Commit Graph

8067 Commits

Author SHA1 Message Date
Michael Tremer
ffabad848b core155: Ship ipset
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-03-10 13:57:58 +00:00
Michael Tremer
cf3f40c3c6 core155: Ship iproute2
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-03-10 13:57:25 +00:00
Adolf Belka (ipfire)
0a622d2013 iproute2: Update to 5.11.0
- Update iproute2 from 5.10.0 to 5.11.0
- Updated rootfile
- Changelog extracted from commits
lib/fs: Fix single return points for get_cgroup2_*	Andrea Claudi
lib/fs: avoid double call to mkdir on make_path()	Andrea Claudi
lib/bpf: Fix and simplify bpf_mnt_check_target()	Andrea Claudi
lib/namespace: fix ip -all netns return code	Andrea Claudi
ip: lwtunnel: seg6: bail out if table ids are invalid	Andrea Claudi
tc: m_gate: use SPRINT_BUF when needed	Andrea Claudi
man8/bridge.8: be explicit that "flood" is an egress setting	Vladimir Oltean
man8/bridge.8: explain self vs master for "bridge fdb add"	Vladimir Oltean
man8/bridge.8: fix which one of self/master is default for "bridge fdb"	Vladimir Oltean
man8/bridge.8: explain what a local FDB entry is	Vladimir Oltean
man8/bridge.8: document that "local" is default for "bridge fdb add"	Vladimir Oltean
man8/bridge.8: document the "permanent" flag for "bridge fdb add"	Vladimir Oltean
rdma: Fix statistics bind/unbing argument handling	Ido Kalir
uapi: pick up rpl.h fix	Stephen Hemminger
iproute: force rtm_dst_len to 32/128	Luca Boccassi
ss: Add clarification about host conditions with multiple familes to man	Thayne McCombs
Add documentation of ss filter to man page	Thayne McCombs
iplink: print warning for missing VF data	Edwin Peer
ss: do not emit warn while dumping MPTCP on old kernels	Paolo Abeni
man: tc-taprio.8: document the full offload feature	Vladimir Oltean
iplink_bareudp: cleanup help message and man page	Guillaume Nault
vrf: fix ip vrf exec with libbpf	Luca Boccassi
vrf: print BPF log buffer if bpf_program_load fails	Luca Boccassi
build: Fix link errors on some systems	Roi Dayan
tc: flower: fix json output with mpls lse	Guillaume Nault
dcb: Change --Netns/-N to --netns/-n	Petr Machata
dcb: Plug a leaking DCB socket buffer	Petr Machata
dcb: Set values with RTM_SETDCB type	Petr Machata
uapi: update if_link.h from upstream	Stephen Hemminger
include: uapi: Carry dcbnl.h	Petr Machata
uapi: update kernel headers to 5.11 pre rc1

Signed-off-by: Adolf Belka (ipfire) <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-03-10 13:57:00 +00:00
Adolf Belka (ipfire)
583a01f86c hplip: Update to 3.21.2
- Update hplip from 3.20.11 to 3.21.2
- Updated rootfile
- Changelog
Added support for following new Distro's:
Fedora 33
Manjaro 20.2
Debian 10.7
RHEL 8.3
RHEL 7.7
RHEL 7.8
RHEL 7.9
Added support for the following new Printers:
HP LaserJet Enterprise M406dn
HP LaserJet Enterprise M407dn
HP LaserJet Enterprise MFP M430f
HP LaserJet Enterprise MFP M431f
HP LaserJet Managed E40040dn
HP LaserJet Managed MFP E42540f
HP Color LaserJet Enterprise M455dn
HP Color LaserJet Managed E45028dn
HP Color LaserJet Enterprise MFP M480f
HP Color LaserJet Managed MFP E47528f
HP PageWide XL 3920 MFP
HP PageWide XL 4200 Printer
HP PageWide XL 4200 Multifunction Printer
HP PageWide XL 4700 Printer
HP PageWide XL 4700 Multifunction Printer
HP PageWide XL 5200 Printer
HP PageWide XL 5200 Multifunction Printer
HP PageWide XL 8200 Printer
HP Laserjet M207d
HP Laserjet M208d
HP Laserjet M209d
HP Laserjet M210d
HP Laserjet M212d
HP Lasejet  M211d
HP Laserjet M209dw
HP Laserjet M209dwe
HP Laserjet M210dw
HP Laserjet M210dwe
HP Laserjet M212dw
HP LaserJet M212dwe
HP Laserjet M208dw
HP Laserjet M207dw
HP Laserjet M211dw
HP LaserJet MFP M234dw
HP LaserJet MFP M234dwe
HP LaserJet MFP M233d
HP LaserJet MFP M232d
HP LaserJet MFP M235d
HP LaserJet MFP M237d
HP LaserJet MFP M236d
HP LaserJet MFP M232dw
HP LaserJet MFP M232dwc
HP LaserJet MFP M233dw
HP LaserJet MFP M236dw
HP LaserJet MFP M235dw
HP LaserJet MFP M235dwe
HP LaserJet MFP M237dwe
HP LaserJet MFP M237dw
HP LaserJet MFP M232sdn
HP LaserJet MFP M233sdn
HP LaserJet MFP M236sdn
HP LaserJet MFP M234sdn
HP LaserJet MFP M234sdne
HP LaserJet MFP M235sdn
HP LaserJet MFP M235sdne
HP LaserJet MFP M237sdne
HP LaserJet MFP M237sdn
HP LaserJet MFP M232sdw
HP LaserJet MFP M233sdw
HP LaserJet MFP M236sdw
HP LaserJet MFP M234sdw
HP LaserJet MFP M234sdwe
HP LaserJet MFP M235sdw
HP LaserJet MFP M235sdwe
HP LaserJet MFP M237sdwe
HP LaserJet MFP M237sdw

Signed-off-by: Adolf Belka (ipfire) <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-03-10 13:56:46 +00:00
Adolf Belka (ipfire)
a245272081 elfutils: Update to 0.183
- Update elfutils from 0.182 to 0.183
- Updated rootfiles
- Changelog
   2021-02-05  Mark Wielaard  <mark@klomp.org>
	* configure.ac (AC_INIT): Set version to 0.183.
	(AC_COPYRIGHT): Update Copyright year.
	* NEWS: Add 0.183 section.
   2021-02-01  Érico Nogueira  <ericonr@disroot.org>
	* configure.ac: Check for GNU strerror_r.
   2021-01-12  Dmitry V. Levin  <ldv@altlinux.org>
	* configure.ac [--enable-gcov]: Check for gcov, lcov, and genhtml.
	* Makefile.am [GCOV] (coverage, coverage-clean): New targets.
	* .gitignore: Update.
   2020-12-20  Dmitry V. Levin  <ldv@altlinux.org>
	* .gitignore: Move subdirectory patterns to separate .gitignore files.
	* .gitignore: Update.
   2020-12-15  Dmitry V. Levin  <ldv@altlinux.org>
	* configure.ac (USE_NLS, AM_PO_SUBDIRS): Remove.
	(AM_GNU_GETTEXT, AM_GNU_GETTEXT_VERSION,
	AM_GNU_GETTEXT_REQUIRE_VERSION): Use these macros to setup the gettext
	infrastructure.
	* .gitignore: Update.
	* Makefile.am (SUBDIRS): Remove m4.
	* configure.ac (AC_CONFIG_FILES): Remove m4/Makefile.
	* configure.ac (AC_CONFIG_MACRO_DIR): Remove.
   2020-12-12  Dmitry V. Levin  <ldv@altlinux.org>
	* configure.ac: Fix spelling typos in comments.
	* NEWS: Fix spelling typos.
	* NOTES: Likewise.
	* TODO: Likewise.
   2020-12-11  Dmitry V. Levin  <ldv@altlinux.org>
	* configure.ac (AM_CONDITIONAL): Remove HAVE_LIBASM and STANDALONE.
	* configure.ac: Rewrite argp check.
	* configure.ac (AC_MSG_FAILURE): Fix typo.
   2020-11-30  Dmitry V. Levin  <ldv@altlinux.org>
	* configure.ac (LIBDEBUGINFOD_SONAME): New AC_SUBST variable.
	(AC_CONFIG_FILES): Add debuginfod/debuginfod.h.
   2020-11-01  Érico N. Rolim  <erico.erc@gmail.com>
	* configure.ac: Check for fts and obstack from outside libc.

Signed-off-by: Adolf Belka (ipfire) <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-03-10 13:50:36 +00:00
Michael Tremer
9ff0b07dd9 python3: Update rootfile on armv5tel
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-03-10 11:32:56 +00:00
Michael Tremer
1c480ef7bf cdrom: Fix unattended mode on serial console
Reported-by: Daniel Weismüller <daniel.weismueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-03-09 15:58:57 +00:00
Michael Tremer
4cb6eb3f91 core155: Ship graphs.pl
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-03-08 10:55:29 +00:00
Leo-Andres Hofmann
00db2d8343 QoS graphs: Add color mapping table
Use the traffic class description field to identify similar classes.
This ensures that a class used in both the up- and down-link is
printed with matching colors in both graphs.

Signed-off-by: Leo-Andres Hofmann <hofmann@leo-andres.de>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-03-08 10:55:07 +00:00
Matthias Fischer
ea6fa0bcef update.sh: Fix path
Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-03-06 16:44:07 +00:00
Michael Tremer
7705df4d5d core155: Ship openssh
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-03-06 11:30:56 +00:00
Michael Tremer
e071f251dd Merge remote-tracking branch 'ms/riscv64-for-next' into next 2021-03-06 11:15:27 +00:00
Michael Tremer
949829be3e samba: Add rootfile for riscv64
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-03-06 11:14:51 +00:00
Michael Tremer
198443e60c suricata: Disable build on riscv64 for lack of Rust
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-03-06 11:14:51 +00:00
Michael Tremer
948370bd39 core155: It looks like our tooling can't handle this
Python3 has a common rootfile for x86_64 and aarch64 and separate files
for armv5tel and i586. The core update build scripts cannot deal with
this which makes it necessary to create individual links to the correct
rootfile for each architecture.

Third time lucky.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-03-04 15:08:25 +00:00
Michael Tremer
ee7f87807b python3: I didn't realise that i586 had a separate rootfile
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-03-04 10:49:18 +00:00
Michael Tremer
33d2cb29bf core155: Ship dhcp
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-03-03 16:50:15 +00:00
Michael Tremer
c18cf8e209 core155: Ship wget
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-03-03 16:49:00 +00:00
Matthias Fischer
02f31c4091 mc: Update to 4.8.26
For details see:
http://midnight-commander.org/wiki/NEWS-4.8.26

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-03-03 16:48:30 +00:00
Michael Tremer
e2cc8e4e9b python3: Update to 3.8.7
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-03-03 16:45:57 +00:00
Michael Tremer
4c0e047bb5 core155: Ship libffi and all dependencies
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-03-03 13:40:33 +00:00
Michael Tremer
870c02a5e8 libffi: Update to 3.3
This contains a version bump which requires us to ship Python 2 and
Python 3 again.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-03-03 13:32:28 +00:00
Matthias Fischer
a9285618b9 suricata: Update to 5.0.6
For details see:
https://forum.suricata.io/t/suricata-6-0-2-and-5-0-6-released/1170

and

https://redmine.openinfosecfoundation.org/versions/164

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-03-03 13:27:03 +00:00
Michael Tremer
88cd5e5d0b core155: Ship libhtp
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-03-03 13:25:02 +00:00
Michael Tremer
ffafaa71a6 firewall: Remove ALGs from UI
This change drops the UIs that could enable ALGs for various protocols.

Those have been all forcibly disabled because "NAT Slipstream".

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-03-02 18:45:13 +00:00
Michael Tremer
4eaa5b9176 core155: Disable all connection tracking helpers
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-03-02 18:35:13 +00:00
Michael Tremer
69b3d63b82 e2fsprogs: Disable libraries provided by util-linux
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-03-02 17:40:34 +00:00
Michael Tremer
b6deb78d91 suricata: Ship after updating rust compiler
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-03-01 21:32:08 +00:00
Michael Tremer
f8798c09e9 core155_ Ship boost again
This is necessary because boost has been removed by filesystem-cleanup.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-02-27 15:31:07 +00:00
Michael Tremer
e1f33fdcec rust: Update rootfiles for aarch64 and armv5tel
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-02-25 17:56:11 +00:00
Michael Tremer
d7005ce842 rust: Remove LLVM tools
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-02-25 13:55:16 +00:00
Matthias Fischer
a471762fb0 rust: Update to 1.50
For details see:
https://github.com/rust-lang/rust/blob/master/RELEASES.md

Unfortunately I can only build with 32bit and 64bit, this is why I
couldn't upload the rootfiles for 'aarch64' and 'armv5tel'.

Tested here with 'suricata 5.0.5' - running without seen problems.

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-02-24 17:27:36 +00:00
Michael Tremer
11ddd84da8 core155: Ship zoneconf
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-02-22 19:00:45 +00:00
Matthias Fischer
70b43b54c9 libxcrypt 4.4.17: Fix for rootfile
Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-02-22 11:28:11 +00:00
Michael Tremer
e7c7ccfa37 core155: Ship tar
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-02-22 11:27:40 +00:00
Michael Tremer
79eec2773e core155: Ship libgcrypt
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-02-22 11:26:50 +00:00
Matthias Fischer
e9b3b1489c libgcrypt: Update to 1.9.2
For details see:
https://lists.gnupg.org/pipermail/gnupg-announce/2021q1/000457.html

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-02-22 11:26:29 +00:00
Michael Tremer
7bd51283c8 core155: Ship nettle
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-02-22 11:26:19 +00:00
Matthias Fischer
dd42ea2c5e nettle: Update to 3.7.1
For details see:

Annonce for 3.7.1:
http://lists.lysator.liu.se/pipermail/nettle-bugs/2021/009434.html

Announce for 3.6:
http://lists.lysator.liu.se/pipermail/nettle-bugs/2020/008967.html

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-02-22 11:25:50 +00:00
Michael Tremer
4a22b1f4f5 core155: Ship bind
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-02-19 19:32:43 +00:00
Matthias Fischer
482634a1d3 bind: Update to 9.11.28
For details see:
https://downloads.isc.org/isc/bind9/9.11.28/RELEASE-NOTES-bind-9.11.28.html

"Notes for BIND 9.11.28
Security Fixes

When tkey-gssapi-keytab or tkey-gssapi-credential was configured,
a specially crafted GSS-TSIG query could cause a buffer overflow in the
ISC implementation of SPNEGO (a protocol enabling negotiation of the
security mechanism to use for GSSAPI authentication). This flaw could
be exploited to crash named. Theoretically, it also enabled remote code
execution, but achieving the latter is very difficult in real-world
conditions. (CVE-2020-8625)

This vulnerability was responsibly reported to us as ZDI-CAN-12302
by Trend Micro Zero Day Initiative. [GL #2354]"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-02-19 19:32:28 +00:00
Michael Tremer
d338e55ce5 libjpeg-compat: Drop package
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-02-17 16:25:14 +00:00
Michael Tremer
8ea237077d readline-compat: Drop package
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-02-17 16:23:17 +00:00
Michael Tremer
c47c054877 berkeley-compat: Drop package
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-02-17 16:21:24 +00:00
Michael Tremer
ed5ef20850 gmp-compat: Drop package
This is no longer required because everything should be linked against
the current version.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-02-17 16:18:30 +00:00
Michael Tremer
6dc206ab69 Drop /usr/lib/sse2
This is now unused

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-02-16 18:00:16 +00:00
Michael Tremer
44558ee19c openssl: Drop SSE2-optimized version
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-02-16 17:55:29 +00:00
Michael Tremer
a810c2ae8f gmp: Drop SSE2-optimized version on i586
The next version of glibc has removed support for this and this patch
removes it.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-02-16 17:43:12 +00:00
Michael Tremer
9572ae7b1d core155: Ship openssl
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-02-16 17:34:39 +00:00
Michael Tremer
1bffb208e8 openssl: Update to 1.1.1j
Null pointer deref in X509_issuer_and_serial_hash() (CVE-2021-23841)
====================================================================

Severity: Moderate

The OpenSSL public API function X509_issuer_and_serial_hash() attempts to
create a unique hash value based on the issuer and serial number data contained
within an X509 certificate. However it fails to correctly handle any errors
that may occur while parsing the issuer field (which might occur if the issuer
field is maliciously constructed). This may subsequently result in a NULL
pointer deref and a crash leading to a potential denial of service attack.

The function X509_issuer_and_serial_hash() is never directly called by OpenSSL
itself so applications are only vulnerable if they use this function directly
and they use it on certificates that may have been obtained from untrusted
sources.

OpenSSL versions 1.1.1i and below are affected by this issue. Users of these
versions should upgrade to OpenSSL 1.1.1j.

OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL
1.0.2 is out of support and no longer receiving public updates. Premium support
customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade
to 1.1.1j.

This issue was reported to OpenSSL on 15th December 2020 by Tavis Ormandy from
Google. The fix was developed by Matt Caswell.

Incorrect SSLv2 rollback protection (CVE-2021-23839)
====================================================

Severity: Low

OpenSSL 1.0.2 supports SSLv2. If a client attempts to negotiate SSLv2 with a
server that is configured to support both SSLv2 and more recent SSL and TLS
versions then a check is made for a version rollback attack when unpadding an
RSA signature. Clients that support SSL or TLS versions greater than SSLv2 are
supposed to use a special form of padding. A server that supports greater than
SSLv2 is supposed to reject connection attempts from a client where this special
form of padding is present, because this indicates that a version rollback has
occurred (i.e. both client and server support greater than SSLv2, and yet this
is the version that is being requested).

The implementation of this padding check inverted the logic so that the
connection attempt is accepted if the padding is present, and rejected if it
is absent. This means that such as server will accept a connection if a version
rollback attack has occurred. Further the server will erroneously reject a
connection if a normal SSLv2 connection attempt is made.

Only OpenSSL 1.0.2 servers from version 1.0.2s to 1.0.2x are affected by this
issue. In order to be vulnerable a 1.0.2 server must:

1) have configured SSLv2 support at compile time (this is off by default),
2) have configured SSLv2 support at runtime (this is off by default),
3) have configured SSLv2 ciphersuites (these are not in the default ciphersuite
  list)

OpenSSL 1.1.1 does not have SSLv2 support and therefore is not vulnerable to
this issue. The underlying error is in the implementation of the
RSA_padding_check_SSLv23() function. This also affects the RSA_SSLV23_PADDING
padding mode used by various other functions. Although 1.1.1 does not support
SSLv2 the RSA_padding_check_SSLv23() function still exists, as does the
RSA_SSLV23_PADDING padding mode. Applications that directly call that function
or use that padding mode will encounter this issue. However since there is no
support for the SSLv2 protocol in 1.1.1 this is considered a bug and not a
security issue in that version.

OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium
support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should
upgrade to 1.1.1j.

This issue was reported to OpenSSL on 21st January 2021 by D. Katz and Joel
Luellwitz from Trustwave. The fix was developed by Matt Caswell.

Integer overflow in CipherUpdate (CVE-2021-23840)
=================================================

Severity: Low

Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow
the output length argument in some cases where the input length is close to the
maximum permissable length for an integer on the platform. In such cases the
return value from the function call will be 1 (indicating success), but the
output length value will be negative. This could cause applications to behave
incorrectly or crash.

OpenSSL versions 1.1.1i and below are affected by this issue. Users of these
versions should upgrade to OpenSSL 1.1.1j.

OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL
1.0.2 is out of support and no longer receiving public updates. Premium support
customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade
to 1.1.1j.

This issue was reported to OpenSSL on 13th December 2020 by Paul Kehrer. The fix
was developed by Matt Caswell.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-02-16 17:32:28 +00:00