Commit Graph

20298 Commits

Author SHA1 Message Date
Peter Müller
d3a520fa68 Revert "e2fsprogs: Update to version 1.47.0"
This reverts commit 1f3f267021.

Symlink will remain in place to ensure the reverted version is always
shipped to our users, including those that have installed Core Update
174 (testing).

Fixes: #13073
Reported-by: Arne Fitzenreiter <arne.fitzenreiter@ipfire.org>
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-04-04 20:04:11 +00:00
Peter Müller
7970d39372 Core Update 174: Ship ipblocklist-related changes
https://wiki.ipfire.org/devel/telco/2023-04-03

Cc: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-04-04 20:02:58 +00:00
Stefan Schantl
41d3d33dde update-ipblocklists: Fix loading new blocklists after update
* The script needs to run with root permissions in order to
  do the ipset operations. So remove code to drop the permissions
  on startup.

* Adjust execute calls to use the proper functions from
  general functions.

* Add some code to set the correct ownership (nobody:nobody) for
  changed files during script runtime.

Fixes #13072.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
2023-04-04 19:59:23 +00:00
Adolf Belka
a84b9ed2fe header.pl: Add reference to colors.txt into header.pl
- With change of common css entries into header.pl with commit
   https://git.ipfire.org/?p=ipfire-2.x.git;a=commit;h=b52a84ddc77f9db7e4ad7b129f21fbf528c6f990
   I had missed that color20 and color22 etc, that come from colors.txt, are not known in
   header.pl so that the alternate colours in tables were missing. Even though I tested the
   previous commit I obviously did not look well enough because I missed that the tables
   had no alternate colours. I just found it now when looking at Core Update 174 Testing.
- Confirmed by copying this version of header.pl into my CU174 Testing system and the
   alternate colour rows came back again as they should be. I am sure now that they are
   correct.

Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Bernhard Bitsch <bbitsch@ipfire.org>
Tested-by: Bernhard Bitsch <bbitsch@ipfire.org>
2023-04-02 17:10:04 +00:00
Leo-Andres Hofmann
11f4726b0d graphs.pl: Make canvas fixed size and limit cpufreq color index
This fixes an issue where systems with many CPU cores
run out of usable graph colors and canvas area.
It also unifies the canvas size for all graphs.

Discussion: https://community.ipfire.org/t/cpu-freq-graph-not-working-with-i5-1235u/9396

Fixes: #12890

Signed-off-by: Leo-Andres Hofmann <hofmann@leo-andres.de>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2023-03-13 21:39:20 +00:00
Peter Müller
4ecaedf980 Core Update 174: Ship graphs.pl and getrrdimage.cgi
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-03-13 21:38:50 +00:00
Leo-Andres Hofmann
138b26e014 Drop support for entropy graph
Entropy data isn't collected anymore. See 8000bc0 for reference.

Signed-off-by: Leo-Andres Hofmann <hofmann@leo-andres.de>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2023-03-13 21:37:39 +00:00
Peter Müller
8370c82a58 haproxy: Update to 2.7.4
https://www.mail-archive.com/haproxy@formilux.org/msg43229.html

Reported-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-03-13 21:36:01 +00:00
Peter Müller
36aac41d61 Core Update 174: Ship wireless-regdb
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-03-12 20:46:51 +00:00
Peter Müller
a127e615ac wireless-regdb: Update to 2023-02-13
Please refer to
https://git.kernel.org/pub/scm/linux/kernel/git/sforshee/wireless-regdb.git/log/
for the list of commits since August 2022.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-03-12 20:46:03 +00:00
Adolf Belka
d8574ce738 Language files: Fixes bug#12701 - Line removed from proxy.cgi no longer needed in lang files
- v2 version that has only the removed line in the language files diffs
- Line removed from de, en, es & fr
- No translations had been done for the other languages for that line.

Fixes: Bug#12701
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2023-03-12 20:41:51 +00:00
Matthias Fischer
ab5b17a98e rules.pl: Proposed patch - Fix for missing bracket
Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Bernhard Bitsch <bbitsch@ipfire.org>
2023-03-12 20:38:37 +00:00
Peter Müller
cb51fdda19 Run ./make.sh lang
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-03-11 17:06:41 +00:00
Peter Müller
8014198eb6 Run ./make.sh update-contributors
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-03-11 17:06:16 +00:00
Peter Müller
35abb51eb7 linux-firmware: Do not ship the qca/ directory
It only contains firmware files for some Qualcomm Bluetooth devices, for
which there is no use on IPFire, since we disabled Bluetooth support in
the kernel a long time ago due to security reasons.

To save some space (~ 1.9 MByte), do not ship these files, and delete
them on existing IPFire installations as well.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-03-11 17:04:18 +00:00
Peter Müller
c590c915a4 Core Update 174: Ship relevant changes of linux-firmware
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-03-11 17:01:14 +00:00
Adolf Belka
3562922c43 linux-firmware: Update to version 20230210
- Update from version 20221214 to 20230210
- Update of rootfile
- Changelog
   For changes see the commits in the git repo
   https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/log/

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-03-11 16:40:08 +00:00
Peter Müller
f0d693186f Core Update 174: Ship proxy.cgi
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-03-11 16:36:08 +00:00
Adolf Belka
71604352ca procy.cgi: Fix bug#12701 - remove advproxy wpad notice line
- This line is no longer needed with the help button at the top of each WUI page that was
   implemented by @Leo
- Sorry for long time for me to get around to finalising this patch but it is done now.

Fixes: bug#12701
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-03-11 16:31:57 +00:00
Adolf Belka
14051bfeb5 updatexlrator.cgi: Update to naming of variables in css section
- This updates the updatexlrator.cgi page to the same central use of extraHead from
   header.pl and simplifying of css variables where appropriate.
- The variables for the percentage bar will also be able to be used in other cgi pages
   with a percent bar.

Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-03-11 16:30:39 +00:00
Adolf Belka
d3aec71828 dhcp.cgi: Update to naming of variables in css section
- After looking at other .cgi files I realised that I had named the variables based on
   their dhcp usage only. However colouryellow or color20 etc can be used not only in a
   row but also in a cell or a column. Rather than ending up with multiple copies of the
   same colour for rows, cells, columns etc I have simplified the variable names to just
   the colour. They can then be used in whatever situation is wanted. The rest of the cgi
   code will give the view of what structure the colour is being applied to.
- This will limit the number of different css variables defined in the header.pl file

Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-03-11 16:30:39 +00:00
Peter Müller
83f31dcef2 Core Update 174: Ship traffic.cgi
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-03-11 16:30:05 +00:00
Stefan Schantl
44ea49fa75 traffic.cgi: Do not use hard-coded red interface name
If QMI is used the dial in mode has to be set as ppp dialin but the
interface name is red. In such a case the old code tried to display
the stats for the ppp0 interface which is wrong.

This patch fixes this issue by calling the handy function to get
the correct interface name for red.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
2023-03-11 16:29:43 +00:00
Peter Müller
9eef0e16c1 Core Update 174: Ship rules.pl and ipblocklist.cgi
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-03-11 16:28:20 +00:00
Stefan Schantl
0450dce6f6 ipblocklist.cgi: Fix settings checkbox handling
Checkboxes does not submit any values if they are not checked.
Default them to "off" in such a case.

This fixes the issue not beeing able to disable the logging.

Fixes #12979.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Reviewed-by: Adolf Belka <adolf.belka@ipfire.org>
2023-03-11 16:27:32 +00:00
Stefan Schantl
1b70ead36d firewall: Silence warnings if blocklist logging is not set.
Reference: #12979.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
2023-03-11 16:27:31 +00:00
Peter Müller
b80932932a Core Update 174: Ship ids-functions.pl
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-03-11 16:26:46 +00:00
Stefan Schantl
c35974f87d ids-functions.pl: Extract rules files if they are in a providers rules folder.
Now the rules files in a subfolder like "<provider>-rules" also will get
extracted.

Fixes rule file extraction for Snort Community ruleset.

Fixes #12948.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Reviewed-by: Adolf Belka <adolf.belka@ipfire.org>
2023-03-11 16:26:15 +00:00
Peter Müller
a71ef763b0 Core Update 174: Ship grep
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-03-11 16:25:37 +00:00
Adolf Belka
078ec1ecc0 grep: Update to version 3.9
- Update from version 3.8 to 3.9
- Update of rootfile not required
- Changelog
 Noteworthy changes in release 3.9 (2023-03-05) [stable]
 Bug fixes
  With -P, some non-ASCII UTF8 characters were not recognized as
  word-constituent due to our omission of the PCRE2_UCP flag. E.g.,
  given f(){ echo Perú|LC_ALL=en_US.UTF-8 grep -Po "$1"; } and
  this command, echo $(f 'r\w'):$(f '.\b'), before it would print ":r".
  After the fix, it prints the correct results: "rú:ú".
  When given multiple patterns the last of which has a back-reference,
  grep no longer sometimes mistakenly matches lines in some cases.
  [Bug#36148#13 introduced in grep 3.4]

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2023-03-11 16:25:29 +00:00
Adolf Belka
f21d3a5ad3 python3-setuptools: Update to version 67.5.1
- Update from version 65.4.1 to 67.5.1
- Update of rootfile
- Changelog
v67.5.1
Misc
* #3836: Fixed interaction between ``setuptools``' package auto-discovery and
  auto-generated ``htmlcov`` files.
  Previously, the ``htmlcov`` name was ignored when searching for single-file
  modules, however the correct behaviour is to ignore it when searching for
  packages (since it is supposed to be a directory, see `coverage config`_)
  -- by :user:`yukihiko-shinoda`.
  .. _coverage config: https://coverage.readthedocs.io/en/stable/config.html#html-directory
* #3838: Improved error messages for ``pyproject.toml`` validations.
* #3839: Fixed ``pkg_resources`` errors caused when parsing metadata of packages that
  are already installed but do not conform with PEP 440.
v67.5.0
Changes
* #3843: Although pkg_resources has been discouraged for use, some projects still
         consider pkg_resources viable for usage. This change makes it clear that
         pkg_resources should not be used, emitting a DeprecationWarning when imported.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2023-03-11 16:24:29 +00:00
Adolf Belka
2e7b68c693 sudo: Update to version 1.9.13p3
- Update from version 1.9.13p2 to 1.9.13p3
- Update of rootfile not required
- Changelog
What's new in Sudo 1.9.13p3
 * Fixed a bug introduced in sudo 1.9.13 that caused a syntax error
   when "list" was used as a user or host name.  GitHub issue #246.
 * Fixed a bug that could cause sudo to hang when running a command
   in a pseudo-terminal when there is still input buffered after a
   command has exited.
 * Fixed "sudo -U otheruser -l command".  This is a regression in
   sudo 1.9.13.  GitHub issue #248.
 * Fixed "sudo -l command args" when matching a command in sudoers
   with command line arguments.  This is a regression in sudo 1.9.13.
   GitHub issue #249.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2023-03-11 16:23:43 +00:00
Peter Müller
b5967dc1aa Core Update 174: Ship qpdf
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-03-11 16:22:10 +00:00
Adolf Belka
a9bca0f0d8 cups-filters: -std=c++17 required due to problem introduced with qpdf-11.3.0
- Add -std=c++17 flag to configure
- Disable static libs
- Update of rootfile

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-03-11 16:21:42 +00:00
Adolf Belka
6828b9bcd6 qpdf: Update to version 11.3.0
- Update from version 10.4.0 to 11.3.0
- Update of rootfile
- Build changed to cmake from version 11.0 onwards
- find-dependencies run due to lib so bump. Only qpdf and cups-filters are linked to
   the changed libs. cups-filters being shipped due to a change required because of
   qpdf-11.3.0
- Changelog is too large to include here. Details can be found in the ChangeLog file in
   the source tarball.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-03-11 16:21:42 +00:00
Peter Müller
aaca122e62 Core Update 174: Ship poppler and poppler-data
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-03-11 16:20:59 +00:00
Adolf Belka
d6cb0d4330 poppler-data: Update to version 0.4.12
- Update from version 0.4.11 to 0.4.12
- Update of rootfile not required
- No Changelog available but the latest version of poppler-data is required by poppler

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-03-11 16:20:29 +00:00
Adolf Belka
cb9ead7f91 poppler: Update to version 23.03.0
- Update from version 23.01.0 to 23.03.0
- Update of rootfile not required
- Changelog
Release 23.03.0:
        core:
         * PngWriter: Fix potential uninitialized memory use
Release 23.02.0:
        core:
         * CairoOutputDev: Fix rendering of color type 3 fonts
         * CairoOutputDev: Add handling matte entry
         * Fix segfault on wrong nssdir
         * Fix "NSS could not shutdown"
        utils:
         * pdfsig: Point out supports PKCS#11 URIs as nickname

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-03-11 16:20:29 +00:00
Adolf Belka
282e3fe4fb log.dat: Fixes Bug#12922 - adjusts regex to catch hostname for hostname or FQDN
- Most of the packages being searched for in the system logs section only put hostname into
   the logs. However HAProxy puts the FQDN. Reviewing RFC 5424 shows that this is following
   the requirements. The preferred order fromn the RFC is
   1.  FQDN
   2.  Static IP address
   3.  hostname
   4.  Dynamic IP address
   5.  the NILVALUE
- Most of the programs are using option 3 but option 1 is valid for HAProxy
- The regex change filters out the hostname from the FQDN if an extra 'dot' is present

Fixes: Bug#12922
Suggested-by: Michael <ip.fire@die-fritzens.de>
Tested-by: Michael <ip.fire@die-fritzens.de>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-03-11 16:19:41 +00:00
Adolf Belka
452fd239f0 log.dat: Fix bug#12922 - add HAProxy to System Log drop down list
Fixes: Bug#12922
Suggested-by: Michael <ip.fire@die-fritzens.de>
Tested-by: Michael <ip.fire@die-fritzens.de>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-03-11 16:19:40 +00:00
Adolf Belka
b8e360bab7 cups: Update to version 2.4.2
- Update from 2.4.1 to 2.4.2
- Update of rootfile not required
- Changelog
Changes in CUPS v2.4.2 (26th May 2022)
- Fixed certificate strings comparison for Local authorization (CVE-2022-26691)
- The `cupsFileOpen` function no longer opens files for append in read-write
  mode (Issue #291)
- The cupsd daemon removed processing temporary queue (Issue #364)
- Fixed delay in IPP backend if GNUTLS is used and endpoint doesn't confirm
  closing the connection (Issue #365)
- Fixed conditional jump based on uninitialized value in cups/ppd.c (Issue #329)
- Fixed CSS related issues in CUPS Web UI (Issue #344)
- Fixed copyright in CUPS Web UI trailer template (Issue #346)
- mDNS hostname in device uri is not resolved when installaling a permanent
  IPP Everywhere queue (Issues #340, #343)
- The `lpstat` command now reports when the scheduler is not running
  (Issue #352)
- Updated the man pages concerning the `-h` option (Issue #357)
- Re-added LibreSSL/OpenSSL support (Issue #362)
- Updated the Solaris smf service file (Issue #368)
- Fixed a regression in lpoptions option support (Issue #370)
- The scheduler now regenerates the PPD cache information after changing the
  "cupsd.conf" file (Issue #371)
- Updated the scheduler to set "auth-info-required" to "username,password" if a
  backend reports it needs authentication info but doesn't set a method for
  authentication (Issue #373)
- Updated the configure script to look for the OpenSSL library the old way if
  pkg-config is not available (Issue #375)
- Fixed the prototype for the `httpWriteResponse` function (Issue #380)
- Brought back minimal AIX support (Issue #389)
- `cupsGetResponse` did not always set the last error.
- Fixed a number of old references to the Apple CUPS web page.
- Restored the default/generic printer icon file for the web interface.
- Removed old stylesheet classes that are no longer used by the web
  interface.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2023-03-11 16:18:57 +00:00
Peter Müller
fd5a24daec Core Update 174: Ship and restart Apache
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-03-11 16:17:48 +00:00
Matthias Fischer
ee1d6a7c3a apache: Update to 2.4.56
For details see:
https://dlcdn.apache.org/httpd/CHANGES_2.4.56

"Changes with Apache 2.4.56

  *) SECURITY: CVE-2023-27522: Apache HTTP Server: mod_proxy_uwsgi
     HTTP response splitting (cve.mitre.org)
     HTTP Response Smuggling vulnerability in Apache HTTP Server via
     mod_proxy_uwsgi. This issue affects Apache HTTP Server: from
     2.4.30 through 2.4.55.
     Special characters in the origin response header can
     truncate/split the response forwarded to the client.
     Credits: Dimas Fariski Setyawan Putra (nyxsorcerer)

  *) SECURITY: CVE-2023-25690: HTTP request splitting with
     mod_rewrite and mod_proxy (cve.mitre.org)
     Some mod_proxy configurations on Apache HTTP Server versions
     2.4.0 through 2.4.55 allow a HTTP Request Smuggling attack.
     Configurations are affected when mod_proxy is enabled along with
     some form of RewriteRule
     or ProxyPassMatch in which a non-specific pattern matches
     some portion of the user-supplied request-target (URL) data and
     is then
     re-inserted into the proxied request-target using variable
     substitution. For example, something like:
     RewriteEngine on
     RewriteRule "^/here/(.*)" "
     http://example.com:8080/elsewhere?$1"
     http://example.com:8080/elsewhere ; [P]
     ProxyPassReverse /here/  http://example.com:8080/
     http://example.com:8080/
     Request splitting/smuggling could result in bypass of access
     controls in the proxy server, proxying unintended URLs to
     existing origin servers, and cache poisoning.
     Credits: Lars Krapf of Adobe

  *) rotatelogs: Add -T flag to allow subsequent rotated logfiles to be
     truncated without the initial logfile being truncated.  [Eric Covener]

  *) mod_ldap: LDAPConnectionPoolTTL should accept negative values in order to
     allow connections of any age to be reused. Up to now, a negative value
     was handled as an error when parsing the configuration file.  PR 66421.
     [nailyk <bzapache nailyk.fr>, Christophe Jaillet]

  *) mod_proxy_ajp: Report an error if the AJP backend sends an invalid number
     of headers. [Ruediger Pluem]

  *) mod_md:
     - Enabling ED25519 support and certificate transparency information when
       building with libressl v3.5.0 and newer. Thanks to Giovanni Bechis.
     - MDChallengeDns01 can now be configured for individual domains.
       Thanks to Jérôme Billiras (@bilhackmac) for the initial PR.
     - Fixed a bug found by Jérôme Billiras (@bilhackmac) that caused the challenge
       teardown not being invoked as it should.
     [Stefan Eissing]

  *) mod_http2: client resets of HTTP/2 streams led to unwanted 500 errors
     reported in access logs and error documents. The processing of the
     reset was correct, only unneccesary reporting was caused.
     [Stefan Eissing]

  *) mod_proxy_uwsgi: Stricter backend HTTP response parsing/validation.
     [Yann Ylavic]"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2023-03-11 16:16:56 +00:00
Peter Müller
4face6d99f Core Update 174: Ship ca-certificates
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-03-11 16:16:25 +00:00
Peter Müller
53c4a960ce ca-certificates: Rebase patch for removing TrustCor root CAs
This is necessary since the certdata2pem.py script does not take
meta information such as "distrust after date" into account, hence
Mozilla's changes to TrustCor's root CAs are not sufficient to have them
removed from or distrusted on IPFire installations.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-03-11 16:16:10 +00:00
Peter Müller
38d6ab69c9 ca-certificates: Update root CA certificates bundle
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-03-11 16:16:10 +00:00
Peter Müller
7ad27c5090 Core Update 174: Ship and restart strongSwan
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-03-06 16:43:47 +00:00
Adolf Belka
ee80a12db0 strongswan: Update to version 5.9.10
- Update from version 5.9.9 to 5.9.10
- Update of rootfile not required
- Changelog
strongswan-5.9.10
- Fixed a vulnerability related to certificate verification in TLS-based EAP
  methods that leads to an authentication bypass followed by an expired pointer
  dereference that results in a denial of service and possibly even remote code
  execution.
  This vulnerability has been registered as CVE-2023-26463.
- Added support for full packet hardware offload for IPsec SAs and policies with
  Linux 6.2 kernels to the kernel-netlink plugin.
- TLS-based EAP methods now use the standardized key derivation when used
  with TLS 1.3.
- The eap-tls plugin properly supports TLS 1.3 according to RFC 9190, by
  implementing the "protected success indication".
- With the `prefer` value for the `childless` setting, initiators will create
  a childless IKE_SA if the responder supports the extension.
- Routes via XFRM interfaces can optionally be installed automatically by
  enabling the `install_routes_xfrmi` option of the kernel-netlink plugin.
- charon-nm now uses XFRM interfaces instead of dummy TUN devices to avoid
  issues with name resolution if they are supported by the kernel.
- The `pki --req` command can encode extendedKeyUsage (EKU) flags in the
  PKCS#10 certificate signing request.
- The `pki --issue` command adopts EKU flags from CSRs but allows modifying them
  (replace them completely, or adding/removing specific flags).
- On Linux 6.2 kernels, the last use times of CHILD_SAs are determined via the
  IPsec SAs instead of the policies.
- For libcurl with MultiSSL support, the curl plugin provides an option to
  select the SSL/TLS backend.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2023-03-06 16:42:58 +00:00
Peter Müller
cf66a3f133 Revert "grub: Fix for riscv64 rootfile"
This reverts commit 6d3e6cfc16.

Arne informed me via the phone that this patch has to be reverted, since
his changes for riscv64 already made it redundant. Keeping it would
cause rootfile quirks to the riscv64 builds.

Reported-by: Arne Fitzenreiter <arne.fitzenreiter@ipfire.org>
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-03-05 15:56:28 +00:00
Peter Müller
6173f6ba14 Core Update 174: Ship zstd
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-03-05 15:17:03 +00:00