13073 Commits

Author SHA1 Message Date
Hans Dedecker
7680fc92b4 dnsmasq: bump to 2.77rc5
Some small tweaks and improvements :

9828ab1 Fix compiler warning.
f77700a Fix compiler warning.
0fbd980 Fix compiler warning.
43cdf1c Remove automatic IDN support when building i18n.
ff19b1a Fix &/&& confusion.
2aaea18 Add .gitattributes to substitute VERSION on export.

Signed-off-by: Hans Dedecker <dedeckeh@gmail.com>
2017-08-31 13:49:18 +02:00
Kevin Darbyshire-Bryant
d04efc7ee0 dnsmasq: make NO_ID optional in full variant
Permit users of the full variant to disable the NO_ID *.bind pseudo
domain masking.

Defaulted 'on' in all variants.

Signed-off-by: Kevin Darbyshire-Bryant <kevin@darbyshire-bryant.me.uk>
2017-08-31 13:48:22 +02:00
Kevin Darbyshire-Bryant
13fe03017f dnsmasq: Don't expose *.bind data incl version
Don't expose dnsmasq version & other data to clients via the *.bind
pseudo domain.  This uses a new 'NO_ID' compile time option which has been
discussed and submitted upstream.

This is an alternate to replacing version with 'unknown' which affects
the version reported to syslog and 'dnsmasq --version'

Run time tested with & without NO_ID on Archer C7 v2

Signed-off-by: Kevin Darbyshire-Bryant <kevin@darbyshire-bryant.me.uk>
2017-08-31 12:43:46 +02:00
Kevin Darbyshire-Bryant
f3d818571c dnsmasq: bump to 2.77rc3
Fix [FS#766] Intermittent SIGSEGV crash of dnsmasq-full

Signed-off-by: Kevin Darbyshire-Bryant <kevin@darbyshire-bryant.me.uk>
2017-08-31 12:40:49 +02:00
Kevin Darbyshire-Bryant
0c9e97b844 dnsmasq: bump to 2.77test5
A number of small tweaks & improvements on the way to a final release.
Most notable:

Improve DHCPv4 address-in-use check.
Remove the recently introduced RFC-6842 (Client-ids in DHCP replies)
support as it turns out some clients are getting upset.

Signed-off-by: Kevin Darbyshire-Bryant <kevin@darbyshire-bryant.me.uk>
2017-08-31 12:37:35 +02:00
Kevin Darbyshire-Bryant
fccbf91bf9 dnsmasq: bump to dnsmasq v2.77test4
--bogus-priv now applies to IPv6 prefixes as specified in RFC6303 - this
is significantly friendlier to upstream servers.

CNAME fix in auth mode - A domain can only have a CNAME if it has no
other records

Drop 2 patches now included upstream.

Compile & run tested Archer C7 v2

Signed-off-by: Kevin Darbyshire-Bryant <kevin@darbyshire-bryant.me.uk>
2017-08-31 12:36:33 +02:00
Kevin Darbyshire-Bryant
07c79e4b7c dnsmasq: bump to dnsmasq v2.77test3
New test release (since test1) includes 2 LEDE patches that are
upstream and may be dropped, along with many spelling fixes.

Add forthcoming 2017 root zone trust anchor to trust-anchors.conf.

Backport 2 patches that just missed test3:

Reduce logspam of those domains handled locally 'local addresses only'
Implement RFC-6842 (Client-ids in DHCP replies)

Compile & run tested Archer C7 v2

Signed-off-by: Kevin Darbyshire-Bryant <kevin@darbyshire-bryant.me.uk>
2017-08-31 12:35:12 +02:00
Kevin Darbyshire-Bryant
a1b00385a2 dnsmasq: update to dnsmasq 2.77test1
Bump to dnsmasq 2.77test1 - this includes a number of fixes since 2.76
and allows dropping of 2 LEDE carried patches.

Notable fix in rrfilter code when talking to Nominum's DNS servers
especially with DNSSEC.

A patch to switch dnsmasq back to 'soft fail' for SERVFAIL responses
from dns servers is also included.  This mean dnsmasq tries all
configured servers before giving up.

A 'localise queries' enhancement has also been backported (it will
appear in test2/rc'n') this is especially important if using the
recently imported to LEDE 'use dnsmasq standalone' feature 9525743c

I have been following dnsmasq HEAD ever since 2.76 release.
Compile & Run tested: ar71xx, Archer C7 v2

Tested-by: Kevin Darbyshire-Bryant <kevin@darbyshire-bryant.me.uk>
Signed-off-by: Kevin Darbyshire-Bryant <kevin@darbyshire-bryant.me.uk>
2017-08-31 12:32:32 +02:00
Hauke Mehrtens
84da27181f dnsmasq: Bump to dnsmasq2.75
Fixes a 100% cpu usage issue if using dhcp-script.

Signed-off-by: Kevin Darbyshire-Bryant <kevin@darbyshire-bryant.me.uk>
Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
2017-08-31 11:09:48 +02:00
Steven Barth
b3b8dacb3c dnsmasq: Bump to dnsmasq2.74
Bump to dnsmasq2.74 & refresh patches to fix fuzz

Signed-off-by: Kevin Darbyshire-Bryant <kevin@darbyshire-bryant.me.uk>
2017-08-31 11:09:05 +02:00
Jo-Philipp Wich
815e238ff3 CC: dropbear: security update to 2016.74
- Security: Message printout was vulnerable to format string injection.

  If specific usernames including "%" symbols can be created on a system
  (validated by getpwnam()) then an attacker could run arbitrary code as root
  when connecting to Dropbear server.

  A dbclient user who can control username or host arguments could potentially
  run arbitrary code as the dbclient user. This could be a problem if scripts
  or webpages pass untrusted input to the dbclient program.

- Security: dropbearconvert import of OpenSSH keys could run arbitrary code as
  the local dropbearconvert user when parsing malicious key files

- Security: dbclient could run arbitrary code as the local dbclient user if
  particular -m or -c arguments are provided. This could be an issue where
  dbclient is used in scripts.

- Security: dbclient or dropbear server could expose process memory to the
  running user if compiled with DEBUG_TRACE and running with -v

  The security issues were reported by an anonymous researcher working with
  Beyond Security's SecuriTeam Secure Disclosure www.beyondsecurity.com/ssd.html

Signed-off-by: Jo-Philipp Wich <jo@mein.io>
2017-08-31 08:51:44 +02:00
Jo-Philipp Wich
ca00773e28 CC: dropbear: update to 2016.73
Update the dropbear package to version 2016.73, refresh patches.
The measured .ipk sizes on an x86_64 build are:

  94588 dropbear_2015.71-3_x86_64.ipk
  95316 dropbear_2016.73-1_x86_64.ipk

This is an increase of roughly 700 bytes after compression.

Tested-by: Kevin Darbyshire-Bryant <kevin@darbyshire-bryant.me.uk>
Signed-off-by: Jo-Philipp Wich <jo@mein.io>
2017-08-31 08:51:05 +02:00
Hans Dedecker
c1413be493 CC: dropbear: Make utmp and putuline support configurable via seperate config options
Utmp support tracks who is currenlty logged in by logging info to the file /var/run/utmp (supported by busybox)
Putuline support will use the utmp structure to write to the utmp file

Signed-off-by: Hans Dedecker <dedeckeh@gmail.com>
2017-08-31 08:50:09 +02:00
Hans Dedecker
1b3b93e5da CC: dropbear: Add procd interface triggers when interface config is specified
A dropbear instance having an interface config won't start if the interface is down as no
IP address is available.
Adding interface triggers for each configured interface executing the dropbear reload script
will start the dropbear instance when the interface is up.

Signed-off-by: Hans Dedecker <dedeckeh@gmail.com>
2017-08-31 08:49:25 +02:00
Jo-Philipp Wich
7966cf2265 dropbear: honor CONFIG_TARGET_INIT_PATH
Signed-off-by: Jo-Philipp Wich <jow@openwrt.org>
2017-08-31 08:48:55 +02:00
Hannu Nyman
d6cc49c97f CC: dropbear: update version to 2015.71
Update dropbear to version 2015.71, released on 3 Dec 2015.
Refresh patches.

Signed-off-by: Hannu Nyman <hannu.nyman@iki.fi>
2017-08-31 08:47:30 +02:00
Felix Fietkau
db41bcac69 dropbear: enable curve25519 support by default, increases compressed binary size by ~5 kb
Signed-off-by: Felix Fietkau <nbd@openwrt.org>
2017-08-31 08:46:43 +02:00
Felix Fietkau
3e107d670c CC: dropbear: split out curve25519 support into a separate config option
Signed-off-by: Felix Fietkau <nbd@openwrt.org>
2017-08-31 08:46:10 +02:00
Alexandru Ardelean
cb8e4a76ba CC: dropbear: add respawn param in case dropbear crashes
Signed-off-by: Alexandru Ardelean <ardeleanalex@gmail.com>
2017-08-31 08:45:39 +02:00
Steven Barth
180384c0a6 CC: dropbear: remove generation and configuration of DSS keys
Signed-off-by: Steven Barth <steven@midlink.org>
2017-08-31 08:44:40 +02:00
Felix Fietkau
9f83a0114e dropbear: disable 3des, cbc mode, dss support, saves about 5k gzipped
While technically required by the RFC, they are usually completely
unused (DSA), or have security issues (3DES, CBC)

Signed-off-by: Felix Fietkau <nbd@openwrt.org>
2017-08-31 08:43:58 +02:00
Steven Barth
bff2da1713 CC: dropbear: Disable telnet in favor of passwordless SSH
This enables passworldless login for root via SSH whenever no root
password is set (e.g. after reset, flashing without keeping config
or in failsafe) and removes telnet support alltogether.

Signed-off-by: Steven Barth <steven@midlink.org>
2017-08-31 08:43:09 +02:00
Steven Barth
12a8f2a3d9 CC: dropbear: bump to 2015.68
Signed-off-by: Steven Barth <steven@midlink.org>
2017-08-31 08:42:03 +02:00
Imre Kaloz
2aefb514a4 mvebu: bugfixes for rango
backport of ce116bc6f997d8d6e6b976cacce5d4c60d705fc6

Signed-off-by: Imre Kaloz <kaloz@openwrt.org>
2016-10-18 11:43:26 +02:00
Imre Kaloz
a55319cca0 mwlwifi: install the 88W8964 firmware, too
backport of 67d3ba0c7c91c0a2fb0cbd768d3a75db2246de80

Signed-off-by: Imre Kaloz <kaloz@openwrt.org>
2016-10-16 00:15:40 +02:00
Imre Kaloz
af4877f6fd mwlwifi: upgrade to 10.3.2.0-20161013
backport of 2055b43f78c8ff74fe513a1fdaf5a10481faac6f

Signed-off-by: Imre Kaloz <kaloz@openwrt.org>
2016-10-13 13:00:19 +02:00
Imre Kaloz
b41b40c00d hostapd: add interoperability workaround for 80+80 and 160 MHz channels
backport of f9fc9c242fa62c214dc4a92bd89ca9a36bc8308c

Signed-off-by: Imre Kaloz <kaloz@openwrt.org>
2016-10-13 12:59:10 +02:00
Hrvoje Varga
609ebc43be odhcpd: update to git HEAD
This change also reflect relocation of upstream project which has been
moved to OpenWrt GitHub organization.

Signed-off-by: Hrvoje Varga <hrvoje.varga@sartura.hr>
2016-10-11 08:00:11 +00:00
Hrvoje Varga
901885e34c odhcp6c: update to git HEAD
This change also reflect relocation of upstream project which has been
moved to OpenWrt GitHub organization.

Signed-off-by: Hrvoje Varga <hrvoje.varga@sartura.hr>
2016-10-11 07:59:49 +00:00
Zoltan Herpai
ca3f1a614a Merge pull request #105 from wigyori/chaos_calmer
CC: openssl security upgrade, sync updates from git.openwrt.org/chaos_calmer
2016-09-29 15:49:20 +02:00
Rafał Miłecki
f9755e2877 mac80211: brcmfmac: backport changes from 2016-09-27
This fixes memory leaks, some possible crashes and bug that could cause
WARNING on every add_key/del_key call. It also replaces WARNING with
a simple message. They may still occur e.g. on station going out of
range and A-MPDU stall in the firmware.

Signed-off-by: Rafał Miłecki <rafal@milecki.pl>
2016-09-29 14:59:38 +02:00
Rafał Miłecki
bc00413221 mac80211: brcmfmac: backport patches that were skipped previously #2
Signed-off-by: Rafał Miłecki <rafal@milecki.pl>
2016-09-29 14:58:53 +02:00
Rafał Miłecki
396e838bd6 mac80211: brcmfmac: backport patches that were skipped previously #1
They are necessary for further fixes and improvements otherwise recent
patches don't apply.

Signed-off-by: Rafał Miłecki <rafal@milecki.pl>
2016-09-29 14:26:20 +02:00
Imre Kaloz
1016f38a86 mwlwifi: upgrade to 10.3.0.18-20160804
adds support for the Linksys WRT1900ACSv2 and WRT1200ACv2

Signed-off-by: Imre Kaloz <kaloz@openwrt.org>
2016-09-29 14:24:56 +02:00
Rafał Miłecki
3bf4b214e8 mac80211: brcmfmac: backport patch simplifying brcmf_alloc_vif
This is quite trivial and will be required for VIF fixes in the future.

Signed-off-by: Rafał Miłecki <zajec5@gmail.com>
2016-09-29 14:24:14 +02:00
Rafał Miłecki
99ed5200c0 mac80211: brcmfmac: fix stopping netdev queue when bus clogs up
Signed-off-by: Rafał Miłecki <zajec5@gmail.com>
2016-09-29 14:23:54 +02:00
Rafał Miłecki
718c539199 mac80211: brcmfmac: support hidden SSID
Signed-off-by: Rafał Miłecki <zajec5@gmail.com>
2016-09-29 14:23:32 +02:00
Rafał Miłecki
b0c59f5629 mac80211: brcmfmac: fix interfaces management
To work correctly hostapd requires wireless driver to allow interfaces
removal. It was working with brcmfmac only partially. Firmware for
BCM43602 got some special hack (feature?) that allowed removing all
interfaces by disabling mbss mode. It wasn't working with BCM4366
firmware and remaining interfaces were preventing hostapd from starting
again.

Those patches add support for "interface_remove" firmware method which
works with BCM4366 firmware and they make it finally possible to use
BCM4366 & brcmfmac & multiple interfaces.

Signed-off-by: Rafał Miłecki <zajec5@gmail.com>
2016-09-29 14:21:52 +02:00
Rafał Miłecki
067545b374 rpcd: iwinfo plugin fixes
- Expose supported HT rate information in info call
 - Zero out ccode buffer when listing countries

Signed-off-by: Jo-Philipp Wich <jo@mein.io>
Signed-off-by: Rafał Miłecki <zajec5@gmail.com>
2016-09-29 14:20:27 +02:00
Rafał Miłecki
a047169f9d mac80211: brcmfmac: fix lockup related to P2P interface
Signed-off-by: Rafał Miłecki <zajec5@gmail.com>
2016-09-29 14:19:44 +02:00
Zoltan HERPAI
29fcc94c9a CC: openssl: update to 1.0.2j
Security fixes:
* (Severity: High) OCSP Status Request extension unbounded memory growth (CVE-2016-6304)
* (Severity: Moderate) SSL_peek() hang on empty record (CVE-2016-6305)
* (Severity: Moderate) Missing CRL sanity check (CVE-2016-7052)
* 10 Low severity issues

Security advisories:
https://www.openssl.org/news/secadv/20160922.txt
https://www.openssl.org/news/secadv/20160926.txt

Signed-off-by: Zoltan HERPAI <wigyori@uid0.hu>
2016-09-29 07:29:15 +02:00
Sven Eckelmann
b6c8710aa7 package/uboot-envtools: add OpenMesh MR1750v2 support
Signed-off-by: Sven Eckelmann <sven.eckelmann@open-mesh.com>
2016-09-21 18:16:54 +02:00
Sven Eckelmann
9f2256a4d4 package/om-watchdog: add OpenMesh MR1750v2 support
Signed-off-by: Sven Eckelmann <sven.eckelmann@open-mesh.com>
2016-09-21 18:16:54 +02:00
Sven Eckelmann
eeaa319a63 package/uboot-envtools: add OpenMesh OM2P-HSv3 support
Signed-off-by: Sven Eckelmann <sven.eckelmann@open-mesh.com>
2016-09-21 18:16:54 +02:00
Sven Eckelmann
d461f84d6e package/om-watchdog: add OpenMesh OM2P-HSv3 support
Signed-off-by: Sven Eckelmann <sven.eckelmann@open-mesh.com>
2016-09-21 18:16:54 +02:00
Sven Eckelmann
919ececba8 uboot-envtools: add OpenMesh OM5P-ACv2 support
Signed-off-by: Sven Eckelmann <sven.eckelmann@open-mesh.com>

Backport of r49153
2016-09-21 18:16:54 +02:00
Sven Eckelmann
734f67a174 om-watchdog: add OpenMesh OM5P-ACv2 support
Signed-off-by: Sven Eckelmann <sven.eckelmann@open-mesh.com>

Backport of r49152
2016-09-21 18:16:54 +02:00
Sven Eckelmann
1104930079 uboot-envtools: add OpenMesh OM5P-AC support
Signed-off-by: Sven Eckelmann <sven.eckelmann@open-mesh.com>

Backport of r49146
2016-09-21 18:16:54 +02:00
Sven Eckelmann
9ea881a3cd om-watchdog: add OpenMesh OM5P-AC support
Signed-off-by: Sven Eckelmann <sven.eckelmann@open-mesh.com>

Backport of r49145
2016-09-21 18:16:54 +02:00
Sven Eckelmann
84c90a1e82 package/uboot-envtools: add OpenMesh MR1750 support
Signed-off-by: Sven Eckelmann <sven.eckelmann@open-mesh.com>

Backport of r46931
2016-09-21 18:16:54 +02:00