- 02 Oct, 2016 1 commit
-
-
Ad Schellevis authored
-
- 01 Oct, 2016 5 commits
-
-
Franco Fichtner authored
-
Franco Fichtner authored
-
Franco Fichtner authored
-
Franco Fichtner authored
-
Franco Fichtner authored
-
- 30 Sep, 2016 5 commits
-
-
Ad Schellevis authored
-
https://github.com/opnsense/core/issues/993Ad Schellevis authored
simple start, wrap anchor registration into plugin system, use miniupnpd as an example. use registerAnchor() to register new anchors for pf into the main firewall script, we've hooked head/tail options and the different anchor types. anchorToText() will extract the registered anchors back for the specified types and place in the script (head/tail) in text format for pf. our new codebase was already hooked using legacy_bindings.inc, no additional includes needed to construct \OPNsense\Firewall\Plugin().
-
Ad Schellevis authored
-
Ad Schellevis authored
-
Ad Schellevis authored
-
- 29 Sep, 2016 6 commits
-
-
Ad Schellevis authored
(ipsec, psk) writeout base64 instead of plain text, interpret "any" in the process, closes https://github.com/opnsense/core/issues/1205
-
Ad Schellevis authored
(openvpn client export) add X-Content-Type-Options: nosniff header, closes https://github.com/opnsense/core/issues/1204
-
Franco Fichtner authored
Uh, oh: the keys are not purged on factory reset. Since we now store the explicit host key file names in the config, it's better to stop writing keys to /usr/local/etc/ssh and just keep the backup where it was. It's fully compatible with our approach. While there, remove the need to softcode commands in variables as this was done to migrate from base OpenSSH to ports OpenSSH, which was done in 2015.
-
Franco Fichtner authored
I pulled this from the attic, but it makes no sense. ;)
-
Franco Fichtner authored
-
Franco Fichtner authored
-
- 28 Sep, 2016 1 commit
-
-
Franco Fichtner authored
The rules edit page can do it, but it was not picked up by the actual firewall rules...
-
- 27 Sep, 2016 2 commits
-
-
Franco Fichtner authored
-
Franco Fichtner authored
Revert "(sshd) add HostKey to sshd_config to force available hostkeys. closes https://github.com/opnsense/core/issues/1200" This reverts commit 4e83616c. We need more input from the reporter, nobody has ran into this error as far as I could see, testing was ok, and when OpenSSH switches to the next version this will automatically align itself...
-
- 26 Sep, 2016 1 commit
-
-
Franco Fichtner authored
-
- 27 Sep, 2016 1 commit
-
-
Franco Fichtner authored
-
- 26 Sep, 2016 2 commits
-
-
Franco Fichtner authored
-
Franco Fichtner authored
Fix a few style errors while there.
-
- 25 Sep, 2016 9 commits
-
-
Ad Schellevis authored
(sshd) add HostKey to sshd_config to force available hostkeys. closes https://github.com/opnsense/core/issues/1200
-
Franco Fichtner authored
-
Franco Fichtner authored
-
Franco Fichtner authored
-
Franco Fichtner authored
-
Franco Fichtner authored
Now that we have a plist it's easier to review/preview changes. Can finally tackle the src/opnsense/contrib mess in a sensible way with this and since we do not rely on mount/umount anymore.
-
Franco Fichtner authored
-
Franco Fichtner authored
-
Franco Fichtner authored
-
- 24 Sep, 2016 7 commits
-
-
Franco Fichtner authored
-
Franco Fichtner authored
-
Franco Fichtner authored
-
Franco Fichtner authored
When we build packages, we want to know if something is wrong. For now, only use it in the upgrade path, not sure how to to distinguish if a user or the build system is running the package build.
-
Franco Fichtner authored
-
Franco Fichtner authored
-
Franco Fichtner authored
-