RISCi_ATOM [Thu, 30 Aug 2018 13:03:03 +0000 (09:03 -0400)]
Bump kernel to 4.4.153 and fix generic/051-0005-ovl-proper-cleanup-of-workdir.patch
RISCi_ATOM [Sun, 26 Aug 2018 23:51:30 +0000 (19:51 -0400)]
Merge branch 'v1.5' into v1.4
RISCi_ATOM [Thu, 23 Aug 2018 10:43:13 +0000 (06:43 -0400)]
Bump libreCMC version #
RISCi_ATOM [Thu, 23 Aug 2018 09:32:40 +0000 (05:32 -0400)]
This commit adds support for the GL-AR750 (2.4G radio only)
While this router does have an 802.11ac chipset (QCA9887) which
requires non-free firmware (loadable firmware blobs), the main raido in the SoC
can still be used and does not require non-free firmware / blobs since it
is an ath9k chipset...
As it stands, it is not possible to use the 802.11ac radio due to lack of
drivers, the firmware loading mech. has been removed (linux-libre kernel)
and libreCMC does not include or pull needed firmware. The libreCMC project is
not endorsing the usage of the non-free chpset and the barriers are sufficient
that no one can use libreCMC with the non-free components.
TLDR; It is not possible to use the non-free chipset with libreCMC but the device
can still be used as a wireless router without non-free blobs.
Specification:
- 650/597/216 MHz (CPU/DDR/AHB)
- 128 MB of RAM (DDR2)
- 16 MB of FLASH (SPI NOR)
- 3x 10/100 Mbps Ethernet
- 2T2R 2.4 GHz (QCA9531)
- 1T1R 5 GHz (QCA9887)
- 1x USB 2.0 (power controlled by GPIO)
- 1x microSD (GL857L)
- 3x LED (all driven by GPIO)
- 1x button (reset)
- 1x 2-pos switch
- header for optional PoE module
- 1x micro USB for main power input
- UART + I2C header on PCB
Based upon upstream commit :
2e5252d346e2ec832a203af778b5c1d949f0ae5f
RISCi_ATOM [Mon, 20 Aug 2018 18:31:49 +0000 (14:31 -0400)]
Bump hostapd package revision
RISCi_ATOM [Mon, 20 Aug 2018 16:32:33 +0000 (12:32 -0400)]
wpa_supplicant: fix CVE-2018-14526
Unauthenticated EAPOL-Key decryption in wpa_supplicant
Published: August 8, 2018
Identifiers:
- CVE-2018-14526
Latest version available from: https://w1.fi/security/2018-1/
Vulnerability
A vulnerability was found in how wpa_supplicant processes EAPOL-Key
frames. It is possible for an attacker to modify the frame in a way that
makes wpa_supplicant decrypt the Key Data field without requiring a
valid MIC value in the frame, i.e., without the frame being
authenticated. This has a potential issue in the case where WPA2/RSN
style of EAPOL-Key construction is used with TKIP negotiated as the
pairwise cipher. It should be noted that WPA2 is not supposed to be used
with TKIP as the pairwise cipher. Instead, CCMP is expected to be used
and with that pairwise cipher, this vulnerability is not applicable in
practice.
When TKIP is negotiated as the pairwise cipher, the EAPOL-Key Key Data
field is encrypted using RC4. This vulnerability allows unauthenticated
EAPOL-Key frames to be processed and due to the RC4 design, this makes
it possible for an attacker to modify the plaintext version of the Key
Data field with bitwise XOR operations without knowing the contents.
This can be used to cause a denial of service attack by modifying
GTK/IGTK on the station (without the attacker learning any of the keys)
which would prevent the station from accepting received group-addressed
frames. Furthermore, this might be abused by making wpa_supplicant act
as a decryption oracle to try to recover some of the Key Data payload
(GTK/IGTK) to get knowledge of the group encryption keys.
Full recovery of the group encryption keys requires multiple attempts
(128 connection attempts per octet) and each attempt results in
disconnection due to a failure to complete the 4-way handshake. These
failures can result in the AP/network getting disabled temporarily or
even permanently (requiring user action to re-enable) which may make it
impractical to perform the attack to recover the keys before the AP has
already changes the group keys. By default, wpa_supplicant is enforcing
at minimum a ten second wait time between each failed connection
attempt, i.e., over 20 minutes waiting to recover each octet while
hostapd AP implementation uses 10 minute default for GTK rekeying when
using TKIP. With such timing behavior, practical attack would need large
number of impacted stations to be trying to connect to the same AP to be
able to recover sufficient information from the GTK to be able to
determine the key before it gets changed.
Vulnerable versions/configurations
All wpa_supplicant versions.
Acknowledgments
Thanks to Mathy Vanhoef of the imec-DistriNet research group of KU
Leuven for discovering and reporting this issue.
Possible mitigation steps
- Remove TKIP as an allowed pairwise cipher in RSN/WPA2 networks. This
can be done also on the AP side.
- Merge the following commits to wpa_supplicant and rebuild:
WPA: Ignore unauthenticated encrypted EAPOL-Key data
This patch is available from https://w1.fi/security/2018-1/
- Update to wpa_supplicant v2.7 or newer, once available
Pulled from upstream commit :
b3983323a1f25c936ddfcc129c454b282e90eeed
RISCi_ATOM [Mon, 20 Aug 2018 03:33:50 +0000 (23:33 -0400)]
update cjdns
RISCi_ATOM [Sun, 19 Aug 2018 20:31:13 +0000 (16:31 -0400)]
Bump kernel to 4.4.150
RISCi_ATOM [Thu, 16 Aug 2018 05:27:14 +0000 (01:27 -0400)]
openssl: update to version 1.0.2p
This fixes the following security problems:
* CVE-2018-0732: Client DoS due to large DH parameter
* CVE-2018-0737: Cache timing vulnerability in RSA Key Generation
Cherry pick'ed from upstream commit :
e11df1eac62f23263e90c54d87bc69a7021e72b7
RISCi_ATOM [Tue, 7 Aug 2018 16:51:30 +0000 (12:51 -0400)]
Bump kernel to 4.4.146
RISCi_ATOM [Mon, 6 Aug 2018 17:17:42 +0000 (13:17 -0400)]
wireguard: bump to 0.0.
20180802
Changelog taken from the version announcement
>
> == Changes ==
>
> * chacha20poly1305: selftest: split up test vector constants
>
> The test vectors are encoded as long strings -- really long strings -- and
> apparently RFC821 doesn't like lines longer than 998.
> https://cr.yp.to/smtp/message.html
>
> * queueing: keep reference to peer after setting atomic state bit
>
> This fixes a regression introduced when preparing the LKML submission.
>
> * allowedips: prevent double read in kref
> * allowedips: avoid window of disappeared peer
> * hashtables: document immediate zeroing semantics
> * peer: ensure resources are freed when creation fails
> * queueing: document double-adding and reference conditions
> * queueing: ensure strictly ordered loads and stores
> * cookie: returned keypair might disappear if rcu lock not held
> * noise: free peer references on failure
> * peer: ensure destruction doesn't race
>
> Various fixes, as well as lots of code comment documentation, for a
> small variety of the less obvious aspects of object lifecycles,
> focused on correctness.
>
> * allowedips: free root inside of RCU callback
> * allowedips: use different macro names so as to avoid confusion
>
> These incorporate two suggestions from LKML.
>
> This snapshot contains commits from: Jason A. Donenfeld and Jann Horn.
Taken from upstream commit :
68e2ebe64a0f27eb25c0e56ef1125ce1318e2279
RISCi_ATOM [Wed, 1 Aug 2018 19:39:41 +0000 (15:39 -0400)]
Bump kernel up to 4.4.145 and fix usb.ids hash
RISCi_ATOM [Wed, 25 Jul 2018 19:26:20 +0000 (15:26 -0400)]
RISCi_ATOM [Sun, 1 Jul 2018 03:51:10 +0000 (23:51 -0400)]
Update odhcpd to fix verbose logging bug
RISCi_ATOM [Fri, 29 Jun 2018 18:49:08 +0000 (14:49 -0400)]
Update OpenVPN, ustream-ssl, add wolfssl and remove cyassl
RISCi_ATOM [Thu, 28 Jun 2018 21:03:41 +0000 (17:03 -0400)]
Update rpcd
RISCi_ATOM [Thu, 28 Jun 2018 20:04:31 +0000 (16:04 -0400)]
Bump kernel to 4.4.138
RISCi_ATOM [Thu, 28 Jun 2018 18:06:04 +0000 (14:06 -0400)]
Update tor and add tinc to core
RISCi_ATOM [Thu, 28 Jun 2018 17:10:39 +0000 (13:10 -0400)]
Bump wireguard version to
20180625
RISCi_ATOM [Thu, 28 Jun 2018 17:08:04 +0000 (13:08 -0400)]
Pull in openssl from upstream master
RISCi_ATOM [Thu, 21 Jun 2018 15:15:02 +0000 (11:15 -0400)]
Update mbedtls hash
RISCi_ATOM [Wed, 13 Jun 2018 11:43:48 +0000 (07:43 -0400)]
Fix modules directory location, update usbutils (github vs project repo) and fix default wifi ssid
RISCi_ATOM [Sat, 9 Jun 2018 18:37:35 +0000 (14:37 -0400)]
Add luci
RISCi_ATOM [Sat, 9 Jun 2018 13:19:04 +0000 (09:19 -0400)]
v1.5 branch refresh based upon upstream master @
c8677ca89e53e3be7988d54280fce166cc894a7e
RISCi_ATOM [Fri, 8 Jun 2018 00:41:12 +0000 (20:41 -0400)]
(tmp) update usbutils usb.ids hash
RISCi_ATOM [Thu, 7 Jun 2018 23:43:22 +0000 (19:43 -0400)]
Switch to using git mirror controlled by the libreCMC project
RISCi_ATOM [Thu, 7 Jun 2018 23:18:40 +0000 (19:18 -0400)]
Remove @GITHUB from include/download.mk, fix up PROJECT_GIT and package/utils/usbutils
RISCi_ATOM [Thu, 7 Jun 2018 23:01:50 +0000 (19:01 -0400)]
Remove GitHub from download.pl and add libreCMC's GNU mirror
Note: Not all ref. have been removed from the project.
RISCi_ATOM [Tue, 5 Jun 2018 00:16:18 +0000 (20:16 -0400)]
Add Archer C7 V2 support (still needs replacement wifi card). Use at own riskgit status!
RISCi_ATOM [Sat, 2 Jun 2018 18:45:08 +0000 (14:45 -0400)]
Update mbedtls and ustream-ssl
- mbedtls was bumped to 2.9.0 to fix various security issues :
https://tls.mbed.org/tech-updates/releases/mbedtls-2.9.0-2.7.3-and-2.1.12-released
- upstream-ssl was bumped to reflect proposed changes in upstream lede-17.01 branch.
RISCI_ATOM [Thu, 31 May 2018 16:39:57 +0000 (12:39 -0400)]
Merge branch 'v1.4' of pi31415/libreCMC-cmh into v1.4
Christopher Howard [Thu, 31 May 2018 15:52:20 +0000 (07:52 -0800)]
shellinabox: alters zlib dependency type
Without this patch, shellinabox is invisible in menuconfig until
zlib is first selected, which likely is not what was intended.
RISCI_ATOM [Sun, 27 May 2018 03:08:26 +0000 (23:08 -0400)]
Merge branch 'doc1' of iank/libreCMC into v1.4
Ian Kelling [Sat, 26 May 2018 22:36:57 +0000 (18:36 -0400)]
fix releases link
RISCi_ATOM [Sat, 26 May 2018 07:46:14 +0000 (03:46 -0400)]
wireguard: bump to
20180519 from upstream lede-17.01
RISCi_ATOM [Sat, 26 May 2018 07:40:20 +0000 (03:40 -0400)]
Bump kernel to 4.4.132
RISCI_ATOM [Sat, 28 Apr 2018 18:17:53 +0000 (14:17 -0400)]
Merge branch 'v1.4' of systema/libreCMC into v1.4
systema [Fri, 27 Apr 2018 14:30:11 +0000 (10:30 -0400)]
Update 'docs/How_To_Build_libreCMC.md'
Add a note about building with multiple cores
RISCi_ATOM [Thu, 12 Apr 2018 18:51:21 +0000 (14:51 -0400)]
Merge branch 'v1.4' into v1.5
RISCI_ATOM [Tue, 10 Apr 2018 16:55:26 +0000 (12:55 -0400)]
Merge branch 'v1.4' of pi31415/libreCMC-cmh into v1.4
Christopher Howard [Tue, 10 Apr 2018 16:32:29 +0000 (08:32 -0800)]
Clarification in Bridge mode doc
Christopher Howard [Tue, 10 Apr 2018 16:20:17 +0000 (08:20 -0800)]
Advanced section in bridge mode doc
RISCI_ATOM [Mon, 9 Apr 2018 19:48:41 +0000 (15:48 -0400)]
Merge branch 'ar300m' of somenut/libreCMC into v1.4
hungrymonkey [Mon, 9 Apr 2018 19:34:51 +0000 (12:34 -0700)]
fix the company name and added nand update information
RISCi_ATOM [Mon, 2 Apr 2018 08:08:56 +0000 (04:08 -0400)]
Update src. package hash
RISCi_ATOM [Mon, 2 Apr 2018 07:13:47 +0000 (03:13 -0400)]
Revert procd to fix issue #50
RISCi_ATOM [Mon, 2 Apr 2018 05:45:22 +0000 (01:45 -0400)]
Bump OpenSSL to 1.0.2o
RISCi_ATOM [Sun, 1 Apr 2018 09:04:24 +0000 (05:04 -0400)]
Add flock to procd dep
RISCi_ATOM [Sun, 1 Apr 2018 06:10:32 +0000 (02:10 -0400)]
Revert opkg
RISCi_ATOM [Fri, 30 Mar 2018 18:00:32 +0000 (14:00 -0400)]
Bump mbedtls to 2.8.0 with upstream patch
Christopher Howard [Wed, 28 Mar 2018 23:28:47 +0000 (15:28 -0800)]
Adds Soft Brick Recovery doc
RISCI_ATOM [Thu, 29 Mar 2018 16:59:19 +0000 (12:59 -0400)]
Merge branch 'v1.5' of pi31415/libreCMC-cmh into v1.5
RISCi_ATOM [Thu, 29 Mar 2018 16:16:06 +0000 (12:16 -0400)]
Add Shell-in-a-box support to libreCMC
Christopher Howard [Wed, 28 Mar 2018 23:28:47 +0000 (15:28 -0800)]
Adds Soft Brick Recovery doc
RISCi_ATOM [Wed, 28 Mar 2018 20:25:13 +0000 (16:25 -0400)]
Bump OpenVPN to 4.4.5 (fix)
RISCi_ATOM [Wed, 28 Mar 2018 19:38:22 +0000 (15:38 -0400)]
Revert "Bump OpenVPN to 4.4.5"
This reverts commit
3a07a7db1c019cf1405117fd5787382b1317e0f5.
RISCi_ATOM [Wed, 28 Mar 2018 18:05:54 +0000 (14:05 -0400)]
Bump OpenVPN to 4.4.5
RISCi_ATOM [Tue, 20 Mar 2018 20:36:51 +0000 (16:36 -0400)]
Merge v1.4 into v1.5
RISCi_ATOM [Tue, 20 Mar 2018 19:45:16 +0000 (15:45 -0400)]
mbedtls: update to version 2.7.0
This fixes the following security problems:
* CVE-2018-0488: Risk of remote code execution when truncated HMAC is enabled
* CVE-2018-0487: Risk of remote code execution when verifying RSASSA-PSS signatures
This release is also ABI incompatible with the previous one, but it is
API compatible.
Some functions used by a lot of other software was renamed and the old
function names are provided as a static inline now, but they are only
active when deprecated functions are allowed, deactivate the removal of
deprecated functions for now.
Also increase the PKG_RELEASE version to force a rebuild and update of
packages depending on mbedtls to handle the changed ABI.
Picked from upstream commit :
f609913b5c60f7c65c462730993cd1c752083fd6
RISCi_ATOM [Fri, 16 Mar 2018 16:21:03 +0000 (12:21 -0400)]
Bump x86 config
RISCi_ATOM [Thu, 15 Mar 2018 21:25:08 +0000 (17:25 -0400)]
Remove 4.4.115 ref. and bump libreCMC version to v1.4.3
RISCi_ATOM [Thu, 15 Mar 2018 21:23:16 +0000 (17:23 -0400)]
Bump kernel to 4.4.120 and update e2fsprogs
RISCI_ATOM [Fri, 9 Mar 2018 19:09:42 +0000 (14:09 -0500)]
Change the ref to libreCMC wiki since all docs have been moved to /docs folder.
RISCi_ATOM [Fri, 9 Mar 2018 02:02:24 +0000 (21:02 -0500)]
Revert OpenVPN version bump (broken wait patch)...
This reverts commit
536c73f53360577cd7a6481ca8091198f120cb0e.
RISCi_ATOM [Thu, 8 Mar 2018 18:25:39 +0000 (13:25 -0500)]
Bump OpenVPN to 2.4.5 (testing)
RISCI_ATOM [Sat, 3 Mar 2018 18:29:44 +0000 (13:29 -0500)]
Merge branch 'v1.5' of pi31415/libreCMC-cmh into v1.5
Christopher Howard [Fri, 2 Mar 2018 23:14:27 +0000 (14:14 -0900)]
Fixes copy and paste typo in OpenVPN doc
RISCI_ATOM [Fri, 2 Mar 2018 17:36:56 +0000 (12:36 -0500)]
Merge branch 'v1.5' of pi31415/libreCMC-cmh into v1.5
Christopher Howard [Fri, 2 Mar 2018 17:14:03 +0000 (08:14 -0900)]
Further expansion and tweaking of Layer 2 OpenVPN doc
RISCI_ATOM [Thu, 1 Mar 2018 17:30:15 +0000 (12:30 -0500)]
Fix TL-WR1043ND link
RISCI_ATOM [Thu, 1 Mar 2018 17:29:29 +0000 (12:29 -0500)]
Merge branch 'v1.5' of pi31415/libreCMC-cmh into v1.5
Christopher Howard [Wed, 28 Feb 2018 17:29:32 +0000 (08:29 -0900)]
Adds L2 OpenVPN material about client files
Christopher Howard [Wed, 28 Feb 2018 17:11:23 +0000 (08:11 -0900)]
Adds back the renamed file
Christopher Howard [Wed, 28 Feb 2018 17:09:21 +0000 (08:09 -0900)]
Expansion of L2 VPN doc and renaming of doc file
Christopher Howard [Tue, 27 Feb 2018 17:10:29 +0000 (08:10 -0900)]
Adds server interface setup details
RISCI_ATOM [Tue, 27 Feb 2018 19:33:05 +0000 (14:33 -0500)]
Merge branch 'v1.5' of pi31415/libreCMC-cmh into v1.5
Christopher Howard [Tue, 27 Feb 2018 17:10:29 +0000 (08:10 -0900)]
Adds server interface setup details
RISCi_ATOM [Tue, 27 Feb 2018 05:17:30 +0000 (00:17 -0500)]
Merge branch 'v1.4' into v1.5
RISCI_ATOM [Fri, 23 Feb 2018 03:23:35 +0000 (22:23 -0500)]
Merge branch 'v1.4' of pi31415/libreCMC-cmh into v1.4
Christopher Howard [Thu, 22 Feb 2018 20:52:45 +0000 (11:52 -0900)]
Tweaks to server config of L2 VPN guide
RISCi_ATOM [Wed, 21 Feb 2018 21:21:52 +0000 (16:21 -0500)]
Pull in updated system / network components from upstream (stage 1)
RISCi_ATOM [Wed, 21 Feb 2018 20:22:56 +0000 (15:22 -0500)]
Pull nfs-server support into core
RISCi_ATOM [Fri, 16 Feb 2018 20:41:28 +0000 (15:41 -0500)]
Fix grammar issue
RISCi_ATOM [Fri, 16 Feb 2018 20:39:59 +0000 (15:39 -0500)]
Add libreCMC banner / shell prompt with a few corrections
RISCi_ATOM [Fri, 16 Feb 2018 20:26:17 +0000 (15:26 -0500)]
Fix typo : dialup vs dialout group
RISCi_ATOM [Fri, 16 Feb 2018 20:23:58 +0000 (15:23 -0500)]
Add basic serial console documentation (still needs work).
RISCi_ATOM [Fri, 16 Feb 2018 17:21:02 +0000 (12:21 -0500)]
Add experimental Tor support to base libreCMC
Pulled in libcap and tor from upstream master.
Christopher Howard [Mon, 12 Feb 2018 19:01:16 +0000 (10:01 -0900)]
Minor edits to System Log doc for consistency
Christopher Howard [Mon, 12 Feb 2018 18:58:27 +0000 (09:58 -0900)]
System Log doc: Changes prompt for MD readability
Christopher Howard [Mon, 12 Feb 2018 18:55:40 +0000 (09:55 -0900)]
Tests markup keywords
Christopher Howard [Mon, 12 Feb 2018 18:54:40 +0000 (09:54 -0900)]
Fixes type in System Log documentation
Christopher Howard [Mon, 12 Feb 2018 18:51:57 +0000 (09:51 -0900)]
Fixes broken image links in System Log documentation
Christopher Howard [Mon, 12 Feb 2018 18:48:10 +0000 (09:48 -0900)]
Adds System Log documentation
RISCI_ATOM [Mon, 12 Feb 2018 19:39:00 +0000 (14:39 -0500)]
Merge branch 'systemlog' of pi31415/libreCMC-cmh into v1.5
Christopher Howard [Mon, 12 Feb 2018 19:01:16 +0000 (10:01 -0900)]
Minor edits to System Log doc for consistency
Christopher Howard [Mon, 12 Feb 2018 18:58:27 +0000 (09:58 -0900)]
System Log doc: Changes prompt for MD readability
Christopher Howard [Mon, 12 Feb 2018 18:55:40 +0000 (09:55 -0900)]
Tests markup keywords
Christopher Howard [Mon, 12 Feb 2018 18:54:40 +0000 (09:54 -0900)]
Fixes type in System Log documentation
Christopher Howard [Mon, 12 Feb 2018 18:51:57 +0000 (09:51 -0900)]
Fixes broken image links in System Log documentation
Christopher Howard [Mon, 12 Feb 2018 18:48:10 +0000 (09:48 -0900)]
Adds System Log documentation