195 Commits

Author SHA1 Message Date
coolsnowwolf
9c78339ab5 iproute2: re-nice patch 2021-07-05 22:46:11 +08:00
coolsnowwolf
c4b625f3bb iproute2: drop sprint_rate() and uses print_rate() 2021-07-05 18:40:12 +08:00
coolsnowwolf
d7ee5d6016 iproute2: tc: add support for NSS qdisc 2021-07-05 17:24:38 +08:00
dansir
d7bef8a8f4
packages: use old extra_command wrapper (#7259)
* dnsforwarder: use old extra_command wrapper

* zram-swap: use old extra_command wrapper

* ltq-adsl-app: use old extra_command wrapper

* ltq-vdsl-app: use old extra_command wrapper
2021-07-03 14:44:24 +08:00
coolsnowwolf
4a0fbb84ad dropbear: use old extra_command wrapper 2021-06-30 21:26:45 +08:00
coolsnowwolf
8fc5020e3e dnsmasq: sync upstream 2021-06-30 16:16:46 +08:00
Beginner
d7e0201ce9
dnsmasq: distinct Ubus names for multiple instances (#7225)
Currently, when using multiple dnsmasq instances they are all assigned
to the same Ubus instance name. This does not work, as only a single
instance can register with Ubus at a time. In the log, this leads to
`Cannot add object to UBus: Invalid argument` error messages.
Furthermore, upstream 3c93e8eb41952a9c91699386132d6fe83050e9be changes
behaviour so that instead of the log, dnsmasq exits at start instead.

With this patch, all dnsmasq instances are assigned unique names so that
they can register with Ubus concurrently. One of the enabled instances
is always assigned the previous default name "dnsmasq" to avoid breaking
backwards compatibility with other software relying on that default.
Previously, a random instance got assigned that name (while the others
produced error logs). Now, the first unnamed dnsmasq config section is
assigned the default name. If there are no unnamed dnsmasq sections the
first encountered named dnsmasq config section is assigned instead.

A similar issue exists for Dbus and was similarly addressed.

Signed-off-by: Etan Kissling <etan.kissling@gmail.com>
[tweaked commit message] dnsmasq was not crashing it is exiting
Signed-off-by: Kevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk>

Co-authored-by: Etan Kissling <etan.kissling@gmail.com>
2021-06-30 05:05:20 +00:00
Felix Fietkau
4d4799ac4c iwinfo: update to the latest version
c9b1672f5a83 nl80211: fix path compatibility issue

Signed-off-by: Felix Fietkau <nbd@nbd.name>
2021-06-29 11:11:37 +08:00
AmadeusGhost
41ba774971
ath10k: re-added 256qam support (#7200)
* mac80211: allow VHT on 2.4GHz

Allow VHT rate on 2.4GHz in order to use 256-QAM

Signed-off-by: DENG Qingfang <dengqf6@mail2.sysu.edu.cn>

* ath10k: allow VHT on 2.4GHz

Signed-off-by: DENG Qingfang <dengqf6@mail2.sysu.edu.cn>

* hostapd: add vendor_vht option

hostapd has vendor_vht option to enable VHT (256-QAM) on 2.4GHz
Add this option to hostapd.sh so users can enable it via uci

Signed-off-by: DENG Qingfang <dengqf6@mail2.sysu.edu.cn>

* mac80211: ath.mk: typo fixes

Co-authored-by: DENG Qingfang <dengqf6@mail2.sysu.edu.cn>
2021-06-27 17:47:04 +08:00
Beginner
39fc6395fd
hostapd: add support for providing vendor specific IE elements (#7178)
They can be added as hex digit strings via the 'vendor_elements' option

Signed-off-by: Felix Fietkau <nbd@nbd.name>

Co-authored-by: Felix Fietkau <nbd@nbd.name>
2021-06-25 04:40:25 +00:00
dansir
6abd652604
hostapd: disassoc_low_ack disable by default (#7160)
https://openwrt.org/faq/disconnected_due_to_excessive_missing_acks
https://openwrt.org/faq/deauthenticated_due_to_inactivity
2021-06-24 05:26:23 +00:00
Beginner
6752f7970f
hostapd: add default_disabled option to the supplicant (#7165)
With the default configuration we generate, the supplicant starts
scanning and tries to connect to any open network when the interface
is enabled.

In some cases it can be desirable to prevent the supplicant from
scanning by itself. For example, if on the same radio an AP is
configured and an unconfigured STA is added (to be configured with
WPS), the AP might not be able to beacon until the STA stops
scanning.

In such a case, the STA configuration can still be required to set
specific settings (e.g. multi_ap_backhaul_sta) so it can't be set to
"disabled" in uci (because that would prevent the supplicant from
being run at all). The alternative is to add the "disabled" parameter
to the default network block in the supplicant configuration.

This patch adds a "default_disabled" setting in UCI which, when set,
adds the "disabled" parameter to the supplicant default network block.

Signed-off-by: Raphaël Mélotte <raphael.melotte@mind.be>

Co-authored-by: Raphaël Mélotte <raphael.melotte@mind.be>
2021-06-24 05:25:38 +00:00
coolsnowwolf
fb9568cbe3 kernel: bump 5.4 to 5.4.128 2021-06-24 10:49:50 +08:00
Beginner
3929e40fda
hostapd: make wnm_sleep_mode_no_keys configurable (#7150)
In the aftermath of the KRACK attacks, hostapd gained an AP-side workaround
against WNM-Sleep Mode GTK/IGTK reinstallation attacks. WNM Sleep Mode is not
enabled by default on OpenWrt, but it is configurable through the option
wnm_sleep_mode. Thus, make the AP-side workaround configurable as well by
exposing the option wnm_sleep_mode_no_keys. If you use the option
wpa_disable_eapol_key_retries and have wnm_sleep_mode enabled, you might
consider using this workaround.

Signed-off-by: Timo Sigurdsson <public_timo.s@silentcreek.de>

Co-authored-by: Timo Sigurdsson <public_timo.s@silentcreek.de>
2021-06-23 13:22:57 +08:00
Beginner
2c7a6b92b0
hostapd: sync upstream (#7135)
* hostapd: make country3 option configurable

The country3 option in hostapd.conf allows the third octet of the country
string to be set. It can be used e.g. to indicate indoor or outdoor use (see
hostapd.conf for further details). Make this option configurable but optional
in OpenWrt.

Signed-off-by: Timo Sigurdsson <public_timo.s@silentcreek.de>

* hostapd: fix handling of the channel utilization options

Commit 0a7657c ("hostapd: add channel utilization as config option") added the
two new uci options bss_load_update_period and chan_util_avg_period. However,
the corresponding "config_add_int" calls for these options weren't added, so
attempting to actually use these options and change their values is bound to
fail - they always stay at their defaults. Add the missing code to actually
make these options work.

Fixes: 0a7657c ("hostapd: add channel utilization as config option")
Signed-off-by: Timo Sigurdsson <public_timo.s@silentcreek.de>

Co-authored-by: Timo Sigurdsson <public_timo.s@silentcreek.de>
2021-06-22 11:07:36 +00:00
Michael Yartys
248dbdb904 hostapd: add support for setting sae_pwe
Make it possible to specify the SAE mechanism for PWE derivation. The
following values are possible:

0 = hunting-and-pecking loop only
1 = hash-to-element only
2 = both hunting-and-pecking loop and hash-to-element enabled

hostapd currently defaults to hunting-and-pecking loop only.

Signed-off-by: Michael Yartys <michael.yartys@protonmail.com>
2021-06-21 15:49:10 +08:00
Dobroslaw Kijowski
31d876d11a hostapd: stop advertising 11w feature
This is a follow up of 1a9b896d ("treewide: nuke DRIVER_11W_SUPPORT").
LuCI commit ab010406 ("luci-mod-network: skip check for 802.11w feature")
skips check of the 11w feature [1]. Now advertising it in hostapd is
superfluous so stop doing it.

[1]: https://github.com/openwrt/luci/pull/4689

Signed-off-by: Dobroslaw Kijowski <dobo90@gmail.com>
[remove outdated PKG_RELEASE bump and update to SPDX]
Signed-off-by: Paul Spooren <mail@aparcar.org>
2021-06-21 15:48:51 +08:00
dansir
89d2ce56df
dropbear: set listen interface to lan (#7100)
默认设置为“未指定”不安全
2021-06-20 05:29:18 +00:00
lean
1eed211889 dpdk: add x64 and armv8 64bit support 2021-06-19 23:16:19 +08:00
lean
260fbd3a46 dnsmasq: unselect DNSEC 2021-06-19 20:19:26 +08:00
lean
060621b5fe ipq40xx: replace flow to SFE offload 2021-06-16 13:15:45 +08:00
lean
27fdec85f9 iwinfo: add ralink support for K2P 2021-06-16 11:14:54 +08:00
hyy-666
d3df653136
fix dpdk errors (#7001) 2021-06-16 10:36:24 +08:00
lean
a3f1e837fd x64: fix grub2 booting 2021-06-15 17:58:07 +08:00
lean
bb239072f8 Add DPDK 21.05 support for Armv7 based platforms 2021-06-14 19:30:08 +08:00
lean
7a50383ab6 add kernel 5.10 support and sync with upstream 2021-06-14 18:30:08 +08:00
Beginner
5a56f1eeaa
curl: update to version 7.77.0 (security fix) (#6952)
Fixes:
CVE-2021-22897
CVE-2021-22898
CVE-2021-22901

Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>

Co-authored-by: Jan Pavlinec <jan.pavlinec@nic.cz>
2021-06-10 17:29:56 +08:00
Beginner
79b427589c
wireguard,wireguard-tools: update to 1.0.20210424 (#6864)
Co-authored-by: Tianling Shen <cnsztl@immortalwrt.org>
2021-05-21 18:57:54 +08:00
AmadeusGhost
d7a249a5c2
dnsmasq: Update to version 2.85 (#6795)
Fixes issue with merged DNS requests in 2.83/2.84 not being
retried on the firsts failed request causing lookup failures.

Also fixes the following security problem in dnsmasq:
* CVE-2021-3448:
  If specifiying the source address or interface to be used
  when contacting upstream name servers such as:
  server=8.8.8.8@1.2.3.4, server=8.8.8.8@1.2.3.4#66 and
  server=8.8.8.8@eth0 then all would use the same socket
  bound to the explicitly configured port. Now only
  server=8.8.8.8@1.2.3.4#66 will use the explicitly
  configured port and the others random source ports.

Remove upstreamed patches and update remaining patch.

Signed-off-by: Alan Swanson <reiver@improbability.net>
[refreshed old runtime support patch]
Signed-off-by: Kevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk>

Co-authored-by: Alan Swanson <reiver@improbability.net>
2021-05-05 23:24:23 +08:00
z826540272
d3d6f3a2c4
DNSMASQ ttl config (#6779)
默认情况下 SSR PLUS DNS结果根本无法缓存(由于引入拒绝ipv6结果导致的问题),nslookup & dig 延迟每次依然有200-300多.
dnsmasq处设置缓存依然无效,设置TTL也无效,应该是bug。
解决办法是手动指定缓存TTL为最大一小时。域名查询实测有效缓存0延迟。 

此变更仅使开启dnsmasq缓存的情况下正常工作。
2021-05-03 22:50:02 +08:00
lean
f3efbf91f4 curl: bump version 2021-04-24 23:38:25 +08:00
ricksuzade-maker
8188790996
Bump wireguard to the latest version (#6716) 2021-04-19 10:24:39 +08:00
ricksuzade-maker
55daeb886a
Bump wireguard-tool to the latest version (#6717) 2021-04-19 10:24:04 +08:00
wyapx
db581ad990
Remove expired source (#6575) 2021-03-21 23:00:23 +08:00
ricksuzade-maker
3da0060131
Bump wireguard to 1.0.20210124 (#6285) 2021-02-01 11:16:20 +08:00
pupie
96f26d716a
Add scramble option in options file. (#6287) 2021-01-31 14:49:19 +08:00
xiaobaishu1
7daf3edcec
Update Makefile (#6290)
切换到正式版本
2021-01-31 14:48:11 +08:00
AmadeusGhost
b95ffef87f
Revert "dnsmasq: force sync with official code" (#6266)
Fixes: 9170d18d0da78b7e70b9f45d0bf7771feee90a25 ("dnsmasq: Update to 2.84test3")
2021-01-27 17:12:30 +08:00
Beginner
9170d18d0d
dnsmasq: Update to 2.84test3 (#6259) 2021-01-26 18:38:30 +08:00
eSir
b927a69df8
Upgrade OpenVPN to 2.5.0 & Add xorpatch as a scramble option (#6249) 2021-01-25 16:33:40 +08:00
xiaobaishu1
e780247bf7
Update DNSMASQ (#6250) 2021-01-25 16:31:52 +08:00
AmadeusGhost
1c271cdd2c
dnsmasq: Update to version 2.83 (#6245)
This fixes the following security problems in dnsmasq:
* CVE-2020-25681:
  Dnsmasq versions before 2.83 is susceptible to a heap-based buffer
  overflow in sort_rrset() when DNSSEC is used. This can allow a remote
  attacker to write arbitrary data into target device's memory that can
  lead to memory corruption and other unexpected behaviors on the target
  device.
* CVE-2020-25682:
  Dnsmasq versions before 2.83 is susceptible to buffer overflow in
  extract_name() function due to missing length check, when DNSSEC is
  enabled. This can allow a remote attacker to cause memory corruption
  on the target device.
* CVE-2020-25683:
  Dnsmasq version before 2.83 is susceptible to a heap-based buffer
  overflow when DNSSEC is enabled. A remote attacker, who can create
  valid DNS replies, could use this flaw to cause an overflow in a heap-
  allocated memory. This flaw is caused by the lack of length checks in
  rtc1035.c:extract_name(), which could be abused to make the code
  execute memcpy() with a negative size in get_rdata() and cause a crash
  in Dnsmasq, resulting in a Denial of Service.
* CVE-2020-25684:
  A lack of proper address/port check implemented in Dnsmasq version <
  2.83 reply_query function makes forging replies easier to an off-path
  attacker.
* CVE-2020-25685:
  A lack of query resource name (RRNAME) checks implemented in Dnsmasq's
  versions before 2.83 reply_query function allows remote attackers to
  spoof DNS traffic that can lead to DNS cache poisoning.
* CVE-2020-25686:
  Multiple DNS query requests for the same resource name (RRNAME) by
  Dnsmasq versions before 2.83 allows for remote attackers to spoof DNS
  traffic, using a birthday attack (RFC 5452), that can lead to DNS
  cache poisoning.
* CVE-2020-25687:
  Dnsmasq versions before 2.83 is vulnerable to a heap-based buffer
  overflow with large memcpy in sort_rrset() when DNSSEC is enabled. A
  remote attacker, who can create valid DNS replies, could use this flaw
  to cause an overflow in a heap-allocated memory. This flaw is caused
  by the lack of length checks in rtc1035.c:extract_name(), which could
  be abused to make the code execute memcpy() with a negative size in
  sort_rrset() and cause a crash in dnsmasq, resulting in a Denial of
  Service.

Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>

Co-authored-by: Hauke Mehrtens <hauke@hauke-m.de>
2021-01-25 01:37:23 +08:00
AmadeusGhost
69f46989e2
mac80211: update to 5.8.18-1 (#6200)
ath10k-ct-firmware: update to 2020-11-08
ath10k-ct: update to 2020-12-24
mt76: update to 2020-12-18
wireless-regdb: update to version 2020.11.20
2021-01-18 13:06:03 +08:00
练亮斌
13ec6bcfd6
Using luci native support for MT7615(K2P),support muilti SSID (#5844)
* mt7615: try wext and cfg80211

* iwinfo: support ra frequency offset

* iwinfo: ra support assolist, support AC bandwidth, read device id from mtd

* mt7615: clean code

* k2p: wireless interface should not add to bridge, wifi system will handle this

* mt7615: adapt for modern luci

* mt7615: fix Makefile, conflicts with luci-app-mtwifi

* mt_wifi: conflicts with mt7615d

* iwinfo: fix ra probe, scan list

* iwinfo: fix ra scan list

* mt7615: speed up wifi reload

* mt7615: fix bug

* mt7615: fix isolate

* mt7615: clean code

* mt7615: fix CE without cfg80211

* mt7615: split dbdc variant

* mt7615: revert config for non dbdc variant devices

* mt7615: move maccalc dependency to dbdc variant

* mt7615: append author info

* mt7615: move config generation to uci-defaults
2020-12-07 12:55:18 +08:00
AmadeusGhost
0456744e39
mac80211: sync upstream source code (#5860)
[mac80211]
  08a42ef mac80211: fix memory leak on filtered powersave frames
  daeda8a mac80211: pass phy name to hostapd_set_bss_options
  7ca9b82 mac80211: Fix wpa_supplicant config removal ubus call
  bf3158b mac80211: backport the new tasklet API
  0bb5d39 mac80211: add minstrel fixes that fix mt76 issues in legacy mode

[ath10k]
  c3b2efa linux-firmware: ath10k: add board firmware packages
  655091e ath10k-ct-firmware: switch to linux-firmware board binaries
  61e381d ath10k-firmware: remove unused package
2020-12-02 12:24:26 +08:00
ricksuzade-maker
7565c236de
Bump wireguard-tools to 1.0.20200827 (#5787) 2020-11-15 09:11:09 +08:00
ricksuzade-maker
02eae7a969
Bump wireguard to 1.0.20201112 (#5786) 2020-11-15 09:10:56 +08:00
虾哥哥
78cff4a63a
set default interface to lan to avoid attacks (#5773)
to avoid attacks from WAN
2020-11-14 00:53:25 +08:00
AmadeusGhost
5d98c4178e
kernel: bump 5.4 to 5.4.75 (#5780)
[mac80211]
 5b29614 mac80211: another fix for the sta connection monitor
 1ed6eb1 mac80211: backport sched_set_fifo_low
 cba4120 mac80211: add support for specifying a per-device scan list
 e0d482f rt2x00: mt7620: differentiate based on SoC's CHIP_VER

[package]
 amd64-microcode/intel-microcode/linux-firmware: update version
2020-11-14 00:52:35 +08:00
AmadeusGhost
86bc29e4a8
kernel: bump 5.4 to 5.4.68 (#5555)
[mac80211]
 ca5ee6e mac80211: Fix potential endless loop
 2c14710 mac80211: add more AQL fixes/improvements
 91fb3ce mac80211: remove an obsolete patch that is no longer doing anything useful
 acf1733 mac80211: add preliminary support for enabling 802.11ax in config
 d717343 mac80211: update encap offload patches to the latest version
 673062f mac80211: allow bigger A-MSDU sizes in VHT, even if HT is limited
 caf7277 mac80211: do not allow bigger VHT MPDUs than the hardware supports
 cd36c0d mac80211: select the first available channel for 5GHz interfaces
 1c6d456 mac80211: fix regression in station connection monitor optimization
 4bd7689 mac80211: update sta connection monitor regression fix

[target]
 Sync: at91, ath25, ath79, lantiq, mediatek, mvebu.
2020-10-03 00:36:16 +08:00