Commit Graph

13381 Commits

Author SHA1 Message Date
Michael Tremer
d04ab223c7 web-user-interface: Ship new zoneconf.cgi file
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-09 15:47:42 +01:00
Michael Tremer
f0e0056eef core132: Ship updated captive.cgi
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-09 13:17:16 +01:00
Michael Tremer
462bc3d159 captive: Fix potential authenticated XSS in title processing
An authenticated Stored XSS (Cross-site Scripting) exists in the
(https://localhost:444/cgi-bin/captive.cgi) Captive Portal via the
"Title of Login Page" text box or "TITLE" parameter. This is due to
a lack of user input validation in "Title of Login Page" text box
or "TITLE" parameter. It allows an authenticated WebGUI user with
privileges for the affected page to execute Stored Cross-site
Scripting in the Captive Portal page (/cgi-bin/captive.cgi), which
helps attacker to redirect the victim to a attacker's page.

The Stored XSS get prompted on the victims page whenever victim
tries to access the Captive Portal page.

An attacker get access to the victim's session by performing the
CSRF and gather the cookie and session id's or possibly can
change the victims configuration using this Stored XSS.

This attack can possibly spoof the victim's informations.

Fixes: #12071
Reported-by: Dharmesh Baskaran <dharmesh201093@gmail.com>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-09 13:16:52 +01:00
Michael Tremer
939f227e0b core132: Ship VLAN GUI
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-08 12:15:27 +01:00
Florian Bührle
1dcf513a41 webif: Add a GUI for configuring VLAN interfaces
This patch adds a new CGI file which allows users to edit the
VLAN configuration as well as configuring zones as bridges.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-08 12:15:27 +01:00
Florian Bührle
a494174979 udev: Accept MAC addresses for PARENT_DEV
This allows us to create VLAN interfaces even when the
name of the parent interface might vary.

This patch also appends the VLAN tag to interfaces
when the zone is in bridge mode.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-08 12:15:27 +01:00
Stefan Schantl
d2b54a312f guardian: Remove snort related options.
IPFire has moved to suricata as IDS/IPS system, therefore all snort related
options has become obsolete.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2019-05-08 19:20:08 +02:00
Michael Tremer
bf62652ecf squid: Link against libatomic on ARM
This package failed to build on ARM because atomic functions
are being emulated on ARM32 and the required library was not
linked.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-07 23:54:32 +01:00
Michael Tremer
e9dd6da552 xfsprogs: Disable LTO on armv5tel
LTO fails on ARM, but since we do not require it, we can
disable it here.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-07 23:54:25 +01:00
Michael Tremer
68f2b71778 core132: Ship updated pakfire files
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-07 23:53:43 +01:00
Alexander Koch
5737a22cf2 zabbix_agentd: Add UserParameter for Pakfire Status
Ship the UserParameter for monitoring the status of pakfire for keeping track of available updates etc.

Signed-off-by: Alexander Koch <ipfire@starkstromkonsument.de>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-07 23:51:41 +01:00
Alexander Koch
090af02e07 Pakfire: Add new command line argument "status"
This enables Pakfire to return a Status-Summary for the Current Core-Update-Level, time since last updates, the availability of a core-/packet-update and if a reboot is required to complete an update. This can be used by monitoring agents (e.g. zabbix_agentd) to monitor the update status of the IPFire device.

Signed-off-by: Alexander Koch <ipfire@starkstromkonsument.de>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-07 23:51:20 +01:00
Alexander Koch
c818134f44 zabbix_agentd: update to 4.2.1
Release notes: https://www.zabbix.com/rn/rn4.2.1

Signed-off-by: Alexander Koch <ipfire@starkstromkonsument.de>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-07 23:51:08 +01:00
Michael Tremer
673db997cc core132: Ship updated libedit
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-07 23:50:26 +01:00
Matthias Fischer
f302e31ae2 libedit: Update to 20190324-3.1
For details see:
https://thrysoee.dk/editline/

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-07 23:50:03 +01:00
Michael Tremer
7f07bdb43f core132: Ship updated knot
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-07 23:49:47 +01:00
Matthias Fischer
45e4d6af99 knot: Update to 2.8.1
For details see:
https://www.knot-dns.cz/2019-04-09-version-281.html

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-07 23:49:29 +01:00
Michael Tremer
92f4652226 core132: Ship updated bind
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-07 23:48:41 +01:00
Matthias Fischer
9177b69830 bind: Update to 9.11.6-P1
For details see:
http://ftp.isc.org/isc/bind9/9.11.6-P1/RELEASE-NOTES-bind-9.11.6-P1.html

"Security Fixes

 The TCP client quota set using the tcp-clients option could be exceeded in some cases.
 This could lead to exhaustion of file descriptors. This flaw is disclosed in CVE-2018-5743.
 [GL #615]"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-07 23:48:24 +01:00
Michael Tremer
bc78976cc6 core132: Ship updated dhcpcd
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-07 23:46:36 +01:00
Matthias Fischer
60bc3a4b7a dhcpcd: Update to 7.2.2
For details see:
https://roy.marples.name/

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-07 23:45:52 +01:00
Michael Tremer
b38710a1cd firewall: Allow SNAT rules with RED interface
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-07 23:45:17 +01:00
Stefan Schantl
a59052cec6 suricata: Update to 4.1.4
This is a minor update to the latest available version from
the suricata 4.1 series.

Fixes #12068.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2019-05-02 19:33:38 +02:00
Arne Fitzenreiter
1f367e0aab Merge branch 'next' of git.ipfire.org:/pub/git/ipfire-2.x into next 2019-05-01 18:04:36 +02:00
Stefan Schantl
62910a28a6 suricata: Remove PID file on stop
Force the initscript to remove the PID file when calling "stop" section.

If suricata crashes during startup, the PID file still remains and the service
cannot be started anymore until the file has been deleted.

Now when calling "stop" or "restart" the PID file will be deleted and the service
can be used again.

Fixes #12067.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2019-05-01 18:04:15 +02:00
Stefan Schantl
50b35e0f8f update-ids-ruleset: Set correct ownership for the rulestarball.
The script usualy will be executed by cron which will start it with
root permissions, so the downloaded tarball is owned by this user.

This has to be changed to the user which runs the WUI (nobody:nobody) to
allow, changing the ruleset to an other one and to display the ruleset area.

Fixes #12066

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2019-05-01 18:03:11 +02:00
Michael Tremer
5a4617a871 core132: Ship updated firewall rules generator
This patch also requires a reboot after installing this update
so that the changed ruleset is being applied.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-04-30 10:58:31 +01:00
Michael Tremer
249839b0ca firewall: Fix source/destination interface settings
When a forwarding rule is being created, we sometimes create
INPUT/OUTPUT rules, too. Those were slightly invalid because
the source and destination interfaces where passed, too.

This could render some rules in certain circumstances useless.

This patch fixes this and only adds -i for INPUT and -o for
OUTPUT rules.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-04-30 10:56:05 +01:00
Michael Tremer
ae93dd3deb firewall: Add more rules to input/output when adding rules to forward
The special_input/output_targets array assumed that firewall access
will always be denied. However, rules also need to be created when
access is granted. Therefore the ACCEPT target needs to be included
in this list and rules must be created in INPUTFW/OUTGOINGFW too
when ACCEPT rules are created in FORWARDFW.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-04-30 10:45:34 +01:00
Michael Tremer
68e0cf6714 grub: Update rootfile on i586
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-04-30 10:45:02 +01:00
Michael Tremer
a7e185c590 grub: Fix rootfile
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-04-28 09:43:48 +01:00
Michael Tremer
4987d0ed19 grub: Fix relocation type issue
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-04-28 09:43:37 +01:00
Michael Tremer
bab38dad60 ipfire-netboot: Fix compiling and linking with new GCC & binutils
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-04-28 09:43:24 +01:00
Michael Tremer
7f156022b5 sarg: Fix build with newer GCCs
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-04-28 09:43:08 +01:00
Arne Fitzenreiter
20c7552e0d Merge branch 'master' into next
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2019-04-26 19:39:55 +02:00
Michael Tremer
2cecfd0fdb grub: Fix build error with GCC 8
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-04-26 16:19:51 +01:00
Michael Tremer
452d2b6eaa grub: Disable efiemu on PC builds
This won't compile with GCC 8 and we do not need it

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-04-26 16:19:42 +01:00
Michael Tremer
999e17bf9e nasm: Update to 2.14.02
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-04-26 16:19:17 +01:00
Michael Tremer
a0c9850c77 ltrace: Bump package version
This package needs to be rebuilt because it uses elfutils
which has had an soname bump.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-04-26 16:19:16 +01:00
Michael Tremer
95028c1ce2 elfutils: Update to 0.176
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-04-26 16:18:46 +01:00
Erik Kapfer
948173dbb4 OpenVPN: Fixed certificate generation in French
Fixes #12060

Signed-off-by: Erik Kapfer <ummeegge@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-04-26 16:17:50 +01:00
Stefan Schantl
9cf253e150 initscripts/suricata: Rework creation of firewall rules.
The script now will use the previously introduced seperate firewall chains called
IPS_INPUT, IPS_FORWARD and IPS_OUTPUT.

The commit also creates an AND connection between the choosen network zones in the UI and
the final firwall rules.

Fixes #12062.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2019-04-26 07:46:15 +02:00
Stefan Schantl
5e3067cb52 initscripts/suricata: Move functions order and always use flush_fw_chain function
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2019-04-26 07:46:15 +02:00
Stefan Schantl
686c4b9f25 firewall: Use seperate firewall chains for passing traffic to the IPS
Create and use seperate iptables chain called IPS_INPUT, IPS_FORWARD and IPS_OUTPUT
to be more flexible which kind of traffic should be passed to suricata.

Reference #12062

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2019-04-26 07:46:15 +02:00
Arne Fitzenreiter
31568a1982 hostapd: bump package version
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2019-04-26 07:43:21 +02:00
Michael Tremer
1f35114d7b hostap: Fix wiring of checkboxes for client isolation
The checkboxes were swapped which lead to client isolation
being enabled when the UI said disabled and vice-versa.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-04-26 07:42:48 +02:00
Michael Tremer
c721714036 hostap: Translate configuration settings
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-04-24 11:31:28 +01:00
Michael Tremer
5cf4aba470 hostap: Fix wiring of checkboxes for client isolation
The checkboxes were swapped which lead to client isolation
being enabled when the UI said disabled and vice-versa.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-04-24 11:24:33 +01:00
Michael Tremer
49ef32d164 hostap: Remove deprecated directive
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-04-24 11:08:36 +01:00
Michael Tremer
dc850cb32f hostap: Enable 80MHz bandwidth by default (when using ACS)
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-04-24 10:43:50 +01:00