Commit graph

10281 commits

Author SHA1 Message Date
Oskari Rauta
a4d8d2459a netbird: new package
Netbird is similar vpn service as tailscale and zerotier.

Description:
NetBird is an open-source VPN management platform built on top of WireGuard® making it easy to create secure private networks for your organization or home.
It requires zero configuration effort leaving behind the hassle of opening ports, complex firewall rules, VPN gateways, and so forth.

Signed-off-by: Oskari Rauta <oskari.rauta@gmail.com>
2023-03-04 08:42:58 +08:00
Glen Huang
e1f03d7ee4 acme: fix incompatibilty with image builder
Signed-off-by: Glen Huang <i@glenhuang.com>
2023-03-03 23:43:01 +01:00
Josef Schlehofer
82720ba624
Merge pull request #20563 from paper42/clamav-0.104.4
clamav: update to 0.104.4
2023-03-03 07:55:05 +01:00
Tianling Shen
40669c4135
v2raya: drop wrong patches
These patches should not be backported to OpenWrt, otherwise tproxy
won't work for devices connected to br-lan (bypassed by the fw rules).

We have introduced a new compile-time flag for new version (which
is not released yet), but it's unnecessray to backport redudant
patches as here is still at the old version.

Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2023-03-03 12:08:22 +08:00
Tianling Shen
8e10f5f9a1
cloudflared: Update to 2023.3.0
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2023-03-03 11:58:33 +08:00
Philip Prindeville
d2dd1bef71 isc-dhcp: allow suppression of default gateway
Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2023-03-01 08:54:34 -07:00
Philip Prindeville
5a0f41556f isc-dhcp: make indent consistent in config
Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2023-03-01 08:53:56 -07:00
Glen Huang
c6960a2bdc acme: merge cli into init script
Signed-off-by: Glen Huang <i@glenhuang.com>
2023-03-01 15:38:02 +01:00
Oskari Rauta
a1c80c1f37 nfs-kernel-server: update to v2.6.2
Also added patch that is from alpine's same package to assist building on musl.
Hostpkg build on musl also kept failing, so I added few more overrides, which
made it work perfectly.

Signed-off-by: Oskari Rauta <oskari.rauta@gmail.com>
2023-03-01 17:02:42 +08:00
Tianling Shen
b52fdec659
cloudflared: Update to 2023.2.2
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2023-03-01 16:41:48 +08:00
Florian Eckert
bfd7da1392
Merge pull request #20467 from tobiaspc/njalla
ddns-scripts: Add njal.la provider
2023-02-27 09:09:27 +01:00
Stan Grishin
fded4e584e
Merge pull request #20540 from stangri/master-curl
curl: update to 7.88.1
2023-02-26 23:32:08 -07:00
Daniel Bermond
aa5ccd5ef2 i2pd: update to version 2.46.1
Maintainer   : @yangfl (David Yang)
Build system : Arch Linux x86_64
Build tested : r7800 OpenWrt git master (r22104-01262c921c)
Run tested   : r7800 OpenWrt git master (r22104-01262c921c)

Signed-off-by: Daniel Bermond <danielbermond@gmail.com>
2023-02-27 03:28:10 +01:00
S. Brusch
a2c84138e1 crowdsec: update to 1.4.6
Update crowdsec to latest upstream release version 1.4.6

Signed-off-by: S. Brusch <ne20002@gmx.ch>

Maintainer: Kerma Gérald <gandalf@gk2.net>
Run tested: ipq40xx/generic, Fritzbox 4040, Openwrt 22.03.3
2023-02-26 09:48:24 -08:00
Dirk Brenken
0706b1d2d9
banip: update 0.8.1-2
* add oisdbig as new feed
* LuCI frontend preparation:
  - the json feed file points always to /etc/banip/banip.feeds (and is no longer compressed)
  - supply country list in /etc/banip/banip.countries
* update readme

Signed-off-by: Dirk Brenken <dev@brenken.org>
2023-02-26 08:16:15 +01:00
Stan Grishin
3371071730 curl: update to 7.88.1
* https://curl.se/changes.html#7_88_1

Signed-off-by: Stan Grishin <stangri@melmac.ca>
2023-02-25 21:59:01 +00:00
Tobias Hilbig
05c42cc0e9 ddns-scripts: Add njal.la provider
Add njal.la provider. Use the key as password. Username is not needed.

Signed-off-by: Tobias Hilbig <web.tobias@hilbig-ffb.de>
2023-02-25 11:49:19 +01:00
Dirk Brenken
02c2587f9d
banip: release 0.8.1-1
* add missing wan-forward chain (incl. report/mail adaption)
* changed options:
  - old: ban_blockforward, new: ban_blockforwardwan and ban_blockforwardlan
  - old: ban_logforward, new: ban_logforwardwan and ban_logforwardlan
* add missing dhcp(v6) rules/exceptions
* update readme

Previously run tested by certain forum users (and by me).

Signed-off-by: Dirk Brenken <dev@brenken.org>
2023-02-25 10:01:11 +01:00
Lucian Cristian
3b7bf7728b uacme: update to 1.7.4
Signed-off-by: Lucian Cristian <lucian.cristian@gmail.com>
2023-02-25 08:19:49 +08:00
Lucian Cristian
5f68a93874 frr: update to 8.4.2 branch
Signed-off-by: Lucian Cristian <lucian.cristian@gmail.com>
2023-02-25 08:18:32 +08:00
Daniel Bermond
5f0a9ec722 tor: update to version 0.4.7.13
Maintainers  : @hauke (Hauke Mehrtens) and @tripolar (Peter Wagner)
Build system : Arch Linux x86_64
Build tested : r7800 OpenWrt git master (r22104-01262c921c)
Run tested   : r7800 OpenWrt git master (r22104-01262c921c)

Signed-off-by: Daniel Bermond <danielbermond@gmail.com>
2023-02-24 16:08:02 -08:00
Zuev Aleksandr
040d00a2af AdGuardHome: update to v0.107.24
Signed-off-by: Zuev Aleksandr <A.Zuev@stdev.su>
2023-02-24 19:47:57 +08:00
Florian Eckert
d2bad35906
Merge pull request #20529 from braewoods/master
ddns-scripts: enable IPv6 for easydns.com
2023-02-24 07:58:22 +01:00
Michal Vasilek
ba879a144d
clamav: update to 0.104.4
* remove upstreamed 100-cmake-fix-findcurses.patch

Signed-off-by: Michal Vasilek <michal.vasilek@nic.cz>
2023-02-23 17:27:33 +01:00
Moritz Warning
1af4a404a5 zerotier: update to 1.10.3
Signed-off-by: Moritz Warning <moritzwarning@web.de>
2023-02-23 08:01:02 +01:00
Stan Grishin
d7852c9887
Merge pull request #20554 from stangri/master-https-dns-proxy
https-dns-proxy: 2022-10-15-11 update
2023-02-22 21:47:39 -07:00
James Buren
5e7a5a3304 ddns-scripts: enable IPv6 for easydns.com
easydns.com has supported IPv6 for awhile now using
the same update URL as IPv4. This duplicates the IPv4
entry for IPv6 to enable support for it.

Signed-off-by: James Buren <braewoods+mgh@braewoods.net>
2023-02-22 19:24:21 -06:00
Michal Vasilek
c3c7083e65 git: update to 2.34.7
Fixes CVE-2023-22490, CVE-2023-23946

Signed-off-by: Michal Vasilek <michal.vasilek@nic.cz>
2023-02-23 00:10:47 +01:00
Stan Grishin
30aefce999 https-dns-proxy: 2022-10-15-11 update
* config file update
* introduce boot() function

Signed-off-by: Stan Grishin <stangri@melmac.ca>
2023-02-22 20:36:06 +00:00
Dirk Brenken
618dd4676d
banip: update 0.8.0-4
* remove bogus log limit

Signed-off-by: Dirk Brenken <dev@brenken.org>
2023-02-21 21:43:21 +01:00
Eneas U de Queiroz
15b1fb247d
Merge pull request #20480 from gstrauss/lighttpd-1.4.69
lighttpd: update to lighttpd 1.4.69 release hash
2023-02-21 17:14:40 -03:00
Dirk Brenken
eb3c89ceed
banip: update 0.8.0-3
* properly initialize the 'proto' variable in the log service

Signed-off-by: Dirk Brenken <dev@brenken.org>
2023-02-21 18:43:17 +01:00
Tianling Shen
dbf66a3ae5
dnsproxy: Update to 0.48.0
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2023-02-21 15:57:38 +08:00
Tianling Shen
d40efc0811
v2ray-core: Update to 5.4.0
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2023-02-21 15:57:28 +08:00
Dirk Brenken
b50383e4d9
banip: update 0.8.0-2
* fix a potential race condition during initial startup (after flash) which leads to a "disabled" service

Signed-off-by: Dirk Brenken <dev@brenken.org
Signed-off-by: Dirk Brenken <dev@brenken.org>
2023-02-20 19:18:31 +01:00
Eneas U de Queiroz
df079b06b7
Merge pull request #20475 from cotequeiroz/openssl3
treewide: prepare packages for OpenSSL 3.0 update
2023-02-20 12:07:16 -03:00
Jan Hák
94512aba16 knot: update to version 3.2.5
Signed-off-by: Jan Hák <jan.hak@nic.cz>
2023-02-20 15:34:48 +01:00
Eneas U de Queiroz
c3ff525c6d
Merge pull request #20484 from salim-b/patch-1
transmission: retrieve boolean config opts using `config_get_bool`
2023-02-20 09:44:53 -03:00
Glenn Strauss
8f2fbf093a lighttpd: update to lighttpd 1.4.69 release hash
Signed-off-by: Glenn Strauss <gstrauss@gluelogic.com>
2023-02-20 04:55:39 -05:00
Glenn Strauss
c5297aca29 lighttpd: remove patch included upstream
Signed-off-by: Glenn Strauss <gstrauss@gluelogic.com>
2023-02-20 04:55:39 -05:00
Glenn Strauss
ed6fe528c1 lighttpd: add lighttpd-mod-webdav_min package
add lighttpd-mod-webdav_min package alternative to lighttpd-mod-webdav

lighttpd-mod-webdav_min is more minimal than full lighttpd-mod-webdav.
lighttpd-mod-webdav_min does not support PROPPATCH, LOCK, UNLOCK, and
by not supporting those methods, removes dependencies on libxml2,
libsqlite3, and libuuid.

Signed-off-by: Glenn Strauss <gstrauss@gluelogic.com>
2023-02-20 04:55:39 -05:00
Stan Grishin
2bb10d0c2c simple-adblock: bugfix: ensure directory for jsonFile is created
Signed-off-by: Stan Grishin <stangri@melmac.ca>
2023-02-19 20:22:32 +00:00
Stan Grishin
587cd4d0d7 simple-adblock: implement procd_boot_wan_timeout support
* implement procd_boot_wan_timeout support
* update config with oisd ABPlus and domains lists

Signed-off-by: Stan Grishin <stangri@melmac.ca>
2023-02-19 05:10:35 +00:00
Stan Grishin
79eb58a4b5
Merge pull request #20511 from stangri/master-simple-adblock
simple-adblock: update to 1.9.4-1
2023-02-18 22:04:19 -07:00
Dirk Brenken
f765b2e79c
Merge pull request #20491 from dibdot/banIP
banip: release 0.8.0 (nft rewrite)
2023-02-18 21:14:56 +01:00
Dirk Brenken
82a491bac8
banip: release 0.8.0 (nft rewrite)
- complete rewrite of banIP to support nftables
- all sets are handled in a separate nft table/namespace 'banIP'
- for incoming blocking it uses the inet input hook, for outgoing blocking it uses the inet forward hook
- full IPv4 and IPv6 support
- supports nft atomic set loading
- supports blocking by ASN numbers and by iso country codes
- 42 preconfigured external feeds are available, plus local allow- and blocklist
- supports local allow- and blocklist (IPv4, IPv6, CIDR notation or domain names)
- auto-add the uplink subnet to the local allowlist
- provides a small background log monitor to ban unsuccessful login attempts in real-time
- the logterms for the log monitor service can be freely defined via regex
- auto-add unsuccessful LuCI, nginx, Asterisk or ssh login attempts to the local blocklist
- fast feed processing as they are handled in parallel as background jobs
- per feed it can be defined whether the input chain or the forward chain should be blocked (default: both chains)
- automatic blocklist backup & restore, the backups will be used in case of download errors or during startup
- automatically selects one of the following download utilities with ssl support: aria2c, curl, uclient-fetch or wget
- supports a 'allowlist only' mode, this option restricts internet access from/to a small number of secure websites/IPs
- provides comprehensive runtime information
- provides a detailed set report
- provides a set search engine for certain IPs
- feed parsing by fast & flexible regex rulesets
- minimal status & error logging to syslog, enable debug logging to receive more output
- procd based init system support (start/stop/restart/reload/status/report/search)
- procd network interface trigger support
- ability to add new banIP feeds on your own
- add a readme with all available options/feeds to customize your installation to your needs
- a new LuCI frontend will be available in due course

Signed-off-by: Dirk Brenken <dev@brenken.org>
2023-02-18 21:06:26 +01:00
Dirk Brenken
0b222b7e10
adblock: update 4.1.5-6
* adapted changed oisd downloads (again), fixed #20516

Signed-off-by: Dirk Brenken <dev@brenken.org>
2023-02-18 20:17:34 +01:00
Dengfeng Liu
9aa82f48c1 kcptun: update to version 20230207
add support for port-range dailer, port-range listener

Signed-off-by: Dengfeng Liu <liudf0716@gmail.com>
2023-02-17 15:18:00 +08:00
Stan Grishin
6c45b40317 simple-adblock: update to 1.9.4-1
* update default config for new oisd.nl lists
* conf.update file to migrate oisd.nl lists to the new format
* introduce AdBlockPlus lists support (new oisd.nl format)
* longer wait for WAN up/gateway detection
* make load_environemnt only execute once to suppress duplicate
  warnings/errors

PS. While I was testing this, oisd.nl has brought back the old domains
    lists as well, so this version supports both as I'm unclear as to
    why the "big" ABPlus list is only 6.2Mb where as the "big" domains
    list is whopping 19.9Mb.

Signed-off-by: Stan Grishin <stangri@melmac.ca>
2023-02-16 23:10:22 +00:00
Eneas U de Queiroz
ac547f5af8
apfree-wifidog: add support for OpenSSL 3.0
This adds an upstream commit to allow building with OpenSSL 3.0.

Signed-off-by: Eneas U de Queiroz <cotequeiroz@gmail.com>
2023-02-16 10:28:52 -03:00
Eneas U de Queiroz
51fda9dde7
boinc: Add compatibility with OpenSSL 3.0
This adds a patch from upstream allowing to build with OpenSSL 3.0.

Signed-off-by: Eneas U de Queiroz <cotequeiroz@gmail.com>
2023-02-16 10:28:52 -03:00
Eneas U de Queiroz
6b40dccedf
umurmur: fix compilation with OpenSSL 3.0
Remove a call to CRYPTO_mem_ctrl(), which is used only for debugging,

Signed-off-by: Eneas U de Queiroz <cotequeiroz@gmail.com>
2023-02-16 10:28:52 -03:00
Eneas U de Queiroz
78dcc29e47
squid: bump to release 5.7
This is the latest version and brings compatibility with OpenSSL 3.0.

Signed-off-by: Eneas U de Queiroz <cotequeiroz@gmail.com>
2023-02-16 10:28:52 -03:00
Eneas U de Queiroz
94b06478ed
nsd: bump to 4.6.1
This version adds compatibility with OpenSSL 3.0.

There's a patch, submitted upstream, to fix building without SSL.

Signed-off-by: Eneas U de Queiroz <cotequeiroz@gmail.com>
2023-02-16 10:28:52 -03:00
Eneas U de Queiroz
c4f3f54386
nginx-util: allow building with OpenSSL 3.0
Add -Wno-error=deprecated-declarations to CFLAGS to allow usage of
deprecated API.

Signed-off-by: Eneas U de Queiroz <cotequeiroz@gmail.com>
2023-02-16 10:28:52 -03:00
Tianling Shen
5a9979d243
cloudreve: Update to 3.7.1
Dropped architectures that are no longer supported by upstream.

Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2023-02-16 11:32:12 +08:00
Tianling Shen
70009d3586
gg: Update to 0.2.18
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2023-02-16 11:24:46 +08:00
Tianling Shen
c5c3c2e223
dnsproxy: Update to 0.47.0
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2023-02-16 11:24:29 +08:00
Dirk Brenken
51634a960c
adblock: update 4.1.5-5
* adapted changed oisd namings / download locations
   oisd_big (old: oisd_full), oisd_small (old: oisdb_basic)
* added antipopads as new sources
* removed broken energized source
* fixed readme

Signed-off-by: Dirk Brenken <dev@brenken.org>
2023-02-15 21:15:20 +01:00
Salim B
63dc13d7d2 transmission: retrieve boolean config opts using config_get_bool
The tranmission UCI config options

- `config_overwrite`
- `incomplete_dir_enabled`
- `watch_dir_enabled`

are all booleans, so we have to retrieve them using `config_get_bool` in order
to make sure they are properly interpreted in case the user sets them to a
keyword (`true`/`false`, `on`/`off` etc.) and not an integer (`0`/`1`).

Signed-off-by: Salim B <git@salim.space>
2023-02-13 01:50:52 +01:00
Ralf Kaiser
33d32450b4 gsocket: upstream update to 1.4.39
Signed-off-by: Ralf Kaiser <skyper@thc.org>
2023-02-11 11:46:58 +01:00
Josef Schlehofer
63baa4249e
Merge pull request #20349 from turris-cz/unbound-1171
unbound: update to version 1.17.1
2023-02-10 16:44:05 +01:00
Josef Schlehofer
97e69ec89c
unbound: update to version 1.17.1
- Refreshed one patch
- Removed deprecated AUTORELEASE

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
2023-02-10 15:25:35 +01:00
Van Waholtz
c85a23a81e sing-box: add new package
Signed-off-by: Van Waholtz <brvphoenix@gmail.com>
2023-02-10 08:45:15 +08:00
Tianling Shen
4947b057cf
v2ray-geodata: Update to latest version
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2023-02-10 07:29:56 +08:00
Tianling Shen
a9ac85db71
v2ray-core: Update to 5.3.0
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2023-02-10 07:29:19 +08:00
Tianling Shen
b4c4b17308
xray-core: Update to 1.7.5
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2023-02-10 07:28:57 +08:00
Tianling Shen
c1544f9a5f
cloudflared: Update to 2023.2.1
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2023-02-09 22:35:23 +08:00
Fabian Lipken
c142df18ed dnscrypt-proxy2: update to version 2.1.4
Signed-off-by: Fabian Lipken <dynasticorpheus@gmail.com>
2023-02-08 10:42:51 +01:00
Yousong Zhou
a111405eac xl2tpd: bump to version 1.3.18
Signed-off-by: Yousong Zhou <yszhou4tech@gmail.com>
2023-02-06 13:01:55 +08:00
Noah Meyerhans
f6a9bd935f bind: bump PKG_RELEASE 2023-02-05 09:47:34 -08:00
Stijn Tintel
ca52ebd5bf bind: add option to enable GSSAPI support
Samba4 running as Active Directory Domain Controller with the internal
DNS backend requires the nsupdate binary with GSSAPI support.

Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
2023-02-05 09:46:31 -08:00
Rucke Teg
6cf293dc2e bind: bump release number
Signed-off-by: Rucke Teg <rucketeg@protonmail.com>
2023-02-05 09:05:30 -08:00
Rucke Teg
93b75d0058 bind: Fix ipv6 detection logic
Bug was introduced in a7b770eec4 and
results in bind always stating with the `-4` flag.

Signed-off-by: Rucke Teg <rucketeg@protonmail.com>
2023-02-05 09:05:30 -08:00
Stan Grishin
8c8384611b simple-adblock: update to 1.9.3-7
* add boot() function which waits for network.interface to come up
* switch oisd.nl hosts entry to domains
* remove erroneous oisd substitution from config-update file

Signed-off-by: Stan Grishin <stangri@melmac.ca>
2023-02-04 22:34:59 +00:00
Oskari Rauta
aabfc3f510 tailscale: update to 1.36.0
- Update tailscale to version 1.36.0
 - Patch iptables support

Tailscale does not (yet) support nftables.
Tailscale allows running with --netfilter=off allowing
end-user to create his own firewall rules, but this
affects only tailscale cli, not tailscaled daemon, so
connection cannot be made without error telling that
tailscaled was unable to determine execute iptables
for determining it's version.

There is a work-around for those who do not want
nft-iptables compatibility package; they can create
a script to /usr/bin/iptables which responds to
--version argument and echos fake version string
and on any other arguments or no arguments, just exits.

After this procedure and starting tailscale cli with
netfilter off- it works. Openwrt has moved on to
nftables, so iptables manipulation seems unnecessary.
Especially for other reasons, on Openwrt, firewall
should be configured on it's own, because firewall
rules made by other software, such as tailscale,
loose their firewalling rules when firewall restarts.

So I patched it to allow "fake" iptables pointing
to executable /bin/false and ignoring version
request. And I also set cli to default to
netfilter off setting.

If still end-user wants to use iptables, this
patch does not make it impossible; just install
iptables, or nft-iptables, and run tailscale
with argument --netfilter=on and it works out
as it did before, tailscaled daemon still
matches with iptables if it is found in $PATH.

Signed-off-by: Oskari Rauta <oskari.rauta@gmail.com>
2023-02-04 18:26:54 +08:00
Peter van Dijk
a67b2f4759 pdns-recursor: update to 4.8.2
Signed-off-by: Peter van Dijk <peter.van.dijk@powerdns.com>
2023-02-03 10:13:01 -08:00
Sibren Vasse
d41e918a36 openssh: actually build openssh-server-pam with pam support
Signed-off-by: Sibren Vasse <github@sibrenvasse.nl>
2023-02-03 10:10:36 -08:00
Sibren Vasse
5c43c1bade openssh: update to 9.2p1
Signed-off-by: Sibren Vasse <github@sibrenvasse.nl>
2023-02-03 10:10:36 -08:00
S. Brusch
b748d59e07 crowdsec-firewall-bouncer: update to 0.0.25
Update crowdsec-firewall-bouncer to latest upstream release version 0.0.25

Signed-off-by: S. Brusch <ne20002@gmx.ch>

Maintainer: Kerma Gérald <gandalf@gk2.net>
Run tested: ipq40xx/generic, Fritzbox 4040, Openwrt 22.03.3

Rework:
- now based on uci config file
- create nftables tables and chains in initd script
2023-02-03 10:10:08 -08:00
Florian Eckert
7bce2138ef stunnel: update version to 5.67
Signed-off-by: Florian Eckert <fe@dev.tdt.de>
2023-02-01 10:05:10 +01:00
Li Xin
8966f49f9a shadowsocks-libev: ss-rules: Add 'auto-merge' flag to avoid conflicts
Link: https://github.com/openwrt/packages/pull/19872
Signed-off-by: Li Xin <i@crzidea.com>
(squash commits)
Signed-off-by: Yousong Zhou <yszhou4tech@gmail.com>
2023-01-28 16:47:44 +08:00
Christian Lachner
4e3e37d072 haproxy: update to v2.6.8
- Update haproxy download URL and hash

Signed-off-by: Christian Lachner <gladiac@gmail.com>
2023-01-28 09:47:56 +02:00
Noah Meyerhans
47fcec43ab bind: update to 9.18.11
Fixes CVEs:
      - CVE-2022-3924: Fix serve-stale crash when recursive clients
      soft quota is reached.
      - CVE-2022-3736: Handle RRSIG lookups when serve-stale is
      active.
      - CVE-2022-3094: An UPDATE message flood could cause named to
      exhaust all available memory. This flaw was addressed by adding
      a new "update-quota" statement that controls the number of
      simultaneous UPDATE messages that can be processed or
      forwarded. The default is 100. A stats counter has been added to
      record events when the update quota is exceeded, and the XML and
      JSON statistics version numbers have been updated.

Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2023-01-28 09:47:09 +02:00
John Audia
c2d5b6de78 snort3: update to 3.1.53.0
Upstream bump

Build system: x86_64
Build-tested: bcm2711/RPi4B
Run-tested: bcm2711/RPi4B

Signed-off-by: John Audia <therealgraysky@proton.me>
2023-01-28 09:46:50 +02:00
Olivier Poitrey
e212d18af4 nextdns: Update to version 1.39.4
Signed-off-by: Olivier Poitrey <rs@nextdns.io>
2023-01-28 06:38:42 +08:00
Olivier Poitrey
f1358e2bb1 nextdns: Update to version 1.39.0
Signed-off-by: Olivier Poitrey <rs@nextdns.io>
2023-01-26 20:36:51 +08:00
Nick Hainke
ac9027aebb snowflake: update to v2.5.1
Changes in version v2.4.3 - 2023-01-16
- Fix version number in version.go

(Changes for v2.5.1 are missing)

Signed-off-by: Nick Hainke <vincent@systemli.org>
2023-01-24 18:43:23 -08:00
Peter van Dijk
04ae344150 pdns-recursor: update to 4.8.1
Signed-off-by: Peter van Dijk <peter.van.dijk@powerdns.com>
2023-01-24 17:55:24 -08:00
Christian Marangi
6e0c2b767b
treewide: bump PKG_RELEASE for libiwinfo dependant packages
Bump PKG_RELEASE for libiwinfo dependant packages.

Signed-off-by: Christian Marangi <ansuelsmth@gmail.com>
2023-01-23 13:58:49 +01:00
Stan Grishin
e7e4a013be pbr: bugfix: fix is_domain()
* fixes https://github.com/openwrt/packages/issues/20352

Signed-off-by: Stan Grishin <stangri@melmac.ca>
2023-01-22 23:13:24 +00:00
Alexandru Ardelean
36a45c4ce7 tcpreplay: bump to version 4.4.3
Signed-off-by: Alexandru Ardelean <ardeleanalex@gmail.com>
2023-01-22 21:13:41 +02:00
Dengfeng Liu
db243b31c8 xfrpc: update to version 2.1.606
Signed-off-by: Dengfeng Liu <liudf0716@gmail.com>
2023-01-22 22:41:47 +08:00
Tianling Shen
aa700a6b46
cloudflared: Update to 2023.1.0
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2023-01-22 15:21:50 +08:00
Josef Schlehofer
1a368a5409 atlas-sw-probe: add more binaries
They were added in these commits [1] [2] and if they are not included,
the RIPE Atlas SW Probe does not work correctly.

This should also prevent this from happening in the future as it now. We include all
files with .sh extension file type.

[1] 70ced29fc3
[2] 71a4ff0e68

Fixes: https://github.com/openwrt/packages/issues/20338

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
2023-01-21 20:47:06 +01:00
John Audia
bf87e72a85 snort3: update to 3.1.52.0
Upstream bump

Build system: x86_64
Build-tested: bcm2711/RPi4B
Run-tested: bcm2711/RPi4B

Signed-off-by: John Audia <therealgraysky@proton.me>
2023-01-21 16:19:31 +02:00
John Audia
993d8ae9f2 snort3: update to 3.1.51.0
Upstream bump

Build system: x86_64
Build-tested: bcm2711/RPi4B
Run-tested: bcm2711/RPi4B

Signed-off-by: John Audia <therealgraysky@proton.me>
2023-01-21 16:19:31 +02:00
Paul Fertser
1e8584dc58 treewide: quote CC and CXX
When CC is set to e.g. "ccache mips-openwrt-linux-musl-gcc" it needs
to be quoted to avoid word splitting on substitution.

Signed-off-by: Paul Fertser <fercerpav@gmail.com>
2023-01-20 17:44:14 -08:00
Tianling Shen
eb90ea31d2 udphp-client: bump to latest git HEAD
Fix build with gcc12.

Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2023-01-19 21:06:21 +08:00
Florian Eckert
47c152204f
Merge pull request #20337 from bdrung/hosting.de
ddns-scripts: add hosting.de provider
2023-01-19 10:54:32 +01:00
Michal Vasilek
96e8ff604f git: update to 2.34.6
Fixes CVE-2022-23521
Fixes CVE-2022-41903
Fixes CVE-2022-39260
Fixes CVE-2022-39253
Fixes CVE-2022-29187

Signed-off-by: Michal Vasilek <michal.vasilek@nic.cz>
2023-01-18 21:44:25 +02:00
Tianling Shen
5d7eab630c
v2ray-core: Update to 5.2.1
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2023-01-18 18:23:56 +08:00
Benjamin Drung
8ff6537f42 ddns-scripts: add hosting.de provider
Add hosting.de provider. To use dynamic DNS you have to create a DDNS
host with a separate DDNS user.

Note: As of 2023-01-17 hosting.de does not work with wget which will
fail with `400: Bad Request` (it will work with `--auth-no-challenge`).
You should use curl instead. I have reported that to the provider.

Signed-off-by: Benjamin Drung <bdrung@bdrung.de>
2023-01-18 00:14:02 +01:00
Stan Grishin
3ac5026da5
Merge pull request #20317 from stangri/master-simple-adblock
simple-adblock: update sed for allowing domains
2023-01-16 20:59:28 -07:00
Stan Grishin
f4f899f6f9 pbr: update to 1.0.1-14
* improve install/uninstall messages
* fix ips add command
* add boot() to init file

Signed-off-by: Stan Grishin <stangri@melmac.ca>
2023-01-17 00:48:22 +00:00
Stan Grishin
70cf654ce2
Merge pull request #20213 from stangri/master-pbr
pbr: update to 1.0.1-10
2023-01-16 17:40:48 -07:00
Stan Grishin
2aaa7c559b pbr: update to 1.0.1-10
Bugfixes:
* better error information for empty tid/mark and failure to resolve domains
* better handling of entries in /etc/iproute2/rt_tables
* update packages definitions and descriptions
* remove firewall4 from dependencies to prevent dependency recursion

Updates:
* introduce nft_user_set_policy and nft_user_set_counter to control options for
  user nft sets this service creares
* use counters in internal nft sets

Signed-off-by: Stan Grishin <stangri@melmac.ca>
2023-01-16 22:58:49 +00:00
Josef Schlehofer
12fd3cfe1e atlas-sw-probe: update to version 5080
Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
2023-01-16 02:11:28 -08:00
Florian Eckert
261d6ed887
Merge pull request #20326 from neheb/14
xinetd: fix URL
2023-01-16 08:17:46 +01:00
Nick Hainke
5435ddb8f8 snowflake: update to 2.4.2
Changes in version v2.4.2 - 2023-01-13
- Issue 40208: Enhance help info for capacity flag
- Issue 40232: Update README and fix help output
- Issue 40173: Increase clientIDAddrMapCapacity
- Issue 40177: Manually unlock mutex in ClientMap.SendQueue
- Issue 40177: Have SnowflakeClientConn implement io.WriterTo
- Issue 40179: Reduce turbotunnel queueSize from 2048 to 512
- Issue 40187/40199: Take ownership of buffer in QueuePacketConn QueueIncoming/WriteTo
- Add more tests for URL encoded IPs (safelog)
- Fix server flag name
- Issue 40200: Use multiple parallel KCP state machines in the server
- Add a num-turbotunnel server transport option
- Issue: 40241: Switch default proxy STUN server to stun.l.google.com

Signed-off-by: Nick Hainke <vincent@systemli.org>
2023-01-15 22:44:17 +00:00
Rosen Penev
f0b9599ba0 rp-pppoe: update to 3.15
Signed-off-by: Rosen Penev <rosenp@gmail.com>
2023-01-14 21:29:40 -08:00
Rosen Penev
3eace67a30 atlas-probe: update to 2.6.3
Switch to git tarballs.

Remove upstreamed patches and add OpenSSL patch.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2023-01-14 21:29:01 -08:00
Rosen Penev
cdfc16c0a5 foolsm: update to 1.0.21
Signed-off-by: Rosen Penev <rosenp@gmail.com>
2023-01-14 21:28:47 -08:00
Rosen Penev
550100482b
xinetd: fix URL
Something went wrong here. Switch to git tarballs.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2023-01-14 20:24:13 -08:00
Rosen Penev
2fa8db3c3c netperf: use git tarball
netperf.org is gone now. Only github is left.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2023-01-14 19:06:36 -08:00
Rosen Penev
6c4205a58f socat: update to 1.7.4.4
Signed-off-by: Rosen Penev <rosenp@gmail.com>
2023-01-14 16:10:23 -08:00
Stan Grishin
4b77f94b53 simple-adblock: update sed for allowing domains
Signed-off-by: Stan Grishin <stangri@melmac.ca>
2023-01-14 23:00:30 +00:00
Daniel Golle
9a1e65c2fd gnunet-fuse: update to version 0.19.1
ChangeLog file excert:
Fri Dec 30 12:51:11 AM CET 2022
Releasing gnunet-fuse 0.19.1: fix build for GNUnet 0.19.0+.

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2023-01-14 15:39:29 +00:00
Daniel Golle
09bc74fa23 gnunet: update to version 0.19.2
GNUnet has not been updated for a while due to the gnurl-situation.
Now that we got libcurl-gnutls, we can update GNUnet.
For details, please see the GNUnet release notes:

https://www.gnunet.org/en/news/2022-09-0.17.6.html
https://www.gnunet.org/en/news/2022-10-0.18.0.html
https://www.gnunet.org/en/news/2022-11-0.18.1.html
https://www.gnunet.org/en/news/2022-12-0.19.0.html
https://www.gnunet.org/en/news/2022-12-0.19.1.html
https://www.gnunet.org/en/news/2023-01-0.19.2.html

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2023-01-14 15:39:29 +00:00
Daniel Golle
03098233ef libcurl-gnutls: add package, replaces gnURL
The gnURL-fork of cURL is no longer maintained as cURL finally supports
probing and selecting the TLS implementation at run-time.

Hence just build a gnuTLS-backed variant of libcurl, use patchelf to
change the shared object name, call the result libcurl-gnutls and be
done. Other distributions have opted for similar solutions.

In future we could convert the curl package to provide build-variants
for each TLS implementation; however, this is out of the scope of the
needs of GNUnet which used to be only user of libgnurl.

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2023-01-14 15:39:29 +00:00
Rosen Penev
1e0aa44ce2 clamav: remove now obsolete iconv patch
Signed-off-by: Rosen Penev <rosenp@gmail.com>
2023-01-13 23:35:25 -08:00
Daniel Golle
0edb2cccb8 safe-search: fix use with dnsmasq in ujail
The safe-search package creates symlinks in a configured additional
hosts directory. The link targets are inside another directory which
has to be made available to dnsmasq as well.
Now that support for adding additional paths to dnsmasq was added by
commit openwrt/openwrt@aa12a0fdd1
implement adding this path using the existing uci-defaults script.

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2023-01-14 01:47:32 +00:00
Eneas U de Queiroz
5c0c407e46 libreswan: set DNSSEC_ROOTKEY_FILE, LINUX_VARIANT
Libreswan will set DEFAULT_DNSSEC_ROOTKEY_FILE from the LINUX_VARIANT
variable, which is taken from the ID field in /etc/os-release.  This
points to the host file, which is wrong.

Set both variables when calling make.

Signed-off-by: Eneas U de Queiroz <cotequeiroz@gmail.com>
2023-01-13 10:15:17 -03:00
Daniel Bermond
24bcba013a i2pd: update to version 2.45.0
Maintainer   : @yangfl (David Yang)
Build system : Arch Linux x86_64
Build tested : r7800 OpenWrt git master (r21756, commit 55c32a6ce3)
Run tested   : r7800 OpenWrt git master (r21756, commit 55c32a6ce3)

Signed-off-by: Daniel Bermond <danielbermond@gmail.com>
2023-01-13 00:06:00 -08:00
Oskari Rauta
e12ef0f925 ztdns: new package
ztDNS is a dedicated DNS server for a ZeroTier virtual network.
ztdns is alternative to zerotier's own zeronds.

Signed-off-by: Oskari Rauta <oskari.rauta@gmail.com>
2023-01-12 17:27:26 +08:00
Helge Mader
c80fc6c343 xinetd: add processing of redirect option in init script
Signed-off-by: Helge Mader <ma@dev.tdt.de>
2023-01-11 11:49:17 +01:00
Van Waholtz
8f68e1bd91 frp: update to 0.46.1
Signed-off-by: Van Waholtz <brvphoenix@gmail.com>
2023-01-10 10:08:08 -08:00
Van Waholtz
cf103fce77 frp: update to 0.46.0
Add `test.sh`.

Signed-off-by: Van Waholtz <brvphoenix@gmail.com>
2023-01-10 10:08:08 -08:00
Hannu Nyman
508c4548dc ocserv: disable libmaxminddb detection
Disable libmaxminddb detection to fix a build error
due to missing dependency.
(the libmaxminddb library is now detected, but is unncessary.)

Signed-off-by: Hannu Nyman <hannu.nyman@iki.fi>
2023-01-10 12:21:05 +02:00
Hannu Nyman
ce46bf8a43 knot: disable libmaxminddb detection
Disable libmaxminddb detection to fix a build error due to
missing dependency.
(the libmaxminddb library is now detected, but is unncessary.)

Signed-off-by: Hannu Nyman <hannu.nyman@iki.fi>
2023-01-10 12:21:05 +02:00
Oskari Rauta
281d624203 speedtestpp: drop libxml2 dependency
Co-authored-by: Tianling Shen <cnsztl@gmail.com>
Signed-off-by: Oskari Rauta <oskari.rauta@gmail.com>
2023-01-10 16:11:49 +08:00
Javier Marcet
073ee02500 bind: disable geoip
Signed-off-by: Javier Marcet <javier@marcet.info>
[modified also PKG_RELEASE]
2023-01-09 17:29:47 +02:00
Jihoon Han
79257dfb7c ddns-scripts: add support for LuaDNS
Signed-off-by: Jihoon Han <rapid_renard@renard.ga>
2023-01-09 18:26:29 +09:00
Florian Eckert
d596fa1e77
Merge pull request #20244 from stargieg/ddns-scripts
ddns-scripts: add strato ipv6 support
2023-01-09 10:11:45 +01:00
Tianling Shen
65ccc4c913
xray-core: Update to 1.7.2
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2023-01-09 15:08:16 +08:00
Patrick Grimm
6b436c9882 ddns-scripts: add strato ipv6 support
Signed-off-by: Patrick Grimm <patrick@lunatiki.de>
2023-01-08 15:49:06 +01:00
Tianling Shen
bc9d61952d
Merge pull request #19358 from AenBleidd/vko_add_boinc-wrapper
boinc-wrapper: add new package
2023-01-08 21:36:02 +08:00
Tianling Shen
7f39559474
Merge pull request #20201 from LecrisUT/ddns-scripts/pdns
ddns-scripts: Allow setting root record for pdns script
2023-01-08 17:56:42 +08:00
Almaz Gaifullin
19ea85abe6 udphp-client: new package
Signed-off-by: Almaz Gaifullin <gargargar@yandex.ru>
2023-01-07 16:48:20 +08:00
Hannu Nyman
0156e3a74d
Merge pull request #20212 from gstrauss/lighttpd-1.4.68
lighttpd: update to lighttpd 1.4.68 release hash
2023-01-07 10:37:10 +02:00
Vitalii Koshura
40e144be7d
boinc-wrapper: add new package
Signed-off-by: Vitalii Koshura <lestat.de.lionkur@gmail.com>
2023-01-04 04:45:13 +01:00
Glenn Strauss
85279b49ce lighttpd: collect mods now built into lighttpd exe
Signed-off-by: Glenn Strauss <gstrauss@gluelogic.com>
2023-01-03 21:35:57 -05:00
Glenn Strauss
74d26813f7 lighttpd: fix meson build
Signed-off-by: Glenn Strauss <gstrauss@gluelogic.com>
2023-01-03 19:46:19 -05:00
Stan Grishin
a7e01f2df8
Merge pull request #20166 from stangri/master-pbr
pbr: add provides: pbr to variants
2023-01-03 12:45:29 -07:00
Glenn Strauss
66001d5a91 lighttpd: remove patch included upstream
Signed-off-by: Glenn Strauss <gstrauss@gluelogic.com>
2023-01-03 13:09:52 -05:00
Glenn Strauss
6383ae9407 lighttpd: update to lighttpd 1.4.68 release hash
Signed-off-by: Glenn Strauss <gstrauss@gluelogic.com>
2023-01-03 12:55:52 -05:00
Glenn Strauss
4a3b62a92a lighttpd: modify build cmd for type: feature opts
modify build command for meson type: feature options

remove -Dwith_libev=disabled (option no longer has any effect)

Signed-off-by: Glenn Strauss <gstrauss@gluelogic.com>
2023-01-03 12:54:30 -05:00
Philip Prindeville
a7b770eec4 bind: start up with -4 if not listening on ipv6 addresses
Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2023-01-02 14:15:57 -08:00
Cristian Le
ff099ea53c
ddns-scripts: Allow setting root record for pdns script
Signed-off-by: Cristian Le <git@lecris.me>
2022-12-31 22:21:42 +01:00
Rudy Andram
ac13ebc68f stubby: bump to 0.4.3
Signed-off-by: Rudy Andram <rmandrad@gmail.com>
2022-12-31 11:04:35 +02:00
Philip Prindeville
f26edd58a0
Merge pull request #20182 from stintel/issue_16691
strongswan: fix typo in strongswan-mod-nonce description
2022-12-28 22:27:55 -07:00
Philip Prindeville
07f528b331 bind: update to version 9.18.10
Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2022-12-28 10:23:10 -08:00
Stijn Tintel
e6060502e7 strongswan: fix typo in strongswan-mod-nonce description
Fixes: #16691
Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
2022-12-28 03:18:19 +02:00
Tianling Shen
ea969a117a
v2ray-geodata: Update to latest version
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2022-12-27 16:42:42 +08:00
Tianling Shen
7ea1c47c44
v2ray-core: Update to 5.2.0
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2022-12-27 16:42:33 +08:00
Tianling Shen
9a7926339b
xray-core: Update to 1.7.0
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2022-12-27 16:42:00 +08:00
Richard Yu
6163de4ffa
natmap: update to 20221225
Signed-off-by: Richard Yu <yurichard3839@gmail.com>
2022-12-26 12:29:02 +08:00
Richard Yu
8111d49474
natmap: fix service not stopped when disabled in luci
luci removes `enable` option when disabled,
fix by setting default value to 0.

Signed-off-by: Richard Yu <yurichard3839@gmail.com>
2022-12-26 12:28:52 +08:00
Richard Yu
39af47f1c0
natmap: add Package/conffiles
Signed-off-by: Richard Yu <yurichard3839@gmail.com>
2022-12-26 12:28:36 +08:00
Tianling Shen
822d44e8f8
rclone: Update to 1.61.1
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2022-12-25 15:01:48 +08:00
Tianling Shen
c67193be61
cloudreve: Update to 3.6.2
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2022-12-25 15:01:14 +08:00
Tianling Shen
4afc17e6e0
xray-core: Update to 1.6.6-2
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2022-12-25 15:01:03 +08:00
Tianling Shen
4e9c47e558
dnsproxy: Update to 0.46.5
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2022-12-25 14:59:33 +08:00
Tianling Shen
62cc9d2a39
dnslookup: Update to 1.8.1
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2022-12-25 14:59:13 +08:00
Tianling Shen
f526a1d169
cloudflared: Update to 2022.12.1
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2022-12-25 14:58:57 +08:00
Stan Grishin
f1c8f1423b pbr: add provides: pbr to variants
Signed-off-by: Stan Grishin <stangri@melmac.ca>
2022-12-23 23:38:25 +00:00
W. Michael Petullo
df0b2eedd6 krb5: update to 1.20.1
Besides updating the package to 1.20.1, this commit removed two patches
that the new release made unnecessary.

Signed-off-by: W. Michael Petullo <mike@flyn.org>
2022-12-23 12:15:11 +00:00
John Audia
10a170552a snort3: update to 3.1.50.0
Upstream bump

Build system: x86_64
Build-tested: bcm2711/RPi4B
Run-tested: bcm2711/RPi4B

Signed-off-by: John Audia <therealgraysky@proton.me>
2022-12-22 16:27:40 -08:00
John Audia
34783261d0 snort3: update to 3.1.49.0
Upstream bump

Build system: x86_64
Build-tested: bcm2711/RPi4B
Run-tested: bcm2711/RPi4B

Signed-off-by: John Audia <therealgraysky@proton.me>
2022-12-22 16:27:40 -08:00
John Audia
0c1425f8fe snort3: minor tweaks to local.lua
* Use Boolean true for enable inline mode which is more intuitive that older ''
* Add skeleton section for openappid since it has been merged[1]

1. 2d4e7d5fd3

Signed-off-by: John Audia <therealgraysky@proton.me>
2022-12-22 16:27:40 -08:00
W. Michael Petullo
62359925e4 nfdump: update to 1.6.25
Signed-off-by: W. Michael Petullo <mike@flyn.org>
2022-12-22 16:25:16 -08:00
Stan Grishin
edbcb97b78 pbr: bugfix: Makefile, rt_tables fix
Signed-off-by: Stan Grishin <stangri@melmac.ca>
2022-12-22 18:52:41 +00:00
Antti Seppälä
96b2cd70e1 uacme: Remove deprecated $(AUTORELEASE)
Signed-off-by: Antti Seppälä <a.seppala@gmail.com>
2022-12-22 09:52:01 +08:00
Antti Seppälä
dd00cd04c5 uacme: Use UCI to configure firewall instead of iptables
Use UCI to add temporary incoming firewall rule to accept http traffic for
challenge verification.

This should make uacme compatible with OpenWrt's fw3/4 implementation.

Signed-off-by: Antti Seppälä <a.seppala@gmail.com>
2022-12-22 09:52:01 +08:00
Richard Yu
cd51b58efd
natmap: add forward_port option
The bind port (-b) can be used with forward port (-p),
so expose this option in config file.

Signed-off-by: Richard Yu <yurichard3839@gmail.com>
2022-12-21 17:50:18 +08:00
Mark Mentovai
33581043d2 unbound: fix local_subnet for IPv6 addresses that contain a port
This prevents a forwarding server named like ::1@5453 from being added
to unbound.conf as a forward-host instead of the correct forward-addr.
forward-host requires the name to be resolved, which is impossible in
the absence of another nameserver. Thus, forwarding-only configurations
referencing only the IPv6 loopback address with a port number were
broken.

Signed-off-by: Mark Mentovai <mark@mentovai.com>
2022-12-20 14:33:04 +08:00
Stan Grishin
10a28215e3
Merge pull request #20108 from stangri/master-pbr
pbr: update to 1.0.1-1
2022-12-19 14:10:02 -07:00
Stan Grishin
5bec4a2541 pbr: update to 1.0.1-1
* add more error/warning messages
* better return statements from ips/nftset functions
* better error/warning handling when inserting policies
* comment out unnecessary nft set/ipst clean ups
* shellchecked status functions

Signed-off-by: Stan Grishin <stangri@melmac.ca>
2022-12-19 19:07:10 +00:00
Toke Høiland-Jørgensen
ac892bb6f1
Merge pull request #20099 from tohojo/fix-flent-pkg
flent: fixup flent package
2022-12-19 15:27:42 +01:00
Florian Eckert
0434407428 mwan3: make mwan3.user executable
This is a fix for the the following change:
3d824ea288

Before the change, it was only possible to execute a shell script. To
remove this restriction, a binary or other script language can now also
be used for 'mwan3.user'. Unfortunately, the old shell script was not
executable for older mwan3 version. During a sysupgrade with config transfer,
this 'mwan3.user' script could not be executed for newer mwan3 versions.
To fix this, the calling script checks whether the 'mwan3.user' is executable,
and if not, this executable bit is now set.

Signed-off-by: Florian Eckert <fe@dev.tdt.de>
2022-12-19 08:34:54 +01:00
Rui Salvaterra
3fd37a234c tor: bump to 0.4.7.12 stable
Quoting the changelog:

Changes in version 0.4.7.12 - 2022-12-06
  This version contains a major change that is a new key for moria1. Also, new
  metrics are exported on the MetricsPort for the congestion control
  subsystem.

  o Directory authority changes (moria1):
    - Rotate the relay identity key and v3 identity key for moria1. They
      have been online for more than a decade and refreshing keys
      periodically is good practice. Advertise new ports too, to avoid
      confusion. Closes ticket 40722.

  o Minor feature (Congestion control metrics):
    - Add additional metricsport relay metrics for congestion control.
      Closes ticket 40724.

  o Minor features (fallbackdir):
    - Regenerate fallback directories generated on December 06, 2022.

  o Minor features (geoip data):
    - Update the geoip files to match the IPFire Location Database, as
      retrieved on 2022/12/06.

  o Minor bugfixes (cpuworker, relay):
    - Fix an off by one overload calculation on the number of CPUs being
      used by our thread pool. Fixes bug 40719; bugfix on 0.3.5.1-alpha.

Signed-off-by: Rui Salvaterra <rsalvaterra@gmail.com>
2022-12-19 07:43:35 +08:00
Rui Salvaterra
9136ff1532 tor: bump to 0.4.7.11 stable
Quoting the changelog:

Changes in version 0.4.7.11 - 2022-11-10
  This version contains several major fixes aimed at helping defend against
  network denial of service. It is also extending drastically the MetricsPort
  for relays to help us gather more internal data to investigate performance
  and attacks.

  We strongly recommend to upgrade to this version especially for Exit relays
  in order to help the network defend against this ongoing DDoS.

  o Directory authority changes (dizum, Faravahar):
    - Change dizum IP address. Closes ticket 40687.
    - Remove Faravahar until its operator, Sina, set it back up online
      outside of Team Cymru network. Closes ticket 40688.

  o Major bugfixes (geoip data):
    - IPFire informed us on August 12th that databases generated after
      (including) August 10th did not have proper ARIN network
      allocations. We are updating the database to use the one generated
      on August 9th, 2022. Fixes bug 40658; bugfix on 0.4.5.13.

  o Major bugfixes (onion service):
    - Set a much higher circuit build timeout for opened client rendezvous
      circuit. Before this, tor would time them out very quickly leading to
      unnecessary retries meaning more load on the network. Fixes bug 40694;
      bugfix on 0.3.5.1-alpha.

  o Major bugfixes (OSX):
    - Fix coarse-time computation on Apple platforms (like Mac M1) where
      the Mach absolute time ticks do not correspond directly to
      nanoseconds. Previously, we computed our shift value wrong, which
      led us to give incorrect timing results. Fixes bug 40684; bugfix
      on 0.3.3.1-alpha.

  o Major bugfixes (relay):
    - Improve security of our DNS cache by randomly clipping the TTL
      value. TROVE-2021-009. Fixes bug 40674; bugfix on 0.3.5.1-alpha.

  o Minor feature (Mac and iOS build):
    - Change how combine_libs works on Darwin like platforms to make
      sure we don't include any `__.SYMDEF` and `__.SYMDEF SORTED`
      symbols on the archive before we repack and run ${RANLIB} on the
      archive. This fixes a build issue with recent Xcode versions on
      Mac Silicon and iOS. Closes ticket 40683.

  o Minor feature (metrics):
    - Add various congestion control counters to the MetricsPort. Closes
      ticket 40708.

  o Minor feature (performance):
    - Bump the maximum amount of CPU that can be used from 16 to 128. Note
      that NumCPUs torrc option overrides this hardcoded maximum. Fixes bug
      40703; bugfix on 0.3.5.1-alpha.

  o Minor feature (relay):
    - Make an hardcoded value for the maximum of per CPU tasks into a
      consensus parameter.
    - Two new consensus parameters are added to control the wait time in
      queue of the onionskins. One of them is the torrc
      MaxOnionQueueDelay options which supersedes the consensus
      parameter. Closes ticket 40704.

  o Minor feature (relay, DoS):
    - Apply circuit creation anti-DoS defenses if the outbound circuit
      max cell queue size is reached too many times. This introduces two
      new consensus parameters to control the queue size limit and
      number of times allowed to go over that limit. Closes ticket 40680.

  o Minor feature (relay, metrics):
    - Add DoS defenses counter to MetricsPort.
    - Add congestion control RTT reset counter to MetricsPort.
    - Add counters to the MetricsPort how many connections, per type,
      are currently opened and how many were created.
    - Add relay flags from the consensus to the MetricsPort.
    - Add total number of opened circuits to MetricsPort.
    - Add total number of streams seen by an Exit to the MetricsPort.
    - Add traffic stats as in number of read/written bytes in total.
    - Related to ticket 40194.

  o Minor features (fallbackdir):
    - Regenerate fallback directories generated on November 10, 2022.

  o Minor features (geoip data):
    - Update the geoip files to match the IPFire Location Database, as
      retrieved on 2022/11/10.

  o Minor bugfixes (authorities, sandbox):
    - Allow to write file my-consensus-<flavor-name> to disk when
      sandbox is activated. Fixes bug 40663; bugfix on 0.3.5.1-alpha.

  o Minor bugfixes (dirauth):
    - Directory authorities stop voting a consensus "Measured" weight
      for relays with the Authority flag. Now these relays will be
      considered unmeasured, which should reserve their bandwidth for
      their dir auth role and minimize distractions from other roles. In
      place of the "Measured" weight, they now include a
      "MeasuredButAuthority" weight (not used by anything) so the
      bandwidth authority's opinion on this relay can be recorded for
      posterity. Lastly, remove the AuthDirDontVoteOnDirAuthBandwidth
      torrc option which never worked right. Fixes bugs 40698 and 40700;
      bugfix on 0.4.7.2-alpha.

  o Minor bugfixes (onion service client):
    - A collapsing onion service circuit should be seen as an
      "unreachable" error so it can be retried. Fixes bug 40692; bugfix
      on 0.3.5.1-alpha.

  o Minor bugfixes (onion service):
    - Make the service retry a rendezvous if the circuit is being
      repurposed for measurements. Fixes bug 40696; bugfix
      on 0.3.5.1-alpha.

  o Minor bugfixes (relay overload statistics):
    - Count total create cells vs dropped create cells properly, when
      assessing if our fraction of dropped cells is too high. We only
      count non-client circuits in the denominator, but we would include
      client circuits in the numerator, leading to surprising log lines
      claiming that we had dropped more than 100% of incoming create
      cells. Fixes bug 40673; bugfix on 0.4.7.1-alpha.

  o Code simplification and refactoring (bridges):
    - Remove unused code related to ExtPort connection ID. Fixes bug
      40648; bugfix on 0.3.5.1-alpha.

Signed-off-by: Rui Salvaterra <rsalvaterra@gmail.com>
2022-12-19 07:43:35 +08:00
Alexey Smirnov
91f18c0613 smcroute: update to 2.5.6
Signed-off-by: Alexey Smirnov <s.alexey@gmail.com>
2022-12-19 07:38:44 +08:00
Toke Høiland-Jørgensen
d51c948c1f flent: Integrate flent-tools into the flent package
Now that we're packaging flent itself, there's no reason to have a
completely separate flent-tools package. So integrate the flent-tools
package specification into the main flent package so it's always kept in
sync.

Also add a dependency from flent itself on flent-tools, as the shell
versions of those utilities that Flent uses when running tests doesn't work
on the busybox shell included with openwrt.

Signed-off-by: Toke Høiland-Jørgensen <toke@toke.dk>
2022-12-17 23:43:05 +01:00
Toke Høiland-Jørgensen
6818f1e521 flent: Rename and update package
Update the Flent package and move it to net/, renaming it to just 'flent'
instead of python3-flent (it's not a library, having the python3- prefix
makes no sense). Also add python3-defusedxml as a dependency to protect
against XML bombs if using the one of the backends that use XML-RPC, and
trim the dependencies to those used directly by Flent.

Signed-off-by: Toke Høiland-Jørgensen <toke@toke.dk>
2022-12-17 23:42:51 +01:00
Oli Ze
44e1c2115e igmpproxy: update to version 0.4.0
Signed-off-by: Oli Ze <olze@trustserv.de>
2022-12-16 20:50:31 -08:00
YiZhen Choo
60ae1e5637 AdGuardHome: update to v0.107.21
Signed-off-by: YiZhen Choo <yizhen.c02@gmail.com>
2022-12-16 07:17:19 +01:00
John Audia
2d4e7d5fd3 OpenAppID: add new package
Traditionally, Snort rules are based upon packet analysis.  OpenAppID
enables detection of applications/cloud applications on the network.

This package provides OpenAppID and signature files used by OpenAppID to detect
network traffic from certain applications can be used to identify rogue
application use, detect malicious applications and implement various
application policies, such as application blacklisting, limiting application
usage, and enforcing conditional controls.

To use, for example, edit /etc/snort/local.lua and add the following section
at a minimum:

appid = {
  app_detector_dir = '/usr/lib/openappid',
  log_stats = true,
  app_stats_period = 60,
}

Signed-off-by: John Audia <therealgraysky@proton.me>
2022-12-16 03:55:34 +08:00
Peter van Dijk
6e8e2d571e pdns-recursor: update to 4.8.0
Signed-off-by: Peter van Dijk <peter.van.dijk@powerdns.com>
2022-12-15 08:59:24 +08:00
Toke Høiland-Jørgensen
17691a5a52 acme-acmesh: Provide a 'combined' certificate bundle as well
The haproxy hotplug script creates a 'combined' certificate bundle that
contains both the certificate chain and the private key. However, having a
daemon hotplug script write into CERT_DIR is not great; so let's provide
the bundle as part of the main acme framework, keeping it in $domain_dir
and just linking it into CERT_DIR. That way we can keep CERT_DIR as just a
collection of links for everything, that no consumers should need to write
into.

Also make sure to set the umask correctly so the combined file is not
world-readable (since it contains the private key).

Signed-off-by: Toke Høiland-Jørgensen <toke@toke.dk>
2022-12-14 16:43:45 +01:00
Toke Høiland-Jørgensen
152a26da57 acme-acmesh: Don't hard-code certificate directory
The acme-acmesh package hardcoded the certificate path in its hook script.
Now that we export it as a variable we can avoid hard-coding and use the
variable version instead. Also factor out the linking of certificates into
a function so it's not repeated.

Signed-off-by: Toke Høiland-Jørgensen <toke@toke.dk>
2022-12-14 15:31:00 +01:00
Toke Høiland-Jørgensen
e3d6422dc5 acme-common: Export canonical paths for storing certificates and challenges
The contract between the acme-common framework and consumers and hook
scripts is that certificates can be consumed from /etc/ssl/acme and that
web challenges are stored in /var/run/acme/challenge. Make this explicit by
exporting $CERT_DIR and $CHALLENGE_DIR as environment variables as well,
instead of having knowledge of those paths depend on out-of-band
information. We already exported $challenge_dir, but let's change it to
upper-case to make it clear that it's not a user configuration variable.

Signed-off-by: Toke Høiland-Jørgensen <toke@toke.dk>
2022-12-14 15:28:23 +01:00
Toke Høiland-Jørgensen
82558996c9
Merge pull request #20059 from hgl/acme
acme: deprecate state_dir
2022-12-14 15:00:48 +01:00
Glen Huang
c40d7c09b9 acme-acmesh: use $challenge_dir
Signed-off-by: Glen Huang <i@glenhuang.com>
2022-12-14 21:16:57 +08:00
Glen Huang
b907223d57 acme: deprecate state_dir
state_dir is actually a hardcoded value in conffiles. Allowing users to
customize it could result in losing certificates after upgrading if they
don't also specify the dir as being preserved. We shouldn't default to
this dangerous behavior.

With the new ACME package, certificates live in the standard location
/etc/ssl/acme, users who need to do certificate customizations should
look for them in that dir instead.

Signed-off-by: Glen Huang <i@glenhuang.com>
2022-12-14 21:15:52 +08:00
Stan Grishin
582fc64a94
Merge pull request #20062 from stangri/master-pbr
pbr: detect missing iptables
2022-12-12 20:21:12 -07:00
Sibren Vasse
ba8cb7c16c openssh: update to 9.1p1
Signed-off-by: Sibren Vasse <github@sibrenvasse.nl>
2022-12-13 10:04:27 +08:00
Stan Grishin
fff884e67f simple-adblock: bugfix: add dnsmasq.nftset to uci_load_validate
* fixes https://github.com/openwrt/openwrt/issues/11481 thanks to:
* https://github.com/mistepien for reporting
* https://github.com/dave14305 for diagnosing

Signed-off-by: Stan Grishin <stangri@melmac.ca>
2022-12-12 21:43:09 +00:00
Tianling Shen
f7b73bf000
Merge pull request #19982 from golddranks/master
ddns-scripts: update_gandi_net: improve logging & add timeout
2022-12-13 03:59:46 +08:00
Jan Hák
c933a15ceb knot: update to version 3.2.4
Signed-off-by: Jan Hák <jan.hak@nic.cz>
2022-12-13 03:46:46 +08:00