Thomas Bernard
98cc9f1b43
miniupnpd.init.d.script: also run ip6tables_init/ip6tables_removeall scripts
...
for support of IPv6
see https://miniupnp.tuxfamily.org/forum/viewtopic.php?t=2338
2023-01-21 13:00:03 +01:00
Thomas Bernard
f4a739d730
miniupnpd version 2.3.2
2023-01-20 00:25:03 +01:00
Thomas Bernard
62e2ea175f
miniupnpd/Changelog.txt: Fix NFTables again (RULE_HANDLE using more than 32 bits)
...
see #582
2023-01-15 18:43:09 +01:00
Thomas Bernard
904dda47ed
nftnlrdr_misc.c: replace nftnl_rule_get_data() usage with specific nftnl_rule_get_*() functions
...
nftnl_rule_get_u32()
nftnl_rule_get_u64()
nftnl_rule_get_str()
closes #641
should fix #582
2023-01-14 19:18:37 +01:00
Thomas Bernard
67ea8c8bc3
nftnlrdr_misc.c: debug message about proto_min_reg/proto_min_val
2023-01-14 19:16:40 +01:00
Thomas Bernard
a1535b0488
2022
2022-10-21 21:36:05 +02:00
Thomas Bernard
fd62384959
miniupnpd: add option to match rules description with regex
2022-10-21 21:35:50 +02:00
yangfl
2ff8cb17da
miniupnpd: Add option to match rules with regex
...
Some reports that a certain app is abusing UPnP for exploiting upload
bandwidth. This commit adds support to restrict UPnP rules to a regex.
By matching requester's description string against rule's regex, this
will make some obstacles for that app.
2022-10-21 21:26:39 +02:00
Thomas Bernard
eb07f0c466
miniupnpd 2.3.1
2022-10-16 08:03:35 +02:00
Thomas Bernard
a4e12c01c4
miniupnpd: move READNU32/WRITENU32/etc. to rw_unaligned.h
2022-10-16 07:54:38 +02:00
Thomas Bernard
c13a4b15f1
upnpdescgen.c: include macros.h for UNUSED
...
fixes 3a2b15af4c
2022-10-16 07:43:42 +02:00
Thomas BERNARD
3f6350da6a
Merge pull request #630 from miniupnp/issue-628
...
fixes Issue 628 - bug on big endian
2022-10-16 07:33:19 +02:00
Thomas Bernard
3a2b15af4c
miniupnpd: fix warnings when compiling with IGD_V2 disabled
...
fixes #617
./upnpdescgen.c:946:1: warning: unused label 'unstack' [-Wunused-label]
unstack:
^~~~~~~~
./upnpdescgen.c:891:12: warning: unused parameter 'force_igd1' [-Wunused-parameter]
int force_igd1)
^
./upnpdescgen.c:1035:61: warning: unused parameter 'force_igd1' [-Wunused-parameter]
genServiceDesc(int * len, const struct serviceDesc * s, int force_igd1)
^
3 warnings generated.
2022-10-15 13:09:36 +02:00
Thomas Bernard
61127ca0be
nftnlrdr_misc.c: expr_set_reg_val_u16() has uint16_t arg
2022-10-10 02:33:04 +02:00
Thomas Bernard
890e4ec218
nftnlrdr_misc.c: fix parse_rule_immediate()
...
so it works correctly on both little endian and big endian CPUs
should fix #628
2022-10-10 02:32:58 +02:00
Thomas Bernard
8bbe1c1339
remove useless UNUSED()
2022-10-10 01:23:26 +02:00
Thomas Bernard
fa190f294a
pcpserver.c: fix type LOG_WARN => LOG_WARNING
...
fixes #620
2022-08-25 23:52:23 +02:00
Thomas Bernard
7b45ec940a
update changelog.
...
fixes #611
2022-08-06 11:27:35 +02:00
Thomas Bernard
b8d66c5f7c
pcpserver.c: rewrite DeletePCPMap() to work with netfilter_nft
...
try to fix #611
2022-07-01 07:15:36 +02:00
Thomas Bernard
16366f5db4
add debug logs in DeletePCPMap
2022-06-19 19:41:32 +02:00
Thomas Bernard
0cc037f8b0
update miniupnpd/Changelog.txt
2022-06-02 01:26:37 +02:00
Thomas Bernard
1cdf9ba744
Merge branch '529-port-triggering-openbsd'
...
fixes #529
2022-06-02 01:19:53 +02:00
Thomas Bernard
b734f94bdf
pcpserver.c: improve DeletePCPMap() error message
2022-05-18 11:25:32 +02:00
Thomas Bernard
047fe367dd
miniupnpd: improve configure script for cross builds
2022-05-18 09:55:52 +02:00
Thomas Bernard
2ede47be46
pf/obsdrdr.c: better document PFRULE_INOUT_COUNTS and PF_NEWSTYLE
2022-05-18 08:34:16 +02:00
Thomas Bernard
a255df2488
Dont create nat rule for Port Triggering, but a pass rule
...
should fix #529
2022-05-18 08:32:42 +02:00
Thomas Bernard
a6ca2b14c5
miniupnpd/nftnldr.c: init local var in update_portmapping()
...
see https://github.com/miniupnp/miniupnp/pull/607
rhost is not currently in use, but it might be some day.
2022-04-21 00:19:45 +02:00
Thomas Bernard
fda61180e0
iptpinhole.c: check inet_pton() return values
2022-03-19 18:50:58 +01:00
Thomas Bernard
c8476e6f16
miniupnpd.init.d.script: support nftables
...
fixes #594
2022-02-19 23:49:18 +01:00
Thomas Bernard
89c6556338
miniupnpd/ipfw: make it clear it is not working under FreeBSD
2022-02-19 22:49:14 +01:00
Thomas Bernard
c0d3a17650
pf: Use private WAN IP for NAT in double NAT setups
...
fixes #598
2022-02-19 20:19:34 +01:00
Thomas Bernard
5231397bd6
update Changelog and comments about commit 9500253
2022-02-19 20:03:30 +01:00
Thomas BERNARD
9e042264fa
Merge pull request #599 from jow-/master
...
Expose `USE_GETIFADDRS` and tweak `getifaddr()` behaviour
2022-02-19 18:50:39 +01:00
Sergey Ponomarev
af812c8775
Refine LICENSE so github can understand it ;)
...
see #592
also replace project specific files to symbolic link
2022-02-19 18:38:48 +01:00
Jo-Philipp Wich
95002535b3
getifaddr.c: prefer non-reserved over reserved addresses in `getifaddr()`
...
When iterating interface addresses obtained via `getifaddrs()`, don't
stop at the first found IPv4 address but continue checking all IPv4
addresses and prefer to use a non-reserved one in case an interface
has both reserved (private) and non-reserved (public) addresses
assigned.
After this fix, miniupnpd on OpenWrt is able to properly detect the
external IP address of an external interface with both a private
RFC1918 and a public IP assigned regardless of whether `getifaddrs()`
happens to return the private or the public IPv4 address first.
Signed-off-by: Jo-Philipp Wich <jo@mein.io>
2022-02-16 17:58:42 +01:00
Jo-Philipp Wich
a28dec3c2d
configure: expose USE_GETIFADDRS configuration
...
The miniupnpd sources contain a working getifaddrs() based implementation
to fetch the IP address of an interface but that implementation is guarded
by a USE_GETIFADDRS define which can only be passed manually via CFLAGS.
Introduce a new `--getifaddrs` option to the configure script which can be
used to explicitly enable `getifaddrs()` usage.
Also extend the OpenWrt configuration case to enable `getifaddrs()` since
OpenWrt ships with a working implementation of it since several years
already.
Signed-off-by: Jo-Philipp Wich <jo@mein.io>
2022-02-16 17:54:01 +01:00
Sergey Ponomarev
1479881003
minixml.c sync sources
...
In the commit a0573e2518
was fixed a buffer overflow in the minixml.c but it wasn't copied to upnpc-async.
To make comparison simpler the header was also synced
2022-01-27 11:29:16 +02:00
Thomas Bernard
9df2f43e08
miniupnpd: VERSION 2.3.0
2022-01-23 01:25:49 +01:00
Thomas Bernard
6576eb611b
version 2.3.0
2022-01-23 01:19:01 +01:00
Thomas Bernard
545d2b421c
2022
2022-01-23 01:18:49 +01:00
Brian John
87776e8345
Split "NAT" and "TABLE" for consistency
2022-01-01 16:58:55 -06:00
Brian John
8d061ecf65
Fix typo: should check for `$NAT_TABLE`
2022-01-01 16:17:31 -06:00
Brian John
69f01ffcc8
Spelling fix: routeing --> routing
2022-01-01 16:15:54 -06:00
Thomas Bernard
78823d762e
README.md: updated. fix titles
2021-12-16 00:29:39 +01:00
Thomas Bernard
2bfed34e8c
README.md: reformat chain/tables setup
...
fix 3129683cb3
2021-12-16 00:27:57 +01:00
Thomas Bernard
1a5cdc0a13
remove space before eol
2021-12-02 00:35:51 +01:00
Thomas Bernard
af0ee582d9
commonrdr.h: 2021
2021-12-02 00:06:24 +01:00
Thomas Bernard
97aa00f076
miniupnpd/Changelog.txt: update regarding #584 / 3129683c
2021-12-02 00:06:24 +01:00
Thomas Bernard
46ecef1365
miniupnpd.conf: default table name changed with #584 / 3129683c
2021-12-02 00:06:23 +01:00
Sven Auhagen
3129683cb3
NFTables use scripts to create tables and chains
...
To hardcode table and chain creation and deletion makes it impossible
for existing firewall infrastructures to integrate miniupnpd.
NFTables will either reevaluate packets through miniupnpd or
it will delete existing tables when there are already custom chains in it.
Signed-off-by: Sven Auhagen <sven.auhagen@voleatech.de>
2021-11-28 08:08:37 +01:00