Commit graph

9505 commits

Author SHA1 Message Date
Petr Štetiar
bb4943d558 curl: error out if wolfSSL is not usable
When we explicitly declare, that we would like to have curl built with
wolfSSL support using `--with-wolfssl` configure option, then we should
make sure, that we either endup with curl having that support, or it
shouldn't be available at all, otherwise we risk, that we end up with
regressions like following:

  configure:25299: checking for wolfSSL_Init in -lwolfssl
  configure:25321: x86_64-openwrt-linux-musl-gcc -o conftest [snip]
  In file included from target-x86_64_musl/usr/include/wolfssl/wolfcrypt/dsa.h:33,
                   from target-x86_64_musl/usr/include/wolfssl/wolfcrypt/asn_public.h:35,
                  from target-x86_64_musl/usr/include/wolfssl/ssl.h:35,
                   from conftest.c:47:
  target-x86_64_musl/usr/include/wolfssl/wolfcrypt/integer.h:37:14: fatal error: wolfssl/wolfcrypt/sp_int.h: No such file or directory
       #include <wolfssl/wolfcrypt/sp_int.h>
                ^~~~~~~~~~~~~~~~~~~~~~~~~~~~
  compilation terminated.

and in the end thus produce curl without https support:

 curl: (1) Protocol "https" not supported or disabled in libcurl

So fix it, by making the working wolfSSL mandatory and error out in
configure step when that's not the case:

 checking for wolfSSL_Init in -lwolfssl... no
 configure: error: --with-wolfssl but wolfSSL was not found or doesn't work

References: #19005, #19547
Upstream-Status: Accepted [https://github.com/curl/curl/pull/9682]
Signed-off-by: Petr Štetiar <ynezz@true.cz>
(cherry picked from commit 9140f366ef)
2022-10-10 10:58:09 +00:00
Tianling Shen
0e4e3743f5
cloudflared: Update to 2022.10.0
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
(cherry picked from commit 37bdf739b1)
2022-10-09 16:59:02 +08:00
Tianling Shen
f5d5326c09
cloudflared: Update to 2022.9.1
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
(cherry picked from commit cae36485f0)
2022-10-09 16:58:56 +08:00
Tianling Shen
972fb7861b gg: Update to 0.2.13
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
(cherry picked from commit 891b87747a)
2022-10-08 15:37:09 +02:00
Tianling Shen
c243509b61 dnsproxy: Update to 0.45.2
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
(cherry picked from commit b5ec852c54)
2022-10-08 15:36:32 +02:00
Tianling Shen
44034384aa dnsproxy: Update to 0.45.0
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
(cherry picked from commit 5b72dce338)
2022-10-08 15:36:32 +02:00
Stan Grishin
c29e56d76d
Merge pull request #19544 from stangri/openwrt-22.03-https-dns-proxy
[22.03] https-dns-proxy: update to 2022-08-12-1
2022-10-07 14:27:43 -07:00
Noah Meyerhans
d3a4c41a5a bind: bump to 9.18.7
Fixes multiple security issues:

CVE-2022-38178 - Fix memory leak in EdDSA verify processing

CVE-2022-3080 - Fix serve-stale crash that could happen when
			stale-answer-client-timeout was set to 0 and there was
			a stale CNAME in the cache for an incoming query

CVE-2022-2906 - Fix memory leaks in the DH code when using OpenSSL 3.0.0
			and later versions. The openssldh_compare(),
			openssldh_paramcompare(), and openssldh_todns()
			functions were affected

CVE-2022-2881 - When an HTTP connection was reused to get
			statistics from the stats channel, and zlib
			compression was in use, each successive
			response sent larger and larger blocks of memory,
			potentially reading past the end of the allocated
			buffer

CVE-2022-2795 - Prevent excessive resource use while processing large
			delegations

Signed-off-by: Noah Meyerhans <frodo@morgul.net>
(cherry picked from commit 58bcd3fad37eaf56d4dbeecc0c73abe464e7e987)
2022-10-07 09:20:12 -07:00
Stan Grishin
47e5343d59 https-dns-proxy: update to 2022-08-12-1
* update to upstream version 2022-08-12
* add ca_certs_file option for CA certs file for curl
* add procd_add_interface_trigger for wan6 (hopefully fixes
  https://github.com/openwrt/packages/issues/19531)

Signed-off-by: Stan Grishin <stangri@melmac.ca>
(cherry picked from commit 796a3dda80)
2022-10-07 06:33:46 +00:00
Nick Hainke
24ad5359fe tor: update to 0.4.7.10
Release Notes:
https://forum.torproject.net/t/urgent-stable-release-0-4-5-14-0-4-6-12-and-0-4-7-10

Signed-off-by: Nick Hainke <vincent@systemli.org>
(cherry picked from commit b9cf0cdce6)
[fix commit title]
Signed-off-by: Nick Hainke <vincent@systemli.org>
2022-10-05 23:31:02 +02:00
Glenn Strauss
2f2989e3ea
lighttpd: remove deprecated modules
Signed-off-by: Glenn Strauss <gstrauss@gluelogic.com>
(cherry picked from commit 9d7e18fb25)
2022-10-05 23:29:52 +02:00
Petr Štetiar
698323d467
Merge pull request #19521 from ynezz/ynezz/openwrt-22.03-wolfssl-CVE-2022-39173
[22.03] treewide: fix security issues by bumping all packages using libwolfssl
2022-10-05 21:30:52 +02:00
Stan Grishin
7869127db7 https-dns-proxy: add settings for canary domains
* add setting to enable/disable blocking access to iCloud Private Relay resolvers
* add setting to enable/disable blocking access to Mozilla resolvers
* rename variables loaded from config in the init script

Signed-off-by: Stan Grishin <stangri@melmac.ca>
(cherry picked from commit 4ff71d8e4c)
2022-10-04 22:20:35 +00:00
Stan Grishin
a4a6411e13 https-dns-proxy: bugfix: prevent canary domains duplicates
Signed-off-by: Stan Grishin <stangri@melmac.ca>
(cherry picked from commit f99ada410f)
2022-10-04 21:31:33 +00:00
Petr Štetiar
f624e41f38 treewide: fix security issues by bumping all packages using libwolfssl
As wolfSSL is having hard time maintaining ABI compatibility between
releases, we need to manually force rebuild of packages depending on
libwolfssl and thus force their upgrade. Otherwise due to the ABI
handling we would endup with possibly two libwolfssl libraries in the
system, including the patched libwolfssl-5.5.1, but still have
vulnerable services running using the vulnerable libwolfssl-5.4.0.

So in order to propagate update of libwolfssl to latest stable release
done in commit ec8fb542ec3e4 ("wolfssl: fix TLSv1.3 RCE in uhttpd by
using 5.5.1-stable (CVE-2022-39173)") which fixes several remotely
exploitable vulnerabilities, we need to bump PKG_RELEASE of all packages
using wolfSSL library.

Same bump has been done in buildroot in commit f1b7e1434f66 ("treewide:
fix security issues by bumping all packages using libwolfssl").

Signed-off-by: Petr Štetiar <ynezz@true.cz>
(cherry picked from commit 845d81ca09)
2022-10-04 10:22:40 +02:00
Petr Štetiar
ea8108a319 Revert "treewide: fix security issues by bumping all packages using libwolfssl"
This reverts commit 0ddec62e69 as it was
backport too soon, we need to first wait for fixed libwolfssl being
available.

Signed-off-by: Petr Štetiar <ynezz@true.cz>
2022-10-04 10:14:07 +02:00
Petr Štetiar
0ddec62e69 treewide: fix security issues by bumping all packages using libwolfssl
As wolfSSL is having hard time maintaining ABI compatibility between
releases, we need to manually force rebuild of packages depending on
libwolfssl and thus force their upgrade. Otherwise due to the ABI
handling we would endup with possibly two libwolfssl libraries in the
system, including the patched libwolfssl-5.5.1, but still have
vulnerable services running using the vulnerable libwolfssl-5.4.0.

So in order to propagate update of libwolfssl to latest stable release
done in commit ec8fb542ec3e4 ("wolfssl: fix TLSv1.3 RCE in uhttpd by
using 5.5.1-stable (CVE-2022-39173)") which fixes several remotely
exploitable vulnerabilities, we need to bump PKG_RELEASE of all packages
using wolfSSL library.

Same bump has been done in buildroot in commit f1b7e1434f66 ("treewide:
fix security issues by bumping all packages using libwolfssl").

Signed-off-by: Petr Štetiar <ynezz@true.cz>
(cherry picked from commit 845d81ca09)
2022-10-04 01:03:35 -07:00
Ivan Pavlov
2d061d1cba openvpn: explicitly disable engine parameter for openssl variant
Engine support is deprecated in OpenSSL 3.0 and for OpenSSL 3.0 the default
is to disable engine support as engine support is deprecated. For ath79 architecture
build with autodetection engine support fails, so explicitly set off for now.

Signed-off-by: Ivan Pavlov <AuthorReflex@gmail.com>
(cherry picked from commit 62e909e845)
2022-10-04 01:00:49 -07:00
Ivan Pavlov
0c670f870e openvpn: update to 2.5.7
Added limited support for OpenSSL 3.0
Fixed some bugs

Signed-off-by: Ivan Pavlov <AuthorReflex@gmail.com>
(cherry picked from commit 45b751dd85)
2022-10-04 01:00:49 -07:00
Ivan Pavlov
50ae0353af openvpn: update to 2.5.6
Maintainer: me / @mkrkn

Compile tested: ramips/mt7620 TP-Link Archer C50 v1, ramips/mt7621 Xiaomi Mi router 3 Pro, ath79/generic TP-Link WDR-3500
Run tested: ramips/mt7620 TP-Link Archer C50 v1, ramips/mt7621 Xiaomi Mi router 3 Pro, ath79/generic TP-Link WDR-3500

bugfix release including one security fix ("Disallow multiple deferred authentication plug-ins.", CVE: 2022-0547)

several build fixes, refer to https://github.com/OpenVPN/openvpn/blob/release/2.5/Changes.rst

Signed-off-by: Ivan Pavlov <AuthorReflex@gmail.com>
(cherry picked from commit 172795b858)
2022-10-04 01:00:49 -07:00
Stan Grishin
0756af3c9e
Merge pull request #19502 from stangri/openwrt-22.03-simple-adblock
[22.03] simple-adblock: allow domains bugfix & canary domains support
2022-10-03 20:59:56 -07:00
Marc Benoit
52ddf2f0b5 nextdns: initialize nextdns from /etc/uci-defaults
Signed-off-by: Marc Benoit <marcb62185@gmail.com>
(cherry picked from commit e54247a6fa)
2022-10-02 08:57:22 -07:00
Tianling Shen
eddc92a17d dnslookup: Update to 1.8.0
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
(cherry picked from commit 671e794db1)
2022-10-02 17:35:47 +02:00
Stan Grishin
356534dd42 simple-adblock: allow domains bugfix & canary domains support
* fix bug in download_lists and adb_allow to prevent unintended exclisions from
  the block-lists of domains containing allowed domain. Fixes issue:
  https://github.com/stangri/source.openwrt.melmac.net/issues/160
* add support for returning NXDOMAIN/blocking iCloud & Mozilla canary domains,
  disabled by default

Signed-off-by: Stan Grishin <stangri@melmac.ca>
(cherry picked from commit 9156ef6507)
2022-10-01 23:19:23 +00:00
Stan Grishin
d9341ee80c
Merge pull request #19490 from stangri/openwrt-22.03-https-dns-proxy
[22.03] https-dns-proxy: uci wrappers & iCloud canary domains
2022-10-01 16:01:43 -07:00
Stan Grishin
a219e0635e
Merge pull request #19469 from stangri/openwrt-22.03-simple-adblock
[22.03] simple-adblock: update to 1.9.1-1
2022-10-01 16:01:22 -07:00
Stan Grishin
de00aad596 https-dns-proxy: uci wrappers & iCloud canary domains
* switch to using uci wrappers instead of direct uci calls
* add support for iCloud canary domains
  https://developer.apple.com/support/prepare-your-network-for-icloud-private-relay

Signed-off-by: Stan Grishin <stangri@melmac.ca>
(cherry picked from commit 749b03ffbf)
2022-09-30 00:09:49 +00:00
Josef Schlehofer
a9423d8946
unbound: update to version 1.16.3
Changelog: https://www.nlnetlabs.nl/projects/unbound/download/#unbound-1-16-3
- Fixes: CVE-2022-3204

Refreshed one patch

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
(cherry picked from commit 027533f9a2)
2022-09-29 07:11:55 +02:00
Stan Grishin
d053da000e simple-adblock: update to 1.9.1-1
* remove obsolete block-lists from config
* add removal of obsolete lists to config-update
* add AdGuard team's block-list to config
* improve allow command
* improve nftset support
* move config load to uci_load_validate, which required some code refactoring which
  looks dramatic, but isn't
* always use dnsmasq_restart instead of dnsmasq_hup for all dns resolution options
  for dnsmasq

Signed-off-by: Stan Grishin <stangri@melmac.ca>
(cherry picked from commit f8c5fd93e7)
2022-09-27 10:38:33 +00:00
Stan Grishin
bc15988929 curl: bugfix: github source url
* fixes https://github.com/openwrt/packages/issues/19456

Signed-off-by: Stan Grishin <stangri@melmac.ca>
(cherry picked from commit c812153f8d)
2022-09-26 19:08:30 +00:00
Peter van Dijk
eed717e6e0
pdns-recursor: update to 4.7.3
Signed-off-by: Peter van Dijk <peter.van.dijk@powerdns.com>
(cherry picked from commit 8e234be1e7)
2022-09-26 13:30:01 +02:00
Karl Palsson
44f898f98b pagekite: add patchs for 64bit time
Source: https://github.com/pagekite/libpagekite/pull/78

Signed-off-by: Karl Palsson <karlp@etactica.com>
2022-09-26 09:39:15 +00:00
Karl Palsson
d5aa9d76ea mosquitto: bump to 2.0.15
Changelog: https://mosquitto.org/blog/2022/08/version-2-0-15-released/
Changelog: https://mosquitto.org/blog/2021/11/version-2-0-14-released/

2.0.15 is bigger security and bugfix release.  2.0.14 had a couple of
  minor changes and was skipped for OpenWrt.

Signed-off-by: Karl Palsson <karlp@etactica.com>
2022-09-26 09:39:15 +00:00
Ptilopsis Leucotis
4419a76baf mosquitto: add missing 'persistence' section in config
Section 'Persistence' in 'luci-app-mosquitto' is unusable without 'persistence'
section in config file.

Signed-off-by: Ptilopsis Leucotis <PtilopsisLeucotis@yandex.com>
2022-09-26 09:39:15 +00:00
Dirk Brenken
5092dbd147
adblock: update 4.1.4-5
* auto-whitelist ext. dns lookup domain
* add public doh server blocklist source
* whitespace fixes in adblock.sources

Signed-off-by: Dirk Brenken <dev@brenken.org>
(cherry picked from commit 5603ed9237)
2022-09-25 21:03:07 +02:00
James McGuire
3f9a88d21b
adblock: add lightswitch05 blocklist source
Signed-off-by: James McGuire <jamesm51@gmail.com>
(cherry picked from commit b971cdc79b)
2022-09-25 21:02:47 +02:00
Alexander E. Patrakov
0247d720ea hping3: add new package
The new package would help measuring one-way delays using ICMP type 13
packets. This is important for various scripts that automatically adjust
CAKE shaper bandwidth based on the observed bufferbloat. They need to
understand whether the delay is on the way up or on the way down, so
that they can adjust the bandwidth of the proper part of the shaper.

https://forum.openwrt.org/t/cake-w-adaptive-bandwidth-historic/108848
https://forum.openwrt.org/t/cake-w-adaptive-bandwidth/135379

V2: refreshed patches

Signed-off-by: Alexander E. Patrakov <patrakov@gmail.com>
(cherry picked from commit 688a5413d0)
2022-09-25 02:10:01 -07:00
Michael Heimpold
d6c7e63c93
Merge pull request #19438 from mhei/22.03-squid-libxml2-backport
[22.03] squid: fix compilation with libxml (fixes #19099)
2022-09-25 10:22:17 +02:00
Daniel Golle
be7e4f8e3f snowflake: run snowflake-proxy with procd-ujail
snowflake-proxy doesn't write any files
 => run in read-only rootfs environment

the process needs to read SSL certs but no other files
 => only exposed path is /etc/ssl/certificates (read-only)

running as unpriviledged user with no additional capabilities
 => set no-new-privs bit

By default procd-ujail also isolates the process by executing it in
a separate new IPC and PID namespace.

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
(cherry picked from commit 0f3d48a378)
Signed-off-by: Nick Hainke <vincent@systemli.org>
2022-09-25 07:59:19 +02:00
Daniel Golle
8c028f4fd1 snowflake: add package
Package Tor's Snowflake system components so users can offer e.g.
a standalone Snowflake proxy on their routers or other devices.

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
(cherry picked from commit cf120a7eff)
Signed-off-by: Nick Hainke <vincent@systemli.org>
2022-09-25 07:59:19 +02:00
Michael Heimpold
aaedc165d5 squid: fix compilation with libxml (fixes #19099)
Add a patch which removes a call in Libxml2Parser.cc to 'xmlSetFeature'.
This function belongs to the 'depreciated' API part and is not
available in OpenWrt builds.

According to my understanding, this call can be removed safely since
it disables the feature "substitute entities" which is disabled by default.

Signed-off-by: Michael Heimpold <mhei@heimpold.de>
(cherry picked from commit 3ec47dc85c)
2022-09-24 09:42:16 +02:00
Martin Hübner
e563fe3836 gatling: add package gatling
Gatling is a high-performance webserver from fefe. It gives a
fairly decent feature-set at really small size. And its fast.

Co-authored-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
Signed-off-by: Martin Hübner <martin.hubner@web.de>
(cherry picked from commit 83ff83e320)
2022-09-23 14:52:55 -07:00
Tianling Shen
81c0688405 gg: Update to 0.2.11
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
(cherry picked from commit 2a0ee392ae)
2022-09-23 13:42:57 -07:00
Tianling Shen
05d1265cb7 xray-core: Update to 1.6.0
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
(cherry picked from commit a0126b15c5)
[Update geodata to latest version, based on f8c25627eb]
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2022-09-23 13:42:41 -07:00
Glenn Strauss
8a2bd27540 lighttpd: update to lighttpd 1.4.67 release hash
* update to lighttpd 1.4.67 release hash

Signed-off-by: Glenn Strauss <gstrauss@gluelogic.com>
(cherry picked from commit f750089d26)
2022-09-23 13:42:20 -07:00
Michal Vasilek
5a02ae2fe8
knot-resolver: update to 5.5.3
* fixes CVE-2022-40188

Signed-off-by: Michal Vasilek <michal.vasilek@nic.cz>
(cherry picked from commit 5d2fd88693)
2022-09-23 00:43:20 +02:00
Stan Grishin
4fb657737d
Merge pull request #19381 from stangri/openwrt-22.03-curl
[22.03] curl: update to 7.85.0
2022-09-20 15:04:44 -07:00
Dirk Brenken
fd5ba61549
adblock: update 4.1.4-3
* unbound: fix domain search regression

Signed-off-by: Dirk Brenken <dev@brenken.org>
(cherry picked from commit e80d0236e3)
2022-09-18 09:10:52 +02:00
Eneas U de Queiroz
dfaa4bad50 uacme: add libev dependency to uacme-ualpn
The dependency has a PACKAGE_uacme-ualpn condition so that libev won't
be unnecessarily built if uacme-ualpn is not selected.

Remove PKG_USE_MIPS16:=0, as it is not necessary when not using the
libev that is bundled with uacme.

Signed-off-by: Eneas U de Queiroz <cotequeiroz@gmail.com>
(cherry picked from commit 1642b68d45)
2022-09-17 16:36:06 -07:00
Olivier Poitrey
ed56ca2aac nextdns: Update to version 1.37.11
Signed-off-by: Olivier Poitrey <rs@nextdns.io>
(cherry picked from commit b665a6d683)
2022-09-17 12:56:55 -07:00