Commit Graph

6690 Commits

Author SHA1 Message Date
Michael Tremer
71ff23c765 Rootfile update
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-28 11:41:46 +01:00
Michael Tremer
fe9dbfa124 core133: Ship updated IPS ruleset sources
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-27 15:48:44 +01:00
Stefan Schantl
79af9f6938 ruleset-sources: Update snort dl urls.
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-27 15:48:15 +01:00
Michael Tremer
f6104aa1e0 core133: Drop metadata for jansson package
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-27 15:42:50 +01:00
Michael Tremer
86efc510f9 core133: Ship hyperscan
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-27 15:40:31 +01:00
Michael Tremer
81544f8884 hyperscan: Move rootfiles to arch directories
This package is only compiled on x86_64 and i586 and cannot
be packaged in any of the other architectures.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-27 15:38:42 +01:00
Stefan Schantl
52ebc66bba hyperscan: New package
This package adds hyperscan support to suricata

Fixes #12053.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-27 14:40:14 +01:00
Stefan Schantl
2348cfffcf ragel: New package
This is a build dependency of hyperscan

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-27 14:40:03 +01:00
Stefan Schantl
1a5f064916 colm: New package
This is a build dependency of ragel, which is a build dependency of
hyperscan.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-27 14:39:32 +01:00
Stefan Schantl
616395f37c jansson: Move to core system and update to 2.12
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-27 14:39:00 +01:00
Michael Tremer
f6e18df542 Rootfile update
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-27 14:37:23 +01:00
Arne Fitzenreiter
8a104d7f02 core133: readd late core132 changes to core133
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2019-05-26 17:27:16 +02:00
Arne Fitzenreiter
83809af1fb Merge branch 'master' into next 2019-05-26 17:23:54 +02:00
Arne Fitzenreiter
637885839b core132: security conf should not executable
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2019-05-26 16:17:04 +02:00
Stefan Schantl
fefb5173cf ids-functions.pl: Do not delete the whitelist file on rulesdir cleanup.
Fixes #12087.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2019-05-26 16:09:21 +02:00
Arne Fitzenreiter
d0db7550ed core132: set correct permissions of security settings file.
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2019-05-26 16:05:41 +02:00
Michael Tremer
333125abf8 Merge branch 'toolchain' into next 2019-05-24 06:55:03 +01:00
Michael Tremer
9f0295a512 Merge remote-tracking branch 'ms/faster-build' into next 2019-05-24 06:54:16 +01:00
Michael Tremer
8feb0db430 core133: Ship updated squid
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-24 06:39:37 +01:00
Michael Tremer
53ef2a0ffe core133: Ship updated bind
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-24 06:37:21 +01:00
Matthias Fischer
f225f3ee29 bind: Update to 9.11.7
For details see:
http://ftp.isc.org/isc/bind9/9.11.7/RELEASE-NOTES-bind-9.11.7.html

"Security Fixes

  The TCP client quota set using the tcp-clients option could be exceeded in some cases.
  This could lead to exhaustion of file descriptors.
  This flaw is disclosed in CVE-2018-5743. [GL #615]"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-24 06:36:55 +01:00
Michael Tremer
79967ee9c4 Start Core Update 133
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-24 06:35:46 +01:00
Arne Fitzenreiter
716f00b116 kernel: update to 4.14.121
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2019-05-21 20:42:51 +02:00
Arne Fitzenreiter
b0d31edbd6 vnstat: fix errormessage at first boot
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2019-05-21 20:36:16 +02:00
Arne Fitzenreiter
6d37280f3e configroot: create main/security settings file
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2019-05-21 15:03:21 +02:00
Arne Fitzenreiter
405f69fc9c web-user-interface: update rootfile
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2019-05-21 15:02:54 +02:00
Michael Tremer
a087f4f586 core132: Ship vulnerabilities.cgi
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-20 21:55:55 +01:00
Michael Tremer
6f626b9ba0 Add the new vulnerabilities CGI file to the System menu
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-20 21:38:20 +01:00
Michael Tremer
6a83dbb451 SMT: Apply settings according to configuration
SMT can be forced on.

By default, all systems that are vulnerable to RIDL/Fallout
will have SMT disabled by default.

Systems that are not vulnerable to that will keep SMT enabled.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-20 21:30:26 +01:00
Michael Tremer
db3451fe72 suricata: Ship updated rule download script
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-20 19:10:15 +01:00
Peter Müller
40407aee99 ids.cgi: Fix upstream proxy validation
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Acked-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-20 18:50:06 +01:00
Michael Tremer
933bfbf305 core132: Ship updated ovpnmain.cgi file
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-20 10:52:16 +01:00
Erik Kapfer
ffcef39d40 tshark: New addon
Signed-off-by: Erik Kapfer <ummeegge@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-20 10:44:04 +01:00
Peter Müller
2df98063a2 Tor: specify correct user for default configuration
While being built with user/group set to "tor", the default
configuration still contains the old username.

This patch adjusts it to the correct value. The issue was
caused by insufficient testing, which I apologise for.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-20 10:08:58 +01:00
Arne Fitzenreiter
9961167a52 core132: add log.dat to updater
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2019-05-20 07:14:12 +02:00
Michael Tremer
f809b8d5c7 core132: Ship updated apache configuration
A reload would be sufficient.

I could not find why apache needs to be restarted.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-17 20:30:13 +01:00
Peter Müller
df62774e32 httpd: prefer AES-GCM ciphers over AES-CBC
CBC ciphers are vulnerable to a bunch of attacks (being
rather academic so far) such as MAC-then-encrypt or
padding oracle.

These seem to be more serious (see
https://blog.qualys.com/technology/2019/04/22/zombie-poodle-and-goldendoodle-vulnerabilities
for further readings) which is why they should be used
for interoperability purposes only.

I plan to remove AES-CBC ciphers for the WebUI at the
end of the year, provided overall security landscape
has not changed until that.

This patch changes the WebUI cipherlist to:
TLS_CHACHA20_POLY1305_SHA256 TLSv1.3 Kx=any      Au=any  Enc=CHACHA20/POLY1305(256) Mac=AEAD
TLS_AES_256_GCM_SHA384  TLSv1.3 Kx=any      Au=any  Enc=AESGCM(256) Mac=AEAD
TLS_AES_128_GCM_SHA256  TLSv1.3 Kx=any      Au=any  Enc=AESGCM(128) Mac=AEAD
ECDHE-ECDSA-CHACHA20-POLY1305 TLSv1.2 Kx=ECDH     Au=ECDSA Enc=CHACHA20/POLY1305(256) Mac=AEAD
ECDHE-ECDSA-AES256-GCM-SHA384 TLSv1.2 Kx=ECDH     Au=ECDSA Enc=AESGCM(256) Mac=AEAD
ECDHE-ECDSA-AES128-GCM-SHA256 TLSv1.2 Kx=ECDH     Au=ECDSA Enc=AESGCM(128) Mac=AEAD
ECDHE-RSA-CHACHA20-POLY1305 TLSv1.2 Kx=ECDH     Au=RSA  Enc=CHACHA20/POLY1305(256) Mac=AEAD
ECDHE-RSA-AES256-GCM-SHA384 TLSv1.2 Kx=ECDH     Au=RSA  Enc=AESGCM(256) Mac=AEAD
ECDHE-RSA-AES128-GCM-SHA256 TLSv1.2 Kx=ECDH     Au=RSA  Enc=AESGCM(128) Mac=AEAD
ECDHE-ECDSA-AES256-SHA384 TLSv1.2 Kx=ECDH     Au=ECDSA Enc=AES(256)  Mac=SHA384
ECDHE-ECDSA-AES128-SHA256 TLSv1.2 Kx=ECDH     Au=ECDSA Enc=AES(128)  Mac=SHA256
ECDHE-RSA-AES256-SHA384 TLSv1.2 Kx=ECDH     Au=RSA  Enc=AES(256)  Mac=SHA384
ECDHE-RSA-AES128-SHA256 TLSv1.2 Kx=ECDH     Au=RSA  Enc=AES(128)  Mac=SHA256

(AES-CBC + ECDSA will be preferred over RSA for performance
reasons. As this cipher order cannot be trivially rebuilt with
OpenSSL cipher stings, it has to be hard-coded.)

All working clients will stay compatible.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-17 20:27:41 +01:00
Michael Tremer
0aa21ad307 Fix version information in backupiso script
Fixes: #12083
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-17 19:52:27 +01:00
Arne Fitzenreiter
16cb73d901 kernel: update to 4.14.120
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2019-05-17 07:10:52 +02:00
Arne Fitzenreiter
d099196501 kernel: update to 4.14.119
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2019-05-16 14:26:04 +02:00
Arne Fitzenreiter
29b907c677 intel-microcode: update to 20190514
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2019-05-15 13:17:26 +02:00
Michael Tremer
54fc710b99 Update kernel rootfiles for armv5tel
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-14 10:02:03 +01:00
Michael Tremer
da636bd8b7 Update kernel rootfiles for aarch64
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-13 16:31:14 +01:00
Michael Tremer
fd4cea1e34 core132: Ship changes to unbound
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-11 04:24:29 +01:00
Michael Tremer
661ab15389 unbound: Add Safe Search
This is a feature that will filter adult content from search
engine's results.

The old method of rewriting the HTTP request no longer works.

This method changes the DNS response for supported search engines
which violates our belief in DNSSEC and won't allow these search
engines to ever enable DNSSEC.

However, there is no better solution available to this and this
an optional feature, too.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2019-05-11 04:19:37 +01:00
Michael Tremer
76630c4336 core132: Ship updated urlfilter.cgi
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-11 04:18:08 +01:00
Michael Tremer
38d19a50a0 core132: Ship updated hwdata
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-10 04:20:17 +01:00
Michael Tremer
c209eaedb9 core132: Ship updated ca-certificates
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-10 04:19:05 +01:00
Peter Müller
968ce70af1 update ca-certificates CA bundle
Update the CA certificates list to what Mozilla NSS ships currently.

The original file can be retrieved from:
https://hg.mozilla.org/mozilla-central/raw-file/tip/security/nss/lib/ckfw/builtins/certdata.txt

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-10 04:18:35 +01:00
Michael Tremer
88e64c23c1 routing: Fix potential authenticated XSS in input processing
An authenticated Stored XSS (Cross-site Scripting) exists in the
(https://192.168.0.241:444/cgi-bin/routing.cgi) Routing Table Entries
via the "Remark" text box  or "remark" parameter. This is due to a
lack of user input validation in "Remark" text box  or "remark"
parameter. It allows an authenticated WebGUI user with privileges
for the affected page to execute Stored Cross-site Scripting in
the Routing Table Entries (/cgi-bin/routing.cgi), which helps
attacker to redirect the victim to a attacker's phishing page.

The Stored XSS get prompted on the victims page whenever victim
tries to access the Routing Table Entries configuraiton page.

An attacker get access to the victim's session by performing
the CSRF and gather the cookie and session id's or possibly can
change the victims configuration using this Stored XSS.

This attack can possibly spoof the victim's informations.

Fixes: #12072
Reported-by: Dharmesh Baskaran <dharmesh201093@gmail.com>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-10 09:04:54 +01:00