Commit Graph

8260 Commits

Author SHA1 Message Date
Eneas U de Queiroz ee1a3654dc ocserv: don't build with libseccomp on ARC
libseccomp can't be built on ARC, so we must disable the option here as
well.  A different fix was first proposed by @zxlhhyccc in #15377.

Fixes: #15313

Signed-off-by: Eneas U de Queiroz <cotequeiroz@gmail.com>
2021-04-14 22:52:42 -03:00
Philip Prindeville 41b536e22c
Merge pull request #15406 from pprindeville/strongswan-add-chacha20poly1305
strongswan: handle chacha20poly1305 as AEAD
2021-04-13 21:48:04 -06:00
Rosen Penev fb4655ab35 hcxdumptool: update to 6.1.6
Fix compilation without deprecated OpenSSL APIs.

Backport upstream patch to fix stdout.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2021-04-13 15:30:39 -07:00
Rosen Penev f25755b0f9 hcxtools: update to 6.1.6
Add patch fixing compilation without deprecated OpenSSL APIs.

Fix installation. This never worked as the section was misnamed.

Updated tool names.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2021-04-13 15:30:39 -07:00
Philip Prindeville ff33f4ccd3 strongswan: handle chacha20poly1305 as AEAD
chacha20policy1305 is also an AEAD cipher, and hence does not
permit a hash algorithm.

Fixes issue #15397.

Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2021-04-13 12:46:07 -06:00
Philip Prindeville c95fd69973 strongswan: fail on serious configuration errors
Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2021-04-13 12:46:07 -06:00
Philip Prindeville 210640d606 strongswan: drop subshell when possible
A subshell caused by $(...) can't persistently modify globals as a
side-effect.

Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2021-04-13 12:45:57 -06:00
Jan Pavlinec eda48170ec
ooniprobe: update to version 3.9.2
Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
2021-04-13 16:44:40 +02:00
Florian Eckert 920d733876
Merge pull request #15379 from jow-/bonding-accept-uci-list
bonding: accept list of slaves in uci list notation
2021-04-13 09:29:22 +02:00
Rosen Penev 682aebbaea squid: update to 4.14
Signed-off-by: Rosen Penev <rosenp@gmail.com>
2021-04-12 23:08:06 -07:00
Philip Prindeville 61b2a35a35
Merge pull request #15382 from cotequeiroz/strongswan
strongswan: libnttft must not select strongswan
2021-04-11 17:10:58 -06:00
Stan Grishin cd11d8821f https-dns-proxy: bugfix: race condition with dnsmasq
Signed-off-by: Stan Grishin <stangri@melmac.net>
2021-04-10 16:58:51 -10:00
Stan Grishin 231d40053b simple-adblock: update to 1.8.7-3
Signed-off-by: Stan Grishin <stangri@melmac.net>
2021-04-10 17:08:51 -07:00
Daniel Golle 2d9b46e677
ovsd: improve package style and update source
Fix post-merge comments in #15316 and update source.

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2021-04-10 16:56:44 +01:00
Gregory L. Dietsche 49535edffd safe-search: prevent duplicate cron job installation
This patch prevents multiple cron jobs from being created to run the
safe-search-maintenance script.

To reproduce this bug, perform the following:
  - Install safe-search
  - Perform an OpenWRT firmware upgrade (choose to preserve user settings)
  - Install safe-search again

Signed-off-by: Gregory L. Dietsche <gregory.dietsche@cuw.edu>
2021-04-10 14:28:25 +02:00
Eneas U de Queiroz e50ba32402
strongswan: libnttft must not select strongswan
The strongswan-libnttfft package should not select the strongswan
package, but should depend on it instead.  Otherwise a circular
dependency is created.

Signed-off-by: Eneas U de Queiroz <cotequeiroz@gmail.com>
2021-04-09 23:54:43 -03:00
Jo-Philipp Wich 57a77386de bonding: accept list of slaves in uci list notation
Rework the bonding.sh protocol handler to accept slave interface names
encoded in uci list notation. Also replace ifconfig up/down with ip
link calls while we're at it.

Fixes: #11455
Fixes: https://github.com/openwrt/luci/issues/4473
Signed-off-by: Jo-Philipp Wich <jo@mein.io>
2021-04-09 18:56:50 +02:00
Dirk Brenken ec20e9df96
adblock: fix games_tracking source url
Signed-off-by: Dirk Brenken <dev@brenken.org>
2021-04-09 18:42:30 +02:00
Philip Prindeville e44b2665e7
Merge pull request #6924 from derekyerger/strongswan-lattice-sha3
strongswan: add more crypto plugins
2021-04-08 22:26:56 -06:00
Josef Schlehofer 7c80ef5f76
Merge pull request #15353 from ja-pa/knot-resolver-5.3.1
knot-resolver: update to version 5.3.1
2021-04-07 14:17:57 +02:00
Rosen Penev c6fa2d5bfa ksmbd-tools: update to 3.3.8
Major changes are:
  disable symlink by default.
  remove smack inherit leftovers.
  Enable guest access on IPC$ share by default.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2021-04-07 00:46:54 -07:00
Kirill Nikolaev 272b0a5c18 ksmbd-tools: Add a mDNS TXT record for the ksmbd service
MacOS ignores Bonjour services for which TXT records are not returned. This changes forces umdns service to return a TXT record (`daemon=ksmbd`) for the ksmbd service. The exact content is unimportant and to the best of my knowledge nothing reads the `daemon` tag.

Symptoms of the problem (which are also debugging steps):
* Finder refuses to open the OpenWRT "computer" in the Network list.
* Discovery.app (Bonjour Browser) lists the _ssh._tcp service, but the submenu for it doesn't unfold and no address is shown.
* `dns-sd -L OpenWrt _smb._tcp` doesn't return any address.

Signed-off-by: Kirill Nikolaev <cyril7@gmail.com>
2021-04-07 00:46:54 -07:00
Jan Pavlinec 354523d5b5 ooniprobe: update to version 3.9.0
Remove getrescources call because it is no longer
required.

Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
2021-04-07 10:17:23 +03:00
Jan Pavlinec 3e3025b191
knot-resolver: update to version 5.3.1
Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
2021-04-06 12:41:17 +02:00
Karl Palsson d4e5f38147 mosquitto: bump to 2.0.10
This is a security fix, affecting 2.0.0 through to 2.0.9.  Mosquitto instances
could be remotely DoS'd by authenticated clients.

Release notes at: https://github.com/eclipse/mosquitto/blob/v2.0.10/ChangeLog.txt
CVE number has not yet been assigned.

Signed-off-by: Karl Palsson <karlp@etactica.com>
2021-04-06 10:33:56 +00:00
Christian Lachner b94645c68a haproxy: Update HAProxy to v2.2.13
- Update haproxy download URL and hash

Signed-off-by: Christian Lachner <gladiac@gmail.com>
2021-04-06 12:56:05 +03:00
Florian Eckert 97ea947b1e
Merge pull request #15337 from SvenRoederer/xinetd-include
xinetd: honor ${IPKG_INSTROOT} when sourcing /lib/functions.sh
2021-04-06 07:51:43 +02:00
Philip Prindeville ae3d5aa73e strongswan: bump to 5.9.2
Retire weak algorithms like MD5 and 3DES.

Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2021-04-05 14:58:54 -07:00
Derek Yerger 4c1fc7e311 strongswan: add more crypto plugins
Adds modules for BLISS signature scheme, NTRU and New Hope key
exchange algorithms, and dependencies ChaCha20-Poly1305 AEAD,
ChaCha20 XOF, MGF1 mask generation function, SHA3 hasher SHAKE
XOF, and the Number Theoretic Transform library.

Signed-off-by: Derek Yerger <derek@altdevs.net>
2021-04-05 14:31:49 -05:00
Philip Prindeville a72780a9c2 strongswan: force PIC on all builds
Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2021-04-05 07:31:40 -10:00
Leonardo Mörlein 24ddf22073 uacme: add retries
Prior to this commit, the acme service attempted to obtain certificates
once and then terminated, regardless of whether the certificate could be
obtained or not. This commit introduces a new uci option "retries" to
the "certificate" section. If this option is set to N, the acme service
will attempt to obtain the certificate up to N times before terminating.
There is a waiting pause between the retries to comply with the rate
limits of Let'sEncrypt.

The waiting pause is:
-  2 minutes for staging certificates
- 24 minutes for production certificates

The current "Failed Validation" rate limits of Let'sEncrypt are:
- staging:   60 per hour -> 1 failure every 1 minute in avg.
- production: 5 per hour -> 1 failure every 12 minutes in avg.

This means that we are within rate limits by a factor of two.

By default the option "retries" is set to "1", which means that acme
behaves as before by default. If the variable is set to "0", infinite
retries are performed.

This feature is helpful, when you already want to initiate the
certificate request, but you are still waiting for your dns server to be
configured, your network to appear or other conditions.

Signed-off-by: Leonardo Mörlein <git@irrelefant.net>
2021-04-04 22:16:02 -07:00
Leonardo Mörlein 9a6c2339b0 uacme: propagate rc of uacme in issue_cert()
Before this commit, issue_cert always returned 1 no matter if uacme
returned 1, 2, 3, ... With this commit, the return code of the uacme
binary is propagated. Therefore the caller of issue_cert can
differentiate between "no renew necessary" and "an error occurred".

Signed-off-by: Leonardo Mörlein <me@irrelefant.net>
2021-04-04 19:12:38 -07:00
Leonardo Mörlein 4588a61652 uacme: allow including run-uacme
With this commit, the run-acme script can be included into other scripts
by setting INLCUDE_ONLY=1.

Signed-off-by: Leonardo Mörlein <me@irrelefant.net>
2021-04-04 19:12:38 -07:00
Ondřej Caletka 0c044284b7 jool: Update to 4.1.5
Compile and run tested on: mvebu (Turris Omnia)

Signed-off-by: Ondřej Caletka <ondrej@caletka.cz>
2021-04-04 19:06:05 -07:00
Philip Prindeville f9d91f1f47 strongswan: migrate to swanctl configs
Derived from the ipsec initd script, with the following changes:

(1) various code improvements, corrections (get rid of left/right
    updown scripts, since there's only one), etc;
(2) add reauth and fragmentation parameters;
(3) add x.509 certificate-based authentication;

and other minor changes.

Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2021-04-04 11:58:51 -06:00
Philip Prindeville 1eeb8bc287
Merge pull request #15339 from pprindeville/strongswan-reset-ipsec.conf
strongswan: remove synthesized ipsec conf files
2021-04-03 22:18:08 -06:00
Rosen Penev 79a2677c07
Merge pull request #15330 from 1715173329/xray
xray-core: Update to 1.4.2
2021-04-03 19:07:17 -07:00
Huangbin Zhan a1d70de325 overture: update to 1.7
Signed-off-by: Huangbin Zhan <zhanhb88@gmail.com>
2021-04-03 18:42:53 -07:00
Kevin Darbyshire-Bryant f1d2136024 netifyd: support filter parameter
netifyd supports a '-F' filter option in 'bpf' notation to filter
packets from its consideration.

Add support for a uci 'filter' option. eg. filter to exclude SSDP
multicasts from a particularly noisy device:

option filter 'not (udp and dst 239.255.255.250 and dst port 1900 and src 192.168.1.5)'

Signed-off-by: Kevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk>
2021-04-03 18:40:54 -07:00
Anton Ryzhov c61ed3e93f restic-rest-server: fix configuration option names
Signed-off-by: Anton Ryzhov <anton@ryzhov.me>
2021-04-03 18:39:36 -07:00
George Iv 76b642b50f yggdrasil: bump to 0.3.16
Signed-off-by: George Iv <zhoreeq@users.noreply.github.com>
2021-04-03 18:38:57 -07:00
Jianhui Zhao 9b9d40c99a rp-pppoe: use pppoe.so instead of rp-pppoe.so
Signed-off-by: Jianhui Zhao <zhaojh329@gmail.com>
2021-04-03 18:38:28 -07:00
Sven Roederer f25f49a8b7 nut: fix typo in nutshutdown script
Even it's only cosmetic and should not affect the function of regular system,
fix the name of the IPKG_INSTROOT variable.
Typo was added long ago with 8400c9a6ec.

Signed-off-by: Sven Roederer <devel-sven@geroedel.de>
2021-04-03 18:38:13 -07:00
Sven Roederer bdab7e6bfe xinetd: honor ${IPKG_INSTROOT} when sourcing /lib/functions.sh
Avoid "file not found"-error when embedding via Imagebuilder.

Signed-off-by: Sven Roederer <devel-sven@geroedel.de>
2021-04-04 01:58:14 +02:00
Dirk Brenken 86a20c7955
banip: bugfix 0.7.6-2
* fix housekeeping of external list sources

Signed-off-by: Dirk Brenken <dev@brenken.org>
2021-04-03 19:16:39 +02:00
Tianling Shen 781c70077b
xray-core: Update to 1.4.2
Updated geo datas to latest version.

Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2021-04-02 17:19:35 +08:00
Tianling Shen 736667ce6e
xray-core: init: add browser dialer support
Since v1.4.1, Xray has introduced a new feature to transfer data via
browsers, which can disguise itself as a normal browser to cheat
network censorship.

For more details, see https://github.com/XTLS/Xray-core/pull/421.

Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2021-04-02 17:19:31 +08:00
Josef Schlehofer 93fb1b4ca2
Merge pull request #15301 from ja-pa/git-lfs-2.13.3
git-lfs: update to version 2.13.3
2021-04-02 01:41:16 +02:00
Philip Prindeville baa38a1420 strongswan: remove synthesized ipsec conf files
If you shutdown ipsec service, and it doesn't clean up
/var/ipsec/ipsec.conf, then when you start swanctl service it
might see an incompatible file on startup.  Remedy is to
remove unneeded files when shutting down the service.  They
can always be regenerated when the service starts again.

Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2021-04-01 15:06:00 -06:00
Philip Prindeville 58936f4420
Merge pull request #15286 from pprindeville/strongswan-move-ipsec.secrets
strongswan: move ipsec conf files to subpackage
2021-04-01 14:16:35 -06:00