Commit Graph

3111 Commits

Author SHA1 Message Date
Michael Tremer
8f43a91a3f go: Add for aarch64
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-08-11 18:29:13 +00:00
Michael Tremer
3efa7be901 libsodium: New package
Sodium is a new, easy-to-use software library for encryption,
decryption, signatures, password hashing and more.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-08-10 10:44:31 +00:00
Peter Müller
4865b7f6b8 Revert "Revert "kernel: update to 5.15.59""
This reverts commit f25f1b55af.
2022-08-08 13:17:30 +00:00
Peter Müller
5a18ee55e6 Revert "linux: Randomize layout of sensitive kernel structures"
This reverts commit 4c46e7f818.
2022-08-08 13:17:19 +00:00
Peter Müller
f25f1b55af Revert "kernel: update to 5.15.59"
This reverts commit 43df4a0373.
2022-08-08 10:10:35 +00:00
Arne Fitzenreiter
43df4a0373 kernel: update to 5.15.59
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-08-06 07:45:02 +00:00
Adolf Belka
a0b068783c python3-Cython: Required for build of pyfuse3
- rootfile has all entries commented out as not needed for execution only build

Fixes: Bug#12611
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2022-08-05 09:09:29 +00:00
Peter Müller
893427ad8b linux: Update rootfiles
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-08-04 12:11:53 +00:00
Peter Müller
668cf4c0d0 GnuTLS: Zut alors, update rootfile
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-08-04 12:04:01 +00:00
Peter Müller
4c46e7f818 linux: Randomize layout of sensitive kernel structures
To quote from the kernel documentation:

> If you say Y here, the layouts of structures that are entirely
> function pointers (and have not been manually annotated with
> __no_randomize_layout), or structures that have been explicitly
> marked with __randomize_layout, will be randomized at compile-time.
> This can introduce the requirement of an additional information
> exposure vulnerability for exploits targeting these structure
> types.
>
> Enabling this feature will introduce some performance impact,
> slightly increase memory usage, and prevent the use of forensic
> tools like Volatility against the system (unless the kernel
> source tree isn't cleaned after kernel installation).
>
> The seed used for compilation is located at
> scripts/gcc-plgins/randomize_layout_seed.h. It remains after
> a make clean to allow for external modules to be compiled with
> the existing seed and will be removed by a make mrproper or
> make distclean.
>
> Note that the implementation requires gcc 4.7 or newer.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Acked-by: Michael Tremer <michael.tremer@ipfire.org>
2022-08-03 10:59:03 +00:00
Peter Müller
7e451c52dc GnuTLS: Update to 3.7.7
Please refer to https://lists.gnupg.org/pipermail/gnutls-help/2022-July/004746.html
the release notes of this version, and https://www.gnutls.org/security-new.html#GNUTLS-SA-2022-07-07
for the accompanying security advisory.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-08-03 10:57:24 +00:00
Peter Müller
ef43621772 fmt: Update to 9.0.0
Please refer to https://github.com/fmtlib/fmt/releases/tag/9.0.0 for the
release announcement of this version.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-08-03 10:56:01 +00:00
Peter Müller
ef439b6871 linux: Update rootfiles to reflect dropped support of dprintk
See: 883e29630c

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-08-03 10:54:07 +00:00
Peter Müller
de7a483f6a linux: Update aarch64 rootfile
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-08-02 15:22:15 +00:00
Matthias Fischer
ee90ed8271 unbound: Update to 1.16.2
For details see:
https://nlnetlabs.nl/projects/unbound/download/#unbound-1-16-2

"Features

    Merge #718: Introduce infra-cache-max-rtt option to config max retransmit timeout.

Bug Fixes

    Fix the novel ghost domain issues CVE-2022-30698 and CVE-2022-30699.

    Fix bug introduced in 'improve val_sigcrypt.c::algo_needs_missing
    for one loop pass'.

    Merge PR #668 from Cristian Rodríguez: Set IP_BIND_ADDRESS_NO_PORT
    on outbound tcp sockets.

    Fix verbose EDE error printout.

    Fix dname count in sldns parse type descriptor for SVCB and HTTPS.

    For windows crosscompile, fix setting the IPV6_MTU socket option
    equivalent (IPV6_USER_MTU); allows cross compiling with latest cross-compiler versions.

    Merge PR 714: Avoid treat normal hosts as unresponsive servers. And fixup the lock code.

    iana portlist update.

    Update documentation for 'outbound-msg-retry:'.

    Tests for ghost domain fixes."

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-08-02 06:45:53 +00:00
Peter Müller
7caecf45fb linux: Give CONFIG_RANDOMIZE_BASE on aarch64 another try
Quoted from https://capsule8.com/blog/kernel-configuration-glossary/:

> Significance: Critical
>
> In support of Kernel Address Space Layout Randomization (KASLR) this randomizes
> the physical address at which the kernel image is decompressed and the virtual
> address where the kernel image is mapped as a security feature that deters
> exploit attempts relying on knowledge of the location of kernel code internals.

We tried to enable this back in 2020, and failed. Since then, things
may have been improved, so let's give this low-hanging fruit another
try.

Fixes: #12363
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-08-01 10:20:20 +00:00
Peter Müller
861080834d linux: Update ARM rootfiles
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-07-29 17:09:56 +00:00
Peter Müller
ec175339bf logwatch: Fix rootfile
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-07-29 17:06:15 +00:00
Peter Müller
59c6ea57fa kmod: Update to 30
Please refer to the tarballs's NEWS file for release announcements.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2022-07-29 17:04:28 +00:00
Peter Müller
5591a68c05 linux: Enable Intel DMA Remapping Devices by default on x86_64
If available, the kernel will enable IOMMU (a/k/a DMA remapping) by
default on boot. To tools making use of that, particularly hypervisors,
this provides better security without any downsides.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-07-28 13:35:20 +00:00
Peter Müller
37895e21bf linux: Update to 5.15.57
Please refer to https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.57
for the changelog of this version. Since it introduces
architecture-dependent rootfile changes due to CPU side-channel
mitigations, changes to ARM rootfiles have been omitted due to the lack
of hardware.

Supposed hardening changes will be submitted separately.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-07-28 13:34:52 +00:00
Matthias Fischer
731d2a06ce bind: Update to 9.16.31
For details see:
https://downloads.isc.org/isc/bind9/9.16.31/doc/arm/html/notes.html#notes-for-bind-9-16-31

Excerpt from changelog:

"	--- 9.16.31 released ---

5917.	[bug]		Update ifconfig.sh script as is miscomputed interface
			identifiers when destroying interfaces. [GL #3061]

5915.	[bug]		Detect missing closing brace (}) and computational
			overflows in $GENERATE directives. [GL #3429]

5913.	[bug]		Fix a race between resolver query timeout and
			validation in resolver.c:validated(). Remove
			resolver.c:maybe_destroy() as it is no loger needed.
			[GL #3398]

5909.	[bug]		The server-side destination port was missing from dnstap
			captures of client traffic. [GL #3309]

5905.	[bug]		When the TCP connection would be closed/reset between
			the connect/accept and the read, the uv_read_start()
			return value would be unexpected and cause an assertion
			failure. [GL #3400]

5903.	[bug]		When named checks that the OPCODE in a response matches
			that of the request, if there is a mismatch named logs
			an error.  Some of those error messages incorrectly
			used RCODE instead of OPCODE to lookup the nemonic.
			This has been corrected. [GL !6420]"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-07-24 12:59:27 +00:00
Michael Tremer
901f6b7c29 ncurses: Ship tmux terminfo
Fixes: #12905
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-07-21 07:59:43 +00:00
Matthias Fischer
30c6cf7e3c unbound: Update to 1.16.1
For details see:
https://nlnetlabs.nl/projects/unbound/download/#unbound-1-16-1

"Features

    Fix #704: [FR] Statistics counter for number of outgoing UDP queries
    sent; introduces 'num.query.udpout' to the 'unbound-control stats'
    command.

Bug Fixes

    makedist.sh picks up 32bit libssp-0.dll when 32bit compile.
    Fix for edns client subnet to respect not looking in its cache when
    instructed to do so (e.g., prefetch).
    Merge PR #688: Rpz url notify issue.
    Note in the unbound.conf text that NOTIFY is allowed from the 'url:'
    addresses for auth and rpz zones.
    Remove unused LDNS function check for GOST Engine unloading.
    Fix for loading locally stored zones that have lines with blanks or
    blanks and comments.
    Fix #663: use after free issue with edns options.
    Clarify -v flag manpage entry (#705)
    Fix test program dohclient close to use portability routine.
    Show the output of the exact .rpl run that failed with 'make test'.
    Fix for cached 0 TTL records to not trigger prefetching when
    serve-expired-client-timeout is set.
    Add debug option to the mini_tdir.sh test code.
    Fix to not count cached NXDOMAIN for MAX_TARGET_NX.
    Allow fallback to the parent side when MAX_TARGET_NX is reached. This
    will also allow MAX_TARGET_NX more NXDOMAINs.
    iana portlist update.
    Fix detection of libz on windows compile with static option.
    Fix compile warning for windows compile.
    Merge PR #706: NXNS fallback.
    From #706: Cached NXDOMAIN does not increase the target nx responses.
    From #706: Don't generate parent side queries if we already have the
    lame records in cache.
    From #706: When a lame address is the best choice, don't try to
    generate target queries when the missing targets are all lame.
    Merge PR #671 from Petr Menšík: Disable ED25519 and ED448 in FIPS mode
    on openssl3.
    Merge PR #660 from Petr Menšík: Sha1 runtime insecure.
    For #660: formatting, less verbose logging, add EDE information.
    Fix for correct openssl error when adding windows CA certificates to
    the openssl trust store.
    Improve val_sigcrypt.c::algo_needs_missing for one loop pass.
    Reintroduce documentation and more EDE support for
    val_sigcrypt.c::dnskeyset_verify_rrset_sig.
    Fix bug introduced in 'improve val_sigcrypt.c::algo_needs_missing for
    one loop pass'.
    Merge PR #668 from Cristian Rodríguez: Set IP_BIND_ADDRESS_NO_PORT on
    outbound tcp sockets."

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-07-12 15:03:14 +00:00
Adolf Belka
be4bd649f1 vim: Update to version 9.0
- Update from version 8.2 to 9.0
- Update of rootfile
- Remove gcc10 detection patch as this is now built into the source tarball
- Update hardening crash patch. The issue related to the gcc10 patch seems to suggest
   that when that is fixed then the hardening crash patch is not required but it wasn't
   100% clear. So I have left the patch in place as it only changes one line and if it
   worked with the earlier versions then it should also work now. If it is decided that
   it is not needed then it can always be removed at a future update.
- Changelog is massive with over 30000 lines.
   vim provides fixed updates such as 8.2 and 9.0 but then issues very frequent patch
   updates. For version 8.2 there are 5172 patch updates none of which have been applied
   to IPFire. All of these are now built into version 9.0
   https://vimhelp.org/version9.txt.html#new-9 provides the details of what is new with
   version 9.0, including details of all the 5172 patches.
- Key thing for version 9.0 is that there is a new Vim9 script language which is not
   backwards compatible. However the old legacy script language will continue to be
   supported so all old scripts can continue to be used.
- Version 9.0 already has 48 patches released. The releases occur virtually every day
   with several days having multiple patch releases.
- Once this 9.0 version of vim has been confirmed to work successfully by people
   experienced in using vim (I struggle to remember the set of characters to press to
   exit from an editing session), then my plan is to periodically submit an update of the
   patches, although some may be missed out as they are not relevant for IPFire - such
   as deleting Travis CI config and improving the recognition of some Visual Basic files.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-07-11 13:04:05 +00:00
Adolf Belka
319b5ee2c6 i2c-tools: Update to version 4.3
- Update from version 3.1.2 (July 2017) to 4.3 (July 2021)
- Update of rootfile
- Changelog
    4.3 (2021-07-22)
	  decode-dimms: Attempt to decode LPDDR3 modules
	  eeprom, eepromer: Removed the tools in favor of eeprog
	  i2cdetect: Sort the bus list by number
	  i2cdump: Add range support to I2C block mode
	           Deprecate SMBus block mode
	  i2cget: Add support for I2C block read
	          Add support for SMBus block read
	  i2ctransfer: Reverted check for returned length from driver
    4.2 (2020-09-22)
	  manpages: Add BUGS section to let people know how to contact us
	  Makefile: Allow to preset all CFLAGS and LDFLAGS variables
	  tools: Consistently use snprintf instead of sprintf
	         Restrict addresses 0x03-0x07, too (defined by I2C standard)
	  decode-dimms: Print SPD revision for DDR3 too
	                Print primary bus width for DDR3 and DDR4
	                List ee1004 as a candidate driver
	                Display MAC for DDR3
	                Add MAC abbreviation for DDR4
	                Round DDR4 speed properly
	                Detect and report truncated input files
	                Print kernel driver used
	                Print DDR memory speed in MT/s
	                Add DDR5 memory types
	                Decode manufacturing data for LPDDR3
	                Fix the version string
	                Point the user to the right drivers
	                Update the list of vendors to Jedec JEP106BB
	  decode-vaio: Add support for the at24 driver
	               Scan more i2c buses
	  i2cset: Fix short writes with mask
	  i2ctransfer: Mention '-a' everywhere in the manpage
	               Support messages using I2C_M_RECV_LEN
	               Add check for returned length from driver
	  i2c-stub-from-dump: Read dumps from hexdump -C
	  library: Add a manual page to document the API
    4.1 (2018-11-30)
	  Makefile: Make STRIP, DESTDIR and PREFIX overridable
	  tools: Fix potential buffer overflows in i2cbusses
	         Fix build race
	         Allow usage of reserved addresses with the '-a' flag
	  decode-dimms: Add preliminary DDR4 support
	                Decode size and timings of DDR4
	                Decode misc parameters of DDR4
	                Decode physical characteristics of DDR4
	                Documentation update for DDR4
	                Verify the CRC of DDR4 data block 1
	                Update manufacturer IDs (JEP106AX)
	  eeprog: Fix ambiguous parentheses
	          Fix build race
	  i2ctransfer: Rename option '-f' to '-a' for consistency
	  i2c-dev.h: Delete
	  library: Fix build race
	           Allow disabling the dynamic flavor
	           Mention the correct license in source files
	  py-smbus: Fix i2c_smbus_* error propagation
    4.0 (2017-10-30)
	  tools: Fix build with recent compilers (gcc 4.6+)
	         Add examples to the manual pages
	  README: Clarify licenses
	          Mention the current maintainer
	  decode-dimms: Decode module configuration type of DDR2 SDRAM
	                Decode bus width extension of DDR3 SDRAM
	                Don't choke when no EEPROM is found
	                Don't make columns larger than they need to be
	                Make side-by-side output more robust
	                Print module organization of DDR SDRAM
	                Merge cells by default in side-by-side output
	                Print extra timing values of DDR SDRAM
	                Print DDR and DDR2 core timings for all supported CAS values
	                Print DDR2 equivalent speed of tCK max
	                Don't print undefined DDR2 SDRAM timings
			Print SDR, DDR, DDR2, DDR3 core timings for all standard speeds
	                Update manufacturer IDs
	                Make DDR3 manufacturer count parity error non-fatal
	                Strip former manufacturer name in side-by-side output mode
	                Remove duplicate "ns" in SDR timings
	                Add section headers for SDR modules
	                Fix decoding of SDR SPD revision
	                Prevent hang on reserved DDR3 module type
	                Decode more DDR3 module types
	                Fix DDR3 tRAS decoding
	                Fix DDR3 core timings rounding
	                Round down PC3 numbers to comply with Jedec
	                Don't print the DDR3 time bases
	                Decode the FTB fields of DDR3 tCk, tAA, tRCD, tRP and tRC
	                Fix speed and PC3 number of high-speed DDR3 modules
	                Decode DDR3 reference card revision
	                Print width of all known DDR3 module types
	                Print physical characteristics for all DDR3 module types
	                Don't print raw SSTE32882 register values
	                Add support for Load Reduced DIMM (LRDIMM) DDR3 modules
	                Fully decode the DDR3 SDRAM Device Type field
	                Fix DDR3 extended temp range refresh rate decoding
	                Encode "degrees" to HTML degree symbol
	                Generate XHTML 1.1 compliant markup
	                Add a manual page
	                Correctly check for out-of-bounds vendor ID
	                Update manufacturer IDs (JEP106AQ)
	  decode-vaio: Add a manual page
	  eeprog: Add a manual page
	          Moved to a separate subdirectory
	          Increase delay after writes
	  eeprom: Add a manual page
	          Marked as deprecated
	  eepromer: Add a manual page
	            Marked as deprecated
	  i2cdetect: Do a best effort detection if functionality is missing
	             Clarify the SMBus commands used for probing by default
	  i2ctransfer: New tool to send user-defined I2C messages in one transfer
	  i2c-dev.h: Minimize differences with kernel flavor
	             Move SMBus helper functions to include/i2c/smbus.h
	  i2c-stub-from-dump: Be more tolerant on input dump format
	  library: New libi2c library
	           Properly propagate real error codes on read errors
	           Use I2C_SMBUS_BLOCK_MAX instead of hard-coding 32
	  lib/smbus.c: Add missing include which was causing a build error
	  py-smbus: Fix module level docs
	            Add support for python 3

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-07-11 13:04:01 +00:00
Peter Müller
d574941b90 Merge branch 'temp-stevee-ipblocklist-final' into next 2022-07-10 08:20:15 +00:00
Peter Müller
60da82e5ec util-linux: Do not ship broken symlink "/usr/bin/x86_64"
This file points to /usr/bin/setarch, which we do not ship on any
architecture. As it serves no obvious purpose on IPFire installations,
we may as well not ship it entirely.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Adolf Belka <adolf.belka@ipfire.org>
2022-07-09 15:02:47 +00:00
Peter Müller
962600b21a screen: Update to 4.9.0
Full changelog as per https://savannah.gnu.org/forum/forum.php?forum_id=10107:

New in this release:
  * Hardstatus option for used encoding (escape string '%e')
  * OpenBSD uses native openpty() from its utils.h
  * Fixes:
    - fix combining char handling that could lead to a segfault
    - CVE-2021-26937: possible denial of service via a crafted UTF-8 character sequence (bug #60030)
    - make screen exit code be 0 when checking --help
    - session names limit is 80 symbols (bug #61534)
    - option -X ignores specified user in multiuser env (bug #37437)
    - a lot of reformations/fixes/cleanups (man page and source code)

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Adolf Belka <adolf.belka@ipfire.org>
2022-07-09 14:58:58 +00:00
Peter Müller
65630b4a6b Finally get rid of orphaned xt_geoip directories
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-07-09 11:55:29 +00:00
Adolf Belka
592c507248 harfbuzz: Update to version 4.4.1
- Update from version 4.2.0 to 4.4.1
- Update of rootfile
- Changelog
   Overview of changes leading to 4.4.1
	- Fix test failure with some compilers.
	- Fix Telugu and Kannada kerning regression.
   Overview of changes leading to 4.4.0
	- Caching of variable fonts shaping, in particular when using HarfBuzz’s own
	  font loading functions (ot). Bringing performance of variable shaping in par
	  with non-variable fonts shaping. (Behdad Esfahbod)
	- Caching of format 2 “Contextual Substitution” and “Chained Contexts
	  Substitution” lookups. Resulting in up to 20% speedup of lookup-heavy fonts
	  like Gulzar or Noto Nastaliq Urdu. (Behdad Esfahbod)
	- Improved ANSI output from hb-view. (Behdad Esfahbod)
	- Support for shaping legacy, pre-OpenType Windows 3.1-era, Arabic fonts that
	  relied on a fixed PUA encoding. (Khaled Hosny, Behdad Esfahbod)
	- Sinhala script is now shaped by the USE shaper instead of “indic” one.
	  (Behdad Esfahbod, David Corbett)
	- Thai shaper improvements. (David Corbett)
	- hb-ot-name API supports approximate BCP-47 language matching, for example
	  asking for “en_US” in a font that has only “en” names will return them.
	  (Behdad Esfahbod)
	- Optimized TrueType glyph shape loading. (Behdad Esfahbod)
	- Fix subsetting of HarfBuzz faces created via hb_face_create_for_tables().
	  (Garret Rieger)
	- Add 32 bit var store support to the subsetter. (Garret Rieger)
	- New API
	   +HB_BUFFER_FLAG_DEFINED
	   +HB_BUFFER_SERIALIZE_FLAG_DEFINED
	   +hb_font_changed()
	   +hb_font_get_serial()
	   +hb_ft_hb_font_changed()
	   +hb_set_hash()
	   +hb_map_copy()
	   +hb_map_hash()
   Overview of changes leading to 4.3.0
	- Major speed up in loading and subsetting fonts, especially in
	  handling CFF table. Subsetting some fonts is now 3 times faster.
	  (Behdad Esfahbod, Garret Rieger)
	- Speed up blending CFF2 table. (Behdad Esfahbod)
	- Speed up hb_ot_tags_from_language(). (Behdad Esfahbod, David Corbett)
	- Fix USE classification of U+10A38 to fix multiple marks on single Kharoshthi
	  base. (David Corbett)
	- Fix parsing of empty CFF Index. (Behdad Esfahbod)
	- Fix subsetting CPAL table with partial palette overlaps. (Garret Rieger)
	- New API
	   +hb_map_is_equal() (Behdad Esfahbod)
   Overview of changes leading to 4.2.1
	- Make sure hb_blob_create_from_file_or_fail() always returns nullptr in case
	  of failure and not empty blob sometimes. (Khaled Hosny)
	- Add --passthrough-tables option to hb-subset. (Cosimo Lupo)
	- Reinstate a pause after basic features in Khmer shaper, fixing a regression
	  introduced in previous release. (Behdad Esfahbod)
	- Better handling of Regional_Indicator when shaped with RTL-native scripts,
	  reverting earlier fix that caused regressions in AAT shaping. (Behdad Esfahbod)

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-07-09 09:08:44 +00:00
Adolf Belka
32393c0420 gnutls: Update to version 3.7.6
- Update from version 3.6.16 to 3.7.6
- Update of rootfile
- find-dependencies run on sobump libs. No dependencies flagged for the old or new libs
- Changelog
    * Version 3.7.6 (released 2022-05-27)
	** libgnutls: Fixed invalid write when gnutls_realloc_zero()
	   is called with new_size < old_size. This bug caused heap
	   corruption when gnutls_realloc_zero() has been set as gmp
	   reallocfunc (!1592, #1367, #1368, #1369).
	** API and ABI modifications:
	No changes since last version.
    * Version 3.7.5 (released 2022-05-15)
	** libgnutls: The GNUTLS_NO_TICKETS_TLS12 flag and %NO_TICKETS_TLS12 priority
	   modifier have been added to disable session ticket usage in TLS 1.2 because
	   it does not provide forward secrecy (#477).  On the other hand, since session
	   tickets in TLS 1.3 do provide forward secrecy, the PFS priority string now
	   only disables session tickets in TLS 1.2.  Future backward incompatibility:
	   in the next major release of GnuTLS, we plan to remove those flag and
	   modifier, and make GNUTLS_NO_TICKETS and %NO_TICKETS only affect TLS 1.2.
	** gnutls-cli, gnutls-serv: Channel binding for printing information
	   has been changed from tls-unique to tls-exporter as tls-unique is
	   not supported in TLS 1.3.
	** libgnutls: Certificate sanity checks has been enhanced to make
	   gnutls more RFC 5280 compliant (!1583).
	   Following changes were included:
	   - critical extensions are parsed when loading x509
	     certificate to prohibit any random octet strings.
	     Requires strict-x509 configure option to be enabled
	   - garbage bits in Key Usage extension are prohibited
	   - empty DirectoryStrings in Distinguished name structures
	     of Issuer and Subject name are prohibited
	** libgnutls: Removed 3DES from FIPS approved algorithms (#1353).
	   According to the section 2 of SP800-131A Rev.2, 3DES algorithm
	   will be disallowed for encryption after December 31, 2023:
	   https://csrc.nist.gov/publications/detail/sp/800-131a/rev-2/final
	** libgnutls: Optimized support for AES-SIV-CMAC algorithms (#1217, #1312).
	   The existing AEAD API that works in a scatter-gather fashion
	   (gnutls_aead_cipher_encryptv2) has been extended to support AES-SIV-CMAC.
	   For further optimization, new function (gnutls_aead_cipher_set_key) has been
	   added to set key on the existing AEAD handle without re-allocation.
	** libgnutls: HKDF and AES-GCM algorithms are now approved in FIPS-140 mode
	   when used in TLS (#1311).
	** The configure arguments for Brotli and Zstandard (zstd) support
	   have changed to reflect the previous help text: they are now
	   --with-brotli/--with-zstd respectively (#1342).
	** Detecting the Zstandard (zstd) library in configure has been
	   fixed (#1343).
	** API and ABI modifications:
	GNUTLS_NO_TICKETS_TLS12: New flag
	gnutls_aead_cipher_set_key: New function
    * Version 3.7.4 (released 2022-03-17)
	** libgnutls: Added support for certificate compression as defined in RFC8879
	   (#1301). New API functions (gnutls_compress_certificate_get_selected_method
	   and gnutls_compress_certificate_set_methods) allow client and server to set
	   their preferences.
	** certtool: Added option --compress-cert that allows user to specify
	   compression methods for certificate compression.
	** libgnutls: GnuTLS can now be compiled with --enable-strict-x509 configure
	   option to enforce stricter certificate sanity checks that are compliant with
	   RFC5280.
	** libgnutls: Removed IA5String type from DirectoryString within issuer
	   and subject name to make DirectoryString RFC5280 compliant.
	** libgnutls: Added function (gnutls_record_send_file) to send file content from
	   open file descriptor (!1486). The implementation is optimized if KTLS (kernel
	   TLS) is enabled.
	** libgnutls: Added function (gnutls_ciphersuite_get) to retrieve the name of
	   current ciphersuite from TLS session (#1291).
	** libgnutls: The run-time dependency on tpm2-tss is now re-implemented using
	   dlopen, so GnuTLS does not indirectly link to other crypto libraries until
	   TPM2 functionality is utilized (!1544).
	** API and ABI modifications:
	GNUTLS_COMP_BROTLI: New gnutls_compression_method_t enum member
	GNUTLS_COMP_ZSTD: New gnutls_compression_method_t enum member
	gnutls_compress_certificate_get_selected_method: Added
	gnutls_compress_certificate_set_methods: Added
	gnutls_ciphersuite_get: New function
	gnutls_record_send_file: New function
	libgnutlsxx: Soname bumped due to ABI breakage introduced in 3.7.1
    * Version 3.7.3 (released 2022-01-17)
	** libgnutls: The allowlisting configuration mode has been added to the system-wide
	   settings. In this mode, all the algorithms are initially marked as insecure
	   or disabled, while the applications can re-enable them either through the
	   [overrides] section of the configuration file or the new API (#1172).
	** The build infrastructure no longer depends on GNU AutoGen for generating
	   command-line option handling, template file parsing in certtool, and
	   documentation generation (#773, #774). This change also removes run-time or
	   bundled dependency on the libopts library, and requires Python 3.6 or later
	   to regenerate the distribution tarball.
	   Note that this brings in known backward incompatibility in command-line
	   tools, such as long options are now case sensitive, while previously they
	   were treated in a case insensitive manner: for example --RSA is no longer a
	   valid option of certtool. The existing scripts using GnuTLS tools may need
	   adjustment for this change.
	** libgnutls: The tpm2-tss-engine compatible private blobs can be loaded and
	   used as a gnutls_privkey_t (#594). The code was originally written for the
	   OpenConnect VPN project by David Woodhouse. To generate such blobs, use the
	   tpm2tss-genkey tool from tpm2-tss-engine:
	   https://github.com/tpm2-software/tpm2-tss-engine/#rsa-operations
	   or the tpm2_encodeobject tool from unreleased tpm2-tools.
	** libgnutls: The library now transparently enables Linux KTLS
	   (kernel TLS) when the feature is compiled in with --enable-ktls configuration
	   option (#1113). If the KTLS initialization fails it automatically falls back
	   to the user space implementation.
	** certtool: The certtool command can now read the Certificate Transparency
	   (RFC 6962) SCT extension (#232).  New API functions are also provided to
	   access and manipulate the extension values.
	** certtool: The certtool command can now generate, manipulate, and evaluate
	   x25519 and x448 public keys, private keys, and certificates.
	** libgnutls: Disabling a hashing algorithm through "insecure-hash"
	   configuration directive now also disables TLS ciphersuites that use it as a
	   PRF algorithm.
	** libgnutls: PKCS#12 files are now created with modern algorithms by default
	   (!1499).  Previously certtool used PKCS12-3DES-SHA1 for key derivation and
	   HMAC-SHA1 as an integity measure in PKCS#12.  Now it uses AES-128-CBC with
	   PBKDF2 and SHA-256 for both key derivation and MAC algorithms, and the
	   default PBKDF2 iteration count has been increased to 600000.
	** libgnutls: PKCS#12 keys derived using GOST algorithm now uses
	   HMAC_GOSTR3411_2012_512 instead of HMAC_GOSTR3411_2012_256 for integrity, to
	   conform with the latest TC-26 requirements (#1225).
	** libgnutls: The library now provides a means to report the status of approved
	   cryptographic operations (!1465). To adhere to the FIPS140-3 IG 2.4.C., this
	   complements the existing mechanism to prohibit the use of unapproved
	   algorithms by making the library unusable state.
	** gnutls-cli: The gnutls-cli command now provides a --list-config option to
	   print the library configuration (!1508).
	** libgnutls: Fixed possible race condition in
	   gnutls_x509_trust_list_verify_crt2 when a single trust list object is shared
	   among multiple threads (#1277). [GNUTLS-SA-2022-01-17, CVSS: low]
	** API and ABI modifications:
	GNUTLS_PRIVKEY_FLAG_RSA_PSS_FIXED_SALT_LENGTH: new flag in gnutls_privkey_flags_t
	GNUTLS_VERIFY_RSA_PSS_FIXED_SALT_LENGTH: new flag in gnutls_certificate_verify_flags
	gnutls_ecc_curve_set_enabled: Added.
	gnutls_sign_set_secure: Added.
	gnutls_sign_set_secure_for_certs: Added.
	gnutls_digest_set_secure: Added.
	gnutls_protocol_set_enabled: Added.
	gnutls_fips140_context_init: New function
	gnutls_fips140_context_deinit: New function
	gnutls_fips140_push_context: New function
	gnutls_fips140_pop_context: New function
	gnutls_fips140_get_operation_state: New function
	gnutls_fips140_operation_state_t: New enum
	gnutls_transport_is_ktls_enabled: New function
	gnutls_get_library_configuration: New function
    * Version 3.7.2 (released 2021-05-29)
	** libgnutls: The priority string option %DISABLE_TLS13_COMPAT_MODE was added
	   to disable TLS 1.3 middlebox compatibility mode
	** libgnutls: The Linux kernel AF_ALG based acceleration has been added.
	   This can be enabled with --enable-afalg configure option, when libkcapi
	   package is installed (#308).
	** libgnutls: Fixed timing of early data exchange. Previously, the client was
	   sending early data after receiving Server Hello, which not only negates the
	   benefit of 0-RTT, but also works under certain assumptions hold (e.g., the
	   same ciphersuite is selected in initial and resumption handshake) (#1146).
	** certtool: When signing a CSR, CRL distribution point (CDP) is no longer
	   copied from the signing CA by default (#1126).
	** libgnutls: The GNUTLS_NO_EXPLICIT_INIT envvar has been renamed to
	   GNUTLS_NO_IMPLICIT_INIT to reflect the purpose (#1178). The former is now
	   deprecated and will be removed in the future releases.
	** certtool: When producing certificates and certificate requests, subject DN
	   components that are provided individually will now be ordered by
	   assumed scale (e.g. Country before State, Organization before
	   OrganizationalUnit).  This change also affects the order in which
	   certtool prompts interactively.  Please rely on the template
	   mechanism for automated use of certtool! (#1243)
	** API and ABI modifications:
	gnutls_early_cipher_get: Added
	gnutls_early_prf_hash_get: Added
	** guile: Writes to a session record port no longer throw an exception upon
	   GNUTLS_E_AGAIN or GNUTLS_E_INTERRUPTED.
    * Version 3.7.1 (released 2021-03-10)
	** libgnutls: Fixed potential use-after-free in sending "key_share"
	   and "pre_shared_key" extensions. When sending those extensions, the
	   client may dereference a pointer no longer valid after
	   realloc. This happens only when the client sends a large Client
	   Hello message, e.g., when HRR is sent in a resumed session
	   previously negotiated large FFDHE parameters, because the initial
	   allocation of the buffer is large enough without having to call
	   realloc (#1151).  [GNUTLS-SA-2021-03-10, CVSS: low]
	** libgnutls: Fixed a regression in handling duplicated certs in a
	   chain (#1131).
	** libgnutls: Fixed sending of session ID in TLS 1.3 middlebox
	   compatibiltiy mode. In that mode the client shall always send a
	   non-zero session ID to make the handshake resemble the TLS 1.2
	   resumption; this was not true in the previous versions (#1074).
	** libgnutls: W32 performance improvement with a new sendmsg()-like
	   transport implementation (!1377).
	** libgnutls: Removed dependency on the external 'fipscheck' package,
	   when compiled with --enable-fips140-mode (#1101).
	** libgnutls: Added padlock acceleration for AES-192-CBC (#1004).
	** API and ABI modifications:
	No changes since last version.
    * Version 3.7.0 (released 2020-12-02)
	** libgnutls: Depend on nettle 3.6 (!1322).
	** libgnutls: Added a new API that provides a callback function to
	   retrieve missing certificates from incomplete certificate chains
	   (#202, #968, #1100).
	** libgnutls: Added a new API that provides a callback function to
	   output the complete path to the trusted root during certificate
	   chain verification (#1012).
	** libgnutls: OIDs exposed as gnutls_datum_t no longer account for the
	   terminating null bytes, while the data field is null terminated.
	   The affected API functions are: gnutls_ocsp_req_get_extension,
	   gnutls_ocsp_resp_get_response, and gnutls_ocsp_resp_get_extension
	   (#805).
	** libgnutls: Added a new set of API to enable QUIC implementation (#826, #849,
	   #850).
	** libgnutls: The crypto implementation override APIs deprecated in 3.6.9 are
	   now no-op (#790).
	** libgnutls: Added MAGMA/KUZNYECHIK CTR-ACPKM and CMAC support (!1161).
	** libgnutls: Support for padlock has been fixed to make it work with Zhaoxin
	   CPU (#1079).
	** libgnutls: The maximum PIN length for PKCS #11 has been increased from 31
	   bytes to 255 bytes (#932).
	** API and ABI modifications:
	gnutls_x509_trust_list_set_getissuer_function: Added
	gnutls_x509_trust_list_get_ptr: Added
	gnutls_x509_trust_list_set_ptr: Added
	gnutls_session_set_verify_output_function: Added
	gnutls_record_encryption_level_t: New enum
	gnutls_handshake_read_func: New callback type
	gnutls_handshake_set_read_function: New function
	gnutls_handshake_write: New function
	gnutls_handshake_secret_func: New callback type
	gnutls_handshake_set_secret_function: New function
	gnutls_alert_read_func: New callback type
	gnutls_alert_set_read_function: New function
	gnutls_crypto_register_cipher: Deprecated; no-op
	gnutls_crypto_register_aead_cipher: Deprecated; no-op
	gnutls_crypto_register_mac: Deprecated; no-op
	gnutls_crypto_register_digest: Deprecated; no-op

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-07-09 09:07:44 +00:00
Tim FitzGeorge
a2e095aff1 ipblocklist: Add neccessary files for logwatch. 2022-07-07 17:28:05 +02:00
Stefan Schantl
9759d96e1b stage2: Add database directory for ipblocklist feature.
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
2022-07-07 17:27:14 +02:00
Tim FitzGeorge
5af16e17df ipblocklist: Rootfile updates.
Signed-off-by: Tim FitzGeorge <ipfr@tfitzgeorge.me.uk>
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
2022-07-07 17:26:14 +02:00
Tim FitzGeorge
4ca678a857 ipblocklist-sources: New package.
Placing the ipblocklist sources file as an own package, easily
allows to update this single file during a core update and to
keep the vendor details for the blocklists up-to-date.

Signed-off-by: Tim FitzGeorge <ipfr@tfitzgeorge.me.uk>
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
2022-07-07 17:26:14 +02:00
Peter Müller
f42dc99758 Merge branch 'next' into temp-c170-development 2022-07-06 06:14:54 +00:00
Peter Müller
8000bc0a43 Core Update 169: Drop entropy.cgi
Since the kernel now always reports 256 bits of entropy to be available,
this CGI does not show any useful information anymore. To avoid
confusions, it will hereby be removed entirely.

Fixes: #12893
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-29 20:28:38 +00:00
Michael Tremer
255873a5f9 random: Drop busy-loop script
This is no longer required because the kernel will now try to
generate some randomness in an easier way when needed.

This has been added in: b923dd3de0

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-29 20:11:34 +00:00
Peter Müller
5991f39282 linux: Update rootfiles to reflect /dev mount option change
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-27 17:30:47 +00:00
Adolf Belka
0eaaa300d8 rust-time: Required for update of python3-cryptography
- lfs and rootfile created
- Patch created to remove requirement for winapi and related windows dependencies

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2022-06-25 11:13:38 +00:00
Adolf Belka
541f938d8b rust-stable_deref_trait: Required for update of python3-cryptography
- lfs and rootfile created

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2022-06-25 11:13:38 +00:00
Adolf Belka
ccddf4ce8d rust-proc-macro-error-attr: Required for update of python3-cryptography
- lfs and rootfile created

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2022-06-25 11:13:37 +00:00
Adolf Belka
fdb3fb1565 rust-proc-macro-error: Required for update of python3-cryptography
- lfs and rootfile created

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2022-06-25 11:13:37 +00:00
Adolf Belka
023ed8cefd rust-pem: Required for update of python3-cryptography
- lfs and rootfile created

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2022-06-25 11:13:37 +00:00
Adolf Belka
1cc86b66ec rust-paste-0.1.18: Required for update of python3-cryptography
- lfs and rootfile created
- python3-cryptography build requires older version than was already installed.
   Therefore named version 0.1.18 created, leaving original rust-paste in place

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2022-06-25 11:13:37 +00:00
Adolf Belka
e09731d5e4 rust-ouroboros_macro: Required for update of python3-cryptography
- lfs and rootfile created

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2022-06-25 11:13:37 +00:00
Adolf Belka
c5706bf1ef rust-ouroboros: Required for update of python3-cryptography
- lfs and rootfile created

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2022-06-25 11:13:37 +00:00
Adolf Belka
79781dda3f rust-num_threads: Required for update of python3-cryptography
- lfs and rootfile created

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2022-06-25 11:13:37 +00:00
Adolf Belka
fe6afd5ccc rust-num-traits: Required for update of python3-cryptography
- lfs and rootfile created

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2022-06-25 11:13:37 +00:00