aboutsummaryrefslogtreecommitdiff
path: root/net
Commit message (Collapse)AuthorAge
* adblock: update to 4.1.5-7Dirk Brenken2023-03-20
| | | | | | | | * fix cornercase issue with duplicate entries in black- and whitelist * change cpbl source URL * firewall redirects now blocks IPv4 and IPv6 (set family to "any") Signed-off-by: Dirk Brenken <dev@brenken.org>
* dnsproxy: Update to 0.48.1Tianling Shen2023-03-21
| | | | Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
* cloudflared: Update to 2023.3.1Tianling Shen2023-03-20
| | | | Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
* v2raya: Update to 2.0.4Tianling Shen2023-03-20
| | | | | | | | | - Added TproxyNotSkipBr flag for OpenWrt. - Removed all upstreamed patches. - Removed deprecated option. - Re-enable ipv6/nftables auto-detect. Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
* haproxy: update to v2.6.10Christian Lachner2023-03-20
| | | | | | | - Update haproxy download URL and hash - See changes: http://git.haproxy.org/?p=haproxy-2.6.git;a=shortlog Signed-off-by: Christian Lachner <gladiac@gmail.com>
* transmission: update to version 4.0.2Daniel Golle2023-03-20
| | | | | | | See release notes for more details: https://github.com/transmission/transmission/releases/tag/4.0.2 Signed-off-by: Daniel Golle <daniel@makrotopia.org>
* openssh: update to 9.3p1Sibren Vasse2023-03-18
| | | | Signed-off-by: Sibren Vasse <github@sibrenvasse.nl>
* Merge pull request #20656 from pprindeville/strongwan-update-5.9.10Philip Prindeville2023-03-17
|\ | | | | strongswan: Update to 5.9.10
| * strongswan: Update to 5.9.10Philip Prindeville2023-03-12
| | | | | | | | Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
* | rclone: Update to 1.62.2Tianling Shen2023-03-17
| | | | | | | | Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
* | git: update to 2.39.2Michal Vasilek2023-03-16
| | | | | | | | | | | | | | | | | | | | GITWEB_* variable values don't work as they should since 2.38, so let's remove them and add a workaround. This issue was reported in https://lore.kernel.org/git/80eb3972-4960-5727-ce86-acc3a4425fd4@nic.cz/T/#u * refresh patches Signed-off-by: Michal Vasilek <michal.vasilek@nic.cz>
* | udpspeeder: bump to 20230206.0Toni Uhlig2023-03-15
| | | | | | | | Signed-off-by: Toni Uhlig <matzeton@googlemail.com>
* | zerotier: do not allow executable stackOskari Rauta2023-03-15
| | | | | | | | | | | | | | | | | | | | | | | | | | zerotier as default has executable stack. [ 11.343143] process '/usr/bin/zerotier-one' started with executable stack executable stacks are not recommend, possibly provide a threat and there seems to be no advantage of executable stack with zerotier-one - so let's build it without instead. Stack is executable on x86_64, but not on all archs, such as ramips. Signed-off-by: Oskari Rauta <oskari.rauta@gmail.com>
* | snort3: update to 3.1.57.0John Audia2023-03-14
| | | | | | | | | | | | Upstream bump Signed-off-by: John Audia <therealgraysky@proton.me>
* | Merge pull request #20621 from banburybill/ddns-mythic-v2Florian Eckert2023-03-14
|\ \ | | | | | | ddns-scripts: Add v2 API for mythic-beasts.com provider
| * | ddns-scripts: Add v2 API for mythic-beasts.com providerJim Hague2023-03-09
| | | | | | | | | | | | | | | | | | Use USERNAME as the key, PASSWORD as the secret. Signed-off-by: Jim Hague <jim.hague@acm.org>
* | | zerotier: update to 1.10.4Moritz Warning2023-03-14
| | | | | | | | | | | | Signed-off-by: Moritz Warning <moritzwarning@web.de>
* | | netbird: update to 0.14.3Oskari Rauta2023-03-13
| | | | | | | | | | | | | | | | | | | | | | | | | | | Bug fixes & refactor Release notes: - Fix: send remote agents updates when peer re-authenticates Signed-off-by: Oskari Rauta <oskari.rauta@gmail.com>
* | | v2ray-geodata: Update to latest versionTianling Shen2023-03-13
| | | | | | | | | | | | Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
* | | xray-core: Update to 1.8.0Tianling Shen2023-03-13
| |/ |/| | | | | Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
* | Merge pull request #20261 from pprindeville/strongswan-update-5.9.9Philip Prindeville2023-03-12
|\ \ | | | | | | strongswan: Update to 5.9.9
| * | strongswan: Update to 5.9.9Philip Prindeville2023-03-12
| | | | | | | | | | | | | | | | | | Add patch to remove definition of RNG leaking in from wolfssl.h. Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
* | | snort3: update to 3.1.56.0John Audia2023-03-12
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Upstream bump Build system: x86_64 Build-tested: bcm2711/RPi4B Run-tested: bcm2711/RPi4B Signed-off-by: John Audia <therealgraysky@proton.me>
* | | simple-adblock: update init file and configStan Grishin2023-03-11
| | | | | | | | | | | | | | | | | | | | | | | | * move network.sh and jshn.sh includes into load_validate_config function to prevent errors when adding the package to image with the Image Builder * add @bongochong compressed domains block-list to the config Signed-off-by: Stan Grishin <stangri@melmac.ca>
* | | netifyd: update to v4.4.1Darryl Sokoloski2023-03-11
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | - Explicitly request the C++11 standard (codebase is not C++17 compliant). - Removed categories.json from conffiles -- it's not a configuration file. - Removed commented-out convenience git hash place-holder -- for some reason it irritates people. - Added radix header file to devel files. - Removed redundant call to Build/Configure (not needed). Co-authored-by: Tianling Shen <cnsztl@gmail.com> Signed-off-by: Darryl Sokoloski <darryl@sokoloski.ca>
* | | ksmbd-tools: update to 3.4.7Rosen Penev2023-03-10
| | | | | | | | | | | | | | | | | | Remove upstreamed patches. Signed-off-by: Rosen Penev <rosenp@gmail.com>
* | | banip: update 0.8.2-2Dirk Brenken2023-03-10
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * fix the auto-detection for pppoe and 6in4 tunnel interfaces * add the new 'ban_nftpolicy' option to expose the nft set policy, values: memory (default), performance * add the new 'ban_nftlogevel' option to expose the nft syslog level, values: emerg, alert, crit, err, warn (default), notice, info, debug, audit * status optimizations * logging optimizations * update the readme Signed-off-by: Dirk Brenken <dev@brenken.org>
* | | miniupnpd: bump to 2.3.3Stijn Tintel2023-03-10
| |/ |/| | | | | | | Fixes: #19637 Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
* | udp-broadcast-relay-redux-openwrt: add cgroupsns to jailBackSlasher2023-03-09
| | | | | | | | | | | | | | | | | | | | | | | | | | Added `cgroupsns` to jail, otherwise you get this failure: ``` Mon Mar 6 14:46:05 2023 user.err : jail: Not using namespaces, capabilities or seccomp !!! ``` Error is here, seems to indicate that we're running a jail without using any capability. https://lxr.openwrt.org/source/procd/jail/jail.c#L2847 Decided to use minimal effort approach Signed-off-by: BackSlasher <nitz.raz@gmail.com>
* | cni-protocol: new packageOskari Rauta2023-03-09
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | simple protocol support script for netifd. netifd protocol support for cni networks makes defining network for podman and other similar systems using cni networking much easier and simpler. with cni protocol support, on a cni network, where firewall and portmapper is disabled, you may control firewalling with openwrt's standard firewall configuration. for example, create a container that hosts web content on port 80 with static ip on your cni network, if your network is 10.88.0.0/16, use for eg. 10.88.0.101 as your containers static ip address. Create a zone, cni to your firewall and add your interface to it. Now you can easily set up redirectiong to 10.88.0.101:80 to expose it's port 80 to wan for serving your website. Protocol has only one setting: device, on podman this often is cni-podman0. This protocol may also be used on other equillavents, such as netavark (cni replacement in podman), where device as default is podman0. Signed-off-by: Oskari Rauta <oskari.rauta@gmail.com>
* | pdns-recursor: update to 4.8.3Peter van Dijk2023-03-09
| | | | | | | | Signed-off-by: Peter van Dijk <peter.van.dijk@powerdns.com>
* | Merge pull request #20584 from mpeleshenko/samba4-4.17.5Tianling Shen2023-03-09
|\ \ | | | | | | samba4: update to 4.17.5
| * | samba4: update to 4.17.5Michael Peleshenko2023-03-08
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * update to 4.17.5 * changelog: https://www.samba.org/samba/history/samba-4.17.5 * refresh patch * CVE-2022-42898: Samba's Kerberos libraries and AD DC failed to guard against integer overflows when parsing a PAC on a 32-bit system, which allowed an attacker with a forged PAC to corrupt the heap. https://www.samba.org/samba/security/CVE-2022-42898.html * CVE-2022-37966: This is the Samba CVE for the Windows Kerberos RC4-HMAC Elevation of Privilege Vulnerability disclosed by Microsoft on Nov 8 2022. A Samba Active Directory DC will issue weak rc4-hmac session keys for use between modern clients and servers despite all modern Kerberos implementations supporting the aes256-cts-hmac-sha1-96 cipher. On Samba Active Directory DCs and members 'kerberos encryption types = legacy' would force rc4-hmac as a client even if the server supports aes128-cts-hmac-sha1-96 and/or aes256-cts-hmac-sha1-96. https://www.samba.org/samba/security/CVE-2022-37966.html * CVE-2022-37967: This is the Samba CVE for the Windows Kerberos Elevation of Privilege Vulnerability disclosed by Microsoft on Nov 8 2022. A service account with the special constrained delegation permission could forge a more powerful ticket than the one it was presented with. https://www.samba.org/samba/security/CVE-2022-37967.html * CVE-2022-38023: The "RC4" protection of the NetLogon Secure channel uses the same algorithms as rc4-hmac cryptography in Kerberos, and so must also be assumed to be weak. https://www.samba.org/samba/security/CVE-2022-38023.html * BUG 15210: synthetic_pathref AFP_AfpInfo failed errors. This resolves errors logged during macOS TimeMachine backups. https://bugzilla.samba.org/show_bug.cgi?id=15210 Signed-off-by: Michael Peleshenko <mpeleshenko@gmail.com>
* | | modemmanager: bump to 1.20.6Kuan-Yi Li2023-03-09
| | | | | | | | | | | | Signed-off-by: Kuan-Yi Li <kyli@abysm.org>
* | | frp: update to 0.48.0Van Waholtz2023-03-09
| | | | | | | | | | | | | | | | | | Changelog: https://github.com/fatedier/frp/releases/tag/v0.48.0 Signed-off-by: Van Waholtz <brvphoenix@gmail.com>
* | | frp: update to 0.47.0Van Waholtz2023-03-09
|/ / | | | | | | | | | | A restart is only required if `$conf_file` has been modified. Signed-off-by: Van Waholtz <brvphoenix@gmail.com>
* | tmate-ssh-server: fix build against msgpack-c 6.0Tianling Shen2023-03-08
| | | | | | | | | | | | | | This patch is taken from https://git.alpinelinux.org/aports/commit/?id=f923597f4bdea424dc28b1d026269df060596fac Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
* | tmate: fix build against msgpack-c 6.0Tianling Shen2023-03-08
| | | | | | | | | | | | | | This patch is taken from https://git.alpinelinux.org/aports/commit/?id=f923597f4bdea424dc28b1d026269df060596fac Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
* | banip: release 0.8.2-1Dirk Brenken2023-03-08
| | | | | | | | | | | | | | | | | | * major performance improvements: clean-up/optimize all nft calls * add a new "ban_reportelements" option, to disable the (time consuming) Set element count in the report (enabled by default) * update the readme Signed-off-by: Dirk Brenken <dev@brenken.org>
* | adguardhome: bump to 0.107.25Dobroslaw Kijowski2023-03-08
| | | | | | | | | | | | | | * Full changelog available at: * https://github.com/AdguardTeam/AdGuardHome/releases/tag/v0.107.25 Signed-off-by: Dobroslaw Kijowski <dobo90@gmail.com>
* | adguardhome: enable legacy openssl provider for nodejsDobroslaw Kijowski2023-03-08
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Currently compilation fails because of: ``` opensslErrorStack: [ 'error:03000086:digital envelope routines::initialization error' ], library: 'digital envelope routines', reason: 'unsupported', code: 'ERR_OSSL_EVP_UNSUPPORTED' ``` What's interesting package gets built but when trying to access UI there's `404: page not found` error. It has been reported in multiple places: * https://github.com/AdguardTeam/AdGuardHome/issues/5559 * https://github.com/AdguardTeam/AdGuardHome/issues/4595 Signed-off-by: Dobroslaw Kijowski <dobo90@gmail.com>
* | v2raya: switch to use nftablesTianling Shen2023-03-08
| | | | | | | | | | | | | | | | | | | | | | | | Backport a pending PR to add nftables support. Upstream PR: https://github.com/v2rayA/v2rayA/pull/805 As nftables merged ipv4/ipv6 support into a single command, so simply enable ipv6 support by default. While at it, backport a upstreamed fix for simple-obfs plugin. Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
* | netbird: update to 0.14.2Oskari Rauta2023-03-07
| | | | | | | | | | | | | | Update from 0.12.0 -> 0.14.2 Release notes: https://github.com/netbirdio/netbird/releases Signed-off-by: Oskari Rauta <oskari.rauta@gmail.com>
* | transmission: update to version 4.0.1Daniel Golle2023-03-07
| | | | | | | | | | | | | | | | | | | | | | | | This is a major release, both in numbering and in effort! It's been in active development for over a year and has a huge list of changes -- over a thousand commits -- since Transmission 3.00. For more information about the release see https://github.com/transmission/transmission/releases/tag/4.0.0 https://github.com/transmission/transmission/releases/tag/4.0.1 Signed-off-by: Daniel Golle <daniel@makrotopia.org>
* | banip: update 0.8.1-3Dirk Brenken2023-03-06
| | | | | | | | | | | | | | | | | | * finalized the LuCI frontend preparation (this is the minmal version to use the forthcoming LuCI frontend) * added a Set survey, to list all elements of a certain set * changed the default logterm for asterisk * update the readme Signed-off-by: Dirk Brenken <dev@brenken.org>
* | sing-box: update to 1.1.6Van Waholtz2023-03-06
| | | | | | | | Signed-off-by: Van Waholtz <brvphoenix@gmail.com>
* | sing-box: add necessary dependencies and cleanup MakefileVan Waholtz2023-03-06
| | | | | | | | | | | | | | 1. Add `kmod-inet-diag` as a dependency since it is needed for https://sing-box.sagernet.org/configuration/dns/rule/#process_name 2. Remove redundant `default n` (https://github.com/openwrt/openwrt/commit/8bc72ea7be3976711dacc09f0fdab061d6e5152a) Signed-off-by: Van Waholtz <brvphoenix@gmail.com>
* | haproxy: update to v2.6.9Christian Lachner2023-03-05
|/ | | | | | | | - Update haproxy download URL and hash - This release fixes a critial flaw known as CVE-2023-25725. See: http://git.haproxy.org/?p=haproxy-2.6.git;a=commit;h=73be199c4f5f1ed468161a4c5e10ca77cd5989d8 Signed-off-by: Christian Lachner <gladiac@gmail.com>
* Merge pull request #20570 from pprindeville/isc-dhcp-allow-no-default-routePhilip Prindeville2023-03-04
|\ | | | | isc-dhcp: allow no default route
| * isc-dhcp: allow suppression of default gatewayPhilip Prindeville2023-03-01
| | | | | | | | Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>