Skip to content
  1. Feb 07, 2023
  2. Feb 06, 2023
  3. Feb 05, 2023
  4. Feb 04, 2023
    • Stan Grishin's avatar
      simple-adblock: update to 1.9.3-7 · 8c838461
      Stan Grishin authored
      
      
      * add boot() function which waits for network.interface to come up
      * switch oisd.nl hosts entry to domains
      * remove erroneous oisd substitution from config-update file
      
      Signed-off-by: default avatarStan Grishin <stangri@melmac.ca>
      8c838461
    • Alexandru Ardelean's avatar
      sudo: bump to version 1.9.12p2 · 18ce7875
      Alexandru Ardelean authored
      
      
      Signed-off-by: default avatarAlexandru Ardelean <alex@shruggie.ro>
      18ce7875
    • Alexandru Ardelean's avatar
      23b09de4
    • Alexandru Ardelean's avatar
      e8978245
    • Oskari Rauta's avatar
      tailscale: update to 1.36.0 · aabfc3f5
      Oskari Rauta authored
      
      
       - Update tailscale to version 1.36.0
       - Patch iptables support
      
      Tailscale does not (yet) support nftables.
      Tailscale allows running with --netfilter=off allowing
      end-user to create his own firewall rules, but this
      affects only tailscale cli, not tailscaled daemon, so
      connection cannot be made without error telling that
      tailscaled was unable to determine execute iptables
      for determining it's version.
      
      There is a work-around for those who do not want
      nft-iptables compatibility package; they can create
      a script to /usr/bin/iptables which responds to
      --version argument and echos fake version string
      and on any other arguments or no arguments, just exits.
      
      After this procedure and starting tailscale cli with
      netfilter off- it works. Openwrt has moved on to
      nftables, so iptables manipulation seems unnecessary.
      Especially for other reasons, on Openwrt, firewall
      should be configured on it's own, because firewall
      rules made by other software, such as tailscale,
      loose their firewalling rules when firewall restarts.
      
      So I patched it to allow "fake" iptables pointing
      to executable /bin/false and ignoring version
      request. And I also set cli to default to
      netfilter off setting.
      
      If still end-user wants to use iptables, this
      patch does not make it impossible; just install
      iptables, or nft-iptables, and run tailscale
      with argument --netfilter=on and it works out
      as it did before, tailscaled daemon still
      matches with iptables if it is found in $PATH.
      
      Signed-off-by: default avatarOskari Rauta <oskari.rauta@gmail.com>
      aabfc3f5
  5. Feb 03, 2023