Announcement

Collapse
No announcement yet.

NetworkManager 1.0.6 Exposes Metered Connections, Configures WoL

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • NetworkManager 1.0.6 Exposes Metered Connections, Configures WoL

    Phoronix: NetworkManager 1.0.6 Exposes Metered Connections, Configures WoL

    The GNOME team responsible for NetworkManager have announced the release of NetworkManager 1.0.6 as yet another update prior to NetworkManager 1.2...

    Phoronix, Linux Hardware Reviews, Linux hardware benchmarks, Linux server benchmarks, Linux benchmarking, Desktop Linux, Linux performance, Open Source graphics, Linux How To, Ubuntu benchmarks, Ubuntu hardware, Phoronix Test Suite

  • #2
    Kudos to them. They do great work.

    Comment


    • #3
      Originally posted by Marc Driftmeyer View Post
      Kudos to them. They do great work.
      I agree, NetworkManager is excellent. I just wish it was capable to manage bridges and virtual networks for libvirt/lxc.

      Comment


      • #4
        I'll have to build this with my usual hack for transparent /custom themed tray menu suppport. Wonder if they've fixed the bug with connecting to a hidden wifi connection that forced me to roll back from 1.04 to 1.02?

        Comment


        • #5
          How can they tell whether a connection is metered or not?

          Comment


          • #6
            Originally posted by dcc24 View Post
            How can they tell whether a connection is metered or not?
            I don't know.
            Probably can't.

            Probably they let the user define a "warning quota" and "maximum usage quota" as is done in Android.

            Comment


            • #7
              Originally posted by dcc24 View Post
              How can they tell whether a connection is metered or not?
              The flag can be set by the user by any of their connection. If it's used, a DHCP vendor extension field is inspected -- if it contains "ANDROID_METERED" value as is done by Android handsets then we set the flag.

              Comment


              • #8
                Originally posted by Luke View Post
                I'll have to build this with my usual hack for transparent /custom themed tray menu suppport.
                is this anything we could pull upstream? Is there a bug report with a patch filed in bugzilla?

                Originally posted by Luke View Post
                Wonder if they've fixed the bug with connecting to a hidden wifi connection that forced me to roll back from 1.04 to 1.02?
                Yes, Jiř? Klime? fixed this. Tracked here: https://bugzilla.gnome.org/show_bug.cgi?id=752173

                Comment


                • #9
                  Great work at breaking openvpn support too in some distros. For some reason they decided they are very special and need very special nm-openvpn user/group. nobody/nobody just does not cut for these gentelmen for some reason. Yes, creating nm-opevpn group/user fixes the problem and this group/acc does not need anything special. As always gnome people must do something to piss people off. Just because.

                  Comment


                  • #10
                    Originally posted by bitman View Post
                    Great work at breaking openvpn support too in some distros. For some reason they decided they are very special and need very special nm-openvpn user/group. nobody/nobody just does not cut for these gentelmen for some reason. Yes, creating nm-opevpn group/user fixes the problem and this group/acc does not need anything special. As always gnome people must do something to piss people off. Just because.
                    Yes, sir, using different user for different services is sort of the point of the privilege separation. If multiple services are running as "nobody" user then they're not really unprivileged as they can compromise each others' resources in case of a security issue in some of the the daemons. We've done this to keep you more secure!

                    The other side of the coin is that we could be a bit better at communicating this. That's sort of my fault not mentioning in the NEWS file or the release announcement. Next time we'll try to be better at this.

                    On the other hand, the downstream distributions should probably spent some time testing the packages they update instead of just blindly bumping the version numbers. Changes occur. For 1.2 we are considering optionally using systemd security features (easy configuration of private home, seccomp filters, etc.) to confine the VPN plugins even more. While we take care not to break user configurations we can not really ensure the packaging is completely effortless. If your distro fails to do this and breaks user configurations day after a release you may want to consider switching distributions.

                    Have a nice day.

                    Comment

                    Working...
                    X