1
0
mirror of https://git.openwrt.org/feed/packages.git synced 2024-06-15 20:03:57 +02:00
Commit Graph

8407 Commits

Author SHA1 Message Date
Tianling Shen
92efcc2956
xray-core: remove PROVIDES
Xray now is no longer planning to keep compatibility with original
v2ray. Remove PROVIDES before it is totally broken.

Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2021-04-27 20:34:18 +08:00
Karl Palsson
9996328abd net/mosquitto: port is optional in root config
From mosquitto 2.x, port became optional and deprecated in the config,
and it was recommended that listeners be used instead.  Drop the hard
requirement in our config conversion script.

Reported in: https://github.com/openwrt/packages/issues/15506
Signed-off-by: <karlp@etactica.com>
2021-04-26 09:36:49 +00:00
Karl Palsson
e0c33d94f8 net/mosquitto: fix log_type conversion in config
As reported in: https://github.com/openwrt/packages/issues/15506

Signed-off-by: Karl Palsson <karlp@etactica.com>
2021-04-26 09:34:52 +00:00
Peter van Dijk
1bcc98ef90 unbound: fix typo in assist name of https-dns-proxy
I left the old version in, in case users have configs that already correct for this error.

Signed-off-by: Peter van Dijk <peter.van.dijk@powerdns.com>
2021-04-25 16:16:23 +02:00
Rosen Penev
215a2e6518
Merge pull request #15507 from hswong3i/master-SQUID_enable-ssl-crtd
squid: Enable dynamic SSL certificate generation
2021-04-25 02:00:13 -07:00
Tao Gong
f62c15f92d conntrack-tools: add a patch to fix endianness issue
Signed-off-by: Tao Gong <gongtao0607@gmail.com>
2021-04-24 20:08:10 -07:00
Wong Hoi Sing Edison
dbda77686d
squid: Enable dynamic SSL certificate generation
Maintainer: @neheb / @BKPepe / @zhanhb
Compile tested: ipq806x, generic, netgear_r7800, master
Run tested: ipq806x, generic, netgear_r7800, openwrt-19.07

Description:

Squid now only support HTTPS proxy in TCP tunnel mode (e.g. `ssl_bump splice all`):

    https_port 3128 ssl-bump tls-cert=/etc/squid/squid.pem generate-host-certificates=on
    ssl_bump splice all

In order to operate in SSL Bump mode, we need to compile with `--enable-ssl-crtd` for following configuration:

    https_port 3128 ssl-bump tls-cert=/etc/squid/squid.pem generate-host-certificates=on
    sslcrtd_program /usr/lib/squid/security_file_certgen -s /car/cache/squid/ssl_db -M 4MB
    ssl_bump stare all
    ssl_bump bump all

This PR switch the `SQUID_enable-ssl-crtd` into `default y`, therefore default enable SSL Bump mode.

Signed-off-by: Wong Hoi Sing Edison <hswong3i@pantarei-design.com>
2021-04-25 11:03:54 +08:00
Rosen Penev
2e7c403fff ksmbd-tools: update to 3.3.9
Signed-off-by: Rosen Penev <rosenp@gmail.com>
2021-04-24 02:19:14 -07:00
Leonardo Mörlein
7d17bbdc41 uacme: add use_auto_staging
Staging certificates have the advantage that their retry limits are loose.
Therefore they can be obtained quickly when automatic retries are used.
Unfortunately they can not be used for deployments because their CA is not
accepted by clients. Production certificates do not have this limitation, but
their retry limits are strict. For production certificates, automatic retries
can only be performed a few times per hour. This makes automatic obtainment of
certificates tenacious.

With use_auto_staging=1, the advantages of the two certificate types are
combined. Uacme will first obtain a staging certificate. When the staging
certificate is successfully obtained, uacme will switch and obtain a production
certificate. Since the staging certificate has already been successfully
obtained, we can ensure that the production certificate is successfully
obtained in the first attempt. This means that "retries" are performed on the
staging certificate and the production certificate is obtained in the first
attempt.

In summary, this feature enables fast obtaining of production certificates when
automatic retries are used.

By default, this feature is set to use_auto_staging=0, which means that
uacme will behave as before by default.

Signed-off-by: Leonardo Mörlein <git@irrelefant.net>
2021-04-24 01:16:57 -07:00
Leonardo Mörlein
b80781150b uacme: do not override production state dir variable
With this commit, issue_cert() can be called multiple times alternating
between staging and production certificates within a script.

Before this commit, the production state dir was stored in $STATE_DIR.
But in the case of $use_staging=1, this variable was overwritten in
issue_cert() with $STAGING_STATE_DIR. This made it impossible to call
issue_cert() with $use_staging=0 afterwards. Now the production state
dir is stored in $PRODUCTION_STATE_DIR. This way it is not overridden
anymore and issue_cert() can be called multiple times alternating with
production and staging.

Signed-off-by: Leonardo Mörlein <git@irrelefant.net>
2021-04-24 01:16:57 -07:00
Oldřich Jedlička
b10c73f11c fwknop: Remove unnecessary get_bool() function.
The get_bool() functionality was already merged to lib/functions.sh, so
it is redundant in the init script. Remove it.

Signed-off-by: Oldřich Jedlička <oldium.pro@gmail.com>
2021-04-24 01:15:58 -07:00
Glenn Strauss
52f85a0e1f lighttpd: patches from upstream
- ignore Content-Length from backend if 101 Switching Protocols
- close HTTP/2 connection after bad password
- skip cert chain build for self-issued certs
- meson zstd fix
- ls-hpack upstream update
- discard some HTTP/2 DATA frames received after response

Signed-off-by: Glenn Strauss <gstrauss@gluelogic.com>
2021-04-23 22:12:59 -04:00
Dirk Brenken
7cfb0f4657
banip: fix housekeeping
* fix whitelist housekeeping if you switch between normal- and
  'whitelist only' mode

Signed-off-by: Dirk Brenken <dev@brenken.org>
2021-04-23 15:03:53 +02:00
Josef Schlehofer
2f498b68b6
Merge pull request #15488 from Ansuel/improve-atlas
atlas-sw-probe: improve key creation
2021-04-23 14:49:16 +02:00
Ansuel Smith
0afe371bab
atlas-sw-probe: improve key creation
- Exit start if a probe_key is not present
- Add create_key command to generate a private_key based on the provided username in the atlas config.
- Add registration instruction in /etc/atlas
- Rework script to save probe_key on sysupgrade (the key are now adviced to be placed in the /etc/atlas dir and a link is used to make them accessible in the atlas-sw-scripts etc dir)

Signed-off-by: Ansuel Smith <ansuelsmth@gmail.com>
2021-04-23 01:58:41 +02:00
Dirk Brenken
ba66ea83ab
Merge pull request #15493 from dibdot/banIP
banip: update to 0.7.7
2021-04-22 05:46:43 +02:00
Daniel Golle
deafd6cf3f
gnunet: update to v0.14.1
* lots of fixes for many subsystems
 * new messenger group chat service
 * 'abd' temporarily removed due to upstream issue

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2021-04-22 00:52:29 +01:00
Magnus Kroken
6186fe732b openvpn: update to 2.5.2
Fixes two related security vulnerabilities (CVE-2020-15078) which
under very specific circumstances allow tricking a server using delayed
authentication (plugin or management) into returning a PUSH_REPLY before
the AUTH_FAILED message, which can possibly be used to gather
information about a VPN setup. In combination with "--auth-gen-token" or
a user-specific token auth solution it can be possible to get access to
a VPN with an otherwise-invalid account.

OpenVPN 2.5.2 also includes other bug fixes and improvements.

Add CI build test script.

Signed-off-by: Magnus Kroken <mkroken@gmail.com>
2021-04-22 00:03:05 +02:00
Dirk Brenken
515397b009
banip: update to 0.7.7
* add a "whitelist only" mode, this option allows to restrict Internet
  access from/to a small number of secure websites/IPs, and block access
  from/to the rest of the Internet.

Signed-off-by: Dirk Brenken <dev@brenken.org>
2021-04-21 21:13:36 +02:00
Florian Eckert
075be5826c
Merge pull request #15471 from TDT-AG/pr/20200420-stunnel
stunnel: update to 5.59
2021-04-21 08:45:36 +02:00
Rosen Penev
b7d5b10532
Merge pull request #15449 from SibrenVasse/master
openssh: update to 8.6p1
2021-04-20 17:30:37 -07:00
Olivier Poitrey
b2b8589e43 nextdns: Update to version 1.32.0
Signed-off-by: Olivier Poitrey <rs@nextdns.io>
2021-04-20 15:08:38 +00:00
Sibren Vasse
cb1d8bd8ed openssh: update to 8.6p1
Signed-off-by: Sibren Vasse <github@sibrenvasse.nl>
2021-04-20 12:28:30 +02:00
Jan Pavlinec
9296409e88
unbound: add cache-max-negative-ttl config option
Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
2021-04-20 12:22:42 +02:00
Florian Eckert
2d56dbfc27 stunnel: update to 5.59
Signed-off-by: Florian Eckert <fe@dev.tdt.de>
2021-04-20 08:42:57 +02:00
Aaron Curley
e25f3bcfde
udp-broadcast-relay-redux: Add package
This commit is largely based on the work from Daniel Dickinson in
PR #2096 which was never merged. I tweaked it in a number of ways.
All bugs with this package are mine, not his.

Signed-off-by: Aaron Curley <accwebs@gmail.com>
2021-04-19 20:52:09 -07:00
Olivier Poitrey
c1984f8ff0 nextdns: Update to version 1.12.5
Signed-off-by: Olivier Poitrey <rs@nextdns.io>
2021-04-20 01:38:39 +00:00
Olivier Poitrey
4c4ebb1461 nextdns: Update to version 1.12.3
Signed-off-by: Olivier Poitrey <rs@nextdns.io>
2021-04-19 23:23:41 +00:00
Olivier Poitrey
4502bc6db3 nextdns: Update to version 1.31.3
Signed-off-by: Olivier Poitrey <rs@nextdns.io>
2021-04-19 22:50:28 +00:00
Philip Prindeville
e1abf0c3c7
Merge pull request #15436 from pprindeville/strongswan-gencerts-change-sysconfdir
strongswan: change name of config base directory
2021-04-18 17:32:22 -06:00
Dirk Brenken
c531b6daea
adblock: update to 4.1.1
* support the RPZ trigger 'RPZ-CLIENT-IP' to always allow/block certain
  clients based on their IP (currently only supported by bind!)
* avoid promiscuous mode in tcpdump setup for adblock reporting
* speed up dns report preparation
* support dns report mailing (/etc/init.d/adblock report mail)
* fix bind autodetection
* update LuCI-frontend (separate PR)
* update readme

Signed-off-by: Dirk Brenken <dev@brenken.org>
2021-04-17 16:53:30 +02:00
Rosen Penev
37f4d88cf2
Merge pull request #14656 from stintel/miniupnpd
miniupnpd: introduce IGDv1 variant
2021-04-16 18:24:36 -07:00
Rosen Penev
49966f2bec
Merge pull request #15328 from ja-pa/atlas-probe-v2
atlas-sw-probe: add new package
2021-04-16 18:23:17 -07:00
Philip Prindeville
9217aa859f strongswan: change name of config base directory
Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2021-04-15 17:57:48 -06:00
Philip Prindeville
b34adb20b6
Merge pull request #15431 from pprindeville/strongswan-add-gencerts
strongswan: add certificate generation utility
2021-04-15 17:44:19 -06:00
Philip Prindeville
a3f625954a strongswan: add certificate generation utility
Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2021-04-15 13:10:08 -06:00
Josef Schlehofer
27c6314e03
Merge pull request #15432 from turris-cz/clamav-add-libiconv-dependency
clamav: add libiconv dependencies when build with NLS
2021-04-15 17:11:28 +02:00
Josef Schlehofer
87be6ffe60
clamav: add libiconv dependencies when build with NLS
NLS means Native Language Support and when you have it enabled (it is
not default), clamav can not be compiled as it shows following error:

Package clamav is missing dependencies for the following libraries:
libiconv.so.2

Also, it is required that package libiconv-full is compiled first/before
than clamav and then try to compile clamav.

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
2021-04-15 09:44:30 +02:00
Philip Prindeville
c62d9ebec9
Merge pull request #15430 from pprindeville/strongswan-add-ipsec-warning
strongswan: add deprecation warning to ipsec script
2021-04-15 01:31:25 -06:00
Luiz Angelo Daros de Luca
2fe47aff5b openvpn-easy-rsa: add missing configfile
/etc/profile.d/50-openvpn-easy-rsa.sh was not listed as configfile
and changes were lost during upgrades.

Signed-off-by: Luiz Angelo Daros de Luca <luizluca@gmail.com>
2021-04-14 19:10:27 -07:00
Rosen Penev
a5f62ca8fb
Merge pull request #15421 from ja-pa/onionshare-v2
onionshare-cli: add new package
2021-04-14 19:10:01 -07:00
Rosen Penev
4dda77eccd ngircd: update to 26.1
Switch to AUTORELEASE for simplicity.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2021-04-14 19:06:42 -07:00
Eneas U de Queiroz
ee1a3654dc ocserv: don't build with libseccomp on ARC
libseccomp can't be built on ARC, so we must disable the option here as
well.  A different fix was first proposed by @zxlhhyccc in #15377.

Fixes: #15313

Signed-off-by: Eneas U de Queiroz <cotequeiroz@gmail.com>
2021-04-14 22:52:42 -03:00
Philip Prindeville
505db629de strongswan: add deprecation warning to ipsec script
Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2021-04-14 12:27:07 -06:00
Philip Prindeville
41b536e22c
Merge pull request #15406 from pprindeville/strongswan-add-chacha20poly1305
strongswan: handle chacha20poly1305 as AEAD
2021-04-13 21:48:04 -06:00
Jan Pavlinec
ae069fad3d
onionshare-cli: add new package
Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
2021-04-14 00:38:12 +02:00
Rosen Penev
fb4655ab35 hcxdumptool: update to 6.1.6
Fix compilation without deprecated OpenSSL APIs.

Backport upstream patch to fix stdout.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2021-04-13 15:30:39 -07:00
Rosen Penev
f25755b0f9 hcxtools: update to 6.1.6
Add patch fixing compilation without deprecated OpenSSL APIs.

Fix installation. This never worked as the section was misnamed.

Updated tool names.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2021-04-13 15:30:39 -07:00
Philip Prindeville
ff33f4ccd3 strongswan: handle chacha20poly1305 as AEAD
chacha20policy1305 is also an AEAD cipher, and hence does not
permit a hash algorithm.

Fixes issue #15397.

Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2021-04-13 12:46:07 -06:00
Philip Prindeville
c95fd69973 strongswan: fail on serious configuration errors
Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2021-04-13 12:46:07 -06:00
Philip Prindeville
210640d606 strongswan: drop subshell when possible
A subshell caused by $(...) can't persistently modify globals as a
side-effect.

Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2021-04-13 12:45:57 -06:00
Jan Pavlinec
eda48170ec
ooniprobe: update to version 3.9.2
Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
2021-04-13 16:44:40 +02:00
Florian Eckert
920d733876
Merge pull request #15379 from jow-/bonding-accept-uci-list
bonding: accept list of slaves in uci list notation
2021-04-13 09:29:22 +02:00
Rosen Penev
682aebbaea squid: update to 4.14
Signed-off-by: Rosen Penev <rosenp@gmail.com>
2021-04-12 23:08:06 -07:00
Philip Prindeville
61b2a35a35
Merge pull request #15382 from cotequeiroz/strongswan
strongswan: libnttft must not select strongswan
2021-04-11 17:10:58 -06:00
Stan Grishin
cd11d8821f https-dns-proxy: bugfix: race condition with dnsmasq
Signed-off-by: Stan Grishin <stangri@melmac.net>
2021-04-10 16:58:51 -10:00
Stan Grishin
231d40053b simple-adblock: update to 1.8.7-3
Signed-off-by: Stan Grishin <stangri@melmac.net>
2021-04-10 17:08:51 -07:00
Daniel Golle
2d9b46e677
ovsd: improve package style and update source
Fix post-merge comments in #15316 and update source.

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2021-04-10 16:56:44 +01:00
Gregory L. Dietsche
49535edffd safe-search: prevent duplicate cron job installation
This patch prevents multiple cron jobs from being created to run the
safe-search-maintenance script.

To reproduce this bug, perform the following:
  - Install safe-search
  - Perform an OpenWRT firmware upgrade (choose to preserve user settings)
  - Install safe-search again

Signed-off-by: Gregory L. Dietsche <gregory.dietsche@cuw.edu>
2021-04-10 14:28:25 +02:00
Eneas U de Queiroz
e50ba32402
strongswan: libnttft must not select strongswan
The strongswan-libnttfft package should not select the strongswan
package, but should depend on it instead.  Otherwise a circular
dependency is created.

Signed-off-by: Eneas U de Queiroz <cotequeiroz@gmail.com>
2021-04-09 23:54:43 -03:00
Jo-Philipp Wich
57a77386de bonding: accept list of slaves in uci list notation
Rework the bonding.sh protocol handler to accept slave interface names
encoded in uci list notation. Also replace ifconfig up/down with ip
link calls while we're at it.

Fixes: #11455
Fixes: https://github.com/openwrt/luci/issues/4473
Signed-off-by: Jo-Philipp Wich <jo@mein.io>
2021-04-09 18:56:50 +02:00
Dirk Brenken
ec20e9df96
adblock: fix games_tracking source url
Signed-off-by: Dirk Brenken <dev@brenken.org>
2021-04-09 18:42:30 +02:00
Jan Pavlinec
c65a659e6d
atlas-sw-probe: add new package
Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
2021-04-09 15:21:32 +02:00
Jan Pavlinec
cb30c106c0
atlas-probe: add new package
Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
2021-04-09 15:21:32 +02:00
Philip Prindeville
e44b2665e7
Merge pull request #6924 from derekyerger/strongswan-lattice-sha3
strongswan: add more crypto plugins
2021-04-08 22:26:56 -06:00
Josef Schlehofer
7c80ef5f76
Merge pull request #15353 from ja-pa/knot-resolver-5.3.1
knot-resolver: update to version 5.3.1
2021-04-07 14:17:57 +02:00
Rosen Penev
c6fa2d5bfa ksmbd-tools: update to 3.3.8
Major changes are:
  disable symlink by default.
  remove smack inherit leftovers.
  Enable guest access on IPC$ share by default.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2021-04-07 00:46:54 -07:00
Kirill Nikolaev
272b0a5c18 ksmbd-tools: Add a mDNS TXT record for the ksmbd service
MacOS ignores Bonjour services for which TXT records are not returned. This changes forces umdns service to return a TXT record (`daemon=ksmbd`) for the ksmbd service. The exact content is unimportant and to the best of my knowledge nothing reads the `daemon` tag.

Symptoms of the problem (which are also debugging steps):
* Finder refuses to open the OpenWRT "computer" in the Network list.
* Discovery.app (Bonjour Browser) lists the _ssh._tcp service, but the submenu for it doesn't unfold and no address is shown.
* `dns-sd -L OpenWrt _smb._tcp` doesn't return any address.

Signed-off-by: Kirill Nikolaev <cyril7@gmail.com>
2021-04-07 00:46:54 -07:00
Jan Pavlinec
354523d5b5 ooniprobe: update to version 3.9.0
Remove getrescources call because it is no longer
required.

Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
2021-04-07 10:17:23 +03:00
Jan Pavlinec
3e3025b191
knot-resolver: update to version 5.3.1
Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
2021-04-06 12:41:17 +02:00
Karl Palsson
d4e5f38147 mosquitto: bump to 2.0.10
This is a security fix, affecting 2.0.0 through to 2.0.9.  Mosquitto instances
could be remotely DoS'd by authenticated clients.

Release notes at: https://github.com/eclipse/mosquitto/blob/v2.0.10/ChangeLog.txt
CVE number has not yet been assigned.

Signed-off-by: Karl Palsson <karlp@etactica.com>
2021-04-06 10:33:56 +00:00
Christian Lachner
b94645c68a haproxy: Update HAProxy to v2.2.13
- Update haproxy download URL and hash

Signed-off-by: Christian Lachner <gladiac@gmail.com>
2021-04-06 12:56:05 +03:00
Florian Eckert
97ea947b1e
Merge pull request #15337 from SvenRoederer/xinetd-include
xinetd: honor ${IPKG_INSTROOT} when sourcing /lib/functions.sh
2021-04-06 07:51:43 +02:00
Philip Prindeville
ae3d5aa73e strongswan: bump to 5.9.2
Retire weak algorithms like MD5 and 3DES.

Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2021-04-05 14:58:54 -07:00
Derek Yerger
4c1fc7e311 strongswan: add more crypto plugins
Adds modules for BLISS signature scheme, NTRU and New Hope key
exchange algorithms, and dependencies ChaCha20-Poly1305 AEAD,
ChaCha20 XOF, MGF1 mask generation function, SHA3 hasher SHAKE
XOF, and the Number Theoretic Transform library.

Signed-off-by: Derek Yerger <derek@altdevs.net>
2021-04-05 14:31:49 -05:00
Philip Prindeville
a72780a9c2 strongswan: force PIC on all builds
Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2021-04-05 07:31:40 -10:00
Leonardo Mörlein
24ddf22073 uacme: add retries
Prior to this commit, the acme service attempted to obtain certificates
once and then terminated, regardless of whether the certificate could be
obtained or not. This commit introduces a new uci option "retries" to
the "certificate" section. If this option is set to N, the acme service
will attempt to obtain the certificate up to N times before terminating.
There is a waiting pause between the retries to comply with the rate
limits of Let'sEncrypt.

The waiting pause is:
-  2 minutes for staging certificates
- 24 minutes for production certificates

The current "Failed Validation" rate limits of Let'sEncrypt are:
- staging:   60 per hour -> 1 failure every 1 minute in avg.
- production: 5 per hour -> 1 failure every 12 minutes in avg.

This means that we are within rate limits by a factor of two.

By default the option "retries" is set to "1", which means that acme
behaves as before by default. If the variable is set to "0", infinite
retries are performed.

This feature is helpful, when you already want to initiate the
certificate request, but you are still waiting for your dns server to be
configured, your network to appear or other conditions.

Signed-off-by: Leonardo Mörlein <git@irrelefant.net>
2021-04-04 22:16:02 -07:00
Leonardo Mörlein
9a6c2339b0 uacme: propagate rc of uacme in issue_cert()
Before this commit, issue_cert always returned 1 no matter if uacme
returned 1, 2, 3, ... With this commit, the return code of the uacme
binary is propagated. Therefore the caller of issue_cert can
differentiate between "no renew necessary" and "an error occurred".

Signed-off-by: Leonardo Mörlein <me@irrelefant.net>
2021-04-04 19:12:38 -07:00
Leonardo Mörlein
4588a61652 uacme: allow including run-uacme
With this commit, the run-acme script can be included into other scripts
by setting INLCUDE_ONLY=1.

Signed-off-by: Leonardo Mörlein <me@irrelefant.net>
2021-04-04 19:12:38 -07:00
Ondřej Caletka
0c044284b7 jool: Update to 4.1.5
Compile and run tested on: mvebu (Turris Omnia)

Signed-off-by: Ondřej Caletka <ondrej@caletka.cz>
2021-04-04 19:06:05 -07:00
Philip Prindeville
f9d91f1f47 strongswan: migrate to swanctl configs
Derived from the ipsec initd script, with the following changes:

(1) various code improvements, corrections (get rid of left/right
    updown scripts, since there's only one), etc;
(2) add reauth and fragmentation parameters;
(3) add x.509 certificate-based authentication;

and other minor changes.

Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2021-04-04 11:58:51 -06:00
Philip Prindeville
1eeb8bc287
Merge pull request #15339 from pprindeville/strongswan-reset-ipsec.conf
strongswan: remove synthesized ipsec conf files
2021-04-03 22:18:08 -06:00
Rosen Penev
79a2677c07
Merge pull request #15330 from 1715173329/xray
xray-core: Update to 1.4.2
2021-04-03 19:07:17 -07:00
Huangbin Zhan
a1d70de325 overture: update to 1.7
Signed-off-by: Huangbin Zhan <zhanhb88@gmail.com>
2021-04-03 18:42:53 -07:00
Kevin Darbyshire-Bryant
f1d2136024 netifyd: support filter parameter
netifyd supports a '-F' filter option in 'bpf' notation to filter
packets from its consideration.

Add support for a uci 'filter' option. eg. filter to exclude SSDP
multicasts from a particularly noisy device:

option filter 'not (udp and dst 239.255.255.250 and dst port 1900 and src 192.168.1.5)'

Signed-off-by: Kevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk>
2021-04-03 18:40:54 -07:00
Anton Ryzhov
c61ed3e93f restic-rest-server: fix configuration option names
Signed-off-by: Anton Ryzhov <anton@ryzhov.me>
2021-04-03 18:39:36 -07:00
George Iv
76b642b50f yggdrasil: bump to 0.3.16
Signed-off-by: George Iv <zhoreeq@users.noreply.github.com>
2021-04-03 18:38:57 -07:00
Jianhui Zhao
9b9d40c99a rp-pppoe: use pppoe.so instead of rp-pppoe.so
Signed-off-by: Jianhui Zhao <zhaojh329@gmail.com>
2021-04-03 18:38:28 -07:00
Sven Roederer
f25f49a8b7 nut: fix typo in nutshutdown script
Even it's only cosmetic and should not affect the function of regular system,
fix the name of the IPKG_INSTROOT variable.
Typo was added long ago with 8400c9a6ec.

Signed-off-by: Sven Roederer <devel-sven@geroedel.de>
2021-04-03 18:38:13 -07:00
Sven Roederer
bdab7e6bfe xinetd: honor ${IPKG_INSTROOT} when sourcing /lib/functions.sh
Avoid "file not found"-error when embedding via Imagebuilder.

Signed-off-by: Sven Roederer <devel-sven@geroedel.de>
2021-04-04 01:58:14 +02:00
Dirk Brenken
86a20c7955
banip: bugfix 0.7.6-2
* fix housekeeping of external list sources

Signed-off-by: Dirk Brenken <dev@brenken.org>
2021-04-03 19:16:39 +02:00
Tianling Shen
781c70077b
xray-core: Update to 1.4.2
Updated geo datas to latest version.

Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2021-04-02 17:19:35 +08:00
Tianling Shen
736667ce6e
xray-core: init: add browser dialer support
Since v1.4.1, Xray has introduced a new feature to transfer data via
browsers, which can disguise itself as a normal browser to cheat
network censorship.

For more details, see https://github.com/XTLS/Xray-core/pull/421.

Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2021-04-02 17:19:31 +08:00
Josef Schlehofer
93fb1b4ca2
Merge pull request #15301 from ja-pa/git-lfs-2.13.3
git-lfs: update to version 2.13.3
2021-04-02 01:41:16 +02:00
Philip Prindeville
baa38a1420 strongswan: remove synthesized ipsec conf files
If you shutdown ipsec service, and it doesn't clean up
/var/ipsec/ipsec.conf, then when you start swanctl service it
might see an incompatible file on startup.  Remedy is to
remove unneeded files when shutting down the service.  They
can always be regenerated when the service starts again.

Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2021-04-01 15:06:00 -06:00
Philip Prindeville
58936f4420
Merge pull request #15286 from pprindeville/strongswan-move-ipsec.secrets
strongswan: move ipsec conf files to subpackage
2021-04-01 14:16:35 -06:00
Jo-Philipp Wich
7f065a94bb openvpn: fix invoking user up & down commands from hotplug wrapper
This commit adds a number of fixes to the OpenVPN up/down hotplug command
wrapper which currently fails to actually invoke user defined up and down
commands for uci configurations not using external native configurations.

 - Use the `--setenv` to pass the user configured `up` and `down` commands
   as `user_up` and `user_down` environment variables respectively

 - Instead of attempting to scrape the `up` and `down` settings from the
   (possibly generated) native OpenVPN configuration in
   `/etc/hotplug.d/openvpn/01-user`, read them from the respective
   environment variables instead

 - Fix parsing of native configuration values in `get_openvpn_option()`;
   first try to parse a given setting as single quoted value, then as
   double quoted and finally as non-quoted, potentially white-space
   escaped one. This ensures that `up '/bin/foo'` is interpreted as
   `/bin/foo` and not `'/bin/foo'`

Ref: https://forum.openwrt.org/t/openvpn-up-down-configuration-ignored/91126
Supersedes: #15121, #15284
Signed-off-by: Jo-Philipp Wich <jo@mein.io>
2021-04-01 07:20:03 -04:00
Rosen Penev
74611b3e5a
Merge pull request #15327 from ja-pa/curl-7.76.0
curl: update to version 7.76.0 (security fix)
2021-04-01 04:08:58 -07:00
Paul Spooren
ba82e9957d tmate-ssh-server: add package
The `tmate` tool is a fork of `tmux` which allows remote access to a
device without setting up any port forwarding. This commits adds the
backend server which handles connections.

Signed-off-by: Paul Spooren <mail@aparcar.org>
2021-03-31 23:37:19 -10:00
Jan Pavlinec
b971310549
curl: update to version 7.76.0
Fixes CVE-2021-22876 and CVE-2021-22890

Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
2021-04-01 11:02:53 +02:00
Tianling Shen
07bc6996b6 xray-core: Update to 1.4.1
Updated geodata to latest version.

Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2021-03-31 17:37:29 -10:00
Philip Prindeville
e626255b37 strongswan: move ipsec conf files to subpackage
These config files are only used by the ipsec interface to charon,
and shouldn't be part of the base package.

Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2021-03-31 21:19:40 -06:00
Daniel Golle
3e30c34bac
ovsd: add package
Add Open vSwtich configuration daemon for netifd.

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2021-04-01 00:14:26 +01:00
Jan Hak
d92a2cd21b knot: update to version 3.0.5
Signed-off-by: Jan Hak <jan.hak@nic.cz>
2021-03-29 11:48:21 +02:00
Jan Pavlinec
0042beff72
git-lfs: update to version 2.13.3
Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
2021-03-29 10:48:06 +02:00
Dirk Brenken
994ff9ba1f
Merge pull request #15289 from dibdot/banip
banip: update to 0.7.6
2021-03-28 21:58:31 +02:00
Lucian Cristian
2e4c264a54 frr: update to 7.5.1 and backports
Signed-off-by: Lucian Cristian <lucian.cristian@gmail.com>
2021-03-28 22:37:02 +03:00
Dirk Brenken
1235acdde6
banip: update to 0.7.6
* rework the central iptables function to significantly
  reduce the code complexity and the overall number of iptables calls
* check early and only once in the chain for ctstate NEW and
  return otherwise (thanks @ldir-EDB0)
* made the whitelist ordering within the chain more flexible

Signed-off-by: Dirk Brenken <dev@brenken.org>
2021-03-28 17:07:28 +02:00
Rosen Penev
a31b732007 treewide: build CMake projects with Ninja
faster to compile.

A small selection of packages was tested going from:

Executed in  696.30 secs   fish           external
   usr time   82.98 mins  395.00 micros   82.98 mins
   sys time    9.02 mins    0.00 micros    9.02 mins

to:

Executed in  592.20 secs   fish           external
   usr time   84.84 mins  361.00 micros   84.84 mins
   sys time    8.85 mins   57.00 micros    8.85 mins

Tested by running make -j 12 and wiping staging/build_dir/target_x

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2021-03-27 21:51:50 -07:00
Philip Prindeville
a7c8f9de0c
Merge pull request #14711 from pprindeville/strongswan-make-includes-persistent
strongswan: make the include's in the .conf files persistent
2021-03-26 21:45:08 -06:00
Dirk Brenken
d2c149a68e
Merge pull request #15276 from dibdot/banip
banip: update to 0.7.5-4
2021-03-26 22:01:30 +01:00
Philip Prindeville
643df01275 strongswan: make the include's in the .conf files persistent
Having scripts diddle user written config files seems potentially
dangerous.  Plus there's really no downside to including some
empty files.  Best to just make the includes be permanent.

Additional feature suggested by Luiz: if a -opkg version of the
config file was created unnecessarily, remove it as part of the
upgrade process since changes won't be happening to that file
as an artifact of the service starting.  The include lines are
now permanent, which means that (1) additional configuration
synthesized by UCI won't be anywhere that opkg (or sysupgrade,
for that matter) cares about since it won't be persistent, and
(2) if changes are being made, then they're being done by a
person with an editor and they really should be distinguished.

Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2021-03-26 14:29:32 -06:00
Rosen Penev
3cfceae45f mbusd: update to 0.5.0
Switch to AUTORELEASE for simplicity.

Switch to building with Ninja for faster compilation.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2021-03-26 13:14:04 -07:00
Rosen Penev
c8f8cf05bd netstinky: fix no deprecated OpenSSL
Signed-off-by: Rosen Penev <rosenp@gmail.com>
2021-03-26 13:13:14 -07:00
Toke Høiland-Jørgensen
c931276955 acme: Get listener name from /proc/PID/exe instead of netstat output
It seems the command name output from netstat can be truncated in weird
ways, so let's get the binary name from /proc instead and use that for
matching which listener we have.

Fixes #15071.

Signed-off-by: Toke Høiland-Jørgensen <toke@toke.dk>
2021-03-26 20:06:34 +01:00
Rosen Penev
be179a8855 netopeer2: update to 1.1.70
Switch to AUTORELEASE for simplicity.

Switch to building with Ninja for faster compilation.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2021-03-26 11:24:35 -07:00
Dirk Brenken
fb4bfd259d
banip: update to 0.7.5-4
* fix another IPv4/IPv6 related iptables chain creation problem
* fix counter during ipset creation
* fix regex for debug counters
* fix ipset housekeeping for local sources

Signed-off-by: Dirk Brenken <dev@brenken.org>
2021-03-26 19:19:57 +01:00
Stijn Tintel
10a00b3f20
Merge pull request #15266 from pprindeville/strongswan-change-maintainers
strongswan: change maintainers
2021-03-26 15:15:44 +02:00
Philip Prindeville
0bd4410e30 strongswan: change maintainers
Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2021-03-25 21:37:56 -06:00
Stan Grishin
84fc5dfad4 https-dns-proxy: bugfix: correct PROCD firewall object
Signed-off-by: Stan Grishin <stangri@melmac.net>
2021-03-25 16:46:01 -07:00
Rosen Penev
93857f5487 ratechecker: update to 2020-01-30
Reorganize Makefile for consistency between packages.

Switch to AUTORELEASE for simplicity.

Switch to building with Ninja for faster compilation.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2021-03-25 10:48:25 -07:00
Rosen Penev
301bab659c cshark: update to 2020-07-22
Switch to AUTORELEASE for simplicity.

Switch to building with Ninja for faster compilation.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2021-03-24 15:33:03 -07:00
Rosen Penev
150058b0d2
Merge pull request #15228 from fatbob313/umurmur-0.2.20
uMurmur: Update to 0.2.20. Fix build against OpenSSL without deprecat…
2021-03-23 12:09:01 -07:00
Martin Johansson
463666249a uMurmur: Update to 0.2.20. Fix build against OpenSSL without deprecated API enabled.
Signed-off-by: Martin Johansson <martin@fatbob.nu>
2021-03-23 19:36:15 +01:00
Dirk Brenken
92bb72925e
Merge pull request #15229 from dibdot/adblock
adblock: update 4.1.0-3
2021-03-23 11:34:17 +01:00
Dirk Brenken
df9ee1388e
adblock: update 4.1.0-3
* add a restrictive "jail mode only" variant, just point your
  jail directory to your primary dns directory
* update readme

Signed-off-by: Dirk Brenken <dev@brenken.org>
2021-03-23 11:11:23 +01:00
Rosen Penev
cdd1a44315 sysrepo: update to 1.4.122
Switch to AUTORELEASE for simplicity.

Use Ninja for faster compilation.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2021-03-22 18:39:29 -07:00
Rosen Penev
dca4bbaf99
Merge pull request #15171 from ldir-EDB0/miniupnpd
miniupnpd: add patience to firewall include
2021-03-22 14:11:21 -07:00
Rosen Penev
7c6b2c375f
Merge pull request #15219 from stangri/master-https-dns-proxy
https-dns-proxy: support for additional Force DNS ports
2021-03-22 11:54:46 -07:00
Rosen Penev
483a29d0f9
Merge pull request #15226 from ja-pa/ooniprobe-3.8.0
ooniprobe: update to version 3.8.0
2021-03-22 11:54:09 -07:00
Alexander Egorenkov
5789faab67 openvpn: add OpenVPN option server-poll-timeout
See https://www.mankier.com/8/openvpn#--server-poll-timeout

Signed-off-by: Alexander Egorenkov <egorenar-dev@posteo.net>
2021-03-22 11:50:09 -07:00
Jan Pavlinec
b2921628ab
ooniprobe: update to version 3.8.0
Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
2021-03-22 16:21:04 +01:00
Stan Grishin
35461a3c5d https-dns-proxy: support for additional Force DNS ports
Signed-off-by: Stan Grishin <stangri@melmac.net>
2021-03-22 07:28:50 +00:00
Rosen Penev
eba4abb65d coova-chili: fix compilation with kernel 5.10
Signed-off-by: Rosen Penev <rosenp@gmail.com>
2021-03-21 21:57:28 -07:00
Rosen Penev
dd64cb713b bind: update to 9.17.11
Backport upstream OpenSSL deprecated API patch.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2021-03-21 20:38:25 -07:00
Othmar Truniger
e236ffb2ce knxd: new upstream version 0.14.50
Signed-off-by: Othmar Truniger <github@truniger.ch>
2021-03-21 11:54:34 -07:00
Rosen Penev
e5d61027a9
Merge pull request #15191 from neheb/zn3
znc: fix compilation without deprecated OpenSSL APIs
2021-03-20 20:25:32 -07:00
Rosen Penev
8a5f23ee0b znc: fix compilation without deprecated OpenSSL APIs
Patch was wrongly removed.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2021-03-20 17:39:28 -07:00
Rosen Penev
cd637742c2 miniupnpc: update to 2.2.2
Switch to AUTORELEASE for simplicity.

Switch to building with Ninja for faster compilation.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2021-03-20 17:30:36 -07:00
Konstantin Demin
2a4b38d8db nmap: bump to 7.91
changes: https://nmap.org/changelog#7.91

drop patches (applied upstream):
- 010-Avoid-using-namespace-std-causing-name-conflicts.patch
refresh patches:
- 020-Python3-port-of-ndiff.patch
- 030-libcxx.patch

Signed-off-by: Konstantin Demin <rockdrilla@gmail.com>
2021-03-20 22:47:01 +01:00
Philip Prindeville
559f5fd4fb
Merge pull request #15161 from pprindeville/isc-dhcp-dyndns-ipv4
isc-dhcp: add dynamic DNS as meta package
2021-03-20 11:40:46 -06:00
Kevin Darbyshire-Bryant
679a7b69ee miniupnpd: add patience to firewall include
Occasionally, mostly at startup, miniupnpd reports "Another app is
currently holding the xtables lock. Perhaps you want to use the -w
option?"

Take iptables' advice and wait up to 1 second before giving up.

Signed-off-by: Kevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk>
2021-03-20 16:01:25 +00:00
Rosen Penev
a99390cfd4
Merge pull request #15163 from gladiac1337/haproxy-2.2.11
haproxy: Update HAProxy to v2.2.11
2021-03-19 15:51:40 -07:00
Dirk Brenken
80466dd045
banip: update 0.7.5-3
* fix iptables/chain creation in setups without IPv6 support

Signed-off-by: Dirk Brenken <dev@brenken.org>
2021-03-19 20:49:59 +01:00
Christian Lachner
7bfa4aaa66 haproxy: Update HAProxy to v2.2.11
- Update haproxy download URL and hash

Signed-off-by: Christian Lachner <gladiac@gmail.com>
2021-03-19 18:13:39 +01:00
Tianling Shen
ccfe1bfa50 tmate: add new package
Tmate is a fork of tmux. It provides an instant pairing solution.
For more details, see https://tmate.io.

Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2021-03-18 22:18:14 -10:00
Stan Grishin
e695cc26b0 simple-adblock: jsonOps-related bugfixes
Signed-off-by: Stan Grishin <stangri@melmac.net>
2021-03-17 22:21:05 -10:00
Philip Prindeville
13f5b57f21 isc-dhcp: add dynamic DNS as meta package
Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2021-03-18 00:21:01 -06:00
Stijn Tintel
4cdbe799b1 net-snmp: bump to 5.9
Neither the configure option nor configure variable to disable linking
against PCRE seem to work anymore, so simply drop both and add a
dependency on libpcre. As net-snmp is unlikely to fit on devices with
small flash anyway, the extra size requirement shouldn't be a problem.
If it is, feel free to submit a patch to fix the broken upstream
behaviour.

Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
2021-03-17 21:53:10 +02:00
Dobroslaw Kijowski
d12c6658e4 adguardhome: bump to 0.105.2
* Full changelog available at:
  * https://github.com/AdguardTeam/AdGuardHome/releases/tag/v0.105.2

Signed-off-by: Dobroslaw Kijowski <dobo90@gmail.com>
2021-03-17 19:58:04 +02:00