[OpenWrt-Devel] [PATCH] mt7621: add two extra pcie patches

2020-04-17 Thread Rosen Penev
These fix behavior with several devices where pcie0 is not connected. Funny enough, these commits actually revert behavior to the original driver. Signed-off-by: Rosen Penev --- target/linux/ramips/dts/mt7621.dtsi | 9 +- ...perly-power-off-dual-ported-pcie-phy.patch | 70

Re: [OpenWrt-Devel] [PATCH] prereq-build: test for perl's Data::Dumper

2020-04-17 Thread Rosen Penev
On Sun, Mar 29, 2020 at 6:13 PM Rosen Penev wrote: > > Required for installation of autoconf: > > make[5]: Entering directory `/openwrt/build_dir/host/autoconf-2.69' > Making all in bin > make[6]: Entering directory `/openwrt/build_dir/host/autoconf-2.69/bin' > autom4te_perllibdir='..'/lib

Re: [OpenWrt-Devel] [PATCHv3] ubox: run init script through shellcheck

2020-04-17 Thread Rosen Penev
On Fri, Apr 17, 2020 at 1:50 AM wrote: > > Hi, > > > -Original Message- > > From: openwrt-devel [mailto:openwrt-devel-boun...@lists.openwrt.org] > > On Behalf Of Rosen Penev > > Sent: Mittwoch, 15. April 2020 01:37 > > To: openwrt-devel@lists.openwrt.org > > Subject: [OpenWrt-Devel]

[OpenWrt-Devel] [PATCH] build: show make output in scripts/config when V=s

2020-04-17 Thread Eneas U de Queiroz
This should make debugging build errors in scripts/config a bit easier. Signed-off-by: Eneas U de Queiroz diff --git a/include/toplevel.mk b/include/toplevel.mk index 2965f75c7c..ad8e5b8f20 100644 --- a/include/toplevel.mk +++ b/include/toplevel.mk @@ -104,7 +104,8 @@ scripts/config/%onf:

[OpenWrt-Devel] [PATCH] sdk: fix host menu config targets using ncurses

2020-04-17 Thread Eneas U de Queiroz
From: Petr Štetiar This applies 965f341aa9 ("build: fix host menu config targets using ncurses") to the SDK top Makefile. If there is a pkg-config in the staging dir, it will try to use it instead of the host system's pkg-config; then it will fail to find the ncurses package. Linux's default

[OpenWrt-Devel] [PATCH] openvpn: update to 2.4.9

2020-04-17 Thread Magnus Kroken
This is primarily a maintenance release with bugfixes and improvements. This release also fixes a security issue (CVE-2020-11810) which allows disrupting service of a freshly connected client that has not yet negotiated session keys. The vulnerability cannot be used to inject or steal VPN traffic.

Re: [OpenWrt-Devel] Possible security issue

2020-04-17 Thread Wes Turner
>From a least privileges perspective: - chmod o-rwx /var/run/hostapd-phyX.conf - chmod o-x uci # setfacl? Compromise of a service running as a different user should not result in disclosure of sensitive keys only necessary for different services.

Re: [OpenWrt-Devel] confirm d2759ee7f324c3be070a8979dccb1197ab3adb41

2020-04-17 Thread Lars Kruse
Am Sun, 12 Apr 2020 14:33:03 -0700 schrieb openwrt-devel-requ...@lists.openwrt.org: > Your membership in the mailing list openwrt-devel has been disabled > due to excessive bounces The last bounce received from you was dated > 12-Apr-2020. You will not get any more messages from this list until

Re: [OpenWrt-Devel] [PATCHv3] ubox: run init script through shellcheck

2020-04-17 Thread Daniel Golle
On Fri, Apr 17, 2020 at 10:50:32AM +0200, m...@adrianschmutzler.de wrote: > Hi, > > > -Original Message- > > From: openwrt-devel [mailto:openwrt-devel-boun...@lists.openwrt.org] > > On Behalf Of Rosen Penev > > Sent: Mittwoch, 15. April 2020 01:37 > > To: openwrt-devel@lists.openwrt.org >

Re: [OpenWrt-Devel] Possible security issue

2020-04-17 Thread Joel Wirāmu Pauling
No. If you have physical access to the node and/or a valid login as Admin then any form of PSK is vulnerable. If you are concerned about PSK's being exposed then you have the option to run 802.1x auth and issue issues tokens out of radius/IDM that is secured elsewhere than on the AP itself. On

Re: [OpenWrt-Devel] [PATCHv3] ubox: run init script through shellcheck

2020-04-17 Thread mail
Hi, > -Original Message- > From: openwrt-devel [mailto:openwrt-devel-boun...@lists.openwrt.org] > On Behalf Of Rosen Penev > Sent: Mittwoch, 15. April 2020 01:37 > To: openwrt-devel@lists.openwrt.org > Subject: [OpenWrt-Devel] [PATCHv3] ubox: run init script through shellcheck > >

[OpenWrt-Devel] Possible security issue

2020-04-17 Thread e9hack
Hi, the configuration files for hostapd (/var/run/hostapd-phyX.conf) are readable for everyone. This means everyone can read the wifi passwords. If a non privileged user calls 'uci show wireless', he will also get all wifi passwords. This possible e.g. for user nobody and dnsmasq. Is this a a

[OpenWrt-Devel] [PATCH] mvebu: add support for GL.iNet GL-MV1000

2020-04-17 Thread Li Zhang
This patch adds supports for GL-MV1000. Specification: - SOC: Marvell Armada 88F3720 (1GHz) - Flash: 16MB (W25Q128FWSIG) - RAM: 1GB DDR4 - Ethernet: 3x GE (1 WAN + 2 LAN) - EMMC: 8GB EMMC (KLM8G1GETF-B041) - MicroSD: 1x microSD slot - USB: