danitool has quit [Quit: Cubum autem in duos cubos, aut quadratoquadratum in duos quadratoquadratos]
tersono has joined #openwrt-devel
tersono has quit [Remote host closed the connection]
tersono has joined #openwrt-devel
<tersono>
I'm just updating a feed of packages to build on OpenWrt 24.10; it looks like the PKG_MIRROR_HASH for packages that use PKG_SOURCE_PROTO:=git changes between 23.x and 14.10 due to the change to compress as zst by default. Is this expected?
hanetzer1 has joined #openwrt-devel
hanetzer has quit [Ping timeout: 480 seconds]
<tersono>
Actually, even manually setting a .xz extension in PKG_SOURCE doesn't result in matching hashes because the PKG_VERSION is now in a slightly different format and a change related to gitattributes results in the .gitmodules file no longer being in the archive. So overall it looks like supporting different OpenWrt versions in the same feed is an uphill battle?
Nilsro has joined #openwrt-devel
Nilsro_ has quit [Ping timeout: 480 seconds]
<dwfreed>
you could set PKG_MIRROR_HASH based on which openwrt version is being built
dansan has quit []
dansan has joined #openwrt-devel
tersono has quit [Ping timeout: 480 seconds]
tersono has joined #openwrt-devel
tersono has quit [Ping timeout: 480 seconds]
tersono has joined #openwrt-devel
eluks has quit [Remote host closed the connection]
<Cahata>
hello, ngircd package still in 26.1-r1 version instead of 27 (alredy there from 2024-04-26 )
<Cahata>
26.1-r1 still have nasty flaw is there version 27 as package in future ? its still only ircd in the world who can run without services with predefined channels and mods great for minimal ircd on router
aiyion_ has quit [Remote host closed the connection]
tersono has quit [Ping timeout: 480 seconds]
Cahata has quit [Remote host closed the connection]
aiyion_ has joined #openwrt-devel
ssterlingg has joined #openwrt-devel
ssterling has quit [Ping timeout: 480 seconds]
tersono has joined #openwrt-devel
tersono has quit [Ping timeout: 480 seconds]
funkpumpr has quit []
funkpumpr has joined #openwrt-devel
tersono has joined #openwrt-devel
tersono has quit [Ping timeout: 480 seconds]
tersono has joined #openwrt-devel
tersono has quit [Ping timeout: 480 seconds]
sorinello has quit [Read error: Connection reset by peer]
sorinello has joined #openwrt-devel
tersono has joined #openwrt-devel
tersono has quit [Ping timeout: 480 seconds]
tersono has joined #openwrt-devel
tersono has quit [Ping timeout: 480 seconds]
tersono has joined #openwrt-devel
tersono has quit [Ping timeout: 480 seconds]
gromero has joined #openwrt-devel
n3ph_ has joined #openwrt-devel
n3ph has quit [Ping timeout: 480 seconds]
hanetzer has joined #openwrt-devel
hanetzer1 has quit [Ping timeout: 480 seconds]
tersono has joined #openwrt-devel
tersono has quit [Ping timeout: 480 seconds]
Sawzallz has quit [Read error: Connection reset by peer]
guerby has quit [Remote host closed the connection]
guerby has joined #openwrt-devel
tersono has quit [Ping timeout: 480 seconds]
goliath has quit [Quit: SIGSEGV]
tersono has joined #openwrt-devel
tersono has quit [Ping timeout: 480 seconds]
SlimeyX_ has joined #openwrt-devel
SlimeyX has quit [Read error: Connection reset by peer]
SlimeyX_ is now known as SlimeyX
minimal has joined #openwrt-devel
tersono has joined #openwrt-devel
tersono has quit [Ping timeout: 480 seconds]
tersono has joined #openwrt-devel
<f00b4r0>
hmm, is there a new wifi exploit in the wild? I'm seeing some strange MAC addresses registered to "Tuya Smart Inc." that seems to "auth" (how?) without acknowledging auth response to all broadcasted SSIDs from a given AP and do something that eventually results in a kernel panic (rcu-sched stall after list_del corruption in napi/phy) on mt76/mt7915e
<f00b4r0>
schmars[m]: ever seen something like that?
<f00b4r0>
24.10 ends up crashing. 23.05 seems to survive this madness
<nbd>
f00b4r0: can you please show me traces?
<dwfreed>
f00b4r0: it's less likely an exploit and more likely some really stupid IoT garbage just trying every visible SSID
<dwfreed>
Tuya is a brand of IoT stuff
<f00b4r0>
my impression as well however the fact that they apparently auth to WPA-enabled SSIDs is, well, weird
<f00b4r0>
then again I don't know the physical setup, it's possible someone did something stupid. It also tries to assoc to multiples BSSIDs (multiple APs broadcasting the same SSID)
<f00b4r0>
nbd: I'll dump that for you
<dwfreed>
does hostapd say they're successful? or are they just starting the 4 way handshake and failing
<f00b4r0>
hostapd reports "auth=true" in get_clients ubus call
<f00b4r0>
the logs are littered with 'daemon.notice hostapd: phy0-ap2: STA c4:82:e1:ae:93:07 IEEE 802.11: did not acknowledge authentication response'