This is an automated email from the git hooks/post-receive script. It was generated because a ref change was pushed to the repository containing the project "IPFire 2.x development tree". The branch, next has been updated via e850a61429b03cb77a9dc798e9f093500db09a87 (commit) via ef7d9d7657a3062dbba694728c4c8c6b05caa4c7 (commit) via d4ff0694c5fa0ec1798cbf849b896b3212a262f6 (commit) via 19357bc55e63cbde3bfae3f46bfaf5e655871763 (commit) via 3fa8300e706227db9f72b4b1349dde3e66399298 (commit) via 2469ca9fbab0a02502fc8086bc94517d7dcdcfaf (commit) via 49dd3e2946435b0f4dc77ca1a9d7b14d22edca8d (commit) via 855475580b153f05df8417d408193142a76950cf (commit) via 9deccd1cbab7e446a362b6410fb88b36b655a7cd (commit) via 11f7218f9cd16b32b2cb4477355e0e5057df6399 (commit) via 4f07c279a01d076d7f788ac8635194a8bb7c51cd (commit) via 761fadbdde805c8863a1f2a736408367a38f94da (commit) via aaf266ac2b1c230eeb1ba897c9674aaf28cbcf53 (commit) via ec18a1ecae60c6c3b6418e300aebd6a823844c8d (commit) via 56702858529ae1bf75e21da3ef00f136bacedfcd (commit) via 637eb94684cb0029ca76bb67dda8a8d2c15560ab (commit) via 0165dd40256fb1fe8474140cf54eb30cfb9fb7f3 (commit) via a09578f4eb954ea982926daab53c34492df05b43 (commit) from 80909fb6da64a911c900df50805fd5866685faf0 (commit) Those revisions listed above that are new to this repository have not appeared on any other notification email; so we list those revisions in full, below. - Log ----------------------------------------------------------------- commit e850a61429b03cb77a9dc798e9f093500db09a87 Author: Arne Fitzenreiter Date: Tue Oct 19 18:27:49 2021 +0000 firewall: replace mark with --pol ipsec to exclude ipsec traffic from masquerade Signed-off-by: Arne Fitzenreiter commit ef7d9d7657a3062dbba694728c4c8c6b05caa4c7 Author: Arne Fitzenreiter Date: Tue Oct 19 18:25:11 2021 +0000 core161: add suricata changes Signed-off-by: Arne Fitzenreiter commit d4ff0694c5fa0ec1798cbf849b896b3212a262f6 Author: Peter Müller Date: Mon Oct 18 22:36:02 2021 +0200 squid-asnbl: update to 0.2.3 Upstream commit 500b9137d0a9dd31e40f0d1effdba0aafeb94ca4 changes the behaviour of this script in case of invalid or unresolvable FQDNs, preventing Squid from eventually shutting down due to too many BH's per time. Since this allows (authenticated) users to run a DoS against the Squid instance, it is considered to be security relevant. Signed-off-by: Peter Müller Signed-off-by: Arne Fitzenreiter commit 19357bc55e63cbde3bfae3f46bfaf5e655871763 Author: Michael Tremer Date: Mon Oct 18 10:10:22 2021 +0000 firewall: Keep REPEAT bit when saving rest to CONNMARK Signed-off-by: Michael Tremer Tested-by: Stefan Schantl Signed-off-by: Arne Fitzenreiter commit 3fa8300e706227db9f72b4b1349dde3e66399298 Author: Michael Tremer Date: Mon Oct 18 10:10:21 2021 +0000 suricata: Introduce IPSBYPASS chain NFQUEUE does not let the packet continue where it was processed, but inserts it back into iptables at the start. That is why we need an extra IPSBYPASS chain which has the following tasks: * Make the BYPASS bit permanent for the entire connection * Clear the REPEAT bit The latter is more of cosmetic nature so that we can identify packets that have come from suricata again and those which have bypassed the IPS straight away. The IPS_* chain will now only be sent traffic to, when none of the two relevant bits has been set. Otherwise the packet has already been processed by suricata in the first pass or suricata has decided to bypass the connection. This massively reduces load on the IPS which allows many common connections (TLS connections with downloads) to bypass the IPS bringing us back to line speed. Signed-off-by: Michael Tremer Tested-by: Stefan Schantl Signed-off-by: Arne Fitzenreiter commit 2469ca9fbab0a02502fc8086bc94517d7dcdcfaf Author: Michael Tremer Date: Mon Oct 18 10:10:20 2021 +0000 suricata: Store bypass flag in connmark and restore Signed-off-by: Michael Tremer Tested-by: Stefan Schantl Signed-off-by: Arne Fitzenreiter commit 49dd3e2946435b0f4dc77ca1a9d7b14d22edca8d Author: Michael Tremer Date: Mon Oct 18 10:10:19 2021 +0000 suricata: Add rule to skip IPS if a packet has the bypass bit set Signed-off-by: Michael Tremer Tested-by: Stefan Schantl Signed-off-by: Arne Fitzenreiter commit 855475580b153f05df8417d408193142a76950cf Author: Michael Tremer Date: Mon Oct 18 10:10:18 2021 +0000 suricata: Always append rules instead of inserting them This allows us to add rules in a consistent order like they are in the script. Signed-off-by: Michael Tremer Tested-by: Stefan Schantl Signed-off-by: Arne Fitzenreiter commit 9deccd1cbab7e446a362b6410fb88b36b655a7cd Author: Michael Tremer Date: Mon Oct 18 10:10:17 2021 +0000 suricata: Enable bypassing unhandled streams If a stream cannot be identified or if suricata has decided that it cannot do anything useful any more (e.g. TLS sessions after the handshake), we will allow suricata to bypass any following packets in that flow Signed-off-by: Michael Tremer Tested-by: Stefan Schantl Signed-off-by: Arne Fitzenreiter commit 11f7218f9cd16b32b2cb4477355e0e5057df6399 Author: Michael Tremer Date: Mon Oct 18 10:10:16 2021 +0000 suricata: Define bypass mark Signed-off-by: Michael Tremer Reviewed-by: Peter Müller Tested-by: Stefan Schantl Signed-off-by: Arne Fitzenreiter commit 4f07c279a01d076d7f788ac8635194a8bb7c51cd Author: Michael Tremer Date: Mon Oct 18 10:10:15 2021 +0000 suricata: Rename MARK/MASK to REPEAT_MARK/REPEAT_MASK This should avoid confusion when we add more marks Signed-off-by: Michael Tremer Reviewed-by: Peter Müller Tested-by: Stefan Schantl Signed-off-by: Arne Fitzenreiter commit 761fadbdde805c8863a1f2a736408367a38f94da Author: Michael Tremer Date: Mon Oct 18 10:10:14 2021 +0000 suricata: Set most significant bit as repeat marker I have no idea why some odd value was chosen here, but one bit should be enough. Signed-off-by: Michael Tremer Reviewed-by: Peter Müller Tested-by: Stefan Schantl Signed-off-by: Arne Fitzenreiter commit aaf266ac2b1c230eeb1ba897c9674aaf28cbcf53 Author: Arne Fitzenreiter Date: Tue Oct 19 11:32:00 2021 +0000 core161: add pakfire.conf and pakfire/lib/functions.pl Signed-off-by: Arne Fitzenreiter commit ec18a1ecae60c6c3b6418e300aebd6a823844c8d Author: Michael Tremer Date: Thu Oct 14 19:01:49 2021 +0000 pakfire: Allow pinning Pakfire to one mirror server This patch adds a new $mirror option to the configuration file which will cause Pakfire to only use this one to download any files. This feature is disabled by default but useful for development. Fixes: #12706 Signed-off-by: Michael Tremer Signed-off-by: Arne Fitzenreiter commit 56702858529ae1bf75e21da3ef00f136bacedfcd Author: Arne Fitzenreiter Date: Tue Oct 19 11:27:58 2021 +0000 core161: add index.cgi and general-functions.pl Signed-off-by: Arne Fitzenreiter commit 637eb94684cb0029ca76bb67dda8a8d2c15560ab Author: Michael Tremer Date: Thu Oct 14 13:26:30 2021 +0000 index.cgi: Remove left-over DNSSEC status warning An error message is still shown although there is no option to disable DNSSEC at the moment. The old marker file could still be present on older machines. Signed-off-by: Michael Tremer Signed-off-by: Arne Fitzenreiter commit 0165dd40256fb1fe8474140cf54eb30cfb9fb7f3 Author: Arne Fitzenreiter Date: Tue Oct 19 11:23:12 2021 +0000 core161: add partresize Signed-off-by: Arne Fitzenreiter commit a09578f4eb954ea982926daab53c34492df05b43 Author: Michael Tremer Date: Thu Oct 14 12:00:31 2021 +0000 OCI: Enable serial console by default Signed-off-by: Michael Tremer Signed-off-by: Arne Fitzenreiter ----------------------------------------------------------------------- Summary of changes: config/cfgroot/general-functions.pl | 11 ----------- config/grub2/00_cloud | 8 ++++++++ config/rootfiles/core/161/filelists/files | 7 +++++++ config/suricata/suricata.yaml | 27 ++++++++++++++++++--------- html/cgi-bin/index.cgi | 5 ----- lfs/squid-asnbl | 4 ++-- src/initscripts/system/firewall | 25 +++++++++++++++++++------ src/initscripts/system/partresize | 6 +++--- src/initscripts/system/suricata | 15 +++------------ src/pakfire/lib/functions.pl | 12 ++++++++++++ src/pakfire/pakfire.conf | 3 +++ 11 files changed, 75 insertions(+), 48 deletions(-) Difference in files: diff --git a/config/cfgroot/general-functions.pl b/config/cfgroot/general-functions.pl index de608e38b..f72d6588c 100644 --- a/config/cfgroot/general-functions.pl +++ b/config/cfgroot/general-functions.pl @@ -1238,17 +1238,6 @@ sub get_red_interface() { return $interface; } -sub dnssec_status() { - my $path = "${General::swroot}/red/dnssec-status"; - - open(STATUS, $path) or return 0; - my $status = ; - close(STATUS); - - chomp($status); - - return $status; -} sub number_cpu_cores() { open my $cpuinfo, "/proc/cpuinfo" or die "Can't open cpuinfo: $!\n"; my $cores = scalar (map /^processor/, <$cpuinfo>); diff --git a/config/grub2/00_cloud b/config/grub2/00_cloud index 121cb2fbd..1ef5053e5 100644 --- a/config/grub2/00_cloud +++ b/config/grub2/00_cloud @@ -23,8 +23,16 @@ cat <new("${Conf::mirror}"); + + # Only accept HTTPS mirrors + if ($uri->scheme eq "https") { + return ("HTTPS", $uri->host, $uri->path . "/" . ${Conf::version}); + } else { + message("MIRROR ERROR: Unsupported mirror: " . ${Conf::mirror}); + } + } + ### Check if there is a current server list and read it. # If there is no list try to get one. my $count = 0; diff --git a/src/pakfire/pakfire.conf b/src/pakfire/pakfire.conf index 9930f3771..bc54dcff4 100644 --- a/src/pakfire/pakfire.conf +++ b/src/pakfire/pakfire.conf @@ -23,6 +23,9 @@ package Conf; $mainserver = "pakfire.ipfire.org"; +# Only use this mirror +#$mirror = "https://mirror1.ipfire.org/pakfire2"; + $cachedir = "/opt/pakfire/cache"; $dbdir = "/opt/pakfire/db"; $coredir = "/opt/pakfire/db/core"; hooks/post-receive -- IPFire 2.x development tree