- Jul 14, 2022
-
-
Javier Marcet authored
This reverts commit 9cdc4a47.
-
Javier Marcet authored
This reverts commit 310d6c96.
-
Javier Marcet authored
This reverts commit 5cffe853.
-
Javier Marcet authored
This reverts commit e9617f55.
-
Javier Marcet authored
Signed-off-by: Javier Marcet <javier@marcet.info>
-
Seccomp variant enables usage of sandboxing inside tor Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
-
Javier Marcet authored
This reverts commit 0a23f1f0.
-
Javier Marcet authored
Signed-off-by: Javier Marcet <javier@marcet.info>
-
Javier Marcet authored
Signed-off-by: Javier Marcet <javier@marcet.info>
-
Javier Marcet authored
Signed-off-by: Javier Marcet <javier@marcet.info>
-
Javier Marcet authored
Signed-off-by: Javier Marcet <javier@marcet.info>
-
Javier Marcet authored
Signed-off-by: Javier Marcet <javier@marcet.info>
-
Javier Marcet authored
Signed-off-by: Javier Marcet <javier@marcet.info>
-
Javier Marcet authored
Signed-off-by: Javier Marcet <javier@marcet.info>
-
Javier Marcet authored
autostart this alleviates the race condition we have with 'netns cleanup_net' Signed-off-by: Javier Marcet <javier@marcet.info>
-
Javier Marcet authored
Signed-off-by: Javier Marcet <javier@marcet.info>
-
Javier Marcet authored
Signed-off-by: Javier Marcet <javier@marcet.info>
-
Javier Marcet authored
Signed-off-by: Javier Marcet <javier@marcet.info>
-
Javier Marcet authored
Signed-off-by: Javier Marcet <javier@marcet.info>
-
Javier Marcet authored
Signed-off-by: Javier Marcet <javier@marcet.info>
-
Javier Marcet authored
Signed-off-by: Javier Marcet <javier@marcet.info>
-
Javier Marcet authored
Signed-off-by: Javier Marcet <javier@marcet.info>
-
Javier Marcet authored
Signed-off-by: Javier Marcet <javier@marcet.info>
-
Toni Uhlig authored
Signed-off-by: Toni Uhlig <matzeton@googlemail.com>
-
Jonathan Pagel authored
Signed-off-by: Jonathan Pagel <jonny_tischbein@systemli.org>
-
- Jul 13, 2022
-
-
Ralf Kaiser authored
Global Socket allows two workstations on different private networks to communicate with each other. Through firewalls and through NAT - like there is no firewall. The TCP connection is secured with AES-256 and using OpenSSL's SRP protocol (RFC 5054). It does not require a PKI and has forward secrecy and (optional) TOR support. The gsocket tools derive temporary session keys and IDs and connect two TCP pipes through the Global Socket Relay Network (GSRN). This is done regardless and independent of the local IP Address or geographical location. The session keys (secrets) never leave the workstation. The GSRN sees only the encrypted traffic. The workhorse is 'gs-netcat' which opens a ssh-like interactive PTY command shell to a remote workstation (which resides on a private and remote network and/or behind a firewall). Also added test.sh file to run test it inside containeer Signed-off-by: Ralf Kaiser <skyper@thc.org>
-
Peter van Dijk authored
Signed-off-by: Peter van Dijk <peter.van.dijk@powerdns.com>
-
Peter van Dijk authored
Signed-off-by: Peter van Dijk <peter.van.dijk@powerdns.com>
-
Othmar Truniger authored
Signed-off-by: Othmar Truniger <github@truniger.ch>
-
Toni Uhlig authored
Signed-off-by: Toni Uhlig <matzeton@googlemail.com>
-
- Jul 12, 2022
-
-
Florian Eckert authored
apinger: improve uci and procd support
-
Jaymin Patel authored
- convert apinger into procd instances - generate instance specific apinger.conf from uci - hotplug handling for apinger alarms - restart apinger interface instance on ifup action of interface - don't exit on packet count mismatch, allows to use apinger as monitor for multiple targets handling - add srcip option to target configuration, allows specifying source ip used to monitor target - allow creating status file in script parseable format Patches are ported against latest version of apinger and referenced from https://git.pld-linux.org/?p=packages/apinger.git;a=summary Signed-off-by: Jaymin Patel <jem.patel@gmail.com>
-
- Jul 11, 2022
-
-
Daniel Golle authored
add support System Realtime and System Common This patch has also been submitted upstream: https://github.com/cchaussat/ttymidi-sysex/pull/2 Signed-off-by: Daniel Golle <daniel@makrotopia.org>
-
Volodymyr Nazarchuk authored
Signed-off-by: Volodymyr Nazarchuk <vavooon@gmail.com>
-
Josef Schlehofer authored
bind: update to version 9.18.4
-
Jonathan Pagel authored
Signed-off-by: Jonathan Pagel <jonny_tischbein@systemli.org>
-
Rosen Penev authored
Autoreconf is enough to fix. Signed-off-by: Rosen Penev <rosenp@gmail.com>
-
Rosen Penev authored
Not really needed. Signed-off-by: Rosen Penev <rosenp@gmail.com>
-
Rosen Penev authored
No need for an external one. Signed-off-by: Rosen Penev <rosenp@gmail.com>
-
- Jul 10, 2022
-
-
Hirokazu MORIKAWA authored
Update to v16.16.0 Release for the following issues: HTTP Request Smuggling - Flawed Parsing of Transfer-Encoding (Medium)(CVE-2022-32213) HTTP Request Smuggling - Improper Delimiting of Header Fields (Medium)(CVE-2022-32214) HTTP Request Smuggling - Incorrect Parsing of Multi-line Transfer-Encoding (Medium)(CVE-2022-32215) DNS rebinding in --inspect via invalid IP addresses (High)(CVE-2022-32212) https://nodejs.org/en/blog/vulnerability/july-2022-security-releases/ No vulnerabilities related with openssl (uses system openssl) Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
-