aports issueshttps://gitlab.alpinelinux.org/alpine/aports/-/issues2021-07-27T14:24:01Zhttps://gitlab.alpinelinux.org/alpine/aports/-/issues/9372Please add pure-ftpd-mysql2021-07-27T14:24:01ZBernis NukicPlease add pure-ftpd-mysqlPlease add this package:
name: pure-ftpd-mysql
home page: https://www.pureftpd.org/project/pure-ftpd
source: https://packages.ubuntu.com/bionic/pure-ftpd-mysql
*(from redmine: issue id 9372, created on 2018-09-01)*Please add this package:
name: pure-ftpd-mysql
home page: https://www.pureftpd.org/project/pure-ftpd
source: https://packages.ubuntu.com/bionic/pure-ftpd-mysql
*(from redmine: issue id 9372, created on 2018-09-01)*https://gitlab.alpinelinux.org/alpine/aports/-/issues/3400Percona MySQL2021-07-27T14:21:52ZАндрей ЗюзенковPercona MySQLIt aims to retain close compatibility to the official MySQL releases,
while focusing on performance and increased visibility into server
operations. I hope it’s not too hard to add it. Thanks!
*(from redmine: issue id 3400, created on ...It aims to retain close compatibility to the official MySQL releases,
while focusing on performance and increased visibility into server
operations. I hope it’s not too hard to add it. Thanks!
*(from redmine: issue id 3400, created on 2014-09-29)*https://gitlab.alpinelinux.org/alpine/aports/-/issues/8839Hope to support the Percona database2021-07-27T14:21:51Zrobert yuHope to support the Percona databaseHope to support the Percona database
*(from redmine: issue id 8839, created on 2018-04-25)*Hope to support the Percona database
*(from redmine: issue id 8839, created on 2018-04-25)*https://gitlab.alpinelinux.org/alpine/aports/-/issues/17Package 'ncftp-3.2.2-r1' contains deprecated .INSTALL2021-07-26T18:50:00ZNatanael CopaPackage 'ncftp-3.2.2-r1' contains deprecated .INSTALLShould be converted to new style pre-install
*(from redmine: issue id 17, created on 2009-03-24, closed on 2009-03-26)*
* Changesets:
* Revision 044bf35ebe0ece74d5a386050c69f77b82a9f0ff by Carlo Landmeter on 2009-03-25T21:39:19Z:
`...Should be converted to new style pre-install
*(from redmine: issue id 17, created on 2009-03-24, closed on 2009-03-26)*
* Changesets:
* Revision 044bf35ebe0ece74d5a386050c69f77b82a9f0ff by Carlo Landmeter on 2009-03-25T21:39:19Z:
```
extra/ncftp: switched to new install file.
fixes #17
```Carlo LandmeterCarlo Landmeterhttps://gitlab.alpinelinux.org/alpine/aports/-/issues/10407Raspberry Pi One Kernel missing from Alpine 3.9.3 (armhf)2021-07-21T02:23:17ZJoão BrázioRaspberry Pi One Kernel missing from Alpine 3.9.3 (armhf)The official release of Alpine 3.9.3 for armhf is missing the kernel and
initrd for the original Raspberry Pi model B.
Config.txt correctly lists:
[pi1]
kernel=boot/vmlinuz-rpi
initramfs boot/initramfs-rpi
But all the requ...The official release of Alpine 3.9.3 for armhf is missing the kernel and
initrd for the original Raspberry Pi model B.
Config.txt correctly lists:
[pi1]
kernel=boot/vmlinuz-rpi
initramfs boot/initramfs-rpi
But all the required files are missing from boot/.
*(from redmine: issue id 10407, created on 2019-05-07)*https://gitlab.alpinelinux.org/alpine/aports/-/issues/2002[v2.5] socat 1.2.0.0 - 1.7.2.1, 2.0.0-b1 - 2.0.0-b5 (CVE-2013-3571)2021-07-18T22:49:08ZPeter Kotcauer[v2.5] socat 1.2.0.0 - 1.7.2.1, 2.0.0-b1 - 2.0.0-b5 (CVE-2013-3571)Overview
Under certain circumstances an FD leak occurs and can be misused for
denial of service attacks against socat running in server mode.
Vulnerability Id: CVE-2013-3571
Details
The issue occurs when a vulnerable version of s...Overview
Under certain circumstances an FD leak occurs and can be misused for
denial of service attacks against socat running in server mode.
Vulnerability Id: CVE-2013-3571
Details
The issue occurs when a vulnerable version of socat is invoked with a
listen type address with option fork and one or more of the options
sourceport, lowport, range, or tcpwrap. When socat refuses a client
connection due to one of these address or port restrictions it does
shutdown() the socket but does not close() it, resulting in a file
descriptor leak in the listening process, visible with command lsof
and possibly resulting in error EMFILE “Too many open files”.
Testcase
In one terminal run the server:
socat -d tcp-listen:10000,reuseaddr,fork,range=0.0.0.0/32 pipe
In a second terminal see which FDs are open, then connect (implicitely
using a forbidden address), and check if there is a new FD open, e.g.:
lsof -p $(pgrep socat)
socat /dev/null tcp:localhost:10000
lsof -p $(pgrep socat)
If the second lsof shows an additional FD as in the following line,
this socat version is vulnerable:
socat 17947 gerhard 4u sock 0,6 0t0 1145265 can’t identify protocol
Workaround
Use IP filters in your OS or firewall.
Restart socat when it crashed.
Affected versions
1.2.0.0 - 1.7.2.1
2.0.0-b1 - 2.0.0-b5
Not affected or corrected versions
1.0.0.0 - 1.1.0.1
1.7.2.2 and later
2.0.0-b6 and later
Download
The updated sources can be downloaded from:
http://www.dest-unreach.org/socat/download/socat-1.7.2.2.tar.gz
http://www.dest-unreach.org/socat/download/socat-2.0.0-b6.tar.gz
Patch to 1.7.2.1:
http://www.dest-unreach.org/socat/download/socat-1.7.2.2.patch.gz
Patch to 2.0.0-b5:
http://www.dest-unreach.org/socat/download/socat-2.0.0-b6.patch.gz
Credits
Full credits to Catalin Mitrofan for finding and reporting this issue.
*(from redmine: issue id 2002, created on 2013-05-27, closed on 2013-05-28)*
* Relations:
* parent #2000
* Changesets:
* Revision c42ea19aae115368fffd00b31c391c4cbe377661 by Natanael Copa on 2013-05-27T16:49:16Z:
```
main/socat: security upgrade to 1.7.2.2 (CVE-2013-3571)
ref #2000
fixes #2002
(cherry picked from commit b9d344ff691b31bdf9a9e33d1937d0959bbbd72a)
```Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/10026please update /etc/services in alpine-baselayout2021-07-18T07:23:54ZHenrik Riomarplease update /etc/services in alpine-baselayoutThe version of `/etc/services` shipped with `alpine-baselayout` is very
old and hence missing many services, please update it.
Possible source of newer version: https://tracker.debian.org/pkg/netbase
*(from redmine: issue id 10026, cr...The version of `/etc/services` shipped with `alpine-baselayout` is very
old and hence missing many services, please update it.
Possible source of newer version: https://tracker.debian.org/pkg/netbase
*(from redmine: issue id 10026, created on 2019-02-22)*https://gitlab.alpinelinux.org/alpine/aports/-/issues/9994[3.6] curl: Multiple vulnerabilities (CVE-2018-16890, CVE-2019-3822, CVE-2019...2021-07-18T07:23:52ZAlicha CH[3.6] curl: Multiple vulnerabilities (CVE-2018-16890, CVE-2019-3822, CVE-2019-3823)CVE-2018-16890: NTLM type-2 out-of-bounds buffer read
-----------------------------------------------------
The function handling incoming NTLM type-2 messages
(lib/vauth/ntlm.c:ntlm\_decode\_type2\_target) does not validate
incoming da...CVE-2018-16890: NTLM type-2 out-of-bounds buffer read
-----------------------------------------------------
The function handling incoming NTLM type-2 messages
(lib/vauth/ntlm.c:ntlm\_decode\_type2\_target) does not validate
incoming data correctly and is subject to an integer overflow
vulnerability.
Using that overflow, a malicious or broken NTLM server could trick
libcurl to accept a bad length + offset combination that would lead to a
buffer read out-of-bounds.
### Affected versions:
libcurl 7.36.0 to and including 7.63.0
### Not affected versions:
libcurl < 7.36.0 and >= 7.64.0
### References:
https://curl.haxx.se/docs/CVE-2018-16890.html
### Patch:
https://github.com/curl/curl/commit/b780b30d1377adb10bbe774835f49e9b237fb9bb
CVE-2019-3822: NTLMv2 type-3 header stack buffer overflow
---------------------------------------------------------
The function creating an outgoing NTLM type-3 header
(lib/vauth/ntlm.c:Curl\_auth\_create\_ntlm\_type3\_message()), generates
the request HTTP header contents based on previously received data. The
check that exists to prevent the local buffer from getting overflowed is
implemented wrongly (using unsigned math) and as such it does not
prevent the overflow from happening.
This output data can grow larger than the local buffer if very large “nt
response” data is extracted from a previous NTLMv2 header provided by
the malicious or broken HTTP server. Such a “large value” needs to be
around 1000 bytes or more. The actual payload data copied to the target
buffer comes from the NTLMv2 type-2 response header.
### Affected versions:
libcurl 7.36.0 to and including 7.63.0
### Not affected versions:
libcurl < 7.36.0 and >= 7.64.0
### References:
https://curl.haxx.se/docs/CVE-2019-3822.html
### Patch:
https://github.com/curl/curl/commit/86724581b6c
CVE-2019-3823: SMTP end-of-response out-of-bounds read
------------------------------------------------------
If the buffer passed to smtp\_endofresp() isn’t NUL terminated and
contains no character ending the parsed number, and len is set to 5,
then the strtol() call reads beyond the allocated buffer. The read
contents will not be returned to the caller.
### Affected versions:
libcurl 7.34.0 to and including 7.63.0
### Not affected versions:
libcurl < 7.34.0
### References:
https://curl.haxx.se/docs/CVE-2019-3823.html
### Patch:
https://github.com/curl/curl/commit/39df4073e5413fcdbb5a38da0c1ce6f1c0ceb484
*(from redmine: issue id 9994, created on 2019-02-20, closed on 2019-03-05)*
* Relations:
* parent #9990
* Changesets:
* Revision d3a946561011a260c6b7a31fa0714a943e38cdfa on 2019-03-05T08:40:08Z:
```
main/curl: security fixes
CVE-2018-16890, CVE-2019-3822, CVE-2019-3823
Fixes #9994
```3.6.3Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/10025wpa_supplicant starts slowly when lacking entropy2021-07-18T07:23:52ZMarnix Rijnartwpa_supplicant starts slowly when lacking entropyWhen a Raspberry Pi boots without a keyboard attached the kernel has low
entropy which causes wpa\_supplicant to start slowly, sometimes minutes.
This can be fixed by installing the rng-tools and rng-tools-openrc
packages, and starting ...When a Raspberry Pi boots without a keyboard attached the kernel has low
entropy which causes wpa\_supplicant to start slowly, sometimes minutes.
This can be fixed by installing the rng-tools and rng-tools-openrc
packages, and starting the rngd service, this feeds the kernel with
/dev/hwrng from the Pi’s hardware rng.
However, wpa\_supplicant needs to start AFTER the rngd service (when
it’s available), so wpa\_supplicant.initd in the wpa\_supplicant-openrc
package whould need this change:
- after bootmisc modules
+ after bootmisc modules entropy
*(from redmine: issue id 10025, created on 2019-02-22, closed on 2019-05-09)*3.9.4Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/10010[3.9] nasm: Multiple vulnerabilities (CVE-2019-6290, CVE-2019-6291)2021-07-18T07:23:52ZAlicha CH[3.9] nasm: Multiple vulnerabilities (CVE-2019-6290, CVE-2019-6291)**CVE-2019-6290**: An infinite recursion issue was discovered in eval.c
in Netwide Assembler (NASM) through 2.14.02. There is a stack exhaustion
problem resulting from infinite recursion in the functions expr, rexp,
bexpr and cexpr in ce...**CVE-2019-6290**: An infinite recursion issue was discovered in eval.c
in Netwide Assembler (NASM) through 2.14.02. There is a stack exhaustion
problem resulting from infinite recursion in the functions expr, rexp,
bexpr and cexpr in certain scenarios involving lots of ‘{’ characters.
Remote attackers could leverage this vulnerability to cause a
denial-of-service via a crafted asm file.
### References:
https://bugzilla.nasm.us/show\_bug.cgi?id=3392548
https://nvd.nist.gov/vuln/detail/CVE-2019-6290
**CVE-2019-6291**: An issue was discovered in the function expr6 in
eval.c in Netwide Assembler (NASM) through 2.14.02. There is a stack
exhaustion problem caused by the expr6 function making recursive calls
to itself in certain scenarios involving lots of ‘!’ or ‘+’ or ‘-’
characters. Remote attackers could leverage this vulnerability to cause
a denial-of-service via a crafted asm file.
### References:
https://bugzilla.nasm.us/show\_bug.cgi?id=3392549
https://nvd.nist.gov/vuln/detail/CVE-2019-6291
*(from redmine: issue id 10010, created on 2019-02-21)*
* Relations:
* parent #100083.9.7Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/10021[3.8] py-paramiko: Authentication bypass in auth_handler.py (CVE-2018-1000805)2021-07-18T07:23:52ZAlicha CH[3.8] py-paramiko: Authentication bypass in auth_handler.py (CVE-2018-1000805)Python Paramiko through versions 2.4.1, 2.3.2, 2.2.3, 2.1.5, 2.0.8,
1.18.5 and 1.17.6 is vulnerable to an authentication bypass in
paramiko/auth\_handler.py. A remote attacker could exploit this
vulnerability in paramiko SSH servers to...Python Paramiko through versions 2.4.1, 2.3.2, 2.2.3, 2.1.5, 2.0.8,
1.18.5 and 1.17.6 is vulnerable to an authentication bypass in
paramiko/auth\_handler.py. A remote attacker could exploit this
vulnerability in paramiko SSH servers to execute arbitrary code.
### Fixed In Version:
python-paramiko 2.4.2, python-paramiko 2.3.3, python-paramiko 2.2.4,
python-paramiko 2.1.6, python-paramiko 2.0.9
### References:
https://github.com/paramiko/paramiko/issues/1283
https://nvd.nist.gov/vuln/detail/CVE-2018-1000805
### Patch:
https://github.com/paramiko/paramiko/commit/56c96a65
*(from redmine: issue id 10021, created on 2019-02-21, closed on 2019-03-05)*
* Relations:
* parent #10020
* Changesets:
* Revision d6448b760fcebaa43b000a3e57a4926509b5532d on 2019-02-28T14:29:38Z:
```
main/py-paramiko: security upgrade to 2.4.2 (CVE-2018-1000805)
Fixes #10021
```3.8.2https://gitlab.alpinelinux.org/alpine/aports/-/issues/10024dhcrelay is missing /var/run/dhcp in diskless mode2021-07-18T07:23:51ZThomas Liskeliske@ibh.dedhcrelay is missing /var/run/dhcp in diskless modeAlthough the dhcrelay package creates /var/run/dhcp during install it’s
missing after rebooting alpine in diskless mode. Dhcrelay does start
without it but openrc is unable to stop or restart it.
The dhcrelay init script needs to create...Although the dhcrelay package creates /var/run/dhcp during install it’s
missing after rebooting alpine in diskless mode. Dhcrelay does start
without it but openrc is unable to stop or restart it.
The dhcrelay init script needs to create the directory like it is
already done for dhcpd.
*(from redmine: issue id 10024, created on 2019-02-21, closed on 2019-06-19)*https://gitlab.alpinelinux.org/alpine/aports/-/issues/9999[3.7] openssh: Multiple vulnerabilities (CVE-2018-20685, CVE-2019-6109, CVE-2...2021-07-18T07:23:51ZAlicha CH[3.7] openssh: Multiple vulnerabilities (CVE-2018-20685, CVE-2019-6109, CVE-2019-6111)**CVE-2018-20685**: In OpenSSH 7.9, scp.c in the scp client allows
remote SSH servers to bypass intended access restrictions via the
filename of . or an empty filename. The impact is modifying the
permissions of the target directory on...**CVE-2018-20685**: In OpenSSH 7.9, scp.c in the scp client allows
remote SSH servers to bypass intended access restrictions via the
filename of . or an empty filename. The impact is modifying the
permissions of the target directory on the client side.
### References:
https://nvd.nist.gov/vuln/detail/CVE-2018-20685
https://marc.info/?l=oss-security&m=154745764812881&w=2
### Patch:
https://github.com/openssh/openssh-portable/commit/6010c0303a422a9c5fa8860c061bf7105eb7f8b2
**CVE-2019-6109**: An issue was discovered in OpenSSH 7.9. Due to
missing character encoding in the progress display, a malicious server
(or Man-in-The-Middle attacker) can employ crafted object names to
manipulate the client output, e.g., by using ANSI control codes to hide
additional files being transferred. This affects
refresh\_progress\_meter() in progressmeter.c.
### References:
https://nvd.nist.gov/vuln/detail/CVE-2019-6109
https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt
### Patch:
https://github.com/openssh/openssh-portable/commit/8976f1c4b2721c26e878151f52bdf346dfe2d54c
possibly additionally needed:
https://github.com/openssh/openssh-portable/commit/bdc6c63c80b55bcbaa66b5fde31c1cb1d09a41eb
**CVE-2019-6111**: An issue was discovered in OpenSSH 7.9. Due to the
scp implementation being derived from 1983 rcp, the server chooses which
files/directories are sent to the client. However, the scp client only
performs cursory validation of the object name returned (only directory
traversal attacks are prevented). A malicious scp server (or
Man-in-The-Middle attacker) can overwrite arbitrary files in the scp
client target directory. If recursive operation (-r) is performed, the
server can manipulate subdirectories as well (for example, to overwrite
the .ssh/authorized\_keys file).
### References:
https://nvd.nist.gov/vuln/detail/CVE-2019-6111
### Patch:
https://github.com/openssh/openssh-portable/commit/391ffc4b9d31fa1f4ad566499fef9176ff8a07dc
*(from redmine: issue id 9999, created on 2019-02-20, closed on 2019-03-05)*
* Relations:
* parent #9995
* Changesets:
* Revision cfa04666c50b8dfbe34b6ac8e6b177add54ce649 on 2019-03-04T15:08:29Z:
```
main/openssh: security fixes
CVE-2018-20685, CVE-2019-6109, CVE-2019-6111
Rebased HPN patch, included upstream patch due regression bug due to CVE-2019-6109 fix
Fixes #9999
```3.7.2Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/9647Rpi3 setup-alpine bugs 3.8.12021-07-11T16:36:55ZAlex KRpi3 setup-alpine bugs 3.8.11. ssl\_client: mirrors.alpinelinux.org certificate verification failed:
certificate is not yet valid.
wget: error getting response. connection reset by peer.
2. after setup-alpine. I can’t login via SSH. access denied.
*(from redm...1. ssl\_client: mirrors.alpinelinux.org certificate verification failed:
certificate is not yet valid.
wget: error getting response. connection reset by peer.
2. after setup-alpine. I can’t login via SSH. access denied.
*(from redmine: issue id 9647, created on 2018-11-16)*https://gitlab.alpinelinux.org/alpine/aports/-/issues/502perl-cgi-session perl-snmp-session is missing in 2.1.x2021-07-11T01:51:01ZNatanael Copaperl-cgi-session perl-snmp-session is missing in 2.1.xOn alpine v2.1:
# apk add smokeping
ERROR: Unable to satisfy all dependencies:
smokeping-2.4.2-r1: perl-cgi-session perl-snmp-session
ERROR: Missing packages:
perl-cgi-session perl-snmp-session
*(from redmine: is...On alpine v2.1:
# apk add smokeping
ERROR: Unable to satisfy all dependencies:
smokeping-2.4.2-r1: perl-cgi-session perl-snmp-session
ERROR: Missing packages:
perl-cgi-session perl-snmp-session
*(from redmine: issue id 502, created on 2010-12-29, closed on 2011-01-06)*
* Changesets:
* Revision 67d07593761db7142dbc2d00f9824983b7fa07c7 on 2010-12-29T09:45:03Z:
```
main/perl-{cgi,snmp}-session: backported
needed by smokeping which is in main
fixes #502
```Alpine 2.1.4Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/505php-cgi is missing2021-07-11T01:51:01ZNatanael Copaphp-cgi is missingLooks like the apache fixes broke the php support for lighttpd. The
php-cgi binary is missing.
*(from redmine: issue id 505, created on 2010-12-31, closed on 2011-03-11)*
* Changesets:
* Revision 264c8486ac878ba6a7647d2abf72112845e1...Looks like the apache fixes broke the php support for lighttpd. The
php-cgi binary is missing.
*(from redmine: issue id 505, created on 2010-12-31, closed on 2011-03-11)*
* Changesets:
* Revision 264c8486ac878ba6a7647d2abf72112845e14f3a by Matt Smith on 2011-01-09T11:55:42Z:
```
main/php: improved APKBUILD, see changes [resent, updated]
I based my updates off of Arch Linux's work for this package.
Here's the changelog:
- Each 'main subpackage' gets its own build dir, in order to eliminate
build-time complications.
- Added php-cgi subpackage (in combination with the above change, fixes #505)
- Added php-embed subpackage.
- Removed php-cli subpackage; it's now in the main 'php' package.
- Added the configure options --with-readline and --enable-pcntl to the 'php'
package (previously known as the php-cli package).
- Enabled the 'error_log' default option for php-fpm.conf
- Enabled cgi.discard_path in php.ini, as --enable-discard-path was dropped from
being a configure option.
- Dropped --enable-force-cgi-redirect from configure options, as it was
deprecated and enabled by default in php.ini.
- Did away with $phpextensionsapache2 in the APKBUILD; seems it was there for a
workaround. Perhaps it was part of the #183 fix? (Apache still segfaults,
with or without the $phpextensionsapache2 workaround.)
For more info regarding PHP configure options:
http://www.php.net/manual/en/configure.about.php
Also, can someone look over the updates I made to the #183 fix, regarding the
above $phpextensionsapache2 workaround changes and the changes to where it says
"# see #183" throughout the APKBUILD? I want to make sure that I didn't break
that fix.
Thanks,
Matt
P.S.: I resent the patch to fix quoting the $srcdir variables and the like.
e.g. From "$srcdir/$pkgname-$pkgver" to "$srcdir"/$pkgname-$pkgver
```Alpine 2.2.0Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/2834Package request: GlusterFS2021-07-07T18:37:12Zmastr y0daPackage request: GlusterFSWould it be possible to get a gluster package built?
-m
*(from redmine: issue id 2834, created on 2014-04-06)*Would it be possible to get a gluster package built?
-m
*(from redmine: issue id 2834, created on 2014-04-06)*https://gitlab.alpinelinux.org/alpine/aports/-/issues/4490Package request: Tor Browser2021-06-28T02:47:00ZalgitbotPackage request: Tor Browser“In short, using any browser besides Tor Browser with Tor is a really
bad idea.”
From the very Tor FAQ.
https://www.torproject.org/docs/faq.html.en\#TBBOtherBrowser
Even though Alpine has the package tor, without the full featured
tor...“In short, using any browser besides Tor Browser with Tor is a really
bad idea.”
From the very Tor FAQ.
https://www.torproject.org/docs/faq.html.en\#TBBOtherBrowser
Even though Alpine has the package tor, without the full featured
tor-browser, it is insecure for users (who have to use it with other
browsers not configured as they should).
Links:
https://gitweb.torproject.org/builders/tor-browser-bundle.git/tree/gitian/README.build
https://gitweb.torproject.org/builders/tor-browser-bundle.git
*(from redmine: issue id 4490, created on 2015-07-28)*https://gitlab.alpinelinux.org/alpine/aports/-/issues/10610Cross Compile Bootstrapping OpenSSH fails2021-06-10T11:50:00ZAnthony DaviesCross Compile Bootstrapping OpenSSH failsFails due to requiring libedit to compile.
Fix was to add modify built packages to compile ncurses, libedit then
openssh.
*(from redmine: issue id 10610, created on 2019-06-24)*Fails due to requiring libedit to compile.
Fix was to add modify built packages to compile ncurses, libedit then
openssh.
*(from redmine: issue id 10610, created on 2019-06-24)*https://gitlab.alpinelinux.org/alpine/aports/-/issues/10153Unable to connect to a specific access point2021-06-09T10:04:12Zvinnie costanteUnable to connect to a specific access pointI did some tests but I couldn’t connect, I’ll try to be schematic.
1) With setup-interfaces I can’t connect to my router’s wifi connection,
but I can connect to my mobile phone’s wifi thetering. Alpine version is
3.9.2 .
2) I can conn...I did some tests but I couldn’t connect, I’ll try to be schematic.
1) With setup-interfaces I can’t connect to my router’s wifi connection,
but I can connect to my mobile phone’s wifi thetering. Alpine version is
3.9.2 .
2) I can connect to the same router with another live distro (ubuntu
studio), so I exclude a hardware problem.
3) The card is an “Intel Corporation Wifi Link 5100” (info by lspci)
4) During attempts with setup-interfaces (and after rc-service
networking restart) I got these errors:
“…
udhcpc: sending discover
udhcpc failed to get a DHCP lease
udhcpc: no lease, forking to background”
Then I tried to install the package “dhcpcd” (which anyway is not
necessary to connect to the thetering wifi mobile phone) and set
“udhcpc\_opts -t 12” inside “/etc/network/interfaces” in wlan0 section.
No results, it try until it expires.
5)I tried to disable both the wifi password and also the dhcp of router
without any result (but I have no problem to connect in both cases from
another distro).
6)Then I tried to follow this guide without any results:
https://wiki.alpinelinux.org/wiki/Connecting\_to\_a\_wireless\_access\_point
.
7) I thought that my card did not have the drivers installed and I try
to install “iwlwifi-5000-ucode”, but this prevented further attempts at
connection (setup-interfaces was no longer able to create an appropriate
section in “/etc/network/interfaces”).
8) I tried to follow the advice of a user of the mailinglist but without
result: https://lists.alpinelinux.org/alpine-user/0736.html . This is
the output of wpasupplicant: https://termbin.com/b3oj . In this case
this is my “/etc/network/interfaces” http://termbin.com/s3if and
“/etc/wpa\_supplicant/wpa\_supplicant.conf” is http://termbin.com/7rnp .
*(from redmine: issue id 10153, created on 2019-03-25)*