- 09 Oct, 2016 1 commit
-
-
Franco Fichtner authored
-
- 07 Oct, 2016 1 commit
-
-
Franco Fichtner authored
-
- 05 Oct, 2016 2 commits
-
-
https://fourdots.com/Franco Fichtner authored
-
Franco Fichtner authored
-
- 04 Oct, 2016 3 commits
-
-
Franco Fichtner authored
-
Franco Fichtner authored
It's only partially true and will be compeltely wrong in the mid-term future. ;)
-
Franco Fichtner authored
-
- 03 Oct, 2016 5 commits
-
-
Franco Fichtner authored
This reverts commit e0f9464e. This crashes on FreeBSD 11 on boot, ouch...
-
Franco Fichtner authored
-
Franco Fichtner authored
-
Franco Fichtner authored
-
Franco Fichtner authored
-
- 02 Oct, 2016 2 commits
-
-
Ad Schellevis authored
This reverts commit 3eb11d16.
-
Ad Schellevis authored
-
- 01 Oct, 2016 5 commits
-
-
Franco Fichtner authored
-
Franco Fichtner authored
-
Franco Fichtner authored
-
Franco Fichtner authored
-
Franco Fichtner authored
-
- 30 Sep, 2016 5 commits
-
-
Ad Schellevis authored
-
https://github.com/opnsense/core/issues/993Ad Schellevis authored
simple start, wrap anchor registration into plugin system, use miniupnpd as an example. use registerAnchor() to register new anchors for pf into the main firewall script, we've hooked head/tail options and the different anchor types. anchorToText() will extract the registered anchors back for the specified types and place in the script (head/tail) in text format for pf. our new codebase was already hooked using legacy_bindings.inc, no additional includes needed to construct \OPNsense\Firewall\Plugin().
-
Ad Schellevis authored
-
Ad Schellevis authored
-
Ad Schellevis authored
-
- 29 Sep, 2016 6 commits
-
-
Ad Schellevis authored
(ipsec, psk) writeout base64 instead of plain text, interpret "any" in the process, closes https://github.com/opnsense/core/issues/1205
-
Ad Schellevis authored
(openvpn client export) add X-Content-Type-Options: nosniff header, closes https://github.com/opnsense/core/issues/1204
-
Franco Fichtner authored
Uh, oh: the keys are not purged on factory reset. Since we now store the explicit host key file names in the config, it's better to stop writing keys to /usr/local/etc/ssh and just keep the backup where it was. It's fully compatible with our approach. While there, remove the need to softcode commands in variables as this was done to migrate from base OpenSSH to ports OpenSSH, which was done in 2015.
-
Franco Fichtner authored
I pulled this from the attic, but it makes no sense. ;)
-
Franco Fichtner authored
-
Franco Fichtner authored
-
- 28 Sep, 2016 1 commit
-
-
Franco Fichtner authored
The rules edit page can do it, but it was not picked up by the actual firewall rules...
-
- 27 Sep, 2016 2 commits
-
-
Franco Fichtner authored
-
Franco Fichtner authored
Revert "(sshd) add HostKey to sshd_config to force available hostkeys. closes https://github.com/opnsense/core/issues/1200" This reverts commit 4e83616c. We need more input from the reporter, nobody has ran into this error as far as I could see, testing was ok, and when OpenSSH switches to the next version this will automatically align itself...
-
- 26 Sep, 2016 1 commit
-
-
Franco Fichtner authored
-
- 27 Sep, 2016 1 commit
-
-
Franco Fichtner authored
-
- 26 Sep, 2016 2 commits
-
-
Franco Fichtner authored
-
Franco Fichtner authored
Fix a few style errors while there.
-
- 25 Sep, 2016 3 commits
-
-
Ad Schellevis authored
(sshd) add HostKey to sshd_config to force available hostkeys. closes https://github.com/opnsense/core/issues/1200
-
Franco Fichtner authored
-
Franco Fichtner authored
-