Commit Graph

6004 Commits

Author SHA1 Message Date
Alexey Dobrovolsky 066ac03921 freeradius3: enable radtest utility
radtest utility is used in many manuals to check the operation of
radius server.

At the moment all parameters must be specified at startup, for example:

$ radtest bob hello localhost 0 testing123 0 localhost

(backported from commit 6480acd)
Signed-off-by: Alexey Dobrovolsky <dobrovolskiy.alexey@gmail.com>
2020-09-14 00:32:08 +03:00
Andy Walsh 338fa663ca samba4: update to 4.11.12
* update to 4.11.12
* fix optional modules not included on module build (vfs_btrfs, vfs_linux_xfs_sgid)

Signed-off-by: Andy Walsh <andy.walsh44+github@gmail.com>
2020-09-13 18:22:21 +02:00
Olivier Poitrey 62171036b2 nextdns: Update to version 1.8.3
Signed-off-by: Olivier Poitrey <rs@nextdns.io>
2020-09-10 17:25:37 +00:00
Olivier Poitrey a2634c2646 nextdns: Update to version 1.8.2
Signed-off-by: Olivier Poitrey <rs@nextdns.io>
2020-09-08 10:33:53 +00:00
Eric Luehrsen 54847cc7c1 unbound: improve odhcpd rapid update robustness
cherry-pick: bce5f44f5af6510db484389b8cc0636f6de08877
Signed-off-by: Eric Luehrsen <ericluehrsen@gmail.com>
2020-09-05 10:19:38 -04:00
Jan Hak 8b0457c55e knot: update to version 2.9.6
Signed-off-by: Jan Hak <jan.hak@nic.cz>
(cherry picked from commit 60a35cd1c6)
2020-09-02 13:27:44 +02:00
Jan Pavlinec f2edf8c537 git: update to version 2.26.2 (security fix)
Fixes CVE-2020-11008

Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
2020-09-01 14:09:32 +02:00
Jan Pavlinec 3c6b45ab38 clamav: update to version 0.102.4 (security fix)
Fixes
CVE-2020-3481

Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
(cherry picked from commit 5d7164aaba)
2020-08-24 13:28:58 +02:00
Jan Pavlinec 0202fdc277 clamav: update to version 0.102.3 (security fix)
Fixes:
CVE-2020-3341
CVE-2020-3327

Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
(cherry picked from commit 168efe753d)
2020-08-24 13:28:40 +02:00
Lucian Cristian c5c0e2e337 clamav: update to 0.102.2
Signed-off-by: Lucian Cristian <lucian.cristian@gmail.com>
(cherry picked from commit 24eeea366d)
2020-08-24 13:27:55 +02:00
Noah Meyerhans 9700cea704 bind: New upstream version 9.16.6
Several security issures are addressed:

 - CVE-2020-8620 It was possible to trigger an assertion failure by sending
   a specially crafted large TCP DNS message.
 - CVE-2020-8621 named could crash after failing an assertion check in
   certain query resolution scenarios where QNAME minimization and
   forwarding were both enabled. To prevent such crashes, QNAME minimization is
   now always disabled for a given query resolution process, if forwarders are
   used at any point.
 - CVE-2020-8622 It was possible to trigger an assertion failure when
   verifying the response to a TSIG-signed request.
 - CVE-2020-8623 When BIND 9 was compiled with native PKCS#11 support, it
   was possible to trigger an assertion failure in code determining the
   number of bits in the PKCS#11 RSA public key with a specially crafted
   packet.
 - CVE-2020-8624 update-policy rules of type subdomain were incorrectly
   treated as zonesub rules, which allowed keys used in subdomain rules to
   update names outside of the specified subdomains. The problem was fixed by
   making sure subdomain rules are again processed as described in the ARM.

Full release notes are available at
https://ftp.isc.org/isc/bind9/9.16.6/doc/arm/html/notes.html#notes-for-bind-9-16-6

Signed-off-by: Noah Meyerhans <frodo@morgul.net>
(cherry picked from commit cf61f7f8ef)
2020-08-24 10:33:04 +02:00
Tiago Gaspar 256a631d9c bind: update to 9.16.4
This update fixes the following CVE's:
- CVE-2020-8618
- CVE-2020-8619

More info on bug fixes and feature changes in:
https://downloads.isc.org/isc/bind9/9.16.4/doc/arm/html/notes.html

Signed-off-by: Tiago Gaspar <tiagogaspar8@gmail.com>
(cherry picked from commit b8f8af8a30)
2020-08-24 10:32:59 +02:00
Stan Grishin ac79fde24b simple-adblock: bugfix: update config; use command -v
Signed-off-by: Stan Grishin <stangri@melmac.net>
2020-08-21 23:29:18 +00:00
Karl Palsson 9ec9bea25b net/mosquitto: Update to 1.6.12
Security release.  From the changelog:

- In some circumstances, Mosquitto could leak memory when handling PUBLISH
  messages. This is limited to incoming QoS 2 messages, and is related
  to the combination of the broker having persistence enabled, a clean
  session=false client, which was connected prior to the broker restarting,
  then has reconnected and has now sent messages at a sufficiently high rate
  that the incoming queue at the broker has filled up and hence messages are
  being dropped. This is more likely to have an effect where
  max_queued_messages is a small value. This has now been fixed. Closes
  https://github.com/eclipse/mosquitto/issues/1793

Changelog: https://mosquitto.org/blog/2020/08/version-1-6-12-released/

Signed-off-by: Karl Palsson <karlp@etactica.com>
2020-08-19 15:29:30 +00:00
Matthias Schiffer 59d39c09d8 openvswitch: backport patch to fix build against kernel 4.14.193
Signed-off-by: Matthias Schiffer <mschiffer@universe-factory.net>
2020-08-15 09:20:04 +08:00
Dirk Brenken 03e8f0e0c5 adblock: refresh blocklist sources
* remove 'dshield' and 'sysctl' (discontinued)
* switch 'malwaredomains', 'shallalist' and 'winhelp' to https
* add a second regional list for poland (provided by matx1002)
* update readme

Signed-off-by: Dirk Brenken <dev@brenken.org>

Signed-off-by: Dirk Brenken <dev@brenken.org>
(cherry picked from commit 5ba498f7c8)
2020-08-14 19:53:12 +02:00
Karl Palsson 58e39c4b25 mosquitto: update to 1.6.11
Full release notes: https://mosquitto.org/blog/2020/08/version-1-6-11-released/

Variety of generally minor bugfixes, mostly in the broker.

Signed-off-by: Karl Palsson <karlp@etactica.com>
2020-08-12 14:01:39 +00:00
Hannu Nyman f91521f756 nlbwmon: add hotplug script to reload after interface ifup
Add a hotplug script to reload nlbwmon's config after interface
ifup actions.

That should improve the detection of the IPv6 LAN address
that can get enabled a bit later in the boot process.

Signed-off-by: Hannu Nyman <hannu.nyman@iki.fi>
(cherry picked from commit 25dfa20780)
2020-08-09 19:43:59 +03:00
Hannu Nyman b6185d4026 nlbwmon: add conffiles
Signed-off-by: Huangbin Zhan <zhanhb88@gmail.com>

Adapted from treewide commit 0ec746ccb6 for just nlbwmon.

Signed-off-by: Hannu Nyman <hannu.nyman@iki.fi>
2020-08-09 19:42:37 +03:00
Rosen Penev e6cad65f09 Merge pull request #13054 from micmac1/apa2446-19.07
[19.07] apache: security bump to 2.4.46
2020-08-08 12:42:02 -07:00
Rosen Penev 92aff96a2f Merge pull request #13056 from odmdas/odmdas-freeradius3-Makefile-19.07
[19.07] freeradius3: add missing conffiles to Makefile
2020-08-08 12:40:46 -07:00
Alexey Dobrovolsky 3fb559e8b0 freeradius3: add missing conffiles to Makefile
Config files
/etc/freeradius3/policy.d/accounting
/etc/freeradius3/policy.d/filter
/etc/freeradius3/proxy.conf
/etc/freeradius3/sites-available/default
and link
/etc/freeradius3/sites-enabled/default
are in the freeradius3 package and are mentioned in the main config file
/etc/freeradius3/radiusd.conf
Thus, they must be explicitly specified in the Makefile.

File
/etc/freeradius3/sites/default
is not included in the package, is not created during installation,
is not mentioned in the main config file and should therefore be excluded
from the Makefile.

Signed-off-by: Alexey Dobrovolsky <dobrovolskiy.alexey@gmail.com>
(cherry picked from commit f6974b8f3c)
2020-08-08 18:51:24 +03:00
Sebastian Kemper f5a57e42ca apache: security bump to 2.4.46
From CHANGES_2.4:

SECURITY: CVE-2020-11984 (cve.mitre.org)
  mod_proxy_uwsgi: Malicious request may result in information disclosure
  or RCE of existing file on the server running under a malicious process
  environment. [Yann Ylavic]

SECURITY: CVE-2020-11993 (cve.mitre.org)
  mod_http2: when throttling connection requests, log statements
  where possibly made that result in concurrent, unsafe use of
  a memory pool. [Stefan Eissing]

SECURITY:
  mod_http2: a specially crafted value for the 'Cache-Digest' header
  request would result in a crash when the server actually tries
  to HTTP/2 PUSH a resource afterwards.
  [Stefan Eissing, Eric Covener, Christophe Jaillet]

Signed-off-by: Sebastian Kemper <sebastian_ml@gmx.net>
2020-08-08 16:19:45 +02:00
Sebastian Kemper 61f3bd507c apache/apr/apr-util: remove maintainer
Signed-off-by: Sebastian Kemper <sebastian_ml@gmx.net>
2020-08-08 16:19:34 +02:00
Sebastian Kemper 234fe24e48 apache: revisit suEXEC setup
When adding suEXEC to the apache package, Alpine's package [1] served as
a template. Not enough attention was paid to the details.

Alpine uses a different layout. So for OpenWrt to use /var/www as
DocumentRoot does not make sense. /var is also volatile on OpenWrt. This
commit removes the configure argument. The default is htdocsdir.

This also does away with uidmin/gidmin 99. The default is 100, which is
fine.

Finally, the suexec binary is moved from /usr/sbin to
/usr/lib/apache2/suexec_dir. Upstream recommends installing suexec with
"4750" (see [2]) and the group set to the user's group. While that would
be possible, it would cause a few headaches on OpenWrt. The group would
need to be changed first in a post-install script and a call to chmod
would need to be made afterward, to make the binary SUID again.

It's easier to hide the SUID binary away from others in a directory.
This way we don't need to use chmod in the post-install script.

[1] https://github.com/alpinelinux/aports/tree/master/main/apache2
[2] https://httpd.apache.org/docs/2.4/suexec.html

Signed-off-by: Sebastian Kemper <sebastian_ml@gmx.net>
2020-08-08 16:19:22 +02:00
Sebastian Kemper d5096a76f5 apache: create log directory o=
Hides away the contents of the log directory from others.

Signed-off-by: Sebastian Kemper <sebastian_ml@gmx.net>
2020-08-08 16:19:10 +02:00
Eric Luehrsen 47288133f0 unbound: update to 1.11.0
Signed-off-by: Eric Luehrsen <ericluehrsen@gmail.com>
2020-08-07 01:10:27 -04:00
Eric Luehrsen d00237135d unbound: improve startup and dhcp script robustness
- prevent rapid overlap in DHCP script updates
- check and allow localhost forwards with specific applications
- add option for rate limiting inbound queries
- change UCI list to table format with Unbound conf references

Signed-off-by: Eric Luehrsen <ericluehrsen@gmail.com>
2020-08-07 01:10:26 -04:00
Eric Luehrsen f73ed87a12 unbound: add dns assistants on local host
Signed-off-by: Eric Luehrsen <ericluehrsen@gmail.com>
2020-08-07 01:08:36 -04:00
Jan Pavlinec d4be5de1c6 tor-hs: add new package
Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
(cherry picked from commit 5906bfecd5)
2020-08-06 13:43:15 +02:00
Karl Palsson cd2de9dc51 net/pagekitec: Update to v0.91.200718
This fixes misleading errors in the status file, and increases buffer
sizes to match the python implementation.

Signed-off-by: Karl Palsson <karlp@etactica.com>
2020-08-05 16:34:24 +00:00
Stan Grishin d7b38d736d simple-adblock: README and config update
Signed-off-by: Stan Grishin <stangri@melmac.net>
2020-08-04 22:50:49 +00:00
Rosen Penev 9f9152e3e7 Merge pull request #13006 from ja-pa/tor-backport-conf
[OpenWrt 19.07] tor: backport uci config
2020-08-03 15:59:08 -07:00
Rosen Penev 0d8f39a36b tor: fix init scripts
pidfile should not be set. tor handles it.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2020-08-03 11:45:03 +02:00
Jan Pavlinec a21ffc8eb9 tor: update init script
Changes:
-add uci config
-create pid file by procd
-add reload function

Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
2020-08-03 11:43:12 +02:00
Liangbin Lian 30f5119a4f netatalk: fix compile error in mac os
fix compile error in mac os when dtrace installed.

Signed-off-by: Liangbin Lian <jjm2473@gmail.com>
2020-08-03 12:28:36 +03:00
Florian Eckert b32500958b mwan3: update version to 2.8.12
Signed-off-by: Florian Eckert <fe@dev.tdt.de>
(cherry picked from commit 85e91377cf)
2020-07-28 07:24:58 +02:00
Florian Eckert 5f934c6678 mwan3: unify variable check
Signed-off-by: Florian Eckert <fe@dev.tdt.de>
(cherry picked from commit 981d1eb83a)
2020-07-28 07:24:49 +02:00
Florian Eckert 138d02cfcb mwan3: remove lock file entirely
Removing the lock file ist not necessary

Signed-off-by: Florian Eckert <fe@dev.tdt.de>
(cherry picked from commit ab747fe0fb)
2020-07-28 07:24:41 +02:00
Florian Eckert 520eeb0804 mwan3: revert: also cleanup lock on mwan3 stop
This reverts commit cde2a77ed3.

Applying this change has shown that it is even quicker to provoke the
race condtition on simultan mwan3 commands execution.
By reversing the change we have the same behaviour as before.

But the race condition on mwan3 execute at the same time still exists.

Signed-off-by: Florian Eckert <fe@dev.tdt.de>
(cherry picked from commit b5bd6d757b)
2020-07-28 07:24:32 +02:00
Florian Eckert 294e7503b5 mwan3: fix race condition on mwan3 restart
This adjustment of the locks fixes the race condition when a mwan3
hotplug script and a mwan3 command are running at the same time.

Signed-off-by: Florian Eckert <fe@dev.tdt.de>
(cherry picked from commit 2dac1bcdc9)
2020-07-28 07:24:12 +02:00
Florian Eckert 5bfc1c9cfd mwan3: update version to 2.8.11
Signed-off-by: Florian Eckert <fe@dev.tdt.de>
(cherry picked from commit f601e6cfa4)
2020-07-27 12:20:46 +02:00
Florian Eckert e02cac8152 mwan3: add online and uptime to detail output
Add also online time value and uptime time value from netifd to the
detail output view.

Signed-off-by: Florian Eckert <fe@dev.tdt.de>
(cherry picked from commit b0acbf057e)
2020-07-27 12:20:37 +02:00
Florian Eckert 538d2fd7c3 mwan3: add workaround for procd change
Signed-off-by: Florian Eckert <fe@dev.tdt.de>
(cherry picked from commit 058a2b6f30)
2020-07-27 12:20:27 +02:00
Florian Eckert b340df6824 mwan3: also cleanup lock on mwan3 stop
Signed-off-by: Florian Eckert <fe@dev.tdt.de>
(cherry picked from commit cde2a77ed3)
2020-07-27 12:19:59 +02:00
Florian Eckert b5ed0033c8 mwan3: fix rtmon routing table function generation
If the uci option family is not set in the interface section, then there
is no default value set as in the `config_load / config_get` API.
The problem here is that if the family is not set, the default value ipv4
is normaly assumed. But the comparison fails here because the value is empty
and therefore the dedicated routing table for this interface is not compared
with the other routes from the main table and so not updated.

To fix this set the default value for this config option which is`false`
for enabled and `ipv4` for family.

Signed-off-by: Florian Eckert <fe@dev.tdt.de>
(cherry picked from commit bcd13ba95c)
2020-07-27 12:19:50 +02:00
Florian Eckert 2c89e14c31 mwan3: fix IPv6 routing add handling
This fixes routing handling. Introduced with the last version update.
The following message disappears on the shell
when mwan3 is called with 'mwna3 restart`.

`Error: Invalid gateway address.`

Signed-off-by: Florian Eckert <fe@dev.tdt.de>
[aaronjg@stanford.edu: fully unset variable and handle ipv4 as well]
Signed-off-by: Aaron Goodman <aaronjg@stanford.edu>
(cherry picked from commit 8e3e6f8dde)
2020-07-27 12:19:41 +02:00
Florian Eckert 447d51edbf mwan3: fix idx calculation
Signed-off-by: Florian Eckert <fe@dev.tdt.de>
[aaronjg@stanford.edu: fix syntax error]
Signed-off-by: Aaron Goodman <aaronjg@stanford.edu>
(cherry picked from commit a796b7a84e)
2020-07-27 12:19:32 +02:00
Aaron Goodman 37e2f88208 mwan3: version bump
Signed-off-by: Aaron Goodman <aaronjg@stanford.edu>
(cherry picked from commit ca8bc3d115)
2020-07-27 12:19:21 +02:00
Aaron Goodman b9e3461250 mwan3: cleanup duplicate ipv4 and ipv6 logic
Signed-off-by: Aaron Goodman <aaronjg@stanford.edu>
(cherry picked from commit 30a46bdc9e)
2020-07-27 12:19:12 +02:00