Commit graph

10163 commits

Author SHA1 Message Date
Oskari Rauta
f9e3af87f5 netbird: update to 0.14.3
Bug fixes & refactor

Release notes:
 - Fix: send remote agents updates when peer re-authenticates

Signed-off-by: Oskari Rauta <oskari.rauta@gmail.com>
2023-03-13 19:45:19 +08:00
Tianling Shen
4dd80ed519
v2ray-geodata: Update to latest version
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2023-03-13 16:40:57 +08:00
Tianling Shen
0e96d2f862
xray-core: Update to 1.8.0
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2023-03-13 16:39:10 +08:00
Philip Prindeville
1dfb13eaeb
Merge pull request #20261 from pprindeville/strongswan-update-5.9.9
strongswan: Update to 5.9.9
2023-03-12 18:27:50 -06:00
Philip Prindeville
ae0a8072d6 strongswan: Update to 5.9.9
Add patch to remove definition of RNG leaking in from wolfssl.h.

Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2023-03-12 13:54:32 -06:00
John Audia
0cec657274 snort3: update to 3.1.56.0
Upstream bump

Build system: x86_64
Build-tested: bcm2711/RPi4B
Run-tested: bcm2711/RPi4B

Signed-off-by: John Audia <therealgraysky@proton.me>
2023-03-12 09:17:13 +01:00
Stan Grishin
35f4830de7 simple-adblock: update init file and config
* move network.sh and jshn.sh includes into load_validate_config function
  to prevent errors when adding the package to image with the Image Builder
* add @bongochong compressed domains block-list to the config

Signed-off-by: Stan Grishin <stangri@melmac.ca>
2023-03-11 10:48:34 +00:00
Darryl Sokoloski
68af9ed3ba netifyd: update to v4.4.1
- Explicitly request the C++11 standard (codebase is not C++17 compliant).
- Removed categories.json from conffiles -- it's not a configuration
  file.
- Removed commented-out convenience git hash place-holder -- for some
  reason it irritates people.
- Added radix header file to devel files.
- Removed redundant call to Build/Configure (not needed).

Co-authored-by: Tianling Shen <cnsztl@gmail.com>
Signed-off-by: Darryl Sokoloski <darryl@sokoloski.ca>
2023-03-11 13:36:27 +08:00
Rosen Penev
7accad5643 ksmbd-tools: update to 3.4.7
Remove upstreamed patches.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2023-03-10 18:42:02 -08:00
Dirk Brenken
d8b6e2ca2a
banip: update 0.8.2-2
* fix the auto-detection for pppoe and 6in4 tunnel interfaces
* add the new 'ban_nftpolicy' option to expose the nft set policy, values: memory (default), performance
* add the new 'ban_nftlogevel' option to expose the nft syslog level, values: emerg, alert, crit, err, warn (default),
  notice, info, debug, audit
* status optimizations
* logging optimizations
* update the readme

Signed-off-by: Dirk Brenken <dev@brenken.org>
2023-03-10 19:42:41 +01:00
Stijn Tintel
f7c0e413f4 miniupnpd: bump to 2.3.3
Fixes: #19637
Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
2023-03-10 01:59:26 +02:00
BackSlasher
562fb3aa0a udp-broadcast-relay-redux-openwrt: add cgroupsns to jail
Added `cgroupsns` to jail, otherwise you get this failure:
```
Mon Mar  6 14:46:05 2023 user.err : jail: Not using namespaces, capabilities or seccomp !!!
```
Error is here, seems to indicate that we're running a jail without using any capability.
https://lxr.openwrt.org/source/procd/jail/jail.c#L2847

Decided to use minimal effort approach

Signed-off-by: BackSlasher <nitz.raz@gmail.com>
2023-03-09 18:25:03 +08:00
Oskari Rauta
278a6617a0 cni-protocol: new package
simple protocol support script for netifd.

netifd protocol support for cni networks makes
defining network for podman and other similar
systems using cni networking much easier and simpler.

with cni protocol support, on a cni network, where firewall
and portmapper is disabled, you may control firewalling
with openwrt's standard firewall configuration.

for example, create a container that hosts web content on
port 80 with static ip on your cni network, if your
network is 10.88.0.0/16, use for eg. 10.88.0.101 as
your containers static ip address. Create a zone, cni
to your firewall and add your interface to it.

Now you can easily set up redirectiong to 10.88.0.101:80
to expose it's port 80 to wan for serving your website.

Protocol has only one setting: device, on podman this
often is cni-podman0. This protocol may also be used
on other equillavents, such as netavark (cni replacement
in podman), where device as default is podman0.

Signed-off-by: Oskari Rauta <oskari.rauta@gmail.com>
2023-03-09 18:13:16 +08:00
Peter van Dijk
3c08be8fd7 pdns-recursor: update to 4.8.3
Signed-off-by: Peter van Dijk <peter.van.dijk@powerdns.com>
2023-03-09 14:59:11 +08:00
Tianling Shen
dc9dd974dd
Merge pull request #20584 from mpeleshenko/samba4-4.17.5
samba4: update to 4.17.5
2023-03-09 14:58:15 +08:00
Kuan-Yi Li
0c526d09a8 modemmanager: bump to 1.20.6
Signed-off-by: Kuan-Yi Li <kyli@abysm.org>
2023-03-09 14:13:13 +08:00
Van Waholtz
4f8874f636 frp: update to 0.48.0
Changelog: https://github.com/fatedier/frp/releases/tag/v0.48.0

Signed-off-by: Van Waholtz <brvphoenix@gmail.com>
2023-03-09 10:41:17 +08:00
Van Waholtz
8fcc48c339 frp: update to 0.47.0
A restart is only required if `$conf_file` has been modified.

Signed-off-by: Van Waholtz <brvphoenix@gmail.com>
2023-03-09 10:41:17 +08:00
Michael Peleshenko
604604a667
samba4: update to 4.17.5
* update to 4.17.5
* changelog: https://www.samba.org/samba/history/samba-4.17.5
* refresh patch

* CVE-2022-42898: Samba's Kerberos libraries and AD DC failed to guard against integer overflows when parsing a PAC on a 32-bit system, which allowed an attacker with a forged PAC to corrupt the heap.
 https://www.samba.org/samba/security/CVE-2022-42898.html

* CVE-2022-37966: This is the Samba CVE for the Windows Kerberos RC4-HMAC Elevation of Privilege Vulnerability disclosed by Microsoft on Nov 8 2022.

  A Samba Active Directory DC will issue weak rc4-hmac session keys for use between modern clients and servers despite all modern Kerberos implementations supporting the aes256-cts-hmac-sha1-96 cipher.

  On Samba Active Directory DCs and members 'kerberos encryption types = legacy' would force rc4-hmac as a client even if the server supports aes128-cts-hmac-sha1-96 and/or aes256-cts-hmac-sha1-96.
  https://www.samba.org/samba/security/CVE-2022-37966.html

* CVE-2022-37967: This is the Samba CVE for the Windows Kerberos Elevation of Privilege Vulnerability disclosed by Microsoft on Nov 8 2022.

  A service account with the special constrained delegation permission could forge a more powerful ticket than the one it was presented with.
  https://www.samba.org/samba/security/CVE-2022-37967.html

* CVE-2022-38023: The "RC4" protection of the NetLogon Secure channel uses the same algorithms as rc4-hmac cryptography in Kerberos, and so must also be assumed to be weak.
  https://www.samba.org/samba/security/CVE-2022-38023.html

* BUG 15210: synthetic_pathref AFP_AfpInfo failed errors.
  This resolves errors logged during macOS TimeMachine backups.
  https://bugzilla.samba.org/show_bug.cgi?id=15210

Signed-off-by: Michael Peleshenko <mpeleshenko@gmail.com>
2023-03-08 20:19:08 -05:00
Tianling Shen
c49a1dad52 tmate-ssh-server: fix build against msgpack-c 6.0
This patch is taken from
https://git.alpinelinux.org/aports/commit/?id=f923597f4bdea424dc28b1d026269df060596fac

Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2023-03-08 23:49:10 +01:00
Tianling Shen
928710813b tmate: fix build against msgpack-c 6.0
This patch is taken from
https://git.alpinelinux.org/aports/commit/?id=f923597f4bdea424dc28b1d026269df060596fac

Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2023-03-08 23:49:10 +01:00
Dirk Brenken
7c2296c891
banip: release 0.8.2-1
* major performance improvements: clean-up/optimize all nft calls
* add a new "ban_reportelements" option,
  to disable the (time consuming) Set element count in the report (enabled by default)
* update the readme

Signed-off-by: Dirk Brenken <dev@brenken.org>
2023-03-08 21:03:34 +01:00
Dobroslaw Kijowski
a499a4006a adguardhome: bump to 0.107.25
* Full changelog available at:
  * https://github.com/AdguardTeam/AdGuardHome/releases/tag/v0.107.25

Signed-off-by: Dobroslaw Kijowski <dobo90@gmail.com>
2023-03-08 23:11:57 +08:00
Dobroslaw Kijowski
2e68b9f515 adguardhome: enable legacy openssl provider for nodejs
Currently compilation fails because of:
```
  opensslErrorStack: [ 'error:03000086:digital envelope routines::initialization error' ],
  library: 'digital envelope routines',
  reason: 'unsupported',
  code: 'ERR_OSSL_EVP_UNSUPPORTED'
```

What's interesting package gets built but when trying to access UI there's
`404: page not found` error.

It has been reported in multiple places:
* https://github.com/AdguardTeam/AdGuardHome/issues/5559
* https://github.com/AdguardTeam/AdGuardHome/issues/4595

Signed-off-by: Dobroslaw Kijowski <dobo90@gmail.com>
2023-03-08 23:11:57 +08:00
Tianling Shen
41987abc84 v2raya: switch to use nftables
Backport a pending PR to add nftables support.
Upstream PR: https://github.com/v2rayA/v2rayA/pull/805

As nftables merged ipv4/ipv6 support into a single command, so simply
enable ipv6 support by default.

While at it, backport a upstreamed fix for simple-obfs plugin.

Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2023-03-08 15:40:52 +08:00
Oskari Rauta
58fcaf8fc4 netbird: update to 0.14.2
Update from 0.12.0 -> 0.14.2
Release notes: https://github.com/netbirdio/netbird/releases

Signed-off-by: Oskari Rauta <oskari.rauta@gmail.com>
2023-03-07 11:35:23 +08:00
Daniel Golle
96fd2dc531 transmission: update to version 4.0.1
This is a major release, both in numbering and in effort! It's been in
active development for over a year and has a huge list of changes --
over a thousand commits -- since Transmission 3.00.

For more information about the release see
https://github.com/transmission/transmission/releases/tag/4.0.0
https://github.com/transmission/transmission/releases/tag/4.0.1

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2023-03-07 01:40:14 +00:00
Dirk Brenken
0b37036e5a
banip: update 0.8.1-3
* finalized the LuCI frontend preparation (this is the minmal version to use the forthcoming LuCI frontend)
* added a Set survey, to list all elements of a certain set
* changed the default logterm for asterisk
* update the readme

Signed-off-by: Dirk Brenken <dev@brenken.org>
2023-03-06 14:21:52 +01:00
Van Waholtz
e6ded43570 sing-box: update to 1.1.6
Signed-off-by: Van Waholtz <brvphoenix@gmail.com>
2023-03-06 13:23:06 +08:00
Van Waholtz
5c2bd22cb2 sing-box: add necessary dependencies and cleanup Makefile
1. Add `kmod-inet-diag` as a dependency since it is needed for https://sing-box.sagernet.org/configuration/dns/rule/#process_name
2. Remove redundant `default n` (8bc72ea7be)

Signed-off-by: Van Waholtz <brvphoenix@gmail.com>
2023-03-06 13:23:06 +08:00
Christian Lachner
a79df49a5f haproxy: update to v2.6.9
- Update haproxy download URL and hash
- This release fixes a critial flaw known as CVE-2023-25725. See:
  http://git.haproxy.org/?p=haproxy-2.6.git;a=commit;h=73be199c4f5f1ed468161a4c5e10ca77cd5989d8

Signed-off-by: Christian Lachner <gladiac@gmail.com>
2023-03-05 14:51:38 +08:00
Philip Prindeville
bf51e33b57
Merge pull request #20570 from pprindeville/isc-dhcp-allow-no-default-route
isc-dhcp: allow no default route
2023-03-04 18:08:07 -07:00
Oskari Rauta
a4d8d2459a netbird: new package
Netbird is similar vpn service as tailscale and zerotier.

Description:
NetBird is an open-source VPN management platform built on top of WireGuard® making it easy to create secure private networks for your organization or home.
It requires zero configuration effort leaving behind the hassle of opening ports, complex firewall rules, VPN gateways, and so forth.

Signed-off-by: Oskari Rauta <oskari.rauta@gmail.com>
2023-03-04 08:42:58 +08:00
Glen Huang
e1f03d7ee4 acme: fix incompatibilty with image builder
Signed-off-by: Glen Huang <i@glenhuang.com>
2023-03-03 23:43:01 +01:00
Josef Schlehofer
82720ba624
Merge pull request #20563 from paper42/clamav-0.104.4
clamav: update to 0.104.4
2023-03-03 07:55:05 +01:00
Tianling Shen
40669c4135
v2raya: drop wrong patches
These patches should not be backported to OpenWrt, otherwise tproxy
won't work for devices connected to br-lan (bypassed by the fw rules).

We have introduced a new compile-time flag for new version (which
is not released yet), but it's unnecessray to backport redudant
patches as here is still at the old version.

Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2023-03-03 12:08:22 +08:00
Tianling Shen
8e10f5f9a1
cloudflared: Update to 2023.3.0
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2023-03-03 11:58:33 +08:00
Philip Prindeville
d2dd1bef71 isc-dhcp: allow suppression of default gateway
Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2023-03-01 08:54:34 -07:00
Philip Prindeville
5a0f41556f isc-dhcp: make indent consistent in config
Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2023-03-01 08:53:56 -07:00
Glen Huang
c6960a2bdc acme: merge cli into init script
Signed-off-by: Glen Huang <i@glenhuang.com>
2023-03-01 15:38:02 +01:00
Oskari Rauta
a1c80c1f37 nfs-kernel-server: update to v2.6.2
Also added patch that is from alpine's same package to assist building on musl.
Hostpkg build on musl also kept failing, so I added few more overrides, which
made it work perfectly.

Signed-off-by: Oskari Rauta <oskari.rauta@gmail.com>
2023-03-01 17:02:42 +08:00
Tianling Shen
b52fdec659
cloudflared: Update to 2023.2.2
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2023-03-01 16:41:48 +08:00
Florian Eckert
bfd7da1392
Merge pull request #20467 from tobiaspc/njalla
ddns-scripts: Add njal.la provider
2023-02-27 09:09:27 +01:00
Stan Grishin
fded4e584e
Merge pull request #20540 from stangri/master-curl
curl: update to 7.88.1
2023-02-26 23:32:08 -07:00
Daniel Bermond
aa5ccd5ef2 i2pd: update to version 2.46.1
Maintainer   : @yangfl (David Yang)
Build system : Arch Linux x86_64
Build tested : r7800 OpenWrt git master (r22104-01262c921c)
Run tested   : r7800 OpenWrt git master (r22104-01262c921c)

Signed-off-by: Daniel Bermond <danielbermond@gmail.com>
2023-02-27 03:28:10 +01:00
S. Brusch
a2c84138e1 crowdsec: update to 1.4.6
Update crowdsec to latest upstream release version 1.4.6

Signed-off-by: S. Brusch <ne20002@gmx.ch>

Maintainer: Kerma Gérald <gandalf@gk2.net>
Run tested: ipq40xx/generic, Fritzbox 4040, Openwrt 22.03.3
2023-02-26 09:48:24 -08:00
Dirk Brenken
0706b1d2d9
banip: update 0.8.1-2
* add oisdbig as new feed
* LuCI frontend preparation:
  - the json feed file points always to /etc/banip/banip.feeds (and is no longer compressed)
  - supply country list in /etc/banip/banip.countries
* update readme

Signed-off-by: Dirk Brenken <dev@brenken.org>
2023-02-26 08:16:15 +01:00
Stan Grishin
3371071730 curl: update to 7.88.1
* https://curl.se/changes.html#7_88_1

Signed-off-by: Stan Grishin <stangri@melmac.ca>
2023-02-25 21:59:01 +00:00
Tobias Hilbig
05c42cc0e9 ddns-scripts: Add njal.la provider
Add njal.la provider. Use the key as password. Username is not needed.

Signed-off-by: Tobias Hilbig <web.tobias@hilbig-ffb.de>
2023-02-25 11:49:19 +01:00
Dirk Brenken
02c2587f9d
banip: release 0.8.1-1
* add missing wan-forward chain (incl. report/mail adaption)
* changed options:
  - old: ban_blockforward, new: ban_blockforwardwan and ban_blockforwardlan
  - old: ban_logforward, new: ban_logforwardwan and ban_logforwardlan
* add missing dhcp(v6) rules/exceptions
* update readme

Previously run tested by certain forum users (and by me).

Signed-off-by: Dirk Brenken <dev@brenken.org>
2023-02-25 10:01:11 +01:00