]> git.ipfire.org Git - ipfire-2.x.git/log
ipfire-2.x.git
2 years agocore161: remove python2 module from collectd
Arne Fitzenreiter [Wed, 13 Oct 2021 16:36:59 +0000 (16:36 +0000)] 
core161: remove python2 module from collectd

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agocore161: now use 2to3 of python3
Arne Fitzenreiter [Wed, 13 Oct 2021 16:33:43 +0000 (16:33 +0000)] 
core161: now use 2to3 of python3

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agocore161: remove python2 at update
Arne Fitzenreiter [Wed, 13 Oct 2021 12:33:09 +0000 (12:33 +0000)] 
core161: remove python2 at update

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agopython: removal of python2 from IPFire
Adolf Belka [Tue, 24 Aug 2021 10:34:53 +0000 (12:34 +0200)] 
python: removal of python2 from IPFire

- Final patch for removal of python2 from IPFire. This can be implemented in an
   appropriate Core Update after all other python2 related patches have been implemented
   and confirmed working.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Acked-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agonano: Update to 5.9
Matthias Fischer [Fri, 8 Oct 2021 17:22:24 +0000 (19:22 +0200)] 
nano: Update to 5.9

For details see:
https://www.nano-editor.org/news.php

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agoguardian: bump PAK_VER
Arne Fitzenreiter [Wed, 13 Oct 2021 12:23:40 +0000 (12:23 +0000)] 
guardian: bump PAK_VER

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agoBought a 'd' - fixed an old typo
Matthias Fischer [Sat, 9 Oct 2021 09:23:25 +0000 (11:23 +0200)] 
Bought a 'd' - fixed an old typo

'bandwith...' should be 'bandwidth...'.

Despite being my favourite typo for the past few years(?),
today I decided to try to say 'Goodbye' to an old friend.

Similar to 'MB writen' its hard but I think it just about time.

'qos' and 'guardian' will never be the same for me... ;-)

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agoproxy.cgi: Remove option to show Squid's version entirely
Peter Müller [Sun, 10 Oct 2021 19:43:14 +0000 (21:43 +0200)] 
proxy.cgi: Remove option to show Squid's version entirely

There is no sense to display this to anybody, and we do not reveal
version information anywhere else on purpose. The IT staff knows which
version of IPFire they are running (hopefully the latest), and it's
none of the rest of the world's business.

Fixes: #12665 (in some way)
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Acked-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agocore161: add squid-asnbl and proxy.cgi
Arne Fitzenreiter [Wed, 13 Oct 2021 12:16:45 +0000 (12:16 +0000)] 
core161: add squid-asnbl and proxy.cgi

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agolangs: Add English and German translations for newly added web proxy features
Peter Müller [Sun, 10 Oct 2021 17:44:06 +0000 (19:44 +0200)] 
langs: Add English and German translations for newly added web proxy features

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agoproxy.cgi: Implement proactive Fast Flux detection and detection for selectively...
Peter Müller [Sun, 10 Oct 2021 17:43:41 +0000 (19:43 +0200)] 
proxy.cgi: Implement proactive Fast Flux detection and detection for selectively announced destinations

This patch adds two new features to IPFire's web proxy:

(a) Proactive Fast Flux detection
    FQDNs are resolved to their IP addresses, which are then resolved to
    corresponding Autonomous System Numbers using IPFire's location
    database. Most destinations will scatter across a very low number of
    ASNs (not to be confused with IP addresses!). FQDNs hosted on Fast
    Flux setups have a significantly higher ASN diversity (5 is usually
    a good threshold), so they can be proactively detected.

(b) Detection for selectively announced destinations
    Especially in targeted operations, miscreants host FQDNs for
    exfiltrating data or malware distributions on ASNs not announced
    globally, but only to the intended victim or it's upstream ISPs.

    That way, security researchers located in other parts of the
    internet have no insights into these attacks, hence not being able
    to publish listings or send take down notices for the domains used.

    While RPKI made this attack harder, it can still be observed every
    now and then.

    This feature also protects against accessing FQDNs resolving to IP
    addresses not being globally routeable, hence providing a trivial
    mitigation for so-called "rebound attacks" - which we cannot filter
    at DNS level currently.

The second version of this patch consumes the user-defined whitelist for
the URL filter (if present and populated) for the ASNBL helper as well,
to make exceptions for funny destinations such as fedoraproject.org
possible. In addition, the ASNBL helper's sanity tests no longer include
publicly routable IP addresses, so failures on location01 cannot brick
IPFire installations in the field.

Thanks to Michael Tremer and Adolf Belka for these suggestions.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agosquid-asnbl: New package
Peter Müller [Sun, 10 Oct 2021 17:43:18 +0000 (19:43 +0200)] 
squid-asnbl: New package

This package adds an ASNBL helper for detecting Fast Flux setups and
selectively announced networks (i. e. FQDNs resolving to IP addresses
not being announced by an Autonomous System) to the distribution.
Afterwards, the helper script is located at /usr/bin/asnbl-helper.py .

The second version of this patch updates squid-asnbl to upstream version
0.2.2, improving logging in case of detected Fast Flux setups.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agocore161: add hexdump
Arne Fitzenreiter [Wed, 13 Oct 2021 12:10:04 +0000 (12:10 +0000)] 
core161: add hexdump

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agoutil-linux: Ship hexdump
Michael Tremer [Sun, 10 Oct 2021 12:57:42 +0000 (12:57 +0000)] 
util-linux: Ship hexdump

This is a handy tool which can help debugging any problems and should be
part of the distribution.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agoclient175: Removal of this package as it currently only works with python2
Adolf Belka [Sat, 9 Oct 2021 21:07:43 +0000 (23:07 +0200)] 
client175: Removal of this package as it currently only works with python2

- Removal of the lfs, rootfile and initscript
- Removal of client175 entry in the make.sh file

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agocore161: add makegraphs and hddshutdown
Arne Fitzenreiter [Wed, 13 Oct 2021 12:08:30 +0000 (12:08 +0000)] 
core161: add makegraphs and hddshutdown

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agomakegraphs: Update script for new iostat output format - Bug#12702
Adolf Belka [Fri, 8 Oct 2021 21:38:24 +0000 (23:38 +0200)] 
makegraphs: Update script for new iostat output format - Bug#12702

- Modification of iostat line as per input in Bug#12702

Fixes: 12702
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agohddshutdown: Update script for new iostat output format - Bug#12702
Adolf Belka [Fri, 8 Oct 2021 21:38:23 +0000 (23:38 +0200)] 
hddshutdown: Update script for new iostat output format - Bug#12702

- Modification of iostat line as per input in Bug#12702

Fixes: 12702
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agocore161: add apache2
Arne Fitzenreiter [Wed, 13 Oct 2021 12:03:56 +0000 (12:03 +0000)] 
core161: add apache2

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agoapache: Update to 2.4.51
Matthias Fischer [Fri, 8 Oct 2021 17:12:40 +0000 (19:12 +0200)] 
apache: Update to 2.4.51

For details see (2.49):
https://dlcdn.apache.org//httpd/CHANGES_2.4.49

For 2.51:
https://dlcdn.apache.org//httpd/CHANGES_2.4.51

"SECURITY: CVE-2021-42013: Path Traversal and Remote Code
Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete
fix of CVE-2021-41773) (cve.mitre.org)
It was found that the fix for CVE-2021-41773 in Apache HTTP
Server 2.4.50 was insufficient..."

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agocore161: add firewall changes to update
Arne Fitzenreiter [Wed, 13 Oct 2021 12:00:11 +0000 (12:00 +0000)] 
core161: add firewall changes to update

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agoIPsec: Replace MARK 50 by 0x00800000
Michael Tremer [Mon, 4 Oct 2021 17:52:22 +0000 (18:52 +0100)] 
IPsec: Replace MARK 50 by 0x00800000

This change is necessary because we are using the right-hand two bytes
for storing the QoS classes.

All IPsec traffic will now be skipped and never classified by the QoS.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agoQoS: Make outgoing packet processing use CONNMARK
Michael Tremer [Mon, 4 Oct 2021 17:52:21 +0000 (18:52 +0100)] 
QoS: Make outgoing packet processing use CONNMARK

This will significantly reduce the load when classifying outgoing
traffic as there won't be any overhead as soon as the connection has
been classified. The classficiation is being stored in the iptables MARK
which will be copied to CONNMARK if changed.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agoQoS: Drop support for hardcoded ACK rules
Michael Tremer [Mon, 4 Oct 2021 17:52:20 +0000 (18:52 +0100)] 
QoS: Drop support for hardcoded ACK rules

This feature has to go in order to take advantage of CONNMARK which will
drastically decrease CPU load when passing packets.

We no longer will see every packet in the QOS-INC chain in order to
change classification of that packet. It is also party counter-intuitive
to have parts of one connection in one class and the corresponding ACK
packets in another.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agofirewall: Always restore all connection marks
Michael Tremer [Mon, 4 Oct 2021 17:52:19 +0000 (18:52 +0100)] 
firewall: Always restore all connection marks

This was done by tc only when QoS was enabled

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agoQoS: Use the two right hand bytes to mark packets
Michael Tremer [Mon, 4 Oct 2021 17:52:18 +0000 (18:52 +0100)] 
QoS: Use the two right hand bytes to mark packets

In order to not deal with any marks from NAT and the IPS, this patch
adds masks to all places where packets are being marked for individual
QoS classes.

Instead of being able to use the "fw" match in tc, we have to use the
u32 to apply the mask.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agofirewall: Only check relevant bits for NAT fix rules
Michael Tremer [Mon, 4 Oct 2021 17:52:17 +0000 (18:52 +0100)] 
firewall: Only check relevant bits for NAT fix rules

In order to use the highest two bits for surciata bypass, we will need
to make sure that whenever we compare any other marks, we do not care
about anything else.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agokernel: update to 5.10.72
Arne Fitzenreiter [Sun, 10 Oct 2021 11:23:30 +0000 (13:23 +0200)] 
kernel: update to 5.10.72

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agokernel: add realtek rtl88x2bu wlan module
Arne Fitzenreiter [Sun, 10 Oct 2021 11:22:48 +0000 (13:22 +0200)] 
kernel: add realtek rtl88x2bu wlan module

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agokernel: update to 5.10.71
Arne Fitzenreiter [Sun, 10 Oct 2021 06:46:25 +0000 (06:46 +0000)] 
kernel: update to 5.10.71

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agoinitskrips: leds: add nanopi r2s support
Arne Fitzenreiter [Sun, 10 Oct 2021 06:45:09 +0000 (06:45 +0000)] 
initskrips: leds: add nanopi r2s support

2 years agokernel: config for nanopi r2s
Arne Fitzenreiter [Fri, 8 Oct 2021 19:54:29 +0000 (19:54 +0000)] 
kernel: config for nanopi r2s

some drivers does nozt work as module so they are now compiled into
main kernel

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agou-boot: nanopi r2s: add bootcmd and 2nd mac address
Arne Fitzenreiter [Fri, 8 Oct 2021 12:05:36 +0000 (12:05 +0000)] 
u-boot: nanopi r2s: add bootcmd and 2nd mac address

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agou-boot: bootscript try to use also devnum instead of dev_num
Arne Fitzenreiter [Mon, 4 Oct 2021 06:13:18 +0000 (06:13 +0000)] 
u-boot: bootscript try to use also devnum instead of dev_num

on newer board the variable was renamed.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agou-boot: set nanopi r2s baudrate to 115200
Arne Fitzenreiter [Mon, 4 Oct 2021 06:07:30 +0000 (06:07 +0000)] 
u-boot: set nanopi r2s baudrate to 115200

default is 150000 but many usb-ttl adapters are unstable at this rate.

2 years agoflash-images: install u-boot for nanopi r2s on aarch64
Arne Fitzenreiter [Sun, 3 Oct 2021 07:42:41 +0000 (07:42 +0000)] 
flash-images: install u-boot for nanopi r2s on aarch64

rockchip has a large bootloader so this also increase the gap between partitiontable
and fist partition to 16MB on aarch64

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agou-boot: add nanopi r2s build
Arne Fitzenreiter [Sun, 3 Oct 2021 07:39:04 +0000 (07:39 +0000)] 
u-boot: add nanopi r2s build

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agodtc: add device tree compiler on aarch64
Arne Fitzenreiter [Sun, 3 Oct 2021 07:30:57 +0000 (07:30 +0000)] 
dtc: add device tree compiler on aarch64

u-boot for nanopi r2s (rockchip rk3328) need dtc to build the image
so this adds dtc as build dependency for u-boot

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agokernel: update to 5.10.70
Arne Fitzenreiter [Fri, 1 Oct 2021 21:23:01 +0000 (23:23 +0200)] 
kernel: update to 5.10.70

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agomedia.cgi: Fix parsing output of iostat core160 v2.27-core160
Michael Tremer [Fri, 24 Sep 2021 09:14:50 +0000 (10:14 +0100)] 
media.cgi: Fix parsing output of iostat

Since the last update of sysstat, the output of iostat has changed and
the web user interface showed wrong values.

This is now being fixed in this patch.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Acked-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agomedia.cgi: Fix parsing output of iostat
Michael Tremer [Fri, 24 Sep 2021 09:14:50 +0000 (10:14 +0100)] 
media.cgi: Fix parsing output of iostat

Since the last update of sysstat, the output of iostat has changed and
the web user interface showed wrong values.

This is now being fixed in this patch.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Acked-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agokernel: update to 5.10.69
Arne Fitzenreiter [Mon, 27 Sep 2021 10:21:51 +0000 (12:21 +0200)] 
kernel: update to 5.10.69

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agokernel: update to 5.10.68
Arne Fitzenreiter [Sun, 26 Sep 2021 12:58:27 +0000 (14:58 +0200)] 
kernel: update to 5.10.68

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agokernel: arm rootfile update
Arne Fitzenreiter [Sun, 26 Sep 2021 08:40:32 +0000 (08:40 +0000)] 
kernel: arm rootfile update

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agokernel: aarch64 enable drivers for common ROCKCHIP boards
Arne Fitzenreiter [Sat, 25 Sep 2021 13:19:25 +0000 (13:19 +0000)] 
kernel: aarch64 enable drivers for common ROCKCHIP boards

thx to Fukan K
fixes #12681

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agokernel: aarch64 oldconfig
Arne Fitzenreiter [Sat, 25 Sep 2021 13:07:36 +0000 (13:07 +0000)] 
kernel: aarch64 oldconfig

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agowlanap.cgi: fix typo at reading country list
Arne Fitzenreiter [Fri, 24 Sep 2021 09:31:52 +0000 (09:31 +0000)] 
wlanap.cgi: fix typo at reading country list

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agowlanap.cgi: fix typo at reading country list
Arne Fitzenreiter [Fri, 24 Sep 2021 09:31:52 +0000 (09:31 +0000)] 
wlanap.cgi: fix typo at reading country list

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agokernel: x86 rootfile update
Arne Fitzenreiter [Mon, 20 Sep 2021 21:46:14 +0000 (23:46 +0200)] 
kernel: x86 rootfile update

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agokernel: update to 5.10.67
Arne Fitzenreiter [Mon, 20 Sep 2021 21:45:56 +0000 (23:45 +0200)] 
kernel: update to 5.10.67

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agokernel: Enable all cgroups on all architectures
Michael Tremer [Fri, 17 Sep 2021 11:42:29 +0000 (11:42 +0000)] 
kernel: Enable all cgroups on all architectures

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Acked-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agokernel: Zero-init all stack variables by default
Michael Tremer [Fri, 17 Sep 2021 11:42:28 +0000 (11:42 +0000)] 
kernel: Zero-init all stack variables by default

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Acked-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agokernel: Enable support for TPM hardware
Michael Tremer [Fri, 17 Sep 2021 11:42:27 +0000 (11:42 +0000)] 
kernel: Enable support for TPM hardware

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Acked-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agokernel: Enable ExFAT on all architectures
Michael Tremer [Fri, 17 Sep 2021 11:42:26 +0000 (11:42 +0000)] 
kernel: Enable ExFAT on all architectures

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Acked-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agokernel: Enable frontswap
Michael Tremer [Fri, 17 Sep 2021 11:42:25 +0000 (11:42 +0000)] 
kernel: Enable frontswap

"Frontswap provides a “transcendent memory” interface for swap pages. In
some environments, dramatic performance savings may be obtained because
swapped pages are saved in RAM (or a RAM-like device) instead of a swap
disk."

https://www.kernel.org/doc/html/latest/vm/frontswap.html

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Acked-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agokernel: Disable network security hooks
Michael Tremer [Fri, 17 Sep 2021 11:42:24 +0000 (11:42 +0000)] 
kernel: Disable network security hooks

This is a feature we do not use and it should therefore be disabled

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Acked-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agokernel: Disable OpenvSwitch
Michael Tremer [Fri, 17 Sep 2021 11:42:23 +0000 (11:42 +0000)] 
kernel: Disable OpenvSwitch

We do not use this and so we should not build it to save space.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Acked-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agokernel: Disable any runtime testing
Michael Tremer [Fri, 17 Sep 2021 11:42:22 +0000 (11:42 +0000)] 
kernel: Disable any runtime testing

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Acked-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agokernel: Disable SLUB debugging
Michael Tremer [Fri, 17 Sep 2021 11:42:21 +0000 (11:42 +0000)] 
kernel: Disable SLUB debugging

This is not necessary on our systems and according to the documentation
will reduce code size of the allocator which will result in better
performance.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Acked-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agokernel: Enable Pressure Stall Information
Michael Tremer [Fri, 17 Sep 2021 11:42:20 +0000 (11:42 +0000)] 
kernel: Enable Pressure Stall Information

This is a new type of metric to find out what resource is currently a
bottleneck for the whole system. We might use this for graphs.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Acked-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agokernel: Disable IRQ time accounting
Michael Tremer [Fri, 17 Sep 2021 11:42:19 +0000 (11:42 +0000)] 
kernel: Disable IRQ time accounting

This feature is now disabled (was disabled on ARM before) as we do not
need it:

"Select this option to enable fine granularity task irq time accounting.
This is done by reading a timestamp on each transitions between softirq
and hardirq state, so there can be a small performance impact."

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Acked-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agokernel: Disable suspending systems to RAM
Michael Tremer [Fri, 17 Sep 2021 11:42:18 +0000 (11:42 +0000)] 
kernel: Disable suspending systems to RAM

We do not make any use of this functionality

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Acked-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agokernel: Change timer tick to 1000Hz
Michael Tremer [Fri, 17 Sep 2021 11:42:17 +0000 (11:42 +0000)] 
kernel: Change timer tick to 1000Hz

This change is required to make the system respond faster to any
realtime events (sending or receiving data packets).

It will wake up at least one core 1000 times a second which will result
in finer timer granularity and make scheduling smoother. HTB for
example sends large packet bursts on each timer even to keep up data
rates which is not helpful for most applications.

The change might increase resource consumption and overhead slightly on
some systems, but since we are running in an idle-dyntick configuration,
we should not keep awake any cores that have not been awake before.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Acked-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agocore161: start updater
Arne Fitzenreiter [Mon, 20 Sep 2021 13:57:26 +0000 (13:57 +0000)] 
core161: start updater

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agolibyang: New dependency for frr build
Adolf Belka [Mon, 13 Sep 2021 11:22:06 +0000 (13:22 +0200)] 
libyang: New dependency for frr build

- Impementation of libyang-2.0.7 as a dependency for the build of frr
- Creation of rootfile with all entries commented out so that it is only used for the build
   libyang is a YANG data modelling language parser and toolkit written (and providing API)
   in C.In the future if there is demand to use these functions in frr then this package
   may need to be moved from a build only option to a dependency for frr providing the
   yang libraries.
- Added into make.sh just before frr

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agofrr: Update to version 8.0.1
Adolf Belka [Mon, 13 Sep 2021 11:22:05 +0000 (13:22 +0200)] 
frr: Update to version 8.0.1

- This v2 version used the frr-8.0.1 source instead of the frr-frr-8.0 source
- Update from 6.0 to 8.0.1
- 8.0.1 requires libyang for the build. Introduced with separate patch in this series.
- 6.0 is only compilable with python2.
  python3 compatability was introduced in version 7.4
- Previously confirmed that building frr-8.0 was successful with only python3 available
- Added --disable-static to the ./configure options.
- Rootfile updated
- Changelog from 6.0 to 8.0.1 is too large to include here. It can be viewed to obtain
   more details at https://github.com/FRRouting/frr/releases

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agofreeradius: Update to 3.0.23 and disable python to allow running without python2
Adolf Belka [Fri, 20 Aug 2021 20:06:13 +0000 (22:06 +0200)] 
freeradius: Update to 3.0.23 and disable python to allow running without python2

- Added --without-rlm_python to ./configure to allow running without python2
- Updated rootfile
- Updated patch for preventing cert generation during buildtime to work with new
   version of source code
- Update from 3.0.21 to 3.0.23

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Acked-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agoRevert "client175: Convert python2 modules in source tarball to python3"
Arne Fitzenreiter [Sun, 12 Sep 2021 14:51:10 +0000 (14:51 +0000)] 
Revert "client175: Convert python2 modules in source tarball to python3"

This reverts commit 6d11cd4375f46f5f811ec5ce2c2a517b6add120d.

At my tests the server will not start because missing deps of cherrypy and not all files are properly converted yet.

2 years agocore160: apply ssh config, start/stop IPSec and set need_reboot flag
Arne Fitzenreiter [Sun, 12 Sep 2021 14:11:12 +0000 (14:11 +0000)] 
core160: apply ssh config, start/stop IPSec and set need_reboot flag

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agoupdate-contributors
Arne Fitzenreiter [Sun, 12 Sep 2021 09:42:47 +0000 (09:42 +0000)] 
update-contributors

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agocore160: add updatexlerator.cgi
Arne Fitzenreiter [Sun, 12 Sep 2021 09:39:20 +0000 (09:39 +0000)] 
core160: add updatexlerator.cgi

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agoupdatexlrator.cgi: Fix max disk usage input size
Leo-Andres Hofmann [Thu, 12 Aug 2021 09:51:48 +0000 (11:51 +0200)] 
updatexlrator.cgi: Fix max disk usage input size

Increase to 3 digits to fit a percentage number.

Fixes: #12675
Reported-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Leo-Andres Hofmann <hofmann@leo-andres.de>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Reviewed-by: Bernhard Bitsch <bbitsch@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agoupdatexlrator.cgi: Fix Bug 10477 - Update Accelerator disk usage statistics are very...
Adolf Belka [Mon, 9 Aug 2021 20:32:53 +0000 (22:32 +0200)] 
updatexlrator.cgi: Fix Bug 10477 - Update Accelerator disk usage statistics are very cramped in 2.15 beta1

- This bug has been open for a long time and is still valid. The Cache statistics on
   the Update accelerator configuration page are jammed closely together making it
   not so easy to see what the numbers are.
- Implemented similar approach as used on the Memory table section of the Memory
   information page.
- Installed on vm testbed machine and confirmed to provide the desired layout.

Tested-by Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Bernhard Bitsch <bbitsch@ipfire.org>
Tested-by: Bernhard Bitsch <bbitsch@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agoUpdate language files: fix for Bug 12671 - remove evil spirits - demon vs daemon
Adolf Belka [Sun, 8 Aug 2021 20:57:48 +0000 (22:57 +0200)] 
Update language files: fix for Bug 12671 - remove evil spirits - demon vs daemon

- demon used in place of daemon in the language files
- This patch corrects that and fixes bug #12671

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agogetrrdimage.cgi: Fix supported origins list
Leo-Andres Hofmann [Sat, 7 Aug 2021 20:42:07 +0000 (22:42 +0200)] 
getrrdimage.cgi: Fix supported origins list

Support for the graphs of "services.cgi" is implemented,
but it was forgotten to add this to the list of origins.
This patch fixes the list and prevents possibly missing graphs.

Signed-off-by: Leo-Andres Hofmann <hofmann@leo-andres.de>
Reviewed-by: Bernhard Bitsch <bbitsch@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agocore160: add ovpnmain.cgi
Arne Fitzenreiter [Sun, 12 Sep 2021 09:31:19 +0000 (09:31 +0000)] 
core160: add ovpnmain.cgi

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agoovpnmain.cgi: Remove unnecessary check/error message
Leo-Andres Hofmann [Tue, 7 Sep 2021 15:53:09 +0000 (17:53 +0200)] 
ovpnmain.cgi: Remove unnecessary check/error message

This parameter can either be "host" or "net", but the existing check
only allows "net" entries. Since other entries are also valid but
don't require further action, this patch removes the error message.

Fixes: #12686
Signed-off-by: Leo-Andres Hofmann <hofmann@leo-andres.de>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agonetwork_functions: fix _get_wireless_status function
Arne Fitzenreiter [Sun, 12 Sep 2021 08:55:43 +0000 (10:55 +0200)] 
network_functions: fix _get_wireless_status function

the function has returned the number of lines instead of the output itself.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agosamba: update rootfiles
Arne Fitzenreiter [Sat, 11 Sep 2021 08:46:48 +0000 (08:46 +0000)] 
samba: update rootfiles

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agospice-protocol: Update to 0.14.3 and enable build without python2
Adolf Belka [Thu, 2 Sep 2021 14:10:59 +0000 (16:10 +0200)] 
spice-protocol: Update to 0.14.3 and enable build without python2

- v2 version adds $(MAKETUNING) variable to ninja build command
- Update from 0.12.13 to 0.14.3
- Update rootfile
- Remove automake py-compile line from lfs. This only works with python2
   Not clear why this line was put into the lfs. Searched the documentation of spice
   and qemu and could not find any reference to needing any of the python modules in spice
   to be installed either as modules or compiled in. The only references found in general
   searches were to modules such as python-virtinst, python-spice-client-gtk or
   python-websockify, none of which are in the python modules in spice.
- Removing the automake py-compile line from the lfs enables spice-protocol, spice and
   qemu to build without python2 being present.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agospice: Update version to 0.15.0
Adolf Belka [Thu, 2 Sep 2021 14:10:58 +0000 (16:10 +0200)] 
spice: Update version to 0.15.0

- v2 version of series to add $(MAKETUNING) variable to ninja in spice-protocol
- Update from 0.14.0 to 0.15.0
- Update rootfile
- Version 0.15.0 of spice requires version 0.14.3 or higher of spice-protocol
- Changelog
   Major Changes in 0.15:
    This is the first release in the new 0.15.x stable series. This release should
    be ready for production use.
     * Minor updates to CI
     * Some compatibility with OpenSSL
     * Change the behavior of handle_dev_start ignoring multiple start requests
     * Ignore multiple calls to handle_dev_stop
     * Pick up newer spice-common to fix a buffer overflow issue
   Major Changes in 0.14.91:
    **IMPORTANT**
    0.14.91 is the first release candidate for the stable 0.15.x series. While some
    bugs might still be present, it should be reasonably stable. If you are looking
    for stability for daily use, please keep using the latest 0.14.x release.
     * Support UNIX abstract sockets
     * Fix some potential thread race condition in RedClient
     * Many cleanups in the code
     * Improve migration test script
     * Update in protocol documentation
     * Improve Meson build
     * Removed CELT support
     * Update CI
     * Removed QXLWorker definition, it was deprecated 6 years ago
     * Fix some compatibility with MacOS
     * Fix some compatibility with Windows
     * Move the project to C++
     * Some fixes for SASL dealing with WebDAV
     * Fix minor Coverity reports
     * Add Doxygen support, manually built with "make doxy"
     * Support more mouse buttons (up to 16 buttons)
     * CVE-2020-14355 multiple buffer overflow vulnerabilities in QUIC decoding
       code
   Major Changes in 0.14.3:
    Main changes are WebSocket and support for Windows.
     * Add support for WebSocket, this will allow to use spice-html5 without proxy
     * Support Windows, now Qemu Windows can be build enabling Spice
     * Fix some alignment problem
     * Converted some documentation to Asciidoc format to make easier to update,
       updated some
     * Minor compatibility fix for PPC64EL and ARMHF
     * Minor fixes for big endian machines like MIPS
     * Avoid some crashes with some buggy guest drivers, simply ignore the invalid
       request
     * Fix for old OpenSSL versions
     * Minor fix for Windows clients and brushes, fixed an issue with Photoshop
       under Windows 7
     * Add ability to query video-codecs
     * Small use-after-free fix
     * Fix for debugging recording/replaying using QUIC images
     * Fix a regression where spice reported no monitors to the client
     * Fix DoS in spicevmc if WebDAV used
     * Updated and improved test migration script
     * Some minor fixes to smartcard support
     * Avoid possible disconnection using proxies using a in-flow keepalive
       mechanism
   Major Changes in 0.14.2:
    Main changes are support for Meson build and graphic device info
    messages allowing to better support multi-monitor configurations.
     * CVE-2019-3813: fix off-by-one error in group/slot boundary check
     * support H265 in stream-channel
     * add support for building with meson/ninja
     * minor tests fixes improving CI
     * set char device state for smartcard, allowing Qemu optimization
     * improve red-parse-qxl.c interface making it more consistent
     * add some instrumentation for streaming device
     * QXL interface: add a function to identify monitors in the guest
       (spice_qxl_set_device_info)
     * add support for GraphicsDeviceInfo messages
     * video-stream: prevent crash on stream reattach
     * make channel client callbacks virtual functions
     * bumped minimum required glib version to 2.38
     * attempt to have a reliable led state for keyboard modifiers
   Major Changes in 0.14.1:
    The main change in this release is the addition of a new protocol extension
    in order to support streaming the remote display as a video stream rather than
    going through the QXL protocol. Together with spice-streaming-agent, and/or with
    more work on the qemu/spice-server side, this should allow streaming of 3D
    accelerated VMs in the future. At this point, this part of spice-server is
    still a work in progress (multi-monitor support and various features are
    missing).
     * add new org.spice-space.stream.0 channel used for passing an encoded video
       stream from the guest to the client
     * add support for TCP_CORK to reduce the amount of packets that we send
     * fix CVE-2018-10873
     * fix cursor related migration crash
     * fix regression causing sound recording to be muted after
       client disconnection/reconnection (introduced in 0.13.90)
     * fix regression in corner cases where images could be sent uncompressed
       when they used to be compressed with QUIC
     * disable TLS 1.0 support
     * CELT 0.5.1 support is now disabled by default. If celt051-devel is installed
       at build-time, --enable-celt051/--disable-celt051 must be explicitly specified
     * drop support for unsupported OpenSSL version. OpenSSL 1.0.0 or newer is now
       required
     * bumped minimum required glib version to 2.32
     * endianness fixes
     * (small) leak fixes
     * usual round of code cleanups
     * not directly related to this release, but the upstream git repository is now
       hosted on gitlab.freedesktop.org

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agocore160: add libtasn1 and p11-kit
Arne Fitzenreiter [Fri, 10 Sep 2021 13:07:35 +0000 (13:07 +0000)] 
core160: add libtasn1 and p11-kit

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agolibtasn1: New program required as build dependency for p11-kit
Adolf Belka [Fri, 20 Aug 2021 20:04:28 +0000 (22:04 +0200)] 
libtasn1: New program required as build dependency for p11-kit

- creation of lfs and rootfile for libtasn1

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agop11-kit: New program required for python3 compatibility of ca-certificates
Adolf Belka [Fri, 20 Aug 2021 20:04:27 +0000 (22:04 +0200)] 
p11-kit: New program required for python3 compatibility of ca-certificates

- creation of lfs and rootfile for implementation of p11-kit

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agomake.sh: Added p11-kit and libtasn1 for python3 based ca-certificates approach
Adolf Belka [Fri, 20 Aug 2021 20:04:26 +0000 (22:04 +0200)] 
make.sh: Added p11-kit and libtasn1 for python3 based ca-certificates approach

- p11-kit required for certs extraction in building of python3 compatible ca-certificates
- p11-kit requires libtasn1 as a build dependency
- p11-kit and libtasn1 added to make.sh

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agoca-certificates: Update to work with python3 version of certdata2pem.py
Adolf Belka [Fri, 20 Aug 2021 20:04:25 +0000 (22:04 +0200)] 
ca-certificates: Update to work with python3 version of certdata2pem.py

- Implement python3 version of certdata2pem.py script from fedora
- Modify build.sh to work with python3 script that uses p11-kit based on fedora
   approach - https://src.fedoraproject.org/rpms/ca-certificates/tree/rawhide
- Extraction of cert files now uses p11-kit which requires libtasn1 as a build
   dependency
- Updated rootfile
- Updated ca-certificates installed into a vm and confirmed to download a file from an
   https site with the same results as with existing ca-certfictaes system

Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agocore160: add ssh changes and stop/start ipsec at update
Arne Fitzenreiter [Fri, 10 Sep 2021 11:12:03 +0000 (11:12 +0000)] 
core160: add ssh changes and stop/start ipsec at update

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agoopenssh: Update version to 8.7p1
Adolf Belka [Sun, 5 Sep 2021 11:30:47 +0000 (13:30 +0200)] 
openssh: Update version to 8.7p1

- Update from 8.6p1 to 8.7p1
- Update of rootfile not required
- Changelog is too long to include here. Full details can be found in the ChangeLog file
   in the source tarball or at
   https://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/ChangeLog

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agolibssh: Update to version 0.9.6
Adolf Belka [Sun, 5 Sep 2021 11:30:32 +0000 (13:30 +0200)] 
libssh: Update to version 0.9.6

- Update from 0.9.3 to 0.9.6
   0.9.4 and 0.9.6 are security releases
- Update rootfile
- Changelog
   libssh 0.9.6 security release
    This is a security release of libssh to address CVE-2021-3634 (moderate impact), a
    possible heap-buffer overflow when rekeying. A workaround exists. More details can be
    found in the advisory.
    In addition the 0.9.6 version addresses some memory leaks in error path, an AEAD
    handshake and some more.
      CVE-2021-3634: Fix possible heap-buffer overflow when rekeying with different key exchange mechanism
      Fix several memory leaks on error paths
      Reset pending_call_state on disconnect
      Fix handshake bug with AEAD ciphers and no HMAC overlap
      Use OPENSSL_CRYPTO_LIBRARIES in CMake
      Ignore request success and failure message if they are not expected
      Support more identity files in configuration
      Avoid setting compiler flags directly in CMake
      Support build directories with special characters
      Include stdlib.h to avoid crash in Windows
      Fix sftp_new_channel constructs an invalid object
      Fix Ninja multiple rules error
      Several tests fixes
   libssh 0.9.5
    The libssh team is happy to announce another bugfix release of libssh as version
    0.9.5. It offers bug fixes for several issues found by our users.
    This includes a fix for CVE-2020-16135, however we do not see how this would be
    exploitable at all. If you find a security bug in libssh please don’t just assign a
    CVE, talk to us first.
      CVE-2020-16135: Avoid null pointer dereference in sftpserver (T232)
      Improve handling of library initialization (T222)
      Fix parsing of subsecond times in SFTP (T219)
      Make the documentation reproducible
      Remove deprecated API usage in OpenSSL
      Fix regression of ssh_channel_poll_timeout() returning SSH_AGAIN
      Define version in one place (T226)
      Prevent invalid free when using different C runtimes than OpenSSL (T229)
      Compatibility improvements to testsuite
   libssh 0.9.4 security release
    This is a security release of libssh to address CVE-2020-1730 (moderate impact), a
    possible Denial of Service (DoS) in client and server when handling AES-CTR keys with
    OpenSSL. A workaround exists. More details can be found in the advisory.
    In addition the this version addresses several memory leaks and adds support for
    diffie-hellman-group14-sha256 key exchange.
      Fixed CVE-2020-1730 (Possible DoS in client and server when handling AES-CTR keys with OpenSSL)
      Added diffie-hellman-group14-sha256
      Fixed several possible memory leaks

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agocore160: add IPSec changes (stongswan, vpnmain.cgi)
Arne Fitzenreiter [Fri, 10 Sep 2021 11:03:58 +0000 (11:03 +0000)] 
core160: add IPSec changes (stongswan, vpnmain.cgi)

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agovpnmain.cgi: Do not interpret $? as error code of move()
Stefan Schantl [Tue, 24 Aug 2021 15:50:48 +0000 (15:50 +0000)] 
vpnmain.cgi: Do not interpret $? as error code of move()

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Tested-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agoIPsec: Do not interpret $? as error code of move()
Michael Tremer [Tue, 24 Aug 2021 15:50:47 +0000 (15:50 +0000)] 
IPsec: Do not interpret $? as error code of move()

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Tested-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agoIPsec: Fix extra whitespace in exported certificates
Michael Tremer [Tue, 24 Aug 2021 15:50:46 +0000 (15:50 +0000)] 
IPsec: Fix extra whitespace in exported certificates

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Tested-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agostrongswan: Update to version 5.9.3
Adolf Belka [Tue, 24 Aug 2021 21:29:04 +0000 (23:29 +0200)] 
strongswan: Update to version 5.9.3

- Update from 5.9.2 to 5.9.3
- Update of rootfile not required
- Changelog
   strongswan-5.9.3
    - Added AES_ECB, SHA-3 and SHAKE-256 support to wolfssl plugin.
    - Added AES_CCM and SHA-3 signature support to openssl plugin.
    - The x509 and openssl plugins now consider the authorityKeyIdentifier, if
      available, before verifying signatures, which avoids unnecessary signature
      verifications after a CA key rollover if both certificates are loaded.
    - The pkcs11 plugin better handles optional attributes like CKA_TRUSTED, which
      previously depended on a version check.
    - charon-nm now supports using SANs as client identities, not only full DNs.
    - charon-tkm now handles IKE encryption.
    - A MOBIKE update is sent again if a a change in the NAT mappings is detected
      but the endpoints stay the same.
    - Converted most of the test case scenarios to the vici interface

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agoffmpeg: Update deps to use sdl2 in place of sdl
Adolf Belka [Wed, 1 Sep 2021 20:21:00 +0000 (22:21 +0200)] 
ffmpeg: Update deps to use sdl2 in place of sdl

- This patch needs to go together with the patch updating sdl to sdl2
   https://patchwork.ipfire.org/project/ipfire/patch/20210824212848.1311257-1-adolf.belka@ipfire.org/
- Update deps line in lfs to use sdl2 in place of sdl
- Update rootfile

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agosdl2: Replace sdl with sdl2. Update to version 2.0.16
Adolf Belka [Tue, 24 Aug 2021 21:28:48 +0000 (23:28 +0200)] 
sdl2: Replace sdl with sdl2. Update to version 2.0.16

- Update from 1.2.15 (2013) to 2.0.16 (2021)
- Source file name changed from SDL to SDL2 so also deleted old sdl and created sdl2
   files for rootfile and lfs
- Changelog is too large to include here. Details can be found in the WhatsNew.txt file
   in the source tarball

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agosshfs: Add $(MAKETUNING) variable to ninja build
Adolf Belka [Thu, 2 Sep 2021 14:13:13 +0000 (16:13 +0200)] 
sshfs: Add $(MAKETUNING) variable to ninja build

- $(MAKETUNING) variable added to ninja build

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agompd: Add $(MAKETUNING) variable to ninja build
Adolf Belka [Thu, 2 Sep 2021 14:13:12 +0000 (16:13 +0200)] 
mpd: Add $(MAKETUNING) variable to ninja build

- $(MAKETUNING) variable added to ninja build

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agompc: Add $(MAKETUNING) variable to ninja build
Adolf Belka [Thu, 2 Sep 2021 14:13:11 +0000 (16:13 +0200)] 
mpc: Add $(MAKETUNING) variable to ninja build

- $(MAKETUNING) variable added to ninja build

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agolibmpdclient: Add $(MAKETUNING) variable to ninja build
Adolf Belka [Thu, 2 Sep 2021 14:13:10 +0000 (16:13 +0200)] 
libmpdclient: Add $(MAKETUNING) variable to ninja build

- $(MAKETUNING) variable added to ninja build

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>