Commit Graph

18400 Commits

Author SHA1 Message Date
Michael Tremer
f43db7d6fa linux-firmware: Don't ship some Qualcomm AI/5G firmware
This is not needed on IPFire and saves about 13 MiB of compressed
firmware.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-30 13:58:53 +00:00
Michael Tremer
19b535b9b6 linux-firmware: Don't ship Mellanox Spectrum Switch Firmware
This is probably not usable on IPFire and saves us about 47 MiB.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-30 13:58:53 +00:00
Michael Tremer
5df7c89924 linux-firmware: Don't ship Marvell Prestera Firmware
This firmware is required for a switch ASIC which we build the kernel
module for, but which is probably not usable with IPFire.

This saves about 40 MiB of compressed firmware space.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-30 13:58:53 +00:00
Michael Tremer
90c988a6ee networking: Correctly set MTU on all bridges
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-30 13:58:02 +00:00
Matthias Fischer
80a477466c monit: Update to 5.32.0
For details see:
https://mmonit.com/monit/changes/

    "Fixed: Issue #1028: If the Monit statefile was removed, the monit
    start <service> action for services with onreboot nostart option
    started the service, but did not enable monitoring of said service.
    The same problem occurred if a new onreboot nostart service was
    added, even if the statefile did exist.

    Fixed: Issue #1029: The generic protocol test truncated received
    data if the response contained zeros.

    Fixed: PAM authentication: Users with a valid password for
    a disabled account could still login to Monit. Thanks to Youssef
    Rebahi-Gilbert.

    Fixed: The Monit HTTP interface could be blocked by sending
    a request with an infinite stream of HTTP headers. Thanks to Youssef
    Rebahi-Gilbert for report."

For more details see:
https://bitbucket.org/tildeslash/monit/commits/tag/release-5-32-0

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-30 13:57:35 +00:00
Michael Tremer
7ce3223dd8 dvb-firmwares: Don't ship firmware that comes from linux-firmware
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-30 13:57:07 +00:00
Michael Tremer
f0dc569d79 alsa: Do not ship compressed firmware again
This package installs some firmware files. Since linux-firmware is now
compressed, files will no longer be overwritten, but this package will
put the uncompressed files next to the compressed ones.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-30 13:57:07 +00:00
Michael Tremer
31102a28b3 core167: Ship backup includes
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-30 13:55:36 +00:00
Peter Müller
73845df507 backup: Include proxy.pac
Fixes: #12814

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-30 13:54:51 +00:00
Michael Tremer
12cb09eb5e core167: Increment release version in update.sh
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-30 13:53:23 +00:00
Michael Tremer
e546e1038a Merge branch 'master' into next 2022-03-30 13:51:38 +00:00
Michael Tremer
916ca6d476 Rename Core Update 166 into 167
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-30 13:48:09 +00:00
Michael Tremer
21de246ef7 core166: Ship zlib
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-30 13:46:01 +00:00
Peter Müller
b2f72ba085 zlib: Pick up upstream patch for memory corruption fix
See: https://www.openwall.com/lists/oss-security/2022/03/24/1

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-30 13:44:51 +00:00
Michael Tremer
c68ecc0251 core166: Ship misc-progs
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-30 13:44:31 +00:00
Michael Tremer
713d681232 misc-progs: Set a reasonable default PATH variable
We have some scripts in /usr/local/bin which cannot be found by any
misc-progs which is fixed by this patch.

Fixes: #12811
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-30 13:43:41 +00:00
Michael Tremer
b7fc708ffc core166: Ship backup script
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-30 13:43:25 +00:00
Michael Tremer
b275771fdd backup: Only list files that exist
This will prevent tar from throwing any errors later on

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-30 13:43:25 +00:00
Michael Tremer
4f0e7f24f2 backup: Ignore any empty lines in backup include list
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-30 13:43:25 +00:00
Michael Tremer
13f6473a4f backup: Fix broken globbing expansion
This patch fixes globbing expansion in the backup include file list
which got broken in c7e0d73e7c.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Tested-by: Bernhard Bitsch <bernhard.bitsch@ipfire.org>
2022-03-30 13:43:25 +00:00
Michael Tremer
b7771d5861 core166: Start a new Core Update
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-30 13:43:19 +00:00
Peter Müller
3110d7a98f module-init-tools: Delete orphaned LFS file
This was dropped 2013 in commit ba109afd0d,
but the LFS file remained there.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-03-24 19:06:47 +00:00
Peter Müller
4eb92c5ab1 Core Update 166: Delete leftovers from LFS rootfile updates
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-03-24 19:05:35 +00:00
Peter Müller
729b27da0d Core Update 166: Ship zlib
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-03-24 18:59:48 +00:00
Peter Müller
37afa45661 zlib: Pick up upstream patch for memory corruption fix
See: https://www.openwall.com/lists/oss-security/2022/03/24/1

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-24 18:59:36 +00:00
Stefan Schantl
c55f5c8eaa rules.pl: Fix creating rules for location based groups.
The former used hash value only contains the country code when
a rule for a single country should be created.

In case a location group is used the hash value refers to the group name,
which does not work here.

The required country code is part of the processed string and can be omitted
from here. This works well for single codes and location groups, because those
are processed in a loop.

Fixes #12809.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Acked-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-23 17:15:18 +00:00
Stefan Schantl
abf148cebd rules.pl: Fix creating rules for location based groups.
The former used hash value only contains the country code when
a rule for a single country should be created.

In case a location group is used the hash value refers to the group name,
which does not work here.

The required country code is part of the processed string and can be omitted
from here. This works well for single codes and location groups, because those
are processed in a loop.

Fixes #12809.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Acked-by: Peter Müller <peter.mueller@ipfire.org>
2022-03-23 17:12:37 +00:00
Peter Müller
26926c4d12 firewall: Fix placement of HOSTILE chains
They were mistakenly placed after the IPS chains in commit
7b529f5417, but should be placed after the
connection tracking and before the IPS.

Fixes: #12815

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-23 16:12:16 +00:00
Michael Tremer
77e3829dc1 linux-firmware: Compress firmware on disk
This patch enabled that we can compress any firmware files on disk. This
will save some space since /lib/firmware is becoming larger with every
release.

From formerly 828MiB, this is now using ~349MiB which is a saving of
about 480MiB on disk. This is helping us a lot fighting to contain the
distribution to 2GB on /.

Some other firmware that is installed in other packages is not
compressed with this patch which is a bit sad, but potentially not worth
the effort.

In order to ship this change with a Core Update, it might be intuitive
to remove /lib/firmware first and then extract the new update with all
new files. However, I do not know if this all will compress as well as
before since now the files are already individually compressed. It might
be a challenge to ship this.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-23 16:11:14 +00:00
Peter Müller
247e97800d firewall: Fix placement of HOSTILE chains
They were mistakenly placed after the IPS chains in commit
7b529f5417, but should be placed after the
connection tracking and before the IPS.

Fixes: #12815

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-23 16:07:36 +00:00
Peter Müller
e68cfdb140 Core Update 166: Ship bind
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-03-23 09:42:57 +00:00
Matthias Fischer
5019469505 bind: Update to 9.16.27
For details see:
https://downloads.isc.org/isc/bind9/9.16.27/doc/arm/html/notes.html#notes-for-bind-9-16-27

"Security Fixes

    The rules for acceptance of records into the cache have been
    tightened to prevent the possibility of poisoning if forwarders send
    records outside the configured bailiwick. (CVE-2021-25220)

    ISC would like to thank Xiang Li, Baojun Liu, and Chaoyi Lu from
    Network and Information Security Lab, Tsinghua University, and
    Changgen Zou from Qi An Xin Group Corp. for bringing this
    vulnerability to our attention. [GL #2950]

    TCP connections with keep-response-order enabled could leave the TCP
    sockets in the CLOSE_WAIT state when the client did not properly
    shut down the connection. (CVE-2022-0396) [GL #3112]

Feature Changes

    DEBUG(1)-level messages were added when starting and ending the BIND
    9 task-exclusive mode that stops normal DNS operation (e.g. for
    reconfiguration, interface scans, and other events that require
    exclusive access to a shared resource). [GL #3137]

Bug Fixes

    The max-transfer-time-out and max-transfer-idle-out options were not
    implemented when the BIND 9 networking stack was refactored in 9.16.
    The missing functionality has been re-implemented and outgoing zone
    transfers now time out properly when not progressing. [GL #1897]

    TCP connections could hang indefinitely if the other party did not
    read sent data, causing the TCP write buffers to fill. This has been
    fixed by adding a “write” timer. Connections that are hung while
    writing now time out after the tcp-idle-timeout period has elapsed.
    [GL #3132]

    The statistics counter representing the current number of clients
    awaiting recursive resolution results (RecursClients) could
    be miscalculated in certain resolution scenarios, potentially
    causing the value of the counter to drop below zero. This has been
    fixed. [GL #3147]"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-23 09:42:41 +00:00
Peter Müller
b889a5004a Core Update 166: Ship rrdtool
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-03-23 09:42:17 +00:00
Matthias Fischer
24005371e1 rrdtool: Update to 1.8.0
For details see:
https://github.com/oetiker/rrdtool-1.x/releases/tag/v1.8.0

"Bugfixes

    python bindings: properly convert double values of rrd info
    failed to expand 'Py_UNUSED', Invalid usage when expanding 'Py_UNUSED'
    document --showtime in xport help output
    fix --use-nan-for-all-missing-data
    update rrdruby.pod
    add missing rrdruby.pod and rrdpython.pod to dist
    Set first_weekday to 0 (Sunday), when HAVE__NL_TIME_WEEK_1STDAY is not defined
    fix median calculation for all NaN inputs
    fix potential leak in xport during failure
    fix many warnings raised by Cppcheck
    fix many compiler warnings from latest gcc
    ensure proper initialization in rrd_daemon
    cleanup testsuite
    better testing
    avoid invalid read in rrd_client
    add symbols from rrdc to librrd
    Fix duplicate write_changes_to_disk() calls when HAVE_LIBRADOS is true and HAVE_MMAP is false
    documentation updates
    for SMIN example in docs
    fix for pyton3 compatibility
    freemem only for valid status <Christian Kr"oger>
    fix double meaning of time 0 as uninitialized value
    fix for zfs not supporting fallocate. this makes resize work on zfs
    add rrdrados.pod to dist
    fetch - do not call rrd_freemem on uninitialized pointers
    use separate pango fontmap per thread
    switch to python 3
    do not leak filename when opening a broken file
    fix leaks in rrdcached
    avoid segfault when flushing cache
    escape json in legend entries
    fix leak in xport
    make rrdcgi param parsing more robust
    fix race in journal_write"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-23 09:41:57 +00:00
Peter Müller
afd8dc466b Nmap: Update to 7.92
Please refer to https://nmap.org/changelog#7.92 for the changelog of
this version; it is too long to include it here.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-22 17:35:52 +00:00
Peter Müller
b5abd5ccd3 Core Update 166: There is no need for /dev/null in that GPG call
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-03-22 17:35:11 +00:00
Peter Müller
90f03efea5 Core Update 166: Introduce new 2022 Pakfire key
Cc: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-03-22 17:34:30 +00:00
Peter Müller
fa0a7c038c Core Update 166: Perform spring clean of orphaned files
On an IPFire installation that has been around since Core Update 110
(released April 28, 2017), these files have been identified as being
orphaned, comparing to a fresh installation of Core Update 164.

To avoid such a list of files agglomerating, persons responsible for a
Core Update should check whether an updated package contains deleted
files in its rootfile. If so, they should be deleted on existing systems
via update.sh as well.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-03-22 17:33:51 +00:00
Michael Tremer
28f659f75c strongswan: Remove redundant iptables rules
We used to create some iptables rules that permitted traffic to the
firewall from IPsec peers. This however doesn't work due to changes in
iana-etc and it looks like those rules are entirely absolete now.

This patch removes them which should not cause any functional changes.

Fixes: #12808
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Acked-by: Peter Müller <peter.mueller@ipfire.org>
2022-03-22 13:42:03 +00:00
Peter Müller
2188812cb0 credits: Run ./make.sh update-contributors
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-03-22 07:55:16 +00:00
Peter Müller
5a33fd9bc6 Nano: Braindead me overlooked the rootfiles were misplaced
This was introduced in b1c25d7a84, and
subsequently broke the nightly builds, and I failed to spot this in the
first place. :-/

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-03-22 07:51:17 +00:00
Peter Müller
7751dcccdd Core Update 166: Ship misc-progs
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-03-21 21:38:37 +00:00
Michael Tremer
136d91f346 misc-progs: Set a reasonable default PATH variable
We have some scripts in /usr/local/bin which cannot be found by any
misc-progs which is fixed by this patch.

Fixes: #12811
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-03-21 21:36:51 +00:00
Peter Müller
f1269489e8 Core Update 166: Drop Pakfire metadata for Nano, which is now part of the core system
Cc: Michael Tremer <michael.tremer@ipfire.org>
Cc: Jon Murphy <jon.murphy@ipfire.org>
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-03-21 19:10:06 +00:00
Peter Müller
451cf01677 Core Update 166: Ship and restart strongSwan
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-03-21 19:04:11 +00:00
Peter Müller
9d23bd75de strongSwan: Update to 5.9.5
Please refer to https://github.com/strongswan/strongswan/releases/tag/5.9.5 for this
versions' changelog.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-21 19:02:34 +00:00
Jon Murphy
b1c25d7a84 Nano: Move nano editor from packages to core system
- this will not change the default editor `vim`

Signed-off-by: Jon Murphy <jon.murphy@ipfire.org>
Acked-by: Peter Müller <peter.mueller@ipfire.org>
Acked-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-21 19:01:43 +00:00
Peter Müller
e6cbe7563f Improve README and CONTRIBUTING
- Strip tailing whitespaces
- Use shorter line length to make reading the files with editors or
  terminals without automatic line break easier
- Slightly improve the content of these files

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-03-21 13:47:58 +00:00
Jonatan Schlag
a5a5857865 Add Readme and Contributing guidelines.
For people which just have found our source code especially over GitHub
sometimes seem to have problems finding out how to contribute. This is
sad as it prevents us building a bigger community. While we have a wiki
which conatins a lot informations, this seems to get overlooked. I guess
a contributing fact is that most software today has these informations
contained in the repository itself. While I am not going to duplicate
the wiki to have these informations in our repository I still think it
is a good idea to have a short guide to lead new contributers into the
right direction.

Someone now could argue that new people just a too * to look at the
right place and that's why we do not need these documents. I do not
think so because of several points:

First people get used to look for information at a readme. I guees that
is because of the fact both GitHub and Gitlab place the readme so
prominently.

Second starting in a new project is hard. Finding the right place where
to start is also not easy as every project is different. Giving people a
short introduction what the first steps could be is definitely needed.

Signed-off-by: Jonatan Schlag <jonatan.schlag@ipfire.org>
2022-03-21 13:39:02 +00:00
Peter Müller
219a998412 Core Update 166: Drop old 2007 Pakfire key, and remove it from existing installations
It is not necessary to have this key present on IPFire systems anymore,
since it has not been in use for years, and we can expect systems to be
sufficiently up-to-date, so they no longer need to rely on old updates
or add-ons signed with this key.

Also, given the current key was generated in 2018, we should consider a
Pakfire key rollover soon.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Acked-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-21 11:46:36 +00:00