RISCi_ATOM [Thu, 18 Oct 2018 16:04:01 +0000 (12:04 -0400)]
Fix formatting in image list?
RISCi_ATOM [Thu, 18 Oct 2018 16:00:37 +0000 (12:00 -0400)]
Add link to current libreCMC images on popular / supported router pages
RISCi_ATOM [Thu, 18 Oct 2018 01:36:48 +0000 (21:36 -0400)]
Change wording to make it clear that Main images work on targets with 8M of flash
RISCi_ATOM [Thu, 18 Oct 2018 01:32:07 +0000 (21:32 -0400)]
Add missing word
RISCi_ATOM [Thu, 18 Oct 2018 01:28:04 +0000 (21:28 -0400)]
remove a word.
RISCi_ATOM [Thu, 18 Oct 2018 01:19:04 +0000 (21:19 -0400)]
Merge branch 'v1.4' of https://gogs.librecmc.org/librecmc/librecmc into v1.4
RISCi_ATOM [Thu, 18 Oct 2018 01:18:50 +0000 (21:18 -0400)]
Add image flavor description
RISCI_ATOM [Thu, 18 Oct 2018 01:11:56 +0000 (21:11 -0400)]
Fix issue link
RISCi_ATOM [Tue, 9 Oct 2018 05:36:27 +0000 (01:36 -0400)]
Bump Wireguard to 0.0.
20181006
RISCi_ATOM [Wed, 3 Oct 2018 19:57:18 +0000 (15:57 -0400)]
Update status of TL-WR1043N v5, still has not been tested!
RISCi_ATOM [Wed, 3 Oct 2018 01:59:51 +0000 (21:59 -0400)]
Fix TL-WR1043N v5 image generation
RISCi_ATOM [Mon, 1 Oct 2018 19:52:08 +0000 (15:52 -0400)]
Bump bzip2 and curl
RISCi_ATOM [Mon, 1 Oct 2018 19:32:47 +0000 (15:32 -0400)]
Bump mbedtls to 2.12.0
RISCi_ATOM [Mon, 1 Oct 2018 18:20:47 +0000 (14:20 -0400)]
Bump firewall version
RISCi_ATOM [Mon, 1 Oct 2018 15:40:58 +0000 (11:40 -0400)]
bump tor to 0.3.4.8
RISCi_ATOM [Mon, 1 Oct 2018 14:47:20 +0000 (10:47 -0400)]
Bump wireguard to 0.0.
20180925
RISCi_ATOM [Mon, 1 Oct 2018 13:58:55 +0000 (09:58 -0400)]
Bump kernel to 4.4.159
- Removed ar71xx/203-MIPS-ath79-fix-restart.patch : upstreamed
- Removed generic/051-000{1,2,5}-ovl-*.patch : Upstreamed, excluding is_merge rename
RISCi_ATOM [Sun, 30 Sep 2018 19:56:11 +0000 (15:56 -0400)]
Pull in updated {bison,m4,e2fsprogs,findutils} to fix build issues with newer glibc.
RISCi_ATOM [Sun, 30 Sep 2018 19:52:14 +0000 (15:52 -0400)]
TP-Link TL-WR1043N v5 appears to be identical to the TL-WR1043ND v4,
except that the USB port has been removed and there is no longer a
removable antenna option.
The software is more in line with the Archer series in that it uses a
nested bootloader scheme.
Specifications:
- QCA9563 at 775 MHz
- 64 MB RAM
- 16 MB flash
- 3 (non-detachable) Antennas / 450 Mbit
- 1x/4x WAN/LAN Gbps Ethernet (QCA8337)
- reset and Wi-Fi buttons
Based upon upstream commit :
673793d753717dc49e5a6f9b1bba52658cae63fc
Note: This commit has not been tested on actual hardware!!!
RISCi_ATOM [Thu, 6 Sep 2018 08:50:06 +0000 (04:50 -0400)]
Fix redundant TARGET_CFLAGS in hnsd Makefile
RISCi_ATOM [Thu, 6 Sep 2018 08:34:11 +0000 (04:34 -0400)]
Move libexpat, unbound into core and introduce hnsd
hnsd is the Handshake SPV name resolver daemon for the Handshake
network. see https://handshake.org and https://github.com/handshake-org/hnsd
Currently, hnsd needs some more work.
RISCi_ATOM [Thu, 6 Sep 2018 08:30:39 +0000 (04:30 -0400)]
Merge branch 'v1.4' of https://gogs.librecmc.org/librecmc/librecmc into v1.4
RISCi_ATOM [Thu, 6 Sep 2018 08:30:21 +0000 (04:30 -0400)]
update x86 kernel config to reflect last kernel bump
RISCi_ATOM [Wed, 5 Sep 2018 08:29:03 +0000 (04:29 -0400)]
wireguard: bump to 0.0.
20180904
* Kconfig: use new-style help marker
* global: run through clang-format
* uapi: reformat
* global: satisfy check_patch.pl errors
* global: prefer sizeof(*pointer) when possible
* global: always find OOM unlikely
Tons of style cleanups.
* crypto: use unaligned helpers
We now avoid unaligned accesses for generic users of the crypto API.
* crypto: import zinc
More style cleanups and a rearrangement of the crypto routines to fit how this
is going to work upstream. This required some fairly big changes to our build
system, so there may be some build errors we'll have to address in subsequent
snapshots.
* compat: rng_is_initialized made it into 4.19
We therefore don't need it in the compat layer anymore.
* curve25519-hacl64: use formally verified C for comparisons
The previous code had been proved in Z3, but this new code from upstream
KreMLin is directly generated from the F*, which is preferable. The
assembly generated is identical.
* curve25519-x86_64: let the compiler decide when/how to load constants
Small performance boost.
* curve25519-arm: reformat
* curve25519-arm: cleanups from lkml
* curve25519-arm: add spaces after commas
* curve25519-arm: use ordinary prolog and epilogue
* curve25519-arm: do not waste 32 bytes of stack
* curve25519-arm: prefix immediates with #
This incorporates ASM nits from upstream review.
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
Pulled from upstream commit :
4ccbe7de6cb20766fd309bc3824c7591e33b0b96
RISCi_ATOM [Tue, 4 Sep 2018 18:22:53 +0000 (14:22 -0400)]
Merge branch 'v1.4' of https://gogs.librecmc.org/librecmc/librecmc into v1.4
RISCi_ATOM [Tue, 4 Sep 2018 13:20:06 +0000 (09:20 -0400)]
Update dropbear
NYNEX [Tue, 4 Sep 2018 13:20:06 +0000 (09:20 -0400)]
Update dropbear
RISCi_ATOM [Thu, 30 Aug 2018 13:03:03 +0000 (09:03 -0400)]
Bump kernel to 4.4.153 and fix generic/051-0005-ovl-proper-cleanup-of-workdir.patch
RISCi_ATOM [Sun, 26 Aug 2018 23:51:30 +0000 (19:51 -0400)]
Merge branch 'v1.5' into v1.4
RISCi_ATOM [Thu, 23 Aug 2018 10:43:13 +0000 (06:43 -0400)]
Bump libreCMC version #
RISCi_ATOM [Thu, 23 Aug 2018 09:32:40 +0000 (05:32 -0400)]
This commit adds support for the GL-AR750 (2.4G radio only)
While this router does have an 802.11ac chipset (QCA9887) which
requires non-free firmware (loadable firmware blobs), the main raido in the SoC
can still be used and does not require non-free firmware / blobs since it
is an ath9k chipset...
As it stands, it is not possible to use the 802.11ac radio due to lack of
drivers, the firmware loading mech. has been removed (linux-libre kernel)
and libreCMC does not include or pull needed firmware. The libreCMC project is
not endorsing the usage of the non-free chpset and the barriers are sufficient
that no one can use libreCMC with the non-free components.
TLDR; It is not possible to use the non-free chipset with libreCMC but the device
can still be used as a wireless router without non-free blobs.
Specification:
- 650/597/216 MHz (CPU/DDR/AHB)
- 128 MB of RAM (DDR2)
- 16 MB of FLASH (SPI NOR)
- 3x 10/100 Mbps Ethernet
- 2T2R 2.4 GHz (QCA9531)
- 1T1R 5 GHz (QCA9887)
- 1x USB 2.0 (power controlled by GPIO)
- 1x microSD (GL857L)
- 3x LED (all driven by GPIO)
- 1x button (reset)
- 1x 2-pos switch
- header for optional PoE module
- 1x micro USB for main power input
- UART + I2C header on PCB
Based upon upstream commit :
2e5252d346e2ec832a203af778b5c1d949f0ae5f
RISCi_ATOM [Mon, 20 Aug 2018 18:31:49 +0000 (14:31 -0400)]
Bump hostapd package revision
RISCi_ATOM [Mon, 20 Aug 2018 16:32:33 +0000 (12:32 -0400)]
wpa_supplicant: fix CVE-2018-14526
Unauthenticated EAPOL-Key decryption in wpa_supplicant
Published: August 8, 2018
Identifiers:
- CVE-2018-14526
Latest version available from: https://w1.fi/security/2018-1/
Vulnerability
A vulnerability was found in how wpa_supplicant processes EAPOL-Key
frames. It is possible for an attacker to modify the frame in a way that
makes wpa_supplicant decrypt the Key Data field without requiring a
valid MIC value in the frame, i.e., without the frame being
authenticated. This has a potential issue in the case where WPA2/RSN
style of EAPOL-Key construction is used with TKIP negotiated as the
pairwise cipher. It should be noted that WPA2 is not supposed to be used
with TKIP as the pairwise cipher. Instead, CCMP is expected to be used
and with that pairwise cipher, this vulnerability is not applicable in
practice.
When TKIP is negotiated as the pairwise cipher, the EAPOL-Key Key Data
field is encrypted using RC4. This vulnerability allows unauthenticated
EAPOL-Key frames to be processed and due to the RC4 design, this makes
it possible for an attacker to modify the plaintext version of the Key
Data field with bitwise XOR operations without knowing the contents.
This can be used to cause a denial of service attack by modifying
GTK/IGTK on the station (without the attacker learning any of the keys)
which would prevent the station from accepting received group-addressed
frames. Furthermore, this might be abused by making wpa_supplicant act
as a decryption oracle to try to recover some of the Key Data payload
(GTK/IGTK) to get knowledge of the group encryption keys.
Full recovery of the group encryption keys requires multiple attempts
(128 connection attempts per octet) and each attempt results in
disconnection due to a failure to complete the 4-way handshake. These
failures can result in the AP/network getting disabled temporarily or
even permanently (requiring user action to re-enable) which may make it
impractical to perform the attack to recover the keys before the AP has
already changes the group keys. By default, wpa_supplicant is enforcing
at minimum a ten second wait time between each failed connection
attempt, i.e., over 20 minutes waiting to recover each octet while
hostapd AP implementation uses 10 minute default for GTK rekeying when
using TKIP. With such timing behavior, practical attack would need large
number of impacted stations to be trying to connect to the same AP to be
able to recover sufficient information from the GTK to be able to
determine the key before it gets changed.
Vulnerable versions/configurations
All wpa_supplicant versions.
Acknowledgments
Thanks to Mathy Vanhoef of the imec-DistriNet research group of KU
Leuven for discovering and reporting this issue.
Possible mitigation steps
- Remove TKIP as an allowed pairwise cipher in RSN/WPA2 networks. This
can be done also on the AP side.
- Merge the following commits to wpa_supplicant and rebuild:
WPA: Ignore unauthenticated encrypted EAPOL-Key data
This patch is available from https://w1.fi/security/2018-1/
- Update to wpa_supplicant v2.7 or newer, once available
Pulled from upstream commit :
b3983323a1f25c936ddfcc129c454b282e90eeed
RISCi_ATOM [Mon, 20 Aug 2018 03:33:50 +0000 (23:33 -0400)]
update cjdns
RISCi_ATOM [Sun, 19 Aug 2018 20:31:13 +0000 (16:31 -0400)]
Bump kernel to 4.4.150
RISCi_ATOM [Thu, 16 Aug 2018 05:27:14 +0000 (01:27 -0400)]
openssl: update to version 1.0.2p
This fixes the following security problems:
* CVE-2018-0732: Client DoS due to large DH parameter
* CVE-2018-0737: Cache timing vulnerability in RSA Key Generation
Cherry pick'ed from upstream commit :
e11df1eac62f23263e90c54d87bc69a7021e72b7
RISCi_ATOM [Tue, 7 Aug 2018 16:51:30 +0000 (12:51 -0400)]
Bump kernel to 4.4.146
RISCi_ATOM [Mon, 6 Aug 2018 17:17:42 +0000 (13:17 -0400)]
wireguard: bump to 0.0.
20180802
Changelog taken from the version announcement
>
> == Changes ==
>
> * chacha20poly1305: selftest: split up test vector constants
>
> The test vectors are encoded as long strings -- really long strings -- and
> apparently RFC821 doesn't like lines longer than 998.
> https://cr.yp.to/smtp/message.html
>
> * queueing: keep reference to peer after setting atomic state bit
>
> This fixes a regression introduced when preparing the LKML submission.
>
> * allowedips: prevent double read in kref
> * allowedips: avoid window of disappeared peer
> * hashtables: document immediate zeroing semantics
> * peer: ensure resources are freed when creation fails
> * queueing: document double-adding and reference conditions
> * queueing: ensure strictly ordered loads and stores
> * cookie: returned keypair might disappear if rcu lock not held
> * noise: free peer references on failure
> * peer: ensure destruction doesn't race
>
> Various fixes, as well as lots of code comment documentation, for a
> small variety of the less obvious aspects of object lifecycles,
> focused on correctness.
>
> * allowedips: free root inside of RCU callback
> * allowedips: use different macro names so as to avoid confusion
>
> These incorporate two suggestions from LKML.
>
> This snapshot contains commits from: Jason A. Donenfeld and Jann Horn.
Taken from upstream commit :
68e2ebe64a0f27eb25c0e56ef1125ce1318e2279
RISCi_ATOM [Wed, 1 Aug 2018 19:39:41 +0000 (15:39 -0400)]
Bump kernel up to 4.4.145 and fix usb.ids hash
RISCi_ATOM [Wed, 25 Jul 2018 19:26:20 +0000 (15:26 -0400)]
RISCi_ATOM [Sun, 1 Jul 2018 03:51:10 +0000 (23:51 -0400)]
Update odhcpd to fix verbose logging bug
RISCi_ATOM [Fri, 29 Jun 2018 18:49:08 +0000 (14:49 -0400)]
Update OpenVPN, ustream-ssl, add wolfssl and remove cyassl
RISCi_ATOM [Thu, 28 Jun 2018 21:03:41 +0000 (17:03 -0400)]
Update rpcd
RISCi_ATOM [Thu, 28 Jun 2018 20:04:31 +0000 (16:04 -0400)]
Bump kernel to 4.4.138
RISCi_ATOM [Thu, 28 Jun 2018 18:06:04 +0000 (14:06 -0400)]
Update tor and add tinc to core
RISCi_ATOM [Thu, 28 Jun 2018 17:10:39 +0000 (13:10 -0400)]
Bump wireguard version to
20180625
RISCi_ATOM [Thu, 28 Jun 2018 17:08:04 +0000 (13:08 -0400)]
Pull in openssl from upstream master
RISCi_ATOM [Thu, 21 Jun 2018 15:15:02 +0000 (11:15 -0400)]
Update mbedtls hash
RISCi_ATOM [Wed, 13 Jun 2018 11:43:48 +0000 (07:43 -0400)]
Fix modules directory location, update usbutils (github vs project repo) and fix default wifi ssid
RISCi_ATOM [Sat, 9 Jun 2018 18:37:35 +0000 (14:37 -0400)]
Add luci
RISCi_ATOM [Sat, 9 Jun 2018 13:19:04 +0000 (09:19 -0400)]
v1.5 branch refresh based upon upstream master @
c8677ca89e53e3be7988d54280fce166cc894a7e
RISCi_ATOM [Fri, 8 Jun 2018 00:41:12 +0000 (20:41 -0400)]
(tmp) update usbutils usb.ids hash
RISCi_ATOM [Thu, 7 Jun 2018 23:43:22 +0000 (19:43 -0400)]
Switch to using git mirror controlled by the libreCMC project
RISCi_ATOM [Thu, 7 Jun 2018 23:18:40 +0000 (19:18 -0400)]
Remove @GITHUB from include/download.mk, fix up PROJECT_GIT and package/utils/usbutils
RISCi_ATOM [Thu, 7 Jun 2018 23:01:50 +0000 (19:01 -0400)]
Remove GitHub from download.pl and add libreCMC's GNU mirror
Note: Not all ref. have been removed from the project.
RISCi_ATOM [Tue, 5 Jun 2018 00:16:18 +0000 (20:16 -0400)]
Add Archer C7 V2 support (still needs replacement wifi card). Use at own riskgit status!
RISCi_ATOM [Sat, 2 Jun 2018 18:45:08 +0000 (14:45 -0400)]
Update mbedtls and ustream-ssl
- mbedtls was bumped to 2.9.0 to fix various security issues :
https://tls.mbed.org/tech-updates/releases/mbedtls-2.9.0-2.7.3-and-2.1.12-released
- upstream-ssl was bumped to reflect proposed changes in upstream lede-17.01 branch.
RISCI_ATOM [Thu, 31 May 2018 16:39:57 +0000 (12:39 -0400)]
Merge branch 'v1.4' of pi31415/libreCMC-cmh into v1.4
Christopher Howard [Thu, 31 May 2018 15:52:20 +0000 (07:52 -0800)]
shellinabox: alters zlib dependency type
Without this patch, shellinabox is invisible in menuconfig until
zlib is first selected, which likely is not what was intended.
RISCI_ATOM [Sun, 27 May 2018 03:08:26 +0000 (23:08 -0400)]
Merge branch 'doc1' of iank/libreCMC into v1.4
Ian Kelling [Sat, 26 May 2018 22:36:57 +0000 (18:36 -0400)]
fix releases link
RISCi_ATOM [Sat, 26 May 2018 07:46:14 +0000 (03:46 -0400)]
wireguard: bump to
20180519 from upstream lede-17.01
RISCi_ATOM [Sat, 26 May 2018 07:40:20 +0000 (03:40 -0400)]
Bump kernel to 4.4.132
RISCI_ATOM [Sat, 28 Apr 2018 18:17:53 +0000 (14:17 -0400)]
Merge branch 'v1.4' of systema/libreCMC into v1.4
systema [Fri, 27 Apr 2018 14:30:11 +0000 (10:30 -0400)]
Update 'docs/How_To_Build_libreCMC.md'
Add a note about building with multiple cores
RISCi_ATOM [Thu, 12 Apr 2018 18:51:21 +0000 (14:51 -0400)]
Merge branch 'v1.4' into v1.5
RISCI_ATOM [Tue, 10 Apr 2018 16:55:26 +0000 (12:55 -0400)]
Merge branch 'v1.4' of pi31415/libreCMC-cmh into v1.4
Christopher Howard [Tue, 10 Apr 2018 16:32:29 +0000 (08:32 -0800)]
Clarification in Bridge mode doc
Christopher Howard [Tue, 10 Apr 2018 16:20:17 +0000 (08:20 -0800)]
Advanced section in bridge mode doc
RISCI_ATOM [Mon, 9 Apr 2018 19:48:41 +0000 (15:48 -0400)]
Merge branch 'ar300m' of somenut/libreCMC into v1.4
hungrymonkey [Mon, 9 Apr 2018 19:34:51 +0000 (12:34 -0700)]
fix the company name and added nand update information
RISCi_ATOM [Mon, 2 Apr 2018 08:08:56 +0000 (04:08 -0400)]
Update src. package hash
RISCi_ATOM [Mon, 2 Apr 2018 07:13:47 +0000 (03:13 -0400)]
Revert procd to fix issue #50
RISCi_ATOM [Mon, 2 Apr 2018 05:45:22 +0000 (01:45 -0400)]
Bump OpenSSL to 1.0.2o
RISCi_ATOM [Sun, 1 Apr 2018 09:04:24 +0000 (05:04 -0400)]
Add flock to procd dep
RISCi_ATOM [Sun, 1 Apr 2018 06:10:32 +0000 (02:10 -0400)]
Revert opkg
RISCi_ATOM [Fri, 30 Mar 2018 18:00:32 +0000 (14:00 -0400)]
Bump mbedtls to 2.8.0 with upstream patch
Christopher Howard [Wed, 28 Mar 2018 23:28:47 +0000 (15:28 -0800)]
Adds Soft Brick Recovery doc
RISCI_ATOM [Thu, 29 Mar 2018 16:59:19 +0000 (12:59 -0400)]
Merge branch 'v1.5' of pi31415/libreCMC-cmh into v1.5
RISCi_ATOM [Thu, 29 Mar 2018 16:16:06 +0000 (12:16 -0400)]
Add Shell-in-a-box support to libreCMC
Christopher Howard [Wed, 28 Mar 2018 23:28:47 +0000 (15:28 -0800)]
Adds Soft Brick Recovery doc
RISCi_ATOM [Wed, 28 Mar 2018 20:25:13 +0000 (16:25 -0400)]
Bump OpenVPN to 4.4.5 (fix)
RISCi_ATOM [Wed, 28 Mar 2018 19:38:22 +0000 (15:38 -0400)]
Revert "Bump OpenVPN to 4.4.5"
This reverts commit
3a07a7db1c019cf1405117fd5787382b1317e0f5.
RISCi_ATOM [Wed, 28 Mar 2018 18:05:54 +0000 (14:05 -0400)]
Bump OpenVPN to 4.4.5
RISCi_ATOM [Tue, 20 Mar 2018 20:36:51 +0000 (16:36 -0400)]
Merge v1.4 into v1.5
RISCi_ATOM [Tue, 20 Mar 2018 19:45:16 +0000 (15:45 -0400)]
mbedtls: update to version 2.7.0
This fixes the following security problems:
* CVE-2018-0488: Risk of remote code execution when truncated HMAC is enabled
* CVE-2018-0487: Risk of remote code execution when verifying RSASSA-PSS signatures
This release is also ABI incompatible with the previous one, but it is
API compatible.
Some functions used by a lot of other software was renamed and the old
function names are provided as a static inline now, but they are only
active when deprecated functions are allowed, deactivate the removal of
deprecated functions for now.
Also increase the PKG_RELEASE version to force a rebuild and update of
packages depending on mbedtls to handle the changed ABI.
Picked from upstream commit :
f609913b5c60f7c65c462730993cd1c752083fd6
RISCi_ATOM [Fri, 16 Mar 2018 16:21:03 +0000 (12:21 -0400)]
Bump x86 config
RISCi_ATOM [Thu, 15 Mar 2018 21:25:08 +0000 (17:25 -0400)]
Remove 4.4.115 ref. and bump libreCMC version to v1.4.3
RISCi_ATOM [Thu, 15 Mar 2018 21:23:16 +0000 (17:23 -0400)]
Bump kernel to 4.4.120 and update e2fsprogs
RISCI_ATOM [Fri, 9 Mar 2018 19:09:42 +0000 (14:09 -0500)]
Change the ref to libreCMC wiki since all docs have been moved to /docs folder.
RISCi_ATOM [Fri, 9 Mar 2018 02:02:24 +0000 (21:02 -0500)]
Revert OpenVPN version bump (broken wait patch)...
This reverts commit
536c73f53360577cd7a6481ca8091198f120cb0e.
RISCi_ATOM [Thu, 8 Mar 2018 18:25:39 +0000 (13:25 -0500)]
Bump OpenVPN to 2.4.5 (testing)
RISCI_ATOM [Sat, 3 Mar 2018 18:29:44 +0000 (13:29 -0500)]
Merge branch 'v1.5' of pi31415/libreCMC-cmh into v1.5
Christopher Howard [Fri, 2 Mar 2018 23:14:27 +0000 (14:14 -0900)]
Fixes copy and paste typo in OpenVPN doc
RISCI_ATOM [Fri, 2 Mar 2018 17:36:56 +0000 (12:36 -0500)]
Merge branch 'v1.5' of pi31415/libreCMC-cmh into v1.5
Christopher Howard [Fri, 2 Mar 2018 17:14:03 +0000 (08:14 -0900)]
Further expansion and tweaking of Layer 2 OpenVPN doc
RISCI_ATOM [Thu, 1 Mar 2018 17:30:15 +0000 (12:30 -0500)]
Fix TL-WR1043ND link
RISCI_ATOM [Thu, 1 Mar 2018 17:29:29 +0000 (12:29 -0500)]
Merge branch 'v1.5' of pi31415/libreCMC-cmh into v1.5
Christopher Howard [Wed, 28 Feb 2018 17:29:32 +0000 (08:29 -0900)]
Adds L2 OpenVPN material about client files
Christopher Howard [Wed, 28 Feb 2018 17:11:23 +0000 (08:11 -0900)]
Adds back the renamed file