Commit graph

3847 commits

Author SHA1 Message Date
Daniel Golle
799c409d37 gnunet-secushare: add package (replacing gnunet-social package)
Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2019-03-03 03:02:19 +01:00
Daniel Golle
d70e35ba10 gnunet: GNUnet v0.11.0 release
Backport and squash the following commits from master:
 4dcd1d4d0 gnunet: update to 0.12 pre-release snapshot
 acc59d3a0 gnunet: fix uclibc build issue
 f546ac9b8 gnunet: remove iconv hack
 b5b271a39 gnunet: update to gnunet 0.11 release candidate source as of 20180929
 1459c3513 gnunet: update source
 0b548cb73 gnunet: adapt uci-defaults to renamed namestore-flat -> -heap
 effc8b5bf gnunet: update to source to 20190128
 7b2bf511c gnunet: Specify libmicrohttpd-ssl dependency
 1d5af8f9e gnunet: fix PKG_MIRROR_HASH
 77191eddb gnunet: GNUnet v0.11 release
 1c658e5f3 gnunet-secushare: auto-configure database backend

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2019-03-03 03:02:12 +01:00
Daniel Golle
6c2266acff gnurl: update to version 7.63.0
Backport and squash the following commits from master:
 af06f6fd5 gnurl: update to version 7.61.1
 7cdbb7569 gnurl: build without libpsl
 d34eda733 gnurl: update to version 7.63.0

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2019-03-03 03:01:48 +01:00
Yousong Zhou
3e6d392e02 openvswitch: bump to version 2.8.5
Signed-off-by: Yousong Zhou <yszhou4tech@gmail.com>
2019-02-27 10:31:44 +00:00
Stijn Tintel
5de163d67c vallumd: bump to 0.1.4
Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
(cherry picked from commit d89cd30a79)
2019-02-17 18:28:56 +02:00
Karl Palsson
b8c2c2b1bb mosquitto: update to 1.5.7
This is a minor bugfix release. Full changelog available at:
https://mosquitto.org/blog/2019/02/version-1-5-7-released/

Most relevant to OpenWrt are probably:
* fixing persistent store bloat
* fix sorting of included config files
* fix errors related to per_listener_settings

Signed-off-by: Karl Palsson <karlp@etactica.com>
2019-02-14 11:14:13 +00:00
Peter Wagner
8a2d566849 irssi: update to 1.2.0
Signed-off-by: Peter Wagner <tripolar@gmx.at>
2019-02-13 23:05:54 +01:00
Yousong Zhou
dad217d34c shadowsocks-libev: flush ss rules on entry
Signed-off-by: Yousong Zhou <yszhou4tech@gmail.com>
2019-02-11 13:30:43 +00:00
Karl Palsson
bbc2e68ede mosquitto: bump to 1.5.6
This is a bugfix and security release.

CVE-2018-12551: If Mosquitto is configured to use a password file for
authentication, any malformed data in the password file will be
treated as valid. This typically means that the malformed data becomes
a username and no password. If this occurs, clients can circumvent
authentication and get access to the broker by using the malformed
username. In particular, a blank line will be treated as a valid empty
username. Other security measures are unaffected.

=> Users who have only used the mosquitto_passwd utility to create and
modify their password files are unaffected by this vulnerability.

CVE-2018-12550: If an ACL file is empty, or has only blank lines or
comments, then mosquitto treats the ACL file as not being defined,
which means that no topic access is denied. Although denying access to
all topics is not a useful configuration, this behaviour is unexpected
and could lead to access being incorrectly granted in some
circumstances.

CVE-2018-12546. If a client publishes a retained message to a topic
that they have access to, and then their access to that topic is
revoked, the retained message will still be delivered to future
subscribers. This behaviour may be undesirable in some applications,
so a configuration option `check_retain_source` has been introduced to
enforce checking of the retained message source on publish.

Plus the following bugfixes:
* wills not sent to websocket clients
* spaces now allowed in bridge usernames
* durable clients not receiving offline messages with
per_listener_settings==true
* compilation with openssl without deprecated apis
* TLS working over SOCKS
* better comment handling in config files

Full changelog available at: https://github.com/eclipse/mosquitto/blob/fixes/ChangeLog.txt#L1

Signed-off-by: Karl Palsson <karlp@etactica.com>
2019-02-08 11:55:04 +00:00
Jonathan G. Underwood
09b794eccc stubby: update to version 0.2.4
This upstream release adds support for trust_anchors_backoff_time
configuration parameter. UCI support has been added for this.

This commit also includes a number of clean-ups:
    o change START=50 to START=30 in init file
      Starting earlier in the boot means less chance of missing interface
      trigger events. See: https://github.com/openwrt/packages/pull/4675
    o remove unused variables from init file
    o separate local declarations and assignments in init file
    o add defensive quoting in init file
    o use default values for procd respawn in init file
    o make use of {} in variables consistent in init file
    o remove unused variable from init file

Signed-off-by: Jonathan G. Underwood <jonathan.underwood@gmail.com>
2019-01-31 23:41:52 +00:00
David Mora
41c4f82f8d stubby: Remove iamperson347 from maintainer
I am no longer able to support maintaining the stubby daemon for openwrt. I suggest Jonathan Underwood <jonathan.underwood@gmail.com> as a replacement.
2019-01-31 23:41:52 +00:00
jonathanunderwood
2cf2210d83 stubby: add Jonathan Underwood as co-maintainer (#7307)
Signed-off-by: Jonathan G. Underwood <jonathan.underwood@gmail.com>
2019-01-31 23:41:52 +00:00
Jonathan G. Underwood
709a736043 stubby: add reload_config to documentation
Signed-off-by: Jonathan G. Underwood <jonathan.underwood@gmail.com>
2019-01-31 23:41:52 +00:00
Jonathan G. Underwood
aa8380721b stubby: fix loading of config file
Signed-off-by: Jonathan G. Underwood <jonathan.underwood@gmail.com>
2019-01-31 23:41:52 +00:00
Jonathan G. Underwood
6e2451dd00 stubby: add uci support to init file
This commit brings UCI support to the stubby package.

    o All options are documented in the README.md file.
    o The README.md file has been re-written to include a short usage
      manual.
    o The default configuration now includes more Cloudflare addresses.
    o The stubby service is (re)started using procd triggers from a
      specified interface with a configurable time delay.
    o Round robin use of upstream resolvers is now activated by
      default.
    o Client privacy is now activated by default.
    o Options are added for specifying the log level of the daemon and
      command line options passed to the stubby command.

Signed-off-by: Jonathan G. Underwood <jonathan.underwood@gmail.com>
2019-01-31 23:41:51 +00:00
Tony Ambardar
7a2b9df89b stubby: bump PKG_RELEASE
Signed-off-by: Tony Ambardar <itugrok@yahoo.com>
2019-01-31 23:41:51 +00:00
Tony Ambardar
304596d21c stubby: remove unnecessary core limit
Remove the limit setting core="unlimited", since this shouldn't be needed
in production use (i.e. non-debug) and on an embedded platform, which is
why it's rarely used by any existing packages.

Signed-off-by: Tony Ambardar <itugrok@yahoo.com>
2019-01-31 23:41:51 +00:00
Tony Ambardar
fd8505f760 stubby: add SPKI pin set for Cloudflare cert
Add an SPKI pin for Cloudflare to help prevent MITM and downgrade attacks,
as described in RFC7858 (DNS over TLS). The setup of SPKI and the specific
SHA256 certificate hash are taken from Cloudflare's DoT configuration guide
published at https://developers.cloudflare.com/1.1.1.1/dns-over-tls/.

Note that the certificate is valid to March 25th 2020, 13:00 CET, which
provides ample time for issuance of a backup pin to support future key
rollover.

Signed-off-by: Tony Ambardar <itugrok@yahoo.com>
2019-01-31 23:41:51 +00:00
Tony Ambardar
b77053d350 stubby: add Cloudflare 1.0.0.1 and ::1001 servers
Signed-off-by: Tony Ambardar <itugrok@yahoo.com>
2019-01-31 23:41:51 +00:00
Tony Ambardar
3f17c54f26 stubby: use EDNS client-subnet privacy by default
Retain the upstream value since privacy is usually the key user motivation
for using DNS-over-TLS, and simply note that those encountering sub-optimal
routing may consider disabling the setting.

Signed-off-by: Tony Ambardar <itugrok@yahoo.com>
2019-01-31 23:41:51 +00:00
Tony Ambardar
9351266328 stubby: fix config file definition
The config file /etc/stubby/stubby.yml is not registered properly and any
local changes are being overwritten on upgrade or reinstall.

Signed-off-by: Tony Ambardar <itugrok@yahoo.com>
2019-01-31 23:41:51 +00:00
Tony Ambardar
d3b090a311 stubby: rearrange Makefile for clarity
Signed-off-by: Tony Ambardar <itugrok@yahoo.com>
2019-01-31 23:41:51 +00:00
Tony Ambardar
a3a73ef7bc stubby: add missing dependency on ca-certificates
Signed-off-by: Tony Ambardar <itugrok@yahoo.com>
2019-01-31 23:41:51 +00:00
Adrien DAURIAT
cc8439566f acme: Fix loading credentials
Move loading credential function before cert renewal call as credentials might be needed for some renewal operations ( ex: DNS )

Signed-off-by: Adrien DAURIAT <16813527+dauriata@users.noreply.github.com>
2019-01-31 15:16:33 +01:00
Daniel F. Dickinson
8f41fa7f82 nut: Default to run as root but fix alt runas
Since the new hotplug script in master was not backport (new feature),
for 18.06 branch revert the old behavior of running NUT daemons and
drivers as root by default to avoid permisions problems, but backport
fix the support for running as another user for those who can set the
appropriate permissions on the USB (or other) device.

Closes: #7742

Signed-off-by: Daniel F. Dickinson <cshored@thecshore.com>
2018-12-28 16:18:26 -05:00
Karl Palsson
13a4dcd614 net/mosquitto: bump to 1.5.5
Security and bug fix.  Full changelog available at: https://mosquitto.org/ChangeLog.txt

Signed-off-by: Karl Palsson <karlp@etactica.com>
2018-12-17 10:55:34 +00:00
Daniel F. Dickinson
bb1b12733e nut: Backport fixes from master
Backport and squash the following commits from master:

  5790053eb nut: Add missing conffiles
  ceff68837 nut: Reorganize nut-server to clarify nut-driver
  f6a2a97d2 nut: Use 'real' procd init for nut-monitor
  918a62f91 nut: Make FSD really work
  a2f64b3ba nut: Reduce user error with POWERDOWNFLAG
  461393810 nut: Use quotes around filenames
  1b6dbe7a7 nut: Remove duplicate/extraneous lines
  0a49d0ffb nut: Fix checking for path before it exists
  3b5a8eee8 nut: Various startup fixes for monitor and server
  44e57d4bd nut: Fix variables for NUT drivers
  36fd59dc7 nut: Fix extraneous config_get
  192b0f164 nut: Fix a typo in setting a driver parameter
  f48b060fa nut: Fix upsd runs as root

And bump PKG_RELEASE

Signed-off-by: Daniel F. Dickinson <cshored@thecshore.com>
2018-12-11 07:19:15 -05:00
Karl Palsson
890c302e1a net/mosquitto: support more acl plugin options
Adds support for acl_plugin, and acl_opt_* options.
acl_opt_* requires some care as it relies on the internal behaviour of
cfg_load setting environment variables in a certain form.  However,
given that _all_ of the cfg_load infrastructure relies on that, we can
be pretty sure that it won't change in a way that will hurt us.

Originally reported as: https://github.com/openwrt/packages/pull/7434

Signed-off-by: Karl Palsson <karlp@etactica.com>
2018-11-27 16:54:37 +00:00
champtar
469bcb5ea1
Merge pull request #7481 from padre-lacroix/darkstat-18.06
darkstat: [18.06] procd init script and enabling additional parameters
2018-11-26 19:57:01 -05:00
Jean-Michel Lacroix
8643915bbd darkstat: [18.06] procd init script and enabling additional parameters
This is the same change as the one on master
This is to change the init script to a procd init script
This also enable some additional parameters in the binary that
were present but not enabled:
The export file (option export_file)
The import file (option import_file)
The daylog (option daylog_file)
These are disabled by default.  Also, the option to run as a daemon
is removed, as not compatible with procd.

There is no change in the binary.

Signed-off-by: Jean-Michel Lacroix <lacroix@lepine-lacroix.info>
2018-11-26 18:12:14 -05:00
Florian Eckert
f1209a6eb8 net/mwan3: fix NDP on ipv6 for ra services
Signed-off-by: Florian Eckert <fe@dev.tdt.de>
(cherry picked from commit b6249f1781)
2018-11-20 14:07:05 -02:00
Magnus Kroken
b6f6df1d77 strongswan: backport upstream fixes for CVEs in gmp plugin
This fixes:
* CVE-2018-16151
* CVE-2018-16152
* CVE-2018-17540

Details:
https://strongswan.org/blog/2018/09/24/strongswan-vulnerability-(cve-2018-16151,-cve-2018-16152).html
https://strongswan.org/blog/2018/10/01/strongswan-vulnerability-(cve-2018-17540).html

Signed-off-by: Magnus Kroken <mkroken@gmail.com>
2018-11-19 21:58:23 +01:00
Hannu Nyman
f09f0f1c5b
Merge pull request #6932 from chris5560/radicale_18.06
radicale: [18.06] add extra command "export_storage" to init script
2018-11-11 10:52:53 +02:00
Dirk Brenken
74fc2449e4
adblock: fix adguard source
* fix regex for adguard blocklist source

Signed-off-by: Dirk Brenken <dev@brenken.org>
(cherry picked from commit ff139131a7)
2018-11-10 17:50:19 +01:00
Karl Palsson
1ec36271be net/mosquitto: bump to 1.5.4
Security and bugfix release.  Full release notes available at:
https://mosquitto.org/blog/2018/11/version-154-released/

Security:
* client certificates not validated for websockets listeners.

Bugfixes:
* wills with disconnected clients better handled
* bridge restart_timeout properly observed

Signed-off-by: Karl Palsson <karlp@etactica.com>
2018-11-09 10:26:02 +00:00
Philip Prindeville
7b85f3c376 isc-dhcp: drop .conf suffix on dhcrelay config file
Resolves issue #7235

Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
(cherry picked from commit b0e73634f7)
2018-10-31 09:35:21 -06:00
Hannu Nyman
971efb45af
Merge pull request #7160 from EricLuehrsen/o1806_ub_181
[openwrt-18.06] unbound: update to 1.8.1
2018-10-10 20:29:22 +03:00
Pacien TRAN-GIRARD
58dbd3fda4 tinc: update to 1.0.35
Critical security update for:
* CVE-2018-16737,
* CVE-2018-16738,
* CVE-2018-16758

Announcement:
https://www.tinc-vpn.org/pipermail/tinc/2018-October/005311.html

Signed-off-by: Pacien TRAN-GIRARD <pacien.trangirard@pacien.net>
2018-10-09 23:45:35 +02:00
Eric Luehrsen
f3bc02155e unbound: update to 1.8.1
bug fixes for memory leaks
bug fixes for DNS over TLS

Signed-off-by: Eric Luehrsen <ericluehrsen@gmail.com>
2018-10-08 21:21:13 -04:00
Ted Hess
482d94bf47 iotivity, i2pd, domoticz: Bump PKG_RELEASE to force re-build with Boost upgrade to 1.68
Signed-off-by: Ted Hess <thess@kitschensync.net>
2018-10-04 15:59:43 -04:00
Karl Palsson
d7980aceb2 mosquitto: bump to 1.5.3
Full changelog at https://github.com/eclipse/mosquitto/blob/v1.5.3/ChangeLog.txt

Primary change:
CVE fix for CVE-2018-12543 - prevent crash on topics that begin with $
but are not $SYS

Selected other fixes relevant to OpenWrt since 1.5.1:
- Fix retained messages not sent by bridges on outgoing topics at the first
  connection. Closes #701.
- Fix duplicate clients being added to by_id hash before the old client was
  removed. Closes #645.
- Fix excessive CPU usage when the number of sockets exceeds the system limit.
  Closes #948.
- Fix for bridge connections when using WITH_ADNS=yes.
- Fix round_robin false behaviour. Closes #481.
- Fix segfault on HUP when bridges and security options are configured.
  Closes #965.

Signed-off-by: Karl Palsson <karlp@etactica.com>
2018-09-27 11:48:36 +00:00
Jo-Philipp Wich
cea8bebc6f
Merge pull request #7084 from brianjmurrell/add-foolsm-to-18.06
foolsm: Add package foolsm
2018-09-25 16:25:16 +02:00
Rob Mosher
c58367d4ff cshark: update to latest git HEAD
This fixes GCC8 compile due to buffer overrun

Signed-off-by: Rob Mosher <nyt-openwrt@countercultured.net>
(cherry picked from commit e3144f00a3)
2018-09-24 08:57:08 +02:00
Hans Dedecker
e70b4775d3 strongswan: refresh patches
Signed-off-by: Hans Dedecker <dedeckeh@gmail.com>
(cherry picked from commit 3bc3949e28)
2018-09-24 08:49:41 +02:00
Hans Dedecker
88715598b1 strongswan: fix OpenWrt hotplug script handling
Commit 6cd8fcabe added ipsec hotplug script support by calling "exec
/sbin/hotplug-call ipsec".
Using the exec call breaks the insertion of iptables rules by the _updown.in
script as hotplug-call just replaces the current shell meaning the commands
following exec do not run since the shell is replaced and as a result lead to
connectivity issues.
Fix this by removing the exec command in front of /sbin/hotplug-call.

Signed-off-by: Hans Dedecker <dedeckeh@gmail.com>
(cherry picked from commit d0ac611bf0)
2018-09-24 08:49:40 +02:00
Florian Eckert
1f4c93972e strongswan: add openwrt hotplug script handling
Ipsec user script (/etc/ipsec.user) now get called indirectly by openwrt
"/sbin/hotplug-call". So other packages could also install their scripts
in "/etc/hotplug.d/ipsec".

Signed-off-by: Florian Eckert <fe@dev.tdt.de>
(cherry picked from commit 6cd8fcabe6)
2018-09-24 08:49:40 +02:00
Sebastian Kemper
c340159a92 strongswan: include nls.mk for mysql plugin
ibmariadb 10.2 needs to be linked in together with iconv.

Signed-off-by: Sebastian Kemper <sebastian_ml@gmx.net>
(cherry picked from commit 7a0aebbff2)
2018-09-24 08:49:40 +02:00
Hans Dedecker
474d9a0a15 net-snmp: fix inbound firewall rule support
Commit ae5ee6ba6c added support for inbound
firewall rule support but some corner cases were not covered.

In case net-snmp is started and the network interface is already up
the procd firewall rule is created but not applied by fw3 as
service_started calling procd_set_config_changed firewall was missing.

When stopping net-snmp clean up the net-snmp inbound firewall rules in
iptables by calling procd_set_config_changed firewall in stop_service
which will trigger fw3 to remove the inbound firewall rules.

Signed-off-by: Hans Dedecker <dedeckeh@gmail.com>
(cherry picked from commit 0bd19db049)
2018-09-24 08:47:43 +02:00
Brian J. Murrell
1bdddaefcd foolsm: Add package foolsm
Signed-off-by: Brian J. Murrell <brian@interlinx.bc.ca>
(cherry picked from commit 5cff94399d)
2018-09-21 07:52:47 -04:00
Miroslav Lichvar
1377bc60f0 chrony: fix configuration of IPv6 client access
Fix the init script to allow access from IPv6 subnets of the interface
specified in allow section in /etc/config/chrony.

Fixes issue #7039.

Signed-off-by: Miroslav Lichvar <mlichvar0@gmail.com>
2018-09-17 17:44:18 +02:00