Arne Fitzenreiter
c4172fad43
firstsetup: fix disabling tty's on scon mode
...
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2018-04-17 13:42:17 +02:00
Arne Fitzenreiter
20406699e3
grub: update to 2.02
...
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2018-04-17 06:10:06 +02:00
Arne Fitzenreiter
eef0d706e8
acpid: start also if kernel has no acpi support.
...
acpid is also needed for gpio and hid powerbuttons if there is no
real acpi support.
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2018-04-16 18:12:24 +02:00
Arne Fitzenreiter
6b56624445
flash-images: merge normal and scon to one image.
...
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2018-04-12 16:36:31 +02:00
Arne Fitzenreiter
96a2ff029e
kernel: update config
...
disable isdn
disable audit
disable profiling on arm
disable scsi driver on arm
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2018-04-11 18:36:57 +02:00
Arne Fitzenreiter
783f6aa36d
Merge remote-tracking branch 'origin/master' into kernel-4.14
2018-04-03 20:15:58 +02:00
Michael Tremer
9a507db2cb
pakfire: Store key material in own directory
...
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
2018-04-03 17:31:50 +01:00
Arne Fitzenreiter
6703371d2d
Merge remote-tracking branch 'origin/core120' into kernel-4.14
2018-04-02 17:11:45 +02:00
Michael Tremer
74e715a5a2
pakfire: Import old key, too
...
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
2018-04-02 15:46:40 +01:00
Michael Tremer
397d3a8e15
pakfire: Rename new key to pakfire-2018.key
...
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
2018-04-02 15:46:40 +01:00
Michael Tremer
3e29608f82
pakfire: Validate signatures when multiple are available
...
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
2018-04-02 15:45:48 +01:00
Arne Fitzenreiter
302dba205b
Merge remote-tracking branch 'origin/master' into kernel-4.14
2018-03-30 10:26:01 +02:00
Michael Tremer
4b072d640e
pakfire: Use upstream proxy for HTTPS, too
...
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
2018-03-28 16:55:18 +01:00
Peter Müller
66a0f3646a
use protocol defined in server-list.db for mirror communication
...
For each mirror server, a protocol can be specified in the
server-list.db database. However, it was not used for the
actual URL query to a mirror before.
This might be useful for deploy HTTPS pinning for Pakfire.
If a mirror is known to support HTTPS, all queries to it
will be made with this protocol.
This saves some overhead if HTTPS is enforced on a mirror
via 301 redirects. To enable this, the server-list.db
needs to be adjusted.
The second version of this patch only handles protocols
HTTP and HTTPS, since we do not expect anything else here
at the moment.
Partially fixes #11661 .
Signed-off-by: Peter Müller <peter.mueller@link38.eu >
Cc: Michael Tremer <michael.tremer@ipfire.org >
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
2018-03-28 16:42:21 +01:00
Michael Tremer
9f0999325d
unbound: Fix crash on startup
...
Zone names should not be terminated with a dot.
Fixes : #11689
Reported-by: Pontus Larsson <pontuslarsson51@yahoo.se >
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
2018-03-28 16:39:35 +01:00
Michael Tremer
d3cd99830a
fetchmail: Permit building without SSLv3
...
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
2018-03-27 20:53:31 +01:00
Michael Tremer
166ceacd6b
openssl: Update to 1.1.0h
...
CVE-2018-0739 (OpenSSL advisory) [Moderate severity] 27 March 2018:
Constructed ASN.1 types with a recursive definition (such as can be
found in PKCS7) could eventually exceed the stack given malicious
input with excessive recursion. This could result in a Denial Of
Service attack. There are no such structures used within SSL/TLS
that come from untrusted sources so this is considered safe.
Reported by OSS-fuzz.
This patch also entirely removes support for SSLv3. The patch to
disable it didn't apply and since nobody has been using this before,
we will not compile it into OpenSSL any more.
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
2018-03-27 16:03:44 +01:00
Arne Fitzenreiter
ea9d53c822
inittab: change tty1 to console
...
this reduce the differences between tty and scon installations
and make it easier to switch between.
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2018-03-24 13:26:32 +01:00
Arne Fitzenreiter
2a0947f2e3
u-boot: update to 2018.03
...
todo: check wandboard version. there are internal changes to merge
the different wandboard images to one and u-boot.imx is not build
anymore. Which file is needed to boot on wandboard?
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2018-03-24 11:14:24 +01:00
Michael Tremer
e7ea357cec
Forgot to "git add" the new pakfire init script
...
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
2018-03-20 11:08:58 +00:00
Michael Tremer
42deeb3b45
Revert "installer: Import the Pakfire key at install time"
...
This reverts commit 7d995c9f56 .
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
2018-03-19 19:45:24 +00:00
Matthias Fischer
71e5a29c81
dmidecode 3.1: Added patch (Fix firmware version of TPM device)
...
For details see:
http://git.savannah.gnu.org/cgit/dmidecode.git/commit/?id=174387405e98cd94c627832ae23abcb9be7e5623
"Both the operator (detected by clang, reported by Xorg) and the mask
for the minor firmware version field of TPM devices were wrong."
Best,
Matthias
Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org >
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
2018-03-19 11:56:19 +00:00
Michael Tremer
35b892b0dd
pakfire: Drop old key import mechanism
...
This was error-prone and allowed to potentially inject another
key.
Fixes : #11539
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
2018-03-16 14:37:21 +00:00
Michael Tremer
7d995c9f56
installer: Import the Pakfire key at install time
...
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
2018-03-16 14:33:42 +00:00
Michael Tremer
5e5c2e5413
Import new Pakfire Signing Key
...
We will swap the key that we use to sign Pakfire packages
since the current one is considered outdated cryptography.
Fixes : #11539
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
2018-03-16 14:26:07 +00:00
Stephan Feddersen via Development
c1fc92a9b8
WIO: Fix a problem with the Network-Table-Button
...
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
2018-03-09 15:39:52 +00:00
Stephan Feddersen via Development
cc222a8e62
WIO: Fix some typos
...
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
2018-03-09 15:39:50 +00:00
Stephan Feddersen via Development
a25c95b3a0
WIO: Update to Version 1.3.2 several changes in many files
...
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
2018-03-09 15:39:48 +00:00
Matthias Fischer
cc4816a1af
clamav 0.99.4: removed gcc patch
...
Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org >
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
2018-03-07 18:43:44 +00:00
Peter Müller
438da7e0a0
test if nameservers with DNSSEC support return "ad"-flagged data
...
DNSSEC-validating nameservers return an "ad" (Authenticated Data)
flag in the DNS response header. This can be used as a negative
indicator for DNSSEC validation: In case a nameserver does not
return the flag, but failes to look up a domain with an invalid
signature, it does not support DNSSEC validation.
This makes it easier to detect nameservers which do not fully
comply to the RFCs or try to tamper DNS queries.
See bug #11595 (https://bugzilla.ipfire.org/show_bug.cgi?id=11595 ) for further details.
The second version of this patch avoids unnecessary usage of
grep. Thanks to Michael Tremer for the hint.
Signed-off-by: Peter Müller <peter.mueller@link38.eu >
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
2018-03-05 15:19:55 +00:00
Peter Müller via Development
5929493445
set OpenSSL 1.1.0 DEFAULT cipher list to secure value
...
Only use secure cipher list for the OpenSSL DEFAULT list:
* ECDSA is preferred over RSA since it is faster and more scalable
* TLS 1.2 suites are preferred over anything older
* weak ciphers such as RC4 and 3DES have been eliminated
* AES-GCM is preferred over AES-CBC (known as "mac-then-encrypt" problem)
* ciphers without PFS are moved to the end of the cipher list
This patch leaves AES-CCM, AES-CCM8 and CHACHA20-POLY1305 suites
where they are since they are considered secure and there is no
need to change anything.
The DEFAULT cipher list is now (output of "openssl ciphers -v"):
ECDHE-ECDSA-AES256-GCM-SHA384 TLSv1.2 Kx=ECDH Au=ECDSA Enc=AESGCM(256) Mac=AEAD
ECDHE-ECDSA-CHACHA20-POLY1305 TLSv1.2 Kx=ECDH Au=ECDSA Enc=CHACHA20/POLY1305(256) Mac=AEAD
ECDHE-ECDSA-AES256-CCM8 TLSv1.2 Kx=ECDH Au=ECDSA Enc=AESCCM8(256) Mac=AEAD
ECDHE-ECDSA-AES256-CCM TLSv1.2 Kx=ECDH Au=ECDSA Enc=AESCCM(256) Mac=AEAD
ECDHE-ECDSA-AES128-GCM-SHA256 TLSv1.2 Kx=ECDH Au=ECDSA Enc=AESGCM(128) Mac=AEAD
ECDHE-ECDSA-AES128-CCM8 TLSv1.2 Kx=ECDH Au=ECDSA Enc=AESCCM8(128) Mac=AEAD
ECDHE-ECDSA-AES128-CCM TLSv1.2 Kx=ECDH Au=ECDSA Enc=AESCCM(128) Mac=AEAD
ECDHE-ECDSA-AES256-SHA384 TLSv1.2 Kx=ECDH Au=ECDSA Enc=AES(256) Mac=SHA384
ECDHE-ECDSA-CAMELLIA256-SHA384 TLSv1.2 Kx=ECDH Au=ECDSA Enc=Camellia(256) Mac=SHA384
ECDHE-ECDSA-AES128-SHA256 TLSv1.2 Kx=ECDH Au=ECDSA Enc=AES(128) Mac=SHA256
ECDHE-ECDSA-CAMELLIA128-SHA256 TLSv1.2 Kx=ECDH Au=ECDSA Enc=Camellia(128) Mac=SHA256
ECDHE-RSA-AES256-GCM-SHA384 TLSv1.2 Kx=ECDH Au=RSA Enc=AESGCM(256) Mac=AEAD
ECDHE-RSA-CHACHA20-POLY1305 TLSv1.2 Kx=ECDH Au=RSA Enc=CHACHA20/POLY1305(256) Mac=AEAD
ECDHE-RSA-AES128-GCM-SHA256 TLSv1.2 Kx=ECDH Au=RSA Enc=AESGCM(128) Mac=AEAD
ECDHE-RSA-AES256-SHA384 TLSv1.2 Kx=ECDH Au=RSA Enc=AES(256) Mac=SHA384
ECDHE-RSA-CAMELLIA256-SHA384 TLSv1.2 Kx=ECDH Au=RSA Enc=Camellia(256) Mac=SHA384
ECDHE-RSA-AES128-SHA256 TLSv1.2 Kx=ECDH Au=RSA Enc=AES(128) Mac=SHA256
ECDHE-RSA-CAMELLIA128-SHA256 TLSv1.2 Kx=ECDH Au=RSA Enc=Camellia(128) Mac=SHA256
DHE-RSA-AES256-GCM-SHA384 TLSv1.2 Kx=DH Au=RSA Enc=AESGCM(256) Mac=AEAD
DHE-RSA-CHACHA20-POLY1305 TLSv1.2 Kx=DH Au=RSA Enc=CHACHA20/POLY1305(256) Mac=AEAD
DHE-RSA-AES256-CCM8 TLSv1.2 Kx=DH Au=RSA Enc=AESCCM8(256) Mac=AEAD
DHE-RSA-AES256-CCM TLSv1.2 Kx=DH Au=RSA Enc=AESCCM(256) Mac=AEAD
DHE-RSA-AES128-GCM-SHA256 TLSv1.2 Kx=DH Au=RSA Enc=AESGCM(128) Mac=AEAD
DHE-RSA-AES128-CCM8 TLSv1.2 Kx=DH Au=RSA Enc=AESCCM8(128) Mac=AEAD
DHE-RSA-AES128-CCM TLSv1.2 Kx=DH Au=RSA Enc=AESCCM(128) Mac=AEAD
DHE-RSA-AES256-SHA256 TLSv1.2 Kx=DH Au=RSA Enc=AES(256) Mac=SHA256
DHE-RSA-CAMELLIA256-SHA256 TLSv1.2 Kx=DH Au=RSA Enc=Camellia(256) Mac=SHA256
DHE-RSA-AES128-SHA256 TLSv1.2 Kx=DH Au=RSA Enc=AES(128) Mac=SHA256
DHE-RSA-CAMELLIA128-SHA256 TLSv1.2 Kx=DH Au=RSA Enc=Camellia(128) Mac=SHA256
ECDHE-ECDSA-AES256-SHA TLSv1 Kx=ECDH Au=ECDSA Enc=AES(256) Mac=SHA1
ECDHE-ECDSA-AES128-SHA TLSv1 Kx=ECDH Au=ECDSA Enc=AES(128) Mac=SHA1
ECDHE-RSA-AES256-SHA TLSv1 Kx=ECDH Au=RSA Enc=AES(256) Mac=SHA1
ECDHE-RSA-AES128-SHA TLSv1 Kx=ECDH Au=RSA Enc=AES(128) Mac=SHA1
DHE-RSA-AES256-SHA SSLv3 Kx=DH Au=RSA Enc=AES(256) Mac=SHA1
DHE-RSA-CAMELLIA256-SHA SSLv3 Kx=DH Au=RSA Enc=Camellia(256) Mac=SHA1
DHE-RSA-AES128-SHA SSLv3 Kx=DH Au=RSA Enc=AES(128) Mac=SHA1
DHE-RSA-CAMELLIA128-SHA SSLv3 Kx=DH Au=RSA Enc=Camellia(128) Mac=SHA1
AES256-GCM-SHA384 TLSv1.2 Kx=RSA Au=RSA Enc=AESGCM(256) Mac=AEAD
AES256-CCM8 TLSv1.2 Kx=RSA Au=RSA Enc=AESCCM8(256) Mac=AEAD
AES256-CCM TLSv1.2 Kx=RSA Au=RSA Enc=AESCCM(256) Mac=AEAD
AES128-GCM-SHA256 TLSv1.2 Kx=RSA Au=RSA Enc=AESGCM(128) Mac=AEAD
AES128-CCM8 TLSv1.2 Kx=RSA Au=RSA Enc=AESCCM8(128) Mac=AEAD
AES128-CCM TLSv1.2 Kx=RSA Au=RSA Enc=AESCCM(128) Mac=AEAD
AES256-SHA256 TLSv1.2 Kx=RSA Au=RSA Enc=AES(256) Mac=SHA256
CAMELLIA256-SHA256 TLSv1.2 Kx=RSA Au=RSA Enc=Camellia(256) Mac=SHA256
AES128-SHA256 TLSv1.2 Kx=RSA Au=RSA Enc=AES(128) Mac=SHA256
CAMELLIA128-SHA256 TLSv1.2 Kx=RSA Au=RSA Enc=Camellia(128) Mac=SHA256
AES256-SHA SSLv3 Kx=RSA Au=RSA Enc=AES(256) Mac=SHA1
CAMELLIA256-SHA SSLv3 Kx=RSA Au=RSA Enc=Camellia(256) Mac=SHA1
AES128-SHA SSLv3 Kx=RSA Au=RSA Enc=AES(128) Mac=SHA1
CAMELLIA128-SHA SSLv3 Kx=RSA Au=RSA Enc=Camellia(128) Mac=SHA1
This has been discussed at 2017-12-04 (https://wiki.ipfire.org/devel/telco/2017-12-04 )
and for a similar patch written for OpenSSL 1.0.x.
Signed-off-by: Peter Müller <peter.mueller@link38.eu >
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
2018-02-28 11:45:03 +00:00
Arne Fitzenreiter
1a7cfc2f10
Merge remote-tracking branch 'origin/core119' into kernel-4.14
...
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2018-02-27 12:38:18 +01:00
Michael Tremer
0eccedd1c8
dhcp: Allow adding extra DHCP interfaces
...
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
2018-02-26 11:12:20 +00:00
Michael Tremer
9434bffaf2
Merge branch 'openssl-11' into next
2018-02-21 12:21:10 +00:00
Michael Tremer
0f354672a2
flac: Update to 1.3.2
...
The previous version fails to build on i586
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
2018-02-16 19:14:33 +00:00
Michael Tremer
2d5940daca
Drop MySQL
...
This is outdated and still on 5.0.x and nobody volunteered to
update this package.
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
2018-02-12 12:05:46 +00:00
Michael Tremer
a350ea6dea
Drop mISDN userspace tools
...
This is unsupported for quite a while and nobody should be using this.
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
2018-02-12 11:41:50 +00:00
Michael Tremer
11e78f38b9
Package openssl-compat (1.0.2.n)
...
This is provided for compatibility with binaries that have
been compiled against this version of OpenSSL.
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
2018-02-11 22:19:45 +00:00
Michael Tremer
7e63e4f806
transmission: Patch to build against OpenSSL 1.1
...
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
2018-02-11 22:19:45 +00:00
Michael Tremer
0d0fe16e22
net-snmp: Patch to build against OpenSSL 1.1
...
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
2018-02-11 22:19:45 +00:00
Michael Tremer
3b10b31303
elinks: Patch to build against OpenSSL 1.1
...
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
2018-02-11 22:19:45 +00:00
Michael Tremer
07b8dcd0b2
openssh: Update to 7.6p1 and patch against OpenSSL 1.1
...
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
2018-02-11 22:19:45 +00:00
Michael Tremer
5a9bbaa93d
openssl: Update to version 1.1
...
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
2018-02-11 22:19:45 +00:00
Michael Tremer
e9e3dd9fee
qemu: Make it build with newer glibcs
...
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
2018-02-11 20:56:12 +00:00
Michael Tremer
c19196e1c5
nfs: Fix building with newer glibcs
...
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
2018-02-11 20:56:12 +00:00
Michael Tremer
ce7f9c3a0e
libtirpc: Fix build against newer glibcs
...
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
2018-02-11 20:56:12 +00:00
Michael Tremer
f794504ec6
dma: Don't only use TLSv1
...
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
2018-02-11 20:56:12 +00:00
Michael Tremer
65a75e0ddf
glibc: Update to 2.27
...
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
2018-02-11 20:56:12 +00:00
Michael Tremer
f1a5a25a40
flex: Patch against SEGV with newer glibc
...
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
2018-02-11 20:56:12 +00:00
Michael Tremer
6ffe2da8c9
iproute2: Update to 4.14.1
...
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
2018-02-11 20:56:12 +00:00