Commit Graph

876 Commits

Author SHA1 Message Date
Ad Schellevis 13b85f7145 security/wazuh-agent - change Phalcon\Messages\Message to native implementation 2024-05-02 16:55:17 +02:00
Frank Wall 59fa924ba1 security/acme-client: bump version 2024-04-29 12:27:35 +02:00
mkerost 60d626b568
Update LeCommon.php (#3936)
Match acme.sh settings where debug 2 should have corresponding syslog = 8, and debug 3 should have corresponding syslog = 9
2024-04-29 12:26:23 +02:00
Franco Fichtner ee0f83169a security/openconnect: fiddle with wording 2024-04-24 09:26:20 +02:00
Ad Schellevis 5c1ecf0ba5 security/openconnect - minot model fix for https://github.com/opnsense/plugins/pull/3815 2024-04-12 11:41:33 +02:00
Ad Schellevis 447b8cd5cc security/openconnect - template safety and versioning for https://github.com/opnsense/plugins/pull/3815 2024-04-12 09:29:48 +02:00
Robert Zaage 971b4da0cf os-openconnect: Added option to enable the use of insecure ciphers
Committer: Robert Zaage <robert@zaage.it>
2024-04-12 09:29:48 +02:00
Frank Wall 5877048d98 security/acme-client: update changelog 2024-04-09 12:03:40 +02:00
Alex d1d17ce43f
security/acme-client: add support for Oracle Cloud Infrastructure DNS API (#3901)
* Add support for Oracle Cloud (OCI)
2024-04-09 11:58:10 +02:00
Frank Wall 0262a19125 security/acme-client: bump version, update changelog 2024-04-08 23:37:26 +02:00
Frank Wall f6422ce2f6 security/acme-client: fix PHP deprecation warnings, closes #3892 2024-04-08 23:33:04 +02:00
realizelol 0eb9557470
security/acme-client: Add support for dnshome DNS API (#3882)
* Add DNSHome to AcmeClient
2024-04-08 23:21:42 +02:00
Michael Klein e18f0ef182 security/acme-client: add support for ArtFiles DNS API 2024-03-21 12:26:28 +01:00
Franco Fichtner 6ba4fb33c1 security/wazuh-agent: update changelog 2024-03-14 08:59:35 +01:00
Franco Fichtner 85a27147c4 plugins: style sweep 2024-03-14 08:49:45 +01:00
Ad Schellevis f1b3c4216a security/wazuh-agent - prevent model usage in wazuhagent_services()
The wazuh model uses configd for additional info, which makes model initialization a bit slower than usual.
When only checking if the module is used, accessing the config object saves a lot of time.
2024-03-13 19:56:24 +01:00
Frank Wall 79100ac003 security/acme-client: update changelog, refs #3813 2024-02-19 18:21:27 +01:00
Frank Wall 67dcafefc3
Merge pull request #3813 from kulikov-a/acme_validation_libs_typos
security/acme-client: http/tlsalpn libs typos
2024-02-19 18:19:59 +01:00
Frank Wall f59272aaac
Merge pull request #3806 from fraenki/acme_410
security/acme-client: release 4.1
2024-02-19 17:02:21 +01:00
Franco Fichtner a9ac58d7e4 security/intrusion-detection-content-et-open: revision bump 2024-02-14 07:08:49 +01:00
kulikov-a 2689644b73 http/tlsapln libs typos
json_decode backend response before use;
strict type
2024-02-10 19:49:48 +03:00
Frank Wall 20b7e65bc8 security/acme-client: bump version 2024-02-07 10:47:59 +01:00
Frank Wall 84644d4ad8 security/acme-client: remove dead code, refs #3790 2024-02-07 10:45:08 +01:00
Ad Schellevis 91633cc556 security/intrusion-detection-content-pt-open - remove deprecated ruleset. closes https://github.com/opnsense/plugins/issues/3803 2024-02-07 08:47:35 +01:00
mvmazijk 81a10d1b5e
Update et-open-extra.xml (#3802)
Because of the changes in #3797 the etpro-telemetry group botcc_portgrouped got renamed to "emerging-botcc_portgrouped".
This caused a double entry for
"ET open/botcc.portgrouped" when both the et-open and etpro-temetry ruleset are installed.

This PR fixes that double entry.
2024-02-06 21:29:08 +01:00
Franco Fichtner 5dcd95278f security/etpro-telemetry: bump 2024-02-06 08:59:57 +01:00
Franco Fichtner 8802430155 security/intrusion-detection-content-et-open: bump 2024-02-06 08:58:37 +01:00
mvmazijk 32fd9927a3
Update et-telemetry.xml (#3797)
Fixed typo in emerging-botcc_portgrouped.rules
2024-02-05 17:33:16 +01:00
0nnyx 60d35cf8bc
Update et-open-extra.xml (#3795)
Avoid duplicate 3coresec and threatview_CS_c2
Tested and working properly now : 
	ET open/3coresec	not installed		
	ET open/botcc	not installed		
	ET open/botcc.portgrouped	not installed		
	ET open/ciarmy	not installed		
	ET open/compromised	not installed		
	ET open/drop	not installed		
	ET open/dshield	not installed		
	ET open/emerging-activex	not installed		
	ET open/emerging-adware_pup	not installed		
	ET open/emerging-attack_response	not installed		
	ET open/emerging-chat	not installed		
	ET open/emerging-coinminer	not installed		
	ET open/emerging-current_events	not installed		
	ET open/emerging-deleted	not installed		
	ET open/emerging-dns	not installed		
	ET open/emerging-dos	not installed		
	ET open/emerging-exploit	not installed		
	ET open/emerging-exploit_kit	not installed		
	ET open/emerging-ftp	not installed		
	ET open/emerging-games	not installed		
	ET open/emerging-hunting	not installed		
	ET open/emerging-icmp	not installed		
	ET open/emerging-icmp_info	not installed		
	ET open/emerging-imap	not installed		
	ET open/emerging-inappropriate	not installed		
	ET open/emerging-info	not installed		
	ET open/emerging-ja3	not installed		
	ET open/emerging-malware	not installed		
	ET open/emerging-misc	not installed		
	ET open/emerging-mobile_malware	not installed		
	ET open/emerging-netbios	not installed		
	ET open/emerging-p2p	not installed		
	ET open/emerging-phishing	not installed		
	ET open/emerging-policy	not installed		
	ET open/emerging-pop3	not installed		
	ET open/emerging-rpc	not installed		
	ET open/emerging-scada	not installed		
	ET open/emerging-scan	not installed		
	ET open/emerging-shellcode	not installed		
	ET open/emerging-smtp	not installed		
	ET open/emerging-snmp	not installed		
	ET open/emerging-sql	not installed		
	ET open/emerging-telnet	not installed		
	ET open/emerging-tftp	not installed		
	ET open/emerging-user_agents	not installed		
	ET open/emerging-voip	not installed		
	ET open/emerging-web_client	not installed		
	ET open/emerging-web_server	not installed		
	ET open/emerging-web_specific_apps	not installed		
	ET open/emerging-worm	not installed		
	ET open/threatview_CS_c2	not installed		
	ET open/tor	not installed
2024-02-05 09:21:32 +01:00
0nnyx 6c0f6d9049
Update et-open-extra.xml (#3794) 2024-02-04 20:06:51 +01:00
Mike Bishop 1beca17cb9
[os-tor] MyFamily (#3698) 2024-01-25 20:38:16 +01:00
Franco Fichtner c4c0c2b4af src: style sweep 2024-01-25 17:13:02 +01:00
Frank Wall e96c384212 security/acme-client: bump version 2024-01-25 15:59:34 +01:00
Frank Wall 1eae27c69f security/acme-client: deprecate lexicon, refs #2920 2024-01-17 22:52:17 +01:00
Frank Wall a99bfebb71 security/acme-client: update changelog, refs #3684 2024-01-11 00:29:44 +01:00
Frank Wall 225173a562 security/acme-client: add support for rage4 DNS API 2024-01-11 00:27:39 +01:00
Frank Wall 0da8174c36 security/acme-client: add support for Rackspace DNS API 2024-01-11 00:27:39 +01:00
Frank Wall b76b978fe7 security/acme-client: add support for PointHQ DNS API 2024-01-11 00:27:39 +01:00
Frank Wall 8a4f7ac2fd security/acme-client: add support for internetbs.net DNS API 2024-01-11 00:27:39 +01:00
Frank Wall 80206e3d6f security/acme-client: add support for Exoscale DNS API 2024-01-11 00:27:39 +01:00
Frank Wall 6db88d7ce0 security/acme-client: add support for Constellix DNS API 2024-01-11 00:27:39 +01:00
Frank Wall 2b8c1f6679 security/acme-client: add support for ConoHa DNS API 2024-01-11 00:27:39 +01:00
Frank Wall 2ce4b5ca38 security/acme-client: add support for Aurora DNS API 2024-01-11 00:27:11 +01:00
Frank Wall cd327d04b2 security/acme-client: update changelog, refs #3752 2024-01-11 00:25:35 +01:00
Frank Wall 64f2f3f082 security/acme-client: fix shell processes getting stuck, refs #3745
This deals with the following issues that occured while performing
extensive testing:
- acme.sh processes got stuck forever
- PHP memory exhaustion
- PHP processes with high CPU usage
2024-01-11 00:25:35 +01:00
Frank Wall 7e73d5ab87 security/acme-client: add support for duplicate common names, fixes #3127 2024-01-11 00:25:35 +01:00
Mihail 7f8612f800
security/acme-client: Add nic API dns challenge type (#3684) 2024-01-11 00:24:09 +01:00
Greg Glockner d92bb27d87
Fix crash on ACME automations (#3752) 2024-01-09 17:25:05 +01:00
Frank Wall e6742e3169 security/acme-client: fix command failure with gcloud, refs #3745 2024-01-08 22:25:14 +01:00
Frank Wall f7837735ed security/acme-client: use common function to run shell commands 2024-01-06 16:38:05 +01:00