Commit Graph

318 Commits

Author SHA1 Message Date
CN_SZTL
3dea33419c
Merge Official Source 2020-05-02 19:17:57 +08:00
AmadeusGhost
23378ed9a4
netifd: add dynamic wireless reconfiguration (#4518)
Set new option 'reconf' in 'wifi-device' section to enable dynamic re-configuration on that radio. Also fix wifi relay and 'netifd: radio1 (9654): Command failed'.
2020-05-02 19:11:45 +08:00
Kevin Darbyshire-Bryant
1b0285c07e
umdns: update to version 2020-04-25
cdac046 dns.c: fix input validation fix

Due to a slight foobar typo, failing to de-reference a pointer, previous
fix not quite as complete as it should have been.

Improve CVE-2020-11750 fix

Signed-off-by: Kevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk>
2020-04-30 18:55:59 +08:00
Kevin Darbyshire-Bryant
cb61f6347f
relayd: bump to version 2020-04-25
f4d759b dhcp.c: further improve validation

Further improve input validation for CVE-2020-11752

Signed-off-by: Kevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk>
2020-04-30 18:55:46 +08:00
Antonio Quartulli
c39feefc22
wpad-wolfssl: fix crypto_bignum_sub()
Backport patch from hostapd.git master that fixes copy/paste error in
crypto_bignum_sub() in crypto_wolfssl.c.

This missing fix was discovered while testing SAE over a mesh interface.

With this fix applied and wolfssl >3.14.4 mesh+SAE works fine with
wpad-mesh-wolfssl.

Cc: Sean Parkinson <sean@wolfssl.com>
Signed-off-by: Antonio Quartulli <a@unstable.cc>
Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2020-04-30 18:52:33 +08:00
Jason A. Donenfeld
8da799bab3
wireguard: bump to 1.0.20200429
* compat: support latest suse 15.1 and 15.2
* compat: support RHEL 7.8's faulty siphash backport
* compat: error out if bc is missing
* compat: backport hsiphash_1u32 for tests

We now have improved support for RHEL 7.8, SUSE 15.[12], and Ubuntu 16.04.

* compat: include sch_generic.h header for skb_reset_tc

A fix for a compiler error on kernels with weird configs.

* compat: import latest fixes for ptr_ring
* compat: don't assume READ_ONCE barriers on old kernels
* compat: kvmalloc_array is not required anyway

ptr_ring.h from upstream was imported, with compat modifications, to our
compat layer, to receive the latest fixes.

* compat: prefix icmp[v6]_ndo_send with __compat

Some distros that backported icmp[v6]_ndo_send still try to build the compat
module in some corner case circumstances, resulting in errors.  Work around
this with the usual __compat games.

* compat: ip6_dst_lookup_flow was backported to 3.16.83
* compat: ip6_dst_lookup_flow was backported to 4.19.119

Greg and Ben backported the ip6_dst_lookup_flow patches to stable kernels,
causing breaking in our compat module, which these changes fix.

* git: add gitattributes so tarball doesn't have gitignore files

Distros won't need to clean this up manually now.

* crypto: do not export symbols

These don't do anything and only increased file size.

* queueing: cleanup ptr_ring in error path of packet_queue_init

Sultan Alsawaf reported a memory leak on an error path.

* main: mark as in-tree

Now that we're upstream, there's no need to set the taint flag.

* receive: use tunnel helpers for decapsulating ECN markings

ECN markings are now decapsulated using RFC6040 instead of the old RFC3168.

Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
2020-04-30 18:50:43 +08:00
AmadeusGhost
64b3974593 Merge Lean's source 2020-04-29 17:35:14 +08:00
Chuck
55e06fdb00
dropbear: only bind lan by default (#4456) 2020-04-27 12:31:07 +08:00
AmadeusGhost
463b6ac050
mac80211: fixed slow wireless startup (#4420)
* hostapd: reduce to a single instance per service

* mac80211: sync upstream source code

* iw: bump to 5.4
2020-04-23 16:42:46 +08:00
AmadeusGhost
f352e3bf7d iw: bump to 5.4 2020-04-22 18:10:22 +08:00
AmadeusGhost
014283bc8b hostapd: reduce to a single instance per service 2020-04-22 18:09:30 +08:00
Kevin Darbyshire-Bryant
04e5e1ac43
umdns: update to version 2020-04-20
e74a3f9 dns.c: improve input validation

Addresses CVE-2020-11750

Signed-off-by: Kevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk>
2020-04-20 18:40:46 +08:00
Kevin Darbyshire-Bryant
526fb965dc
relayd: bump to version 2020-04-20
796da66 dhcp.c: improve input validation & length checks

Addresses CVE-2020-11752

Signed-off-by: Kevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk>
2020-04-20 18:40:35 +08:00
Hauke Mehrtens
c0204980f8
dante: Fix compile with glibc
When compiled with glibc the config_scan.c wants to use the
cpupolicy2numeric() function which is only available when
HAVE_SCHED_SETSCHEDULER is set. It looks like the wrong define was used here.

This fixes a build problem with glibc in combination with the force
ac_cv_func_sched_setscheduler=no in the OpenWrt CONFIGURE_VARS.

This fixes the following compile error with glibc:
----------------------------------------------------------------------
/bin/ld: config_scan.o: in function `socks_yylex':
dante-1.4.1/sockd/config_scan.l:461: undefined reference to `cpupolicy2numeric'
collect2: error: ld returned 1 exit status
make[5]: *** [Makefile:522: sockd] Error 1

Fixes: aaf46a8fe2 ("dante: disable sched_getscheduler() - not implemented in musl")
Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
2020-04-19 19:57:16 +08:00
Magnus Kroken
f66fb8a94d
openvpn: update to 2.4.9
This is primarily a maintenance release with bugfixes and improvements.
This release also fixes a security issue (CVE-2020-11810) which allows
disrupting service of a freshly connected client that has not yet
negotiated session keys. The vulnerability cannot be used to
inject or steal VPN traffic.

Release announcement:
https://openvpn.net/community-downloads/#heading-13812
Full list of changes:
https://community.openvpn.net/openvpn/wiki/ChangesInOpenvpn24#OpenVPN2.4.9

Signed-off-by: Magnus Kroken <mkroken@gmail.com>
2020-04-19 19:56:35 +08:00
CN_SZTL
a20ee5eabf
Merge Lean's source 2020-04-19 19:35:34 +08:00
ricksuzade-maker
b8f8afb7d0
Bump wireguard to 1.0.20200413 (#4361)
Bump to the newest version of wireguard
2020-04-18 11:20:24 +08:00
ElonH
0898c0cb6f
umbim: supress warning about pointers to members of a packed struct in gcc9 2020-04-16 19:53:06 +08:00
coolsnowwolf
036efba3c1 hostapd: backport usleep patch 2020-04-16 12:59:49 +08:00
CN_SZTL
06c80d3dd0
Merge Lean's source 2020-04-15 21:06:54 +08:00
Rosen Penev
a6092813a4
hostapd: backport usleep patch
Optionally fixes compilation with uClibc-ng.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2020-04-14 20:29:39 +08:00
Hans Dedecker
faadfa175c
iproute2: update to 5.6.0
Update iproute2 to latest stable 5.6.0; for the changes see https://lwn.net/Articles/816778/

Signed-off-by: Hans Dedecker <dedeckeh@gmail.com>
2020-04-12 07:43:09 +08:00
ElonH
47040d246d
qos-gargoyle: fixed in SDK
In iproute2, some of object, header, source files are used in
qos-gargoyle.
qos-gargoyle will find these files in build_dir.
But if CONFIG_AUTOREMOVE is enable in SDK, an error "Header not found." will be raised.

So one way is that copying these files to staging_dir.
2020-04-10 23:12:52 +08:00
Rosen Penev
9c500156b8
iproute2: add kmod-netlink-diag for ss
Allows proper usage of the ss tool. Otherwise, several errors and bad
data gets thrown:

Cannot open netlink socket: Protocol not supported
Cannot open netlink socket: Protocol not supported
Cannot open netlink socket: Protocol not supported
Cannot open netlink socket: Protocol not supported
Cannot open netlink socket: Protocol not supported
Cannot open netlink socket: Protocol not supported
Cannot open netlink socket: Protocol not supported

Originally reported here: https://github.com/openwrt/packages/issues/8232

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2020-04-08 03:25:30 +08:00
ricksuzade-maker
cef6bffa6f
Bump wireguard to 1.0.20200401 (#4217)
The newest official stable release.
2020-04-07 23:41:56 +08:00
Hans Dedecker
f0baa49271
ppp: update to version 2.4.8.git-2020-03-21
Use upstream latest git HEAD as it allows to remove the patches
700-radius-Prevent-buffer-overflow-in-rc_mksid,
701-pppd-Fix-bounds-check-in-EAP-code and
702-pppd-Ignore-received-EAP-messages-when-not-doing-EAP and
take in other fixes.

41a7323 pppd: Fixed spelling 'unkown' => 'unknown' (#141)
6b014be pppd: Print version information to stdout instead of stderr (#133)
cba2736 pppd: Add RFC1990 (Multilink) to the See Also section of the man page
f2f9554 pppd: Add mppe.h to the list of headers to install if MPPE is defined
ae54fcf pppd: Obfuscate password argument string
8d45443 pppd: Ignore received EAP messages when not doing EAP
8d7970b pppd: Fix bounds check in EAP code
858976b radius: Prevent buffer overflow in rc_mksid()

Signed-off-by: Hans Dedecker <dedeckeh@gmail.com>
2020-04-07 23:15:24 +08:00
Kevin Darbyshire-Bryant
4573a4ae39
umdns: update to the version 2020-04-05
ab7a39a umdns: fix unused error
45c4953 dns: explicitly endian-convert all fields in header and question

Signed-off-by: Kevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk>
2020-04-05 21:21:01 +08:00
Kevin Darbyshire-Bryant
7fd140860e
umdns: suppress address-of-packed-member warning
gcc 8 & 9 appear to be more picky with regards access alignment to
packed structures, leading to this warning in dns.c:

dns.c:261:2: error: converting a packed ‘struct dns_question’ pointer
(alignment 1) to a ‘uint16_t’ {aka ‘short unsigned int’} pointer
(alignment 2) may result in an unaligned pointer value
[-Werror=address-of-packed-member]

261 |  uint16_t *swap = (uint16_t *) q;

Work around what I think is a false positive by turning the warning off.
Not ideal, but not quite as not ideal as build failure.

Signed-off-by: Kevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk>
2020-04-05 21:20:51 +08:00
Kevin Darbyshire-Bryant
1f67bf9f22
hostapd: Move hostapd variants to WirelessAPD menu
It seemed very confusing when trying to select the different variants of
hostapd which are somewhat scattered about under the menu 'Network'.
Moving all hostapd variants under a common submenu helps avoid
confusion.

Inspired-by: Kevin Mahoney <kevin.mahoney@zenotec.net>
[Fixup badly formatted patch, change menu name]
Signed-off-by: Kevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk>
2020-04-05 21:20:16 +08:00
Kevin Darbyshire-Bryant
34d1a4e45c
dropbear: backport add ip address to exit without auth messages
201e359 Handle early exit when addrstring isn't set
fa4c464 Improve address logging on early exit messages (#83)

Signed-off-by: Kevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk>
2020-04-05 21:19:58 +08:00
CN_SZTL
03d7119e7a
Merge Lean's source 2020-04-03 23:50:50 +08:00
lean
8faac30089 mac80211: Update to version 5.4.27 2020-04-03 23:29:36 +08:00
CN_SZTL
30392b1872
iptables: xtables-restore: fix for --noflush and empty lines 2020-03-31 20:31:46 +08:00
Jason A. Donenfeld
0b90b55451
wireguard: bump to 1.0.20200330
* queueing: backport skb_reset_redirect change from 5.6
* version: bump

This release has only one slight change, to put it closer to the 5.6
codebase, but its main purpose is to bump us to a 1.0.y version number.
Now that WireGuard 1.0.0 has been released for Linux 5.6 [1], we can put
the same number on the backport compat codebase.

When OpenWRT bumps to Linux 5.6, we'll be able to drop this package
entirely, which I look forward to seeing.

[1] https://lists.zx2c4.com/pipermail/wireguard/2020-March/005206.html

Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
2020-03-31 19:54:01 +08:00
Hans Dedecker
f2f2071969
odhcp6c: update to latest git HEAD
f575351 ra: fix sending router solicitations

Signed-off-by: Hans Dedecker <dedeckeh@gmail.com>
2020-03-30 19:50:03 +08:00
Jesus Fernandez Manzano
59752dc5f0
hostapd: Add 802.11r support for WPA3-Enterprise
Signed-off-by: Jesus Fernandez Manzano <jesus.manzano@galgus.net>
2020-03-30 19:49:51 +08:00
DENG Qingfang
f329ca962b
curl: rebuild when libopenssl config changes
When some libopenssl options change curl will have to be rebuild to
adapt to those changes, avoiding undefined reference errors or features
disabled in curl.

Add CONFIG_OPENSSL_ENGINE, CONFIG_OPENSSL_WITH_COMPRESSION and
CONFIG_OPENSSL_WITH_NPN to PKG_CONFIG_DEPENDS so it will trigger
rebuild every time the options are changed.

Signed-off-by: DENG Qingfang <dengqf6@mail2.sysu.edu.cn>
2020-03-30 19:49:41 +08:00
CN_SZTL
f967174927
iw: fix 2020-03-28 23:46:08 +08:00
CN_SZTL
a68db5f2df
treewide: sync with upstream source 2020-03-28 23:37:17 +08:00
CN_SZTL
7ad60b9df9
dnsmasq: adjust default settings 2020-03-27 21:26:36 +08:00
Hans Dedecker
b0aed4b5a9
odhcp6c: fix compilation with musl 1.2.0
49305e6 odhcp6c: fix compilation with musl 1.2.0

Signed-off-by: Hans Dedecker <dedeckeh@gmail.com>
2020-03-27 19:25:10 +08:00
Jo-Philipp Wich
5e76912114
uhttpd: bump to latest Git HEAD
5e9c23c client: allow keep-alive for POST requests
5fc551d tls: support specifying accepted TLS ciphers

Signed-off-by: Jo-Philipp Wich <jo@mein.io>
2020-03-26 20:04:15 +08:00
Kevin Darbyshire-Bryant
da66eee5f9
nftables: bump to 0.9.3
Signed-off-by: Kevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk>
2020-03-25 04:14:04 +08:00
CN_SZTL
fbc565c228
Merge Lean's source 2020-03-24 20:20:12 +08:00
lean
b4eaefa54e libmnl: update ABI version 2020-03-24 18:24:26 +08:00
CN_SZTL
3974e8115a
iptables: refresh patches 2020-03-23 01:02:47 +08:00
CN_SZTL
53c9bd735d
iptables: refresh patches 2020-03-23 00:30:15 +08:00
CN_SZTL
a225a908b2
Merge Lean's source 2020-03-22 19:07:54 +08:00
lean
0197bc0fa8 iwinfo: bump version 2020-03-22 18:59:40 +08:00
lean
aadf217f55 dropbear: bump to 2019.78 2020-03-22 18:35:41 +08:00