]> git.ipfire.org Git - ipfire-2.x.git/log
ipfire-2.x.git
18 hours agodnsbl.cgi: Add note that ACLs are optional master
Michael Tremer [Thu, 9 Apr 2026 10:07:28 +0000 (11:07 +0100)] 
dnsbl.cgi: Add note that ACLs are optional

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
18 hours agolangs: de: Don't capitalize "ZURÜCK"
Michael Tremer [Thu, 9 Apr 2026 10:07:11 +0000 (11:07 +0100)] 
langs: de: Don't capitalize "ZURÜCK"

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
18 hours agounbound: Fix definiting access-control-tag:
Michael Tremer [Thu, 9 Apr 2026 09:53:59 +0000 (10:53 +0100)] 
unbound: Fix definiting access-control-tag:

Multiple lines referring to the same network will overwrite any previous
settings. Therefore we have to collect all tags and emit them in the
end.

Zones that should not have any restrictions won't have any tags assigned
whatsoever.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
6 days agocore201: Ship autoupdate.pl
Michael Tremer [Fri, 3 Apr 2026 12:51:26 +0000 (12:51 +0000)] 
core201: Ship autoupdate.pl

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
6 days agourlfilter: Remove everything when clearing out old blacklists
Michael Tremer [Fri, 3 Apr 2026 12:49:14 +0000 (12:49 +0000)] 
urlfilter: Remove everything when clearing out old blacklists

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
6 days agozabbix-agent: Bump release
Michael Tremer [Fri, 3 Apr 2026 12:38:34 +0000 (12:38 +0000)] 
zabbix-agent: Bump release

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
6 days agocore201: Ship sysklogd changes
Michael Tremer [Fri, 3 Apr 2026 12:37:16 +0000 (12:37 +0000)] 
core201: Ship sysklogd changes

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
6 days agoservices.cgi: Remove klogd
Michael Tremer [Fri, 3 Apr 2026 12:33:26 +0000 (12:33 +0000)] 
services.cgi: Remove klogd

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
6 days agozabbix: Remove monitoring of klogd
Michael Tremer [Fri, 3 Apr 2026 12:33:10 +0000 (12:33 +0000)] 
zabbix: Remove monitoring of klogd

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
6 days agosysklogd: Update to 2.7.2
Michael Tremer [Fri, 3 Apr 2026 12:32:31 +0000 (12:32 +0000)] 
sysklogd: Update to 2.7.2

This replaces syslogd and klogd with a combined daemon.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
13 days agoids.cgi: Fix sorting the ignored hosts by id
Stefan Schantl [Wed, 11 Mar 2026 19:39:50 +0000 (20:39 +0100)] 
ids.cgi: Fix sorting the ignored hosts by id

The sorting statement was entirely wrong, so the lists of ignored
hosts never got sorted in a proper way.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
13 days agoglibc: Apply fix for GLIBC-SA-2026-0005
Michael Tremer [Tue, 24 Mar 2026 15:19:06 +0000 (15:19 +0000)] 
glibc: Apply fix for GLIBC-SA-2026-0005

gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response

Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf
that specifies the library's DNS backend in the GNU C Library version
2.34 to version 2.43 could, with a crafted response from the configured
DNS server, result in a violation of the DNS specification that causes
the application to treat a non-answer section of the DNS response as a
valid answer.

A defect in the getanswer_ptr function, which implements the iteration
and extraction of the answer from the DNS response, can cause it to
incorrectly transition from the answer section to the next section while
still treating it as an answer to the question.  This can happen when
the answer contains only skipped records, and the subsequent section
contains a semantically invalid T_PTR record.  This is considered a
security issue because it is a violation of the DNS specification that
leads to incorrect behaviour that could result in the wrong hostname
being returned to the caller.  At the time of publication, no known
affected DNS server returns results that would be incorrectly
interpreted by the library.  An attacker would either need to be network
adjacent or have compromised the DNS server to use this defect to hide
returned reverse DNS results from intrusion detection systems. Even
then, the inbound connection from the attacker, or the outbound
connection from the application, would be visible to the intrusion
detection system.  At best, the defect can be used to obfuscate and
delay analysis of the evolving threat.

CVE-Id: CVE-2026-4437
Public-Date: 2026-03-20
Vulnerable-Commit: 32e5db37684ffcbc6ae34fcc6cdcf28670506baa (2.34-323)
Vulnerable-Commit: def97e7f71a07517810f7263213d607e08ad21f1 (2.35-188)
Vulnerable-Commit: 77f523c473878ec0051582ef15161c6982879095 (2.36-30)
Vulnerable-Commit: e32547d661a43da63368e488b6cfa9c53b4dcf92 (2.37)
Reported-by: Antonio Maini (0rbitingZer0) - 0rbitingZer0@proton.me
Reported-by: Kevin Farrell
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 weeks agodnsbl: Use a more generic hostname to fetch the zones from
Michael Tremer [Thu, 19 Mar 2026 16:27:41 +0000 (16:27 +0000)] 
dnsbl: Use a more generic hostname to fetch the zones from

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 weeks agodnsbl: Add the Shopping & Streaming categories
Michael Tremer [Thu, 19 Mar 2026 16:08:41 +0000 (16:08 +0000)] 
dnsbl: Add the Shopping & Streaming categories

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 weeks agocore201: Ship Suricata
Michael Tremer [Wed, 18 Mar 2026 14:55:58 +0000 (14:55 +0000)] 
core201: Ship Suricata

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 weeks agosuricata: Update to 8.0.4
Matthias Fischer [Wed, 18 Mar 2026 13:39:43 +0000 (14:39 +0100)] 
suricata: Update to 8.0.4

The contents of ‘suricata-8.0.3-purge-hyperscan-cache.patch’ have been integrated in 8.0.4,
and the sources for 'humantime' are now included under '/rust/vendor/humantime'.
The lfs and the rootfile have been updated.

Build is running without seen problems.

Excerpt from changelog:

"8.0.4 -- 2026-03-12

Security #8306: krb5: internal request/response buffering leads to quadratic complexity (8.0.x backport)(HIGH - CVE 2026-31932)
Security #8297: detect/ssl: null deref with tls.alpn keyword (8.0.x backport)(HIGH - CVE 2026-31931)
Security #8295: http2: unbounded number of http2 frames per transaction (8.0.x backport)(CRITICAL - CVE 2026-31935)
Security #8293: smtp/mime: quadratic complexity while looking for url strings (8.0.x backport)(HIGH - CVE 2026-31934)
Security #8287: krb5: TCP parser never advances past the first record in a multi-record segment (8.0.x backport)
Bug #8371: dpdk: "auto" in mempool size undercalculates the mempool size for Rx/Tx descriptors (8.0.x backport)
Bug #8369: ldap: add ldap.rules file (8.0.x backport)
Bug #8367: ndpi: crashing in StorageGetById() (8.0.x backport)
Bug #8362: http2: detection should use a better architecture than the Vec escaped (8.0.x backport)
Bug #8357: ldap: abandon request incorrectly handled (8.0.x backport)
Bug #8326: hs: harden cache manipulation (8.0.x backport)
Bug #8317: ldap: no invalid_data event in case of invalid request (8.0.x backport)
Bug #8312: firewall: af-packet IPS mode overwrites firewall mode (8.0.x backport)
Bug #8309: plugins/ndpi: SIGSEGV in DetectnDPIProtocolPacketMatch (8.0.x backport)
Bug #8280: build: when documentation tools are install, make dist attempt to install files to prefix (8.0.x backport)
Bug #8268: Double log rotation with rotation flag/interval (8.0.x backport)
Bug #8260: lib: examples fail with debug validation as they create threads after threads are sealed (8.0.x backport)
Bug #8252: dpdk: (x)stats are only accessible before port stop (8.0.x backport)
Bug #8249: lua: calling metatable garbage collector with nil from a script leadsd to a null pointer dereference (8.0.x backport)
Bug #8244: hyperscan: coverity warning on stat path check (8.0.x backport)
Bug #8230: detect/app-layer-event: alert generated for the wrong packet (8.0.x backport)
Bug #8219: base64: base64_data with relative match after base64_decode:relative fails (8.0.x backport)
Bug #8207: firewall: loading rules only through yaml fails (8.0.x backport)
Bug #8167: utils-spm-hs: missing deallocators on hs_compile failure (8.0.x backport)
Bug #8164: decode/ipv6: set invalid event for wrong ip version (8.0.x backport)
Bug #7982: detect/tls: zero characters in keywords such as alt name are mishandled (8.0.x backport)
Optimization #8343: conf: stream.depth is unlimited when absent from the suricata.yaml
Optimization #8299: stream/tcp: flag 1st seen pkt w stream established (8.0.x backport)
Feature #8323: hs: add pruning stats details of removal reason (8.0.x backport)
Feature #8316: firewall: support iprep in firewall mode (8.0.x backport)
Feature #8235: rules/transform: add gunzip transform (8.0.x backport)
Feature #8233: nfs: log detailed response for versions other than v3 (8.0.x backport)
Feature #7893: hyperscan: support cache invalidation and removal (8.0.x backport)
Task #8270: rust: suppress nugatory RUSTSEC-2026-0009 for time crate (8.0.x backport)
Task #8194: psl: crate should be updated on every release (8.0.x backport)
Task #8159: build-scopes: add QA or SIMULATION mode (8.0.x backport)
Task #8097: libsuricata: add live example usage of the Suricata library (8.0.x backport)
Documentation #8331: doc: explain dcerpc.opnum doesn't support operators >,<,!,= (8.0.x backport)
Documentation #8263: doc/userguide: fix within-distance pointer graphics in payload-keywords doc (8.0.x backport)
Documentation #8240: isdataat: document different semantics between absolute and relative modes (8.0.x backport)
Documentation #8217: rules/endswith: doc wrong for offset/distance/within warning (8.0.x backport)
Documentation #8114: doc: remove mention of suricata-7 in latest docs (8.0.x backport)
Documentation #7932: devguide: add a chapter about Suricata's exception policies (8.0.x backport)"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
4 weeks agocore201: Ship file
Adolf Belka [Thu, 5 Mar 2026 17:11:16 +0000 (18:11 +0100)] 
core201: Ship file

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
4 weeks agounbound: Install the cache directory
Michael Tremer [Mon, 9 Mar 2026 16:24:00 +0000 (16:24 +0000)] 
unbound: Install the cache directory

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
4 weeks agosuricata-reporter: Backport patch to render if DNS queries is empty
Michael Tremer [Mon, 9 Mar 2026 11:54:02 +0000 (11:54 +0000)] 
suricata-reporter: Backport patch to render if DNS queries is empty

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
4 weeks agounbound: Write safesearch.conf when we are starting the first time
Michael Tremer [Mon, 9 Mar 2026 11:34:39 +0000 (11:34 +0000)] 
unbound: Write safesearch.conf when we are starting the first time

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
4 weeks agodnsbl: Add the games category
Michael Tremer [Mon, 9 Mar 2026 10:43:42 +0000 (10:43 +0000)] 
dnsbl: Add the games category

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
4 weeks agocore201: Ship perl-Net-LibIDN2
Michael Tremer [Mon, 9 Mar 2026 10:41:47 +0000 (10:41 +0000)] 
core201: Ship perl-Net-LibIDN2

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
4 weeks agoweb-user-interface: Rootfile update
Stefan Schantl [Sun, 8 Mar 2026 17:31:43 +0000 (18:31 +0100)] 
web-user-interface: Rootfile update

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
4 weeks agodnsbl.cgi: Add support for IDN
Stefan Schantl [Sun, 8 Mar 2026 17:31:15 +0000 (18:31 +0100)] 
dnsbl.cgi: Add support for IDN

Use the LibIDN2 perl module to convert international domain names
in the custom allow and block list, into the idn ascii format (punnycode).

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
4 weeks agoperl-Net-LibIDN2: New package
Stefan Schantl [Sun, 8 Mar 2026 17:31:14 +0000 (18:31 +0100)] 
perl-Net-LibIDN2: New package

This perl package provides C bindings to the libidn2,
and can be used to convert international domain names into
the "idn ascii" format and vice versa.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
4 weeks agodns: Create /var/ipfire/dns/custom_domains
Michael Tremer [Sat, 7 Mar 2026 10:56:40 +0000 (10:56 +0000)] 
dns: Create /var/ipfire/dns/custom_domains

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
4 weeks agoclamav: Fix rootfile
Adolf Belka [Fri, 6 Mar 2026 19:05:24 +0000 (20:05 +0100)] 
clamav: Fix rootfile

- I missed to remove the - in front of the clamavctrl which always occurs with the
   clamav rootfile.
- This patch corrects that.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
4 weeks agocore201: Ship DNS Firewall
Michael Tremer [Fri, 6 Mar 2026 14:09:52 +0000 (14:09 +0000)] 
core201: Ship DNS Firewall

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
4 weeks agodnsbl.cgi: Reload Unbound after changing the custom RPZ
Michael Tremer [Wed, 28 Jan 2026 13:31:07 +0000 (14:31 +0100)] 
dnsbl.cgi: Reload Unbound after changing the custom RPZ

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
4 weeks agodnsbl.cgi: Only reload Unbound if we don't have an error
Michael Tremer [Wed, 28 Jan 2026 13:30:34 +0000 (14:30 +0100)] 
dnsbl.cgi: Only reload Unbound if we don't have an error

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
4 weeks agounbound: Read the custom RPZ zone
Michael Tremer [Wed, 28 Jan 2026 13:27:58 +0000 (14:27 +0100)] 
unbound: Read the custom RPZ zone

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
4 weeks agodnsbl.cgi: Store custom allow/block list in a key/value format
Michael Tremer [Wed, 28 Jan 2026 12:53:25 +0000 (13:53 +0100)] 
dnsbl.cgi: Store custom allow/block list in a key/value format

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
4 weeks agodnsbl.cgi: Show more errors at once
Michael Tremer [Wed, 28 Jan 2026 12:36:23 +0000 (13:36 +0100)] 
dnsbl.cgi: Show more errors at once

It is not very user-friendly if we are only showing one thing after the
other.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
4 weeks agodnsbl.cgi: Reformat the custom allow/block list
Michael Tremer [Wed, 28 Jan 2026 12:29:05 +0000 (13:29 +0100)] 
dnsbl.cgi: Reformat the custom allow/block list

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
4 weeks agodnsbl.cgi: Minor code cleanup
Michael Tremer [Wed, 28 Jan 2026 12:18:24 +0000 (13:18 +0100)] 
dnsbl.cgi: Minor code cleanup

No functional changes.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
4 weeks agoRun "./make.sh lang"
Michael Tremer [Wed, 28 Jan 2026 12:13:37 +0000 (13:13 +0100)] 
Run "./make.sh lang"

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
4 weeks agodnsbl.cgi: Alllow to specify custom allowed or blocked domains
Stefan Schantl [Sun, 25 Jan 2026 09:26:17 +0000 (10:26 +0100)] 
dnsbl.cgi: Alllow to specify custom allowed or blocked domains

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
4 weeks agounbound: Fix incorrect zone name of the Piracy list
Michael Tremer [Wed, 21 Jan 2026 16:58:22 +0000 (16:58 +0000)] 
unbound: Fix incorrect zone name of the Piracy list

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
4 weeks agounbound: Add the new Smart TV list
Michael Tremer [Wed, 21 Jan 2026 16:42:45 +0000 (16:42 +0000)] 
unbound: Add the new Smart TV list

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
4 weeks agounbound: Rename the primary for all RPZ zones
Michael Tremer [Wed, 21 Jan 2026 16:41:35 +0000 (16:41 +0000)] 
unbound: Rename the primary for all RPZ zones

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
4 weeks agounbound: Refactor Safe Search
Michael Tremer [Wed, 21 Jan 2026 12:25:09 +0000 (12:25 +0000)] 
unbound: Refactor Safe Search

Formerly this required the system to be online and we resolved IP
addresses once when Unbound was startet. Since Unbound is already not
very fast when reloading, we needed to get rid of this long step and
create some static configuration that is simply being loaded into
Unbound.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
4 weeks agodnsbl.cgi: Actually reload Unbound if there are any changes
Michael Tremer [Wed, 21 Jan 2026 11:57:45 +0000 (11:57 +0000)] 
dnsbl.cgi: Actually reload Unbound if there are any changes

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
4 weeks agomenu: Add an entry for the DNS Firewall
Michael Tremer [Wed, 21 Jan 2026 11:54:22 +0000 (11:54 +0000)] 
menu: Add an entry for the DNS Firewall

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
4 weeks agoCSS: Fix form input elements becoming larger than their table cells
Michael Tremer [Wed, 21 Jan 2026 11:51:59 +0000 (11:51 +0000)] 
CSS: Fix form input elements becoming larger than their table cells

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
4 weeks agodnsbl.cgi: Use the existing tools to center content
Michael Tremer [Wed, 21 Jan 2026 11:49:36 +0000 (11:49 +0000)] 
dnsbl.cgi: Use the existing tools to center content

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
4 weeks agodnsbl.cgi: Remove exessive whitespace in textarea
Michael Tremer [Wed, 21 Jan 2026 11:47:52 +0000 (11:47 +0000)] 
dnsbl.cgi: Remove exessive whitespace in textarea

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
4 weeks agodnsbl.cgi: Add a heading for the ACLs
Michael Tremer [Wed, 21 Jan 2026 11:44:55 +0000 (11:44 +0000)] 
dnsbl.cgi: Add a heading for the ACLs

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
4 weeks agoCSS: Move field descriptions to the top in forms
Michael Tremer [Wed, 21 Jan 2026 11:40:33 +0000 (11:40 +0000)] 
CSS: Move field descriptions to the top in forms

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
4 weeks agodnsbl.cgi: Add category name to edit page
Michael Tremer [Wed, 21 Jan 2026 11:37:16 +0000 (11:37 +0000)] 
dnsbl.cgi: Add category name to edit page

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
4 weeks agodnsbl.cgi: Use the form construct for the ACL page
Michael Tremer [Wed, 21 Jan 2026 11:29:54 +0000 (11:29 +0000)] 
dnsbl.cgi: Use the form construct for the ACL page

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
4 weeks agodnsbl.cgi: Rename to "DNS Firewall"
Michael Tremer [Wed, 21 Jan 2026 11:29:42 +0000 (11:29 +0000)] 
dnsbl.cgi: Rename to "DNS Firewall"

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
4 weeks agoRun "./make.sh lang"
Michael Tremer [Wed, 21 Jan 2026 11:19:48 +0000 (11:19 +0000)] 
Run "./make.sh lang"

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
4 weeks agodnsbl: Some minor string fixes
Michael Tremer [Wed, 21 Jan 2026 11:18:36 +0000 (11:18 +0000)] 
dnsbl: Some minor string fixes

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
4 weeks agodnsbl.cgi: Highlight the category names
Michael Tremer [Wed, 21 Jan 2026 11:16:04 +0000 (11:16 +0000)] 
dnsbl.cgi: Highlight the category names

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
4 weeks agodnsbl.cgi: Align checkboxes in the center of the cell
Michael Tremer [Wed, 21 Jan 2026 11:14:52 +0000 (11:14 +0000)] 
dnsbl.cgi: Align checkboxes in the center of the cell

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
4 weeks agounbound: Drop id when processing RPZ
Stefan Schantl [Wed, 21 Jan 2026 09:21:37 +0000 (10:21 +0100)] 
unbound: Drop id when processing RPZ

The /var/ipfire/dns/dnsbl settings file does not start with a numerical id
and therfore we have to adjust the processing code.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
4 weeks agodnsbl.cgi: Remove accidently commited test code
Stefan Schantl [Wed, 21 Jan 2026 09:09:30 +0000 (10:09 +0100)] 
dnsbl.cgi: Remove accidently commited test code

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
4 weeks agodnsbl.cgi: Translate hardcoded language strings
Stefan Schantl [Wed, 21 Jan 2026 09:04:20 +0000 (10:04 +0100)] 
dnsbl.cgi: Translate hardcoded language strings

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
4 weeks agodnsbl.cgi: Introduce new CGI to configure DNS filtering
Stefan Schantl [Wed, 21 Jan 2026 08:29:58 +0000 (09:29 +0100)] 
dnsbl.cgi: Introduce new CGI to configure DNS filtering

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
4 weeks agounbound: Implement ACLs for RPZs
Michael Tremer [Wed, 7 Jan 2026 13:30:22 +0000 (13:30 +0000)] 
unbound: Implement ACLs for RPZs

This allows to configure certain DNSBLs for specific networks only.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
4 weeks agounbound: Implement RPZ using IPFire DNSBL
Michael Tremer [Wed, 7 Jan 2026 12:22:53 +0000 (12:22 +0000)] 
unbound: Implement RPZ using IPFire DNSBL

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
4 weeks agovim: Update to version 9.2.0089
Adolf Belka [Thu, 5 Mar 2026 17:11:24 +0000 (18:11 +0100)] 
vim: Update to version 9.2.0089

- Update from version 9.1.2147 to 9.2.0089
- Update of rootfile
- Changelog is not available. Generally each patch version number update is related to
   a commit entry in the git repository. The details for all the commit changes can be
   found at https://github.com/vim/vim/commits/master/

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
4 weeks agosamba: Update to version 4.23.6
Adolf Belka [Thu, 5 Mar 2026 17:11:23 +0000 (18:11 +0100)] 
samba: Update to version 4.23.6

- Update from version 4.23.5 to 4.23.6
- No change to rootfile
- Changelog
    4.23.6
   * BUG 15990: No function _python_sysroot defined
   * BUG 15978: leases torture test flappy
   * BUG 15984: smbd: in contend_dirleases() don't bother checking when not
     enabled
   * BUG 15979: possible memory leak  on rpc_spoolss
   * BUG 15964: "net offlinejoin requestodj" manpage entry incorrectly mentiones
     provided credentials
   * BUG 15789: "use-kerberos=desired" broken
   * BUG 15958: pthreadpool_tevent has race conditions accessing both
     pthreadpool_tevent.jobs list and pthreadpool_tevent.glue_list
   * BUG 15979: possible memory leak  on rpc_spoolss
   * BUG 15938: CTDB's statd_callout fails on sm-notify
   * BUG 15939: CTDB statd_callout_notify notifies unnecessary clients and loses
     their state
   * BUG 15939: CTDB statd_callout_notify notifies unnecessary clients and loses
     their state
   * BUG 15977: ctdbd socket documentation is wrong

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
4 weeks agocore201: Ship libksba
Adolf Belka [Thu, 5 Mar 2026 17:11:18 +0000 (18:11 +0100)] 
core201: Ship libksba

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
4 weeks agolibksba: Update to version 1.6.8
Adolf Belka [Thu, 5 Mar 2026 17:11:22 +0000 (18:11 +0100)] 
libksba: Update to version 1.6.8

- Update from version 1.6.7 to 1.6.8
- Update of rootfile
- Changelog
    1.6.8
 * Fix double increment in DN parser while counting hexdigits.  [T8104]
 * Fix a memory leak in the BER decoder's error handling.  [T8105]
 * Fix an assertion failure in the OCSP code.  [T8111]
 * Support SHA256 based CertIDs in OCSP.  [rK2dd35bef66]
 * Use nonstring attribute for gcc-15.  [T7624]
 * Remove remaining WindowsCE support.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
4 weeks agoiptables: Update to version 1.8.13
Adolf Belka [Thu, 5 Mar 2026 17:11:21 +0000 (18:11 +0100)] 
iptables: Update to version 1.8.13

- Update from version 1.8.12 to 1.8.13
- No change to rootfile
- Changelog
    1.8.13
We have identified that iptables version 1.8.12 contains a regression that
breaks Docker networking functionality. To resolve this issue, we recommend
upgrading to the latest iptables release.
* Revert "libxtables: refuse to run under file capabilities"
* configure: Bump version for 1.8.13 release
* src: fix discards 'const' qualifier

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
4 weeks agocore201: Ship iana-etc
Adolf Belka [Thu, 5 Mar 2026 17:11:17 +0000 (18:11 +0100)] 
core201: Ship iana-etc

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
4 weeks agoiana-etc: Update to version 20260226
Adolf Belka [Thu, 5 Mar 2026 17:11:20 +0000 (18:11 +0100)] 
iana-etc: Update to version 20260226

- Update from version 20251215 to 20260226
- No change to rootfile
- No changelog provided

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
4 weeks agofile: Update to version 5.47
Adolf Belka [Thu, 5 Mar 2026 17:11:19 +0000 (18:11 +0100)] 
file: Update to version 5.47

- Update from version 5.45 to 5.47
- No change to rootfile
- Changelog
    5.47
* Better multi-compound document identification by following the
  order of the directories entries. (Thomas Ledoux)
* if stat fails, don't attempt to restore times (Steven Grubb)
* PR/622: Odd_Bloke: Handle negative offsets in file_buffer(),
  when fd is not available.
* PR/655: jsummers: Obey str_flags in strings like we do for search
  and regex
* PR/659: Pitzl: Apply MAGIC_CONTINUE to annotations; i.e. print
  only the first, unless -k is specified.
* PR/592: allow + in format strings
* PR/592: signed operations should be done in signed context
* PR/578: jsummers: Don't crash on cygwin when tm_mon == -1
* PR/579: net147: Fix stack overrun.
    5.46
* Add OFFPOSITIVE
* avoid leaking symbols in libmagic
* PR/562: jsummers: Search/regex offsets are absolute to the
  beginning of the file, so adjust them by subtracting the
  offset that the "use" starts so that we don't double-count it.
* PR/543: matshch: bump nbuf so we can get the flags into the buffer.
* Add Android elf notes (enh)
* Add limit for number of magic warnings allowed
* check regex bounds (found by clusterfuzz)

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
4 weeks agoclamav: Update to version 1.5.2
Adolf Belka [Thu, 5 Mar 2026 17:11:15 +0000 (18:11 +0100)] 
clamav: Update to version 1.5.2

- Update from version 1.5.1 to 1.5.2
- Update of rootfile
- CVE fix in update
- Changelog
    1.5.2
- [CVE-2026-20031](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20031):
  Fixed an error handling bug in the HTML file parser that may crash the program
  and cause a denial-of-service (DoS) condition.
  This issue was introduced in version 1.1.0.
  The fix is included in 1.5.2 and 1.4.4.
- Fixed a possible infinite loop when scanning some JPEG files by upgrading
  affected ClamAV dependency, a Rust image library.
  Unfortunately, this change requires a newer Rust compiler for ClamAV.
  The minimum Rust version for ClamAV 1.4.3 was 1.85.1.
  The minimum Rust version for ClamAV 1.4.4 is now 1.87.0.
- Fixed a possible crash on Windows when scanning some files while using the
  `LeaveTemporaryFiles` and `TemporaryDirectory` features.
- The CVD verification process will now ignore certificate files in the CVD
  certs directory when the user lacks read permissions.
- Freshclam: Fixed CLD verification bug with `PrivateMirror` option.
- Upgraded the Rust `bytes` dependency to a newer version to resolve the
  RUSTSEC-2026-0007 advisory.
- Fixed a possible crash caused by invalid pointer alignment on some platforms.
  This fix is courtesy of Hsuan-Ming Chen at Synology PSIRT.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
5 weeks agobind: Update to 9.20.20
Matthias Fischer [Sat, 28 Feb 2026 17:00:18 +0000 (18:00 +0100)] 
bind: Update to 9.20.20

For details see:

https://downloads.isc.org/isc/bind9/9.20.20/doc/arm/html/notes.html#notes-for-bind-9-20-20

"Notes for BIND 9.20.20
Security Fixes

    Fix a use-after-free error in dns_client_resolve() triggered by a DNAME
    response.

    This issue only affected the delv tool and it has now been fixed.

    ISC would like to thank Vitaly Simonovich for bringing this
    vulnerability to our attention. [GL #5728]

Feature Changes

    Record query time for all dnstap responses.

    Not all DNS responses had the query time set in their corresponding
    dnstap messages. This has been fixed. [GL #3695]

    Optimize TCP source port selection on Linux.

    Enable the IP_LOCAL_PORT_RANGE socket option on the outgoing TCP
    sockets to allow faster selection of the source <address,port> tuple
    for different destination <address,port> tuples, when nearing over
    70-80% of the source port utilization. [GL !11569]

Bug Fixes

    Fix an assertion failure triggered by non-minimal IXFRs.

    Processing an IXFR that included an RRset whose contents were not
    changed by the transfer triggered an assertion failure. This has been
    fixed. [GL #5759]

    Fix a crash when retrying a NOTIFY over TCP.

    Furthermore, do not attempt to retry over TCP at all if the source
    address is not available. [GL #5457]

    Fetch loop detection improvements.

    Fix a case where an in-domain nameserver with expired glue would fail
    to resolve. [GL #5588]

    Randomize nameserver selection.

    Since BIND 9.20.17, when selecting nameserver addresses to be looked
    up, named selected them in DNSSEC order from the start of the NS RRset.
    This could lead to a resolution failure despite there being an address
    that could be resolved using the other nameserver names. named now
    randomizes the order in which nameserver addresses are looked up. [GL
    #5695] [GL #5745]

    Fix dnstap logging of forwarded queries. [GL #5724]

    A stale answer could have been served in case of multiple upstream
    failures when following CNAME chains. This has been fixed. [GL #5751]

    Fail DNSKEY validation when supported but invalid DS is found.

    A regression was introduced in BIND 9.20.6 when adding the EDE code for
    unsupported DNSKEY and DS algorithms. When the parent had both
    supported and unsupported algorithms in the DS record, the validator
    would treat the supported DS algorithm as insecure instead of bogus
    when validating DNSKEY records. This has no security impact, as the
    rest of the child zone correctly ends with bogus status, but it is
    incorrect and thus the regression has been fixed. [GL #5757]

    Importing an invalid SKR file might corrupt stack memory.

    If an administrator imported an invalid SKR file, the local stack in
    the import function might overflow. This could lead to a memory
    corruption on the stack and ultimately a server crash. This has been
    fixed. [GL #5758]

    Return FORMERR for queries with the EDNS Client Subnet FAMILY field set
    to 0.

    RFC 7871 only defines families 1 (IPv4) and 2 (IPv6), and requires
    FORMERR to be returned for all unknown families. Queries with the EDNS
    Client Subnet FAMILY field set to 0 now elicit responses with
    RCODE=FORMERR. [GL !11565]"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
5 weeks agominicom: Update to version 2.11
Adolf Belka [Fri, 27 Feb 2026 18:18:36 +0000 (19:18 +0100)] 
minicom: Update to version 2.11

- Update from version 2.9 to 2.11
- No change to rootfile
- Changelog
    2.11
 - fix baudrate setting on Linux when compiled against glibc >= 2.42
 - Support multi-column character for window drawing
 - Add 1843200 to the baud rate list
 - Allow any baud rate to be set
 - Updates translations: ka, fr, ro, pl, ko, de, ja, sv
    2.10
 - Add third locking method if file-based lock does not work.
   https://salsa.debian.org/minicom-team/minicom/-/issues/9
 - Make colors enabled the default.
 - ESC-] (OSC) sequences are recognized and discarded.
 - Code cleanups.
 - Updates translations: nb

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
5 weeks agocore201: Ship lua
Adolf Belka [Fri, 27 Feb 2026 18:18:30 +0000 (19:18 +0100)] 
core201: Ship lua

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
5 weeks agocore201: Ship iptables
Adolf Belka [Fri, 27 Feb 2026 18:18:29 +0000 (19:18 +0100)] 
core201: Ship iptables

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
5 weeks agoiptables: Update to version 1.8.12
Adolf Belka [Fri, 27 Feb 2026 18:18:34 +0000 (19:18 +0100)] 
iptables: Update to version 1.8.12

- Update from version 1.8.11 to 1.8.12
- No change to rootfile
- Changelog
    1.8.12
      configure: Avoid addition assignment operators
      libxtables: refuse to run under file capabilities
      man: iptables-restore.8: document flush behaviour for user-defined chains
      nft: revert compat expressions in userdata
      ip[6]tables-translate: fix test failures when WESP is defined
      nft: fix interface comparisons in `-C` commands
      extensions: libebt_redirect: prevent translation
      configure: Bump version for 1.8.12 release
      nft: Drop interface mask leftovers from post_parse callbacks
      nft: Make add_log() static
      nft: ruleparse: Introduce nft_parse_rule_expr()
      nft: __add_{match,target}() can't fail
      nft: Introduce UDATA_TYPE_COMPAT_EXT
      nft-ruleparse: Fallback to compat expressions in userdata
      nft: Pass nft_handle into add_{action,match}()
      nft: Embed compat extensions in rule userdata
      tests: iptables-test: Add nft-compat variant
      extensions: icmp: Support info-request/-reply type names
      xshared: Accept an option if any given command allows it
      extensions: sctp: Translate bare '-m sctp' match
      libxtables: Promote xtopt_esize_by_type() as xtopt_psize getter
      Revert "libxtables: Promote xtopt_esize_by_type() as xtopt_psize getter"
      xtables-monitor: Print -X command for base chains, too
      nft: Support replacing a rule added in the same batch
      libxtables: Store all requested target types
      ruleparse: arp: Fix for all-zero mask on Big Endian
      tests: shell: Review nft-only/0009-needless-bitwise_0
      configure: Auto-detect libz unless explicitly requested
      iptables: fix null dereference parsing bitwise operations
      extensions: man: Add a note about route_localnet sysctl

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
5 weeks agocore201: Ship wireless-regdb
Adolf Belka [Fri, 27 Feb 2026 18:18:31 +0000 (19:18 +0100)] 
core201: Ship wireless-regdb

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
5 weeks agowireless-regdb: Update to version 2026.02.04
Adolf Belka [Fri, 27 Feb 2026 18:18:38 +0000 (19:18 +0100)] 
wireless-regdb: Update to version 2026.02.04

- Update from version 2025.10.07 to 2026.02.04
- No change to rootfile
- Changelog
    2026.02.04
      wireless-regdb: Update broken link in regulatory.bin(5) manpage
      wireless-regdb: Update regulatory info for Malaysia (MY) for 2024
      wireless-regdb: Update regulatory info for Malaysia (MY) for 2025
      wireless-regdb: Update regulatory info for Canada (CA) for 2025
      wireless-regdb: update regulatory database based on preceding changes
      wireless-regdb: Update regulatory info for Tunisia (TN) on 6GHz for 2025
      wireless-regdb: Update regulatory info for Australia (AU) for 2025

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
5 weeks agotshark: Update to version 4.6.4
Adolf Belka [Fri, 27 Feb 2026 18:18:37 +0000 (19:18 +0100)] 
tshark: Update to version 4.6.4

- Update from version 4.6.3 to 4.6.4
- Update of rootfile
- 3 CVE fixes
- Changelog
    4.6.4
Bug Fixes
    wnpa-sec-2026-05 USB HID dissector memory exhaustion. Issue 20972. CVE-2026-3201.
    wnpa-sec-2026-06 NTS-KE dissector crash. Issue 21000. CVE-2026-3202.
    wnpa-sec-2026-07 RF4CE Profile dissector crash. Issue 21009. CVE-2026-3203.
    Wireshark doesn’t start if Npcap is configured with "Restrict Npcap driver’s
Access to Administrators only" Issue 20828.
    PQC signature algorithm not reported in signature_algorithms. Issue 20953.
    Unexpected JA4 ALPN values when space characters sent. Issue 20966.
    Expert Info seems to have quadratic performance (gets slower and slower) Issue 20970.
    IKEv2 EMERGENCY_CALL_NUMBERS Notify payload cannot be decoded. Issue 20974.
    TShark and editcap fails with segmentation fault when output format (-F) set to
blf. Issue 20976.
    Fuzz job crash: fuzz-2026-02-01-12944805400.pcap [Zigbee Direct Tunneling Zigbee
NWK PDUs NULL hash table] Issue 20977.
    Wiretap writes pcapng custom options with string values invalidly. Issue 20978.
    RDM status in Output Status (GoodOutputB) field incorrectly decoded in Art-Net
PollReply dissector. Issue 20980.
    Wiretap writes invalid pcapng Darwin option blocks. Issue 20991.
    TDS dissector desynchronizes on RPC DATENTYPE (0x28) due to incorrect expectation
of TYPE_VARLEN (MaxLen) Issue 21001.
    Only first HTTP POST is parsed inside SOCKS with "Decode As". Issue 21006.
    TShark: Bogus "Dissector bug" messages generated in pipelines where something
after tshark exits before reading all its input. Issue 21011.
    New Diameter RAT-Types in TS 29.212 not decoded. Issue 21012.
    Malformed packet error on Trigger HE Basic frames. Issue 21032.
Updated Protocol Support
Art-Net, AT, BGP, GSM DTAP, GSM SIM, IEEE 802.11, IPv6, ISAKMP, MBIM, MySQL,
 NAS-5GS, NTS-KE, SGP.22, Silabs DCH, Socks, TDS, TECMP, USB HID, ZB TLV, and ZBD
New and Updated Capture File Support
BLF, pcapng, and TTL

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
5 weeks agofping: Update to version 5.5
Adolf Belka [Fri, 27 Feb 2026 18:18:33 +0000 (19:18 +0100)] 
fping: Update to version 5.5

- Update from version 5.4 to 5.5
- No change to rootfile
- Changelog
    5.5
New features
- New option -J / --json for JSON output. See doc/fping-json.md for
  the JSON schema. This feature is still in alpha and the schema
  might change in future releases (#386, thanks @bonkf,
  @JoshIPT, @sebast-gsnw, and @auerswal).
- The -g, --generate option now also supports IPv6 addresses (#376,
  thanks @auerswal)
- New option --seqmap-timeout to control the time after which sequence
  numbers can be used again (#388, thanks @auerswal)
Bugfixes and other changes
- Fix OpenBSD sprintf() warning (#394, thanks @gsnw-sebast)
- Fix fallback to SO\_TIMESTAMP if SO\_TIMESTAMPNS is not available (#375,
  thanks @auerswal)
- When reading target names from file or standard input, lines longer
  than the static buffer are no longer interpreted as more than one line
  (#378, thanks @auerswal)
- Typo fix in error message when SO\_BINDTODEVICE fails
- Options --print-tos and --print-ttl now also work for IPv6, and no
  longer require privileges (#384, thanks @auerswal)
- Report received ICMPv6 error messages (#391, thanks @auerswal)
- Suppress duplicate reports in count mode with -q, --quiet or -Q, --squiet
  (#392, thanks @gsnw-sebast and @auerswal)
- Switch to alpine-based multi-stage Docker build to reduce image size
  and improve build performance; add OpenContainers-compatible labels
  (#399, thanks @hoodadt)
- Print receive ping moved to new functions (#400, thanks @gsnw-sebast)
- Avoid unsigned overflow when determining the memory size to save
  response times on systems where size\_t is the same as unsigned int
  (#412 by @auerswal)
- Document the new minimum value for the -p option (#414, thanks @auerswal)
- Fix build without IPv6 support (#416, thanks @auerswal)
- Fix debug build use of dbg_printf in fping.c (#415, thanks @auerswal)
- Remove MacOS-specific test for -I option (#407)
- GitHub Actions fixes (thanks @gsnw-sebast)
- Fix measurement of time for timed reports (-Q) to start after DNS name
  resolution.
- Updated autoconf from 2.71 to 2.72
- Updated automake from 1.16.5 to 1.18.1
- Updated libtool from 2.4.6 to 2.5.4
- Implemented verification of autotools tarballs in Github actions.
- Implemented stricter flag value checking (e.g. -c 10xyz is not accepted
  anymore).

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
5 weeks agoddrescue: Update to version 1.30
Adolf Belka [Fri, 27 Feb 2026 18:18:32 +0000 (19:18 +0100)] 
ddrescue: Update to version 1.30

- Update from version 1.29 to 1.30
- No change to rootfile
- Changelog
    1.30
* Replace pass 5 of copying with a sweeping phase after trimming.
* New option '-N, --no-sweep' to disable reading of skipped areas.
  Reassign short name '-N' from option '--no-trim' to '--no-sweep'.
* main.cc. Make '--size=output' use the size of outfile.
  (Suggested by Stefan Monnier).
  (do_rescue): Make '-x 0' extend outfile to size of infile.
* main_common.cc (strtoll_): New function accepting underscores.
* rescuebook.cc (fcopy_non_tried, rcopy_non_tried): Limit pass 2 to
  blocks adjacent to a finished block. (Delimit bad area as a whole).
  (trim_errors): Trim only edges adjacent to a finished block.
  Initial skip size now defaults to (infile_size / 32_768).
  Only retrim blocks adjacent to a non-tried or finished block.
  (update_rates): Don't force update of a_rate, c_rate, ts.
  (Rescuebook): Estimate remaining time from last 60 seconds.
  (Suggested by Stefan Monnier).
* genbook.cc (format_time), loggers.cc (format_time_dhms): Add years.
* loggers.cc (Event_logger): Add finished_size, a_rate, read errors.
* ddrescuelog.cc: New option '-H, --make-test'.
* ddrescue.texi: Document rescue with lziprecover's recovery record.
    1.29.1
* New option '--bad-sector-data'. (Suggested by Eliyahu Saks).
* main_common.cc (format_num3): New function.
* mapbook.cc (input_pos_error): Print pos and size aligned.
* ddrescue.texi: Document use of -p and -x with --domain-mapfile.
  (Reported by Bret Quigley II).
* block.h: Rename to mapfile.h.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
6 weeks agokernel: update riscv64 config amd rootfiles
Arne Fitzenreiter [Wed, 25 Feb 2026 07:34:34 +0000 (08:34 +0100)] 
kernel: update riscv64 config amd rootfiles

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
6 weeks agoMerge branch 'master' into next
Michael Tremer [Tue, 24 Feb 2026 08:29:37 +0000 (08:29 +0000)] 
Merge branch 'master' into next

6 weeks agodehydrated: Fix for bug13945 - not renewing certificates within period of 32 days... core200
Adolf Belka [Mon, 23 Feb 2026 19:45:14 +0000 (20:45 +0100)] 
dehydrated: Fix for bug13945 - not renewing certificates within period of 32 days before expiring

- Application of two commits that will end up as part of 0.7.3 eventually.

Fixes: bug13945
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
6 weeks agoMerge branch 'master' into next
Michael Tremer [Mon, 23 Feb 2026 11:30:59 +0000 (11:30 +0000)] 
Merge branch 'master' into next

6 weeks agocore200: Ship ids.cgi
Michael Tremer [Mon, 23 Feb 2026 11:29:08 +0000 (11:29 +0000)] 
core200: Ship ids.cgi

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
6 weeks agosuricata: Support separating email addresses by semicolon
Michael Tremer [Mon, 23 Feb 2026 11:28:12 +0000 (11:28 +0000)] 
suricata: Support separating email addresses by semicolon

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
6 weeks agoautoupdate.pl: Don't remove any custom lists
Michael Tremer [Mon, 23 Feb 2026 11:22:15 +0000 (11:22 +0000)] 
autoupdate.pl: Don't remove any custom lists

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
6 weeks agocore200: Ship autoupdate.pl
Michael Tremer [Mon, 23 Feb 2026 10:51:22 +0000 (10:51 +0000)] 
core200: Ship autoupdate.pl

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
6 weeks agourlfilter: Fix syntax when calling chown
Stefan Schantl [Sun, 22 Feb 2026 19:07:53 +0000 (20:07 +0100)] 
urlfilter: Fix syntax when calling chown

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
6 weeks agourlfiler: Cleanup list directory during update
Stefan Schantl [Sun, 22 Feb 2026 19:07:52 +0000 (20:07 +0100)] 
urlfiler: Cleanup list directory during update

Cleanup the directory which contains the downloaded blocklists during
the update process. As the same code is used for sheduled and manual
updates/list installs this also cleans up old lists when switching the
lists provider.

Fixes #13820.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
6 weeks agoMerge branch 'master' into next
Michael Tremer [Sun, 22 Feb 2026 11:09:06 +0000 (11:09 +0000)] 
Merge branch 'master' into next

6 weeks agohostapd: Bump package version due to changes in wlanap.cgi
Michael Tremer [Sun, 22 Feb 2026 11:08:37 +0000 (11:08 +0000)] 
hostapd: Bump package version due to changes in wlanap.cgi

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
6 weeks agowlanap.cgi: Proper escape special characters in PSK
Stefan Schantl [Fri, 20 Feb 2026 18:29:21 +0000 (19:29 +0100)] 
wlanap.cgi: Proper escape special characters in PSK

Otherwise a used quote leads to not proper display
the used PSK in the WUI.

Fixes #13920

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
6 weeks agocore201: Ship suricata-reporter
Michael Tremer [Fri, 20 Feb 2026 17:30:47 +0000 (17:30 +0000)] 
core201: Ship suricata-reporter

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
6 weeks agosuricata-reporter: Update to 0.7
Michael Tremer [Fri, 20 Feb 2026 17:29:51 +0000 (17:29 +0000)] 
suricata-reporter: Update to 0.7

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
6 weeks agocore201: Ship BIND
Michael Tremer [Fri, 20 Feb 2026 10:40:51 +0000 (10:40 +0000)] 
core201: Ship BIND

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
6 weeks agobind: Update to 9.20.19
Matthias Fischer [Fri, 20 Feb 2026 07:19:09 +0000 (08:19 +0100)] 
bind: Update to 9.20.19

For details see:

https://downloads.isc.org/isc/bind9/9.20.19/doc/arm/html/notes.html#notes-for-bind-9-20-19

"Notes for BIND 9.20.19
Feature Changes

    Update requirements for system test suite.

    Python 3.10 or newer is now required for running the system test suite.
    The required Python packages and their version requirements are now
    tracked in the file bin/tests/system/requirements.txt. [GL #5690] [GL
    #5614]

Bug Fixes

    Fix inbound IXFR performance regression.

    Very large inbound IXFR transfers were much slower compared to BIND
    9.18. The performance was improved by adding specialized logic to
    handle IXFR transfers. [GL #5442]

    Make catalog zone names and member zones' entry names case-insensitive.
    [GL #5693]

    Fix implementation of BRID and HHIT record types. [GL #5710]

    Fix implementation of DSYNC record type. [GL #5711]

    Fix response policy and catalog zones to work with $INCLUDE directive.

    Reloading a RPZ or a catalog zone could have failed when $INCLUDE was
    in use. [GL #5714]"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
7 weeks agoMerge branch 'master' into next
Michael Tremer [Thu, 19 Feb 2026 18:38:27 +0000 (18:38 +0000)] 
Merge branch 'master' into next

7 weeks agoRun "./make.sh lang"
Michael Tremer [Thu, 19 Feb 2026 15:58:02 +0000 (15:58 +0000)] 
Run "./make.sh lang"

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
7 weeks agocore200: Ship general-functions.pl
Michael Tremer [Thu, 19 Feb 2026 15:57:37 +0000 (15:57 +0000)] 
core200: Ship general-functions.pl

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>