Commit Graph

22410 Commits

Author SHA1 Message Date
Arne Fitzenreiter
edb9e4e030 u-boot: fix KVER syntax
with some kernel build changes KVER also contains the -ipfire string
so this has to be removed in u-boot.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-09-20 12:24:40 +00:00
Michael Tremer
699124028a core188: Regenerate Suricata rulefiles
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-09-20 10:19:57 +00:00
Michael Tremer
0694e7e45f ncat: Fix rootfile and bump release
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-09-18 10:06:24 +00:00
Michael Tremer
a80d817716 core188: Ship OpenSSL
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-09-03 18:02:34 +00:00
Michael Tremer
74a02d3372 openssl: Update to 3.3.2
Possible denial of service in X.509 name checks (CVE-2024-6119)
===============================================================

Severity: Moderate

Issue summary: Applications performing certificate name checks (e.g., TLS
clients checking server certificates) may attempt to read an invalid memory
address resulting in abnormal termination of the application process.

Impact summary: Abnormal termination of an application can a cause a denial of
service.

Applications performing certificate name checks (e.g., TLS clients checking
server certificates) may attempt to read an invalid memory address when
comparing the expected name with an `otherName` subject alternative name of an
X.509 certificate. This may result in an exception that terminates the
application program.

Note that basic certificate chain validation (signatures, dates, ...) is not
affected, the denial of service can occur only when the application also
specifies an expected DNS name, Email address or IP address.

TLS servers rarely solicit client certificates, and even when they do, they
generally don't perform a name check against a "reference identifier" (expected
identity), but rather extract the presented identity after checking the
certificate chain.  So TLS servers are generally not affected and the severity
of the issue is Moderate.

The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.
OpenSSL 1.1.1 and 1.0.2 are also not affected by this issue.

OpenSSL 3.3, 3.2, 3.1 and 3.0 are vulnerable to this issue.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-09-03 18:01:59 +00:00
Michael Tremer
3ce4d238d2 .gitignore: Keep ignoring the deleted doc files
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-29 07:58:00 +00:00
Michael Tremer
b95199a382 make.sh: Don't try to create a time NS on older kernels
This is not supported on kernels < 5.6.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-29 07:37:38 +00:00
Michael Tremer
1c1838509c make.sh: Bind-mount /proc as a workaround for unshare
unshare seems to want to change the mount propagation for /proc
before it has been mounted. In order to workaround that problem,
we bind-mount /proc to itself before.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-29 07:37:35 +00:00
Adolf Belka
3d97196525 openssl: Update to version 3.3.1
- Update from 3.3.0 to 3.3.1
- Update of rootfile not required
- This version has 2 CVE fixes both of which are classified as Low Severity so looks like
   they can wait for CU189
- Changelog
    3.3.1
	 * Fixed potential use after free after SSL_free_buffers() is called.
	   The SSL_free_buffers function is used to free the internal OpenSSL
	   buffer used when processing an incoming record from the network.
	   The call is only expected to succeed if the buffer is not currently
	   in use. However, two scenarios have been identified where the buffer
	   is freed even when still in use.
	   The first scenario occurs where a record header has been received
	   from the network and processed by OpenSSL, but the full record body
	   has not yet arrived. In this case calling SSL_free_buffers will succeed
	   even though a record has only been partially processed and the buffer
	   is still in use.
	   The second scenario occurs where a full record containing application
	   data has been received and processed by OpenSSL but the application has
	   only read part of this data. Again a call to SSL_free_buffers will
	   succeed even though the buffer is still in use.
	   ([CVE-2024-4741])
	 * Fixed an issue where checking excessively long DSA keys or parameters may
	   be very slow.
	   Applications that use the functions EVP_PKEY_param_check() or
	   EVP_PKEY_public_check() to check a DSA public key or DSA parameters may
	   experience long delays. Where the key or parameters that are being checked
	   have been obtained from an untrusted source this may lead to a Denial of
	   Service.
	   To resolve this issue DSA keys larger than OPENSSL_DSA_MAX_MODULUS_BITS
	   will now fail the check immediately with a DSA_R_MODULUS_TOO_LARGE error
	   reason.
	   ([CVE-2024-4603])
	 * Improved EC/DSA nonce generation routines to avoid bias and timing
	   side channel leaks.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-27 09:49:34 +00:00
Michael Tremer
8e6bb176b1 core-updates: Honour the excluded file list
This was not implement when refactoring the code to compress the
updater's tarball.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-27 09:40:54 +00:00
Michael Tremer
d7ee801712 make.sh: Integrate the rootfile consistency check
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-27 09:40:45 +00:00
Michael Tremer
974d274ea7 make.sh: Refactor the broken rootfile check
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-27 09:40:40 +00:00
Michael Tremer
6fc9957e62 core-update: Append the release number to the meta file
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-23 15:29:36 +00:00
Michael Tremer
cd2069f07f Merge branch 'next' 2024-08-23 09:22:37 +00:00
Michael Tremer
cc4a17f46c Run "./make.sh lang"
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-23 09:22:17 +00:00
Michael Tremer
787d9428af make.sh: Fix printing the total build time
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-23 09:19:49 +00:00
Michael Tremer
2b4d457c2f Revert "make.sh: Swap mount propagation"
This reverts commit f3c360cd6e.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-21 14:36:11 +00:00
Michael Tremer
9a07118b71 make.sh: Remove the brackets from build options
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-21 14:29:58 +00:00
Michael Tremer
0e2cf06a8c core188: Ship suricata and arping because of SO bump in libnet
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-21 14:17:58 +00:00
Michael Tremer
9207afd883 core188: Ship lang.pl
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-21 16:17:22 +02:00
Michael Tremer
d7eb312d0f guardian.cgi: Use the new service widget
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-21 16:14:40 +02:00
Michael Tremer
17ef83f223 header.pl: Fix language loading
We have been importing the language files many times when they are
actually rather slow. This just tidies this up.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-21 16:02:42 +02:00
Michael Tremer
ba8a6d83bd header.pl: Remove an unused variable
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-21 16:02:13 +02:00
Michael Tremer
a561a1d866 lang.pl: Fix all sorts of whitespace issues
No functional changes.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-21 16:01:40 +02:00
Michael Tremer
cc0304b7bd index.cgi: Improve the warning box
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-21 15:47:08 +02:00
Michael Tremer
590dcf8703 samba.cgi: Fix styling of the configuration form
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-21 15:25:13 +02:00
Michael Tremer
0a8800657d samba.cgi: Use the new service status widget
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-21 15:20:51 +02:00
Michael Tremer
9984ed3d5a firewall.cgi: Fix messy table striping
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-21 15:11:59 +02:00
Michael Tremer
828f2bdd44 CSS: Make the black less agressive
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-21 12:35:55 +02:00
Michael Tremer
3fb7849c21 services.cgi: Search for suricata by its PID
suricata renames itself and therefore we cannot find the process by its
name.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-21 12:24:24 +02:00
Michael Tremer
234fd050d4 vpnmain.cgi: Fix colouring of the connection status when disconnected
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-21 12:22:40 +02:00
Michael Tremer
8ead2ddf3d unbound-dhcp-leases-bridge: Watch unbound
This patch adds a watcher thread which monitors if Unbound is still
alive. If not, it will wait until Unbound comes back, rewrite the leases
file and reload Unbound to get it back into sync.

Afterwards Unbound will receive updates as usual.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-21 10:10:33 +01:00
Michael Tremer
048d2be91a make.sh: Remove all traces of KCFG
This variable is no longer been used and has been abused way too much in
the past. May it rest in pieces.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-20 16:08:32 +00:00
Michael Tremer
f9864480df rtl8812au: Fix build with updated KVER
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-20 16:08:16 +00:00
Michael Tremer
0a110703ca Revert "make.sh: Fix build with kernels < 6.0.0"
This reverts commit 8ea702f3f8.

This commit seems to introduce many more regressions when building
packages which I cannot easily reproduce.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-20 08:39:24 +00:00
Michael Tremer
9287c6c9c7 core188: Ship the network AQM script
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-19 18:17:12 +00:00
Michael Tremer
58846b68b4 AQM: Revert back to only use fq_codel by default
We have defaulted to CAKE for all devices that quality. That has however
resulted in worse network quality as some devices could not provide the
compute power necessary for CAKE. There are however only very few
benefits to run an unconfigured CAKE.

This patch changes this back to fq_codel which is computationally
cheaper and should deliver 99% of the throughput that CAKE does. This is
presumably the better trade-off.

We don't use fq_codel on wireless devices since the kernel is running
this for each client. It would have been nice to only apply this to
wireless interfaces in AP mode, but I cannot find a way to tell the
difference with asking NETLINK.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-19 19:13:19 +01:00
Michael Tremer
bd4e688e64 core188: Ship backup.pl
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-19 18:11:02 +00:00
Michael Tremer
643db076b4 backup.pl: Use a sane timestamp format
I don't think it is nice to mix underscare and dash.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-19 18:10:12 +00:00
Adolf Belka
5b2ee7520f backup.pl: Fixes bug13734 - tar treats colon in filename as remote location
- When a user tries to restore on the console from a backup on IPFire that has a colon in
   the filename the tar treats this as meaning that everything after the colon is
   information about a remote location to do the extraction to. This results in a filename
   that cannot be found, and a remote location that is not correct and the tar operation
   fails.
- This has been confirmed by myself.
- If the user tries a restore from a file downloaded to another computer then for most, if
   not all browsers, the colon will have been replaced by an underscore or other character.
   Firefox, Chromium and Vivaldi do this.
- So any backup file that is selected to be restored using the WUI will no longer have a
   colon in the filename.
- This patch adds --force-local to the tar command, which means that tar will treat the
   colon as a character in the filename. This will ensure that if a user has any backup
   files stored on their IPFire system, with a colon in the filename then doing a restore
   from this file will not cause tar to fail.
- The NOW variable is also changed to replace the colon by a dash and to separate the date
   and time by an underscore. This filename will be accepted by browsers, without doing
   any replacements. Tested out with Firefox, Chromium & Vivaldi.
- The above ensures that both the new and old filename versions will work for doing a
   restore.

Fixes: bug13734
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Bernhard Bitsch <bbitsch@ipfire.org>
Tested-by: Bernhard Bitsch <bbitsch@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-19 18:09:46 +00:00
Michael Tremer
691d149aa1 linux: Don't reset CFLAGS/CXXFLAGS
The kernel's build system uses its own CFLAGS for building the kernel
but for the tooling we want to use our own CFLAGS.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-19 18:09:17 +00:00
Michael Tremer
9db251ee0b linux: Tidy up the messy KVER variable
This variable never actually held the kernel version. There were always
suffixes appended and other things changed about it. This makes it a lot
simpler as this variable now holds the actual kernel version.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-19 18:09:17 +00:00
Michael Tremer
c3cf778698 make.sh: Fix variable name
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-19 18:08:59 +00:00
Michael Tremer
8ea702f3f8 make.sh: Fix build with kernels < 6.0.0
unshare(8) seems to fail with kernels older than 6.0.0 when mounting
the /proc filesystem in the inner namespace. This seems to be an bug
where unshare does not even try to mount the /proc filesystem but tries
to make its mount propagation private.

This is now solved in that way that we will use unshare on newer kernels
but will fall back on manually mounting the /proc filesystem once we have
entered the chroot environment.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-19 18:06:23 +00:00
Michael Tremer
f3c360cd6e make.sh: Swap mount propagation
When we create the outer mount namespace, we still want to receive any
mounts from the host system which is why we set it to slave.

The second mount namespace should be a copy of the outer one but should not
propagate anything back to the outer mount namespace.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-19 18:05:16 +00:00
Arne Fitzenreiter
da7dbb1af2 kernel: remove obsolete asix patch
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-08-19 17:24:30 +02:00
Arne Fitzenreiter
d1f10f3b15 kernel: update to 6.6.47
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-08-19 17:24:09 +02:00
Michael Tremer
d2df099be3 flash-images: Increase the size of the root partition
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-19 13:02:38 +00:00
Arne Fitzenreiter
7e70a93aaa kernel: update to 6.6.46
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-08-18 15:40:33 +02:00
Michael Tremer
0eb5b5f9e1 core188: Ship the suricata init script
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-18 12:46:34 +00:00