Skip to content
Snippets Groups Projects
  1. Jan 05, 2024
    • Tom Herbers's avatar
      gluon-mesh-vpn-tunneldigger: drop package (#3109) · e0d649c3
      Tom Herbers authored
      The Gluon Tunneldigger protocol handler hasn't received the care and
      attention a core package, especially a VPN protocol, should.
      
      Due to the works in #2102 it's no longer required to maintain
      VPN handlers in the Gluon Core and they can be instead included via a
      package feed.
      
      Users who wish to continue using a supported core Gluon package are
      encouraged to take a look at fastd in conjunction with it's null@l2tp method.
      It offers roughly the same performance (it's using the same principle
      of operation) and supports connections via IPv6 as a bonus.
      
      In general it should be possible to change the VPN used protocol
      asynchronously with a normal update.
      
      If Gluon users wish to continue using tunneldigger the recomendation
      is to participate in the development of tunneldigger inside our
      community-packages.
      e0d649c3
  2. Dec 21, 2023
  3. Nov 06, 2023
  4. Oct 31, 2023
  5. Jan 09, 2023
  6. Jul 07, 2022
  7. May 21, 2022
    • lemoer's avatar
      gluon-mesh-vpn-*: make vpn MTU provider specific · 7c81897b
      lemoer authored
      If a community uses different vpn providers, they typically
      assume the same MTU for the wan device underneath the VPN. As
      different VPN providers however have different overhead, the MTU
      of the VPN device differs for each provider. Therefore this
      commit makes the MTU of the VPN device provider specific.
      
      This has two advantages:
      1. The same site.conf can used to bake firmwares for different
         VPN providers (only by selecting a diferent vpn feature in the
         site.mk).
      2. We are coming closer to the option of integrating multiple VPN
         providers into one firmware.
      7c81897b
  8. May 06, 2022
  9. Oct 07, 2021
    • Matthias Schiffer's avatar
      Set PKG_VERSION in gluon.mk · f419db58
      Matthias Schiffer authored
      This removes PKG_VERSION and PKG_RELEASE from most Makefiles, as the
      value was never useful for Gluon packages; instead, PKG_VERSION is set
      to 1 in gluon.mk.
      
      It also removes two other weird definitions:
      
      - gluon-iptables-clamp-mss-to-pmtu replicating the old PKG_VERSION logic
        from gluon-core, but without the fixed PKG_BUILD_DIR to prevent
        unnessary rebuilds
      - gluon-hoodselector set GLUON_VERSION=3
      f419db58
  10. Sep 14, 2021
    • lemoer's avatar
      gluon-mesh-vpn-wireguard: add package (#2168) · 3f7c0b3a
      lemoer authored
      The address of the vpn interface is calculated in the style of
      modified EUI-64, based on a virtual mac address. This virtual mac
      address consists of 0x00 as first byte and the other five bytes
      are taken from the first bytes of md5sum(base64 encoded public key).
      
      The algorithm was taken by the ffmuc, with a slight difference. ffmuc
      calculated the result of md5sum(base64 encoded public key + '\n')
      which was interpreted as accidential fault and therefore dropped.
      
      Example:
      - Public-Key: "gP3VJnTTvnQut+z4O+m0N9RgMyXbgyUbUkF3E3TKX2w="
      - Address: "fe80::02ca:b8ff:fedc:2eb3"
      
      The following interfaces are used for wireguard:
      - wg_mesh  -> wireguard interface
      - mesh-vpn -> vxlan iface on top of wg_mesh
      
      If you use this new feature, make sure the NTP servers in your site
      config are publicly reachable. This is necessary, since wireguard
      requires correct time before the vpn connection is established.
      Therefore gluon performs ntp time synchronisation via WAN before it
      establishes the vpn connection. Therefore the NTP servers have to
      be publicly reachable (and not only via mesh).
      3f7c0b3a
  11. Jul 13, 2021
  12. Jun 16, 2021
  13. Jun 14, 2021
  14. Jun 07, 2021
  15. Jun 04, 2021
  16. May 22, 2021
    • David Bauer's avatar
      mesh-vpn: fully abstract VPN methods · 98a1c196
      David Bauer authored
      
      This fully abstracts VPN methods, making gluon-mesh-vpn-fastd and
      gluon-mesh-vpn-tunneldigger completely self-contained.
      
      Provide a LUA interface for generic interacting with VPN methods in
      gluon-mesh-vpn-core and web packages.
      
      This also adds the ability to install tunneldigger and fastd to the same
      image, selecting the VPN method based on the selected domain.
      
      Signed-off-by: default avatarDavid Bauer <mail@david-bauer.net>
      98a1c196
  17. Aug 21, 2019
    • Chrissi^'s avatar
      gluon-mesh-vpn-core: Add dependency for KERNEL_NET_ACT_POLICE · dc8149ab
      Chrissi^ authored
      This is a fix for the broken ingress traffic-shaping in gluon v2018.2.2
      and possibly earlier.
      
      For ingress traffic shaping the kernel option NET_ACT_POLICE is needed.
      Before this patch there was no dependency to this. Neither in
      gluon_core, gluon-mesh-vpn-core nor in the package.
      
      This patch adds this dependency.
      
      [Matthias Schiffer: move dependency from GLUON_CORE to gluon-mesh-vpn-core]
      
      Fixes #1790
      dc8149ab
  18. Jun 16, 2019
  19. Nov 21, 2018
    • Matthias Schiffer's avatar
      gluon-mesh-vpn-core: add gluon-wan exec wrapper · eda3aa33
      Matthias Schiffer authored
      gluon-wan is a sudo-like exec wrapper that switches the process group to
      gluon-mesh-vpn, making it use the WAN dnsmasq rather than resolving over
      the mesh.
      
      Note that this only affects DNS at the moment. Processes running under
      gluon-wan will still use the regular mesh IPv6 routing table, and not the
      WAN routing table. This is not a problem for IPv4, as there is only one
      IPv4 routing table.
      
      Fixes #1575
      eda3aa33
  20. Aug 24, 2018
  21. Jul 25, 2018
  22. Jul 17, 2018
  23. Apr 13, 2018
  24. Mar 08, 2018
  25. Mar 07, 2018
  26. Feb 25, 2018
  27. Feb 04, 2018
    • Martin Weinelt's avatar
      gluon-mesh-vpn-core: add public key to nodeinfo response · 42763d21
      Martin Weinelt authored
      This is currently only implemented in the gluon-mesh-vpn-fastd
      package.
      
      Advertising the public key may be deemed problematic when
      your threat-model involves protecting the nodes privacy
      from tunnel traffic correlation by onlink observers.
      
      It can be enabled by setting site.mesh_vpn.fastd.pubkey_privacy
      to `false`.
      42763d21
  28. Jan 19, 2018
    • Matthias Schiffer's avatar
      treewide: rework check_site_lib.lua · 7ccdacd2
      Matthias Schiffer authored
      In addition to significant internal differences in check_site_lib.lua (in
      particular unifying error handling to a single place for the upcoming
      multi-domain support), this changes the way fields are addressed in site
      check scripts: rather than providing a string like 'next_node.ip6', the
      path is passed as an array {'next_node', 'ip6'}.
      
      Other changes in site check scripts:
      * need_array and need_table now pass the full path to the sub fields to the
      subcheck instead of the key and value
      * Any check referring to a field inside a table implies that all higher
      levels must be tables if they exist: a check for {'next_node', 'ip6'} adds
      an implicit (optional) check for {'next_node'}, which allows to remove many
      explicit checks for such tables
      7ccdacd2
    • lemoer's avatar
      treewide: forbid use of selected site variables in domain specific or site configs · 50812b16
      lemoer authored
      [Matthias schiffer: rebase, add a few more restrictions]
      50812b16
  29. Aug 11, 2017
  30. Aug 07, 2017
  31. Mar 26, 2017
  32. Mar 10, 2017
Loading