- May 13, 2020
-
-
Matthias Schiffer authored
-
- May 12, 2020
-
-
lemoer authored
-
- May 10, 2020
-
-
Matthias Schiffer authored
The 'preserve' flag can be used to mark a peer so it is not removed or modified on upgrades. In addition, groups containing preserved peers are not removed. Fixes: #557
-
- May 09, 2020
-
-
David Bauer authored
-
- May 02, 2020
-
-
David Bauer authored
Closes #1993
-
Martin Weinelt authored
(cherry picked from commit 7f3a3042)
-
Martin Weinelt authored
(cherry picked from commit 4bfcd6ae)
-
- Apr 29, 2020
-
-
Martin Weinelt authored
Allows reconfigurtion of remote syslog from within site.conf. Conflicts with the gluon-web-logging package as user made changes will be overwritten, because this package will reconfigure the syslog destination on every upgrade. Resolves #1845
-
Jan Luebbe authored
OpenWRT 19.07 enables urngd by default, so haveged is redundant.
-
- Apr 27, 2020
-
-
Jan Alexander authored
-
André Fiedler authored
-
- Apr 26, 2020
-
-
David Bauer authored
This device has broken Ethernet on both ports. Remove support for those devices. for now, as there was no feedback from the original author. Closes #1943
-
- Apr 25, 2020
-
-
aiyion.prime authored
v2 is available on the market, but apparently has no upstream support, yet: https://forum.openwrt.org/t/v2-of-cudy-wr1000/56965
-
- Apr 24, 2020
-
-
Jan Alexander authored
-
- Apr 11, 2020
-
-
David Bauer authored
Fixes commit 6692095f
-
- Apr 09, 2020
-
-
Jan Alexander authored
-
Matthias Schiffer authored
-
- Apr 05, 2020
-
-
Ruben Barkow-Kuder authored
-
- Mar 31, 2020
-
-
David Bauer authored
-
- Mar 25, 2020
-
-
David Bauer authored
This allows to define a list of packages, which are only installed for a specific device-class.
-
David Bauer authored
-
David Bauer authored
-
David Bauer authored
-
- Mar 23, 2020
-
-
Martin Weinelt authored
This package adds support for SAE on 802.11s mesh connections. Enabling this package will require all 802.11s mesh connections to be encrypted using the SAE key agreement scheme. The security of SAE relies upon the authentication through a shared secret. In the context of public mesh networks a shared secret is an obvious oxymoron. Still this functionality provides an improvement over unencrypted mesh connections in that it protects against a passive attacker who did not observe the key agreement. In addition Management Frame Protection (802.11w) gets automatically enabled on mesh interfaces to prevent protocol-level deauthentication attacks. If `wifi.mesh.sae` is enabled a shared secret will automatically be derived from the `prefix6` variable. This is as secure as it gets for a public mesh network. For *private* mesh networks `wifi.mesh.sae_passphrase` should be set to your shared secret. Fixes #1636
-
- Mar 19, 2020
-
-
Martin Weinelt authored
Resolves #1937
-
- Mar 14, 2020
-
-
Andreas Ziegler authored
-
- Mar 09, 2020
-
-
Martin Weinelt authored
-
David Lutz authored
-
Jan Alexander authored
-
- Mar 08, 2020
-
-
Martin Weinelt authored
Resolves #1929
-
- Mar 07, 2020
-
-
David Bauer authored
(cherry picked from commit 447595f0)
-
David Bauer authored
(cherry picked from commit 1566324f)
-
Martin Weinelt authored
-
- Feb 20, 2020
-
-
Andreas Ziegler authored
fixes #1935 found by @lrnzo
-
- Feb 14, 2020
-
-
Martin Weinelt authored
- Feb 10, 2020
-
-
Martin Weinelt authored
This reverts commit 4e070312. The recommendation is not sufficient at this time, so revert it. See #1898 for further discussion.
-
- Feb 04, 2020
-
-
David Bauer authored
(cherry picked from commit 63ebeb25)
-
David Bauer authored
(cherry picked from commit f1f188f8)
-
- Feb 03, 2020
-
-
Ralf Jung authored
respondd address
-