Michael Tremer
d4b31f13d5
Drop multicat & bitstream
...
This reverts commit 0a21ce42e1 .
These packages have never been updated and nodody in the team
is willing to support them.
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2020-02-15 16:55:00 +00:00
Michael Tremer
321c211528
glib: Fix compiling with GCC 9
...
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2020-01-04 18:24:15 +00:00
Michael Tremer
d04fb4ee34
efivar: Update to 37
...
This also fixes some build issues with GCC 9.
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2020-01-04 18:23:54 +00:00
Michael Tremer
3e8dd2d3ed
mdadm: Update to 4.1
...
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2020-01-04 18:23:52 +00:00
Stefan Schantl
0db643ce38
rfkill: New package.
...
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org >
Acked-by: Michael Tremer <michael.tremer@ipfire.org >
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2019-12-29 19:14:30 +00:00
Stefan Schantl
d1ca2d1fd5
GeoIP: Drop package
...
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org >
2019-12-09 14:50:51 +01:00
Stefan Schantl
03c8f290d9
xtables-addons: Remove xt_geoip_build script
...
This script is not longer required.
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org >
2019-12-09 14:35:15 +01:00
Matthias Fischer
ee506d5027
calamaris: Bug fix for proxy reports staying empty after Core 136 upgrade
...
After upgrading to Core 136, 'calamaris' "Proxy reports" stayed empty.
GUI always show "No reports available".
Tested manually on console stops and throws an error:
...
root@ipfire: ~ # /usr/bin/perl /var/ipfire/proxy/calamaris/bin/mkreport
1 0 2019 8 10 2019 -d 10 -P 30 -t 10 -D 2 -u -r -1 -R 100 -s
Can't use 'defined(%hash)' (Maybe you should just omit the defined()?)
at /var/ipfire/proxy/calamaris/bin/calamaris line 2609.
...
Line 2609 was changed and reports are built again.
Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org >
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org >
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2019-11-30 09:46:19 +00:00
Peter Müller
415fb8b5bd
bash: update to 5.0 (patchlevel 11)
...
The third version of this patch also includes patches 1-11
for version 5.0, drops orphaned 4.3 patches, and fixes rootfile
mistakes reported by Arne.
Please refer to https://tiswww.case.edu/php/chet/bash/bashtop.html
for release notes.
Cc: Michael Tremer <michael.tremer@ipfire.org >
Cc: Arne Fitzenreiter <arne_f@ipfire.org >
Signed-off-by: Peter Müller <peter.mueller@ipfire.org >
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2019-11-13 19:42:59 +00:00
Peter Müller
c82aa03e2c
readline: update to 8.0 (patchlevel 1)
...
The third version of this patch fixes missing rootfile changes, drops
orphaned readline 5.2 patches (as they became obsolete due to
readline-compat changes), includes readline 8.0 upstream patch, and
keeps the for-loop in LFS file (as commented by Michael).
Cc: Michael Tremer <michael.tremer@ipfire.org >
Cc: Arne Fitzenreiter <arne_f@ipfire.org >
Signed-off-by: Peter Müller <peter.mueller@ipfire.org >
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2019-11-13 19:42:43 +00:00
Stefan Schantl
4ae9d47ba3
ddns: Import rename NoIP.com handle back to no-ip.com patch
...
This patch is required for compatiblity reasons for any existing
configurations.
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org >
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2019-11-13 19:40:52 +00:00
Jonatan Schlag
9cc131cc5a
Update qemu to version 4.1.0
...
Signed-off-by: Jonatan Schlag <jonatan.schlag@ipfire.org >
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2019-11-13 19:40:39 +00:00
Jonatan Schlag
3e5d4e6f83
libvirt: use a custom config file
...
The patch which adjusts the options for IPFire in the libvirtd.conf does
not apply in a newer version of libvirt. Creating this patch is harder
than to use a separate config file.
This separate config file also enables us to adjust options much faster.
Signed-off-by: Jonatan Schlag <jonatan.schlag@ipfire.org >
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2019-11-13 19:38:59 +00:00
Stefan Schantl
527c3f39b8
ddns: Import upstream patch for NoIP.com
...
Reference: #11561 .
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org >
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2019-11-13 19:36:11 +00:00
peter.mueller@ipfire.org
e153efaf11
OpenSSL: drop preferring of Chacha20/Poly1305 over AES-GCM
...
As hardware acceleration for AES is emerging (Fireinfo indicates
30.98% of reporting installations support this, compared to
28.22% in summer), there is no more reason to manually prefer
Chacha20/Poly1305 over it.
Further, overall performance is expected to increase as server
CPUs usually come with AES-NI today, where Chacha/Poly would
be an unnecessary bottleneck. Small systems without AES-NI,
however, compute Chacha/Poly measurable, but not significantly faster,
so there only was a small advantage of this.
This patch changes the OpenSSL default ciphersuite to:
TLS_CHACHA20_POLY1305_SHA256 TLSv1.3 Kx=any Au=any Enc=CHACHA20/POLY1305(256) Mac=AEAD
TLS_AES_256_GCM_SHA384 TLSv1.3 Kx=any Au=any Enc=AESGCM(256) Mac=AEAD
TLS_AES_128_GCM_SHA256 TLSv1.3 Kx=any Au=any Enc=AESGCM(128) Mac=AEAD
ECDHE-ECDSA-AES256-GCM-SHA384 TLSv1.2 Kx=ECDH Au=ECDSA Enc=AESGCM(256) Mac=AEAD
ECDHE-ECDSA-CHACHA20-POLY1305 TLSv1.2 Kx=ECDH Au=ECDSA Enc=CHACHA20/POLY1305(256) Mac=AEAD
ECDHE-ECDSA-AES128-GCM-SHA256 TLSv1.2 Kx=ECDH Au=ECDSA Enc=AESGCM(128) Mac=AEAD
ECDHE-RSA-AES256-GCM-SHA384 TLSv1.2 Kx=ECDH Au=RSA Enc=AESGCM(256) Mac=AEAD
ECDHE-RSA-CHACHA20-POLY1305 TLSv1.2 Kx=ECDH Au=RSA Enc=CHACHA20/POLY1305(256) Mac=AEAD
ECDHE-RSA-AES128-GCM-SHA256 TLSv1.2 Kx=ECDH Au=RSA Enc=AESGCM(128) Mac=AEAD
ECDHE-ECDSA-AES256-SHA384 TLSv1.2 Kx=ECDH Au=ECDSA Enc=AES(256) Mac=SHA384
ECDHE-ECDSA-CAMELLIA256-SHA384 TLSv1.2 Kx=ECDH Au=ECDSA Enc=Camellia(256) Mac=SHA384
ECDHE-RSA-AES256-SHA384 TLSv1.2 Kx=ECDH Au=RSA Enc=AES(256) Mac=SHA384
ECDHE-RSA-CAMELLIA256-SHA384 TLSv1.2 Kx=ECDH Au=RSA Enc=Camellia(256) Mac=SHA384
ECDHE-ECDSA-AES128-SHA256 TLSv1.2 Kx=ECDH Au=ECDSA Enc=AES(128) Mac=SHA256
ECDHE-ECDSA-CAMELLIA128-SHA256 TLSv1.2 Kx=ECDH Au=ECDSA Enc=Camellia(128) Mac=SHA256
ECDHE-RSA-AES128-SHA256 TLSv1.2 Kx=ECDH Au=RSA Enc=AES(128) Mac=SHA256
ECDHE-RSA-CAMELLIA128-SHA256 TLSv1.2 Kx=ECDH Au=RSA Enc=Camellia(128) Mac=SHA256
DHE-RSA-AES256-GCM-SHA384 TLSv1.2 Kx=DH Au=RSA Enc=AESGCM(256) Mac=AEAD
DHE-RSA-CHACHA20-POLY1305 TLSv1.2 Kx=DH Au=RSA Enc=CHACHA20/POLY1305(256) Mac=AEAD
DHE-RSA-AES128-GCM-SHA256 TLSv1.2 Kx=DH Au=RSA Enc=AESGCM(128) Mac=AEAD
DHE-RSA-AES256-SHA256 TLSv1.2 Kx=DH Au=RSA Enc=AES(256) Mac=SHA256
DHE-RSA-CAMELLIA256-SHA256 TLSv1.2 Kx=DH Au=RSA Enc=Camellia(256) Mac=SHA256
DHE-RSA-AES128-SHA256 TLSv1.2 Kx=DH Au=RSA Enc=AES(128) Mac=SHA256
DHE-RSA-CAMELLIA128-SHA256 TLSv1.2 Kx=DH Au=RSA Enc=Camellia(128) Mac=SHA256
ECDHE-ECDSA-AES256-SHA TLSv1 Kx=ECDH Au=ECDSA Enc=AES(256) Mac=SHA1
ECDHE-ECDSA-AES128-SHA TLSv1 Kx=ECDH Au=ECDSA Enc=AES(128) Mac=SHA1
ECDHE-RSA-AES256-SHA TLSv1 Kx=ECDH Au=RSA Enc=AES(256) Mac=SHA1
ECDHE-RSA-AES128-SHA TLSv1 Kx=ECDH Au=RSA Enc=AES(128) Mac=SHA1
DHE-RSA-AES256-SHA SSLv3 Kx=DH Au=RSA Enc=AES(256) Mac=SHA1
DHE-RSA-CAMELLIA256-SHA SSLv3 Kx=DH Au=RSA Enc=Camellia(256) Mac=SHA1
DHE-RSA-AES128-SHA SSLv3 Kx=DH Au=RSA Enc=AES(128) Mac=SHA1
DHE-RSA-CAMELLIA128-SHA SSLv3 Kx=DH Au=RSA Enc=Camellia(128) Mac=SHA1
AES256-GCM-SHA384 TLSv1.2 Kx=RSA Au=RSA Enc=AESGCM(256) Mac=AEAD
AES128-GCM-SHA256 TLSv1.2 Kx=RSA Au=RSA Enc=AESGCM(128) Mac=AEAD
AES256-SHA256 TLSv1.2 Kx=RSA Au=RSA Enc=AES(256) Mac=SHA256
CAMELLIA256-SHA256 TLSv1.2 Kx=RSA Au=RSA Enc=Camellia(256) Mac=SHA256
AES128-SHA256 TLSv1.2 Kx=RSA Au=RSA Enc=AES(128) Mac=SHA256
CAMELLIA128-SHA256 TLSv1.2 Kx=RSA Au=RSA Enc=Camellia(128) Mac=SHA256
AES256-SHA SSLv3 Kx=RSA Au=RSA Enc=AES(256) Mac=SHA1
CAMELLIA256-SHA SSLv3 Kx=RSA Au=RSA Enc=Camellia(256) Mac=SHA1
AES128-SHA SSLv3 Kx=RSA Au=RSA Enc=AES(128) Mac=SHA1
CAMELLIA128-SHA SSLv3 Kx=RSA Au=RSA Enc=Camellia(128) Mac=SHA1
Signed-off-by: Peter Müller <peter.mueller@ipfire.org >
Acked-by: Michael Tremer <michael.tremer@ipfire.org >
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2019-11-13 19:01:19 +00:00
Erik Kapfer
bc456dd750
lz4: Update to version 1.9.2
...
Several fixes and improvements has been integrated. The changes list through the different versions since
the current version 1.8.1.2 can be found in here --> https://github.com/lz4/lz4/releases
Signed-off-by: Erik Kapfer <ummeegge@ipfire.org >
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org >
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2019-11-13 18:43:04 +00:00
Michael Tremer
951a9f9ba0
linux+iptables: Drop support for IMQ
...
This is no longer needed since we are using IFB now
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
Signed-off-by: Daniel Weismüller <daniel.weismueller@ipfire.org >
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2019-10-21 18:58:08 +00:00
Arne Fitzenreiter
c27fdd8697
Revert "linux+iptables: Drop support for IMQ"
...
This reverts commit 59b9a6bd22 .
2019-10-20 20:20:26 +00:00
Arne Fitzenreiter
ea16154f5c
Revert "bash: add patches 001 - 011 for 5.0 version"
...
This reverts commit 2c0ee2b962 .
2019-10-15 07:36:47 +00:00
Arne Fitzenreiter
918a57cfeb
Revert "readline: add patch 001 for version 8.0"
...
This reverts commit c5f0c44451 .
2019-10-15 07:36:00 +00:00
Arne Fitzenreiter
d19c82678b
Revert "bash/readline: drop orphaned patches"
...
This reverts commit 95f1c332d8 .
2019-10-15 07:35:22 +00:00
Michael Tremer
59b9a6bd22
linux+iptables: Drop support for IMQ
...
This is no longer needed since we are using IFB now
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2019-10-14 18:02:55 +00:00
peter.mueller@ipfire.org
95f1c332d8
bash/readline: drop orphaned patches
...
Signed-off-by: Peter Müller <peter.mueller@ipfire.org >
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2019-10-14 17:12:46 +00:00
peter.mueller@ipfire.org
c5f0c44451
readline: add patch 001 for version 8.0
...
Signed-off-by: Peter Müller <peter.mueller@ipfire.org >
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2019-10-14 17:12:38 +00:00
peter.mueller@ipfire.org
2c0ee2b962
bash: add patches 001 - 011 for 5.0 version
...
Signed-off-by: Peter Müller <peter.mueller@ipfire.org >
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2019-10-14 17:12:09 +00:00
Matthias Fischer
2fc8d41915
hostapd: Update to 2.9
...
For details see:
https://w1.fi/cgit/hostap/plain/hostapd/ChangeLog
Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org >
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org >
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2019-10-08 18:09:10 +00:00
Stefan Schantl
415969cc1b
kernel: Backport patch to fix a netfilter contrack related issue.
...
This fixes the packet drop issue when using suricata on IPFire.
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org >
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2019-09-21 09:53:56 +00:00
Arne Fitzenreiter
fd24c5dcbd
Merge remote-tracking branch 'arne_f/perl-5.30' into next
2019-08-20 17:43:53 +00:00
Arne Fitzenreiter
c6277d3b10
perl: remove unused patches
...
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2019-08-16 21:33:52 +02:00
Michael Tremer
6580bdeb6b
freeradius: Build package without generating certificates
...
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
2019-08-10 03:12:04 +01:00
Arne Fitzenreiter
6836e528e5
u-boot-friendlyarm: add u-boot for nanopi-r1 to boot from eMMC
...
this is a heavy patched version and should replaced when stock
u-boot is able to boot from h3 eMMC.
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2019-08-06 04:32:22 +00:00
Arne Fitzenreiter
de8810fbaa
iperf3: update to 3.7
...
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2019-07-17 13:15:33 +02:00
Peter Müller
69772b7dda
OpenSSL: lower priority for CBC ciphers in default cipherlist
...
In order to avoid CBC ciphers as often as possible (they contain
some known vulnerabilities), this changes the OpenSSL default
ciphersuite to:
TLS_CHACHA20_POLY1305_SHA256 TLSv1.3 Kx=any Au=any Enc=CHACHA20/POLY1305(256) Mac=AEAD
TLS_AES_256_GCM_SHA384 TLSv1.3 Kx=any Au=any Enc=AESGCM(256) Mac=AEAD
TLS_AES_128_GCM_SHA256 TLSv1.3 Kx=any Au=any Enc=AESGCM(128) Mac=AEAD
ECDHE-ECDSA-CHACHA20-POLY1305 TLSv1.2 Kx=ECDH Au=ECDSA Enc=CHACHA20/POLY1305(256) Mac=AEAD
ECDHE-ECDSA-AES256-GCM-SHA384 TLSv1.2 Kx=ECDH Au=ECDSA Enc=AESGCM(256) Mac=AEAD
ECDHE-ECDSA-AES128-GCM-SHA256 TLSv1.2 Kx=ECDH Au=ECDSA Enc=AESGCM(128) Mac=AEAD
ECDHE-RSA-CHACHA20-POLY1305 TLSv1.2 Kx=ECDH Au=RSA Enc=CHACHA20/POLY1305(256) Mac=AEAD
ECDHE-RSA-AES256-GCM-SHA384 TLSv1.2 Kx=ECDH Au=RSA Enc=AESGCM(256) Mac=AEAD
ECDHE-RSA-AES128-GCM-SHA256 TLSv1.2 Kx=ECDH Au=RSA Enc=AESGCM(128) Mac=AEAD
ECDHE-ECDSA-AES256-SHA384 TLSv1.2 Kx=ECDH Au=ECDSA Enc=AES(256) Mac=SHA384
ECDHE-ECDSA-CAMELLIA256-SHA384 TLSv1.2 Kx=ECDH Au=ECDSA Enc=Camellia(256) Mac=SHA384
ECDHE-RSA-AES256-SHA384 TLSv1.2 Kx=ECDH Au=RSA Enc=AES(256) Mac=SHA384
ECDHE-RSA-CAMELLIA256-SHA384 TLSv1.2 Kx=ECDH Au=RSA Enc=Camellia(256) Mac=SHA384
ECDHE-ECDSA-AES128-SHA256 TLSv1.2 Kx=ECDH Au=ECDSA Enc=AES(128) Mac=SHA256
ECDHE-ECDSA-CAMELLIA128-SHA256 TLSv1.2 Kx=ECDH Au=ECDSA Enc=Camellia(128) Mac=SHA256
ECDHE-RSA-AES128-SHA256 TLSv1.2 Kx=ECDH Au=RSA Enc=AES(128) Mac=SHA256
ECDHE-RSA-CAMELLIA128-SHA256 TLSv1.2 Kx=ECDH Au=RSA Enc=Camellia(128) Mac=SHA256
DHE-RSA-CHACHA20-POLY1305 TLSv1.2 Kx=DH Au=RSA Enc=CHACHA20/POLY1305(256) Mac=AEAD
DHE-RSA-AES256-GCM-SHA384 TLSv1.2 Kx=DH Au=RSA Enc=AESGCM(256) Mac=AEAD
DHE-RSA-AES128-GCM-SHA256 TLSv1.2 Kx=DH Au=RSA Enc=AESGCM(128) Mac=AEAD
DHE-RSA-AES256-SHA256 TLSv1.2 Kx=DH Au=RSA Enc=AES(256) Mac=SHA256
DHE-RSA-CAMELLIA256-SHA256 TLSv1.2 Kx=DH Au=RSA Enc=Camellia(256) Mac=SHA256
DHE-RSA-AES128-SHA256 TLSv1.2 Kx=DH Au=RSA Enc=AES(128) Mac=SHA256
DHE-RSA-CAMELLIA128-SHA256 TLSv1.2 Kx=DH Au=RSA Enc=Camellia(128) Mac=SHA256
ECDHE-ECDSA-AES256-SHA TLSv1 Kx=ECDH Au=ECDSA Enc=AES(256) Mac=SHA1
ECDHE-ECDSA-AES128-SHA TLSv1 Kx=ECDH Au=ECDSA Enc=AES(128) Mac=SHA1
ECDHE-RSA-AES256-SHA TLSv1 Kx=ECDH Au=RSA Enc=AES(256) Mac=SHA1
ECDHE-RSA-AES128-SHA TLSv1 Kx=ECDH Au=RSA Enc=AES(128) Mac=SHA1
DHE-RSA-AES256-SHA SSLv3 Kx=DH Au=RSA Enc=AES(256) Mac=SHA1
DHE-RSA-CAMELLIA256-SHA SSLv3 Kx=DH Au=RSA Enc=Camellia(256) Mac=SHA1
DHE-RSA-AES128-SHA SSLv3 Kx=DH Au=RSA Enc=AES(128) Mac=SHA1
DHE-RSA-CAMELLIA128-SHA SSLv3 Kx=DH Au=RSA Enc=Camellia(128) Mac=SHA1
AES256-GCM-SHA384 TLSv1.2 Kx=RSA Au=RSA Enc=AESGCM(256) Mac=AEAD
AES128-GCM-SHA256 TLSv1.2 Kx=RSA Au=RSA Enc=AESGCM(128) Mac=AEAD
AES256-SHA256 TLSv1.2 Kx=RSA Au=RSA Enc=AES(256) Mac=SHA256
CAMELLIA256-SHA256 TLSv1.2 Kx=RSA Au=RSA Enc=Camellia(256) Mac=SHA256
AES128-SHA256 TLSv1.2 Kx=RSA Au=RSA Enc=AES(128) Mac=SHA256
CAMELLIA128-SHA256 TLSv1.2 Kx=RSA Au=RSA Enc=Camellia(128) Mac=SHA256
AES256-SHA SSLv3 Kx=RSA Au=RSA Enc=AES(256) Mac=SHA1
CAMELLIA256-SHA SSLv3 Kx=RSA Au=RSA Enc=Camellia(256) Mac=SHA1
AES128-SHA SSLv3 Kx=RSA Au=RSA Enc=AES(128) Mac=SHA1
CAMELLIA128-SHA SSLv3 Kx=RSA Au=RSA Enc=Camellia(128) Mac=SHA1
Since TLS servers usually override the clients' preference with their
own, this will neither break existing setups nor introduce huge
differences in the wild. Unfortunately, CBC ciphers cannot be disabled
at all, as they are still used by popular web sites.
TLS 1.3 ciphers will be added implicitly and can be omitted in the
ciphersting. Chacha20/Poly1305 is preferred over AES-GCM due to missing
AES-NI support for the majority of installations reporting to Fireinfo
(see https://fireinfo.ipfire.org/processors for details, AES-NI support
is 28.22% at the time of writing).
Signed-off-by: Peter Müller <peter.mueller@ipfire.org >
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
2019-06-12 17:24:00 +01:00
Matthias Fischer
3f7cec61c9
hostapd: Update to 2.8
...
For details see:
https://w1.fi/cgit/hostap/plain/hostapd/ChangeLog
Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org >
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
2019-06-10 09:45:54 +01:00
Michael Tremer
29fc1c8c3a
ddns: Update to 011
...
Add support for two new providers and has some general bug fixes
included.
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
2019-05-27 16:25:01 +01:00
Michael Tremer
333125abf8
Merge branch 'toolchain' into next
2019-05-24 06:55:03 +01:00
Michael Tremer
9f0295a512
Merge remote-tracking branch 'ms/faster-build' into next
2019-05-24 06:54:16 +01:00
Matthias Fischer
d2b5f03631
squid: Update to 4.7
...
For details see:
http://www.squid-cache.org/Versions/v4/changesets/
Fixes among other things the old 'filedescriptors' problem, so this patch was deleted.
Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org >
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
2019-05-24 06:37:50 +01:00
Michael Tremer
9d959ac151
igmpproxy: Update to 0.2.1
...
This updates the package to its latest upstream version and should
be able to support IGMPv3.
Fixes : #12074
Suggested-by: Marc Roland <marc.roland@outlook.com >
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
2019-05-11 02:20:15 +01:00
Michael Tremer
3966b1e58f
iptables: Fix build without kernel source
...
The layer7 filter header files were not installed into /usr/include
and therefore we needed to keep the whole kernel source tree.
This is just a waste of space and this patch fixes this.
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
2019-05-10 04:55:49 +01:00
Michael Tremer
525f5d2959
gcc: Update to 8.3.0
...
This patch carries the rootfile for x86_64 only.
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
2019-04-28 09:44:37 +01:00
Michael Tremer
4987d0ed19
grub: Fix relocation type issue
...
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
2019-04-28 09:43:37 +01:00
Michael Tremer
bab38dad60
ipfire-netboot: Fix compiling and linking with new GCC & binutils
...
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
2019-04-28 09:43:24 +01:00
Michael Tremer
7f156022b5
sarg: Fix build with newer GCCs
...
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
2019-04-28 09:43:08 +01:00
Michael Tremer
2cecfd0fdb
grub: Fix build error with GCC 8
...
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
2019-04-26 16:19:51 +01:00
Michael Tremer
918ee4a4cf
strongswan: Manually install all routes for non-routed VPNs
...
This is a regression from disabling charon.install_routes.
VPNs are routing fine as long as traffic is passing through
the firewall. Traps are not propertly used as long as these
routes are not present and therefore we won't trigger any
tunnels when traffic originates from the firewall.
Fixes : #12045
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
2019-04-08 16:44:57 +01:00
Arne Fitzenreiter
3005eb2234
kernel: update user regd patch from openwrt
...
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2019-03-30 16:56:56 +01:00
Matthias Fischer
6bc94afa0d
lua: Update to 5.3.5
...
For details see:
http://www.lua.org/bugs.html
Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org >
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
2019-03-21 20:41:44 +00:00
Arne Fitzenreiter
c448474fc7
Revert "kernel: cleanup unused rpi patch"
...
This reverts commit a2d49659f3 .
The patch is still needed to prevent strange crashes
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2019-03-13 09:39:07 +01:00
Matthias Fischer
d6d5999af1
hostapd: Update to 2.7
...
For details see:
https://w1.fi/cgit/hostap/plain/hostapd/ChangeLog
This patch sticks to 'wpa_supplicant: Update to 2.7'.
Best,
Matthias
Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org >
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
2019-03-04 09:26:58 +00:00