10093 Commits

Author SHA1 Message Date
Ad Schellevis
5d0d4e832e Config, add more pessimistic locking option.
We usually only lock on write, but when data has a high posibility of changing in between reads, we should have an option to lock for writes exclusively.

needed for https://github.com/opnsense/core/issues/3062
2018-12-21 12:09:26 +01:00
Michael Steenbeek
d27cc83642 Change foreach loops that don't use values to use array_keys() 2018-12-18 14:37:11 +01:00
Franco Fichtner
6c46b786b8 pkg: suricata-devel merged into suricata 2018-12-18 12:48:34 +01:00
Franco Fichtner
dccd191e21 pkg: fix plist 2018-12-18 11:42:42 +00:00
Franco Fichtner
a1d6cd09f9 firmware: increase heat for upcoming 19.1-RC 2018-12-18 11:00:36 +01:00
Franco Fichtner
60f9ffea93 openvpn: make remote network optional
PR: https://twitter.com/simonszu/status/1074927719006306304
2018-12-18 12:30:41 +01:00
Martin Wasley
f41ca8d0fc services: dhcpv6 override PD range fix; closes #3047
When using dhcpd6 overide, if the user does not enter a 'to' range
then at present the code writes an invalid PD range to dhcpd6.conf.
This change checks to see whether the user has entered a PD range,
if not then no PD range is written to the conf file.
2018-12-17 16:23:28 +01:00
Ad Schellevis
7d07a15fe0 HAsync, remove references to "automatic", since we don't usually sync automatic (maybe there are some spots left, which we better kill as well then). Add a link to the status page, to make it a bit more explicit in the settings.
discussed here https://github.com/opnsense/core/issues/2920
2018-12-17 11:27:25 +01:00
Franco Fichtner
5331c55c8c interfaces: drop reload that is probably not even executed from the top
This has been on devel for a while and recent 18.7.x do not suggest
any problems in this particular area so let's just drop it.
2018-12-17 08:48:02 +01:00
Franco Fichtner
a285dc554b openvpn: small cleanup 2018-12-17 08:46:55 +01:00
Franco Fichtner
663f4baef1 make: allow override of CORE_VERSION, CORE_REVISION and CORE_HASH 2018-12-17 08:14:23 +01:00
Franco Fichtner
d9f7574147 ipsec: mark descriptions "$unused" where appropriate 2018-12-16 21:17:43 +01:00
Franco Fichtner
64bd3a333b firewall: style tweaks 2018-12-16 21:00:17 +01:00
Franco Fichtner
14f8a4243e system: minor whitespace cleanup 2018-12-16 20:54:29 +01:00
Ad Schellevis
8aa6da2fb0 cleanup notices to bare minimum, https://github.com/opnsense/core/pull/3031 2018-12-16 20:15:02 +01:00
Franco Fichtner
1e3fc6dcc7 system: files merged, copyright retained 2018-12-16 19:56:50 +01:00
Michael Steenbeek
0d7001ae68 Remove legacy SMTP notices (for #2919) (#3031)
* Remove remaining calls to notify_via_smtp()
* Remove SMTP notices code
* Remove SMTP notifications config from System/Settings/Notifications
* Move system beep settings to System/Settings/Miscellaneous, remove System/Settings/Notifications
2018-12-16 19:34:20 +01:00
Ad Schellevis
923f1982f7 IDS/abuse.ch, remove non functional dyre_sslipblacklist.rules and use new location for Feodo Tracker (currently defunct) 2018-12-16 18:11:27 +01:00
Ad Schellevis
f9d9e09ebb firewall/alias, signal table load errors to the user, it's not very obvious now that the table memory is defined too low. closes https://github.com/opnsense/core/issues/3046 2018-12-14 21:05:34 +01:00
Michael Steenbeek
f1c515744a Fix #2990: Browser crashes when there are more than 10000 addresses in a pfTable alias" (#3039) 2018-12-14 15:51:14 +01:00
Franco Fichtner
7060d4e633 interfaces: simplify once more 2018-12-13 16:21:32 +01:00
Franco Fichtner
98bd679bab firewall: fix typo
PR: https://github.com/opnsense/core/issues/2992
2018-12-13 12:35:49 +01:00
Franco Fichtner
4e8055fed3 system: there's no point globbing... 2018-12-13 10:51:24 +01:00
Franco Fichtner
6dcb9da10f interfaces: simplify nameserver lookup 2018-12-13 10:47:15 +01:00
Franco Fichtner
8ca8def5ac firewall: localhost is actually loopback, loosely refs #3041 2018-12-13 09:08:53 +01:00
Michael Steenbeek
b36c30825c Clean up IPsec log levels 2018-12-12 15:23:21 +01:00
Ad Schellevis
54af1c434d Firewall/alias, when traversing config, make sure the item exists, for https://github.com/opnsense/core/issues/3037 2018-12-11 21:37:20 +01:00
Franco Fichtner
5568b35958 interfaces: read and write DUID correctly; closes #3029 2018-12-11 14:07:07 +00:00
Franco Fichtner
466c4d9e34 firmware: tweak opnsense-version manual 2018-12-11 08:44:59 +01:00
Ad Schellevis
8b73d9e73b interfaces, fix configure_interface_hardware when legacy_interface_details() returns an empty array, closes https://github.com/opnsense/core/issues/3035 2018-12-10 22:41:02 +01:00
Ad Schellevis
65999c54c9 Merge branch 'MichaelDeciso-fix/2960' 2018-12-10 22:32:12 +01:00
Ad Schellevis
4eba469298 simplify https://github.com/opnsense/core/pull/3018 2018-12-10 22:31:44 +01:00
Ad Schellevis
a73ba9b6b4 Merge branch 'fix/2960' of https://github.com/MichaelDeciso/core into MichaelDeciso-fix/2960 2018-12-10 22:21:51 +01:00
Ad Schellevis
7fa92079cb OpenVPN export (https://github.com/opnsense/core/issues/2787)
- change server cn validation to server subject
- move "use random port" to custom option
- tgb format issue with SHA1
2018-12-10 15:16:32 +01:00
Michael Steenbeek
010aa33de0 Fix #2960: Limit line length in log widget 2018-12-10 14:53:35 +01:00
Franco Fichtner
e494ebd94e pkg: fix plist 2018-12-10 09:08:05 +00:00
Ad Schellevis
767550acdd bugfix https://github.com/opnsense/core/pull/3025 2018-12-10 09:44:58 +01:00
Ad Schellevis
f6e74ab57a IDS, new daily cron job doesn't actually create a daily.... (only on day 0) 2018-12-10 09:26:13 +01:00
Ad Schellevis
b3082fcf68 IDS/rule downloader, improve logging 2018-12-10 09:16:52 +01:00
Michael Steenbeek
3e836c6087 Add gateway alerts to Monit, for #2919 (#3025) 2018-12-09 20:08:54 +01:00
Ad Schellevis
d8f23d5210 Firwall/Nat, when using "Reflection for port forwards" we should only add nat rules for interfaces with configured addresses.
Although this looks a bit duplicate at first, when the nat interface itself (e.g. openvpn) is missing a network, we should add a rdr, but skip the nat rule.

closes https://github.com/opnsense/core/issues/3023
2018-12-09 19:52:23 +01:00
Franco Fichtner
6b848aba4a interfaces: do not offset DUID by two bytes for now
It's not clear what this actually does.  is_duid() fails.
2018-12-09 07:08:18 +01:00
Franco Fichtner
1051b38584 system: pass IP down 2018-12-09 06:23:51 +01:00
Franco Fichtner
83f66de6ed system: protect mac call 2018-12-09 06:20:36 +01:00
Franco Fichtner
216e05c2ee configd: test output changed, better make this explicit 2018-12-09 05:18:41 +01:00
Franco Fichtner
2ca9db1c03 firewall: log widget should do rdr too 2018-12-09 05:16:12 +01:00
Franco Fichtner
9984dc96de dhcp: correct function use 2018-12-09 04:45:53 +01:00
Franco Fichtner
061d3bb789 firwall: cleanup 2018-12-09 04:29:22 +01:00
Franco Fichtner
5e8c967176 interfaces: small simplifcation on 6to4 code 2018-12-09 04:18:19 +01:00
Northguy
b7bbb836fd Updated help text for verbosity level
Added help text for verbosity from https://nlnetlabs.nl/documentation/unbound/unbound.conf/
2018-12-08 19:16:56 +01:00