Commit Graph

13576 Commits

Author SHA1 Message Date
Arne Fitzenreiter
16cb73d901 kernel: update to 4.14.120
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2019-05-17 07:10:52 +02:00
Arne Fitzenreiter
d099196501 kernel: update to 4.14.119
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2019-05-16 14:26:04 +02:00
Arne Fitzenreiter
29b907c677 intel-microcode: update to 20190514
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2019-05-15 13:17:26 +02:00
Michael Tremer
54fc710b99 Update kernel rootfiles for armv5tel
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-14 10:02:03 +01:00
Michael Tremer
da636bd8b7 Update kernel rootfiles for aarch64
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-13 16:31:14 +01:00
Michael Tremer
ad794614cd xtables-addons: Explicitely add path for alternative kernels
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-12 10:21:32 +01:00
Michael Tremer
3f60a1e10e linux: Fix touching incorrect version.h
This file has moved and the touch command created an empty version
of the file which caused that builds depending on that did not
complete.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-12 10:20:57 +01:00
Michael Tremer
c1e8c954bd linux: objtool does not exist on all platforms
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-12 09:28:10 +01:00
Michael Tremer
fd4cea1e34 core132: Ship changes to unbound
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-11 04:24:29 +01:00
Michael Tremer
661ab15389 unbound: Add Safe Search
This is a feature that will filter adult content from search
engine's results.

The old method of rewriting the HTTP request no longer works.

This method changes the DNS response for supported search engines
which violates our belief in DNSSEC and won't allow these search
engines to ever enable DNSSEC.

However, there is no better solution available to this and this
an optional feature, too.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2019-05-11 04:19:37 +01:00
Michael Tremer
76630c4336 core132: Ship updated urlfilter.cgi
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-11 04:18:08 +01:00
Michael Tremer
6b2801d62e URL Filter: Drop Safe Search feature
This is not working for quite some time now because all search
engines have moved over to HTTPS. Therefore we no longer can
manipulate the URL query string.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-11 04:16:39 +01:00
Michael Tremer
9d959ac151 igmpproxy: Update to 0.2.1
This updates the package to its latest upstream version and should
be able to support IGMPv3.

Fixes: #12074
Suggested-by: Marc Roland <marc.roland@outlook.com>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-11 02:20:15 +01:00
Michael Tremer
0aa8284905 xtables-addons: Automatically detect location of kernel source
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-10 10:25:46 +01:00
Michael Tremer
0ad5f6a1fc linux: Install kernel build system to /lib/modules
This is necessary so that we can clean up /usr/src after
each build and do not waste any space on the massive kernel
source.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-10 10:12:50 +01:00
Michael Tremer
8634797e8a make.sh: Append -ipfire to fake kernel string
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-10 10:10:25 +01:00
Michael Tremer
15b005d837 make.sh: Automatically enable build ramdisk on systems with 4GB RAM or more
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-10 05:31:04 +01:00
Michael Tremer
3966b1e58f iptables: Fix build without kernel source
The layer7 filter header files were not installed into /usr/include
and therefore we needed to keep the whole kernel source tree.

This is just a waste of space and this patch fixes this.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-10 04:55:49 +01:00
Michael Tremer
7c984de699 make.sh: Mount /usr/src in memory for faster build
This patch enables that /usr/src is a ramdisk which should
give us fewer I/O operations when extracting tarballs or
writing small intermediate files by the compiler.

In some virtualised environments this should bring a good
performance boost.

There is no persistent data stored in this directory and
some persistent directories are mounted over it.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-10 04:55:49 +01:00
Alexander Koch
8c072c5c43 Pakfire: Add Core-Version to "status"
Add the IPFire-Core-Version to the status message.

Signed-off-by: Alexander Koch <ipfire@starkstromkonsument.de>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-10 04:25:45 +01:00
Peter Müller
b8b1f9eabe Tor: update to 0.4.0.5
See https://blog.torproject.org/new-release-tor-0405 for release
announcements.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-10 04:21:19 +01:00
Michael Tremer
38d19a50a0 core132: Ship updated hwdata
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-10 04:20:17 +01:00
Peter Müller
e05b7894d2 hwdata: update PCI/USB databases
PCI IDs: 2019-05-03 03:15:03
USB IDs: 2019-05-08 20:34:05

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-10 04:19:25 +01:00
Michael Tremer
c209eaedb9 core132: Ship updated ca-certificates
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-10 04:19:05 +01:00
Peter Müller
968ce70af1 update ca-certificates CA bundle
Update the CA certificates list to what Mozilla NSS ships currently.

The original file can be retrieved from:
https://hg.mozilla.org/mozilla-central/raw-file/tip/security/nss/lib/ckfw/builtins/certdata.txt

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-10 04:18:35 +01:00
Michael Tremer
f2491fa3e8 Update translations
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-10 04:16:39 +01:00
Michael Tremer
0bc5b1de6d Config: Disable XZ parallelism by default
Exporting XZ_OPT caused that every time xz was called, it automatically
enabled parallelism. The make systemm also launches multiple processes
at the same time to use more processor cores at the same time.

The combination of this causes memory exhaustion even on large systems
and has no performance gain. Therefore this is disabled by default
and only enabled where we need it which is already the case.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-10 04:16:08 +01:00
Florian Bührle
a6695868d0 zoneconf: Fix bug that resultet from last fix
Fix bug that prevents users from assigning NIC to RED if RED is in PPP
mode
2019-05-11 14:38:39 +02:00
Florian Bührle
f60b61e04d zoneconf: Fix bug in NIC assignment; Change visibility of unused zones
Fix a bug that allows users to add multiple NICs to non-bridged zones.
This fix includes a new error message.

Unused zones are now invisible instead of grey.
2019-05-11 13:28:12 +02:00
Michael Tremer
88e64c23c1 routing: Fix potential authenticated XSS in input processing
An authenticated Stored XSS (Cross-site Scripting) exists in the
(https://192.168.0.241:444/cgi-bin/routing.cgi) Routing Table Entries
via the "Remark" text box  or "remark" parameter. This is due to a
lack of user input validation in "Remark" text box  or "remark"
parameter. It allows an authenticated WebGUI user with privileges
for the affected page to execute Stored Cross-site Scripting in
the Routing Table Entries (/cgi-bin/routing.cgi), which helps
attacker to redirect the victim to a attacker's phishing page.

The Stored XSS get prompted on the victims page whenever victim
tries to access the Routing Table Entries configuraiton page.

An attacker get access to the victim's session by performing
the CSRF and gather the cookie and session id's or possibly can
change the victims configuration using this Stored XSS.

This attack can possibly spoof the victim's informations.

Fixes: #12072
Reported-by: Dharmesh Baskaran <dharmesh201093@gmail.com>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-10 09:04:54 +01:00
Michael Tremer
1d6bc7a0dc zoneconf: Remove red warning
This is a bit shouty and there are various places where we do not
warn about this problem, so this patch makes it more consistent.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-09 17:16:35 +02:00
Michael Tremer
d21b86b6c3 zoneconf: Fix spelling
This patch mainly changes "Macvtap" to the branded spelling and removes
short forms as well as hyphenation in German compound nouns.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-09 17:13:52 +02:00
Michael Tremer
03fd68552d zoneconf: Move "None" option to the top
This is a more natural order of the options to me

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-09 17:11:24 +02:00
Michael Tremer
d04ab223c7 web-user-interface: Ship new zoneconf.cgi file
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-09 15:47:42 +01:00
Michael Tremer
f0e0056eef core132: Ship updated captive.cgi
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-09 13:17:16 +01:00
Michael Tremer
462bc3d159 captive: Fix potential authenticated XSS in title processing
An authenticated Stored XSS (Cross-site Scripting) exists in the
(https://localhost:444/cgi-bin/captive.cgi) Captive Portal via the
"Title of Login Page" text box or "TITLE" parameter. This is due to
a lack of user input validation in "Title of Login Page" text box
or "TITLE" parameter. It allows an authenticated WebGUI user with
privileges for the affected page to execute Stored Cross-site
Scripting in the Captive Portal page (/cgi-bin/captive.cgi), which
helps attacker to redirect the victim to a attacker's page.

The Stored XSS get prompted on the victims page whenever victim
tries to access the Captive Portal page.

An attacker get access to the victim's session by performing the
CSRF and gather the cookie and session id's or possibly can
change the victims configuration using this Stored XSS.

This attack can possibly spoof the victim's informations.

Fixes: #12071
Reported-by: Dharmesh Baskaran <dharmesh201093@gmail.com>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-09 13:16:52 +01:00
Stefan Schantl
6b19d192f9 guardian: Remove snort related options.
IPFire has moved to suricata as IDS/IPS system, therefore all snort related
options has become obsolete.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2019-05-08 19:21:17 +02:00
Michael Tremer
939f227e0b core132: Ship VLAN GUI
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-08 12:15:27 +01:00
Florian Bührle
1dcf513a41 webif: Add a GUI for configuring VLAN interfaces
This patch adds a new CGI file which allows users to edit the
VLAN configuration as well as configuring zones as bridges.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-08 12:15:27 +01:00
Florian Bührle
a494174979 udev: Accept MAC addresses for PARENT_DEV
This allows us to create VLAN interfaces even when the
name of the parent interface might vary.

This patch also appends the VLAN tag to interfaces
when the zone is in bridge mode.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-08 12:15:27 +01:00
Stefan Schantl
d2b54a312f guardian: Remove snort related options.
IPFire has moved to suricata as IDS/IPS system, therefore all snort related
options has become obsolete.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2019-05-08 19:20:08 +02:00
Michael Tremer
bf62652ecf squid: Link against libatomic on ARM
This package failed to build on ARM because atomic functions
are being emulated on ARM32 and the required library was not
linked.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-07 23:54:32 +01:00
Michael Tremer
e9dd6da552 xfsprogs: Disable LTO on armv5tel
LTO fails on ARM, but since we do not require it, we can
disable it here.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-07 23:54:25 +01:00
Michael Tremer
68f2b71778 core132: Ship updated pakfire files
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-07 23:53:43 +01:00
Alexander Koch
5737a22cf2 zabbix_agentd: Add UserParameter for Pakfire Status
Ship the UserParameter for monitoring the status of pakfire for keeping track of available updates etc.

Signed-off-by: Alexander Koch <ipfire@starkstromkonsument.de>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-07 23:51:41 +01:00
Alexander Koch
090af02e07 Pakfire: Add new command line argument "status"
This enables Pakfire to return a Status-Summary for the Current Core-Update-Level, time since last updates, the availability of a core-/packet-update and if a reboot is required to complete an update. This can be used by monitoring agents (e.g. zabbix_agentd) to monitor the update status of the IPFire device.

Signed-off-by: Alexander Koch <ipfire@starkstromkonsument.de>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-07 23:51:20 +01:00
Alexander Koch
c818134f44 zabbix_agentd: update to 4.2.1
Release notes: https://www.zabbix.com/rn/rn4.2.1

Signed-off-by: Alexander Koch <ipfire@starkstromkonsument.de>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-07 23:51:08 +01:00
Michael Tremer
673db997cc core132: Ship updated libedit
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-07 23:50:26 +01:00
Matthias Fischer
f302e31ae2 libedit: Update to 20190324-3.1
For details see:
https://thrysoee.dk/editline/

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-07 23:50:03 +01:00
Michael Tremer
7f07bdb43f core132: Ship updated knot
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-07 23:49:47 +01:00