VPN naming convention change

VPN naming convention change

VPN naming convention change
VPN naming convention change
Monday
Tags: #VPN
Hardware Version:
Firmware Version: 6.2.10.15

hi all,

 

my I ask why was the naming convention for VPNs (and WireGuard peers) suddenly changed?

wg

 

I now can't make any changes to the Wireguard VPN itself / add new peer / delete peer till I don't rename the VPN and all associated peers - what is quite annoying.......................

I've opened a request for rollback, but apparently no reactions yet

 

/BR ZoloNN ----------------------------------------------------------------------- Omada 2x ER605(UN) v2.0 + SG2008P(UN) V3.20 + SG2218 V1.20 + 2x SG2008 V4.20 + 3x EAP615-Wall(EU) V1.0 CET (GMT+1)
0
0
#1
2 Reply
Re:VPN naming convention change
19 hours ago

Hi  @ZoloNN 

 

Thanks for posting here.

Here are some reasons for this change:

 

The main reason is usually not “looks good/bad,” but compatibility and security concerns: allowing all kinds of special characters (arrows, spaces, punctuation, Unicode characters, etc.) to flow between different systems/components can easily cause parsing, encoding, rendering, and sorting issues. Once this field is used in configuration files, command lines, URLs, logs, scripts, or database queries, it can also introduce injection-type risks. Restricting names to a “safe character set” such as [A-Za-z0-9_] can significantly reduce failures and security hazards.

 

Common motivations include:

Cross-platform and client compatibility

  • Unicode support varies across OSes, browsers, terminals, and mobile fonts, which can result in garbled text/squares/truncation.
  • Some clients or older libraries treat input as ASCII only; special characters can cause import failures or abnormal connection lists.

Encoding and serialization issues

  • Names may end up in JSON/YAML/INI/XML configurations or API responses. Special characters require escaping; mishandling can lead to parse failures.
  • The same character can have different Unicode normalization forms (looks identical but is actually different), causing weird issues like “duplicate names” or “object not found.”

URL/path/command-line safety

  • If the name is concatenated into a URL, filename, certificate CN, system command, shell script arguments, etc., characters like &;|.., newlines, and quotes can create ambiguity or even enable command injection/path traversal.
  • Even if you only allow “arrows,” similar-looking characters and invisible characters (zero-width characters) may be abused.

Backend indexing and uniqueness/predictability

  • Many systems want to use the “name” as an identifier (or derive a slug, resource ID, DNS label, etc.). Restricting characters keeps it predictable, stable, and easy to index.
  • Prevents homoglyph attacks/confusion (e.g., Latin a vs Cyrillic а).

Log and audit readability

  • Special characters can break log formats (newlines, tabs), affecting auditing and alert-rule matching.

 

This is a recent optimization change, and it’s very unlikely to be reverted in the short term. Please rename and reconfigure these VPN settings, and we sincerely apologize for the inconvenience this may cause. We also hope you can understand the intention behind this change.

 

1
1
#2
Re:VPN naming convention change
11 hours ago

Hi @Vincent-TP,

 

thanks for the answer.

on one hand, I fully understand the possible risk of allowing any character in the names (SQL injection, etc....)

but then the change should be then implemented consistently everywhere in input fields across the whole controller. it seems, only VPN section is affected, as I've successfully tried create new entries with the arrows in following sections: ACL, Groups, Routing, VLAN....

 

please allow at least space and "-" characters ("-" is a hostname allowed characted according RFC 952 and 1123)

 

 

/BR ZoloNN ----------------------------------------------------------------------- Omada 2x ER605(UN) v2.0 + SG2008P(UN) V3.20 + SG2218 V1.20 + 2x SG2008 V4.20 + 3x EAP615-Wall(EU) V1.0 CET (GMT+1)
0
0
#3