Arne Fitzenreiter
b14b37ba67
OpenSSH: fix login on i?86
...
glibc calls clock_nanosleep_time64 syscall even if it not defined in
the headers for this arch and the seccomp filter kills the process
with because an unknown syscall.
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2020-04-10 21:41:14 +02:00
Peter Müller
59b2a70f7a
dma: update to 0.12
...
All of the dma patches in src/patches/ were merged into its upstream
repository by now, thus becoming obsolete and deleted by this patch.
Cc: Michael Tremer <michael.tremer@ipfire.org >
Signed-off-by: Peter Müller <peter.mueller@ipfire.org >
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org >
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2020-03-30 16:44:35 +00:00
Peter Müller
1b1fe2f2b1
smartmontools: update to 7.1
...
Summary: smartmontools release 7.1
-----------------------------------------------------------
- smartctl: Fixed bogus exception on unknown form factor value (regression).
- smartctl '--json=cg': Suppresses extra spaces also in 'g' format.
- smartctl '-i': ATA ACS-4 and ACS-5 enhancements.
- smartd: No longer truncates very long device names in warning emails.
- smartd: No longer skips scheduled tests if system clock has been adjusted
to the past.
- smartd '-A': Attribute logs now use local time instead of UTC.
- ATA: Device type '-d jmb39x,N' for drives behind JMicron JMB39x RAID port
multipliers.
- SCSI: Workaround for incomplete Log subpages response from some SAS SSDs.
- HDD, SSD and USB additions to drive database.
- Autodetection of '-d sntjmicron' type for JMicron USB to NVMe bridges.
- configure: Defines '_FORTIFY_SOURCE=2' if supported and not defined.
- Linux/FreeBSD: Fixed segfault on CCISS transfer sizes > 512 bytes.
- Linux: Fixed smartd.service 'Type' if libsystemd-dev is not available.
- Linux: Fixed '/dev/megaraid_sas_ioctl_node' fd leak.
- Linux: Fixed GPL licensing problem of 'linux_nvme_ioctl.h'.
- FreeBSD update-smart-drivedb: Now uses 'fetch' as default download tool.
- FreeBSD big endian: Fixed NVMe access.
- FreeBSD: Compile fix for FreeBSD 12.
- NetBSD: Fixed device scan crash on empty name list.
- NetBSD: Fixed memory leak in device scan.
- Windows: Fixed log page access via Windows 10 NVMe driver for NVMe 1.2.1+.
- Windows: Allow drive letters as device names for Windows 10 NVMe driver.
- Windows: Workround to allow CSMI access to devices behind AMD RAID drivers.
- Windows: Fixed MinGW options to add relocation info if ASLR is enabled.
- Windows wtssendmsg: No longer writes '\n' line endings to event log.
- Windows wtssendmsg: New options '-t' and '-w'.
Signed-off-by: Peter Müller <peter.mueller@ipfire.org >
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org >
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2020-03-26 09:57:27 +00:00
Arne Fitzenreiter
b6632b766a
vdr: fix build with glibc 2.31
...
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2020-03-22 19:04:14 +00:00
Michael Tremer
a9f381bd89
qemu: Fix build against glibc >= 2.31
...
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2020-03-22 07:30:22 +00:00
Michael Tremer
50a04f785d
cairo: Update to 1.16.0
...
This updates the package and adds a patch so that it compiles
with binutils 2.34.
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
Reviewed-by: Peter Müller <peter.mueller@ipfire.org >
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2020-03-21 15:44:08 +00:00
Arne Fitzenreiter
70af65df41
kernel: update to 4.14.173
...
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2020-03-11 22:59:38 +01:00
Stefan Schantl
5cbcd514de
ppp: Add upstream patch to fix bounds check in EAP code.
...
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org >
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2020-02-22 15:37:06 +00:00
Stefan Schantl
8f60b4ff30
ppp: Update to 2.4.8
...
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org >
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org >
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2020-02-18 17:10:50 +00:00
Michael Tremer
aef3c56c65
cyrus-imapd: Drop package
...
This package is outdated and unmaintained for many many years.
I am not sure if this even works and if there are any users.
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2020-02-16 16:04:46 +00:00
Stefan Schantl
56f4f279a5
guardian: Add upstream patch for HTTP parser.
...
Fixes #12289 .
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org >
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org >
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2020-02-16 15:56:35 +00:00
Stefan Schantl
08cf4d2154
ddns: Import latest upstream patches for ddns-013
...
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org >
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org >
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2020-02-16 15:53:21 +00:00
Stefan Schantl
f16ddb5fc7
ddns: Update to 013
...
This is an update to the first python3-based release of ddns.
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org >
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org >
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2020-02-16 15:53:06 +00:00
Arne Fitzenreiter
eb7066388b
vdr: update to 2.4.1
...
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2020-02-16 11:48:22 +01:00
Arne Fitzenreiter
ff58943d8e
kernel: cleanup unused kirkwood patches
...
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2020-02-15 17:06:24 +00:00
Michael Tremer
65b08a04da
Drop ez-ipupdate
...
We do not use this at all any more, because it has been replaced
by ddns.
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2020-02-15 16:55:39 +00:00
Michael Tremer
7a68b87789
Drop DirectFB
...
This package is not very useful on its own and nobody
seems to pull this as dependency any more.
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2020-02-15 16:55:24 +00:00
Michael Tremer
d4b31f13d5
Drop multicat & bitstream
...
This reverts commit 0a21ce42e1 .
These packages have never been updated and nodody in the team
is willing to support them.
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2020-02-15 16:55:00 +00:00
Michael Tremer
321c211528
glib: Fix compiling with GCC 9
...
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2020-01-04 18:24:15 +00:00
Michael Tremer
d04fb4ee34
efivar: Update to 37
...
This also fixes some build issues with GCC 9.
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2020-01-04 18:23:54 +00:00
Michael Tremer
3e8dd2d3ed
mdadm: Update to 4.1
...
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2020-01-04 18:23:52 +00:00
Stefan Schantl
0db643ce38
rfkill: New package.
...
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org >
Acked-by: Michael Tremer <michael.tremer@ipfire.org >
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2019-12-29 19:14:30 +00:00
Matthias Fischer
ee506d5027
calamaris: Bug fix for proxy reports staying empty after Core 136 upgrade
...
After upgrading to Core 136, 'calamaris' "Proxy reports" stayed empty.
GUI always show "No reports available".
Tested manually on console stops and throws an error:
...
root@ipfire: ~ # /usr/bin/perl /var/ipfire/proxy/calamaris/bin/mkreport
1 0 2019 8 10 2019 -d 10 -P 30 -t 10 -D 2 -u -r -1 -R 100 -s
Can't use 'defined(%hash)' (Maybe you should just omit the defined()?)
at /var/ipfire/proxy/calamaris/bin/calamaris line 2609.
...
Line 2609 was changed and reports are built again.
Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org >
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org >
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2019-11-30 09:46:19 +00:00
Peter Müller
415fb8b5bd
bash: update to 5.0 (patchlevel 11)
...
The third version of this patch also includes patches 1-11
for version 5.0, drops orphaned 4.3 patches, and fixes rootfile
mistakes reported by Arne.
Please refer to https://tiswww.case.edu/php/chet/bash/bashtop.html
for release notes.
Cc: Michael Tremer <michael.tremer@ipfire.org >
Cc: Arne Fitzenreiter <arne_f@ipfire.org >
Signed-off-by: Peter Müller <peter.mueller@ipfire.org >
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2019-11-13 19:42:59 +00:00
Peter Müller
c82aa03e2c
readline: update to 8.0 (patchlevel 1)
...
The third version of this patch fixes missing rootfile changes, drops
orphaned readline 5.2 patches (as they became obsolete due to
readline-compat changes), includes readline 8.0 upstream patch, and
keeps the for-loop in LFS file (as commented by Michael).
Cc: Michael Tremer <michael.tremer@ipfire.org >
Cc: Arne Fitzenreiter <arne_f@ipfire.org >
Signed-off-by: Peter Müller <peter.mueller@ipfire.org >
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2019-11-13 19:42:43 +00:00
Stefan Schantl
4ae9d47ba3
ddns: Import rename NoIP.com handle back to no-ip.com patch
...
This patch is required for compatiblity reasons for any existing
configurations.
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org >
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2019-11-13 19:40:52 +00:00
Jonatan Schlag
9cc131cc5a
Update qemu to version 4.1.0
...
Signed-off-by: Jonatan Schlag <jonatan.schlag@ipfire.org >
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2019-11-13 19:40:39 +00:00
Jonatan Schlag
3e5d4e6f83
libvirt: use a custom config file
...
The patch which adjusts the options for IPFire in the libvirtd.conf does
not apply in a newer version of libvirt. Creating this patch is harder
than to use a separate config file.
This separate config file also enables us to adjust options much faster.
Signed-off-by: Jonatan Schlag <jonatan.schlag@ipfire.org >
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2019-11-13 19:38:59 +00:00
Stefan Schantl
527c3f39b8
ddns: Import upstream patch for NoIP.com
...
Reference: #11561 .
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org >
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2019-11-13 19:36:11 +00:00
peter.mueller@ipfire.org
e153efaf11
OpenSSL: drop preferring of Chacha20/Poly1305 over AES-GCM
...
As hardware acceleration for AES is emerging (Fireinfo indicates
30.98% of reporting installations support this, compared to
28.22% in summer), there is no more reason to manually prefer
Chacha20/Poly1305 over it.
Further, overall performance is expected to increase as server
CPUs usually come with AES-NI today, where Chacha/Poly would
be an unnecessary bottleneck. Small systems without AES-NI,
however, compute Chacha/Poly measurable, but not significantly faster,
so there only was a small advantage of this.
This patch changes the OpenSSL default ciphersuite to:
TLS_CHACHA20_POLY1305_SHA256 TLSv1.3 Kx=any Au=any Enc=CHACHA20/POLY1305(256) Mac=AEAD
TLS_AES_256_GCM_SHA384 TLSv1.3 Kx=any Au=any Enc=AESGCM(256) Mac=AEAD
TLS_AES_128_GCM_SHA256 TLSv1.3 Kx=any Au=any Enc=AESGCM(128) Mac=AEAD
ECDHE-ECDSA-AES256-GCM-SHA384 TLSv1.2 Kx=ECDH Au=ECDSA Enc=AESGCM(256) Mac=AEAD
ECDHE-ECDSA-CHACHA20-POLY1305 TLSv1.2 Kx=ECDH Au=ECDSA Enc=CHACHA20/POLY1305(256) Mac=AEAD
ECDHE-ECDSA-AES128-GCM-SHA256 TLSv1.2 Kx=ECDH Au=ECDSA Enc=AESGCM(128) Mac=AEAD
ECDHE-RSA-AES256-GCM-SHA384 TLSv1.2 Kx=ECDH Au=RSA Enc=AESGCM(256) Mac=AEAD
ECDHE-RSA-CHACHA20-POLY1305 TLSv1.2 Kx=ECDH Au=RSA Enc=CHACHA20/POLY1305(256) Mac=AEAD
ECDHE-RSA-AES128-GCM-SHA256 TLSv1.2 Kx=ECDH Au=RSA Enc=AESGCM(128) Mac=AEAD
ECDHE-ECDSA-AES256-SHA384 TLSv1.2 Kx=ECDH Au=ECDSA Enc=AES(256) Mac=SHA384
ECDHE-ECDSA-CAMELLIA256-SHA384 TLSv1.2 Kx=ECDH Au=ECDSA Enc=Camellia(256) Mac=SHA384
ECDHE-RSA-AES256-SHA384 TLSv1.2 Kx=ECDH Au=RSA Enc=AES(256) Mac=SHA384
ECDHE-RSA-CAMELLIA256-SHA384 TLSv1.2 Kx=ECDH Au=RSA Enc=Camellia(256) Mac=SHA384
ECDHE-ECDSA-AES128-SHA256 TLSv1.2 Kx=ECDH Au=ECDSA Enc=AES(128) Mac=SHA256
ECDHE-ECDSA-CAMELLIA128-SHA256 TLSv1.2 Kx=ECDH Au=ECDSA Enc=Camellia(128) Mac=SHA256
ECDHE-RSA-AES128-SHA256 TLSv1.2 Kx=ECDH Au=RSA Enc=AES(128) Mac=SHA256
ECDHE-RSA-CAMELLIA128-SHA256 TLSv1.2 Kx=ECDH Au=RSA Enc=Camellia(128) Mac=SHA256
DHE-RSA-AES256-GCM-SHA384 TLSv1.2 Kx=DH Au=RSA Enc=AESGCM(256) Mac=AEAD
DHE-RSA-CHACHA20-POLY1305 TLSv1.2 Kx=DH Au=RSA Enc=CHACHA20/POLY1305(256) Mac=AEAD
DHE-RSA-AES128-GCM-SHA256 TLSv1.2 Kx=DH Au=RSA Enc=AESGCM(128) Mac=AEAD
DHE-RSA-AES256-SHA256 TLSv1.2 Kx=DH Au=RSA Enc=AES(256) Mac=SHA256
DHE-RSA-CAMELLIA256-SHA256 TLSv1.2 Kx=DH Au=RSA Enc=Camellia(256) Mac=SHA256
DHE-RSA-AES128-SHA256 TLSv1.2 Kx=DH Au=RSA Enc=AES(128) Mac=SHA256
DHE-RSA-CAMELLIA128-SHA256 TLSv1.2 Kx=DH Au=RSA Enc=Camellia(128) Mac=SHA256
ECDHE-ECDSA-AES256-SHA TLSv1 Kx=ECDH Au=ECDSA Enc=AES(256) Mac=SHA1
ECDHE-ECDSA-AES128-SHA TLSv1 Kx=ECDH Au=ECDSA Enc=AES(128) Mac=SHA1
ECDHE-RSA-AES256-SHA TLSv1 Kx=ECDH Au=RSA Enc=AES(256) Mac=SHA1
ECDHE-RSA-AES128-SHA TLSv1 Kx=ECDH Au=RSA Enc=AES(128) Mac=SHA1
DHE-RSA-AES256-SHA SSLv3 Kx=DH Au=RSA Enc=AES(256) Mac=SHA1
DHE-RSA-CAMELLIA256-SHA SSLv3 Kx=DH Au=RSA Enc=Camellia(256) Mac=SHA1
DHE-RSA-AES128-SHA SSLv3 Kx=DH Au=RSA Enc=AES(128) Mac=SHA1
DHE-RSA-CAMELLIA128-SHA SSLv3 Kx=DH Au=RSA Enc=Camellia(128) Mac=SHA1
AES256-GCM-SHA384 TLSv1.2 Kx=RSA Au=RSA Enc=AESGCM(256) Mac=AEAD
AES128-GCM-SHA256 TLSv1.2 Kx=RSA Au=RSA Enc=AESGCM(128) Mac=AEAD
AES256-SHA256 TLSv1.2 Kx=RSA Au=RSA Enc=AES(256) Mac=SHA256
CAMELLIA256-SHA256 TLSv1.2 Kx=RSA Au=RSA Enc=Camellia(256) Mac=SHA256
AES128-SHA256 TLSv1.2 Kx=RSA Au=RSA Enc=AES(128) Mac=SHA256
CAMELLIA128-SHA256 TLSv1.2 Kx=RSA Au=RSA Enc=Camellia(128) Mac=SHA256
AES256-SHA SSLv3 Kx=RSA Au=RSA Enc=AES(256) Mac=SHA1
CAMELLIA256-SHA SSLv3 Kx=RSA Au=RSA Enc=Camellia(256) Mac=SHA1
AES128-SHA SSLv3 Kx=RSA Au=RSA Enc=AES(128) Mac=SHA1
CAMELLIA128-SHA SSLv3 Kx=RSA Au=RSA Enc=Camellia(128) Mac=SHA1
Signed-off-by: Peter Müller <peter.mueller@ipfire.org >
Acked-by: Michael Tremer <michael.tremer@ipfire.org >
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2019-11-13 19:01:19 +00:00
Erik Kapfer
bc456dd750
lz4: Update to version 1.9.2
...
Several fixes and improvements has been integrated. The changes list through the different versions since
the current version 1.8.1.2 can be found in here --> https://github.com/lz4/lz4/releases
Signed-off-by: Erik Kapfer <ummeegge@ipfire.org >
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org >
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2019-11-13 18:43:04 +00:00
Michael Tremer
951a9f9ba0
linux+iptables: Drop support for IMQ
...
This is no longer needed since we are using IFB now
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
Signed-off-by: Daniel Weismüller <daniel.weismueller@ipfire.org >
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2019-10-21 18:58:08 +00:00
Arne Fitzenreiter
c27fdd8697
Revert "linux+iptables: Drop support for IMQ"
...
This reverts commit 59b9a6bd22 .
2019-10-20 20:20:26 +00:00
Arne Fitzenreiter
ea16154f5c
Revert "bash: add patches 001 - 011 for 5.0 version"
...
This reverts commit 2c0ee2b962 .
2019-10-15 07:36:47 +00:00
Arne Fitzenreiter
918a57cfeb
Revert "readline: add patch 001 for version 8.0"
...
This reverts commit c5f0c44451 .
2019-10-15 07:36:00 +00:00
Arne Fitzenreiter
d19c82678b
Revert "bash/readline: drop orphaned patches"
...
This reverts commit 95f1c332d8 .
2019-10-15 07:35:22 +00:00
Michael Tremer
59b9a6bd22
linux+iptables: Drop support for IMQ
...
This is no longer needed since we are using IFB now
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2019-10-14 18:02:55 +00:00
peter.mueller@ipfire.org
95f1c332d8
bash/readline: drop orphaned patches
...
Signed-off-by: Peter Müller <peter.mueller@ipfire.org >
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2019-10-14 17:12:46 +00:00
peter.mueller@ipfire.org
c5f0c44451
readline: add patch 001 for version 8.0
...
Signed-off-by: Peter Müller <peter.mueller@ipfire.org >
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2019-10-14 17:12:38 +00:00
peter.mueller@ipfire.org
2c0ee2b962
bash: add patches 001 - 011 for 5.0 version
...
Signed-off-by: Peter Müller <peter.mueller@ipfire.org >
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2019-10-14 17:12:09 +00:00
Matthias Fischer
2fc8d41915
hostapd: Update to 2.9
...
For details see:
https://w1.fi/cgit/hostap/plain/hostapd/ChangeLog
Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org >
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org >
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2019-10-08 18:09:10 +00:00
Stefan Schantl
415969cc1b
kernel: Backport patch to fix a netfilter contrack related issue.
...
This fixes the packet drop issue when using suricata on IPFire.
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org >
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2019-09-21 09:53:56 +00:00
Arne Fitzenreiter
fd24c5dcbd
Merge remote-tracking branch 'arne_f/perl-5.30' into next
2019-08-20 17:43:53 +00:00
Arne Fitzenreiter
c6277d3b10
perl: remove unused patches
...
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2019-08-16 21:33:52 +02:00
Michael Tremer
6580bdeb6b
freeradius: Build package without generating certificates
...
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
2019-08-10 03:12:04 +01:00
Arne Fitzenreiter
6836e528e5
u-boot-friendlyarm: add u-boot for nanopi-r1 to boot from eMMC
...
this is a heavy patched version and should replaced when stock
u-boot is able to boot from h3 eMMC.
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2019-08-06 04:32:22 +00:00
Arne Fitzenreiter
de8810fbaa
iperf3: update to 3.7
...
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2019-07-17 13:15:33 +02:00
Peter Müller
69772b7dda
OpenSSL: lower priority for CBC ciphers in default cipherlist
...
In order to avoid CBC ciphers as often as possible (they contain
some known vulnerabilities), this changes the OpenSSL default
ciphersuite to:
TLS_CHACHA20_POLY1305_SHA256 TLSv1.3 Kx=any Au=any Enc=CHACHA20/POLY1305(256) Mac=AEAD
TLS_AES_256_GCM_SHA384 TLSv1.3 Kx=any Au=any Enc=AESGCM(256) Mac=AEAD
TLS_AES_128_GCM_SHA256 TLSv1.3 Kx=any Au=any Enc=AESGCM(128) Mac=AEAD
ECDHE-ECDSA-CHACHA20-POLY1305 TLSv1.2 Kx=ECDH Au=ECDSA Enc=CHACHA20/POLY1305(256) Mac=AEAD
ECDHE-ECDSA-AES256-GCM-SHA384 TLSv1.2 Kx=ECDH Au=ECDSA Enc=AESGCM(256) Mac=AEAD
ECDHE-ECDSA-AES128-GCM-SHA256 TLSv1.2 Kx=ECDH Au=ECDSA Enc=AESGCM(128) Mac=AEAD
ECDHE-RSA-CHACHA20-POLY1305 TLSv1.2 Kx=ECDH Au=RSA Enc=CHACHA20/POLY1305(256) Mac=AEAD
ECDHE-RSA-AES256-GCM-SHA384 TLSv1.2 Kx=ECDH Au=RSA Enc=AESGCM(256) Mac=AEAD
ECDHE-RSA-AES128-GCM-SHA256 TLSv1.2 Kx=ECDH Au=RSA Enc=AESGCM(128) Mac=AEAD
ECDHE-ECDSA-AES256-SHA384 TLSv1.2 Kx=ECDH Au=ECDSA Enc=AES(256) Mac=SHA384
ECDHE-ECDSA-CAMELLIA256-SHA384 TLSv1.2 Kx=ECDH Au=ECDSA Enc=Camellia(256) Mac=SHA384
ECDHE-RSA-AES256-SHA384 TLSv1.2 Kx=ECDH Au=RSA Enc=AES(256) Mac=SHA384
ECDHE-RSA-CAMELLIA256-SHA384 TLSv1.2 Kx=ECDH Au=RSA Enc=Camellia(256) Mac=SHA384
ECDHE-ECDSA-AES128-SHA256 TLSv1.2 Kx=ECDH Au=ECDSA Enc=AES(128) Mac=SHA256
ECDHE-ECDSA-CAMELLIA128-SHA256 TLSv1.2 Kx=ECDH Au=ECDSA Enc=Camellia(128) Mac=SHA256
ECDHE-RSA-AES128-SHA256 TLSv1.2 Kx=ECDH Au=RSA Enc=AES(128) Mac=SHA256
ECDHE-RSA-CAMELLIA128-SHA256 TLSv1.2 Kx=ECDH Au=RSA Enc=Camellia(128) Mac=SHA256
DHE-RSA-CHACHA20-POLY1305 TLSv1.2 Kx=DH Au=RSA Enc=CHACHA20/POLY1305(256) Mac=AEAD
DHE-RSA-AES256-GCM-SHA384 TLSv1.2 Kx=DH Au=RSA Enc=AESGCM(256) Mac=AEAD
DHE-RSA-AES128-GCM-SHA256 TLSv1.2 Kx=DH Au=RSA Enc=AESGCM(128) Mac=AEAD
DHE-RSA-AES256-SHA256 TLSv1.2 Kx=DH Au=RSA Enc=AES(256) Mac=SHA256
DHE-RSA-CAMELLIA256-SHA256 TLSv1.2 Kx=DH Au=RSA Enc=Camellia(256) Mac=SHA256
DHE-RSA-AES128-SHA256 TLSv1.2 Kx=DH Au=RSA Enc=AES(128) Mac=SHA256
DHE-RSA-CAMELLIA128-SHA256 TLSv1.2 Kx=DH Au=RSA Enc=Camellia(128) Mac=SHA256
ECDHE-ECDSA-AES256-SHA TLSv1 Kx=ECDH Au=ECDSA Enc=AES(256) Mac=SHA1
ECDHE-ECDSA-AES128-SHA TLSv1 Kx=ECDH Au=ECDSA Enc=AES(128) Mac=SHA1
ECDHE-RSA-AES256-SHA TLSv1 Kx=ECDH Au=RSA Enc=AES(256) Mac=SHA1
ECDHE-RSA-AES128-SHA TLSv1 Kx=ECDH Au=RSA Enc=AES(128) Mac=SHA1
DHE-RSA-AES256-SHA SSLv3 Kx=DH Au=RSA Enc=AES(256) Mac=SHA1
DHE-RSA-CAMELLIA256-SHA SSLv3 Kx=DH Au=RSA Enc=Camellia(256) Mac=SHA1
DHE-RSA-AES128-SHA SSLv3 Kx=DH Au=RSA Enc=AES(128) Mac=SHA1
DHE-RSA-CAMELLIA128-SHA SSLv3 Kx=DH Au=RSA Enc=Camellia(128) Mac=SHA1
AES256-GCM-SHA384 TLSv1.2 Kx=RSA Au=RSA Enc=AESGCM(256) Mac=AEAD
AES128-GCM-SHA256 TLSv1.2 Kx=RSA Au=RSA Enc=AESGCM(128) Mac=AEAD
AES256-SHA256 TLSv1.2 Kx=RSA Au=RSA Enc=AES(256) Mac=SHA256
CAMELLIA256-SHA256 TLSv1.2 Kx=RSA Au=RSA Enc=Camellia(256) Mac=SHA256
AES128-SHA256 TLSv1.2 Kx=RSA Au=RSA Enc=AES(128) Mac=SHA256
CAMELLIA128-SHA256 TLSv1.2 Kx=RSA Au=RSA Enc=Camellia(128) Mac=SHA256
AES256-SHA SSLv3 Kx=RSA Au=RSA Enc=AES(256) Mac=SHA1
CAMELLIA256-SHA SSLv3 Kx=RSA Au=RSA Enc=Camellia(256) Mac=SHA1
AES128-SHA SSLv3 Kx=RSA Au=RSA Enc=AES(128) Mac=SHA1
CAMELLIA128-SHA SSLv3 Kx=RSA Au=RSA Enc=Camellia(128) Mac=SHA1
Since TLS servers usually override the clients' preference with their
own, this will neither break existing setups nor introduce huge
differences in the wild. Unfortunately, CBC ciphers cannot be disabled
at all, as they are still used by popular web sites.
TLS 1.3 ciphers will be added implicitly and can be omitted in the
ciphersting. Chacha20/Poly1305 is preferred over AES-GCM due to missing
AES-NI support for the majority of installations reporting to Fireinfo
(see https://fireinfo.ipfire.org/processors for details, AES-NI support
is 28.22% at the time of writing).
Signed-off-by: Peter Müller <peter.mueller@ipfire.org >
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
2019-06-12 17:24:00 +01:00
Matthias Fischer
3f7cec61c9
hostapd: Update to 2.8
...
For details see:
https://w1.fi/cgit/hostap/plain/hostapd/ChangeLog
Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org >
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
2019-06-10 09:45:54 +01:00
Michael Tremer
29fc1c8c3a
ddns: Update to 011
...
Add support for two new providers and has some general bug fixes
included.
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
2019-05-27 16:25:01 +01:00