Commit Graph

21479 Commits

Author SHA1 Message Date
Adolf Belka
f433fdcd90 ovpnmain.cgi: Fixes bug#13404 - prevents certs being saved if common name is already used
- This was fixed by moving the code for checking if the common name is already used, to
   the same location as the code for checking if the connection name is already used.
- Tested out on vm testbed and confirmed that the certificates are not created and the
   index.txt not updated if the common name is flagged as already being used. If the
   entry is changed to use a new CN and Save pressed then the certs are saved and the
   index.txt updated. If Cancel is pressed then no certs are saved and index.txt is not
   updated.

Fixes: Bug#13404
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-28 16:40:53 +00:00
Michael Tremer
033252e043 core185: Ship dhcp.cgi
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-28 16:29:51 +00:00
Adolf Belka
60a050768f dhcp.cgi: Fixes bug#11774 - allows dhcp option of array of integer 8
- This v2 version is to correct the bug number. I entered a wronn bug number in the first
   version
- This extends the allowed options from just array of ip-address to also include
   integer 8 or integer 16 or integer 32.
- Tested out on vm testbed. The array of integer 8 (or 16 or 32) is acceptewd by the dhcp
   options section. I am not able to test out that the function actually works as I don't
   have any dhcp situation set up to use that capability.
- Records or array of records is still not included. It was only an expansion of the array
   of section to include integers.

Fixes: bug#11774
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-28 16:29:27 +00:00
Michael Tremer
bf93033801 core185: Ship dns.cgi
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-28 16:11:04 +00:00
Adolf Belka
7c6ff5ff12 dns.cgi: Fixes bug#12395 - German umlauts not correctly displayed in remarks
- If Freifunk München e.V. is entered as a remark it gets converted to
   Freifunk München e.V.
- This is because cleanhtml is used on the remark text before saving it to the file  and
   the HTML::Entities::encode_entities command that is run on that remark text encodes all
   higher bit characters as unsafe characters and replaces them with their HTML entity
   representation.
- Have tested out the remark with a range of different characters with diacritical marks
   and all of the ones tested were re-written.
- The use of the cleanhtml makes sense when used on URL's or on text that is going to be
   printed as part of the HTML code for a page but it doesn't seem to make sense for text
   used in a remark.
- The cleanhtml function is only used on the remark text in dns.cgi and not on any other
   entries on the page.
- Removing the call to the cleanhtml function results in the German umlauts being printed
   in the remark section.
- Many of the WUI pages have the cleanhtml function used on remark or comment text.
- fwhosts.cgi does not use cleanhtml anywhere. So all its remark sections work with
   characters with diacritical marks.
- If this patch is accepted, I will then submit patches for the other WUI pages where
   characters with diacritical marks are re-written in remark or comment sections.

Fixes: Bug#12395
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-28 16:10:28 +00:00
Adolf Belka
84c599f55f Core Update 185: Ship elfutils
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-28 16:10:22 +00:00
Arne Fitzenreiter
a809f93246 mympd/mpfire: restart mpd after instalation
both addons need a restart of mpd after they are installed

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-02-25 18:14:56 +01:00
Arne Fitzenreiter
e56646a748 mpd: fix database path in initskript
i had forgotten this path after moving the database from
/var/ipfire/mpfire to /var/ipfire/mpd

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-02-25 09:49:10 +01:00
Arne Fitzenreiter
d29916135f mympd: remove mpfire from deps
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-02-25 02:05:10 +01:00
Arne Fitzenreiter
e3a8147c67 libmpdclient: update to 2.22
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-02-25 02:03:24 +01:00
Arne Fitzenreiter
5097f72d49 mympd: update to 14.0.3
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-02-25 02:03:01 +01:00
Arne Fitzenreiter
362bb68620 mpc: update to 0.35
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-02-25 02:02:27 +01:00
Arne Fitzenreiter
39cd2fff54 mpd: update to 0.23.15
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-02-24 21:08:06 +01:00
Arne Fitzenreiter
3de42257d0 mpd: move scripts and config from mpfire to mpd
this allows to use mpd without mpfire installed.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-02-24 16:39:59 +01:00
Arne Fitzenreiter
db4977b30a core185: fix rpi4 firmare names
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-02-19 19:58:51 +01:00
Stéphane Pautrel
4d7023105d lang: Update French translation
- Added strings concerning extrahd, hostile network logs and ids, Reiserfs deletion notification
- improvement of various existing strings

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-19 10:52:18 +00:00
Michael Tremer
1dbea7df56 core185: Ship ca-certificates
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-19 10:17:13 +00:00
Peter Müller
7e79a6c92e ca-certificates: Update root CA certificates bundle
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-19 10:17:13 +00:00
Arne Fitzenreiter
7275d72be3 cpufrequtils: hide output on disabled cores.
We disable cores if the are affected by some cpu vulnerabilities
this cores report errors if you try to change the settings.
So only print the output for core0 and hide it for all cores.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-02-18 11:38:29 +01:00
Peter Müller
5a1b6efa00 libloc: Embed more recent database
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2024-02-17 20:48:10 +00:00
Peter Müller
0b29422c93 Core Update 185: Remove orphaned uncritical non-library files
See: https://patchwork.ipfire.org/project/ipfire/patch/c21b6fed-28cd-47ce-8a99-b36b37672a15@ipfire.org/

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2024-02-17 20:45:41 +00:00
Peter Müller
d6511c820d Core Update 185: Delete orphaned linux-firmware files
See: https://patchwork.ipfire.org/project/ipfire/patch/c21b6fed-28cd-47ce-8a99-b36b37672a15@ipfire.org/

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2024-02-17 20:42:28 +00:00
Peter Müller
6336428ef8 Core Update 185: Ensure correct permissions of /etc/sudoers.d/
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2024-02-17 20:40:39 +00:00
Peter Müller
2038b640e6 Core Update 185: Ship forgotten linux-firmware files
See: https://patchwork.ipfire.org/project/ipfire/patch/c21b6fed-28cd-47ce-8a99-b36b37672a15@ipfire.org/

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2024-02-17 20:39:41 +00:00
Peter Müller
b8f2d9da4c Core Update 185: Restart ntp
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2024-02-17 20:37:04 +00:00
Peter Müller
ef2846e46d Core Update 185: Ship libcap and all packages dependant on it
See: https://patchwork.ipfire.org/project/ipfire/patch/c21b6fed-28cd-47ce-8a99-b36b37672a15@ipfire.org/

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2024-02-17 20:35:02 +00:00
Arne Fitzenreiter
1ec11ba515 rtl8812au: fix module compression
the kernel cannot load the compressed module so fix compression
parameters.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-02-17 19:46:34 +01:00
Arne Fitzenreiter
d36a58ef6b cpufrequtils: fix initskript for amd-pstate
the initskript loads a test-modul for amd-pstate (which traces on intel)
and off course reports errors if firmware settings are missing.

this also fix the error at start because also amd-pstate doesn't support
ondemand mode.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-02-16 16:17:47 +01:00
Adolf Belka
90e40b1948 ruleset-sources: removal of PT Attack & Secureworks + addition of ThreatFox
- The PT Attack ruleset has not been updated since 2021 and made read-only in 2022
   The PT Attack website no longer has any reference to Suricata Rulesets. The PT Attack
   ruleset is being removed.
- The Secureworks three rulesets are no longer available. The website path gives a 404
   error. No mention of Suricata rulesets in the Secureworks website. The Secureworks three
   rulesets are being removed.
- ThreatFox ruleset has been added to the list. Both a plain and archive version of the
   rules are available but the plain version is being regularly updated while the archive
   version was last updated 5 days ago. So this patch has implemented the plain version.
- All above was discussed in the January Developers Conference call.
- Tested out on my vm testbed. I had PT Attack selected as one of the providers. As
   mentioned by Stefan removing PT Attack means it is not available in the list of
   providers but the provider stays in the providers table but with the line shown in red.
   I will update the wiki to mention the red highlight and what it means.

Suggested-by: Stefan Schantl <stefan.schantl@ipfire.org>
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-16 12:29:15 +00:00
Michael Tremer
407548690c Merge branch 'master' into next 2024-02-16 12:29:05 +00:00
Adolf Belka
c9c9580c4e freeradius: Increment PAK_VER & ship freeradius to link to the updated libssl version
- OpenSSL was updated to 3.1.4 in CU181 and to 3.2.1 in CU183 but in both cases freeradius
   was not incremented to cause it to be shipped.
- This patch increments the freeradius PAK_VER to ensure it will be shipped.

Fixes: Bug#13590
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-16 12:28:55 +00:00
Michael Tremer
c73a75cb70 Merge remote-tracking branch 'origin/next' into next 2024-02-14 19:07:30 +00:00
Michael Tremer
5db2b07c89 Merge branch 'master' into next 2024-02-14 19:06:35 +00:00
Adolf Belka
dd24668627 files: Ship collectd.conf for bug#12981
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-14 19:06:20 +00:00
Michael Tremer
c5b441a4e6 core185: Ship unbound and BIND again
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-14 19:04:48 +00:00
Michael Tremer
64300f2212 Merge branch 'master' into next 2024-02-14 19:03:52 +00:00
Adolf Belka
2071b2964f graphs.pl: Fixes graph failure when the DROP_HOSTILE directory is missing
- If a fresh install is done then only the DROP_HOSTILE_IN & DROP_HOSTILE_OUT
   rrd directories are created.
- With the DROP_HOSTILE directory missing then when the fwhits graph is updated an error
   message is caused by the inability to open the required files.
- This patch adds an if/else loop into the fwhits graph code to deal with the two cases
   of the DROP_HOSTILE being present or not depending on the history and if a backup with
   logs has been restored from when DROP_HOSTILE was in use.
- Tested on vm testbed and created a historical line for the hostile data when it was not
   split
- There might be a simpler or better approach than this but it was the only option I
   could identify. I couldn't find anything about being able to use if loops within the
   RRD::Graph loop

Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-14 19:01:44 +00:00
Michael Tremer
f3d7ce3b5d core184: Ship unbound
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-14 19:01:25 +00:00
Matthias Fischer
4fb7b18843 unbound: Update to 1.19.1
For details see:
https://nlnetlabs.nl/projects/unbound/download/#unbound-1-19-1

"Bug Fixes

    Fix CVE-2023-50387, DNSSEC verification complexity can be exploited
    to exhaust CPU resources and stall DNS resolvers.
    Fix CVE-2023-50868, NSEC3 closest encloser proof can exhaust CPU."

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-14 19:00:36 +00:00
Matthias Fischer
e705636a85 unbound 1.19.1: Fix for forgotten rootfile
Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-14 19:00:30 +00:00
Michael Tremer
0698daa3fb core184: Ship bind
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-14 19:00:03 +00:00
Matthias Fischer
de9e44e82d bind: Update to 9.16.48
For details see:
https://downloads.isc.org/isc/bind9/9.16.48/doc/arm/html/notes.html#notes-for-bind-9-16-48

Fixes several CVEs.

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-14 18:59:48 +00:00
Michael Tremer
935da8b7a2 The IPFire time service has moved to time.ipfire.org
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-14 11:52:36 +00:00
Michael Tremer
b6d47f727a make.sh: Bump toolchain version
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-14 11:51:33 +00:00
Arne Fitzenreiter
a4f29a5347 transmission: add menuentry to transmission webgui
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-02-11 13:33:39 +01:00
Arne Fitzenreiter
761e73230f mympd: update to 14.0.1
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-02-11 11:27:48 +01:00
Michael Tremer
1b57f838f1 make.sh: Compile with minimal debug information
In IPFire 2, we don't make any use out of the debug information.
Therefore we can tell the compiler to generate as minimal debug
information as possible in order to have a faster compilation process.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-10 14:23:59 +00:00
Michael Tremer
cecad543cb make.sh: Build with _FORTIFY_SOURCE=3
This will require that we re-ship everything.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-10 14:23:48 +00:00
Michael Tremer
900e1c5722 vim: Don't try to build with custom _FORTIFY_SOURCE
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-10 14:23:40 +00:00
Michael Tremer
be60a304dd mympd: Don't overwrite our own hardening flags
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-10 14:23:32 +00:00