Skip to content
Snippets Groups Projects
  1. Aug 28, 2020
  2. Aug 14, 2020
  3. Aug 07, 2020
  4. Aug 06, 2020
    • Michal Hrusecky's avatar
      sentinel-i_agree_with_eula: Fix name of install section · f3424e92
      Michal Hrusecky authored
      Fixes: 9fde67a1
      ("sentinel-i_agree_with_eula: New package to agree with eula")
      f3424e92
    • Karel Koci's avatar
      sentinel-dynfw-client: version 1.4.0 · c9b8b7d8
      Karel Koci authored
      Added
      * Argument `--renew` that automatically receives latest version of server
        certificate on client startup
      * Argument `--cert-url` to specify URL used to get server's certificate
        when `--renew` is used
      
      This also moves startup to be more in line with firewall and network.
      Dynamic firewall should start as soon as it makes sense and that is
      right after we have firewall configured (S19) and network set up (S20).
      That makes start with S25 good option. We also stop it way later before
      all network components are being stopped.
      c9b8b7d8
    • Martin Prudek's avatar
      sentinel-nikola: version 3.2.1 · 260abd5b
      Martin Prudek authored
      Fixed
          * Crash caused by wrong default logrotate config file location
      260abd5b
  5. Aug 05, 2020
    • Karel Koci's avatar
      sentinel-nikola: version 3.2.0 · 7bd2be34
      Karel Koci authored
      Fixed
      * Crash when syslog-ng was restarted by Nikola and log was send to it by
        Nikola
      
      Changed
      * Executable renamed from `nikola` to `sentinel-nikola`
      * Python package renamed from `nikola` to `sentinel_nikola`
      * Cron now runs shell script that checks if EULA was approved as well as
        if Nikola is enabled before running it.
      * Syslog-ng now filters packets with DROP fate as well as REJECT
      7bd2be34
  6. Aug 04, 2020
  7. Aug 03, 2020
  8. Jul 28, 2020
  9. Jul 27, 2020
  10. Jul 26, 2020
    • Karel Koci's avatar
      sentinel-nikola: fix messages filter in syslog-ng · 661b0aa3
      Karel Koci authored
      Without this change iptables messages are included in /var/log/messages
      as well as in our target. That means without this we are not filtering
      them from default log. The reason is that source for standard log is
      defined before source for nikola's log. This means that filter is
      applied late.
      
      Syslog-ng's scls are included before main config while standard configs
      are appended. Including them so soon makes filter effective.
      661b0aa3
  11. Jul 24, 2020
  12. Jul 23, 2020
  13. Jul 22, 2020
  14. Jul 13, 2020
    • Karel Koci's avatar
      sentinel-proxy: enable components by default · 15ddb655
      Karel Koci authored and Karel Koci's avatar Karel Koci committed
      The idea is that once user agrees with EULA that all components should
      be able to start. If user does not want to run some component then he
      can selectively disable it. The opposite that user would have to enable
      every single component is contra-productive for our use case when we
      want all users automatically have all new components enabled otherwise
      just few users would enable it.
      15ddb655
    • Karel Koci's avatar
      sentinel-proxy: tweak sentinel.sh · 9d7926bf
      Karel Koci authored and Karel Koci's avatar Karel Koci committed
      This changes code little bit.
      It uses tabs instead of spaces. Most of our shell code uses tabs. It is
      not a huge issue but when I was at it it makes sense to flip it.
      Prints now do not state that "start" failed but rather print generic
      error. In other words: "Failed to start" is removed. The reason is that
      this is not used just in components doing start but rather in any
      case checking if component is enabled or not.
      The last tweak is that some unnecessary returns were removed and
      general code was tweak little bit to be more clean (such as replacement
      of multi-line string with cat<<EOF.
      9d7926bf
  15. Jul 08, 2020
  16. Jul 02, 2020
  17. Jul 01, 2020
  18. Jun 29, 2020
    • Martin Prudek's avatar
      sentinel-proxy: Install cert as data, no bin · 9e14a426
      Martin Prudek authored
      Install DATA means chmod 0644 instead of 755 (BIN)
      9e14a426
    • Martin Prudek's avatar
      sentinel-proxy: add dependency for EULA and more info about it · 201e747e
      Martin Prudek authored
      Dependency for EULA was added even proxy can run without it, but most of
      the time, you will have proxy with minipot and/or nikola. In the proxy
      package, there is a configuration file for each sentinel part.
      
      While at it add details where you can found EULA and how you can agree
      with it.
      201e747e
    • Martin Prudek's avatar
      sentinel-nikola: Release v3.1.0 · 3936bbab
      Martin Prudek authored
      3936bbab
    • Martin Prudek's avatar
      c986637d
    • Karel Koci's avatar
      sentinel-proxy: tweak package to be consistent with other ones · 2f7980eb
      Karel Koci authored
      Other sentinel packages and packages in general name uci-default scripts
      simly as uci-default (same as init file is just init). This also enables
      execution flag on exacutable files. They are installed as executable but
      it is good practice to have them set as executable in repository as
      well.
      2f7980eb
    • Karel Koci's avatar
      collect: join common code from uci-defaults · 59e88bbb
      Karel Koci authored
      This was pretty mich the same code with exception of field to be set.
      All of those packages depend on sentinel-firewall and it is tied to
      actiovation of it. This makes sentinel-firewall an ideal package to
      place common code to.
      59e88bbb
    • Karel Koci's avatar
      sentinel-nikola: use sentinel-firewall for firewall configuration · 261e7712
      Karel Koci authored
      This uses same log output as firewall3 is but this can be modified later
      on to not interfere with user's specified logging.
      This also opens doors for future usage of NFLOG instead of kernel
      messages.
      261e7712
    • Karel Koci's avatar
    • Karel Koci's avatar
      haas-proxy: use sentinel-firewall instead of UCI · 113f4c72
      Karel Koci authored and Karel Koci's avatar Karel Koci committed
      HaaS is not technically part of Sentinel but it needs pretty much the
      same machinery.
      113f4c72
    • Karel Koci's avatar
      sentinel-dynfw-client: replace UCI configs with sentinel-firewall · 694d859d
      Karel Koci authored and Karel Koci's avatar Karel Koci committed
      694d859d
    • Karel Koci's avatar
      sentinel-firewall: add firewall configuration loader for sentinel · cc8f68fe
      Karel Koci authored and Karel Koci's avatar Karel Koci committed
      This introduces new approach to configure updater. The problem with
      previous solution, that was in the fact grand new, was it overall
      chatiness. On one side it allowed users to modify and create their own
      firewall. On the other side it was easy to break it and required lot of
      things to go right.
      
      Few notable problems are:
      * Updates of user specified rules if configuration needed for Sentinel
        to work changes is pretty much impossible.
      * Firewall3 in reality ignores in some cases (as for example mangle)
        source and target zone specification.
      * Not all configurations supported by firewall3 are visible in Luci and
        modifying such rule in Luci resulted in wrong config. This was most
        probably caused by invalid rule interpretation in Luci and could be
        fixed.
      * Every projects had their own rule to bypass dynamic firewall and
        duplicate co to add it to firewall configuration.
      
      Replacing UCI configured rules with script that inserts appropriate
      rules gives us more freedom in how we do stuff. It is for example easy
      to more precisely filter traffic. It is possible to insert rules to the
      beginning to prepend all other possible rules (that was not as easy done
      with just using UCI configs).
      
      In core this package only adds import rule to UCI firewall for script
      that later runs all executable files from specific directory. This
      script based design also easily allows sharing of the code and
      functionality. This means for example that dynamic firewall knows how to
      bypass its blocking rule and provides library to other scripts to just
      specify port and protocol to bypass.
      cc8f68fe
  19. Jun 26, 2020