Commit Graph

10096 Commits

Author SHA1 Message Date
Peter Müller
34e16b8653 Core Update 170: Ship sudo
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-25 11:12:44 +00:00
Adolf Belka
2296698ec4 sudo: Update to version 1.9.11p3
- Update from version 1.9.10 to 1.9.11p3
- Update of rootfile required
- Changelog
    What's new in Sudo 1.9.11p3
	 * Fixed "connection reset" errors on AIX when running shell scripts
	   with the "intercept" or "log_subcmds" sudoers options enabled.
	   Bug #1034.
	 * Fixed very slow execution of shell scripts when the "intercept"
	   or "log_subcmds" sudoers options are set on systems that enable
	   Nagle's algorithm on the loopback device, such as AIX.
	   Bug #1034.
    What's new in Sudo 1.9.11p2
	 * Fixed a compilation error on Linux/x86_64 with the x32 ABI.
	 * Fixed a regression introduced in 1.9.11p1 that caused a warning
	   when logging to sudo_logsrvd if the command returned no output.
    What's new in Sudo 1.9.11p1
	 * Correctly handle EAGAIN in the I/O read/right events.  This fixes
	   a hang seen on some systems when piping a large amount of data
	   through sudo, such as via rsync.  Bug #963.
	 * Changes to avoid implementation or unspecified behavior when
	   bit shifting signed values in the protobuf library.
	 * Fixed a compilation error on Linux/aarch64.
	 * Fixed the configure check for seccomp(2) support on Linux.
	 * Corrected the EBNF specification for tags in the sudoers manual
	   page.  GitHub issue #153.
    What's new in Sudo 1.9.11
	 * Fixed a crash in the Python module with Python 3.9.10 on some
	   systems.  Additionally, "make check" now passes for Python 3.9.10.
	 * Error messages sent via email now include more details, including
	   the file name and the line number and column of the error.
	   Multiple errors are sent in a single message.  Previously, only
	   the first error was included.
	 * Fixed logging of parse errors in JSON format.  Previously,
	   the JSON logger would not write entries unless the command and
	   runuser were set.  These may not be known at the time a parse
	   error is encountered.
	 * Fixed a potential crash parsing sudoers lines larger than twice
	   the value of LINE_MAX on systems that lack the getdelim() function.
	 * The tests run by "make check" now unset the LANGUAGE environment
	   variable.  Otherwise, localization strings will not match if
	   LANGUAGE is set to a non-English locale.  Bug #1025.
	 * The "starttime" test now passed when run under Debian faketime.
	   Bug #1026.
	 * The Kerberos authentication module now honors the custom password
	   prompt if one has been specified.
	 * The embedded copy of zlib has been updated to version 1.2.12.
	 * Updated the version of libtool used by sudo to version 2.4.7.
	 * Sudo now defines _TIME_BITS to 64 on systems that define __TIMESIZE
	   in the header files (currently only GNU libc).  This is required
	   to allow the use of 64-bit time values on some 32-bit systems.
	 * Sudo's "intercept" and "log_subcmds" options no longer force the
	   command to run in its own pseudo-terminal.  It is now also
	   possible to intercept the system(3) function.
	 * Fixed a bug in sudo_logsrvd when run in store-first relay mode
	   where the commit point messages sent by the server were incorrect
	   if the command was suspended or received a window size change
	   event.
	 * Fixed a potential crash in sudo_logsrvd when the "tls_dhparams"
	   configuration setting was used.
	 * The "intercept" and "log_subcmds" functionality can now use
	   ptrace(2) on Linux systems that support seccomp(2) filtering.
	   This has the advantage of working for both static and dynamic
	   binaries and can work with sudo's SELinux RBAC mode.  The following
	   architectures are currently supported: i386, x86_64, aarch64,
	   arm, mips (log_subcmds only), powerpc, riscv, and s390x.  The
	   default is to use ptrace(2) where possible; the new "intercept_type"
	   sudoers setting can be used to explicitly set the type.
	 * New Georgian translation from translationproject.org.
	 * Fixed creating packages on CentOS Stream.
	 * Fixed a bug in the intercept and log_subcmds support where
	   the execve(2) wrapper was using the current environment instead
	   of the passed environment pointer.  Bug #1030.
	 * Added AppArmor integration for Linux.  A sudoers rule can now
	   specify an APPARMOR_PROFILE option to run a command confined by
	   the named AppArmor profile.
	 * Fixed parsing of the "server_log" setting in sudo_logsrvd.conf.
	   Non-paths were being treated as paths and an actual path was
	   treated as an error.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-25 11:12:32 +00:00
Peter Müller
a8344bbac5 Core Update 170: Ship xfsprogs
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-25 11:12:14 +00:00
Peter Müller
f653df852a Start Core Update 170
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-25 11:07:09 +00:00
Peter Müller
617bb64f63 Core Update 169: Ship general-functions.pl
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-25 09:15:17 +00:00
Adolf Belka
0b4618f9a3 general-functions.pl: Fix for bug #12865 - Static IP address pools - Add network - Name wit>
- The fix for bug #12428 removed spaces from the validhostname subroutine as hostnames are
   not supposed to have spaces
- This resulted in spaces no longer being allowed for the Static IP Address Pools names
- New subroutine created called validccdname. This allows letters, upper and lower case,
   numbers, spaces and dashes

Fixes: Bug #12865
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2022-06-25 09:14:22 +00:00
Adolf Belka
de6ef4d40a python3-msgpack: Required for build and execution of borgbackup 1.2.0
- New python module required for borgbackup. In borgbackup version 1.1.18 or 1.1.19
   the old bundled msgpack in borgbackup was removed and a specified version range
   of python3-msgpack required.
- This patch adds the lfs and rootfiles for this module

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2022-06-25 09:11:58 +00:00
Adolf Belka
006309eaaf python3-packaging: Moved to rootfiles/packages/ directory
- Required for borgbackup execution

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2022-06-25 09:11:58 +00:00
Adolf Belka
c9336f7a1f borgbackup: Fix bug #12884 - borgbackup 1.2.0 crashes on running any borg command
- When borgbackup was upgraded from version 1.1.17 to 1.2.0 the build was sucessfully
   completed but there was no testing feedback till after full release. It turned out
   that it did not successfully run.
- python3-packaging which had been installed for the build of borgbackup needed to also
   be available for the execution.
- When borgbackup was upgraded to 1.2.0 it was noticed that the old python3-msgpack was
   no longer needed as borgbackup used its own bundled msgpack since around version 1.1.10
   What was not seen was that in version 1.1.19 or 1.1.18 the bundled version of msgpack
   had been removed and that the newer version of python3-msgpack now needed to be
   installed but the version number has to meet the borgbackup requirements which currently
   require it to be =<1.0.3
- This patch adds the python3-packaging and python3-msgpack modules as dependencies for
   borgbackup
- The egg-info files are uncommented in the rootfile so that the borgbackup metadata can
   be found by python.
- The updated borgbackup build together with the python3-packaging and python3-msgpack
   modules were installed into a vm system using the .ipfire packages.
   Successfully initialised a borgbackup repo and ran two backups to the repo and checked
   the stats for the backup. Everything ran fine.

Fixes: Bug #12884
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2022-06-25 09:11:58 +00:00
Michael Tremer
de9ae56f4b python3-botocore: Ship interface descriptions
botocore parses any interface descriptions and exposes them to Python.
For that to work, we need to ship them.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-06-23 13:27:21 +00:00
Michael Tremer
92d1e94069 python3-botocore: Add httpchecksum module
It looks like this has been commented out by mistake

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-06-23 13:27:21 +00:00
Peter Müller
68307a7697 Core Update 169: Ship ruleset-sources
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-23 13:25:00 +00:00
Stefan Schantl
b77b41a579 ruleset-sources: Update download URL for Talos rulesets.
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-23 13:24:10 +00:00
Peter Müller
df9ebc6bbe linux: Align kernel configurations on ARM
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-23 07:42:27 +00:00
Peter Müller
a924020ea8 Core Update 169: Restart ntpd to apply configuration changes
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-23 07:27:19 +00:00
Peter Müller
d9aece2af9 linux: Update rootfile
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-23 06:44:09 +00:00
Peter Müller
d86d3f2231 OpenSSL: Fix rootfile
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-23 06:38:41 +00:00
Peter Müller
4b9b85215f Core Update 169: Ship vulnerabilities.cgi
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-22 18:11:56 +00:00
Peter Müller
2f52d27a82 Core Update 169: Ship changed initscripts
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-22 12:27:02 +00:00
Peter Müller
29cf82e6fc Core Update 169: Ship OpenSSL
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-22 12:17:48 +00:00
Peter Müller
95530b3edb Core Update 169: Ship NTP configuration changes
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-20 20:44:58 +00:00
Jon Murphy
2234e8aaca Ship NTP changes
- Device time more accurate.  (e.g., +/- 10 seconds per day to < 100 ms on some devices)
   ( I know we don't need the perfect time server )
 - NTP and time will be accurate in manual mode (setting on Time Server > NTP Configuration WebGUI)
 - Change NTP "prefer" server:
    - The current preferred NTP server in an Undisciplined Local Clock.
    - This is intended when no outside source of synchronized time is available.
    - Change the "prefer" server from 127.127.1.0 to the Primary NTP server specified on
      the Time Server > NTP Configuration WebGUI page.
 - Change allows the drift file (located at /etc/ntp/drift) to be populated by ntpd.
    - The drift file is updated about once per hour which helps correct the device time.

Signed-off-by: Jon Murphy <jon.murphy@ipfire.org>
2022-06-20 20:43:34 +00:00
Peter Müller
f62b488f82 sysctl: Actually arm YAMA
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-20 20:10:47 +00:00
Peter Müller
2c38893da4 Core Update 169: Ship keyutils
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-20 19:50:16 +00:00
Peter Müller
2bbfa1b72c Core Update 169: Ship poppler
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-20 19:48:55 +00:00
Peter Müller
9f94dc123a Update rootfiles to reflect OpenVPN 2FA changes
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-18 14:40:29 +00:00
Peter Müller
531f57d71c Zut alors, uniq 'files' as well
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-17 16:48:44 +00:00
Peter Müller
609f41867d Sort 'files'
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-17 16:48:13 +00:00
Peter Müller
3cf7a3b153 Core Update 169: Ship OpenVPN 2FA changes
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-17 16:47:44 +00:00
Peter Müller
29df9f89c9 Core Update 169: Ship libtiff and krb5
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-17 16:39:12 +00:00
Peter Müller
4c46690411 Core Update 169: Remove pakfire metadata for krb5 and libtiff
Both packages have become part of the core system, so these files
are not longer needed.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-17 16:39:12 +00:00
Stefan Schantl
8d920449d2 libtiff: Move into core system.
pango and the PDF tools as core parts are linked against
libtiff, therefore this library has to become a part of the
core distribution too.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
2022-06-17 16:39:12 +00:00
Stefan Schantl
c13e562b6e krb5: Move package into core system.
On one hand, the key.dns_resolver binary is linked against libkrb5, so this
library at least is required by the base system.

On the other hand this easily allows different services on the firewall
to use kerberos for authentication (ssh etc).

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
2022-06-17 16:39:12 +00:00
Peter Müller
fa30456c5e kernel: Align x86_64 rootfile for kernel update
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-17 16:39:12 +00:00
Peter Müller
65264b3ba6 Core Update 169: Ship U-Boot
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-17 16:39:12 +00:00
Peter Müller
ed5572536f Core Update 169: Ship misc-progs
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-17 16:39:12 +00:00
Timo Eissler
6a53c26cf7 perl-URI-Encode: New package
Simple percent Encoding/Decoding

Signed-off-by: Timo Eissler <timo.eissler@ipfire.org>
2022-06-17 10:22:31 +00:00
Michael Tremer
c9dc7fdec0 openvpn-authenticator: Always return general connection data
The function returned different output when TOTP was configured and not
which is not what it should do.

This version will now try to add the TOTP configuration, or will add
nothing it if fails to do so.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-06-17 10:20:19 +00:00
Michael Tremer
b6f9fff2bc openvpn-authenticator: Don't process configuration when row is too short
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-06-17 10:20:19 +00:00
Timo Eissler
59f9e41361 openvpn-authenticator: Change event and environment handling
Move reading of environment in it's own function because not all
events have a ENV block following and thus always reading the ENV
will cause RuntimeError("Unexpected environment line ...").
2022-06-17 10:20:19 +00:00
Timo Eissler
472cd78269 openvpn-authenticator: Fix call of _client_auth_successful 2022-06-17 10:20:19 +00:00
Timo Eissler
a4a42daeea openvpn-authenticator: Return only available data
For connections which have not enabled OTP return
connection name and common_name attributes only.
2022-06-17 10:20:19 +00:00
Timo Eissler
74ab6f9fc0 openvpn-authenticator: Generate TOTP instead of HOTP codes 2022-06-17 10:20:19 +00:00
Michael Tremer
6834749d22 openvpn-2fa: Drop the previous authentication handler
This has been replaced by the newer authenticator

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-06-17 10:20:18 +00:00
Michael Tremer
339b84d509 openvpn-2fa: Import a prototype of an authenticator
This script runs aside of OpenVPN and connects to the management socket.
On the socket, OpenVPN will post any new clients trying to authenticate
which will be handled by the authenticator.

If a client has 2FA enabled, it will be challanged for the current token
which will then be checked in a second pass.

Clients which do not have 2FA enabled will just be authenticated no
matter what and tls-verify will have handled the rest.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-06-17 10:20:18 +00:00
Michael Tremer
f27d021470 openpvn-2fa: Fix rootfiles
Some rootfiles where in the wrong location, some others had some
architecture hard-coded.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-06-17 10:20:18 +00:00
Timo Eissler
e1e10515ec OpenVPN: Add support for 2FA / One-Time Password
Add two-factor authentication (2FA) to OpenVPN host connections with
one-time passwords.

The 2FA can be enabled or disabled per host connection and requires the
client to download it's configuration again after 2FA has beend enabled
for it.
Additionally the client needs to configure an TOTP application, like
"Google Authenticator" which then provides the second factor.
To faciliate this every connection with enabled 2FA
gets an "show qrcode" button after the "show file" button in the
host connection list to show the 2FA secret and an 2FA configuration QRCode.

When 2FA is enabled, the client needs to provide the second factor plus
the private key password (if set) to successfully authorize.

This only supports time based one-time passwords, TOTP with 30s
window and 6 digits, for now but we may update this in the future.

Signed-off-by: Timo Eissler <timo.eissler@ipfire.org>
2022-06-17 10:20:17 +00:00
Timo Eissler
dc124917e3 perl-MIME-Base32: New package
Base32 encoder and decoder

Signed-off-by: Timo Eissler <timo.eissler@ipfire.org>
2022-06-17 10:20:17 +00:00
Timo Eissler
e97759c292 perl-Imager-QRCode: New package
Generate QR Code with Imager using libqrencode

Signed-off-by: Timo Eissler <timo.eissler@ipfire.org>
2022-06-17 10:20:17 +00:00
Timo Eissler
bc8bea129c perl-Imager: New package
Perl extension for Generating 24 bit Images

Required by perl-Imager-QRCode.

Signed-off-by: Timo Eissler <timo.eissler@ipfire.org>
2022-06-17 10:20:17 +00:00