Commit Graph

22201 Commits

Author SHA1 Message Date
Michael Tremer
3fb09506ae ids.cgi: Use new services function
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-07 14:11:40 +02:00
Adolf Belka
6c6959694a hostapd: Update to version 2_11
- Update from version 2_10 to 2_11
- Update of rootfile not required
- Update of patches to latest source tarball
- Changelog
    2_11
	* Wi-Fi Easy Connect
	  - add support for DPP release 3
	  - allow Configurator parameters to be provided during config exchange
	* HE/IEEE 802.11ax/Wi-Fi 6
	  - various fixes
	* EHT/IEEE 802.11be/Wi-Fi 7
	  - add preliminary support
	* SAE: add support for fetching the password from a RADIUS server
	* support OpenSSL 3.0 API changes
	* support background radar detection and CAC with some additional
	  drivers
	* support RADIUS ACL/PSK check during 4-way handshake (wpa_psk_radius=3)
	* EAP-SIM/AKA: support IMSI privacy
	* improve 4-way handshake operations
	  - use Secure=1 in message 3 during PTK rekeying
	* OCV: do not check Frequency Segment 1 Channel Number for 160 MHz cases
	  to avoid interoperability issues
	* support new SAE AKM suites with variable length keys
	* support new AKM for 802.1X/EAP with SHA384
	* extend PASN support for secure ranging
	* FT: Use SHA256 to derive PMKID for AKM 00-0F-AC:3 (FT-EAP)
	  - this is based on additional details being added in the IEEE 802.11
	    standard
	  - the new implementation is not backwards compatible
	* improved ACS to cover additional channel types/bandwidths
	* extended Multiple BSSID support
	* fix beacon protection with FT protocol (incorrect BIGTK was provided)
	* support unsynchronized service discovery (USD)
	* add preliminary support for RADIUS/TLS
	* add support for explicit SSID protection in 4-way handshake
	  (a mitigation for CVE-2023-52424; disabled by default for now, can be
	  enabled with ssid_protection=1)
	* fix SAE H2E rejected groups validation to avoid downgrade attacks
	* use stricter validation for some RADIUS messages
	* a large number of other fixes, cleanup, and extensions

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-07 09:32:57 +00:00
Michael Tremer
f5160566b2 make.sh: Bring up the loopback device in the new namespace
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-06 16:17:39 +00:00
Michael Tremer
ae7d1ef997 core188: Remove recently deleted files
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-06 17:49:13 +02:00
Michael Tremer
86ca826ff1 header.pl: Bump the CSS version so that browsers reload the file
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-06 17:45:58 +02:00
Michael Tremer
bdfaa8177f index.cgi: Remove all the boxes
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-06 17:36:20 +02:00
Michael Tremer
9cbdd6b2e8 CSS: Keep links in the same colour in notes sections
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-06 17:33:56 +02:00
Michael Tremer
21884cc749 index.cgi: Move all warnings into the new system
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-06 17:33:35 +02:00
Michael Tremer
38077d69a9 index.cgi: Remove the warnings box and show a list of warnings instead
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-06 17:28:13 +02:00
Michael Tremer
4a04ad26b4 index.cgi: Remove hard-coded 80% table width
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-06 17:17:21 +02:00
Michael Tremer
aca5f661c2 services.cgi: Drop the process graphs
These are utterly broken and incomplete. I don't want to fix this now,
so I am dropping it.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-06 17:14:41 +02:00
Michael Tremer
0b16963484 web: Create a function to show the service status
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-06 17:08:40 +02:00
Michael Tremer
b5e6a2c56f services.cgi: Remove unused variables
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-06 17:00:42 +02:00
Michael Tremer
42201c17bd services.cgi: Use a section for the main services
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-06 17:00:31 +02:00
Michael Tremer
bdb8ef8db2 services.cgi: Use the new service status function
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-06 17:00:19 +02:00
Michael Tremer
f0bf243193 langs: Add translations for the systems graphs
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-06 16:57:41 +02:00
Michael Tremer
864b47bf79 Run "./make.sh lang"
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-06 16:54:06 +02:00
Michael Tremer
0869a6f5f3 graphs: Highlight the default range before the user clicks anything
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-06 16:51:06 +02:00
Michael Tremer
76f429d5d8 licenses: Remove the braindead GPL acception stage
The GPL is not an EULA and so there is no value in having users
accept it.

The UI is very broken and so I believe it is best to drop this entirely.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-06 16:48:27 +02:00
Michael Tremer
f7879935a5 core-updates: Fix release number
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-06 14:17:39 +00:00
Michael Tremer
07358a9fc5 make.sh: Grant network access when downloading packages
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-06 14:11:04 +00:00
Michael Tremer
cf6ab4e569 core188: Remove the old version of br2486ctl
This is now installed in /usr/sbin instead of /usr/bin.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-06 13:49:31 +00:00
Michael Tremer
41bc16ac0b br2684ctl: Remove rootfile, too
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-06 13:48:39 +00:00
Michael Tremer
dae1ac41e3 make.sh: Bind-mount /etc/resolv.conf and /etc/hosts
This allows us to have name resolution in the shell without any manual
configuration.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-06 13:45:08 +00:00
Michael Tremer
91942800f9 make.sh: Entirely disable network access in the build environment
Except when in the shell.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-06 13:38:30 +00:00
Michael Tremer
c00286b609 core188: Ship cyrus-sasl
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-06 09:13:54 +00:00
Michael Tremer
fd4ee38136 cyrus-sasl: Update to 2.1.28
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-06 09:13:42 +00:00
Michael Tremer
552cf4e825 cyrus-sasl: Remove unsed PASS build instructions
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-06 09:13:27 +00:00
Michael Tremer
869102c0a9 core188: Ship libxslt
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-06 09:13:08 +00:00
Michael Tremer
d44788101b libxslt: Update to 1.1.42
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-06 09:12:58 +00:00
Michael Tremer
64feedbcf6 br2684ctl: Drop package
This tool is now part of linux-atm.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-06 09:12:45 +00:00
Michael Tremer
095b258b97 core188: Ship linux-atm
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-06 09:12:27 +00:00
Michael Tremer
b734e6f7b6 linux-atm: Update to 2.5.2
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-06 09:11:59 +00:00
Adolf Belka
acf2754880 openssl: Update to version 3.3.0
- Update from version 3.2.1 to 3.3.0
- Update of rootfile
- Changelog
    3.3
	This release adds the following new features:
	  * Support for qlog for tracing QUIC connections has been added
	  * Added APIs to allow configuring the negotiated idle timeout for QUIC
	    connections, and to allow determining the number of additional streams
	    that can currently be created for a QUIC connection.
	  * Added APIs to allow disabling implicit QUIC event processing for QUIC SSL
	    objects
	  * Added APIs to allow querying the size and utilisation of a QUIC stream's
	    write buffer
	  * New API `SSL_write_ex2`, which can be used to send an end-of-stream (FIN)
	    condition in an optimised way when using QUIC.
	  * Limited support for polling of QUIC connection and stream objects in a
	    non-blocking manner.
	  * Added a new EVP_DigestSqueeze() API. This allows SHAKE to squeeze multiple
	    times with different output sizes.
	  * Added exporter for CMake on Unix and Windows, alongside the pkg-config
	    exporter.
	  * The BLAKE2s hash algorithm matches BLAKE2b's support for configurable
	    output length.
	  * The EVP_PKEY_fromdata function has been augmented to allow for the
	    derivation of CRT (Chinese Remainder Theorem) parameters when requested
	  * Added API functions SSL_SESSION_get_time_ex(), SSL_SESSION_set_time_ex()
	    using time_t which is Y2038 safe on 32 bit systems when 64 bit time
	    is enabled
	  * Unknown entries in TLS SignatureAlgorithms, ClientSignatureAlgorithms
	    config options and the respective calls to SSL[_CTX]_set1_sigalgs() and
	    SSL[_CTX]_set1_client_sigalgs() that start with `?` character are
	    ignored and the configuration will still be used.
	  * Added `-set_issuer` and `-set_subject` options to `openssl x509` to
	    override the Issuer and Subject when creating a certificate. The `-subj`
	    option now is an alias for `-set_subject`.
	  * Added several new features of CMPv3 defined in RFC 9480 and RFC 9483
	  * New option `SSL_OP_PREFER_NO_DHE_KEX`, which allows configuring a TLS1.3
	    server to prefer session resumption using PSK-only key exchange over PSK
	    with DHE, if both are available.
	  * New atexit configuration switch, which controls whether the OPENSSL_cleanup
	    is registered when libcrypto is unloaded.
	  * Added X509_STORE_get1_objects to avoid issues with the existing
	    X509_STORE_get0_objects API in multi-threaded applications.
	This release incorporates the following potentially significant or incompatible
	changes:
	  * Applied AES-GCM unroll8 optimisation to Microsoft Azure Cobalt 100
	  * Optimized AES-CTR for ARM Neoverse V1 and V2
	  * Enable AES and SHA3 optimisations on Applie Silicon M3-based MacOS systems
	    similar to M1/M2.
	  * Various optimizations for cryptographic routines using RISC-V vector crypto
	    extensions
	  * Added assembly implementation for md5 on loongarch64
	  * Accept longer context for TLS 1.2 exporters
	  * The activate and soft_load configuration settings for providers in
	    openssl.cnf have been updated to require a value of [1|yes|true|on]
	    (in lower or UPPER case) to enable the setting. Conversely a value
	    of [0|no|false|off] will disable the setting.
	  * In `openssl speed`, changed the default hash function used with `hmac` from
	    `md5` to `sha256`.
	  * The `-verify` option to the `openssl crl` and `openssl req` will make the
	    program exit with 1 on failure.
	  * The d2i_ASN1_GENERALIZEDTIME(), d2i_ASN1_UTCTIME(), ASN1_TIME_check(), and
	    related functions have been augmented to check for a minimum length of
	    the input string, in accordance with ITU-T X.690 section 11.7 and 11.8.
	  * OPENSSL_sk_push() and sk_<TYPE>_push() functions now return 0 instead of -1
	    if called with a NULL stack argument.
	  * New limit on HTTP response headers is introduced to HTTP client. The
	    default limit is set to 256 header lines.
	This release incorporates the following bug fixes and mitigations:
	  * The BIO_get_new_index() function can only be called 127 times before it
	    reaches its upper bound of BIO_TYPE_MASK and will now return -1 once its
	    exhausted.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-06 09:10:28 +00:00
Michael Tremer
7b77ed8c94 core188: Ship the VLAN hotplug script
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-03 09:44:02 +00:00
Adolf Belka
0deeec6dd9 network-hotplug-vlan: Fix for bug 12676
- https://bugzilla.ipfire.org/show_bug.cgi?id=12676#c3

Suggested-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-03 09:43:41 +00:00
Michael Tremer
7ec26cb497 core188: Ship rrdtool
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-03 09:42:15 +00:00
Matthias Fischer
6f6c9f6b6a rrdtool: Update tp 1.9.0
For details see:
https://github.com/oetiker/rrdtool-1.x/releases/tag/v1.9.0

"RRDtool 1.9.0 — 2024-07-29
Bugfixes

    Fix ytop and ybase adjustments for overlaping area issue on transparent areas @turban
    Suppress warnings of implicit fall through @youpong
    Update tarball download link in doc @c72578
    Fix unsigned integer overflow in rrdtool first. Add test for rrd_first() @c72578
    Fix tests under MSYS2 (Windows) @c72578
    Fix BUILD_DATE in rrdtool help output @c72578
    acinclude.m4: Include <stdlib.h> when using exit @ryandesign
    rrdtool-release: Create NUMVERS from VERSION file @c72578
    Avoids leaking of file descriptors in multi threaded programs by @ensc
    Avoids potential unterminated string because of fixed PATH_MAX buffer
    Fix extra reference of parameters of rrd_fetch_dbi_{long,double} @jamborm"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-03 09:42:07 +00:00
Adolf Belka
31b10034e9 bird: Update to version 2.15.1
- Update from version 2.14 to 2.15.1
- Update of rootfile not required
- Changelog
    2.15.1
	  o OSPF: Fix regression in handling PtP links
	  o RPKI: Handle connection resets properly
	  o Static: Reject invalid combination of options
	  o Fix builds with limited set of protocols
    2.15
	  o BGP: Send hold timer
	  o BGP: New options to specify required BGP capabilities
	  o BFD: Improvements to 'show bfd sessions' command
	  o RPKI: New 'local address' configuration option
	  o Linux: Support for more route attributes, including
	    TCP congestion control algorithm
	  o Support for UDP logging
	  o Static routes can have both nexthop and interface specified
	  o Completion of command options in BIRD client
	  o Many bugfixes and improvements

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-03 09:41:57 +00:00
Michael Tremer
d54846e0a2 core188: Ship nasm
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-03 09:41:46 +00:00
Matthias Fischer
4e40a3e23f nasm: Update to 2.16.03
For details see:
https://nasm.us/doc/nasmdocc.html

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-03 09:41:32 +00:00
Michael Tremer
cf4b9118e3 make.sh: Show the packages that failed to download
https://lists.ipfire.org/hyperkitty/list/development@lists.ipfire.org/thread/VCTWCJKYKCGN7TUKMYWVJY3QUX4FIDT5/

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-02 17:56:17 +00:00
Michael Tremer
80de6b5647 vectorscan: Fix check for CPU support
According to the documentation, Vectorscan checks whether the CPU is
supporting the minimum requirement of SSE4.2. However the check is still
checking for SSSE3 which makes the library fail on systems without
SSE4.2.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-02 16:49:15 +00:00
Michael Tremer
d04dd6f2cd Config: Fix computing the package file size
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-02 16:48:59 +00:00
Michael Tremer
df84336ef8 Config: Use the correct variable for the package release
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-02 16:48:39 +00:00
Michael Tremer
ed2c97b799 Merge remote-tracking branch 'origin/next' into next 2024-07-24 16:40:47 +00:00
Michael Tremer
e8d2096c0b core188: Ship changed files
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-07-24 16:40:15 +00:00
Michael Tremer
10210334fe Merge remote-tracking branch 'ms/cleanup' into next 2024-07-24 16:32:28 +00:00
Arne Fitzenreiter
6460dbbfc5 Merge branch 'master' into next 2024-07-23 21:59:26 +02:00
Arne Fitzenreiter
f08f55e6b4 core187: ship /usr/bin/unshare
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-07-23 17:29:42 +02:00