Commit Graph

19093 Commits

Author SHA1 Message Date
Adolf Belka
32393c0420 gnutls: Update to version 3.7.6
- Update from version 3.6.16 to 3.7.6
- Update of rootfile
- find-dependencies run on sobump libs. No dependencies flagged for the old or new libs
- Changelog
    * Version 3.7.6 (released 2022-05-27)
	** libgnutls: Fixed invalid write when gnutls_realloc_zero()
	   is called with new_size < old_size. This bug caused heap
	   corruption when gnutls_realloc_zero() has been set as gmp
	   reallocfunc (!1592, #1367, #1368, #1369).
	** API and ABI modifications:
	No changes since last version.
    * Version 3.7.5 (released 2022-05-15)
	** libgnutls: The GNUTLS_NO_TICKETS_TLS12 flag and %NO_TICKETS_TLS12 priority
	   modifier have been added to disable session ticket usage in TLS 1.2 because
	   it does not provide forward secrecy (#477).  On the other hand, since session
	   tickets in TLS 1.3 do provide forward secrecy, the PFS priority string now
	   only disables session tickets in TLS 1.2.  Future backward incompatibility:
	   in the next major release of GnuTLS, we plan to remove those flag and
	   modifier, and make GNUTLS_NO_TICKETS and %NO_TICKETS only affect TLS 1.2.
	** gnutls-cli, gnutls-serv: Channel binding for printing information
	   has been changed from tls-unique to tls-exporter as tls-unique is
	   not supported in TLS 1.3.
	** libgnutls: Certificate sanity checks has been enhanced to make
	   gnutls more RFC 5280 compliant (!1583).
	   Following changes were included:
	   - critical extensions are parsed when loading x509
	     certificate to prohibit any random octet strings.
	     Requires strict-x509 configure option to be enabled
	   - garbage bits in Key Usage extension are prohibited
	   - empty DirectoryStrings in Distinguished name structures
	     of Issuer and Subject name are prohibited
	** libgnutls: Removed 3DES from FIPS approved algorithms (#1353).
	   According to the section 2 of SP800-131A Rev.2, 3DES algorithm
	   will be disallowed for encryption after December 31, 2023:
	   https://csrc.nist.gov/publications/detail/sp/800-131a/rev-2/final
	** libgnutls: Optimized support for AES-SIV-CMAC algorithms (#1217, #1312).
	   The existing AEAD API that works in a scatter-gather fashion
	   (gnutls_aead_cipher_encryptv2) has been extended to support AES-SIV-CMAC.
	   For further optimization, new function (gnutls_aead_cipher_set_key) has been
	   added to set key on the existing AEAD handle without re-allocation.
	** libgnutls: HKDF and AES-GCM algorithms are now approved in FIPS-140 mode
	   when used in TLS (#1311).
	** The configure arguments for Brotli and Zstandard (zstd) support
	   have changed to reflect the previous help text: they are now
	   --with-brotli/--with-zstd respectively (#1342).
	** Detecting the Zstandard (zstd) library in configure has been
	   fixed (#1343).
	** API and ABI modifications:
	GNUTLS_NO_TICKETS_TLS12: New flag
	gnutls_aead_cipher_set_key: New function
    * Version 3.7.4 (released 2022-03-17)
	** libgnutls: Added support for certificate compression as defined in RFC8879
	   (#1301). New API functions (gnutls_compress_certificate_get_selected_method
	   and gnutls_compress_certificate_set_methods) allow client and server to set
	   their preferences.
	** certtool: Added option --compress-cert that allows user to specify
	   compression methods for certificate compression.
	** libgnutls: GnuTLS can now be compiled with --enable-strict-x509 configure
	   option to enforce stricter certificate sanity checks that are compliant with
	   RFC5280.
	** libgnutls: Removed IA5String type from DirectoryString within issuer
	   and subject name to make DirectoryString RFC5280 compliant.
	** libgnutls: Added function (gnutls_record_send_file) to send file content from
	   open file descriptor (!1486). The implementation is optimized if KTLS (kernel
	   TLS) is enabled.
	** libgnutls: Added function (gnutls_ciphersuite_get) to retrieve the name of
	   current ciphersuite from TLS session (#1291).
	** libgnutls: The run-time dependency on tpm2-tss is now re-implemented using
	   dlopen, so GnuTLS does not indirectly link to other crypto libraries until
	   TPM2 functionality is utilized (!1544).
	** API and ABI modifications:
	GNUTLS_COMP_BROTLI: New gnutls_compression_method_t enum member
	GNUTLS_COMP_ZSTD: New gnutls_compression_method_t enum member
	gnutls_compress_certificate_get_selected_method: Added
	gnutls_compress_certificate_set_methods: Added
	gnutls_ciphersuite_get: New function
	gnutls_record_send_file: New function
	libgnutlsxx: Soname bumped due to ABI breakage introduced in 3.7.1
    * Version 3.7.3 (released 2022-01-17)
	** libgnutls: The allowlisting configuration mode has been added to the system-wide
	   settings. In this mode, all the algorithms are initially marked as insecure
	   or disabled, while the applications can re-enable them either through the
	   [overrides] section of the configuration file or the new API (#1172).
	** The build infrastructure no longer depends on GNU AutoGen for generating
	   command-line option handling, template file parsing in certtool, and
	   documentation generation (#773, #774). This change also removes run-time or
	   bundled dependency on the libopts library, and requires Python 3.6 or later
	   to regenerate the distribution tarball.
	   Note that this brings in known backward incompatibility in command-line
	   tools, such as long options are now case sensitive, while previously they
	   were treated in a case insensitive manner: for example --RSA is no longer a
	   valid option of certtool. The existing scripts using GnuTLS tools may need
	   adjustment for this change.
	** libgnutls: The tpm2-tss-engine compatible private blobs can be loaded and
	   used as a gnutls_privkey_t (#594). The code was originally written for the
	   OpenConnect VPN project by David Woodhouse. To generate such blobs, use the
	   tpm2tss-genkey tool from tpm2-tss-engine:
	   https://github.com/tpm2-software/tpm2-tss-engine/#rsa-operations
	   or the tpm2_encodeobject tool from unreleased tpm2-tools.
	** libgnutls: The library now transparently enables Linux KTLS
	   (kernel TLS) when the feature is compiled in with --enable-ktls configuration
	   option (#1113). If the KTLS initialization fails it automatically falls back
	   to the user space implementation.
	** certtool: The certtool command can now read the Certificate Transparency
	   (RFC 6962) SCT extension (#232).  New API functions are also provided to
	   access and manipulate the extension values.
	** certtool: The certtool command can now generate, manipulate, and evaluate
	   x25519 and x448 public keys, private keys, and certificates.
	** libgnutls: Disabling a hashing algorithm through "insecure-hash"
	   configuration directive now also disables TLS ciphersuites that use it as a
	   PRF algorithm.
	** libgnutls: PKCS#12 files are now created with modern algorithms by default
	   (!1499).  Previously certtool used PKCS12-3DES-SHA1 for key derivation and
	   HMAC-SHA1 as an integity measure in PKCS#12.  Now it uses AES-128-CBC with
	   PBKDF2 and SHA-256 for both key derivation and MAC algorithms, and the
	   default PBKDF2 iteration count has been increased to 600000.
	** libgnutls: PKCS#12 keys derived using GOST algorithm now uses
	   HMAC_GOSTR3411_2012_512 instead of HMAC_GOSTR3411_2012_256 for integrity, to
	   conform with the latest TC-26 requirements (#1225).
	** libgnutls: The library now provides a means to report the status of approved
	   cryptographic operations (!1465). To adhere to the FIPS140-3 IG 2.4.C., this
	   complements the existing mechanism to prohibit the use of unapproved
	   algorithms by making the library unusable state.
	** gnutls-cli: The gnutls-cli command now provides a --list-config option to
	   print the library configuration (!1508).
	** libgnutls: Fixed possible race condition in
	   gnutls_x509_trust_list_verify_crt2 when a single trust list object is shared
	   among multiple threads (#1277). [GNUTLS-SA-2022-01-17, CVSS: low]
	** API and ABI modifications:
	GNUTLS_PRIVKEY_FLAG_RSA_PSS_FIXED_SALT_LENGTH: new flag in gnutls_privkey_flags_t
	GNUTLS_VERIFY_RSA_PSS_FIXED_SALT_LENGTH: new flag in gnutls_certificate_verify_flags
	gnutls_ecc_curve_set_enabled: Added.
	gnutls_sign_set_secure: Added.
	gnutls_sign_set_secure_for_certs: Added.
	gnutls_digest_set_secure: Added.
	gnutls_protocol_set_enabled: Added.
	gnutls_fips140_context_init: New function
	gnutls_fips140_context_deinit: New function
	gnutls_fips140_push_context: New function
	gnutls_fips140_pop_context: New function
	gnutls_fips140_get_operation_state: New function
	gnutls_fips140_operation_state_t: New enum
	gnutls_transport_is_ktls_enabled: New function
	gnutls_get_library_configuration: New function
    * Version 3.7.2 (released 2021-05-29)
	** libgnutls: The priority string option %DISABLE_TLS13_COMPAT_MODE was added
	   to disable TLS 1.3 middlebox compatibility mode
	** libgnutls: The Linux kernel AF_ALG based acceleration has been added.
	   This can be enabled with --enable-afalg configure option, when libkcapi
	   package is installed (#308).
	** libgnutls: Fixed timing of early data exchange. Previously, the client was
	   sending early data after receiving Server Hello, which not only negates the
	   benefit of 0-RTT, but also works under certain assumptions hold (e.g., the
	   same ciphersuite is selected in initial and resumption handshake) (#1146).
	** certtool: When signing a CSR, CRL distribution point (CDP) is no longer
	   copied from the signing CA by default (#1126).
	** libgnutls: The GNUTLS_NO_EXPLICIT_INIT envvar has been renamed to
	   GNUTLS_NO_IMPLICIT_INIT to reflect the purpose (#1178). The former is now
	   deprecated and will be removed in the future releases.
	** certtool: When producing certificates and certificate requests, subject DN
	   components that are provided individually will now be ordered by
	   assumed scale (e.g. Country before State, Organization before
	   OrganizationalUnit).  This change also affects the order in which
	   certtool prompts interactively.  Please rely on the template
	   mechanism for automated use of certtool! (#1243)
	** API and ABI modifications:
	gnutls_early_cipher_get: Added
	gnutls_early_prf_hash_get: Added
	** guile: Writes to a session record port no longer throw an exception upon
	   GNUTLS_E_AGAIN or GNUTLS_E_INTERRUPTED.
    * Version 3.7.1 (released 2021-03-10)
	** libgnutls: Fixed potential use-after-free in sending "key_share"
	   and "pre_shared_key" extensions. When sending those extensions, the
	   client may dereference a pointer no longer valid after
	   realloc. This happens only when the client sends a large Client
	   Hello message, e.g., when HRR is sent in a resumed session
	   previously negotiated large FFDHE parameters, because the initial
	   allocation of the buffer is large enough without having to call
	   realloc (#1151).  [GNUTLS-SA-2021-03-10, CVSS: low]
	** libgnutls: Fixed a regression in handling duplicated certs in a
	   chain (#1131).
	** libgnutls: Fixed sending of session ID in TLS 1.3 middlebox
	   compatibiltiy mode. In that mode the client shall always send a
	   non-zero session ID to make the handshake resemble the TLS 1.2
	   resumption; this was not true in the previous versions (#1074).
	** libgnutls: W32 performance improvement with a new sendmsg()-like
	   transport implementation (!1377).
	** libgnutls: Removed dependency on the external 'fipscheck' package,
	   when compiled with --enable-fips140-mode (#1101).
	** libgnutls: Added padlock acceleration for AES-192-CBC (#1004).
	** API and ABI modifications:
	No changes since last version.
    * Version 3.7.0 (released 2020-12-02)
	** libgnutls: Depend on nettle 3.6 (!1322).
	** libgnutls: Added a new API that provides a callback function to
	   retrieve missing certificates from incomplete certificate chains
	   (#202, #968, #1100).
	** libgnutls: Added a new API that provides a callback function to
	   output the complete path to the trusted root during certificate
	   chain verification (#1012).
	** libgnutls: OIDs exposed as gnutls_datum_t no longer account for the
	   terminating null bytes, while the data field is null terminated.
	   The affected API functions are: gnutls_ocsp_req_get_extension,
	   gnutls_ocsp_resp_get_response, and gnutls_ocsp_resp_get_extension
	   (#805).
	** libgnutls: Added a new set of API to enable QUIC implementation (#826, #849,
	   #850).
	** libgnutls: The crypto implementation override APIs deprecated in 3.6.9 are
	   now no-op (#790).
	** libgnutls: Added MAGMA/KUZNYECHIK CTR-ACPKM and CMAC support (!1161).
	** libgnutls: Support for padlock has been fixed to make it work with Zhaoxin
	   CPU (#1079).
	** libgnutls: The maximum PIN length for PKCS #11 has been increased from 31
	   bytes to 255 bytes (#932).
	** API and ABI modifications:
	gnutls_x509_trust_list_set_getissuer_function: Added
	gnutls_x509_trust_list_get_ptr: Added
	gnutls_x509_trust_list_set_ptr: Added
	gnutls_session_set_verify_output_function: Added
	gnutls_record_encryption_level_t: New enum
	gnutls_handshake_read_func: New callback type
	gnutls_handshake_set_read_function: New function
	gnutls_handshake_write: New function
	gnutls_handshake_secret_func: New callback type
	gnutls_handshake_set_secret_function: New function
	gnutls_alert_read_func: New callback type
	gnutls_alert_set_read_function: New function
	gnutls_crypto_register_cipher: Deprecated; no-op
	gnutls_crypto_register_aead_cipher: Deprecated; no-op
	gnutls_crypto_register_mac: Deprecated; no-op
	gnutls_crypto_register_digest: Deprecated; no-op

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-07-09 09:07:44 +00:00
Peter Müller
2f3fd8ea83 Core Update 170: Ship OpenSSL
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-07-09 08:58:51 +00:00
Adolf Belka
a1de638491 openssl: Update to version 1.1.1q
- Update from version 1.1.1p to 1.1.1q
- Update of rootfile not required
- Changelog
   Changes between 1.1.1p and 1.1.1q [5 Jul 2022]
     (CVE-2022-2097) Severity: Moderate
        AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimised
        implementation would not encrypt the entirety of the data under some
        circumstances.  This could reveal sixteen bytes of data that was
        preexisting in the memory that wasn't written.  In the special case of
        "in place" encryption, sixteen bytes of the plaintext would be revealed.
        Since OpenSSL does not support OCB based cipher suites for TLS and DTLS,
        they are both unaffected.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2022-07-09 08:58:35 +00:00
Peter Müller
7f623de323 Revert "Core Update 169: Delete unused initrd on 32-bit ARM to save space in /boot"
This reverts commit 5ead33d796.
2022-07-07 13:55:29 +00:00
Peter Müller
5ead33d796 Core Update 169: Delete unused initrd on 32-bit ARM to save space in /boot
On 64-bit ARM, this is still needed for booting. Since the initrds were
already shipped with the updater, there is no need to regenerate them
locally again.

https://community.ipfire.org/t/again-with-the-file-system-full-core-169/8186

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-07-07 13:52:09 +00:00
Peter Müller
b317b60a3e Core Update 170: Ship lsof
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-07-06 19:21:32 +00:00
Adolf Belka
a93d062979 lsof: Update to version 4.95.0
- Update from version 4.91 to 4.95.0
- version 4.91 was the last version provided bia purdue.edu after which they stopped
   maintaining it. It is now taken over ny the lsof-org team at Github.
   https://github.com/lsof-org/lsof
- Update of rootfile not required - only one line in the rootfile
- Changelog
   lsof-4.95.0-linux
	[n+obsd] fix syntax error
	 Corrected end of comment.
	 This change closes #138.
	 @albert-github reported this issue in #138,
	 and provided the fix in #140
	Don't ignore failures in test/Makefile
	 Tobias Geerinckx-Rice <me@tobias.gr> provides the fix.
	Update perl scripts for the past few decades of progress
	 Generally, perl is available on base systems - people who are manually
	 installing perl into /usr/local/bin are the exception rather than the
	 rule. In addition, Perl 5 was release in 1994, so Perl 4 isn't relevant
	 any more. We've also standardized on the .pl extension, rather than
	 .perl5 or whatever.
	 Provided by @dilinger (Andres Salomon) in #149.
	 A commit in the pull request includes work of Nicholas Bamber.
	Drop LSOF_CCDATE across all dialects to ensure reproducible builds
	 Simplify things for reproducible builds by just getting rid of
	 the embedded date/time string. With LSOF_CCDATE gone, keeping
	 SOURCE_DATE_EPOCH around doesn't make much sense, so drop that as
	 well. Folks doing reproducible builds should still override the
	 LSOF_HOST, LSOF_LOGNAME, LSOF_SYSINFO, and LSOF_USER variables (as
	 they were previously doing before SOURCE_DATE_EPOCH).
	 Provided by @dilinger (Andres Salomon) in #150.
	[FreeBSD] get the ISO9660 filesystem working again
	 The ISO9660 filesystem broke starting with FreeBSD 7 due to the header
	 location changing. Fix the header search path to get it to be detected
	 again. Fix the header inclusion order. Also add the new way of finding
	 dev_t on more recent FreeBSD versions.
	 Provided by Damjan Jovanovic in #151.
	[FreeBSD] add support for msdosfs on FreeBSD
	 Provided by Damjan Jovanovic in #151.
	Fix FD field description.
	 In 811dc78 the output format was changed to not printf the `f`
	 field by default, however the field description in `lsof_fields.h`,
	 as seen in `-F?` output still included the `(always selected)` text.
	 Provided by @algorythmic (Grisha Levit) in #158.
	Adjust alignment of buffer passed to stat().
	 The original code passes char[] buffer to stat(). This can be cause
	 a SIGBUS. #160 reported an actual crash on armv7a + glibc-2.33 platform.
	 See also https://sourceware.org/bugzilla/show_bug.cgi?id=27993.
	 Reported by @10ne1 in #160.
	Clean up source code and documentats.
	 - remove trailing whitespace,
	 - fix some issues in scripts found through shellcheck, and
	 - fix spelling
	 Provided by @a1346054 in #163.
	man page: fix hyphen issues
	 Properly use '-' and '\-' in the man page, ensuring that users
	 can cut & paste commandline options without issue. Original
	 patch from Raoul Gunnar Borenius <borenius@dfn.de>, and
	 submitted/expanded by @dilinger (Andres Salomon) in #168.
	[FreeBSD] update for FreeBSD 13 & 14, and various internal changes
	 submitted by @DmitryAndric & @emaste.
	[FreeBSD] remove various old FreeBSD versions from support
	 submitted by @emaste
	[FreeBSD] configure: suggest variable to set if FreeBSD sys not
	 found
	 submitted by @emaste
	Fix broken LSOF_CFLAGS_OVERRIDE.
	 Provided by Fabrice Fontaine in #172.
	[linux] Remove sysvlegacy function.
	 Provided by Fabrice Fontaine in #195.
	[linux] use close_range instead of calling close repeatedly
	 At the starting up, lsof closes its file descriptors greater
	 than 2 by calling close(2) repeatedly. As reported in #186,
	 it can take long time. Linux 5.9 introduced close_range(2).
	The new system call can close multiple file descriptors faster.
	 @qianzhangyl reported the original issue (#186).
	Add -Q option for adjusting exit status when failed to find a
	 search item (#129)
	In the original code, lsof returned 1 when it failed to find a
	 search item. With the new option, lsof returns 0 in the case.
	Document -Q option in manpage/00QUICKSTART, and adjust -h
	 output by @dilinger (Andres Salomon) in #129.
	Improve readability of complex adverbial clause by adding a
	 comma.
	Provided by Danny Fowler in #156.
   lsof-4.94.0-linux
	(All changes in this version are ported from
	 lsof-org/lsof-linux repository at GitHub).
	Introduced a new test harness. The harness can run
	 test cases specific to a dialect. It is designed for
	 running test cases on CI environment like Travis-CI.
	 However, it is runnable locally with following command
	 line:
		$ ./check.sh DIALECT
	 after making lsof executable.
	[linux] Fixed a bug +|-E options output for pipe.
	 If two processes use the same fd number for a pipe
	 connecting them, the option didn't print the
	 information about it.
	[linux] Fixed a bug +|-E options output for PTY.
	 If two processes use the same fd number for a PTY
	 connecting them, the option didn't print the
	 information about it.
	[linux] Fixed a bug +|-E options output for PTY.
	 The code for detecting a slave device was incorrect.
	[linux] Fixed a potential bug +|-E options output for
	 PTY. A structure field for the feature was not
	 initialized.
	[linux] Added a code for decoding O_PATH flag in +fg
	 option.
	[linux] Added a code for decoding O_CLOEXEC flag as CX
	 in +fg option.
	[linux] Added a code for decoding O_TMPFILE flag as
	 TMPF in +fg option.
	[linux] Added Linux display of INET socket endpoint
	 information with +|-E option. The option handles
	 INET sockets using IPC.
	[linux] Added support for POSIX MQ of Linux
	 implementation.  A POSIX message queue (MQ) is
	 represented in a fd on Linux.  lsof reported it as a
	 regular file. lsof with this change reports it as a
	 file with PSXMQ type if mqueue file system is mounted.
	[linux] Added Linux display of POSIX message queue
	 endpoint information with +|-E option. mqueue file system
	 must be mounted to display the information.
	[linux] Added Linux display of INET6 socket endpoint
	 information with +|-E option. The option handles
	 INET6 sockets using IPC.
	[FreeBSD] update to include <sys/_lock.h> on recent -CURRENT
	 since it is no longer implicitly included via header pollution.
	[linux] Added Linux display of eventfd endpoint information
	 with +|-E option. The option handles eventfd using IPC.
	[FreeBSD] include <stdbool.h> for recent change requiring
	 refcount(9).
	Enhanced -r option. With `c<N>' specifier, lsof can stop itself
	 when the number of iterations reaches at <N>.
	[linux] Fixed accessing an uninitialized local variable.
	 Detected by valgrind.
	[linux] fix a crash when printing the endpoint for unaccepted
	 unix socket with +E option.
	 This closes the github issue #74 reported by @jolmg.
	[linux] abort execution when failing in memory allocation for
	 socket private data.
	[linux] decode the name of DCCP socket type.
	[linux] decode more netlink protocol numbers (RDMA, CRYPTO, and
	 SMC).
	[linux] print the connection state of unix domain socket
	 Lsof can print the state of TCP socket like:
		 nc      22247 yamato    3u  IPv4 471409      0t0        TCP localhost:38802->localhost:9999 (ESTABLISHED)
	 This change exnteds this feature to support unix domain sockets.
	 LISTEN, UNCONNECTED, CONNECTING, CONNECTED, DISCONNECTING,
	 and UNKNOWN can be taken as a state.
	 An example of output:
		 evince    17333  yamato    1u  unix 0x0000000054183795      0t0  89141 type=STREAM (CONNECTED)
	 This feature is enabled by default.
	 To turn off printing state information, use -T option.
	 Don't display command usage even when a file (or directory) listed
	 in command line doesn't exist.
	 This closes the github issue #90 reported by @rowlap.
	[FreeBSD] merge all the FreeBSD specific fixes from the FreeBSD sysutils/lsof port
	[linux] allow reproducible builds
	 In a reproducible build all varied information is removed.  This
	 change does so, by checking if the standard SOURCE_DATE_EPOCH
	 variable is set.  If it is, we are attempting a reproducible build
	 and will strip varying information.
	 About the standard, see https://reproducible-builds.org/specs/source-date-epoch/
	 Provided in github pull request #93 by @T4cC0re.
	[freebsd] update for r363214
	 - no user visible changes
	Added the way to include (or exclude) all numbered file descriptors
	 in -d option. "fd" is a pseudo file descriptor name for the purpose.
	 See the following output on Linux; lsof doesn't print cwd, rtd, txt,
	 and mem files.
	  # ./lsof -p $$ -a -d fd
	  COMMAND    PID USER   FD   TYPE DEVICE SIZE/OFF NODE NAME
	  bash    866421 root    0u   CHR  136,1      0t0    4 /dev/pts/1
	  bash    866421 root    1u   CHR  136,1      0t0    4 /dev/pts/1
	  bash    866421 root    2u   CHR  136,1      0t0    4 /dev/pts/1
	  bash    866421 root  255u   CHR  136,1      0t0    4 /dev/pts/1
	docs: fixed minor grammatical error in instructions in Customize file
	 The change is provided by @hardikpnsp.
	man page: improve phrasing and add examples
	 The change is provided by Martin D Kealey.
	man page: improve explanation of -t implying -w
	 The change is provided by Martin D Kealey.
	test cases, [linux]: fix tests for large inode-numbers (i >= 2^32)
	 The change is provided by Henry Peteet.
	[linux] handle ffff:ffff in ipv6 addr correctly
	 The listen address and port of an AF_INET6 socket were not display if
	 the socket listened at an ipv6 address including ffff:ffff.
	 Here is a command session demonstrating the bug:
	    # ip -6 addr add abcd:ef10:ffff:ffff:ffff:ffff:ffff:ff62 dev lo
	    # nc -6      -l  abcd:ef10:ffff:ffff:ffff:ffff:ffff:ff62 8888 &
	    [1] 6762
	    # ./lsof -p 6762 -a -d fd -P -n
	    COMMAND  PID   USER   FD   TYPE DEVICE SIZE/OFF    NODE NAME
	    nc      6762 yamato    0u   CHR  136,6      0t0       9 /dev/pts/6
	    nc      6762 yamato    1u   CHR  136,6      0t0       9 /dev/pts/6
	    nc      6762 yamato    2u   CHR  136,6      0t0       9 /dev/pts/6
	    nc      6762 yamato    3u  sock    0,9      0t0 5833594 protocol: TCPv6
	 The last line should be:
	    nc      6762 yamato    3u  IPv6 5833594      0t0  TCP [abcd:ef10:ffff:ffff:ffff:ffff:ffff:ff62]:8888 (LISTEN)
	 The original code decoding an ipv6 address uses UINT32_MAX constant
	 incorrect way.
	 @zhrf2020 reported this bug in #102.
	 @zhrf2020 provided the initial version of fix, #109.
	man page,[linux]: enumerate abbreviated flags printed with '+f g' option
	Make -Fo option work
	 -Fo option is for printing file offset. For regular files,
	 the option didn't work.
	 Here is a command session demonstrating the fix:
	    # ./lsof -Fo -o0| grep ^o | sort | uniq -c
	    90586 o0t0
	       87 o0t101
	       84 o0t103
	 ...
	 @JustAnotherArchivist reported this bug in #118.
	 man page: fix definition of the `o` field on programmatic output
	 The change is provided by @JustAnotherArchivist who reported
	 the original issue in #118.
	[linux]: show the pid monitored by a pidfd
	 With this change, lsof prints pidfd in the following form:
	    [pidfd:%d]
	 where %d represents the pid monitored by the pidfd.
	 Example output:
	    # ./lsof -p 12573 -p 12710 | grep pidfd
	    dbus-brok 12573  jet   11u  a_inode               0,13         0     13312 [pidfd:12575]
	    dbus-brok 12710  jet   10u  a_inode               0,13         0     13312 [pidfd:12711]
	 fd 11 of pid 12573 monitors pid 12575.
	 fd 10 of pid 12710 monitors pid 12711.
	 This change closed #116.
	 Don't select the file descriptor field by default.
	 The version 4.88 introduced the change for selecting the file
	 descriptor field by default. However, the change is not
	 suitable for users who wants to print only PID field.
	 @po5857 suggests the use case and the way to improve the man page.
	[linux]: enumerate fds monitored by an eventpoll fd
	 With this change, lsof prints an eventpoll fd in the following form:
	    [eventpoll:<fd0>,<fd1>,...,<fdn>...]
	 Here fdX is a file descriptor monitored by the eventpoll fd.
	 If an eventpoll fd monitors too many file descriptors, lsof
	 truncates the list of fds. "..." at the end of list implies
	 the truncation.
	 Example output:
		# sudo ./lsof -p 1 -a -d 10,11,12
		COMMAND PID USER   FD      TYPE DEVICE SIZE/OFF  NODE NAME
		systemd   1 root   10u  a_inode   0,13        0 11624 [eventpoll:11,12]
		systemd   1 root   11r      REG    0,4        0 17680 /proc/1/mountinfo
		systemd   1 root   12r  a_inode   0,13        0 11624 inotify
	 systemd monitors fd 11 and fd 12 via eventpoll fd 10.
	[linux]: implement "make check"
	 The target runs check.bash.
   4.93.2 May 8, 2019
        Update the version number embedded in lsof executable.
   lsof-4.93.1
     4.93.0 May 7, 2019
	[freebsd] Made FreeBSD 13 adjustment.
	[darwin] Fix a typo causing a build error.
	 Fix a potential memory leak.
	[linux] use tirpc for rpc if libc doesn't provide rpc.h.
	 Fix a typo in man page.
	[linux] fix memory leaks detected by valgrind about unix
	 endpoint information.
	Update the description about -fg and -fG options on linux.
     4.93.1 May 7, 2019
	Fix a broken symbolic link.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-07-06 19:21:19 +00:00
Peter Müller
20d4c7293a Run ./make.sh update-contributors
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-07-06 12:37:29 +00:00
Peter Müller
284efdbfb1 Core Update 170: Ship files affected by "aliases" changes
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-07-06 10:03:16 +00:00
Michael Tremer
72696db892 aliases: Don't call arpping to announce new IP addresses
I am not sure what the rationale is here, but we should probably not do
this. Other hosts on the network will be able to update their ARP caches
properly.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Acked-by: Peter Müller <peter.mueller@ipfire.org>
2022-07-06 10:01:50 +00:00
Michael Tremer
6395bed8a4 aliases: Add support to assign aliases to multiple RED interfaces
This is a little patch which will extend the aliases page to offer an
interface selection if there are more than one RED interfaces.

This is a little hack to make configuration easier for users who have
manually set up more than one RED interface (e.g. for load balancing or
fail-over) and want to use the UI to configure firewall rules.

As a little benefit on the side, I had to rewrite setaliases.c to use
ip(8) instead of ifconfig(8).

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Acked-by: Peter Müller <peter.mueller@ipfire.org>
2022-07-06 10:01:50 +00:00
Peter Müller
f704d76e08 dnsdist: Bump package version
https://lists.ipfire.org/pipermail/development/2022-July/013794.html

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-07-06 10:00:57 +00:00
Robin Roevens
50fdf0ee9c zabbix_agentd: Add IPFire specific userparameters
Provide IPFire specific items for the Zabbix server to monitor:
- ipfire.net.gateway.pingtime: Internet Line Quality
- ipfire.net.gateway.ping: Internet connection
- ipfire.net.fw.hits.raw: JSON formatted list of Firewall hits/chain
- ipfire.dhcpd.clients: Number of active DHCP leases
- ipfire.captive.clients: Number of Captive Portal clients

Signed-off-by: Robin Roevens <robin.roevens@disroot.org>
2022-07-06 09:57:40 +00:00
Robin Roevens
1898c66a48 zabbix_agentd: By default only listen on GREEN ip
- Change zabbix_agentd.conf during install to only listen on the
  GREEN ip by default.

Signed-off-by: Robin Roevens <robin.roevens@disroot.org>
2022-07-06 09:57:40 +00:00
Robin Roevens
092330b128 zabbix_agentd: Sudoers file reorganization
- Remove sudoers file 'zabbix' in favour of new IPFire managed
  'zabbix_agentd' and user managed 'zabbix_agentd_user' which is
  included in the backup
- Provide migration of old sudoers file 'zabbix' or 'zabbix.user' to
  new zabbix_agentd_user sudoers file if it was modified by user.

Signed-off-by: Robin Roevens <robin.roevens@disroot.org>
2022-07-06 09:57:40 +00:00
Robin Roevens
e2d54d57d4 zabbix_agentd: Configfile reorganization
- Restrict default main config to only the bare minimum options
  and add upstream provided config as example file.
- Remove /etc/zabbix_agentd from backup and instead add only
  zabbix_agentd.conf and subdirs 'scripts' and 'zabbix_agentd.d' to
  the backup.
- Move ipfire managed userparameter_pakfire.conf from
  user managed dir /etc/zabbix_agentd/zabbix_agent.d to
  ipfire managed dir /var/ipfire/zabbix_agentd/userparameters
- Add Include line to existing zabbix_agentd.conf to include
  the new ipfire managed config dir /var/ipfire/zabbix_agentd/...
- Add and include mandatory IPFire specific agent configuration
  which should never be changed by the user.

Signed-off-by: Robin Roevens <robin.roevens@disroot.org>
2022-07-06 09:57:40 +00:00
Robin Roevens
1d00837e7e zabbix_agentd: Fix agent modules dir and few minor bugs
- Add agent modules-dir to backup
- Remove original, not used agent modules dir from rootfile
- Create modules-dir during install if it not already exists
- bugfix: Add existence check before creating log-dir, avoiding error
             messages if it already exists from a previous install
- bugfix: add extract_backup_includes to update.sh script to make
              sure backup includes exist when backup is taken.

Signed-off-by: Robin Roevens <robin.roevens@disroot.org>
2022-07-06 09:57:40 +00:00
Robin Roevens
9497d862ba zabbix_agentd: Update to v6.0.6 (LTS)
- Update from 4.2.6 to latest LTS version 6.0.6
  See release notes: https://www.zabbix.com/rn/rn6.0.6

Signed-off-by: Robin Roevens <robin.roevens@disroot.org>
2022-07-06 09:57:40 +00:00
Michael Tremer
8ac8abb269 stripper: Strip any PIE executables
Fixes: #12894
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-07-06 09:57:22 +00:00
Peter Müller
801143615a Core Update 170: Ship ca-certificates
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-07-06 06:30:09 +00:00
Peter Müller
9c695193ef ca-certificates: Update root CA certificates bundle
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-07-06 06:29:58 +00:00
Peter Müller
f42dc99758 Merge branch 'next' into temp-c170-development 2022-07-06 06:14:54 +00:00
Peter Müller
8000bc0a43 Core Update 169: Drop entropy.cgi
Since the kernel now always reports 256 bits of entropy to be available,
this CGI does not show any useful information anymore. To avoid
confusions, it will hereby be removed entirely.

Fixes: #12893
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-29 20:28:38 +00:00
Peter Müller
b55842c26a Core Update 169: Delete "random" initscript
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-29 20:13:11 +00:00
Michael Tremer
255873a5f9 random: Drop busy-loop script
This is no longer required because the kernel will now try to
generate some randomness in an easier way when needed.

This has been added in: b923dd3de0

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-29 20:11:34 +00:00
Peter Müller
5086ed681d sysctl: Permit ptrace usage for processes with CAP_SYS_PTRACE
https://lists.ipfire.org/pipermail/development/2022-June/013763.html

Reported-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-29 19:43:08 +00:00
Michael Tremer
2fcfe2e1f3 core169: Add initramdisks for armv6l, too
Looks like I have been ahead of time.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-06-29 18:34:01 +00:00
Michael Tremer
636cf631c9 core169: Ship initramdisks
Those were not part of the update which renders any machine that
installs it unbootable.

Fixes: #12892
Reported-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-06-29 18:11:26 +00:00
Peter Müller
5991f39282 linux: Update rootfiles to reflect /dev mount option change
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-27 17:30:47 +00:00
Peter Müller
5503a18d71 Merge branch 'next' into temp-c170-development
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-27 13:29:18 +00:00
Peter Müller
f5117ab51d python3-msgpack: Add rootfile for 32-bit ARM
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-27 11:02:32 +00:00
Peter Müller
d76e142f7c Revert "U-Boot: Update to 2022.04"
Arne reported that this introduced regressions on some NanoPi models.

This reverts commit b8a9c9e70a.
2022-06-27 07:34:16 +00:00
Peter Müller
b121752277 Revert "Core Update 169: Ship U-Boot"
This reverts commit 65264b3ba6.
2022-06-27 07:34:10 +00:00
Peter Müller
498ea59524 Revert "u-boot: Clarify source URLs and add missing rk3399 firmware"
This reverts commit be5703ef78.
2022-06-27 07:33:59 +00:00
Peter Müller
706d825587 Revert "u-boot: .xz != .gz"
This reverts commit 01b3a62a35.
2022-06-27 07:33:48 +00:00
Peter Müller
7d5a7fea48 Revert "u-boot: Sigh, fix another .xz != .gz"
This reverts commit 480202725b.
2022-06-27 07:33:40 +00:00
Peter Müller
0664b1720d linux: Amend upstream patch to harden mount points of /dev
This patch, which has been merged into the mainline Linux kernel, but
not yet backported to the 5.15.x tree, precisely addresses our
situation: IPFire does not use systemd, but CONFIG_DEVTMPFS_MOUNT.

The only explanation I have for bug #12889 arising _now_ is that some
component (dracut, maybe) changed its behaviour regarding remounting of
already mounted special file systems. As current dracut won't (re)mount
any file system already found to be mounted, this means that the mount
options decided by the kernel remained untouched for /dev, hence being
weak in terms of options hardening possible.

As CONFIG_DEVTMPFS_SAFE would not show up in "make menuconfig", changes
to kernel configurations have been simulated.

Fixes: #12889
Cc: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-25 22:20:48 +00:00
Peter Müller
53eb573f27 Core Update 170: Ship Pakfire functions.pl
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-25 11:15:43 +00:00
Robin Roevens
8ce729457d pakfire: Better errorhandling on downloads
- Add true/false return codes to fetchfile, getmetafile and getmirrors
  indicating succes or failure.
- Check on those return codes and fail gracefully with clean
  error message(s) when downloads fail.
- Replace duplicate meta-file fetching code in dbgetlist with
  getmetafile function (fixing possibly missed cariage return
  conversion in meta-files).
- Remove pointless 5 retries to download server-list.db in
  selectmirror as fetchfile already retries 5 times.
2022-06-25 11:15:03 +00:00
Adolf Belka
0eaaa300d8 rust-time: Required for update of python3-cryptography
- lfs and rootfile created
- Patch created to remove requirement for winapi and related windows dependencies

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2022-06-25 11:13:38 +00:00
Adolf Belka
541f938d8b rust-stable_deref_trait: Required for update of python3-cryptography
- lfs and rootfile created

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2022-06-25 11:13:38 +00:00
Adolf Belka
ccddf4ce8d rust-proc-macro-error-attr: Required for update of python3-cryptography
- lfs and rootfile created

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2022-06-25 11:13:37 +00:00
Adolf Belka
fdb3fb1565 rust-proc-macro-error: Required for update of python3-cryptography
- lfs and rootfile created

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2022-06-25 11:13:37 +00:00
Adolf Belka
023ed8cefd rust-pem: Required for update of python3-cryptography
- lfs and rootfile created

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2022-06-25 11:13:37 +00:00
Adolf Belka
1cc86b66ec rust-paste-0.1.18: Required for update of python3-cryptography
- lfs and rootfile created
- python3-cryptography build requires older version than was already installed.
   Therefore named version 0.1.18 created, leaving original rust-paste in place

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2022-06-25 11:13:37 +00:00
Adolf Belka
e09731d5e4 rust-ouroboros_macro: Required for update of python3-cryptography
- lfs and rootfile created

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2022-06-25 11:13:37 +00:00
Adolf Belka
c5706bf1ef rust-ouroboros: Required for update of python3-cryptography
- lfs and rootfile created

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2022-06-25 11:13:37 +00:00
Adolf Belka
79781dda3f rust-num_threads: Required for update of python3-cryptography
- lfs and rootfile created

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2022-06-25 11:13:37 +00:00
Adolf Belka
fe6afd5ccc rust-num-traits: Required for update of python3-cryptography
- lfs and rootfile created

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2022-06-25 11:13:37 +00:00
Adolf Belka
44daf2f5ee rust-num-integer: Required for update of python3-cryptography
- lfs and rootfile created

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2022-06-25 11:13:37 +00:00