Commit graph

9527 commits

Author SHA1 Message Date
Nick Hainke
28ca76d29b dawn: update to 2022-07-24
edca4d2 network: rework network status callbacks

Signed-off-by: Nick Hainke <vincent@systemli.org>
2022-07-24 13:01:46 +02:00
Rosen Penev
0a65e4c6fa curl: switch default SSL to mbedTLS
The decision to switch the default to wolfSSL was taken because of
hostapd back from when curl was in base. Unfortunately, not only is
wolfSSL bigger but it has also been causing issues recently. There's
also no relation between hostapd and curl.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2022-07-23 12:39:21 -07:00
Nick Hainke
1f60c23296 dawn: update to 2022-07-22
10fb043 network: dump detail on ping pong received

Signed-off-by: Nick Hainke <vincent@systemli.org>
2022-07-22 21:32:42 +02:00
Nick Hainke
204fd77bbc dawn: update to 2022-07-21
bb362db datastorage: fix ap_array_unlink_entry always returns NULL
47e98ef network: ping pong keepalive for tcp connections
eba0354 network: add timeout for client connections

In the dawn config the con_timeout needs to be added:
  option con_timeout '60'

Signed-off-by: Nick Hainke <vincent@systemli.org>
2022-07-21 17:16:23 +02:00
David Bauer
7967abfae0 usteer: update to latest HEAD
9059b9a ubus: derive RSSI from measurement report

Signed-off-by: David Bauer <mail@david-bauer.net>
2022-07-21 10:31:10 +02:00
Rosen Penev
83fb896117 geth: update to 1.10.20
Fix compilation with latest iconv changes.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2022-07-20 02:39:15 -07:00
Rosen Penev
4605f98b41 wifidog: fix compilation with more recent wolfssl
Needs an extra header. pthread.h is also no longer implicitly included.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2022-07-19 21:19:04 -07:00
Rosen Penev
317575755a curl: fix compilation with wolfSSL
options.h header is needed now.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2022-07-19 20:03:26 -07:00
Pascal Ernster
e702a66058 unbound: update to 1.16.1
Maintainer: @EricLuehrsen
Compile tested: realtek/rtl838x, x86/64
Run tested: realtek/rtl838x, x86/64
Description: Update to 1.16.1

Signed-off-by: Pascal Ernster <git@hardfalcon.net>
2022-07-19 12:29:19 +03:00
Nick Hainke
bb0d45ed35 dawn: update to 2022-07-18
e596ff1 ubus.c: only add nr entries matching our own SSID

Signed-off-by: Nick Hainke <vincent@systemli.org>
2022-07-18 18:11:21 +02:00
Tianling Shen
25922c6afd xray-core: Update to 1.5.9
Updated geodata to latest version while at it.

Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2022-07-18 07:43:19 +02:00
Jeffery To
1e6ac889a3
Merge pull request #18854 from Torxgewinde/restic_rest_server_update
restic-rest-server: update to 0.11.0
2022-07-18 13:30:37 +08:00
Martin Blumenstingl
cf5fde6bea netsniff-ng: Update to version 0.6.8
The update fixes GCC-10 (or newer) builds. Remove 010-uclibc.patch as it
has been applied upstream in this new version.

Signed-off-by: Martin Blumenstingl <martin.blumenstingl@googlemail.com>
2022-07-17 13:56:06 -07:00
Rosen Penev
6c4d3583b7 softethernetvpn: remove libiconv/host dependency
No longer present and with the nls.mk removal, no longer needed.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2022-07-17 10:56:47 -07:00
Dirk Brenken
3ae7a46b82
travelmate: update 2.0.9-2
* fix another vpn corner case
* add support for javascript based captive portals (location.href)

Signed-off-by: Dirk Brenken <dev@brenken.org>
2022-07-17 13:14:05 +02:00
Nick Hainke
eef9ee0b83 dawn: update to 2022-07-16
0689b5e ubus: add missing lock for ubus hearing_map
4b7db09 CONFIGURE.md: fix typo
b3f61d4 CONFIGURE.md: adjust documentation about log levels

Signed-off-by: Nick Hainke <vincent@systemli.org>
2022-07-16 19:44:21 +02:00
Rosen Penev
83fe727ff1 spoofer: update to 1.4.8
Signed-off-by: Rosen Penev <rosenp@gmail.com>
2022-07-14 15:00:27 -07:00
Ralf Kaiser
2a4edb8a85 gsocket: add a new package with version 1.4.37
Global Socket allows two workstations on different private networks to
communicate with each other. Through firewalls and through NAT - like
there is no firewall.

The TCP connection is secured with AES-256 and using OpenSSL's SRP
protocol (RFC 5054). It does not require a PKI and has forward
secrecy and (optional) TOR support.

The gsocket tools derive temporary session keys and IDs and connect
two TCP pipes through the Global Socket Relay Network (GSRN). This is
done regardless and independent of the local IP Address or geographical
location.

The session keys (secrets) never leave the workstation. The GSRN sees only
the encrypted traffic.

The workhorse is 'gs-netcat' which opens a ssh-like interactive PTY
command shell to a remote workstation (which resides on a private and
remote network and/or behind a firewall).

Also added test.sh file to run test it inside containeer

Signed-off-by: Ralf Kaiser <skyper@thc.org>
2022-07-13 12:28:39 -07:00
Peter van Dijk
c5480ef8a1 pdns-recursor: update to 4.7.1
Signed-off-by: Peter van Dijk <peter.van.dijk@powerdns.com>
2022-07-13 21:23:01 +02:00
Peter van Dijk
636da278eb pdns: update to 4.6.3
Signed-off-by: Peter van Dijk <peter.van.dijk@powerdns.com>
2022-07-13 21:22:48 +02:00
Florian Eckert
6c34135cad
Merge pull request #18913 from jempatel/improve_apinger-procd-uci
apinger: improve uci and procd support
2022-07-12 09:24:05 +02:00
Jaymin Patel
e4e3206f32 apinger: improve uci and procd support
- convert apinger into procd instances
- generate instance specific apinger.conf from uci
- hotplug handling for apinger alarms
- restart apinger interface instance on ifup action of interface
- don't exit on packet count mismatch, allows to use apinger as monitor
  for multiple targets handling
- add srcip option to target configuration, allows specifying source ip
  used to monitor target
- allow creating status file in script parseable format

Patches are ported against latest version of apinger and referenced from
https://git.pld-linux.org/?p=packages/apinger.git;a=summary

Signed-off-by: Jaymin Patel <jem.patel@gmail.com>
2022-07-12 12:27:05 +05:30
Josef Schlehofer
aaf83ad88b
Merge pull request #18811 from turris-cz/bind
bind: update to version 9.18.4
2022-07-11 12:44:35 +02:00
Rosen Penev
6283311fc1 softethervpn: get rid of external iconv
Not really needed.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2022-07-10 18:26:50 -07:00
Rosen Penev
142b73b5db transmission: get rid of iconv dependency
No need for an external one.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2022-07-10 18:26:50 -07:00
Michael Heimpold
02faa202e5 ser2net: schedule start later during boot (fixes #18872)
Usually, no other local service depends on the start of ser2net, so
let's start it later in the boot process.

Signed-off-by: Michael Heimpold <mhei@heimpold.de>
2022-07-09 21:46:41 +02:00
Rosen Penev
598bf7936a clamav: fix compilation without libiconv-stub
Ported similar patch from hidapi.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2022-07-08 23:43:54 -07:00
Tianling Shen
798cf62bd8 dnslookup: Update to 1.7.1
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2022-07-07 07:45:06 +02:00
Tianling Shen
e858624d29 cloudflared: Update to 2022.7.1
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2022-07-07 07:44:47 +02:00
Dirk Brenken
cf1f9dc933
travelmate: update 2.0.9
* various vpn fixes/optimizations (run tested by forum users)
* refine several log statements

Signed-off-by: Dirk Brenken <dev@brenken.org>
2022-07-06 23:17:07 +02:00
Dengfeng Liu
5615ce33fa xfrpc: update to 1.06.579
Signed-off-by: Dengfeng Liu <liudf0716@gmail.com>
2022-07-05 22:03:12 -07:00
Dengfeng Liu
10a24d4cad xfrpc: set xfrpc's disabled default value to 0
change this to satisfy luci-app-xfrpc's need

Signed-off-by: Dengfeng Liu <liudf0716@gmail.com>
2022-07-05 22:03:12 -07:00
Aleksander Morgado
c15e94f6c5 modemmanager: explicitly disconnect even if no bearers found
A network restart where netifd is cleanly restarted involves bringing
the network interfaces down. The 'modemmanager' protocol handler will
run a mmcli --simple-disconnect in this case, but only if there are
bearer objects found.

If the network restart happened *during* the connection attempt
procedure, while the modem is e.g. being registered in the network, no
bearer objects exist yet, and so, we would skip doing anything during
the interface teardown operation. This would lead to the original
connection attempt succeeding, so leaving the modem in ModemManager
in connected state, while the associated interface in netifd is
reported down.

Signed-off-by: Aleksander Morgado <aleksander@aleksander.es>
2022-07-05 21:59:51 -07:00
Stijn Tintel
8b5c761c88 kea: create /var/run/kea in init script
Kea expects /var/run/kea to exist. Without it, errors occur:

  Mon Jun 13 10:31:45 2022 daemon.err kea-dhcp6[2977]: Unable to use interprocess sync lockfile (No such file or directory): /var/run/kea/logger_lockfile

Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
2022-07-05 21:59:34 -07:00
Rui Salvaterra
f47a311269 tor: bump to 0.4.7.8 stable
From the changelog…

  o Major bugfixes (congestion control, TROVE-2022-001):
    - Fix a scenario where RTT estimation can become wedged, seriously
      degrading congestion control performance on all circuits. This
      impacts clients, onion services, and relays, and can be triggered
      remotely by a malicious endpoint. Tracked as CVE-2022-33903. Fixes
      bug 40626; bugfix on 0.4.7.5-alpha.

  o Minor features (fallbackdir):
    - Regenerate fallback directories generated on June 17, 2022.

  o Minor features (geoip data):
    - Update the geoip files to match the IPFire Location Database, as
      retrieved on 2022/06/17.

  o Minor bugfixes (linux seccomp2 sandbox):
    - Allow the rseq system call in the sandbox. This solves a crash
      issue with glibc 2.35 on Linux. Patch from pmu-ipf. Fixes bug
      40601; bugfix on 0.3.5.11.

  o Minor bugfixes (logging):
    - Demote a harmless warn log message about finding a second hop to
      from warn level to info level, if we do not have enough
      descriptors yet. Leave it at notice level for other cases. Fixes
      bug 40603; bugfix on 0.4.7.1-alpha.
    - Demote a notice log message about "Unexpected path length" to info
      level. These cases seem to happen arbitrarily, and we likely will
      never find all of them before the switch to arti. Fixes bug 40612;
      bugfix on 0.4.7.5-alpha.

  o Minor bugfixes (relay, logging):
    - Demote a harmless XOFF log message to from notice level to info
      level. Fixes bug 40620; bugfix on 0.4.7.5-alpha.

Signed-off-by: Rui Salvaterra <rsalvaterra@gmail.com>
2022-07-05 21:58:40 -07:00
Jaymin Patel
d71bea3f19 autossh: improve uci and procd support
- convert autossh into procd instances
- add new uci config options to handle local and remote
  port forwarding
- remove hotplug down actions causing service to stop on
  any interface down event

Signed-off-by: Jaymin Patel <jem.patel@gmail.com>
2022-07-05 21:53:27 -07:00
Darryl Sokoloski
74ea2bdb80 netifyd: Updated to v4.2.0.
Signed-off-by: Darryl Sokoloski <darryl@sokoloski.ca>
2022-07-05 17:37:09 -07:00
Moritz Warning
9e39792603 zerotier: update to 1.10.1
Signed-off-by: Moritz Warning <moritzwarning@web.de>
2022-07-04 15:58:49 -07:00
Nick Hainke
53e3e5d127 radsecproxy: update to 1.9.1
Remove upstreamed patches:
- 100-fix-setstacksize-for-glibc-2.34.patch

Refresh patches:
- 200-logdest-on-foreground.patch

Changes:
  Misc:
  - OpenSSL 3.0 compatibility

  Bug Fixes:
  - Fix refused startup with openssl <1.1
  - Fix compiler issue for Fedora 33 on s390x
  - Fix small memory leak in config parser
  - Fix lazy certificate check when connecting to TLS servers
  - Fix connect is aborted if first host in list has invalid certificate
  - Fix setstacksize for glibc 2.34
  - Fix system defaults/settings for TLS version not honored

Signed-off-by: Nick Hainke <vincent@systemli.org>
2022-07-04 00:02:02 +02:00
Tom Stöveken
eecb90faac restic-rest-server: update to 0.11.0
Maintainer: Tom Stöveken <tom@naaa.de>, Markus Weippert handed over, see: https://github.com/openwrt/packages/pull/18715#issuecomment-1153567619
Compile tested: SDK for OpenWrt 21.02.3
Run tested: x86/64, J&W Technologies I1171D001 Intel(R) Celeron(R) CPU N3160 @ 1.60GHz, OpenWrt 21.02.3

Description:
Updated to version 0.11.0
Added new configuration parameters

Signed-off-by: Tom Stöveken <tom@naaa.de>
2022-07-03 12:01:18 +02:00
Stijn Tintel
d0878c8504 usteer: bump to git HEAD
5be6819 policy: allow disabling load balancing
  80b0b65 main: disable load balancing by default
  fca4b87 policy: improve readability
  73c424b usteer: add option for probe steering
  87de1ab main: disable probe steering by default

Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
2022-07-02 07:46:58 +02:00
Maxim Storchak
6f996e50e8 tgt: update to 1.0.83
Signed-off-by: Maxim Storchak <m.storchak@gmail.com>
2022-07-01 12:19:36 +02:00
Dirk Brenken
f0477d9499
travelmate: update 2.0.8-3
* refine vpn timeout

Signed-off-by: Dirk Brenken <dev@brenken.org>
2022-06-27 11:27:17 +02:00
Dirk Brenken
06784b4e32
travelmate: update 2.0.8-2
* make vpn handling more reliable

Signed-off-by: Dirk Brenken <dev@brenken.org>
2022-06-25 09:44:41 +02:00
Josef Schlehofer
fd3a6ac709
bind: update to version 9.18.4
Fixes:
- CVE-2022-1183

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
2022-06-24 11:57:26 +02:00
Peter van Dijk
283b269c7c dnsdist: switch from liblua to luajit
luajit provides higher performance for requests handled in Lua hooks.
It also enables access to dnsdist functionality only exposed via FFI,
and allows configurations/hooks to call functions in any C library
without providing separate bindings.

Signed-off-by: Peter van Dijk <peter.van.dijk@powerdns.com>
2022-06-23 12:35:59 -06:00
Dirk Brenken
0ee0aa2b53
travelmate: update 2.0.8
* the domain whitelist feature has been extended to free up multiple nested captive portal domains.

Signed-off-by: Dirk Brenken <dev@brenken.org>
2022-06-23 09:19:23 +02:00
Josef Schlehofer
f74754fac1 knot-resolver: update to version 5.5.1
Changelog for versions:
- 5.4.4 [1]
- 5.5.0 [2]
- 5.5.1 [3]

[1] https://www.knot-resolver.cz/2022-01-05-knot-resolver-5.4.4.html
[2] https://www.knot-resolver.cz/2022-03-15-knot-resolver-5.5.0.html
[3] https://www.knot-resolver.cz/2022-06-14-knot-resolver-5.5.1.html

And refresh patch to avoid offset

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
2022-06-22 22:24:33 -06:00
Ivan Pavlov
69e4ed4b6f xtables-addons: update to 3.21
updated to kernel 5.10.121+ changes

Signed-off-by: Ivan Pavlov <AuthorReflex@gmail.com>
2022-06-22 22:17:15 -06:00
Christian Lachner
c571a146b4 haproxy: Update HAProxy to v2.6.1
- New major LTS release (https://www.mail-archive.com/haproxy@formilux.org/msg42371.html)
- Sadly, no QUIC/H3 support for now because the QuicTLS library - which is a fork of OpenSSL - would be needed. However, we do not have a package for that and I currently do not want to build and statically link it into the haproxy package
- Update haproxy download URL and hash

Signed-off-by: Christian Lachner <gladiac@gmail.com>
2022-06-22 16:47:20 +03:00