Commit graph

3868 commits

Author SHA1 Message Date
Rosen Penev
2a85006ab4
wifidog: Change to use TLS above 1.0
This should fix compilation as wolfSSL currently does not define
wolfTLSv1_client_method. And as the comment suggests, this is only TLS 1,
not 1.0 and above.

SSLv23 is TLS 1.1 and above as currently configured in the wolfssl package

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2019-04-18 10:57:25 -07:00
Rosen Penev
49e759b28b
Merge pull request #8638 from mwarning/zerotier
zerotier: update version
2019-04-11 09:47:35 -07:00
Karl Palsson
d6ed5c22b4 net/mosquitto: correct config file option name
Correct option is "password_file" not "passwd_file"

Originally reported as: https://github.com/openwrt/packages/pull/8642
Added the package bump.

Signed-off-by: Karl Palsson <karlp@etactica.com>
2019-04-11 12:08:30 +00:00
Moritz Warning
05e16dd223 zerotier: fix multiple instance handling and port setting
Signed-off-by: Moritz Warning <moritzwarning@web.de>
2019-04-10 14:16:52 +02:00
Moritz Warning
59c6457ec8 zerotier: update to version 1.2.12
Signed-off-by: Moritz Warning <moritzwarning@web.de>
2019-04-10 14:16:45 +02:00
Eric Luehrsen
43c1d6c2af unbound: correct forward of root domain
Signed-off-by: Eric Luehrsen <ericluehrsen@gmail.com>
2019-04-05 00:14:50 -04:00
Jonas Gorski
b7bcf24a00 znc: backport CVE fixes to 1.6
Backport fixes for CVEs CVE-2018-14055 and CVE-2018-14056.

Signed-off-by: Jonas Gorski <jonas.gorski@gmail.com>
2019-04-01 11:28:30 +02:00
Rosen Penev
f91539e92f
Merge pull request #7807 from D-Albers/openwrt-18.06
jool: Backport two fixes for newer kernels.
2019-03-29 22:56:13 -07:00
Karl Palsson
16fcd6d383 mosquitto: bump to v1.5.8
Full changelog available at:
https://github.com/eclipse/mosquitto/blob/v1.5.8/ChangeLog.txt

This is a bugfix release.  Of likely note to OpenWrt is a bug affecting
missing messages on bridges since 1.5.4:
https://github.com/eclipse/mosquitto/issues/1174

Signed-off-by: Karl Palsson <karlp@etactica.com>
2019-03-27 11:18:21 +00:00
Daniel Gimpelevich
017b74d359 vpnc: fix IPv6-triggered inoperability
When the server hostname resolved to both IPv4 and IPv6 addresses,
connecting would fail with nothing in syslog. This corrects that oversight.

Signed-off-by: Daniel Gimpelevich <daniel@gimpelevich.san-francisco.ca.us>

(cherry picked from ca56324 and PKG_MIRROR_HASH removal from 494ce71)
2019-03-17 16:39:07 +02:00
Hannu Nyman
3323ebddfe
Merge pull request #8403 from BKPepe/transmission_openwrt-18.06
[OpenWrt 18.06] Transmission: update to version 2.94
2019-03-16 08:01:50 +02:00
Rosen Penev
d444a910fe
transmission: update to version 2.94
Add LTO support

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2019-03-13 15:38:29 +01:00
Eric Luehrsen
a476bf8d00 unbound: update to 1.9.1
Signed-off-by: Eric Luehrsen <ericluehrsen@gmail.com>
2019-03-12 21:26:53 -04:00
W. van den Akker
86efe678a2
Shorewall6: Bump to 5.2.0.5.
Signed-off-by: W. van den Akker <wvdakker@wilsoft.nl>
2019-03-11 20:47:54 +01:00
W. van den Akker
9cdc22eefe
Shorewall: Bump to 5.2.0.5.
Signed-off-by: W. van den Akker <wvdakker@wilsoft.nl>
2019-03-11 20:47:54 +01:00
W. van den Akker
3669215b21
Shorewall6-lite: Bump to 5.2.0.5.
Signed-off-by: W. van den Akker <wvdakker@wilsoft.nl>
2019-03-11 20:47:54 +01:00
W. van den Akker
762093fe72
Shorewall-lite: Bump to 5.2.0.5.
Signed-off-by: W. van den Akker <wvdakker@wilsoft.nl>
2019-03-11 20:47:54 +01:00
W. van den Akker
1a97a8444f
Shorewall-core: Bump to 5.2.0.5.
Signed-off-by: W. van den Akker <wvdakker@wilsoft.nl>
2019-03-11 20:47:21 +01:00
Daniel Golle
daef6665b4 gnurl: update to version 7.64.0
Signed-off-by: Daniel Golle <daniel@makrotopia.org>
(cherry-picked from commit 78adac5930)
2019-03-11 02:26:09 +01:00
Daniel Golle
0ba0e0d1b5 gnunet: revert accidentally applied libmicrohttpd changes
revert 7b2bf511c gnunet: Specify libmicrohttpd-ssl dependency
which was accidentally merged from master while the rename of the
libmicrohttpd* packages has happened only on master.
Revert it for openwrt-18.06.

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2019-03-05 02:02:36 +01:00
Daniel Golle
799c409d37 gnunet-secushare: add package (replacing gnunet-social package)
Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2019-03-03 03:02:19 +01:00
Daniel Golle
d70e35ba10 gnunet: GNUnet v0.11.0 release
Backport and squash the following commits from master:
 4dcd1d4d0 gnunet: update to 0.12 pre-release snapshot
 acc59d3a0 gnunet: fix uclibc build issue
 f546ac9b8 gnunet: remove iconv hack
 b5b271a39 gnunet: update to gnunet 0.11 release candidate source as of 20180929
 1459c3513 gnunet: update source
 0b548cb73 gnunet: adapt uci-defaults to renamed namestore-flat -> -heap
 effc8b5bf gnunet: update to source to 20190128
 7b2bf511c gnunet: Specify libmicrohttpd-ssl dependency
 1d5af8f9e gnunet: fix PKG_MIRROR_HASH
 77191eddb gnunet: GNUnet v0.11 release
 1c658e5f3 gnunet-secushare: auto-configure database backend

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2019-03-03 03:02:12 +01:00
Daniel Golle
6c2266acff gnurl: update to version 7.63.0
Backport and squash the following commits from master:
 af06f6fd5 gnurl: update to version 7.61.1
 7cdbb7569 gnurl: build without libpsl
 d34eda733 gnurl: update to version 7.63.0

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2019-03-03 03:01:48 +01:00
Yousong Zhou
3e6d392e02 openvswitch: bump to version 2.8.5
Signed-off-by: Yousong Zhou <yszhou4tech@gmail.com>
2019-02-27 10:31:44 +00:00
Stijn Tintel
5de163d67c vallumd: bump to 0.1.4
Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
(cherry picked from commit d89cd30a79)
2019-02-17 18:28:56 +02:00
Karl Palsson
b8c2c2b1bb mosquitto: update to 1.5.7
This is a minor bugfix release. Full changelog available at:
https://mosquitto.org/blog/2019/02/version-1-5-7-released/

Most relevant to OpenWrt are probably:
* fixing persistent store bloat
* fix sorting of included config files
* fix errors related to per_listener_settings

Signed-off-by: Karl Palsson <karlp@etactica.com>
2019-02-14 11:14:13 +00:00
Peter Wagner
8a2d566849 irssi: update to 1.2.0
Signed-off-by: Peter Wagner <tripolar@gmx.at>
2019-02-13 23:05:54 +01:00
Yousong Zhou
dad217d34c shadowsocks-libev: flush ss rules on entry
Signed-off-by: Yousong Zhou <yszhou4tech@gmail.com>
2019-02-11 13:30:43 +00:00
Karl Palsson
bbc2e68ede mosquitto: bump to 1.5.6
This is a bugfix and security release.

CVE-2018-12551: If Mosquitto is configured to use a password file for
authentication, any malformed data in the password file will be
treated as valid. This typically means that the malformed data becomes
a username and no password. If this occurs, clients can circumvent
authentication and get access to the broker by using the malformed
username. In particular, a blank line will be treated as a valid empty
username. Other security measures are unaffected.

=> Users who have only used the mosquitto_passwd utility to create and
modify their password files are unaffected by this vulnerability.

CVE-2018-12550: If an ACL file is empty, or has only blank lines or
comments, then mosquitto treats the ACL file as not being defined,
which means that no topic access is denied. Although denying access to
all topics is not a useful configuration, this behaviour is unexpected
and could lead to access being incorrectly granted in some
circumstances.

CVE-2018-12546. If a client publishes a retained message to a topic
that they have access to, and then their access to that topic is
revoked, the retained message will still be delivered to future
subscribers. This behaviour may be undesirable in some applications,
so a configuration option `check_retain_source` has been introduced to
enforce checking of the retained message source on publish.

Plus the following bugfixes:
* wills not sent to websocket clients
* spaces now allowed in bridge usernames
* durable clients not receiving offline messages with
per_listener_settings==true
* compilation with openssl without deprecated apis
* TLS working over SOCKS
* better comment handling in config files

Full changelog available at: https://github.com/eclipse/mosquitto/blob/fixes/ChangeLog.txt#L1

Signed-off-by: Karl Palsson <karlp@etactica.com>
2019-02-08 11:55:04 +00:00
Jonathan G. Underwood
09b794eccc stubby: update to version 0.2.4
This upstream release adds support for trust_anchors_backoff_time
configuration parameter. UCI support has been added for this.

This commit also includes a number of clean-ups:
    o change START=50 to START=30 in init file
      Starting earlier in the boot means less chance of missing interface
      trigger events. See: https://github.com/openwrt/packages/pull/4675
    o remove unused variables from init file
    o separate local declarations and assignments in init file
    o add defensive quoting in init file
    o use default values for procd respawn in init file
    o make use of {} in variables consistent in init file
    o remove unused variable from init file

Signed-off-by: Jonathan G. Underwood <jonathan.underwood@gmail.com>
2019-01-31 23:41:52 +00:00
David Mora
41c4f82f8d stubby: Remove iamperson347 from maintainer
I am no longer able to support maintaining the stubby daemon for openwrt. I suggest Jonathan Underwood <jonathan.underwood@gmail.com> as a replacement.
2019-01-31 23:41:52 +00:00
jonathanunderwood
2cf2210d83 stubby: add Jonathan Underwood as co-maintainer (#7307)
Signed-off-by: Jonathan G. Underwood <jonathan.underwood@gmail.com>
2019-01-31 23:41:52 +00:00
Jonathan G. Underwood
709a736043 stubby: add reload_config to documentation
Signed-off-by: Jonathan G. Underwood <jonathan.underwood@gmail.com>
2019-01-31 23:41:52 +00:00
Jonathan G. Underwood
aa8380721b stubby: fix loading of config file
Signed-off-by: Jonathan G. Underwood <jonathan.underwood@gmail.com>
2019-01-31 23:41:52 +00:00
Jonathan G. Underwood
6e2451dd00 stubby: add uci support to init file
This commit brings UCI support to the stubby package.

    o All options are documented in the README.md file.
    o The README.md file has been re-written to include a short usage
      manual.
    o The default configuration now includes more Cloudflare addresses.
    o The stubby service is (re)started using procd triggers from a
      specified interface with a configurable time delay.
    o Round robin use of upstream resolvers is now activated by
      default.
    o Client privacy is now activated by default.
    o Options are added for specifying the log level of the daemon and
      command line options passed to the stubby command.

Signed-off-by: Jonathan G. Underwood <jonathan.underwood@gmail.com>
2019-01-31 23:41:51 +00:00
Tony Ambardar
7a2b9df89b stubby: bump PKG_RELEASE
Signed-off-by: Tony Ambardar <itugrok@yahoo.com>
2019-01-31 23:41:51 +00:00
Tony Ambardar
304596d21c stubby: remove unnecessary core limit
Remove the limit setting core="unlimited", since this shouldn't be needed
in production use (i.e. non-debug) and on an embedded platform, which is
why it's rarely used by any existing packages.

Signed-off-by: Tony Ambardar <itugrok@yahoo.com>
2019-01-31 23:41:51 +00:00
Tony Ambardar
fd8505f760 stubby: add SPKI pin set for Cloudflare cert
Add an SPKI pin for Cloudflare to help prevent MITM and downgrade attacks,
as described in RFC7858 (DNS over TLS). The setup of SPKI and the specific
SHA256 certificate hash are taken from Cloudflare's DoT configuration guide
published at https://developers.cloudflare.com/1.1.1.1/dns-over-tls/.

Note that the certificate is valid to March 25th 2020, 13:00 CET, which
provides ample time for issuance of a backup pin to support future key
rollover.

Signed-off-by: Tony Ambardar <itugrok@yahoo.com>
2019-01-31 23:41:51 +00:00
Tony Ambardar
b77053d350 stubby: add Cloudflare 1.0.0.1 and ::1001 servers
Signed-off-by: Tony Ambardar <itugrok@yahoo.com>
2019-01-31 23:41:51 +00:00
Tony Ambardar
3f17c54f26 stubby: use EDNS client-subnet privacy by default
Retain the upstream value since privacy is usually the key user motivation
for using DNS-over-TLS, and simply note that those encountering sub-optimal
routing may consider disabling the setting.

Signed-off-by: Tony Ambardar <itugrok@yahoo.com>
2019-01-31 23:41:51 +00:00
Tony Ambardar
9351266328 stubby: fix config file definition
The config file /etc/stubby/stubby.yml is not registered properly and any
local changes are being overwritten on upgrade or reinstall.

Signed-off-by: Tony Ambardar <itugrok@yahoo.com>
2019-01-31 23:41:51 +00:00
Tony Ambardar
d3b090a311 stubby: rearrange Makefile for clarity
Signed-off-by: Tony Ambardar <itugrok@yahoo.com>
2019-01-31 23:41:51 +00:00
Tony Ambardar
a3a73ef7bc stubby: add missing dependency on ca-certificates
Signed-off-by: Tony Ambardar <itugrok@yahoo.com>
2019-01-31 23:41:51 +00:00
Adrien DAURIAT
cc8439566f acme: Fix loading credentials
Move loading credential function before cert renewal call as credentials might be needed for some renewal operations ( ex: DNS )

Signed-off-by: Adrien DAURIAT <16813527+dauriata@users.noreply.github.com>
2019-01-31 15:16:33 +01:00
Rosen Penev
931070c26d jool: Backport two fixes for newer kernels.
The first is needed for 4.14 (maybe the relevant parts got packported and
the second is for when OpenWrt migrates to 4.19.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
(cherry picked from commit 4f28139a3c)

Signed-off-by: Daniel Albers <Daniel.Albers@public-files.de>
2018-12-30 16:16:36 +01:00
Daniel F. Dickinson
8f41fa7f82 nut: Default to run as root but fix alt runas
Since the new hotplug script in master was not backport (new feature),
for 18.06 branch revert the old behavior of running NUT daemons and
drivers as root by default to avoid permisions problems, but backport
fix the support for running as another user for those who can set the
appropriate permissions on the USB (or other) device.

Closes: #7742

Signed-off-by: Daniel F. Dickinson <cshored@thecshore.com>
2018-12-28 16:18:26 -05:00
Karl Palsson
13a4dcd614 net/mosquitto: bump to 1.5.5
Security and bug fix.  Full changelog available at: https://mosquitto.org/ChangeLog.txt

Signed-off-by: Karl Palsson <karlp@etactica.com>
2018-12-17 10:55:34 +00:00
Daniel F. Dickinson
bb1b12733e nut: Backport fixes from master
Backport and squash the following commits from master:

  5790053eb nut: Add missing conffiles
  ceff68837 nut: Reorganize nut-server to clarify nut-driver
  f6a2a97d2 nut: Use 'real' procd init for nut-monitor
  918a62f91 nut: Make FSD really work
  a2f64b3ba nut: Reduce user error with POWERDOWNFLAG
  461393810 nut: Use quotes around filenames
  1b6dbe7a7 nut: Remove duplicate/extraneous lines
  0a49d0ffb nut: Fix checking for path before it exists
  3b5a8eee8 nut: Various startup fixes for monitor and server
  44e57d4bd nut: Fix variables for NUT drivers
  36fd59dc7 nut: Fix extraneous config_get
  192b0f164 nut: Fix a typo in setting a driver parameter
  f48b060fa nut: Fix upsd runs as root

And bump PKG_RELEASE

Signed-off-by: Daniel F. Dickinson <cshored@thecshore.com>
2018-12-11 07:19:15 -05:00
Karl Palsson
890c302e1a net/mosquitto: support more acl plugin options
Adds support for acl_plugin, and acl_opt_* options.
acl_opt_* requires some care as it relies on the internal behaviour of
cfg_load setting environment variables in a certain form.  However,
given that _all_ of the cfg_load infrastructure relies on that, we can
be pretty sure that it won't change in a way that will hurt us.

Originally reported as: https://github.com/openwrt/packages/pull/7434

Signed-off-by: Karl Palsson <karlp@etactica.com>
2018-11-27 16:54:37 +00:00
champtar
469bcb5ea1
Merge pull request #7481 from padre-lacroix/darkstat-18.06
darkstat: [18.06] procd init script and enabling additional parameters
2018-11-26 19:57:01 -05:00