aboutsummaryrefslogtreecommitdiff
path: root/package/network/services
Commit message (Collapse)AuthorAge
* uhttpd: bump PKG_RELEASEDaniel Golle2024-02-02
| | | | | | | | Bump PKG_RELEASE which should have been done by commit 7b1c3068b7 ("uhttpd: restart when interface to listen becomes available"). Fixes: 7b1c3068b7 ("uhttpd: restart when interface to listen becomes available") Signed-off-by: Daniel Golle <daniel@makrotopia.org>
* uhttpd: restart when interface to listen becomes availableDaniel Golle2024-02-01
| | | | | | | | Currently uhttpd won't start with a listening interface configured if the interface isn't already up at the time uhttpd starts. Make sure we attempt to start uhttpd when it comes up. Signed-off-by: Daniel Golle <daniel@makrotopia.org>
* hostapd: fail R0KH and R1KH derivation when wpa_psk_file is usedRany Hany2024-01-25
| | | | | | | | | When wpa_psk_file is used, there is a chance that no PSK is set. This means that the FT key will be generated using only the mobility domain which could be considered a security vulnerability but only for a very specific and niche config. Signed-off-by: Rany Hany <rany_hany@riseup.net>
* hostapd: fix 11r defaults when using SAEJesus Fernandez Manzano2024-01-25
| | | | | | | | When using WPA3-SAE or WPA2/WPA3 Personal Mixed, we can not use ft_psk_generate_local because it will break FT for SAE. Instead use the r0kh and r1kh configuration approach. Signed-off-by: Jesus Fernandez Manzano <jesus.manzano@galgus.ai>
* hostapd: fix 11r defaults when using WPAJesus Fernandez Manzano2024-01-25
| | | | | | | | | | | | | | 802.11r can not be used when selecting WPA. It needs at least WPA2. This is because 802.11r advertises FT support in-part through the Authentication and Key Management (AKM) suites in the Robust Security Network (RSN) Information Element, which was included in the 802.11i amendment and WPA2 certification program. Pre-standard WPA did not include the RSN IE, but the WPA IE. This IE can not advertise the AKM suite for FT. Signed-off-by: Jesus Fernandez Manzano <jesus.manzano@galgus.ai>
* hostapd: remove obsolete functionFelix Fietkau2024-01-25
| | | | | | Leftover from authsae, which was removed a long time ago Signed-off-by: Felix Fietkau <nbd@nbd.name>
* hostapd: ACS: Fix typo in bw_40 frequency arrayDavid Bauer2024-01-18
| | | | | | | | | | | [Upstream Backport] The range for the 5 GHz channel 118 was encoded with an incorrect channel number. Fixes: ed8e13decc71 (ACS: Extract bw40/80/160 freqs out of acs_usable_bwXXX_chan()) Signed-off-by: Michael Lee <michael-cy.lee@mediatek.com> Signed-off-by: David Bauer <mail@david-bauer.net>
* hostapd: add back missing function for updating wpa_supplicant macaddr listFelix Fietkau2024-01-13
| | | | | | | Make the call deferred instead of blocking to avoid deadlock issues Fixes: 3df9322771cc ("hostapd: make ubus calls to wpa_supplicant asynchronous") Signed-off-by: Felix Fietkau <nbd@nbd.name>
* hostapd: fix an exception in hostapd.uc on interface add failureFelix Fietkau2024-01-13
| | | | Signed-off-by: Felix Fietkau <nbd@nbd.name>
* Revert "mac80211: rework interface setup, fix race condition"Felix Fietkau2024-01-13
| | | | | | | | This reverts commit b7f9742da82fa9b122e8d63e48a9a5c0dec298f2. There are several reports of regressions with this commit. Will be added back once I've figured out and fixed the cause Signed-off-by: Felix Fietkau <nbd@nbd.name>
* mac80211: rework interface setup, fix race conditionFelix Fietkau2024-01-11
| | | | | | | Only tell netifd about vifs when the setup is complete and hostapd + wpa_supplicant have been notified Signed-off-by: Felix Fietkau <nbd@nbd.name>
* hostapd: make ubus calls to wpa_supplicant asynchronousFelix Fietkau2024-01-11
| | | | | | | | This fixes a deadlock issue where depending on the setup order, hostapd and wpa_supplicant could end up waiting for each other Reported-by: Michael-cy Lee (李峻宇) <Michael-cy.Lee@mediatek.com> Signed-off-by: Felix Fietkau <nbd@nbd.name>
* uhttpd: handle reload after uhttpd-mod-ubus installation using postinstRafał Miłecki2024-01-10
| | | | | | | | | | | | | | Use postinst script to reload service instead of uci-defaults hack. It's possible thanks to recent base-files change that executes postinst after uci-defaults. This fixes support for uhttpd customizations. It's possible (again) to adjust uhttpd config with custom uci-defaults before it gets started. Cc: Hauke Mehrtens <hauke@hauke-m.de> Fixes: d25d281fd668 ("uhttpd: Reload config after uhttpd-mod-ubus was added") Ref: b799dd3c705d ("base-files: execute package's "postinst" after executing uci-defaults") Signed-off-by: Rafał Miłecki <rafal@milecki.pl>
* hostapd: add missing NULL pointer check on radar notificationFelix Fietkau2024-01-09
| | | | | | Fixes a race condition that can lead to a hostapd crash Signed-off-by: Felix Fietkau <nbd@nbd.name>
* dropbear: increase default receive window sizeDavid Bauer2023-12-28
| | | | | | | | | | | Increasing the receive window size improves throughout on higher-latency links such as WAN connections. The current default of 24KB caps out at around 500 KB/s. Increasing the receive buffer to 256KB increases the throughput to at least 11 MB/s. Signed-off-by: David Bauer <mail@david-bauer.net>
* dnsmasq: invert logic for "localuse"Thibaut VARÈNE2023-12-16
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Prior to this commit, "localuse" (which enables local resolving through dnsmsasq) was off by "default". That default was in turn overridden when "noresolv" was unset (which itself is the default for "noresolv") *and* "resolvfile" was "/tmp/resolv.conf.d/resolv.conf.auto" (also the default for this parameter). In other words, the "default" unset value for "localuse" would only be ever used in specific *non-default* configurations. However, the problem with that logic is that a user who wants to ignore their ISP-provided resolvers by setting "noresolv" to true ends up with a device that will *only use* said resolvers for local DNS queries, serving clients' queries via dnsmasq (which now ignores the ISP resolvers). This can lead to confusion and break random setups as the DNS lookup performed on clients behalf can differ in their replies from DNS lookups performed locally on the router. Furthermore, "localuse" is not configurable through Luci, contrary to the other two involved settings, adding further confusion for the end user. To work around this situation, the logic that sets "localuse" is inverted: "localuse" now defaults to on by default, and IFF "noresolv" is unset (default) AND "resolvfile" is changed from default THEN "localuse" gets turned back off, allowing for more sensible behaviour. "localuse" value set in config/dhcp still overrides the logic in all cases, as it did already. Signed-off-by: Thibaut VARÈNE <hacks@slashdirt.org>
* hostapd: use new udebug ubus api to make debug rings configurableFelix Fietkau2023-11-30
| | | | Signed-off-by: Felix Fietkau <nbd@nbd.name>
* dnsmasq: mark global ubus context as closed after forkSven Eckelmann2023-11-26
| | | | | | | | | | | | | | If the dnsmasq process forks to handle TCP connections, it closes the ubus context. But instead of changing the daemon wide pointer to NULL, only the local variable was adjusted - and this portion of the code was even dropped (dead store) by some optimizing compilers. It makes more sense to change the daemon->ubus pointer because various functions are already checking it for NULL. It is also the behavior which ubus_destroy() implements. Fixes: d8b33dad0bb7 ("dnsmasq: add support for monitoring and modifying dns lookup results via ubus") Signed-off-by: Sven Eckelmann <sven@narfation.org>
* umdns: update to Git HEAD (2023-11-21)Felix Fietkau2023-11-21
| | | | | | | 9040335e102b interface: fix interface memory corruption b1e023eda358 add udebug support Signed-off-by: Felix Fietkau <nbd@nbd.name>
* hostapd: add missing acl entries for udebugFelix Fietkau2023-11-20
| | | | Signed-off-by: Felix Fietkau <nbd@nbd.name>
* hostapd: add udebug supportFelix Fietkau2023-11-20
| | | | | | | This is not activated by default and must be explicitly enabled via ubus It supports reporting log messages and netlink packets Signed-off-by: Felix Fietkau <nbd@nbd.name>
* hostapd: fix undeclared variable iface_nameNazar Mokrynskyi2023-11-19
| | | Signed-off-by: Nazar Mokrynskyi <nazar@mokrynskyi.com>
* dnsmasq: Invoke new ipcalc with CIDR notationPhilip Prindeville2023-11-15
| | | | | | | | | | | | | | | | | | | The new rewritten ipcalc.sh understands 3 notations: ipaddr/prefix ... ipaddr/dotted-netmask ... ipaddr dotted-netmask ... meaning that the previous 4th non-standard notation of "ipaddr prefix" will be dropped, alas that's the notation that dnsmasq currently uses. This change has us using the first notation which is the most common. This behavior came in as https://github.com/openwrt/openwrt/commit/eda27e8382f3e5253defab5419e95d4b51f72de3 a long time ago. Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
* hostapd: refresh patchesChristian Marangi2023-11-09
| | | | | | Refresh patches for hostapd using make package/hostapd/refresh. Signed-off-by: Christian Marangi <ansuelsmth@gmail.com>
* hostapd: permit 40MHz in 802.1s only also for 2.4GHz g/n with noscanChristian Marangi2023-11-09
| | | | | | | | | | | | | Currently for 802.1s only, for wifi 2.4GHz in g/n mode, 40MHz is never permitted. This is probably due to the complexity of setting periodic check for the intolerant bit. When noscan option is set, we ignore the presence of the intoleran bit in near AP, so we can enable 40MHz and ignore any complex logic for checking. Fixes: #13112 Signed-off-by: Christian Marangi <ansuelsmth@gmail.com>
* hostapd: permit also channel 7 for 2.5GHz to be set to HT40PLUSChristian Marangi2023-11-09
| | | | | | | Also channel 7 for 2.4GHz can be set to HT40PLUS. Permit this and add it to the list of the channels. Signed-off-by: Christian Marangi <ansuelsmth@gmail.com>
* hostapd: fix broke noscan option for meshChristian Marangi2023-11-09
| | | | | | | | | noscan option for mesh was broken and actually never applied. This is caused by a typo where ssid->noscan value is check instead of conf->noscan resulting in the logic swapped and broken. Signed-off-by: Christian Marangi <ansuelsmth@gmail.com>
* hostapd: use rtnl to set up interfacesFelix Fietkau2023-11-08
| | | | | | In wpa_supplicant, set up wlan interfaces before adding them Signed-off-by: Felix Fietkau <nbd@nbd.name>
* wifi: fix applying mesh parameters when wpa_supplicant is in useFelix Fietkau2023-11-08
| | | | | | | Apply them directly using nl80211 after setting up the interface. Use the same method in wdev.uc as well Signed-off-by: Felix Fietkau <nbd@nbd.name>
* dnsmasq: don't source functions.sh twicePhilip Prindeville2023-11-02
| | | | | | | | | | It's already pulled in from /etc/rc.common. Fixes: #13758 Fixes: 6b23836071b1 ("package: avoid the use of eval to parse ipcalc.sh output") Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
* hostapd: fix broken WPS on broadcom-wl and ath11kPetr Štetiar2023-11-01
| | | | | | | | | | | | | | | | | | | | Upgrading wpa_supplicant from 2.9 to 2.10 breaks broadcom-wl/ath11k based adapters. The reason for it is hostapd tries to install additional IEs for scanning while the driver does not support this. The kernel indicates the maximum number of bytes for additional scan IEs using the NL80211_ATTR_MAX_SCAN_IE_LEN attribute. Save this value and only add additional scan IEs in case the driver can accommodate these additional IEs. Bug: http://lists.infradead.org/pipermail/hostap/2022-January/040178.html Bug-Debian: https://bugs.debian.org/1004524 Bug-ArchLinux: https://bugs.archlinux.org/task/73495 Upstream-Status: Changes Requested [https://patchwork.ozlabs.org/project/hostap/patch/20220130192200.10883-1-mail@david-bauer.net] Reported-by: Étienne Morice <neon.emorice@mail.com> Tested-by: Étienne Morice <neon.emorice@mail.com> Signed-off-by: David Bauer <mail@david-bauer.net> Signed-off-by: Petr Štetiar <ynezz@true.cz>
* hostapd: fix OWE association with mbedtlsDavid Bauer2023-10-31
| | | | | | | | | | | | | | | | The code for hostapd-mbedtls did not work when used for OWE association. When handling association requests, the buffer offsets and length assumptions were incorrect, leading to never calculating the y point, thus denying association. Also when crafting the association response, the buffer contained the trailing key-type. Fix up both issues to adhere to the specification and make hostapd-mbedtls work with the OWE security type. Signed-off-by: David Bauer <mail@david-bauer.net>
* hostapd: do not trim trailing whitespace, except for newlineFelix Fietkau2023-10-31
| | | | | | Fixes adding SSID or key with trailing whitespace Signed-off-by: Felix Fietkau <nbd@nbd.name>
* odhcpd: Bump to latest commitsKevin Darbyshire-Bryant2023-10-28
| | | | | | | d8118f6 config: make sure timer is not on the timeouts list before freeing 4bbc6e7 add hostsfile output in addition to statefile Signed-off-by: Kevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk>
* dnsmasq: add support for RA option 31Rahul Thakur2023-10-20
| | | | | | | | | | | | | The option 31 in the RA specifies the DNS search list, the support to configure this via UCI is missing in case dnsmasq-dhcpv6 is used. This commit uses the uci option domain (same as is done by odhcpd) to read and pass the DNS search list to dnsmasq, which is then used by RA. Hence, with this commit, we are able to configure DNS search list for the RA messages via the uci config when dnsmsaq-dhcpv6 is used. Signed-off-by: Rahul Thakur <rahul.thakur@iopsys.eu>
* umdns: update to the latest versionFelix Fietkau2023-10-19
| | | | | | | | | | | | 479c7f8676d9 cache: make record/hostname lookup case-insensitive 26c97a5a50bf ubus: add a browse flag for suppressing cached ip addresses c286c51a9bd9 Fix AVL tree traversal in cache_record_find and cache_host_is_known 4035fe42df58 interface: use a global socket instead of per-interface ones c63d465698c7 cache: dump hostname target from srv records b42b22152d73 use hostname from SRV record to look up IP addresses d45c443aa1e6 ubus: add array flag support for the hosts method Signed-off-by: Felix Fietkau <nbd@nbd.name>
* hostapd: increase PKG_RELEASE to fix buildsNick Hainke2023-09-29
| | | | | | | Recent hostapd changes just edited the ucode files. It is required to bump the PKG_RELEASE to include the newest changes in the latest builds. Signed-off-by: Nick Hainke <vincent@systemli.org>
* hostapd: fix wpa_supplicant mac address allocation on ap+staFelix Fietkau2023-09-28
| | | | | | | | | | | If the full interface is restarted while bringing up an AP, it can trigger a wpa_supplicant interface start before wpa_supplicant is notified of the allocated mac addresses. Fix this by moving the iface_update_supplicant_macaddr call to just after the point where mac addresses are allocated. Reported-by: Michael-cy Lee (李峻宇) <Michael-cy.Lee@mediatek.com> Signed-off-by: Felix Fietkau <nbd@nbd.name>
* hostapd: fix mac address of interfaces created via wdev.ucFelix Fietkau2023-09-27
| | | | | | Use the wdev config with the generated MAC address Signed-off-by: Felix Fietkau <nbd@nbd.name>
* hostapd: fix rare crash with AP+STA and ACS enabledFelix Fietkau2023-09-25
| | | | | | | Ensure that the iface disable in uc_hostapd_iface_start also clears the ACS state. Signed-off-by: Felix Fietkau <nbd@nbd.name>
* package: dnsmasq: remove off-by-one mitigation for limitLeon M. Busch-George2023-09-25
| | | | | | | | | In the dnsmasq init script, an off-by-one in the range calculation of ipcalc.sh was mitigated by passing the limit as if its counting started at zero. This patch removes the mitigation as the off-by-one has been fixed. Signed-off-by: Leon M. Busch-George <leon@georgemail.eu>
* package: avoid the use of eval to parse ipcalc.sh outputLeon M. Busch-George2023-09-25
| | | | | | | | | | | Add a function 'ipcalc' to /lib/functions.sh that sets variables more safely using export. With this new function, dnsmasq also handles the return value of ipcalc correctly. Fixes: e4bd3de1be8e ("dnsmasq: refuse to add empty DHCP range") Co-Authored-By: Philip Prindeville <philipp@redfish-solutions.com> Signed-off-by: Leon M. Busch-George <leon@georgemail.eu>
* lldpd: add lldp_syscapabilities config optionSebastian Pflieger2023-09-24
| | | | | | | allow to overwrite the detected system capabilities e.g. if devices does not operate as bridge. Signed-off-by: Sebastian Pflieger <sebastian@pflieger.email>
* hostapd: fix patch rebase after a crash fixFelix Fietkau2023-09-22
| | | | | | | | The patch refresh accidentally moved the hostapd_ucode_free_iface call to the wrong function Fixes: e9722aef9e84 ("hostapd: fix a crash when disabling an interface during channel list update") Signed-off-by: Felix Fietkau <nbd@nbd.name>
* hostapd: fix wpa_supplicant bringup with non-nl80211 driversFelix Fietkau2023-09-22
| | | | | | Needed for wired 802.1x Signed-off-by: Felix Fietkau <nbd@nbd.name>
* hostapd: add missing NULL pointer check in uc_hostapd_iface_stopFelix Fietkau2023-09-20
| | | | | | Avoid crashing if the interface has already been removed Signed-off-by: Felix Fietkau <nbd@nbd.name>
* hostapd: fix a crash when disabling an interface during channel list updateFelix Fietkau2023-09-20
| | | | Signed-off-by: Felix Fietkau <nbd@nbd.name>
* hostapd: use phy name for hostapd interfaces instead of first-bss ifnameFelix Fietkau2023-09-19
| | | | | | Improves reliability in error handling Signed-off-by: Felix Fietkau <nbd@nbd.name>
* hostapd: fix dynamically adding interfaces with 802.11ax support disabled in ↵Felix Fietkau2023-09-18
| | | | | | | | the build Move an important code line outside of #ifdef CONFIG_IEEE80211AX Signed-off-by: Felix Fietkau <nbd@nbd.name>
* hostapd: add missing ubus ACL entries for AP+client (#13449)Felix Fietkau2023-09-15
| | | | Signed-off-by: Felix Fietkau <nbd@nbd.name>