Hello Michael,
that is interesting, though I guess since these are mainly our default
it shouldn't be too hard for someone manufacturing to change the config
and readd a simple init-script for telnetd if that is really required.
Lack of entropy doesn't seem to be too much of an issue here, in
Signed-off-by: Sven Eckelmann
---
v2:
- rebased on top of r46832
target/linux/ar71xx/config-4.1 | 1 +
.../ar71xx/files/arch/mips/ath79/mach-mr1750.c | 129 +
.../815-MIPS-ath79-add-mr1750-support.patch| 39 +++
3
Signed-off-by: Sven Eckelmann
---
v2:
- rebased on top of r46832
target/linux/ar71xx/base-files/etc/diag.sh | 3 +++
target/linux/ar71xx/base-files/etc/uci-defaults/01_leds| 6 ++
target/linux/ar71xx/base-files/etc/uci-defaults/02_network | 1 +
Hello Matti,
thanks, I very much support this patch.
One little thing:
proto_add_ipv6_route "::0" 0 "$gateway_6"
should be
proto_add_ipv6_route "::0" 0 "$gateway_6" "" "" "${ip_6}/${ip_prefix_length}"
otherwise this might break IPv6 connectivity in the presence of other
IPv6 connections. In
Steven Barth wrote at Wed Sep 9 08:10:18 CEST 2015:
> Lack of entropy doesn't seem to be too much of an issue here, in fact in
failsafe mode we generate a 1024 bit RSA-key on demand which takes <2s on my
old Buffalo here. Granted its only 1024-bit but still. Now the regular keys
are 2048-bit
Signed-off-by: Sven Eckelmann
---
v2:
- rebased on top of r46832
package/boot/uboot-envtools/files/ar71xx | 1 +
1 file changed, 1 insertion(+)
diff --git a/package/boot/uboot-envtools/files/ar71xx
b/package/boot/uboot-envtools/files/ar71xx
index 8fb559e..0c81f328 100644
Signed-off-by: Dmitri Bachtin
---
CMakeLists.txt |4 ++--
1 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/CMakeLists.txt b/CMakeLists.txt
index 65819c3..ecb1508 100644
--- a/CMakeLists.txt
+++ b/CMakeLists.txt
@@ -9,7 +9,7 @@ OPTION(BUILD_LUA "build Lua
Signed-off-by: Dmitri Bachtin
---
base64.c |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/base64.c b/base64.c
index b6f8bf3..4186ce8 100644
--- a/base64.c
+++ b/base64.c
@@ -140,7 +140,7 @@ int b64_encode(const void *_src, size_t srclength,
libjson's json_object_from_file takes a non-const char buffer as
its second parameter while libjson-c takes a const one. Use
strdup() to avoid using const data as non-const.
Signed-off-by: Dmitri Bachtin
---
blobmsg_json.c |5 -
1 files changed, 4 insertions(+), 1
Signed-off-by: Sven Eckelmann
---
v2:
- rebased on top of r46832
scripts/om-fwupgradecfg-gen.sh | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/scripts/om-fwupgradecfg-gen.sh b/scripts/om-fwupgradecfg-gen.sh
index d385e5e..fab1582 100644
---
Signed-off-by: Dmitri Bachtin
---
CMakeLists.txt |7 ++-
1 files changed, 6 insertions(+), 1 deletions(-)
diff --git a/CMakeLists.txt b/CMakeLists.txt
index ecca3e9..65819c3 100644
--- a/CMakeLists.txt
+++ b/CMakeLists.txt
@@ -47,13 +47,18 @@ IF(EXISTS ${json})
On 2015-09-09 09:23, Bachtin, Dmitri wrote:
> Signed-off-by: Dmitri Bachtin
Which libjson is this? The old version of json-c?
- Felix
___
openwrt-devel mailing list
openwrt-devel@lists.openwrt.org
Signed-off-by: Sven Eckelmann
---
v2:
- rebased on top of r46832
target/linux/ar71xx/generic/profiles/openmesh.mk | 13 -
target/linux/ar71xx/image/Makefile | 3 ++-
2 files changed, 14 insertions(+), 2 deletions(-)
diff --git
Signed-off-by: Dmitri Bachtin
---
CMakeLists.txt | 16 ++--
1 files changed, 14 insertions(+), 2 deletions(-)
diff --git a/CMakeLists.txt b/CMakeLists.txt
index 3f67652..4a11544 100644
--- a/CMakeLists.txt
+++ b/CMakeLists.txt
@@ -1,14 +1,26 @@
On 2015-09-09 09:23, Bachtin, Dmitri wrote:
> libjson's json_object_from_file takes a non-const char buffer as
> its second parameter while libjson-c takes a const one. Use
> strdup() to avoid using const data as non-const.
>
> Signed-off-by: Dmitri Bachtin
> ---
>
Signed-off-by: Sven Eckelmann
---
v2:
- rebased on top of r46832
package/kernel/om-watchdog/files/om-watchdog.init | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/package/kernel/om-watchdog/files/om-watchdog.init
This is a git patch for the firewall3 git repo at git://nbd.name/firewall3.git
Basically it prevents zone_wan_prerouting rules to affect traffic
towards IP addresses that are not used for masquerading LAN private IP
space and it does that by setting destination IP address of the
On 09/09/2015 09:35, Bachtin, Dmitri wrote:
> Signed-off-by: Dmitri Bachtin
Hi,
it is always nice if a patch has a short description that goes beyond
the subject. in this case it would be nice if you could explain why you
need to build a static version of uqmi
John
> Why?
A libblobmsg_json.a would follow the same rule as with libubox.a already
present in the CMakeLists.txt and allows consistent -dev packages I'd like to
maintain for Debian in the future.
The reason is that Debian's Squeeze (oldstable) is still supported until Feb
2016. While it isn't a
commit r30917 ("kernel: bypass all netfilter hooks if the sysctls for that
functionality have been disabled - eliminates the overhead of enabling
CONFIG_BRIDGE_NETFILTER in the kernel config") introduced an optimization
which should reduce/eliminate the overhead for traffic send over bridges on
> This patch probably require further checks. Please take a look at commit
> cbf80de7f4df61960f386cb01a899cf4228d38f3 for more information.
> - Felix
I see. That makes sense.
Please ignore then the patches 3 + 4 and the uqmi patch in the next thread. I
think that they are better suited for
Hi,
We are working on AR9344 OpenWrt,
We have configured the wireless as AP mode and broadcasting the SSID so any
device can connect to it and even we are able access the GUI on Smartphone
after connecting to that AP.
Then we do survey the scanning devices, its gives the Scanning result, then
> I think the non-const parameter of json_object_from_file is a bug, and in
> that case, a cast is better than a completely unnecessary strdup().
>
> - Felix
I've checked the source of json_object_from_file(char*) and the buffer walks
directly into open(3) and vsyslog(3). open(3) takes a const
On 2015-09-09 13:01, John kerry wrote:
> Hi,
>
> We are working on AR9344 OpenWrt,
>
> We have configured the wireless as AP mode and broadcasting the SSID so
> any device can connect to it and even we are able access the GUI on
> Smartphone after connecting to that AP.
>
> Then we do survey
Fixes regression issues introduced by commit 3224b80 as external (PPP)
device ifindex was not in sync with kernel device ifindex due to re-creation
of the device by the PPP daemon
Signed-off-by: Hans Dedecker
---
device.c | 13 +
1 file changed, 9 insertions(+),
Specific IP address and network rules are now checked before the main table
lookup as the main table
often holds a default route. As a result the IP address and network rules
pointing to s specific
routing table will not be checked anymore; by reversing the order the specific
routing tables
are
Remove ip loop policy rules as workaround for the kernel using unspecified
address
to lookup locally originating traffic is fixed by
http://lkml.iu.edu/hypermail/linux/kernel/1505.0/03094.html
Signed-off-by: Hans Dedecker
---
interface-ip.c | 23 +--
1
2015-09-09 15:20 GMT+02:00 Hannu Nyman :
> I repeat my earlier wish that trunk should be renamed as soon as possible.
>
> There has been several changes during the summer that have made trunk to
> significantly deviate from the CC branch. Some of the changes are under the
>
I repeat my earlier wish that trunk should be renamed as soon as possible.
There has been several changes during the summer that have made trunk to
significantly deviate from the CC branch. Some of the changes are under the
hood (like musl vs. uClibc), but especially the recent telnet removal
Prevents the creation of identical address and network IP rules
Signed-off-by: Hans Dedecker
---
interface-ip.c | 12
1 file changed, 8 insertions(+), 4 deletions(-)
diff --git a/interface-ip.c b/interface-ip.c
index 43b63c7..d5f6aff 100644
--- a/interface-ip.c
Routes are now inserted in the correct routing table when interface ip4table
and/or
ip6table was changed during interface_change_config
Signed-off-by: Hans Dedecker
---
interface-ip.c | 9 +
1 file changed, 9 insertions(+)
diff --git a/interface-ip.c
Signed-off-by: Hans Dedecker
---
interface-ip.c | 23 +--
1 file changed, 13 insertions(+), 10 deletions(-)
diff --git a/interface-ip.c b/interface-ip.c
index 6c152b6..43b63c7 100644
--- a/interface-ip.c
+++ b/interface-ip.c
@@ -500,9 +500,7 @@
We ran into this issue recently, where the switch to musl subtly changed the regexp
behavior of grep, and where it took a while to realize that the reporter was on musl while all
other testing machines where not. Having had a "DD rNN” version string somewhere
early in the report
Signed-off-by: Weijie Gao
This patch adds support for TP-LINK TL-WDR3320 v2.
This router uses a chinese version 2 firmware header,.
---
target/linux/ar71xx/base-files/etc/diag.sh | 1 +
.../ar71xx/base-files/etc/uci-defaults/01_leds | 4 +
A couple of thoughts on some of the discussion around this:
1) I would be a proponent of a pre-set password, SSH without a password
is very unusual behavior. I understand that there have been some
comments "Any preset password is asking for users to
leave it default." I fail to see how this is
On Wed, 9 Sep 2015, John kerry wrote:
Hi,
We are working on AR9344 OpenWrt,
We have configured the wireless as AP mode and broadcasting the SSID so any
device can connect to it and even we are able access the GUI on Smartphone
after connecting to that AP.
Then we do survey the scanning
I'm copying this to the list because it was sent directly to me... There
are definitely many ways of "encouraging" people to change the password
which could be explored, another example is the WAN interface could be
disabled until the password is set. A few more thoughts on something
like that
Hi,
Yes after reset we are to able to reconnect, I understand using wired
connection we can configure but we need to configure using wireless only.
Is there anyway that we can avoid the Wi-Fi reset?
Regards,
On Thu, Sep 10, 2015 at 7:29 AM, David Lang wrote:
> On Wed, 9 Sep
IMHO no password is best method until a password is set (like it was with
telnet and now with new paswordless SSH). A default password is just false
sense of security, there is none! Otherwise "encouraging" to set one and
how can be discussed...
Olmari
On Thu, Sep 10, 2015 at 3:14 AM, Ben
Could anyone please help me to solve this issue. How we can avoid the wifi
reset.
On Thu, Sep 10, 2015 at 9:24 AM, John kerry wrote:
> Hi,
>
> Yes after reset we are to able to reconnect, I understand using wired
> connection we can configure but we need to configure using
Tobias Welz wrote at Wed Sep 9 17:24:14 CEST 2015:
> So I absolutely vote for some clear consistent naming of the trunk and
seperate names for the releases. (What about some Cocktail with a letter from
the end of the alphabet like Z Z or X X in case there exists one)
On that
41 matches
Mail list logo