8097 Commits

Author SHA1 Message Date
Rosen Penev 63d125b109 Merge pull request #14107 from neheb/udpx
udpxy: update to 1.0-25.0
2020-12-01 23:40:33 -08:00
Rosen Penev faaef50650 wavemon: update to 1.9.2
Signed-off-by: Rosen Penev <rosenp@gmail.com>
2020-12-01 16:25:32 -08:00
Rosen Penev 664e8a1c9f udpxy: update to 1.0-25.0
Signed-off-by: Rosen Penev <rosenp@gmail.com>
2020-12-01 16:23:23 -08:00
Rosen Penev 8b0457035e pdns-recursor: update to 4.4.1
Signed-off-by: Rosen Penev <rosenp@gmail.com>
2020-12-01 16:17:42 -08:00
Glenn Strauss 82221622af lighttpd: build and bugfix patches
Signed-off-by: Glenn Strauss <gstrauss@gluelogic.com>
2020-12-01 17:40:10 -05:00
Magnus Kroken e4376793b4 openvpn: disable LZO support by default
OpenVPN recommends disabling compression, as it may weaken the security
of the connection. For users who need compression, we build with LZ4
support by default. LZO in OpenVPN pulls in liblzo at approx. 32 kB.

OpenWrt users will no longer be able to connect to OpenVPN peers that
require LZO compression, unless they build the OpenVPN package themselves.

Signed-off-by: Magnus Kroken <mkroken@gmail.com>
2020-12-01 13:04:38 -08:00
Magnus Kroken 2e55fc8b2d openvpn: update to 2.5.0
New features:
* Per client tls-crypt keys
* ChaCha20-Poly1305 can be used to encrypt the data channel
* Routes are added/removed via Netlink instead of ifconfig/route
  (unless iproute2 support is enabled).
* VLAN support when using a TAP device

Significant changes:
* Server support can no longer be disabled.
* Crypto support can no longer be disabled, remove nossl variant.
* Blowfish (BF-CBC) is no longer implicitly the default cipher.
  OpenVPN peers prior to 2.4, or peers with data cipher negotiation
  disabled, will not be able to connect to a 2.5 peer unless
  option data_fallback_ciphers is set on the 2.5 peer and it contains a
  cipher supported by the client.

Signed-off-by: Magnus Kroken <mkroken@gmail.com>
2020-12-01 13:03:51 -08:00
Rosen Penev 4434915571 openvpn: import from base
Signed-off-by: Rosen Penev <rosenp@gmail.com>
2020-12-01 12:37:37 -08:00
Rosen Penev 0e77d0264e openvpn-easy-rsa: import from base
Signed-off-by: Rosen Penev <rosenp@gmail.com>
2020-12-01 12:37:37 -08:00
Moritz Warning f49a871c36 zerotier: update to 1.6.2
Signed-off-by: Moritz Warning <moritzwarning@web.de>
2020-12-01 12:39:48 +01:00
Rosen Penev e5a526e516 Merge pull request #13971 from mwarning/zerotier
zerotier: update to 1.6.1
2020-11-30 13:40:05 -08:00
Rosen Penev caf8cbb2e7 Merge pull request #13800 from gstrauss/for-lighttpd-1.4.56
lighttpd: revamp Makefile for lighttpd 1.4.56
2020-11-30 13:20:03 -08:00
Rosen Penev cc88432847 Merge pull request #14057 from newkit/master
wifischedule: Merged ignore_stations patch from user bedaes https://g…
2020-11-30 13:15:49 -08:00
Stijn Tintel 5f0918281b strongswan: bump to 5.9.1
Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
2020-11-30 19:02:57 +02:00
Glenn Strauss fa1464c3b9 lighttpd: update to lighttpd 1.4.56 release hash
Signed-off-by: Glenn Strauss <gstrauss@gluelogic.com>
2020-11-30 09:27:28 -05:00
Glenn Strauss 59ae734bed lighttpd: lighttpd.conf enable flag for HTTP/2
lighttpd.conf reference server.feature-flags

Signed-off-by: Glenn Strauss <gstrauss@gluelogic.com>
2020-11-30 09:27:28 -05:00
Glenn Strauss 5a374b6a5a lighttpd: lighttpd.init reload gracefully
reload_server() gracefully with SIGUSR1 to lighttpd
relog() to reopen log files with SIGHUP to lighttpd

Signed-off-by: Glenn Strauss <gstrauss@gluelogic.com>
2020-11-30 09:27:28 -05:00
Glenn Strauss 5fb8d5f463 lighttpd: revamp Makefile for lighttpd-1.4.56
* update upstream version to lighttpd-1.4.56
* depend on Nettle for MD5, SHA1, SHA256
* multiple TLS options: gnutls, mbedtls, nss, openssl, wolfssl
* new module mod_authn_dbi
* mod_authn_* depend on mod_auth
* mod_authn_file is included if mod_auth is selected in build
* mod_vhostdb_* depend on mod_vhostdb
* mod_deflate subsumes mod_compress
* remove from Makefile the include of nls.mk (no longer needed)

Signed-off-by: Glenn Strauss <gstrauss@gluelogic.com>
2020-11-30 09:27:28 -05:00
Glenn Strauss 3ae0d9df1f lighttpd: remove patches incorporated upstream
Signed-off-by: Glenn Strauss <gstrauss@gluelogic.com>
2020-11-30 09:27:28 -05:00
Huangbin Zhan cc895b6a54 frp: update to 0.34.3
Signed-off-by: Huangbin Zhan <zhanhb88@gmail.com>
2020-11-30 20:16:44 +08:00
Moritz Warning 252b0a60d1 zerotier: update to 1.6.1
Signed-off-by: Moritz Warning <moritzwarning@web.de>
2020-11-30 13:11:00 +01:00
Nils Koenig 36ce3ffbf1 wifischedule: Merged ignore_stations patch from user bedaes https://github.com/newkit/wifischedule/pull/2
Signed-off-by: Nils Koenig <openwrt@newk.it>
2020-11-30 10:05:27 +01:00
Rosen Penev 3010ef22fa Merge pull request #14032 from ptpt52/p910nd-fix
p910nd: config trigger reload and default disabled
2020-11-30 00:32:19 -08:00
Nicholas Smith e13d36fa8b modemmanager: bump to 1.14.8
Signed-off-by: Nicholas Smith <nicholas.smith@telcoantennas.com.au>
2020-11-30 10:35:42 +10:00
Dirk Brenken 4fad6e2dc1 Merge pull request #14065 from dibdot/adblock
adblock: reporting fixes/tweaks
2020-11-29 13:45:27 +01:00
Rosen Penev 6f2dc12f44 Merge pull request #14066 from brvphoenix/ariang
ariang: add title and shortcut icons
2020-11-29 04:29:29 -08:00
Rosen Penev 75ddca2962 xtables-addons: fix package installation
Install directory is missing.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2020-11-29 01:37:00 -08:00
Van Waholtz 4916fbd125 ariang: add title and shortcut icons
Signed-off-by: Van Waholtz <vanwaholtz@gmail.com>
2020-11-29 00:31:14 -08:00
Dirk Brenken 6e90c8fa53 adblock: reporting fixes/tweaks
* prevents the creation of an invalid json structure
* add more space to the domain column on cli

Signed-off-by: Dirk Brenken <dev@brenken.org>
2020-11-29 08:46:28 +01:00
Peter Stadler f62599d27e nginx-util: use UCI for server configuration
**tl;dr:** The functions `{add,del}_ssl` modify a server
section of the UCI config if there is no `.conf` file with
the same name in `/etc/nginx/conf.d/`.

Then `init_lan` creates `/var/lib/nginx/uci.conf` files by
copying the `/etc/nginx/uci.conf.template` and standard
options from the UCI config; additionally the special path
`logd` can be used in `{access,error}_log`.

The init does not change the configuration beside
re-creating self-signed certificates when needed. This is
also the only purpose of the new `check_ssl`, which is
installed as yearly cron job.

**Initialization:**

Invoking `nginx-util init_lan` parses the UCI configuration
for package `nginx`. It creates a server part in
`/var/lib/nginx/uci.conf` for each `section server '$name'`
by copying all UCI options but the following:

* `option uci_manage_ssl` is skipped. It is set to
'self-signed' by `nginx-util add_ssl $name`, removed by
`nginx-util del_ssl $name` and used by
`nginx-util check_ssl` (see below).

* `logd` as path in `error_log` or `access_log` writes them
to STDERR respective STDOUT, which are fowarded by Nginx's
init to the log daemon. Specifically:
`option error_log 'logd'` becomes `error_log stderr;` and
`option access_log 'logd openwrt'` becomes
`access_log /proc/self/fd/1 openwrt;`

Other `[option|list] key 'value'` entries just become
`key value;` directives.

The init.d calls internally also `check_ssl` for rebuilding
self-signed SSL certificates if needed (see below). And it
still sets up `/var/lib/nginx/lan{,_ssl}.listen` files as
it is doing in the current version (so they stay available).

**Defaults:**

The package installs the file `/etc/nginx/restrict_locally`
containing allow/deny directives for restricting the access
to LAN addresses by including it into a server part. The
default server '_lan' includes this file and listens on all
IPs (instead of only the local IPs as it did before; other
servers do not need to listen explicitly on the local IPs
anymore). The default server is contained together with a
server that redirects HTTP requests for inexistent URLs to
HTTPS in the UCI configuration file `/etc/config/nginx`.
Furthermore, the packages installs a
`/etc/nginx/uci.conf.template` containing the current setup
and a marker, which will be replaced by the created UCI
servers when calling `init_lan`.

**Other:**

If there is a file named `/etc/nginx/conf.d/$name.conf` the
functions `init_lan`, `add_ssl $name` and `del_ssl $name`
will use that file instead of a UCI server section (this is
similar to the current version).

Else it selects the UCI `section server $name`, or, when
there is no such section, it searches for the first one
having `option server_name '… $name …'`. For this section:

* `nginx-util add_ssl $name` will add to it:
`option uci_manage_ssl 'self-signed'`
`option ssl_certificate '/etc/nginx/conf.d/$name.crt'`
`option ssl_certificate_key '/etc/nginx/conf.d/$name.key'`
`option ssl_session_cache 'shared:SSL:32k'`
`option ssl_session_timeout '64m'`
If these options are already present, they will stay the
same; just the first option `uci_manage_ssl` will always be
changed to 'self-signed'. The command also changes all
`listen` list items to use port 443 and ssl instead of port
80 (without ssl). If they stated another port than 80
before, they are kept the same. Furthermore, it creates a
self-signed SSL certificate if necessary, i.e., if there is
no *valid* certificate and key at the locations given by
the options `ssl_certificate` and `ssl_certificate_key`.

* `nginx-util del_ssl $name` checks if `uci_manage_ssl` is
set 'self-signed' in the corresponding UCI section. Only
then it removes all of the above options regardless of the
value looking just at the key name. Then, it also changes
all `listen` list items to use port 80 (without ssl)
instead of port 443 with ssl. If stating another port than
443, they are kept the same. Furthermore, it removes the
SSL certificate and key that were indicated by
`ssl_certificate{,_key}`.

* `nginx-util check_ssl` looks through all server sections
of the UCI config for `uci_manage_ssl 'self-signed'`. On
every hit it checks if the SSL certificate-key-pair
indicated by the options `ssl_certificate{,_key}` is
expired. Then it re-creates a self-signed certificate.
If there exists at least one `section server` with
`uci_manage_ssl 'self-signed'`, it will try to install
itself as cron job. If there are no such sections, it
removes that cron job if possible.

For installing a ssl certificate and key managed by
another app, you can call:
`nginx-util add_ssl $name $manager $crtpath $keypath`
Hereby `$name` is as above, `$manager` is an arbitrary
string, and the the ssl certificate and its key are
indicated by their absolute path. If you want to remove
the directives again, then you can use:
`nginx-util del_ssl $name $manager`

Signed-off-by: Peter Stadler <peter.stadler@student.uibk.ac.at>
2020-11-28 18:34:39 +01:00
Florian Eckert 733e6508f3 ddns-scripts: add gandi.net provider
Signed-off-by: Florian Eckert <fe@dev.tdt.de>
2020-11-28 11:07:14 +01:00
Oleg Derevenetz 9cf0efc4f6 bwping: update to version 2.2
Signed-off-by: Oleg Derevenetz <oleg-derevenetz@yandex.ru>
2020-11-27 23:12:14 +03:00
Dirk Brenken 84f20951b3 travelmate: fix possible race condition
* prevent possible duplicate script execution due to
  multiple ntp events in parallel

Signed-off-by: Dirk Brenken <dev@brenken.org>
2020-11-26 22:39:15 +01:00
Rosen Penev 6dc567270e Merge pull request #14031 from ptpt52/ext_ip_reserved_ignore
net/miniupnpd: ext_ip_reserved_ignore support
2020-11-26 10:28:23 -08:00
Chen Minqiang b76aa99194 net/miniupnpd: ext_ip_reserved_ignore support
This add an option to ignore ext_ip reserved
Enable this option in config by default.

Fixes: #13773

Signed-off-by: Chen Minqiang <ptpt52@gmail.com>
2020-11-26 15:56:20 +08:00
Chen Minqiang 44410b7350 p910nd: config trigger reload and default disabled
Signed-off-by: Chen Minqiang <ptpt52@gmail.com>
2020-11-26 15:47:07 +08:00
DENG Qingfang 2f68b75a67 curl: fix build against OpenSSL
Ref: https://curl.se/mail/lib-2020-10/0037.html
Signed-off-by: DENG Qingfang <dengqf6@mail2.sysu.edu.cn>
2020-11-26 14:47:55 +08:00
Philip Prindeville 9781ef95cb xtables-addons: include xt_geoip_fetch utility
It's useful to be able to dump sections of the database by country
for scripting or just plain sanity checking.

Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2020-11-25 17:45:28 -07:00
Rosen Penev 925275cad2 Merge pull request #13377 from micmac1/apa-faker
apache: use fakeroot instead of postinst script
2020-11-25 15:05:52 -08:00
Rosen Penev 7c491c37be Merge pull request #13960 from neheb/miniu
miniupnpd: update to 2.2.0
2020-11-25 14:28:51 -08:00
Rosen Penev e0b388b078 Merge pull request #13926 from ja-pa/tor-0.4.4.6
tor: update to version 0.4.4.6 (security fix)
2020-11-25 14:27:57 -08:00
Rosen Penev 1fc7e49adc Merge pull request #13990 from neheb/mtr
mtr: update to 0.94
2020-11-25 14:22:29 -08:00
Marco Martins 773b87977e miniupnpd: Added chain rule to filter table so udp stun incoming connections rules works
Signed-off-by: Marco Martins <marcomartins86@gmail.com>
2020-11-25 14:12:18 -08:00
Rosen Penev 4d824243e6 miniupnpd: update to 2.2.0
Replace daemon patch with upstream solution.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2020-11-25 14:10:41 -08:00
Rosen Penev e9a695b3b5 mtr: update to 0.94
Switch to normal HTTP mirron.

Don't use jansson.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2020-11-24 22:43:14 -08:00
Rosen Penev 613688a555 curl: update to 7.73.0
Remove upstream patch.

Refresh other one.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2020-11-24 22:30:29 -08:00
Dobroslaw Kijowski 0d3176abe0 adguardhome: upstream upgrade to v0.104.1
* Full changelog available at:
  * https://github.com/AdguardTeam/AdGuardHome/releases/tag/v0.104.0
  * https://github.com/AdguardTeam/AdGuardHome/releases/tag/v0.104.1

* Change path to packr resources as some of source files were moved.

Signed-off-by: Dobroslaw Kijowski <dobo90@gmail.com>
2020-11-24 21:24:47 +02:00
Rosen Penev e6f2cd7950 Merge pull request #13989 from neheb/ola3
ola: update to 0.10.8
2020-11-24 00:48:16 -08:00
Rosen Penev ddfda41b70 ola: update to 0.10.8
Removed upstreamed patches.

Refreshed other ones.

Removed Makefile hacks.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2020-11-23 19:31:35 -08:00
Olivier Poitrey 3e27b2c181 nextdns: Update to version 1.9.4
Signed-off-by: Olivier Poitrey <rs@nextdns.io>
2020-11-23 22:15:05 +00:00