor.c + src/udev/udevadm-settle.c + src/udev/udevadm-test-builtin.c + src/udev/udevadm-test.c + src/udev/udevadm-trigger.c + src/udev/udevadm-util.c + src/udev/udevadm-util.h + src/udev/udev-builtin-blkid.c + src/udev/udev-builtin.h + src/udev/udev-builtin-input_id.c + src/udev/udev-builtin-kmod.c + src/udev/udev-builtin-path_id.c + src/udev/udev-builtin-uaccess.c + src/udev/udev-builtin-usb_id.c + src/udev/udev-ctrl.h + src/udev/udevd.c + src/udev/udev-event.c + src/udev/udev-event.h + src/udev/udev-node.c + src/udev/udev-node.h + src/udev/udev-rules.c + src/udev/udev-rules.h + src/udev/udev-watch.c + src/udev/udev-watch.h + src/udev/v4l_id/v4l_id.c Copyright: 2003-2012 Kay Sievers 2003-2004 Greg Kroah-Hartman 2004 Chris Friesen @@ -84,25 +136,9 @@ Copyright: 2003-2012 Kay Sievers 2014 Carlos Garnacho License: GPL-2+ -Files: src/udev/udev-ctrl.c - src/udev/udevadm-hwdb.c - src/udev/udev-builtin.c - src/udev/udev-builtin-net_id.c - src/udev/udev-builtin-net_setup_link.c - src/udev/udev-builtin-hwdb.c - src/udev/udev-builtin-btrfs.c - src/udev/udev-builtin-keyboard.c - src/udev/net/link-config.h - src/udev/net/link-config.c - src/udev/net/ethtool-util.c - src/udev/net/ethtool-util.h -Copyright: 2007-2013 Kay Sievers - 2013 Tom Gundersen -License: LGPL-2.1+ - -Files: src/udev/scsi_id/scsi.h +Files: src/udev/scsi_id/* Copyright: 2003 IBM Corp. -License: GPL-2 +License: GPL-2+ Files: debian/* Copyright: 2010-2013 Tollef Fog Heen @@ -147,6 +183,37 @@ License: GPL-2 License version 2 can be found in the file `/usr/share/common-licenses/GPL-2` +License: GPL-2 with Linux-syscall-note exception + NOTE! This copyright does *not* cover user programs that use kernel services + by normal system calls - this is merely considered normal use of the kernel, + and does *not* fall under the heading of "derived work". Also note that the + GPL below is copyrighted by the Free Software Foundation, but the instance of + code that it refers to (the Linux kernel) is copyrighted by me and others who + actually wrote it. + . + Also note that the only valid version of the GPL as far as the kernel is + concerned is _this_ particular version of the license (ie v2, not v2.2 or v3.x + or whatever), unless explicitly otherwise stated. + . + Linus Torvalds + . + This program is free software; you can redistribute it and/or modify + it under the terms of the GNU General Public License as published by + the Free Software Foundation; version 2 of the License. + . + This program is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU General Public License for more details. + . + You should have received a copy of the GNU General Public License + along with this program; if not, write to the Free Software Foundation, Inc., + 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA. + . + On Debian and systems the full text of the GNU General Public + License version 2 can be found in the file + `/usr/share/common-licenses/GPL-2` + License: GPL-2+ This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by diff --git a/content/cumulus-linux-43/Whats-New/licenses/zsh-common.txt b/content/cumulus-linux-43/Whats-New/licenses/zsh-common.txt new file mode 100644 index 0000000000..7c123aae5b --- /dev/null +++ b/content/cumulus-linux-43/Whats-New/licenses/zsh-common.txt @@ -0,0 +1,163 @@ +Format: https://www.debian.org/doc/packaging-manuals/copyright-format/1.0/ +Upstream-Name: Zsh (Z Shell) +Upstream-Contact: zsh-workers@zsh.org +Source: https://www.zsh.org/pub/ + ftp://ftp.zsh.org/pub/ + https://sourceforge.net/projects/zsh/files/ + +Files: * +Copyright: 1992-2014 The Zsh Development Group (Paul Falstad, Richard + Coleman, Zoltán Hidvégi, Andrew Main, Peter W. Stephenson, + Sven Wischnowsky, and others). All rights reserved. + Individual authors, whether or not specifically named, + retain copyright in all changes. +Comment: + The Z shell is distributed under the following licence; any + provisions made in individual files take precedence. +License: Zsh + +Files: debian/* +Copyright: 1996 Robert Leslie + 1997-2011 Clint Adams + 2011-2012 Michael Prokop + 2011-2014 Frank Terbeck + 2011-2014 Axel Beckert + 2012-2013 Richard Hartmann +License: Expat + +Files: Src/compat.c +Comment: This applies to portions of Src/compat.c, the remainder is + under the copyright of The Zsh Development Group and licensed under + the Zsh license as mentioned above. +Copyright: 1990, 1993 The Regents of the University of California +License: BSD-3 + +Files: Completion/Unix/Command/_hg +Copyright: 2005, 2006 Steve Borho + 2006-2009 Brendan Cully +License: Zsh + +Files: Completion/Unix/Command/_darcs +Copyright: 2009 Nicolas Pouillard +License: GPL-2+ + +Files: Completion/openSUSE/Command/_osc +Copyright: 2009, 2010 Holger Macht +License: GPL-2 + +Files: Completion/openSUSE/Command/_zypper +Copyright: 2009 Holger Macht + 2014 Thomas Mitterfellner + 2014 Mariusz Fik +License: GPL-2 + +Files: Misc/make-zsh-urls +Copyright: 1999 Adam Spiers +License: Artistic or GPL-1+ or Zsh +Comment: + This program is free software; you can redistribute it and/or modify + it under the same terms as Perl or zsh. + +Files: Etc/FAQ.yo +Copyright: 1995-2000, 2012 Peter W. Stephenson +License: PWS-Zsh-FAQ + This text originates in the U.K. and the author asserts his moral + rights under the Copyrights, Designs and Patents Act, 1988. + . + Permission is hereby granted, without written agreement and without + license or royalty fees, to use, copy, modify, and distribute this + documentation for any purpose, provided that the above copyright + notice appears in all copies of this documentation. + +License: Zsh + Permission is hereby granted, without written agreement and without + licence or royalty fees, to use, copy, modify, and distribute this + software and to distribute modified versions of this software for any + purpose, provided that the above copyright notice and the following + two paragraphs appear in all copies of this software. + . + In no event shall the copy right owners liable to any party for + direct, indirect, special, incidental, or consequential damages + arising out of the use of this software and its documentation, even + if and the copyright owners have been advised of the possibility of + such damage. + . + The copyright owners specifically disclaim any warranties, including, + but not limited to, the implied warranties of merchantability and + fitness for a particular purpose. The software provided hereunder is + on an "as is" basis, and the copyright owners have no obligation to + provide maintenance, support, updates, enhancements, or + modifications. + +License: Expat + Permission is hereby granted, free of charge, to any person obtaining + a copy of this software and associated documentation files (the + "Software"), to deal in the Software without restriction, including + without limitation the rights to use, copy, modify, merge, publish, + distribute, sublicense, and/or sell copies of the Software, and to + permit persons to whom the Software is furnished to do so, subject to + the following conditions: + . + The above copyright notice and this permission notice shall be included + in all copies or substantial portions of the Software. + . + THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, + EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF + MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. + IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY + CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, + TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE + SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. + +License: BSD-3 + Redistribution and use in source and binary forms, with or without + modification, are permitted provided that the following conditions + are met: + . + * Redistributions of source code must retain the above copyright + notice, this list of conditions and the following disclaimer. + * Redistributions in binary form must reproduce the above copyright + notice, this list of conditions and the following disclaimer in the + documentation and/or other materials provided with the + distribution. + * Neither the name of the nor the names of its + contributors may be used to endorse or promote products derived + from this software without specific prior written permission. + . + THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS + "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT + LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR + A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, + EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, + PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR + PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY + OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT + (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE + OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. + +License: GPL-2+ + This program is free software; you can redistribute it and/or modify + it under the terms of the GNU General Public License as published by + the Free Software Foundation; either version 2 of the License, or (at + your option) any later version. + . + On Debian systems, the full text of the GNU General Public License + version 2 can be found in `/usr/share/common-licenses/GPL-2'. + +License: GPL-2 + On Debian systems, the full text of the GNU General Public License + version 2 can be found in `/usr/share/common-licenses/GPL-2'. + +License: GPL-1+ + This program is free software; you can redistribute it and/or modify + it under the terms of the GNU General Public License as published by + the Free Software Foundation; either version 1 of the License, or (at + your option) any later version. + . + On Debian systems, the full text of the GNU General Public License + version 1 can be found in `/usr/share/common-licenses/GPL-1'. + +License: Artistic + On Debian GNU/Linux systems, the complete text of the + Artistic Licence can be found in `/usr/share/common-licenses/Artistic'. diff --git a/content/cumulus-linux-43/Whats-New/licenses/zsh.txt b/content/cumulus-linux-43/Whats-New/licenses/zsh.txt new file mode 100644 index 0000000000..7c123aae5b --- /dev/null +++ b/content/cumulus-linux-43/Whats-New/licenses/zsh.txt @@ -0,0 +1,163 @@ +Format: https://www.debian.org/doc/packaging-manuals/copyright-format/1.0/ +Upstream-Name: Zsh (Z Shell) +Upstream-Contact: zsh-workers@zsh.org +Source: https://www.zsh.org/pub/ + ftp://ftp.zsh.org/pub/ + https://sourceforge.net/projects/zsh/files/ + +Files: * +Copyright: 1992-2014 The Zsh Development Group (Paul Falstad, Richard + Coleman, Zoltán Hidvégi, Andrew Main, Peter W. Stephenson, + Sven Wischnowsky, and others). All rights reserved. + Individual authors, whether or not specifically named, + retain copyright in all changes. +Comment: + The Z shell is distributed under the following licence; any + provisions made in individual files take precedence. +License: Zsh + +Files: debian/* +Copyright: 1996 Robert Leslie + 1997-2011 Clint Adams + 2011-2012 Michael Prokop + 2011-2014 Frank Terbeck + 2011-2014 Axel Beckert + 2012-2013 Richard Hartmann +License: Expat + +Files: Src/compat.c +Comment: This applies to portions of Src/compat.c, the remainder is + under the copyright of The Zsh Development Group and licensed under + the Zsh license as mentioned above. +Copyright: 1990, 1993 The Regents of the University of California +License: BSD-3 + +Files: Completion/Unix/Command/_hg +Copyright: 2005, 2006 Steve Borho + 2006-2009 Brendan Cully +License: Zsh + +Files: Completion/Unix/Command/_darcs +Copyright: 2009 Nicolas Pouillard +License: GPL-2+ + +Files: Completion/openSUSE/Command/_osc +Copyright: 2009, 2010 Holger Macht +License: GPL-2 + +Files: Completion/openSUSE/Command/_zypper +Copyright: 2009 Holger Macht + 2014 Thomas Mitterfellner + 2014 Mariusz Fik +License: GPL-2 + +Files: Misc/make-zsh-urls +Copyright: 1999 Adam Spiers +License: Artistic or GPL-1+ or Zsh +Comment: + This program is free software; you can redistribute it and/or modify + it under the same terms as Perl or zsh. + +Files: Etc/FAQ.yo +Copyright: 1995-2000, 2012 Peter W. Stephenson +License: PWS-Zsh-FAQ + This text originates in the U.K. and the author asserts his moral + rights under the Copyrights, Designs and Patents Act, 1988. + . + Permission is hereby granted, without written agreement and without + license or royalty fees, to use, copy, modify, and distribute this + documentation for any purpose, provided that the above copyright + notice appears in all copies of this documentation. + +License: Zsh + Permission is hereby granted, without written agreement and without + licence or royalty fees, to use, copy, modify, and distribute this + software and to distribute modified versions of this software for any + purpose, provided that the above copyright notice and the following + two paragraphs appear in all copies of this software. + . + In no event shall the copy right owners liable to any party for + direct, indirect, special, incidental, or consequential damages + arising out of the use of this software and its documentation, even + if and the copyright owners have been advised of the possibility of + such damage. + . + The copyright owners specifically disclaim any warranties, including, + but not limited to, the implied warranties of merchantability and + fitness for a particular purpose. The software provided hereunder is + on an "as is" basis, and the copyright owners have no obligation to + provide maintenance, support, updates, enhancements, or + modifications. + +License: Expat + Permission is hereby granted, free of charge, to any person obtaining + a copy of this software and associated documentation files (the + "Software"), to deal in the Software without restriction, including + without limitation the rights to use, copy, modify, merge, publish, + distribute, sublicense, and/or sell copies of the Software, and to + permit persons to whom the Software is furnished to do so, subject to + the following conditions: + . + The above copyright notice and this permission notice shall be included + in all copies or substantial portions of the Software. + . + THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, + EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF + MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. + IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY + CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, + TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE + SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. + +License: BSD-3 + Redistribution and use in source and binary forms, with or without + modification, are permitted provided that the following conditions + are met: + . + * Redistributions of source code must retain the above copyright + notice, this list of conditions and the following disclaimer. + * Redistributions in binary form must reproduce the above copyright + notice, this list of conditions and the following disclaimer in the + documentation and/or other materials provided with the + distribution. + * Neither the name of the nor the names of its + contributors may be used to endorse or promote products derived + from this software without specific prior written permission. + . + THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS + "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT + LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR + A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, + EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, + PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR + PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY + OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT + (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE + OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. + +License: GPL-2+ + This program is free software; you can redistribute it and/or modify + it under the terms of the GNU General Public License as published by + the Free Software Foundation; either version 2 of the License, or (at + your option) any later version. + . + On Debian systems, the full text of the GNU General Public License + version 2 can be found in `/usr/share/common-licenses/GPL-2'. + +License: GPL-2 + On Debian systems, the full text of the GNU General Public License + version 2 can be found in `/usr/share/common-licenses/GPL-2'. + +License: GPL-1+ + This program is free software; you can redistribute it and/or modify + it under the terms of the GNU General Public License as published by + the Free Software Foundation; either version 1 of the License, or (at + your option) any later version. + . + On Debian systems, the full text of the GNU General Public License + version 1 can be found in `/usr/share/common-licenses/GPL-1'. + +License: Artistic + On Debian GNU/Linux systems, the complete text of the + Artistic Licence can be found in `/usr/share/common-licenses/Artistic'. diff --git a/content/cumulus-linux-43/Whats-New/rn.md b/content/cumulus-linux-43/Whats-New/rn.md index 8d57ce82a5..99df511f91 100644 --- a/content/cumulus-linux-43/Whats-New/rn.md +++ b/content/cumulus-linux-43/Whats-New/rn.md @@ -9,44 +9,346 @@ type: rn pdfhidden: True --- {{}} +## 4.3.2 Release Notes +### Open Issues in 4.3.2 + +| Issue ID | Description | Affects | Fixed | +|--- |--- |--- |--- | +| [3647424](#3647424)
None | When you remove the update-source configuration for a BGP neighbor, the peering is reset if the neighbor is a member of a peer group with the same update-source configuration. | 4.3.0-5.5.1 | 5.6.0| +| [3600912](#3600912)
| In an MLAG EVPN configuration, if host mobility occurs multiple times at high frequency, the host MAC might point to an incorrect VTEP; it might be local behind the VTEP. | 4.3.1-4.4.5 | | +| [3488136](#3488136)
| When zebra receives route updates that include both a route with a recursive next hop and the route used to resolve that next hop, zebra might mark the route with the recursive next hop as inactive. To work around this issue, reprocess the route updates by running the appropriate clear command for the protocol in use. For example, for BGP, clear inbound routes from the relevant neighbor using the nv action clear vrf router bgp neighbor address-family in command. | 4.2.1-5.5.1 | 5.6.0| +| [3474391](#3474391)
| The SNMP MIB definition file /usr/share/snmp/mibs/Cumulus-BGPVRF-MIB.txt does not define the INDEX of the bgpPeerEntry correctly. This issue does not impact SNMP functionality for this MIB. | 4.3.1-5.5.1 | 5.6.0| +| [3429530](#3429530)
| On the Spectrum-2 and Spectrum-3 switch, multiple interfaces (in the same PLL quarter) might flap intermittently at the same time. | 4.2.1-5.4.0 | 5.5.0-5.6.0| +| [3330705](#3330705)
| When using TACACS+, a TACACS+ server name that returns more than one IP address, such as an IPv6 and IPv4 address, is counted many times against the limit of seven TACACS+ servers, which might cause some of the later listed servers to be ignored as over the limit. To work around this issue, you can set the prefer_ip_version configuration option (the default value is 4) to choose between an IPv4 or IPv6 address if both are present. | 3.7.0-5.3.1 | 5.4.0-5.6.0| +| [3327477](#3327477)
| If you use su to change to a user specified through TACACS+, the user becomes the local tacacs0 thru tacacs15 user instead of the named user to run sudo commands. As a result, the named user password might not match the local tacacs0 thru tacacs15 user password. | 3.7.0-3.7.16, 4.0.0-4.4.5, 5.0.0-5.6.0 | | +| [3321391](#3321391)
None | On the NVIDIA SN2410 switch, ports with optical transceivers show FAULT errors in the sensor command output. | 4.2.1-5.3.1 | 5.4.0-5.6.0| +| [3291548](#3291548)
None | In EVPN deployments, a buffer lockup for split or pre-split ports can occur on Spectrum-2 and Spectrum-3 switches. As result, traffic coming in on these ports is dropped in the RX buffer. To work around this issue, restart switchd. | 4.2.1-4.4.5 | 5.0.0-5.6.0| +| [3218207](#3218207)
None | Certain routes on tenant VRFs have missing next hop entries because the router MAC address is missing in the bridge forwarding database table that corresponds to the remote VTEP. As a result, traffic forwarding is affected for these routes. | 4.3.0-5.2.1 | 5.3.0-5.6.0| +| [3216921](#3216921)
None | RADIUS authenticated users with read-only access to NCLU commands (users in the users_with_show list) can run edit commands if a username for a non-local account is on the users_with_edit line of the /etc/netd.conf file. To work around this issue, make sure that all usernames on the users_with_edit line of the /etc/netd.conf file are configured local users for the system (real Linux users)
| 3.7.0-3.7.16, 4.3.0-4.4.5 | | +| [3216759](#3216759)
None | With the ip-acl-heavy TCAM profile, the following message might appear after you install an ACL with NCLU or cl-acltool and the ACL might not work correctly
hal_flx_acl_util.c:378 ERR hal_flx_acl_resource_release resource region 0 size 7387 create failed: No More Resources
To work around this issue, change the TCAM profile to acl-heavy or ip-acl-heavy with ACL non-atomic mode. | 3.7.15-3.7.16, 4.3.0-4.4.5 | | +| [3168564](#3168564)
| In a large scale VXLAN configuration (for example if you have more than 8500 VLANs across ports), switchd might crash when you restart clagd or when all bonds go operationally down, then up
On Trident3 switches running Cumulus Linux 4.3.1, NVIDIA validates the VLAN scale limit for VXLAN deployments with 8500 VLANs across ports with LACP bypass disabled. | 4.3.1-4.4.5 | | +| [3163845](#3163845)
| If bond slaves listed in the /etc/network/interfaces file are not in alphabetical order, the bond interface MAC address can change when you run ifreload. For example, if the bond slaves in the /etc/network/interfaces file are listed as swp32 swp31, the switch initially uses the MAC address for swp32 as the bond MAC address. An another ifreload can cause this to change to use the MAC address for swp31 as the bond MAC address, which can cause protocol issues, such as IPv6 link-local address changes. | 4.3.1-4.4.5 | | +| [3138746](#3138746)
| The switch duplicates DHCP packets that pass through the VTEP. | 4.3.0-5.1.0 | 5.2.0-5.6.0| +| [3131423](#3131423)
| During EVPN multihoming bond failover, ARP and ND redirection fails if you configure layer 2 VNIs and ES bonds before you configure the loopback IP address of the switch. To work around this issue, configure the loopback IP address, then restart FRR with the systemctl restart frr command. | 4.3.0-5.1.0 | 5.2.0-5.6.0| +| [3129819](#3129819)
| On the EdgeCore AS4610 switch, the clagd service loses communication after 198 days of uptime. | 3.7.15-3.7.16, 4.3.0-4.4.5 | | +| [3119615](#3119615)
| In an MLAG topology, if you admin down a single connected interface, any dynamic MAC addresses on the peer link are flushed, then added back momentarily, which creates a disruption in traffic. | 3.7.15-5.1.0 | 5.2.0-5.6.0| +| [3117340](#3117340)
| When you edit the /usr/share/openvswitch/scripts/ovs-ctl-vtep file to change the ovs-vtepd configuration between vlan-aware and vlan-unaware mode, ovs-vtepd crashes when you restart the service. To recover, restart the networking service with the sudo systemctl restart networking command. | 4.3.0-5.1.0 | 5.2.0-5.6.0| +| [3093966](#3093966)
| On Broadcom switches, INPUT chain iptable rules filter IPv6 packets matching the rules. | 3.7.15-3.7.16, 4.3.0-4.4.5 | | +| [3093863](#3093863)
| The snmpd process will slowly leak memory when you poll TCP-MIB objects. To work around this issue, restart the snmpd service to free memory with the systemctl restart snmpd command. | 3.7.16-4.4.3 | 4.4.4-4.4.5, 5.2.0-5.6.0| +| [3089165](#3089165)
| A slow memory leak might occur in switchd} if the route fails to install in hardware when hardware resources are exhausted. | 4.2.1-4.4.3 | 4.4.4-4.4.5| +| [3084027](#3084027)
| Under a high load, you might see ingress drop counters increase. The drops are classified as HwIfInDiscards in ethtool and shown as ingress_general in hardware. | 4.3.0-4.4.5, 5.0.0-5.6.0 | | +| [3073668](#3073668)
| On the EdgeCore AS4610 switch, when you change the speed of any of the SFP+ ports, the other SFP+ ports flap. | 3.7.12-3.7.16, 4.3.0-4.4.5 | | +| [3072613](#3072613)
| When you delete a bond interface with NCLU, BGP peer group configuration is removed. | 3.7.15-3.7.16, 4.3.0-4.4.5 | | +| [3059135](#3059135)
| In an OSPF configuration, after you change the IPv6 subnet mask, the old address remains in the RIB as a connected OSPF route
To resolve this issue, restart FRR with the sudo systemctl restart frr command. | 4.3.0-5.1.0 | 5.2.0-5.6.0| +| [3046023](#3046023)
| The cl-resource-query command output shows ECMP nextHop Table exhaustion (above 100 percent utilization) and the switchd.log file contains ECMP resource errors with routes and next hops failing to install. | 4.2.1-5.1.0 | 5.2.0-5.6.0| +| [3007564](#3007564)
| After you delete the last vxlan-remoteip configuration line from the /etc/network/interfaces file and run the ifreload -a command, the corresponding BUM flood entry is not removed. | 3.7.15-5.0.1 | 5.1.0-5.6.0, 5.2.0-5.6.0| +| [2999341](#2999341)
| CVE-2021-3570The ptp4l program in linuxptp, an implementation of the Precision Time Protocol (PTP), does not validate the messageLength field of incoming messages, allowing a remote attacker to cause a denial of service, information leak, or potentially remote code execution
Fixed: 1.9.2-1+deb10u1 | 4.2.1-4.4.1 | 4.4.2-4.4.5| +| [2968495](#2968495)
| If switchd requires more time to update port or bond configuration after the port or bond flaps, the systemd watchdog times out. As result, systemd might assume that switchd is unresponsive and restarts it. | 4.2.1-4.4.2 | 4.4.3-4.4.5, 5.1.0-5.6.0| +| [2961008](#2961008)
| SNMP reports the same ifType of ethernetCsmacd(6) for loopback interfaces. | 3.7.15-4.4.2, 5.0.0-5.0.1 | 4.4.3-4.4.5, 5.1.0-5.6.0| +| [2951110](#2951110)
| The net show time ntp servers command does not show any output with the management VRF. | 3.7.15-3.7.16, 4.1.1-4.4.5, 5.0.0-5.6.0 | | +| [2940051](#2940051)
| In an MLAG configuration with traditional bridges, MAC addresses are seen over peer link during ifreload when adding new VLANS or bridges. | 3.7.14.2-3.7.15, 4.3.0-4.4.5 | 3.7.16, 5.0.0-5.6.0| +| [2902013](#2902013)
| The NCLU commit command adds a five second delay. | 4.2.1-4.4.5 | | +| [2896450](#2896450)
CM-31978 | On the Dell N3248PXE switch, fixed RJ45 interfaces with PoE neighbors can end up in Paused mode after a switchd restart, which blocks traffic on that interface. To work around this issue, restart switchd a second or third time until all interfaces are functioning correctly, or reboot the switch. | 4.3.0-4.4.5 | | +| [2893895](#2893895)
CM-33315 | CVE-2020-35498: A vulnerability was found in openvswitch. A limitation in the implementation of userspace packet parsing can allow a malicious user to send a specially crafted packet causing the resulting megaflow in the kernel to be too wide, potentially causing a denial of service. The highest threat from this vulnerability is to system availability
Vulnerable: <= 2.8.90-1-cl4u5Fixed: 2.8.90-1-cl4u6, 2.8.90-1-cl4.4.0u1, 2.8.90-1-cl5.0.0u8 | 4.0.0-4.3.2 | 4.4.0-4.4.5, 5.1.0-5.6.0| +| [2891255](#2891255)
| CVE-2021-39925: Buffer overflow in the Bluetooth SDP dissector in Wireshark 3.4.0 to 3.4.9 and 3.2.0 to 3.2.17 allows denial of service via packet injection or crafted capture file
Vulnerable: <= 2.6.20-0+deb10u1Fixed: 2.6.20-0+deb10u2 | 4.0.0-4.4.1, 5.0.0-5.6.0 | 4.4.2-4.4.5| +| [2890681](#2890681)
| CVE-2021-42771: relative path traversal in Babel, a set of tools for internationalising Python applications, could result in the execution of arbitrary code
Vulnerable: 2.6.0+dfsg.1-1Fixed: 2.6.0+dfsg.1-1+deb10u1 | 4.0.0-4.4.1, 5.0.0-5.6.0 | 4.4.2-4.4.5| +| [2866080](#2866080)
| On the Maverick S4148T switch with MLAG, Cumulus Linux drops LACP, ARP, LLDP and BGP traffic. | 4.3.0-4.4.5 | | +| [2854787](#2854787)
| An unexpected software system shutdown can occur due to a thermal zones issue in the hw-management package. The following message might appear in /var/log/syslog before the shutdown:
thermal thermal_zoneX: critical temperature reached (33 C), shutting down
| 4.3.0-4.3.2 | 4.4.0-4.4.5, 5.1.0-5.6.0| +| [2854784](#2854784)
| After building VLAN or VXLAN interfaces, MLAG becomes unstable. | 4.3.0-4.4.1 | 4.4.2-4.4.5, 5.0.0-5.6.0| +| [2845531](#2845531)
| If you update the MAC address of an SVI when the SVI is in a protodown state (for example, when no bridge ports that carry this VNI are operationally up or if the MAC address of the SVI's parent bridge changes), clagd does not notice the change. The MLAG peer incorrectly maintains a PERMANENT neighbor entry for the SVI IP that points to the old MAC address. | 4.2.1-4.4.5 | 5.0.0-5.6.0| +| [2838905](#2838905)
| On Broadcom ARM switches, the NTP clock slowly drifts to a very high offset (over 500ms) and the clock is not able to synchronize. To work around this issue, use the chrony implementation of NTP instead of ntpd. chrony synchronizes the system clock faster and with better accuracy
Instructions for using chrony are here : https://docs.nvidia.com/networking-ethernet-software/knowledge-base/Network-Solutions/Chrony-on-Cumulus-Linux/ | 4.3.0-4.4.5 | | +| [2820565](#2820565)
| SNMP does not start and you see errors similar to the following:
cumulus@switch:~$ sudo systemctl status snmpd.service snmpd.service - Simple Network Management Protocol (SNMP) Daemon.
Loaded: loaded (/lib/systemd/system/snmpd.service; enabled; vendor preset: enabled)
Active: failed (Result: exit-code) since Mon 2021-10-11 14:38:13 UTC; 1min 8s ago
Process: 1987 ExecStart=/usr/sbin/snmpd $SNMPDOPTS -f (code=exited, status=1/FAILURE)
Main PID: 1987 (code=exited, status=1/FAILURE)
To work around this issue, run the sudo systemctl restart snmpd.service command. | 4.3.0-4.4.5 | 5.0.0-5.6.0| +| [2803044](#2803044)
| In an EVPN configuration with IP or MAC mobility, higher MM EVPN routes do not remove the old ARP entries during VIP migration between VTEP racks. | 3.7.14.2-3.7.15, 4.3.0-4.4.5 | 3.7.16| +| [2794766](#2794766)
| The Mellanox 3700C switch reports a slow memory leak in sx_sdk. Memory increases by about 240B/hour and does not free up. | 4.3.0-4.4.5 | 5.0.0-5.6.0| +| [2792616](#2792616)
| If a neighbor entry (ARP or NDP) is used as a next hop of a route that is synchronized into hardware, the neighbor entry is not removed from hardware after the neighbor is no longer reachable. As a result, routed traffic matching this prefix is incorrectly hardware forwarded through the stale neighbor information. | 4.3.0-4.4.5 | 5.0.0-5.6.0| +| [2783611](#2783611)
| If you remove ports from a bridge and add IP addresses in one ifreload, connected routes are bound to the wrong routing information field. | 4.3.0-4.4.1 | 4.4.2-4.4.5| +| [2782033](#2782033)
| The following vulnerabilities have been announced in the openssl packages:CVE-2021-3711: buffer overflow vulnerability in SM2 decryption
CVE-2021-3712: buffer overrun when processing ASN.1 strings in the X509_aux_print() function
More details at https://www.openssl.org/news/secadv/20210824.txt
Vulnerable: <= 1.1.1d-0+deb10u6Fixed: 1.1.1d-0+deb10u7 | 4.0.0-4.4.1 | 4.4.2-4.4.5| +| [2781537](#2781537)
| In Cumulus VX, the iptables FORWARD chain does not count hits. To work around this issue, use -t mangle -A PREROUTING instead of FORWARD. | 4.3.0-4.4.5 | 5.0.0-5.6.0| +| [2771871](#2771871)
| IPv4 and IPv6 neighbor entries in a FAILED state are incorrectly programmed into hardware as FORWARD entries instead of TRAP entries. Traffic is forwarded to these neighbors with a destination MAC address of 00:00:00:00:00:00 instead of trapping them to the CPU to resolve the correct MAC address
This affects failed neighbor entries on routed interfaces that are not SVIs. | 4.3.0-4.4.1 | 4.4.2-4.4.5| +| [2771653](#2771653)
| When using W-ECMP, the weights for various BGP next hops can sometimes be in the range of 100s or more, which consumes a lot of hardware space. | 4.3.0-4.4.5 | | +| [2754791](#2754791)
| Remote MAC addreses in zebra are out of sync with bgpd. The zebra MAC addresses point to an incorrect (old) VTEP IP address and the sequence number is one higher than in BGP. | 3.7.14.2-3.7.16, 4.3.0-4.4.5 | | +| [2754691](#2754691)
| CVE-2021-3672: in c-ares, a library that performs DNS requests and name resolution asynchronously, missing input validation of hostnames returned by DNS servers can lead to output of wrong hostnames (leading to Domain Hijacking)
Vulnerable: 1.14.0-1Fixed: 1.14.0-1+deb10u1 | 4.0.0-4.4.1 | 4.4.2-4.4.5| +| [2754685](#2754685)
| CVE-2021-38165: lynx, a non-graphical (text-mode) web browser, does not properly handle the userinfo subcomponent of a URI, which can lead to leaking of credential in cleartext in SNI data
Vulnerable: 2.8.9rel.1-3Fixed: 2.8.9rel.1-3+deb10u1 | 4.0.0-4.4.1 | 4.4.2-4.4.5| +| [2754679](#2754679)
| CVE-2020-26558 / CVE-2021-0129: Bluez does not properly check permissions during pairing operation, which could allow an attacker to impersonate the initiating device
CVE-2020-27153: a double free flaw in the disconnect_cb() routine in the gattool. A remote attacker can take advantage of this flaw during service discovery for denial of service, or potentially, execution of arbitrary code
Vulnerable: <= 5.50-1.2~deb10u1Fixed: 5.50-1.2~deb10u2 | 4.0.0-4.4.1 | 4.4.2-4.4.5| +| [2753955](#2753955)
| On the Lenovo MSN3700 switch, if you try to configure an interface with a link speed of 200G, the configuration fails. | 4.2.1-4.4.5 | 5.0.0-5.6.0| +| [2747605](#2747605)
| CVE-2021-3246: a buffer overflow in libsndfile, a libraryfor reading/writing audio files, which could result in denial of serviceor potentially the execution of arbitrary code when processing amalformed audio file
Vulnerable: 1.0.28-6Fixed: 1.0.28-6+deb10u1 | 4.0.0-4.4.1 | 4.4.2-4.4.5| +| [2743186](#2743186)
| When you use MD5 passwords and you configure a non-default VRF before the default VRF in the /etc/frr/frr.conf file, numbered BGP sessions do not establish. | 3.7.15-5.1.0 | 5.2.0-5.6.0| +| [2739690](#2739690)
| CVE-2021-22918: An out-of-bounds read was discovered in the uv__idna_to_ascii() function of Libuv, an asynchronous event notification library, which could result in denial of service or information disclosure
Vulnerable: 1.24.1-1Fixed: 1.24.1-1+deb 10u1 | 4.0.0-4.4.1 | 4.4.2-4.4.5| +| [2739639](#2739639)
| CVE-2021-36222: It was discovered that the Key Distribution Center (KDC) in krb5, the MIT implementation of Kerberos, is prone to a NULL pointer dereference flaw. An unauthenticated attacker can take advantage of this flaw to cause a denial of service (KDC crash) by sending a request containing a PA-ENCRYPTED-CHALLENGE padata element without using FAST
Vulnerable: <= 1.17-3+deb10u1Fixed: 1.17-3+deb10u2 | 4.0.0-4.4.1 | 4.4.2-4.4.5| +| [2739402](#2739402)
| The destination MAC address of ERSPAN GRE packets is set to all zeros. | 4.3.0-4.4.5 | 5.0.0-5.6.0| +| [2734122](#2734122)
| CVE-2021-33910: The Qualys Research Labs discovered that an attacker-controlled allocation using the alloca() function could result in memorycorruption, allowing to crash systemd and hence the entire operating system. Details can be found at https://www.qualys.com/2021/07/20/cve-2021-33910/denial-of-service-systemd.txt
Vulnerable: <= 241-7~deb10u7Fixed: 241-7~deb10u8 | 4.0.0-4.4.1 | 4.4.2-4.4.5| +| [2734119](#2734119)
| The ESI line in the show bgp l2vpn evpn route command output always shows VNI: 0. This is a cosmetic software issue. | 4.3.0-4.4.5 | 5.0.0-5.6.0| +| [2734103](#2734103)
| ACL [No More Resources] messages keep appearing and you can't reinstall the ACL. | 4.3.0-5.1.0 | 5.2.0-5.6.0| +| [2728207](#2728207)
| CVE-2021-3570: A flaw was found in the ptp4l program of the linuxptp package. A missing length check when forwarding a PTP message between ports allows a remote attacker to cause an information leak, crash, or potentially remote code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. | 3.7.0-3.7.16, 4.0.0-4.4.5 | | +| [2728206](#2728206)
| CVE-2021-3570: A flaw was found in the ptp4l program of the linuxptp package. A missing length check when forwarding a PTP message between ports allows a remote attacker to cause an information leak, crash, or potentially remote code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. | 3.7.0-3.7.16, 4.0.0-4.4.5 | | +| [2728205](#2728205)
| CVE-2021-3570: A flaw was found in the ptp4l program of the linuxptp package. A missing length check when forwarding a PTP message between ports allows a remote attacker to cause an information leak, crash, or potentially remote code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. | 3.7.0-4.4.1 | 4.4.2-4.4.5| +| [2728134](#2728134)
| CVE-2021-27212: A vulnerability in the Certificate List Exact Assertion validation was discovered in OpenLDAP, a free implementation of the Lightweight Directory Access Protocol. An unauthenticated remote attacker can take advantage of this flaw to cause a denial of service (slapd daemon crash) via specially crafted packets.
Vulnerable: <= 2.4.47+dfsg-3+deb10u5
Fixed: 2.4.47+dfsg-3+deb10u6 | 4.0.0-4.3.2 | 4.4.0-4.4.5| +| [2728119](#2728119)
| When VRF devices are deleted and reconfigured (for example, during a networking service restart), dynamic BGP neighbors might fail to reestablish. To work around this issue, restart FRR with the sudo systemctl restart frr command. | 4.3.0-4.4.5 | 5.0.0-5.6.0| +| [2713888](#2713888)
| With the ip-acl-heavy TCAM profile, the following message might appear after you install an ACL with NCLU or cl-acltool and the ACL might not work correctly
hal_flx_acl_util.c:378 ERR hal_flx_acl_resource_release resource region 0 size 7387 create failed: No More Resources
To work around this issue, change the TCAM profile to acl-heavy or ip-acl-heavy with ACL non-atomic mode. | 3.7.15-5.0.1 | 5.1.0-5.6.0| +| [2711533](#2711533)
| On the AS7326-56X switch, the link lights for 25G ports configured to work at 1G do not illuminate. | 4.2.1-4.4.5 | | +| [2710208](#2710208)
| The net show bgp neighbor command output shows the BFD status as UP even when the BGP neighbor is not established, such as when the interface is down. | 4.2.1-4.4.5 | | +| [2706744](#2706744)
| In an EVPN multihoming configuration, the VTEP continues to advertise a stale route after an extended MAC mobility event. | 4.3.0-4.4.1 | 4.4.2-4.4.5| +| [2700767](#2700767)
| Following an event that causes the peerlink bond MAC address to change, such as a slave port state change, MLAG interfaces might be suspended due to a peer IP mismatch. This behavior is seen when you use a MLAG peer IP linklocal configuration. | 3.7.12-3.7.15, 4.3.0-4.4.5 | 3.7.16| +| [2695526](#2695526)
| CVE-2021-3580 CVE-2021-20305: Multiple vulnerabilities were discovered in nettle, a low level cryptographic library, which could result in denial of service (remote crash in RSA decryption via specially crafted ciphertext, crash on ECDSA signature verification) or incorrect verification of ECDSA signatures
Vulnerable: 3.4.1-1Fixed: 3.4.1-1+deb10u1 | 4.0.0-4.3.2 | 4.4.0-4.4.5| +| [2690017](#2690017)
| When you remove a bond member, then re-add it, you might see a Parameter Error failure in {syslog and switchd.log:
sx_sdk: LAG: Can't add port (0x00012400) to lag. Port has vports configured for it (Parameter Error)
switchd[4529]: hal_mlx_bond.c:582 ERR bond32 member swp32 add failed: Parameter Error
To work around this issue, restart switchd. | 4.3.0-4.3.2 | 4.4.0-4.4.5| +| [2687159](#2687159)
| CVE-2018-25009 CVE-2018-25010 CVE-2018-25011 CVE-2018-25012 CVE-2018-25013 CVE-2018-25014 CVE-2020-36328 CVE-2020-36329 CVE-2020-36330 CVE-2020-36331 CVE-2020-36332: Multiple vulnerabilities were discovered in libwebp, the implementation of the WebP image format, which could result in denial of service, memory disclosure or potentially the execution of arbitrary code if malformed images are processed
Vulnerable: 0.6.1-2Fixed: 0.6.1-2+deb10u1 | 4.0.0-4.3.2 | 4.4.0-4.4.5| +| [2685994](#2685994)
| When you use the NVUE command nv set interface lo router ospf area to configure OSPF on a loopback interface, the configuration fails to apply
To work around this issue, configure the loopback interface in the desired OSPF area with the nv set vrf default router ospf area 0 network command and reference the assigned prefix of the loopback interface. For example:
cumulus@leaf01:~$ nv set vrf default router ospf area 0 network 10.10.10.1/32
| 4.0.0-5.0.1 | 5.1.0-5.6.0| +| [2682971](#2682971)
| CVE-2020-12762: integer overflow in the json-c JSON library, which could result in denial of service or potentially the execution of arbitrary code if large malformed JSON files are processed
Vulnerable: 0.12.2+cl4u1Fixed: 0.12.2+cl4.4.0u1 | 4.0.0-4.3.2 | 4.4.0-4.4.5| +| [2682780](#2682780)
| Adding a route map configuration after a MAC access list configuration line causes the route map configuration to be applied incorrectly
To work around this issue, add the MAC access list configuration to the end of the /etc/frr/frr.conf file. | 4.2.0-4.3.2 | 4.4.0-4.4.5| +| [2679950](#2679950)
| CVE-2021-25217: parsing of stored leases by dhclient or dhcpd has an incorrect length check that may cause a crash
Vulnerable: <= 4.3.1-6-cl3.7.14u1Fixed: 4.3.1-6-cl3.7.16u1 | 3.7.0-3.7.15, 4.0.0-4.3.2 | 3.7.16, 4.4.0-4.4.5| +| [2671667](#2671667)
| CVE-2021-23017: off-by-one in Nginx, a high-performance web and reverse proxy server, which couldresult in denial of service and potentially the execution of arbitrary code
Vulnerable: <= 1.14.2-2+deb10u3Fixed: 1.14.2-2+deb10u4 | 4.0.0-4.3.2 | 4.4.0-4.4.5| +| [2669873](#2669873)
| In an EVPN multihoming configuration, ARP/ND traffic coming in one switch is being sent back out the originating bond on the other switches in the ES on remote PE switches. Normally Split Horizon filtering prevents this kind of traffic at the remote PE. | 4.3.0-4.3.2 | 4.4.0-4.4.5| +| [2669858](#2669858)
CM-32169 | OpenSSH is vulnerable to CVE-2020-14145, as described in https://www.fzi.de/fileadmin/user_upload/2020-06-26-FSA-2020-2.pdf.
This is an information leak in algorithm negotiation that can allow man-in-the-middle attacks on initial connection attempts without a previously stored server host key on the client. If desired, mitigation using UpdateHostKeys and HostKeyAlgorithms is also given in that paper. | 3.7.14-3.7.16, 4.0.0-4.4.5 | | +| [2669073](#2669073)
| On Spectrum, Spectrum-2, and Spectrum-3 switches, the l1-show command shows the wrong data when the MST service is stopped
To work around this issue, start the MST service with the sudo mst start command. | 4.3.0-4.3.2 | 4.4.0-4.4.5| +| [2666838](#2666838)
| CVE-2021-31535: missing length validation in various functions provided by libx11, the X11 client-side library, allow to inject X11 protocol commands on X clients, leading to authentication bypass, denial of service or potentially the execution of arbitrary code
Vulnerable: <= 1.6.7-1+deb10u1Fixed: 1.6.7-1+deb10u2 | 4.0.0-4.3.2 | 4.4.0-4.4.5| +| [2663479](#2663479)
| CVE-2021-3520: integer overflow flaw in lz4, a fast LZ compression algorithm library, resulting in memory corruption
Vulnerable: 1.8.3-1Fixed: 1.8.3-1+deb10u1 | 4.0.0-4.3.2 | 4.4.0-4.4.5| +| [2656527](#2656527)
| CVE-2020-18032: A buffer overflow was discovered in Graphviz, which could potentially result in the execution of arbitrary code when processing a malformed file
Vulnerable: 2.40.1-6Fixed: 2.40.1-6+deb10u1 | 4.0.0-4.3.2 | 4.4.0-4.4.5| +| [2648658](#2648658)
| If you try to use more than one percent of max-ecmp-nexthops, you get an error indicating a failure. | 3.7.15-4.3.2 | 4.4.0-4.4.5| +| [2644053](#2644053)
| The following vulnerabilities have been announced in BIND:CVE-2021-25214: a malformed incoming IXFR transfer could trigger an assertion failure in named, resulting in denial of service
CVE-2021-25215: named could crash when a DNAME record placed in the ANSWER section during DNAME chasing turned out to be the final answer to a client query
CVE-2021-25216: the SPNEGO implementation used by BIND is prone to a buffer overflow vulnerability. This update switches to use the SPNEGO implementation from the Kerberos libraries
Vulnerable: <= 9.11.5.P4+dfsg-5.1+deb10u4Fixed: 9.11.5.P4+dfsg-5.1+deb10u5 | 4.0.0-4.3.2 | 4.4.0-4.4.5| +| [2639303](#2639303)
| When you use NCLU to delete a bond, then add an interface, NCLU reports an error similar to the following:
ERROR: 'NoneType' object has no attribute 'conf_key_value_multiple_values'See /var/log/netd.log for more details.
| 4.3.0-4.4.5 | | +| [2632379](#2632379)
| When you upgrade the switch with apt-get upgrade, the kexec-tools package is not installed, which causes the Smart System Manager fast restart mode to work incorrectly. | 4.3.0-4.3.2 | 4.4.0-4.4.5| +| [2628515](#2628515)
| CVE-2020-12695: hostapd does not properly handle UPnP subscribe messages under certain conditions, allowing an attacker to cause a denial of service
Vulnerable: <= 2.8.0-cl3.7.15u2Fixed: 2.8.0-cl3.7.15u3 | 3.7.14-3.7.14.2, 4.3.0-4.3.2 | 3.7.15-3.7.16, 4.4.0-4.4.5| +| [2618227](#2618227)
| The NCLU net show bridge macs command displays permanent MAC addresses for trunked VLANs. | 4.3.0-4.4.5 | | +| [2617000](#2617000)
| CVE-2021-26933 CVE-2021-27379Multiple vulnerabilities have been discovered in the Xen hypervisor, which could result in denial of service, privilege escalation or memory disclosure
Vulnerable: < 4.11.4+99-g8bce4698f6-1Fixed: 4.11.4+99-g8bce4698f6-1 | 4.0.0-4.3.2 | 4.4.0-4.4.5| +| [2616998](#2616998)
| CVE-2021-23358: missing input sanitising in the template() function of the Underscore JavaScript library could result in the execution of arbitrary code
Vulnerable: 1.9.1~dfsg-1Fixed: 1.9.1~dfsg-1+deb10u1 | 4.0.0-4.3.2 | 4.4.0-4.4.5| +| [2616987](#2616987)
| CVE-2020-6851 CVE-2020-8112 CVE-2020-15389 CVE-2020-27814 CVE-2020-27823 CVE-2020-27824 CVE-2020-27841 CVE-2020-27842 CVE-2020-27843 CVE-2020-27845: Multiple vulnerabilities have been discovered in openjpeg2, the open-source JPEG 2000 codec, which could result in denial of service or the execution of arbitrary code when opening a malformed image
Vulnerable: <= 2.3.0-2+deb10u1Fixed: 2.3.0-2+deb10u2 | 4.0.0-4.3.2 | 4.4.0-4.4.5| +| [2616976](#2616976)
| Multiple vulnerabilities were discovered in cURL, an URL transfer library:CVE-2020-8169: partial password leak to DNS servers
CVE-2020-8177: malicious server could cause curl -J -i to overwrite a local file
CVE-2020-8231: libcurl with CURLOPT_CONNECT_ONLY information leak due to wrong connection
CVE-2020-8284: PASV response could trick curl into connecting back to an arbitrary IP address and port
CVE-2020-8285: libcurl could run out of stack space using FTP wildcard matching (CURLOPT_CHUNK_BGN_FUNCTION)
CVE-2020-8286: failure to verify that OSCP response matches intended certificate
CVE-2021-22876: libcurl did not strip user credentials from URL when populating Referer HTTP request header
CVE-2021-22890: libcurl using HTTPS proxy with TLS1.3 could use the wrong session ticket and bypass server TLS certificate check
Vulnerable: <= 7.64.0-4+deb10u1Fixed: 7.64.0-4+deb10u2 | 4.0.0-4.3.2 | 4.4.0-4.4.5| +| [2616967](#2616967)
| CVE-2021-28957: lxml, a Python binding for the libxml2 and libxslt libraries, did not properly sanitize its input. This would allow a malicious user to mount a cross-site scripting attack
Vulnerable: <= 4.3.2-1+deb10u2Fixed: 4.3.2-1+deb10u3 | 4.0.0-4.3.2 | 4.4.0-4.4.5| +| [2616964](#2616964)
| CVE-2021-27291: Pygments, a syntax highlighting package written in Python 3, used regular expressions which could result in denial of service
Vulnerable: <= 2.3.1+dfsg-1+deb10u1Fixed: 2.3.1+dfsg-1+deb10u2 | 4.0.0-4.3.2 | 4.4.0-4.4.5| +| [2616954](#2616954)
| CVE-2021-3449: A NULL pointer dereference was found in the signature_algorithms processing in OpenSSL, a Secure Sockets Layer toolkit, which could result in denial of service
Vulnerable: <= 1.1.1d-0+deb10u5Fixed: 1.1.1d-0+deb10u6 | 4.0.0-4.3.2 | 4.4.0-4.4.5| +| [2614016](#2614016)
| The switch firmware incorrectly identifies Lenovo LR4 transceivers (part number 00YD278) and does not set the laser levels properly, which can prevent the link from coming up or might cause the transceiver to be identified as a 1G module. | 4.2.0-4.3.2 | 4.4.0-4.4.5| +| [2599274](#2599274)
| On Mellanox Spectrum switches, when there is an MSTP forwarding state change on a bonds (for example, when the state changes from blocking to forwarding), the MSTP hardware table might set some VLANs to blocking when they should be forwarding. A a result, all packets on these VLANs drop at ingress
To recover from this state, flap the bond interface (not the physical swp) by running ifdown ; sleep 1 ; ifup . | 4.3.0-4.4.5 | 5.0.0-5.6.0| +| [2582639](#2582639)
| On NVIDIA Spectrum switches, BUM traffic might be dropped during VXLAN decapsulation in an EVPN multihoming environment after multiple PIM uplink interfaces flap. | 4.3.0-4.3.2 | 4.4.0-4.4.5| +| [2578872](#2578872)
| CVE-2021-20270: It was discovered that Pygments, a syntax highlighting package written in Python, could be forced into an infinite loop, resulting in denial of service
Vulnerable: 2.3.1+dfsg-1Fixed: 2.3.1+dfsg-1+deb10u1 | 4.0.0-4.3.2 | 4.4.0-4.4.5| +| [2578870](#2578870)
| CVE-2020-35523 CVE-2020-35524: Two vulnerabilities have been discovered in the libtiff library and the included tools, which may result in denial of service or the execution of arbitrary code if malformed image files are processed
Vulnerable: <= 4.1.0+git191117-2~deb10u1Fixed: 4.1.0+git191117-2~deb10u2 | 4.0.0-4.3.2 | 4.4.0-4.4.5| +| [2577499](#2577499)
| QSFP+ 40G optics do not work on Spectrum platforms. | 4.3.0-4.3.2 | 4.4.0-4.4.5| +| [2574368](#2574368)
| When you run the NCLU net add bgp maximum-paths ibgp command, FRR restarts unexpectedly
To work around this issue, either use the vtysh commands or edit the /etc/frr/frr.conf file directly, then run systemctl reload frr. | 4.1.1-4.4.5 | | +| [2566880](#2566880)
| CVE-2021-27803: A vulnerability was discovered in how p2p/p2p_pd.c in wpa_supplicant before 2.10 processes P2P (Wi-Fi Direct) provision discovery requests. It could result in denial of service or other impact (potentially execution of arbitrary code), for an attacker within radio range. | 3.7.14-3.7.14.2, 4.0.0-4.3.2 | 3.7.15-3.7.16, 4.4.0-4.4.5| +| [2564534](#2564534)
| Several vulnerabilities have been discovered in the GRUB2 bootloader
CVE-2020-14372: It was discovered that the acpi command allows a privileged user to load crafted ACPI tables when Secure Boot is enabled
CVE-2020-25632: A use-after-free vulnerability was found in the rmmod command
CVE-2020-25647: An out-of-bound write vulnerability was found in the grub_usb_device_initialize() function, which is called to handle USB device initialization
CVE-2020-27749: A stack buffer overflow flaw was found in grub_parser_split_cmdline
CVE-2020-27779: It was discovered that the cutmem command allows a privileged user to remove memory regions when Secure Boot is enabled
CVE-2021-20225: A heap out-of-bounds write vulnerability was found in the short form option parser
CVE-2021-2023: A heap out-of-bound write flaw was found caused by mis-calculation of space required for quoting in the menu rendering. | 4.0.0-4.3.2 | 4.4.0-4.4.5| +| [2556782](#2556782)
CM-33398 | CVE-2021-0326: An issue has been found in wpa, a set of tools to support WPA and WPA2 (IEEE 802.11i). Missing validation of data can result in a buffer over-write, which might lead to a DoS of the wpa_supplicant process or potentially arbitrary code execution.
Vulnerable: <= 2.8.0-cl3.7.14u1, <= 2.8.0-cl4.2.1u1 | 3.7.14-3.7.14.2, 4.0.0-4.3.2 | 3.7.15-3.7.16, 4.4.0-4.4.5| +| [2556777](#2556777)
CM-33395 | CVE-2021-26937: A flaw in the handling of combining characters in screen, a terminal multiplexer with VT100/ANSI terminal emulation can result in denial of service, or potentially the execution of arbitrary code via a specially crafted UTF-8 character sequence.
Vulnerable: 4.6.2-3
Fixed: 4.6.2-3+deb10u1 | 4.0.0-4.3.2 | 4.4.0-4.4.5| +| [2556772](#2556772)
CM-33391 | The net show clag verify-vlans command fails with the following log:

WARNING: '/usr/bin/clagctl verifyvlans' failed due to:
Command '['/usr/bin/clagctl', 'verifyvlans']' returned non-zero exit status 1

To work around this issue, run the /usr/bin/clagctl verifyvlans command or the net show clag verbose command. | 4.2.1-4.4.5 | | +| [2556730](#2556730)
CM-33359 | CVE-2020-8625: A buffer overflow vulnerability was discovered in the SPNEGO implementation affecting the GSSAPI security policy negotiation in BIND, a DNS server implementation, which could result in denial of service (daemon crash), or potentially the execution of arbitrary code.
Vulnerable: <= 9.11.5.P4+dfsg-5.1+deb10u2
Fixed: 9.11.5.P4+dfsg-5.1+deb10u3 | 4.0.0-4.3.2 | 4.4.0-4.4.5| +| [2556369](#2556369)
CM-33196 | If you use NCLU to configure an ACL for eth0, you can't designate it as an INPUT rule; the rule is automatically created as a FORWARD rule in the /etc/cumulus/acl/policy.d/50_nclu_acl.rules file.
To work around this issue, manually create an ACL in the /etc/cumulus/acl/policy.d/ file with "-A INPUT -i eth0". | 4.2.1-4.4.5 | | +| [2556082](#2556082)
CM-33050 | The NCLU net del vrf command does not delete a numbered VRF. For example:

cumulus@leaf01:~$ net del vrf 55
ERROR: Command not found
| 4.2.1-4.4.5 | | +| [2556081](#2556081)
CM-33049 | You cannot set the time zone can with NCLU commands. | 4.1.1-4.4.5 | | +| [2555873](#2555873)
CM-32914 | On Mellanox switches, egress ACLs with VLAN keys do not filter layer 2 multicast or broadcast traffic. | 4.3.0-4.4.5 | | +| [2555763](#2555763)
CM-32861 | The NCLU net del bgp neighbor command does not delete the neighbor and displays an error similar to the following:

ERROR: --- /run/nclu/frr/frr.conf.scratchpad.baseline 2021-01-04 17:23:59.250463331 +0000
+++ /run/nclu/frr/frr.conf.scratchpad 2021-01-04 17:25:59.213673980 +0000

To work around this issue, use the FRR command to delete a neighbor. | 4.3.0-4.4.5 | | +| [2555613](#2555613)
CM-32786 | The net show configuration commands command incorrectly displays the NCLU syntax to disable IPv6 forwarding on interfaces. For example:

# net show configuration commands
net add vlan 1 ip6-forward off

The correct NCLU command to disable IPv6 forwarding is net add vlan 1 ipv6 forward off (without the hyphen). | 4.2.1-4.4.5 | | +| [2555318](#2555318)
CM-32612 | If you try to enable BGP graceful restart when it is already enabled, you see an error similar to the following in the frr.log file:

2020-12-07T19:20:26.004333+00:00 cumulus bgpd[4954]: VRF default: Handle GR command GLOBAL_GR_CMD, current GR state GLOBAL_GR, new GR state GLOBAL_INVALID

This error has no functional impact. | 4.3.0-4.4.5 | | +| [2554986](#2554986)
CM-32416 | The ethtool utility doesn't contain the latest values, as a result the Revision Compliance field shows Unallocated. | 4.2.1-4.4.5 | | +| [2554812](#2554812)
CM-32296 | If the RMAC of a layer 3 SVI changes, the show vrf vni command is not updated with the new value. However, the new RMAC is seen in the show evpn vni command and is present on self-originated EVPN routes. | 4.2.1-4.4.5 | | +| [2554783](#2554783)
CM-32274 | If you apply an outbound route map to a BGP peer that uses set as-path prepend last-as, advertised locally-originated routes have the ASN of the peer prepended to the AS path.
This might trigger AS path loop prevention on the peer, where the peer ignores locally-originated prefixes. | 4.2.1-4.4.5 | 5.0.0-5.6.0| +| [2554709](#2554709)
CM-32217 | The IP address specified in the ip pim use-source command configured on the loopback interface should be inherited by unnumbered interfaces during their Primary IP address selection process. If ip pim use-source is configured on the loopback after an unnumbered interface has already selected their Primary IP address, the unnumbered interface does not update its Primary IP address to be the new use-source value until after there is a netlink update for that interface.
To work around this issue, configure ip pim use-source on each unnumbered interface directly or ensure ip pim use-source is applied to the loopback before other unnumbered interfaces are enabled for PIM. | 3.7.13-3.7.16, 4.2.1-4.4.5 | | +| [2554670](#2554670)
CM-32194 | When you have a large number of ACLs, the cl-acltool -L ip and cl-resource-query commands take a long time to complete. | 4.3.0-4.4.5 | | +| [2554582](#2554582)
CM-32144 | On switches with the Maverick ASIC, control traffic is dropped due to receive buffering. | 4.2.0-4.4.5 | | +| [2554533](#2554533)
CM-32112 | On the ARM platform, NTP peer associations slowly increase to larger offsets (~500ms). | 4.0.0-4.4.5 | | +| [2554466](#2554466)
CM-32068 | Kernel routes added by iproute2 are missing in FRR after an interface flap.
To work around this issue, configure a static route in FRR.
| 4.2.1-4.4.5 | | +| [2554299](#2554299)
CM-31962 | In a VRRP configuration, BGP unnumbered sessions for VRFs fail to establish after a networking restart. | 4.2.0-4.3.2 | 4.4.0-4.4.5| +| [2554222](#2554222)
CM-31921 | The NCLU command to enable bridge learning fails.
As a work around, enable bridge learning in the /etc/network/interface file. For example:

auto vni-30
iface vni-30
vxlan-id 30
bridge-access 30
bridge-arp-nd-suppress on
bridge-learning on
vxlan-local-tunnelip 10.10.10.1
mstpctl-bpduguard yes
mstpctl-portbpdufilter yes
mtu 9166
| 4.2.1-4.4.5 | | +| [2554218](#2554218)
CM-31917 | MLAG packets received on the peer link are dropped instead of routed. | 4.2.0-4.4.5 | | +| [2554202](#2554202)
CM-31904 | The output of the net show commit command does not show the last commit or the specified commit number but is empty instead. | 4.2.1-4.4.5 | | +| [2553989](#2553989)
CM-31759 | Default policer configured for LACP as an INPUT chain rule in 00control_plane.rules is meant to protect CPU from an LACP storm. When LACP storm is originating out of a single bond or bond member interface in a switch with multiple bond interfaces, there is a possibility of other LACP bond interface(s) going down. | 4.2.1-4.4.5 | | +| [2553887](#2553887)
CM-31700 | When using TACACS+ configured with a DEFAULT user providing privilege level lower than 16, TACACS+ configured users with privilege level 16 access might not be able to run privilege level 16 NCLU commands, such as net add and net del and see an error similar to the following:

ERROR: You do not have permission to execute that command.

To work around this issue, remove the DEFAULT user from the TACACS+ server. | 3.7.7-3.7.16, 4.0.0-4.4.5 | | +| [2553677](#2553677)
CM-31605 | When you configure an SNMPv3 user with the net-snmp-config configuration command from the libsnmp-dev package, you get an error message similar to the one below:

cumulus@switch:mgmt-vrf:~$ sudo net-snmp-config --create-snmpv3-user -a shaauthpass -x aesprivpass -A SHA -X AES userSHAwithAES
adding the following line to /var/lib/snmp/snmpd.conf:
createUser userSHAwithAES SHA "shaauthpass" AES "aesprivpass"
adding the following line to /snmp/snmpd.conf:
rwuser userSHAwithAES
touch: cannot touch ‘/snmp/snmpd.conf’: No such file or directory
/usr/bin/net-snmp-create-v3-user: 144: /usr/bin/net-snmp-create-v3-user: cannot create /snmp/snmpd.conf: Directory nonexistent

To work around this issue, use the NCLU command to configure SNMPv3 user parameters; for example:

cumulus@switch:mgmt-vrf:~$ net add snmp-server username user999 auth-md5 user999password encrypt-des user999encryption

Alternatively, directly edit the /etc/snmp/snmpd.conf file as described in the documentation. | 3.7.13-3.7.16, 4.0.0-4.4.5 | | +| [2553237](#2553237)
CM-31418 | The default NTP configuration is to use eth0 as the NTP source interface. In Cumulus Linux 4.0 and later, eth0 is in the management VRF by default; therefore the NTP service runs automatically in the management VRF.
NVIDIA does not recommend running NTP with a source interface other than eth0 as this can expose a security vulnerability. Changing the NTP source interface name with NCLU to a non-management VRF interface might result in NTP not functioning because the NTP service is still running in the management VRF.

| 4.2.0-4.4.5 | | +| [2553116](#2553116)
CM-31357 | When you manually set the link speed or duplex mode with ethtool to an unsupported value, then run a TDR check against the interface, you encounter a switchd service heartbeat failure.
To work around this issue, reboot the switch to clear the condition. Avoid setting the interface speed or duplex mode directly with ethtool. | 3.7.12-3.7.16, 4.0.0-4.4.5 | | +| [2553015](#2553015)
CM-31300 | If a neighbour contains a special character in PortID for LLDP, the net show interface command does not display the LLDP information or the command might fail. | 3.7.10-3.7.16, 4.2.0-4.4.5 | | +| [2552691](#2552691)
CM-31111 | On the EdgeCore AS4610 switch, the eth0 interface remains down when physically connected to a 1G interface.
To work around this issue, configure the link speed to 1000 and set auto-negotiation on for the eth0 interface, then flap eth0 with the ip link set eth0 down/up command to bring up the port. | 4.2.0-4.4.5 | | +| [2552453](#2552453)
CM-30987 | On the Mellanox switch, RoCE with PFC configuration is not applied to all ports in hardware when a range is used in the traffic.conf file.
To work around this issue, use NCLU to configure RoCE with PFC or list individual ports in the traffic.conf file. | 4.2.0-4.4.5 | | +| [2552309](#2552309)
CM-30889 | The following messages are seen on an Edgecord Minipack-AS8000 running Cumulus Linux 4.2.0:


Hal_bcm_console.c:294 MMU config profile 0 prigroup 0: Service Pool 0 has no space and cannot be assigned
Hal_bcm_console.c:294 MMU config port 0 idx 0: Pool 0 has no space and cannot be assigned


These messages are for internal validation purposes only and can be safely ignored.

| 4.2.0-4.4.5 | | +| [2552294](#2552294)
CM-30879 | NCLU restarts FRR when removing a BGP VRF IPv4 aggregate-address command.
| 3.7.12-3.7.16, 4.0.0-4.4.5 | | +| [2552266](#2552266)
CM-30863 | OpenSSH scp is vulnerable to CVE-2020-15778, where clients that have authorized access to the SSH server can execute commands on the server by copying maliciously named files.
The two scenarios where an exploit may be useful to an attacker:
-The user is authorized to scp but not ssh (based on the command option in the authorized_keys file), so this vulnerability can allow executing a remote command on the target computer when not authorized to do so.
-An attacker plants a maliciously named file in a directory tree that someone later uses scp -r to copy over to the target computer.
Be aware that restricting users to scp by using the command option in the authorized_keys file is not effective in preventing those users from executing arbitrary commands on the server.
If you want to use scp -r to copy directory trees, avoid copying directory trees to which attackers may have added maliciously-named files. Archiving the directory tree with tar, zip, or a similar program, then copying the archive over to be extracted on the server avoids having to use scp -r altogether. In addition, OpenSSH provides sftp, which you can use instead of scp to copy files.
To disable scp completely, use /bin/chmod 0 /usr/bin/scp . | 3.7.14-3.7.16, 4.0.0-4.4.5 | | +| [2551666](#2551666)
CM-30473 | If you modify an interface name, then reuse the previous interface name for a different VLAN, the ifreload -a command generates an error similar to the following:

warning: : interface not recognized - please check interface configuration

| 4.1.0-4.4.5 | | +| [2551578](#2551578)
CM-30422 | When you configure a bridge in the /etc/network/interfaces file, then try to reconfigure the bridge to be a VRF interface with the same name, ifreload/ifup commands fail with an invalid table id or unable to get vrf table id error. | 3.7.12-3.7.16, 4.0.0-4.4.5 | | +| [2551565](#2551565)
CM-30414 | If you toggle VRRP priority values between VRRP routers, then restart switchd, a few IPv6 VRRP instances might not converge. As a result, both the VRRP routers act as master routers for the impacted IPv6 VRRP instances. IPv4 VRRP instances are not affected
To work around this issue, remove, then add back the VRRP configuration with NCLU or vtysh commands. | 3.7.13-3.7.16, 4.2.0-4.4.5 | | +| [2551335](#2551335)
CM-30312 | When TACACS+ is configured and the management VRF is enabled, users with privilege level 13 are prevented from running ip and cat commands. | 4.0.0-4.4.5 | | +| [2551305](#2551305)
CM-30296 | The net show configuration command provides the wrong net add command for ACL under the VLAN interface.

| 3.7.12-3.7.16, 4.1.0-4.4.5 | | +| [2551273](#2551273)
CM-30280 | On a Mellanox SN2010 switch, the Locator LED is on after you upgrade Cumulus Linux. | 4.1.0-4.4.5 | | +| [2551221](#2551221)
CM-30255 | When span-to-cpu is enabled on L3 swp interface with an IP address configured, packets with destination IP as switchport's IP address don't reach switchport. To capture packets directed towards switcport's IP, disable span-to-cpu and use tcpdump on swichport instead. | 4.2.0-4.4.5 | | +| [2551111](#2551111)
CM-30230 | If a remote EVPN Sticky MAC [Static MAC address] is unexpectedly learned dynamically on a local interface, the selected entries in zebra and BGP are in an inconsistent state.
zebra increments the local MAC mobility sequence number and considers the MAC address to be local, but BGP maintains the remote Sticky MAC as the best path selected. This results in zebra installing the local MAC address and BGP not updating the route for the MAC address. | 4.0.0-4.4.5 | | +| [2550974](#2550974)
CM-30195 | On the Dell S3000 switch, after installing the Cumulus Linux 4.1.1 disk image without a license, the switch sends a link beat if a remote host port is configured. | 3.7.11-3.7.16, 4.1.1-4.4.5 | | +| [2550793](#2550793)
CM-30101 | The NCLU net show bridge spanning-tree command displays the aging timer incorrectly. | 3.7.12-3.7.16, 4.0.0-4.4.5 | | +| [2550713](#2550713)
CM-30052 | Configuring the subinterface of a VXLAN uplink under another traditional bridge, which also has the VXLAN VNI enslaved, causes switchd to use high CPU due to very frequent VXLAN tunnel sync events.
To work around this issue, do not enslave the subinterface of a VXLAN layer 3 uplink under a traditional bridge in a VXLAN configuration. | 4.1.1-4.4.5 | | +| [2550704](#2550704)
| On the Mellanox SN3420 switch, 25G SR optics only link up in force mode. | 4.3.0-4.3.2 | 4.4.0-4.4.5| +| [2550642](#2550642)
CM-30006 | ACLs with SPAN target and in-interface as bond member are not supported on Spectrum-based switches | 4.2.0-4.4.5 | | +| [2550444](#2550444)
CM-29872 | Tab completion for the net show rollback description command returns information about a snapshot instead of context help.
To work around this issue, run the net show commit history command to find descriptions instead of the net show rollback description command. | 3.7.12-3.7.16, 4.0.0-4.4.5 | | +| [2550443](#2550443)
CM-29871 | The net show rollback description command returns an error even if the string matches a commit description.
To work around this issue, look for your string in the output of the net show commit history command (or grep for it there) instead. | 3.7.12-3.7.16, 4.0.0-4.4.5 | | +| [2550243](#2550243)
CM-29759 | When you use nginx and restserver in management VRF to provide a REST API for the switch, nginx starts but restserver fails to start.
To work around this issue, comment out the Requires= line in the /lib/systemd/system/restserver.service. For example:

#Requires=nginx.service restserver.socket
| 3.7.12-3.7.16, 4.0.0-4.4.5 | | +| [2550056](#2550056)
CM-29652 | The ACCTON-DIAG option under the Cumulus Linux GRUB menu does not work. When you select this option, you see the following error:

error: invalid signature.
Press any key to continue...
| 3.7.12-3.7.16, 4.1.1-4.4.5 | | +| [2549925](#2549925)
CM-29594 | When you run an Ansible script to replace the /etc/network/interfaces file, then run the ifreload -a command, you see errors similar to the following:

error: swp1s1.2: netlink: cannot set link swp1s1.2 up: operation failed with 'Network is down' (100)
warning: cmd '/bin/ip addr del 10.0.0.1/24 dev eth0' failed: returned 2 (RTNETLINK answers: Cannot assign requested address

To work around this issue, run the ifreload -a command a second time. | 3.7.12-3.7.16, 4.0.0-4.4.5 | | +| [2549872](#2549872)
CM-29562 | If you have an SVI with multiple VRR IP addresses and try to delete one of the VRR configurations, net commit or ifreload -a returns an error. | 3.7.12-3.7.16, 4.1.1-4.4.5 | | +| [2549782](#2549782)
CM-29519 | The JSON format output of the net show bgp l2vpn evpn summary command shows the incorrect neighbour state. | 3.7.12-3.7.16, 4.0.0-4.4.5 | | +| [2549731](#2549731)
CM-29492 | When you create SPAN or ERSPAN rules in ebtables, the action fails to install if it is not in lowercase. Make sure that the SPAN or ERSPAN action is all lowercase; for example:

[ebtables]
-A FORWARD --in-interface swp10 -j span --dport swp1
| 3.7.12-3.7.16, 4.1.1-4.4.5 | | +| [2549392](#2549392)
CM-29319 | When you configure an RD or RT with NCLU, you see duplicate VNI stanzas in the /etc/frr/frr.conf file.
To work around this issue, manually edit the etc/frr/frr.conf file to define advertise-all-vni before the RD or RT configuration within the l2vpn EVPN address family, then reload the FRR service with the sudo systemctl reload frr command. | 4.1.0-4.4.5 | | +| [2549371](#2549371)
CM-29309 | When Optimized Multicast Flooding (OMF) is enabled with the bridge.optimized_mcast_flood = TRUE setting in the /etc/cumulus/switchd.conf file, the switch continues to flood IPv6 multicast traffic to all slave ports when there is no MLD join receive. | 3.7.11-4.3.2 | 4.4.0-4.4.5| +| [2548924](#2548924)
CM-29146 | On the EdgeCore Minipack AS8000, storm control does not restrict unknown unicast, broadcast, or multicast traffic. | 4.1.1-4.4.5 | | +| [2548657](#2548657)
CM-29035 | When you upgrade Cumulus Linux on the EdgeCore AS7726-32X or AS7326-56X switch, you might see firmware errors similar to the following:

W: Possible missing firmware /lib/firmware/tigon/tg3_tso5.bin for module tg3
W: Possible missing firmware /lib/firmware/tigon/tg3_tso.bin for module tg3
W: Possible missing firmware /lib/firmware/tigon/tg3.bin for module tg3

You can safely ignore these error messages. | 3.7.12-3.7.16, 4.0.0-4.4.5 | | +| [2548579](#2548579)
| The following security vulnerability has been announced:
CVE-2020-10531: An issue was discovered in International Components for Unicode (ICU) for C/C++ through 66.1. An integer overflow, leading to a heap-based buffer overflow, exists in the UnicodeString::doAppend() function in common/unistr.cpp. | 3.7.12, 4.0.0-4.4.5 | 3.7.13-3.7.16| +| [2548315](#2548315)
CM-28816 | The following security advisory has been announced for bash:
CVE-2019-18276 Qualys scan QID 372268 setuid vulnerability
When bash or bash scripts are run setuid, bash is supposed to drop privileges, but does so incorrectly, so that an attacker with command access to the shell can use enable -f for runtime loading of a new builtin that calls setuid() to regain dropped privileges.
To work around this issue, do not make bash or bash scripts setuid. | 3.7.12-3.7.16, 4.0.0-4.4.5 | | +| [2548310](#2548310)
CM-28812 | When the system boots, we might see " cumulus systemd-udevd[7566]: Process '/usr/bin/hw-management-thermal-events.sh add thermal_zone /sys /devices/virtual/thermal/thermal_zone25 thermal_zone25' failed with exit code 1" errors.

These errors are result of user space acting on kernel events a bit slow. The mlxsw_minimal driver is added during kernel boot; An SDK reset causes the driver to be deleted and re-instantiated; User space handler for thermal zone add sees the add first; But the underlying device is deleted before it can act on it. This situation is rectified as the mlxsw_minimal driver is re-instantiated later;
| 4.1.0-4.4.5 | | +| [2548260](#2548260)
CM-28770 | The net add routing route-map permit set community command does not add the set statement into the /etc/frr/frr.conf file. | 4.0.0-4.4.5 | | +| [2548243](#2548243)
CM-28754 | On switches with the Trident2+ ASIC, adding SPAN rules disables PBR rules. | 3.7.3-3.7.16, 4.0.0-4.4.5 | | +| [2548117](#2548117)
CM-28659 | In OVSDB traditional bridge mode, adding or removing a VLAN binding causes a traffic forwarding outage for around 20 seconds or more on adjacent VLAN bindings. Cumulus Linux does not support _traditional_ bridge mode with VMware NSX. | 3.7.12-3.7.16, 4.0.0-4.4.5 | | +| [2548062](#2548062)
CM-28622 | When ports are split to 4x25G, RS FEC needs to explicitly configured on both ends (especially when interoperating with non-Mellanox switches). | 4.1.0-4.4.5 | | +| [2548044](#2548044)
CM-28608 | When a remote VTEP withdraws a type-3 EVPN route, Cumulus Linux purges all MAC address and neighbor entries installed in the corresponding layer 2 VNI through that remote VTEP from the local EVPN and kernel forwarding tables. This purge occurs even if the remote VTEP does not withdraw type-2 routes carrying the MAC address or neighbor entries. The entries stay missing from the local EVPN and kernel forwarding tables until BGP updates the MAC address and neighbor. | 3.7.12-3.7.15, 4.0.0-4.4.5 | 3.7.16| +| [2547903](#2547903)
CM-28506 | CVE-2019-19956: xmlParseBalancedChunkMemoryRecover in parser.c in libxml2 before 2.9.10 has a memory leak related to newDoc->oldNs
Vulnerable: 2.9.4+dfsg1-7Fixed: 2.9.4+dfsg1-7+deb10u1 | 4.0.0-4.4.5 | | +| [2547890](#2547890)
CM-28497 | QinQ across VXLAN on a traditional bridge does not work. | 4.1.0-4.4.5 | | +| [2547782](#2547782)
CM-28441 | If a LLDP neighbor advertises a PortDescr that contains commas, ptmctl -d splits the string on the commas and misplaces its components in other columns. | 3.7.11-3.7.16, 4.0.0-4.4.5 | | +| [2547706](#2547706)
CM-28397 | When you configure ganged ports in the ports.conf file, the change does not take effect after you restart switchd.
To work around this issue, reboot the switch. | 3.7.11-3.7.16, 4.0.0-4.4.5 | | +| [2547405](#2547405)
CM-28226 | When you restart the hsflowd service, you see a systemd warning message similar to the following:

Warning: The unit file, source configuration file or drop-ins of hsflowd@mgmt.service changed on disk. Run 'systemctl daemon-reload'.
| 4.0.0-4.4.5 | | +| [2547120](#2547120)
CM-28076 | After you hot swap a PSU, the decode-syseeprom -t psuX command shows the old PSU information (such as the serial number), until you run the decode-syseeprom --init command. | 3.7.11-3.7.16, 4.0.0-4.4.5 | | +| [2546991](#2546991)
CM-28003 | The FRR service does not provide a way for automation to know if the configuration applied properly.
To work around this issue, execute the vtysh -f command in the automation file before starting the FRR service to validate the functional configuration and return an error code. | 3.7.11-3.7.16, 4.0.0-4.4.5 | | +| [2546895](#2546895)
CM-27957 | If you have configured a higher number of ports and VLANs (ports x VLANs) or the switch is a lower-powered (CPU) platform, the switchd service might fail to send a systemd keepalive within the watchdog timeout value (2 minutes by default) and you see an error similar to the following:
bq. systemd[1]: switchd.service watchdog timeout (limit 2min)!
To workaround this issue, either reduce the number of configured interfaces and, or VLANs, or increase the systemd timeout for switchd.service
To increase the systemd timeout:1.Edit the /etc/systemd/system/switchd.service.d/override.conf file and increase the WatchdogSec parameter
2.Restart the switchd service with the sudo systemctl restart switchd.service command
systemd attempts to restart the switchd service automatically (after the watchdog timeout). If the restart fails multiple times in a short time period, run the sudo systemctl reset-failed command followed by the sudo systemctl restart switchd command. | 3.7.11-3.7.16, 4.0.0-4.4.5 | | +| [2546874](#2546874)
CM-27950 | On the Dell S5232F, S5248F, S5296F, and S3048 switch, using the poweroff or halt commands does not fully power off the switch. | 4.0.0-4.4.5 | | +| [2546255](#2546255)
CM-27637 | On the EdgeCore Minipack-AS8000 switch, a 100G DAC link does not come up when auto-negotiation is enabled on the neighbor. This switch does not support 100G DAC auto-negotiation at this time. | 4.0.0-4.4.5 | | +| [2546225](#2546225)
CM-27627 | When you execute the following command on the Delta AG6248C switch, the switch reboots and then comes right back into Cumulus Linux without installing the new image. The install image is still in /var/lib/cumulus/installer, which causes issues with cl-support.
 
sudo onie-install -fai http://
sudo reboot

To work around this issue, use the onie-select command to access ONIE, and then use the nos-install command in ONIE to install a new binary image. | 3.7.11-3.7.16, 4.0.0-4.4.5 | | +| [2546131](#2546131)
CM-27581 | On the Delta AG-6248C PoE switch, when you run the apt upgrade command, the upgrade does not work. Cumulus Linux uses uboot directly instead of grub to boot the kernel. Uboot needs a special header to boot the kernel, which is not present. Without this header, when you use the apt upgrade command to upgrade Linux packages, uboot is unable to boot up the kernel.
To work around this issue, upgrade Cumulus Linux by installing the Cumulus Linux image. Run the onie-select command to go into ONIE, and then use the nos-install command in ONIE to install a new image.
This workaround only works when an out-of-band network is present. | 3.7.11-3.7.16, 4.0.0-4.4.5 | | +| [2545837](#2545837)
CM-27444 | If you use the NCLU commands to configure NTP and run the net add time ntp source command before you run the net add time ntp server iburst command, the /etc/ntp.conf file is misconfigured.
To work around this issue, run the net add time ntp server iburst command before you run the net add time ntp source command. | 3.7.10-3.7.11, 4.0.0-4.4.5 | 3.7.12-3.7.16| +| [2545520](#2545520)
CM-27243 | The length of the netlink message is not set properly for non-bridge family type messages. The same length is used for both bridge and non-bridge even though the bridge family type message has an extra attribute. This causes extra bytes to be left over in non-bridge family type netlink messages. | 3.7.10, 4.0.0-4.4.5 | 3.7.11-3.7.16| +| [2545239](#2545239)
CM-27099 | On the Mellanox switch with the Spectrum-2 ASIC, Precision Time Protocol (PTP) is not currently supported. | 4.0.0-4.3.2 | 4.4.0-4.4.5| +| [2545233](#2545233)
CM-27094 | On the Delta AG9032v1 switch, smonctl and sensors report inaccurate PSU current and power. | 4.0.0-4.4.5 | | +| [2545125](#2545125)
CM-27018 | If you configure more than one VRR interface on an SVI interface, deleting one of the VRR addresses does not remove the interface/address. | 3.7.10-3.7.16, 4.0.0-4.4.5 | | +| [2544978](#2544978)
CM-26921 | If you delete an undefined bond, then add a bond slave, the net commit command fails. | 3.7.9-3.7.16, 4.0.0-4.4.5 | | +| [2544968](#2544968)
CM-26913 | FRR configuration commands for an SVI interface might have the \n misplaced in the output. For example:

sudo sh -c "printf 'interface 50\nvrf TEST description L3 routing interface\n' >> /etc/frr/frr.conf"

should be:

sudo sh -c "printf 'interface 50 vrf TEST\ndescription L3 routing interface\n' >> /etc/frr/frr.conf"

To work around this issue, configure the interface manually in the /etc/frr/frr.conf file. | 3.7.9-3.7.16, 4.0.0-4.4.5 | | +| [2544957](#2544957)
CM-26907 | NCLU incorrectly allows you to apply port security configuration on layer 2 and layer 3 ports that are not part of a bridge. | 4.0.0-4.4.5 | | +| [2544953](#2544953)
CM-26905 | When you update the hostname of a switch with the NCLU net add hostname command, then run net commit, the lldpd service does not restart and other devices still see the old hostname.
To work around this issue, run the sudo systemctl restart lldpd.service command. | 3.7.10-3.7.16, 4.0.0-4.4.5 | | +| [2544880](#2544880)
CM-26860 | When you run the NCLU net show commit last or net show commit command, where is the last commit, no output is shown. | 4.0.0-4.4.5 | | +| [2544723](#2544723)
CM-26769 | Setting ProtoDown on ports populated with SFP modules providing RJ-45 1000BASE-T interfaces does not cause the carrier to be dropped. The kernel shows carrier down; however, the remote device still shows a link. | 3.7.6-3.7.10, 4.0.0-4.4.5 | 3.7.11-3.7.16| +| [2544463](#2544463)
CM-26599 | Auto-negotiation does not work with the QSFP28 cables and a remote system operating at 10G. Attempting to enable auto-negotiation with ethtool -s swp<#> autoneg on returns Operation not supported.
To work around this issue, do not use auto-negotiation and set the local port speed to 10G. | 3.7.9-3.7.16, 4.0.0-4.4.5 | | +| [2544456](#2544456)
CM-26595 | The NCLU net show lldp command displays the speed of a ganged port group as the speed of one of the individual links, rather than the sum of their speeds. | 3.7.9-3.7.16, 4.0.0-4.4.5 | | +| [2544311](#2544311)
CM-26516 | Applying a policy-based routing (PBR) rule for all traffic from a host might disrupt ARP refresh for that connected host. | 3.7.5-3.7.16, 4.0.0-4.4.5 | | +| [2544155](#2544155)
CM-26423 | NCLU requires you to specify an interface with multiple address-virtual statements in ascending MAC address order.

| 3.7.5-3.7.16, 4.0.0-4.4.5 | | +| [2544113](#2544113)
CM-26412 | Mac learning is not disabled by default on a double tagged peer link interface resulting in the MAC address changing between the MLAG bond and the peer link.
To work around this issue, disable MAC learning on QinQ VLANs by adding bridge-learning off to the VLAN stanza in the etc/network/interfaces file. | 3.7.9-3.7.16, 4.0.0-4.4.5 | | +| [2543937](#2543937)
CM-26308 | An interface alias configured outside FRR using iproute2 is imported into the FRR running configuration and overrides the internal description. After an FRR reload, this causes FRR to delete the interface alias in an inefficient way. Depending on how many interfaces with aliases you have configured, this can cause a FRR reload to time out.
To work around this issue, remove the interface alias description from iproute2. | 3.7.8-3.7.10, 4.0.0-4.4.5 | 3.7.11-3.7.16| +| [2543915](#2543915)
CM-26301 | When you enable a service in the management VRF, systemctl issues a warning similar to the following:
Warning: The unit file, source configuration file or drop-ins of ntp@mgmt.service changed on disk. Run 'systemctl daemon-reload' to reload unit
You can safely ignore this warning. | 4.0.0-4.4.5, 5.0.0-5.6.0 | | +| [2543900](#2543900)
CM-26288 | On the Mellanox switch, static VXLAN tunnels incorrectly allow traffic from any remote tunnel IP address. | 3.7.8-3.7.16, 4.0.0-4.4.5 | | +| [2543841](#2543841)
CM-26256 | The net show evpn vni detail json command includes an extra empty dictionary at the end of the output.
| 3.7.8-3.7.16, 4.0.0-4.4.5 | | +| [2543816](#2543816)
CM-26241 | On the Dell S5248F-ON switch, smond might generate syslog messages indicating that the fan input RPM is lower than the normal low speed of 2500 RPM. Speeds as low as 1700 RPM are acceptable in normal thermal environments; therefore, you can ignore these messages.
| 3.7.6-3.7.11, 4.0.0-4.4.5 | 3.7.12-3.7.16| +| [2543781](#2543781)
CM-26217 | NCLU does not allow you to configure OSPF NSSAs. For example:

cumulus@switch:~$ net add ospf area 0.0.0.1 nssa
ERROR: Command not found.
net add ospf area 0.0.0.1 nssa

To work around this issue, use FRR instead. For example:

switch# configure terminal
switch(config)# router ospf
switch(config-router)# area 0.0.0.1 nssa
| 3.7.7-3.7.10, 4.0.0-4.4.5 | 3.7.11-3.7.16| +| [2543724](#2543724)
CM-26179 | If a hostname contains utf-8 characters, the NCLU net show lldp command outputs the following error:

ERROR: 'ascii' codec can't encode character u'\xe9' in position 3: ordinal not in range(128)
See /var/log/netd.log for more details.
| 3.7.7-3.7.10, 4.0.0-4.4.5 | 3.7.11-3.7.16| +| [2543646](#2543646)
CM-26136 | In an ebtables rule, ERSPAN (upper case) does not work. You need to specify erspan (lower case). | 3.7.6-3.7.16, 4.0.0-4.4.5 | | +| [2543401](#2543401)
CM-25986 | On the Mellanox Spectrum-2 switch, the time required to establish a link (from the time a link is set to admin up until the link becomes operationally up) can take up to 15 seconds on 40G interfaces and up to 30 seconds on 100G interfaces.
To work around this issue, wait up to 15 seconds on 40G interfaces and 30 seconds on 100G interfaces for the link to establish. | 4.0.0-4.4.5 | | +| [2543211](#2543211)
CM-25890 | In some cases, the switchd service might warn of excessive MAC moves from one switch port to itself (for example, from swp18 to swp18).
| 3.7.0-3.7.16, 4.0.0-4.4.5 | | +| [2543164](#2543164)
CM-25859 | The MTU of an SVI cannot be higher than the MTU on the bridge. Changing the MTU on the SVI with NCLU does not update the bridge MTU. The net commit command succeeds even though the MTU is not changed as expected.
To work around this issue, change the MTU on all SVIs and the bridge manually in the /etc/network/interfaces file, then apply the change with the ifreload -a command. | 3.7.7-3.7.16, 4.0.0-4.4.5 | | +| [2543096](#2543096)
CM-25815 | When an SVI with a virtual MAC is configured with a layer 2 VNI in an EVPN environment, if you replace the /etc/network/interfaces file with a different file that does not have the SVI and layer 2 VNI configuration, the original virtual MAC is not populated through the EVPN route until FRR is restarted.
| 3.7.6-3.7.16, 4.0.0-4.4.5 | | +| [2542945](#2542945)
CM-25740 | On the Broadcom Maverick switch with a QinQ configuration, the packets coming into the CPU might be tagged incorrectly; for example, 802.1ad + 802.1q tags are expected in the packets but the packets have 802.1q + 802.1q tags.
To work around this issue, configure the bridge with bridge-vlan-protocol 802.1ad:

cumulus@switch:~$ net add bridge mybridge vlan-protocol 802.1ad
| 3.7.6-3.7.16, 4.0.0-4.4.5 | | +| [2542837](#2542837)
CM-25674 | On Mellanox switches, policer iptables are not working as expected. For example, when using a policer with mode KB/MB/GB to rate-limit interfaces, the syntax is accepted but the data plane transfer speed is not affected by the rule. | 3.7.6-3.7.8, 4.0.0-4.4.5 | 3.7.9-3.7.16| +| [2542305](#2542305)
CM-25400 | If an SVI exists in the configuration before you assign it an IP address, when you do assign the IP address with the NCLU command, the vlan-id and the raw-device bridge stanzas are not added automatically.
| 3.7.6-3.7.16, 4.0.0-4.4.5 | | +| [2542301](#2542301)
CM-25397 | When first creating a bond and enslaving an interface, NCLU hides some of the bridge command suggestions, although they are still accepted.
| 3.7.3-3.7.16, 4.0.0-4.4.5 | | +| [2541212](#2541212)
CM-24894 | The maximum-prefix configuration under the IPv4 address family has an optional restart value, which you can configure. This configuration is ignored and, instead of restarting the sessions every x minutes, the peer constantly changes between established and idle due to the prefix count being exceeded. | 3.7.5-3.7.16, 4.0.0-4.4.5 | | +| [2541029](#2541029)
CM-24799 | On switches with the Trident2 ASIC, 802.1Q-encapsulated control plane traffic received on an interface with 802.1AD configured subinterfaces might be dropped.
This issue only affects QinQ configurations.
| 3.7.5-3.7.16, 4.0.0-4.4.5 | | +| [2540753](#2540753)
CM-24618 | If the interface alias contains a single or double quotation mark, or an apostrophe, the net show configuration commands fail with the following error:
 
ERROR: No closing quotation
See /var/log/netd.log for more details.

| 3.7.5-3.7.16, 4.0.0-4.4.5 | | +| [2540444](#2540444)
CM-24473 | SNMP incorrectly requires engine ID specification.
| 3.7.4-3.7.16, 4.0.0-4.4.5 | | +| [2540352](#2540352)
CM-24435 | When you use NCLU to configure a route map, the parser allows for glob matching of interfaces for a _match interface_ condition when there can only be a single interface matched. The proper syntax is to use multiple route map clauses, each matching a single interface, instead of a single clause matching multiple interfaces.
For example, this command is incorrect:
 
net add routing route-map Proxy-ARP permit 25 match interface swp9-10

These commands are correct:
 
net add routing route-map Proxy-ARP permit 25 match interface swp9
net add routing route-map Proxy-ARP permit 30 match interface swp10

| 3.7.2-3.7.16, 4.0.0-4.4.5 | | +| [2540340](#2540340)
CM-24426 | NCLU allows for the configuration of addresses on VRF interfaces, but tab completion for the net add vrf command just displays . For example:
 
cumulus@switch:~$ net add vrf mgmt


Tab completion for the net add vrf ip address
command works correctly. | 3.7.4-3.7.16, 4.0.0-4.4.5 | | +| [2540274](#2540274)
CM-24379 | On the Maverick switch, CPU forwarded packets might be dropped when there is no route to a leaked host route. | 3.7.5-3.7.16, 4.0.0-4.4.5 | | +| [2540204](#2540204)
CM-24350 | When links come up after FRR is started, VRF connected routes do not get redistributed. | 3.7.4-3.7.16, 4.0.0-4.4.5 | | +| [2540192](#2540192)
CM-24343 | The net del bridge bridge mcsnoop yes command does not return the value to the default of disabled.
To work around this issue, use the net add bridge bridge mcsnoop no command to delete the mcsnoop attribute and return to the default value. | 3.7.4-3.7.16, 4.0.0-4.4.5 | | +| [2540155](#2540155)
CM-24332 | On the Broadcom switch, when moving configuration from bridged to routed (or toggling from routed to bridged to routed), some traffic is not seen by the kernel. This can cause BGP to not establish on a transit node.
| 3.7.3-3.7.16, 4.0.0-4.4.5 | | +| [2540042](#2540042)
CM-24272 | When you try to configure the VRRP priority and advertisement-interval with NCLU on a traditional mode bridge, the net commit command fails.
To work around this issue, use the vtysh command (inside FRR) to change the VRRP priority or advertisement-interval on traditional bridges. For example:
 
cumulus@switch:~$ sudo vtysh
switch# configure terminal
switch(config)# interface br0.100
switch(config-if)# vrrp 1 priority 110
switch(config-if)# vrrp 1 advertisement-interval
switch(config-if)# end
switch# write memory
switch# exit
cumulus@switch:~

| 3.7.4-3.7.16, 4.0.0-4.4.5 | | +| [2540041](#2540041)
CM-24271 | On SVIs in a VLAN-aware bridge, you cannot change the VRRP priority with NCLU.
To work around this issue, run the vtysh command inside FRR to change the default priority. For example:
 
cumulus@switch:~$ sudo vtysh
switch# configure terminal
switch(config)# interface vlan100
switch(config-if)# vrrp 1 priority 110
switch(config-if)# end
switch# write memory
switch# exit
cumulus@switch:~

| 3.7.4-3.7.16, 4.0.0-4.4.5 | | +| [2540040](#2540040)
CM-24270 | Cumulus Linux uses VRRPv3 as the default version, and enables both preempt and accept mode by default. You cannot change these default values with NCLU. To work around this issue, run the vtysh commands (inside FRR) to change the default values. For example:
 
cumulus@switch:~$ sudo vtysh
switch# configure terminal
switch(config)# interface swp4
switch(config-if)# vrrp 1 version 2
switch(config-if)# no vrrp 1 preempt
switch(config-if)# end
switch# write memory
switch# exit
cumulus@switch:~

| 3.7.4-3.7.16, 4.0.0-4.4.5 | | +| [2540031](#2540031)
CM-24262 | NCLU does not honor auto all in the /etc/network/interfaces file and removes the existing configuration if no individual auto lines exist.
| 3.7.3-3.7.16, 4.0.0-4.4.5 | | +| [2539994](#2539994)
CM-24241 | When you try to remove a BGP peer group configuration with NCLU, the command fails but no warning message is shown. For example:
 
cumulus@switch:~$ net del bgp neighbor fabric peer-group
'router bgp 65001' configuration does not have 'neighbor fabric peer-group'

| 3.7.2-3.7.16, 4.0.0-4.4.5 | | +| [2539962](#2539962)
CM-24222 | When an LDAP user that does not have NCLU privileges (either in the netshow or netedit group, or in the /etc/netd.conf file) runs an NCLU command, a traceback occurs instead of a permissions error.
| 3.7.0-3.7.16, 4.0.0-4.4.5 | | +| [2539670](#2539670)
CM-24035 | On the Edgecore 4610-54P switch, automatic medium-dependent interface crossover (auto-MDIX) stops working on a 100M full duplex interface and does not detect the required cable connection type.
| 3.7.2-3.7.16, 4.0.0-4.4.5 | | +| [2539124](#2539124)
CM-23825 | The net add interface ptm-enable command adds no ptm-enable for that interface in the frr.conf file.
Running the net add or the net del command does not remove no ptm-enable from the frr.conf file. You have to remove it manually using vtysh.
| 3.7.2-3.7.16, 4.0.0-4.4.5 | | +| [2538790](#2538790)
CM-23665 | NCLU automatically adds the VLAN ID (for the layer 3 VNI/SVI) to the bridge when you run net add vxlan bridge access . This configuration breaks network connectivity in an EVPN symmetric routing configuration using MLAG.
To restore connectivity, remove the VLAN ID from the bridge. | 3.7.2-3.7.16, 4.0.0-4.4.5 | | +| [2538590](#2538590)
CM-23584 | When you configure a control plane ACL to define permit and deny rules destined to the local switch, NCLU programs the control plane ACL rules into the FORWARD chain.
| 3.7.2-3.7.16, 4.0.0-4.4.5 | | +| [2538562](#2538562)
CM-23570 | On an RMP/1G-T switch, when you remove link-speed 100 with the NCLU command or by editing the etc/network/interfaces file to revert the 100M interface to the default (1G auto), the interface fails to recover and does not come back up.
After you remove the link-speed, ethtool shows the advertised link modes as not reported and Speed/Duplex as unknown.
To work around this issue and bring the interface back up, either restart switchd or use ethtool to configure the speed, advertised, duplex or MDI-X settings.
Note: The advertised link mode gets set incorrectly if you include 1000baseT/Half. The port will come up successfully at 1G. | 3.7.2-3.7.16, 4.0.0-4.4.5 | | +| [2538294](#2538294)
CM-23417 | If you use NCLU to create an iBGP peering across the peer link, running the net add bgp l2vpn evpn neighbor peerlink.4094 activate command creates a new eBGP neighborship when one has already been configured for iBGP. This is unexpected; the existing iBGP configuration is valid. | 3.7.0-3.7.16, 4.0.0-4.4.5 | | +| [2537699](#2537699)
CM-23075 | There is a limitation on the number of SVI interfaces you can specify as DHCP relay interfaces in the /etc/default/isc-dhcp-relay file. For example, 1500 SVI interfaces causes the dhcrelay service to exit without a core file and logs similar to the following are generated for the interfaces:
 
2018-11-10T23:35:30.992370-08:00 Dev dhcrelay: Listening on LPF/vlan.101/a0:00:00:00:00:51
2018-11-10T23:35:30.993472-08:00 Dev dhcrelay: Sending on LPF/vlan.101/a0:00:00:00:00:51

Eventually the dhcrelay service stops.
| 3.7.1-3.7.16, 4.0.0-4.4.5 | | +| [2537544](#2537544)
CM-23021 | When you run the mstpctl command, you might see the bridge-port state as blocking when it is actually disabled. You might see the same incorrect bridge-port state when other programs or tools use the output of mstpctl; for example, SNMP output from the BRIDGE-MIB. | 3.7.1-3.7.16, 4.0.0-4.4.5 | | +| [2536576](#2536576)
CM-22554 | If you try to bring down several members of a bond remotely at the same time, the link state of one of the interfaces might not transition correctly to the down state; however, all links show down in hardware.
| 4.0.0-4.4.5 | | +| [2536384](#2536384)
CM-22386 | The BFD packet redirection logic used by OVSDB server high availability mode redirects BUM packets across the peer link. The iptables rule for redirection does differentiate between BFD and non-BFD VXLAN inner packets because the service node sends all frames with its own IP address as the tunnel source IP address. The VXLAN encapsulated BUM packets do not get forwarded to the CPU and do not go through the iptable redirection rule; only VXLAN encapsulated BFD packets get forwarded to the CPU due to the inner MAC DA lookup in hardware.
| 3.7.0-3.7.16, 4.0.0-4.4.5 | | +| [2536256](#2536256)
CM-22301 | For an unresolved address, the IPROUTER default policer rule has been modified to _not_ match on packets exiting a TUNNEL and headed to the CPU to resolve the address via ARP. As a result, the following default rule no longer matches TUNNEL ingress packets.
 
A $INGRESS_CHAIN --in-interface $INGRESS_INTF -m addrtype --dst-type
IPROUTER -j POLICE --set-mode pkt --set-rate 400 --set-burst 100

These packets are now policed by catch all rules.
To work around this issue, the VPORT value on a TRIDENT switch must be changed from binary 011 to 100.
| 4.0.0-4.4.5 | | +| [2536242](#2536242)
CM-22287 | On the EdgeCore AS7712 (Tomahawk) switch running in atomic mode, when a layer 3 ECMP path is brought down, traffic traversing the path stops working for about four seconds. When the switch is changed to non-atomic mode, the delay is less than one second. This issue is seen across OSPF and static ECMP routes. | 4.0.0-4.4.5 | | +| [2536179](#2536179)
CM-22228 | On switches with the Trident 2+ ASIC, counters associated with VLANs and VRFs are not working. | 3.7.0-3.7.16, 4.0.0-4.4.5 | | +| [2535986](#2535986)
CM-22041 | At a high CPU transmit traffic rate (for example, if there is unexpected CPU generated flooding or replication in software), when the ASIC packet driver cannot keep up with the transmit rate because there are no free DMA buffers, it can back pressure by suspending the switch port transmit queues. This can fill up the application socket buffers resulting in No buffer space available error messages on protocol sockets.
When the driver recovers, it automatically resumes the transmit queues. In most cases these error messages are transient. In rare cases, the hardware queues might get stuck, which you can recover with a switchd restart. | 3.7.0-3.7.16, 4.0.0-4.4.5 | | +| [2535965](#2535965)
CM-22020 | On the Trident3 switch, static PIM with IIF based on a layer 2 bridge does not work reliably. PIM Join via signaling is required for IPMC to work properly.
To work around this issue, use dynamic signaling (joins) to manage IP multicast traffic. | 3.7.0-3.7.16, 4.0.0-4.4.5 | | +| [2535723](#2535723)
CM-21785 | The source address of the ICMPv6 time exceeded message (traceroute hop) is sourced from the wrong VRF when the traceroute target resides on the same switch but in a different VRF. | 4.0.0-4.4.5 | | +| [2535605](#2535605)
CM-21667 | FRR does not add BGP ttl-security to either the running configuration or to the /etc/frr/frr.conf file when configured on a peer group instead of a specific neighbor.
To work around this issue, add ttl-security to individual neighbors instead of the peer group. | 4.0.0-4.4.5 | | +| [2535209](#2535209)
CM-21278 | The net show lldp command sometimes shows the port description in the Remote Port field. The net show interface command shows the correct value in the Remote Host field.
To work around this issue, use net show interface command for LLDP output when connected to Cisco equipment. | 3.7.5-3.7.10, 4.0.0-4.4.5 | 3.7.11-3.7.16| +| [2534734](#2534734)
CM-20813 | Span rules matching the out-interface as a bond do not mirror packets. | 4.0.0-4.4.5 | | +| [2533691](#2533691)
CM-19788 | If you configure a VLAN under a VLAN-aware bridge and create a subinterface of the same VLAN on one of the bridge ports, the bridge and interface compete for the same VLAN and if the interface is flapped, it stops working. Correcting the configuration and running the ifreload command does not resolve the conflict.
To work around this issue, correct the bridge VIDs and restart switchd or delete the subinterface. | 3.7.12-3.7.16, 4.0.0-4.4.5 | | +| [2533625](#2533625)
CM-19724 | PIM and MSDP entries are set to the internal COS value of 6 so they are grouped together with the bulk traffic priority group in the default traffic.conf file. However, PIM, IGMP, and MSDP are considered control-plane and should be set to the internal COS value of 7. | 4.0.0-4.4.5 | | +| [2533337](#2533337)
CM-19454 | When you use NCLU to bring a bond admin down (net add bond link down), the bond interface goes into admin down state but the switch ports enslaved to the bond remain UP. If you are using bond-lacp-bypass-allow or balance-xor mode, the host might continue to send traffic. This traffic will be dropped because although the bond slaves are UP, they are not members of the bridge.
To work around this issue, use the sudo ifdown command. | 4.0.0-4.4.5 | | +| [2531273](#2531273)
CM-17494 | In certain cases, a peer device sends an ARP request from a source IP address that is not on the connected subnet and the switch creates a STALE neighbor entry. Eventually, the switch attempts to keep the entry fresh and sends ARP requests to the host. If the host responds, the switch has REACHABLE neighbor entries for hosts that are not on the connected subnet.
To work around this issue, change the value of arp_ignore to 2. See [Address Resolution Protocol in the Cumulus Linux user guide\|https://docs.cumulusnetworks.com/cumulus-linux/Layer-3/Address-Resolution-Protocol-ARP/] for more information. | 4.0.0-4.4.5 | | + +### Fixed Issues in 4.3.2 +| Issue ID | Description | Affects | +|--- |--- |--- | +| [3647731](#3647731)
None | CVE-2023-38408: The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009
Mitigation: Do not use ssh-agent forwarding (the man page for ssh_config says that "agent forwarding should be enabled with caution"), or start the ssh-agent program with the -P option to allow only specific PKCS#11 libraries (or none with -P '')
For Cumulus Linux 4.3.2, the /usr/bin/ssh-agent program has all permissions turned off (chmod 0) to prevent its execution if a vulnerable version is detected. | 4.0.0-4.3.1, 5.0.0-5.6.0 | | +| [3544701](#3544701)
None | If BGP remote-as is set to an integer and you try to configure the local-as for a BGP instance, you see the following error:
% AS specified for local as is the same as the remote as and this is not allowed
This configuration is not allowed; it is considered to be eBGP and local preference is not advertised. | 5.0.0-5.5.1 | | +| [3534654](#3534654)
| On a Broadcom switch, Q-in-Q VLAN operations do not clear when you remove a bridge port from a VXLAN-enabled bridge. This can result in unexpected double tagged packets if the outer VLAN is still used on the bridge. To work around this issue, restart switchd after you modify or remove double tagged bridge ports from a VXLAN-enabled bridge. | 4.3.1 | | +| [3486888](#3486888)
None | If FRR learns a layer 2 entry against a VNI and you reconfigure the VNI later as a layer 3 VNI, the original layer 2 entry does not clear and remains in the forwarding database. | 4.3.0-4.3.1 | | +| [3479967](#3479967)
| When you remove VRF configuration, the systemctl reload frr.service command returns a non zero exit code after erroneously running the invalid command no exit-vrf. | 4.3.1 | | +| [3455998](#3455998)
| When you poll the BGP unnumbered MIB object 1.3.6.1.4.1.40310.4 after uncommenting the bgpun_pp.py pass persist script in the /etc/snmpd/snmpd.conf file, BGP session information is not retrieved. To work around this issue, add executable permissions to the script with the sudo chmod +x /usr/share/snmp/bgpun_pp.py command. | 4.3.1 | | +| [3448171](#3448171)
| If a default route is withdrawn from the routing table and then learned again, traffic matching this entry will be software (cpu) forwarded.  This will cause intermittent drops due to the CPU the rate-limiter
This only impacts the default VRF and a default route learned dynamically
In order to recover from this condition: 1. Restart switchd.service (sudo systemctl restart switchd.service)OR 2. Reboot the switch (sudo reboot) | 4.3.1 | | +| [3434315](#3434315)
| IPv6 BGP sessions in a VRF do not be establish with MD5 authentication. | 4.3.0-4.3.1 | | +| [3419962](#3419962)
| On a Broadcom switch, if you remove a double-tagged interface from a bridge that contains other double-tagged interfaces built on the same physical port (for example, you remove swp1.10.100 when swp1.10.200 is also a bridge port), traffic forwarding within the bridge might fail and you see critical warnings in the /var/log/switchd.log file similar to the following:
switchd[8587]: hal_bcm.c:2207 CRIT knet_vlan_translate_delete(update): port 1 ext_vlan 10.100 int_vlan 2132: -11
| 4.3.1 | | +| [3419953](#3419953)
| If you remove a double tagged bridge port from a bridge when a different interface exists with the same port and virtual ID, you might see a segmentation fault and a switchd crash due to incorrect initialization when Cumulus Linux creates the second double-tagged interface. To work around this issue, make sure you remove the double-tagged interfaces from the bridge in the /etc/network/interfaces file. | 4.3.1 | | +| [3413826](#3413826)
None | During upgrade, when one MLAG node is upgraded and the other MLAG node is not yet upgraded, permanent neighbors cannot synchronize between MLAG nodes. The clagctl dumppermanentneighs command only shows local neighbors. | 5.0.0-5.4.0 | | +| [3410952](#3410952)
None | If MLAG is configured but disconnected from an MLAG peer for an extended period of time (days or more), there is a long delay (up to a minute per day) before traffic forwarding stabilizes after the MLAG peer connection re-establishes. | 3.7.0-4.3.1 | | +| [3401121](#3401121)
| sFlow is not able to sample packets in the egress direction. To work around this issue, add the following to the hsflowd.conf file to enable egress sampling:
samplingDirection=outpsample { group=1 }
| 4.3.0-4.3.1 | | +| [3376798](#3376798)
| On Broadcom switches, Cumulus Linux does not create the hardware bridging domain for a traditional bridge with a VXLAN interface during switchd restart. The /var/log/switchd.log file includes the following exception logs shortly after switchd restarts:
switchd[30158]: hal_bcm_l3.c:1617 find_egr_path_if_vxlan_overlay:vxlan overlay : nh PORT: port <#>, vlan . not yet ready
MAC learning looks correct, but traffic does not flow as expected. | 3.7.0-4.3.1 | | +| [3366612](#3366612)
| The base version of the Linux kernel is updated to the v4.19.273 stable release, which includes fixes for several CVE issues. | 4.3.1 | | +| [3364996](#3364996)
| Under certain conditions, BGP can allow a combination of EVPN and non-EVPN paths to be put into a multipath group together. This results in erroneous programming of EVPN symmetric next hops and RMACs, which can result in momentary traffic drops. | 4.3.0-4.3.1 | | +| [3336590](#3336590)
None | On the Trident 2+ and Trident 3 switch when using VXLAN layer 2 VPNs and sending tunneled traffic where the inner IP header has a TTL of 1, the egress VTEP incorrectly forwards this traffic through the software path instead of the hardware data plane. This traffic is rate-limited to 100pps by default. To work around this issue, ensure that the traffic traversing the layer 2 tunnel has an inner IP header TTL value that is more than 1. If this workaround is not possible, contact Nvidia Support to determine other options. | 4.3.0-4.3.1 | | +| [3334036](#3334036)
None | When you configure or unconfigure a BGP peer and interface towards a host, memory corruption can cause BGP to crash. | 4.3.0-4.3.1 | | +| [3334031](#3334031)
None | When you configure or unconfigure a BGP peer and interface towards a host, memory corruption can cause BGP to crash. | 4.3.0-4.3.1 | | +| [3319919](#3319919)
None | Currently, the default core dump size limit on Cumulus Linux is 256M but the SDK generates core dumps around 800M. To avoid incomplete core files, you can increase the core dump size limit. | 4.2.1-4.3.1, 4.4.0-5.3.1 | | +| [3288385](#3288385)
| On the EdgeCore AS7326-56X and AS7726-32X switch, the fan speed reports a minimum threshold in the logs. | 4.3.1 | | +| [3288343](#3288343)
None | When you reboot a Broadcom switch with a static default route configured, the route might be installed in hardware without a next hop. This results in forwarded traffic to the CPU and drops. To recover from this issue, remove the default route configuration and reapply it. To prevent this issue, before rebooting the switch, split the default route configuration into two routes as below:
ip route 0.0.0.0/1 10.1.1.1ip route 128.0.0.0/1 10.1.1.1
| 4.3.1 | | +| [3269538](#3269538)
None | The cl-ecmpcalc command prints the following error when the egress interface is a bond or SVI:
ecmpcalc: will query hardwareTraceback (most recent call last):File “/usr/cumulus/bin/cl-ecmpcalc”, line 986, inisTrunkMbr, port = ecmp.getHdPort(hd_cmd)File “/usr/cumulus/bin/cl-ecmpcalc”, line 618, in getHdPortport = int(str4)ValueError: invalid literal for int() with base 10: ‘0t
| 4.3.0-4.3.1 | | +| [3267353](#3267353)
| In a QinQ configuration, if the VLAN priority is a non-zero value, double-tagged packets are translated to triple-tagged packets. | 4.3.1 | | +| [3244739](#3244739)
None | If you have a lot of inbound route maps that match lists with many regex statements, a large number of updates from the peer can cause the system to run out of memory. To work around this issue, reduce the number of regex matches in inbound route maps. | 4.4.0-5.2.1 | | +| [3236349](#3236349)
None | Using ARP suppression with a very large number of interfaces might result in missing ARP entries on the local device or buffer underrun warnings in the neighmgrd log. | 4.3.0-4.3.1 | | +| [3235956](#3235956)
| With certain triggers on Broadcom switches, such as adding or deleting a VNI or reloading the network, Cumulus Linux might consider the underlay routes as overlay routes. In this case, switchd allocates the overlay next hop, which is incorrect and might affect traffic forwarding. | 4.3.0-4.3.1 | | +| [3234031](#3234031)
None | If BGP neighbor allowas-in is set, negating with no no neighbor allowas-in does not disable the setting. To work around this issue and disable the setting, restart the FRR service. | 4.2.1-4.3.1 | | +| [3191517](#3191517)
None | When the switch receives an LLDP frame from a Cisco router right after a ptmd restart, the ptmd service crashes. | 4.3.0-4.3.1, 4.4.0-5.2.1 | | +| [2555175](#2555175)
CM-32528 | Control plane traffic (such as BGP peering from leaf to spine) goes down on the leaf due to the peer Hold Down timer expiration following prolonged link flaps on down links when VXLAN enabled VLANs are carried on the flapping link. Be sure to correct layer 1 issues, configuration issues, or misbehaving link partners that are causing the link flaps. | 3.7.15-4.3.1 | | + ## 4.3.1 Release Notes ### Open Issues in 4.3.1 | Issue ID | Description | Affects | Fixed | |--- |--- |--- |--- | -| [3647731](#3647731)
None | CVE-2023-38408: The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009
Mitigation: Do not use ssh-agent forwarding (the man page for ssh_config says that "agent forwarding should be enabled with caution"), or start the ssh-agent program with the -P option to allow only specific PKCS#11 libraries (or none with -P '')
For Cumulus Linux 4.3.2, the /usr/bin/ssh-agent program has all permissions turned off (chmod 0) to prevent its execution if a vulnerable version is detected. | 4.0.0-4.4.5, 5.0.0-5.6.0 | | +| [3647731](#3647731)
None | CVE-2023-38408: The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009
Mitigation: Do not use ssh-agent forwarding (the man page for ssh_config says that "agent forwarding should be enabled with caution"), or start the ssh-agent program with the -P option to allow only specific PKCS#11 libraries (or none with -P '')
For Cumulus Linux 4.3.2, the /usr/bin/ssh-agent program has all permissions turned off (chmod 0) to prevent its execution if a vulnerable version is detected. | 4.0.0-4.3.1, 5.0.0-5.6.0 | 4.3.2-4.4.5| | [3647424](#3647424)
None | When you remove the update-source configuration for a BGP neighbor, the peering is reset if the neighbor is a member of a peer group with the same update-source configuration. | 4.3.0-4.4.5 | | -| [3534654](#3534654)
| On a Broadcom switch, Q-in-Q VLAN operations do not clear when you remove a bridge port from a VXLAN-enabled bridge. This can result in unexpected double tagged packets if the outer VLAN is still used on the bridge. To work around this issue, restart switchd after you modify or remove double tagged bridge ports from a VXLAN-enabled bridge. | 4.3.1-4.4.5 | | +| [3600912](#3600912)
| In an MLAG EVPN configuration, if host mobility occurs multiple times at high frequency, the host MAC might point to an incorrect VTEP; it might be local behind the VTEP. | 4.3.1-4.4.5 | | +| [3534654](#3534654)
| On a Broadcom switch, Q-in-Q VLAN operations do not clear when you remove a bridge port from a VXLAN-enabled bridge. This can result in unexpected double tagged packets if the outer VLAN is still used on the bridge. To work around this issue, restart switchd after you modify or remove double tagged bridge ports from a VXLAN-enabled bridge. | 4.3.1 | 4.3.2-4.4.5| | [3488136](#3488136)
| When zebra receives route updates that include both a route with a recursive next hop and the route used to resolve that next hop, zebra might mark the route with the recursive next hop as inactive. To work around this issue, reprocess the route updates by running the appropriate clear command for the protocol in use. For example, for BGP, clear inbound routes from the relevant neighbor using the nv action clear vrf router bgp neighbor address-family in command. | 4.2.1-5.5.1 | 5.6.0| -| [3486888](#3486888)
None | If FRR learns a layer 2 entry against a VNI and you reconfigure the VNI later as a layer 3 VNI, the original layer 2 entry does not clear and remains in the forwarding database. | 4.3.0-5.5.1 | 5.6.0| -| [3479967](#3479967)
| When you remove VRF configuration, the systemctl reload frr.service command returns a non zero exit code after erroneously running the invalid command no exit-vrf. | 4.3.1-4.4.5 | | +| [3486888](#3486888)
None | If FRR learns a layer 2 entry against a VNI and you reconfigure the VNI later as a layer 3 VNI, the original layer 2 entry does not clear and remains in the forwarding database. | 4.3.0-4.3.1 | 4.3.2-4.4.5, 5.6.0| +| [3479967](#3479967)
| When you remove VRF configuration, the systemctl reload frr.service command returns a non zero exit code after erroneously running the invalid command no exit-vrf. | 4.3.1 | 4.3.2-4.4.5| | [3474391](#3474391)
| The SNMP MIB definition file /usr/share/snmp/mibs/Cumulus-BGPVRF-MIB.txt does not define the INDEX of the bgpPeerEntry correctly. This issue does not impact SNMP functionality for this MIB. | 4.3.1-5.5.1 | 5.6.0| -| [3455998](#3455998)
| When you poll the BGP unnumbered MIB object 1.3.6.1.4.1.40310.4 after uncommenting the bgpun_pp.py pass persist script in the /etc/snmpd/snmpd.conf file, BGP session information is not retrieved. To work around this issue, add executable permissions to the script with the sudo chmod +x /usr/share/snmp/bgpun_pp.py command. | 4.3.1-4.4.5 | | -| [3448171](#3448171)
| If a default route is withdrawn from the routing table and then learned again, traffic matching this entry will be software (cpu) forwarded.  This will cause intermittent drops due to the CPU the rate-limiter
This only impacts the default VRF and a default route learned dynamically
In order to recover from this condition: 1. Restart switchd.service (sudo systemctl restart switchd.service)OR 2. Reboot the switch (sudo reboot) | 4.3.1-4.4.5 | | -| [3434315](#3434315)
| IPv6 BGP sessions in a VRF do not be establish with MD5 authentication. | 4.3.0-4.4.5 | | +| [3455998](#3455998)
| When you poll the BGP unnumbered MIB object 1.3.6.1.4.1.40310.4 after uncommenting the bgpun_pp.py pass persist script in the /etc/snmpd/snmpd.conf file, BGP session information is not retrieved. To work around this issue, add executable permissions to the script with the sudo chmod +x /usr/share/snmp/bgpun_pp.py command. | 4.3.1 | 4.3.2-4.4.5| +| [3448171](#3448171)
| If a default route is withdrawn from the routing table and then learned again, traffic matching this entry will be software (cpu) forwarded.  This will cause intermittent drops due to the CPU the rate-limiter
This only impacts the default VRF and a default route learned dynamically
In order to recover from this condition: 1. Restart switchd.service (sudo systemctl restart switchd.service)OR 2. Reboot the switch (sudo reboot) | 4.3.1 | 4.3.2-4.4.5| +| [3434315](#3434315)
| IPv6 BGP sessions in a VRF do not be establish with MD5 authentication. | 4.3.0-4.3.1 | 4.3.2-4.4.5| | [3429530](#3429530)
| On the Spectrum-2 and Spectrum-3 switch, multiple interfaces (in the same PLL quarter) might flap intermittently at the same time. | 4.2.1-5.4.0 | 5.5.0-5.6.0| -| [3419962](#3419962)
| On a Broadcom switch, if you remove a double-tagged interface from a bridge that contains other double-tagged interfaces built on the same physical port (for example, you remove swp1.10.100 when swp1.10.200 is also a bridge port), traffic forwarding within the bridge might fail and you see critical warnings in the /var/log/switchd.log file similar to the following:
switchd[8587]: hal_bcm.c:2207 CRIT knet_vlan_translate_delete(update): port 1 ext_vlan 10.100 int_vlan 2132: -11
| 4.3.1-4.4.5 | | -| [3419953](#3419953)
| If you remove a double tagged bridge port from a bridge when a different interface exists with the same port and virtual ID, you might see a segmentation fault and a switchd crash due to incorrect initialization when Cumulus Linux creates the second double-tagged interface. To work around this issue, make sure you remove the double-tagged interfaces from the bridge in the /etc/network/interfaces file. | 4.3.1-4.4.5 | | +| [3419962](#3419962)
| On a Broadcom switch, if you remove a double-tagged interface from a bridge that contains other double-tagged interfaces built on the same physical port (for example, you remove swp1.10.100 when swp1.10.200 is also a bridge port), traffic forwarding within the bridge might fail and you see critical warnings in the /var/log/switchd.log file similar to the following:
switchd[8587]: hal_bcm.c:2207 CRIT knet_vlan_translate_delete(update): port 1 ext_vlan 10.100 int_vlan 2132: -11
| 4.3.1 | 4.3.2-4.4.5| +| [3419953](#3419953)
| If you remove a double tagged bridge port from a bridge when a different interface exists with the same port and virtual ID, you might see a segmentation fault and a switchd crash due to incorrect initialization when Cumulus Linux creates the second double-tagged interface. To work around this issue, make sure you remove the double-tagged interfaces from the bridge in the /etc/network/interfaces file. | 4.3.1 | 4.3.2-4.4.5| | [3410952](#3410952)
None | If MLAG is configured but disconnected from an MLAG peer for an extended period of time (days or more), there is a long delay (up to a minute per day) before traffic forwarding stabilizes after the MLAG peer connection re-establishes. | 3.7.0-5.4.0 | 5.5.0-5.6.0| -| [3401121](#3401121)
| sFlow is not able to sample packets in the egress direction. To work around this issue, add the following to the hsflowd.conf file to enable egress sampling:
samplingDirection=outpsample { group=1 }
| 4.3.0-4.4.5 | | -| [3376798](#3376798)
| On Broadcom switches, Cumulus Linux does not create the hardware bridging domain for a traditional bridge with a VXLAN interface during switchd restart. The /var/log/switchd.log file includes the following exception logs shortly after switchd restarts:
switchd[30158]: hal_bcm_l3.c:1617 find_egr_path_if_vxlan_overlay:vxlan overlay : nh PORT: port <#>, vlan . not yet ready
MAC learning looks correct, but traffic does not flow as expected. | 3.7.0-3.7.16, 4.3.1-4.4.5 | | -| [3366612](#3366612)
| The base version of the Linux kernel is updated to the v4.19.273 stable release, which includes fixes for several CVE issues. | 4.3.1-4.4.5 | | -| [3364996](#3364996)
| Under certain conditions, BGP can allow a combination of EVPN and non-EVPN paths to be put into a multipath group together. This results in erroneous programming of EVPN symmetric next hops and RMACs, which can result in momentary traffic drops. | 4.3.0-4.4.5 | | +| [3401121](#3401121)
| sFlow is not able to sample packets in the egress direction. To work around this issue, add the following to the hsflowd.conf file to enable egress sampling:
samplingDirection=outpsample { group=1 }
| 4.3.0-4.3.1 | 4.3.2-4.4.5| +| [3376798](#3376798)
| On Broadcom switches, Cumulus Linux does not create the hardware bridging domain for a traditional bridge with a VXLAN interface during switchd restart. The /var/log/switchd.log file includes the following exception logs shortly after switchd restarts:
switchd[30158]: hal_bcm_l3.c:1617 find_egr_path_if_vxlan_overlay:vxlan overlay : nh PORT: port <#>, vlan . not yet ready
MAC learning looks correct, but traffic does not flow as expected. | 3.7.0-4.3.1 | 4.3.2-4.4.5| +| [3366612](#3366612)
| The base version of the Linux kernel is updated to the v4.19.273 stable release, which includes fixes for several CVE issues. | 4.3.1 | 4.3.2-4.4.5| +| [3364996](#3364996)
| Under certain conditions, BGP can allow a combination of EVPN and non-EVPN paths to be put into a multipath group together. This results in erroneous programming of EVPN symmetric next hops and RMACs, which can result in momentary traffic drops. | 4.3.0-4.3.1 | 4.3.2-4.4.5| | [3336590](#3336590)
None | On the Trident 2+ and Trident 3 switch when using VXLAN layer 2 VPNs and sending tunneled traffic where the inner IP header has a TTL of 1, the egress VTEP incorrectly forwards this traffic through the software path instead of the hardware data plane. This traffic is rate-limited to 100pps by default. To work around this issue, ensure that the traffic traversing the layer 2 tunnel has an inner IP header TTL value that is more than 1. If this workaround is not possible, contact Nvidia Support to determine other options. | 4.3.0-4.4.5 | | -| [3334036](#3334036)
None | When you configure or unconfigure a BGP peer and interface towards a host, memory corruption can cause BGP to crash. | 4.3.0-5.3.1 | 5.4.0-5.6.0| -| [3334031](#3334031)
None | When you configure or unconfigure a BGP peer and interface towards a host, memory corruption can cause BGP to crash. | 4.3.0-4.4.5 | | +| [3334036](#3334036)
None | When you configure or unconfigure a BGP peer and interface towards a host, memory corruption can cause BGP to crash. | 4.3.0-4.3.1 | 4.3.2-4.4.5, 5.4.0-5.6.0| +| [3334031](#3334031)
None | When you configure or unconfigure a BGP peer and interface towards a host, memory corruption can cause BGP to crash. | 4.3.0-4.3.1 | 4.3.2-4.4.5| | [3330705](#3330705)
| When using TACACS+, a TACACS+ server name that returns more than one IP address, such as an IPv6 and IPv4 address, is counted many times against the limit of seven TACACS+ servers, which might cause some of the later listed servers to be ignored as over the limit. To work around this issue, you can set the prefer_ip_version configuration option (the default value is 4) to choose between an IPv4 or IPv6 address if both are present. | 3.7.0-5.3.1 | 5.4.0-5.6.0| | [3327477](#3327477)
| If you use su to change to a user specified through TACACS+, the user becomes the local tacacs0 thru tacacs15 user instead of the named user to run sudo commands. As a result, the named user password might not match the local tacacs0 thru tacacs15 user password. | 3.7.0-3.7.16, 4.0.0-4.4.5, 5.0.0-5.6.0 | | | [3321391](#3321391)
None | On the NVIDIA SN2410 switch, ports with optical transceivers show FAULT errors in the sensor command output. | 4.2.1-5.3.1 | 5.4.0-5.6.0| | [3319919](#3319919)
None | Currently, the default core dump size limit on Cumulus Linux is 256M but the SDK generates core dumps around 800M. To avoid incomplete core files, you can increase the core dump size limit. | 4.2.1-5.3.1 | 5.4.0-5.6.0| | [3291548](#3291548)
None | In EVPN deployments, a buffer lockup for split or pre-split ports can occur on Spectrum-2 and Spectrum-3 switches. As result, traffic coming in on these ports is dropped in the RX buffer. To work around this issue, restart switchd. | 4.2.1-4.4.5 | 5.0.0-5.6.0| -| [3288385](#3288385)
| On the EdgeCore AS7326-56X and AS7726-32X switch, the fan speed reports a minimum threshold in the logs. | 4.3.1-4.4.5 | | +| [3288385](#3288385)
| On the EdgeCore AS7326-56X and AS7726-32X switch, the fan speed reports a minimum threshold in the logs. | 4.3.1 | 4.3.2-4.4.5| | [3288343](#3288343)
None | When you reboot a Broadcom switch with a static default route configured, the route might be installed in hardware without a next hop. This results in forwarded traffic to the CPU and drops. To recover from this issue, remove the default route configuration and reapply it. To prevent this issue, before rebooting the switch, split the default route configuration into two routes as below:
ip route 0.0.0.0/1 10.1.1.1ip route 128.0.0.0/1 10.1.1.1
| 4.3.1-4.4.5 | | -| [3269538](#3269538)
None | The cl-ecmpcalc command prints the following error when the egress interface is a bond or SVI:
ecmpcalc: will query hardwareTraceback (most recent call last):File “/usr/cumulus/bin/cl-ecmpcalc”, line 986, inisTrunkMbr, port = ecmp.getHdPort(hd_cmd)File “/usr/cumulus/bin/cl-ecmpcalc”, line 618, in getHdPortport = int(str4)ValueError: invalid literal for int() with base 10: ‘0t
| 4.3.0-4.4.5 | | -| [3267353](#3267353)
| In a QinQ configuration, if the VLAN priority is a non-zero value, double-tagged packets are translated to triple-tagged packets. | 4.3.1-4.4.5 | | -| [3236349](#3236349)
None | Using ARP suppression with a very large number of interfaces might result in missing ARP entries on the local device or buffer underrun warnings in the neighmgrd log. | 4.3.0-4.4.5 | | -| [3235956](#3235956)
| With certain triggers on Broadcom switches, such as adding or deleting a VNI or reloading the network, Cumulus Linux might consider the underlay routes as overlay routes. In this case, switchd allocates the overlay next hop, which is incorrect and might affect traffic forwarding. | 4.3.0-4.4.5 | | -| [3234031](#3234031)
None | If BGP neighbor allowas-in is set, negating with no no neighbor allowas-in does not disable the setting. To work around this issue and disable the setting, restart the FRR service. | 4.2.1-5.2.1 | 5.3.0-5.6.0| +| [3269538](#3269538)
None | The cl-ecmpcalc command prints the following error when the egress interface is a bond or SVI:
ecmpcalc: will query hardwareTraceback (most recent call last):File “/usr/cumulus/bin/cl-ecmpcalc”, line 986, inisTrunkMbr, port = ecmp.getHdPort(hd_cmd)File “/usr/cumulus/bin/cl-ecmpcalc”, line 618, in getHdPortport = int(str4)ValueError: invalid literal for int() with base 10: ‘0t
| 4.3.0-4.3.1 | 4.3.2-4.4.5| +| [3267353](#3267353)
| In a QinQ configuration, if the VLAN priority is a non-zero value, double-tagged packets are translated to triple-tagged packets. | 4.3.1 | 4.3.2-4.4.5| +| [3236349](#3236349)
None | Using ARP suppression with a very large number of interfaces might result in missing ARP entries on the local device or buffer underrun warnings in the neighmgrd log. | 4.3.0-4.3.1 | 4.3.2-4.4.5| +| [3235956](#3235956)
| With certain triggers on Broadcom switches, such as adding or deleting a VNI or reloading the network, Cumulus Linux might consider the underlay routes as overlay routes. In this case, switchd allocates the overlay next hop, which is incorrect and might affect traffic forwarding. | 4.3.0-4.3.1 | 4.3.2-4.4.5| +| [3234031](#3234031)
None | If BGP neighbor allowas-in is set, negating with no no neighbor allowas-in does not disable the setting. To work around this issue and disable the setting, restart the FRR service. | 4.2.1-4.3.1 | 4.3.2-4.4.5, 5.3.0-5.6.0| | [3218207](#3218207)
None | Certain routes on tenant VRFs have missing next hop entries because the router MAC address is missing in the bridge forwarding database table that corresponds to the remote VTEP. As a result, traffic forwarding is affected for these routes. | 4.3.0-5.2.1 | 5.3.0-5.6.0| | [3216922](#3216922)
None | RADIUS authenticated users with read-only access to NCLU commands (users in the users_with_show list) can run edit commands if a username for a non-local account is on the users_with_edit line of the /etc/netd.conf file. To work around this issue, make sure that all usernames on the users_with_edit line of the /etc/netd.conf file are configured local users for the system (real Linux users). | 3.7.0-5.2.1 | 5.3.0-5.6.0| | [3216921](#3216921)
None | RADIUS authenticated users with read-only access to NCLU commands (users in the users_with_show list) can run edit commands if a username for a non-local account is on the users_with_edit line of the /etc/netd.conf file. To work around this issue, make sure that all usernames on the users_with_edit line of the /etc/netd.conf file are configured local users for the system (real Linux users)
| 3.7.0-3.7.16, 4.3.0-4.4.5 | | @@ -75,11 +377,11 @@ pdfhidden: True | [2940051](#2940051)
| In an MLAG configuration with traditional bridges, MAC addresses are seen over peer link during ifreload when adding new VLANS or bridges. | 3.7.14.2-3.7.15, 4.3.0-4.4.5 | 3.7.16, 5.0.0-5.6.0| | [2902013](#2902013)
| The NCLU commit command adds a five second delay. | 4.2.1-4.4.5 | | | [2896450](#2896450)
CM-31978 | On the Dell N3248PXE switch, fixed RJ45 interfaces with PoE neighbors can end up in Paused mode after a switchd restart, which blocks traffic on that interface. To work around this issue, restart switchd a second or third time until all interfaces are functioning correctly, or reboot the switch. | 4.3.0-4.4.5 | | -| [2893895](#2893895)
CM-33315 | CVE-2020-35498: A vulnerability was found in openvswitch. A limitation in the implementation of userspace packet parsing can allow a malicious user to send a specially crafted packet causing the resulting megaflow in the kernel to be too wide, potentially causing a denial of service. The highest threat from this vulnerability is to system availability
Vulnerable: <= 2.8.90-1-cl4u5Fixed: 2.8.90-1-cl4u6, 2.8.90-1-cl4.4.0u1, 2.8.90-1-cl5.0.0u8 | 4.0.0-4.3.1 | 4.4.0-4.4.5, 5.1.0-5.6.0| +| [2893895](#2893895)
CM-33315 | CVE-2020-35498: A vulnerability was found in openvswitch. A limitation in the implementation of userspace packet parsing can allow a malicious user to send a specially crafted packet causing the resulting megaflow in the kernel to be too wide, potentially causing a denial of service. The highest threat from this vulnerability is to system availability
Vulnerable: <= 2.8.90-1-cl4u5Fixed: 2.8.90-1-cl4u6, 2.8.90-1-cl4.4.0u1, 2.8.90-1-cl5.0.0u8 | 4.0.0-4.3.2 | 4.4.0-4.4.5, 5.1.0-5.6.0| | [2891255](#2891255)
| CVE-2021-39925: Buffer overflow in the Bluetooth SDP dissector in Wireshark 3.4.0 to 3.4.9 and 3.2.0 to 3.2.17 allows denial of service via packet injection or crafted capture file
Vulnerable: <= 2.6.20-0+deb10u1Fixed: 2.6.20-0+deb10u2 | 4.0.0-4.4.1, 5.0.0-5.6.0 | 4.4.2-4.4.5| | [2890681](#2890681)
| CVE-2021-42771: relative path traversal in Babel, a set of tools for internationalising Python applications, could result in the execution of arbitrary code
Vulnerable: 2.6.0+dfsg.1-1Fixed: 2.6.0+dfsg.1-1+deb10u1 | 4.0.0-4.4.1, 5.0.0-5.6.0 | 4.4.2-4.4.5| | [2866080](#2866080)
| On the Maverick S4148T switch with MLAG, Cumulus Linux drops LACP, ARP, LLDP and BGP traffic. | 4.3.0-4.4.5 | | -| [2854787](#2854787)
| An unexpected software system shutdown can occur due to a thermal zones issue in the hw-management package. The following message might appear in /var/log/syslog before the shutdown:
thermal thermal_zoneX: critical temperature reached (33 C), shutting down
| 4.3.0-4.3.1 | 4.4.0-4.4.5, 5.1.0-5.6.0| +| [2854787](#2854787)
| An unexpected software system shutdown can occur due to a thermal zones issue in the hw-management package. The following message might appear in /var/log/syslog before the shutdown:
thermal thermal_zoneX: critical temperature reached (33 C), shutting down
| 4.3.0-4.3.2 | 4.4.0-4.4.5, 5.1.0-5.6.0| | [2854784](#2854784)
| After building VLAN or VXLAN interfaces, MLAG becomes unstable. | 4.3.0-4.4.1 | 4.4.2-4.4.5, 5.0.0-5.6.0| | [2845531](#2845531)
| If you update the MAC address of an SVI when the SVI is in a protodown state (for example, when no bridge ports that carry this VNI are operationally up or if the MAC address of the SVI's parent bridge changes), clagd does not notice the change. The MLAG peer incorrectly maintains a PERMANENT neighbor entry for the SVI IP that points to the old MAC address. | 4.2.1-4.4.5 | 5.0.0-5.6.0| | [2838905](#2838905)
| On Broadcom ARM switches, the NTP clock slowly drifts to a very high offset (over 500ms) and the clock is not able to synchronize. To work around this issue, use the chrony implementation of NTP instead of ntpd. chrony synchronizes the system clock faster and with better accuracy
Instructions for using chrony are here : https://docs.nvidia.com/networking-ethernet-software/knowledge-base/Network-Solutions/Chrony-on-Cumulus-Linux/ | 4.3.0-4.4.5 | | @@ -92,6 +394,7 @@ pdfhidden: True | [2782033](#2782033)
| The following vulnerabilities have been announced in the openssl packages:CVE-2021-3711: buffer overflow vulnerability in SM2 decryption
CVE-2021-3712: buffer overrun when processing ASN.1 strings in the X509_aux_print() function
More details at https://www.openssl.org/news/secadv/20210824.txt
Vulnerable: <= 1.1.1d-0+deb10u6Fixed: 1.1.1d-0+deb10u7 | 4.0.0-4.4.1 | 4.4.2-4.4.5| | [2781537](#2781537)
| In Cumulus VX, the iptables FORWARD chain does not count hits. To work around this issue, use -t mangle -A PREROUTING instead of FORWARD. | 4.3.0-4.4.5 | 5.0.0-5.6.0| | [2771871](#2771871)
| IPv4 and IPv6 neighbor entries in a FAILED state are incorrectly programmed into hardware as FORWARD entries instead of TRAP entries. Traffic is forwarded to these neighbors with a destination MAC address of 00:00:00:00:00:00 instead of trapping them to the CPU to resolve the correct MAC address
This affects failed neighbor entries on routed interfaces that are not SVIs. | 4.3.0-4.4.1 | 4.4.2-4.4.5| +| [2771653](#2771653)
| When using W-ECMP, the weights for various BGP next hops can sometimes be in the range of 100s or more, which consumes a lot of hardware space. | 4.3.0-4.4.5 | | | [2754791](#2754791)
| Remote MAC addreses in zebra are out of sync with bgpd. The zebra MAC addresses point to an incorrect (old) VTEP IP address and the sequence number is one higher than in BGP. | 3.7.14.2-3.7.16, 4.3.0-4.4.5 | | | [2754691](#2754691)
| CVE-2021-3672: in c-ares, a library that performs DNS requests and name resolution asynchronously, missing input validation of hostnames returned by DNS servers can lead to output of wrong hostnames (leading to Domain Hijacking)
Vulnerable: 1.14.0-1Fixed: 1.14.0-1+deb10u1 | 4.0.0-4.4.1 | 4.4.2-4.4.5| | [2754685](#2754685)
| CVE-2021-38165: lynx, a non-graphical (text-mode) web browser, does not properly handle the userinfo subcomponent of a URI, which can lead to leaking of credential in cleartext in SNI data
Vulnerable: 2.8.9rel.1-3Fixed: 2.8.9rel.1-3+deb10u1 | 4.0.0-4.4.1 | 4.4.2-4.4.5| @@ -108,53 +411,53 @@ pdfhidden: True | [2728207](#2728207)
| CVE-2021-3570: A flaw was found in the ptp4l program of the linuxptp package. A missing length check when forwarding a PTP message between ports allows a remote attacker to cause an information leak, crash, or potentially remote code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. | 3.7.0-3.7.16, 4.0.0-4.4.5 | | | [2728206](#2728206)
| CVE-2021-3570: A flaw was found in the ptp4l program of the linuxptp package. A missing length check when forwarding a PTP message between ports allows a remote attacker to cause an information leak, crash, or potentially remote code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. | 3.7.0-3.7.16, 4.0.0-4.4.5 | | | [2728205](#2728205)
| CVE-2021-3570: A flaw was found in the ptp4l program of the linuxptp package. A missing length check when forwarding a PTP message between ports allows a remote attacker to cause an information leak, crash, or potentially remote code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. | 3.7.0-4.4.1 | 4.4.2-4.4.5| -| [2728134](#2728134)
| CVE-2021-27212: A vulnerability in the Certificate List Exact Assertion validation was discovered in OpenLDAP, a free implementation of the Lightweight Directory Access Protocol. An unauthenticated remote attacker can take advantage of this flaw to cause a denial of service (slapd daemon crash) via specially crafted packets.
Vulnerable: <= 2.4.47+dfsg-3+deb10u5
Fixed: 2.4.47+dfsg-3+deb10u6 | 4.0.0-4.3.1 | 4.4.0-4.4.5| +| [2728134](#2728134)
| CVE-2021-27212: A vulnerability in the Certificate List Exact Assertion validation was discovered in OpenLDAP, a free implementation of the Lightweight Directory Access Protocol. An unauthenticated remote attacker can take advantage of this flaw to cause a denial of service (slapd daemon crash) via specially crafted packets.
Vulnerable: <= 2.4.47+dfsg-3+deb10u5
Fixed: 2.4.47+dfsg-3+deb10u6 | 4.0.0-4.3.2 | 4.4.0-4.4.5| | [2728119](#2728119)
| When VRF devices are deleted and reconfigured (for example, during a networking service restart), dynamic BGP neighbors might fail to reestablish. To work around this issue, restart FRR with the sudo systemctl restart frr command. | 4.3.0-4.4.5 | 5.0.0-5.6.0| | [2713888](#2713888)
| With the ip-acl-heavy TCAM profile, the following message might appear after you install an ACL with NCLU or cl-acltool and the ACL might not work correctly
hal_flx_acl_util.c:378 ERR hal_flx_acl_resource_release resource region 0 size 7387 create failed: No More Resources
To work around this issue, change the TCAM profile to acl-heavy or ip-acl-heavy with ACL non-atomic mode. | 3.7.15-5.0.1 | 5.1.0-5.6.0| | [2711533](#2711533)
| On the AS7326-56X switch, the link lights for 25G ports configured to work at 1G do not illuminate. | 4.2.1-4.4.5 | | | [2710208](#2710208)
| The net show bgp neighbor command output shows the BFD status as UP even when the BGP neighbor is not established, such as when the interface is down. | 4.2.1-4.4.5 | | | [2706744](#2706744)
| In an EVPN multihoming configuration, the VTEP continues to advertise a stale route after an extended MAC mobility event. | 4.3.0-4.4.1 | 4.4.2-4.4.5| | [2700767](#2700767)
| Following an event that causes the peerlink bond MAC address to change, such as a slave port state change, MLAG interfaces might be suspended due to a peer IP mismatch. This behavior is seen when you use a MLAG peer IP linklocal configuration. | 3.7.12-3.7.15, 4.3.0-4.4.5 | 3.7.16| -| [2695526](#2695526)
| CVE-2021-3580 CVE-2021-20305: Multiple vulnerabilities were discovered in nettle, a low level cryptographic library, which could result in denial of service (remote crash in RSA decryption via specially crafted ciphertext, crash on ECDSA signature verification) or incorrect verification of ECDSA signatures
Vulnerable: 3.4.1-1Fixed: 3.4.1-1+deb10u1 | 4.0.0-4.3.1 | 4.4.0-4.4.5| -| [2690017](#2690017)
| When you remove a bond member, then re-add it, you might see a Parameter Error failure in {syslog and switchd.log:
sx_sdk: LAG: Can't add port (0x00012400) to lag. Port has vports configured for it (Parameter Error)
switchd[4529]: hal_mlx_bond.c:582 ERR bond32 member swp32 add failed: Parameter Error
To work around this issue, restart switchd. | 4.3.0-4.3.1 | 4.4.0-4.4.5| -| [2687159](#2687159)
| CVE-2018-25009 CVE-2018-25010 CVE-2018-25011 CVE-2018-25012 CVE-2018-25013 CVE-2018-25014 CVE-2020-36328 CVE-2020-36329 CVE-2020-36330 CVE-2020-36331 CVE-2020-36332: Multiple vulnerabilities were discovered in libwebp, the implementation of the WebP image format, which could result in denial of service, memory disclosure or potentially the execution of arbitrary code if malformed images are processed
Vulnerable: 0.6.1-2Fixed: 0.6.1-2+deb10u1 | 4.0.0-4.3.1 | 4.4.0-4.4.5| +| [2695526](#2695526)
| CVE-2021-3580 CVE-2021-20305: Multiple vulnerabilities were discovered in nettle, a low level cryptographic library, which could result in denial of service (remote crash in RSA decryption via specially crafted ciphertext, crash on ECDSA signature verification) or incorrect verification of ECDSA signatures
Vulnerable: 3.4.1-1Fixed: 3.4.1-1+deb10u1 | 4.0.0-4.3.2 | 4.4.0-4.4.5| +| [2690017](#2690017)
| When you remove a bond member, then re-add it, you might see a Parameter Error failure in {syslog and switchd.log:
sx_sdk: LAG: Can't add port (0x00012400) to lag. Port has vports configured for it (Parameter Error)
switchd[4529]: hal_mlx_bond.c:582 ERR bond32 member swp32 add failed: Parameter Error
To work around this issue, restart switchd. | 4.3.0-4.3.2 | 4.4.0-4.4.5| +| [2687159](#2687159)
| CVE-2018-25009 CVE-2018-25010 CVE-2018-25011 CVE-2018-25012 CVE-2018-25013 CVE-2018-25014 CVE-2020-36328 CVE-2020-36329 CVE-2020-36330 CVE-2020-36331 CVE-2020-36332: Multiple vulnerabilities were discovered in libwebp, the implementation of the WebP image format, which could result in denial of service, memory disclosure or potentially the execution of arbitrary code if malformed images are processed
Vulnerable: 0.6.1-2Fixed: 0.6.1-2+deb10u1 | 4.0.0-4.3.2 | 4.4.0-4.4.5| | [2685994](#2685994)
| When you use the NVUE command nv set interface lo router ospf area to configure OSPF on a loopback interface, the configuration fails to apply
To work around this issue, configure the loopback interface in the desired OSPF area with the nv set vrf default router ospf area 0 network command and reference the assigned prefix of the loopback interface. For example:
cumulus@leaf01:~$ nv set vrf default router ospf area 0 network 10.10.10.1/32
| 4.0.0-5.0.1 | 5.1.0-5.6.0| -| [2682971](#2682971)
| CVE-2020-12762: integer overflow in the json-c JSON library, which could result in denial of service or potentially the execution of arbitrary code if large malformed JSON files are processed
Vulnerable: 0.12.2+cl4u1Fixed: 0.12.2+cl4.4.0u1 | 4.0.0-4.3.1 | 4.4.0-4.4.5| -| [2682780](#2682780)
| Adding a route map configuration after a MAC access list configuration line causes the route map configuration to be applied incorrectly
To work around this issue, add the MAC access list configuration to the end of the /etc/frr/frr.conf file. | 4.2.0-4.3.1 | 4.4.0-4.4.5| -| [2679950](#2679950)
| CVE-2021-25217: parsing of stored leases by dhclient or dhcpd has an incorrect length check that may cause a crash
Vulnerable: <= 4.3.1-6-cl3.7.14u1Fixed: 4.3.1-6-cl3.7.16u1 | 3.7.0-3.7.15, 4.0.0-4.3.1 | 3.7.16, 4.4.0-4.4.5| -| [2671667](#2671667)
| CVE-2021-23017: off-by-one in Nginx, a high-performance web and reverse proxy server, which couldresult in denial of service and potentially the execution of arbitrary code
Vulnerable: <= 1.14.2-2+deb10u3Fixed: 1.14.2-2+deb10u4 | 4.0.0-4.3.1 | 4.4.0-4.4.5| -| [2669873](#2669873)
| In an EVPN multihoming configuration, ARP/ND traffic coming in one switch is being sent back out the originating bond on the other switches in the ES on remote PE switches. Normally Split Horizon filtering prevents this kind of traffic at the remote PE. | 4.3.0-4.3.1 | 4.4.0-4.4.5| +| [2682971](#2682971)
| CVE-2020-12762: integer overflow in the json-c JSON library, which could result in denial of service or potentially the execution of arbitrary code if large malformed JSON files are processed
Vulnerable: 0.12.2+cl4u1Fixed: 0.12.2+cl4.4.0u1 | 4.0.0-4.3.2 | 4.4.0-4.4.5| +| [2682780](#2682780)
| Adding a route map configuration after a MAC access list configuration line causes the route map configuration to be applied incorrectly
To work around this issue, add the MAC access list configuration to the end of the /etc/frr/frr.conf file. | 4.2.0-4.3.2 | 4.4.0-4.4.5| +| [2679950](#2679950)
| CVE-2021-25217: parsing of stored leases by dhclient or dhcpd has an incorrect length check that may cause a crash
Vulnerable: <= 4.3.1-6-cl3.7.14u1Fixed: 4.3.1-6-cl3.7.16u1 | 3.7.0-3.7.15, 4.0.0-4.3.2 | 3.7.16, 4.4.0-4.4.5| +| [2671667](#2671667)
| CVE-2021-23017: off-by-one in Nginx, a high-performance web and reverse proxy server, which couldresult in denial of service and potentially the execution of arbitrary code
Vulnerable: <= 1.14.2-2+deb10u3Fixed: 1.14.2-2+deb10u4 | 4.0.0-4.3.2 | 4.4.0-4.4.5| +| [2669873](#2669873)
| In an EVPN multihoming configuration, ARP/ND traffic coming in one switch is being sent back out the originating bond on the other switches in the ES on remote PE switches. Normally Split Horizon filtering prevents this kind of traffic at the remote PE. | 4.3.0-4.3.2 | 4.4.0-4.4.5| | [2669858](#2669858)
CM-32169 | OpenSSH is vulnerable to CVE-2020-14145, as described in https://www.fzi.de/fileadmin/user_upload/2020-06-26-FSA-2020-2.pdf.
This is an information leak in algorithm negotiation that can allow man-in-the-middle attacks on initial connection attempts without a previously stored server host key on the client. If desired, mitigation using UpdateHostKeys and HostKeyAlgorithms is also given in that paper. | 3.7.14-3.7.16, 4.0.0-4.4.5 | | -| [2669073](#2669073)
| On Spectrum, Spectrum-2, and Spectrum-3 switches, the l1-show command shows the wrong data when the MST service is stopped
To work around this issue, start the MST service with the sudo mst start command. | 4.3.0-4.3.1 | 4.4.0-4.4.5| -| [2666838](#2666838)
| CVE-2021-31535: missing length validation in various functions provided by libx11, the X11 client-side library, allow to inject X11 protocol commands on X clients, leading to authentication bypass, denial of service or potentially the execution of arbitrary code
Vulnerable: <= 1.6.7-1+deb10u1Fixed: 1.6.7-1+deb10u2 | 4.0.0-4.3.1 | 4.4.0-4.4.5| -| [2663479](#2663479)
| CVE-2021-3520: integer overflow flaw in lz4, a fast LZ compression algorithm library, resulting in memory corruption
Vulnerable: 1.8.3-1Fixed: 1.8.3-1+deb10u1 | 4.0.0-4.3.1 | 4.4.0-4.4.5| -| [2656527](#2656527)
| CVE-2020-18032: A buffer overflow was discovered in Graphviz, which could potentially result in the execution of arbitrary code when processing a malformed file
Vulnerable: 2.40.1-6Fixed: 2.40.1-6+deb10u1 | 4.0.0-4.3.1 | 4.4.0-4.4.5| -| [2648658](#2648658)
| If you try to use more than one percent of max-ecmp-nexthops, you get an error indicating a failure. | 3.7.15-4.3.1 | 4.4.0-4.4.5| -| [2644053](#2644053)
| The following vulnerabilities have been announced in BIND:CVE-2021-25214: a malformed incoming IXFR transfer could trigger an assertion failure in named, resulting in denial of service
CVE-2021-25215: named could crash when a DNAME record placed in the ANSWER section during DNAME chasing turned out to be the final answer to a client query
CVE-2021-25216: the SPNEGO implementation used by BIND is prone to a buffer overflow vulnerability. This update switches to use the SPNEGO implementation from the Kerberos libraries
Vulnerable: <= 9.11.5.P4+dfsg-5.1+deb10u4Fixed: 9.11.5.P4+dfsg-5.1+deb10u5 | 4.0.0-4.3.1 | 4.4.0-4.4.5| +| [2669073](#2669073)
| On Spectrum, Spectrum-2, and Spectrum-3 switches, the l1-show command shows the wrong data when the MST service is stopped
To work around this issue, start the MST service with the sudo mst start command. | 4.3.0-4.3.2 | 4.4.0-4.4.5| +| [2666838](#2666838)
| CVE-2021-31535: missing length validation in various functions provided by libx11, the X11 client-side library, allow to inject X11 protocol commands on X clients, leading to authentication bypass, denial of service or potentially the execution of arbitrary code
Vulnerable: <= 1.6.7-1+deb10u1Fixed: 1.6.7-1+deb10u2 | 4.0.0-4.3.2 | 4.4.0-4.4.5| +| [2663479](#2663479)
| CVE-2021-3520: integer overflow flaw in lz4, a fast LZ compression algorithm library, resulting in memory corruption
Vulnerable: 1.8.3-1Fixed: 1.8.3-1+deb10u1 | 4.0.0-4.3.2 | 4.4.0-4.4.5| +| [2656527](#2656527)
| CVE-2020-18032: A buffer overflow was discovered in Graphviz, which could potentially result in the execution of arbitrary code when processing a malformed file
Vulnerable: 2.40.1-6Fixed: 2.40.1-6+deb10u1 | 4.0.0-4.3.2 | 4.4.0-4.4.5| +| [2648658](#2648658)
| If you try to use more than one percent of max-ecmp-nexthops, you get an error indicating a failure. | 3.7.15-4.3.2 | 4.4.0-4.4.5| +| [2644053](#2644053)
| The following vulnerabilities have been announced in BIND:CVE-2021-25214: a malformed incoming IXFR transfer could trigger an assertion failure in named, resulting in denial of service
CVE-2021-25215: named could crash when a DNAME record placed in the ANSWER section during DNAME chasing turned out to be the final answer to a client query
CVE-2021-25216: the SPNEGO implementation used by BIND is prone to a buffer overflow vulnerability. This update switches to use the SPNEGO implementation from the Kerberos libraries
Vulnerable: <= 9.11.5.P4+dfsg-5.1+deb10u4Fixed: 9.11.5.P4+dfsg-5.1+deb10u5 | 4.0.0-4.3.2 | 4.4.0-4.4.5| | [2639303](#2639303)
| When you use NCLU to delete a bond, then add an interface, NCLU reports an error similar to the following:
ERROR: 'NoneType' object has no attribute 'conf_key_value_multiple_values'See /var/log/netd.log for more details.
| 4.3.0-4.4.5 | | -| [2632379](#2632379)
| When you upgrade the switch with apt-get upgrade, the kexec-tools package is not installed, which causes the Smart System Manager fast restart mode to work incorrectly. | 4.3.0-4.3.1 | 4.4.0-4.4.5| -| [2628515](#2628515)
| CVE-2020-12695: hostapd does not properly handle UPnP subscribe messages under certain conditions, allowing an attacker to cause a denial of service
Vulnerable: <= 2.8.0-cl3.7.15u2Fixed: 2.8.0-cl3.7.15u3 | 3.7.14-3.7.14.2, 4.3.0-4.3.1 | 3.7.15-3.7.16, 4.4.0-4.4.5| +| [2632379](#2632379)
| When you upgrade the switch with apt-get upgrade, the kexec-tools package is not installed, which causes the Smart System Manager fast restart mode to work incorrectly. | 4.3.0-4.3.2 | 4.4.0-4.4.5| +| [2628515](#2628515)
| CVE-2020-12695: hostapd does not properly handle UPnP subscribe messages under certain conditions, allowing an attacker to cause a denial of service
Vulnerable: <= 2.8.0-cl3.7.15u2Fixed: 2.8.0-cl3.7.15u3 | 3.7.14-3.7.14.2, 4.3.0-4.3.2 | 3.7.15-3.7.16, 4.4.0-4.4.5| | [2618227](#2618227)
| The NCLU net show bridge macs command displays permanent MAC addresses for trunked VLANs. | 4.3.0-4.4.5 | | -| [2617000](#2617000)
| CVE-2021-26933 CVE-2021-27379Multiple vulnerabilities have been discovered in the Xen hypervisor, which could result in denial of service, privilege escalation or memory disclosure
Vulnerable: < 4.11.4+99-g8bce4698f6-1Fixed: 4.11.4+99-g8bce4698f6-1 | 4.0.0-4.3.1 | 4.4.0-4.4.5| -| [2616998](#2616998)
| CVE-2021-23358: missing input sanitising in the template() function of the Underscore JavaScript library could result in the execution of arbitrary code
Vulnerable: 1.9.1~dfsg-1Fixed: 1.9.1~dfsg-1+deb10u1 | 4.0.0-4.3.1 | 4.4.0-4.4.5| -| [2616987](#2616987)
| CVE-2020-6851 CVE-2020-8112 CVE-2020-15389 CVE-2020-27814 CVE-2020-27823 CVE-2020-27824 CVE-2020-27841 CVE-2020-27842 CVE-2020-27843 CVE-2020-27845: Multiple vulnerabilities have been discovered in openjpeg2, the open-source JPEG 2000 codec, which could result in denial of service or the execution of arbitrary code when opening a malformed image
Vulnerable: <= 2.3.0-2+deb10u1Fixed: 2.3.0-2+deb10u2 | 4.0.0-4.3.1 | 4.4.0-4.4.5| -| [2616976](#2616976)
| Multiple vulnerabilities were discovered in cURL, an URL transfer library:CVE-2020-8169: partial password leak to DNS servers
CVE-2020-8177: malicious server could cause curl -J -i to overwrite a local file
CVE-2020-8231: libcurl with CURLOPT_CONNECT_ONLY information leak due to wrong connection
CVE-2020-8284: PASV response could trick curl into connecting back to an arbitrary IP address and port
CVE-2020-8285: libcurl could run out of stack space using FTP wildcard matching (CURLOPT_CHUNK_BGN_FUNCTION)
CVE-2020-8286: failure to verify that OSCP response matches intended certificate
CVE-2021-22876: libcurl did not strip user credentials from URL when populating Referer HTTP request header
CVE-2021-22890: libcurl using HTTPS proxy with TLS1.3 could use the wrong session ticket and bypass server TLS certificate check
Vulnerable: <= 7.64.0-4+deb10u1Fixed: 7.64.0-4+deb10u2 | 4.0.0-4.3.1 | 4.4.0-4.4.5| -| [2616967](#2616967)
| CVE-2021-28957: lxml, a Python binding for the libxml2 and libxslt libraries, did not properly sanitize its input. This would allow a malicious user to mount a cross-site scripting attack
Vulnerable: <= 4.3.2-1+deb10u2Fixed: 4.3.2-1+deb10u3 | 4.0.0-4.3.1 | 4.4.0-4.4.5| -| [2616964](#2616964)
| CVE-2021-27291: Pygments, a syntax highlighting package written in Python 3, used regular expressions which could result in denial of service
Vulnerable: <= 2.3.1+dfsg-1+deb10u1Fixed: 2.3.1+dfsg-1+deb10u2 | 4.0.0-4.3.1 | 4.4.0-4.4.5| -| [2616954](#2616954)
| CVE-2021-3449: A NULL pointer dereference was found in the signature_algorithms processing in OpenSSL, a Secure Sockets Layer toolkit, which could result in denial of service
Vulnerable: <= 1.1.1d-0+deb10u5Fixed: 1.1.1d-0+deb10u6 | 4.0.0-4.3.1 | 4.4.0-4.4.5| -| [2614016](#2614016)
| The switch firmware incorrectly identifies Lenovo LR4 transceivers (part number 00YD278) and does not set the laser levels properly, which can prevent the link from coming up or might cause the transceiver to be identified as a 1G module. | 4.2.0-4.3.1 | 4.4.0-4.4.5| +| [2617000](#2617000)
| CVE-2021-26933 CVE-2021-27379Multiple vulnerabilities have been discovered in the Xen hypervisor, which could result in denial of service, privilege escalation or memory disclosure
Vulnerable: < 4.11.4+99-g8bce4698f6-1Fixed: 4.11.4+99-g8bce4698f6-1 | 4.0.0-4.3.2 | 4.4.0-4.4.5| +| [2616998](#2616998)
| CVE-2021-23358: missing input sanitising in the template() function of the Underscore JavaScript library could result in the execution of arbitrary code
Vulnerable: 1.9.1~dfsg-1Fixed: 1.9.1~dfsg-1+deb10u1 | 4.0.0-4.3.2 | 4.4.0-4.4.5| +| [2616987](#2616987)
| CVE-2020-6851 CVE-2020-8112 CVE-2020-15389 CVE-2020-27814 CVE-2020-27823 CVE-2020-27824 CVE-2020-27841 CVE-2020-27842 CVE-2020-27843 CVE-2020-27845: Multiple vulnerabilities have been discovered in openjpeg2, the open-source JPEG 2000 codec, which could result in denial of service or the execution of arbitrary code when opening a malformed image
Vulnerable: <= 2.3.0-2+deb10u1Fixed: 2.3.0-2+deb10u2 | 4.0.0-4.3.2 | 4.4.0-4.4.5| +| [2616976](#2616976)
| Multiple vulnerabilities were discovered in cURL, an URL transfer library:CVE-2020-8169: partial password leak to DNS servers
CVE-2020-8177: malicious server could cause curl -J -i to overwrite a local file
CVE-2020-8231: libcurl with CURLOPT_CONNECT_ONLY information leak due to wrong connection
CVE-2020-8284: PASV response could trick curl into connecting back to an arbitrary IP address and port
CVE-2020-8285: libcurl could run out of stack space using FTP wildcard matching (CURLOPT_CHUNK_BGN_FUNCTION)
CVE-2020-8286: failure to verify that OSCP response matches intended certificate
CVE-2021-22876: libcurl did not strip user credentials from URL when populating Referer HTTP request header
CVE-2021-22890: libcurl using HTTPS proxy with TLS1.3 could use the wrong session ticket and bypass server TLS certificate check
Vulnerable: <= 7.64.0-4+deb10u1Fixed: 7.64.0-4+deb10u2 | 4.0.0-4.3.2 | 4.4.0-4.4.5| +| [2616967](#2616967)
| CVE-2021-28957: lxml, a Python binding for the libxml2 and libxslt libraries, did not properly sanitize its input. This would allow a malicious user to mount a cross-site scripting attack
Vulnerable: <= 4.3.2-1+deb10u2Fixed: 4.3.2-1+deb10u3 | 4.0.0-4.3.2 | 4.4.0-4.4.5| +| [2616964](#2616964)
| CVE-2021-27291: Pygments, a syntax highlighting package written in Python 3, used regular expressions which could result in denial of service
Vulnerable: <= 2.3.1+dfsg-1+deb10u1Fixed: 2.3.1+dfsg-1+deb10u2 | 4.0.0-4.3.2 | 4.4.0-4.4.5| +| [2616954](#2616954)
| CVE-2021-3449: A NULL pointer dereference was found in the signature_algorithms processing in OpenSSL, a Secure Sockets Layer toolkit, which could result in denial of service
Vulnerable: <= 1.1.1d-0+deb10u5Fixed: 1.1.1d-0+deb10u6 | 4.0.0-4.3.2 | 4.4.0-4.4.5| +| [2614016](#2614016)
| The switch firmware incorrectly identifies Lenovo LR4 transceivers (part number 00YD278) and does not set the laser levels properly, which can prevent the link from coming up or might cause the transceiver to be identified as a 1G module. | 4.2.0-4.3.2 | 4.4.0-4.4.5| | [2599274](#2599274)
| On Mellanox Spectrum switches, when there is an MSTP forwarding state change on a bonds (for example, when the state changes from blocking to forwarding), the MSTP hardware table might set some VLANs to blocking when they should be forwarding. A a result, all packets on these VLANs drop at ingress
To recover from this state, flap the bond interface (not the physical swp) by running ifdown ; sleep 1 ; ifup . | 4.3.0-4.4.5 | 5.0.0-5.6.0| -| [2582639](#2582639)
| On NVIDIA Spectrum switches, BUM traffic might be dropped during VXLAN decapsulation in an EVPN multihoming environment after multiple PIM uplink interfaces flap. | 4.3.0-4.3.1 | 4.4.0-4.4.5| -| [2578872](#2578872)
| CVE-2021-20270: It was discovered that Pygments, a syntax highlighting package written in Python, could be forced into an infinite loop, resulting in denial of service
Vulnerable: 2.3.1+dfsg-1Fixed: 2.3.1+dfsg-1+deb10u1 | 4.0.0-4.3.1 | 4.4.0-4.4.5| -| [2578870](#2578870)
| CVE-2020-35523 CVE-2020-35524: Two vulnerabilities have been discovered in the libtiff library and the included tools, which may result in denial of service or the execution of arbitrary code if malformed image files are processed
Vulnerable: <= 4.1.0+git191117-2~deb10u1Fixed: 4.1.0+git191117-2~deb10u2 | 4.0.0-4.3.1 | 4.4.0-4.4.5| -| [2577499](#2577499)
| QSFP+ 40G optics do not work on Spectrum platforms. | 4.3.0-4.3.1 | 4.4.0-4.4.5| +| [2582639](#2582639)
| On NVIDIA Spectrum switches, BUM traffic might be dropped during VXLAN decapsulation in an EVPN multihoming environment after multiple PIM uplink interfaces flap. | 4.3.0-4.3.2 | 4.4.0-4.4.5| +| [2578872](#2578872)
| CVE-2021-20270: It was discovered that Pygments, a syntax highlighting package written in Python, could be forced into an infinite loop, resulting in denial of service
Vulnerable: 2.3.1+dfsg-1Fixed: 2.3.1+dfsg-1+deb10u1 | 4.0.0-4.3.2 | 4.4.0-4.4.5| +| [2578870](#2578870)
| CVE-2020-35523 CVE-2020-35524: Two vulnerabilities have been discovered in the libtiff library and the included tools, which may result in denial of service or the execution of arbitrary code if malformed image files are processed
Vulnerable: <= 4.1.0+git191117-2~deb10u1Fixed: 4.1.0+git191117-2~deb10u2 | 4.0.0-4.3.2 | 4.4.0-4.4.5| +| [2577499](#2577499)
| QSFP+ 40G optics do not work on Spectrum platforms. | 4.3.0-4.3.2 | 4.4.0-4.4.5| | [2574368](#2574368)
| When you run the NCLU net add bgp maximum-paths ibgp command, FRR restarts unexpectedly
To work around this issue, either use the vtysh commands or edit the /etc/frr/frr.conf file directly, then run systemctl reload frr. | 4.1.1-4.4.5 | | -| [2566880](#2566880)
| CVE-2021-27803: A vulnerability was discovered in how p2p/p2p_pd.c in wpa_supplicant before 2.10 processes P2P (Wi-Fi Direct) provision discovery requests. It could result in denial of service or other impact (potentially execution of arbitrary code), for an attacker within radio range. | 3.7.14-3.7.14.2, 4.0.0-4.3.1 | 3.7.15-3.7.16, 4.4.0-4.4.5| -| [2564534](#2564534)
| Several vulnerabilities have been discovered in the GRUB2 bootloader
CVE-2020-14372: It was discovered that the acpi command allows a privileged user to load crafted ACPI tables when Secure Boot is enabled
CVE-2020-25632: A use-after-free vulnerability was found in the rmmod command
CVE-2020-25647: An out-of-bound write vulnerability was found in the grub_usb_device_initialize() function, which is called to handle USB device initialization
CVE-2020-27749: A stack buffer overflow flaw was found in grub_parser_split_cmdline
CVE-2020-27779: It was discovered that the cutmem command allows a privileged user to remove memory regions when Secure Boot is enabled
CVE-2021-20225: A heap out-of-bounds write vulnerability was found in the short form option parser
CVE-2021-2023: A heap out-of-bound write flaw was found caused by mis-calculation of space required for quoting in the menu rendering. | 4.0.0-4.3.1 | 4.4.0-4.4.5| -| [2556782](#2556782)
CM-33398 | CVE-2021-0326: An issue has been found in wpa, a set of tools to support WPA and WPA2 (IEEE 802.11i). Missing validation of data can result in a buffer over-write, which might lead to a DoS of the wpa_supplicant process or potentially arbitrary code execution.
Vulnerable: <= 2.8.0-cl3.7.14u1, <= 2.8.0-cl4.2.1u1 | 3.7.14-3.7.14.2, 4.0.0-4.3.1 | 3.7.15-3.7.16, 4.4.0-4.4.5| -| [2556777](#2556777)
CM-33395 | CVE-2021-26937: A flaw in the handling of combining characters in screen, a terminal multiplexer with VT100/ANSI terminal emulation can result in denial of service, or potentially the execution of arbitrary code via a specially crafted UTF-8 character sequence.
Vulnerable: 4.6.2-3
Fixed: 4.6.2-3+deb10u1 | 4.0.0-4.3.1 | 4.4.0-4.4.5| +| [2566880](#2566880)
| CVE-2021-27803: A vulnerability was discovered in how p2p/p2p_pd.c in wpa_supplicant before 2.10 processes P2P (Wi-Fi Direct) provision discovery requests. It could result in denial of service or other impact (potentially execution of arbitrary code), for an attacker within radio range. | 3.7.14-3.7.14.2, 4.0.0-4.3.2 | 3.7.15-3.7.16, 4.4.0-4.4.5| +| [2564534](#2564534)
| Several vulnerabilities have been discovered in the GRUB2 bootloader
CVE-2020-14372: It was discovered that the acpi command allows a privileged user to load crafted ACPI tables when Secure Boot is enabled
CVE-2020-25632: A use-after-free vulnerability was found in the rmmod command
CVE-2020-25647: An out-of-bound write vulnerability was found in the grub_usb_device_initialize() function, which is called to handle USB device initialization
CVE-2020-27749: A stack buffer overflow flaw was found in grub_parser_split_cmdline
CVE-2020-27779: It was discovered that the cutmem command allows a privileged user to remove memory regions when Secure Boot is enabled
CVE-2021-20225: A heap out-of-bounds write vulnerability was found in the short form option parser
CVE-2021-2023: A heap out-of-bound write flaw was found caused by mis-calculation of space required for quoting in the menu rendering. | 4.0.0-4.3.2 | 4.4.0-4.4.5| +| [2556782](#2556782)
CM-33398 | CVE-2021-0326: An issue has been found in wpa, a set of tools to support WPA and WPA2 (IEEE 802.11i). Missing validation of data can result in a buffer over-write, which might lead to a DoS of the wpa_supplicant process or potentially arbitrary code execution.
Vulnerable: <= 2.8.0-cl3.7.14u1, <= 2.8.0-cl4.2.1u1 | 3.7.14-3.7.14.2, 4.0.0-4.3.2 | 3.7.15-3.7.16, 4.4.0-4.4.5| +| [2556777](#2556777)
CM-33395 | CVE-2021-26937: A flaw in the handling of combining characters in screen, a terminal multiplexer with VT100/ANSI terminal emulation can result in denial of service, or potentially the execution of arbitrary code via a specially crafted UTF-8 character sequence.
Vulnerable: 4.6.2-3
Fixed: 4.6.2-3+deb10u1 | 4.0.0-4.3.2 | 4.4.0-4.4.5| | [2556772](#2556772)
CM-33391 | The net show clag verify-vlans command fails with the following log:

WARNING: '/usr/bin/clagctl verifyvlans' failed due to:
Command '['/usr/bin/clagctl', 'verifyvlans']' returned non-zero exit status 1

To work around this issue, run the /usr/bin/clagctl verifyvlans command or the net show clag verbose command. | 4.2.1-4.4.5 | | -| [2556730](#2556730)
CM-33359 | CVE-2020-8625: A buffer overflow vulnerability was discovered in the SPNEGO implementation affecting the GSSAPI security policy negotiation in BIND, a DNS server implementation, which could result in denial of service (daemon crash), or potentially the execution of arbitrary code.
Vulnerable: <= 9.11.5.P4+dfsg-5.1+deb10u2
Fixed: 9.11.5.P4+dfsg-5.1+deb10u3 | 4.0.0-4.3.1 | 4.4.0-4.4.5| +| [2556730](#2556730)
CM-33359 | CVE-2020-8625: A buffer overflow vulnerability was discovered in the SPNEGO implementation affecting the GSSAPI security policy negotiation in BIND, a DNS server implementation, which could result in denial of service (daemon crash), or potentially the execution of arbitrary code.
Vulnerable: <= 9.11.5.P4+dfsg-5.1+deb10u2
Fixed: 9.11.5.P4+dfsg-5.1+deb10u3 | 4.0.0-4.3.2 | 4.4.0-4.4.5| | [2556369](#2556369)
CM-33196 | If you use NCLU to configure an ACL for eth0, you can't designate it as an INPUT rule; the rule is automatically created as a FORWARD rule in the /etc/cumulus/acl/policy.d/50_nclu_acl.rules file.
To work around this issue, manually create an ACL in the /etc/cumulus/acl/policy.d/ file with "-A INPUT -i eth0". | 4.2.1-4.4.5 | | | [2556082](#2556082)
CM-33050 | The NCLU net del vrf command does not delete a numbered VRF. For example:

cumulus@leaf01:~$ net del vrf 55
ERROR: Command not found
| 4.2.1-4.4.5 | | | [2556081](#2556081)
CM-33049 | You cannot set the time zone can with NCLU commands. | 4.1.1-4.4.5 | | @@ -162,7 +465,7 @@ pdfhidden: True | [2555763](#2555763)
CM-32861 | The NCLU net del bgp neighbor command does not delete the neighbor and displays an error similar to the following:

ERROR: --- /run/nclu/frr/frr.conf.scratchpad.baseline 2021-01-04 17:23:59.250463331 +0000
+++ /run/nclu/frr/frr.conf.scratchpad 2021-01-04 17:25:59.213673980 +0000

To work around this issue, use the FRR command to delete a neighbor. | 4.3.0-4.4.5 | | | [2555613](#2555613)
CM-32786 | The net show configuration commands command incorrectly displays the NCLU syntax to disable IPv6 forwarding on interfaces. For example:

# net show configuration commands
net add vlan 1 ip6-forward off

The correct NCLU command to disable IPv6 forwarding is net add vlan 1 ipv6 forward off (without the hyphen). | 4.2.1-4.4.5 | | | [2555318](#2555318)
CM-32612 | If you try to enable BGP graceful restart when it is already enabled, you see an error similar to the following in the frr.log file:

2020-12-07T19:20:26.004333+00:00 cumulus bgpd[4954]: VRF default: Handle GR command GLOBAL_GR_CMD, current GR state GLOBAL_GR, new GR state GLOBAL_INVALID

This error has no functional impact. | 4.3.0-4.4.5 | | -| [2555175](#2555175)
CM-32528 | Control Plane Traffic (example - BGP peering from Leaf to Spine) goes down on Leaf due to Hold Down Timer Expiration of peer following prolonged link flaps on downlinks when vxlan enabled vlans are carried on the flapping link. | 3.7.15-3.7.16, 4.2.1-4.4.5 | | +| [2555175](#2555175)
CM-32528 | Control plane traffic (such as BGP peering from leaf to spine) goes down on the leaf due to the peer Hold Down timer expiration following prolonged link flaps on down links when VXLAN enabled VLANs are carried on the flapping link. Be sure to correct layer 1 issues, configuration issues, or misbehaving link partners that are causing the link flaps. | 3.7.15-4.3.1 | 4.3.2-4.4.5| | [2554986](#2554986)
CM-32416 | The ethtool utility doesn't contain the latest values, as a result the Revision Compliance field shows Unallocated. | 4.2.1-4.4.5 | | | [2554812](#2554812)
CM-32296 | If the RMAC of a layer 3 SVI changes, the show vrf vni command is not updated with the new value. However, the new RMAC is seen in the show evpn vni command and is present on self-originated EVPN routes. | 4.2.1-4.4.5 | | | [2554783](#2554783)
CM-32274 | If you apply an outbound route map to a BGP peer that uses set as-path prepend last-as, advertised locally-originated routes have the ASN of the peer prepended to the AS path.
This might trigger AS path loop prevention on the peer, where the peer ignores locally-originated prefixes. | 4.2.1-4.4.5 | 5.0.0-5.6.0| @@ -171,7 +474,7 @@ pdfhidden: True | [2554582](#2554582)
CM-32144 | On switches with the Maverick ASIC, control traffic is dropped due to receive buffering. | 4.2.0-4.4.5 | | | [2554533](#2554533)
CM-32112 | On the ARM platform, NTP peer associations slowly increase to larger offsets (~500ms). | 4.0.0-4.4.5 | | | [2554466](#2554466)
CM-32068 | Kernel routes added by iproute2 are missing in FRR after an interface flap.
To work around this issue, configure a static route in FRR.
| 4.2.1-4.4.5 | | -| [2554299](#2554299)
CM-31962 | In a VRRP configuration, BGP unnumbered sessions for VRFs fail to establish after a networking restart. | 4.2.0-4.3.1 | 4.4.0-4.4.5| +| [2554299](#2554299)
CM-31962 | In a VRRP configuration, BGP unnumbered sessions for VRFs fail to establish after a networking restart. | 4.2.0-4.3.2 | 4.4.0-4.4.5| | [2554222](#2554222)
CM-31921 | The NCLU command to enable bridge learning fails.
As a work around, enable bridge learning in the /etc/network/interface file. For example:

auto vni-30
iface vni-30
vxlan-id 30
bridge-access 30
bridge-arp-nd-suppress on
bridge-learning on
vxlan-local-tunnelip 10.10.10.1
mstpctl-bpduguard yes
mstpctl-portbpdufilter yes
mtu 9166
| 4.2.1-4.4.5 | | | [2554218](#2554218)
CM-31917 | MLAG packets received on the peer link are dropped instead of routed. | 4.2.0-4.4.5 | | | [2554202](#2554202)
CM-31904 | The output of the net show commit command does not show the last commit or the specified commit number but is empty instead. | 4.2.1-4.4.5 | | @@ -197,7 +500,7 @@ pdfhidden: True | [2550974](#2550974)
CM-30195 | On the Dell S3000 switch, after installing the Cumulus Linux 4.1.1 disk image without a license, the switch sends a link beat if a remote host port is configured. | 3.7.11-3.7.16, 4.1.1-4.4.5 | | | [2550793](#2550793)
CM-30101 | The NCLU net show bridge spanning-tree command displays the aging timer incorrectly. | 3.7.12-3.7.16, 4.0.0-4.4.5 | | | [2550713](#2550713)
CM-30052 | Configuring the subinterface of a VXLAN uplink under another traditional bridge, which also has the VXLAN VNI enslaved, causes switchd to use high CPU due to very frequent VXLAN tunnel sync events.
To work around this issue, do not enslave the subinterface of a VXLAN layer 3 uplink under a traditional bridge in a VXLAN configuration. | 4.1.1-4.4.5 | | -| [2550704](#2550704)
| On the Mellanox SN3420 switch, 25G SR optics only link up in force mode. | 4.3.0-4.3.1 | 4.4.0-4.4.5| +| [2550704](#2550704)
| On the Mellanox SN3420 switch, 25G SR optics only link up in force mode. | 4.3.0-4.3.2 | 4.4.0-4.4.5| | [2550642](#2550642)
CM-30006 | ACLs with SPAN target and in-interface as bond member are not supported on Spectrum-based switches | 4.2.0-4.4.5 | | | [2550444](#2550444)
CM-29872 | Tab completion for the net show rollback description command returns information about a snapshot instead of context help.
To work around this issue, run the net show commit history command to find descriptions instead of the net show rollback description command. | 3.7.12-3.7.16, 4.0.0-4.4.5 | | | [2550443](#2550443)
CM-29871 | The net show rollback description command returns an error even if the string matches a commit description.
To work around this issue, look for your string in the output of the net show commit history command (or grep for it there) instead. | 3.7.12-3.7.16, 4.0.0-4.4.5 | | @@ -208,7 +511,7 @@ pdfhidden: True | [2549782](#2549782)
CM-29519 | The JSON format output of the net show bgp l2vpn evpn summary command shows the incorrect neighbour state. | 3.7.12-3.7.16, 4.0.0-4.4.5 | | | [2549731](#2549731)
CM-29492 | When you create SPAN or ERSPAN rules in ebtables, the action fails to install if it is not in lowercase. Make sure that the SPAN or ERSPAN action is all lowercase; for example:

[ebtables]
-A FORWARD --in-interface swp10 -j span --dport swp1
| 3.7.12-3.7.16, 4.1.1-4.4.5 | | | [2549392](#2549392)
CM-29319 | When you configure an RD or RT with NCLU, you see duplicate VNI stanzas in the /etc/frr/frr.conf file.
To work around this issue, manually edit the etc/frr/frr.conf file to define advertise-all-vni before the RD or RT configuration within the l2vpn EVPN address family, then reload the FRR service with the sudo systemctl reload frr command. | 4.1.0-4.4.5 | | -| [2549371](#2549371)
CM-29309 | When Optimized Multicast Flooding (OMF) is enabled with the bridge.optimized_mcast_flood = TRUE setting in the /etc/cumulus/switchd.conf file, the switch continues to flood IPv6 multicast traffic to all slave ports when there is no MLD join receive. | 3.7.11-4.3.1 | 4.4.0-4.4.5| +| [2549371](#2549371)
CM-29309 | When Optimized Multicast Flooding (OMF) is enabled with the bridge.optimized_mcast_flood = TRUE setting in the /etc/cumulus/switchd.conf file, the switch continues to flood IPv6 multicast traffic to all slave ports when there is no MLD join receive. | 3.7.11-4.3.2 | 4.4.0-4.4.5| | [2548924](#2548924)
CM-29146 | On the EdgeCore Minipack AS8000, storm control does not restrict unknown unicast, broadcast, or multicast traffic. | 4.1.1-4.4.5 | | | [2548657](#2548657)
CM-29035 | When you upgrade Cumulus Linux on the EdgeCore AS7726-32X or AS7326-56X switch, you might see firmware errors similar to the following:

W: Possible missing firmware /lib/firmware/tigon/tg3_tso5.bin for module tg3
W: Possible missing firmware /lib/firmware/tigon/tg3_tso.bin for module tg3
W: Possible missing firmware /lib/firmware/tigon/tg3.bin for module tg3

You can safely ignore these error messages. | 3.7.12-3.7.16, 4.0.0-4.4.5 | | | [2548579](#2548579)
| The following security vulnerability has been announced:
CVE-2020-10531: An issue was discovered in International Components for Unicode (ICU) for C/C++ through 66.1. An integer overflow, leading to a heap-based buffer overflow, exists in the UnicodeString::doAppend() function in common/unistr.cpp. | 3.7.12, 4.0.0-4.4.5 | 3.7.13-3.7.16| @@ -233,7 +536,7 @@ pdfhidden: True | [2546131](#2546131)
CM-27581 | On the Delta AG-6248C PoE switch, when you run the apt upgrade command, the upgrade does not work. Cumulus Linux uses uboot directly instead of grub to boot the kernel. Uboot needs a special header to boot the kernel, which is not present. Without this header, when you use the apt upgrade command to upgrade Linux packages, uboot is unable to boot up the kernel.
To work around this issue, upgrade Cumulus Linux by installing the Cumulus Linux image. Run the onie-select command to go into ONIE, and then use the nos-install command in ONIE to install a new image.
This workaround only works when an out-of-band network is present. | 3.7.11-3.7.16, 4.0.0-4.4.5 | | | [2545837](#2545837)
CM-27444 | If you use the NCLU commands to configure NTP and run the net add time ntp source command before you run the net add time ntp server iburst command, the /etc/ntp.conf file is misconfigured.
To work around this issue, run the net add time ntp server iburst command before you run the net add time ntp source command. | 3.7.10-3.7.11, 4.0.0-4.4.5 | 3.7.12-3.7.16| | [2545520](#2545520)
CM-27243 | The length of the netlink message is not set properly for non-bridge family type messages. The same length is used for both bridge and non-bridge even though the bridge family type message has an extra attribute. This causes extra bytes to be left over in non-bridge family type netlink messages. | 3.7.10, 4.0.0-4.4.5 | 3.7.11-3.7.16| -| [2545239](#2545239)
CM-27099 | On the Mellanox switch with the Spectrum-2 ASIC, Precision Time Protocol (PTP) is not currently supported. | 4.0.0-4.3.1 | 4.4.0-4.4.5| +| [2545239](#2545239)
CM-27099 | On the Mellanox switch with the Spectrum-2 ASIC, Precision Time Protocol (PTP) is not currently supported. | 4.0.0-4.3.2 | 4.4.0-4.4.5| | [2545233](#2545233)
CM-27094 | On the Delta AG9032v1 switch, smonctl and sensors report inaccurate PSU current and power. | 4.0.0-4.4.5 | | | [2545125](#2545125)
CM-27018 | If you configure more than one VRR interface on an SVI interface, deleting one of the VRR addresses does not remove the interface/address. | 3.7.10-3.7.16, 4.0.0-4.4.5 | | | [2544978](#2544978)
CM-26921 | If you delete an undefined bond, then add a bond slave, the net commit command fails. | 3.7.9-3.7.16, 4.0.0-4.4.5 | | diff --git a/content/cumulus-linux-43/rn.xml b/content/cumulus-linux-43/rn.xml index a02dc3d35f..1ed1b1adb8 100644 --- a/content/cumulus-linux-43/rn.xml +++ b/content/cumulus-linux-43/rn.xml @@ -1,4 +1,2209 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Issue ID Description Affects Fixed
3647424When you remove the {{update-source}} configuration for a BGP neighbor, the peering is reset if the neighbor is a member of a peer group with the same {{update-source}} configuration.4.3.0-5.5.15.6.0
3600912In an MLAG EVPN configuration, if host mobility occurs multiple times at high frequency, the host MAC might point to an incorrect VTEP; it might be local behind the VTEP.4.3.1-4.4.5
3488136When zebra receives route updates that include both a route with a recursive next hop and the route used to resolve that next hop, zebra might mark the route with the recursive next hop as inactive. To work around this issue, reprocess the route updates by running the appropriate clear command for the protocol in use. For example, for BGP, clear inbound routes from the relevant neighbor using the {{nv action clear vrf <vrf> router bgp neighbor <neighbor> address-family <address-family> in}} command.4.2.1-5.5.15.6.0
3474391The SNMP MIB definition file {{/usr/share/snmp/mibs/Cumulus-BGPVRF-MIB.txt}} does not define the INDEX of the {{bgpPeerEntry}} correctly. This issue does not impact SNMP functionality for this MIB.4.3.1-5.5.15.6.0
3429530On the Spectrum-2 and Spectrum-3 switch, multiple interfaces (in the same PLL quarter) might flap intermittently at the same time.4.2.1-5.4.05.5.0-5.6.0
3330705When using TACACS+, a TACACS+ server name that returns more than one IP address, such as an IPv6 and IPv4 address, is counted many times against the limit of seven TACACS+ servers, which might cause some of the later listed servers to be ignored as over the limit. To work around this issue, you can set the {{prefer_ip_version}} configuration option (the default value is 4) to choose between an IPv4 or IPv6 address if both are present.3.7.0-5.3.15.4.0-5.6.0
3327477If you use {{su}} to change to a user specified through TACACS+, the user becomes the local tacacs0 thru tacacs15 user instead of the named user to run {{sudo}} commands. As a result, the named user password might not match the local tacacs0 thru tacacs15 user password.3.7.0-3.7.16, 4.0.0-4.4.5, 5.0.0-5.6.0
3321391On the NVIDIA SN2410 switch, ports with optical transceivers show FAULT errors in the {{sensor}} command output.4.2.1-5.3.15.4.0-5.6.0
3291548In EVPN deployments, a buffer lockup for split or pre-split ports can occur on Spectrum-2 and Spectrum-3 switches. As result, traffic coming in on these ports is dropped in the RX buffer. To work around this issue, restart {{switchd}}.4.2.1-4.4.55.0.0-5.6.0
3218207Certain routes on tenant VRFs have missing next hop entries because the router MAC address is missing in the bridge forwarding database table that corresponds to the remote VTEP. As a result, traffic forwarding is affected for these routes.4.3.0-5.2.15.3.0-5.6.0
3216921RADIUS authenticated users with read-only access to NCLU commands (users in the {{users_with_show}} list) can run edit commands if a username for a non-local account is on the {{users_with_edit}} line of the {{/etc/netd.conf}} file. To work around this issue, make sure that all usernames on the {{users_with_edit}} line of the {{/etc/netd.conf}} file are configured local users for the system (real Linux users). +3.7.0-3.7.16, 4.3.0-4.4.5
3216759With the {{ip-acl-heavy}} TCAM profile, the following message might appear after you install an ACL with NCLU or cl-acltool and the ACL might not work correctly. + +hal_flx_acl_util.c:378 ERR hal_flx_acl_resource_release resource region 0 size 7387 create failed: No More Resources + +To work around this issue, change the TCAM profile to {{acl-heavy}} or {{ip-acl-heavy}} with ACL non-atomic mode.3.7.15-3.7.16, 4.3.0-4.4.5
3168564In a large scale VXLAN configuration (for example if you have more than 8500 VLANs across ports), {{switchd}} might crash when you restart {{clagd}} or when all bonds go operationally down, then up. +On Trident3 switches running Cumulus Linux 4.3.1, NVIDIA validates the VLAN scale limit for VXLAN deployments with 8500 VLANs across ports with LACP bypass disabled.4.3.1-4.4.5
3163845If bond slaves listed in the {{/etc/network/interfaces}} file are not in alphabetical order, the bond interface MAC address can change when you run {{ifreload}}. For example, if the bond slaves in the {{/etc/network/interfaces}} file are listed as {{swp32 swp31}}, the switch initially uses the MAC address for swp32 as the bond MAC address. An another {{ifreload}} can cause this to change to use the MAC address for swp31 as the bond MAC address, which can cause protocol issues, such as IPv6 link-local address changes.4.3.1-4.4.5
3138746The switch duplicates DHCP packets that pass through the VTEP.4.3.0-5.1.05.2.0-5.6.0
3131423During EVPN multihoming bond failover, ARP and ND redirection fails if you configure layer 2 VNIs and ES bonds before you configure the loopback IP address of the switch. To work around this issue, configure the loopback IP address, then restart FRR with the {{systemctl restart frr}} command.4.3.0-5.1.05.2.0-5.6.0
3129819On the EdgeCore AS4610 switch, the {{clagd}} service loses communication after 198 days of uptime.3.7.15-3.7.16, 4.3.0-4.4.5
3119615In an MLAG topology, if you admin down a single connected interface, any dynamic MAC addresses on the peer link are flushed, then added back momentarily, which creates a disruption in traffic. 3.7.15-5.1.05.2.0-5.6.0
3117340When you edit the {{/usr/share/openvswitch/scripts/ovs-ctl-vtep}} file to change the {{ovs-vtepd}} configuration between {{vlan-aware}} and {{vlan-unaware}} mode, {{ovs-vtepd}} crashes when you restart the service. To recover, restart the networking service with the {{sudo systemctl restart networking}} command.4.3.0-5.1.05.2.0-5.6.0
3093966On Broadcom switches, INPUT chain iptable rules filter IPv6 packets matching the rules. 3.7.15-3.7.16, 4.3.0-4.4.5
3093863The snmpd process will slowly leak memory when you poll TCP-MIB objects. To work around this issue, restart the snmpd service to free memory with the {{systemctl restart snmpd}} command.3.7.16-4.4.34.4.4-4.4.5, 5.2.0-5.6.0
3089165A slow memory leak might occur in {{switchd}}} if the route fails to install in hardware when hardware resources are exhausted.4.2.1-4.4.34.4.4-4.4.5
3084027Under a high load, you might see ingress drop counters increase. The drops are classified as {{HwIfInDiscards}} in ethtool and shown as {{ingress_general}} in hardware.4.3.0-4.4.5, 5.0.0-5.6.0
3073668On the EdgeCore AS4610 switch, when you change the speed of any of the SFP+ ports, the other SFP+ ports flap.3.7.12-3.7.16, 4.3.0-4.4.5
3072613When you delete a bond interface with NCLU, BGP peer group configuration is removed.3.7.15-3.7.16, 4.3.0-4.4.5
3059135In an OSPF configuration, after you change the IPv6 subnet mask, the old address remains in the RIB as a connected OSPF route. +To resolve this issue, restart FRR with the {{sudo systemctl restart frr}} command.4.3.0-5.1.05.2.0-5.6.0
3046023The {{cl-resource-query}} command output shows ECMP nextHop Table exhaustion (above 100 percent utilization) and the {{switchd.log}} file contains ECMP resource errors with routes and next hops failing to install.4.2.1-5.1.05.2.0-5.6.0
3007564After you delete the last {{vxlan-remoteip}} configuration line from the {{/etc/network/interfaces}} file and run the {{ifreload -a}} command, the corresponding BUM flood entry is not removed.3.7.15-5.0.15.1.0-5.6.0, 5.2.0-5.6.0
2999341CVE-2021-3570 +The ptp4l program in linuxptp, an implementation of the Precision Time Protocol (PTP), does not validate the messageLength field of incoming messages, allowing a remote attacker to cause a denial of service, information leak, or potentially remote code execution. +Fixed: 1.9.2-1+deb10u14.2.1-4.4.14.4.2-4.4.5
2968495If {{switchd}} requires more time to update port or bond configuration after the port or bond flaps, the {{systemd}} watchdog times out. As result, {{systemd}} might assume that {{switchd}} is unresponsive and restarts it.4.2.1-4.4.24.4.3-4.4.5, 5.1.0-5.6.0
2961008SNMP reports the same {{ifType}} of {{ethernetCsmacd(6)}} for loopback interfaces.3.7.15-4.4.2, 5.0.0-5.0.14.4.3-4.4.5, 5.1.0-5.6.0
2951110The {{net show time ntp servers}} command does not show any output with the management VRF.3.7.15-3.7.16, 4.1.1-4.4.5, 5.0.0-5.6.0
2940051In an MLAG configuration with traditional bridges, MAC addresses are seen over peer link during {{ifreload}} when adding new VLANS or bridges. 3.7.14.2-3.7.15, 4.3.0-4.4.53.7.16, 5.0.0-5.6.0
2902013The NCLU commit command adds a five second delay.4.2.1-4.4.5
2896450On the Dell N3248PXE switch, fixed RJ45 interfaces with PoE neighbors can end up in {{Paused}} mode after a {{switchd}} restart, which blocks traffic on that interface. To work around this issue, restart {{switchd}} a second or third time until all interfaces are functioning correctly, or reboot the switch.4.3.0-4.4.5
2893895CVE-2020-35498: A vulnerability was found in openvswitch. A limitation in the implementation of userspace packet parsing can allow a malicious user to send a specially crafted packet causing the resulting megaflow in the kernel to be too wide, potentially causing a denial of service. The highest threat from this vulnerability is to system availability. +Vulnerable: <= 2.8.90-1-cl4u5 +Fixed: 2.8.90-1-cl4u6, 2.8.90-1-cl4.4.0u1, 2.8.90-1-cl5.0.0u84.0.0-4.3.24.4.0-4.4.5, 5.1.0-5.6.0
2891255CVE-2021-39925: Buffer overflow in the Bluetooth SDP dissector in Wireshark 3.4.0 to 3.4.9 and 3.2.0 to 3.2.17 allows denial of service via packet injection or crafted capture file. +Vulnerable: <= 2.6.20-0+deb10u1 +Fixed: 2.6.20-0+deb10u24.0.0-4.4.1, 5.0.0-5.6.04.4.2-4.4.5
2890681CVE-2021-42771: relative path traversal in Babel, a set of tools for internationalising Python applications, could result in the execution of arbitrary code. +Vulnerable: 2.6.0+dfsg.1-1 +Fixed: 2.6.0+dfsg.1-1+deb10u14.0.0-4.4.1, 5.0.0-5.6.04.4.2-4.4.5
2866080On the Maverick S4148T switch with MLAG, Cumulus Linux drops LACP, ARP, LLDP and BGP traffic.4.3.0-4.4.5
2854787An unexpected software system shutdown can occur due to a thermal zones issue in the {{hw-management}} package. The following message might appear in {{/var/log/syslog}} before the shutdown: + +thermal thermal_zoneX: critical temperature reached (33 C), shutting down +4.3.0-4.3.24.4.0-4.4.5, 5.1.0-5.6.0
2854784After building VLAN or VXLAN interfaces, MLAG becomes unstable.4.3.0-4.4.14.4.2-4.4.5, 5.0.0-5.6.0
2845531If you update the MAC address of an SVI when the SVI is in a {{protodown}} state (for example, when no bridge ports that carry this VNI are operationally up or if the MAC address of the SVI's parent bridge changes), {{clagd}} does not notice the change. The MLAG peer incorrectly maintains a PERMANENT neighbor entry for the SVI IP that points to the old MAC address.4.2.1-4.4.55.0.0-5.6.0
2838905On Broadcom ARM switches, the NTP clock slowly drifts to a very high offset (over 500ms) and the clock is not able to synchronize. +To work around this issue, use the {{chrony}} implementation of NTP instead of {{ntpd}}. {{chrony}} synchronizes the system clock faster and with better accuracy. + +Instructions for using {{chrony}} are here : https://docs.nvidia.com/networking-ethernet-software/knowledge-base/Network-Solutions/Chrony-on-Cumulus-Linux/4.3.0-4.4.5
2820565SNMP does not start and you see errors similar to the following: + +cumulus@switch:~$ sudo systemctl status snmpd.service +snmpd.service - Simple Network Management Protocol (SNMP) Daemon. + Loaded: loaded (/lib/systemd/system/snmpd.service; enabled; vendor preset: enabled) + Active: failed (Result: exit-code) since Mon 2021-10-11 14:38:13 UTC; 1min 8s ago + Process: 1987 ExecStart=/usr/sbin/snmpd $SNMPDOPTS -f (code=exited, status=1/FAILURE) + Main PID: 1987 (code=exited, status=1/FAILURE) + +To work around this issue, run the {{sudo systemctl restart snmpd.service}} command.4.3.0-4.4.55.0.0-5.6.0
2803044In an EVPN configuration with IP or MAC mobility, higher MM EVPN routes do not remove the old ARP entries during VIP migration between VTEP racks.3.7.14.2-3.7.15, 4.3.0-4.4.53.7.16
2794766The Mellanox 3700C switch reports a slow memory leak in sx_sdk. Memory increases by about 240B/hour and does not free up.4.3.0-4.4.55.0.0-5.6.0
2792616If a neighbor entry (ARP or NDP) is used as a next hop of a route that is synchronized into hardware, the neighbor entry is not removed from hardware after the neighbor is no longer reachable. As a result, routed traffic matching this prefix is incorrectly hardware forwarded through the stale neighbor information.4.3.0-4.4.55.0.0-5.6.0
2783611If you remove ports from a bridge and add IP addresses in one {{ifreload}}, connected routes are bound to the wrong routing information field.4.3.0-4.4.14.4.2-4.4.5
2782033The following vulnerabilities have been announced in the openssl packages: +CVE-2021-3711: buffer overflow vulnerability in SM2 decryption. +CVE-2021-3712: buffer overrun when processing ASN.1 strings in the X509_aux_print() function. +More details at https://www.openssl.org/news/secadv/20210824.txt . +Vulnerable: <= 1.1.1d-0+deb10u6 +Fixed: 1.1.1d-0+deb10u74.0.0-4.4.14.4.2-4.4.5
2781537In Cumulus VX, the iptables FORWARD chain does not count hits. To work around this issue, use {{ -t mangle -A PREROUTING}} instead of {{FORWARD}}.4.3.0-4.4.55.0.0-5.6.0
2771871IPv4 and IPv6 neighbor entries in a FAILED state are incorrectly programmed into hardware as FORWARD entries instead of TRAP entries. Traffic is forwarded to these neighbors with a destination MAC address of 00:00:00:00:00:00 instead of trapping them to the CPU to resolve the correct MAC address. + +This affects failed neighbor entries on routed interfaces that are not SVIs.4.3.0-4.4.14.4.2-4.4.5
2771653When using W-ECMP, the weights for various BGP next hops can sometimes be in the range of 100s or more, which consumes a lot of hardware space.4.3.0-4.4.5
2754791Remote MAC addreses in zebra are out of sync with {{bgpd}}. The zebra MAC addresses point to an incorrect (old) VTEP IP address and the sequence number is one higher than in BGP. 3.7.14.2-3.7.16, 4.3.0-4.4.5
2754691CVE-2021-3672: in c-ares, a library that performs DNS requests and name resolution asynchronously, missing input validation of hostnames returned by DNS servers can lead to output of wrong hostnames (leading to Domain Hijacking). +Vulnerable: 1.14.0-1 +Fixed: 1.14.0-1+deb10u14.0.0-4.4.14.4.2-4.4.5
2754685CVE-2021-38165: lynx, a non-graphical (text-mode) web browser, does not properly handle the userinfo subcomponent of a URI, which can lead to leaking of credential in cleartext in SNI data. +Vulnerable: 2.8.9rel.1-3 +Fixed: 2.8.9rel.1-3+deb10u14.0.0-4.4.14.4.2-4.4.5
2754679CVE-2020-26558 / CVE-2021-0129: Bluez does not properly check permissions during pairing operation, which could allow an attacker to impersonate the initiating device. +CVE-2020-27153: a double free flaw in the disconnect_cb() routine in the gattool. A remote attacker can take advantage of this flaw during service discovery for denial of service, or potentially, execution of arbitrary code. +Vulnerable: <= 5.50-1.2~deb10u1 +Fixed: 5.50-1.2~deb10u24.0.0-4.4.14.4.2-4.4.5
2753955On the Lenovo MSN3700 switch, if you try to configure an interface with a link speed of 200G, the configuration fails.4.2.1-4.4.55.0.0-5.6.0
2747605CVE-2021-3246: a buffer overflow in libsndfile, a library +for reading/writing audio files, which could result in denial of service +or potentially the execution of arbitrary code when processing a +malformed audio file. +Vulnerable: 1.0.28-6 +Fixed: 1.0.28-6+deb10u14.0.0-4.4.14.4.2-4.4.5
2743186When you use MD5 passwords and you configure a non-default VRF before the default VRF in the {{/etc/frr/frr.conf}} file, numbered BGP sessions do not establish.3.7.15-5.1.05.2.0-5.6.0
2739690CVE-2021-22918: An out-of-bounds read was discovered in the uv__idna_to_ascii() function of Libuv, an asynchronous event notification library, which could result in denial of service or information disclosure. +Vulnerable: 1.24.1-1 +Fixed: 1.24.1-1+deb 10u14.0.0-4.4.14.4.2-4.4.5
2739639CVE-2021-36222: It was discovered that the Key Distribution Center (KDC) in krb5, the MIT implementation of Kerberos, is prone to a NULL pointer dereference flaw. An unauthenticated attacker can take advantage of this flaw to cause a denial of service (KDC crash) by sending a request containing a PA-ENCRYPTED-CHALLENGE padata element without using FAST. +Vulnerable: <= 1.17-3+deb10u1 +Fixed: 1.17-3+deb10u24.0.0-4.4.14.4.2-4.4.5
2739402The destination MAC address of ERSPAN GRE packets is set to all zeros.4.3.0-4.4.55.0.0-5.6.0
2734122CVE-2021-33910: The Qualys Research Labs discovered that an attacker-controlled allocation using the alloca() function could result in memory +corruption, allowing to crash systemd and hence the entire operating system. Details can be found at https://www.qualys.com/2021/07/20/cve-2021-33910/denial-of-service-systemd.txt . +Vulnerable: <= 241-7~deb10u7 +Fixed: 241-7~deb10u84.0.0-4.4.14.4.2-4.4.5
2734119The ESI line in the {{show bgp l2vpn evpn route}} command output always shows VNI: 0. This is a cosmetic software issue.4.3.0-4.4.55.0.0-5.6.0
2734103{{ACL [No More Resources]}} messages keep appearing and you can't reinstall the ACL.4.3.0-5.1.05.2.0-5.6.0
2728207CVE-2021-3570: A flaw was found in the ptp4l program of the linuxptp package. A missing length check when forwarding a PTP message between ports allows a remote attacker to cause an information leak, crash, or potentially remote code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. 3.7.0-3.7.16, 4.0.0-4.4.5
2728206CVE-2021-3570: A flaw was found in the ptp4l program of the linuxptp package. A missing length check when forwarding a PTP message between ports allows a remote attacker to cause an information leak, crash, or potentially remote code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. 3.7.0-3.7.16, 4.0.0-4.4.5
2728205CVE-2021-3570: A flaw was found in the ptp4l program of the linuxptp package. A missing length check when forwarding a PTP message between ports allows a remote attacker to cause an information leak, crash, or potentially remote code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. 3.7.0-4.4.14.4.2-4.4.5
2728134CVE-2021-27212: A vulnerability in the Certificate List Exact Assertion validation was discovered in OpenLDAP, a free implementation of the Lightweight Directory Access Protocol. An unauthenticated remote attacker can take advantage of this flaw to cause a denial of service (slapd daemon crash) via specially crafted packets. +Vulnerable: <= 2.4.47+dfsg-3+deb10u5 +Fixed: 2.4.47+dfsg-3+deb10u64.0.0-4.3.24.4.0-4.4.5
2728119When VRF devices are deleted and reconfigured (for example, during a networking service restart), dynamic BGP neighbors might fail to reestablish. +To work around this issue, restart FRR with the {{sudo systemctl restart frr}} command.4.3.0-4.4.55.0.0-5.6.0
2713888With the {{ip-acl-heavy}} TCAM profile, the following message might appear after you install an ACL with NCLU or cl-acltool and the ACL might not work correctly. + +hal_flx_acl_util.c:378 ERR hal_flx_acl_resource_release resource region 0 size 7387 create failed: No More Resources + +To work around this issue, change the TCAM profile to {{acl-heavy}} or {{ip-acl-heavy}} with ACL non-atomic mode.3.7.15-5.0.15.1.0-5.6.0
2711533On the AS7326-56X switch, the link lights for 25G ports configured to work at 1G do not illuminate.4.2.1-4.4.5
2710208The {{net show bgp neighbor}} command output shows the BFD status as UP even when the BGP neighbor is not established, such as when the interface is down.4.2.1-4.4.5
2706744In an EVPN multihoming configuration, the VTEP continues to advertise a stale route after an extended MAC mobility event.4.3.0-4.4.14.4.2-4.4.5
2700767Following an event that causes the peerlink bond MAC address to change, such as a slave port state change, MLAG interfaces might be suspended due to a peer IP mismatch. This behavior is seen when you use a MLAG peer IP linklocal configuration.3.7.12-3.7.15, 4.3.0-4.4.53.7.16
2695526CVE-2021-3580 CVE-2021-20305: Multiple vulnerabilities were discovered in nettle, a low level cryptographic library, which could result in denial of service (remote crash in RSA decryption via specially crafted ciphertext, crash on ECDSA signature verification) or incorrect verification of ECDSA signatures. +Vulnerable: 3.4.1-1 +Fixed: 3.4.1-1+deb10u14.0.0-4.3.24.4.0-4.4.5
2690017When you remove a bond member, then re-add it, you might see a {{Parameter Error}} failure in {{{syslog}} and {{switchd.log}}: + +sx_sdk: LAG: Can't add port (0x00012400) to lag. Port has vports configured for it (Parameter Error). +switchd[4529]: hal_mlx_bond.c:582 ERR bond32 member swp32 add failed: Parameter Error + +To work around this issue, restart {{switchd}}.4.3.0-4.3.24.4.0-4.4.5
2687159CVE-2018-25009 CVE-2018-25010 CVE-2018-25011 CVE-2018-25012 CVE-2018-25013 CVE-2018-25014 CVE-2020-36328 CVE-2020-36329 CVE-2020-36330 CVE-2020-36331 CVE-2020-36332: Multiple vulnerabilities were discovered in libwebp, the implementation of the WebP image format, which could result in denial of service, memory disclosure or potentially the execution of arbitrary code if malformed images are processed. +Vulnerable: 0.6.1-2 +Fixed: 0.6.1-2+deb10u14.0.0-4.3.24.4.0-4.4.5
2685994When you use the NVUE command {{nv set interface lo router ospf area}} to configure OSPF on a loopback interface, the configuration fails to apply. +To work around this issue, configure the loopback interface in the desired OSPF area with the {{nv set vrf default router ospf area 0 network}} command and reference the assigned prefix of the loopback interface. For example: + +cumulus@leaf01:~$ nv set vrf default router ospf area 0 network 10.10.10.1/32 +4.0.0-5.0.15.1.0-5.6.0
2682971CVE-2020-12762: integer overflow in the json-c JSON library, which could result in denial of service or potentially the execution of arbitrary code if large malformed JSON files are processed. +Vulnerable: 0.12.2+cl4u1 +Fixed: 0.12.2+cl4.4.0u14.0.0-4.3.24.4.0-4.4.5
2682780Adding a route map configuration after a MAC access list configuration line causes the route map configuration to be applied incorrectly. +To work around this issue, add the MAC access list configuration to the end of the {{/etc/frr/frr.conf}} file.4.2.0-4.3.24.4.0-4.4.5
2679950CVE-2021-25217: parsing of stored leases by dhclient or dhcpd has an incorrect length check that may cause a crash. +Vulnerable: <= 4.3.1-6-cl3.7.14u1 +Fixed: 4.3.1-6-cl3.7.16u13.7.0-3.7.15, 4.0.0-4.3.23.7.16, 4.4.0-4.4.5
2671667CVE-2021-23017: off-by-one in Nginx, a high-performance web and reverse proxy server, which could +result in denial of service and potentially the execution of arbitrary code. +Vulnerable: <= 1.14.2-2+deb10u3 +Fixed: 1.14.2-2+deb10u44.0.0-4.3.24.4.0-4.4.5
2669873In an EVPN multihoming configuration, ARP/ND traffic coming in one switch is being sent back out the originating bond on the other switches in the ES on remote PE switches. Normally Split Horizon filtering prevents this kind of traffic at the remote PE. 4.3.0-4.3.24.4.0-4.4.5
2669858OpenSSH is vulnerable to CVE-2020-14145, as described in https://www.fzi.de/fileadmin/user_upload/2020-06-26-FSA-2020-2.pdf. +This is an information leak in algorithm negotiation that can allow man-in-the-middle attacks on initial connection attempts without a previously stored server host key on the client. If desired, mitigation using UpdateHostKeys and HostKeyAlgorithms is also given in that paper.3.7.14-3.7.16, 4.0.0-4.4.5
2669073On Spectrum, Spectrum-2, and Spectrum-3 switches, the {{l1-show}} command shows the wrong data when the MST service is stopped. +To work around this issue, start the MST service with the {{sudo mst start}} command.4.3.0-4.3.24.4.0-4.4.5
2666838CVE-2021-31535: missing length validation in various functions provided by libx11, the X11 client-side library, allow to inject X11 protocol commands on X clients, leading to authentication bypass, denial of service or potentially the execution of arbitrary code. +Vulnerable: <= 1.6.7-1+deb10u1 +Fixed: 1.6.7-1+deb10u24.0.0-4.3.24.4.0-4.4.5
2663479CVE-2021-3520: integer overflow flaw in lz4, a fast LZ compression algorithm library, resulting in memory corruption. +Vulnerable: 1.8.3-1 +Fixed: 1.8.3-1+deb10u14.0.0-4.3.24.4.0-4.4.5
2656527CVE-2020-18032: A buffer overflow was discovered in Graphviz, which could potentially result in the execution of arbitrary code when processing a malformed file. +Vulnerable: 2.40.1-6 +Fixed: 2.40.1-6+deb10u14.0.0-4.3.24.4.0-4.4.5
2648658If you try to use more than one percent of {{max-ecmp-nexthops}}, you get an error indicating a failure.3.7.15-4.3.24.4.0-4.4.5
2644053The following vulnerabilities have been announced in BIND: +CVE-2021-25214: a malformed incoming IXFR transfer could trigger an assertion failure in named, resulting in denial of service. +CVE-2021-25215: named could crash when a DNAME record placed in the ANSWER section during DNAME chasing turned out to be the final answer to a client query. +CVE-2021-25216: the SPNEGO implementation used by BIND is prone to a buffer overflow vulnerability. This update switches to use the SPNEGO implementation from the Kerberos libraries. +Vulnerable: <= 9.11.5.P4+dfsg-5.1+deb10u4 +Fixed: 9.11.5.P4+dfsg-5.1+deb10u54.0.0-4.3.24.4.0-4.4.5
2639303When you use NCLU to delete a bond, then add an interface, NCLU reports an error similar to the following: +ERROR: 'NoneType' object has no attribute 'conf_key_value_multiple_values' +See /var/log/netd.log for more details.4.3.0-4.4.5
2632379When you upgrade the switch with {{apt-get upgrade}}, the {{kexec-tools}} package is not installed, which causes the Smart System Manager fast restart mode to work incorrectly.4.3.0-4.3.24.4.0-4.4.5
2628515CVE-2020-12695: hostapd does not properly handle UPnP subscribe messages under certain conditions, allowing an attacker to cause a denial of service. +Vulnerable: <= 2.8.0-cl3.7.15u2 +Fixed: 2.8.0-cl3.7.15u33.7.14-3.7.14.2, 4.3.0-4.3.23.7.15-3.7.16, 4.4.0-4.4.5
2618227The NCLU {{net show bridge macs}} command displays permanent MAC addresses for trunked VLANs.4.3.0-4.4.5
2617000CVE-2021-26933 CVE-2021-27379 +Multiple vulnerabilities have been discovered in the Xen hypervisor, which could result in denial of service, privilege escalation or memory disclosure. +Vulnerable: < 4.11.4+99-g8bce4698f6-1 +Fixed: 4.11.4+99-g8bce4698f6-14.0.0-4.3.24.4.0-4.4.5
2616998CVE-2021-23358: missing input sanitising in the template() function of the Underscore JavaScript library could result in the execution of arbitrary code. +Vulnerable: 1.9.1~dfsg-1 +Fixed: 1.9.1~dfsg-1+deb10u14.0.0-4.3.24.4.0-4.4.5
2616987CVE-2020-6851 CVE-2020-8112 CVE-2020-15389 CVE-2020-27814 CVE-2020-27823 CVE-2020-27824 CVE-2020-27841 CVE-2020-27842 CVE-2020-27843 CVE-2020-27845: Multiple vulnerabilities have been discovered in openjpeg2, the open-source JPEG 2000 codec, which could result in denial of service or the execution of arbitrary code when opening a malformed image. +Vulnerable: <= 2.3.0-2+deb10u1 +Fixed: 2.3.0-2+deb10u24.0.0-4.3.24.4.0-4.4.5
2616976Multiple vulnerabilities were discovered in cURL, an URL transfer library: +CVE-2020-8169: partial password leak to DNS servers. +CVE-2020-8177: malicious server could cause curl -J -i to overwrite a local file. +CVE-2020-8231: libcurl with CURLOPT_CONNECT_ONLY information leak due to wrong connection. +CVE-2020-8284: PASV response could trick curl into connecting back to an arbitrary IP address and port. +CVE-2020-8285: libcurl could run out of stack space using FTP wildcard matching (CURLOPT_CHUNK_BGN_FUNCTION). +CVE-2020-8286: failure to verify that OSCP response matches intended certificate. +CVE-2021-22876: libcurl did not strip user credentials from URL when populating Referer HTTP request header. +CVE-2021-22890: libcurl using HTTPS proxy with TLS1.3 could use the wrong session ticket and bypass server TLS certificate check. +Vulnerable: <= 7.64.0-4+deb10u1 +Fixed: 7.64.0-4+deb10u24.0.0-4.3.24.4.0-4.4.5
2616967CVE-2021-28957: lxml, a Python binding for the libxml2 and libxslt libraries, did not properly sanitize its input. This would allow a malicious user to mount a cross-site scripting attack. +Vulnerable: <= 4.3.2-1+deb10u2 +Fixed: 4.3.2-1+deb10u34.0.0-4.3.24.4.0-4.4.5
2616964CVE-2021-27291: Pygments, a syntax highlighting package written in Python 3, used regular expressions which could result in denial of service. +Vulnerable: <= 2.3.1+dfsg-1+deb10u1 +Fixed: 2.3.1+dfsg-1+deb10u24.0.0-4.3.24.4.0-4.4.5
2616954CVE-2021-3449: A NULL pointer dereference was found in the signature_algorithms processing in OpenSSL, a Secure Sockets Layer toolkit, which could result in denial of service. +Vulnerable: <= 1.1.1d-0+deb10u5 +Fixed: 1.1.1d-0+deb10u64.0.0-4.3.24.4.0-4.4.5
2614016The switch firmware incorrectly identifies Lenovo LR4 transceivers (part number 00YD278) and does not set the laser levels properly, which can prevent the link from coming up or might cause the transceiver to be identified as a 1G module.4.2.0-4.3.24.4.0-4.4.5
2599274On Mellanox Spectrum switches, when there is an MSTP forwarding state change on a bonds (for example, when the state changes from blocking to forwarding), the MSTP hardware table might set some VLANs to blocking when they should be forwarding. A a result, all packets on these VLANs drop at ingress. +To recover from this state, flap the bond interface (not the physical swp) by running {{ifdown <bond_name> ; sleep 1 ; ifup <bond_name>}}.4.3.0-4.4.55.0.0-5.6.0
2582639On NVIDIA Spectrum switches, BUM traffic might be dropped during VXLAN decapsulation in an EVPN multihoming environment after multiple PIM uplink interfaces flap.4.3.0-4.3.24.4.0-4.4.5
2578872CVE-2021-20270: It was discovered that Pygments, a syntax highlighting package written in Python, could be forced into an infinite loop, resulting in denial of service. +Vulnerable: 2.3.1+dfsg-1 +Fixed: 2.3.1+dfsg-1+deb10u14.0.0-4.3.24.4.0-4.4.5
2578870CVE-2020-35523 CVE-2020-35524: Two vulnerabilities have been discovered in the libtiff library and the included tools, which may result in denial of service or the execution of arbitrary code if malformed image files are processed. +Vulnerable: <= 4.1.0+git191117-2~deb10u1 +Fixed: 4.1.0+git191117-2~deb10u24.0.0-4.3.24.4.0-4.4.5
2577499QSFP+ 40G optics do not work on Spectrum platforms.4.3.0-4.3.24.4.0-4.4.5
2574368When you run the NCLU {{net add bgp maximum-paths ibgp}} command, FRR restarts unexpectedly. +To work around this issue, either use the {{vtysh}} commands or edit the {{/etc/frr/frr.conf}} file directly, then run {{systemctl reload frr}}.4.1.1-4.4.5
2566880CVE-2021-27803: A vulnerability was discovered in how p2p/p2p_pd.c in wpa_supplicant before 2.10 processes P2P (Wi-Fi Direct) provision discovery requests. It could result in denial of service or other impact (potentially execution of arbitrary code), for an attacker within radio range.3.7.14-3.7.14.2, 4.0.0-4.3.23.7.15-3.7.16, 4.4.0-4.4.5
2564534Several vulnerabilities have been discovered in the GRUB2 bootloader. +CVE-2020-14372: It was discovered that the acpi command allows a privileged user to load crafted ACPI tables when Secure Boot is enabled. +CVE-2020-25632: A use-after-free vulnerability was found in the rmmod command. +CVE-2020-25647: An out-of-bound write vulnerability was found in the grub_usb_device_initialize() function, which is called to handle USB device initialization. +CVE-2020-27749: A stack buffer overflow flaw was found in grub_parser_split_cmdline. +CVE-2020-27779: It was discovered that the cutmem command allows a privileged user to remove memory regions when Secure Boot is enabled. +CVE-2021-20225: A heap out-of-bounds write vulnerability was found in the short form option parser. +CVE-2021-2023: A heap out-of-bound write flaw was found caused by mis-calculation of space required for quoting in the menu rendering.4.0.0-4.3.24.4.0-4.4.5
2556782CVE-2021-0326: An issue has been found in wpa, a set of tools to support WPA and WPA2 (IEEE 802.11i). Missing validation of data can result in a buffer over-write, which might lead to a DoS of the wpa_supplicant process or potentially arbitrary code execution. +Vulnerable: <= 2.8.0-cl3.7.14u1, <= 2.8.0-cl4.2.1u13.7.14-3.7.14.2, 4.0.0-4.3.23.7.15-3.7.16, 4.4.0-4.4.5
2556777CVE-2021-26937: A flaw in the handling of combining characters in screen, a terminal multiplexer with VT100/ANSI terminal emulation can result in denial of service, or potentially the execution of arbitrary code via a specially crafted UTF-8 character sequence. +Vulnerable: 4.6.2-3 +Fixed: 4.6.2-3+deb10u14.0.0-4.3.24.4.0-4.4.5
2556772The {{net show clag verify-vlans}} command fails with the following log: + +WARNING: '/usr/bin/clagctl verifyvlans' failed due to: +Command '['/usr/bin/clagctl', 'verifyvlans']' returned non-zero exit status 1 + +To work around this issue, run the {{/usr/bin/clagctl verifyvlans}} command or the {{net show clag verbose}} command.4.2.1-4.4.5
2556730CVE-2020-8625: A buffer overflow vulnerability was discovered in the SPNEGO implementation affecting the GSSAPI security policy negotiation in BIND, a DNS server implementation, which could result in denial of service (daemon crash), or potentially the execution of arbitrary code. +Vulnerable: <= 9.11.5.P4+dfsg-5.1+deb10u2 +Fixed: 9.11.5.P4+dfsg-5.1+deb10u34.0.0-4.3.24.4.0-4.4.5
2556369If you use NCLU to configure an ACL for eth0, you can't designate it as an INPUT rule; the rule is automatically created as a FORWARD rule in the {{/etc/cumulus/acl/policy.d/50_nclu_acl.rules}} file. +To work around this issue, manually create an ACL in the {{/etc/cumulus/acl/policy.d/}} file with "-A INPUT -i eth0".4.2.1-4.4.5
2556082The NCLU {{net del vrf}} command does not delete a numbered VRF. For example: + +cumulus@leaf01:~$ net del vrf 55 +ERROR: Command not found +4.2.1-4.4.5
2556081You cannot set the time zone can with NCLU commands.4.1.1-4.4.5
2555873On Mellanox switches, egress ACLs with VLAN keys do not filter layer 2 multicast or broadcast traffic.4.3.0-4.4.5
2555763The NCLU {{net del bgp neighbor}} command does not delete the neighbor and displays an error similar to the following: + +ERROR: --- /run/nclu/frr/frr.conf.scratchpad.baseline 2021-01-04 17:23:59.250463331 +0000 ++++ /run/nclu/frr/frr.conf.scratchpad 2021-01-04 17:25:59.213673980 +0000 + +To work around this issue, use the FRR command to delete a neighbor.4.3.0-4.4.5
2555613The {{net show configuration commands}} command incorrectly displays the NCLU syntax to disable IPv6 forwarding on interfaces. For example: + +# net show configuration commands +net add vlan 1 ip6-forward off + +The correct NCLU command to disable IPv6 forwarding is {{net add vlan 1 ipv6 forward off}} (without the hyphen).4.2.1-4.4.5
2555318If you try to enable BGP graceful restart when it is already enabled, you see an error similar to the following in the {{frr.log}} file: + +2020-12-07T19:20:26.004333+00:00 cumulus bgpd[4954]: VRF default: Handle GR command GLOBAL_GR_CMD, current GR state GLOBAL_GR, new GR state GLOBAL_INVALID + +This error has no functional impact.4.3.0-4.4.5
2554986The {{ethtool}} utility doesn't contain the latest values, as a result the {{Revision Compliance}} field shows {{Unallocated}}. 4.2.1-4.4.5
2554812If the RMAC of a layer 3 SVI changes, the {{show vrf vni}} command is not updated with the new value. However, the new RMAC is seen in the {{show evpn vni}} command and is present on self-originated EVPN routes.4.2.1-4.4.5
2554783If you apply an outbound route map to a BGP peer that uses {{set as-path prepend last-as}}, advertised locally-originated routes have the ASN of the peer prepended to the AS path. +This might trigger AS path loop prevention on the peer, where the peer ignores locally-originated prefixes.4.2.1-4.4.55.0.0-5.6.0
2554709The IP address specified in the {{ip pim use-source}} command configured on the loopback interface should be inherited by unnumbered interfaces during their Primary IP address selection process. If {{ip pim use-source}} is configured on the loopback after an unnumbered interface has already selected their Primary IP address, the unnumbered interface does not update its Primary IP address to be the new use-source value until after there is a netlink update for that interface. +To work around this issue, configure {{ip pim use-source}} on each unnumbered interface directly or ensure {{ip pim use-source}} is applied to the loopback before other unnumbered interfaces are enabled for PIM.3.7.13-3.7.16, 4.2.1-4.4.5
2554670When you have a large number of ACLs, the {{cl-acltool -L ip}} and {{cl-resource-query}} commands take a long time to complete.4.3.0-4.4.5
2554582On switches with the Maverick ASIC, control traffic is dropped due to receive buffering.4.2.0-4.4.5
2554533On the ARM platform, NTP peer associations slowly increase to larger offsets (~500ms).4.0.0-4.4.5
2554466Kernel routes added by {{iproute2}} are missing in FRR after an interface flap. +To work around this issue, configure a static route in FRR. +4.2.1-4.4.5
2554299In a VRRP configuration, BGP unnumbered sessions for VRFs fail to establish after a networking restart.4.2.0-4.3.24.4.0-4.4.5
2554222The NCLU command to enable bridge learning fails. +As a work around, enable bridge learning in the {{/etc/network/interface}} file. For example: + +auto vni-30 +iface vni-30 + vxlan-id 30 + bridge-access 30 + bridge-arp-nd-suppress on + bridge-learning on + vxlan-local-tunnelip 10.10.10.1 + mstpctl-bpduguard yes + mstpctl-portbpdufilter yes + mtu 9166 +4.2.1-4.4.5
2554218MLAG packets received on the peer link are dropped instead of routed.4.2.0-4.4.5
2554202The output of the {{net show commit}} command does not show the last commit or the specified commit number but is empty instead.4.2.1-4.4.5
2553989Default policer configured for LACP as an INPUT chain rule in 00control_plane.rules is meant to protect CPU from an LACP storm. When LACP storm is originating out of a single bond or bond member interface in a switch with multiple bond interfaces, there is a possibility of other LACP bond interface(s) going down.4.2.1-4.4.5
2553887When using TACACS+ configured with a DEFAULT user providing privilege level lower than 16, TACACS+ configured users with privilege level 16 access might not be able to run privilege level 16 NCLU commands, such as {{net add}} and {{net del}} and see an error similar to the following: + +ERROR: You do not have permission to execute that command. + +To work around this issue, remove the DEFAULT user from the TACACS+ server.3.7.7-3.7.16, 4.0.0-4.4.5
2553677When you configure an SNMPv3 user with the {{net-snmp-config}} configuration command from the {{libsnmp-dev}} package, you get an error message similar to the one below: + +cumulus@switch:mgmt-vrf:~$ sudo net-snmp-config --create-snmpv3-user -a shaauthpass -x aesprivpass -A SHA -X AES userSHAwithAES +adding the following line to /var/lib/snmp/snmpd.conf: + createUser userSHAwithAES SHA "shaauthpass" AES "aesprivpass" +adding the following line to /snmp/snmpd.conf: + rwuser userSHAwithAES +touch: cannot touch ‘/snmp/snmpd.conf’: No such file or directory +/usr/bin/net-snmp-create-v3-user: 144: /usr/bin/net-snmp-create-v3-user: cannot create /snmp/snmpd.conf: Directory nonexistent + +To work around this issue, use the NCLU command to configure SNMPv3 user parameters; for example: + +cumulus@switch:mgmt-vrf:~$ net add snmp-server username user999 auth-md5 user999password encrypt-des user999encryption + +Alternatively, directly edit the {{/etc/snmp/snmpd.conf}} file as described in the documentation.3.7.13-3.7.16, 4.0.0-4.4.5
2553237The default NTP configuration is to use eth0 as the NTP source interface. In Cumulus Linux 4.0 and later, eth0 is in the management VRF by default; therefore the NTP service runs automatically in the management VRF. +NVIDIA does not recommend running NTP with a source interface other than eth0 as this can expose a security vulnerability. Changing the NTP source interface name with NCLU to a non-management VRF interface might result in NTP not functioning because the NTP service is still running in the management VRF. + +4.2.0-4.4.5
2553116When you manually set the link speed or duplex mode with ethtool to an unsupported value, then run a TDR check against the interface, you encounter a {{switchd}} service heartbeat failure. +To work around this issue, reboot the switch to clear the condition. Avoid setting the interface speed or duplex mode directly with ethtool.3.7.12-3.7.16, 4.0.0-4.4.5
2553015If a neighbour contains a special character in PortID for LLDP, the {{net show interface}} command does not display the LLDP information or the command might fail.3.7.10-3.7.16, 4.2.0-4.4.5
2552691On the EdgeCore AS4610 switch, the eth0 interface remains down when physically connected to a 1G interface. +To work around this issue, configure the link speed to 1000 and set auto-negotiation on for the eth0 interface, then flap eth0 with the {{ip link set eth0 down/up}} command to bring up the port.4.2.0-4.4.5
2552453On the Mellanox switch, RoCE with PFC configuration is not applied to all ports in hardware when a range is used in the {{traffic.conf}} file. +To work around this issue, use NCLU to configure RoCE with PFC or list individual ports in the {{traffic.conf}} file.4.2.0-4.4.5
2552309The following messages are seen on an Edgecord Minipack-AS8000 running Cumulus Linux 4.2.0: + +{code} +Hal_bcm_console.c:294 MMU config profile 0 prigroup 0: Service Pool 0 has no space and cannot be assigned +Hal_bcm_console.c:294 MMU config port 0 idx 0: Pool 0 has no space and cannot be assigned +{code} + +These messages are for internal validation purposes only and can be safely ignored. + +4.2.0-4.4.5
2552294NCLU restarts FRR when removing a BGP VRF IPv4 aggregate-address command. + 3.7.12-3.7.16, 4.0.0-4.4.5
2552266OpenSSH scp is vulnerable to CVE-2020-15778, where clients that have authorized access to the SSH server can execute commands on the server by copying maliciously named files. +The two scenarios where an exploit may be useful to an attacker: +-The user is authorized to {{scp}} but not {{ssh}} (based on the {{command}} option in the {{authorized_keys}} file), so this vulnerability can allow executing a remote command on the target computer when not authorized to do so. +-An attacker plants a maliciously named file in a directory tree that someone later uses {{scp -r}} to copy over to the target computer. +Be aware that restricting users to {{scp}} by using the {{command}} option in the {{authorized_keys}} file is not effective in preventing those users from executing arbitrary commands on the server. +If you want to use {{scp -r}} to copy directory trees, avoid copying directory trees to which attackers may have added maliciously-named files. Archiving the directory tree with {{tar}}, {{zip}}, or a similar program, then copying the archive over to be extracted on the server avoids having to use {{scp -r}} altogether. In addition, OpenSSH provides {{sftp}}, which you can use instead of {{scp}} to copy files. +To disable scp completely, use {{/bin/chmod 0 /usr/bin/scp}} .3.7.14-3.7.16, 4.0.0-4.4.5
2551666If you modify an interface name, then reuse the previous interface name for a different VLAN, the {{ifreload -a}} command generates an error similar to the following: + +warning: <interface-name>: interface not recognized - please check interface configuration + +4.1.0-4.4.5
2551578When you configure a bridge in the {{/etc/network/interfaces}} file, then try to reconfigure the bridge to be a VRF interface with the same name, {{ifreload}}/{{ifup}} commands fail with an {{invalid table id}} or {{unable to get vrf table id}} error.3.7.12-3.7.16, 4.0.0-4.4.5
2551565If you toggle VRRP priority values between VRRP routers, then restart {{switchd}}, a few IPv6 VRRP instances might not converge. As a result, both the VRRP routers act as master routers for the impacted IPv6 VRRP instances. IPv4 VRRP instances are not affected. +To work around this issue, remove, then add back the VRRP configuration with NCLU or vtysh commands.3.7.13-3.7.16, 4.2.0-4.4.5
2551335When TACACS+ is configured and the management VRF is enabled, users with privilege level 13 are prevented from running {{ip}} and {{cat}} commands.4.0.0-4.4.5
2551305The {{net show configuration}} command provides the wrong {{net add}} command for ACL under the VLAN interface. + +3.7.12-3.7.16, 4.1.0-4.4.5
2551273On a Mellanox SN2010 switch, the Locator LED is on after you upgrade Cumulus Linux.4.1.0-4.4.5
2551221When span-to-cpu is enabled on L3 swp interface with an IP address configured, packets with destination IP as switchport's IP address don't reach switchport. To capture packets directed towards switcport's IP, disable span-to-cpu and use tcpdump on swichport instead.4.2.0-4.4.5
2551111If a remote EVPN Sticky MAC [Static MAC address] is unexpectedly learned dynamically on a local interface, the selected entries in zebra and BGP are in an inconsistent state. +zebra increments the local MAC mobility sequence number and considers the MAC address to be local, but BGP maintains the remote Sticky MAC as the best path selected. This results in zebra installing the local MAC address and BGP not updating the route for the MAC address.4.0.0-4.4.5
2550974On the Dell S3000 switch, after installing the Cumulus Linux 4.1.1 disk image without a license, the switch sends a link beat if a remote host port is configured.3.7.11-3.7.16, 4.1.1-4.4.5
2550793The NCLU {{net show bridge spanning-tree}} command displays the aging timer incorrectly. 3.7.12-3.7.16, 4.0.0-4.4.5
2550713Configuring the subinterface of a VXLAN uplink under another traditional bridge, which also has the VXLAN VNI enslaved, causes {{switchd}} to use high CPU due to very frequent VXLAN tunnel sync events. +To work around this issue, do not enslave the subinterface of a VXLAN layer 3 uplink under a traditional bridge in a VXLAN configuration.4.1.1-4.4.5
2550704On the Mellanox SN3420 switch, 25G SR optics only link up in force mode.4.3.0-4.3.24.4.0-4.4.5
2550642ACLs with SPAN target and in-interface as bond member are not supported on Spectrum-based switches 4.2.0-4.4.5
2550444Tab completion for the {{net show rollback description}} command returns information about a snapshot instead of context help. +To work around this issue, run the {{net show commit history}} command to find descriptions instead of the {{net show rollback description}} command.3.7.12-3.7.16, 4.0.0-4.4.5
2550443The {{net show rollback description <string>}} command returns an error even if the string matches a commit description. +To work around this issue, look for your string in the output of the {{net show commit history}} command (or grep for it there) instead.3.7.12-3.7.16, 4.0.0-4.4.5
2550243When you use {{nginx}} and {{restserver}} in management VRF to provide a REST API for the switch, {{nginx}} starts but {{restserver}} fails to start. +To work around this issue, comment out the {{Requires=}} line in the {{/lib/systemd/system/restserver.service}}. For example: + +#Requires=nginx.service restserver.socket +3.7.12-3.7.16, 4.0.0-4.4.5
2550056The ACCTON-DIAG option under the Cumulus Linux GRUB menu does not work. When you select this option, you see the following error: + +error: invalid signature. +Press any key to continue... +3.7.12-3.7.16, 4.1.1-4.4.5
2549925When you run an Ansible script to replace the {{/etc/network/interfaces}} file, then run the {{ifreload -a}} command, you see errors similar to the following: + +error: swp1s1.2: netlink: cannot set link swp1s1.2 up: operation failed with 'Network is down' (100) +warning: cmd '/bin/ip addr del 10.0.0.1/24 dev eth0' failed: returned 2 (RTNETLINK answers: Cannot assign requested address + +To work around this issue, run the {{ifreload -a}} command a second time.3.7.12-3.7.16, 4.0.0-4.4.5
2549872If you have an SVI with multiple VRR IP addresses and try to delete one of the VRR configurations, {{net commit}} or {{ifreload -a}} returns an error.3.7.12-3.7.16, 4.1.1-4.4.5
2549782The JSON format output of the {{net show bgp l2vpn evpn summary}} command shows the incorrect neighbour state. 3.7.12-3.7.16, 4.0.0-4.4.5
2549731When you create SPAN or ERSPAN rules in ebtables, the action fails to install if it is not in lowercase. Make sure that the SPAN or ERSPAN action is all lowercase; for example: + +[ebtables] +-A FORWARD --in-interface swp10 -j span --dport swp1 +3.7.12-3.7.16, 4.1.1-4.4.5
2549392When you configure an RD or RT with NCLU, you see duplicate VNI stanzas in the {{/etc/frr/frr.conf}} file. +To work around this issue, manually edit the {{etc/frr/frr.conf}} file to define {{advertise-all-vni}} before the RD or RT configuration within the l2vpn EVPN address family, then reload the FRR service with the {{sudo systemctl reload frr}} command.4.1.0-4.4.5
2549371When Optimized Multicast Flooding (OMF) is enabled with the {{bridge.optimized_mcast_flood = TRUE}} setting in the {{/etc/cumulus/switchd.conf}} file, the switch continues to flood IPv6 multicast traffic to all slave ports when there is no MLD join receive.3.7.11-4.3.24.4.0-4.4.5
2548924On the EdgeCore Minipack AS8000, storm control does not restrict unknown unicast, broadcast, or multicast traffic.4.1.1-4.4.5
2548657When you upgrade Cumulus Linux on the EdgeCore AS7726-32X or AS7326-56X switch, you might see firmware errors similar to the following: + +W: Possible missing firmware /lib/firmware/tigon/tg3_tso5.bin for module tg3 +W: Possible missing firmware /lib/firmware/tigon/tg3_tso.bin for module tg3 +W: Possible missing firmware /lib/firmware/tigon/tg3.bin for module tg3 + +You can safely ignore these error messages.3.7.12-3.7.16, 4.0.0-4.4.5
2548579The following security vulnerability has been announced: +CVE-2020-10531: An issue was discovered in International Components for Unicode (ICU) for C/C++ through 66.1. An integer overflow, leading to a heap-based buffer overflow, exists in the UnicodeString::doAppend() function in common/unistr.cpp.3.7.12, 4.0.0-4.4.53.7.13-3.7.16
2548315The following security advisory has been announced for bash: +CVE-2019-18276 Qualys scan QID 372268 setuid vulnerability +When bash or bash scripts are run setuid, bash is supposed to drop privileges, but does so incorrectly, so that an attacker with command access to the shell can use {{enable -f}} for runtime loading of a new builtin that calls {{setuid()}} to regain dropped privileges. +To work around this issue, do not make bash or bash scripts {{setuid}}.3.7.12-3.7.16, 4.0.0-4.4.5
2548310When the system boots, we might see " cumulus systemd-udevd[7566]: Process '/usr/bin/hw-management-thermal-events.sh add thermal_zone /sys /devices/virtual/thermal/thermal_zone25 thermal_zone25' failed with exit code 1" errors. + +These errors are result of user space acting on kernel events a bit slow. The mlxsw_minimal driver is added during kernel boot; An SDK reset causes the driver to be deleted and re-instantiated; User space handler for thermal zone add sees the add first; But the underlying device is deleted before it can act on it. This situation is rectified as the mlxsw_minimal driver is re-instantiated later; +4.1.0-4.4.5
2548260The {{net add routing route-map <name> permit <seq> set community <comm>}} command does not add the set statement into the {{/etc/frr/frr.conf}} file.4.0.0-4.4.5
2548243On switches with the Trident2+ ASIC, adding SPAN rules disables PBR rules.3.7.3-3.7.16, 4.0.0-4.4.5
2548117In OVSDB traditional bridge mode, adding or removing a VLAN binding causes a traffic forwarding outage for around 20 seconds or more on adjacent VLAN bindings. Cumulus Linux does not support _traditional_ bridge mode with VMware NSX.3.7.12-3.7.16, 4.0.0-4.4.5
2548062When ports are split to 4x25G, RS FEC needs to explicitly configured on both ends (especially when interoperating with non-Mellanox switches).4.1.0-4.4.5
2548044When a remote VTEP withdraws a type-3 EVPN route, Cumulus Linux purges all MAC address and neighbor entries installed in the corresponding layer 2 VNI through that remote VTEP from the local EVPN and kernel forwarding tables. This purge occurs even if the remote VTEP does not withdraw type-2 routes carrying the MAC address or neighbor entries. The entries stay missing from the local EVPN and kernel forwarding tables until BGP updates the MAC address and neighbor.3.7.12-3.7.15, 4.0.0-4.4.53.7.16
2547903CVE-2019-19956: xmlParseBalancedChunkMemoryRecover in parser.c in libxml2 before 2.9.10 has a memory leak related to newDoc->oldNs. +Vulnerable: 2.9.4+dfsg1-7 +Fixed: 2.9.4+dfsg1-7+deb10u14.0.0-4.4.5
2547890QinQ across VXLAN on a traditional bridge does not work.4.1.0-4.4.5
2547782If a LLDP neighbor advertises a {{PortDescr}} that contains commas, {{ptmctl -d}} splits the string on the commas and misplaces its components in other columns.3.7.11-3.7.16, 4.0.0-4.4.5
2547706When you configure ganged ports in the {{ports.conf}} file, the change does not take effect after you restart {{switchd}}. +To work around this issue, reboot the switch.3.7.11-3.7.16, 4.0.0-4.4.5
2547405When you restart the {{hsflowd}} service, you see a {{systemd}} warning message similar to the following: + +Warning: The unit file, source configuration file or drop-ins of hsflowd@mgmt.service changed on disk. Run 'systemctl daemon-reload'. +4.0.0-4.4.5
2547120After you hot swap a PSU, the {{decode-syseeprom -t psuX}} command shows the old PSU information (such as the serial number), until you run the {{decode-syseeprom --init}} command.3.7.11-3.7.16, 4.0.0-4.4.5
2546991The FRR service does not provide a way for automation to know if the configuration applied properly. +To work around this issue, execute the {{vtysh -f <file>}} command in the automation file before starting the FRR service to validate the functional configuration and return an error code.3.7.11-3.7.16, 4.0.0-4.4.5
2546895If you have configured a higher number of ports and VLANs (ports x VLANs) or the switch is a lower-powered (CPU) platform, the {{switchd}} service might fail to send a {{systemd keepalive}} within the watchdog timeout value (2 minutes by default) and you see an error similar to the following: + +bq. systemd[1]: switchd.service watchdog timeout (limit 2min)! + +To workaround this issue, either reduce the number of configured interfaces and, or VLANs, or increase the {{systemd}} timeout for {{switchd.service}}. +To increase the {{systemd}} timeout: + +1.Edit the {{/etc/systemd/system/switchd.service.d/override.conf}} file and increase the {{WatchdogSec}} parameter. +2.Restart the {{switchd}} service with the {{sudo systemctl restart switchd.service}} command. +{{systemd}} attempts to restart the {{switchd}} service automatically (after the watchdog timeout). If the restart fails multiple times in a short time period, run the {{sudo systemctl reset-failed}} command followed by the {{sudo systemctl restart switchd}} command.3.7.11-3.7.16, 4.0.0-4.4.5
2546874On the Dell S5232F, S5248F, S5296F, and S3048 switch, using the {{poweroff}} or {{halt}} commands does not fully power off the switch.4.0.0-4.4.5
2546255On the EdgeCore Minipack-AS8000 switch, a 100G DAC link does not come up when auto-negotiation is enabled on the neighbor. This switch does not support 100G DAC auto-negotiation at this time.4.0.0-4.4.5
2546225When you execute the following command on the Delta AG6248C switch, the switch reboots and then comes right back into Cumulus Linux without installing the new image. The install image is still in {{/var/lib/cumulus/installer}}, which causes issues with cl-support. + + sudo onie-install -fai http://<path to image> + sudo reboot + + To work around this issue, use the {{onie-select}} command to access ONIE, and then use the {{nos-install}} command in ONIE to install a new binary image. 3.7.11-3.7.16, 4.0.0-4.4.5
2546131On the Delta AG-6248C PoE switch, when you run the {{apt upgrade}} command, the upgrade does not work. Cumulus Linux uses {{uboot}} directly instead of {{grub}} to boot the kernel. Uboot needs a special header to boot the kernel, which is not present. Without this header, when you use the {{apt upgrade}} command to upgrade Linux packages, {{uboot}} is unable to boot up the kernel. +To work around this issue, upgrade Cumulus Linux by installing the Cumulus Linux image. Run the {{onie-select}} command to go into ONIE, and then use the {{nos-install}} command in ONIE to install a new image. +This workaround only works when an out-of-band network is present.3.7.11-3.7.16, 4.0.0-4.4.5
2545837If you use the NCLU commands to configure NTP and run the {{net add time ntp source <interface>}} command before you run the {{net add time ntp server <server> iburst}} command, the {{/etc/ntp.conf}} file is misconfigured. +To work around this issue, run the {{net add time ntp server <server> iburst}} command before you run the {{net add time ntp source <interface>}} command.3.7.10-3.7.11, 4.0.0-4.4.53.7.12-3.7.16
2545520The length of the netlink message is not set properly for non-bridge family type messages. The same length is used for both bridge and non-bridge even though the bridge family type message has an extra attribute. This causes extra bytes to be left over in non-bridge family type netlink messages.3.7.10, 4.0.0-4.4.53.7.11-3.7.16
2545239On the Mellanox switch with the Spectrum-2 ASIC, Precision Time Protocol (PTP) is not currently supported. 4.0.0-4.3.24.4.0-4.4.5
2545233On the Delta AG9032v1 switch, smonctl and sensors report inaccurate PSU current and power.4.0.0-4.4.5
2545125If you configure more than one VRR interface on an SVI interface, deleting one of the VRR addresses does not remove the interface/address. 3.7.10-3.7.16, 4.0.0-4.4.5
2544978If you delete an undefined bond, then add a bond slave, the {{net commit}} command fails.3.7.9-3.7.16, 4.0.0-4.4.5
2544968FRR configuration commands for an SVI interface might have the {{\n}} misplaced in the output. For example: + +sudo sh -c "printf 'interface 50\nvrf TEST description L3 routing interface\n' >> /etc/frr/frr.conf" + +should be: + +sudo sh -c "printf 'interface 50 vrf TEST\ndescription L3 routing interface\n' >> /etc/frr/frr.conf" + +To work around this issue, configure the interface manually in the {{/etc/frr/frr.conf}} file.3.7.9-3.7.16, 4.0.0-4.4.5
2544957NCLU incorrectly allows you to apply port security configuration on layer 2 and layer 3 ports that are not part of a bridge.4.0.0-4.4.5
2544953When you update the hostname of a switch with the NCLU {{net add hostname <hostname>}} command, then run {{net commit}}, the {{lldpd}} service does not restart and other devices still see the old hostname. +To work around this issue, run the {{sudo systemctl restart lldpd.service}} command.3.7.10-3.7.16, 4.0.0-4.4.5
2544880When you run the NCLU {{net show commit last}} or {{net show commit <number>}} command, where {{<number>}} is the last commit, no output is shown. 4.0.0-4.4.5
2544723Setting ProtoDown on ports populated with SFP modules providing RJ-45 1000BASE-T interfaces does not cause the carrier to be dropped. The kernel shows carrier down; however, the remote device still shows a link.3.7.6-3.7.10, 4.0.0-4.4.53.7.11-3.7.16
2544463Auto-negotiation does not work with the QSFP28 cables and a remote system operating at 10G. Attempting to enable auto-negotiation with {{ethtool -s swp<#> autoneg on}} returns {{Operation not supported}}. +To work around this issue, do not use auto-negotiation and set the local port speed to 10G.3.7.9-3.7.16, 4.0.0-4.4.5
2544456The NCLU {{net show lldp}} command displays the speed of a ganged port group as the speed of one of the individual links, rather than the sum of their speeds.3.7.9-3.7.16, 4.0.0-4.4.5
2544311Applying a policy-based routing (PBR) rule for all traffic from a host might disrupt ARP refresh for that connected host.3.7.5-3.7.16, 4.0.0-4.4.5
2544155NCLU requires you to specify an interface with multiple {{address-virtual}} statements in ascending MAC address order. + +3.7.5-3.7.16, 4.0.0-4.4.5
2544113Mac learning is not disabled by default on a double tagged peer link interface resulting in the MAC address changing between the MLAG bond and the peer link. +To work around this issue, disable MAC learning on QinQ VLANs by adding {{bridge-learning off}} to the VLAN stanza in the {{etc/network/interfaces}} file.3.7.9-3.7.16, 4.0.0-4.4.5
2543937An interface alias configured outside FRR using {{iproute2}} is imported into the FRR running configuration and overrides the internal description. After an FRR reload, this causes FRR to delete the interface alias in an inefficient way. Depending on how many interfaces with aliases you have configured, this can cause a FRR reload to time out. +To work around this issue, remove the interface alias description from {{iproute2}}.3.7.8-3.7.10, 4.0.0-4.4.53.7.11-3.7.16
2543915When you enable a service in the management VRF, {{systemctl}} issues a warning similar to the following: + +Warning: The unit file, source configuration file or drop-ins of ntp@mgmt.service changed on disk. Run 'systemctl daemon-reload' to reload unit + +You can safely ignore this warning.4.0.0-4.4.5, 5.0.0-5.6.0
2543900On the Mellanox switch, static VXLAN tunnels incorrectly allow traffic from any remote tunnel IP address.3.7.8-3.7.16, 4.0.0-4.4.5
2543841The {{net show evpn vni detail json}} command includes an extra empty dictionary at the end of the output. + 3.7.8-3.7.16, 4.0.0-4.4.5
2543816On the Dell S5248F-ON switch, {{smond}} might generate syslog messages indicating that the fan input RPM is lower than the normal low speed of 2500 RPM. Speeds as low as 1700 RPM are acceptable in normal thermal environments; therefore, you can ignore these messages. +3.7.6-3.7.11, 4.0.0-4.4.53.7.12-3.7.16
2543781NCLU does not allow you to configure OSPF NSSAs. For example: + +cumulus@switch:~$ net add ospf area 0.0.0.1 nssa +ERROR: Command not found. +net add ospf area 0.0.0.1 nssa + +To work around this issue, use FRR instead. For example: + +switch# configure terminal +switch(config)# router ospf +switch(config-router)# area 0.0.0.1 nssa +3.7.7-3.7.10, 4.0.0-4.4.53.7.11-3.7.16
2543724If a hostname contains utf-8 characters, the NCLU {{net show lldp}} command outputs the following error: + +ERROR: 'ascii' codec can't encode character u'\xe9' in position 3: ordinal not in range(128) +See /var/log/netd.log for more details. +3.7.7-3.7.10, 4.0.0-4.4.53.7.11-3.7.16
2543646In an ebtables rule, ERSPAN (upper case) does not work. You need to specify erspan (lower case).3.7.6-3.7.16, 4.0.0-4.4.5
2543401On the Mellanox Spectrum-2 switch, the time required to establish a link (from the time a link is set to {{admin up}} until the link becomes operationally up) can take up to 15 seconds on 40G interfaces and up to 30 seconds on 100G interfaces. +To work around this issue, wait up to 15 seconds on 40G interfaces and 30 seconds on 100G interfaces for the link to establish.4.0.0-4.4.5
2543211In some cases, the {{switchd}} service might warn of excessive MAC moves from one switch port to itself (for example, from swp18 to swp18). +3.7.0-3.7.16, 4.0.0-4.4.5
2543164The MTU of an SVI cannot be higher than the MTU on the bridge. Changing the MTU on the SVI with NCLU does not update the bridge MTU. The {{net commit}} command succeeds even though the MTU is not changed as expected. +To work around this issue, change the MTU on all SVIs and the bridge manually in the {{/etc/network/interfaces}} file, then apply the change with the {{ifreload -a}} command.3.7.7-3.7.16, 4.0.0-4.4.5
2543096When an SVI with a virtual MAC is configured with a layer 2 VNI in an EVPN environment, if you replace the {{/etc/network/interfaces}} file with a different file that does not have the SVI and layer 2 VNI configuration, the original virtual MAC is not populated through the EVPN route until FRR is restarted. + 3.7.6-3.7.16, 4.0.0-4.4.5
2542945On the Broadcom Maverick switch with a QinQ configuration, the packets coming into the CPU might be tagged incorrectly; for example, 802.1ad + 802.1q tags are expected in the packets but the packets have 802.1q + 802.1q tags. +To work around this issue, configure the bridge with {{bridge-vlan-protocol 802.1ad}}: + +cumulus@switch:~$ net add bridge mybridge vlan-protocol 802.1ad + 3.7.6-3.7.16, 4.0.0-4.4.5
2542837On Mellanox switches, policer iptables are not working as expected. For example, when using a policer with mode KB/MB/GB to rate-limit interfaces, the syntax is accepted but the data plane transfer speed is not affected by the rule. 3.7.6-3.7.8, 4.0.0-4.4.53.7.9-3.7.16
2542305If an SVI exists in the configuration before you assign it an IP address, when you do assign the IP address with the NCLU command, the {{vlan-id}} and the raw-device bridge stanzas are not added automatically. + 3.7.6-3.7.16, 4.0.0-4.4.5
2542301When first creating a bond and enslaving an interface, NCLU hides some of the bridge command suggestions, although they are still accepted. + 3.7.3-3.7.16, 4.0.0-4.4.5
2541212The {{maximum-prefix}} configuration under the IPv4 address family has an optional restart value, which you can configure. This configuration is ignored and, instead of restarting the sessions every x minutes, the peer constantly changes between established and idle due to the prefix count being exceeded. 3.7.5-3.7.16, 4.0.0-4.4.5
2541029On switches with the Trident2 ASIC, 802.1Q-encapsulated control plane traffic received on an interface with 802.1AD configured subinterfaces might be dropped. +This issue only affects QinQ configurations. + 3.7.5-3.7.16, 4.0.0-4.4.5
2540753If the interface alias contains a single or double quotation mark, or an apostrophe, the {{net show configuration}} commands fail with the following error: + + ERROR: No closing quotation + See /var/log/netd.log for more details. + + 3.7.5-3.7.16, 4.0.0-4.4.5
2540444SNMP incorrectly requires engine ID specification. + 3.7.4-3.7.16, 4.0.0-4.4.5
2540352When you use NCLU to configure a route map, the parser allows for glob matching of interfaces for a _match interface_ condition when there can only be a single interface matched. The proper syntax is to use multiple route map clauses, each matching a single interface, instead of a single clause matching multiple interfaces. + For example, this command is incorrect: + + net add routing route-map Proxy-ARP permit 25 match interface swp9-10 + + These commands are correct: + + net add routing route-map Proxy-ARP permit 25 match interface swp9 + net add routing route-map Proxy-ARP permit 30 match interface swp10 + + 3.7.2-3.7.16, 4.0.0-4.4.5
2540340NCLU allows for the configuration of addresses on VRF interfaces, but tab completion for the {{net add vrf <name>}} command just displays <ENTER>. For example: + + cumulus@switch:~$ net add vrf mgmt + <ENTER> + + Tab completion for the {{net add vrf <name> ip address <address>}} command works correctly. 3.7.4-3.7.16, 4.0.0-4.4.5
2540274On the Maverick switch, CPU forwarded packets might be dropped when there is no route to a leaked host route.3.7.5-3.7.16, 4.0.0-4.4.5
2540204When links come up after FRR is started, VRF connected routes do not get redistributed.3.7.4-3.7.16, 4.0.0-4.4.5
2540192The {{net del bridge bridge mcsnoop yes}} command does not return the value to the default of disabled. +To work around this issue, use the {{net add bridge bridge mcsnoop no}} command to delete the {{mcsnoop attribute}} and return to the default value.3.7.4-3.7.16, 4.0.0-4.4.5
2540155On the Broadcom switch, when moving configuration from bridged to routed (or toggling from routed to bridged to routed), some traffic is not seen by the kernel. This can cause BGP to not establish on a transit node. + 3.7.3-3.7.16, 4.0.0-4.4.5
2540042When you try to configure the VRRP priority and advertisement-interval with NCLU on a traditional mode bridge, the {{net commit}} command fails. + To work around this issue, use the vtysh command (inside FRR) to change the VRRP priority or advertisement-interval on traditional bridges. For example: + + cumulus@switch:~$ sudo vtysh + switch# configure terminal + switch(config)# interface br0.100 + switch(config-if)# vrrp 1 priority 110 + switch(config-if)# vrrp 1 advertisement-interval + switch(config-if)# end + switch# write memory + switch# exit + cumulus@switch:~ + + 3.7.4-3.7.16, 4.0.0-4.4.5
2540041On SVIs in a VLAN-aware bridge, you cannot change the VRRP priority with NCLU. + To work around this issue, run the vtysh command inside FRR to change the default priority. For example: + + cumulus@switch:~$ sudo vtysh + switch# configure terminal + switch(config)# interface vlan100 + switch(config-if)# vrrp 1 priority 110 + switch(config-if)# end + switch# write memory + switch# exit + cumulus@switch:~ + + 3.7.4-3.7.16, 4.0.0-4.4.5
2540040Cumulus Linux uses VRRPv3 as the default version, and enables both preempt and accept mode by default. You cannot change these default values with NCLU. +To work around this issue, run the vtysh commands (inside FRR) to change the default values. For example: + + cumulus@switch:~$ sudo vtysh + switch# configure terminal + switch(config)# interface swp4 + switch(config-if)# vrrp 1 version 2 + switch(config-if)# no vrrp 1 preempt + switch(config-if)# end + switch# write memory + switch# exit + cumulus@switch:~ + + 3.7.4-3.7.16, 4.0.0-4.4.5
2540031NCLU does not honor {{auto all}} in the {{/etc/network/interfaces}} file and removes the existing configuration if no individual {{auto <iface>}} lines exist. + 3.7.3-3.7.16, 4.0.0-4.4.5
2539994When you try to remove a BGP peer group configuration with NCLU, the command fails but no warning message is shown. For example: + +cumulus@switch:~$ net del bgp neighbor fabric peer-group +'router bgp 65001' configuration does not have 'neighbor fabric peer-group' + + 3.7.2-3.7.16, 4.0.0-4.4.5
2539962When an LDAP user that does not have NCLU privileges (either in the {{netshow}} or {{netedit}} group, or in the {{/etc/netd.conf}} file) runs an NCLU command, a traceback occurs instead of a permissions error. + 3.7.0-3.7.16, 4.0.0-4.4.5
2539670On the Edgecore 4610-54P switch, automatic medium-dependent interface crossover (auto-MDIX) stops working on a 100M full duplex interface and does not detect the required cable connection type. + 3.7.2-3.7.16, 4.0.0-4.4.5
2539124The {{net add interface <interface> ptm-enable}} command adds {{no ptm-enable}} for that interface in the {{frr.conf}} file. + Running the {{net add}} or the {{net del}} command does not remove {{no ptm-enable}} from the {{frr.conf}} file. You have to remove it manually using vtysh. + 3.7.2-3.7.16, 4.0.0-4.4.5
2538790NCLU automatically adds the VLAN ID (for the layer 3 VNI/SVI) to the bridge when you run {{net add vxlan <layer3-vni> bridge access <vlan>}}. This configuration breaks network connectivity in an EVPN symmetric routing configuration using MLAG. +To restore connectivity, remove the VLAN ID from the bridge. 3.7.2-3.7.16, 4.0.0-4.4.5
2538590When you configure a control plane ACL to define permit and deny rules destined to the local switch, NCLU programs the control plane ACL rules into the FORWARD chain. + 3.7.2-3.7.16, 4.0.0-4.4.5
2538562On an RMP/1G-T switch, when you remove {{link-speed 100}} with the NCLU command or by editing the {{etc/network/interfaces}} file to revert the 100M interface to the default (1G auto), the interface fails to recover and does not come back up. +After you remove the link-speed, {{ethtool}} shows the advertised link modes as not reported and Speed/Duplex as unknown. +To work around this issue and bring the interface back up, either restart {{switchd}} or use ethtool to configure the speed, advertised, duplex or MDI-X settings. +Note: The advertised link mode gets set incorrectly if you include 1000baseT/Half. The port will come up successfully at 1G.3.7.2-3.7.16, 4.0.0-4.4.5
2538294If you use NCLU to create an iBGP peering across the peer link, running the {{net add bgp l2vpn evpn neighbor peerlink.4094 activate}} command creates a new eBGP neighborship when one has already been configured for iBGP. This is unexpected; the existing iBGP configuration is valid. 3.7.0-3.7.16, 4.0.0-4.4.5
2537699There is a limitation on the number of SVI interfaces you can specify as DHCP relay interfaces in the {{/etc/default/isc-dhcp-relay}} file. For example, 1500 SVI interfaces causes the {{dhcrelay}} service to exit without a core file and logs similar to the following are generated for the interfaces: + + 2018-11-10T23:35:30.992370-08:00 Dev dhcrelay: Listening on LPF/vlan.101/a0:00:00:00:00:51 + 2018-11-10T23:35:30.993472-08:00 Dev dhcrelay: Sending on LPF/vlan.101/a0:00:00:00:00:51 + + Eventually the {{dhcrelay}} service stops. + 3.7.1-3.7.16, 4.0.0-4.4.5
2537544When you run the {{mstpctl}} command, you might see the bridge-port state as blocking when it is actually disabled. You might see the same incorrect bridge-port state when other programs or tools use the output of {{mstpctl}}; for example, SNMP output from the BRIDGE-MIB.3.7.1-3.7.16, 4.0.0-4.4.5
2536576If you try to bring down several members of a bond remotely at the same time, the link state of one of the interfaces might not transition correctly to the down state; however, all links show down in hardware. + 4.0.0-4.4.5
2536384The BFD packet redirection logic used by OVSDB server high availability mode redirects BUM packets across the peer link. The iptables rule for redirection does differentiate between BFD and non-BFD VXLAN inner packets because the service node sends all frames with its own IP address as the tunnel source IP address. The VXLAN encapsulated BUM packets do not get forwarded to the CPU and do not go through the iptable redirection rule; only VXLAN encapsulated BFD packets get forwarded to the CPU due to the inner MAC DA lookup in hardware. + 3.7.0-3.7.16, 4.0.0-4.4.5
2536256For an unresolved address, the IPROUTER default policer rule has been modified to _not_ match on packets exiting a TUNNEL and headed to the CPU to resolve the address via ARP. As a result, the following default rule no longer matches TUNNEL ingress packets. + + A $INGRESS_CHAIN --in-interface $INGRESS_INTF -m addrtype --dst-type + IPROUTER -j POLICE --set-mode pkt --set-rate 400 --set-burst 100 + + These packets are now policed by catch all rules. + To work around this issue, the VPORT value on a TRIDENT switch must be changed from binary 011 to 100. + 4.0.0-4.4.5
2536242On the EdgeCore AS7712 (Tomahawk) switch running in atomic mode, when a layer 3 ECMP path is brought down, traffic traversing the path stops working for about four seconds. When the switch is changed to non-atomic mode, the delay is less than one second. This issue is seen across OSPF and static ECMP routes. 4.0.0-4.4.5
2536179On switches with the Trident 2+ ASIC, counters associated with VLANs and VRFs are not working.3.7.0-3.7.16, 4.0.0-4.4.5
2535986At a high CPU transmit traffic rate (for example, if there is unexpected CPU generated flooding or replication in software), when the ASIC packet driver cannot keep up with the transmit rate because there are no free DMA buffers, it can back pressure by suspending the switch port transmit queues. This can fill up the application socket buffers resulting in {{No buffer space available}} error messages on protocol sockets. +When the driver recovers, it automatically resumes the transmit queues. In most cases these error messages are transient. In rare cases, the hardware queues might get stuck, which you can recover with a {{switchd}} restart.3.7.0-3.7.16, 4.0.0-4.4.5
2535965On the Trident3 switch, static PIM with IIF based on a layer 2 bridge does not work reliably. PIM Join via signaling is required for IPMC to work properly. +To work around this issue, use dynamic signaling (joins) to manage IP multicast traffic.3.7.0-3.7.16, 4.0.0-4.4.5
2535723The source address of the ICMPv6 time exceeded message (traceroute hop) is sourced from the wrong VRF when the traceroute target resides on the same switch but in a different VRF.4.0.0-4.4.5
2535605FRR does not add BGP {{ttl-security}} to either the running configuration or to the {{/etc/frr/frr.conf}} file when configured on a peer group instead of a specific neighbor. +To work around this issue, add {{ttl-security}} to individual neighbors instead of the peer group.4.0.0-4.4.5
2535209The {{net show lldp}} command sometimes shows the port description in the {{Remote Port}} field. The {{net show interface}} command shows the correct value in the {{Remote Host}} field. +To work around this issue, use {{net show interface}} command for LLDP output when connected to Cisco equipment.3.7.5-3.7.10, 4.0.0-4.4.53.7.11-3.7.16
2534734Span rules matching the out-interface as a bond do not mirror packets.4.0.0-4.4.5
2533691If you configure a VLAN under a VLAN-aware bridge and create a subinterface of the same VLAN on one of the bridge ports, the bridge and interface compete for the same VLAN and if the interface is flapped, it stops working. Correcting the configuration and running the {{ifreload}} command does not resolve the conflict. +To work around this issue, correct the bridge VIDs and restart {{switchd}} or delete the subinterface. 3.7.12-3.7.16, 4.0.0-4.4.5
2533625PIM and MSDP entries are set to the internal COS value of 6 so they are grouped together with the bulk traffic priority group in the default {{traffic.conf}} file. However, PIM, IGMP, and MSDP are considered control-plane and should be set to the internal COS value of 7. 4.0.0-4.4.5
2533337When you use NCLU to bring a bond admin down ({{net add bond <bond> link down}}), the bond interface goes into admin down state but the switch ports enslaved to the bond remain UP. If you are using bond-lacp-bypass-allow or balance-xor mode, the host might continue to send traffic. This traffic will be dropped because although the bond slaves are UP, they are not members of the bridge. +To work around this issue, use the {{sudo ifdown <bondname>}} command.4.0.0-4.4.5
2531273In certain cases, a peer device sends an ARP request from a source IP address that is not on the connected subnet and the switch creates a STALE neighbor entry. Eventually, the switch attempts to keep the entry fresh and sends ARP requests to the host. If the host responds, the switch has REACHABLE neighbor entries for hosts that are not on the connected subnet. +To work around this issue, change the value of {{arp_ignore}} to 2. See [Address Resolution Protocol in the Cumulus Linux user guide|https://docs.cumulusnetworks.com/cumulus-linux/Layer-3/Address-Resolution-Protocol-ARP/] for more information.4.0.0-4.4.5
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Issue ID Description Affects
3647731CVE-2023-38408: The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009. +Mitigation: Do not use ssh-agent forwarding (the man page for ssh_config says that "agent forwarding should be enabled with caution"), or start the ssh-agent program with the -P option to allow only specific PKCS#11 libraries (or none with -P ''). +For Cumulus Linux 4.3.2, the /usr/bin/ssh-agent program has all permissions turned off (chmod 0) to prevent its execution if a vulnerable version is detected.4.0.0-4.3.1, 5.0.0-5.6.0
3544701If BGP {{remote-as}} is set to an integer and you try to configure the {{local-as}} for a BGP instance, you see the following error: + +% AS specified for local as is the same as the remote as and this is not allowed. + +This configuration is not allowed; it is considered to be eBGP and local preference is not advertised.5.0.0-5.5.1
3534654On a Broadcom switch, Q-in-Q VLAN operations do not clear when you remove a bridge port from a VXLAN-enabled bridge. This can result in unexpected double tagged packets if the outer VLAN is still used on the bridge. To work around this issue, restart {{switchd}} after you modify or remove double tagged bridge ports from a VXLAN-enabled bridge.4.3.1
3486888If FRR learns a layer 2 entry against a VNI and you reconfigure the VNI later as a layer 3 VNI, the original layer 2 entry does not clear and remains in the forwarding database.4.3.0-4.3.1
3479967When you remove VRF configuration, the {{systemctl reload frr.service}} command returns a non zero exit code after erroneously running the invalid command {{no exit-vrf}}.4.3.1
3455998When you poll the BGP unnumbered MIB object 1.3.6.1.4.1.40310.4 after uncommenting the {{bgpun_pp.py}} pass persist script in the {{/etc/snmpd/snmpd.conf}} file, BGP session information is not retrieved. To work around this issue, add executable permissions to the script with the {{sudo chmod +x /usr/share/snmp/bgpun_pp.py}} command.4.3.1
3448171If a default route is withdrawn from the routing table and then learned again, traffic matching this entry will be software (cpu) forwarded.  This will cause intermittent drops due to the CPU the rate-limiter. + +This only impacts the default VRF and a default route learned dynamically. + +In order to recover from this condition:  + +1. Restart switchd.service (sudo systemctl restart switchd.service) + +OR +  +2. Reboot the switch (sudo reboot)4.3.1
3434315IPv6 BGP sessions in a VRF do not be establish with MD5 authentication.4.3.0-4.3.1
3419962On a Broadcom switch, if you remove a double-tagged interface from a bridge that contains other double-tagged interfaces built on the same physical port (for example, you remove swp1.10.100 when swp1.10.200 is also a bridge port), traffic forwarding within the bridge might fail and you see critical warnings in the {{/var/log/switchd.log}} file similar to the following: + +switchd[8587]: hal_bcm.c:2207 CRIT knet_vlan_translate_delete(update): port 1 ext_vlan 10.100 int_vlan 2132: -11 +4.3.1
3419953If you remove a double tagged bridge port from a bridge when a different interface exists with the same port and virtual ID, you might see a segmentation fault and a {{switchd}} crash due to incorrect initialization when Cumulus Linux creates the second double-tagged interface. To work around this issue, make sure you remove the double-tagged interfaces from the bridge in the {{/etc/network/interfaces}} file.4.3.1
3413826During upgrade, when one MLAG node is upgraded and the other MLAG node is not yet upgraded, permanent neighbors cannot synchronize between MLAG nodes. The {{clagctl dumppermanentneighs}} command only shows local neighbors.5.0.0-5.4.0
3410952If MLAG is configured but disconnected from an MLAG peer for an extended period of time (days or more), there is a long delay (up to a minute per day) before traffic forwarding stabilizes after the MLAG peer connection re-establishes.3.7.0-4.3.1
3401121sFlow is not able to sample packets in the egress direction. To work around this issue, add the following to the {{hsflowd.conf}} file to enable egress sampling: + +samplingDirection=out +psample { group=1 } +4.3.0-4.3.1
3376798On Broadcom switches, Cumulus Linux does not create the hardware bridging domain for a traditional bridge with a VXLAN interface during {{switchd}} restart. The {{/var/log/switchd.log}} file includes the following exception logs shortly after {{switchd}} restarts: + +switchd[30158]: hal_bcm_l3.c:1617 find_egr_path_if_vxlan_overlay:vxlan overlay : nh PORT: port <#>, vlan <x>.<y> not yet ready + +MAC learning looks correct, but traffic does not flow as expected.3.7.0-4.3.1
3366612The base version of the Linux kernel is updated to the v4.19.273 stable release, which includes fixes for several CVE issues.4.3.1
3364996Under certain conditions, BGP can allow a combination of EVPN and non-EVPN paths to be put into a multipath group together. This results in erroneous programming of EVPN symmetric next hops and RMACs, which can result in momentary traffic drops.4.3.0-4.3.1
3336590On the Trident 2+ and Trident 3 switch when using VXLAN layer 2 VPNs and sending tunneled traffic where the inner IP header has a TTL of 1, the egress VTEP incorrectly forwards this traffic through the software path instead of the hardware data plane. This traffic is rate-limited to 100pps by default. To work around this issue, ensure that the traffic traversing the layer 2 tunnel has an inner IP header TTL value that is more than 1. If this workaround is not possible, contact Nvidia Support to determine other options.4.3.0-4.3.1
3334036When you configure or unconfigure a BGP peer and interface towards a host, memory corruption can cause BGP to crash.4.3.0-4.3.1
3334031When you configure or unconfigure a BGP peer and interface towards a host, memory corruption can cause BGP to crash.4.3.0-4.3.1
3319919Currently, the default core dump size limit on Cumulus Linux is 256M but the SDK generates core dumps around 800M. To avoid incomplete core files, you can increase the core dump size limit.4.2.1-4.3.1, 4.4.0-5.3.1
3288385On the EdgeCore AS7326-56X and AS7726-32X switch, the fan speed reports a minimum threshold in the logs.4.3.1
3288343When you reboot a Broadcom switch with a static default route configured, the route might be installed in hardware without a next hop. This results in forwarded traffic to the CPU and drops. To recover from this issue, remove the default route configuration and reapply it. To prevent this issue, before rebooting the switch, split the default route configuration into two routes as below: + +ip route 0.0.0.0/1 10.1.1.1 +ip route 128.0.0.0/1 10.1.1.1 +4.3.1
3269538The {{cl-ecmpcalc}} command prints the following error when the egress interface is a bond or SVI: + +ecmpcalc: will query hardware +Traceback (most recent call last): +File “/usr/cumulus/bin/cl-ecmpcalc”, line 986, in +isTrunkMbr, port = ecmp.getHdPort(hd_cmd) +File “/usr/cumulus/bin/cl-ecmpcalc”, line 618, in getHdPort +port = int(str4) +ValueError: invalid literal for int() with base 10: ‘0t +4.3.0-4.3.1
3267353In a QinQ configuration, if the VLAN priority is a non-zero value, double-tagged packets are translated to triple-tagged packets. 4.3.1
3244739If you have a lot of inbound route maps that match lists with many regex statements, a large number of updates from the peer can cause the system to run out of memory. To work around this issue, reduce the number of regex matches in inbound route maps.4.4.0-5.2.1
3236349Using ARP suppression with a very large number of interfaces might result in missing ARP entries on the local device or buffer underrun warnings in the {{neighmgrd}} log.4.3.0-4.3.1
3235956With certain triggers on Broadcom switches, such as adding or deleting a VNI or reloading the network, Cumulus Linux might consider the underlay routes as overlay routes. In this case, {{switchd}} allocates the overlay next hop, which is incorrect and might affect traffic forwarding.4.3.0-4.3.1
3234031If BGP {{neighbor <name> allowas-in}} is set, negating with no {{no neighbor <name> allowas-in}} does not disable the setting. To work around this issue and disable the setting, restart the FRR service.4.2.1-4.3.1
3191517When the switch receives an LLDP frame from a Cisco router right after a {{ptmd}} restart, the {{ptmd}} service crashes.4.3.0-4.3.1, 4.4.0-5.2.1
2555175Control plane traffic (such as BGP peering from leaf to spine) goes down on the leaf due to the peer Hold Down timer expiration following prolonged link flaps on down links when VXLAN enabled VLANs are carried on the flapping link. Be sure to correct layer 1 issues, configuration issues, or misbehaving link partners that are causing the link flaps.3.7.15-4.3.1
@@ -11,8 +2216,8 @@ - - + + @@ -21,12 +2226,18 @@ For Cumulus Linux 4.3.2, the /usr/bin/ssh-agent program has all permissions turn - - + + + + + + + + @@ -35,14 +2246,14 @@ For Cumulus Linux 4.3.2, the /usr/bin/ssh-agent program has all permissions turn - - + + - - + + @@ -53,8 +2264,8 @@ For Cumulus Linux 4.3.2, the /usr/bin/ssh-agent program has all permissions turn - - + + @@ -69,14 +2280,14 @@ In order to recover from this condition:  OR   2. Reboot the switch (sudo reboot) - - + + - - + + @@ -90,14 +2301,14 @@ OR switchd[8587]: hal_bcm.c:2207 CRIT knet_vlan_translate_delete(update): port 1 ext_vlan 10.100 int_vlan 2132: -11 - - + + - - + + @@ -112,8 +2323,8 @@ switchd[8587]: hal_bcm.c:2207 CRIT knet_vlan_translate_delete(update): port 1 ex samplingDirection=out psample { group=1 } - - + + @@ -122,20 +2333,20 @@ psample { group=1 } switchd[30158]: hal_bcm_l3.c:1617 find_egr_path_if_vxlan_overlay:vxlan overlay : nh PORT: port <#>, vlan <x>.<y> not yet ready MAC learning looks correct, but traffic does not flow as expected. - - + + - - + + - - + + @@ -146,14 +2357,14 @@ MAC learning looks correct, but traffic does not flow as expected. - - + + - - + + @@ -188,8 +2399,8 @@ MAC learning looks correct, but traffic does not flow as expected. - - + + @@ -213,32 +2424,32 @@ File “/usr/cumulus/bin/cl-ecmpcalc”, line 618, in getHdPort port = int(str4) ValueError: invalid literal for int() with base 10: ‘0t - - + + - - + + - - + + - - + + - - + + @@ -422,7 +2633,7 @@ Fixed: 1.9.2-1+deb10u1 - + @@ -453,7 +2664,7 @@ Fixed: 2.6.0+dfsg.1-1+deb10u1 thermal thermal_zoneX: critical temperature reached (33 C), shutting down - + @@ -565,6 +2776,12 @@ This affects failed neighbor entries on routed interfaces that are not SVIs.4.4.2-4.4.5 + + + + + + @@ -684,7 +2901,7 @@ Fixed: 241-7~deb10u8 - + @@ -733,7 +2950,7 @@ To work around this issue, change the TCAM profile to {{acl-heavy}} or {{ip-acl- - + @@ -744,7 +2961,7 @@ sx_sdk: LAG: Can't add port (0x00012400) to lag. Port has vports configured for switchd[4529]: hal_mlx_bond.c:582 ERR bond32 member swp32 add failed: Parameter Error To work around this issue, restart {{switchd}}. - + @@ -752,7 +2969,7 @@ To work around this issue, restart {{switchd}}. - + @@ -770,14 +2987,14 @@ cumulus@leaf01:~$ nv set vrf default router ospf area 0 network 10.10.10.1/32 - + - + @@ -785,7 +3002,7 @@ To work around this issue, add the MAC access list configuration to the end of t - + @@ -794,13 +3011,13 @@ Fixed: 4.3.1-6-cl3.7.16u1 result in denial of service and potentially the execution of arbitrary code. Vulnerable: <= 1.14.2-2+deb10u3 Fixed: 1.14.2-2+deb10u4 - + - + @@ -814,7 +3031,7 @@ This is an information leak in algorithm negotiation that can allow man-in-the-m - + @@ -822,7 +3039,7 @@ To work around this issue, start the MST service with the {{sudo mst start}} com - + @@ -830,7 +3047,7 @@ Fixed: 1.6.7-1+deb10u2 - + @@ -838,13 +3055,13 @@ Fixed: 1.8.3-1+deb10u1 - + - + @@ -855,7 +3072,7 @@ CVE-2021-25215: named could crash when a DNAME record placed in the ANSWER secti CVE-2021-25216: the SPNEGO implementation used by BIND is prone to a buffer overflow vulnerability. This update switches to use the SPNEGO implementation from the Kerberos libraries. Vulnerable: <= 9.11.5.P4+dfsg-5.1+deb10u4 Fixed: 9.11.5.P4+dfsg-5.1+deb10u5 - + @@ -869,7 +3086,7 @@ See /var/log/netd.log for more details. - + @@ -877,7 +3094,7 @@ See /var/log/netd.log for more details. - + @@ -892,7 +3109,7 @@ Fixed: 2.8.0-cl3.7.15u3 Multiple vulnerabilities have been discovered in the Xen hypervisor, which could result in denial of service, privilege escalation or memory disclosure. Vulnerable: < 4.11.4+99-g8bce4698f6-1 Fixed: 4.11.4+99-g8bce4698f6-1 - + @@ -900,7 +3117,7 @@ Fixed: 4.11.4+99-g8bce4698f6-1 - + @@ -908,7 +3125,7 @@ Fixed: 1.9.1~dfsg-1+deb10u1 - + @@ -924,7 +3141,7 @@ CVE-2021-22876: libcurl did not strip user credentials from URL when populating CVE-2021-22890: libcurl using HTTPS proxy with TLS1.3 could use the wrong session ticket and bypass server TLS certificate check. Vulnerable: <= 7.64.0-4+deb10u1 Fixed: 7.64.0-4+deb10u2 - + @@ -932,7 +3149,7 @@ Fixed: 7.64.0-4+deb10u2 - + @@ -940,7 +3157,7 @@ Fixed: 4.3.2-1+deb10u3 - + @@ -948,13 +3165,13 @@ Fixed: 2.3.1+dfsg-1+deb10u2 - + - + @@ -967,7 +3184,7 @@ To recover from this state, flap the bond interface (not the physical swp) by ru - + @@ -975,7 +3192,7 @@ To recover from this state, flap the bond interface (not the physical swp) by ru - + @@ -983,13 +3200,13 @@ Fixed: 2.3.1+dfsg-1+deb10u1 - + - + @@ -1002,7 +3219,7 @@ To work around this issue, either use the {{vtysh}} commands or edit the {{/etc/ - + @@ -1015,14 +3232,14 @@ CVE-2020-27749: A stack buffer overflow flaw was found in grub_parser_split_cmdl CVE-2020-27779: It was discovered that the cutmem command allows a privileged user to remove memory regions when Secure Boot is enabled. CVE-2021-20225: A heap out-of-bounds write vulnerability was found in the short form option parser. CVE-2021-2023: A heap out-of-bound write flaw was found caused by mis-calculation of space required for quoting in the menu rendering. - + - + @@ -1030,7 +3247,7 @@ Vulnerable: <= 2.8.0-cl3.7.14u1, <= 2.8.0-cl4.2.1u1 - + @@ -1049,7 +3266,7 @@ To work around this issue, run the {{/usr/bin/clagctl verifyvlans}} command or t - + @@ -1115,9 +3332,9 @@ This error has no functional impact. - - - + + + @@ -1174,7 +3391,7 @@ To work around this issue, configure a static route in FRR. - + @@ -1392,7 +3609,7 @@ To work around this issue, do not enslave the subinterface of a VXLAN layer 3 up - + @@ -1478,7 +3695,7 @@ To work around this issue, manually edit the {{etc/frr/frr.conf}} file to define - + @@ -1665,7 +3882,7 @@ To work around this issue, run the {{net add time ntp server <server> ibur - + diff --git a/content/cumulus-linux-44/Installation-Management/Installing-a-New-Cumulus-Linux-Image.md b/content/cumulus-linux-44/Installation-Management/Installing-a-New-Cumulus-Linux-Image.md index 06094474c2..f5fdb25f13 100644 --- a/content/cumulus-linux-44/Installation-Management/Installing-a-New-Cumulus-Linux-Image.md +++ b/content/cumulus-linux-44/Installation-Management/Installing-a-New-Cumulus-Linux-Image.md @@ -323,7 +323,7 @@ You can run several installer command line options from ONIE to perform basic sw - Execute a ZTP script to perform necessary configuration {{%notice note%}} -The `onie-nos-install` command does *not* allow you specify command line parameters. You must access the switch from the console and transfer a disk image to the switch. You must then make the disk image executable and install the image directly from the ONIE command line with the options you want to use. +The `onie-nos-install` command does *not* allow you to specify command line parameters. You must access the switch from the console and transfer a disk image to the switch. You must then make the disk image executable and install the image directly from the ONIE command line with the options you want to use. The following example commands transfer a disk image to the switch, make the image executable, and install the image with the `--password` option to change the default cumulus user password: diff --git a/content/cumulus-linux-44/Layer-1-and-Switch-Ports/DHCP/DHCP-Relays.md b/content/cumulus-linux-44/Layer-1-and-Switch-Ports/DHCP/DHCP-Relays.md index 9b73de1c50..4a08e3705f 100644 --- a/content/cumulus-linux-44/Layer-1-and-Switch-Ports/DHCP/DHCP-Relays.md +++ b/content/cumulus-linux-44/Layer-1-and-Switch-Ports/DHCP/DHCP-Relays.md @@ -127,7 +127,7 @@ cumulus@leaf01:~$ nv config apply ## Optional Configuration -This section describes optional DHCP relay configuration. The steps provided in this section assume that you already done basic DHCP relay configuration, described above. +This section describes optional DHCP relay configurations. The steps provided in this section assume that you have already configured basic DHCP relay, as described above. ### DHCP Agent Information Option (Option 82) diff --git a/content/cumulus-linux-44/Layer-1-and-Switch-Ports/Interface-Configuration-and-Management/Switch-Port-Attributes.md b/content/cumulus-linux-44/Layer-1-and-Switch-Ports/Interface-Configuration-and-Management/Switch-Port-Attributes.md index 878d454d1b..9ce4cbd468 100644 --- a/content/cumulus-linux-44/Layer-1-and-Switch-Ports/Interface-Configuration-and-Management/Switch-Port-Attributes.md +++ b/content/cumulus-linux-44/Layer-1-and-Switch-Ports/Interface-Configuration-and-Management/Switch-Port-Attributes.md @@ -1135,7 +1135,7 @@ SN4600 64xQSFP56 (200GbE) interfaces support both PAM4 and NRZ encodings with al For lower speeds, PAM4 is automatically converted to NRZ encoding. -Only 32xQSFP56 ports can brea kout into 4xSFP56 (4x50GbE). But, in this case, the adjacent QSFP56 port are blocked (only the 1st/3rd or 2nd/4th rows can break out into 4xSFP56). +Only 32xQSFP56 ports can break out into 4xSFP56 (4x50GbE). But, in this case, the adjacent QSFP56 port are blocked (only the 1st/3rd or 2nd/4th rows can break out into 4xSFP56). All 64xQSFP56 ports can break out into 2xQSFP56 (2x100GbE) without blocking ports. diff --git a/content/cumulus-linux-44/Layer-1-and-Switch-Ports/Interface-Configuration-and-Management/_index.md b/content/cumulus-linux-44/Layer-1-and-Switch-Ports/Interface-Configuration-and-Management/_index.md index 83e84d8830..acb9d87589 100644 --- a/content/cumulus-linux-44/Layer-1-and-Switch-Ports/Interface-Configuration-and-Management/_index.md +++ b/content/cumulus-linux-44/Layer-1-and-Switch-Ports/Interface-Configuration-and-Management/_index.md @@ -447,7 +447,7 @@ If you specify a subinterface, such as swp1.100, then run `ifup swp1.100`, Cumul You can specify both IPv4 and IPv6 addresses for the same interface. For IPv6 addresses: -- You can create or modify the IP address for an interface using either `::` or `0:0:0` notation. For example,both 2620:149:43:c109:0:0:0:5 and 2001:DB8::1/126 are valid. +- You can create or modify the IP address for an interface using either `::` or `0:0:0` notation. For example, both 2620:149:43:c109:0:0:0:5 and 2001:DB8::1/126 are valid. - Cumulus Linux assigns the IPv6 address with all zeroes in the interface identifier (2001:DB8::/126) for each subnet; connected hosts cannot use this address. The following example commands configure three IP addresses for swp1; two IPv4 addresses and one IPv6 address. diff --git a/content/cumulus-linux-44/Layer-2/IGMP-and-MLD-Snooping.md b/content/cumulus-linux-44/Layer-2/IGMP-and-MLD-Snooping.md index 22eaf85a0a..fa8a08ed7a 100644 --- a/content/cumulus-linux-44/Layer-2/IGMP-and-MLD-Snooping.md +++ b/content/cumulus-linux-44/Layer-2/IGMP-and-MLD-Snooping.md @@ -137,7 +137,7 @@ cumulus@switch:~$ sudo ifreload -a ## Optimized Multicast Flooding (OMF) -IGMP snooping restricts multicast forwarding only to the ports that receive IGMP report messages. If the ports do not receive IGMP reports, multicast traffic floods to all ports in the bridge domain (also know as unregistered multicast (URMC) traffic). To restrict this flooding to only mrouter ports, you can enable OMF. +IGMP snooping restricts multicast forwarding only to the ports that receive IGMP report messages. If the ports do not receive IGMP reports, multicast traffic floods to all ports in the bridge domain (also known as unregistered multicast (URMC) traffic). To restrict this flooding to only mrouter ports, you can enable OMF. To enable OMF: diff --git a/content/cumulus-linux-44/Layer-3/Border-Gateway-Protocol-BGP/Optional-BGP-Configuration.md b/content/cumulus-linux-44/Layer-3/Border-Gateway-Protocol-BGP/Optional-BGP-Configuration.md index 32ff36d212..92ebeb3a89 100644 --- a/content/cumulus-linux-44/Layer-3/Border-Gateway-Protocol-BGP/Optional-BGP-Configuration.md +++ b/content/cumulus-linux-44/Layer-3/Border-Gateway-Protocol-BGP/Optional-BGP-Configuration.md @@ -1131,7 +1131,7 @@ BGP add-path RX enables BGP to receive multiple paths for the same prefix. A pat To view the existing capabilities, run the NCLU command `net show bgp neighbor` or the vtysh command `show ip bgp neighbors`. You can see the existing capabilities in the subsection *Add Path*, below *Neighbor capabilities.* -The following example output shows that BGP can sent and receive additional BGP paths, and that the BGP neighbor on swp51 supports both. +The following example output shows that BGP can send and receive additional BGP paths, and that the BGP neighbor on swp51 supports both. ``` cumulus@leaf01:~$ net show bgp neighbor diff --git a/content/cumulus-linux-44/Layer-3/Routing/Policy-based-Routing.md b/content/cumulus-linux-44/Layer-3/Routing/Policy-based-Routing.md index aa0e6bdac6..2182fd0bc3 100644 --- a/content/cumulus-linux-44/Layer-3/Routing/Policy-based-Routing.md +++ b/content/cumulus-linux-44/Layer-3/Routing/Policy-based-Routing.md @@ -28,7 +28,7 @@ A PBR policy contains one or more policy maps. Each policy map: - To match on a source and destination address, a policy map can contain both match source and match destination IP rules. - A set rule determines the PBR next hop for the policy. -To use PBR in Cumulus linux, you define a PBR policy and apply it to the ingress interface (the interface must already have an IP address assigned). Cumulus Linux matches traffic against the match rules in sequential order and forwards the traffic according to the set rule in the first match. Traffic that does not match any rule passes on to the normal destination based routing mechanism. +To use PBR in Cumulus Linux, you define a PBR policy and apply it to the ingress interface (the interface must already have an IP address assigned). Cumulus Linux matches traffic against the match rules in sequential order and forwards the traffic according to the set rule in the first match. Traffic that does not match any rule passes on to the normal destination based routing mechanism. To configure a PBR policy: diff --git a/content/cumulus-linux-44/Layer-3/Routing/Supported-Route-Table-Entries.md b/content/cumulus-linux-44/Layer-3/Routing/Supported-Route-Table-Entries.md index a8a386c61c..6376cf761e 100644 --- a/content/cumulus-linux-44/Layer-3/Routing/Supported-Route-Table-Entries.md +++ b/content/cumulus-linux-44/Layer-3/Routing/Supported-Route-Table-Entries.md @@ -23,7 +23,7 @@ Cumulus Linux provides several generalized profiles, described below. These prof The following tables list the number of MAC addresses, layer 3 neighbors, and LPM routes validated for each forwarding table profile. If you do not specify any profiles as described below, the switch uses the *default* values. {{%notice note%}} -The values in the following tables reflect results from testing, which can differ from published manufacturer specifications. +The values provided in the profiles below are the maximum values that Cumulus Linux software allocates; the theoretical hardware limits might be higher. These limits refer to values that have been validated as part of the unidimensional scale validation. If you try to achieve maximum scalability with multiple features enabled, results might differ from the values listed in this guide. {{%/notice%}} ### Spectrum-2 and Spectrum-3 diff --git a/content/cumulus-linux-44/Monitoring-and-Troubleshooting/FRRouting-Log-Message-Reference.md b/content/cumulus-linux-44/Monitoring-and-Troubleshooting/FRRouting-Log-Message-Reference.md index db2d6ff8d2..66fb438835 100644 --- a/content/cumulus-linux-44/Monitoring-and-Troubleshooting/FRRouting-Log-Message-Reference.md +++ b/content/cumulus-linux-44/Monitoring-and-Troubleshooting/FRRouting-Log-Message-Reference.md @@ -13,13 +13,13 @@ The following table lists the HIGH severity ERROR log messages generated by FRRo | Babel | HIGH | 16777218 | BABEL Packet Error | Babel has detected a packet encode/decode problem. | Collect the relevant log files and report the issue for troubleshooting.| | Babel | HIGH | 16777219 | BABEL Configuration Error | Babel has detected a configuration error of some sort. | Ensure that the configuration is correct. | | Babel | HIGH | 16777220 | BABEL Route Error | Babel has detected a routing error and is in an inconsistent state. | Gather data to report the issue for troubleshooting. Restart FRR. | -| BGP | HIGH | 33554433 | BGP attribute flag is incorrect | BGP attribute flag is set to the wrong value (Optional/Transitive/Partial). | Determine the soure of the attribute and determine why the attribute flag has been set incorrectly. | -| BGP | HIGH | 33554434 | BGP attribute length is incorrect | BGP attribute length is incorrect. | Determine the soure of the attribute and determine why the attribute length has been set incorrectly. | -| BGP | HIGH | 33554435 | BGP attribute origin value invalid | BGP attribute origin value is invalid. | Determine the soure of the attribute and determine why the origin attribute has been set incorrectly. | -| BGP | HIGH | 33554436 | BGP as path is invalid | BGP AS path has been malformed. | Determine the soure of the update and determine why the AS path has been set incorrectly. | -| BGP | HIGH | 33554437 | BGP as path first as is invalid | BGP update has invalid first AS in AS path. | Determine the soure of the update and determine why the AS path first AS value has been set incorrectly. | -| BGP | HIGH | 33554439 | BGP PMSI tunnel attribute type is invalid | BGP update has invalid type for PMSI tunnel. | Determine the soure of the update and determine why the PMSI tunnel attribute type has been set incorrectly. | -| BGP | HIGH | 33554440 | BGP PMSI tunnel attribute length is invalid | BGP update has invalid length for PMSI tunnel. | Determine the soure of the update and determine why the PMSI tunnel attribute length has been set incorrectly. | +| BGP | HIGH | 33554433 | BGP attribute flag is incorrect | BGP attribute flag is set to the wrong value (Optional/Transitive/Partial). | Determine the source of the attribute and determine why the attribute flag has been set incorrectly. | +| BGP | HIGH | 33554434 | BGP attribute length is incorrect | BGP attribute length is incorrect. | Determine the source of the attribute and determine why the attribute length has been set incorrectly. | +| BGP | HIGH | 33554435 | BGP attribute origin value invalid | BGP attribute origin value is invalid. | Determine the source of the attribute and determine why the origin attribute has been set incorrectly. | +| BGP | HIGH | 33554436 | BGP as path is invalid | BGP AS path has been malformed. | Determine the source of the update and determine why the AS path has been set incorrectly. | +| BGP | HIGH | 33554437 | BGP as path first as is invalid | BGP update has invalid first AS in AS path. | Determine the source of the update and determine why the AS path first AS value has been set incorrectly. | +| BGP | HIGH | 33554439 | BGP PMSI tunnel attribute type is invalid | BGP update has invalid type for PMSI tunnel. | Determine the source of the update and determine why the PMSI tunnel attribute type has been set incorrectly. | +| BGP | HIGH | 33554440 | BGP PMSI tunnel attribute length is invalid | BGP update has invalid length for PMSI tunnel. | Determine the source of the update and determine why the PMSI tunnel attribute length has been set incorrectly. | | BGP | HIGH | 33554442 | BGP peergroup operated on in error | BGP operating on peer-group instead of peers included. | Ensure the configuration doesn't contain peer-groups contained within peer-groups. | | BGP | HIGH | 33554443 | BGP failed to delete peer structure | BGP was unable to delete the peer structure when the address-family was removed. | Determine if all expected peers are removed and restart FRR if not. This is most likely a bug. | | BGP | HIGH | 33554444 | BGP failed to get table chunk memory | BGP unable to get chunk memory for table manager. | Ensure there is adequate memory on the device to support the table requirements. | @@ -38,8 +38,8 @@ The following table lists the HIGH severity ERROR log messages generated by FRRo | BGP | HIGH | 33554457 | BGP error receiving keepalive packet | BGP unable to process a keepalive packet. | BGP keepalive received while in a stopped state. If the problem persists, report it for troubleshooting. | | BGP | HIGH | 33554458 | BGP error receiving route refresh message | BGP unable to process route refresh message. | BGP route refresh received while in a stopped state. If the problem persists, report it for troubleshooting. | | BGP | HIGH | 33554459 | BGP error capability message | BGP unable to process received capability. | BGP capability message received while in a stopped state. If the problem persists, report it for troubleshooting. | -| BGP | HIGH | 33554460 | BGP error with nexthopo update | BGP unable to process nexthop update. | BGP received the nexthop update but the nexthop is not reachable in this BGP instance. Report the problem for troubleshooting. | -| BGP | HIGH | 33554461 | Failure to apply label | BGP attempted to attempted to apply a label but could not do so. | This is most likely a bug. If the problem persists, report it for troubleshooting. | +| BGP | HIGH | 33554460 | BGP error with nexthop update | BGP unable to process nexthop update. | BGP received the nexthop update but the nexthop is not reachable in this BGP instance. Report the problem for troubleshooting. | +| BGP | HIGH | 33554461 | Failure to apply label | BGP attempted to apply a label but could not do so. | This is most likely a bug. If the problem persists, report it for troubleshooting. | | BGP | HIGH | 33554462 | Multipath specified is invalid | BGP was started with an invalid ECMP/multipath value. | Correct the ECMP/multipath value supplied when starting the BGP daemon. | | BGP | HIGH | 33554463 | Failure to process a packet | BGP attempted to process a received packet but could not do so. | This is most likely a bug. If the problem persists, report it for troubleshooting. | | BGP | HIGH | 33554464 | Failure to connect to peer | BGP attempted to send open to a peer but couldn't connect. | This is most likely a bug. If the problem persists, report it for troubleshooting. | @@ -62,7 +62,7 @@ The following table lists the HIGH severity ERROR log messages generated by FRRo | EIGRP | HIGH | 50331650 | EIGRP Configuration Error | EIGRP has detected a configuration error.| Correct the configuration issue. If it still persists, report the issue for troubleshooting.| | General | HIGH | 100663297 | Failure to raise or lower privileges | FRR attempted to raise or lower its privileges and was unable to do so. | Ensure that you are running FRR as the frr user and that the user has sufficient privileges to properly access root privileges. | | General | HIGH | 100663298 | VRF Failure on Start | Upon startup, FRR failed to properly initialize and start up the VRF subsystem. | Ensure that there is sufficient memory to start processes, then restart FRR. | -| General | HIGH | 100663299 | Socket Error | When attempting to access a socket, a system error occured and FRR was unable to properly complete the request. | Ensure that there are sufficient system resources available and ensure that the frr user has sufficient permisions to work. | +| General | HIGH | 100663299 | Socket Error | When attempting to access a socket, a system error occurred and FRR was unable to properly complete the request. | Ensure that there are sufficient system resources available and ensure that the frr user has sufficient permissions to work. | | General | HIGH | 100663303 | System Call Error | FRR has detected an error from using a vital system call and has probably already exited. | Ensure permissions are correct for FRR users and groups. Additionally, check that sufficient system resources are available. | | General | HIGH | 100663304 | VTY Subsystem Error | FRR has detected a problem with the specified configuration file. | Ensure the configuration file exists and has the correct permissions for operations. Additionally, ensure that all config lines are correct as well. | | General | HIGH | 100663305 | SNMP Subsystem Error | FRR has detected a problem with the SNMP library it uses. A callback from this subsystem has indicated some error. | Examine the callback message and ensure SNMP is properly set up and working. | @@ -86,7 +86,7 @@ The following table lists the HIGH severity ERROR log messages generated by FRRo | OSPF | HIGH | 134217729 | Failure to process a packet | OSPF attempted to process a received packet but could not do so. | This is most likely a bug. If the problem persists, report it for troubleshooting. | | OSPF | HIGH | 134217730 | Failure to process Router LSA | OSPF attempted to process a router LSA, but there was an advertising ID mismtach with the link ID. | Check the OSPF network configuration for any configuration issue. If the problem persists, report it for troubleshooting.| | OSPF | HIGH | 134217731 | OSPF Domain Corruption | OSPF attempted to process a router LSA, but there was an advertising ID mismtach with the link ID. | Check OSPF network database for a corrupted LSA. If the problem persists, shut down the OSPF domain and report the problem for troubleshooting. | -| OSPF | HIGH | 134217732 | OSPF Initialization failure | OSPF failed to initialized the OSPF default instance. | Ensure there is adequate memory on the device. If the problem persists, report it for troubleshooting. | +| OSPF | HIGH | 134217732 | OSPF Initialization failure | OSPF failed to initialize the OSPF default instance. | Ensure there is adequate memory on the device. If the problem persists, report it for troubleshooting. | | OSPF | HIGH | 134217733 | OSPF SR Invalid DB | OSPF segment routing database is invalid. | This is most likely a bug. If the problem persists, report it for troubleshooting. | | OSPF | HIGH | 134217734 | OSPF SR hash node creation failed | OSPF segment routing node creation failed. | This is most likely a bug. If the problem persists, report it for troubleshooting. | | OSPF | HIGH | 134217735 | OSPF SR Invalid lsa id | OSPF segment routing invalid LSA ID. | Restart the OSPF instance. If the problem persists, report it for troubleshooting. | diff --git a/content/cumulus-linux-44/Monitoring-and-Troubleshooting/Simple-Network-Management-Protocol-SNMP/Configure-SNMP.md b/content/cumulus-linux-44/Monitoring-and-Troubleshooting/Simple-Network-Management-Protocol-SNMP/Configure-SNMP.md index 0e1530dc82..46da455d79 100644 --- a/content/cumulus-linux-44/Monitoring-and-Troubleshooting/Simple-Network-Management-Protocol-SNMP/Configure-SNMP.md +++ b/content/cumulus-linux-44/Monitoring-and-Troubleshooting/Simple-Network-Management-Protocol-SNMP/Configure-SNMP.md @@ -188,7 +188,7 @@ You can authenticate the user in the following ways: - With no authentication password (if you specify `auth-none`) - With an MD5 password -- With a SHA password +- With an SHA password {{< tabs "username" >}} {{< tab "NCLU Commands" >}} diff --git a/content/cumulus-linux-44/Monitoring-and-Troubleshooting/Simple-Network-Management-Protocol-SNMP/Supported-MIBs.md b/content/cumulus-linux-44/Monitoring-and-Troubleshooting/Simple-Network-Management-Protocol-SNMP/Supported-MIBs.md index e60d937e26..15d6262b5d 100644 --- a/content/cumulus-linux-44/Monitoring-and-Troubleshooting/Simple-Network-Management-Protocol-SNMP/Supported-MIBs.md +++ b/content/cumulus-linux-44/Monitoring-and-Troubleshooting/Simple-Network-Management-Protocol-SNMP/Supported-MIBs.md @@ -10,7 +10,7 @@ Below are the MIBs that Cumulus Linux supports, as well as suggested uses for th |
MIB Name | Suggested Uses | | -------- | -------------- | | {{}}
{{}}
{{}}
{{}} | You can enable FRRouting SNMP support to provide support for OSPF-MIB (RFC-1850), OSPFV3-MIB (RFC-5643), and BGP4-MIB (RFC-1657). See the FRRouting section above. | -| {{}} | Cumulus Linux also includes its own BGP unnumbered MIB for BGP unnumbered peers, defined in `/usr/share/snmp/mibs/Cumulus-BGPUN-MIB.txt`, which has the OID `1.3.6.1.4.1.40310.7`. CUMULUS-BGPVRF-MIB replaces CUMULUS-BGPUN-MIB.| +| {{}} | Cumulus Linux also includes its own BGP unnumbered MIB for BGP unnumbered peers, defined in `/usr/share/snmp/mibs/Cumulus-BGPUN-MIB.txt`, which has the OID `1.3.6.1.4.1.40310.7`.| | {{}} | Discard counters: Cumulus Linux also includes its own counters MIB, defined in `/usr/share/snmp/mibs/Cumulus-Counters-MIB.txt`. It has the OID `.1.3.6.1.4.1.40310.2`. | | {{}} | Cumulus Linux includes its own resource utilization MIB, which is similar to using `cl-resource-query`. This MIB monitors layer 3 entries by host, route, nexthops, ECMP groups, and layer 2 MAC/BDPU entries. `/usr/share/snmp/mibs/Cumulus-Resource-Query-MIB.txt` defines this MIB, which has the OID `.1.3.6.1.4.1.40310.1`. | | {{}} | SNMP counters. For information on exposing CPU and memory information with SNMP, see this [knowledge base article]({{}}). | diff --git a/content/cumulus-linux-44/Monitoring-and-Troubleshooting/Troubleshooting-Network-Interfaces/Troubleshoot-Layer-1.md b/content/cumulus-linux-44/Monitoring-and-Troubleshooting/Troubleshooting-Network-Interfaces/Troubleshoot-Layer-1.md index 6dc9ef7c82..928d6a0b2a 100644 --- a/content/cumulus-linux-44/Monitoring-and-Troubleshooting/Troubleshooting-Network-Interfaces/Troubleshoot-Layer-1.md +++ b/content/cumulus-linux-44/Monitoring-and-Troubleshooting/Troubleshooting-Network-Interfaces/Troubleshoot-Layer-1.md @@ -761,7 +761,7 @@ Because I2C problems can be very pernicious, often showing up again much later a To verify that an I2C failure is occurring, run `sudo tail -F /var/log/syslog` and look for `smbus` or `i2c` or `EEPROM read` errors that continue to appear or appear in bursts. -Based on the failure scenario when tyou discover the issue, choose when to address this issue; immediately or during a maintenance window. +Based on the failure scenario when you discover the issue, choose when to address this issue; immediately or during a maintenance window. - If traffic or the switch operates negatively and you cannot route traffic through a redundant network, you must do something immediately. - If you can route traffic around the failing switch, allowing troubleshooting to proceed on the failed switch, proceed to reroute traffic to find an appropriate time to troubleshoot the failing switch. diff --git a/content/cumulus-linux-44/Network-Virtualization/Ethernet-Virtual-Private-Network-EVPN/Basic-Configuration.md b/content/cumulus-linux-44/Network-Virtualization/Ethernet-Virtual-Private-Network-EVPN/Basic-Configuration.md index 97443871f6..7dd43bfff0 100644 --- a/content/cumulus-linux-44/Network-Virtualization/Ethernet-Virtual-Private-Network-EVPN/Basic-Configuration.md +++ b/content/cumulus-linux-44/Network-Virtualization/Ethernet-Virtual-Private-Network-EVPN/Basic-Configuration.md @@ -145,7 +145,7 @@ cumulus@leaf01:~$ nv set vrf default router bgp peer swp51 address-family l2vpn- cumulus@leaf01:~$ nv config apply ``` -Unlike with NCLU, you do not need enable the BGP control plane for all VNIs configured on the switch with NVUE with the `advertise-all-vni` option. FRR **is** aware of any local VNIs and MACs, and hosts (neighbors) associated with those VNIs. +Unlike with NCLU, you do not need to enable the BGP control plane for all VNIs configured on the switch with NVUE with the `advertise-all-vni` option. FRR **is** aware of any local VNIs and MACs, and hosts (neighbors) associated with those VNIs. The NVUE Commands create the following configuration snippet in the `/etc/nvue.d/startup.yaml` file: @@ -365,7 +365,7 @@ router bgp 65101 bgp router-id 10.10.10.1 neighbor swp51 interface remote-as external address-family l2vpn evpn -neighbor swp1 activate +neighbor swp51 activate advertise-all-vni ... ``` @@ -381,7 +381,7 @@ spine01(config)# router bgp 65199 spine01(config-router)# bgp router-id 10.10.10.101 spine01(config-router)# neighbor swp1 interface remote-as external spine01(config-router)# address-family l2vpn evpn -spine01(config-router-af)# neighbor swp51 activate +spine01(config-router-af)# neighbor swp1 activate spine01(config-router-af)# end spine01)# write memory spine01)# exit diff --git a/content/cumulus-linux-44/System-Configuration/Authentication-Authorization-and-Accounting/LDAP-Authentication-and-Authorization.md b/content/cumulus-linux-44/System-Configuration/Authentication-Authorization-and-Accounting/LDAP-Authentication-and-Authorization.md index 040ecef7c0..87038fbe81 100644 --- a/content/cumulus-linux-44/System-Configuration/Authentication-Authorization-and-Accounting/LDAP-Authentication-and-Authorization.md +++ b/content/cumulus-linux-44/System-Configuration/Authentication-Authorization-and-Accounting/LDAP-Authentication-and-Authorization.md @@ -57,10 +57,11 @@ Entering incorrect information during the installation process produces configur - Edit the `/etc/nslcd.conf` file to update the LDAP URI and search base DN (see {{}}, below). - Edit the `/etc/nssswitch.conf` file to update the service selections. -Be sure to restart `netd` after editing the files. +Restart `nvued.service` and `nginx-authenticator.service` after editing the files. ``` -cumulus@switch:~$ sudo systemctl restart netd.service +cumulus@switch:~$ sudo systemctl restart nvued.service +cumulus@switch:~$ sudo systemctl restart nginx-authenticator.service ``` {{< expand "Alternative Installation Method Using debconf-utils " >}} @@ -131,7 +132,7 @@ After installation, update the main configuration file (`/etc/nslcd.conf`) to ac This section documents some of the more important options that relate to security and queries. For details on all the available configuration options, read the {{}}. {{%notice note%}} -After first editing the `/etc/nslcd.conf` file and/or enabling LDAP in the `/etc/nsswitch.conf` file, you must restart `netd` with the `sudo systemctl restart netd` command. If you disable LDAP, you need to restart the `netd` service. +After editing the `/etc/nslcd.conf` file or enabling LDAP in the `/etc/nsswitch.conf` file, you must restart the NVUE and nginx-authenticator services with the `sudo systemctl restart nvued.service` command and the `sudo systemctl restart nginx-authenticator.service` command. If you disable LDAP, you must also restart these two services. {{%/notice%}} ### Connection diff --git a/content/cumulus-linux-44/System-Configuration/Authentication-Authorization-and-Accounting/RADIUS-AAA.md b/content/cumulus-linux-44/System-Configuration/Authentication-Authorization-and-Accounting/RADIUS-AAA.md index cacf03ccaf..51446f2b50 100644 --- a/content/cumulus-linux-44/System-Configuration/Authentication-Authorization-and-Accounting/RADIUS-AAA.md +++ b/content/cumulus-linux-44/System-Configuration/Authentication-Authorization-and-Accounting/RADIUS-AAA.md @@ -31,7 +31,18 @@ During package installation: ## Configure the RADIUS Client -To configure the RADIUS client, edit the `/etc/pam_radius_auth.conf` file: +To configure the RADIUS client, edit the `/etc/pam_radius_auth.conf` file. + +{{%notice note%}} + +After editing the `/etc/pam_radius_auth.conf` file, you must restart both `nvued.service` and `nginx-authenticator.service`: + +``` +cumulus@switch:~$ sudo systemctl restart nvued.service +cumulus@switch:~$ sudo systemctl restart nginx-authenticator.service +``` + +{{%/notice%}} 1. Add the hostname or IP address of at least one RADIUS server (such as a *{{}}* server on Linux), and the shared secret used to authenticate and encrypt communication with each server. diff --git a/content/cumulus-linux-44/System-Configuration/Authentication-Authorization-and-Accounting/TACACS.md b/content/cumulus-linux-44/System-Configuration/Authentication-Authorization-and-Accounting/TACACS.md index 7b544e92aa..35914b6722 100644 --- a/content/cumulus-linux-44/System-Configuration/Authentication-Authorization-and-Accounting/TACACS.md +++ b/content/cumulus-linux-44/System-Configuration/Authentication-Authorization-and-Accounting/TACACS.md @@ -27,6 +27,17 @@ cumulus@switch:~$ sudo -E apt-get install tacplus-client ## Configure the TACACS+ Client +{{%notice note%}} + +After you configure TACACS+ settings, you must restart both `nvued.service` and `nginx-authenticator.service`: + +``` +cumulus@switch:~$ sudo systemctl restart nvued.service +cumulus@switch:~$ sudo systemctl restart nginx-authenticator.service +``` + +{{%/notice%}} + After installing TACACS+, edit the `/etc/tacplus_servers` file to add at least one server and one shared secret (key). You can specify the server and secret parameters in any order anywhere in the file. Whitespace (spaces or tabs) are not allowed. For example, if your TACACS+ server IP address is `192.168.0.30` and your shared secret is `tacacskey`, add these parameters to the `/etc/tacplus_servers` file: ``` @@ -126,10 +137,11 @@ The first `adduser` command prompts for information and a password. You can skip 3. Edit the `/etc/nsswitch.conf` file to add the keyword `tacplus` back to the line starting with `passwd` (the keyword you removed in the first step). -4. Restart the `netd` service with the following command: +4. Restart the `nvued` service and the `nginx-authenticator` service with the following commands: ``` - cumulus@switch:~$ sudo systemctl restart netd + cumulus@switch:~$ sudo systemctl restart nvued.service + cumulus@switch:~$ sudo systemctl restart nginx-authenticator.service ``` ## TACACS+ Accounting diff --git a/content/cumulus-linux-44/System-Configuration/Netfilter-ACLs/_index.md b/content/cumulus-linux-44/System-Configuration/Netfilter-ACLs/_index.md index eab48c2bbf..93f81769e1 100644 --- a/content/cumulus-linux-44/System-Configuration/Netfilter-ACLs/_index.md +++ b/content/cumulus-linux-44/System-Configuration/Netfilter-ACLs/_index.md @@ -144,7 +144,7 @@ The incremental nonatomic update operation follows this order: 2. Cumulus Linux checks if the rules in a table are different from installation time; if a table does not have any changes, it does not reinstall the rules. 3. If there are changes in a table, the new rules populate in new groups or slices in hardware, then that table switches over to the new groups or slices. 4. Finally, old resources for that table free up. This process repeats for each of the tables listed above. -5. If there are isufficient resources to hold both the new rule set and old rule set, Cumulus Linux tries the regular nonatomic mode, which interrupts network traffic. +5. If there are insufficient resources to hold both the new rule set and old rule set, Cumulus Linux tries the regular nonatomic mode, which interrupts network traffic. 6. If the regular nonatomic update fails, Cumulus Linux reverts back to the previous rules. To always start `switchd` with nonatomic updates: @@ -1058,7 +1058,7 @@ To work around this limitation, set the rate and burst for all these rules to th ### Where to Assign Rules - If you assign a switch port to a bond, you must assign any egress rules to the bond. -- When using the OUTPUT chain, you must assign rules to the source. For example, if you assign a rule to the switch port in the direction of traffic but the source is a bridge (VLAN), the rule does not affect the traffic and you must applied the rule to the bridge. +- When using the OUTPUT chain, you must assign rules to the source. For example, if you assign a rule to the switch port in the direction of traffic but the source is a bridge (VLAN), the rule does not affect the traffic and you must apply the rule to the bridge. - If you need to apply a rule to all transit traffic, use the FORWARD chain, not the OUTPUT chain. ### ACL Rule Installation Failure @@ -1077,7 +1077,7 @@ failed. ### INPUT Chain Rules -Cumulus Linux implements INPUT chain rules using a trap mechanism and assigns trap IDs to packets that go to the CPU. The default INPUT chain rules map to these trap IDs. However, if a packet matches multiple traps, an internal priority mechanism resolves them. which can be different from the rule priorities. The default expected rule does not police the packet but another rule polices it instead. For example, the LOCAL rule polices ICMP packets that go to the CPU instead of the ICMP rule. Also, multiple rules can share the same trap, where the largest of the policer values applies. +Cumulus Linux implements INPUT chain rules using a trap mechanism and assigns trap IDs to packets that go to the CPU. The default INPUT chain rules map to these trap IDs. However, if a packet matches multiple traps, an internal priority mechanism resolves them which can be different from the rule priorities. The default expected rule does not police the packet but another rule polices it instead. For example, the LOCAL rule polices ICMP packets that go to the CPU instead of the ICMP rule. Also, multiple rules can share the same trap, where the largest of the policer values applies. To work around this issue, create rules on the INPUT and FORWARD chains (INPUT,FORWARD). diff --git a/content/cumulus-linux-44/Whats-New/rn.md b/content/cumulus-linux-44/Whats-New/rn.md index 8fb21f3064..44ed2ee0a0 100644 --- a/content/cumulus-linux-44/Whats-New/rn.md +++ b/content/cumulus-linux-44/Whats-New/rn.md @@ -14,30 +14,14 @@ pdfhidden: True | Issue ID | Description | Affects | Fixed | |--- |--- |--- |--- | -| [3647731](#3647731)
None | CVE-2023-38408: The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009
Mitigation: Do not use ssh-agent forwarding (the man page for ssh_config says that "agent forwarding should be enabled with caution"), or start the ssh-agent program with the -P option to allow only specific PKCS#11 libraries (or none with -P '')
For Cumulus Linux 4.3.2, the /usr/bin/ssh-agent program has all permissions turned off (chmod 0) to prevent its execution if a vulnerable version is detected. | 4.0.0-4.4.5, 5.0.0-5.6.0 | | | [3647424](#3647424)
None | When you remove the update-source configuration for a BGP neighbor, the peering is reset if the neighbor is a member of a peer group with the same update-source configuration. | 4.3.0-4.4.5 | | -| [3534654](#3534654)
| On a Broadcom switch, Q-in-Q VLAN operations do not clear when you remove a bridge port from a VXLAN-enabled bridge. This can result in unexpected double tagged packets if the outer VLAN is still used on the bridge. To work around this issue, restart switchd after you modify or remove double tagged bridge ports from a VXLAN-enabled bridge. | 4.3.1-4.4.5 | | +| [3600912](#3600912)
| In an MLAG EVPN configuration, if host mobility occurs multiple times at high frequency, the host MAC might point to an incorrect VTEP; it might be local behind the VTEP. | 4.3.1-4.4.5 | | | [3488136](#3488136)
| When zebra receives route updates that include both a route with a recursive next hop and the route used to resolve that next hop, zebra might mark the route with the recursive next hop as inactive. To work around this issue, reprocess the route updates by running the appropriate clear command for the protocol in use. For example, for BGP, clear inbound routes from the relevant neighbor using the nv action clear vrf router bgp neighbor address-family in command. | 4.2.1-5.5.1 | 5.6.0| -| [3486888](#3486888)
None | If FRR learns a layer 2 entry against a VNI and you reconfigure the VNI later as a layer 3 VNI, the original layer 2 entry does not clear and remains in the forwarding database. | 4.3.0-5.5.1 | 5.6.0| -| [3479967](#3479967)
| When you remove VRF configuration, the systemctl reload frr.service command returns a non zero exit code after erroneously running the invalid command no exit-vrf. | 4.3.1-4.4.5 | | | [3474391](#3474391)
| The SNMP MIB definition file /usr/share/snmp/mibs/Cumulus-BGPVRF-MIB.txt does not define the INDEX of the bgpPeerEntry correctly. This issue does not impact SNMP functionality for this MIB. | 4.3.1-5.5.1 | 5.6.0| -| [3455998](#3455998)
| When you poll the BGP unnumbered MIB object 1.3.6.1.4.1.40310.4 after uncommenting the bgpun_pp.py pass persist script in the /etc/snmpd/snmpd.conf file, BGP session information is not retrieved. To work around this issue, add executable permissions to the script with the sudo chmod +x /usr/share/snmp/bgpun_pp.py command. | 4.3.1-4.4.5 | | -| [3448171](#3448171)
| If a default route is withdrawn from the routing table and then learned again, traffic matching this entry will be software (cpu) forwarded.  This will cause intermittent drops due to the CPU the rate-limiter
This only impacts the default VRF and a default route learned dynamically
In order to recover from this condition: 1. Restart switchd.service (sudo systemctl restart switchd.service)OR 2. Reboot the switch (sudo reboot) | 4.3.1-4.4.5 | | -| [3434315](#3434315)
| IPv6 BGP sessions in a VRF do not be establish with MD5 authentication. | 4.3.0-4.4.5 | | | [3429530](#3429530)
| On the Spectrum-2 and Spectrum-3 switch, multiple interfaces (in the same PLL quarter) might flap intermittently at the same time. | 4.2.1-5.4.0 | 5.5.0-5.6.0| -| [3419962](#3419962)
| On a Broadcom switch, if you remove a double-tagged interface from a bridge that contains other double-tagged interfaces built on the same physical port (for example, you remove swp1.10.100 when swp1.10.200 is also a bridge port), traffic forwarding within the bridge might fail and you see critical warnings in the /var/log/switchd.log file similar to the following:
switchd[8587]: hal_bcm.c:2207 CRIT knet_vlan_translate_delete(update): port 1 ext_vlan 10.100 int_vlan 2132: -11
| 4.3.1-4.4.5 | | -| [3419953](#3419953)
| If you remove a double tagged bridge port from a bridge when a different interface exists with the same port and virtual ID, you might see a segmentation fault and a switchd crash due to incorrect initialization when Cumulus Linux creates the second double-tagged interface. To work around this issue, make sure you remove the double-tagged interfaces from the bridge in the /etc/network/interfaces file. | 4.3.1-4.4.5 | | -| [3418045](#3418045)
None | If MLAG is configured but disconnected from an MLAG peer for an extended period of time (days or more), there is a long delay (up to a minute per day) before traffic forwarding stabilizes after the MLAG peer connection re-establishes. | 3.7.0-5.4.0 | 5.5.0-5.6.0| -| [3401121](#3401121)
| sFlow is not able to sample packets in the egress direction. To work around this issue, add the following to the hsflowd.conf file to enable egress sampling:
samplingDirection=outpsample { group=1 }
| 4.3.0-4.4.5 | | | [3387852](#3387852)
None | If you remove NGINX from the switch, then run apt autoremove, switchd does not reload because the libyaml-0-2 and python-yaml packages are missing; these packages are required for switchd consistency checking. To work around this issue, reinstall the libyaml-0-2 and python-yaml packages. | 4.4.0-4.4.5 | | -| [3376798](#3376798)
| On Broadcom switches, Cumulus Linux does not create the hardware bridging domain for a traditional bridge with a VXLAN interface during switchd restart. The /var/log/switchd.log file includes the following exception logs shortly after switchd restarts:
switchd[30158]: hal_bcm_l3.c:1617 find_egr_path_if_vxlan_overlay:vxlan overlay : nh PORT: port <#>, vlan . not yet ready
MAC learning looks correct, but traffic does not flow as expected. | 3.7.0-3.7.16, 4.3.1-4.4.5 | | | [3368217](#3368217)
None | When daylight saving time changes, the MLAG initDelay timer resets and all MLAG bonds go down. | 4.4.4-4.4.5, 5.2.1-5.6.0 | | -| [3366612](#3366612)
| The base version of the Linux kernel is updated to the v4.19.273 stable release, which includes fixes for several CVE issues. | 4.3.1-4.4.5 | | -| [3364996](#3364996)
| Under certain conditions, BGP can allow a combination of EVPN and non-EVPN paths to be put into a multipath group together. This results in erroneous programming of EVPN symmetric next hops and RMACs, which can result in momentary traffic drops. | 4.3.0-4.4.5 | | -| [3364717](#3364717)
None | On the Trident 2+ and Trident 3 switch when using VXLAN layer 2 VPNs and sending tunneled traffic where the inner IP header has a TTL of 1, the egress VTEP incorrectly forwards this traffic through the software path instead of the hardware data plane. This traffic is rate-limited to 100pps by default. To work around this issue, ensure that the traffic traversing the layer 2 tunnel has an inner IP header TTL value that is more than 1. If this workaround is not possible, contact Nvidia Support to determine other options. | 4.3.0-4.4.5 | | -| [3358865](#3358865)
None | When you reboot a Broadcom switch with a static default route configured, the route might be installed in hardware without a next hop. This results in forwarded traffic to the CPU and drops. To recover from this issue, remove the default route configuration and reapply it. To prevent this issue, before rebooting the switch, split the default route configuration into two routes as below:
ip route 0.0.0.0/1 10.1.1.1ip route 128.0.0.0/1 10.1.1.1
| 4.3.1-4.4.5 | | -| [3351951](#3351951)
None | Currently, the default core dump size limit on Cumulus Linux is 256M but the SDK generates core dumps around 800M. To avoid incomplete core files, you can increase the core dump size limit. | 4.2.1-5.3.1 | 5.4.0-5.6.0| -| [3334031](#3334031)
None | When you configure or unconfigure a BGP peer and interface towards a host, memory corruption can cause BGP to crash. | 4.3.0-4.4.5 | | +| [3351951](#3351951)
None | Currently, the default core dump size limit on Cumulus Linux is 256M but the SDK generates core dumps around 800M. To avoid incomplete core files, you can increase the core dump size limit. | 4.2.1-4.3.1, 4.4.0-5.3.1 | 4.3.2, 5.4.0-5.6.0| | [3333064](#3333064)
None | The traffic control rules that the EVPN multihoming configuration adds to an interface are deleted when the hsflowd service restarts. The hsflowd service deletes the EVPN multihoming traffic control filters after you stop hsflowd, then adds back the match-all filters with the psample action; however, hsflowd does not add back the EVPN multihoming traffic control rules. | 4.4.0-5.3.1 | 5.4.0-5.6.0| | [3330705](#3330705)
| When using TACACS+, a TACACS+ server name that returns more than one IP address, such as an IPv6 and IPv4 address, is counted many times against the limit of seven TACACS+ servers, which might cause some of the later listed servers to be ignored as over the limit. To work around this issue, you can set the prefer_ip_version configuration option (the default value is 4) to choose between an IPv4 or IPv6 address if both are present. | 3.7.0-5.3.1 | 5.4.0-5.6.0| | [3327477](#3327477)
| If you use su to change to a user specified through TACACS+, the user becomes the local tacacs0 thru tacacs15 user instead of the named user to run sudo commands. As a result, the named user password might not match the local tacacs0 thru tacacs15 user password. | 3.7.0-3.7.16, 4.0.0-4.4.5, 5.0.0-5.6.0 | | @@ -46,20 +30,13 @@ pdfhidden: True | [3293110](#3293110)
| You cannot set the NTF router flag (NTF_ROUTER) on neighbor entries from the user space. | 4.4.2-4.4.5 | | | [3292873](#3292873)
| When you run ZTP manually with the ztp -R command, then the ztp -vb command, the process stalls indefinitely while searching the local (USB) location and not using DHCP information. To work around this issue, run the ztp -r command with the URL of the ZTP server:
[Dec-08-17:09:58] root@switch:/home/cumulus#  ztp -r http://myztp.server.local/ztp
| 4.4.2-4.4.5 | | | [3291548](#3291548)
None | In EVPN deployments, a buffer lockup for split or pre-split ports can occur on Spectrum-2 and Spectrum-3 switches. As result, traffic coming in on these ports is dropped in the RX buffer. To work around this issue, restart switchd. | 4.2.1-4.4.5 | 5.0.0-5.6.0| -| [3288385](#3288385)
| On the EdgeCore AS7326-56X and AS7726-32X switch, the fan speed reports a minimum threshold in the logs. | 4.3.1-4.4.5 | | | [3288156](#3288156)
None | When you configure a new VNI, the VLAN 1 VNI mapping is removed from the VXLAN device. To work around this issue, set the VNI interface mapped to VLAN 1 down and up again. | 4.4.3-5.1.0 | 5.2.0-5.6.0| | [3284719](#3284719)
| Certain EVPN multihoming show commands might cause the bgpd service to crash if you use the json flag and try to reference the default VRF by name. For example: show bgp l2vpn evpn es-vrf json. | 4.4.2-4.4.5 | | | [3270988](#3270988)
| After restarting switchd on the NVIDIA SN2100 switch, the FAN speeds are at one hundred percent. To work around this issue, restart the hw-management service. | 4.4.5-5.2.0 | 5.2.1-5.6.0| -| [3269538](#3269538)
None | The cl-ecmpcalc command prints the following error when the egress interface is a bond or SVI:
ecmpcalc: will query hardwareTraceback (most recent call last):File “/usr/cumulus/bin/cl-ecmpcalc”, line 986, inisTrunkMbr, port = ecmp.getHdPort(hd_cmd)File “/usr/cumulus/bin/cl-ecmpcalc”, line 618, in getHdPortport = int(str4)ValueError: invalid literal for int() with base 10: ‘0t
| 4.3.0-4.4.5 | | | [3269537](#3269537)
None | When an FRR routing service (such as bgpd) becomes unresponsive, watchfrr might fail to stop and restart service. To work around this issue, restart FRR with the systemctl restart frr command. | 4.4.0-5.3.1 | 5.4.0-5.6.0| -| [3267353](#3267353)
| In a QinQ configuration, if the VLAN priority is a non-zero value, double-tagged packets are translated to triple-tagged packets. | 4.3.1-4.4.5 | | -| [3244740](#3244740)
None | If you have a lot of inbound route maps that match lists with many regex statements, a large number of updates from the peer can cause the system to run out of memory. To work around this issue, reduce the number of regex matches in inbound route maps. | 4.4.0-5.2.1 | 5.3.0-5.6.0| -| [3240406](#3240406)
None | When you configure or unconfigure a BGP peer and interface towards a host, memory corruption can cause BGP to crash. | 4.3.0-5.3.1 | 5.4.0-5.6.0| +| [3244740](#3244740)
None | If you have a lot of inbound route maps that match lists with many regex statements, a large number of updates from the peer can cause the system to run out of memory. To work around this issue, reduce the number of regex matches in inbound route maps. | 4.4.0-5.2.1 | 4.3.2, 5.3.0-5.6.0| | [3236366](#3236366)
None | When you run docker commands, the command process might crash. The crash can occur during the apt upgrade process, where you can run docker commands implicitly. To work around this issue, run ulimit -v unlimited before running docker commands. | 4.4.5 | | -| [3236334](#3236334)
None | Using ARP suppression with a very large number of interfaces might result in missing ARP entries on the local device or buffer underrun warnings in the neighmgrd log. | 4.3.0-4.4.5 | | -| [3235956](#3235956)
| With certain triggers on Broadcom switches, such as adding or deleting a VNI or reloading the network, Cumulus Linux might consider the underlay routes as overlay routes. In this case, switchd allocates the overlay next hop, which is incorrect and might affect traffic forwarding. | 4.3.0-4.4.5 | | | [3235368](#3235368)
| When you try to configure VRF route leaking between many VRFs using multiple NCLU commands before running the net commit command, the commit fails. To work around this issue, configure VRF leaking one command at a time and run net commit after each command. | 4.4.4-5.2.1 | 5.3.0-5.6.0| -| [3234031](#3234031)
None | If BGP neighbor allowas-in is set, negating with no no neighbor allowas-in does not disable the setting. To work around this issue and disable the setting, restart the FRR service. | 4.2.1-5.2.1 | 5.3.0-5.6.0| | [3227677](#3227677)
| When daylight saving time changes the time, the MLAG initDelay timer resets and all MLAG bonds go down. | 4.4.4-5.2.1 | 5.3.0-5.6.0| | [3226579](#3226579)
None | The net show interface detail command output shows Type=Unknown for the specified interface. | 4.4.3-4.4.5 | | | [3221470](#3221470)
None | Under heavy system load, when many forwarding resources (routes, neighbors, ECMP groups, and so on) are removed from hardware, subsequent attempts to configure additional forwarding resources might fail and you see the following log message:
sx_sdk: EMAD_RX_THREAD: EMAD transaction FW error
| 4.4.0-5.1.0 | 5.2.0-5.6.0| @@ -70,7 +47,7 @@ pdfhidden: True | [3211359](#3211359)
| The net show interface detail command output shows Type=Unknown for the specified interface. | 4.4.3-5.0.1 | 5.1.0-5.6.0| | [3211054](#3211054)
| On the NVIDIA Spectrum-2 switch, when receiving multicast traffic on a PIM enabled VLAN, the multicast traffic is forwarded correctly to the associated VLAN, however WJH shows traffic loss with the error:

Packet size is larger than router interface MTU – Validate the router interface MTU configuration
| 4.4.2-5.2.1 | 5.3.0-5.6.0| | [3209699](#3209699)
None | RADIUS authenticated users with read-only access to NCLU commands (users in the users_with_show list) can run edit commands if a username for a non-local account is on the users_with_edit line of the /etc/netd.conf file. To work around this issue, make sure that all usernames on the users_with_edit line of the /etc/netd.conf file are configured local users for the system (real Linux users)
| 3.7.0-4.3.0, 4.4.0-5.2.1 | 4.3.1, 5.3.0-5.6.0| -| [3192808](#3192808)
None | When the switch receives an LLDP frame from a Cisco router right after a ptmd restart, the ptmd service crashes. | 4.3.0-5.2.1 | 5.3.0-5.6.0| +| [3192808](#3192808)
None | When the switch receives an LLDP frame from a Cisco router right after a ptmd restart, the ptmd service crashes. | 4.3.0-4.3.1, 4.4.0-5.2.1 | 4.3.2, 5.3.0-5.6.0| | [3168564](#3168564)
| In a large scale VXLAN configuration (for example if you have more than 8500 VLANs across ports), switchd might crash when you restart clagd or when all bonds go operationally down, then up
On Trident3 switches running Cumulus Linux 4.3.1, NVIDIA validates the VLAN scale limit for VXLAN deployments with 8500 VLANs across ports with LACP bypass disabled. | 4.3.1-4.4.5 | | | [3163845](#3163845)
| If bond slaves listed in the /etc/network/interfaces file are not in alphabetical order, the bond interface MAC address can change when you run ifreload. For example, if the bond slaves in the /etc/network/interfaces file are listed as swp32 swp31, the switch initially uses the MAC address for swp32 as the bond MAC address. An another ifreload can cause this to change to use the MAC address for swp31 as the bond MAC address, which can cause protocol issues, such as IPv6 link-local address changes. | 4.3.1-4.4.5 | | | [3157240](#3157240)
| When you try to query REDECN counters with the mlxcmd utility on a bond member port with the following commands, syslog reports an error
sudo /usr/lib/cumulus/mlxcmd roce counters --port sudo /usr/lib/cumulus/mlxcmd qos counters --clear --port 
| 4.4.4-5.1.0 | 5.2.0-5.6.0| @@ -139,6 +116,7 @@ pdfhidden: True | [2780915](#2780915)
| In NVUE, you can't deactivate the IPv4 address family per neighbor. | 4.4.0-4.4.5 | 5.0.0-5.6.0| | [2780834](#2780834)
| To enable an address family on a peer, you have to enable the address family globally. | 4.4.0-4.4.5 | 5.0.0-5.6.0| | [2780211](#2780211)
| When you use the NVUE nv set vrf default router bgp peer local-as asn command to configure a local AS, Cumulus Linux does not update the etc/frr/frr.conf file. | 4.4.0-4.4.5 | 5.0.0-5.6.0| +| [2771653](#2771653)
| When using W-ECMP, the weights for various BGP next hops can sometimes be in the range of 100s or more, which consumes a lot of hardware space. | 4.3.0-4.4.5 | | | [2763819](#2763819)
| When you enable LACP bypass on a bond, traffic to static MAC addresses configured on the bond might not work when LACP bypass is enforced. | 4.4.0-4.4.5 | | | [2754791](#2754791)
| Remote MAC addreses in zebra are out of sync with bgpd. The zebra MAC addresses point to an incorrect (old) VTEP IP address and the sequence number is one higher than in BGP. | 3.7.14.2-3.7.16, 4.3.0-4.4.5 | | | [2753955](#2753955)
| On the Lenovo MSN3700 switch, if you try to configure an interface with a link speed of 200G, the configuration fails. | 4.2.1-4.4.5 | 5.0.0-5.6.0| @@ -182,7 +160,6 @@ pdfhidden: True | [2555763](#2555763)
CM-32861 | The NCLU net del bgp neighbor command does not delete the neighbor and displays an error similar to the following:

ERROR: --- /run/nclu/frr/frr.conf.scratchpad.baseline 2021-01-04 17:23:59.250463331 +0000
+++ /run/nclu/frr/frr.conf.scratchpad 2021-01-04 17:25:59.213673980 +0000

To work around this issue, use the FRR command to delete a neighbor. | 4.3.0-4.4.5 | | | [2555613](#2555613)
CM-32786 | The net show configuration commands command incorrectly displays the NCLU syntax to disable IPv6 forwarding on interfaces. For example:

# net show configuration commands
net add vlan 1 ip6-forward off

The correct NCLU command to disable IPv6 forwarding is net add vlan 1 ipv6 forward off (without the hyphen). | 4.2.1-4.4.5 | | | [2555318](#2555318)
CM-32612 | If you try to enable BGP graceful restart when it is already enabled, you see an error similar to the following in the frr.log file:

2020-12-07T19:20:26.004333+00:00 cumulus bgpd[4954]: VRF default: Handle GR command GLOBAL_GR_CMD, current GR state GLOBAL_GR, new GR state GLOBAL_INVALID

This error has no functional impact. | 4.3.0-4.4.5 | | -| [2555175](#2555175)
CM-32528 | Control Plane Traffic (example - BGP peering from Leaf to Spine) goes down on Leaf due to Hold Down Timer Expiration of peer following prolonged link flaps on downlinks when vxlan enabled vlans are carried on the flapping link. | 3.7.15-3.7.16, 4.2.1-4.4.5 | | | [2554986](#2554986)
CM-32416 | The ethtool utility doesn't contain the latest values, as a result the Revision Compliance field shows Unallocated. | 4.2.1-4.4.5 | | | [2554812](#2554812)
CM-32296 | If the RMAC of a layer 3 SVI changes, the show vrf vni command is not updated with the new value. However, the new RMAC is seen in the show evpn vni command and is present on self-originated EVPN routes. | 4.2.1-4.4.5 | | | [2554783](#2554783)
CM-32274 | If you apply an outbound route map to a BGP peer that uses set as-path prepend last-as, advertised locally-originated routes have the ASN of the peer prepended to the AS path.
This might trigger AS path loop prevention on the peer, where the peer ignores locally-originated prefixes. | 4.2.1-4.4.5 | 5.0.0-5.6.0| @@ -329,30 +306,14 @@ pdfhidden: True | Issue ID | Description | Affects | Fixed | |--- |--- |--- |--- | -| [3647731](#3647731)
None | CVE-2023-38408: The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009
Mitigation: Do not use ssh-agent forwarding (the man page for ssh_config says that "agent forwarding should be enabled with caution"), or start the ssh-agent program with the -P option to allow only specific PKCS#11 libraries (or none with -P '')
For Cumulus Linux 4.3.2, the /usr/bin/ssh-agent program has all permissions turned off (chmod 0) to prevent its execution if a vulnerable version is detected. | 4.0.0-4.4.5, 5.0.0-5.6.0 | | | [3647424](#3647424)
None | When you remove the update-source configuration for a BGP neighbor, the peering is reset if the neighbor is a member of a peer group with the same update-source configuration. | 4.3.0-4.4.5 | | -| [3534654](#3534654)
| On a Broadcom switch, Q-in-Q VLAN operations do not clear when you remove a bridge port from a VXLAN-enabled bridge. This can result in unexpected double tagged packets if the outer VLAN is still used on the bridge. To work around this issue, restart switchd after you modify or remove double tagged bridge ports from a VXLAN-enabled bridge. | 4.3.1-4.4.5 | | +| [3600912](#3600912)
| In an MLAG EVPN configuration, if host mobility occurs multiple times at high frequency, the host MAC might point to an incorrect VTEP; it might be local behind the VTEP. | 4.3.1-4.4.5 | | | [3488136](#3488136)
| When zebra receives route updates that include both a route with a recursive next hop and the route used to resolve that next hop, zebra might mark the route with the recursive next hop as inactive. To work around this issue, reprocess the route updates by running the appropriate clear command for the protocol in use. For example, for BGP, clear inbound routes from the relevant neighbor using the nv action clear vrf router bgp neighbor address-family in command. | 4.2.1-5.5.1 | 5.6.0| -| [3486888](#3486888)
None | If FRR learns a layer 2 entry against a VNI and you reconfigure the VNI later as a layer 3 VNI, the original layer 2 entry does not clear and remains in the forwarding database. | 4.3.0-5.5.1 | 5.6.0| -| [3479967](#3479967)
| When you remove VRF configuration, the systemctl reload frr.service command returns a non zero exit code after erroneously running the invalid command no exit-vrf. | 4.3.1-4.4.5 | | | [3474391](#3474391)
| The SNMP MIB definition file /usr/share/snmp/mibs/Cumulus-BGPVRF-MIB.txt does not define the INDEX of the bgpPeerEntry correctly. This issue does not impact SNMP functionality for this MIB. | 4.3.1-5.5.1 | 5.6.0| -| [3455998](#3455998)
| When you poll the BGP unnumbered MIB object 1.3.6.1.4.1.40310.4 after uncommenting the bgpun_pp.py pass persist script in the /etc/snmpd/snmpd.conf file, BGP session information is not retrieved. To work around this issue, add executable permissions to the script with the sudo chmod +x /usr/share/snmp/bgpun_pp.py command. | 4.3.1-4.4.5 | | -| [3448171](#3448171)
| If a default route is withdrawn from the routing table and then learned again, traffic matching this entry will be software (cpu) forwarded.  This will cause intermittent drops due to the CPU the rate-limiter
This only impacts the default VRF and a default route learned dynamically
In order to recover from this condition: 1. Restart switchd.service (sudo systemctl restart switchd.service)OR 2. Reboot the switch (sudo reboot) | 4.3.1-4.4.5 | | -| [3434315](#3434315)
| IPv6 BGP sessions in a VRF do not be establish with MD5 authentication. | 4.3.0-4.4.5 | | | [3429530](#3429530)
| On the Spectrum-2 and Spectrum-3 switch, multiple interfaces (in the same PLL quarter) might flap intermittently at the same time. | 4.2.1-5.4.0 | 5.5.0-5.6.0| -| [3419962](#3419962)
| On a Broadcom switch, if you remove a double-tagged interface from a bridge that contains other double-tagged interfaces built on the same physical port (for example, you remove swp1.10.100 when swp1.10.200 is also a bridge port), traffic forwarding within the bridge might fail and you see critical warnings in the /var/log/switchd.log file similar to the following:
switchd[8587]: hal_bcm.c:2207 CRIT knet_vlan_translate_delete(update): port 1 ext_vlan 10.100 int_vlan 2132: -11
| 4.3.1-4.4.5 | | -| [3419953](#3419953)
| If you remove a double tagged bridge port from a bridge when a different interface exists with the same port and virtual ID, you might see a segmentation fault and a switchd crash due to incorrect initialization when Cumulus Linux creates the second double-tagged interface. To work around this issue, make sure you remove the double-tagged interfaces from the bridge in the /etc/network/interfaces file. | 4.3.1-4.4.5 | | -| [3418045](#3418045)
None | If MLAG is configured but disconnected from an MLAG peer for an extended period of time (days or more), there is a long delay (up to a minute per day) before traffic forwarding stabilizes after the MLAG peer connection re-establishes. | 3.7.0-5.4.0 | 5.5.0-5.6.0| -| [3401121](#3401121)
| sFlow is not able to sample packets in the egress direction. To work around this issue, add the following to the hsflowd.conf file to enable egress sampling:
samplingDirection=outpsample { group=1 }
| 4.3.0-4.4.5 | | | [3387852](#3387852)
None | If you remove NGINX from the switch, then run apt autoremove, switchd does not reload because the libyaml-0-2 and python-yaml packages are missing; these packages are required for switchd consistency checking. To work around this issue, reinstall the libyaml-0-2 and python-yaml packages. | 4.4.0-4.4.5 | | -| [3376798](#3376798)
| On Broadcom switches, Cumulus Linux does not create the hardware bridging domain for a traditional bridge with a VXLAN interface during switchd restart. The /var/log/switchd.log file includes the following exception logs shortly after switchd restarts:
switchd[30158]: hal_bcm_l3.c:1617 find_egr_path_if_vxlan_overlay:vxlan overlay : nh PORT: port <#>, vlan . not yet ready
MAC learning looks correct, but traffic does not flow as expected. | 3.7.0-3.7.16, 4.3.1-4.4.5 | | | [3368217](#3368217)
None | When daylight saving time changes, the MLAG initDelay timer resets and all MLAG bonds go down. | 4.4.4-4.4.5, 5.2.1-5.6.0 | | -| [3366612](#3366612)
| The base version of the Linux kernel is updated to the v4.19.273 stable release, which includes fixes for several CVE issues. | 4.3.1-4.4.5 | | -| [3364996](#3364996)
| Under certain conditions, BGP can allow a combination of EVPN and non-EVPN paths to be put into a multipath group together. This results in erroneous programming of EVPN symmetric next hops and RMACs, which can result in momentary traffic drops. | 4.3.0-4.4.5 | | -| [3364717](#3364717)
None | On the Trident 2+ and Trident 3 switch when using VXLAN layer 2 VPNs and sending tunneled traffic where the inner IP header has a TTL of 1, the egress VTEP incorrectly forwards this traffic through the software path instead of the hardware data plane. This traffic is rate-limited to 100pps by default. To work around this issue, ensure that the traffic traversing the layer 2 tunnel has an inner IP header TTL value that is more than 1. If this workaround is not possible, contact Nvidia Support to determine other options. | 4.3.0-4.4.5 | | -| [3358865](#3358865)
None | When you reboot a Broadcom switch with a static default route configured, the route might be installed in hardware without a next hop. This results in forwarded traffic to the CPU and drops. To recover from this issue, remove the default route configuration and reapply it. To prevent this issue, before rebooting the switch, split the default route configuration into two routes as below:
ip route 0.0.0.0/1 10.1.1.1ip route 128.0.0.0/1 10.1.1.1
| 4.3.1-4.4.5 | | -| [3351951](#3351951)
None | Currently, the default core dump size limit on Cumulus Linux is 256M but the SDK generates core dumps around 800M. To avoid incomplete core files, you can increase the core dump size limit. | 4.2.1-5.3.1 | 5.4.0-5.6.0| -| [3334031](#3334031)
None | When you configure or unconfigure a BGP peer and interface towards a host, memory corruption can cause BGP to crash. | 4.3.0-4.4.5 | | +| [3351951](#3351951)
None | Currently, the default core dump size limit on Cumulus Linux is 256M but the SDK generates core dumps around 800M. To avoid incomplete core files, you can increase the core dump size limit. | 4.2.1-4.3.1, 4.4.0-5.3.1 | 4.3.2, 5.4.0-5.6.0| | [3333064](#3333064)
None | The traffic control rules that the EVPN multihoming configuration adds to an interface are deleted when the hsflowd service restarts. The hsflowd service deletes the EVPN multihoming traffic control filters after you stop hsflowd, then adds back the match-all filters with the psample action; however, hsflowd does not add back the EVPN multihoming traffic control rules. | 4.4.0-5.3.1 | 5.4.0-5.6.0| | [3330705](#3330705)
| When using TACACS+, a TACACS+ server name that returns more than one IP address, such as an IPv6 and IPv4 address, is counted many times against the limit of seven TACACS+ servers, which might cause some of the later listed servers to be ignored as over the limit. To work around this issue, you can set the prefer_ip_version configuration option (the default value is 4) to choose between an IPv4 or IPv6 address if both are present. | 3.7.0-5.3.1 | 5.4.0-5.6.0| | [3327477](#3327477)
| If you use su to change to a user specified through TACACS+, the user becomes the local tacacs0 thru tacacs15 user instead of the named user to run sudo commands. As a result, the named user password might not match the local tacacs0 thru tacacs15 user password. | 3.7.0-3.7.16, 4.0.0-4.4.5, 5.0.0-5.6.0 | | @@ -361,18 +322,11 @@ pdfhidden: True | [3293110](#3293110)
| You cannot set the NTF router flag (NTF_ROUTER) on neighbor entries from the user space. | 4.4.2-4.4.5 | | | [3292873](#3292873)
| When you run ZTP manually with the ztp -R command, then the ztp -vb command, the process stalls indefinitely while searching the local (USB) location and not using DHCP information. To work around this issue, run the ztp -r command with the URL of the ZTP server:
[Dec-08-17:09:58] root@switch:/home/cumulus#  ztp -r http://myztp.server.local/ztp
| 4.4.2-4.4.5 | | | [3291548](#3291548)
None | In EVPN deployments, a buffer lockup for split or pre-split ports can occur on Spectrum-2 and Spectrum-3 switches. As result, traffic coming in on these ports is dropped in the RX buffer. To work around this issue, restart switchd. | 4.2.1-4.4.5 | 5.0.0-5.6.0| -| [3288385](#3288385)
| On the EdgeCore AS7326-56X and AS7726-32X switch, the fan speed reports a minimum threshold in the logs. | 4.3.1-4.4.5 | | | [3288156](#3288156)
None | When you configure a new VNI, the VLAN 1 VNI mapping is removed from the VXLAN device. To work around this issue, set the VNI interface mapped to VLAN 1 down and up again. | 4.4.3-5.1.0 | 5.2.0-5.6.0| | [3284719](#3284719)
| Certain EVPN multihoming show commands might cause the bgpd service to crash if you use the json flag and try to reference the default VRF by name. For example: show bgp l2vpn evpn es-vrf json. | 4.4.2-4.4.5 | | -| [3269538](#3269538)
None | The cl-ecmpcalc command prints the following error when the egress interface is a bond or SVI:
ecmpcalc: will query hardwareTraceback (most recent call last):File “/usr/cumulus/bin/cl-ecmpcalc”, line 986, inisTrunkMbr, port = ecmp.getHdPort(hd_cmd)File “/usr/cumulus/bin/cl-ecmpcalc”, line 618, in getHdPortport = int(str4)ValueError: invalid literal for int() with base 10: ‘0t
| 4.3.0-4.4.5 | | | [3269537](#3269537)
None | When an FRR routing service (such as bgpd) becomes unresponsive, watchfrr might fail to stop and restart service. To work around this issue, restart FRR with the systemctl restart frr command. | 4.4.0-5.3.1 | 5.4.0-5.6.0| -| [3267353](#3267353)
| In a QinQ configuration, if the VLAN priority is a non-zero value, double-tagged packets are translated to triple-tagged packets. | 4.3.1-4.4.5 | | -| [3244740](#3244740)
None | If you have a lot of inbound route maps that match lists with many regex statements, a large number of updates from the peer can cause the system to run out of memory. To work around this issue, reduce the number of regex matches in inbound route maps. | 4.4.0-5.2.1 | 5.3.0-5.6.0| -| [3240406](#3240406)
None | When you configure or unconfigure a BGP peer and interface towards a host, memory corruption can cause BGP to crash. | 4.3.0-5.3.1 | 5.4.0-5.6.0| -| [3236334](#3236334)
None | Using ARP suppression with a very large number of interfaces might result in missing ARP entries on the local device or buffer underrun warnings in the neighmgrd log. | 4.3.0-4.4.5 | | -| [3235956](#3235956)
| With certain triggers on Broadcom switches, such as adding or deleting a VNI or reloading the network, Cumulus Linux might consider the underlay routes as overlay routes. In this case, switchd allocates the overlay next hop, which is incorrect and might affect traffic forwarding. | 4.3.0-4.4.5 | | +| [3244740](#3244740)
None | If you have a lot of inbound route maps that match lists with many regex statements, a large number of updates from the peer can cause the system to run out of memory. To work around this issue, reduce the number of regex matches in inbound route maps. | 4.4.0-5.2.1 | 4.3.2, 5.3.0-5.6.0| | [3235368](#3235368)
| When you try to configure VRF route leaking between many VRFs using multiple NCLU commands before running the net commit command, the commit fails. To work around this issue, configure VRF leaking one command at a time and run net commit after each command. | 4.4.4-5.2.1 | 5.3.0-5.6.0| -| [3234031](#3234031)
None | If BGP neighbor allowas-in is set, negating with no no neighbor allowas-in does not disable the setting. To work around this issue and disable the setting, restart the FRR service. | 4.2.1-5.2.1 | 5.3.0-5.6.0| | [3227677](#3227677)
| When daylight saving time changes the time, the MLAG initDelay timer resets and all MLAG bonds go down. | 4.4.4-5.2.1 | 5.3.0-5.6.0| | [3226579](#3226579)
None | The net show interface detail command output shows Type=Unknown for the specified interface. | 4.4.3-4.4.5 | | | [3221470](#3221470)
None | Under heavy system load, when many forwarding resources (routes, neighbors, ECMP groups, and so on) are removed from hardware, subsequent attempts to configure additional forwarding resources might fail and you see the following log message:
sx_sdk: EMAD_RX_THREAD: EMAD transaction FW error
| 4.4.0-5.1.0 | 5.2.0-5.6.0| @@ -384,7 +338,7 @@ pdfhidden: True | [3211054](#3211054)
| On the NVIDIA Spectrum-2 switch, when receiving multicast traffic on a PIM enabled VLAN, the multicast traffic is forwarded correctly to the associated VLAN, however WJH shows traffic loss with the error:

Packet size is larger than router interface MTU – Validate the router interface MTU configuration
| 4.4.2-5.2.1 | 5.3.0-5.6.0| | [3209699](#3209699)
None | RADIUS authenticated users with read-only access to NCLU commands (users in the users_with_show list) can run edit commands if a username for a non-local account is on the users_with_edit line of the /etc/netd.conf file. To work around this issue, make sure that all usernames on the users_with_edit line of the /etc/netd.conf file are configured local users for the system (real Linux users)
| 3.7.0-4.3.0, 4.4.0-5.2.1 | 4.3.1, 5.3.0-5.6.0| | [3205701](#3205701)
None | A firmware upgrade has been implemented to optimize the PCIe bus between the CPU and Spectrum ASIC on NVIDIA SN4700, SN4600, SN4600C, and SN4410 switches manufactured with 0x26 1 17 in EEPROM. Affected switches will not boot properly without this firmware upgrade. To see the EEPROM value, run the onie-syseeprom command from ONIE or run the decode-syseeprom command from Cumulus Linux. | 4.4.4, 5.2.0 | 4.4.5, 5.2.1-5.6.0| -| [3192808](#3192808)
None | When the switch receives an LLDP frame from a Cisco router right after a ptmd restart, the ptmd service crashes. | 4.3.0-5.2.1 | 5.3.0-5.6.0| +| [3192808](#3192808)
None | When the switch receives an LLDP frame from a Cisco router right after a ptmd restart, the ptmd service crashes. | 4.3.0-4.3.1, 4.4.0-5.2.1 | 4.3.2, 5.3.0-5.6.0| | [3168564](#3168564)
| In a large scale VXLAN configuration (for example if you have more than 8500 VLANs across ports), switchd might crash when you restart clagd or when all bonds go operationally down, then up
On Trident3 switches running Cumulus Linux 4.3.1, NVIDIA validates the VLAN scale limit for VXLAN deployments with 8500 VLANs across ports with LACP bypass disabled. | 4.3.1-4.4.5 | | | [3163845](#3163845)
| If bond slaves listed in the /etc/network/interfaces file are not in alphabetical order, the bond interface MAC address can change when you run ifreload. For example, if the bond slaves in the /etc/network/interfaces file are listed as swp32 swp31, the switch initially uses the MAC address for swp32 as the bond MAC address. An another ifreload can cause this to change to use the MAC address for swp31 as the bond MAC address, which can cause protocol issues, such as IPv6 link-local address changes. | 4.3.1-4.4.5 | | | [3157240](#3157240)
| When you try to query REDECN counters with the mlxcmd utility on a bond member port with the following commands, syslog reports an error
sudo /usr/lib/cumulus/mlxcmd roce counters --port sudo /usr/lib/cumulus/mlxcmd qos counters --clear --port 
| 4.4.4-5.1.0 | 5.2.0-5.6.0| @@ -453,6 +407,7 @@ pdfhidden: True | [2780915](#2780915)
| In NVUE, you can't deactivate the IPv4 address family per neighbor. | 4.4.0-4.4.5 | 5.0.0-5.6.0| | [2780834](#2780834)
| To enable an address family on a peer, you have to enable the address family globally. | 4.4.0-4.4.5 | 5.0.0-5.6.0| | [2780211](#2780211)
| When you use the NVUE nv set vrf default router bgp peer local-as asn command to configure a local AS, Cumulus Linux does not update the etc/frr/frr.conf file. | 4.4.0-4.4.5 | 5.0.0-5.6.0| +| [2771653](#2771653)
| When using W-ECMP, the weights for various BGP next hops can sometimes be in the range of 100s or more, which consumes a lot of hardware space. | 4.3.0-4.4.5 | | | [2763819](#2763819)
| When you enable LACP bypass on a bond, traffic to static MAC addresses configured on the bond might not work when LACP bypass is enforced. | 4.4.0-4.4.5 | | | [2754791](#2754791)
| Remote MAC addreses in zebra are out of sync with bgpd. The zebra MAC addresses point to an incorrect (old) VTEP IP address and the sequence number is one higher than in BGP. | 3.7.14.2-3.7.16, 4.3.0-4.4.5 | | | [2753955](#2753955)
| On the Lenovo MSN3700 switch, if you try to configure an interface with a link speed of 200G, the configuration fails. | 4.2.1-4.4.5 | 5.0.0-5.6.0| @@ -496,7 +451,6 @@ pdfhidden: True | [2555763](#2555763)
CM-32861 | The NCLU net del bgp neighbor command does not delete the neighbor and displays an error similar to the following:

ERROR: --- /run/nclu/frr/frr.conf.scratchpad.baseline 2021-01-04 17:23:59.250463331 +0000
+++ /run/nclu/frr/frr.conf.scratchpad 2021-01-04 17:25:59.213673980 +0000

To work around this issue, use the FRR command to delete a neighbor. | 4.3.0-4.4.5 | | | [2555613](#2555613)
CM-32786 | The net show configuration commands command incorrectly displays the NCLU syntax to disable IPv6 forwarding on interfaces. For example:

# net show configuration commands
net add vlan 1 ip6-forward off

The correct NCLU command to disable IPv6 forwarding is net add vlan 1 ipv6 forward off (without the hyphen). | 4.2.1-4.4.5 | | | [2555318](#2555318)
CM-32612 | If you try to enable BGP graceful restart when it is already enabled, you see an error similar to the following in the frr.log file:

2020-12-07T19:20:26.004333+00:00 cumulus bgpd[4954]: VRF default: Handle GR command GLOBAL_GR_CMD, current GR state GLOBAL_GR, new GR state GLOBAL_INVALID

This error has no functional impact. | 4.3.0-4.4.5 | | -| [2555175](#2555175)
CM-32528 | Control Plane Traffic (example - BGP peering from Leaf to Spine) goes down on Leaf due to Hold Down Timer Expiration of peer following prolonged link flaps on downlinks when vxlan enabled vlans are carried on the flapping link. | 3.7.15-3.7.16, 4.2.1-4.4.5 | | | [2554986](#2554986)
CM-32416 | The ethtool utility doesn't contain the latest values, as a result the Revision Compliance field shows Unallocated. | 4.2.1-4.4.5 | | | [2554812](#2554812)
CM-32296 | If the RMAC of a layer 3 SVI changes, the show vrf vni command is not updated with the new value. However, the new RMAC is seen in the show evpn vni command and is present on self-originated EVPN routes. | 4.2.1-4.4.5 | | | [2554783](#2554783)
CM-32274 | If you apply an outbound route map to a BGP peer that uses set as-path prepend last-as, advertised locally-originated routes have the ASN of the peer prepended to the AS path.
This might trigger AS path loop prevention on the peer, where the peer ignores locally-originated prefixes. | 4.2.1-4.4.5 | 5.0.0-5.6.0| @@ -668,29 +622,13 @@ pdfhidden: True | Issue ID | Description | Affects | Fixed | |--- |--- |--- |--- | -| [3647731](#3647731)
None | CVE-2023-38408: The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009
Mitigation: Do not use ssh-agent forwarding (the man page for ssh_config says that "agent forwarding should be enabled with caution"), or start the ssh-agent program with the -P option to allow only specific PKCS#11 libraries (or none with -P '')
For Cumulus Linux 4.3.2, the /usr/bin/ssh-agent program has all permissions turned off (chmod 0) to prevent its execution if a vulnerable version is detected. | 4.0.0-4.4.5, 5.0.0-5.6.0 | | | [3647424](#3647424)
None | When you remove the update-source configuration for a BGP neighbor, the peering is reset if the neighbor is a member of a peer group with the same update-source configuration. | 4.3.0-4.4.5 | | -| [3534654](#3534654)
| On a Broadcom switch, Q-in-Q VLAN operations do not clear when you remove a bridge port from a VXLAN-enabled bridge. This can result in unexpected double tagged packets if the outer VLAN is still used on the bridge. To work around this issue, restart switchd after you modify or remove double tagged bridge ports from a VXLAN-enabled bridge. | 4.3.1-4.4.5 | | +| [3600912](#3600912)
| In an MLAG EVPN configuration, if host mobility occurs multiple times at high frequency, the host MAC might point to an incorrect VTEP; it might be local behind the VTEP. | 4.3.1-4.4.5 | | | [3488136](#3488136)
| When zebra receives route updates that include both a route with a recursive next hop and the route used to resolve that next hop, zebra might mark the route with the recursive next hop as inactive. To work around this issue, reprocess the route updates by running the appropriate clear command for the protocol in use. For example, for BGP, clear inbound routes from the relevant neighbor using the nv action clear vrf router bgp neighbor address-family in command. | 4.2.1-5.5.1 | 5.6.0| -| [3486888](#3486888)
None | If FRR learns a layer 2 entry against a VNI and you reconfigure the VNI later as a layer 3 VNI, the original layer 2 entry does not clear and remains in the forwarding database. | 4.3.0-5.5.1 | 5.6.0| -| [3479967](#3479967)
| When you remove VRF configuration, the systemctl reload frr.service command returns a non zero exit code after erroneously running the invalid command no exit-vrf. | 4.3.1-4.4.5 | | | [3474391](#3474391)
| The SNMP MIB definition file /usr/share/snmp/mibs/Cumulus-BGPVRF-MIB.txt does not define the INDEX of the bgpPeerEntry correctly. This issue does not impact SNMP functionality for this MIB. | 4.3.1-5.5.1 | 5.6.0| -| [3455998](#3455998)
| When you poll the BGP unnumbered MIB object 1.3.6.1.4.1.40310.4 after uncommenting the bgpun_pp.py pass persist script in the /etc/snmpd/snmpd.conf file, BGP session information is not retrieved. To work around this issue, add executable permissions to the script with the sudo chmod +x /usr/share/snmp/bgpun_pp.py command. | 4.3.1-4.4.5 | | -| [3448171](#3448171)
| If a default route is withdrawn from the routing table and then learned again, traffic matching this entry will be software (cpu) forwarded.  This will cause intermittent drops due to the CPU the rate-limiter
This only impacts the default VRF and a default route learned dynamically
In order to recover from this condition: 1. Restart switchd.service (sudo systemctl restart switchd.service)OR 2. Reboot the switch (sudo reboot) | 4.3.1-4.4.5 | | -| [3434315](#3434315)
| IPv6 BGP sessions in a VRF do not be establish with MD5 authentication. | 4.3.0-4.4.5 | | | [3429530](#3429530)
| On the Spectrum-2 and Spectrum-3 switch, multiple interfaces (in the same PLL quarter) might flap intermittently at the same time. | 4.2.1-5.4.0 | 5.5.0-5.6.0| -| [3419962](#3419962)
| On a Broadcom switch, if you remove a double-tagged interface from a bridge that contains other double-tagged interfaces built on the same physical port (for example, you remove swp1.10.100 when swp1.10.200 is also a bridge port), traffic forwarding within the bridge might fail and you see critical warnings in the /var/log/switchd.log file similar to the following:
switchd[8587]: hal_bcm.c:2207 CRIT knet_vlan_translate_delete(update): port 1 ext_vlan 10.100 int_vlan 2132: -11
| 4.3.1-4.4.5 | | -| [3419953](#3419953)
| If you remove a double tagged bridge port from a bridge when a different interface exists with the same port and virtual ID, you might see a segmentation fault and a switchd crash due to incorrect initialization when Cumulus Linux creates the second double-tagged interface. To work around this issue, make sure you remove the double-tagged interfaces from the bridge in the /etc/network/interfaces file. | 4.3.1-4.4.5 | | -| [3418045](#3418045)
None | If MLAG is configured but disconnected from an MLAG peer for an extended period of time (days or more), there is a long delay (up to a minute per day) before traffic forwarding stabilizes after the MLAG peer connection re-establishes. | 3.7.0-5.4.0 | 5.5.0-5.6.0| -| [3401121](#3401121)
| sFlow is not able to sample packets in the egress direction. To work around this issue, add the following to the hsflowd.conf file to enable egress sampling:
samplingDirection=outpsample { group=1 }
| 4.3.0-4.4.5 | | | [3387852](#3387852)
None | If you remove NGINX from the switch, then run apt autoremove, switchd does not reload because the libyaml-0-2 and python-yaml packages are missing; these packages are required for switchd consistency checking. To work around this issue, reinstall the libyaml-0-2 and python-yaml packages. | 4.4.0-4.4.5 | | -| [3376798](#3376798)
| On Broadcom switches, Cumulus Linux does not create the hardware bridging domain for a traditional bridge with a VXLAN interface during switchd restart. The /var/log/switchd.log file includes the following exception logs shortly after switchd restarts:
switchd[30158]: hal_bcm_l3.c:1617 find_egr_path_if_vxlan_overlay:vxlan overlay : nh PORT: port <#>, vlan . not yet ready
MAC learning looks correct, but traffic does not flow as expected. | 3.7.0-3.7.16, 4.3.1-4.4.5 | | -| [3366612](#3366612)
| The base version of the Linux kernel is updated to the v4.19.273 stable release, which includes fixes for several CVE issues. | 4.3.1-4.4.5 | | -| [3364996](#3364996)
| Under certain conditions, BGP can allow a combination of EVPN and non-EVPN paths to be put into a multipath group together. This results in erroneous programming of EVPN symmetric next hops and RMACs, which can result in momentary traffic drops. | 4.3.0-4.4.5 | | -| [3364717](#3364717)
None | On the Trident 2+ and Trident 3 switch when using VXLAN layer 2 VPNs and sending tunneled traffic where the inner IP header has a TTL of 1, the egress VTEP incorrectly forwards this traffic through the software path instead of the hardware data plane. This traffic is rate-limited to 100pps by default. To work around this issue, ensure that the traffic traversing the layer 2 tunnel has an inner IP header TTL value that is more than 1. If this workaround is not possible, contact Nvidia Support to determine other options. | 4.3.0-4.4.5 | | -| [3358865](#3358865)
None | When you reboot a Broadcom switch with a static default route configured, the route might be installed in hardware without a next hop. This results in forwarded traffic to the CPU and drops. To recover from this issue, remove the default route configuration and reapply it. To prevent this issue, before rebooting the switch, split the default route configuration into two routes as below:
ip route 0.0.0.0/1 10.1.1.1ip route 128.0.0.0/1 10.1.1.1
| 4.3.1-4.4.5 | | -| [3351951](#3351951)
None | Currently, the default core dump size limit on Cumulus Linux is 256M but the SDK generates core dumps around 800M. To avoid incomplete core files, you can increase the core dump size limit. | 4.2.1-5.3.1 | 5.4.0-5.6.0| -| [3334031](#3334031)
None | When you configure or unconfigure a BGP peer and interface towards a host, memory corruption can cause BGP to crash. | 4.3.0-4.4.5 | | +| [3351951](#3351951)
None | Currently, the default core dump size limit on Cumulus Linux is 256M but the SDK generates core dumps around 800M. To avoid incomplete core files, you can increase the core dump size limit. | 4.2.1-4.3.1, 4.4.0-5.3.1 | 4.3.2, 5.4.0-5.6.0| | [3333064](#3333064)
None | The traffic control rules that the EVPN multihoming configuration adds to an interface are deleted when the hsflowd service restarts. The hsflowd service deletes the EVPN multihoming traffic control filters after you stop hsflowd, then adds back the match-all filters with the psample action; however, hsflowd does not add back the EVPN multihoming traffic control rules. | 4.4.0-5.3.1 | 5.4.0-5.6.0| | [3330705](#3330705)
| When using TACACS+, a TACACS+ server name that returns more than one IP address, such as an IPv6 and IPv4 address, is counted many times against the limit of seven TACACS+ servers, which might cause some of the later listed servers to be ignored as over the limit. To work around this issue, you can set the prefer_ip_version configuration option (the default value is 4) to choose between an IPv4 or IPv6 address if both are present. | 3.7.0-5.3.1 | 5.4.0-5.6.0| | [3327477](#3327477)
| If you use su to change to a user specified through TACACS+, the user becomes the local tacacs0 thru tacacs15 user instead of the named user to run sudo commands. As a result, the named user password might not match the local tacacs0 thru tacacs15 user password. | 3.7.0-3.7.16, 4.0.0-4.4.5, 5.0.0-5.6.0 | | @@ -700,17 +638,10 @@ pdfhidden: True | [3293110](#3293110)
| You cannot set the NTF router flag (NTF_ROUTER) on neighbor entries from the user space. | 4.4.2-4.4.5 | | | [3292873](#3292873)
| When you run ZTP manually with the ztp -R command, then the ztp -vb command, the process stalls indefinitely while searching the local (USB) location and not using DHCP information. To work around this issue, run the ztp -r command with the URL of the ZTP server:
[Dec-08-17:09:58] root@switch:/home/cumulus#  ztp -r http://myztp.server.local/ztp
| 4.4.2-4.4.5 | | | [3291548](#3291548)
None | In EVPN deployments, a buffer lockup for split or pre-split ports can occur on Spectrum-2 and Spectrum-3 switches. As result, traffic coming in on these ports is dropped in the RX buffer. To work around this issue, restart switchd. | 4.2.1-4.4.5 | 5.0.0-5.6.0| -| [3288385](#3288385)
| On the EdgeCore AS7326-56X and AS7726-32X switch, the fan speed reports a minimum threshold in the logs. | 4.3.1-4.4.5 | | | [3288156](#3288156)
None | When you configure a new VNI, the VLAN 1 VNI mapping is removed from the VXLAN device. To work around this issue, set the VNI interface mapped to VLAN 1 down and up again. | 4.4.3-5.1.0 | 5.2.0-5.6.0| | [3284719](#3284719)
| Certain EVPN multihoming show commands might cause the bgpd service to crash if you use the json flag and try to reference the default VRF by name. For example: show bgp l2vpn evpn es-vrf json. | 4.4.2-4.4.5 | | -| [3269538](#3269538)
None | The cl-ecmpcalc command prints the following error when the egress interface is a bond or SVI:
ecmpcalc: will query hardwareTraceback (most recent call last):File “/usr/cumulus/bin/cl-ecmpcalc”, line 986, inisTrunkMbr, port = ecmp.getHdPort(hd_cmd)File “/usr/cumulus/bin/cl-ecmpcalc”, line 618, in getHdPortport = int(str4)ValueError: invalid literal for int() with base 10: ‘0t
| 4.3.0-4.4.5 | | | [3269537](#3269537)
None | When an FRR routing service (such as bgpd) becomes unresponsive, watchfrr might fail to stop and restart service. To work around this issue, restart FRR with the systemctl restart frr command. | 4.4.0-5.3.1 | 5.4.0-5.6.0| -| [3267353](#3267353)
| In a QinQ configuration, if the VLAN priority is a non-zero value, double-tagged packets are translated to triple-tagged packets. | 4.3.1-4.4.5 | | -| [3244740](#3244740)
None | If you have a lot of inbound route maps that match lists with many regex statements, a large number of updates from the peer can cause the system to run out of memory. To work around this issue, reduce the number of regex matches in inbound route maps. | 4.4.0-5.2.1 | 5.3.0-5.6.0| -| [3240406](#3240406)
None | When you configure or unconfigure a BGP peer and interface towards a host, memory corruption can cause BGP to crash. | 4.3.0-5.3.1 | 5.4.0-5.6.0| -| [3236334](#3236334)
None | Using ARP suppression with a very large number of interfaces might result in missing ARP entries on the local device or buffer underrun warnings in the neighmgrd log. | 4.3.0-4.4.5 | | -| [3235956](#3235956)
| With certain triggers on Broadcom switches, such as adding or deleting a VNI or reloading the network, Cumulus Linux might consider the underlay routes as overlay routes. In this case, switchd allocates the overlay next hop, which is incorrect and might affect traffic forwarding. | 4.3.0-4.4.5 | | -| [3234031](#3234031)
None | If BGP neighbor allowas-in is set, negating with no no neighbor allowas-in does not disable the setting. To work around this issue and disable the setting, restart the FRR service. | 4.2.1-5.2.1 | 5.3.0-5.6.0| +| [3244740](#3244740)
None | If you have a lot of inbound route maps that match lists with many regex statements, a large number of updates from the peer can cause the system to run out of memory. To work around this issue, reduce the number of regex matches in inbound route maps. | 4.4.0-5.2.1 | 4.3.2, 5.3.0-5.6.0| | [3226579](#3226579)
None | The net show interface detail command output shows Type=Unknown for the specified interface. | 4.4.3-4.4.5 | | | [3221470](#3221470)
None | Under heavy system load, when many forwarding resources (routes, neighbors, ECMP groups, and so on) are removed from hardware, subsequent attempts to configure additional forwarding resources might fail and you see the following log message:
sx_sdk: EMAD_RX_THREAD: EMAD transaction FW error
| 4.4.0-5.1.0 | 5.2.0-5.6.0| | [3218207](#3218207)
None | Certain routes on tenant VRFs have missing next hop entries because the router MAC address is missing in the bridge forwarding database table that corresponds to the remote VTEP. As a result, traffic forwarding is affected for these routes. | 4.3.0-5.2.1 | 5.3.0-5.6.0| @@ -720,7 +651,7 @@ pdfhidden: True | [3211359](#3211359)
| The net show interface detail command output shows Type=Unknown for the specified interface. | 4.4.3-5.0.1 | 5.1.0-5.6.0| | [3211054](#3211054)
| On the NVIDIA Spectrum-2 switch, when receiving multicast traffic on a PIM enabled VLAN, the multicast traffic is forwarded correctly to the associated VLAN, however WJH shows traffic loss with the error:

Packet size is larger than router interface MTU – Validate the router interface MTU configuration
| 4.4.2-5.2.1 | 5.3.0-5.6.0| | [3209699](#3209699)
None | RADIUS authenticated users with read-only access to NCLU commands (users in the users_with_show list) can run edit commands if a username for a non-local account is on the users_with_edit line of the /etc/netd.conf file. To work around this issue, make sure that all usernames on the users_with_edit line of the /etc/netd.conf file are configured local users for the system (real Linux users)
| 3.7.0-4.3.0, 4.4.0-5.2.1 | 4.3.1, 5.3.0-5.6.0| -| [3192808](#3192808)
None | When the switch receives an LLDP frame from a Cisco router right after a ptmd restart, the ptmd service crashes. | 4.3.0-5.2.1 | 5.3.0-5.6.0| +| [3192808](#3192808)
None | When the switch receives an LLDP frame from a Cisco router right after a ptmd restart, the ptmd service crashes. | 4.3.0-4.3.1, 4.4.0-5.2.1 | 4.3.2, 5.3.0-5.6.0| | [3168564](#3168564)
| In a large scale VXLAN configuration (for example if you have more than 8500 VLANs across ports), switchd might crash when you restart clagd or when all bonds go operationally down, then up
On Trident3 switches running Cumulus Linux 4.3.1, NVIDIA validates the VLAN scale limit for VXLAN deployments with 8500 VLANs across ports with LACP bypass disabled. | 4.3.1-4.4.5 | | | [3163845](#3163845)
| If bond slaves listed in the /etc/network/interfaces file are not in alphabetical order, the bond interface MAC address can change when you run ifreload. For example, if the bond slaves in the /etc/network/interfaces file are listed as swp32 swp31, the switch initially uses the MAC address for swp32 as the bond MAC address. An another ifreload can cause this to change to use the MAC address for swp31 as the bond MAC address, which can cause protocol issues, such as IPv6 link-local address changes. | 4.3.1-4.4.5 | | | [3150317](#3150317)
| During a host failure, where a link remains up but LACP stops being sent, the EVPN multihoming ES bond goes into bypass mode active without a link state change. | 4.4.2-5.2.1 | 5.3.0-5.6.0| @@ -802,6 +733,7 @@ pdfhidden: True | [2780915](#2780915)
| In NVUE, you can't deactivate the IPv4 address family per neighbor. | 4.4.0-4.4.5 | 5.0.0-5.6.0| | [2780834](#2780834)
| To enable an address family on a peer, you have to enable the address family globally. | 4.4.0-4.4.5 | 5.0.0-5.6.0| | [2780211](#2780211)
| When you use the NVUE nv set vrf default router bgp peer local-as asn command to configure a local AS, Cumulus Linux does not update the etc/frr/frr.conf file. | 4.4.0-4.4.5 | 5.0.0-5.6.0| +| [2771653](#2771653)
| When using W-ECMP, the weights for various BGP next hops can sometimes be in the range of 100s or more, which consumes a lot of hardware space. | 4.3.0-4.4.5 | | | [2763819](#2763819)
| When you enable LACP bypass on a bond, traffic to static MAC addresses configured on the bond might not work when LACP bypass is enforced. | 4.4.0-4.4.5 | | | [2754791](#2754791)
| Remote MAC addreses in zebra are out of sync with bgpd. The zebra MAC addresses point to an incorrect (old) VTEP IP address and the sequence number is one higher than in BGP. | 3.7.14.2-3.7.16, 4.3.0-4.4.5 | | | [2753955](#2753955)
| On the Lenovo MSN3700 switch, if you try to configure an interface with a link speed of 200G, the configuration fails. | 4.2.1-4.4.5 | 5.0.0-5.6.0| @@ -845,7 +777,6 @@ pdfhidden: True | [2555763](#2555763)
CM-32861 | The NCLU net del bgp neighbor command does not delete the neighbor and displays an error similar to the following:

ERROR: --- /run/nclu/frr/frr.conf.scratchpad.baseline 2021-01-04 17:23:59.250463331 +0000
+++ /run/nclu/frr/frr.conf.scratchpad 2021-01-04 17:25:59.213673980 +0000

To work around this issue, use the FRR command to delete a neighbor. | 4.3.0-4.4.5 | | | [2555613](#2555613)
CM-32786 | The net show configuration commands command incorrectly displays the NCLU syntax to disable IPv6 forwarding on interfaces. For example:

# net show configuration commands
net add vlan 1 ip6-forward off

The correct NCLU command to disable IPv6 forwarding is net add vlan 1 ipv6 forward off (without the hyphen). | 4.2.1-4.4.5 | | | [2555318](#2555318)
CM-32612 | If you try to enable BGP graceful restart when it is already enabled, you see an error similar to the following in the frr.log file:

2020-12-07T19:20:26.004333+00:00 cumulus bgpd[4954]: VRF default: Handle GR command GLOBAL_GR_CMD, current GR state GLOBAL_GR, new GR state GLOBAL_INVALID

This error has no functional impact. | 4.3.0-4.4.5 | | -| [2555175](#2555175)
CM-32528 | Control Plane Traffic (example - BGP peering from Leaf to Spine) goes down on Leaf due to Hold Down Timer Expiration of peer following prolonged link flaps on downlinks when vxlan enabled vlans are carried on the flapping link. | 3.7.15-3.7.16, 4.2.1-4.4.5 | | | [2554986](#2554986)
CM-32416 | The ethtool utility doesn't contain the latest values, as a result the Revision Compliance field shows Unallocated. | 4.2.1-4.4.5 | | | [2554812](#2554812)
CM-32296 | If the RMAC of a layer 3 SVI changes, the show vrf vni command is not updated with the new value. However, the new RMAC is seen in the show evpn vni command and is present on self-originated EVPN routes. | 4.2.1-4.4.5 | | | [2554783](#2554783)
CM-32274 | If you apply an outbound route map to a BGP peer that uses set as-path prepend last-as, advertised locally-originated routes have the ASN of the peer prepended to the AS path.
This might trigger AS path loop prevention on the peer, where the peer ignores locally-originated prefixes. | 4.2.1-4.4.5 | 5.0.0-5.6.0| @@ -998,29 +929,13 @@ pdfhidden: True | Issue ID | Description | Affects | Fixed | |--- |--- |--- |--- | -| [3647731](#3647731)
None | CVE-2023-38408: The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009
Mitigation: Do not use ssh-agent forwarding (the man page for ssh_config says that "agent forwarding should be enabled with caution"), or start the ssh-agent program with the -P option to allow only specific PKCS#11 libraries (or none with -P '')
For Cumulus Linux 4.3.2, the /usr/bin/ssh-agent program has all permissions turned off (chmod 0) to prevent its execution if a vulnerable version is detected. | 4.0.0-4.4.5, 5.0.0-5.6.0 | | | [3647424](#3647424)
None | When you remove the update-source configuration for a BGP neighbor, the peering is reset if the neighbor is a member of a peer group with the same update-source configuration. | 4.3.0-4.4.5 | | -| [3534654](#3534654)
| On a Broadcom switch, Q-in-Q VLAN operations do not clear when you remove a bridge port from a VXLAN-enabled bridge. This can result in unexpected double tagged packets if the outer VLAN is still used on the bridge. To work around this issue, restart switchd after you modify or remove double tagged bridge ports from a VXLAN-enabled bridge. | 4.3.1-4.4.5 | | +| [3600912](#3600912)
| In an MLAG EVPN configuration, if host mobility occurs multiple times at high frequency, the host MAC might point to an incorrect VTEP; it might be local behind the VTEP. | 4.3.1-4.4.5 | | | [3488136](#3488136)
| When zebra receives route updates that include both a route with a recursive next hop and the route used to resolve that next hop, zebra might mark the route with the recursive next hop as inactive. To work around this issue, reprocess the route updates by running the appropriate clear command for the protocol in use. For example, for BGP, clear inbound routes from the relevant neighbor using the nv action clear vrf router bgp neighbor address-family in command. | 4.2.1-5.5.1 | 5.6.0| -| [3486888](#3486888)
None | If FRR learns a layer 2 entry against a VNI and you reconfigure the VNI later as a layer 3 VNI, the original layer 2 entry does not clear and remains in the forwarding database. | 4.3.0-5.5.1 | 5.6.0| -| [3479967](#3479967)
| When you remove VRF configuration, the systemctl reload frr.service command returns a non zero exit code after erroneously running the invalid command no exit-vrf. | 4.3.1-4.4.5 | | | [3474391](#3474391)
| The SNMP MIB definition file /usr/share/snmp/mibs/Cumulus-BGPVRF-MIB.txt does not define the INDEX of the bgpPeerEntry correctly. This issue does not impact SNMP functionality for this MIB. | 4.3.1-5.5.1 | 5.6.0| -| [3455998](#3455998)
| When you poll the BGP unnumbered MIB object 1.3.6.1.4.1.40310.4 after uncommenting the bgpun_pp.py pass persist script in the /etc/snmpd/snmpd.conf file, BGP session information is not retrieved. To work around this issue, add executable permissions to the script with the sudo chmod +x /usr/share/snmp/bgpun_pp.py command. | 4.3.1-4.4.5 | | -| [3448171](#3448171)
| If a default route is withdrawn from the routing table and then learned again, traffic matching this entry will be software (cpu) forwarded.  This will cause intermittent drops due to the CPU the rate-limiter
This only impacts the default VRF and a default route learned dynamically
In order to recover from this condition: 1. Restart switchd.service (sudo systemctl restart switchd.service)OR 2. Reboot the switch (sudo reboot) | 4.3.1-4.4.5 | | -| [3434315](#3434315)
| IPv6 BGP sessions in a VRF do not be establish with MD5 authentication. | 4.3.0-4.4.5 | | | [3429530](#3429530)
| On the Spectrum-2 and Spectrum-3 switch, multiple interfaces (in the same PLL quarter) might flap intermittently at the same time. | 4.2.1-5.4.0 | 5.5.0-5.6.0| -| [3419962](#3419962)
| On a Broadcom switch, if you remove a double-tagged interface from a bridge that contains other double-tagged interfaces built on the same physical port (for example, you remove swp1.10.100 when swp1.10.200 is also a bridge port), traffic forwarding within the bridge might fail and you see critical warnings in the /var/log/switchd.log file similar to the following:
switchd[8587]: hal_bcm.c:2207 CRIT knet_vlan_translate_delete(update): port 1 ext_vlan 10.100 int_vlan 2132: -11
| 4.3.1-4.4.5 | | -| [3419953](#3419953)
| If you remove a double tagged bridge port from a bridge when a different interface exists with the same port and virtual ID, you might see a segmentation fault and a switchd crash due to incorrect initialization when Cumulus Linux creates the second double-tagged interface. To work around this issue, make sure you remove the double-tagged interfaces from the bridge in the /etc/network/interfaces file. | 4.3.1-4.4.5 | | -| [3418045](#3418045)
None | If MLAG is configured but disconnected from an MLAG peer for an extended period of time (days or more), there is a long delay (up to a minute per day) before traffic forwarding stabilizes after the MLAG peer connection re-establishes. | 3.7.0-5.4.0 | 5.5.0-5.6.0| -| [3401121](#3401121)
| sFlow is not able to sample packets in the egress direction. To work around this issue, add the following to the hsflowd.conf file to enable egress sampling:
samplingDirection=outpsample { group=1 }
| 4.3.0-4.4.5 | | | [3387852](#3387852)
None | If you remove NGINX from the switch, then run apt autoremove, switchd does not reload because the libyaml-0-2 and python-yaml packages are missing; these packages are required for switchd consistency checking. To work around this issue, reinstall the libyaml-0-2 and python-yaml packages. | 4.4.0-4.4.5 | | -| [3376798](#3376798)
| On Broadcom switches, Cumulus Linux does not create the hardware bridging domain for a traditional bridge with a VXLAN interface during switchd restart. The /var/log/switchd.log file includes the following exception logs shortly after switchd restarts:
switchd[30158]: hal_bcm_l3.c:1617 find_egr_path_if_vxlan_overlay:vxlan overlay : nh PORT: port <#>, vlan . not yet ready
MAC learning looks correct, but traffic does not flow as expected. | 3.7.0-3.7.16, 4.3.1-4.4.5 | | -| [3366612](#3366612)
| The base version of the Linux kernel is updated to the v4.19.273 stable release, which includes fixes for several CVE issues. | 4.3.1-4.4.5 | | -| [3364996](#3364996)
| Under certain conditions, BGP can allow a combination of EVPN and non-EVPN paths to be put into a multipath group together. This results in erroneous programming of EVPN symmetric next hops and RMACs, which can result in momentary traffic drops. | 4.3.0-4.4.5 | | -| [3364717](#3364717)
None | On the Trident 2+ and Trident 3 switch when using VXLAN layer 2 VPNs and sending tunneled traffic where the inner IP header has a TTL of 1, the egress VTEP incorrectly forwards this traffic through the software path instead of the hardware data plane. This traffic is rate-limited to 100pps by default. To work around this issue, ensure that the traffic traversing the layer 2 tunnel has an inner IP header TTL value that is more than 1. If this workaround is not possible, contact Nvidia Support to determine other options. | 4.3.0-4.4.5 | | -| [3358865](#3358865)
None | When you reboot a Broadcom switch with a static default route configured, the route might be installed in hardware without a next hop. This results in forwarded traffic to the CPU and drops. To recover from this issue, remove the default route configuration and reapply it. To prevent this issue, before rebooting the switch, split the default route configuration into two routes as below:
ip route 0.0.0.0/1 10.1.1.1ip route 128.0.0.0/1 10.1.1.1
| 4.3.1-4.4.5 | | -| [3351951](#3351951)
None | Currently, the default core dump size limit on Cumulus Linux is 256M but the SDK generates core dumps around 800M. To avoid incomplete core files, you can increase the core dump size limit. | 4.2.1-5.3.1 | 5.4.0-5.6.0| -| [3334031](#3334031)
None | When you configure or unconfigure a BGP peer and interface towards a host, memory corruption can cause BGP to crash. | 4.3.0-4.4.5 | | +| [3351951](#3351951)
None | Currently, the default core dump size limit on Cumulus Linux is 256M but the SDK generates core dumps around 800M. To avoid incomplete core files, you can increase the core dump size limit. | 4.2.1-4.3.1, 4.4.0-5.3.1 | 4.3.2, 5.4.0-5.6.0| | [3333064](#3333064)
None | The traffic control rules that the EVPN multihoming configuration adds to an interface are deleted when the hsflowd service restarts. The hsflowd service deletes the EVPN multihoming traffic control filters after you stop hsflowd, then adds back the match-all filters with the psample action; however, hsflowd does not add back the EVPN multihoming traffic control rules. | 4.4.0-5.3.1 | 5.4.0-5.6.0| | [3330705](#3330705)
| When using TACACS+, a TACACS+ server name that returns more than one IP address, such as an IPv6 and IPv4 address, is counted many times against the limit of seven TACACS+ servers, which might cause some of the later listed servers to be ignored as over the limit. To work around this issue, you can set the prefer_ip_version configuration option (the default value is 4) to choose between an IPv4 or IPv6 address if both are present. | 3.7.0-5.3.1 | 5.4.0-5.6.0| | [3327477](#3327477)
| If you use su to change to a user specified through TACACS+, the user becomes the local tacacs0 thru tacacs15 user instead of the named user to run sudo commands. As a result, the named user password might not match the local tacacs0 thru tacacs15 user password. | 3.7.0-3.7.16, 4.0.0-4.4.5, 5.0.0-5.6.0 | | @@ -1030,16 +945,9 @@ pdfhidden: True | [3293110](#3293110)
| You cannot set the NTF router flag (NTF_ROUTER) on neighbor entries from the user space. | 4.4.2-4.4.5 | | | [3292873](#3292873)
| When you run ZTP manually with the ztp -R command, then the ztp -vb command, the process stalls indefinitely while searching the local (USB) location and not using DHCP information. To work around this issue, run the ztp -r command with the URL of the ZTP server:
[Dec-08-17:09:58] root@switch:/home/cumulus#  ztp -r http://myztp.server.local/ztp
| 4.4.2-4.4.5 | | | [3291548](#3291548)
None | In EVPN deployments, a buffer lockup for split or pre-split ports can occur on Spectrum-2 and Spectrum-3 switches. As result, traffic coming in on these ports is dropped in the RX buffer. To work around this issue, restart switchd. | 4.2.1-4.4.5 | 5.0.0-5.6.0| -| [3288385](#3288385)
| On the EdgeCore AS7326-56X and AS7726-32X switch, the fan speed reports a minimum threshold in the logs. | 4.3.1-4.4.5 | | | [3284719](#3284719)
| Certain EVPN multihoming show commands might cause the bgpd service to crash if you use the json flag and try to reference the default VRF by name. For example: show bgp l2vpn evpn es-vrf json. | 4.4.2-4.4.5 | | -| [3269538](#3269538)
None | The cl-ecmpcalc command prints the following error when the egress interface is a bond or SVI:
ecmpcalc: will query hardwareTraceback (most recent call last):File “/usr/cumulus/bin/cl-ecmpcalc”, line 986, inisTrunkMbr, port = ecmp.getHdPort(hd_cmd)File “/usr/cumulus/bin/cl-ecmpcalc”, line 618, in getHdPortport = int(str4)ValueError: invalid literal for int() with base 10: ‘0t
| 4.3.0-4.4.5 | | | [3269537](#3269537)
None | When an FRR routing service (such as bgpd) becomes unresponsive, watchfrr might fail to stop and restart service. To work around this issue, restart FRR with the systemctl restart frr command. | 4.4.0-5.3.1 | 5.4.0-5.6.0| -| [3267353](#3267353)
| In a QinQ configuration, if the VLAN priority is a non-zero value, double-tagged packets are translated to triple-tagged packets. | 4.3.1-4.4.5 | | -| [3244740](#3244740)
None | If you have a lot of inbound route maps that match lists with many regex statements, a large number of updates from the peer can cause the system to run out of memory. To work around this issue, reduce the number of regex matches in inbound route maps. | 4.4.0-5.2.1 | 5.3.0-5.6.0| -| [3240406](#3240406)
None | When you configure or unconfigure a BGP peer and interface towards a host, memory corruption can cause BGP to crash. | 4.3.0-5.3.1 | 5.4.0-5.6.0| -| [3236334](#3236334)
None | Using ARP suppression with a very large number of interfaces might result in missing ARP entries on the local device or buffer underrun warnings in the neighmgrd log. | 4.3.0-4.4.5 | | -| [3235956](#3235956)
| With certain triggers on Broadcom switches, such as adding or deleting a VNI or reloading the network, Cumulus Linux might consider the underlay routes as overlay routes. In this case, switchd allocates the overlay next hop, which is incorrect and might affect traffic forwarding. | 4.3.0-4.4.5 | | -| [3234031](#3234031)
None | If BGP neighbor allowas-in is set, negating with no no neighbor allowas-in does not disable the setting. To work around this issue and disable the setting, restart the FRR service. | 4.2.1-5.2.1 | 5.3.0-5.6.0| +| [3244740](#3244740)
None | If you have a lot of inbound route maps that match lists with many regex statements, a large number of updates from the peer can cause the system to run out of memory. To work around this issue, reduce the number of regex matches in inbound route maps. | 4.4.0-5.2.1 | 4.3.2, 5.3.0-5.6.0| | [3221470](#3221470)
None | Under heavy system load, when many forwarding resources (routes, neighbors, ECMP groups, and so on) are removed from hardware, subsequent attempts to configure additional forwarding resources might fail and you see the following log message:
sx_sdk: EMAD_RX_THREAD: EMAD transaction FW error
| 4.4.0-5.1.0 | 5.2.0-5.6.0| | [3218207](#3218207)
None | Certain routes on tenant VRFs have missing next hop entries because the router MAC address is missing in the bridge forwarding database table that corresponds to the remote VTEP. As a result, traffic forwarding is affected for these routes. | 4.3.0-5.2.1 | 5.3.0-5.6.0| | [3216922](#3216922)
None | RADIUS authenticated users with read-only access to NCLU commands (users in the users_with_show list) can run edit commands if a username for a non-local account is on the users_with_edit line of the /etc/netd.conf file. To work around this issue, make sure that all usernames on the users_with_edit line of the /etc/netd.conf file are configured local users for the system (real Linux users). | 3.7.0-5.2.1 | 5.3.0-5.6.0| @@ -1047,7 +955,7 @@ pdfhidden: True | [3216759](#3216759)
None | With the ip-acl-heavy TCAM profile, the following message might appear after you install an ACL with NCLU or cl-acltool and the ACL might not work correctly
hal_flx_acl_util.c:378 ERR hal_flx_acl_resource_release resource region 0 size 7387 create failed: No More Resources
To work around this issue, change the TCAM profile to acl-heavy or ip-acl-heavy with ACL non-atomic mode. | 3.7.15-3.7.16, 4.3.0-4.4.5 | | | [3211054](#3211054)
| On the NVIDIA Spectrum-2 switch, when receiving multicast traffic on a PIM enabled VLAN, the multicast traffic is forwarded correctly to the associated VLAN, however WJH shows traffic loss with the error:

Packet size is larger than router interface MTU – Validate the router interface MTU configuration
| 4.4.2-5.2.1 | 5.3.0-5.6.0| | [3209699](#3209699)
None | RADIUS authenticated users with read-only access to NCLU commands (users in the users_with_show list) can run edit commands if a username for a non-local account is on the users_with_edit line of the /etc/netd.conf file. To work around this issue, make sure that all usernames on the users_with_edit line of the /etc/netd.conf file are configured local users for the system (real Linux users)
| 3.7.0-4.3.0, 4.4.0-5.2.1 | 4.3.1, 5.3.0-5.6.0| -| [3192808](#3192808)
None | When the switch receives an LLDP frame from a Cisco router right after a ptmd restart, the ptmd service crashes. | 4.3.0-5.2.1 | 5.3.0-5.6.0| +| [3192808](#3192808)
None | When the switch receives an LLDP frame from a Cisco router right after a ptmd restart, the ptmd service crashes. | 4.3.0-4.3.1, 4.4.0-5.2.1 | 4.3.2, 5.3.0-5.6.0| | [3168564](#3168564)
| In a large scale VXLAN configuration (for example if you have more than 8500 VLANs across ports), switchd might crash when you restart clagd or when all bonds go operationally down, then up
On Trident3 switches running Cumulus Linux 4.3.1, NVIDIA validates the VLAN scale limit for VXLAN deployments with 8500 VLANs across ports with LACP bypass disabled. | 4.3.1-4.4.5 | | | [3163845](#3163845)
| If bond slaves listed in the /etc/network/interfaces file are not in alphabetical order, the bond interface MAC address can change when you run ifreload. For example, if the bond slaves in the /etc/network/interfaces file are listed as swp32 swp31, the switch initially uses the MAC address for swp32 as the bond MAC address. An another ifreload can cause this to change to use the MAC address for swp31 as the bond MAC address, which can cause protocol issues, such as IPv6 link-local address changes. | 4.3.1-4.4.5 | | | [3150317](#3150317)
| During a host failure, where a link remains up but LACP stops being sent, the EVPN multihoming ES bond goes into bypass mode active without a link state change. | 4.4.2-5.2.1 | 5.3.0-5.6.0| @@ -1130,6 +1038,7 @@ pdfhidden: True | [2780915](#2780915)
| In NVUE, you can't deactivate the IPv4 address family per neighbor. | 4.4.0-4.4.5 | 5.0.0-5.6.0| | [2780834](#2780834)
| To enable an address family on a peer, you have to enable the address family globally. | 4.4.0-4.4.5 | 5.0.0-5.6.0| | [2780211](#2780211)
| When you use the NVUE nv set vrf default router bgp peer local-as asn command to configure a local AS, Cumulus Linux does not update the etc/frr/frr.conf file. | 4.4.0-4.4.5 | 5.0.0-5.6.0| +| [2771653](#2771653)
| When using W-ECMP, the weights for various BGP next hops can sometimes be in the range of 100s or more, which consumes a lot of hardware space. | 4.3.0-4.4.5 | | | [2763819](#2763819)
| When you enable LACP bypass on a bond, traffic to static MAC addresses configured on the bond might not work when LACP bypass is enforced. | 4.4.0-4.4.5 | | | [2754791](#2754791)
| Remote MAC addreses in zebra are out of sync with bgpd. The zebra MAC addresses point to an incorrect (old) VTEP IP address and the sequence number is one higher than in BGP. | 3.7.14.2-3.7.16, 4.3.0-4.4.5 | | | [2753955](#2753955)
| On the Lenovo MSN3700 switch, if you try to configure an interface with a link speed of 200G, the configuration fails. | 4.2.1-4.4.5 | 5.0.0-5.6.0| @@ -1173,7 +1082,6 @@ pdfhidden: True | [2555763](#2555763)
CM-32861 | The NCLU net del bgp neighbor command does not delete the neighbor and displays an error similar to the following:

ERROR: --- /run/nclu/frr/frr.conf.scratchpad.baseline 2021-01-04 17:23:59.250463331 +0000
+++ /run/nclu/frr/frr.conf.scratchpad 2021-01-04 17:25:59.213673980 +0000

To work around this issue, use the FRR command to delete a neighbor. | 4.3.0-4.4.5 | | | [2555613](#2555613)
CM-32786 | The net show configuration commands command incorrectly displays the NCLU syntax to disable IPv6 forwarding on interfaces. For example:

# net show configuration commands
net add vlan 1 ip6-forward off

The correct NCLU command to disable IPv6 forwarding is net add vlan 1 ipv6 forward off (without the hyphen). | 4.2.1-4.4.5 | | | [2555318](#2555318)
CM-32612 | If you try to enable BGP graceful restart when it is already enabled, you see an error similar to the following in the frr.log file:

2020-12-07T19:20:26.004333+00:00 cumulus bgpd[4954]: VRF default: Handle GR command GLOBAL_GR_CMD, current GR state GLOBAL_GR, new GR state GLOBAL_INVALID

This error has no functional impact. | 4.3.0-4.4.5 | | -| [2555175](#2555175)
CM-32528 | Control Plane Traffic (example - BGP peering from Leaf to Spine) goes down on Leaf due to Hold Down Timer Expiration of peer following prolonged link flaps on downlinks when vxlan enabled vlans are carried on the flapping link. | 3.7.15-3.7.16, 4.2.1-4.4.5 | | | [2554986](#2554986)
CM-32416 | The ethtool utility doesn't contain the latest values, as a result the Revision Compliance field shows Unallocated. | 4.2.1-4.4.5 | | | [2554812](#2554812)
CM-32296 | If the RMAC of a layer 3 SVI changes, the show vrf vni command is not updated with the new value. However, the new RMAC is seen in the show evpn vni command and is present on self-originated EVPN routes. | 4.2.1-4.4.5 | | | [2554783](#2554783)
CM-32274 | If you apply an outbound route map to a BGP peer that uses set as-path prepend last-as, advertised locally-originated routes have the ASN of the peer prepended to the AS path.
This might trigger AS path loop prevention on the peer, where the peer ignores locally-originated prefixes. | 4.2.1-4.4.5 | 5.0.0-5.6.0| @@ -1353,51 +1261,28 @@ pdfhidden: True | Issue ID | Description | Affects | Fixed | |--- |--- |--- |--- | -| [3647731](#3647731)
None | CVE-2023-38408: The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009
Mitigation: Do not use ssh-agent forwarding (the man page for ssh_config says that "agent forwarding should be enabled with caution"), or start the ssh-agent program with the -P option to allow only specific PKCS#11 libraries (or none with -P '')
For Cumulus Linux 4.3.2, the /usr/bin/ssh-agent program has all permissions turned off (chmod 0) to prevent its execution if a vulnerable version is detected. | 4.0.0-4.4.5, 5.0.0-5.6.0 | | | [3647424](#3647424)
None | When you remove the update-source configuration for a BGP neighbor, the peering is reset if the neighbor is a member of a peer group with the same update-source configuration. | 4.3.0-4.4.5 | | -| [3534654](#3534654)
| On a Broadcom switch, Q-in-Q VLAN operations do not clear when you remove a bridge port from a VXLAN-enabled bridge. This can result in unexpected double tagged packets if the outer VLAN is still used on the bridge. To work around this issue, restart switchd after you modify or remove double tagged bridge ports from a VXLAN-enabled bridge. | 4.3.1-4.4.5 | | +| [3600912](#3600912)
| In an MLAG EVPN configuration, if host mobility occurs multiple times at high frequency, the host MAC might point to an incorrect VTEP; it might be local behind the VTEP. | 4.3.1-4.4.5 | | | [3488136](#3488136)
| When zebra receives route updates that include both a route with a recursive next hop and the route used to resolve that next hop, zebra might mark the route with the recursive next hop as inactive. To work around this issue, reprocess the route updates by running the appropriate clear command for the protocol in use. For example, for BGP, clear inbound routes from the relevant neighbor using the nv action clear vrf router bgp neighbor address-family in command. | 4.2.1-5.5.1 | 5.6.0| -| [3486888](#3486888)
None | If FRR learns a layer 2 entry against a VNI and you reconfigure the VNI later as a layer 3 VNI, the original layer 2 entry does not clear and remains in the forwarding database. | 4.3.0-5.5.1 | 5.6.0| -| [3479967](#3479967)
| When you remove VRF configuration, the systemctl reload frr.service command returns a non zero exit code after erroneously running the invalid command no exit-vrf. | 4.3.1-4.4.5 | | | [3474391](#3474391)
| The SNMP MIB definition file /usr/share/snmp/mibs/Cumulus-BGPVRF-MIB.txt does not define the INDEX of the bgpPeerEntry correctly. This issue does not impact SNMP functionality for this MIB. | 4.3.1-5.5.1 | 5.6.0| -| [3455998](#3455998)
| When you poll the BGP unnumbered MIB object 1.3.6.1.4.1.40310.4 after uncommenting the bgpun_pp.py pass persist script in the /etc/snmpd/snmpd.conf file, BGP session information is not retrieved. To work around this issue, add executable permissions to the script with the sudo chmod +x /usr/share/snmp/bgpun_pp.py command. | 4.3.1-4.4.5 | | -| [3448171](#3448171)
| If a default route is withdrawn from the routing table and then learned again, traffic matching this entry will be software (cpu) forwarded.  This will cause intermittent drops due to the CPU the rate-limiter
This only impacts the default VRF and a default route learned dynamically
In order to recover from this condition: 1. Restart switchd.service (sudo systemctl restart switchd.service)OR 2. Reboot the switch (sudo reboot) | 4.3.1-4.4.5 | | -| [3434315](#3434315)
| IPv6 BGP sessions in a VRF do not be establish with MD5 authentication. | 4.3.0-4.4.5 | | | [3429530](#3429530)
| On the Spectrum-2 and Spectrum-3 switch, multiple interfaces (in the same PLL quarter) might flap intermittently at the same time. | 4.2.1-5.4.0 | 5.5.0-5.6.0| -| [3419962](#3419962)
| On a Broadcom switch, if you remove a double-tagged interface from a bridge that contains other double-tagged interfaces built on the same physical port (for example, you remove swp1.10.100 when swp1.10.200 is also a bridge port), traffic forwarding within the bridge might fail and you see critical warnings in the /var/log/switchd.log file similar to the following:
switchd[8587]: hal_bcm.c:2207 CRIT knet_vlan_translate_delete(update): port 1 ext_vlan 10.100 int_vlan 2132: -11
| 4.3.1-4.4.5 | | -| [3419953](#3419953)
| If you remove a double tagged bridge port from a bridge when a different interface exists with the same port and virtual ID, you might see a segmentation fault and a switchd crash due to incorrect initialization when Cumulus Linux creates the second double-tagged interface. To work around this issue, make sure you remove the double-tagged interfaces from the bridge in the /etc/network/interfaces file. | 4.3.1-4.4.5 | | -| [3418045](#3418045)
None | If MLAG is configured but disconnected from an MLAG peer for an extended period of time (days or more), there is a long delay (up to a minute per day) before traffic forwarding stabilizes after the MLAG peer connection re-establishes. | 3.7.0-5.4.0 | 5.5.0-5.6.0| -| [3401121](#3401121)
| sFlow is not able to sample packets in the egress direction. To work around this issue, add the following to the hsflowd.conf file to enable egress sampling:
samplingDirection=outpsample { group=1 }
| 4.3.0-4.4.5 | | | [3387852](#3387852)
None | If you remove NGINX from the switch, then run apt autoremove, switchd does not reload because the libyaml-0-2 and python-yaml packages are missing; these packages are required for switchd consistency checking. To work around this issue, reinstall the libyaml-0-2 and python-yaml packages. | 4.4.0-4.4.5 | | -| [3376798](#3376798)
| On Broadcom switches, Cumulus Linux does not create the hardware bridging domain for a traditional bridge with a VXLAN interface during switchd restart. The /var/log/switchd.log file includes the following exception logs shortly after switchd restarts:
switchd[30158]: hal_bcm_l3.c:1617 find_egr_path_if_vxlan_overlay:vxlan overlay : nh PORT: port <#>, vlan . not yet ready
MAC learning looks correct, but traffic does not flow as expected. | 3.7.0-3.7.16, 4.3.1-4.4.5 | | -| [3366612](#3366612)
| The base version of the Linux kernel is updated to the v4.19.273 stable release, which includes fixes for several CVE issues. | 4.3.1-4.4.5 | | -| [3364996](#3364996)
| Under certain conditions, BGP can allow a combination of EVPN and non-EVPN paths to be put into a multipath group together. This results in erroneous programming of EVPN symmetric next hops and RMACs, which can result in momentary traffic drops. | 4.3.0-4.4.5 | | -| [3364717](#3364717)
None | On the Trident 2+ and Trident 3 switch when using VXLAN layer 2 VPNs and sending tunneled traffic where the inner IP header has a TTL of 1, the egress VTEP incorrectly forwards this traffic through the software path instead of the hardware data plane. This traffic is rate-limited to 100pps by default. To work around this issue, ensure that the traffic traversing the layer 2 tunnel has an inner IP header TTL value that is more than 1. If this workaround is not possible, contact Nvidia Support to determine other options. | 4.3.0-4.4.5 | | -| [3358865](#3358865)
None | When you reboot a Broadcom switch with a static default route configured, the route might be installed in hardware without a next hop. This results in forwarded traffic to the CPU and drops. To recover from this issue, remove the default route configuration and reapply it. To prevent this issue, before rebooting the switch, split the default route configuration into two routes as below:
ip route 0.0.0.0/1 10.1.1.1ip route 128.0.0.0/1 10.1.1.1
| 4.3.1-4.4.5 | | -| [3351951](#3351951)
None | Currently, the default core dump size limit on Cumulus Linux is 256M but the SDK generates core dumps around 800M. To avoid incomplete core files, you can increase the core dump size limit. | 4.2.1-5.3.1 | 5.4.0-5.6.0| -| [3334031](#3334031)
None | When you configure or unconfigure a BGP peer and interface towards a host, memory corruption can cause BGP to crash. | 4.3.0-4.4.5 | | +| [3351951](#3351951)
None | Currently, the default core dump size limit on Cumulus Linux is 256M but the SDK generates core dumps around 800M. To avoid incomplete core files, you can increase the core dump size limit. | 4.2.1-4.3.1, 4.4.0-5.3.1 | 4.3.2, 5.4.0-5.6.0| | [3333064](#3333064)
None | The traffic control rules that the EVPN multihoming configuration adds to an interface are deleted when the hsflowd service restarts. The hsflowd service deletes the EVPN multihoming traffic control filters after you stop hsflowd, then adds back the match-all filters with the psample action; however, hsflowd does not add back the EVPN multihoming traffic control rules. | 4.4.0-5.3.1 | 5.4.0-5.6.0| | [3330705](#3330705)
| When using TACACS+, a TACACS+ server name that returns more than one IP address, such as an IPv6 and IPv4 address, is counted many times against the limit of seven TACACS+ servers, which might cause some of the later listed servers to be ignored as over the limit. To work around this issue, you can set the prefer_ip_version configuration option (the default value is 4) to choose between an IPv4 or IPv6 address if both are present. | 3.7.0-5.3.1 | 5.4.0-5.6.0| | [3327477](#3327477)
| If you use su to change to a user specified through TACACS+, the user becomes the local tacacs0 thru tacacs15 user instead of the named user to run sudo commands. As a result, the named user password might not match the local tacacs0 thru tacacs15 user password. | 3.7.0-3.7.16, 4.0.0-4.4.5, 5.0.0-5.6.0 | | | [3321391](#3321391)
None | On the NVIDIA SN2410 switch, ports with optical transceivers show FAULT errors in the sensor command output. | 4.2.1-5.3.1 | 5.4.0-5.6.0| | [3303105](#3303105)
None | Clagd crash is observed with the following traceback in /var/log/clagd.log following a clag sync event which is typically driven by a peerlink up event:
unhandled exception:
Traceback (most recent call last):
File "/usr/sbin/clagd", line 1304, in PeerRecvT
PeerRecv()
File "/usr/sbin/clagd", line 513, in PeerRecv
ParseProtoBufMessage(nlm, myPeerMsg)
File "/usr/sbin/clagd", line 853, in ParseProtoBufMessage
msgData = FdbSync.ParseProtoBufMessage(msgHdr)
File "/usr/lib/python3/dist-packages/clag/fdbsync.py", line 892, in ParseProtoBufMessage
msgData.ParseFromString(msgHdr.data)
google.protobuf.message.DecodeError: Error parsing message | 4.4.0-4.4.5 | | | [3291548](#3291548)
None | In EVPN deployments, a buffer lockup for split or pre-split ports can occur on Spectrum-2 and Spectrum-3 switches. As result, traffic coming in on these ports is dropped in the RX buffer. To work around this issue, restart switchd. | 4.2.1-4.4.5 | 5.0.0-5.6.0| -| [3288385](#3288385)
| On the EdgeCore AS7326-56X and AS7726-32X switch, the fan speed reports a minimum threshold in the logs. | 4.3.1-4.4.5 | | -| [3269538](#3269538)
None | The cl-ecmpcalc command prints the following error when the egress interface is a bond or SVI:
ecmpcalc: will query hardwareTraceback (most recent call last):File “/usr/cumulus/bin/cl-ecmpcalc”, line 986, inisTrunkMbr, port = ecmp.getHdPort(hd_cmd)File “/usr/cumulus/bin/cl-ecmpcalc”, line 618, in getHdPortport = int(str4)ValueError: invalid literal for int() with base 10: ‘0t
| 4.3.0-4.4.5 | | | [3269537](#3269537)
None | When an FRR routing service (such as bgpd) becomes unresponsive, watchfrr might fail to stop and restart service. To work around this issue, restart FRR with the systemctl restart frr command. | 4.4.0-5.3.1 | 5.4.0-5.6.0| -| [3267353](#3267353)
| In a QinQ configuration, if the VLAN priority is a non-zero value, double-tagged packets are translated to triple-tagged packets. | 4.3.1-4.4.5 | | -| [3244740](#3244740)
None | If you have a lot of inbound route maps that match lists with many regex statements, a large number of updates from the peer can cause the system to run out of memory. To work around this issue, reduce the number of regex matches in inbound route maps. | 4.4.0-5.2.1 | 5.3.0-5.6.0| -| [3240406](#3240406)
None | When you configure or unconfigure a BGP peer and interface towards a host, memory corruption can cause BGP to crash. | 4.3.0-5.3.1 | 5.4.0-5.6.0| -| [3236334](#3236334)
None | Using ARP suppression with a very large number of interfaces might result in missing ARP entries on the local device or buffer underrun warnings in the neighmgrd log. | 4.3.0-4.4.5 | | -| [3235956](#3235956)
| With certain triggers on Broadcom switches, such as adding or deleting a VNI or reloading the network, Cumulus Linux might consider the underlay routes as overlay routes. In this case, switchd allocates the overlay next hop, which is incorrect and might affect traffic forwarding. | 4.3.0-4.4.5 | | -| [3234031](#3234031)
None | If BGP neighbor allowas-in is set, negating with no no neighbor allowas-in does not disable the setting. To work around this issue and disable the setting, restart the FRR service. | 4.2.1-5.2.1 | 5.3.0-5.6.0| +| [3244740](#3244740)
None | If you have a lot of inbound route maps that match lists with many regex statements, a large number of updates from the peer can cause the system to run out of memory. To work around this issue, reduce the number of regex matches in inbound route maps. | 4.4.0-5.2.1 | 4.3.2, 5.3.0-5.6.0| | [3221470](#3221470)
None | Under heavy system load, when many forwarding resources (routes, neighbors, ECMP groups, and so on) are removed from hardware, subsequent attempts to configure additional forwarding resources might fail and you see the following log message:
sx_sdk: EMAD_RX_THREAD: EMAD transaction FW error
| 4.4.0-5.1.0 | 5.2.0-5.6.0| | [3218207](#3218207)
None | Certain routes on tenant VRFs have missing next hop entries because the router MAC address is missing in the bridge forwarding database table that corresponds to the remote VTEP. As a result, traffic forwarding is affected for these routes. | 4.3.0-5.2.1 | 5.3.0-5.6.0| | [3216922](#3216922)
None | RADIUS authenticated users with read-only access to NCLU commands (users in the users_with_show list) can run edit commands if a username for a non-local account is on the users_with_edit line of the /etc/netd.conf file. To work around this issue, make sure that all usernames on the users_with_edit line of the /etc/netd.conf file are configured local users for the system (real Linux users). | 3.7.0-5.2.1 | 5.3.0-5.6.0| | [3216921](#3216921)
None | RADIUS authenticated users with read-only access to NCLU commands (users in the users_with_show list) can run edit commands if a username for a non-local account is on the users_with_edit line of the /etc/netd.conf file. To work around this issue, make sure that all usernames on the users_with_edit line of the /etc/netd.conf file are configured local users for the system (real Linux users)
| 3.7.0-3.7.16, 4.3.0-4.4.5 | | | [3216759](#3216759)
None | With the ip-acl-heavy TCAM profile, the following message might appear after you install an ACL with NCLU or cl-acltool and the ACL might not work correctly
hal_flx_acl_util.c:378 ERR hal_flx_acl_resource_release resource region 0 size 7387 create failed: No More Resources
To work around this issue, change the TCAM profile to acl-heavy or ip-acl-heavy with ACL non-atomic mode. | 3.7.15-3.7.16, 4.3.0-4.4.5 | | | [3209699](#3209699)
None | RADIUS authenticated users with read-only access to NCLU commands (users in the users_with_show list) can run edit commands if a username for a non-local account is on the users_with_edit line of the /etc/netd.conf file. To work around this issue, make sure that all usernames on the users_with_edit line of the /etc/netd.conf file are configured local users for the system (real Linux users)
| 3.7.0-4.3.0, 4.4.0-5.2.1 | 4.3.1, 5.3.0-5.6.0| -| [3192808](#3192808)
None | When the switch receives an LLDP frame from a Cisco router right after a ptmd restart, the ptmd service crashes. | 4.3.0-5.2.1 | 5.3.0-5.6.0| +| [3192808](#3192808)
None | When the switch receives an LLDP frame from a Cisco router right after a ptmd restart, the ptmd service crashes. | 4.3.0-4.3.1, 4.4.0-5.2.1 | 4.3.2, 5.3.0-5.6.0| | [3168564](#3168564)
| In a large scale VXLAN configuration (for example if you have more than 8500 VLANs across ports), switchd might crash when you restart clagd or when all bonds go operationally down, then up
On Trident3 switches running Cumulus Linux 4.3.1, NVIDIA validates the VLAN scale limit for VXLAN deployments with 8500 VLANs across ports with LACP bypass disabled. | 4.3.1-4.4.5 | | | [3163845](#3163845)
| If bond slaves listed in the /etc/network/interfaces file are not in alphabetical order, the bond interface MAC address can change when you run ifreload. For example, if the bond slaves in the /etc/network/interfaces file are listed as swp32 swp31, the switch initially uses the MAC address for swp32 as the bond MAC address. An another ifreload can cause this to change to use the MAC address for swp31 as the bond MAC address, which can cause protocol issues, such as IPv6 link-local address changes. | 4.3.1-4.4.5 | | | [3138746](#3138746)
| The switch duplicates DHCP packets that pass through the VTEP. | 4.3.0-5.1.0 | 5.2.0-5.6.0| @@ -1480,6 +1365,7 @@ pdfhidden: True | [2780834](#2780834)
| To enable an address family on a peer, you have to enable the address family globally. | 4.4.0-4.4.5 | 5.0.0-5.6.0| | [2780211](#2780211)
| When you use the NVUE nv set vrf default router bgp peer local-as asn command to configure a local AS, Cumulus Linux does not update the etc/frr/frr.conf file. | 4.4.0-4.4.5 | 5.0.0-5.6.0| | [2771871](#2771871)
| IPv4 and IPv6 neighbor entries in a FAILED state are incorrectly programmed into hardware as FORWARD entries instead of TRAP entries. Traffic is forwarded to these neighbors with a destination MAC address of 00:00:00:00:00:00 instead of trapping them to the CPU to resolve the correct MAC address
This affects failed neighbor entries on routed interfaces that are not SVIs. | 4.3.0-4.4.1 | 4.4.2-4.4.5| +| [2771653](#2771653)
| When using W-ECMP, the weights for various BGP next hops can sometimes be in the range of 100s or more, which consumes a lot of hardware space. | 4.3.0-4.4.5 | | | [2763819](#2763819)
| When you enable LACP bypass on a bond, traffic to static MAC addresses configured on the bond might not work when LACP bypass is enforced. | 4.4.0-4.4.5 | | | [2755614](#2755614)
| When route_preferred_over_neigh is set to FALSE in the /etc/cumulus/switchd.conf file, host routes (/32 or /128) are used for forwarding in hardware instead of a local neighbor entry. | 4.0.0-4.3.0, 4.4.0-4.4.5 | 4.3.1, 5.0.0-5.6.0| | [2754791](#2754791)
| Remote MAC addreses in zebra are out of sync with bgpd. The zebra MAC addresses point to an incorrect (old) VTEP IP address and the sequence number is one higher than in BGP. | 3.7.14.2-3.7.16, 4.3.0-4.4.5 | | @@ -1537,7 +1423,6 @@ pdfhidden: True | [2555763](#2555763)
CM-32861 | The NCLU net del bgp neighbor command does not delete the neighbor and displays an error similar to the following:

ERROR: --- /run/nclu/frr/frr.conf.scratchpad.baseline 2021-01-04 17:23:59.250463331 +0000
+++ /run/nclu/frr/frr.conf.scratchpad 2021-01-04 17:25:59.213673980 +0000

To work around this issue, use the FRR command to delete a neighbor. | 4.3.0-4.4.5 | | | [2555613](#2555613)
CM-32786 | The net show configuration commands command incorrectly displays the NCLU syntax to disable IPv6 forwarding on interfaces. For example:

# net show configuration commands
net add vlan 1 ip6-forward off

The correct NCLU command to disable IPv6 forwarding is net add vlan 1 ipv6 forward off (without the hyphen). | 4.2.1-4.4.5 | | | [2555318](#2555318)
CM-32612 | If you try to enable BGP graceful restart when it is already enabled, you see an error similar to the following in the frr.log file:

2020-12-07T19:20:26.004333+00:00 cumulus bgpd[4954]: VRF default: Handle GR command GLOBAL_GR_CMD, current GR state GLOBAL_GR, new GR state GLOBAL_INVALID

This error has no functional impact. | 4.3.0-4.4.5 | | -| [2555175](#2555175)
CM-32528 | Control Plane Traffic (example - BGP peering from Leaf to Spine) goes down on Leaf due to Hold Down Timer Expiration of peer following prolonged link flaps on downlinks when vxlan enabled vlans are carried on the flapping link. | 3.7.15-3.7.16, 4.2.1-4.4.5 | | | [2554986](#2554986)
CM-32416 | The ethtool utility doesn't contain the latest values, as a result the Revision Compliance field shows Unallocated. | 4.2.1-4.4.5 | | | [2554812](#2554812)
CM-32296 | If the RMAC of a layer 3 SVI changes, the show vrf vni command is not updated with the new value. However, the new RMAC is seen in the show evpn vni command and is present on self-originated EVPN routes. | 4.2.1-4.4.5 | | | [2554783](#2554783)
CM-32274 | If you apply an outbound route map to a BGP peer that uses set as-path prepend last-as, advertised locally-originated routes have the ASN of the peer prepended to the AS path.
This might trigger AS path loop prevention on the peer, where the peer ignores locally-originated prefixes. | 4.2.1-4.4.5 | 5.0.0-5.6.0| @@ -1677,66 +1562,66 @@ pdfhidden: True ### Fixed Issues in 4.4.0 | Issue ID | Description | Affects | |--- |--- |--- | -| [2828927](#2828927)
| An unexpected software system shutdown can occur due to a thermal zones issue in the hw-management package. The following message might appear in /var/log/syslog before the shutdown:
thermal thermal_zoneX: critical temperature reached (33 C), shutting down
| 4.3.0-4.3.1 | | +| [2828927](#2828927)
| An unexpected software system shutdown can occur due to a thermal zones issue in the hw-management package. The following message might appear in /var/log/syslog before the shutdown:
thermal thermal_zoneX: critical temperature reached (33 C), shutting down
| 4.3.0-4.3.2 | | | [2734173](#2734173)
| The Mellanox 100G transceiver MMA1L30-CM Rev A3 is not recognized on the SN4600 switch even though the link is up. The ethtool output shows the error Cannot get Module EEPROM data: Invalid argument. | | | | [2728138](#2728138)
CM-33237 | CVE-2020-36221, CVE-2020-36222, CVE-2020-36223, CVE-2020-36224, CVE-2020-36225, CVE-2020-36226, CVE-2020-36227, CVE-2020-36228, CVE-2020-36229, CVE-2020-36230: Several vulnerabilities were discovered in OpenLDAP, a free implementation of the Lightweight Directory Access Protocol. An unauthenticated remote attacker can take advantage of these flaws to cause a denial of service (slapd daemon crash, infinite loops) via specially crafted packets.
Vulnerable: <= 2.4.47+dfsg-3+deb10u4
Fixed: 2.4.47+dfsg-3+deb10u5 | 4.0.0-4.3.0 | | -| [2728134](#2728134)
| CVE-2021-27212: A vulnerability in the Certificate List Exact Assertion validation was discovered in OpenLDAP, a free implementation of the Lightweight Directory Access Protocol. An unauthenticated remote attacker can take advantage of this flaw to cause a denial of service (slapd daemon crash) via specially crafted packets.
Vulnerable: <= 2.4.47+dfsg-3+deb10u5
Fixed: 2.4.47+dfsg-3+deb10u6 | 4.0.0-4.3.1 | | -| [2695526](#2695526)
| CVE-2021-3580 CVE-2021-20305: Multiple vulnerabilities were discovered in nettle, a low level cryptographic library, which could result in denial of service (remote crash in RSA decryption via specially crafted ciphertext, crash on ECDSA signature verification) or incorrect verification of ECDSA signatures
Vulnerable: 3.4.1-1Fixed: 3.4.1-1+deb10u1 | 4.0.0-4.3.1 | | +| [2728134](#2728134)
| CVE-2021-27212: A vulnerability in the Certificate List Exact Assertion validation was discovered in OpenLDAP, a free implementation of the Lightweight Directory Access Protocol. An unauthenticated remote attacker can take advantage of this flaw to cause a denial of service (slapd daemon crash) via specially crafted packets.
Vulnerable: <= 2.4.47+dfsg-3+deb10u5
Fixed: 2.4.47+dfsg-3+deb10u6 | 4.0.0-4.3.2 | | +| [2695526](#2695526)
| CVE-2021-3580 CVE-2021-20305: Multiple vulnerabilities were discovered in nettle, a low level cryptographic library, which could result in denial of service (remote crash in RSA decryption via specially crafted ciphertext, crash on ECDSA signature verification) or incorrect verification of ECDSA signatures
Vulnerable: 3.4.1-1Fixed: 3.4.1-1+deb10u1 | 4.0.0-4.3.2 | | | [2691506](#2691506)
| In a VRRP configuration, BGP unnumbered sessions for VRFs fail to establish after a networking restart. | 4.3.0 | | -| [2690017](#2690017)
| When you remove a bond member, then re-add it, you might see a Parameter Error failure in {syslog and switchd.log:
sx_sdk: LAG: Can't add port (0x00012400) to lag. Port has vports configured for it (Parameter Error)
switchd[4529]: hal_mlx_bond.c:582 ERR bond32 member swp32 add failed: Parameter Error
To work around this issue, restart switchd. | 4.3.0-4.3.1 | | -| [2687159](#2687159)
| CVE-2018-25009 CVE-2018-25010 CVE-2018-25011 CVE-2018-25012 CVE-2018-25013 CVE-2018-25014 CVE-2020-36328 CVE-2020-36329 CVE-2020-36330 CVE-2020-36331 CVE-2020-36332: Multiple vulnerabilities were discovered in libwebp, the implementation of the WebP image format, which could result in denial of service, memory disclosure or potentially the execution of arbitrary code if malformed images are processed
Vulnerable: 0.6.1-2Fixed: 0.6.1-2+deb10u1 | 4.0.0-4.3.1 | | +| [2690017](#2690017)
| When you remove a bond member, then re-add it, you might see a Parameter Error failure in {syslog and switchd.log:
sx_sdk: LAG: Can't add port (0x00012400) to lag. Port has vports configured for it (Parameter Error)
switchd[4529]: hal_mlx_bond.c:582 ERR bond32 member swp32 add failed: Parameter Error
To work around this issue, restart switchd. | 4.3.0-4.3.2 | | +| [2687159](#2687159)
| CVE-2018-25009 CVE-2018-25010 CVE-2018-25011 CVE-2018-25012 CVE-2018-25013 CVE-2018-25014 CVE-2020-36328 CVE-2020-36329 CVE-2020-36330 CVE-2020-36331 CVE-2020-36332: Multiple vulnerabilities were discovered in libwebp, the implementation of the WebP image format, which could result in denial of service, memory disclosure or potentially the execution of arbitrary code if malformed images are processed
Vulnerable: 0.6.1-2Fixed: 0.6.1-2+deb10u1 | 4.0.0-4.3.2 | | | [2684418](#2684418)
| If you configure items in a VRF that has been created, deleted, then re-created, staticd crashes. | 4.3.0 | | -| [2682971](#2682971)
| CVE-2020-12762: integer overflow in the json-c JSON library, which could result in denial of service or potentially the execution of arbitrary code if large malformed JSON files are processed
Vulnerable: 0.12.2+cl4u1Fixed: 0.12.2+cl4.4.0u1 | 4.0.0-4.3.1 | | -| [2682780](#2682780)
| Adding a route map configuration after a MAC access list configuration line causes the route map configuration to be applied incorrectly
To work around this issue, add the MAC access list configuration to the end of the /etc/frr/frr.conf file. | 4.2.0-4.3.1 | | -| [2679948](#2679948)
| CVE-2021-25217: parsing of stored leases by dhclient or dhcpd has an incorrect length check that may cause a crash
Vulnerable: <= 4.3.1-6-cl3.7.14u1Fixed: 4.3.1-6-cl3.7.16u1 | 3.7.0-3.7.15, 4.0.0-4.3.1 | | +| [2682971](#2682971)
| CVE-2020-12762: integer overflow in the json-c JSON library, which could result in denial of service or potentially the execution of arbitrary code if large malformed JSON files are processed
Vulnerable: 0.12.2+cl4u1Fixed: 0.12.2+cl4.4.0u1 | 4.0.0-4.3.2 | | +| [2682780](#2682780)
| Adding a route map configuration after a MAC access list configuration line causes the route map configuration to be applied incorrectly
To work around this issue, add the MAC access list configuration to the end of the /etc/frr/frr.conf file. | 4.2.0-4.3.2 | | +| [2679948](#2679948)
| CVE-2021-25217: parsing of stored leases by dhclient or dhcpd has an incorrect length check that may cause a crash
Vulnerable: <= 4.3.1-6-cl3.7.14u1Fixed: 4.3.1-6-cl3.7.16u1 | 3.7.0-3.7.15, 4.0.0-4.3.2 | | | [2679936](#2679936)
| Following an event that causes the peer link bond MAC address to change, such as a slave port state change, MLAG interfaces might be suspended due to a peer-ip-mismatch. This behavior is seen when you use a clagd-peer-ip linklocal configuration. | 4.3.0 | | | [2677049](#2677049)
CM-33247 | CVE-2020-25681 CVE-2020-25682 CVE-2020-25683 CVE-2020-25684 CVE-2020-25685 CVE-2020-25686 CVE-2020-25687: Several vulnerabilities in dnsmasq, a small caching DNS proxy and DHCP/TFTP server, could result in denial of service, cache poisoning or the execution of arbitrary code. | 4.0.0-4.3.0 | | -| [2671667](#2671667)
| CVE-2021-23017: off-by-one in Nginx, a high-performance web and reverse proxy server, which couldresult in denial of service and potentially the execution of arbitrary code
Vulnerable: <= 1.14.2-2+deb10u3Fixed: 1.14.2-2+deb10u4 | 4.0.0-4.3.1 | | -| [2669873](#2669873)
| In an EVPN multihoming configuration, ARP/ND traffic coming in one switch is being sent back out the originating bond on the other switches in the ES on remote PE switches. Normally Split Horizon filtering prevents this kind of traffic at the remote PE. | 4.3.0-4.3.1 | | -| [2669073](#2669073)
| On Spectrum, Spectrum-2, and Spectrum-3 switches, the l1-show command shows the wrong data when the MST service is stopped
To work around this issue, start the MST service with the sudo mst start command. | 4.3.0-4.3.1 | | -| [2666838](#2666838)
| CVE-2021-31535: missing length validation in various functions provided by libx11, the X11 client-side library, allow to inject X11 protocol commands on X clients, leading to authentication bypass, denial of service or potentially the execution of arbitrary code
Vulnerable: <= 1.6.7-1+deb10u1Fixed: 1.6.7-1+deb10u2 | 4.0.0-4.3.1 | | -| [2663479](#2663479)
| CVE-2021-3520: integer overflow flaw in lz4, a fast LZ compression algorithm library, resulting in memory corruption
Vulnerable: 1.8.3-1Fixed: 1.8.3-1+deb10u1 | 4.0.0-4.3.1 | | -| [2656527](#2656527)
| CVE-2020-18032: A buffer overflow was discovered in Graphviz, which could potentially result in the execution of arbitrary code when processing a malformed file
Vulnerable: 2.40.1-6Fixed: 2.40.1-6+deb10u1 | 4.0.0-4.3.1 | | -| [2648658](#2648658)
| If you try to use more than one percent of max-ecmp-nexthops, you get an error indicating a failure. | 3.7.15-4.3.1 | | +| [2671667](#2671667)
| CVE-2021-23017: off-by-one in Nginx, a high-performance web and reverse proxy server, which couldresult in denial of service and potentially the execution of arbitrary code
Vulnerable: <= 1.14.2-2+deb10u3Fixed: 1.14.2-2+deb10u4 | 4.0.0-4.3.2 | | +| [2669873](#2669873)
| In an EVPN multihoming configuration, ARP/ND traffic coming in one switch is being sent back out the originating bond on the other switches in the ES on remote PE switches. Normally Split Horizon filtering prevents this kind of traffic at the remote PE. | 4.3.0-4.3.2 | | +| [2669073](#2669073)
| On Spectrum, Spectrum-2, and Spectrum-3 switches, the l1-show command shows the wrong data when the MST service is stopped
To work around this issue, start the MST service with the sudo mst start command. | 4.3.0-4.3.2 | | +| [2666838](#2666838)
| CVE-2021-31535: missing length validation in various functions provided by libx11, the X11 client-side library, allow to inject X11 protocol commands on X clients, leading to authentication bypass, denial of service or potentially the execution of arbitrary code
Vulnerable: <= 1.6.7-1+deb10u1Fixed: 1.6.7-1+deb10u2 | 4.0.0-4.3.2 | | +| [2663479](#2663479)
| CVE-2021-3520: integer overflow flaw in lz4, a fast LZ compression algorithm library, resulting in memory corruption
Vulnerable: 1.8.3-1Fixed: 1.8.3-1+deb10u1 | 4.0.0-4.3.2 | | +| [2656527](#2656527)
| CVE-2020-18032: A buffer overflow was discovered in Graphviz, which could potentially result in the execution of arbitrary code when processing a malformed file
Vulnerable: 2.40.1-6Fixed: 2.40.1-6+deb10u1 | 4.0.0-4.3.2 | | +| [2648658](#2648658)
| If you try to use more than one percent of max-ecmp-nexthops, you get an error indicating a failure. | 3.7.15-4.3.2 | | | [2648587](#2648587)
CM-29978 | The received PVST BPDU for a VLAN is flooded even though the ingress port doesn't have the VLAN tagged. | 3.7.8-3.7.14.2, 4.0.0-4.3.0 | | | [2644072](#2644072)
| When you stop clagd on the MLAG primary switch (for example, when you reboot the switch), in rare conditions the MLAG secondary switch might fail to properly assert itself as the MLAG primary switch. To work around this issue, change the primary designation by configuring the clagd priorities to ensure that you only reboot a switch that is in the MLAG secondary role. | 3.7.15, 4.3.0 | | -| [2644053](#2644053)
| The following vulnerabilities have been announced in BIND:CVE-2021-25214: a malformed incoming IXFR transfer could trigger an assertion failure in named, resulting in denial of service
CVE-2021-25215: named could crash when a DNAME record placed in the ANSWER section during DNAME chasing turned out to be the final answer to a client query
CVE-2021-25216: the SPNEGO implementation used by BIND is prone to a buffer overflow vulnerability. This update switches to use the SPNEGO implementation from the Kerberos libraries
Vulnerable: <= 9.11.5.P4+dfsg-5.1+deb10u4Fixed: 9.11.5.P4+dfsg-5.1+deb10u5 | 4.0.0-4.3.1 | | +| [2644053](#2644053)
| The following vulnerabilities have been announced in BIND:CVE-2021-25214: a malformed incoming IXFR transfer could trigger an assertion failure in named, resulting in denial of service
CVE-2021-25215: named could crash when a DNAME record placed in the ANSWER section during DNAME chasing turned out to be the final answer to a client query
CVE-2021-25216: the SPNEGO implementation used by BIND is prone to a buffer overflow vulnerability. This update switches to use the SPNEGO implementation from the Kerberos libraries
Vulnerable: <= 9.11.5.P4+dfsg-5.1+deb10u4Fixed: 9.11.5.P4+dfsg-5.1+deb10u5 | 4.0.0-4.3.2 | | | [2643822](#2643822)
None | On a Mellanox Spectrum-2 switch, after running the systemctl restart networking service command on the MLAG primary switch, the secondary switch also closes its ports. To work around this issue, run the ifreload -a command to restart networking. | 4.2.1-4.3.0 | | | [2638106](#2638106)
None | The NCLU net show route vrf summary and vtysh show [ip\|ipv6] route vrf summary commands do not return any output. | 4.3.0 | | | [2637554](#2637554)
None | The cl-acltool takes a significant amount of time to run, which can slow down automation scripts. | 4.2.0-4.3.0 | | | [2633061](#2633061)
| The following vulnerability affects the libgstreamer-plugins-base1.0-0 package. There is no CVE yet; the Debian advisory number is DSA-4903-1
Multiple vulnerabilities were discovered in plugins for the GStreamer media framework, which may result in denial of service or potentially the execution of arbitrary code if a malformed media file is opened
Vulnerable: 1.14.4-2Fixed: 1.14.4-2+deb10u1 | 4.0.0-4.3.0 | | -| [2632379](#2632379)
| When you upgrade the switch with apt-get upgrade, the kexec-tools package is not installed, which causes the Smart System Manager fast restart mode to work incorrectly. | 4.3.0-4.3.1 | | +| [2632379](#2632379)
| When you upgrade the switch with apt-get upgrade, the kexec-tools package is not installed, which causes the Smart System Manager fast restart mode to work incorrectly. | 4.3.0-4.3.2 | | | [2628693](#2628693)
| After an apt upgrade, the OPTIONS configuration line in /etc/default/isc-dhcp-relay might be removed. To work around this issue, reconfigure the desired options in the file after the upgrade completes. | 3.7.12-3.7.15, 4.2.1-4.3.0 | | | [2628588](#2628588)
| After rebooting a switch with PFC configurations, non-PFC enabled ports might not send or receive traffic correctly. | | | -| [2628513](#2628513)
| CVE-2020-12695: hostapd does not properly handle UPnP subscribe messages under certain conditions, allowing an attacker to cause a denial of service
Vulnerable: <= 2.8.0-cl3.7.15u2Fixed: 2.8.0-cl3.7.15u3 | 3.7.14-3.7.14.2, 4.3.0-4.3.1 | | -| [2617000](#2617000)
| CVE-2021-26933 CVE-2021-27379Multiple vulnerabilities have been discovered in the Xen hypervisor, which could result in denial of service, privilege escalation or memory disclosure
Vulnerable: < 4.11.4+99-g8bce4698f6-1Fixed: 4.11.4+99-g8bce4698f6-1 | 4.0.0-4.3.1 | | -| [2616998](#2616998)
| CVE-2021-23358: missing input sanitising in the template() function of the Underscore JavaScript library could result in the execution of arbitrary code
Vulnerable: 1.9.1~dfsg-1Fixed: 1.9.1~dfsg-1+deb10u1 | 4.0.0-4.3.1 | | -| [2616987](#2616987)
| CVE-2020-6851 CVE-2020-8112 CVE-2020-15389 CVE-2020-27814 CVE-2020-27823 CVE-2020-27824 CVE-2020-27841 CVE-2020-27842 CVE-2020-27843 CVE-2020-27845: Multiple vulnerabilities have been discovered in openjpeg2, the open-source JPEG 2000 codec, which could result in denial of service or the execution of arbitrary code when opening a malformed image
Vulnerable: <= 2.3.0-2+deb10u1Fixed: 2.3.0-2+deb10u2 | 4.0.0-4.3.1 | | -| [2616976](#2616976)
| Multiple vulnerabilities were discovered in cURL, an URL transfer library:CVE-2020-8169: partial password leak to DNS servers
CVE-2020-8177: malicious server could cause curl -J -i to overwrite a local file
CVE-2020-8231: libcurl with CURLOPT_CONNECT_ONLY information leak due to wrong connection
CVE-2020-8284: PASV response could trick curl into connecting back to an arbitrary IP address and port
CVE-2020-8285: libcurl could run out of stack space using FTP wildcard matching (CURLOPT_CHUNK_BGN_FUNCTION)
CVE-2020-8286: failure to verify that OSCP response matches intended certificate
CVE-2021-22876: libcurl did not strip user credentials from URL when populating Referer HTTP request header
CVE-2021-22890: libcurl using HTTPS proxy with TLS1.3 could use the wrong session ticket and bypass server TLS certificate check
Vulnerable: <= 7.64.0-4+deb10u1Fixed: 7.64.0-4+deb10u2 | 4.0.0-4.3.1 | | -| [2616967](#2616967)
| CVE-2021-28957: lxml, a Python binding for the libxml2 and libxslt libraries, did not properly sanitize its input. This would allow a malicious user to mount a cross-site scripting attack
Vulnerable: <= 4.3.2-1+deb10u2Fixed: 4.3.2-1+deb10u3 | 4.0.0-4.3.1 | | -| [2616964](#2616964)
| CVE-2021-27291: Pygments, a syntax highlighting package written in Python 3, used regular expressions which could result in denial of service
Vulnerable: <= 2.3.1+dfsg-1+deb10u1Fixed: 2.3.1+dfsg-1+deb10u2 | 4.0.0-4.3.1 | | -| [2616954](#2616954)
| CVE-2021-3449: A NULL pointer dereference was found in the signature_algorithms processing in OpenSSL, a Secure Sockets Layer toolkit, which could result in denial of service
Vulnerable: <= 1.1.1d-0+deb10u5Fixed: 1.1.1d-0+deb10u6 | 4.0.0-4.3.1 | | -| [2614016](#2614016)
| The switch firmware incorrectly identifies Lenovo LR4 transceivers (part number 00YD278) and does not set the laser levels properly, which can prevent the link from coming up or might cause the transceiver to be identified as a 1G module. | 4.2.0-4.3.1 | | -| [2582639](#2582639)
| On NVIDIA Spectrum switches, BUM traffic might be dropped during VXLAN decapsulation in an EVPN multihoming environment after multiple PIM uplink interfaces flap. | 4.3.0-4.3.1 | | -| [2578872](#2578872)
| CVE-2021-20270: It was discovered that Pygments, a syntax highlighting package written in Python, could be forced into an infinite loop, resulting in denial of service
Vulnerable: 2.3.1+dfsg-1Fixed: 2.3.1+dfsg-1+deb10u1 | 4.0.0-4.3.1 | | -| [2578870](#2578870)
| CVE-2020-35523 CVE-2020-35524: Two vulnerabilities have been discovered in the libtiff library and the included tools, which may result in denial of service or the execution of arbitrary code if malformed image files are processed
Vulnerable: <= 4.1.0+git191117-2~deb10u1Fixed: 4.1.0+git191117-2~deb10u2 | 4.0.0-4.3.1 | | +| [2628513](#2628513)
| CVE-2020-12695: hostapd does not properly handle UPnP subscribe messages under certain conditions, allowing an attacker to cause a denial of service
Vulnerable: <= 2.8.0-cl3.7.15u2Fixed: 2.8.0-cl3.7.15u3 | 3.7.14-3.7.14.2, 4.3.0-4.3.2 | | +| [2617000](#2617000)
| CVE-2021-26933 CVE-2021-27379Multiple vulnerabilities have been discovered in the Xen hypervisor, which could result in denial of service, privilege escalation or memory disclosure
Vulnerable: < 4.11.4+99-g8bce4698f6-1Fixed: 4.11.4+99-g8bce4698f6-1 | 4.0.0-4.3.2 | | +| [2616998](#2616998)
| CVE-2021-23358: missing input sanitising in the template() function of the Underscore JavaScript library could result in the execution of arbitrary code
Vulnerable: 1.9.1~dfsg-1Fixed: 1.9.1~dfsg-1+deb10u1 | 4.0.0-4.3.2 | | +| [2616987](#2616987)
| CVE-2020-6851 CVE-2020-8112 CVE-2020-15389 CVE-2020-27814 CVE-2020-27823 CVE-2020-27824 CVE-2020-27841 CVE-2020-27842 CVE-2020-27843 CVE-2020-27845: Multiple vulnerabilities have been discovered in openjpeg2, the open-source JPEG 2000 codec, which could result in denial of service or the execution of arbitrary code when opening a malformed image
Vulnerable: <= 2.3.0-2+deb10u1Fixed: 2.3.0-2+deb10u2 | 4.0.0-4.3.2 | | +| [2616976](#2616976)
| Multiple vulnerabilities were discovered in cURL, an URL transfer library:CVE-2020-8169: partial password leak to DNS servers
CVE-2020-8177: malicious server could cause curl -J -i to overwrite a local file
CVE-2020-8231: libcurl with CURLOPT_CONNECT_ONLY information leak due to wrong connection
CVE-2020-8284: PASV response could trick curl into connecting back to an arbitrary IP address and port
CVE-2020-8285: libcurl could run out of stack space using FTP wildcard matching (CURLOPT_CHUNK_BGN_FUNCTION)
CVE-2020-8286: failure to verify that OSCP response matches intended certificate
CVE-2021-22876: libcurl did not strip user credentials from URL when populating Referer HTTP request header
CVE-2021-22890: libcurl using HTTPS proxy with TLS1.3 could use the wrong session ticket and bypass server TLS certificate check
Vulnerable: <= 7.64.0-4+deb10u1Fixed: 7.64.0-4+deb10u2 | 4.0.0-4.3.2 | | +| [2616967](#2616967)
| CVE-2021-28957: lxml, a Python binding for the libxml2 and libxslt libraries, did not properly sanitize its input. This would allow a malicious user to mount a cross-site scripting attack
Vulnerable: <= 4.3.2-1+deb10u2Fixed: 4.3.2-1+deb10u3 | 4.0.0-4.3.2 | | +| [2616964](#2616964)
| CVE-2021-27291: Pygments, a syntax highlighting package written in Python 3, used regular expressions which could result in denial of service
Vulnerable: <= 2.3.1+dfsg-1+deb10u1Fixed: 2.3.1+dfsg-1+deb10u2 | 4.0.0-4.3.2 | | +| [2616954](#2616954)
| CVE-2021-3449: A NULL pointer dereference was found in the signature_algorithms processing in OpenSSL, a Secure Sockets Layer toolkit, which could result in denial of service
Vulnerable: <= 1.1.1d-0+deb10u5Fixed: 1.1.1d-0+deb10u6 | 4.0.0-4.3.2 | | +| [2614016](#2614016)
| The switch firmware incorrectly identifies Lenovo LR4 transceivers (part number 00YD278) and does not set the laser levels properly, which can prevent the link from coming up or might cause the transceiver to be identified as a 1G module. | 4.2.0-4.3.2 | | +| [2582639](#2582639)
| On NVIDIA Spectrum switches, BUM traffic might be dropped during VXLAN decapsulation in an EVPN multihoming environment after multiple PIM uplink interfaces flap. | 4.3.0-4.3.2 | | +| [2578872](#2578872)
| CVE-2021-20270: It was discovered that Pygments, a syntax highlighting package written in Python, could be forced into an infinite loop, resulting in denial of service
Vulnerable: 2.3.1+dfsg-1Fixed: 2.3.1+dfsg-1+deb10u1 | 4.0.0-4.3.2 | | +| [2578870](#2578870)
| CVE-2020-35523 CVE-2020-35524: Two vulnerabilities have been discovered in the libtiff library and the included tools, which may result in denial of service or the execution of arbitrary code if malformed image files are processed
Vulnerable: <= 4.1.0+git191117-2~deb10u1Fixed: 4.1.0+git191117-2~deb10u2 | 4.0.0-4.3.2 | | | [2578845](#2578845)
CM-30832 | The Mellanox SN2700 and SN2410 switch intermittently reports PSU fan state changes with Unable to read from device/fan1_input/pwm1 syslog messages. | 3.7.11-3.7.14, 4.1.1-4.3.0 | | -| [2577499](#2577499)
| QSFP+ 40G optics do not work on Spectrum platforms. | 4.3.0-4.3.1 | | -| [2566878](#2566878)
| CVE-2021-27803: A vulnerability was discovered in how p2p/p2p_pd.c in wpa_supplicant before 2.10 processes P2P (Wi-Fi Direct) provision discovery requests. It could result in denial of service or other impact (potentially execution of arbitrary code), for an attacker within radio range. | 3.7.14-3.7.14.2, 4.0.0-4.3.1 | | -| [2564534](#2564534)
| Several vulnerabilities have been discovered in the GRUB2 bootloader
CVE-2020-14372: It was discovered that the acpi command allows a privileged user to load crafted ACPI tables when Secure Boot is enabled
CVE-2020-25632: A use-after-free vulnerability was found in the rmmod command
CVE-2020-25647: An out-of-bound write vulnerability was found in the grub_usb_device_initialize() function, which is called to handle USB device initialization
CVE-2020-27749: A stack buffer overflow flaw was found in grub_parser_split_cmdline
CVE-2020-27779: It was discovered that the cutmem command allows a privileged user to remove memory regions when Secure Boot is enabled
CVE-2021-20225: A heap out-of-bounds write vulnerability was found in the short form option parser
CVE-2021-2023: A heap out-of-bound write flaw was found caused by mis-calculation of space required for quoting in the menu rendering. | 4.0.0-4.3.1 | | +| [2577499](#2577499)
| QSFP+ 40G optics do not work on Spectrum platforms. | 4.3.0-4.3.2 | | +| [2566878](#2566878)
| CVE-2021-27803: A vulnerability was discovered in how p2p/p2p_pd.c in wpa_supplicant before 2.10 processes P2P (Wi-Fi Direct) provision discovery requests. It could result in denial of service or other impact (potentially execution of arbitrary code), for an attacker within radio range. | 3.7.14-3.7.14.2, 4.0.0-4.3.2 | | +| [2564534](#2564534)
| Several vulnerabilities have been discovered in the GRUB2 bootloader
CVE-2020-14372: It was discovered that the acpi command allows a privileged user to load crafted ACPI tables when Secure Boot is enabled
CVE-2020-25632: A use-after-free vulnerability was found in the rmmod command
CVE-2020-25647: An out-of-bound write vulnerability was found in the grub_usb_device_initialize() function, which is called to handle USB device initialization
CVE-2020-27749: A stack buffer overflow flaw was found in grub_parser_split_cmdline
CVE-2020-27779: It was discovered that the cutmem command allows a privileged user to remove memory regions when Secure Boot is enabled
CVE-2021-20225: A heap out-of-bounds write vulnerability was found in the short form option parser
CVE-2021-2023: A heap out-of-bound write flaw was found caused by mis-calculation of space required for quoting in the menu rendering. | 4.0.0-4.3.2 | | | [2556814](#2556814)
CM-33419 | When ARP suppression is enabled, RARP packets sometimes get dropped and are not flooded by the local VTEP.
To work around this issue, disable ARP suppression. | 3.7.14-3.7.14.2, 4.3.0 | | -| [2556781](#2556781)
CM-33398 | CVE-2021-0326: An issue has been found in wpa, a set of tools to support WPA and WPA2 (IEEE 802.11i). Missing validation of data can result in a buffer over-write, which might lead to a DoS of the wpa_supplicant process or potentially arbitrary code execution.
Vulnerable: <= 2.8.0-cl3.7.14u1, <= 2.8.0-cl4.2.1u1 | 3.7.14-3.7.14.2, 4.0.0-4.3.1 | | -| [2556777](#2556777)
CM-33395 | CVE-2021-26937: A flaw in the handling of combining characters in screen, a terminal multiplexer with VT100/ANSI terminal emulation can result in denial of service, or potentially the execution of arbitrary code via a specially crafted UTF-8 character sequence.
Vulnerable: 4.6.2-3
Fixed: 4.6.2-3+deb10u1 | 4.0.0-4.3.1 | | +| [2556781](#2556781)
CM-33398 | CVE-2021-0326: An issue has been found in wpa, a set of tools to support WPA and WPA2 (IEEE 802.11i). Missing validation of data can result in a buffer over-write, which might lead to a DoS of the wpa_supplicant process or potentially arbitrary code execution.
Vulnerable: <= 2.8.0-cl3.7.14u1, <= 2.8.0-cl4.2.1u1 | 3.7.14-3.7.14.2, 4.0.0-4.3.2 | | +| [2556777](#2556777)
CM-33395 | CVE-2021-26937: A flaw in the handling of combining characters in screen, a terminal multiplexer with VT100/ANSI terminal emulation can result in denial of service, or potentially the execution of arbitrary code via a specially crafted UTF-8 character sequence.
Vulnerable: 4.6.2-3
Fixed: 4.6.2-3+deb10u1 | 4.0.0-4.3.2 | | | [2556774](#2556774)
CM-33393 | DSA-4859-1 (no CVE): zstd, a compression utility, was vulnerable to a race condition: it temporarily exposed, during a very short timeframe, a world-readable version of its input even if the original file had restrictive permissions.
Vulnerable: <= 1.3.8+dfsg-3+deb10u1
Fixed: 1.3.8+dfsg-3+deb10u2 | 4.0.0-4.3.0 | | | [2556762](#2556762)
CM-33385 | In a configuration with both traditional and vlan-aware bridges, the VLAN membership check on a vlan-aware switch does not drop PVST BPBUs that come from a traditional bridge. | 3.7.14-3.7.14.2, 4.0.0-4.3.0 | | -| [2556730](#2556730)
CM-33359 | CVE-2020-8625: A buffer overflow vulnerability was discovered in the SPNEGO implementation affecting the GSSAPI security policy negotiation in BIND, a DNS server implementation, which could result in denial of service (daemon crash), or potentially the execution of arbitrary code.
Vulnerable: <= 9.11.5.P4+dfsg-5.1+deb10u2
Fixed: 9.11.5.P4+dfsg-5.1+deb10u3 | 4.0.0-4.3.1 | | +| [2556730](#2556730)
CM-33359 | CVE-2020-8625: A buffer overflow vulnerability was discovered in the SPNEGO implementation affecting the GSSAPI security policy negotiation in BIND, a DNS server implementation, which could result in denial of service (daemon crash), or potentially the execution of arbitrary code.
Vulnerable: <= 9.11.5.P4+dfsg-5.1+deb10u2
Fixed: 9.11.5.P4+dfsg-5.1+deb10u3 | 4.0.0-4.3.2 | | | [2556690](#2556690)
CM-33334 | The following vulnerabilities have been announced in the openssl packages:
CVE-2021-23840: Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash.
CVE-2021-23841: The OpenSSL public API function X509_issuer_and_serial_hash() attempts to create a unique hash value based on the issuer and serial number data contained
within an X509 certificate. However it fails to correctly handle any errors that may occur while parsing the issuer field (which might occur if the issuer field is maliciously constructed). This may subsequently result in a NULL pointer deref and a crash leading to a potential denial of service attack.
CVE-2019-1551: There is an overflow bug in the x64_64 Montgomery squaring procedure used in exponentiation with 512-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against 2-prime RSA1024, 3-prime RSA1536, and DSA1024 as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH512 are considered just feasible. However, for an attack the target would have to re-use the DH512 private key, which is not recommended anyway. Also applications directly using the low level API BN_mod_exp may be affected if they use BN_FLG_CONSTTIME.
Vulnerable: <= 1.1.1d-0+deb10u4
Fixed: 1.1.1d-0+deb10u5 | 4.0.0-4.3.0 | | -| [2556658](#2556658)
CM-33315 | CVE-2020-35498: A vulnerability was found in openvswitch. A limitation in the implementation of userspace packet parsing can allow a malicious user to send a specially crafted packet causing the resulting megaflow in the kernel to be too wide, potentially causing a denial of service. The highest threat from this vulnerability is to system availability
Vulnerable: <= 2.8.90-1-cl4u5Fixed: 2.8.90-1-cl4u6, 2.8.90-1-cl4.4.0u1, 2.8.90-1-cl5.0.0u8 | 4.0.0-4.3.1 | | +| [2556658](#2556658)
CM-33315 | CVE-2020-35498: A vulnerability was found in openvswitch. A limitation in the implementation of userspace packet parsing can allow a malicious user to send a specially crafted packet causing the resulting megaflow in the kernel to be too wide, potentially causing a denial of service. The highest threat from this vulnerability is to system availability
Vulnerable: <= 2.8.90-1-cl4u5Fixed: 2.8.90-1-cl4u6, 2.8.90-1-cl4.4.0u1, 2.8.90-1-cl5.0.0u8 | 4.0.0-4.3.2 | | | [2556568](#2556568)
CM-33283 | DSA-4850-1 (no CVE): libzstd adds read permissions to files while being compressed or uncompressed.
Vulnerable: 1.3.8+dfsg-3
Fixed: 1.3.8+dfsg-3+deb10u1 | 4.0.0-4.3.0 | | | [2556499](#2556499)
CM-33258 | Cumulus Linux does not support bond members at 200G or greater. | 4.0.0-4.3.0 | | | [2554797](#2554797)
CM-32286 | On the Mellanox SN3700C switch, PIM multicast packets are duplicated at the egress VTEP. | 4.2.0-4.3.0 | | -| [2554299](#2554299)
CM-31962 | In a VRRP configuration, BGP unnumbered sessions for VRFs fail to establish after a networking restart. | 4.2.0-4.3.1 | | -| [2550704](#2550704)
| On the Mellanox SN3420 switch, 25G SR optics only link up in force mode. | 4.3.0-4.3.1 | | -| [2549371](#2549371)
CM-29309 | When Optimized Multicast Flooding (OMF) is enabled with the bridge.optimized_mcast_flood = TRUE setting in the /etc/cumulus/switchd.conf file, the switch continues to flood IPv6 multicast traffic to all slave ports when there is no MLD join receive. | 3.7.11-4.3.1 | | -| [2545239](#2545239)
CM-27099 | On the Mellanox switch with the Spectrum-2 ASIC, Precision Time Protocol (PTP) is not currently supported. | 4.0.0-4.3.1 | | +| [2554299](#2554299)
CM-31962 | In a VRRP configuration, BGP unnumbered sessions for VRFs fail to establish after a networking restart. | 4.2.0-4.3.2 | | +| [2550704](#2550704)
| On the Mellanox SN3420 switch, 25G SR optics only link up in force mode. | 4.3.0-4.3.2 | | +| [2549371](#2549371)
CM-29309 | When Optimized Multicast Flooding (OMF) is enabled with the bridge.optimized_mcast_flood = TRUE setting in the /etc/cumulus/switchd.conf file, the switch continues to flood IPv6 multicast traffic to all slave ports when there is no MLD join receive. | 3.7.11-4.3.2 | | +| [2545239](#2545239)
CM-27099 | On the Mellanox switch with the Spectrum-2 ASIC, Precision Time Protocol (PTP) is not currently supported. | 4.0.0-4.3.2 | | diff --git a/content/cumulus-linux-44/rn.xml b/content/cumulus-linux-44/rn.xml index 372d1f0988..789a667378 100644 --- a/content/cumulus-linux-44/rn.xml +++ b/content/cumulus-linux-44/rn.xml @@ -7,22 +7,14 @@
- - - - - - - - + + @@ -33,149 +25,34 @@ For Cumulus Linux 4.3.2, the /usr/bin/ssh-agent program has all permissions turn - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + @@ -241,12 +118,6 @@ ip route 128.0.0.0/1 10.1.1.1 - - - - - - @@ -266,43 +137,16 @@ To work around this issue, set the VNI interface mapped to VLAN 1 down and up ag - - - - - - - - - - - - - - - - - - - + @@ -311,30 +155,12 @@ ValueError: invalid literal for int() with base 10: ‘0t - - - - - - - - - - - - - - - - - - @@ -410,8 +236,8 @@ Packet size is larger than router interface MTU – Validate the router interfac - - + + @@ -879,6 +705,12 @@ To work around this issue, do not disable EVPN Advertise Primary IP Address, whi + + + + + + @@ -1178,12 +1010,6 @@ This error has no functional impact. - - - - - - @@ -2282,22 +2108,14 @@ To work around this issue, change the value of {{arp_ignore}} to 2. See [Address - - - - - - - - + + @@ -2308,149 +2126,34 @@ For Cumulus Linux 4.3.2, the /usr/bin/ssh-agent program has all permissions turn - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + @@ -2516,12 +2219,6 @@ ip route 128.0.0.0/1 10.1.1.1 - - - - - - @@ -2535,55 +2232,16 @@ To work around this issue, set the VNI interface mapped to VLAN 1 down and up ag - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + @@ -2592,12 +2250,6 @@ ValueError: invalid literal for int() with base 10: ‘0t - - - - - - @@ -2679,8 +2331,8 @@ Packet size is larger than router interface MTU – Validate the router interfac - - + + @@ -3148,6 +2800,12 @@ To work around this issue, do not disable EVPN Advertise Primary IP Address, whi + + + + + + @@ -3447,12 +3105,6 @@ This error has no functional impact. - - - - - - @@ -4686,22 +4338,14 @@ To work around this issue, restart {{switchd}} with the {{sudo systemctl restart - - - - - - - - + + @@ -4712,143 +4356,28 @@ For Cumulus Linux 4.3.2, the /usr/bin/ssh-agent program has all permissions turn - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + @@ -4920,12 +4449,6 @@ ip route 128.0.0.0/1 10.1.1.1 - - - - - - @@ -4939,61 +4462,16 @@ To work around this issue, set the VNI interface mapped to VLAN 1 down and up ag - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + @@ -5065,8 +4543,8 @@ Packet size is larger than router interface MTU – Validate the router interfac - - + + @@ -5613,6 +5091,12 @@ To work around this issue, do not disable EVPN Advertise Primary IP Address, whi + + + + + + @@ -5912,12 +5396,6 @@ This error has no functional impact. - - - - - - @@ -7054,22 +6532,14 @@ Fixed: 9.27~dfsg-2+deb10u5 - - - - - - - - + + @@ -7080,143 +6550,28 @@ For Cumulus Linux 4.3.2, the /usr/bin/ssh-agent program has all permissions turn - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + @@ -7288,73 +6643,22 @@ ip route 128.0.0.0/1 10.1.1.1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + @@ -7414,8 +6718,8 @@ Packet size is larger than router interface MTU – Validate the router interfac - - + + @@ -7971,6 +7275,12 @@ To work around this issue, do not disable EVPN Advertise Primary IP Address, whi + + + + + + @@ -8270,12 +7580,6 @@ This error has no functional impact. - - - - - - @@ -9604,22 +8908,14 @@ The minimum supported size of the reserved VLAN range in the {{/etc/cumulus/swit - - - - - - - - + + @@ -9630,143 +8926,28 @@ For Cumulus Linux 4.3.2, the /usr/bin/ssh-agent program has all permissions turn - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + @@ -9817,67 +8998,16 @@ ip route 128.0.0.0/1 10.1.1.1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + @@ -9928,8 +9058,8 @@ To work around this issue, change the TCAM profile to {{acl-heavy}} or {{ip-acl- - - + + @@ -10523,6 +9653,12 @@ This affects failed neighbor entries on routed interfaces that are not SVIs.4.4.2-4.4.5 + + + + + + @@ -10926,12 +10062,6 @@ This error has no functional impact. - - - - - - @@ -12022,7 +11152,7 @@ To work around this issue, change the value of {{arp_ignore}} to 2. See [Address thermal thermal_zoneX: critical temperature reached (33 C), shutting down - + @@ -12041,14 +11171,14 @@ Fixed: 2.4.47+dfsg-3+deb10u5 - + - + @@ -12063,14 +11193,14 @@ sx_sdk: LAG: Can't add port (0x00012400) to lag. Port has vports configured for switchd[4529]: hal_mlx_bond.c:582 ERR bond32 member swp32 add failed: Parameter Error To work around this issue, restart {{switchd}}. - + - + @@ -12082,20 +11212,20 @@ Fixed: 0.6.1-2+deb10u1 - + - + - + @@ -12113,44 +11243,44 @@ Fixed: 4.3.1-6-cl3.7.16u1 result in denial of service and potentially the execution of arbitrary code. Vulnerable: <= 1.14.2-2+deb10u3 Fixed: 1.14.2-2+deb10u4 - + - + - + - + - + - + - + @@ -12170,7 +11300,7 @@ CVE-2021-25215: named could crash when a DNAME record placed in the ANSWER secti CVE-2021-25216: the SPNEGO implementation used by BIND is prone to a buffer overflow vulnerability. This update switches to use the SPNEGO implementation from the Kerberos libraries. Vulnerable: <= 9.11.5.P4+dfsg-5.1+deb10u4 Fixed: 9.11.5.P4+dfsg-5.1+deb10u5 - + @@ -12198,7 +11328,7 @@ Fixed: 1.14.4-2+deb10u1 - + @@ -12215,7 +11345,7 @@ Fixed: 1.14.4-2+deb10u1 - + @@ -12223,21 +11353,21 @@ Fixed: 2.8.0-cl3.7.15u3 Multiple vulnerabilities have been discovered in the Xen hypervisor, which could result in denial of service, privilege escalation or memory disclosure. Vulnerable: < 4.11.4+99-g8bce4698f6-1 Fixed: 4.11.4+99-g8bce4698f6-1 - + - + - + @@ -12252,52 +11382,52 @@ CVE-2021-22876: libcurl did not strip user credentials from URL when populating CVE-2021-22890: libcurl using HTTPS proxy with TLS1.3 could use the wrong session ticket and bypass server TLS certificate check. Vulnerable: <= 7.64.0-4+deb10u1 Fixed: 7.64.0-4+deb10u2 - + - + - + - + - + - + - + - + @@ -12307,12 +11437,12 @@ Fixed: 4.1.0+git191117-2~deb10u2 - + - + @@ -12324,7 +11454,7 @@ CVE-2020-27749: A stack buffer overflow flaw was found in grub_parser_split_cmdl CVE-2020-27779: It was discovered that the cutmem command allows a privileged user to remove memory regions when Secure Boot is enabled. CVE-2021-20225: A heap out-of-bounds write vulnerability was found in the short form option parser. CVE-2021-2023: A heap out-of-bound write flaw was found caused by mis-calculation of space required for quoting in the menu rendering. - + @@ -12336,14 +11466,14 @@ To work around this issue, disable ARP suppression. - + - + @@ -12362,7 +11492,7 @@ Fixed: 1.3.8+dfsg-3+deb10u2 - + @@ -12380,7 +11510,7 @@ Fixed: 1.1.1d-0+deb10u5 - + @@ -12402,22 +11532,22 @@ Fixed: 1.3.8+dfsg-3+deb10u1 - + - + - + - +
Issue ID CVE-2023-38408: The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009. Mitigation: Do not use ssh-agent forwarding (the man page for ssh_config says that "agent forwarding should be enabled with caution"), or start the ssh-agent program with the -P option to allow only specific PKCS#11 libraries (or none with -P ''). For Cumulus Linux 4.3.2, the /usr/bin/ssh-agent program has all permissions turned off (chmod 0) to prevent its execution if a vulnerable version is detected.4.0.0-4.4.5, 5.0.0-5.6.04.0.0-4.3.1, 5.0.0-5.6.04.3.2-4.4.5
3647424
3534654On a Broadcom switch, Q-in-Q VLAN operations do not clear when you remove a bridge port from a VXLAN-enabled bridge. This can result in unexpected double tagged packets if the outer VLAN is still used on the bridge. To work around this issue, restart {{switchd}} after you modify or remove double tagged bridge ports from a VXLAN-enabled bridge.3600912In an MLAG EVPN configuration, if host mobility occurs multiple times at high frequency, the host MAC might point to an incorrect VTEP; it might be local behind the VTEP. 4.3.1-4.4.5
3534654On a Broadcom switch, Q-in-Q VLAN operations do not clear when you remove a bridge port from a VXLAN-enabled bridge. This can result in unexpected double tagged packets if the outer VLAN is still used on the bridge. To work around this issue, restart {{switchd}} after you modify or remove double tagged bridge ports from a VXLAN-enabled bridge.4.3.14.3.2-4.4.5
3488136 When zebra receives route updates that include both a route with a recursive next hop and the route used to resolve that next hop, zebra might mark the route with the recursive next hop as inactive. To work around this issue, reprocess the route updates by running the appropriate clear command for the protocol in use. For example, for BGP, clear inbound routes from the relevant neighbor using the {{nv action clear vrf <vrf> router bgp neighbor <neighbor> address-family <address-family> in}} command. 4.2.1-5.5.1
3486888 If FRR learns a layer 2 entry against a VNI and you reconfigure the VNI later as a layer 3 VNI, the original layer 2 entry does not clear and remains in the forwarding database.4.3.0-5.5.15.6.04.3.0-4.3.14.3.2-4.4.5, 5.6.0
3479967 When you remove VRF configuration, the {{systemctl reload frr.service}} command returns a non zero exit code after erroneously running the invalid command {{no exit-vrf}}.4.3.1-4.4.54.3.14.3.2-4.4.5
3474391
3455998 When you poll the BGP unnumbered MIB object 1.3.6.1.4.1.40310.4 after uncommenting the {{bgpun_pp.py}} pass persist script in the {{/etc/snmpd/snmpd.conf}} file, BGP session information is not retrieved. To work around this issue, add executable permissions to the script with the {{sudo chmod +x /usr/share/snmp/bgpun_pp.py}} command.4.3.1-4.4.54.3.14.3.2-4.4.5
34481714.3.1-4.4.54.3.14.3.2-4.4.5
3434315 IPv6 BGP sessions in a VRF do not be establish with MD5 authentication.4.3.0-4.4.54.3.0-4.3.14.3.2-4.4.5
34295304.3.1-4.4.54.3.14.3.2-4.4.5
3419953 If you remove a double tagged bridge port from a bridge when a different interface exists with the same port and virtual ID, you might see a segmentation fault and a {{switchd}} crash due to incorrect initialization when Cumulus Linux creates the second double-tagged interface. To work around this issue, make sure you remove the double-tagged interfaces from the bridge in the {{/etc/network/interfaces}} file.4.3.1-4.4.54.3.14.3.2-4.4.5
34109524.3.0-4.4.54.3.0-4.3.14.3.2-4.4.5
33767983.7.0-3.7.16, 4.3.1-4.4.53.7.0-4.3.14.3.2-4.4.5
3366612 The base version of the Linux kernel is updated to the v4.19.273 stable release, which includes fixes for several CVE issues.4.3.1-4.4.54.3.14.3.2-4.4.5
3364996 Under certain conditions, BGP can allow a combination of EVPN and non-EVPN paths to be put into a multipath group together. This results in erroneous programming of EVPN symmetric next hops and RMACs, which can result in momentary traffic drops.4.3.0-4.4.54.3.0-4.3.14.3.2-4.4.5
3336590
3334036 When you configure or unconfigure a BGP peer and interface towards a host, memory corruption can cause BGP to crash.4.3.0-5.3.15.4.0-5.6.04.3.0-4.3.14.3.2-4.4.5, 5.4.0-5.6.0
3334031 When you configure or unconfigure a BGP peer and interface towards a host, memory corruption can cause BGP to crash.4.3.0-4.4.54.3.0-4.3.14.3.2-4.4.5
3330705
3288385 On the EdgeCore AS7326-56X and AS7726-32X switch, the fan speed reports a minimum threshold in the logs.4.3.1-4.4.54.3.14.3.2-4.4.5
32883434.3.0-4.4.54.3.0-4.3.14.3.2-4.4.5
3267353 In a QinQ configuration, if the VLAN priority is a non-zero value, double-tagged packets are translated to triple-tagged packets. 4.3.1-4.4.54.3.14.3.2-4.4.5
3236349 Using ARP suppression with a very large number of interfaces might result in missing ARP entries on the local device or buffer underrun warnings in the {{neighmgrd}} log.4.3.0-4.4.54.3.0-4.3.14.3.2-4.4.5
3235956 With certain triggers on Broadcom switches, such as adding or deleting a VNI or reloading the network, Cumulus Linux might consider the underlay routes as overlay routes. In this case, {{switchd}} allocates the overlay next hop, which is incorrect and might affect traffic forwarding.4.3.0-4.4.54.3.0-4.3.14.3.2-4.4.5
3234031 If BGP {{neighbor <name> allowas-in}} is set, negating with no {{no neighbor <name> allowas-in}} does not disable the setting. To work around this issue and disable the setting, restart the FRR service.4.2.1-5.2.15.3.0-5.6.04.2.1-4.3.14.3.2-4.4.5, 5.3.0-5.6.0
3218207 CVE-2020-35498: A vulnerability was found in openvswitch. A limitation in the implementation of userspace packet parsing can allow a malicious user to send a specially crafted packet causing the resulting megaflow in the kernel to be too wide, potentially causing a denial of service. The highest threat from this vulnerability is to system availability. Vulnerable: <= 2.8.90-1-cl4u5 Fixed: 2.8.90-1-cl4u6, 2.8.90-1-cl4.4.0u1, 2.8.90-1-cl5.0.0u84.0.0-4.3.14.0.0-4.3.2 4.4.0-4.4.5, 5.1.0-5.6.0
4.3.0-4.3.14.3.0-4.3.2 4.4.0-4.4.5, 5.1.0-5.6.0
2771653When using W-ECMP, the weights for various BGP next hops can sometimes be in the range of 100s or more, which consumes a lot of hardware space.4.3.0-4.4.5
2754791 Remote MAC addreses in zebra are out of sync with {{bgpd}}. The zebra MAC addresses point to an incorrect (old) VTEP IP address and the sequence number is one higher than in BGP. 3.7.14.2-3.7.16, 4.3.0-4.4.5 CVE-2021-27212: A vulnerability in the Certificate List Exact Assertion validation was discovered in OpenLDAP, a free implementation of the Lightweight Directory Access Protocol. An unauthenticated remote attacker can take advantage of this flaw to cause a denial of service (slapd daemon crash) via specially crafted packets. Vulnerable: <= 2.4.47+dfsg-3+deb10u5 Fixed: 2.4.47+dfsg-3+deb10u64.0.0-4.3.14.0.0-4.3.2 4.4.0-4.4.5
CVE-2021-3580 CVE-2021-20305: Multiple vulnerabilities were discovered in nettle, a low level cryptographic library, which could result in denial of service (remote crash in RSA decryption via specially crafted ciphertext, crash on ECDSA signature verification) or incorrect verification of ECDSA signatures. Vulnerable: 3.4.1-1 Fixed: 3.4.1-1+deb10u14.0.0-4.3.14.0.0-4.3.2 4.4.0-4.4.5
4.3.0-4.3.14.3.0-4.3.2 4.4.0-4.4.5
CVE-2018-25009 CVE-2018-25010 CVE-2018-25011 CVE-2018-25012 CVE-2018-25013 CVE-2018-25014 CVE-2020-36328 CVE-2020-36329 CVE-2020-36330 CVE-2020-36331 CVE-2020-36332: Multiple vulnerabilities were discovered in libwebp, the implementation of the WebP image format, which could result in denial of service, memory disclosure or potentially the execution of arbitrary code if malformed images are processed. Vulnerable: 0.6.1-2 Fixed: 0.6.1-2+deb10u14.0.0-4.3.14.0.0-4.3.2 4.4.0-4.4.5
CVE-2020-12762: integer overflow in the json-c JSON library, which could result in denial of service or potentially the execution of arbitrary code if large malformed JSON files are processed. Vulnerable: 0.12.2+cl4u1 Fixed: 0.12.2+cl4.4.0u14.0.0-4.3.14.0.0-4.3.2 4.4.0-4.4.5
2682780 Adding a route map configuration after a MAC access list configuration line causes the route map configuration to be applied incorrectly. To work around this issue, add the MAC access list configuration to the end of the {{/etc/frr/frr.conf}} file.4.2.0-4.3.14.2.0-4.3.2 4.4.0-4.4.5
CVE-2021-25217: parsing of stored leases by dhclient or dhcpd has an incorrect length check that may cause a crash. Vulnerable: <= 4.3.1-6-cl3.7.14u1 Fixed: 4.3.1-6-cl3.7.16u13.7.0-3.7.15, 4.0.0-4.3.13.7.0-3.7.15, 4.0.0-4.3.2 3.7.16, 4.4.0-4.4.5
4.0.0-4.3.14.0.0-4.3.2 4.4.0-4.4.5
2669873 In an EVPN multihoming configuration, ARP/ND traffic coming in one switch is being sent back out the originating bond on the other switches in the ES on remote PE switches. Normally Split Horizon filtering prevents this kind of traffic at the remote PE. 4.3.0-4.3.14.3.0-4.3.2 4.4.0-4.4.5
2669073 On Spectrum, Spectrum-2, and Spectrum-3 switches, the {{l1-show}} command shows the wrong data when the MST service is stopped. To work around this issue, start the MST service with the {{sudo mst start}} command.4.3.0-4.3.14.3.0-4.3.2 4.4.0-4.4.5
CVE-2021-31535: missing length validation in various functions provided by libx11, the X11 client-side library, allow to inject X11 protocol commands on X clients, leading to authentication bypass, denial of service or potentially the execution of arbitrary code. Vulnerable: <= 1.6.7-1+deb10u1 Fixed: 1.6.7-1+deb10u24.0.0-4.3.14.0.0-4.3.2 4.4.0-4.4.5
CVE-2021-3520: integer overflow flaw in lz4, a fast LZ compression algorithm library, resulting in memory corruption. Vulnerable: 1.8.3-1 Fixed: 1.8.3-1+deb10u14.0.0-4.3.14.0.0-4.3.2 4.4.0-4.4.5
CVE-2020-18032: A buffer overflow was discovered in Graphviz, which could potentially result in the execution of arbitrary code when processing a malformed file. Vulnerable: 2.40.1-6 Fixed: 2.40.1-6+deb10u14.0.0-4.3.14.0.0-4.3.2 4.4.0-4.4.5
2648658 If you try to use more than one percent of {{max-ecmp-nexthops}}, you get an error indicating a failure.3.7.15-4.3.13.7.15-4.3.2 4.4.0-4.4.5
4.0.0-4.3.14.0.0-4.3.2 4.4.0-4.4.5
2632379 When you upgrade the switch with {{apt-get upgrade}}, the {{kexec-tools}} package is not installed, which causes the Smart System Manager fast restart mode to work incorrectly.4.3.0-4.3.14.3.0-4.3.2 4.4.0-4.4.5
CVE-2020-12695: hostapd does not properly handle UPnP subscribe messages under certain conditions, allowing an attacker to cause a denial of service. Vulnerable: <= 2.8.0-cl3.7.15u2 Fixed: 2.8.0-cl3.7.15u33.7.14-3.7.14.2, 4.3.0-4.3.13.7.14-3.7.14.2, 4.3.0-4.3.2 3.7.15-3.7.16, 4.4.0-4.4.5
4.0.0-4.3.14.0.0-4.3.2 4.4.0-4.4.5
CVE-2021-23358: missing input sanitising in the template() function of the Underscore JavaScript library could result in the execution of arbitrary code. Vulnerable: 1.9.1~dfsg-1 Fixed: 1.9.1~dfsg-1+deb10u14.0.0-4.3.14.0.0-4.3.2 4.4.0-4.4.5
CVE-2020-6851 CVE-2020-8112 CVE-2020-15389 CVE-2020-27814 CVE-2020-27823 CVE-2020-27824 CVE-2020-27841 CVE-2020-27842 CVE-2020-27843 CVE-2020-27845: Multiple vulnerabilities have been discovered in openjpeg2, the open-source JPEG 2000 codec, which could result in denial of service or the execution of arbitrary code when opening a malformed image. Vulnerable: <= 2.3.0-2+deb10u1 Fixed: 2.3.0-2+deb10u24.0.0-4.3.14.0.0-4.3.2 4.4.0-4.4.5
4.0.0-4.3.14.0.0-4.3.2 4.4.0-4.4.5
CVE-2021-28957: lxml, a Python binding for the libxml2 and libxslt libraries, did not properly sanitize its input. This would allow a malicious user to mount a cross-site scripting attack. Vulnerable: <= 4.3.2-1+deb10u2 Fixed: 4.3.2-1+deb10u34.0.0-4.3.14.0.0-4.3.2 4.4.0-4.4.5
CVE-2021-27291: Pygments, a syntax highlighting package written in Python 3, used regular expressions which could result in denial of service. Vulnerable: <= 2.3.1+dfsg-1+deb10u1 Fixed: 2.3.1+dfsg-1+deb10u24.0.0-4.3.14.0.0-4.3.2 4.4.0-4.4.5
CVE-2021-3449: A NULL pointer dereference was found in the signature_algorithms processing in OpenSSL, a Secure Sockets Layer toolkit, which could result in denial of service. Vulnerable: <= 1.1.1d-0+deb10u5 Fixed: 1.1.1d-0+deb10u64.0.0-4.3.14.0.0-4.3.2 4.4.0-4.4.5
2614016 The switch firmware incorrectly identifies Lenovo LR4 transceivers (part number 00YD278) and does not set the laser levels properly, which can prevent the link from coming up or might cause the transceiver to be identified as a 1G module.4.2.0-4.3.14.2.0-4.3.2 4.4.0-4.4.5
2582639 On NVIDIA Spectrum switches, BUM traffic might be dropped during VXLAN decapsulation in an EVPN multihoming environment after multiple PIM uplink interfaces flap.4.3.0-4.3.14.3.0-4.3.2 4.4.0-4.4.5
CVE-2021-20270: It was discovered that Pygments, a syntax highlighting package written in Python, could be forced into an infinite loop, resulting in denial of service. Vulnerable: 2.3.1+dfsg-1 Fixed: 2.3.1+dfsg-1+deb10u14.0.0-4.3.14.0.0-4.3.2 4.4.0-4.4.5
CVE-2020-35523 CVE-2020-35524: Two vulnerabilities have been discovered in the libtiff library and the included tools, which may result in denial of service or the execution of arbitrary code if malformed image files are processed. Vulnerable: <= 4.1.0+git191117-2~deb10u1 Fixed: 4.1.0+git191117-2~deb10u24.0.0-4.3.14.0.0-4.3.2 4.4.0-4.4.5
2577499 QSFP+ 40G optics do not work on Spectrum platforms.4.3.0-4.3.14.3.0-4.3.2 4.4.0-4.4.5
2566880 CVE-2021-27803: A vulnerability was discovered in how p2p/p2p_pd.c in wpa_supplicant before 2.10 processes P2P (Wi-Fi Direct) provision discovery requests. It could result in denial of service or other impact (potentially execution of arbitrary code), for an attacker within radio range.3.7.14-3.7.14.2, 4.0.0-4.3.13.7.14-3.7.14.2, 4.0.0-4.3.2 3.7.15-3.7.16, 4.4.0-4.4.5
4.0.0-4.3.14.0.0-4.3.2 4.4.0-4.4.5
2556782 CVE-2021-0326: An issue has been found in wpa, a set of tools to support WPA and WPA2 (IEEE 802.11i). Missing validation of data can result in a buffer over-write, which might lead to a DoS of the wpa_supplicant process or potentially arbitrary code execution. Vulnerable: <= 2.8.0-cl3.7.14u1, <= 2.8.0-cl4.2.1u13.7.14-3.7.14.2, 4.0.0-4.3.13.7.14-3.7.14.2, 4.0.0-4.3.2 3.7.15-3.7.16, 4.4.0-4.4.5
CVE-2021-26937: A flaw in the handling of combining characters in screen, a terminal multiplexer with VT100/ANSI terminal emulation can result in denial of service, or potentially the execution of arbitrary code via a specially crafted UTF-8 character sequence. Vulnerable: 4.6.2-3 Fixed: 4.6.2-3+deb10u14.0.0-4.3.14.0.0-4.3.2 4.4.0-4.4.5
CVE-2020-8625: A buffer overflow vulnerability was discovered in the SPNEGO implementation affecting the GSSAPI security policy negotiation in BIND, a DNS server implementation, which could result in denial of service (daemon crash), or potentially the execution of arbitrary code. Vulnerable: <= 9.11.5.P4+dfsg-5.1+deb10u2 Fixed: 9.11.5.P4+dfsg-5.1+deb10u34.0.0-4.3.14.0.0-4.3.2 4.4.0-4.4.5
2555175Control Plane Traffic (example - BGP peering from Leaf to Spine) goes down on Leaf due to Hold Down Timer Expiration of peer following prolonged link flaps on downlinks when vxlan enabled vlans are carried on the flapping link.3.7.15-3.7.16, 4.2.1-4.4.5Control plane traffic (such as BGP peering from leaf to spine) goes down on the leaf due to the peer Hold Down timer expiration following prolonged link flaps on down links when VXLAN enabled VLANs are carried on the flapping link. Be sure to correct layer 1 issues, configuration issues, or misbehaving link partners that are causing the link flaps.3.7.15-4.3.14.3.2-4.4.5
2554986
2554299 In a VRRP configuration, BGP unnumbered sessions for VRFs fail to establish after a networking restart.4.2.0-4.3.14.2.0-4.3.2 4.4.0-4.4.5
2550704 On the Mellanox SN3420 switch, 25G SR optics only link up in force mode.4.3.0-4.3.14.3.0-4.3.2 4.4.0-4.4.5
2549371 When Optimized Multicast Flooding (OMF) is enabled with the {{bridge.optimized_mcast_flood = TRUE}} setting in the {{/etc/cumulus/switchd.conf}} file, the switch continues to flood IPv6 multicast traffic to all slave ports when there is no MLD join receive.3.7.11-4.3.13.7.11-4.3.2 4.4.0-4.4.5
2545239 On the Mellanox switch with the Spectrum-2 ASIC, Precision Time Protocol (PTP) is not currently supported. 4.0.0-4.3.14.0.0-4.3.2 4.4.0-4.4.5
Fixed
3647731CVE-2023-38408: The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009. -Mitigation: Do not use ssh-agent forwarding (the man page for ssh_config says that "agent forwarding should be enabled with caution"), or start the ssh-agent program with the -P option to allow only specific PKCS#11 libraries (or none with -P ''). -For Cumulus Linux 4.3.2, the /usr/bin/ssh-agent program has all permissions turned off (chmod 0) to prevent its execution if a vulnerable version is detected.4.0.0-4.4.5, 5.0.0-5.6.0
3647424 When you remove the {{update-source}} configuration for a BGP neighbor, the peering is reset if the neighbor is a member of a peer group with the same {{update-source}} configuration. 4.3.0-4.4.5
3534654On a Broadcom switch, Q-in-Q VLAN operations do not clear when you remove a bridge port from a VXLAN-enabled bridge. This can result in unexpected double tagged packets if the outer VLAN is still used on the bridge. To work around this issue, restart {{switchd}} after you modify or remove double tagged bridge ports from a VXLAN-enabled bridge.3600912In an MLAG EVPN configuration, if host mobility occurs multiple times at high frequency, the host MAC might point to an incorrect VTEP; it might be local behind the VTEP. 4.3.1-4.4.5
5.6.0
3486888If FRR learns a layer 2 entry against a VNI and you reconfigure the VNI later as a layer 3 VNI, the original layer 2 entry does not clear and remains in the forwarding database.4.3.0-5.5.15.6.0
3479967When you remove VRF configuration, the {{systemctl reload frr.service}} command returns a non zero exit code after erroneously running the invalid command {{no exit-vrf}}.4.3.1-4.4.5
3474391 The SNMP MIB definition file {{/usr/share/snmp/mibs/Cumulus-BGPVRF-MIB.txt}} does not define the INDEX of the {{bgpPeerEntry}} correctly. This issue does not impact SNMP functionality for this MIB. 4.3.1-5.5.1 5.6.0
3455998When you poll the BGP unnumbered MIB object 1.3.6.1.4.1.40310.4 after uncommenting the {{bgpun_pp.py}} pass persist script in the {{/etc/snmpd/snmpd.conf}} file, BGP session information is not retrieved. To work around this issue, add executable permissions to the script with the {{sudo chmod +x /usr/share/snmp/bgpun_pp.py}} command.4.3.1-4.4.5
3448171If a default route is withdrawn from the routing table and then learned again, traffic matching this entry will be software (cpu) forwarded.  This will cause intermittent drops due to the CPU the rate-limiter. - -This only impacts the default VRF and a default route learned dynamically. - -In order to recover from this condition:  - -1. Restart switchd.service (sudo systemctl restart switchd.service) - -OR -  -2. Reboot the switch (sudo reboot)4.3.1-4.4.5
3434315IPv6 BGP sessions in a VRF do not be establish with MD5 authentication.4.3.0-4.4.5
3429530 On the Spectrum-2 and Spectrum-3 switch, multiple interfaces (in the same PLL quarter) might flap intermittently at the same time. 4.2.1-5.4.0 5.5.0-5.6.0
3419962On a Broadcom switch, if you remove a double-tagged interface from a bridge that contains other double-tagged interfaces built on the same physical port (for example, you remove swp1.10.100 when swp1.10.200 is also a bridge port), traffic forwarding within the bridge might fail and you see critical warnings in the {{/var/log/switchd.log}} file similar to the following: - -switchd[8587]: hal_bcm.c:2207 CRIT knet_vlan_translate_delete(update): port 1 ext_vlan 10.100 int_vlan 2132: -11 -4.3.1-4.4.5
3419953If you remove a double tagged bridge port from a bridge when a different interface exists with the same port and virtual ID, you might see a segmentation fault and a {{switchd}} crash due to incorrect initialization when Cumulus Linux creates the second double-tagged interface. To work around this issue, make sure you remove the double-tagged interfaces from the bridge in the {{/etc/network/interfaces}} file.4.3.1-4.4.5
3418045If MLAG is configured but disconnected from an MLAG peer for an extended period of time (days or more), there is a long delay (up to a minute per day) before traffic forwarding stabilizes after the MLAG peer connection re-establishes.3.7.0-5.4.05.5.0-5.6.0
3401121sFlow is not able to sample packets in the egress direction. To work around this issue, add the following to the {{hsflowd.conf}} file to enable egress sampling: - -samplingDirection=out -psample { group=1 } -4.3.0-4.4.5
3387852 If you remove NGINX from the switch, then run {{apt autoremove}}, switchd does not reload because the {{libyaml-0-2}} and {{python-yaml }} packages are missing; these packages are required for {{switchd}} consistency checking. To work around this issue, reinstall the {{libyaml-0-2}} and {{python-yaml }}packages. 4.4.0-4.4.5
3376798On Broadcom switches, Cumulus Linux does not create the hardware bridging domain for a traditional bridge with a VXLAN interface during {{switchd}} restart. The {{/var/log/switchd.log}} file includes the following exception logs shortly after {{switchd}} restarts: - -switchd[30158]: hal_bcm_l3.c:1617 find_egr_path_if_vxlan_overlay:vxlan overlay : nh PORT: port <#>, vlan <x>.<y> not yet ready - -MAC learning looks correct, but traffic does not flow as expected.3.7.0-3.7.16, 4.3.1-4.4.5
3368217 When daylight saving time changes, the MLAG {{initDelay}} timer resets and all MLAG bonds go down. 4.4.4-4.4.5, 5.2.1-5.6.0
3366612The base version of the Linux kernel is updated to the v4.19.273 stable release, which includes fixes for several CVE issues.4.3.1-4.4.5
3364996Under certain conditions, BGP can allow a combination of EVPN and non-EVPN paths to be put into a multipath group together. This results in erroneous programming of EVPN symmetric next hops and RMACs, which can result in momentary traffic drops.4.3.0-4.4.5
3364717On the Trident 2+ and Trident 3 switch when using VXLAN layer 2 VPNs and sending tunneled traffic where the inner IP header has a TTL of 1, the egress VTEP incorrectly forwards this traffic through the software path instead of the hardware data plane. This traffic is rate-limited to 100pps by default. To work around this issue, ensure that the traffic traversing the layer 2 tunnel has an inner IP header TTL value that is more than 1. If this workaround is not possible, contact Nvidia Support to determine other options.4.3.0-4.4.5
3358865When you reboot a Broadcom switch with a static default route configured, the route might be installed in hardware without a next hop. This results in forwarded traffic to the CPU and drops. To recover from this issue, remove the default route configuration and reapply it. To prevent this issue, before rebooting the switch, split the default route configuration into two routes as below: - -ip route 0.0.0.0/1 10.1.1.1 -ip route 128.0.0.0/1 10.1.1.1 -4.3.1-4.4.5
3351951 Currently, the default core dump size limit on Cumulus Linux is 256M but the SDK generates core dumps around 800M. To avoid incomplete core files, you can increase the core dump size limit.4.2.1-5.3.15.4.0-5.6.0
3334031When you configure or unconfigure a BGP peer and interface towards a host, memory corruption can cause BGP to crash.4.3.0-4.4.54.2.1-4.3.1, 4.4.0-5.3.14.3.2, 5.4.0-5.6.0
33330645.0.0-5.6.0
3288385On the EdgeCore AS7326-56X and AS7726-32X switch, the fan speed reports a minimum threshold in the logs.4.3.1-4.4.5
3288156 When you configure a new VNI, the VLAN 1 VNI mapping is removed from the VXLAN device. To work around this issue, set the VNI interface mapped to VLAN 1 down and up again.5.2.1-5.6.0
3269538The {{cl-ecmpcalc}} command prints the following error when the egress interface is a bond or SVI: - -ecmpcalc: will query hardware -Traceback (most recent call last): -File “/usr/cumulus/bin/cl-ecmpcalc”, line 986, in -isTrunkMbr, port = ecmp.getHdPort(hd_cmd) -File “/usr/cumulus/bin/cl-ecmpcalc”, line 618, in getHdPort -port = int(str4) -ValueError: invalid literal for int() with base 10: ‘0t -4.3.0-4.4.5
3269537 When an FRR routing service (such as {{bgpd}}) becomes unresponsive, {{watchfrr}} might fail to stop and restart service. To work around this issue, restart FRR with the {{systemctl restart frr}} command. 4.4.0-5.3.1 5.4.0-5.6.0
3267353In a QinQ configuration, if the VLAN priority is a non-zero value, double-tagged packets are translated to triple-tagged packets. 4.3.1-4.4.5
3244740 If you have a lot of inbound route maps that match lists with many regex statements, a large number of updates from the peer can cause the system to run out of memory. To work around this issue, reduce the number of regex matches in inbound route maps. 4.4.0-5.2.15.3.0-5.6.0
3240406When you configure or unconfigure a BGP peer and interface towards a host, memory corruption can cause BGP to crash.4.3.0-5.3.15.4.0-5.6.04.3.2, 5.3.0-5.6.0
3236366
3236334Using ARP suppression with a very large number of interfaces might result in missing ARP entries on the local device or buffer underrun warnings in the {{neighmgrd}} log.4.3.0-4.4.5
3235956With certain triggers on Broadcom switches, such as adding or deleting a VNI or reloading the network, Cumulus Linux might consider the underlay routes as overlay routes. In this case, {{switchd}} allocates the overlay next hop, which is incorrect and might affect traffic forwarding.4.3.0-4.4.5
3235368 When you try to configure VRF route leaking between many VRFs using multiple NCLU commands before running the {{net commit}} command, the commit fails. To work around this issue, configure VRF leaking one command at a time and run {{net commit}} after each command. 4.4.4-5.2.1 5.3.0-5.6.0
3234031If BGP {{neighbor <name> allowas-in}} is set, negating with no {{no neighbor <name> allowas-in}} does not disable the setting. To work around this issue and disable the setting, restart the FRR service.4.2.1-5.2.15.3.0-5.6.0
3227677 When daylight saving time changes the time, the MLAG {{initDelay}} timer resets and all MLAG bonds go down. 4.4.4-5.2.1
3192808 When the switch receives an LLDP frame from a Cisco router right after a {{ptmd}} restart, the {{ptmd}} service crashes.4.3.0-5.2.15.3.0-5.6.04.3.0-4.3.1, 4.4.0-5.2.14.3.2, 5.3.0-5.6.0
31685645.0.0-5.6.0
2771653When using W-ECMP, the weights for various BGP next hops can sometimes be in the range of 100s or more, which consumes a lot of hardware space.4.3.0-4.4.5
2763819 When you enable LACP bypass on a bond, traffic to static MAC addresses configured on the bond might not work when LACP bypass is enforced. 4.4.0-4.4.5
2555175Control Plane Traffic (example - BGP peering from Leaf to Spine) goes down on Leaf due to Hold Down Timer Expiration of peer following prolonged link flaps on downlinks when vxlan enabled vlans are carried on the flapping link.3.7.15-3.7.16, 4.2.1-4.4.5
2554986 The {{ethtool}} utility doesn't contain the latest values, as a result the {{Revision Compliance}} field shows {{Unallocated}}. 4.2.1-4.4.5 Fixed
3647731CVE-2023-38408: The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009. -Mitigation: Do not use ssh-agent forwarding (the man page for ssh_config says that "agent forwarding should be enabled with caution"), or start the ssh-agent program with the -P option to allow only specific PKCS#11 libraries (or none with -P ''). -For Cumulus Linux 4.3.2, the /usr/bin/ssh-agent program has all permissions turned off (chmod 0) to prevent its execution if a vulnerable version is detected.4.0.0-4.4.5, 5.0.0-5.6.0
3647424 When you remove the {{update-source}} configuration for a BGP neighbor, the peering is reset if the neighbor is a member of a peer group with the same {{update-source}} configuration. 4.3.0-4.4.5
3534654On a Broadcom switch, Q-in-Q VLAN operations do not clear when you remove a bridge port from a VXLAN-enabled bridge. This can result in unexpected double tagged packets if the outer VLAN is still used on the bridge. To work around this issue, restart {{switchd}} after you modify or remove double tagged bridge ports from a VXLAN-enabled bridge.3600912In an MLAG EVPN configuration, if host mobility occurs multiple times at high frequency, the host MAC might point to an incorrect VTEP; it might be local behind the VTEP. 4.3.1-4.4.5
5.6.0
3486888If FRR learns a layer 2 entry against a VNI and you reconfigure the VNI later as a layer 3 VNI, the original layer 2 entry does not clear and remains in the forwarding database.4.3.0-5.5.15.6.0
3479967When you remove VRF configuration, the {{systemctl reload frr.service}} command returns a non zero exit code after erroneously running the invalid command {{no exit-vrf}}.4.3.1-4.4.5
3474391 The SNMP MIB definition file {{/usr/share/snmp/mibs/Cumulus-BGPVRF-MIB.txt}} does not define the INDEX of the {{bgpPeerEntry}} correctly. This issue does not impact SNMP functionality for this MIB. 4.3.1-5.5.1 5.6.0
3455998When you poll the BGP unnumbered MIB object 1.3.6.1.4.1.40310.4 after uncommenting the {{bgpun_pp.py}} pass persist script in the {{/etc/snmpd/snmpd.conf}} file, BGP session information is not retrieved. To work around this issue, add executable permissions to the script with the {{sudo chmod +x /usr/share/snmp/bgpun_pp.py}} command.4.3.1-4.4.5
3448171If a default route is withdrawn from the routing table and then learned again, traffic matching this entry will be software (cpu) forwarded.  This will cause intermittent drops due to the CPU the rate-limiter. - -This only impacts the default VRF and a default route learned dynamically. - -In order to recover from this condition:  - -1. Restart switchd.service (sudo systemctl restart switchd.service) - -OR -  -2. Reboot the switch (sudo reboot)4.3.1-4.4.5
3434315IPv6 BGP sessions in a VRF do not be establish with MD5 authentication.4.3.0-4.4.5
3429530 On the Spectrum-2 and Spectrum-3 switch, multiple interfaces (in the same PLL quarter) might flap intermittently at the same time. 4.2.1-5.4.0 5.5.0-5.6.0
3419962On a Broadcom switch, if you remove a double-tagged interface from a bridge that contains other double-tagged interfaces built on the same physical port (for example, you remove swp1.10.100 when swp1.10.200 is also a bridge port), traffic forwarding within the bridge might fail and you see critical warnings in the {{/var/log/switchd.log}} file similar to the following: - -switchd[8587]: hal_bcm.c:2207 CRIT knet_vlan_translate_delete(update): port 1 ext_vlan 10.100 int_vlan 2132: -11 -4.3.1-4.4.5
3419953If you remove a double tagged bridge port from a bridge when a different interface exists with the same port and virtual ID, you might see a segmentation fault and a {{switchd}} crash due to incorrect initialization when Cumulus Linux creates the second double-tagged interface. To work around this issue, make sure you remove the double-tagged interfaces from the bridge in the {{/etc/network/interfaces}} file.4.3.1-4.4.5
3418045If MLAG is configured but disconnected from an MLAG peer for an extended period of time (days or more), there is a long delay (up to a minute per day) before traffic forwarding stabilizes after the MLAG peer connection re-establishes.3.7.0-5.4.05.5.0-5.6.0
3401121sFlow is not able to sample packets in the egress direction. To work around this issue, add the following to the {{hsflowd.conf}} file to enable egress sampling: - -samplingDirection=out -psample { group=1 } -4.3.0-4.4.5
3387852 If you remove NGINX from the switch, then run {{apt autoremove}}, switchd does not reload because the {{libyaml-0-2}} and {{python-yaml }} packages are missing; these packages are required for {{switchd}} consistency checking. To work around this issue, reinstall the {{libyaml-0-2}} and {{python-yaml }}packages. 4.4.0-4.4.5
3376798On Broadcom switches, Cumulus Linux does not create the hardware bridging domain for a traditional bridge with a VXLAN interface during {{switchd}} restart. The {{/var/log/switchd.log}} file includes the following exception logs shortly after {{switchd}} restarts: - -switchd[30158]: hal_bcm_l3.c:1617 find_egr_path_if_vxlan_overlay:vxlan overlay : nh PORT: port <#>, vlan <x>.<y> not yet ready - -MAC learning looks correct, but traffic does not flow as expected.3.7.0-3.7.16, 4.3.1-4.4.5
3368217 When daylight saving time changes, the MLAG {{initDelay}} timer resets and all MLAG bonds go down. 4.4.4-4.4.5, 5.2.1-5.6.0
3366612The base version of the Linux kernel is updated to the v4.19.273 stable release, which includes fixes for several CVE issues.4.3.1-4.4.5
3364996Under certain conditions, BGP can allow a combination of EVPN and non-EVPN paths to be put into a multipath group together. This results in erroneous programming of EVPN symmetric next hops and RMACs, which can result in momentary traffic drops.4.3.0-4.4.5
3364717On the Trident 2+ and Trident 3 switch when using VXLAN layer 2 VPNs and sending tunneled traffic where the inner IP header has a TTL of 1, the egress VTEP incorrectly forwards this traffic through the software path instead of the hardware data plane. This traffic is rate-limited to 100pps by default. To work around this issue, ensure that the traffic traversing the layer 2 tunnel has an inner IP header TTL value that is more than 1. If this workaround is not possible, contact Nvidia Support to determine other options.4.3.0-4.4.5
3358865When you reboot a Broadcom switch with a static default route configured, the route might be installed in hardware without a next hop. This results in forwarded traffic to the CPU and drops. To recover from this issue, remove the default route configuration and reapply it. To prevent this issue, before rebooting the switch, split the default route configuration into two routes as below: - -ip route 0.0.0.0/1 10.1.1.1 -ip route 128.0.0.0/1 10.1.1.1 -4.3.1-4.4.5
3351951 Currently, the default core dump size limit on Cumulus Linux is 256M but the SDK generates core dumps around 800M. To avoid incomplete core files, you can increase the core dump size limit.4.2.1-5.3.15.4.0-5.6.0
3334031When you configure or unconfigure a BGP peer and interface towards a host, memory corruption can cause BGP to crash.4.3.0-4.4.54.2.1-4.3.1, 4.4.0-5.3.14.3.2, 5.4.0-5.6.0
33330645.0.0-5.6.0
3288385On the EdgeCore AS7326-56X and AS7726-32X switch, the fan speed reports a minimum threshold in the logs.4.3.1-4.4.5
3288156 When you configure a new VNI, the VLAN 1 VNI mapping is removed from the VXLAN device. To work around this issue, set the VNI interface mapped to VLAN 1 down and up again.
3269538The {{cl-ecmpcalc}} command prints the following error when the egress interface is a bond or SVI: - -ecmpcalc: will query hardware -Traceback (most recent call last): -File “/usr/cumulus/bin/cl-ecmpcalc”, line 986, in -isTrunkMbr, port = ecmp.getHdPort(hd_cmd) -File “/usr/cumulus/bin/cl-ecmpcalc”, line 618, in getHdPort -port = int(str4) -ValueError: invalid literal for int() with base 10: ‘0t -4.3.0-4.4.5
3269537 When an FRR routing service (such as {{bgpd}}) becomes unresponsive, {{watchfrr}} might fail to stop and restart service. To work around this issue, restart FRR with the {{systemctl restart frr}} command. 4.4.0-5.3.1 5.4.0-5.6.0
3267353In a QinQ configuration, if the VLAN priority is a non-zero value, double-tagged packets are translated to triple-tagged packets. 4.3.1-4.4.5
3244740 If you have a lot of inbound route maps that match lists with many regex statements, a large number of updates from the peer can cause the system to run out of memory. To work around this issue, reduce the number of regex matches in inbound route maps. 4.4.0-5.2.15.3.0-5.6.0
3240406When you configure or unconfigure a BGP peer and interface towards a host, memory corruption can cause BGP to crash.4.3.0-5.3.15.4.0-5.6.0
3236334Using ARP suppression with a very large number of interfaces might result in missing ARP entries on the local device or buffer underrun warnings in the {{neighmgrd}} log.4.3.0-4.4.5
3235956With certain triggers on Broadcom switches, such as adding or deleting a VNI or reloading the network, Cumulus Linux might consider the underlay routes as overlay routes. In this case, {{switchd}} allocates the overlay next hop, which is incorrect and might affect traffic forwarding.4.3.0-4.4.54.3.2, 5.3.0-5.6.0
32353685.3.0-5.6.0
3234031If BGP {{neighbor <name> allowas-in}} is set, negating with no {{no neighbor <name> allowas-in}} does not disable the setting. To work around this issue and disable the setting, restart the FRR service.4.2.1-5.2.15.3.0-5.6.0
3227677 When daylight saving time changes the time, the MLAG {{initDelay}} timer resets and all MLAG bonds go down. 4.4.4-5.2.1
3192808 When the switch receives an LLDP frame from a Cisco router right after a {{ptmd}} restart, the {{ptmd}} service crashes.4.3.0-5.2.15.3.0-5.6.04.3.0-4.3.1, 4.4.0-5.2.14.3.2, 5.3.0-5.6.0
31685645.0.0-5.6.0
2771653When using W-ECMP, the weights for various BGP next hops can sometimes be in the range of 100s or more, which consumes a lot of hardware space.4.3.0-4.4.5
2763819 When you enable LACP bypass on a bond, traffic to static MAC addresses configured on the bond might not work when LACP bypass is enforced. 4.4.0-4.4.5
2555175Control Plane Traffic (example - BGP peering from Leaf to Spine) goes down on Leaf due to Hold Down Timer Expiration of peer following prolonged link flaps on downlinks when vxlan enabled vlans are carried on the flapping link.3.7.15-3.7.16, 4.2.1-4.4.5
2554986 The {{ethtool}} utility doesn't contain the latest values, as a result the {{Revision Compliance}} field shows {{Unallocated}}. 4.2.1-4.4.5 Fixed
3647731CVE-2023-38408: The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009. -Mitigation: Do not use ssh-agent forwarding (the man page for ssh_config says that "agent forwarding should be enabled with caution"), or start the ssh-agent program with the -P option to allow only specific PKCS#11 libraries (or none with -P ''). -For Cumulus Linux 4.3.2, the /usr/bin/ssh-agent program has all permissions turned off (chmod 0) to prevent its execution if a vulnerable version is detected.4.0.0-4.4.5, 5.0.0-5.6.0
3647424 When you remove the {{update-source}} configuration for a BGP neighbor, the peering is reset if the neighbor is a member of a peer group with the same {{update-source}} configuration. 4.3.0-4.4.5
3534654On a Broadcom switch, Q-in-Q VLAN operations do not clear when you remove a bridge port from a VXLAN-enabled bridge. This can result in unexpected double tagged packets if the outer VLAN is still used on the bridge. To work around this issue, restart {{switchd}} after you modify or remove double tagged bridge ports from a VXLAN-enabled bridge.3600912In an MLAG EVPN configuration, if host mobility occurs multiple times at high frequency, the host MAC might point to an incorrect VTEP; it might be local behind the VTEP. 4.3.1-4.4.5
5.6.0
3486888If FRR learns a layer 2 entry against a VNI and you reconfigure the VNI later as a layer 3 VNI, the original layer 2 entry does not clear and remains in the forwarding database.4.3.0-5.5.15.6.0
3479967When you remove VRF configuration, the {{systemctl reload frr.service}} command returns a non zero exit code after erroneously running the invalid command {{no exit-vrf}}.4.3.1-4.4.5
3474391 The SNMP MIB definition file {{/usr/share/snmp/mibs/Cumulus-BGPVRF-MIB.txt}} does not define the INDEX of the {{bgpPeerEntry}} correctly. This issue does not impact SNMP functionality for this MIB. 4.3.1-5.5.1 5.6.0
3455998When you poll the BGP unnumbered MIB object 1.3.6.1.4.1.40310.4 after uncommenting the {{bgpun_pp.py}} pass persist script in the {{/etc/snmpd/snmpd.conf}} file, BGP session information is not retrieved. To work around this issue, add executable permissions to the script with the {{sudo chmod +x /usr/share/snmp/bgpun_pp.py}} command.4.3.1-4.4.5
3448171If a default route is withdrawn from the routing table and then learned again, traffic matching this entry will be software (cpu) forwarded.  This will cause intermittent drops due to the CPU the rate-limiter. - -This only impacts the default VRF and a default route learned dynamically. - -In order to recover from this condition:  - -1. Restart switchd.service (sudo systemctl restart switchd.service) - -OR -  -2. Reboot the switch (sudo reboot)4.3.1-4.4.5
3434315IPv6 BGP sessions in a VRF do not be establish with MD5 authentication.4.3.0-4.4.5
3429530 On the Spectrum-2 and Spectrum-3 switch, multiple interfaces (in the same PLL quarter) might flap intermittently at the same time. 4.2.1-5.4.0 5.5.0-5.6.0
3419962On a Broadcom switch, if you remove a double-tagged interface from a bridge that contains other double-tagged interfaces built on the same physical port (for example, you remove swp1.10.100 when swp1.10.200 is also a bridge port), traffic forwarding within the bridge might fail and you see critical warnings in the {{/var/log/switchd.log}} file similar to the following: - -switchd[8587]: hal_bcm.c:2207 CRIT knet_vlan_translate_delete(update): port 1 ext_vlan 10.100 int_vlan 2132: -11 -4.3.1-4.4.5
3419953If you remove a double tagged bridge port from a bridge when a different interface exists with the same port and virtual ID, you might see a segmentation fault and a {{switchd}} crash due to incorrect initialization when Cumulus Linux creates the second double-tagged interface. To work around this issue, make sure you remove the double-tagged interfaces from the bridge in the {{/etc/network/interfaces}} file.4.3.1-4.4.5
3418045If MLAG is configured but disconnected from an MLAG peer for an extended period of time (days or more), there is a long delay (up to a minute per day) before traffic forwarding stabilizes after the MLAG peer connection re-establishes.3.7.0-5.4.05.5.0-5.6.0
3401121sFlow is not able to sample packets in the egress direction. To work around this issue, add the following to the {{hsflowd.conf}} file to enable egress sampling: - -samplingDirection=out -psample { group=1 } -4.3.0-4.4.5
3387852 If you remove NGINX from the switch, then run {{apt autoremove}}, switchd does not reload because the {{libyaml-0-2}} and {{python-yaml }} packages are missing; these packages are required for {{switchd}} consistency checking. To work around this issue, reinstall the {{libyaml-0-2}} and {{python-yaml }}packages. 4.4.0-4.4.5
3376798On Broadcom switches, Cumulus Linux does not create the hardware bridging domain for a traditional bridge with a VXLAN interface during {{switchd}} restart. The {{/var/log/switchd.log}} file includes the following exception logs shortly after {{switchd}} restarts: - -switchd[30158]: hal_bcm_l3.c:1617 find_egr_path_if_vxlan_overlay:vxlan overlay : nh PORT: port <#>, vlan <x>.<y> not yet ready - -MAC learning looks correct, but traffic does not flow as expected.3.7.0-3.7.16, 4.3.1-4.4.5
3366612The base version of the Linux kernel is updated to the v4.19.273 stable release, which includes fixes for several CVE issues.4.3.1-4.4.5
3364996Under certain conditions, BGP can allow a combination of EVPN and non-EVPN paths to be put into a multipath group together. This results in erroneous programming of EVPN symmetric next hops and RMACs, which can result in momentary traffic drops.4.3.0-4.4.5
3364717On the Trident 2+ and Trident 3 switch when using VXLAN layer 2 VPNs and sending tunneled traffic where the inner IP header has a TTL of 1, the egress VTEP incorrectly forwards this traffic through the software path instead of the hardware data plane. This traffic is rate-limited to 100pps by default. To work around this issue, ensure that the traffic traversing the layer 2 tunnel has an inner IP header TTL value that is more than 1. If this workaround is not possible, contact Nvidia Support to determine other options.4.3.0-4.4.5
3358865When you reboot a Broadcom switch with a static default route configured, the route might be installed in hardware without a next hop. This results in forwarded traffic to the CPU and drops. To recover from this issue, remove the default route configuration and reapply it. To prevent this issue, before rebooting the switch, split the default route configuration into two routes as below: - -ip route 0.0.0.0/1 10.1.1.1 -ip route 128.0.0.0/1 10.1.1.1 -4.3.1-4.4.5
3351951 Currently, the default core dump size limit on Cumulus Linux is 256M but the SDK generates core dumps around 800M. To avoid incomplete core files, you can increase the core dump size limit.4.2.1-5.3.15.4.0-5.6.0
3334031When you configure or unconfigure a BGP peer and interface towards a host, memory corruption can cause BGP to crash.4.3.0-4.4.54.2.1-4.3.1, 4.4.0-5.3.14.3.2, 5.4.0-5.6.0
33330645.0.0-5.6.0
3288385On the EdgeCore AS7326-56X and AS7726-32X switch, the fan speed reports a minimum threshold in the logs.4.3.1-4.4.5
3288156 When you configure a new VNI, the VLAN 1 VNI mapping is removed from the VXLAN device. To work around this issue, set the VNI interface mapped to VLAN 1 down and up again.
3269538The {{cl-ecmpcalc}} command prints the following error when the egress interface is a bond or SVI: - -ecmpcalc: will query hardware -Traceback (most recent call last): -File “/usr/cumulus/bin/cl-ecmpcalc”, line 986, in -isTrunkMbr, port = ecmp.getHdPort(hd_cmd) -File “/usr/cumulus/bin/cl-ecmpcalc”, line 618, in getHdPort -port = int(str4) -ValueError: invalid literal for int() with base 10: ‘0t -4.3.0-4.4.5
3269537 When an FRR routing service (such as {{bgpd}}) becomes unresponsive, {{watchfrr}} might fail to stop and restart service. To work around this issue, restart FRR with the {{systemctl restart frr}} command. 4.4.0-5.3.1 5.4.0-5.6.0
3267353In a QinQ configuration, if the VLAN priority is a non-zero value, double-tagged packets are translated to triple-tagged packets. 4.3.1-4.4.5
3244740 If you have a lot of inbound route maps that match lists with many regex statements, a large number of updates from the peer can cause the system to run out of memory. To work around this issue, reduce the number of regex matches in inbound route maps. 4.4.0-5.2.15.3.0-5.6.0
3240406When you configure or unconfigure a BGP peer and interface towards a host, memory corruption can cause BGP to crash.4.3.0-5.3.15.4.0-5.6.0
3236334Using ARP suppression with a very large number of interfaces might result in missing ARP entries on the local device or buffer underrun warnings in the {{neighmgrd}} log.4.3.0-4.4.5
3235956With certain triggers on Broadcom switches, such as adding or deleting a VNI or reloading the network, Cumulus Linux might consider the underlay routes as overlay routes. In this case, {{switchd}} allocates the overlay next hop, which is incorrect and might affect traffic forwarding.4.3.0-4.4.5
3234031If BGP {{neighbor <name> allowas-in}} is set, negating with no {{no neighbor <name> allowas-in}} does not disable the setting. To work around this issue and disable the setting, restart the FRR service.4.2.1-5.2.15.3.0-5.6.04.3.2, 5.3.0-5.6.0
3226579
3192808 When the switch receives an LLDP frame from a Cisco router right after a {{ptmd}} restart, the {{ptmd}} service crashes.4.3.0-5.2.15.3.0-5.6.04.3.0-4.3.1, 4.4.0-5.2.14.3.2, 5.3.0-5.6.0
31685645.0.0-5.6.0
2771653When using W-ECMP, the weights for various BGP next hops can sometimes be in the range of 100s or more, which consumes a lot of hardware space.4.3.0-4.4.5
2763819 When you enable LACP bypass on a bond, traffic to static MAC addresses configured on the bond might not work when LACP bypass is enforced. 4.4.0-4.4.5
2555175Control Plane Traffic (example - BGP peering from Leaf to Spine) goes down on Leaf due to Hold Down Timer Expiration of peer following prolonged link flaps on downlinks when vxlan enabled vlans are carried on the flapping link.3.7.15-3.7.16, 4.2.1-4.4.5
2554986 The {{ethtool}} utility doesn't contain the latest values, as a result the {{Revision Compliance}} field shows {{Unallocated}}. 4.2.1-4.4.5 Fixed
3647731CVE-2023-38408: The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009. -Mitigation: Do not use ssh-agent forwarding (the man page for ssh_config says that "agent forwarding should be enabled with caution"), or start the ssh-agent program with the -P option to allow only specific PKCS#11 libraries (or none with -P ''). -For Cumulus Linux 4.3.2, the /usr/bin/ssh-agent program has all permissions turned off (chmod 0) to prevent its execution if a vulnerable version is detected.4.0.0-4.4.5, 5.0.0-5.6.0
3647424 When you remove the {{update-source}} configuration for a BGP neighbor, the peering is reset if the neighbor is a member of a peer group with the same {{update-source}} configuration. 4.3.0-4.4.5
3534654On a Broadcom switch, Q-in-Q VLAN operations do not clear when you remove a bridge port from a VXLAN-enabled bridge. This can result in unexpected double tagged packets if the outer VLAN is still used on the bridge. To work around this issue, restart {{switchd}} after you modify or remove double tagged bridge ports from a VXLAN-enabled bridge.3600912In an MLAG EVPN configuration, if host mobility occurs multiple times at high frequency, the host MAC might point to an incorrect VTEP; it might be local behind the VTEP. 4.3.1-4.4.5
5.6.0
3486888If FRR learns a layer 2 entry against a VNI and you reconfigure the VNI later as a layer 3 VNI, the original layer 2 entry does not clear and remains in the forwarding database.4.3.0-5.5.15.6.0
3479967When you remove VRF configuration, the {{systemctl reload frr.service}} command returns a non zero exit code after erroneously running the invalid command {{no exit-vrf}}.4.3.1-4.4.5
3474391 The SNMP MIB definition file {{/usr/share/snmp/mibs/Cumulus-BGPVRF-MIB.txt}} does not define the INDEX of the {{bgpPeerEntry}} correctly. This issue does not impact SNMP functionality for this MIB. 4.3.1-5.5.1 5.6.0
3455998When you poll the BGP unnumbered MIB object 1.3.6.1.4.1.40310.4 after uncommenting the {{bgpun_pp.py}} pass persist script in the {{/etc/snmpd/snmpd.conf}} file, BGP session information is not retrieved. To work around this issue, add executable permissions to the script with the {{sudo chmod +x /usr/share/snmp/bgpun_pp.py}} command.4.3.1-4.4.5
3448171If a default route is withdrawn from the routing table and then learned again, traffic matching this entry will be software (cpu) forwarded.  This will cause intermittent drops due to the CPU the rate-limiter. - -This only impacts the default VRF and a default route learned dynamically. - -In order to recover from this condition:  - -1. Restart switchd.service (sudo systemctl restart switchd.service) - -OR -  -2. Reboot the switch (sudo reboot)4.3.1-4.4.5
3434315IPv6 BGP sessions in a VRF do not be establish with MD5 authentication.4.3.0-4.4.5
3429530 On the Spectrum-2 and Spectrum-3 switch, multiple interfaces (in the same PLL quarter) might flap intermittently at the same time. 4.2.1-5.4.0 5.5.0-5.6.0
3419962On a Broadcom switch, if you remove a double-tagged interface from a bridge that contains other double-tagged interfaces built on the same physical port (for example, you remove swp1.10.100 when swp1.10.200 is also a bridge port), traffic forwarding within the bridge might fail and you see critical warnings in the {{/var/log/switchd.log}} file similar to the following: - -switchd[8587]: hal_bcm.c:2207 CRIT knet_vlan_translate_delete(update): port 1 ext_vlan 10.100 int_vlan 2132: -11 -4.3.1-4.4.5
3419953If you remove a double tagged bridge port from a bridge when a different interface exists with the same port and virtual ID, you might see a segmentation fault and a {{switchd}} crash due to incorrect initialization when Cumulus Linux creates the second double-tagged interface. To work around this issue, make sure you remove the double-tagged interfaces from the bridge in the {{/etc/network/interfaces}} file.4.3.1-4.4.5
3418045If MLAG is configured but disconnected from an MLAG peer for an extended period of time (days or more), there is a long delay (up to a minute per day) before traffic forwarding stabilizes after the MLAG peer connection re-establishes.3.7.0-5.4.05.5.0-5.6.0
3401121sFlow is not able to sample packets in the egress direction. To work around this issue, add the following to the {{hsflowd.conf}} file to enable egress sampling: - -samplingDirection=out -psample { group=1 } -4.3.0-4.4.5
3387852 If you remove NGINX from the switch, then run {{apt autoremove}}, switchd does not reload because the {{libyaml-0-2}} and {{python-yaml }} packages are missing; these packages are required for {{switchd}} consistency checking. To work around this issue, reinstall the {{libyaml-0-2}} and {{python-yaml }}packages. 4.4.0-4.4.5
3376798On Broadcom switches, Cumulus Linux does not create the hardware bridging domain for a traditional bridge with a VXLAN interface during {{switchd}} restart. The {{/var/log/switchd.log}} file includes the following exception logs shortly after {{switchd}} restarts: - -switchd[30158]: hal_bcm_l3.c:1617 find_egr_path_if_vxlan_overlay:vxlan overlay : nh PORT: port <#>, vlan <x>.<y> not yet ready - -MAC learning looks correct, but traffic does not flow as expected.3.7.0-3.7.16, 4.3.1-4.4.5
3366612The base version of the Linux kernel is updated to the v4.19.273 stable release, which includes fixes for several CVE issues.4.3.1-4.4.5
3364996Under certain conditions, BGP can allow a combination of EVPN and non-EVPN paths to be put into a multipath group together. This results in erroneous programming of EVPN symmetric next hops and RMACs, which can result in momentary traffic drops.4.3.0-4.4.5
3364717On the Trident 2+ and Trident 3 switch when using VXLAN layer 2 VPNs and sending tunneled traffic where the inner IP header has a TTL of 1, the egress VTEP incorrectly forwards this traffic through the software path instead of the hardware data plane. This traffic is rate-limited to 100pps by default. To work around this issue, ensure that the traffic traversing the layer 2 tunnel has an inner IP header TTL value that is more than 1. If this workaround is not possible, contact Nvidia Support to determine other options.4.3.0-4.4.5
3358865When you reboot a Broadcom switch with a static default route configured, the route might be installed in hardware without a next hop. This results in forwarded traffic to the CPU and drops. To recover from this issue, remove the default route configuration and reapply it. To prevent this issue, before rebooting the switch, split the default route configuration into two routes as below: - -ip route 0.0.0.0/1 10.1.1.1 -ip route 128.0.0.0/1 10.1.1.1 -4.3.1-4.4.5
3351951 Currently, the default core dump size limit on Cumulus Linux is 256M but the SDK generates core dumps around 800M. To avoid incomplete core files, you can increase the core dump size limit.4.2.1-5.3.15.4.0-5.6.0
3334031When you configure or unconfigure a BGP peer and interface towards a host, memory corruption can cause BGP to crash.4.3.0-4.4.54.2.1-4.3.1, 4.4.0-5.3.14.3.2, 5.4.0-5.6.0
33330645.0.0-5.6.0
3288385On the EdgeCore AS7326-56X and AS7726-32X switch, the fan speed reports a minimum threshold in the logs.4.3.1-4.4.5
3284719 Certain EVPN multihoming show commands might cause the {{bgpd}} service to crash if you use the {{json}} flag and try to reference the default VRF by name. For example: {{show bgp l2vpn evpn es-vrf json}}. 4.4.2-4.4.5
3269538The {{cl-ecmpcalc}} command prints the following error when the egress interface is a bond or SVI: - -ecmpcalc: will query hardware -Traceback (most recent call last): -File “/usr/cumulus/bin/cl-ecmpcalc”, line 986, in -isTrunkMbr, port = ecmp.getHdPort(hd_cmd) -File “/usr/cumulus/bin/cl-ecmpcalc”, line 618, in getHdPort -port = int(str4) -ValueError: invalid literal for int() with base 10: ‘0t -4.3.0-4.4.5
3269537 When an FRR routing service (such as {{bgpd}}) becomes unresponsive, {{watchfrr}} might fail to stop and restart service. To work around this issue, restart FRR with the {{systemctl restart frr}} command. 4.4.0-5.3.1 5.4.0-5.6.0
3267353In a QinQ configuration, if the VLAN priority is a non-zero value, double-tagged packets are translated to triple-tagged packets. 4.3.1-4.4.5
3244740 If you have a lot of inbound route maps that match lists with many regex statements, a large number of updates from the peer can cause the system to run out of memory. To work around this issue, reduce the number of regex matches in inbound route maps. 4.4.0-5.2.15.3.0-5.6.0
3240406When you configure or unconfigure a BGP peer and interface towards a host, memory corruption can cause BGP to crash.4.3.0-5.3.15.4.0-5.6.0
3236334Using ARP suppression with a very large number of interfaces might result in missing ARP entries on the local device or buffer underrun warnings in the {{neighmgrd}} log.4.3.0-4.4.5
3235956With certain triggers on Broadcom switches, such as adding or deleting a VNI or reloading the network, Cumulus Linux might consider the underlay routes as overlay routes. In this case, {{switchd}} allocates the overlay next hop, which is incorrect and might affect traffic forwarding.4.3.0-4.4.5
3234031If BGP {{neighbor <name> allowas-in}} is set, negating with no {{no neighbor <name> allowas-in}} does not disable the setting. To work around this issue and disable the setting, restart the FRR service.4.2.1-5.2.15.3.0-5.6.04.3.2, 5.3.0-5.6.0
3221470
3192808 When the switch receives an LLDP frame from a Cisco router right after a {{ptmd}} restart, the {{ptmd}} service crashes.4.3.0-5.2.15.3.0-5.6.04.3.0-4.3.1, 4.4.0-5.2.14.3.2, 5.3.0-5.6.0
31685645.0.0-5.6.0
2771653When using W-ECMP, the weights for various BGP next hops can sometimes be in the range of 100s or more, which consumes a lot of hardware space.4.3.0-4.4.5
2763819 When you enable LACP bypass on a bond, traffic to static MAC addresses configured on the bond might not work when LACP bypass is enforced. 4.4.0-4.4.5
2555175Control Plane Traffic (example - BGP peering from Leaf to Spine) goes down on Leaf due to Hold Down Timer Expiration of peer following prolonged link flaps on downlinks when vxlan enabled vlans are carried on the flapping link.3.7.15-3.7.16, 4.2.1-4.4.5
2554986 The {{ethtool}} utility doesn't contain the latest values, as a result the {{Revision Compliance}} field shows {{Unallocated}}. 4.2.1-4.4.5 Fixed
3647731CVE-2023-38408: The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009. -Mitigation: Do not use ssh-agent forwarding (the man page for ssh_config says that "agent forwarding should be enabled with caution"), or start the ssh-agent program with the -P option to allow only specific PKCS#11 libraries (or none with -P ''). -For Cumulus Linux 4.3.2, the /usr/bin/ssh-agent program has all permissions turned off (chmod 0) to prevent its execution if a vulnerable version is detected.4.0.0-4.4.5, 5.0.0-5.6.0
3647424 When you remove the {{update-source}} configuration for a BGP neighbor, the peering is reset if the neighbor is a member of a peer group with the same {{update-source}} configuration. 4.3.0-4.4.5
3534654On a Broadcom switch, Q-in-Q VLAN operations do not clear when you remove a bridge port from a VXLAN-enabled bridge. This can result in unexpected double tagged packets if the outer VLAN is still used on the bridge. To work around this issue, restart {{switchd}} after you modify or remove double tagged bridge ports from a VXLAN-enabled bridge.3600912In an MLAG EVPN configuration, if host mobility occurs multiple times at high frequency, the host MAC might point to an incorrect VTEP; it might be local behind the VTEP. 4.3.1-4.4.5
5.6.0
3486888If FRR learns a layer 2 entry against a VNI and you reconfigure the VNI later as a layer 3 VNI, the original layer 2 entry does not clear and remains in the forwarding database.4.3.0-5.5.15.6.0
3479967When you remove VRF configuration, the {{systemctl reload frr.service}} command returns a non zero exit code after erroneously running the invalid command {{no exit-vrf}}.4.3.1-4.4.5
3474391 The SNMP MIB definition file {{/usr/share/snmp/mibs/Cumulus-BGPVRF-MIB.txt}} does not define the INDEX of the {{bgpPeerEntry}} correctly. This issue does not impact SNMP functionality for this MIB. 4.3.1-5.5.1 5.6.0
3455998When you poll the BGP unnumbered MIB object 1.3.6.1.4.1.40310.4 after uncommenting the {{bgpun_pp.py}} pass persist script in the {{/etc/snmpd/snmpd.conf}} file, BGP session information is not retrieved. To work around this issue, add executable permissions to the script with the {{sudo chmod +x /usr/share/snmp/bgpun_pp.py}} command.4.3.1-4.4.5
3448171If a default route is withdrawn from the routing table and then learned again, traffic matching this entry will be software (cpu) forwarded.  This will cause intermittent drops due to the CPU the rate-limiter. - -This only impacts the default VRF and a default route learned dynamically. - -In order to recover from this condition:  - -1. Restart switchd.service (sudo systemctl restart switchd.service) - -OR -  -2. Reboot the switch (sudo reboot)4.3.1-4.4.5
3434315IPv6 BGP sessions in a VRF do not be establish with MD5 authentication.4.3.0-4.4.5
3429530 On the Spectrum-2 and Spectrum-3 switch, multiple interfaces (in the same PLL quarter) might flap intermittently at the same time. 4.2.1-5.4.0 5.5.0-5.6.0
3419962On a Broadcom switch, if you remove a double-tagged interface from a bridge that contains other double-tagged interfaces built on the same physical port (for example, you remove swp1.10.100 when swp1.10.200 is also a bridge port), traffic forwarding within the bridge might fail and you see critical warnings in the {{/var/log/switchd.log}} file similar to the following: - -switchd[8587]: hal_bcm.c:2207 CRIT knet_vlan_translate_delete(update): port 1 ext_vlan 10.100 int_vlan 2132: -11 -4.3.1-4.4.5
3419953If you remove a double tagged bridge port from a bridge when a different interface exists with the same port and virtual ID, you might see a segmentation fault and a {{switchd}} crash due to incorrect initialization when Cumulus Linux creates the second double-tagged interface. To work around this issue, make sure you remove the double-tagged interfaces from the bridge in the {{/etc/network/interfaces}} file.4.3.1-4.4.5
3418045If MLAG is configured but disconnected from an MLAG peer for an extended period of time (days or more), there is a long delay (up to a minute per day) before traffic forwarding stabilizes after the MLAG peer connection re-establishes.3.7.0-5.4.05.5.0-5.6.0
3401121sFlow is not able to sample packets in the egress direction. To work around this issue, add the following to the {{hsflowd.conf}} file to enable egress sampling: - -samplingDirection=out -psample { group=1 } -4.3.0-4.4.5
3387852 If you remove NGINX from the switch, then run {{apt autoremove}}, switchd does not reload because the {{libyaml-0-2}} and {{python-yaml }} packages are missing; these packages are required for {{switchd}} consistency checking. To work around this issue, reinstall the {{libyaml-0-2}} and {{python-yaml }}packages. 4.4.0-4.4.5
3376798On Broadcom switches, Cumulus Linux does not create the hardware bridging domain for a traditional bridge with a VXLAN interface during {{switchd}} restart. The {{/var/log/switchd.log}} file includes the following exception logs shortly after {{switchd}} restarts: - -switchd[30158]: hal_bcm_l3.c:1617 find_egr_path_if_vxlan_overlay:vxlan overlay : nh PORT: port <#>, vlan <x>.<y> not yet ready - -MAC learning looks correct, but traffic does not flow as expected.3.7.0-3.7.16, 4.3.1-4.4.5
3366612The base version of the Linux kernel is updated to the v4.19.273 stable release, which includes fixes for several CVE issues.4.3.1-4.4.5
3364996Under certain conditions, BGP can allow a combination of EVPN and non-EVPN paths to be put into a multipath group together. This results in erroneous programming of EVPN symmetric next hops and RMACs, which can result in momentary traffic drops.4.3.0-4.4.5
3364717On the Trident 2+ and Trident 3 switch when using VXLAN layer 2 VPNs and sending tunneled traffic where the inner IP header has a TTL of 1, the egress VTEP incorrectly forwards this traffic through the software path instead of the hardware data plane. This traffic is rate-limited to 100pps by default. To work around this issue, ensure that the traffic traversing the layer 2 tunnel has an inner IP header TTL value that is more than 1. If this workaround is not possible, contact Nvidia Support to determine other options.4.3.0-4.4.5
3358865When you reboot a Broadcom switch with a static default route configured, the route might be installed in hardware without a next hop. This results in forwarded traffic to the CPU and drops. To recover from this issue, remove the default route configuration and reapply it. To prevent this issue, before rebooting the switch, split the default route configuration into two routes as below: - -ip route 0.0.0.0/1 10.1.1.1 -ip route 128.0.0.0/1 10.1.1.1 -4.3.1-4.4.5
3351951 Currently, the default core dump size limit on Cumulus Linux is 256M but the SDK generates core dumps around 800M. To avoid incomplete core files, you can increase the core dump size limit.4.2.1-5.3.15.4.0-5.6.0
3334031When you configure or unconfigure a BGP peer and interface towards a host, memory corruption can cause BGP to crash.4.3.0-4.4.54.2.1-4.3.1, 4.4.0-5.3.14.3.2, 5.4.0-5.6.0
33330645.0.0-5.6.0
3288385On the EdgeCore AS7326-56X and AS7726-32X switch, the fan speed reports a minimum threshold in the logs.4.3.1-4.4.5
3269538The {{cl-ecmpcalc}} command prints the following error when the egress interface is a bond or SVI: - -ecmpcalc: will query hardware -Traceback (most recent call last): -File “/usr/cumulus/bin/cl-ecmpcalc”, line 986, in -isTrunkMbr, port = ecmp.getHdPort(hd_cmd) -File “/usr/cumulus/bin/cl-ecmpcalc”, line 618, in getHdPort -port = int(str4) -ValueError: invalid literal for int() with base 10: ‘0t -4.3.0-4.4.5
3269537 When an FRR routing service (such as {{bgpd}}) becomes unresponsive, {{watchfrr}} might fail to stop and restart service. To work around this issue, restart FRR with the {{systemctl restart frr}} command. 4.4.0-5.3.1 5.4.0-5.6.0
3267353In a QinQ configuration, if the VLAN priority is a non-zero value, double-tagged packets are translated to triple-tagged packets. 4.3.1-4.4.5
3244740 If you have a lot of inbound route maps that match lists with many regex statements, a large number of updates from the peer can cause the system to run out of memory. To work around this issue, reduce the number of regex matches in inbound route maps. 4.4.0-5.2.15.3.0-5.6.0
3240406When you configure or unconfigure a BGP peer and interface towards a host, memory corruption can cause BGP to crash.4.3.0-5.3.15.4.0-5.6.0
3236334Using ARP suppression with a very large number of interfaces might result in missing ARP entries on the local device or buffer underrun warnings in the {{neighmgrd}} log.4.3.0-4.4.5
3235956With certain triggers on Broadcom switches, such as adding or deleting a VNI or reloading the network, Cumulus Linux might consider the underlay routes as overlay routes. In this case, {{switchd}} allocates the overlay next hop, which is incorrect and might affect traffic forwarding.4.3.0-4.4.5
3234031If BGP {{neighbor <name> allowas-in}} is set, negating with no {{no neighbor <name> allowas-in}} does not disable the setting. To work around this issue and disable the setting, restart the FRR service.4.2.1-5.2.15.3.0-5.6.04.3.2, 5.3.0-5.6.0
3221470
3192808 When the switch receives an LLDP frame from a Cisco router right after a {{ptmd}} restart, the {{ptmd}} service crashes.4.3.0-5.2.15.3.0-5.6.04.3.0-4.3.1, 4.4.0-5.2.14.3.2, 5.3.0-5.6.0
3168564
2771653When using W-ECMP, the weights for various BGP next hops can sometimes be in the range of 100s or more, which consumes a lot of hardware space.4.3.0-4.4.5
2763819 When you enable LACP bypass on a bond, traffic to static MAC addresses configured on the bond might not work when LACP bypass is enforced. 4.4.0-4.4.5
2555175Control Plane Traffic (example - BGP peering from Leaf to Spine) goes down on Leaf due to Hold Down Timer Expiration of peer following prolonged link flaps on downlinks when vxlan enabled vlans are carried on the flapping link.3.7.15-3.7.16, 4.2.1-4.4.5
2554986 The {{ethtool}} utility doesn't contain the latest values, as a result the {{Revision Compliance}} field shows {{Unallocated}}. 4.2.1-4.4.54.3.0-4.3.14.3.0-4.3.2
2734173 CVE-2021-27212: A vulnerability in the Certificate List Exact Assertion validation was discovered in OpenLDAP, a free implementation of the Lightweight Directory Access Protocol. An unauthenticated remote attacker can take advantage of this flaw to cause a denial of service (slapd daemon crash) via specially crafted packets. Vulnerable: <= 2.4.47+dfsg-3+deb10u5 Fixed: 2.4.47+dfsg-3+deb10u64.0.0-4.3.14.0.0-4.3.2
2695526 CVE-2021-3580 CVE-2021-20305: Multiple vulnerabilities were discovered in nettle, a low level cryptographic library, which could result in denial of service (remote crash in RSA decryption via specially crafted ciphertext, crash on ECDSA signature verification) or incorrect verification of ECDSA signatures. Vulnerable: 3.4.1-1 Fixed: 3.4.1-1+deb10u14.0.0-4.3.14.0.0-4.3.2
26915064.3.0-4.3.14.3.0-4.3.2
2687159 CVE-2018-25009 CVE-2018-25010 CVE-2018-25011 CVE-2018-25012 CVE-2018-25013 CVE-2018-25014 CVE-2020-36328 CVE-2020-36329 CVE-2020-36330 CVE-2020-36331 CVE-2020-36332: Multiple vulnerabilities were discovered in libwebp, the implementation of the WebP image format, which could result in denial of service, memory disclosure or potentially the execution of arbitrary code if malformed images are processed. Vulnerable: 0.6.1-2 Fixed: 0.6.1-2+deb10u14.0.0-4.3.14.0.0-4.3.2
2684418 CVE-2020-12762: integer overflow in the json-c JSON library, which could result in denial of service or potentially the execution of arbitrary code if large malformed JSON files are processed. Vulnerable: 0.12.2+cl4u1 Fixed: 0.12.2+cl4.4.0u14.0.0-4.3.14.0.0-4.3.2
2682780 Adding a route map configuration after a MAC access list configuration line causes the route map configuration to be applied incorrectly. To work around this issue, add the MAC access list configuration to the end of the {{/etc/frr/frr.conf}} file.4.2.0-4.3.14.2.0-4.3.2
2679948 CVE-2021-25217: parsing of stored leases by dhclient or dhcpd has an incorrect length check that may cause a crash. Vulnerable: <= 4.3.1-6-cl3.7.14u1 Fixed: 4.3.1-6-cl3.7.16u13.7.0-3.7.15, 4.0.0-4.3.13.7.0-3.7.15, 4.0.0-4.3.2
26799364.0.0-4.3.14.0.0-4.3.2
2669873 In an EVPN multihoming configuration, ARP/ND traffic coming in one switch is being sent back out the originating bond on the other switches in the ES on remote PE switches. Normally Split Horizon filtering prevents this kind of traffic at the remote PE. 4.3.0-4.3.14.3.0-4.3.2
2669073 On Spectrum, Spectrum-2, and Spectrum-3 switches, the {{l1-show}} command shows the wrong data when the MST service is stopped. To work around this issue, start the MST service with the {{sudo mst start}} command.4.3.0-4.3.14.3.0-4.3.2
2666838 CVE-2021-31535: missing length validation in various functions provided by libx11, the X11 client-side library, allow to inject X11 protocol commands on X clients, leading to authentication bypass, denial of service or potentially the execution of arbitrary code. Vulnerable: <= 1.6.7-1+deb10u1 Fixed: 1.6.7-1+deb10u24.0.0-4.3.14.0.0-4.3.2
2663479 CVE-2021-3520: integer overflow flaw in lz4, a fast LZ compression algorithm library, resulting in memory corruption. Vulnerable: 1.8.3-1 Fixed: 1.8.3-1+deb10u14.0.0-4.3.14.0.0-4.3.2
2656527 CVE-2020-18032: A buffer overflow was discovered in Graphviz, which could potentially result in the execution of arbitrary code when processing a malformed file. Vulnerable: 2.40.1-6 Fixed: 2.40.1-6+deb10u14.0.0-4.3.14.0.0-4.3.2
2648658 If you try to use more than one percent of {{max-ecmp-nexthops}}, you get an error indicating a failure.3.7.15-4.3.13.7.15-4.3.2
26485874.0.0-4.3.14.0.0-4.3.2
2643822
2632379 When you upgrade the switch with {{apt-get upgrade}}, the {{kexec-tools}} package is not installed, which causes the Smart System Manager fast restart mode to work incorrectly.4.3.0-4.3.14.3.0-4.3.2
2628693 CVE-2020-12695: hostapd does not properly handle UPnP subscribe messages under certain conditions, allowing an attacker to cause a denial of service. Vulnerable: <= 2.8.0-cl3.7.15u2 Fixed: 2.8.0-cl3.7.15u33.7.14-3.7.14.2, 4.3.0-4.3.13.7.14-3.7.14.2, 4.3.0-4.3.2
26170004.0.0-4.3.14.0.0-4.3.2
2616998 CVE-2021-23358: missing input sanitising in the template() function of the Underscore JavaScript library could result in the execution of arbitrary code. Vulnerable: 1.9.1~dfsg-1 Fixed: 1.9.1~dfsg-1+deb10u14.0.0-4.3.14.0.0-4.3.2
2616987 CVE-2020-6851 CVE-2020-8112 CVE-2020-15389 CVE-2020-27814 CVE-2020-27823 CVE-2020-27824 CVE-2020-27841 CVE-2020-27842 CVE-2020-27843 CVE-2020-27845: Multiple vulnerabilities have been discovered in openjpeg2, the open-source JPEG 2000 codec, which could result in denial of service or the execution of arbitrary code when opening a malformed image. Vulnerable: <= 2.3.0-2+deb10u1 Fixed: 2.3.0-2+deb10u24.0.0-4.3.14.0.0-4.3.2
26169764.0.0-4.3.14.0.0-4.3.2
2616967 CVE-2021-28957: lxml, a Python binding for the libxml2 and libxslt libraries, did not properly sanitize its input. This would allow a malicious user to mount a cross-site scripting attack. Vulnerable: <= 4.3.2-1+deb10u2 Fixed: 4.3.2-1+deb10u34.0.0-4.3.14.0.0-4.3.2
2616964 CVE-2021-27291: Pygments, a syntax highlighting package written in Python 3, used regular expressions which could result in denial of service. Vulnerable: <= 2.3.1+dfsg-1+deb10u1 Fixed: 2.3.1+dfsg-1+deb10u24.0.0-4.3.14.0.0-4.3.2
2616954 CVE-2021-3449: A NULL pointer dereference was found in the signature_algorithms processing in OpenSSL, a Secure Sockets Layer toolkit, which could result in denial of service. Vulnerable: <= 1.1.1d-0+deb10u5 Fixed: 1.1.1d-0+deb10u64.0.0-4.3.14.0.0-4.3.2
2614016 The switch firmware incorrectly identifies Lenovo LR4 transceivers (part number 00YD278) and does not set the laser levels properly, which can prevent the link from coming up or might cause the transceiver to be identified as a 1G module.4.2.0-4.3.14.2.0-4.3.2
2582639 On NVIDIA Spectrum switches, BUM traffic might be dropped during VXLAN decapsulation in an EVPN multihoming environment after multiple PIM uplink interfaces flap.4.3.0-4.3.14.3.0-4.3.2
2578872 CVE-2021-20270: It was discovered that Pygments, a syntax highlighting package written in Python, could be forced into an infinite loop, resulting in denial of service. Vulnerable: 2.3.1+dfsg-1 Fixed: 2.3.1+dfsg-1+deb10u14.0.0-4.3.14.0.0-4.3.2
2578870 CVE-2020-35523 CVE-2020-35524: Two vulnerabilities have been discovered in the libtiff library and the included tools, which may result in denial of service or the execution of arbitrary code if malformed image files are processed. Vulnerable: <= 4.1.0+git191117-2~deb10u1 Fixed: 4.1.0+git191117-2~deb10u24.0.0-4.3.14.0.0-4.3.2
2578845
2577499 QSFP+ 40G optics do not work on Spectrum platforms.4.3.0-4.3.14.3.0-4.3.2
2566878 CVE-2021-27803: A vulnerability was discovered in how p2p/p2p_pd.c in wpa_supplicant before 2.10 processes P2P (Wi-Fi Direct) provision discovery requests. It could result in denial of service or other impact (potentially execution of arbitrary code), for an attacker within radio range.3.7.14-3.7.14.2, 4.0.0-4.3.13.7.14-3.7.14.2, 4.0.0-4.3.2
25645344.0.0-4.3.14.0.0-4.3.2
2556814 2556781 CVE-2021-0326: An issue has been found in wpa, a set of tools to support WPA and WPA2 (IEEE 802.11i). Missing validation of data can result in a buffer over-write, which might lead to a DoS of the wpa_supplicant process or potentially arbitrary code execution. Vulnerable: <= 2.8.0-cl3.7.14u1, <= 2.8.0-cl4.2.1u13.7.14-3.7.14.2, 4.0.0-4.3.13.7.14-3.7.14.2, 4.0.0-4.3.2
2556777 CVE-2021-26937: A flaw in the handling of combining characters in screen, a terminal multiplexer with VT100/ANSI terminal emulation can result in denial of service, or potentially the execution of arbitrary code via a specially crafted UTF-8 character sequence. Vulnerable: 4.6.2-3 Fixed: 4.6.2-3+deb10u14.0.0-4.3.14.0.0-4.3.2
2556774 CVE-2020-8625: A buffer overflow vulnerability was discovered in the SPNEGO implementation affecting the GSSAPI security policy negotiation in BIND, a DNS server implementation, which could result in denial of service (daemon crash), or potentially the execution of arbitrary code. Vulnerable: <= 9.11.5.P4+dfsg-5.1+deb10u2 Fixed: 9.11.5.P4+dfsg-5.1+deb10u34.0.0-4.3.14.0.0-4.3.2
2556690 CVE-2020-35498: A vulnerability was found in openvswitch. A limitation in the implementation of userspace packet parsing can allow a malicious user to send a specially crafted packet causing the resulting megaflow in the kernel to be too wide, potentially causing a denial of service. The highest threat from this vulnerability is to system availability. Vulnerable: <= 2.8.90-1-cl4u5 Fixed: 2.8.90-1-cl4u6, 2.8.90-1-cl4.4.0u1, 2.8.90-1-cl5.0.0u84.0.0-4.3.14.0.0-4.3.2
2556568
2554299 In a VRRP configuration, BGP unnumbered sessions for VRFs fail to establish after a networking restart.4.2.0-4.3.14.2.0-4.3.2
2550704 On the Mellanox SN3420 switch, 25G SR optics only link up in force mode.4.3.0-4.3.14.3.0-4.3.2
2549371 When Optimized Multicast Flooding (OMF) is enabled with the {{bridge.optimized_mcast_flood = TRUE}} setting in the {{/etc/cumulus/switchd.conf}} file, the switch continues to flood IPv6 multicast traffic to all slave ports when there is no MLD join receive.3.7.11-4.3.13.7.11-4.3.2
2545239 On the Mellanox switch with the Spectrum-2 ASIC, Precision Time Protocol (PTP) is not currently supported. 4.0.0-4.3.14.0.0-4.3.2
\ No newline at end of file diff --git a/content/cumulus-linux-50/Installation-Management/Installing-a-New-Cumulus-Linux-Image.md b/content/cumulus-linux-50/Installation-Management/Installing-a-New-Cumulus-Linux-Image.md index a3c23daa98..1acb19595c 100644 --- a/content/cumulus-linux-50/Installation-Management/Installing-a-New-Cumulus-Linux-Image.md +++ b/content/cumulus-linux-50/Installation-Management/Installing-a-New-Cumulus-Linux-Image.md @@ -323,7 +323,7 @@ You can run several installer command line options from ONIE to perform basic sw - Execute a ZTP script to perform necessary configuration {{%notice note%}} -The `onie-nos-install` command does *not* allow you specify command line parameters. You must access the switch from the console and transfer a disk image to the switch. You must then make the disk image executable and install the image directly from the ONIE command line with the options you want to use. +The `onie-nos-install` command does *not* allow you to specify command line parameters. You must access the switch from the console and transfer a disk image to the switch. You must then make the disk image executable and install the image directly from the ONIE command line with the options you want to use. The following example commands transfer a disk image to the switch, make the image executable, and install the image with the `--password` option to change the default cumulus user password: diff --git a/content/cumulus-linux-50/Layer-1-and-Switch-Ports/DHCP/DHCP-Relays.md b/content/cumulus-linux-50/Layer-1-and-Switch-Ports/DHCP/DHCP-Relays.md index 6e81e82bcb..47174c87e9 100644 --- a/content/cumulus-linux-50/Layer-1-and-Switch-Ports/DHCP/DHCP-Relays.md +++ b/content/cumulus-linux-50/Layer-1-and-Switch-Ports/DHCP/DHCP-Relays.md @@ -103,7 +103,7 @@ cumulus@leaf01:~$ nv config apply ## Optional Configuration -This section describes optional DHCP relay configuration. The steps provided in this section assume that you already done basic DHCP relay configuration, described above. +This section describes optional DHCP relay configurations. The steps provided in this section assume that you have already configured basic DHCP relay, as described above. ### DHCP Agent Information Option (Option 82) diff --git a/content/cumulus-linux-50/Layer-1-and-Switch-Ports/DHCP/DHCP-Snooping.md b/content/cumulus-linux-50/Layer-1-and-Switch-Ports/DHCP/DHCP-Snooping.md new file mode 100644 index 0000000000..8454c280ef --- /dev/null +++ b/content/cumulus-linux-50/Layer-1-and-Switch-Ports/DHCP/DHCP-Snooping.md @@ -0,0 +1,91 @@ +--- +title: DHCP Snooping +author: NVIDIA +weight: 355 +toc: 3 +--- +DHCP snooping enables Cumulus Linux to act as a middle layer between the DHCP infrastructure and DHCP clients by scanning DHCP control packets and building an IP-MAC database. Cumulus Linux accepts DHCP offers from only trusted interfaces and can rate limit packets. + +{{%notice note%}} +DHCP option 82 processing is not supported. +{{%/notice%}} + +## Configure DHCP Snooping + +To configure DHCP snooping, you need to: + +- Enable DHCP snooping on a VLAN. +- Add a trusted interface. Cumulus Linux allows DHCP offers from only trusted interfaces to prevent malicious DHCP servers from assigning IP addresses inside the network. The interface must be a member of the bridge specified. +- Set the rate limit for DHCP requests to avoid DoS attacks. The default value is 100 packets per second. + +The following example shows you how to configure DHCP snooping for IPv4 and IPv6. + +{{%notice note%}} +NVUE does not provide commands to configure DHCP Snooping. +{{%/notice%}} + +Create the `/etc/dhcpsnoop/dhcp_snoop.json` file and add DHCP snooping configuration under the bridge. + +The following example enables DHCP snooping for IPv4 on VLAN 10, sets the rate limit to 50 and the trusted interface to swp3. swp3 is a member of the bridge `br_default`: + +``` +cumulus@leaf01:~$ sudo nano /etc/dhcpsnoop/dhcp_snoop.json +{ + "bridge": [ + { + "bridge_id": "br_default", + "vlan": [ + { + "vlan_id": 10, + "snooping": 1, + "rate_limit": 50, + "ip_version": 4, + "trusted_interface": [ + "swp3" + ], + } + ] + } + ] +} +``` + +The following example enables DHCP snooping for IPv6 on VLAN 10, sets the rate limit to 50 and the trusted interface to swp6. swp6 is a member of the bridge `br_default`: + +``` +cumulus@leaf01:~$ sudo nano /etc/dhcpsnoop/dhcp_snoop.json +{ + "bridge": [ + { + "bridge_id": "br_default", + "vlan": [ + { + "vlan_id": 10, + "snooping": 1, + "rate_limit": 50, + "ip_version": 6, + "trusted_interface": [ + "swp6" + ], + } + ] + } + ] +} +``` + +When DHCP snooping detects a violation, the packet is dropped and a message is logged to the `/var/log/dhcpsnoop.log` file. + +## Show the DHCP Binding Table + +To show the DHCP binding table, run the `net show dhcp-snoop table` command for IPv4 or the `net show dhcp-snoop6 table` command for IPv6. The following example command shows the DHCP binding table for IPv4: + +``` +cumulus@leaf01:~$ net show dhcp-snoop table +Port VLAN IP MAC Lease State Bridge +---- ---- --------- ----------------- ----- ----- ------ + +swp5 1002 10.0.0.3 00:02:00:00:00:04 7200 ACK br0 + +swp5 1000 10.0.1.3 00:02:00:00:00:04 7200 ACK br0 +``` diff --git a/content/cumulus-linux-50/Layer-1-and-Switch-Ports/DHCP/_index.md b/content/cumulus-linux-50/Layer-1-and-Switch-Ports/DHCP/_index.md index f494b0f7c1..fd3f513c3c 100644 --- a/content/cumulus-linux-50/Layer-1-and-Switch-Ports/DHCP/_index.md +++ b/content/cumulus-linux-50/Layer-1-and-Switch-Ports/DHCP/_index.md @@ -4,4 +4,7 @@ author: NVIDIA weight: 338 toc: 3 --- -This section describes how to configure [DHCP](## "Dynamic Host Configuration Protocol") relays and [DHCP](## "Dynamic Host Configuration Protocol") servers. +This section describes how to configure: +- {{}} +- {{}} +- {{}} diff --git a/content/cumulus-linux-50/Layer-1-and-Switch-Ports/Interface-Configuration-and-Management/Switch-Port-Attributes.md b/content/cumulus-linux-50/Layer-1-and-Switch-Ports/Interface-Configuration-and-Management/Switch-Port-Attributes.md index d32afc95e7..194bfde94c 100644 --- a/content/cumulus-linux-50/Layer-1-and-Switch-Ports/Interface-Configuration-and-Management/Switch-Port-Attributes.md +++ b/content/cumulus-linux-50/Layer-1-and-Switch-Ports/Interface-Configuration-and-Management/Switch-Port-Attributes.md @@ -1069,7 +1069,7 @@ SN4600 64xQSFP56 (200GbE) interfaces support both PAM4 and NRZ encodings with al For lower speeds, PAM4 is automatically converted to NRZ encoding. -Only 32xQSFP56 ports can brea kout into 4xSFP56 (4x50GbE). But, in this case, the adjacent QSFP56 port are blocked (only the 1st/3rd or 2nd/4th rows can break out into 4xSFP56). +Only 32xQSFP56 ports can break out into 4xSFP56 (4x50GbE). But, in this case, the adjacent QSFP56 port are blocked (only the 1st/3rd or 2nd/4th rows can break out into 4xSFP56). All 64xQSFP56 ports can break out into 2xQSFP56 (2x100GbE) without blocking ports. diff --git a/content/cumulus-linux-50/Layer-1-and-Switch-Ports/Interface-Configuration-and-Management/_index.md b/content/cumulus-linux-50/Layer-1-and-Switch-Ports/Interface-Configuration-and-Management/_index.md index ccae6045d6..b85cbf01b7 100644 --- a/content/cumulus-linux-50/Layer-1-and-Switch-Ports/Interface-Configuration-and-Management/_index.md +++ b/content/cumulus-linux-50/Layer-1-and-Switch-Ports/Interface-Configuration-and-Management/_index.md @@ -411,7 +411,7 @@ If you specify a subinterface, such as swp1.100, then run `ifup swp1.100`, Cumul You can specify both IPv4 and IPv6 addresses for the same interface. For IPv6 addresses: -- You can create or modify the IP address for an interface using either `::` or `0:0:0` notation. For example,both 2620:149:43:c109:0:0:0:5 and 2001:DB8::1/126 are valid. +- You can create or modify the IP address for an interface using either `::` or `0:0:0` notation. For example, both 2620:149:43:c109:0:0:0:5 and 2001:DB8::1/126 are valid. - Cumulus Linux assigns the IPv6 address with all zeroes in the interface identifier (2001:DB8::/126) for each subnet; connected hosts cannot use this address. The following example commands configure three IP addresses for swp1; two IPv4 addresses and one IPv6 address. diff --git a/content/cumulus-linux-50/Layer-2/IGMP-and-MLD-Snooping.md b/content/cumulus-linux-50/Layer-2/IGMP-and-MLD-Snooping.md index dcbfe19edc..c3cfcbf10a 100644 --- a/content/cumulus-linux-50/Layer-2/IGMP-and-MLD-Snooping.md +++ b/content/cumulus-linux-50/Layer-2/IGMP-and-MLD-Snooping.md @@ -85,7 +85,7 @@ cumulus@switch:~$ sudo ifreload -a ## Optimized Multicast Flooding (OMF) -IGMP snooping restricts multicast forwarding only to the ports that receive IGMP report messages. If the ports do not receive IGMP reports, multicast traffic floods to all ports in the bridge domain (also know as unregistered multicast (URMC) traffic). To restrict this flooding to only mrouter ports, you can enable OMF. +IGMP snooping restricts multicast forwarding only to the ports that receive IGMP report messages. If the ports do not receive IGMP reports, multicast traffic floods to all ports in the bridge domain (also known as unregistered multicast (URMC) traffic). To restrict this flooding to only mrouter ports, you can enable OMF. To enable OMF: diff --git a/content/cumulus-linux-50/Layer-2/Virtual-Router-Redundancy-VRR-and-VRRP.md b/content/cumulus-linux-50/Layer-2/Virtual-Router-Redundancy-VRR-and-VRRP.md index ccc60fa3a7..4766907606 100644 --- a/content/cumulus-linux-50/Layer-2/Virtual-Router-Redundancy-VRR-and-VRRP.md +++ b/content/cumulus-linux-50/Layer-2/Virtual-Router-Redundancy-VRR-and-VRRP.md @@ -96,8 +96,8 @@ The following example commands configure both 10.1.10.1/24 and 10.1.11.1/24 on V {{< tab "NVUE Commands ">}} ``` -cumulus@switch:mgmt:~$ nv set interface vlan10 ip vrr adress 10.1.10.1/24 -cumulus@switch:mgmt:~$ nv set interface vlan10 ip vrr adress 10.1.11.1/24 +cumulus@switch:mgmt:~$ nv set interface vlan10 ip vrr address 10.1.10.1/24 +cumulus@switch:mgmt:~$ nv set interface vlan10 ip vrr address 10.1.11.1/24 cumulus@switch:mgmt:~$ nv config apply ``` diff --git a/content/cumulus-linux-50/Layer-3/Border-Gateway-Protocol-BGP/Optional-BGP-Configuration.md b/content/cumulus-linux-50/Layer-3/Border-Gateway-Protocol-BGP/Optional-BGP-Configuration.md index d5cee2e518..6829f92a33 100644 --- a/content/cumulus-linux-50/Layer-3/Border-Gateway-Protocol-BGP/Optional-BGP-Configuration.md +++ b/content/cumulus-linux-50/Layer-3/Border-Gateway-Protocol-BGP/Optional-BGP-Configuration.md @@ -944,7 +944,7 @@ BGP add-path RX enables BGP to receive multiple paths for the same prefix. A pat To view the existing capabilities, run the vtysh `show ip bgp neighbors` command. You can see the existing capabilities in the subsection *Add Path*, below *Neighbor capabilities.* -The following example output shows that BGP can sent and receive additional BGP paths, and that the BGP neighbor on swp51 supports both. +The following example output shows that BGP can send and receive additional BGP paths, and that the BGP neighbor on swp51 supports both. ``` cumulus@leaf01:~$ sudo vtysh diff --git a/content/cumulus-linux-50/Layer-3/Routing/Policy-based-Routing.md b/content/cumulus-linux-50/Layer-3/Routing/Policy-based-Routing.md index 692fc3c66f..50a1368480 100644 --- a/content/cumulus-linux-50/Layer-3/Routing/Policy-based-Routing.md +++ b/content/cumulus-linux-50/Layer-3/Routing/Policy-based-Routing.md @@ -28,7 +28,7 @@ A PBR policy contains one or more policy maps. Each policy map: - To match on a source and destination address, a policy map can contain both match source and match destination IP rules. - A set rule determines the PBR next hop for the policy. -To use PBR in Cumulus linux, you define a PBR policy and apply it to the ingress interface (the interface must already have an IP address assigned). Cumulus Linux matches traffic against the match rules in sequential order and forwards the traffic according to the set rule in the first match. Traffic that does not match any rule passes on to the normal destination based routing mechanism. +To use PBR in Cumulus Linux, you define a PBR policy and apply it to the ingress interface (the interface must already have an IP address assigned). Cumulus Linux matches traffic against the match rules in sequential order and forwards the traffic according to the set rule in the first match. Traffic that does not match any rule passes on to the normal destination based routing mechanism. To configure a PBR policy: diff --git a/content/cumulus-linux-50/Layer-3/Routing/Route-Filtering-and-Redistribution.md b/content/cumulus-linux-50/Layer-3/Routing/Route-Filtering-and-Redistribution.md index 9aeaf20e25..e902bb337a 100644 --- a/content/cumulus-linux-50/Layer-3/Routing/Route-Filtering-and-Redistribution.md +++ b/content/cumulus-linux-50/Layer-3/Routing/Route-Filtering-and-Redistribution.md @@ -176,7 +176,7 @@ The following example commands redistribute routing information from [OSPF](## " {{< tab "NVUE Commands ">}} ``` -cumulus@switch:~$ nv set vrf default router bgp address-family ipv4-unicast route-redistribute ospf +cumulus@switch:~$ nv set vrf default router bgp address-family ipv4-unicast redistribute ospf cumulus@switch:~$ nv config apply ``` @@ -203,7 +203,7 @@ To redistribute all directly connected networks, use the `redistribute connected {{< tab "NVUE Commands ">}} ``` -cumulus@switch:~$ nv set vrf default router bgp address-family ipv4-unicast route-redistribute connected +cumulus@switch:~$ nv set vrf default router bgp address-family ipv4-unicast redistribute connected cumulus@switch:~$ nv config apply ``` diff --git a/content/cumulus-linux-50/Layer-3/Routing/Supported-Route-Table-Entries.md b/content/cumulus-linux-50/Layer-3/Routing/Supported-Route-Table-Entries.md index 294d4b9f28..7d6cb6c61d 100644 --- a/content/cumulus-linux-50/Layer-3/Routing/Supported-Route-Table-Entries.md +++ b/content/cumulus-linux-50/Layer-3/Routing/Supported-Route-Table-Entries.md @@ -23,9 +23,9 @@ Cumulus Linux provides several generalized profiles, described below. These prof The following tables list the number of MAC addresses, layer 3 neighbors, and LPM routes validated for each forwarding table profile. If you do not specify any profiles as described below, the switch uses the *default* values. {{%notice note%}} -The values in the following tables reflect results from testing, which can differ from published manufacturer specifications. +The values provided in the profiles below are the maximum values that Cumulus Linux software allocates; the theoretical hardware limits might be higher. These limits refer to values that have been validated as part of the unidimensional scale validation. If you try to achieve maximum scalability with multiple features enabled, results might differ from the values listed in this guide. {{%/notice%}} - + ### Spectrum |
Profile| MAC Addresses |
Layer 3 Neighbors| Longest Prefix Match (LPM) | diff --git a/content/cumulus-linux-50/Monitoring-and-Troubleshooting/FRRouting-Log-Message-Reference.md b/content/cumulus-linux-50/Monitoring-and-Troubleshooting/FRRouting-Log-Message-Reference.md index 8102a9ced5..5ec1b97caf 100644 --- a/content/cumulus-linux-50/Monitoring-and-Troubleshooting/FRRouting-Log-Message-Reference.md +++ b/content/cumulus-linux-50/Monitoring-and-Troubleshooting/FRRouting-Log-Message-Reference.md @@ -13,13 +13,13 @@ The following table lists the HIGH severity ERROR log messages generated by FRR. | Babel | HIGH | 16777218 | BABEL Packet Error | Babel has detected a packet encode/decode problem. | Collect the relevant log files and report the issue for troubleshooting.| | Babel | HIGH | 16777219 | BABEL Configuration Error | Babel has detected a configuration error of some sort. | Ensure that the configuration is correct. | | Babel | HIGH | 16777220 | BABEL Route Error | Babel has detected a routing error and is in an inconsistent state. | Gather data to report the issue for troubleshooting. Restart FRR. | -| BGP | HIGH | 33554433 | BGP attribute flag is incorrect | BGP attribute flag is set to the wrong value (Optional/Transitive/Partial). | Determine the soure of the attribute and determine why the attribute flag has been set incorrectly. | -| BGP | HIGH | 33554434 | BGP attribute length is incorrect | BGP attribute length is incorrect. | Determine the soure of the attribute and determine why the attribute length has been set incorrectly. | -| BGP | HIGH | 33554435 | BGP attribute origin value invalid | BGP attribute origin value is invalid. | Determine the soure of the attribute and determine why the origin attribute has been set incorrectly. | -| BGP | HIGH | 33554436 | BGP as path is invalid | BGP AS path has been malformed. | Determine the soure of the update and determine why the AS path has been set incorrectly. | -| BGP | HIGH | 33554437 | BGP as path first as is invalid | BGP update has invalid first AS in AS path. | Determine the soure of the update and determine why the AS path first AS value has been set incorrectly. | -| BGP | HIGH | 33554439 | BGP PMSI tunnel attribute type is invalid | BGP update has invalid type for PMSI tunnel. | Determine the soure of the update and determine why the PMSI tunnel attribute type has been set incorrectly. | -| BGP | HIGH | 33554440 | BGP PMSI tunnel attribute length is invalid | BGP update has invalid length for PMSI tunnel. | Determine the soure of the update and determine why the PMSI tunnel attribute length has been set incorrectly. | +| BGP | HIGH | 33554433 | BGP attribute flag is incorrect | BGP attribute flag is set to the wrong value (Optional/Transitive/Partial). | Determine the source of the attribute and determine why the attribute flag has been set incorrectly. | +| BGP | HIGH | 33554434 | BGP attribute length is incorrect | BGP attribute length is incorrect. | Determine the source of the attribute and determine why the attribute length has been set incorrectly. | +| BGP | HIGH | 33554435 | BGP attribute origin value invalid | BGP attribute origin value is invalid. | Determine the source of the attribute and determine why the origin attribute has been set incorrectly. | +| BGP | HIGH | 33554436 | BGP as path is invalid | BGP AS path has been malformed. | Determine the source of the update and determine why the AS path has been set incorrectly. | +| BGP | HIGH | 33554437 | BGP as path first as is invalid | BGP update has invalid first AS in AS path. | Determine the source of the update and determine why the AS path first AS value has been set incorrectly. | +| BGP | HIGH | 33554439 | BGP PMSI tunnel attribute type is invalid | BGP update has invalid type for PMSI tunnel. | Determine the source of the update and determine why the PMSI tunnel attribute type has been set incorrectly. | +| BGP | HIGH | 33554440 | BGP PMSI tunnel attribute length is invalid | BGP update has invalid length for PMSI tunnel. | Determine the source of the update and determine why the PMSI tunnel attribute length has been set incorrectly. | | BGP | HIGH | 33554442 | BGP peergroup operated on in error | BGP operating on peer-group instead of peers included. | Ensure the configuration doesn't contain peer-groups contained within peer-groups. | | BGP | HIGH | 33554443 | BGP failed to delete peer structure | BGP was unable to delete the peer structure when the address-family was removed. | Determine if all expected peers are removed and restart FRR if not. This is most likely a bug. | | BGP | HIGH | 33554444 | BGP failed to get table chunk memory | BGP unable to get chunk memory for table manager. | Ensure there is adequate memory on the device to support the table requirements. | @@ -38,8 +38,8 @@ The following table lists the HIGH severity ERROR log messages generated by FRR. | BGP | HIGH | 33554457 | BGP error receiving keepalive packet | BGP unable to process a keepalive packet. | BGP keepalive received while in a stopped state. If the problem persists, report it for troubleshooting. | | BGP | HIGH | 33554458 | BGP error receiving route refresh message | BGP unable to process route refresh message. | BGP route refresh received while in a stopped state. If the problem persists, report it for troubleshooting. | | BGP | HIGH | 33554459 | BGP error capability message | BGP unable to process received capability. | BGP capability message received while in a stopped state. If the problem persists, report it for troubleshooting. | -| BGP | HIGH | 33554460 | BGP error with nexthopo update | BGP unable to process nexthop update. | BGP received the nexthop update but the nexthop is not reachable in this BGP instance. Report the problem for troubleshooting. | -| BGP | HIGH | 33554461 | Failure to apply label | BGP attempted to attempted to apply a label but could not do so. | This is most likely a bug. If the problem persists, report it for troubleshooting. | +| BGP | HIGH | 33554460 | BGP error with nexthop update | BGP unable to process nexthop update. | BGP received the nexthop update but the nexthop is not reachable in this BGP instance. Report the problem for troubleshooting. | +| BGP | HIGH | 33554461 | Failure to apply label | BGP attempted to apply a label but could not do so. | This is most likely a bug. If the problem persists, report it for troubleshooting. | | BGP | HIGH | 33554462 | Multipath specified is invalid | BGP was started with an invalid ECMP/multipath value. | Correct the ECMP/multipath value supplied when starting the BGP daemon. | | BGP | HIGH | 33554463 | Failure to process a packet | BGP attempted to process a received packet but could not do so. | This is most likely a bug. If the problem persists, report it for troubleshooting. | | BGP | HIGH | 33554464 | Failure to connect to peer | BGP attempted to send open to a peer but couldn't connect. | This is most likely a bug. If the problem persists, report it for troubleshooting. | @@ -62,7 +62,7 @@ The following table lists the HIGH severity ERROR log messages generated by FRR. | EIGRP | HIGH | 50331650 | EIGRP Configuration Error | EIGRP has detected a configuration error.| Correct the configuration issue. If it still persists, report the issue for troubleshooting.| | General | HIGH | 100663297 | Failure to raise or lower privileges | FRR attempted to raise or lower its privileges and was unable to do so. | Ensure that you are running FRR as the frr user and that the user has sufficient privileges to properly access root privileges. | | General | HIGH | 100663298 | VRF Failure on Start | Upon startup, FRR failed to properly initialize and start up the VRF subsystem. | Ensure that there is sufficient memory to start processes, then restart FRR. | -| General | HIGH | 100663299 | Socket Error | When attempting to access a socket, a system error occured and FRR was unable to properly complete the request. | Ensure that there are sufficient system resources available and ensure that the frr user has sufficient permisions to work. | +| General | HIGH | 100663299 | Socket Error | When attempting to access a socket, a system error occurred and FRR was unable to properly complete the request. | Ensure that there are sufficient system resources available and ensure that the frr user has sufficient permissions to work. | | General | HIGH | 100663303 | System Call Error | FRR has detected an error from using a vital system call and has probably already exited. | Ensure permissions are correct for FRR users and groups. Additionally, check that sufficient system resources are available. | | General | HIGH | 100663304 | VTY Subsystem Error | FRR has detected a problem with the specified configuration file. | Ensure the configuration file exists and has the correct permissions for operations. Additionally, ensure that all config lines are correct as well. | | General | HIGH | 100663305 | SNMP Subsystem Error | FRR has detected a problem with the SNMP library it uses. A callback from this subsystem has indicated some error. | Examine the callback message and ensure SNMP is properly set up and working. | @@ -86,7 +86,7 @@ The following table lists the HIGH severity ERROR log messages generated by FRR. | OSPF | HIGH | 134217729 | Failure to process a packet | OSPF attempted to process a received packet but could not do so. | This is most likely a bug. If the problem persists, report it for troubleshooting. | | OSPF | HIGH | 134217730 | Failure to process Router LSA | OSPF attempted to process a router LSA, but there was an advertising ID mismtach with the link ID. | Check the OSPF network configuration for any configuration issue. If the problem persists, report it for troubleshooting.| | OSPF | HIGH | 134217731 | OSPF Domain Corruption | OSPF attempted to process a router LSA, but there was an advertising ID mismtach with the link ID. | Check OSPF network database for a corrupted LSA. If the problem persists, shut down the OSPF domain and report the problem for troubleshooting. | -| OSPF | HIGH | 134217732 | OSPF Initialization failure | OSPF failed to initialized the OSPF default instance. | Ensure there is adequate memory on the device. If the problem persists, report it for troubleshooting. | +| OSPF | HIGH | 134217732 | OSPF Initialization failure | OSPF failed to initialize the OSPF default instance. | Ensure there is adequate memory on the device. If the problem persists, report it for troubleshooting. | | OSPF | HIGH | 134217733 | OSPF SR Invalid DB | OSPF segment routing database is invalid. | This is most likely a bug. If the problem persists, report it for troubleshooting. | | OSPF | HIGH | 134217734 | OSPF SR hash node creation failed | OSPF segment routing node creation failed. | This is most likely a bug. If the problem persists, report it for troubleshooting. | | OSPF | HIGH | 134217735 | OSPF SR Invalid lsa id | OSPF segment routing invalid LSA ID. | Restart the OSPF instance. If the problem persists, report it for troubleshooting. | diff --git a/content/cumulus-linux-50/Monitoring-and-Troubleshooting/Simple-Network-Management-Protocol-SNMP/Configure-SNMP.md b/content/cumulus-linux-50/Monitoring-and-Troubleshooting/Simple-Network-Management-Protocol-SNMP/Configure-SNMP.md index 92c3e67c5c..21b0dde209 100644 --- a/content/cumulus-linux-50/Monitoring-and-Troubleshooting/Simple-Network-Management-Protocol-SNMP/Configure-SNMP.md +++ b/content/cumulus-linux-50/Monitoring-and-Troubleshooting/Simple-Network-Management-Protocol-SNMP/Configure-SNMP.md @@ -158,7 +158,7 @@ You can authenticate the user in the following ways: - With no authentication password (if you specify `auth-none`) - With an MD5 password -- With a SHA password +- With an SHA password {{< tabs "username" >}} {{< tab "NVUE Commands" >}} diff --git a/content/cumulus-linux-50/Monitoring-and-Troubleshooting/Simple-Network-Management-Protocol-SNMP/Supported-MIBs.md b/content/cumulus-linux-50/Monitoring-and-Troubleshooting/Simple-Network-Management-Protocol-SNMP/Supported-MIBs.md index 709b5520e6..ea1509e8d5 100644 --- a/content/cumulus-linux-50/Monitoring-and-Troubleshooting/Simple-Network-Management-Protocol-SNMP/Supported-MIBs.md +++ b/content/cumulus-linux-50/Monitoring-and-Troubleshooting/Simple-Network-Management-Protocol-SNMP/Supported-MIBs.md @@ -10,7 +10,7 @@ Below are the MIBs that Cumulus Linux supports, as well as suggested uses for th |
MIB Name | Suggested Uses | | -------- | -------------- | | {{}}
{{}}
{{}}
{{}} | You can enable FRR SNMP support to provide support for OSPF-MIB (RFC-1850), OSPFV3-MIB (RFC-5643), and BGP4-MIB (RFC-1657). | -| {{}} | Cumulus Linux also includes its own BGP unnumbered MIB for BGP unnumbered peers, defined in `/usr/share/snmp/mibs/Cumulus-BGPUN-MIB.txt`, which has the OID `1.3.6.1.4.1.40310.7`. CUMULUS-BGPVRF-MIB replaces CUMULUS-BGPUN-MIB.| +| {{}} | Cumulus Linux also includes its own BGP unnumbered MIB for BGP unnumbered peers, defined in `/usr/share/snmp/mibs/Cumulus-BGPUN-MIB.txt`, which has the OID `1.3.6.1.4.1.40310.7`. | | {{}} | Discard counters: Cumulus Linux also includes its own counters MIB, defined in `/usr/share/snmp/mibs/Cumulus-Counters-MIB.txt`. It has the OID `.1.3.6.1.4.1.40310.2`. | | {{}} | Cumulus Linux includes its own resource utilization MIB, which is similar to using `cl-resource-query`. This MIB monitors layer 3 entries by host, route, nexthops, ECMP groups, and layer 2 MAC/BDPU entries. `/usr/share/snmp/mibs/Cumulus-Resource-Query-MIB.txt` defines this MIB, which has the OID `.1.3.6.1.4.1.40310.1`. | | {{}} | SNMP counters. For information on exposing CPU and memory information with SNMP, see this [knowledge base article]({{}}). | diff --git a/content/cumulus-linux-50/Monitoring-and-Troubleshooting/Troubleshooting-Network-Interfaces/Troubleshoot-Layer-1.md b/content/cumulus-linux-50/Monitoring-and-Troubleshooting/Troubleshooting-Network-Interfaces/Troubleshoot-Layer-1.md index d312fa72e4..8400d928ba 100644 --- a/content/cumulus-linux-50/Monitoring-and-Troubleshooting/Troubleshooting-Network-Interfaces/Troubleshoot-Layer-1.md +++ b/content/cumulus-linux-50/Monitoring-and-Troubleshooting/Troubleshooting-Network-Interfaces/Troubleshoot-Layer-1.md @@ -761,7 +761,7 @@ Because I2C problems can be very pernicious, often showing up again much later a To verify that an I2C failure is occurring, run `sudo tail -F /var/log/syslog` and look for `smbus` or `i2c` or `EEPROM read` errors that continue to appear or appear in bursts. -Based on the failure scenario when tyou discover the issue, choose when to address this issue; immediately or during a maintenance window. +Based on the failure scenario when you discover the issue, choose when to address this issue; immediately or during a maintenance window. - If traffic or the switch operates negatively and you cannot route traffic through a redundant network, you must do something immediately. - If you can route traffic around the failing switch, allowing troubleshooting to proceed on the failed switch, proceed to reroute traffic to find an appropriate time to troubleshoot the failing switch. diff --git a/content/cumulus-linux-50/Network-Virtualization/Ethernet-Virtual-Private-Network-EVPN/Basic-Configuration.md b/content/cumulus-linux-50/Network-Virtualization/Ethernet-Virtual-Private-Network-EVPN/Basic-Configuration.md index 3b19c79fcb..6e2169f328 100644 --- a/content/cumulus-linux-50/Network-Virtualization/Ethernet-Virtual-Private-Network-EVPN/Basic-Configuration.md +++ b/content/cumulus-linux-50/Network-Virtualization/Ethernet-Virtual-Private-Network-EVPN/Basic-Configuration.md @@ -70,7 +70,7 @@ cumulus@leaf01:~$ nv set vrf default router bgp neighbor swp51 address-family l2 cumulus@leaf01:~$ nv config apply ``` -You do not need enable the BGP control plane for all VNIs configured on the switch with NVUE with the `advertise-all-vni` option. FRR **is** aware of any local VNIs and MACs, and hosts (neighbors) associated with those VNIs. +You do not need to enable the BGP control plane for all VNIs configured on the switch with NVUE with the `advertise-all-vni` option. FRR **is** aware of any local VNIs and MACs, and hosts (neighbors) associated with those VNIs. After you run `nv config save`, the NVUE Commands create the following configuration snippet in the `/etc/nvue.d/startup.yaml` file: @@ -289,7 +289,7 @@ router bgp 65101 bgp router-id 10.10.10.1 neighbor swp51 interface remote-as external address-family l2vpn evpn -neighbor swp1 activate +neighbor swp51 activate advertise-all-vni ... ``` @@ -305,7 +305,7 @@ spine01(config)# router bgp 65199 spine01(config-router)# bgp router-id 10.10.10.101 spine01(config-router)# neighbor swp1 interface remote-as external spine01(config-router)# address-family l2vpn evpn -spine01(config-router-af)# neighbor swp51 activate +spine01(config-router-af)# neighbor swp1 activate spine01(config-router-af)# end spine01)# write memory spine01)# exit diff --git a/content/cumulus-linux-50/System-Configuration/Authentication-Authorization-and-Accounting/LDAP-Authentication-and-Authorization.md b/content/cumulus-linux-50/System-Configuration/Authentication-Authorization-and-Accounting/LDAP-Authentication-and-Authorization.md index fbe8e4e8d7..64a23c02c6 100644 --- a/content/cumulus-linux-50/System-Configuration/Authentication-Authorization-and-Accounting/LDAP-Authentication-and-Authorization.md +++ b/content/cumulus-linux-50/System-Configuration/Authentication-Authorization-and-Accounting/LDAP-Authentication-and-Authorization.md @@ -57,10 +57,11 @@ Entering incorrect information during the installation process produces configur - Edit the `/etc/nslcd.conf` file to update the LDAP URI and search base DN (see {{}}, below). - Edit the `/etc/nssswitch.conf` file to update the service selections. -Be sure to restart `netd` after editing the files. +Restart `nvued.service` and `nginx-authenticator.service` after editing the files. ``` -cumulus@switch:~$ sudo systemctl restart netd.service +cumulus@switch:~$ sudo systemctl restart nvued.service +cumulus@switch:~$ sudo systemctl restart nginx-authenticator.service ``` {{< expand "Alternative Installation Method Using debconf-utils " >}} @@ -131,7 +132,7 @@ After installation, update the main configuration file (`/etc/nslcd.conf`) to ac This section documents some of the more important options that relate to security and queries. For details on all the available configuration options, read the {{}}. {{%notice note%}} -After first editing the `/etc/nslcd.conf` file and/or enabling LDAP in the `/etc/nsswitch.conf` file, you must restart `netd` with the `sudo systemctl restart netd` command. If you disable LDAP, you need to restart the `netd` service. +After editing the `/etc/nslcd.conf` file or enabling LDAP in the `/etc/nsswitch.conf` file, you must restart the NVUE and nginx-authenticator services with the `sudo systemctl restart nvued.service` command and the `sudo systemctl restart nginx-authenticator.service` command. If you disable LDAP, you must also restart these two services. {{%/notice%}} ### Connection diff --git a/content/cumulus-linux-50/System-Configuration/Authentication-Authorization-and-Accounting/RADIUS-AAA.md b/content/cumulus-linux-50/System-Configuration/Authentication-Authorization-and-Accounting/RADIUS-AAA.md index d12209dd9d..f5306769cf 100644 --- a/content/cumulus-linux-50/System-Configuration/Authentication-Authorization-and-Accounting/RADIUS-AAA.md +++ b/content/cumulus-linux-50/System-Configuration/Authentication-Authorization-and-Accounting/RADIUS-AAA.md @@ -31,7 +31,18 @@ During package installation: ## Configure the RADIUS Client -To configure the RADIUS client, edit the `/etc/pam_radius_auth.conf` file: +To configure the RADIUS client, edit the `/etc/pam_radius_auth.conf` file. + +{{%notice note%}} + +After editing the `/etc/pam_radius_auth.conf` file, you must restart both `nvued.service` and `nginx-authenticator.service`: + +``` +cumulus@switch:~$ sudo systemctl restart nvued.service +cumulus@switch:~$ sudo systemctl restart nginx-authenticator.service +``` + +{{%/notice%}} 1. Add the hostname or IP address of at least one RADIUS server (such as a *{{}}* server on Linux), and the shared secret used to authenticate and encrypt communication with each server. diff --git a/content/cumulus-linux-50/System-Configuration/Authentication-Authorization-and-Accounting/TACACS.md b/content/cumulus-linux-50/System-Configuration/Authentication-Authorization-and-Accounting/TACACS.md index a2dbd68ee5..32aa90ad69 100644 --- a/content/cumulus-linux-50/System-Configuration/Authentication-Authorization-and-Accounting/TACACS.md +++ b/content/cumulus-linux-50/System-Configuration/Authentication-Authorization-and-Accounting/TACACS.md @@ -27,6 +27,17 @@ cumulus@switch:~$ sudo -E apt-get install tacplus-client ## Configure the TACACS+ Client +{{%notice note%}} + +After you configure TACACS+ settings, you must restart both `nvued.service` and `nginx-authenticator.service`: + +``` +cumulus@switch:~$ sudo systemctl restart nvued.service +cumulus@switch:~$ sudo systemctl restart nginx-authenticator.service +``` + +{{%/notice%}} + After installing TACACS+, edit the `/etc/tacplus_servers` file to add at least one server and one shared secret (key). You can specify the server and secret parameters in any order anywhere in the file. Whitespace (spaces or tabs) are not allowed. For example, if your TACACS+ server IP address is `192.168.0.30` and your shared secret is `tacacskey`, add these parameters to the `/etc/tacplus_servers` file: ``` @@ -127,10 +138,11 @@ The first `adduser` command prompts for information and a password. You can skip 3. Edit the `/etc/nsswitch.conf` file to add the keyword `tacplus` back to the line starting with `passwd` (the keyword you removed in the first step). -4. Restart the `nvued` service with the following command: +4. Restart the `nvued` service and the `nginx-authenticator` service with the following commands: ``` - cumulus@switch:~$ sudo systemctl restart nvued + cumulus@switch:~$ sudo systemctl restart nvued.service + cumulus@switch:~$ sudo systemctl restart nginx-authenticator.service ``` ## TACACS+ Accounting diff --git a/content/cumulus-linux-50/System-Configuration/Date-and-Time/Precision Time Protocol-PTP.md b/content/cumulus-linux-50/System-Configuration/Date-and-Time/Precision Time Protocol-PTP.md index 6ae85be44a..05755add0e 100644 --- a/content/cumulus-linux-50/System-Configuration/Date-and-Time/Precision Time Protocol-PTP.md +++ b/content/cumulus-linux-50/System-Configuration/Date-and-Time/Precision Time Protocol-PTP.md @@ -206,7 +206,7 @@ delay_mechanism E2E network_transport UDPv4 ``` -For a trunk port, add the VLAN configuration to the switch port stanza: set `l2_mode` to `trunk`, `vlan_intf` to the VLAN interface, and `src_ip` to match the IP adress of the VLAN interface: +For a trunk port, add the VLAN configuration to the switch port stanza: set `l2_mode` to `trunk`, `vlan_intf` to the VLAN interface, and `src_ip` to match the IP address of the VLAN interface: ``` [swp1] @@ -223,7 +223,7 @@ delay_mechanism E2E network_transport RAWUDPv4 ``` -For an access port, add the VLAN configuration to the switch port stanza: set `l2_mode` to `access`, `vlan_intf` to the VLAN interface, and `src_ip` to match the IP adress of the VLAN interface: +For an access port, add the VLAN configuration to the switch port stanza: set `l2_mode` to `access`, `vlan_intf` to the VLAN interface, and `src_ip` to match the IP address of the VLAN interface: ``` [swp2] @@ -1116,9 +1116,9 @@ The following example shows that there are no violations: cumulus@switch:~$ nv show service ptp 1 monitor violations operational applied description ---------------- ----------- ------- ----------------------------------------------- -last-max-offset Time at which last max offest violation occured -last-min-offset Time at which last min offest violation occured -last-path-delay Time at which last path delay violation occured +last-max-offset Time at which last max offest violation occurred +last-min-offset Time at which last min offest violation occurred +last-path-delay Time at which last path delay violation occurred max-offset-count 0 Number of maximum offset violations min-offset-count 0 Number of min offset violations path-delay-count 0 Number of Path delay violations diff --git a/content/cumulus-linux-50/System-Configuration/Netfilter-ACLs.md b/content/cumulus-linux-50/System-Configuration/Netfilter-ACLs.md index 5a8a8278b5..499fd82951 100644 --- a/content/cumulus-linux-50/System-Configuration/Netfilter-ACLs.md +++ b/content/cumulus-linux-50/System-Configuration/Netfilter-ACLs.md @@ -138,7 +138,7 @@ The incremental nonatomic update operation follows this order: 2. Cumulus Linux checks if the rules in a table are different from installation time; if a table does not have any changes, it does not reinstall the rules. 3. If there are changes in a table, the new rules populate in new groups or slices in hardware, then that table switches over to the new groups or slices. 4. Finally, old resources for that table free up. This process repeats for each of the tables listed above. -5. If there are isufficient resources to hold both the new rule set and old rule set, Cumulus Linux tries the regular nonatomic mode, which interrupts network traffic. +5. If there are insufficient resources to hold both the new rule set and old rule set, Cumulus Linux tries the regular nonatomic mode, which interrupts network traffic. 6. If the regular nonatomic update fails, Cumulus Linux reverts back to the previous rules. To always start `switchd` with nonatomic updates: @@ -1309,7 +1309,7 @@ To work around this limitation, set the rate and burst for all these rules to th ### Where to Assign Rules - If you assign a switch port to a bond, you must assign any egress rules to the bond. -- When using the OUTPUT chain, you must assign rules to the source. For example, if you assign a rule to the switch port in the direction of traffic but the source is a bridge (VLAN), the rule does not affect the traffic and you must applied the rule to the bridge. +- When using the OUTPUT chain, you must assign rules to the source. For example, if you assign a rule to the switch port in the direction of traffic but the source is a bridge (VLAN), the rule does not affect the traffic and you must apply the rule to the bridge. - If you need to apply a rule to all transit traffic, use the FORWARD chain, not the OUTPUT chain. ### ACL Rule Installation Failure @@ -1328,7 +1328,7 @@ failed. Entity MIB
1.3.6.1.2.1.99 --> Entity Sensor MIB
1.3.6.1.2.1.23 --> rip2
1.3.6.1.2.1.2 --> interface/interfaces
1.3.6.1.2.1.31 --> ifMIB
1.3.6.1.2.1.4 --> IP
1.3.6.1.2.1.25 --> hostResource | 5.0.1-5.4.0 | 5.5.0-5.6.0| +| [3141826](#3141826)
| A slow memory leak (~5KB over 24 hour period at a 60 second polling interval) might occur in SNMP when you walk the following system MIB objects (1.3.6.1.2.1)
1.3.6.1.2.1.47 --> Entity MIB
1.3.6.1.2.1.99 --> Entity Sensor MIB
1.3.6.1.2.1.23 --> rip2
1.3.6.1.2.1.2 --> interface/interfaces
1.3.6.1.2.1.31 --> ifMIB
1.3.6.1.2.1.4 --> IP
1.3.6.1.2.1.25 --> hostResource | 5.0.1-5.6.0 | | | [3141818](#3141818)
| If there is extensive and continuous next-hop group (NHG) churn when routes keep moving from one NHG to another NHG repeatedly, switchd increases in memory allocation until memory is exhausted. Other processes might be affected as they try to acquire memory which is unavailable. | 5.0.1-5.1.0 | 5.2.0-5.6.0| | [3139364](#3139364)
| When Cumulus Linux updates the ECMP container with a new next hop list, it allocates the flow counters for the new next hop list without deallocating the counters bound to the old next hop list. This results in resource exhaustion and you see the following error messages in the /var/log/switchd.log file:
hal_mlx_stat.c:3215 ERR Failed to allocate counter(s) for ecmp [71025:0] status: Internal Errorhal_mlx_stat.c:3196 ERR Counter set for ecmp [71025:0] idx 0 failed: Internal Errorhal_mlx_sdk_nexthop_wrap.c:1076 ERR Counter 0 alloc for ecmp next hop failed: Internal Errorhal_mlx_sdk_counter_wrap.c:54 ERR Counter alloc failed: No More Resources
This issue does not have any functional impact to forwarding. Even without the flow counters attached to the ECMP group, packet forwarding works without any issues
To avoid allocating next hop counters for any new ECMP next hop list update, set mlx.stats.ecmp.enable to FALSE in the /etc/mlx/datapath/stats.conf file, then restart switchd with the sudo systemctl reload switchd command. | 5.0.0-5.2.1 | 5.3.0-5.6.0| | [3138746](#3138746)
| The switch duplicates DHCP packets that pass through the VTEP. | 4.3.0-5.1.0 | 5.2.0-5.6.0| @@ -131,7 +131,6 @@ pdfhidden: True | [2860323](#2860323)
| If two FDB entries are added in hardware with a single API call (at the same time), when one entry already exists in hardware and the additional entry has a tunnel type, the resulting FDB entry might be configured improperly in hardware. This can cause corruption of the packets that match the FDB entry. | 4.4.0-5.0.1 | 5.1.0-5.6.0| | [2859015](#2859015)
| In a static VXLAN configuration with a traditional or single VXLAN device, enabling bridge learning on the VNI leads to an incorrect warning and the setting is removed in the next commit. The warning is similar to the following:
warning: vni10: possible mis-configuration detected: l2-vni configured with bridge-learning ON while EVPN is also configured - these two parameters conflict with each other
| 5.0.0-5.0.1 | 5.1.0-5.6.0| | [2855908](#2855908)
| Traffic failover in a multicast topology with redundancy has the mroute stuck in a prune state and PIM join messages continue to send. To work around this issue, run the vtysh clear ip mroute command. | 3.7.15-4.3.0, 5.0.0-5.6.0 | 4.3.1-4.4.5| -| [2847919](#2847919)
| Configuring a router with the REST API through the switch front panel ports (swps) is supported in the default VRF only. To work around this issue, use the localHost IP address or the MGMT IP address to configure router using the Rest API. | 5.0.0-5.6.0 | | | [2847755](#2847755)
| When you use NCLU to remove the configuration for a peer that is a member of a group but also has other peer-specific configuration, you must remove the peer-specific configuration before you delete the peer in a separate NCLU commit. | 5.0.0-5.6.0 | | | [2831968](#2831968)
| The switch duplicates DHCP packets that pass through the VTEP. | 4.3.0, 4.4.0-4.4.5, 5.0.0-5.6.0 | 4.3.1| | [2823307](#2823307)
| Cumuls Linux does not support a bond with more than 64 ports. Any configuration with more than 64 ports in a bond changes all ports to down when you apply the configuration. | 5.0.0-5.6.0 | | @@ -158,10 +157,10 @@ pdfhidden: True | Issue ID | Description | Affects | Fixed | |--- |--- |--- |--- | -| [3647426](#3647426)
None | If BGP remote-as is set to an integer and you try to configure the local-as for a BGP instance, you see the following error:
% AS specified for local as is the same as the remote as and this is not allowed
This configuration is not allowed; it is considered to be eBGP and local preference is not advertised. | 5.0.0-5.5.1 | 5.6.0| +| [3647426](#3647426)
None | If BGP remote-as is set to an integer and you try to configure the local-as for a BGP instance, you see the following error:
% AS specified for local as is the same as the remote as and this is not allowed
This configuration is not allowed; it is considered to be eBGP and local preference is not advertised. | 5.0.0-5.5.1 | 4.3.2-4.4.5, 5.6.0| | [3585467](#3585467)
| NVUE and ip link show traditional bridge VLAN subinterface counts incorrectly. The ingress (Rx) count increments correctly but the egress (Tx) count does not increment. This issues occurs because the hardware does not support transmit counters for a VLAN subinterface; therefore, no statistics from the hardware are updated. Statistics for software forwarded packets show correctly. | 5.0.0-5.6.0 | | | [3560622](#3560622)
| When you configure a route distinguisher (RD) or a route target (RT) manually for layer 2 VNIs, type-1 routes are not properly updated, type-1 EVI routes with the old RD are not properly withdrawn, and type-1 ES routes do not have the corresponding layer 2 VNI route target updated. | 5.0.0-5.5.1 | 5.6.0| -| [3554231](#3554231)
None | CVE-2023-38408: The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009
Mitigation: Do not use ssh-agent forwarding (the man page for ssh_config says that "agent forwarding should be enabled with caution"), or start the ssh-agent program with the -P option to allow only specific PKCS#11 libraries (or none with -P '')
For Cumulus Linux 4.3.2, the /usr/bin/ssh-agent program has all permissions turned off (chmod 0) to prevent its execution if a vulnerable version is detected. | 4.0.0-4.4.5, 5.0.0-5.6.0 | | +| [3554231](#3554231)
None | CVE-2023-38408: The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009
Mitigation: Do not use ssh-agent forwarding (the man page for ssh_config says that "agent forwarding should be enabled with caution"), or start the ssh-agent program with the -P option to allow only specific PKCS#11 libraries (or none with -P '')
For Cumulus Linux 4.3.2, the /usr/bin/ssh-agent program has all permissions turned off (chmod 0) to prevent its execution if a vulnerable version is detected. | 4.0.0-4.3.1, 5.0.0-5.6.0 | 4.3.2-4.4.5| | [3491259](#3491259)
| When BGP receives an EVPN type-5 route with a gateway IP overlay attribute, the gateway IP overlay attribute in the attr memory (which is already inserted in the attribute hash) might change. As a result, the modified attr memory might match with another attr in the attribute hash, which produces duplicate entries in the hash table. As a result, BGP might crash when deleting one of the duplicate attr structures. | 5.0.0-5.5.1 | 5.6.0| | [3488136](#3488136)
| When zebra receives route updates that include both a route with a recursive next hop and the route used to resolve that next hop, zebra might mark the route with the recursive next hop as inactive. To work around this issue, reprocess the route updates by running the appropriate clear command for the protocol in use. For example, for BGP, clear inbound routes from the relevant neighbor using the nv action clear vrf router bgp neighbor address-family in command. | 4.2.1-5.5.1 | 5.6.0| | [3474391](#3474391)
| The SNMP MIB definition file /usr/share/snmp/mibs/Cumulus-BGPVRF-MIB.txt does not define the INDEX of the bgpPeerEntry correctly. This issue does not impact SNMP functionality for this MIB. | 4.3.1-5.5.1 | 5.6.0| @@ -169,10 +168,10 @@ pdfhidden: True | [3432897](#3432897)
| When you remove the restriction from a TACACS+ mapped user to remove per command authorization, the tacplus-restrict -R command does not restore ownership of restored files correctly. As a result, some commands might fail due to permission errors in the files or directories under the home directory. To work around this issue, run the sudo chown command to correct the ownership of the affected files and directories. | 5.0.0-5.4.0 | 5.5.0-5.6.0| | [3429530](#3429530)
| On the Spectrum-2 and Spectrum-3 switch, multiple interfaces (in the same PLL quarter) might flap intermittently at the same time. | 4.2.1-5.4.0 | 5.5.0-5.6.0| | [3424967](#3424967)
| sudo for TACACS+ users with privilege level 15 does not work when the TACACS+ server is to be reached through the default VRF (with vrf=default set in the /etc/tacplus_servers file). To work around this issue, specify the interface name that the default VRF uses in the vrf= setting of the /etc/tacplus_servers file or run the NVUE nv set system aaa tacacs vrf command. If you don't run either command, a TACACS+ user with privilege level 15 can run vrf task exec default sudo ... to execute the sudo command using the TACACS+ server on the default VRF. | 5.0.0-5.6.0 | | -| [3413827](#3413827)
None | During upgrade, when one MLAG node is upgraded and the other MLAG node is not yet upgraded, permanent neighbors cannot synchronize between MLAG nodes. The clagctl dumppermanentneighs command only shows local neighbors. | 5.0.0-5.4.0 | 5.5.0-5.6.0| +| [3413827](#3413827)
None | During upgrade, when one MLAG node is upgraded and the other MLAG node is not yet upgraded, permanent neighbors cannot synchronize between MLAG nodes. The clagctl dumppermanentneighs command only shows local neighbors. | 5.0.0-5.4.0 | 4.3.2-4.4.5, 5.5.0-5.6.0| | [3413785](#3413785)
| To reach the TACACS+ server through the default VRF, you must specify the egress interface you use in the default VRF. Either run the NVUE nv set system aaa tacacs vrf command (for example, nv set system aaa tacacs vrf swp51) or set the vrf= option in the /etc/tacplus_servers file (for example, vrf=swp51). A similar issue might prevent TACACS+ users with privilege level 15 from using sudo if the TACACS+ server is reachable only on the default VRF. If this occurs, and you do not run the above configuration workaround, the TACACS+ user with privilege level 15 can use vrf task exec default sudo ... to execute the sudo command using the TACACS+ server on the default VRF. | 5.0.0-5.5.1 | 5.6.0| | [3402935](#3402935)
None | For layer 3 interfaces configured on the switch, certain triggers, such as port flaps and subinterface flaps, or when configuring the ports to and from layer 2 and layer 3, cause the dummy internal VLAN to not free up, which can result in exhaustion of the dummy internal VLANs designated for the layer 3 interfaces. When this occurs, you see the following switchd log messages:
ERR dummy internal vlans exhaustedERR cannot allocate vlan for sub-interface
| 5.0.0-5.4.0 | 5.5.0-5.6.0| -| [3351951](#3351951)
None | Currently, the default core dump size limit on Cumulus Linux is 256M but the SDK generates core dumps around 800M. To avoid incomplete core files, you can increase the core dump size limit. | 4.2.1-5.3.1 | 5.4.0-5.6.0| +| [3351951](#3351951)
None | Currently, the default core dump size limit on Cumulus Linux is 256M but the SDK generates core dumps around 800M. To avoid incomplete core files, you can increase the core dump size limit. | 4.2.1-4.3.1, 4.4.0-5.3.1 | 4.3.2, 5.4.0-5.6.0| | [3350789](#3350789)
| NVUE deprecated the port split command options (2x10G, 2x25G, 2x40G, 2x50G, 2x100G, 2x200G, 4x10G, 4x25G, 4x50G, 4x100G, 8x50G) with no backwards compatibility. | 5.0.0-5.4.0 | 5.5.0-5.6.0| | [3330705](#3330705)
| When using TACACS+, a TACACS+ server name that returns more than one IP address, such as an IPv6 and IPv4 address, is counted many times against the limit of seven TACACS+ servers, which might cause some of the later listed servers to be ignored as over the limit. To work around this issue, you can set the prefer_ip_version configuration option (the default value is 4) to choose between an IPv4 or IPv6 address if both are present. | 3.7.0-5.3.1 | 5.4.0-5.6.0| | [3327477](#3327477)
| If you use su to change to a user specified through TACACS+, the user becomes the local tacacs0 thru tacacs15 user instead of the named user to run sudo commands. As a result, the named user password might not match the local tacacs0 thru tacacs15 user password. | 3.7.0-3.7.16, 4.0.0-4.4.5, 5.0.0-5.6.0 | | @@ -187,7 +186,7 @@ pdfhidden: True | [3211054](#3211054)
| On the NVIDIA Spectrum-2 switch, when receiving multicast traffic on a PIM enabled VLAN, the multicast traffic is forwarded correctly to the associated VLAN, however WJH shows traffic loss with the error:

Packet size is larger than router interface MTU – Validate the router interface MTU configuration
| 4.4.2-5.2.1 | 5.3.0-5.6.0| | [3200373](#3200373)
| After rebooting the switch, the IPv6 link local address for an SVI that belongs to non-default VRF is missing, and doesn't show on the switch. To resolve this issue, run the ifreload -a command. | 5.0.0-5.2.1 | 5.3.0-5.6.0| | [3195345](#3195345)
| Communication between single-connected MLAG hosts on different switches fails because packets received by single-connected MLAG hosts are not forwarded over the peer link. To work around this issue, when adding a switch to an MLAG pair, enable all the interfaces. | 5.0.0-5.0.1 | 5.1.0-5.6.0| -| [3192808](#3192808)
None | When the switch receives an LLDP frame from a Cisco router right after a ptmd restart, the ptmd service crashes. | 4.3.0-5.2.1 | 5.3.0-5.6.0| +| [3192808](#3192808)
None | When the switch receives an LLDP frame from a Cisco router right after a ptmd restart, the ptmd service crashes. | 4.3.0-4.3.1, 4.4.0-5.2.1 | 4.3.2, 5.3.0-5.6.0| | [3157240](#3157240)
| When you try to query REDECN counters with the mlxcmd utility on a bond member port with the following commands, syslog reports an error
sudo /usr/lib/cumulus/mlxcmd roce counters --port sudo /usr/lib/cumulus/mlxcmd qos counters --clear --port 
| 4.4.4-5.1.0 | 5.2.0-5.6.0| | [3150317](#3150317)
| During a host failure, where a link remains up but LACP stops being sent, the EVPN multihoming ES bond goes into bypass mode active without a link state change. | 4.4.2-5.2.1 | 5.3.0-5.6.0| | [3142615](#3142615)
| The BGP4-MIB.txt file is missing from Net-SNMP agent. | 5.0.0-5.4.0 | 5.5.0-5.6.0| @@ -255,7 +254,6 @@ pdfhidden: True | [2860323](#2860323)
| If two FDB entries are added in hardware with a single API call (at the same time), when one entry already exists in hardware and the additional entry has a tunnel type, the resulting FDB entry might be configured improperly in hardware. This can cause corruption of the packets that match the FDB entry. | 4.4.0-5.0.1 | 5.1.0-5.6.0| | [2859015](#2859015)
| In a static VXLAN configuration with a traditional or single VXLAN device, enabling bridge learning on the VNI leads to an incorrect warning and the setting is removed in the next commit. The warning is similar to the following:
warning: vni10: possible mis-configuration detected: l2-vni configured with bridge-learning ON while EVPN is also configured - these two parameters conflict with each other
| 5.0.0-5.0.1 | 5.1.0-5.6.0| | [2855908](#2855908)
| Traffic failover in a multicast topology with redundancy has the mroute stuck in a prune state and PIM join messages continue to send. To work around this issue, run the vtysh clear ip mroute command. | 3.7.15-4.3.0, 5.0.0-5.6.0 | 4.3.1-4.4.5| -| [2847919](#2847919)
| Configuring a router with the REST API through the switch front panel ports (swps) is supported in the default VRF only. To work around this issue, use the localHost IP address or the MGMT IP address to configure router using the Rest API. | 5.0.0-5.6.0 | | | [2847755](#2847755)
| When you use NCLU to remove the configuration for a peer that is a member of a group but also has other peer-specific configuration, you must remove the peer-specific configuration before you delete the peer in a separate NCLU commit. | 5.0.0-5.6.0 | | | [2831968](#2831968)
| The switch duplicates DHCP packets that pass through the VTEP. | 4.3.0, 4.4.0-4.4.5, 5.0.0-5.6.0 | 4.3.1| | [2823307](#2823307)
| Cumuls Linux does not support a bond with more than 64 ports. Any configuration with more than 64 ports in a bond changes all ports to down when you apply the configuration. | 5.0.0-5.6.0 | | diff --git a/content/cumulus-linux-50/rn.xml b/content/cumulus-linux-50/rn.xml index d569eacb49..fdf6236091 100644 --- a/content/cumulus-linux-50/rn.xml +++ b/content/cumulus-linux-50/rn.xml @@ -14,7 +14,7 @@ This configuration is not allowed; it is considered to be eBGP and local preference is not advertised. 5.0.0-5.5.1 -5.6.0 +4.3.2-4.4.5, 5.6.0 3585467 @@ -33,8 +33,8 @@ This configuration is not allowed; it is considered to be eBGP and local prefere CVE-2023-38408: The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009. Mitigation: Do not use ssh-agent forwarding (the man page for ssh_config says that "agent forwarding should be enabled with caution"), or start the ssh-agent program with the -P option to allow only specific PKCS#11 libraries (or none with -P ''). For Cumulus Linux 4.3.2, the /usr/bin/ssh-agent program has all permissions turned off (chmod 0) to prevent its execution if a vulnerable version is detected. -4.0.0-4.4.5, 5.0.0-5.6.0 - +4.0.0-4.3.1, 5.0.0-5.6.0 +4.3.2-4.4.5 3491259 @@ -82,7 +82,7 @@ For Cumulus Linux 4.3.2, the /usr/bin/ssh-agent program has all permissions turn 3413827 During upgrade, when one MLAG node is upgraded and the other MLAG node is not yet upgraded, permanent neighbors cannot synchronize between MLAG nodes. The {{clagctl dumppermanentneighs}} command only shows local neighbors. 5.0.0-5.4.0 -5.5.0-5.6.0 +4.3.2-4.4.5, 5.5.0-5.6.0 3413785 @@ -103,8 +103,8 @@ ERR cannot allocate vlan for sub-interface 3351951 Currently, the default core dump size limit on Cumulus Linux is 256M but the SDK generates core dumps around 800M. To avoid incomplete core files, you can increase the core dump size limit. -4.2.1-5.3.1 -5.4.0-5.6.0 +4.2.1-4.3.1, 4.4.0-5.3.1 +4.3.2, 5.4.0-5.6.0 3350789 @@ -214,8 +214,8 @@ Packet size is larger than router interface MTU – Validate the router interfac 3192808 When the switch receives an LLDP frame from a Cisco router right after a {{ptmd}} restart, the {{ptmd}} service crashes. -4.3.0-5.2.1 -5.3.0-5.6.0 +4.3.0-4.3.1, 4.4.0-5.2.1 +4.3.2, 5.3.0-5.6.0 3157240 @@ -250,8 +250,8 @@ sudo /usr/lib/cumulus/mlxcmd qos counters --clear --port <swp> 1.3.6.1.2.1.31 --> ifMIB 1.3.6.1.2.1.4 --> IP 1.3.6.1.2.1.25 --> hostResource -5.0.1-5.4.0 -5.5.0-5.6.0 +5.0.1-5.6.0 + 3141818 @@ -816,12 +816,6 @@ warning: vni10: possible mis-configuration detected: l2-vni configured with brid 4.3.1-4.4.5 -2847919 -Configuring a router with the REST API through the switch front panel ports (swps) is supported in the default VRF only. To work around this issue, use the localHost IP address or the MGMT IP address to configure router using the Rest API. -5.0.0-5.6.0 - - - 2847755 When you use NCLU to remove the configuration for a peer that is a member of a group but also has other peer-specific configuration, you must remove the peer-specific configuration before you delete the peer in a separate NCLU commit. 5.0.0-5.6.0 @@ -952,7 +946,7 @@ To work around this issue, if you run {{apt dist-upgrade}} and {{switchd}} no lo This configuration is not allowed; it is considered to be eBGP and local preference is not advertised. 5.0.0-5.5.1 -5.6.0 +4.3.2-4.4.5, 5.6.0 3585467 @@ -971,8 +965,8 @@ This configuration is not allowed; it is considered to be eBGP and local prefere CVE-2023-38408: The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009. Mitigation: Do not use ssh-agent forwarding (the man page for ssh_config says that "agent forwarding should be enabled with caution"), or start the ssh-agent program with the -P option to allow only specific PKCS#11 libraries (or none with -P ''). For Cumulus Linux 4.3.2, the /usr/bin/ssh-agent program has all permissions turned off (chmod 0) to prevent its execution if a vulnerable version is detected. -4.0.0-4.4.5, 5.0.0-5.6.0 - +4.0.0-4.3.1, 5.0.0-5.6.0 +4.3.2-4.4.5 3491259 @@ -1020,7 +1014,7 @@ For Cumulus Linux 4.3.2, the /usr/bin/ssh-agent program has all permissions turn 3413827 During upgrade, when one MLAG node is upgraded and the other MLAG node is not yet upgraded, permanent neighbors cannot synchronize between MLAG nodes. The {{clagctl dumppermanentneighs}} command only shows local neighbors. 5.0.0-5.4.0 -5.5.0-5.6.0 +4.3.2-4.4.5, 5.5.0-5.6.0 3413785 @@ -1041,8 +1035,8 @@ ERR cannot allocate vlan for sub-interface 3351951 Currently, the default core dump size limit on Cumulus Linux is 256M but the SDK generates core dumps around 800M. To avoid incomplete core files, you can increase the core dump size limit. -4.2.1-5.3.1 -5.4.0-5.6.0 +4.2.1-4.3.1, 4.4.0-5.3.1 +4.3.2, 5.4.0-5.6.0 3350789 @@ -1134,8 +1128,8 @@ Packet size is larger than router interface MTU – Validate the router interfac 3192808 When the switch receives an LLDP frame from a Cisco router right after a {{ptmd}} restart, the {{ptmd}} service crashes. -4.3.0-5.2.1 -5.3.0-5.6.0 +4.3.0-4.3.1, 4.4.0-5.2.1 +4.3.2, 5.3.0-5.6.0 3157240 @@ -1592,12 +1586,6 @@ warning: vni10: possible mis-configuration detected: l2-vni configured with brid 4.3.1-4.4.5 -2847919 -Configuring a router with the REST API through the switch front panel ports (swps) is supported in the default VRF only. To work around this issue, use the localHost IP address or the MGMT IP address to configure router using the Rest API. -5.0.0-5.6.0 - - - 2847755 When you use NCLU to remove the configuration for a peer that is a member of a group but also has other peer-specific configuration, you must remove the peer-specific configuration before you delete the peer in a separate NCLU commit. 5.0.0-5.6.0 diff --git a/content/cumulus-linux-51/Installation-Management/Installing-a-New-Cumulus-Linux-Image.md b/content/cumulus-linux-51/Installation-Management/Installing-a-New-Cumulus-Linux-Image.md index a3c23daa98..1acb19595c 100644 --- a/content/cumulus-linux-51/Installation-Management/Installing-a-New-Cumulus-Linux-Image.md +++ b/content/cumulus-linux-51/Installation-Management/Installing-a-New-Cumulus-Linux-Image.md @@ -323,7 +323,7 @@ You can run several installer command line options from ONIE to perform basic sw - Execute a ZTP script to perform necessary configuration {{%notice note%}} -The `onie-nos-install` command does *not* allow you specify command line parameters. You must access the switch from the console and transfer a disk image to the switch. You must then make the disk image executable and install the image directly from the ONIE command line with the options you want to use. +The `onie-nos-install` command does *not* allow you to specify command line parameters. You must access the switch from the console and transfer a disk image to the switch. You must then make the disk image executable and install the image directly from the ONIE command line with the options you want to use. The following example commands transfer a disk image to the switch, make the image executable, and install the image with the `--password` option to change the default cumulus user password: diff --git a/content/cumulus-linux-51/Layer-1-and-Switch-Ports/DHCP/DHCP-Relays.md b/content/cumulus-linux-51/Layer-1-and-Switch-Ports/DHCP/DHCP-Relays.md index 99d6dc9d0a..26fa012253 100644 --- a/content/cumulus-linux-51/Layer-1-and-Switch-Ports/DHCP/DHCP-Relays.md +++ b/content/cumulus-linux-51/Layer-1-and-Switch-Ports/DHCP/DHCP-Relays.md @@ -103,7 +103,7 @@ cumulus@leaf01:~$ nv config apply ## Optional Configuration -This section describes optional DHCP relay configuration. The steps provided in this section assume that you already done basic DHCP relay configuration, described above. +This section describes optional DHCP relay configurations. The steps provided in this section assume that you have already configured basic DHCP relay, as described above. ### DHCP Agent Information Option (Option 82) diff --git a/content/cumulus-linux-51/Layer-1-and-Switch-Ports/DHCP/DHCP-Snooping.md b/content/cumulus-linux-51/Layer-1-and-Switch-Ports/DHCP/DHCP-Snooping.md new file mode 100644 index 0000000000..8454c280ef --- /dev/null +++ b/content/cumulus-linux-51/Layer-1-and-Switch-Ports/DHCP/DHCP-Snooping.md @@ -0,0 +1,91 @@ +--- +title: DHCP Snooping +author: NVIDIA +weight: 355 +toc: 3 +--- +DHCP snooping enables Cumulus Linux to act as a middle layer between the DHCP infrastructure and DHCP clients by scanning DHCP control packets and building an IP-MAC database. Cumulus Linux accepts DHCP offers from only trusted interfaces and can rate limit packets. + +{{%notice note%}} +DHCP option 82 processing is not supported. +{{%/notice%}} + +## Configure DHCP Snooping + +To configure DHCP snooping, you need to: + +- Enable DHCP snooping on a VLAN. +- Add a trusted interface. Cumulus Linux allows DHCP offers from only trusted interfaces to prevent malicious DHCP servers from assigning IP addresses inside the network. The interface must be a member of the bridge specified. +- Set the rate limit for DHCP requests to avoid DoS attacks. The default value is 100 packets per second. + +The following example shows you how to configure DHCP snooping for IPv4 and IPv6. + +{{%notice note%}} +NVUE does not provide commands to configure DHCP Snooping. +{{%/notice%}} + +Create the `/etc/dhcpsnoop/dhcp_snoop.json` file and add DHCP snooping configuration under the bridge. + +The following example enables DHCP snooping for IPv4 on VLAN 10, sets the rate limit to 50 and the trusted interface to swp3. swp3 is a member of the bridge `br_default`: + +``` +cumulus@leaf01:~$ sudo nano /etc/dhcpsnoop/dhcp_snoop.json +{ + "bridge": [ + { + "bridge_id": "br_default", + "vlan": [ + { + "vlan_id": 10, + "snooping": 1, + "rate_limit": 50, + "ip_version": 4, + "trusted_interface": [ + "swp3" + ], + } + ] + } + ] +} +``` + +The following example enables DHCP snooping for IPv6 on VLAN 10, sets the rate limit to 50 and the trusted interface to swp6. swp6 is a member of the bridge `br_default`: + +``` +cumulus@leaf01:~$ sudo nano /etc/dhcpsnoop/dhcp_snoop.json +{ + "bridge": [ + { + "bridge_id": "br_default", + "vlan": [ + { + "vlan_id": 10, + "snooping": 1, + "rate_limit": 50, + "ip_version": 6, + "trusted_interface": [ + "swp6" + ], + } + ] + } + ] +} +``` + +When DHCP snooping detects a violation, the packet is dropped and a message is logged to the `/var/log/dhcpsnoop.log` file. + +## Show the DHCP Binding Table + +To show the DHCP binding table, run the `net show dhcp-snoop table` command for IPv4 or the `net show dhcp-snoop6 table` command for IPv6. The following example command shows the DHCP binding table for IPv4: + +``` +cumulus@leaf01:~$ net show dhcp-snoop table +Port VLAN IP MAC Lease State Bridge +---- ---- --------- ----------------- ----- ----- ------ + +swp5 1002 10.0.0.3 00:02:00:00:00:04 7200 ACK br0 + +swp5 1000 10.0.1.3 00:02:00:00:00:04 7200 ACK br0 +``` diff --git a/content/cumulus-linux-51/Layer-1-and-Switch-Ports/DHCP/_index.md b/content/cumulus-linux-51/Layer-1-and-Switch-Ports/DHCP/_index.md index f494b0f7c1..fd3f513c3c 100644 --- a/content/cumulus-linux-51/Layer-1-and-Switch-Ports/DHCP/_index.md +++ b/content/cumulus-linux-51/Layer-1-and-Switch-Ports/DHCP/_index.md @@ -4,4 +4,7 @@ author: NVIDIA weight: 338 toc: 3 --- -This section describes how to configure [DHCP](## "Dynamic Host Configuration Protocol") relays and [DHCP](## "Dynamic Host Configuration Protocol") servers. +This section describes how to configure: +- {{}} +- {{}} +- {{}} diff --git a/content/cumulus-linux-51/Layer-1-and-Switch-Ports/Interface-Configuration-and-Management/Switch-Port-Attributes.md b/content/cumulus-linux-51/Layer-1-and-Switch-Ports/Interface-Configuration-and-Management/Switch-Port-Attributes.md index bd51daf2e4..d41c0f3a5a 100644 --- a/content/cumulus-linux-51/Layer-1-and-Switch-Ports/Interface-Configuration-and-Management/Switch-Port-Attributes.md +++ b/content/cumulus-linux-51/Layer-1-and-Switch-Ports/Interface-Configuration-and-Management/Switch-Port-Attributes.md @@ -1066,7 +1066,7 @@ SN4600 64xQSFP56 (200GbE) interfaces support both PAM4 and NRZ encodings with al For lower speeds, PAM4 is automatically converted to NRZ encoding. -Only 32xQSFP56 ports can brea kout into 4xSFP56 (4x50GbE). But, in this case, the adjacent QSFP56 port are blocked (only the first and third or the second and fourth rows can break out into 4xSFP56). +Only 32xQSFP56 ports can break out into 4xSFP56 (4x50GbE). But, in this case, the adjacent QSFP56 port are blocked (only the first and third or the second and fourth rows can break out into 4xSFP56). All 64xQSFP56 ports can break out into 2xQSFP56 (2x100GbE) without blocking ports. diff --git a/content/cumulus-linux-51/Layer-1-and-Switch-Ports/Interface-Configuration-and-Management/_index.md b/content/cumulus-linux-51/Layer-1-and-Switch-Ports/Interface-Configuration-and-Management/_index.md index 80a25483e3..18d5d4387e 100644 --- a/content/cumulus-linux-51/Layer-1-and-Switch-Ports/Interface-Configuration-and-Management/_index.md +++ b/content/cumulus-linux-51/Layer-1-and-Switch-Ports/Interface-Configuration-and-Management/_index.md @@ -412,7 +412,7 @@ If you specify a subinterface, such as swp1.100, then run `ifup swp1.100`, Cumul You can specify both IPv4 and IPv6 addresses for the same interface. For IPv6 addresses: -- You can create or modify the IP address for an interface using either `::` or `0:0:0` notation. For example,both 2620:149:43:c109:0:0:0:5 and 2001:DB8::1/126 are valid. +- You can create or modify the IP address for an interface using either `::` or `0:0:0` notation. For example, both 2620:149:43:c109:0:0:0:5 and 2001:DB8::1/126 are valid. - Cumulus Linux assigns the IPv6 address with all zeroes in the interface identifier (2001:DB8::/126) for each subnet; connected hosts cannot use this address. The following example commands configure three IP addresses for swp1; two IPv4 addresses and one IPv6 address. diff --git a/content/cumulus-linux-51/Layer-2/IGMP-and-MLD-Snooping.md b/content/cumulus-linux-51/Layer-2/IGMP-and-MLD-Snooping.md index ae1c27c772..b9776badea 100644 --- a/content/cumulus-linux-51/Layer-2/IGMP-and-MLD-Snooping.md +++ b/content/cumulus-linux-51/Layer-2/IGMP-and-MLD-Snooping.md @@ -85,7 +85,7 @@ cumulus@switch:~$ sudo ifreload -a ## Optimized Multicast Flooding (OMF) -IGMP snooping restricts multicast forwarding only to the ports that receive IGMP report messages. If the ports do not receive IGMP reports, multicast traffic floods to all ports in the bridge domain (also know as unregistered multicast (URMC) traffic). To restrict this flooding to only mrouter ports, you can enable OMF. +IGMP snooping restricts multicast forwarding only to the ports that receive IGMP report messages. If the ports do not receive IGMP reports, multicast traffic floods to all ports in the bridge domain (also known as unregistered multicast (URMC) traffic). To restrict this flooding to only mrouter ports, you can enable OMF. To enable OMF: diff --git a/content/cumulus-linux-51/Layer-2/Multi-Chassis-Link-Aggregation-MLAG.md b/content/cumulus-linux-51/Layer-2/Multi-Chassis-Link-Aggregation-MLAG.md index 84e9fe2727..045c633d05 100644 --- a/content/cumulus-linux-51/Layer-2/Multi-Chassis-Link-Aggregation-MLAG.md +++ b/content/cumulus-linux-51/Layer-2/Multi-Chassis-Link-Aggregation-MLAG.md @@ -832,7 +832,7 @@ The following table shows the conflict types and actions that Cumulus Linux take | LACP partner MAC address | Interface | Protodown the MLAG bonds on the MLAG switch if there is an LACP partner MAC address mismatch or if there is a duplicate LACP partner MAC address. | | MLAG VLANs| Interface | Suspend the inconsistent VLANs on either MLAG peer if the VLANs are not part of the peer link or if there is mismatch of VLANs configured on the MLAG bonds between the MLAG peers. | | Peer link VLANs| Global | Suspend the inconsistent VLANs on either MLAG peer on all the dual-connected MLAG bonds and VXLAN interfaces. | -| MLAG protocol version | Global | The consistency check records an MLAG protocol version mismatch between the MLAG peers. Cumulus Linux does not take any distruptive action. | +| MLAG protocol version | Global | The consistency check records an MLAG protocol version mismatch between the MLAG peers. Cumulus Linux does not take any disruptive action. | | MLAG package version | Global| The consistency check records an MLAG package version mismatch between the MLAG peers. Cumulus Linux does not take any disruptive action.| You can also manually check for MLAG inconsistencies with the following commands: @@ -996,7 +996,7 @@ bridge-learning yes yes - {{< /tab >}} {{< /tabs >}} -The actions that Cumulus Linux takes when there is a conflict are distruptive. If you prefer, you can configure the switch to not take any action when there is a conflict. Edit the `/etc/network/interfaces` file to add the `clagd-args --gracefulConsistencyCheck FALSE` parameter in the peer link stanza. +The actions that Cumulus Linux takes when there is a conflict are disruptive. If you prefer, you can configure the switch to not take any action when there is a conflict. Edit the `/etc/network/interfaces` file to add the `clagd-args --gracefulConsistencyCheck FALSE` parameter in the peer link stanza. ``` cumulus@leaf01:~$ sudo nano /etc/network/interfaces diff --git a/content/cumulus-linux-51/Layer-2/Virtual-Router-Redundancy-VRR-and-VRRP.md b/content/cumulus-linux-51/Layer-2/Virtual-Router-Redundancy-VRR-and-VRRP.md index b941a5612f..65397eafa0 100644 --- a/content/cumulus-linux-51/Layer-2/Virtual-Router-Redundancy-VRR-and-VRRP.md +++ b/content/cumulus-linux-51/Layer-2/Virtual-Router-Redundancy-VRR-and-VRRP.md @@ -164,8 +164,8 @@ The following example commands configure both 10.1.10.1/24 and 10.1.11.1/24 on V {{< tab "NVUE Commands ">}} ``` -cumulus@switch:mgmt:~$ nv set interface vlan10 ip vrr adress 10.1.10.1/24 -cumulus@switch:mgmt:~$ nv set interface vlan10 ip vrr adress 10.1.11.1/24 +cumulus@switch:mgmt:~$ nv set interface vlan10 ip vrr address 10.1.10.1/24 +cumulus@switch:mgmt:~$ nv set interface vlan10 ip vrr address 10.1.11.1/24 cumulus@switch:mgmt:~$ nv config apply ``` diff --git a/content/cumulus-linux-51/Layer-3/Border-Gateway-Protocol-BGP/Optional-BGP-Configuration.md b/content/cumulus-linux-51/Layer-3/Border-Gateway-Protocol-BGP/Optional-BGP-Configuration.md index 2e4971ef31..8168473201 100644 --- a/content/cumulus-linux-51/Layer-3/Border-Gateway-Protocol-BGP/Optional-BGP-Configuration.md +++ b/content/cumulus-linux-51/Layer-3/Border-Gateway-Protocol-BGP/Optional-BGP-Configuration.md @@ -944,7 +944,7 @@ BGP add-path RX enables BGP to receive multiple paths for the same prefix. A pat To view the existing capabilities, run the vtysh `show ip bgp neighbors` command. You can see the existing capabilities in the subsection *Add Path*, below *Neighbor capabilities.* -The following example output shows that BGP can sent and receive additional BGP paths, and that the BGP neighbor on swp51 supports both. +The following example output shows that BGP can send and receive additional BGP paths, and that the BGP neighbor on swp51 supports both. ``` cumulus@leaf01:~$ sudo vtysh diff --git a/content/cumulus-linux-51/Layer-3/Routing/Policy-based-Routing.md b/content/cumulus-linux-51/Layer-3/Routing/Policy-based-Routing.md index 3182342d40..1e47c666bf 100644 --- a/content/cumulus-linux-51/Layer-3/Routing/Policy-based-Routing.md +++ b/content/cumulus-linux-51/Layer-3/Routing/Policy-based-Routing.md @@ -28,7 +28,7 @@ A PBR policy contains one or more policy maps. Each policy map: - To match on a source and destination address, a policy map can contain both match source and match destination IP rules. - A set rule determines the PBR next hop for the policy. -To use PBR in Cumulus linux, you define a PBR policy and apply it to the ingress interface (the interface must already have an IP address assigned). Cumulus Linux matches traffic against the match rules in sequential order and forwards the traffic according to the set rule in the first match. Traffic that does not match any rule passes on to the normal destination based routing mechanism. +To use PBR in Cumulus Linux, you define a PBR policy and apply it to the ingress interface (the interface must already have an IP address assigned). Cumulus Linux matches traffic against the match rules in sequential order and forwards the traffic according to the set rule in the first match. Traffic that does not match any rule passes on to the normal destination based routing mechanism. To configure a PBR policy: diff --git a/content/cumulus-linux-51/Layer-3/Routing/Route-Filtering-and-Redistribution.md b/content/cumulus-linux-51/Layer-3/Routing/Route-Filtering-and-Redistribution.md index c36dfb9782..d207656887 100644 --- a/content/cumulus-linux-51/Layer-3/Routing/Route-Filtering-and-Redistribution.md +++ b/content/cumulus-linux-51/Layer-3/Routing/Route-Filtering-and-Redistribution.md @@ -240,7 +240,7 @@ The following example commands redistribute routing information from [OSPF](## " {{< tab "NVUE Commands ">}} ``` -cumulus@switch:~$ nv set vrf default router bgp address-family ipv4-unicast route-redistribute ospf +cumulus@switch:~$ nv set vrf default router bgp address-family ipv4-unicast redistribute ospf cumulus@switch:~$ nv config apply ``` @@ -267,7 +267,7 @@ To redistribute all directly connected networks, use the `redistribute connected {{< tab "NVUE Commands ">}} ``` -cumulus@switch:~$ nv set vrf default router bgp address-family ipv4-unicast route-redistribute connected +cumulus@switch:~$ nv set vrf default router bgp address-family ipv4-unicast redistribute connected cumulus@switch:~$ nv config apply ``` diff --git a/content/cumulus-linux-51/Layer-3/Routing/Supported-Route-Table-Entries.md b/content/cumulus-linux-51/Layer-3/Routing/Supported-Route-Table-Entries.md index 40f7baa2df..c48126d9f4 100644 --- a/content/cumulus-linux-51/Layer-3/Routing/Supported-Route-Table-Entries.md +++ b/content/cumulus-linux-51/Layer-3/Routing/Supported-Route-Table-Entries.md @@ -23,9 +23,9 @@ Cumulus Linux provides several generalized profiles, described below. These prof The following tables list the number of MAC addresses, layer 3 neighbors, and LPM routes validated for each forwarding table profile. If you do not specify any profiles as described below, the switch uses the *default* values. {{%notice note%}} -The values in the following tables reflect results from testing, which can differ from published manufacturer specifications. +The values provided in the profiles below are the maximum values that Cumulus Linux software allocates; the theoretical hardware limits might be higher. These limits refer to values that have been validated as part of the unidimensional scale validation. If you try to achieve maximum scalability with multiple features enabled, results might differ from the values listed in this guide. {{%/notice%}} - + ### Spectrum |
Profile| MAC Addresses |
Layer 3 Neighbors| Longest Prefix Match (LPM) | diff --git a/content/cumulus-linux-51/Monitoring-and-Troubleshooting/FRRouting-Log-Message-Reference.md b/content/cumulus-linux-51/Monitoring-and-Troubleshooting/FRRouting-Log-Message-Reference.md index 8102a9ced5..5ec1b97caf 100644 --- a/content/cumulus-linux-51/Monitoring-and-Troubleshooting/FRRouting-Log-Message-Reference.md +++ b/content/cumulus-linux-51/Monitoring-and-Troubleshooting/FRRouting-Log-Message-Reference.md @@ -13,13 +13,13 @@ The following table lists the HIGH severity ERROR log messages generated by FRR. | Babel | HIGH | 16777218 | BABEL Packet Error | Babel has detected a packet encode/decode problem. | Collect the relevant log files and report the issue for troubleshooting.| | Babel | HIGH | 16777219 | BABEL Configuration Error | Babel has detected a configuration error of some sort. | Ensure that the configuration is correct. | | Babel | HIGH | 16777220 | BABEL Route Error | Babel has detected a routing error and is in an inconsistent state. | Gather data to report the issue for troubleshooting. Restart FRR. | -| BGP | HIGH | 33554433 | BGP attribute flag is incorrect | BGP attribute flag is set to the wrong value (Optional/Transitive/Partial). | Determine the soure of the attribute and determine why the attribute flag has been set incorrectly. | -| BGP | HIGH | 33554434 | BGP attribute length is incorrect | BGP attribute length is incorrect. | Determine the soure of the attribute and determine why the attribute length has been set incorrectly. | -| BGP | HIGH | 33554435 | BGP attribute origin value invalid | BGP attribute origin value is invalid. | Determine the soure of the attribute and determine why the origin attribute has been set incorrectly. | -| BGP | HIGH | 33554436 | BGP as path is invalid | BGP AS path has been malformed. | Determine the soure of the update and determine why the AS path has been set incorrectly. | -| BGP | HIGH | 33554437 | BGP as path first as is invalid | BGP update has invalid first AS in AS path. | Determine the soure of the update and determine why the AS path first AS value has been set incorrectly. | -| BGP | HIGH | 33554439 | BGP PMSI tunnel attribute type is invalid | BGP update has invalid type for PMSI tunnel. | Determine the soure of the update and determine why the PMSI tunnel attribute type has been set incorrectly. | -| BGP | HIGH | 33554440 | BGP PMSI tunnel attribute length is invalid | BGP update has invalid length for PMSI tunnel. | Determine the soure of the update and determine why the PMSI tunnel attribute length has been set incorrectly. | +| BGP | HIGH | 33554433 | BGP attribute flag is incorrect | BGP attribute flag is set to the wrong value (Optional/Transitive/Partial). | Determine the source of the attribute and determine why the attribute flag has been set incorrectly. | +| BGP | HIGH | 33554434 | BGP attribute length is incorrect | BGP attribute length is incorrect. | Determine the source of the attribute and determine why the attribute length has been set incorrectly. | +| BGP | HIGH | 33554435 | BGP attribute origin value invalid | BGP attribute origin value is invalid. | Determine the source of the attribute and determine why the origin attribute has been set incorrectly. | +| BGP | HIGH | 33554436 | BGP as path is invalid | BGP AS path has been malformed. | Determine the source of the update and determine why the AS path has been set incorrectly. | +| BGP | HIGH | 33554437 | BGP as path first as is invalid | BGP update has invalid first AS in AS path. | Determine the source of the update and determine why the AS path first AS value has been set incorrectly. | +| BGP | HIGH | 33554439 | BGP PMSI tunnel attribute type is invalid | BGP update has invalid type for PMSI tunnel. | Determine the source of the update and determine why the PMSI tunnel attribute type has been set incorrectly. | +| BGP | HIGH | 33554440 | BGP PMSI tunnel attribute length is invalid | BGP update has invalid length for PMSI tunnel. | Determine the source of the update and determine why the PMSI tunnel attribute length has been set incorrectly. | | BGP | HIGH | 33554442 | BGP peergroup operated on in error | BGP operating on peer-group instead of peers included. | Ensure the configuration doesn't contain peer-groups contained within peer-groups. | | BGP | HIGH | 33554443 | BGP failed to delete peer structure | BGP was unable to delete the peer structure when the address-family was removed. | Determine if all expected peers are removed and restart FRR if not. This is most likely a bug. | | BGP | HIGH | 33554444 | BGP failed to get table chunk memory | BGP unable to get chunk memory for table manager. | Ensure there is adequate memory on the device to support the table requirements. | @@ -38,8 +38,8 @@ The following table lists the HIGH severity ERROR log messages generated by FRR. | BGP | HIGH | 33554457 | BGP error receiving keepalive packet | BGP unable to process a keepalive packet. | BGP keepalive received while in a stopped state. If the problem persists, report it for troubleshooting. | | BGP | HIGH | 33554458 | BGP error receiving route refresh message | BGP unable to process route refresh message. | BGP route refresh received while in a stopped state. If the problem persists, report it for troubleshooting. | | BGP | HIGH | 33554459 | BGP error capability message | BGP unable to process received capability. | BGP capability message received while in a stopped state. If the problem persists, report it for troubleshooting. | -| BGP | HIGH | 33554460 | BGP error with nexthopo update | BGP unable to process nexthop update. | BGP received the nexthop update but the nexthop is not reachable in this BGP instance. Report the problem for troubleshooting. | -| BGP | HIGH | 33554461 | Failure to apply label | BGP attempted to attempted to apply a label but could not do so. | This is most likely a bug. If the problem persists, report it for troubleshooting. | +| BGP | HIGH | 33554460 | BGP error with nexthop update | BGP unable to process nexthop update. | BGP received the nexthop update but the nexthop is not reachable in this BGP instance. Report the problem for troubleshooting. | +| BGP | HIGH | 33554461 | Failure to apply label | BGP attempted to apply a label but could not do so. | This is most likely a bug. If the problem persists, report it for troubleshooting. | | BGP | HIGH | 33554462 | Multipath specified is invalid | BGP was started with an invalid ECMP/multipath value. | Correct the ECMP/multipath value supplied when starting the BGP daemon. | | BGP | HIGH | 33554463 | Failure to process a packet | BGP attempted to process a received packet but could not do so. | This is most likely a bug. If the problem persists, report it for troubleshooting. | | BGP | HIGH | 33554464 | Failure to connect to peer | BGP attempted to send open to a peer but couldn't connect. | This is most likely a bug. If the problem persists, report it for troubleshooting. | @@ -62,7 +62,7 @@ The following table lists the HIGH severity ERROR log messages generated by FRR. | EIGRP | HIGH | 50331650 | EIGRP Configuration Error | EIGRP has detected a configuration error.| Correct the configuration issue. If it still persists, report the issue for troubleshooting.| | General | HIGH | 100663297 | Failure to raise or lower privileges | FRR attempted to raise or lower its privileges and was unable to do so. | Ensure that you are running FRR as the frr user and that the user has sufficient privileges to properly access root privileges. | | General | HIGH | 100663298 | VRF Failure on Start | Upon startup, FRR failed to properly initialize and start up the VRF subsystem. | Ensure that there is sufficient memory to start processes, then restart FRR. | -| General | HIGH | 100663299 | Socket Error | When attempting to access a socket, a system error occured and FRR was unable to properly complete the request. | Ensure that there are sufficient system resources available and ensure that the frr user has sufficient permisions to work. | +| General | HIGH | 100663299 | Socket Error | When attempting to access a socket, a system error occurred and FRR was unable to properly complete the request. | Ensure that there are sufficient system resources available and ensure that the frr user has sufficient permissions to work. | | General | HIGH | 100663303 | System Call Error | FRR has detected an error from using a vital system call and has probably already exited. | Ensure permissions are correct for FRR users and groups. Additionally, check that sufficient system resources are available. | | General | HIGH | 100663304 | VTY Subsystem Error | FRR has detected a problem with the specified configuration file. | Ensure the configuration file exists and has the correct permissions for operations. Additionally, ensure that all config lines are correct as well. | | General | HIGH | 100663305 | SNMP Subsystem Error | FRR has detected a problem with the SNMP library it uses. A callback from this subsystem has indicated some error. | Examine the callback message and ensure SNMP is properly set up and working. | @@ -86,7 +86,7 @@ The following table lists the HIGH severity ERROR log messages generated by FRR. | OSPF | HIGH | 134217729 | Failure to process a packet | OSPF attempted to process a received packet but could not do so. | This is most likely a bug. If the problem persists, report it for troubleshooting. | | OSPF | HIGH | 134217730 | Failure to process Router LSA | OSPF attempted to process a router LSA, but there was an advertising ID mismtach with the link ID. | Check the OSPF network configuration for any configuration issue. If the problem persists, report it for troubleshooting.| | OSPF | HIGH | 134217731 | OSPF Domain Corruption | OSPF attempted to process a router LSA, but there was an advertising ID mismtach with the link ID. | Check OSPF network database for a corrupted LSA. If the problem persists, shut down the OSPF domain and report the problem for troubleshooting. | -| OSPF | HIGH | 134217732 | OSPF Initialization failure | OSPF failed to initialized the OSPF default instance. | Ensure there is adequate memory on the device. If the problem persists, report it for troubleshooting. | +| OSPF | HIGH | 134217732 | OSPF Initialization failure | OSPF failed to initialize the OSPF default instance. | Ensure there is adequate memory on the device. If the problem persists, report it for troubleshooting. | | OSPF | HIGH | 134217733 | OSPF SR Invalid DB | OSPF segment routing database is invalid. | This is most likely a bug. If the problem persists, report it for troubleshooting. | | OSPF | HIGH | 134217734 | OSPF SR hash node creation failed | OSPF segment routing node creation failed. | This is most likely a bug. If the problem persists, report it for troubleshooting. | | OSPF | HIGH | 134217735 | OSPF SR Invalid lsa id | OSPF segment routing invalid LSA ID. | Restart the OSPF instance. If the problem persists, report it for troubleshooting. | diff --git a/content/cumulus-linux-51/Monitoring-and-Troubleshooting/Simple-Network-Management-Protocol-SNMP/Configure-SNMP.md b/content/cumulus-linux-51/Monitoring-and-Troubleshooting/Simple-Network-Management-Protocol-SNMP/Configure-SNMP.md index 59c31968b1..678c2aaf4f 100644 --- a/content/cumulus-linux-51/Monitoring-and-Troubleshooting/Simple-Network-Management-Protocol-SNMP/Configure-SNMP.md +++ b/content/cumulus-linux-51/Monitoring-and-Troubleshooting/Simple-Network-Management-Protocol-SNMP/Configure-SNMP.md @@ -158,7 +158,7 @@ You can authenticate the user in the following ways: - With no authentication password (if you specify `auth-none`) - With an MD5 password -- With a SHA password +- With an SHA password {{< tabs "username" >}} {{< tab "NVUE Commands" >}} diff --git a/content/cumulus-linux-51/Monitoring-and-Troubleshooting/Simple-Network-Management-Protocol-SNMP/Supported-MIBs.md b/content/cumulus-linux-51/Monitoring-and-Troubleshooting/Simple-Network-Management-Protocol-SNMP/Supported-MIBs.md index 84401f8afb..292432f48f 100644 --- a/content/cumulus-linux-51/Monitoring-and-Troubleshooting/Simple-Network-Management-Protocol-SNMP/Supported-MIBs.md +++ b/content/cumulus-linux-51/Monitoring-and-Troubleshooting/Simple-Network-Management-Protocol-SNMP/Supported-MIBs.md @@ -10,7 +10,7 @@ Below are the MIBs that Cumulus Linux supports, as well as suggested uses for th |
MIB Name | Suggested Uses | | -------- | -------------- | | {{}}
{{}}
{{}}
{{}} | You can enable FRR SNMP support to provide support for OSPF-MIB (RFC-1850), OSPFV3-MIB (RFC-5643), and BGP4-MIB (RFC-1657). | -| {{}} | Cumulus Linux also includes its own BGP unnumbered MIB for BGP unnumbered peers, defined in `/usr/share/snmp/mibs/Cumulus-BGPUN-MIB.txt`, which has the OID `1.3.6.1.4.1.40310.7`.| +| {{}} | Cumulus Linux also includes its own BGP unnumbered MIB for BGP unnumbered peers, defined in `/usr/share/snmp/mibs/Cumulus-BGPUN-MIB.txt`, which has the OID `1.3.6.1.4.1.40310.7`.| | {{}} | Discard counters: Cumulus Linux also includes its own counters MIB, defined in `/usr/share/snmp/mibs/Cumulus-Counters-MIB.txt`. It has the OID `.1.3.6.1.4.1.40310.2`. | | {{}} | Cumulus Linux includes its own resource utilization MIB, which is similar to using `cl-resource-query`. This MIB monitors layer 3 entries by host, route, nexthops, ECMP groups, and layer 2 MAC/BDPU entries. `/usr/share/snmp/mibs/Cumulus-Resource-Query-MIB.txt` defines this MIB, which has the OID `.1.3.6.1.4.1.40310.1`. | | {{}} | SNMP counters. For information on exposing CPU and memory information with SNMP, see this [knowledge base article]({{}}). | diff --git a/content/cumulus-linux-51/Monitoring-and-Troubleshooting/Troubleshooting-Network-Interfaces/Troubleshoot-Layer-1.md b/content/cumulus-linux-51/Monitoring-and-Troubleshooting/Troubleshooting-Network-Interfaces/Troubleshoot-Layer-1.md index 3b541932ad..c094340e7e 100644 --- a/content/cumulus-linux-51/Monitoring-and-Troubleshooting/Troubleshooting-Network-Interfaces/Troubleshoot-Layer-1.md +++ b/content/cumulus-linux-51/Monitoring-and-Troubleshooting/Troubleshooting-Network-Interfaces/Troubleshoot-Layer-1.md @@ -761,7 +761,7 @@ Because I2C problems can be very pernicious, often showing up again much later a To verify that an I2C failure is occurring, run `sudo tail -F /var/log/syslog` and look for `smbus` or `i2c` or `EEPROM read` errors that continue to appear or appear in bursts. -Based on the failure scenario when tyou discover the issue, choose when to address this issue; immediately or during a maintenance window. +Based on the failure scenario when you discover the issue, choose when to address this issue; immediately or during a maintenance window. - If traffic or the switch operates negatively and you cannot route traffic through a redundant network, you must do something immediately. - If you can route traffic around the failing switch, allowing troubleshooting to proceed on the failed switch, proceed to reroute traffic to find an appropriate time to troubleshoot the failing switch. diff --git a/content/cumulus-linux-51/Network-Virtualization/Ethernet-Virtual-Private-Network-EVPN/Basic-Configuration.md b/content/cumulus-linux-51/Network-Virtualization/Ethernet-Virtual-Private-Network-EVPN/Basic-Configuration.md index 3b19c79fcb..6e2169f328 100644 --- a/content/cumulus-linux-51/Network-Virtualization/Ethernet-Virtual-Private-Network-EVPN/Basic-Configuration.md +++ b/content/cumulus-linux-51/Network-Virtualization/Ethernet-Virtual-Private-Network-EVPN/Basic-Configuration.md @@ -70,7 +70,7 @@ cumulus@leaf01:~$ nv set vrf default router bgp neighbor swp51 address-family l2 cumulus@leaf01:~$ nv config apply ``` -You do not need enable the BGP control plane for all VNIs configured on the switch with NVUE with the `advertise-all-vni` option. FRR **is** aware of any local VNIs and MACs, and hosts (neighbors) associated with those VNIs. +You do not need to enable the BGP control plane for all VNIs configured on the switch with NVUE with the `advertise-all-vni` option. FRR **is** aware of any local VNIs and MACs, and hosts (neighbors) associated with those VNIs. After you run `nv config save`, the NVUE Commands create the following configuration snippet in the `/etc/nvue.d/startup.yaml` file: @@ -289,7 +289,7 @@ router bgp 65101 bgp router-id 10.10.10.1 neighbor swp51 interface remote-as external address-family l2vpn evpn -neighbor swp1 activate +neighbor swp51 activate advertise-all-vni ... ``` @@ -305,7 +305,7 @@ spine01(config)# router bgp 65199 spine01(config-router)# bgp router-id 10.10.10.101 spine01(config-router)# neighbor swp1 interface remote-as external spine01(config-router)# address-family l2vpn evpn -spine01(config-router-af)# neighbor swp51 activate +spine01(config-router-af)# neighbor swp1 activate spine01(config-router-af)# end spine01)# write memory spine01)# exit diff --git a/content/cumulus-linux-51/Network-Virtualization/VXLAN-Devices.md b/content/cumulus-linux-51/Network-Virtualization/VXLAN-Devices.md index d52c02c702..040b2cf916 100644 --- a/content/cumulus-linux-51/Network-Virtualization/VXLAN-Devices.md +++ b/content/cumulus-linux-51/Network-Virtualization/VXLAN-Devices.md @@ -197,7 +197,7 @@ cumulus@leaf01:~$ ifreload -a ## Automatic VLAN to VNI Mapping -In an EVPN VXLAN environment, you need to map individual VLANs to VNIs. For a single VXLAN device, you can do this with a seperate NVUE command per VLAN; however, this can be cumbersome if you have to configure many VLANS or need to isolate tenants and reuse VLANs. To simplify the configuration, you can use these two commands instead: +In an EVPN VXLAN environment, you need to map individual VLANs to VNIs. For a single VXLAN device, you can do this with a separate NVUE command per VLAN; however, this can be cumbersome if you have to configure many VLANS or need to isolate tenants and reuse VLANs. To simplify the configuration, you can use these two commands instead: - `nv set bridge domain vlan vni auto` configures the specified VLANs to use automatic mapping. - `nv set bridge domain vlan-vni-offset` configures the offset you want to use for the VNIs. For example, if you specify an offset of 10000, the VNI is the VLAN plus 10000. diff --git a/content/cumulus-linux-51/System-Configuration/Authentication-Authorization-and-Accounting/LDAP-Authentication-and-Authorization.md b/content/cumulus-linux-51/System-Configuration/Authentication-Authorization-and-Accounting/LDAP-Authentication-and-Authorization.md index fbe8e4e8d7..64a23c02c6 100644 --- a/content/cumulus-linux-51/System-Configuration/Authentication-Authorization-and-Accounting/LDAP-Authentication-and-Authorization.md +++ b/content/cumulus-linux-51/System-Configuration/Authentication-Authorization-and-Accounting/LDAP-Authentication-and-Authorization.md @@ -57,10 +57,11 @@ Entering incorrect information during the installation process produces configur - Edit the `/etc/nslcd.conf` file to update the LDAP URI and search base DN (see {{}}, below). - Edit the `/etc/nssswitch.conf` file to update the service selections. -Be sure to restart `netd` after editing the files. +Restart `nvued.service` and `nginx-authenticator.service` after editing the files. ``` -cumulus@switch:~$ sudo systemctl restart netd.service +cumulus@switch:~$ sudo systemctl restart nvued.service +cumulus@switch:~$ sudo systemctl restart nginx-authenticator.service ``` {{< expand "Alternative Installation Method Using debconf-utils " >}} @@ -131,7 +132,7 @@ After installation, update the main configuration file (`/etc/nslcd.conf`) to ac This section documents some of the more important options that relate to security and queries. For details on all the available configuration options, read the {{}}. {{%notice note%}} -After first editing the `/etc/nslcd.conf` file and/or enabling LDAP in the `/etc/nsswitch.conf` file, you must restart `netd` with the `sudo systemctl restart netd` command. If you disable LDAP, you need to restart the `netd` service. +After editing the `/etc/nslcd.conf` file or enabling LDAP in the `/etc/nsswitch.conf` file, you must restart the NVUE and nginx-authenticator services with the `sudo systemctl restart nvued.service` command and the `sudo systemctl restart nginx-authenticator.service` command. If you disable LDAP, you must also restart these two services. {{%/notice%}} ### Connection diff --git a/content/cumulus-linux-51/System-Configuration/Authentication-Authorization-and-Accounting/RADIUS-AAA.md b/content/cumulus-linux-51/System-Configuration/Authentication-Authorization-and-Accounting/RADIUS-AAA.md index d12209dd9d..f5306769cf 100644 --- a/content/cumulus-linux-51/System-Configuration/Authentication-Authorization-and-Accounting/RADIUS-AAA.md +++ b/content/cumulus-linux-51/System-Configuration/Authentication-Authorization-and-Accounting/RADIUS-AAA.md @@ -31,7 +31,18 @@ During package installation: ## Configure the RADIUS Client -To configure the RADIUS client, edit the `/etc/pam_radius_auth.conf` file: +To configure the RADIUS client, edit the `/etc/pam_radius_auth.conf` file. + +{{%notice note%}} + +After editing the `/etc/pam_radius_auth.conf` file, you must restart both `nvued.service` and `nginx-authenticator.service`: + +``` +cumulus@switch:~$ sudo systemctl restart nvued.service +cumulus@switch:~$ sudo systemctl restart nginx-authenticator.service +``` + +{{%/notice%}} 1. Add the hostname or IP address of at least one RADIUS server (such as a *{{}}* server on Linux), and the shared secret used to authenticate and encrypt communication with each server. diff --git a/content/cumulus-linux-51/System-Configuration/Authentication-Authorization-and-Accounting/TACACS.md b/content/cumulus-linux-51/System-Configuration/Authentication-Authorization-and-Accounting/TACACS.md index 83d28024be..57f0456284 100644 --- a/content/cumulus-linux-51/System-Configuration/Authentication-Authorization-and-Accounting/TACACS.md +++ b/content/cumulus-linux-51/System-Configuration/Authentication-Authorization-and-Accounting/TACACS.md @@ -27,6 +27,17 @@ cumulus@switch:~$ sudo -E apt-get install tacplus-client ## Configure the TACACS+ Client +{{%notice note%}} + +After you configure TACACS+ settings, you must restart both `nvued.service` and `nginx-authenticator.service`: + +``` +cumulus@switch:~$ sudo systemctl restart nvued.service +cumulus@switch:~$ sudo systemctl restart nginx-authenticator.service +``` + +{{%/notice%}} + After installing TACACS+, edit the `/etc/tacplus_servers` file to add at least one server and one shared secret (key). You can specify the server and secret parameters in any order anywhere in the file. Whitespace (spaces or tabs) are not allowed. For example, if your TACACS+ server IP address is `192.168.0.30` and your shared secret is `tacacskey`, add these parameters to the `/etc/tacplus_servers` file: ``` @@ -127,10 +138,11 @@ The first `adduser` command prompts for information and a password. You can skip 3. Edit the `/etc/nsswitch.conf` file to add the keyword `tacplus` back to the line starting with `passwd` (the keyword you removed in the first step). -4. Restart the `nvued` service with the following command: +4. Restart the `nvued` service and the `nginx-authenticator` service with the following commands: ``` - cumulus@switch:~$ sudo systemctl restart nvued + cumulus@switch:~$ sudo systemctl restart nvued.service + cumulus@switch:~$ sudo systemctl restart nginx-authenticator.service ``` ## TACACS+ Accounting diff --git a/content/cumulus-linux-51/System-Configuration/Date-and-Time/Precision Time Protocol-PTP.md b/content/cumulus-linux-51/System-Configuration/Date-and-Time/Precision Time Protocol-PTP.md index ccd7905188..dca9cb7463 100644 --- a/content/cumulus-linux-51/System-Configuration/Date-and-Time/Precision Time Protocol-PTP.md +++ b/content/cumulus-linux-51/System-Configuration/Date-and-Time/Precision Time Protocol-PTP.md @@ -202,7 +202,7 @@ delay_mechanism E2E network_transport UDPv4 ``` -For a trunk VLAN, add the VLAN configuration to the switch port stanza: set `l2_mode` to `trunk`, `vlan_intf` to the VLAN interface, and `src_ip` to the IP adress of the VLAN interface: +For a trunk VLAN, add the VLAN configuration to the switch port stanza: set `l2_mode` to `trunk`, `vlan_intf` to the VLAN interface, and `src_ip` to the IP address of the VLAN interface: ``` [swp1] @@ -220,7 +220,7 @@ network_transport UDPv4 For a switch VLAN, add ``` -For a switch port VLAN, add the VLAN configuration to the switch port stanza: set `l2_mode` to `access`, `vlan_intf` to the VLAN interface, and `src_ip` to the IP adress of the VLAN interface: +For a switch port VLAN, add the VLAN configuration to the switch port stanza: set `l2_mode` to `access`, `vlan_intf` to the VLAN interface, and `src_ip` to the IP address of the VLAN interface: ``` [swp2] @@ -1168,9 +1168,9 @@ The following example shows that there are no violations: cumulus@switch:~$ nv show service ptp 1 monitor violations operational applied description ---------------- ----------- ------- ----------------------------------------------- -last-max-offset Time at which last max offest violation occured -last-min-offset Time at which last min offest violation occured -last-path-delay Time at which last path delay violation occured +last-max-offset Time at which last max offest violation occurred +last-min-offset Time at which last min offest violation occurred +last-path-delay Time at which last path delay violation occurred max-offset-count 0 Number of maximum offset violations min-offset-count 0 Number of min offset violations path-delay-count 0 Number of Path delay violations diff --git a/content/cumulus-linux-51/System-Configuration/Netfilter-ACLs.md b/content/cumulus-linux-51/System-Configuration/Netfilter-ACLs.md index d79ea2a0b9..e67a51177f 100644 --- a/content/cumulus-linux-51/System-Configuration/Netfilter-ACLs.md +++ b/content/cumulus-linux-51/System-Configuration/Netfilter-ACLs.md @@ -138,7 +138,7 @@ The incremental nonatomic update operation follows this order: 2. Cumulus Linux checks if the rules in a table are different from installation time; if a table does not have any changes, it does not reinstall the rules. 3. If there are changes in a table, the new rules populate in new groups or slices in hardware, then that table switches over to the new groups or slices. 4. Finally, old resources for that table free up. This process repeats for each of the tables listed above. -5. If there are isufficient resources to hold both the new rule set and old rule set, Cumulus Linux tries the regular nonatomic mode, which interrupts network traffic. +5. If there are insufficient resources to hold both the new rule set and old rule set, Cumulus Linux tries the regular nonatomic mode, which interrupts network traffic. 6. If the regular nonatomic update fails, Cumulus Linux reverts back to the previous rules. To always start `switchd` with nonatomic updates: @@ -1309,7 +1309,7 @@ To work around this limitation, set the rate and burst for all these rules to th ### Where to Assign Rules - If you assign a switch port to a bond, you must assign any egress rules to the bond. -- When using the OUTPUT chain, you must assign rules to the source. For example, if you assign a rule to the switch port in the direction of traffic but the source is a bridge (VLAN), the rule does not affect the traffic and you must applied the rule to the bridge. +- When using the OUTPUT chain, you must assign rules to the source. For example, if you assign a rule to the switch port in the direction of traffic but the source is a bridge (VLAN), the rule does not affect the traffic and you must apply the rule to the bridge. - If you need to apply a rule to all transit traffic, use the FORWARD chain, not the OUTPUT chain. ### ACL Rule Installation Failure @@ -1328,7 +1328,7 @@ failed. Entity MIB
1.3.6.1.2.1.99 --> Entity Sensor MIB
1.3.6.1.2.1.23 --> rip2
1.3.6.1.2.1.2 --> interface/interfaces
1.3.6.1.2.1.31 --> ifMIB
1.3.6.1.2.1.4 --> IP
1.3.6.1.2.1.25 --> hostResource | 5.0.1-5.4.0 | 5.5.0-5.6.0| +| [3141826](#3141826)
| A slow memory leak (~5KB over 24 hour period at a 60 second polling interval) might occur in SNMP when you walk the following system MIB objects (1.3.6.1.2.1)
1.3.6.1.2.1.47 --> Entity MIB
1.3.6.1.2.1.99 --> Entity Sensor MIB
1.3.6.1.2.1.23 --> rip2
1.3.6.1.2.1.2 --> interface/interfaces
1.3.6.1.2.1.31 --> ifMIB
1.3.6.1.2.1.4 --> IP
1.3.6.1.2.1.25 --> hostResource | 5.0.1-5.6.0 | | | [3141818](#3141818)
| If there is extensive and continuous next-hop group (NHG) churn when routes keep moving from one NHG to another NHG repeatedly, switchd increases in memory allocation until memory is exhausted. Other processes might be affected as they try to acquire memory which is unavailable. | 5.0.1-5.1.0 | 5.2.0-5.6.0| | [3139364](#3139364)
| When Cumulus Linux updates the ECMP container with a new next hop list, it allocates the flow counters for the new next hop list without deallocating the counters bound to the old next hop list. This results in resource exhaustion and you see the following error messages in the /var/log/switchd.log file:
hal_mlx_stat.c:3215 ERR Failed to allocate counter(s) for ecmp [71025:0] status: Internal Errorhal_mlx_stat.c:3196 ERR Counter set for ecmp [71025:0] idx 0 failed: Internal Errorhal_mlx_sdk_nexthop_wrap.c:1076 ERR Counter 0 alloc for ecmp next hop failed: Internal Errorhal_mlx_sdk_counter_wrap.c:54 ERR Counter alloc failed: No More Resources
This issue does not have any functional impact to forwarding. Even without the flow counters attached to the ECMP group, packet forwarding works without any issues
To avoid allocating next hop counters for any new ECMP next hop list update, set mlx.stats.ecmp.enable to FALSE in the /etc/mlx/datapath/stats.conf file, then restart switchd with the sudo systemctl reload switchd command. | 5.0.0-5.2.1 | 5.3.0-5.6.0| | [3138746](#3138746)
| The switch duplicates DHCP packets that pass through the VTEP. | 4.3.0-5.1.0 | 5.2.0-5.6.0| @@ -127,7 +127,6 @@ pdfhidden: True | [2886476](#2886476)
| If you enable or disable the advertise primary IP address setting when originating EVPN default type-5 routes, the default route or prefix originated from one of the MLAG peers sends a null layer 3 VNI, which prevents the remote VTEP from installing the default route. | 5.0.0-5.1.0 | 5.2.0-5.6.0| | [2867248](#2867248)
| The validate-ports -d command does not return the correct speeds for ports. Use the speeds specified in the /etc/cumulus/ports.conf file. | 5.0.0-5.1.0 | 5.2.0-5.6.0| | [2867042](#2867042)
| When connecting the NVIDIA SN4600 switch to another NVIDIA Spectrum switch, you must use auto-negotiation mode (not force mode); otherwise the switch might use the wrong Tx configuration. | 5.0.0-5.6.0 | | -| [2847919](#2847919)
| Configuring a router with the REST API through the switch front panel ports (swps) is supported in the default VRF only. To work around this issue, use the localHost IP address or the MGMT IP address to configure router using the Rest API. | 5.0.0-5.6.0 | | | [2847755](#2847755)
| When you use NCLU to remove the configuration for a peer that is a member of a group but also has other peer-specific configuration, you must remove the peer-specific configuration before you delete the peer in a separate NCLU commit. | 5.0.0-5.6.0 | | | [2831968](#2831968)
| The switch duplicates DHCP packets that pass through the VTEP. | 4.3.0, 4.4.0-4.4.5, 5.0.0-5.6.0 | 4.3.1| | [2823307](#2823307)
| Cumuls Linux does not support a bond with more than 64 ports. Any configuration with more than 64 ports in a bond changes all ports to down when you apply the configuration. | 5.0.0-5.6.0 | | @@ -182,7 +181,7 @@ pdfhidden: True | [2910017](#2910017)
| SNMP reports the same ifType of ethernetCsmacd(6) for loopback interfaces. | 3.7.15-4.4.2, 5.0.0-5.0.1 | | | [2903374](#2903374)
| The nv show interfaces command returns a 500 error and syslog shows a python error, triggered by third party devices (non CL) missing LLDP fields
To work around this issue, disable LLDP on a single interface. | 5.0.0-5.0.1 | | | [2898044](#2898044)
| NVUE commands including the nv config apply command might fail with the following error because the /etc/resolv.conf file is missing
Failed to prepare to applyUnrecoverable internal error
| 5.0.0-5.0.1 | | -| [2893895](#2893895)
CM-33315 | CVE-2020-35498: A vulnerability was found in openvswitch. A limitation in the implementation of userspace packet parsing can allow a malicious user to send a specially crafted packet causing the resulting megaflow in the kernel to be too wide, potentially causing a denial of service. The highest threat from this vulnerability is to system availability
Vulnerable: <= 2.8.90-1-cl4u5Fixed: 2.8.90-1-cl4u6, 2.8.90-1-cl4.4.0u1, 2.8.90-1-cl5.0.0u8 | 4.0.0-4.3.1 | | +| [2893895](#2893895)
CM-33315 | CVE-2020-35498: A vulnerability was found in openvswitch. A limitation in the implementation of userspace packet parsing can allow a malicious user to send a specially crafted packet causing the resulting megaflow in the kernel to be too wide, potentially causing a denial of service. The highest threat from this vulnerability is to system availability
Vulnerable: <= 2.8.90-1-cl4u5Fixed: 2.8.90-1-cl4u6, 2.8.90-1-cl4.4.0u1, 2.8.90-1-cl5.0.0u8 | 4.0.0-4.3.2 | | | [2886488](#2886488)
| NVUE commands fail to configure port mirroring. | 5.0.0-5.0.1 | | | [2885287](#2885287)
| When you change the port breakout configuration, you must restart switchd to clean up any previously-associated port states and reinitialize the ports. Reloading switchd does not work. | 5.0.0-5.0.1 | | | [2875338](#2875338)
| In a scaled EVPN-MLAG configuration (observed with 400 or more VNIs and 20K or more MAC addresses – the actual scale might vary), when the peer link flaps causing all VNIs to come up at the same time, there might be high CPU utilization on the system for several minutes and the FRR service might restart. After FRR restarts or the CPU utilization settles down, the system functions normally. | 4.2.1-4.3.0, 4.4.0-5.0.1 | | @@ -190,7 +189,7 @@ pdfhidden: True | [2860323](#2860323)
| If two FDB entries are added in hardware with a single API call (at the same time), when one entry already exists in hardware and the additional entry has a tunnel type, the resulting FDB entry might be configured improperly in hardware. This can cause corruption of the packets that match the FDB entry. | 4.4.0-5.0.1 | | | [2859015](#2859015)
| In a static VXLAN configuration with a traditional or single VXLAN device, enabling bridge learning on the VNI leads to an incorrect warning and the setting is removed in the next commit. The warning is similar to the following:
warning: vni10: possible mis-configuration detected: l2-vni configured with bridge-learning ON while EVPN is also configured - these two parameters conflict with each other
| 5.0.0-5.0.1 | | | [2855908](#2855908)
| Traffic failover in a multicast topology with redundancy has the mroute stuck in a prune state and PIM join messages continue to send. To work around this issue, run the vtysh clear ip mroute command. | 3.7.15-4.3.0, 5.0.0-5.0.1 | | -| [2854787](#2854787)
| An unexpected software system shutdown can occur due to a thermal zones issue in the hw-management package. The following message might appear in /var/log/syslog before the shutdown:
thermal thermal_zoneX: critical temperature reached (33 C), shutting down
| 4.3.0-4.3.1 | | +| [2854787](#2854787)
| An unexpected software system shutdown can occur due to a thermal zones issue in the hw-management package. The following message might appear in /var/log/syslog before the shutdown:
thermal thermal_zoneX: critical temperature reached (33 C), shutting down
| 4.3.0-4.3.2 | | | [2815646](#2815646)
| In an EVPN configuration, an FRR restart on a border leaf VRRP master causes a stale route for the VRRP VIP on some remote VTEPs to point to the VRRP backup after convergence. | 3.7.12-3.7.15, 4.3.0, 4.4.2-5.0.1 | | | [2713888](#2713888)
| With the ip-acl-heavy TCAM profile, the following message might appear after you install an ACL with NCLU or cl-acltool and the ACL might not work correctly
hal_flx_acl_util.c:378 ERR hal_flx_acl_resource_release resource region 0 size 7387 create failed: No More Resources
To work around this issue, change the TCAM profile to acl-heavy or ip-acl-heavy with ACL non-atomic mode. | 3.7.15-5.0.1 | | | [2685994](#2685994)
| When you use the NVUE command nv set interface lo router ospf area to configure OSPF on a loopback interface, the configuration fails to apply
To work around this issue, configure the loopback interface in the desired OSPF area with the nv set vrf default router ospf area 0 network command and reference the assigned prefix of the loopback interface. For example:
cumulus@leaf01:~$ nv set vrf default router ospf area 0 network 10.10.10.1/32
| 4.0.0-5.0.1 | | diff --git a/content/cumulus-linux-51/rn.xml b/content/cumulus-linux-51/rn.xml index 9c2214e54b..c06735ba73 100644 --- a/content/cumulus-linux-51/rn.xml +++ b/content/cumulus-linux-51/rn.xml @@ -14,7 +14,7 @@ This configuration is not allowed; it is considered to be eBGP and local preference is not advertised. 5.0.0-5.5.1 -5.6.0 +4.3.2-4.4.5, 5.6.0 3585467 @@ -33,8 +33,8 @@ This configuration is not allowed; it is considered to be eBGP and local prefere CVE-2023-38408: The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009. Mitigation: Do not use ssh-agent forwarding (the man page for ssh_config says that "agent forwarding should be enabled with caution"), or start the ssh-agent program with the -P option to allow only specific PKCS#11 libraries (or none with -P ''). For Cumulus Linux 4.3.2, the /usr/bin/ssh-agent program has all permissions turned off (chmod 0) to prevent its execution if a vulnerable version is detected. -4.0.0-4.4.5, 5.0.0-5.6.0 - +4.0.0-4.3.1, 5.0.0-5.6.0 +4.3.2-4.4.5 3541912 @@ -88,7 +88,7 @@ For Cumulus Linux 4.3.2, the /usr/bin/ssh-agent program has all permissions turn 3413827 During upgrade, when one MLAG node is upgraded and the other MLAG node is not yet upgraded, permanent neighbors cannot synchronize between MLAG nodes. The {{clagctl dumppermanentneighs}} command only shows local neighbors. 5.0.0-5.4.0 -5.5.0-5.6.0 +4.3.2-4.4.5, 5.5.0-5.6.0 3413785 @@ -116,8 +116,8 @@ To obtain the correct packages, install the {{tacplus-client}} package and its d 3351951 Currently, the default core dump size limit on Cumulus Linux is 256M but the SDK generates core dumps around 800M. To avoid incomplete core files, you can increase the core dump size limit. -4.2.1-5.3.1 -5.4.0-5.6.0 +4.2.1-4.3.1, 4.4.0-5.3.1 +4.3.2, 5.4.0-5.6.0 3350789 @@ -127,9 +127,7 @@ To obtain the correct packages, install the {{tacplus-client}} package and its d 3347677 -In an MLAG configuration, when a link failure occurs on the peerlink or the peerlink shuts down, the switch in the secondary role attracts traffic to its local VTEP as it advertises the local VTEP IP address momentarily just before the VXLAN device is protodown. This traffic is dropped for a brief moment (between 5 and 10 seconds) because the MLAG bonds on the secondary switch are already protodown. - -In a proposed fix in the MR !226, we are not flapping the IP on vxlan device on secondary clag device on peerlink down trigger. This ensures smooth traffic flow and no convergence issue seen in system test bed with this fix. +In an MLAG configuration, when a link failure occurs on the peerlink or the peerlink shuts down, the switch in the secondary role attracts traffic to its local VTEP as it advertises the local VTEP IP address momentarily just before the VXLAN device is protodown. This traffic is dropped for a brief moment (between 5 and 10 seconds) because the MLAG bonds on the secondary switch are already protodown. 5.1.0-5.6.0 @@ -229,8 +227,8 @@ Packet size is larger than router interface MTU – Validate the router interfac 3192808 When the switch receives an LLDP frame from a Cisco router right after a {{ptmd}} restart, the {{ptmd}} service crashes. -4.3.0-5.2.1 -5.3.0-5.6.0 +4.3.0-4.3.1, 4.4.0-5.2.1 +4.3.2, 5.3.0-5.6.0 3187469 @@ -341,8 +339,8 @@ To work around this issue, avoid restarting the {{switchd}} service in the ZTP s 1.3.6.1.2.1.31 --> ifMIB 1.3.6.1.2.1.4 --> IP 1.3.6.1.2.1.25 --> hostResource -5.0.1-5.4.0 -5.5.0-5.6.0 +5.0.1-5.6.0 + 3141818 @@ -805,12 +803,6 @@ Fixed: 2.6.0+dfsg.1-1+deb10u1 -2847919 -Configuring a router with the REST API through the switch front panel ports (swps) is supported in the default VRF only. To work around this issue, use the localHost IP address or the MGMT IP address to configure router using the Rest API. -5.0.0-5.6.0 - - - 2847755 When you use NCLU to remove the configuration for a peer that is a member of a group but also has other peer-specific configuration, you must remove the peer-specific configuration before you delete the peer in a separate NCLU commit. 5.0.0-5.6.0 @@ -1129,7 +1121,7 @@ Unrecoverable internal error CVE-2020-35498: A vulnerability was found in openvswitch. A limitation in the implementation of userspace packet parsing can allow a malicious user to send a specially crafted packet causing the resulting megaflow in the kernel to be too wide, potentially causing a denial of service. The highest threat from this vulnerability is to system availability. Vulnerable: <= 2.8.90-1-cl4u5 Fixed: 2.8.90-1-cl4u6, 2.8.90-1-cl4.4.0u1, 2.8.90-1-cl5.0.0u8 -4.0.0-4.3.1 +4.0.0-4.3.2 2886488 @@ -1175,7 +1167,7 @@ warning: vni10: possible mis-configuration detected: l2-vni configured with brid thermal thermal_zoneX: critical temperature reached (33 C), shutting down -4.3.0-4.3.1 +4.3.0-4.3.2 2815646 diff --git a/content/cumulus-linux-52/Installation-Management/Installing-a-New-Cumulus-Linux-Image.md b/content/cumulus-linux-52/Installation-Management/Installing-a-New-Cumulus-Linux-Image.md index a3c23daa98..1acb19595c 100644 --- a/content/cumulus-linux-52/Installation-Management/Installing-a-New-Cumulus-Linux-Image.md +++ b/content/cumulus-linux-52/Installation-Management/Installing-a-New-Cumulus-Linux-Image.md @@ -323,7 +323,7 @@ You can run several installer command line options from ONIE to perform basic sw - Execute a ZTP script to perform necessary configuration {{%notice note%}} -The `onie-nos-install` command does *not* allow you specify command line parameters. You must access the switch from the console and transfer a disk image to the switch. You must then make the disk image executable and install the image directly from the ONIE command line with the options you want to use. +The `onie-nos-install` command does *not* allow you to specify command line parameters. You must access the switch from the console and transfer a disk image to the switch. You must then make the disk image executable and install the image directly from the ONIE command line with the options you want to use. The following example commands transfer a disk image to the switch, make the image executable, and install the image with the `--password` option to change the default cumulus user password: diff --git a/content/cumulus-linux-52/Layer-1-and-Switch-Ports/DHCP/DHCP-Relays.md b/content/cumulus-linux-52/Layer-1-and-Switch-Ports/DHCP/DHCP-Relays.md index 994e48072e..301dff91d4 100644 --- a/content/cumulus-linux-52/Layer-1-and-Switch-Ports/DHCP/DHCP-Relays.md +++ b/content/cumulus-linux-52/Layer-1-and-Switch-Ports/DHCP/DHCP-Relays.md @@ -103,7 +103,7 @@ cumulus@leaf01:~$ nv config apply ## Optional Configuration -This section describes optional DHCP relay configuration. The steps provided in this section assume that you already done basic DHCP relay configuration, described above. +This section describes optional DHCP relay configurations. The steps provided in this section assume that you have already configured basic DHCP relay, as described above. ### DHCP Agent Information Option (Option 82) diff --git a/content/cumulus-linux-52/Layer-1-and-Switch-Ports/DHCP/DHCP-Snooping.md b/content/cumulus-linux-52/Layer-1-and-Switch-Ports/DHCP/DHCP-Snooping.md new file mode 100644 index 0000000000..8454c280ef --- /dev/null +++ b/content/cumulus-linux-52/Layer-1-and-Switch-Ports/DHCP/DHCP-Snooping.md @@ -0,0 +1,91 @@ +--- +title: DHCP Snooping +author: NVIDIA +weight: 355 +toc: 3 +--- +DHCP snooping enables Cumulus Linux to act as a middle layer between the DHCP infrastructure and DHCP clients by scanning DHCP control packets and building an IP-MAC database. Cumulus Linux accepts DHCP offers from only trusted interfaces and can rate limit packets. + +{{%notice note%}} +DHCP option 82 processing is not supported. +{{%/notice%}} + +## Configure DHCP Snooping + +To configure DHCP snooping, you need to: + +- Enable DHCP snooping on a VLAN. +- Add a trusted interface. Cumulus Linux allows DHCP offers from only trusted interfaces to prevent malicious DHCP servers from assigning IP addresses inside the network. The interface must be a member of the bridge specified. +- Set the rate limit for DHCP requests to avoid DoS attacks. The default value is 100 packets per second. + +The following example shows you how to configure DHCP snooping for IPv4 and IPv6. + +{{%notice note%}} +NVUE does not provide commands to configure DHCP Snooping. +{{%/notice%}} + +Create the `/etc/dhcpsnoop/dhcp_snoop.json` file and add DHCP snooping configuration under the bridge. + +The following example enables DHCP snooping for IPv4 on VLAN 10, sets the rate limit to 50 and the trusted interface to swp3. swp3 is a member of the bridge `br_default`: + +``` +cumulus@leaf01:~$ sudo nano /etc/dhcpsnoop/dhcp_snoop.json +{ + "bridge": [ + { + "bridge_id": "br_default", + "vlan": [ + { + "vlan_id": 10, + "snooping": 1, + "rate_limit": 50, + "ip_version": 4, + "trusted_interface": [ + "swp3" + ], + } + ] + } + ] +} +``` + +The following example enables DHCP snooping for IPv6 on VLAN 10, sets the rate limit to 50 and the trusted interface to swp6. swp6 is a member of the bridge `br_default`: + +``` +cumulus@leaf01:~$ sudo nano /etc/dhcpsnoop/dhcp_snoop.json +{ + "bridge": [ + { + "bridge_id": "br_default", + "vlan": [ + { + "vlan_id": 10, + "snooping": 1, + "rate_limit": 50, + "ip_version": 6, + "trusted_interface": [ + "swp6" + ], + } + ] + } + ] +} +``` + +When DHCP snooping detects a violation, the packet is dropped and a message is logged to the `/var/log/dhcpsnoop.log` file. + +## Show the DHCP Binding Table + +To show the DHCP binding table, run the `net show dhcp-snoop table` command for IPv4 or the `net show dhcp-snoop6 table` command for IPv6. The following example command shows the DHCP binding table for IPv4: + +``` +cumulus@leaf01:~$ net show dhcp-snoop table +Port VLAN IP MAC Lease State Bridge +---- ---- --------- ----------------- ----- ----- ------ + +swp5 1002 10.0.0.3 00:02:00:00:00:04 7200 ACK br0 + +swp5 1000 10.0.1.3 00:02:00:00:00:04 7200 ACK br0 +``` diff --git a/content/cumulus-linux-52/Layer-1-and-Switch-Ports/DHCP/_index.md b/content/cumulus-linux-52/Layer-1-and-Switch-Ports/DHCP/_index.md index f494b0f7c1..fd3f513c3c 100644 --- a/content/cumulus-linux-52/Layer-1-and-Switch-Ports/DHCP/_index.md +++ b/content/cumulus-linux-52/Layer-1-and-Switch-Ports/DHCP/_index.md @@ -4,4 +4,7 @@ author: NVIDIA weight: 338 toc: 3 --- -This section describes how to configure [DHCP](## "Dynamic Host Configuration Protocol") relays and [DHCP](## "Dynamic Host Configuration Protocol") servers. +This section describes how to configure: +- {{}} +- {{}} +- {{}} diff --git a/content/cumulus-linux-52/Layer-1-and-Switch-Ports/Interface-Configuration-and-Management/Switch-Port-Attributes.md b/content/cumulus-linux-52/Layer-1-and-Switch-Ports/Interface-Configuration-and-Management/Switch-Port-Attributes.md index ffba3b2125..e26683de5b 100644 --- a/content/cumulus-linux-52/Layer-1-and-Switch-Ports/Interface-Configuration-and-Management/Switch-Port-Attributes.md +++ b/content/cumulus-linux-52/Layer-1-and-Switch-Ports/Interface-Configuration-and-Management/Switch-Port-Attributes.md @@ -1066,7 +1066,7 @@ SN4600 64xQSFP56 (200GbE) interfaces support both PAM4 and NRZ encodings with al For lower speeds, PAM4 is automatically converted to NRZ encoding. -Only 32xQSFP56 ports can brea kout into 4xSFP56 (4x50GbE). But, in this case, the adjacent QSFP56 port are blocked (only the first and third or second and fourth rows can break out into 4xSFP56). +Only 32xQSFP56 ports can break out into 4xSFP56 (4x50GbE). But, in this case, the adjacent QSFP56 port are blocked (only the first and third or second and fourth rows can break out into 4xSFP56). All 64xQSFP56 ports can break out into 2xQSFP56 (2x100GbE) without blocking ports. diff --git a/content/cumulus-linux-52/Layer-1-and-Switch-Ports/Interface-Configuration-and-Management/_index.md b/content/cumulus-linux-52/Layer-1-and-Switch-Ports/Interface-Configuration-and-Management/_index.md index 70231eb3b8..95c53870e3 100644 --- a/content/cumulus-linux-52/Layer-1-and-Switch-Ports/Interface-Configuration-and-Management/_index.md +++ b/content/cumulus-linux-52/Layer-1-and-Switch-Ports/Interface-Configuration-and-Management/_index.md @@ -412,7 +412,7 @@ If you specify a subinterface, such as swp1.100, then run `ifup swp1.100`, Cumul You can specify both IPv4 and IPv6 addresses for the same interface. For IPv6 addresses: -- You can create or modify the IP address for an interface using either `::` or `0:0:0` notation. For example,both 2620:149:43:c109:0:0:0:5 and 2001:DB8::1/126 are valid. +- You can create or modify the IP address for an interface using either `::` or `0:0:0` notation. For example, both 2620:149:43:c109:0:0:0:5 and 2001:DB8::1/126 are valid. - Cumulus Linux assigns the IPv6 address with all zeroes in the interface identifier (2001:DB8::/126) for each subnet; connected hosts cannot use this address. The following example commands configure three IP addresses for swp1; two IPv4 addresses and one IPv6 address. diff --git a/content/cumulus-linux-52/Layer-2/IGMP-and-MLD-Snooping.md b/content/cumulus-linux-52/Layer-2/IGMP-and-MLD-Snooping.md index aad7f770b0..a21a74e1d6 100644 --- a/content/cumulus-linux-52/Layer-2/IGMP-and-MLD-Snooping.md +++ b/content/cumulus-linux-52/Layer-2/IGMP-and-MLD-Snooping.md @@ -85,7 +85,7 @@ cumulus@switch:~$ sudo ifreload -a ## Optimized Multicast Flooding (OMF) -IGMP snooping restricts multicast forwarding only to the ports that receive IGMP report messages. If the ports do not receive IGMP reports, multicast traffic floods to all ports in the bridge domain (also know as unregistered multicast (URMC) traffic). To restrict this flooding to only mrouter ports, you can enable OMF. +IGMP snooping restricts multicast forwarding only to the ports that receive IGMP report messages. If the ports do not receive IGMP reports, multicast traffic floods to all ports in the bridge domain (also known as unregistered multicast (URMC) traffic). To restrict this flooding to only mrouter ports, you can enable OMF. To enable OMF: diff --git a/content/cumulus-linux-52/Layer-2/Multi-Chassis-Link-Aggregation-MLAG.md b/content/cumulus-linux-52/Layer-2/Multi-Chassis-Link-Aggregation-MLAG.md index c7232d3095..275e96e4b2 100644 --- a/content/cumulus-linux-52/Layer-2/Multi-Chassis-Link-Aggregation-MLAG.md +++ b/content/cumulus-linux-52/Layer-2/Multi-Chassis-Link-Aggregation-MLAG.md @@ -832,7 +832,7 @@ The following table shows the conflict types and actions that Cumulus Linux take | LACP partner MAC address | Interface | Protodown the MLAG bonds on the MLAG switch if there is an LACP partner MAC address mismatch or if there is a duplicate LACP partner MAC address. | | MLAG VLANs| Interface | Suspend the inconsistent VLANs on either MLAG peer if the VLANs are not part of the peer link or if there is mismatch of VLANs configured on the MLAG bonds between the MLAG peers. | | Peer link VLANs| Global | Suspend the inconsistent VLANs on either MLAG peer on all the dual-connected MLAG bonds and VXLAN interfaces. | -| MLAG protocol version | Global | The consistency check records an MLAG protocol version mismatch between the MLAG peers. Cumulus Linux does not take any distruptive action. | +| MLAG protocol version | Global | The consistency check records an MLAG protocol version mismatch between the MLAG peers. Cumulus Linux does not take any disruptive action. | | MLAG package version | Global| The consistency check records an MLAG package version mismatch between the MLAG peers. Cumulus Linux does not take any disruptive action.| You can also manually check for MLAG inconsistencies with the following commands: @@ -996,7 +996,7 @@ bridge-learning yes yes - {{< /tab >}} {{< /tabs >}} -The actions that Cumulus Linux takes when there is a conflict are distruptive. If you prefer, you can configure the switch to not take any action when there is a conflict. Edit the `/etc/network/interfaces` file to add the `clagd-args --gracefulConsistencyCheck FALSE` parameter in the peer link stanza. +The actions that Cumulus Linux takes when there is a conflict are disruptive. If you prefer, you can configure the switch to not take any action when there is a conflict. Edit the `/etc/network/interfaces` file to add the `clagd-args --gracefulConsistencyCheck FALSE` parameter in the peer link stanza. ``` cumulus@leaf01:~$ sudo nano /etc/network/interfaces diff --git a/content/cumulus-linux-52/Layer-2/Virtual-Router-Redundancy-VRR-and-VRRP.md b/content/cumulus-linux-52/Layer-2/Virtual-Router-Redundancy-VRR-and-VRRP.md index cd76bb24bb..3cb2d462b9 100644 --- a/content/cumulus-linux-52/Layer-2/Virtual-Router-Redundancy-VRR-and-VRRP.md +++ b/content/cumulus-linux-52/Layer-2/Virtual-Router-Redundancy-VRR-and-VRRP.md @@ -164,8 +164,8 @@ The following example commands configure both 10.1.10.1/24 and 10.1.11.1/24 on V {{< tab "NVUE Commands ">}} ``` -cumulus@switch:mgmt:~$ nv set interface vlan10 ip vrr adress 10.1.10.1/24 -cumulus@switch:mgmt:~$ nv set interface vlan10 ip vrr adress 10.1.11.1/24 +cumulus@switch:mgmt:~$ nv set interface vlan10 ip vrr address 10.1.10.1/24 +cumulus@switch:mgmt:~$ nv set interface vlan10 ip vrr address 10.1.11.1/24 cumulus@switch:mgmt:~$ nv config apply ``` diff --git a/content/cumulus-linux-52/Layer-3/Border-Gateway-Protocol-BGP/Optional-BGP-Configuration.md b/content/cumulus-linux-52/Layer-3/Border-Gateway-Protocol-BGP/Optional-BGP-Configuration.md index 2e4971ef31..8168473201 100644 --- a/content/cumulus-linux-52/Layer-3/Border-Gateway-Protocol-BGP/Optional-BGP-Configuration.md +++ b/content/cumulus-linux-52/Layer-3/Border-Gateway-Protocol-BGP/Optional-BGP-Configuration.md @@ -944,7 +944,7 @@ BGP add-path RX enables BGP to receive multiple paths for the same prefix. A pat To view the existing capabilities, run the vtysh `show ip bgp neighbors` command. You can see the existing capabilities in the subsection *Add Path*, below *Neighbor capabilities.* -The following example output shows that BGP can sent and receive additional BGP paths, and that the BGP neighbor on swp51 supports both. +The following example output shows that BGP can send and receive additional BGP paths, and that the BGP neighbor on swp51 supports both. ``` cumulus@leaf01:~$ sudo vtysh diff --git a/content/cumulus-linux-52/Layer-3/Routing/Policy-based-Routing.md b/content/cumulus-linux-52/Layer-3/Routing/Policy-based-Routing.md index 3182342d40..1e47c666bf 100644 --- a/content/cumulus-linux-52/Layer-3/Routing/Policy-based-Routing.md +++ b/content/cumulus-linux-52/Layer-3/Routing/Policy-based-Routing.md @@ -28,7 +28,7 @@ A PBR policy contains one or more policy maps. Each policy map: - To match on a source and destination address, a policy map can contain both match source and match destination IP rules. - A set rule determines the PBR next hop for the policy. -To use PBR in Cumulus linux, you define a PBR policy and apply it to the ingress interface (the interface must already have an IP address assigned). Cumulus Linux matches traffic against the match rules in sequential order and forwards the traffic according to the set rule in the first match. Traffic that does not match any rule passes on to the normal destination based routing mechanism. +To use PBR in Cumulus Linux, you define a PBR policy and apply it to the ingress interface (the interface must already have an IP address assigned). Cumulus Linux matches traffic against the match rules in sequential order and forwards the traffic according to the set rule in the first match. Traffic that does not match any rule passes on to the normal destination based routing mechanism. To configure a PBR policy: diff --git a/content/cumulus-linux-52/Layer-3/Routing/Route-Filtering-and-Redistribution.md b/content/cumulus-linux-52/Layer-3/Routing/Route-Filtering-and-Redistribution.md index c36dfb9782..d207656887 100644 --- a/content/cumulus-linux-52/Layer-3/Routing/Route-Filtering-and-Redistribution.md +++ b/content/cumulus-linux-52/Layer-3/Routing/Route-Filtering-and-Redistribution.md @@ -240,7 +240,7 @@ The following example commands redistribute routing information from [OSPF](## " {{< tab "NVUE Commands ">}} ``` -cumulus@switch:~$ nv set vrf default router bgp address-family ipv4-unicast route-redistribute ospf +cumulus@switch:~$ nv set vrf default router bgp address-family ipv4-unicast redistribute ospf cumulus@switch:~$ nv config apply ``` @@ -267,7 +267,7 @@ To redistribute all directly connected networks, use the `redistribute connected {{< tab "NVUE Commands ">}} ``` -cumulus@switch:~$ nv set vrf default router bgp address-family ipv4-unicast route-redistribute connected +cumulus@switch:~$ nv set vrf default router bgp address-family ipv4-unicast redistribute connected cumulus@switch:~$ nv config apply ``` diff --git a/content/cumulus-linux-52/Layer-3/Routing/Supported-Route-Table-Entries.md b/content/cumulus-linux-52/Layer-3/Routing/Supported-Route-Table-Entries.md index 88ba911105..55cd398c1a 100644 --- a/content/cumulus-linux-52/Layer-3/Routing/Supported-Route-Table-Entries.md +++ b/content/cumulus-linux-52/Layer-3/Routing/Supported-Route-Table-Entries.md @@ -23,9 +23,9 @@ Cumulus Linux provides several generalized profiles, described below. These prof The following tables list the number of MAC addresses, layer 3 neighbors, and LPM routes validated for each forwarding table profile. If you do not specify any profiles as described below, the switch uses the *default* values. {{%notice note%}} -The values in the following tables reflect results from testing, which can differ from published manufacturer specifications. +The values provided in the profiles below are the maximum values that Cumulus Linux software allocates; the theoretical hardware limits might be higher. These limits refer to values that have been validated as part of the unidimensional scale validation. If you try to achieve maximum scalability with multiple features enabled, results might differ from the values listed in this guide. {{%/notice%}} - + ### Spectrum |
Profile| MAC Addresses |
Layer 3 Neighbors| Longest Prefix Match (LPM) | diff --git a/content/cumulus-linux-52/Monitoring-and-Troubleshooting/FRRouting-Log-Message-Reference.md b/content/cumulus-linux-52/Monitoring-and-Troubleshooting/FRRouting-Log-Message-Reference.md index 8102a9ced5..5ec1b97caf 100644 --- a/content/cumulus-linux-52/Monitoring-and-Troubleshooting/FRRouting-Log-Message-Reference.md +++ b/content/cumulus-linux-52/Monitoring-and-Troubleshooting/FRRouting-Log-Message-Reference.md @@ -13,13 +13,13 @@ The following table lists the HIGH severity ERROR log messages generated by FRR. | Babel | HIGH | 16777218 | BABEL Packet Error | Babel has detected a packet encode/decode problem. | Collect the relevant log files and report the issue for troubleshooting.| | Babel | HIGH | 16777219 | BABEL Configuration Error | Babel has detected a configuration error of some sort. | Ensure that the configuration is correct. | | Babel | HIGH | 16777220 | BABEL Route Error | Babel has detected a routing error and is in an inconsistent state. | Gather data to report the issue for troubleshooting. Restart FRR. | -| BGP | HIGH | 33554433 | BGP attribute flag is incorrect | BGP attribute flag is set to the wrong value (Optional/Transitive/Partial). | Determine the soure of the attribute and determine why the attribute flag has been set incorrectly. | -| BGP | HIGH | 33554434 | BGP attribute length is incorrect | BGP attribute length is incorrect. | Determine the soure of the attribute and determine why the attribute length has been set incorrectly. | -| BGP | HIGH | 33554435 | BGP attribute origin value invalid | BGP attribute origin value is invalid. | Determine the soure of the attribute and determine why the origin attribute has been set incorrectly. | -| BGP | HIGH | 33554436 | BGP as path is invalid | BGP AS path has been malformed. | Determine the soure of the update and determine why the AS path has been set incorrectly. | -| BGP | HIGH | 33554437 | BGP as path first as is invalid | BGP update has invalid first AS in AS path. | Determine the soure of the update and determine why the AS path first AS value has been set incorrectly. | -| BGP | HIGH | 33554439 | BGP PMSI tunnel attribute type is invalid | BGP update has invalid type for PMSI tunnel. | Determine the soure of the update and determine why the PMSI tunnel attribute type has been set incorrectly. | -| BGP | HIGH | 33554440 | BGP PMSI tunnel attribute length is invalid | BGP update has invalid length for PMSI tunnel. | Determine the soure of the update and determine why the PMSI tunnel attribute length has been set incorrectly. | +| BGP | HIGH | 33554433 | BGP attribute flag is incorrect | BGP attribute flag is set to the wrong value (Optional/Transitive/Partial). | Determine the source of the attribute and determine why the attribute flag has been set incorrectly. | +| BGP | HIGH | 33554434 | BGP attribute length is incorrect | BGP attribute length is incorrect. | Determine the source of the attribute and determine why the attribute length has been set incorrectly. | +| BGP | HIGH | 33554435 | BGP attribute origin value invalid | BGP attribute origin value is invalid. | Determine the source of the attribute and determine why the origin attribute has been set incorrectly. | +| BGP | HIGH | 33554436 | BGP as path is invalid | BGP AS path has been malformed. | Determine the source of the update and determine why the AS path has been set incorrectly. | +| BGP | HIGH | 33554437 | BGP as path first as is invalid | BGP update has invalid first AS in AS path. | Determine the source of the update and determine why the AS path first AS value has been set incorrectly. | +| BGP | HIGH | 33554439 | BGP PMSI tunnel attribute type is invalid | BGP update has invalid type for PMSI tunnel. | Determine the source of the update and determine why the PMSI tunnel attribute type has been set incorrectly. | +| BGP | HIGH | 33554440 | BGP PMSI tunnel attribute length is invalid | BGP update has invalid length for PMSI tunnel. | Determine the source of the update and determine why the PMSI tunnel attribute length has been set incorrectly. | | BGP | HIGH | 33554442 | BGP peergroup operated on in error | BGP operating on peer-group instead of peers included. | Ensure the configuration doesn't contain peer-groups contained within peer-groups. | | BGP | HIGH | 33554443 | BGP failed to delete peer structure | BGP was unable to delete the peer structure when the address-family was removed. | Determine if all expected peers are removed and restart FRR if not. This is most likely a bug. | | BGP | HIGH | 33554444 | BGP failed to get table chunk memory | BGP unable to get chunk memory for table manager. | Ensure there is adequate memory on the device to support the table requirements. | @@ -38,8 +38,8 @@ The following table lists the HIGH severity ERROR log messages generated by FRR. | BGP | HIGH | 33554457 | BGP error receiving keepalive packet | BGP unable to process a keepalive packet. | BGP keepalive received while in a stopped state. If the problem persists, report it for troubleshooting. | | BGP | HIGH | 33554458 | BGP error receiving route refresh message | BGP unable to process route refresh message. | BGP route refresh received while in a stopped state. If the problem persists, report it for troubleshooting. | | BGP | HIGH | 33554459 | BGP error capability message | BGP unable to process received capability. | BGP capability message received while in a stopped state. If the problem persists, report it for troubleshooting. | -| BGP | HIGH | 33554460 | BGP error with nexthopo update | BGP unable to process nexthop update. | BGP received the nexthop update but the nexthop is not reachable in this BGP instance. Report the problem for troubleshooting. | -| BGP | HIGH | 33554461 | Failure to apply label | BGP attempted to attempted to apply a label but could not do so. | This is most likely a bug. If the problem persists, report it for troubleshooting. | +| BGP | HIGH | 33554460 | BGP error with nexthop update | BGP unable to process nexthop update. | BGP received the nexthop update but the nexthop is not reachable in this BGP instance. Report the problem for troubleshooting. | +| BGP | HIGH | 33554461 | Failure to apply label | BGP attempted to apply a label but could not do so. | This is most likely a bug. If the problem persists, report it for troubleshooting. | | BGP | HIGH | 33554462 | Multipath specified is invalid | BGP was started with an invalid ECMP/multipath value. | Correct the ECMP/multipath value supplied when starting the BGP daemon. | | BGP | HIGH | 33554463 | Failure to process a packet | BGP attempted to process a received packet but could not do so. | This is most likely a bug. If the problem persists, report it for troubleshooting. | | BGP | HIGH | 33554464 | Failure to connect to peer | BGP attempted to send open to a peer but couldn't connect. | This is most likely a bug. If the problem persists, report it for troubleshooting. | @@ -62,7 +62,7 @@ The following table lists the HIGH severity ERROR log messages generated by FRR. | EIGRP | HIGH | 50331650 | EIGRP Configuration Error | EIGRP has detected a configuration error.| Correct the configuration issue. If it still persists, report the issue for troubleshooting.| | General | HIGH | 100663297 | Failure to raise or lower privileges | FRR attempted to raise or lower its privileges and was unable to do so. | Ensure that you are running FRR as the frr user and that the user has sufficient privileges to properly access root privileges. | | General | HIGH | 100663298 | VRF Failure on Start | Upon startup, FRR failed to properly initialize and start up the VRF subsystem. | Ensure that there is sufficient memory to start processes, then restart FRR. | -| General | HIGH | 100663299 | Socket Error | When attempting to access a socket, a system error occured and FRR was unable to properly complete the request. | Ensure that there are sufficient system resources available and ensure that the frr user has sufficient permisions to work. | +| General | HIGH | 100663299 | Socket Error | When attempting to access a socket, a system error occurred and FRR was unable to properly complete the request. | Ensure that there are sufficient system resources available and ensure that the frr user has sufficient permissions to work. | | General | HIGH | 100663303 | System Call Error | FRR has detected an error from using a vital system call and has probably already exited. | Ensure permissions are correct for FRR users and groups. Additionally, check that sufficient system resources are available. | | General | HIGH | 100663304 | VTY Subsystem Error | FRR has detected a problem with the specified configuration file. | Ensure the configuration file exists and has the correct permissions for operations. Additionally, ensure that all config lines are correct as well. | | General | HIGH | 100663305 | SNMP Subsystem Error | FRR has detected a problem with the SNMP library it uses. A callback from this subsystem has indicated some error. | Examine the callback message and ensure SNMP is properly set up and working. | @@ -86,7 +86,7 @@ The following table lists the HIGH severity ERROR log messages generated by FRR. | OSPF | HIGH | 134217729 | Failure to process a packet | OSPF attempted to process a received packet but could not do so. | This is most likely a bug. If the problem persists, report it for troubleshooting. | | OSPF | HIGH | 134217730 | Failure to process Router LSA | OSPF attempted to process a router LSA, but there was an advertising ID mismtach with the link ID. | Check the OSPF network configuration for any configuration issue. If the problem persists, report it for troubleshooting.| | OSPF | HIGH | 134217731 | OSPF Domain Corruption | OSPF attempted to process a router LSA, but there was an advertising ID mismtach with the link ID. | Check OSPF network database for a corrupted LSA. If the problem persists, shut down the OSPF domain and report the problem for troubleshooting. | -| OSPF | HIGH | 134217732 | OSPF Initialization failure | OSPF failed to initialized the OSPF default instance. | Ensure there is adequate memory on the device. If the problem persists, report it for troubleshooting. | +| OSPF | HIGH | 134217732 | OSPF Initialization failure | OSPF failed to initialize the OSPF default instance. | Ensure there is adequate memory on the device. If the problem persists, report it for troubleshooting. | | OSPF | HIGH | 134217733 | OSPF SR Invalid DB | OSPF segment routing database is invalid. | This is most likely a bug. If the problem persists, report it for troubleshooting. | | OSPF | HIGH | 134217734 | OSPF SR hash node creation failed | OSPF segment routing node creation failed. | This is most likely a bug. If the problem persists, report it for troubleshooting. | | OSPF | HIGH | 134217735 | OSPF SR Invalid lsa id | OSPF segment routing invalid LSA ID. | Restart the OSPF instance. If the problem persists, report it for troubleshooting. | diff --git a/content/cumulus-linux-52/Monitoring-and-Troubleshooting/Simple-Network-Management-Protocol-SNMP/Configure-SNMP.md b/content/cumulus-linux-52/Monitoring-and-Troubleshooting/Simple-Network-Management-Protocol-SNMP/Configure-SNMP.md index 1e121873ab..063b92a763 100644 --- a/content/cumulus-linux-52/Monitoring-and-Troubleshooting/Simple-Network-Management-Protocol-SNMP/Configure-SNMP.md +++ b/content/cumulus-linux-52/Monitoring-and-Troubleshooting/Simple-Network-Management-Protocol-SNMP/Configure-SNMP.md @@ -154,7 +154,7 @@ You can authenticate the user in the following ways: - With no authentication password (if you specify `auth-none`) - With an MD5 password -- With a SHA password +- With an SHA password {{< tabs "username" >}} {{< tab "NVUE Commands" >}} diff --git a/content/cumulus-linux-52/Monitoring-and-Troubleshooting/Simple-Network-Management-Protocol-SNMP/Supported-MIBs.md b/content/cumulus-linux-52/Monitoring-and-Troubleshooting/Simple-Network-Management-Protocol-SNMP/Supported-MIBs.md index 84401f8afb..292432f48f 100644 --- a/content/cumulus-linux-52/Monitoring-and-Troubleshooting/Simple-Network-Management-Protocol-SNMP/Supported-MIBs.md +++ b/content/cumulus-linux-52/Monitoring-and-Troubleshooting/Simple-Network-Management-Protocol-SNMP/Supported-MIBs.md @@ -10,7 +10,7 @@ Below are the MIBs that Cumulus Linux supports, as well as suggested uses for th |
MIB Name | Suggested Uses | | -------- | -------------- | | {{}}
{{}}
{{}}
{{}} | You can enable FRR SNMP support to provide support for OSPF-MIB (RFC-1850), OSPFV3-MIB (RFC-5643), and BGP4-MIB (RFC-1657). | -| {{}} | Cumulus Linux also includes its own BGP unnumbered MIB for BGP unnumbered peers, defined in `/usr/share/snmp/mibs/Cumulus-BGPUN-MIB.txt`, which has the OID `1.3.6.1.4.1.40310.7`.| +| {{}} | Cumulus Linux also includes its own BGP unnumbered MIB for BGP unnumbered peers, defined in `/usr/share/snmp/mibs/Cumulus-BGPUN-MIB.txt`, which has the OID `1.3.6.1.4.1.40310.7`.| | {{}} | Discard counters: Cumulus Linux also includes its own counters MIB, defined in `/usr/share/snmp/mibs/Cumulus-Counters-MIB.txt`. It has the OID `.1.3.6.1.4.1.40310.2`. | | {{}} | Cumulus Linux includes its own resource utilization MIB, which is similar to using `cl-resource-query`. This MIB monitors layer 3 entries by host, route, nexthops, ECMP groups, and layer 2 MAC/BDPU entries. `/usr/share/snmp/mibs/Cumulus-Resource-Query-MIB.txt` defines this MIB, which has the OID `.1.3.6.1.4.1.40310.1`. | | {{}} | SNMP counters. For information on exposing CPU and memory information with SNMP, see this [knowledge base article]({{}}). | diff --git a/content/cumulus-linux-52/Monitoring-and-Troubleshooting/Troubleshooting-Network-Interfaces/Troubleshoot-Layer-1.md b/content/cumulus-linux-52/Monitoring-and-Troubleshooting/Troubleshooting-Network-Interfaces/Troubleshoot-Layer-1.md index 3b541932ad..c094340e7e 100644 --- a/content/cumulus-linux-52/Monitoring-and-Troubleshooting/Troubleshooting-Network-Interfaces/Troubleshoot-Layer-1.md +++ b/content/cumulus-linux-52/Monitoring-and-Troubleshooting/Troubleshooting-Network-Interfaces/Troubleshoot-Layer-1.md @@ -761,7 +761,7 @@ Because I2C problems can be very pernicious, often showing up again much later a To verify that an I2C failure is occurring, run `sudo tail -F /var/log/syslog` and look for `smbus` or `i2c` or `EEPROM read` errors that continue to appear or appear in bursts. -Based on the failure scenario when tyou discover the issue, choose when to address this issue; immediately or during a maintenance window. +Based on the failure scenario when you discover the issue, choose when to address this issue; immediately or during a maintenance window. - If traffic or the switch operates negatively and you cannot route traffic through a redundant network, you must do something immediately. - If you can route traffic around the failing switch, allowing troubleshooting to proceed on the failed switch, proceed to reroute traffic to find an appropriate time to troubleshoot the failing switch. diff --git a/content/cumulus-linux-52/Network-Virtualization/Ethernet-Virtual-Private-Network-EVPN/Basic-Configuration.md b/content/cumulus-linux-52/Network-Virtualization/Ethernet-Virtual-Private-Network-EVPN/Basic-Configuration.md index 3b19c79fcb..6e2169f328 100644 --- a/content/cumulus-linux-52/Network-Virtualization/Ethernet-Virtual-Private-Network-EVPN/Basic-Configuration.md +++ b/content/cumulus-linux-52/Network-Virtualization/Ethernet-Virtual-Private-Network-EVPN/Basic-Configuration.md @@ -70,7 +70,7 @@ cumulus@leaf01:~$ nv set vrf default router bgp neighbor swp51 address-family l2 cumulus@leaf01:~$ nv config apply ``` -You do not need enable the BGP control plane for all VNIs configured on the switch with NVUE with the `advertise-all-vni` option. FRR **is** aware of any local VNIs and MACs, and hosts (neighbors) associated with those VNIs. +You do not need to enable the BGP control plane for all VNIs configured on the switch with NVUE with the `advertise-all-vni` option. FRR **is** aware of any local VNIs and MACs, and hosts (neighbors) associated with those VNIs. After you run `nv config save`, the NVUE Commands create the following configuration snippet in the `/etc/nvue.d/startup.yaml` file: @@ -289,7 +289,7 @@ router bgp 65101 bgp router-id 10.10.10.1 neighbor swp51 interface remote-as external address-family l2vpn evpn -neighbor swp1 activate +neighbor swp51 activate advertise-all-vni ... ``` @@ -305,7 +305,7 @@ spine01(config)# router bgp 65199 spine01(config-router)# bgp router-id 10.10.10.101 spine01(config-router)# neighbor swp1 interface remote-as external spine01(config-router)# address-family l2vpn evpn -spine01(config-router-af)# neighbor swp51 activate +spine01(config-router-af)# neighbor swp1 activate spine01(config-router-af)# end spine01)# write memory spine01)# exit diff --git a/content/cumulus-linux-52/Network-Virtualization/VXLAN-Devices.md b/content/cumulus-linux-52/Network-Virtualization/VXLAN-Devices.md index d52c02c702..040b2cf916 100644 --- a/content/cumulus-linux-52/Network-Virtualization/VXLAN-Devices.md +++ b/content/cumulus-linux-52/Network-Virtualization/VXLAN-Devices.md @@ -197,7 +197,7 @@ cumulus@leaf01:~$ ifreload -a ## Automatic VLAN to VNI Mapping -In an EVPN VXLAN environment, you need to map individual VLANs to VNIs. For a single VXLAN device, you can do this with a seperate NVUE command per VLAN; however, this can be cumbersome if you have to configure many VLANS or need to isolate tenants and reuse VLANs. To simplify the configuration, you can use these two commands instead: +In an EVPN VXLAN environment, you need to map individual VLANs to VNIs. For a single VXLAN device, you can do this with a separate NVUE command per VLAN; however, this can be cumbersome if you have to configure many VLANS or need to isolate tenants and reuse VLANs. To simplify the configuration, you can use these two commands instead: - `nv set bridge domain vlan vni auto` configures the specified VLANs to use automatic mapping. - `nv set bridge domain vlan-vni-offset` configures the offset you want to use for the VNIs. For example, if you specify an offset of 10000, the VNI is the VLAN plus 10000. diff --git a/content/cumulus-linux-52/System-Configuration/Authentication-Authorization-and-Accounting/LDAP-Authentication-and-Authorization.md b/content/cumulus-linux-52/System-Configuration/Authentication-Authorization-and-Accounting/LDAP-Authentication-and-Authorization.md index fbe8e4e8d7..64a23c02c6 100644 --- a/content/cumulus-linux-52/System-Configuration/Authentication-Authorization-and-Accounting/LDAP-Authentication-and-Authorization.md +++ b/content/cumulus-linux-52/System-Configuration/Authentication-Authorization-and-Accounting/LDAP-Authentication-and-Authorization.md @@ -57,10 +57,11 @@ Entering incorrect information during the installation process produces configur - Edit the `/etc/nslcd.conf` file to update the LDAP URI and search base DN (see {{}}, below). - Edit the `/etc/nssswitch.conf` file to update the service selections. -Be sure to restart `netd` after editing the files. +Restart `nvued.service` and `nginx-authenticator.service` after editing the files. ``` -cumulus@switch:~$ sudo systemctl restart netd.service +cumulus@switch:~$ sudo systemctl restart nvued.service +cumulus@switch:~$ sudo systemctl restart nginx-authenticator.service ``` {{< expand "Alternative Installation Method Using debconf-utils " >}} @@ -131,7 +132,7 @@ After installation, update the main configuration file (`/etc/nslcd.conf`) to ac This section documents some of the more important options that relate to security and queries. For details on all the available configuration options, read the {{}}. {{%notice note%}} -After first editing the `/etc/nslcd.conf` file and/or enabling LDAP in the `/etc/nsswitch.conf` file, you must restart `netd` with the `sudo systemctl restart netd` command. If you disable LDAP, you need to restart the `netd` service. +After editing the `/etc/nslcd.conf` file or enabling LDAP in the `/etc/nsswitch.conf` file, you must restart the NVUE and nginx-authenticator services with the `sudo systemctl restart nvued.service` command and the `sudo systemctl restart nginx-authenticator.service` command. If you disable LDAP, you must also restart these two services. {{%/notice%}} ### Connection diff --git a/content/cumulus-linux-52/System-Configuration/Authentication-Authorization-and-Accounting/RADIUS-AAA.md b/content/cumulus-linux-52/System-Configuration/Authentication-Authorization-and-Accounting/RADIUS-AAA.md index d12209dd9d..f5306769cf 100644 --- a/content/cumulus-linux-52/System-Configuration/Authentication-Authorization-and-Accounting/RADIUS-AAA.md +++ b/content/cumulus-linux-52/System-Configuration/Authentication-Authorization-and-Accounting/RADIUS-AAA.md @@ -31,7 +31,18 @@ During package installation: ## Configure the RADIUS Client -To configure the RADIUS client, edit the `/etc/pam_radius_auth.conf` file: +To configure the RADIUS client, edit the `/etc/pam_radius_auth.conf` file. + +{{%notice note%}} + +After editing the `/etc/pam_radius_auth.conf` file, you must restart both `nvued.service` and `nginx-authenticator.service`: + +``` +cumulus@switch:~$ sudo systemctl restart nvued.service +cumulus@switch:~$ sudo systemctl restart nginx-authenticator.service +``` + +{{%/notice%}} 1. Add the hostname or IP address of at least one RADIUS server (such as a *{{}}* server on Linux), and the shared secret used to authenticate and encrypt communication with each server. diff --git a/content/cumulus-linux-52/System-Configuration/Authentication-Authorization-and-Accounting/TACACS.md b/content/cumulus-linux-52/System-Configuration/Authentication-Authorization-and-Accounting/TACACS.md index 83d28024be..57f0456284 100644 --- a/content/cumulus-linux-52/System-Configuration/Authentication-Authorization-and-Accounting/TACACS.md +++ b/content/cumulus-linux-52/System-Configuration/Authentication-Authorization-and-Accounting/TACACS.md @@ -27,6 +27,17 @@ cumulus@switch:~$ sudo -E apt-get install tacplus-client ## Configure the TACACS+ Client +{{%notice note%}} + +After you configure TACACS+ settings, you must restart both `nvued.service` and `nginx-authenticator.service`: + +``` +cumulus@switch:~$ sudo systemctl restart nvued.service +cumulus@switch:~$ sudo systemctl restart nginx-authenticator.service +``` + +{{%/notice%}} + After installing TACACS+, edit the `/etc/tacplus_servers` file to add at least one server and one shared secret (key). You can specify the server and secret parameters in any order anywhere in the file. Whitespace (spaces or tabs) are not allowed. For example, if your TACACS+ server IP address is `192.168.0.30` and your shared secret is `tacacskey`, add these parameters to the `/etc/tacplus_servers` file: ``` @@ -127,10 +138,11 @@ The first `adduser` command prompts for information and a password. You can skip 3. Edit the `/etc/nsswitch.conf` file to add the keyword `tacplus` back to the line starting with `passwd` (the keyword you removed in the first step). -4. Restart the `nvued` service with the following command: +4. Restart the `nvued` service and the `nginx-authenticator` service with the following commands: ``` - cumulus@switch:~$ sudo systemctl restart nvued + cumulus@switch:~$ sudo systemctl restart nvued.service + cumulus@switch:~$ sudo systemctl restart nginx-authenticator.service ``` ## TACACS+ Accounting diff --git a/content/cumulus-linux-52/System-Configuration/Date-and-Time/Precision Time Protocol-PTP.md b/content/cumulus-linux-52/System-Configuration/Date-and-Time/Precision Time Protocol-PTP.md index 1be6854dd4..9cbe1374e9 100644 --- a/content/cumulus-linux-52/System-Configuration/Date-and-Time/Precision Time Protocol-PTP.md +++ b/content/cumulus-linux-52/System-Configuration/Date-and-Time/Precision Time Protocol-PTP.md @@ -210,7 +210,7 @@ delay_mechanism E2E network_transport UDPv4 ``` -For a trunk VLAN, add the VLAN configuration to the switch port stanza: set `l2_mode` to `trunk`, `vlan_intf` to the VLAN interface, and `src_ip` to the IP adress of the VLAN interface: +For a trunk VLAN, add the VLAN configuration to the switch port stanza: set `l2_mode` to `trunk`, `vlan_intf` to the VLAN interface, and `src_ip` to the IP address of the VLAN interface: ``` [swp1] @@ -223,7 +223,7 @@ delay_mechanism E2E network_transport UDPv4 ``` -For a switch port VLAN, add the VLAN configuration to the switch port stanza: set `l2_mode` to `access`, `vlan_intf` to the VLAN interface, and `src_ip` to the IP adress of the VLAN interface: +For a switch port VLAN, add the VLAN configuration to the switch port stanza: set `l2_mode` to `access`, `vlan_intf` to the VLAN interface, and `src_ip` to the IP address of the VLAN interface: ``` [swp2] @@ -489,7 +489,7 @@ To create a custom profile: - Update any of the profile settings you want to change (`announce-interval`, `delay-req-interval`, `priority1`, `sync-interval`, `announce-timeout`, `domain`, `priority2`, `transport`, `delay-mechanism`, `local-priority`). - Set the custom profile to be the current profile. -The following example commands create a custom profile called CUSTOM1 based on the predifined profile ITU 8275-1. The commands set the `domain` to 3 and the `announce-timeout` to 5, then set `CUSTOM1` to be the current profile: +The following example commands create a custom profile called CUSTOM1 based on the predefined profile ITU 8275-1. The commands set the `domain` to 3 and the `announce-timeout` to 5, then set `CUSTOM1` to be the current profile: ``` cumulus@switch:~$ nv set service ptp 1 profile CUSTOM1 @@ -503,7 +503,7 @@ cumulus@switch:~$ nv config apply {{< /tab >}} {{< tab "Linux Commands ">}} -The following example `/etc/ptp4l.conf` file creates a custom profile based on the predifined profile ITU 8275-1 and sets the `domain` to 3 and the `announce-timeout` to 5. +The following example `/etc/ptp4l.conf` file creates a custom profile based on the predefined profile ITU 8275-1 and sets the `domain` to 3 and the `announce-timeout` to 5. ``` cumulus@switch:~$ sudo nano /etc/ptp4l.conf @@ -983,7 +983,7 @@ To configure a PTP interface to be the unicast *client*: - Optional: Set the unicast request duration; the service time in seconds requested during discovery. The default value is 300 seconds. {{%notice note%}} -A PTP interface as a unicast client or server only supports a single communictation mode and does not work with multicast servers or clients. Make sure that both sides of a PTP link are in unicast mode. +A PTP interface as a unicast client or server only supports a single communication mode and does not work with multicast servers or clients. Make sure that both sides of a PTP link are in unicast mode. {{%/notice%}} The following example commands configure a unicast master table with ID 1. The commands set the unicast master address and the peer address to 10.10.10.1, the query interval to 4, the unicast service mode to `client`, and the unicast request duration to 20 in the unicast master table. @@ -1653,9 +1653,9 @@ The following example shows that there are no violations: cumulus@switch:~$ nv show service ptp 1 monitor violations operational applied description ---------------- ----------- ------- ----------------------------------------------- -last-max-offset Time at which last max offest violation occured -last-min-offset Time at which last min offest violation occured -last-path-delay Time at which last path delay violation occured +last-max-offset Time at which last max offest violation occurred +last-min-offset Time at which last min offest violation occurred +last-path-delay Time at which last path delay violation occurred max-offset-count 0 Number of maximum offset violations min-offset-count 0 Number of min offset violations path-delay-count 0 Number of Path delay violations diff --git a/content/cumulus-linux-52/System-Configuration/Netfilter-ACLs.md b/content/cumulus-linux-52/System-Configuration/Netfilter-ACLs.md index 44bb73577d..cf960aa292 100644 --- a/content/cumulus-linux-52/System-Configuration/Netfilter-ACLs.md +++ b/content/cumulus-linux-52/System-Configuration/Netfilter-ACLs.md @@ -138,7 +138,7 @@ The incremental nonatomic update operation follows this order: 2. Cumulus Linux checks if the rules in a table are different from installation time; if a table does not have any changes, it does not reinstall the rules. 3. If there are changes in a table, the new rules populate in new groups or slices in hardware, then that table switches over to the new groups or slices. 4. Finally, old resources for that table free up. This process repeats for each of the tables listed above. -5. If there are isufficient resources to hold both the new rule set and old rule set, Cumulus Linux tries the regular nonatomic mode, which interrupts network traffic. +5. If there are insufficient resources to hold both the new rule set and old rule set, Cumulus Linux tries the regular nonatomic mode, which interrupts network traffic. 6. If the regular nonatomic update fails, Cumulus Linux reverts back to the previous rules. To always start `switchd` with nonatomic updates: @@ -1315,7 +1315,7 @@ To work around this limitation, set the rate and burst for all these rules to th ### Where to Assign Rules - If you assign a switch port to a bond, you must assign any egress rules to the bond. -- When using the OUTPUT chain, you must assign rules to the source. For example, if you assign a rule to the switch port in the direction of traffic but the source is a bridge (VLAN), the rule does not affect the traffic and you must applied the rule to the bridge. +- When using the OUTPUT chain, you must assign rules to the source. For example, if you assign a rule to the switch port in the direction of traffic but the source is a bridge (VLAN), the rule does not affect the traffic and you must apply the rule to the bridge. - If you need to apply a rule to all transit traffic, use the FORWARD chain, not the OUTPUT chain. ### ACL Rule Installation Failure @@ -1334,7 +1334,7 @@ failed. Entity MIB
1.3.6.1.2.1.99 --> Entity Sensor MIB
1.3.6.1.2.1.23 --> rip2
1.3.6.1.2.1.2 --> interface/interfaces
1.3.6.1.2.1.31 --> ifMIB
1.3.6.1.2.1.4 --> IP
1.3.6.1.2.1.25 --> hostResource | 5.0.1-5.4.0 | 5.5.0-5.6.0| +| [3141826](#3141826)
| A slow memory leak (~5KB over 24 hour period at a 60 second polling interval) might occur in SNMP when you walk the following system MIB objects (1.3.6.1.2.1)
1.3.6.1.2.1.47 --> Entity MIB
1.3.6.1.2.1.99 --> Entity Sensor MIB
1.3.6.1.2.1.23 --> rip2
1.3.6.1.2.1.2 --> interface/interfaces
1.3.6.1.2.1.31 --> ifMIB
1.3.6.1.2.1.4 --> IP
1.3.6.1.2.1.25 --> hostResource | 5.0.1-5.6.0 | | | [3139364](#3139364)
| When Cumulus Linux updates the ECMP container with a new next hop list, it allocates the flow counters for the new next hop list without deallocating the counters bound to the old next hop list. This results in resource exhaustion and you see the following error messages in the /var/log/switchd.log file:
hal_mlx_stat.c:3215 ERR Failed to allocate counter(s) for ecmp [71025:0] status: Internal Errorhal_mlx_stat.c:3196 ERR Counter set for ecmp [71025:0] idx 0 failed: Internal Errorhal_mlx_sdk_nexthop_wrap.c:1076 ERR Counter 0 alloc for ecmp next hop failed: Internal Errorhal_mlx_sdk_counter_wrap.c:54 ERR Counter alloc failed: No More Resources
This issue does not have any functional impact to forwarding. Even without the flow counters attached to the ECMP group, packet forwarding works without any issues
To avoid allocating next hop counters for any new ECMP next hop list update, set mlx.stats.ecmp.enable to FALSE in the /etc/mlx/datapath/stats.conf file, then restart switchd with the sudo systemctl reload switchd command. | 5.0.0-5.2.1 | 5.3.0-5.6.0| | [3139164](#3139164)
| NVUE does not allow you to set 2X/4X lanes. To work around this issue, set the appropriate lanes for forced speed with the ethtool -s swpX speed autoneg off lanes command. For example, ethtool -s swp1 speed 100000 autoneg off lanes 2. | 5.2.0-5.2.1 | 5.3.0-5.6.0| | [3138057](#3138057)
| When the next hop interface for EVPN type 5 routes flaps, FRR might uninstall the routes and Route install failed appears in /var/log/frr/frr.log. To work around this problem, restart FRR with the sudo systemctl restart frr command. | 4.4.0-5.2.1 | 5.3.0-5.6.0| @@ -128,7 +128,6 @@ pdfhidden: True | [2891255](#2891255)
| CVE-2021-39925: Buffer overflow in the Bluetooth SDP dissector in Wireshark 3.4.0 to 3.4.9 and 3.2.0 to 3.2.17 allows denial of service via packet injection or crafted capture file
Vulnerable: <= 2.6.20-0+deb10u1Fixed: 2.6.20-0+deb10u2 | 4.0.0-4.4.1, 5.0.0-5.6.0 | 4.4.2-4.4.5| | [2890681](#2890681)
| CVE-2021-42771: relative path traversal in Babel, a set of tools for internationalising Python applications, could result in the execution of arbitrary code
Vulnerable: 2.6.0+dfsg.1-1Fixed: 2.6.0+dfsg.1-1+deb10u1 | 4.0.0-4.4.1, 5.0.0-5.6.0 | 4.4.2-4.4.5| | [2867042](#2867042)
| When connecting the NVIDIA SN4600 switch to another NVIDIA Spectrum switch, you must use auto-negotiation mode (not force mode); otherwise the switch might use the wrong Tx configuration. | 5.0.0-5.6.0 | | -| [2847919](#2847919)
| Configuring a router with the REST API through the switch front panel ports (swps) is supported in the default VRF only. To work around this issue, use the localHost IP address or the MGMT IP address to configure router using the Rest API. | 5.0.0-5.6.0 | | | [2847755](#2847755)
| When you use NCLU to remove the configuration for a peer that is a member of a group but also has other peer-specific configuration, you must remove the peer-specific configuration before you delete the peer in a separate NCLU commit. | 5.0.0-5.6.0 | | | [2823307](#2823307)
| Cumuls Linux does not support a bond with more than 64 ports. Any configuration with more than 64 ports in a bond changes all ports to down when you apply the configuration. | 5.0.0-5.6.0 | | | [2821929](#2821929)
| FRR restarts even when the NVUE configuration overwrite mode is set. | 5.0.0-5.3.1 | 5.4.0-5.6.0| @@ -149,11 +148,11 @@ pdfhidden: True | Issue ID | Description | Affects | Fixed | |--- |--- |--- |--- | -| [3647426](#3647426)
None | If BGP remote-as is set to an integer and you try to configure the local-as for a BGP instance, you see the following error:
% AS specified for local as is the same as the remote as and this is not allowed
This configuration is not allowed; it is considered to be eBGP and local preference is not advertised. | 5.0.0-5.5.1 | 5.6.0| +| [3647426](#3647426)
None | If BGP remote-as is set to an integer and you try to configure the local-as for a BGP instance, you see the following error:
% AS specified for local as is the same as the remote as and this is not allowed
This configuration is not allowed; it is considered to be eBGP and local preference is not advertised. | 5.0.0-5.5.1 | 4.3.2-4.4.5, 5.6.0| | [3585467](#3585467)
| NVUE and ip link show traditional bridge VLAN subinterface counts incorrectly. The ingress (Rx) count increments correctly but the egress (Tx) count does not increment. This issues occurs because the hardware does not support transmit counters for a VLAN subinterface; therefore, no statistics from the hardware are updated. Statistics for software forwarded packets show correctly. | 5.0.0-5.6.0 | | | [3562767](#3562767)
| ACLs do not process inbound DHCP packets and the packets do not contribute to ACL counters | 5.2.0-5.4.0 | 5.5.0-5.6.0| | [3560622](#3560622)
| When you configure a route distinguisher (RD) or a route target (RT) manually for layer 2 VNIs, type-1 routes are not properly updated, type-1 EVI routes with the old RD are not properly withdrawn, and type-1 ES routes do not have the corresponding layer 2 VNI route target updated. | 5.0.0-5.5.1 | 5.6.0| -| [3554231](#3554231)
None | CVE-2023-38408: The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009
Mitigation: Do not use ssh-agent forwarding (the man page for ssh_config says that "agent forwarding should be enabled with caution"), or start the ssh-agent program with the -P option to allow only specific PKCS#11 libraries (or none with -P '')
For Cumulus Linux 4.3.2, the /usr/bin/ssh-agent program has all permissions turned off (chmod 0) to prevent its execution if a vulnerable version is detected. | 4.0.0-4.4.5, 5.0.0-5.6.0 | | +| [3554231](#3554231)
None | CVE-2023-38408: The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009
Mitigation: Do not use ssh-agent forwarding (the man page for ssh_config says that "agent forwarding should be enabled with caution"), or start the ssh-agent program with the -P option to allow only specific PKCS#11 libraries (or none with -P '')
For Cumulus Linux 4.3.2, the /usr/bin/ssh-agent program has all permissions turned off (chmod 0) to prevent its execution if a vulnerable version is detected. | 4.0.0-4.3.1, 5.0.0-5.6.0 | 4.3.2-4.4.5| | [3541912](#3541912)
| Collecting a cl-support file in a high VNI and interface environment can result in an out-of-memory (OOM) event on the switch. An OOM event can cause critical services to restart and might impact traffic. | 5.1.0-5.5.1 | 5.6.0| | [3491259](#3491259)
| When BGP receives an EVPN type-5 route with a gateway IP overlay attribute, the gateway IP overlay attribute in the attr memory (which is already inserted in the attribute hash) might change. As a result, the modified attr memory might match with another attr in the attribute hash, which produces duplicate entries in the hash table. As a result, BGP might crash when deleting one of the duplicate attr structures. | 5.0.0-5.5.1 | 5.6.0| | [3488136](#3488136)
| When zebra receives route updates that include both a route with a recursive next hop and the route used to resolve that next hop, zebra might mark the route with the recursive next hop as inactive. To work around this issue, reprocess the route updates by running the appropriate clear command for the protocol in use. For example, for BGP, clear inbound routes from the relevant neighbor using the nv action clear vrf router bgp neighbor address-family in command. | 4.2.1-5.5.1 | 5.6.0| @@ -163,16 +162,16 @@ pdfhidden: True | [3432897](#3432897)
| When you remove the restriction from a TACACS+ mapped user to remove per command authorization, the tacplus-restrict -R command does not restore ownership of restored files correctly. As a result, some commands might fail due to permission errors in the files or directories under the home directory. To work around this issue, run the sudo chown command to correct the ownership of the affected files and directories. | 5.0.0-5.4.0 | 5.5.0-5.6.0| | [3429530](#3429530)
| On the Spectrum-2 and Spectrum-3 switch, multiple interfaces (in the same PLL quarter) might flap intermittently at the same time. | 4.2.1-5.4.0 | 5.5.0-5.6.0| | [3424967](#3424967)
| sudo for TACACS+ users with privilege level 15 does not work when the TACACS+ server is to be reached through the default VRF (with vrf=default set in the /etc/tacplus_servers file). To work around this issue, specify the interface name that the default VRF uses in the vrf= setting of the /etc/tacplus_servers file or run the NVUE nv set system aaa tacacs vrf command. If you don't run either command, a TACACS+ user with privilege level 15 can run vrf task exec default sudo ... to execute the sudo command using the TACACS+ server on the default VRF. | 5.0.0-5.6.0 | | -| [3413827](#3413827)
None | During upgrade, when one MLAG node is upgraded and the other MLAG node is not yet upgraded, permanent neighbors cannot synchronize between MLAG nodes. The clagctl dumppermanentneighs command only shows local neighbors. | 5.0.0-5.4.0 | 5.5.0-5.6.0| +| [3413827](#3413827)
None | During upgrade, when one MLAG node is upgraded and the other MLAG node is not yet upgraded, permanent neighbors cannot synchronize between MLAG nodes. The clagctl dumppermanentneighs command only shows local neighbors. | 5.0.0-5.4.0 | 4.3.2-4.4.5, 5.5.0-5.6.0| | [3413785](#3413785)
| To reach the TACACS+ server through the default VRF, you must specify the egress interface you use in the default VRF. Either run the NVUE nv set system aaa tacacs vrf command (for example, nv set system aaa tacacs vrf swp51) or set the vrf= option in the /etc/tacplus_servers file (for example, vrf=swp51). A similar issue might prevent TACACS+ users with privilege level 15 from using sudo if the TACACS+ server is reachable only on the default VRF. If this occurs, and you do not run the above configuration workaround, the TACACS+ user with privilege level 15 can use vrf task exec default sudo ... to execute the sudo command using the TACACS+ server on the default VRF. | 5.0.0-5.5.1 | 5.6.0| | [3402935](#3402935)
None | For layer 3 interfaces configured on the switch, certain triggers, such as port flaps and subinterface flaps, or when configuring the ports to and from layer 2 and layer 3, cause the dummy internal VLAN to not free up, which can result in exhaustion of the dummy internal VLANs designated for the layer 3 interfaces. When this occurs, you see the following switchd log messages:
ERR dummy internal vlans exhaustedERR cannot allocate vlan for sub-interface
| 5.0.0-5.4.0 | 5.5.0-5.6.0| | [3388067](#3388067)
| TACACS+ packages in the local apt repository might be out of date; as a result, the upgrade does not install tacacs0 through tacacs15 users in the correct NVUE groups. When you run NVUE commands as a TACACS+ user, the commands fail and you see the error You do not have permission to execute that command
To obtain the correct packages, install the tacplus-client package and its dependencies from apt.cumulusnetworks.com. | 5.1.0-5.4.0 | 5.5.0-5.6.0| | [3379873](#3379873)
| apt source linux fails to download the Linux kernel source code. To work around this issue, run the sudo apt update && sudo apt install linux-source-5.10 command or download the desired version from https://apt.cumulusnetworks.com/repo/pool/cumulus/l/linux/ and install it with the sudo dpkg -i $filename command. The source code in a tar.xz file will then be located in the /usr/src/ directory. | 5.2.0-5.4.0 | 5.5.0-5.6.0| -| [3351951](#3351951)
None | Currently, the default core dump size limit on Cumulus Linux is 256M but the SDK generates core dumps around 800M. To avoid incomplete core files, you can increase the core dump size limit. | 4.2.1-5.3.1 | 5.4.0-5.6.0| +| [3351951](#3351951)
None | Currently, the default core dump size limit on Cumulus Linux is 256M but the SDK generates core dumps around 800M. To avoid incomplete core files, you can increase the core dump size limit. | 4.2.1-4.3.1, 4.4.0-5.3.1 | 4.3.2, 5.4.0-5.6.0| | [3351936](#3351936)
| Switch fans run at very high speed but the temperature is normal. | 5.2.0-5.3.1 | 5.4.0-5.6.0| | [3350789](#3350789)
| NVUE deprecated the port split command options (2x10G, 2x25G, 2x40G, 2x50G, 2x100G, 2x200G, 4x10G, 4x25G, 4x50G, 4x100G, 8x50G) with no backwards compatibility. | 5.0.0-5.4.0 | 5.5.0-5.6.0| | [3349207](#3349207)
| The switch does not learn MAC addresses from DHCP packets. When a DHCP enabled host is plugged in for the first time, it tries to obtain an IP address through DHCP. The switch does not learn the MAC address of the host when it receives these DHCP packets; therefore, the host MAC address is not updated in the local forwarding database and it does not get advertised across EVPN. The switch learns the MAC address when it receives other packets, such as ARP or ND from the host. To work around this issue, either configure a temporary IP address on the host to initiate ARP/ND or enable IPv6, which sends ND after link local address creation. | 5.2.0-5.4.0 | 5.5.0-5.6.0| -| [3347677](#3347677)
| In an MLAG configuration, when a link failure occurs on the peerlink or the peerlink shuts down, the switch in the secondary role attracts traffic to its local VTEP as it advertises the local VTEP IP address momentarily just before the VXLAN device is protodown. This traffic is dropped for a brief moment (between 5 and 10 seconds) because the MLAG bonds on the secondary switch are already protodown
In a proposed fix in the MR !226, we are not flapping the IP on vxlan device on secondary clag device on peerlink down trigger. This ensures smooth traffic flow and no convergence issue seen in system test bed with this fix. | 5.1.0-5.6.0 | | +| [3347677](#3347677)
| In an MLAG configuration, when a link failure occurs on the peerlink or the peerlink shuts down, the switch in the secondary role attracts traffic to its local VTEP as it advertises the local VTEP IP address momentarily just before the VXLAN device is protodown. This traffic is dropped for a brief moment (between 5 and 10 seconds) because the MLAG bonds on the secondary switch are already protodown. | 5.1.0-5.6.0 | | | [3339336](#3339336)
| The ethtool -m command does not show Digital Optical Monitoring (DOM) for SFP transceivers. To work around this issue, run the l1-show or mlxlink command instead. | 5.2.0-5.3.1 | 5.4.0-5.6.0| | [3334275](#3334275)
| The sensors.conf files in Cumulus Linux are out of date. | 5.2.0-5.6.0 | | | [3330705](#3330705)
| When using TACACS+, a TACACS+ server name that returns more than one IP address, such as an IPv6 and IPv4 address, is counted many times against the limit of seven TACACS+ servers, which might cause some of the later listed servers to be ignored as over the limit. To work around this issue, you can set the prefer_ip_version configuration option (the default value is 4) to choose between an IPv4 or IPv6 address if both are present. | 3.7.0-5.3.1 | 5.4.0-5.6.0| @@ -195,7 +194,7 @@ pdfhidden: True | [3227677](#3227677)
| When daylight saving time changes the time, the MLAG initDelay timer resets and all MLAG bonds go down. | 4.4.4-5.2.1 | 5.3.0-5.6.0| | [3227651](#3227651)
None | Docker commands can cause Cumulus Linux commands to fail. apt upgrade can also fail if you use Docker commands implicitly. To work around this issue, run ulimit -v unlimited before running Docker commands or running apt upgrade. | 5.2.0-5.2.1 | 5.3.0-5.6.0| | [3226525](#3226525)
| When using TACACS+, if you configure per-command authorization with the tacplus-restrict command, NVUE configuration commands fail for any user with a privilege level lower than 15. This occurs because NVUE is not able to create a .local user directory. | 5.2.0-5.3.1 | 5.4.0-5.6.0| -| [3221628](#3221628)
| Cumulus Linux 5.2.0 and 5.2.1 VX images might include an incorrect entry at the end of /etc/apt/sources.list, which produces warnings when you run apt update. Remove this entry to avoid these warnings. | 5.2.0-5.6.0 | | +| [3221628](#3221628)
| Cumulus Linux VX images might include an incorrect entry at the end of /etc/apt/sources.list, which produces warnings when you run apt update. Remove this entry to avoid these warnings. | 5.2.0-5.6.0 | | | [3218207](#3218207)
None | Certain routes on tenant VRFs have missing next hop entries because the router MAC address is missing in the bridge forwarding database table that corresponds to the remote VTEP. As a result, traffic forwarding is affected for these routes. | 4.3.0-5.2.1 | 5.3.0-5.6.0| | [3217675](#3217675)
| When you run the NVUE nv set bridge domain br_default multicast snooping enable off command to disable multicast snooping, the bridge still shows that multicast snooping is enabled. | 5.0.1-5.2.1 | 5.3.0-5.6.0| | [3217674](#3217674)
| Multicast PTP over UDP traffic does not forward to data ports when the PTP service is disabled. To work around this issue, change the ptp.timestamping setting to FALSE in the /etc/cumulus/switchd.conf file, then restart switchd. | 5.0.1-5.2.1 | 5.3.0-5.6.0| @@ -211,7 +210,7 @@ pdfhidden: True | [3202401](#3202401)
| The ethtool -m command and the NVUE nv show interface pluggable command do not show the VPD for optical modules and AOCs (OUI, vendor name, part number, or revision serial number). | 5.2.0-5.2.1 | 5.3.0-5.6.0| | [3200373](#3200373)
| After rebooting the switch, the IPv6 link local address for an SVI that belongs to non-default VRF is missing, and doesn't show on the switch. To resolve this issue, run the ifreload -a command. | 5.0.0-5.2.1 | 5.3.0-5.6.0| | [3196774](#3196774)
| In an EVPN configuration, after closing a BGP session on an EVPN peer, the VTEP RMAC is deleted and the hosts lose reachability to each other. To work around this issue, restart FRR or add a static RMAC entry to bridge FDB. | 5.2.0-5.2.1 | 5.3.0-5.6.0| -| [3192808](#3192808)
None | When the switch receives an LLDP frame from a Cisco router right after a ptmd restart, the ptmd service crashes. | 4.3.0-5.2.1 | 5.3.0-5.6.0| +| [3192808](#3192808)
None | When the switch receives an LLDP frame from a Cisco router right after a ptmd restart, the ptmd service crashes. | 4.3.0-4.3.1, 4.4.0-5.2.1 | 4.3.2, 5.3.0-5.6.0| | [3188576](#3188576)
| IPv6 messages fill the /var/log/frr/frr.log files and logrotate is unable to clean up the old log files. As a result, a significant number of log files are never deleted, which fill up the file system. | 5.2.0-5.2.1 | 5.3.0-5.6.0| | [3187469](#3187469)
| At high scale with 160 VRFs and 10 VLANs per VRF (a total of 1600 VLANs), you see traffic loss during primary switch reboot. To work around this issue, reduce the scale to 40 VRFs with no more than 400 VLANs in the configuration, and use a common MAC address. | 5.1.0-5.5.1 | 5.6.0| | [3187408](#3187408)
| Certain NUE commands produce an Invalid Command error. For example:
cumulus@switch:~$ nv set vrf default router bgp peer-group SPINE password CumulusLinux!Invalid Command: set vrf default router bgp peer-group SPINE password CumulusLinux!cumulus@switch:~$ nv set router policy route-map GLOBAL rule 10 description globalInvalid Command: set router policy route-map GLOBAL rule 10 description global
| 5.2.0-5.2.1 | 5.3.0-5.6.0| @@ -232,7 +231,7 @@ pdfhidden: True | [3145204](#3145204)
| On the NVIDIA Spectrum-1 switch, the nv show system forwarding command shows GTP hashing output, which is not supported on this switch. | 5.2.0-5.4.0 | 5.5.0-5.6.0| | [3144740](#3144740)
| The /var/lib/snmp/snmpd.conf file contains multiple Warning: Unknown token: ifXTable messages. To avoid these warnings, add the -noTokenWarnings option to the SNMPDOPTS variable in the /etc/defaults/snmpd file, then restart the snmpd service. | 5.2.0-5.4.0 | 5.5.0-5.6.0| | [3142615](#3142615)
| The BGP4-MIB.txt file is missing from Net-SNMP agent. | 5.0.0-5.4.0 | 5.5.0-5.6.0| -| [3141826](#3141826)
| A slow memory leak (~5KB over 24 hour period at a 60 second polling interval) might occur in SNMP when you walk the following system MIB objects (1.3.6.1.2.1)
1.3.6.1.2.1.47 --> Entity MIB
1.3.6.1.2.1.99 --> Entity Sensor MIB
1.3.6.1.2.1.23 --> rip2
1.3.6.1.2.1.2 --> interface/interfaces
1.3.6.1.2.1.31 --> ifMIB
1.3.6.1.2.1.4 --> IP
1.3.6.1.2.1.25 --> hostResource | 5.0.1-5.4.0 | 5.5.0-5.6.0| +| [3141826](#3141826)
| A slow memory leak (~5KB over 24 hour period at a 60 second polling interval) might occur in SNMP when you walk the following system MIB objects (1.3.6.1.2.1)
1.3.6.1.2.1.47 --> Entity MIB
1.3.6.1.2.1.99 --> Entity Sensor MIB
1.3.6.1.2.1.23 --> rip2
1.3.6.1.2.1.2 --> interface/interfaces
1.3.6.1.2.1.31 --> ifMIB
1.3.6.1.2.1.4 --> IP
1.3.6.1.2.1.25 --> hostResource | 5.0.1-5.6.0 | | | [3139364](#3139364)
| When Cumulus Linux updates the ECMP container with a new next hop list, it allocates the flow counters for the new next hop list without deallocating the counters bound to the old next hop list. This results in resource exhaustion and you see the following error messages in the /var/log/switchd.log file:
hal_mlx_stat.c:3215 ERR Failed to allocate counter(s) for ecmp [71025:0] status: Internal Errorhal_mlx_stat.c:3196 ERR Counter set for ecmp [71025:0] idx 0 failed: Internal Errorhal_mlx_sdk_nexthop_wrap.c:1076 ERR Counter 0 alloc for ecmp next hop failed: Internal Errorhal_mlx_sdk_counter_wrap.c:54 ERR Counter alloc failed: No More Resources
This issue does not have any functional impact to forwarding. Even without the flow counters attached to the ECMP group, packet forwarding works without any issues
To avoid allocating next hop counters for any new ECMP next hop list update, set mlx.stats.ecmp.enable to FALSE in the /etc/mlx/datapath/stats.conf file, then restart switchd with the sudo systemctl reload switchd command. | 5.0.0-5.2.1 | 5.3.0-5.6.0| | [3139164](#3139164)
| NVUE does not allow you to set 2X/4X lanes. To work around this issue, set the appropriate lanes for forced speed with the ethtool -s swpX speed autoneg off lanes command. For example, ethtool -s swp1 speed 100000 autoneg off lanes 2. | 5.2.0-5.2.1 | 5.3.0-5.6.0| | [3138057](#3138057)
| When the next hop interface for EVPN type 5 routes flaps, FRR might uninstall the routes and Route install failed appears in /var/log/frr/frr.log. To work around this problem, restart FRR with the sudo systemctl restart frr command. | 4.4.0-5.2.1 | 5.3.0-5.6.0| @@ -264,7 +263,6 @@ pdfhidden: True | [2891255](#2891255)
| CVE-2021-39925: Buffer overflow in the Bluetooth SDP dissector in Wireshark 3.4.0 to 3.4.9 and 3.2.0 to 3.2.17 allows denial of service via packet injection or crafted capture file
Vulnerable: <= 2.6.20-0+deb10u1Fixed: 2.6.20-0+deb10u2 | 4.0.0-4.4.1, 5.0.0-5.6.0 | 4.4.2-4.4.5| | [2890681](#2890681)
| CVE-2021-42771: relative path traversal in Babel, a set of tools for internationalising Python applications, could result in the execution of arbitrary code
Vulnerable: 2.6.0+dfsg.1-1Fixed: 2.6.0+dfsg.1-1+deb10u1 | 4.0.0-4.4.1, 5.0.0-5.6.0 | 4.4.2-4.4.5| | [2867042](#2867042)
| When connecting the NVIDIA SN4600 switch to another NVIDIA Spectrum switch, you must use auto-negotiation mode (not force mode); otherwise the switch might use the wrong Tx configuration. | 5.0.0-5.6.0 | | -| [2847919](#2847919)
| Configuring a router with the REST API through the switch front panel ports (swps) is supported in the default VRF only. To work around this issue, use the localHost IP address or the MGMT IP address to configure router using the Rest API. | 5.0.0-5.6.0 | | | [2847755](#2847755)
| When you use NCLU to remove the configuration for a peer that is a member of a group but also has other peer-specific configuration, you must remove the peer-specific configuration before you delete the peer in a separate NCLU commit. | 5.0.0-5.6.0 | | | [2823307](#2823307)
| Cumuls Linux does not support a bond with more than 64 ports. Any configuration with more than 64 ports in a bond changes all ports to down when you apply the configuration. | 5.0.0-5.6.0 | | | [2821929](#2821929)
| FRR restarts even when the NVUE configuration overwrite mode is set. | 5.0.0-5.3.1 | 5.4.0-5.6.0| diff --git a/content/cumulus-linux-52/rn.xml b/content/cumulus-linux-52/rn.xml index 94eefc845d..077d154477 100644 --- a/content/cumulus-linux-52/rn.xml +++ b/content/cumulus-linux-52/rn.xml @@ -14,7 +14,7 @@ This configuration is not allowed; it is considered to be eBGP and local preference is not advertised. 5.0.0-5.5.1 -5.6.0 +4.3.2-4.4.5, 5.6.0 3585467 @@ -39,8 +39,8 @@ This configuration is not allowed; it is considered to be eBGP and local prefere CVE-2023-38408: The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009. Mitigation: Do not use ssh-agent forwarding (the man page for ssh_config says that "agent forwarding should be enabled with caution"), or start the ssh-agent program with the -P option to allow only specific PKCS#11 libraries (or none with -P ''). For Cumulus Linux 4.3.2, the /usr/bin/ssh-agent program has all permissions turned off (chmod 0) to prevent its execution if a vulnerable version is detected. -4.0.0-4.4.5, 5.0.0-5.6.0 - +4.0.0-4.3.1, 5.0.0-5.6.0 +4.3.2-4.4.5 3541912 @@ -100,7 +100,7 @@ For Cumulus Linux 4.3.2, the /usr/bin/ssh-agent program has all permissions turn 3413827 During upgrade, when one MLAG node is upgraded and the other MLAG node is not yet upgraded, permanent neighbors cannot synchronize between MLAG nodes. The {{clagctl dumppermanentneighs}} command only shows local neighbors. 5.0.0-5.4.0 -5.5.0-5.6.0 +4.3.2-4.4.5, 5.5.0-5.6.0 3413785 @@ -140,8 +140,8 @@ To obtain the correct packages, install the {{tacplus-client}} package and its d 3351951 Currently, the default core dump size limit on Cumulus Linux is 256M but the SDK generates core dumps around 800M. To avoid incomplete core files, you can increase the core dump size limit. -4.2.1-5.3.1 -5.4.0-5.6.0 +4.2.1-4.3.1, 4.4.0-5.3.1 +4.3.2, 5.4.0-5.6.0 3351936 @@ -163,9 +163,7 @@ To obtain the correct packages, install the {{tacplus-client}} package and its d 3347677 -In an MLAG configuration, when a link failure occurs on the peerlink or the peerlink shuts down, the switch in the secondary role attracts traffic to its local VTEP as it advertises the local VTEP IP address momentarily just before the VXLAN device is protodown. This traffic is dropped for a brief moment (between 5 and 10 seconds) because the MLAG bonds on the secondary switch are already protodown. - -In a proposed fix in the MR !226, we are not flapping the IP on vxlan device on secondary clag device on peerlink down trigger. This ensures smooth traffic flow and no convergence issue seen in system test bed with this fix. +In an MLAG configuration, when a link failure occurs on the peerlink or the peerlink shuts down, the switch in the secondary role attracts traffic to its local VTEP as it advertises the local VTEP IP address momentarily just before the VXLAN device is protodown. This traffic is dropped for a brief moment (between 5 and 10 seconds) because the MLAG bonds on the secondary switch are already protodown. 5.1.0-5.6.0 @@ -307,7 +305,7 @@ ethtool (-S): unknown parameter 'clear' 3221628 -Cumulus Linux 5.2.0 and 5.2.1 VX images might include an incorrect entry at the end of {{/etc/apt/sources.list}}, which produces warnings when you run {{apt update}}. Remove this entry to avoid these warnings. +Cumulus Linux VX images might include an incorrect entry at the end of {{/etc/apt/sources.list}}, which produces warnings when you run {{apt update}}. Remove this entry to avoid these warnings. 5.2.0-5.6.0 @@ -402,8 +400,8 @@ Packet size is larger than router interface MTU – Validate the router interfac 3192808 When the switch receives an LLDP frame from a Cisco router right after a {{ptmd}} restart, the {{ptmd}} service crashes. -4.3.0-5.2.1 -5.3.0-5.6.0 +4.3.0-4.3.1, 4.4.0-5.2.1 +4.3.2, 5.3.0-5.6.0 3188576 @@ -550,8 +548,8 @@ The {{/var/lib/snmp/snmpd.conf}} file contains multiple {{Warning: Unknown token 1.3.6.1.2.1.31 --> ifMIB 1.3.6.1.2.1.4 --> IP 1.3.6.1.2.1.25 --> hostResource -5.0.1-5.4.0 -5.5.0-5.6.0 +5.0.1-5.6.0 + 3139364 @@ -782,12 +780,6 @@ Fixed: 2.6.0+dfsg.1-1+deb10u1 -2847919 -Configuring a router with the REST API through the switch front panel ports (swps) is supported in the default VRF only. To work around this issue, use the localHost IP address or the MGMT IP address to configure router using the Rest API. -5.0.0-5.6.0 - - - 2847755 When you use NCLU to remove the configuration for a peer that is a member of a group but also has other peer-specific configuration, you must remove the peer-specific configuration before you delete the peer in a separate NCLU commit. 5.0.0-5.6.0 @@ -872,7 +864,7 @@ You can safely ignore this warning. This configuration is not allowed; it is considered to be eBGP and local preference is not advertised. 5.0.0-5.5.1 -5.6.0 +4.3.2-4.4.5, 5.6.0 3585467 @@ -897,8 +889,8 @@ This configuration is not allowed; it is considered to be eBGP and local prefere CVE-2023-38408: The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009. Mitigation: Do not use ssh-agent forwarding (the man page for ssh_config says that "agent forwarding should be enabled with caution"), or start the ssh-agent program with the -P option to allow only specific PKCS#11 libraries (or none with -P ''). For Cumulus Linux 4.3.2, the /usr/bin/ssh-agent program has all permissions turned off (chmod 0) to prevent its execution if a vulnerable version is detected. -4.0.0-4.4.5, 5.0.0-5.6.0 - +4.0.0-4.3.1, 5.0.0-5.6.0 +4.3.2-4.4.5 3541912 @@ -958,7 +950,7 @@ For Cumulus Linux 4.3.2, the /usr/bin/ssh-agent program has all permissions turn 3413827 During upgrade, when one MLAG node is upgraded and the other MLAG node is not yet upgraded, permanent neighbors cannot synchronize between MLAG nodes. The {{clagctl dumppermanentneighs}} command only shows local neighbors. 5.0.0-5.4.0 -5.5.0-5.6.0 +4.3.2-4.4.5, 5.5.0-5.6.0 3413785 @@ -992,8 +984,8 @@ To obtain the correct packages, install the {{tacplus-client}} package and its d 3351951 Currently, the default core dump size limit on Cumulus Linux is 256M but the SDK generates core dumps around 800M. To avoid incomplete core files, you can increase the core dump size limit. -4.2.1-5.3.1 -5.4.0-5.6.0 +4.2.1-4.3.1, 4.4.0-5.3.1 +4.3.2, 5.4.0-5.6.0 3351936 @@ -1015,9 +1007,7 @@ To obtain the correct packages, install the {{tacplus-client}} package and its d 3347677 -In an MLAG configuration, when a link failure occurs on the peerlink or the peerlink shuts down, the switch in the secondary role attracts traffic to its local VTEP as it advertises the local VTEP IP address momentarily just before the VXLAN device is protodown. This traffic is dropped for a brief moment (between 5 and 10 seconds) because the MLAG bonds on the secondary switch are already protodown. - -In a proposed fix in the MR !226, we are not flapping the IP on vxlan device on secondary clag device on peerlink down trigger. This ensures smooth traffic flow and no convergence issue seen in system test bed with this fix. +In an MLAG configuration, when a link failure occurs on the peerlink or the peerlink shuts down, the switch in the secondary role attracts traffic to its local VTEP as it advertises the local VTEP IP address momentarily just before the VXLAN device is protodown. This traffic is dropped for a brief moment (between 5 and 10 seconds) because the MLAG bonds on the secondary switch are already protodown. 5.1.0-5.6.0 @@ -1165,7 +1155,7 @@ ethtool (-S): unknown parameter 'clear' 3221628 -Cumulus Linux 5.2.0 and 5.2.1 VX images might include an incorrect entry at the end of {{/etc/apt/sources.list}}, which produces warnings when you run {{apt update}}. Remove this entry to avoid these warnings. +Cumulus Linux VX images might include an incorrect entry at the end of {{/etc/apt/sources.list}}, which produces warnings when you run {{apt update}}. Remove this entry to avoid these warnings. 5.2.0-5.6.0 @@ -1266,8 +1256,8 @@ Packet size is larger than router interface MTU – Validate the router interfac 3192808 When the switch receives an LLDP frame from a Cisco router right after a {{ptmd}} restart, the {{ptmd}} service crashes. -4.3.0-5.2.1 -5.3.0-5.6.0 +4.3.0-4.3.1, 4.4.0-5.2.1 +4.3.2, 5.3.0-5.6.0 3188576 @@ -1414,8 +1404,8 @@ The {{/var/lib/snmp/snmpd.conf}} file contains multiple {{Warning: Unknown token 1.3.6.1.2.1.31 --> ifMIB 1.3.6.1.2.1.4 --> IP 1.3.6.1.2.1.25 --> hostResource -5.0.1-5.4.0 -5.5.0-5.6.0 +5.0.1-5.6.0 + 3139364 @@ -1646,12 +1636,6 @@ Fixed: 2.6.0+dfsg.1-1+deb10u1 -2847919 -Configuring a router with the REST API through the switch front panel ports (swps) is supported in the default VRF only. To work around this issue, use the localHost IP address or the MGMT IP address to configure router using the Rest API. -5.0.0-5.6.0 - - - 2847755 When you use NCLU to remove the configuration for a peer that is a member of a group but also has other peer-specific configuration, you must remove the peer-specific configuration before you delete the peer in a separate NCLU commit. 5.0.0-5.6.0 diff --git a/content/cumulus-linux-53/Installation-Management/Installing-a-New-Cumulus-Linux-Image.md b/content/cumulus-linux-53/Installation-Management/Installing-a-New-Cumulus-Linux-Image.md index 80bbab0f7f..be1b20dc9a 100644 --- a/content/cumulus-linux-53/Installation-Management/Installing-a-New-Cumulus-Linux-Image.md +++ b/content/cumulus-linux-53/Installation-Management/Installing-a-New-Cumulus-Linux-Image.md @@ -323,7 +323,7 @@ You can run several installer command line options from ONIE to perform basic sw - Execute a ZTP script to perform necessary configuration {{%notice note%}} -The `onie-nos-install` command does *not* allow you specify command line parameters. You must access the switch from the console and transfer a disk image to the switch. You must then make the disk image executable and install the image directly from the ONIE command line with the options you want to use. +The `onie-nos-install` command does *not* allow you to specify command line parameters. You must access the switch from the console and transfer a disk image to the switch. You must then make the disk image executable and install the image directly from the ONIE command line with the options you want to use. The following example commands transfer a disk image to the switch, make the image executable, and install the image with the `--password` option to change the default cumulus user password: diff --git a/content/cumulus-linux-53/Layer-1-and-Switch-Ports/DHCP/DHCP-Relays.md b/content/cumulus-linux-53/Layer-1-and-Switch-Ports/DHCP/DHCP-Relays.md index 86f5889928..207c9a5887 100644 --- a/content/cumulus-linux-53/Layer-1-and-Switch-Ports/DHCP/DHCP-Relays.md +++ b/content/cumulus-linux-53/Layer-1-and-Switch-Ports/DHCP/DHCP-Relays.md @@ -103,7 +103,7 @@ cumulus@leaf01:~$ nv config apply ## Optional Configuration -This section describes optional DHCP relay configuration. The steps provided in this section assume that you already done basic DHCP relay configuration, described above. +This section describes optional DHCP relay configurations. The steps provided in this section assume that you have already configured basic DHCP relay, as described above. ### DHCP Agent Information Option (Option 82) diff --git a/content/cumulus-linux-53/Layer-1-and-Switch-Ports/DHCP/DHCP-Snooping.md b/content/cumulus-linux-53/Layer-1-and-Switch-Ports/DHCP/DHCP-Snooping.md new file mode 100644 index 0000000000..8454c280ef --- /dev/null +++ b/content/cumulus-linux-53/Layer-1-and-Switch-Ports/DHCP/DHCP-Snooping.md @@ -0,0 +1,91 @@ +--- +title: DHCP Snooping +author: NVIDIA +weight: 355 +toc: 3 +--- +DHCP snooping enables Cumulus Linux to act as a middle layer between the DHCP infrastructure and DHCP clients by scanning DHCP control packets and building an IP-MAC database. Cumulus Linux accepts DHCP offers from only trusted interfaces and can rate limit packets. + +{{%notice note%}} +DHCP option 82 processing is not supported. +{{%/notice%}} + +## Configure DHCP Snooping + +To configure DHCP snooping, you need to: + +- Enable DHCP snooping on a VLAN. +- Add a trusted interface. Cumulus Linux allows DHCP offers from only trusted interfaces to prevent malicious DHCP servers from assigning IP addresses inside the network. The interface must be a member of the bridge specified. +- Set the rate limit for DHCP requests to avoid DoS attacks. The default value is 100 packets per second. + +The following example shows you how to configure DHCP snooping for IPv4 and IPv6. + +{{%notice note%}} +NVUE does not provide commands to configure DHCP Snooping. +{{%/notice%}} + +Create the `/etc/dhcpsnoop/dhcp_snoop.json` file and add DHCP snooping configuration under the bridge. + +The following example enables DHCP snooping for IPv4 on VLAN 10, sets the rate limit to 50 and the trusted interface to swp3. swp3 is a member of the bridge `br_default`: + +``` +cumulus@leaf01:~$ sudo nano /etc/dhcpsnoop/dhcp_snoop.json +{ + "bridge": [ + { + "bridge_id": "br_default", + "vlan": [ + { + "vlan_id": 10, + "snooping": 1, + "rate_limit": 50, + "ip_version": 4, + "trusted_interface": [ + "swp3" + ], + } + ] + } + ] +} +``` + +The following example enables DHCP snooping for IPv6 on VLAN 10, sets the rate limit to 50 and the trusted interface to swp6. swp6 is a member of the bridge `br_default`: + +``` +cumulus@leaf01:~$ sudo nano /etc/dhcpsnoop/dhcp_snoop.json +{ + "bridge": [ + { + "bridge_id": "br_default", + "vlan": [ + { + "vlan_id": 10, + "snooping": 1, + "rate_limit": 50, + "ip_version": 6, + "trusted_interface": [ + "swp6" + ], + } + ] + } + ] +} +``` + +When DHCP snooping detects a violation, the packet is dropped and a message is logged to the `/var/log/dhcpsnoop.log` file. + +## Show the DHCP Binding Table + +To show the DHCP binding table, run the `net show dhcp-snoop table` command for IPv4 or the `net show dhcp-snoop6 table` command for IPv6. The following example command shows the DHCP binding table for IPv4: + +``` +cumulus@leaf01:~$ net show dhcp-snoop table +Port VLAN IP MAC Lease State Bridge +---- ---- --------- ----------------- ----- ----- ------ + +swp5 1002 10.0.0.3 00:02:00:00:00:04 7200 ACK br0 + +swp5 1000 10.0.1.3 00:02:00:00:00:04 7200 ACK br0 +``` diff --git a/content/cumulus-linux-53/Layer-1-and-Switch-Ports/DHCP/_index.md b/content/cumulus-linux-53/Layer-1-and-Switch-Ports/DHCP/_index.md index 349640ceb4..fd3f513c3c 100644 --- a/content/cumulus-linux-53/Layer-1-and-Switch-Ports/DHCP/_index.md +++ b/content/cumulus-linux-53/Layer-1-and-Switch-Ports/DHCP/_index.md @@ -4,4 +4,7 @@ author: NVIDIA weight: 338 toc: 3 --- -This section describes how to configure [DHCP](## "Dynamic Host Configuration Protocol") relays and [DHCP](## "Dynamic Host Configuration Protocol") servers. +This section describes how to configure: +- {{}} +- {{}} +- {{}} diff --git a/content/cumulus-linux-53/Layer-1-and-Switch-Ports/Interface-Configuration-and-Management/Switch-Port-Attributes.md b/content/cumulus-linux-53/Layer-1-and-Switch-Ports/Interface-Configuration-and-Management/Switch-Port-Attributes.md index 82d1710f48..81df06d9b3 100644 --- a/content/cumulus-linux-53/Layer-1-and-Switch-Ports/Interface-Configuration-and-Management/Switch-Port-Attributes.md +++ b/content/cumulus-linux-53/Layer-1-and-Switch-Ports/Interface-Configuration-and-Management/Switch-Port-Attributes.md @@ -1120,7 +1120,7 @@ SN4600 64xQSFP56 (200GbE) interfaces support both PAM4 and NRZ encodings with al For lower speeds, PAM4 is automatically converted to NRZ encoding. -Only 32xQSFP56 ports can brea kout into 4xSFP56 (4x50GbE). But, in this case, the adjacent QSFP56 port are blocked (only the first and third or second and fourth rows can break out into 4xSFP56). +Only 32xQSFP56 ports can break out into 4xSFP56 (4x50GbE). But, in this case, the adjacent QSFP56 port are blocked (only the first and third or second and fourth rows can break out into 4xSFP56). All 64xQSFP56 ports can break out into 2xQSFP56 (2x100GbE) without blocking ports. diff --git a/content/cumulus-linux-53/Layer-1-and-Switch-Ports/Interface-Configuration-and-Management/_index.md b/content/cumulus-linux-53/Layer-1-and-Switch-Ports/Interface-Configuration-and-Management/_index.md index f4b230b4de..b7804343ef 100644 --- a/content/cumulus-linux-53/Layer-1-and-Switch-Ports/Interface-Configuration-and-Management/_index.md +++ b/content/cumulus-linux-53/Layer-1-and-Switch-Ports/Interface-Configuration-and-Management/_index.md @@ -412,7 +412,7 @@ If you specify a subinterface, such as swp1.100, then run `ifup swp1.100`, Cumul You can specify both IPv4 and IPv6 addresses for the same interface. For IPv6 addresses: -- You can create or modify the IP address for an interface using either `::` or `0:0:0` notation. For example,both 2620:149:43:c109:0:0:0:5 and 2001:DB8::1/126 are valid. +- You can create or modify the IP address for an interface using either `::` or `0:0:0` notation. For example, both 2620:149:43:c109:0:0:0:5 and 2001:DB8::1/126 are valid. - Cumulus Linux assigns the IPv6 address with all zeroes in the interface identifier (2001:DB8::/126) for each subnet; connected hosts cannot use this address. The following example commands configure three IP addresses for swp1; two IPv4 addresses and one IPv6 address. diff --git a/content/cumulus-linux-53/Layer-1-and-Switch-Ports/Quality-of-Service/_index.md b/content/cumulus-linux-53/Layer-1-and-Switch-Ports/Quality-of-Service/_index.md index 487961f524..cc7b227435 100644 --- a/content/cumulus-linux-53/Layer-1-and-Switch-Ports/Quality-of-Service/_index.md +++ b/content/cumulus-linux-53/Layer-1-and-Switch-Ports/Quality-of-Service/_index.md @@ -896,7 +896,7 @@ If you define a queue minimum shaping value of `0`, there is no bandwidth guaran -To use PBR in Cumulus linux, you define a PBR policy and apply it to the ingress interface (the interface must already have an IP address assigned). Cumulus Linux matches traffic against the match rules in sequential order and forwards the traffic according to the set rule in the first match. Traffic that does not match any rule passes on to the normal destination based routing mechanism. +To use PBR in Cumulus Linux, you define a PBR policy and apply it to the ingress interface (the interface must already have an IP address assigned). Cumulus Linux matches traffic against the match rules in sequential order and forwards the traffic according to the set rule in the first match. Traffic that does not match any rule passes on to the normal destination based routing mechanism. To configure a PBR policy: diff --git a/content/cumulus-linux-53/Layer-3/Routing/Route-Filtering-and-Redistribution.md b/content/cumulus-linux-53/Layer-3/Routing/Route-Filtering-and-Redistribution.md index fd7618bd9f..50c38b8997 100644 --- a/content/cumulus-linux-53/Layer-3/Routing/Route-Filtering-and-Redistribution.md +++ b/content/cumulus-linux-53/Layer-3/Routing/Route-Filtering-and-Redistribution.md @@ -281,7 +281,7 @@ The `source-protocol` match statement is only supported in {{Profile| MAC Addresses |
Layer 3 Neighbors| Longest Prefix Match (LPM) | diff --git a/content/cumulus-linux-53/Monitoring-and-Troubleshooting/FRRouting-Log-Message-Reference.md b/content/cumulus-linux-53/Monitoring-and-Troubleshooting/FRRouting-Log-Message-Reference.md index 8102a9ced5..5ec1b97caf 100644 --- a/content/cumulus-linux-53/Monitoring-and-Troubleshooting/FRRouting-Log-Message-Reference.md +++ b/content/cumulus-linux-53/Monitoring-and-Troubleshooting/FRRouting-Log-Message-Reference.md @@ -13,13 +13,13 @@ The following table lists the HIGH severity ERROR log messages generated by FRR. | Babel | HIGH | 16777218 | BABEL Packet Error | Babel has detected a packet encode/decode problem. | Collect the relevant log files and report the issue for troubleshooting.| | Babel | HIGH | 16777219 | BABEL Configuration Error | Babel has detected a configuration error of some sort. | Ensure that the configuration is correct. | | Babel | HIGH | 16777220 | BABEL Route Error | Babel has detected a routing error and is in an inconsistent state. | Gather data to report the issue for troubleshooting. Restart FRR. | -| BGP | HIGH | 33554433 | BGP attribute flag is incorrect | BGP attribute flag is set to the wrong value (Optional/Transitive/Partial). | Determine the soure of the attribute and determine why the attribute flag has been set incorrectly. | -| BGP | HIGH | 33554434 | BGP attribute length is incorrect | BGP attribute length is incorrect. | Determine the soure of the attribute and determine why the attribute length has been set incorrectly. | -| BGP | HIGH | 33554435 | BGP attribute origin value invalid | BGP attribute origin value is invalid. | Determine the soure of the attribute and determine why the origin attribute has been set incorrectly. | -| BGP | HIGH | 33554436 | BGP as path is invalid | BGP AS path has been malformed. | Determine the soure of the update and determine why the AS path has been set incorrectly. | -| BGP | HIGH | 33554437 | BGP as path first as is invalid | BGP update has invalid first AS in AS path. | Determine the soure of the update and determine why the AS path first AS value has been set incorrectly. | -| BGP | HIGH | 33554439 | BGP PMSI tunnel attribute type is invalid | BGP update has invalid type for PMSI tunnel. | Determine the soure of the update and determine why the PMSI tunnel attribute type has been set incorrectly. | -| BGP | HIGH | 33554440 | BGP PMSI tunnel attribute length is invalid | BGP update has invalid length for PMSI tunnel. | Determine the soure of the update and determine why the PMSI tunnel attribute length has been set incorrectly. | +| BGP | HIGH | 33554433 | BGP attribute flag is incorrect | BGP attribute flag is set to the wrong value (Optional/Transitive/Partial). | Determine the source of the attribute and determine why the attribute flag has been set incorrectly. | +| BGP | HIGH | 33554434 | BGP attribute length is incorrect | BGP attribute length is incorrect. | Determine the source of the attribute and determine why the attribute length has been set incorrectly. | +| BGP | HIGH | 33554435 | BGP attribute origin value invalid | BGP attribute origin value is invalid. | Determine the source of the attribute and determine why the origin attribute has been set incorrectly. | +| BGP | HIGH | 33554436 | BGP as path is invalid | BGP AS path has been malformed. | Determine the source of the update and determine why the AS path has been set incorrectly. | +| BGP | HIGH | 33554437 | BGP as path first as is invalid | BGP update has invalid first AS in AS path. | Determine the source of the update and determine why the AS path first AS value has been set incorrectly. | +| BGP | HIGH | 33554439 | BGP PMSI tunnel attribute type is invalid | BGP update has invalid type for PMSI tunnel. | Determine the source of the update and determine why the PMSI tunnel attribute type has been set incorrectly. | +| BGP | HIGH | 33554440 | BGP PMSI tunnel attribute length is invalid | BGP update has invalid length for PMSI tunnel. | Determine the source of the update and determine why the PMSI tunnel attribute length has been set incorrectly. | | BGP | HIGH | 33554442 | BGP peergroup operated on in error | BGP operating on peer-group instead of peers included. | Ensure the configuration doesn't contain peer-groups contained within peer-groups. | | BGP | HIGH | 33554443 | BGP failed to delete peer structure | BGP was unable to delete the peer structure when the address-family was removed. | Determine if all expected peers are removed and restart FRR if not. This is most likely a bug. | | BGP | HIGH | 33554444 | BGP failed to get table chunk memory | BGP unable to get chunk memory for table manager. | Ensure there is adequate memory on the device to support the table requirements. | @@ -38,8 +38,8 @@ The following table lists the HIGH severity ERROR log messages generated by FRR. | BGP | HIGH | 33554457 | BGP error receiving keepalive packet | BGP unable to process a keepalive packet. | BGP keepalive received while in a stopped state. If the problem persists, report it for troubleshooting. | | BGP | HIGH | 33554458 | BGP error receiving route refresh message | BGP unable to process route refresh message. | BGP route refresh received while in a stopped state. If the problem persists, report it for troubleshooting. | | BGP | HIGH | 33554459 | BGP error capability message | BGP unable to process received capability. | BGP capability message received while in a stopped state. If the problem persists, report it for troubleshooting. | -| BGP | HIGH | 33554460 | BGP error with nexthopo update | BGP unable to process nexthop update. | BGP received the nexthop update but the nexthop is not reachable in this BGP instance. Report the problem for troubleshooting. | -| BGP | HIGH | 33554461 | Failure to apply label | BGP attempted to attempted to apply a label but could not do so. | This is most likely a bug. If the problem persists, report it for troubleshooting. | +| BGP | HIGH | 33554460 | BGP error with nexthop update | BGP unable to process nexthop update. | BGP received the nexthop update but the nexthop is not reachable in this BGP instance. Report the problem for troubleshooting. | +| BGP | HIGH | 33554461 | Failure to apply label | BGP attempted to apply a label but could not do so. | This is most likely a bug. If the problem persists, report it for troubleshooting. | | BGP | HIGH | 33554462 | Multipath specified is invalid | BGP was started with an invalid ECMP/multipath value. | Correct the ECMP/multipath value supplied when starting the BGP daemon. | | BGP | HIGH | 33554463 | Failure to process a packet | BGP attempted to process a received packet but could not do so. | This is most likely a bug. If the problem persists, report it for troubleshooting. | | BGP | HIGH | 33554464 | Failure to connect to peer | BGP attempted to send open to a peer but couldn't connect. | This is most likely a bug. If the problem persists, report it for troubleshooting. | @@ -62,7 +62,7 @@ The following table lists the HIGH severity ERROR log messages generated by FRR. | EIGRP | HIGH | 50331650 | EIGRP Configuration Error | EIGRP has detected a configuration error.| Correct the configuration issue. If it still persists, report the issue for troubleshooting.| | General | HIGH | 100663297 | Failure to raise or lower privileges | FRR attempted to raise or lower its privileges and was unable to do so. | Ensure that you are running FRR as the frr user and that the user has sufficient privileges to properly access root privileges. | | General | HIGH | 100663298 | VRF Failure on Start | Upon startup, FRR failed to properly initialize and start up the VRF subsystem. | Ensure that there is sufficient memory to start processes, then restart FRR. | -| General | HIGH | 100663299 | Socket Error | When attempting to access a socket, a system error occured and FRR was unable to properly complete the request. | Ensure that there are sufficient system resources available and ensure that the frr user has sufficient permisions to work. | +| General | HIGH | 100663299 | Socket Error | When attempting to access a socket, a system error occurred and FRR was unable to properly complete the request. | Ensure that there are sufficient system resources available and ensure that the frr user has sufficient permissions to work. | | General | HIGH | 100663303 | System Call Error | FRR has detected an error from using a vital system call and has probably already exited. | Ensure permissions are correct for FRR users and groups. Additionally, check that sufficient system resources are available. | | General | HIGH | 100663304 | VTY Subsystem Error | FRR has detected a problem with the specified configuration file. | Ensure the configuration file exists and has the correct permissions for operations. Additionally, ensure that all config lines are correct as well. | | General | HIGH | 100663305 | SNMP Subsystem Error | FRR has detected a problem with the SNMP library it uses. A callback from this subsystem has indicated some error. | Examine the callback message and ensure SNMP is properly set up and working. | @@ -86,7 +86,7 @@ The following table lists the HIGH severity ERROR log messages generated by FRR. | OSPF | HIGH | 134217729 | Failure to process a packet | OSPF attempted to process a received packet but could not do so. | This is most likely a bug. If the problem persists, report it for troubleshooting. | | OSPF | HIGH | 134217730 | Failure to process Router LSA | OSPF attempted to process a router LSA, but there was an advertising ID mismtach with the link ID. | Check the OSPF network configuration for any configuration issue. If the problem persists, report it for troubleshooting.| | OSPF | HIGH | 134217731 | OSPF Domain Corruption | OSPF attempted to process a router LSA, but there was an advertising ID mismtach with the link ID. | Check OSPF network database for a corrupted LSA. If the problem persists, shut down the OSPF domain and report the problem for troubleshooting. | -| OSPF | HIGH | 134217732 | OSPF Initialization failure | OSPF failed to initialized the OSPF default instance. | Ensure there is adequate memory on the device. If the problem persists, report it for troubleshooting. | +| OSPF | HIGH | 134217732 | OSPF Initialization failure | OSPF failed to initialize the OSPF default instance. | Ensure there is adequate memory on the device. If the problem persists, report it for troubleshooting. | | OSPF | HIGH | 134217733 | OSPF SR Invalid DB | OSPF segment routing database is invalid. | This is most likely a bug. If the problem persists, report it for troubleshooting. | | OSPF | HIGH | 134217734 | OSPF SR hash node creation failed | OSPF segment routing node creation failed. | This is most likely a bug. If the problem persists, report it for troubleshooting. | | OSPF | HIGH | 134217735 | OSPF SR Invalid lsa id | OSPF segment routing invalid LSA ID. | Restart the OSPF instance. If the problem persists, report it for troubleshooting. | diff --git a/content/cumulus-linux-53/Monitoring-and-Troubleshooting/Simple-Network-Management-Protocol-SNMP/Configure-SNMP.md b/content/cumulus-linux-53/Monitoring-and-Troubleshooting/Simple-Network-Management-Protocol-SNMP/Configure-SNMP.md index dd765ddeea..b6a75a10d5 100644 --- a/content/cumulus-linux-53/Monitoring-and-Troubleshooting/Simple-Network-Management-Protocol-SNMP/Configure-SNMP.md +++ b/content/cumulus-linux-53/Monitoring-and-Troubleshooting/Simple-Network-Management-Protocol-SNMP/Configure-SNMP.md @@ -192,7 +192,7 @@ You can authenticate the user in the following ways: - With no authentication password (if you specify `auth-none`) - With an MD5 password -- With a SHA password +- With an SHA password {{< tabs "username" >}} {{< tab "NVUE Commands" >}} diff --git a/content/cumulus-linux-53/Monitoring-and-Troubleshooting/Simple-Network-Management-Protocol-SNMP/Supported-MIBs.md b/content/cumulus-linux-53/Monitoring-and-Troubleshooting/Simple-Network-Management-Protocol-SNMP/Supported-MIBs.md index d21dc3a382..6be386ff43 100644 --- a/content/cumulus-linux-53/Monitoring-and-Troubleshooting/Simple-Network-Management-Protocol-SNMP/Supported-MIBs.md +++ b/content/cumulus-linux-53/Monitoring-and-Troubleshooting/Simple-Network-Management-Protocol-SNMP/Supported-MIBs.md @@ -10,7 +10,7 @@ Below are the MIBs that Cumulus Linux supports, as well as suggested uses for th |
MIB Name | Suggested Uses | | -------- | -------------- | | {{}}
{{}}
{{}}
{{}} | You can enable FRR SNMP support to provide support for OSPF-MIB (RFC-1850), OSPFV3-MIB (RFC-5643), and BGP4-MIB (RFC-1657). | -| {{}} | Cumulus Linux also includes its own BGP unnumbered MIB for BGP unnumbered peers, defined in `/usr/share/snmp/mibs/Cumulus-BGPUN-MIB.txt`, which has the OID `1.3.6.1.4.1.40310.7`.| +| {{}} | Cumulus Linux also includes its own BGP unnumbered MIB for BGP unnumbered peers, defined in `/usr/share/snmp/mibs/Cumulus-BGPUN-MIB.txt`, which has the OID `1.3.6.1.4.1.40310.7`.| | {{}} | Discard counters: Cumulus Linux also includes its own counters MIB, defined in `/usr/share/snmp/mibs/Cumulus-Counters-MIB.txt`. It has the OID `.1.3.6.1.4.1.40310.2`. | | {{}} | Cumulus Linux includes its own resource utilization MIB, which is similar to using `cl-resource-query`. This MIB monitors layer 3 entries by host, route, nexthops, ECMP groups, and layer 2 MAC/BDPU entries. `/usr/share/snmp/mibs/Cumulus-Resource-Query-MIB.txt` defines this MIB, which has the OID `.1.3.6.1.4.1.40310.1`. | | {{}} | SNMP counters. For information on exposing CPU and memory information with SNMP, see this [knowledge base article]({{}}). | diff --git a/content/cumulus-linux-53/Monitoring-and-Troubleshooting/Troubleshooting-Network-Interfaces/Troubleshoot-Layer-1.md b/content/cumulus-linux-53/Monitoring-and-Troubleshooting/Troubleshooting-Network-Interfaces/Troubleshoot-Layer-1.md index 3b541932ad..c094340e7e 100644 --- a/content/cumulus-linux-53/Monitoring-and-Troubleshooting/Troubleshooting-Network-Interfaces/Troubleshoot-Layer-1.md +++ b/content/cumulus-linux-53/Monitoring-and-Troubleshooting/Troubleshooting-Network-Interfaces/Troubleshoot-Layer-1.md @@ -761,7 +761,7 @@ Because I2C problems can be very pernicious, often showing up again much later a To verify that an I2C failure is occurring, run `sudo tail -F /var/log/syslog` and look for `smbus` or `i2c` or `EEPROM read` errors that continue to appear or appear in bursts. -Based on the failure scenario when tyou discover the issue, choose when to address this issue; immediately or during a maintenance window. +Based on the failure scenario when you discover the issue, choose when to address this issue; immediately or during a maintenance window. - If traffic or the switch operates negatively and you cannot route traffic through a redundant network, you must do something immediately. - If you can route traffic around the failing switch, allowing troubleshooting to proceed on the failed switch, proceed to reroute traffic to find an appropriate time to troubleshoot the failing switch. diff --git a/content/cumulus-linux-53/Network-Virtualization/Ethernet-Virtual-Private-Network-EVPN/Basic-Configuration.md b/content/cumulus-linux-53/Network-Virtualization/Ethernet-Virtual-Private-Network-EVPN/Basic-Configuration.md index 3bc1e47072..7a89e69c79 100644 --- a/content/cumulus-linux-53/Network-Virtualization/Ethernet-Virtual-Private-Network-EVPN/Basic-Configuration.md +++ b/content/cumulus-linux-53/Network-Virtualization/Ethernet-Virtual-Private-Network-EVPN/Basic-Configuration.md @@ -70,7 +70,7 @@ cumulus@leaf01:~$ nv set vrf default router bgp neighbor swp51 address-family l2 cumulus@leaf01:~$ nv config apply ``` -You do not need enable the BGP control plane for all VNIs configured on the switch with NVUE with the `advertise-all-vni` option. FRR **is** aware of any local VNIs and MACs, and hosts (neighbors) associated with those VNIs. +You do not need to enable the BGP control plane for all VNIs configured on the switch with NVUE with the `advertise-all-vni` option. FRR **is** aware of any local VNIs and MACs, and hosts (neighbors) associated with those VNIs. After you run `nv config save`, the NVUE Commands create the following configuration snippet in the `/etc/nvue.d/startup.yaml` file: @@ -275,7 +275,7 @@ router bgp 65101 bgp router-id 10.10.10.1 neighbor swp51 interface remote-as external address-family l2vpn evpn -neighbor swp1 activate +neighbor swp51 activate advertise-all-vni ... ``` @@ -291,7 +291,7 @@ spine01(config)# router bgp 65199 spine01(config-router)# bgp router-id 10.10.10.101 spine01(config-router)# neighbor swp1 interface remote-as external spine01(config-router)# address-family l2vpn evpn -spine01(config-router-af)# neighbor swp51 activate +spine01(config-router-af)# neighbor swp1 activate spine01(config-router-af)# end spine01)# write memory spine01)# exit diff --git a/content/cumulus-linux-53/Network-Virtualization/VXLAN-Devices.md b/content/cumulus-linux-53/Network-Virtualization/VXLAN-Devices.md index 7e6d3ca9f2..d58e51c9ae 100644 --- a/content/cumulus-linux-53/Network-Virtualization/VXLAN-Devices.md +++ b/content/cumulus-linux-53/Network-Virtualization/VXLAN-Devices.md @@ -197,7 +197,7 @@ cumulus@leaf01:~$ ifreload -a ## Automatic VLAN to VNI Mapping -In an EVPN VXLAN environment, you need to map individual VLANs to VNIs. For a single VXLAN device, you can do this with a seperate NVUE command per VLAN; however, this can be cumbersome if you have to configure many VLANS or need to isolate tenants and reuse VLANs. To simplify the configuration, you can use these two commands instead: +In an EVPN VXLAN environment, you need to map individual VLANs to VNIs. For a single VXLAN device, you can do this with a separate NVUE command per VLAN; however, this can be cumbersome if you have to configure many VLANS or need to isolate tenants and reuse VLANs. To simplify the configuration, you can use these two commands instead: - `nv set bridge domain vlan vni auto` configures the specified VLANs to use automatic mapping. - `nv set bridge domain vlan-vni-offset` configures the offset you want to use for the VNIs. For example, if you specify an offset of 10000, the VNI is the VLAN plus 10000. diff --git a/content/cumulus-linux-53/System-Configuration/Authentication-Authorization-and-Accounting/LDAP-Authentication-and-Authorization.md b/content/cumulus-linux-53/System-Configuration/Authentication-Authorization-and-Accounting/LDAP-Authentication-and-Authorization.md index fbe8e4e8d7..64a23c02c6 100644 --- a/content/cumulus-linux-53/System-Configuration/Authentication-Authorization-and-Accounting/LDAP-Authentication-and-Authorization.md +++ b/content/cumulus-linux-53/System-Configuration/Authentication-Authorization-and-Accounting/LDAP-Authentication-and-Authorization.md @@ -57,10 +57,11 @@ Entering incorrect information during the installation process produces configur - Edit the `/etc/nslcd.conf` file to update the LDAP URI and search base DN (see {{}}, below). - Edit the `/etc/nssswitch.conf` file to update the service selections. -Be sure to restart `netd` after editing the files. +Restart `nvued.service` and `nginx-authenticator.service` after editing the files. ``` -cumulus@switch:~$ sudo systemctl restart netd.service +cumulus@switch:~$ sudo systemctl restart nvued.service +cumulus@switch:~$ sudo systemctl restart nginx-authenticator.service ``` {{< expand "Alternative Installation Method Using debconf-utils " >}} @@ -131,7 +132,7 @@ After installation, update the main configuration file (`/etc/nslcd.conf`) to ac This section documents some of the more important options that relate to security and queries. For details on all the available configuration options, read the {{}}. {{%notice note%}} -After first editing the `/etc/nslcd.conf` file and/or enabling LDAP in the `/etc/nsswitch.conf` file, you must restart `netd` with the `sudo systemctl restart netd` command. If you disable LDAP, you need to restart the `netd` service. +After editing the `/etc/nslcd.conf` file or enabling LDAP in the `/etc/nsswitch.conf` file, you must restart the NVUE and nginx-authenticator services with the `sudo systemctl restart nvued.service` command and the `sudo systemctl restart nginx-authenticator.service` command. If you disable LDAP, you must also restart these two services. {{%/notice%}} ### Connection diff --git a/content/cumulus-linux-53/System-Configuration/Authentication-Authorization-and-Accounting/RADIUS-AAA.md b/content/cumulus-linux-53/System-Configuration/Authentication-Authorization-and-Accounting/RADIUS-AAA.md index d12209dd9d..f5306769cf 100644 --- a/content/cumulus-linux-53/System-Configuration/Authentication-Authorization-and-Accounting/RADIUS-AAA.md +++ b/content/cumulus-linux-53/System-Configuration/Authentication-Authorization-and-Accounting/RADIUS-AAA.md @@ -31,7 +31,18 @@ During package installation: ## Configure the RADIUS Client -To configure the RADIUS client, edit the `/etc/pam_radius_auth.conf` file: +To configure the RADIUS client, edit the `/etc/pam_radius_auth.conf` file. + +{{%notice note%}} + +After editing the `/etc/pam_radius_auth.conf` file, you must restart both `nvued.service` and `nginx-authenticator.service`: + +``` +cumulus@switch:~$ sudo systemctl restart nvued.service +cumulus@switch:~$ sudo systemctl restart nginx-authenticator.service +``` + +{{%/notice%}} 1. Add the hostname or IP address of at least one RADIUS server (such as a *{{}}* server on Linux), and the shared secret used to authenticate and encrypt communication with each server. diff --git a/content/cumulus-linux-53/System-Configuration/Authentication-Authorization-and-Accounting/TACACS.md b/content/cumulus-linux-53/System-Configuration/Authentication-Authorization-and-Accounting/TACACS.md index 83d28024be..57f0456284 100644 --- a/content/cumulus-linux-53/System-Configuration/Authentication-Authorization-and-Accounting/TACACS.md +++ b/content/cumulus-linux-53/System-Configuration/Authentication-Authorization-and-Accounting/TACACS.md @@ -27,6 +27,17 @@ cumulus@switch:~$ sudo -E apt-get install tacplus-client ## Configure the TACACS+ Client +{{%notice note%}} + +After you configure TACACS+ settings, you must restart both `nvued.service` and `nginx-authenticator.service`: + +``` +cumulus@switch:~$ sudo systemctl restart nvued.service +cumulus@switch:~$ sudo systemctl restart nginx-authenticator.service +``` + +{{%/notice%}} + After installing TACACS+, edit the `/etc/tacplus_servers` file to add at least one server and one shared secret (key). You can specify the server and secret parameters in any order anywhere in the file. Whitespace (spaces or tabs) are not allowed. For example, if your TACACS+ server IP address is `192.168.0.30` and your shared secret is `tacacskey`, add these parameters to the `/etc/tacplus_servers` file: ``` @@ -127,10 +138,11 @@ The first `adduser` command prompts for information and a password. You can skip 3. Edit the `/etc/nsswitch.conf` file to add the keyword `tacplus` back to the line starting with `passwd` (the keyword you removed in the first step). -4. Restart the `nvued` service with the following command: +4. Restart the `nvued` service and the `nginx-authenticator` service with the following commands: ``` - cumulus@switch:~$ sudo systemctl restart nvued + cumulus@switch:~$ sudo systemctl restart nvued.service + cumulus@switch:~$ sudo systemctl restart nginx-authenticator.service ``` ## TACACS+ Accounting diff --git a/content/cumulus-linux-53/System-Configuration/Date-and-Time/Precision Time Protocol-PTP.md b/content/cumulus-linux-53/System-Configuration/Date-and-Time/Precision Time Protocol-PTP.md index 65c0774b17..9c89d218bc 100644 --- a/content/cumulus-linux-53/System-Configuration/Date-and-Time/Precision Time Protocol-PTP.md +++ b/content/cumulus-linux-53/System-Configuration/Date-and-Time/Precision Time Protocol-PTP.md @@ -236,7 +236,7 @@ Restarting the `switchd` service causes all network ports to reset in addition t network_transport UDPv4 ``` - For a trunk VLAN, add the VLAN configuration to the switch port stanza: set `l2_mode` to `trunk`, `vlan_intf` to the VLAN interface, and `src_ip` to the IP adress of the VLAN interface: + For a trunk VLAN, add the VLAN configuration to the switch port stanza: set `l2_mode` to `trunk`, `vlan_intf` to the VLAN interface, and `src_ip` to the IP address of the VLAN interface: ``` [swp1] @@ -249,7 +249,7 @@ Restarting the `switchd` service causes all network ports to reset in addition t network_transport UDPv4 ``` - For a switch port VLAN, add the VLAN configuration to the switch port stanza: set `l2_mode` to `access`, `vlan_intf` to the VLAN interface, and `src_ip` to the IP adress of the VLAN interface: + For a switch port VLAN, add the VLAN configuration to the switch port stanza: set `l2_mode` to `access`, `vlan_intf` to the VLAN interface, and `src_ip` to the IP address of the VLAN interface: ``` [swp2] @@ -515,7 +515,7 @@ To create a custom profile: - Update any of the profile settings you want to change (`announce-interval`, `delay-req-interval`, `priority1`, `sync-interval`, `announce-timeout`, `domain`, `priority2`, `transport`, `delay-mechanism`, `local-priority`). - Set the custom profile to be the current profile. -The following example commands create a custom profile called CUSTOM1 based on the predifined profile ITU 8275-1. The commands set the `domain` to 28 and the `announce-timeout` to 3, then set `CUSTOM1` to be the current profile: +The following example commands create a custom profile called CUSTOM1 based on the predefined profile ITU 8275-1. The commands set the `domain` to 28 and the `announce-timeout` to 3, then set `CUSTOM1` to be the current profile: ``` cumulus@switch:~$ nv set service ptp 1 profile CUSTOM1 @@ -529,7 +529,7 @@ cumulus@switch:~$ nv config apply {{< /tab >}} {{< tab "Linux Commands ">}} -The following example `/etc/ptp4l.conf` file creates a custom profile based on the predifined profile ITU 8275-1 and sets the `domain` to 28 and the `announce-timeout` to 3. +The following example `/etc/ptp4l.conf` file creates a custom profile based on the predefined profile ITU 8275-1 and sets the `domain` to 28 and the `announce-timeout` to 3. ``` cumulus@switch:~$ sudo nano /etc/ptp4l.conf @@ -1418,7 +1418,7 @@ Cumulus Linux monitors clock correction and path delay against thresholds, and g | ----- | ----------- | | `nv set service ptp monitor min-offset-threshold` | Sets the minimum difference allowed between the master and slave time. You can set a value between -1000000000 and 0 nanoseconds. The default value is -50 nanoseconds.| | `nv set service ptp monitor max-offset-threshold` | Sets the maximum difference allowed between the master and slave time. You can set a value between 0 and 1000000000 nanoseconds. The default value is 50 nanoseconds.| -| `nv set service ptp monitor path-delay-threshold` | Sets the mean time that PTP packets take to travel between the master and slave. You can set a value between 0 and 1000000000 nanoseconds . The default value is 200 nanoseconds. | +| `nv set service ptp monitor path-delay-threshold` | Sets the mean time that PTP packets take to travel between the master and slave. You can set a value between 0 and 1000000000 nanoseconds. The default value is 200 nanoseconds. | | `nv set service ptp monitor max-timestamp-entries` | Sets the maximum number of timestamp entries allowed. Cumulus Linux updates the timestamps continuously. You can specify a value between 100 and 200. The default value is 100 entries.| | `nv set service ptp monitor max-violation-log-sets` | Sets the maximum number of violation log sets allowed. You can specify a value between 2 and 4. The default value is 2 sets.| | `nv set service ptp monitor max-violation-log-entries` | Sets the maximum number of violation log entries allowed for each set. You can specify a value between 4 and 8. The default value is 8 entries.| @@ -1680,9 +1680,9 @@ The following example shows that there are no violations: cumulus@switch:~$ nv show service ptp 1 monitor violations operational applied description ---------------- ----------- ------- ----------------------------------------------- -last-max-offset Time at which last max offest violation occured -last-min-offset Time at which last min offest violation occured -last-path-delay Time at which last path delay violation occured +last-max-offset Time at which last max offest violation occurred +last-min-offset Time at which last min offest violation occurred +last-path-delay Time at which last path delay violation occurred max-offset-count 0 Number of maximum offset violations min-offset-count 0 Number of min offset violations path-delay-count 0 Number of Path delay violations diff --git a/content/cumulus-linux-53/System-Configuration/Netfilter-ACLs.md b/content/cumulus-linux-53/System-Configuration/Netfilter-ACLs.md index 45df752b7a..60215c4eb6 100644 --- a/content/cumulus-linux-53/System-Configuration/Netfilter-ACLs.md +++ b/content/cumulus-linux-53/System-Configuration/Netfilter-ACLs.md @@ -138,7 +138,7 @@ The incremental nonatomic update operation follows this order: 2. Cumulus Linux checks if the rules in a table are different from installation time; if a table does not have any changes, it does not reinstall the rules. 3. If there are changes in a table, the new rules populate in new groups or slices in hardware, then that table switches over to the new groups or slices. 4. Finally, old resources for that table free up. This process repeats for each of the tables listed above. -5. If there are isufficient resources to hold both the new rule set and old rule set, Cumulus Linux tries the regular nonatomic mode, which interrupts network traffic. +5. If there are insufficient resources to hold both the new rule set and old rule set, Cumulus Linux tries the regular nonatomic mode, which interrupts network traffic. 6. If the regular nonatomic update fails, Cumulus Linux reverts back to the previous rules. To always reload `switchd` with nonatomic updates: @@ -1313,7 +1313,7 @@ To work around this limitation, set the rate and burst for all these rules to th ### Where to Assign Rules - If you assign a switch port to a bond, you must assign any egress rules to the bond. -- When using the OUTPUT chain, you must assign rules to the source. For example, if you assign a rule to the switch port in the direction of traffic but the source is a bridge (VLAN), the rule does not affect the traffic and you must applied the rule to the bridge. +- When using the OUTPUT chain, you must assign rules to the source. For example, if you assign a rule to the switch port in the direction of traffic but the source is a bridge (VLAN), the rule does not affect the traffic and you must apply the rule to the bridge. - If you need to apply a rule to all transit traffic, use the FORWARD chain, not the OUTPUT chain. ### ACL Rule Installation Failure @@ -1332,7 +1332,7 @@ failed. Entity MIB
1.3.6.1.2.1.99 --> Entity Sensor MIB
1.3.6.1.2.1.23 --> rip2
1.3.6.1.2.1.2 --> interface/interfaces
1.3.6.1.2.1.31 --> ifMIB
1.3.6.1.2.1.4 --> IP
1.3.6.1.2.1.25 --> hostResource | 5.0.1-5.4.0 | 5.5.0-5.6.0| +| [3141826](#3141826)
| A slow memory leak (~5KB over 24 hour period at a 60 second polling interval) might occur in SNMP when you walk the following system MIB objects (1.3.6.1.2.1)
1.3.6.1.2.1.47 --> Entity MIB
1.3.6.1.2.1.99 --> Entity Sensor MIB
1.3.6.1.2.1.23 --> rip2
1.3.6.1.2.1.2 --> interface/interfaces
1.3.6.1.2.1.31 --> ifMIB
1.3.6.1.2.1.4 --> IP
1.3.6.1.2.1.25 --> hostResource | 5.0.1-5.6.0 | | | [3135952](#3135952)
| PAM4 split cables (such as 2x100G, 4x100G, and 4x50G) do not work with a forced speed setting (when auto-negotiation is off) as the default speed enabled is for NRZ mode (such as 100G_4X). To work around this issue, set the appropriate lanes for forced speed (with auto-negotation off) with the ethtool -s swpX speed autoneg off lanes command. For example:
cumulus@switch:~$ sudo ethtool -s swp1 speed 100000 autoneg off lanes 2
| 5.2.0-5.6.0 | | | [3122301](#3122301)
| On the NVIDIA SN4700 switch, inserting and removing the PSU might cause loss of frames. | 5.2.0-5.6.0 | | | [3115242](#3115242)
| When you configure two VNIs in the same VLAN, ifupdown2 shows a vlan added to two or more VXLANS warning, which is only issued after the VNI is already added to the bridge. This leaves the new VNI in the PVID even if there is already an existing VNI configured in that PVID. | 5.1.0-5.6.0 | | @@ -121,7 +124,6 @@ pdfhidden: True | [2891255](#2891255)
| CVE-2021-39925: Buffer overflow in the Bluetooth SDP dissector in Wireshark 3.4.0 to 3.4.9 and 3.2.0 to 3.2.17 allows denial of service via packet injection or crafted capture file
Vulnerable: <= 2.6.20-0+deb10u1Fixed: 2.6.20-0+deb10u2 | 4.0.0-4.4.1, 5.0.0-5.6.0 | 4.4.2-4.4.5| | [2890681](#2890681)
| CVE-2021-42771: relative path traversal in Babel, a set of tools for internationalising Python applications, could result in the execution of arbitrary code
Vulnerable: 2.6.0+dfsg.1-1Fixed: 2.6.0+dfsg.1-1+deb10u1 | 4.0.0-4.4.1, 5.0.0-5.6.0 | 4.4.2-4.4.5| | [2867042](#2867042)
| When connecting the NVIDIA SN4600 switch to another NVIDIA Spectrum switch, you must use auto-negotiation mode (not force mode); otherwise the switch might use the wrong Tx configuration. | 5.0.0-5.6.0 | | -| [2847919](#2847919)
| Configuring a router with the REST API through the switch front panel ports (swps) is supported in the default VRF only. To work around this issue, use the localHost IP address or the MGMT IP address to configure router using the Rest API. | 5.0.0-5.6.0 | | | [2847755](#2847755)
| When you use NCLU to remove the configuration for a peer that is a member of a group but also has other peer-specific configuration, you must remove the peer-specific configuration before you delete the peer in a separate NCLU commit. | 5.0.0-5.6.0 | | | [2823307](#2823307)
| Cumuls Linux does not support a bond with more than 64 ports. Any configuration with more than 64 ports in a bond changes all ports to down when you apply the configuration. | 5.0.0-5.6.0 | | | [2821929](#2821929)
| FRR restarts even when the NVUE configuration overwrite mode is set. | 5.0.0-5.3.1 | 5.4.0-5.6.0| @@ -142,16 +144,16 @@ pdfhidden: True | Issue ID | Description | Affects | Fixed | |--- |--- |--- |--- | -| [3647426](#3647426)
None | If BGP remote-as is set to an integer and you try to configure the local-as for a BGP instance, you see the following error:
% AS specified for local as is the same as the remote as and this is not allowed
This configuration is not allowed; it is considered to be eBGP and local preference is not advertised. | 5.0.0-5.5.1 | 5.6.0| +| [3647426](#3647426)
None | If BGP remote-as is set to an integer and you try to configure the local-as for a BGP instance, you see the following error:
% AS specified for local as is the same as the remote as and this is not allowed
This configuration is not allowed; it is considered to be eBGP and local preference is not advertised. | 5.0.0-5.5.1 | 4.3.2-4.4.5, 5.6.0| | [3585467](#3585467)
| NVUE and ip link show traditional bridge VLAN subinterface counts incorrectly. The ingress (Rx) count increments correctly but the egress (Tx) count does not increment. This issues occurs because the hardware does not support transmit counters for a VLAN subinterface; therefore, no statistics from the hardware are updated. Statistics for software forwarded packets show correctly. | 5.0.0-5.6.0 | | | [3576949](#3576949)
| When you run the NVUE nv set service snmp listening-address localhost vrf or nv set service snmp listening-address localhost-v6 vrf command to configure the SNMP listening address, Cumulus Linux applies the listening address to the default VRF instead of the VRF you specify. | 5.3.0-5.6.0 | | | [3562767](#3562767)
| ACLs do not process inbound DHCP packets and the packets do not contribute to ACL counters | 5.2.0-5.4.0 | 5.5.0-5.6.0| | [3560622](#3560622)
| When you configure a route distinguisher (RD) or a route target (RT) manually for layer 2 VNIs, type-1 routes are not properly updated, type-1 EVI routes with the old RD are not properly withdrawn, and type-1 ES routes do not have the corresponding layer 2 VNI route target updated. | 5.0.0-5.5.1 | 5.6.0| -| [3554231](#3554231)
None | CVE-2023-38408: The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009
Mitigation: Do not use ssh-agent forwarding (the man page for ssh_config says that "agent forwarding should be enabled with caution"), or start the ssh-agent program with the -P option to allow only specific PKCS#11 libraries (or none with -P '')
For Cumulus Linux 4.3.2, the /usr/bin/ssh-agent program has all permissions turned off (chmod 0) to prevent its execution if a vulnerable version is detected. | 4.0.0-4.4.5, 5.0.0-5.6.0 | | +| [3554231](#3554231)
None | CVE-2023-38408: The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009
Mitigation: Do not use ssh-agent forwarding (the man page for ssh_config says that "agent forwarding should be enabled with caution"), or start the ssh-agent program with the -P option to allow only specific PKCS#11 libraries (or none with -P '')
For Cumulus Linux 4.3.2, the /usr/bin/ssh-agent program has all permissions turned off (chmod 0) to prevent its execution if a vulnerable version is detected. | 4.0.0-4.3.1, 5.0.0-5.6.0 | 4.3.2-4.4.5| | [3541912](#3541912)
| Collecting a cl-support file in a high VNI and interface environment can result in an out-of-memory (OOM) event on the switch. An OOM event can cause critical services to restart and might impact traffic. | 5.1.0-5.5.1 | 5.6.0| | [3491259](#3491259)
| When BGP receives an EVPN type-5 route with a gateway IP overlay attribute, the gateway IP overlay attribute in the attr memory (which is already inserted in the attribute hash) might change. As a result, the modified attr memory might match with another attr in the attribute hash, which produces duplicate entries in the hash table. As a result, BGP might crash when deleting one of the duplicate attr structures. | 5.0.0-5.5.1 | 5.6.0| | [3488136](#3488136)
| When zebra receives route updates that include both a route with a recursive next hop and the route used to resolve that next hop, zebra might mark the route with the recursive next hop as inactive. To work around this issue, reprocess the route updates by running the appropriate clear command for the protocol in use. For example, for BGP, clear inbound routes from the relevant neighbor using the nv action clear vrf router bgp neighbor address-family in command. | 4.2.1-5.5.1 | 5.6.0| -| [3484058](#3484058)
| When you power on the NVIDIA SN3420 switch with no connected cables, the QSFP ports LEDs light in amber. | 5.3.0-5.4.0 | 5.5.0-5.6.0| +| [3484058](#3484058)
| When you power on the NVIDIA SN3420 switch with no connected cables, the QSFP ports LEDs light in amber. | 5.3.0-5.6.0 | | | [3479786](#3479786)
| The switchd service does not handle certain route and next hop updates, which causes a synchronization loop. For example, in a VRF route leaking configuration, where a next hop group spans across multiple VRFs, when one of the routes is withdrawn and the next hop is no longer used, switchd has problems synchronizing other next hops in the group
To work around this issue, disable next hop groups in zebra with the vtysh zebra nexthop proto only command, and then reboot the switch. | 5.3.0-5.5.1 | 5.6.0| | [3474391](#3474391)
| The SNMP MIB definition file /usr/share/snmp/mibs/Cumulus-BGPVRF-MIB.txt does not define the INDEX of the bgpPeerEntry correctly. This issue does not impact SNMP functionality for this MIB. | 4.3.1-5.5.1 | 5.6.0| | [3470941](#3470941)
None | On the NVIDIA SN4700 switch, reversing the upper four lanes on a port does not work and might cause link degradation. If you swap the upper and lower four lanes on a port, the firmware gets stuck. | 5.3.0-5.5.0 | 5.5.1-5.6.0| @@ -162,18 +164,18 @@ pdfhidden: True | [3429530](#3429530)
| On the Spectrum-2 and Spectrum-3 switch, multiple interfaces (in the same PLL quarter) might flap intermittently at the same time. | 4.2.1-5.4.0 | 5.5.0-5.6.0| | [3428677](#3428677)
| In certain cases, Cumulus Linux does not process next hop updates because the zebra IP routing manager thinks the state of the next hops is unchanged. As a result, route installation fails and remains in a rejected state. | 5.3.0-5.6.0 | | | [3424967](#3424967)
| sudo for TACACS+ users with privilege level 15 does not work when the TACACS+ server is to be reached through the default VRF (with vrf=default set in the /etc/tacplus_servers file). To work around this issue, specify the interface name that the default VRF uses in the vrf= setting of the /etc/tacplus_servers file or run the NVUE nv set system aaa tacacs vrf command. If you don't run either command, a TACACS+ user with privilege level 15 can run vrf task exec default sudo ... to execute the sudo command using the TACACS+ server on the default VRF. | 5.0.0-5.6.0 | | -| [3413827](#3413827)
None | During upgrade, when one MLAG node is upgraded and the other MLAG node is not yet upgraded, permanent neighbors cannot synchronize between MLAG nodes. The clagctl dumppermanentneighs command only shows local neighbors. | 5.0.0-5.4.0 | 5.5.0-5.6.0| +| [3413827](#3413827)
None | During upgrade, when one MLAG node is upgraded and the other MLAG node is not yet upgraded, permanent neighbors cannot synchronize between MLAG nodes. The clagctl dumppermanentneighs command only shows local neighbors. | 5.0.0-5.4.0 | 4.3.2-4.4.5, 5.5.0-5.6.0| | [3413785](#3413785)
| To reach the TACACS+ server through the default VRF, you must specify the egress interface you use in the default VRF. Either run the NVUE nv set system aaa tacacs vrf command (for example, nv set system aaa tacacs vrf swp51) or set the vrf= option in the /etc/tacplus_servers file (for example, vrf=swp51). A similar issue might prevent TACACS+ users with privilege level 15 from using sudo if the TACACS+ server is reachable only on the default VRF. If this occurs, and you do not run the above configuration workaround, the TACACS+ user with privilege level 15 can use vrf task exec default sudo ... to execute the sudo command using the TACACS+ server on the default VRF. | 5.0.0-5.5.1 | 5.6.0| | [3402935](#3402935)
None | For layer 3 interfaces configured on the switch, certain triggers, such as port flaps and subinterface flaps, or when configuring the ports to and from layer 2 and layer 3, cause the dummy internal VLAN to not free up, which can result in exhaustion of the dummy internal VLANs designated for the layer 3 interfaces. When this occurs, you see the following switchd log messages:
ERR dummy internal vlans exhaustedERR cannot allocate vlan for sub-interface
| 5.0.0-5.4.0 | 5.5.0-5.6.0| | [3388067](#3388067)
| TACACS+ packages in the local apt repository might be out of date; as a result, the upgrade does not install tacacs0 through tacacs15 users in the correct NVUE groups. When you run NVUE commands as a TACACS+ user, the commands fail and you see the error You do not have permission to execute that command
To obtain the correct packages, install the tacplus-client package and its dependencies from apt.cumulusnetworks.com. | 5.1.0-5.4.0 | 5.5.0-5.6.0| | [3379873](#3379873)
| apt source linux fails to download the Linux kernel source code. To work around this issue, run the sudo apt update && sudo apt install linux-source-5.10 command or download the desired version from https://apt.cumulusnetworks.com/repo/pool/cumulus/l/linux/ and install it with the sudo dpkg -i $filename command. The source code in a tar.xz file will then be located in the /usr/src/ directory. | 5.2.0-5.4.0 | 5.5.0-5.6.0| | [3368217](#3368217)
None | When daylight saving time changes, the MLAG initDelay timer resets and all MLAG bonds go down. | 4.4.4-4.4.5, 5.2.1-5.6.0 | | | [3351953](#3351953)
| In rare circumstances, attempting to install a Cumulus Linux 5.3 image can fail during installation. The device stops at the (initramfs) prompt. To resume installation, enter the exit command at the (initramfs) prompt. | 5.3.0-5.3.1 | 5.4.0-5.6.0| -| [3351951](#3351951)
None | Currently, the default core dump size limit on Cumulus Linux is 256M but the SDK generates core dumps around 800M. To avoid incomplete core files, you can increase the core dump size limit. | 4.2.1-5.3.1 | 5.4.0-5.6.0| +| [3351951](#3351951)
None | Currently, the default core dump size limit on Cumulus Linux is 256M but the SDK generates core dumps around 800M. To avoid incomplete core files, you can increase the core dump size limit. | 4.2.1-4.3.1, 4.4.0-5.3.1 | 4.3.2, 5.4.0-5.6.0| | [3351936](#3351936)
| Switch fans run at very high speed but the temperature is normal. | 5.2.0-5.3.1 | 5.4.0-5.6.0| | [3350789](#3350789)
| NVUE deprecated the port split command options (2x10G, 2x25G, 2x40G, 2x50G, 2x100G, 2x200G, 4x10G, 4x25G, 4x50G, 4x100G, 8x50G) with no backwards compatibility. | 5.0.0-5.4.0 | 5.5.0-5.6.0| | [3349207](#3349207)
| The switch does not learn MAC addresses from DHCP packets. When a DHCP enabled host is plugged in for the first time, it tries to obtain an IP address through DHCP. The switch does not learn the MAC address of the host when it receives these DHCP packets; therefore, the host MAC address is not updated in the local forwarding database and it does not get advertised across EVPN. The switch learns the MAC address when it receives other packets, such as ARP or ND from the host. To work around this issue, either configure a temporary IP address on the host to initiate ARP/ND or enable IPv6, which sends ND after link local address creation. | 5.2.0-5.4.0 | 5.5.0-5.6.0| -| [3347677](#3347677)
| In an MLAG configuration, when a link failure occurs on the peerlink or the peerlink shuts down, the switch in the secondary role attracts traffic to its local VTEP as it advertises the local VTEP IP address momentarily just before the VXLAN device is protodown. This traffic is dropped for a brief moment (between 5 and 10 seconds) because the MLAG bonds on the secondary switch are already protodown
In a proposed fix in the MR !226, we are not flapping the IP on vxlan device on secondary clag device on peerlink down trigger. This ensures smooth traffic flow and no convergence issue seen in system test bed with this fix. | 5.1.0-5.6.0 | | +| [3347677](#3347677)
| In an MLAG configuration, when a link failure occurs on the peerlink or the peerlink shuts down, the switch in the secondary role attracts traffic to its local VTEP as it advertises the local VTEP IP address momentarily just before the VXLAN device is protodown. This traffic is dropped for a brief moment (between 5 and 10 seconds) because the MLAG bonds on the secondary switch are already protodown. | 5.1.0-5.6.0 | | | [3340890](#3340890)
| When you run the NVUE nv show interface command, you see an error similar to the following:
Error: GET /nvue_v1/interface/swp45?rev=operational responded with 500 INTERNAL SERVER ERROR
| 5.3.0-5.4.0 | 5.5.0-5.6.0| | [3339336](#3339336)
| The ethtool -m command does not show Digital Optical Monitoring (DOM) for SFP transceivers. To work around this issue, run the l1-show or mlxlink command instead. | 5.2.0-5.3.1 | 5.4.0-5.6.0| | [3334275](#3334275)
| The sensors.conf files in Cumulus Linux are out of date. | 5.2.0-5.6.0 | | @@ -189,6 +191,7 @@ pdfhidden: True | [3301950](#3301950)
| When upgrading from Cumulus Linux 5.0.0 thru 5.2.1 to Cumulus Linux 5.3.0 or 5.3.1, the babeltrace and python3-babeltrace packages are not added automatically even though they are in the default image in Cumulus Linux 5.3.0 and later. You may need these packages to decode LTTNG traces with /usr/lib/frr/frr_babeltrace.py.. If you need to use this script, run the sudo apt update && sudo apt install babeltrace python3-babeltrace command to install the packages. | 5.3.0-5.3.1 | 5.4.0-5.6.0| | [3298616](#3298616)
| NVUE gracefully detects and handles upgrades that include valid flexible snippets. For any invalid (incompatible) flexible snippets, you must delete the snippets before you apt upgrade Cumulus Linux; otherwise, the NVUE nv config apply command and the equivalent REST API, do not run. | 5.3.0-5.3.1 | 5.4.0-5.6.0| | [3296715](#3296715)
| When you clear interface counters with the ethtool -S clear command, the command fails with the following message:
switch:~$ ethtool -S swp1 clearethtool (-S): unknown parameter 'clear'
| 5.2.0-5.3.1 | 5.4.0-5.6.0| +| [3293114](#3293114)
| In Cumulus Linux 5.4 and earlier, the command to enable Neighbor Discovery (ND) router advertisement is inverted and causes confusion; nv set interface ip neighbor-discovery router-advertisement enable off. In Cumulus Linux 5.5 and later, the command to enable router advertisement is updated to nv set interface ip neighbor-discovery router-advertisement enable on. | 5.3.0-5.5.1 | 5.6.0| | [3293039](#3293039)
| When you add the /etc/frr/frr.conf file to the ignore list for NVUE, any configuration change causes FRR to restart because a check is done to see if any running configuration has changed since the previously applied configuration in the vtysh shell. | 5.3.0-5.3.1 | 5.4.0-5.6.0| | [3292773](#3292773)
| NVUE requires the SNMPv2 community string to be a minimum of eight characters. | 5.3.0-5.3.1 | 5.4.0-5.6.0| | [3289972](#3289972)
None | When the switch needs to forward a frame that has a source MAC address of 00:00:00:00:00:00, the dmesg log might report the message bridge: RTM_NEWNEIGH with invalid ether address in a loop every 30 seconds. The log message is harmless and frames with that MAC forward correctly. | 5.3.0-5.3.1 | 5.4.0-5.6.0| @@ -206,7 +209,7 @@ pdfhidden: True | [3234814](#3234814)
| With double tagged QinQ interfaces, if the bridge corresponding to the QinQ interface flaps, you might see invalid learning notifications and errors from similar to the following:
Can't set non-static MAC address for non-vPort 0x0001006B when VID is VFID. 
| 5.3.0-5.4.0 | 5.5.0-5.6.0| | [3226525](#3226525)
| When using TACACS+, if you configure per-command authorization with the tacplus-restrict command, NVUE configuration commands fail for any user with a privilege level lower than 15. This occurs because NVUE is not able to create a .local user directory. | 5.2.0-5.3.1 | 5.4.0-5.6.0| | [3226506](#3226506)
| The l1-show eth0 command does not show port information and is not supported in this release. | 5.3.0-5.6.0 | | -| [3221628](#3221628)
| Cumulus Linux 5.2.0 and 5.2.1 VX images might include an incorrect entry at the end of /etc/apt/sources.list, which produces warnings when you run apt update. Remove this entry to avoid these warnings. | 5.2.0-5.6.0 | | +| [3221628](#3221628)
| Cumulus Linux VX images might include an incorrect entry at the end of /etc/apt/sources.list, which produces warnings when you run apt update. Remove this entry to avoid these warnings. | 5.2.0-5.6.0 | | | [3187469](#3187469)
| At high scale with 160 VRFs and 10 VLANs per VRF (a total of 1600 VLANs), you see traffic loss during primary switch reboot. To work around this issue, reduce the scale to 40 VRFs with no more than 400 VLANs in the configuration, and use a common MAC address. | 5.1.0-5.5.1 | 5.6.0| | [3178090](#3178090)
| The cl-support generation script causes TC filter collection to run as a background process for each interface, which can lead to memory exhaustion on a high scale configuration and on a switch with a small memory footprint. | 5.1.0-5.5.1 | 5.6.0| | [3172682](#3172682)
| On rare occasions, when you query the system hostname through the hostnamctl application, you see a timeout. NVUE uses the hostnamctl application to determine the system hostname, which can result in an nv config apply command failure. | 5.2.0-5.5.1 | 5.6.0| @@ -217,7 +220,7 @@ pdfhidden: True | [3145204](#3145204)
| On the NVIDIA Spectrum-1 switch, the nv show system forwarding command shows GTP hashing output, which is not supported on this switch. | 5.2.0-5.4.0 | 5.5.0-5.6.0| | [3144740](#3144740)
| The /var/lib/snmp/snmpd.conf file contains multiple Warning: Unknown token: ifXTable messages. To avoid these warnings, add the -noTokenWarnings option to the SNMPDOPTS variable in the /etc/defaults/snmpd file, then restart the snmpd service. | 5.2.0-5.4.0 | 5.5.0-5.6.0| | [3142615](#3142615)
| The BGP4-MIB.txt file is missing from Net-SNMP agent. | 5.0.0-5.4.0 | 5.5.0-5.6.0| -| [3141826](#3141826)
| A slow memory leak (~5KB over 24 hour period at a 60 second polling interval) might occur in SNMP when you walk the following system MIB objects (1.3.6.1.2.1)
1.3.6.1.2.1.47 --> Entity MIB
1.3.6.1.2.1.99 --> Entity Sensor MIB
1.3.6.1.2.1.23 --> rip2
1.3.6.1.2.1.2 --> interface/interfaces
1.3.6.1.2.1.31 --> ifMIB
1.3.6.1.2.1.4 --> IP
1.3.6.1.2.1.25 --> hostResource | 5.0.1-5.4.0 | 5.5.0-5.6.0| +| [3141826](#3141826)
| A slow memory leak (~5KB over 24 hour period at a 60 second polling interval) might occur in SNMP when you walk the following system MIB objects (1.3.6.1.2.1)
1.3.6.1.2.1.47 --> Entity MIB
1.3.6.1.2.1.99 --> Entity Sensor MIB
1.3.6.1.2.1.23 --> rip2
1.3.6.1.2.1.2 --> interface/interfaces
1.3.6.1.2.1.31 --> ifMIB
1.3.6.1.2.1.4 --> IP
1.3.6.1.2.1.25 --> hostResource | 5.0.1-5.6.0 | | | [3135952](#3135952)
| PAM4 split cables (such as 2x100G, 4x100G, and 4x50G) do not work with a forced speed setting (when auto-negotiation is off) as the default speed enabled is for NRZ mode (such as 100G_4X). To work around this issue, set the appropriate lanes for forced speed (with auto-negotation off) with the ethtool -s swpX speed autoneg off lanes command. For example:
cumulus@switch:~$ sudo ethtool -s swp1 speed 100000 autoneg off lanes 2
| 5.2.0-5.6.0 | | | [3122301](#3122301)
| On the NVIDIA SN4700 switch, inserting and removing the PSU might cause loss of frames. | 5.2.0-5.6.0 | | | [3115242](#3115242)
| When you configure two VNIs in the same VLAN, ifupdown2 shows a vlan added to two or more VXLANS warning, which is only issued after the VNI is already added to the bridge. This leaves the new VNI in the PVID even if there is already an existing VNI configured in that PVID. | 5.1.0-5.6.0 | | @@ -241,7 +244,6 @@ pdfhidden: True | [2891255](#2891255)
| CVE-2021-39925: Buffer overflow in the Bluetooth SDP dissector in Wireshark 3.4.0 to 3.4.9 and 3.2.0 to 3.2.17 allows denial of service via packet injection or crafted capture file
Vulnerable: <= 2.6.20-0+deb10u1Fixed: 2.6.20-0+deb10u2 | 4.0.0-4.4.1, 5.0.0-5.6.0 | 4.4.2-4.4.5| | [2890681](#2890681)
| CVE-2021-42771: relative path traversal in Babel, a set of tools for internationalising Python applications, could result in the execution of arbitrary code
Vulnerable: 2.6.0+dfsg.1-1Fixed: 2.6.0+dfsg.1-1+deb10u1 | 4.0.0-4.4.1, 5.0.0-5.6.0 | 4.4.2-4.4.5| | [2867042](#2867042)
| When connecting the NVIDIA SN4600 switch to another NVIDIA Spectrum switch, you must use auto-negotiation mode (not force mode); otherwise the switch might use the wrong Tx configuration. | 5.0.0-5.6.0 | | -| [2847919](#2847919)
| Configuring a router with the REST API through the switch front panel ports (swps) is supported in the default VRF only. To work around this issue, use the localHost IP address or the MGMT IP address to configure router using the Rest API. | 5.0.0-5.6.0 | | | [2847755](#2847755)
| When you use NCLU to remove the configuration for a peer that is a member of a group but also has other peer-specific configuration, you must remove the peer-specific configuration before you delete the peer in a separate NCLU commit. | 5.0.0-5.6.0 | | | [2823307](#2823307)
| Cumuls Linux does not support a bond with more than 64 ports. Any configuration with more than 64 ports in a bond changes all ports to down when you apply the configuration. | 5.0.0-5.6.0 | | | [2821929](#2821929)
| FRR restarts even when the NVUE configuration overwrite mode is set. | 5.0.0-5.3.1 | 5.4.0-5.6.0| @@ -256,7 +258,7 @@ pdfhidden: True |--- |--- |--- | | [3255948](#3255948)
| When you upgrade from Cumulus Linux 5.0.0-5.1.0 to Cumulus Linux 5.2.0 or 5.2.1, warm or fast boot fails. Use regular reboot or csmgrctl -c in this case. | 5.2.0-5.2.1 | | | [3235368](#3235368)
| When you try to configure VRF route leaking between many VRFs using multiple NCLU commands before running the net commit command, the commit fails. To work around this issue, configure VRF leaking one command at a time and run net commit after each command. | 4.4.4-5.2.1 | | -| [3231330](#3231330)
None | If BGP neighbor allowas-in is set, negating with no no neighbor allowas-in does not disable the setting. To work around this issue and disable the setting, restart the FRR service. | 4.2.1-5.2.1 | | +| [3231330](#3231330)
None | If BGP neighbor allowas-in is set, negating with no no neighbor allowas-in does not disable the setting. To work around this issue and disable the setting, restart the FRR service. | 4.2.1-4.3.1 | | | [3228856](#3228856)
None | If you have a lot of inbound route maps that match lists with many regex statements, a large number of updates from the peer can cause the system to run out of memory. To work around this issue, reduce the number of regex matches in inbound route maps. | 4.4.0-5.2.1 | | | [3228690](#3228690)
| When you configure a routing policy multiple times in NVUE with a match evpn default-route statement, the bgpd daemon terminates. | | | | [3227905](#3227905)
| PTP forced master mode does not work. To work around this issue, change masterOnly to serverOnly in the /etc/ptp4l.conf file. | 5.2.0-5.2.1 | | @@ -277,7 +279,7 @@ pdfhidden: True | [3202401](#3202401)
| The ethtool -m command and the NVUE nv show interface pluggable command do not show the VPD for optical modules and AOCs (OUI, vendor name, part number, or revision serial number). | 5.2.0-5.2.1 | | | [3200373](#3200373)
| After rebooting the switch, the IPv6 link local address for an SVI that belongs to non-default VRF is missing, and doesn't show on the switch. To resolve this issue, run the ifreload -a command. | 5.0.0-5.2.1 | | | [3196774](#3196774)
| In an EVPN configuration, after closing a BGP session on an EVPN peer, the VTEP RMAC is deleted and the hosts lose reachability to each other. To work around this issue, restart FRR or add a static RMAC entry to bridge FDB. | 5.2.0-5.2.1 | | -| [3192808](#3192808)
None | When the switch receives an LLDP frame from a Cisco router right after a ptmd restart, the ptmd service crashes. | 4.3.0-5.2.1 | | +| [3192808](#3192808)
None | When the switch receives an LLDP frame from a Cisco router right after a ptmd restart, the ptmd service crashes. | 4.3.0-4.3.1, 4.4.0-5.2.1 | | | [3188576](#3188576)
| IPv6 messages fill the /var/log/frr/frr.log files and logrotate is unable to clean up the old log files. As a result, a significant number of log files are never deleted, which fill up the file system. | 5.2.0-5.2.1 | | | [3187408](#3187408)
| Certain NUE commands produce an Invalid Command error. For example:
cumulus@switch:~$ nv set vrf default router bgp peer-group SPINE password CumulusLinux!Invalid Command: set vrf default router bgp peer-group SPINE password CumulusLinux!cumulus@switch:~$ nv set router policy route-map GLOBAL rule 10 description globalInvalid Command: set router policy route-map GLOBAL rule 10 description global
| 5.2.0-5.2.1 | | | [3180043](#3180043)
| The EVPN Multihoming ESI configuration command nv set interface evpn multihoming segment identifier does not work. | 5.1.0-5.2.1 | | diff --git a/content/cumulus-linux-53/rn.xml b/content/cumulus-linux-53/rn.xml index 72fa7e02df..cafd8b804a 100644 --- a/content/cumulus-linux-53/rn.xml +++ b/content/cumulus-linux-53/rn.xml @@ -7,6 +7,12 @@ Fixed +3663182 +Changing non-default BGP timers with NCLU or vtysh commands sets the hold time and keep alive interval to 0 seconds. To work around this issue, restart the FRR service with the {{sudo systemctl restart frr.service}} command. +5.3.1-5.6.0 + + + 3647426 If BGP {{remote-as}} is set to an integer and you try to configure the {{local-as}} for a BGP instance, you see the following error: @@ -14,7 +20,7 @@ This configuration is not allowed; it is considered to be eBGP and local preference is not advertised. 5.0.0-5.5.1 -5.6.0 +4.3.2-4.4.5, 5.6.0 3585467 @@ -23,6 +29,16 @@ This configuration is not allowed; it is considered to be eBGP and local prefere +3580435 +On the NVIDIA SN2410 switch with an Innodisk SSD, you might see the following message in syslog: + +smartd[501]: Device: /dev/sda [SAT], CHECK POWER STATUS spins up disk (0x00 -> 0xff) + +This is a cosmetic issue and does not affect how the switch operates. To prevent this message from occurring, run the {{hdparm -S 24 /dev/sda}} command to change the HD timeout. +5.3.1-5.6.0 + + + 3576949 When you run the NVUE {{nv set service snmp listening-address localhost vrf <vrf-name>}} or {{nv set service snmp listening-address localhost-v6 vrf <vrf-name>}} command to configure the SNMP listening address, Cumulus Linux applies the listening address to the default VRF instead of the VRF you specify. 5.3.0-5.6.0 @@ -57,8 +73,8 @@ This configuration is not allowed; it is considered to be eBGP and local prefere CVE-2023-38408: The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009. Mitigation: Do not use ssh-agent forwarding (the man page for ssh_config says that "agent forwarding should be enabled with caution"), or start the ssh-agent program with the -P option to allow only specific PKCS#11 libraries (or none with -P ''). For Cumulus Linux 4.3.2, the /usr/bin/ssh-agent program has all permissions turned off (chmod 0) to prevent its execution if a vulnerable version is detected. -4.0.0-4.4.5, 5.0.0-5.6.0 - +4.0.0-4.3.1, 5.0.0-5.6.0 +4.3.2-4.4.5 3541912 @@ -99,8 +115,8 @@ For Cumulus Linux 4.3.2, the /usr/bin/ssh-agent program has all permissions turn 3484058 When you power on the NVIDIA SN3420 switch with no connected cables, the QSFP ports LEDs light in amber. -5.3.0-5.4.0 -5.5.0-5.6.0 +5.3.0-5.6.0 + 3479786 @@ -174,7 +190,7 @@ To work around this issue, disable next hop groups in zebra with the vtysh {{zeb 3413827 During upgrade, when one MLAG node is upgraded and the other MLAG node is not yet upgraded, permanent neighbors cannot synchronize between MLAG nodes. The {{clagctl dumppermanentneighs}} command only shows local neighbors. 5.0.0-5.4.0 -5.5.0-5.6.0 +4.3.2-4.4.5, 5.5.0-5.6.0 3413785 @@ -243,8 +259,8 @@ To obtain the correct packages, install the {{tacplus-client}} package and its d 3351951 Currently, the default core dump size limit on Cumulus Linux is 256M but the SDK generates core dumps around 800M. To avoid incomplete core files, you can increase the core dump size limit. -4.2.1-5.3.1 -5.4.0-5.6.0 +4.2.1-4.3.1, 4.4.0-5.3.1 +4.3.2, 5.4.0-5.6.0 3351936 @@ -266,9 +282,7 @@ To obtain the correct packages, install the {{tacplus-client}} package and its d 3347677 -In an MLAG configuration, when a link failure occurs on the peerlink or the peerlink shuts down, the switch in the secondary role attracts traffic to its local VTEP as it advertises the local VTEP IP address momentarily just before the VXLAN device is protodown. This traffic is dropped for a brief moment (between 5 and 10 seconds) because the MLAG bonds on the secondary switch are already protodown. - -In a proposed fix in the MR !226, we are not flapping the IP on vxlan device on secondary clag device on peerlink down trigger. This ensures smooth traffic flow and no convergence issue seen in system test bed with this fix. +In an MLAG configuration, when a link failure occurs on the peerlink or the peerlink shuts down, the switch in the secondary role attracts traffic to its local VTEP as it advertises the local VTEP IP address momentarily just before the VXLAN device is protodown. This traffic is dropped for a brief moment (between 5 and 10 seconds) because the MLAG bonds on the secondary switch are already protodown. 5.1.0-5.6.0 @@ -364,6 +378,12 @@ ethtool (-S): unknown parameter 'clear' 5.4.0-5.6.0 +3293114 +In Cumulus Linux 5.4 and earlier, the command to enable Neighbor Discovery (ND) router advertisement is inverted and causes confusion; {{nv set interface <interface> ip neighbor-discovery router-advertisement enable off}}. In Cumulus Linux 5.5 and later, the command to enable router advertisement is updated to {{nv set interface <interface> ip neighbor-discovery router-advertisement enable on}}. +5.3.0-5.5.1 +5.6.0 + + 3293039 When you add the {{/etc/frr/frr.conf}} file to the ignore list for NVUE, any configuration change causes FRR to restart because a check is done to see if any running configuration has changed since the previously applied configuration in the vtysh shell. 5.3.0-5.3.1 @@ -480,7 +500,7 @@ Can't set non-static MAC address for non-vPort 0x0001006B when VID is VFID. 3221628 -Cumulus Linux 5.2.0 and 5.2.1 VX images might include an incorrect entry at the end of {{/etc/apt/sources.list}}, which produces warnings when you run {{apt update}}. Remove this entry to avoid these warnings. +Cumulus Linux VX images might include an incorrect entry at the end of {{/etc/apt/sources.list}}, which produces warnings when you run {{apt update}}. Remove this entry to avoid these warnings. 5.2.0-5.6.0 @@ -561,8 +581,8 @@ The {{/var/lib/snmp/snmpd.conf}} file contains multiple {{Warning: Unknown token 1.3.6.1.2.1.31 --> ifMIB 1.3.6.1.2.1.4 --> IP 1.3.6.1.2.1.25 --> hostResource -5.0.1-5.4.0 -5.5.0-5.6.0 +5.0.1-5.6.0 + 3135952 @@ -715,12 +735,6 @@ Fixed: 2.6.0+dfsg.1-1+deb10u1 -2847919 -Configuring a router with the REST API through the switch front panel ports (swps) is supported in the default VRF only. To work around this issue, use the localHost IP address or the MGMT IP address to configure router using the Rest API. -5.0.0-5.6.0 - - - 2847755 When you use NCLU to remove the configuration for a peer that is a member of a group but also has other peer-specific configuration, you must remove the peer-specific configuration before you delete the peer in a separate NCLU commit. 5.0.0-5.6.0 @@ -808,7 +822,7 @@ You can safely ignore this warning. This configuration is not allowed; it is considered to be eBGP and local preference is not advertised. 5.0.0-5.5.1 -5.6.0 +4.3.2-4.4.5, 5.6.0 3585467 @@ -839,8 +853,8 @@ This configuration is not allowed; it is considered to be eBGP and local prefere CVE-2023-38408: The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009. Mitigation: Do not use ssh-agent forwarding (the man page for ssh_config says that "agent forwarding should be enabled with caution"), or start the ssh-agent program with the -P option to allow only specific PKCS#11 libraries (or none with -P ''). For Cumulus Linux 4.3.2, the /usr/bin/ssh-agent program has all permissions turned off (chmod 0) to prevent its execution if a vulnerable version is detected. -4.0.0-4.4.5, 5.0.0-5.6.0 - +4.0.0-4.3.1, 5.0.0-5.6.0 +4.3.2-4.4.5 3541912 @@ -863,8 +877,8 @@ For Cumulus Linux 4.3.2, the /usr/bin/ssh-agent program has all permissions turn 3484058 When you power on the NVIDIA SN3420 switch with no connected cables, the QSFP ports LEDs light in amber. -5.3.0-5.4.0 -5.5.0-5.6.0 +5.3.0-5.6.0 + 3479786 @@ -932,7 +946,7 @@ To work around this issue, disable next hop groups in zebra with the vtysh {{zeb 3413827 During upgrade, when one MLAG node is upgraded and the other MLAG node is not yet upgraded, permanent neighbors cannot synchronize between MLAG nodes. The {{clagctl dumppermanentneighs}} command only shows local neighbors. 5.0.0-5.4.0 -5.5.0-5.6.0 +4.3.2-4.4.5, 5.5.0-5.6.0 3413785 @@ -978,8 +992,8 @@ To obtain the correct packages, install the {{tacplus-client}} package and its d 3351951 Currently, the default core dump size limit on Cumulus Linux is 256M but the SDK generates core dumps around 800M. To avoid incomplete core files, you can increase the core dump size limit. -4.2.1-5.3.1 -5.4.0-5.6.0 +4.2.1-4.3.1, 4.4.0-5.3.1 +4.3.2, 5.4.0-5.6.0 3351936 @@ -1001,9 +1015,7 @@ To obtain the correct packages, install the {{tacplus-client}} package and its d 3347677 -In an MLAG configuration, when a link failure occurs on the peerlink or the peerlink shuts down, the switch in the secondary role attracts traffic to its local VTEP as it advertises the local VTEP IP address momentarily just before the VXLAN device is protodown. This traffic is dropped for a brief moment (between 5 and 10 seconds) because the MLAG bonds on the secondary switch are already protodown. - -In a proposed fix in the MR !226, we are not flapping the IP on vxlan device on secondary clag device on peerlink down trigger. This ensures smooth traffic flow and no convergence issue seen in system test bed with this fix. +In an MLAG configuration, when a link failure occurs on the peerlink or the peerlink shuts down, the switch in the secondary role attracts traffic to its local VTEP as it advertises the local VTEP IP address momentarily just before the VXLAN device is protodown. This traffic is dropped for a brief moment (between 5 and 10 seconds) because the MLAG bonds on the secondary switch are already protodown. 5.1.0-5.6.0 @@ -1108,6 +1120,12 @@ ethtool (-S): unknown parameter 'clear' 5.4.0-5.6.0 +3293114 +In Cumulus Linux 5.4 and earlier, the command to enable Neighbor Discovery (ND) router advertisement is inverted and causes confusion; {{nv set interface <interface> ip neighbor-discovery router-advertisement enable off}}. In Cumulus Linux 5.5 and later, the command to enable router advertisement is updated to {{nv set interface <interface> ip neighbor-discovery router-advertisement enable on}}. +5.3.0-5.5.1 +5.6.0 + + 3293039 When you add the {{/etc/frr/frr.conf}} file to the ignore list for NVUE, any configuration change causes FRR to restart because a check is done to see if any running configuration has changed since the previously applied configuration in the vtysh shell. 5.3.0-5.3.1 @@ -1224,7 +1242,7 @@ Can't set non-static MAC address for non-vPort 0x0001006B when VID is VFID. 3221628 -Cumulus Linux 5.2.0 and 5.2.1 VX images might include an incorrect entry at the end of {{/etc/apt/sources.list}}, which produces warnings when you run {{apt update}}. Remove this entry to avoid these warnings. +Cumulus Linux VX images might include an incorrect entry at the end of {{/etc/apt/sources.list}}, which produces warnings when you run {{apt update}}. Remove this entry to avoid these warnings. 5.2.0-5.6.0 @@ -1305,8 +1323,8 @@ The {{/var/lib/snmp/snmpd.conf}} file contains multiple {{Warning: Unknown token 1.3.6.1.2.1.31 --> ifMIB 1.3.6.1.2.1.4 --> IP 1.3.6.1.2.1.25 --> hostResource -5.0.1-5.4.0 -5.5.0-5.6.0 +5.0.1-5.6.0 + 3135952 @@ -1459,12 +1477,6 @@ Fixed: 2.6.0+dfsg.1-1+deb10u1 -2847919 -Configuring a router with the REST API through the switch front panel ports (swps) is supported in the default VRF only. To work around this issue, use the localHost IP address or the MGMT IP address to configure router using the Rest API. -5.0.0-5.6.0 - - - 2847755 When you use NCLU to remove the configuration for a peer that is a member of a group but also has other peer-specific configuration, you must remove the peer-specific configuration before you delete the peer in a separate NCLU commit. 5.0.0-5.6.0 @@ -1536,7 +1548,7 @@ You can safely ignore this warning. 3231330 If BGP {{neighbor <name> allowas-in}} is set, negating with no {{no neighbor <name> allowas-in}} does not disable the setting. To work around this issue and disable the setting, restart the FRR service. -4.2.1-5.2.1 +4.2.1-4.3.1 3228856 @@ -1645,7 +1657,7 @@ Packet size is larger than router interface MTU – Validate the router interfac 3192808 When the switch receives an LLDP frame from a Cisco router right after a {{ptmd}} restart, the {{ptmd}} service crashes. -4.3.0-5.2.1 +4.3.0-4.3.1, 4.4.0-5.2.1 3188576 diff --git a/content/cumulus-linux-54/Installation-Management/Installing-a-New-Cumulus-Linux-Image.md b/content/cumulus-linux-54/Installation-Management/Installing-a-New-Cumulus-Linux-Image.md index 80bbab0f7f..be1b20dc9a 100644 --- a/content/cumulus-linux-54/Installation-Management/Installing-a-New-Cumulus-Linux-Image.md +++ b/content/cumulus-linux-54/Installation-Management/Installing-a-New-Cumulus-Linux-Image.md @@ -323,7 +323,7 @@ You can run several installer command line options from ONIE to perform basic sw - Execute a ZTP script to perform necessary configuration {{%notice note%}} -The `onie-nos-install` command does *not* allow you specify command line parameters. You must access the switch from the console and transfer a disk image to the switch. You must then make the disk image executable and install the image directly from the ONIE command line with the options you want to use. +The `onie-nos-install` command does *not* allow you to specify command line parameters. You must access the switch from the console and transfer a disk image to the switch. You must then make the disk image executable and install the image directly from the ONIE command line with the options you want to use. The following example commands transfer a disk image to the switch, make the image executable, and install the image with the `--password` option to change the default cumulus user password: diff --git a/content/cumulus-linux-54/Layer-1-and-Switch-Ports/DHCP/DHCP-Relays.md b/content/cumulus-linux-54/Layer-1-and-Switch-Ports/DHCP/DHCP-Relays.md index 86f5889928..207c9a5887 100644 --- a/content/cumulus-linux-54/Layer-1-and-Switch-Ports/DHCP/DHCP-Relays.md +++ b/content/cumulus-linux-54/Layer-1-and-Switch-Ports/DHCP/DHCP-Relays.md @@ -103,7 +103,7 @@ cumulus@leaf01:~$ nv config apply ## Optional Configuration -This section describes optional DHCP relay configuration. The steps provided in this section assume that you already done basic DHCP relay configuration, described above. +This section describes optional DHCP relay configurations. The steps provided in this section assume that you have already configured basic DHCP relay, as described above. ### DHCP Agent Information Option (Option 82) diff --git a/content/cumulus-linux-54/Layer-1-and-Switch-Ports/DHCP/DHCP-Snooping.md b/content/cumulus-linux-54/Layer-1-and-Switch-Ports/DHCP/DHCP-Snooping.md new file mode 100644 index 0000000000..8454c280ef --- /dev/null +++ b/content/cumulus-linux-54/Layer-1-and-Switch-Ports/DHCP/DHCP-Snooping.md @@ -0,0 +1,91 @@ +--- +title: DHCP Snooping +author: NVIDIA +weight: 355 +toc: 3 +--- +DHCP snooping enables Cumulus Linux to act as a middle layer between the DHCP infrastructure and DHCP clients by scanning DHCP control packets and building an IP-MAC database. Cumulus Linux accepts DHCP offers from only trusted interfaces and can rate limit packets. + +{{%notice note%}} +DHCP option 82 processing is not supported. +{{%/notice%}} + +## Configure DHCP Snooping + +To configure DHCP snooping, you need to: + +- Enable DHCP snooping on a VLAN. +- Add a trusted interface. Cumulus Linux allows DHCP offers from only trusted interfaces to prevent malicious DHCP servers from assigning IP addresses inside the network. The interface must be a member of the bridge specified. +- Set the rate limit for DHCP requests to avoid DoS attacks. The default value is 100 packets per second. + +The following example shows you how to configure DHCP snooping for IPv4 and IPv6. + +{{%notice note%}} +NVUE does not provide commands to configure DHCP Snooping. +{{%/notice%}} + +Create the `/etc/dhcpsnoop/dhcp_snoop.json` file and add DHCP snooping configuration under the bridge. + +The following example enables DHCP snooping for IPv4 on VLAN 10, sets the rate limit to 50 and the trusted interface to swp3. swp3 is a member of the bridge `br_default`: + +``` +cumulus@leaf01:~$ sudo nano /etc/dhcpsnoop/dhcp_snoop.json +{ + "bridge": [ + { + "bridge_id": "br_default", + "vlan": [ + { + "vlan_id": 10, + "snooping": 1, + "rate_limit": 50, + "ip_version": 4, + "trusted_interface": [ + "swp3" + ], + } + ] + } + ] +} +``` + +The following example enables DHCP snooping for IPv6 on VLAN 10, sets the rate limit to 50 and the trusted interface to swp6. swp6 is a member of the bridge `br_default`: + +``` +cumulus@leaf01:~$ sudo nano /etc/dhcpsnoop/dhcp_snoop.json +{ + "bridge": [ + { + "bridge_id": "br_default", + "vlan": [ + { + "vlan_id": 10, + "snooping": 1, + "rate_limit": 50, + "ip_version": 6, + "trusted_interface": [ + "swp6" + ], + } + ] + } + ] +} +``` + +When DHCP snooping detects a violation, the packet is dropped and a message is logged to the `/var/log/dhcpsnoop.log` file. + +## Show the DHCP Binding Table + +To show the DHCP binding table, run the `net show dhcp-snoop table` command for IPv4 or the `net show dhcp-snoop6 table` command for IPv6. The following example command shows the DHCP binding table for IPv4: + +``` +cumulus@leaf01:~$ net show dhcp-snoop table +Port VLAN IP MAC Lease State Bridge +---- ---- --------- ----------------- ----- ----- ------ + +swp5 1002 10.0.0.3 00:02:00:00:00:04 7200 ACK br0 + +swp5 1000 10.0.1.3 00:02:00:00:00:04 7200 ACK br0 +``` diff --git a/content/cumulus-linux-54/Layer-1-and-Switch-Ports/DHCP/_index.md b/content/cumulus-linux-54/Layer-1-and-Switch-Ports/DHCP/_index.md index 349640ceb4..fd3f513c3c 100644 --- a/content/cumulus-linux-54/Layer-1-and-Switch-Ports/DHCP/_index.md +++ b/content/cumulus-linux-54/Layer-1-and-Switch-Ports/DHCP/_index.md @@ -4,4 +4,7 @@ author: NVIDIA weight: 338 toc: 3 --- -This section describes how to configure [DHCP](## "Dynamic Host Configuration Protocol") relays and [DHCP](## "Dynamic Host Configuration Protocol") servers. +This section describes how to configure: +- {{}} +- {{}} +- {{}} diff --git a/content/cumulus-linux-54/Layer-1-and-Switch-Ports/Interface-Configuration-and-Management/Switch-Port-Attributes.md b/content/cumulus-linux-54/Layer-1-and-Switch-Ports/Interface-Configuration-and-Management/Switch-Port-Attributes.md index d393a54da8..496b1993e3 100644 --- a/content/cumulus-linux-54/Layer-1-and-Switch-Ports/Interface-Configuration-and-Management/Switch-Port-Attributes.md +++ b/content/cumulus-linux-54/Layer-1-and-Switch-Ports/Interface-Configuration-and-Management/Switch-Port-Attributes.md @@ -1120,7 +1120,7 @@ SN4600 64xQSFP56 (200GbE) interfaces support both PAM4 and NRZ encodings with al For lower speeds, PAM4 is automatically converted to NRZ encoding. -Only 32xQSFP56 ports can brea kout into 4xSFP56 (4x50GbE). But, in this case, the adjacent QSFP56 port are blocked (only the first and third or second and fourth rows can break out into 4xSFP56). +Only 32xQSFP56 ports can break out into 4xSFP56 (4x50GbE). But, in this case, the adjacent QSFP56 port are blocked (only the first and third or second and fourth rows can break out into 4xSFP56). All 64xQSFP56 ports can break out into 2xQSFP56 (2x100GbE) without blocking ports. diff --git a/content/cumulus-linux-54/Layer-1-and-Switch-Ports/Interface-Configuration-and-Management/_index.md b/content/cumulus-linux-54/Layer-1-and-Switch-Ports/Interface-Configuration-and-Management/_index.md index f4b230b4de..b7804343ef 100644 --- a/content/cumulus-linux-54/Layer-1-and-Switch-Ports/Interface-Configuration-and-Management/_index.md +++ b/content/cumulus-linux-54/Layer-1-and-Switch-Ports/Interface-Configuration-and-Management/_index.md @@ -412,7 +412,7 @@ If you specify a subinterface, such as swp1.100, then run `ifup swp1.100`, Cumul You can specify both IPv4 and IPv6 addresses for the same interface. For IPv6 addresses: -- You can create or modify the IP address for an interface using either `::` or `0:0:0` notation. For example,both 2620:149:43:c109:0:0:0:5 and 2001:DB8::1/126 are valid. +- You can create or modify the IP address for an interface using either `::` or `0:0:0` notation. For example, both 2620:149:43:c109:0:0:0:5 and 2001:DB8::1/126 are valid. - Cumulus Linux assigns the IPv6 address with all zeroes in the interface identifier (2001:DB8::/126) for each subnet; connected hosts cannot use this address. The following example commands configure three IP addresses for swp1; two IPv4 addresses and one IPv6 address. diff --git a/content/cumulus-linux-54/Layer-2/IGMP-and-MLD-Snooping.md b/content/cumulus-linux-54/Layer-2/IGMP-and-MLD-Snooping.md index 2d1b94a666..a25e0408a1 100644 --- a/content/cumulus-linux-54/Layer-2/IGMP-and-MLD-Snooping.md +++ b/content/cumulus-linux-54/Layer-2/IGMP-and-MLD-Snooping.md @@ -85,7 +85,7 @@ cumulus@switch:~$ sudo ifreload -a ## Optimized Multicast Flooding (OMF) -IGMP snooping restricts multicast forwarding only to the ports that receive IGMP report messages. If the ports do not receive IGMP reports, multicast traffic floods to all ports in the bridge domain (also know as unregistered multicast (URMC) traffic). To restrict this flooding to only mrouter ports, you can enable OMF. +IGMP snooping restricts multicast forwarding only to the ports that receive IGMP report messages. If the ports do not receive IGMP reports, multicast traffic floods to all ports in the bridge domain (also known as unregistered multicast (URMC) traffic). To restrict this flooding to only mrouter ports, you can enable OMF. To enable OMF: diff --git a/content/cumulus-linux-54/Layer-2/Link-Layer-Discovery-Protocol.md b/content/cumulus-linux-54/Layer-2/Link-Layer-Discovery-Protocol.md index bca07fd9df..8dbae3cce3 100644 --- a/content/cumulus-linux-54/Layer-2/Link-Layer-Discovery-Protocol.md +++ b/content/cumulus-linux-54/Layer-2/Link-Layer-Discovery-Protocol.md @@ -120,7 +120,7 @@ cumulus@switch:~$ sudo systemctl restart lldpd ## Set LLDP Mode -By default, the `lldpd` service sends LLDP frames unless it detects a CDP peer, then it sends CDP frames. You can change this behaviour and configure the `lldpd` service to send only CDP frames or only LLDP frames. +By default, the `lldpd` service sends LLDP frames unless it detects a CDP peer, then it sends CDP frames. You can change this behavior and configure the `lldpd` service to send only CDP frames or only LLDP frames. {{%notice note%}} - You configure the `lldpd` service to send only CDP or only LLDP frames globally for all interfaces; you cannot configure these settings for specific interfaces. diff --git a/content/cumulus-linux-54/Layer-2/Multi-Chassis-Link-Aggregation-MLAG.md b/content/cumulus-linux-54/Layer-2/Multi-Chassis-Link-Aggregation-MLAG.md index c7bf969b5c..2a88c562b8 100644 --- a/content/cumulus-linux-54/Layer-2/Multi-Chassis-Link-Aggregation-MLAG.md +++ b/content/cumulus-linux-54/Layer-2/Multi-Chassis-Link-Aggregation-MLAG.md @@ -832,7 +832,7 @@ The following table shows the conflict types and actions that Cumulus Linux take | LACP partner MAC address | Interface | Protodown the MLAG bonds on the MLAG switch if there is an LACP partner MAC address mismatch or if there is a duplicate LACP partner MAC address. | | MLAG VLANs| Interface | Suspend the inconsistent VLANs on either MLAG peer if the VLANs are not part of the peer link or if there is mismatch of VLANs configured on the MLAG bonds between the MLAG peers. | | Peer link VLANs| Global | Suspend the inconsistent VLANs on either MLAG peer on all the dual-connected MLAG bonds and VXLAN interfaces. | -| MLAG protocol version | Global | The consistency check records an MLAG protocol version mismatch between the MLAG peers. Cumulus Linux does not take any distruptive action. | +| MLAG protocol version | Global | The consistency check records an MLAG protocol version mismatch between the MLAG peers. Cumulus Linux does not take any disruptive action. | | MLAG package version | Global| The consistency check records an MLAG package version mismatch between the MLAG peers. Cumulus Linux does not take any disruptive action.| You can also manually check for MLAG inconsistencies with the following commands: @@ -996,7 +996,7 @@ bridge-learning yes yes - {{< /tab >}} {{< /tabs >}} -The actions that Cumulus Linux takes when there is a conflict are distruptive. If you prefer, you can configure the switch to not take any action when there is a conflict. Edit the `/etc/network/interfaces` file to add the `clagd-args --gracefulConsistencyCheck FALSE` parameter in the peer link stanza. +The actions that Cumulus Linux takes when there is a conflict are disruptive. If you prefer, you can configure the switch to not take any action when there is a conflict. Edit the `/etc/network/interfaces` file to add the `clagd-args --gracefulConsistencyCheck FALSE` parameter in the peer link stanza. ``` cumulus@leaf01:~$ sudo nano /etc/network/interfaces diff --git a/content/cumulus-linux-54/Layer-2/Virtual-Router-Redundancy-VRR-and-VRRP.md b/content/cumulus-linux-54/Layer-2/Virtual-Router-Redundancy-VRR-and-VRRP.md index b102a8ebc9..a1bc68081e 100644 --- a/content/cumulus-linux-54/Layer-2/Virtual-Router-Redundancy-VRR-and-VRRP.md +++ b/content/cumulus-linux-54/Layer-2/Virtual-Router-Redundancy-VRR-and-VRRP.md @@ -164,8 +164,8 @@ The following example commands configure both 10.1.10.1/24 and 10.1.11.1/24 on V {{< tab "NVUE Commands ">}} ``` -cumulus@switch:mgmt:~$ nv set interface vlan10 ip vrr adress 10.1.10.1/24 -cumulus@switch:mgmt:~$ nv set interface vlan10 ip vrr adress 10.1.11.1/24 +cumulus@switch:mgmt:~$ nv set interface vlan10 ip vrr address 10.1.10.1/24 +cumulus@switch:mgmt:~$ nv set interface vlan10 ip vrr address 10.1.11.1/24 cumulus@switch:mgmt:~$ nv config apply ``` diff --git a/content/cumulus-linux-54/Layer-3/Border-Gateway-Protocol-BGP/Optional-BGP-Configuration.md b/content/cumulus-linux-54/Layer-3/Border-Gateway-Protocol-BGP/Optional-BGP-Configuration.md index 0eeaae2e91..781d1ea224 100644 --- a/content/cumulus-linux-54/Layer-3/Border-Gateway-Protocol-BGP/Optional-BGP-Configuration.md +++ b/content/cumulus-linux-54/Layer-3/Border-Gateway-Protocol-BGP/Optional-BGP-Configuration.md @@ -986,7 +986,7 @@ BGP add-path RX enables BGP to receive multiple paths for the same prefix. A pat To view the existing capabilities, run the vtysh `show ip bgp neighbors` command. You can see the existing capabilities in the subsection *Add Path*, below *Neighbor capabilities.* -The following example output shows that BGP can sent and receive additional BGP paths, and that the BGP neighbor on swp51 supports both. +The following example output shows that BGP can send and receive additional BGP paths, and that the BGP neighbor on swp51 supports both. ``` cumulus@leaf01:~$ sudo vtysh diff --git a/content/cumulus-linux-54/Layer-3/Routing/Policy-based-Routing.md b/content/cumulus-linux-54/Layer-3/Routing/Policy-based-Routing.md index e577ed5203..8397bca28a 100644 --- a/content/cumulus-linux-54/Layer-3/Routing/Policy-based-Routing.md +++ b/content/cumulus-linux-54/Layer-3/Routing/Policy-based-Routing.md @@ -28,7 +28,7 @@ A PBR policy contains one or more policy maps. Each policy map: - To match on a source and destination address, a policy map can contain both match source and match destination IP rules. - A set rule determines the PBR next hop for the policy. -To use PBR in Cumulus linux, you define a PBR policy and apply it to the ingress interface (the interface must already have an IP address assigned). Cumulus Linux matches traffic against the match rules in sequential order and forwards the traffic according to the set rule in the first match. Traffic that does not match any rule passes on to the normal destination based routing mechanism. +To use PBR in Cumulus Linux, you define a PBR policy and apply it to the ingress interface (the interface must already have an IP address assigned). Cumulus Linux matches traffic against the match rules in sequential order and forwards the traffic according to the set rule in the first match. Traffic that does not match any rule passes on to the normal destination based routing mechanism. To configure a PBR policy: diff --git a/content/cumulus-linux-54/Layer-3/Routing/Route-Filtering-and-Redistribution.md b/content/cumulus-linux-54/Layer-3/Routing/Route-Filtering-and-Redistribution.md index 4769e30432..50c38b8997 100644 --- a/content/cumulus-linux-54/Layer-3/Routing/Route-Filtering-and-Redistribution.md +++ b/content/cumulus-linux-54/Layer-3/Routing/Route-Filtering-and-Redistribution.md @@ -281,7 +281,7 @@ The `source-protocol` match statement is only supported in {{}} ``` -cumulus@switch:~$ nv set vrf default router bgp address-family ipv4-unicast route-redistribute ospf +cumulus@switch:~$ nv set vrf default router bgp address-family ipv4-unicast redistribute ospf cumulus@switch:~$ nv config apply ``` @@ -477,7 +477,7 @@ To redistribute all directly connected networks, use the `redistribute connected {{< tab "NVUE Commands ">}} ``` -cumulus@switch:~$ nv set vrf default router bgp address-family ipv4-unicast route-redistribute connected +cumulus@switch:~$ nv set vrf default router bgp address-family ipv4-unicast redistribute connected cumulus@switch:~$ nv config apply ``` diff --git a/content/cumulus-linux-54/Layer-3/Routing/Supported-Route-Table-Entries.md b/content/cumulus-linux-54/Layer-3/Routing/Supported-Route-Table-Entries.md index b89b8a1317..9133f82039 100644 --- a/content/cumulus-linux-54/Layer-3/Routing/Supported-Route-Table-Entries.md +++ b/content/cumulus-linux-54/Layer-3/Routing/Supported-Route-Table-Entries.md @@ -23,7 +23,7 @@ Cumulus Linux provides several generalized profiles, described below. These prof The following tables list the number of MAC addresses, layer 3 neighbors, and LPM routes validated for each forwarding table profile. If you do not specify any profiles as described below, the switch uses the *default* values. {{%notice note%}} -The values in the following tables reflect results from testing, which can differ from published manufacturer specifications. +The values provided in the profiles below are the maximum values that Cumulus Linux software allocates; the theoretical hardware limits might be higher. These limits refer to values that have been validated as part of the unidimensional scale validation. If you try to achieve maximum scalability with multiple features enabled, results might differ from the values listed in this guide. {{%/notice%}} ### Spectrum 1 diff --git a/content/cumulus-linux-54/Monitoring-and-Troubleshooting/FRRouting-Log-Message-Reference.md b/content/cumulus-linux-54/Monitoring-and-Troubleshooting/FRRouting-Log-Message-Reference.md index 8102a9ced5..5ec1b97caf 100644 --- a/content/cumulus-linux-54/Monitoring-and-Troubleshooting/FRRouting-Log-Message-Reference.md +++ b/content/cumulus-linux-54/Monitoring-and-Troubleshooting/FRRouting-Log-Message-Reference.md @@ -13,13 +13,13 @@ The following table lists the HIGH severity ERROR log messages generated by FRR. | Babel | HIGH | 16777218 | BABEL Packet Error | Babel has detected a packet encode/decode problem. | Collect the relevant log files and report the issue for troubleshooting.| | Babel | HIGH | 16777219 | BABEL Configuration Error | Babel has detected a configuration error of some sort. | Ensure that the configuration is correct. | | Babel | HIGH | 16777220 | BABEL Route Error | Babel has detected a routing error and is in an inconsistent state. | Gather data to report the issue for troubleshooting. Restart FRR. | -| BGP | HIGH | 33554433 | BGP attribute flag is incorrect | BGP attribute flag is set to the wrong value (Optional/Transitive/Partial). | Determine the soure of the attribute and determine why the attribute flag has been set incorrectly. | -| BGP | HIGH | 33554434 | BGP attribute length is incorrect | BGP attribute length is incorrect. | Determine the soure of the attribute and determine why the attribute length has been set incorrectly. | -| BGP | HIGH | 33554435 | BGP attribute origin value invalid | BGP attribute origin value is invalid. | Determine the soure of the attribute and determine why the origin attribute has been set incorrectly. | -| BGP | HIGH | 33554436 | BGP as path is invalid | BGP AS path has been malformed. | Determine the soure of the update and determine why the AS path has been set incorrectly. | -| BGP | HIGH | 33554437 | BGP as path first as is invalid | BGP update has invalid first AS in AS path. | Determine the soure of the update and determine why the AS path first AS value has been set incorrectly. | -| BGP | HIGH | 33554439 | BGP PMSI tunnel attribute type is invalid | BGP update has invalid type for PMSI tunnel. | Determine the soure of the update and determine why the PMSI tunnel attribute type has been set incorrectly. | -| BGP | HIGH | 33554440 | BGP PMSI tunnel attribute length is invalid | BGP update has invalid length for PMSI tunnel. | Determine the soure of the update and determine why the PMSI tunnel attribute length has been set incorrectly. | +| BGP | HIGH | 33554433 | BGP attribute flag is incorrect | BGP attribute flag is set to the wrong value (Optional/Transitive/Partial). | Determine the source of the attribute and determine why the attribute flag has been set incorrectly. | +| BGP | HIGH | 33554434 | BGP attribute length is incorrect | BGP attribute length is incorrect. | Determine the source of the attribute and determine why the attribute length has been set incorrectly. | +| BGP | HIGH | 33554435 | BGP attribute origin value invalid | BGP attribute origin value is invalid. | Determine the source of the attribute and determine why the origin attribute has been set incorrectly. | +| BGP | HIGH | 33554436 | BGP as path is invalid | BGP AS path has been malformed. | Determine the source of the update and determine why the AS path has been set incorrectly. | +| BGP | HIGH | 33554437 | BGP as path first as is invalid | BGP update has invalid first AS in AS path. | Determine the source of the update and determine why the AS path first AS value has been set incorrectly. | +| BGP | HIGH | 33554439 | BGP PMSI tunnel attribute type is invalid | BGP update has invalid type for PMSI tunnel. | Determine the source of the update and determine why the PMSI tunnel attribute type has been set incorrectly. | +| BGP | HIGH | 33554440 | BGP PMSI tunnel attribute length is invalid | BGP update has invalid length for PMSI tunnel. | Determine the source of the update and determine why the PMSI tunnel attribute length has been set incorrectly. | | BGP | HIGH | 33554442 | BGP peergroup operated on in error | BGP operating on peer-group instead of peers included. | Ensure the configuration doesn't contain peer-groups contained within peer-groups. | | BGP | HIGH | 33554443 | BGP failed to delete peer structure | BGP was unable to delete the peer structure when the address-family was removed. | Determine if all expected peers are removed and restart FRR if not. This is most likely a bug. | | BGP | HIGH | 33554444 | BGP failed to get table chunk memory | BGP unable to get chunk memory for table manager. | Ensure there is adequate memory on the device to support the table requirements. | @@ -38,8 +38,8 @@ The following table lists the HIGH severity ERROR log messages generated by FRR. | BGP | HIGH | 33554457 | BGP error receiving keepalive packet | BGP unable to process a keepalive packet. | BGP keepalive received while in a stopped state. If the problem persists, report it for troubleshooting. | | BGP | HIGH | 33554458 | BGP error receiving route refresh message | BGP unable to process route refresh message. | BGP route refresh received while in a stopped state. If the problem persists, report it for troubleshooting. | | BGP | HIGH | 33554459 | BGP error capability message | BGP unable to process received capability. | BGP capability message received while in a stopped state. If the problem persists, report it for troubleshooting. | -| BGP | HIGH | 33554460 | BGP error with nexthopo update | BGP unable to process nexthop update. | BGP received the nexthop update but the nexthop is not reachable in this BGP instance. Report the problem for troubleshooting. | -| BGP | HIGH | 33554461 | Failure to apply label | BGP attempted to attempted to apply a label but could not do so. | This is most likely a bug. If the problem persists, report it for troubleshooting. | +| BGP | HIGH | 33554460 | BGP error with nexthop update | BGP unable to process nexthop update. | BGP received the nexthop update but the nexthop is not reachable in this BGP instance. Report the problem for troubleshooting. | +| BGP | HIGH | 33554461 | Failure to apply label | BGP attempted to apply a label but could not do so. | This is most likely a bug. If the problem persists, report it for troubleshooting. | | BGP | HIGH | 33554462 | Multipath specified is invalid | BGP was started with an invalid ECMP/multipath value. | Correct the ECMP/multipath value supplied when starting the BGP daemon. | | BGP | HIGH | 33554463 | Failure to process a packet | BGP attempted to process a received packet but could not do so. | This is most likely a bug. If the problem persists, report it for troubleshooting. | | BGP | HIGH | 33554464 | Failure to connect to peer | BGP attempted to send open to a peer but couldn't connect. | This is most likely a bug. If the problem persists, report it for troubleshooting. | @@ -62,7 +62,7 @@ The following table lists the HIGH severity ERROR log messages generated by FRR. | EIGRP | HIGH | 50331650 | EIGRP Configuration Error | EIGRP has detected a configuration error.| Correct the configuration issue. If it still persists, report the issue for troubleshooting.| | General | HIGH | 100663297 | Failure to raise or lower privileges | FRR attempted to raise or lower its privileges and was unable to do so. | Ensure that you are running FRR as the frr user and that the user has sufficient privileges to properly access root privileges. | | General | HIGH | 100663298 | VRF Failure on Start | Upon startup, FRR failed to properly initialize and start up the VRF subsystem. | Ensure that there is sufficient memory to start processes, then restart FRR. | -| General | HIGH | 100663299 | Socket Error | When attempting to access a socket, a system error occured and FRR was unable to properly complete the request. | Ensure that there are sufficient system resources available and ensure that the frr user has sufficient permisions to work. | +| General | HIGH | 100663299 | Socket Error | When attempting to access a socket, a system error occurred and FRR was unable to properly complete the request. | Ensure that there are sufficient system resources available and ensure that the frr user has sufficient permissions to work. | | General | HIGH | 100663303 | System Call Error | FRR has detected an error from using a vital system call and has probably already exited. | Ensure permissions are correct for FRR users and groups. Additionally, check that sufficient system resources are available. | | General | HIGH | 100663304 | VTY Subsystem Error | FRR has detected a problem with the specified configuration file. | Ensure the configuration file exists and has the correct permissions for operations. Additionally, ensure that all config lines are correct as well. | | General | HIGH | 100663305 | SNMP Subsystem Error | FRR has detected a problem with the SNMP library it uses. A callback from this subsystem has indicated some error. | Examine the callback message and ensure SNMP is properly set up and working. | @@ -86,7 +86,7 @@ The following table lists the HIGH severity ERROR log messages generated by FRR. | OSPF | HIGH | 134217729 | Failure to process a packet | OSPF attempted to process a received packet but could not do so. | This is most likely a bug. If the problem persists, report it for troubleshooting. | | OSPF | HIGH | 134217730 | Failure to process Router LSA | OSPF attempted to process a router LSA, but there was an advertising ID mismtach with the link ID. | Check the OSPF network configuration for any configuration issue. If the problem persists, report it for troubleshooting.| | OSPF | HIGH | 134217731 | OSPF Domain Corruption | OSPF attempted to process a router LSA, but there was an advertising ID mismtach with the link ID. | Check OSPF network database for a corrupted LSA. If the problem persists, shut down the OSPF domain and report the problem for troubleshooting. | -| OSPF | HIGH | 134217732 | OSPF Initialization failure | OSPF failed to initialized the OSPF default instance. | Ensure there is adequate memory on the device. If the problem persists, report it for troubleshooting. | +| OSPF | HIGH | 134217732 | OSPF Initialization failure | OSPF failed to initialize the OSPF default instance. | Ensure there is adequate memory on the device. If the problem persists, report it for troubleshooting. | | OSPF | HIGH | 134217733 | OSPF SR Invalid DB | OSPF segment routing database is invalid. | This is most likely a bug. If the problem persists, report it for troubleshooting. | | OSPF | HIGH | 134217734 | OSPF SR hash node creation failed | OSPF segment routing node creation failed. | This is most likely a bug. If the problem persists, report it for troubleshooting. | | OSPF | HIGH | 134217735 | OSPF SR Invalid lsa id | OSPF segment routing invalid LSA ID. | Restart the OSPF instance. If the problem persists, report it for troubleshooting. | diff --git a/content/cumulus-linux-54/Monitoring-and-Troubleshooting/Simple-Network-Management-Protocol-SNMP/Configure-SNMP.md b/content/cumulus-linux-54/Monitoring-and-Troubleshooting/Simple-Network-Management-Protocol-SNMP/Configure-SNMP.md index a4c74e80e1..477b48d3fb 100644 --- a/content/cumulus-linux-54/Monitoring-and-Troubleshooting/Simple-Network-Management-Protocol-SNMP/Configure-SNMP.md +++ b/content/cumulus-linux-54/Monitoring-and-Troubleshooting/Simple-Network-Management-Protocol-SNMP/Configure-SNMP.md @@ -32,7 +32,7 @@ cumulus@switch:~$ nv config apply {{%notice note%}} If you intend to run this service within a {{}}, including the {{}}, follow {{}} for configuring the service. -You do not need to run SNMP in the management VRF if you just want to allow SNMP communicaton through the managment VRF interfaces; see {{}}. +You do not need to run SNMP in the management VRF if you just want to allow SNMP communication through the management VRF interfaces; see {{}}. {{%/notice%}} 1. Start the `snmpd` service: @@ -194,7 +194,7 @@ You can authenticate the user in the following ways: - With no authentication password (if you specify `auth-none`) - With an MD5 password -- With a SHA password +- With an SHA password {{< tabs "username" >}} {{< tab "NVUE Commands" >}} diff --git a/content/cumulus-linux-54/Monitoring-and-Troubleshooting/Simple-Network-Management-Protocol-SNMP/Supported-MIBs.md b/content/cumulus-linux-54/Monitoring-and-Troubleshooting/Simple-Network-Management-Protocol-SNMP/Supported-MIBs.md index d21dc3a382..6be386ff43 100644 --- a/content/cumulus-linux-54/Monitoring-and-Troubleshooting/Simple-Network-Management-Protocol-SNMP/Supported-MIBs.md +++ b/content/cumulus-linux-54/Monitoring-and-Troubleshooting/Simple-Network-Management-Protocol-SNMP/Supported-MIBs.md @@ -10,7 +10,7 @@ Below are the MIBs that Cumulus Linux supports, as well as suggested uses for th |
MIB Name | Suggested Uses | | -------- | -------------- | | {{}}
{{}}
{{}}
{{}} | You can enable FRR SNMP support to provide support for OSPF-MIB (RFC-1850), OSPFV3-MIB (RFC-5643), and BGP4-MIB (RFC-1657). | -| {{}} | Cumulus Linux also includes its own BGP unnumbered MIB for BGP unnumbered peers, defined in `/usr/share/snmp/mibs/Cumulus-BGPUN-MIB.txt`, which has the OID `1.3.6.1.4.1.40310.7`.| +| {{}} | Cumulus Linux also includes its own BGP unnumbered MIB for BGP unnumbered peers, defined in `/usr/share/snmp/mibs/Cumulus-BGPUN-MIB.txt`, which has the OID `1.3.6.1.4.1.40310.7`.| | {{}} | Discard counters: Cumulus Linux also includes its own counters MIB, defined in `/usr/share/snmp/mibs/Cumulus-Counters-MIB.txt`. It has the OID `.1.3.6.1.4.1.40310.2`. | | {{}} | Cumulus Linux includes its own resource utilization MIB, which is similar to using `cl-resource-query`. This MIB monitors layer 3 entries by host, route, nexthops, ECMP groups, and layer 2 MAC/BDPU entries. `/usr/share/snmp/mibs/Cumulus-Resource-Query-MIB.txt` defines this MIB, which has the OID `.1.3.6.1.4.1.40310.1`. | | {{}} | SNMP counters. For information on exposing CPU and memory information with SNMP, see this [knowledge base article]({{}}). | diff --git a/content/cumulus-linux-54/Monitoring-and-Troubleshooting/Troubleshooting-Network-Interfaces/Troubleshoot-Layer-1.md b/content/cumulus-linux-54/Monitoring-and-Troubleshooting/Troubleshooting-Network-Interfaces/Troubleshoot-Layer-1.md index d0a06811f4..01f2b6addf 100644 --- a/content/cumulus-linux-54/Monitoring-and-Troubleshooting/Troubleshooting-Network-Interfaces/Troubleshoot-Layer-1.md +++ b/content/cumulus-linux-54/Monitoring-and-Troubleshooting/Troubleshooting-Network-Interfaces/Troubleshoot-Layer-1.md @@ -760,7 +760,7 @@ Because I2C problems can be very pernicious, often showing up again much later a To verify that an I2C failure is occurring, run `sudo tail -F /var/log/syslog` and look for `smbus` or `i2c` or `EEPROM read` errors that continue to appear or appear in bursts. -Based on the failure scenario when tyou discover the issue, choose when to address this issue; immediately or during a maintenance window. +Based on the failure scenario when you discover the issue, choose when to address this issue; immediately or during a maintenance window. - If traffic or the switch operates negatively and you cannot route traffic through a redundant network, you must do something immediately. - If you can route traffic around the failing switch, allowing troubleshooting to proceed on the failed switch, proceed to reroute traffic to find an appropriate time to troubleshoot the failing switch. diff --git a/content/cumulus-linux-54/Network-Virtualization/Ethernet-Virtual-Private-Network-EVPN/Basic-Configuration.md b/content/cumulus-linux-54/Network-Virtualization/Ethernet-Virtual-Private-Network-EVPN/Basic-Configuration.md index 3bc1e47072..7a89e69c79 100644 --- a/content/cumulus-linux-54/Network-Virtualization/Ethernet-Virtual-Private-Network-EVPN/Basic-Configuration.md +++ b/content/cumulus-linux-54/Network-Virtualization/Ethernet-Virtual-Private-Network-EVPN/Basic-Configuration.md @@ -70,7 +70,7 @@ cumulus@leaf01:~$ nv set vrf default router bgp neighbor swp51 address-family l2 cumulus@leaf01:~$ nv config apply ``` -You do not need enable the BGP control plane for all VNIs configured on the switch with NVUE with the `advertise-all-vni` option. FRR **is** aware of any local VNIs and MACs, and hosts (neighbors) associated with those VNIs. +You do not need to enable the BGP control plane for all VNIs configured on the switch with NVUE with the `advertise-all-vni` option. FRR **is** aware of any local VNIs and MACs, and hosts (neighbors) associated with those VNIs. After you run `nv config save`, the NVUE Commands create the following configuration snippet in the `/etc/nvue.d/startup.yaml` file: @@ -275,7 +275,7 @@ router bgp 65101 bgp router-id 10.10.10.1 neighbor swp51 interface remote-as external address-family l2vpn evpn -neighbor swp1 activate +neighbor swp51 activate advertise-all-vni ... ``` @@ -291,7 +291,7 @@ spine01(config)# router bgp 65199 spine01(config-router)# bgp router-id 10.10.10.101 spine01(config-router)# neighbor swp1 interface remote-as external spine01(config-router)# address-family l2vpn evpn -spine01(config-router-af)# neighbor swp51 activate +spine01(config-router-af)# neighbor swp1 activate spine01(config-router-af)# end spine01)# write memory spine01)# exit diff --git a/content/cumulus-linux-54/Network-Virtualization/VXLAN-Devices.md b/content/cumulus-linux-54/Network-Virtualization/VXLAN-Devices.md index 7e6d3ca9f2..d58e51c9ae 100644 --- a/content/cumulus-linux-54/Network-Virtualization/VXLAN-Devices.md +++ b/content/cumulus-linux-54/Network-Virtualization/VXLAN-Devices.md @@ -197,7 +197,7 @@ cumulus@leaf01:~$ ifreload -a ## Automatic VLAN to VNI Mapping -In an EVPN VXLAN environment, you need to map individual VLANs to VNIs. For a single VXLAN device, you can do this with a seperate NVUE command per VLAN; however, this can be cumbersome if you have to configure many VLANS or need to isolate tenants and reuse VLANs. To simplify the configuration, you can use these two commands instead: +In an EVPN VXLAN environment, you need to map individual VLANs to VNIs. For a single VXLAN device, you can do this with a separate NVUE command per VLAN; however, this can be cumbersome if you have to configure many VLANS or need to isolate tenants and reuse VLANs. To simplify the configuration, you can use these two commands instead: - `nv set bridge domain vlan vni auto` configures the specified VLANs to use automatic mapping. - `nv set bridge domain vlan-vni-offset` configures the offset you want to use for the VNIs. For example, if you specify an offset of 10000, the VNI is the VLAN plus 10000. diff --git a/content/cumulus-linux-54/System-Configuration/Authentication-Authorization-and-Accounting/LDAP-Authentication-and-Authorization.md b/content/cumulus-linux-54/System-Configuration/Authentication-Authorization-and-Accounting/LDAP-Authentication-and-Authorization.md index fbe8e4e8d7..fd85bc19a3 100644 --- a/content/cumulus-linux-54/System-Configuration/Authentication-Authorization-and-Accounting/LDAP-Authentication-and-Authorization.md +++ b/content/cumulus-linux-54/System-Configuration/Authentication-Authorization-and-Accounting/LDAP-Authentication-and-Authorization.md @@ -57,10 +57,11 @@ Entering incorrect information during the installation process produces configur - Edit the `/etc/nslcd.conf` file to update the LDAP URI and search base DN (see {{}}, below). - Edit the `/etc/nssswitch.conf` file to update the service selections. -Be sure to restart `netd` after editing the files. +Restart `nvued.service` and `nginx-authenticator.service` after editing the files. ``` -cumulus@switch:~$ sudo systemctl restart netd.service +cumulus@switch:~$ sudo systemctl restart nvued.service +cumulus@switch:~$ sudo systemctl restart nginx-authenticator.service ``` {{< expand "Alternative Installation Method Using debconf-utils " >}} @@ -131,9 +132,8 @@ After installation, update the main configuration file (`/etc/nslcd.conf`) to ac This section documents some of the more important options that relate to security and queries. For details on all the available configuration options, read the {{}}. {{%notice note%}} -After first editing the `/etc/nslcd.conf` file and/or enabling LDAP in the `/etc/nsswitch.conf` file, you must restart `netd` with the `sudo systemctl restart netd` command. If you disable LDAP, you need to restart the `netd` service. +After editing the `/etc/nslcd.conf` file or enabling LDAP in the `/etc/nsswitch.conf` file, you must restart the NVUE and nginx-authenticator services with the `sudo systemctl restart nvued.service` command and the `sudo systemctl restart nginx-authenticator.service` command. If you disable LDAP, you must also restart these two services. {{%/notice%}} - ### Connection The LDAP client starts a session by connecting to the LDAP server on TCP and UDP port 389 or on port 636 for LDAPS. Depending on the configuration, this connection establishes without authentication (anonymous bind); otherwise, the client must provide a bind user and password. The variables you use to define the connection to the LDAP server are the URI and bind credentials. diff --git a/content/cumulus-linux-54/System-Configuration/Authentication-Authorization-and-Accounting/RADIUS-AAA.md b/content/cumulus-linux-54/System-Configuration/Authentication-Authorization-and-Accounting/RADIUS-AAA.md index d12209dd9d..f5306769cf 100644 --- a/content/cumulus-linux-54/System-Configuration/Authentication-Authorization-and-Accounting/RADIUS-AAA.md +++ b/content/cumulus-linux-54/System-Configuration/Authentication-Authorization-and-Accounting/RADIUS-AAA.md @@ -31,7 +31,18 @@ During package installation: ## Configure the RADIUS Client -To configure the RADIUS client, edit the `/etc/pam_radius_auth.conf` file: +To configure the RADIUS client, edit the `/etc/pam_radius_auth.conf` file. + +{{%notice note%}} + +After editing the `/etc/pam_radius_auth.conf` file, you must restart both `nvued.service` and `nginx-authenticator.service`: + +``` +cumulus@switch:~$ sudo systemctl restart nvued.service +cumulus@switch:~$ sudo systemctl restart nginx-authenticator.service +``` + +{{%/notice%}} 1. Add the hostname or IP address of at least one RADIUS server (such as a *{{}}* server on Linux), and the shared secret used to authenticate and encrypt communication with each server. diff --git a/content/cumulus-linux-54/System-Configuration/Authentication-Authorization-and-Accounting/TACACS.md b/content/cumulus-linux-54/System-Configuration/Authentication-Authorization-and-Accounting/TACACS.md index 57641bdc1c..43bb40bbee 100644 --- a/content/cumulus-linux-54/System-Configuration/Authentication-Authorization-and-Accounting/TACACS.md +++ b/content/cumulus-linux-54/System-Configuration/Authentication-Authorization-and-Accounting/TACACS.md @@ -45,12 +45,23 @@ After you install the required TACACS+ packages, configure the following require If you use NVUE commands to configure TACACS+, you must also set the priority for the authentication order for local and TACACS+ users, and enable TACACS+. +{{%notice note%}} + +After you change TACACS+ settings, you must restart both `nvued.service` and `nginx-authenticator.service`: + +``` +cumulus@switch:~$ sudo systemctl restart nvued.service +cumulus@switch:~$ sudo systemctl restart nginx-authenticator.service +``` + +{{%/notice%}} + {{< tabs "TabID31 ">}} {{< tab "NVUE Commands ">}} NVUE commands require you to specify the priority for each TACACS+ server. You must set a priority even if you only specify one server. -The following example commmands set: +The following example commands set: - The TACACS+ server priority to 5. - The IP address of the server to 192.168.0.30. - The secret to `mytacac$key`. @@ -357,10 +368,11 @@ The first `adduser` command prompts for information and a password. You can skip 3. Edit the `/etc/nsswitch.conf` file to add the keyword `tacplus` back to the line starting with `passwd` (the keyword you removed in the first step). -4. Restart the `nvued` service with the following command: +4. Restart the `nvued` service and the `nginx-authenticator` service with the following commands: ``` - cumulus@switch:~$ sudo systemctl restart nvued + cumulus@switch:~$ sudo systemctl restart nvued.service + cumulus@switch:~$ sudo systemctl restart nginx-authenticator.service ``` ## TACACS+ Per-command Authorization diff --git a/content/cumulus-linux-54/System-Configuration/Authentication-Authorization-and-Accounting/User-Accounts.md b/content/cumulus-linux-54/System-Configuration/Authentication-Authorization-and-Accounting/User-Accounts.md index 3bf43711c8..ac4ff385fe 100644 --- a/content/cumulus-linux-54/System-Configuration/Authentication-Authorization-and-Accounting/User-Accounts.md +++ b/content/cumulus-linux-54/System-Configuration/Authentication-Authorization-and-Accounting/User-Accounts.md @@ -53,7 +53,7 @@ cumulus@switch:~$ nv config apply You can also run the `nv set system aaa user password ` command to specify the plain text password inline. This command bypasses the `Enter new password` and `Confirm password` prompts but displays the plain text password as you type it. {{%notice note%}} -If you are an NVUE-mangaged user, you can update your own password with the Linux `passwd` command. +If you are an NVUE-managed user, you can update your own password with the Linux `passwd` command. {{%/notice%}} {{< /tab >}} @@ -218,7 +218,7 @@ admin2 FIRST LAST system-admin on ... ``` -To show information about a specific user account, run the run the NVUE `nv show system aaa user ` command: +To show information about a specific user account, run the NVUE `nv show system aaa user ` command: ``` cumulus@switch:~$ nv show system aaa user admin2 diff --git a/content/cumulus-linux-54/System-Configuration/Date-and-Time/Precision Time Protocol-PTP.md b/content/cumulus-linux-54/System-Configuration/Date-and-Time/Precision Time Protocol-PTP.md index b12b0d6587..abb651ac6c 100644 --- a/content/cumulus-linux-54/System-Configuration/Date-and-Time/Precision Time Protocol-PTP.md +++ b/content/cumulus-linux-54/System-Configuration/Date-and-Time/Precision Time Protocol-PTP.md @@ -236,7 +236,7 @@ Restarting the `switchd` service causes all network ports to reset in addition t network_transport UDPv4 ``` - For a trunk VLAN, add the VLAN configuration to the switch port stanza: set `l2_mode` to `trunk`, `vlan_intf` to the VLAN interface, and `src_ip` to the IP adress of the VLAN interface: + For a trunk VLAN, add the VLAN configuration to the switch port stanza: set `l2_mode` to `trunk`, `vlan_intf` to the VLAN interface, and `src_ip` to the IP address of the VLAN interface: ``` [swp1] @@ -249,7 +249,7 @@ Restarting the `switchd` service causes all network ports to reset in addition t network_transport UDPv4 ``` - For a switch port VLAN, add the VLAN configuration to the switch port stanza: set `l2_mode` to `access`, `vlan_intf` to the VLAN interface, and `src_ip` to the IP adress of the VLAN interface: + For a switch port VLAN, add the VLAN configuration to the switch port stanza: set `l2_mode` to `access`, `vlan_intf` to the VLAN interface, and `src_ip` to the IP address of the VLAN interface: ``` [swp2] @@ -515,7 +515,7 @@ To create a custom profile: - Update any of the profile settings you want to change (`announce-interval`, `delay-req-interval`, `priority1`, `sync-interval`, `announce-timeout`, `domain`, `priority2`, `transport`, `delay-mechanism`, `local-priority`). - Set the custom profile to be the current profile. -The following example commands create a custom profile called CUSTOM1 based on the predifined profile ITU 8275-1. The commands set the `domain` to 28 and the `announce-timeout` to 3, then set `CUSTOM1` to be the current profile: +The following example commands create a custom profile called CUSTOM1 based on the predefined profile ITU 8275-1. The commands set the `domain` to 28 and the `announce-timeout` to 3, then set `CUSTOM1` to be the current profile: ``` cumulus@switch:~$ nv set service ptp 1 profile CUSTOM1 @@ -529,7 +529,7 @@ cumulus@switch:~$ nv config apply {{< /tab >}} {{< tab "Linux Commands ">}} -The following example `/etc/ptp4l.conf` file creates a custom profile based on the predifined profile ITU 8275-1 and sets the `domain` to 28 and the `announce-timeout` to 3. +The following example `/etc/ptp4l.conf` file creates a custom profile based on the predefined profile ITU 8275-1 and sets the `domain` to 28 and the `announce-timeout` to 3. ``` cumulus@switch:~$ sudo nano /etc/ptp4l.conf @@ -1418,7 +1418,7 @@ Cumulus Linux monitors clock correction and path delay against thresholds, and g | ----- | ----------- | | `nv set service ptp monitor min-offset-threshold` | Sets the minimum difference allowed between the master and slave time. You can set a value between -1000000000 and 0 nanoseconds. The default value is -50 nanoseconds.| | `nv set service ptp monitor max-offset-threshold` | Sets the maximum difference allowed between the master and slave time. You can set a value between 0 and 1000000000 nanoseconds. The default value is 50 nanoseconds.| -| `nv set service ptp monitor path-delay-threshold` | Sets the mean time that PTP packets take to travel between the master and slave. You can set a value between 0 and 1000000000 nanoseconds . The default value is 200 nanoseconds. | +| `nv set service ptp monitor path-delay-threshold` | Sets the mean time that PTP packets take to travel between the master and slave. You can set a value between 0 and 1000000000 nanoseconds. The default value is 200 nanoseconds. | | `nv set service ptp monitor max-timestamp-entries` | Sets the maximum number of timestamp entries allowed. Cumulus Linux updates the timestamps continuously. You can specify a value between 100 and 200. The default value is 100 entries.| | `nv set service ptp monitor max-violation-log-sets` | Sets the maximum number of violation log sets allowed. You can specify a value between 2 and 4. The default value is 2 sets.| | `nv set service ptp monitor max-violation-log-entries` | Sets the maximum number of violation log entries allowed for each set. You can specify a value between 4 and 8. The default value is 8 entries.| @@ -1680,9 +1680,9 @@ The following example shows that there are no violations: cumulus@switch:~$ nv show service ptp 1 monitor violations operational applied description ---------------- ----------- ------- ----------------------------------------------- -last-max-offset Time at which last max offest violation occured -last-min-offset Time at which last min offest violation occured -last-path-delay Time at which last path delay violation occured +last-max-offset Time at which last max offest violation occurred +last-min-offset Time at which last min offest violation occurred +last-path-delay Time at which last path delay violation occurred max-offset-count 0 Number of maximum offset violations min-offset-count 0 Number of min offset violations path-delay-count 0 Number of Path delay violations @@ -1869,7 +1869,7 @@ network_transport UDPv4 PTP shaping is a Beta feature. {{%/notice%}} -To improve performance on the NVIDA Spectrum 1 switch for PTP-enabled ports with speeds lower than 100G, you can configure traffic shaping. +To improve performance on the NVIDIA Spectrum 1 switch for PTP-enabled ports with speeds lower than 100G, you can configure traffic shaping. For example, if you see that the PTP timing offset varies widely and is does not stabilize, enable PTP shaping on all PTP enabled ports to reduce the bandwidth on the ports slightly and improve timing stabilization. {{%notice note%}} diff --git a/content/cumulus-linux-54/System-Configuration/Netfilter-ACLs.md b/content/cumulus-linux-54/System-Configuration/Netfilter-ACLs.md index 45df752b7a..60215c4eb6 100644 --- a/content/cumulus-linux-54/System-Configuration/Netfilter-ACLs.md +++ b/content/cumulus-linux-54/System-Configuration/Netfilter-ACLs.md @@ -138,7 +138,7 @@ The incremental nonatomic update operation follows this order: 2. Cumulus Linux checks if the rules in a table are different from installation time; if a table does not have any changes, it does not reinstall the rules. 3. If there are changes in a table, the new rules populate in new groups or slices in hardware, then that table switches over to the new groups or slices. 4. Finally, old resources for that table free up. This process repeats for each of the tables listed above. -5. If there are isufficient resources to hold both the new rule set and old rule set, Cumulus Linux tries the regular nonatomic mode, which interrupts network traffic. +5. If there are insufficient resources to hold both the new rule set and old rule set, Cumulus Linux tries the regular nonatomic mode, which interrupts network traffic. 6. If the regular nonatomic update fails, Cumulus Linux reverts back to the previous rules. To always reload `switchd` with nonatomic updates: @@ -1313,7 +1313,7 @@ To work around this limitation, set the rate and burst for all these rules to th ### Where to Assign Rules - If you assign a switch port to a bond, you must assign any egress rules to the bond. -- When using the OUTPUT chain, you must assign rules to the source. For example, if you assign a rule to the switch port in the direction of traffic but the source is a bridge (VLAN), the rule does not affect the traffic and you must applied the rule to the bridge. +- When using the OUTPUT chain, you must assign rules to the source. For example, if you assign a rule to the switch port in the direction of traffic but the source is a bridge (VLAN), the rule does not affect the traffic and you must apply the rule to the bridge. - If you need to apply a rule to all transit traffic, use the FORWARD chain, not the OUTPUT chain. ### ACL Rule Installation Failure @@ -1332,7 +1332,7 @@ failed. Entity MIB
1.3.6.1.2.1.99 --> Entity Sensor MIB
1.3.6.1.2.1.23 --> rip2
1.3.6.1.2.1.2 --> interface/interfaces
1.3.6.1.2.1.31 --> ifMIB
1.3.6.1.2.1.4 --> IP
1.3.6.1.2.1.25 --> hostResource | 5.0.1-5.4.0 | 5.5.0-5.6.0| +| [3141826](#3141826)
| A slow memory leak (~5KB over 24 hour period at a 60 second polling interval) might occur in SNMP when you walk the following system MIB objects (1.3.6.1.2.1)
1.3.6.1.2.1.47 --> Entity MIB
1.3.6.1.2.1.99 --> Entity Sensor MIB
1.3.6.1.2.1.23 --> rip2
1.3.6.1.2.1.2 --> interface/interfaces
1.3.6.1.2.1.31 --> ifMIB
1.3.6.1.2.1.4 --> IP
1.3.6.1.2.1.25 --> hostResource | 5.0.1-5.6.0 | | | [3135952](#3135952)
| PAM4 split cables (such as 2x100G, 4x100G, and 4x50G) do not work with a forced speed setting (when auto-negotiation is off) as the default speed enabled is for NRZ mode (such as 100G_4X). To work around this issue, set the appropriate lanes for forced speed (with auto-negotation off) with the ethtool -s swpX speed autoneg off lanes command. For example:
cumulus@switch:~$ sudo ethtool -s swp1 speed 100000 autoneg off lanes 2
| 5.2.0-5.6.0 | | | [3122301](#3122301)
| On the NVIDIA SN4700 switch, inserting and removing the PSU might cause loss of frames. | 5.2.0-5.6.0 | | | [3115242](#3115242)
| When you configure two VNIs in the same VLAN, ifupdown2 shows a vlan added to two or more VXLANS warning, which is only issued after the VNI is already added to the bridge. This leaves the new VNI in the PVID even if there is already an existing VNI configured in that PVID. | 5.1.0-5.6.0 | | @@ -132,7 +133,6 @@ pdfhidden: True | [2891255](#2891255)
| CVE-2021-39925: Buffer overflow in the Bluetooth SDP dissector in Wireshark 3.4.0 to 3.4.9 and 3.2.0 to 3.2.17 allows denial of service via packet injection or crafted capture file
Vulnerable: <= 2.6.20-0+deb10u1Fixed: 2.6.20-0+deb10u2 | 4.0.0-4.4.1, 5.0.0-5.6.0 | 4.4.2-4.4.5| | [2890681](#2890681)
| CVE-2021-42771: relative path traversal in Babel, a set of tools for internationalising Python applications, could result in the execution of arbitrary code
Vulnerable: 2.6.0+dfsg.1-1Fixed: 2.6.0+dfsg.1-1+deb10u1 | 4.0.0-4.4.1, 5.0.0-5.6.0 | 4.4.2-4.4.5| | [2867042](#2867042)
| When connecting the NVIDIA SN4600 switch to another NVIDIA Spectrum switch, you must use auto-negotiation mode (not force mode); otherwise the switch might use the wrong Tx configuration. | 5.0.0-5.6.0 | | -| [2847919](#2847919)
| Configuring a router with the REST API through the switch front panel ports (swps) is supported in the default VRF only. To work around this issue, use the localHost IP address or the MGMT IP address to configure router using the Rest API. | 5.0.0-5.6.0 | | | [2847755](#2847755)
| When you use NCLU to remove the configuration for a peer that is a member of a group but also has other peer-specific configuration, you must remove the peer-specific configuration before you delete the peer in a separate NCLU commit. | 5.0.0-5.6.0 | | | [2823307](#2823307)
| Cumuls Linux does not support a bond with more than 64 ports. Any configuration with more than 64 ports in a bond changes all ports to down when you apply the configuration. | 5.0.0-5.6.0 | | | [2736108](#2736108)
| When you change the VRRP advertisement interval on the master, the master advertisement interval field in the show vrrp command output does not show the updated value. | 4.4.0-4.4.5, 5.0.0-5.6.0 | | @@ -145,7 +145,7 @@ pdfhidden: True | Issue ID | Description | Affects | |--- |--- |--- | | [3351953](#3351953)
| In rare circumstances, attempting to install a Cumulus Linux 5.3 image can fail during installation. The device stops at the (initramfs) prompt. To resume installation, enter the exit command at the (initramfs) prompt. | 5.3.0-5.3.1 | | -| [3351951](#3351951)
None | Currently, the default core dump size limit on Cumulus Linux is 256M but the SDK generates core dumps around 800M. To avoid incomplete core files, you can increase the core dump size limit. | 4.2.1-5.3.1 | | +| [3351951](#3351951)
None | Currently, the default core dump size limit on Cumulus Linux is 256M but the SDK generates core dumps around 800M. To avoid incomplete core files, you can increase the core dump size limit. | 4.2.1-4.3.1, 4.4.0-5.3.1 | | | [3351936](#3351936)
| Switch fans run at very high speed but the temperature is normal. | 5.2.0-5.3.1 | | | [3344373](#3344373)
| When the switch boots up, you might see logs similar to the following in the nvued log files because switchd is not up and running. This does not impact switch functionality
2023-01-29T06:05:18.683152+00:00 cumulus nvued:  INFO: apply_config.py:2177 Apply Issues: (b'),(update-ports returned with error (code 254): ports validation node file is not accessibleswitchd validate_node is absent),(ports configuration(ports.conf/ports_width.conf) is invalid),(')
| | | | [3339336](#3339336)
| The ethtool -m command does not show Digital Optical Monitoring (DOM) for SFP transceivers. To work around this issue, run the l1-show or mlxlink command instead. | 5.2.0-5.3.1 | | @@ -172,7 +172,7 @@ pdfhidden: True | [3255899](#3255899)
| The Linux utility that sends ARP packets is constrained to 512 interfaces on the system. In large scale deployments, the warm boot process fails repeatedly as it sends gratuitous ARP requests for each local address. This issue does not impact the functionality and can be ignored. | 5.2.0-5.3.1 | | | [3244955](#3244955)
| ACL configurations fail when the TCAM memory is exhausted because the CTCAM profile is configured with duplicate entries. | 5.2.0-5.3.1 | | | [3241047](#3241047)
| When you delete a route under the following conditions, switchd might crash:- The minimum number of routes is set to a non-zero value
- KVD utilization is higher than sixty percent
- The number of routes currently configured is less than the minimum reserved value, and multiple KVD linear resources have just been freed and are waiting in the Garbage Collector queue. | 5.2.0-5.3.1 | | -| [3234085](#3234085)
None | When you configure or unconfigure a BGP peer and interface towards a host, memory corruption can cause BGP to crash. | 4.3.0-5.3.1 | | +| [3234085](#3234085)
None | When you configure or unconfigure a BGP peer and interface towards a host, memory corruption can cause BGP to crash. | 4.3.0-4.3.1 | | | [3226525](#3226525)
| When using TACACS+, if you configure per-command authorization with the tacplus-restrict command, NVUE configuration commands fail for any user with a privilege level lower than 15. This occurs because NVUE is not able to create a .local user directory. | 5.2.0-5.3.1 | | | [3145222](#3145222)
| The NVUE nv show system forwarding --output json command does not provide any output. To work around this issue, run the nv show system forwarding command. | 5.2.0-5.3.1 | | | [3074390](#3074390)
| You can not apply NVUE configurations when TACACS is enabled for user authentication. To work around this issue, add the nvue account to the exclude_users line in /etc/tacplus_nss.conf:
exclude_users=root,daemon,nobody,cron,radius_user,radius_priv_user,sshd,cumulus,quagga,frr,nvue,snmp,www-data,ntp,man,_lldpd,*
| 5.0.1-5.3.1 | | diff --git a/content/cumulus-linux-54/rn.xml b/content/cumulus-linux-54/rn.xml index 5ec37197d0..5163428afc 100644 --- a/content/cumulus-linux-54/rn.xml +++ b/content/cumulus-linux-54/rn.xml @@ -7,6 +7,12 @@ Fixed +3663182 +Changing non-default BGP timers with NCLU or vtysh commands sets the hold time and keep alive interval to 0 seconds. To work around this issue, restart the FRR service with the {{sudo systemctl restart frr.service}} command. +5.3.1-5.6.0 + + + 3647426 If BGP {{remote-as}} is set to an integer and you try to configure the {{local-as}} for a BGP instance, you see the following error: @@ -14,7 +20,7 @@ This configuration is not allowed; it is considered to be eBGP and local preference is not advertised. 5.0.0-5.5.1 -5.6.0 +4.3.2-4.4.5, 5.6.0 3585467 @@ -23,6 +29,16 @@ This configuration is not allowed; it is considered to be eBGP and local prefere +3580435 +On the NVIDIA SN2410 switch with an Innodisk SSD, you might see the following message in syslog: + +smartd[501]: Device: /dev/sda [SAT], CHECK POWER STATUS spins up disk (0x00 -> 0xff) + +This is a cosmetic issue and does not affect how the switch operates. To prevent this message from occurring, run the {{hdparm -S 24 /dev/sda}} command to change the HD timeout. +5.3.1-5.6.0 + + + 3576949 When you run the NVUE {{nv set service snmp listening-address localhost vrf <vrf-name>}} or {{nv set service snmp listening-address localhost-v6 vrf <vrf-name>}} command to configure the SNMP listening address, Cumulus Linux applies the listening address to the default VRF instead of the VRF you specify. 5.3.0-5.6.0 @@ -57,8 +73,8 @@ This configuration is not allowed; it is considered to be eBGP and local prefere CVE-2023-38408: The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009. Mitigation: Do not use ssh-agent forwarding (the man page for ssh_config says that "agent forwarding should be enabled with caution"), or start the ssh-agent program with the -P option to allow only specific PKCS#11 libraries (or none with -P ''). For Cumulus Linux 4.3.2, the /usr/bin/ssh-agent program has all permissions turned off (chmod 0) to prevent its execution if a vulnerable version is detected. -4.0.0-4.4.5, 5.0.0-5.6.0 - +4.0.0-4.3.1, 5.0.0-5.6.0 +4.3.2-4.4.5 3541912 @@ -105,8 +121,8 @@ For Cumulus Linux 4.3.2, the /usr/bin/ssh-agent program has all permissions turn 3484058 When you power on the NVIDIA SN3420 switch with no connected cables, the QSFP ports LEDs light in amber. -5.3.0-5.4.0 -5.5.0-5.6.0 +5.3.0-5.6.0 + 3479786 @@ -228,6 +244,12 @@ cumulus@switch:~$ what-just-happened poll --export --no_metadata +3419928 +The NVUE PIM timer command option names {{keep-alive}} and {{rp-keep-alive}} are inconsistent and need to change to {{keepalive}} and {{rp-keepalive}}. +5.4.0-5.6.0 + + + 3418103 On the Spectrum-2 and Spectrum-3 switch, if you use module SPQCELRCDFB when connected to a 3rd party switch, you might see no link or a very long link up time (around two minutes). To work around this issue, bring down the port, then bring it back up. 5.4.0 @@ -237,7 +259,7 @@ cumulus@switch:~$ what-just-happened poll --export --no_metadata 3413827 During upgrade, when one MLAG node is upgraded and the other MLAG node is not yet upgraded, permanent neighbors cannot synchronize between MLAG nodes. The {{clagctl dumppermanentneighs}} command only shows local neighbors. 5.0.0-5.4.0 -5.5.0-5.6.0 +4.3.2-4.4.5, 5.5.0-5.6.0 3413785 @@ -278,12 +300,6 @@ ERR cannot allocate vlan for sub-interface 5.5.0-5.6.0 -3395489 -On a switch running MLAG, when you configure QoS buffer settings, MLAG peering resets. -5.4.0-5.6.0 - - - 3395247 The NVUE {{nv show system forwarding profile-option}} command reports an incorrect {{Max ipv4 mcast routes}} value. To work around this issue, validate values with {{cl-resource-query}}. 5.4.0 @@ -369,13 +385,7 @@ To obtain the correct packages, install the {{tacplus-client}} package and its d 3362113 -If you restore an NVUE {{startup.yaml}} file after upgrade that includes breakout ports with QoS configuration or you run the {{nv config patch}} command to update a configuration with a {{yaml}} file that includes breakout ports with QoS configuration, the NVUE configuration fails to apply and subsequent attempts to run {{nv config apply}} fail with the following message: - -cumulus@switch:~$ nv config apply -Invalid config [rev_id: 11] - qos config is not supported on following invalid interface: swp1s0. Supported on swp and bond interface types. - -To work around this issue, run {{nv unset}} on the configured QoS settings, then apply the breakout port configuration before you configure QoS. Alternatively, you can remove the QoS configuration from the {{yaml}} file and patch it separately after applying the breakout configuration. +If you restore an NVUE {{startup.yaml}} file after upgrade that includes breakout ports with QoS configuration or you run the {{nv config patch}} command to update a configuration with a {{yaml}} file that includes breakout ports with QoS configuration, the NVUE configuration fails to apply and subsequent attempts to run {{nv config apply}} fail with the message similar to {{Invalid config [rev_id: 11] qos config is not supported on following invalid interface: swp1s0. Supported on swp and bond interface types}}. To work around this issue, run {{nv unset}} on the configured QoS settings, then apply the breakout port configuration before you configure QoS. Alternatively, you can remove the QoS configuration from the {{yaml}} file and patch it separately after applying the breakout configuration. 5.4.0-5.6.0 @@ -424,9 +434,7 @@ These errors do not affect new dynamic NAT flows from new NAT rules. 3347677 -In an MLAG configuration, when a link failure occurs on the peerlink or the peerlink shuts down, the switch in the secondary role attracts traffic to its local VTEP as it advertises the local VTEP IP address momentarily just before the VXLAN device is protodown. This traffic is dropped for a brief moment (between 5 and 10 seconds) because the MLAG bonds on the secondary switch are already protodown. - -In a proposed fix in the MR !226, we are not flapping the IP on vxlan device on secondary clag device on peerlink down trigger. This ensures smooth traffic flow and no convergence issue seen in system test bed with this fix. +In an MLAG configuration, when a link failure occurs on the peerlink or the peerlink shuts down, the switch in the secondary role attracts traffic to its local VTEP as it advertises the local VTEP IP address momentarily just before the VXLAN device is protodown. This traffic is dropped for a brief moment (between 5 and 10 seconds) because the MLAG bonds on the secondary switch are already protodown. 5.1.0-5.6.0 @@ -518,22 +526,16 @@ cumulus@switch:~$ sudo chmod 0664 /run/tacacs_client_map -3308191 -If you try to set an unsupported interface speed together with FEC, the {{nv config apply}} command succeeds but Cumulus Linux ignores the FEC configuration and configures the default FEC setting for the chosen speed. There is no warning or error message. -5.4.0-5.6.0 - - - 3293560 If you run NVUE commands to break out a port into four interfaces, NVUE disables the subsequent port automatically. However, if you run NVUE commands to break out a port into eight interfaces, NVUE does not disable the subsequent port automatically; you have to run the NVUE command to disable the subsequent port. 5.4.0 5.5.0-5.6.0 -3269691 -When you restart the LLDP service, you see a {{broken pipe}} error and a log message in the {{lldpd.service}} logs. This error does not affect LLDP functionality. -5.4.0-5.6.0 - +3293114 +In Cumulus Linux 5.4 and earlier, the command to enable Neighbor Discovery (ND) router advertisement is inverted and causes confusion; {{nv set interface <interface> ip neighbor-discovery router-advertisement enable off}}. In Cumulus Linux 5.5 and later, the command to enable router advertisement is updated to {{nv set interface <interface> ip neighbor-discovery router-advertisement enable on}}. +5.3.0-5.5.1 +5.6.0 3266197 @@ -582,7 +584,7 @@ Can't set non-static MAC address for non-vPort 0x0001006B when VID is VFID. 3221628 -Cumulus Linux 5.2.0 and 5.2.1 VX images might include an incorrect entry at the end of {{/etc/apt/sources.list}}, which produces warnings when you run {{apt update}}. Remove this entry to avoid these warnings. +Cumulus Linux VX images might include an incorrect entry at the end of {{/etc/apt/sources.list}}, which produces warnings when you run {{apt update}}. Remove this entry to avoid these warnings. 5.2.0-5.6.0 @@ -657,8 +659,8 @@ The {{/var/lib/snmp/snmpd.conf}} file contains multiple {{Warning: Unknown token 1.3.6.1.2.1.31 --> ifMIB 1.3.6.1.2.1.4 --> IP 1.3.6.1.2.1.25 --> hostResource -5.0.1-5.4.0 -5.5.0-5.6.0 +5.0.1-5.6.0 + 3135952 @@ -790,12 +792,6 @@ Fixed: 2.6.0+dfsg.1-1+deb10u1 -2847919 -Configuring a router with the REST API through the switch front panel ports (swps) is supported in the default VRF only. To work around this issue, use the localHost IP address or the MGMT IP address to configure router using the Rest API. -5.0.0-5.6.0 - - - 2847755 When you use NCLU to remove the configuration for a peer that is a member of a group but also has other peer-specific configuration, you must remove the peer-specific configuration before you delete the peer in a separate NCLU commit. 5.0.0-5.6.0 @@ -856,7 +852,7 @@ You can safely ignore this warning. 3351951 Currently, the default core dump size limit on Cumulus Linux is 256M but the SDK generates core dumps around 800M. To avoid incomplete core files, you can increase the core dump size limit. -4.2.1-5.3.1 +4.2.1-4.3.1, 4.4.0-5.3.1 3351936 @@ -1008,7 +1004,7 @@ Vlan: 0 3234085 When you configure or unconfigure a BGP peer and interface towards a host, memory corruption can cause BGP to crash. -4.3.0-5.3.1 +4.3.0-4.3.1 3226525 diff --git a/content/cumulus-linux-55/Installation-Management/Installing-a-New-Cumulus-Linux-Image.md b/content/cumulus-linux-55/Installation-Management/Installing-a-New-Cumulus-Linux-Image.md index 80bbab0f7f..be1b20dc9a 100644 --- a/content/cumulus-linux-55/Installation-Management/Installing-a-New-Cumulus-Linux-Image.md +++ b/content/cumulus-linux-55/Installation-Management/Installing-a-New-Cumulus-Linux-Image.md @@ -323,7 +323,7 @@ You can run several installer command line options from ONIE to perform basic sw - Execute a ZTP script to perform necessary configuration {{%notice note%}} -The `onie-nos-install` command does *not* allow you specify command line parameters. You must access the switch from the console and transfer a disk image to the switch. You must then make the disk image executable and install the image directly from the ONIE command line with the options you want to use. +The `onie-nos-install` command does *not* allow you to specify command line parameters. You must access the switch from the console and transfer a disk image to the switch. You must then make the disk image executable and install the image directly from the ONIE command line with the options you want to use. The following example commands transfer a disk image to the switch, make the image executable, and install the image with the `--password` option to change the default cumulus user password: diff --git a/content/cumulus-linux-55/Layer-1-and-Switch-Ports/DHCP/DHCP-Relays.md b/content/cumulus-linux-55/Layer-1-and-Switch-Ports/DHCP/DHCP-Relays.md index a431059a7b..767e5b7059 100644 --- a/content/cumulus-linux-55/Layer-1-and-Switch-Ports/DHCP/DHCP-Relays.md +++ b/content/cumulus-linux-55/Layer-1-and-Switch-Ports/DHCP/DHCP-Relays.md @@ -103,7 +103,7 @@ cumulus@leaf01:~$ nv config apply ## Optional Configuration -This section describes optional DHCP relay configuration. The steps provided in this section assume that you already done basic DHCP relay configuration, described above. +This section describes optional DHCP relay configurations. The steps provided in this section assume that you have already configured basic DHCP relay, as described above. ### DHCP Agent Information Option (Option 82) diff --git a/content/cumulus-linux-55/Layer-1-and-Switch-Ports/DHCP/DHCP-Snooping.md b/content/cumulus-linux-55/Layer-1-and-Switch-Ports/DHCP/DHCP-Snooping.md new file mode 100644 index 0000000000..8454c280ef --- /dev/null +++ b/content/cumulus-linux-55/Layer-1-and-Switch-Ports/DHCP/DHCP-Snooping.md @@ -0,0 +1,91 @@ +--- +title: DHCP Snooping +author: NVIDIA +weight: 355 +toc: 3 +--- +DHCP snooping enables Cumulus Linux to act as a middle layer between the DHCP infrastructure and DHCP clients by scanning DHCP control packets and building an IP-MAC database. Cumulus Linux accepts DHCP offers from only trusted interfaces and can rate limit packets. + +{{%notice note%}} +DHCP option 82 processing is not supported. +{{%/notice%}} + +## Configure DHCP Snooping + +To configure DHCP snooping, you need to: + +- Enable DHCP snooping on a VLAN. +- Add a trusted interface. Cumulus Linux allows DHCP offers from only trusted interfaces to prevent malicious DHCP servers from assigning IP addresses inside the network. The interface must be a member of the bridge specified. +- Set the rate limit for DHCP requests to avoid DoS attacks. The default value is 100 packets per second. + +The following example shows you how to configure DHCP snooping for IPv4 and IPv6. + +{{%notice note%}} +NVUE does not provide commands to configure DHCP Snooping. +{{%/notice%}} + +Create the `/etc/dhcpsnoop/dhcp_snoop.json` file and add DHCP snooping configuration under the bridge. + +The following example enables DHCP snooping for IPv4 on VLAN 10, sets the rate limit to 50 and the trusted interface to swp3. swp3 is a member of the bridge `br_default`: + +``` +cumulus@leaf01:~$ sudo nano /etc/dhcpsnoop/dhcp_snoop.json +{ + "bridge": [ + { + "bridge_id": "br_default", + "vlan": [ + { + "vlan_id": 10, + "snooping": 1, + "rate_limit": 50, + "ip_version": 4, + "trusted_interface": [ + "swp3" + ], + } + ] + } + ] +} +``` + +The following example enables DHCP snooping for IPv6 on VLAN 10, sets the rate limit to 50 and the trusted interface to swp6. swp6 is a member of the bridge `br_default`: + +``` +cumulus@leaf01:~$ sudo nano /etc/dhcpsnoop/dhcp_snoop.json +{ + "bridge": [ + { + "bridge_id": "br_default", + "vlan": [ + { + "vlan_id": 10, + "snooping": 1, + "rate_limit": 50, + "ip_version": 6, + "trusted_interface": [ + "swp6" + ], + } + ] + } + ] +} +``` + +When DHCP snooping detects a violation, the packet is dropped and a message is logged to the `/var/log/dhcpsnoop.log` file. + +## Show the DHCP Binding Table + +To show the DHCP binding table, run the `net show dhcp-snoop table` command for IPv4 or the `net show dhcp-snoop6 table` command for IPv6. The following example command shows the DHCP binding table for IPv4: + +``` +cumulus@leaf01:~$ net show dhcp-snoop table +Port VLAN IP MAC Lease State Bridge +---- ---- --------- ----------------- ----- ----- ------ + +swp5 1002 10.0.0.3 00:02:00:00:00:04 7200 ACK br0 + +swp5 1000 10.0.1.3 00:02:00:00:00:04 7200 ACK br0 +``` diff --git a/content/cumulus-linux-55/Layer-1-and-Switch-Ports/DHCP/_index.md b/content/cumulus-linux-55/Layer-1-and-Switch-Ports/DHCP/_index.md index 349640ceb4..fd3f513c3c 100644 --- a/content/cumulus-linux-55/Layer-1-and-Switch-Ports/DHCP/_index.md +++ b/content/cumulus-linux-55/Layer-1-and-Switch-Ports/DHCP/_index.md @@ -4,4 +4,7 @@ author: NVIDIA weight: 338 toc: 3 --- -This section describes how to configure [DHCP](## "Dynamic Host Configuration Protocol") relays and [DHCP](## "Dynamic Host Configuration Protocol") servers. +This section describes how to configure: +- {{}} +- {{}} +- {{}} diff --git a/content/cumulus-linux-55/Layer-1-and-Switch-Ports/Interface-Configuration-and-Management/Switch-Port-Attributes.md b/content/cumulus-linux-55/Layer-1-and-Switch-Ports/Interface-Configuration-and-Management/Switch-Port-Attributes.md index 0aaf0c3db4..e16a7fa4b9 100644 --- a/content/cumulus-linux-55/Layer-1-and-Switch-Ports/Interface-Configuration-and-Management/Switch-Port-Attributes.md +++ b/content/cumulus-linux-55/Layer-1-and-Switch-Ports/Interface-Configuration-and-Management/Switch-Port-Attributes.md @@ -1195,7 +1195,7 @@ SN4600 64xQSFP56 (200GbE) interfaces support both PAM4 and NRZ encodings with al For lower speeds, PAM4 is automatically converted to NRZ encoding. -Only 32xQSFP56 ports can brea kout into 4xSFP56 (4x50GbE). But, in this case, the adjacent QSFP56 port are blocked (only the first and third or second and fourth rows can break out into 4xSFP56). +Only 32xQSFP56 ports can break out into 4xSFP56 (4x50GbE). But, in this case, the adjacent QSFP56 port are blocked (only the first and third or second and fourth rows can break out into 4xSFP56). All 64xQSFP56 ports can break out into 2xQSFP56 (2x100GbE) without blocking ports. diff --git a/content/cumulus-linux-55/Layer-1-and-Switch-Ports/Interface-Configuration-and-Management/_index.md b/content/cumulus-linux-55/Layer-1-and-Switch-Ports/Interface-Configuration-and-Management/_index.md index f4b230b4de..b7804343ef 100644 --- a/content/cumulus-linux-55/Layer-1-and-Switch-Ports/Interface-Configuration-and-Management/_index.md +++ b/content/cumulus-linux-55/Layer-1-and-Switch-Ports/Interface-Configuration-and-Management/_index.md @@ -412,7 +412,7 @@ If you specify a subinterface, such as swp1.100, then run `ifup swp1.100`, Cumul You can specify both IPv4 and IPv6 addresses for the same interface. For IPv6 addresses: -- You can create or modify the IP address for an interface using either `::` or `0:0:0` notation. For example,both 2620:149:43:c109:0:0:0:5 and 2001:DB8::1/126 are valid. +- You can create or modify the IP address for an interface using either `::` or `0:0:0` notation. For example, both 2620:149:43:c109:0:0:0:5 and 2001:DB8::1/126 are valid. - Cumulus Linux assigns the IPv6 address with all zeroes in the interface identifier (2001:DB8::/126) for each subnet; connected hosts cannot use this address. The following example commands configure three IP addresses for swp1; two IPv4 addresses and one IPv6 address. diff --git a/content/cumulus-linux-55/Layer-2/IGMP-and-MLD-Snooping.md b/content/cumulus-linux-55/Layer-2/IGMP-and-MLD-Snooping.md index e9c1b3cc11..d89426cbfd 100644 --- a/content/cumulus-linux-55/Layer-2/IGMP-and-MLD-Snooping.md +++ b/content/cumulus-linux-55/Layer-2/IGMP-and-MLD-Snooping.md @@ -85,7 +85,7 @@ cumulus@switch:~$ sudo ifreload -a ## Optimized Multicast Flooding (OMF) -IGMP snooping restricts multicast forwarding only to the ports that receive IGMP report messages. If the ports do not receive IGMP reports, multicast traffic floods to all ports in the bridge domain (also know as unregistered multicast (URMC) traffic). To restrict this flooding to only mrouter ports, you can enable OMF. +IGMP snooping restricts multicast forwarding only to the ports that receive IGMP report messages. If the ports do not receive IGMP reports, multicast traffic floods to all ports in the bridge domain (also known as unregistered multicast (URMC) traffic). To restrict this flooding to only mrouter ports, you can enable OMF. To enable OMF: diff --git a/content/cumulus-linux-55/Layer-2/Link-Layer-Discovery-Protocol.md b/content/cumulus-linux-55/Layer-2/Link-Layer-Discovery-Protocol.md index 9ab94a15d7..f9fa8670f6 100644 --- a/content/cumulus-linux-55/Layer-2/Link-Layer-Discovery-Protocol.md +++ b/content/cumulus-linux-55/Layer-2/Link-Layer-Discovery-Protocol.md @@ -120,7 +120,7 @@ cumulus@switch:~$ sudo systemctl restart lldpd ## Set LLDP Mode -By default, the `lldpd` service sends LLDP frames unless it detects a CDP peer, then it sends CDP frames. You can change this behaviour and configure the `lldpd` service to send only CDP frames or only LLDP frames. +By default, the `lldpd` service sends LLDP frames unless it detects a CDP peer, then it sends CDP frames. You can change this behavior and configure the `lldpd` service to send only CDP frames or only LLDP frames. {{%notice note%}} - You configure the `lldpd` service to send only CDP or only LLDP frames globally for all interfaces; you cannot configure these settings for specific interfaces. diff --git a/content/cumulus-linux-55/Layer-2/Multi-Chassis-Link-Aggregation-MLAG.md b/content/cumulus-linux-55/Layer-2/Multi-Chassis-Link-Aggregation-MLAG.md index 764f3f49e7..fe438706d6 100644 --- a/content/cumulus-linux-55/Layer-2/Multi-Chassis-Link-Aggregation-MLAG.md +++ b/content/cumulus-linux-55/Layer-2/Multi-Chassis-Link-Aggregation-MLAG.md @@ -904,7 +904,7 @@ The following table shows the conflict types and actions that Cumulus Linux take | LACP partner MAC address | Interface | Protodown the MLAG bonds on the MLAG switch if there is an LACP partner MAC address mismatch or if there is a duplicate LACP partner MAC address. | | MLAG VLANs| Interface | Suspend the inconsistent VLANs on either MLAG peer if the VLANs are not part of the peer link or if there is mismatch of VLANs configured on the MLAG bonds between the MLAG peers. | | Peer link VLANs| Global | Suspend the inconsistent VLANs on either MLAG peer on all the dual-connected MLAG bonds and VXLAN interfaces. | -| MLAG protocol version | Global | The consistency check records an MLAG protocol version mismatch between the MLAG peers. Cumulus Linux does not take any distruptive action. | +| MLAG protocol version | Global | The consistency check records an MLAG protocol version mismatch between the MLAG peers. Cumulus Linux does not take any disruptive action. | | MLAG package version | Global| The consistency check records an MLAG package version mismatch between the MLAG peers. Cumulus Linux does not take any disruptive action.| You can also manually check for MLAG inconsistencies with the following commands: @@ -1068,7 +1068,7 @@ bridge-learning yes yes - {{< /tab >}} {{< /tabs >}} -The actions that Cumulus Linux takes when there is a conflict are distruptive. If you prefer, you can configure the switch to not take any action when there is a conflict. Edit the `/etc/network/interfaces` file to add the `clagd-args --gracefulConsistencyCheck FALSE` parameter in the peer link stanza. +The actions that Cumulus Linux takes when there is a conflict are disruptive. If you prefer, you can configure the switch to not take any action when there is a conflict. Edit the `/etc/network/interfaces` file to add the `clagd-args --gracefulConsistencyCheck FALSE` parameter in the peer link stanza. ``` cumulus@leaf01:~$ sudo nano /etc/network/interfaces diff --git a/content/cumulus-linux-55/Layer-2/Virtual-Router-Redundancy-VRR-and-VRRP.md b/content/cumulus-linux-55/Layer-2/Virtual-Router-Redundancy-VRR-and-VRRP.md index 2b87116350..c31c8b78fc 100644 --- a/content/cumulus-linux-55/Layer-2/Virtual-Router-Redundancy-VRR-and-VRRP.md +++ b/content/cumulus-linux-55/Layer-2/Virtual-Router-Redundancy-VRR-and-VRRP.md @@ -164,8 +164,8 @@ The following example commands configure both 10.1.10.1/24 and 10.1.11.1/24 on V {{< tab "NVUE Commands ">}} ``` -cumulus@switch:mgmt:~$ nv set interface vlan10 ip vrr adress 10.1.10.1/24 -cumulus@switch:mgmt:~$ nv set interface vlan10 ip vrr adress 10.1.11.1/24 +cumulus@switch:mgmt:~$ nv set interface vlan10 ip vrr address 10.1.10.1/24 +cumulus@switch:mgmt:~$ nv set interface vlan10 ip vrr address 10.1.11.1/24 cumulus@switch:mgmt:~$ nv config apply ``` diff --git a/content/cumulus-linux-55/Layer-3/Border-Gateway-Protocol-BGP/Optional-BGP-Configuration.md b/content/cumulus-linux-55/Layer-3/Border-Gateway-Protocol-BGP/Optional-BGP-Configuration.md index 701c8bd0c8..aacf24ee22 100644 --- a/content/cumulus-linux-55/Layer-3/Border-Gateway-Protocol-BGP/Optional-BGP-Configuration.md +++ b/content/cumulus-linux-55/Layer-3/Border-Gateway-Protocol-BGP/Optional-BGP-Configuration.md @@ -986,7 +986,7 @@ BGP add-path RX enables BGP to receive multiple paths for the same prefix. A pat To view the existing capabilities, run the vtysh `show ip bgp neighbors` command. You can see the existing capabilities in the subsection *Add Path*, below *Neighbor capabilities.* -The following example output shows that BGP can sent and receive additional BGP paths, and that the BGP neighbor on swp51 supports both. +The following example output shows that BGP can send and receive additional BGP paths, and that the BGP neighbor on swp51 supports both. ``` cumulus@leaf01:~$ sudo vtysh diff --git a/content/cumulus-linux-55/Layer-3/Routing/Policy-based-Routing.md b/content/cumulus-linux-55/Layer-3/Routing/Policy-based-Routing.md index 137d552c07..f663b2e3db 100644 --- a/content/cumulus-linux-55/Layer-3/Routing/Policy-based-Routing.md +++ b/content/cumulus-linux-55/Layer-3/Routing/Policy-based-Routing.md @@ -28,7 +28,7 @@ A PBR policy contains one or more policy maps. Each policy map: - To match on a source and destination address, a policy map can contain both match source and match destination IP rules. - A set rule determines the PBR next hop for the policy. -To use PBR in Cumulus linux, you define a PBR policy and apply it to the ingress interface (the interface must already have an IP address assigned). Cumulus Linux matches traffic against the match rules in sequential order and forwards the traffic according to the set rule in the first match. Traffic that does not match any rule passes on to the normal destination based routing mechanism. +To use PBR in Cumulus Linux, you define a PBR policy and apply it to the ingress interface (the interface must already have an IP address assigned). Cumulus Linux matches traffic against the match rules in sequential order and forwards the traffic according to the set rule in the first match. Traffic that does not match any rule passes on to the normal destination based routing mechanism. To configure a PBR policy: diff --git a/content/cumulus-linux-55/Layer-3/Routing/Route-Filtering-and-Redistribution.md b/content/cumulus-linux-55/Layer-3/Routing/Route-Filtering-and-Redistribution.md index 79f555cc35..3eb1893fb4 100644 --- a/content/cumulus-linux-55/Layer-3/Routing/Route-Filtering-and-Redistribution.md +++ b/content/cumulus-linux-55/Layer-3/Routing/Route-Filtering-and-Redistribution.md @@ -281,7 +281,7 @@ The `source-protocol` match statement is only supported in {{}} ``` -cumulus@switch:~$ nv set vrf default router bgp address-family ipv4-unicast route-redistribute ospf +cumulus@switch:~$ nv set vrf default router bgp address-family ipv4-unicast redistribute ospf cumulus@switch:~$ nv config apply ``` @@ -489,7 +489,7 @@ To redistribute all directly connected networks, use the `redistribute connected {{< tab "NVUE Commands ">}} ``` -cumulus@switch:~$ nv set vrf default router bgp address-family ipv4-unicast route-redistribute connected +cumulus@switch:~$ nv set vrf default router bgp address-family ipv4-unicast redistribute connected cumulus@switch:~$ nv config apply ``` diff --git a/content/cumulus-linux-55/Layer-3/Routing/Supported-Route-Table-Entries.md b/content/cumulus-linux-55/Layer-3/Routing/Supported-Route-Table-Entries.md index b89b8a1317..9133f82039 100644 --- a/content/cumulus-linux-55/Layer-3/Routing/Supported-Route-Table-Entries.md +++ b/content/cumulus-linux-55/Layer-3/Routing/Supported-Route-Table-Entries.md @@ -23,7 +23,7 @@ Cumulus Linux provides several generalized profiles, described below. These prof The following tables list the number of MAC addresses, layer 3 neighbors, and LPM routes validated for each forwarding table profile. If you do not specify any profiles as described below, the switch uses the *default* values. {{%notice note%}} -The values in the following tables reflect results from testing, which can differ from published manufacturer specifications. +The values provided in the profiles below are the maximum values that Cumulus Linux software allocates; the theoretical hardware limits might be higher. These limits refer to values that have been validated as part of the unidimensional scale validation. If you try to achieve maximum scalability with multiple features enabled, results might differ from the values listed in this guide. {{%/notice%}} ### Spectrum 1 diff --git a/content/cumulus-linux-55/Monitoring-and-Troubleshooting/FRRouting-Log-Message-Reference.md b/content/cumulus-linux-55/Monitoring-and-Troubleshooting/FRRouting-Log-Message-Reference.md index 8102a9ced5..5ec1b97caf 100644 --- a/content/cumulus-linux-55/Monitoring-and-Troubleshooting/FRRouting-Log-Message-Reference.md +++ b/content/cumulus-linux-55/Monitoring-and-Troubleshooting/FRRouting-Log-Message-Reference.md @@ -13,13 +13,13 @@ The following table lists the HIGH severity ERROR log messages generated by FRR. | Babel | HIGH | 16777218 | BABEL Packet Error | Babel has detected a packet encode/decode problem. | Collect the relevant log files and report the issue for troubleshooting.| | Babel | HIGH | 16777219 | BABEL Configuration Error | Babel has detected a configuration error of some sort. | Ensure that the configuration is correct. | | Babel | HIGH | 16777220 | BABEL Route Error | Babel has detected a routing error and is in an inconsistent state. | Gather data to report the issue for troubleshooting. Restart FRR. | -| BGP | HIGH | 33554433 | BGP attribute flag is incorrect | BGP attribute flag is set to the wrong value (Optional/Transitive/Partial). | Determine the soure of the attribute and determine why the attribute flag has been set incorrectly. | -| BGP | HIGH | 33554434 | BGP attribute length is incorrect | BGP attribute length is incorrect. | Determine the soure of the attribute and determine why the attribute length has been set incorrectly. | -| BGP | HIGH | 33554435 | BGP attribute origin value invalid | BGP attribute origin value is invalid. | Determine the soure of the attribute and determine why the origin attribute has been set incorrectly. | -| BGP | HIGH | 33554436 | BGP as path is invalid | BGP AS path has been malformed. | Determine the soure of the update and determine why the AS path has been set incorrectly. | -| BGP | HIGH | 33554437 | BGP as path first as is invalid | BGP update has invalid first AS in AS path. | Determine the soure of the update and determine why the AS path first AS value has been set incorrectly. | -| BGP | HIGH | 33554439 | BGP PMSI tunnel attribute type is invalid | BGP update has invalid type for PMSI tunnel. | Determine the soure of the update and determine why the PMSI tunnel attribute type has been set incorrectly. | -| BGP | HIGH | 33554440 | BGP PMSI tunnel attribute length is invalid | BGP update has invalid length for PMSI tunnel. | Determine the soure of the update and determine why the PMSI tunnel attribute length has been set incorrectly. | +| BGP | HIGH | 33554433 | BGP attribute flag is incorrect | BGP attribute flag is set to the wrong value (Optional/Transitive/Partial). | Determine the source of the attribute and determine why the attribute flag has been set incorrectly. | +| BGP | HIGH | 33554434 | BGP attribute length is incorrect | BGP attribute length is incorrect. | Determine the source of the attribute and determine why the attribute length has been set incorrectly. | +| BGP | HIGH | 33554435 | BGP attribute origin value invalid | BGP attribute origin value is invalid. | Determine the source of the attribute and determine why the origin attribute has been set incorrectly. | +| BGP | HIGH | 33554436 | BGP as path is invalid | BGP AS path has been malformed. | Determine the source of the update and determine why the AS path has been set incorrectly. | +| BGP | HIGH | 33554437 | BGP as path first as is invalid | BGP update has invalid first AS in AS path. | Determine the source of the update and determine why the AS path first AS value has been set incorrectly. | +| BGP | HIGH | 33554439 | BGP PMSI tunnel attribute type is invalid | BGP update has invalid type for PMSI tunnel. | Determine the source of the update and determine why the PMSI tunnel attribute type has been set incorrectly. | +| BGP | HIGH | 33554440 | BGP PMSI tunnel attribute length is invalid | BGP update has invalid length for PMSI tunnel. | Determine the source of the update and determine why the PMSI tunnel attribute length has been set incorrectly. | | BGP | HIGH | 33554442 | BGP peergroup operated on in error | BGP operating on peer-group instead of peers included. | Ensure the configuration doesn't contain peer-groups contained within peer-groups. | | BGP | HIGH | 33554443 | BGP failed to delete peer structure | BGP was unable to delete the peer structure when the address-family was removed. | Determine if all expected peers are removed and restart FRR if not. This is most likely a bug. | | BGP | HIGH | 33554444 | BGP failed to get table chunk memory | BGP unable to get chunk memory for table manager. | Ensure there is adequate memory on the device to support the table requirements. | @@ -38,8 +38,8 @@ The following table lists the HIGH severity ERROR log messages generated by FRR. | BGP | HIGH | 33554457 | BGP error receiving keepalive packet | BGP unable to process a keepalive packet. | BGP keepalive received while in a stopped state. If the problem persists, report it for troubleshooting. | | BGP | HIGH | 33554458 | BGP error receiving route refresh message | BGP unable to process route refresh message. | BGP route refresh received while in a stopped state. If the problem persists, report it for troubleshooting. | | BGP | HIGH | 33554459 | BGP error capability message | BGP unable to process received capability. | BGP capability message received while in a stopped state. If the problem persists, report it for troubleshooting. | -| BGP | HIGH | 33554460 | BGP error with nexthopo update | BGP unable to process nexthop update. | BGP received the nexthop update but the nexthop is not reachable in this BGP instance. Report the problem for troubleshooting. | -| BGP | HIGH | 33554461 | Failure to apply label | BGP attempted to attempted to apply a label but could not do so. | This is most likely a bug. If the problem persists, report it for troubleshooting. | +| BGP | HIGH | 33554460 | BGP error with nexthop update | BGP unable to process nexthop update. | BGP received the nexthop update but the nexthop is not reachable in this BGP instance. Report the problem for troubleshooting. | +| BGP | HIGH | 33554461 | Failure to apply label | BGP attempted to apply a label but could not do so. | This is most likely a bug. If the problem persists, report it for troubleshooting. | | BGP | HIGH | 33554462 | Multipath specified is invalid | BGP was started with an invalid ECMP/multipath value. | Correct the ECMP/multipath value supplied when starting the BGP daemon. | | BGP | HIGH | 33554463 | Failure to process a packet | BGP attempted to process a received packet but could not do so. | This is most likely a bug. If the problem persists, report it for troubleshooting. | | BGP | HIGH | 33554464 | Failure to connect to peer | BGP attempted to send open to a peer but couldn't connect. | This is most likely a bug. If the problem persists, report it for troubleshooting. | @@ -62,7 +62,7 @@ The following table lists the HIGH severity ERROR log messages generated by FRR. | EIGRP | HIGH | 50331650 | EIGRP Configuration Error | EIGRP has detected a configuration error.| Correct the configuration issue. If it still persists, report the issue for troubleshooting.| | General | HIGH | 100663297 | Failure to raise or lower privileges | FRR attempted to raise or lower its privileges and was unable to do so. | Ensure that you are running FRR as the frr user and that the user has sufficient privileges to properly access root privileges. | | General | HIGH | 100663298 | VRF Failure on Start | Upon startup, FRR failed to properly initialize and start up the VRF subsystem. | Ensure that there is sufficient memory to start processes, then restart FRR. | -| General | HIGH | 100663299 | Socket Error | When attempting to access a socket, a system error occured and FRR was unable to properly complete the request. | Ensure that there are sufficient system resources available and ensure that the frr user has sufficient permisions to work. | +| General | HIGH | 100663299 | Socket Error | When attempting to access a socket, a system error occurred and FRR was unable to properly complete the request. | Ensure that there are sufficient system resources available and ensure that the frr user has sufficient permissions to work. | | General | HIGH | 100663303 | System Call Error | FRR has detected an error from using a vital system call and has probably already exited. | Ensure permissions are correct for FRR users and groups. Additionally, check that sufficient system resources are available. | | General | HIGH | 100663304 | VTY Subsystem Error | FRR has detected a problem with the specified configuration file. | Ensure the configuration file exists and has the correct permissions for operations. Additionally, ensure that all config lines are correct as well. | | General | HIGH | 100663305 | SNMP Subsystem Error | FRR has detected a problem with the SNMP library it uses. A callback from this subsystem has indicated some error. | Examine the callback message and ensure SNMP is properly set up and working. | @@ -86,7 +86,7 @@ The following table lists the HIGH severity ERROR log messages generated by FRR. | OSPF | HIGH | 134217729 | Failure to process a packet | OSPF attempted to process a received packet but could not do so. | This is most likely a bug. If the problem persists, report it for troubleshooting. | | OSPF | HIGH | 134217730 | Failure to process Router LSA | OSPF attempted to process a router LSA, but there was an advertising ID mismtach with the link ID. | Check the OSPF network configuration for any configuration issue. If the problem persists, report it for troubleshooting.| | OSPF | HIGH | 134217731 | OSPF Domain Corruption | OSPF attempted to process a router LSA, but there was an advertising ID mismtach with the link ID. | Check OSPF network database for a corrupted LSA. If the problem persists, shut down the OSPF domain and report the problem for troubleshooting. | -| OSPF | HIGH | 134217732 | OSPF Initialization failure | OSPF failed to initialized the OSPF default instance. | Ensure there is adequate memory on the device. If the problem persists, report it for troubleshooting. | +| OSPF | HIGH | 134217732 | OSPF Initialization failure | OSPF failed to initialize the OSPF default instance. | Ensure there is adequate memory on the device. If the problem persists, report it for troubleshooting. | | OSPF | HIGH | 134217733 | OSPF SR Invalid DB | OSPF segment routing database is invalid. | This is most likely a bug. If the problem persists, report it for troubleshooting. | | OSPF | HIGH | 134217734 | OSPF SR hash node creation failed | OSPF segment routing node creation failed. | This is most likely a bug. If the problem persists, report it for troubleshooting. | | OSPF | HIGH | 134217735 | OSPF SR Invalid lsa id | OSPF segment routing invalid LSA ID. | Restart the OSPF instance. If the problem persists, report it for troubleshooting. | diff --git a/content/cumulus-linux-55/Monitoring-and-Troubleshooting/Simple-Network-Management-Protocol-SNMP/Configure-SNMP.md b/content/cumulus-linux-55/Monitoring-and-Troubleshooting/Simple-Network-Management-Protocol-SNMP/Configure-SNMP.md index a4c74e80e1..477b48d3fb 100644 --- a/content/cumulus-linux-55/Monitoring-and-Troubleshooting/Simple-Network-Management-Protocol-SNMP/Configure-SNMP.md +++ b/content/cumulus-linux-55/Monitoring-and-Troubleshooting/Simple-Network-Management-Protocol-SNMP/Configure-SNMP.md @@ -32,7 +32,7 @@ cumulus@switch:~$ nv config apply {{%notice note%}} If you intend to run this service within a {{}}, including the {{}}, follow {{}} for configuring the service. -You do not need to run SNMP in the management VRF if you just want to allow SNMP communicaton through the managment VRF interfaces; see {{}}. +You do not need to run SNMP in the management VRF if you just want to allow SNMP communication through the management VRF interfaces; see {{}}. {{%/notice%}} 1. Start the `snmpd` service: @@ -194,7 +194,7 @@ You can authenticate the user in the following ways: - With no authentication password (if you specify `auth-none`) - With an MD5 password -- With a SHA password +- With an SHA password {{< tabs "username" >}} {{< tab "NVUE Commands" >}} diff --git a/content/cumulus-linux-55/Monitoring-and-Troubleshooting/Simple-Network-Management-Protocol-SNMP/Supported-MIBs.md b/content/cumulus-linux-55/Monitoring-and-Troubleshooting/Simple-Network-Management-Protocol-SNMP/Supported-MIBs.md index d21dc3a382..6be386ff43 100644 --- a/content/cumulus-linux-55/Monitoring-and-Troubleshooting/Simple-Network-Management-Protocol-SNMP/Supported-MIBs.md +++ b/content/cumulus-linux-55/Monitoring-and-Troubleshooting/Simple-Network-Management-Protocol-SNMP/Supported-MIBs.md @@ -10,7 +10,7 @@ Below are the MIBs that Cumulus Linux supports, as well as suggested uses for th |
MIB Name | Suggested Uses | | -------- | -------------- | | {{}}
{{}}
{{}}
{{}} | You can enable FRR SNMP support to provide support for OSPF-MIB (RFC-1850), OSPFV3-MIB (RFC-5643), and BGP4-MIB (RFC-1657). | -| {{}} | Cumulus Linux also includes its own BGP unnumbered MIB for BGP unnumbered peers, defined in `/usr/share/snmp/mibs/Cumulus-BGPUN-MIB.txt`, which has the OID `1.3.6.1.4.1.40310.7`.| +| {{}} | Cumulus Linux also includes its own BGP unnumbered MIB for BGP unnumbered peers, defined in `/usr/share/snmp/mibs/Cumulus-BGPUN-MIB.txt`, which has the OID `1.3.6.1.4.1.40310.7`.| | {{}} | Discard counters: Cumulus Linux also includes its own counters MIB, defined in `/usr/share/snmp/mibs/Cumulus-Counters-MIB.txt`. It has the OID `.1.3.6.1.4.1.40310.2`. | | {{}} | Cumulus Linux includes its own resource utilization MIB, which is similar to using `cl-resource-query`. This MIB monitors layer 3 entries by host, route, nexthops, ECMP groups, and layer 2 MAC/BDPU entries. `/usr/share/snmp/mibs/Cumulus-Resource-Query-MIB.txt` defines this MIB, which has the OID `.1.3.6.1.4.1.40310.1`. | | {{}} | SNMP counters. For information on exposing CPU and memory information with SNMP, see this [knowledge base article]({{}}). | diff --git a/content/cumulus-linux-55/Monitoring-and-Troubleshooting/Troubleshooting-Network-Interfaces/Troubleshoot-Layer-1.md b/content/cumulus-linux-55/Monitoring-and-Troubleshooting/Troubleshooting-Network-Interfaces/Troubleshoot-Layer-1.md index d0a06811f4..01f2b6addf 100644 --- a/content/cumulus-linux-55/Monitoring-and-Troubleshooting/Troubleshooting-Network-Interfaces/Troubleshoot-Layer-1.md +++ b/content/cumulus-linux-55/Monitoring-and-Troubleshooting/Troubleshooting-Network-Interfaces/Troubleshoot-Layer-1.md @@ -760,7 +760,7 @@ Because I2C problems can be very pernicious, often showing up again much later a To verify that an I2C failure is occurring, run `sudo tail -F /var/log/syslog` and look for `smbus` or `i2c` or `EEPROM read` errors that continue to appear or appear in bursts. -Based on the failure scenario when tyou discover the issue, choose when to address this issue; immediately or during a maintenance window. +Based on the failure scenario when you discover the issue, choose when to address this issue; immediately or during a maintenance window. - If traffic or the switch operates negatively and you cannot route traffic through a redundant network, you must do something immediately. - If you can route traffic around the failing switch, allowing troubleshooting to proceed on the failed switch, proceed to reroute traffic to find an appropriate time to troubleshoot the failing switch. diff --git a/content/cumulus-linux-55/Network-Virtualization/Ethernet-Virtual-Private-Network-EVPN/Basic-Configuration.md b/content/cumulus-linux-55/Network-Virtualization/Ethernet-Virtual-Private-Network-EVPN/Basic-Configuration.md index 3bc1e47072..7a89e69c79 100644 --- a/content/cumulus-linux-55/Network-Virtualization/Ethernet-Virtual-Private-Network-EVPN/Basic-Configuration.md +++ b/content/cumulus-linux-55/Network-Virtualization/Ethernet-Virtual-Private-Network-EVPN/Basic-Configuration.md @@ -70,7 +70,7 @@ cumulus@leaf01:~$ nv set vrf default router bgp neighbor swp51 address-family l2 cumulus@leaf01:~$ nv config apply ``` -You do not need enable the BGP control plane for all VNIs configured on the switch with NVUE with the `advertise-all-vni` option. FRR **is** aware of any local VNIs and MACs, and hosts (neighbors) associated with those VNIs. +You do not need to enable the BGP control plane for all VNIs configured on the switch with NVUE with the `advertise-all-vni` option. FRR **is** aware of any local VNIs and MACs, and hosts (neighbors) associated with those VNIs. After you run `nv config save`, the NVUE Commands create the following configuration snippet in the `/etc/nvue.d/startup.yaml` file: @@ -275,7 +275,7 @@ router bgp 65101 bgp router-id 10.10.10.1 neighbor swp51 interface remote-as external address-family l2vpn evpn -neighbor swp1 activate +neighbor swp51 activate advertise-all-vni ... ``` @@ -291,7 +291,7 @@ spine01(config)# router bgp 65199 spine01(config-router)# bgp router-id 10.10.10.101 spine01(config-router)# neighbor swp1 interface remote-as external spine01(config-router)# address-family l2vpn evpn -spine01(config-router-af)# neighbor swp51 activate +spine01(config-router-af)# neighbor swp1 activate spine01(config-router-af)# end spine01)# write memory spine01)# exit diff --git a/content/cumulus-linux-55/Network-Virtualization/VXLAN-Devices.md b/content/cumulus-linux-55/Network-Virtualization/VXLAN-Devices.md index 7e6d3ca9f2..d58e51c9ae 100644 --- a/content/cumulus-linux-55/Network-Virtualization/VXLAN-Devices.md +++ b/content/cumulus-linux-55/Network-Virtualization/VXLAN-Devices.md @@ -197,7 +197,7 @@ cumulus@leaf01:~$ ifreload -a ## Automatic VLAN to VNI Mapping -In an EVPN VXLAN environment, you need to map individual VLANs to VNIs. For a single VXLAN device, you can do this with a seperate NVUE command per VLAN; however, this can be cumbersome if you have to configure many VLANS or need to isolate tenants and reuse VLANs. To simplify the configuration, you can use these two commands instead: +In an EVPN VXLAN environment, you need to map individual VLANs to VNIs. For a single VXLAN device, you can do this with a separate NVUE command per VLAN; however, this can be cumbersome if you have to configure many VLANS or need to isolate tenants and reuse VLANs. To simplify the configuration, you can use these two commands instead: - `nv set bridge domain vlan vni auto` configures the specified VLANs to use automatic mapping. - `nv set bridge domain vlan-vni-offset` configures the offset you want to use for the VNIs. For example, if you specify an offset of 10000, the VNI is the VLAN plus 10000. diff --git a/content/cumulus-linux-55/System-Configuration/Authentication-Authorization-and-Accounting/LDAP-Authentication-and-Authorization.md b/content/cumulus-linux-55/System-Configuration/Authentication-Authorization-and-Accounting/LDAP-Authentication-and-Authorization.md index fbe8e4e8d7..64a23c02c6 100644 --- a/content/cumulus-linux-55/System-Configuration/Authentication-Authorization-and-Accounting/LDAP-Authentication-and-Authorization.md +++ b/content/cumulus-linux-55/System-Configuration/Authentication-Authorization-and-Accounting/LDAP-Authentication-and-Authorization.md @@ -57,10 +57,11 @@ Entering incorrect information during the installation process produces configur - Edit the `/etc/nslcd.conf` file to update the LDAP URI and search base DN (see {{}}, below). - Edit the `/etc/nssswitch.conf` file to update the service selections. -Be sure to restart `netd` after editing the files. +Restart `nvued.service` and `nginx-authenticator.service` after editing the files. ``` -cumulus@switch:~$ sudo systemctl restart netd.service +cumulus@switch:~$ sudo systemctl restart nvued.service +cumulus@switch:~$ sudo systemctl restart nginx-authenticator.service ``` {{< expand "Alternative Installation Method Using debconf-utils " >}} @@ -131,7 +132,7 @@ After installation, update the main configuration file (`/etc/nslcd.conf`) to ac This section documents some of the more important options that relate to security and queries. For details on all the available configuration options, read the {{}}. {{%notice note%}} -After first editing the `/etc/nslcd.conf` file and/or enabling LDAP in the `/etc/nsswitch.conf` file, you must restart `netd` with the `sudo systemctl restart netd` command. If you disable LDAP, you need to restart the `netd` service. +After editing the `/etc/nslcd.conf` file or enabling LDAP in the `/etc/nsswitch.conf` file, you must restart the NVUE and nginx-authenticator services with the `sudo systemctl restart nvued.service` command and the `sudo systemctl restart nginx-authenticator.service` command. If you disable LDAP, you must also restart these two services. {{%/notice%}} ### Connection diff --git a/content/cumulus-linux-55/System-Configuration/Authentication-Authorization-and-Accounting/RADIUS-AAA.md b/content/cumulus-linux-55/System-Configuration/Authentication-Authorization-and-Accounting/RADIUS-AAA.md index d12209dd9d..f5306769cf 100644 --- a/content/cumulus-linux-55/System-Configuration/Authentication-Authorization-and-Accounting/RADIUS-AAA.md +++ b/content/cumulus-linux-55/System-Configuration/Authentication-Authorization-and-Accounting/RADIUS-AAA.md @@ -31,7 +31,18 @@ During package installation: ## Configure the RADIUS Client -To configure the RADIUS client, edit the `/etc/pam_radius_auth.conf` file: +To configure the RADIUS client, edit the `/etc/pam_radius_auth.conf` file. + +{{%notice note%}} + +After editing the `/etc/pam_radius_auth.conf` file, you must restart both `nvued.service` and `nginx-authenticator.service`: + +``` +cumulus@switch:~$ sudo systemctl restart nvued.service +cumulus@switch:~$ sudo systemctl restart nginx-authenticator.service +``` + +{{%/notice%}} 1. Add the hostname or IP address of at least one RADIUS server (such as a *{{}}* server on Linux), and the shared secret used to authenticate and encrypt communication with each server. diff --git a/content/cumulus-linux-55/System-Configuration/Authentication-Authorization-and-Accounting/TACACS.md b/content/cumulus-linux-55/System-Configuration/Authentication-Authorization-and-Accounting/TACACS.md index 7bc2fc0798..8139e98862 100644 --- a/content/cumulus-linux-55/System-Configuration/Authentication-Authorization-and-Accounting/TACACS.md +++ b/content/cumulus-linux-55/System-Configuration/Authentication-Authorization-and-Accounting/TACACS.md @@ -41,12 +41,23 @@ After you install the required TACACS+ packages, configure the following require If you use NVUE commands to configure TACACS+, you must also set the priority for the authentication order for local and TACACS+ users, and enable TACACS+. +{{%notice note%}} + +After you change TACACS+ settings, you must restart both `nvued.service` and `nginx-authenticator.service`: + +``` +cumulus@switch:~$ sudo systemctl restart nvued.service +cumulus@switch:~$ sudo systemctl restart nginx-authenticator.service +``` + +{{%/notice%}} + {{< tabs "TabID31 ">}} {{< tab "NVUE Commands ">}} NVUE commands require you to specify the priority for each TACACS+ server. You must set a priority even if you only specify one server. -The following example commmands set: +The following example commands set: - The TACACS+ server priority to 5. - The IP address of the server to 192.168.0.30. - The secret to `mytacac$key`. diff --git a/content/cumulus-linux-55/System-Configuration/Authentication-Authorization-and-Accounting/User-Accounts.md b/content/cumulus-linux-55/System-Configuration/Authentication-Authorization-and-Accounting/User-Accounts.md index 3bf43711c8..ac4ff385fe 100644 --- a/content/cumulus-linux-55/System-Configuration/Authentication-Authorization-and-Accounting/User-Accounts.md +++ b/content/cumulus-linux-55/System-Configuration/Authentication-Authorization-and-Accounting/User-Accounts.md @@ -53,7 +53,7 @@ cumulus@switch:~$ nv config apply You can also run the `nv set system aaa user password ` command to specify the plain text password inline. This command bypasses the `Enter new password` and `Confirm password` prompts but displays the plain text password as you type it. {{%notice note%}} -If you are an NVUE-mangaged user, you can update your own password with the Linux `passwd` command. +If you are an NVUE-managed user, you can update your own password with the Linux `passwd` command. {{%/notice%}} {{< /tab >}} @@ -218,7 +218,7 @@ admin2 FIRST LAST system-admin on ... ``` -To show information about a specific user account, run the run the NVUE `nv show system aaa user ` command: +To show information about a specific user account, run the NVUE `nv show system aaa user ` command: ``` cumulus@switch:~$ nv show system aaa user admin2 diff --git a/content/cumulus-linux-55/System-Configuration/Date-and-Time/Precision Time Protocol-PTP.md b/content/cumulus-linux-55/System-Configuration/Date-and-Time/Precision Time Protocol-PTP.md index 034beda1a1..e8b71f97fc 100644 --- a/content/cumulus-linux-55/System-Configuration/Date-and-Time/Precision Time Protocol-PTP.md +++ b/content/cumulus-linux-55/System-Configuration/Date-and-Time/Precision Time Protocol-PTP.md @@ -250,7 +250,7 @@ Restarting the `switchd` service causes all network ports to reset in addition t delay_mechanism E2E ``` - For a trunk VLAN, add the VLAN configuration to the switch port stanza: set `l2_mode` to `trunk`, `vlan_intf` to the VLAN interface, and `src_ip` to the IP adress of the VLAN interface: + For a trunk VLAN, add the VLAN configuration to the switch port stanza: set `l2_mode` to `trunk`, `vlan_intf` to the VLAN interface, and `src_ip` to the IP address of the VLAN interface: ``` [swp1] @@ -263,7 +263,7 @@ Restarting the `switchd` service causes all network ports to reset in addition t network_transport UDPv4 ``` - For a switch port VLAN, add the VLAN configuration to the switch port stanza: set `l2_mode` to `access`, `vlan_intf` to the VLAN interface, and `src_ip` to the IP adress of the VLAN interface: + For a switch port VLAN, add the VLAN configuration to the switch port stanza: set `l2_mode` to `access`, `vlan_intf` to the VLAN interface, and `src_ip` to the IP address of the VLAN interface: ``` [swp2] @@ -1112,7 +1112,7 @@ To create a custom profile: - Update any of the profile settings you want to change (`announce-interval`, `delay-req-interval`, `priority1`, `sync-interval`, `announce-timeout`, `domain`, `priority2`, `transport`, `delay-mechanism`, `local-priority`). - Set the custom profile to be the current profile. -The following example commands create a custom profile called CUSTOM1 based on the predifined profile ITU 8275-1. The commands set the `domain` to 28 and the `announce-timeout` to 3, then set `CUSTOM1` to be the current profile: +The following example commands create a custom profile called CUSTOM1 based on the predefined profile ITU 8275-1. The commands set the `domain` to 28 and the `announce-timeout` to 3, then set `CUSTOM1` to be the current profile: ``` cumulus@switch:~$ nv set service ptp 1 profile CUSTOM1 @@ -1126,7 +1126,7 @@ cumulus@switch:~$ nv config apply {{< /tab >}} {{< tab "Linux Commands ">}} -The following example `/etc/ptp4l.conf` file creates a custom profile based on the predifined profile ITU 8275-1 and sets the `domain` to 28 and the `announce-timeout` to 3. +The following example `/etc/ptp4l.conf` file creates a custom profile based on the predefined profile ITU 8275-1 and sets the `domain` to 28 and the `announce-timeout` to 3. ``` cumulus@switch:~$ sudo nano /etc/ptp4l.conf @@ -1366,10 +1366,10 @@ You can configure the following monitor settings: | ----- | ----------- | | `nv set service ptp monitor min-offset-threshold` | Sets the minimum difference allowed between the master and slave time. You can set a value between -1000000000 and 0 nanoseconds. The default value is -50 nanoseconds.| | `nv set service ptp monitor max-offset-threshold` | Sets the maximum difference allowed between the master and slave time. You can set a value between 0 and 1000000000 nanoseconds. The default value is 50 nanoseconds.| -| `nv set service ptp monitor path-delay-threshold` | Sets the mean time that PTP packets take to travel between the master and slave. You can set a value between 0 and 1000000000 nanoseconds . The default value is 200 nanoseconds. | +| `nv set service ptp monitor path-delay-threshold` | Sets the mean time that PTP packets take to travel between the master and slave. You can set a value between 0 and 1000000000 nanoseconds. The default value is 200 nanoseconds. | | `nv set service ptp monitor max-timestamp-entries` | Sets the maximum number of timestamp entries allowed. Cumulus Linux updates the timestamps continuously. You can specify a value between 100 and 200. The default value is 100 entries.| -The following example sets the minimum offeset threshold to -1000, the maximum offeset threshold to 1000, and the path delay threshold to 300: +The following example sets the minimum offset threshold to -1000, the maximum offset threshold to 1000, and the path delay threshold to 300: ``` cumulus@switch:~$ nv set service ptp 1 monitor min-offset-threshold -1000 @@ -1389,7 +1389,7 @@ You can configure the following monitor settings manually in the `/etc/ptp4l.con | `offset_from_master_max_threshold` | Sets the maximum difference allowed between the master and slave time. You can set a value between 0 and 1000000000 nanoseconds. The default value is 50 nanoseconds. | | `mean_path_delay_threshold` | Sets the mean time that PTP packets take to travel between the master and slave. You can set a value between 0 and 1000000000 nanoseconds. The default value is 200 nanoseconds. | -The following example sets the minimum offeset threshold to -1000, the maximum offeset threshold to 1000, and the path delay threshold to 300: +The following example sets the minimum offset threshold to -1000, the maximum offset threshold to 1000, and the path delay threshold to 300: ``` cumulus@switch:~$ sudo nano /etc/ptp4l.conf @@ -1445,11 +1445,11 @@ You can configure the following monitor settings manually in the `/etc/ptp4l.con | Parameter | Description | | ----- | ----------- | -| `tsmonitor_num_log_sets` | Sets the maxumum number of log sets allowed. You can specify a value between 2 and 4. The default value is 3.| +| `tsmonitor_num_log_sets` | Sets the maximum number of log sets allowed. You can specify a value between 2 and 4. The default value is 3.| | `tsmonitor_num_log_entries` | Sets the maximum number of log entries allowed in a log set. You can specify a value between 4 and 8. The default value is 4.| | `tsmonitor_log_wait_seconds` | Sets the number of seconds to wait before logging back-to-back violations. You can specify a value between 0 and 60. The default value is 1.| -The following example sets the maxumum number of log sets allowed to 4, the maximum number of log entries allowed to 6, and the violation log interval to 10: +The following example sets the maximum number of log sets allowed to 4, the maximum number of log entries allowed to 6, and the violation log interval to 10: ``` cumulus@switch:~$ sudo nano /etc/ptp4l.conf @@ -1487,7 +1487,7 @@ PTP monitoring provides commands to show counters for violations as well as the | Command | Description | | -------- | ----------- | | `nv show service ptp monitor timestamp-log` | Shows the last 25 PTP timestamps. | -| `nv show service ptp monitor violations` | Shows the threshold violation count and the last time a violation of a specific type occured. | +| `nv show service ptp monitor violations` | Shows the threshold violation count and the last time a violation of a specific type occurred. | | `nv show service ptp 1 monitor violations log acceptable-master` | Shows logs with violations that occur when a PTP server not in the Acceptable Master table sends an Announce request. | | `nv show service ptp 1 monitor violations log forced-master` | Shows logs with violations that occur when a forced master port gets a higher clock. | | `nv show service ptp 1 monitor violations log max-offset` | Shows logs with violations that occur when the timestamp offset is higher than the max offset threshold. | @@ -1880,7 +1880,7 @@ network_transport UDPv4 ### PTP Traffic Shaping -To improve performance on the NVIDA Spectrum 1 switch for PTP-enabled ports with speeds lower than 100G, you can enable a pre-defined traffic shaping profile. For example, if you see that the PTP timing offset varies widely and does not stabilize, enable PTP shaping on all PTP enabled ports to reduce the bandwidth on the ports slightly and improve timing stabilization. +To improve performance on the NVIDIA Spectrum 1 switch for PTP-enabled ports with speeds lower than 100G, you can enable a pre-defined traffic shaping profile. For example, if you see that the PTP timing offset varies widely and does not stabilize, enable PTP shaping on all PTP enabled ports to reduce the bandwidth on the ports slightly and improve timing stabilization. {{%notice note%}} - Switches with Spectrum-2 and later do not support PTP shaping. diff --git a/content/cumulus-linux-55/System-Configuration/Netfilter-ACLs.md b/content/cumulus-linux-55/System-Configuration/Netfilter-ACLs.md index 6f36245a35..6262b6e05d 100644 --- a/content/cumulus-linux-55/System-Configuration/Netfilter-ACLs.md +++ b/content/cumulus-linux-55/System-Configuration/Netfilter-ACLs.md @@ -138,7 +138,7 @@ The incremental nonatomic update operation follows this order: 2. Cumulus Linux checks if the rules in a table are different from installation time; if a table does not have any changes, it does not reinstall the rules. 3. If there are changes in a table, the new rules populate in new groups or slices in hardware, then that table switches over to the new groups or slices. 4. Finally, old resources for that table free up. This process repeats for each of the tables listed above. -5. If there are isufficient resources to hold both the new rule set and old rule set, Cumulus Linux tries the regular nonatomic mode, which interrupts network traffic. +5. If there are insufficient resources to hold both the new rule set and old rule set, Cumulus Linux tries the regular nonatomic mode, which interrupts network traffic. 6. If the regular nonatomic update fails, Cumulus Linux reverts back to the previous rules. To always reload `switchd` with nonatomic updates: @@ -1359,7 +1359,7 @@ To work around this limitation, set the rate and burst for all these rules to th ### Where to Assign Rules - If you assign a switch port to a bond, you must assign any egress rules to the bond. -- When using the OUTPUT chain, you must assign rules to the source. For example, if you assign a rule to the switch port in the direction of traffic but the source is a bridge (VLAN), the rule does not affect the traffic and you must applied the rule to the bridge. +- When using the OUTPUT chain, you must assign rules to the source. For example, if you assign a rule to the switch port in the direction of traffic but the source is a bridge (VLAN), the rule does not affect the traffic and you must apply the rule to the bridge. - If you need to apply a rule to all transit traffic, use the FORWARD chain, not the OUTPUT chain. ### ACL Rule Installation Failure @@ -1378,7 +1378,7 @@ failed. Entity MIB
1.3.6.1.2.1.99 --> Entity Sensor MIB
1.3.6.1.2.1.23 --> rip2
1.3.6.1.2.1.2 --> interface/interfaces
1.3.6.1.2.1.31 --> ifMIB
1.3.6.1.2.1.4 --> IP
1.3.6.1.2.1.25 --> hostResource | 5.0.1-5.6.0 | | | [3135952](#3135952)
| PAM4 split cables (such as 2x100G, 4x100G, and 4x50G) do not work with a forced speed setting (when auto-negotiation is off) as the default speed enabled is for NRZ mode (such as 100G_4X). To work around this issue, set the appropriate lanes for forced speed (with auto-negotation off) with the ethtool -s swpX speed autoneg off lanes command. For example:
cumulus@switch:~$ sudo ethtool -s swp1 speed 100000 autoneg off lanes 2
| 5.2.0-5.6.0 | | | [3122301](#3122301)
| On the NVIDIA SN4700 switch, inserting and removing the PSU might cause loss of frames. | 5.2.0-5.6.0 | | | [3115242](#3115242)
| When you configure two VNIs in the same VLAN, ifupdown2 shows a vlan added to two or more VXLANS warning, which is only issued after the VNI is already added to the bridge. This leaves the new VNI in the PVID even if there is already an existing VNI configured in that PVID. | 5.1.0-5.6.0 | | @@ -116,7 +126,6 @@ pdfhidden: True | [2891255](#2891255)
| CVE-2021-39925: Buffer overflow in the Bluetooth SDP dissector in Wireshark 3.4.0 to 3.4.9 and 3.2.0 to 3.2.17 allows denial of service via packet injection or crafted capture file
Vulnerable: <= 2.6.20-0+deb10u1Fixed: 2.6.20-0+deb10u2 | 4.0.0-4.4.1, 5.0.0-5.6.0 | 4.4.2-4.4.5| | [2890681](#2890681)
| CVE-2021-42771: relative path traversal in Babel, a set of tools for internationalising Python applications, could result in the execution of arbitrary code
Vulnerable: 2.6.0+dfsg.1-1Fixed: 2.6.0+dfsg.1-1+deb10u1 | 4.0.0-4.4.1, 5.0.0-5.6.0 | 4.4.2-4.4.5| | [2867042](#2867042)
| When connecting the NVIDIA SN4600 switch to another NVIDIA Spectrum switch, you must use auto-negotiation mode (not force mode); otherwise the switch might use the wrong Tx configuration. | 5.0.0-5.6.0 | | -| [2847919](#2847919)
| Configuring a router with the REST API through the switch front panel ports (swps) is supported in the default VRF only. To work around this issue, use the localHost IP address or the MGMT IP address to configure router using the Rest API. | 5.0.0-5.6.0 | | | [2847755](#2847755)
| When you use NCLU to remove the configuration for a peer that is a member of a group but also has other peer-specific configuration, you must remove the peer-specific configuration before you delete the peer in a separate NCLU commit. | 5.0.0-5.6.0 | | | [2823307](#2823307)
| Cumuls Linux does not support a bond with more than 64 ports. Any configuration with more than 64 ports in a bond changes all ports to down when you apply the configuration. | 5.0.0-5.6.0 | | | [2736108](#2736108)
| When you change the VRRP advertisement interval on the master, the master advertisement interval field in the show vrrp command output does not show the updated value. | 4.4.0-4.4.5, 5.0.0-5.6.0 | | @@ -136,17 +145,20 @@ pdfhidden: True | Issue ID | Description | Affects | Fixed | |--- |--- |--- |--- | -| [3647426](#3647426)
None | If BGP remote-as is set to an integer and you try to configure the local-as for a BGP instance, you see the following error:
% AS specified for local as is the same as the remote as and this is not allowed
This configuration is not allowed; it is considered to be eBGP and local preference is not advertised. | 5.0.0-5.5.1 | 5.6.0| -| [3610611](#3610611)
| Cumulus Linux assigns an IPv4 and IPv6 loopback address to a VRF interface by default. As a result, ping and route lookups for unique remote IP addresses on different VTEPs might not work if there is no source IP on the switch that belongs to the same subnet. To work around this issue, remove the loopback address on the VRF with the nv unset vrf loopback ip address
command. Only remove the loopback address if you are not running NTP as NTP requires a loopback address to work. Alternatively, you can change the ping command to use a source address (such as an SVI address) with the ip vrf exec ping -I command. | 5.5.0-5.6.0 | | -| [3609128](#3609128)
| When you use vi with root or sudo, visual mode is enabled by default due to a missing vimrc configuration file. This makes it difficult to copy and paste into vi and might introduce a security issue. | 5.5.0-5.6.0 | | +| [3663182](#3663182)
| Changing non-default BGP timers with NCLU or vtysh commands sets the hold time and keep alive interval to 0 seconds. To work around this issue, restart the FRR service with the sudo systemctl restart frr.service command. | 5.3.1-5.6.0 | | +| [3647426](#3647426)
None | If BGP remote-as is set to an integer and you try to configure the local-as for a BGP instance, you see the following error:
% AS specified for local as is the same as the remote as and this is not allowed
This configuration is not allowed; it is considered to be eBGP and local preference is not advertised. | 5.0.0-5.5.1 | 4.3.2-4.4.5, 5.6.0| +| [3610611](#3610611)
| Cumulus Linux assigns an IPv4 and IPv6 loopback address to a VRF interface by default. As a result, ping and route lookups for unique remote IP addresses on different VTEPs might not work if there is no source IP on the switch that belongs to the same subnet. To work around this issue, remove the loopback address on the VRF with the nv unset vrf loopback ip address command. Only remove the loopback address if you are not running NTP as NTP requires a loopback address to work. Alternatively, you can change the ping command to use a source address (such as an SVI address) with the ip vrf exec ping -I command. | 5.5.0-5.6.0 | | +| [3609128](#3609128)
| When you use vi with root or sudo, visual mode is enabled by default due to a missing vimrc configuration file. This makes it difficult to copy and paste into vi. In CL5.7.0, the default configuration now includes set mouse-=a
In addition, the CL5.7.0 default configuration for vi now disables modelines, which can be a security risk. | 5.5.0-5.6.0 | | | [3599699](#3599699)
| Cumulus Linux assigns an IPv4 and IPv6 loopback address to a VRF interface by default. As a result, ping and route lookups for unique remote IP addresses on different VTEPs might not work if there is no source IP on the switch that belongs to the same subnet. To work around this issue, remove the loopback address on the VRF with the nv unset vrf loopback ip address
command. Only remove the loopback address if you are not running NTP as NTP requires a loopback address to work. Alternatively, you can change the ping command to use a source address (such as an SVI address) with the ip vrf exec ping -I command. | 5.5.0-5.6.0 | | | [3585467](#3585467)
| NVUE and ip link show traditional bridge VLAN subinterface counts incorrectly. The ingress (Rx) count increments correctly but the egress (Tx) count does not increment. This issues occurs because the hardware does not support transmit counters for a VLAN subinterface; therefore, no statistics from the hardware are updated. Statistics for software forwarded packets show correctly. | 5.0.0-5.6.0 | | +| [3582826](#3582826)
| When you enable the FRR SNMP agent (agentx) and configure routing adjacencies with short timers (dead, keepalive, and hold time), the routing adjacencies might go down in certain scenarios; for example when you have frequent or concurrent client SNMP requests, you use custom SNMP MIB extensions, you poll OIDs with large responses, or during high CPU load. To work around this issue, you can increase the routing adjacency timers to accommodate SNMP processing. | 5.5.0-5.6.0 | | +| [3580435](#3580435)
| On the NVIDIA SN2410 switch with an Innodisk SSD, you might see the following message in syslog:
smartd[501]: Device: /dev/sda [SAT], CHECK POWER STATUS spins up disk (0x00 -> 0xff)
This is a cosmetic issue and does not affect how the switch operates. To prevent this message from occurring, run the hdparm -S 24 /dev/sda command to change the HD timeout. | 5.3.1-5.6.0 | | | [3576949](#3576949)
| When you run the NVUE nv set service snmp listening-address localhost vrf or nv set service snmp listening-address localhost-v6 vrf command to configure the SNMP listening address, Cumulus Linux applies the listening address to the default VRF instead of the VRF you specify. | 5.3.0-5.6.0 | | | [3573800](#3573800)
| After you apply a change to the router MAC address on an SVI with the ifreload -a command, the old router MAC address still remains in the FDB table. To work around this issue, remove the old router MAC address with the sudo bridge fdb del dev bridge vlan command. | 5.3.1-5.6.0 | | | [3567708](#3567708)
| In an EVPN multihoming environment with VRRP, when the master VRRP router fails, the standby router takes around 30 seconds to become active. | 5.3.1-5.6.0 | | | [3566980](#3566980)
| When running DHCP relay for IPv6 and a downstream interface flaps more than once, relaying might stop working. To recover, restart the dhcrelay6 service, making sure the specified downstream interfaces are up and running. | 5.5.0-5.6.0 | | | [3560622](#3560622)
| When you configure a route distinguisher (RD) or a route target (RT) manually for layer 2 VNIs, type-1 routes are not properly updated, type-1 EVI routes with the old RD are not properly withdrawn, and type-1 ES routes do not have the corresponding layer 2 VNI route target updated. | 5.0.0-5.5.1 | 5.6.0| -| [3554231](#3554231)
None | CVE-2023-38408: The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009
Mitigation: Do not use ssh-agent forwarding (the man page for ssh_config says that "agent forwarding should be enabled with caution"), or start the ssh-agent program with the -P option to allow only specific PKCS#11 libraries (or none with -P '')
For Cumulus Linux 4.3.2, the /usr/bin/ssh-agent program has all permissions turned off (chmod 0) to prevent its execution if a vulnerable version is detected. | 4.0.0-4.4.5, 5.0.0-5.6.0 | | +| [3554231](#3554231)
None | CVE-2023-38408: The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009
Mitigation: Do not use ssh-agent forwarding (the man page for ssh_config says that "agent forwarding should be enabled with caution"), or start the ssh-agent program with the -P option to allow only specific PKCS#11 libraries (or none with -P '')
For Cumulus Linux 4.3.2, the /usr/bin/ssh-agent program has all permissions turned off (chmod 0) to prevent its execution if a vulnerable version is detected. | 4.0.0-4.3.1, 5.0.0-5.6.0 | 4.3.2-4.4.5| | [3549138](#3549138)
| In an EVPN environment with ARP suppression enabled, when a host sends a unicast ARP request to a remote host, the ARP reply is duplicated. It is replied once by the remote host and once by the VTEP. | 5.5.0-5.5.1 | 5.6.0| | [3541912](#3541912)
| Collecting a cl-support file in a high VNI and interface environment can result in an out-of-memory (OOM) event on the switch. An OOM event can cause critical services to restart and might impact traffic. | 5.1.0-5.5.1 | 5.6.0| | [3541518](#3541518)
| When you remove the update-source configuration for a BGP neighbor, the peering is reset if the neighbor is a member of a peer group with the same update-source configuration. | 5.5.0-5.5.1 | 5.6.0| @@ -154,6 +166,7 @@ pdfhidden: True | [3534718](#3534718)
| The BGP command to suppress longer prefixes inside the aggregate address before sending updates (nv set vrf router bgp address-family aggregate-route
summary-only or vtysh router bgp aggregate-address
summary-only) does not suppress more specific routes from being exported into the EVPN routing table and advertised as EVPN type-5 routes. To work around this issue, announce EVPN type-5 routes by adding an additional outbound policy or export policy to filter out the more specific routes. | 5.5.0-5.6.0 | | | [3528359](#3528359)
| A switchd assertion crash occurs after KVD resource exhaustion in the SDK because entries are in a pending delete state, which causes an ECMP allocation failure. | 5.5.0-5.5.1 | 5.6.0| | [3526004](#3526004)
| For layer 3 VNIs, Cumulus Linux automatically creates an SVI name that includes an underscore (for example, vlan4036_l3), which is not allowed in SVI names. As a result, commands such as nv show interface for the SVI show an error. The underscore (_) character is now allowed in SVI names. | 5.5.0-5.5.1 | 5.6.0| +| [3522524](#3522524)
| FRR does not allow eBGP multi hop configuration on unnumbered BGP neighbors. | 5.5.0-5.6.0 | | | [3517376](#3517376)
| When you use CMIS specification based optics, the l1-show command output provides incorrect values for digital diagnostics (TX Power and RX Power). To work around this issue, run the mlxlink command with either the -m or --cable --ddm flags. | 5.5.0-5.5.1 | 5.6.0| | [3509445](#3509445)
| If a BGP numbered session is in a non-established state, SNMP walk commands to the system might time out when the BGPVRF MIB is included in the OIDs to collect. In addition, FRR might report warnings about AgentX in the log files. | 5.5.0-5.5.1 | 5.6.0| | [3498939](#3498939)
| In an EVPN environment, VM migration (IP and MAC address migration) might not work because the new local VTEP to which the VM migrates does not install the entry in the kenel. To work around this issue, restart the switchd service. | 5.4.0-5.5.1 | 5.6.0| @@ -163,6 +176,7 @@ pdfhidden: True | [3491259](#3491259)
| When BGP receives an EVPN type-5 route with a gateway IP overlay attribute, the gateway IP overlay attribute in the attr memory (which is already inserted in the attribute hash) might change. As a result, the modified attr memory might match with another attr in the attribute hash, which produces duplicate entries in the hash table. As a result, BGP might crash when deleting one of the duplicate attr structures. | 5.0.0-5.5.1 | 5.6.0| | [3488136](#3488136)
| When zebra receives route updates that include both a route with a recursive next hop and the route used to resolve that next hop, zebra might mark the route with the recursive next hop as inactive. To work around this issue, reprocess the route updates by running the appropriate clear command for the protocol in use. For example, for BGP, clear inbound routes from the relevant neighbor using the nv action clear vrf router bgp neighbor address-family in command. | 4.2.1-5.5.1 | 5.6.0| | [3486102](#3486102)
| SNMP and TACACS secrets are shown in cleartext. | 5.5.0-5.5.1 | 5.6.0| +| [3484058](#3484058)
| When you power on the NVIDIA SN3420 switch with no connected cables, the QSFP ports LEDs light in amber. | 5.3.0-5.6.0 | | | [3479786](#3479786)
| The switchd service does not handle certain route and next hop updates, which causes a synchronization loop. For example, in a VRF route leaking configuration, where a next hop group spans across multiple VRFs, when one of the routes is withdrawn and the next hop is no longer used, switchd has problems synchronizing other next hops in the group
To work around this issue, disable next hop groups in zebra with the vtysh zebra nexthop proto only command, and then reboot the switch. | 5.3.0-5.5.1 | 5.6.0| | [3474391](#3474391)
| The SNMP MIB definition file /usr/share/snmp/mibs/Cumulus-BGPVRF-MIB.txt does not define the INDEX of the bgpPeerEntry correctly. This issue does not impact SNMP functionality for this MIB. | 4.3.1-5.5.1 | 5.6.0| | [3472865](#3472865)
| The json output for the vtysh -c ‘show bgp all json command is missing a string key in front of the list of routes under the l2vpnevpn address family. | 5.4.0-5.5.1 | 5.6.0| @@ -174,7 +188,7 @@ pdfhidden: True | [3455078](#3455078)
| When you bring down or delete a bridge or all interfaces on the switch, you see the following error message in the /var/log/switchd.log file:
ERR bridge destroy for vlan  bridge_id  vfid  failed: Resource is in use
The errors are temporary and have no impact on functionality or traffic. | 5.5.0-5.5.1 | 5.6.0| | [3452763](#3452763)
| When you use the NVUE API with TACACS+, users might see a 403 Forbidden message if no TACACS+ user has logged in some other way, such as with SSH. To work around this issue, log in any TACACS+ user through SSH before you use the NVUE API with TACACS+ users, or run the following commands:
cumulus@switch:~$ sudo touch /run/tacacs_client_mapcumulus@switch:~$ sudo chown root:shadow /run/tacacs_client_mapcumulus@switch:~$ sudo chmod 0644 /run/tacacs_client_map
| 5.5.0-5.5.1 | 5.6.0| | [3452732](#3452732)
| The nv set router policy ext-community-list rule ext-community rt command does not generate the standard based BGP community list. As a result, routes do not match the expected community list. To work around this issue, create a snippet to add the policy configuration to the /etc/frr/frr.conf file, then patch the configuration. For example:
cumulus@switch:~$ sudo nano frr_policy.yaml- set:
system:
config:
snippet:
frr.conf: \|
bgp extcommunity-list standard EXTCOMMUNITY1 seq 10 permit rt 65102:10
cumulus@switch:~$ nv config patch frr_policy.yaml
| 5.5.0-5.6.0 | | -| [3452681](#3452681)
| When you run the NVUE nv show system aaa tacacs authorization commands to show per command authorization for a specific TACACS+ user privilege level, you see the following error:
cumulus@switch:~$ nv show system aaa tacacs authorization 1Error: GET /nvue_v1/system/aaa/tacacs/authorization/1?rev=operational responded with 404 NOT FOUND
| 5.5.0-5.6.0 | | +| [3452681](#3452681)
| When you run the NVUE nv show system aaa tacacs authorization commands to show per command authorization for a specific TACACS+ user privilege level, you see an error message similar to Error: GET /nvue_v1/system/aaa/tacacs/authorization/1?rev=operational responded with 404 NOT FOUND. | 5.5.0-5.6.0 | | | [3448984](#3448984)
| If you use NVUE to apply a configuration when the optional TACACS+ packages are not installed on the switch, you might see messages similar to the following in the /var/log/syslog file when auditd restarts (for example, when the switch reboots):
audispd: Unable to stat /sbin/audisp-tacplus (No such file or directory)
audispd: Skipping audisp-tacplus.conf plugin due to errors
These messages do not affect the functionality of the switch. | 5.5.0-5.5.1 | 5.6.0| | [3447762](#3447762)
| If the NVUE startup.yaml configuration file is invalid, the nv config apply startup command times out without providing details on the error. | 5.4.0-5.5.1 | 5.6.0| | [3445841](#3445841)
| FRR does not apply Type-0 ESI configuration for EVPN multihoming bonds consistently after an FRR service reload. This issue occurs because the system MAC address value (es-sys-mac) is only compatible with a 3-byte Ethernet segment ID (es-id) for Type-3 ESIs, but still renders even when the Ethernet segment ID is 10 bytes for Type-0 ESIs. To work around this issue, configure EVPN multihoming bonds with a Type-3 ESI (es-sys-mac plus a 3-byte es-id). | 5.0.0-5.6.0 | | @@ -184,15 +198,15 @@ pdfhidden: True | [3428677](#3428677)
| In certain cases, Cumulus Linux does not process next hop updates because the zebra IP routing manager thinks the state of the next hops is unchanged. As a result, route installation fails and remains in a rejected state. | 5.3.0-5.6.0 | | | [3424967](#3424967)
| sudo for TACACS+ users with privilege level 15 does not work when the TACACS+ server is to be reached through the default VRF (with vrf=default set in the /etc/tacplus_servers file). To work around this issue, specify the interface name that the default VRF uses in the vrf= setting of the /etc/tacplus_servers file or run the NVUE nv set system aaa tacacs vrf command. If you don't run either command, a TACACS+ user with privilege level 15 can run vrf task exec default sudo ... to execute the sudo command using the TACACS+ server on the default VRF. | 5.0.0-5.6.0 | | | [3419940](#3419940)
| When generating a cl-support file either manually or when an issue occurs on the system, you see the following kernel error messages:
'Register access failed (reg_id=0x9029, status=0x4)' followed by a hex dump of a few lines
This error message is benign and has no functional impact. | 5.5.0-5.5.1 | 5.6.0| +| [3419928](#3419928)
| The NVUE PIM timer command option names keep-alive and rp-keep-alive are inconsistent and need to change to keepalive and rp-keepalive. | 5.4.0-5.6.0 | | | [3413785](#3413785)
| To reach the TACACS+ server through the default VRF, you must specify the egress interface you use in the default VRF. Either run the NVUE nv set system aaa tacacs vrf command (for example, nv set system aaa tacacs vrf swp51) or set the vrf= option in the /etc/tacplus_servers file (for example, vrf=swp51). A similar issue might prevent TACACS+ users with privilege level 15 from using sudo if the TACACS+ server is reachable only on the default VRF. If this occurs, and you do not run the above configuration workaround, the TACACS+ user with privilege level 15 can use vrf task exec default sudo ... to execute the sudo command using the TACACS+ server on the default VRF. | 5.0.0-5.5.1 | 5.6.0| | [3405024](#3405024)
| You cannot remove PBR map configuration with source and destination rules. To work around this issue, delete the entire PBR map clause. | 5.5.0-5.6.0 | | -| [3395489](#3395489)
| On a switch running MLAG, when you configure QoS buffer settings, MLAG peering resets. | 5.4.0-5.6.0 | | | [3394674](#3394674)
| If you restart FRR with the log file debugging level set to informational, BGP crashes. | 5.4.0-5.5.1 | 5.6.0| | [3378733](#3378733)
| After you add or delete a static MAC entry on the bridge FDB, a core dump occurs if the interface is VXLAN and the MAC address is 00:00:00:00:00:00. | 5.4.0-5.5.1 | 5.6.0| | [3368217](#3368217)
None | When daylight saving time changes, the MLAG initDelay timer resets and all MLAG bonds go down. | 4.4.4-4.4.5, 5.2.1-5.6.0 | | -| [3362113](#3362113)
| If you restore an NVUE startup.yaml file after upgrade that includes breakout ports with QoS configuration or you run the nv config patch command to update a configuration with a yaml file that includes breakout ports with QoS configuration, the NVUE configuration fails to apply and subsequent attempts to run nv config apply fail with the following message:
cumulus@switch:~$ nv config applyInvalid config [rev_id: 11]
qos config is not supported on following invalid interface: swp1s0. Supported on swp and bond interface types
To work around this issue, run nv unset on the configured QoS settings, then apply the breakout port configuration before you configure QoS. Alternatively, you can remove the QoS configuration from the yaml file and patch it separately after applying the breakout configuration. | 5.4.0-5.6.0 | | +| [3362113](#3362113)
| If you restore an NVUE startup.yaml file after upgrade that includes breakout ports with QoS configuration or you run the nv config patch command to update a configuration with a yaml file that includes breakout ports with QoS configuration, the NVUE configuration fails to apply and subsequent attempts to run nv config apply fail with the message similar to Invalid config [rev_id: 11] qos config is not supported on following invalid interface: swp1s0. Supported on swp and bond interface types. To work around this issue, run nv unset on the configured QoS settings, then apply the breakout port configuration before you configure QoS. Alternatively, you can remove the QoS configuration from the yaml file and patch it separately after applying the breakout configuration. | 5.4.0-5.6.0 | | | [3350027](#3350027)
| If you uninstall dynamic NAT rules and switchd restarts before all the dynamic NAT flows age out and are deleted, you might see dynamic flow deletion errors in switchd.log. These errors do not affect new dynamic NAT flows from new NAT rules. | 5.4.0-5.6.0 | | -| [3347677](#3347677)
| In an MLAG configuration, when a link failure occurs on the peerlink or the peerlink shuts down, the switch in the secondary role attracts traffic to its local VTEP as it advertises the local VTEP IP address momentarily just before the VXLAN device is protodown. This traffic is dropped for a brief moment (between 5 and 10 seconds) because the MLAG bonds on the secondary switch are already protodown
In a proposed fix in the MR !226, we are not flapping the IP on vxlan device on secondary clag device on peerlink down trigger. This ensures smooth traffic flow and no convergence issue seen in system test bed with this fix. | 5.1.0-5.6.0 | | +| [3347677](#3347677)
| In an MLAG configuration, when a link failure occurs on the peerlink or the peerlink shuts down, the switch in the secondary role attracts traffic to its local VTEP as it advertises the local VTEP IP address momentarily just before the VXLAN device is protodown. This traffic is dropped for a brief moment (between 5 and 10 seconds) because the MLAG bonds on the secondary switch are already protodown. | 5.1.0-5.6.0 | | | [3347538](#3347538)
| When connecting NVIDIA-to-NVIDIA in PAM4, you must enable auto-negotiation. | 5.4.0-5.6.0 | | | [3345054](#3345054)
| The NVUE nv show interface qos command takes a significant time to show output or times out. To work around this issue, use specific QoS commands. For example, to show congestion control information, run the nv show interface qos congestion-control command. | 5.4.0-5.6.0 | | | [3344846](#3344846)
| The Spectrum-3 hardware configuration is not optimized for the best PTP accuracy when using 25GbE. You might see higher than expected PTP offsets on this platforms and interface speed. | 5.4.0-5.5.1 | 5.6.0| @@ -202,21 +216,21 @@ pdfhidden: True | [3329518](#3329518)
| When using TACACS+, if the /etc/nsswitch.conf file specifies passwd: files tacplus (files is listed before tacplus), a user that is present in both the local /etc/passwd file and the TACACS+ server cannot log into the switch. NVIDIA recommends that when using TACACS+, you list tacplus before files in /etc/nsswitch.conf. When using NVUE, ensure that tacacs has priority over local. | 5.4.0-5.6.0 | | | [3327477](#3327477)
| If you use su to change to a user specified through TACACS+, the user becomes the local tacacs0 thru tacacs15 user instead of the named user to run sudo commands. As a result, the named user password might not match the local tacacs0 thru tacacs15 user password. | 3.7.0-3.7.16, 4.0.0-4.4.5, 5.0.0-5.6.0 | | | [3326659](#3326659)
| If you have a large number of MAC addresses, they do not age out at the MAC ageing timeout value configured on the switch. It might take up to 30 seconds more for the MAC addresses to age out and be deleted from the hardware. To work around this issue, wait for the ageing timeout value plus 30 seconds to allow for the MAC addresses to age out and be deleted from the hardware. | 5.4.0-5.6.0 | | -| [3308191](#3308191)
| If you try to set an unsupported interface speed together with FEC, the nv config apply command succeeds but Cumulus Linux ignores the FEC configuration and configures the default FEC setting for the chosen speed. There is no warning or error message. | 5.4.0-5.6.0 | | -| [3269691](#3269691)
| When you restart the LLDP service, you see a broken pipe error and a log message in the lldpd.service logs. This error does not affect LLDP functionality. | 5.4.0-5.6.0 | | +| [3293114](#3293114)
| In Cumulus Linux 5.4 and earlier, the command to enable Neighbor Discovery (ND) router advertisement is inverted and causes confusion; nv set interface ip neighbor-discovery router-advertisement enable off. In Cumulus Linux 5.5 and later, the command to enable router advertisement is updated to nv set interface ip neighbor-discovery router-advertisement enable on. | 5.3.0-5.5.1 | 5.6.0| | [3266197](#3266197)
| When you disable BGP globally with the nv set router bgp enable off command, applying the configuration with NVUE might fail due to an FRR reload failure. | 5.2.0-5.6.0 | | | [3264269](#3264269)
| When you change the BGP router ID that causes a change to an EVPN VNI RD, EVPN EAD-per-EVI routes are not updated properly. | 5.3.0-5.6.0 | | | [3258232](#3258232)
| If you use NVUE to configure multiple SNMP listener addresses at the same time, the SNMP service fails to start. To work around this issue, configure multiple SNMP listener addresses one at a time. | 5.3.0-5.6.0 | | | [3241567](#3241567)
| When you apply switch configuration for the first time on a freshly booted switch, you might see the error message Failed to start Hostname Service when you run the nv config apply command after setting the hostname with nv set system hostname. To work around this issue, run the nv config apply command a second time. | 5.3.0-5.6.0 | | | [3232091](#3232091)
| The NVUE nv unset interface link lanes command does not restore the port lane setting to the default value. To work around this issue, run the nv set interface link lanes command. | 5.4.0-5.6.0 | | | [3226506](#3226506)
| The l1-show eth0 command does not show port information and is not supported in this release. | 5.3.0-5.6.0 | | -| [3221628](#3221628)
| Cumulus Linux 5.2.0 and 5.2.1 VX images might include an incorrect entry at the end of /etc/apt/sources.list, which produces warnings when you run apt update. Remove this entry to avoid these warnings. | 5.2.0-5.6.0 | | +| [3221628](#3221628)
| Cumulus Linux VX images might include an incorrect entry at the end of /etc/apt/sources.list, which produces warnings when you run apt update. Remove this entry to avoid these warnings. | 5.2.0-5.6.0 | | | [3187469](#3187469)
| At high scale with 160 VRFs and 10 VLANs per VRF (a total of 1600 VLANs), you see traffic loss during primary switch reboot. To work around this issue, reduce the scale to 40 VRFs with no more than 400 VLANs in the configuration, and use a common MAC address. | 5.1.0-5.5.1 | 5.6.0| | [3178090](#3178090)
| The cl-support generation script causes TC filter collection to run as a background process for each interface, which can lead to memory exhaustion on a high scale configuration and on a switch with a small memory footprint. | 5.1.0-5.5.1 | 5.6.0| | [3172682](#3172682)
| On rare occasions, when you query the system hostname through the hostnamctl application, you see a timeout. NVUE uses the hostnamctl application to determine the system hostname, which can result in an nv config apply command failure. | 5.2.0-5.5.1 | 5.6.0| | [3172504](#3172504)
| When you connect the NVIDIA SN4600C switch to a Spectrum 1 or Spectrum-3 switch with a 40GbE passive copper cable (Part Number: MC2210126-005) on edge ports 1-4 and 61-64, there is an Effective BER of 1E-12 in PHY. | 5.2.0-5.6.0 | | | [3147782](#3147782)
| You cannot use NVUE to configure an SNMP view to include a subtree beginning with a period. For example:
cumulus@switch:~$ nv set service snmp-server viewname cumulusOnly included .1.3.6.1.4.1.40310Error: GET /nvue_v1/service/snmp-server/viewname/cumulusOnly/included?pointers=%5B%22%2Fparameters%22%2C+%22%2Fpatch%2FrequestBody%2Fcontent%2Fapplication~1json%2Fschema%22%2C+%22%2Fpatch%2Fparameters%22%2C+%22%2Fpatch%2Fresponses%2F200%2Flinks%22%5D responded with 404 NOT FOUND
To work around this issue, reference the OID without the preceding period ( . ) in the command. | 5.3.0-5.6.0 | | | [3145869](#3145869)
| On a Spectrum-3 switch, the PTP offset in 10GbE changes between +-27. The average offset is around 7. | 5.2.0-5.6.0 | | +| [3141826](#3141826)
| A slow memory leak (~5KB over 24 hour period at a 60 second polling interval) might occur in SNMP when you walk the following system MIB objects (1.3.6.1.2.1)
1.3.6.1.2.1.47 --> Entity MIB
1.3.6.1.2.1.99 --> Entity Sensor MIB
1.3.6.1.2.1.23 --> rip2
1.3.6.1.2.1.2 --> interface/interfaces
1.3.6.1.2.1.31 --> ifMIB
1.3.6.1.2.1.4 --> IP
1.3.6.1.2.1.25 --> hostResource | 5.0.1-5.6.0 | | | [3135952](#3135952)
| PAM4 split cables (such as 2x100G, 4x100G, and 4x50G) do not work with a forced speed setting (when auto-negotiation is off) as the default speed enabled is for NRZ mode (such as 100G_4X). To work around this issue, set the appropriate lanes for forced speed (with auto-negotation off) with the ethtool -s swpX speed autoneg off lanes command. For example:
cumulus@switch:~$ sudo ethtool -s swp1 speed 100000 autoneg off lanes 2
| 5.2.0-5.6.0 | | | [3122301](#3122301)
| On the NVIDIA SN4700 switch, inserting and removing the PSU might cause loss of frames. | 5.2.0-5.6.0 | | | [3115242](#3115242)
| When you configure two VNIs in the same VLAN, ifupdown2 shows a vlan added to two or more VXLANS warning, which is only issued after the VNI is already added to the bridge. This leaves the new VNI in the PVID even if there is already an existing VNI configured in that PVID. | 5.1.0-5.6.0 | | @@ -234,7 +248,6 @@ pdfhidden: True | [2891255](#2891255)
| CVE-2021-39925: Buffer overflow in the Bluetooth SDP dissector in Wireshark 3.4.0 to 3.4.9 and 3.2.0 to 3.2.17 allows denial of service via packet injection or crafted capture file
Vulnerable: <= 2.6.20-0+deb10u1Fixed: 2.6.20-0+deb10u2 | 4.0.0-4.4.1, 5.0.0-5.6.0 | 4.4.2-4.4.5| | [2890681](#2890681)
| CVE-2021-42771: relative path traversal in Babel, a set of tools for internationalising Python applications, could result in the execution of arbitrary code
Vulnerable: 2.6.0+dfsg.1-1Fixed: 2.6.0+dfsg.1-1+deb10u1 | 4.0.0-4.4.1, 5.0.0-5.6.0 | 4.4.2-4.4.5| | [2867042](#2867042)
| When connecting the NVIDIA SN4600 switch to another NVIDIA Spectrum switch, you must use auto-negotiation mode (not force mode); otherwise the switch might use the wrong Tx configuration. | 5.0.0-5.6.0 | | -| [2847919](#2847919)
| Configuring a router with the REST API through the switch front panel ports (swps) is supported in the default VRF only. To work around this issue, use the localHost IP address or the MGMT IP address to configure router using the Rest API. | 5.0.0-5.6.0 | | | [2847755](#2847755)
| When you use NCLU to remove the configuration for a peer that is a member of a group but also has other peer-specific configuration, you must remove the peer-specific configuration before you delete the peer in a separate NCLU commit. | 5.0.0-5.6.0 | | | [2823307](#2823307)
| Cumuls Linux does not support a bond with more than 64 ports. Any configuration with more than 64 ports in a bond changes all ports to down when you apply the configuration. | 5.0.0-5.6.0 | | | [2736108](#2736108)
| When you change the VRRP advertisement interval on the master, the master advertisement interval field in the show vrrp command output does not show the updated value. | 4.4.0-4.4.5, 5.0.0-5.6.0 | | @@ -254,7 +267,7 @@ pdfhidden: True | [3432897](#3432897)
| When you remove the restriction from a TACACS+ mapped user to remove per command authorization, the tacplus-restrict -R command does not restore ownership of restored files correctly. As a result, some commands might fail due to permission errors in the files or directories under the home directory. To work around this issue, run the sudo chown command to correct the ownership of the affected files and directories. | 5.0.0-5.4.0 | | | [3429530](#3429530)
| On the Spectrum-2 and Spectrum-3 switch, multiple interfaces (in the same PLL quarter) might flap intermittently at the same time. | 4.2.1-5.4.0 | | | [3418103](#3418103)
| On the Spectrum-2 and Spectrum-3 switch, if you use module SPQCELRCDFB when connected to a 3rd party switch, you might see no link or a very long link up time (around two minutes). To work around this issue, bring down the port, then bring it back up. | 5.4.0 | | -| [3413860](#3413860)
None | If MLAG is configured but disconnected from an MLAG peer for an extended period of time (days or more), there is a long delay (up to a minute per day) before traffic forwarding stabilizes after the MLAG peer connection re-establishes. | 3.7.0-5.4.0 | | +| [3413860](#3413860)
None | If MLAG is configured but disconnected from an MLAG peer for an extended period of time (days or more), there is a long delay (up to a minute per day) before traffic forwarding stabilizes after the MLAG peer connection re-establishes. | 3.7.0-4.3.1 | | | [3413827](#3413827)
None | During upgrade, when one MLAG node is upgraded and the other MLAG node is not yet upgraded, permanent neighbors cannot synchronize between MLAG nodes. The clagctl dumppermanentneighs command only shows local neighbors. | 5.0.0-5.4.0 | | | [3412357](#3412357)
| When you configure EVPN either with or without MLAG and change the mapping for a layer 2 or layer 3 VNI, you see a permanent traffic drop for the VNI. To work around this issue, remove the VNI configuration, then add and apply it again. | | | | [3410303](#3410303)
| The NVUE command to set the frequency of LLDP updates nv set service lldp tx-interval and the NVUE command to set the amount of time to hold the information before discarding it nv set service lldp tx-hold-multiplier do not provide reasonable maximum and minimum values. Cumulus Linux 5.5.0 and later provides new values. For the nv set service lldp tx-interval command, you can now set a minimum value of 5 and a maximum value of 32768. For the nv set service lldp tx-hold command, you can set a minimum value of 1 and a maximum value of 8192. | 5.4.0 | | diff --git a/content/cumulus-linux-55/rn.xml b/content/cumulus-linux-55/rn.xml index fdc9ac4820..e217b3e709 100644 --- a/content/cumulus-linux-55/rn.xml +++ b/content/cumulus-linux-55/rn.xml @@ -7,6 +7,24 @@ Fixed +3695541 +When applying a full configuration with NVUE that includes VRRP and BGP in VRFs, the VRRP configuration does not come up after you run {{nv config apply}}. BGP routes might also be missing. This issue only happens during the initial {{nv config apply}} of a full configuration, not during a normal initialization during a reboot or FRR restart. To work around this issue, reboot or restart FRR. +5.5.1 +5.6.0 + + +3668939 +When you enable MIB 1.3.6.1.4.1.40310.1 in the {{snmpd.conf}} file, you might see high CPU usage by the {{snmpd}} service. +5.5.1-5.6.0 + + + +3663182 +Changing non-default BGP timers with NCLU or vtysh commands sets the hold time and keep alive interval to 0 seconds. To work around this issue, restart the FRR service with the {{sudo systemctl restart frr.service}} command. +5.3.1-5.6.0 + + + 3647426 If BGP {{remote-as}} is set to an integer and you try to configure the {{local-as}} for a BGP instance, you see the following error: @@ -14,17 +32,31 @@ This configuration is not allowed; it is considered to be eBGP and local preference is not advertised. 5.0.0-5.5.1 -5.6.0 +4.3.2-4.4.5, 5.6.0 + + +3630492 +On the NVIDIA SN2201 switch, the {{ledmgrd -d}} command output shows the system and PSU LED status as orange when the physical LED is green. +5.5.1-5.6.0 + + + +3616338 +When you reboot an MLAG switch with 3000 or more VNIs, there might be extended traffic loss during reboot. To work around this issue, configure the {{clagd}} service {{initDelay}} to 300 seconds with the {{nv set mlag init-delay 300}} command. +5.5.1-5.6.0 + 3610611 -Cumulus Linux assigns an IPv4 and IPv6 loopback address to a VRF interface by default. As a result, ping and route lookups for unique remote IP addresses on different VTEPs might not work if there is no source IP on the switch that belongs to the same subnet. To work around this issue, remove the loopback address on the VRF with the {{nv unset vrf <vrf> loopback ip address <address>}} command. Only remove the loopback address if you are not running NTP as NTP requires a loopback address to work. Alternatively, you can change the {{ping}} command to use a source address (such as an SVI address) with the {{ip vrf exec <VRF> ping <REMOTE_IP> -I <SVI_SRC_IP>}} command. +Cumulus Linux assigns an IPv4 and IPv6 loopback address to a VRF interface by default. As a result, ping and route lookups for unique remote IP addresses on different VTEPs might not work if there is no source IP on the switch that belongs to the same subnet. To work around this issue, remove the loopback address on the VRF with the nv unset vrf <vrf> loopback ip address command. Only remove the loopback address if you are not running NTP as NTP requires a loopback address to work. Alternatively, you can change the {{ping}} command to use a source address (such as an SVI address) with the {{ip vrf exec <VRF> ping <REMOTE_IP> -I <SVI_SRC_IP>}} command. 5.5.0-5.6.0 3609128 -When you use {{vi}} with root or sudo, visual mode is enabled by default due to a missing {{vimrc}} configuration file. This makes it difficult to copy and paste into {{vi}} and might introduce a security issue. +When you use {{vi}} with root or sudo, visual mode is enabled by default due to a missing {{vimrc}} configuration file. This makes it difficult to copy and paste into {{vi}}. In CL5.7.0, the default configuration now includes {{set mouse-=a}}. + +In addition, the CL5.7.0 default configuration for {{vi}} now disables modelines, which can be a security risk. 5.5.0-5.6.0 @@ -41,12 +73,34 @@ This configuration is not allowed; it is considered to be eBGP and local prefere +3597456 +NVUE does not allow you to use the reserved name {{lo}} in an interface name. +5.5.1-5.6.0 + + + 3585467 NVUE and {{ip link}} show traditional bridge VLAN subinterface counts incorrectly. The ingress (Rx) count increments correctly but the egress (Tx) count does not increment. This issues occurs because the hardware does not support transmit counters for a VLAN subinterface; therefore, no statistics from the hardware are updated. Statistics for software forwarded packets show correctly. 5.0.0-5.6.0 +3582826 +When you enable the FRR SNMP agent (agentx) and configure routing adjacencies with short timers (dead, keepalive, and hold time), the routing adjacencies might go down in certain scenarios; for example when you have frequent or concurrent client SNMP requests, you use custom SNMP MIB extensions, you poll OIDs with large responses, or during high CPU load. To work around this issue, you can increase the routing adjacency timers to accommodate SNMP processing. +5.5.0-5.6.0 + + + +3580435 +On the NVIDIA SN2410 switch with an Innodisk SSD, you might see the following message in syslog: + +smartd[501]: Device: /dev/sda [SAT], CHECK POWER STATUS spins up disk (0x00 -> 0xff) + +This is a cosmetic issue and does not affect how the switch operates. To prevent this message from occurring, run the {{hdparm -S 24 /dev/sda}} command to change the HD timeout. +5.3.1-5.6.0 + + + 3576961 The NVUE command to clear all ACL counters at once is not available. To work around this issue, run the {{cl-acltool -Z all}} command to reset the statistics for all ACL rules. 5.5.1-5.6.0 @@ -99,8 +153,8 @@ This configuration is not allowed; it is considered to be eBGP and local prefere CVE-2023-38408: The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009. Mitigation: Do not use ssh-agent forwarding (the man page for ssh_config says that "agent forwarding should be enabled with caution"), or start the ssh-agent program with the -P option to allow only specific PKCS#11 libraries (or none with -P ''). For Cumulus Linux 4.3.2, the /usr/bin/ssh-agent program has all permissions turned off (chmod 0) to prevent its execution if a vulnerable version is detected. -4.0.0-4.4.5, 5.0.0-5.6.0 - +4.0.0-4.3.1, 5.0.0-5.6.0 +4.3.2-4.4.5 3549138 @@ -145,6 +199,13 @@ For Cumulus Linux 4.3.2, the /usr/bin/ssh-agent program has all permissions turn 5.6.0 +3522524 +FRR does not allow eBGP multi hop configuration on unnumbered BGP neighbors. + +5.5.0-5.6.0 + + + 3520511 If you apply EVPN multihoming configuration such as {{es-df-pref}}, {{es-id}} and {{es-sys-mac}} with vtysh after you remove a bond interface that is part of a bridge and run {{ifreload -a}}, FRR crashes. To work around this issue, do not remove a bond from a bridge before you configure EVPN multihoming with vtysh. 5.5.1 @@ -205,6 +266,12 @@ For Cumulus Linux 4.3.2, the /usr/bin/ssh-agent program has all permissions turn 5.6.0 +3484058 +When you power on the NVIDIA SN3420 switch with no connected cables, the QSFP ports LEDs light in amber. +5.3.0-5.6.0 + + + 3479786 The {{switchd}} service does not handle certain route and next hop updates, which causes a synchronization loop. For example, in a VRF route leaking configuration, where a next hop group spans across multiple VRFs, when one of the routes is withdrawn and the next hop is no longer used, {{switchd}} has problems synchronizing other next hops in the group. @@ -289,11 +356,7 @@ cumulus@switch:~$ nv config patch frr_policy.yaml 3452681 -When you run the NVUE {{nv show system aaa tacacs authorization}} commands to show per command authorization for a specific TACACS+ user privilege level, you see the following error: - -cumulus@switch:~$ nv show system aaa tacacs authorization 1 -Error: GET /nvue_v1/system/aaa/tacacs/authorization/1?rev=operational responded with 404 NOT FOUND - +When you run the NVUE {{nv show system aaa tacacs authorization}} commands to show per command authorization for a specific TACACS+ user privilege level, you see an error message similar to {{Error: GET /nvue_v1/system/aaa/tacacs/authorization/1?rev=operational responded with 404 NOT FOUND}}. 5.5.0-5.6.0 @@ -366,6 +429,12 @@ This error message is benign and has no functional impact. 5.6.0 +3419928 +The NVUE PIM timer command option names {{keep-alive}} and {{rp-keep-alive}} are inconsistent and need to change to {{keepalive}} and {{rp-keepalive}}. +5.4.0-5.6.0 + + + 3413785 To reach the TACACS+ server through the default VRF, you must specify the egress interface you use in the default VRF. Either run the NVUE {{nv set system aaa tacacs vrf <interface>}} command (for example, {{nv set system aaa tacacs vrf swp51}}) or set the {{vrf=<interface>}} option in the {{/etc/tacplus_servers}} file (for example, {{vrf=swp51}}). A similar issue might prevent TACACS+ users with privilege level 15 from using {{sudo}} if the TACACS+ server is reachable only on the {{default}} VRF. If this occurs, and you do not run the above configuration workaround, the TACACS+ user with privilege level 15 can use {{vrf task exec default sudo ...}} to execute the {{sudo}} command using the TACACS+ server on the {{default}} VRF. 5.0.0-5.5.1 @@ -378,12 +447,6 @@ This error message is benign and has no functional impact. -3395489 -On a switch running MLAG, when you configure QoS buffer settings, MLAG peering resets. -5.4.0-5.6.0 - - - 3394674 If you restart FRR with the log file debugging level set to {{informational}}, BGP crashes. 5.4.0-5.5.1 @@ -403,13 +466,7 @@ This error message is benign and has no functional impact. 3362113 -If you restore an NVUE {{startup.yaml}} file after upgrade that includes breakout ports with QoS configuration or you run the {{nv config patch}} command to update a configuration with a {{yaml}} file that includes breakout ports with QoS configuration, the NVUE configuration fails to apply and subsequent attempts to run {{nv config apply}} fail with the following message: - -cumulus@switch:~$ nv config apply -Invalid config [rev_id: 11] - qos config is not supported on following invalid interface: swp1s0. Supported on swp and bond interface types. - -To work around this issue, run {{nv unset}} on the configured QoS settings, then apply the breakout port configuration before you configure QoS. Alternatively, you can remove the QoS configuration from the {{yaml}} file and patch it separately after applying the breakout configuration. +If you restore an NVUE {{startup.yaml}} file after upgrade that includes breakout ports with QoS configuration or you run the {{nv config patch}} command to update a configuration with a {{yaml}} file that includes breakout ports with QoS configuration, the NVUE configuration fails to apply and subsequent attempts to run {{nv config apply}} fail with the message similar to {{Invalid config [rev_id: 11] qos config is not supported on following invalid interface: swp1s0. Supported on swp and bond interface types}}. To work around this issue, run {{nv unset}} on the configured QoS settings, then apply the breakout port configuration before you configure QoS. Alternatively, you can remove the QoS configuration from the {{yaml}} file and patch it separately after applying the breakout configuration. 5.4.0-5.6.0 @@ -422,9 +479,7 @@ These errors do not affect new dynamic NAT flows from new NAT rules. 3347677 -In an MLAG configuration, when a link failure occurs on the peerlink or the peerlink shuts down, the switch in the secondary role attracts traffic to its local VTEP as it advertises the local VTEP IP address momentarily just before the VXLAN device is protodown. This traffic is dropped for a brief moment (between 5 and 10 seconds) because the MLAG bonds on the secondary switch are already protodown. - -In a proposed fix in the MR !226, we are not flapping the IP on vxlan device on secondary clag device on peerlink down trigger. This ensures smooth traffic flow and no convergence issue seen in system test bed with this fix. +In an MLAG configuration, when a link failure occurs on the peerlink or the peerlink shuts down, the switch in the secondary role attracts traffic to its local VTEP as it advertises the local VTEP IP address momentarily just before the VXLAN device is protodown. This traffic is dropped for a brief moment (between 5 and 10 seconds) because the MLAG bonds on the secondary switch are already protodown. 5.1.0-5.6.0 @@ -483,16 +538,10 @@ In a proposed fix in the MR !226, we are not flapping the IP on vxlan device on -3308191 -If you try to set an unsupported interface speed together with FEC, the {{nv config apply}} command succeeds but Cumulus Linux ignores the FEC configuration and configures the default FEC setting for the chosen speed. There is no warning or error message. -5.4.0-5.6.0 - - - -3269691 -When you restart the LLDP service, you see a {{broken pipe}} error and a log message in the {{lldpd.service}} logs. This error does not affect LLDP functionality. -5.4.0-5.6.0 - +3293114 +In Cumulus Linux 5.4 and earlier, the command to enable Neighbor Discovery (ND) router advertisement is inverted and causes confusion; {{nv set interface <interface> ip neighbor-discovery router-advertisement enable off}}. In Cumulus Linux 5.5 and later, the command to enable router advertisement is updated to {{nv set interface <interface> ip neighbor-discovery router-advertisement enable on}}. +5.3.0-5.5.1 +5.6.0 3266197 @@ -532,7 +581,7 @@ In a proposed fix in the MR !226, we are not flapping the IP on vxlan device on 3221628 -Cumulus Linux 5.2.0 and 5.2.1 VX images might include an incorrect entry at the end of {{/etc/apt/sources.list}}, which produces warnings when you run {{apt update}}. Remove this entry to avoid these warnings. +Cumulus Linux VX images might include an incorrect entry at the end of {{/etc/apt/sources.list}}, which produces warnings when you run {{apt update}}. Remove this entry to avoid these warnings. 5.2.0-5.6.0 @@ -578,6 +627,20 @@ To work around this issue, reference the OID without the preceding period ( {{.} +3141826 +A slow memory leak (~5KB over 24 hour period at a 60 second polling interval) might occur in SNMP when you walk the following system MIB objects (1.3.6.1.2.1). + +1.3.6.1.2.1.47 --> Entity MIB + 1.3.6.1.2.1.99 --> Entity Sensor MIB + 1.3.6.1.2.1.23 --> rip2 + 1.3.6.1.2.1.2 --> interface/interfaces + 1.3.6.1.2.1.31 --> ifMIB + 1.3.6.1.2.1.4 --> IP + 1.3.6.1.2.1.25 --> hostResource +5.0.1-5.6.0 + + + 3135952 PAM4 split cables (such as 2x100G, 4x100G, and 4x50G) do not work with a forced speed setting (when auto-negotiation is off) as the default speed enabled is for NRZ mode (such as 100G_4X). To work around this issue, set the appropriate lanes for forced speed (with auto-negotation off) with the {{ethtool -s swpX speed <port_speed> autoneg off lanes <no_of_lanes>}} command. For example: @@ -689,12 +752,6 @@ Fixed: 2.6.0+dfsg.1-1+deb10u1 -2847919 -Configuring a router with the REST API through the switch front panel ports (swps) is supported in the default VRF only. To work around this issue, use the localHost IP address or the MGMT IP address to configure router using the Rest API. -5.0.0-5.6.0 - - - 2847755 When you use NCLU to remove the configuration for a peer that is a member of a group but also has other peer-specific configuration, you must remove the peer-specific configuration before you delete the peer in a separate NCLU commit. 5.0.0-5.6.0 @@ -767,6 +824,12 @@ You can safely ignore this warning. Fixed +3663182 +Changing non-default BGP timers with NCLU or vtysh commands sets the hold time and keep alive interval to 0 seconds. To work around this issue, restart the FRR service with the {{sudo systemctl restart frr.service}} command. +5.3.1-5.6.0 + + + 3647426 If BGP {{remote-as}} is set to an integer and you try to configure the {{local-as}} for a BGP instance, you see the following error: @@ -774,17 +837,19 @@ You can safely ignore this warning. This configuration is not allowed; it is considered to be eBGP and local preference is not advertised. 5.0.0-5.5.1 -5.6.0 +4.3.2-4.4.5, 5.6.0 3610611 -Cumulus Linux assigns an IPv4 and IPv6 loopback address to a VRF interface by default. As a result, ping and route lookups for unique remote IP addresses on different VTEPs might not work if there is no source IP on the switch that belongs to the same subnet. To work around this issue, remove the loopback address on the VRF with the {{nv unset vrf <vrf> loopback ip address <address>}} command. Only remove the loopback address if you are not running NTP as NTP requires a loopback address to work. Alternatively, you can change the {{ping}} command to use a source address (such as an SVI address) with the {{ip vrf exec <VRF> ping <REMOTE_IP> -I <SVI_SRC_IP>}} command. +Cumulus Linux assigns an IPv4 and IPv6 loopback address to a VRF interface by default. As a result, ping and route lookups for unique remote IP addresses on different VTEPs might not work if there is no source IP on the switch that belongs to the same subnet. To work around this issue, remove the loopback address on the VRF with the nv unset vrf <vrf> loopback ip address command. Only remove the loopback address if you are not running NTP as NTP requires a loopback address to work. Alternatively, you can change the {{ping}} command to use a source address (such as an SVI address) with the {{ip vrf exec <VRF> ping <REMOTE_IP> -I <SVI_SRC_IP>}} command. 5.5.0-5.6.0 3609128 -When you use {{vi}} with root or sudo, visual mode is enabled by default due to a missing {{vimrc}} configuration file. This makes it difficult to copy and paste into {{vi}} and might introduce a security issue. +When you use {{vi}} with root or sudo, visual mode is enabled by default due to a missing {{vimrc}} configuration file. This makes it difficult to copy and paste into {{vi}}. In CL5.7.0, the default configuration now includes {{set mouse-=a}}. + +In addition, the CL5.7.0 default configuration for {{vi}} now disables modelines, which can be a security risk. 5.5.0-5.6.0 @@ -801,6 +866,22 @@ This configuration is not allowed; it is considered to be eBGP and local prefere +3582826 +When you enable the FRR SNMP agent (agentx) and configure routing adjacencies with short timers (dead, keepalive, and hold time), the routing adjacencies might go down in certain scenarios; for example when you have frequent or concurrent client SNMP requests, you use custom SNMP MIB extensions, you poll OIDs with large responses, or during high CPU load. To work around this issue, you can increase the routing adjacency timers to accommodate SNMP processing. +5.5.0-5.6.0 + + + +3580435 +On the NVIDIA SN2410 switch with an Innodisk SSD, you might see the following message in syslog: + +smartd[501]: Device: /dev/sda [SAT], CHECK POWER STATUS spins up disk (0x00 -> 0xff) + +This is a cosmetic issue and does not affect how the switch operates. To prevent this message from occurring, run the {{hdparm -S 24 /dev/sda}} command to change the HD timeout. +5.3.1-5.6.0 + + + 3576949 When you run the NVUE {{nv set service snmp listening-address localhost vrf <vrf-name>}} or {{nv set service snmp listening-address localhost-v6 vrf <vrf-name>}} command to configure the SNMP listening address, Cumulus Linux applies the listening address to the default VRF instead of the VRF you specify. 5.3.0-5.6.0 @@ -835,8 +916,8 @@ This configuration is not allowed; it is considered to be eBGP and local prefere CVE-2023-38408: The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009. Mitigation: Do not use ssh-agent forwarding (the man page for ssh_config says that "agent forwarding should be enabled with caution"), or start the ssh-agent program with the -P option to allow only specific PKCS#11 libraries (or none with -P ''). For Cumulus Linux 4.3.2, the /usr/bin/ssh-agent program has all permissions turned off (chmod 0) to prevent its execution if a vulnerable version is detected. -4.0.0-4.4.5, 5.0.0-5.6.0 - +4.0.0-4.3.1, 5.0.0-5.6.0 +4.3.2-4.4.5 3549138 @@ -881,6 +962,13 @@ For Cumulus Linux 4.3.2, the /usr/bin/ssh-agent program has all permissions turn 5.6.0 +3522524 +FRR does not allow eBGP multi hop configuration on unnumbered BGP neighbors. + +5.5.0-5.6.0 + + + 3517376 When you use CMIS specification based optics, the {{l1-show}} command output provides incorrect values for digital diagnostics (TX Power and RX Power). To work around this issue, run the {{mlxlink}} command with either the {{-m}} or {{--cable --ddm}} flags. 5.5.0-5.5.1 @@ -935,6 +1023,12 @@ For Cumulus Linux 4.3.2, the /usr/bin/ssh-agent program has all permissions turn 5.6.0 +3484058 +When you power on the NVIDIA SN3420 switch with no connected cables, the QSFP ports LEDs light in amber. +5.3.0-5.6.0 + + + 3479786 The {{switchd}} service does not handle certain route and next hop updates, which causes a synchronization loop. For example, in a VRF route leaking configuration, where a next hop group spans across multiple VRFs, when one of the routes is withdrawn and the next hop is no longer used, {{switchd}} has problems synchronizing other next hops in the group. @@ -1025,11 +1119,7 @@ cumulus@switch:~$ nv config patch frr_policy.yaml 3452681 -When you run the NVUE {{nv show system aaa tacacs authorization}} commands to show per command authorization for a specific TACACS+ user privilege level, you see the following error: - -cumulus@switch:~$ nv show system aaa tacacs authorization 1 -Error: GET /nvue_v1/system/aaa/tacacs/authorization/1?rev=operational responded with 404 NOT FOUND - +When you run the NVUE {{nv show system aaa tacacs authorization}} commands to show per command authorization for a specific TACACS+ user privilege level, you see an error message similar to {{Error: GET /nvue_v1/system/aaa/tacacs/authorization/1?rev=operational responded with 404 NOT FOUND}}. 5.5.0-5.6.0 @@ -1102,6 +1192,12 @@ This error message is benign and has no functional impact. 5.6.0 +3419928 +The NVUE PIM timer command option names {{keep-alive}} and {{rp-keep-alive}} are inconsistent and need to change to {{keepalive}} and {{rp-keepalive}}. +5.4.0-5.6.0 + + + 3413785 To reach the TACACS+ server through the default VRF, you must specify the egress interface you use in the default VRF. Either run the NVUE {{nv set system aaa tacacs vrf <interface>}} command (for example, {{nv set system aaa tacacs vrf swp51}}) or set the {{vrf=<interface>}} option in the {{/etc/tacplus_servers}} file (for example, {{vrf=swp51}}). A similar issue might prevent TACACS+ users with privilege level 15 from using {{sudo}} if the TACACS+ server is reachable only on the {{default}} VRF. If this occurs, and you do not run the above configuration workaround, the TACACS+ user with privilege level 15 can use {{vrf task exec default sudo ...}} to execute the {{sudo}} command using the TACACS+ server on the {{default}} VRF. 5.0.0-5.5.1 @@ -1114,12 +1210,6 @@ This error message is benign and has no functional impact. -3395489 -On a switch running MLAG, when you configure QoS buffer settings, MLAG peering resets. -5.4.0-5.6.0 - - - 3394674 If you restart FRR with the log file debugging level set to {{informational}}, BGP crashes. 5.4.0-5.5.1 @@ -1139,13 +1229,7 @@ This error message is benign and has no functional impact. 3362113 -If you restore an NVUE {{startup.yaml}} file after upgrade that includes breakout ports with QoS configuration or you run the {{nv config patch}} command to update a configuration with a {{yaml}} file that includes breakout ports with QoS configuration, the NVUE configuration fails to apply and subsequent attempts to run {{nv config apply}} fail with the following message: - -cumulus@switch:~$ nv config apply -Invalid config [rev_id: 11] - qos config is not supported on following invalid interface: swp1s0. Supported on swp and bond interface types. - -To work around this issue, run {{nv unset}} on the configured QoS settings, then apply the breakout port configuration before you configure QoS. Alternatively, you can remove the QoS configuration from the {{yaml}} file and patch it separately after applying the breakout configuration. +If you restore an NVUE {{startup.yaml}} file after upgrade that includes breakout ports with QoS configuration or you run the {{nv config patch}} command to update a configuration with a {{yaml}} file that includes breakout ports with QoS configuration, the NVUE configuration fails to apply and subsequent attempts to run {{nv config apply}} fail with the message similar to {{Invalid config [rev_id: 11] qos config is not supported on following invalid interface: swp1s0. Supported on swp and bond interface types}}. To work around this issue, run {{nv unset}} on the configured QoS settings, then apply the breakout port configuration before you configure QoS. Alternatively, you can remove the QoS configuration from the {{yaml}} file and patch it separately after applying the breakout configuration. 5.4.0-5.6.0 @@ -1158,9 +1242,7 @@ These errors do not affect new dynamic NAT flows from new NAT rules. 3347677 -In an MLAG configuration, when a link failure occurs on the peerlink or the peerlink shuts down, the switch in the secondary role attracts traffic to its local VTEP as it advertises the local VTEP IP address momentarily just before the VXLAN device is protodown. This traffic is dropped for a brief moment (between 5 and 10 seconds) because the MLAG bonds on the secondary switch are already protodown. - -In a proposed fix in the MR !226, we are not flapping the IP on vxlan device on secondary clag device on peerlink down trigger. This ensures smooth traffic flow and no convergence issue seen in system test bed with this fix. +In an MLAG configuration, when a link failure occurs on the peerlink or the peerlink shuts down, the switch in the secondary role attracts traffic to its local VTEP as it advertises the local VTEP IP address momentarily just before the VXLAN device is protodown. This traffic is dropped for a brief moment (between 5 and 10 seconds) because the MLAG bonds on the secondary switch are already protodown. 5.1.0-5.6.0 @@ -1219,16 +1301,10 @@ In a proposed fix in the MR !226, we are not flapping the IP on vxlan device on -3308191 -If you try to set an unsupported interface speed together with FEC, the {{nv config apply}} command succeeds but Cumulus Linux ignores the FEC configuration and configures the default FEC setting for the chosen speed. There is no warning or error message. -5.4.0-5.6.0 - - - -3269691 -When you restart the LLDP service, you see a {{broken pipe}} error and a log message in the {{lldpd.service}} logs. This error does not affect LLDP functionality. -5.4.0-5.6.0 - +3293114 +In Cumulus Linux 5.4 and earlier, the command to enable Neighbor Discovery (ND) router advertisement is inverted and causes confusion; {{nv set interface <interface> ip neighbor-discovery router-advertisement enable off}}. In Cumulus Linux 5.5 and later, the command to enable router advertisement is updated to {{nv set interface <interface> ip neighbor-discovery router-advertisement enable on}}. +5.3.0-5.5.1 +5.6.0 3266197 @@ -1268,7 +1344,7 @@ In a proposed fix in the MR !226, we are not flapping the IP on vxlan device on 3221628 -Cumulus Linux 5.2.0 and 5.2.1 VX images might include an incorrect entry at the end of {{/etc/apt/sources.list}}, which produces warnings when you run {{apt update}}. Remove this entry to avoid these warnings. +Cumulus Linux VX images might include an incorrect entry at the end of {{/etc/apt/sources.list}}, which produces warnings when you run {{apt update}}. Remove this entry to avoid these warnings. 5.2.0-5.6.0 @@ -1314,6 +1390,20 @@ To work around this issue, reference the OID without the preceding period ( {{.} +3141826 +A slow memory leak (~5KB over 24 hour period at a 60 second polling interval) might occur in SNMP when you walk the following system MIB objects (1.3.6.1.2.1). + +1.3.6.1.2.1.47 --> Entity MIB + 1.3.6.1.2.1.99 --> Entity Sensor MIB + 1.3.6.1.2.1.23 --> rip2 + 1.3.6.1.2.1.2 --> interface/interfaces + 1.3.6.1.2.1.31 --> ifMIB + 1.3.6.1.2.1.4 --> IP + 1.3.6.1.2.1.25 --> hostResource +5.0.1-5.6.0 + + + 3135952 PAM4 split cables (such as 2x100G, 4x100G, and 4x50G) do not work with a forced speed setting (when auto-negotiation is off) as the default speed enabled is for NRZ mode (such as 100G_4X). To work around this issue, set the appropriate lanes for forced speed (with auto-negotation off) with the {{ethtool -s swpX speed <port_speed> autoneg off lanes <no_of_lanes>}} command. For example: @@ -1425,12 +1515,6 @@ Fixed: 2.6.0+dfsg.1-1+deb10u1 -2847919 -Configuring a router with the REST API through the switch front panel ports (swps) is supported in the default VRF only. To work around this issue, use the localHost IP address or the MGMT IP address to configure router using the Rest API. -5.0.0-5.6.0 - - - 2847755 When you use NCLU to remove the configuration for a peer that is a member of a group but also has other peer-specific configuration, you must remove the peer-specific configuration before you delete the peer in a separate NCLU commit. 5.0.0-5.6.0 @@ -1527,7 +1611,7 @@ You can safely ignore this warning. 3413860 If MLAG is configured but disconnected from an MLAG peer for an extended period of time (days or more), there is a long delay (up to a minute per day) before traffic forwarding stabilizes after the MLAG peer connection re-establishes. -3.7.0-5.4.0 +3.7.0-4.3.1 3413827 diff --git a/content/cumulus-linux-56/Installation-Management/Installing-a-New-Cumulus-Linux-Image.md b/content/cumulus-linux-56/Installation-Management/Installing-a-New-Cumulus-Linux-Image.md index bf733f2d99..6f2f7bfdf9 100644 --- a/content/cumulus-linux-56/Installation-Management/Installing-a-New-Cumulus-Linux-Image.md +++ b/content/cumulus-linux-56/Installation-Management/Installing-a-New-Cumulus-Linux-Image.md @@ -323,7 +323,7 @@ You can run several installer command line options from ONIE to perform basic sw - Execute a ZTP script to perform necessary configuration {{%notice note%}} -The `onie-nos-install` command does *not* allow you specify command line parameters. You must access the switch from the console and transfer a disk image to the switch. You must then make the disk image executable and install the image directly from the ONIE command line with the options you want to use. +The `onie-nos-install` command does *not* allow you to specify command line parameters. You must access the switch from the console and transfer a disk image to the switch. You must then make the disk image executable and install the image directly from the ONIE command line with the options you want to use. The following example commands transfer a disk image to the switch, make the image executable, and install the image with the `--password` option to change the default cumulus user password: diff --git a/content/cumulus-linux-56/Layer-1-and-Switch-Ports/DHCP/DHCP-Relays.md b/content/cumulus-linux-56/Layer-1-and-Switch-Ports/DHCP/DHCP-Relays.md index 054dca65f6..de13b4fa0a 100644 --- a/content/cumulus-linux-56/Layer-1-and-Switch-Ports/DHCP/DHCP-Relays.md +++ b/content/cumulus-linux-56/Layer-1-and-Switch-Ports/DHCP/DHCP-Relays.md @@ -103,7 +103,7 @@ cumulus@leaf01:~$ nv config apply ## Optional Configuration -This section describes optional DHCP relay configuration. The steps provided in this section assume that you already done basic DHCP relay configuration, described above. +This section describes optional DHCP relay configurations. The steps provided in this section assume that you have already configured basic DHCP relay, as described above. ### DHCP Agent Information Option (Option 82) diff --git a/content/cumulus-linux-56/Layer-1-and-Switch-Ports/DHCP/DHCP-Servers.md b/content/cumulus-linux-56/Layer-1-and-Switch-Ports/DHCP/DHCP-Servers.md index 7f66e653a9..cf954172fe 100644 --- a/content/cumulus-linux-56/Layer-1-and-Switch-Ports/DHCP/DHCP-Servers.md +++ b/content/cumulus-linux-56/Layer-1-and-Switch-Ports/DHCP/DHCP-Servers.md @@ -203,7 +203,7 @@ subnet6 2001:db8::1/128 { ### Lease Time -You can set the network address lease time assigned to DHCP clients. You can specify a number between 180 and 31536000. The default lease time is 600 seconds. +You can set the network address lease time assigned to DHCP clients. You can specify a number between 180 and 31536000. The default lease time is 3600 seconds. {{< tabs "TabID206 ">}} {{< tab "NVUE Commands ">}} diff --git a/content/cumulus-linux-56/Layer-1-and-Switch-Ports/DHCP/DHCP-Snooping.md b/content/cumulus-linux-56/Layer-1-and-Switch-Ports/DHCP/DHCP-Snooping.md new file mode 100644 index 0000000000..8454c280ef --- /dev/null +++ b/content/cumulus-linux-56/Layer-1-and-Switch-Ports/DHCP/DHCP-Snooping.md @@ -0,0 +1,91 @@ +--- +title: DHCP Snooping +author: NVIDIA +weight: 355 +toc: 3 +--- +DHCP snooping enables Cumulus Linux to act as a middle layer between the DHCP infrastructure and DHCP clients by scanning DHCP control packets and building an IP-MAC database. Cumulus Linux accepts DHCP offers from only trusted interfaces and can rate limit packets. + +{{%notice note%}} +DHCP option 82 processing is not supported. +{{%/notice%}} + +## Configure DHCP Snooping + +To configure DHCP snooping, you need to: + +- Enable DHCP snooping on a VLAN. +- Add a trusted interface. Cumulus Linux allows DHCP offers from only trusted interfaces to prevent malicious DHCP servers from assigning IP addresses inside the network. The interface must be a member of the bridge specified. +- Set the rate limit for DHCP requests to avoid DoS attacks. The default value is 100 packets per second. + +The following example shows you how to configure DHCP snooping for IPv4 and IPv6. + +{{%notice note%}} +NVUE does not provide commands to configure DHCP Snooping. +{{%/notice%}} + +Create the `/etc/dhcpsnoop/dhcp_snoop.json` file and add DHCP snooping configuration under the bridge. + +The following example enables DHCP snooping for IPv4 on VLAN 10, sets the rate limit to 50 and the trusted interface to swp3. swp3 is a member of the bridge `br_default`: + +``` +cumulus@leaf01:~$ sudo nano /etc/dhcpsnoop/dhcp_snoop.json +{ + "bridge": [ + { + "bridge_id": "br_default", + "vlan": [ + { + "vlan_id": 10, + "snooping": 1, + "rate_limit": 50, + "ip_version": 4, + "trusted_interface": [ + "swp3" + ], + } + ] + } + ] +} +``` + +The following example enables DHCP snooping for IPv6 on VLAN 10, sets the rate limit to 50 and the trusted interface to swp6. swp6 is a member of the bridge `br_default`: + +``` +cumulus@leaf01:~$ sudo nano /etc/dhcpsnoop/dhcp_snoop.json +{ + "bridge": [ + { + "bridge_id": "br_default", + "vlan": [ + { + "vlan_id": 10, + "snooping": 1, + "rate_limit": 50, + "ip_version": 6, + "trusted_interface": [ + "swp6" + ], + } + ] + } + ] +} +``` + +When DHCP snooping detects a violation, the packet is dropped and a message is logged to the `/var/log/dhcpsnoop.log` file. + +## Show the DHCP Binding Table + +To show the DHCP binding table, run the `net show dhcp-snoop table` command for IPv4 or the `net show dhcp-snoop6 table` command for IPv6. The following example command shows the DHCP binding table for IPv4: + +``` +cumulus@leaf01:~$ net show dhcp-snoop table +Port VLAN IP MAC Lease State Bridge +---- ---- --------- ----------------- ----- ----- ------ + +swp5 1002 10.0.0.3 00:02:00:00:00:04 7200 ACK br0 + +swp5 1000 10.0.1.3 00:02:00:00:00:04 7200 ACK br0 +``` diff --git a/content/cumulus-linux-56/Layer-1-and-Switch-Ports/DHCP/_index.md b/content/cumulus-linux-56/Layer-1-and-Switch-Ports/DHCP/_index.md index 349640ceb4..fd3f513c3c 100644 --- a/content/cumulus-linux-56/Layer-1-and-Switch-Ports/DHCP/_index.md +++ b/content/cumulus-linux-56/Layer-1-and-Switch-Ports/DHCP/_index.md @@ -4,4 +4,7 @@ author: NVIDIA weight: 338 toc: 3 --- -This section describes how to configure [DHCP](## "Dynamic Host Configuration Protocol") relays and [DHCP](## "Dynamic Host Configuration Protocol") servers. +This section describes how to configure: +- {{}} +- {{}} +- {{}} diff --git a/content/cumulus-linux-56/Layer-1-and-Switch-Ports/Interface-Configuration-and-Management/Switch-Port-Attributes.md b/content/cumulus-linux-56/Layer-1-and-Switch-Ports/Interface-Configuration-and-Management/Switch-Port-Attributes.md index 8a417f718a..6d6433057f 100644 --- a/content/cumulus-linux-56/Layer-1-and-Switch-Ports/Interface-Configuration-and-Management/Switch-Port-Attributes.md +++ b/content/cumulus-linux-56/Layer-1-and-Switch-Ports/Interface-Configuration-and-Management/Switch-Port-Attributes.md @@ -1194,7 +1194,7 @@ SN4600 64xQSFP56 (200GbE) interfaces support both PAM4 and NRZ encodings with al For lower speeds, PAM4 is automatically converted to NRZ encoding. -Only 32xQSFP56 ports can brea kout into 4xSFP56 (4x50GbE). But, in this case, the adjacent QSFP56 port are blocked (only the first and third or second and fourth rows can break out into 4xSFP56). +Only 32xQSFP56 ports can break out into 4xSFP56 (4x50GbE). But, in this case, the adjacent QSFP56 port are blocked (only the first and third or second and fourth rows can break out into 4xSFP56). All 64xQSFP56 ports can break out into 2xQSFP56 (2x100GbE) without blocking ports. diff --git a/content/cumulus-linux-56/Layer-1-and-Switch-Ports/Interface-Configuration-and-Management/_index.md b/content/cumulus-linux-56/Layer-1-and-Switch-Ports/Interface-Configuration-and-Management/_index.md index e22ea543f5..067b43ad90 100644 --- a/content/cumulus-linux-56/Layer-1-and-Switch-Ports/Interface-Configuration-and-Management/_index.md +++ b/content/cumulus-linux-56/Layer-1-and-Switch-Ports/Interface-Configuration-and-Management/_index.md @@ -412,7 +412,7 @@ If you specify a subinterface, such as swp1.100, then run `ifup swp1.100`, Cumul You can specify both IPv4 and IPv6 addresses for the same interface. For IPv6 addresses: -- You can create or modify the IP address for an interface using either `::` or `0:0:0` notation. For example,both 2620:149:43:c109:0:0:0:5 and 2001:DB8::1/126 are valid. +- You can create or modify the IP address for an interface using either `::` or `0:0:0` notation. For example, both 2620:149:43:c109:0:0:0:5 and 2001:DB8::1/126 are valid. - Cumulus Linux assigns the IPv6 address with all zeroes in the interface identifier (2001:DB8::/126) for each subnet; connected hosts cannot use this address. The following example commands configure three IP addresses for swp1; two IPv4 addresses and one IPv6 address. diff --git a/content/cumulus-linux-56/Layer-2/IGMP-and-MLD-Snooping.md b/content/cumulus-linux-56/Layer-2/IGMP-and-MLD-Snooping.md index 39a02cfa4a..0540945592 100644 --- a/content/cumulus-linux-56/Layer-2/IGMP-and-MLD-Snooping.md +++ b/content/cumulus-linux-56/Layer-2/IGMP-and-MLD-Snooping.md @@ -85,7 +85,7 @@ cumulus@switch:~$ sudo ifreload -a ## Optimized Multicast Flooding (OMF) -IGMP snooping restricts multicast forwarding only to the ports that receive IGMP report messages. If the ports do not receive IGMP reports, multicast traffic floods to all ports in the bridge domain (also know as unregistered multicast (URMC) traffic). To restrict this flooding to only mrouter ports, you can enable OMF. +IGMP snooping restricts multicast forwarding only to the ports that receive IGMP report messages. If the ports do not receive IGMP reports, multicast traffic floods to all ports in the bridge domain (also known as unregistered multicast (URMC) traffic). To restrict this flooding to only mrouter ports, you can enable OMF. To enable OMF: diff --git a/content/cumulus-linux-56/Layer-2/Link-Layer-Discovery-Protocol.md b/content/cumulus-linux-56/Layer-2/Link-Layer-Discovery-Protocol.md index 9ab94a15d7..f9fa8670f6 100644 --- a/content/cumulus-linux-56/Layer-2/Link-Layer-Discovery-Protocol.md +++ b/content/cumulus-linux-56/Layer-2/Link-Layer-Discovery-Protocol.md @@ -120,7 +120,7 @@ cumulus@switch:~$ sudo systemctl restart lldpd ## Set LLDP Mode -By default, the `lldpd` service sends LLDP frames unless it detects a CDP peer, then it sends CDP frames. You can change this behaviour and configure the `lldpd` service to send only CDP frames or only LLDP frames. +By default, the `lldpd` service sends LLDP frames unless it detects a CDP peer, then it sends CDP frames. You can change this behavior and configure the `lldpd` service to send only CDP frames or only LLDP frames. {{%notice note%}} - You configure the `lldpd` service to send only CDP or only LLDP frames globally for all interfaces; you cannot configure these settings for specific interfaces. diff --git a/content/cumulus-linux-56/Layer-2/Multi-Chassis-Link-Aggregation-MLAG.md b/content/cumulus-linux-56/Layer-2/Multi-Chassis-Link-Aggregation-MLAG.md index 75de0dff4b..ce734fa759 100644 --- a/content/cumulus-linux-56/Layer-2/Multi-Chassis-Link-Aggregation-MLAG.md +++ b/content/cumulus-linux-56/Layer-2/Multi-Chassis-Link-Aggregation-MLAG.md @@ -917,7 +917,7 @@ The following table shows the conflict types and actions that Cumulus Linux take | LACP partner MAC address | Interface | Protodown the MLAG bonds on the MLAG switch if there is an LACP partner MAC address mismatch or if there is a duplicate LACP partner MAC address. | | MLAG VLANs| Interface | Suspend the inconsistent VLANs on either MLAG peer if the VLANs are not part of the peer link or if there is mismatch of VLANs configured on the MLAG bonds between the MLAG peers. | | Peer link VLANs| Global | Suspend the inconsistent VLANs on either MLAG peer on all the dual-connected MLAG bonds and VXLAN interfaces. | -| MLAG protocol version | Global | The consistency check records an MLAG protocol version mismatch between the MLAG peers. Cumulus Linux does not take any distruptive action. | +| MLAG protocol version | Global | The consistency check records an MLAG protocol version mismatch between the MLAG peers. Cumulus Linux does not take any disruptive action. | | MLAG package version | Global| The consistency check records an MLAG package version mismatch between the MLAG peers. Cumulus Linux does not take any disruptive action.| You can also manually check for MLAG inconsistencies with the following commands: @@ -1081,7 +1081,7 @@ bridge-learning yes yes - {{< /tab >}} {{< /tabs >}} -The actions that Cumulus Linux takes when there is a conflict are distruptive. If you prefer, you can configure the switch to not take any action when there is a conflict. Edit the `/etc/network/interfaces` file to add the `clagd-args --gracefulConsistencyCheck FALSE` parameter in the peer link stanza. +The actions that Cumulus Linux takes when there is a conflict are disruptive. If you prefer, you can configure the switch to not take any action when there is a conflict. Edit the `/etc/network/interfaces` file to add the `clagd-args --gracefulConsistencyCheck FALSE` parameter in the peer link stanza. ``` cumulus@leaf01:~$ sudo nano /etc/network/interfaces diff --git a/content/cumulus-linux-56/Layer-2/Virtual-Router-Redundancy-VRR.md b/content/cumulus-linux-56/Layer-2/Virtual-Router-Redundancy-VRR.md index 2f2c2f9038..1db31cac05 100644 --- a/content/cumulus-linux-56/Layer-2/Virtual-Router-Redundancy-VRR.md +++ b/content/cumulus-linux-56/Layer-2/Virtual-Router-Redundancy-VRR.md @@ -156,8 +156,8 @@ The following example commands configure both 10.1.10.1/24 and 10.1.11.1/24 on V {{< tab "NVUE Commands ">}} ``` -cumulus@switch:mgmt:~$ nv set interface vlan10 ip vrr adress 10.1.10.1/24 -cumulus@switch:mgmt:~$ nv set interface vlan10 ip vrr adress 10.1.11.1/24 +cumulus@switch:mgmt:~$ nv set interface vlan10 ip vrr address 10.1.10.1/24 +cumulus@switch:mgmt:~$ nv set interface vlan10 ip vrr address 10.1.11.1/24 cumulus@switch:mgmt:~$ nv config apply ``` diff --git a/content/cumulus-linux-56/Layer-3/Border-Gateway-Protocol-BGP/Optional-BGP-Configuration.md b/content/cumulus-linux-56/Layer-3/Border-Gateway-Protocol-BGP/Optional-BGP-Configuration.md index 6c5c3a63e8..6f677122ae 100644 --- a/content/cumulus-linux-56/Layer-3/Border-Gateway-Protocol-BGP/Optional-BGP-Configuration.md +++ b/content/cumulus-linux-56/Layer-3/Border-Gateway-Protocol-BGP/Optional-BGP-Configuration.md @@ -1038,7 +1038,7 @@ BGP add-path RX enables BGP to receive multiple paths for the same prefix. A pat To view the existing capabilities, run the vtysh `show ip bgp neighbors` command. You can see the existing capabilities in the subsection *Add Path*, below *Neighbor capabilities.* -The following example output shows that BGP can sent and receive additional BGP paths, and that the BGP neighbor on swp51 supports both. +The following example output shows that BGP can send and receive additional BGP paths, and that the BGP neighbor on swp51 supports both. ``` cumulus@leaf01:~$ sudo vtysh diff --git a/content/cumulus-linux-56/Layer-3/Protocol-Independent-Multicast-PIM.md b/content/cumulus-linux-56/Layer-3/Protocol-Independent-Multicast-PIM.md index 4019adb1af..655f711270 100644 --- a/content/cumulus-linux-56/Layer-3/Protocol-Independent-Multicast-PIM.md +++ b/content/cumulus-linux-56/Layer-3/Protocol-Independent-Multicast-PIM.md @@ -17,6 +17,10 @@ PIM-SM has three configuration options: Cumulus Linux supports ASM and SSM only. +{{%notice note%}} +IGMPv3 works only with SSM multicast group ranges. +{{%/notice%}} + For additional information on PIM-SM, refer to {{}}. For a brief description of how PIM works, refer to [PIM Overview]({{}}). ## Example PIM Topology diff --git a/content/cumulus-linux-56/Layer-3/Routing/Policy-based-Routing.md b/content/cumulus-linux-56/Layer-3/Routing/Policy-based-Routing.md index 34db12a91c..9e578e8600 100644 --- a/content/cumulus-linux-56/Layer-3/Routing/Policy-based-Routing.md +++ b/content/cumulus-linux-56/Layer-3/Routing/Policy-based-Routing.md @@ -28,7 +28,7 @@ A PBR policy contains one or more policy maps. Each policy map: - To match on a source and destination address, a policy map can contain both match source and match destination IP rules. - A set rule determines the PBR next hop for the policy. -To use PBR in Cumulus linux, you define a PBR policy and apply it to the ingress interface (the interface must already have an IP address assigned). Cumulus Linux matches traffic against the match rules in sequential order and forwards the traffic according to the set rule in the first match. Traffic that does not match any rule passes on to the normal destination based routing mechanism. +To use PBR in Cumulus Linux, you define a PBR policy and apply it to the ingress interface (the interface must already have an IP address assigned). Cumulus Linux matches traffic against the match rules in sequential order and forwards the traffic according to the set rule in the first match. Traffic that does not match any rule passes on to the normal destination based routing mechanism. To configure a PBR policy: diff --git a/content/cumulus-linux-56/Layer-3/Routing/Route-Filtering-and-Redistribution.md b/content/cumulus-linux-56/Layer-3/Routing/Route-Filtering-and-Redistribution.md index d04ab79c6a..18ef2a6f1c 100644 --- a/content/cumulus-linux-56/Layer-3/Routing/Route-Filtering-and-Redistribution.md +++ b/content/cumulus-linux-56/Layer-3/Routing/Route-Filtering-and-Redistribution.md @@ -305,7 +305,7 @@ The `source-protocol` match statement is only supported in {{}} ``` -cumulus@switch:~$ nv set vrf default router bgp address-family ipv4-unicast route-redistribute ospf +cumulus@switch:~$ nv set vrf default router bgp address-family ipv4-unicast redistribute ospf cumulus@switch:~$ nv config apply ``` @@ -515,7 +515,7 @@ To redistribute all directly connected networks, use the `redistribute connected {{< tab "NVUE Commands ">}} ``` -cumulus@switch:~$ nv set vrf default router bgp address-family ipv4-unicast route-redistribute connected +cumulus@switch:~$ nv set vrf default router bgp address-family ipv4-unicast redistribute connected cumulus@switch:~$ nv config apply ``` diff --git a/content/cumulus-linux-56/Layer-3/Routing/Supported-Route-Table-Entries.md b/content/cumulus-linux-56/Layer-3/Routing/Supported-Route-Table-Entries.md index b89b8a1317..9133f82039 100644 --- a/content/cumulus-linux-56/Layer-3/Routing/Supported-Route-Table-Entries.md +++ b/content/cumulus-linux-56/Layer-3/Routing/Supported-Route-Table-Entries.md @@ -23,7 +23,7 @@ Cumulus Linux provides several generalized profiles, described below. These prof The following tables list the number of MAC addresses, layer 3 neighbors, and LPM routes validated for each forwarding table profile. If you do not specify any profiles as described below, the switch uses the *default* values. {{%notice note%}} -The values in the following tables reflect results from testing, which can differ from published manufacturer specifications. +The values provided in the profiles below are the maximum values that Cumulus Linux software allocates; the theoretical hardware limits might be higher. These limits refer to values that have been validated as part of the unidimensional scale validation. If you try to achieve maximum scalability with multiple features enabled, results might differ from the values listed in this guide. {{%/notice%}} ### Spectrum 1 diff --git a/content/cumulus-linux-56/Monitoring-and-Troubleshooting/FRRouting-Log-Message-Reference.md b/content/cumulus-linux-56/Monitoring-and-Troubleshooting/FRRouting-Log-Message-Reference.md index 8102a9ced5..5ec1b97caf 100644 --- a/content/cumulus-linux-56/Monitoring-and-Troubleshooting/FRRouting-Log-Message-Reference.md +++ b/content/cumulus-linux-56/Monitoring-and-Troubleshooting/FRRouting-Log-Message-Reference.md @@ -13,13 +13,13 @@ The following table lists the HIGH severity ERROR log messages generated by FRR. | Babel | HIGH | 16777218 | BABEL Packet Error | Babel has detected a packet encode/decode problem. | Collect the relevant log files and report the issue for troubleshooting.| | Babel | HIGH | 16777219 | BABEL Configuration Error | Babel has detected a configuration error of some sort. | Ensure that the configuration is correct. | | Babel | HIGH | 16777220 | BABEL Route Error | Babel has detected a routing error and is in an inconsistent state. | Gather data to report the issue for troubleshooting. Restart FRR. | -| BGP | HIGH | 33554433 | BGP attribute flag is incorrect | BGP attribute flag is set to the wrong value (Optional/Transitive/Partial). | Determine the soure of the attribute and determine why the attribute flag has been set incorrectly. | -| BGP | HIGH | 33554434 | BGP attribute length is incorrect | BGP attribute length is incorrect. | Determine the soure of the attribute and determine why the attribute length has been set incorrectly. | -| BGP | HIGH | 33554435 | BGP attribute origin value invalid | BGP attribute origin value is invalid. | Determine the soure of the attribute and determine why the origin attribute has been set incorrectly. | -| BGP | HIGH | 33554436 | BGP as path is invalid | BGP AS path has been malformed. | Determine the soure of the update and determine why the AS path has been set incorrectly. | -| BGP | HIGH | 33554437 | BGP as path first as is invalid | BGP update has invalid first AS in AS path. | Determine the soure of the update and determine why the AS path first AS value has been set incorrectly. | -| BGP | HIGH | 33554439 | BGP PMSI tunnel attribute type is invalid | BGP update has invalid type for PMSI tunnel. | Determine the soure of the update and determine why the PMSI tunnel attribute type has been set incorrectly. | -| BGP | HIGH | 33554440 | BGP PMSI tunnel attribute length is invalid | BGP update has invalid length for PMSI tunnel. | Determine the soure of the update and determine why the PMSI tunnel attribute length has been set incorrectly. | +| BGP | HIGH | 33554433 | BGP attribute flag is incorrect | BGP attribute flag is set to the wrong value (Optional/Transitive/Partial). | Determine the source of the attribute and determine why the attribute flag has been set incorrectly. | +| BGP | HIGH | 33554434 | BGP attribute length is incorrect | BGP attribute length is incorrect. | Determine the source of the attribute and determine why the attribute length has been set incorrectly. | +| BGP | HIGH | 33554435 | BGP attribute origin value invalid | BGP attribute origin value is invalid. | Determine the source of the attribute and determine why the origin attribute has been set incorrectly. | +| BGP | HIGH | 33554436 | BGP as path is invalid | BGP AS path has been malformed. | Determine the source of the update and determine why the AS path has been set incorrectly. | +| BGP | HIGH | 33554437 | BGP as path first as is invalid | BGP update has invalid first AS in AS path. | Determine the source of the update and determine why the AS path first AS value has been set incorrectly. | +| BGP | HIGH | 33554439 | BGP PMSI tunnel attribute type is invalid | BGP update has invalid type for PMSI tunnel. | Determine the source of the update and determine why the PMSI tunnel attribute type has been set incorrectly. | +| BGP | HIGH | 33554440 | BGP PMSI tunnel attribute length is invalid | BGP update has invalid length for PMSI tunnel. | Determine the source of the update and determine why the PMSI tunnel attribute length has been set incorrectly. | | BGP | HIGH | 33554442 | BGP peergroup operated on in error | BGP operating on peer-group instead of peers included. | Ensure the configuration doesn't contain peer-groups contained within peer-groups. | | BGP | HIGH | 33554443 | BGP failed to delete peer structure | BGP was unable to delete the peer structure when the address-family was removed. | Determine if all expected peers are removed and restart FRR if not. This is most likely a bug. | | BGP | HIGH | 33554444 | BGP failed to get table chunk memory | BGP unable to get chunk memory for table manager. | Ensure there is adequate memory on the device to support the table requirements. | @@ -38,8 +38,8 @@ The following table lists the HIGH severity ERROR log messages generated by FRR. | BGP | HIGH | 33554457 | BGP error receiving keepalive packet | BGP unable to process a keepalive packet. | BGP keepalive received while in a stopped state. If the problem persists, report it for troubleshooting. | | BGP | HIGH | 33554458 | BGP error receiving route refresh message | BGP unable to process route refresh message. | BGP route refresh received while in a stopped state. If the problem persists, report it for troubleshooting. | | BGP | HIGH | 33554459 | BGP error capability message | BGP unable to process received capability. | BGP capability message received while in a stopped state. If the problem persists, report it for troubleshooting. | -| BGP | HIGH | 33554460 | BGP error with nexthopo update | BGP unable to process nexthop update. | BGP received the nexthop update but the nexthop is not reachable in this BGP instance. Report the problem for troubleshooting. | -| BGP | HIGH | 33554461 | Failure to apply label | BGP attempted to attempted to apply a label but could not do so. | This is most likely a bug. If the problem persists, report it for troubleshooting. | +| BGP | HIGH | 33554460 | BGP error with nexthop update | BGP unable to process nexthop update. | BGP received the nexthop update but the nexthop is not reachable in this BGP instance. Report the problem for troubleshooting. | +| BGP | HIGH | 33554461 | Failure to apply label | BGP attempted to apply a label but could not do so. | This is most likely a bug. If the problem persists, report it for troubleshooting. | | BGP | HIGH | 33554462 | Multipath specified is invalid | BGP was started with an invalid ECMP/multipath value. | Correct the ECMP/multipath value supplied when starting the BGP daemon. | | BGP | HIGH | 33554463 | Failure to process a packet | BGP attempted to process a received packet but could not do so. | This is most likely a bug. If the problem persists, report it for troubleshooting. | | BGP | HIGH | 33554464 | Failure to connect to peer | BGP attempted to send open to a peer but couldn't connect. | This is most likely a bug. If the problem persists, report it for troubleshooting. | @@ -62,7 +62,7 @@ The following table lists the HIGH severity ERROR log messages generated by FRR. | EIGRP | HIGH | 50331650 | EIGRP Configuration Error | EIGRP has detected a configuration error.| Correct the configuration issue. If it still persists, report the issue for troubleshooting.| | General | HIGH | 100663297 | Failure to raise or lower privileges | FRR attempted to raise or lower its privileges and was unable to do so. | Ensure that you are running FRR as the frr user and that the user has sufficient privileges to properly access root privileges. | | General | HIGH | 100663298 | VRF Failure on Start | Upon startup, FRR failed to properly initialize and start up the VRF subsystem. | Ensure that there is sufficient memory to start processes, then restart FRR. | -| General | HIGH | 100663299 | Socket Error | When attempting to access a socket, a system error occured and FRR was unable to properly complete the request. | Ensure that there are sufficient system resources available and ensure that the frr user has sufficient permisions to work. | +| General | HIGH | 100663299 | Socket Error | When attempting to access a socket, a system error occurred and FRR was unable to properly complete the request. | Ensure that there are sufficient system resources available and ensure that the frr user has sufficient permissions to work. | | General | HIGH | 100663303 | System Call Error | FRR has detected an error from using a vital system call and has probably already exited. | Ensure permissions are correct for FRR users and groups. Additionally, check that sufficient system resources are available. | | General | HIGH | 100663304 | VTY Subsystem Error | FRR has detected a problem with the specified configuration file. | Ensure the configuration file exists and has the correct permissions for operations. Additionally, ensure that all config lines are correct as well. | | General | HIGH | 100663305 | SNMP Subsystem Error | FRR has detected a problem with the SNMP library it uses. A callback from this subsystem has indicated some error. | Examine the callback message and ensure SNMP is properly set up and working. | @@ -86,7 +86,7 @@ The following table lists the HIGH severity ERROR log messages generated by FRR. | OSPF | HIGH | 134217729 | Failure to process a packet | OSPF attempted to process a received packet but could not do so. | This is most likely a bug. If the problem persists, report it for troubleshooting. | | OSPF | HIGH | 134217730 | Failure to process Router LSA | OSPF attempted to process a router LSA, but there was an advertising ID mismtach with the link ID. | Check the OSPF network configuration for any configuration issue. If the problem persists, report it for troubleshooting.| | OSPF | HIGH | 134217731 | OSPF Domain Corruption | OSPF attempted to process a router LSA, but there was an advertising ID mismtach with the link ID. | Check OSPF network database for a corrupted LSA. If the problem persists, shut down the OSPF domain and report the problem for troubleshooting. | -| OSPF | HIGH | 134217732 | OSPF Initialization failure | OSPF failed to initialized the OSPF default instance. | Ensure there is adequate memory on the device. If the problem persists, report it for troubleshooting. | +| OSPF | HIGH | 134217732 | OSPF Initialization failure | OSPF failed to initialize the OSPF default instance. | Ensure there is adequate memory on the device. If the problem persists, report it for troubleshooting. | | OSPF | HIGH | 134217733 | OSPF SR Invalid DB | OSPF segment routing database is invalid. | This is most likely a bug. If the problem persists, report it for troubleshooting. | | OSPF | HIGH | 134217734 | OSPF SR hash node creation failed | OSPF segment routing node creation failed. | This is most likely a bug. If the problem persists, report it for troubleshooting. | | OSPF | HIGH | 134217735 | OSPF SR Invalid lsa id | OSPF segment routing invalid LSA ID. | Restart the OSPF instance. If the problem persists, report it for troubleshooting. | diff --git a/content/cumulus-linux-56/Monitoring-and-Troubleshooting/Network-Troubleshooting/Mellanox-WJH.md b/content/cumulus-linux-56/Monitoring-and-Troubleshooting/Network-Troubleshooting/Mellanox-WJH.md index cfa01cdba8..8f082d9055 100644 --- a/content/cumulus-linux-56/Monitoring-and-Troubleshooting/Network-Troubleshooting/Mellanox-WJH.md +++ b/content/cumulus-linux-56/Monitoring-and-Troubleshooting/Network-Troubleshooting/Mellanox-WJH.md @@ -5,7 +5,7 @@ weight: 1130 toc: 4 --- *What Just Happened* (WJH) provides real time visibility into network problems and has two components: -- The WJH agent enables you to stream detailed and contextual telemetry for off-switch analysis with tools such as [NVIDIA NetQ]({{}}). +- The WJH agent enables you to stream detailed and contextual telemetry for off-switch analysis with tools such as [NVIDIA NetQ]({{}}). - The WJH service (`what-just-happened`) enables you to diagnose network problems by looking at dropped packets. WJH can monitor layer 1, layer 2, layer 3, tunnel, buffer and ACL related issues. Cumulus Linux enables and runs the WJH service by default. ## Configure WJH diff --git a/content/cumulus-linux-56/Monitoring-and-Troubleshooting/Simple-Network-Management-Protocol-SNMP/Configure-SNMP.md b/content/cumulus-linux-56/Monitoring-and-Troubleshooting/Simple-Network-Management-Protocol-SNMP/Configure-SNMP.md index a4c74e80e1..ae8ec90744 100644 --- a/content/cumulus-linux-56/Monitoring-and-Troubleshooting/Simple-Network-Management-Protocol-SNMP/Configure-SNMP.md +++ b/content/cumulus-linux-56/Monitoring-and-Troubleshooting/Simple-Network-Management-Protocol-SNMP/Configure-SNMP.md @@ -32,7 +32,7 @@ cumulus@switch:~$ nv config apply {{%notice note%}} If you intend to run this service within a {{}}, including the {{}}, follow {{}} for configuring the service. -You do not need to run SNMP in the management VRF if you just want to allow SNMP communicaton through the managment VRF interfaces; see {{}}. +You do not need to run SNMP in the management VRF if you just want to allow SNMP communication through the management VRF interfaces; see {{}}. {{%/notice%}} 1. Start the `snmpd` service: diff --git a/content/cumulus-linux-56/Monitoring-and-Troubleshooting/Simple-Network-Management-Protocol-SNMP/Supported-MIBs.md b/content/cumulus-linux-56/Monitoring-and-Troubleshooting/Simple-Network-Management-Protocol-SNMP/Supported-MIBs.md index d21dc3a382..6be386ff43 100644 --- a/content/cumulus-linux-56/Monitoring-and-Troubleshooting/Simple-Network-Management-Protocol-SNMP/Supported-MIBs.md +++ b/content/cumulus-linux-56/Monitoring-and-Troubleshooting/Simple-Network-Management-Protocol-SNMP/Supported-MIBs.md @@ -10,7 +10,7 @@ Below are the MIBs that Cumulus Linux supports, as well as suggested uses for th |
MIB Name | Suggested Uses | | -------- | -------------- | | {{}}
{{}}
{{}}
{{}} | You can enable FRR SNMP support to provide support for OSPF-MIB (RFC-1850), OSPFV3-MIB (RFC-5643), and BGP4-MIB (RFC-1657). | -| {{}} | Cumulus Linux also includes its own BGP unnumbered MIB for BGP unnumbered peers, defined in `/usr/share/snmp/mibs/Cumulus-BGPUN-MIB.txt`, which has the OID `1.3.6.1.4.1.40310.7`.| +| {{}} | Cumulus Linux also includes its own BGP unnumbered MIB for BGP unnumbered peers, defined in `/usr/share/snmp/mibs/Cumulus-BGPUN-MIB.txt`, which has the OID `1.3.6.1.4.1.40310.7`.| | {{}} | Discard counters: Cumulus Linux also includes its own counters MIB, defined in `/usr/share/snmp/mibs/Cumulus-Counters-MIB.txt`. It has the OID `.1.3.6.1.4.1.40310.2`. | | {{}} | Cumulus Linux includes its own resource utilization MIB, which is similar to using `cl-resource-query`. This MIB monitors layer 3 entries by host, route, nexthops, ECMP groups, and layer 2 MAC/BDPU entries. `/usr/share/snmp/mibs/Cumulus-Resource-Query-MIB.txt` defines this MIB, which has the OID `.1.3.6.1.4.1.40310.1`. | | {{}} | SNMP counters. For information on exposing CPU and memory information with SNMP, see this [knowledge base article]({{}}). | diff --git a/content/cumulus-linux-56/Monitoring-and-Troubleshooting/Troubleshooting-Network-Interfaces/Troubleshoot-Layer-1.md b/content/cumulus-linux-56/Monitoring-and-Troubleshooting/Troubleshooting-Network-Interfaces/Troubleshoot-Layer-1.md index d0a06811f4..01f2b6addf 100644 --- a/content/cumulus-linux-56/Monitoring-and-Troubleshooting/Troubleshooting-Network-Interfaces/Troubleshoot-Layer-1.md +++ b/content/cumulus-linux-56/Monitoring-and-Troubleshooting/Troubleshooting-Network-Interfaces/Troubleshoot-Layer-1.md @@ -760,7 +760,7 @@ Because I2C problems can be very pernicious, often showing up again much later a To verify that an I2C failure is occurring, run `sudo tail -F /var/log/syslog` and look for `smbus` or `i2c` or `EEPROM read` errors that continue to appear or appear in bursts. -Based on the failure scenario when tyou discover the issue, choose when to address this issue; immediately or during a maintenance window. +Based on the failure scenario when you discover the issue, choose when to address this issue; immediately or during a maintenance window. - If traffic or the switch operates negatively and you cannot route traffic through a redundant network, you must do something immediately. - If you can route traffic around the failing switch, allowing troubleshooting to proceed on the failed switch, proceed to reroute traffic to find an appropriate time to troubleshoot the failing switch. diff --git a/content/cumulus-linux-56/Network-Virtualization/Ethernet-Virtual-Private-Network-EVPN/Basic-Configuration.md b/content/cumulus-linux-56/Network-Virtualization/Ethernet-Virtual-Private-Network-EVPN/Basic-Configuration.md index 3bc1e47072..7a89e69c79 100644 --- a/content/cumulus-linux-56/Network-Virtualization/Ethernet-Virtual-Private-Network-EVPN/Basic-Configuration.md +++ b/content/cumulus-linux-56/Network-Virtualization/Ethernet-Virtual-Private-Network-EVPN/Basic-Configuration.md @@ -70,7 +70,7 @@ cumulus@leaf01:~$ nv set vrf default router bgp neighbor swp51 address-family l2 cumulus@leaf01:~$ nv config apply ``` -You do not need enable the BGP control plane for all VNIs configured on the switch with NVUE with the `advertise-all-vni` option. FRR **is** aware of any local VNIs and MACs, and hosts (neighbors) associated with those VNIs. +You do not need to enable the BGP control plane for all VNIs configured on the switch with NVUE with the `advertise-all-vni` option. FRR **is** aware of any local VNIs and MACs, and hosts (neighbors) associated with those VNIs. After you run `nv config save`, the NVUE Commands create the following configuration snippet in the `/etc/nvue.d/startup.yaml` file: @@ -275,7 +275,7 @@ router bgp 65101 bgp router-id 10.10.10.1 neighbor swp51 interface remote-as external address-family l2vpn evpn -neighbor swp1 activate +neighbor swp51 activate advertise-all-vni ... ``` @@ -291,7 +291,7 @@ spine01(config)# router bgp 65199 spine01(config-router)# bgp router-id 10.10.10.101 spine01(config-router)# neighbor swp1 interface remote-as external spine01(config-router)# address-family l2vpn evpn -spine01(config-router-af)# neighbor swp51 activate +spine01(config-router-af)# neighbor swp1 activate spine01(config-router-af)# end spine01)# write memory spine01)# exit diff --git a/content/cumulus-linux-56/Network-Virtualization/Ethernet-Virtual-Private-Network-EVPN/EVPN-Multihoming.md b/content/cumulus-linux-56/Network-Virtualization/Ethernet-Virtual-Private-Network-EVPN/EVPN-Multihoming.md index b378d0c342..f6edda0520 100644 --- a/content/cumulus-linux-56/Network-Virtualization/Ethernet-Virtual-Private-Network-EVPN/EVPN-Multihoming.md +++ b/content/cumulus-linux-56/Network-Virtualization/Ethernet-Virtual-Private-Network-EVPN/EVPN-Multihoming.md @@ -25,7 +25,7 @@ To configure EVPN-MH, you set an Ethernet segment system MAC address and a local While you can specify a different system MAC address on different Ethernet segments attached to the same switch, the Ethernet segment system MAC address must be the same on the downlinks attached to the same server. {{%notice info%}} -On Spectrum-2 and Spectrum-3 switches, an Ethernet segment can span more than two switches. Each Ethernet segment is a distinct redundancy group. However, on Spectrum A1 switches, you can include a maximum of two switches in a redundancy group or Ethernet segment. +On Spectrum-2 and later, an Ethernet segment can span more than two switches. Each Ethernet segment is a distinct redundancy group. However, on Spectrum A1 switches, you can include a maximum of two switches in a redundancy group or Ethernet segment. {{%/notice%}} ## Required and Supported Features @@ -57,7 +57,7 @@ To use EVPN-MH, you must remove any MLAG configuration on the switch: - When an EVPN-MH bond enters LACP bypass state, BGP stops advertising EVPN type-1 and type-4 routes for that bond. The switch disables split-horizon and designated forwarder filters. - When an EVPN-MH bond exits the LACP bypass state, BGP starts advertising EVPN type-1 and type-4 routes for that bond. The switch enables split-horizon and designated forwarder filters. - [EVI](## "EVPN virtual instance") - Cumulus Linux supports VLAN-based service only, so the EVI is just a layer 2 VNI. -- Supported {{}} include NVIDIA Spectrum A1, Spectrum-2 and Spectrum-3. +- Supported {{}} include NVIDIA Spectrum A1, Spectrum-2 and later. ### Supported EVPN Route Types diff --git a/content/cumulus-linux-56/Network-Virtualization/QinQ-and-VXLANs.md b/content/cumulus-linux-56/Network-Virtualization/QinQ-and-VXLANs.md index 68acb8ec49..217b14f014 100644 --- a/content/cumulus-linux-56/Network-Virtualization/QinQ-and-VXLANs.md +++ b/content/cumulus-linux-56/Network-Virtualization/QinQ-and-VXLANs.md @@ -207,7 +207,7 @@ The configuration in Cumulus Linux uses the outer tag for the customer and the i {{%notice note%}} You can use double tag translation: -- On Spectrum-2 and Spectrum-3 switches in a VXLAN configuration on native interfaces only. You cannot configure double tag translation on bonds. +- On Spectrum-2 and later in a VXLAN configuration on native interfaces only. You cannot configure double tag translation on bonds. - With bridges in {{}} only. - With 802.1Q bridge mode. - *Without* MLAG. diff --git a/content/cumulus-linux-56/Network-Virtualization/VXLAN-Devices.md b/content/cumulus-linux-56/Network-Virtualization/VXLAN-Devices.md index ad77511ca2..9d6f1a30e5 100644 --- a/content/cumulus-linux-56/Network-Virtualization/VXLAN-Devices.md +++ b/content/cumulus-linux-56/Network-Virtualization/VXLAN-Devices.md @@ -197,7 +197,7 @@ cumulus@leaf01:~$ ifreload -a ## Automatic VLAN to VNI Mapping -In an EVPN VXLAN environment, you need to map individual VLANs to VNIs. For a single VXLAN device, you can do this with a seperate NVUE command per VLAN; however, this can be cumbersome if you have to configure many VLANS or need to isolate tenants and reuse VLANs. To simplify the configuration, you can use these two commands instead: +In an EVPN VXLAN environment, you need to map individual VLANs to VNIs. For a single VXLAN device, you can do this with a separate NVUE command per VLAN; however, this can be cumbersome if you have to configure many VLANS or need to isolate tenants and reuse VLANs. To simplify the configuration, you can use these two commands instead: - `nv set bridge domain vlan vni auto` configures the specified VLANs to use automatic mapping. - `nv set bridge domain vlan-vni-offset` configures the offset you want to use for the VNIs. For example, if you specify an offset of 10000, the VNI is the VLAN plus 10000. diff --git a/content/cumulus-linux-56/System-Configuration/Authentication-Authorization-and-Accounting/LDAP-Authentication-and-Authorization.md b/content/cumulus-linux-56/System-Configuration/Authentication-Authorization-and-Accounting/LDAP-Authentication-and-Authorization.md index fbe8e4e8d7..9937ec1a95 100644 --- a/content/cumulus-linux-56/System-Configuration/Authentication-Authorization-and-Accounting/LDAP-Authentication-and-Authorization.md +++ b/content/cumulus-linux-56/System-Configuration/Authentication-Authorization-and-Accounting/LDAP-Authentication-and-Authorization.md @@ -57,10 +57,10 @@ Entering incorrect information during the installation process produces configur - Edit the `/etc/nslcd.conf` file to update the LDAP URI and search base DN (see {{}}, below). - Edit the `/etc/nssswitch.conf` file to update the service selections. -Be sure to restart `netd` after editing the files. +After editing the files, restart the NVUE and nginx-authenticator services with the `sudo systemctl restart nvued.service` command and the `sudo systemctl restart nginx-authenticator.service` command. ``` -cumulus@switch:~$ sudo systemctl restart netd.service +cumulus@switch:~$ sudo systemctl restart nvued.service ``` {{< expand "Alternative Installation Method Using debconf-utils " >}} @@ -131,7 +131,7 @@ After installation, update the main configuration file (`/etc/nslcd.conf`) to ac This section documents some of the more important options that relate to security and queries. For details on all the available configuration options, read the {{}}. {{%notice note%}} -After first editing the `/etc/nslcd.conf` file and/or enabling LDAP in the `/etc/nsswitch.conf` file, you must restart `netd` with the `sudo systemctl restart netd` command. If you disable LDAP, you need to restart the `netd` service. +After editing the `/etc/nslcd.conf` file or enabling LDAP in the `/etc/nsswitch.conf` file, you must restart the NVUE and nginx-authenticator services with the `sudo systemctl restart nvued.service` command and the `sudo systemctl restart nginx-authenticator.service` command. If you disable LDAP, you must also restart these two services. {{%/notice%}} ### Connection diff --git a/content/cumulus-linux-56/System-Configuration/Authentication-Authorization-and-Accounting/RADIUS-AAA.md b/content/cumulus-linux-56/System-Configuration/Authentication-Authorization-and-Accounting/RADIUS-AAA.md index d12209dd9d..15b4781d11 100644 --- a/content/cumulus-linux-56/System-Configuration/Authentication-Authorization-and-Accounting/RADIUS-AAA.md +++ b/content/cumulus-linux-56/System-Configuration/Authentication-Authorization-and-Accounting/RADIUS-AAA.md @@ -31,6 +31,10 @@ During package installation: ## Configure the RADIUS Client +{{%notice note%}} +After editing the `/etc/pam_radius_auth.conf` file, you must restart the NVUE and nginx-authenticator services with the `sudo systemctl restart nvued.service` command and the `sudo systemctl restart nginx-authenticator.service` command. +{{%/notice%}} + To configure the RADIUS client, edit the `/etc/pam_radius_auth.conf` file: 1. Add the hostname or IP address of at least one RADIUS server (such as a *{{}}* server on Linux), and the shared secret used to authenticate and encrypt communication with each server. diff --git a/content/cumulus-linux-56/System-Configuration/Authentication-Authorization-and-Accounting/TACACS.md b/content/cumulus-linux-56/System-Configuration/Authentication-Authorization-and-Accounting/TACACS.md index 7bc2fc0798..15b65da50d 100644 --- a/content/cumulus-linux-56/System-Configuration/Authentication-Authorization-and-Accounting/TACACS.md +++ b/content/cumulus-linux-56/System-Configuration/Authentication-Authorization-and-Accounting/TACACS.md @@ -41,12 +41,16 @@ After you install the required TACACS+ packages, configure the following require If you use NVUE commands to configure TACACS+, you must also set the priority for the authentication order for local and TACACS+ users, and enable TACACS+. +{{%notice note%}} +After you configure any TACACS+ settings with NVUE and you run `nv config apply`, you must restart the NVUE service with the `sudo systemctl restart nvued.service` command. +{{%/notice%}} + {{< tabs "TabID31 ">}} {{< tab "NVUE Commands ">}} NVUE commands require you to specify the priority for each TACACS+ server. You must set a priority even if you only specify one server. -The following example commmands set: +The following example commands set: - The TACACS+ server priority to 5. - The IP address of the server to 192.168.0.30. - The secret to `mytacac$key`. diff --git a/content/cumulus-linux-56/System-Configuration/Authentication-Authorization-and-Accounting/User-Accounts.md b/content/cumulus-linux-56/System-Configuration/Authentication-Authorization-and-Accounting/User-Accounts.md index 3bf43711c8..ac4ff385fe 100644 --- a/content/cumulus-linux-56/System-Configuration/Authentication-Authorization-and-Accounting/User-Accounts.md +++ b/content/cumulus-linux-56/System-Configuration/Authentication-Authorization-and-Accounting/User-Accounts.md @@ -53,7 +53,7 @@ cumulus@switch:~$ nv config apply You can also run the `nv set system aaa user password ` command to specify the plain text password inline. This command bypasses the `Enter new password` and `Confirm password` prompts but displays the plain text password as you type it. {{%notice note%}} -If you are an NVUE-mangaged user, you can update your own password with the Linux `passwd` command. +If you are an NVUE-managed user, you can update your own password with the Linux `passwd` command. {{%/notice%}} {{< /tab >}} @@ -218,7 +218,7 @@ admin2 FIRST LAST system-admin on ... ``` -To show information about a specific user account, run the run the NVUE `nv show system aaa user ` command: +To show information about a specific user account, run the NVUE `nv show system aaa user ` command: ``` cumulus@switch:~$ nv show system aaa user admin2 diff --git a/content/cumulus-linux-56/System-Configuration/Date-and-Time/Precision Time Protocol-PTP.md b/content/cumulus-linux-56/System-Configuration/Date-and-Time/Precision Time Protocol-PTP.md index 0121a10364..f24d2cc887 100644 --- a/content/cumulus-linux-56/System-Configuration/Date-and-Time/Precision Time Protocol-PTP.md +++ b/content/cumulus-linux-56/System-Configuration/Date-and-Time/Precision Time Protocol-PTP.md @@ -250,7 +250,7 @@ Restarting the `switchd` service causes all network ports to reset in addition t delay_mechanism E2E ``` - For a trunk VLAN, add the VLAN configuration to the switch port stanza: set `l2_mode` to `trunk`, `vlan_intf` to the VLAN interface, and `src_ip` to the IP adress of the VLAN interface: + For a trunk VLAN, add the VLAN configuration to the switch port stanza: set `l2_mode` to `trunk`, `vlan_intf` to the VLAN interface, and `src_ip` to the IP address of the VLAN interface: ``` [swp1] @@ -263,7 +263,7 @@ Restarting the `switchd` service causes all network ports to reset in addition t network_transport UDPv4 ``` - For a switch port VLAN, add the VLAN configuration to the switch port stanza: set `l2_mode` to `access`, `vlan_intf` to the VLAN interface, and `src_ip` to the IP adress of the VLAN interface: + For a switch port VLAN, add the VLAN configuration to the switch port stanza: set `l2_mode` to `access`, `vlan_intf` to the VLAN interface, and `src_ip` to the IP address of the VLAN interface: ``` [swp2] @@ -1044,7 +1044,7 @@ Cumulus Linux supports the following predefined profiles: - You cannot set global PTP parameters in a profile currently in use. - PTP profiles do not support VLANs or bonds. - If you set a predefined or custom profile, do not change any global PTP settings, such as the [DSCP](## "DiffServ code point") or the clock domain. -- For better performance in a high scale network with PTP on multiple interfaces, configure a higher system policer rate with the `nv set system control-plane policer lldp burst ` and `nv set system control-plane policer lldp rate ` commands. The switch uses the LLDP policer for PTP protocol packets. The default value for the LLDP policer is 2500. When you use the ITU 8275.1 profile with higher sync rates, use higher policer values. +- For better performance in a high scale network with PTP on multiple interfaces, configure a higher system policer rate with the `nv set system control-plane policer lldp-ptp burst ` and `nv set system control-plane policer lldp-ptp rate ` commands. The switch uses the LLDP policer for PTP protocol packets. The default value for the LLDP policer is 2500. When you use the ITU 8275.1 profile with higher sync rates, use higher policer values. {{%/notice%}} ### Set a Predefined Profile @@ -1174,7 +1174,7 @@ To create a custom profile: - Update any of the profile settings you want to change (`announce-interval`, `delay-req-interval`, `priority1`, `sync-interval`, `announce-timeout`, `domain`, `priority2`, `transport`, `delay-mechanism`, `local-priority`). - Set the custom profile to be the current profile. -The following example commands create a custom profile called CUSTOM1 based on the predifined profile ITU 8275-1. The commands set the `domain` to 28 and the `announce-timeout` to 3, then set `CUSTOM1` to be the current profile: +The following example commands create a custom profile called CUSTOM1 based on the predefined profile ITU 8275-1. The commands set the `domain` to 28 and the `announce-timeout` to 3, then set `CUSTOM1` to be the current profile: ``` cumulus@switch:~$ nv set service ptp 1 profile CUSTOM1 @@ -1188,7 +1188,7 @@ cumulus@switch:~$ nv config apply {{< /tab >}} {{< tab "Linux Commands ">}} -The following example `/etc/ptp4l.conf` file creates a custom profile based on the predifined profile ITU 8275-1 and sets the `domain` to 28 and the `announce-timeout` to 3. +The following example `/etc/ptp4l.conf` file creates a custom profile based on the predefined profile ITU 8275-1 and sets the `domain` to 28 and the `announce-timeout` to 3. ``` cumulus@switch:~$ sudo nano /etc/ptp4l.conf @@ -1429,10 +1429,10 @@ You can configure the following monitor settings: | ----- | ----------- | | `nv set service ptp monitor min-offset-threshold` | Sets the minimum difference allowed between the master and slave time. You can set a value between -1000000000 and 0 nanoseconds. The default value is -50 nanoseconds.| | `nv set service ptp monitor max-offset-threshold` | Sets the maximum difference allowed between the master and slave time. You can set a value between 0 and 1000000000 nanoseconds. The default value is 50 nanoseconds.| -| `nv set service ptp monitor path-delay-threshold` | Sets the mean time that PTP packets take to travel between the master and slave. You can set a value between 0 and 1000000000 nanoseconds . The default value is 200 nanoseconds. | +| `nv set service ptp monitor path-delay-threshold` | Sets the mean time that PTP packets take to travel between the master and slave. You can set a value between 0 and 1000000000 nanoseconds. The default value is 200 nanoseconds. | | `nv set service ptp monitor max-timestamp-entries` | Sets the maximum number of timestamp entries allowed. Cumulus Linux updates the timestamps continuously. You can specify a value between 100 and 200. The default value is 100 entries.| -The following example sets the minimum offeset threshold to -1000, the maximum offeset threshold to 1000, and the path delay threshold to 300: +The following example sets the minimum offset threshold to -1000, the maximum offset threshold to 1000, and the path delay threshold to 300: ``` cumulus@switch:~$ nv set service ptp 1 monitor min-offset-threshold -1000 @@ -1452,7 +1452,7 @@ You can configure the following monitor settings manually in the `/etc/ptp4l.con | `offset_from_master_max_threshold` | Sets the maximum difference allowed between the master and slave time. You can set a value between 0 and 1000000000 nanoseconds. The default value is 50 nanoseconds. | | `mean_path_delay_threshold` | Sets the mean time that PTP packets take to travel between the master and slave. You can set a value between 0 and 1000000000 nanoseconds. The default value is 200 nanoseconds. | -The following example sets the minimum offeset threshold to -1000, the maximum offeset threshold to 1000, and the path delay threshold to 300: +The following example sets the minimum offset threshold to -1000, the maximum offset threshold to 1000, and the path delay threshold to 300: ``` cumulus@switch:~$ sudo nano /etc/ptp4l.conf @@ -1508,11 +1508,11 @@ You can configure the following monitor settings manually in the `/etc/ptp4l.con | Parameter | Description | | ----- | ----------- | -| `tsmonitor_num_log_sets` | Sets the maxumum number of log sets allowed. You can specify a value between 2 and 4. The default value is 3.| +| `tsmonitor_num_log_sets` | Sets the maximum number of log sets allowed. You can specify a value between 2 and 4. The default value is 3.| | `tsmonitor_num_log_entries` | Sets the maximum number of log entries allowed in a log set. You can specify a value between 4 and 8. The default value is 4.| | `tsmonitor_log_wait_seconds` | Sets the number of seconds to wait before logging back-to-back violations. You can specify a value between 0 and 60. The default value is 1.| -The following example sets the maxumum number of log sets allowed to 4, the maximum number of log entries allowed to 6, and the violation log interval to 10: +The following example sets the maximum number of log sets allowed to 4, the maximum number of log entries allowed to 6, and the violation log interval to 10: ``` cumulus@switch:~$ sudo nano /etc/ptp4l.conf @@ -1550,7 +1550,7 @@ PTP monitoring provides commands to show counters for violations as well as the | Command | Description | | -------- | ----------- | | `nv show service ptp monitor timestamp-log` | Shows the last 25 PTP timestamps. | -| `nv show service ptp monitor violations` | Shows the threshold violation count and the last time a violation of a specific type occured. | +| `nv show service ptp monitor violations` | Shows the threshold violation count and the last time a violation of a specific type occurred. | | `nv show service ptp 1 monitor violations log acceptable-master` | Shows logs with violations that occur when a PTP server not in the Acceptable Master table sends an Announce request. | | `nv show service ptp 1 monitor violations log forced-master` | Shows logs with violations that occur when a forced master port gets a higher clock. | | `nv show service ptp 1 monitor violations log max-offset` | Shows logs with violations that occur when the timestamp offset is higher than the max offset threshold. | @@ -1947,7 +1947,7 @@ network_transport UDPv4 ### PTP Traffic Shaping -To improve performance on the NVIDA Spectrum 1 switch for PTP-enabled ports with speeds lower than 100G, you can enable a pre-defined traffic shaping profile. For example, if you see that the PTP timing offset varies widely and does not stabilize, enable PTP shaping on all PTP enabled ports to reduce the bandwidth on the ports slightly and improve timing stabilization. +To improve performance on the NVIDIA Spectrum 1 switch for PTP-enabled ports with speeds lower than 100G, you can enable a pre-defined traffic shaping profile. For example, if you see that the PTP timing offset varies widely and does not stabilize, enable PTP shaping on all PTP enabled ports to reduce the bandwidth on the ports slightly and improve timing stabilization. {{%notice note%}} - Switches with Spectrum-2 and later do not support PTP shaping. diff --git a/content/cumulus-linux-56/System-Configuration/Netfilter-ACLs.md b/content/cumulus-linux-56/System-Configuration/Netfilter-ACLs.md index 8bbb17705f..920a0bdd8f 100644 --- a/content/cumulus-linux-56/System-Configuration/Netfilter-ACLs.md +++ b/content/cumulus-linux-56/System-Configuration/Netfilter-ACLs.md @@ -138,7 +138,7 @@ The incremental nonatomic update operation follows this order: 2. Cumulus Linux checks if the rules in a table are different from installation time; if a table does not have any changes, it does not reinstall the rules. 3. If there are changes in a table, the new rules populate in new groups or slices in hardware, then that table switches over to the new groups or slices. 4. Finally, old resources for that table free up. This process repeats for each of the tables listed above. -5. If there are isufficient resources to hold both the new rule set and old rule set, Cumulus Linux tries the regular nonatomic mode, which interrupts network traffic. +5. If there are insufficient resources to hold both the new rule set and old rule set, Cumulus Linux tries the regular nonatomic mode, which interrupts network traffic. 6. If the regular nonatomic update fails, Cumulus Linux reverts back to the previous rules. To always reload `switchd` with nonatomic updates: @@ -526,7 +526,7 @@ INPUT FORWARD OUTPUT |Rule Element|Supported|Unsupported| |--- |--- |--- | -|**Matches**|Src/Dst, IP protocol
In/out interface
IPv4: icmp, ttl,
IPv6: icmp6, frag, hl,
IP common: tcp ({{}}), udp, multiport, DSCP, addrtype|Rules with input/output Ethernet interfaces do not apply
Inverse matches| +|**Matches**|Src/Dst, IP protocol
In/out interface
IPv4: ecn, icmp, frag, ttl,
IPv6: icmp6, hl,
IP common: tcp ({{}}), udp, multiport, DSCP, addrtype|Rules with input/output Ethernet interfaces do not apply
Inverse matches| |**Standard Targets**|ACCEPT, DROP|RETURN, QUEUE, STOP, Fall Thru, Jump| |**Extended Targets**|LOG (IPv4/IPv6); UID is not supported for LOG
TCP SEQ, TCP options or IP options
ULOG
SETQOS
DSCP
Unique to Cumulus Linux:
SPAN
ERSPAN (IPv4/IPv6)
POLICE
TRICOLORPOLICE
SETCLASS|| @@ -1360,7 +1360,7 @@ To work around this limitation, set the rate and burst for all these rules to th ### Where to Assign Rules - If you assign a switch port to a bond, you must assign any egress rules to the bond. -- When using the OUTPUT chain, you must assign rules to the source. For example, if you assign a rule to the switch port in the direction of traffic but the source is a bridge (VLAN), the rule does not affect the traffic and you must applied the rule to the bridge. +- When using the OUTPUT chain, you must assign rules to the source. For example, if you assign a rule to the switch port in the direction of traffic but the source is a bridge (VLAN), the rule does not affect the traffic and you must apply the rule to the bridge. - If you need to apply a rule to all transit traffic, use the FORWARD chain, not the OUTPUT chain. ### ACL Rule Installation Failure @@ -1379,7 +1379,7 @@ failed. Entity MIB
1.3.6.1.2.1.99 --> Entity Sensor MIB
1.3.6.1.2.1.23 --> rip2
1.3.6.1.2.1.2 --> interface/interfaces
1.3.6.1.2.1.31 --> ifMIB
1.3.6.1.2.1.4 --> IP
1.3.6.1.2.1.25 --> hostResource | 5.0.1-5.6.0 | | | [3135952](#3135952)
| PAM4 split cables (such as 2x100G, 4x100G, and 4x50G) do not work with a forced speed setting (when auto-negotiation is off) as the default speed enabled is for NRZ mode (such as 100G_4X). To work around this issue, set the appropriate lanes for forced speed (with auto-negotation off) with the ethtool -s swpX speed autoneg off lanes command. For example:
cumulus@switch:~$ sudo ethtool -s swp1 speed 100000 autoneg off lanes 2
| 5.2.0-5.6.0 | | | [3122301](#3122301)
| On the NVIDIA SN4700 switch, inserting and removing the PSU might cause loss of frames. | 5.2.0-5.6.0 | | | [3115242](#3115242)
| When you configure two VNIs in the same VLAN, ifupdown2 shows a vlan added to two or more VXLANS warning, which is only issued after the VNI is already added to the bridge. This leaves the new VNI in the PVID even if there is already an existing VNI configured in that PVID. | 5.1.0-5.6.0 | | @@ -83,7 +101,6 @@ pdfhidden: True | [2891255](#2891255)
| CVE-2021-39925: Buffer overflow in the Bluetooth SDP dissector in Wireshark 3.4.0 to 3.4.9 and 3.2.0 to 3.2.17 allows denial of service via packet injection or crafted capture file
Vulnerable: <= 2.6.20-0+deb10u1Fixed: 2.6.20-0+deb10u2 | 4.0.0-4.4.1, 5.0.0-5.6.0 | 4.4.2-4.4.5| | [2890681](#2890681)
| CVE-2021-42771: relative path traversal in Babel, a set of tools for internationalising Python applications, could result in the execution of arbitrary code
Vulnerable: 2.6.0+dfsg.1-1Fixed: 2.6.0+dfsg.1-1+deb10u1 | 4.0.0-4.4.1, 5.0.0-5.6.0 | 4.4.2-4.4.5| | [2867042](#2867042)
| When connecting the NVIDIA SN4600 switch to another NVIDIA Spectrum switch, you must use auto-negotiation mode (not force mode); otherwise the switch might use the wrong Tx configuration. | 5.0.0-5.6.0 | | -| [2847919](#2847919)
| Configuring a router with the REST API through the switch front panel ports (swps) is supported in the default VRF only. To work around this issue, use the localHost IP address or the MGMT IP address to configure router using the Rest API. | 5.0.0-5.6.0 | | | [2847755](#2847755)
| When you use NCLU to remove the configuration for a peer that is a member of a group but also has other peer-specific configuration, you must remove the peer-specific configuration before you delete the peer in a separate NCLU commit. | 5.0.0-5.6.0 | | | [2823307](#2823307)
| Cumuls Linux does not support a bond with more than 64 ports. Any configuration with more than 64 ports in a bond changes all ports to down when you apply the configuration. | 5.0.0-5.6.0 | | | [2736108](#2736108)
| When you change the VRRP advertisement interval on the master, the master advertisement interval field in the show vrrp command output does not show the updated value. | 4.4.0-4.4.5, 5.0.0-5.6.0 | | @@ -96,6 +113,7 @@ pdfhidden: True ### Fixed Issues in 5.6.0 | Issue ID | Description | Affects | |--- |--- |--- | +| [3695541](#3695541)
| When applying a full configuration with NVUE that includes VRRP and BGP in VRFs, the VRRP configuration does not come up after you run nv config apply. BGP routes might also be missing. This issue only happens during the initial nv config apply of a full configuration, not during a normal initialization during a reboot or FRR restart. To work around this issue, reboot or restart FRR. | 5.5.1 | | | [3647426](#3647426)
None | If BGP remote-as is set to an integer and you try to configure the local-as for a BGP instance, you see the following error:
% AS specified for local as is the same as the remote as and this is not allowed
This configuration is not allowed; it is considered to be eBGP and local preference is not advertised. | 5.0.0-5.5.1 | | | [3572580](#3572580)
| You cannot set a VLAN match and a MAC protocol IPv4 match in a MAC type ACL rule. To apply ACLs with a VLAN match and layer 3 header matches ( IPV4/IPV6), you need to use type ipv4 or ipv6 ACLs with the VLAN match specified. | 5.5.1 | | | [3572566](#3572566)
| The NVUE nv action commands are missing from nv list-commands output. | 5.5.1 | | @@ -116,7 +134,7 @@ pdfhidden: True | [3491259](#3491259)
| When BGP receives an EVPN type-5 route with a gateway IP overlay attribute, the gateway IP overlay attribute in the attr memory (which is already inserted in the attribute hash) might change. As a result, the modified attr memory might match with another attr in the attribute hash, which produces duplicate entries in the hash table. As a result, BGP might crash when deleting one of the duplicate attr structures. | 5.0.0-5.5.1 | | | [3488136](#3488136)
| When zebra receives route updates that include both a route with a recursive next hop and the route used to resolve that next hop, zebra might mark the route with the recursive next hop as inactive. To work around this issue, reprocess the route updates by running the appropriate clear command for the protocol in use. For example, for BGP, clear inbound routes from the relevant neighbor using the nv action clear vrf router bgp neighbor address-family in command. | 4.2.1-5.5.1 | | | [3486102](#3486102)
| SNMP and TACACS secrets are shown in cleartext. | 5.5.0-5.5.1 | | -| [3482006](#3482006)
None | If FRR learns a layer 2 entry against a VNI and you reconfigure the VNI later as a layer 3 VNI, the original layer 2 entry does not clear and remains in the forwarding database. | 4.3.0-5.5.1 | | +| [3482006](#3482006)
None | If FRR learns a layer 2 entry against a VNI and you reconfigure the VNI later as a layer 3 VNI, the original layer 2 entry does not clear and remains in the forwarding database. | 4.3.0-4.3.1 | | | [3479786](#3479786)
| The switchd service does not handle certain route and next hop updates, which causes a synchronization loop. For example, in a VRF route leaking configuration, where a next hop group spans across multiple VRFs, when one of the routes is withdrawn and the next hop is no longer used, switchd has problems synchronizing other next hops in the group
To work around this issue, disable next hop groups in zebra with the vtysh zebra nexthop proto only command, and then reboot the switch. | 5.3.0-5.5.1 | | | [3474427](#3474427)
| On rare occasions, LLDP and other CPU originated IP packets that egress a port might get replicated in the data plane and forwarded out of another port as well. The peer node might discard the unicast packets on the wrong port because of the destination MAC address; however, there might be problems with multicast packets, such as LLDP, which uses a multicast MAC address as the destination MAC address. To work around this issue, reboot the switch. | | | | [3474391](#3474391)
| The SNMP MIB definition file /usr/share/snmp/mibs/Cumulus-BGPVRF-MIB.txt does not define the INDEX of the bgpPeerEntry correctly. This issue does not impact SNMP functionality for this MIB. | 4.3.1-5.5.1 | | @@ -146,6 +164,7 @@ pdfhidden: True | [3378733](#3378733)
| After you add or delete a static MAC entry on the bridge FDB, a core dump occurs if the interface is VXLAN and the MAC address is 00:00:00:00:00:00. | 5.4.0-5.5.1 | | | [3344846](#3344846)
| The Spectrum-3 hardware configuration is not optimized for the best PTP accuracy when using 25GbE. You might see higher than expected PTP offsets on this platforms and interface speed. | 5.4.0-5.5.1 | | | [3336808](#3336808)
| If you run the NVUE nv set interface description command without providing a description, the nv config apply command fails with the error Unable to restart services (ifreload-nvue.service). | 5.4.0-5.5.1 | | +| [3293114](#3293114)
| In Cumulus Linux 5.4 and earlier, the command to enable Neighbor Discovery (ND) router advertisement is inverted and causes confusion; nv set interface ip neighbor-discovery router-advertisement enable off. In Cumulus Linux 5.5 and later, the command to enable router advertisement is updated to nv set interface ip neighbor-discovery router-advertisement enable on. | 5.3.0-5.5.1 | | | [3187469](#3187469)
| At high scale with 160 VRFs and 10 VLANs per VRF (a total of 1600 VLANs), you see traffic loss during primary switch reboot. To work around this issue, reduce the scale to 40 VRFs with no more than 400 VLANs in the configuration, and use a common MAC address. | 5.1.0-5.5.1 | | | [3178090](#3178090)
| The cl-support generation script causes TC filter collection to run as a background process for each interface, which can lead to memory exhaustion on a high scale configuration and on a switch with a small memory footprint. | 5.1.0-5.5.1 | | | [3172682](#3172682)
| On rare occasions, when you query the system hostname through the hostnamctl application, you see a timeout. NVUE uses the hostnamctl application to determine the system hostname, which can result in an nv config apply command failure. | 5.2.0-5.5.1 | | diff --git a/content/cumulus-linux-56/rn.xml b/content/cumulus-linux-56/rn.xml index 28578b42c8..dffb5612fc 100644 --- a/content/cumulus-linux-56/rn.xml +++ b/content/cumulus-linux-56/rn.xml @@ -7,24 +7,122 @@ Fixed -3634358 -After applying the {{nv set interface <vlan> router ospf passive}} command to a MACVLAN virtual interface that has an OSPF network statement (example shown below), NVUE might get into a broken state and might not be able to apply any more configurations. +3684268 +When multiple interfaces have addresses in the same network, deleting one of them might cause the wrong connected route from being deleted. +5.6.0 + + + +3683166 +A statistics issue in the I2C interface to modules is locked and might cause the switch to hang. +5.6.0 + + + +3669935 +When you add or delete VXLAN VNI and VLAN interfaces, a memory leak might occur in {{switchd}}. +5.6.0 + + + +3668939 +When you enable MIB 1.3.6.1.4.1.40310.1 in the {{snmpd.conf}} file, you might see high CPU usage by the {{snmpd}} service. +5.5.1-5.6.0 + + + +3668809 +SN2410 switches manufactured or sold by OEMs (not Mellanox) might contain fans that do not support system fan direction detection. As a result, the following messages occur in the log: -nv set interface vlan10 ip vrr address 10.1.10.1/24 -nv set interface vlan10 ip vrr mac-address 00:00:5E:00:01:00 -nv set interface vlan10 vlan 10 -nv set vrf default router ospf area 0 network 10.1.10.1/24 -... -nv set interface vlan10-v0 router ospf passive on +/usr/sbin/smond : : Path /run/hw-management/thermal/fan1_dir does not exist +/usr/sbin/smond : : Path /run/hw-management/thermal/fan2_dir does not exist -To work around this issue, do not use a network statement on a VRR VLAN interface, use an interface statement instead: +{{smond}} has been modified to determine dynamically (at run-time) if the fan has the capability. To drop the messages before they get to the log, create a file, such as {{/etc/rsyslog.d/18-drop_fan_dir_msgs.conf}} with the following contents, then restart {{rsyslogd}} with the {{systemctl restart rsyslog}} command. -nv set interface vlan10 router ospf area 0 +# The lines below cause the offending message to be dropped from all logs +:msg, ereregex, ".*Path /run/hw-management/thermal/fan[1-8]_dir does not exist" stop 5.6.0 +3664986 +If a core file is generated with a space in the name, Cumulus Linux generates cl-support files until the file is removed. To work around this issue, rename the core file without the space character. The next cl-support file generated will be moved into the cl-support archive and removed from the filesystem. +5.6.0 + + + +3663182 +Changing non-default BGP timers with NCLU or vtysh commands sets the hold time and keep alive interval to 0 seconds. To work around this issue, restart the FRR service with the {{sudo systemctl restart frr.service}} command. +5.3.1-5.6.0 + + + +3662354 +When you enable the FRR SNMP agent (agentx) and configure routing adjacencies with short timers (dead, keepalive, and hold time), the routing adjacencies might go down in certain scenarios; for example when you have frequent or concurrent client SNMP requests, you use custom SNMP MIB extensions, you poll OIDs with large responses, or during high CPU load. To work around this issue, you can increase the routing adjacency timers to accommodate SNMP processing. +5.6.0 + + + +3655043 +After you upgrade to Cumulus Linux 5.6.0 with package upgrade, configuration changes you make with NVUE commands do not apply and you see the error message {{Invalid config [rev_id: 4] Default profile parameters can not be modified. Modification allowed on user created profiles.}} To workaround this issue: + +1. Remove the PTP configuration using the {{nv unset service ptp 1 enable}} syntax. +2. Save the configuration {{nv config apply}}. +3. Re-add the PTP config. +Note: this procedure results in a switchd restart which will have an impact on the data plane. +5.6.0 + + + +3646119 +If you have VRFs configured and you change the global ASN in FRR, BGP crashes. To work around this issue, don't unset more than one BGP instance at a time if one of the {{router bgp}} instances has VRF leaking configured. +5.6.0 + + + +3643624 +The help text for the NVUE policer command {{nv set acl <acl> rule <rule> action police mode}} incorrectly indicates that the policer mode units are in bits per second. NVUE configures policers using bytes per second. +5.6.0 + + + +3639058 +When you run the {{nv show service ntp}} command, you see an error message instead of the expected output. +5.6.0 + + + +3630492 +On the NVIDIA SN2201 switch, the {{ledmgrd -d}} command output shows the system and PSU LED status as orange when the physical LED is green. +5.5.1-5.6.0 + + + +3627913 +The switch drops untagged VLAN traffic on single VXLAN bridge ports. +5.6.0 + + + +3616643 +NVUE commands to set a route map exit policy match produce incorrect configuration in the {{/etc/frr/frr.conf}} file. +5.6.0 + + + +3616338 +When you reboot an MLAG switch with 3000 or more VNIs, there might be extended traffic loss during reboot. To work around this issue, configure the {{clagd}} service {{initDelay}} to 300 seconds with the {{nv set mlag init-delay 300}} command. +5.5.1-5.6.0 + + + +3612959 +The interface name for a VLAN subinterface does not show correctly; the VLAN is appended to the interface again. +5.6.0 + + + 3611215 In an EVPN multihoming configuration, the {{switchd}} service produces error messages similar to the following: @@ -36,13 +134,15 @@ These error messages do not affect how the switch functions; however the message 3610611 -Cumulus Linux assigns an IPv4 and IPv6 loopback address to a VRF interface by default. As a result, ping and route lookups for unique remote IP addresses on different VTEPs might not work if there is no source IP on the switch that belongs to the same subnet. To work around this issue, remove the loopback address on the VRF with the {{nv unset vrf <vrf> loopback ip address <address>}} command. Only remove the loopback address if you are not running NTP as NTP requires a loopback address to work. Alternatively, you can change the {{ping}} command to use a source address (such as an SVI address) with the {{ip vrf exec <VRF> ping <REMOTE_IP> -I <SVI_SRC_IP>}} command. +Cumulus Linux assigns an IPv4 and IPv6 loopback address to a VRF interface by default. As a result, ping and route lookups for unique remote IP addresses on different VTEPs might not work if there is no source IP on the switch that belongs to the same subnet. To work around this issue, remove the loopback address on the VRF with the nv unset vrf <vrf> loopback ip address command. Only remove the loopback address if you are not running NTP as NTP requires a loopback address to work. Alternatively, you can change the {{ping}} command to use a source address (such as an SVI address) with the {{ip vrf exec <VRF> ping <REMOTE_IP> -I <SVI_SRC_IP>}} command. 5.5.0-5.6.0 3609128 -When you use {{vi}} with root or sudo, visual mode is enabled by default due to a missing {{vimrc}} configuration file. This makes it difficult to copy and paste into {{vi}} and might introduce a security issue. +When you use {{vi}} with root or sudo, visual mode is enabled by default due to a missing {{vimrc}} configuration file. This makes it difficult to copy and paste into {{vi}}. In CL5.7.0, the default configuration now includes {{set mouse-=a}}. + +In addition, the CL5.7.0 default configuration for {{vi}} now disables modelines, which can be a security risk. 5.5.0-5.6.0 @@ -71,9 +171,9 @@ These error messages do not affect how the switch functions; however the message -3590053 -If you connect a 1G BaseT module to the service port on the NVIDIA SN5600 switch when its peer is down, the link shows as active on one side while its peer is disabled. -5.6.0 +3597456 +NVUE does not allow you to use the reserved name {{lo}} in an interface name. +5.5.1-5.6.0 @@ -83,6 +183,22 @@ These error messages do not affect how the switch functions; however the message +3582826 +When you enable the FRR SNMP agent (agentx) and configure routing adjacencies with short timers (dead, keepalive, and hold time), the routing adjacencies might go down in certain scenarios; for example when you have frequent or concurrent client SNMP requests, you use custom SNMP MIB extensions, you poll OIDs with large responses, or during high CPU load. To work around this issue, you can increase the routing adjacency timers to accommodate SNMP processing. +5.5.0-5.6.0 + + + +3580435 +On the NVIDIA SN2410 switch with an Innodisk SSD, you might see the following message in syslog: + +smartd[501]: Device: /dev/sda [SAT], CHECK POWER STATUS spins up disk (0x00 -> 0xff) + +This is a cosmetic issue and does not affect how the switch operates. To prevent this message from occurring, run the {{hdparm -S 24 /dev/sda}} command to change the HD timeout. +5.3.1-5.6.0 + + + 3576961 The NVUE command to clear all ACL counters at once is not available. To work around this issue, run the {{cl-acltool -Z all}} command to reset the statistics for all ACL rules. 5.5.1-5.6.0 @@ -117,8 +233,8 @@ These error messages do not affect how the switch functions; however the message CVE-2023-38408: The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009. Mitigation: Do not use ssh-agent forwarding (the man page for ssh_config says that "agent forwarding should be enabled with caution"), or start the ssh-agent program with the -P option to allow only specific PKCS#11 libraries (or none with -P ''). For Cumulus Linux 4.3.2, the /usr/bin/ssh-agent program has all permissions turned off (chmod 0) to prevent its execution if a vulnerable version is detected. -4.0.0-4.4.5, 5.0.0-5.6.0 - +4.0.0-4.3.1, 5.0.0-5.6.0 +4.3.2-4.4.5 3549798 @@ -145,15 +261,22 @@ For Cumulus Linux 4.3.2, the /usr/bin/ssh-agent program has all permissions turn +3522524 +FRR does not allow eBGP multi hop configuration on unnumbered BGP neighbors. + +5.5.0-5.6.0 + + + 3517739 When you connect the SN5600 switch to third party test equipment (such as IXIA) using copper cables, 100G, 200G, 400G, and 800G links do not come up. To work around this issue, use fiber optic cables when testing an SN5600 switch with IXIA for 100G, 200G, 400G, and 800G link speeds. 5.6.0 -3463827 -In an EVPN configuration with PIM-SM for BUM handling, the host behind the DUT does not receive the expected number of BUM packets. Cumulus Linux 5.6 only supports Head-End Replication (HREP) for handling BUM traffic in an EVPN configuration. BUM handling using a PIM-SM Multicast tree is not supported. -5.6.0 +3484058 +When you power on the NVIDIA SN3420 switch with no connected cables, the QSFP ports LEDs light in amber. +5.3.0-5.6.0 @@ -176,11 +299,7 @@ cumulus@switch:~$ nv config patch frr_policy.yaml 3452681 -When you run the NVUE {{nv show system aaa tacacs authorization}} commands to show per command authorization for a specific TACACS+ user privilege level, you see the following error: - -cumulus@switch:~$ nv show system aaa tacacs authorization 1 -Error: GET /nvue_v1/system/aaa/tacacs/authorization/1?rev=operational responded with 404 NOT FOUND - +When you run the NVUE {{nv show system aaa tacacs authorization}} commands to show per command authorization for a specific TACACS+ user privilege level, you see an error message similar to {{Error: GET /nvue_v1/system/aaa/tacacs/authorization/1?rev=operational responded with 404 NOT FOUND}}. 5.5.0-5.6.0 @@ -209,15 +328,15 @@ Error: GET /nvue_v1/system/aaa/tacacs/authorization/1?rev=operational responded -3405024 -You cannot remove PBR map configuration with source and destination rules. To work around this issue, delete the entire PBR map clause. -5.5.0-5.6.0 +3419928 +The NVUE PIM timer command option names {{keep-alive}} and {{rp-keep-alive}} are inconsistent and need to change to {{keepalive}} and {{rp-keepalive}}. +5.4.0-5.6.0 -3395489 -On a switch running MLAG, when you configure QoS buffer settings, MLAG peering resets. -5.4.0-5.6.0 +3405024 +You cannot remove PBR map configuration with source and destination rules. To work around this issue, delete the entire PBR map clause. +5.5.0-5.6.0 @@ -228,13 +347,7 @@ Error: GET /nvue_v1/system/aaa/tacacs/authorization/1?rev=operational responded 3362113 -If you restore an NVUE {{startup.yaml}} file after upgrade that includes breakout ports with QoS configuration or you run the {{nv config patch}} command to update a configuration with a {{yaml}} file that includes breakout ports with QoS configuration, the NVUE configuration fails to apply and subsequent attempts to run {{nv config apply}} fail with the following message: - -cumulus@switch:~$ nv config apply -Invalid config [rev_id: 11] - qos config is not supported on following invalid interface: swp1s0. Supported on swp and bond interface types. - -To work around this issue, run {{nv unset}} on the configured QoS settings, then apply the breakout port configuration before you configure QoS. Alternatively, you can remove the QoS configuration from the {{yaml}} file and patch it separately after applying the breakout configuration. +If you restore an NVUE {{startup.yaml}} file after upgrade that includes breakout ports with QoS configuration or you run the {{nv config patch}} command to update a configuration with a {{yaml}} file that includes breakout ports with QoS configuration, the NVUE configuration fails to apply and subsequent attempts to run {{nv config apply}} fail with the message similar to {{Invalid config [rev_id: 11] qos config is not supported on following invalid interface: swp1s0. Supported on swp and bond interface types}}. To work around this issue, run {{nv unset}} on the configured QoS settings, then apply the breakout port configuration before you configure QoS. Alternatively, you can remove the QoS configuration from the {{yaml}} file and patch it separately after applying the breakout configuration. 5.4.0-5.6.0 @@ -247,9 +360,7 @@ These errors do not affect new dynamic NAT flows from new NAT rules. 3347677 -In an MLAG configuration, when a link failure occurs on the peerlink or the peerlink shuts down, the switch in the secondary role attracts traffic to its local VTEP as it advertises the local VTEP IP address momentarily just before the VXLAN device is protodown. This traffic is dropped for a brief moment (between 5 and 10 seconds) because the MLAG bonds on the secondary switch are already protodown. - -In a proposed fix in the MR !226, we are not flapping the IP on vxlan device on secondary clag device on peerlink down trigger. This ensures smooth traffic flow and no convergence issue seen in system test bed with this fix. +In an MLAG configuration, when a link failure occurs on the peerlink or the peerlink shuts down, the switch in the secondary role attracts traffic to its local VTEP as it advertises the local VTEP IP address momentarily just before the VXLAN device is protodown. This traffic is dropped for a brief moment (between 5 and 10 seconds) because the MLAG bonds on the secondary switch are already protodown. 5.1.0-5.6.0 @@ -296,18 +407,6 @@ In a proposed fix in the MR !226, we are not flapping the IP on vxlan device on -3308191 -If you try to set an unsupported interface speed together with FEC, the {{nv config apply}} command succeeds but Cumulus Linux ignores the FEC configuration and configures the default FEC setting for the chosen speed. There is no warning or error message. -5.4.0-5.6.0 - - - -3269691 -When you restart the LLDP service, you see a {{broken pipe}} error and a log message in the {{lldpd.service}} logs. This error does not affect LLDP functionality. -5.4.0-5.6.0 - - - 3266197 When you disable BGP globally with the {{nv set router bgp enable off}} command, applying the configuration with NVUE might fail due to an FRR reload failure. 5.2.0-5.6.0 @@ -345,7 +444,7 @@ In a proposed fix in the MR !226, we are not flapping the IP on vxlan device on 3221628 -Cumulus Linux 5.2.0 and 5.2.1 VX images might include an incorrect entry at the end of {{/etc/apt/sources.list}}, which produces warnings when you run {{apt update}}. Remove this entry to avoid these warnings. +Cumulus Linux VX images might include an incorrect entry at the end of {{/etc/apt/sources.list}}, which produces warnings when you run {{apt update}}. Remove this entry to avoid these warnings. 5.2.0-5.6.0 @@ -373,6 +472,20 @@ To work around this issue, reference the OID without the preceding period ( {{.} +3141826 +A slow memory leak (~5KB over 24 hour period at a 60 second polling interval) might occur in SNMP when you walk the following system MIB objects (1.3.6.1.2.1). + +1.3.6.1.2.1.47 --> Entity MIB + 1.3.6.1.2.1.99 --> Entity Sensor MIB + 1.3.6.1.2.1.23 --> rip2 + 1.3.6.1.2.1.2 --> interface/interfaces + 1.3.6.1.2.1.31 --> ifMIB + 1.3.6.1.2.1.4 --> IP + 1.3.6.1.2.1.25 --> hostResource +5.0.1-5.6.0 + + + 3135952 PAM4 split cables (such as 2x100G, 4x100G, and 4x50G) do not work with a forced speed setting (when auto-negotiation is off) as the default speed enabled is for NRZ mode (such as 100G_4X). To work around this issue, set the appropriate lanes for forced speed (with auto-negotation off) with the {{ethtool -s swpX speed <port_speed> autoneg off lanes <no_of_lanes>}} command. For example: @@ -478,12 +591,6 @@ Fixed: 2.6.0+dfsg.1-1+deb10u1 -2847919 -Configuring a router with the REST API through the switch front panel ports (swps) is supported in the default VRF only. To work around this issue, use the localHost IP address or the MGMT IP address to configure router using the Rest API. -5.0.0-5.6.0 - - - 2847755 When you use NCLU to remove the configuration for a peer that is a member of a group but also has other peer-specific configuration, you must remove the peer-specific configuration before you delete the peer in a separate NCLU commit. 5.0.0-5.6.0 @@ -543,6 +650,11 @@ You can safely ignore this warning. Affects +3695541 +When applying a full configuration with NVUE that includes VRRP and BGP in VRFs, the VRRP configuration does not come up after you run {{nv config apply}}. BGP routes might also be missing. This issue only happens during the initial {{nv config apply}} of a full configuration, not during a normal initialization during a reboot or FRR restart. To work around this issue, reboot or restart FRR. +5.5.1 + + 3647426 If BGP {{remote-as}} is set to an integer and you try to configure the {{local-as}} for a BGP instance, you see the following error: @@ -649,7 +761,7 @@ This configuration is not allowed; it is considered to be eBGP and local prefere 3482006 If FRR learns a layer 2 entry against a VNI and you reconfigure the VNI later as a layer 3 VNI, the original layer 2 entry does not clear and remains in the forwarding database. -4.3.0-5.5.1 +4.3.0-4.3.1 3479786 @@ -824,6 +936,11 @@ This error message is benign and has no functional impact. 5.4.0-5.5.1 +3293114 +In Cumulus Linux 5.4 and earlier, the command to enable Neighbor Discovery (ND) router advertisement is inverted and causes confusion; {{nv set interface <interface> ip neighbor-discovery router-advertisement enable off}}. In Cumulus Linux 5.5 and later, the command to enable router advertisement is updated to {{nv set interface <interface> ip neighbor-discovery router-advertisement enable on}}. +5.3.0-5.5.1 + + 3187469 At high scale with 160 VRFs and 10 VLANs per VRF (a total of 1600 VLANs), you see traffic loss during primary switch reboot. To work around this issue, reduce the scale to 40 VRFs with no more than 400 VLANs in the configuration, and use a common MAC address. 5.1.0-5.5.1 diff --git a/content/cumulus-linux-57/Installation-Management/Installing-a-New-Cumulus-Linux-Image.md b/content/cumulus-linux-57/Installation-Management/Installing-a-New-Cumulus-Linux-Image.md index bf733f2d99..6f2f7bfdf9 100644 --- a/content/cumulus-linux-57/Installation-Management/Installing-a-New-Cumulus-Linux-Image.md +++ b/content/cumulus-linux-57/Installation-Management/Installing-a-New-Cumulus-Linux-Image.md @@ -323,7 +323,7 @@ You can run several installer command line options from ONIE to perform basic sw - Execute a ZTP script to perform necessary configuration {{%notice note%}} -The `onie-nos-install` command does *not* allow you specify command line parameters. You must access the switch from the console and transfer a disk image to the switch. You must then make the disk image executable and install the image directly from the ONIE command line with the options you want to use. +The `onie-nos-install` command does *not* allow you to specify command line parameters. You must access the switch from the console and transfer a disk image to the switch. You must then make the disk image executable and install the image directly from the ONIE command line with the options you want to use. The following example commands transfer a disk image to the switch, make the image executable, and install the image with the `--password` option to change the default cumulus user password: diff --git a/content/cumulus-linux-57/Installation-Management/Upgrading-Cumulus-Linux.md b/content/cumulus-linux-57/Installation-Management/Upgrading-Cumulus-Linux.md index 51d07512ad..6fbfaa8b24 100644 --- a/content/cumulus-linux-57/Installation-Management/Upgrading-Cumulus-Linux.md +++ b/content/cumulus-linux-57/Installation-Management/Upgrading-Cumulus-Linux.md @@ -61,7 +61,6 @@ Understanding the location of configuration data is important for successful upg {{%notice note%}} - If you are using the root user account, consider including `/root/`. - If you have custom user accounts, consider including `/home//`. -- Run the `net show configuration files | grep -B 1 "==="` command and back up the files listed in the command output. {{%/notice%}} {{< /tab >}} diff --git a/content/cumulus-linux-57/Layer-1-and-Switch-Ports/802.1X-Interfaces.md b/content/cumulus-linux-57/Layer-1-and-Switch-Ports/802.1X-Interfaces.md index e8df8c937b..4285c2bc72 100644 --- a/content/cumulus-linux-57/Layer-1-and-Switch-Ports/802.1X-Interfaces.md +++ b/content/cumulus-linux-57/Layer-1-and-Switch-Ports/802.1X-Interfaces.md @@ -4,21 +4,22 @@ author: NVIDIA weight: 315 toc: 3 --- -The {{}} provides a method of authenticating a client (called a *supplicant*) over wired media. It also provides access for individual MAC addresses on a switch (called the *authenticator*) after an authentication server authenticates the MAC addresses. The authentication server is typically a {{}} (Remote Authentication Dial In User Service, defined by {{}}) server. +The {{}} provides a way to authenticate a client (called a *supplicant*) over wired media. It also provides access for individual MAC addresses on a switch (called the *authenticator*) after an authentication server authenticates the MAC addresses. The authentication server is typically a [RADIUS](## "Remote Authentication Dial In User Service") server. -A Cumulus Linux switch acts as an intermediary between the clients connected to the wired ports and the authentication server, which is reachable over the existing network. [EAPOL](## "Extensible Authentication Protocol (EAP) over LAN") (EtherType value of 0x888E, defined by {{}}) operates on top of the data link layer; the switch uses EAPOL to communicate with supplicants connected to the switch ports. - -Cumulus Linux implements 802.1X through the Debian `hostapd` package, with modifications to provide the [PAE](## "Port Access Entity"). +A Cumulus Linux switch acts as an intermediary between the clients connected to the wired ports and the authentication server, which is reachable over the existing network. [EAPOL](## "Extensible Authentication Protocol (EAP) over LAN") operates on top of the data link layer; the switch uses EAPOL to communicate with supplicants connected to the switch ports. {{< img src = "/images/cumulus-linux/802.1X.png" >}} -Cumulus Linux supports parking VLAN, dynamic VLAN, and MAB (MAC-based authentication bypass) on 802.1X interfaces. +Cumulus Linux implements 802.1x using a modified version of the Debian `hostapd` package to support auth-fail and dynamic VLANS with [MBA](## "MAC-based authentication") and EAP authentication for 802.1x interfaces. {{%notice note%}} -- Cumulus Linux supports 802.1X on routed interfaces and physical interfaces (such as swp1 or swp2s0) that are bridged access ports; the interfaces cannot be part of a bond. 802.1X is **not** supported on eth0. -- 802.1X on Cumulus Linux is tested with only a few `wpa_supplicant` (Debian), Windows 10 and Windows 7 supplicants. -- RADIUS authentication is supported with FreeRADIUS and Cisco ACS. -- 802.1X supports simple login and password, PEAP/MSCHAPv2 (Win7) and EAP-TLS (Debian). +- Cumulus Linux supports 802.1X on physical interfaces (such as swp1 or swp2s0) that are bridge access ports; the interfaces cannot be part of a bond. +- Routed interfaces, bond interfaces, and bridged trunk ports do not support 802.1X. +- To enable 802.1X on an access-port, it must be a member of the default NVUE bridge `br_default`. +- eth0 does not support 802.1X. +- Cumulus Linux tests 802.1X with only a few `wpa_supplicant` (Debian), Windows 10 and Windows 7 supplicants. +- Cumulus Linux supports RADIUS authentication with FreeRADIUS and Cisco ACS. +- 802.1X supports simple login and password, and EAP-TLS (Debian). - 802.1X supports {{}} for EAP-TTLS, which provides more secure transport layer security. Mako template-based configurations do not support 802.1X. @@ -28,7 +29,7 @@ Mako template-based configurations do not support 802.1X. Before you can authenticate with 802.1x on your switch, you must configure a RADIUS server somewhere in your network. Popular examples of commercial software with RADIUS capability include Cisco ISE and Aruba ClearPass. -There are also open source versions of software supporting RADIUS such as PacketFence and FreeRADIUS. This section discusses how to add FreeRADIUS to a Debian server on your network. +You can also use open source versions of software supporting RADIUS such as PacketFence and FreeRADIUS. This section discusses how to add FreeRADIUS to a Debian server on your network. {{%notice note%}} - Do not use a Cumulus Linux switch as the RADIUS server. @@ -43,23 +44,24 @@ root@radius:~# apt-get install freeradius ``` After you install and configure FreeRADIUS, the FreeRADIUS server can serve Cumulus Linux running `hostapd` as a RADIUS client. For more information, see the {{}}. - + ## Configure 802.1X Interfaces - -All the 802.1X interfaces share the same RADIUS server settings. Make sure you configure the RADIUS server before you configure the 802.1X interfaces. See {{}} above. - -You must configure 802.1X on a bridged port. To configure a bridge, refer to {{}}. NVUE does not support traditional bridge mode. + +- All the 802.1X interfaces share the same RADIUS server settings. Make sure you configure the RADIUS server before you configure the 802.1X interfaces. See {{}} above. +- You must configure 802.1X on a bridged interface. To configure a bridge, refer to {{}}. +- NVUE enables BPDU guard when you enable 802.1X on an interface; the interface goes into a protodown state if it receives BPDU packets. To configure an 802.1X interface: -- **Required**: Provide the 802.1X RADIUS server IPv4 or IPv6 address. You can also specify a VRF for outgoing RADIUS accounting and authorization packets. A VRF is optional. +- **Required**: Provide the 802.1X RADIUS server IPv4 or IPv6 address. If you want to specify more than one server, provide the priority for each server (a value between 1 and 3). If you specify just one server, Cumulus Linux sets the priority to 1. You can also specify a VRF for outgoing RADIUS accounting and authorization packets. A VRF is optional. - **Required**: Provide the 802.1X RADIUS shared secret. -- Optional: Change the default 802.1X RADIUS accounting port. The default port is 1813. -- Optional: Change the default 802.1X RADIUS authentication port. The default port is 1812. -- Optional: Provide the reauthentication period for [EAP](## "Extensible Authentication Protocol"). By default, re-authentication is disabled with a reauthentication period of 0. You can set a value between 0-86640. -- **Required**: Enable 802.1X on the interface. +- **Required**: Enable 802.1X on an interface. +- Optional: Change the default 802.1X RADIUS accounting port. You can specify a value between 1000 and 65535. The default value is 1813. +- Optional: Change the default 802.1X RADIUS authentication port. You can specify a value between 1000 and 65535. The default value is 1812. +- Optional: Provide the reauthentication interval for [EAP](## "Extensible Authentication Protocol"). You can set a value between 0 and 86640. The default value is 0 (disabled). This setting only applies to EAP-based authentication; it does not apply to [MBA](## "MAC-bsed Authentication"). +- Optional: Set a fixed IP address for the RADIUS client to receive requests. {{%notice note%}} -Changing the 802.1X interface settings do *not* reset existing authorized user ports. However, removing all 802.1X interfaces or changing the RADIUS server IP address, shared secret, authentication port, or accounting port restarts `hostapd`, which forces existing, authorized users to re-authenticate. +Changing the 802.1X interface settings does *not* reset existing authorized user ports. However, removing all 802.1X interfaces or changing the RADIUS server IP address, shared secret, authentication port, accounting port, or EAP reauthentication interval restarts `hostapd`, which forces existing, authorized users to reauthenticate. {{%/notice%}} {{< tabs "TabID64 ">}} @@ -67,45 +69,45 @@ Changing the 802.1X interface settings do *not* reset existing authorized user p The following example: -- Sets the 802.1X RADIUS server IP address to 127.0.0.1. -- Sets the 802.1X RADIUS shared secret to mysecret. -- Enables 802.1X on swp1 through swp4. +- Sets the 802.1X RADIUS server IP address to 10.10.10.1 and the shared secret to `mysecret`. +- Enables 802.1X on swp1 through swp3. ``` -cumulus@switch:~$ nv set system dot1x radius server-ip 127.0.0.1 -cumulus@switch:~$ nv set system dot1x radius server-ip 127.0.0.1 shared-secret mysecret -cumulus@switch:~$ nv set interface swp1-swp4 dot1x enabled +cumulus@switch:~$ nv set system dot1x radius server 10.10.10.1 shared-secret mysecret +cumulus@switch:~$ nv set interface swp1,swp2,swp3 dot1x eap enabled cumulus@switch:~$ nv config apply ``` The following example: -- Sets the 802.1X RADIUS server IP address to 127.0.0.1 and the VRF to BLUE. +- Sets the 802.1X RADIUS server IP address to 10.10.10.1 and the VRF to BLUE. - Sets the 802.1X RADIUS shared secret to mysecret. -- Sets the 802.1X RADIUS authentication port to 2812. -- Sets the 802.1X RADIUS accounting port to 2813. -- Sets re-authentication for [EAP](## "Extensible Authentication Protocol"), by setting the reauthentication period to 60. -- Enables 802.1X on swp1 through swp4. - -``` -cumulus@switch:~$ nv set system dot1x radius server-ip 127.0.0.1 vrf turtle -cumulus@switch:~$ nv set system dot1x radius server-ip 127.0.0.1 shared-secret mysecret -cumulus@switch:~$ nv set system dot1x radius server-ip 127.0.0.1 authentication-port 2812 -cumulus@switch:~$ nv set system dot1x radius server-ip 127.0.0.1 accounting-port 2813 -cumulus@switch:~$ nv set system dot1x eap-reauth-period 60 -cumulus@switch:~$ nv set interface swp1-swp4 dot1x enabled +- Sets the 802.1X RADIUS authentication port to 2813. +- Sets the 802.1X RADIUS accounting port to 2812. +- Sets the fixed IP address for the RADIUS client to receive requests to 10.10.10.6. +- Sets the EAP reauthentication interval to 40. +- Enables 802.1X on swp1, swp2, and swp3. + +``` +cumulus@switch:~$ nv set system dot1x radius server 10.10.10.1 vrf BLUE +cumulus@switch:~$ nv set system dot1x radius server 10.10.10.1 shared-secret mysecret +cumulus@switch:~$ nv set system dot1x radius server 10.10.10.1 authentication-port 2813 +cumulus@switch:~$ nv set system dot1x radius server 10.10.10.1 accounting-port 2812 +cumulus@switch:~$ nv set system dot1x radius client-src-ip 10.10.10.6 +cumulus@switch:~$ nv set system dot1x reauthentication-interval 40 +cumulus@switch:~$ nv set interface swp1,swp2,swp3 dot1x eap enabled cumulus@switch:~$ nv config apply ``` - + {{%notice note%}} -When you enable or disable 802.1X on a port, `hostapd` reloads; however, existing authorized sessions do not reset. +When you enable or disable 802.1X on an interface, `hostapd` reloads; however, existing authorized sessions do not reset. {{%/notice%}} {{< /tab >}} @@ -114,58 +116,45 @@ When you enable or disable 802.1X on a port, `hostapd` reloads; however, existin Edit the `/etc/hostapd.conf` file to configure 802.1X settings, then restart the `hostapd` service. The following example: -- Sets the 802.1X RADIUS server IP address to 127.0.0.1. +- Sets the 802.1X RADIUS server IP address to 10.10.10.1. - Sets the 802.1X RADIUS shared secret to mysecret. -- Enables 802.1X on swp1 through swp4. +- Enables 802.1X on swp1 through swp3. ``` cumulus@switch:~$ sudo nano /etc/hostapd.conf ... -interfaces=swp1,swp2,swp3,swp4 -mab_interfaces= -parking_vlan_interfaces= -parking_vlan_id= -mab_activation_delay=30 -eap_reauth_period=0 -eap_send_identity=0 -ctrl_interface=/var/run/hostapd -nas_identifier=localhost -auth_server_addr=127.0.0.1 +interfaces=swp1,swp2,swp3 +... +auth_server_addr=10.10.10.1 auth_server_port=1812 auth_server_shared_secret=mysecret -acct_server_addr= -acct_server_port=1813 -acct_server_shared_secret=mysecret ... ``` The following example: -- Sets the 802.1X RADIUS server IP address to 127.0.0.1 and the VRF to BLUE. +- Sets the 802.1X RADIUS server IP address to 10.10.10.1 and the VRF to BLUE. - Sets the 802.1X RADIUS shared secret to mysecret. -- Sets the 802.1X RADIUS authentication port to 2812. -- Sets the 802.1X RADIUS accounting port to 2813. -- Sets the re-authentication for [EAP](## "Extensible Authentication Protocol"), by setting the reauthentication period to 60. -- Enables 802.1X on swp1 through swp4. +- Sets the 802.1X RADIUS authentication port to 2813. +- Sets the 802.1X RADIUS accounting port to 2812. +- Sets the fixed IP address for the RADIUS client to receive requests to 10.10.10.6. +- Sets the EAP reauthentication interval to 40. +- Enables 802.1X on swp1 through swp3. ``` cumulus@switch:~$ sudo nano /etc/hostapd.conf ... -interfaces=swp1,swp2,swp3,swp4 -mab_interfaces= -parking_vlan_interfaces= -parking_vlan_id= -mab_activation_delay=30 -eap_reauth_period=60 -eap_send_identity=0 -ctrl_interface=/var/run/hostapd -nas_identifier=localhost -auth_server_addr=127.0.0.1%BLUE -auth_server_port=2812 +interfaces=swp1,swp2,swp3 +... +eap_reauth_period=40 +... +auth_server_addr=10.10.10.1%BLUE +auth_server_port=1813 auth_server_shared_secret=mysecret -acct_server_addr= -acct_server_port=2813 +acct_server_addr=10.10.10.1%BLUE +acct_server_port=2812 acct_server_shared_secret=mysecret +radius_client_addr=10.10.10.6 ... ``` @@ -176,102 +165,59 @@ cumulus@switch:~$ sudo systemctl enable hostapd cumulus@switch:~$ sudo systemctl restart hostapd ``` -{{< /tab >}} -{{< /tabs >}} - -## Configure MAC Authentication Bypass -MAC Authentication Bypass (MAB) enables bridge ports to allow devices to bypass authentication based on their MAC address. This is useful for devices that do not support [PAE](## "Port Access Entity"), such as printers or phones. +{{< /tab >}} +{{< /tabs >}} + +## MAC-based Authentication + +MAC-based authentication (MBA) enables bridged interfaces to allow devices to bypass authentication based on their MAC address. This is useful for devices that do not support EAP, such as printers or phones. -You must configure MAB on both the RADIUS server and the RADIUS client (the Cumulus Linux switch). +You must configure MBA on both the RADIUS server and the RADIUS client (the Cumulus Linux switch). {{%notice note%}} -Changing the MAB settings do *not* reset existing authorized user ports. However, changing the MAB activation delay restarts `hostapd`, which forces existing, authorized users to re-authenticate. +Changing the MBA settings does *not* reset existing authorized user ports. However, changing the MBA activation delay restarts `hostapd`, which forces existing, authorized users to reauthenticate. {{%/notice%}} -To configure MAB: +To configure MBA: {{< tabs "TabID453 ">}} {{< tab "NVUE Commands ">}} -Enable a bridge port for MAB. The following example enables MAB on swp1: +Enable MBA in a bridged interface. The following example enables MBA on swp1: ``` -cumulus@switch:~$ nv set interface swp1 dot1x mab enabled +cumulus@switch:~$ nv set interface swp1 dot1x mba enabled cumulus@switch:~$ nv config apply ``` {{< /tab >}} {{< tab "Linux Commands ">}} -Edit the `/etc/hostapd.conf` file. The following example enables MAB on swp1. +Edit the `/etc/hostapd.conf` file. The following example enables MBA on swp1. ``` cumulus@switch:~$ sudo nano hostapd.conf @@ -288,31 +234,30 @@ cumulus@switch:~$ sudo systemctl restart hostapd {{< /tab >}} {{< /tabs >}} - -## Configure a Parking VLAN - -If a non-authorized supplicant tries to communicate with the switch, you can route traffic from that device to a different VLAN and associate that VLAN with one of the switch ports to which the supplicant is attached. Cumulus Linux assigns the parking VLAN by manipulating the PVID of the switch port. + +## Auth-fail VLAN + +If a non-authorized supplicant tries to communicate with the switch, you can route traffic from that device to a different VLAN and associate that VLAN with one of the switch ports to which the supplicant attaches. Cumulus Linux assigns the auth-fail VLAN by manipulating the PVID of the interface. {{%notice note%}} -Changing the parking VLAN settings do *not* reset existing authorized user ports. However, changing the parking VLAN ID restarts `hostapd`, which forces existing, authorized users to re-authenticate. +Changing the auth-fail VLAN settings does *not* reset existing authorized user ports. However, changing the auth-fail VLAN ID restarts `hostapd`, which forces existing, authorized users to reauthenticate. {{%/notice%}} -The following example sets the parking VLAN ID to 777 and enables parking VLAN on swp1. +The following example sets the auth-fail VLAN ID to 777 and enables auth-fail VLAN on swp1. {{< tabs "TabID498 ">}} {{< tab "NVUE Commands ">}} ``` -cumulus@switch:~$ nv set system dot1x parking-vlan-id 777 -cumulus@switch:~$ nv set interface swp1 dot1x parking-vlan enabled +cumulus@switch:~$ nv set system dot1x auth-fail-vlan 777 +cumulus@switch:~$ nv set interface swp1 dot1x auth-fail-vlan enabled cumulus@switch:~$ nv config apply ``` -If the authentication for swp1 fails, the port is moved to the parking VLAN: +If the authentication for swp1 fails, the interface moves to the auth-fail VLAN: ``` cumulus@switch:~$ nv show interface swp1 dot1x - Interface MAC Address Attribute Value --------- ----------------- ---------------------------- ----------------- swp1 00:02:00:00:00:08 Status Flags [PARKED_VLAN] @@ -336,38 +281,10 @@ swp1 00:02:00:00:00:08 Status Flags [PARKED_VLAN] RADIUS Auth Session ID C2FED91A39D8D605 ``` - {{< /tab >}} {{< tab "Linux Commands ">}} -Edit the `/etc/hostapd.conf` file to add the parking VLAN ID and port: +Edit the `/etc/hostapd.conf` file to add the auth-fail VLAN ID and interface: ``` cumulus@switch:~$ sudo nano hostapd.conf @@ -377,38 +294,44 @@ parking_vlan_id=777 ... ``` -If the authentication for swp1 fails, the port is moved to the parking VLAN. +Restart the `hostapd` service: -{{< /tab >}} -{{< /tabs >}} +``` +cumulus@switch:~$ sudo systemctl restart hostapd +``` -## Configure Dynamic VLAN Assignments +If the authentication for swp1 fails, the interface moves to the auth-fail VLAN. -A common requirement for campus networks is to assign dynamic VLANs to specific users in combination with IEEE 802.1x. After authenticating a supplicant, the user is assigned a VLAN based on the RADIUS configuration. Cumulus Linux assigns the dynamic VLAN by manipulating the PVID of the switch port. +{{< /tab >}} +{{< /tabs >}} +## Dynamic VLAN Assignments + +A common requirement for campus networks is to assign dynamic VLANs to specific users in combination with IEEE 802.1x. After authenticating a supplicant, the user is assigned a VLAN based on the RADIUS configuration. Cumulus Linux assigns the dynamic VLAN by manipulating the PVID of the interface. + To enable dynamic VLAN assignment globally, where VLAN attributes from the RADIUS server apply to the bridge: {{< tabs "TabID595 ">}} {{< tab "NVUE Commands ">}} +Run the `nv set system dot1x dynamic-vlan optional` or `nv set system dot1x dynamic-vlan required` command. If you run the `nv set system dot1x dynamic-vlan required` command, when VLAN attributes do not exist in the access response packet from the RADIUS server, the user is not authorized and has no connectivity. If the RADIUS server returns VLAN attributes but the user has an incorrect password, the user goes in the auth-fail VLAN (if you configure auth-fail VLAN). + ``` -cumulus@switch:~$ nv set system dot1x dynamic-vlan default +cumulus@switch:~$ nv set system dot1x dynamic-vlan optional cumulus@switch:~$ nv config apply ``` -You can specify the `require` option in the command so that VLAN attributes are required. If VLAN attributes do not exist in the access response packet returned from the RADIUS server, the user is not authorized and has no connectivity. If the RADIUS server returns VLAN attributes but the user has an incorrect password, the user is placed in the parking VLAN (if you have configured parking VLAN). - ``` -cumulus@switch:~$ nv set system dot1x dynamic-vlan require +cumulus@switch:~$ nv set system dot1x dynamic-vlan required cumulus@switch:~$ nv config apply ``` -The following example shows a typical RADIUS configuration (shown for FreeRADIUS, not typically configured or run on the Cumulus Linux device) for a user with dynamic VLAN assignment: +The following example shows a typical RADIUS configuration (shown for FreeRADIUS,) for a user with dynamic VLAN assignment: ``` # # VLAN 100 Client Configuration for Freeradius RADIUS Server. # # This is not part of the CL configuration. -vlan100client Cleartext-Password := "client1password" +vlan10client Cleartext-Password := "client1password" Service-Type = Framed-User, Tunnel-Type = VLAN, Tunnel-Medium-Type = "IEEE-802", @@ -418,8 +341,7 @@ vlan100client Cleartext-Password := "client1password" Verify the configuration (notice the `[AUTHORIZED]` status in the output): ``` -cumulus@switch:~$ nv show interface –view=dot1x-summary - +cumulus@switch:~$ nv show interface dot1x-summary Interface MAC Address Attribute Value --------- ----------------- ---------------------------- -------------------------- swp1 00:02:00:00:00:08 Status Flags [DYNAMIC_VLAN][AUTHORIZED] @@ -443,94 +365,35 @@ swp1 00:02:00:00:00:08 Status Flags [DYNAMIC_VLAN][AUTHO RADIUS Auth Session ID 939B1A53B624FC56 ``` -``` -cumulus@switch:~$ nv show dot1x interface summary - -Interface MAC Address Username State Authentication Type MAB VLAN ---------- ----------------- ------------ ------------ ------------------- --- ---- -swp1 00:02:00:00:00:08 000200000008 AUTHORIZED unknown NO 888 -``` - {{< /tab >}} {{< tab "Linux Commands ">}} -Edit the `/etc/hostapd.conf` file to add the following options: +1. Edit the `/etc/hostapd.conf` file to set the `dynamic_vlan` option. + + - Specify 1 for VLAN attributes to be optional. + - Specify 2 to require VLAN attributes; if VLAN attributes do not exist in the access response packet returned from the RADIUS server, the user is not authorized and has no connectivity. If the RADIUS server returns VLAN attributes but the user has an incorrect password, the user goes in the auth-fail VLAN, if you have configured auth-fail VLAN. -- `dynamic_vlan=1` Specify `dynamic_vlan=2` if you want VLAN attributes to be required. If VLAN attributes do not exist in the access response packet returned from the RADIUS server, the user is not authorized and has no connectivity. If the RADIUS server returns VLAN attributes but the user has an incorrect password, the user is placed in the parking VLAN, if you have configured parking VLAN). - -- radius\_das\_port= -- radius\_das\_time\_window=300 -- radius\_das\_require\_event\_timestamp=1 -- radius\_das\_require\_message\_authenticator=1 + ``` + cumulus@switch:~$ sudo nano /etc/hostapd.conf + ... + dynamic_vlan=1 + ... + ``` -Remove the `eap_send_identity=0` option. For example: +2. Remove the `eap_send_identity=0` option. -``` -cumulus@switch:~$ sudo nano /etc/hostapd.conf -eap_server=0 -ieee8021x=1 -driver=wired -dynamic_vlan=1 -interfaces=swp1,swp2,swp3,swp4 -mab_interfaces= -parking_vlan_interfaces=swp1 -parking_vlan_id=777 -mab_activation_delay=30 -eap_reauth_period=0 -ctrl_interface=/var/run/hostapd -nas_identifier=localhost -auth_server_addr=127.0.0.1 -auth_server_port=1812 -auth_server_shared_secret=mysecret -acct_server_addr= -acct_server_port=1813 -acct_server_shared_secret= -radius_das_port= -radius_das_time_window=300 -radius_das_require_event_timestamp=1 -radius_das_require_message_authenticator=1 -``` - -Restart the `hostapd` service : + Restart the `hostapd` service: -``` -cumulus@switch:~$ sudo systemctl restart hostapd -``` + ``` + cumulus@switch:~$ sudo systemctl restart hostapd + ``` -The following example shows a typical RADIUS configuration (shown for FreeRADIUS, not typically configured or run on the Cumulus Linux device) for a user with dynamic VLAN assignment: +The following example shows a typical RADIUS configuration (shown for FreeRADIUS, not typically configured or run on the Cumulus Linux device) for a user with a dynamic VLAN assignment: ``` # # VLAN 100 Client Configuration for Freeradius RADIUS Server. # # This is not part of the CL configuration. -vlan100client Cleartext-Password := "client1password" +vlan10client Cleartext-Password := "client1password" Service-Type = Framed-User, Tunnel-Type = VLAN, Tunnel-Medium-Type = "IEEE-802", @@ -540,415 +403,31 @@ vlan100client Cleartext-Password := "client1password" {{< /tab >}} {{< /tabs >}} -To disable dynamic VLAN assignment, where VLAN attributes sent from the RADIUS server are ignored and users are authenticated based on existing credentials: +To disable dynamic VLAN assignment, where the Cumulus Linux ignores VLAN attributes sent from the RADIUS server and users authenticate based on existing credentials: {{< tabs "TabID755 ">}} -{{< tab "NCLU Commands ">}} +{{< tab "NVUE Commands ">}} ``` -cumulus@switch:~$ nv set system dot1x dynamic-vlan none +cumulus@switch:~$ nv set system dot1x dynamic-vlan disabled cumulus@switch:~$ nv config apply ``` {{< /tab >}} {{< tab "Linux Commands ">}} -Edit the `/etc/hostapd.conf` file to remove the following options: - -- dynamic_vlan=1 -- radius\_das\_port= -- radius\_das\_time\_window=300 -- radius\_das\_require\_event\_timestamp=1 -- radius\_das\_require\_message\_authenticator=1 - -Add the `eap_send_identity=0` option. The following example shows the options in the `/etc/hostapd.conf` file - -``` -cumulus@switch:~$ sudo nano /etc/hostapd.conf -eap_server=0 -ieee8021x=1 -driver=wired -interfaces= -mab_interfaces= -parking_vlan_interfaces=swp1 -parking_vlan_id=777 -mab_activation_delay=30 -eap_reauth_period=0 -eap_send_identity=0 -ctrl_interface=/var/run/hostapd -nas_identifier=localhost -auth_server_addr=127.0.0.1 -auth_server_port=1812 -auth_server_shared_secret=mysecret -acct_server_addr= -acct_server_port=1813 -acct_server_shared_secret= -``` - -Restart the `hostapd` service. - -``` -cumulus@switch:~$ sudo systemctl restart hostapd -``` +Edit the `/etc/hostapd.conf` file to set the `eap_send_identity` option to 0, then restart the `hostapd` service with the `sudo systemctl restart hostapd` command. {{< /tab >}} {{< /tabs >}} {{%notice note%}} -Enabling or disabling dynamic VLAN assignment restarts `hostapd`, which forces existing, authorized users to re-authenticate. -{{%/notice%}} - -## Dynamic ACLs - -In high-security campus environments where 802.1X interfaces are in use, you can implement network access control at the user (supplicant) level using *dynamic access control lists*, or DACLs. A _pre-auth ACL_ permits some traffic to traverse the network before 802.1X authorization takes place, then a dynamic ACL can be applied for that supplicant that is specific to an interface and the MAC address that was authorized (sometimes called a *station*). - -Since DACLs restrict access to network resources at the user level, multiple users on the same VLAN can access different resources based on the policy provided by the RADIUS server. DACLs utilize {{}}, so you can configure them in your RADIUS server configuration and not on each switch. - -The DACLs are also dynamically modified to fit the specific authenticating supplicant. For example, specific MAC addresses may be restricted to talk only to certain L3/L4 destinations. - -DACLs work with Voice VLAN for phones (MDA). - -{{%notice note%}} -- You can configure DACLs for {{}} only. -- Port security (MAC address restrictions) cannot be used at the same time as DACLs. -- Cumulus Linux does not support configuring both Dynamic VLAN and DACLs on a given switch port at the same time. -- The source MAC address of the user gaining authorization in the `ebtables` filter replaces the `from any` source IPv4 address. -- Only a single destination port integer is supported; port ranges are not supported. -- Any IPv4 protocol is supported either by name or number as supported in the Cumulus Linux `ebtables` implementation. +Enabling or disabling dynamic VLAN assignment restarts `hostapd`, which forces existing, authorized users to reauthenticate. {{%/notice%}} -### How It Works - -1. A supplicant sends packets over a network port. A {{}} executes. You can manually create your own pre-auth ACL filter or just use the Cumulus Linux default ({{}}). There are no NCLU commands for creating the filter itself. -1. When `dot1x dynamic-acl` is {{}}, Cumulus Linux installs the pre-auth ACL defaults for the port (once you execute `net commit`). -1. When a supplicant on the port tries to get 802.1X authorized, the RADIUS server may (or may not) send along some {{}} in the Access-Accept message. -1. If any filters are sent from the RADIUS server, Cumulus Linux applies them before the default pre-auth ACL. -1. If no filters are sent, Cumulus Linux leaves the defaults in place, and no special access is granted to the user. - -### The NAS-Filter-Rule Attribute - -The NAS-Filter-Rule attribute is a string of one or more octets that contains filter rules in the IPFilterRule syntax defined by {{}}. The IPFilterRule filters **must** follow this format: - - action dir proto from src to dst [options] - -| Keyword | Definition | -| --------- | ---------- | -| `action` | _permit_: Allow packets that match the rule.
_deny_: Drop packets that match the rule. | -| `dir` | Direction: _in_ is from the terminal, _out_ is to the terminal. Only the _in_ direction is supported. | -| `proto` | An IP protocol specified by number. The `ip` keyword means any protocol will match. Only IPv4 ACLs are supported. | -| `src` / `dst` | Source and destination IP address/subnet mask, and optional ports. | - -The syntax for NAS-Filter-Rule attributes configured in the RADIUS server varies widely by RADIUS vendor. But the resulting format for these rules contained in the Access-Accept must conform to the IPFilterRule syntax defined in by {{}}, Section 4.3, as mentioned above. When the Cumulus Linux switch gets these rules for a particular user, they are converted to `ebtables` rules using the actual user MAC address, and are then combined with the default pre-auth ACL rules. - -The rules for the appropriate direction are evaluated in order, with the first matched rule terminating the evaluation. Each packet is evaluated once. If no rule matches, the packet is dropped if the last rule was a deny. - -If these rules are invalid — for example, they contain contain port ranges or IPv6 addresses — the port does not get authorized and a log message is written to `/var/log/syslog`. +## MAC Addresses per Port -### Get Started - -To start applying a DACL to a port, configure the {{}} and {{}}, then configure the port with the following: - -- An untagged data VLAN -- The {{}} and {{}} -- Optionally, a voice VLAN - -### Configure a Dynamic ACL - -You configure DACLs on the RADIUS server on your network using the methods provided by the RADIUS software, then you enable it for one or more switch ports on a given switch. This section shows the configuration methods for the {{}} server. - -#### Configure the RADIUS Server - -On the RADIUS server, set the password for the RADIUS client (that is, the Cumulus Linux switch) in the `/etc/freeradius/3.0/clients.conf` file as follows, using the src IP address of the switch: - -``` -client leaf01 { - ipaddr = 10.0.0.1 - secret = CumulusLinux! -} -``` - -Add the DACL configuration to the `/etc/freeradius/3.0/users` file. For example: - -``` -leaf01 Cleartext-Password := "CumulusLinux!" - Service-Type = Framed-User, - Tunnel-Type = VLAN, - Tunnel-Medium-Type = "IEEE-802", - Tunnel-Private-Group-ID = 222, - NAS-Filter-Rule = "permit in udp from any to any 67", - NAS-Filter-Rule = "permit in udp from any to 10.0.0.0/9 53", - NAS-Filter-Rule = "permit in udp from any to 10.0.0.0/9 123", - NAS-Filter-Rule = "permit in icmp from any to any", - NAS-Filter-Rule = "permit in ip from any to 172.16.0.99", - NAS-Filter-Rule = "permit in ip from any to 172.16.0.33", - NAS-Filter-Rule = "permit in ip from any to 172.16.0.105", - NAS-Filter-Rule = "permit in ip from any to 172.16.0.224", - NAS-Filter-Rule = "permit in ip from any to 172.16.224.142", - NAS-Filter-Rule = "permit in tcp from any to 172.16.224.0/9 8883", - NAS-Filter-Rule = "deny in ip from any to any" -``` - -`ebtables` converts this to a temporary file on the switch called something like `/etc/cumulus/acl/policy.d/150_dot1x_dacl_swp2_000200000002.rules` (the filename is always prefaced with _150\__; default rules filenames are prefaced with _200\__). It looks like the following: - -``` -cumulus@switch:~$ cat /etc/cumulus/acl/policy.d/150_dot1x_dacl_swp2_000200000002.rules -######## hostapd generated Dynamic ACL EBTABLES rule file ######## -[ebtables] --A FORWARD -i swp2 -s 00:02:00:00:00:02 -p IPV4 --ip-protocol UDP --ip-dport 67 -j mark --set-mark 2 --A FORWARD -i swp2 -s 00:02:00:00:00:02 -p IPV4 --ip-protocol UDP --ip-dport 67 -j ACCEPT --A FORWARD -i swp2 -s 00:02:00:00:00:02 -p IPV4 --ip-dst 10.0.0.0/9 --ip-protocol UDP --ip-dport 53 -j mark --set-mark 2 --A FORWARD -i swp2 -s 00:02:00:00:00:02 -p IPV4 --ip-dst 10.0.0.0/9 --ip-protocol UDP --ip-dport 53 -j ACCEPT --A FORWARD -i swp2 -s 00:02:00:00:00:02 -p IPV4 --ip-dst 10.0.0.0/9 --ip-protocol UDP --ip-dport 123 -j mark --set-mark 2 --A FORWARD -i swp2 -s 00:02:00:00:00:02 -p IPV4 --ip-dst 10.0.0.0/9 --ip-protocol UDP --ip-dport 123 -j ACCEPT --A FORWARD -i swp2 -s 00:02:00:00:00:02 -p IPV4 --ip-dst 10.0.0.3 --ip-protocol ICMP -j mark --set-mark 2 --A FORWARD -i swp2 -s 00:02:00:00:00:02 -p IPV4 --ip-dst 10.0.0.3 --ip-protocol ICMP -j DROP --A FORWARD -i swp2 -s 00:02:00:00:00:02 -p IPV4 --ip-dst 172.16.0.99 -j mark --set-mark 2 --A FORWARD -i swp2 -s 00:02:00:00:00:02 -p IPV4 --ip-dst 172.16.0.99 -j ACCEPT --A FORWARD -i swp2 -s 00:02:00:00:00:02 -p IPV4 --ip-dst 172.16.131.99 -j mark --set-mark 2 --A FORWARD -i swp2 -s 00:02:00:00:00:02 -p IPV4 --ip-dst 172.16.131.99 -j ACCEPT --A FORWARD -i swp2 -s 00:02:00:00:00:02 -p IPV4 --ip-dst 172.16.0.33 -j mark --set-mark 2 --A FORWARD -i swp2 -s 00:02:00:00:00:02 -p IPV4 --ip-dst 172.16.0.33 -j ACCEPT --A FORWARD -i swp2 -s 00:02:00:00:00:02 -p IPV4 --ip-dst 172.16.131.105 -j mark --set-mark 2 --A FORWARD -i swp2 -s 00:02:00:00:00:02 -p IPV4 --ip-dst 172.16.131.105 -j ACCEPT --A FORWARD -i swp2 -s 00:02:00:00:00:02 -p IPV4 --ip-dst 10.72.169.224 -j mark --set-mark 2 --A FORWARD -i swp2 -s 00:02:00:00:00:02 -p IPV4 --ip-dst 10.72.169.224 -j ACCEPT --A FORWARD -i swp2 -s 00:02:00:00:00:02 -p IPV4 --ip-dst 10.72.168.142 -j mark --set-mark 2 --A FORWARD -i swp2 -s 00:02:00:00:00:02 -p IPV4 --ip-dst 10.72.168.142 -j ACCEPT --A FORWARD -i swp2 -s 00:02:00:00:00:02 -p IPV4 --ip-dst 10.0.0.0/9 --ip-protocol TCP --ip-dport 8883 -j mark --set-mark 2 --A FORWARD -i swp2 -s 00:02:00:00:00:02 -p IPV4 --ip-dst 10.0.0.0/9 --ip-protocol TCP --ip-dport 8883 -j ACCEPT --A FORWARD -i swp2 -s 00:02:00:00:00:02 -p IPV4 --ip-dst 10.0.0.0/9 --ip-protocol TCP --ip-dport 32768 -j mark --set-mark 2 --A FORWARD -i swp2 -s 00:02:00:00:00:02 -p IPV4 --ip-dst 10.0.0.0/9 --ip-protocol TCP --ip-dport 32768 -j ACCEPT --A FORWARD -i swp2 -s 00:02:00:00:00:02 -p IPV4 -j mark --set-mark 2 --A FORWARD -i swp2 -s 00:02:00:00:00:02 -p IPV4 -j DROP -``` - -{{%notice tip%}} -In the above rules file, the `--set-mark 2` option ensures that the nearly identical next rule gets installed in the dedicated TCAM slice for 802.1X. -{{%/notice%}} - -#### Configure the RADIUS Client - -The Cumulus Linux switch is the RADIUS client. - -{{< tabs "TabID951 ">}} -{{< tab "NCLU Commands ">}} - -Configure the Cumulus Linux switch as a RADIUS client using the `net add dot1x radius` command, and include your RADIUS server's IP address and secret: - -``` -cumulus@leaf01:~$ net add dot1x radius server-ip 10.0.0.1 -cumulus@leaf01:~$ net add dot1x radius shared-secret mysecret -``` - -Enable one or more switch ports for DACLs by running the `net add dot1x interface dot1x dynamic-acl` command. You can also enable {{}} by including the `mab` option at the end of the command. - -``` -cumulus@leaf01:~$ net add interface swp1 dot1x dynamic-acl [mab] -cumulus@leaf01:~$ net pending -cumulus@leaf01:~$ net commit -``` - -{{< /tab >}} -{{< tab "Linux Commands ">}} - -1. Edit the `/etc/hostapd.conf` file to configure the RADIUS client and the DACL interface. The example below sets the IP address of the 802.1X RADIUS server to 10.0.0.1 (`auth_server_addr=10.0.0.1`), the shared secret to mysecret (`auth_server_shared_secret=mysecret`), 802.1X on swp1 and swp2 (`interfaces=swp1,swp2`), and swp2 as a DACL interface (`dynamic_acl_interfaces=swp2`). - - cumulus@switch:~$ sudo nano /etc/hostapd.conf - eap_server=0 - ieee8021x=1 - driver=wired - dynamic_vlan=0 - eap_send_identity=0 - interfaces=swp1,swp2 - voice_interfaces= - mab_interfaces= - dynamic_acl_interfaces=swp2 - default_dynamic_acl=default_preauth_dacl.rules - parking_vlan_interfaces= - parking_vlan_id= - mab_activation_delay=0 - max_num_sta=4 - eap_reauth_period=0 - ctrl_interface=/run/hostapd - nas_identifier=localhost - auth_server_addr=10.0.0.1 - auth_server_port=1812 - auth_server_shared_secret=mysecret - acct_server_addr=10.0.0.1 - acct_server_port=1813 - acct_server_shared_secret=mysecret - radius_das_port= - radius_das_time_window=300 - radius_das_require_event_timestamp=1 - radius_das_require_message_authenticator=1 - -2. Enable then restart the `hostapd` service so that the configuration persists between reboots: - - cumulus@switch:~$ sudo systemctl enable hostapd - cumulus@switch:~$ sudo systemctl restart hostapd - -{{< /tab >}} -{{< /tabs >}} - -### Pre-auth ACLs - -A *pre-auth ACL* is a static ACL that is applied to **all** 802.1X dynamic ACL-enabled ports by default. It provides some basic services that are available before 802.1X authorization occurs. The default pre-auth ACL in Cumulus Linux allows for DHCP and DNS to operate without authorizing the supplicant. - -The default pre-auth ACL file is `/etc/cumulus/acl/policy.d/dot1x_preauth_dacl/default_preauth_dacl.rules`, which you can modify, or you can create your own. The default pre-auth ACL permits DHCP (using source port 68 and destination port 67) and DNS (using destination port 53) before 802.1X authorization. You configure pre-auth ACLs only with `ebtables` syntax. - -``` -cumulus@switch:~$ cat /etc/cumulus/acl/policy.d/dot1x_preauth_dacl/default_preauth_dacl.rules -[ebtables] --A FORWARD -p IPV4 --ip-protocol UDP --ip-dport 53 -j ACCEPT --A INPUT -p IPV4 --ip-protocol UDP --ip-dport 67 --ip-sport 68 -j ACCEPT -``` - -The pre-auth ACL is always applied to dynamic ACL-enabled 802.1X ports, even after authentication has already completed for any clients on a given switch port. - -{{%notice warning%}} -If you don't use the default pre-auth ACL and don't create your own, all traffic gets denied. -{{%/notice%}} - -To create your own pre-auth ACL file, complete the following steps. - -{{< tabs "TabID1035 ">}} - -{{< tab "NCLU Commands ">}} - -Create the pre-auth ACL file as shown in **Linux Commands** below, then run the `net add dot1x default-dacl-preauth-filename ` command. - -``` -cumulus@switch:~$ net add dot1x default-dacl-preauth-filename my_preauth_dacl.rules -cumulus@switch:~$ net pending -cumulus@switch:~$ net commit -``` - -{{< /tab >}} - -{{< tab "Linux Commands ">}} - -Create your own pre-auth ACL file in the `/etc/cumulus/acl/policy.d/dot1x_preauth_dacl/` directory. For example, the following file allows for DHCP, DNS and PXE to operate before authorizing the supplicant: - - cumulus@switch:~$ sudo nano /etc/cumulus/acl/policy.d/dot1x_preauth_dacl/my_preauth_dacl.rules - [ebtables] - -A FORWARD -p IPV4 --ip-dst 8.8.8.8/32 --ip-protocol UDP --ip-dport 53 -j ACCEPT # DNS - -A FORWARD -p IPV4 --ip-protocol UDP --ip-dport 67 --ip-sport 68 -j ACCEPT # DHCP - -A FORWARD -p IPV4 --ip-dst 192.168.1.1/32 -j ACCEPT # PXE - -{{< /tab >}} -{{< /tabs >}} - -## Multi Domain Authentication (MDA) - -Cumulus Linux supports Multi Domain Authentication (MDA), where 802.1X is extended to allow authorization of multiple devices (a data and a voice device) on a single port and assign different VLANs to the devices based on authorization. - -MDA is enabled by default; however, you need to assign a tagged VLAN for voice devices (see {{}}). - - - The 802.1X-enabled port must be a trunk port to allow tagged voice traffic from a phone; you cannot enable 802.1X on an access port. - - Only one untagged VLAN and one tagged VLAN is supported on the 802.1X enabled ports. - - Multiple MAB (non voice) devices on a port are supported for VLAN-aware bridges only. Authorization of multiple MAB devices for different VLANs is not supported. - - Cumulus Linux does not support 802.1X with MLAG; the switch cannot synchronize 802.1X authenticated MAC addresses over the peerlink. - -To show which interfaces are enabled for 802.1X, run the `nv show interface dot1x` command. The `Interfaces` line shows all 802.1X-enabled interfaces while the `Dynamic ACL Interfaces` line shows only 802.1X interfaces enabled for DACLs: - -``` -cumulus@switch:~$ nv show interface dot1x - -Hostapd IEEE 802.11 AP and IEEE 802.1X/WPA/WPA2/EAP Authenticator Daemon -Attribute Value ------------------------ ---------------- -Current Status active (running) -Reload Status enabled -Interfaces swp1 swp2 -MAB Interfaces -Voice Interfaces -Parking VLAN Interfaces -Dynamic ACL Interfaces swp2 -Dynamic VLAN Status Disabled -8021x ACL Rules 10 used/256 max -``` - -To see which interfaces have attempted authorization for DACLs, run `nv show interface –view=dot1x-summary`: - -``` -cumulus@switch:~$ nv show interface –view=dot1x-summary - -Interface MAC Address Username State Authentication Type MAB VLAN DACL Active ---------- ----------------- -------- ---------- ------------------- --- ---- ----------- -swp1 00:02:00:00:00:01 host1 AUTHORIZED MD5 NO NO -swp2 00:02:00:00:00:02 host2 AUTHORIZED MD5 NO YES -``` - -To determine the name of the DACL rules file for an interface after authorization and after receiving DACL rules, run `nv show interface dot1x `. Look for the DACL Filename line: - -``` -cumulus@switch:~$ nv show interface swp1 dot1x - -Interface MAC Address Attribute Value ---------- ----------------- ---------------------------- ----------------- -swp1 00:02:00:00:00:01 Status Flags [AUTHORIZED] - Username host1 - Authentication Type MD5 - VLAN - DACL Filename 150_dot1x_dacl_swp2_000200000002.rules - Session Time (seconds) 65 - EAPOL Frames RX 3 - EAPOL Frames TX 3 - EAPOL Start Frames RX 1 - EAPOL Logoff Frames RX 0 - EAPOL Response ID Frames RX 1 -``` - -To see which ACLs are applied to a given interface, run `cl-acltool -L eb | grep `. - -``` -cumulus@switch:~$ net show dot1x interface swp2 applied-acls - -swp2 EBTABLES ACLs -======================== --p ! 802_1Q -s 0:2:0:0:0:2 -i swp2 -j mark --mark-set 0x2 --mark-target ACCEPT, pcnt = 1 -- bcnt = 421 --p ! 802_1Q -s 0:2:0:0:0:2 -i swp2 -j ACCEPT , pcnt = 1 -- bcnt = 421 --p IPv4 -i swp2 --ip-proto udp --ip-sport 68 --ip-dport 67 -j mark --mark-set 0x2 --mark-target ACCEPT, pcnt = 0 -- bcnt = 0 --p IPv4 -i swp2 --ip-proto udp --ip-sport 68 --ip-dport 67 -j ACCEPT , pcnt = 0 -- bcnt = 0 --p 0x888e -i swp2 -j mark --mark-set 0x2 --mark-target ACCEPT, pcnt = 3 -- bcnt = 192 --p 0x888e -i swp2 -j police --set-mode pkt --set-rate 100 --set-burst 100 , pcnt = 3 -- bcnt = 192 --i swp2 -j mark --mark-set 0x2 --mark-target ACCEPT, pcnt = 4 -- bcnt = 1684 --i swp2 -j DROP , pcnt = 4 -- bcnt = 1684 --p IPv4 -s 0:2:0:0:0:2 -i swp2 --ip-proto udp --ip-dport 67 -j mark --mark-set 0x2 --mark-target ACCEPT, pcnt = 0 -- bcnt = 0 --p IPv4 -s 0:2:0:0:0:2 -i swp2 --ip-proto udp --ip-dport 67 -j ACCEPT , pcnt = 0 -- bcnt = 0 --p IPv4 -s 0:2:0:0:0:2 -i swp2 --ip-dst 10.0.0.0/9 --ip-proto udp --ip-dport 53 -j mark --mark-set 0x2 --mark-target ACCEPT, pcnt = 0 -- bcnt = 0 --p IPv4 -s 0:2:0:0:0:2 -i swp2 --ip-dst 10.0.0.0/9 --ip-proto udp --ip-dport 53 -j ACCEPT , pcnt = 0 -- bcnt = 0 --p IPv4 -s 0:2:0:0:0:2 -i swp2 --ip-dst 10.0.0.0/9 --ip-proto udp --ip-dport 123 -j mark --mark-set 0x2 --mark-target ACCEPT, pcnt = 0 -- bcnt = 0 --p IPv4 -s 0:2:0:0:0:2 -i swp2 --ip-dst 10.0.0.0/9 --ip-proto udp --ip-dport 123 -j ACCEPT , pcnt = 0 -- bcnt = 0 --p IPv4 -s 0:2:0:0:0:2 -i swp2 --ip-proto icmp -j mark --mark-set 0x2 --mark-target ACCEPT, pcnt = 0 -- bcnt = 0 --p IPv4 -s 0:2:0:0:0:2 -i swp2 --ip-proto icmp -j ACCEPT , pcnt = 0 -- bcnt = 0 --p IPv4 -s 0:2:0:0:0:2 -i swp2 --ip-dst 172.16.0.99 -j mark --mark-set 0x2 --mark-target ACCEPT, pcnt = 0 -- bcnt = 0 --p IPv4 -s 0:2:0:0:0:2 -i swp2 --ip-dst 172.16.0.99 -j ACCEPT , pcnt = 0 -- bcnt = 0 --p IPv4 -s 0:2:0:0:0:2 -i swp2 --ip-dst 172.16.131.99 -j mark --mark-set 0x2 --mark-target ACCEPT, pcnt = 0 -- bcnt = 0 --p IPv4 -s 0:2:0:0:0:2 -i swp2 --ip-dst 172.16.131.99 -j ACCEPT , pcnt = 0 -- bcnt = 0 --p IPv4 -s 0:2:0:0:0:2 -i swp2 --ip-dst 172.16.0.33 -j mark --mark-set 0x2 --mark-target ACCEPT, pcnt = 0 -- bcnt = 0 --p IPv4 -s 0:2:0:0:0:2 -i swp2 --ip-dst 172.16.0.33 -j ACCEPT , pcnt = 0 -- bcnt = 0 --p IPv4 -s 0:2:0:0:0:2 -i swp2 --ip-dst 172.16.131.105 -j mark --mark-set 0x2 --mark-target ACCEPT, pcnt = 0 -- bcnt = 0 --p IPv4 -s 0:2:0:0:0:2 -i swp2 --ip-dst 172.16.131.105 -j ACCEPT , pcnt = 0 -- bcnt = 0 --p IPv4 -s 0:2:0:0:0:2 -i swp2 --ip-dst 10.72.169.224 -j mark --mark-set 0x2 --mark-target ACCEPT, pcnt = 0 -- bcnt = 0 --p IPv4 -s 0:2:0:0:0:2 -i swp2 --ip-dst 10.72.169.224 -j ACCEPT , pcnt = 0 -- bcnt = 0 --p IPv4 -s 0:2:0:0:0:2 -i swp2 --ip-dst 10.72.168.142 -j mark --mark-set 0x2 --mark-target ACCEPT, pcnt = 0 -- bcnt = 0 --p IPv4 -s 0:2:0:0:0:2 -i swp2 --ip-dst 10.72.168.142 -j ACCEPT , pcnt = 0 -- bcnt = 0 --p IPv4 -s 0:2:0:0:0:2 -i swp2 --ip-dst 10.0.0.0/9 --ip-proto tcp --ip-dport 8883 -j mark --mark-set 0x2 --mark-target ACCEPT, pcnt = 0 -- bcnt = 0 --p IPv4 -s 0:2:0:0:0:2 -i swp2 --ip-dst 10.0.0.0/9 --ip-proto tcp --ip-dport 8883 -j ACCEPT , pcnt = 0 -- bcnt = 0 --p IPv4 -s 0:2:0:0:0:2 -i swp2 --ip-dst 10.0.0.0/9 --ip-proto tcp --ip-dport 32768 -j mark --mark-set 0x2 --mark-target ACCEPT, pcnt = 0 -- bcnt = 0 --p IPv4 -s 0:2:0:0:0:2 -i swp2 --ip-dst 10.0.0.0/9 --ip-proto tcp --ip-dport 32768 -j ACCEPT , pcnt = 0 -- bcnt = 0 --p IPv4 -s 0:2:0:0:0:2 -i swp2 -j mark --mark-set 0x2 --mark-target ACCEPT, pcnt = 0 -- bcnt = 0 --p IPv4 -s 0:2:0:0:0:2 -i swp2 -j DROP , pcnt = 0 -- bcnt = 0 --p IPv4 -i swp2 --ip-proto udp --ip-dport 53 -j mark --mark-set 0x2 --mark-target ACCEPT, pcnt = 0 -- bcnt = 0 --p IPv4 -i swp2 --ip-proto udp --ip-dport 53 -j ACCEPT , pcnt = 0 -- bcnt = 0 --i swp2 -j mark --mark-set 0x2 --mark-target ACCEPT, pcnt = 0 -- bcnt = 0 --i swp2 -j DROP , pcnt = 0 -- bcnt = 0 -``` - -## Configure MAC Addresses per Port - -You can specify the maximum number of authenticated MAC addresses allowed on a port. You can specify any number between 0 and 255. The default value is 4. +You can specify the maximum number of authenticated MAC addresses allowed on an interface. You can specify any number between 0 and 255. The default value is 6. The following example sets the maximum number of authenticated MAC addresses to 10. @@ -972,447 +451,181 @@ ieee8021x=1 driver=wired dynamic_vlan=1 max_num_sta=10 -interfaces=swp1,swp2,swp3,swp4 -mab_interfaces= -parking_vlan_interfaces=swp1 -parking_vlan_id=777 -mab_activation_delay=30 -eap_reauth_period=0 -ctrl_interface=/var/run/hostapd -nas_identifier=localhost -auth_server_addr=127.0.0.1 -auth_server_port=1812 -auth_server_shared_secret=mysecret -acct_server_addr= -acct_server_port=1813 -acct_server_shared_secret= -radius_das_port= -radius_das_time_window=300 -radius_das_require_event_timestamp=1 -radius_das_require_message_authenticator=1 -``` - -Restart the `hostapd` service : - -``` -cumulus@switch:~$ sudo systemctl restart hostapd -``` - -{{< /tab >}} -{{< /tabs >}} - -## Configure EAP Requests from the Switch - -Cumulus Linux provides the `send-eap-request-id` option, which you can use to trigger EAP packets to be sent from the host side of a connection. For example, this option is required in a configuration where a PC connected to a phone attempts to send EAP packets to the switch via the phone but the PC does not receive a response from the switch (the phone might not be ready to forward packets to the switch after a reboot). Because the switch does not receive EAP packets, it attempts to authorize the PC with MAB instead of waiting for the packets. In this case, the PC might be placed into a parking VLAN to isolate it. To remove the PC from the parking VLAN, the switch needs to send an EAP request to the PC to trigger EAP. - -To configure the switch send an EAP request, run these commands: - -``` -cumulus@switch:~$ nv set system dot1x send-eap-request-id enabled -cumulus@switch:~$ nv config apply -``` - -{{%notice note%}} -- Only run this command if MAB is configured on an interface. -- The PC might attempt 802.1X authorization through the bridged connection in the back of the phone before the phone completes MAB authorization. In this case, 802.1X authorization fails. -{{%/notice%}} - -## RADIUS Change of Authorization and Disconnect Requests - -Extensions to the RADIUS protocol (RFC 5176) enable the Cumulus Linux switch to act as a Dynamic Authorization Server (DAS) by listening for Change of Authorization (CoA) requests from the RADIUS server (Dynamic Authorization Client (DAC)) and taking action when needed, such as bouncing a port or terminating a user session. The IEEE 802.1x server (`hostapd`) running on Cumulus Linux has been adapted to handle these additional, unsolicited RADIUS requests. - -{{< img src = "/images/cumulus-linux/802.1X-das.png" >}} - -### Configure DAS - -To configure DAS, provide the UDP port (3799 is the default port), the IP address, and the secret key for the DAS client. - -{{< tabs "TabID1257 ">}} - -{{< tab "NCLU Commands ">}} - -The following example commands set the UDP port to the default port, the IP address of the DAS client to 10.0.2.228, and the secret key to myclientsecret: - -``` -cumulus@switch:~$ net add dot1x radius das-port default -cumulus@switch:~$ net add dot1x radius das-client-ip 10.0.2.228 das-client-secret mysecret123 -cumulus@switch:~$ net commit -``` - -You can specify a VRF so that incoming RADIUS disconnect and CoA commands are received and acknowledged on the correct interface when VRF is configured. The following example specifies VRF turtle: - -``` -cumulus@switch:~$ net add dot1x radius das-port default -cumulus@switch:~$ net add dot1x radius das-client-ip 10.0.2.228 vrf turtle das-client-secret mysecret123 -cumulus@switch:~$ net commit -``` - -You can configure up to four DAS clients to be authorized to send CoA commands. For example: - -``` -cumulus@switch:~$ net add dot1x radius das-port default -cumulus@switch:~$ net add dot1x radius das-client-ip 10.20.250.53 das-client-secret mysecret1 -cumulus@switch:~$ net add dot1x radius das-client-ip 10.0.1.7 das-client-secret mysecret2 -cumulus@switch:~$ net add dot1x radius das-client-ip 10.20.250.99 das-client-secret mysecret3 -cumulus@switch:~$ net add dot1x radius das-client-ip 10.10.0.0.2 das-client-secret mysecret4 -cumulus@switch:~$ net pending -cumulus@switch:~$ net commit -``` - -To see DAS configuration information, run the `net show configuration dot1x` command. For example: - -``` -cumulus@switch:~$ net show configuration dot1x - -dot1x - mab-activation-delay 5 - eap-reauth-period 0 - parking-vlan-id 100 - dynamic-vlan - - radius - accounting-port 1813 - das-client-ip 10.0.2.228 das-client-secret mysecret123 - authentication-port 1812 - das-port 3799 -``` - -{{< /tab >}} - -{{< tab "Linux Commands ">}} - -Edit the `/etc/hostapd.conf` file to add the following options to configure the UDP port, the IP address and secret key for the DAS client: - -- radius\_das\_port -- radius\_das\_client - -The following example sets the UDP port to the default port, the IP address of the DAS client to 10.0.2.228, and the secret key to mysecret123: - -``` -cumulus@switch:~$ sudo nano /etc/hostapd.conf -... -radius_das_port=3799 -radius_das_client=10.0.2.228 mysecret123 -``` - -You can specify a VRF so that incoming RADIUS disconnect and CoA commands are received and acknowledged on the correct interface when VRF is configured. The following example specifies VRF turtle: - -``` -cumulus@switch:~$ sudo nano /etc/hostapd.conf ... -radius_das_port=3799 -radius_das_client=10.0.2.228%turtle mysecret123 ``` -You can configure up to four DAS clients to be authorized to send CoA commands. For example: - -``` -cumulus@switch:~$ sudo nano /etc/hostapd.conf -... -radius_das_port=3799 -radius_das_client=10.20.250.53 mysecret1 -radius_das_client=10.0.1.7 mysecret2 -radius_das_client=10.20.250.99 mysecret3 -radius_das_client=10.10.0.0.2 mysecret4 -``` - -Restart the `hostapd` service: - -``` -cumulus@switch:~$ sudo systemctl restart hostapd -``` - -{{< /tab >}} - -{{< /tabs >}} - -You can disable DAS in Cumulus Linux at any time by running the -following commands: - -{{< tabs "TabID1359 ">}} - -{{< tab "NCLU Commands ">}} - -``` -cumulus@switch:~$ net del dot1x radius das-port -cumulus@switch:~$ net del dot1x radius das-client-ip -cumulus@switch:~$ net pending -cumulus@switch:~$ net commit -``` - -{{< /tab >}} - -{{< tab "Linux Commands ">}} - -Edit the `/etc/hostapd.conf` file to remove the following options: - -- `radius_das_port` -- `radius_das_client` - -Restart the `hostapd` service: +Restart the `hostapd` service : ``` cumulus@switch:~$ sudo systemctl restart hostapd ``` {{< /tab >}} - {{< /tabs >}} -### Terminate a User Session - -From the DAC, users can create a disconnect message using the `radclient` utility (included in the Debian `freeradius-utils` package) on the RADIUS server or other authorized client. A disconnect message is sent as an unsolicited RADIUS Disconnect-Request packet to the switch to terminate a user session and discard all associated session context. The Disconnect-Request packet is used when the RADIUS server wants to disconnect the user after the session has been accepted by the RADIUS Access-Accept packet. - -This is an example of a disconnect message created using the radclient utility: - -``` -$ echo "Acct-Session-Id=D91FE8E51802097" > disconnect-packet.txt -$ ## OPTIONAL ## echo "User-Name=somebody" >> disconnect-packet.txt -$ echo "Message-Authenticator=1" >> disconnect-packet.txt -$ echo "Event-Timestamp=1532974019" >> disconnect-packet.txt -# now send the packet with the radclient utility (from freeradius-utils deb package) -$ cat disconnect-packet.txt | radclient -x 10.0.0.1:3799 disconnect myclientsecret -``` - -To prevent unauthorized servers from disconnecting users, the Disconnect-Request packet must include certain identification attributes (described below). For a session to be disconnected, all parameters must match their expected values at the switch. If the parameters do not match, the switch discards the Disconnect-Request packet and sends a Disconnect-NAK (negative acknowledgment message). - -- The `Message-Authenticator` attribute is required. -- If the packet comes from a different source IP address than the one defined by `das-client-ip`, the session is not disconnected and the `hostapd` logs the debug message: `DAS: Drop message from unknown client.` -- The `Event-Timestamp` attribute is required. If `Event-Timestamp` in the packet is outside the time window, a debug message is shown in the `hostapd` logs: `DAS: Unacceptable Event-Timestamp (1532978602; local time 1532979367) in packet from 10.10.0.21:45263 - drop` -- If the `Acct-Session-Id` attribute is omitted, the `User-Name`attribute is used to find the session. If the `User-Name` attribute is omitted, the `Acct-Session-Id` attribute is used. If both the `User-Name` and the `Acct-Session-Id` attributes are supplied, they must match the username provided by the supplicant with the `Acct-Session-Id` provided. If neither are given or there is no match, a Disconnect-NAK message is returned to the RADIUS server with `Error-Cause "Session-Context-Not-Found"` and the following debug message is shown in the log: - -``` -RADIUS DAS: Acct-Session-Id match -RADIUS DAS: No matches remaining after User-Name check -hostapd_das_find_global_sta: checking ifname=swp2 -RADIUS DAS: No matches remaining after Acct-Session-Id check -RADIUS DAS: No matching session found -DAS: Session not found for request from 10.10.0.1:58385 -DAS: Reply to 10.10.0.1:58385 -``` - -The following is an example of the Disconnect-Request packet received by the switch: - -``` -RADIUS Protocol -Code: Disconnect-Request (40) -Packet identifier: 0x4f (79) -Length: 53 -Authenticator: c0e1fa75fdf594a1cfaf35151a43c6a7 -Attribute Value Pairs -AVP: t=Acct-Session-Id(44) l=17 val=D91FE8E51802097 -AVP: t=User-Name(1) l=10 val=somebody -AVP: t=Message-Authenticator(80) l=18 val=38cb3b6896623b4b7d32f116fa976cdc -AVP: t=Event-Timestamp(55) l=6 val=1532974019 -AVP: t=NAS-IP-Address(4) l=6 val=10.0.0.1 -``` - -### Bounce a Port - -You can create a CoA bounce-host-port message from the RADIUS server using the `radclient` utility (included in the Debian `freeradius-utils` package). The bounce port can cause a link flap on an authentication port, which triggers DHCP renegotiation from one or more hosts connected to the port. - -The following is an example of a Cisco AVPair CoA bounce-host-port message sent from the radclient utility: +## Troubleshooting -``` -$ echo "Acct-Session-Id=D91FE8E51802097" > bounce-packet.txt -$ ## OPTIONAL ## echo "User-Name=somebody" >> bounce-packet.txt -$ echo "Message-Authenticator=1" >> bounce-packet.txt -$ echo "Event-Timestamp=1532974019" >> bounce-packet.txt -$ echo "cisco-avpair='subscriber:command=bounce-host-port' " >> bounce-packet.txt -$ cat bounce-packet.txt | radclient -x 10.0.0.1:3799 coa myclientsecret -``` +### Check Connectivity Between Supplicants -The message received by the switch is: +To check connectivity between two supplicants, ping one host from the other: ``` -RADIUS Protocol -Code: CoA-Request (43) -Packet identifier: 0x3a (58) -Length: 96 -Authenticator: 6480d710802329269d5cae6a59bcfb59 -Attribute Value Pairs -AVP: t=Acct-Session-Id(44) l=17 val=D91FE8E51802097 -Type: 44 -Length: 17 -Acct-Session-Id: D91FE8E51802097 -AVP: t=User-Name(1) l=10 val=somebody -Type: 1 -Length: 10 -User-Name: somebody -AVP: t=NAS-IP-Address(4) l=6 val=10.0.0.1 -Type: 4 -Length: 6 -NAS-IP-Address: 10.0.0.1 -AVP: t=Vendor-Specific(26) l=43 vnd=ciscoSystems(9) -Type: 26 -Length: 43 -Vendor ID: ciscoSystems (9) -VSA: t=Cisco-AVPair(1) l=37 val=subscriber:command=bounce-host-port -Type: 1 -Length: 37 -Cisco-AVPair: subscriber:command=bounce-host-port +root@host1:/home/cumulus# ping 198.51.100.2 +PING 10.0.0.2 (10.0.0.2) 56(84) bytes of data. +64 bytes from 10.0.0.2: icmp_seq=1 ttl=64 time=0.604 ms +64 bytes from 10.0.0.2: icmp_seq=2 ttl=64 time=0.552 ms +^C +--- 10.0.0.2 ping statistics --- +2 packets transmitted, 2 received, 0% packet loss, time 1000ms +rtt min/avg/max/mdev = 0.552/0.578/0 ``` -## Configure the NAS IP Address +### Show RADIUS Server Configuration -You can send the NAS IPv4 or IPv6 address in access request and accounting packets. You can only configure one NAS IP address on the switch, which is used for all interface authorizations. - -To configure the NAS IP address, run the following commands: - -{{< tabs "TabID1489 ">}} - -{{< tab "NCLU Commands ">}} - -The following command example sets the NAS IP address to 10.0.0.1: +To show the list of RADIUS servers, run the `nv show system dot1x radius` command: ``` -cumulus@switch:~$ net add dot1x radius nas-ip-address 10.0.0.1 +cumulus@switch:~$ nv show system dot1x radius + operational applied +-------- ----------- --------- +[server] 10.10.10.1 ``` -{{< /tab >}} - -{{< tab "Linux Commands ">}} - -Edit the `/etc/hostapd.conf` file and configure the `own_ip_addr` setting with the NAS IP address: +To show configuration information for RADIUS servers, run the `nv show system dot1x radius server` command: ``` -cumulus@switch:~$ sudo nano /etc/hostapd.conf -... -interfaces=swp1,swp2,swp3,swp4 -mab_interfaces= -parking_vlan_interfaces= -parking_vlan_id= -mab_activation_delay=30 -eap_reauth_period=0 -eap_send_identity=0 -ctrl_interface=/var/run/hostapd -own_ip_addr=10.0.0.1 +cumulus@switch:~$ nv show system dot1x radius server +Server accounting-port authentication-port priority shared-secret vrf +--------- --------------- ------------------- -------- ------------- --- +10.10.10.1 1813 1812 1 ``` -Enable, then restart the `hostapd` service so that the configuration persists between reboots: +To show configuration information for a specific RADIUS server, run the `nv show system dot1x radius server ` command: ``` -cumulus@switch:~$ sudo systemctl enable hostapd -cumulus@switch:~$ sudo systemctl restart hostapd +cumulus@switch:~$ nv show system dot1x radius server 10.10.10.1 + operational applied +------------------- ----------- ------- +priority 1 1 +accounting-port 1813 1813 +authentication-port 1812 1812 +shared-secret * ``` - -{{< /tab >}} - -{{< /tabs >}} - -To delete the NAS IP address, either run the NCLU `net del dot1x radius nas-ip-address` command or edit the `/etc/hostapd.conf` file. - -## Troubleshooting - -To check connectivity between two supplicants, ping one host from the other: + +### Show 802.1X Configuration and Authorization Information + +To check which MAC addresses RADIUS has authorized, run the `nv show interface --view=dot1x-summary` command: + +``` +cumulus@switch:~$ nv show interface --view=dot1x-summary +Interface Mac-Address Status Auth-Type Username Vlan Session-id +--------- ----------------- ---------- --------- ------------ ---- ---------------- +eth0 00:55:00:00:00:09 AUTHORIZED MBA 005500000009 10 946E00ED478CC8D3 + 00:02:00:00:00:09 AUTHORIZED MD5 vlan10 10 9EA1784C12F4E646 +lo 00:55:00:00:00:09 AUTHORIZED MBA 005500000009 10 946E00ED478CC8D3 + 00:02:00:00:00:09 AUTHORIZED MD5 vlan10 10 9EA1784C12F4E646 +mgmt 00:55:00:00:00:09 AUTHORIZED MBA 005500000009 10 946E00ED478CC8D3 + 00:02:00:00:00:09 AUTHORIZED MD5 vlan10 10 9EA1784C12F4E646 +swp1 00:55:00:00:00:09 AUTHORIZED MBA 005500000009 10 946E00ED478CC8D3 + 00:02:00:00:00:09 AUTHORIZED MD5 vlan10 10 9EA1784C12F4E646 +swp2 00:55:00:00:00:09 AUTHORIZED MBA 005500000009 10 946E00ED478CC8D3 + 00:02:00:00:00:09 AUTHORIZED MD5 vlan10 10 9EA1784C12F4E646 +swp3 00:55:00:00:00:09 AUTHORIZED MBA 005500000009 10 946E00ED478CC8D3 + 00:02:00:00:00:09 AUTHORIZED MD5 vlan10 10 9EA1784C12F4E646 +swp4 00:55:00:00:00:09 AUTHORIZED MBA 005500000009 10 946E00ED478CC8D3 + 00:02:00:00:00:09 AUTHORIZED MD5 vlan10 10 9EA1784C12F4E646 +swp5 00:55:00:00:00:09 AUTHORIZED MBA 005500000009 10 946E00ED478CC8D3 + 00:02:00:00:00:09 AUTHORIZED MD5 vlan10 10 9EA1784C12F4E646 +swp6 00:55:00:00:00:09 AUTHORIZED MBA 005500000009 10 946E00ED478CC8D3 + 00:02:00:00:00:09 AUTHORIZED MD5 vlan10 10 9EA1784C12F4E646 +``` + +To show 802.1X configuration settings and authenticated session information for an interface, run the `nv show interface dot1x` command: ``` -root@host1:/home/cumulus# ping 198.51.100.2 -PING 10.0.0.2 (10.0.0.2) 56(84) bytes of data. -64 bytes from 10.0.0.2: icmp_seq=1 ttl=64 time=0.604 ms -64 bytes from 10.0.0.2: icmp_seq=2 ttl=64 time=0.552 ms -^C ---- 10.0.0.2 ping statistics --- -2 packets transmitted, 2 received, 0% packet loss, time 1000ms -rtt min/avg/max/mdev = 0.552/0.578/0 +cumulus@switch:~$ nv show interface swp1 dot1x + operational applied +-------------- ----------- -------- +eap enabled +mba disabled +auth-fail-vlan disabled + +Authenticated Sessions +========================= + Mac Auth-Type Session-id Status Username Vlan Eapol TX Eapol RX Err RX Req TX Resp RX Start RX Req-id TX Resp-id RX Invalid RX Logoff RX + ----------------- --------- ---------------- ---------- ------------ ---- -------- -------- ------ ------ ------- -------- --------- ---------- ---------- --------- + 00:02:00:00:00:09 MD5 9EA1784C12F4E646 AUTHORIZED vlan10 10 3 3 0 2 2 1 1 1 0 0 + 00:55:00:00:00:09 MBA 946E00ED478CC8D3 AUTHORIZED 005500000009 10 0 3 0 0 0 0 0 0 0 0 +``` + +To show the authenticated sessions and statistics for an interface, run the `nv show interface dot1x authenticated-sessions` command: + +``` +cumulus@switch:~$ nv show interface swp1 dot1x authenticated-sessions +Mac Auth-Type Session-id Status Username Vlan Eapol TX Eapol RX Err RX Req TX Resp RX Start RX Req-id TX Resp-id RX Invalid RX Logoff RX +----------------- --------- ---------------- ---------- ------------ ---- -------- -------- ------ ------ ------- -------- --------- ---------- ---------- --------- +00:02:00:00:00:09 MD5 9EA1784C12F4E646 AUTHORIZED vlan10 10 3 3 0 2 2 1 1 1 0 0 +00:55:00:00:00:09 MBA 946E00ED478CC8D3 AUTHORIZED 005500000009 10 0 3 0 0 0 0 0 0 0 0 +``` + +To show the authenticated sessions and statistics for a specific MAC address, run the `nv show interface dot1x authenticated-sessions ` command: + +``` +cumulus@switch:~$ nv show interface swp1 dot1x authenticated-sessions 00:02:00:00:00:09 + operational +------------------------- ----------------- +username vlan10 +auth-type MD5 +status AUTHORIZED +vlan 10 +mac-address 00:02:00:00:00:09 +session-id 9EA1784C12F4E646 +counters + eapol-frames-tx 3 + eapol-frames-rx 3 + eapol-len-err-frames-rx 0 + eapol-req-frames-tx 2 + eapol-resp-frames-rx 2 + eapol-start-frames-rx 1 + eapol-req-id-frames-tx 1 + eapol-resp-id-frames-rx 1 + eapol-invalid-frames-rx 0 + eapol-logoff-frames-rx 0 ``` - -You can run `net show dot1x` with the following options for more data: - -- `json` prints the command output in JSON format. -- `macs` displays MAC address information. -- `port-details` shows counters from the IEEE8021-PAE-MIB for ports. -- `radius-details` shows counters from the RADIUS-CLIENT MIB (RFC 2618) for ports. -- `status` displays the status of the daemon. - -To check to see which MAC addresses have been authorized by RADIUS: - -``` -cumulus@switch:~$ net show dot1x macs -Interface Attribute Value ------------ ------------- ----------------- -swp1 MAC Addresses 00:02:00:00:00:01 -swp2 No Data -swp3 No Data -swp4 No Data -``` - -To check the port detail counters: - -``` -cumulus@switch:~$ net show dot1x port-details - -Interface Attribute Value ------------ ---------------------------------------- --------- -swp1 Mac Addresses 00:02:00:00:00:01 - authMultiSessionId 96703ADC82D77DF2 - connected_time 182 - dot1xAuthEapolFramesRx 3 - dot1xAuthEapolFramesTx 3 - dot1xAuthEapolLogoffFramesRx 0 - dot1xAuthEapolReqFramesTx 2 - dot1xAuthEapolReqIdFramesTx 1 - dot1xAuthEapolRespFramesRx 2 - dot1xAuthEapolRespIdFramesRx 1 - dot1xAuthEapolStartFramesRx 1 - dot1xAuthInvalidEapolFramesRx 0 - dot1xAuthLastEapolFrameSource 00:02:00:00:00:01 - dot1xAuthLastEapolFrameVersion 2 - dot1xAuthPaeState 5 - dot1xAuthQuietPeriod 60 - dot1xAuthReAuthEnabled FALSE - dot1xAuthReAuthPeriod 0 - dot1xAuthServerTimeout 30 - dot1xAuthSessionAuthenticMethod 1 - dot1xAuthSessionId 1B50FE8939FD9F5E - dot1xAuthSessionTerminateCause 999 - dot1xAuthSessionTime 182 - dot1xAuthSessionUserName testing - dot1xPaePortProtocolVersion 2 - last_eap_type_as 4 (MD5) - last_eap_type_sta 4 (MD5) -``` - -To check RADIUS counters: - -``` -cumulus@switch:~$ net show dot1x radius-details swp1 - -Interface Attribute Value ------------ ---------------------------------------- --------- -swp1 radiusAccClientRequests 1 - radiusAccClientResponses 1 - radiusAccClientServerPortNumber 1813 - radiusAccServerAddress 127.0.0.1 - radiusAuthClientAccessAccepts 1 - radiusAuthClientAccessChallenges 1 - radiusAuthClientAccessRejects 0 - radiusAuthClientAccessRequests 0 - radiusAuthClientServerPortNumber 1812 - radiusAuthServerAddress 127.0.0.1 - radiusAuthServerIndex 1 - + +### Show 802.1X Statistics + +To check statistics for all interfaces, run the `nv show interface --view=dot1x-counters` command: + +``` +cumulus@switch:~$ nv show interface --view=dot1x-counters +Interface Mac-Address Eapol TX Eapol RX Req TX Resp RX Err RX Start RX Req-id TX Resp-id RX Invalid RX Logoff RX +--------- ----------------- -------- -------- ------ ------- ------ -------- --------- ---------- ---------- --------- +eth0 00:55:00:00:00:09 0 3 0 0 0 0 0 0 0 0 + 00:02:00:00:00:09 3 3 2 2 0 1 1 1 0 0 +lo 00:55:00:00:00:09 0 3 0 0 0 0 0 0 0 0 + 00:02:00:00:00:09 3 3 2 2 0 1 1 1 0 0 +mgmt 00:55:00:00:00:09 0 3 0 0 0 0 0 0 0 0 + 00:02:00:00:00:09 3 3 2 2 0 1 1 1 0 0 +swp1 00:55:00:00:00:09 0 3 0 0 0 0 0 0 0 0 + 00:02:00:00:00:09 3 3 2 2 0 1 1 1 0 0 +swp2 00:55:00:00:00:09 0 3 0 0 0 0 0 0 0 0 + 00:02:00:00:00:09 3 3 2 2 0 1 1 1 0 0 +swp3 00:55:00:00:00:09 0 3 0 0 0 0 0 0 0 0 + 00:02:00:00:00:09 3 3 2 2 0 1 1 1 0 0 +swp4 00:55:00:00:00:09 0 3 0 0 0 0 0 0 0 0 + 00:02:00:00:00:09 3 3 2 2 0 1 1 1 0 0 +swp5 00:55:00:00:00:09 0 3 0 0 0 0 0 0 0 0 + 00:02:00:00:00:09 3 3 2 2 0 1 1 1 0 0 +swp6 00:55:00:00:00:09 0 3 0 0 0 0 0 0 0 0 + 00:02:00:00:00:09 3 3 2 2 0 1 1 1 ... ``` -You can also check logging with the `journalctl` command: - -``` -cumulus@switch:~$ sudo journalctl -f -u hostapd -Apr 19 22:17:11 switch hostapd[12462]: swp1: interface state UNINITIALIZED->ENABLED -Apr 19 22:17:11 switch hostapd[12462]: swp1: AP-ENABLED -Apr 19 22:17:11 switch hostapd[12462]: Reading rule file /etc/cumulus/acl/policy.d/00control_ps ... -Apr 19 22:17:11 switch hostapd[12462]: Processing rules in file /etc/cumulus/acl/policy.d/00... -Apr 19 22:17:12 switch hostapd[12462]: Reading rule file /etc/cumulus/acl/policy.d/100_dot1x... -Apr 19 22:17:12 switch hostapd[12462]: Processing rules in file /etc/cumulus/acl/policy.d/ .. -Apr 19 22:17:12 switch hostapd[12462]: Reading rule file /etc/cumulus/acl/policy.d/99control -Apr 19 22:17:12 switch hostapd[12462]: Processing rules in file /etc/cumulus/acl/policy.d/99 -Apr 19 22:17:12 switch hostapd[12462]: Installing acl policy -Apr 19 22:17:12 switch hostapd[12462]: done. -``` +### Advanced Troubleshooting You can perform more advanced troubleshooting with the following commands. - + To increase the debug level in `hostapd`, copy over the `hostapd` service file, then add *-d*, *-dd* or *-ddd* to the `ExecStart` line in the `hostapd.service` file: ``` @@ -1422,7 +635,7 @@ cumulus@switch:~$ sudo nano /etc/systemd/system/hostapd.service ExecStart=/usr/sbin/hostapd -ddd -c /etc/hostapd.conf ... ``` - + To watch debugs with `journalctl` as supplicants attempt to connect: ``` @@ -1433,13 +646,19 @@ cumulus@switch:~$ sudo journalctl -f -u hostapd # continuous tail of To check ACL rules in `/etc/cumulus/acl/policy.d/100_dot1x_swpX.rules` before and after a supplicant attempts to authenticate: ``` -cumulus@switch:~$ sudo cl-acltool -L eb | grep swpXX -cumulus@switch:~$ sudo cl-netstat | grep swpXX # look at interface counters +cumulus@switch:~$ sudo cl-acltool -L eb | grep swp1 +cumulus@switch:~$ sudo cl-netstat | grep swp1 # look at interface counters ``` To check `tc` rules in `/var/lib/hostapd/acl/tc_swpX.rules` with: ``` -cumulus@switch:~$ sudo tc -s filter show dev swpXX parent 1: -cumulus@switch:~$ sudo tc -s filter show dev swpXX parent ffff: +cumulus@switch:~$ sudo tc -s filter show dev swp1 parent 1: +cumulus@switch:~$ sudo tc -s filter show dev swp1 parent ffff: ``` + +## Related Information + +- {{}} +- {{}} +- {{}} diff --git a/content/cumulus-linux-57/Layer-1-and-Switch-Ports/DHCP/DHCP-Relays.md b/content/cumulus-linux-57/Layer-1-and-Switch-Ports/DHCP/DHCP-Relays.md index 054dca65f6..a4aced792d 100644 --- a/content/cumulus-linux-57/Layer-1-and-Switch-Ports/DHCP/DHCP-Relays.md +++ b/content/cumulus-linux-57/Layer-1-and-Switch-Ports/DHCP/DHCP-Relays.md @@ -103,7 +103,7 @@ cumulus@leaf01:~$ nv config apply ## Optional Configuration -This section describes optional DHCP relay configuration. The steps provided in this section assume that you already done basic DHCP relay configuration, described above. +This section describes optional DHCP relay configurations. The steps provided in this section assume that you have already configured basic DHCP relay, as described above. ### DHCP Agent Information Option (Option 82) @@ -114,6 +114,28 @@ Cumulus Linux supports DHCP Agent Information Option 82, which allows a DHCP rel To configure DHCP Agent Information Option 82: +{{< tabs "TabID117 ">}} +{{< tab "NVUE Commands ">}} + +The following example enables Option 82 and enables circuit ID: + +``` +cumulus@leaf01:~$ nv set service dhcp-relay agent enable on +cumulus@leaf01:~$ nv set service dhcp-relay agent use-pif-circuit-id enable on +cumulus@leaf01:~$ nv config apply +``` + +The following example enables Option 82 and sets the remote ID to MAC address 44:38:39:BE:EF:AA: + +``` +cumulus@leaf01:~$ nv set service dhcp-relay agent enable on +cumulus@leaf01:~$ nv set service dhcp-relay default agent remote-id 44:38:39:BE:EF:AA +cumulus@leaf01:~$ nv config apply +``` + +{{< /tab >}} +{{< tab "Linux Commands ">}} + 1. Edit the `/etc/default/isc-dhcp-relay-default` file and add one of the following options: To inject the ingress *SVI interface* against which DHCP processes the relayed DHCP discover packet, add `-a` to the `OPTIONS` line: @@ -149,6 +171,9 @@ To configure DHCP Agent Information Option 82: cumulus@leaf01:~$ sudo systemctl restart dhcrelay@default.service ``` +{{< /tab >}} +{{< /tabs >}} + ### Control the Gateway IP Address with RFC 3527 When you need DHCP relay in an environment that relies on an anycast gateway (such as EVPN), a unique IP address is necessary on each device for return traffic. By default, in a BGP unnumbered environment with DHCP relay, the source IP address is the loopback IP address and the gateway IP address is the SVI IP address. However with anycast traffic, the SVI IP address is not unique to each rack; it is typically shared between racks. Most EVPN ToR deployments only use a single unique IP address, which is the loopback IP address. diff --git a/content/cumulus-linux-57/Layer-1-and-Switch-Ports/DHCP/DHCP-Servers.md b/content/cumulus-linux-57/Layer-1-and-Switch-Ports/DHCP/DHCP-Servers.md index 7f66e653a9..bba92bb95a 100644 --- a/content/cumulus-linux-57/Layer-1-and-Switch-Ports/DHCP/DHCP-Servers.md +++ b/content/cumulus-linux-57/Layer-1-and-Switch-Ports/DHCP/DHCP-Servers.md @@ -27,13 +27,15 @@ To configure the DHCP server on a Cumulus Linux switch: In addition, you can configure a static IP address for a resource, such as a server or printer: - Create an ID for the static assignment. This is typically the name of the resource. - Provide the static IP address you want to assign to this resource. -- Provide the MAC address of the resource to which you want to assign the IP address. +- Provide the MAC address of the resource to which you want to assign the IP address. Instead of the MAC address, you can set the interface name for the static assignment (IPv4 only); for example swp1. {{%notice note%}} - To configure static IP address assignments, you must first configure a pool. -- You can set the DNS server IP address and domain name globally or specify different DNS server IP addresses and domain names for different pools. The following example commands configure a DNS server IP address and domain name for a pool. +- You can set the DNS server IP address and domain name globally or specify different DNS server IP addresses and domain names for different pools. {{%/notice%}} +The following example configures the `storage-servers` pool with DNS and static DHCP assignments for `server1` and `server2`. + {{< tabs "TabID27 ">}} {{< tab "NVUE Commands ">}} @@ -49,11 +51,16 @@ cumulus@switch:~$ nv set service dhcp-server default pool 10.1.10.0/24 gateway 1 cumulus@switch:~$ nv set service dhcp-server default static server1 cumulus@switch:~$ nv set service dhcp-server default static server1 ip-address 10.0.0.2 cumulus@switch:~$ nv set service dhcp-server default static server1 mac-address 44:38:39:00:01:7e +cumulus@switch:~$ nv set service dhcp-server default static server2 +cumulus@switch:~$ nv set service dhcp-server default static server2 ip-address 10.0.0.3 +cumulus@switch:~$ nv set service dhcp-server default static server2 ifname swp1 cumulus@switch:~$ nv config apply ``` To set the DNS server IP address and domain name globally, use the `nv set service dhcp-server domain-name-server
` and `nv set service dhcp-server domain-name ` commands. +To set the interface name for the static assignment, run the `nv set service dhcp-server static ifname` command. + {{< /tab >}} {{< tab "IPv6 ">}} @@ -203,7 +210,7 @@ subnet6 2001:db8::1/128 { ### Lease Time -You can set the network address lease time assigned to DHCP clients. You can specify a number between 180 and 31536000. The default lease time is 600 seconds. +You can set the network address lease time assigned to DHCP clients. You can specify a number between 180 and 31536000. The default lease time is 3600 seconds. {{< tabs "TabID206 ">}} {{< tab "NVUE Commands ">}} diff --git a/content/cumulus-linux-57/Layer-1-and-Switch-Ports/DHCP/DHCP-Snooping.md b/content/cumulus-linux-57/Layer-1-and-Switch-Ports/DHCP/DHCP-Snooping.md new file mode 100644 index 0000000000..bc3dc9085a --- /dev/null +++ b/content/cumulus-linux-57/Layer-1-and-Switch-Ports/DHCP/DHCP-Snooping.md @@ -0,0 +1,91 @@ +--- +title: DHCP Snooping +author: NVIDIA +weight: 355 +toc: 3 +--- +DHCP snooping enables Cumulus Linux to act as a middle layer between the DHCP infrastructure and DHCP clients by scanning DHCP control packets and building an IP-MAC database. Cumulus Linux accepts DHCP offers from only trusted interfaces and can rate limit packets. + +{{%notice note%}} +DHCP option 82 processing is not supported. +{{%/notice%}} + +## Configure DHCP Snooping + +To configure DHCP snooping, you need to: + +- Enable DHCP snooping on a VLAN. +- Add a trusted interface. Cumulus Linux allows DHCP offers from only trusted interfaces to prevent malicious DHCP servers from assigning IP addresses inside the network. The interface must be a member of the bridge specified. +- Set the rate limit for DHCP requests to avoid DoS attacks. The default value is 100 packets per second. + +The following example shows you how to configure DHCP snooping for IPv4 and IPv6. + +{{%notice note%}} +NVUE does not provide commands to configure DHCP Snooping. +{{%/notice%}} + +Create the `/etc/dhcpsnoop/dhcp_snoop.json` file and add DHCP snooping configuration under the bridge. + +The following example enables DHCP snooping for IPv4 on VLAN 10, sets the rate limit to 50 and the trusted interface to swp3. swp3 is a member of the bridge `br_default`: + +``` +cumulus@leaf01:~$ sudo nano /etc/dhcpsnoop/dhcp_snoop.json +{ + "bridge": [ + { + "bridge_id": "br_default", + "vlan": [ + { + "vlan_id": 10, + "snooping": 1, + "rate_limit": 50, + "ip_version": 4, + "trusted_interface": [ + "swp3" + ], + } + ] + } + ] +} +``` + +The following example enables DHCP snooping for IPv6 on VLAN 10, sets the rate limit to 50 and the trusted interface to swp6. swp6 is a member of the bridge `br_default`: + +``` +cumulus@leaf01:~$ sudo nano /etc/dhcpsnoop/dhcp_snoop.json +{ + "bridge": [ + { + "bridge_id": "br_default", + "vlan": [ + { + "vlan_id": 10, + "snooping": 1, + "rate_limit": 50, + "ip_version": 6, + "trusted_interface": [ + "swp6" + ], + } + ] + } + ] +} +``` + +When DHCP snooping detects a violation, Cumulus Linux drops the packet and logs a message in the `/var/log/dhcpsnoop.log` file. + +## Show the DHCP Binding Table + +To show the DHCP binding table, run the `net show dhcp-snoop table` command for IPv4 or the `net show dhcp-snoop6 table` command for IPv6. The following example command shows the DHCP binding table for IPv4: + +``` +cumulus@leaf01:~$ net show dhcp-snoop table +Port VLAN IP MAC Lease State Bridge +---- ---- --------- ----------------- ----- ----- ------ + +swp5 1002 10.0.0.3 00:02:00:00:00:04 7200 ACK br0 + +swp5 1000 10.0.1.3 00:02:00:00:00:04 7200 ACK br0 +``` diff --git a/content/cumulus-linux-57/Layer-1-and-Switch-Ports/DHCP/_index.md b/content/cumulus-linux-57/Layer-1-and-Switch-Ports/DHCP/_index.md index 349640ceb4..fd3f513c3c 100644 --- a/content/cumulus-linux-57/Layer-1-and-Switch-Ports/DHCP/_index.md +++ b/content/cumulus-linux-57/Layer-1-and-Switch-Ports/DHCP/_index.md @@ -4,4 +4,7 @@ author: NVIDIA weight: 338 toc: 3 --- -This section describes how to configure [DHCP](## "Dynamic Host Configuration Protocol") relays and [DHCP](## "Dynamic Host Configuration Protocol") servers. +This section describes how to configure: +- {{}} +- {{}} +- {{}} diff --git a/content/cumulus-linux-57/Layer-1-and-Switch-Ports/Interface-Configuration-and-Management/Switch-Port-Attributes.md b/content/cumulus-linux-57/Layer-1-and-Switch-Ports/Interface-Configuration-and-Management/Switch-Port-Attributes.md index 8a417f718a..6d6433057f 100644 --- a/content/cumulus-linux-57/Layer-1-and-Switch-Ports/Interface-Configuration-and-Management/Switch-Port-Attributes.md +++ b/content/cumulus-linux-57/Layer-1-and-Switch-Ports/Interface-Configuration-and-Management/Switch-Port-Attributes.md @@ -1194,7 +1194,7 @@ SN4600 64xQSFP56 (200GbE) interfaces support both PAM4 and NRZ encodings with al For lower speeds, PAM4 is automatically converted to NRZ encoding. -Only 32xQSFP56 ports can brea kout into 4xSFP56 (4x50GbE). But, in this case, the adjacent QSFP56 port are blocked (only the first and third or second and fourth rows can break out into 4xSFP56). +Only 32xQSFP56 ports can break out into 4xSFP56 (4x50GbE). But, in this case, the adjacent QSFP56 port are blocked (only the first and third or second and fourth rows can break out into 4xSFP56). All 64xQSFP56 ports can break out into 2xQSFP56 (2x100GbE) without blocking ports. diff --git a/content/cumulus-linux-57/Layer-1-and-Switch-Ports/Interface-Configuration-and-Management/_index.md b/content/cumulus-linux-57/Layer-1-and-Switch-Ports/Interface-Configuration-and-Management/_index.md index 8f9e479960..00226bc256 100644 --- a/content/cumulus-linux-57/Layer-1-and-Switch-Ports/Interface-Configuration-and-Management/_index.md +++ b/content/cumulus-linux-57/Layer-1-and-Switch-Ports/Interface-Configuration-and-Management/_index.md @@ -412,7 +412,7 @@ If you specify a subinterface, such as swp1.100, then run `ifup swp1.100`, Cumul You can specify both IPv4 and IPv6 addresses for the same interface. For IPv6 addresses: -- You can create or modify the IP address for an interface using either `::` or `0:0:0` notation. For example,both 2620:149:43:c109:0:0:0:5 and 2001:DB8::1/126 are valid. +- You can create or modify the IP address for an interface using either `::` or `0:0:0` notation. For example, both 2620:149:43:c109:0:0:0:5 and 2001:DB8::1/126 are valid. - Cumulus Linux assigns the IPv6 address with all zeroes in the interface identifier (2001:DB8::/126) for each subnet; connected hosts cannot use this address. The following example commands configure three IP addresses for swp1; two IPv4 addresses and one IPv6 address. @@ -639,7 +639,24 @@ Cumulus Linux enables link flap detection by default. Link flap detection trigge 2023-02-10T17:53:21.264621+00:00 cumulus switchd[10109]: sync_port.c:2263 ERR swp2 link flapped more than 3 times in the last 60 seconds, setting protodown ``` -To show interfaces with the protodown flag, run the Linux `ip link` command: +To show interfaces with the protodown flag, run the NVUE `nv show interface` command or the Linux `ip link` command. To check a specific interface, run the `nv show interface link` command. + +``` +cumulus@switch:~$ nv show interface +Interface State Speed MTU Type Remote Host Remote Port Summary +--------- ----- ----- ----- -------- --------------- ----------- ---------------------------------------- +eth0 up 1G 1500 eth oob-mgmt-switch swp10 IP Address: 192.168.200.11/24 + IP Address: fe80::4638:39ff:fe22:17a/64 +lo up 65536 loopback IP Address: 127.0.0.1/8 + IP Address: ::1/128 +mgmt up 65575 vrf IP Address: 127.0.0.1/8 + IP Address: ::1/128 +swp1 up 1500 swp +swp2 protodown 9178 swp +swp3 up 1500 swp +swp4 up 1500 swp +... +``` ``` cumulus@switch:~$ ip link @@ -681,7 +698,7 @@ cumulus@switch:~$ sudo ip link set swp2 protodown_reason linkflap off cumulus@switch:~$ sudo ip link set swp2 protodown off ``` -After a few seconds the port state returns to UP. Run the `ip link show ` command to verify that the interface is no longer in a protodown state and that the reason clears: +After a few seconds, the port state returns to UP. To verify that the interface is no longer in a protodown state and that the reason clears, run the `ip link show ` command: ``` cumulus@switch:~$ ip link show swp2 @@ -696,7 +713,7 @@ cumulus@switch:~$ ip link show swp2 You can change the following link flap protection settings: - The duration in seconds during which a link must flap the number of times set in the link flap threshold before link flap protection triggers. You can specify a value between 0 (off) and 60. The default setting is 10. -- The number of times the link must flap within the link flap window before link flap protection triggers. You can specify a value between 0 (off) and 30. The default setting is 5. +- The number of times the link can flap within the link flap window before link flap protection triggers. You can specify a value between 0 (off) and 30. The default setting is 5. The following example configures the link flap duration to 30 and the number of times the link must flap to 8. @@ -704,7 +721,7 @@ The following example configures the link flap duration to 30 and the number of {{< tab "NVUE Commands ">}} ``` -cumulus@switch:~$ nv set system link flap-protection time-interval 30 +cumulus@switch:~$ nv set system link flap-protection interval 30 cumulus@switch:~$ nv set system link flap-protection threshold 8 cumulus@switch:~$ nv config apply ``` @@ -759,14 +776,20 @@ link_flap_threshold = 0 To show the link flap protection time interval and threshold settings: ``` -cumulus@switch:~$ nv show system link flap-protection time-interval -cumulus@switch:~$ nv show system link flap-protection threshold +cumulus@switch:~$ nv show system link flap-protection + applied +--------- ------- +threshold 8 +interval 30 ``` -To show the link flap protection configuration for an interface, run the `nv show interface link flap-protection` command: +To show if link flap protection is on an interface, run the `nv show interface link flap-protection` command: ``` cumulus@switch:~$ nv show interface swp1 link flap-protection + applied +------ ------- +enable off ``` ## Mako Templates diff --git a/content/cumulus-linux-57/Layer-1-and-Switch-Ports/Port-Security.md b/content/cumulus-linux-57/Layer-1-and-Switch-Ports/Port-Security.md index b2c52696b9..9294b802e8 100644 --- a/content/cumulus-linux-57/Layer-1-and-Switch-Ports/Port-Security.md +++ b/content/cumulus-linux-57/Layer-1-and-Switch-Ports/Port-Security.md @@ -4,12 +4,9 @@ author: NVIDIA weight: 380 toc: 3 --- -Port security is a layer 2 traffic control feature that enables you to limit port access to: -- A specific number of MAC addresses. -- Specific MAC addresses so that the port does not forward ingress traffic from undefined source addresses. -- The first learned MAC address on the port (sticky MAC) so that the device with that MAC address has full bandwidth. You can provide a timeout so that the MAC address on that port no longer has access after a certain time. +Port security is a layer 2 traffic control feature that enables you to limit port access to a specific number of MAC addresses or specific MAC addresses so that the port does not forward ingress traffic from undefined source addresses (static MAC). -You can configure what action to take when there is a port security violation (drop packets or put the port into ADMIN down state) and add a timeout for the action to take effect. +You can configure what action to take when there is a port security violation (drop packets or put the port into protodown state) and add a timeout for the action to take effect. The default setting mode is to drop packets. {{%notice note%}} Port security supports layer 2 interfaces in trunk or access mode but **not** interfaces in a bond. @@ -22,13 +19,15 @@ To configure port security: {{< tabs "TabID22 ">}} {{< tab "NVUE Commands ">}} -To enable security on a port, run the `nv set interface port-security enabled` command: +To enable security on a port, run the `nv set interface port-security enable on` command: ``` -cumulus@switch:~$ nv set interface swp1 port-security enabled +cumulus@switch:~$ nv set interface swp1 port-security enable on cumulus@switch:~$ nv config apply ``` +You can disable port security on an interface with the `nv set interface port-security enable off` command. + To configure the maximum number of MAC addresses allowed to access the port, run the `nv set interface port-security mac-limit` command. You can specify a value between 1 and 512. The default value is 32. ``` @@ -38,44 +37,53 @@ cumulus@switch:~$ nv config apply To configure specific MAC addresses allowed to access the port, run the `nv set interface port-security static-mac` command. +You can configure a maximum of 450 static MAC addresses per interface. + ``` cumulus@switch:~$ nv set interface swp1 port-security static-mac 00:02:00:00:00:05 cumulus@switch:~$ nv set interface swp1 port-security static-mac 00:02:00:00:00:06 cumulus@switch:~$ nv config apply ``` -To enable sticky MAC, where the first learned MAC address on the port is the only MAC address allowed, run the `nv set interface port-security sticky-mac enabled` command. +To enable sticky MAC port security to track specific dynamically learned MAC addresses on a port, run the `nv set interface port-security sticky-mac enabled` command. + +Cumulus Linux maintains learned sticky MAC addresses through interface flaps and reboots if the source MAC address is still sending traffic; otherwise learned sticky MAC addresses age out according to the sticky MAC aging time. ``` cumulus@switch:~$ nv set interface swp1 port-security sticky-mac enabled cumulus@switch:~$ nv config apply ``` -To configure the time period after which the first learned MAC address ages out and no longer has access to the port, run the `nv set interface port-security sticky-timeout` command. You can specify a value between 0 and 3600 seconds. The default setting is 1800 seconds. +To enable sticky MAC aging, run the `nv set interface port-security sticky-aging enabled` command. ``` -cumulus@switch:~$ nv set interface swp1 port-security sticky-timeout 2000 +cumulus@switch:~$ nv set interface swp1 port-security sticky-ageing enabled cumulus@switch:~$ nv config apply ``` -To enable sticky MAC aging, run the `nv set interface port-security sticky-aging enabled` command. +To configure the time period after which learned sticky MAC addresses age out and no longer have access to the port, run the `nv set interface port-security sticky-timeout` command. You can specify a value between 0 and 60 minutes. The default setting is 30 minutes. ``` -cumulus@switch:~$ nv set interface swp1 port-security sticky-aging enable +cumulus@switch:~$ nv set interface swp1 port-security sticky-timeout 20 cumulus@switch:~$ nv config apply ``` -To configure the violation mode: `shutdown` to put a port into ADMIN down state or `restrict` to drop packets, run the run the `nv set interface port-security violation-mode shutdown` command. +To configure violation mode, either run the `nv set interface port-security violation-mode protodown` command to put a port into a protodown state or run the `nv set interface port-security violation-mode restrict` command to drop packets. ``` -cumulus@switch:~$ nv set interface swp1 port-security violation-mode shutdown +cumulus@switch:~$ nv set interface swp1 port-security violation-mode protodown cumulus@switch:~$ nv config apply ``` -To configure the number of seconds after which the violation mode times out, run the `nv set interface port-security violation-timeout` command. You can specify a value between 0 and 3600 seconds. The default value is 1800 seconds. +``` +cumulus@switch:~$ sudo ip link set swp2 protodown_reason portsecurity off +cumulus@switch:~$ sudo ip link set swp2 protodown off +``` + +To configure the number of seconds after which the violation mode times out, run the `nv set interface port-security violation-timeout` command. You can specify a value between 0 and 60 minutes. The default value is 30 minutes. ``` -cumulus@switch:~$ nv set interface swp1 port-security violation-timeout 3600 +cumulus@switch:~$ nv set interface swp1 port-security violation-timeout 60 cumulus@switch:~$ nv config apply ``` @@ -86,29 +94,72 @@ Add the configuration settings you want to use to the `/etc/cumulus/switchd.d/po |
Setting | Description| | --------| -----------| -| `interface..port_security.enable` | Enables and disables port security. 1 enables security on the port. 0 disables security on the port.| -| `interface..port_security.mac_limit` | Configures the maximum number of MAC addresses allowed to access the port. You can specify a number between 0 and 512. The default is 32.| +| `interface..port_security.enable` | Enables and disables port security. 1 enables security on the port. 0 disables security on the port. The default setting is 0.| +| `interface..port_security.mac_limit` | Configures the maximum number of MAC addresses allowed to access the port. You can specify a number between 0 and 512. The default value is 32.| | `interface..port_security.static_mac` | Configures the specific MAC addresses allowed to access the port. To specify multiple MAC addresses, separate each MAC address with a space.| -| `interface..port_security.sticky_mac` | Enables and disables sticky MAC. 1 enables sticky MAC, where the first learned MAC address on the port is the only MAC address allowed. 0 disables sticky MAC. | -| `interface..port_security.sticky_timeout` | The time period after which the first learned MAC address ages out and no longer has access to the port. The default aging timeout value is 30 minutes. You can specify a value between 0 and 60 minutes.| +| `interface..port_security.sticky_mac` | Enables and disables sticky MAC port security to track specific dynamically learned MAC addresses on a port. 1 enables sticky MAC. 0 disables sticky MAC.
Cumulus Linux maintains learned sticky MAC addresses through interface flaps and reboots if the source MAC address is still sending traffic; otherwise learned sticky MAC addresses age out according to the sticky MAC aging time.| +| `interface..port_security.sticky_timeout` | The time period after which learned sticky MAC addresses age out and no longer have access to the port. You can specify a value between 0 and 3600 seconds (60 minutes). The default aging timeout value is 1800 seconds (30 minutes). | | `interface..port_security.sticky_aging` | Enables and disables sticky MAC aging. 1 enables sticky MAC aging. 0 disables sticky MAC aging.| -| `interface..port_security.violation_mode` | Configures the violation mode: 0 (shutdown) puts a port into ADMIN down state. 1 (restrict) drops packets.| +| `interface..port_security.violation_mode` | Configures the violation mode: 0 (protodown) puts a port into a protodown state. 1 (restrict) drops packets. The default setting is 1.| | `interface..port_security.violation_timeout` | Configures the number of seconds after which the violation mode times out. You can specify a value between 0 and 3600 seconds. The default value is 1800 seconds.| The following shows an example `/etc/cumulus/switchd.d/port_security.conf` configuration file: ``` cumulus@switch:~$ sudo nano /etc/cumulus/switchd.d/port_security.conf +... +## Interface Port security interface.swp1.port_security.enable = 1 -interface.swp1.port_security.mac_limit = 32 -interface.swp1.port_security.static_mac = 00:02:00:00:00:05 00:02:00:00:00:06 +interface.swp1.port_security.mac_limit = 100 interface.swp1.port_security.sticky_mac = 1 interface.swp1.port_security.sticky_timeout = 2000 interface.swp1.port_security.sticky_aging = 1 interface.swp1.port_security.violation_mode = 0 interface.swp1.port_security.violation_timeout = 3600 -... +interface.swp1.port_security.static_mac = 00:02:00:00:00:05 00:02:00:00:00:06 ``` {{< /tab >}} {{< /tabs >}} + +## Clear the Protodown State + +If there is a port security violation and the port goes into a protodown state, you can clear the protodown state after you mitigate the MAC address causing the violation with the following commands: + +``` +cumulus@switch:~$ sudo ip link set swp1 protodown_reason portsecurity off +cumulus@switch:~$ sudo ip link set swp1 protodown off +``` + +## Troubleshooting + +To show port security configuration, run the `nv show interface port-security` command: + +``` +cumulus@switch:~$ nv show interface swp1 port-security + operational applied +----------------- ----------- -------- +enable on on +mac-limit 32 32 +sticky-mac disabled disabled +sticky-timeout 1800 1800 +sticky-ageing disabled disabled +violation-mode restrict restrict +violation-timeout 30 30 + +mac-addresses +================ + entry-id MAC address Type Status + -------- ----------------- ------- --------- + 1 00:01:02:03:04:05 + 2 00:02:00:00:00:ab Static + 3 00:02:00:00:00:05 Static + 4 00:02:00:00:01:05 Static + 5 00:02:00:00:01:06 Static + 6 00:02:01:00:01:06 Static + 7 01:02:01:00:01:06 Static + 8 00:02:00:00:00:11 Dynamic Installed +``` + +- To show port security static MAC address information, run the `nv show interface port-security static-mac` command. +- To show port security MAC address information, run the `nv show interface port-security mac-addresses` command. diff --git a/content/cumulus-linux-57/Layer-2/IGMP-and-MLD-Snooping.md b/content/cumulus-linux-57/Layer-2/IGMP-and-MLD-Snooping.md index 39a02cfa4a..0540945592 100644 --- a/content/cumulus-linux-57/Layer-2/IGMP-and-MLD-Snooping.md +++ b/content/cumulus-linux-57/Layer-2/IGMP-and-MLD-Snooping.md @@ -85,7 +85,7 @@ cumulus@switch:~$ sudo ifreload -a ## Optimized Multicast Flooding (OMF) -IGMP snooping restricts multicast forwarding only to the ports that receive IGMP report messages. If the ports do not receive IGMP reports, multicast traffic floods to all ports in the bridge domain (also know as unregistered multicast (URMC) traffic). To restrict this flooding to only mrouter ports, you can enable OMF. +IGMP snooping restricts multicast forwarding only to the ports that receive IGMP report messages. If the ports do not receive IGMP reports, multicast traffic floods to all ports in the bridge domain (also known as unregistered multicast (URMC) traffic). To restrict this flooding to only mrouter ports, you can enable OMF. To enable OMF: diff --git a/content/cumulus-linux-57/Layer-2/Link-Layer-Discovery-Protocol.md b/content/cumulus-linux-57/Layer-2/Link-Layer-Discovery-Protocol.md index 9ab94a15d7..54b3d6c3d6 100644 --- a/content/cumulus-linux-57/Layer-2/Link-Layer-Discovery-Protocol.md +++ b/content/cumulus-linux-57/Layer-2/Link-Layer-Discovery-Protocol.md @@ -94,9 +94,13 @@ cumulus@switch:~$ sudo lldpcli configure system interface pattern "" {{< /expand >}} -## Enable the SNMP Subagent +## SNMP Subagent -LLDP does not enable the [SNMP](## "Simple Network Management Protocol") subagent by default. To enable the SNMP subagent, edit the `/etc/default/lldpd` file and add the `-x` option: +The [SNMP](## "Simple Network Management Protocol") subagent allows SNMP queries to retrieve LLDP information from the `lldpd` service. + +If you enable SNMP with NVUE commands, NVUE enables the SNMP subagent automatically. To disable the SNMP subagent, disable SNMP with the NVUE `nv set service snmp-server enable off` command. + +If you use Linux commands to configure the switch, Cumulus Linux does not enable the SNMP subagent by default. To enable the SNMP subagent, edit the `/etc/default/lldpd` file and add the `-x` option: ``` cumulus@switch:~$ sudo nano /etc/default/lldpd @@ -120,7 +124,7 @@ cumulus@switch:~$ sudo systemctl restart lldpd ## Set LLDP Mode -By default, the `lldpd` service sends LLDP frames unless it detects a CDP peer, then it sends CDP frames. You can change this behaviour and configure the `lldpd` service to send only CDP frames or only LLDP frames. +By default, the `lldpd` service sends LLDP frames unless it detects a CDP peer, then it sends CDP frames. You can change this behavior and configure the `lldpd` service to send only CDP frames or only LLDP frames. {{%notice note%}} - You configure the `lldpd` service to send only CDP or only LLDP frames globally for all interfaces; you cannot configure these settings for specific interfaces. diff --git a/content/cumulus-linux-57/Layer-2/MAC-Address-Translation.md b/content/cumulus-linux-57/Layer-2/MAC-Address-Translation.md index a019ff91c6..316bf96c8e 100644 --- a/content/cumulus-linux-57/Layer-2/MAC-Address-Translation.md +++ b/content/cumulus-linux-57/Layer-2/MAC-Address-Translation.md @@ -49,7 +49,7 @@ cumulus@switch:~$ nv config apply  To create rules, use `cl-acltool`. -To add rules using cl-acltool, either edit an existing file in the `/etc/cumulus/acl/policy.d` directory and add rules under `[ebtables]` or create a new file in the `/etc/cumulus/acl/policy.d` directory and add rules under an `[ebtables]` section. For example: +To add rules using `cl-acltool`, either edit an existing file in the `/etc/cumulus/acl/policy.d` directory and add rules under `[ebtables]` or create a new file in the `/etc/cumulus/acl/policy.d` directory and add rules under an `[ebtables]` section. For example: ``` cumulus@switch:~$ sudo nano /etc/cumulus/acl/policy.d/60_mac.rules @@ -79,16 +79,59 @@ The following example matches Ethernet packets with destination MAC address 01:1 {{< /tab >}} {{< /tabs >}} -## Show MAC Address Translation Configuration +## Show MAC Address Translation Configuration and Statistics To show the current MAC address translation configuration: ``` cumulus@switch:~$ nv show acl + type Summary +----- ---- ------- +MACL1 mac rule: 1 +MACL2 mac rule: 1 ``` -To show information about a specific MAC address translation rule, run the `nv show acl `: command +To show information about a specific MAC address translation rule, run the `nv show acl --applied -o=json` command: ``` -cumulus@switch:~$ nv show acl MACL1 +cumulus@switch:~$ nv show acl MACL1 --applied -o=json +{ + "rule": { + "1": { + "action": { + "source-nat": { + "translate-ip": {}, + "translate-mac": "99:de:fc:32:11:01", + "translate-port": {} + } + }, + "match": { + "mac": { + "dest-mac-mask": "ff:ff:ff:ff:ff:ff", + "source-mac": "b8:ce:f6:3c:62:06", + "source-mac-mask": "ff:ff:ff:ff:ff:ff" + } + } + } + }, + "type": "mac" +} ``` + +To show statistics for MAC address translation, such as the number of packets that match the rules and the number of bytes in the matched packets, run the NVUE `nv show interface acl-statistics` command or the Linux `cl-acltool -L eb` command: + +``` +cumulus@switch:~$ nv show interface acl-statistics +Interface ACL Name Rule ID In Packets In Bytes Out Packets Out Bytes +--------- --------- ------- ---------- -------- ----------- --------- +swp2 macl_snat 10 14 1.13 KB +``` + +``` +cumulus@switch:~$ sudo cl-acltool -L eb +-s ec:d:9a:84:8b:82 -o swp2 --comment rule_id:10 -j snat --to-src 0:0:0:0:0:2 --snat-target ACCEPT, pcnt = 14 -- bcnt = 1162 +``` + +In the above example Linux command output: +- `pcnt` shows how many packets matched this rule (14 packets). +- `bcnt` shows the total number of bytes in the matched packets (1162 bytes). diff --git a/content/cumulus-linux-57/Layer-2/Multi-Chassis-Link-Aggregation-MLAG.md b/content/cumulus-linux-57/Layer-2/Multi-Chassis-Link-Aggregation-MLAG.md index d555d656ed..b2d26e5453 100644 --- a/content/cumulus-linux-57/Layer-2/Multi-Chassis-Link-Aggregation-MLAG.md +++ b/content/cumulus-linux-57/Layer-2/Multi-Chassis-Link-Aggregation-MLAG.md @@ -792,7 +792,7 @@ peer-priority 32768 Mlag Peer Priority peer-role secondary Mlag Peer Role ``` -Run the `net show mlag` command or the `clagctl` command to show the MLAG interface information: +Run the `net show clag` command or the `clagctl` command to show the MLAG interface information: ``` cumulus@leaf01:mgmt:~$ net show clag @@ -813,35 +813,29 @@ Our Interface Peer Interface CLAG Id Conflicts Proto-Dow ### Show All MLAG Settings -To see all MLAG settings, run the `clagctl params` command: - -``` -cumulus@leaf01:~$ clagctl params -clagVersion = 1.4.0 -clagDataVersion = 1.4.0 -clagCmdVersion = 1.1.0 -peerIp = linklocal -peerIf = peerlink.4094 -sysMac = 44:38:39:be:ef:aa -lacpPoll = 2 -currLacpPoll = 2 -peerConnect = 1 -cmdConnect = 1 -peerLinkPoll = 1 -switchdReadyTimeout = 120 -reloadTimer = 300 -periodicRun = 4 -priority = 32768 -quiet = False -debug = 0x0 -verbose = False -log = syslog -vm = True -peerPort = 5342 -peerTimeout = 20 -initDelay = 100 -sendTimeout = 30 -... +To see all MLAG settings, run the `nv show mlag` command: + +``` +cumulus@leaf01:~$ nv show mlag + operational applied +-------------- ------------------------- ---------- +enable on on +mac-address 44:38:39:be:ef:aa auto +peer-ip fe80::4ab0:2dff:fe52:1190 linklocal +priority 1000 1000 +init-delay 10 10 +debug off off +[backup] 10.10.10.2 10.10.10.2 +peer-priority 2000 +backup-active True +local-id 48:b0:2d:d1:e4:e1 +peer-id 48:b0:2d:52:11:90 +local-role primary +peer-role secondary +peer-interface peerlink.4094 +peer-alive True +backup-reason +anycast-ip 10.0.1.12 ``` ### View the MLAG Log File @@ -904,7 +898,7 @@ The following table shows the conflict types and actions that Cumulus Linux take | LACP partner MAC address | Interface | Protodown the MLAG bonds on the MLAG switch if there is an LACP partner MAC address mismatch or if there is a duplicate LACP partner MAC address. | | MLAG VLANs| Interface | Suspend the inconsistent VLANs on either MLAG peer if the VLANs are not part of the peer link or if there is mismatch of VLANs configured on the MLAG bonds between the MLAG peers. | | Peer link VLANs| Global | Suspend the inconsistent VLANs on either MLAG peer on all the dual-connected MLAG bonds and VXLAN interfaces. | -| MLAG protocol version | Global | The consistency check records an MLAG protocol version mismatch between the MLAG peers. Cumulus Linux does not take any distruptive action. | +| MLAG protocol version | Global | The consistency check records an MLAG protocol version mismatch between the MLAG peers. Cumulus Linux does not take any disruptive action. | | MLAG package version | Global| The consistency check records an MLAG package version mismatch between the MLAG peers. Cumulus Linux does not take any disruptive action.| You can also manually check for MLAG inconsistencies with the following commands: @@ -1070,7 +1064,7 @@ bridge-learning yes yes - {{< /tab >}} {{< /tabs >}} -The actions that Cumulus Linux takes when there is a conflict are distruptive. If you prefer, you can configure the switch to not take any action when there is a conflict. Edit the `/etc/network/interfaces` file to add the `clagd-args --gracefulConsistencyCheck FALSE` parameter in the peer link stanza. +The actions that Cumulus Linux takes when there is a conflict are disruptive. If you prefer, you can configure the switch to not take any action when there is a conflict. Edit the `/etc/network/interfaces` file to add the `clagd-args --gracefulConsistencyCheck FALSE` parameter in the peer link stanza. ``` cumulus@leaf01:~$ sudo nano /etc/network/interfaces @@ -1108,27 +1102,27 @@ NIC statistics: tx_queue_0_kicks: 195 ``` -You can also run the `net show counters` command. The number of dropped packets shows in the `RX_DRP` column. - -``` -cumulus@leaf01:mgmt:~$ net show counters - -Kernel Interface table -Iface MTU RX_OK RX_ERR RX_DRP RX_OVR TX_OK TX_ERR TX_DRP TX_OVR Flg -------------- ----- ------- -------- -------- -------- ------- -------- -------- -------- ----- -bond1 9216 0 0 0 0 542 0 0 0 BMmU -bond2 9216 0 0 0 0 542 0 0 0 BMmU -bridge 9216 0 0 0 0 17 0 0 0 BMRU -eth0 1500 5497 0 0 0 933 0 0 0 BMRU -lo 65536 1328 0 0 0 1328 0 0 0 LRU -mgmt 65536 790 0 0 0 0 0 33 0 OmRU -peerlink 9216 23626 0 520 0 23665 0 0 0 BMmRU -peerlink.4094 9216 8013 0 0 0 8017 0 0 0 BMRU -swp1 9216 5 0 0 0 553 0 0 0 BMsRU -swp2 9216 3 0 0 0 552 0 0 0 BMsRU -swp49 9216 11822 0 0 0 11852 0 0 0 BMsRU -swp50 9216 11804 0 0 0 11841 0 0 0 BMsRU -swp51 9216 0 0 0 0 292 0 0 0 BMRU +You can also run the `nv show interface counters` command. The number of dropped packets shows in the `RX_DRP` column. + +``` +cumulus@leaf01:mgmt:~$ nv show interface counters +Interface MTU RX_OK RX_ERR RX_DRP RX_OVR TX_OK TX_ERR TX_DRP TX_OVR Flg +-------------- ----- ----- ------ ------ ------ ----- ------ ------ ------ ----- +BLUE 65575 0 0 0 0 0 0 1 0 OmRU +RED 65575 0 0 0 0 0 0 1 0 OmRU +bond1 9000 0 0 0 0 1336 0 0 0 BMmRU +bond2 9000 0 0 0 0 1337 0 0 0 BMmRU +bond3 9000 0 0 0 0 1336 0 0 0 BMmRU +br_default 9216 69 0 0 0 191 0 0 0 BMRU +eth0 1500 6184 0 0 0 3384 0 0 0 BMRU +lo 65536 3835 0 0 0 3835 0 0 0 LRU +mgmt 65575 4098 0 0 0 0 0 13 0 OmRU +peerlink 9216 14604 0 0 0 14134 0 0 0 BMmRU +peerlink.4094 9216 9923 0 0 0 9423 0 0 0 BMRU +swp1 9000 5 0 5 0 1336 0 0 0 BMsRU +swp2 9000 5 0 5 0 1337 0 0 0 BMsRU +swp3 9000 5 0 5 0 1336 0 0 0 BMsRU +swp4 1500 ``` ### Peer Link Interfaces and the protodown State diff --git a/content/cumulus-linux-57/Layer-2/Spanning-Tree-and-Rapid-Spanning-Tree.md b/content/cumulus-linux-57/Layer-2/Spanning-Tree-and-Rapid-Spanning-Tree.md index f412517269..930065bdf6 100644 --- a/content/cumulus-linux-57/Layer-2/Spanning-Tree-and-Rapid-Spanning-Tree.md +++ b/content/cumulus-linux-57/Layer-2/Spanning-Tree-and-Rapid-Spanning-Tree.md @@ -744,11 +744,7 @@ To show the reason for the port protodown, run the `ip -p -j link show ` command. - -``` -cumulus@switch:~$ mstpctl clearbpduguardviolation bridge swp5 -``` +To recover from the `protodown` state, remove the protodown reason and protodown from the interface with the NVUE `nv action clear interface bridge domain stp bpduguardviolation` command or the Linux `mstpctl clearbpduguardviolation ` command. {{%notice note%}} Bringing up the disabled port does not correct the problem if the configuration on the connected end station does not resolve. @@ -897,6 +893,50 @@ cumulus@switch:~$ sudo ifreload -a {{< /tab >}} {{< /tabs >}} +### Force Version Setting + +By default, the switch sends RSTP type 2 BPDUs. You can configure the switch to send BPDU type 0 STP configuration BPDUs when you need to interoperate with other systems. + +{{< tabs "TabID904 ">}} +{{< tab "NVUE Commands ">}} + +``` +cumulus@switch:~$ nv set bridge domain br_default stp force-protocol-version stp +cumulus@switch:~$ nv config apply +``` + +To change the setting back to the default, run the `nv set bridge domain stp force-protocol-version rstp` command. + +{{< /tab >}} +{{< tab "Linux Commands ">}} + +Edit the bridge stanza in the `/etc/network/interfaces` file to add the `mstpctl-forcevers stp` line, then run the `ifreload -a` command. + +``` +cumulus@switch:~$ sudo nano /etc/network/interfaces +... +auto br_default +iface br_default + hwaddress 08:00:27:60:36:0b + bridge-vlan-aware yes + bridge-vids 10 + bridge-pvid 1 + bridge-stp yes + bridge-mcsnoop no + mstpctl-forcevers stp + mstpctl-pvrst-mode yes +... +``` + +``` +cumulus@switch:~$ sudo ifreload -a +``` + +To change the setting back to the default, change the line in the bridge stanza to `mstpctl-forcevers rstp`, then run the `ifreload -a` command. + +{{< /tab >}} +{{< /tabs >}} + ### Additional STP Settings The table below describes additional STP configuration parameters available in Cumulus Linux. You can set these optional parameters manually by editing the `/etc/network/interfaces` file. Cumulus Linux does not provide NVUE commands for these parameters. @@ -1076,6 +1116,8 @@ To show STP information for the ports in a bridge: ``` cumulus@switch:~$ nv show bridge domain br_default stp port + + Interface Info: swp1 -------------------------------------------------------------------------- enabled : yes admin-edge-port : no diff --git a/content/cumulus-linux-57/Layer-2/Virtual-Router-Redundancy-VRR.md b/content/cumulus-linux-57/Layer-2/Virtual-Router-Redundancy-VRR.md index 689d44ffcf..9bbada5f79 100644 --- a/content/cumulus-linux-57/Layer-2/Virtual-Router-Redundancy-VRR.md +++ b/content/cumulus-linux-57/Layer-2/Virtual-Router-Redundancy-VRR.md @@ -156,8 +156,8 @@ The following example commands configure both 10.1.10.1/24 and 10.1.11.1/24 on V {{< tab "NVUE Commands ">}} ``` -cumulus@switch:mgmt:~$ nv set interface vlan10 ip vrr adress 10.1.10.1/24 -cumulus@switch:mgmt:~$ nv set interface vlan10 ip vrr adress 10.1.11.1/24 +cumulus@switch:mgmt:~$ nv set interface vlan10 ip vrr address 10.1.10.1/24 +cumulus@switch:mgmt:~$ nv set interface vlan10 ip vrr address 10.1.11.1/24 cumulus@switch:mgmt:~$ nv config apply ``` @@ -194,35 +194,31 @@ Configure the links between the servers and the switches in *active-active* mode ### Troubleshooting -To verify the configuration on the switch, run the `net show interface` command: - -``` -cumulus@leaf01:mgmt:~$ net show interface -State Name Spd MTU Mode LLDP Summary ------ ------------- --- ----- ------------ ----------------------- ----------------------- -UP lo N/A 65536 Loopback IP: 127.0.0.1/8 - lo IP: 10.10.10.1/32 - lo IP: ::1/128 -UP eth0 1G 1500 Mgmt oob-mgmt-switch (swp10) Master: mgmt(UP) - eth0 IP: 192.168.200.11/24 -UP swp1 1G 9216 BondMember Master: bond1(UP) -UP swp2 1G 9216 BondMember Master: bond2(UP) -UP swp49 1G 9216 BondMember Master: peerlink(UP) -UP swp50 1G 9216 BondMember Master: peerlink(UP) -UP swp51 1G 9216 Default -UP bond1 1G 9216 802.3ad Master: br_default(UP) - bond1 Bond Members: swp1(UP) -UP bond2 1G 9216 802.3ad Master: br_default(UP) - bond2 Bond Members: swp2(UP) -UP br_default N/A 9216 Bridge/L2 -UP mgmt N/A 65536 VRF IP: 127.0.0.1/8 - mgmt IP: ::1/128 -UP peerlink 2G 9216 802.3ad Master: br_default(UP) - peerlink Bond Members: swp49(UP) - peerlink Bond Members: swp50(UP) -UP peerlink.4094 2G 9216 Default -UP vlan10 N/A 9216 Interface/L3 IP: 10.1.10.2/24 -UP vlan10-v0 N/A 9216 Interface/L3 IP: 10.1.10.1/24 +To verify the configuration on the switch, run the `nv show interface` command: + +``` +cumulus@leaf01:mgmt:~$ nv show interface +Interface State Speed MTU Type Remote Host Remote Port Summary +-------------- ----- ----- ----- -------- --------------- ----------- ---------------------------------------- +BLUE up 65575 vrf IP Address: 127.0.0.1/8 + IP Address: ::1/128 +RED up 65575 vrf IP Address: 127.0.0.1/8 + IP Address: ::1/128 +bond1 up 1G 9000 bond +bond2 up 1G 9000 bond +bond3 up 1G 9000 bond +br_default up 9216 bridge IP Address: fe80::4638:39ff:fe22:17a/64 +eth0 up 1G 1500 eth oob-mgmt-switch swp10 IP Address: 192.168.200.11/24 + IP Address: fe80::4638:39ff:fe22:17a/64 +lo up 65536 loopback IP Address: 10.0.1.12/32 + IP Address: 10.10.10.1/32 + IP Address: 127.0.0.1/8 + IP Address: ::1/128 +mgmt up 65575 vrf IP Address: 127.0.0.1/8 + IP Address: ::1/128 +peerlink up 2G 9216 bond +peerlink.4094 up 9216 sub IP Address: fe80::4ab0:2dff:fed1:e4e1/64 +swp1 up 1G 9000 swp ... ``` diff --git a/content/cumulus-linux-57/Layer-3/Address-Resolution-Protocol-ARP.md b/content/cumulus-linux-57/Layer-3/Address-Resolution-Protocol-ARP.md index 35b1deb72b..642d500fbd 100644 --- a/content/cumulus-linux-57/Layer-3/Address-Resolution-Protocol-ARP.md +++ b/content/cumulus-linux-57/Layer-3/Address-Resolution-Protocol-ARP.md @@ -153,7 +153,7 @@ cumulus@switch:~$ sudo ifreload -a {{< /tab >}} {{< /tabs >}} -If you are running two interfaces in the same broadcast domain (typically seen when using {{}}, which creates a `-v0` interface in the same broadcast domain), set `/proc/sys/net/ipv4/conf//medium_id` to *2* on both the base SVI interface and the -v0 interface so that only one of the two interfaces replies when getting an ARP request. This prevents the v0 interface from proxy replying on behalf of the SVI (and the SVI from proxy replying on behalf of the v0 interface). You can only prevent duplicate replies when the ARP request is for the SVI or the v0 interface directly. +If you are running two interfaces in the same broadcast domain (typically seen when using {{}}, which creates a `-v0` interface in the same broadcast domain), set `/proc/sys/net/ipv4/conf//medium_id` to *2* on both the base SVI interface and the -v0 interface. In this case only one of the two interfaces replies when getting an ARP request. This prevents the v0 interface from proxy replying on behalf of the SVI (and the SVI from proxy replying on behalf of the v0 interface). You can only prevent duplicate replies when the ARP request is for the SVI or the v0 interface directly. {{< tabs "TabID174 ">}} {{< tab "NVUE Commands ">}} @@ -281,3 +281,132 @@ garbage-collection-threshold Cumulus Linux does not interact directly with end systems as much as end systems interact with each another. Therefore, after ARP places a neighbor into a reachable state, if Cumulus Linux does not interact with the client again for a long enough period of time, the neighbor can move into a stale state. To keep neighbors in the reachable state, Cumulus Linux includes a background process (`/usr/bin/neighmgrd`). The background process tracks neighbors that move into a stale, delay, or probe state, and attempts to refresh their state before removing them from the Linux kernel and from hardware forwarding. The `neighmgrd` process adds a neighbor if the sender IP in the ARP packet is in one of the SVI's subnets (you can disable this check by setting `subnet_checks` to *0* in the `/etc/cumulus/neighmgr.conf` file). The ARP refresh timer defaults to 1080 seconds (18 minutes). + +## Add Static ARP Table Entries + +You can add static ARP table entries for easy management or as a security measure to prevent spoofing and other nefarious activities. + +To create a static ARP entry for an interface with an IPv4 address associated with a MAC address, run the `nv set interface neighbor ipv4 lladdr ` command. + +``` +cumulus@leaf01:mgmt:~$ nv set interface swp51 neighbor ipv4 10.5.5.51 lladdr 00:00:5E:00:53:51 +cumulus@leaf01:mgmt:~$ nv config apply +``` + +You can also set a flag to indicate that the neighbour is a router (`is-router`) or learned externally (`ext_learn`) and set the neighbor state (`delay`, `failed`, `incomplete`, `noarp`, `permanent`, `probe`, `reachable`, or `stale`). + +``` +cumulus@leaf01:mgmt:~$ nv set interface swp51 neighbor ipv4 10.5.5.51 lladdr 00:00:5E:00:53:51 flag is-router +cumulus@leaf01:mgmt:~$ nv set interface swp51 neighbor ipv4 10.5.5.51 lladdr 00:00:5E:00:53:51 state permanent +cumulus@leaf01:mgmt:~$ nv config apply +``` + +To delete an entry in the ARP table, run the `nv unset interface neighbor ipv4 ` command: + +``` +cumulus@leaf01:mgmt:~$ nv unset interface swp51 neighbor ipv4 10.5.5.51 +cumulus@leaf01:mgmt:~$ nv config apply +``` + +## Show the ARP Table + +To show all the entries in the IP neighbor table, run the `nv show interface neighbor` command or the Linux `ip neighbor` command: + +``` +cumulus@leaf01:mgmt:~$ nv show interface neighbor +Interface IP/IPV6 LLADR(MAC) State Flag +------------- ------------------------- ----------------- --------- ---------- +eth0 192.168.200.251 48:b0:2d:00:00:01 stale + 192.168.200.1 48:b0:2d:aa:8b:45 reachable + fe80::4ab0:2dff:fe00:1 48:b0:2d:00:00:01 reachable router +peerlink.4094 169.254.0.1 48:b0:2d:3f:69:d6 permanent + fe80::4ab0:2dff:fe3f:69d6 48:b0:2d:3f:69:d6 reachable router +swp51 169.254.0.1 48:b0:2d:a2:4c:79 permanent + fe80::4ab0:2dff:fea2:4c79 48:b0:2d:a2:4c:79 reachable router +swp52 169.254.0.1 48:b0:2d:48:f1:ae permanent + fe80::4ab0:2dff:fe48:f1ae 48:b0:2d:48:f1:ae reachable router +swp53 169.254.0.1 48:b0:2d:2d:de:93 permanent + fe80::4ab0:2dff:fe2d:de93 48:b0:2d:2d:de:93 reachable router +swp54 169.254.0.1 48:b0:2d:80:8c:21 permanent + fe80::4ab0:2dff:fe80:8c21 48:b0:2d:80:8c:21 reachable router +vlan10 10.1.10.3 44:38:39:22:01:78 permanent + 10.1.10.101 48:b0:2d:a1:3f:4b reachable + 10.1.10.104 48:b0:2d:1d:d7:e8 noarp |ext_learn + fe80::4ab0:2dff:fea1:3f4b 48:b0:2d:a1:3f:4b reachable + fe80::4ab0:2dff:fe1d:d7e8 48:b0:2d:1d:d7:e8 noarp |ext_learn + fe80::4638:39ff:fe22:178 44:38:39:22:01:78 permanent +vlan10-v0 10.1.10.101 48:b0:2d:a1:3f:4b stale + fe80::4ab0:2dff:fea1:3f4b 48:b0:2d:a1:3f:4b stale + fe80::4ab0:2dff:fe1d:d7e8 48:b0:2d:1d:d7:e8 stale +vlan20 10.1.20.105 48:b0:2d:75:bf:9e noarp |ext_learn + 10.1.20.102 48:b0:2d:00:e9:05 reachable + 10.1.20.3 44:38:39:22:01:78 permanent + fe80::4638:39ff:fe22:178 44:38:39:22:01:78 permanent + fe80::4ab0:2dff:fe75:bf9e 48:b0:2d:75:bf:9e noarp |ext_learn + fe80::4ab0:2dff:fe00:e905 48:b0:2d:00:e9:05 reachable +... +``` + +To show IPv4 entries only, run the Linux `ip -4 neighbor` command: + +``` +cumulus@leaf01:mgmt:~$ ip -4 neighbor +169.254.0.1 dev swp54 lladdr 48:b0:2d:80:8c:21 PERMANENT proto zebra +169.254.0.1 dev peerlink.4094 lladdr 48:b0:2d:3f:69:d6 PERMANENT proto zebra +10.10.10.3 dev vxlan48 lladdr 44:38:39:22:01:84 extern_learn NOARP proto zebra +10.10.10.64 dev vlan4024_l3 lladdr 44:38:39:22:01:7c extern_learn NOARP proto zebra +10.1.20.102 dev vlan20-v0 lladdr 48:b0:2d:00:e9:05 STALE +192.168.200.251 dev eth0 lladdr 48:b0:2d:00:00:01 STALE +10.10.10.4 dev vlan4024_l3 lladdr 44:38:39:22:01:8a extern_learn NOARP proto zebra +10.10.10.64 dev vlan4036_l3 lladdr 44:38:39:22:01:7c extern_learn NOARP proto zebra +169.254.0.1 dev swp53 lladdr 48:b0:2d:2d:de:93 PERMANENT proto zebra +10.10.10.4 dev vlan4036_l3 lladdr 44:38:39:22:01:8a extern_learn NOARP proto zebra +10.1.10.3 dev vlan10 lladdr 44:38:39:22:01:78 PERMANENT +169.254.0.1 dev swp52 lladdr 48:b0:2d:48:f1:ae PERMANENT proto zebra +10.10.10.2 dev vlan4024_l3 lladdr 44:38:39:22:01:78 extern_learn NOARP proto zebra +10.1.20.105 dev vlan20 lladdr 48:b0:2d:75:bf:9e extern_learn NOARP proto zebra +10.10.10.64 dev vxlan48 lladdr 44:38:39:22:01:7c extern_learn NOARP proto zebra +10.0.1.34 dev vxlan48 lladdr 44:38:39:be:ef:bb extern_learn NOARP proto zebra +10.10.10.2 dev vlan4036_l3 lladdr 44:38:39:22:01:78 extern_learn NOARP proto zebra +10.1.10.101 dev vlan10-v0 lladdr 48:b0:2d:a1:3f:4b STALE +10.1.10.101 dev vlan10 lladdr 48:b0:2d:a1:3f:4b REACHABLE +... +``` + +To show all table entries for a specific interface, run the `nv show interface neighbor` command: + +``` +cumulus@leaf01:mgmt:~$ nv show interface swp51 neighbor +ipv4 +========= + IPV4 LLADR(MAC) State Flag + ----------- ----------------- --------- ---- + 10.5.5.51 00:00:5e:00:53:51 permanent + 169.254.0.1 48:b0:2d:a2:4c:79 permanent +ipv6 +========= + IPV6 LLADR(MAC) State Flag + ------------------------- ----------------- --------- --------- + fe80::4ab0:2dff:fea2:4c79 48:b0:2d:a2:4c:79 reachable is-router +``` + +To show all IPv4 table entries for an interface, run the `nv show interface neighbor ipv4` command: + +``` +cumulus@leaf01:mgmt:~$ nv show interface swp1 neighbor ipv4 +IPV4 LLADR(MAC) State Flag +----------- ----------------- --------- ---- +10.188.52.1 00:00:5e:00:01:22 reachable +10.188.52.2 1c:34:da:e8:1d:c8 stale +``` + +To show table entries for an interface with a specific IPv4 address, run the `nv show interface neighbor ipv4 ` command. + +``` +cumulus@leaf01:mgmt:~$ nv show interface swp51 neighbor ipv4 169.254.0.1 +lladdr +========= + LLADR(MAC) State Flag + ----------------- --------- ---- + 48:b0:2d:a2:4c:79 permanent +``` diff --git a/content/cumulus-linux-57/Layer-3/Border-Gateway-Protocol-BGP/Basic-BGP-Configuration.md b/content/cumulus-linux-57/Layer-3/Border-Gateway-Protocol-BGP/Basic-BGP-Configuration.md index 0d038b27ee..9d7e7e6b4f 100644 --- a/content/cumulus-linux-57/Layer-3/Border-Gateway-Protocol-BGP/Basic-BGP-Configuration.md +++ b/content/cumulus-linux-57/Layer-3/Border-Gateway-Protocol-BGP/Basic-BGP-Configuration.md @@ -10,6 +10,10 @@ This section describes how to configure BGP using either BGP numbered or {{}} {{< tab "vtysh Commands ">}} @@ -1038,7 +1040,7 @@ BGP add-path RX enables BGP to receive multiple paths for the same prefix. A pat To view the existing capabilities, run the vtysh `show ip bgp neighbors` command. You can see the existing capabilities in the subsection *Add Path*, below *Neighbor capabilities.* -The following example output shows that BGP can sent and receive additional BGP paths, and that the BGP neighbor on swp51 supports both. +The following example output shows that BGP can send and receive additional BGP paths, and that the BGP neighbor on swp51 supports both. ``` cumulus@leaf01:~$ sudo vtysh @@ -1473,6 +1475,10 @@ router bgp 65101 You can configure the input and the output message queue limit globally for all peers. For both the input and output queue limit, you can set a value between 1 and 4294967295 messages. The default setting is 10000. +{{%notice note%}} +Only increase the input or output queue if you have enough memory to handle large queues of messages at the same time. +{{%/notice%}} + {{< tabs "1477 ">}} {{< tab "NVUE Commands ">}} @@ -1503,6 +1509,8 @@ leaf01# exit {{< /tab >}} {{< /tabs >}} +To show the input and output message queue configuration, run the `nv show router bgp queue-limit` command. + ## Route Reflectors [iBGP](## "internal BGP") rules state that BGP cannot send a route learned from an iBGP peer to another iBGP peer. In a data center spine and leaf network using iBGP, this prevents a spine from sending a route learned from a leaf to any other leaf. As a workaround, you can use a *route reflector*. When an iBGP speaker is a route reflector, it *can* send iBGP learned routes to other iBGP peers. diff --git a/content/cumulus-linux-57/Layer-3/FRRouting.md b/content/cumulus-linux-57/Layer-3/FRRouting.md index c32a53f02f..8925dcdd36 100644 --- a/content/cumulus-linux-57/Layer-3/FRRouting.md +++ b/content/cumulus-linux-57/Layer-3/FRRouting.md @@ -78,10 +78,9 @@ cumulus@switch:~$ sudo systemctl start frr.service ## Restore the Default Configuration {{%notice note%}} -The information in this section does not apply if you use NVUE to configure your switch. NVUE manages FRR daemons and configuration automatically. These instructions are only applicable for users managing FRR directly through linux flat file configurations. +The information in this section does not apply if you use NVUE to configure your switch. NVUE manages FRR daemons and configuration automatically. These instructions are only applicable if you manage FRR directly with linux flat file configurations. {{%/notice%}} - If you need to restore the FRR configuration to the default running configuration, delete the `frr.conf` file and restart the `frr` service. Back up `frr.conf` (or any configuration files you want to remove) before proceeding. @@ -94,7 +93,6 @@ Back up `frr.conf` (or any configuration files you want to remove) before procee cumulus@switch:~$ sudo rm /etc/frr/frr.conf ``` - 3. Restart FRR with this command: ``` diff --git a/content/cumulus-linux-57/Layer-3/Neighbor-Discovery-ND.md b/content/cumulus-linux-57/Layer-3/Neighbor-Discovery-ND.md index 9fec026f0b..1c2a61473e 100644 --- a/content/cumulus-linux-57/Layer-3/Neighbor-Discovery-ND.md +++ b/content/cumulus-linux-57/Layer-3/Neighbor-Discovery-ND.md @@ -469,9 +469,135 @@ cumulus@leaf01:mgmt:~$ nv set interface swp1 ip neighbor-discovery enable off cumulus@leaf01:mgmt:~$ nv config apply ``` +## Add Static IP Neighbor Table Entries + +You can add static IPv6 neighbor table entries for easy management or as a security measure to prevent spoofing and other nefarious activities. + +To create a static neighbor entry for an interface with an IPv6 address associated with a MAC address, run the `nv set interface neighbor ipv6 lladdr ` command. + +``` +cumulus@leaf01:mgmt:~$ nv set interface swp51 neighbor ipv6 fe80::4ab0:2dff:fea2:4c79 lladdr 00:00:5E:00:53:51 +cumulus@leaf01:mgmt:~$ nv config apply +``` + +You can also set a flag to indicate that the neighbour is a router (`is-router`) or learned externally (`ext_learn`) and set the neighbor state (`delay`, `failed`, `incomplete`, `noarp`, `permanent`, `probe`, `reachable`, or `stale`). + +``` +cumulus@leaf01:mgmt:~$ nv set interface swp51 neighbor ipv6 fe80::4ab0:2dff:fea2:4c79 lladdr 00:00:5E:00:53:51 flag is-router +cumulus@leaf01:mgmt:~$ nv set interface swp51 neighbor ipv6 fe80::4ab0:2dff:fea2:4c79 lladdr 00:00:5E:00:53:51 state permanent +cumulus@leaf01:mgmt:~$ nv config apply +``` + +To delete an entry in the IP neighbor table, run the `nv unset interface neighbor ipv6 ` command: + +``` +cumulus@leaf01:mgmt:~$ nv unset interface swp51 neighbor ipv6 fe80::4ab0:2dff:fea2:4c79 +cumulus@leaf01:mgmt:~$ nv config apply +``` + +## Show the IP Neighbor Table + +To show all the entries in the IP neighbor table, run the `nv show interface neighbor` command or the Linux `ip neighbor` command: + +``` +cumulus@leaf01:mgmt:~$ nv show interface neighbor +Interface IP/IPV6 LLADR(MAC) State Flag +------------- ------------------------- ----------------- --------- ---------- +eth0 192.168.200.251 48:b0:2d:00:00:01 stale + 192.168.200.1 48:b0:2d:aa:8b:45 reachable + fe80::4ab0:2dff:fe00:1 48:b0:2d:00:00:01 reachable router +peerlink.4094 169.254.0.1 48:b0:2d:3f:69:d6 permanent + fe80::4ab0:2dff:fe3f:69d6 48:b0:2d:3f:69:d6 reachable router +swp51 169.254.0.1 48:b0:2d:a2:4c:79 permanent + fe80::4ab0:2dff:fea2:4c79 48:b0:2d:a2:4c:79 reachable router +swp52 169.254.0.1 48:b0:2d:48:f1:ae permanent + fe80::4ab0:2dff:fe48:f1ae 48:b0:2d:48:f1:ae reachable router +swp53 169.254.0.1 48:b0:2d:2d:de:93 permanent + fe80::4ab0:2dff:fe2d:de93 48:b0:2d:2d:de:93 reachable router +swp54 169.254.0.1 48:b0:2d:80:8c:21 permanent + fe80::4ab0:2dff:fe80:8c21 48:b0:2d:80:8c:21 reachable router +vlan10 10.1.10.3 44:38:39:22:01:78 permanent + 10.1.10.101 48:b0:2d:a1:3f:4b reachable + 10.1.10.104 48:b0:2d:1d:d7:e8 noarp |ext_learn + fe80::4ab0:2dff:fea1:3f4b 48:b0:2d:a1:3f:4b reachable + fe80::4ab0:2dff:fe1d:d7e8 48:b0:2d:1d:d7:e8 noarp |ext_learn + fe80::4638:39ff:fe22:178 44:38:39:22:01:78 permanent +vlan10-v0 10.1.10.101 48:b0:2d:a1:3f:4b stale + fe80::4ab0:2dff:fea1:3f4b 48:b0:2d:a1:3f:4b stale + fe80::4ab0:2dff:fe1d:d7e8 48:b0:2d:1d:d7:e8 stale +vlan20 10.1.20.105 48:b0:2d:75:bf:9e noarp |ext_learn + 10.1.20.102 48:b0:2d:00:e9:05 reachable + 10.1.20.3 44:38:39:22:01:78 permanent + fe80::4638:39ff:fe22:178 44:38:39:22:01:78 permanent + fe80::4ab0:2dff:fe75:bf9e 48:b0:2d:75:bf:9e noarp |ext_learn + fe80::4ab0:2dff:fe00:e905 48:b0:2d:00:e9:05 reachable +... +``` + +To show IPv6 entries only, run the Linux `ip -6 neighbor` command: + +``` +cumulus@leaf01:mgmt:~$ +fe80::4ab0:2dff:fe4e:c76a dev vlan30 lladdr 48:b0:2d:4e:c7:6a extern_learn NOARP proto zebra +fe80::4ab0:2dff:fea1:3f4b dev vlan10 lladdr 48:b0:2d:a1:3f:4b REACHABLE +fe80::4ab0:2dff:fee9:d399 dev vlan30-v0 lladdr 48:b0:2d:e9:d3:99 STALE +fe80::4ab0:2dff:fe75:bf9e dev vlan20-v0 lladdr 48:b0:2d:75:bf:9e STALE +fe80::4638:39ff:fe22:178 dev vlan20 lladdr 44:38:39:22:01:78 PERMANENT +fe80::4ab0:2dff:fea2:4c79 dev swp51 lladdr 48:b0:2d:a2:4c:79 router REACHABLE +fe80::4ab0:2dff:fe00:1 dev eth0 lladdr 48:b0:2d:00:00:01 router REACHABLE +fe80::4ab0:2dff:fee9:d399 dev vlan30 lladdr 48:b0:2d:e9:d3:99 REACHABLE +fe80::4ab0:2dff:fe48:f1ae dev swp52 lladdr 48:b0:2d:48:f1:ae router REACHABLE +fe80::4ab0:2dff:fe1d:d7e8 dev vlan10 lladdr 48:b0:2d:1d:d7:e8 extern_learn NOARP proto zebra +fe80::4ab0:2dff:fea1:3f4b dev vlan10-v0 lladdr 48:b0:2d:a1:3f:4b STALE +fe80::4ab0:2dff:fe80:8c21 dev swp54 lladdr 48:b0:2d:80:8c:21 router REACHABLE +fe80::4ab0:2dff:fe75:bf9e dev vlan20 lladdr 48:b0:2d:75:bf:9e extern_learn NOARP proto zebra +fe80::4638:39ff:fe22:178 dev vlan4024_l3 lladdr 44:38:39:22:01:78 PERMANENT +fe80::4ab0:2dff:fe00:e905 dev vlan20-v0 lladdr 48:b0:2d:00:e9:05 STALE +fe80::4ab0:2dff:fe3f:69d6 dev peerlink.4094 lladdr 48:b0:2d:3f:69:d6 router REACHABLE +... +``` + +To show all table entries for a specific interface, run the `nv show interface neighbor` command: + +``` +cumulus@leaf01:mgmt:~$ nv show interface swp51 neighbor +ipv4 +========= + IPV4 LLADR(MAC) State Flag + ----------- ----------------- --------- ---- + 10.5.5.51 00:00:5e:00:53:51 permanent + 169.254.0.1 48:b0:2d:a2:4c:79 permanent +ipv6 +========= + IPV6 LLADR(MAC) State Flag + ------------------------- ----------------- --------- --------- + fe80::4ab0:2dff:fea2:4c79 48:b0:2d:a2:4c:79 reachable is-router +``` + +To show all IPv6 table entries for an interface, run the `nv show interface neighbor ipv6` command: + +``` +cumulus@leaf01:mgmt:~$ nv show interface swp1 neighbor ipv6 +IPV6 LLADR(MAC) State Flag +------------------------- ----------------- --------- --------- +fe80::1e34:daff:fe6c:dd8 1c:34:da:6c:0d:d8 stale +fe80::3e2c:30ff:fe4b:800 3c:2c:30:4b:08:00 reachable +``` + +To show table entries for an interface with a specific IPv6 address, run the `nv show interface neighbor ipv6 ` command: + +``` +cumulus@leaf01:mgmt:~$ nv show interface swp51 neighbor ipv6 fe80::4ab0:2dff:fea2:4c79 +lladdr +========= + LLADR(MAC) State Flag + ----------------- --------- ---- + 00:00:5E:00:53:51 permanent +``` + ## Troubleshooting -To show the ND settings for an interface, run the NVUE `nv show interface ip neighbor-discovery` command: +To show the ND configuration settings for an interface, run the NVUE `nv show interface ip neighbor-discovery` command: ``` cumulus@leaf01:mgmt:~$ nv show interface swp1 ip neighbor-discovery diff --git a/content/cumulus-linux-57/Layer-3/Network-Address-Translation-NAT.md b/content/cumulus-linux-57/Layer-3/Network-Address-Translation-NAT.md index c4fd5b3268..a8dff1e53a 100644 --- a/content/cumulus-linux-57/Layer-3/Network-Address-Translation-NAT.md +++ b/content/cumulus-linux-57/Layer-3/Network-Address-Translation-NAT.md @@ -42,68 +42,81 @@ Cumulus Linux also support MAC address translation, which operates on Ethernet p - For static **NAT**, create a rule that matches a source or destination IP address and translate the IP address to a public IP address. - For static **PAT**, create a rule that matches a source or destination IP address together with the layer 4 port and translate the IP address and port to a public IP address and port. You can include the outgoing or incoming interface. +{{%notice note%}} +NVUE commands require you configure an inbound or outbound interface for static NAT rules. However, rules you configure in a rules file in the `/etc/cumulus/acl/policy.d/` directory do not require an inbound or outbound interface. +{{%/notice%}} + {{< tabs "TabID44 ">}} {{< tab "NVUE Commands ">}} -The following rule matches TCP packets with source IP address 10.0.0.1 and translates the IP address to 172.30.58.80: +The following rule matches TCP packets with source IP address 10.0.0.1 coming in on interface swp51 and translates the IP address to 172.30.58.80: ``` -cumulus@switch:~$ nv set acl acl_1 type ipv4 rule 1 match ip protocol tcp -cumulus@switch:~$ nv set acl acl_1 type ipv4 rule 1 match ip source-ip 10.0.0.1 -cumulus@switch:~$ nv set acl acl_1 type ipv4 rule 1 action source-nat translate-ip 172.30.58.80 +cumulus@switch:~$ nv set acl acl_1 type ipv4 +cumulus@switch:~$ nv set acl acl_1 rule 1 match ip protocol tcp +cumulus@switch:~$ nv set acl acl_1 rule 1 match ip source-ip 10.0.0.1 +cumulus@switch:~$ nv set acl acl_1 rule 1 action source-nat translate-ip 172.30.58.80 +cumulus@switch:~$ nv set interface swp51 acl acl_1 inbound cumulus@switch:~$ nv config apply ``` -The following rule matches ICMP packets with destination IP address 172.30.58.80 on interface swp51 and translates the IP address to 10.0.0.1 +The following rule matches ICMP packets with destination IP address 172.30.58.80 coming in on interface swp51 and translates the IP address to 10.0.0.1 ``` -cumulus@switch:~$ nv set acl acl_1 type ipv4 rule 1 match ip protocol icmp -cumulus@switch:~$ nv set acl acl_1 type ipv4 rule 1 match ip dest-ip 172.30.58.80 -cumulus@switch:~$ nv set acl acl_1 type ipv4 rule 1 action dest-nat translate-ip 10.0.0.1 -cumulus@switch:~$ nv config apply -cumulus@switch:~$ nv set interface swp5 acl acl_1 inbound +cumulus@switch:~$ nv set acl acl_2 type ipv4 +cumulus@switch:~$ nv set acl acl_2 rule 1 match ip protocol icmp +cumulus@switch:~$ nv set acl acl_2 rule 1 match ip dest-ip 172.30.58.80 +cumulus@switch:~$ nv set acl acl_2 rule 1 action dest-nat translate-ip 10.0.0.1 +cumulus@switch:~$ nv set interface swp51 acl acl_2 inbound cumulus@switch:~$ nv config apply ``` -The following rule matches UDP packets with source IP address 10.0.0.1 and source port 5000, and translates the IP address to 172.30.58.80 and the port to 6000. +The following rule matches UDP packets with source IP address 10.0.0.1 and source port 5000 going out of swp6, and translates the IP address to 172.30.58.80 and the port to 6000. ``` -cumulus@switch:~$ nv set acl acl_1 type ipv4 rule 1 match ip protocol udp -cumulus@switch:~$ nv set acl acl_1 type ipv4 rule 1 match ip source-ip 10.0.0.1 -cumulus@switch:~$ nv set acl acl_1 type ipv4 rule 1 match ip source-port 5000 -cumulus@switch:~$ nv set acl acl_1 type ipv4 rule 1 action source-nat translate-ip 172.30.58.80 -cumulus@switch:~$ nv set acl acl_1 type ipv4 rule 1 action source-nat translate-port 6000 +cumulus@switch:~$ nv set acl acl_3 type ipv4 +cumulus@switch:~$ nv set acl acl_3 rule 1 match ip protocol udp +cumulus@switch:~$ nv set acl acl_3 rule 1 match ip source-ip 10.0.0.1 +cumulus@switch:~$ nv set acl acl_3 rule 1 match ip udp source-port 5000 +cumulus@switch:~$ nv set acl acl_3 rule 1 action source-nat translate-ip 172.30.58.80 +cumulus@switch:~$ nv set acl acl_3 rule 1 action source-nat translate-port 6000 +cumulus@switch:~$ nv set interface swp6 acl acl_3 outbound cumulus@switch:~$ nv config apply ``` -The following rule matches UDP packets with destination IP address 172.30.58.80 and destination port 6000 on interface swp51, and translates the IP address to 10.0.0.1 and the port to 5000. +The following rule matches UDP packets with destination IP address 172.30.58.80 and destination port 6000 coming in on interface swp51, and translates the IP address to 10.0.0.1 and the port to 5000. ``` -cumulus@switch:~$ nv set acl acl_1 type ipv4 rule 1 match ip protocol udp -cumulus@switch:~$ nv set acl acl_1 type ipv4 rule 1 match ip dest-ip 172.30.58.80 -cumulus@switch:~$ nv set acl acl_1 type ipv4 rule 1 match ip dest-port 6000 -cumulus@switch:~$ nv set acl acl_1 type ipv4 rule 1 action dest-nat translate-ip 10.0.0.1 -cumulus@switch:~$ nv set acl acl_1 type ipv4 rule 1 action dest-nat translate-port 5000 +cumulus@switch:~$ nv set acl acl_4 type ipv4 +cumulus@switch:~$ nv set acl acl_4 rule 1 match ip protocol udp +cumulus@switch:~$ nv set acl acl_4 rule 1 match ip dest-ip 172.30.58.80 +cumulus@switch:~$ nv set acl acl_4 rule 1 match ip udp dest-port 6000 +cumulus@switch:~$ nv set acl acl_4 rule 1 action dest-nat translate-ip 10.0.0.1 +cumulus@switch:~$ nv set acl acl_4 rule 1 action dest-nat translate-port 5000 +cumulus@switch:~$ nv set interface swp51 acl acl_4 inbound cumulus@switch:~$ nv config apply ``` - + {{< /tab >}} {{< tab "Linux Commands ">}} @@ -143,7 +156,7 @@ The following rule matches UDP packets with destination IP address 172.30.58.80 ``` -t nat -A PREROUTING -d 172.30.58.80 -p udp --dport 6000 --in-interface swp51 -j DNAT --to-destination 10.0.0.1:5000 ``` - + {{%notice note%}} When you configure a static SNAT rule for outgoing traffic, you must also configure a static DNAT rule for the reverse traffic so that traffic goes in both directions. {{%/notice%}} +{{< /tab >}} +{{< /tabs >}} + ### Delete a Static NAT Rule To delete a static NAT rule: @@ -169,17 +182,17 @@ To delete a static NAT rule: {{< tabs "TabID141 ">}} {{< tab "NVUE Commands ">}} +Run the `nv unset acl ` command. + ``` -cumulus@switch:~$ nv unset acl acl_1 type ipv4 rule 1 match ip protocol udp -cumulus@switch:~$ nv unset acl acl_1 type ipv4 rule 1 match ip dest-ip 172.30.58.80 -cumulus@switch:~$ nv unset acl acl_1 type ipv4 rule 1 match ip dest-port 6000 +cumulus@switch:~$ nv unset acl acl_1 cumulus@switch:~$ nv config apply ``` {{< /tab >}} {{< tab "Linux Commands ">}} -Remove the rule from the policy file in the `/etc/cumulus/acl/policy.d` directory, then run the `sudo cl-acltool -i command`. +Remove the rule from the policy file in the `/etc/cumulus/acl/policy.d` directory, then run the `sudo cl-acltool -i command`. {{< /tab >}} {{< /tabs >}} @@ -230,7 +243,7 @@ You can customize the following dynamic NAT settings. |
Setting | Description | | ------- | ----------- | | `age-poll-interval` | The period of inactivity (in minutes) before Cumulus Linux releases a NAT entry from the translation table. You can set a value between 1 and 1440. The default value is 5.| -| `translate-table-size` | The maximum number of dynamic `snat` and `dnat` entries in the translation table. You can set a value between 512 and 8192. The default value is 1024.| +| `translate-table-size` | The maximum number of dynamic `snat` and `dnat` entries in the translation table. You can set a value between 1024 and 8192. The default value is 1024.| | `rule-table-size` | The maximum number of rules allowed. You can set a value between 64 and 1024. The default value is 64.| The following example sets: @@ -266,67 +279,77 @@ After you change any of the dynamic NAT configuration options, restart `switchd` ### Configure Dynamic NAT -For dynamic **NAT**, create a rule that matches a IP address in CIDR notation and translates the address to a public IP address or IP address range. +For dynamic **NAT**, create a rule that matches an IP address in CIDR notation and translates the address to a public IP address or IP address range. For dynamic **PAT**, create a rule that matches an IP address in CIDR notation and translates the address to a public IP address and port range or an IP address range and port range. You can also match on an IP address in CIDR notation and port. -For an NVIDIA switch with Spectrum-2 or later, you can include the outgoing or incoming interface in the rule. See the examples below. +{{%notice note%}} +NVUE commands require you configure an inbound or outbound interface for dynamic NAT rules. However, rules you configure in a rules file in the `/etc/cumulus/acl/policy.d/` directory do not require an inbound or outbound interface. +{{%/notice%}} {{< tabs "TabID227 ">}} {{< tab "NVUE Commands ">}} **Example Rules** -The following rule matches TCP packets with source IP address in the range 10.0.0.0/24 on outbound interface swp5 and translates the address dynamically to an IP address in the range 172.30.58.0-172.30.58.80. +The following rule matches TCP packets with source IP address in the range 10.0.0.0/24 going out of swp5 and translates the address dynamically to an IP address in the range 172.30.58.0-172.30.58.80. ``` -cumulus@switch:~$ nv set acl acl_1 type ipv4 rule 1 match ip protocol tcp -cumulus@switch:~$ nv set acl acl_1 type ipv4 rule 1 match ip source-ip 10.0.0.0/24 -cumulus@switch:~$ nv set acl acl_1 type ipv4 rule 1 action source-nat translate-ip 172.30.58.0 to 172.30.58.80 -cumulus@switch:~$ nv config apply +cumulus@switch:~$ nv set acl acl_1 type ipv4 +cumulus@switch:~$ nv set acl acl_1 rule 1 match ip protocol tcp +cumulus@switch:~$ nv set acl acl_1 rule 1 match ip source-ip 10.0.0.0/24 +cumulus@switch:~$ nv set acl acl_1 rule 1 action source-nat translate-ip 172.30.58.0 to 172.30.58.80 cumulus@switch:~$ nv set interface swp5 acl acl_1 outbound cumulus@switch:~$ nv config apply ``` -The following rule matches UDP packets with source IP address in the range 10.0.0.0/24 and translates the addresses dynamically to IP address 172.30.58.80 with layer 4 ports in the range 1024-1200: +The following rule matches UDP packets with source IP address in the range 10.0.0.0/24 going out of swp5 and translates the addresses dynamically to IP address 172.30.58.80 with layer 4 ports in the range 1024-1200: ``` -cumulus@switch:~$ nv set acl acl_1 type ipv4 rule 1 match ip protocol udp -cumulus@switch:~$ nv set acl acl_1 type ipv4 rule 1 match ip source-ip 10.0.0.0/24 -cumulus@switch:~$ nv set acl acl_1 type ipv4 rule 1 action source-nat translate-ip 172.30.58.80 -cumulus@switch:~$ nv set acl acl_1 type ipv4 rule 1 action source-nat translate-port 1024-1200 +cumulus@switch:~$ nv set acl acl_2 type ipv4 +cumulus@switch:~$ nv set acl acl_2 rule 1 match ip protocol udp +cumulus@switch:~$ nv set acl acl_2 rule 1 match ip source-ip 10.0.0.0/24 +cumulus@switch:~$ nv set acl acl_2 rule 1 action source-nat translate-ip 172.30.58.80 +cumulus@switch:~$ nv set acl acl_2 rule 1 action source-nat translate-port 1024-1200 +cumulus@switch:~$ nv set interface swp5 acl acl_2 outbound cumulus@switch:~$ nv config apply ``` -The following rule matches UDP packets with source IP address in the range 10.0.0.0/24 on source port 5000 and translates the addresses dynamically to IP address 172.30.58.80 with layer 4 ports in the range 1024-1200: +The following rule matches UDP packets with source IP address in the range 10.0.0.0/24 on source port 5000 coming in on swp6 and translates the addresses dynamically to IP address 172.30.58.80 with layer 4 ports in the range 1024-1200: ``` -cumulus@switch:~$ nv set acl acl_1 type ipv4 rule 1 match ip protocol udp -cumulus@switch:~$ nv set acl acl_1 type ipv4 rule 1 match ip source-ip 10.0.0.0/24 -cumulus@switch:~$ nv set acl acl_1 type ipv4 rule 1 match ip source-port 5000 -cumulus@switch:~$ nv set acl acl_1 type ipv4 rule 1 action source-nat translate-ip 172.30.58.80 -cumulus@switch:~$ nv set acl acl_1 type ipv4 rule 1 action source-nat translate-port 1024-1200 +cumulus@switch:~$ nv set acl acl_3 type ipv4 +cumulus@switch:~$ nv set acl acl_3 rule 1 match ip protocol udp +cumulus@switch:~$ nv set acl acl_3 rule 1 match ip source-ip 10.0.0.0/24 +cumulus@switch:~$ nv set acl acl_3 rule 1 match ip udp source-port 5000 +cumulus@switch:~$ nv set acl acl_3 rule 1 action source-nat translate-ip 172.30.58.80 +cumulus@switch:~$ nv set acl acl_3 rule 1 action source-nat translate-port 1024-1200 +cumulus@switch:~$ nv set interface swp6 acl acl_3 inbound cumulus@switch:~$ nv config apply ``` -The following rule matches TCP packets with destination IP address in the range 10.1.0.0/24 and translates the address dynamically to IP address range 172.30.58.0-172.30.58.80 with layer 4 ports in the range 1024-1200: +The following rule matches TCP packets with destination IP address in the range 10.1.0.0/24 coming in on swp6 and translates the address dynamically to IP address range 172.30.58.0-172.30.58.80 with layer 4 ports in the range 1024-1200: ``` -cumulus@switch:~$ nv set acl acl_1 type ipv4 rule 1 match ip protocol tcp -cumulus@switch:~$ nv set acl acl_1 type ipv4 rule 1 match ip dest-ip 10.1.0.0/24 -cumulus@switch:~$ nv set acl acl_1 type ipv4 rule 1 action dest-nat translate-ip 172.30.58.0 to 172.30.58.80 -cumulus@switch:~$ nv set acl acl_1 type ipv4 rule 1 action dest-nat translate-port 1024-1200 +cumulus@switch:~$ nv set acl acl_4 type ipv4 +cumulus@switch:~$ nv set acl acl_4 rule 1 match ip protocol tcp +cumulus@switch:~$ nv set acl acl_4 rule 1 match ip dest-ip 10.1.0.0/24 +cumulus@switch:~$ nv set acl acl_4 rule 1 action dest-nat translate-ip 172.30.58.0 to 172.30.58.80 +cumulus@switch:~$ nv set acl acl_4 rule 1 action dest-nat translate-port 1024-1200 +cumulus@switch:~$ nv set interface swp6 acl acl_4 inbound cumulus@switch:~$ nv config apply ``` -The following rule matches ICMP packets with source IP address in the range 10.0.0.0/24 and destination IP address in the range 10.1.0.0/24. The rule translates the address dynamically to IP address range 172.30.58.0-172.30.58.80 with layer 4 ports in the range 1024-1200: +The following rule matches ICMP packets with source IP address in the range 10.0.0.0/24 and destination IP address in the range 10.1.0.0/24 coming in on swp6. The rule translates the address dynamically to IP address range 172.30.58.0-172.30.58.80 with layer 4 ports in the range 1024-1200: ``` -cumulus@switch:~$ nv set acl acl_1 type ipv4 rule 1 match ip protocol icmp -cumulus@switch:~$ nv set acl acl_1 type ipv4 rule 1 match ip source-ip 10.0.0.0/24 -cumulus@switch:~$ nv set acl acl_1 type ipv4 rule 1 match ip dest-ip 10.1.0.0/24 -cumulus@switch:~$ nv set acl acl_1 type ipv4 rule 1 action source-nat translate-ip 172.30.58.0 to 172.30.58.80 -cumulus@switch:~$ nv set acl acl_1 type ipv4 rule 1 action source-nat translate-port 1024-1200 +cumulus@switch:~$ nv set acl acl_5 type ipv4 +cumulus@switch:~$ nv set acl acl_5 rule 1 match ip protocol icmp +cumulus@switch:~$ nv set acl acl_5 rule 1 match ip source-ip 10.0.0.0/24 +cumulus@switch:~$ nv set acl acl_5 rule 1 match ip dest-ip 10.1.0.0/24 +cumulus@switch:~$ nv set acl acl_5 rule 1 action source-nat translate-ip 172.30.58.0 to 172.30.58.80 +cumulus@switch:~$ nv set acl acl_5 rule 1 action source-nat translate-port 1024-1200 +cumulus@switch:~$ nv set interface swp6 acl acl_5 inbound cumulus@switch:~$ nv config apply ``` @@ -384,10 +407,10 @@ To delete a dynamic NAT rule: {{< tabs "TabID311 ">}} {{< tab "NVUE Commands ">}} +Run the `nv unset acl ` command: + ``` -cumulus@switch:~$ nv unset acl acl_1 type ipv4 rule 1 match ip protocol tcp -cumulus@switch:~$ nv unset acl acl_1 type ipv4 rule 1 match ip source-ip 10.0.0.0/24 -cumulus@switch:~$ nv unset acl acl_1 type ipv4 rule 1 action source-nat translate-ip 172.30.58.0 to 172.30.58.80 +cumulus@switch:~$ nv unset acl acl_1 cumulus@switch:~$ nv config apply ``` @@ -401,15 +424,43 @@ Remove the rule from the policy file in the `/etc/cumulus/acl/policy.d` director ## Show Configured NAT Rules -To see the NAT rules configured on the switch, run the `sudo iptables -t nat -v -L` or the -`sudo cl-acltool -L ip -v` command. For example: +To see the NAT rules configured on the switch, run the NVUE `nv show acl --applied -o=json` command, or the Linux `sudo iptables -t nat -v -L` or `sudo cl-acltool -L ip -v` commands. For example: + +``` +cumulus@switch:~$ nv show acl acl_5 --applied -o=json +{ + "rule": { + "1": { + "action": { + "source-nat": { + "translate-ip": { + "172.30.58.0": { + "to": "172.30.58.80" + } + }, + "translate-port": { + "1024-1200": {} + } + } + }, + "match": { + "ip": { + "dest-ip": "10.1.0.0/24", + "protocol": "icmp", + "source-ip": "10.0.0.0/24" + } + } + } + }, + "type": "ipv4" +} +``` ``` cumulus@switch:~$ sudo iptables -t nat -v -L -n ... -Chain POSTROUTING (policy ACCEPT 27 packets, 3249 bytes) - pkts bytes target prot opt in out source destination - 0 0 SNAT tcp -- any any 10.0.0.1 anywhere to:172.30.58.80 + pkts bytes target prot opt in out source destination + 0 0 SNAT icmp -- * swp6 10.0.0.0/24 10.1.0.0/24 /* rule_id:1,acl_name:acl_5,dir:outbound,interface_id:swp6 */ to:172.30.58.0-172.30.58.80:1024-1200 ``` ## Show Conntrack Flows diff --git a/content/cumulus-linux-57/Layer-3/OSPF/Open-Shortest-Path-First-v2-OSPFv2.md b/content/cumulus-linux-57/Layer-3/OSPF/Open-Shortest-Path-First-v2-OSPFv2.md index ba7eb85477..0e979eff63 100644 --- a/content/cumulus-linux-57/Layer-3/OSPF/Open-Shortest-Path-First-v2-OSPFv2.md +++ b/content/cumulus-linux-57/Layer-3/OSPF/Open-Shortest-Path-First-v2-OSPFv2.md @@ -10,6 +10,10 @@ This topic describes OSPFv2, which is a link-state routing protocol for IPv4. Fo You can configure [OSPF](## "Open Shortest Path First") using either numbered interfaces or unnumbered interfaces. +{{%notice warning%}} +When you enable or disable OSPF, the FRR service restarts, which might impact traffic. +{{%/notice%}} + ### OSPFv2 Numbered To configure OSPF using numbered interfaces, you specify the router ID, IP subnet prefix, and area address. You must put all the interfaces on the switch with an IP address that matches the network subnet into the specified area. OSPF attempts to discover other OSPF routers on those interfaces. Cumulus Linux adds all matching interface network addresses to a type-1 [LSA](## "Link-State Advertisement") and advertises to discovered neighbors for proper reachability. diff --git a/content/cumulus-linux-57/Layer-3/OSPF/Open-Shortest-Path-First-v3-OSPFv3.md b/content/cumulus-linux-57/Layer-3/OSPF/Open-Shortest-Path-First-v3-OSPFv3.md index 6157ad1c40..759581d283 100644 --- a/content/cumulus-linux-57/Layer-3/OSPF/Open-Shortest-Path-First-v3-OSPFv3.md +++ b/content/cumulus-linux-57/Layer-3/OSPF/Open-Shortest-Path-First-v3-OSPFv3.md @@ -14,6 +14,10 @@ IETF has defined extensions to OSPFv3 to support multiple address families (both You can configure [OSPF](## "Open Shortest Path First") using either numbered interfaces or unnumbered interfaces. +{{%notice warning%}} +When you enable or disable OSPF, the FRR service restarts, which might impact traffic. +{{%/notice%}} + {{%notice note%}} NVUE commands are not supported for OSPFv3. {{%/notice%}} diff --git a/content/cumulus-linux-57/Layer-3/Protocol-Independent-Multicast-PIM.md b/content/cumulus-linux-57/Layer-3/Protocol-Independent-Multicast-PIM.md index b7da7bc42d..b86660a2ef 100644 --- a/content/cumulus-linux-57/Layer-3/Protocol-Independent-Multicast-PIM.md +++ b/content/cumulus-linux-57/Layer-3/Protocol-Independent-Multicast-PIM.md @@ -17,6 +17,10 @@ PIM-SM has three configuration options: Cumulus Linux supports ASM and SSM only. +{{%notice note%}} +IGMPv3 works only with SSM multicast group ranges. +{{%/notice%}} + For additional information on PIM-SM, refer to {{}}. For a brief description of how PIM works, refer to [PIM Overview]({{}}). ## Example PIM Topology @@ -40,6 +44,10 @@ To configure PIM: [SSM](## "Source Specific Multicast") uses prefix lists to configure a receiver to only allow traffic to a multicast address from a single source. This removes the need for an RP because the receiver must know the source before accepting traffic. To enable SSM, you only need to enable PIM and IGMPv3 on the interfaces. +{{%notice warning%}} +When you enable or disable PIM, the FRR service restarts, which might impact traffic. +{{%/notice%}} + These example commands configure leaf01, leaf02 and spine01 as shown in the topology example above. {{< tabs "TabID44 ">}} @@ -53,7 +61,7 @@ cumulus@leaf01:~$ nv set router pim enable on cumulus@leaf01:~$ nv set interface vlan10 router pim cumulus@leaf01:~$ nv set interface vlan10 ip igmp cumulus@leaf01:~$ nv set interface swp51 router pim -cumulus@leaf01:~$ nv set vrf default router pim address-family ipv4-unicast rp 10.10.10.101 +cumulus@leaf01:~$ nv set vrf default router pim address-family ipv4 rp 10.10.10.101 cumulus@leaf01:~$ nv config apply ``` @@ -65,7 +73,7 @@ cumulus@leaf02:~$ nv set router pim enable on cumulus@leaf02:~$ nv set interface vlan20 router pim cumulus@leaf02:~$ nv set interface vlan20 ip igmp cumulus@leaf02:~$ nv set interface swp51 router pim -cumulus@leaf02:~$ nv set vrf default router pim address-family ipv4-unicast rp 10.10.10.101 +cumulus@leaf02:~$ nv set vrf default router pim address-family ipv4 rp 10.10.10.101 cumulus@leaf02:~$ nv config apply ``` @@ -76,7 +84,7 @@ cumulus@leaf02:~$ nv config apply cumulus@spine01:~$ nv set router pim enable on cumulus@spine01:~$ nv set interface swp1 router pim cumulus@spine01:~$ nv set interface swp2 router pim -cumulus@spine01:~$ nv set vrf default router pim address-family ipv4-unicast rp 10.10.10.101 +cumulus@spine01:~$ nv set vrf default router pim address-family ipv4 rp 10.10.10.101 cumulus@spine01:~$ nv config apply ``` @@ -227,8 +235,8 @@ The above commands configure the switch to send all multicast traffic to RP 10.1 {{< tab "NVUE Commands ">}} ``` -cumulus@leaf01:~$ nv set vrf default router pim address-family ipv4-unicast rp 10.10.10.101 group-range 224.10.0.0/16 -cumulus@leaf01:~$ nv set vrf default router pim address-family ipv4-unicast rp 10.10.10.102 group-range 224.10.2.0/24 +cumulus@leaf01:~$ nv set vrf default router pim address-family ipv4 rp 10.10.10.101 group-range 224.10.0.0/16 +cumulus@leaf01:~$ nv set vrf default router pim address-family ipv4 rp 10.10.10.102 group-range 224.10.2.0/24 ``` {{< /tab >}} @@ -258,8 +266,8 @@ cumulus@leaf01:~$ nv set router policy prefix-list MCAST1 rule 1 match 224.10.0. cumulus@leaf01:~$ nv set router policy prefix-list MCAST2 rule 1 action permit cumulus@leaf01:~$ nv set router policy prefix-list MCAST2 rule 1 match 224.10.2.0/24 cumulus@leaf01:~$ nv config apply -cumulus@leaf01:~$ nv set vrf default router pim address-family ipv4-unicast rp 10.10.10.101 prefix-list MCAST1 -cumulus@leaf01:~$ nv set vrf default router pim address-family ipv4-unicast rp 10.10.10.102 prefix-list MCAST2 +cumulus@leaf01:~$ nv set vrf default router pim address-family ipv4 rp 10.10.10.101 prefix-list MCAST1 +cumulus@leaf01:~$ nv set vrf default router pim address-family ipv4 rp 10.10.10.102 prefix-list MCAST2 cumulus@leaf01:~$ nv config apply ``` @@ -311,8 +319,8 @@ cumulus@switch:~$ nv set router policy prefix-list SPTrange rule 1 match 235.0.0 cumulus@switch:~$ nv set router policy prefix-list SPTrange rule 1 action permit cumulus@switch:~$ nv set router policy prefix-list SPTrange rule 2 match 238.0.0.0/8 max-prefix-len 32 cumulus@switch:~$ nv set router policy prefix-list SPTrange rule 2 action permit -cumulus@switch:~$ nv set vrf default router pim address-family ipv4-unicast spt-switchover prefix-list SPTrange -cumulus@switch:~$ nv set vrf default router pim address-family ipv4-unicast spt-switchover action infinity +cumulus@switch:~$ nv set vrf default router pim address-family ipv4 spt-switchover prefix-list SPTrange +cumulus@switch:~$ nv set vrf default router pim address-family ipv4 spt-switchover action infinity cumulus@switch:~$ nv config apply ``` @@ -368,7 +376,7 @@ cumulus@switch:~$ nv set router policy prefix-list MyCustomSSMrange rule 10 acti Apply the custom prefix list: ``` -cumulus@switch:~$ nv set vrf default router pim address-family ipv4-unicast ssm-prefix-list MyCustomSSMrange +cumulus@switch:~$ nv set vrf default router pim address-family ipv4 ssm-prefix-list MyCustomSSMrange cumulus@switch:~$ nv config apply ``` @@ -539,7 +547,7 @@ The following steps configure a Cumulus switch to use MSDP: 2. On every multicast switch, configure the group to RP mapping using the anycast address: ``` - cumulus@switch:$ nv set vrf default router pim address-family ipv4-unicast rp 10.100.100.100 group-range 224.0.0.0/4 + cumulus@switch:$ nv set vrf default router pim address-family ipv4 rp 10.100.100.100 group-range 224.0.0.0/4 cumulus@switch:$ nv config apply ``` @@ -858,18 +866,18 @@ Cumulus Linux provides the following PIM timers: | `hello-interval` | The interval in seconds at which the PIM router sends hello messages to discover PIM neighbors and maintain PIM neighbor relationships. You can specify a value between 1 and 180. The default setting is 30 seconds. With vtysh, you set the hello interval for a specific PIM enabled interface. With NVUE, you can set the hello interval globally for all PIM enabled interfaces or for a specific PIM enabled interface. | | `holdtime` | The number of seconds during which the neighbor must be in a reachable state. `auto` (the default setting) uses three and half times the `hello-interval`. You can specify a value between 1 and 180. With vtysh, you set the holdtime for a specific PIM enabled interface. With NVUE, you can set the holdtime globally for all PIM enabled interfaces or for a specific PIM enabled interface.| | `join-prune-interval` | The interval in seconds at which a PIM router sends join/prune messages to its upstream neighbors for a state update. You can specify a value between 60 and 600. The default setting is 60 seconds. You set the `join-prune-interval` globally for all PIM enabled interfaces. NVUE also provides the option of setting the `join-prune-interval` for a specific VRF.| -| `keep-alive` | The timeout value for the S,G stream in seconds. You can specify a value between 31 and 60000. The default setting is 210 seconds. You can set the `keep-alive` timer globally or all PIM enabled interfaces or for a specific VRF.| -| `register-suppress` | The number of seconds during which to stop sending register messages to the RP. You can specify a value between 5 and 60000. The default setting is 60 seconds. You can set the `keep-alive` timer globally for all PIM enabled interfaces or for a specific VRF. | -| `rp-keep-alive` | NVUE only. The timeout value for the RP in seconds. You can specify a value between 31 and 60000. The default setting is 185 seconds. You set the `register-suppress-time` timer globally for all PIM enabled interfacesor for a specific VRF.| +| `keepalive` | The timeout value for the S,G stream in seconds. You can specify a value between 31 and 60000. The default setting is 210 seconds. You can set the `keepalive` timer globally or all PIM enabled interfaces or for a specific VRF.
In vtysh, the timer is `keep-alive`. | +| `register-suppress` | The number of seconds during which to stop sending register messages to the RP. You can specify a value between 5 and 60000. The default setting is 60 seconds. You can set the `keepalive` timer globally for all PIM enabled interfaces or for a specific VRF. | +| `rp-keepalive` | NVUE only. The timeout value for the RP in seconds. You can specify a value between 31 and 60000. The default setting is 185 seconds. You set the `register-suppress-time` timer globally for all PIM enabled interfacesor for a specific VRF.
In vtysh, the timer is `rp-keep-alive`.| {{< tabs "TabID1037 ">}} {{< tab "NVUE Commands ">}} -The following example commands set the `join-prune-interval` to 100 seconds, the `keep-alive` timer to 10000 seconds, and the `register-suppress` time to 20000 seconds globally for all PIM enabled interfaces: +The following example commands set the `join-prune-interval` to 100 seconds, the `keepalive` timer to 10000 seconds, and the `register-suppress` time to 20000 seconds globally for all PIM enabled interfaces: ``` cumulus@switch:~$ nv set router pim timers join-prune-interval 100 -cumulus@switch:~$ nv set router pim timers keep-alive 10000 +cumulus@switch:~$ nv set router pim timers keepalive 10000 cumulus@switch:~$ nv set router pim timers register-suppress 20000 cumulus@switch:~$ nv config apply ``` @@ -881,10 +889,10 @@ cumulus@switch:~$ nv set interface swp51 router pim timers hello-interval 60 cumulus@switch:~$ nv config apply ``` -The following example commands set the `rp-keep-alive` to 10000 for VRF RED: +The following example commands set the `rp-keepalive` to 10000 for VRF RED: ``` -cumulus@switch:~$ nv set vrf RED router pim timers rp-keep-alive 10000 +cumulus@switch:~$ nv set vrf RED router pim timers rp-keepalive 10000 cumulus@switch:~$ nv config apply ``` @@ -1635,7 +1643,7 @@ cumulus@leaf01:~$ nv set interface lo router pim cumulus@leaf01:~$ nv set interface swp51 router pim cumulus@leaf01:~$ nv set interface vlan10 router pim cumulus@leaf01:~$ nv set interface vlan10 ip igmp -cumulus@leaf01:~$ nv set vrf default router pim address-family ipv4-unicast rp 10.10.10.101 +cumulus@leaf01:~$ nv set vrf default router pim address-family ipv4 rp 10.10.10.101 cumulus@leaf01:~$ nv config apply ``` @@ -1659,7 +1667,7 @@ cumulus@leaf02:~$ nv set interface lo router pim cumulus@leaf02:~$ nv set interface swp51 router pim cumulus@leaf02:~$ nv set interface vlan20 router pim cumulus@leaf02:~$ nv set interface vlan20 ip igmp -cumulus@leaf02:~$ nv set vrf default router pim address-family ipv4-unicast rp 10.10.10.101 +cumulus@leaf02:~$ nv set vrf default router pim address-family ipv4 rp 10.10.10.101 cumulus@leaf02:~$ nv config apply ``` @@ -1677,7 +1685,7 @@ cumulus@spine01:~$ nv set vrf default router bgp address-family ipv4-unicast net cumulus@spine01:~$ nv set interface lo router pim cumulus@spine01:~$ nv set interface swp1 router pim cumulus@spine01:~$ nv set interface swp2 router pim -cumulus@spine01:~$ nv set vrf default router pim address-family ipv4-unicast rp 10.10.10.101 +cumulus@spine01:~$ nv set vrf default router pim address-family ipv4 rp 10.10.10.101 cumulus@spine01:~$ nv config apply ``` diff --git a/content/cumulus-linux-57/Layer-3/Routing/BGP-Weighted-Equal-Cost-Multipath.md b/content/cumulus-linux-57/Layer-3/Routing/BGP-Weighted-Equal-Cost-Multipath.md index bc976d261d..7fc2946ac0 100644 --- a/content/cumulus-linux-57/Layer-3/Routing/BGP-Weighted-Equal-Cost-Multipath.md +++ b/content/cumulus-linux-57/Layer-3/Routing/BGP-Weighted-Equal-Cost-Multipath.md @@ -302,15 +302,40 @@ switch# exit {{< /tab >}} {{< /tabs >}} + +## Weight Normalization + +The NVIDIA Spectrum switch supports weight programming for ECMP by repeating each individual path, which consumes resources. To reduce hardware utilization of ECMP resources, you can enable weight normalization. + +To enable weight normalization: + +``` +cumulus@leaf01:mgmt:~$ nv set system forwarding ecmp-weight-normalisation mode enabled +cumulus@leaf01:mgmt:~$ nv config apply +``` + +To disable weight normalization, run the `nv set system forwarding ecmp-weight-normalisation mode disabled` command. + +You can also adjust the maximum number of hardware entries for weighted ECMP by running the `nv set system forwarding ecmp-weight-normalisation max-hw-weight` command. You can specify a value between 10 and 255. The default value is 32. + +``` +cumulus@leaf01:mgmt:~$ nv set system forwarding ecmp-weight-normalisation max-hw-weight 100 +cumulus@leaf01:mgmt:~$ nv config apply +``` + +{{%notice note%}} +Exercise caution when adjusting the maximum number of hardware entries. Configuring the setting too low consumes more resources but provides less weight granularity. Configuring the setting too high consumes fewer resources but provides more weight granularity. +{{%/notice%}} + ## BGP W-ECMP with Adaptive Routing Cumulus Linux supports BGP W-ECMP with adaptive routing for high-performance Ethernet topologies, where you use adaptive routing for optimal and efficient traffic distribution. You do not need to perform any additional configuration other than the configuration specified {{}} - NVIDIA recommends using W-ECMP with adaptive routing on networks that have an equal number of links connecting the spine and leaf switches and where the port speed for the links is the same across all the switches. -- Cumulus Linux supports a maximum of 48 adaptive routing enabled ports in a single ECMP group. - Both adaptive routing eligible traffic and non adaptive routing eligible traffic goes over the same ECMP group, which adjusts according to the W-ECMP weight. Non adaptive routing traffic continues to follow the hash-based traffic distribution between the updated list of next hops. + ## Troubleshooting To show the extended community in a received or local route, run the vtysh `show bgp` command or the `net show bgp` command. diff --git a/content/cumulus-linux-57/Layer-3/Routing/Equal-Cost-Multipath-Load-Sharing.md b/content/cumulus-linux-57/Layer-3/Routing/Equal-Cost-Multipath-Load-Sharing.md index 7b3d53cac6..f13c78ab44 100644 --- a/content/cumulus-linux-57/Layer-3/Routing/Equal-Cost-Multipath-Load-Sharing.md +++ b/content/cumulus-linux-57/Layer-3/Routing/Equal-Cost-Multipath-Load-Sharing.md @@ -510,7 +510,7 @@ The benefits of using adaptive routing include: With adaptive routing, the switch forwards packets to the less loaded path on a per packet basis to best utilize the fabric resources and avoid congestion. The change decision for port selection is set to one microsecond; you cannot change it. Cumulus Linux supports adaptive routing with: -- Switches with the Spectrum-4 ASIC. +- Switches with the Spectrum-4 ASIC at 400G and 200G speeds. - {{}} unicast traffic. - VXLAN-encapsulated RoCE traffic. - Layer 3 interfaces. @@ -565,14 +565,10 @@ interface.swp52.adaptive_routing.link_util_thresh = 70 ... ``` -{{}} the `switchd` service: - -{{}} - - -To disable adaptive routing, set the `adaptive_routing.enable` parameter to `FALSE` in the `/etc/cumulus/switchd.d/adaptive_routing.conf` file. +Restart `switchd` with the `sudo systemctl restart switchd.service` command. -To disable adaptive routing on a specific port, set the `interface..adaptive_routing.enable` parameter to `FALSE` in the `/etc/cumulus/switchd.d/adaptive_routing.conf` file. +- To disable adaptive routing, set the `adaptive_routing.enable` parameter to `FALSE` in the `/etc/cumulus/switchd.d/adaptive_routing.conf` file. +- To disable adaptive routing on a specific port, set the `interface..adaptive_routing.enable` parameter to `FALSE` in the `/etc/cumulus/switchd.d/adaptive_routing.conf` file. {{< /tab >}} {{< /tabs >}} @@ -640,7 +636,7 @@ Reload `switchd` with the `sudo systemctl reload switchd.service` command. {{%notice note%}} If you modify the `adaptive_routing.ecmp_size` parameter in the custom profile, then revert to the default profile for the switch, you must restart `switchd`. {{%/notice%}} - +--> ### Link Utilization Link utilization, when crossing a threshold, is one of the parameters in the adaptive routing decision. The default link utilization threshold percentage on an interface is 70. You can change the percentage to a value between 1 and 100. @@ -648,7 +644,7 @@ Link utilization, when crossing a threshold, is one of the parameters in the ada Link utilization is off by default; you must enable the global link utilization setting to use the link utilization thresholds set on adaptive routing interfaces. You cannot enable or disable link utilization per interface. {{%notice note%}} -In Cumulus Linux 5.5 and earlier, link utilization is on by default. If you configured link utilization in a previous release, be sure to enable link utilization after you upgrade to Cumulus Linux 5.6. +In Cumulus Linux 5.5 and earlier, link utilization is on by default. If you configured link utilization in a previous release, be sure to enable link utilization after you upgrade to Cumulus Linux 5.7. {{%/notice%}} {{< tabs "TabID624 ">}} @@ -767,7 +763,7 @@ Reload `switchd` with the `sudo systemctl reload switchd.service` command. {{< /tab >}} {{< /tabs >}} ---> + ### Show Adaptive Routing Settings To show adaptive routing settings, run the `nv show router adaptive-routing` command: diff --git a/content/cumulus-linux-57/Layer-3/Routing/Policy-based-Routing.md b/content/cumulus-linux-57/Layer-3/Routing/Policy-based-Routing.md index 34db12a91c..c8066724de 100644 --- a/content/cumulus-linux-57/Layer-3/Routing/Policy-based-Routing.md +++ b/content/cumulus-linux-57/Layer-3/Routing/Policy-based-Routing.md @@ -28,13 +28,17 @@ A PBR policy contains one or more policy maps. Each policy map: - To match on a source and destination address, a policy map can contain both match source and match destination IP rules. - A set rule determines the PBR next hop for the policy. -To use PBR in Cumulus linux, you define a PBR policy and apply it to the ingress interface (the interface must already have an IP address assigned). Cumulus Linux matches traffic against the match rules in sequential order and forwards the traffic according to the set rule in the first match. Traffic that does not match any rule passes on to the normal destination based routing mechanism. +To use PBR in Cumulus Linux, you define a PBR policy and apply it to the ingress interface (the interface must already have an IP address assigned). Cumulus Linux matches traffic against the match rules in sequential order and forwards the traffic according to the set rule in the first match. Traffic that does not match any rule passes on to the normal destination based routing mechanism. To configure a PBR policy: {{< tabs "TabID35 ">}} {{< tab "NVUE Commands ">}} +{{%notice warning%}} +When you configure PBR with NVUE commands, NVUE enables the `pbrd` service and restarts the FRR service; An FRR service restart might impact traffic. +{{%/notice%}} + 1. Configure the policy map. The example commands below configure a policy map called `map1` with rule number 1 that matches on destination address 10.1.2.0/24 and source address 10.1.4.1/24. diff --git a/content/cumulus-linux-57/Layer-3/Routing/Route-Filtering-and-Redistribution.md b/content/cumulus-linux-57/Layer-3/Routing/Route-Filtering-and-Redistribution.md index d04ab79c6a..18ef2a6f1c 100644 --- a/content/cumulus-linux-57/Layer-3/Routing/Route-Filtering-and-Redistribution.md +++ b/content/cumulus-linux-57/Layer-3/Routing/Route-Filtering-and-Redistribution.md @@ -305,7 +305,7 @@ The `source-protocol` match statement is only supported in {{}} ``` -cumulus@switch:~$ nv set vrf default router bgp address-family ipv4-unicast route-redistribute ospf +cumulus@switch:~$ nv set vrf default router bgp address-family ipv4-unicast redistribute ospf cumulus@switch:~$ nv config apply ``` @@ -515,7 +515,7 @@ To redistribute all directly connected networks, use the `redistribute connected {{< tab "NVUE Commands ">}} ``` -cumulus@switch:~$ nv set vrf default router bgp address-family ipv4-unicast route-redistribute connected +cumulus@switch:~$ nv set vrf default router bgp address-family ipv4-unicast redistribute connected cumulus@switch:~$ nv config apply ``` diff --git a/content/cumulus-linux-57/Layer-3/Routing/Supported-Route-Table-Entries.md b/content/cumulus-linux-57/Layer-3/Routing/Supported-Route-Table-Entries.md index 16f3d1310b..8ab07d482f 100644 --- a/content/cumulus-linux-57/Layer-3/Routing/Supported-Route-Table-Entries.md +++ b/content/cumulus-linux-57/Layer-3/Routing/Supported-Route-Table-Entries.md @@ -23,7 +23,7 @@ Cumulus Linux provides several generalized profiles, described below. These prof The following tables list the number of MAC addresses, layer 3 neighbors, and LPM routes validated for each forwarding table profile. If you do not specify any profiles as described below, the switch uses the *default* values. {{%notice note%}} -The values in the following tables reflect results from testing, which can differ from published manufacturer specifications. +The values provided in the profiles below are the maximum values that Cumulus Linux software allocates; the theoretical hardware limits might be higher. These limits refer to values that NVIDIA checks as part of the unidimensional scale validation. If you try to achieve maximum scalability with multiple features enabled, results might differ from the values listed in this guide. {{%/notice%}} ### Spectrum 1 @@ -45,7 +45,6 @@ The values in the following tables reflect results from testing, which can diffe | default | 50k | 41k (IPv4) and 20k (IPv6) | 82k (IPv4), 74k (IPv6-long), 1K (IPv4-Mcast)| | l2-heavy | 115k | 74k (IPv4) and 37k (IPv6) | 16k (IPv4), 24k (IPv6-long), 1K (IPv4-Mcast)| | l2-heavy-1 | 239k | 16k (IPv4) and 12k (IPv6) | 16k (IPv4), 16k (IPv6-long), 1K (IPv4-Mcast)| -| l2-heavy-v4-lpm | 125k | 1k (IPv4) and 128 (IPv6) | 65k (IPv4), 512 (IPv6-long), 0 (IPv4-Mcast)| | l2-heavy-3 | 107k | 90k (IPv4) and 80k (IPv6) | 25k (IPv4), 10k (IPv6-long), 1K (IPv4-Mcast) | | v4-lpm-heavy | 16k | 41k (IPv4) and 24k (IPv6) | 124k (IPv4), 24k (IPv6-long), 1K (IPv4-Mcast)| | v4-lpm-heavy-1 | 16k | 16k (IPv4) and 4k (IPv6) | 256k (IPv4), 8k (IPv6-long), 1K (IPv4-Mcast)| @@ -55,6 +54,7 @@ The values in the following tables reflect results from testing, which can diffe | ipmc-heavy | 57k | 41k (IPv4) and 20k (IPv6) | 82K (IPv4), 66K (IPv6-long), 8K (IPv4-Mcast) | | ipmc-max | 41K | 41k (IPv4) and 20k (IPv6) | 74K (IPv4), 66K (IPv6-long), 15K (IPv4-Mcast)| + The IPv6 number corresponds to the /64 IPv6 prefix. The /128 IPv6 prefix number is half of the /64 IPv6 prefix number. {{%notice note%}} @@ -98,7 +98,7 @@ cumulus@switch:~$ sudo cat /etc/cumulus/datapath/traffic.conf forwarding_table.profile = l2-heavy ``` -After you specify a different profile, {{%link url="Configuring-switchd#restart-switchd" text="restart `switchd`"%}} for the change to take effect. +After you specify a different profile, restart `switchd` with the `sudo systemctl restart switchd.service` command. {{< /tab >}} {{< /tabs >}} diff --git a/content/cumulus-linux-57/Layer-3/Virtual-Router-Redundancy-Protocol-VRRP.md b/content/cumulus-linux-57/Layer-3/Virtual-Router-Redundancy-Protocol-VRRP.md index f604410812..79f1642da3 100644 --- a/content/cumulus-linux-57/Layer-3/Virtual-Router-Redundancy-Protocol-VRRP.md +++ b/content/cumulus-linux-57/Layer-3/Virtual-Router-Redundancy-Protocol-VRRP.md @@ -51,6 +51,10 @@ The parent interface must use a primary address as the source address on VRRP ad {{< tabs "TabID448 ">}} {{< tab "NVUE Commands ">}} +{{%notice warning%}} +When you configure VRRP with NVUE commands, NVUE enables the `vrrpd` service and restarts the FRR service; An FRR service restart might impact traffic. +{{%/notice%}} + {{< tabs "TabID504 ">}} {{< tab "spine01 ">}} diff --git a/content/cumulus-linux-57/Monitoring-and-Troubleshooting/ASIC-Monitoring.md b/content/cumulus-linux-57/Monitoring-and-Troubleshooting/ASIC-Monitoring.md index a6fd31e5a8..b493be1e42 100644 --- a/content/cumulus-linux-57/Monitoring-and-Troubleshooting/ASIC-Monitoring.md +++ b/content/cumulus-linux-57/Monitoring-and-Troubleshooting/ASIC-Monitoring.md @@ -6,18 +6,27 @@ toc: 3 --- Cumulus Linux provides an ASIC monitoring tool that collects and distributes data about the state of the ASIC. The monitoring tool polls for data at specific intervals and takes certain actions so that you can identify and respond to problems, such as: -- Microbursts that result in longer packet latency -- Packet buffer congestion that might lead to packet drops -- Network problems with a particular switch, port, or traffic class +- Microbursts that result in longer packet latency. +- Packet buffer congestion that might lead to packet drops. +- Network problems with a particular switch, port, or traffic class. -Cumulus Linux provides several histograms: -- The *egress queue length* histogram provides information about egress buffer utilization over time. -- The *ingress queue lengths* histogram provides information about ingress buffer utilization over time. -- The *counter* histogram provides information about bandwidth utilization for a port over time. +Cumulus Linux provides: +- The *egress queue length* histogram, which shows information about egress buffer utilization over time. +- The *ingress queue lengths* histogram, which shows information about ingress buffer utilization over time. +- The *counter* histogram, which shows information about bandwidth utilization for a port over time. +- Packet drops due to errors (Linux only). + +{{%notice note%}} +Cumulus Linux supports: +- The egress queue length histogram on Spectrum 1 and later. +- The ingress queue length histogram on Spectrum-2 and later. +- The counter histogram (transmitted packet, transmitted byte, received packet, received byte, and CRC counters) on Spectrum-2 and later. +- The counter histogram (layer 1 received byte counters and layer 1 transmitted byte counters) on Spectrum-4 only. +{{%/notice%}} ## Histogram Collection Example -The NVIDIA Spectrum ASIC provides a mechanism to measure and report egress queue lengths in histograms (a graphical representation of data, which it divides into intervals or bins). Each queue reports through a histogram with 10 bins, where each bin represents a range of queue lengths. +The NVIDIA Spectrum ASIC provides a mechanism to measure and report ingress and egress queue lengths, and counters in histograms (a graphical representation of data, which it divides into intervals or bins). Each queue reports through a histogram with 10 bins, where each bin represents a range of queue lengths. You configure the histogram with a minimum size boundary (Min) and a histogram size. You then derive the maximum size boundary (Max) by adding the minimum size boundary and the histogram size. @@ -62,7 +71,7 @@ To enable ASIC monitoring: {{< tab "NVUE Commands ">}} ``` -cumulus@switch:~$ nv set service telemetry enable +cumulus@switch:~$ nv set service telemetry enable on cumulus@switch:~$ nv config apply ``` @@ -82,21 +91,31 @@ Restarting the `asic-monitor` service does not disrupt traffic or require you to Histogram settings include the type of data you want to collect, the ports you want the histogram to monitor, the sampling time of the histogram, the histogram size, and the minimum boundary size for the histogram. - The ingress queue length histogram can monitor a specific priority group for a port or range of ports. -- The egress queue length histogram can monitor a specific traffic class for a port or range of ports. -- The counter histogram can monitor transmitted packets or bytes, or received packets or bytes for a port or range of ports. +- The egress queue length histogram can monitor a specific traffic class for a port or range of ports. Traffic class 0 through 7 is for unicast traffic and traffic class 8 through 15 is for multicast traffic. +- The counter histogram can monitor the following counter types: + - Received packet counters (`rx-packet`) + - Transmitted packet counters (`tx-packet`) + - Received byte counters (`rx-byte`) + - Transmitted byte counters (`tx-byte`) + - CRC counters (`crc`) + - Layer 1 received byte counters (`l1-rx-byte`). The byte count includes layer 1[IPG](## "Interpacket Gap") bytes. + - Layer 1 transmitted byte counters (`l1-tx-byte`). The byte count includes layer 1[IPG](## "Interpacket Gap") bytes. +- You can enable up to two counter histogram counter types per physical interface. The counter histogram does not support bonds or virtual interfaces. - The value for the minimum boundary size must be a multiple of 96. Adding this number to the size of the histogram produces the maximum boundary size. These values represent the range of queue lengths per bin. The default minimum boundary size is 960 bytes. - The default value for the sampling time is 1024 nanoseconds. + {{< tabs "TabID81 ">}} {{< tab "NVUE Commands ">}} The histogram type can be `egress-buffer`, `ingress-buffer`, or `counter`. -To monitor all ports, run the nv `set service telemetry histogram ` command. To specify a port or range of ports, run the `nv set interface telemetry histogram ` command. +- To change global histogram settings, run the `nv set service telemetry histogram ` command. +- To enable histograms on interfaces or to change interface level settings, run the `nv set interface telemetry histogram ` command. {{< tabs "TabID93 ">}} {{< tab "Egress Queue Length Examples ">}} -The following example configures the egress queue length histogram and sets the minimum boundary size to 960, the histogram size to 12288, and the sampling interval to 1024. The histogram collects data every second for all traffic classes on all ports: +The following example configures the egress queue length histogram and sets the minimum boundary size to 960, the histogram size to 12288, and the sampling interval to 1024. These settings apply to interfaces that have the `egress-buffer` histogram enabled and do not have different values configured for these settings at the interface level: ``` cumulus@switch:~$ nv set service telemetry histogram egress-buffer bin-min-boundary 960 @@ -105,62 +124,56 @@ cumulus@switch:~$ nv set service telemetry histogram egress-buffer sample-interv cumulus@switch:~$ nv config apply ``` -The following example configures the egress queue length histogram and sets the minimum boundary to 960 bytes, the histogram size to 12288 bytes, and the sampling interval to 1024 nanoseconds. The histogram collects data every second for traffic class 0 on swp1 through swp8, and for traffic class 1 on swp9 through swp16. +The following example enables the egress queue length histogram for traffic class 0 on swp1 through swp8 with the globally applied minimum boundary, histogram size, and sample interval. The example also enables the egress queue length histogram for traffic class 1 on swp9 through swp16 and sets the minimum boundary to 768 bytes, the histogram size to 9600 bytes, and the sampling interval to 2048 nanoseconds. ``` -cumulus@switch:~$ nv set service telemetry enable -cumulus@switch:~$ nv set interface swp1-swp8 telemetry histogram egress-buffer traffic-class 0 bin-min-boundary 960 -cumulus@switch:~$ nv set interface swp1-swp8 telemetry histogram egress-buffer traffic-class 0 histogram-size 12288 -cumulus@switch:~$ nv set interface swp1-swp8 telemetry histogram egress-buffer traffic-class 0 sample-interval 1024 -cumulus@switch:~$ nv set interface swp9-swp16 telemetry histogram egress-buffer traffic-class 1 bin-min-boundary 960 -cumulus@switch:~$ nv set interface swp9-swp16 telemetry histogram egress-buffer traffic-class 1 histogram-size 12288 -cumulus@switch:~$ nv set interface swp9-swp16 telemetry histogram egress-buffer traffic-class 1 sample-interval 1024 +cumulus@switch:~$ nv set service telemetry enable on +cumulus@switch:~$ nv set interface swp1-8 telemetry histogram egress-buffer traffic-class 0 +cumulus@switch:~$ nv set interface swp9-16 telemetry histogram egress-buffer traffic-class 1 bin-min-boundary 768 +cumulus@switch:~$ nv set interface swp9-16 telemetry histogram egress-buffer traffic-class 1 histogram-size 9600 +cumulus@switch:~$ nv set interface swp9-16 telemetry histogram egress-buffer traffic-class 1 sample-interval 2048 cumulus@switch:~$ nv config apply ``` {{< /tab >}} {{< tab "Ingress Queue Length Examples ">}} -The following example configures the ingress queue length histogram and sets the minimum boundary size to 960 bytes, the histogram size to 12288 bytes, and the sampling interval to 1024 nanoseconds. The histogram collects data every second for all priority groups on all ports. +The following example configures the ingress queue length histogram and sets the minimum boundary size to 960 bytes, the histogram size to 12288 bytes, and the sampling interval to 1024 nanoseconds. These settings apply to interfaces that have the `ingress-buffer` histogram enabled and do not have different values configured for these settings at the interface level: ``` -cumulus@switch:~$ nv set service telemetry enable +cumulus@switch:~$ nv set service telemetry enable on cumulus@switch:~$ nv set service telemetry histogram ingress-buffer bin-min-boundary 960 cumulus@switch:~$ nv set service telemetry histogram ingress-buffer histogram-size 12288 cumulus@switch:~$ nv set service telemetry histogram ingress-buffer sample-interval 1024 cumulus@switch:~$ nv config apply ``` -The following example configures the ingress queue length histogram and sets the minimum boundary size to 960, the histogram size to 12288, and the sampling interval to 1024. The histogram monitors priority group 0 on ports 1 through 8 and priority group 1 on ports 9 through 16: +The following example enables the ingress queue length histogram for priority group 0 on swp1 through swp8 with the globally applied minimum boundary, histogram size, and sample interval. The example also enables the ingress queue length histogram for priority group 1 on swp9 through swp16 and sets the minimum boundary to 768 bytes, the histogram size to 9600 bytes, and the sampling interval to 2048 nanoseconds. ``` -cumulus@switch:~$ nv set interface swp1-swp8 telemetry histogram ingress-buffer priority-group 0 bin-min-boundary 960 -cumulus@switch:~$ nv set interface swp1-swp8 telemetry histogram ingress-buffer priority-group 0 histogram-size 12288 -cumulus@switch:~$ nv set interface swp1-swp8 telemetry histogram ingress-buffer priority-group 0 sample-interval 1024 -cumulus@switch:~$ nv set interface swp9-swp16 telemetry histogram ingress-buffer priority-group 1 bin-min-boundary 960 -cumulus@switch:~$ nv set interface swp9-swp16 telemetry histogram ingress-buffer priority-group 1 histogram-size 12288 -cumulus@switch:~$ nv set interface swp9-swp16 telemetry histogram ingress-buffer priority-group 1 sample-interval 1024 +cumulus@switch:~$ nv set interface swp1-8 telemetry histogram ingress-buffer priority-group 0 +cumulus@switch:~$ nv set interface swp9-16 telemetry histogram ingress-buffer priority-group 1 bin-min-boundary 768 +cumulus@switch:~$ nv set interface swp9-16 telemetry histogram ingress-buffer priority-group 1 histogram-size 9600 +cumulus@switch:~$ nv set interface swp9-16 telemetry histogram ingress-buffer priority-group 1 sample-interval 2048 cumulus@switch:~$ nv config apply ``` {{< /tab >}} {{< tab "Counter Histogram Examples ">}} -The following example configures the counter histogram and sets the minimum boundary size to 960, the histogram size to 12288, and the sampling interval to 1024. The histogram monitors all counter types: +The following example configures the counter histogram and sets the minimum boundary size to 960, the histogram size to 12288, and the sampling interval to 1024. The histogram monitors all counter types. These settings apply to interfaces that have the `counter` histogram enabled and do not have different values configured for these settings at the interface level: ``` -cumulus@switch:~$ nv set service telemetry histogram counter bin-min-boundary 1000 -cumulus@switch:~$ nv set service telemetry histogram counter histogram-size 1000 -cumulus@switch:~$ nv set service telemetry histogram countersample-interval 1024 +cumulus@switch:~$ nv set service telemetry histogram counter bin-min-boundary 960 +cumulus@switch:~$ nv set service telemetry histogram counter histogram-size 12288 +cumulus@switch:~$ nv set service telemetry histogram counter sample-interval 1024 cumulus@switch:~$ nv config apply ``` -The following example configures the counter histogram and sets the minimum boundary size to 960, the histogram size to 12288, and the sampling interval to 1024. The histogram monitors all received packets on ports 1 through 8: +The following example enables the counter histogram on swp1 through swp8 and uses the global settings for the minimum boundary size, histogram size, and the sampling interval. The histogram monitors all received packet counters on ports 1 through 8: ``` -cumulus@switch:~$ nv set interface swp1-swp8 telemetry histogram counter counter-type rx-packet bin-min-boundary 1000 -cumulus@switch:~$ nv set interface swp1-swp8 telemetry histogram counter counter-type rx-packet histogram-size 1000 -cumulus@switch:~$ nv set interface swp1-swp8 telemetry histogram counter counter-type rx-packet sample-interval 1024 +cumulus@switch:~$ nv set interface swp1-swp8 telemetry histogram counter counter-type rx-packet cumulus@switch:~$ nv config apply ``` @@ -190,7 +203,7 @@ The following table describes the ASIC monitor settings. {{< tabs "TabID184 ">}} {{< tab "Egress Queue Examples ">}} -The following example configures the egress queue length histogram and sets the minimum boundary size to 960, the histogram size to 12288, and the sampling interval to 1024. The histogram collects data every second for all traffic classes on all ports: +The following example configures the egress queue length histogram and sets the minimum boundary size to 960, the histogram size to 12288, and the sampling interval to 1024. The histogram collects data every second for traffic class 0 through 15 on all ports: ``` cumulus@switch:~$ sudo nano /etc/cumulus/datapath/monitor.conf @@ -237,7 +250,7 @@ monitor.histogram_gr2.histogram.sample_time_ns = 1024 {{< /tab >}} {{< tab "Ingress Queue Examples ">}} -The following example configures the ingress queue length histogram and sets the minimum boundary size to 960 bytes, the histogram size to 12288 bytes, and the sampling interval to 1024 nanoseconds. The histogram collects data every second for all priority groups on all ports. +The following example configures the ingress queue length histogram and sets the minimum boundary size to 960 bytes, the histogram size to 12288 bytes, and the sampling interval to 1024 nanoseconds. The histogram collects data every second for priority group 1 through 15 on all ports. ``` cumulus@switch:~$ sudo nano /etc/cumulus/datapath/monitor.conf @@ -318,21 +331,121 @@ monitor.histogram_pg.histogram.histogram_size_bytes = 12288 monitor.histogram_pg.histogram.sample_time_ns = 1024 ``` +{{< /tab >}} +{{< tab "Packet Drops Due to Errors Example ">}} + +In the following example: +- Packet drops on swp1 through swp50 collect every two seconds. +- If the number of packet drops is greater than 100, the results write to the `/var/lib/cumulus/discard_stats` snapshot file and the system sends a message to the `/var/log/syslog` file. + +``` +monitor.port_group_list = [discards_pg] +monitor.discards_pg.port_set = swp1-swp50 +monitor.discards_pg.stat_type = packet +monitor.discards_pg.action_list = [snapshot,log] +monitor.discards_pg.trigger_type = timer +monitor.discards_pg.timer = 2s +monitor.discards_pg.log.packet_error_drops = 100 +monitor.discards_pg.snapshot.packet_error_drops = 100 +monitor.discards_pg.snapshot.file = /var/lib/cumulus/discard_stats +monitor.discards_pg.snapshot.file_count = 16 +``` + +{{< /tab >}} +{{< tab "Collect Actions ">}} + +A collect action triggers the collection of additional information. You can daisy chain multiple monitors (port groups) into a single collect action. + +In the following example: +- Queue length histograms collect for swp1 through swp50 every second. +- The results write to the `/var/lib/cumulus/histogram_stats` snapshot file. +- When the queue length reaches 500 bytes, the system sends a message to the /var/log/syslog file and collects additional data; buffer occupancy and all packets per port. +- Buffer occupancy data writes to the `/var/lib/cumulus/buffer_stats` snapshot file and all packets per port data writes to the `/var/lib/cumulus/all_packet_stats` snapshot file. +- In addition, packet drops on swp1 through swp50 collect every two seconds. If the number of packet drops is greater than 100, the monitor writes the results to the `/var/lib/cumulus/discard_stats` snapshot file and sends a message to the `/var/log/syslog` file. + +``` +monitor.port_group_list = [histogram_pg,discards_pg] + +monitor.histogram_pg.port_set = swp1-swp50 +monitor.histogram_pg.stat_type = buffer +monitor.histogram_pg.cos_list = [0] +monitor.histogram_pg.trigger_type = timer +monitor.histogram_pg.timer = 1s +monitor.histogram_pg.action_list = [snapshot,collect,log] +monitor.histogram_pg.snapshot.file = /var/lib/cumulus/histogram_stats +monitor.histogram_pg.snapshot.file_count = 64 +monitor.histogram_pg.histogram.minimum_bytes_boundary = 960 +monitor.histogram_pg.histogram.histogram_size_bytes = 12288 +monitor.histogram_pg.histogram.sample_time_ns = 1024 +monitor.histogram_pg.log.queue_bytes = 500 +monitor.histogram_pg.collect.queue_bytes = 500 +monitor.histogram_pg.collect.port_group_list = [buffers_pg,all_packet_pg] + +monitor.buffers_pg.port_set = swp1-swp50 +monitor.buffers_pg.stat_type = buffer +monitor.buffers_pg.action_list = [snapshot] +monitor.buffers_pg.snapshot.file = /var/lib/cumulus/buffer_stats +monitor.buffers_pg.snapshot.file_count = 8 + +monitor.all_packet_pg.port_set = swp1-swp50 +monitor.all_packet_pg.stat_type = packet_all +monitor.all_packet_pg.action_list = [snapshot] +monitor.all_packet_pg.snapshot.file = /var/lib/cumulus/all_packet_stats +monitor.all_packet_pg.snapshot.file_count = 8 + +monitor.discards_pg.port_set = swp1-swp50 +monitor.discards_pg.stat_type = packet +monitor.discards_pg.action_list = [snapshot,log] +monitor.discards_pg.trigger_type = timer +monitor.discards_pg.timer = 2s +monitor.discards_pg.log.packet_error_drops = 100 +monitor.discards_pg.snapshot.packet_error_drops = 100 +monitor.discards_pg.snapshot.file = /var/lib/cumulus/discard_stats +monitor.discards_pg.snapshot.file_count = 16 +``` + {{< /tab >}} {{< /tabs >}} {{< /tab >}} {{< /tabs >}} + +### Snapshots + To create a snapshot: - Set how often to write to a snapshot file. The default value is 1 second. - Provide the snapshot file name and location. The default location and file name is `/var/lib/cumulus/histogram_stats`. -- Configure the number of snapshots you can create before the first snapshot file is overwritten. For example, if you set the snapshot file count to 30, the first snapshot file is named `histogram_stats_0` and the 30th snapshot is named`histogram_stats_30`. When the 30th snapshot is taken, the original snapshot file (`histogram_stats_0`) is overwritten and the sequence restarts. The default value is 64. - +- Configure the number of snapshots you can create before Cumulus Linux overwrites the first snapshot file. For example, if you set the snapshot file count to 30, the first snapshot file is `histogram_stats_0` and the 30th snapshot is `histogram_stats_30`. After the 30th snapshot, Cumulus Linux overwrites the original snapshot file (`histogram_stats_0`) and the sequence restarts. The default value is 64. + {{%notice note%}} -While more snapshots provide you with more data, they can occupy a lot of disk space on the switch. +Snapshots provide you with more data; however, they can occupy a lot of disk space on the switch. To reduce disk usage, you can use a volatile partition for the snapshot files; for example, `/var/run/cumulus/histogram_stats`. {{%/notice%}} The following example creates the `/var/lib/cumulus/histogram_stats` snapshot every 5 seconds. The number of snapshots that you can create before the first snapshot file is overwritten is set to 30. @@ -343,7 +456,7 @@ The following example creates the `/var/lib/cumulus/histogram_stats` snapshot ev ``` cumulus@switch:~$ nv set service telemetry snapshot-file name /var/lib/cumulus/histogram_stats cumulus@switch:~$ nv set service telemetry snapshot-file count 30 -cumulus@switch:~$ nv set service telemetry snapshot-interval 5s +cumulus@switch:~$ nv set service telemetry snapshot-interval 5 cumulus@switch:~$ nv config apply ``` @@ -351,62 +464,36 @@ cumulus@switch:~$ nv config apply {{< tab "Linux Commands ">}} Edit the `snapshot.file` settings in the `/etc/cumulus/datapath/monitor.conf` file, then restart the `asic-monitor` service with the `systemctl restart asic-monitor.service` command. The `asic-monitor` service reads the new configuration file and then runs until you stop the service with the `systemctl stop asic-monitor.service` command. - + | Setting| Description| |------- |----------- | -| `.action_list` | Specifies one or more actions that occur when data collects:
`snapshot` writes a snapshot of the data collection results to a file. If you specify this action, you must also specify a snapshot file (described below). You can also specify a threshold that initiates the snapshot action.

Example:
monitor.histogram_pg.action_list = [snapshot]
`monitor.histogram_pg.snapshot.file = /var/lib/cumulus/histogram_stats`
`collect` gathers additional data. If you specify this action, you must also specify the port groups for the additional data you want to collect.

Example:
monitor.histogram_pg.action_list = [collect
monitor.histogram_pg.collect.port_group_list = [buffers_pg,all_packet_pg]
`log` sends a message to the `/var/log/syslog` file. If you specify this action, you must also specify a threshold that initiates the log action.
Example:
monitor.histogram_pg.action_list = [log]
monitor.histogram_pg.log.queue_bytes = 500
You can use all three of these actions in one monitoring step. For example
monitor.histogram_pg.action_list = [snapshot,collect,log]
**Note**: If an action appears in the action list but does not have the required settings (such as a threshold for the log action), the ASIC monitor stops and reports an error. | +| `.action_list` | Specifies one or more actions that occur when data collects:
`snapshot` writes a snapshot of the data collection results to a file. If you specify this action, you must also specify a snapshot file (described below). You can also specify a threshold that initiates the snapshot action.

Example:
monitor.histogram_pg.action_list = [snapshot]
`collect` gathers additional data. If you specify this action, you must also specify the port groups for the additional data you want to collect.

Example:
monitor.histogram_pg.action_list = [collect
monitor.histogram_pg.collect.port_group_list = [buffers_pg,all_packet_pg]
`log` sends a message to the `/var/log/syslog` file. If you specify this action, you must also specify a threshold that initiates the log action.
Example:
monitor.histogram_pg.action_list = [log]
monitor.histogram_pg.log.queue_bytes = 500
You can use all three of these actions in one monitoring step. For example
monitor.histogram_pg.action_list = [snapshot,collect,log]
**Note**: If an action appears in the action list but does not have the required settings (such as a threshold for the log action), the ASIC monitor stops and reports an error. | | `.snapshot.file` | Specifies the name for the snapshot file. All snapshots use this name, with a sequential number appended to it. See the `snapshot.file_count` setting.

Example:
monitor.histogram_pg.snapshot.file = /var/lib/cumulus/histogram_stats
| -| `.snapshot.file_count` | Specifies the number of snapshots that can be created before the first snapshot file is overwritten. In the following example, because the snapshot file count is set to 64, the first snapshot file is named histogram_stats_0 and the 64th snapshot is named histogram_stats_63. When the 65th snapshot is taken, the original snapshot file (histogram_stats_0) is overwritten and the sequence restarts.

Example:
monitor.histogram_pg.snapshot.file_count = 64
**Note**: While more snapshots provide you with more data, they can occupy a lot of disk space on the switch. | - +| `.snapshot.file_count` | Specifies the number of snapshots you can create before Cumulus Linux overwrites the first snapshot file. In the following example, because the snapshot file count is set to 64, the first snapshot file is `histogram_stats_0` and the 64th snapshot is `histogram_stats_63`. After the 65th snapshot, Cumulus Linux overwrites the original snapshot file (histogram_stats_0) and the sequence restarts.

Example:
monitor.histogram_pg.snapshot.file_count = 64
**Note**: While more snapshots provide you with more data, they can occupy a lot of disk space on the switch. | + {{< /tab >}} {{< /tabs >}} -The following example shows an egress queue length snapshot. - -``` -{ - "timestamp_info": { - "start_datetime": "2017-03-16 21:36:40.775026", - "end_datetime": "2017-03-16 21:36:40.775848" - }, - "buffer_info": null, - "packet_info": null, - "histogram_info_tc": { - "swp1": { - "0": {"0": 10000}, - }, - "swp2": { - "0": {"0": 11000}, - "1": {"0": 12000}, - }, - "swp3": { - "0": {"0": 13000}, - }, - }, - "histogram_info_pg": { - "swp1": { - "0": {"0": 10000}, - }, - "swp2": { - "0": {"0": 11000}, - "1": {"0": 12000}, - }, - "swp3": { - "0": {"0": 13000}, - }, - }, - "histogram_info_counter": { - "swp1": { - "0": {"0": 10000}, - }, - "swp2": { - "0": {"0": 11000}, - "1": {"0": 12000}, - }, - }, - -} -... +- To show an ingress queue snapshot, run the `nv show interface telemetry histogram ingress-buffer priority-group snapshot` command +- To show an egress queue snapshot, run the `nv show interface telemetry histogram egress-buffer traffic-class snapshot` +- To show a counter snapshot, run the `nv show interface telemetry histogram counter counter-type snapshot` + +The following example shows an ingress queue snapshot: + +``` +cumulus@switch:~$ nv show interface swp1 telemetry histogram ingress-buffer priority-group 0 snapshot +Sl.No Date-Time Bin-0 Bin-1 Bin-2 Bin-3 Bin-4 Bin-5 Bin-6 Bin-7 Bin-8 Bin-9 +----- ------------------- ------ ------- ------- ------- ------- ------- ------- -------- -------- --------- +0 - (<864) (<2304) (<3744) (<5184) (<6624) (<8064) (<9504) (<10944) (<12384) (>=12384) +1 2023-12-13 11:02:44 980318 0 0 0 0 0 0 0 0 0 +2 2023-12-13 11:02:43 980318 0 0 0 0 0 0 0 0 0 +3 2023-12-13 11:02:42 980318 0 0 0 0 0 0 0 0 0 +4 2023-12-13 11:02:41 980318 0 0 0 0 0 0 0 0 0 +5 2023-12-13 11:02:40 980488 0 0 0 0 0 0 0 0 0 +6 2023-12-13 11:02:39 980149 0 0 0 0 0 0 0 0 0 +7 2023-12-13 11:02:38 979809 0 0 0 0 0 0 0 0 0 +8 2023-12-13 11:02:37 980488 0 0 0 0 0 0 0 0 0 +9 2023-12-13 11:02:36 980318 0 0 0 0 0 0 0 0 0 ``` {{%notice note%}} @@ -423,7 +510,8 @@ The following example sends a message to the `/var/log/syslog` file after the in {{< tab "NVUE Commands ">}} ``` -cumulus@switch:~$ nv set interface swp9-swp16 telemetry histogram ingress-buffer priority-group 1 log threshold 5000 +cumulus@switch:~$ nv set interface swp9-swp16 telemetry histogram ingress-buffer priority-group 1 threshold action log +cumulus@switch:~$ nv set interface swp9-swp16 telemetry histogram ingress-buffer priority-group 1 threshold value 5000 cumulus@switch:~$ nv config apply ``` @@ -460,10 +548,10 @@ When collecting data, the switch uses both the CPU and SDK process, which can af ## Show Histogram Information -To show a list of the interfaces on which histograms are enabled, run the `nv show service telemetry histogram interfaces` command: +To show a list of the interfaces with enabled histograms, run the `nv show service telemetry histogram interface` command: ``` -cumulus@switch:~$ nv show service telemetry histogram interfaces +cumulus@switch:~$ nv show service telemetry histogram interface Interface ingress-buffer egress-buffer counter --------------------------------------------------------------------------------------- swp1 0,1,2 - tx-byte,rx-byte diff --git a/content/cumulus-linux-57/Monitoring-and-Troubleshooting/FRRouting-Log-Message-Reference.md b/content/cumulus-linux-57/Monitoring-and-Troubleshooting/FRRouting-Log-Message-Reference.md index 8102a9ced5..5ec1b97caf 100644 --- a/content/cumulus-linux-57/Monitoring-and-Troubleshooting/FRRouting-Log-Message-Reference.md +++ b/content/cumulus-linux-57/Monitoring-and-Troubleshooting/FRRouting-Log-Message-Reference.md @@ -13,13 +13,13 @@ The following table lists the HIGH severity ERROR log messages generated by FRR. | Babel | HIGH | 16777218 | BABEL Packet Error | Babel has detected a packet encode/decode problem. | Collect the relevant log files and report the issue for troubleshooting.| | Babel | HIGH | 16777219 | BABEL Configuration Error | Babel has detected a configuration error of some sort. | Ensure that the configuration is correct. | | Babel | HIGH | 16777220 | BABEL Route Error | Babel has detected a routing error and is in an inconsistent state. | Gather data to report the issue for troubleshooting. Restart FRR. | -| BGP | HIGH | 33554433 | BGP attribute flag is incorrect | BGP attribute flag is set to the wrong value (Optional/Transitive/Partial). | Determine the soure of the attribute and determine why the attribute flag has been set incorrectly. | -| BGP | HIGH | 33554434 | BGP attribute length is incorrect | BGP attribute length is incorrect. | Determine the soure of the attribute and determine why the attribute length has been set incorrectly. | -| BGP | HIGH | 33554435 | BGP attribute origin value invalid | BGP attribute origin value is invalid. | Determine the soure of the attribute and determine why the origin attribute has been set incorrectly. | -| BGP | HIGH | 33554436 | BGP as path is invalid | BGP AS path has been malformed. | Determine the soure of the update and determine why the AS path has been set incorrectly. | -| BGP | HIGH | 33554437 | BGP as path first as is invalid | BGP update has invalid first AS in AS path. | Determine the soure of the update and determine why the AS path first AS value has been set incorrectly. | -| BGP | HIGH | 33554439 | BGP PMSI tunnel attribute type is invalid | BGP update has invalid type for PMSI tunnel. | Determine the soure of the update and determine why the PMSI tunnel attribute type has been set incorrectly. | -| BGP | HIGH | 33554440 | BGP PMSI tunnel attribute length is invalid | BGP update has invalid length for PMSI tunnel. | Determine the soure of the update and determine why the PMSI tunnel attribute length has been set incorrectly. | +| BGP | HIGH | 33554433 | BGP attribute flag is incorrect | BGP attribute flag is set to the wrong value (Optional/Transitive/Partial). | Determine the source of the attribute and determine why the attribute flag has been set incorrectly. | +| BGP | HIGH | 33554434 | BGP attribute length is incorrect | BGP attribute length is incorrect. | Determine the source of the attribute and determine why the attribute length has been set incorrectly. | +| BGP | HIGH | 33554435 | BGP attribute origin value invalid | BGP attribute origin value is invalid. | Determine the source of the attribute and determine why the origin attribute has been set incorrectly. | +| BGP | HIGH | 33554436 | BGP as path is invalid | BGP AS path has been malformed. | Determine the source of the update and determine why the AS path has been set incorrectly. | +| BGP | HIGH | 33554437 | BGP as path first as is invalid | BGP update has invalid first AS in AS path. | Determine the source of the update and determine why the AS path first AS value has been set incorrectly. | +| BGP | HIGH | 33554439 | BGP PMSI tunnel attribute type is invalid | BGP update has invalid type for PMSI tunnel. | Determine the source of the update and determine why the PMSI tunnel attribute type has been set incorrectly. | +| BGP | HIGH | 33554440 | BGP PMSI tunnel attribute length is invalid | BGP update has invalid length for PMSI tunnel. | Determine the source of the update and determine why the PMSI tunnel attribute length has been set incorrectly. | | BGP | HIGH | 33554442 | BGP peergroup operated on in error | BGP operating on peer-group instead of peers included. | Ensure the configuration doesn't contain peer-groups contained within peer-groups. | | BGP | HIGH | 33554443 | BGP failed to delete peer structure | BGP was unable to delete the peer structure when the address-family was removed. | Determine if all expected peers are removed and restart FRR if not. This is most likely a bug. | | BGP | HIGH | 33554444 | BGP failed to get table chunk memory | BGP unable to get chunk memory for table manager. | Ensure there is adequate memory on the device to support the table requirements. | @@ -38,8 +38,8 @@ The following table lists the HIGH severity ERROR log messages generated by FRR. | BGP | HIGH | 33554457 | BGP error receiving keepalive packet | BGP unable to process a keepalive packet. | BGP keepalive received while in a stopped state. If the problem persists, report it for troubleshooting. | | BGP | HIGH | 33554458 | BGP error receiving route refresh message | BGP unable to process route refresh message. | BGP route refresh received while in a stopped state. If the problem persists, report it for troubleshooting. | | BGP | HIGH | 33554459 | BGP error capability message | BGP unable to process received capability. | BGP capability message received while in a stopped state. If the problem persists, report it for troubleshooting. | -| BGP | HIGH | 33554460 | BGP error with nexthopo update | BGP unable to process nexthop update. | BGP received the nexthop update but the nexthop is not reachable in this BGP instance. Report the problem for troubleshooting. | -| BGP | HIGH | 33554461 | Failure to apply label | BGP attempted to attempted to apply a label but could not do so. | This is most likely a bug. If the problem persists, report it for troubleshooting. | +| BGP | HIGH | 33554460 | BGP error with nexthop update | BGP unable to process nexthop update. | BGP received the nexthop update but the nexthop is not reachable in this BGP instance. Report the problem for troubleshooting. | +| BGP | HIGH | 33554461 | Failure to apply label | BGP attempted to apply a label but could not do so. | This is most likely a bug. If the problem persists, report it for troubleshooting. | | BGP | HIGH | 33554462 | Multipath specified is invalid | BGP was started with an invalid ECMP/multipath value. | Correct the ECMP/multipath value supplied when starting the BGP daemon. | | BGP | HIGH | 33554463 | Failure to process a packet | BGP attempted to process a received packet but could not do so. | This is most likely a bug. If the problem persists, report it for troubleshooting. | | BGP | HIGH | 33554464 | Failure to connect to peer | BGP attempted to send open to a peer but couldn't connect. | This is most likely a bug. If the problem persists, report it for troubleshooting. | @@ -62,7 +62,7 @@ The following table lists the HIGH severity ERROR log messages generated by FRR. | EIGRP | HIGH | 50331650 | EIGRP Configuration Error | EIGRP has detected a configuration error.| Correct the configuration issue. If it still persists, report the issue for troubleshooting.| | General | HIGH | 100663297 | Failure to raise or lower privileges | FRR attempted to raise or lower its privileges and was unable to do so. | Ensure that you are running FRR as the frr user and that the user has sufficient privileges to properly access root privileges. | | General | HIGH | 100663298 | VRF Failure on Start | Upon startup, FRR failed to properly initialize and start up the VRF subsystem. | Ensure that there is sufficient memory to start processes, then restart FRR. | -| General | HIGH | 100663299 | Socket Error | When attempting to access a socket, a system error occured and FRR was unable to properly complete the request. | Ensure that there are sufficient system resources available and ensure that the frr user has sufficient permisions to work. | +| General | HIGH | 100663299 | Socket Error | When attempting to access a socket, a system error occurred and FRR was unable to properly complete the request. | Ensure that there are sufficient system resources available and ensure that the frr user has sufficient permissions to work. | | General | HIGH | 100663303 | System Call Error | FRR has detected an error from using a vital system call and has probably already exited. | Ensure permissions are correct for FRR users and groups. Additionally, check that sufficient system resources are available. | | General | HIGH | 100663304 | VTY Subsystem Error | FRR has detected a problem with the specified configuration file. | Ensure the configuration file exists and has the correct permissions for operations. Additionally, ensure that all config lines are correct as well. | | General | HIGH | 100663305 | SNMP Subsystem Error | FRR has detected a problem with the SNMP library it uses. A callback from this subsystem has indicated some error. | Examine the callback message and ensure SNMP is properly set up and working. | @@ -86,7 +86,7 @@ The following table lists the HIGH severity ERROR log messages generated by FRR. | OSPF | HIGH | 134217729 | Failure to process a packet | OSPF attempted to process a received packet but could not do so. | This is most likely a bug. If the problem persists, report it for troubleshooting. | | OSPF | HIGH | 134217730 | Failure to process Router LSA | OSPF attempted to process a router LSA, but there was an advertising ID mismtach with the link ID. | Check the OSPF network configuration for any configuration issue. If the problem persists, report it for troubleshooting.| | OSPF | HIGH | 134217731 | OSPF Domain Corruption | OSPF attempted to process a router LSA, but there was an advertising ID mismtach with the link ID. | Check OSPF network database for a corrupted LSA. If the problem persists, shut down the OSPF domain and report the problem for troubleshooting. | -| OSPF | HIGH | 134217732 | OSPF Initialization failure | OSPF failed to initialized the OSPF default instance. | Ensure there is adequate memory on the device. If the problem persists, report it for troubleshooting. | +| OSPF | HIGH | 134217732 | OSPF Initialization failure | OSPF failed to initialize the OSPF default instance. | Ensure there is adequate memory on the device. If the problem persists, report it for troubleshooting. | | OSPF | HIGH | 134217733 | OSPF SR Invalid DB | OSPF segment routing database is invalid. | This is most likely a bug. If the problem persists, report it for troubleshooting. | | OSPF | HIGH | 134217734 | OSPF SR hash node creation failed | OSPF segment routing node creation failed. | This is most likely a bug. If the problem persists, report it for troubleshooting. | | OSPF | HIGH | 134217735 | OSPF SR Invalid lsa id | OSPF segment routing invalid LSA ID. | Restart the OSPF instance. If the problem persists, report it for troubleshooting. | diff --git a/content/cumulus-linux-57/Monitoring-and-Troubleshooting/Network-Troubleshooting/Mellanox-WJH.md b/content/cumulus-linux-57/Monitoring-and-Troubleshooting/Network-Troubleshooting/Mellanox-WJH.md index cfa01cdba8..8f082d9055 100644 --- a/content/cumulus-linux-57/Monitoring-and-Troubleshooting/Network-Troubleshooting/Mellanox-WJH.md +++ b/content/cumulus-linux-57/Monitoring-and-Troubleshooting/Network-Troubleshooting/Mellanox-WJH.md @@ -5,7 +5,7 @@ weight: 1130 toc: 4 --- *What Just Happened* (WJH) provides real time visibility into network problems and has two components: -- The WJH agent enables you to stream detailed and contextual telemetry for off-switch analysis with tools such as [NVIDIA NetQ]({{}}). +- The WJH agent enables you to stream detailed and contextual telemetry for off-switch analysis with tools such as [NVIDIA NetQ]({{}}). - The WJH service (`what-just-happened`) enables you to diagnose network problems by looking at dropped packets. WJH can monitor layer 1, layer 2, layer 3, tunnel, buffer and ACL related issues. Cumulus Linux enables and runs the WJH service by default. ## Configure WJH diff --git a/content/cumulus-linux-57/Monitoring-and-Troubleshooting/Simple-Network-Management-Protocol-SNMP/Configure-SNMP.md b/content/cumulus-linux-57/Monitoring-and-Troubleshooting/Simple-Network-Management-Protocol-SNMP/Configure-SNMP.md index a4c74e80e1..76dc508538 100644 --- a/content/cumulus-linux-57/Monitoring-and-Troubleshooting/Simple-Network-Management-Protocol-SNMP/Configure-SNMP.md +++ b/content/cumulus-linux-57/Monitoring-and-Troubleshooting/Simple-Network-Management-Protocol-SNMP/Configure-SNMP.md @@ -26,13 +26,17 @@ cumulus@switch:~$ nv set service snmp-server listening-address localhost cumulus@switch:~$ nv config apply ``` +{{%notice warning%}} +If you disable the `snmpd` service with the `nv set service snmp-server enable off` command, the FRR service restarts, which might impact traffic. +{{%/notice%}} + {{< /tab >}} {{< tab "Linux Commands ">}} {{%notice note%}} If you intend to run this service within a {{}}, including the {{}}, follow {{}} for configuring the service. -You do not need to run SNMP in the management VRF if you just want to allow SNMP communicaton through the managment VRF interfaces; see {{}}. +You do not need to run SNMP in the management VRF if you just want to allow SNMP communication through the management VRF interfaces; see {{}}. {{%/notice%}} 1. Start the `snmpd` service: @@ -194,7 +198,7 @@ You can authenticate the user in the following ways: - With no authentication password (if you specify `auth-none`) - With an MD5 password -- With a SHA password +- With an SHA password {{< tabs "username" >}} {{< tab "NVUE Commands" >}} @@ -527,6 +531,11 @@ To verify the configuration, you can run `snmpwalk`. ``` cumulus@switch:~$ sudo snmpwalk -v2c -cpublic localhost 1.3.6.1.2.1.14 ``` + +{{%notice warning%}} +If you disable the SNMP server with AgentX enabled, the FRR service restarts, which might impact traffic. +{{%/notice%}} + ### Enable the .1.3.6.1.2.1 Range diff --git a/content/cumulus-linux-57/Monitoring-and-Troubleshooting/Simple-Network-Management-Protocol-SNMP/Supported-MIBs.md b/content/cumulus-linux-57/Monitoring-and-Troubleshooting/Simple-Network-Management-Protocol-SNMP/Supported-MIBs.md index d21dc3a382..6be386ff43 100644 --- a/content/cumulus-linux-57/Monitoring-and-Troubleshooting/Simple-Network-Management-Protocol-SNMP/Supported-MIBs.md +++ b/content/cumulus-linux-57/Monitoring-and-Troubleshooting/Simple-Network-Management-Protocol-SNMP/Supported-MIBs.md @@ -10,7 +10,7 @@ Below are the MIBs that Cumulus Linux supports, as well as suggested uses for th |
MIB Name | Suggested Uses | | -------- | -------------- | | {{}}
{{}}
{{}}
{{}} | You can enable FRR SNMP support to provide support for OSPF-MIB (RFC-1850), OSPFV3-MIB (RFC-5643), and BGP4-MIB (RFC-1657). | -| {{}} | Cumulus Linux also includes its own BGP unnumbered MIB for BGP unnumbered peers, defined in `/usr/share/snmp/mibs/Cumulus-BGPUN-MIB.txt`, which has the OID `1.3.6.1.4.1.40310.7`.| +| {{}} | Cumulus Linux also includes its own BGP unnumbered MIB for BGP unnumbered peers, defined in `/usr/share/snmp/mibs/Cumulus-BGPUN-MIB.txt`, which has the OID `1.3.6.1.4.1.40310.7`.| | {{}} | Discard counters: Cumulus Linux also includes its own counters MIB, defined in `/usr/share/snmp/mibs/Cumulus-Counters-MIB.txt`. It has the OID `.1.3.6.1.4.1.40310.2`. | | {{}} | Cumulus Linux includes its own resource utilization MIB, which is similar to using `cl-resource-query`. This MIB monitors layer 3 entries by host, route, nexthops, ECMP groups, and layer 2 MAC/BDPU entries. `/usr/share/snmp/mibs/Cumulus-Resource-Query-MIB.txt` defines this MIB, which has the OID `.1.3.6.1.4.1.40310.1`. | | {{}} | SNMP counters. For information on exposing CPU and memory information with SNMP, see this [knowledge base article]({{}}). | diff --git a/content/cumulus-linux-57/Monitoring-and-Troubleshooting/Troubleshooting-Network-Interfaces/Troubleshoot-Layer-1.md b/content/cumulus-linux-57/Monitoring-and-Troubleshooting/Troubleshooting-Network-Interfaces/Troubleshoot-Layer-1.md index d0a06811f4..01f2b6addf 100644 --- a/content/cumulus-linux-57/Monitoring-and-Troubleshooting/Troubleshooting-Network-Interfaces/Troubleshoot-Layer-1.md +++ b/content/cumulus-linux-57/Monitoring-and-Troubleshooting/Troubleshooting-Network-Interfaces/Troubleshoot-Layer-1.md @@ -760,7 +760,7 @@ Because I2C problems can be very pernicious, often showing up again much later a To verify that an I2C failure is occurring, run `sudo tail -F /var/log/syslog` and look for `smbus` or `i2c` or `EEPROM read` errors that continue to appear or appear in bursts. -Based on the failure scenario when tyou discover the issue, choose when to address this issue; immediately or during a maintenance window. +Based on the failure scenario when you discover the issue, choose when to address this issue; immediately or during a maintenance window. - If traffic or the switch operates negatively and you cannot route traffic through a redundant network, you must do something immediately. - If you can route traffic around the failing switch, allowing troubleshooting to proceed on the failed switch, proceed to reroute traffic to find an appropriate time to troubleshoot the failing switch. diff --git a/content/cumulus-linux-57/Network-Virtualization/Ethernet-Virtual-Private-Network-EVPN/Basic-Configuration.md b/content/cumulus-linux-57/Network-Virtualization/Ethernet-Virtual-Private-Network-EVPN/Basic-Configuration.md index d009e38cbc..d96e18cbbb 100644 --- a/content/cumulus-linux-57/Network-Virtualization/Ethernet-Virtual-Private-Network-EVPN/Basic-Configuration.md +++ b/content/cumulus-linux-57/Network-Virtualization/Ethernet-Virtual-Private-Network-EVPN/Basic-Configuration.md @@ -70,7 +70,7 @@ cumulus@leaf01:~$ nv set vrf default router bgp neighbor swp51 address-family l2 cumulus@leaf01:~$ nv config apply ``` -You do not need enable the BGP control plane for all VNIs configured on the switch with NVUE with the `advertise-all-vni` option. FRR **is** aware of any local VNIs and MACs, and hosts (neighbors) associated with those VNIs. +You do not need to enable the BGP control plane for all VNIs configured on the switch with NVUE with the `advertise-all-vni` option. FRR **is** aware of any local VNIs and MACs, and hosts (neighbors) associated with those VNIs. After you run `nv config save`, the NVUE Commands create the following configuration snippet in the `/etc/nvue.d/startup.yaml` file: @@ -275,7 +275,7 @@ router bgp 65101 bgp router-id 10.10.10.1 neighbor swp51 interface remote-as external address-family l2vpn evpn -neighbor swp1 activate +neighbor swp51 activate advertise-all-vni ... ``` @@ -291,7 +291,7 @@ spine01(config)# router bgp 65199 spine01(config-router)# bgp router-id 10.10.10.101 spine01(config-router)# neighbor swp1 interface remote-as external spine01(config-router)# address-family l2vpn evpn -spine01(config-router-af)# neighbor swp51 activate +spine01(config-router-af)# neighbor swp1 activate spine01(config-router-af)# end spine01# write memory spine01# exit diff --git a/content/cumulus-linux-57/Network-Virtualization/Ethernet-Virtual-Private-Network-EVPN/EVPN-Enhancements.md b/content/cumulus-linux-57/Network-Virtualization/Ethernet-Virtual-Private-Network-EVPN/EVPN-Enhancements.md index 4cabaf65d4..fcb21f17c8 100644 --- a/content/cumulus-linux-57/Network-Virtualization/Ethernet-Virtual-Private-Network-EVPN/EVPN-Enhancements.md +++ b/content/cumulus-linux-57/Network-Virtualization/Ethernet-Virtual-Private-Network-EVPN/EVPN-Enhancements.md @@ -621,9 +621,16 @@ When you configure a site ID, Cumulus Linux: The site ID is in the format `:<2-byte Value>`, where the IPv4 address is the anycast IP address (a virtual IP address for VXLAN data-path termination) and the 2-byte value is an integer between 0 and 65535. For example: 10.0.1.12:10 -NVUE does not provide commands for this feature. +{{< tabs "TabID624 ">}} +{{< tab "NVUE Commands ">}} + +``` +cumulus@leaf01:~$ nv set evpn mac-vrf-soo 10.0.1.12:10 +cumulus@leaf01:~$ nv config apply +``` -To configure a unique site ID, run the following vtysh commands: +{{< /tab >}} +{{< tab "vtysh Commands ">}} ``` cumulus@leaf01:~$ sudo vtysh @@ -637,6 +644,9 @@ leaf01# write memory leaf01# exit ``` +{{< /tab >}} +{{< /tabs >}} + {{%notice note%}} NVIDIA recommends you do not configure a site ID on a standalone or multihoming VTEP. {{%/notice%}} diff --git a/content/cumulus-linux-57/Network-Virtualization/Ethernet-Virtual-Private-Network-EVPN/EVPN-Multihoming.md b/content/cumulus-linux-57/Network-Virtualization/Ethernet-Virtual-Private-Network-EVPN/EVPN-Multihoming.md index 0e37cd6d25..d1617f2110 100644 --- a/content/cumulus-linux-57/Network-Virtualization/Ethernet-Virtual-Private-Network-EVPN/EVPN-Multihoming.md +++ b/content/cumulus-linux-57/Network-Virtualization/Ethernet-Virtual-Private-Network-EVPN/EVPN-Multihoming.md @@ -25,7 +25,7 @@ To configure EVPN-MH, you set an Ethernet segment system MAC address and a local While you can specify a different system MAC address on different Ethernet segments attached to the same switch, the Ethernet segment system MAC address must be the same on the downlinks attached to the same server. {{%notice info%}} -On Spectrum-2 and Spectrum-3 switches, an Ethernet segment can span more than two switches. Each Ethernet segment is a distinct redundancy group. However, on Spectrum A1 switches, you can include a maximum of two switches in a redundancy group or Ethernet segment. +On Spectrum-2 and later, an Ethernet segment can span more than two switches. Each Ethernet segment is a distinct redundancy group. However, on Spectrum A1 switches, you can include a maximum of two switches in a redundancy group or Ethernet segment. {{%/notice%}} ## Required and Supported Features @@ -57,7 +57,7 @@ To use EVPN-MH, you must remove any MLAG configuration on the switch: - When an EVPN-MH bond enters LACP bypass state, BGP stops advertising EVPN type-1 and type-4 routes for that bond. The switch disables split-horizon and designated forwarder filters. - When an EVPN-MH bond exits the LACP bypass state, BGP starts advertising EVPN type-1 and type-4 routes for that bond. The switch enables split-horizon and designated forwarder filters. - [EVI](## "EVPN virtual instance") - Cumulus Linux supports VLAN-based service only, so the EVI is just a layer 2 VNI. -- Supported {{}} include NVIDIA Spectrum A1, Spectrum-2 and Spectrum-3. +- Supported {{}} include NVIDIA Spectrum A1, Spectrum-2 and later. ### Supported EVPN Route Types @@ -78,7 +78,7 @@ The following features are not supported with EVPN-MH: - {{}} - {{}} - {{}} -- Multihomed networks, such as STP bridge domains that are MH connected. EVPN-MH bonds are intended for multihomed end-node device (server) connectivity. +- Multihomed networks, such as STP bridge domains that are MH connected. EVPN-MH bonds are for multihomed end-node device (server) connectivity. ## Basic Configuration diff --git a/content/cumulus-linux-57/Network-Virtualization/Ethernet-Virtual-Private-Network-EVPN/EVPN-PIM.md b/content/cumulus-linux-57/Network-Virtualization/Ethernet-Virtual-Private-Network-EVPN/EVPN-PIM.md index f9bc330b89..f92b3f24ae 100644 --- a/content/cumulus-linux-57/Network-Virtualization/Ethernet-Virtual-Private-Network-EVPN/EVPN-PIM.md +++ b/content/cumulus-linux-57/Network-Virtualization/Ethernet-Virtual-Private-Network-EVPN/EVPN-PIM.md @@ -5,7 +5,7 @@ weight: 580 toc: 4 --- {{%notice info%}} -Cumulus Linux 5.6 only supports Head-End Replication (HREP) for handling BUM traffic in an EVPN configuration. BUM handling using a PIM-SM Multicast tree is not supported. +Cumulus Linux 5.7 only supports Head-End Replication (HREP) for handling BUM traffic in an EVPN configuration. BUM handling using a PIM-SM Multicast tree is not supported. {{%/notice%}} Without EVPN and [PIM-SM](## "Sparse Mode"), [HER](## "Head End Replication") is the default way to replicate BUM traffic to remote VTEPs, where the ingress VTEP generates the same number of copies as VTEPs for each overlay BUM packet. In certain deployments, this is not optimal. diff --git a/content/cumulus-linux-57/Network-Virtualization/Ethernet-Virtual-Private-Network-EVPN/Troubleshooting-EVPN.md b/content/cumulus-linux-57/Network-Virtualization/Ethernet-Virtual-Private-Network-EVPN/Troubleshooting-EVPN.md index 0bc3d74b9d..b0ed2be6c6 100644 --- a/content/cumulus-linux-57/Network-Virtualization/Ethernet-Virtual-Private-Network-EVPN/Troubleshooting-EVPN.md +++ b/content/cumulus-linux-57/Network-Virtualization/Ethernet-Virtual-Private-Network-EVPN/Troubleshooting-EVPN.md @@ -15,7 +15,7 @@ You can use various NVUE or Linux commands to examine interfaces, VLAN mappings - `nv show bridge domain vlan` (NVUE) or `bridge vlan show` (Linux) - `nv show bridge vlan-vni-map` (NVUE) - `nv show bridge domain vlan-vni-map` (NVUE) -- `ip neighbor show` (Linux) +- `nv show interface neighbor` (NVUE) or `ip neighbor show` (Linux) - `ip route show [table ]` (Linux) The sample output below shows `ip -d link show type vxlan` command output for one VXLAN interface. Relevant parameters are the VNI value, the state, the local IP address for the VXLAN tunnel, the UDP port number (4789) and the bridge of which the interface is part (*bridge* in the example below). The output also shows that MAC learning is *off* on the VXLAN interface. @@ -83,32 +83,48 @@ entry-id age bridge-domain entry-type interface last-update MAC addre ... ``` -The following example output for the `net show neighbor` command shows: - -- 10.1.10.101 is a locally attached host server01 on VLAN 10. Interface `vlan10-v0` is the virtual VRR address for VLAN10. -- 10.1.10.104 is remote-host, server04 on VLAN10. The STATE `zebra` shows that it is an EVPN learned entry. Use `net show bridge macs` to see information about which VTEP the host is behind. -- 10.1.20.105 is remote-host, server05 on VLAN 20. - -``` -cumulus@leaf01:mgmt:~$ net show neighbor -Neighbor MAC Interface AF STATE -------------------------- ----------------- ------------- ---- --------- -10.1.10.104 68:0f:31:ae:3d:7a vlan10 IPv4 zebra -10.1.10.101 26:76:e6:93:32:78 vlan10-v0 IPv4 REACHABLE -169.254.0.1 c0:8a:e6:03:96:d0 peerlink.4094 IPv4 zebra -10.0.1.2 44:38:39:be:ef:bb vlan4001 IPv4 zebra -169.254.0.1 c0:99:6b:c0:e1:ca swp52 IPv4 zebra -10.1.20.3 c0:8a:e6:03:96:d0 vlan20 IPv4 PERMANENT -169.254.0.1 ac:56:f0:f3:59:0c swp54 IPv4 zebra -10.1.20.105 12:15:9a:9c:f2:e1 vlan20 IPv4 zebra -169.254.0.1 2c:f3:45:f4:6f:5f swp53 IPv4 zebra -192.168.200.1 12:72:bc:4c:e1:83 eth0 IPv4 REACHABLE -169.254.0.1 f0:08:5f:12:cc:8c swp51 IPv4 zebra -192.168.200.250 44:38:39:00:01:80 eth0 IPv4 REACHABLE -10.1.30.3 c0:8a:e6:03:96:d0 vlan30 IPv4 PERMANENT -192.168.200.2 02:7a:19:45:66:48 eth0 IPv4 STALE -10.1.10.101 26:76:e6:93:32:78 vlan10 IPv4 REACHABLE -10.1.10.3 c0:8a:e6:03:96:d0 vlan10 IPv4 PERMANENT +The following example shows the `nv show interface neighbor` command output: + +``` +cumulus@leaf01:mgmt:~$ nv show interface neighbor +Interface IP/IPV6 LLADR(MAC) State Flag +------------- ------------------------- ----------------- --------- ---------- +eth0 192.168.200.1 48:b0:2d:82:3b:b3 reachable + 192.168.200.251 48:b0:2d:00:00:01 stale + fe80::4ab0:2dff:fe00:1 48:b0:2d:00:00:01 reachable router +peerlink.4094 169.254.0.1 48:b0:2d:52:11:90 permanent + fe80::4ab0:2dff:fe52:1190 48:b0:2d:52:11:90 reachable router +swp51 169.254.0.1 48:b0:2d:b8:2b:bc permanent + fe80::4ab0:2dff:feb8:2bbc 48:b0:2d:b8:2b:bc reachable router +swp52 169.254.0.1 48:b0:2d:e1:08:f7 permanent + fe80::4ab0:2dff:fee1:8f7 48:b0:2d:e1:08:f7 reachable router +swp53 169.254.0.1 48:b0:2d:c0:71:8b permanent + fe80::4ab0:2dff:fec0:718b 48:b0:2d:c0:71:8b reachable router +swp54 169.254.0.1 48:b0:2d:18:f4:68 permanent + fe80::4ab0:2dff:fe18:f468 48:b0:2d:18:f4:68 reachable router +vlan10 10.1.10.3 44:38:39:22:01:78 permanent + fe80::4638:39ff:fe22:178 44:38:39:22:01:78 permanent +vlan20 10.1.20.3 44:38:39:22:01:78 permanent + fe80::4638:39ff:fe22:178 44:38:39:22:01:78 permanent +vlan30 10.1.30.3 44:38:39:22:01:78 permanent + fe80::4638:39ff:fe22:178 44:38:39:22:01:78 permanent +vlan4024_l3 10.10.10.63 44:38:39:22:01:74 noarp |ext_learn + 10.10.10.64 44:38:39:22:01:7c noarp |ext_learn + 10.10.10.4 44:38:39:22:01:8a noarp |ext_learn + 10.10.10.3 44:38:39:22:01:84 noarp |ext_learn + 10.10.10.2 44:38:39:22:01:78 noarp |ext_learn + fe80::4638:39ff:fe22:178 44:38:39:22:01:78 permanent +vlan4036_l3 10.10.10.63 44:38:39:22:01:74 noarp |ext_learn + 10.10.10.64 44:38:39:22:01:7c noarp |ext_learn + 10.10.10.4 44:38:39:22:01:8a noarp |ext_learn + 10.10.10.3 44:38:39:22:01:84 noarp |ext_learn + 10.10.10.2 44:38:39:22:01:78 noarp |ext_learn + fe80::4638:39ff:fe22:178 44:38:39:22:01:78 permanent +vxlan48 10.10.10.63 44:38:39:22:01:74 noarp |ext_learn + 10.10.10.4 44:38:39:22:01:8a noarp |ext_learn + 10.10.10.3 44:38:39:22:01:84 noarp |ext_learn + 10.10.10.2 44:38:39:22:01:78 noarp |ext_learn + 10.10.10.64 44:38:39:22:01:7c noarp |ext_learn ... ``` diff --git a/content/cumulus-linux-57/Network-Virtualization/QinQ-and-VXLANs.md b/content/cumulus-linux-57/Network-Virtualization/QinQ-and-VXLANs.md index 68acb8ec49..217b14f014 100644 --- a/content/cumulus-linux-57/Network-Virtualization/QinQ-and-VXLANs.md +++ b/content/cumulus-linux-57/Network-Virtualization/QinQ-and-VXLANs.md @@ -207,7 +207,7 @@ The configuration in Cumulus Linux uses the outer tag for the customer and the i {{%notice note%}} You can use double tag translation: -- On Spectrum-2 and Spectrum-3 switches in a VXLAN configuration on native interfaces only. You cannot configure double tag translation on bonds. +- On Spectrum-2 and later in a VXLAN configuration on native interfaces only. You cannot configure double tag translation on bonds. - With bridges in {{}} only. - With 802.1Q bridge mode. - *Without* MLAG. diff --git a/content/cumulus-linux-57/Network-Virtualization/VXLAN-Devices.md b/content/cumulus-linux-57/Network-Virtualization/VXLAN-Devices.md index ad77511ca2..9d6f1a30e5 100644 --- a/content/cumulus-linux-57/Network-Virtualization/VXLAN-Devices.md +++ b/content/cumulus-linux-57/Network-Virtualization/VXLAN-Devices.md @@ -197,7 +197,7 @@ cumulus@leaf01:~$ ifreload -a ## Automatic VLAN to VNI Mapping -In an EVPN VXLAN environment, you need to map individual VLANs to VNIs. For a single VXLAN device, you can do this with a seperate NVUE command per VLAN; however, this can be cumbersome if you have to configure many VLANS or need to isolate tenants and reuse VLANs. To simplify the configuration, you can use these two commands instead: +In an EVPN VXLAN environment, you need to map individual VLANs to VNIs. For a single VXLAN device, you can do this with a separate NVUE command per VLAN; however, this can be cumbersome if you have to configure many VLANS or need to isolate tenants and reuse VLANs. To simplify the configuration, you can use these two commands instead: - `nv set bridge domain vlan vni auto` configures the specified VLANs to use automatic mapping. - `nv set bridge domain vlan-vni-offset` configures the offset you want to use for the VNIs. For example, if you specify an offset of 10000, the VNI is the VLAN plus 10000. diff --git a/content/cumulus-linux-57/Network-Virtualization/VXLAN-Tunnel-DSCP.md b/content/cumulus-linux-57/Network-Virtualization/VXLAN-Tunnel-DSCP.md index 0187b42ab9..20172de4d4 100644 --- a/content/cumulus-linux-57/Network-Virtualization/VXLAN-Tunnel-DSCP.md +++ b/content/cumulus-linux-57/Network-Virtualization/VXLAN-Tunnel-DSCP.md @@ -42,7 +42,7 @@ cumulus@switch:~$ nv config apply {{< /tab >}} {{< tab "Linux Commands ">}} -Edit the `/etc/cumulus/switchd.conf` file, then restart `switchd`. +Edit the `/etc/cumulus/switchd.conf` file, then reload `switchd`. The following example sets the VXLAN encapsulation DSCP action to `copy`. @@ -87,10 +87,7 @@ vxlan.def_decap_dscp_action = preserve ... ``` -After you modify `/etc/cumulus/switchd.conf` file, you must restart `switchd` for the changes to take effect. - -{{}} - +After you modify `/etc/cumulus/switchd.conf` file, you must reload `switchd` with the `sudo systemctl reload switchd.service` command. {{< /tab >}} {{< /tabs >}} diff --git a/content/cumulus-linux-57/System-Configuration/Authentication-Authorization-and-Accounting/LDAP-Authentication-and-Authorization.md b/content/cumulus-linux-57/System-Configuration/Authentication-Authorization-and-Accounting/LDAP-Authentication-and-Authorization.md index fbe8e4e8d7..1bc389c2c9 100644 --- a/content/cumulus-linux-57/System-Configuration/Authentication-Authorization-and-Accounting/LDAP-Authentication-and-Authorization.md +++ b/content/cumulus-linux-57/System-Configuration/Authentication-Authorization-and-Accounting/LDAP-Authentication-and-Authorization.md @@ -57,10 +57,10 @@ Entering incorrect information during the installation process produces configur - Edit the `/etc/nslcd.conf` file to update the LDAP URI and search base DN (see {{}}, below). - Edit the `/etc/nssswitch.conf` file to update the service selections. -Be sure to restart `netd` after editing the files. +Be sure to restart `nvued.service` after editing the files. ``` -cumulus@switch:~$ sudo systemctl restart netd.service +cumulus@switch:~$ sudo systemctl restart nvued.service ``` {{< expand "Alternative Installation Method Using debconf-utils " >}} diff --git a/content/cumulus-linux-57/System-Configuration/Authentication-Authorization-and-Accounting/RADIUS-AAA.md b/content/cumulus-linux-57/System-Configuration/Authentication-Authorization-and-Accounting/RADIUS-AAA.md index 718da2946b..1f1974c532 100644 --- a/content/cumulus-linux-57/System-Configuration/Authentication-Authorization-and-Accounting/RADIUS-AAA.md +++ b/content/cumulus-linux-57/System-Configuration/Authentication-Authorization-and-Accounting/RADIUS-AAA.md @@ -4,11 +4,15 @@ author: NVIDIA weight: 190 toc: 4 --- -Various add-on packages enable [RADIUS](## "Remote Authentication Dial-In User Service") users to log in to a Cumulus Linux switch in a transparent way with minimal configuration. There is no need to create accounts or directories on the switch. Authentication uses PAM and includes login, `ssh`, `sudo` and `su`. +Cumulus Linux provides add-on packages to enable [RADIUS](## "Remote Authentication Dial-In User Service") users to log into the switch transparently with minimal configuration. There is no need to create accounts or directories on the switch. Authentication uses PAM and includes login, `ssh`, `sudo` and `su`. ## Install the RADIUS Packages -The RADIUS packages are in the `cumulus-local-apt-archive` repository, which is {{}} in the Cumulus Linux image. You can install the packages even when the switch is not connected to the internet. +{{%notice note%}} +NVUE automatically installs the RADIUS AAA packages; you do **not** have to install the packages if you use NVUE commands to configure RADIUS AAA. +{{%/notice%}} + +If you use Linux commands to configure RADIUS AAA, you must install the RADIUS `libnss-mapuser` and `libpam-radius-auth` packages before you start configuration. The packages are in the `cumulus-local-apt-archive` repository, which is {{}} in the Cumulus Linux image. You can install the packages even when the switch is not connected to the internet. To install the RADIUS packages: @@ -23,20 +27,26 @@ The `nvshow` group includes the `radius_user` account, and the `nvset` and `nvap ## Required RADIUS Client Configuration -After you install the required RADIUS packages, configure the following required settings on the switch (the RADIUS client). +After you install the required RADIUS packages, configure the following required settings on the switch (the RADIUS client): - Set the IP address or hostname of at least one RADIUS server. You can specify a port for the server (optional). The default port number is 1812. - Set the secret key shared between the RADIUS server and client. If you include special characters in the key (such as $), you must enclose the key in single quotes ('). -- Set the priority at which Cumulus Linux contacts a RADIUS server for load balancing. You can set a value between 1 and 100. The lower value is the higher priority. -- If you use NVUE commands to configure RADIUS, you must also set the priority for the authentication order for local and RADIUS users, and enable RADIUS. +- If you use NVUE commands to configure RADIUS, you must also: + - Set the priority at which Cumulus Linux contacts a RADIUS server for load balancing. You can set a value between 1 and 100. The lower value is the higher priority. + - Set the priority for the authentication order for local and RADIUS users. You can set a value between 1 and 100. The lower value is the higher priority. + - Enable RADIUS. + +{{%notice note%}} +After you configure any RADIUS settings with NVUE and you run `nv config apply`, you must restart the NVUE service with the `sudo systemctl restart nvued.service` command. +{{%/notice%}} {{< tabs "TabID41 ">}} {{< tab "NVUE Commands ">}} -The following example commmands set: +The following example commands set: - The IP address of the RADIUS server to 192.168.0.254 and the port to 42. - The secret to `'myradius$key'`. - The priority at which Cumulus Linux contacts the RADIUS server to 10. -- The authentication order so that RADIUS authentication has priority over local (the lower number has priority). +- The authentication order to 10 so that RADIUS authentication has priority over local. - The RADIUS option to `enable`. ``` @@ -59,11 +69,11 @@ Edit the `/etc/pam_radius_auth.conf` file to specify the hostname or IP address mapped_priv_user radius_priv_user # server[:port] shared_secret timeout (secs) src_ip -192.168.0.254 secretkey 3 +192.168.0.254:42 myradius$key 3 ... ``` -You must be able to resolve the hostname of the switch to an IP address. If for some reason you cannot find the hostname in DNS, you can add the hostname to the `/etc/hosts` file manually. Be aware that adding the hostname to the `/etc/hosts` file manually can cause problems because DHCP assigns the IP address, which can change at any time. +You must be able to resolve the hostname of the switch to an IP address. If you cannot find the hostname in DNS, you can add the hostname to the `/etc/hosts` file manually. Be aware that adding the hostname to the `/etc/hosts` file manually can cause problems because DHCP assigns the IP address, which can change at any time. Cumulus Linux verifies multiple server configuration lines in the order listed. Other than memory, there is no limit to the number of RADIUS servers you can use. @@ -74,9 +84,12 @@ The server port number is optional. The system looks up the port in the `/etc/se ## Optional RADIUS Configuration -You can configure the following optional settings global RADIUS settings and server specific settings: +You can configure the following global RADIUS settings and server specific settings. -| Option | Description | +{{< tabs "TabID34 ">}} +{{< tab "NVUE Commands ">}} + +| Setting | Description | | ------ | ----------- | | `vrf` | The VRF you want to use to communicate with the RADIUS servers. This is typically the management VRF (`mgmt`), which is the default VRF on the switch. You cannot specify more than one VRF. | | `privilege-level` | The minimum privilege level that determines if users can configure the switch with NVUE commands and sudo, or have read-only rights. The default privilege level is 15, which provides full administrator access. This is a global option only; you cannot set the minimum privilege level for specific RADIUS servers.| @@ -85,9 +98,6 @@ You can configure the following optional settings global RADIUS settings and ser | `source-ipv4`
`source-ipv6`
| A specific interface to reach the RADIUS server. If you configure multiple RADIUS servers, you can configure a specific interface to reach all RADIUS servers. | | `debug` | The debug option for troubleshooting. The debugging messages write to `/var/log/syslog`. When the RADIUS client is working correctly, you can disable the debug option. If you configure multiple RADIUS servers, you can enable the debug option globally for all the servers.| -{{< tabs "TabID34 ">}} -{{< tab "NVUE Commands ">}} - The following example configures global RADIUS settings: ``` @@ -112,38 +122,34 @@ cumulus@switch:~$ nv config apply {{< /tab >}} {{< tab "Linux Commands ">}} -Edit the `/etc/pam_radius_auth.conf` file. An example is shown below. +| Setting | Description | +| ------ | ----------- | +| `vrf` | The VRF you want to use to communicate with the RADIUS servers. This is typically the management VRF (`mgmt`), which is the default VRF on the switch. You cannot specify more than one VRF. | +| `privilege-level` | Determines the privilege level for the user on the switch.| +| `timeout` | The timeout value when a server is slow or latencies are high. You can set a value between 1 and 60. The default timeout is 3 seconds. If you configure multiple RADIUS servers, you can set a global timeout for all servers. | +| `src_ip`
| A specific IPv4 or IPv6 interface to reach the RADIUS server. If you configure multiple RADIUS servers, you can configure a specific interface to reach all RADIUS servers. | +| `debug` | The debug option for troubleshooting. The debugging messages write to `/var/log/syslog`. When the RADIUS client is working correctly, you can disable the debug option. If you configure multiple RADIUS servers, you can enable the debug option globally for all the servers.| + +Edit the `/etc/pam_radius_auth.conf` file. ``` ... -server[:port] shared_secret timeout (secs) src_ip -127.0.0.1 secret 1 -other-server other-secret 3 192.168.3.4 -[2001:0db8:85a3::4]:1812 other6-secret 1 -# -# This allows the radius client to work when a management VRF is in use. -# The syntax is "vrf-name" (keyword) followed by the VRF name, typically "mgmt" -# Since the keyword has an illegal character for a hostname ('-'), this can't -# conflict with a valid hostname -vrf-name mgmt +# Set the minimum privilege level in VSA attribute shell:privilege-level=VALUE +# default is 15, range is 0-15. +privilege-level 10 # -# Set the minimum privilege level in VSA attribute shell:priv-lvl=VALUE -# to be considered a # privileged login (ability to configure via -# nclu 'net' commands, and able to sudo). The default is 15, range is 0-15. -priv-lvl 10 # Uncomment to enable debugging, can be used instead of altering pam files debug -``` +# +# Account for privileged radius user mapping. If you change it here, you need +# to change /etc/nss_mapuser.conf as well +mapped_priv_user radius_priv_user -You can set the value of the VSA (Vendor Specific Attribute) `shell:priv-lvl`, which determines the privilege level for the user on the switch. If the attribute does not return, the user does not have privileges. The following shows an example using the `freeradius` server for a fully privileged user. The VSA vendor name (Cisco-AVPair in the example below) can have any content. The RADIUS client only checks for the string `shell:priv-lvl`. +# server[:port] shared_secret timeout (secs) src_ip +192.168.0.254:42 myradius$key 10 192.168.1.10 +vrf-name mgmt ``` -Service-Type = Administrative-User, -Cisco-AVPair = "shell:roles=network-administrator", -Cisco-AVPair += "shell:priv-lvl=15" -``` - -To set PAM configuration keywords, edit the `/usr/share/pam-configs/radius` file. After you edit the file, you must run the `pam-auth-update --package` command. The `pam_radius_auth (8)` man page describes the PAM configuration keywords. {{< /tab >}} {{< /tabs >}} @@ -221,7 +227,7 @@ To configure local fallback authentication: ## Verify RADIUS Client Configuration -To verify the RADIUS client configuration, log in as a non-privileged user and run an `nv set interface` command. +To verify the RADIUS client configuration, log in as a non-privileged user and run the `nv set interface` command. In this example, the `ops` user is not a privileged RADIUS user so the `ops` user cannot add an interface. diff --git a/content/cumulus-linux-57/System-Configuration/Authentication-Authorization-and-Accounting/Role-Based-Access-Control.md b/content/cumulus-linux-57/System-Configuration/Authentication-Authorization-and-Accounting/Role-Based-Access-Control.md new file mode 100644 index 0000000000..d6c730ba73 --- /dev/null +++ b/content/cumulus-linux-57/System-Configuration/Authentication-Authorization-and-Accounting/Role-Based-Access-Control.md @@ -0,0 +1,247 @@ +--- +title: Role-Based Access Control +author: NVIDIA +weight: 152 +toc: 4 +--- +In addition to the {{}} that Cumulus Linux provides, you can create your own roles to restrict authorization, giving you more granular control over what a user can manage on the switch. For example, you can assign a user the role of network manager and provide the user privileges for interface management, service management and system management. When the user logs in and executes an NVUE command, NVUE checks the user privileges and authorizes the user to run that command. + +Custom role-based access control consists of the following elements: + +| Element | Description | +| ------- | ----------- | +| Role | A virtual identifier for multiple classes (groups). You can assign only one role for a user. For example, for a user that can manage interfaces, you can create a role called `IFMgr`. | +| Class | A class is similar in concept to a Linux group. Creating and managing classes is the simplest way to configure multiple users simultaneously, especially when configuring permissions.

A class consists of:
  • Command paths, which Cumulus Linux bases on the objects in the NVUE declarative model and, which are the same as URI paths; for example; you can use the `/vrf/` command path to allow or deny a user access to all VRFs, or `/system/nat` to allow or deny a user access to NAT configuration. Use the tab key to see available command paths (`nv set system aaa class command-path / <>`).
  • Permissions for the command paths: (`ro`) to run show commands, (`rw`) to run set, unset, and apply commands, (`act`) to run action commands, or (`all`) to run all commands. The default permission setting is `all`.
| +| Action | The action for the class: `allow` or `deny`. | + +{{%notice note%}} +- You can assign a maximum of 64 classes to a role. +- You can configure a maximum of 128 command paths for a class. +- When you configure a command path, you allow or deny a specific schema path and its children. For example the command path `/qos/` allows or denies access to QoS commands, whereas the command path `/qos/egress-scheduler` allows or denies access to QoS egress scheduler commands. +{{%/notice%}} + +The following example describes the permissions for a role (`role1`) that consists of three classes: `class1`, `class2`, `class3` + +**class1** has the `allow` class action and the following command path permissions: + +| Command Path | Permissions | +| ------------ | ----------- | +| `/interface/` | `all`| +| `/interface/*/acl/` | `ro` | +| `/interface/*/ptp/` | `ro` | + +**class2** has the `allow` class action and the following command path permissions: + +| Command Path | Permissions | +| ------------ | ----------- | +| `/system/` | `ro` | +| `/vrf/` | `rw` | + +**class3** has the `deny` class action and the following command path permissions: + +| Command Path | Permissions | +| ------------ | ----------- | +| `/interface/*/evpn/`| `rw` | +| `/interface/*/qos/` | `rw` | + +The following table shows the permissions for a user assigned the role `role1`. In the table, R is read only (RO), W is write, and X is action (ACT). + +| Path | Allow | Deny | Permissions | +| -------- | --------- | ---------- | ----------- | +| `/acl/` | | RWX | Implicit deny | +| `/qos/` | | RWX | Implicit deny | +| All unspecified paths are implicit deny | | | | +| `/interface/` | RWX | | The permissions specified | +| `/interface/*` (* matches all interfaces) | | RWX | Inherited from parent | +| `/interface/*/bond/` | RWX | | Inherited from parent | +| `/interface/*/ip/` | RWX | | Inherited from parent | +| All unspecified children of `/interface/` inherit parent permissions | RWX| | | +| `/interface/*/acl/` | R | WX | The permissions specified | +| `/interface/*/ptp/` | R | WX | The permissions specified | +| `/interface/*/evpn/` | | RWX | The permissions specified | +| `/interface/*/qos/` | | RWX | The permissions specified | +| `/system/` | R | WX | The permissions specified | +| `/system/aaa/` | R | WX |Inherited from parent| +| `/system/api/` | R | WX |Inherited from parent| +| All unspecified children of `/system/` inherit parent permissions | R | | | +| `/vrf/` | RW | X | The permissions specified | +| All unspecified children of `/vrf/` inherit parent permissions| RW | X | | + +## Assign a Custom Role to a User Account + +To assign a custom role to a user account: +- Create a role and classes for the role. +- Assign the action (allow or deny) for each class. +- Add command paths and permissions for each class. +- Assign a role to a user. + +{{%notice note%}} +You assign a custom role to an existing user account. For information about creating user accounts, see {{}} commands. +{{%/notice%}} + +The following example creates the three classes described above for role `role1`. + +`class1` has permissions to manage all interfaces except for ACL and PTP interfaces, which only have `show` permissions: + +``` +cumulus@leaf01:mgmt:~$ nv set system aaa role ROLE1 class class1 +cumulus@leaf01:mgmt:~$ nv set system aaa class class1 action allow +cumulus@leaf01:mgmt:~$ nv set system aaa class class1 command-path /interface/ permission all +cumulus@leaf01:mgmt:~$ nv set system aaa class class1 command-path /interface/*/acl/ permission ro +cumulus@leaf01:mgmt:~$ nv set system aaa class class1 command-path /interface/*/ptp/ permission ro +cumulus@leaf01:mgmt:~$ nv config apply +``` + +`class2` has permissions to only show system commands and to set, unset, and apply VRF commands: + +``` +cumulus@leaf01:mgmt:~$ nv set system aaa role ROLE1 class class2 +cumulus@leaf01:mgmt:~$ nv set system aaa class class2 action allow +cumulus@leaf01:mgmt:~$ nv set system aaa class class2 command-path /system/ permission ro +cumulus@leaf01:mgmt:~$ nv set system aaa class class2 command-path /vrf/ permission rw +cumulus@leaf01:mgmt:~$ nv config apply +``` + +`class3` prevents setting, unsetting, and applying interface commands for EVPN and QOS: + +``` +cumulus@leaf01:mgmt:~$ nv set system aaa role ROLE1 class class3 +cumulus@leaf01:mgmt:~$ nv set system aaa class class3 action deny +cumulus@leaf01:mgmt:~$ nv set system aaa class class3 command-path /interface/*/evpn/ permission rw +cumulus@leaf01:mgmt:~$ nv set system aaa class class3 command-path /interface/*/qos/ permission rw +cumulus@leaf01:mgmt:~$ nv config apply +``` + +The following command assigns user `admin2` the role `role1`: + +``` +cumulus@leaf01:mgmt:~$ nv set system aaa user admin2 role role1 +cumulus@leaf01:mgmt:~$ nv config apply +``` + +## Delete Custom Roles + +To delete a custom role and all its classes, you must first unassign the role from the user, then delete the role: + +``` +cumulus@switch:~$ nv unset system aaa user admin2 role role1 +cumulus@switch:~$ nv unset system aaa role role1 +cumulus@switch:~$ nv config apply +``` + +To delete a class from a role, run the `nv unset system aaa role class ` command: + +``` +cumulus@switch:~$ nv unset system aaa role role1 class class2 +cumulus@switch:~$ nv config apply +``` + +## Show Custom Role Information + +To show the user accounts configured on the system, run the NVUE `nv show system aaa user` command or the Linux `sudo cat /etc/passwd` command. + +``` +cumulus@switch:~$ nv show system aaa user +Username Full-name Role enable Summary +---------------- ---------------------------------- ------- ------ ------- +_apt Unknown system +_lldpd Unknown system +backup backup Unknown system +bin bin Unknown system +cumulus cumulus,,, Unknown on +daemon daemon Unknown system +dnsmasq dnsmasq,,, Unknown system +frr Frr routing suite,,, Unknown system +games games Unknown system +gnats Gnats Bug-Reporting System (admin) Unknown system +irc ircd Unknown system +list Mailing List Manager Unknown system +lp lp Unknown system +mail mail Unknown system +man man Unknown system +messagebus Unknown system +news news Unknown system +nobody nobody Unknown off +ntp Unknown system +nvue NVIDIA User Experience Unknown system +proxy proxy Unknown system +root root Unknown system +snmp Unknown system +sshd Unknown system +sync sync Unknown system +sys sys Unknown system +systemd-coredump systemd Core Dumper Unknown system +systemd-network systemd Network Management,,, Unknown system +systemd-resolve systemd Resolver,,, Unknown system +systemd-timesync systemd Time Synchronization,,, Unknown system +admin2 role1 on +uucp uucp Unknown system +uuidd Unknown system +www-data www-data Unknown system +``` + +To show information about a specific user account including the role assigned to the user, run the NVUE `nv show system aaa user ` command: + +``` +cumulus@switch:~$ nv show system aaa user admin2 + operational applied +--------- ----------- ------- +role role1 role1 +full-name +enable on on +``` + +To show all the roles configured on the switch, run the NVUE `nv show system aaa role` command: + +``` +cumulus@switch:~$ nv show system aaa role +Role Class +------------ ------- +nvue-admin nvapply +nvue-monitor nvshow +role1 class1 + class2 + class3 +system-admin nvapply + sudo +``` + +To show the classes applied to specific role, run the `nv show system aaa role ` command: + +``` +cumulus@switch:~$ nv show system aaa role role1 + applied +------- ------- +[class] class1 +[class] class2 +[class] class3 +``` + +To show all the classes configured on the switch, run the `nv show system aaa class` command: + +``` +cumulus@switch:~$ nv show system aaa class +Class Name Command Path Permission Action +---------- ------------------ ---------- ------ +class1 /interface/ all allow + /interface/*/acl/ ro + /interface/*/ptp/ ro +class2 /system/ ro allow + /vrf/ rw +class3 /interface/*/evpn/ rw deny + /interface/*/qos/ rw +nvapply / all allow +nvshow / ro allow +sudo / all allow +``` + +To show the configuration and state of the command paths for a class, run the `nv show system aaa class ` command: + +``` +cumulus@switch:~$ nv show system aaa class class3 + applied +-------------- ------------------ +action deny +[command-path] /interface/*/evpn/ +[command-path] /interface/*/qos/ +``` diff --git a/content/cumulus-linux-57/System-Configuration/Authentication-Authorization-and-Accounting/TACACS.md b/content/cumulus-linux-57/System-Configuration/Authentication-Authorization-and-Accounting/TACACS.md index 7bc2fc0798..40bd1cd81c 100644 --- a/content/cumulus-linux-57/System-Configuration/Authentication-Authorization-and-Accounting/TACACS.md +++ b/content/cumulus-linux-57/System-Configuration/Authentication-Authorization-and-Accounting/TACACS.md @@ -41,12 +41,16 @@ After you install the required TACACS+ packages, configure the following require If you use NVUE commands to configure TACACS+, you must also set the priority for the authentication order for local and TACACS+ users, and enable TACACS+. +{{%notice note%}} +After you configure any TACACS+ settings with NVUE and you run `nv config apply`, you must restart the NVUE service with the `sudo systemctl restart nvued.service` command. +{{%/notice%}} + {{< tabs "TabID31 ">}} {{< tab "NVUE Commands ">}} NVUE commands require you to specify the priority for each TACACS+ server. You must set a priority even if you only specify one server. -The following example commmands set: +The following example commands set: - The TACACS+ server priority to 5. - The IP address of the server to 192.168.0.30. - The secret to `mytacac$key`. @@ -688,4 +692,4 @@ You need to configure certain TACACS+ servers to allow authorization requests be If you configure multiple TACACS+ servers that have different user accounts: - TACACS+ *authentication* allows for fall through; if the first reachable server does not authenticate the user, the client tries the second server, and so on. -- TACACS *authorization* does not fall through. If the first reachable server returns an *unauthorized* result, the command is unauthorized and the client does not try the next server. +- TACACS *authorization* does not fall through. If the first reachable server returns an *unauthorized* result, the client does not try the next server. diff --git a/content/cumulus-linux-57/System-Configuration/Authentication-Authorization-and-Accounting/User-Accounts.md b/content/cumulus-linux-57/System-Configuration/Authentication-Authorization-and-Accounting/User-Accounts.md index 8ad95d0b90..18c951152f 100644 --- a/content/cumulus-linux-57/System-Configuration/Authentication-Authorization-and-Accounting/User-Accounts.md +++ b/content/cumulus-linux-57/System-Configuration/Authentication-Authorization-and-Accounting/User-Accounts.md @@ -73,7 +73,7 @@ cumulus@switch:~$ nv config apply You can also run the `nv set system aaa user password ` command to specify the plain text password inline. This command bypasses the `Enter new password` and `Confirm password` prompts but displays the plain text password as you type it. {{%notice note%}} -If you are an NVUE-mangaged user, you can update your own password with the Linux `passwd` command. +If you are an NVUE-managed user, you can update your own password with the Linux `passwd` command. {{%/notice%}} {{< /tab >}} @@ -99,64 +99,7 @@ Only the following user accounts can create, modify, and delete other `system-ad - Non NVUE-managed users that are in the `sudo` group. {{%/notice%}} -### Custom Roles - -In addition to the default roles that Cumulus Linux provides, you can create your own roles to restrict authorization, giving you more granular control over what a user can manage on the switch. For example, you can assign a user the role of Network Manager and provide the user privileges for interface management, service management and system management. When the user logs in and executes an NVUE command, NVUE checks the user privileges and authorizes the user to run that command. - -Custom role-based access control consists of the following elements: - -| Element | Description | -| ------- | ----------- | -| Role | A virtual identifier for multiple classes (groups). You can assign only one role for a user. For example, for a user that can manage interfaces, you can create a role called `IFMgr`. | -| Class | A class is similar in concept to a Linux group. Creating and managing classes is the simplest way to configure multiple users simultaneously, especially when configuring permissions. You can assign a maximum of 64 classes to a role.
A class consists of:
- Command paths, which are based on the objects in the NVUE declarative model and are the same as URI paths; for example; you can use the `interface/vrf*` command path to allow or deny a user access to all VRFs, or `/system/hostname` to allow or deny a user access to hostname configuration. You can configure a maximum of 128 command paths.
- Permissions for the command paths: (`ro`) to run show commands, (`rw`) to run set, unset, and apply commands, (`act`) to run action commands, or (`all`) to run all commands. The default permission setting is `all`.| -| Action | The action for the class; `allow` or `deny`. | - -To add a new user account and assign the user a custom role: -- Assign a role to a user. -- Assign a password for the user. -- Create classes for the role. Add command paths and permissions for each class. -- Assign the action (`allow` or `deny`) for each class. - -The following example assigns user1 the role of `switch-admin`. user1 can manage the entire switch except for authentication, authorization, and accounting settings (`system aaa`). - -``` -cumulus@switch:~$ nv set system aaa user user1 role switch-admin -cumulus@switch:~$ nv set system aaa user user1 password -cumulus@switch:~$ nv set system aaa role switch-admin class nvapply -cumulus@switch:~$ nv set system aaa class nvapply action allow -cumulus@switch:~$ nv set system aaa class nvapply command-path * permission all -cumulus@switch:~$ nv set system aaa role switch-admin class nvshow -cumulus@switch:~$ nv set system aaa class nvshow action allow -cumulus@switch:~$ nv set system aaa class nvshow command-path * permission all -cumulus@switch:~$ nv set system aaa role switch-admin class restrict -cumulus@switch:~$ nv set system aaa class restrict action deny -cumulus@switch:~$ nv set system aaa class restrict command-path /system/aaa/* -cumulus@switch:~$ nv config apply -``` - -The following example assigns user2 the role of `IFMgr`. user2 can manage the loopback, management, eth0, and swp1 through 5 interfaces, and all VRFs. - -``` -cumulus@switch:~$ nv set system aaa user user2 role IFMgr -cumulus@switch:~$ nv set system aaa role IFMgr class InterfaceMgmt_1 -cumulus@switch:~$ nv set system aaa class InterfaceMgmt_1 action allow -cumulus@switch:~$ nv set system aaa class InterfaceMgmt_1 command-path interface/lo permission all -cumulus@switch:~$ nv set system aaa class InterfaceMgmt_1 command-path interface/mgmt permission all -cumulus@switch:~$ nv set system aaa class InterfaceMgmt_1 command-path interface/eth0 permission all -cumulus@switch:~$ nv set system aaa class InterfaceMgmt_1 command-path interface/vrf* permission all -cumulus@switch:~$ nv set system aaa class InterfaceMgmt_1 command-path interface/swp[1-5]/* permission all -cumulus@switch:~$ nv config apply -``` - -The following example assigns user3 the role of `OSPF`. user3 does **not** have permissions to manage OSPF on an interface. - -``` -cumulus@switch:~$ nv set system aaa user user3 role OSPF -cumulus@switch:~$ nv set system aaa role IFMgr class OSPF-DENY -cumulus@switch:~$ nv set system aaa class InterfaceMgmt_1 action deny -cumulus@switch:~$ nv set system aaa class InterfaceMgmt_1 command-path interface/.*/router/ospf permission all -cumulus@switch:~$ nv config apply -``` +You can also create custom roles and assign a custom role to a user. See {{}}. ### Hashed Passwords @@ -278,26 +221,57 @@ cumulus@switch:~$ sudo userdel admin2 To show the user accounts configured on the system, run the NVUE `nv show system aaa` command or the linux `sudo cat /etc/passwd` command. ``` -cumulus@switch:~$ nv show system aaa -Username Full-name Role enable ----------------- ---------------------------------- ------------ ------ -Debian-snmp Unknown system -_apt Unknown system -_lldpd Unknown system -admin2 FIRST LAST system-admin on -... +cumulus@switch:~$ nv show system aaa user +Username Full-name Role enable Summary +---------------- ---------------------------------- ------- ------ ------- +_apt Unknown system +_lldpd Unknown system +backup backup Unknown system +bin bin Unknown system +cumulus cumulus,,, Unknown on +daemon daemon Unknown system +dnsmasq dnsmasq,,, Unknown system +frr Frr routing suite,,, Unknown system +games games Unknown system +gnats Gnats Bug-Reporting System (admin) Unknown system +irc ircd Unknown system +list Mailing List Manager Unknown system +lp lp Unknown system +mail mail Unknown system +man man Unknown system +messagebus Unknown system +news news Unknown system +nobody nobody Unknown off +ntp Unknown system +nvue NVIDIA User Experience Unknown system +proxy proxy Unknown system +root root Unknown system +snmp Unknown system +sshd Unknown system +sync sync Unknown system +sys sys Unknown system +systemd-coredump systemd Core Dumper Unknown system +systemd-network systemd Network Management,,, Unknown system +systemd-resolve systemd Resolver,,, Unknown system +systemd-timesync systemd Time Synchronization,,, Unknown system +user1 OSPF on +user2 IFMgr on +uucp uucp Unknown system +uuidd Unknown system ``` -To show information about a specific user account, run the run the NVUE `nv show system aaa user ` command: +To show information about a specific user account, run the NVUE `nv show system aaa user ` command: ``` -cumulus@switch:~$ nv show system aaa user admin2 - operational applied ---------------- ------------ ------------ -full-name FIRST LAST FIRST LAST -hashed-password * * -role system-admin system-admin -enable on on +cumulus@switch:~$ nv show system aaa user cumulus + operational applied +------------------ ----------- ------- +role Unknown +full-name cumulus,,, +hashed-password * +ssh + [authorized-key] +enable on ``` ## Enable the root User diff --git a/content/cumulus-linux-57/System-Configuration/Configuring-switchd.md b/content/cumulus-linux-57/System-Configuration/Configuring-switchd.md index 76a15329b9..52ff80f0a9 100644 --- a/content/cumulus-linux-57/System-Configuration/Configuring-switchd.md +++ b/content/cumulus-linux-57/System-Configuration/Configuring-switchd.md @@ -31,7 +31,7 @@ A low setting, such as 1, might affect system performance. - The log level to debug the data plane programming related code. You can specify `debug`, `info`, `notice`, `warning`, or `error`. The default setting is `info`. NVIDIA recommends that you do not set the log level to debug in a production environment. - The DSCP action and value for encapsulation. You can set the DSCP action to `copy` (to copy the value from the IP header of the packet), `set` (to specify a specific value), or `derive` (to obtain the value from the switch priority). The default action is `derive`. Only specify a value if the action is `set`. - The DSCP action for decapsulation in VXLAN outer headers. You can specify `copy` (to copy the value from the IP header of the packet), `preserve` (to keep the inner DSCP value), or `derive` (to obtain the value from the switch priority). The default action is `derive`. -- The preference between a route and neighbor with the same IP address and mask. You can specify `route`, `neighbor`, or `route-and-neighbour`. The default setting is `route`. +- The preference between a route and neighbor with the same IP address and mask. You can specify `route`, `neighbor`, or `route-and-neighbor`. The default setting is `route`. - The ACL mode (atomic or non-atomic). The default setting is `atomic`. - The reserved VLAN range. The default setting is 3725-3999. @@ -71,7 +71,7 @@ cumulus@switch:~$ nv set nve vxlan decapsulation dscp action preserve cumulus@switch:~$ nv config apply ``` -The following command example sets the route or neighbour preference to both route and neighbour: +The following command example sets the route or neighbor preference to both route and neighbor: ``` cumulus@switch:~$ nv set system forwarding host-route-preference route-and-neighbour @@ -149,9 +149,9 @@ Restarting the `switchd` service causes all network ports to reset in addition t | `nat.table_size` | The NAT table size limit in number of entries. You can configure this setting only when `nat.dynamic_enable` is set to TRUE.
The default setting is 1024. | restart | | `nat.config_table_size` | The NAT configuration table size limit in number of entries. You can configure this setting only when `nat.dynamic_enable` is set to TRUE.
The default setting is 64. | restart | | `logging` | Configures logging in the format BACKEND=LEVEL. Separate multiple BACKEND=LEVEL pairs with a space. The BACKEND value can be `stderr`, `file:filename`, `syslog`, `program:executable`. The LEVEL value can be `CRIT`, `ERR`, `WARN`, `INFO`, `DEBUG`.
The default value is `syslog=INFO`| restart | -| `interface.swp1.storm_control.broadcast` | Enables broadcast storm control and sets the number of packets per second (pps).
The default setting is 400. | reload | -| `interface.swp1.storm_control.multicast` | Enables multicast storm control and sets the number of packets per second (pps).
The default setting is 3000. | reload | -| `interface.swp1.storm_control.unknown_unicast` | Enables unicast storm control and sets the number of packets per second (pps).
The default setting is 2000. | reload | +| `interface..storm_control.broadcast` | Enables broadcast storm control and sets the number of packets per second (pps).
The default setting is 400. | reload | +| `interface..storm_control.multicast` | Enables multicast storm control and sets the number of packets per second (pps).
The default setting is 3000. | reload | +| `interface..storm_control.unknown_unicast` | Enables unicast storm control and sets the number of packets per second (pps).
The default setting is 2000. | reload | | `stats.vlan.aggregate` | Enables hardware statistics for VLANs and specifies the type of statistics needed. You can specify NONE, BRIEF, or DETAIL.
The default setting is BRIEF. | restart | | `stats.vxlan.aggregate` | Enables hardware statistics for VXLANs and specifies the type of statistics needed. You can specify NONE, BRIEF, or DETAIL.
The default setting is DETAIL. | restart | | `stats.vxlan.member` | Enables hardware statistics for VXLAN members and specifies the type of statistics needed. You can specify NONE, BRIEF, or DETAIL.
The default setting is BRIEF. | restart | @@ -167,9 +167,9 @@ Restarting the `switchd` service causes all network ports to reset in addition t | `bridge.unreg_v6_mcast_prune` | Enables unregistered layer 2 multicast prune to mrouter ports (IPv6).
The default setting is FALSE (flood unregistered layer 2 multicast traffic). | restart | | `netlink libnl logger` | The default setting is [0-5]. | restart | | `netlink.nl_logger` | The default setting is 0. | restart | -| `vxlan.def_encap_dscp_action` | Sets the default VXLAN router DSCP action during encapsulation. You can specify `copy` if the inner packet is IP, `set` to set a specific value, or `derive` to derive the value from the switch priority.
The default setting is `derive`. | restart | -| `vxlan.def_encap_dscp_value` | Sets the default VXLAN encapsulation DSCP value if the action is `set`.
| restart | -| `vxlan.def_decap_dscp_action` | Sets the default VXLAN router DSCP action during decapsulation. You can specify `copy` if the inner packet is IP, `preserve` to preserve the inner DSCP value, or `derive` to derive the value from the switch priority.
The default setting is `derive`. | restart | +| `vxlan.def_encap_dscp_action` | Sets the default VXLAN router DSCP action during encapsulation. You can specify `copy` if the inner packet is IP, `set` to set a specific value, or `derive` to derive the value from the switch priority.
The default setting is `derive`. | reload | +| `vxlan.def_encap_dscp_value` | Sets the default VXLAN encapsulation DSCP value if the action is `set`.
| reload | +| `vxlan.def_decap_dscp_action` | Sets the default VXLAN router DSCP action during decapsulation. You can specify `copy` if the inner packet is IP, `preserve` to preserve the inner DSCP value, or `derive` to derive the value from the switch priority.
The default setting is `derive`. | reload | | `ipmulticast.unknown_ipmc_to_cpu` | Enables sending unknown IPMC to the CPU.
The default setting is FALSE. | restart | | `vrf_route_leak_enable_dynamic` | Enables dynamic VRF route leaking.
The default setting is FALSE. | restart | | `sync_queue_depth_val` | The event queue depth.
The default setting is 50000. | restart | diff --git a/content/cumulus-linux-57/System-Configuration/Date-and-Time/Network-Time-Protocol-NTP.md b/content/cumulus-linux-57/System-Configuration/Date-and-Time/Network-Time-Protocol-NTP.md index 717233ddc0..94f007c447 100644 --- a/content/cumulus-linux-57/System-Configuration/Date-and-Time/Network-Time-Protocol-NTP.md +++ b/content/cumulus-linux-57/System-Configuration/Date-and-Time/Network-Time-Protocol-NTP.md @@ -1,7 +1,7 @@ --- title: Network Time Protocol - NTP author: NVIDIA -weight: 126 +weight: 124 toc: 3 --- The `ntpd` daemon running on the switch implements the NTP protocol. It synchronizes the system time with time servers in the `/etc/ntp.conf` file. The `ntpd` daemon starts at boot by default. diff --git a/content/cumulus-linux-57/System-Configuration/Date-and-Time/Precision Time Protocol-PTP.md b/content/cumulus-linux-57/System-Configuration/Date-and-Time/Precision Time Protocol-PTP.md index 0121a10364..86de7523da 100644 --- a/content/cumulus-linux-57/System-Configuration/Date-and-Time/Precision Time Protocol-PTP.md +++ b/content/cumulus-linux-57/System-Configuration/Date-and-Time/Precision Time Protocol-PTP.md @@ -1,7 +1,7 @@ --- title: Precision Time Protocol - PTP author: NVIDIA -weight: 128 +weight: 126 toc: 3 --- Cumulus Linux supports IEEE 1588-2008 Precision Timing Protocol (PTPv2), which defines the algorithm and method for synchronizing clocks of various devices across packet-based networks, including Ethernet switches and IP routers. @@ -33,6 +33,7 @@ Cumulus Linux supports: {{%notice note%}} - On NVIDIA switches with Spectrum-2 and later, PTP is not supported on 1G interfaces. +- On Spectrum-4 switches, PTP is Beta. - You cannot run *both* PTP and NTP on the switch. - PTP supports the default VRF only. {{%/notice%}} @@ -250,7 +251,7 @@ Restarting the `switchd` service causes all network ports to reset in addition t delay_mechanism E2E ``` - For a trunk VLAN, add the VLAN configuration to the switch port stanza: set `l2_mode` to `trunk`, `vlan_intf` to the VLAN interface, and `src_ip` to the IP adress of the VLAN interface: + For a trunk VLAN, add the VLAN configuration to the switch port stanza: set `l2_mode` to `trunk`, `vlan_intf` to the VLAN interface, and `src_ip` to the IP address of the VLAN interface: ``` [swp1] @@ -263,7 +264,7 @@ Restarting the `switchd` service causes all network ports to reset in addition t network_transport UDPv4 ``` - For a switch port VLAN, add the VLAN configuration to the switch port stanza: set `l2_mode` to `access`, `vlan_intf` to the VLAN interface, and `src_ip` to the IP adress of the VLAN interface: + For a switch port VLAN, add the VLAN configuration to the switch port stanza: set `l2_mode` to `access`, `vlan_intf` to the VLAN interface, and `src_ip` to the IP address of the VLAN interface: ``` [swp2] @@ -483,6 +484,151 @@ cumulus@switch:~$ sudo systemctl restart ptp4l.service {{< /tab >}} {{< /tabs >}} +### Noise Transfer Servo + +ITU-T specifies the following key elements to measure, test, and classify the accuracy of a clock: +- Noise generation—jitter and wander noise in the output of a clock in reference to a [PRTC](## "Primary Reference Time Clock"). +- Noise tolerance—how much noise the clock can tolerate before it switches to another stable source. +- Noise transfer—smoothe out the input noise so that noise does not accumulate and increase over a network of clocks. +- Transient response—the response from the clock to a transient. +- Hold over—the time interval during which the clock maintains its output after losing the input reference signal. + +Cumulus Linux PTP has an option to use a servo specifically designed to handle ITU-T’s Noise Transfer specification. When you use this option, the [PHC](## "Physical Hardware Clock") is disciplined by Noise Transfer Servo, which smoothes the jitter and wander noise from the Master clock. + +{{%notice note%}} +- To use Noise Transfer Servo, you need to enable SyncE on the switch and on PTP interfaces. +- Cumulus Linux supports Noise Transfer Servo on Spectrum ASICs that support SyncE. +- NVIDIA recommends you do not change the default Noise Transfer Servo configuration parameters. +- NVIDIA recommends you use Noise Transfer Servo with PTP Telecom profiles. If you use other profiles or choose not to use a profile, make sure to set the sync interval to -3 or better. +{{%/notice%}} + +To enable Noise Transfer Servo: + +{{< tabs "TabID500 ">}} +{{< tab "NVUE Commands ">}} + +The following example enables PTP, sets the profile to `default-itu-8275-1`, enables SyncE, enables PTP on swp3, and enables Noise Transfer Servo. + +``` +cumulus@switch:~$ nv set service ptp 1 enable on +cumulus@switch:~$ nv set service ptp 1 current-profile default-itu-8275-1 +cumulus@switch:~$ nv set system synce enable on +cumulus@switch:~$ nv set interface swp3 ptp enable on +cumulus@switch:~$ nv set service ptp 1 servo noise-transfer +cumulus@switch:~$ nv config apply +``` + +{{< /tab >}} +{{< tab "Linux Commands ">}} + +Edit the `/etc/ptp4l.conf` and the `/etc/firefly_servo/servo.conf` files; see examples below. + +``` +cumulus@switch:~$ sudo nano /etc/ptp4l.conf +[global] +# +# Default Data Set +# +slaveOnly 0 +free_running 1 +slave_event_monitor /var/run/servo_slave_event_monitor +priority1 128 +priority2 128 +domainNumber 24 + +twoStepFlag 1 +dscp_event 46 +dscp_general 46 +network_transport L2 +dataset_comparison G.8275.x +G.8275.defaultDS.localPriority 128 +ptp_dst_mac 01:80:C2:00:00:0E +# +# Port Data Set +# +logAnnounceInterval -3 +logSyncInterval -4 +logMinDelayReqInterval -4 +announceReceiptTimeout 3 +delay_mechanism E2E + +offset_from_master_min_threshold -50 +offset_from_master_max_threshold 50 +mean_path_delay_threshold 200 +tsmonitor_num_ts 100 +tsmonitor_num_log_sets 2 +tsmonitor_num_log_entries 4 +tsmonitor_log_wait_seconds 1 +# +# Run time options +# +logging_level 6 +path_trace_enabled 0 +use_syslog 1 +verbose 0 +summary_interval 0 +# +# servo parameters +# +pi_proportional_const 0.000000 +pi_integral_const 0.000000 +pi_proportional_scale 0.700000 +pi_proportional_exponent -0.300000 +pi_proportional_norm_max 0.700000 +pi_integral_scale 0.300000 +pi_integral_exponent 0.400000 +pi_integral_norm_max 0.300000 +first_step_threshold 0.000020 +step_threshold 0.000000025 +servo_offset_threshold 20 +servo_num_offset_values 10 +write_phase_mode 1 +max_frequency 50000000 +sanity_freq_limit 0 +# +# Default interface options +# +time_stamping hardware + +[swp3] +udp_ttl 1 +masterOnly 0 +delay_mechanism E2E +``` + +``` +cumulus@switch:~$ sudo nano /etc/firefly_servo/servo.conf +[global] +free_running 0 +domainNumber 24 + +offset_from_master_min_threshold -50 +offset_from_master_max_threshold 50 + +# Debugging & Logging +doca_logging_level 50 + +init_max_time_adjustment 0 +max_time_adjustment 1500 +hold_over_timer 0 +# Sampling Window & servo logic +servo_window_timer 3000 +servo_window_min_samples 10 +servo_num_offset_values 5 +``` + +{{< /tab >}} +{{< /tabs >}} + +To show Noise Transfer Servo configuration settings, run the `nv show service ptp servo` command: + +``` +cumulus@switch:~$ nv show service ptp 1 servo + operational applied +----- ----------- -------------- +servo noise-transfer +``` + ## Optional Global Configuration Optional global PTP configuration includes configuring the DiffServ code point (DSCP). You can configure the DSCP value for all PTP IPv4 packets originated locally. You can set a value between 0 and 63. @@ -539,7 +685,7 @@ When a profile is in use, avoid configuring the following interface configuratio By default, Cumulus Linux encapsulates PTP messages in UDP IPV4 frames. To encapsulate PTP messages on an interface in UDP IPV6 frames: -{{< tabs "TabID274 ">}} +{{< tabs "TabID557 ">}} {{< tab "NVUE Commands ">}} ``` @@ -1044,7 +1190,7 @@ Cumulus Linux supports the following predefined profiles: - You cannot set global PTP parameters in a profile currently in use. - PTP profiles do not support VLANs or bonds. - If you set a predefined or custom profile, do not change any global PTP settings, such as the [DSCP](## "DiffServ code point") or the clock domain. -- For better performance in a high scale network with PTP on multiple interfaces, configure a higher system policer rate with the `nv set system control-plane policer lldp burst ` and `nv set system control-plane policer lldp rate ` commands. The switch uses the LLDP policer for PTP protocol packets. The default value for the LLDP policer is 2500. When you use the ITU 8275.1 profile with higher sync rates, use higher policer values. +- For better performance in a high scale network with PTP on multiple interfaces, configure a higher system policer rate with the `nv set system control-plane policer lldp-ptp burst ` and `nv set system control-plane policer lldp-ptp rate ` commands. The switch uses the LLDP policer for PTP protocol packets. The default value for the LLDP policer is 2500. When you use the ITU 8275.1 profile with higher sync rates, use higher policer values. {{%/notice%}} ### Set a Predefined Profile @@ -1174,7 +1320,7 @@ To create a custom profile: - Update any of the profile settings you want to change (`announce-interval`, `delay-req-interval`, `priority1`, `sync-interval`, `announce-timeout`, `domain`, `priority2`, `transport`, `delay-mechanism`, `local-priority`). - Set the custom profile to be the current profile. -The following example commands create a custom profile called CUSTOM1 based on the predifined profile ITU 8275-1. The commands set the `domain` to 28 and the `announce-timeout` to 3, then set `CUSTOM1` to be the current profile: +The following example commands create a custom profile called CUSTOM1 based on the predefined profile ITU 8275-1. The commands set the `domain` to 28 and the `announce-timeout` to 3, then set `CUSTOM1` to be the current profile: ``` cumulus@switch:~$ nv set service ptp 1 profile CUSTOM1 @@ -1188,7 +1334,7 @@ cumulus@switch:~$ nv config apply {{< /tab >}} {{< tab "Linux Commands ">}} -The following example `/etc/ptp4l.conf` file creates a custom profile based on the predifined profile ITU 8275-1 and sets the `domain` to 28 and the `announce-timeout` to 3. +The following example `/etc/ptp4l.conf` file creates a custom profile based on the predefined profile ITU 8275-1 and sets the `domain` to 28 and the `announce-timeout` to 3. ``` cumulus@switch:~$ sudo nano /etc/ptp4l.conf @@ -1429,10 +1575,10 @@ You can configure the following monitor settings: | ----- | ----------- | | `nv set service ptp monitor min-offset-threshold` | Sets the minimum difference allowed between the master and slave time. You can set a value between -1000000000 and 0 nanoseconds. The default value is -50 nanoseconds.| | `nv set service ptp monitor max-offset-threshold` | Sets the maximum difference allowed between the master and slave time. You can set a value between 0 and 1000000000 nanoseconds. The default value is 50 nanoseconds.| -| `nv set service ptp monitor path-delay-threshold` | Sets the mean time that PTP packets take to travel between the master and slave. You can set a value between 0 and 1000000000 nanoseconds . The default value is 200 nanoseconds. | +| `nv set service ptp monitor path-delay-threshold` | Sets the mean time that PTP packets take to travel between the master and slave. You can set a value between 0 and 1000000000 nanoseconds. The default value is 200 nanoseconds. | | `nv set service ptp monitor max-timestamp-entries` | Sets the maximum number of timestamp entries allowed. Cumulus Linux updates the timestamps continuously. You can specify a value between 100 and 200. The default value is 100 entries.| -The following example sets the minimum offeset threshold to -1000, the maximum offeset threshold to 1000, and the path delay threshold to 300: +The following example sets the minimum offset threshold to -1000, the maximum offset threshold to 1000, and the path delay threshold to 300: ``` cumulus@switch:~$ nv set service ptp 1 monitor min-offset-threshold -1000 @@ -1452,7 +1598,7 @@ You can configure the following monitor settings manually in the `/etc/ptp4l.con | `offset_from_master_max_threshold` | Sets the maximum difference allowed between the master and slave time. You can set a value between 0 and 1000000000 nanoseconds. The default value is 50 nanoseconds. | | `mean_path_delay_threshold` | Sets the mean time that PTP packets take to travel between the master and slave. You can set a value between 0 and 1000000000 nanoseconds. The default value is 200 nanoseconds. | -The following example sets the minimum offeset threshold to -1000, the maximum offeset threshold to 1000, and the path delay threshold to 300: +The following example sets the minimum offset threshold to -1000, the maximum offset threshold to 1000, and the path delay threshold to 300: ``` cumulus@switch:~$ sudo nano /etc/ptp4l.conf @@ -1508,11 +1654,11 @@ You can configure the following monitor settings manually in the `/etc/ptp4l.con | Parameter | Description | | ----- | ----------- | -| `tsmonitor_num_log_sets` | Sets the maxumum number of log sets allowed. You can specify a value between 2 and 4. The default value is 3.| +| `tsmonitor_num_log_sets` | Sets the maximum number of log sets allowed. You can specify a value between 2 and 4. The default value is 3.| | `tsmonitor_num_log_entries` | Sets the maximum number of log entries allowed in a log set. You can specify a value between 4 and 8. The default value is 4.| | `tsmonitor_log_wait_seconds` | Sets the number of seconds to wait before logging back-to-back violations. You can specify a value between 0 and 60. The default value is 1.| -The following example sets the maxumum number of log sets allowed to 4, the maximum number of log entries allowed to 6, and the violation log interval to 10: +The following example sets the maximum number of log sets allowed to 4, the maximum number of log entries allowed to 6, and the violation log interval to 10: ``` cumulus@switch:~$ sudo nano /etc/ptp4l.conf @@ -1550,7 +1696,7 @@ PTP monitoring provides commands to show counters for violations as well as the | Command | Description | | -------- | ----------- | | `nv show service ptp monitor timestamp-log` | Shows the last 25 PTP timestamps. | -| `nv show service ptp monitor violations` | Shows the threshold violation count and the last time a violation of a specific type occured. | +| `nv show service ptp monitor violations` | Shows the threshold violation count and the last time a violation of a specific type occurred. | | `nv show service ptp 1 monitor violations log acceptable-master` | Shows logs with violations that occur when a PTP server not in the Acceptable Master table sends an Announce request. | | `nv show service ptp 1 monitor violations log forced-master` | Shows logs with violations that occur when a forced master port gets a higher clock. | | `nv show service ptp 1 monitor violations log max-offset` | Shows logs with violations that occur when the timestamp offset is higher than the max offset threshold. | @@ -1947,7 +2093,7 @@ network_transport UDPv4 ### PTP Traffic Shaping -To improve performance on the NVIDA Spectrum 1 switch for PTP-enabled ports with speeds lower than 100G, you can enable a pre-defined traffic shaping profile. For example, if you see that the PTP timing offset varies widely and does not stabilize, enable PTP shaping on all PTP enabled ports to reduce the bandwidth on the ports slightly and improve timing stabilization. +To improve performance on the NVIDIA Spectrum 1 switch for PTP-enabled ports with speeds lower than 100G, you can enable a pre-defined traffic shaping profile. For example, if you see that the PTP timing offset varies widely and does not stabilize, enable PTP shaping on all PTP enabled ports to reduce the bandwidth on the ports slightly and improve timing stabilization. {{%notice note%}} - Switches with Spectrum-2 and later do not support PTP shaping. diff --git a/content/cumulus-linux-57/System-Configuration/Date-and-Time/Pulse-Per-Second-PPS.md b/content/cumulus-linux-57/System-Configuration/Date-and-Time/Pulse-Per-Second-PPS.md new file mode 100644 index 0000000000..a13676f5f9 --- /dev/null +++ b/content/cumulus-linux-57/System-Configuration/Date-and-Time/Pulse-Per-Second-PPS.md @@ -0,0 +1,337 @@ +--- +title: Pulse Per Second - PPS +author: NVIDIA +weight: 127 +toc: 3 +--- +[PPS](## "Pulse per second") is the simplest form of synchronization. The PPS source provides a signal precisely every second. The switch is capable of using an external PPS signal to synchronize its [PHC](## "Physical Hardware Clock") (for PPS In) and can also generate the PPS signal that other devices can use to synchronize their clocks (for PPS Out). +- In PPS In mode, the switch can use an external PPS signal to adjust the phase of its PHC. The PPS signal does not provide [ToD](## "Time Of Day"), so Cumulus Linux uses PTP for ToD; you must configure a PTP slave port on the switch for PPS In. +- In PPS Out mode, the switch can output the PPS signal. The switch can use this signal to check the accuracy of its PHC frequency and other devices can use this signal to synchronize their PHC. + +{{%notice note%}} +Cumulus Linux supports PPS for the NVIDIA SN3750-SX switch only. +{{%/notice%}} + +## Enable PPS Synchronization + +To enable PPS synchronization: + +{{< tabs "TabID498 ">}} +{{< tab "NVUE Commands ">}} + +{{< tabs "TabID501 ">}} +{{< tab "Enable PPS In ">}} + +Before you enable PPS In, make sure to configure a PTP slave port on the switch. See {{}} + +``` +cumulus@switch:~$ nv set platform pulse-per-second in state enabled +cumulus@switch:~$ nv config apply +``` + +{{< /tab >}} +{{< tab "Enable PPS Out ">}} + +``` +cumulus@switch:~$ nv set platform pulse-per-second out state enabled +cumulus@switch:~$ nv config apply +``` + +{{< /tab >}} +{{< /tabs >}} + +{{< /tab >}} +{{< tab "Linux Commands ">}} + +{{< tabs "TabID522 ">}} +{{< tab "Enable PPS In ">}} + +1. Edit the `Default interface options` section of the `/etc/ptp4l.conf` file to configure the PTP slave port on the switch. PPS In requires PTP slave port. See {{}} for information about PTP. + + ``` + cumulus@switch:~$ sudo nano /etc/linuxptp/pps_out.conf + ... + # Default interface options + # + time_stamping hardware + [swp29] + udp_ttl 1 + masterOnly 0 + delay_mechanism E2E + network_transport UDPv4 + ``` + +2. Edit the `/etc/linuxptp/ts2phc.conf` file to set the following parameters to enable PPS In. + + ``` + cumulus@switch:~$ sudo nano /etc/linuxptp/ts2phc.conf + # Default configurations + [global] + use_syslog 0 + verbose 1 + logging_level 6 + slave_event_monitor /var/run/ptp_sem.sock + ts2phc.pulsewidth 500000000 + ts2phc.tod_source ptp + # + # servo parameters + # + pi_proportional_const 0.000000 + pi_integral_const 0.000000 + pi_proportional_scale 0.700000 + pi_proportional_exponent -0.300000 + pi_proportional_norm_max 0.700000 + pi_integral_scale 0.300000 + pi_integral_exponent 0.400000 + pi_integral_norm_max 0.300000 + step_threshold 0.000000050 + first_step_threshold 0.000000001 + max_frequency 500000000 + sanity_freq_limit 0 + # + [/dev/ptp1] + ts2phc.pin_index 0 + ts2phc.channel 0 + ts2phc.extts_polarity rising + ts2phc.extts_correction 0 + ``` + +3. Enable and start the `ptp4l` and `phc2sys` services: + + ``` + cumulus@switch:~$ sudo systemctl enable ptp4l.service phc2sys.service + cumulus@switch:~$ sudo systemctl start ptp4l.service phc2sys.service + ``` + +{{< /tab >}} +{{< tab "Enable PPS Out ">}} + +1. Edit the `/etc/linuxptp/pps_out.conf` file to set the following parameters. + + ``` + cumulus@switch:~$ sudo nano /etc/linuxptp/pps_out.conf + # Configuration file used for the pps_out.service + # It is shell formatted and the file is source'd by the service + # Set the PTP device to source our PPS from. + # If not specified, the service will find the first device with a clock name "sx_ptp". + PTP_DEV=/dev/ptp1 + # Set the pin index on the PPS device to send on. + # On the NVIDIA systems, only pin 1 (0-based) is supported + OUT_PIN=1 + # Set the file where to cache the last started values. + # This is used primarily in the "stop" operation to know what to clean up. + CACHE_FILE=/var/run/pps_out + # Set the out pulse charateristics for frequency and width + PULSE_FREQ=1000000000 + PULSE_WIDTH=500000000 + PULSE_PHASE=0 + ``` + +2. Enable and start the `pps_out` service: + + ``` + cumulus@switch:~$ sudo systemctl enable pps_out.service + cumulus@switch:~$ sudo systemctl start pps_out.service + ``` + +{{< /tab >}} +{{< /tabs >}} + +{{< /tab >}} +{{< /tabs >}} + +## PPS Synchronization Settings + +You can configure these PPS settings: + +| PPS In Setting | Description | +| ------- | ----------- | +| `channel-index` | Sets the channel index for PPS In. You can set a value of 1 or 0. The default value is 0.| +| `logging-level` | Sets the logging level for PPS In. You can specify `emergency`, `alert`, `critical`, `error`, `warning`, `notice`, `info`, or `debug`. The default logging level is `info`.| +| `pin-index` | Sets the pin index for PPS In. You can set a value of 1 or 0. The default value is 0.| +| `signal-polarity` | Sets the polarity of the PPS In signal. You can specify `rising-edge`, `falling-edge`, or `both`. The default setting is `rising-edge`.| +| `signal-width` | Sets the pulse width of the PPS In signal. You can set a value between 1000000 and 999000000. The default value is 500000000.| +| `timestamp-correction` | Sets the value, in nanoseconds, to add to each PPS In timestamp. You can set a value between -1000000000 and 1000000000. The default value is 0. | + +| PPS Out Setting | Description | +| ------- | ----------- | +| `channel-index`| Sets the channel index for PPS Out. You can set a value of 1 or 0. The default value is 0.| +| `frequency-adjustment` | Sets the frequency adjustment of the PPS Out signal. You can set a value between 1000000000 and 2147483647. The default value is 1000000000.| +| `phase-adjustment` | Sets the phase adjustment of the PPS Out signal. You can set a value between 0 and 1000000000. The default value is 0.| +| `pin-index` | Sets the pin index for PPS Out. Cumulus Linux supports only pin 1.| +| `signal-width` | Sets the pulse width of the PPS Out signal. You can set a value between 1000000 and 999000000. The default value is 500000000.| + +{{< tabs "TabID592 ">}} +{{< tab "NVUE Commands ">}} + +{{< tabs "TabID621 ">}} +{{< tab "PPS In ">}} + +The following example configures PPS In and sets: +- The channel index to 1. +- The pin index to 1. +- The signal width to 999000000. +- The timestamp correction to 1000000000. +- The logging level to `warning`. +- The polarity of the PPS In signal to `falling-edge`. + +``` +cumulus@switch:~$ nv set platform pulse-per-second in channel-index 1 +cumulus@switch:~$ nv set platform pulse-per-second in pin-index 1 +cumulus@switch:~$ nv set platform pulse-per-second in signal-width 999000000 +cumulus@switch:~$ nv set platform pulse-per-second in timestamp-correction 1000000000 +cumulus@switch:~$ nv set platform pulse-per-second in logging-level warning +cumulus@switch:~$ nv set platform pulse-per-second in signal-polarity falling-edge +cumulus@switch:~$ nv config apply +``` + +{{< /tab >}} +{{< tab "PPS Out ">}} + +The following example configures PPS Out and sets: +- The channel index to 1. +- The signal width to 999000000. +- The phase adjustment of the PPS Out signal to 1000000000. +- The frequency-adjustment of the PPS Out signal to 2147483647. + +``` +cumulus@switch:~$ nv set platform pulse-per-second out channel-index 1 +cumulus@switch:~$ nv set platform pulse-per-second out signal-width 999000000 +cumulus@switch:~$ nv set platform pulse-per-second out phase-adjustment 1000000000 +cumulus@switch:~$ nv set platform pulse-per-second out frequency-adjustment 2147483647 +cumulus@switch:~$ nv config apply +``` + +{{< /tab >}} +{{< /tabs >}} + +{{< /tab >}} +{{< tab "Linux Commands ">}} + +{{< tabs "TabID665 ">}} +{{< tab "PPS In ">}} + +To configure PPS In, edit the `/etc/linuxptp/ts2phc.conf` file, then restart the PPS In service with the `sudo systemctl restart ts2phc.service` command. + +The following example configures PPS In and sets: +- The channel index to 1 +- The pin index to 1 +- The signal width to 999000000. +- The timestamp correction to 1000000000. +- The logging level to 4 (warning). +- The polarity of the PPS In signal to falling edge (`falling`). + +``` +cumulus@switch:~$ sudo nano /etc/linuxptp/ts2phc.conf +# ts2phc is enabled +[global] +use_syslog 0 +verbose 1 +slave_event_monitor /var/run/ptp_sem.sock +logging_level 4 +ts2phc.pulsewidth 999000000 +ts2phc.tod_source ptp +domainNumber 0 +... +[/dev/ptp1] +ts2phc.pin_index 1 +ts2phc.channel 1 +ts2phc.extts_polarity falling +ts2phc.extts_correction 0 +``` + +{{< /tab >}} +{{< tab "PPS Out ">}} + +To configure PPS Out, edit the `/etc/linuxptp/pps_out.conf.conf` file, then restart the PPS Out service with the `sudo systemctl restart pps_out.service` command. + +The following example configures PPS Out and sets: +- The channel index to 1. +- The signal width to 999000000. +- The phase adjustment of the PPS Out signal to 1000000000. +- The frequency-adjustment of the PPS Out signal to 2147483647. + +``` +cumulus@switch:~$ sudo nano /etc/linuxptp/pps_out.conf.conf +# Configuration file used for the pps_out.service +# It is shell formatted and the file is source'd by the service +# +# Set the PTP device to source our PPS from. +# If not specified, the service will find the first device with a clock name "sx_ptp". +PTP_DEV=/dev/ptp1 +# +# Set the pin index on the PPS device to send on. +# On the NVIDIA systems, only pin 1 (0-based) is supported +OUT_PIN=1 +# +OUT_CHANNEL=1 +# +# Set the file where to cache the last started values. +# This is used primarily in the "stop" operation to know what to clean up. +CACHE_FILE=/var/run/pps_out +# +# Set the out pulse charateristics for frequency and width +PULSE_FREQ=2147483647 +PULSE_WIDTH=999000000 +PULSE_PHASE=1000000000 +``` + +{{< /tab >}} +{{< /tabs >}} + +{{< /tab >}} +{{< /tabs >}} + +## Show PPS Configuration Settings + +To show a summary of the PPS In and PPS out configuration settings, run the `nv show platform pulse-per-second` command: + +``` +cumulus@switch:~$ nv show platform pulse-per-second + applied +---------------------- ----------- +in + state enabled + pin-index 0 + channel-index 0 + signal-width 500000000 + signal-polarity rising-edge + timestamp-correction 0 + logging-level info +out + state disabled + pin-index 1 + channel-index 0 + frequency-adjustment 1000000000 + phase-adjustment 0 + signal-width 500000000 +``` + +To show only PPS In configuration settings, run the `nv show platform pulse-per-second in` command: + +``` +cumulus@switch:~$ nv show platform pulse-per-second in + applied +-------------------- ----------- +state enabled +pin-index 0 +channel-index 0 +signal-width 500000000 +signal-polarity rising-edge +timestamp-correction 0 +logging-level info +``` + +To show only PPS Out configuration settings, run the `nv show platform pulse-per-second out` command: + +``` +cumulus@switch:~$ nv show platform pulse-per-second out + applied +-------------------- ---------- +state disabled +pin-index 1 +channel-index 0 +frequency-adjustment 1000000000 +phase-adjustment 0 +signal-width 500000000 +``` diff --git a/content/cumulus-linux-57/System-Configuration/Date-and-Time/Setting-Date-and-Time.md b/content/cumulus-linux-57/System-Configuration/Date-and-Time/Setting-Date-and-Time.md index 1e1b39e28d..ca3365a49e 100644 --- a/content/cumulus-linux-57/System-Configuration/Date-and-Time/Setting-Date-and-Time.md +++ b/content/cumulus-linux-57/System-Configuration/Date-and-Time/Setting-Date-and-Time.md @@ -1,7 +1,7 @@ --- title: Setting the Date and Time author: NVIDIA -weight: 124 +weight: 122 toc: 3 --- @@ -18,16 +18,16 @@ To show the current time zone, date, and time on the switch: ``` cumulus@switch:~$ nv show system date-time - operational -------------------------- --------------------------- -local-time Wed 2023-05-10 08:01:21 UTC -universal-time Wed 2023-05-10 08:01:21 UTC -rtc-time Wed 2023-05-10 08:02:13 -time-zone Etc/UTC (UTC, +0000) -system-clock-synchronized no -ntp-service inactive -rtc-in-local-tz no -unix-time 1683705681.5062315 + operational +------------------------- ----------------------------- +local-time Wed 2023-11-22 11:22:54 EST +universal-time Wed 2023-11-22 16:22:54 UTC +rtc-time Wed 2023-11-22 16:22:54 +time-zone America/New_York (EST, -0500) +system-clock-synchronized no +ntp-service inactive +rtc-in-local-tz no +unix-time 1700670174.4371066 ``` {{< /tab >}} @@ -123,7 +123,10 @@ To set the software clock according to the configured time zone: Run the `nv action change system date-time ` command. Specify `` in YYYY-MM-DD format and `` in HH:MM:SS format. ``` -cumulus@switch:~$ nv action change system date-time 2023-10-31 12:20:30 +cumulus@switch:~$ nv action change system date-time 2023-12-04 2:33:30 +System Date-time changed successfully +Local Time is now Mon 2023-12-04 02:33:30 UTC +Action succeeded ``` {{< /tab >}} diff --git a/content/cumulus-linux-57/System-Configuration/Date-and-Time/SyncE.md b/content/cumulus-linux-57/System-Configuration/Date-and-Time/Synchronous-Ethernet-SyncE.md similarity index 87% rename from content/cumulus-linux-57/System-Configuration/Date-and-Time/SyncE.md rename to content/cumulus-linux-57/System-Configuration/Date-and-Time/Synchronous-Ethernet-SyncE.md index 60ec624167..c8c53829dc 100644 --- a/content/cumulus-linux-57/System-Configuration/Date-and-Time/SyncE.md +++ b/content/cumulus-linux-57/System-Configuration/Date-and-Time/Synchronous-Ethernet-SyncE.md @@ -1,16 +1,12 @@ --- -title: SyncE +title: Synchronous Ethernet - SyncE author: NVIDIA -weight: 129 +weight: 128 toc: 3 draft: true --- -{{%notice note%}} -SyncE is currently in Beta. -{{%/notice%}} - -[SyncE](## "Synchronous Ethernet") is a standard for transmitting clock signals over the Ethernet physical layer to synchronize clocks across the network by propagating frequency using the transmission rate of symbols in the network. A dedicated Ethernet channel manages this synchronization. +[SyncE](## "Synchronous Ethernet") is an ITU-T standard for transmitting clock signals over the Ethernet physical layer to synchronize clocks across the network by propagating frequency using the transmission rate of symbols in the network. A dedicated channel, [ESMC](## "Ethernet Synchronization Messaging Channel") manages this synchronization, as specified by the ITU-T Rec. G.8264 standard. The Cumulus Linux switch includes a SyncE controller and a SyncE daemon. - The SyncE controller reads performance counters to calculate the differences between transmit and receive ethernet symbols on the physical layer to fine tune the clock frequency. @@ -19,7 +15,8 @@ The Cumulus Linux switch includes a SyncE controller and a SyncE daemon. - Manages the synchronization hierarchy and runs the master selection algorithm to choose the best reference clock from the [QL](## "Quality Level") in the SSM. {{%notice note%}} -Cumulus Linux supports SyncE for the NVIDIA SN3750-SX switch only. +- Cumulus Linux supports SyncE for the NVIDIA SN3750-SX switch only. +- SyncE with PTP is currently in Beta {{%/notice%}} ## Basic Configuration @@ -37,7 +34,7 @@ The basic configuration shown below uses the default SyncE settings: {{< tab "NVUE Commands ">}} ``` -cumulus@switch:~$ nv set service synce enable on +cumulus@switch:~$ nv set system synce enable on cumulus@switch:~$ nv set interface swp2 synce enable on cumulus@switch:~$ nv config apply ``` @@ -85,7 +82,7 @@ The following command example sets the wait to restore time to 180 seconds (3 mi {{< tab "NVUE Commands ">}} ``` -cumulus@switch:~$ nv set service synce wait-to-restore-time 180 +cumulus@switch:~$ nv set system synce wait-to-restore-time 180 cumulus@switch:~$ nv config apply ``` @@ -118,7 +115,7 @@ The following example command sets the priority to 256: {{< tab "NVUE Commands ">}} ``` -cumulus@switch:~$ nv set service synce provider-default-priority 256 +cumulus@switch:~$ nv set system synce provider-default-priority 256 cumulus@switch:~$ nv config apply ``` @@ -157,7 +154,7 @@ The following example command sets the logging level to `debug`. {{< tab "NVUE Commands ">}} ``` -cumulus@switch:~$ nv set service synce log-level debug +cumulus@switch:~$ nv set system synce log-level debug cumulus@switch:~$ nv config apply ``` @@ -234,12 +231,12 @@ cumulus@switch:~$ sudo systemctl restart synced.service ## Show SyncE Configuration and Counters -To show global SyncE configuration, run the NVUE `nv show service synce` command or the Linux `syncectl show status` command. +To show global SyncE configuration, run the NVUE `nv show system synce` command or the Linux `syncectl show status` command. To show SyncE configuration for a specific interface, run the NVUE `nv show interface synce` command or the Linux `syncectl show interface status ` command. ``` -cumulus@switch:~$ nv show service synce +cumulus@switch:~$ nv show system synce operational applied ------------------------- ----------------------------------------------------------------- ------- enable On on @@ -252,10 +249,10 @@ network-type 1 summary Group #0: TRACKING holdover acquired on swp1. freq_diff: 77 (ppb) ``` -To show SyncE statistics for a specific interface, run the NVUE `nv show interface synce counters` command or the Linux `syncectl show interface counters counters synce` command or the Linux `syncectl show interface counters synce counters` command or the Linux `syncectl clear interface counters ` command. +To clear counters for a specific SyncE interface, run the NVUE `nv action clear interface counters synce` command or the Linux `syncectl clear interface counters ` command. ``` -cumulus@switch:~$ nv action clear interface swp1 synce counters +cumulus@switch:~$ nv action clear interface swp1 counters synce swp1 counters cleared Action succeeded ``` diff --git a/content/cumulus-linux-57/System-Configuration/Date-and-Time/_index.md b/content/cumulus-linux-57/System-Configuration/Date-and-Time/_index.md index db6a2a4c15..781b06a326 100644 --- a/content/cumulus-linux-57/System-Configuration/Date-and-Time/_index.md +++ b/content/cumulus-linux-57/System-Configuration/Date-and-Time/_index.md @@ -7,5 +7,7 @@ toc: 3 This section discusses how to: - Set the time zone, and the date and time on the software clock on the switch -- Configure {{}} -- Configure {{}} +- Configure {{}} +- Configure {{}} +- Configure {{}} +- Configure {{}} diff --git a/content/cumulus-linux-57/System-Configuration/In-Service-System-Upgrade-ISSU.md b/content/cumulus-linux-57/System-Configuration/In-Service-System-Upgrade-ISSU.md index 07449fe4fc..26ef8f173a 100644 --- a/content/cumulus-linux-57/System-Configuration/In-Service-System-Upgrade-ISSU.md +++ b/content/cumulus-linux-57/System-Configuration/In-Service-System-Upgrade-ISSU.md @@ -199,7 +199,14 @@ Run the following command to enable maintenance mode. When maintenance mode is o {{< tab "NVUE Command ">}} ``` -cumulus@switch:~$ nv action change system maintenance mode enabled +cumulus@switch:~$ nv action enable system maintenance mode +System maintenance mode has been enabled successfully + Current System Mode: Maintenance, cold + Maintenance mode since Sat Nov 18 07:09:25 2023 (Duration: 00:00:00) + frr : Maintenance, cold, down, up time: 12:55:51 (1 restart) + switchd : Maintenance, cold, down, up time: 13:10:16 + System Services : Maintenance, cold, down, up time: 13:10:35 +Action succeeded ``` {{< /tab >}} @@ -217,15 +224,44 @@ You can run additional commands to bring all the ports down, then up to restore {{< tabs "176 ">}} {{< tab "NVUE Command ">}} +To bring all the ports down: + ``` -cumulus@switch:~$ nv action change system maintenance ports enabled +cumulus@switch:~$ nv action enable system maintenance ports +System maintenance ports has been enabled successfully + Current System Mode: Maintenance, cold + Maintenance mode since Sat Nov 18 07:09:25 2023 (Duration: 00:00:56) + frr : Maintenance, cold, down, up time: 12:56:47 (1 restart) + switchd : Maintenance, cold, down, up time: 13:11:12 + System Services : Maintenance, cold, down, up time: 13:11:31 +Action succeeded +``` + +To restore the port admin state: + +``` +cumulus@switch:~$ nv action disable system maintenance ports +System maintenance ports has been disabled successfully + Current System Mode: cold + Ports shutdown for Maintenance + frr : cold, up, up time: 13:00:57 (1 restart) + switchd : cold, up, up time: 13:15:22 + System Services : cold, up, up time: 13:15:41 +Action succeeded ``` {{< /tab >}} {{< tab "csmgrctl Commands ">}} +To bring all the ports down: + ``` cumulus@switch:~$ sudo csmgrctl -p0 +``` + +To restore the port admin state: + +``` cumulus@switch:~$ sudo csmgrctl -p1 ``` @@ -244,7 +280,13 @@ Run the following command to disable maintenance mode and restore normal operati {{< tab "NVUE Command ">}} ``` -cumulus@switch:~$ nv action change system maintenance mode disabled +cumulus@switch:~$ nv action disable system maintenance mode +System maintenance mode has been disabled successfully + Current System Mode: cold + frr : cold, up, up time: 12:57:48 (1 restart) + switchd : cold, up, up time: 13:12:13 + System Services : cold, up, up time: 13:12:32 +Action succeeded ``` {{< /tab >}} @@ -259,13 +301,21 @@ cumulus@switch:~$ sudo csmgrctl -m0 ### Show Maintenance Mode Status -To see the status of maintenance mode, run the Linux `sudo csmgrctl -s` command. For example: +To see the status of maintenance mode, run the NVUE `nv show system maintenance` command or the Linux `sudo csmgrctl -s` command. For example: + +``` +cumulus@switch:~$ nv show system maintenance + operational +----- ----------- +mode enabled +ports disabled +``` ``` cumulus@switch:~$ sudo csmgrctl -s -Current System Mode: Maintenance since Tue Jan 5 00:13:37 2021 (Duration: 00:00:31) - Boot Mode: reboot_cold - 2 registered modules - frr : Maintenance, down - switchd : Maintenance, down +Current System Mode: cold + frr : cold, up, up time: 00:14:51 (2 restarts) + clagd : cold, up, up time: 00:14:47 + switchd : cold, up, up time: 01:09:48 + System Services : cold, up, up time: 01:10:07 ``` diff --git a/content/cumulus-linux-57/System-Configuration/NVIDIA-User-Experience-NVUE/NVUE-API.md b/content/cumulus-linux-57/System-Configuration/NVIDIA-User-Experience-NVUE/NVUE-API.md index 949a4c502b..459e8027f6 100644 --- a/content/cumulus-linux-57/System-Configuration/NVIDIA-User-Experience-NVUE/NVUE-API.md +++ b/content/cumulus-linux-57/System-Configuration/NVIDIA-User-Experience-NVUE/NVUE-API.md @@ -44,37 +44,34 @@ NVIDIA recommends you use your own certificates and keys. For the steps to gener Cumulus Linux lets you manage CA certificates (such as DigiCert or Verisign) and entity (end-point) certificates. Both a CA certificate and an entity certificate can contain a chain of certificates. -You can import certificates onto the switch (fetch certificates from an external source), set which certificate you want to use with the NVUE REST API, and show information about a certificate, such as the serial number, and the date and time during which the certificate is valid. +You can import certificates onto the switch (fetch certificates from an external source), set which certificate you want to use for the NVUE REST API, and show information about a certificate, such as the serial number, and the date and time during which the certificate is valid. -To import a certificate, run the following commands. If the certificate is passphrase protected, you need to include the passphrase. +#### Import a Certificate {{%notice note%}} - You can import a maximum of 25 entity certificates and a maximum of 50 CA certificates. - The certificate you import contains sensitive private key information. NVIDIA recommends that you use a secure transport such as SFTP, SCP, or HTTPS. {{%/notice%}} -{{< tabs "TabID53 ">}} -{{< tab "NVUE Commands ">}} +- To import an entity certificate, run an `nv action import system security certificate `command. +- To import a CA certificate, run an `nv action import system security ca-certificate ` command. -- To import an entity certificate, run the `nv action import system security certificate [options]`command. -- To import a CA certificate, run the `nv action import system security ca-certificate [options]` command. +If the certificate is passphrase protected, you need to include the passphrase. -You must provide a certificate ID (``) to uniquely identify the certificate being imported. +You must provide a certificate ID (``) to uniquely identify the certificate you import. -The following example imports a CA certificate with the public key `AFCB12334…==` and calls the certificate `tls-cert-1`. The certificate is passphrase protected with `hell0$`. The public key is a Base64 ASCII encoded PEM string. +The following example imports a CA certificate with a public key and calls the certificate `tls-cert-1`. The certificate is passphrase protected with `mypassphrase`. The public key is a Base64 ASCII encoded PEM string. ``` -cumulus@switch:~$ nv action import system security ca-certificate tls-cert-1 data "AFCB12334…==" passphrase hell0$ -cumulus@switch:~$ nv config apply +cumulus@switch:~$ nv action import system security ca-certificate tls-cert-1 passphrase mypassphrase data ""  ``` -The following example imports an entity certificate bundle and calls the certificate `tls-cert-1`. The certificate bundle is passphrase protected with `hell0$`. +The following example imports an entity certificate bundle and calls the certificate `tls-cert-1`. The certificate bundle is passphrase protected with `mypassphrase`. A certificate bundle must be in .PFX or .P12 format. ``` -cumulus@switch:~$ nv action import system security certificate tls-cert-1 uri-bundle scp://user@pass:1.2.3.4:/opt/certs/cert.p12 passphrase hell0$ -cumulus@switch:~$ nv config apply +cumulus@switch:~$ nv action import system security certificate tls-cert-1 passphrase mypassphrase uri-bundle scp://user@pass:1.2.3.4:/opt/certs/cert.p12  ``` The following example imports an entity certificate with the public key URI `scp://user@pass:1.2.3.4` and private key URI `scp://user@pass:1.2.3.4`, and calls the certificate `tls-cert-1`. The certificate is not passphrase protected. @@ -83,28 +80,20 @@ A CA certificate must be in .pem, .p7a, or .p7c format. ``` cumulus@switch:~$ nv action import system security certificate tls-cert-1 uri-public-key scp://user@pass:1.2.3.4 uri-private-key scp://user@pass:1.2.3.4 -cumulus@switch:~$ nv config apply ``` -{{< /tab >}} -{{< tab "Curl Commands ">}} - -{{< /tab >}} -{{< /tabs >}} - -To set the certificate you want to use with the REST API: +#### Set the Certificate to Use -{{< tabs "TabID92 ">}} -{{< tab "NVUE Commands ">}} +You can configure the NVUE REST API to use a specific certificate. -The following example configures the NVUE REST API to use the certificate `tls-cert-1`: +The following example configures the API to use the certificate `tls-cert-1`: ``` cumulus@switch:~$ nv set system api certificate tls-cert-1 cumulus@switch:~$ nv config apply ``` -Set the certificate to `auto` to let the system determine which certificate to use. For example, you can set the certificate to `auto` if you want to use a previously installed certificate (either the default self-signed or your own installed certificate). +Set the certificate to `auto` to let the system determine which certificate to use; for example, if you want to use a previously installed certificate (either the default self-signed or your own installed certificate). ``` cumulus@switch:~$ nv set system api certificate auto @@ -114,55 +103,21 @@ cumulus@switch:~$ nv config apply To unset the certificate to use with the NVUE REST API: ``` -cumulus@switch:~$ nv unset system api certificate -``` - -{{< /tab >}} -{{< tab "Curl Commands ">}} - -The following example configures the NVUE REST API to use the certificate `tls-cert-1`: - -``` -cumulus@switch:~$ curl -u 'cumulus:cumulus' -d '{"set": {"system": {"api": {"certificate": "cert1","port": 8888}}}}'-k -X PATCH https://127.0.0.1:8765/nvue_v1/?rev=2 -``` - -Set the certificate to `auto` to let the system determine which certificate to use. For example, you can set the certificate to `auto` if you want to use a previously installed certificate (either the default self-signed or your own installed certificate). - -``` -cumulus@switch:~$ curl -u 'cumulus:cumulus' -d '{"set": {"system": {"api": {"certificate": "auto","port": 8888}}}}' -k -X PATCH https://127.0.0.1:8765/nvue_v1/?rev=2 +cumulus@switch:~$ nv unset system api certificate tls-cert-1 ``` -{{< /tab >}} -{{< /tabs >}} - -To delete a certificate and the key data stored on the switch: - -{{< tabs "TabID125 ">}} -{{< tab "NVUE Commands ">}} +#### Delete Certificates - To delete an entity certificate and the key data stored on the switch, run the `nv action delete system security certificate ` command. - To delete a CA certificate and the key data stored on the switch, run the `nv action delete system security ca-certificate ` command. -The following command deletes the CA certificate `tls-cert-1`: +The following command deletes the certificate `tls-cert-1`: ``` cumulus@switch:~$ nv action delete system security certificate tls-cert-1 ``` -{{< /tab >}} -{{< tab "Curl Commands ">}} - -``` -cumulus@switch:~$ -``` - -{{< /tab >}} -{{< /tabs >}} - -To show certificate information: - -{{< tabs "TabID145 ">}} -{{< tab "NVUE Commands ">}} +#### Show Certificate Information - To show all the entity certificates on the switch, run the `nv show system security certificate` command. - To show all the CA certificates on the switch, run the `nv show system security ca-certificate` command. @@ -173,16 +128,10 @@ The following example shows all the entity certificates on the switch: cumulus@switch:~$ nv show system security certificate ``` -- To show information about a specific entity certificate, run the `nv show system security certificate ` command. -- To show information about a specific CA certificate, run the `nv show system security ca-certificate ` command. +- To show the applications that are using a specific entity certificate, run the `nv show system security certificate installed` command. +- To show the applications that are using a specific CA certificate, run the `nv show system security ca-certificate installed` command. -The following example shows information about the CA certificate `tls-cert-1`: - -``` -cumulus@switch:~$ nv show system security certificate ca-certificate tls-cert-1 -``` - -To show the applications that are using a certificate, run the `nv show system security certificate installed` command: +The following example shows the applications that are using a specific entity certificate. ``` cumulus@switch:~$ nv show system security certificate tls-cert-1 installed @@ -197,16 +146,6 @@ The following example shows detailed information about the CA certificate `tls-c cumulus@switch:~$ nv show system security ca-certificate tls-cert-1 dump ``` -{{< /tab >}} -{{< tab "Curl Commands ">}} - -``` -cumulus@switch:~$ -``` - -{{< /tab >}} -{{< /tabs >}} - ### API-only User @@ -277,7 +216,7 @@ NVUE follows a declarative model, removing context-specific commands and setting Cumulus Linux enables the NVUE REST API by default. To disable the NVUE REST API, run the `nv set system api state disabled` command. {{%notice note%}} -To use the NVUE REST API in Cumulus Linux 5.6, you must {{}}; otherwise you see 403 responses when you run commands. +To use the NVUE REST API in Cumulus Linux 5.6 and later, you must {{}}; otherwise you see 403 responses when you run commands. {{%/notice%}} ### API Port and Listening Address diff --git a/content/cumulus-linux-57/System-Configuration/NVIDIA-User-Experience-NVUE/NVUE-CLI.md b/content/cumulus-linux-57/System-Configuration/NVIDIA-User-Experience-NVUE/NVUE-CLI.md index acb9ad941c..1a13235464 100644 --- a/content/cumulus-linux-57/System-Configuration/NVIDIA-User-Experience-NVUE/NVUE-CLI.md +++ b/content/cumulus-linux-57/System-Configuration/NVIDIA-User-Experience-NVUE/NVUE-CLI.md @@ -224,7 +224,7 @@ If you run an NVUE show command but the corresponding FRR routing daemons are no In addition to the `nv show` commands, Cumulus Linux continues to provide a subset of the NCLU `net show` commands. Use these commands to get additional views of various parts of your network configuration. ``` -cumulus@leaf01:mgmt:~$ net show +cumulus@leaf01:mgmt:~$ net show <> bfd : Bidirectional forwarding detection bgp : Border Gateway Protocol bridge : a layer2 bridge @@ -273,10 +273,10 @@ The NVUE configuration management commands manage and apply configurations. |
Command | Description | | ------- | ----------- | -| `nv config apply` | Applies the pending configuration to become the applied configuration.
You can also use these prompt options:
  • `--y` or `--assume-yes` to automatically reply `yes` to all prompts.
  • `--assume-no` to automatically reply `no` to all prompts.
{{%notice note%}}Cumulus Linux applies but does not save the configuration; the configuration does not persist after a reboot.{{%/notice%}}You can also use these apply options:
`--confirm` applies the configuration change but you must confirm the applied configuration. If you do not confirm within ten minutes, the configuration rolls back automatically. You can change the default time with the apply `--confirm