Commit graph

8245 commits

Author SHA1 Message Date
Daniel Golle
2d9b46e677
ovsd: improve package style and update source
Fix post-merge comments in #15316 and update source.

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2021-04-10 16:56:44 +01:00
Gregory L. Dietsche
49535edffd safe-search: prevent duplicate cron job installation
This patch prevents multiple cron jobs from being created to run the
safe-search-maintenance script.

To reproduce this bug, perform the following:
  - Install safe-search
  - Perform an OpenWRT firmware upgrade (choose to preserve user settings)
  - Install safe-search again

Signed-off-by: Gregory L. Dietsche <gregory.dietsche@cuw.edu>
2021-04-10 14:28:25 +02:00
Dirk Brenken
ec20e9df96
adblock: fix games_tracking source url
Signed-off-by: Dirk Brenken <dev@brenken.org>
2021-04-09 18:42:30 +02:00
Philip Prindeville
e44b2665e7
Merge pull request #6924 from derekyerger/strongswan-lattice-sha3
strongswan: add more crypto plugins
2021-04-08 22:26:56 -06:00
Josef Schlehofer
7c80ef5f76
Merge pull request #15353 from ja-pa/knot-resolver-5.3.1
knot-resolver: update to version 5.3.1
2021-04-07 14:17:57 +02:00
Rosen Penev
c6fa2d5bfa ksmbd-tools: update to 3.3.8
Major changes are:
  disable symlink by default.
  remove smack inherit leftovers.
  Enable guest access on IPC$ share by default.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2021-04-07 00:46:54 -07:00
Kirill Nikolaev
272b0a5c18 ksmbd-tools: Add a mDNS TXT record for the ksmbd service
MacOS ignores Bonjour services for which TXT records are not returned. This changes forces umdns service to return a TXT record (`daemon=ksmbd`) for the ksmbd service. The exact content is unimportant and to the best of my knowledge nothing reads the `daemon` tag.

Symptoms of the problem (which are also debugging steps):
* Finder refuses to open the OpenWRT "computer" in the Network list.
* Discovery.app (Bonjour Browser) lists the _ssh._tcp service, but the submenu for it doesn't unfold and no address is shown.
* `dns-sd -L OpenWrt _smb._tcp` doesn't return any address.

Signed-off-by: Kirill Nikolaev <cyril7@gmail.com>
2021-04-07 00:46:54 -07:00
Jan Pavlinec
354523d5b5 ooniprobe: update to version 3.9.0
Remove getrescources call because it is no longer
required.

Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
2021-04-07 10:17:23 +03:00
Jan Pavlinec
3e3025b191
knot-resolver: update to version 5.3.1
Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
2021-04-06 12:41:17 +02:00
Karl Palsson
d4e5f38147 mosquitto: bump to 2.0.10
This is a security fix, affecting 2.0.0 through to 2.0.9.  Mosquitto instances
could be remotely DoS'd by authenticated clients.

Release notes at: https://github.com/eclipse/mosquitto/blob/v2.0.10/ChangeLog.txt
CVE number has not yet been assigned.

Signed-off-by: Karl Palsson <karlp@etactica.com>
2021-04-06 10:33:56 +00:00
Christian Lachner
b94645c68a haproxy: Update HAProxy to v2.2.13
- Update haproxy download URL and hash

Signed-off-by: Christian Lachner <gladiac@gmail.com>
2021-04-06 12:56:05 +03:00
Florian Eckert
97ea947b1e
Merge pull request #15337 from SvenRoederer/xinetd-include
xinetd: honor ${IPKG_INSTROOT} when sourcing /lib/functions.sh
2021-04-06 07:51:43 +02:00
Philip Prindeville
ae3d5aa73e strongswan: bump to 5.9.2
Retire weak algorithms like MD5 and 3DES.

Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2021-04-05 14:58:54 -07:00
Derek Yerger
4c1fc7e311 strongswan: add more crypto plugins
Adds modules for BLISS signature scheme, NTRU and New Hope key
exchange algorithms, and dependencies ChaCha20-Poly1305 AEAD,
ChaCha20 XOF, MGF1 mask generation function, SHA3 hasher SHAKE
XOF, and the Number Theoretic Transform library.

Signed-off-by: Derek Yerger <derek@altdevs.net>
2021-04-05 14:31:49 -05:00
Philip Prindeville
a72780a9c2 strongswan: force PIC on all builds
Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2021-04-05 07:31:40 -10:00
Leonardo Mörlein
24ddf22073 uacme: add retries
Prior to this commit, the acme service attempted to obtain certificates
once and then terminated, regardless of whether the certificate could be
obtained or not. This commit introduces a new uci option "retries" to
the "certificate" section. If this option is set to N, the acme service
will attempt to obtain the certificate up to N times before terminating.
There is a waiting pause between the retries to comply with the rate
limits of Let'sEncrypt.

The waiting pause is:
-  2 minutes for staging certificates
- 24 minutes for production certificates

The current "Failed Validation" rate limits of Let'sEncrypt are:
- staging:   60 per hour -> 1 failure every 1 minute in avg.
- production: 5 per hour -> 1 failure every 12 minutes in avg.

This means that we are within rate limits by a factor of two.

By default the option "retries" is set to "1", which means that acme
behaves as before by default. If the variable is set to "0", infinite
retries are performed.

This feature is helpful, when you already want to initiate the
certificate request, but you are still waiting for your dns server to be
configured, your network to appear or other conditions.

Signed-off-by: Leonardo Mörlein <git@irrelefant.net>
2021-04-04 22:16:02 -07:00
Leonardo Mörlein
9a6c2339b0 uacme: propagate rc of uacme in issue_cert()
Before this commit, issue_cert always returned 1 no matter if uacme
returned 1, 2, 3, ... With this commit, the return code of the uacme
binary is propagated. Therefore the caller of issue_cert can
differentiate between "no renew necessary" and "an error occurred".

Signed-off-by: Leonardo Mörlein <me@irrelefant.net>
2021-04-04 19:12:38 -07:00
Leonardo Mörlein
4588a61652 uacme: allow including run-uacme
With this commit, the run-acme script can be included into other scripts
by setting INLCUDE_ONLY=1.

Signed-off-by: Leonardo Mörlein <me@irrelefant.net>
2021-04-04 19:12:38 -07:00
Ondřej Caletka
0c044284b7 jool: Update to 4.1.5
Compile and run tested on: mvebu (Turris Omnia)

Signed-off-by: Ondřej Caletka <ondrej@caletka.cz>
2021-04-04 19:06:05 -07:00
Philip Prindeville
f9d91f1f47 strongswan: migrate to swanctl configs
Derived from the ipsec initd script, with the following changes:

(1) various code improvements, corrections (get rid of left/right
    updown scripts, since there's only one), etc;
(2) add reauth and fragmentation parameters;
(3) add x.509 certificate-based authentication;

and other minor changes.

Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2021-04-04 11:58:51 -06:00
Philip Prindeville
1eeb8bc287
Merge pull request #15339 from pprindeville/strongswan-reset-ipsec.conf
strongswan: remove synthesized ipsec conf files
2021-04-03 22:18:08 -06:00
Rosen Penev
79a2677c07
Merge pull request #15330 from 1715173329/xray
xray-core: Update to 1.4.2
2021-04-03 19:07:17 -07:00
Huangbin Zhan
a1d70de325 overture: update to 1.7
Signed-off-by: Huangbin Zhan <zhanhb88@gmail.com>
2021-04-03 18:42:53 -07:00
Kevin Darbyshire-Bryant
f1d2136024 netifyd: support filter parameter
netifyd supports a '-F' filter option in 'bpf' notation to filter
packets from its consideration.

Add support for a uci 'filter' option. eg. filter to exclude SSDP
multicasts from a particularly noisy device:

option filter 'not (udp and dst 239.255.255.250 and dst port 1900 and src 192.168.1.5)'

Signed-off-by: Kevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk>
2021-04-03 18:40:54 -07:00
Anton Ryzhov
c61ed3e93f restic-rest-server: fix configuration option names
Signed-off-by: Anton Ryzhov <anton@ryzhov.me>
2021-04-03 18:39:36 -07:00
George Iv
76b642b50f yggdrasil: bump to 0.3.16
Signed-off-by: George Iv <zhoreeq@users.noreply.github.com>
2021-04-03 18:38:57 -07:00
Jianhui Zhao
9b9d40c99a rp-pppoe: use pppoe.so instead of rp-pppoe.so
Signed-off-by: Jianhui Zhao <zhaojh329@gmail.com>
2021-04-03 18:38:28 -07:00
Sven Roederer
f25f49a8b7 nut: fix typo in nutshutdown script
Even it's only cosmetic and should not affect the function of regular system,
fix the name of the IPKG_INSTROOT variable.
Typo was added long ago with 8400c9a6ec.

Signed-off-by: Sven Roederer <devel-sven@geroedel.de>
2021-04-03 18:38:13 -07:00
Sven Roederer
bdab7e6bfe xinetd: honor ${IPKG_INSTROOT} when sourcing /lib/functions.sh
Avoid "file not found"-error when embedding via Imagebuilder.

Signed-off-by: Sven Roederer <devel-sven@geroedel.de>
2021-04-04 01:58:14 +02:00
Dirk Brenken
86a20c7955
banip: bugfix 0.7.6-2
* fix housekeeping of external list sources

Signed-off-by: Dirk Brenken <dev@brenken.org>
2021-04-03 19:16:39 +02:00
Tianling Shen
781c70077b
xray-core: Update to 1.4.2
Updated geo datas to latest version.

Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2021-04-02 17:19:35 +08:00
Tianling Shen
736667ce6e
xray-core: init: add browser dialer support
Since v1.4.1, Xray has introduced a new feature to transfer data via
browsers, which can disguise itself as a normal browser to cheat
network censorship.

For more details, see https://github.com/XTLS/Xray-core/pull/421.

Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2021-04-02 17:19:31 +08:00
Josef Schlehofer
93fb1b4ca2
Merge pull request #15301 from ja-pa/git-lfs-2.13.3
git-lfs: update to version 2.13.3
2021-04-02 01:41:16 +02:00
Philip Prindeville
baa38a1420 strongswan: remove synthesized ipsec conf files
If you shutdown ipsec service, and it doesn't clean up
/var/ipsec/ipsec.conf, then when you start swanctl service it
might see an incompatible file on startup.  Remedy is to
remove unneeded files when shutting down the service.  They
can always be regenerated when the service starts again.

Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2021-04-01 15:06:00 -06:00
Philip Prindeville
58936f4420
Merge pull request #15286 from pprindeville/strongswan-move-ipsec.secrets
strongswan: move ipsec conf files to subpackage
2021-04-01 14:16:35 -06:00
Jo-Philipp Wich
7f065a94bb openvpn: fix invoking user up & down commands from hotplug wrapper
This commit adds a number of fixes to the OpenVPN up/down hotplug command
wrapper which currently fails to actually invoke user defined up and down
commands for uci configurations not using external native configurations.

 - Use the `--setenv` to pass the user configured `up` and `down` commands
   as `user_up` and `user_down` environment variables respectively

 - Instead of attempting to scrape the `up` and `down` settings from the
   (possibly generated) native OpenVPN configuration in
   `/etc/hotplug.d/openvpn/01-user`, read them from the respective
   environment variables instead

 - Fix parsing of native configuration values in `get_openvpn_option()`;
   first try to parse a given setting as single quoted value, then as
   double quoted and finally as non-quoted, potentially white-space
   escaped one. This ensures that `up '/bin/foo'` is interpreted as
   `/bin/foo` and not `'/bin/foo'`

Ref: https://forum.openwrt.org/t/openvpn-up-down-configuration-ignored/91126
Supersedes: #15121, #15284
Signed-off-by: Jo-Philipp Wich <jo@mein.io>
2021-04-01 07:20:03 -04:00
Rosen Penev
74611b3e5a
Merge pull request #15327 from ja-pa/curl-7.76.0
curl: update to version 7.76.0 (security fix)
2021-04-01 04:08:58 -07:00
Paul Spooren
ba82e9957d tmate-ssh-server: add package
The `tmate` tool is a fork of `tmux` which allows remote access to a
device without setting up any port forwarding. This commits adds the
backend server which handles connections.

Signed-off-by: Paul Spooren <mail@aparcar.org>
2021-03-31 23:37:19 -10:00
Jan Pavlinec
b971310549
curl: update to version 7.76.0
Fixes CVE-2021-22876 and CVE-2021-22890

Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
2021-04-01 11:02:53 +02:00
Tianling Shen
07bc6996b6 xray-core: Update to 1.4.1
Updated geodata to latest version.

Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2021-03-31 17:37:29 -10:00
Philip Prindeville
e626255b37 strongswan: move ipsec conf files to subpackage
These config files are only used by the ipsec interface to charon,
and shouldn't be part of the base package.

Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2021-03-31 21:19:40 -06:00
Daniel Golle
3e30c34bac
ovsd: add package
Add Open vSwtich configuration daemon for netifd.

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2021-04-01 00:14:26 +01:00
Jan Hak
d92a2cd21b knot: update to version 3.0.5
Signed-off-by: Jan Hak <jan.hak@nic.cz>
2021-03-29 11:48:21 +02:00
Jan Pavlinec
0042beff72
git-lfs: update to version 2.13.3
Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
2021-03-29 10:48:06 +02:00
Dirk Brenken
994ff9ba1f
Merge pull request #15289 from dibdot/banip
banip: update to 0.7.6
2021-03-28 21:58:31 +02:00
Lucian Cristian
2e4c264a54 frr: update to 7.5.1 and backports
Signed-off-by: Lucian Cristian <lucian.cristian@gmail.com>
2021-03-28 22:37:02 +03:00
Dirk Brenken
1235acdde6
banip: update to 0.7.6
* rework the central iptables function to significantly
  reduce the code complexity and the overall number of iptables calls
* check early and only once in the chain for ctstate NEW and
  return otherwise (thanks @ldir-EDB0)
* made the whitelist ordering within the chain more flexible

Signed-off-by: Dirk Brenken <dev@brenken.org>
2021-03-28 17:07:28 +02:00
Rosen Penev
a31b732007 treewide: build CMake projects with Ninja
faster to compile.

A small selection of packages was tested going from:

Executed in  696.30 secs   fish           external
   usr time   82.98 mins  395.00 micros   82.98 mins
   sys time    9.02 mins    0.00 micros    9.02 mins

to:

Executed in  592.20 secs   fish           external
   usr time   84.84 mins  361.00 micros   84.84 mins
   sys time    8.85 mins   57.00 micros    8.85 mins

Tested by running make -j 12 and wiping staging/build_dir/target_x

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2021-03-27 21:51:50 -07:00
Philip Prindeville
a7c8f9de0c
Merge pull request #14711 from pprindeville/strongswan-make-includes-persistent
strongswan: make the include's in the .conf files persistent
2021-03-26 21:45:08 -06:00
Dirk Brenken
d2c149a68e
Merge pull request #15276 from dibdot/banip
banip: update to 0.7.5-4
2021-03-26 22:01:30 +01:00