]> git.ipfire.org Git - ipfire-2.x.git/log
ipfire-2.x.git
2 months agoshadow: Update to version 4.14.5
Adolf Belka [Wed, 28 Feb 2024 19:31:37 +0000 (20:31 +0100)] 
shadow: Update to version 4.14.5

- Update from version 4.14.3 to 4.14.5
- Update of rootfile not required
- Changelog
    4.14.5
Build system:
    Fix regression introduced in 4.14.4, due to a typo. chgpasswd had
    been deleted from a Makefile variable, but it should have been
    chpasswd.
    4.14.4
    Build system:
        Link correctly with libdl.
        Install pam configs for chpasswd(8) and newusers(8) when using
        ./configure --with-libpam --disable-account-tools-setuid.
    libshadow:
        Fix build error (parameter name omitted).
        Fix off-by-one bug.
        Remove warning.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 months agosamba: Update to version 4.19.5
Adolf Belka [Wed, 28 Feb 2024 19:31:36 +0000 (20:31 +0100)] 
samba: Update to version 4.19.5

- Update from version 4.19.3 to 4.19.5
- Update of rootfile not required
- Changelog
    4.19.5
   * BUG 13688: Windows 2016 fails to restore previous version of a file from a
     shadow_copy2 snapshot.
   * BUG 15549: Symlinks on AIX are broken in 4.19 (and a few version before
     that).
   * BUG 12421: Fake directory create times has no effect.
   * BUG 15550: ctime mixed up with mtime by smbd.
   * BUG 15548: samba-gpupdate --rsop fails if machine is not in a site.
   * BUG 15557: gpupdate: The root cert import when NDES is not available is
     broken.
   * BUG 15552: samba-gpupdate should print a useful message if cepces-submit
     can't be found.
   * BUG 15558: samba-gpupdate logging doesn't work.
   * BUG 15555: smbpasswd reset permissions only if not 0600.
    4.19.4
   * BUG 13577: net changesecretpw cannot set the machine account password if
     secrets.tdb is empty.
   * BUG 15540: For generating doc, take, if defined, env XML_CATALOG_FILES.
   * BUG 15541: Trivial C typo in nsswitch/winbind_nss_netbsd.c.
   * BUG 15542: vfs_linux_xfs is incorrectly named.
   * BUG 15377: systemd stumbled over copyright-message at smbd startup.
   * BUG 15505: Following intermediate abolute share-local symlinks is broken.
   * BUG 15523: ctdb RELEASE_IP causes a crash in release_ip if a connection to
     a non-public address disconnects first.
   * BUG 15544: shadow_copy2 broken when current fileset's directories are
     removed.
   * BUG 15377: systemd stumbled over copyright-message at smbd startup.
   * BUG 15523: ctdb RELEASE_IP causes a crash in release_ip if a connection to
     a non-public address disconnects first.
   * BUG 15534: smbd does not detect ctdb public ipv6 addresses for multichannel
     exclusion.
   * BUG 15469: 'force user = localunixuser' doesn't work if 'allow trusted
     domains = no' is set.
   * BUG 15525: smbget debug logging doesn't work.
   * BUG 15532: smget: username in the smburl and interactive password entry
     doesn't work.
   * BUG 15538: smbget auth function doesn't set values for password prompt
     correctly.
   * BUG 15523: ctdb RELEASE_IP causes a crash in release_ip if a connection to
     a non-public address disconnects first.
   * BUG 15440: Unable to copy and write files from clients to Ceph cluster via
     SMB Linux gateway with Ceph VFS module.
   * BUG 15547: Multichannel refresh network information.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 months agocore185: Ship libpng
Michael Tremer [Thu, 29 Feb 2024 10:24:10 +0000 (10:24 +0000)] 
core185: Ship libpng

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 months agolibpng: Update to version 1.6.42
Adolf Belka [Wed, 28 Feb 2024 19:31:35 +0000 (20:31 +0100)] 
libpng: Update to version 1.6.42

- Update from version 1.4.61 to 1.4.62
- Update of rootfile not required
- Changelog
    1.6.42
  Fixed the implementation of the macro function png_check_sig().
    This was an API regression, introduced in libpng-1.6.41.
    (Reported by Matthieu Darbois)

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 months agocore185: Ship libgpg-error
Michael Tremer [Thu, 29 Feb 2024 10:23:17 +0000 (10:23 +0000)] 
core185: Ship libgpg-error

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 months agolibgpg-error: Update to version 1.48
Adolf Belka [Wed, 28 Feb 2024 19:31:34 +0000 (20:31 +0100)] 
libgpg-error: Update to version 1.48

- Update from version 1.47 to 1.48
- Update of rootfile
- Changelog
    1.48
 * New configure option --with-libtool-modification.  [T6619]
 * New option parser flag to detect commands given without a double
   dash.  There is also the new meta command "command-mode" to set
   this flag via a config file.  [T6978]
 * Added an es_fopen mode flag "sequential" with support on Windows.
   [rE7a42ff0ec9]
 * Added an es_fopen mode flag "wipe" to cleanup internal buffers at
   close time.  [T6954]
 * New function gpgrt_wipememory.  [T6964]
 * Improvements to setenv on Windows.  [rE89e53ad90f]
 * Fixed call to estream-printf string filters.  [T6737]
 * Many improvements to the yat2m tool.
 * Updates to the build system.
 * Interface changes relative to the 1.47 release:
 ARGPARSE_FLAG_COMMAND          NEW.
 gpgrt_wipememory               NEW.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 months agocore185: Ship libffi
Michael Tremer [Thu, 29 Feb 2024 10:22:40 +0000 (10:22 +0000)] 
core185: Ship libffi

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 months agolibffi: Update to version 3.4.6
Adolf Belka [Wed, 28 Feb 2024 19:31:33 +0000 (20:31 +0100)] 
libffi: Update to version 3.4.6

- Update from version 3.4.4 to 3.4.6
- Update of rootfile
- Changelog
    3.4.6
Fix long double regression on mips64 and alpha.
    3.4.5
Add support for wasm32.
Add support for aarch64 branch target identification (bti).
Add support for ARCv3: ARC32 & ARC64.
Add support for HPPA64, and many HPPA fixes.
Add support for Haikuos on PowerPC.
Fixes for AIX, loongson, MIPS, power, sparc64, and x86 Darwin.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 months agogptfdisk: Update to version 1.0.10
Adolf Belka [Wed, 28 Feb 2024 19:31:32 +0000 (20:31 +0100)] 
gptfdisk: Update to version 1.0.10

- Update from version 1.0.9 to 1.0.10
- Update of rootfile not required
- Changelog
    1.0.10
- Fixed problem that caused sgdisk to crash with errors about being unable
  to read the disk's partition table when compiled with the latest popt
  (commit 740, which is pre-release as I type; presumably version 1.19 and
  later once released).
- Updated guid.cc to deal with minor change in libuuid.
- Fixed potential NULL derefernce bug in sgdisk. Thanks to Damian Kurek
  for this fix.
- The partition number of "0" can now be used to reference newly-created
  partitions when the --largest-new=0 option to sgdisk is used. Thanks to
  David Joaquín Shourabi Porcel for this improvement.
- Make explicit casts in gptcurses.cc to eliminate compiler warnings about
  mis-matched types in printw() statements.
- Minor code cleanup based on valgrind analysis.
- In previous versions, GPT fdisk accepted only integer values for partition
  start points, end points, and sizes, and it interpreted decimal values
  incorrectly. That is, if you typed "+9.5G" as the partition end point,
  you'd end up with something just 9 sectors in size. This version now
  truncates decimal numbers to their integral values, so you'd get a 9 GiB
  partition instead.
- Changes to optimize disk handling, particularly on Windows, courtesy of
  Frediano Ziglio.
- Added numerous new partition type codes from Discoverable Partitions
  Specification
  (https://uapi-group.org/specifications/specs/discoverable_partitions_specification/).
- Added new sgdisk -k/--move-backup-table and gdisk k (on the experts' menu)
  option to relocate the backup partition table. This is the counterpart of
  the sgdisk -j/--move-main-table and gdisk j (on the experts' menu) option
  to move the main partition table. This code comes from Niklas Gollenstede.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 months agogit: Update to version 2.44.0
Adolf Belka [Wed, 28 Feb 2024 19:31:31 +0000 (20:31 +0100)] 
git: Update to version 2.44.0

- Update from version 2.43.0 to 2.44.0
- Update of rootfile
- Changelog is too large to include here.
   See the files 2.43.1.txt, 2.43.2.txt, 2.43.3.txt & 2.44.0.txt in the source tarball in
    directory Documentation/RelNotes

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 months agoen.pl: Correct typo of marsians instead of martians
Adolf Belka [Wed, 28 Feb 2024 19:31:30 +0000 (20:31 +0100)] 
en.pl: Correct typo of marsians instead of martians

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 months agoMerge remote-tracking branch 'ms/wsdd' into next
Michael Tremer [Wed, 28 Feb 2024 16:44:06 +0000 (16:44 +0000)] 
Merge remote-tracking branch 'ms/wsdd' into next

2 months agocore185: Ship backup.pl and ovpnmain.cgi
Michael Tremer [Wed, 28 Feb 2024 16:41:22 +0000 (16:41 +0000)] 
core185: Ship backup.pl and ovpnmain.cgi

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 months agobackup.pl: Fixes bug#13404 - Clear out OpenVPN certs before doing restore
Adolf Belka [Mon, 26 Feb 2024 15:05:01 +0000 (16:05 +0100)] 
backup.pl: Fixes bug#13404 - Clear out OpenVPN certs before doing restore

- Existing situation is if four new client connections are created and then it is decided
   to restore to an earlier stage the new certficates will be in the certs directory but
   not usable from the WUI page as they are no longer shown in the client connection table
   as that now shows the ones from the restored backup.
- This patch clears the /var/ipfire/ovpn/certs/ directory before restoring the contents
   of the backup so that the certs directory only holds what was in the backup.

Fixes: Bug#13404
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 months agoovpnmain.cgi: Fixes bug#13404 - prevents certs being saved if common name is already...
Adolf Belka [Mon, 26 Feb 2024 15:05:00 +0000 (16:05 +0100)] 
ovpnmain.cgi: Fixes bug#13404 - prevents certs being saved if common name is already used

- This was fixed by moving the code for checking if the common name is already used, to
   the same location as the code for checking if the connection name is already used.
- Tested out on vm testbed and confirmed that the certificates are not created and the
   index.txt not updated if the common name is flagged as already being used. If the
   entry is changed to use a new CN and Save pressed then the certs are saved and the
   index.txt updated. If Cancel is pressed then no certs are saved and index.txt is not
   updated.

Fixes: Bug#13404
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 months agocore185: Ship dhcp.cgi
Michael Tremer [Wed, 28 Feb 2024 16:29:51 +0000 (16:29 +0000)] 
core185: Ship dhcp.cgi

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 months agodhcp.cgi: Fixes bug#11774 - allows dhcp option of array of integer 8
Adolf Belka [Sat, 24 Feb 2024 14:51:14 +0000 (15:51 +0100)] 
dhcp.cgi: Fixes bug#11774 - allows dhcp option of array of integer 8

- This v2 version is to correct the bug number. I entered a wronn bug number in the first
   version
- This extends the allowed options from just array of ip-address to also include
   integer 8 or integer 16 or integer 32.
- Tested out on vm testbed. The array of integer 8 (or 16 or 32) is acceptewd by the dhcp
   options section. I am not able to test out that the function actually works as I don't
   have any dhcp situation set up to use that capability.
- Records or array of records is still not included. It was only an expansion of the array
   of section to include integers.

Fixes: bug#11774
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 months agocore185: Ship dns.cgi
Michael Tremer [Wed, 28 Feb 2024 16:11:04 +0000 (16:11 +0000)] 
core185: Ship dns.cgi

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 months agodns.cgi: Fixes bug#12395 - German umlauts not correctly displayed in remarks
Adolf Belka [Wed, 28 Feb 2024 13:35:26 +0000 (14:35 +0100)] 
dns.cgi: Fixes bug#12395 - German umlauts not correctly displayed in remarks

- If Freifunk München e.V. is entered as a remark it gets converted to
   Freifunk München e.V.
- This is because cleanhtml is used on the remark text before saving it to the file  and
   the HTML::Entities::encode_entities command that is run on that remark text encodes all
   higher bit characters as unsafe characters and replaces them with their HTML entity
   representation.
- Have tested out the remark with a range of different characters with diacritical marks
   and all of the ones tested were re-written.
- The use of the cleanhtml makes sense when used on URL's or on text that is going to be
   printed as part of the HTML code for a page but it doesn't seem to make sense for text
   used in a remark.
- The cleanhtml function is only used on the remark text in dns.cgi and not on any other
   entries on the page.
- Removing the call to the cleanhtml function results in the German umlauts being printed
   in the remark section.
- Many of the WUI pages have the cleanhtml function used on remark or comment text.
- fwhosts.cgi does not use cleanhtml anywhere. So all its remark sections work with
   characters with diacritical marks.
- If this patch is accepted, I will then submit patches for the other WUI pages where
   characters with diacritical marks are re-written in remark or comment sections.

Fixes: Bug#12395
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 months agoCore Update 185: Ship elfutils
Adolf Belka [Mon, 26 Feb 2024 08:33:04 +0000 (09:33 +0100)] 
Core Update 185: Ship elfutils

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 months agomympd/mpfire: restart mpd after instalation
Arne Fitzenreiter [Sun, 25 Feb 2024 17:14:56 +0000 (18:14 +0100)] 
mympd/mpfire: restart mpd after instalation

both addons need a restart of mpd after they are installed

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 months agompd: fix database path in initskript
Arne Fitzenreiter [Sun, 25 Feb 2024 08:49:10 +0000 (09:49 +0100)] 
mpd: fix database path in initskript

i had forgotten this path after moving the database from
/var/ipfire/mpfire to /var/ipfire/mpd

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 months agomympd: remove mpfire from deps
Arne Fitzenreiter [Sun, 25 Feb 2024 01:05:10 +0000 (02:05 +0100)] 
mympd: remove mpfire from deps

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 months agolibmpdclient: update to 2.22
Arne Fitzenreiter [Sun, 25 Feb 2024 01:03:24 +0000 (02:03 +0100)] 
libmpdclient: update to 2.22

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 months agomympd: update to 14.0.3
Arne Fitzenreiter [Sun, 25 Feb 2024 01:03:01 +0000 (02:03 +0100)] 
mympd: update to 14.0.3

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 months agompc: update to 0.35
Arne Fitzenreiter [Sun, 25 Feb 2024 01:02:27 +0000 (02:02 +0100)] 
mpc: update to 0.35

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 months agompd: update to 0.23.15
Arne Fitzenreiter [Sat, 24 Feb 2024 20:08:06 +0000 (21:08 +0100)] 
mpd: update to 0.23.15

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 months agompd: move scripts and config from mpfire to mpd
Arne Fitzenreiter [Sat, 24 Feb 2024 15:39:59 +0000 (16:39 +0100)] 
mpd: move scripts and config from mpfire to mpd

this allows to use mpd without mpfire installed.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 months agocore185: fix rpi4 firmare names
Arne Fitzenreiter [Mon, 19 Feb 2024 18:58:51 +0000 (19:58 +0100)] 
core185: fix rpi4 firmare names

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 months agolang: Update French translation
Stéphane Pautrel [Mon, 19 Feb 2024 10:52:18 +0000 (10:52 +0000)] 
lang: Update French translation

- Added strings concerning extrahd, hostile network logs and ids, Reiserfs deletion notification
- improvement of various existing strings

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 months agocore185: Ship ca-certificates
Michael Tremer [Mon, 19 Feb 2024 10:16:33 +0000 (10:16 +0000)] 
core185: Ship ca-certificates

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 months agoca-certificates: Update root CA certificates bundle
Peter Müller [Sat, 17 Feb 2024 21:01:00 +0000 (21:01 +0000)] 
ca-certificates: Update root CA certificates bundle

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 months agocpufrequtils: hide output on disabled cores.
Arne Fitzenreiter [Sun, 18 Feb 2024 10:38:29 +0000 (11:38 +0100)] 
cpufrequtils: hide output on disabled cores.

We disable cores if the are affected by some cpu vulnerabilities
this cores report errors if you try to change the settings.
So only print the output for core0 and hide it for all cores.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 months agolibloc: Embed more recent database
Peter Müller [Sat, 17 Feb 2024 20:48:10 +0000 (20:48 +0000)] 
libloc: Embed more recent database

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 months agoCore Update 185: Remove orphaned uncritical non-library files
Peter Müller [Sat, 17 Feb 2024 20:45:41 +0000 (20:45 +0000)] 
Core Update 185: Remove orphaned uncritical non-library files

See: https://patchwork.ipfire.org/project/ipfire/patch/c21b6fed-28cd-47ce-8a99-b36b37672a15@ipfire.org/

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 months agoCore Update 185: Delete orphaned linux-firmware files
Peter Müller [Sat, 17 Feb 2024 20:42:28 +0000 (20:42 +0000)] 
Core Update 185: Delete orphaned linux-firmware files

See: https://patchwork.ipfire.org/project/ipfire/patch/c21b6fed-28cd-47ce-8a99-b36b37672a15@ipfire.org/

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 months agoCore Update 185: Ensure correct permissions of /etc/sudoers.d/
Peter Müller [Sat, 17 Feb 2024 20:40:39 +0000 (20:40 +0000)] 
Core Update 185: Ensure correct permissions of /etc/sudoers.d/

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 months agoCore Update 185: Ship forgotten linux-firmware files
Peter Müller [Sat, 17 Feb 2024 20:39:41 +0000 (20:39 +0000)] 
Core Update 185: Ship forgotten linux-firmware files

See: https://patchwork.ipfire.org/project/ipfire/patch/c21b6fed-28cd-47ce-8a99-b36b37672a15@ipfire.org/

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 months agoCore Update 185: Restart ntp
Peter Müller [Sat, 17 Feb 2024 20:37:04 +0000 (20:37 +0000)] 
Core Update 185: Restart ntp

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 months agoCore Update 185: Ship libcap and all packages dependant on it
Peter Müller [Sat, 17 Feb 2024 20:35:02 +0000 (20:35 +0000)] 
Core Update 185: Ship libcap and all packages dependant on it

See: https://patchwork.ipfire.org/project/ipfire/patch/c21b6fed-28cd-47ce-8a99-b36b37672a15@ipfire.org/

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 months agortl8812au: fix module compression
Arne Fitzenreiter [Sat, 17 Feb 2024 18:46:34 +0000 (19:46 +0100)] 
rtl8812au: fix module compression

the kernel cannot load the compressed module so fix compression
parameters.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
3 months agocpufrequtils: fix initskript for amd-pstate
Arne Fitzenreiter [Fri, 16 Feb 2024 15:17:47 +0000 (16:17 +0100)] 
cpufrequtils: fix initskript for amd-pstate

the initskript loads a test-modul for amd-pstate (which traces on intel)
and off course reports errors if firmware settings are missing.

this also fix the error at start because also amd-pstate doesn't support
ondemand mode.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
3 months agoruleset-sources: removal of PT Attack & Secureworks + addition of ThreatFox
Adolf Belka [Thu, 15 Feb 2024 12:58:35 +0000 (13:58 +0100)] 
ruleset-sources: removal of PT Attack & Secureworks + addition of ThreatFox

- The PT Attack ruleset has not been updated since 2021 and made read-only in 2022
   The PT Attack website no longer has any reference to Suricata Rulesets. The PT Attack
   ruleset is being removed.
- The Secureworks three rulesets are no longer available. The website path gives a 404
   error. No mention of Suricata rulesets in the Secureworks website. The Secureworks three
   rulesets are being removed.
- ThreatFox ruleset has been added to the list. Both a plain and archive version of the
   rules are available but the plain version is being regularly updated while the archive
   version was last updated 5 days ago. So this patch has implemented the plain version.
- All above was discussed in the January Developers Conference call.
- Tested out on my vm testbed. I had PT Attack selected as one of the providers. As
   mentioned by Stefan removing PT Attack means it is not available in the list of
   providers but the provider stays in the providers table but with the line shown in red.
   I will update the wiki to mention the red highlight and what it means.

Suggested-by: Stefan Schantl <stefan.schantl@ipfire.org>
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 months agoMerge branch 'master' into next
Michael Tremer [Fri, 16 Feb 2024 12:29:05 +0000 (12:29 +0000)] 
Merge branch 'master' into next

3 months agofreeradius: Increment PAK_VER & ship freeradius to link to the updated libssl version
Adolf Belka [Thu, 15 Feb 2024 20:47:57 +0000 (21:47 +0100)] 
freeradius: Increment PAK_VER & ship freeradius to link to the updated libssl version

- OpenSSL was updated to 3.1.4 in CU181 and to 3.2.1 in CU183 but in both cases freeradius
   was not incremented to cause it to be shipped.
- This patch increments the freeradius PAK_VER to ensure it will be shipped.

Fixes: Bug#13590
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 months agoMerge remote-tracking branch 'origin/next' into next
Michael Tremer [Wed, 14 Feb 2024 19:07:30 +0000 (19:07 +0000)] 
Merge remote-tracking branch 'origin/next' into next

3 months agoMerge branch 'master' into next
Michael Tremer [Wed, 14 Feb 2024 19:06:35 +0000 (19:06 +0000)] 
Merge branch 'master' into next

3 months agofiles: Ship collectd.conf for bug#12981
Adolf Belka [Sun, 11 Feb 2024 13:19:48 +0000 (14:19 +0100)] 
files: Ship collectd.conf for bug#12981

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 months agocore185: Ship unbound and BIND again
Michael Tremer [Wed, 14 Feb 2024 19:04:48 +0000 (19:04 +0000)] 
core185: Ship unbound and BIND again

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 months agoMerge branch 'master' into next
Michael Tremer [Wed, 14 Feb 2024 19:03:52 +0000 (19:03 +0000)] 
Merge branch 'master' into next

3 months agographs.pl: Fixes graph failure when the DROP_HOSTILE directory is missing
Adolf Belka [Wed, 14 Feb 2024 10:34:36 +0000 (11:34 +0100)] 
graphs.pl: Fixes graph failure when the DROP_HOSTILE directory is missing

- If a fresh install is done then only the DROP_HOSTILE_IN & DROP_HOSTILE_OUT
   rrd directories are created.
- With the DROP_HOSTILE directory missing then when the fwhits graph is updated an error
   message is caused by the inability to open the required files.
- This patch adds an if/else loop into the fwhits graph code to deal with the two cases
   of the DROP_HOSTILE being present or not depending on the history and if a backup with
   logs has been restored from when DROP_HOSTILE was in use.
- Tested on vm testbed and created a historical line for the hostile data when it was not
   split
- There might be a simpler or better approach than this but it was the only option I
   could identify. I couldn't find anything about being able to use if loops within the
   RRD::Graph loop

Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 months agocore184: Ship unbound
Michael Tremer [Wed, 14 Feb 2024 19:01:25 +0000 (19:01 +0000)] 
core184: Ship unbound

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 months agounbound: Update to 1.19.1
Matthias Fischer [Wed, 14 Feb 2024 16:24:52 +0000 (17:24 +0100)] 
unbound: Update to 1.19.1

For details see:
https://nlnetlabs.nl/projects/unbound/download/#unbound-1-19-1

"Bug Fixes

    Fix CVE-2023-50387, DNSSEC verification complexity can be exploited
    to exhaust CPU resources and stall DNS resolvers.
    Fix CVE-2023-50868, NSEC3 closest encloser proof can exhaust CPU."

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 months agounbound 1.19.1: Fix for forgotten rootfile
Matthias Fischer [Wed, 14 Feb 2024 16:34:10 +0000 (17:34 +0100)] 
unbound 1.19.1: Fix for forgotten rootfile

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 months agocore184: Ship bind
Michael Tremer [Wed, 14 Feb 2024 19:00:03 +0000 (19:00 +0000)] 
core184: Ship bind

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 months agobind: Update to 9.16.48
Matthias Fischer [Wed, 14 Feb 2024 16:43:12 +0000 (17:43 +0100)] 
bind: Update to 9.16.48

For details see:
https://downloads.isc.org/isc/bind9/9.16.48/doc/arm/html/notes.html#notes-for-bind-9-16-48

Fixes several CVEs.

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 months agoThe IPFire time service has moved to time.ipfire.org
Michael Tremer [Wed, 14 Feb 2024 11:52:36 +0000 (11:52 +0000)] 
The IPFire time service has moved to time.ipfire.org

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 months agomake.sh: Bump toolchain version
Michael Tremer [Wed, 14 Feb 2024 11:51:33 +0000 (11:51 +0000)] 
make.sh: Bump toolchain version

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 months agotransmission: add menuentry to transmission webgui
Arne Fitzenreiter [Sun, 11 Feb 2024 12:33:39 +0000 (13:33 +0100)] 
transmission: add menuentry to transmission webgui

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
3 months agomympd: update to 14.0.1
Arne Fitzenreiter [Sun, 11 Feb 2024 10:27:48 +0000 (11:27 +0100)] 
mympd: update to 14.0.1

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
3 months agomake.sh: Compile with minimal debug information
Michael Tremer [Mon, 5 Feb 2024 16:47:35 +0000 (16:47 +0000)] 
make.sh: Compile with minimal debug information

In IPFire 2, we don't make any use out of the debug information.
Therefore we can tell the compiler to generate as minimal debug
information as possible in order to have a faster compilation process.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 months agomake.sh: Build with _FORTIFY_SOURCE=3
Michael Tremer [Mon, 5 Feb 2024 16:46:36 +0000 (16:46 +0000)] 
make.sh: Build with _FORTIFY_SOURCE=3

This will require that we re-ship everything.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 months agovim: Don't try to build with custom _FORTIFY_SOURCE
Michael Tremer [Mon, 5 Feb 2024 16:46:06 +0000 (16:46 +0000)] 
vim: Don't try to build with custom _FORTIFY_SOURCE

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 months agomympd: Don't overwrite our own hardening flags
Michael Tremer [Mon, 5 Feb 2024 16:45:38 +0000 (16:45 +0000)] 
mympd: Don't overwrite our own hardening flags

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 months agomultipath-tools: Don't overwrite our hardening flags
Michael Tremer [Mon, 5 Feb 2024 16:45:06 +0000 (16:45 +0000)] 
multipath-tools: Don't overwrite our hardening flags

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 months agovdr: add menu entry for vdr website
Arne Fitzenreiter [Sat, 10 Feb 2024 11:53:22 +0000 (12:53 +0100)] 
vdr: add menu entry for vdr website

we had discussed this on december telco but it is not so
easy because our menusystem only shows entry's existing cgi's.
so i add a cgi redirect to http://$ENV{SERVER_ADDR}:3000
this add the entry under pakfire and also to service page.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 months agocore185: Ship suricata
Michael Tremer [Sat, 10 Feb 2024 11:59:03 +0000 (11:59 +0000)] 
core185: Ship suricata

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 months agosuricata: Update to 7.0.3
Michael Tremer [Sat, 10 Feb 2024 11:58:18 +0000 (11:58 +0000)] 
suricata: Update to 7.0.3

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 months agosuricata: Update to version 7.0.2
Adolf Belka [Tue, 6 Feb 2024 21:27:33 +0000 (22:27 +0100)] 
suricata: Update to version 7.0.2

- Update from version 6.0.15 to 7.0.2
- Update of rootfile
- suricata 7.0.2 requires libhtp >= 0.5.45
   it also requires libelf.so.1 for execution. Previous suricata versions only required
   libelf for building. libelf or elfutils are not mentioned anywhere in the changelog
- Without elfutils available during starting then suricata fails to start due to
   libelf.so.1 not being available.
- Tested out suricata7 with elfutils on my vm testbed and it successfully started.
- The suricata-5.0.8 patch has been removed as it got applied to configure.ac but this
   is not available in suricata-7.0.2. It looks like that patch was never actually used in
   suricata as all the builds I checked used the configure file from the source tarball
   and the configure was never created by running autoconf on the configure.ac
- Changelog is too large to include here. Details can be found in the ChangeLog file in
   the source tarball

Fixes: Bug#13516
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 months agoclamav: Update to 1.3.0
Matthias Fischer [Fri, 9 Feb 2024 12:09:54 +0000 (13:09 +0100)] 
clamav: Update to 1.3.0

For details see:
https://blog.clamav.net/2023/11/clamav-130-122-105-released.html

Excerpts from changelog:

"Major changes

    Added support for extracting and scanning attachments found in
    Microsoft OneNote section files. OneNote parsing will be enabled by
    default, but may be optionally disabled using one of the following
    options:
    a. The clamscan command line option: --scan-onenote=no,
    b. The clamd.conf config option: ScanOneNote no,
    c. The libclamav scan option options.parse &= ~CL_SCAN_PARSE_ONENOTE;,
    d. A signature change to the daily.cfg dynamic configuration (DCONF).

Other improvements

    Fixed issue when building ClamAV on the Haiku (BeOS-like) operating
    system. Patch courtesy of Luca D'Amico

    ClamD: When starting, ClamD will now check if the directory specified
    by TemporaryDirectory in clamd.conf exists. If it doesn't, ClamD will
    print an error message and will exit with exit code 1. Patch courtesy
    of Andrew Kiggins.

    CMake: If configured to build static libraries, CMake will now also
    install the libclamav_rust, libclammspack, libclamunrar_iface, and
    libclamunrar static libraries required by libclamav.
    Note: These libraries are all linked into the clamscan, clamd, sigtool,
    and freshclam programs, which is why they did not need to be installed
    to function. However, these libraries would be required if you wish to
    build some other program that uses the libclamav static library.
    Added file type recognition for compiled Python (`.pyc`) files.

      The file type appears as a string parameter for these callback
      functions:

      - clcb_pre_cache
      - clcb_pre_scan
      - clcb_file_inspection

      When scanning a `.pyc` file, the `type` parameter will now show

      "CL_TYPE_PYTHON_COMPILED" instead of "CL_TYPE_BINARY_DATA".

    Improved support for decrypting PDFs with empty passwords.

    Assorted minor improvements and typo fixes.

Bug fixes

    Fixed a warning when scanning some HTML files.

    Fixed an issue decrypting some PDF's with an empty password.

    ClamOnAcc: Fixed an infinite loop when a watched directory does not
    exist.

    ClamOnAcc: Fixed an infinite loop when a file has been deleted before a
    scan.
    Patch courtesy of gsuehiro.

    Fixed a possible crash when processing VBA files on HP-UX/IA 64bit.
    Patch courtesy of Albert Chin-A-Young.

    ClamConf: Fixed an issue printing `MaxScanSize` introduced with the
    change to allow a `MaxScanSize` greater than 4 GB.
    Fix courtesy of teoberi.

    Fixed an issue building a ClamAV RPM in some configurations.
    The issue was caused by faulty CMake logic that intended to create an
    empty database directory during the installation."

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 months agocore185: Ship glibc
Michael Tremer [Sat, 10 Feb 2024 11:51:54 +0000 (11:51 +0000)] 
core185: Ship glibc

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 months agoglibc: Update to 2.39
Michael Tremer [Wed, 7 Feb 2024 15:44:50 +0000 (15:44 +0000)] 
glibc: Update to 2.39

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 months agocore185: Ship binutils
Michael Tremer [Sat, 10 Feb 2024 11:49:23 +0000 (11:49 +0000)] 
core185: Ship binutils

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 months agobinutils: Update to 2.42
Michael Tremer [Tue, 6 Feb 2024 15:56:30 +0000 (15:56 +0000)] 
binutils: Update to 2.42

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 months agoipfire-netboot: Update iPXE to version 0cc0f47
Michael Tremer [Tue, 6 Feb 2024 15:54:42 +0000 (15:54 +0000)] 
ipfire-netboot: Update iPXE to version 0cc0f47

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 months agoStart Core Update 185
Michael Tremer [Sat, 10 Feb 2024 11:47:13 +0000 (11:47 +0000)] 
Start Core Update 185

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 months agoMerge branch 'next'
Michael Tremer [Sat, 10 Feb 2024 11:43:56 +0000 (11:43 +0000)] 
Merge branch 'next'

3 months agocore183: Ship suricata core183 v2.29-core183
Michael Tremer [Fri, 9 Feb 2024 14:15:32 +0000 (14:15 +0000)] 
core183: Ship suricata

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 months agosuricata: Update to 6.0.16
Michael Tremer [Fri, 9 Feb 2024 11:30:38 +0000 (11:30 +0000)] 
suricata: Update to 6.0.16

  https://redmine.openinfosecfoundation.org/versions/201

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 months agolibhtp: Update to 0.5.46
Michael Tremer [Fri, 9 Feb 2024 11:33:23 +0000 (11:33 +0000)] 
libhtp: Update to 0.5.46

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 months agoinstaller: Fail if the bootloader could not be installed
Michael Tremer [Fri, 9 Feb 2024 12:02:11 +0000 (12:02 +0000)] 
installer: Fail if the bootloader could not be installed

If GRUB could not be installed during installation, the installer
continued without reporting the error to the user.

This change will make the installer fail.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 months agocore184: Ship suricata & libhtp
Michael Tremer [Fri, 9 Feb 2024 11:39:02 +0000 (11:39 +0000)] 
core184: Ship suricata & libhtp

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 months agolibhtp: Update to 0.5.46
Michael Tremer [Fri, 9 Feb 2024 11:33:23 +0000 (11:33 +0000)] 
libhtp: Update to 0.5.46

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 months agosuricata: Update to 6.0.16
Michael Tremer [Fri, 9 Feb 2024 11:30:38 +0000 (11:30 +0000)] 
suricata: Update to 6.0.16

  https://redmine.openinfosecfoundation.org/versions/201

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 months agocore184: Ship squid
Michael Tremer [Fri, 9 Feb 2024 11:26:55 +0000 (11:26 +0000)] 
core184: Ship squid

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 months agosquid: Update to 6.7
Matthias Fischer [Wed, 7 Feb 2024 17:37:23 +0000 (18:37 +0100)] 
squid: Update to 6.7

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
For details see:
https://github.com/squid-cache/squid/commits/v6

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 months agocore184: Ship expat
Michael Tremer [Fri, 9 Feb 2024 11:25:19 +0000 (11:25 +0000)] 
core184: Ship expat

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 months agoexpat: Update to version 2.6.0
Adolf Belka [Wed, 7 Feb 2024 11:13:19 +0000 (12:13 +0100)] 
expat: Update to version 2.6.0

- Update from version 2.5.0 to 2.6.0
- Update of rootfile
- This update fixes two CVE's. Not sure if IPFire would be vulnerable or not but safer
   to update anyway.
- Changelog
    2.6.0
        Security fixes:
      #789 #814  CVE-2023-52425 -- Fix quadratic runtime issues with big tokens
                   that can cause denial of service, in partial where
                   dealing with compressed XML input.  Applications
                   that parsed a document in one go -- a single call to
                   functions XML_Parse or XML_ParseBuffer -- were not affected.
                   The smaller the chunks/buffers you use for parsing
                   previously, the bigger the problem prior to the fix.
                   Backporters should be careful to no omit parts of
                   pull request #789 and to include earlier pull request #771,
                   in order to not break the fix.
           #777  CVE-2023-52426 -- Fix billion laughs attacks for users
                   compiling *without* XML_DTD defined (which is not common).
                   Users with XML_DTD defined have been protected since
                   Expat >=2.4.0 (and that was CVE-2013-0340 back then).
        Bug fixes:
            #753  Fix parse-size-dependent "invalid token" error for
                    external entities that start with a byte order mark
            #780  Fix NULL pointer dereference in setContext via
                    XML_ExternalEntityParserCreate for compilation with
                    XML_DTD undefined
       #812 #813  Protect against closing entities out of order
        Other changes:
            #723  Improve support for arc4random/arc4random_buf
       #771 #788  Improve buffer growth in XML_GetBuffer and XML_Parse
       #761 #770  xmlwf: Support --help and --version
       #759 #770  xmlwf: Support custom buffer size for XML_GetBuffer and read
            #744  xmlwf: Improve language and URL clickability in help output
            #673  examples: Add new example "element_declarations.c"
            #764  Be stricter about macro XML_CONTEXT_BYTES at build time
            #765  Make inclusion to expat_config.h consistent
       #726 #727  Autotools: configure.ac: Support --disable-maintainer-mode
    #678 #705 ..
  #706 #733 #792  Autotools: Sync CMake templates with CMake 3.26
            #795  Autotools: Make installation of shipped man page doc/xmlwf.1
                    independent of docbook2man availability
            #815  Autotools|CMake: Add missing -DXML_STATIC to pkg-config file
                    section "Cflags.private" in order to fix compilation
                    against static libexpat using pkg-config on Windows
       #724 #751  Autotools|CMake: Require a C99 compiler
                    (a de-facto requirement already since Expat 2.2.2 of 2017)
            #793  Autotools|CMake: Fix PACKAGE_BUGREPORT variable
       #750 #786  Autotools|CMake: Make test suite require a C++11 compiler
            #749  CMake: Require CMake >=3.5.0
            #672  CMake: Lowercase off_t and size_t to help a bug in Meson
            #746  CMake: Sort xmlwf sources alphabetically
            #785  CMake|Windows: Fix generation of DLL file version info
            #790  CMake: Build tests/benchmark/benchmark.c as well for
                    a build with -DEXPAT_BUILD_TESTS=ON
       #745 #757  docs: Document the importance of isFinal + adjust tests
                    accordingly
            #736  docs: Improve use of "NULL" and "null"
            #713  docs: Be specific about version of XML (XML 1.0r4)
                    and version of C (C99); (XML 1.0r5 will need a sponsor.)
            #762  docs: reference.html: Promote function XML_ParseBuffer more
            #779  docs: reference.html: Add HTML anchors to XML_* macros
            #760  docs: reference.html: Upgrade to OK.css 1.2.0
       #763 #739  docs: Fix typos
            #696  docs|CI: Use HTTPS URLs instead of HTTP at various places
    #669 #670 ..
    #692 #703 ..
       #733 #772  Address compiler warnings
       #798 #800  Address clang-tidy warnings
       #775 #776  Version info bumped from 9:10:8 (libexpat*.so.1.8.10)
                    to 10:0:9 (libexpat*.so.1.9.0); see https://verbump.de/
                    for what these numbers do
        Infrastructure:
       #700 #701  docs: Document security policy in file SECURITY.md
            #766  docs: Improve parse buffer variables in-code documentation
    #674 #738 ..
    #740 #747 ..
  #748 #781 #782  Refactor coverage and conformance tests
       #714 #716  Refactor debug level variables to unsigned long
            #671  Improve handling of empty environment variable value
                    in function getDebugLevel (without visible user effect)
    #755 #774 ..
    #758 #783 ..
       #784 #787  tests: Improve test coverage with regard to parse chunk size
  #660 #797 #801  Fuzzing: Improve fuzzing coverage
       #367 #799  Fuzzing|CI: Start running OSS-Fuzz fuzzing regression tests
       #698 #721  CI: Resolve some Travis CI leftovers
            #669  CI: Be robust towards absence of Git tags
       #693 #694  CI: Set permissions to "contents: read" for security
            #709  CI: Pin all GitHub Actions to specific commits for security
            #739  CI: Reject spelling errors using codespell
            #798  CI: Enforce clang-tidy clean code
    #773 #808 ..
       #809 #810  CI: Upgrade Clang from 15 to 18
            #796  CI: Start using Clang's Control Flow Integrity sanitizer
  #675 #720 #722  CI: Adapt to breaking changes in GitHub Actions Ubuntu images
            #689  CI: Adapt to breaking changes in Clang/LLVM Debian packaging
            #763  CI: Adapt to breaking changes in codespell
            #803  CI: Adapt to breaking changes in Cppcheck

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 months agolibvirt: Don't build for riscv64
Michael Tremer [Wed, 7 Feb 2024 11:21:49 +0000 (11:21 +0000)] 
libvirt: Don't build for riscv64

There seems to be some problem that this package does not build from
source, but as we don't currently have any hardware that supports thise,
there is no point in debugging it.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 months agocore184: Ship vpnmain.cgi
Michael Tremer [Wed, 7 Feb 2024 11:09:50 +0000 (11:09 +0000)] 
core184: Ship vpnmain.cgi

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 months agovpnmain.cgi: Add option to regenerate the host certificate
Michael Tremer [Tue, 30 Jan 2024 17:45:44 +0000 (17:45 +0000)] 
vpnmain.cgi: Add option to regenerate the host certificate

This is necessary since we now have a much shorter lifetime for the host
certificate. However, it is complicated to do this is which is why we
are copying the previous certificate and generate a new CSR. This is
then signed.

A caveat of this patch is that we do not rollover the key.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 months agovpnmain.cgi: Return the entire error message if OpenSSL fails
Michael Tremer [Tue, 30 Jan 2024 17:45:43 +0000 (17:45 +0000)] 
vpnmain.cgi: Return the entire error message if OpenSSL fails

The function did not evaluate the return code which is why it used a
hack to figure out if some output is an error or not.

This is being fixed in this commit and the entire output is being
returned if the return code is non-zero.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 months agovpnmain.cgi: Do not use a bad source for randomness
Michael Tremer [Tue, 30 Jan 2024 17:45:42 +0000 (17:45 +0000)] 
vpnmain.cgi: Do not use a bad source for randomness

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 months agocore184: Ship HOSTILE IN/OUT changes
Michael Tremer [Wed, 7 Feb 2024 11:05:08 +0000 (11:05 +0000)] 
core184: Ship HOSTILE IN/OUT changes

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 months agofirewall: Improve labelling of hostile networks hits
Michael Tremer [Tue, 6 Feb 2024 18:17:26 +0000 (18:17 +0000)] 
firewall: Improve labelling of hostile networks hits

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 months agofirewall: graphs: Add a line for the total number of hostile hits
Michael Tremer [Tue, 6 Feb 2024 18:11:48 +0000 (18:11 +0000)] 
firewall: graphs: Add a line for the total number of hostile hits

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 months agooptionsfw.cgi: Move Firewall Options Drop commands to before the logging section
Adolf Belka [Sun, 21 Jan 2024 11:45:53 +0000 (12:45 +0100)] 
optionsfw.cgi: Move Firewall Options Drop commands to before the logging section

- Moved the Firewall Options Drop commands to before the logging section, as discussed
   at January 2024 Video Call.

Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 months agographs.pl: Fixes bug12981 - Creates in and outgoing drop hostile graph entries
Adolf Belka [Sun, 21 Jan 2024 11:45:52 +0000 (12:45 +0100)] 
graphs.pl: Fixes bug12981 - Creates in and outgoing drop hostile graph entries

- This v3 version of the patch set splits the single hostile networks graph entry into
   incoming hostile networks and outgoing hostile networks entries.

Fixes: bug12981
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 months agocollectd.conf: Fix bug12981 - This creates in and out drop hostile data collection
Adolf Belka [Sun, 21 Jan 2024 11:45:51 +0000 (12:45 +0100)] 
collectd.conf: Fix bug12981 - This creates in and out drop hostile data collection

- In this v3 version of the patch set the splitting of drop hostile logging into incoming
   and outgoing logging means that the data collection and graphs need to have drop hostile
   also split into incoming and outgoing.

Fixes: bug12981
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 months agoen.pl: Fixes bug12981 - adds english language input for choice of drop hostile logging
Adolf Belka [Sun, 21 Jan 2024 11:45:50 +0000 (12:45 +0100)] 
en.pl: Fixes bug12981 - adds english language input for choice of drop hostile logging

- In this v3 version have added translations for hostile networks in and hostile
   networks out and log drop hostile in and log drop hostile out.

Fixes: bug12981
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>