Skip to content
Snippets Groups Projects
  1. Apr 24, 2017
  2. Apr 03, 2017
  3. Mar 28, 2017
  4. Mar 21, 2017
  5. Mar 10, 2017
  6. Mar 09, 2017
  7. Mar 02, 2017
    • Florian Fainelli's avatar
      swconfig: Link with libubox · fe8618a8
      Florian Fainelli authored
      
      Fixes linking failures observed with external toolchains:
      
      /home/florian/dev/toolchains/stbgcc-4.8-1.5/bin/../lib/gcc/mipsel-linux-gnu/4.8.5/../../../../mipsel-linux-gnu/bin/ld:
      warning: libubox.so, needed by
      /home/florian/dev/openwrt/trunk/staging_dir/target-mipsel-unknown-linux-gnu_glibc/usr/lib/libuci.so,
      not found (try using -rpath or -rpath-link)
      /home/florian/dev/openwrt/trunk/staging_dir/target-mipsel-unknown-linux-gnu_glibc/usr/lib/libuci.so:
      undefined reference to `blobmsg_open_nested'
      /home/florian/dev/openwrt/trunk/staging_dir/target-mipsel-unknown-linux-gnu_glibc/usr/lib/libuci.so:
      undefined reference to `blobmsg_parse'
      /home/florian/dev/openwrt/trunk/staging_dir/target-mipsel-unknown-linux-gnu_glibc/usr/lib/libuci.so:
      undefined reference to `blob_nest_end'
      /home/florian/dev/openwrt/trunk/staging_dir/target-mipsel-unknown-linux-gnu_glibc/usr/lib/libuci.so:
      undefined reference to `blobmsg_add_field'
      
      Signed-off-by: default avatarFlorian Fainelli <f.fainelli@gmail.com>
      fe8618a8
  8. Feb 23, 2017
  9. Feb 19, 2017
  10. Feb 15, 2017
  11. Feb 12, 2017
  12. Jan 26, 2017
  13. Jan 24, 2017
  14. Jan 17, 2017
  15. Jan 13, 2017
  16. Jan 03, 2017
    • Roger Pueyo Centelles's avatar
      gre: add different per-protocol prefixes to GRE-TAP IPv4/6 tunnel interfaces. · c6d3a629
      Roger Pueyo Centelles authored
      
      This commit modifies the /lib/netifd/proto/gre.sh script so that, when
      GRE-TAP tunnels are created, either IPv4 or IPv6, the prefix before the chosen
      interface name contains the "tap" substring, to differentiate them from non-TAP
      GRE tunnels.
      
      Right now, both GRE and GRE-TAP tunnel (either IPv4 or IPv6) interfaces defined
      in /etc/config/network are named equally ("gre-"+$ifname or "grev6"+$ifname)
      upon creation. For instance, the following tunnels:
      
              config interface 'tuna'
                      option peeraddr '172.30.22.1'
                      option proto 'gre'
      
              config interface 'tunb'
                      option peeraddr '192.168.233.4'
                      option proto 'gretap'
      
              config interface 'tunc'
                      option peer6addr 'fdc5:7c9e:e93d:45af::1'
                      option proto 'grev6'
      
              config interface 'tund'
                      option peer6addr 'fdc0:6071:1348:31ff::2'
                      option proto 'grev6tap'
      
      are named, respectively, "gre-tuna", "gre-tunb", "grev6-tunc" and "grev6-tund".
      
      The current change makes that each GRE tunnel interface of the four different
      types available (gre, gretap, grev6 and grev6tap) gets a different prefix.
      Therefore, the abovementioned tunnels will be named, respectively:
      "gre4-tuna", "gre4t-tunb", "gre6-tunc" and "gre6t-tund".
      
      This is coherent with other types of virtual interfaces (i.e. PPP, PPPoE, PPPoA)
      where the whole protocol name is used. For instance, a PPPoA interface named
      "p1" and a PPPoE interface named "p2" will respectively appear as "pppoa-p1"
      and "pppoe-p2", not as "ppp-p1" and "ppp-p2").
      
      Since Linux interfaces names are limited to 15 characters, these prefixes leave,
      for the worst case (TAP tunnels), 9 characters for the actual name.
      
      Signed-off-by: default avatarRoger Pueyo Centelles <roger.pueyo@guifi.net>
      c6d3a629
  17. Dec 25, 2016
  18. Dec 22, 2016
  19. Dec 16, 2016
  20. Dec 14, 2016
  21. Nov 22, 2016
  22. Nov 08, 2016
    • Jo-Philipp Wich's avatar
      firewall: update to fix FS#31, FS#73, FS#154, FS#248 · 113544dc
      Jo-Philipp Wich authored
      
      Update to latest Git head in order to import several fixes and enhancements.
      
      - Disable drop invalid by default (FS#73, FS#154)
      
        Instead of dropping packets with conntrack state INVALID, only allow streams
        with explicit NEW or UNTRACKED conntrack state.
      
        This change gives user defined rules the chance to accept traffic like ICMPv6
        multicast which would be filtered away by the very early ctstate INVALID drop
        rule otherwise.
      
        The old behaviour can be restored by explicitely setting "drop_invalid" to 1
        in the global firewall config section.
      
      - Fix re-initialization of loadable iptables extensions on musl (FS#31)
      
        Since musl does not implement actual dlclose() semantics, it is impossible to
        re-run initializers on subsequent dlopen() calls.
      
        The firewall3 executable now intercepts the extension registration calls
        instead in order to be able to re-call them when needed.
      
        This also allowed us to switch to libxtables' builtin extension loader as a
        positive side-effect.
      
      - Fix masquerade rules for multiple negated IP addresses (FS#248)
      
        When building MASQUERADE rules for zones which specify multiple negated
        addresses in masq_src or masq_dest, emit -j RETURN rules which jump out of
        the masquerading chain instead of creating multiple rules with inverted "-s"
        arguments.
      
      - Tag own rules using comments
      
        Instead of relying on the nonstandard xt_id match, use the xt_comment match
        to mark own rules. Existing comments are prefixed with "!fw3: " while
        uncommented rules are marked with a sole "!fw3" string.
      
        This allows removing the xt_id match entirely in a later commit.
      
      - Make missing ubus connection nonfatal
      
        Technically, firewall3 is able to operate without ubus just fine as long as
        the zones are declared using "option device" or "option subnet" instead of
        "option network" so do not abort execution if ubus could not be connected or
        of no network namespace is exported in ubus.
      
        This allows running firewall3 on ordinary Linux systems.
      
      - Fix conntrack requirement detection for indirectly connected zones
      
        The current code fails to apply the conntrack requirement flag recursively to
        zones, leading to stray NOTRACK rules which break conntrack based traffic
        policing.
      
        Change the implementation to iteratively reapply the conntrack fixup logic
        until no more zones had been changed in order to ensure that all directly and
        indirectly connected zones receive the conntrack requirement flag.
      
      - Add support for iptables 1.6.x
      
        Adds support for the xtables version 11 api in order to allow building
        against iptables 1.6.x
      
      Signed-off-by: default avatarJo-Philipp Wich <jo@mein.io>
      113544dc
  23. Oct 27, 2016
  24. Oct 26, 2016
  25. Oct 15, 2016
  26. Oct 06, 2016
  27. Oct 04, 2016
  28. Sep 28, 2016
  29. Sep 20, 2016
  30. Aug 23, 2016
Loading