]> git.ipfire.org Git - people/mfischer/ipfire-2.x.git/log
people/mfischer/ipfire-2.x.git
2 years agoCore Update 167: Ship smartmontools
Peter Müller [Mon, 4 Apr 2022 20:17:14 +0000 (20:17 +0000)] 
Core Update 167: Ship smartmontools

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agosmartmontools: Update to 7.3
Peter Müller [Mon, 4 Apr 2022 05:30:01 +0000 (05:30 +0000)] 
smartmontools: Update to 7.3

Please refer to https://www.smartmontools.org/browser/tags/RELEASE_7_3/smartmontools/NEWS
for the changelog of this version.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agoCore Update 167: Ship DHCP advoptions related files
Peter Müller [Mon, 4 Apr 2022 20:10:23 +0000 (20:10 +0000)] 
Core Update 167: Ship DHCP advoptions related files

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agodhcp.cgi: Add domain-list type info in dhcp options - bug#12819
Adolf Belka [Mon, 4 Apr 2022 11:49:09 +0000 (13:49 +0200)] 
dhcp.cgi: Add domain-list type info in dhcp options - bug#12819

Fixes: bug#12819
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2 years agoadvoptions-list: Add domain-search to options - bug#12819
Adolf Belka [Mon, 4 Apr 2022 11:49:08 +0000 (13:49 +0200)] 
advoptions-list: Add domain-search to options - bug#12819

Fixes: bug#12819
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2 years agoCore Update 167: Ship unbound-dhcp-leases-bridge
Peter Müller [Mon, 4 Apr 2022 20:08:41 +0000 (20:08 +0000)] 
Core Update 167: Ship unbound-dhcp-leases-bridge

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agounbound-dhcp-leases-bridge: Don't open stderr on daemonization
Michael Tremer [Wed, 30 Mar 2022 09:56:35 +0000 (09:56 +0000)] 
unbound-dhcp-leases-bridge: Don't open stderr on daemonization

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 years agounbound-dhcp-leases-bridge: Initialize logging after daemonization
Michael Tremer [Wed, 30 Mar 2022 09:56:34 +0000 (09:56 +0000)] 
unbound-dhcp-leases-bridge: Initialize logging after daemonization

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 years agounbound-dhcp-leases-bridge: Read configuration only once
Michael Tremer [Wed, 30 Mar 2022 09:56:33 +0000 (09:56 +0000)] 
unbound-dhcp-leases-bridge: Read configuration only once

This saves some resources when we re-read the same configuration file
too often.

Suggested-by: Anthony Heading <ajrh@ajrh.net>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 years agounbound-dhcp-leases-bridge: Fix inotify handling
Michael Tremer [Wed, 30 Mar 2022 09:56:32 +0000 (09:56 +0000)] 
unbound-dhcp-leases-bridge: Fix inotify handling

This patch changes that the script will listen to changes to the
directory instead of the file which got complicated when files got
renamed.

It also processes all changes at the same time and tries finding out
what actions have to be performed in order to avoid unnecessary
iterations.

The script is also limited to process any changes only once every five
seconds to keep resource usage in check on busy systems.

Suggested-by: Anthony Heading <ajrh@ajrh.net>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 years agounbound-dhcp-leases-bridge: Improve logging
Michael Tremer [Wed, 30 Mar 2022 09:56:31 +0000 (09:56 +0000)] 
unbound-dhcp-leases-bridge: Improve logging

This improves logging and enables logging to the console.

Suggested-by: Anthony Heading <ajrh@ajrh.net>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 years agoRevert "dvb-firmwares: Don't ship firmware that comes from linux-firmware"
Peter Müller [Mon, 4 Apr 2022 20:06:31 +0000 (20:06 +0000)] 
Revert "dvb-firmwares: Don't ship firmware that comes from linux-firmware"

This reverts commit 7ce3223dd842465b92a3cc93273b4fa02579ebe7.

https://wiki.ipfire.org/devel/telco/2022-04-04

2 years agoRevert "alsa: Do not ship compressed firmware again"
Peter Müller [Mon, 4 Apr 2022 20:06:14 +0000 (20:06 +0000)] 
Revert "alsa: Do not ship compressed firmware again"

This reverts commit f0dc569d79cecdc2f03750734f904ddedf97d3a7.

https://wiki.ipfire.org/devel/telco/2022-04-04

2 years agoCore Update 167: Ship the Linux kernel
Peter Müller [Mon, 4 Apr 2022 20:05:36 +0000 (20:05 +0000)] 
Core Update 167: Ship the Linux kernel

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agokernel: Update to 5.15.32
Peter Müller [Sat, 2 Apr 2022 11:20:31 +0000 (11:20 +0000)] 
kernel: Update to 5.15.32

Refer to https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.32
for the changelog of this version.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agoKernel: Enable SVA support for both Intel and AMD CPUs
Peter Müller [Sat, 19 Mar 2022 21:10:50 +0000 (21:10 +0000)] 
Kernel: Enable SVA support for both Intel and AMD CPUs

Since running virtual machines is one of our legitimate use cases, it
makes sense to provide Qemu with the ability of taking advantage of
IOMMU support for safer virtuall memory allocation, if available.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Acked-by: Michael Tremer <michael.tremer@ipfire.org>
2 years agoKernel: Do not automatically load TTY line disciplines, only if necessary
Peter Müller [Sat, 19 Mar 2022 21:10:34 +0000 (21:10 +0000)] 
Kernel: Do not automatically load TTY line disciplines, only if necessary

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agoKernel: Disable support for tracing block I/O actions
Peter Müller [Sat, 19 Mar 2022 21:08:56 +0000 (21:08 +0000)] 
Kernel: Disable support for tracing block I/O actions

This is not needed on IPFire systems, and grsecurity recommends to turn
this off.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2 years agoKernel: Set CONFIG_ARCH_MMAP_RND_BITS to 32 bits
Peter Müller [Sat, 19 Mar 2022 21:08:32 +0000 (21:08 +0000)] 
Kernel: Set CONFIG_ARCH_MMAP_RND_BITS to 32 bits

This follows a recommendation by ClipOS, making ASLR bypassing attempts
harder.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2 years agoKernel: Block non-UID-0 profiling completely
Peter Müller [Fri, 11 Feb 2022 19:42:57 +0000 (19:42 +0000)] 
Kernel: Block non-UID-0 profiling completely

This is recommended by KSPP, Lynis, and others. Indeed, there is no
legitimate reason why an unprivileged user on IPFire should do any
profiling. Unfortunately, this change never landed in the mainline
kernel, hence a distribution patch is necessary.

The second version of this patch rebases the kernel patch by Jeff
Vander Stoep against Linux 5.15.17 to avoid fuzzying.

Tested-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agoCore Update 167: Ship ca-certificates
Peter Müller [Mon, 4 Apr 2022 19:58:25 +0000 (19:58 +0000)] 
Core Update 167: Ship ca-certificates

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agoupdate ca-certificates CA bundle
Peter Müller [Sat, 2 Apr 2022 11:38:31 +0000 (11:38 +0000)] 
update ca-certificates CA bundle

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agoRevert "Core Update 167: Ship qos.cgi"
Peter Müller [Mon, 4 Apr 2022 18:10:43 +0000 (18:10 +0000)] 
Revert "Core Update 167: Ship qos.cgi"

This reverts commit dcb3c4aaac5f572f0198d09a504b1cd8103d77b6.

https://lists.ipfire.org/pipermail/development/2022-April/013014.html

2 years agoRevert "qos.cgi: Removed last two P2P lines"
Peter Müller [Mon, 4 Apr 2022 18:09:29 +0000 (18:09 +0000)] 
Revert "qos.cgi: Removed last two P2P lines"

This reverts commit 652da33c019a9ed4bab40670c88356b18ac9cccf.

https://lists.ipfire.org/pipermail/development/2022-April/013014.html

2 years agoConfig: Fix calling b2sum
Michael Tremer [Mon, 4 Apr 2022 16:03:18 +0000 (16:03 +0000)] 
Config: Fix calling b2sum

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 years agoCore Update 167: Ship qos.cgi
Peter Müller [Mon, 4 Apr 2022 05:36:06 +0000 (05:36 +0000)] 
Core Update 167: Ship qos.cgi

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agoqos.cgi: Removed last two P2P lines
Matthias Fischer [Sun, 3 Apr 2022 16:04:04 +0000 (18:04 +0200)] 
qos.cgi: Removed last two P2P lines

P2P "has left da house"...

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2 years agoCore Update 167: Ship nano
Peter Müller [Mon, 4 Apr 2022 05:35:41 +0000 (05:35 +0000)] 
Core Update 167: Ship nano

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agonano: Update to 6.2
Matthias Fischer [Sun, 3 Apr 2022 16:10:47 +0000 (18:10 +0200)] 
nano: Update to 6.2

For details see:
https://www.nano-editor.org/news.php

"The file browser clears the prompt bar also when using --minibar.
Linting now works also with a newer 'pyflakes'."

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2 years agoConfig: Fix missing bracket
Peter Müller [Sun, 3 Apr 2022 16:49:02 +0000 (16:49 +0000)] 
Config: Fix missing bracket

Reported-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agoCore Update 167: Ship location-block.cgi
Peter Müller [Sun, 3 Apr 2022 09:57:34 +0000 (09:57 +0000)] 
Core Update 167: Ship location-block.cgi

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agoChanged notification for reloading firewall rules
Matthias Fischer [Sat, 2 Apr 2022 20:11:21 +0000 (22:11 +0200)] 
Changed notification for reloading firewall rules

I think 'fw rules reload...' is more logical.

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2 years agoDeleted obsolete P2P-translation strings
Matthias Fischer [Sat, 2 Apr 2022 20:11:20 +0000 (22:11 +0200)] 
Deleted obsolete P2P-translation strings

Since we dropped support for blocking P2P protocols, the corresponding translation strings
are no longer needed.

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2 years agoCore Update 167: Ship PCI and USB IDs
Peter Müller [Sun, 3 Apr 2022 09:56:13 +0000 (09:56 +0000)] 
Core Update 167: Ship PCI and USB IDs

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agohwdata: Update PCI and USB ID files
Peter Müller [Sat, 2 Apr 2022 19:04:34 +0000 (19:04 +0000)] 
hwdata: Update PCI and USB ID files

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agoncurses-compat: Fix BLAKE2 checksum
Peter Müller [Sat, 2 Apr 2022 17:10:07 +0000 (17:10 +0000)] 
ncurses-compat: Fix BLAKE2 checksum

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agomonit: Fix BLAKE2 checksum
Peter Müller [Sat, 2 Apr 2022 15:21:06 +0000 (15:21 +0000)] 
monit: Fix BLAKE2 checksum

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agoSwitch checksums from MD5 to BLAKE2
Peter Müller [Wed, 23 Mar 2022 11:12:31 +0000 (11:12 +0000)] 
Switch checksums from MD5 to BLAKE2

Historically, the MD5 checksums in our LFS files serve as a protection
against broken downloads, or accidentally corrupted source files.

While the sources are nowadays downloaded via HTTPS, it make sense to
beef up integrity protection for them, since transparently intercepting
TLS is believed to be feasible for more powerful actors, and the state
of the public PKI ecosystem is clearly not helping.

Therefore, this patch switches from MD5 to BLAKE2, updating all LFS
files as well as make.sh to deal with this checksum algorithm. BLAKE2 is
notably faster (and more secure) than SHA2, so the performance penalty
introduced by this patch is negligible, if noticeable at all.

In preparation of this patch, the toolchain files currently used have
been supplied with BLAKE2 checksums as well on
https://source.ipfire.org/.

Cc: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Acked-by: Michael Tremer <michael.tremeripfire.org>
2 years agoDrop rfkill
Peter Müller [Thu, 31 Mar 2022 12:20:45 +0000 (12:20 +0000)] 
Drop rfkill

It has been obsoleted by util-linux.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agoCore Update 166: Drop orphaned convert-ovpn script
Peter Müller [Mon, 21 Mar 2022 13:30:40 +0000 (13:30 +0000)] 
Core Update 166: Drop orphaned convert-ovpn script

This script only appeared in conjunction with Core Update 75, released
January 2014. Although it is still being executed while restoring a
backup, it would only be effective if anyone tried to restore a backup
created before C75.

I don't think there is a realistic need to carry this script along any
further. In doubt, it might be better to start from scratch again rather
than trying to restore an 8 year old backup, expecting everything to be
peachy and vanilla with it.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agoRevert "linux-firmware: Compress firmware on disk"
Peter Müller [Thu, 31 Mar 2022 09:33:53 +0000 (09:33 +0000)] 
Revert "linux-firmware: Compress firmware on disk"

This reverts commit 77e3829dc1ba7d98516c552e5c1b7c87677dee90.

For the time being, shipping this was found to be too difficult, since
we cannot get linux-firmware down to an acceptable size limit.
Compressing the firmware on installations would work, but takes about 4
minutes on an Intel Xenon CPU alone, hence it is an unacceptable
workload to do for IPFire installation running on weaker hardware.

Therefore, we do not proceed with this at the moment.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agozlib: Update to 1.2.12
Peter Müller [Thu, 31 Mar 2022 07:08:19 +0000 (07:08 +0000)] 
zlib: Update to 1.2.12

Full changelog, as retrieved from https://www.zlib.net/ChangeLog.txt :

Changes in 1.2.12 (27 Mar 2022)
- Cygwin does not have _wopen(), so do not create gzopen_w() there
- Permit a deflateParams() parameter change as soon as possible
- Limit hash table inserts after switch from stored deflate
- Fix bug when window full in deflate_stored()
- Fix CLEAR_HASH macro to be usable as a single statement
- Avoid a conversion error in gzseek when off_t type too small
- Have Makefile return non-zero error code on test failure
- Avoid some conversion warnings in gzread.c and gzwrite.c
- Update use of errno for newer Windows CE versions
- Small speedup to inflate [psumbera]
- Return an error if the gzputs string length can't fit in an int
- Add address checking in clang to -w option of configure
- Don't compute check value for raw inflate if asked to validate
- Handle case where inflateSync used when header never processed
- Avoid the use of ptrdiff_t
- Avoid an undefined behavior of memcpy() in gzappend()
- Avoid undefined behaviors of memcpy() in gz*printf()
- Avoid an undefined behavior of memcpy() in _tr_stored_block()
- Make the names in functions declarations identical to definitions
- Remove old assembler code in which bugs have manifested
- Fix deflateEnd() to not report an error at start of raw deflate
- Add legal disclaimer to README
- Emphasize the need to continue decompressing gzip members
- Correct the initialization requirements for deflateInit2()
- Fix a bug that can crash deflate on some input when using Z_FIXED
- Assure that the number of bits for deflatePrime() is valid
- Use a structure to make globals in enough.c evident
- Use a macro for the printf format of big_t in enough.c
- Clean up code style in enough.c, update version
- Use inline function instead of macro for index in enough.c
- Clarify that prefix codes are counted in enough.c
- Show all the codes for the maximum tables size in enough.c
- Add gznorm.c example, which normalizes gzip files
- Fix the zran.c example to work on a multiple-member gzip file
- Add tables for crc32_combine(), to speed it up by a factor of 200
- Add crc32_combine_gen() and crc32_combine_op() for fast combines
- Speed up software CRC-32 computation by a factor of 1.5 to 3
- Use atomic test and set, if available, for dynamic CRC tables
- Don't bother computing check value after successful inflateSync()
- Correct comment in crc32.c
- Add use of the ARMv8 crc32 instructions when requested
- Use ARM crc32 instructions if the ARM architecture has them
- Explicitly note that the 32-bit check values are 32 bits
- Avoid adding empty gzip member after gzflush with Z_FINISH
- Fix memory leak on error in gzlog.c
- Fix error in comment on the polynomial representation of a byte
- Clarify gz* function interfaces, referring to parameter names
- Change macro name in inflate.c to avoid collision in VxWorks
- Correct typo in blast.c
- Improve portability of contrib/minizip
- Fix indentation in minizip's zip.c
- Replace black/white with allow/block. (theresa-m)
- minizip warning fix if MAXU32 already defined. (gvollant)
- Fix unztell64() in minizip to work past 4GB. (Daniël Hörchner)
- Clean up minizip to reduce warnings for testing
- Add fallthrough comments for gcc
- Eliminate use of ULL constants
- Separate out address sanitizing from warnings in configure
- Remove destructive aspects of make distclean
- Check for cc masquerading as gcc or clang in configure
- Fix crc32.c to compile local functions only if used

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agoCore Update 167: Ship network-hotplug-bridges udev script
Peter Müller [Thu, 31 Mar 2022 09:28:42 +0000 (09:28 +0000)] 
Core Update 167: Ship network-hotplug-bridges udev script

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agoCore Update 167: Hardlink any identical firmware files on existing installations...
Peter Müller [Thu, 31 Mar 2022 09:27:12 +0000 (09:27 +0000)] 
Core Update 167: Hardlink any identical firmware files on existing installations as well

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agoCore Update 167: Delete dropped firmware files as well
Peter Müller [Thu, 31 Mar 2022 09:22:40 +0000 (09:22 +0000)] 
Core Update 167: Delete dropped firmware files as well

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agoCore Update 167: Add new Pakfire key after extracting the files
Peter Müller [Thu, 31 Mar 2022 09:20:50 +0000 (09:20 +0000)] 
Core Update 167: Add new Pakfire key after extracting the files

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agoTor: Pick up upstream patch for fixing sandbox with glibc >= 2.34
Peter Müller [Thu, 31 Mar 2022 07:24:25 +0000 (07:24 +0000)] 
Tor: Pick up upstream patch for fixing sandbox with glibc >= 2.34

Fixes: #12807
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agoMerge branch 'master' into next
Michael Tremer [Wed, 30 Mar 2022 15:53:27 +0000 (15:53 +0000)] 
Merge branch 'master' into next

2 years agobackup: Move empty check to the correct place
Michael Tremer [Wed, 30 Mar 2022 15:50:55 +0000 (15:50 +0000)] 
backup: Move empty check to the correct place

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 years agocore167: Ship util-linux
Michael Tremer [Wed, 30 Mar 2022 14:01:16 +0000 (14:01 +0000)] 
core167: Ship util-linux

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 years agolinux-firmware: Hardlink any identical firmware files
Michael Tremer [Tue, 29 Mar 2022 09:48:56 +0000 (09:48 +0000)] 
linux-firmware: Hardlink any identical firmware files

Some files are identical which is why we don't need to ship them mutiple
times. This will save about 13 MiB of disk space and presumably the same
on the compressed distro image.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 years agoutil-linux: Update to 2.38
Michael Tremer [Tue, 29 Mar 2022 09:48:55 +0000 (09:48 +0000)] 
util-linux: Update to 2.38

This patch also enables building hardlink(8)

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 years agolinux-firmware: Don't ship some Qualcomm AI/5G firmware
Michael Tremer [Tue, 29 Mar 2022 09:48:54 +0000 (09:48 +0000)] 
linux-firmware: Don't ship some Qualcomm AI/5G firmware

This is not needed on IPFire and saves about 13 MiB of compressed
firmware.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 years agolinux-firmware: Don't ship Mellanox Spectrum Switch Firmware
Michael Tremer [Tue, 29 Mar 2022 09:48:53 +0000 (09:48 +0000)] 
linux-firmware: Don't ship Mellanox Spectrum Switch Firmware

This is probably not usable on IPFire and saves us about 47 MiB.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 years agolinux-firmware: Don't ship Marvell Prestera Firmware
Michael Tremer [Tue, 29 Mar 2022 09:48:52 +0000 (09:48 +0000)] 
linux-firmware: Don't ship Marvell Prestera Firmware

This firmware is required for a switch ASIC which we build the kernel
module for, but which is probably not usable with IPFire.

This saves about 40 MiB of compressed firmware space.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 years agonetworking: Correctly set MTU on all bridges
Michael Tremer [Mon, 28 Mar 2022 16:55:20 +0000 (16:55 +0000)] 
networking: Correctly set MTU on all bridges

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 years agomonit: Update to 5.32.0
Matthias Fischer [Fri, 25 Mar 2022 16:41:31 +0000 (17:41 +0100)] 
monit: Update to 5.32.0

For details see:
https://mmonit.com/monit/changes/

    "Fixed: Issue #1028: If the Monit statefile was removed, the monit
    start <service> action for services with onreboot nostart option
    started the service, but did not enable monitoring of said service.
    The same problem occurred if a new onreboot nostart service was
    added, even if the statefile did exist.

    Fixed: Issue #1029: The generic protocol test truncated received
    data if the response contained zeros.

    Fixed: PAM authentication: Users with a valid password for
    a disabled account could still login to Monit. Thanks to Youssef
    Rebahi-Gilbert.

    Fixed: The Monit HTTP interface could be blocked by sending
    a request with an infinite stream of HTTP headers. Thanks to Youssef
    Rebahi-Gilbert for report."

For more details see:
https://bitbucket.org/tildeslash/monit/commits/tag/release-5-32-0

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 years agodvb-firmwares: Don't ship firmware that comes from linux-firmware
Michael Tremer [Thu, 24 Mar 2022 09:09:06 +0000 (09:09 +0000)] 
dvb-firmwares: Don't ship firmware that comes from linux-firmware

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 years agoalsa: Do not ship compressed firmware again
Michael Tremer [Thu, 24 Mar 2022 09:09:05 +0000 (09:09 +0000)] 
alsa: Do not ship compressed firmware again

This package installs some firmware files. Since linux-firmware is now
compressed, files will no longer be overwritten, but this package will
put the uncompressed files next to the compressed ones.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 years agocore167: Ship backup includes
Michael Tremer [Wed, 30 Mar 2022 13:55:36 +0000 (13:55 +0000)] 
core167: Ship backup includes

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 years agobackup: Include proxy.pac
Peter Müller [Thu, 24 Mar 2022 09:07:15 +0000 (09:07 +0000)] 
backup: Include proxy.pac

Fixes: #12814
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 years agocore167: Increment release version in update.sh
Michael Tremer [Wed, 30 Mar 2022 13:52:03 +0000 (13:52 +0000)] 
core167: Increment release version in update.sh

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 years agoMerge branch 'master' into next
Michael Tremer [Wed, 30 Mar 2022 13:51:38 +0000 (13:51 +0000)] 
Merge branch 'master' into next

2 years agoRename Core Update 166 into 167
Michael Tremer [Wed, 30 Mar 2022 13:48:09 +0000 (13:48 +0000)] 
Rename Core Update 166 into 167

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 years agocore166: Ship zlib
Michael Tremer [Wed, 30 Mar 2022 13:46:01 +0000 (13:46 +0000)] 
core166: Ship zlib

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 years agozlib: Pick up upstream patch for memory corruption fix
Peter Müller [Thu, 24 Mar 2022 08:37:22 +0000 (08:37 +0000)] 
zlib: Pick up upstream patch for memory corruption fix

See: https://www.openwall.com/lists/oss-security/2022/03/24/1

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 years agocore166: Ship misc-progs
Michael Tremer [Wed, 30 Mar 2022 13:44:31 +0000 (13:44 +0000)] 
core166: Ship misc-progs

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 years agomisc-progs: Set a reasonable default PATH variable
Michael Tremer [Mon, 21 Mar 2022 19:07:06 +0000 (19:07 +0000)] 
misc-progs: Set a reasonable default PATH variable

We have some scripts in /usr/local/bin which cannot be found by any
misc-progs which is fixed by this patch.

Fixes: #12811
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 years agocore166: Ship backup script
Michael Tremer [Wed, 30 Mar 2022 13:42:00 +0000 (13:42 +0000)] 
core166: Ship backup script

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 years agobackup: Only list files that exist
Michael Tremer [Wed, 30 Mar 2022 13:40:33 +0000 (13:40 +0000)] 
backup: Only list files that exist

This will prevent tar from throwing any errors later on

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 years agobackup: Ignore any empty lines in backup include list
Michael Tremer [Wed, 30 Mar 2022 13:39:47 +0000 (13:39 +0000)] 
backup: Ignore any empty lines in backup include list

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 years agobackup: Fix broken globbing expansion
Michael Tremer [Tue, 29 Mar 2022 12:27:11 +0000 (12:27 +0000)] 
backup: Fix broken globbing expansion

This patch fixes globbing expansion in the backup include file list
which got broken in c7e0d73e7cfd7be95db9d0a5f3392b8241813d5b.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Tested-by: Bernhard Bitsch <bernhard.bitsch@ipfire.org>
2 years agocore166: Start a new Core Update
Michael Tremer [Wed, 30 Mar 2022 13:33:06 +0000 (13:33 +0000)] 
core166: Start a new Core Update

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 years agomodule-init-tools: Delete orphaned LFS file
Peter Müller [Wed, 23 Mar 2022 11:22:29 +0000 (11:22 +0000)] 
module-init-tools: Delete orphaned LFS file

This was dropped 2013 in commit ba109afd0d551909be86bb11d797f1db80ce56f6,
but the LFS file remained there.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agoCore Update 166: Delete leftovers from LFS rootfile updates
Peter Müller [Thu, 24 Mar 2022 19:05:35 +0000 (19:05 +0000)] 
Core Update 166: Delete leftovers from LFS rootfile updates

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agoCore Update 166: Ship zlib
Peter Müller [Thu, 24 Mar 2022 18:59:48 +0000 (18:59 +0000)] 
Core Update 166: Ship zlib

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agozlib: Pick up upstream patch for memory corruption fix
Peter Müller [Thu, 24 Mar 2022 08:37:22 +0000 (08:37 +0000)] 
zlib: Pick up upstream patch for memory corruption fix

See: https://www.openwall.com/lists/oss-security/2022/03/24/1

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2 years agorules.pl: Fix creating rules for location based groups.
Stefan Schantl [Wed, 23 Mar 2022 17:08:52 +0000 (18:08 +0100)] 
rules.pl: Fix creating rules for location based groups.

The former used hash value only contains the country code when
a rule for a single country should be created.

In case a location group is used the hash value refers to the group name,
which does not work here.

The required country code is part of the processed string and can be omitted
from here. This works well for single codes and location groups, because those
are processed in a loop.

Fixes #12809.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Acked-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 years agorules.pl: Fix creating rules for location based groups.
Stefan Schantl [Wed, 23 Mar 2022 17:08:52 +0000 (18:08 +0100)] 
rules.pl: Fix creating rules for location based groups.

The former used hash value only contains the country code when
a rule for a single country should be created.

In case a location group is used the hash value refers to the group name,
which does not work here.

The required country code is part of the processed string and can be omitted
from here. This works well for single codes and location groups, because those
are processed in a loop.

Fixes #12809.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Acked-by: Peter Müller <peter.mueller@ipfire.org>
2 years agofirewall: Fix placement of HOSTILE chains
Peter Müller [Wed, 23 Mar 2022 11:18:34 +0000 (11:18 +0000)] 
firewall: Fix placement of HOSTILE chains

They were mistakenly placed after the IPS chains in commit
7b529f5417254c68b6bd33732f30578182893d34, but should be placed after the
connection tracking and before the IPS.

Fixes: #12815
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 years agolinux-firmware: Compress firmware on disk
Michael Tremer [Tue, 22 Mar 2022 15:24:49 +0000 (15:24 +0000)] 
linux-firmware: Compress firmware on disk

This patch enabled that we can compress any firmware files on disk. This
will save some space since /lib/firmware is becoming larger with every
release.

From formerly 828MiB, this is now using ~349MiB which is a saving of
about 480MiB on disk. This is helping us a lot fighting to contain the
distribution to 2GB on /.

Some other firmware that is installed in other packages is not
compressed with this patch which is a bit sad, but potentially not worth
the effort.

In order to ship this change with a Core Update, it might be intuitive
to remove /lib/firmware first and then extract the new update with all
new files. However, I do not know if this all will compress as well as
before since now the files are already individually compressed. It might
be a challenge to ship this.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 years agofirewall: Fix placement of HOSTILE chains
Peter Müller [Wed, 23 Mar 2022 11:18:34 +0000 (11:18 +0000)] 
firewall: Fix placement of HOSTILE chains

They were mistakenly placed after the IPS chains in commit
7b529f5417254c68b6bd33732f30578182893d34, but should be placed after the
connection tracking and before the IPS.

Fixes: #12815
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2 years agoCore Update 166: Ship bind
Peter Müller [Wed, 23 Mar 2022 09:42:57 +0000 (09:42 +0000)] 
Core Update 166: Ship bind

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agobind: Update to 9.16.27
Matthias Fischer [Tue, 22 Mar 2022 17:32:03 +0000 (18:32 +0100)] 
bind: Update to 9.16.27

For details see:
https://downloads.isc.org/isc/bind9/9.16.27/doc/arm/html/notes.html#notes-for-bind-9-16-27

"Security Fixes

    The rules for acceptance of records into the cache have been
    tightened to prevent the possibility of poisoning if forwarders send
    records outside the configured bailiwick. (CVE-2021-25220)

    ISC would like to thank Xiang Li, Baojun Liu, and Chaoyi Lu from
    Network and Information Security Lab, Tsinghua University, and
    Changgen Zou from Qi An Xin Group Corp. for bringing this
    vulnerability to our attention. [GL #2950]

    TCP connections with keep-response-order enabled could leave the TCP
    sockets in the CLOSE_WAIT state when the client did not properly
    shut down the connection. (CVE-2022-0396) [GL #3112]

Feature Changes

    DEBUG(1)-level messages were added when starting and ending the BIND
    9 task-exclusive mode that stops normal DNS operation (e.g. for
    reconfiguration, interface scans, and other events that require
    exclusive access to a shared resource). [GL #3137]

Bug Fixes

    The max-transfer-time-out and max-transfer-idle-out options were not
    implemented when the BIND 9 networking stack was refactored in 9.16.
    The missing functionality has been re-implemented and outgoing zone
    transfers now time out properly when not progressing. [GL #1897]

    TCP connections could hang indefinitely if the other party did not
    read sent data, causing the TCP write buffers to fill. This has been
    fixed by adding a “write” timer. Connections that are hung while
    writing now time out after the tcp-idle-timeout period has elapsed.
    [GL #3132]

    The statistics counter representing the current number of clients
    awaiting recursive resolution results (RecursClients) could
    be miscalculated in certain resolution scenarios, potentially
    causing the value of the counter to drop below zero. This has been
    fixed. [GL #3147]"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2 years agoCore Update 166: Ship rrdtool
Peter Müller [Wed, 23 Mar 2022 09:42:17 +0000 (09:42 +0000)] 
Core Update 166: Ship rrdtool

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agorrdtool: Update to 1.8.0
Matthias Fischer [Tue, 22 Mar 2022 17:37:43 +0000 (18:37 +0100)] 
rrdtool: Update to 1.8.0

For details see:
https://github.com/oetiker/rrdtool-1.x/releases/tag/v1.8.0

"Bugfixes

    python bindings: properly convert double values of rrd info
    failed to expand 'Py_UNUSED', Invalid usage when expanding 'Py_UNUSED'
    document --showtime in xport help output
    fix --use-nan-for-all-missing-data
    update rrdruby.pod
    add missing rrdruby.pod and rrdpython.pod to dist
    Set first_weekday to 0 (Sunday), when HAVE__NL_TIME_WEEK_1STDAY is not defined
    fix median calculation for all NaN inputs
    fix potential leak in xport during failure
    fix many warnings raised by Cppcheck
    fix many compiler warnings from latest gcc
    ensure proper initialization in rrd_daemon
    cleanup testsuite
    better testing
    avoid invalid read in rrd_client
    add symbols from rrdc to librrd
    Fix duplicate write_changes_to_disk() calls when HAVE_LIBRADOS is true and HAVE_MMAP is false
    documentation updates
    for SMIN example in docs
    fix for pyton3 compatibility
    freemem only for valid status <Christian Kr"oger>
    fix double meaning of time 0 as uninitialized value
    fix for zfs not supporting fallocate. this makes resize work on zfs
    add rrdrados.pod to dist
    fetch - do not call rrd_freemem on uninitialized pointers
    use separate pango fontmap per thread
    switch to python 3
    do not leak filename when opening a broken file
    fix leaks in rrdcached
    avoid segfault when flushing cache
    escape json in legend entries
    fix leak in xport
    make rrdcgi param parsing more robust
    fix race in journal_write"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2 years agoNmap: Update to 7.92
Peter Müller [Mon, 21 Mar 2022 21:30:57 +0000 (21:30 +0000)] 
Nmap: Update to 7.92

Please refer to https://nmap.org/changelog#7.92 for the changelog of
this version; it is too long to include it here.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2 years agoCore Update 166: There is no need for /dev/null in that GPG call
Peter Müller [Tue, 22 Mar 2022 17:35:11 +0000 (17:35 +0000)] 
Core Update 166: There is no need for /dev/null in that GPG call

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agoCore Update 166: Introduce new 2022 Pakfire key
Peter Müller [Mon, 21 Mar 2022 18:56:06 +0000 (18:56 +0000)] 
Core Update 166: Introduce new 2022 Pakfire key

Cc: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agoCore Update 166: Perform spring clean of orphaned files
Peter Müller [Mon, 21 Mar 2022 15:35:22 +0000 (15:35 +0000)] 
Core Update 166: Perform spring clean of orphaned files

On an IPFire installation that has been around since Core Update 110
(released April 28, 2017), these files have been identified as being
orphaned, comparing to a fresh installation of Core Update 164.

To avoid such a list of files agglomerating, persons responsible for a
Core Update should check whether an updated package contains deleted
files in its rootfile. If so, they should be deleted on existing systems
via update.sh as well.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agostrongswan: Remove redundant iptables rules
Michael Tremer [Tue, 22 Mar 2022 10:42:51 +0000 (10:42 +0000)] 
strongswan: Remove redundant iptables rules

We used to create some iptables rules that permitted traffic to the
firewall from IPsec peers. This however doesn't work due to changes in
iana-etc and it looks like those rules are entirely absolete now.

This patch removes them which should not cause any functional changes.

Fixes: #12808
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Acked-by: Peter Müller <peter.mueller@ipfire.org>
2 years agocredits: Run ./make.sh update-contributors
Peter Müller [Tue, 22 Mar 2022 07:55:16 +0000 (07:55 +0000)] 
credits: Run ./make.sh update-contributors

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agoNano: Braindead me overlooked the rootfiles were misplaced
Peter Müller [Tue, 22 Mar 2022 07:51:17 +0000 (07:51 +0000)] 
Nano: Braindead me overlooked the rootfiles were misplaced

This was introduced in b1c25d7a8456b7ff05f23c461c623dc18fddbae4, and
subsequently broke the nightly builds, and I failed to spot this in the
first place. :-/

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agoCore Update 166: Ship misc-progs
Peter Müller [Mon, 21 Mar 2022 21:38:37 +0000 (21:38 +0000)] 
Core Update 166: Ship misc-progs

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agomisc-progs: Set a reasonable default PATH variable
Michael Tremer [Mon, 21 Mar 2022 19:07:06 +0000 (19:07 +0000)] 
misc-progs: Set a reasonable default PATH variable

We have some scripts in /usr/local/bin which cannot be found by any
misc-progs which is fixed by this patch.

Fixes: #12811
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2 years agoCore Update 166: Drop Pakfire metadata for Nano, which is now part of the core system
Peter Müller [Mon, 21 Mar 2022 19:10:06 +0000 (19:10 +0000)] 
Core Update 166: Drop Pakfire metadata for Nano, which is now part of the core system

Cc: Michael Tremer <michael.tremer@ipfire.org>
Cc: Jon Murphy <jon.murphy@ipfire.org>
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agoCore Update 166: Ship and restart strongSwan
Peter Müller [Mon, 21 Mar 2022 19:04:11 +0000 (19:04 +0000)] 
Core Update 166: Ship and restart strongSwan

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agostrongSwan: Update to 5.9.5
Peter Müller [Mon, 21 Mar 2022 16:33:19 +0000 (16:33 +0000)] 
strongSwan: Update to 5.9.5

Please refer to https://github.com/strongswan/strongswan/releases/tag/5.9.5 for this
versions' changelog.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2 years agoNano: Move nano editor from packages to core system
Jon Murphy [Thu, 17 Mar 2022 17:06:29 +0000 (12:06 -0500)] 
Nano: Move nano editor from packages to core system

- this will not change the default editor `vim`

Signed-off-by: Jon Murphy <jon.murphy@ipfire.org>
Acked-by: Peter Müller <peter.mueller@ipfire.org>
Acked-by: Michael Tremer <michael.tremer@ipfire.org>
2 years agoImprove README and CONTRIBUTING
Peter Müller [Mon, 21 Mar 2022 13:47:58 +0000 (13:47 +0000)] 
Improve README and CONTRIBUTING

- Strip tailing whitespaces
- Use shorter line length to make reading the files with editors or
  terminals without automatic line break easier
- Slightly improve the content of these files

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>