Commit Graph

19604 Commits

Author SHA1 Message Date
Robin Roevens
8ed997102e services.cgi: add link to addon config if ui exists for it
* If a cgi file exists with the same name as an addon, the
  displayed service will be a link to that cgi file.

Signed-off-by: Robin Roevens <robin.roevens@disroot.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2022-10-29 08:56:48 +00:00
Robin Roevens
4f205b5442 services.cgi: add restart action and restrict action usage
* Add restart action to services.
* Only display available actions for a service:
  Start when service is stopped or Stop and Restart when a service
  is running.

Signed-off-by: Robin Roevens <robin.roevens@disroot.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2022-10-29 08:56:48 +00:00
Robin Roevens
207ca1141c services.cgi: minor cosmetics
* Singular 'Service' instead of plural 'Services' as column header of
  services table
* Sort list of services

Signed-off-by: Robin Roevens <robin.roevens@disroot.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2022-10-29 08:56:48 +00:00
Robin Roevens
2b9b31b71d services.cgi: Fix status/actions on services with name != addon name
* addonctrl's new functionality to control explicit addon services was
  implemented.
* Change 'Addon' column header to 'Addon Service' to be clear that
  it's not addons but services listed here.
* Services not matching the name of the addon now display the addon
  name between parentheses, so the user knows where the service comes
  from.
* When no valid runlevel symlink is found by addonctrl for a service,
  the 'enable on boot' checkbox is replaced by a small exclamation point
  with alt-text "No valid runlevel symlink was found for the initscript of
  this service." to inform user why a service can't be enabled.
* Added German and Dutch translation for above message.

Fixes: Bug#12935
Signed-off-by: Robin Roevens <robin.roevens@disroot.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2022-10-29 08:56:48 +00:00
Robin Roevens
24168c8898 misc-progs: addonctrl: Add support for 'Services' metadata
* Addonctrl will now check in addon metadata for the exact initscript
  names (Services). If more than one initscript is defined for an addon,
  the requested action will be performed on all listed initscripts.
* Added posibility to perform action on a specific initscript of an
  addon instead of on all initscripts of the addon.
* New action 'list-services' to display a list of services related to
  an addon.
* New action 'boot-status' to display wether service(s) are enabled
  to start on boot or not.
* More error checking and cleaner error reporting to user
* General cleanup and code restructuring to avoid code duplication
* Updated and made usage instructions more verbose.

Fixes: Bug#12935
Signed-off-by: Robin Roevens <robin.roevens@disroot.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2022-10-29 08:56:48 +00:00
Peter Müller
e728fba16f Samba: Update ARM rootfiles
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-10-29 08:55:58 +00:00
Peter Müller
ca1787b29b libloc: Update rootfile
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-10-24 12:39:47 +00:00
Matthias Fischer
3e5190f5c7 samba: Update to 4.17.0
For details see:
https://www.samba.org/samba/latest_news.html#4.17.0

This "just came my way" and I found the CVEs listed on
https://www.samba.org/samba/history/security.html which
address "All versions of Samba prior to 4.16.4" or
"All versions of Samba" rather long.

The 'glibc_headers' patch is now included.

Sad to say, due to the lack of hardware I can only include
the rootfile for x86_64.

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
2022-10-24 09:08:01 +00:00
Peter Müller
77321ff12f Core Update 172: Ship changes related to OpenVPN CRL handling
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-10-24 09:07:18 +00:00
Michael Tremer
e420c103de openvpnctrl: Update CRL before starting the client daemon
If the CRL is outdated for some reason (e.g. a backup restored from ISO
where we don't run the migration scripts), this will update it on
reboot/restart of the service.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-10-24 09:06:16 +00:00
Michael Tremer
233baacd67 backup: Update OpenVPN CRL
After a backup is restored, the CRL might be out of data and client
won't be able to connect to the server any more.

This will immediately update the CRL should it require an update.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-10-24 09:06:16 +00:00
Peter Müller
c965daf6da Core Update 172: Delete orphaned strongSwan files
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-10-24 09:05:23 +00:00
Peter Müller
5f1abe0043 Core Update 172: Ship and restart Unbound
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-10-24 09:04:29 +00:00
Matthias Fischer
609007e54b unbound: Update to 1.17.0
For details see:
https://nlnetlabs.nl/projects/unbound/download/#unbound-1-17-0

"Features

    Merge #753: ACL per interface. (New interface-* configuration options).

    Merge #760: PROXYv2 downstream support. (New proxy-protocol-port configuration option).

Bug Fixes

    Fix #728: alloc_reg_obtain() core dump. Stop double alloc_reg_release
    when serviced_create fails.
    Fix edns subnet so that scope 0 answers only match sourcemask 0 queries
    for answers from cache if from a query with sourcemask 0.
    Fix unittest for edns subnet change.
    Merge #730 from luisdallos: Fix startup failure on Windows 8.1 due to
    unsupported IPV6_USER_MTU socket option being set.
    Fix ratelimit inconsistency, for ip-ratelimits the value is the amount
    allowed, like for ratelimits.
    Fix #734 [FR] enable unbound-checkconf to detect more (basic) errors.
    Fix to log accept error ENFILE and EMFILE errno, but slowly, once per
    10 seconds. Also log accept failures when no slow down is used.
    Fix to avoid process wide fcntl calls mixed with nonblocking operations
    after a blocked write.
    Patch from Vadim Fedorenko that adds MSG_DONTWAIT to receive
    operations, so that instruction reordering does not cause mistakenly
    blocking socket operations.
    Fix to wait for blocked write on UDP sockets, with a timeout if it
    takes too long the packet is dropped.
    Fix for wait for udp send to stop when packet is successfully sent.
    Fix #741: systemd socket activation fails on IPv6.
    Fix to update config tests to fix checking if nonblocking sockets work
    on OpenBSD.
    Slow down log frequency of write wait failures.
    Fix to set out of file descriptor warning to operational verbosity.
    Fix to log a verbose message at operational notice level if a thread is
    not responding, to stats requests. It is logged with thread
    identifiers.
    Remove include that was there for debug purposes.
    Fix to check pthread_t size after pthread has been detected.
    Convert tdir tests to use the new skip_test functionality.
    Remove unused testcode/mini_tpkg.sh file.
    Better output for skipped tdir tests.
    Fix doxygen warning in respip.h.
    Fix to remove erroneous TC flag from TCP upstream.
    Fix test tdir skip report printout.
    Fix windows compile, the identifier interface is defined in headers.
    Fix to close errno block in comm_point_tcp_handle_read outside of ifdef.
    Fix static analysis report to remove dead code from the
    rpz_callback_from_iterator_module function.
    Fix to clean up after the acl_interface unit test.
    Merge #764: Leniency for target discovery when under load (for
    NRDelegation changes).
    Use DEBUG_TDIR from environment in mini_tdir.sh for debugging.
    Fix string comparison in mini_tdir.sh.
    Make ede.tdir test more predictable by using static data.
    Fix checkconf test for dnscrypt and proxy port.
    Fix dnscrypt compile for proxy protocol code changes.
    Fix to stop responses with TC flag from resulting in partial responses.
    It retries to fetch the data elsewhere, or fails the query and in depth
    fix removes the TC flag from the cached item.
    Fix proxy length debug output printout typecasts.
    Fix to stop possible loops in the tcp reuse code (write_wait list and
    tcp_wait list). Based on analysis and patch from Prad Seniappan and
    Karthik Umashankar.
    Fix PROXYv2 header read for TCP connections when no proxied addresses
    are provided."

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2022-10-24 09:03:34 +00:00
Peter Müller
4ddb1fdac0 Core Update 172: Ship and restart OpenSSH
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-10-24 09:03:08 +00:00
Peter Müller
89e47eaca8 OpenSSH: Update to 9.1p1
Please refer to https://www.openssh.com/releasenotes.html#9.1 for the
release announcement of this version.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2022-10-24 08:59:27 +00:00
Peter Müller
7fc5e93294 Core Update 172: Ship tzdata
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-10-24 08:59:09 +00:00
Peter Müller
367a62f515 tzdata: Update to 2022e
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2022-10-24 08:58:58 +00:00
Peter Müller
024579de58 Core Update 172: Ship libloc
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-10-24 08:58:51 +00:00
Peter Müller
0d0bfd0e5c libloc: Update to 0.9.15
Please refer to https://lists.ipfire.org/pipermail/location/2022-September/000579.html
for the release announcement of this version.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2022-10-24 08:57:25 +00:00
Peter Müller
f6121180b8 Core Update 172: Ship and restart strongSwan
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-10-24 08:57:00 +00:00
Peter Müller
4929efb7d8 strongSwan: Update to 5.9.8
Please refer to https://github.com/strongswan/strongswan/releases/tag/5.9.8
for the release announcement of this version.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2022-10-24 08:56:08 +00:00
Peter Müller
0f421901dd Start Core Update 172
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-10-24 08:55:12 +00:00
Peter Müller
ee2e7db90b linux: Add upstream patches for CVE-2022-4{1674,2719-2722}
https://lists.ipfire.org/pipermail/development/2022-October/014562.html

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-10-17 16:26:19 +00:00
Michael Tremer
a40977958b core171: Ship dhcp
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-10-10 18:41:10 +00:00
Matthias Fischer
cdc5f9705a dhcp: Update to 4.4.3-P1
For details see:
https://downloads.isc.org/isc/dhcp/4.4.3-P1/dhcp-4.4.3-P1-RELNOTES

Changelog since 4.4.1 is rather long...

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-10-10 18:39:31 +00:00
Jon Murphy
437fb4d72b manualpages: add and update help links to Wiki
- add help links for two new ipblocklist WebGUI pages
- update help links to proxy accounting
- add links to OpenVPN Net-to-Net Statistics,
    MD Raid State, Update Accelerator,
    OpenVPN Roadwarrior Connections Log

Signed-off-by: Jon Murphy <jon.murphy@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-10-10 09:33:06 +00:00
Michael Tremer
692d18285f glibc: Fix added whitespace in syslog messages
Fixes: #12949
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-10-10 09:32:56 +00:00
Michael Tremer
dc84e16d4d firewall: Fix missing whitespace for blocklist messages
Fixes: #12934
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-10-10 09:32:53 +00:00
Michael Tremer
ca4de26318 unbound-dhcp-leases-bridge: Fall back to the default domain
When the bridge cannot detect a domain name for any of the leases, it
uses localdomain which is not always the best choice. So instead, this
patches changes the behaviour that we read the default domain of the
firewall.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Reviewed-by: Bernhard Bitsch <bbitsch@ipfire.org>
2022-10-04 14:48:26 +00:00
Peter Müller
a308f5bcde Core Update 171: Ship setclock initscript
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-10-04 14:48:04 +00:00
Mathew McBride
9745a212d4 initscripts: load RTC module (RX8025) for Ten64 board
For reasons I have not been able to determine, the RTC
module for the Ten64 board (rtc-rx8025) is not automatically
loaded at startup, despite every other relevant modules being
loaded.

modprobe it manually if we are on a Ten64 board.

Signed-off-by: Mathew McBride <matt@traverse.com.au>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2022-10-04 14:45:19 +00:00
Mathew McBride
6efb611cbc config: u-boot: bypass the u-boot script on Traverse Ten64
The Ten64 board runs a U-Boot which works best directly
booting EFI. Attempting to load your own DTB or other steps
will cause issues.
(see https://ten64doc.traverse.com.au/faq/#common-issues)

The current stable Ten64 firmware unfortunately searches for
boot.scr before bootaa64.efi. So redirect it back to the EFI path.

A future Ten64 firmware package will prefer EFI first before
any boot script avoiding this issue. I will provide a patch
reversing this when that day comes.

Signed-off-by: Mathew McBride <matt@traverse.com.au>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2022-10-04 14:45:19 +00:00
Mathew McBride
e77ef36395 kernel: add patches for SFP support on NXP Layerscape/DPAA2 (arm64)
These two patches are needed to support SFP's on NXP DPAA2 platforms
(e.g Traverse Ten64).

The deadlock issue patch was submitted upstream a while ago and
rejected, however I am not aware of any better solutions at present.

The 10G mode additions are part of mainline since 5.16.

These two .patches were sourced from our patchset over here:
https://gitlab.com/traversetech/traverse-kernel-patches/-/tree/lts-5-15/patches

Signed-off-by: Mathew McBride <matt@traverse.com.au>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2022-10-04 14:45:19 +00:00
Mathew McBride
8399123461 linux: enable options for NXP Layerscape
This change enables support for NXP's QorIQ/Layerscape platforms,
specifically the Traverse Technologies Ten64 (LS1088A).

Signed-off-by: Mathew McBride <matt@traverse.com.au>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2022-10-04 14:45:19 +00:00
Adolf Belka
a4e5b6d689 rsync: Update to version 3.2.6 and fix Bug#12947
- Update from version 3.2.4 plus CVE-2022-29154 patch to 3.2.6
- Patch for CVE-2022-29154 applied  in CU170 turned out to have a bug within it causing
   rsync to fail with an error. Four additional commits were done to fix this bug and
   its consequences but these were all applied in the rsync git repo after the patch had
   been merged into CU170.
- Version 3.2.5 onwards contains the CVE-2022-29154 fix and associated commits.
- No update of rootfile required.
- Changelog
    NEWS for rsync 3.2.6 (9 Sep 2022)
	BUG FIXES:
	    More path-cleaning improvements in the file-list validation code to avoid
             rejecting of valid args.
	    A file-list validation fix for a --files-from file that ends without a
             line-terminating character.
	    Added a safety check that prevents the sender from removing destination
             files when a local copy using --remove-source-files has some files that are
             shared between the sending & receiving hierarchies, including the case
             where the source dir & destination dir are identical.
	    Fixed a bug in the internal MD4 checksum code that could cause the digest to
             be sporadically incorrect (the openssl version was/is fine).
	    A minor tweak to rrsync added "copy-devices" to the list of known args, but
             left it disabled by default.
	ENHANCEMENTS:
	    Rename --protect-args to --secluded-args to make it clearer how it differs
             from the default backslash-escaped arg-protecting behavior of rsync. The
             old option names are still accepted. The environment-variable override did
             not change its name.
	PACKAGING RELATED:
	    The configure option --with-protected-args was renamed to
             --with-secluded-args. This option makes --secluded-args the default rsync
             behavior instead of using backslash escaping for protecting args.
	    The mkgitver script now makes sure that a .git dir/file is in the top-level
             source dir before calling git describe. It also runs a basic check on the
             version value. This should avoid using an unrelated git description for
             rsync's version.
	DEVELOPER RELATED:
	    The configure script no longer sets the -⁠pedantic-errors CFLAG (which it
             used to try to do only for gcc).
	    The name_num_obj struct was modified to allow its dynamic name_num_item list
             to be initialized in a better way.
    NEWS for rsync 3.2.5 (14 Aug 2022)
	SECURITY FIXES:
	    Added some file-list safety checking that helps to ensure that a rogue
             sending rsync can't add unrequested top-level names and/or include
             recursive names that should have been excluded by the sender. These extra
             safety checks only require the receiver rsync to be updated. When dealing
             with an untrusted sending host, it is safest to copy into a dedicated
             destination directory for the remote content (i.e. don't copy into a
             destination directory that contains files that aren't from the remote host
             unless you trust the remote host). Fixes CVE-2022-29154.
	    A fix for CVE-2022-37434 in the bundled zlib (buffer overflow issue).
	BUG FIXES:
	    Fixed the handling of filenames specified with backslash-quoted wildcards
             when the default remote-arg-escaping is enabled.
	    Fixed the configure check for signed char that was causing a host that
             defaults to unsigned characters to generate bogus rolling checksums. This
             made rsync send mostly literal data for a copy instead of finding matching
             data in the receiver's basis file (for a file that contains high-bit
             characters).
	    Lots of manpage improvements, including an attempt to better describe how
             include/exclude filters work.
	    If rsync is compiled with an xxhash 0.8 library and then moved to a system
             with a dynamically linked xxhash 0.7 library, we now detect this and
             disable the XX3 hashes (since these routines didn't stabilize until 0.8).
	ENHANCEMENTS:
	    The --trust-sender option was added as a way to bypass the extra file-list
             safety checking (should that be required).
	PACKAGING RELATED:
	    A note to those wanting to patch older rsync versions: the changes in this
             release requires the quoted argument change from 3.2.4. Then, you'll want
             every single code change from 3.2.5 since there is no fluff in this release.
	    The build date that goes into the manpages is now based on the developer's
             release date, not on the build's local-timezone interpretation of the date.
	DEVELOPER RELATED:
	    Configure now defaults GETGROUPS_T to gid_t when cross compiling.
	    Configure now looks for the bsd/string.h include file in order to fix the
             build on a host that has strlcpy() in the main libc but not defined in the
             main string.h file.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2022-10-04 14:44:50 +00:00
Peter Müller
6d0e3c5a57 libseccomp: Bump package version
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-10-03 21:58:25 +00:00
Peter Müller
16eb2d5379 linux: Enable seccomp filter on ARM
Since last time we checked, the kernel's security features on ARM have
improved notably (see CONFIG_RANDOMIZE_BASE discussion). This patch
therefore proposes to give the seccomp filter on both 32- and 64-bit ARM
another try, since it provides significant security benefit to
applications using it.

Due to operational constraints, rootfile changes have been omitted, and
will be conducted, should this patch be approved.

Note to future self: Once this patch is approved, applications using
seccomp (OpenSSH, Tor) need to be updated/shipped on ARM.

Fixes: #12366
Fixes: #12370
Cc: Arne Fitzenreiter <arne.fitzenreiter@ipfire.org>
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-10-03 21:57:47 +00:00
Peter Müller
25a3d87645 linux: Remove user-space probe support
From the kernels' documentation:

> Uprobes is the user-space counterpart to kprobes: they
> enable instrumentation applications (such as 'perf probe')
> to establish unintrusive probes in user-space binaries and
> libraries, by executing handler functions when the probes
> are hit by user-space applications.
>
> ( These probes come in the form of single-byte breakpoints,
> managed by the kernel and kept transparent to the probed
> application. )

To the best of the authors' understanding, no application on IPFire
needs this functionality, and given its abuse potential, we should
probably not enable it.

As expected, strace functionality is not impaired by this.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-10-03 16:52:09 +00:00
Matthias Fischer
e79c4372ce suricata 6.0.8 - suggested change in 'suricata.yaml': set app-layer mqtt: enabled: yes
Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Acked-by: Peter Müller <peter.mueller@ipfire.org>
2022-10-03 16:51:38 +00:00
Peter Müller
9826ac9bc2 modules.d: Drop orphaned blacklist statements
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-10-03 10:21:24 +00:00
Peter Müller
c480cb54f0 Update contributor list
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-10-03 10:07:49 +00:00
Peter Müller
eee65ac34f backup: Fix file permissions of in-/exclude files, again
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-10-03 09:22:57 +00:00
Peter Müller
c153f73552 Core Update 171: Do not ship /sbin/tipc
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-10-02 10:20:38 +00:00
Peter Müller
415afe55b2 Core Update 171: Fix Suricata stop/start
My fault, again. :-/

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-10-02 09:46:47 +00:00
Peter Müller
c309bdcf3d Avoid manpages from being shipped and delete them on existing installations
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-10-02 09:43:47 +00:00
Peter Müller
18f9c27601 Core Update 171: Ship proxy.cgi
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-10-02 08:51:03 +00:00
Matthias Fischer
e0be9eab47 proxy.cgi: Fix for Bug #12826 'squid >=5 crashes on literal IPv6 addresses'
Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Bernhard Bitsch <bbitsch@ipfire.org>
2022-10-02 08:50:39 +00:00
Peter Müller
1c8e23c869 backup: Increase chown verbosiness
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-10-02 08:49:53 +00:00
Peter Müller
2a06a00571 langs: Fix missing spaces for proxy password length error message
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-30 22:09:31 +00:00