Commit Graph

9793 Commits

Author SHA1 Message Date
Arne Fitzenreiter
37eb2ddd07 kernel: update to 6.6.58
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-10-24 08:22:21 +02:00
Arne Fitzenreiter
e91ae5e75a flash-images: move sleep 1 to a better place
kpartx trigger the automount feature of some desktop environments
which result in a mounted filesystem if it was created to fast after
kpartx.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-10-24 08:18:07 +02:00
Arne Fitzenreiter
78f1bb1de5 flash-images: add sleep 1 after umount the images
sometime zerofree will not able to write without this delay.
I have no idea why?

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-10-16 21:37:19 +02:00
Arne Fitzenreiter
4d448aa458 vdr: update to version 2.6.9
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-10-16 21:35:00 +02:00
Arne Fitzenreiter
16fd55e550 lfs/Config: fix used rootfile for linux headers
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-10-16 21:33:58 +02:00
Arne Fitzenreiter
135b61b564 freeradius: update rootfile and increment PAK_VER
new package is needed because a lib was not shipped with v21

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-10-16 21:30:32 +02:00
Adolf Belka
398fa44015 dhcpcd: Update to version 10.1.0
- Update from version 10.0.10 to 10.1.0
- Update of rootfile not required
- Changelog
    10.1.0
	Bug Fixes
		dhcp: get_option_uint32/16 only accept options with correct len by
		 @taoyl-g in #357
		Include frame header in buffer length by @acst1223 in #371
	For full changelog see commits delta in
	 https://github.com/NetworkConfiguration/dhcpcd/compare/v10.0.10...v10.1.0

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-10-16 09:44:51 +00:00
Matthias Fischer
bb108657a8 squid: Update to 6.12
For details see:
https://github.com/squid-cache/squid/commits/v6

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-10-14 09:15:23 +00:00
Matthias Fischer
7b4155905c monit: Update to 5.34.2
For details see:
https://mmonit.com/monit/changes/

"Fixed: The network protocol test may occasionally fail with a
"Poll failed: Interrupted system call" error."

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-10-14 09:15:20 +00:00
Adolf Belka
b71fe1a1e7 tshark: Update to version 4.4.1
- Update from version 4.2.7 to 4.4.1
- The 4.4.x series is the new Stable Release replascing the 4.2.x series which becomes
   the Old Stable Release.
- There is an sobump so find-dependencies was run for the three libraries with changes
   but all linked programs are within tshark.
- Changelog is too large to include here. Links provided
    4.4.1
	https://www.wireshark.org/docs/relnotes/wireshark-4.4.1.html
    4.4.0
	https://www.wireshark.org/docs/relnotes/wireshark-4.4.0.html

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-10-12 09:38:25 +00:00
Arne Fitzenreiter
24f875d787 mympd: update to 18.0.0
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-10-11 13:30:13 +02:00
Arne Fitzenreiter
019f139b20 kernel: update to 6.6.56
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-10-11 13:17:53 +02:00
Matthias Fischer
384c5ba18e monit: Update to 5.34.1
For details see:
https://mmonit.com/monit/changes/

"Fixed: The check program now avoids leaving zombie processes between cycles."

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-10-09 18:26:01 +00:00
Adolf Belka
1af2530c07 lcdproc: removal as discussed in Conf call 7th Oct
- removal of lfs, rootfile and config files
- backup includes file is also removed, althouigh it was an empty file, so not backing
   anything up.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-10-09 18:25:56 +00:00
Adolf Belka
5fd4ca19a8 mpfire: removal as discussed in Conf call 7th Oct
- removal of lfs, rootfile, backup, paks, misc-progs, mpfire perl, language file
   content, mpfire.cgi, mpfire menu references and files, mpfire specific image,
   web-user-interface references and references in manualpages.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-10-09 18:25:53 +00:00
Adolf Belka
8e33ca3246 ppp: Update to version 2.5.1
- Update from version commit e1266c7 to 2.5.1
- Version 2.5.1 has around 34 additional commits from e1266c7. To me all look minor
   changes, some related to other system types such as Solaris that we don't use.
- Update of rootfile
- They have added example to the configuration files to prevent accidental overwriting
   of configuration systems.
- Changelog - There is no longer any changelog provided. Even the one that used to
   exist for version 2.5.0 has been removed. The only option now is to look through the
   commits - https://github.com/ppp-project/ppp/commits/master/?before=d5aeec65752d4a9b3bb46771d0b221c4a4a6539e+35
- Some of the patches had to be updated as the changes were enough that some hunks did
   not get found for patching. Patch file number 6 has been removed as the sed lines are
   no longer to be found in the configure file. The other files that patched successfully
   were renamed to 2.5.1

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-10-09 18:25:03 +00:00
Michael Tremer
e28cb28628 Merge branch 'master' into next 2024-10-07 10:23:22 +00:00
Michael Tremer
7eec7e2c8b ncat: Make this package part of the core system
The nc command is required for the Unbound/DHCP leases bridge.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-10-07 10:19:14 +00:00
Michael Tremer
388802662f Merge branch 'master' into next 2024-10-07 09:15:04 +00:00
Matthias Fischer
b38609d64d unbound: Update to 1.21.1
For details see:
https://nlnetlabs.nl/projects/unbound/download/#unbound-1-21-1

"Fix CVE-2024-8508, unbounded name compression could lead to denial of service."

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-10-04 11:45:37 +00:00
Matthias Fischer
252a5d4d06 suricata: Update to 7.0.7
Exerpt from changelog:
"7.0.7 -- 2024-10-01

Security #7289: http: missing hashtable random seed leads to potential DoS(CRITICAL - CVE 2024-47188)
Security #7268: ja4: non alphanumeric characters in alpn lead to panic (7.0.x backport)(HIGH - CVE 2024-47522)
Security #7258: thash: random factor not used; possible abusive hash collisions (7.0.x backport)(CRITICAL - CVE 2024-47187)
Security #7215: defrag: off by one leads to possible evasion (7.0.x backport)(HIGH - CVE 2024-45796)
Security #7196: datasets: rule with unset makes suricata abort (7.0.x backport)(HIGH - CVE 2024-45795)
Security #7192: http: quadratic complexity in headers processing/finding (7.0.x backport)(CRITICAL - CVE 2024-45797)
Bug #7290: tls: a rule stops working since 7.0.5 (7.0.x backport)
Bug #7286: eve/tls: enabling JA4 breaks custom field selection
Bug #7276: ja3: Error: ja3: Buffer should not be NULL (7.0.x backport)
Bug #7271: pgsql: track 'progress' in tx per direction (7.0.x backport)
Bug #7265: detect/flow: ACK with data on 3whs fails to match 'flow:established' (7.0.x backport)
Bug #7257: fuzz: CIFuzz is not fuzzing PRs as it is supposed to (7.0.x backport)
Bug #7242: app-layer-protocol: negated matching false positive (7.0.x backport)
Bug #7239: tls: Invalid ja3 due to double client hello (7.0.x backport)
Bug #7225: dataset: lookup function is not working with ip type (7.0.x backport)
Bug #7214: frames: stream frame is not always the first one registered (7.0.x backport)
Bug #7207: cbindgen: comptability with newer version 0.27 (7.0.x backport)
Bug #7198: log/rfb: inconsistent key value security_result or security-result
Bug #7194: output: jb context not closed on error in EvePacket
Bug #7188: detect: dcerpc logging and matching issues (7.0.x backport)
Bug #7182: fuzz: File confyaml.c is missing (7.0.x backport)
Bug #7173: detect/integers: do not bother to free NULL pointer on setup/parse failure (7.0.x backport)
Bug #7166: profiling: rule profiling doesn't support absolute paths (7.0.x backport)
Bug #7159: tcp: 'broken ack' event set on flow timeout (7.0.x backport)
Bug #7136: util/thash: debug assertion for memuse (7.0.x backport)
Bug #7122: smb/ntlmssp: nonsense smb.ntlmssp.version values (7.0.x backport)
Bug #7116: dpdk: timestamping packets through TSC does not yield the same time as kernel time (7.0.x backport)
Bug #7066: alert/metadata: no pgsql object encapsulation (7.0.x backport)
Bug #7054: bypass: cannot bypass udp flow from first packet (7.0.x backport)
Bug #7001: pgsql: trigger raw stream reassembly (7.0.x backport)
Bug #6608: file: do not store if filestore:both,flow is triggered after the file was set to nostore (7.0.x backport)
Bug #6555: eve/alert: payload/payload_printable misrepresent data in case of overlaps (7.0.x backport)
Bug #6541: landlock: coverity warnings (7.0.x backport)
Optimization #7134: detect/snmp.version: do not free NULL pointer
Optimization #7075: dns/tcp: allow triggering raw stream reassembly (7.0.x backport)
Feature #7102: iprep: support seeing if rule is part of a rep list (7.0.x backport)
Feature #6674: detect: allow alert-then-pass logic (7.0.x backport)
Task #7249: libhtp 0.5.49 (7.0.x backport)
Task #7168: dns: make the version field in a dns object required (7.0.x backport)
Documentation #6641: doc: add tcp timeout fix to upgrade guide (7.0.x backport)"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-10-02 16:01:39 +00:00
Matthias Fischer
7386cc1f60 libhtp: Update to 0.5.49
For details see:
https://github.com/OISF/libhtp/releases/tag/0.5.49

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-10-02 16:01:39 +00:00
Arne Fitzenreiter
202d48c340 hostapd: update to git 64d60bb4
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-09-30 16:05:07 +00:00
Arne Fitzenreiter
a5c7005c3d mpd: fix chown syntax
this remove a warning at boot that user and group should
seperated by ":" and not by "."

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-09-29 11:28:26 +00:00
Adolf Belka
dcd828666a dnsdist: Update to version 1.9.6
- Update from version 1.9.4 to 1.9.6
- Tested building on riscv64 and it built without issues and rootfile is sam as for
   x86_64 & aarch64. So supported architectures has been removed and dnsdist is available
   on all three architectures.
- Update of rootfile not required
- Changelog
    1.9.6
	New Features
	    Add support for a callback when a new tickets key is added
	     References: pull request 14449
	Improvements
	    Make the logging functions available to all Lua environments
	     References: pull request 14438
	    Handle Quiche >= 0.22.0
	     References: pull request 14450
	    Don’t include openssl/engine.h if it’s not going to be used (Sander Hoentjen)
	     References: pull request 14452
	Bug Fixes
	    Dedup Prometheus help and type lines for custom metrics with labels¶
	     References: #14395, pull request 14439
	    Fix a race in the XSK/AF_XDP backend handling code
	     References: pull request 14436
	    dns.cc: use pdns::views::UnsignedCharView
	     References: pull request 14437
    1.9.5
	New Features
	    Add a Lua FFI function to set proxy protocol values
	     References: pull request 14338
	    Add Lua FFI bindings to generate SVC responses
	     References: pull request 14339
	Bug Fixes
	    Use the correct source IP for outgoing QUIC datagrams
	     References: pull request 14166
	    Reply to HTTP/2 PING frames immediately
	     References: pull request 14163
	    Log the correct amount of bytes sent for DoH w/ nghttp2
	     References: pull request 14332
	    Prevent a race when calling registerWebHandler at runtime
	     References: pull request 14170
	    Enforce a maximum number of HTTP request fields and a maximum HTTP request line size
	     References: pull request 14333
	    Fix a race condition with custom Lua web handlers
	     References: pull request 14342
	    Syslog should be enabled by default
	     References: pull request 14331
	    Fix a warning when compiling the unit tests without XSK¶
	     References: pull request 14334
	    autoconf: allow prerelease systemd versions (Chris Hofstaedtler)
	     References: pull request 14335
	    Edit the systemd unit file, CAP_BPF is no longer enough
	     References: #14279, pull request 14336
	    Fix ‘Error creating TCP worker’ error message
	     References: pull request 14337

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-09-26 14:14:37 +00:00
Adolf Belka
c2cd03024f miniupnpc: Required for build of transmission to replace bundled version
- miniupnpc is required for the build of transmiossion but the bundled version was not
   working properly with version 4.0.6 and we prefer to not use bundled versions.
- Only used for the build so rootfile is 100% commented out. No miniupnpc installed
   on IPFire.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-09-24 10:03:22 +00:00
Adolf Belka
5702c62b11 transmission: Update to version 4.0.6
- Update from version 4.0.5 to 4.0.6
- Update of rootfile not required
- Bundled miniupnpc not working with build of 4.0.6 As we prefer not to use bundled
   packages where possible, this patch set builds miniupnpc prior to transmission. As
   miniupnpc is only required for the build of transmission, nothing is installed from
   miniupnpc.
- miniupnpc-2.2.8 has a problem with transmission and needs a patch to fix it. Added
   into the transmission lfs file
- Changelog
    4.0.6
	All Platforms
	    Improved parsing HTTP tracker announce response. (#6223)
	    Fixed 4.0.0 bug that caused some user scripts to have an invalid TR_TORRENT_TRACKERS environment variable. (#6434)
	    Fixed 4.0.0 bug where alt-speed-enabled had no effect in settings.json. (#6483)
	    Fixed 4.0.0 bug where the GTK client's "Use authentication" option was not saved between's sessions. (#6514)
	    Fixed 4.0.0 bug where the filename for single-file torrents aren't sanitized. (#6846)
	macOS Client
	    Fix: Sparkle support for handling beta version updates. (#5263)
	    Fixed app unable to start when having many torrents and TimeMachine enabled. (#6523)
	    Fix: Sparkle Version Comparator. (#6623)
	Qt Client
	    Fixed 4.0.0 bug where piece size description text and slider state in torrent creation dialog are not always up-to-date. (#6516)
	GTK Client
	    Fixed build when compiling with GTKMM 4. (#6393)
	    Added developer name to metainfo files. (#6598)
	    Added the launchable desktop-id to metainfo files. (#6779)
	    Fixed build when compiling on BSD. (#6812)
	Web Client
	    Fixed a 4.0.0 bug where the infinite ratio symbol was displayed incorrectly in the WebUI. (#6491, #6500)
	    Fixed layout issue in speed display. (#6570)
	    General UI improvement related to filterbar and fixes download/upload speed info wrap. (#6761)
	Daemon
	    Fixed a couple of logging issues. (#6463)
	Everything Else
	    Updated flatpak release metainfo. (#6357)
	    Fixed libtransmission build on very old cmake versions. (#6418)
	    UTP peer connections follow user-defined speed limits better now. (#6551)
	    Only use a single concurrent queue for timeMachineExclude instead of one queue per torrent (#6523). (#6558)
	    Fixed 4.0.5 bug where svg and png icons in the WebUI might not be displayed. (#6563)
	    Fixed 4.0.0 bug where alt-speed-enabled had no effect in settings.json. (#6564)
	    Fixed 4.0.0 bugs where some RPC methods don't put torrents in recently-active anymore. (#6565)
	    Improved parsing HTTP tracker announce response. (#6567)
	    Fixed compatibility with clang-format 18. (#6690)
	    Fixed build when compiling with mbedtls 3.x . (#6823)

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-09-24 10:03:11 +00:00
Michael Tremer
6ca5fb74ab Merge branch 'master' into next 2024-09-24 08:54:50 +00:00
Matthias Fischer
0a3bdf20f5 squid: Update to 6.11
Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-09-24 08:54:27 +00:00
Michael Tremer
17887e69a8 suricata: Add a watcher to restart on unexpected termination
This patch adds a watcher process that will restart suricata when it is
being killed by SIGKILL (e.g. by the OOM killer) or after a SEGV.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-09-24 08:42:32 +00:00
Adolf Belka
853e1e41e9 curl: Update to version 8.10.0
- Update from vesion 8.9.1 to 8.10.0
- Update of rootfile
- In previous versions if libpsl was not found then the build excluded it. Now it needs
   to be explicitly disabled otherwise the build will stop with a warning that it could
   not be found.
- Changelog
    8.10.0
      changes:
	 o autotools: add `--enable-windows-unicode` option [103]
	 o curl: --help [option] displays documentation for given cmdline option [19]
	 o curl: add --skip-existing [54]
	 o curl: for -O, use "default" as filename when the URL has none [34]
	 o curl: make --rate accept "number of units" [4]
	 o curl: make --show-headers the same as --include [6]
	 o curl: support --dump-header % to direct to stderr [31]
	 o curl: support embedding a CA bundle and --dump-ca-embed [20]
	 o curl: support repeated use of the verbose option; -vv etc [35]
	 o curl: use libuv for parallel transfers with --test-event [82]
	 o getinfo: add CURLINFO_POSTTRANSFER_TIME_T [87]
	 o mbedtls: add CURLOPT_TLS13_CIPHERS support [78]
	 o rustls: add support for setting TLS version and ciphers [113]
	 o vtls: stop offering alpn http/1.1 for http2-prior-knowledge [53]
	 o wolfssl: add CURLOPT_TLS13_CIPHERS support [76]
	 o wolfssl: add support for ssl cert blob / ssl key blob options [50]
      bugfixes:
	 o asyn-thread: stop using GetAddrInfoExW on Windows [241]
	 o autotools: fix MS-DOS builds [249]
	 o autotools: fix typo in tests/data target [30]
	 o aws_sigv4: fix canon order for headers with same prefix [74]
	 o bearssl: fix setting tls version [203]
	 o bearssl: improve shutdown handling [45]
	 o BINDINGS: add zig binding [100]
	 o build: add `iphlpapi` lib for libssh on Windows [166]
	 o build: add `poll()` detection for cross-builds [244]
	 o build: add options to disable SHA-512/256 hash algo [239]
	 o build: check OS-native IDN first, then libidn2 [223]
	 o build: delete unused `REQUIRE_LIB_DEPS` [226]
	 o build: drop unused `NROFF` reference [253]
	 o build: drop unused feature-detection code for Apple `poll()` [227]
	 o build: generate `buildinfo.txt` for test logs [256]
	 o build: improve compiler version detection portability
	 o build: make `CURL_FORMAT_CURL_OFF_T[U]` work with mingw-w64 <=7.0.0 [207]
	 o build: silence C4232 MSVC warnings in vcpkg ngtcp2 builds [137]
	 o build: use -Wno-format-overflow [195]
	 o buildconf.bat: fix tool_hugehelp.c generation [173]
	 o cf-socket: fix pollset for listening [179]
	 o cf-socket: prevent KEEPALIVE_FACTOR being set to 1000 for Windows [185]
	 o cfilters: send flush [13]
	 o CHANGES: rename to CHANGES.md, no longer generated [40]
	 o CI: enable parallel testing in CI builds [18]
	 o ci: Update actions/upload-artifact digest to 89ef406 [24]
	 o cmake: `Libs.private` improvements [215]
	 o cmake: add `CURL_USE_PKGCONFIG` option [138]
	 o cmake: add Linux CI job, fix pytest with cmake [71]
	 o cmake: add math library when using wolfssl and ngtcp2 [66]
	 o cmake: add missing `pkg-config` hints to Find modules [158]
	 o cmake: add missing version detection to Find modules [170]
	 o cmake: add rustls [116]
	 o cmake: add support for versioned symbols option [51]
	 o cmake: add wolfSSH support [117]
	 o cmake: allow `pkg-config` in more envs [147]
	 o cmake: cleanup header paths [59]
	 o cmake: default `CURL_DISABLE_LDAPS` to the value of `CURL_DISABLE_LDAP` [231]
	 o cmake: delete MSVC warning suppression for tests/server [101]
	 o cmake: detect `nghttp2` via `pkg-config`, enable by default [21]
	 o cmake: detect and show VCPKG in platform flags [84]
	 o cmake: distcheck for files in CMake subdir [9]
	 o cmake: drop custom `CMakeOutput.log`/`CMakeError.log` logs [27]
	 o cmake: drop libssh CONFIG-style detection [167]
	 o cmake: drop no-op `tests/data/CMakeLists.txt` [26]
	 o cmake: drop reference to undefined variable [25]
	 o cmake: drop unused `HAVE_IDNA_STRERROR` [62]
	 o cmake: drop unused internal variable [22]
	 o cmake: exclude tests/http/clients builds by default [110]
	 o cmake: fix `GSS_VERSION` for Heimdal found via pkg-config [77]
	 o cmake: fix `pkg-config`-based detection in `FindGSS.cmake` [94]
	 o cmake: fix and tidy up c-ares builds, enable in more CI jobs [156]
	 o cmake: fix find rustls [148]
	 o cmake: fixup linking libgsasl when detected via CMake-native
	 o cmake: honor custom `CMAKE_UNITY_BUILD_BATCH_SIZE` [163]
	 o cmake: limit `pkg-config` to UNIX and MSVC+vcpkg by default [188]
	 o cmake: limit libidn2 `pkg-config` detection to `UNIX` [109]
	 o cmake: migrate dependency detections to Find modules [183]
	 o cmake: more small tidy-ups and fixes [80]
	 o cmake: rename wolfSSL and zstd config variables to uppercase [151]
	 o cmake: respect cflags/libdirs of native pkg-config detections [175]
	 o cmake: show CMake platform/compiler flags [63]
	 o cmake: show warning if libpsl is not found [154]
	 o cmake: sync code between test/example targets [234]
	 o cmake: sync up formatting in Find modules [129]
	 o cmake: TLS 1.3 warning only for bearssl and sectranp [118]
	 o cmake: update `curl-config.cmake.in` template var list
	 o cmake: update list of "advanced" variables [119]
	 o cmake: use numeric comparison for `HAVE_WIN32_WINNT` [69]
	 o cmdline-opts: language fix for expect100-timeout.md and max-time.md [192]
	 o configure: delete unused `CURL_DEFINE_UNQUOTED` function [224]
	 o configure: delete unused `HAVE_OPENSSL3` macro [225]
	 o configure: delete unused `m4/xc-translit.m4` [114]
	 o configure: detect AppleIDN [70]
	 o configure: fail if PSL is not disabled but not found [46]
	 o configure: fix WinIDN builds targeting old Windows [210]
	 o configure: remove USE_EXPLICIT_LIB_DEPS [199]
	 o configure: replace nonportable grep -o with awk [111]
	 o connect: always prefer ipv6 in IP eyeballing [209]
	 o connect: limit update IP info [191]
	 o cookie.md: try to articulate the two different uses this option has [92]
	 o curl: allow 500MB data URL encode strings [38]
	 o curl: find curlrc in XDG_CONFIG_HOME without leading dot [186]
	 o curl: fix --proxy-pinnedpubkey [91]
	 o curl: fix the -w urle.* variables [153]
	 o curl: make the progress bar detect terminal width changes [169]
	 o curl: warn on unsupported SSL options [106]
	 o Curl_rand_bytes to control env override [17]
	 o curl_sha512_256: fix symbol collisions with nettle library [131]
	 o CURLMOPT_SOCKETFUNCTION.md: expand on the easy argument [216]
	 o CURLOPT_XFERINFOFUNCTION: clarify the callback return codes [141]
	 o dist: add missing `docs/examples/CMakeLists.txt` [58]
	 o dist: add missing `FindNettle.cmake` [11]
	 o dist: add missing `lib/optiontable.pl` [115]
	 o dist: add missing `test_*.py` scripts [102]
	 o dist: drop buildconf [65]
	 o dist: fix reproducible build from release tarball [36]
	 o dmaketgz: only run 'make distclean' if Makefile exists
	 o docs/SSLCERTS: rewrite [174]
	 o docs: add description of effect of --location-trusted on cookie [157]
	 o docs: document the (weak) random value situation in rustls builds [252]
	 o docs: fix some examples in man pages
	 o docs: improve cipher options documentation [159]
	 o docs: mention "@-" in more places [67]
	 o docs: remove ALTSVC.md, HSTS.md, HTTP2.md and PARALLEL-TRANSFERS.md [105]
	 o docs: update CIPHERS.md [140]
	 o doh-url.md: point out DOH server IP pinning [37]
	 o doh: remove redundant checks [242]
	 o easy: fix curl_easy_upkeep for shared connection caches [52]
	 o escape: allow curl_easy_escape to generate 3*input length output [39]
	 o FEATURES.md: fix typo [180]
	 o ftp: always offer line end conversions [219]
	 o ftp: flush pingpong before response [73]
	 o getinfo: return zero for unsupported options (when disabled) [189]
	 o GHA/windows: enable MulitSSL in an MSVC job [2]
	 o GHA: scan git repository and detect unvetted binary files [3]
	 o gnutls/wolfssl: improve error message when certificate fails [125]
	 o gnutls: send all data [230]
	 o gtls: fix OCSP stapling management [206]
	 o haproxy: send though next filter [222]
	 o hash: provide asserts to verify API use [96]
	 o http/2: simplify eos/blocked handling [90]
	 o http2+h3 filters: fix ctx init [142]
	 o http2: fix GOAWAY message sent to server [171]
	 o http2: improve rate limiting of downloads [33]
	 o http2: improved upload eos handling [41]
	 o http3.md: mention how the fallback can be h1 or h2 [194]
	 o hyper: call Curl_req_set_upload_done() [126]
	 o idn: more strictly check AppleIDN errors [98]
	 o idn: support non-UTF-8 input under AppleIDN [99]
	 o INSTALL.md: MultiSSL and QUIC are mutually exclusive [7]
	 o KNOWN_BUGS: "special characers" in URL works with aws-sigv4 [81]
	 o krb5: add Linux/macOS CI tests, fix cmake GSS detection [83]
	 o krb5: fix `-Wcast-align` [95]
	 o lib: add eos flag to send methods [14]
	 o lib: avoid macro collisions between wolfSSL and GnuTLS headers [133]
	 o lib: convert some debugf()s into traces [8]
	 o lib: delete stray undefs for `vsnprintf`, `vsprintf` [152]
	 o lib: fix AIX build issues [112]
	 o lib: fix building with wolfSSL without DES support [134]
	 o lib: make SSPI global symbols use Curl_ prefix [251]
	 o lib: prefer `CURL_SHA256_DIGEST_LENGTH` over the unprefixed name [132]
	 o lib: remove the final strncpy() calls [240]
	 o lib: remove use of RANDOM_FILE [235]
	 o libcurl.def: move from / into lib [238]
	 o libcurl.pc: add `Cflags.private` [10]
	 o libcurl.pc: add reference to `libgsasl` [150]
	 o libcurl/docs: expand on redirect following and secrets to other hosts [85]
	 o llist: remove direct struct accesses, use only functions [72]
	 o Makefile.dist: fix `ca-firefox` target [254]
	 o Makefile.mk: fixup enabling libidn2 [61]
	 o Makefile: remove 'scripts' duplicate from DIST_SUBDIRS
	 o maketgz: accept option to include latest commit hash [5]
	 o maketgz: fix RELEASE-TOOLS.md for daily tarballs [243]
	 o maketgz: move from / into scripts [237]
	 o managen: fix superfluous leading blank line in quoted sections [211]
	 o managen: in man output, remove the leading space from examples [198]
	 o managen: wordwrap long example lines in ASCII output [143]
	 o manpage: ensure a maximum width for the text version [75]
	 o max-filesize.md: mention zero disables the limit [93]
	 o mbedtls: add more informative logging [162]
	 o mbedtls: fix setting tls version [200]
	 o mbedtls: no longer use MBEDTLS_SSL_VERIFY_OPTIONAL [181]
	 o mime: avoid inifite loop in client reader [155]
	 o mk-ca-bundle.pl: include a link to the caextract webpage [68]
	 o multi: make the "general" list of easy handles a Curl_llist [97]
	 o multi: on socket callback error, remove socket hash entry nonetheless [149]
	 o ngtcp2/osslq: remove NULL pointer dereferences [213]
	 o ngtcp2: use NGHTTP3 prefix instead of NGTCP2 for errors in h3 callbacks [79]
	 o openssl quic: fix memory leak [229]
	 o openssl: certinfo errors now fail correctly [250]
	 o openssl: fix the data race when sharing an SSL session between threads [221]
	 o openssl: improve shutdown handling [44]
	 o pingpong: drain the input buffer when reading responses [193]
	 o POP3: fix multi-line responses [168]
	 o pop3: use the protocol handler ->write_resp [220]
	 o printf: fix mingw-w64 format checks [228]
	 o progress: ratelimit/progress tweaks [32]
	 o pytests: add tests for HEAD requests in all HTTP versions [42]
	 o rand: only provide weak random when needed [233]
	 o runtests: if DISABLED cannot be read, error out [56]
	 o runtests: log ignored but passed tests [130]
	 o runtests: remove "has_textaware" [217]
	 o rustls: fix setting tls version [202]
	 o rustls: make all tests pass [1]
	 o schannel: avoid malloc for CAinfo_blob_digest [247]
	 o scorecard: tweak request measurements [139]
	 o sectransp: fix setting tls version [204]
	 o SECURITY: mention OpenSSF best practices gold badge [161]
	 o setopt: allow CURLOPT_INTERFACE to be set to NULL [165]
	 o setopt: let CURLOPT_ECH set to NULL reset to default [187]
	 o setopt: make CURLOPT_TFTP_BLKSIZE accept bad values [184]
	 o sha256: fix symbol collision between nettle (GnuTLS) and OpenSSL [135]
	 o share: don't reinitialize conncache [214]
	 o sigpipe: init the struct so that first apply ignores [49]
	 o smb: convert superflous assign into assert [246]
	 o smtp: add tracing feature [120]
	 o splay: use access functions, add asserts, use Curl_timediff [121]
	 o spnego_gssapi: implement TLS channel bindings for openssl [146]
	 o src: delete `curlx_m*printf()` aliases [197]
	 o src: fix potential macro confusion in cmake unity builds [208]
	 o src: namespace symbols clashing with lib [248]
	 o src: replace copy of printf mappings with an include [190]
	 o ssh: deduplicate SSH backend includes (and fix libssh cmake unity build) [177]
	 o system_win32: fix typo
	 o test httpd: tweak cipher list [124]
	 o test1521: verify setting options to NULL better [182]
	 o test1707: output diff more for debugging differences in CI outputs
	 o test556: improve robustness [64]
	 o test579: improve robustness [60]
	 o test587: improve robustness [123]
	 o test649: improve robustness [122]
	 o test677: improve robustness [47]
	 o tests/runner: only allow [!A-Za-z0-9_-] in %if feature names [55]
	 o tests: constrain http pytest to tests/http directory [205]
	 o tests: don't mangle output if hostname or type unknown
	 o tests: ignore QUIT from FTP protocol comparisons [108]
	 o tests: provide docs as curldown, not nroff [12]
	 o tidy-up: misc build, tests, `lib/macos.c` [172]
	 o tidy-up: OS names [57]
	 o tool_operhlp: fix  "potentially uninitialized local variable 'pc' used" [48]
	 o tool_paramhlp: bump maximum post data size in memory to 16GB [128]
	 o transfer: Curl_sendrecv() and event related improvements [164]
	 o transfer: remove comments, add asserts [218]
	 o transfer: skip EOS read when download done [196]
	 o url: dns_entry related improvements [16]
	 o url: fix connection reuse for HTTP/2 upgrades [236]
	 o urlapi: verify URL *decoded* hostname when set [160]
	 o urldata: introduce `data->mid`, a unique identifier inside a multi [127]
	 o urldata: remove 'scratch' from the UrlState struct [86]
	 o urldata: remove crlf_conversions counter [232]
	 o urldata: remove proxy_connect_closed bit [178]
	 o verify-release: shell script that verifies a release tarball [29]
	 o version: fix shadowing a `libssh.h` symbol [176]
	 o vtls: add SSLSUPP_CIPHER_LIST [107]
	 o vtls: fix MSVC 'cast truncates constant value' warning [23]
	 o vtls: fix static function name collisions between TLS backends [136]
	 o vtls: init ssl peer only once [15]
	 o websocket: introduce blocking sends [145]
	 o wolfssl: avoid taking cached x509 store ref if sslctx already using it [88]
	 o wolfssl: fix CURLOPT_SSLVERSION [144]
	 o wolfssl: fix setting tls version [201]
	 o wolfssl: improve shutdown handling [43]
	 o ws: flags to opcodes should ignore CURLWS_CONT flag [104]
	 o x509asn1: raise size limit for x509 certification information [28]

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-09-23 21:22:09 +00:00
Adolf Belka
f7d6648e76 samba: Update to version 4.21.0
- Update from 4.20.4 to 4.21.0
- Update of rootfile for x86_64, aarch64 & riscv64
- Changelog
    4.21.0
	Hardening of "valid users", "invalid users", "read list" and "write list"
	 In previous versions of Samba, if a user or group name in either of the
	  mentioned options could not be resolved to a valid SID, the user (or group)
	  would be skipped without any notification. This could result in unexpected and
	  insecure behaviour. Starting with this version of Samba, if any user or group
	  name in any of the options cannot be resolved due to a communication error with
	  a domain controller, Samba will log an error and the tree connect will fail.
	 Non existing users (or groups) are ignored.
	LDAP TLS/SASL channel binding support
	 The ldap server supports SASL binds with
	  kerberos or NTLMSSP over TLS connections
	  now (either ldaps or starttls).
	 Setups where 'ldap server require strong auth = allow_sasl_over_tls'
	  was required before, can now most likely move to the
	  default of 'ldap server require strong auth = yes'.
	 If SASL binds without correct tls channel bindings are required
	  'ldap server require strong auth = allow_sasl_without_tls_channel_bindings'
	  should be used now, as 'allow_sasl_over_tls' will generate a
	  warning in every start of 'samba', as well as '[samba-tool ]testparm'.
	 This is similar to LdapEnforceChannelBinding under
	  HKLM\SYSTEM\CurrentControlSet\Services\NTDS\Parameters
	  on Windows.
	 All client tools using ldaps also include the correct
	  channel bindings now.
	NEW FEATURES/CHANGES
	LDB no longer a standalone tarball
	 LDB, Samba's LDAP-like local database and the power behind the Samba
	  AD DC, is no longer available to build as a distinct tarball, but is
	  instead provided as an optional public library.
	 If you need ldb as a public library, say to build sssd, then use
	   ./configure --private-libraries='!ldb'
	 This re-integration allows LDB tests to use the Samba's full selftest
	  system, including our knownfail infrastructure, and decreases the work
	  required during security releases as a coordinated release of the ldb
	  tarball is not also required.
	 This approach has been demonstrated already in Debian, which is already
	  building Samba and LDB is this way.
	 As part of this work, the pyldb-util public library, not known to be
	  used by any other software, is made private to Samba.
	LDB Module API Python bindings removed
	 The LDB Modules API, which we do not promise a stable ABI or API for,
	  was wrapped in python in early LDB development.  However that wrapping
	  never took into account later changes, and so has not worked for a
	  number of years.  Samba 4.21 and LDB 2.10 removes this unused and
	  broken feature.
	Changes in LDB handling of Unicode
	 Developers using LDB up to version 2.9 could call ldb_set_utf8_fns()
	  to determine how LDB handled casefolding. This is used internally by
	  string comparison functions. In LDB 2.10 this function is deprecated,
	  and ldb_set_utf8_functions() is preferred. The new function allows a
	  direct comparison function to be set as well as a casefold function.
	 This improves performance and allows for more robust handling of
	  degenerate cases. The function should be called just after ldb_init(),
	  with the following arguments:
	     ldb_set_utf8_functions(ldb, /* the struct ldb_ctx LDB object */
	                            context_variable /* possibly NULL */
	                            casefold_function,
	                            case_insensitive_comparison_function);
	 The default behaviour of LDB remains to perform ASCII casefolding
	  only, as if in the "C" locale. Recent versions have become
	  increasingly consistent in this.
	Some Samba public libraries made private by default
	 The following Samba C libraries are currently made public due to their
	  use by OpenChange or for historical reasons that are no longer clear.
	    dcerpc-samr, samba-policy, tevent-util, dcerpc, samba-hostconfig,
	    samba-credentials, dcerpc_server, samdb
	 The libraries used by the OpenChange client now private, but can be
	  made public (like ldb above) with:
	   ./configure --private-libraries='!dcerpc,!samba-hostconfig,!samba-credentials,!ldb'
	 The C libraries without any known user or used only for the OpenChange
	  server (a dead project) may be made private entirely in a future Samba
	  version.
	 If you use a Samba library in this list, please be in touch with the
	  samba-technical mailing list.
	Using ldaps from 'winbindd' and 'net ads'
	 Beginning with Samba 3.0.22 the 'ldap ssl = start tls' option also
	  impacted LDAP connections to active directory domain controllers.
	 Using the STARTTLS operation on LDAP port 389 connections. Starting
	  with Samba 3.5.0 'ldap ssl ads = yes' was required in addition in
	  order let to 'ldap ssl = start tls' have any effect on those
	  connections.
	 'ldap ssl ads' was deprecated with Samba 4.8.0 and removed together
	  with the whole functionality in Samba 4.14.0, because it didn't support
	  tls channel bindings required for the sasl authentication.
	 The functionality is now re-added using the correct channel bindings
	  based on the gnutls based tls implementation we already have, instead
	  of using the tls layer provided by openldap. This makes it available
	  and consistent with all LDAP client libraries we use and implement on
	  our own.
	 The 'client ldap sasl wrapping' option gained the two new possible values:
	  'starttls' (using STARTTLS on tcp port 389)
	  and
	  'ldaps' (using TLS directly on tcp port 636).
	 If you had 'ldap ssl = start tls' and 'ldap ssl ads = yes'
	  before, you can now use 'client ldap sasl wrapping = starttls'
	  in order to get STARTTLS on tcp port 389.
	 As we no longer use the openldap tls layer it is required to configure the
	  correct certificate trusts with at least one of the following options:
	  'tls trust system cas', 'tls ca directories' or 'tls cafile'.
	 While 'tls verify peer' and 'tls crlfile' are also relevant,
	  see 'man smb.conf' for further details.
	New DNS hostname config option
	 To get `net ads dns register` working correctly running manually or during a
	  domain join a special entry in /etc/hosts was required. This not really
	  documented and thus the DNS registration mostly didn't work. With the new option
	  the default is [netbios name].[realm] which should be correct in the majority of
	  use cases.
	 We will also use the value to create service principal names during a Kerberos
	  authentication and DNS functions.
	 This is not supported in samba-tool yet.
	Samba AD will rotate expired passwords on smartcard-required accounts
	 Traditionally in AD, accounts set to be "smart card require for logon"
	  will have a password for NTLM fallback and local profile encryption
	  (Windows DPAPI). This password previously would not expire.
	 Matching Windows behaviour, when the DC in a FL 2016 domain and the
	  msDS-ExpirePasswordsOnSmartCardOnlyAccounts attribute on the domain
	  root is set to TRUE, Samba will now expire these passwords and rotate
	  them shortly before they expire.
	 Note that the password expiry time must be set to twice the TGT lifetime for
	  smooth operation, e.g. daily expiry given a default 10 hour TGT
	  lifetime, as the password is only rotated in the second half of its
	  life.  Again, this matches the Windows behaviour.
	 Provided the default 2016 schema is used, new Samba domains
	  provisioned with Samba 4.21 will have this enabled once the domain
	  functional level is set to 2016.
	 NOTE: Domains upgraded from older Samba versions will not have this
	  set, even after the functional level preparation, matching the
	  behaviour of upgraded Windows AD domains.
	Per-user and group "veto files" and "hide files"
	 "veto files" and "hide files" can optionally be restricted to certain users and
	  groups. To apply a veto or hide directive to a filename for a specific user or
	  group, a parametric option like this can be used:
	   hide files : USERNAME = /somefile.txt/
	   veto files : GROUPNAME = /otherfile.txt/
	  For details consult the updated smb.conf manpage.
	Automatic keytab update after machine password change
	 When machine account password is updated, either by winbind doing regular
	  updates or manually (e.g. net ads changetrustpw), now winbind will also support
	  update of keytab entries in case you use newly added option
	  'sync machine password to keytab'.
	  The new parameter allows you to describe what keytabs and how should be updated.
	  From smb.conf(5) manpage - each keytab can have exactly one of these four forms:
	                 account_name
	                 sync_spns
	                 spn_prefixes=value1[,value2[...]]
	                 spns=value1[,value2[...]]
	 The functionaity provided by the removed commands "net ads keytab
	  add/delete/add_update_ads" can be achieved via the 'sync machine password to
	  keytab' as in these examples:
	  "net ads keytab add  wurst/brot@REALM"
	    - this command is not adding <principal> to AD, so the best fit can be specifier
	      "spns"
	    - add to smb.conf:
	      sync machine password to keytab = /path/to/keytab1:spns=wurst/brot@REALM:machine_password
	    - run:
	      "net ads keytab create"
	  "net ads keytab delete wurst/brot@REALM"
	    - remove the principal (or the whole keytab line if there was just one)
	    - run:
	      "net ads keytab create"
	  "net ads keytab add_update_ads wurst/brot@REALM"
	    - this command was adding the principal to AD, so for this case use a keytab
	      with specifier sync_spns
	    - add to smb.conf:
	      sync machine password to keytab = /path/to/keytab2:sync_spns:machine_password
	    - run:
	      "net ads setspn add  wurst/brot@REALM"  # this adds the principal to AD
	      "net ads keytab create"  # this sync it from AD to local keytab
	 A new parameter 'sync machine password script' allows to specify external script
	  that will be triggered after the automatic keytab update. If keytabs should be
	  generated in clustered environments it is recommended to update them on all
	  nodes.  Check in smb.conf(5) the scripts winbind_ctdb_updatekeytab.sh and
	  46.update-keytabs.script in section 'sync machine password script' for details.
	 For detailed information check the smb.conf(5) and net(8) manpages.
	New cephfs VFS module
	 Introduce new vfs-to-cephfs bridge which uses libcephfs low-level APIs (instead
	  of path-based operations in the existing module). It allows users to pass
	  explicit user-credentials per call (including supplementary groups), as well as
	  faster operations using inode and file-handle caching on the Samba side.
	  Configuration is identical to existing module, but using 'ceph_new' instead of
	  'ceph' for the relevant smb.conf entries. This new module is expected to
	  deprecate and replace the old one in next major release.
	Group Managed Service Accounts
	 Samba 4.21 adds support for gMSAs (Group Managed Service Accounts),
	  completing support for Functional Level 2012.
	 The purpose of a gMSA is to allow a single host, or a cluster of
	  hosts, to share access to an automatically rotating password, avoiding
	  the weak static service passwords that are often the entrypoint of
	  attackers to AD domains. Each server has a strong and regularly
	  rotated password, which is used to access the gMSA account of (e.g.)
	  the database server.
	 Samba provides management and client tools, allowing services on Unix
	  hosts to access the current and next gMSA passwords, as well as obtain
	  a credentials cache.
	 Samba 4.20 announced the client-side tools for this feature. To avoid
	  duplication and provide consistency, the existing commands for
	  password viewing have been extended, so these commands operate both on
	  a gMSA (with credentials, over LDAP, specify -H) and locally for
	  accounts that have a compatible password (e.g. plaintext via GPG,
	  compatible hash)
	    samba-tool user getpassword
	    samba-tool user get-kerberos-ticket
	    samba-tool domain exportkeytab
	 An example command, which gets the NT hash for use with NTLM, is
	   samba-tool user getpassword -H ldap://server --machine-pass  \
	       TestUser1 --attributes=unicodePwd
	 Kerberos is a better choice (gMSA accounts should not use LDAP simple
	  binds, for reasons of both security and compatibility). Use
	   samba-tool user get-kerberos-ticket -H ldap://server --machine-pass \
	       TestUser1 --output-krb5-ccache=/srv/service/krb5_ccache
	 gMSAs disclose a current and previous password. To access the previous
	  NT hash, use:
	   samba-tool user getpassword -H ldap://server --machine-pass TestUser1 \
	      --attrs=unicodePwd;previous=1
	 To access the previous password as UTF8, use:
	   samba-tool user getpassword -H ldap://server --machine-pass TestUser1 \
	       --attributes=pwdLastSet,virtualClearTextUTF8;previous=1
	 However, Windows tools for dealing with gMSAs tend to use Active
	  Directory Web Services (ADWS) from Powershell for setting up the
	  accounts, and this separate protocol is not supported by Samba 4.21.
	 Samba-tool commands for handling gMSA (KDS) root keys
	   Group managed service accounts rotate passwords based on root keys,
	    which can be managed using samba-tool, with commands such as
	      samba-tool domain kds root_key create
	      samba-tool domain kds root_key list
	 Samba will create a new root key for new domains at provision time,
	  but users of gMSA accounts on upgraded domains will need to first
	  create a root key.
	RFC 8070 PKINIT "Freshness extension" supported in the Heimdal KDC
	 The Heimdal KDC will recognise when a client provides proof that they
	  hold the hardware token used for smart-card authentication 'now' and
	  has not used a saved future-dated reply. Samba 4.21 now matches
	  Windows and will assign an extra SID to the user in this case,
	  allowing sensitive resources to be additionally protected.
	 Only Windows clients are known to support the client side of this
	  feature at this time.
	New samba-tool Authentication Policy management command structure
	 As foreshadowed in the Samba 4.20 release notes, the "samba-tool
	  domain auth policy" commands have been reworked to be more intuitive
	  based on user feedback and reflection.
	Support for key features of AD Domain/Forest Functional Level 2012R2
	 Combined with other changes in recent versions (such as claims support
	  in 4.20), Samba can now claim Functional Level 2012R2 support.
	Build system
	 In previous versions of Samba, packagers of Samba would set their
	  package-specific version strings using a patch to the
	  SAMBA_VERSION_VENDOR_SUFFIX line in the ./VERSION file. Now that is
	  achieved by using --vendor-suffix (at configure time), allowing this
	  to be more easily scripted. Vendors are encouraged to include their
	  name and full package version to assist with upstream debugging.
	More deterministic builds
	 Samba builds are now more reproducible, providing better assurance
	  that the Samba binaries you run are the same as what is expected from
	  the source code. If locale settings are not changed, the same objects
	  will be produced from each compilation run. If Samba is built in a
	  different path, the object code will remain the same, but DWARF
	  debugging sections will change (while remaining functionally
	  equivalent).
	Improved command-line redaction
	 There are several options that can be used with Samba tools for
	  specifying secrets. Although this is best avoided, when these options
	  are used, Samba will redact the secrets in /proc, so that they won't
	  be seen in ps or top. This is now carried out more thoroughly,
	  redacting more options. There is a race inherent in this, and the
	  passwords will be visible for a short time. The secrets are also not
	  removed from .bash_history and similar files.
	REMOVED FEATURES
	Following commands are removed:
		net ads keytab add <principal>
		net ads keytab delete <principal>
		net ads keytab add_update_ads
	Changes
	smb.conf changes
	  Parameter Name                          Description     Default
	  --------------                          -----------     -------
	  client ldap sasl wrapping               new values
	  client use spnego principal             removed
	  ldap server require strong auth         new values
	  tls trust system cas                    new
	  tls ca directories                      new
	  dns hostname                            client dns name [netbios name].[realm]
	  valid users                             Hardening
	  invalid users                           Hardening
	  read list                               Hardening
	  write list                              Hardening
	  veto files                              Added per-user and per-group vetos
	  hide files                              Added per-user and per-group hides
	  sync machine password to keytab         keytabs
	  sync machine password script            script
	CHANGES SINCE 4.21.0rc4
	   * BUG 15699: Incorrect FSCTL_QUERY_ALLOCATED_RANGES response when truncated.
	   * BUG 15702: Bad variable definition for ParseTuple causing test failure for
	     Smb3UnixTests.test_create_context_reparse.
	   * BUG 15686: Add new vfs_ceph module (based on low level API).
	CHANGES SINCE 4.21.0rc3
	   * BUG 15698: samba-tool can not load the default configuration file.
	   * BUG 15700: Crash when readlinkat fails.
	CHANGES SINCE 4.21.0rc2
	   * BUG 15689: Can't add/delete special keys to keytab for nfs, cifs, http etc.
	   * BUG 15696: Compound SMB2 requests don't return
	     NT_STATUS_NETWORK_SESSION_EXPIRED for all requests, confuses
	     MacOSX clients.
	   * BUG 15689: Can't add/delete special keys to keytab for nfs, cifs, http etc.
	CHANGES SINCE 4.21.0rc1
	   * BUG 15673: --version-* options are still not ergonomic, and they reject
	     tilde characters.
	   * BUG 15686: Add new vfs_ceph module (based on low level API)
	   * BUG 15673: --version-* options are still not ergonomic, and they reject
	     tilde characters.
	   * BUG 15690: ldb_version.h is missing from ldb public library
	   * BUG 15689: Can not add/delete special keys to keytab for nfs, cifs, http etc
	   * BUG 15686: Add new vfs_ceph module (based on low level API)
	   * BUG 15673: --version-* options are still not ergonomic, and they reject
	     tilde characters.
	   * BUG 15687: undefined reference to winbind_lookup_name_ex
	   * BUG 15688: per user veto and hide file syntax is to complex
	   * BUG 15689: Can not add/delete special keys to keytab for nfs, cifs, http etc
	   * BUG 15688: per user veto and hide file syntax is to complex

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-09-22 14:41:38 +00:00
Peter Müller
ea4ac5f619 OpenSSH :Update to 9.9p1
Please refer to https://www.openssh.com/releasenotes.html#9.9p1
for the release announcement of this version.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-09-22 14:40:07 +00:00
Peter Müller
578b22e4d7 apr: Update to 1.7.5
Full changelog of this release:

  *) SECURITY: CVE-2023-49582: Apache Portable Runtime (APR):
     Unexpected lax shared memory permissions (cve.mitre.org)
     Lax permissions set by the Apache Portable Runtime library on
     Unix platforms would allow local users read access to named
     shared memory segments, potentially revealing sensitive
     application data.
     This issue does not affect non-Unix platforms, or builds with
     APR_USE_SHMEM_SHMGET=1 (apr.h)
     Users are recommended to upgrade to APR version 1.7.5, which
     fixes this issue.
     Credits: Thomas Stangner

  *) Unix: Implement apr_shm_perms_set() for the "POSIX shm_open()"
     and "classic mmap" shared memory implementations.  [Joe Orton,
     Ruediger Pluem]

  *) Fix missing ';' for XML/HTML hex entities from apr_escape_entity().
     [Yann Ylavic]

  *) Fix crash in apr_pool_create() with --enable-pool-debug=all|owner.
     [Yann Ylavic]

  *) Improve platform detection by updating config.guess and config.sub.
     [Rainer Jung]

  *) CMake: Add support for CMAKE_WARNING_AS_ERROR. [Ivan Zhakov]

  *) CMake: Enable support for MSVC runtime library selection by abstraction.
     [Ivan Zhakov]

  *) CMake: Export installed targets (libapr-1, apr-1, libaprapp-1, aprapp-1)
     to apr:: namespace. [Ivan Zhakov]

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-09-22 14:38:08 +00:00
Adolf Belka
5b75ddfff2 collectd: Fixes bug-13074, create collectd.d directory
- As requested in bug 13074, create a collectd.d directory to enable any addon definitions
   to be created.
- Added include statement in conf file to load everything that is stored in the collectd.d
   directory.
- collectd.precache and collectd.thermal have been left in their original locations
- Removed the arm section in the initscript as only aarch64 is now used.
- Modified the lfs to create the collectd.d directory
- Removal of collectd.custom file as this was the previous way to define custom collectd
   profiles but would have been overwritten by any update of collectd.
- Update of rootfile to take account of new path and removal of collectd.custom
- Tested out in vm testbed with Core Update 188 and all existing graphs were still created
   and updated. From my evaluation the changes have not affected anything.
- The creation of the collectd.d directory now allows users to add their own desired
   profiles but also if it is decided that an addon should be included in the processes
   graph, or if a new graph for addons is created then profiles for that addon can be
   placed in the collectd.d directory and will be automatically included by collectd.

Fixes: Bug13074
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-09-22 14:18:12 +00:00
Adolf Belka
0953f7f0ea logwatch: Fixes bug13762 - ssh logins not shown on Log Summary page
- Due to the update of openssh to version 9.8 in CU187, logwatch no longer found the sshd
   login data from the messages log as the daemon was changed to sshd-session.
- Therefore the daily logwatch files were missing the sshd information in them.
- A patch to add support for openssh-9.8 sshd-session and port info has been merged into
   the logwatch git system and will be included into the next released version of logwatch
- Update logwatch from version 7.8 to 7.11 and add patch for openssh-9.8 support.
- Update the previous three logwatch patches for version 7.11
- Tested on my vm testbed. Confirmed that logwatch now includes back the sshd information
   into the Log Summary page.
- When logwatch is updated to version 7.12 then the openssh-9.8 support patch will be able
   to be removed.

Fixes: bug13762
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-09-22 14:16:43 +00:00
Michael Tremer
b5caa92612 Config: Fix determining the package size
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-09-21 12:24:58 +00:00
Peter Müller
9cd56aa17c ca-certificates: Update root CA certificates bundle
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-09-20 13:06:47 +00:00
Michael Tremer
fc4ba90b43 wlanap.cgi: Disable generating Perl warnings
Reported-by: Waynie <waynet@ucpix.de>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-09-20 11:30:52 +01:00
Michael Tremer
8241cf686f Merge branch 'master' into next 2024-09-18 10:07:13 +00:00
Michael Tremer
3cd62a7c4c Merge branch 'core188' 2024-09-18 10:06:54 +00:00
Michael Tremer
0694e7e45f ncat: Fix rootfile and bump release
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-09-18 10:06:24 +00:00
Adolf Belka
9b27b7f12d ninja: Update to version 1.12.1
- Update from version 1.11.1 to 1.12.1
- Update of rootfile not required
- Changelog
    1.12.1
	Bugfixes:
	    Screen updates extremely slow on Windows #2435
	    Dry run error if the build directory does not exist #2431
	    New critical path scheduler performance improvements #2443
    1.12.0
	    Critical path scheduler which orders the jobs by their runtime history #2177
	     This may break your build if you haven't specified your dependencies
	     correctly.
	    Resiliency against inputs changing during the build #1943
	    Reliable ETA and progress percentage in status #1963
	    Support for path lengths over 260 characters on Windows #1900
	    ARM binaries are now available for Windows and Linux, too
	    Several bugfixes

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-09-16 17:09:19 +00:00
Adolf Belka
45e6b99e7e nginx: Update to version 1.26.2
- Update from version 1.26.1 to 1.26.2
- Update of rootfile not required
- CVE Fix in this version
- Changelog
    1.26.2
	    *) Security: processing of a specially crafted mp4 file by the
	       ngx_http_mp4_module might cause a worker process crash
	       (CVE-2024-7347).
	       Thanks to Nils Bars.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-09-16 17:09:13 +00:00
Adolf Belka
debdb60e31 nfs: Update to version 2.7.1
- Update from version 2.6.4 to 2.7.1
- Update of rootfile
- Changelog is a list of all the commits and it is made available in the file
   2.7.1-Changelog in the sourceforge site
    https://sourceforge.net/projects/nfs/files/nfs-utils/2.7.1/

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-09-16 17:09:06 +00:00
Adolf Belka
429901b419 nettle: Update to version 3.10
- Update from version 3.9 to 3.10
- Update of rootfile
- Changelog
    3.10
	This is a maintenance release, including a few each of bug
	 fixes, new features and optimizations.
	The new version is intended to be fully source and binary
	 compatible with Nettle-3.6. The shared library names are
	 libnettle.so.8.9 and libhogweed.so.6.9, with sonames
	 libnettle.so.8 and libhogweed.so.6.
	Bug fixes:
		* Add missing hash functions sha512_224 and sha512_256 to the
		  nettle_get_hashes() list. The name values in the
		  corresponding nettle_hash structs also changed to use
		  underscore instead of dash, for consistency.
		* Fix a few cases of formally undefined calls to memcpy(dst,
		  NULL, 0), resulting from valid calls to, e.g.,
		  sha256_update(ctx, 0, NULL).
	New features:
		* Support RSA-OAEP encryption. Contributed by Nicolas Mora and
		  Daiki Ueno.
		* New function sha3_256_shake_output, new functions
		  sha3_128_init, sha3_128_update, sha3_128_shake,
		  sha3_128_shake_output. Contributed by Daiki Ueno.
		* Added DRBG-CTR with AES256, contributed by Simon Josefsson.
	Optimizations:
		* New combined gcm-aes assembly for powerpc64, contributed by
		  Danny Tsen.
		* New sha256 assembly for powerpc64, contributed by Eric
	          Richter.
		* Improved performance for powerpc64 AES decrypt, by skipping
		  subkey transformations that don't suit the vncipher
		  instructions.
		* Add arm64 CPU feature detection for Android and for Apple systems,
		  contributed by Foolbar and Tim Kosse, prespectively.
	Miscellaneous:
		* New tests for side-channel silence, based on valgrind.
		* Delete all md5 assembly code. Delete all sparc32 assembly code.
    3.9.1
	This is a bugfix release, fixing a few bugs reported for
	 Nettle-3.9. The bug in the new OCB code may be exploitable for
	 denial of service or worse, since triggering it leads to
	 memory corruption. Upgrading from Nettle-3.9 to the new
	 version is strongly recommended.
	The new version is intended to be fully source and binary
	 compatible with Nettle-3.6. The shared library names are
	 libnettle.so.8.8 and libhogweed.so.6.8, with sonames
	 libnettle.so.8 and libhogweed.so.6.
	Bug fixes:
		* Fix OCB loop for processing messages of size 272 bytes or
		  larger. Reported and fixed by Jussi Kivilinna.
		* Fix alignment bug in the new x86_64 non-pclmul assembly
		  implementation of ghash. Reported by Henrik Grubbström.
		* Fix build-time memory leak in eccdata. Reported by Noah
		  Watkins.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-09-16 17:08:36 +00:00
Adolf Belka
9bdcb96bbb netatalk: Update to version 3.2.8
- Update from version 3.2.5 to 3.2.8
- Update of rootfile not required
- Changelog
    3.2.8
	* UPD: Bump bundled WolfSSL library to stable version 5.7.2, GitHub #1433
	       Resolves CVE-2024-1544, CVE-2024-5288, CVE-2024-5991, CVE-2024-5814
	* UPD: Revert local modifications to the bundled WolfSSL library, GitHub #1432
	* FIX: Enable building against a shared WolfSSL 5.7.2 library, GitHub #1421
	* FIX: meson: Do not define rpath with a linker argument, GitHub #1443
    3.2.7
	* NEW: meson: Ability to control the run-time linker path config file,
	       GitHub #1396
	       New boolean Meson option: `-Dwith-ldsoconf'
	       When set to false, do not create /etc/ld.so.conf.d/libatalk.conf
	* BREAKING: meson: Enable rpath by default, while disabling ldsoconf
	       by default, GitHub #1417
	* FIX: meson: Allow ldconfig to run unprivileged during setup, GitHub #1407
	* FIX: docker: Add entry script step to clean up any residual lock file,
	       GitHub #1412
	* NEW: docker: Ship a docker-compose.yml sample file, GitHub #1414
	* NEW: docker: Check for AFP_USER and AFP_PASS when launching container,
	       GitHub #1415
    3.2.6
	* BREAKING: meson: Refresh the dynamic linker cache when installing on Linux,
	       GitHub #1386
	       This fixes the issue of the libatalk.so shared library not being found
	       when configuring with a non-standard library path, e.g. /usr/local/lib .
	       New Meson option `-Dwith-install-hooks' controls this behavior,
	       allowing you to disable the install hook in non-privileged environments.
	       On Linux systems with glibc, we now install the following config file:
	       /etc/ld.so.conf.d/libatalk.conf
	* BREAKING: meson: Introduce option to control which manual l10n to build,
	       GitHub #1390
	       New Meson option `-Dwith-manual-l10n' default to empty, can be set to
	       `ja' to build the Japanese localization of the html manual.
	       This changes the default behavior of the build system
	       to not build the Japanese html manual by default.
	* BREAKING: meson: Install htmldocs into htmldocs subdir, GitHub #1391
	       Previously, the html manual files were installed into the root
	       of the netatalk doc directory. Now they are put under netatalk/htmldocs .
	* BREAKING: meson: Use modern linker flag for rpath, remove dtags override,
	       GitHub #1384
	       When configuring with `-Dwith-rpath=true' the linker flags
	       `-Wl,-rpath,' will be prepended instead of the old `-R' flag.
	       On Linux platforms, we no longer prepend `-Wl,--enable-new-dtags',
	       either.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-09-16 17:08:27 +00:00
Adolf Belka
b5f4ca0b0d lvm2: Update to version 2.03.26
- Update from version 2.03.23 to 2.03.26
- Update of rootfile not required
- Changelog
    2.03.26
	  Fix internal error reported by pvmove on a VG with single PV.
	  Also accept --mknodes --refresh for vgscan.
	  Fix vgmknodes --refresh to wait for udev before checking /dev content.
	  Use log/report_command_log=1 config setting by default for JSON output format.
	  Fix unreleased memory pools on RAID lvextend.
	  Add --integritysettings option to manipuilate dm-integrity settings.
    2.03.25
	  Utilize more radix_tree instead of dm_hash and btree.
	  Refactor DM uuid caching from device_mapper directory.
	  Enhance checking for DM uuid device.
	  Fix lvm shell command completion on tab key (2.03.24).
	  Avoid lockd_vg call to lvmlockd for local VGs.
	  Allow forced change of locktype from none.
	  Handle OPTIONS defined in /etc/sysconfig/lvmlockd.
    2.03.24
	  Lvconvert supports VDO options for thin-pool with vdo conversion.
	  Improve placement to .data.rel.ro and .rodata sections.
	  Fix support for -y and -W when creating thinpool with vdo.
	  Bettter support for runtime valgrind detection.
	  Allow command interruption when communicating with dmeventd.
	  Fix resize of VDO volume used for thin pool data volume.
	  Use -Wl,-z,now and -Wl,--as-needed for compilation by default.
	  Require 3.7 as minimal version for sanlock.
	  Share code for closing opened desriptors on program startup.
	  Fix memleak in lvmcache.
	  Add configure --with-default-event-activation=ON setting.
	  Fix return value from reporter function when hitting internal error.
	  Skip checking of pools for lvremove and vgremove commands.
	  VDO modprobes dm-vdo for 6.9 kernel and kvdo for older kernel version.
	  Fix lvs reporting for VDO volumes with new upstream kernel driver.
	  Don't import DM_UDEV_DISABLE_OTHER_RULES_FLAG in LVM rules, DM rules cover it.
	  Fix table line generation for cache snapshots using cachevol.
	  Enhance lvconvert support for external origins stacking.
	  When swapping LV names also swap properties like hostname, time and data.
	  Fix removal of stacked external origins.
	  Lock filesystem when converting volume to read-only external origin.
	  Support external origin between different thin-pool.
	  Improve validation of acceptable volumes for external origins.
	  Reduce amount of preloaded devices for complex device trees.
	  Avoid logging problems from monitoring snapshots with inactive origins.
	  Check for cache policy module presence in kernel's builtin modules file.
	  Add configure --with-modulesdir to select kernel modules directory.
	  Support creation of thin-pool with VDO use for its data volume.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-09-16 17:08:09 +00:00
Adolf Belka
5e96ac7ff6 logrotate: Update to version 3.22.0
- Update from version 3.21.0 to 3.22.0
- Update for rootfile not required
- autogen.sh step not required as configure file has been available in source tarball
   since version 3.10.0 in 2016
- xz version of logrotate available so changed to that.
- Changelog
   3.22.0
	 - fix calculations for time differences (#516)
	 - fix extension for zip compression (#545)
	 - fix omitted copy for logs with `mail` and `rotate 0` (#553)
	 - fix wrongly skipping copy with `copytruncate` and `compress` (#553)
	 - fix ambiguities between `mode`, `UID` and `GID` parsing when not specifying all options (#575)
	 - fix hang when encountering a named pipe (#607)
	 - on prerotate failure logs are preserved instead of rotated (#506)
	 - in case a configuration file was skipped due to unsafe permissions the
	   exit status after rotattion will be `1` (#508)
	 - the state is no longer written to non-regular files (#529)
	 - the systemd timer now correctly utilizes load distribution (#574)
	 - add dateformat specifier `%z` for timezone offsets (#594)
	 - change default mode for created `olddir` directories to `0755` (#560)
	 - support quoted user and group names in `su`, `create`, and `createolddir` (#575)

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-09-16 17:07:45 +00:00
Adolf Belka
ec10ee56b2 lmdb: Update to version 0.9.33
- Update from 0.9.31 to 0.9.33
- Update of rootfile not required
- Changelog
    0.9.33
	ITS#9037 mdb_page_search: fix error code when DBI record is missing
	ITS#10198 For win32, stop passing ignored parameter
	ITS#10212 Fix meta page usage by read only tools
    0.9.32
	ITS#9378 - Add ability to replay log and replay log tool
	ITS#10095 - partial revert of ITS#9278. The patch was incorrect and introduced numerous race conditions.
	ITS#10125 - mdb_load: fix cursor reinit in Append mode
	ITS#10137 - Allow users to define MDB_IDL_LOGN

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-09-16 17:07:20 +00:00