Commit Graph

6699 Commits

Author SHA1 Message Date
Michael Tremer
ba329dce8f core133: Ship updated rrdtool
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-06-04 23:31:51 +01:00
Matthias Fischer
83d4264eba rrdtool: Update to 1.7.2
For details see:
https://oss.oetiker.ch/rrdtool/pub/CHANGES

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-06-04 23:31:11 +01:00
Michael Tremer
c7def60649 Rootfile update
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-06-03 09:20:05 +01:00
Michael Tremer
f748c79450 core133: Ship updated ovpnmain.cgi
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-06-02 22:49:42 +01:00
Michael Tremer
b0ec4158f3 miau: Drop package
This is not maintained since 2010

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-29 15:24:29 +01:00
Michael Tremer
f62f432a27 openssl: Update to 1.1.1c
Fixes CVE-2019-1543

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-29 13:51:48 +01:00
Michael Tremer
7b6d2972e3 strongswan: Update to 5.8.0
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-28 13:05:50 +01:00
Erik Kapfer
3c8aa8d75b tshark: Update to 3.0.2
Incl. one vulnerability and several bug fixes. For full overview --> https://www.wireshark.org/docs/relnotes/wireshark-3.0.2.html .

- Disabled geoip support since libmaxminddb is not presant.
- Added dictionary in ROOTFILE to prevent "radius: Could not open file: '/usr/share/wireshark/radius/dictionary' " .
- Added CMAKE build type
- Removed profile examples and htmls completly from ROOTFILE.

Signed-off-by: Erik Kapfer <ummeegge@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-28 12:29:36 +01:00
Michael Tremer
992fdd3d07 core133: Ship toolchain changes
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-28 11:44:32 +01:00
Michael Tremer
71ff23c765 Rootfile update
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-28 11:41:46 +01:00
Michael Tremer
fe9dbfa124 core133: Ship updated IPS ruleset sources
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-27 15:48:44 +01:00
Stefan Schantl
79af9f6938 ruleset-sources: Update snort dl urls.
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-27 15:48:15 +01:00
Michael Tremer
f6104aa1e0 core133: Drop metadata for jansson package
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-27 15:42:50 +01:00
Michael Tremer
86efc510f9 core133: Ship hyperscan
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-27 15:40:31 +01:00
Michael Tremer
81544f8884 hyperscan: Move rootfiles to arch directories
This package is only compiled on x86_64 and i586 and cannot
be packaged in any of the other architectures.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-27 15:38:42 +01:00
Stefan Schantl
52ebc66bba hyperscan: New package
This package adds hyperscan support to suricata

Fixes #12053.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-27 14:40:14 +01:00
Stefan Schantl
2348cfffcf ragel: New package
This is a build dependency of hyperscan

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-27 14:40:03 +01:00
Stefan Schantl
1a5f064916 colm: New package
This is a build dependency of ragel, which is a build dependency of
hyperscan.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-27 14:39:32 +01:00
Stefan Schantl
616395f37c jansson: Move to core system and update to 2.12
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-27 14:39:00 +01:00
Michael Tremer
f6e18df542 Rootfile update
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-27 14:37:23 +01:00
Arne Fitzenreiter
8a104d7f02 core133: readd late core132 changes to core133
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2019-05-26 17:27:16 +02:00
Arne Fitzenreiter
83809af1fb Merge branch 'master' into next 2019-05-26 17:23:54 +02:00
Arne Fitzenreiter
637885839b core132: security conf should not executable
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2019-05-26 16:17:04 +02:00
Stefan Schantl
fefb5173cf ids-functions.pl: Do not delete the whitelist file on rulesdir cleanup.
Fixes #12087.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2019-05-26 16:09:21 +02:00
Arne Fitzenreiter
d0db7550ed core132: set correct permissions of security settings file.
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2019-05-26 16:05:41 +02:00
Michael Tremer
333125abf8 Merge branch 'toolchain' into next 2019-05-24 06:55:03 +01:00
Michael Tremer
9f0295a512 Merge remote-tracking branch 'ms/faster-build' into next 2019-05-24 06:54:16 +01:00
Michael Tremer
8feb0db430 core133: Ship updated squid
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-24 06:39:37 +01:00
Michael Tremer
53ef2a0ffe core133: Ship updated bind
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-24 06:37:21 +01:00
Matthias Fischer
f225f3ee29 bind: Update to 9.11.7
For details see:
http://ftp.isc.org/isc/bind9/9.11.7/RELEASE-NOTES-bind-9.11.7.html

"Security Fixes

  The TCP client quota set using the tcp-clients option could be exceeded in some cases.
  This could lead to exhaustion of file descriptors.
  This flaw is disclosed in CVE-2018-5743. [GL #615]"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-24 06:36:55 +01:00
Michael Tremer
79967ee9c4 Start Core Update 133
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-24 06:35:46 +01:00
Arne Fitzenreiter
716f00b116 kernel: update to 4.14.121
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2019-05-21 20:42:51 +02:00
Arne Fitzenreiter
b0d31edbd6 vnstat: fix errormessage at first boot
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2019-05-21 20:36:16 +02:00
Arne Fitzenreiter
6d37280f3e configroot: create main/security settings file
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2019-05-21 15:03:21 +02:00
Arne Fitzenreiter
405f69fc9c web-user-interface: update rootfile
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2019-05-21 15:02:54 +02:00
Michael Tremer
a087f4f586 core132: Ship vulnerabilities.cgi
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-20 21:55:55 +01:00
Michael Tremer
6f626b9ba0 Add the new vulnerabilities CGI file to the System menu
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-20 21:38:20 +01:00
Michael Tremer
6a83dbb451 SMT: Apply settings according to configuration
SMT can be forced on.

By default, all systems that are vulnerable to RIDL/Fallout
will have SMT disabled by default.

Systems that are not vulnerable to that will keep SMT enabled.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-20 21:30:26 +01:00
Michael Tremer
db3451fe72 suricata: Ship updated rule download script
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-20 19:10:15 +01:00
Peter Müller
40407aee99 ids.cgi: Fix upstream proxy validation
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Acked-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-20 18:50:06 +01:00
Michael Tremer
933bfbf305 core132: Ship updated ovpnmain.cgi file
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-20 10:52:16 +01:00
Erik Kapfer
ffcef39d40 tshark: New addon
Signed-off-by: Erik Kapfer <ummeegge@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-20 10:44:04 +01:00
Peter Müller
2df98063a2 Tor: specify correct user for default configuration
While being built with user/group set to "tor", the default
configuration still contains the old username.

This patch adjusts it to the correct value. The issue was
caused by insufficient testing, which I apologise for.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-20 10:08:58 +01:00
Arne Fitzenreiter
9961167a52 core132: add log.dat to updater
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2019-05-20 07:14:12 +02:00
Michael Tremer
f809b8d5c7 core132: Ship updated apache configuration
A reload would be sufficient.

I could not find why apache needs to be restarted.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-17 20:30:13 +01:00
Peter Müller
df62774e32 httpd: prefer AES-GCM ciphers over AES-CBC
CBC ciphers are vulnerable to a bunch of attacks (being
rather academic so far) such as MAC-then-encrypt or
padding oracle.

These seem to be more serious (see
https://blog.qualys.com/technology/2019/04/22/zombie-poodle-and-goldendoodle-vulnerabilities
for further readings) which is why they should be used
for interoperability purposes only.

I plan to remove AES-CBC ciphers for the WebUI at the
end of the year, provided overall security landscape
has not changed until that.

This patch changes the WebUI cipherlist to:
TLS_CHACHA20_POLY1305_SHA256 TLSv1.3 Kx=any      Au=any  Enc=CHACHA20/POLY1305(256) Mac=AEAD
TLS_AES_256_GCM_SHA384  TLSv1.3 Kx=any      Au=any  Enc=AESGCM(256) Mac=AEAD
TLS_AES_128_GCM_SHA256  TLSv1.3 Kx=any      Au=any  Enc=AESGCM(128) Mac=AEAD
ECDHE-ECDSA-CHACHA20-POLY1305 TLSv1.2 Kx=ECDH     Au=ECDSA Enc=CHACHA20/POLY1305(256) Mac=AEAD
ECDHE-ECDSA-AES256-GCM-SHA384 TLSv1.2 Kx=ECDH     Au=ECDSA Enc=AESGCM(256) Mac=AEAD
ECDHE-ECDSA-AES128-GCM-SHA256 TLSv1.2 Kx=ECDH     Au=ECDSA Enc=AESGCM(128) Mac=AEAD
ECDHE-RSA-CHACHA20-POLY1305 TLSv1.2 Kx=ECDH     Au=RSA  Enc=CHACHA20/POLY1305(256) Mac=AEAD
ECDHE-RSA-AES256-GCM-SHA384 TLSv1.2 Kx=ECDH     Au=RSA  Enc=AESGCM(256) Mac=AEAD
ECDHE-RSA-AES128-GCM-SHA256 TLSv1.2 Kx=ECDH     Au=RSA  Enc=AESGCM(128) Mac=AEAD
ECDHE-ECDSA-AES256-SHA384 TLSv1.2 Kx=ECDH     Au=ECDSA Enc=AES(256)  Mac=SHA384
ECDHE-ECDSA-AES128-SHA256 TLSv1.2 Kx=ECDH     Au=ECDSA Enc=AES(128)  Mac=SHA256
ECDHE-RSA-AES256-SHA384 TLSv1.2 Kx=ECDH     Au=RSA  Enc=AES(256)  Mac=SHA384
ECDHE-RSA-AES128-SHA256 TLSv1.2 Kx=ECDH     Au=RSA  Enc=AES(128)  Mac=SHA256

(AES-CBC + ECDSA will be preferred over RSA for performance
reasons. As this cipher order cannot be trivially rebuilt with
OpenSSL cipher stings, it has to be hard-coded.)

All working clients will stay compatible.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-17 20:27:41 +01:00
Michael Tremer
0aa21ad307 Fix version information in backupiso script
Fixes: #12083
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-17 19:52:27 +01:00
Arne Fitzenreiter
16cb73d901 kernel: update to 4.14.120
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2019-05-17 07:10:52 +02:00
Arne Fitzenreiter
d099196501 kernel: update to 4.14.119
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2019-05-16 14:26:04 +02:00
Arne Fitzenreiter
29b907c677 intel-microcode: update to 20190514
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2019-05-15 13:17:26 +02:00