Commit Graph

3473 Commits

Author SHA1 Message Date
Michael Tremer
aab33d4845 core130: Do not search for sensors on AWS
This causes some i2c drivers to load and tons of error messages
being created in syslog. So we skip searching for any sensors
that do not exist.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-04-04 09:05:25 +01:00
Arne Fitzenreiter
3005eb2234 kernel: update user regd patch from openwrt
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2019-03-30 16:56:56 +01:00
Michael Tremer
4d093b8105 suricata: Tie queues to a CPU core
This should improve performance by a small margin

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-03-26 21:18:45 +00:00
Matthias Fischer
6bc94afa0d lua: Update to 5.3.5
For details see:

http://www.lua.org/bugs.html

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-03-21 20:41:44 +00:00
Michael Tremer
fd0b2742bf dnsdist: Update to 1.3.3
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-03-18 04:38:41 +00:00
Michael Tremer
aac6015042 dnsdist: Install some symlinks to start the service
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-03-18 02:54:37 +00:00
Michael Tremer
3b521c724f ipsec-interfaces: Apply static routes (again) after creating IPsec interfaces
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-03-18 15:25:48 +00:00
Peter Müller
a10b0e5b44 ensure Tor daemon files have correct permissions
Set permissions for /var/lib/tor and /var/ipfire/tor to
tor:tor, regardless whether Tor user has been created before
or not.

This ensures Tor starts properly on existing systems after
reinstallation of the add-on. Thanks to Michael for the hint.

Further, a comment for new Tor user in /etc/passwd has been added.

Fixes #11779.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-03-16 12:32:57 +00:00
Michael Tremer
01604708c3 Merge remote-tracking branch 'stevee/next-suricata' into next 2019-03-14 13:19:35 +00:00
Peter Müller
5fc5f70347 add IPtables chain for outgoing Tor traffic
If Tor is operating in relay mode, it has to open a lot of outgoing
TCP connections. These should be separated from any other outgoing
connections, as allowing _all_ outgoing traffic will be unwanted and
risky in most cases.

Thereof, Tor will be running as a dedicated user (see second patch),
allowing usage of user-based IPtables rulesets.

Partially fixes #11779.

Singed-off-by: Peter Müller <peter.mueller@ipfire.org>

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-03-14 13:15:38 +00:00
Peter Müller
4680d554fc run Tor under dedicated user
This allows more-fine granular firewall rules (see first patch for
further information). Further, it prevents other services running as
"nobody" (Apache, ...) from reading Tor relay keys.

Fixes #11779.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-03-14 13:15:18 +00:00
Stefan Schantl
e776d33c70 suricata: Fix amount of listened nfqueues
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
2019-03-13 12:14:30 +01:00
Michael Tremer
5ea26096ca installer: Set the clock correctly when installing over network
If a system has a not very up to date clock, downloading files
over HTTPS is impossible.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-03-13 09:35:07 +00:00
Arne Fitzenreiter
c448474fc7 Revert "kernel: cleanup unused rpi patch"
This reverts commit a2d49659f3.

The patch is still needed to prevent strange crashes

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2019-03-13 09:39:07 +01:00
Michael Tremer
56947acb12 Merge remote-tracking branch 'ms/dns-forwarding' into next 2019-03-11 15:57:15 +00:00
Michael Tremer
7996c5fee9 zabbix_agent: Create /var/run/zabbix in initscript
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-03-08 10:04:28 +00:00
Michael Tremer
661fdb02c2 zabbix_agent: Ensure that the user exists on all systems
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-03-08 09:58:56 +00:00
Alexander Koch
06fc6170a2 zabbix_agentd: New addon
New addon for monitoring IPFire by Zabbix Monitoring (https://www.zabbix.com/features).
See https://forum.ipfire.org/viewtopic.php?f=52&t=22039 and https://lists.ipfire.org/pipermail/development/2019-February/005324.html for further details.

Best regards,
Alex

Signed-off-by: Alexander Koch <ipfire@starkstromkonsument.de>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-03-08 09:55:18 +00:00
Michael Tremer
1ececb67a1 unbound: Mark domains as insecure from DNS forwarding
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-03-05 16:58:29 +00:00
Matthias Fischer
d6d5999af1 hostapd: Update to 2.7
For details see:
https://w1.fi/cgit/hostap/plain/hostapd/ChangeLog

This patch sticks to 'wpa_supplicant: Update to 2.7'.

Best,
Matthias

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-03-04 09:26:58 +00:00
Erik Kapfer
5a3c9ef298 netsnmpd: OpenSSL patch is incl. in new version
Signed-off-by: Erik Kapfer <ummeegge@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-03-04 09:26:58 +00:00
Matthias Fischer
aa88b2ef59 squid: Update to 4.6
For details see:
http://www.squid-cache.org/Versions/v4/changesets/

The 'configure'-option "--disable-ipv6" was removed, it is no longer necessary.

See:
https://lists.ipfire.org/pipermail/development/2016-April/002046.html

"The --disable-ipv6 build option is now deprecated.
...
Squid-3.5.7 and later will perform IPv6 availability tests on startup in
all builds.

- Where IPv6 is unavailable Squid will continue exactly as it would
have had the build option not been used.

These Squid can have the build option removed now."

The warning message concerning a "BCP 177 violation" while
starting 'squid' can be ignored.

Best,
Matthias

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-03-02 14:07:38 +00:00
Michael Tremer
5d04cfe7d5 suricata: Use highest bit to mark packets
We are using the netfilter MARK in IPsec & QoS and this
is causing conflicts.

Therefore, we use the highest bit in the IPS chain now
and clear it afterwards because we do not really care about
this after the packets have been passed through suricata.

Then, no other application has to worry about suricata.

Fixes: #12010
Signed-off-by: Arne Fitzenreiter <arne.fitzenreiter@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
2019-03-01 17:56:48 +01:00
Michael Tremer
50d1bbf0f5 Merge branch 'ipsec' into next 2019-02-25 00:48:08 +00:00
Arne Fitzenreiter
c09758302b kernel: update to 4.14.103
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2019-02-23 15:56:21 +01:00
Arne Fitzenreiter
173844d352 kernel: import cve-2019-8912 patch
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2019-02-22 21:20:57 +01:00
Arne Fitzenreiter
6957b699b3 kernel: apu leds: add more id's
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2019-02-22 18:02:45 +01:00
Arne Fitzenreiter
710153a89c partresize: add "apu1" for apus with new bios. 2019-02-22 18:01:18 +01:00
Arne Fitzenreiter
a2d49659f3 kernel: cleanup unused rpi patch
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2019-02-21 19:13:27 +01:00
Arne Fitzenreiter
8f49959d70 partresize: enable serial console on PC Engines APU
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2019-02-19 15:26:41 +01:00
Arne Fitzenreiter
17872019ba kernel: update apu led patch for apu3 and 4
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2019-02-19 01:04:19 +01:00
Stefan Schantl
20b4c4d863 suricata: Swith to "16" as repeat-mark and repeat-mask.
Marks "1-3" are used for marking source-natted packets on the
interfaces and 4 up to 6 for TOS and QOS. The mark "32" is used by IPsec.

See commit: f5ad510e3c

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
2019-02-18 10:02:29 +01:00
Michael Tremer
9bc1760052 unbound: Drop certificates for local control connection
These are a cause of worry because they are sometimes generated with
an invalid timestamp and therefore render unbound being unusable.

There is no strong reason to use self-signed certificates for extra
security here.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-02-17 13:46:51 +00:00
Stefan Schantl
77c07352a5 Suricata: Start service on red.up event if requested
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
2019-02-15 13:26:55 +01:00
Stefan Schantl
c1c754a121 Merge branch 'next' of ssh://git.ipfire.org/pub/git/ipfire-2.x into next-suricata 2019-02-08 09:59:31 +01:00
Peter Müller
e01e07ec8b apply default firewall policy for ORANGE, too
If firewall default policy is set to DROP, this setting was not
applied to outgoing ORANGE traffic as well, which was misleading.

Fixes #11973

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Cc: Michael Tremer <michael.tremer@ipfire.org>
Cc: Oliver Fuhrer <oliver.fuhrer@bluewin.ch>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-02-07 15:15:32 +00:00
Stefan Schantl
5206a3358d update-ids-ruleset: Lock and Unlock the IDS page during runtime
Reference #11991

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
2019-02-07 08:06:49 +01:00
Stefan Schantl
8117fff863 IDS: Call helper script when red interface gets up
The helper script will be automatically called when the red interface gets up
and will re-generate the HOME_NET file, to take care if the IP-address of this
interface has changed.

Fixes #11989

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
2019-02-06 15:40:19 +01:00
Stefan Schantl
af0065691c suricata: Do not display messages when starting up
Fixes #11979.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
2019-02-05 13:57:40 +01:00
Michael Tremer
8be516b3bc strongswan: Do not create any NAT rules when using VTI/GRE
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-02-04 18:38:24 +00:00
Michael Tremer
f9dd134645 ipsec-interfaces: Resolve any remote hostnames
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-02-04 18:20:36 +00:00
Michael Tremer
d985ce5ae9 ipsec-interfaces: Move conditional block into the loop
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-02-04 18:20:36 +00:00
Michael Tremer
38f6bdb740 ipsec: Drop delayed restart setting
This is a very bad race-condition situation and is not solved by
an unintuitive setting.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-02-04 18:20:36 +00:00
Michael Tremer
517683eeb1 ipsec: Drop VPN_IP setting
This is now a per-connection setting

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-02-04 18:20:36 +00:00
Michael Tremer
6826364580 ipsec-*: Name some more configuration variables
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-02-04 18:20:36 +00:00
Michael Tremer
1ca2f88a74 ipsec-interfaces: Uses local IP address from connection first, then default
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-02-04 18:20:36 +00:00
Michael Tremer
c94aa25475 ipsec-interfaces: Fix typo in variable name
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-02-04 18:20:36 +00:00
Michael Tremer
c821440ced ipsec: Filter better for GRE/VTI interfaces
This tried to delete the GREEN interface before

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-02-04 18:20:36 +00:00
Michael Tremer
6a45a1f101 ipsec: TTL only applies for GRE interfaces and not VTI
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-02-04 18:20:36 +00:00
Michael Tremer
54bac01402 ipsec: Find correct RED IP address when using %defaultroute
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-02-04 18:20:36 +00:00