Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Traffic Totals: Broken in 2.4.4-p3 [SOLVED WITH PATCH]

    Scheduled Pinned Locked Moved Traffic Monitoring
    24 Posts 8 Posters 4.1k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • NyarlathotepN
      Nyarlathotep
      last edited by Nyarlathotep

      @jimp

      Thanks for the patch; it fixed the issue. I also applied the User Manager bug patch.

      I was prompted to install the User Manager patch after seeing Tom's latest video.

      1 Reply Last reply Reply Quote 0
      • F
        fabrizior @jimp
        last edited by

        @jimp said in Traffic Totals: Broken in 2.4.4-p3 [SOLVED WITH PATCH]:

        I think I've got this fixed but it'll take a patch in the base system, not the package.

        You can install the System Patches package and then create an entry for bdbd8534eef5b93370065340de225a1cd5e5faa8 to apply the fix and try it out. I did test against several different attack methods to ensure it didn't lower the security, and it allows the JS anchor links as expected.

        @jimp Thanks for this. One question though. Testing the patch indicates it cannot be backed-out cleanly. Is this something we should be concerned about?

        /usr/bin/patch --directory=/ -f -p2 -i /var/patches/5cebf5d50a1d0.patch --check --reverse --ignore-whitespace
        
        Hmm...  Looks like a unified diff to me...
        The text leading up to this was:
        --------------------------
        |From bdbd8534eef5b93370065340de225a1cd5e5faa8 Mon Sep 17 00:00:00 2001
        |From: jim-p 
        |Date: Fri, 24 May 2019 15:47:43 -0400
        |Subject: [PATCH] Privilege matching -- allow JS anchors. Fixes #9550
        |
        |Attempts to detect a special case where a file does not actually
        |exist, and yet should be allowed since it is used by JavaScript.
        |
        |So long as the anchor name doesn't contain any characters that might let
        |it evade other checks, allow it through.
        |---
        | src/etc/inc/auth_func.inc | 10 ++++++++++
        | 1 file changed, 10 insertions(+)
        |
        |diff --git a/src/etc/inc/auth_func.inc b/src/etc/inc/auth_func.inc
        |index 795ccdbdf1..e142e4f42c 100644
        |--- a/src/etc/inc/auth_func.inc
        |+++ b/src/etc/inc/auth_func.inc
        --------------------------
        Patching file etc/inc/auth_func.inc using Plan A...
        Hunk #1 failed at 42.
        1 out of 1 hunks failed while patching etc/inc/auth_func.inc
        done
        
        1 Reply Last reply Reply Quote 0
        • DerelictD
          Derelict LAYER 8 Netgate
          last edited by

          When you test a patch it shows its current status when compared to the file(s) to be patched.

          Before you apply it will say:

          Patch can be applied cleanly (detail)
          Patch can NOT be reverted cleanly (detail)

          After it is applied it will say:

          Patch can NOT be applied cleanly (detail)
          Patch can be reverted cleanly (detail)

          Chattanooga, Tennessee, USA
          A comprehensive network diagram is worth 10,000 words and 15 conference calls.
          DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
          Do Not Chat For Help! NO_WAN_EGRESS(TM)

          F 1 Reply Last reply Reply Quote 0
          • F
            fabrizior @Derelict
            last edited by

            @Derelict, ah. okay then.
            Thank you.

            1 Reply Last reply Reply Quote 0
            • First post
              Last post
            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.