Commit Graph

230 Commits

Author SHA1 Message Date
CN_SZTL
70ab7e1e61
uhttpd: drop OEM info 2020-07-27 22:03:58 +08:00
CN_SZTL
6d170db961
treewide: switch to /tmp/resolv.conf.d/resolv.conf.auto 2020-07-25 19:47:13 +08:00
Daniel Golle
899cc45dc4
dnsmasq: switch to /tmp/resolv.conf.d/resolv.conf.auto
Mount-bind directory instead of resolv.conf.auto file in jail to
avoid problems when the file is deleted/replaced.

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2020-07-25 19:36:33 +08:00
CN_SZTL
ac369da215
ppp: revert change 2020-07-25 00:17:28 +08:00
CN_SZTL
2d8346e206
luci-app-turboacc: fix indentation 2020-07-24 22:52:49 +08:00
Kevin Darbyshire-Bryant
a593e58cc3
dnsmasq: bump to 2.82
This fixes a nasty problem introduced in 2.81 which causes random
crashes on systems where there's significant DNS activity over TCP. It
also fixes DNSSEC validation problems with zero-TTL DNSKEY and DS
records.

Signed-off-by: Kevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk>
2020-07-20 22:16:21 +08:00
Jason A. Donenfeld
3e9eac6b1d
wireguard: bump to 1.0.20200712
This release brings parity with the commits Linus released a few hours
ago into 5.8-rc5.

* receive: account for napi_gro_receive never returning GRO_DROP

The napi_gro_receive function no longer returns GRO_DROP ever, making
handling GRO_DROP dead code. This commit removes that dead code.
Further, it's not even clear that device drivers have any business in
taking action after passing off received packets; that's arguably out of
their hands.

* device: implement header_ops->parse_protocol for AF_PACKET

WireGuard uses skb->protocol to determine packet type, and bails out if
it's not set or set to something it's not expecting. For AF_PACKET
injection, we need to support its call chain of:

    packet_sendmsg -> packet_snd -> packet_parse_headers ->
      dev_parse_header_protocol -> parse_protocol

Without a valid parse_protocol, this returns zero, and wireguard then
rejects the skb. So, this wires up the ip_tunnel handler for layer 3
packets for that case.

* queueing: make use of ip_tunnel_parse_protocol

Now that wg_examine_packet_protocol has been added for general
consumption as ip_tunnel_parse_protocol, it's possible to remove
wg_examine_packet_protocol and simply use the new
ip_tunnel_parse_protocol function directly.

* compat: backport ip_tunnel_parse_protocol and ip_tunnel_header_ops

These are required for moving wg_examine_packet_protocol out of
wireguard and into upstream.

Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
2020-07-14 01:11:59 +08:00
AmadeusGhost
dd46600b60
ppp: refresh patches 2020-07-08 15:11:21 +08:00
Hans Dedecker
39301c3bbb
ppp: update to version 2.4.8.git-2020-05-25
ddd57c2 pppd: Add lcp-echo-adaptive option
c319558 pppd: Handle SIGINT and SIGTERM during interrupted syscalls (#148)
0bc11fb Added missing options to manual pages. (#149)
b1fcf16 Merge branch 'monotonic-time' of https://github.com/themiron/ppp
c78e312 pppd: linux: use monotonic time if possible

Remove patch 121-debian_adaptive_lcp_echo as patch is upstream accepted
Remove patch 206-compensate_time_change.patch as timewrap issues are
solved by a patch making use of monotonic time

Signed-off-by: Hans Dedecker <dedeckeh@gmail.com>
2020-07-08 15:10:55 +08:00
Petr Štetiar
747855d64d dropbear: make rsa-sha2-256 pubkeys usable again
Upstream in commit 972d723484d8 ("split signkey_type and signature_type
for RSA sha1 vs sha256") has added strict checking of pubkey algorithms
which made keys with SHA-256 hashing algorithm unusable as they still
reuse the `ssh-rsa` public key format. So fix this by disabling the
check for `rsa-sha2-256` pubkeys.

Ref: https://tools.ietf.org/html/rfc8332#section-3
Fixes: d4c80f5b17 ("dropbear: bump to 2020.80")
Tested-by: Russell Senior <russell@personaltelco.net>
Signed-off-by: Petr Štetiar <ynezz@true.cz>
2020-07-08 12:00:54 +08:00
Hans Dedecker
f27ff50d03 odhcpd: bump to latest git HEAD
5da5299 odhcpd: fix compilation with GCC10

Signed-off-by: Hans Dedecker <dedeckeh@gmail.com>
2020-07-04 11:35:33 +08:00
Hans Dedecker
eb11c8180a dropbear: bump to 2020.80
- drop patches (applied upstream)
 * 001-backport_GNU_SOURCE-for-random.patch
 * 002-backport-move-GNU_SOURCE-earlier.patch
 * 010-backport-disable-toom-and-karatsuba.patch

Signed-off-by: Hans Dedecker <dedeckeh@gmail.com>
2020-07-01 12:16:16 +08:00
Rui Salvaterra
4ec4754aa7 dropbear: init: replace backticks with $()
This replaces deprecated backticks by more versatile $(...) syntax.

Signed-off-by: Rui Salvaterra <rsalvaterra@gmail.com>
[add commit description]
Signed-off-by: Adrian Schmutzler <freifunk@adrianschmutzler.de>
2020-07-01 12:10:50 +08:00
Hans Dedecker
57d8f8382f dropbear: fix compilation for uClibc
Backport patches which fix compile issue for uClibc-ng :

dbrandom.c:174:8: warning: implicit declaration of function 'getrandom'; did you mean 'genrandom'? [-Wimplicit-function-declaration]
  ret = getrandom(buf, sizeof(buf), GRND_NONBLOCK);
        ^~~~~~~~~
        genrandom
dbrandom.c:174:36: error: 'GRND_NONBLOCK' undeclared (first use in this function); did you mean 'SOCK_NONBLOCK'?
  ret = getrandom(buf, sizeof(buf), GRND_NONBLOCK);
                                    ^~~~~~~~~~~~~
                                    SOCK_NONBLOCK

Signed-off-by: Hans Dedecker <dedeckeh@gmail.com>
2020-06-25 12:01:46 +08:00
Jason A. Donenfeld
455ef7e458 wireguard: bump to 1.0.20200623
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
2020-06-24 18:05:50 +08:00
Konstantin Demin
e0b4a9577a dropbear: bump to 2020.79
- drop patches (applied upstream):
  * 010-backport-change-address-logging.patch
  * 020-backport-ed25519-support.patch
  * 021-backport-chacha20-poly1305-support.patch
- backport patches:
  * 010-backport-disable-toom-and-karatsuba.patch:
    reduce dropbear binary size (about ~8Kb).
- refresh patches.
- don't bother anymore with following config options
  because they are disabled in upstream too:
  * DROPBEAR_3DES
  * DROPBEAR_ENABLE_CBC_MODE
  * DROPBEAR_SHA1_96_HMAC
- explicitly disable DO_MOTD as it was before commit a1099ed:
  upstream has (accidentally) switched it to 0 in release 2019.77,
  but reverted back in release 2020.79.

Signed-off-by: Konstantin Demin <rockdrilla@gmail.com>
2020-06-22 18:05:47 +08:00
Florian Eckert
313df56ae2 openvpn: add generic hotplug mechanism
Pass a default --up and --down executable to each started OpenVPN instance
which triggers /etc/hotplug.d/openvpn/ scripts whenever an instance
goes up or down.

User-configured up and down scripts are invoked by the default shipped
01-user hotplug handler to ensure that existing setups continue to work
as before.

As a consequence of this change, the up, down and script_security OpenVPN
options are removed from the option file, since we're always passing them
via the command line, they do not need to get included into the generated
configuration.

Signed-off-by: Florian Eckert <fe@dev.tdt.de>
[reword commit message, move hotplug executable to /usr/libexec]
Signed-off-by: Jo-Philipp Wich <jo@mein.io>
2020-06-18 08:05:10 +08:00
CN_SZTL
e9782c2ed4
Merge Lean's source 2020-06-12 12:50:38 +08:00
ricksuzade-maker
e7e68c3352
Bump wireguard to v1.0.20200611 (#4778)
Bump wireguard to the newest version
2020-06-12 12:18:29 +08:00
Kevin Darbyshire-Bryant
a690d9ec7b odhcpd: remove bogus IPKG_INSTROOT reference
IPKG_INSTROOT is only set under image builder and we won't be running
this script at build time either, so remove the reference before it gets
cargo-culted into other scripts.

Signed-off-by: Kevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk>
Acked-by: Hans Dedecker <dedeckeh@gmail.com>
2020-06-12 12:12:21 +08:00
AmadeusGhost
e348627c44 Merge Lean's source 2020-06-12 12:00:09 +08:00
Kevin Darbyshire-Bryant
7cb2c5c970 umdnsd: update to latest git HEAD
d13290b Fix advertised IPv6 addresses

Don't just serve link-local addresses via mdns, offer all.

Signed-off-by: Kevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk>
2020-06-11 11:58:12 +08:00
HiGarfield
e0c345df71
ppp: syncppp: further fix grep's regex match (#4623)
/etc/config/network这个文件里的写法可以各种各样,pppoe外面可以有引号,也可以没引号。proto与pppoe之间可以有不同类型、不同数量的空格(或Tab)。用uci show,可以把输出格式统一掉,省得考虑配置文件不同写法的区别。
2020-06-09 16:14:26 +08:00
CN_SZTL
e57fe791fc
dnsmasq: bump to 2.81 2020-06-06 22:32:57 +08:00
Vladislav Grishenko
0f0f141922
dropbear: add ed25519 and chacha20-poly1305
- add Ed25519 support (backport):
  * DROPBEAR_ED25519 option for ssh-ed25519,
  * disabled by default
- add Chacha20-Poly1305 support (backport):
  * DROPBEAR_CHACHA20POLY1305 for chacha20-poly1305@openssh.com,
  * enabled by default
- update feature costs in binary size

Signed-off-by: Vladislav Grishenko <themiron@mail.ru>
2020-06-06 20:31:27 +08:00
Daniel Golle
8469c82f9a
uhttpd: fix script timeout
939c281 proc: do not cancel script killing after writing headers

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2020-06-06 20:29:26 +08:00
AmadeusGhost
a273d13857 Merge Lean's source 2020-05-30 12:25:05 +08:00
coolsnowwolf
bbe99b4fdf mac80211:update ath10k upstream patches 2020-05-27 11:58:24 +08:00
coolsnowwolf
d1f2153ca4 hostapd: disable wifi-reload 2020-05-27 00:17:15 +08:00
coolsnowwolf
bb3276ef05 mac80211: fix RT-ACRH17 2.4Ghz wifi performance issus 2020-05-26 23:18:25 +08:00
ricksuzade-maker
c289a1c598
Bump wireguard to 1.0.20200520 (#4675) 2020-05-26 15:29:36 +08:00
Daniel Golle
6f60d4d2d6
hostapd: backport wolfssl bignum fixes
crypto_bignum_rand() use needless time-consuming filtering
which resulted in SAE no longer connecting within time limits.
Import fixes from hostap upstream to fix that.

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2020-05-26 11:03:16 +08:00
Jason A. Donenfeld
91c7eefefb wireguard: bump to 1.0.20200520
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
2020-05-21 18:08:03 +08:00
AmadeusGhost
142f9724da Merge Lean's source 2020-05-21 12:25:08 +08:00
Chuck
8f9bc86de1
ppp: syncppp: fix grep's regex match (#4609) 2020-05-15 20:10:48 +08:00
Antonio Quartulli
10a5001fb9
wpad-wolfssl: fix crypto_bignum_sub()
Backport patch from hostapd.git master that fixes copy/paste error in
crypto_bignum_sub() in crypto_wolfssl.c.

This missing fix was discovered while testing SAE over a mesh interface.

With this fix applied and wolfssl >3.14.4 mesh+SAE works fine with
wpad-mesh-wolfssl.

Cc: Sean Parkinson <sean@wolfssl.com>
Signed-off-by: Antonio Quartulli <a@unstable.cc>
Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2020-05-13 17:56:55 +08:00
AmadeusGhost
29a00cd005 Merge Lean's source 2020-05-13 17:50:08 +08:00
AmadeusGhost
5591c36728
Revert "ipq40xx: update ath10k firmware" (#4590)
This reverts commit 2c37fa71f9.
2020-05-12 18:58:46 +08:00
Kevin Darbyshire-Bryant
d5003a1136 umdns: re-enable address-of-packed-member warning
Signed-off-by: Kevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk>
2020-05-11 11:38:25 +08:00
Daniel A. Maierhofer
e903ec8c14
lldpd: add management IP setting
add option to set management IP pattern

also add missing 'unconfigure system hostname'

for example pattern '!192.168.1.1' makes it possible that
WAN IP is selected instead of LAN IP

Signed-off-by: Daniel A. Maierhofer <git@damadmai.at>
[grammar and spelling fixes in commit message]
Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
2020-05-10 12:07:11 +08:00
Hans Dedecker
452dff0886
odhcpd: update to latest git HEAD (FS#3056)
5ce0770 router: fix Lan host reachibility due to identical RIO and PIO prefixes (FS#3056)

Signed-off-by: Hans Dedecker <dedeckeh@gmail.com>
2020-05-10 12:06:56 +08:00
AmadeusGhost
f2c4cd42ff Merge Lean's source 2020-05-09 18:16:05 +08:00
coolsnowwolf
2c37fa71f9 ipq40xx: update ath10k firmware 2020-05-09 14:36:43 +08:00
ricksuzade-maker
585ca34a6b
Bump wireguard to version 1.0.20200506 (#4560) 2020-05-08 20:42:57 +08:00
Hauke Mehrtens
706c8571cb ppp: Fix mirror hash
Fixes: ae06a650d6 ("ppp: update to version 2.4.8.git-2020-03-21")
Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
2020-05-08 08:11:06 +08:00
Jason A. Donenfeld
6b48af0ecb wireguard: bump to 1.0.20200506
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
2020-05-08 08:08:38 +08:00
ricksuzade-maker
5b88caedf6
Bump wireguard to 1.0.20200429 (#4536) 2020-05-04 18:24:01 +08:00
CN_SZTL
3dea33419c
Merge Official Source 2020-05-02 19:17:57 +08:00
AmadeusGhost
23378ed9a4
netifd: add dynamic wireless reconfiguration (#4518)
Set new option 'reconf' in 'wifi-device' section to enable dynamic re-configuration on that radio. Also fix wifi relay and 'netifd: radio1 (9654): Command failed'.
2020-05-02 19:11:45 +08:00
Kevin Darbyshire-Bryant
1b0285c07e
umdns: update to version 2020-04-25
cdac046 dns.c: fix input validation fix

Due to a slight foobar typo, failing to de-reference a pointer, previous
fix not quite as complete as it should have been.

Improve CVE-2020-11750 fix

Signed-off-by: Kevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk>
2020-04-30 18:55:59 +08:00