Commit Graph

19664 Commits

Author SHA1 Message Date
Peter Müller
9826ac9bc2 modules.d: Drop orphaned blacklist statements
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-10-03 10:21:24 +00:00
Peter Müller
c480cb54f0 Update contributor list
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-10-03 10:07:49 +00:00
Peter Müller
eee65ac34f backup: Fix file permissions of in-/exclude files, again
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-10-03 09:22:57 +00:00
Peter Müller
c153f73552 Core Update 171: Do not ship /sbin/tipc
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-10-02 10:20:38 +00:00
Peter Müller
415afe55b2 Core Update 171: Fix Suricata stop/start
My fault, again. :-/

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-10-02 09:46:47 +00:00
Peter Müller
c309bdcf3d Avoid manpages from being shipped and delete them on existing installations
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-10-02 09:43:47 +00:00
Peter Müller
18f9c27601 Core Update 171: Ship proxy.cgi
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-10-02 08:51:03 +00:00
Matthias Fischer
e0be9eab47 proxy.cgi: Fix for Bug #12826 'squid >=5 crashes on literal IPv6 addresses'
Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Bernhard Bitsch <bbitsch@ipfire.org>
2022-10-02 08:50:39 +00:00
Peter Müller
1c8e23c869 backup: Increase chown verbosiness
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-10-02 08:49:53 +00:00
Peter Müller
2a06a00571 langs: Fix missing spaces for proxy password length error message
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-30 22:09:31 +00:00
Peter Müller
5a44d68fc7 ncat: Update to 7.92
This was forgotten when updating nmap to 7.92.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-30 21:18:38 +00:00
Peter Müller
6e8e9cba2a linux: Update to 5.15.71
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-30 17:20:37 +00:00
Peter Müller
2689789ec0 configroot: Increase verbosiness of chown operations
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-30 17:20:17 +00:00
Peter Müller
2f0fb44929 Core Update 171: Ship and restart Suricata
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-30 15:48:03 +00:00
Matthias Fischer
12697266f4 libhtp: Update to 0.5.41
Needed for 'suricata 6.0.8'

For details see:
https://github.com/OISF/libhtp/releases/tag/0.5.41

"trim white space of invalid folding for first header

clear buffered data for body data

minor optimization for decompression code"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-30 15:45:58 +00:00
Matthias Fischer
b655b21a45 suricata: Update to 6.0.8
Changelog:

"6.0.8 -- 2022-09-27

Task #5552: libhtp 0.5.41

6.0.7 -- 2022-09-27

Security #5430: mqtt: DOS by quadratic with too many transactions in one parse (6.0.x backport)
Bug #5559: BUG_ON triggered from TmThreadsInjectFlowById (6.0.x backport)
Bug #5549: Failed assert DeStateSearchState (6.0.x)
Bug #5548: tcp: assertion failed in DoInsertSegment (BUG_ON) (6.0.x)
Bug #5547: rules: less strict parsing of unexpected flowbit options
Bug #5546: rules: don't error on bad hex in content
Bug #5540: detect: transform strip whitespace creates a 0-sized variable-length array: backport6
Bug #5505: http2: slow http2_frames_get_header_value_vec because of allocation [backport6]
Bug #5471: Reject action is no longer working (6.0.x backport)
Bug #5467: rules: more graceful handling of anomalies for stable versions
Bug #5459: Counters are not initialized in all places. (6.0.x backport)
Bug #5448: nfs: add maximum number of operations per compound (6.0.x backport)
Bug #5436: Infinite loop if the sniffing interface temporarily goes down (6.0.x backports)
Bug #5335: flow: vlan.use-for-tracking is not used for ICMPv4 (6.0.x backport)
Bug #4421: flow manager: using too much CPU during idle (6.0.x backport)
Feature #5535: ips: add "reject" action to exception policies (6.0.x backport)
Feature #5500: ips: midstream: add "exception policy" for midstream (6.0.x backport)
Task #5551: doc: add exception policy documentation (6.0.x)
Task #5533: detect/parse: add tests for parsing signatures with reject and drop action (6.0.x backport)
Task #5525: exceptions: error out when invalid configuration value is passed (6.0.x backport)
Task #5381: add `alert-queue-expand-fails` command-line option (6.0.x backport)
Task #5328: python: distutils deprecation warning (6.0.x backport)"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-30 15:45:58 +00:00
Peter Müller
520d214419 Core Update 171: Fix backup {ex,in}clude file permissions
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-27 10:54:45 +00:00
Peter Müller
bd053b99b3 backup: Set owner of {ex,in}clude{,.user} files to "root"
Since these files are static, there is no legitimate reason why they
should be owned (hence writable) by "nobody". Also, according to
configroot's LFS file, this is the intended behaviour for the *.user
files, which is then overwritten by the backup LFS file. Therefore, set
the file mode of these statically - configroot does not feature other
files in /var/ipfire/backup/ anyway.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2022-09-27 10:53:29 +00:00
Peter Müller
d62babe08e Core Update 171: Remove some orphaned files
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-26 19:18:51 +00:00
Peter Müller
4075ce139b Core Update 171: Ship ipblocklist/sources
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-26 08:54:36 +00:00
Adolf Belka
f128ac2a5c ipblocklist-sources: Correct the info url - Fixes bug#12938
- With the .html ending the link gets a 404 Page not found error

Fixes: Bug#12938
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Bernhard Bitsch <bbitsch@ipfire.org>
2022-09-26 08:53:47 +00:00
Peter Müller
1c154e5180 Core Update 171: Ship expat
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-23 10:43:27 +00:00
Adolf Belka
aa4d18a8fb expat: Update to version 2.4.9
- Update from version 2.4.8 to 2.4.9
- Update of rootfile
- Changelog
   Release 2.4.9 Tue September 20 2022
        Security fixes:
	       #629 #640  CVE-2022-40674 -- Heap use-after-free vulnerability in
	                    function doContent. Expected impact is denial of service
	                    or potentially arbitrary code execution.
        Bug fixes:
	       	    #634  MinGW: Fix mis-compilation for -D__USE_MINGW_ANSI_STDIO=0
	            #614  docs: Fix documentation on effect of switch XML_DTD on
	                    symbol visibility in doc/reference.html
        Other changes:
	            #638  MinGW: Make fix-xmltest-log.sh drop more Wine bug output
	       #596 #625  Autotools: Sync CMake templates with CMake 3.22
	            #608  CMake: Migrate from use of CMAKE_*_POSTFIX to
	                    dedicated variables EXPAT_*_POSTFIX to stop affecting
	                    other projects
	       #597 #599  Windows|CMake: Add missing -DXML_STATIC to test runners
	                    and fuzzers
	       #512 #621  Windows|CMake: Render .def file from a template to fix
	                    linking with -DEXPAT_DTD=OFF and/or -DEXPAT_ATTR_INFO=ON
	       #611 #621  MinGW|CMake: Apply MSVC .def file when linking
	       #622 #624  MinGW|CMake: Sync library name with GNU Autotools,
	                    i.e. produce libexpat-1.dll rather than libexpat.dll
	                    by default.  Filename libexpat.dll.a is unaffected.
	            #632  MinGW|CMake: Set missing variable CMAKE_RC_COMPILER in
	                    toolchain file "cmake/mingw-toolchain.cmake" to avoid
	                    error "windres: Command not found" on e.g. Ubuntu 20.04
	       #597 #627  CMake: Unify inconsistent use of set() and option() in
	                    context of public build time options to take need for
	                    set(.. FORCE) in projects using Expat by means of
	                    add_subdirectory(..) off Expat's users' shoulders
	       #626 #641  Stop exporting API symbols when building a static library
	            #644  Resolve use of deprecated "fgrep" by "grep -F"
	            #620  CMake: Make documentation on variables a bit more consistent
	            #636  CMake: Drop leading whitespace from a #cmakedefine line in
	                    file expat_config.h.cmake
	            #594  xmlwf: Fix harmless variable mix-up in function nsattcmp
	  #592 #593 #610  Address Cppcheck warnings
	            #643  Address Clang 15 compiler warnings
	       #642 #644  Version info bumped from 9:8:8 to 9:9:8;
	                    see https://verbump.de/ for what these numbers do
        Infrastructure:
	       #597 #598  CI: Windows: Start covering MSVC 2022
	            #619  CI: macOS: Migrate off deprecated macOS 10.15
	            #632  CI: Linux: Make migration off deprecated Ubuntu 18.04 work
	            #643  CI: Upgrade Clang from 14 to 15
	            #637  apply-clang-format.sh: Add support for BSD find
	            #633  coverage.sh: Exclude MinGW headers
		    #635  coverage.sh: Fix name collision for -funsigned-char

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-23 10:42:53 +00:00
Peter Müller
80305dd4d3 Core Update 171: Delete stale Bind 9.16.32 libraries
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-23 10:42:14 +00:00
Matthias Fischer
abb32f5e60 bind: Update to 9.16.33
For details see:
https://downloads.isc.org/isc/bind9/9.16.33/doc/arm/html/notes.html#notes-for-bind-9-16-33

"Security Fixes

    Previously, there was no limit to the number of database lookups
    performed while processing large delegations, which could be abused to
    severely impact the performance of named running as a recursive
    resolver. This has been fixed. (CVE-2022-2795)

    ISC would like to thank Yehuda Afek from Tel-Aviv University and Anat
    Bremler-Barr & Shani Stajnrod from Reichman University for bringing
    this vulnerability to our attention. [GL #3394]

    named running as a resolver with the stale-answer-client-timeout option
    set to 0 could crash with an assertion failure, when there was a stale
    CNAME in the cache for the incoming query. This has been fixed.
    (CVE-2022-3080) [GL #3517]

    A memory leak was fixed that could be externally triggered in the
    DNSSEC verification code for the ECDSA algorithm. (CVE-2022-38177) [GL
    #3487]

    Memory leaks were fixed that could be externally triggered in the
    DNSSEC verification code for the EdDSA algorithm. (CVE-2022-38178) [GL
    #3487]

Feature Changes

    Response Rate Limiting (RRL) code now treats all QNAMEs that are
    subject to wildcard processing within a given zone as the same name, to
    prevent circumventing the limits enforced by RRL. [GL #3459]

    Zones using dnssec-policy now require dynamic DNS or inline-signing to
    be configured explicitly. [GL #3381]

    A backward-compatible approach was implemented for encoding
    internationalized domain names (IDN) in dig and converting the domain
    to IDNA2008 form; if that fails, BIND tries an IDNA2003 conversion. [GL
    #3485]

Bug Fixes

    A serve-stale bug was fixed, where BIND would try to return stale data
    from cache for lookups that received duplicate queries or queries that
    would be dropped. This bug resulted in premature SERVFAIL responses,
    and has now been resolved. [GL #2982]"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-23 10:41:10 +00:00
Peter Müller
a76f7d8224 Core Update 171: Ship manualpages
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-23 10:39:57 +00:00
Adolf Belka
75bbee2ae3 manualpages: Correct link to wiki for Network (other)
- Network (other) help link was set to go to Network (internal) wiki page
  Link modified
- Running the check_manualpages.pl script requires it to be executable so the build
   changed the permissions mode from 644 to 755

Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Bernhard Bitsch <bbitsch@ipfire.org>
2022-09-23 10:39:33 +00:00
Peter Müller
c073cb7f92 Core Update 171: Ship and rebuild crontab
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-23 10:39:04 +00:00
Jon Murphy
73b4043143 crontab: add periodic cleanup the collectd RRD (graphs)
- Created (mostly) for old openvpn graphs
- RRD removed when no graph modification for +365 days
  - chosen since graph max out is 365 days
- fcron job runs once per week
  - chosen since this is just a cleanup and it doesnt need to run everyday
Note: logging can be added if needed.

Signed-off-by: Jon Murphy <jon.murphy@ipfire.org>
Reviewed-by: Bernhard Bitsch <bbitsch@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2022-09-23 10:38:11 +00:00
Peter Müller
c2993d5e58 Core Update 171: Ship log.dat
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-23 10:37:33 +00:00
Adolf Belka
a15c20fde9 log.dat: Add NUT entry for System Logs - Fixes bug#12921
- Also aligned all the code entries in %sections and %trsections

Suggested-by: Michael <ip.fire@die-fritzens.de>
Tested-by: Michael <ip.fire@die-fritzens.de>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Bernhard Bitsch <bbitsch@ipfire.org>
2022-09-23 10:36:33 +00:00
Adolf Belka
7bb62b1225 cpufrequtils: Remove SERVICES entry for this package - fixes Bug#12933
- cpufrequtils is a set of "tools" to manage and set cpu freq settings.
- There is an initscript but this is only loading the cpu dependent kernel modules that
   are required by cpufrequtils.
- Therefore cpufrequtils is not a service but a set of tools that are used when required.
- SERVICES line made blank so that this addon does not show up in the services addon table.
- Modified install initscript line to not use SERVICES variable

Fixes: Bug#12933
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Bernhard Bitsch <bbitsch@ipfire.org>
2022-09-23 10:36:07 +00:00
Peter Müller
64fc136084 Core Update 171: Ship and restart Unbound
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-23 10:35:39 +00:00
Matthias Fischer
21236acd00 unbound: Update to 1.16.3
For details see:
https://lists.nlnetlabs.nl/pipermail/unbound-users/2022-September/007885.html

"This release fixes CVE-2022-3204 Non-Responsive Delegation
Attack. It was reported by Yehuda Afek from Tel-Aviv
University and Anat Bremler-Barr and Shani Stajnrod from
Reichman University.

This fixes for better performance when under load, by cutting
promiscuous queries for nameserver discovery and limiting the
number of times a delegation point can look in the cache for
missing records.

Bug Fixes
- Patch for CVE-2022-3204 Non-Responsive Delegation Attack."

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-23 10:34:41 +00:00
Peter Müller
abb185bf5a linux: Align configurations and rootfiles for ARM
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-21 13:36:59 +00:00
Peter Müller
d33651d74f linux: Prepare CONFIG_DEBUG_FS disabling on non-x86_64 architectures
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-20 14:30:28 +00:00
Peter Müller
423685839a Core Update 171: Ship kernel and regenerate initial ramdisks locally
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-20 10:39:08 +00:00
Peter Müller
ae185d6f9d linux: Update to 5.15.68
Please refer to https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.68
for the changelog of this release. Due to the lack of local build
hardware, ARM rootfile and configuration changes have been omitted.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-20 10:33:19 +00:00
Peter Müller
12d339e725 kernel: Disable CONFIG_DEBUG_FS
According to the kernel's documentation,

> debugfs is a virtual file system that kernel developers use to put
> debugging files into. Enable this option to be able to read and
> write to these files.

There is no legitimate reason why one has to do so on an IPFire machine.
Further, the vast debugging options (i.e. related to various drivers)
have never been enabled, limiting the use of this virtual file system
even further.

This patch therefore proposes to disable it entirely, since its
potential security impact outweights its benefits. Due to operational
constraints, changes to ARM kernel configurations will be made if this
patch is approved for x86_64.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2022-09-20 10:33:11 +00:00
Peter Müller
ae49226866 Core Update 171: Ship backupiso
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-19 12:37:45 +00:00
Adolf Belka
c799e441a4 backupiso: Update to ISO file naming - bug#12932
- commit https://git.ipfire.org/?p=ipfire-2.x.git;a=commit;h=fbd0608c2cb5372fff7857065ec7e605b1bf9cf7
   aligned the ISO file name to the image file name. This change also needed to be added
   to backupiso as the filename is used to download the iso from the IPFire server when
   creating an ISO backup.

Fixes: Bug#12932
Suggested-by: Matthias Fischer <matthias.fischer@ipfire.org>
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Bernhard Bitsch <bbitsch@ipfire.org>
2022-09-19 12:36:52 +00:00
Peter Müller
e80e1fda2d Guardian: Bump package version for Perl changes
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-18 20:55:51 +00:00
Peter Müller
ee1cfd760c Core Update 171: Ship libloc
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-18 20:27:12 +00:00
Peter Müller
b029818d1a Core Update 171: Stop and restart collectd
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-18 20:24:50 +00:00
Peter Müller
492c9fb64b Fix restarting Squid and OpenVPN during Core Update 171
My fault, again. :-/

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-18 20:21:24 +00:00
Peter Müller
79fb08749b Core Update 171: Stop Apache before applying the upgrade
Since we replace Perl, users most likely get to see some nasty "Internal
Server Error" messages during the upgrade. To suppres them, and to limit
the chance of side effects, stop Apache before applying the update, and
start it again afterwards.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-18 08:02:14 +00:00
Peter Müller
3ce996ffc3 Core Update 171: Only start services if they are actually enabled
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-18 08:01:18 +00:00
Peter Müller
78ba051486 Core Update 171: Ship and restart strongSwan
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-18 07:58:39 +00:00
Peter Müller
4943252194 strongSwan: Update to 5.9.7
Please refer to https://github.com/strongswan/strongswan/releases/tag/5.9.7
for the release notes of this version.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-18 07:57:03 +00:00
Peter Müller
8017c5cf1f Core Update 171: Ship wireless-regdb
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-17 21:18:41 +00:00