Commit Graph

20508 Commits

Author SHA1 Message Date
Adolf Belka
7dec360355 ovpnmain.cgi: Updated fix for Bug#13137
- This now only adds "providers legacy default" to the config files of connections that
   have legacy certificates, both for n2n and roadwarrior.
- This new approach also removes the requirement to have code in the update.sh script
   or in backup.pl so those earlier modifications are removed in two additional patches
   combined with this one in a set.
- The -legacy option has been removed from the pkcs12 creation part of the code as
   otherwise this creates a certificate in legacy format, which is not wanted. All new
   connection certificates being created will be based on openssl-3.x

Fixes: Bug#13137
Suggested-by: Michael Tremer <michael.tremer@ipfire.org>
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-06-09 12:43:45 +00:00
Peter Müller
3d2beee7b1 Core Update 175: Ship vpnmain.cgi
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-06-05 14:52:01 +00:00
Adolf Belka
94aa82fa61 vpnmain.cgi: Fixes bug#13138 - root/host certificate set fails to be created
- The change to openssl-3.x results in the openssl commands that start with ca failing
   with the error message
     OpenSSL produced an error: <br>40E7B4719B730000:error:0700006C:configuration file
     routines:NCONF_get_string:no value:crypto/conf/conf_lib.c:315:group=<NULL>
     name=unique_subject
- The fix for this is to include the unique_subject = yes line into
   /var/ipfire/certs/index.txt.attr
- Additionally, based on the learnings from bug#13137 on OpenVPN, any openssl commands
   dealing with pkcs12 (.p12) files that were created with openssl-1.1.1x fail when being
   accessed with openssl-3.x due to the no longer supported algorithm. These can be
   accessed if the -legacy option is added to every openssl command dealing with pkcs12

Fixes: Bug#13138
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2023-06-05 14:51:33 +00:00
Peter Müller
495ea08478 Core Update 175: Ship backup.pl
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-06-05 14:51:09 +00:00
Adolf Belka
9eb2086e0f backup.pl: Fixes Bug#13137 - Existing n2n client connection created with openssl-1.1.1x fails to start with openssl-3.x
- This code adds the "providers legacy default" line into OpenVPN N2N Client config files
   when restoring them in case it is missing from a backup earlier than CU175.
   Only adds the line if it is not already present.
- Tested out on my vm testbed system

Fixes: Bug#13137
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2023-06-05 14:50:18 +00:00
Adolf Belka
2054306c63 update.sh: Fixes Bug#13137 - Existing n2n client connection created with openssl-1.1.1x fails to start with openssl-3.x
- This modification will check if ovpnconfig exists and is not empty. If so then it will
   check for all n2n connections and if they are Client configs will check if
   "providers legacy default" is not already present and if so will add it.

Fixes: Bug#13137
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2023-06-05 14:49:51 +00:00
Adolf Belka
0b216134c2 ovpnmain.cgi: Fixes Bug#13137 - Existing n2n client connection created with openssl-1.1.1x fails to start with openssl-3.x
- With a n2n connection .p12 certificate created wityh openssl-1.1.1x the line
   providers legacy default is required in the n2nconf file to enable it to start.
- Any openssl-3.x attempt to open a .p12 file created with openssl-1.1.1x will result in
   a failure and an error message. All the openssl commands dealing with pkcs12 (.p12)
   files need to have the -legacy option added to them.

Fixes: Bug#13137
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2023-06-05 14:49:51 +00:00
Peter Müller
9797af3006 OpenSSL: Update to 3.1.1
Changelog concerning this version: https://www.openssl.org/news/cl31.txt
Accompanying security advisory: https://www.openssl.org/news/secadv/20230530.txt

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-05-30 23:06:53 +00:00
Arne Fitzenreiter
cfd5dbf1bb alsa: update to 1.2.9 and add ucm configfiles
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2023-05-30 09:21:54 +00:00
Arne Fitzenreiter
25aa552258 kernel: update to 6.1.30
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2023-05-30 09:21:34 +00:00
Matthias Fischer
bf0aa7f25b suricata: Update to 6.0.12
"6.0.12 -- 2023-05-08

Bug #6040: tcp: failed assertion ASSERT: !(ssn->state != TCP_SYN_SENT) (6.0.x backport)
Bug #6039: TCP resets have incorrect len, nh in IPv6 (6.0.x backport)
Bug #6034: time: integer comparison with different signs (6.0.x backport)
Bug #6031: af-packet: reload not occurring until packets are seen (6.0.x backport)
Bug #6020: smtp: fuzz debug assertion trigger (6.0.x backport)
Bug #6018: scan-build warning for mime decoder (6.0.x backport)
Bug #6017: scan-build warnings for ac implementations (6.0.x backport)
Bug #6016: scan-build warnings in radix implementation (6.0.x backport)
Bug #6015: scan-build warning for detect sigordering (6.0.x backport)
Bug #6014: scan-build warnings for detect address handling (6.0.x backport)
Bug #6013: scan-build warning for detect port handling (6.0.x backport)
Bug #6007: Unexpected behavior of `endswith` in combination with negated content matches (6.0.x backport)
Bug #5999: exception/policy: make work with simulated flow memcap (6.0.x backport)
Bug #5997: perf shows excessive time in IPOnlyMatchPacket (6.0.x backport)
Bug #5980: rust: warning for future compile errors
Bug #5961: smb: wrong endian conversion when parse NTLM Negotiate Flags (6.0.x backport)
Bug #5958: bpf: postpone IPS check after IPS runmode is determined from the configuration file (6.0.x backport)
Bug #5934: app-layer-htp: Condition depending on enabled IPS mode never true (6.0.x backport)
Optimization #6033: detect using uninitialized engine mode (6.0.x backport)
Feature #5996: Add support for 'inner' PF_RING clustering modes (6.0.x backport)
Task #6052: github-ci: add windows + windivert build (6.0.x backport)"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
2023-05-29 06:47:09 +00:00
Michael Tremer
76d514cf5b core175: Remove file that has been deleted through reverts
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-05-26 14:27:31 +00:00
Michael Tremer
d4c1274290 Revert "web-user-interface: Addition of new icon for secure connection certificate download"
This reverts commit 18bece0edb.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-05-26 14:27:08 +00:00
Michael Tremer
1346052349 Revert "en.pl: Update to language wording for secure connection icon"
This reverts commit 070abb0d01.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-05-26 14:26:50 +00:00
Michael Tremer
6ad7785b1d Revert "de.pl: Change language text for secure icon wording"
This reverts commit 82822934ba.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-05-26 14:26:31 +00:00
Michael Tremer
28b9c97651 Revert "ovpnmain.cgi: Fix for bug#11048 - insecure download icon shown for connections with a password"
This reverts commit 762c88ec4d.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-05-26 14:26:16 +00:00
Michael Tremer
70ccbf30f3 Revert "update.sh: Adds code to update an existing ovpnconfig with pass or no-pass"
This reverts commit 9cac1034bc.

https://lists.ipfire.org/pipermail/development/2023-May/015952.html

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-05-24 10:02:00 +00:00
Michael Tremer
bd313e31b8 Revert "core175: Ship updated clwarn.cgi"
This reverts commit 9fae7ab32b.

This file is not part of the core distribution, but part of the
squidclamav package.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-05-24 10:00:49 +00:00
Michael Tremer
9fae7ab32b core175: Ship updated clwarn.cgi
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-05-24 08:22:56 +00:00
Michael Tremer
2a0d7a03d7 clwarn.cgi: Remove XSS
Fixes: #12966
Fixes: CVE-2022-44392
Reported-by: Arthur Naullet <arthur.naullet@epita.fr>
Reported-by: Rafael Lima <isec-researcher@protonmail.com>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-05-24 08:22:14 +00:00
Adolf Belka
c847846c4c ovpnmain.cgi: Fixes Bug#13117 - adds legacy option to openssl commands for cert & key extraction
- Any insecure connections made with openssl-3.x can have the cert and key extracted but
   if the insecure connection was made from prior to CU175 Testing then it used
   openssl-1.1.1 which causes an error under openssl-3.x due to the old version being able
   to accept older ciphers no longer accepted by openssl-3.x
- Adding the -legacy option to the openssl commands enables openssl-3.x to successfully
   open them and extract the cert and key
- Successfully tested on a vm system. Confirmed that the downloaded version under
   openssl-3.x worked exactly the same as the version downloaded under openssl-1.1.1

Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-05-22 22:08:11 +00:00
Adolf Belka
416f317376 openssl: Fix for Bug#13117 - adds legacy option in for openssl extraction of cert & key
- OpenSSL-3.x gives an error when trying to open insecure .p12 files to extract the cert
   and key for the insecure package download option.
- To make this work the -legacy option is needed in the openssl command, which requires
   the legacy.so library to be available.
- Successfully tested on a vm system.
- Patch set built on Master (CU175 Testing)

Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-05-22 22:08:11 +00:00
Arne Fitzenreiter
c6c78f8e11 kernel: update to 6.1.29
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2023-05-19 12:05:52 +00:00
Jon Murphy
f23508b724 rsnapshot: New addon
- What is it?
	rsnapshot is a filesystem snapshot utility based on
	rsync. rsnapshot makes it easy to make periodic snapshots of the
	ipfire device. The code makes extensive use of hard links whenever
	possible, to greatly reduce the disk space required.  See:
	https://rsnapshot.org

- Why is it needed?
	Rsnapshot backups run multiple times per day
	(e.g., once per day up to 24 times per day). Rsnapshot is much easier
	to configure, setup and use than the borg backup add-on.  (I found
	borg somewhat confusing). Rsnapshot completes each backup very fast.
	Unlike borg, rsnapshot does not compress each backup before storage.
	During a complete rebuild, borg backup need installation of the borg
	add-on to recover archived files.  Rsnapshot backups can be copied
	directly from the backup drive. Current backups (backup.pl or borg)
	could corrupt sqlite3 databases by running a backup during a database
	write.  This add-on includes a script specifically for sqlite backups.

- IPFire Wiki
	In process at: https://wiki.ipfire.org/addons/rsnapshot

Thanks to Gerd for creating a first build and a nice template for me!

Signed-off-by: Jon Murphy <jon.murphy@ipfire.org>
2023-05-18 11:24:29 +00:00
Peter Müller
1d5b66b145 Core Update 175: Ship harfbuzz
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-05-18 10:55:30 +00:00
Peter Müller
de5d9c9b47 Core Update 175: Merely reload firewall engine, instead of restart it
The latter will not work until a reboot due to the Core Update featuring
a new kernel, and will instead result in the following error:

modprobe: FATAL: Module nf_log_ipv4 not found in directory /lib/modules/6.1.27-ipfire

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-05-18 10:01:39 +00:00
Peter Müller
e5632e6697 Core Update 175: Ship necessary files for OpenVPN CGI changes
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-05-18 09:53:37 +00:00
Adolf Belka
9cac1034bc update.sh: Adds code to update an existing ovpnconfig with pass or no-pass
- The code checks first if ovpnconfig exists and is not empty.
- Then it makes all net2net connections no-pass since they do not use encryption
- Then it cycles through all .p12 files and checks with openssl if a password exists or not.
   If a password is present then pass is added to index 41 and if not then no-pass is added
   to index 41
- This code should be left in update.sh for future Core Updates in case people don't update
   with Core Update 175 but leave it till later. This code works fine on code that already
   has pass or no-pass entered into index 41 in ovpnconfig

Fixes: Bug#11048
Suggested-by: Erik Kapfer <ummeegge@ipfire.org>
Suggested-by: Adolf Belka <adolf.belka@ipfire.org>
Tested-by: Erik Kapfer <ummeegge@ipfire.org>
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-05-18 09:51:09 +00:00
Adolf Belka
18bece0edb web-user-interface: Addition of new icon for secure connection certificate download
- This uses a padlock icon from https://commons.wikimedia.org/wiki/File:Encrypted.png
- The license for this image is the following:-
   This library is free software; you can redistribute it and/or modify it under the terms
   of the GNU Lesser General Public License as published by the Free Software Foundation;
   either version 2.1 of the License, or (at your option) any later version. This library
   is distributed in the hope that it will be useful, but without any warranty; without
   even the implied warranty of merchantability or fitness for a particular purpose. See
   version 2.1 and version 3 of the GNU Lesser General Public License for more details.
- Based on the above license I believe it can be used by IPFire covered by the GNU General
   Public License that is used for it.
- The icon image was made by taking the existing openvpn.png file and superimposing the
   padlock icon on top of it at a 12x12 pixel format and naming it openvpn_encrypted.png

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-05-18 09:51:09 +00:00
Adolf Belka
070abb0d01 en.pl: Update to language wording for secure connection icon
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-05-18 09:51:09 +00:00
Adolf Belka
82822934ba de.pl: Change language text for secure icon wording
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-05-18 09:51:09 +00:00
Adolf Belka
762c88ec4d ovpnmain.cgi: Fix for bug#11048 - insecure download icon shown for connections with a password
- The insecure package download icon is shown if entry 41 in /var/ipfire/ovpn/ovpnconfig
   is set to no-pass. The code block on ovpnmain.cgi that deals with this checks if the
   connection is a host and if the first password entry is a null. Then it adds no-pass
   to ovpnconfig.
- The same block of code is also used for when he connection is edited. However at this
   stage the password entry is back to null because the password value is only kept until
   the connection has been saved. Therefore doing an edit results in the password value
   being taken as null even for connections with a password.
- This fix enters no-pass if the connection type is host and the password is null, pass if
   the connection type is host and the password has characters. If the connection type is
   net then no-pass is used as net2net connections dop not have encrypted certificates.
- The code has been changed to show a different icon for unencrypted and encrypted
   certificates.
- Separate patches are provided for the language file change, the provision of a new icon
   and the code for the update.sh script for the Core Update to update all existing
   connections, if any exist, to have either pass or no-pass in index 41.
- This patch set was a joint collaboration between Erik Kapfer and Adolf Belka
- Patch set, including the code for the Core Update 175 update.sh script has been tested
   on a vm testbed

Fixes: Bug#11048
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Tested-by: Erik Kapfer <ummeegge@ipfire.org>
Suggested-by: Adolf Belka <adolf.belka@ipfire.org>
Suggested-by: Erik Kapfer <ummeegge@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-05-18 09:51:09 +00:00
Adolf Belka
745fd50e66 wio: remove unneeded or incorrect commands
- the helper programs in misc-progs get the correct permissions and ownerships
   automatically so adjustment not required in this script.
- permissions of menus in menu.d are provided automatically. Historically, these were
   root:root but were changed a while back but did not get applied to wio as it was
   modified by this script.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-05-18 09:47:47 +00:00
Adolf Belka
f9e2cd1c0b wio: add references to wio cgi and image files
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-05-18 09:47:47 +00:00
Adolf Belka
b6b59014a3 wio: add reference to wio menu
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-05-18 09:47:47 +00:00
Adolf Belka
b1584da093 wio: moved files from src/wio directory to standard IPFire location
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-05-18 09:47:47 +00:00
Adolf Belka
1ee6f37fb4 wio: move files from src/wio/main/ to standard IPFire location
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-05-18 09:47:46 +00:00
Adolf Belka
b637cb23c8 wio: move addon language files to standard IPFire location
- This location used by guardian addon

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-05-18 09:47:46 +00:00
Adolf Belka
5a6134e2a6 wio: move cgi files to standard IPFire location
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-05-18 09:47:46 +00:00
Adolf Belka
1d666a6b3b wio: relocate wio menu item to standard IPFire location
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-05-18 09:47:46 +00:00
Adolf Belka
4e908f84c7 wio: images moved to standard IPFire location
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-05-18 09:47:46 +00:00
Adolf Belka
addb1b2fe1 wio: Move backup/includes file to standard IPFire location
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-05-18 09:47:46 +00:00
Adolf Belka
21d0be64d9 wio: This is a patch series relocating wio into the standard ipfire directories
- This patch is the changes to the wio lfs file related to the relocations
- The modified patch series was built and the generated wio-1.3.2-17.ipfire file was
   used to install wio on a testbed vm system. Everything worked. Tested out with various
   hosts on the system, tested the graphs, tested adding hosts from a network scan and
   from the arp table and everything worked fine. So all the relocations look to have
   worked.
- Files were only relocated, the wio code was not modified in any way.

Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-05-18 09:47:46 +00:00
Peter Müller
e8a73cfe94 initscripts: Remove re-added lvmetad initscript from rootfiles
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-05-18 09:46:41 +00:00
Jonatan Schlag
3a96d482f6 initscripts: Sort rootfiles
This simply sorts the rootfiles. Everything should be sorted :-).

Signed-off-by: Jonatan Schlag <jonatan.schlag@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2023-05-18 09:43:23 +00:00
Jonatan Schlag
95dc3f86d8 initscript: sort by startup
As the list of symbolic links was not sorted at all I sorted it now by
the order of start or stop.
This seems to be the most useful way as you can now understand the
startup sequence from this file and add/remove scripts at a useful
place.

Signed-off-by: Jonatan Schlag <jonatan.schlag@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2023-05-18 09:43:22 +00:00
Jonatan Schlag
3c90d6432f lfs/initscripts: improve indention
As some lines are already now to long, this increase the indention to
improve readablitity.

Signed-off-by: Jonatan Schlag <jonatan.schlag@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2023-05-18 09:43:22 +00:00
Peter Müller
94d883abe7 Core Update 175: Remove any dropped add-ons, if installed
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-05-18 09:37:00 +00:00
Adolf Belka
9fe8af1019 make.sh: Fixes Bug#13076
- Adds borgbackup run time dependency - python3-exceptiongroup
- Adds python3-exceptiongroup build time dependency - python3-flit_scm
- Removes python3-attr that is no longer required in borgbackup dependency chain

Fixes: Bug#13076
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-05-18 09:31:12 +00:00
Adolf Belka
b84d82176b borgbackup: Removed python3-pkgconfig as run time dependency
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-05-18 09:31:12 +00:00