Commit graph

2720 commits

Author SHA1 Message Date
starcms
a032c44a50 net/dnscrypt-proxy: add LogLevel support, update dnscrypt-resolvers.csv,
bump version number.

Signed-off-by: Chris Saaidi <starcms@gmail.com>
2017-05-30 19:56:27 -05:00
Thomas Heil
d1d28ed9de Merge pull request #4379 from val-kulkov/nginx-package
nginx: update to 1.12.0, the latest stable version
2017-05-28 19:05:10 +02:00
Damiano Renfer
c3b0a36db4 net/dnscrypt-proxy: fix block_ipv6 param in init script
Signed-off-by: Damiano Renfer <damiano.renfer@gmail.com>
2017-05-27 11:12:47 +02:00
Peter Wagner
a4fbcb44fe git: update to 2.13.0
Signed-off-by: Peter Wagner <tripolar@gmx.at>
2017-05-27 02:34:29 +02:00
Antonio Paunovic
2f7782e241 netopeer2-keystored: add new dependency
Signed-off-by: Antonio Paunovic <antonio.paunovic@sartura.hr>
2017-05-26 14:10:03 +00:00
kuoruan
9c24d46ce7 webui-aria2: Bump to 2017-05-21
Signed-off-by: kuoruan <kuoruan@gmail.com>
2017-05-25 11:35:37 +08:00
kuoruan
63785852a4 yaaw: Bump to 2017-04-11
Signed-off-by: kuoruan <kuoruan@gmail.com>
2017-05-25 11:35:07 +08:00
kuoruan
5f8dcde38b aria2: Update to v1.32.0
Signed-off-by: kuoruan <kuoruan@gmail.com>
2017-05-25 11:11:43 +08:00
Val Kulkov
5d8b62f0ba nginx: update to 1.12.0, the latest stable version
This is a straightforward update to the latest stable version.

Signed-off-by: Val Kulkov <val.kulkov@gmail.com>
2017-05-24 11:48:29 -04:00
Mislav Novakovic
3e22ad84e1 netopeer2-server: modified init script
Signed-off-by: Mislav Novakovic <mislav.novakovic@sartura.hr>
2017-05-24 17:38:27 +02:00
Mislav Novakovic
0aa8371086 sysrepo: merge sysrepod and sysrepo-plugind
Signed-off-by: Mislav Novakovic <mislav.novakovic@sartura.hr>
2017-05-24 17:38:27 +02:00
Mislav Novakovic
835c56a4cc netopeer2: change default ssh key handling
Signed-off-by: Mislav Novakovic <mislav.novakovic@sartura.hr>
2017-05-24 17:18:41 +02:00
Mislav Novakovic
99b8a07b3e netopeer2-server: edited init script
Signed-off-by: Mislav Novakovic <mislav.novakovic@sartura.hr>
2017-05-24 16:04:55 +02:00
Mislav Novakovic
7139808c45 netopeer2: modified uci-default script
Signed-off-by: Mislav Novakovic <mislav.novakovic@sartura.hr>
2017-05-24 16:04:55 +02:00
Mislav Novakovic
f6aa981a56 sysrepo: modified uci-default script
Signed-off-by: Mislav Novakovic <mislav.novakovic@sartura.hr>
2017-05-24 16:04:55 +02:00
Mislav Novakovic
85259eccee netopeer2-server: add custom config file
Signed-off-by: Mislav Novakovic <mislav.novakovic@sartura.hr>
2017-05-24 16:04:55 +02:00
Mislav Novakovic
9289fbf949 netopeer2-server: add sysrepod dependency
Signed-off-by: Mislav Novakovic <mislav.novakovic@sartura.hr>
2017-05-24 16:04:55 +02:00
Eric Luehrsen
9d96dfd468 unbound: add option for dhcp UCI domain mx srv and cname
Base LEDE/OpenWrt UCI for dnsmasq provides for DNS override in
/etc/config/dhcp. It is desired to be able to use dnsmasq and
Unbound as transparently as possible. Option 'add_extra_dns'
will pull 'domain', 'mxhost', 'srvhost, and 'cname' from base.

netifd/procd have an interaction with DHCPv6/RA on WAN (FS#713).
Minor IP6 parameter updates can cause Unbound reload events every
few minutes. List option 'trigger' selects which interfaces may
cause reload. For example 'lan', 'wan' but not 'wan6'.

Squash other cosmetics.

Signed-off-by: Eric Luehrsen <ericluehrsen@hotmail.com>
2017-05-23 00:14:33 -04:00
Yousong Zhou
ce563ea706 shadowsocks-libev: bump to version 3.0.6
Below are changes in the packaging method

 - Use tarball provided by the upstream project maintainer instead of
   cloning the whole git-repo
 - Drop openssl variant as it was deprecated then removed by the
   upstream project
 - Add dependency on libev, libsodium, libudns as they are not bundled
   with the source code anymore

Addresses issue #4191

Signed-off-by: Yousong Zhou <yszhou4tech@gmail.com>
2017-05-22 09:56:56 +08:00
Damiano Renfer
bfd0ee2418 net/dnscrypt-proxy: ignore parameters requiring plugins support if not available
Signed-off-by: Damiano Renfer <damiano.renfer@gmail.com>
2017-05-21 19:55:18 +02:00
Kevin Darbyshire-Bryant
3b8681fc66 miniupnpc: bump to 2.0.20170509 (#4362)
Fix CVE-2017-8798

Signed-off-by: Kevin Darbyshire-Bryant <kevin@darbyshire-bryant.me.uk>
2017-05-20 10:16:21 +02:00
Daniel Golle
4237ae4890 isc-dhcp: integrate IPv4 DHCP service with procd and netifd
Convert init-script to procd and allow to configure
isc-dhcp-server via UCI. Allow most by-network and by-host options
supported by dnsmasq.
User-defined dhcp-options are not supported yet, neither are tags.

Existing configurations with use-edited /etc/dhcpd.conf are still
respected, hence to enjoy the new features you have to migrate
your configuration to UCI and delete /etc/dhcpd.conf.

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2017-05-20 03:23:48 +02:00
hmronline
68fa7fe87e dynapoint: Updated to latest version (Fixes to make it actually work)
Signed-off-by: hmronline <hmronline@gmail.com>
2017-05-18 10:59:01 -03:00
Hannu Nyman
5c8edf8948 Merge pull request #4367 from dibdot/adblock
adblock: maintenance update 2.6.4
2017-05-17 22:37:29 +03:00
Hannu Nyman
abe6fdea61 Merge pull request #4366 from dibdot/travelmate
travelmate: maintenance update 0.7.4
2017-05-17 22:36:57 +03:00
Hannu Nyman
794afe7599 Merge pull request #4341 from zx2c4/wg-psk-change
wireguard: update snapshot version to 0.0.20170517
2017-05-17 22:36:18 +03:00
Dirk Brenken
272c79de83 adblock: maintenance update 2.6.4
* made wget default parms compatible with older program versions
* shift dns detection routine to simplify dns override,
  just set 'adb_dnslist' to force a particular backend priority
  (default: 'dnsmasq unbound')
* reduce ubus polling during dns detection

Signed-off-by: Dirk Brenken <dev@brenken.org>
2017-05-17 21:28:12 +02:00
Dirk Brenken
bf6636517a travelmate: maintenance update 0.7.4
* always update the connection status, even in case of an error
* merge multiple ubus network calls in central check routine

Signed-off-by: Dirk Brenken <dev@brenken.org>
2017-05-17 21:24:07 +02:00
Jason A. Donenfeld
1eeea05307 wireguard: version bump
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
2017-05-17 20:21:36 +02:00
Damiano Renfer
1bfb0629a2 net/dnscrypt-proxy: update to 1.9.5
* Update to 1.9.5
* Use PKG_HASH instead of PKG_MD5SUM
* Add dnscrypt-proxy github link in PKG_SOURCE_URL

Signed-off-by: Damiano Renfer <damiano.renfer@gmail.com>
2017-05-14 11:29:51 +02:00
Luka Perkov
fb180b587d Merge pull request #4355 from sartura/sysrepo_mirror_hash
Sysrepo mirror hash
2017-05-14 00:41:23 +02:00
Mislav Novakovic
b3f9e7058e sysrepo: add PKG_MIRROR_HASH
Signed-off-by: Mislav Novakovic <mislav.novakovic@sartura.hr>
2017-05-12 16:44:49 +02:00
Mislav Novakovic
e824198d54 netopeer2: add PKG_MIRROR_HASH
Signed-off-by: Mislav Novakovic <mislav.novakovic@sartura.hr>
2017-05-12 16:44:49 +02:00
Florian Eckert
f35475c025 net/mwan3: update Makefile version
Signed-off-by: Florian Eckert <fe@dev.tdt.de>
2017-05-12 15:30:34 +02:00
Florian Eckert
db5ea39c9b net/mwan3: generate mwan3track run path folder on every run
Signed-off-by: Florian Eckert <fe@dev.tdt.de>
2017-05-12 15:30:34 +02:00
Florian Eckert
ef3261d0b4 net/mwan3: remove absolute path for bin files
Signed-off-by: Florian Eckert <fe@dev.tdt.de>
2017-05-12 15:28:12 +02:00
Florian Eckert
1fd3f85d4f net/mwan3: remove pid file use pgrep to get pid
If mwan3track will not stop immediately after sending the kill signal,
the clean_up handler will delete the pid file later while the new mwan3track is
already running.

This could result in a situation that mwan3track is running
more then once because the old mwan3track service could not be killed,
because the pid file is missing.

Using pgrep to kill all mwan3track for the tracked interface and not using
pid file should fix this issue.

Signed-off-by: Florian Eckert <fe@dev.tdt.de>
2017-05-12 15:28:12 +02:00
Mislav Novakovic
7250dc59cf add netopeer2
Signed-off-by: Mislav Novakovic <mislav.novakovic@sartura.hr>
2017-05-11 19:46:58 +02:00
Mislav Novakovic
7720c87e0c add sysrepo
Signed-off-by: Mislav Novakovic <mislav.novakovic@sartura.hr>
2017-05-11 19:46:58 +02:00
Noah Meyerhans
588284218a bind: Update to bind-9.10.5
This change includes fixes for several security issues:

  * CVE-2017-3138: rndc "" could trigger an assertion failure in named.
  * CVE-2017-3137: Some chaining (i.e., type CNAME or DNAME) responses to
    upstream queries could trigger assertion failures.
  * CVE-2017-3136: dns64 with break-dnssec yes; can result in an assertion
    failure.
  * CVE-2017-3135: If a server is configured with a response policy zone
    (RPZ) that rewrites an answer with local data, and is also configured
    for DNS64 address mapping, a NULL pointer can be read triggering a
    server crash.
  * CVE-2016-9444: named could mishandle authority sections with missing
    RRSIGs, triggering an assertion failure.
  * CVE-2016-9131: named mishandled some responses where covering RRSIG
    records were returned without the requested data, resulting in an
    assertion failure.
  * CVE-2016-9131: named incorrectly tried to cache TKEY records which could
    trigger an assertion failure when there was a class mismatch.
  * CVE-2016-8864: It was possible to trigger assertions when processing
    responses containing answers of type DNAME.
  * CVE-2016-6170: Added the ability to specify the maximum number of
    records permitted in a zone (max-records #;). This provides a mechanism
    to block overly large zone transfers, which is a potential risk with
    slave zones from other parties.
  * CVE-2016-2776: It was possible to trigger an assertion when rendering a
    message using a specially crafted request.
  * CVE-2016-2775: Calling getrrsetbyname() with a non absolute name could
    trigger an infinite recursion bug in lwresd or named with lwres
    configured if, when combined with a search list entry from resolv.conf,
    the resulting name is too long.

Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2017-05-10 22:13:37 -07:00
Hannu Nyman
e4c7a9a3cc Merge pull request #4346 from dibdot/travelmate
travelmate: update 0.7.3
2017-05-10 18:12:32 +03:00
Dirk Brenken
b059c59d86 travelmate: update 0.7.3
backend:
* refine connection check (reduce ubus polling)
* further stabilize sta-/ap-handling

frontend (see LuCI repo):
* Automatically refresh the overview page after button onclick event,
e.g. 'Save & Apply'

Signed-off-by: Dirk Brenken <dev@brenken.org>
2017-05-10 16:49:24 +02:00
Aleksei Nosachev
8599b8d7a3 Fix acme-challenge ./well-known check / webroot detection (#4339)
fixes webroot to be defined as 
_currentRoot='/www'
instead of being interpreted as
_currentRoot='"/www"'

Signed-off-by: Aleksei Nosachev <nos1609@hotmail.com>
2017-05-10 14:30:43 +02:00
Jason A. Donenfeld
658ffbb3fd wireguard: preshared-key is now an attribute of the peer
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
2017-05-09 16:51:34 +02:00
Hannu Nyman
3f390c5509 vsftpd: create directory for extra config files
* create /etc/vsftpd directory for extra config files
  like userlist, certificate and key
* modify config file to use that directory
* include that directory in conffiles for backup

* use PKG_HASH
* update URL

Signed-off-by: Hannu Nyman <hannu.nyman@iki.fi>
2017-05-09 16:30:05 +03:00
Hannu Nyman
725744b26e Merge pull request #4338 from dibdot/package-adblock
adblock: maintenance update 2.6.3
2017-05-08 12:27:40 +03:00
Dirk Brenken
6ffae3bc1e adblock: maintenance update 2.6.3
backend:
* various small fixes & optimizations
 
LuCI frontend (see luci repo):
* Limit Blacklist/Whitelist Online editing to max. 512 KB, approx.
20.000 domains per list
* Automatically refresh the overview page after button onclick event,
e.g. 'Suspend/Resume' or 'Save & Apply'
* cosmetics

Signed-off-by: Dirk Brenken <dev@brenken.org>
2017-05-08 11:19:57 +02:00
Hannu Nyman
8ba251e88a Merge pull request #4324 from hnyman/irssi
irssi: remove nossl variant
2017-05-08 11:33:38 +03:00
Hannu Nyman
6e9bf22e8d Merge pull request #4337 from stangri/vpnbypass
vpnbypass: removed PROCD instance from start_service.
2017-05-08 09:56:23 +03:00
Hannu Nyman
dbebe09e18 Merge pull request #4336 from stangri/simple-adblock
simple-adblock: updated README, used stricter filters for domains and…
2017-05-08 09:56:03 +03:00