8097 Commits

Author SHA1 Message Date
Aaron Goodman 2f9cfb036f openfortivpn: block restart after authentication failure
Block restart of the interface if the openfortivpn fails to authenticate.
Without this check, with a bad password, netifd will continually
hit the VPN endpoint with connection attempts

Signed-off-by: Aaron Goodman <aaronjg@stanford.edu>
2020-07-28 23:06:09 -04:00
Rosen Penev a445b39bef fping: update to 4.4
Remove upstreamed patch.

Whitespace Makefile cleanups.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2020-07-28 16:10:26 -07:00
Hannu Nyman 25dfa20780 nlbwmon: add hotplug script to reload after interface ifup
Add a hotplug script to reload nlbwmon's config after interface
ifup actions.

That should improve the detection of the IPv6 LAN address
that can get enabled a bit later in the boot process.

Signed-off-by: Hannu Nyman <hannu.nyman@iki.fi>
2020-07-28 19:23:12 +03:00
Florian Eckert 00cb41275c Merge pull request #12948 from TDT-AG/pr/20200724-mwan3
mwan3: update to version 2.8.12
2020-07-28 07:07:14 +02:00
Florian Eckert 85e91377cf mwan3: update version to 2.8.12
Signed-off-by: Florian Eckert <fe@dev.tdt.de>
2020-07-28 06:53:24 +02:00
Florian Eckert 981d1eb83a mwan3: unify variable check
Signed-off-by: Florian Eckert <fe@dev.tdt.de>
2020-07-28 06:53:24 +02:00
Florian Eckert ab747fe0fb mwan3: remove lock file entirely
Removing the lock file ist not necessary

Signed-off-by: Florian Eckert <fe@dev.tdt.de>
2020-07-28 06:53:24 +02:00
Florian Eckert b5bd6d757b mwan3: revert: also cleanup lock on mwan3 stop
This reverts commit cde2a77ed3.

Applying this change has shown that it is even quicker to provoke the
race condtition on simultan mwan3 commands execution.
By reversing the change we have the same behaviour as before.

But the race condition on mwan3 execute at the same time still exists.

Signed-off-by: Florian Eckert <fe@dev.tdt.de>
2020-07-28 06:53:24 +02:00
Florian Eckert 2dac1bcdc9 mwan3: fix race condition on mwan3 restart
This adjustment of the locks fixes the race condition when a mwan3
hotplug script and a mwan3 command are running at the same time.

Signed-off-by: Florian Eckert <fe@dev.tdt.de>
2020-07-28 06:53:24 +02:00
Simon Kinane d7507146e8 openvswitch: adds new UCI section ovs_bridge
This new config section in package openvswitch
supports creating a named bridge, and setting
its' OpenFlow controller end-point.

An example config is included in /rom/etc/config/openvswitch

Signed-off-by: Simon Kinane <skinane@fb.com>
2020-07-28 12:46:17 +08:00
peter-stadler 9cdc4a47f0 nginx: remove PROVIDES on depending package
Fix recursive dependency for `make menuconfig`.

Signed-off-by: Peter Stadler <peter.stadler@student.uibk.ac.at>
2020-07-27 22:56:12 +02:00
Christian Lachner 78d99efb9b haproxy: Update HAProxy to v2.2.1
- New major version (LTS release)
- Update haproxy download URL and hash
- Remove obsolete dladdr1-dependency-patch as it has been upstreamed
- USE_REGPARM is obsolete and therefore removed from our Makefile

Signed-off-by: Christian Lachner <gladiac@gmail.com>
2020-07-27 21:32:08 +02:00
Olivier Poitrey 7de22184e7 nextdns: Update to version 1.7.1
Signed-off-by: Olivier Poitrey <rs@nextdns.io>
2020-07-26 14:42:46 +00:00
Rosen Penev 6d3767075a Merge pull request #12929 from peter-stadler/nginx-always-ssl
nginx: enable ssl for all variants and remove nginx-util w/o ssl
2020-07-26 02:23:40 -07:00
Rosen Penev 6c173164ef Merge pull request #12915 from lucize/frrup
frr: update to 7.4 and latest backports
2020-07-26 02:18:42 -07:00
Peter Stadler 3603f50fd5 nginx: enable ssl for all variants and remove nginx-util w/o ssl
Make the plain nginx version the same as nginx-ssl.
In a further change we will replace nginx by a dummy package,
depending on +nginx-ssl instead. This allows a smooth upgrade.

For nginx-util leave the ssl and the ssl-nopcre versions only.
For nginx-mod-luci remove the duplicate ssl version.
Replace the removed packages by dummies for a smooth upgrade.
The dummy packages will be removed after a transition period.

Additionally, enable the http2 module for nginx-ssl by default
and cleanup the nginx.init file.

Signed-off-by: Peter Stadler <peter.stadler@student.uibk.ac.at>
2020-07-25 17:36:28 +02:00
Rosen Penev 7171b4d498 Merge pull request #12916 from kenkeys/spoofer-v146
spoofer: Update to 1.4.6
2020-07-24 17:54:43 -07:00
Ken Keys 4171636692 spoofer: Update to 1.4.6
Includes a new CA file for compatibility with upcoming change to spoofer
server SSL cert

Signed-off-by: Ken Keys <kkeys@caida.org>
2020-07-24 15:42:36 -07:00
Lucian Cristian 8c0d17cf5d frr: update to 7.4 and latest backports
changelogs: https://github.com/FRRouting/frr/releases/tag/frr-7.4

Signed-off-by: Lucian Cristian <lucian.cristian@gmail.com>
2020-07-24 18:50:07 +03:00
William Fleurant 1d78e7dc31 yggdrasil: Ygg-over-ygg bugfix
Signed-off-by: William Fleurant <meshnet@protonmail.com>
2020-07-23 23:35:18 -04:00
Rosen Penev 7fa266580f zerotier: disable pie support
The Makefile is already patched for it. But PKG_ASLR_PIE still needs
to be disabled.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2020-07-23 13:41:00 -07:00
Rosen Penev 4da82b8569 Merge pull request #12893 from ja-pa/tor-0.4.3.6
tor: update to version 0.4.3.6 (security fix)
2020-07-23 13:15:08 -07:00
Aaron Goodman d134b7ffbb openfortivpn: Only start autostart interfaces on hotplug event
Signed-off-by: Aaron Goodman <aaronjg@stanford.edu>
2020-07-21 22:01:46 -04:00
Rosen Penev 75efd85bf1 Merge pull request #12799 from aaronjg/openfortivpn/netifd
openfortivpn: use standard 'peerdns' config option on netifd script
2020-07-21 18:59:00 -07:00
Daniel Golle 46da3eedc5 gnunet: update to version 0.13.1
Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2020-07-22 02:43:35 +01:00
Jan Pavlinec 3f51a1ee6e tor: update to version 0.4.3.6 (security fix)
Fixes
CVE-2020- 15572

Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
2020-07-21 12:53:57 +02:00
Rosen Penev 567c620bdc Merge pull request #12879 from TDT-AG/pr/20200720-mwan3
mwan3: update to version 2.8.11
2020-07-20 00:36:40 -07:00
Rosen Penev 6fec82d068 Merge pull request #12848 from BKPepe/squid
squid: update to version 4.12 (security update)
2020-07-20 00:35:45 -07:00
Josef Schlehofer 3401e29aa7 squid: update to version 4.12
- Fixes CVEs:

CVE-2019-12519
CVE-2019-12520
CVE-2019-12521
CVE-2019-12523
CVE-2019-12524
CVE-2019-12525
CVE-2019-12526
CVE-2019-12527
CVE-2019-12528
CVE-2019-12529
CVE-2019-12824
CVE-2019-12854
CVE-2019-13345
CVE-2019-18676
CVE-2019-18677
CVE-2019-18678
CVE-2019-18679

CVE-2020-8449
CVE-2020-8450
CVE-2020-11945
CVE-2020-14058
CVE-2020-15049

- Remove patch for cross-compilation
The patch should not be included in the OpenWrt at all without any
commit message/description.
Is not needed and there should be used HOST variables instead of BUILD variables (e.g.
   HOSTCXX)
However, the BUILDCXX is set in Makefile to HOSTCXX

- Renumber glibc patch and refresh it

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
2020-07-20 08:56:50 +02:00
Florian Eckert f601e6cfa4 mwan3: update version to 2.8.11
Signed-off-by: Florian Eckert <fe@dev.tdt.de>
2020-07-20 08:15:50 +02:00
Florian Eckert b0acbf057e mwan3: add online and uptime to detail output
Add also online time value and uptime time value from netifd to the
detail output view.

Signed-off-by: Florian Eckert <fe@dev.tdt.de>
2020-07-20 08:13:34 +02:00
Florian Eckert 058a2b6f30 mwan3: add workaround for procd change
Signed-off-by: Florian Eckert <fe@dev.tdt.de>
2020-07-20 08:12:48 +02:00
Florian Eckert cde2a77ed3 mwan3: also cleanup lock on mwan3 stop
Signed-off-by: Florian Eckert <fe@dev.tdt.de>
2020-07-20 08:12:31 +02:00
Florian Eckert bcd13ba95c mwan3: fix rtmon routing table function generation
If the uci option family is not set in the interface section, then there
is no default value set as in the `config_load / config_get` API.
The problem here is that if the family is not set, the default value ipv4
is normaly assumed. But the comparison fails here because the value is empty
and therefore the dedicated routing table for this interface is not compared
with the other routes from the main table and so not updated.

To fix this set the default value for this config option which is`false`
for enabled and `ipv4` for family.

Signed-off-by: Florian Eckert <fe@dev.tdt.de>
2020-07-20 08:11:20 +02:00
Florian Eckert bcd914e665 Merge pull request #12814 from aaronjg/improvements/mwan3-misc-improvements-rb
mwan3: clean up ipv4/ipv6 duplicated code and misc. improvments
2020-07-20 08:06:39 +02:00
Florian Eckert 8e3e6f8dde mwan3: fix IPv6 routing add handling
This fixes routing handling. Introduced with the last version update.
The following message disappears on the shell
when mwan3 is called with 'mwna3 restart`.

`Error: Invalid gateway address.`

Signed-off-by: Florian Eckert <fe@dev.tdt.de>
[aaronjg@stanford.edu: fully unset variable and handle ipv4 as well]
Signed-off-by: Aaron Goodman <aaronjg@stanford.edu>
2020-07-19 23:24:13 -04:00
Florian Eckert a796b7a84e mwan3: fix idx calculation
Signed-off-by: Florian Eckert <fe@dev.tdt.de>
[aaronjg@stanford.edu: fix syntax error]
Signed-off-by: Aaron Goodman <aaronjg@stanford.edu>
2020-07-19 23:24:13 -04:00
Aaron Goodman ca8bc3d115 mwan3: version bump
Signed-off-by: Aaron Goodman <aaronjg@stanford.edu>
2020-07-19 23:24:13 -04:00
Aaron Goodman 30a46bdc9e mwan3: cleanup duplicate ipv4 and ipv6 logic
Signed-off-by: Aaron Goodman <aaronjg@stanford.edu>
2020-07-19 23:24:13 -04:00
Aaron Goodman 702a104f9c mwan3: don't send iptable setup failures to /dev/null
silencing failing rules makes debugging more difficult

Signed-off-by: Aaron Goodman <aaronjg@stanford.edu>
2020-07-19 23:18:22 -04:00
Aaron Goodman 2a5e9be83e mwan3: add default rule for ipv6 in example config
default rule only applied to ipv4 with dest_ip 0.0.0.0/0
and error was hidden when trying to apply it in ip6table

Signed-off-by: Aaron Goodman <aaronjg@stanford.edu>
2020-07-19 23:18:21 -04:00
Aaron Goodman a0d66d4eeb mwan3: don't try to use ipv6 if not installed
fix issue  #11826

Signed-off-by: Aaron Goodman <aaronjg@stanford.edu>
2020-07-19 23:18:18 -04:00
Aaron Goodman f32ad35870 openfortivpn: use standard 'peerdns' argument on netifd script
Signed-off-by: Aaron Goodman <aaronjg@stanford.edu>
2020-07-19 18:54:48 -04:00
Rosen Penev 04432dc54f Merge pull request #12864 from aaronjg/bugfix/openfortivpn-ping
openfortivpn: add host up test back
2020-07-19 15:35:00 -07:00
Rosen Penev 0daffb9011 Merge pull request #12861 from neheb/api
apinger: fix compilation with GCC 10
2020-07-19 14:44:35 -07:00
Rosen Penev 1af20a26d5 Merge pull request #12860 from neheb/bfdd
bfdd: fix compilation with GCC 10
2020-07-19 01:20:29 -07:00
Rosen Penev 292834d324 Merge pull request #12856 from neheb/fpi
fping: update to 4.3
2020-07-18 23:31:48 -07:00
Aaron Goodman 374ac6817d openfortivpn: add option to use ither curl or ping to test host status
allow use of curl rather than ping to test if a host
is up since a host may not respond to ping, but an
https request is part of the openfortivpn connection,
so this is a more reliable test

also clean up overly verbose logging

Signed-off-by: Aaron Goodman <aaronjg@stanford.edu>
2020-07-18 22:05:13 -04:00
Rosen Penev aaa81d7534 Merge pull request #12854 from neheb/rads
memcached: update to 1.6.6
2020-07-18 14:06:54 -07:00
Andy Walsh 3ba3a0ba4a wsdd2: Uppercase NB_PARM
* Uppercase NB_PARM if mdns option is not set
* filter commented lines

Signed-off-by: Andy Walsh <andy.walsh44+github@gmail.com>
2020-07-18 13:00:22 +02:00