- May 29, 2022
-
-
Javier Marcet authored
This reverts commit 9cdc4a47.
-
Javier Marcet authored
This reverts commit 310d6c96.
-
Javier Marcet authored
This reverts commit 5cffe853.
-
Javier Marcet authored
This reverts commit e9617f55.
-
Javier Marcet authored
Signed-off-by: Javier Marcet <javier@marcet.info>
-
Seccomp variant enables usage of sandboxing inside tor Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
-
Javier Marcet authored
This reverts commit 0a23f1f0.
-
Javier Marcet authored
Signed-off-by: Javier Marcet <javier@marcet.info>
-
Javier Marcet authored
Signed-off-by: Javier Marcet <javier@marcet.info>
-
Javier Marcet authored
Signed-off-by: Javier Marcet <javier@marcet.info>
-
Javier Marcet authored
Signed-off-by: Javier Marcet <javier@marcet.info>
-
Javier Marcet authored
Signed-off-by: Javier Marcet <javier@marcet.info>
-
Javier Marcet authored
Signed-off-by: Javier Marcet <javier@marcet.info>
-
Javier Marcet authored
Signed-off-by: Javier Marcet <javier@marcet.info>
-
Javier Marcet authored
autostart this alleviates the race condition we have with 'netns cleanup_net' Signed-off-by: Javier Marcet <javier@marcet.info>
-
Javier Marcet authored
Signed-off-by: Javier Marcet <javier@marcet.info>
-
Javier Marcet authored
Signed-off-by: Javier Marcet <javier@marcet.info>
-
Javier Marcet authored
Signed-off-by: Javier Marcet <javier@marcet.info>
-
Javier Marcet authored
Signed-off-by: Javier Marcet <javier@marcet.info>
-
Javier Marcet authored
Signed-off-by: Javier Marcet <javier@marcet.info>
-
Javier Marcet authored
Signed-off-by: Javier Marcet <javier@marcet.info>
-
Javier Marcet authored
Signed-off-by: Javier Marcet <javier@marcet.info>
-
Javier Marcet authored
Signed-off-by: Javier Marcet <javier@marcet.info>
-
R4SAS I2P authored
* Update to 2.42.1 * Replace spaces with tabulation in init file Signed-off-by: R4SAS I2P <r4sas@i2pmail.org>
-
Etienne Champetier authored
CircleCI: Add 22.03 public keys, 18.06 v2 gpg key, 18.06 usign key
-
- May 27, 2022
-
-
Dirk Brenken authored
banIP 0.7.x is not compatible with new nft firewall (default in master and 22.03). Mark the package as BROKEN for now. Signed-off-by: Dirk Brenken <dev@brenken.org>
-
Maciej Krüger authored
Signed-off-by: Maciej Krüger <mkg20001@gmail.com>
-
- May 26, 2022
-
-
W. Michael Petullo authored
Signed-off-by: W. Michael Petullo <mike@flyn.org>
-
Aleksandr V. Piskunov authored
Force restart stubby if any of the trigger interfaces goes up or down. Avoids DoT DNS lookup timeouts when default route changes, in case of multiple upstream interfaces. Signed-off-by: Aleksandr V. Piskunov <aleksandr.v.piskunov@gmail.com>
-
Rosen Penev authored
Updates hfsprogs from 2011 to 2013 version. Updated patches to latest Debian ones. Kept custom OpenWrt ones. Signed-off-by: Rosen Penev <rosenp@gmail.com>
-
Andreas Erhard authored
The new version of vpnc supports additional DH groups for improved key exchange security. Signed-off-by: Andreas Erhard <andreas.erhard@i-med.ac.at>
-
Christian Lachner authored
- Update haproxy download URL and hash Signed-off-by: Christian Lachner <gladiac@gmail.com>
-
Javier Marcet authored
What's Changed: - Extend dynamicRef keyword by @nezhar - Add FORMAT_CHECKER attribute for Validator by @TiborVoelcker - Remove stray double-quote by @lurch - Ensure proper sorting of list in error message by @ssbarnea Signed-off-by: Javier Marcet <javier@marcet.info>
-
Javier Marcet authored
2.11.0: - [Feature] Add SSH config token expansion (eg %h, %p) when parsing ProxyJump directives. Patch courtesy of Bruno Inec. - [Support] (via #2011) Apply unittest skipIf to tests currently using SHA1 in their critical path, to avoid failures on systems starting to disable SHA1 outright in their crypto backends (eg RHEL 9). Report & patch via Paul Howarth. - [Support] Update camelCase method calls against the threading module to be snake_case; this and related tweaks should fix some deprecation warnings under Python 3.10. Thanks to Karthikeyan Singaravelan for the report, @Narendra-Neerukonda for the patch, and to Thomas Grainger and Jun Omae for patch workshopping. - [Support] Recent versions of Cryptography have deprecated Blowfish algorithm support; in lieu of an easy method for users to remove it from the list of algorithms Paramiko tries to import and use, we’ve decided to remove it from our “preferred algorithms” list. This will both discourage use of a weak algorithm, and avoid warnings. Credit for report/patch goes to Mike Roest. 2.10.5: - [Bug] Windows-native SSH agent support as merged in 2.10 could encounter Errno 22 OSError exceptions in some scenarios (eg server not cleanly closing a relevant named pipe). This has been worked around and should be less problematic. Reported by Danilo Campana Fuchs and patched by Jun Omae. - [Bug] OpenSSH 7.7 and older has a bug preventing it from understanding how to perform SHA2 signature verification for RSA certificates (specifically certs - not keys), so when we added SHA2 support it broke all clients using RSA certificates with these servers. This has been fixed in a manner similar to what OpenSSH’s own client does: a version check is performed and the algorithm used is downgraded if needed. Reported by Adarsh Chauhan, with fix suggested by Jun Omae. - [Bug] Align signature verification algorithm with OpenSSH re: zero-padding signatures which don’t match their nominal size/length. This shouldn’t affect most users, but will help Paramiko-implemented SSH servers handle poorly behaved clients such as PuTTY. Thanks to Jun Omae for catch & patch. Signed-off-by: Javier Marcet <javier@marcet.info>
-
Javier Marcet authored
What's Changed: - Fix relative paths on envfile label by @ulyssessouza - down: Reject all arguments by @Jille - Clarify what default work dir is when multiple compose files by @quite - compose down exit=0 if nothing to remove by @ndeloof - cp command: copy to all containers of a service as default behaviour by @glours - Fix extra space printed with --no-log-prefix option by @jan4843 - bump compose-go to 1.2.5 by @ndeloof New Contributors: - @Jille made their first contribution - @quite made their first contribution - @jan4843 made their first contribution Signed-off-by: Javier Marcet <javier@marcet.info>
-
Tianling Shen authored
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
-
Tianling Shen authored
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
-
- May 24, 2022
-
-
Nikos Mavrogiannopoulos authored
openconnect: three misc fixes
-
Rui Salvaterra authored
Otherwise, OpenConnect will fail to connect with DTLS. Signed-off-by: Rui Salvaterra <rsalvaterra@gmail.com>
-
Rui Salvaterra authored
If it exists (if it isn't built-in), it will be loaded automatically at boot. Signed-off-by: Rui Salvaterra <rsalvaterra@gmail.com>
-