1
0
mirror of https://git.openwrt.org/feed/packages.git synced 2024-06-15 20:03:57 +02:00
Commit Graph

8407 Commits

Author SHA1 Message Date
Jan Hak
d578f60818 knot: update to version 3.0.6
Signed-off-by: Jan Hak <jan.hak@nic.cz>
2021-05-13 10:39:06 +02:00
Rosen Penev
9c7195a756
Merge pull request #15593 from flyn-org/snort3
Update snort3 and libdaq3 packages
2021-05-11 11:25:13 -07:00
W. Michael Petullo
776f318352 snort3: update to 3.1.4.0
Signed-off-by: W. Michael Petullo <mike@flyn.org>
2021-05-11 12:58:24 -05:00
Rosen Penev
28de2690c5
Merge pull request #15608 from dobo90/adguardhome_v0.106.2
adguardhome: bump to 0.106.2
2021-05-11 10:29:24 -07:00
Rosen Penev
3f9a708d0a
Merge pull request #15603 from ja-pa/knot-resolver-5.3.2
knot-resolver: update to version 5.3.2
2021-05-11 10:28:57 -07:00
Dobroslaw Kijowski
b704844658 adguardhome: bump to 0.106.2
* Full changelog available at:
  * https://github.com/AdguardTeam/AdGuardHome/releases/tag/v0.106.2

Signed-off-by: Dobroslaw Kijowski <dobo90@gmail.com>
2021-05-11 17:37:24 +02:00
Jan Pavlinec
112af34ff3
knot-resolver: update to version 5.3.2
Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
2021-05-11 10:28:26 +02:00
Philip Prindeville
8eba0209ab strongswan: make default bundle use swanctl
Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2021-05-10 22:17:00 -06:00
Rosen Penev
2878586b6d
Merge pull request #15594 from flyn-org/snort
snort: update 2.9.17.1
2021-05-10 14:29:32 -07:00
Rosen Penev
d80aec75f9
Merge pull request #15589 from flyn-org/krb5
krb5: update to 1.19.1
2021-05-10 14:27:13 -07:00
Rosen Penev
24035b8eb5
Merge pull request #15597 from flyn-org/scapy
scapy: update to 2.4.5
2021-05-10 14:25:41 -07:00
Rosen Penev
fb61f48a23
Merge pull request #15588 from flyn-org/nfdump
nfdump: update to 1.6.23
2021-05-10 14:25:19 -07:00
Rosen Penev
d61b3daab8
Merge pull request #15585 from ja-pa/tailscale-1.8.1
tailscale: update to version 1.8.1
2021-05-10 14:25:05 -07:00
W. Michael Petullo
a5323f520c scapy: update to 2.4.5
Signed-off-by: W. Michael Petullo <mike@flyn.org>
2021-05-10 13:08:46 -05:00
W. Michael Petullo
ea5081b511 snort: update 2.9.17.1
Signed-off-by: W. Michael Petullo <mike@flyn.org>
2021-05-10 12:50:01 -05:00
W. Michael Petullo
57f3851d70 krb5: update to 1.19.1
Signed-off-by: W. Michael Petullo <mike@flyn.org>
2021-05-10 11:58:50 -05:00
W. Michael Petullo
a64e94bd46 nfdump: update to 1.6.23
Signed-off-by: W. Michael Petullo <mike@flyn.org>
2021-05-10 11:54:30 -05:00
Jan Pavlinec
791de7b5d0
tailscale: update to version 1.8.1
Add readme with simple tailscale howto.

Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
2021-05-10 18:34:04 +02:00
Philip Prindeville
7aa92e4d4e
Merge pull request #15575 from pprindeville/strongswan-always-generate-var-strongswan
strongswan: swanctl init script doesn't load connections
2021-05-07 17:28:37 -06:00
Rosen Penev
94858ece31
Merge pull request #15474 from ja-pa/unbound-ttl-neg
unbound: add cache-max-negative-ttl config option
2021-05-07 15:55:52 -07:00
Rosen Penev
ff76ee7896
Merge pull request #15553 from PolynomialDivision/add-samplicator
samplicator: add samplicator
2021-05-06 14:33:52 -07:00
Rosen Penev
724dbdb787
Merge pull request #15539 from ja-pa/tailscale
tailscale: add new package
2021-05-06 14:32:44 -07:00
Andy Walsh
93b34d4dda samba4: update to 4.13.8
* update to 4.13.8
* remove faulty io_uring kernel detection
* fixes CVE's: CVE-2020-27840, CVE-2021-20277, CVE-2020-27840, CVE-2021-20277, CVE-2020-27840, CVE-2021-20277, CVE-2021-20254
* resolves #15512

Signed-off-by: Andy Walsh <andy.walsh44+github@gmail.com>
2021-05-06 14:31:29 -07:00
Florian Eckert
58027efed1
Merge pull request #15537 from aaronjg/mwan3/notrack
mwan3: allow interfaces with no tracking IPs
2021-05-06 12:16:09 +02:00
Florian Eckert
7e8260baf2
Merge pull request #15562 from TDT-AG/pr/20200503-mwan3
mwan3: update ubus status for no tracked interfaces
2021-05-06 12:15:34 +02:00
Philip Prindeville
ba79998e52 strongswan: swanctl init script doesn't load connections
Fixes issue #15446

Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2021-05-05 11:58:34 -06:00
Philip Prindeville
a50ddcc1d7
Merge pull request #15554 from pprindeville/fix-dhcp-route-whitespaces
isc-dhcpd: handle extra spaces in routes
2021-05-05 11:35:51 -06:00
Alexandru Ardelean
7436d944fa tcpreplay: bump to version 4.3.4
Signed-off-by: Alexandru Ardelean <ardeleanalex@gmail.com>
2021-05-04 20:17:05 -07:00
Dobroslaw Kijowski
350ba8cbbd adguardhome: bump to 0.106.1
* Create working directory when it is not present. Apparently
  some recent change made adguardhome fail to start when working
  directory is missing.
* Full changelog available at:
  * https://github.com/AdguardTeam/AdGuardHome/releases/tag/v0.106.1

Signed-off-by: Dobroslaw Kijowski <dobo90@gmail.com>
2021-05-04 20:16:55 -07:00
Dirk Brenken
1402b3b56d
banip: update to 0.7.8
* fix pid file processing of the background monitor plus child
  processes (bug reported in the forum)
* made the enabled/disabled switch of the background monitor functional

Signed-off-by: Dirk Brenken <dev@brenken.org>
2021-05-04 18:44:26 +02:00
Nick Hainke
41534e5a19 samplicator: add samplicator
Samplicator receives UDP datagrams on a given port and resends those
datagrams to a specified set of receivers.

Use Cases:
- replicate Flow Samples to multiple receivers
- use with conntrackd to synchronize via unicast to multiple targets

Signed-off-by: Nick Hainke <vincent@systemli.org>
2021-05-03 21:12:35 +02:00
Eneas U de Queiroz
2151d948a5
Merge pull request #15532 from dangowrt/bunch-of-updates
a bunch of package updates
2021-05-03 11:30:53 -03:00
Florian Eckert
f1da872cd4 mwan3: update ubus status for not tracked interfaces
Signed-off-by: Florian Eckert <fe@dev.tdt.de>
2021-05-03 10:52:26 +02:00
Florian Eckert
cbc5f0916c mwna3: fix whitespace
Signed-off-by: Florian Eckert <fe@dev.tdt.de>
2021-05-03 10:51:44 +02:00
Philip Prindeville
b428e46355 isc-dhcpd: handle extra spaces in routes
Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2021-05-02 18:44:09 -06:00
Aaron Goodman
b7ea19bc96 mwan3: allow interfaces with no tracking IPs
In the procd refactor, support for interfaces with no tracking IPs was
inadvertentiy removed. This commit restores the previous behavior

Signed-off-by: Aaron Goodman <aaronjg@stanford.edu>
2021-05-02 19:13:44 -04:00
Christian Lachner
8beaf35e85 haproxy: Update HAProxy to v2.2.14
- Update haproxy download URL and hash

Signed-off-by: Christian Lachner <gladiac@gmail.com>
2021-05-01 17:23:56 +03:00
Olivier Poitrey
1b8489aadb nextdns: Update to version 1.32.1
Signed-off-by: Olivier Poitrey <rs@nextdns.io>
2021-04-30 17:26:45 -07:00
Dirk Brenken
df8651255f
adblock: update to 4.1.2
* preserve DNS cache after adblock processing (unbound & bind)
* fix redirect issue with oisd basic url
* cosmetics

Signed-off-by: Dirk Brenken <dev@brenken.org>
2021-04-30 16:40:08 +02:00
Noah Meyerhans
ccb1e8923e bind: bump to 9.17.12
Fixes the following security issues:

* CVE-2021-25215 - named crashed when a DNAME record placed in the ANSWER
                   section during DNAME chasing turned out to be the final
                   answer to a client query.
* CVE-2021-25214 - Insufficient IXFR checks could result in named serving a
                   zone without an SOA record at the apex, leading to a
                   RUNTIME_CHECK assertion failure when the zone was
                   subsequently refreshed. This has been fixed by adding an
                   owner name check for all SOA records which are included
                   in a zone transfer.

Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2021-04-29 12:39:46 -07:00
Jan Pavlinec
229b34286d
tailscale: add new package
Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
2021-04-29 09:10:58 +02:00
Othmar Truniger
55711c25ee knxd: pumb to upstream version 0.14.51
Signed-off-by: Othmar Truniger <github@truniger.ch>
2021-04-28 23:30:44 -07:00
Dobroslaw Kijowski
48bf0f8e81 adguardhome: bump to 0.106.0
* Full changelog available at:
  * https://github.com/AdguardTeam/AdGuardHome/releases/tag/v0.106.0
* Add build time LDFLAG introduced in commit [1].

[1]: 1d07afb30e (diff-82ef468ec5547f1ed424776755a7f87dfec4eba9838d2c2ac02c9881bb67d737R67)

Signed-off-by: Dobroslaw Kijowski <dobo90@gmail.com>
2021-04-28 17:23:07 -07:00
Daniel Golle
ddeb936ce1 opentracker: update to git HEAD
Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2021-04-29 00:59:15 +01:00
Daniel Golle
05eac1796d gnunet-fuse: update to version 0.14.0
Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2021-04-29 00:59:15 +01:00
Aleksander Jan Bajkowski
ad74a794ca net-tools: bump to 2.10
Signed-off-by: Aleksander Jan Bajkowski <A.Bajkowski@stud.elka.pw.edu.pl>
2021-04-27 18:04:52 -07:00
Jan Bubík
037f4ec4e4 nginx: make nginx-rtmp module BigEndian friendly
Signed-off-by: Jan Bubík <jbubik@centrum.cz>
2021-04-28 01:01:24 +02:00
Josef Schlehofer
6666a70b74
Merge pull request #15525 from 1715173329/xray
xray-core: remove PROVIDES
2021-04-28 00:08:33 +02:00
Moritz Warning
d6a101ecce zerotier: update to 1.6.5
Minor ZeroTier update. Refreshed patches.

Signed-off-by: Moritz Warning <moritzwarning@web.de>
2021-04-28 00:03:32 +02:00
Tianling Shen
bbc6c62c2a
xray-core: use $(INSTALL_DATA) to install configuration files
Using `$(INSTALL_CONF)` will cause the program has no access to
configurations file when someone enabled the selinux support.

Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2021-04-27 20:34:22 +08:00
Tianling Shen
92efcc2956
xray-core: remove PROVIDES
Xray now is no longer planning to keep compatibility with original
v2ray. Remove PROVIDES before it is totally broken.

Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2021-04-27 20:34:18 +08:00
Karl Palsson
9996328abd net/mosquitto: port is optional in root config
From mosquitto 2.x, port became optional and deprecated in the config,
and it was recommended that listeners be used instead.  Drop the hard
requirement in our config conversion script.

Reported in: https://github.com/openwrt/packages/issues/15506
Signed-off-by: <karlp@etactica.com>
2021-04-26 09:36:49 +00:00
Karl Palsson
e0c33d94f8 net/mosquitto: fix log_type conversion in config
As reported in: https://github.com/openwrt/packages/issues/15506

Signed-off-by: Karl Palsson <karlp@etactica.com>
2021-04-26 09:34:52 +00:00
Peter van Dijk
1bcc98ef90 unbound: fix typo in assist name of https-dns-proxy
I left the old version in, in case users have configs that already correct for this error.

Signed-off-by: Peter van Dijk <peter.van.dijk@powerdns.com>
2021-04-25 16:16:23 +02:00
Rosen Penev
215a2e6518
Merge pull request #15507 from hswong3i/master-SQUID_enable-ssl-crtd
squid: Enable dynamic SSL certificate generation
2021-04-25 02:00:13 -07:00
Tao Gong
f62c15f92d conntrack-tools: add a patch to fix endianness issue
Signed-off-by: Tao Gong <gongtao0607@gmail.com>
2021-04-24 20:08:10 -07:00
Wong Hoi Sing Edison
dbda77686d
squid: Enable dynamic SSL certificate generation
Maintainer: @neheb / @BKPepe / @zhanhb
Compile tested: ipq806x, generic, netgear_r7800, master
Run tested: ipq806x, generic, netgear_r7800, openwrt-19.07

Description:

Squid now only support HTTPS proxy in TCP tunnel mode (e.g. `ssl_bump splice all`):

    https_port 3128 ssl-bump tls-cert=/etc/squid/squid.pem generate-host-certificates=on
    ssl_bump splice all

In order to operate in SSL Bump mode, we need to compile with `--enable-ssl-crtd` for following configuration:

    https_port 3128 ssl-bump tls-cert=/etc/squid/squid.pem generate-host-certificates=on
    sslcrtd_program /usr/lib/squid/security_file_certgen -s /car/cache/squid/ssl_db -M 4MB
    ssl_bump stare all
    ssl_bump bump all

This PR switch the `SQUID_enable-ssl-crtd` into `default y`, therefore default enable SSL Bump mode.

Signed-off-by: Wong Hoi Sing Edison <hswong3i@pantarei-design.com>
2021-04-25 11:03:54 +08:00
Rosen Penev
2e7c403fff ksmbd-tools: update to 3.3.9
Signed-off-by: Rosen Penev <rosenp@gmail.com>
2021-04-24 02:19:14 -07:00
Leonardo Mörlein
7d17bbdc41 uacme: add use_auto_staging
Staging certificates have the advantage that their retry limits are loose.
Therefore they can be obtained quickly when automatic retries are used.
Unfortunately they can not be used for deployments because their CA is not
accepted by clients. Production certificates do not have this limitation, but
their retry limits are strict. For production certificates, automatic retries
can only be performed a few times per hour. This makes automatic obtainment of
certificates tenacious.

With use_auto_staging=1, the advantages of the two certificate types are
combined. Uacme will first obtain a staging certificate. When the staging
certificate is successfully obtained, uacme will switch and obtain a production
certificate. Since the staging certificate has already been successfully
obtained, we can ensure that the production certificate is successfully
obtained in the first attempt. This means that "retries" are performed on the
staging certificate and the production certificate is obtained in the first
attempt.

In summary, this feature enables fast obtaining of production certificates when
automatic retries are used.

By default, this feature is set to use_auto_staging=0, which means that
uacme will behave as before by default.

Signed-off-by: Leonardo Mörlein <git@irrelefant.net>
2021-04-24 01:16:57 -07:00
Leonardo Mörlein
b80781150b uacme: do not override production state dir variable
With this commit, issue_cert() can be called multiple times alternating
between staging and production certificates within a script.

Before this commit, the production state dir was stored in $STATE_DIR.
But in the case of $use_staging=1, this variable was overwritten in
issue_cert() with $STAGING_STATE_DIR. This made it impossible to call
issue_cert() with $use_staging=0 afterwards. Now the production state
dir is stored in $PRODUCTION_STATE_DIR. This way it is not overridden
anymore and issue_cert() can be called multiple times alternating with
production and staging.

Signed-off-by: Leonardo Mörlein <git@irrelefant.net>
2021-04-24 01:16:57 -07:00
Oldřich Jedlička
b10c73f11c fwknop: Remove unnecessary get_bool() function.
The get_bool() functionality was already merged to lib/functions.sh, so
it is redundant in the init script. Remove it.

Signed-off-by: Oldřich Jedlička <oldium.pro@gmail.com>
2021-04-24 01:15:58 -07:00
Glenn Strauss
52f85a0e1f lighttpd: patches from upstream
- ignore Content-Length from backend if 101 Switching Protocols
- close HTTP/2 connection after bad password
- skip cert chain build for self-issued certs
- meson zstd fix
- ls-hpack upstream update
- discard some HTTP/2 DATA frames received after response

Signed-off-by: Glenn Strauss <gstrauss@gluelogic.com>
2021-04-23 22:12:59 -04:00
Dirk Brenken
7cfb0f4657
banip: fix housekeeping
* fix whitelist housekeeping if you switch between normal- and
  'whitelist only' mode

Signed-off-by: Dirk Brenken <dev@brenken.org>
2021-04-23 15:03:53 +02:00
Josef Schlehofer
2f498b68b6
Merge pull request #15488 from Ansuel/improve-atlas
atlas-sw-probe: improve key creation
2021-04-23 14:49:16 +02:00
Ansuel Smith
0afe371bab
atlas-sw-probe: improve key creation
- Exit start if a probe_key is not present
- Add create_key command to generate a private_key based on the provided username in the atlas config.
- Add registration instruction in /etc/atlas
- Rework script to save probe_key on sysupgrade (the key are now adviced to be placed in the /etc/atlas dir and a link is used to make them accessible in the atlas-sw-scripts etc dir)

Signed-off-by: Ansuel Smith <ansuelsmth@gmail.com>
2021-04-23 01:58:41 +02:00
Dirk Brenken
ba66ea83ab
Merge pull request #15493 from dibdot/banIP
banip: update to 0.7.7
2021-04-22 05:46:43 +02:00
Daniel Golle
deafd6cf3f
gnunet: update to v0.14.1
* lots of fixes for many subsystems
 * new messenger group chat service
 * 'abd' temporarily removed due to upstream issue

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2021-04-22 00:52:29 +01:00
Magnus Kroken
6186fe732b openvpn: update to 2.5.2
Fixes two related security vulnerabilities (CVE-2020-15078) which
under very specific circumstances allow tricking a server using delayed
authentication (plugin or management) into returning a PUSH_REPLY before
the AUTH_FAILED message, which can possibly be used to gather
information about a VPN setup. In combination with "--auth-gen-token" or
a user-specific token auth solution it can be possible to get access to
a VPN with an otherwise-invalid account.

OpenVPN 2.5.2 also includes other bug fixes and improvements.

Add CI build test script.

Signed-off-by: Magnus Kroken <mkroken@gmail.com>
2021-04-22 00:03:05 +02:00
Dirk Brenken
515397b009
banip: update to 0.7.7
* add a "whitelist only" mode, this option allows to restrict Internet
  access from/to a small number of secure websites/IPs, and block access
  from/to the rest of the Internet.

Signed-off-by: Dirk Brenken <dev@brenken.org>
2021-04-21 21:13:36 +02:00
Florian Eckert
075be5826c
Merge pull request #15471 from TDT-AG/pr/20200420-stunnel
stunnel: update to 5.59
2021-04-21 08:45:36 +02:00
Rosen Penev
b7d5b10532
Merge pull request #15449 from SibrenVasse/master
openssh: update to 8.6p1
2021-04-20 17:30:37 -07:00
Olivier Poitrey
b2b8589e43 nextdns: Update to version 1.32.0
Signed-off-by: Olivier Poitrey <rs@nextdns.io>
2021-04-20 15:08:38 +00:00
Sibren Vasse
cb1d8bd8ed openssh: update to 8.6p1
Signed-off-by: Sibren Vasse <github@sibrenvasse.nl>
2021-04-20 12:28:30 +02:00
Jan Pavlinec
9296409e88
unbound: add cache-max-negative-ttl config option
Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
2021-04-20 12:22:42 +02:00
Florian Eckert
2d56dbfc27 stunnel: update to 5.59
Signed-off-by: Florian Eckert <fe@dev.tdt.de>
2021-04-20 08:42:57 +02:00
Aaron Curley
e25f3bcfde
udp-broadcast-relay-redux: Add package
This commit is largely based on the work from Daniel Dickinson in
PR #2096 which was never merged. I tweaked it in a number of ways.
All bugs with this package are mine, not his.

Signed-off-by: Aaron Curley <accwebs@gmail.com>
2021-04-19 20:52:09 -07:00
Olivier Poitrey
c1984f8ff0 nextdns: Update to version 1.12.5
Signed-off-by: Olivier Poitrey <rs@nextdns.io>
2021-04-20 01:38:39 +00:00
Olivier Poitrey
4c4ebb1461 nextdns: Update to version 1.12.3
Signed-off-by: Olivier Poitrey <rs@nextdns.io>
2021-04-19 23:23:41 +00:00
Olivier Poitrey
4502bc6db3 nextdns: Update to version 1.31.3
Signed-off-by: Olivier Poitrey <rs@nextdns.io>
2021-04-19 22:50:28 +00:00
Philip Prindeville
e1abf0c3c7
Merge pull request #15436 from pprindeville/strongswan-gencerts-change-sysconfdir
strongswan: change name of config base directory
2021-04-18 17:32:22 -06:00
Dirk Brenken
c531b6daea
adblock: update to 4.1.1
* support the RPZ trigger 'RPZ-CLIENT-IP' to always allow/block certain
  clients based on their IP (currently only supported by bind!)
* avoid promiscuous mode in tcpdump setup for adblock reporting
* speed up dns report preparation
* support dns report mailing (/etc/init.d/adblock report mail)
* fix bind autodetection
* update LuCI-frontend (separate PR)
* update readme

Signed-off-by: Dirk Brenken <dev@brenken.org>
2021-04-17 16:53:30 +02:00
Rosen Penev
37f4d88cf2
Merge pull request #14656 from stintel/miniupnpd
miniupnpd: introduce IGDv1 variant
2021-04-16 18:24:36 -07:00
Rosen Penev
49966f2bec
Merge pull request #15328 from ja-pa/atlas-probe-v2
atlas-sw-probe: add new package
2021-04-16 18:23:17 -07:00
Philip Prindeville
9217aa859f strongswan: change name of config base directory
Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2021-04-15 17:57:48 -06:00
Philip Prindeville
b34adb20b6
Merge pull request #15431 from pprindeville/strongswan-add-gencerts
strongswan: add certificate generation utility
2021-04-15 17:44:19 -06:00
Philip Prindeville
a3f625954a strongswan: add certificate generation utility
Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2021-04-15 13:10:08 -06:00
Josef Schlehofer
27c6314e03
Merge pull request #15432 from turris-cz/clamav-add-libiconv-dependency
clamav: add libiconv dependencies when build with NLS
2021-04-15 17:11:28 +02:00
Josef Schlehofer
87be6ffe60
clamav: add libiconv dependencies when build with NLS
NLS means Native Language Support and when you have it enabled (it is
not default), clamav can not be compiled as it shows following error:

Package clamav is missing dependencies for the following libraries:
libiconv.so.2

Also, it is required that package libiconv-full is compiled first/before
than clamav and then try to compile clamav.

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
2021-04-15 09:44:30 +02:00
Philip Prindeville
c62d9ebec9
Merge pull request #15430 from pprindeville/strongswan-add-ipsec-warning
strongswan: add deprecation warning to ipsec script
2021-04-15 01:31:25 -06:00
Luiz Angelo Daros de Luca
2fe47aff5b openvpn-easy-rsa: add missing configfile
/etc/profile.d/50-openvpn-easy-rsa.sh was not listed as configfile
and changes were lost during upgrades.

Signed-off-by: Luiz Angelo Daros de Luca <luizluca@gmail.com>
2021-04-14 19:10:27 -07:00
Rosen Penev
a5f62ca8fb
Merge pull request #15421 from ja-pa/onionshare-v2
onionshare-cli: add new package
2021-04-14 19:10:01 -07:00
Rosen Penev
4dda77eccd ngircd: update to 26.1
Switch to AUTORELEASE for simplicity.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2021-04-14 19:06:42 -07:00
Eneas U de Queiroz
ee1a3654dc ocserv: don't build with libseccomp on ARC
libseccomp can't be built on ARC, so we must disable the option here as
well.  A different fix was first proposed by @zxlhhyccc in #15377.

Fixes: #15313

Signed-off-by: Eneas U de Queiroz <cotequeiroz@gmail.com>
2021-04-14 22:52:42 -03:00
Philip Prindeville
505db629de strongswan: add deprecation warning to ipsec script
Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2021-04-14 12:27:07 -06:00
Philip Prindeville
41b536e22c
Merge pull request #15406 from pprindeville/strongswan-add-chacha20poly1305
strongswan: handle chacha20poly1305 as AEAD
2021-04-13 21:48:04 -06:00
Jan Pavlinec
ae069fad3d
onionshare-cli: add new package
Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
2021-04-14 00:38:12 +02:00
Rosen Penev
fb4655ab35 hcxdumptool: update to 6.1.6
Fix compilation without deprecated OpenSSL APIs.

Backport upstream patch to fix stdout.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2021-04-13 15:30:39 -07:00
Rosen Penev
f25755b0f9 hcxtools: update to 6.1.6
Add patch fixing compilation without deprecated OpenSSL APIs.

Fix installation. This never worked as the section was misnamed.

Updated tool names.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2021-04-13 15:30:39 -07:00
Philip Prindeville
ff33f4ccd3 strongswan: handle chacha20poly1305 as AEAD
chacha20policy1305 is also an AEAD cipher, and hence does not
permit a hash algorithm.

Fixes issue #15397.

Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2021-04-13 12:46:07 -06:00
Philip Prindeville
c95fd69973 strongswan: fail on serious configuration errors
Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2021-04-13 12:46:07 -06:00