Commit Graph

12226 Commits

Author SHA1 Message Date
Wesley Gimenes
8efe42d86c netbird: update to 0.39.2
changelog: https://github.com/netbirdio/netbird/releases/tag/v0.39.2

Signed-off-by: Wesley Gimenes <wehagy@proton.me>
2025-04-02 20:20:37 +02:00
Jonas Jelonek
fbef16c1c4 croc: update to 10.2.2
release notes:
https://github.com/schollz/croc/releases/tag/v10.2.2

Signed-off-by: Jonas Jelonek <jelonek.jonas@gmail.com>
2025-04-02 20:20:16 +02:00
Florian Eckert
97dc4cf820 acme-common: update PKG_RELEASE
Signed-off-by: Florian Eckert <fe@dev.tdt.de>
2025-04-01 22:53:08 +02:00
Florian Eckert
692f3afe4a acme: remove crontab entry if service is stopped
Until now it was not possible to stop the acme service, because the handling
was done via cron. With this change, the acme handler can now be stopped by
calling '/etc/init.d/acme' stop. This call removes the entry from the crontab.

Signed-off-by: Florian Eckert <fe@dev.tdt.de>
2025-04-01 22:53:08 +02:00
Florian Eckert
e73688d178 acme: remove lock handling
Since procd is now used, the call of '/etc/init.d/acme' does not have to be
locked separately. This code block can therefore be removed.

Signed-off-by: Florian Eckert <fe@dev.tdt.de>
2025-04-01 22:53:08 +02:00
Florian Eckert
420210b318 acme: fix service_triggers on config change
In the current implementation, the config change trigger is no longer set
at boot time. This is because during boot, only the '$CHALLENGE_DIR' is
created with the boot function. The 'start_service' is first called by first
cron call at midnight. This call is installing the service_triggers reload
handling.

To fix this, add a new extra_command 'renew' that is responsible to renew
the acme. This function is called from cron and the start_service
function does the rest.

* Create directories
* Install service reload trigger form acme config change

Fixes: 76f17ab15b (acme-common: Create challenge directory on boot)

Signed-off-by: Florian Eckert <fe@dev.tdt.de>
2025-04-01 22:53:08 +02:00
Florian Eckert
ea285eb460 ddns-scripts: always use the 'ps' output from busybox
The 'ps' command from 'procps-ng' is used in favour of 'ps' from 'busybox'
when 'procps-ng' is installed. The problem is that the outputs are not
compatible and the ‘grep’ is different for further processing. To fix this,
always use the 'ps' command from 'busybox'.

Signed-off-by: Florian Eckert <fe@dev.tdt.de>
2025-04-01 15:40:58 +02:00
Robert Marko
83b0c8e27d ddns-scripts: fix ddns-scripts-scaleway description
ddns-scripts-scaleway description section was not defined as such and was
overriding the package definition leading to:
Makefile:839: *** missing separator.  Stop.

Fixes: a7867016c8 ("ddns-scripts: add support for Scaleway DNS")
Signed-off-by: Robert Marko <robimarko@gmail.com>
2025-04-01 11:31:13 +02:00
Florian Eckert
6c8ad9f02b modemmanager: fix pending mmcli calls for ModemManager-monitor script
If the ModemManager is stopped via '/etc/init.d/modemmanager', mmcli calls
always remain in the process list. This is because the ModemManager-monitor
call is not terminated properly, as the kill signals are not handled
correctly in the startup script for mmcli.

To fix this, the signal handling is refactored.

Signed-off-by: Florian Eckert <fe@dev.tdt.de>
2025-04-01 10:08:27 +02:00
Florian Eckert
5c203c36d5 modemmanager: add missing mmcli timeout option during ubus call
The default 'timeout' value is 30 seconds when calling an mmcli action. That
is too long. For this reason, the mmcli 'timeout' option is specified for
calls and the value is set to 10 seconds.

Signed-off-by: Florian Eckert <fe@dev.tdt.de>
2025-04-01 10:08:27 +02:00
Lars Kaiser
4e41a1c8f8 ddns-scripts: fix typo in package name
Signed-off-by: Lars Kaiser <lars@kaiser.yt>
2025-04-01 08:57:10 +02:00
Lars Kaiser
a7867016c8 ddns-scripts: add support for Scaleway DNS
Signed-off-by: Lars Kaiser <lars@kaiser.yt>
2025-04-01 08:57:10 +02:00
Vasily Evseenko
85b4f08c9e wfb-ng: Update to release 25.01
1) FEC optimizations
2) Add tunnel daemon
3) Add wfb_tx_cmd utility

Signed-off-by: Vasily Evseenko <svpcom@gmail.com>
2025-03-31 20:25:04 +03:00
Sandro Jäckel
a6441f6470 tailscale: update to 1.82.0
Signed-off-by: Sandro Jäckel <sandro.jaeckel@gmail.com>
2025-04-01 00:58:25 +08:00
Dirk Brenken
251f58d513 banIP: update 1.5.5-2
* fixed a JSON reporting issue (when the map and NFT counters are disabled)
* optimized the getfetch function call within the reporting function
* removed the stale IPv6 links in the becyber feed
* cosmetics

Signed-off-by: Dirk Brenken <dev@brenken.org>
2025-03-29 17:07:09 +01:00
Khachatryan Karen
48b943bec4 antiblock: Update to 2.1.2
1) Fixed a bug, specifying the sniffer port did not work

Signed-off-by: Khachatryan Karen <karen0734@gmail.com>
2025-03-29 13:48:23 +02:00
Dirk Brenken
716e73da56 banIP: release 1.5.5-1
* added a geoIP Map to show home IPs and potential attacker IPs on a leafletjs based map
* significantly improved the reporting performance on multicore hardware
* removed aria2 support (it doesn't support post data requests)
* removed the following outbound feeds due to too many false positives:
   adaway, adguard, adguardtrackers, antipopads, oisdbig, oisdnsfw, oisdsmall, stevenblack and yoyo
* renamed the banIP command "survey" to "content"
* various other small tweaks
* update the readme

Signed-off-by: Dirk Brenken <dev@brenken.org>
2025-03-28 07:57:42 +01:00
Wesley Gimenes
f3d563ef6f netbird: update to 0.39.1
changelog: https://github.com/netbirdio/netbird/releases/tag/v0.39.1

Signed-off-by: Wesley Gimenes <wehagy@proton.me>
2025-03-28 14:22:45 +08:00
George Sapkin
f6c7871464 tailscale: assign PKG_CPE_ID
Link: https://nvd.nist.gov/products/cpe/search/results?namingFormat=2.2&orderBy=2.2&keyword=cpe%3A2.3%3Aa%3Atailscale%3Atailscale&status=FINAL
Link: https://github.com/openwrt/packages/issues/8534
Signed-off-by: George Sapkin <george@sapk.in>
2025-03-26 19:58:27 +01:00
Rui Salvaterra
60908b5b9b tor: update to 0.4.8.16 stable
Minor release, see the changelog [1] for what's new.

[1] https://gitlab.torproject.org/tpo/core/tor/-/blob/tor-0.4.8.16/ChangeLog

Signed-off-by: Rui Salvaterra <rsalvaterra@gmail.com>
2025-03-25 17:53:20 +01:00
Stijn Tintel
483c2fef80 keepalived: bump to 2.3.2
This requires backporting two upstream commits to avoid a segfault
due to the /etc/iproute2/rt_addrprotos.d and
/usr/share/iproute2/rt_addrprotos.d directories not existing on OpenWrt,
and the following compile error:

In file included from /home/stijn/Development/OpenWrt/openwrt/staging_dir/toolchain-powerpc64_e5500_gcc-13.3.0_musl/include/net/ethernet.h:10,
                 from vrrp.c:44:
/home/stijn/Development/OpenWrt/openwrt/staging_dir/toolchain-powerpc64_e5500_gcc-13.3.0_musl/include/netinet/if_ether.h:115:8: error: redefinition of 'struct ethhdr'
  115 | struct ethhdr {
      |        ^~~~~~
In file included from vrrp.c:43:
/home/stijn/Development/OpenWrt/openwrt/staging_dir/toolchain-powerpc64_e5500_gcc-13.3.0_musl/include/linux/if_ether.h:173:8: note: originally defined here
  173 | struct ethhdr {
      |        ^~~~~~

Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
2025-03-25 08:26:42 +01:00
Khachatryan Karen
47425ce255 antiblock: Update to 2.1.1
1) Fixed a bug that not all routers were deleted.
2) Log updated.
3) The "output" option has been removed from the service, it is now /tmp/antiblock

Signed-off-by: Khachatryan Karen <karen0734@gmail.com>
2025-03-24 18:34:22 +02:00
Tianling Shen
08084d48a4 alist: Update to 3.43.0
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2025-03-24 21:29:25 +08:00
Tianling Shen
4e77b1d2d2 dnsproxy: Update to 0.75.2
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2025-03-24 21:29:16 +08:00
Wesley Gimenes
860e1a40cb netbird: update to 0.38.2
changelog: https://github.com/netbirdio/netbird/releases/tag/v0.38.2

Signed-off-by: Wesley Gimenes <wehagy@proton.me>
2025-03-24 00:33:31 +01:00
Nick Hainke
01ecebe3a5 snowflake: update to 2.11.0
ChangeLog:
6472bd86cd

Signed-off-by: Nick Hainke <vincent@systemli.org>
2025-03-23 22:18:13 +01:00
George Sapkin
0b4e8e1c2b adguardhome: bump to 0.107.59
Use prebuilt frontend and drop node/host depenendency as a result.

Changelog: https://github.com/AdguardTeam/AdGuardHome/releases/tag/v0.107.59
Signed-off-by: George Sapkin <george@sapk.in>
2025-03-23 18:21:07 +08:00
George Sapkin
55d3a42aa5 adguardhome: bump to 0.107.58
Changelog: https://github.com/AdguardTeam/AdGuardHome/releases/tag/v0.107.58
Signed-off-by: George Sapkin <george@sapk.in>
2025-03-23 18:21:07 +08:00
George Sapkin
fd52fb6e3c adguardhome: assign PKG_CPE_ID
Link: https://nvd.nist.gov/products/cpe/search/results?namingFormat=2.3&orderBy=2.3&keyword=cpe%3A2.3%3Aa%3Aadguard%3Aadguardhome
Link: https://github.com/openwrt/packages/issues/8534
Signed-off-by: George Sapkin <george@sapk.in>
2025-03-23 18:21:07 +08:00
George Sapkin
8ccace5af4 adguardhome: add CI version check
Signed-off-by: George Sapkin <george@sapk.in>
2025-03-23 18:21:07 +08:00
Glenn Strauss
0a50c57417 lighttpd: update to lighttpd 1.4.78 release hash
Signed-off-by: Glenn Strauss <gstrauss@gluelogic.com>
2025-03-23 09:23:51 +01:00
Pascal Ernster
2d66b6c8f2 bind: bump to 9.20.7
Verbatim copy from upstream's release notes:

Notes for BIND 9.20.7

- New Features
  - Implement the min-transfer-rate-in configuration option.
  - A new option min-transfer-rate-in has been added to the view and zone configurations. It can abort incoming zone transfers that run very slowly due to network-related issues, for example. The default value is 10240 bytes in five minutes. [GL #3914]
  - Add HTTPS record query to host command line tool.
  - The host command was extended to also query for the HTTPS RR type by default.
  - Implement sig0key-checks-limit and sig0message-checks-limit.
  - Previously, a hard-coded limitation of a maximum of two key or message verification checks was introduced when checking a message’s SIG(0) signature, to protect against possible DoS attacks. Two as a maximum was chosen so that more than a single key should only be required during key rotations, and in that case two keys are enough. It later became apparent that there are other use cases where even more keys are required; see the related GitLab issue for examples.
  - This change introduces two new configuration options for the views: sig0key-checks-limit and sig0message-checks-limit. They define how many keys can be checked to find a matching key, and how many message verifications are allowed to take place once a matching key has been found. The former provides slightly less “expensive” key parsing operations and defaults to 16. The latter protects against expensive cryptographic operations when there are keys with colliding tags and algorithm numbers; the default is 2. [GL #5050]
- Bug Fixes
  - Fix dual-stack-servers configuration option.
  - The dual-stack-servers configuration option was not working as expected; the specified servers were not being used when they should have been, leading to resolution failures. This has been fixed. [GL #5019]
  - Fix a data race causing a permanent active client increase.
  - Previously, a data race could cause a newly created fetch context for a new client to be used before it had been fully initialized, which would cause the query to become stuck; queries for the same data would be either paused indefinitely or dropped because of the clients-per-query limit. This has been fixed. [GL #5053]
  - Fix deferred validation of unsigned DS and DNSKEY records.
  - When processing a query with the “checking disabled” bit set (CD=1), named stores the invalidated result in the cache, marked “pending”. When the same query is sent with CD=0, the cached data is validated and either accepted as an answer, or ejected from the cache as invalid. This deferred validation was not attempted for DS and DNSKEY records if they had no cached signatures, causing spurious validation failures. The deferred validation is now completed in this scenario.
  - Also, if deferred validation fails, the data is now re-queried to find out whether the zone has been corrected since the invalid data was cached. [GL #5066]
  - Fix RPZ race condition during a reconfiguration.
  - With RPZ in use, named could terminate unexpectedly because of a race condition when a reconfiguration command was received using rndc. This has been fixed. [GL #5146]
  - “CNAME and other data check” not applied to all types.
  - An incorrect optimization caused “CNAME and other data” errors not to be detected if certain types were at the same node as a CNAME. This has been fixed. [GL #5150]
  - Relax private DNSKEY and RRSIG constraints.
  - DNSKEY, KEY, RRSIG, and SIG constraints have been relaxed to allow empty key and signature material after the algorithm identifier for PRIVATEOID and PRIVATEDNS. It is arguable whether this falls within the expected use of these types, as no key material is shared and the signatures are ineffective, but these are private algorithms and they can be totally insecure. [GL #5167]
  - Remove NSEC/DS/NSEC3 RRSIG check from dns_message_parse().
  - Previously, when parsing responses, named incorrectly rejected responses without matching RRSIG records for NSEC/DS/NSEC3 records in the authority section. This rejection, if appropriate, should have been left for the validator to determine and has been fixed. [GL #5185]
  - Fix TTL issue with ANY queries processed through RPZ “passthru”.
  - Answers to an “ANY” query which were processed by the RPZ “passthru” policy had the response-policy’s max-policy-ttl value unexpectedly applied. This has been fixed. [GL #5187]
  - dnssec-signzone needs to check for a NULL key when setting offline.
  - dnssec-signzone could dereference a NULL key pointer when resigning a zone. This has been fixed. [GL #5192]
  - Fix a bug in the statistics channel when querying zone transfer information.
  - When querying zone transfer information from the statistics channel, there was a rare possibility that named could terminate unexpectedly if a zone transfer was in a state when transferring from all the available primary servers had failed earlier. This has been fixed. [GL #5198]
  - Fix assertion failure when dumping recursing clients.
  - Previously, if a new counter was added to the hash table while dumping recursing clients via the rndc recursing command, and fetches-per-zone was enabled, an assertion failure could occur. This has been fixed. [GL #5200]
  - Dump the active resolver fetches from dns_resolver_dumpfetches()
  - Previously, active resolver fetches were only dumped when the fetches-per-zone configuration option was enabled. Now, active resolver fetches are dumped along with the number of clients-per-query counters per resolver fetch.

Notes for BIND 9.20.6

- New Features
  - Adds support for EDE code 1 and 2.
  - Support was added for EDE codes 1 and 2, which might occur during DNSSEC validation in the case of an unsupported RRSIG algorithm or DNSKEY digest. [GL #2715]
  - Add an rndc command to toggle jemalloc profiling.
  - The new command is rndc memprof; the memory profiling status is also reported inside rndc status. The status shows whether named can toggle memory profiling, and whether the server is built with jemalloc. [GL #4759]
  - Add support for multiple extended DNS errors.
  - The Extended DNS Error (EDE) mechanism may raise errors during a DNS resolution. named is now able to add up to three EDE codes in a DNS response. If there are duplicate error codes, only the first one is part of the DNS response. [GL #5085]
  - Print the expiration time of stale records.
  - BIND now prints the expiration time of any stale RRsets in the cache dump.
- Bug Fixes
  - Recently expired records could be returned with a timestamp in future.
  - Under rare circumstances, an RRSet that expired at the time of the query could be returned with a TTL in the future. This has been fixed.
  - As a side effect, the expiration time of expired RRSets is no longer returned in a cache dump. [GL #5094]
  - YAML string not terminated in negative response in delv.
  - [GL #5098]
  - Fix a bug in dnssec-signzone related to keys being offline.
  - When dnssec-signzone was called on an already-signed zone and the private key file was unavailable, a signature that needed to be refreshed was dropped without being able to generate a replacement. This has been fixed. [GL #5126]
  - Apply the memory limit only to ADB database items.
  - Under heavy load, a resolver could exhaust the memory available for storing the information in the Address Database (ADB), effectively discarding previously stored information in the ADB. The memory used to retrieve and provide information from the ADB is no longer subject to the same memory limits that are applied to the Address Database. [GL #5127]
  - Avoid unnecessary locking in the zone/cache database.
  - Lock contention among many worker threads referring to the same database node at the same time is now prevented. This improves zone and cache database performance for any heavily contended database nodes. [GL #5130]
  - Fix reporting of Extended DNS Error 22 (No Reachable Authority).
  - This error code was previously not reported in some applicable situations. This has been fixed. [GL #5137]

Compile tested: x86/64, QEMU Standard PC (Q35 + ICH9, 2009), r29064-696ad7b1aa09
Compile tested: ath79/generic, TP-Link Archer C7 v4, r29064-696ad7b1aa09
Compile tested: realtek/rtl838x, Netgear GS108T v3, r29064-696ad7b1aa09
Run tested: x86/64, QEMU Standard PC (Q35 + ICH9, 2009), r29064-696ad7b1aa09, booted and used for 7h without issues
Run tested: ath79/generic, TP-Link Archer C7 v4, r29064-696ad7b1aa09, booted and used for 7h without issues
Run tested: realtek/rtl838x, Netgear GS108T v3, r29064-696ad7b1aa09, booted and used for 7h without issues

Signed-off-by: Pascal Ernster <git@hardfalcon.net>
2025-03-22 19:22:40 -04:00
Dirk Brenken
ed57afa392 adblock: update 4.2.7-3
* fixed a reversed domain output when TLD compression is disabled (reported in the forum)
* removed abandoned antipopads source
* added three energized source variants (blu, spark, ultimate)

Signed-off-by: Dirk Brenken <dev@brenken.org>
2025-03-22 08:55:31 +01:00
Khachatryan Karen
7edaf49955 antiblock: Update to 2.1.0
1) Added the ability to route different domains through different gateways, up to 32 routes.
2) The program has been switched from proxying mode to sniffer mode.
3) Blacklist has been added so that the specified subnets are not added to the routing table.

Signed-off-by: Khachatryan Karen <karen0734@gmail.com>
2025-03-21 20:04:34 +02:00
John Audia
aa89d293db snort3: update to 3.7.1.0
Changelog: https://github.com/snort3/snort3/releases/tag/3.7.1.0

Signed-off-by: John Audia <therealgraysky@proton.me>
2025-03-20 21:26:59 +02:00
Christian Lachner
fc29fe2a73 haproxy: update to v3.0.9
- Update haproxy PKG_VERSION and PKG_HASH
- See changes: http://git.haproxy.org/?p=haproxy-3.0.git;a=shortlog

Signed-off-by: Christian Lachner <gladiac@gmail.com>
2025-03-20 21:26:00 +02:00
Jan Hák
c8dca36e81 knot: update to version 3.4.5
Signed-off-by: Jan Hák <jan.hak@nic.cz>
2025-03-20 21:25:47 +02:00
Ray Wang
fbfb671a19 fsh: update to 4.9.0
Signed-off-by: Ray Wang <git@hev.cc>
2025-03-20 21:25:28 +02:00
Florian Eckert
43b9a37a6e curl: add new option HTTP AUTH
The '--enable-http-auth' compile option in cURL is used to enable support
for HTTP authentication methods. This option allows cURL to handle various
authentication schemes, such as Basic, Digest, NTLM, and others, which
are commonly used in HTTP requests to secure access to resources.

This cURL compile option is default disabled. This should at least be enabled
as a compile option in OpenWrt so that it can be switched on if needed.

Signed-off-by: Florian Eckert <fe@dev.tdt.de>
2025-03-20 08:37:57 +01:00
Ray Wang
b2c01054d6 hev-socks5-tunnel: update to 2.10.0
Signed-off-by: Ray Wang <git@hev.cc>
2025-03-20 14:22:54 +08:00
Martin Schiller
90d8d4619b net/arp-scan: Disable promiscuous mode
If you run the arp-scan tool cyclically, the kernel messages for
promiscuous mode are very annoying.

This backports an upstream patch to disable the unnecessary promiscuous
mode in arp-scan.

Signed-off-by: Martin Schiller <ms@dev.tdt.de>
2025-03-19 13:40:33 +01:00
hingbong lo
da4d3e9ab1 Unbound: Fixed: local-data except IPv6 GA addresses with odhcpd
issue #25954

Signed-off-by: hingbong lo <hingbonglo@gmail.com>
2025-03-19 19:34:54 +08:00
Ray Wang
9cdb467256 hev-socks5-tproxy: update to 2.8.0
Signed-off-by: Ray Wang <git@hev.cc>
2025-03-19 19:09:30 +08:00
Ray Wang
0c5bda44d2 natmap: update to 20250318
Signed-off-by: Ray Wang <git@hev.cc>
2025-03-19 19:09:17 +08:00
Thiago Pereira Ricciardi
07bce030f3 pptpd: Fix secrets update
Clear pptp-server existing logins from CHAP_SECRETS file before adding new login data.

Signed-off-by: Thiago Pereira Ricciardi <thiago.ricciardi@gmail.com>
2025-03-19 10:45:21 +01:00
George Sapkin
9ddc2c5dcd adguardhome: bump to 0.107.57
Changelog: https://github.com/AdguardTeam/AdGuardHome/releases/tag/v0.107.57
Signed-off-by: George Sapkin <george@sapk.in>
2025-03-16 17:18:52 +08:00
George Sapkin
e416d3f12e adguardhome: remove unnecessary build options
Remove `node-yarn/host` because the upstream switched to npm
Remove `NODE_OPTIONS=--openssl-legacy-provider` because it's not necessary since Node.js 18.x

Link: 1afe226ce8 (diff-b335630551682c19a781afebcf4d07bf978fb1f8ac04c6bf87428ed5106870f5R210-L211)
Link: 1afe226ce8 (diff-b335630551682c19a781afebcf4d07bf978fb1f8ac04c6bf87428ed5106870f5L223-L230)
Signed-off-by: George Sapkin <george@sapk.in>
2025-03-16 17:18:52 +08:00
John Audia
a695cad9e8 snort3: update to 3.7.0.0
Changelog: https://github.com/snort3/snort3/releases/tag/3.7.0.0

Signed-off-by: John Audia <therealgraysky@proton.me>
2025-03-16 10:10:26 +01:00
Wesley Gimenes
e591fa62f4 netbird: update to 0.38.0
changelog: https://github.com/netbirdio/netbird/releases/tag/v0.38.0

Signed-off-by: Wesley Gimenes <wehagy@proton.me>
2025-03-16 09:19:02 +01:00
Jan Klos
a08950d5b8 nginx: update to 1.26.3
Signed-off-by: Jan Klos <jan@klos.xyz>
2025-03-12 11:01:39 +01:00