Commit Graph

15492 Commits

Author SHA1 Message Date
Matthias Fischer
78a45ae10a libhtp: Update to 0.5.36
For details see:
https://github.com/OISF/libhtp/releases

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-12-16 10:00:10 +00:00
Matthias Fischer
3b8e39553d suricata: Downgrade to 5.0.5
Triggered by https://lists.ipfire.org/pipermail/development/2020-December/008868.html

Workaround for https://bugzilla.ipfire.org/show_bug.cgi?id=12548

Downgrading to 'suricata 5.0.5' bypasses Bug #12548 for now,
but its only a temporary workaround...

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-12-16 09:58:56 +00:00
Arne Fitzenreiter
eaa9032166 core153: add ddns.cgi to update
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-12-08 17:40:57 +00:00
Stefan Schantl
00e1105b92 ddns.cgi: Drop static provider list for token based auth.
This is really hard to maintain when adding new or altering existing
providers.

Reference #12415.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-12-08 17:40:03 +00:00
Arne Fitzenreiter
a99b73211a core153: add openssl to updater
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-12-08 18:33:47 +01:00
Arne Fitzenreiter
591738dc5c openssl: update to 1.1.1i
fix: EDIPARTYNAME NULL pointer de-reference (CVE-2020-1971)

Severity: High

The X.509 GeneralName type is a generic type for representing different types
of names. One of those name types is known as EDIPartyName. OpenSSL provides a
function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME
to see if they are equal or not. This function behaves incorrectly when both
GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash
may occur leading to a possible denial of service attack.

OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes:
1) Comparing CRL distribution point names between an available CRL and a CRL
   distribution point embedded in an X509 certificate
2) When verifying that a timestamp response token signer matches the timestamp
   authority name (exposed via the API functions TS_RESP_verify_response and
   TS_RESP_verify_token)

If an attacker can control both items being compared then that attacker could
trigger a crash. For example if the attacker can trick a client or server into
checking a malicious certificate against a malicious CRL then this may occur.
Note that some applications automatically download CRLs based on a URL embedded
in a certificate. This checking happens prior to the signatures on the
certificate and CRL being verified. OpenSSL's s_server, s_client and verify
tools have support for the "-crl_download" option which implements automatic
CRL downloading and this attack has been demonstrated to work against those
tools.

Note that an unrelated bug means that affected versions of OpenSSL cannot parse
or construct correct encodings of EDIPARTYNAME. However it is possible to
construct a malformed EDIPARTYNAME that OpenSSL's parser will accept and hence
trigger this attack.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-12-08 18:27:00 +01:00
Arne Fitzenreiter
4aae5f819a kernel: update to 4.14.211
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-12-08 18:26:37 +01:00
Arne Fitzenreiter
8372d89000 vdr: version 2.4.4 still use plugin API 2.4.3
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-12-05 10:09:03 +00:00
Arne Fitzenreiter
4e5a35c123 Merge branch 'next' into master
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-12-03 12:56:02 +00:00
Arne Fitzenreiter
e1253a4d34 rootfile-check: exclude gdb
gdb always contain aarch64 in a syscall list.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-12-03 07:50:41 +01:00
Arne Fitzenreiter
b689391f27 Merge branch 'next' of git.ipfire.org:/pub/git/ipfire-2.x into next 2020-12-02 23:43:15 +01:00
Arne Fitzenreiter
a11783096e intel-microcode: update to 20201118
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-12-02 23:42:29 +01:00
Arne Fitzenreiter
bb5dcf84b8 kernel: update to 4.14.210
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-12-02 23:42:04 +01:00
Michael Tremer
77b7668c9e aws-cli: Update to 1.18.188
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-12-02 17:55:51 +00:00
Michael Tremer
57a0aedb3e python3-botocore: Update to 1.19.28
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-12-02 17:55:22 +00:00
Michael Tremer
05be1c642a python3-urllib3: New package
Required by botocore

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-12-02 17:54:56 +00:00
Michael Tremer
83fc11d474 core153: Ship DDNS
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-12-02 14:57:17 +00:00
Stefan Schantl
6dc6de4c4e ddns: Import upstream patch for provider DuckDNS.
Fixes #12415.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-12-02 14:56:46 +00:00
Stefan Schantl
882db5cd03 ddns: Import upstream patch for provider DDNSS.
Fixes #12328.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-12-02 14:56:44 +00:00
Peter Müller
848911b247 tor.cgi: fix location function call again
This line was accidentially messed up while merging two patchsets
together, causing tor.cgi to crash with an HTTP error 500 in testing.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-12-02 14:56:34 +00:00
Stefan Schantl
aa9dd5386c location-functions.pl: Remove accidently keept 2nd DB init call.
The get_full_country_name() function had an accidenlty and not longer
required call of the DB init function.

This is a waste of memory and a known problem, especially on systems
with less than 1GB of RAM, where the application which uses libloc in
such a redundant way crashes.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-12-02 14:16:54 +00:00
Michael Tremer
460741fd14 libloc: Import latest fixes from upstream
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-12-01 17:05:43 +00:00
Michael Tremer
ebcecb4be4 Revert "OpenVPN: Add start of static routes in client N2N"
This reverts commit 1c612d9e32.

https://lists.ipfire.org/pipermail/development/2020-November/008773.html

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-12-01 16:32:03 +00:00
Stefan Schantl
5e5a470399 Core 153: Update ownership of "/var/ipfire/red".
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-12-01 16:14:52 +00:00
Stefan Schantl
31098f84ab configroot: Change ownership of "/var/ipfire/red" to nobody.
Otherwise the WUI is not allowed to put and release the nobeep file in
this folder and the desired functionality does not work.

Fixes #12385.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-12-01 16:14:48 +00:00
Michael Tremer
5ad2446237 core153: Ship openvpn
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-12-01 16:12:43 +00:00
Erik Kapfer
820edb2374 OpenVPN: Update to version 2.5.0
Signed-off-by: Erik Kapfer <erik.kapfer@ipfire.org>
Tested-by: Adolf Belka <ahb.ipfire@gmail.com>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-12-01 16:10:32 +00:00
Matthias Fischer
e8ecc81a70 logwatch: Disable iptables output in summary.dat, fixes #12533
This patch disables the output of 'iptables' in 'summary.dat' by
modifying '/usr/share/conf/logwatch.conf'.

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-11-27 15:54:27 +00:00
Michael Tremer
5fa842475c core153: Ship knot
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-11-27 15:50:49 +00:00
Matthias Fischer
1e036ee90d knot: Update to 3.0.2
for details see:
https://www.knot-dns.cz/2020-11-11-version-302.html

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-11-27 15:50:29 +00:00
Matthias Fischer
c2773f2371 ghostscript: Update to 9.53.3
For details see:
https://www.ghostscript.com/doc/current/History9.htm#Version9.53.3

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-11-27 15:49:50 +00:00
Michael Tremer
a260df361f core153: Ship updated zone configuration page
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-11-27 15:49:03 +00:00
Leo-Andres Hofmann
5c33a76135 zoneconf.cgi: Add NIC selection highlighting
This improves the usability of the zone configuration by marking assigned
NICs in the zone color. The highlighting is initially applied to the static
HTML output, and JavaScript is used to follow changes made by the user.

Signed-off-by: Leo-Andres Hofmann <hofmann@leo-andres.de>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-11-27 15:48:02 +00:00
Leo-Andres Hofmann
fc31c28d5c zoneconf.cgi: Improve CSS
- Add an element id so that the styling only affects the zone table
- Alternating row colors are now generated by CSS, remove unneeded Perl code

Signed-off-by: Leo-Andres Hofmann <hofmann@leo-andres.de>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-11-27 15:47:59 +00:00
Leo-Andres Hofmann
8797526d36 zoneconf.cgi: Make output HTML 5 standard compliant
This fixes two minor violations of the HTML standard:
- <a> elements may not contain nested <button> elements:
Replace the button with a simple hyperlink, because it was only used as a link anyway.

- "id" attributes may not contain whitespace:
Remove unneeded attribute, use hyphens instead of spaces.

Signed-off-by: Leo-Andres Hofmann <hofmann@leo-andres.de>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-11-27 15:47:57 +00:00
Leo-Andres Hofmann
96d0c76154 zoneconf.cgi: Clean up HTML output
This adds missing brackets, cleans up the indentation and removes unnecessary CSS.

Signed-off-by: Leo-Andres Hofmann <hofmann@leo-andres.de>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-11-27 15:47:55 +00:00
Michael Tremer
4a388bc9f0 libloc: Import changes from upstream
This fixes the segmentation fault on 32 bit systems.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-11-27 15:46:39 +00:00
Michael Tremer
8a4495a41f gdb: Build package to be available in the build environment
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-11-27 15:19:53 +00:00
Arne Fitzenreiter
7adacda04c transmission: update to 3.00
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-11-26 16:15:48 +00:00
Michael Tremer
b952a52b70 libloc: Import latest changes from upstream
This is now a unified patch instead of being split into
individual commits from upstream.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-11-26 16:15:07 +00:00
Michael Tremer
d6989b4b0b openvpn: Actually apply configured parameters
OpenVPN is an absolute mess. The behaviour of configuration
parameters has been changed over the time; default values have been
changed over time; and it looks like nobody is actually testing
anything any more.

I have been spending hours today on figuring out why OpenVPN
is so damn slow. On a Lightning Wire Labs IPFire Mini Appliance
it achieves about 100 MBit/s in the default configuration when
"openssl speed -evp aes-256-gcm" achieves over 3.5 GBit/s.

Changing any of the cryptography parameters does not change
anything. Throughput remains around 100 MBit/s.

I finally set "cipher none" and "auth none" which disables
encryption and authentication altogether but does not increase
throughput. From here on it was absolutely clear that it was
not a crypto issue.

OpenVPN tries to be smart here and does its own fragmentation.
This is the worst idea I have heard of all day, because that job
is normally done best by the OS.

Various settings which allow the user to "tune" this are grossly
ineffective - let alone it isn't even clear what I am supposed
to configure anywhere. Setting "fragment 1500" weirdly still
does not convince openvpn to generate a packet that is longer
than 1400 bytes. Who'd a thunk?

There is a number of other parameters to set the MTU or which
are related to it (tun-mtu, link-mtu, fragment, mssfix).

On top of all of this we have two "bugs" in ovpnmain.cgi which
are being fixed in this patch:

1) mssfix can be configured by the user. However, we always
   enable it in openvpn. The default is on, we only add "mssfix"
   which simply turns it on.
   It is now being disabled when the user has chosen so in the
   web UI. I do not know if this is backwards-compatible.

2) We cap the MTU (tun-mtu) at 1500 bytes when fragment is being
   used. So it becomes pointless that the user can this and the
   user is not being made aware of this when they hit the save
   button.
   This was added when we added path MTU discovery. Since that
   did not work and was removed, we can remove this now, too.

I archived a solid 500-600 MBit/s of goodput with these settings:

* Disable mssfix
* Set "fragment" to 0
* Set MTU to 9000

I am sure the MTU could be further increased to have bigger packets,
but I did not test how badly this will affect latency of the tunnel.

OpenVPN seems to only be able to handle a certain amount of packets
a second - no matter what. With larger packets, the throughput of
the tunnel increases, but latency might as well.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Cc: Erik Kapfer <erik.kapfer@ipfire.org>
Cc: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-11-25 20:03:14 +00:00
Michael Tremer
0be475ca36 libloc: Import changes from upstream
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-11-25 20:02:30 +00:00
Michael Tremer
0291b69ec6 Run "./make.sh lang"
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-11-25 17:21:56 +00:00
Peter Müller
7547296f68 update translation files for changed Tor CGI strings
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-11-25 17:21:18 +00:00
Peter Müller
7c507f3d5b Tor: allow enforcing distinct Guard relays or countries
In order to make deanonymisation harder, especially high-risk Tor users
might want to use certain Guard relays only (for example operated by
people they trust), enforce Tor to use Guard relays in certain countries
only (for example countries with very strict data protection laws or
poor diplomatic relations), or avoid Guard relays in certain countries
entirely.

Since Tor sticks to sampled Guards for a long time (usually within the
range of months), restricting those is believed to cause less harm to a
users' anonymity than restricting Exit relays, since their diversity of
a generic Tor user is significantly higher.

This patch extends the Tor CGI for restricting Guard nodes to certain
countries or relays matching certain fingerprints.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-11-25 17:20:51 +00:00
Peter Müller
5efe8957a5 Tor: allow multiple countries to be selected for Exit relays
This extends the functionality of the Tor CGI in order to be able to
select multiple countries for possible Exit relays, which is - in terms
of anonymity - less worse than limiting all Tor circuits to a single
country.

For example, a user might want to avoid Exit relays in more than one
country, and permit Tor to use Exit relays elesewhere, and vice versa.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-11-25 17:20:14 +00:00
Peter Müller
ef99991370 Tor: update to 0.4.4.6
Full changelog can be obtained from https://gitweb.torproject.org/tor.git/plain/ChangeLog?h=tor-0.4.4.6 .

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-11-25 17:17:35 +00:00
Arne Fitzenreiter
3198520570 kernel: update to 4.14.209
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-11-24 20:52:22 +01:00
Arne Fitzenreiter
ef14d8a064 core153: ship strongswan
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-11-24 11:08:13 +01:00
Arne Fitzenreiter
76da59bba6 strongswan: update to 5.9.1
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-11-24 10:52:45 +01:00