Commit Graph

12339 Commits

Author SHA1 Message Date
Ignas Poklad cfb0de859f openfortivpn: upgrade to 1.23.1
add saml login support

Signed-off-by: Ignas Poklad <ignas2526@gmail.com>
2025-04-25 21:27:05 +08:00
Fabrice Fontaine c1c47695a8 net/aria2: fix PKG_CPE_ID
aria2_project:aria2 is a better CPE ID than tatsuhiro_tsujikawa:aria2 as
this CPE ID has the latest CVE (whereas tatsuhiro_tsujikawa:aria2 only
has CVEs up to 2010):
https://nvd.nist.gov/products/cpe/search/results?keyword=cpe:2.3🅰️aria2_project:aria2

Fixes: 299e5b0a9b (treewide: add PKG_CPE_ID for better cvescanner coverage)

Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
2025-04-24 19:45:00 +08:00
Fabrice Fontaine 4faf09cfb5 net/openssh: fix PKG_CPE_ID
openbsd:openssh is a better CPE ID than openssh:openssh as this CPE ID
has the latest CVEs (whereas openssh:openssh has no CVEs):
https://nvd.nist.gov/products/cpe/search/results?keyword=cpe:2.3🅰️openbsd:openssh

Fixes: 299e5b0a9b (treewide: add PKG_CPE_ID for better cvescanner coverage)

Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
2025-04-24 19:44:38 +08:00
George Sapkin da58fa1e0d adguardhome: bump to 0.107.61
Security

- Any simultaneous requests that are considered duplicates will now only
result in a single request to upstreams, reducing the chance of a cache
poisoning attack succeeding. This is controlled by the new configuration
object pending_requests, which has a single enabled property, set to
true by default.

NOTE: It's strongly recommended to leave it enabled, otherwise AdGuard
Home will be vulnerable to untrusted clients.

Changelog: https://github.com/AdguardTeam/AdGuardHome/releases/tag/v0.107.61
Signed-off-by: George Sapkin <george@sapk.in>
2025-04-24 19:34:19 +08:00
George Sapkin 7e9fa36cff adguardhome: bump to 0.107.60
Fixed:

- Filtering for DHCP clients.
- Incorrect label on login page.
- Validation process for the HTTPS port on the Encryption Settings page.

Changelog: https://github.com/AdguardTeam/AdGuardHome/releases/tag/v0.107.60
Signed-off-by: George Sapkin <george@sapk.in>
2025-04-24 19:34:19 +08:00
George Sapkin 3d5ea7f92b adguardhome: use committime instead of buildtime
buildtime has been replaced with committime upstream for better
reproducible builds.

Link: d17c6c6bb3 (diff-82ef468ec5547f1ed424776755a7f87dfec4eba9838d2c2ac02c9881bb67d737L68-R70)
Signed-off-by: George Sapkin <george@sapk.in>
2025-04-24 19:34:19 +08:00
Sandro Jäckel 79f86ceeb1 tailscale: update to 1.82.5
Signed-off-by: Sandro Jäckel <sandro.jaeckel@gmail.com>'
2025-04-24 18:00:45 +08:00
Peter van Dijk e1c57dc2c4 pdns-recursor: update to 5.2.2
includes fix for CVE-2025-30195 (which was in 5.2.1)

Signed-off-by: Peter van Dijk <peter.van.dijk@powerdns.com>
2025-04-24 17:59:52 +08:00
Wesley Gimenes 2ac31acc54 netbird: update to 0.42.0
changelog: https://github.com/netbirdio/netbird/releases/tag/v0.42.0

Signed-off-by: Wesley Gimenes <wehagy@proton.me>
2025-04-24 17:54:07 +08:00
Wesley Gimenes 2da44915c9 netbird: update to 0.41.3
changelog: https://github.com/netbirdio/netbird/releases/tag/v0.41.3

Signed-off-by: Wesley Gimenes <wehagy@proton.me>
2025-04-24 17:54:07 +08:00
Christian Lachner 83345c51fd haproxy: update to v3.0.10
- Update haproxy PKG_VERSION and PKG_HASH
- See changes: http://git.haproxy.org/?p=haproxy-3.0.git;a=shortlog

Signed-off-by: Christian Lachner <gladiac@gmail.com>
2025-04-24 17:53:35 +08:00
Daniel Golle 29a6674cb5 modemmanager: backport commit fixing crash with Fibocom mtk-7xx modems
Backport commit
046b79a676

See also
https://gitlab.freedesktop.org/mobile-broadband/ModemManager/-/issues/975

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2025-04-23 15:11:06 +02:00
Dobroslaw Kijowski 97b7ee1815 adguardhome: Add George Sapkin as maintainer
Signed-off-by: Dobroslaw Kijowski <dobo90@gmail.com>
2025-04-23 15:07:50 +02:00
Wei-Ting Yang babc163fe3 net-snmp: fix PRIdPTR macro undefined error
This commit includes inttypes.h to prevent the following error:

```
mibgroup/ieee802dot11.c: In function 'displayWiExt':
mibgroup/ieee802dot11.c:4563:26: error: expected ')' before 'PRIdPTR'
 4563 |     printf ( "%s sens: %" PRIdPTR "\n", "SIOCGIWSENS", *(intptr_t *)&info.sens );
      |            ~             ^~~~~~~~
      |                          )
mibgroup/ieee802dot11.c:31:1: note: 'PRIdPTR' is defined in header '<inttypes.h>'; did you forget to '#include <inttypes.h>'?
   30 | #include "util_funcs/header_generic.h"
  +++ |+#include <inttypes.h>
   31 |
```

Signed-off-by: Wei-Ting Yang <williamatcg@gmail.com>
2025-04-23 15:06:16 +02:00
Liangbin Lian d827297546 transmission: add syscalls to seccomp filter
Add missing syscalls found with `/etc/init.d/transmission trace`.

fix crash on boot on x86_64 platform

Signed-off-by: Liangbin Lian <jjm2473@gmail.com>
2025-04-21 19:18:11 +01:00
Rikki Vizcarra 1de23c1c12 ddns-script: Change CURL call and redirect output in update_porkbun_v3
This also fixes: https://github.com/openwrt/packages/issues/26181

CURL funciton change was patterned on other ddns update scripts
that uses also JSON request/response payloads similar to
update_digitalocean_v2.sh: 15014f93e1/net/ddns-scripts/files/usr/lib/ddns/update_digitalocean_com_v2.sh (L29)
update_gcp_v1.sh: 15014f93e1/net/ddns-scripts/files/usr/lib/ddns/update_gcp_v1.sh (L212)

rebased and bumbped ddns-script version

Signed-off-by: Rikki Vizcarra <rikki.vizcarra@gmail.com>
2025-04-20 22:10:44 +02:00
Mieczyslaw Nalewaj b093eea601 xtables-addons: bump to 3.27
Updated for compatibility with kernel 6.12.

Signed-off-by: Mieczyslaw Nalewaj <namiltd@poczta.onet.pl>
2025-04-20 21:37:59 +02:00
Dirk Brenken 519c7fcf96
adblock: update 4.4.1-1
* add an uci-defaults script for housekeeping and option migration from former versions
* update the readme

Signed-off-by: Dirk Brenken <dev@brenken.org>
2025-04-19 20:01:23 +02:00
Paul Donald bed8c8ae33 ddns-scripts: bump package release
Signed-off-by: Paul Donald <newtwen+github@gmail.com>
2025-04-18 18:06:14 +02:00
Paul Donald 9f3d6fed24 ddns-scripts: fix daemon to reload instead of kill
Instead of just killing all the processes, let's actually reload them,
since that's what the user would expect when issuing a 'reload' command.

Move the killall portion to a kill function

Signed-off-by: Paul Donald <newtwen+github@gmail.com>
2025-04-18 18:06:14 +02:00
Paul Donald 081f1856a5 ddns-scripts: fix daemon start - background the script
omitted the ampersand in the re-factor in commit
a361672882

Signed-off-by: Paul Donald <newtwen+github@gmail.com>
2025-04-18 18:06:14 +02:00
Ryan Press 939939bcee modemmanager: bump to 1.24.0
100-ublox-remove-ID_MM_PROCESS-tags.patch has been removed as this change is now upstream.

Signed-off-by: Ryan Press <ryan@presslab.us>
2025-04-18 18:00:40 +02:00
Dirk Brenken 3e99991067
adblock: update 4.4.0-3
* checked and fixed the kresd and smartdns support
* fixed another ETAG issue
* changed the enabled feeds in default config to certpl, aguard and adguard_tracking
* various other small fixes
* update the readme

Signed-off-by: Dirk Brenken <dev@brenken.org>
2025-04-16 21:37:07 +02:00
George Sapkin 7b2daf0f0a external-protocol: add missing ip dependency
external.sh requires ip with -json flag that is not supported by the
BusyBox ip.

Fixes: https://github.com/openwrt/packages/issues/26302
Signed-off-by: George Sapkin <george@sapk.in>
2025-04-16 19:04:08 +02:00
John Audia 0ec5c1e1a9 openssh: bump to 10.0p1
This update requires sshd-auth to be packaged due to the authentication
bin split introduced in this version.

Changelog: https://www.openssh.com/txt/release-10.0

Build system: x86/64
Build-tested: x86/64
Run-tested: x86/64

Signed-off-by: John Audia <therealgraysky@proton.me>
2025-04-16 18:52:44 +02:00
Tianling Shen df9ba18578
librespeed-go: add missing conffiles
Add missing uci configuration to conffiles.

Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2025-04-16 17:25:07 +08:00
Stan Grishin 71f596840b adblock-fast: bugfixes: empty allow-lists, support for swap
* do not produce an error on empty allow-lists, fixes https://github.com/openwrt/packages/issues/26228
* do not produce an error when swap is available, fixes https://github.com/openwrt/packages/issues/26313

Signed-off-by: Stan Grishin <stangri@melmac.ca>
2025-04-15 21:35:58 -07:00
Wesley Gimenes 9c557d206b netbird: update to 0.41.2
changelog: https://github.com/netbirdio/netbird/releases/tag/v0.41.2

Signed-off-by: Wesley Gimenes <wehagy@proton.me>
2025-04-15 22:12:45 +03:00
Wesley Gimenes 4dee0fc39e netbird: update to 0.41.1
changelog: https://github.com/netbirdio/netbird/releases/tag/v0.41.1

Signed-off-by: Wesley Gimenes <wehagy@proton.me>
2025-04-15 22:12:45 +03:00
Tianling Shen 87ed509841
cloudflared: Update to 2025.4.0
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2025-04-15 19:42:45 +08:00
Tianling Shen 1d73b25ed8
v2ray-geodata: Update to latest version
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2025-04-15 19:42:31 +08:00
Tianling Shen 6f869c6ceb
v2ray-core: Update to 5.29.3
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2025-04-15 19:41:59 +08:00
Stan Grishin e67e30d0e1 https-dns-proxy: update to 2025.03.13 upstream
* fixes https://github.com/openwrt/packages/issues/25522

Signed-off-by: Stan Grishin <stangri@melmac.ca>
2025-04-13 17:18:20 -07:00
Dirk Brenken d10813d62f
adblock: update 4.4.0-2
* minor ETAG fixes and improvements
* permanently set the addnmount option for dnsmasq
* cosmetics

Signed-off-by: Dirk Brenken <dev@brenken.org>
2025-04-13 21:41:56 +02:00
Mikael Magnusson 2bd00ef789 openssh: add FIDO U2F and FIDO2 hardware token support
Add openssh-sk-helper package containing ssh-sk-helper.

The helper can be used by openssh-client, openssh-sftp-client,
and openssh-keygen to access `ecdsa_sk` and `ed25519_sk keys
provided by a FIDO U2F or FIDO2 hardware token connected over USB.

Close #24509

Signed-off-by: Mikael Magnusson <mikma@users.sourceforge.net>
2025-04-13 16:48:17 +08:00
Mikael Magnusson 0a3ef8cbf4 Revert "openssh: Add FIDO2 hardware token support"
This reverts commit 855db864b0.

The reverted commit doesn't make sense since the component
(ssh-sk-helper) that uses libfido2, which is mentioned in
the commit message, isn't packaged.

Signed-off-by: Mikael Magnusson <mikma@users.sourceforge.net>
2025-04-13 16:48:17 +08:00
Wesley Gimenes c5576299a0 netbird: update to 0.40.1
changelog: https://github.com/netbirdio/netbird/releases/tag/v0.40.1

Signed-off-by: Wesley Gimenes <wehagy@proton.me>
2025-04-12 22:44:58 +02:00
Maxim Storchak 3a81db1f10 tgt: update to 1.0.96
Signed-off-by: Maxim Storchak <m.storchak@gmail.com>
2025-04-12 13:57:16 +02:00
Dirk Brenken 7383b4817b
banIP: release 1.5.6-1
* the ETAG function now supports country and asn feeds as well
* fixed becyber URL and other small fixes
* LuCI fixes and improvements (separate commit)

Signed-off-by: Dirk Brenken <dev@brenken.org>
2025-04-11 21:59:31 +02:00
Paul Donald 15014f93e1 ddns-scripts: correct bump release
Signed-off-by: Paul Donald <newtwen+github@gmail.com>
2025-04-11 08:37:57 +02:00
Dirk Brenken 4857db8e28
adblock: release 4.4.0-1
* added a 'DNS Shift' option, where the generated final DNS blocklist is moved to the backup directory and
   only a soft link to this file is set in memory. As long as your backup directory is located on an external drive,
   you should activate this option to save disk space
* added ETAG-Header support to make sure to download only feeds that has been changed,
   use backups otherwise (not supported by uclient-fetch)
* removed aria2 support
* added brave as a new safesearch provider
* removed the racist terminology from the local lists and renamed it to "allowlist" and "blocklist"
* removed the 'list' and 'timer' function from init, use the LuCI feed editor and the standard cron frontend instead
* various  code changes and improvements
* major LuCI frontend changes, incl. a custom feed editor (separate commit)
* partial readme update

Signed-off-by: Dirk Brenken <dev@brenken.org>
2025-04-10 23:39:30 +02:00
Jan Hák 3764639cae knot: update to version 3.4.6
Signed-off-by: Jan Hák <jan.hak@nic.cz>
2025-04-10 15:08:33 +02:00
Jan Hák 8a5d1a1519 knot: fix patch for configuration sample
Fixes #26149

Signed-off-by: Jan Hák <jan.hak@nic.cz>
2025-04-10 15:08:27 +02:00
Paul Donald 32de15820b ddns-scripts: bump PKG_RELEASE
Signed-off-by: Paul Donald <newtwen+github@gmail.com>
2025-04-10 09:34:38 +02:00
Paul Donald 5b277eb855 ddns-scripts: refactor get_uptime() and avoid cat in sub-shell
no sub-shell is spawned to get uptime.

Signed-off-by: Paul Donald <newtwen+github@gmail.com>
2025-04-10 09:34:38 +02:00
Paul Donald 2bf1916a34 ddns-scripts: refactor load_all_config_options()
Same functionality - code reads less 'shouty' and 'stabby'.

Signed-off-by: Paul Donald <newtwen+github@gmail.com>
2025-04-10 09:34:38 +02:00
Paul Donald 77933a45ea ddns-scripts: add stop action for individual sections
it is now possible to stop an individual instance, and not all of them.

Signed-off-by: Paul Donald <newtwen+github@gmail.com>
2025-04-10 09:34:38 +02:00
Paul Donald a361672882 ddns-scripts: refactor start_daemon_for_all_ddns_sections()
Removed redundant if else condition. updater is launched
with the same verbosity value anyway.

Signed-off-by: Paul Donald <newtwen+github@gmail.com>
2025-04-10 09:34:38 +02:00
Paul Donald 99da7eded2 ddns-scripts: refactor stop_daemon_for_all_ddns_sections()
Same functionality - code reads less 'shouty' and 'stabby'.

Signed-off-by: Paul Donald <newtwen+github@gmail.com>
2025-04-10 09:34:38 +02:00
Paul Donald 2ab29cc06c ddns-scripts: refactor stop_section_processes()
Now a single xargs calls instead of grepping ps output (unreliable).

Signed-off-by: Paul Donald <newtwen+github@gmail.com>
2025-04-10 09:34:38 +02:00
Paul Donald 91954f4b69 ddns-scripts: refactor update_url checks to avoid echo|grep sub-shells
Signed-off-by: Paul Donald <newtwen+github@gmail.com>
2025-04-10 09:34:38 +02:00
Paul Donald 6706a5bd78 ddns-scripts: variable quoting
in case spaces should creep into path names

Signed-off-by: Paul Donald <newtwen+github@gmail.com>
2025-04-10 09:34:38 +02:00
Florian Eckert 6b9b6fdace modemmanager: add missing any option to allowedmode
The 'mmcli' also understands the option 'any'.

Signed-off-by: Florian Eckert <fe@dev.tdt.de>
2025-04-10 09:33:58 +02:00
Wesley Gimenes d520931ef3 netbird: update to 0.40.0
changelog: https://github.com/netbirdio/netbird/releases/tag/v0.40.0

Signed-off-by: Wesley Gimenes <wehagy@proton.me>
2025-04-09 14:43:08 +03:00
Tianling Shen aad793b6f4
v2raya: Update to 2.2.6.7
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2025-04-07 20:37:42 +08:00
Tianling Shen 72591f1821
alist: Update to 3.44.0
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2025-04-07 20:37:20 +08:00
Joel Low eb91f914b9 strongswan: DHCP on lo fixes backport
Fixes #25801. Adds the following commits to fix DHCP behaviour on
Strongswan 5.9.14:

 - abbf9d28b0
 - 00d8c36d6f
 - a50ed3006e

Signed-off-by: Joel Low <joel@joelsplace.sg>
2025-04-06 20:06:55 -06:00
Moritz Warning f4a9426143 zerotier: add patch to support miniupnpc 2.2.8
Signed-off-by: Moritz Warning <moritzwarning@web.de>
2025-04-06 08:45:35 +08:00
Christian Marangi 7dee8c47f1 znc: update to use SOURCE_VERSION for submodule download
Commit 9fc79e2e2622 ("download: don't overwrite VERSION variable")
changed the variable for direct download call from VERSION to
SOURCE_VERSION.

This cause the dl_github_archive script to pass empty value for
--version arg making it always clone HEAD.

Correctly update the variable to SOURCE_VERSION to actually clone the
expected commit HASH.

Signed-off-by: Christian Marangi <ansuelsmth@gmail.com>
2025-04-06 08:44:43 +08:00
Jonas Jelonek 399e3257ad gping: drop package
Reasons to drop:
- an unresolved issue which prevents updating gping to latest version.
  gping now relies on support for fractional timespan of 'sleep', which
  isn't enabled in main OpenWrt repository
- there are probably only few users of this package, if any, and I'm not
  a user anymore either
- there are other equal or better tools for the same purpose

Signed-off-by: Jonas Jelonek <jelonek.jonas@gmail.com>
2025-04-05 09:57:38 +03:00
George Sapkin a920f9ec9c adguardhome: increase UDP send/receive buffers
Link: https://github.com/quic-go/quic-go/wiki/UDP-Buffer-Sizes
Signed-off-by: George Sapkin <george@sapk.in>
2025-04-05 02:36:26 +08:00
Ivan Pavlov 74a66189f1 openvpn: update to 2.6.14
Security fixes:

​CVE-2025-2704: fix possible ASSERT() on OpenVPN servers using --tls-crypt-v2
 Security scope: OpenVPN servers between 2.6.1 and 2.6.13 using --tls-crypt-v2 can be made
 to abort with an ASSERT() message by sending a particular combination of authenticated and
 malformed packets. No crypto integrity is violated, no data is leaked, and no remote code
 execution is possible. This bug does not affect OpenVPN clients.

For details refer to https://github.com/OpenVPN/openvpn/blob/v2.6.14/Changes.rst

Signed-off-by: Ivan Pavlov <AuthorReflex@gmail.com>
2025-04-04 14:41:46 +02:00
Glenn Strauss e800fc7e8c lighttpd: update to lighttpd 1.4.79 release hash
Signed-off-by: Glenn Strauss <gstrauss@gluelogic.com>
2025-04-04 14:41:32 +02:00
Wesley Gimenes 8efe42d86c netbird: update to 0.39.2
changelog: https://github.com/netbirdio/netbird/releases/tag/v0.39.2

Signed-off-by: Wesley Gimenes <wehagy@proton.me>
2025-04-02 20:20:37 +02:00
Jonas Jelonek fbef16c1c4 croc: update to 10.2.2
release notes:
https://github.com/schollz/croc/releases/tag/v10.2.2

Signed-off-by: Jonas Jelonek <jelonek.jonas@gmail.com>
2025-04-02 20:20:16 +02:00
Florian Eckert 97dc4cf820 acme-common: update PKG_RELEASE
Signed-off-by: Florian Eckert <fe@dev.tdt.de>
2025-04-01 22:53:08 +02:00
Florian Eckert 692f3afe4a acme: remove crontab entry if service is stopped
Until now it was not possible to stop the acme service, because the handling
was done via cron. With this change, the acme handler can now be stopped by
calling '/etc/init.d/acme' stop. This call removes the entry from the crontab.

Signed-off-by: Florian Eckert <fe@dev.tdt.de>
2025-04-01 22:53:08 +02:00
Florian Eckert e73688d178 acme: remove lock handling
Since procd is now used, the call of '/etc/init.d/acme' does not have to be
locked separately. This code block can therefore be removed.

Signed-off-by: Florian Eckert <fe@dev.tdt.de>
2025-04-01 22:53:08 +02:00
Florian Eckert 420210b318 acme: fix service_triggers on config change
In the current implementation, the config change trigger is no longer set
at boot time. This is because during boot, only the '$CHALLENGE_DIR' is
created with the boot function. The 'start_service' is first called by first
cron call at midnight. This call is installing the service_triggers reload
handling.

To fix this, add a new extra_command 'renew' that is responsible to renew
the acme. This function is called from cron and the start_service
function does the rest.

* Create directories
* Install service reload trigger form acme config change

Fixes: 76f17ab15b (acme-common: Create challenge directory on boot)

Signed-off-by: Florian Eckert <fe@dev.tdt.de>
2025-04-01 22:53:08 +02:00
Florian Eckert ea285eb460 ddns-scripts: always use the 'ps' output from busybox
The 'ps' command from 'procps-ng' is used in favour of 'ps' from 'busybox'
when 'procps-ng' is installed. The problem is that the outputs are not
compatible and the ‘grep’ is different for further processing. To fix this,
always use the 'ps' command from 'busybox'.

Signed-off-by: Florian Eckert <fe@dev.tdt.de>
2025-04-01 15:40:58 +02:00
Robert Marko 83b0c8e27d ddns-scripts: fix ddns-scripts-scaleway description
ddns-scripts-scaleway description section was not defined as such and was
overriding the package definition leading to:
Makefile:839: *** missing separator.  Stop.

Fixes: a7867016c8 ("ddns-scripts: add support for Scaleway DNS")
Signed-off-by: Robert Marko <robimarko@gmail.com>
2025-04-01 11:31:13 +02:00
Florian Eckert 6c8ad9f02b modemmanager: fix pending mmcli calls for ModemManager-monitor script
If the ModemManager is stopped via '/etc/init.d/modemmanager', mmcli calls
always remain in the process list. This is because the ModemManager-monitor
call is not terminated properly, as the kill signals are not handled
correctly in the startup script for mmcli.

To fix this, the signal handling is refactored.

Signed-off-by: Florian Eckert <fe@dev.tdt.de>
2025-04-01 10:08:27 +02:00
Florian Eckert 5c203c36d5 modemmanager: add missing mmcli timeout option during ubus call
The default 'timeout' value is 30 seconds when calling an mmcli action. That
is too long. For this reason, the mmcli 'timeout' option is specified for
calls and the value is set to 10 seconds.

Signed-off-by: Florian Eckert <fe@dev.tdt.de>
2025-04-01 10:08:27 +02:00
Lars Kaiser 4e41a1c8f8 ddns-scripts: fix typo in package name
Signed-off-by: Lars Kaiser <lars@kaiser.yt>
2025-04-01 08:57:10 +02:00
Lars Kaiser a7867016c8 ddns-scripts: add support for Scaleway DNS
Signed-off-by: Lars Kaiser <lars@kaiser.yt>
2025-04-01 08:57:10 +02:00
Vasily Evseenko 85b4f08c9e wfb-ng: Update to release 25.01
1) FEC optimizations
2) Add tunnel daemon
3) Add wfb_tx_cmd utility

Signed-off-by: Vasily Evseenko <svpcom@gmail.com>
2025-03-31 20:25:04 +03:00
Sandro Jäckel a6441f6470 tailscale: update to 1.82.0
Signed-off-by: Sandro Jäckel <sandro.jaeckel@gmail.com>
2025-04-01 00:58:25 +08:00
Dirk Brenken 251f58d513
banIP: update 1.5.5-2
* fixed a JSON reporting issue (when the map and NFT counters are disabled)
* optimized the getfetch function call within the reporting function
* removed the stale IPv6 links in the becyber feed
* cosmetics

Signed-off-by: Dirk Brenken <dev@brenken.org>
2025-03-29 17:07:09 +01:00
Khachatryan Karen 48b943bec4 antiblock: Update to 2.1.2
1) Fixed a bug, specifying the sniffer port did not work

Signed-off-by: Khachatryan Karen <karen0734@gmail.com>
2025-03-29 13:48:23 +02:00
Dirk Brenken 716e73da56
banIP: release 1.5.5-1
* added a geoIP Map to show home IPs and potential attacker IPs on a leafletjs based map
* significantly improved the reporting performance on multicore hardware
* removed aria2 support (it doesn't support post data requests)
* removed the following outbound feeds due to too many false positives:
   adaway, adguard, adguardtrackers, antipopads, oisdbig, oisdnsfw, oisdsmall, stevenblack and yoyo
* renamed the banIP command "survey" to "content"
* various other small tweaks
* update the readme

Signed-off-by: Dirk Brenken <dev@brenken.org>
2025-03-28 07:57:42 +01:00
Wesley Gimenes f3d563ef6f netbird: update to 0.39.1
changelog: https://github.com/netbirdio/netbird/releases/tag/v0.39.1

Signed-off-by: Wesley Gimenes <wehagy@proton.me>
2025-03-28 14:22:45 +08:00
George Sapkin f6c7871464 tailscale: assign PKG_CPE_ID
Link: https://nvd.nist.gov/products/cpe/search/results?namingFormat=2.2&orderBy=2.2&keyword=cpe%3A2.3%3Aa%3Atailscale%3Atailscale&status=FINAL
Link: https://github.com/openwrt/packages/issues/8534
Signed-off-by: George Sapkin <george@sapk.in>
2025-03-26 19:58:27 +01:00
Rui Salvaterra 60908b5b9b tor: update to 0.4.8.16 stable
Minor release, see the changelog [1] for what's new.

[1] https://gitlab.torproject.org/tpo/core/tor/-/blob/tor-0.4.8.16/ChangeLog

Signed-off-by: Rui Salvaterra <rsalvaterra@gmail.com>
2025-03-25 17:53:20 +01:00
Stijn Tintel 483c2fef80 keepalived: bump to 2.3.2
This requires backporting two upstream commits to avoid a segfault
due to the /etc/iproute2/rt_addrprotos.d and
/usr/share/iproute2/rt_addrprotos.d directories not existing on OpenWrt,
and the following compile error:

In file included from /home/stijn/Development/OpenWrt/openwrt/staging_dir/toolchain-powerpc64_e5500_gcc-13.3.0_musl/include/net/ethernet.h:10,
                 from vrrp.c:44:
/home/stijn/Development/OpenWrt/openwrt/staging_dir/toolchain-powerpc64_e5500_gcc-13.3.0_musl/include/netinet/if_ether.h:115:8: error: redefinition of 'struct ethhdr'
  115 | struct ethhdr {
      |        ^~~~~~
In file included from vrrp.c:43:
/home/stijn/Development/OpenWrt/openwrt/staging_dir/toolchain-powerpc64_e5500_gcc-13.3.0_musl/include/linux/if_ether.h:173:8: note: originally defined here
  173 | struct ethhdr {
      |        ^~~~~~

Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
2025-03-25 08:26:42 +01:00
Khachatryan Karen 47425ce255 antiblock: Update to 2.1.1
1) Fixed a bug that not all routers were deleted.
2) Log updated.
3) The "output" option has been removed from the service, it is now /tmp/antiblock

Signed-off-by: Khachatryan Karen <karen0734@gmail.com>
2025-03-24 18:34:22 +02:00
Tianling Shen 08084d48a4
alist: Update to 3.43.0
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2025-03-24 21:29:25 +08:00
Tianling Shen 4e77b1d2d2
dnsproxy: Update to 0.75.2
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2025-03-24 21:29:16 +08:00
Wesley Gimenes 860e1a40cb netbird: update to 0.38.2
changelog: https://github.com/netbirdio/netbird/releases/tag/v0.38.2

Signed-off-by: Wesley Gimenes <wehagy@proton.me>
2025-03-24 00:33:31 +01:00
Nick Hainke 01ecebe3a5 snowflake: update to 2.11.0
ChangeLog:
6472bd86cd

Signed-off-by: Nick Hainke <vincent@systemli.org>
2025-03-23 22:18:13 +01:00
George Sapkin 0b4e8e1c2b adguardhome: bump to 0.107.59
Use prebuilt frontend and drop node/host depenendency as a result.

Changelog: https://github.com/AdguardTeam/AdGuardHome/releases/tag/v0.107.59
Signed-off-by: George Sapkin <george@sapk.in>
2025-03-23 18:21:07 +08:00
George Sapkin 55d3a42aa5 adguardhome: bump to 0.107.58
Changelog: https://github.com/AdguardTeam/AdGuardHome/releases/tag/v0.107.58
Signed-off-by: George Sapkin <george@sapk.in>
2025-03-23 18:21:07 +08:00
George Sapkin fd52fb6e3c adguardhome: assign PKG_CPE_ID
Link: https://nvd.nist.gov/products/cpe/search/results?namingFormat=2.3&orderBy=2.3&keyword=cpe%3A2.3%3Aa%3Aadguard%3Aadguardhome
Link: https://github.com/openwrt/packages/issues/8534
Signed-off-by: George Sapkin <george@sapk.in>
2025-03-23 18:21:07 +08:00
George Sapkin 8ccace5af4 adguardhome: add CI version check
Signed-off-by: George Sapkin <george@sapk.in>
2025-03-23 18:21:07 +08:00
Glenn Strauss 0a50c57417 lighttpd: update to lighttpd 1.4.78 release hash
Signed-off-by: Glenn Strauss <gstrauss@gluelogic.com>
2025-03-23 09:23:51 +01:00
Pascal Ernster 2d66b6c8f2 bind: bump to 9.20.7
Verbatim copy from upstream's release notes:

Notes for BIND 9.20.7

- New Features
  - Implement the min-transfer-rate-in configuration option.
  - A new option min-transfer-rate-in has been added to the view and zone configurations. It can abort incoming zone transfers that run very slowly due to network-related issues, for example. The default value is 10240 bytes in five minutes. [GL #3914]
  - Add HTTPS record query to host command line tool.
  - The host command was extended to also query for the HTTPS RR type by default.
  - Implement sig0key-checks-limit and sig0message-checks-limit.
  - Previously, a hard-coded limitation of a maximum of two key or message verification checks was introduced when checking a message’s SIG(0) signature, to protect against possible DoS attacks. Two as a maximum was chosen so that more than a single key should only be required during key rotations, and in that case two keys are enough. It later became apparent that there are other use cases where even more keys are required; see the related GitLab issue for examples.
  - This change introduces two new configuration options for the views: sig0key-checks-limit and sig0message-checks-limit. They define how many keys can be checked to find a matching key, and how many message verifications are allowed to take place once a matching key has been found. The former provides slightly less “expensive” key parsing operations and defaults to 16. The latter protects against expensive cryptographic operations when there are keys with colliding tags and algorithm numbers; the default is 2. [GL #5050]
- Bug Fixes
  - Fix dual-stack-servers configuration option.
  - The dual-stack-servers configuration option was not working as expected; the specified servers were not being used when they should have been, leading to resolution failures. This has been fixed. [GL #5019]
  - Fix a data race causing a permanent active client increase.
  - Previously, a data race could cause a newly created fetch context for a new client to be used before it had been fully initialized, which would cause the query to become stuck; queries for the same data would be either paused indefinitely or dropped because of the clients-per-query limit. This has been fixed. [GL #5053]
  - Fix deferred validation of unsigned DS and DNSKEY records.
  - When processing a query with the “checking disabled” bit set (CD=1), named stores the invalidated result in the cache, marked “pending”. When the same query is sent with CD=0, the cached data is validated and either accepted as an answer, or ejected from the cache as invalid. This deferred validation was not attempted for DS and DNSKEY records if they had no cached signatures, causing spurious validation failures. The deferred validation is now completed in this scenario.
  - Also, if deferred validation fails, the data is now re-queried to find out whether the zone has been corrected since the invalid data was cached. [GL #5066]
  - Fix RPZ race condition during a reconfiguration.
  - With RPZ in use, named could terminate unexpectedly because of a race condition when a reconfiguration command was received using rndc. This has been fixed. [GL #5146]
  - “CNAME and other data check” not applied to all types.
  - An incorrect optimization caused “CNAME and other data” errors not to be detected if certain types were at the same node as a CNAME. This has been fixed. [GL #5150]
  - Relax private DNSKEY and RRSIG constraints.
  - DNSKEY, KEY, RRSIG, and SIG constraints have been relaxed to allow empty key and signature material after the algorithm identifier for PRIVATEOID and PRIVATEDNS. It is arguable whether this falls within the expected use of these types, as no key material is shared and the signatures are ineffective, but these are private algorithms and they can be totally insecure. [GL #5167]
  - Remove NSEC/DS/NSEC3 RRSIG check from dns_message_parse().
  - Previously, when parsing responses, named incorrectly rejected responses without matching RRSIG records for NSEC/DS/NSEC3 records in the authority section. This rejection, if appropriate, should have been left for the validator to determine and has been fixed. [GL #5185]
  - Fix TTL issue with ANY queries processed through RPZ “passthru”.
  - Answers to an “ANY” query which were processed by the RPZ “passthru” policy had the response-policy’s max-policy-ttl value unexpectedly applied. This has been fixed. [GL #5187]
  - dnssec-signzone needs to check for a NULL key when setting offline.
  - dnssec-signzone could dereference a NULL key pointer when resigning a zone. This has been fixed. [GL #5192]
  - Fix a bug in the statistics channel when querying zone transfer information.
  - When querying zone transfer information from the statistics channel, there was a rare possibility that named could terminate unexpectedly if a zone transfer was in a state when transferring from all the available primary servers had failed earlier. This has been fixed. [GL #5198]
  - Fix assertion failure when dumping recursing clients.
  - Previously, if a new counter was added to the hash table while dumping recursing clients via the rndc recursing command, and fetches-per-zone was enabled, an assertion failure could occur. This has been fixed. [GL #5200]
  - Dump the active resolver fetches from dns_resolver_dumpfetches()
  - Previously, active resolver fetches were only dumped when the fetches-per-zone configuration option was enabled. Now, active resolver fetches are dumped along with the number of clients-per-query counters per resolver fetch.

Notes for BIND 9.20.6

- New Features
  - Adds support for EDE code 1 and 2.
  - Support was added for EDE codes 1 and 2, which might occur during DNSSEC validation in the case of an unsupported RRSIG algorithm or DNSKEY digest. [GL #2715]
  - Add an rndc command to toggle jemalloc profiling.
  - The new command is rndc memprof; the memory profiling status is also reported inside rndc status. The status shows whether named can toggle memory profiling, and whether the server is built with jemalloc. [GL #4759]
  - Add support for multiple extended DNS errors.
  - The Extended DNS Error (EDE) mechanism may raise errors during a DNS resolution. named is now able to add up to three EDE codes in a DNS response. If there are duplicate error codes, only the first one is part of the DNS response. [GL #5085]
  - Print the expiration time of stale records.
  - BIND now prints the expiration time of any stale RRsets in the cache dump.
- Bug Fixes
  - Recently expired records could be returned with a timestamp in future.
  - Under rare circumstances, an RRSet that expired at the time of the query could be returned with a TTL in the future. This has been fixed.
  - As a side effect, the expiration time of expired RRSets is no longer returned in a cache dump. [GL #5094]
  - YAML string not terminated in negative response in delv.
  - [GL #5098]
  - Fix a bug in dnssec-signzone related to keys being offline.
  - When dnssec-signzone was called on an already-signed zone and the private key file was unavailable, a signature that needed to be refreshed was dropped without being able to generate a replacement. This has been fixed. [GL #5126]
  - Apply the memory limit only to ADB database items.
  - Under heavy load, a resolver could exhaust the memory available for storing the information in the Address Database (ADB), effectively discarding previously stored information in the ADB. The memory used to retrieve and provide information from the ADB is no longer subject to the same memory limits that are applied to the Address Database. [GL #5127]
  - Avoid unnecessary locking in the zone/cache database.
  - Lock contention among many worker threads referring to the same database node at the same time is now prevented. This improves zone and cache database performance for any heavily contended database nodes. [GL #5130]
  - Fix reporting of Extended DNS Error 22 (No Reachable Authority).
  - This error code was previously not reported in some applicable situations. This has been fixed. [GL #5137]

Compile tested: x86/64, QEMU Standard PC (Q35 + ICH9, 2009), r29064-696ad7b1aa09
Compile tested: ath79/generic, TP-Link Archer C7 v4, r29064-696ad7b1aa09
Compile tested: realtek/rtl838x, Netgear GS108T v3, r29064-696ad7b1aa09
Run tested: x86/64, QEMU Standard PC (Q35 + ICH9, 2009), r29064-696ad7b1aa09, booted and used for 7h without issues
Run tested: ath79/generic, TP-Link Archer C7 v4, r29064-696ad7b1aa09, booted and used for 7h without issues
Run tested: realtek/rtl838x, Netgear GS108T v3, r29064-696ad7b1aa09, booted and used for 7h without issues

Signed-off-by: Pascal Ernster <git@hardfalcon.net>
2025-03-22 19:22:40 -04:00
Dirk Brenken ed57afa392
adblock: update 4.2.7-3
* fixed a reversed domain output when TLD compression is disabled (reported in the forum)
* removed abandoned antipopads source
* added three energized source variants (blu, spark, ultimate)

Signed-off-by: Dirk Brenken <dev@brenken.org>
2025-03-22 08:55:31 +01:00
Khachatryan Karen 7edaf49955 antiblock: Update to 2.1.0
1) Added the ability to route different domains through different gateways, up to 32 routes.
2) The program has been switched from proxying mode to sniffer mode.
3) Blacklist has been added so that the specified subnets are not added to the routing table.

Signed-off-by: Khachatryan Karen <karen0734@gmail.com>
2025-03-21 20:04:34 +02:00
John Audia aa89d293db snort3: update to 3.7.1.0
Changelog: https://github.com/snort3/snort3/releases/tag/3.7.1.0

Signed-off-by: John Audia <therealgraysky@proton.me>
2025-03-20 21:26:59 +02:00
Christian Lachner fc29fe2a73 haproxy: update to v3.0.9
- Update haproxy PKG_VERSION and PKG_HASH
- See changes: http://git.haproxy.org/?p=haproxy-3.0.git;a=shortlog

Signed-off-by: Christian Lachner <gladiac@gmail.com>
2025-03-20 21:26:00 +02:00
Jan Hák c8dca36e81 knot: update to version 3.4.5
Signed-off-by: Jan Hák <jan.hak@nic.cz>
2025-03-20 21:25:47 +02:00