[OpenWrt-Devel] IPv6: network segmentation, use of vlan and IPsec

2015-03-27 Thread Jean-Michel Pouré - GOOZE
Dear friends,

I am studying IPv6 networks and would like to share some ideas with the
community. At present, I am not sure to understand how to filter traffic
and split networks. Here are a few questions:

vlan:
IPv6 has no broadcast. Do we still need vlans to segment traffic? Would
you recommend using vlans together with IPv6?

Filtering a switch:
When a device includes a switch, how to filter ipV6 traffic on the
switch? Do we need to use Brouting and ebtable or can it be done with
iptables6? 

Mac address filtering:
ipv6 embeds MAC address in frames. Clients may generate fake MAC
addresses. Is there a way to hide MAC addresses on the router itself?

IPsec:
IPv6 allows to use IPsec in IPv6 frames. Can it be done already with a
combination of FreeRadius, StrongSwan and IPv6. Do you know working
configurations in OpenWRT?

Kind regards,
Gnutella
___
openwrt-devel mailing list
openwrt-devel@lists.openwrt.org
https://lists.openwrt.org/cgi-bin/mailman/listinfo/openwrt-devel


Re: [OpenWrt-Devel] EAP-TLS / EAP-TTLS PAP

2015-03-27 Thread Jean-Michel Pouré - GOOZE
Le jeudi 26 mars 2015 à 14:33 +0100, Bernd Naumann a écrit :
 K back to the plot:
 Know you any hostapd configurations or other software in openwrt which
 can achieve that goal? Are there any issues which might can lead to
 problems or other downsides I may have missed? Reasons against?

I am new to OpenWRT, but I will try to answer shortly:

The wiki page for wireless is:
http://wiki.openwrt.org/doc/howto/wireless.overview

OpenWRT includes Linux IEEE 802.11 (wireless) subsystem. It covers a
wide range of wireless cards. What you are referencing in your post is :
802.1X (secure) Per-user authentication using RADIUS, including support
for dynamic vlan assignment. Basic WPA Enterprise configuration
instructions:

http://wiki.openwrt.org/doc/howto/wireless.security.8021x

You should never use passwords, whether self-signed X.509 certificates,
i.e. EAP-TLS. It seems to be supported and documentation is available.
Loot at Radius and client certificate in this page:

http://wiki.openwrt.org/doc/uci/wireless#wpaenterpriseaccesspoint

You should be aware that when using certificates, you should be able to
create, sign and manage your CA and certificates. You should set up a
dedicated computer with no connection to Internet. 

OpenSSL will allow you to do that and is very well documented. Gnomint
is a nice GUI: http://gnomint.sourceforge.net/

Kind regards,
Gnutella
___
openwrt-devel mailing list
openwrt-devel@lists.openwrt.org
https://lists.openwrt.org/cgi-bin/mailman/listinfo/openwrt-devel


Re: [OpenWrt-Devel] IPv6: network segmentation, use of vlan and IPsec

2015-03-27 Thread Charlie Smurthwaite

Hi Gnutella,

This is likely not the correct mailing list for general network 
questions like this, and I'd suggest you go to somewhere like 
##networking on Freenode to talk about this, however I'll try to answer 
your questions :)


Firstly, your question seems to lack the clear distinction that should 
be made between Ethernet (layer2) and IPv6 (layer3). Please ensure that 
you are clear about the difference and the way in which they interact. 
For example you talk about MAC addresses in frames, but this is just a 
basic feature of the underlying Ethernet and is unavoidable when using 
this medium but would be unnecessary if using a different medium, such 
as PPP.


While IPv6 has no broadcast addresses, it does have a large number of 
multicast addresses, including some that reach all nodes on a network. 
Therefore, if the decision to segment a network is based on having too 
much broadcast traffic (which takes a lot of nodes on a gigabit network 
to be a problem) then this is unlikely to change with IPv6 due to a 
similar volume of multicast traffic.


Another common reason to segment a network is for security and 
firewalling, and the choice of layer 3 protocol does not change this. 
Nodes on the same layer 2 network (VLAN) will communicate with each 
other directly, whereas those on different layer 2 networks will 
communicate via a router, which is where firewalling would usually take 
place.


You talk about filtering on a switch. This is usually considered a last 
resort when it is not practical to segment a network into separate 
subnets / VLANs. However as far as I know, the process for filtering 
traffic through a Linux switch is the same for IPv6 as it would be in 
IPv4, and Linux supports filtering bridged traffic with iptables (and I 
assume iptables6 though I have never tested this).


MAC address filtering - unfortunately, I think this question is lacking 
some understanding of the interaction between layers. Clients can always 
use a fake MAC address, but this only affects the local LAN. MAC 
addresses are always stripped from packets when they pass through a router.


It's possible that you aren't talking about MAC addresses at all, but 
EUI-64 IP addresses based on MAC addresses. In this case, you will 
find that most clients by default will use their MAC to generate their 
primary IP when using SLAAC but will also use additional random 
privacy addresses. It would probably not be a good idea to try to 
modify (NAT) people's IPs as they pass through a router, though it's 
certainly possible.


I don't know enough about IPsec to answer your last question.

I hope some of this is helpful :)

Charlie


On 27/03/15 07:33, Jean-Michel Pouré - GOOZE wrote:

Dear friends,

I am studying IPv6 networks and would like to share some ideas with the
community. At present, I am not sure to understand how to filter traffic
and split networks. Here are a few questions:

vlan:
IPv6 has no broadcast. Do we still need vlans to segment traffic? Would
you recommend using vlans together with IPv6?

Filtering a switch:
When a device includes a switch, how to filter ipV6 traffic on the
switch? Do we need to use Brouting and ebtable or can it be done with
iptables6?

Mac address filtering:
ipv6 embeds MAC address in frames. Clients may generate fake MAC
addresses. Is there a way to hide MAC addresses on the router itself?

IPsec:
IPv6 allows to use IPsec in IPv6 frames. Can it be done already with a
combination of FreeRadius, StrongSwan and IPv6. Do you know working
configurations in OpenWRT?

Kind regards,
Gnutella
___
openwrt-devel mailing list
openwrt-devel@lists.openwrt.org
https://lists.openwrt.org/cgi-bin/mailman/listinfo/openwrt-devel

___
openwrt-devel mailing list
openwrt-devel@lists.openwrt.org
https://lists.openwrt.org/cgi-bin/mailman/listinfo/openwrt-devel


Re: [OpenWrt-Devel] DHCPv6 flash renumbering patches with HE tunnel breaks

2015-03-27 Thread Bjørn Mork
Steven Barth cy...@openwrt.org writes:

 If the DHCPv6 server sends values for T1 and / or T2 which are valid
 the client must honor them and not try to be smart about lifetimes
 of addresses.

The problem is that you try to be smart by abusing the ability to set
the address preferred lifetime lower than T1.  I don't dispute that it
is allowed by the RFC, but it is definitely not recommended.

Quoting from RFC3315:

 22.4. Identity Association for Non-temporary Addresses Option
 ..
   The server selects the T1 and T2 times to allow the client to extend
   the lifetimes of any addresses in the IA_NA before the lifetimes
   expire, even if the server is unavailable for some short period of
   time.  Recommended values for T1 and T2 are .5 and .8 times the
   shortest preferred lifetime of the addresses in the IA that the
   server is willing to extend, respectively.  


Based on this, it should not come as an surprise that a number of
clients start behaving erratically if you set T1 much higher than the
preferred lifetime.  Don't do that. It causes problems.

You can of course continue to argue that not honouring T1 is a bug, but
that will not fix any of the failing clients.

 in the lan-section of /etc/config/dhcp which will cause most clients
 to not use DHCPv6 and rely on RAs only.

I have a real hard time understanding what makes a DHCPv6 IA_NA address
any different from a RA based address wrt lifetimes.  If you choose to
provide both RA and DHCPv6 service to the lan clients using the same
assigned prefix, then the lifetimes should be kept the same as well.
Choosing between DHCPv6 and SLAAC is really up to the clients in this
case.  If you want to prefer one or the other from the server side, then
I don't see any reason to provide both.

And wrt the fear of sudden renumbering: The upstrem source, where you get
these addresses assigned, will include lifetimes.  Why don't you reuse
those (after some basic sanitation)? If the problem is that the upstream
lies to you, then I suggest fixing that instead.


Bjørn
___
openwrt-devel mailing list
openwrt-devel@lists.openwrt.org
https://lists.openwrt.org/cgi-bin/mailman/listinfo/openwrt-devel


[OpenWrt-Devel] adding seccomp and service jailing to procd

2015-03-27 Thread John Crispin
OpenWrt service hardening and jailing
=

Current firmware builds have the problem, that a lot of services are
running as root. This is especially critical for those services exposed
to the network. Once an attacker has managed to compromise such a
service he has full control over the system. Even if we change all
processes to run as non root, there is still the risk of root privilege
escalation using for example a bug in a kernel syscall implementation.
Patching all services that we run (we have over 1000 packages) is not
possible. The problem is far to diverse and distributed.  Linux has many
on board features to reduce these attack vectors. Lets create a solution
that allows us to use these features without touching all services.

Adding Seccomp support to procd
===

Seccomp is a Berkley Packet Filter (BPF) base syscall filter. Whenever a
service does a syscall, a BPF filter runs and checks if the syscall is
allowed. Currently the filters are setup to allow whitelisted syscalls.
All other syscalls get handled by the default policy. This can be.

* kill the service (policy = 0)
* return -1 and set errno to n (policy = n)

In order to define a syscall filter for a service, it must as a
prerequisite be a procd managed service. Once this is done we simply add
the following line to the init.d script

- procd_set_param seccomp /etc/seccomp/service_name.json

This will tell procd that when the service is started to use the filter
rules defined inside the json file. As we do not want to patch every
service to support seccomp natively we use the following LD_PRELOAD
trick. The service is started with /lib/libpreload-seccomp.so preloading
the __libc_start_main() function of the libc. The preloaded function
does the following things.

1) get a pointer to the real __libc_start_main()
2) get a pointer to the real main() function of the service
3) call the real __libc_start_main() but pass it a pointer to a dummy
main() function
4) inside the dummy main() we read the seccomp filter from json and apply it
5) call the real main()

Doing this allows us to run the dynamic loader (ld.so) and libc_init
code before we apply the seccomp filter. This reduces the amount of
whitelisted syscall required to run the service.

We have extended the kernels seccomp implementation and added an
additional return action that works exactly like the errno action
described above but also prints a line to the kernel log reporting which
process trigger the exception and what syscall number is missing. This
could also be achieved using the trap action but that would require
additional stack parsing inside user-land, which is ugly.


Enabling seccomp support


As this procd feature is still new and under development it is not
enabled by default. In order to enable it you need to select the
following option inside make menuconfig

- Global build settings  --- [*] Enable seccomp support

The feature has so far been implemented for mips, i386 and x86_64. Other
architectures will follow shortly.


Creating a seccomp filter json file
===

It would be very tedious to dig through all packages and figure out
which syscalls are used, specially as many of them are hidden inside the
libc functions that get used. To make things easier we have written a
trivial strace like tool called utrace that will automagically create
the json file for you. Simply calling

- /sbin/utrace /bin/echo foo

will create a file called /tmp/echo.json.$pid The syscalls are ordered
with the one called most often listed first, so that it is the first
inside the actual filter rules set inside the kernel. To make things
even easier an extra init.d command called trace was added. By calling

- /etc/init.d/service_name trace

you can make procd start the service in trace mode. Once the service is
stopped the json file is written to /tmp/.


Adding process jailing to procd
===

This feature uses Linux namespaces. If you do not know what namespaces
are (there are currently 5 of them) please refer to this LWN article.

- http://lwn.net/Articles/531114/

In a nutshell a namespace is a container that separates various aspects
of the user-land from the rest of the system. Namespaces are the base
feature that allows us to run virtual containers using projects such as LXC.

The first namespace that we use is the mount namespace. Once we have
spawned our service inside a mount namespace it cannot see an mounts
outside the container. This in turn allows us to use the pivot_root()
syscall and effectively creating a separate rootfs for the service. As
we do not want the service to see all files on the system, we stage the
required ones into the container. The jailing tool will automatically
detect the libraries needed to run the service, all other files need to
be defined inside the procd init script. The following 3 new commands
are used for this.


Re: [OpenWrt-Devel] DHCPv6 flash renumbering patches with HE tunnel breaks

2015-03-27 Thread Kevin Darbyshire-Bryant
On 26/03/2015 23:51, Steven Barth wrote:
 Radvd isn't part of OpenWrt for a while. dnsmasq doesn't support
 downstream delegation and its DHCPv6 features aren't well integrated
 if you have a dynamic prefix e.g. delegated from your ISP.
I've been messing with the 'constructor' option for quite a while which
is supposed to handle dynamic prefix allocation/deprecation, admittedly
with my HE tunnel things aren't very (at all!) dynamic, but dnsmasq does
pick up new publicly routable prefixes and start RA  DHCPv6 on them
automagically for me.  From my /etc/dnsmasq.conf

dhcp-range=lan,::100, ::F::, constructor:br-lan, ra-names, 64, 12h
enable-ra

I'll get back in my box now.



smime.p7s
Description: S/MIME Cryptographic Signature
___
openwrt-devel mailing list
openwrt-devel@lists.openwrt.org
https://lists.openwrt.org/cgi-bin/mailman/listinfo/openwrt-devel


Re: [OpenWrt-Devel] adding seccomp and service jailing to procd

2015-03-27 Thread Etienne Champetier
Hi,


2015-03-27 10:42 GMT+01:00 John Crispin blo...@openwrt.org:

 OpenWrt service hardening and jailing
 =


 ...


 If there are features that we are not aware of yet or that we forgot to
 list, then please let us know about them.

 Comments and ideas are welcome ...
 ___



Thanks for this impressive piece of work!!! (awesome features and
documentation)

As you are working on Openwrt hardenning, what need to be done before
activating option like
STACKPROTECTOR, FORTIFY_SOURCE, RELRO_PARTIAL by default?
(i'm already using them in all my builds, but i think everybody should use
these options)

Also i would love to hear the pro and cons of extending ubus vs switching
to kdbus
(i'm not trying to start a debate, and i really have no idea of the work
involved, just curious)

Thanks again and keep up the good work!!! (you and all the other devs)
Etienne
___
openwrt-devel mailing list
openwrt-devel@lists.openwrt.org
https://lists.openwrt.org/cgi-bin/mailman/listinfo/openwrt-devel


Re: [OpenWrt-Devel] DHCPv6 flash renumbering patches with HE tunnel breaks

2015-03-27 Thread Arjen de Korte

Citeren Steven Barth cy...@openwrt.org:


The problem is that you try to be smart by abusing the ability to set
the address preferred lifetime lower than T1.  I don't dispute that it
is allowed by the RFC, but it is definitely not recommended.
There is no formal requirement (not even a SHOULD) that says  
otherwise. The recommendation made is usually based on the basis  
that DHCPv6 is your only source of addresses which it isn't for us.


That may be, but I think it is sufficiently hacky that it really not  
should be the default (or even only) mode of operation. I will provide  
a patch shortly to make this configurable.



Based on this, it should not come as an surprise that a number of
clients start behaving erratically if you set T1 much higher than the
preferred lifetime.  Don't do that. It causes problems.

You can of course continue to argue that not honouring T1 is a bug, but
that will not fix any of the failing clients.
Now we know that they actually don't. The clients behave well, that  
seemed to be a misunderstanding.


No, they don't. With regard to the renewal storms, that was a  
misunderstanding. But even with the latest odhcpd from trunk,  
especially webmail clients *will* see loss of connection, as the  
source IP on outgoing connections will be different 1 second of every  
T1 interval. Depending on the leasetime that is configured on the  
server, this may be infrequent enough to be hardly noticeable, or will  
lead to support calls. In my case, it was the latter.


Arjen
___
openwrt-devel mailing list
openwrt-devel@lists.openwrt.org
https://lists.openwrt.org/cgi-bin/mailman/listinfo/openwrt-devel


Re: [OpenWrt-Devel] DHCPv6 flash renumbering patches with HE tunnel breaks

2015-03-27 Thread Steven Barth




The problem is that you try to be smart by abusing the ability to set
the address preferred lifetime lower than T1.  I don't dispute that it
is allowed by the RFC, but it is definitely not recommended.
There is no formal requirement (not even a SHOULD) that says otherwise. 
The recommendation made is usually based on the basis that DHCPv6 is 
your only source of addresses which it isn't for us.



Based on this, it should not come as an surprise that a number of
clients start behaving erratically if you set T1 much higher than the
preferred lifetime.  Don't do that. It causes problems.

You can of course continue to argue that not honouring T1 is a bug, but
that will not fix any of the failing clients.
Now we know that they actually don't. The clients behave well, that 
seemed to be a misunderstanding.
The OP just tried with a version of our server which had a buggy T1 
calculation.



I have a real hard time understanding what makes a DHCPv6 IA_NA address
any different from a RA based address wrt lifetimes.  If you choose to
provide both RA and DHCPv6 service to the lan clients using the same
assigned prefix, then the lifetimes should be kept the same as well.
Choosing between DHCPv6 and SLAAC is really up to the clients in this
case.  If you want to prefer one or the other from the server side, then
I don't see any reason to provide both.
The big difference is that as a router I can send RAs whenever I want 
and clients will react immediately. Most clients however do not support 
the same when doing DHCP and only do dumb polling based on T1/T2. So I 
have to be smart in some way to workaround. I would gladly get rid of 
DHCPv6 after all for clients but there is no good way to collect 
hostnames otherwise.



And wrt the fear of sudden renumbering: The upstrem source, where you get
these addresses assigned, will include lifetimes.  Why don't you reuse
those (after some basic sanitation)? If the problem is that the upstream
lies to you, then I suggest fixing that instead.
We do propagate them as-is through RAs. However imagine manual or 
automatic failover to a different ISP / connection or simply an ISP 
doing 6rd where your IPv6 prefix is mapped from your IPv4-address and th 
connection flaps and you get a different v4-address or a VPN-connection 
being brought up or down. In all these scenarios there needs to be a way 
to tell clients to stop using an address for global traffic near 
instantaneously otherwise they might lose connectivity.




Cheers,

Steven
___
openwrt-devel mailing list
openwrt-devel@lists.openwrt.org
https://lists.openwrt.org/cgi-bin/mailman/listinfo/openwrt-devel


Re: [OpenWrt-Devel] DHCPv6 flash renumbering patches with HE tunnel breaks

2015-03-27 Thread Steven Barth



On 27.03.2015 10:41, Kevin Darbyshire-Bryant wrote:

On 26/03/2015 23:51, Steven Barth wrote:

Radvd isn't part of OpenWrt for a while. dnsmasq doesn't support
downstream delegation and its DHCPv6 features aren't well integrated
if you have a dynamic prefix e.g. delegated from your ISP.

I've been messing with the 'constructor' option for quite a while which
is supposed to handle dynamic prefix allocation/deprecation, admittedly
with my HE tunnel things aren't very (at all!) dynamic, but dnsmasq does
pick up new publicly routable prefixes and start RA  DHCPv6 on them
automagically for me.  From my /etc/dnsmasq.conf

dhcp-range=lan,::100, ::F::, constructor:br-lan, ra-names, 64, 12h
enable-ra
Sure that works, but you can't e.g. number downstream routers with this 
only clients.

___
openwrt-devel mailing list
openwrt-devel@lists.openwrt.org
https://lists.openwrt.org/cgi-bin/mailman/listinfo/openwrt-devel


Re: [OpenWrt-Devel] DHCPv6 flash renumbering patches with HE tunnel breaks

2015-03-27 Thread Bjørn Mork
Steven Barth cy...@openwrt.org writes:


 The problem is that you try to be smart by abusing the ability to set
 the address preferred lifetime lower than T1.  I don't dispute that it
 is allowed by the RFC, but it is definitely not recommended.
 There is no formal requirement (not even a SHOULD) that says
 otherwise.

Agreed.

But as usual, balancing on the edge of what you are allowed to do will
give you more trouble than playing it safe. The recommended values are
clearly stated. It's very likely that some client implementation didn't
anticipate servers not following the recommendation.  Which of course is
their fault.  Still your problem, though.

 The recommendation made is usually based on the basis that
 DHCPv6 is your only source of addresses which it isn't for us.

What makes you believe that?

 Based on this, it should not come as an surprise that a number of
 clients start behaving erratically if you set T1 much higher than the
 preferred lifetime.  Don't do that. It causes problems.

 You can of course continue to argue that not honouring T1 is a bug, but
 that will not fix any of the failing clients.
 Now we know that they actually don't. The clients behave well, that
 seemed to be a misunderstanding.
 The OP just tried with a version of our server which had a buggy T1
 calculation.

Ah, OK.  That sounds better.

 I have a real hard time understanding what makes a DHCPv6 IA_NA address
 any different from a RA based address wrt lifetimes.  If you choose to
 provide both RA and DHCPv6 service to the lan clients using the same
 assigned prefix, then the lifetimes should be kept the same as well.
 Choosing between DHCPv6 and SLAAC is really up to the clients in this
 case.  If you want to prefer one or the other from the server side, then
 I don't see any reason to provide both.
 The big difference is that as a router I can send RAs whenever I want
 and clients will react immediately.

Sure. This is a very good argument for using only RAs in an environment
where the address lifetimes cannot be trusted.

 Most clients however do not
 support the same when doing DHCP and only do dumb polling based on
 T1/T2. So I have to be smart in some way to workaround.

But how does it help? You are still not able to assign a new address to
any DHCPv6 (only) client until T1 expires.  And the SLAAC+DHCPv6 clients
get a new and usable address immediately whether or not the old DHCPv6
address is deprecated.

Yes, I can see that it helps clients using both DHCPv6 and SLAAC with
their source address selection, simply by always avoiding DHCPv6
assigned addresses.  But this policy should be up to the client, not the
router. If they don't want to use the DHCPv6 address then they shouldn't
ask for it.  If they do want to use it, then you shouldn't prevent them
from doing so.

 I would
 gladly get rid of DHCPv6 after all for clients but there is no good
 way to collect hostnames otherwise.

Huh?  How can you collect a hostname from DHCPv6?  You get a DUID and
that's all, isn't it?  Ah, I see that you use DHCPV6_OPT_FQDN aka
OPTION_CLIENT_FQDN.

OK, so you want all the good parts from both DHCPv6 and SLAAC without
sacrificing anything.  Understandable :-)

I'm still not convinced that it is a good idea to assign immedietaly
deprecated addresses. The 1 second change of preferred source address
every T1 seconds is likely to break stuff far more times than an
occasional wan link failover.  Applications tend to associate sessions
with IP addresses, grouping tcp connections from the same address into a
session.  Load balancers try hard to redirect you to the same server,
but don't necessarily understand that you may use several different
source addresses.  Regularily switching the preferred source address
like that is bad.

 And wrt the fear of sudden renumbering: The upstrem source, where you get
 these addresses assigned, will include lifetimes.  Why don't you reuse
 those (after some basic sanitation)? If the problem is that the upstream
 lies to you, then I suggest fixing that instead.
 We do propagate them as-is through RAs. However imagine manual or
 automatic failover to a different ISP / connection or simply an ISP
 doing 6rd where your IPv6 prefix is mapped from your IPv4-address and
 th connection flaps and you get a different v4-address or a
 VPN-connection being brought up or down. In all these scenarios there
 needs to be a way to tell clients to stop using an address for global
 traffic near instantaneously otherwise they might lose connectivity.

Those use cases are broken by design.  Don't get me started on 6rd :-)

But they should of course be supported as smoothly as possible despite
the inherent flaws. One option would be prefix translation, possibly
with ULA addresses on the lan.  Has this been considered?  It would
avoid the need to renumber the lan at all.

Please also note that the use cases break connectivity whether you have
an OpenWRT router in the path or not. ISPs will hopefully realize that
and 

[OpenWrt-Devel] [PATCH] gemini: fix usb driver compilation on 3.18

2015-03-27 Thread Roman Yeryomin
Signed-off-by: Roman Yeryomin ro...@advem.lv
---
 target/linux/gemini/files/drivers/usb/host/ehci-fotg2.c | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/target/linux/gemini/files/drivers/usb/host/ehci-fotg2.c 
b/target/linux/gemini/files/drivers/usb/host/ehci-fotg2.c
index 4d95f2e..0717abc 100644
--- a/target/linux/gemini/files/drivers/usb/host/ehci-fotg2.c
+++ b/target/linux/gemini/files/drivers/usb/host/ehci-fotg2.c
@@ -206,8 +206,8 @@ static int fotg2_ehci_probe(struct platform_device *pdev)
hcd-rsrc_start = res-start;
hcd-rsrc_len = resource_size(res);
 
-   hcd-regs = devm_request_and_ioremap(pdev-dev, res);
-   if (!hcd-regs) {
+   hcd-regs = devm_ioremap_resource(pdev-dev, res);
+   if (IS_ERR(hcd-regs)) {
err = -ENOMEM;
goto err_put_hcd;
}
-- 
2.1.0
___
openwrt-devel mailing list
openwrt-devel@lists.openwrt.org
https://lists.openwrt.org/cgi-bin/mailman/listinfo/openwrt-devel


Re: [OpenWrt-Devel] adding seccomp and service jailing to procd

2015-03-27 Thread John Crispin


On 27/03/2015 13:45, Etienne Champetier wrote:
 Hi,
 
 
 2015-03-27 10:42 GMT+01:00 John Crispin blo...@openwrt.org
 mailto:blo...@openwrt.org:
 
 OpenWrt service hardening and jailing
 =
 
 
 ...
  
 
 If there are features that we are not aware of yet or that we forgot to
 list, then please let us know about them.
 
 Comments and ideas are welcome ...
 ___
 
 
 
 Thanks for this impressive piece of work!!! (awesome features and
 documentation)
 
 As you are working on Openwrt hardenning, what need to be done before
 activating option like
 STACKPROTECTOR, FORTIFY_SOURCE, RELRO_PARTIAL by default?
 (i'm already using them in all my builds, but i think everybody should
 use these options)

i have added them to my list, will look at that in the next days

 
 Also i would love to hear the pro and cons of extending ubus vs
 switching to kdbus
 (i'm not trying to start a debate, and i really have no idea of the work
 involved, just curious)

we need to discuss this internally. i have already started thinking
about it.bu have no opinion yet

John
___
openwrt-devel mailing list
openwrt-devel@lists.openwrt.org
https://lists.openwrt.org/cgi-bin/mailman/listinfo/openwrt-devel


Re: [OpenWrt-Devel] adding seccomp and service jailing to procd

2015-03-27 Thread Etienne Champetier
Hi again,

2015-03-27 15:37 GMT+01:00 John Crispin blo...@openwrt.org:



 On 27/03/2015 13:45, Etienne Champetier wrote:
  Hi,
 
 
  2015-03-27 10:42 GMT+01:00 John Crispin blo...@openwrt.org
  mailto:blo...@openwrt.org:
 
  OpenWrt service hardening and jailing
  =
 
 
  ...
 
 
  If there are features that we are not aware of yet or that we forgot
 to
  list, then please let us know about them.
 
  Comments and ideas are welcome ...
  ___
 
 
 
  Thanks for this impressive piece of work!!! (awesome features and
  documentation)
 
  As you are working on Openwrt hardenning, what need to be done before
  activating option like
  STACKPROTECTOR, FORTIFY_SOURCE, RELRO_PARTIAL by default?
  (i'm already using them in all my builds, but i think everybody should
  use these options)

 i have added them to my list, will look at that in the next days


Cool, quick note, RELRO_FULL can really hurt performance for non daemon
stuff, like luci



 
  Also i would love to hear the pro and cons of extending ubus vs
  switching to kdbus
  (i'm not trying to start a debate, and i really have no idea of the work
  involved, just curious)

 we need to discuss this internally. i have already started thinking
 about it.bu have no opinion yet

 John
 ___


___
openwrt-devel mailing list
openwrt-devel@lists.openwrt.org
https://lists.openwrt.org/cgi-bin/mailman/listinfo/openwrt-devel


Re: [OpenWrt-Devel] ptrace and pselect

2015-03-27 Thread Karl Palsson
Are you still seeing this?

Please note that the official BB build only has mosquitto 1.3.4.  If you
want to use 1.4, either use the feed:
https://github.com/remakeelectric/owrt_pub_feeds or update to a CC based
tree.

Sorry, I've been on holidays, and only just saw this, but I'm the
mosquitto maintainer, so I'd like to work out what's happening for you. 
I've not seen this error before, but it looks like you've managed to
disable libpthread support somehow, which should be difficult/impossible
to do.  As it's selected by the target for ar71xx on the WE-IO board


Cheers,
Karl P

Drasko DRASKOVIC drasko.drasko...@gmail.com wrote:
 Hi all,
 I installed `mosquitto` via `opkg` on BarrierBreaker, and I am getting:
 
 root@WEIO:~# mosquitto_pub -h test.mosquitto.org -t temp/random -m 40
 mosquitto_pub: can't resolve symbol 'pselect'
 
 Then I wnated to see what's happening, and I installed `strace`, but I
 am getting:
 root@WEIO:~# strace mosquitto_pub -h test.mosquitto.org -t temp/random
 -m 40
 strace: can't resolve symbol 'ptrace' in lib 'strace'.
 strace: test_ptrace_setoptions_for_all: unexpected exit status 1
 root@WEIO:~#
 
 Any ideas?
 
 BR,
 Drasko
 ___
 openwrt-devel mailing list
 openwrt-devel@lists.openwrt.org
 https://lists.openwrt.org/cgi-bin/mailman/listinfo/openwrt-devel

-- 
Sent using Mailpile, Free Software from www.mailpile.is___
openwrt-devel mailing list
openwrt-devel@lists.openwrt.org
https://lists.openwrt.org/cgi-bin/mailman/listinfo/openwrt-devel


Re: [OpenWrt-Devel] adding seccomp and service jailing to procd

2015-03-27 Thread Luka Perkov
Hi John,

On Fri, Mar 27, 2015 at 07:58:46PM +0100, John Crispin wrote:
 On 27/03/2015 19:56, Luka Perkov wrote:
  Hi John,
  
  On Fri, Mar 27, 2015 at 03:37:33PM +0100, John Crispin wrote:
  Also i would love to hear the pro and cons of extending ubus
  vs switching to kdbus (i'm not trying to start a debate, and i
  really have no idea of the work involved, just curious)
  
  we need to discuss this internally. i have already started
  thinking about it.bu have no opinion yet
  
  It would be better that such invasive changes that were done or
  are planned are communicated and explained before the actual push
  and not after. In this specific case a patch to either public or
  internal mailing list would not hurt. The breakage for some targets
  could have been easily avoided that way.
  
  Luka
 
 i communicated this to lots of people ahead and sent a mail to the
 internal list 1 day in advance,

Ah, I see, I should be grateful that we had a full day.

 there was next to zero damaged caused by this. you should spend your time
 fixing up imx6,

What is broken in imx6? The target is just not bumped to 3.18.

 rather than criticizing other for adding cool features.

I did not say the features are not cool. Actually, I think they are cool. After
my trip I'll take a closer look at the new features and I am really looking
forward to making contributions!

Luka
___
openwrt-devel mailing list
openwrt-devel@lists.openwrt.org
https://lists.openwrt.org/cgi-bin/mailman/listinfo/openwrt-devel


Re: [OpenWrt-Devel] adding seccomp and service jailing to procd

2015-03-27 Thread John Crispin


On 27/03/2015 19:56, Luka Perkov wrote:
 Hi John,
 
 On Fri, Mar 27, 2015 at 03:37:33PM +0100, John Crispin wrote:
 Also i would love to hear the pro and cons of extending ubus
 vs switching to kdbus (i'm not trying to start a debate, and i
 really have no idea of the work involved, just curious)
 
 we need to discuss this internally. i have already started
 thinking about it.bu have no opinion yet
 
 It would be better that such invasive changes that were done or
 are planned are communicated and explained before the actual push
 and not after. In this specific case a patch to either public or
 internal mailing list would not hurt. The breakage for some targets
 could have been easily avoided that way.
 
 Luka

i communicated this to lots of people ahead and sent a mail to the
internal list 1 day in advance, there was next to zero damaged caused
by this. you should spend your time fixing up imx6, rather than
criticizing other for adding cool features.

John


 ___ openwrt-devel
 mailing list openwrt-devel@lists.openwrt.org 
 https://lists.openwrt.org/cgi-bin/mailman/listinfo/openwrt-devel
 
___
openwrt-devel mailing list
openwrt-devel@lists.openwrt.org
https://lists.openwrt.org/cgi-bin/mailman/listinfo/openwrt-devel


Re: [OpenWrt-Devel] adding seccomp and service jailing to procd

2015-03-27 Thread Luka Perkov
Hi John,

On Fri, Mar 27, 2015 at 03:37:33PM +0100, John Crispin wrote:
  Also i would love to hear the pro and cons of extending ubus vs
  switching to kdbus
  (i'm not trying to start a debate, and i really have no idea of the work
  involved, just curious)
 
 we need to discuss this internally. i have already started thinking
 about it.bu have no opinion yet

It would be better that such invasive changes that were done or are
planned are communicated and explained before the actual push and not
after. In this specific case a patch to either public or internal
mailing list would not hurt. The breakage for some targets could have
been easily avoided that way.

Luka
___
openwrt-devel mailing list
openwrt-devel@lists.openwrt.org
https://lists.openwrt.org/cgi-bin/mailman/listinfo/openwrt-devel


[OpenWrt-Devel] [PATCH] update libnetfilter_conntrack to version 1.0.4

2015-03-27 Thread Christian Mehlis
This updates libnetfilter_conntrack to the latest
stable version 1.0.4 which was released Aug-06-2013.

Changeset is available here:
http://git.netfilter.org/libnetfilter_conntrack/log/

Signed-off-by: Christian Mehlis christ...@m3hlis.de
---
 package/libs/libnetfilter-conntrack/Makefile | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/package/libs/libnetfilter-conntrack/Makefile 
b/package/libs/libnetfilter-conntrack/Makefile
index 4579a02..e60b59a 100644
--- a/package/libs/libnetfilter-conntrack/Makefile
+++ b/package/libs/libnetfilter-conntrack/Makefile
@@ -8,14 +8,14 @@
 include $(TOPDIR)/rules.mk
 
 PKG_NAME:=libnetfilter_conntrack
-PKG_VERSION:=1.0.3
+PKG_VERSION:=1.0.4
 PKG_RELEASE:=1
 
 PKG_SOURCE:=$(PKG_NAME)-$(PKG_VERSION).tar.bz2
 PKG_SOURCE_URL:= \
http://www.netfilter.org/projects/libnetfilter_conntrack/files/ \
ftp://ftp.netfilter.org/pub/libnetfilter_conntrack/
-PKG_MD5SUM:=73394a3d8d0cfecc6abb6027b4792d52
+PKG_MD5SUM:=18cf80c4b339a3285e78822dbd4f08d7
 PKG_MAINTAINER:=Jo-Philipp Wich j...@openwrt.org
 
 PKG_FIXUP:=autoreconf
-- 
2.4.0.rc0.16.g283cd32
___
openwrt-devel mailing list
openwrt-devel@lists.openwrt.org
https://lists.openwrt.org/cgi-bin/mailman/listinfo/openwrt-devel