- Aug 02, 2016
-
-
Ad Schellevis authored
-
kp authored
pf: Fix ICMP translation Fix ICMP source address rewriting in rdr scenarios. pf: Fix more ICMP mistranslation In the default case fix the substitution of the destination address. PR: 201519 Submitted by: Max <maximos@als.nnov.ru>
-
ae authored
Use correct size for malloc.
-
sbruno authored
but only in the NETMAP code. This lead to the NETMAP code paths passing nothing up to userland. Submitted by: Ad Schellevis <ad@opnsense.org> Reported by: Franco Fichtner <franco@opnsense.org> MFC after: 1 day
-
- Jul 27, 2016
-
-
Franco Fichtner authored
When rtsold with `-d' it is supposed to show informal messages, though it actually picks up prefix delegation RAs on other non- configured interfaces. Since it's listening on a raw socket, we get all those things, but there's no misconfiguration and no interest in what happens with other interfaces per se and the debug level shall be sufficient. PR: https://forum.opnsense.org/index.php?topic=3392 (cherry picked from commit 9789a421)
- Jul 21, 2016
-
-
Franco Fichtner authored
-
- Jun 23, 2016
-
- Jun 22, 2016
-
-
Franco Fichtner authored
-
- Jun 15, 2016
-
-
Franco Fichtner authored
Taken from: https://www.iana.org/time-zones
-
- Jun 08, 2016
-
-
Shawn Webb authored
On OPNsense's 16.7 roadmap is HardenedBSD's ASLR code. This commit separates out the ASLR code from the rest of our exploit mitigation and system hardening code. Testing and verification still need to be performed. Initial testing (compile + boot + `procstat -v PIDofPIEapplication) has been performed. More thorough testing should occur. Shared object load order randomization in the RTLD is not included in this patch. That will be discussed with the fine folks at OPNsense at a later time. On i386, the stack isn't randomized enough to provide enough space for the VDSO to be randomized. Bump the stack randomization up to 14 for 32bit systems and lower the VDSO randomization to 8. This provides enough of a difference between the two to allow for both stack and VDSO randomization. Note that ASLR on 32bit systems is still rather weak. Not much entropy can be introduced into the stack and VDSO. Brute forcing the stack and VDSO is well within the realm of possibility. Users are strongly advised to migrate to 64bit systems. Signed-off-by:
Shawn Webb <shawn.webb@hardenedbsd.org>
-
- Jun 05, 2016
-
-
delphij authored
Security: FreeBSD-SA-16:24.ntp Approved by: so
-
- May 31, 2016
- May 30, 2016
-
-
Franco Fichtner authored
This reverts commit 55362daa. Not in FreeBSD and not our battle.
-
- May 25, 2016
-
-
Franco Fichtner authored
Logo kindly supplied by the Schellevis brothers @jschellevis and @adschellevis, who had a lot of fun doing this. :) Time is ticking.... tick tock tick tock :) Original branding work by: @kurbel
-
- May 21, 2016
-
-
Franco Fichtner authored
Taken from: http://caia.swin.edu.au/freebsd/aqm/
-
hselasky authored
panics when unloading the dummynet and IPFW modules: - The callout drain function can sleep and should not be called having a non-sleepable lock locked. Remove locks around "ipfw_dyn_uninit(0)". - Add a new "dn_gone" variable to prevent asynchronous restart of dummynet callouts when unloading the dummynet kernel module. - Call "dn_reschedule()" locked so that "dn_gone" can be set and checked atomically with regard to starting a new callout. Reviewed by: hiren MFC after: 1 week Differential Revision: https://reviews.freebsd.org/D3855
-
glebius authored
Remove ifa_mtx. It was used only in one place in kernel, and ifnet's ifaddr lock can substitute it there. Discussed with: melifaro, ae Sponsored by: Netflix Sponsored by: Nginx, Inc.
-
Ad Schellevis authored
Taken from: pfSense Modified by: Franco Fichtner See also: https://github.com/opnsense/core/issues/153 See also: https://forum.opnsense.org/index.php?topic=2385
-
Franco Fichtner authored
Taken from: http://www.pcengines.info/forums/?page=post&id=6DA3284E-4973-4EC5-921D-A93AB72123DC (cherry picked from commit 629b0b86)
-
Ad Schellevis authored
Taken from: pfSense See also: https://lists.freebsd.org/pipermail/freebsd-net/2013-June/035749.html See also: http://undeadly.org/cgi?action=article&sid=20130828151241
-
Ad Schellevis authored
Taken from: pfSense
-
Ad Schellevis authored
Taken from: m0n0wall Modified by: franco@opnsense.org
-
Franco Fichtner authored
Also mutes a spammy message. Bravely going where no man has gone before. :)
-
Franco Fichtner authored
Taken from: https://www.iana.org/time-zones
-
Franco Fichtner authored
-
Franco Fichtner authored
Taken from: FreeBSD
-
Franco Fichtner authored
-
Franco Fichtner authored
Submitted by: Thomas Siegmund
-
Franco Fichtner authored
Inspired by: DragonFlyBSD
-
glebius authored
- Validate that user supplied control message length in sendmsg(2) is not negative. Security: SA-16:18 Security: CVE-2016-1886 Security: SA-16:19 Security: CVE-2016-1887 Submitted by: C Turt <cturt hardenedbsd.org> Approved by: so
-
delphij authored
Fix performance regression in libc hash(3). [EN-16:06] Fix excessive latency in x86 IPI delivery. [EN-16:07] Fix memory leak in ZFS. [EN-16:08] Approved by: so
-
delphij authored
Approved by: so
-
Franco Fichtner authored
Taken from: FreeBSD Commit ref: b62280e683e2
-
- May 18, 2016
-
-
glebius authored
- Validate that user supplied control message length in sendmsg(2) is not negative. Security: SA-16:18 Security: CVE-2016-1886 Security: SA-16:19 Security: CVE-2016-1887 Submitted by: C Turt <cturt hardenedbsd.org> Approved by: so
-
- May 17, 2016
-
-
Franco Fichtner authored
Taken from: http://caia.swin.edu.au/freebsd/aqm/
-
- May 07, 2016
-
-
Franco Fichtner authored
This reverts commit 0a19f813.
-
- May 05, 2016
-
-
delphij authored
Fix excessive latency in x86 IPI delivery. [EN-16:07] Fix memory leak in ZFS. [EN-16:08] Approved by: so
-
- Apr 29, 2016
-
-
delphij authored
Approved by: so
-