Commit Graph

17191 Commits

Author SHA1 Message Date
Stéphane Pautrel
0df914ef30 lang: Update French translation
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-10-22 10:40:46 +00:00
Michael Tremer
9a93f07dae Run "./make.sh lang"
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-10-22 10:40:35 +00:00
Michael Tremer
dbd455ef93 make.sh: Rewrite uploadsrc with rsync
Instead of having a very dodgy diff of filelists, this rsync call does
everything automatically and only requires authentication once.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-10-22 10:36:46 +00:00
Adolf Belka
65710b528a pcengines-apu-firmware: Update to version 4.14.0.4
- Update from 4.14.0.2 to 4.14.0.4
- Update of rootfile
- Changelog
   v4.14.0.4 Release date: 2021-09-17
    Changed:
        Rebased with official coreboot repository commit d9f5d90
        Enabled EHCI controller by default on apu3-apu6 platforms
        Updated sortbootorder to v4.6.22
    Added:
        Safeguard against setting watchdog timeout too low
    Known issues:
        apuled driver doesn't work in FreeBSD. Check the GPIOs document for workaround.
        Some PCIe cards are not detected on certain OSes and/or in certain mPCIe slots.
         Check the mPCIe modules document for solution/workaround.
        Booting with 2 USB 3.x sticks plugged in apu4 sometimes results in detecting
         only 1 stick
        Certain USB 3.x sticks happen to not appear in boot menu
        Booting Xen is unstable
   v4.14.0.3 Release date: 2021-08-06
    Changed:
        Rebased with official coreboot repository commit c049c80

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-10-22 10:25:15 +00:00
Arne Fitzenreiter
f85e3493ac core161: add ca-certificates
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-10-22 10:23:41 +00:00
Peter Müller
82c53ef9df update ca-certificates CA bundle
Update the CA certificates list to what Mozilla NSS ships currently.

The original file can be retrieved from:
https://hg.mozilla.org/mozilla-central/raw-file/tip/security/nss/lib/ckfw/builtins/certdata.txt

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-10-22 10:22:16 +00:00
Peter Müller
76f36a621d Tor: Bump package version
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-10-22 10:21:19 +00:00
Peter Müller
91aa257ed7 Tor: Do not try to support IPv6 for Directory and OR ports
We currently don't have IPv6 in vanilla IPFire 2.x installations, hence
there is no sense in letting Tor finding out IPv6 connectivity.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-10-22 10:21:04 +00:00
Peter Müller
fb4e1d53a0 Tor: Use crypto hardware acceleration if available
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-10-22 10:20:52 +00:00
Peter Müller
0b6a2e761b Tor: Enable syscall sandbox
This makes post-exploitation activities harder, in case the local Tor
instance has been compromised. It is worth noticing that Tor won't
respond to a "GETINFO address" command on the control port if sandboxed,
but our CGI does not make use of it, and neither is any legitimate
service on IPFire doing so.

Tested on a small middle relay running on an IPFire machine.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-10-22 10:20:37 +00:00
Adolf Belka
0e0c1a8aec krb5: Update to version 1.19.2
- Update from 1.19.1 to 1.19.2
- Update of rootfile not required
- Changelog
   Major changes in 1.19.2 (2021-07-22)
    This is a bug fix release.
      * Fix a denial of service attack against the KDC encrypted challenge
        code [CVE-2021-36222].
      * Fix a memory leak when gss_inquire_cred() is called without a
        credential handle.
    krb5-1.19.2 changes by ticket ID
      8989    Fix typo in enctypes.rst
      8992    Avoid rand() in aes-gen test program
      9005    Fix argument type errors on Windows
      9006    doc build fails with Sphinx 4.0.2
      9007    Fix KDC null deref on bad encrypted challenge
      9014    Using locking in MEMORY krb5_cc_get_principal()
      9015    Fix use-after-free during krad remote_shutdown()
      9016    Memory leak in krb5_gss_inquire_cred

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-10-22 10:18:30 +00:00
Adolf Belka
4bd07ee400 7zip: Update to version 17.04
- Update from 17.03 to 17.04
- Update rootfile
- Changelog
   Version 17.04
     - add lzip decompress
     - update zstd 1.4.9

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-10-22 10:18:09 +00:00
Arne Fitzenreiter
8c943731b1 core161: add exfatprogs
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-10-22 10:16:23 +00:00
Adolf Belka
574690dc00 exfatprogs: Provide package to work with exfat formats
- Create lfs and rootfile
- Add exfatprogs to make.sh
- exfat is supported as a native kernel module since kernel 5.7
- This package requires CONFIG_EXFAT_FS=m to be set for the kernel module for each
   architecture that will be supported. Currently that is only i586

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-10-22 10:14:51 +00:00
Arne Fitzenreiter
eb8dcf245f core161: add dosfstools
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-10-22 10:14:04 +00:00
Adolf Belka
923cf5358c dosfstools: Update to version 4.2
- Update from 3.0.9 (2013) to 4.2 (2021)
- Update rootfile
- Program names changed in version 2.0.18
    dosfslabel became fatlabel
    dosfsck became fsck.fat
    and mkdosfs became mkfs.fat
- Added --enable-compat-symlinks to ./configure command to maintain original names as
   symlinks

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-10-22 09:59:20 +00:00
Arne Fitzenreiter
2e82a4002d kernel: update to 5.10.75
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-10-21 04:39:52 +02:00
Arne Fitzenreiter
20977f0a83 core161: generate new qos.sh
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-10-19 18:36:32 +00:00
Arne Fitzenreiter
a3c9708117 core161: add pakfire.cgi
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-10-19 18:35:01 +00:00
Stefan Schantl
7f7f546e4a pakfire.cgi: Implement logic to lock the page until pakfire has been fully launched.
When performing any action which requires pakfire, the page gets locked
with an message informing the user that pakfire is working. The page
will be reloaded when pakfire has been launched and is doing the
requested operation - showing the well known log output. This also
happens when pakfire has been launched via any kind of terminal or SSH
session and the CGI gets accessed.

Internally before pakfire gets started a variable called page_lock will
be set to lock the page. An while loop will keep the page locked until
pakfire is launched fully and has written it's lock_file.

This approach will prevent us from any kind of required time intervall
or race conditions.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-10-19 18:34:06 +00:00
Arne Fitzenreiter
e850a61429 firewall: replace mark with --pol ipsec to exclude ipsec traffic from masquerade
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-10-19 18:27:49 +00:00
Arne Fitzenreiter
ef7d9d7657 core161: add suricata changes
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-10-19 18:25:11 +00:00
Peter Müller
d4ff0694c5 squid-asnbl: update to 0.2.3
Upstream commit 500b9137d0a9dd31e40f0d1effdba0aafeb94ca4 changes the
behaviour of this script in case of invalid or unresolvable FQDNs,
preventing Squid from eventually shutting down due to too many BH's per
time.

Since this allows (authenticated) users to run a DoS against the Squid
instance, it is considered to be security relevant.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-10-19 11:43:10 +00:00
Michael Tremer
19357bc55e firewall: Keep REPEAT bit when saving rest to CONNMARK
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Tested-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-10-19 11:35:28 +00:00
Michael Tremer
3fa8300e70 suricata: Introduce IPSBYPASS chain
NFQUEUE does not let the packet continue where it was processed, but
inserts it back into iptables at the start. That is why we need an
extra IPSBYPASS chain which has the following tasks:

* Make the BYPASS bit permanent for the entire connection
* Clear the REPEAT bit

The latter is more of cosmetic nature so that we can identify packets
that have come from suricata again and those which have bypassed the IPS
straight away.

The IPS_* chain will now only be sent traffic to, when none of the two
relevant bits has been set. Otherwise the packet has already been
processed by suricata in the first pass or suricata has decided to
bypass the connection.

This massively reduces load on the IPS which allows many common
connections (TLS connections with downloads) to bypass the IPS bringing
us back to line speed.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Tested-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-10-19 11:35:04 +00:00
Michael Tremer
2469ca9fba suricata: Store bypass flag in connmark and restore
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Tested-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-10-19 11:34:54 +00:00
Michael Tremer
49dd3e2946 suricata: Add rule to skip IPS if a packet has the bypass bit set
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Tested-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-10-19 11:34:43 +00:00
Michael Tremer
855475580b suricata: Always append rules instead of inserting them
This allows us to add rules in a consistent order like they are in the
script.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Tested-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-10-19 11:34:32 +00:00
Michael Tremer
9deccd1cba suricata: Enable bypassing unhandled streams
If a stream cannot be identified or if suricata has decided that it
cannot do anything useful any more (e.g. TLS sessions after the
handshake), we will allow suricata to bypass any following packets in
that flow

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Tested-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-10-19 11:34:19 +00:00
Michael Tremer
11f7218f9c suricata: Define bypass mark
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
Tested-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-10-19 11:34:10 +00:00
Michael Tremer
4f07c279a0 suricata: Rename MARK/MASK to REPEAT_MARK/REPEAT_MASK
This should avoid confusion when we add more marks

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
Tested-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-10-19 11:34:00 +00:00
Michael Tremer
761fadbdde suricata: Set most significant bit as repeat marker
I have no idea why some odd value was chosen here, but one bit should be
enough.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
Tested-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-10-19 11:33:47 +00:00
Arne Fitzenreiter
aaf266ac2b core161: add pakfire.conf and pakfire/lib/functions.pl
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-10-19 11:32:00 +00:00
Michael Tremer
ec18a1ecae pakfire: Allow pinning Pakfire to one mirror server
This patch adds a new $mirror option to the configuration file which
will cause Pakfire to only use this one to download any files.

This feature is disabled by default but useful for development.

Fixes: #12706
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-10-19 11:28:39 +00:00
Arne Fitzenreiter
5670285852 core161: add index.cgi and general-functions.pl
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-10-19 11:27:58 +00:00
Michael Tremer
637eb94684 index.cgi: Remove left-over DNSSEC status warning
An error message is still shown although there is no option to disable
DNSSEC at the moment. The old marker file could still be present on
older machines.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-10-19 11:24:07 +00:00
Arne Fitzenreiter
0165dd4025 core161: add partresize
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-10-19 11:23:12 +00:00
Michael Tremer
a09578f4eb OCI: Enable serial console by default
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-10-19 11:21:57 +00:00
Arne Fitzenreiter
80909fb6da strongswan: update _updown to use conmark for QoS
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-10-18 18:57:18 +02:00
Arne Fitzenreiter
819fdfb17a QoS: imgress Connmark restore, layer7 and IPSec handling
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-10-18 14:44:59 +02:00
Arne Fitzenreiter
03c7877845 kernel: update to 5.10.74
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-10-18 00:35:42 +02:00
Arne Fitzenreiter
3c838a59ea makeqosscripts: add missing parenthesis at QOS_OUT Layer7 rules.
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-10-16 10:18:42 +02:00
Arne Fitzenreiter
79930b29a4 kernel: update to 5.10.73
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-10-15 08:07:04 +02:00
Arne Fitzenreiter
b04724fd34 u-boot-friendlyarm: copy binary from core159
this u-boot version cannot build without python2 that is removed
with core161 so this copy the binary from older build.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-10-15 06:00:08 +00:00
Arne Fitzenreiter
c8bb619a71 core161: remove python2 module from collectd
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-10-13 16:36:59 +00:00
Arne Fitzenreiter
97ac4778bb core161: now use 2to3 of python3
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-10-13 16:33:43 +00:00
Arne Fitzenreiter
b0302f7fad core161: remove python2 at update
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-10-13 12:33:09 +00:00
Adolf Belka
d5bb33744a python: removal of python2 from IPFire
- Final patch for removal of python2 from IPFire. This can be implemented in an
   appropriate Core Update after all other python2 related patches have been implemented
   and confirmed working.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Acked-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-10-13 12:28:12 +00:00
Matthias Fischer
81acbae3f1 nano: Update to 5.9
For details see:
https://www.nano-editor.org/news.php

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-10-13 12:24:36 +00:00
Arne Fitzenreiter
8e3167cc44 guardian: bump PAK_VER
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-10-13 12:23:40 +00:00