]> git.ipfire.org Git - people/stevee/ipfire-2.x.git/log
people/stevee/ipfire-2.x.git
3 years agostage2: Add database directory for ipblocklist feature.
Stefan Schantl [Sun, 10 Apr 2022 09:51:13 +0000 (11:51 +0200)] 
stage2: Add database directory for ipblocklist feature.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
3 years agocrontab: Add job for periodic ipblocklist updates.
Stefan Schantl [Sun, 10 Apr 2022 09:40:56 +0000 (11:40 +0200)] 
crontab: Add job for periodic ipblocklist updates.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
3 years agoipblocklist: Rootfile updates.
Tim FitzGeorge [Tue, 5 Apr 2022 03:34:00 +0000 (05:34 +0200)] 
ipblocklist: Rootfile updates.

Signed-off-by: Tim FitzGeorge <ipfr@tfitzgeorge.me.uk>
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
3 years agoconfigroot: Create ipblocklist related dir and settings file.
Tim FitzGeorge [Tue, 5 Apr 2022 03:32:51 +0000 (05:32 +0200)] 
configroot: Create ipblocklist related dir and settings file.

Signed-off-by: Tim FitzGeorge <ipfr@tfitzgeorge.me.uk>
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
3 years agoipblocklist-sources: New package.
Tim FitzGeorge [Tue, 5 Apr 2022 03:29:03 +0000 (05:29 +0200)] 
ipblocklist-sources: New package.

Placing the ipblocklist sources file as an own package, easily
allows to update this single file during a core update and to
keep the vendor details for the blocklists up-to-date.

Signed-off-by: Tim FitzGeorge <ipfr@tfitzgeorge.me.uk>
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
3 years agobackup: Add ipblocklist related files.
Tim FitzGeorge [Tue, 5 Apr 2022 03:08:21 +0000 (05:08 +0200)] 
backup: Add ipblocklist related files.

Signed-off-by: Tim FitzGeorge <ipfr@tfitzgeorge.me.uk>
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
3 years agoshowrequestfromblocklist.dat: Fix silly typos.
Stefan Schantl [Tue, 5 Apr 2022 03:02:30 +0000 (05:02 +0200)] 
showrequestfromblocklist.dat: Fix silly typos.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
3 years agoupdate-ipblocklists: Do not log the pid in syslog.
Stefan Schantl [Tue, 5 Apr 2022 02:57:19 +0000 (04:57 +0200)] 
update-ipblocklists: Do not log the pid in syslog.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
3 years agorules.pl: Refactor logic to handle the IP blocklist feature.
Stefan Schantl [Mon, 4 Apr 2022 19:43:49 +0000 (21:43 +0200)] 
rules.pl: Refactor logic to handle the IP blocklist feature.

* Fixes that the same chain would be created each time a firewall
reload is performed.

* Also fixes multiple log and drop rules inside the the BLOCKLIST_DROP
  chains after doing a firewall reload.

* Orphaned BLOCKLIST_DROP chains now will be flushed and removed in case
  the blocklist gets disabled or the entire feature will be swithed off.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
3 years agorules.pl: Add function to check if given firewall chain exists.
Stefan Schantl [Mon, 4 Apr 2022 19:43:20 +0000 (21:43 +0200)] 
rules.pl: Add function to check if given firewall chain exists.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
3 years agorules.pl: Fix typo when creating blocklist drop chains.
Stefan Schantl [Sun, 3 Apr 2022 12:15:48 +0000 (14:15 +0200)] 
rules.pl: Fix typo when creating blocklist drop chains.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
3 years agorules.pl: Check if the blocklist is part of the settings hash.
Stefan Schantl [Sun, 3 Apr 2022 12:14:41 +0000 (14:14 +0200)] 
rules.pl: Check if the blocklist is part of the settings hash.

Otherwise there will pop up some ugly notices on the command line and
the logs.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
3 years agofirewall: Add ipblocklist related chains.
Tim FitzGeorge [Sun, 3 Apr 2022 11:44:44 +0000 (13:44 +0200)] 
firewall: Add ipblocklist related chains.

Signed-off-by: Tim FitzGeorge <ipfr@tfitzgeorge.me.uk>
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
3 years agoshowrequestfromblocklist.dat: Modify regex for added space in
Rob Brewer [Sat, 5 Mar 2022 21:18:42 +0000 (21:18 +0000)] 
showrequestfromblocklist.dat: Modify regex for added space in
log-prefix.

Signed-off-by: Rob Brewer <rob.brewer@ipfire.org>
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
3 years agoipblocklist.dat: Do not rely on any theme settings.
Rob Brewer [Sun, 3 Apr 2022 08:55:34 +0000 (10:55 +0200)] 
ipblocklist.dat: Do not rely on any theme settings.

The support for themes has been removed since ages, so we
do not need this anymore and may crash the page.

Signed-off-by: Rob Brewer <rob.brewer@ipfire.org>
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
3 years agorules.pl: Add space at the end of the log prefix.
Rob Brewer [Sun, 3 Apr 2022 08:52:56 +0000 (10:52 +0200)] 
rules.pl: Add space at the end of the log prefix.

This improves the readabiliy when digging through the logs.

Signed-off-by: Rob Brewer <rob.brewer@ipfire.org>
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
3 years agoupdate-ipblocklist: Add code to reload updated blocklists.
Stefan Schantl [Mon, 7 Mar 2022 18:54:44 +0000 (19:54 +0100)] 
update-ipblocklist: Add code to reload updated blocklists.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
3 years agoipblocklist.cgi: Mark and display a notice about a required reload of
Stefan Schantl [Sun, 6 Mar 2022 20:16:07 +0000 (21:16 +0100)] 
ipblocklist.cgi: Mark and display a notice about a required reload of
the firewall.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
3 years agoipblocklist.cgi: Add better messages in error case.
Stefan Schantl [Sun, 6 Mar 2022 20:15:18 +0000 (21:15 +0100)] 
ipblocklist.cgi: Add better messages in error case.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
3 years agologs.cgi/log.dat: Allow to show logged ipblocklist messages.
Tim FitzGeorge [Sun, 6 Mar 2022 20:03:20 +0000 (21:03 +0100)] 
logs.cgi/log.dat: Allow to show logged ipblocklist messages.

Signed-off-by: Tim FitzGeorge <ipfr@tfitzgeorge.me.uk>
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
3 years agoMenu: Add ipblocklist entry to firewall menu.
Tim FitzGeorge [Sun, 6 Mar 2022 20:01:44 +0000 (21:01 +0100)] 
Menu: Add ipblocklist entry to firewall menu.

Signed-off-by: Tim FitzGeorge <ipfr@tfitzgeorge.me.uk>
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
3 years agoMenu: Add ipblocklist entry to log menu.
Tim FitzGeorge [Sun, 6 Mar 2022 19:58:19 +0000 (20:58 +0100)] 
Menu: Add ipblocklist entry to log menu.

Signed-off-by: Tim FitzGeorge <ipfr@tfitzgeorge.me.uk>
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
3 years agoipblocklists.dat: Remove uneccessary and broken module includes.
Rob Brewer [Sun, 6 Mar 2022 19:55:25 +0000 (20:55 +0100)] 
ipblocklists.dat: Remove uneccessary and broken module includes.

Signed-off-by: Rob Brewer <rob.brewer@ipfire.org>
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
3 years agoLanguage file update for ipblocklist
Tim FitzGeorge [Sun, 6 Mar 2022 19:53:07 +0000 (20:53 +0100)] 
Language file update for ipblocklist

Signed-off-by: Tim FitzGeorge <ipfr@tfitzgeorge.me.uk>
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
3 years agoipblacklist: WUI Log details page
Tim FitzGeorge [Mon, 27 Apr 2020 14:06:14 +0000 (15:06 +0100)] 
ipblacklist: WUI Log details page

Signed-off-by: Tim FitzGeorge <ipfr@tfitzgeorge.me.uk>
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
3 years agoipblocklist: WUI Log page
Tim FitzGeorge [Mon, 27 Apr 2020 14:05:16 +0000 (15:05 +0100)] 
ipblocklist: WUI Log page

Signed-off-by: Tim FitzGeorge <ipfr@tfitzgeorge.me.uk>
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
3 years agoipblocklist.cgi: Adjust CGI to work with backend from ipblocklist-functions.pl
Stefan Schantl [Sun, 6 Mar 2022 19:23:55 +0000 (20:23 +0100)] 
ipblocklist.cgi: Adjust CGI to work with backend from ipblocklist-functions.pl

* Slightly adjust code indention.
* Remove Java Script code for show/hiding.
* Remove unnedded functions.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
3 years agoipblocklist: WUI Settings page
Tim FitzGeorge [Mon, 27 Apr 2020 14:04:38 +0000 (15:04 +0100)] 
ipblocklist: WUI Settings page

Signed-off-by: Tim FitzGeorge <ipfr@tfitzgeorge.me.uk>
3 years agoipblocklist-update: Introduce script to automatically update blacklists.
Stefan Schantl [Sun, 6 Mar 2022 14:11:48 +0000 (15:11 +0100)] 
ipblocklist-update: Introduce script to automatically update blacklists.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
3 years agoipblocklist-functions.pl: Allow export of modified_file and
Stefan Schantl [Sun, 6 Mar 2022 14:09:58 +0000 (15:09 +0100)] 
ipblocklist-functions.pl: Allow export of modified_file and
blocklist_dir values.

They so easily can be accessed by other perl scripts.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
3 years agoipblocklist-functions.pl: Store the local time if no last modified could
Stefan Schantl [Sun, 6 Mar 2022 14:09:18 +0000 (15:09 +0100)] 
ipblocklist-functions.pl: Store the local time if no last modified could
be determined.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
3 years agoipblocklist-functions.pl: Add function to get the holdoff_rate of a
Tim FitzGeorge [Sun, 6 Mar 2022 14:07:17 +0000 (15:07 +0100)] 
ipblocklist-functions.pl: Add function to get the holdoff_rate of a
given list.

The function will return the rate in seconds based on the configured
rate value in the blocklist sources file and the given blocklist.

Signed-off-by: Tim FitzGeorge <ipfr@tfitzgeorge.me.uk>
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
3 years agorules.pl: Add code to deal with ipblocklists.
Stefan Schantl [Tue, 1 Mar 2022 16:36:51 +0000 (17:36 +0100)] 
rules.pl: Add code to deal with ipblocklists.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
3 years agoipblocklist-functions.pl: Abort and return code if a list is empty or
Stefan Schantl [Sat, 5 Mar 2022 09:01:24 +0000 (10:01 +0100)] 
ipblocklist-functions.pl: Abort and return code if a list is empty or
not parse-able.

In case the downloaded list is empty or the parser is not able to parse
it properly, the download_and_create_blocklist() function now exits and
will return "empty_list" as new error code.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
3 years agoipblocklist-functions.pl: Add helper function to proper calculate the
Tim FitzGeorge [Fri, 4 Mar 2022 21:11:48 +0000 (22:11 +0100)] 
ipblocklist-functions.pl: Add helper function to proper calculate the
hashsize.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
3 years agoipblocklist-functions.pl: Add parser of dshield.
Tim FitzGeorge [Fri, 4 Mar 2022 21:10:29 +0000 (22:10 +0100)] 
ipblocklist-functions.pl: Add parser of dshield.

This vendor has a different list format and therefore requires an
own parser.

Signed-off-by: Tim FitzGeorge <ipfr@tfitzgeorge.me.uk>
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
3 years agoipblocklist-functions.pl: Add parser to obtain IP or Net addresses from
Tim FitzGeorge [Fri, 4 Mar 2022 21:08:16 +0000 (22:08 +0100)] 
ipblocklist-functions.pl: Add parser to obtain IP or Net addresses from
a blocklist.

Signed-off-by: Tim FitzGeorge <ipfr@tfitzgeorge.me.uk>
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
3 years agoipblocklist-functions.pl: Add download_and_create_blocklist function.
Stefan Schantl [Fri, 4 Mar 2022 20:57:03 +0000 (21:57 +0100)] 
ipblocklist-functions.pl: Add download_and_create_blocklist function.

This function is responisible for downloading and converting the
blocklist into an ipset compatible format.

The only required argument is the blocklist (in upper letter format) which should be
performed. It automatically will setup an upstream proxy (if configured)
and grab the file specified in the blocklist vendor configuration hash.

There is a maximum amount of five attempts until the script gives up and
returns a "dl_error". In case the server responses with "Not Modified"
(Code 304) a "not_modified" will be returned.

If the blocklist successfully has been grabbed, the modification date
get stored for further purposes and the list content will be converted
and stored in an ipset compatible format.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Inspired-by: Tim FitzGeorge <ipfr@tfitzgeorge.me.uk>
3 years agoipblocklist-functions.pl: Add get_ipset_db_file() function.
Stefan Schantl [Tue, 1 Mar 2022 16:35:20 +0000 (17:35 +0100)] 
ipblocklist-functions.pl: Add get_ipset_db_file() function.

This function is used to generate the filename and full path
for a given blocklist name.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
3 years agoipblocklist-functions.pl: Initial commit.
Stefan Schantl [Tue, 1 Mar 2022 14:23:44 +0000 (15:23 +0100)] 
ipblocklist-functions.pl: Initial commit.

This library file will contain a collection of functions, which are
required to deal with the ipblocklist feature.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
3 years agoipblocklist: Add sources file.
Tim FitzGeorge [Tue, 1 Mar 2022 14:31:58 +0000 (15:31 +0100)] 
ipblocklist: Add sources file.

Signed-off-by: Tim FitzGeorge <ipfr@tfitzgeorge.me.uk>
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
3 years agorules.pl: Fix creating rules for location based groups.
Stefan Schantl [Wed, 23 Mar 2022 17:08:52 +0000 (18:08 +0100)] 
rules.pl: Fix creating rules for location based groups.

The former used hash value only contains the country code when
a rule for a single country should be created.

In case a location group is used the hash value refers to the group name,
which does not work here.

The required country code is part of the processed string and can be omitted
from here. This works well for single codes and location groups, because those
are processed in a loop.

Fixes #12809.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Acked-by: Peter Müller <peter.mueller@ipfire.org>
3 years agolinux-firmware: Compress firmware on disk
Michael Tremer [Tue, 22 Mar 2022 15:24:49 +0000 (15:24 +0000)] 
linux-firmware: Compress firmware on disk

This patch enabled that we can compress any firmware files on disk. This
will save some space since /lib/firmware is becoming larger with every
release.

From formerly 828MiB, this is now using ~349MiB which is a saving of
about 480MiB on disk. This is helping us a lot fighting to contain the
distribution to 2GB on /.

Some other firmware that is installed in other packages is not
compressed with this patch which is a bit sad, but potentially not worth
the effort.

In order to ship this change with a Core Update, it might be intuitive
to remove /lib/firmware first and then extract the new update with all
new files. However, I do not know if this all will compress as well as
before since now the files are already individually compressed. It might
be a challenge to ship this.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agofirewall: Fix placement of HOSTILE chains
Peter Müller [Wed, 23 Mar 2022 11:18:34 +0000 (11:18 +0000)] 
firewall: Fix placement of HOSTILE chains

They were mistakenly placed after the IPS chains in commit
7b529f5417254c68b6bd33732f30578182893d34, but should be placed after the
connection tracking and before the IPS.

Fixes: #12815
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agoCore Update 166: Ship bind
Peter Müller [Wed, 23 Mar 2022 09:42:57 +0000 (09:42 +0000)] 
Core Update 166: Ship bind

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
3 years agobind: Update to 9.16.27
Matthias Fischer [Tue, 22 Mar 2022 17:32:03 +0000 (18:32 +0100)] 
bind: Update to 9.16.27

For details see:
https://downloads.isc.org/isc/bind9/9.16.27/doc/arm/html/notes.html#notes-for-bind-9-16-27

"Security Fixes

    The rules for acceptance of records into the cache have been
    tightened to prevent the possibility of poisoning if forwarders send
    records outside the configured bailiwick. (CVE-2021-25220)

    ISC would like to thank Xiang Li, Baojun Liu, and Chaoyi Lu from
    Network and Information Security Lab, Tsinghua University, and
    Changgen Zou from Qi An Xin Group Corp. for bringing this
    vulnerability to our attention. [GL #2950]

    TCP connections with keep-response-order enabled could leave the TCP
    sockets in the CLOSE_WAIT state when the client did not properly
    shut down the connection. (CVE-2022-0396) [GL #3112]

Feature Changes

    DEBUG(1)-level messages were added when starting and ending the BIND
    9 task-exclusive mode that stops normal DNS operation (e.g. for
    reconfiguration, interface scans, and other events that require
    exclusive access to a shared resource). [GL #3137]

Bug Fixes

    The max-transfer-time-out and max-transfer-idle-out options were not
    implemented when the BIND 9 networking stack was refactored in 9.16.
    The missing functionality has been re-implemented and outgoing zone
    transfers now time out properly when not progressing. [GL #1897]

    TCP connections could hang indefinitely if the other party did not
    read sent data, causing the TCP write buffers to fill. This has been
    fixed by adding a “write” timer. Connections that are hung while
    writing now time out after the tcp-idle-timeout period has elapsed.
    [GL #3132]

    The statistics counter representing the current number of clients
    awaiting recursive resolution results (RecursClients) could
    be miscalculated in certain resolution scenarios, potentially
    causing the value of the counter to drop below zero. This has been
    fixed. [GL #3147]"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agoCore Update 166: Ship rrdtool
Peter Müller [Wed, 23 Mar 2022 09:42:17 +0000 (09:42 +0000)] 
Core Update 166: Ship rrdtool

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
3 years agorrdtool: Update to 1.8.0
Matthias Fischer [Tue, 22 Mar 2022 17:37:43 +0000 (18:37 +0100)] 
rrdtool: Update to 1.8.0

For details see:
https://github.com/oetiker/rrdtool-1.x/releases/tag/v1.8.0

"Bugfixes

    python bindings: properly convert double values of rrd info
    failed to expand 'Py_UNUSED', Invalid usage when expanding 'Py_UNUSED'
    document --showtime in xport help output
    fix --use-nan-for-all-missing-data
    update rrdruby.pod
    add missing rrdruby.pod and rrdpython.pod to dist
    Set first_weekday to 0 (Sunday), when HAVE__NL_TIME_WEEK_1STDAY is not defined
    fix median calculation for all NaN inputs
    fix potential leak in xport during failure
    fix many warnings raised by Cppcheck
    fix many compiler warnings from latest gcc
    ensure proper initialization in rrd_daemon
    cleanup testsuite
    better testing
    avoid invalid read in rrd_client
    add symbols from rrdc to librrd
    Fix duplicate write_changes_to_disk() calls when HAVE_LIBRADOS is true and HAVE_MMAP is false
    documentation updates
    for SMIN example in docs
    fix for pyton3 compatibility
    freemem only for valid status <Christian Kr"oger>
    fix double meaning of time 0 as uninitialized value
    fix for zfs not supporting fallocate. this makes resize work on zfs
    add rrdrados.pod to dist
    fetch - do not call rrd_freemem on uninitialized pointers
    use separate pango fontmap per thread
    switch to python 3
    do not leak filename when opening a broken file
    fix leaks in rrdcached
    avoid segfault when flushing cache
    escape json in legend entries
    fix leak in xport
    make rrdcgi param parsing more robust
    fix race in journal_write"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agoNmap: Update to 7.92
Peter Müller [Mon, 21 Mar 2022 21:30:57 +0000 (21:30 +0000)] 
Nmap: Update to 7.92

Please refer to https://nmap.org/changelog#7.92 for the changelog of
this version; it is too long to include it here.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agoCore Update 166: There is no need for /dev/null in that GPG call
Peter Müller [Tue, 22 Mar 2022 17:35:11 +0000 (17:35 +0000)] 
Core Update 166: There is no need for /dev/null in that GPG call

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
3 years agoCore Update 166: Introduce new 2022 Pakfire key
Peter Müller [Mon, 21 Mar 2022 18:56:06 +0000 (18:56 +0000)] 
Core Update 166: Introduce new 2022 Pakfire key

Cc: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
3 years agoCore Update 166: Perform spring clean of orphaned files
Peter Müller [Mon, 21 Mar 2022 15:35:22 +0000 (15:35 +0000)] 
Core Update 166: Perform spring clean of orphaned files

On an IPFire installation that has been around since Core Update 110
(released April 28, 2017), these files have been identified as being
orphaned, comparing to a fresh installation of Core Update 164.

To avoid such a list of files agglomerating, persons responsible for a
Core Update should check whether an updated package contains deleted
files in its rootfile. If so, they should be deleted on existing systems
via update.sh as well.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
3 years agostrongswan: Remove redundant iptables rules
Michael Tremer [Tue, 22 Mar 2022 10:42:51 +0000 (10:42 +0000)] 
strongswan: Remove redundant iptables rules

We used to create some iptables rules that permitted traffic to the
firewall from IPsec peers. This however doesn't work due to changes in
iana-etc and it looks like those rules are entirely absolete now.

This patch removes them which should not cause any functional changes.

Fixes: #12808
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Acked-by: Peter Müller <peter.mueller@ipfire.org>
3 years agocredits: Run ./make.sh update-contributors
Peter Müller [Tue, 22 Mar 2022 07:55:16 +0000 (07:55 +0000)] 
credits: Run ./make.sh update-contributors

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
3 years agoNano: Braindead me overlooked the rootfiles were misplaced
Peter Müller [Tue, 22 Mar 2022 07:51:17 +0000 (07:51 +0000)] 
Nano: Braindead me overlooked the rootfiles were misplaced

This was introduced in b1c25d7a8456b7ff05f23c461c623dc18fddbae4, and
subsequently broke the nightly builds, and I failed to spot this in the
first place. :-/

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
3 years agoCore Update 166: Ship misc-progs
Peter Müller [Mon, 21 Mar 2022 21:38:37 +0000 (21:38 +0000)] 
Core Update 166: Ship misc-progs

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
3 years agomisc-progs: Set a reasonable default PATH variable
Michael Tremer [Mon, 21 Mar 2022 19:07:06 +0000 (19:07 +0000)] 
misc-progs: Set a reasonable default PATH variable

We have some scripts in /usr/local/bin which cannot be found by any
misc-progs which is fixed by this patch.

Fixes: #12811
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
3 years agoCore Update 166: Drop Pakfire metadata for Nano, which is now part of the core system
Peter Müller [Mon, 21 Mar 2022 19:10:06 +0000 (19:10 +0000)] 
Core Update 166: Drop Pakfire metadata for Nano, which is now part of the core system

Cc: Michael Tremer <michael.tremer@ipfire.org>
Cc: Jon Murphy <jon.murphy@ipfire.org>
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
3 years agoCore Update 166: Ship and restart strongSwan
Peter Müller [Mon, 21 Mar 2022 19:04:11 +0000 (19:04 +0000)] 
Core Update 166: Ship and restart strongSwan

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
3 years agostrongSwan: Update to 5.9.5
Peter Müller [Mon, 21 Mar 2022 16:33:19 +0000 (16:33 +0000)] 
strongSwan: Update to 5.9.5

Please refer to https://github.com/strongswan/strongswan/releases/tag/5.9.5 for this
versions' changelog.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agoNano: Move nano editor from packages to core system
Jon Murphy [Thu, 17 Mar 2022 17:06:29 +0000 (12:06 -0500)] 
Nano: Move nano editor from packages to core system

- this will not change the default editor `vim`

Signed-off-by: Jon Murphy <jon.murphy@ipfire.org>
Acked-by: Peter Müller <peter.mueller@ipfire.org>
Acked-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agoImprove README and CONTRIBUTING
Peter Müller [Mon, 21 Mar 2022 13:47:58 +0000 (13:47 +0000)] 
Improve README and CONTRIBUTING

- Strip tailing whitespaces
- Use shorter line length to make reading the files with editors or
  terminals without automatic line break easier
- Slightly improve the content of these files

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
3 years agoAdd Readme and Contributing guidelines.
Jonatan Schlag [Tue, 8 Mar 2022 11:18:24 +0000 (12:18 +0100)] 
Add Readme and Contributing guidelines.

For people which just have found our source code especially over GitHub
sometimes seem to have problems finding out how to contribute. This is
sad as it prevents us building a bigger community. While we have a wiki
which conatins a lot informations, this seems to get overlooked. I guess
a contributing fact is that most software today has these informations
contained in the repository itself. While I am not going to duplicate
the wiki to have these informations in our repository I still think it
is a good idea to have a short guide to lead new contributers into the
right direction.

Someone now could argue that new people just a too * to look at the
right place and that's why we do not need these documents. I do not
think so because of several points:

First people get used to look for information at a readme. I guees that
is because of the fact both GitHub and Gitlab place the readme so
prominently.

Second starting in a new project is hard. Finding the right place where
to start is also not easy as every project is different. Giving people a
short introduction what the first steps could be is definitely needed.

Signed-off-by: Jonatan Schlag <jonatan.schlag@ipfire.org>
3 years agoCore Update 166: Drop old 2007 Pakfire key, and remove it from existing installations
Peter Müller [Mon, 21 Mar 2022 11:44:48 +0000 (11:44 +0000)] 
Core Update 166: Drop old 2007 Pakfire key, and remove it from existing installations

It is not necessary to have this key present on IPFire systems anymore,
since it has not been in use for years, and we can expect systems to be
sufficiently up-to-date, so they no longer need to rely on old updates
or add-ons signed with this key.

Also, given the current key was generated in 2018, we should consider a
Pakfire key rollover soon.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Acked-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agoPostfix: Update to 3.7.0
Peter Müller [Wed, 2 Mar 2022 21:14:53 +0000 (21:14 +0000)] 
Postfix: Update to 3.7.0

See https://www.postfix.org/announcements/postfix-3.7.0.html for this
version's release announcement.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
3 years agocore166: Ship /etc/inittab.d
Michael Tremer [Mon, 21 Mar 2022 08:51:51 +0000 (08:51 +0000)] 
core166: Ship /etc/inittab.d

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agosysvinit: Update rootfile to fix bug 12797
Adolf Belka [Thu, 17 Mar 2022 21:27:15 +0000 (22:27 +0100)] 
sysvinit: Update rootfile to fix bug 12797

- In sysvinit-2.97 (Dec2020) a patch was added which allows init to load configuration data
   from files stored in /etc/inittab.d/
   This modification would have come in with Core Update 155.
- When sysvinit was updated from 2.88dsf to 2.98 the /etc/inittab.d/ directory in the
   rootfile was commented out.
  Sysvinit looks to see if there are any files in inittab.d but as that directory does not
   exist then the message "No inittab.d directory found" is written during the boot and is
   also shown in the log summary.
- This patch uncomments the directory so that it will be present. No files will be placed
   in it but its prescence will stop the error message being shown during boot.

Fixes: Bug #12797
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agocore166: Drop openvpn-ccd-convert script from all installations
Michael Tremer [Mon, 21 Mar 2022 08:50:56 +0000 (08:50 +0000)] 
core166: Drop openvpn-ccd-convert script from all installations

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agoDrop orphaned ovpn-ccd-convert script
Peter Müller [Sat, 19 Mar 2022 16:35:35 +0000 (16:35 +0000)] 
Drop orphaned ovpn-ccd-convert script

This script appeared in the rootfiles for Core Updates 65 and 66, being
released in late 2012 and early 2013. It is not used elsewhere, and
there is no sense in keeping it around on IPFire installations.

Should this patch be accepted, a corresponding 'rm' statement is
necessary in the update.sh script of the Core Update it will go into.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agocore166: Ship psmisc
Michael Tremer [Sun, 20 Mar 2022 15:21:25 +0000 (15:21 +0000)] 
core166: Ship psmisc

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agopsmisc: Update to 23.4
Peter Müller [Sun, 20 Mar 2022 13:46:47 +0000 (13:46 +0000)] 
psmisc: Update to 23.4

Please refer to https://gitlab.com/psmisc/psmisc/-/tags for an overview
of the changes happened since version 22.2 .

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agocore166: Ship connections.cgi
Michael Tremer [Sun, 20 Mar 2022 15:20:13 +0000 (15:20 +0000)] 
core166: Ship connections.cgi

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agoconnections.cgi: Update links to SANS ISC
Peter Müller [Sun, 20 Mar 2022 10:48:46 +0000 (10:48 +0000)] 
connections.cgi: Update links to SANS ISC

Fixes: #12783
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agolibseccomp: Bump package version
Peter Müller [Sun, 20 Mar 2022 10:41:28 +0000 (10:41 +0000)] 
libseccomp: Bump package version

Fixes: #12807
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agocore166: Ship apache2
Michael Tremer [Thu, 17 Mar 2022 16:45:00 +0000 (16:45 +0000)] 
core166: Ship apache2

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agoapache: Update to 2.4.53
Matthias Fischer [Wed, 16 Mar 2022 16:09:12 +0000 (17:09 +0100)] 
apache: Update to 2.4.53

For details see:
https://dlcdn.apache.org/httpd/CHANGES_2.4.53

Short summary of the most important SECURITY changes:

"Changes with Apache 2.4.53

  *) SECURITY: CVE-2022-23943: mod_sed: Read/write beyond bounds
     (cve.mitre.org)
     Out-of-bounds Write vulnerability in mod_sed of Apache HTTP
     Server allows an attacker to overwrite heap memory with possibly
     attacker provided data.
     This issue affects Apache HTTP Server 2.4 version 2.4.52 and
     prior versions.
     Credits: Ronald Crane (Zippenhop LLC)

  *) SECURITY: CVE-2022-22721: core: Possible buffer overflow with
     very large or unlimited LimitXMLRequestBody (cve.mitre.org)
     If LimitXMLRequestBody is set to allow request bodies larger
     than 350MB (defaults to 1M) on 32 bit systems an integer
     overflow happens which later causes out of bounds writes.
     This issue affects Apache HTTP Server 2.4.52 and earlier.
     Credits: Anonymous working with Trend Micro Zero Day Initiative

  *) SECURITY: CVE-2022-22720: HTTP request smuggling vulnerability
     in Apache HTTP Server 2.4.52 and earlier (cve.mitre.org)
     Apache HTTP Server 2.4.52 and earlier fails to close inbound
     connection when errors are encountered discarding the request
     body, exposing the server to HTTP Request Smuggling
     Credits: James Kettle <james.kettle portswigger.net>

  *) SECURITY: CVE-2022-22719: mod_lua Use of uninitialized value of
     in r:parsebody (cve.mitre.org)
     A carefully crafted request body can cause a read to a random
     memory area which could cause the process to crash.
     This issue affects Apache HTTP Server 2.4.52 and earlier.
     Credits: Chamal De Silva
     ..."

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agofr: Update French translation
Stéphane Pautrel [Thu, 17 Mar 2022 15:50:16 +0000 (15:50 +0000)] 
fr: Update French translation

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agoreiserfsprogs: Drop redundant rootfile for aarch64
Michael Tremer [Wed, 16 Mar 2022 15:42:16 +0000 (15:42 +0000)] 
reiserfsprogs: Drop redundant rootfile for aarch64

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agomake.sh: Bump CORE
Michael Tremer [Wed, 16 Mar 2022 15:36:38 +0000 (15:36 +0000)] 
make.sh: Bump CORE

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agoids-functions.pl: Skip deleted.rules files
Stefan Schantl [Tue, 15 Mar 2022 17:25:57 +0000 (18:25 +0100)] 
ids-functions.pl: Skip deleted.rules files

These rulefiles are used by various providers as a kind of reference and
to store rules which have been taken out for correctness, performance
reasons or because of other reasons.

Fixes #12794.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agocore166: Ship openssl
Michael Tremer [Tue, 15 Mar 2022 17:51:59 +0000 (17:51 +0000)] 
core166: Ship openssl

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agoopenssl: Update to 1.1.1n
Michael Tremer [Tue, 15 Mar 2022 17:51:13 +0000 (17:51 +0000)] 
openssl: Update to 1.1.1n

OpenSSL Security Advisory [15 March 2022]
============================================

Infinite loop in BN_mod_sqrt() reachable when parsing certificates
(CVE-2022-0778)
==================================================================================

Severity: High

The BN_mod_sqrt() function, which computes a modular square root,
contains
a bug that can cause it to loop forever for non-prime moduli.

Internally this function is used when parsing certificates that contain
elliptic curve public keys in compressed form or explicit elliptic curve
parameters with a base point encoded in compressed form.

It is possible to trigger the infinite loop by crafting a certificate
that
has invalid explicit curve parameters.

Since certificate parsing happens prior to verification of the
certificate
signature, any process that parses an externally supplied certificate
may thus
be subject to a denial of service attack. The infinite loop can also be
reached when parsing crafted private keys as they can contain explicit
elliptic curve parameters.

Thus vulnerable situations include:

 - TLS clients consuming server certificates
 - TLS servers consuming client certificates
 - Hosting providers taking certificates or private keys from customers
 - Certificate authorities parsing certification requests from
   subscribers
 - Anything else which parses ASN.1 elliptic curve parameters

Also any other applications that use the BN_mod_sqrt() where the
attacker
can control the parameter values are vulnerable to this DoS issue.

In the OpenSSL 1.0.2 version the public key is not parsed during initial
parsing of the certificate which makes it slightly harder to trigger
the infinite loop. However any operation which requires the public key
from the certificate will trigger the infinite loop. In particular the
attacker can use a self-signed certificate to trigger the loop during
verification of the certificate signature.

This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0.  It was
addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022.

OpenSSL 1.0.2 users should upgrade to 1.0.2zd (premium support customers
only)
OpenSSL 1.1.1 users should upgrade to 1.1.1n
OpenSSL 3.0 users should upgrade to 3.0.2

This issue was reported to OpenSSL on the 24th February 2022 by Tavis
Ormandy
from Google. The fix was developed by David Benjamin from Google and
Tomáš Mráz
from OpenSSL.

Note
====

OpenSSL 1.0.2 is out of support and no longer receiving public updates.
Extended
support is available for premium support customers:
https://www.openssl.org/support/contracts.html

OpenSSL 1.1.0 is out of support and no longer receiving updates of any
kind.
It is affected by the issue.

Users of these versions should upgrade to OpenSSL 3.0 or 1.1.1.

References
==========

URL for this Security Advisory:
https://www.openssl.org/news/secadv/20220315.txt

Note: the online version of the advisory may be updated with additional
details
over time.

For details of OpenSSL severity classifications please see:
https://www.openssl.org/policies/secpolicy.html

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agocore166: Rebuild IPS rules
Michael Tremer [Mon, 14 Mar 2022 15:54:04 +0000 (15:54 +0000)] 
core166: Rebuild IPS rules

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agoids-functions.pl: Do not longer extract all rulefiles in archive.
Stefan Schantl [Sun, 13 Mar 2022 19:27:25 +0000 (20:27 +0100)] 
ids-functions.pl: Do not longer extract all rulefiles in archive.

Only extract rulefiles which are located in a rules directory and/or in the archive
root.

This prevents us from extracting experimental or binary rules etc. which
often are located in corresponding sub-directories.

Reference: #12794.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agocore166: Ship changes files
Michael Tremer [Mon, 14 Mar 2022 15:25:12 +0000 (15:25 +0000)] 
core166: Ship changes files

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agocore166: Ship dracut
Michael Tremer [Mon, 14 Mar 2022 15:24:19 +0000 (15:24 +0000)] 
core166: Ship dracut

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agofirewall: Make blocking all traffic impossible on HOSTILE
Michael Tremer [Fri, 11 Mar 2022 14:43:11 +0000 (14:43 +0000)] 
firewall: Make blocking all traffic impossible on HOSTILE

The current setup can fail and block all traffic on RED if the RETURN
rules could not be created.

This can happen when the kernel fails to load the ipset module, as it is
the case after upgrading to a new kernel. Restarting the firewall will
cause that the system is being cut off the internet.

This design now changes that if those rules cannot be created, the
DROP_HOSTILE feature is just inactive, but it would not disrupt any
traffic.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Daniel Weismüller <daniel.weismueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agorebuild-initrd: Drop unused script
Michael Tremer [Fri, 11 Mar 2022 14:43:41 +0000 (14:43 +0000)] 
rebuild-initrd: Drop unused script

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agodracut: Remove hard-coded configuration from command line
Michael Tremer [Fri, 11 Mar 2022 14:43:40 +0000 (14:43 +0000)] 
dracut: Remove hard-coded configuration from command line

This is now configured globally in dracut

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agodracut: Install an IPFire system configuration file
Michael Tremer [Fri, 11 Mar 2022 14:43:39 +0000 (14:43 +0000)] 
dracut: Install an IPFire system configuration file

This file contains our custom settings:

* Always load microcodes as early as possible

* We now compress the initrd using Zstandard which is substanstically
  faster than XZ, but offers better compression ratios

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agomake.sh: Build acl/attr earlier for coreutils to link against
Michael Tremer [Fri, 11 Mar 2022 14:43:38 +0000 (14:43 +0000)] 
make.sh: Build acl/attr earlier for coreutils to link against

dracut requires the cp command to be compiled with support for extended
attributes (xattr) which we didn't have due to the required libraries
not being available to coreutils at build time.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agodracut: Update to 056
Michael Tremer [Fri, 11 Mar 2022 14:43:37 +0000 (14:43 +0000)] 
dracut: Update to 056

This one was desperately in need of an upgrade, as dracut 038 was
released 8 YEARS ago. Hence, the changelog since is way too long to
include it here; refer to https://git.kernel.org/pub/scm/boot/dracut/dracut.git/tree/NEWS.md
for details.

See also: #12773

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agoids: Fixed typo in ruleset-sources
Matthias Fischer [Sat, 12 Mar 2022 13:27:58 +0000 (14:27 +0100)] 
ids: Fixed typo in ruleset-sources

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agoids.cgi: Added topic for ruleset actions
Matthias Fischer [Sat, 12 Mar 2022 13:31:44 +0000 (14:31 +0100)] 
ids.cgi: Added topic for ruleset actions

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agoids.cgi: Fixed trivial typos in comment
Matthias Fischer [Sat, 12 Mar 2022 13:34:00 +0000 (14:34 +0100)] 
ids.cgi: Fixed trivial typos in comment

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agoRevert "aws-cli: Update to version 1.22.64"
Michael Tremer [Fri, 11 Mar 2022 16:34:36 +0000 (16:34 +0000)] 
Revert "aws-cli: Update to version 1.22.64"

This reverts commit e42665e594e1c910ef9c09d63691c9e14ee75487.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agosamba: Update rootfile on aarch64
Michael Tremer [Fri, 11 Mar 2022 16:05:28 +0000 (16:05 +0000)] 
samba: Update rootfile on aarch64

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agostage2: Update rootfiles
Michael Tremer [Fri, 11 Mar 2022 16:04:09 +0000 (16:04 +0000)] 
stage2: Update rootfiles

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agoAdd backup/include for cups
Daniel Weismueller [Fri, 11 Mar 2022 12:57:01 +0000 (13:57 +0100)] 
Add backup/include for cups

To solve the behavior discribed in bug 12404 I added the path
 /var/ipfire/cups to the backup.

Signed-off-by: Daniel Weismueller <daniel.weismueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agocore166: Ship u-boot for aarch64
Michael Tremer [Thu, 10 Mar 2022 10:46:13 +0000 (10:46 +0000)] 
core166: Ship u-boot for aarch64

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>