DVB-Cube <<< Das deutsche PC und DVB-Forum >>>

PC-Ecke => # Security Center => Software (PC-Sicherheit) => Thema gestartet von: SiLæncer am 05 Juli, 2010, 13:23

Titel: Firewall-Distributionen diverses
Beitrag von: SiLæncer am 05 Juli, 2010, 13:23
Jan Paul Tuecking hat die sofortige Verfügbarkeit der speziellen Linux-Distribution IPFire 2.7 angekündigt. Das System dient als Firewall.
Wie in der Ankündigung zu lesen gibt es vorerst nur ISO-Abbilder von IPFire 2.7. Die Updates via Pakfire sollen am kommenden Freitag zur Verfügung stehen. Als Grund geben die Entwickler an, dass man die IPSec-Software von OpenSwan zu StrongSwan umgestellt hat. Somit seien Veränderungen in der Konfiguration von net2net-Verbindungen unabdingbar.

Die neue Version von IPFire enthält laut eigener Aussage ungefähr 400 Änderungen. Unter anderem wurden OpenSSL und dem Linux-Kernel Updates spendiert. Interessierte können die Firewall-Distribution aus dem Download-Bereich (http://www.ipfire.org/en/download) der Projektseite herunterladen.

Quelle : www.tecchannel.de
Titel: IPFire 2.9 Core 52 ist veröffentlicht
Beitrag von: SiLæncer am 19 September, 2011, 13:17
Die Entwickler von IPFire haben Update Nummer 52 für die zweite Serie der Firewall-Distribution zur Verfügung gestellt.

Core Update 52 von IPFire 2.9 adressiert diverse Sicherheits-Probleme im Zusammenhang mit dem Webproxy-Dienst und dem Apache Webserver. Ebenso wird die Sprache Russisch unterstützt und es kamen kleinere Funktionen hinzu. Die Entwickler empfehlen ein baldiges Update. Administratoren sollten im Hinterkopf behalten, dass beide Dienste bei einem Update neu gestartet werden.

Neu mit an Bord befinden sich die Pakete Squid 3.1.15, Apache 2.2.20 und ethtool 3.0. Interessierte finden weitere Informationen in der offiziellen Ankündigung (http://www.ipfire.org/news/ipfire-2-9-core-update-52-released) oder dem umfangreichen Changelog (http://git.ipfire.org/?p=ipfire-2.x.git;a=shortlog;h=refs/heads/core52).


Quelle : www.tecchannel.de
Titel: pfSense 2.0 erschienen
Beitrag von: SiLæncer am 21 September, 2011, 09:29
pfSense (http://www.pfsense.org/) ist eine freie Distribution für den Einsatz als Firewall und Router. Es beruht auf FreeBSD und enthält ein Paketsystem zur Installation von Erweiterungen. Das Projekt begann 2004 als Abspaltung von m0n0wall, zielt aber eher auf die Installation auf PCs denn auf eingebettete Hardware. Trotzdem bietet pfSense auch ein Image an, das auf Compact-Flash-Medien installiert werden kann.

Die neue Version 2.0 von pfSense war über drei Jahre in Entwicklung und bringt zahlreiche neue Funktionen. Version 2.0 beruht auf FreeBSD 8.1, das bereits über ein Jahr alt ist. Zu den Neuerungen gehören GRE- und GIF-Tunnels, Unterstützung von 3G, Modems und Multi-Link PPP (MLPPP), Gruppierung von Netzwerkschnittstellen, virtuelle IP-Adressen, Gateways, neuer Traffic-Shaper, Protokollfilterung auf Schicht 7, erweiterte NAT-Funktionalität, eine verbesserte und zentralisierte Benutzerverwaltung, eine neue Zertifikatsverwaltung, Unterstützung von Radius und LDAP in OpenVPN, Captive Portal und vieles mehr. Die Einzelheiten können in der Übersicht über die Änderungen (http://doc.pfsense.org/index.php/2.0_New_Features_and_Changes) nachgelesen werden.

pfSense wird über eine Weboberfläche verwaltet, eine Shell steht ebenfalls zur Verfügung. Das System bietet zahlreiche weitere Funktionen, und mehrere pfSense-Systeme können parallel eingesetzt werden, um Lastausgleich und Ausfallsicherheit zu garantieren. pfSense ist nach Angaben der Entwickler sehr populär und besitzt eine breite Unterstützerbasis aus der Gemeinschaft. Die neue Version 2.0 soll bei einigen Kunden bereits länger im Produktivbetrieb laufen und sich durch Stabilität auszeichnen. Zum Download stehen 32- und 64-Bit-x86-Varianten als ISO-, USB- oder VMware-Image bereit.

Quelle : www.pro-linux.de
Titel: Firewalldistri IPCop 2.0 mit OpenVPN
Beitrag von: SiLæncer am 24 September, 2011, 13:28
Das IPCop-Team hat seine ressourcenschonende Router- und Firewall-Distribution in der Version 2.0 veröffentlicht. IPCop läuft bereits auf betagten 486ern, erfordert mindestens 32 MB Ram und zwei Netzwerkschnittstellen.

(http://www.pro-linux.de/images/NB3/imgdb/o_bootmenu-ipcop.jpg)
IPCop 2.0 (http://sourceforge.net/mailarchive/message.php?msg_id=28131816) basiert auf einem Kernel 2.6.32 und nutzt IPtables, um Netzwerkpakete zuzulassen oder zu blockieren. Mittels OpenVPN 2.2.1 offerieren die Entwickler eine Alternative zum komplex zu konfigurierenden IPSec, mit der Anwender eigene virtuelle private Netze (VPNs) betreiben können. IPCop 2.0 verwendet andere Ports als die Vorgängerversionen. So ist die HTTPS-Weboberfläche nun auf Port 8443 zu erreichen und der SSH-Server lauscht auf Port 8022. Die Weboberfläche verfügt über einen neuen Scheduler, neue Punkte im Statusmenü für Systeminfo, Traffic-Erfassung und IPtables sowie neue Seiten für den Zeitserver ntpd, den Web-Proxy Squid 3.1.15 und den DHCP-Server DNSMasq 2.57, der DHCPD ersetzt.

Die neue IPCop-Version unterstützt Cobalt-, Sparc- und PPC-Plattformen und bietet einen überarbeiteten Installer, um die Distribution auf Festplatten oder Flash-Speicher zu installieren. Das Intrusion Detection System Snort ist nicht mehr standardmäßig enthalten und soll später als Erweiterung angeboten werden.

Die Router- und Firewall-Distribution IPCop existiert seit 2001 und steht unter der GPL. Die aktuelle Version 2.0 ist für x86-Architekturen auf Sourceforge.net als Download (http://sourceforge.net/projects/ipcop/files/IPCop/IPCop%202.0.0/ipcop-2.0.0-install-cd.i486.iso) verfügbar.

Quelle : www.pro-linux.de
Titel: IPCop 2.0.3
Beitrag von: SiLæncer am 15 Februar, 2012, 21:30
Infos zu dieser Version: Klick (http://marc.info/?l=ipcop-announce&m=132923114103045&w=2)

http://www.ipcop.org/
Titel: IPCop 2.0.4
Beitrag von: SiLæncer am 17 Februar, 2012, 06:40
Infos zu dieser Version : Klick (http://marc.info/?l=ipcop-announce&m=132940888132749&w=2)

http://www.ipcop.org/
Titel: Linux-Firewall-Distribution IPFire startet Wunschliste
Beitrag von: SiLæncer am 13 November, 2012, 16:40
Die Linux-Firewall-Distribution IPFire ermöglicht es ab sofort Spendern, die Entwicklung von neuen Funktionen für das System gezielt zu fördern.

IPFire ist eine leicht installierbare Firewall, die es laut den Entwicklern problemlos mit Smoothwall, IPCop oder der Endian-Firewall aufnehmen kann. Sie soll sich mit wenigen Tastenklicks konfigurieren lassen und ist durch diverse Addons, beispielsweise Samba, Cups, FTP und NFS, Asterisk und Multimedia, zu einem Server erweiterbar.

Der ganze Artikel (http://www.pro-linux.de/news/1/19108/linux-firewall-distribution-ipfire-startet-wunschliste.html)

Quelle : www.pro-linux.de
Titel: Opensource-Firewall IPFire in Version 2.13 erhätlich
Beitrag von: SiLæncer am 28 November, 2013, 14:08
Die Opensource-Firewall IPFire ist nun in Version 2.13 Core Update 73 erhältlich. Das kleine Update haben die Entwickler noch kurz vor dem nächsten "Major Release" eingeschoben, an dem sie parallel arbeiten. Es enthält etliche kleine Fehlerbereinigungen, aber auch Updates von zentralen Diensten. Die wichtigsten Updates betreffen den Web Proxy Squid, OpenSSH sowie den PHP Hypertext Processor.

Der ganze Artikel (http://www.heise.de/newsticker/meldung/Update-Opensource-Firewall-IPFire-in-Version-2-13-erhaetlich-2056519.html)

Quelle : www.heise.de
Titel: Kleines Update: IPFire in Version 2.13 Core 75 erhältlich
Beitrag von: SiLæncer am 13 Januar, 2014, 18:45
Die Opensource-Firewall IPFire ist nun in Version 2.13 Core Update 75 erhältlich. Mit dem kleinen Update beheben die Entwickler drei Fehler. Zwei betreffen die OpenVPN-Kommunikation. Im ersten Fall geht es um die Prüfung von TLS-Zertifikaten. Diese mislingen wegen einer Formatänderung in OpenVPN 2.3, die dazu führt, dass IPFire nicht mehr nach dem korrekten Common-Name-Parameter eines Zertifikats sucht.

Das Update enthält ein verbessertes Skript, das den Common Name korrekt extrahiert. Im zweiten Fall behandelt das Update ausbleibende Übermittlung der Routen-Konfiguration an Clients. Der dritte Bugfix betrifft Pakfire; eine leere Spiegel-Liste blockiert die Software auf der Suche an einem aktiven Spiegel-Server. IPFire umgeht das Problem, indem es Pakete vom Haupt-Server lädt, wenn es keine aktiven Spiegel-Server findet. Die vollständige Liste der Änderungen gibt es hier (http://www.ipfire.org/news/ipfire-2-13-core-update-75-released). Das ISO-Installations-Image (http://downloads.ipfire.org/releases/ipfire-2.x/2.13-core75/ipfire-2.13.i586-full-core75.iso) belegt rund 103 MByte auf der Platte.

Quelle : www.heise.de
Titel: IPCop 2.1.1
Beitrag von: SiLæncer am 14 Februar, 2014, 21:20
Infos zu dieser Version : Klick (http://marc.info/?l=ipcop-announce&m=139231052115182&w=2)

http://www.ipcop.org/
Titel: IPCop 2.1.4
Beitrag von: SiLæncer am 16 April, 2014, 21:20
Infos zu dieser Version : Klick (http://marc.info/?l=ipcop-announce&m=139697815506679&w=2)

http://www.ipcop.org/
Titel: IPCop 2.1.5
Beitrag von: SiLæncer am 03 Mai, 2014, 06:45
Zitat
IPCop 2.1.5 is released v2.1.5 can be installed using the installation images or as an update from version 2.1.4. You need to reboot to use the new kernel after upgrading to 2.1.5.

In addition to several updates to software used in IPCop, v2.1.5 adds CA certificates to better support SSL/TLS email.

http://www.ipcop.org/
Titel: IPFire 2.13 Core Update 75 veröffentlicht
Beitrag von: SiLæncer am 08 Juli, 2014, 15:50
Wichtige Änderungen und Verbesserungen des Updates betreffen vor allem die OpenVPN-Konfiguration und den Linux-Kernel, den IPFire mitbringt.

Die für diverse Hardware-Plattformen erhältliche Firewall-Distribution IPFire bringt in der neuen Version 2.13, Core Update 75, laut den Entwicklern zahlreiche Fehlerbehebungen und Verbesserungen mit. Die wichtigsten Änderungen erhöhen laut den Programmierern das Sicherheitsniveau der VPN-Software OpenVPN.

Das OpenVPN-Modul, das IPFire mit dem Core Update 75 mitbringt, weist Verbesserungen in den Bereichen Certificate Authorities, Diffie-Hellman-Parameter, Ciphers, HMAC/Hashing und TLS-Authentifizierung auf. Einige der inzwischen geknackten Cipher-Kombinationen, sind für das Core Update 75 entfernt worden, nämlich DES-CBC, RC2-CBC, RC2-64-CBC und RC2-40-CBC.

Der ganze Artikel (http://www.heise.de/netze/meldung/Firewall-Update-IPFire-2-13-Core-Update-75-veroeffentlicht-2251637.html)

Quelle : www.heise.de
Titel: Firewall IPFire: Update schließt OpenSSL-Lücken
Beitrag von: SiLæncer am 11 August, 2014, 20:57
Das Core Update 81 für die Firewall IPFire schließt insgesamt 9 Sicherheitslücken in der OpenSSL-Implementierung und behebt kleinere Fehler.

In IPFire 2.15 Core Update 81 hat das Entwicklerteam die OpenSSL-Implementierung auf Version 1.0.1i aktualisiert und so neun Sicherheitslücken geschlossen. Die Schwachstellen betrafen laut der Update-Mitteilung verschiedene Protokolle und Bestandteile der Programmbibliotheken. Die Entwickler stufen das Sicherheitsrisiko als moderat ein. Die genauen Änderungen der neuen OpenSSL-Version beschreibt die Aktualisierungsmitteilung der OpenSSL-Entwickler.

Der ganze Artikel (http://www.heise.de/newsticker/meldung/Firewall-IPFire-Update-schliesst-OpenSSL-Luecken-2290050.html)

Quelle : www.heise.de
Titel: IPFire 2.15 Core Update 83
Beitrag von: SiLæncer am 30 September, 2014, 18:00
Release Notes : http://www.ipfire.org/news/ipfire-2-15-core-update-83-released#

http://www.ipfire.org
Titel: IPCop 2.1.7
Beitrag von: SiLæncer am 29 Oktober, 2014, 20:00
Zitat
IPCop 2.1.7 is released

v2.1.7 can be installed using the installation images or as an update from version 2.1.6.

v2.1.7 fixes PPPoE dialup.

http://www.ipcop.org/
Titel: IPFire 2.15 Core 86
Beitrag von: SiLæncer am 26 Januar, 2015, 13:43
Release Notes : http://www.ipfire.org/news/ipfire-2-15-core-update-86-released

http://www.ipfire.org
Titel: pfSense 2.2 veröffentlicht
Beitrag von: SiLæncer am 01 Februar, 2015, 14:31
Die freie, auf FreeBSD basierende Firewall-Distribution pfSense ist in der Version 2.2 erschienen. Die Entwickler korrigierten in pfSense 2.2 über 300 Fehler und fügten 55 neue Funktionalitäten hinzu.

Eine Neuerung in pfSense 2.2 ist, dass das zugrunde liegende Betriebssystem FreeBSD auf die Version 10.1 aktualisiert wurde. Beim IPSec-Backend wechselten die Entwickler von Racoon auf StrongSwan. Das PHP-Backend nutzt nun PHP 5.5 und PHP-FPM anstelle von FastCGI und der DNS-Resolver Unbound ist in neuen Installationen standardmäßig aktiviert. Bei der Standardkonfiguration schalteten die Entwickler den DNS-Forwarder dnsmasq ab, änderten die Default-NICs von vr auf em und räumten die config.xml auf.

Hinsichtlich der Sicherheit prüft pfSense nun SSL-Zertifikate von HTTPS-URLs, warnt Nutzer vor inoffiziellen Paket-Repositorien und nutzt bei der grafischen Weboberfläche öfter POST- anstelle von GET-Anfragen. Das sshd-Banner teilt nicht mehr die zugrunde liegende Free-BSD-Version mit, jQuery ist in der Version 1.11.1 enthalten und SSLv3 und RC4-Cipher sind in Lighttpd abgeschaltet. Beim Routing erlauben es die Entwickler den Nutzern, ein Gateway in der GUI als Down zu markieren und das Gateway auszuwählen, über das DynDNS-Updates versendet werden. Für statische Routen lässt sich die -iface-Option für PPPoE nutzen, falls mehrere PPoE-Verbindungen über das selbe Gateway laufen.

Der ganze Artikel (http://www.pro-linux.de/news/1/21973/pfsense-22-veroeffentlicht.html)

Quelle : www.pro-linux.de
Titel: Linux-Firewall: IPFire-Korrektur bringt neue Funktionen
Beitrag von: SiLæncer am 22 April, 2015, 16:47
IPFire 2.17 korrigiert mit dem Core Update 89 nicht nur eine Reihe von Fehlern. Es erweitert auch den DynDNS-Updater und die Statistiken der Linux-Firewall.

Das Core-Update 89 von IPFire 2.17 behebt Fehler und aktualisiert zahlreiche Tools und Dienste der Linux-Firewall. Das Update erweitert die Linux-Firewall zudem um neue Funktionen: So sammelt IPFire nun Statistiken zu Netz-zu-Netz-Verbindungen von OpenVPN und stellt sie grafisch dar. Der DynDNS-Updater protokolliert Updates und stößt bei fehlgeschlagenen Versuchen erneute Versuche an. Zusätzlich unterstützt die Software nun mehr DynDNS2-Anbieter und sie erkennt, ob ein DynDNS-Anbieter den Zugriff gesperrt hat. Außerdem wurden eine Reihe von Problemen mit DynDNS-Diensten behoben.

Das Update aktualisierte den DNS- und DHCP-Server dnsmasq und behebt damit unter anderem Fehler bei der DNSSEC-Unterstützung. Die Entwickler haben den Proxy haproxy 1.5 und Prozessverwaltungstool monit 5.11 zu IPFires Softwareausstattung hinzugefügt und mehrere Fehler im Webinterface (Firewall, Squid-Accounting), bei der Lebensdauer von IPSec- und OpenVPN-Zertifikaten sowie beim Backup und im Installer korrigiert. Weitere Details zu den Änderungen und Neuheiten von IPFire 2.17 Core Update 89 verrät die Release-Mitteilung (http://www.ipfire.org/news/ipfire-2-17-core-update-89-freigegeben).

Quelle: www.heise.de
Titel: Linux-Firewall IPFire mit GeoIP-Filter
Beitrag von: SiLæncer am 29 Mai, 2015, 16:40
Im neuen Update 90 der Linux-Firewall IPFire 2.17 beschleunigen die Entwickler zudem verschiedene Crypto-Algorithmen, schalten anfällige SSL-Versionen ab und verbessern das Zusammenspiel zwischen IPSec-Server und dem IPSec-Windows-Client.

Das Core-Update 90 der Linux-Firewall IPFire 2.17 aktualisiert nicht nur zahlreiche Softwarepakete und Voreinstellungen. Dank Spenden könnten die Entwickler die Firewall nun um einen GeoIP-Filter erweitern, der ein- und ausgehenden Netzwerkverkehr anhand geografischer Daten (GeoIP) blockieren oder passieren lässt.

Der Filter erschwert automatische Scans nach verwundbaren Diensten und hilft, die eigenen Angebote abzusichern: So lassen sich etwa leicht die von Schadsoftware genutzten Command-and-Control-Servern blockieren und Fernwartungszugänge auf einzelne Länder beschränken. Kommuniziert man eher selten mit bestimmten Regionen, legt man beispielsweise Limits für neue Verbindungen aus diesen Ländern fest.

Der ganze Artikel (http://www.heise.de/newsticker/meldung/Linux-Firewall-IPFire-mit-GeoIP-Filter-2671078.html?wt_mc=rss.ho.beitrag.atom)

Quelle : www.heise.de
Titel: Linux-Firewall IPFire erneuert OpenSSL- und StrongSwan-Komponenten
Beitrag von: SiLæncer am 13 Juni, 2015, 17:49
Anwender der IPFire-Version 2.17 sollten das Core-Update 91 bald einspielen, denn es schließt unter anderem die jüngst hochgekommene Logjam-Lücke in OpenSSL.

Mit dem Core-Update 91 stopft die Firewall-Distribution IPFire 2.17 Sicherheitslücken in der OpenSSL-Bibliothek sowie in der VPN-Server- und -Client-Komponente StrongSwan. Die OpenSSL-Version 1.0.2b schließt sechs Löcher, darunter die kritische Logjam-Lücke, mit der sich SSL-Verbindungen auf ein unsicheres Verschlüsselungsniveau zurückstufen ließen. StrongSwan 5.3.1 behebt eine Angriffsmöglichkeit, die zum Denial-of-Service und eventuell zur Code-Ausführung genutzt werden konnte. Außerdem wurden einige weitere Pakete aufgefrischt.

Der ganze Artikel (http://www.heise.de/netze/meldung/Linux-Firewall-IPFire-erneuert-OpenSSL-und-StrongSwan-Komponenten-2690138.html)

Quelle : www.heise.de
Titel: Linux-Firwall IPFire 2.17, Core Update 93 erschienen
Beitrag von: SiLæncer am 18 August, 2015, 13:40
Mit den Änderungen schließen die Entwickler hauptsächlich einige Sicherheitslücken. Darüber hinaus sind einige Pakete aktualisiert und eine Filterfunktion hinzugefügt worden, die bei bestimmten SSD-Laufwerken die TRIM-Funktion abschaltet.

Das Firewall-Paket IPFire stopft in der neuen Version 2.17 Core Update 93 eine Hand voll Sicherheitslücken im Web-Proxy Squid, im DNS-Server dnsmasq und in einer Perl-kompatiblen Bibliothek. Der zugehörige DDNS-Client soll in der neuen Version 008 unter anderem robuster gegenüber Netzwerk- und Serverfehlern von sein und nun auch Dienste der Anbieter joker.com und DNSmadeEasy nutzen.

Der ganze Artikel (http://www.heise.de/newsticker/meldung/Linux-Firwall-IPFire-2-17-Core-Update-93-erschienen-2782392.html)

Quelle : www.heise.de
Titel: IPFire 2.17 Core Update 95
Beitrag von: SiLæncer am 14 Dezember, 2015, 21:06
Infos hierzu : http://www.ipfire.org/news/ipfire-2-17-core-update-95-released

http://www.ipfire.org/download
Titel: IPFire 2.17 Core Update 96
Beitrag von: SiLæncer am 21 Januar, 2016, 17:01
Release Notes

This is the official release announcement for IPFire 2.17 – Core Update 96. This update comes with many smaller changes and security fixes.

Ramdisk usage change

IPFire uses round-robin databases to collect system data and generate beautiful graphs. The databases have usually been kept in memory. This change was made in early versions of IPFire to keep the amount of writes to the block device to a minimum. However, the number of the databases has been growing and many systems don’t have enough capacity in memory. The objective was also that ordinary flash storage is quite slow. These systems are now however less commonly used which makes this change unnecessary.

To give an example, many of the ALIX boards use very slow compact flash storage and do only have 256 or even 128 MB of memory. So neither is really an option. Systems you will purchase today usually come with fast SSD storage and a few gigabytes of memory. So both is a viable option to store these databases.

New installed IPFire systems will now only use the persistent storage to store these database files. All updates systems will stick with the old behaviour if they have about 512 MB of RAM or more. Otherwise upgraded systems will also fall back to the persistent storage.
Misc

    openssl has been updated to version 1.0.2e which fixes various security vulnerabilities: CVE-2015-3193, CVE-2015-3194, CVE-2015-3195, CVE-2015-3196
    The NTP service was unable to communicate with the local clock and therefore not able to provide time to the network.
    strongswan is updated to version 5.3.5 which fixes various security issues
        The connection list in the web user interface when IPsec subnets with multiple local or remote subnets are used.
    The firewall engine handles SNAT rules more restrictive and avoids overmatching of packages that are sent over an IPsec network
    Various patches to improve dnsmasq have been imported from upstream
    curl wasn’t able to validate publicly signed SSL certificates because it could not find the certificate store. This is now fixed.
    dma, the internal mail agent, now handles authentication against remote mail servers better due to a patch sent to the project by the IPFire developers
    Support for cryptodev has been dropped
    mdadm has been updated to version 3.3.4, arping has been updated to version 2.15, rrdtool has been updated to version 1.5.5, libnet 1.1.6 is now shipped with the core distribution
    On x86-based systems, GRUB, the bootloader, has been patched against an integer overflow vulnerability filed under CVE-2015-8370 which allowed users to bypass authentication after pressing backspace for 28 times
    Snort now also monitors alias address on red if any have been configured
    The Turkish translation has been updated

Updated add-ons

    nano has been updated to 2.5.0
    Midnight Commander has been updated to 4.8.15
    clamav has been updated to version 0.99
    openvmtools have been updated to version 10.0.5
    squid-accounting has received minor bug fixes
    tripwire has been dropped

[close]

http://www.ipfire.org/download
Titel: IPFire 2.17 Core Update 97
Beitrag von: SiLæncer am 01 Februar, 2016, 19:00
Release Notes

This is the official release announcement for IPFire 2.17 – Core Update 97. An other OpenSSL security fix has been released, which is shipped in this Core Update among some other security vulnerabilities. As this is a rather urgent update, we recommend to install it as soon as possible. We also recommend rebooting after the update has been installed.

OpenSSL security fixes – 1.0.2f

It is possible to exploit the Diffie-Hellman key exchange (CVE-2016-0701)and get hold of the server’s private exponent. With that any future connections can be decrypted. Please check out the original security advisory for more details.

A second fix (CVE-2015-3197) in the OpenSSL library fixes the deactivation of some SSLv2 ciphers.

An other change will strengthen SSL connections against being taken over by a man-in-the-middle attack that tries to downgrade the length of the Diffie-Hellman key that is being used.

OpenSSH 7.1p2

An information leak (CVE-2016-0777) flaw was found in the way the OpenSSH client roaming feature was implemented. A malicious server could potentially use this flaw to leak portions of memory (possibly including private SSH keys) of a successfully authenticated OpenSSH client.

The SSH daemon will be restarted during the update in case it is enabled.

[close]

http://www.ipfire.org/download
Titel: IPFire 2.17 Core Update 98
Beitrag von: SiLæncer am 25 Februar, 2016, 18:00
Release Notes

Due to a recently discovered security vulnerability in glibc, we are releasing this Core Update that contains a fix for CVE-2015-7547.
CVE-2015-7547 in glibc/getaddrinfo

The getaddrinfo() interface is glibc, the system’s main C library, is used to resolve names into IP addresses using DNS. An attacker can exploit the process in the system performing this request by sending a forged reply that is too long causing a stack buffer overflow. Code can potentially be injected and executed.

IPFire is however not directly exploitable by this vulnerability as it is using a DNS proxy, that rejects DNS responses that are too long. So IPFire itself and all systems on the network that use IPFire as DNS proxy are protected by the DNS proxy. However, we decided to push out a patch for this vulnerability as quickly as we can.

[close]

http://www.ipfire.org/download
Titel: IPFire 2.17 Core Update 99
Beitrag von: SiLæncer am 08 März, 2016, 17:00
Release Notes

This is the official release announcement for IPFire 2.17 – Core Update 99. Another OpenSSL security fix has been released, so that we created this Core Update that fixes that among some other security vulnerabilities.
OpenSSL security fixes – 1.0.2g

Please check out the original security advisory for more details.

    Cross-protocol attack on TLS using SSLv2 (DROWN) (CVE-2016-0800)
    Double-free in DSA code (CVE-2016-0705)
    Memory leak in SRP database lookups (CVE-2016-0798)
    BN_hex2bn/BN_dec2bn NULL pointer deref/heap corruption (CVE-2016-0797)
    Fix memory issues in BIO_*printf functions (CVE-2016-0799)
    Side channel attack on modular exponentiation (CVE-2016-0702)
    Divide-and-conquer session key recovery in SSLv2 (CVE-2016-0703)
    Bleichenbacher oracle in SSLv2 (CVE-2016-0704)

IPFire is most likely not vulnerable by the most famous of all these vulnerabilities known as DROWN. However we recommend updating as soon as possible and we also recommend to reboot the system afterwards.
OpenSSH 7.2p1

This is primarily a bugfix release.

The SSH daemon will be restarted during the update in case it is enabled.

[close]

http://www.ipfire.org/download
Titel: IPFire 2.19 Core Update 100
Beitrag von: SiLæncer am 15 April, 2016, 06:00
Release Notes

It is a great moment to us and we are very proud to release the 100th Core Update today.

This update will bring you IPFire 2.19 which we release for 64 bit on Intel (x86_64) for the first time. This release was delayed by the various security vulnerabilities in openssl and glibc, but is packed with many improvements under the hood and various bug fixes.

64 bit

There will be no automatic update path from a 32 bit installation to a 64 bit installation. It is required to manually reinstall the system for those who want to change, but a previously generated backup can be restored so that the entire procedure takes usually less than half an hour.

There are not too many advantages over a 64 bit version except some minor performance increases for some use cases and of course the ability to address more memory. IPFire is able to address up to 64GB of RAM on 32 bit, so there is not much need to migrate. We recommend to use 64 bit images for new installations and stick with existing installations as they are.

Kernel Update

As with all major releases, this one comes with an updated Linux kernel to fix bugs and improve hardware compatibility. Linux 3.14.65 with many backported drivers from Linux 4.2 is also hardened stronger against common attacks like stack buffer overflows.

Many firmware blobs for wireless cards and other components have been updated just as the hardware database.

Hyper-V performance issues

A backport of a recent version of the Microsoft Hyper-V network driver module will allow transferring data at higher speeds again. Previous versions had only very poor throughput on some versions of Hyper-V.

Firewall Updates

It is now possible to enable or disable certain connection tracking modules. These Application Layer Gateway (ALG) modules help certain protocols like SIP or FTP to work with NAT. Some VoIP phones or PBXes have problems with those so that they can now be disabled. Some need them.

The firewall has also been optimised to allow more throughput with using slightly less system resources.

Misc

    Many programs and tools of the toolchain that is used have been updated. A new version of the GNU Compiler Collections offers more efficient code, stronger hardening and compatibility for C++11
        GCC 4.9.3, binutils 2.24, bison 3.0.4, grep 2.22, m4 1.4.17, sed 4.2.2, xz 5.2.2
    dnsmasq, the IPFire-internal DNS proxy has been updated and many instability issues have been fixed
    openvpn has been updated to version 2.3.7 and the generated configuration files have been updated to be compatible with upcoming versions of OpenVPN
    IPFire will now wait with booting up when the time needs to synchronised and DHCP is used until the connection is established and then continue booting up
    bind was updated to version 9.10.3-P2
    ntp was updated to version 4.2.8p5
    tzdata, the database for timezone definitions, was updated to version 2016b
    Various cosmetic fixes were done on the web user interface
    A bug causing VLAN devices not being created when the parent NIC comes up has been fixed
    DHCP client: Resetting the MTU on broken NICs that lose link has been fixed
    A ramdisk to store the databases of the graphs shown in the web user interface is now used by default again on installations that use the flash image when more than 400MB of memory is available
    A bug that the Quality of Service could not be stopped has been fixed
    Some old code has been refurbished and some unused code has been dropped in some internal IPFire components

Add-ons

    owncloud has been updated to version 7.0.11
    nano has been updated to version 2.5.1
    rsync has been updated to version 3.1.2

[close]

http://www.ipfire.org/download
Titel: IPFire 2.19 Core 104
Beitrag von: SiLæncer am 22 September, 2016, 18:00
Changelog

Linux 3.14.79:

The Linux kernel has been updated to version 3.14.79 and brings you various bug-fixes, stability improvements and supports more hardware.

Guardian:

Guardian is an Intrusion-Prevention-System that is hooked into Snort, the Intrusion Detection System. It reacts on reported events by blocking access for hosts where malicious traffic was detected to originate from. That enables IPFire to be a dynamic firewall and block any abuse or other unwanted behaviour automatically.
Since the old implementation was quite old and rather limited, Stefan Schantl started a complete rewrite which is faster, more efficient in resource usage and of course more reliable.
If you want to use Guardian, you will have to install the guardian add-on package.
This Core Update updates Snort to version 2.9.8.2.

Misc:

The IPFire web user interface is hardened against a potential environment variable injection attacked known under the name HTTPoxy. This was never possible to exploit in IPFire.
Dynamic DNS Updater
Add support for DuckDNS
Update URL for spdyn
OpenSSH has been updated to 7.3p1 which fixes various security issues
Updated packages: shadow 4.2.1, libarchive 3.2.1, libcap 2.25, acl 2.2.52, iputils s20160308, curl 7.49.1, popt 1.16, pcre 8.39, acpid 2.0.26, which 2.21, libtiff 4.0.6, ntp 4.2.8p8, wget 1.18
Correction of wrong spelled unit “bit”

Add-ons:

Updated:

htop 2.0.2
nano 2.6.1
nginx 1.8.1
p7zip fixes CVE-2016-2334, CVE-2016-2335

New packages:

Indepently from this Core Update, libvirt has been released as a new add-on. Read all about it on its IPFire Planet post.
freeradius, console configuration only

[close]

http://www.ipfire.org/download
Titel: IPFire 2.19 Core 105
Beitrag von: SiLæncer am 28 September, 2016, 17:00
Whats new:>>

IPFire 2.19 Core Update 105 patches a number of security issues in two cryptographic libaries: openssl and libgcrypt. We recommend installing this update as soon as possible and reboot the IPFire system to complete the update.

http://www.ipfire.org/download
Titel: IPFire 2.19 Core 106
Beitrag von: SiLæncer am 03 November, 2016, 17:00
Release Notes

This is the official release announcement for IPFire 2.19 – Core Update 106 which comes with a number of exciting new features, many bug fixes and a few security improvements.
Change of the DNS Proxy

IPFire used dnsmasq as DNS proxy before which is now replaced by unbound. The latter is in contrast to the former software that is specifically designed as an DNS forwarding proxy or DNS recursor and implemented DNSSEC from early on.

Because of our decision to enable DNSSEC by default and various problems in dnsmasq we have been toying with the idea of replacing it for a very long time. Unfortunately development resources are tight and because of this being a substantial part of the system and hooked into many other things, this was a very time-consuming project.

Finally, this new solution should now bring various advantages:
Performance

unbound is multi-threaded and IPFire will start one thread per CPU core that is available. That will allow execution of multiple queries in parallel which should increase responsiveness and throughput.

The cache size is adjusted based on memory available on the system. Bigger systems will have a significantly bigger DNS cache which will speed up browsing especially in larger environments like universities with a large number of clients.
Better DNSSEC reliability

DNSSEC is enabled by default (as it was before). However, unbound does not rely on the upstream servers being validating resolvers, too. This will bring DNSSEC to many more users. DNS servers are now tested before being passed on for use and any malfunctioning DNS servers won’t be used. Status of this can be seen on the user web interface.

Please see this list of various DNS services on the Internet for more details.

If none of the DNS servers configured or received from the provider can be used, unbound will fall back to full recursor mode.

With the next key rollover of the DNS root zone, IPFire will automatically download and validate the new key according to RFC5011.
Enhanced Features

DHCP leases will be published into the local DNS zone as before. Static leases are imported as well which is a new feature. Everything IP address will resolve to its hostname by publishing PTR records.
Misc

    Passwords are now saved with a stronger hash (SHA512) which was MD5 before. Please change the root password using the setup tools to store your passwords with the improved hash.
    Firewall: An incorrect validation of destination IP addresses for rules that use Destination NAT caused that some valid addresses were not accepted. This is fixed now.
    PPP connections no longer require a password being set (some providers require these being empty)
    The NTP client now waits correctly for WiFi connections being established before continuing to boot
    The samba add-on enables SMBv2 by default
    IPFire now ships the firmware for MediaTek 7601 series devices
    Various old software components that are not used any more are cleaned up from the systems
    The iptables page on the web user interface has been improved to be more readable

Updated Packages

This update installs a large number of updated packages:

    openssl 1.0.2j which fixes some implementation errors and DoS introduced in the 1.0.2i update
    strongswan has been updated to version 5.5.0
    attr 2.4.47, dejagnu 1.6, diffutils 3.5, expat 2.2.0, file 5.28, flex 2.6.1, gettext 0.19.8.1, gnupg 1.4.21, iproute2 4.7.0, ipset 6.29, libassuan 2.4.3, libgcrypt 1.7.3, libidn 1.33, libgpg-error 1.24, libnetfilter_conntrack 1.0.6, libmnl 1.0, make 4.2.1, smartmontools 6.5, squid 3.5.21, usb_modeswitch 2.4.0, usb_modeswitch_data 20160803

Add-ons

    The new Guardian 2.0 add-on’s user interface received some cosmetic changes

Updated Packages

    asterisk 11.23.1
    krb 1.14.4
    Midnight Commander 4.8.18
    monit 5.19.0
    nano 2.6.3
    transmission 2.92

[close]

http://www.ipfire.org/download
Titel: IPFire 2.19 Core 108
Beitrag von: SiLæncer am 23 Dezember, 2016, 13:00
Changelog

Asynchronous Logging:

Asynchronous logging is now enabled by default and not configurable any more. This made some programs that wrote an extensive amount of log messages slow down and possible unresponsive over the network which causes various problems. This was seen on systems with very slow flash media and virtual environments.

Miscellaneous:

The check that tests DNS servers for any misconfiguration assumed some name servers being validating although they were not and very likely not working at all. This has been fixed now and systems using these broken name servers should fall back to recursor mode.
A problem in the firewall GUI was fixed that prohibited adding an IPsec VPN connection and OpenVPN connection with the same name to a firewall group.

Updated Core Packages:

strongswan was updated to version 5.5.1 which fixes various bugs
ntp was updated to version 4.2.8p9 which fixes various security issues
ddns was updated to version 008

Updated Add-ons:

nano, the text editor, was updated to version 2.7.1
tor, the anonymity network, was updated to version 0.2.8.10

[close]

http://www.ipfire.org/download
Titel: IPFire 2.19 Core 109
Beitrag von: SiLæncer am 20 Februar, 2017, 17:00
Changelog

DNS Fixes:

The DNS proxy which is working inside IPFire has been updated to unbound 1.6.0 which brings various bug fixes. Therefore, QNAME minimisation and hardening below NX domains have been re-activated.
At start time, IPFire now also checks if a router in front of IPFire drops DNS responses which are longer than a certain threshold (some Cisco devices do this to “harden” DNS). If this is detected, the EDNS buffer size if reduced which makes unbound fall back to TCP for larger responses. This might slow down DNS slightly, but keeps it working after all in those misconfigured environments.

Misc:

openssl has been updated to 1.0.2k which fixes a number of security vulnerabilities with “moderate” severity
The kernel is now supporting some newer eMMC modules
The backup script is now working more reliably on all architectures
The network scripts that created MACVTAP bridges for virtualisation among other things now support standard 802.3 bridges, too
The firewall GUI denied creating subnets which were a subnet of any of the standard networks which has been fixed
Matthias Fischer submitted package updates for: bind 9.11.0-P2 with some security fixes, libpcap 1.8.1, logrotate 3.9.1, perl-GeoIP module 1.25, snort 2.9.9.0, squid 3.5.24 which fixes various bugs, sysklogd 1.5.1, zlib 1.2.11
Furthermore, libpng has been updated to 1.2.57 which fixes some security vulnerabilities

Add-ons:

Jonatan Schlag packaged Python 3 for IPFire
He also updated libvirt to version 2.5 and qemu to version 2.8
Matthias Fischer submitted a number of updates for the following packages: nano 2.7.2, tcpdump 4.8.1, tmux 2.3
tor has been updated to 0.2.9.9 which fixes a number of denial-of-service vulnerabilities
sarg has been updated to 2.3.10

[close]

http://www.ipfire.org/download
Titel: IPFire 2.19 Core 110
Beitrag von: SiLæncer am 03 Mai, 2017, 20:00
Changelog

On-Demand IPsec VPNs:

IPFire used to keep IPsec VPNs up all the time. This wastes resources if a connection is not used very often for example for a daily backup only.
Core Update 110 allows to configure IPsec VPNs in an On-Demand mode which will establish the connection as soon as it is needed and will close it after 15 minutes of inactivity to save resources.
This is especially handy for people who have a large number of IPsec net-to-net connections on either weak hardware or connections that are not required all the time like maintenance or backup connections, etc.

Performance Enhancements for DNS:

unbound, the DNS resolver working inside IPFire, has been tuned to allow more concurrent queries and assigned more memory to keep a larger DNS cache.
Especially in large networks or when a burst of DNS queries needs to be handled, there is a notable increase of performance.

Misc.:

Graphs in the web user interface are now larger to show more detail
Packets that are received from a bridge interface are not passed through the firewall engine any more
Apache allows more concurrent connections now, which speeds up distributing proxy.pac, updates from Update Accelerator and more
The GeoIP database is now regularly updated over HTTPS
Gabriel Rolland has updated the Italian translation
Jonatan Schlag reorganised all initscripts in the build system which makes packaging add-ons easier
setup allows now to set the subnet mask of the RED interface to 255.255.255.255. This is required with some web hosting companies which are trying to save IPv4 addresses and then need a host route for the default gateway.

Updated Packages:

apcupsd 3.14.14, bind 9.11.0-P3, cairo 1.14.8, conntrack-tools 1.4.4, fontconfig 2.12.1, freetype 2.7.1, lm_sensors 3.4.0, nettle 3.3, ntp 4.2.8p10, openssh 7.4p1 – for PCI compliance, pixman 0.34.0, squid 3.5.25, unbound 1.6.1, wget 1.19.1

Add-ons:

cups 2.2.2 & cups-filter, ffmpeg 3.2.4, ghostscript 9.20, mc 4.8.19, motion 4.0.1, tcpdump 4.9.0

New Packages:

gnutls, an SSL library
epson-inkjet-printer-escpr for EPSON printers
lcms2, an image library
qpdf and poppler PDF rendering libraries

Dropped Packages:

Avahi has been dropped because of lack of a maintainer

[close]

http://www.ipfire.org/download
Titel: IPFire 2.19 Core 111
Beitrag von: SiLæncer am 15 Juni, 2017, 18:00
Changelog

WPA Enterprise Authentication in Client Mode:

The firewall can now authenticate itself with a wireless network that uses Extensible Authentication Protocol (EAP). These are commonly used in enterprises and require a username and password in order to connect to the network.
IPFire supports PEAP and TTLS which are the two most common ones. They can be found in the configured on the “WiFi Client” page which only shows up when the RED interface is a wireless device. This page also shows the status and protocols used to establish the connection.
The index page also shows various information about the status, bandwidth and quality of the connection to a wireless network. That also works for wireless networks that use WPA/WPA2-PSK or WEP.

QoS Multi-Queueing:

The Quality of Service is now using all CPU cores to balance traffic. Before, only one processor core was used which caused a slower connection on systems with weaker processors like the Intel Atom series, etc. but fast Ethernet adapters. This has now been changed so that one processor is no longer a bottle neck any more.
New crypto defaults:

In many parts of IPFire cryptographic algorithms play a huge role. However, they age. Hence we changed the defaults on new systems and for new VPN connections to something that is newer and considered to be more robust.

IPsec:

The latest version of strongSwan supports Curve 25519 for the IKE and ESP proposals which is also available in IPFire now and enabled by default.
The default proposal for new connections now only allows the explicitly selected algorithms which maximises security but might have a compatibility impact on older peers: SHA1 is dropped, SHA2 256 or higher must be used; the group type must use a key with length of 2048 bit or larger
Since some people use IPFire in association with ancient equipment, it is now allowed to select MODP-768 in the IKE and ESP proposals. This is considered broken and marked so.

OpenVPN:

OpenVPN used SHA1 for integrity by default which has now been changed to SHA512 for new installations. Unfortunately OpenVPN cannot negotiate this over the connection. So if you want to use SHA512 on an existing system, you will have to re-download all client connections as well.
Various markers have been added to highlight that certain algorithms (e.g. MD5 and SHA1) are considered broken or cryptographically weak.

Misc.:

IPsec VPNs will be shown as “Connecting” when they are not established, but the system is trying to
A shutdown bug has been fixed that delayed the system shutting down when the RED interface was configured as static
The DNSSEC status is now shown correctly on all systems
The following packages have been updated: acpid 2.0.28, bind 9.11.1, coreutils 8.27, cpio 2.12, dbus 1.11.12, file 5.30, gcc 4.9.4, gdbm 1.13, gmp 6.1.2, gzip 1.8, logrotate 3.12.1, logwatch 7.4.3, m4 1.4.18, mpfr 3.1.5, openssl 1.0.2l (only bug fixes), openvpn 2.3.16 which fixes CVE-2017-7479 and CVE-2017-7478, pcre 8.40, pkg-config 0.29.1, rrdtool 1.6.0, strongswan 5.5.2, unbound 1.6.2, unzip 60, vnstat 1.17
Matthias Fischer contributed some cosmetic changes for the firewall log section
Gabriel Rolland improved the Italian translation
Various parts of the build system have been cleaned up

Add-ons:

New Add-ons:

ltrace: A tool to trace library calls of a binary

Updated Add-ons:

The samba addon has been patched for a security vulnerability (CVE-2017-7494) which allowed a remote code executing on writable shares.
ipset 6.32
libvirt 3.1.0 + python3-libvirt 3.6.1
git 2.12.1
nano 2.8.1
netsnmpd which now supports reading temperature sensors with help of lm_sensors
nmap 7.40
tor 0.3.0.7

[close]

http://www.ipfire.org/download
Titel: IPFire 2.19 Core 112
Beitrag von: SiLæncer am 13 August, 2017, 21:00
Changelog

This Core Update mainly comes with updates under the hood. Core system libraries have been updated to new major versions and the build toolchain got major updates.

These are:

glibc 2.25
GNU Compiler Collection 6.3.0
binutils 2.29
Python 2.7.13
ccache 3.3.4, bc 1.07.1, cmake 3.8.1, flex 2.6.4, fuse 2.9.7, boost 1.64.0, gawk 4.1.4, gnutls 3.5.11, grep 2.27, libarchive 3.3.1, libgcrypt 1.7.7, libgpg-error 1.27, libxml2 2.9.4, mdadm 4.0, openssl 1.0.2l, pkg-config 2.29.2, reiserfsprogs 3.6.25, SDL 1.2.15, squid 3.5.26, strongswan 5.5.3, unbound 1.6.3, util-linux 2.28.2

Misc:

openvpn (2.3.17) has received some security updates that have been discovered recently.
A remote command execution vulnerarbility in ids.cgi has been closed with could be used by authenticated users to run shell commands with non-superuser rights.
It is now possible to create networks in the firewall that are a subnet of any of the internal zones.
The toolchain and build scripts have also been cleaned up and improved.
The IPFire netboot has been updated so that always the best architecture for a system is used (i.e. the 64 bit version is installed when the system supports it).

Add-ons:

Updated:

7zip 16.02
bird 1.6.3
cyrus-imapd 2.5.11
iperf 2.0.9
directfb 1.7.7
freeradius 3.0.14
monit 5.23.0
miniupnpd is now listening on GREEN by default
tmux 2.5
tor 3.0.8

Dropped:

imspector and tcpick are not maintained upstream any more

[close]

http://www.ipfire.org/download
Titel: IPFire 2.19 Core 113
Beitrag von: SiLæncer am 04 September, 2017, 20:00
Changelog

Who Is Online?:

Who Is Online? (or WIO in short) has finally arrived on IPFire. It has been ported by the original author Stephan Feddersen and Alex Marx and is available as a usual add-on package called wio.
It is a builtin monitoring service for the local network showing what devices are connected, which ones are online and can also send alarms on various events. Give it a try!

Misc.:

The DNS root keys have been updated to make DNS work beyond October 2017 after the DNSSEC key rollover has been performed
Serial consoles now automatically detect the baudrate after the kernel has been booted
Package updates by Matthias Fischer: bind 9.11.2, gnutls 3.5.14, libgcrypt 1.8.0, logrotate 3.12.3, nano 2.8.6, pcre 8.41, squid 3.5.26, unbound 1.6.4

Add-Ons:

iftop has been updated to 1.0pre4 by Erik Kapfer
Matthias Fischer updated: hostapd 2.6, tor 0.3.0.10

[close]

http://www.ipfire.org/download
Titel: pfSense 2.4.1
Beitrag von: SiLæncer am 28 Oktober, 2017, 21:00
Changelog

Fixes for the set of WPA2 Key Reinstallation Attack issues commonly known as KRACK
Fixed a VT console race condition panic at boot on VMware platforms (especially ESXi 6.5.0U1)
Fixed a bsnmpd problem that causes it to use excess CPU and RAM with the hostres module in cases where drives support removable media but have no media inserted
Fixed an upgrade problem due to FreeBSD 11 removing legacy ada aliases, which caused some older installs to fail when mounting root post-upgrade
Changed the boot-time fsck process the ensure the disk is mounted read-only before running fsck in preen mode
Changed the VLAN interface names to use the ‘dotted’ format now utilized by FreeBSD, which is shorter and helps to keep the interface name smaller than the limit (16) This fixes the 4 digit VLAN issues when the NIC name is 6 bytes long. This change was made not only to fix the name length issue, but also to reduce the differences between how FreeBSD uses VLANs and how they are used by pfSense interface functions.
These VLAN changes prevent PPP sessions from working on VLAN parent interfaces.
Fixed setting VLAN Priority in VLAN interface configuration

[close]

http://www.pfsense.com/
Titel: IPFire 2.19 Core 115
Beitrag von: SiLæncer am 03 November, 2017, 17:00
Changelog

Hello Community,

finally, we are releasing the long-awaited IPFire 2.19 – Core Update 115 which brings the shiny new Captive Portal and various security and performance improvements as well as fixing security vulnerabilities.

This is a large Core Update with a huge number of changes and to support our efforts to develop new features and maintain the existing system as well as constantly improving it, we would like to ask you to donate!

Captive Portal

The new IPFire Captive Portal comes pre-installed on every IPFire system and allows easy access control for wireless and even wired networks. It is simple and very easy to set with only a few configuration options. That makes it versatile for many adminstrators and also very simple for all users.

It comes with two configuration modes: The default mode asks the user to accept terms and conditions. After doing so, access to the network is granted for a configurable time. After the time has expired, Internet access is blocked again immediately.

Optionally you can generate coupons that allow access for one device for a set time. Those coupons can also be exported as a PDF document and being printed so that they can be handed out easily at a hotel reception for example.

Although, Germany has just abolished the controversial law that made the subscriber of on Internet connection liable for everything anyone does over that connection (Störerhaftung), this is still a great feature for 2017 where WiFi networks in hotels, cafes and everywhere else are a must. It allows to only give access to the people who booked a room in your hotel, or bought a cup of coffee in your cafe. That will keep the WiFi from being overloaded and it will be fast for everyone.

The full documentation can be found on our wiki.

Thanks go to all the people of our community who have worked on this for a very long time.

Security Improvements

The web user interface has been hardened by a series of patches from Peter Müller:

    When establishing a new TLS connection, ECDSA is now preferred over RSA which makes the TLS handshake much faster and uses less resources on the client and server. It is also considered to be stronger to brute-force.
    An additional ECDSA key is now generated in addition to the existing RSA key which improves security of any TLS connections to the web user interface.
    Previously, some attacks were possible to make the web browser submit login credentials via HTTP without encryption. The apache configuration has been changed to never ask for login without establishing a TLS connection before.
    A smaller information leak has also been fixed where anyone could access the credits.cgi page which revealed the version information of the installed system.

These changes require to restart the web server that runs the web user interface. This happens automatically during the installation of this Core Update but might render the web user interface unavailable for a short moment.

OpenVPN Configuration Updates

The OpenVPN project has deprecated some configuration options. This has been updated in IPFire as well which will now generate new configuration files when ever a new certificate has been issued. The old configuration files and certificates will remain but won’t be compatible with OpenVPN 2.5 any more. There is no need for action right now, but old connections might not work with clients that run a newer version of OpenVPN in the future. New connections will work fine with any recent and future version of OpenVPN.

Thanks for Erik for sending in a patch for this.

Misc

    The WiFi access point add-on has already been patched against the KRACK attacks on the day those were announced. The wpa_supplicant package which implements the WiFi client feature of IPFire has been patched in this release against those attacks.
    IPsec VPNs that use Curve25519 would not want to come up after installing the previous Core Update. This has been fixed now.
    Updated packages: logrotate 3.13.0, openvpn 2.3.18, unbound 1.6.7
    Some files that have been unused for a very long time have been cleaned up.
    All downloads of the project’s ISO files are now done over HTTPS.

Updated Add-Ons

    tor 3.1.7

[close]

http://www.ipfire.org/download
Titel: IPFire 2.19 Core 116
Beitrag von: SiLæncer am 08 November, 2017, 21:00
Changelog

openssl 1.0.2m:

The OpenSSL project released version 1.0.2m and issued two security advisories in the last week. The two vulnerabilities that were discovered were of moderate and low security, but we have decided to ship you this update as soon as possible. Hence it is recommended to update as soon as possible, too.
The more severe vulnerability referenced as CVE-2017-3736 fixes a problem with modern Intel Broadwell and AMD Ryzen processors where OpenSSL uses some modern DMI1, DMI2 and ADX extensions and calculates the square root incorrectly. This could be exploited by an attacker who is able to put significant resources into recover a private key more easy alas this attack is still considered virtually unfeasible by the OpenSSL security team.
The less severe vulnerability was caused by overreading certificate data when a certificate has a malformed IPAddressFamily extension. This could lead lead to erroneous display of the certificate in text format. This vulnerability is tracked under CVE-2017-3735.

Misc:

wget also suffered from two security vulnerabilities that allowed an attacker to execute arbitrary code. They are referenced under CVE-2017-13089 and CVE-2017-13090.
apache was updated to version 2.4.29 which fixes a number of bugs.
snort has been updated to version 2.9.11.
xz has also been updated to version 5.2.3 which brings various improvements.

[close]

http://www.ipfire.org/download
Titel: IPFire 2.19 Core 117
Beitrag von: SiLæncer am 05 Januar, 2018, 20:00
Changelog

OpenSSL 1.0.2n:

One moderate and one low security vulnerability have been patched in OpenSSL 1.0.2n. The official security advisory can be found here.

IPsec:

It is now possible to define the inactivity timeout time when an idle IPsec VPN tunnel is being closed
Support for MODP groups with subgroups has been dropped
Compression is now disabled by default because it is not very effective at all
strongswan has been updated to 5.6.1

OpenVPN:

It is now easier to route OpenVPN Roadwarrior Clients to IPsec VPN networks by choosing routes in each client’s configuration. This makes hub-and-spoke designs easier to configure.

Build toolchain:

Some build scripts have been refactored to clean up the build process and the toolchain has been moved from /tools to /tools_< arch >.
nasm, the Net Assembler, has been updated to 2.13.2

Misc:

SSL compression and SSL session tickets have been disabled in Apache. This will improve the security of the web user interface.
At various places, GeoIP information is available where IP addresses are shown and that information is useful to know
Adding static routes over the web user interface has been fixed
Some aesthetic issues on the captive portal configuration pages have been fixed and the captive portal is now working together with the proxy in transparent mode
Syslogging to a remove server can now be configured to either use TCP or UDP

Add-ons:

Samba has been updated to fix several security issues
mc has been updated to 4.8.20
nano has been updated to 2.9.1
sslscan, vsftpd and Pound have been dropped because they are not maintained upstream any more and incompatible with OpenSSL 1.1.0

[close]

http://www.ipfire.org/download
Titel: IPFire 2.19 Core 119
Beitrag von: SiLæncer am 14 März, 2018, 19:00
Release Notes

This is the release announcement for IPFire 2.19 – Core Update 119. It updates the toolchain of the distribution and fixes a number of smaller bug and security issues. Therefore this update is another one of a series of general housekeeping updates to make IPFire better, faster and of course more secure!

Thanks for the people who contributed to this Core Update by submitting their patches and please help us to support everyone’s work with your donation!

Toolchain Updates

The toolchain is a collection of programs that is used to build the distribution. One of the most important one is the compiler GCC which has been updated to version 7.3.0 which mainly adds support for retpoline. This is needed to build protection against Spectre into newer kernels.

The main C library, glibc, has been updated to version 2.27 and brings various stability fixes, performance improvents and bug fixes.

Other toolchain packages that have been updated: binutils 2.30, ccache 3.4.1, diffutils 3.1.6, swig 3.0.12

Security-Relevant Changes

    On the OpenVPN configuration page, ciphers that are considered weak are now marked as such and we do not recommend using any of these.
    strongswan’s certificate parser had a vulnerability (CVE-2018-6459)
    Programs that use the C++ standard library are being recompiled to perform extra out-of-bounds checks that are cheap, but add some extra security.
    dma, the Dragonfly Mail Agent, was hardcoded to only use TLSv1.0 which has been patched to always use the best available protocol version of TLS that is available.
    The Apache server signature is now fully hidden

Misc

    Reverse lookup zones did not work and have been fixed
    IPsec subnets for tunnels that route multiple networks are now shown correctly on the start page
    Updated packages: hostname 3.20, iproute2 4.14.1, pam 1.30.0
    Support for ISDN was removed
    Userspace tools for I2C busses have been added

Add-Ons

The following packages have been updated: asterisk 13.18.5, bacula 9.0.6, bwm-ng 0.6.1-f54b3fa, flac 1.3.2, haproxy 1.8.0, nginx 1.13.7, nut 2.7.4, openvmtools 10.2.0, postfix 3.2.4, powertop 2.9, sarg 2.3.11, stunnel 5.44

These packages have been dropped and will be removed with this Core Update: lcr, mysql which was very outdated and is not needed by any add-ons.

[close]

http://www.ipfire.org/download
Titel: pfSense 2.4.3
Beitrag von: SiLæncer am 31 März, 2018, 15:00
Release Notes

This release includes several important security patches:

    Kernel PTI mitigations for Meltdown (optional tunable) FreeBSD-SA-18:03.speculative_execution.asc
    IBRS mitigation for Spectre V2 (requires updated CPU microcode) FreeBSD-SA-18:03.speculative_execution.asc
    Fixes for FreeBSD-SA-18:01.ipsec
    Fixed three potential XSS vectors, and two potential CSRF issues
    CSRF protection for all dashboard widgets
    Updated several base system packages to address CVEs

In addition to security fixes, pfSense software version 2.4.3 also includes important bug fixes.

Notable bug fixes in 2.4.3 include:

    Fixed hangs due to Limiters and pfsync in High Availability configurations
    Imported a netstat fix to improve performance and reduce CPU usage, especially on the Dashboard and ARM platforms
    Fixed a memory leak in the pfSense PHP module
    Fixed DHCPv6 lease display for entries that were not parsed properly from the lease database
    Fixed issues on assign_interfaces.php with large numbers of interfaces
    Fixed multiple issues that could result in an invalid ruleset being generated
    Fixed multiple Captive Portal voucher synchronization issues with HA
    Fixed issues with XMLRPC user account synchronization causing GUI inaccessibility on secondary HA nodes
    … and many more!

There are several new features in 2.4.3, some of the more important ones are:

    Changed IPsec Phase 1 to allow selecting both IPv4 and IPv6 so the local side can allow inbound connections to either address family
    Changed IPsec Phase 1 to allow configuration of multiple IKE encryption algorithms, key lengths, hashes, and DH groups
    Changed SMTP notifications handling so they are batched, to avoid sending multiple e-mail messages in a short amount of time
    Added options to RFC 2136 Dynamic DNS for server key algorithm and to change the source address used to send updates
    Added VLAN priority tagging for DHCPv6 client requests
    Hardware support for the new XG-7100 including C3000 SoC support, C3000 NIC support, and Marvell 88E6190 switch support (Factory installations only)
    … and more!

[close]

http://www.pfsense.com/
Titel: IPFire 2.19 Core 120
Beitrag von: SiLæncer am 02 Mai, 2018, 20:00
Release Notes

RAM-only Proxy:

In some installations it might be desirable to only let the proxy cache objects in memory and not on disk. Especially when Internet connectivity is fast and storage is slow this is most useful.
The web UI now allows to set the disk cache size to zero which will disable the disk cache entirely. Thanks to Daniel for working on this.

OpenVPN 2.4:

IPFire has migrated to OpenVPN 2.4 which introduces new ciphers of the AES-GCM class which will increase throughput on systems that have hardware acceleration for it. The update also brings various other smaller improvements.
Erik has been working on integration this which has required some work under the hood but is compatible with any previous configurations for both roadwarrior connections and net-to-net connections.

Improved Cryptography:

Cryptography is one of the foundations to a secure system. We have updated the distribution to use the latest version of the OpenSSL cryptography library (version 1.1.0). This comes with a number of new ciphers and major refacturing of the code base has been conducted.
With this change, we have decided to entirely deprecate SSLv3 and the web user interface will require TLSv1.2 which is also the default for many other services. We have configured a hardened list of ciphers which only uses recent algorithms and entirely removes broken or weak algorithms like RC4, MD5 and so on.
Please check before this update if you are relying on any of those, and upgrade your dependent systems.
Various packages in IPFire had to be patched to be able to use the new library. This major work was necessary to provide IPFire with the latest cryptography, migrate away from deprecated algorithms and take advantage of new technology. For example the ChaCha20-Poly1305 ciphersuite is available which performs faster on mobile devices.
The old version of the OpenSSL library (1.0.2) is still left in the system for compatibility reasons and will continue to be maintained by us for a short while. Eventually, this will be removed entirely, so please migrate any custom-built add-ons away from using OpenSSL 1.0.2.

Misc:

Pakfire has now learned which mirror servers support HTTPS and will automatically contact them over HTTPS. This improves privacy.
We have also started phase one of our planned Pakfire key rollover.
Path MTU Discovery has been disabled in the system. This has continuously created issues with the stability of IPsec tunnels that have chosen paths over networks that were incorrectly configured.
The QoS template could miscalculate the bandwidth which has now been fixed that the sum of the guaranteed bandwidth over all classes does not exceed 100%

Updated packages:

bind 9.11.3, curl 7.59.0, dmidecode 3.1, gnupg 1.4.22, hdparm 9.55, logrotate 3.14.0, Net-SSLeay 1.82, ntp 4.2.8p11, openssh 7.6p1, python-m2crypto 0.27.0, unbound 1.7.0, vnstat 1.18

Add-ons:

These add-ons have been updated: clamav 0.99.4, htop 2.1.0, krb5 1.15.2, ncat 7.60, nano 2.9.4, rsync 3.1.3, tor 0.3.2.10, wio 1.3.2

[close]

http://www.ipfire.org/download
Titel: pfSense 2.4.3-p1
Beitrag von: SiLæncer am 18 Mai, 2018, 18:00
Release Notes

This release includes several important security patches, including the issues discussed last week:

    FreeBSD Security Advisory for CVE-2018-8897 FreeBSD-SA-18:06.debugreg
    FreeBSD Errata Notice for CVE-2018-6920 and CVE-2018-6921 FreeBSD-EN-18:05.mem
    Fixed a potential LFI in pkg_mgr_install.php #8485 pfSense-SA-18_04.webgui
    Fixed a potential XSS in pkg_mgr_install.php #8486 pfSense-SA-18_05.webgui

Additionally, 2.3.5-p2 includes corrections for items already addressed in the 2.4.x release branch:

    Fixed a potential XSS vector in RRD error output encoding #8269 pfSense-SA-18_01.packages
    Fixed a potential XSS vector in diag_system_activity.php output encoding #8300 pfSense-SA-18_02.webgui
    Changed sshd to use delayed compression #8245
    Added encoding for firewall schedule range descriptions #8259

Aside from security updates, the new versions include a handful of beneficial bug fixes for various minor issues.

For a complete list of changes, see the 2.4.3-p1 Release Notes and 2.3.5-p2 Release Notes.
Important Information

At this time, pfSense 2.3.x is a Security and Errata maintenance branch only. pfSense 2.4.x is the primary stable supported branch. If the firewall hardware is capable of running pfSense 2.4.x, consider upgrading to that release instead.

If you have not yet upgraded to pfSense version 2.4.0 or later, read the information in the 2.4.0 Release Announcement before updating for important information that may impact the ability of a firewall to upgrade to pfSense version 2.4.x.

If either by choice or by hardware limitations a firewall cannot be upgraded to pfSense 2.4.x, see the pfSense 2.3.5-RELEASE announcement for information on obtaining the latest 2.3.x release.

[close]

http://www.pfsense.com/
Titel: SmoothWall 3.1
Beitrag von: SiLæncer am 19 Juli, 2018, 21:00
(https://s26.postimg.cc/3uk34566x/screenshot_346.png)
SmoothWall is a secure operating system that converts a redundant PC, workstation, fileserver, or rackmount device into a firewall and VPN gateway, but goes way beyond that remit. It is Webmanaged so no keyboard, monitor, or mouse on the device is needed. It supports Internal ISDN, all popular NICS, all popular connection types: Modem, ISDN, Cable, ADSL, USB ADSL, and Ethernet. It also features a fully logging firewall, DHCP server, IPSEC VPN capabilities, and much more.

Freeware

http://www.smoothwall.org/
Titel: IPFire 2.21 Core 122
Beitrag von: SiLæncer am 30 Juli, 2018, 18:00
Release Notes

Highlight: Linux 4.14:

The distribution was rebased from our old long-term supported kernel to the new kernel 4.14.50.
Most importantly, this kernel improves the security of the system, increases performance and makes the core of IPFire more up to date and modern again. This update also enables mitigation against Meltdown and Spectre on some architectures. On Intel-based platforms, we update the microcode of the CPUs when the system boots up to avoid any performance penalties caused by the mitigation techniques.
Unfortunately, grsecurity is incompatible with any newer kernels and has been removed. This is connected to the decision of the grsecurity project to no longer open source their patches. Luckily the kernel developers have backported many features so that this kernel is still hardened and secure.
ARM systems won’t be able to install this update due to the kernel change which also requires changes on some bootloaders. For those users, we recommend to backup the system, reinstall and then restore the backup. The re-installed system will only come with a single ARM kernel instead of multiple for different platforms that we had before. It helps us to keep the distribution smaller and makes development efforts easier.

Misc:

Updated packages: apache 2.4, beep 1.3 with fixes for CVE-2018-0492, bwm-ng 0.6.1-f54b3fa, cmake 3.11.2, crda 3.18, ISC dhcp 4.4.1, dhcpcd 6.11.5, diffutils 3.1.6, gcc 7.3.0, grub 2.02, htop 2.2.0, iw 4.14, libidn 1.34, nano 2.9.7, nmap 7.70, openssh 7.7p1, pcre 8.42, powertop 2.9, rng-tools 6.2, sarg 2.3.11, tar 1.30, u-boot 2018.03, unbound 1.7.1, wget 1.19.5, xtables-addons 2.13, xz 5.2.4
The list of trusted Certificate Authorities has been updated and many have been removed
Also we updated firmware for various drivers and baseboards
The Web User Interface now shows any users logged in on the console

Smaller images due to more efficient compression:

We have tried to make the download of the distribution faster and make it use less space on our servers. As a first step, the flash images have been merged together and there is only one image that boots on systems with serial console and normal video output. Secondly, we now compress all images with the XZ algorithm so that they download faster and even decompress quicker, too.

New partition layout:

This release also changes the partition layout of the distribution. We have dropped the /var partition which was used for log files and data that the system collected. This data is now located on a single partition together with the OS. The size of the /boot partition has been increased to 128MB in the default partition layout.

Updated add-ons:

clamav 0.100.0
nagios-nrpe 3.2.1

[close]

http://www.ipfire.org/download
Titel: IPFire 2.21 Core 123
Beitrag von: SiLæncer am 07 September, 2018, 20:00
Changelog

    OpenSSL has been updated to versions 1.1.0i and for legacy applications version 1.0.2p (CVE-2018-0732 and CVE-2018-0737)

    IPsec

    IPsec now supports ChaCha20/Poly1305 for encryption
    It also allows to configure a connection to passively wait until a peer initiates it. This is helpful in some environments where one peer is behind NAT.

    OpenVPN

    Creating Diffie-Hellman keys with length of 1024 bits is no longer possible because they are considered insecure and not being supported by OpenVPN any more
    There is better warnings about this and other cryptographic issues on the web user interface

    Intrusion Detection

    Links in the log files have been fixed to open the correct page with details about a certain attack
    Downloads of rulesets properly validate any TLS certificates
    The /proc filesystem has been hardened so that no kernel pointers are being exposed any more
    nss-myhostname is now being used to dynamically determine the hostname of the IPFire system. Before /etc/hosts was changed which is no longer required.
    collectd: The cpufreq plugin has been fixed
    Generating a backup ISO file has been fixed
    Updated packages: apache 2.4.34, conntrack-tools 1.4.5, coreutils 8.29, fireinfo, gnupg 1.4.23, iana-etc 2.30, iptables 1.6.2, libgcrypt 1.8.3, libnetfilter_conntrack 1.0.7, libstatgrab 0.91, multipath-tools 0.7.7, openvpn 2.4.6, postfix 3.2.6, rng-tools 6.3.1, smartmontools 6.6, squid 3.5.28, strongswan 5.6.3, tzdata 2018e, unbound 1.7.3

    Add-ons:

    Support for owncloud has been removed from guardian (version 2.0.2)
    Updates: clamav 0.100.1, fping 4.0, hplip 3.18.6, ipset 6.38, lynis 2.6.4, mtr 0.92, nginx 1.15.1, tmux 2.7, tor 0.3.3.9
    avahi has been brought back in version 0.7 as it is required as a dependency by cups which has been fixed to automatically find any printers on the local network automatically
    asterisk is now compiled with any optimisation for the build system which was accidentally enabled by the asterisk build system


[close]

http://www.ipfire.org/download
Titel: IPFire 2.21 Core 124
Beitrag von: SiLæncer am 15 Oktober, 2018, 21:30
Changelog

Kernel Hardening:

We have updated the Linux kernel to version 4.14.72 which comes with a large number of bug fixes, especially for network adapters. It has also been hardened against various attack vectors by enabling and testing built-in kernel security features that prohibit access to privileged memory by unprivileged users and similar mechanisms.

OpenSSH Hardening:

Peter has contributed a number of patches that improve security of the SSH daemon running inside IPFire. For those, who have SSH access enabled, it will now require latest ciphers and key exchange algorithms that make the key handshake and connection not only more secure, but also faster when transferring data.
For those admins who use the console: The SSH client has also been enabled to show a graphic representation of the SSH key presented by the server so that comparing those is easier and man-in-the-middle attacks can be spotted quickly and easily.

Unbound Hardening:

The settings of the IPFire DNS proxy unbound have been hardened to avoid and DNS cache poisoning and use aggressive NSEC by default. The latter will reduce the load on DNS servers on the internet through more aggressive caching and will make DNS resolution of DNSSEC-enabled domains faster.

EFI:

IPFire now supports booting in EFI mode on BIOSes that support it. Some newer hardware only supports EFI mode and booting IPFire on it was impossible before this update. EFI is only supported on x86_64.
Existing installations won’t be upgraded to use EFI. However, the flash image and systems installed with one of the installation images of this update are compatible to be booted in both, BIOS and EFI mode.
Although this change does not improve performance and potentially increases the attack vector on the whole firewall system because of software running underneath the IPFire operating system, we are bringing this change to you to support more hardware. It might be considered to disable EFI in the BIOS if your hardware allows for it.

Misc:

CVE-2018-16232: Remote shell command injection in backup.cgi: It has been brought to our attention that it was possible for an authenticated attacker to inject shell commands through the backup.cgi script of the web user interface. Those commands would have been executed as a non-priviledged user. Thanks to Reginald Dodd to spot this vulnerability and informing us through responsible disclosure.
The hostname of the system was set incorrectly in the kernel before and is now being set correctly
Firewall: Creating rules with the same network as source and destination is now possible and renaming a network/host group is now correctly updating all firewall rules
Cryptography: ChaCha20-Poly1305 is now working on ARM, too
IPsec: The status of connections in waiting state is now shown correctly at all times; before, they always showed up as enabled although they were disabled.
pakfire: Some old and unused code has been cleaned out and the mirror health check has been removed, because a download will fail-over to another available mirror anyways
Intrusion Detection: Emerging Threats rules are now being downloaded over HTTPS rather than HTTP
Updated packages: bind 9.11.4-P1, iproute2 4.18.0, ntp 4.2.8p12, openssh 7.8p1, parted 3.2, pciutils 3.5.6, rng-tools 6.4, syslinux 6.04-pre1, unbound 1.8.0

Add-Ons:

Updated packages: nano 3.1, postfix 3.3.1

[close]

http://www.ipfire.org/download
Titel: IPFire 2.21 Core 125
Beitrag von: SiLæncer am 26 November, 2018, 21:00
Changelog

802.11ac WiFi:

The IPFire Access Point add-on now supports 802.11ac WiFi if the chipset supports it. This allows better coverage and higher network throughputs. Although IPFire might not be the first choice as a wireless access point in larger environments, it is perfect to run a single office or apartment.
Additionally, a new switch allows to disable the so called neighbourhood scan where the access point will search for other wireless networks in the area. If those are found, 40 MHz channel bandwidth is disabled leading to slower throughput.

Misc:

strongswan 5.7.1: This updated fixes various security vulnerabilities filed under CVE-2018-16151, CVE-2018-16152 and CVE-2018-17540. Several flaws in the implementation that parsed and verified RSA signatures in the gmp plugin may allow for Bleichenbacher-style low-exponent signature forgery in certificates and during IKE authentication.
The IO graphs now support NVMe disks
The SFTP subsystem is enabled again in the OpenSSH Server
Swap behaviour has been changed so that the kernel will make space for a large process when not enough physical memory is available. Before, sudden jumps in memory consumption where not possible and the process requesting that memory was terminated.
The backup scripts have been rewritten in Shell and now package all add-ons backups with the main backup. Now, it is no longer required to save any add-on configuration separately.
Updated packages: apache 2.4.35, bind 9.11.4-P2, coreutils 8.30, dhcpcd 7.0.8, e2fsprogs 1.44.4, eudev 3.2.6, glibc 2.28, gnutls 3.5.19, json-c 0.13.1, keyutils 1.5.11, kmod 25, LVM2 2.02.181, ntfs-3g 2017.3.23, reiserfsprogs 3.6.27, sqlite 3.25.2.0, squid 3.5.28, tzdata 2018g, xfsprogs 4.18.0

New Add-Ons:

dehydrated - A lightweight client to retrieve certificates from Let's Encrypt written in bash
frr, an IP routing protocol suite and BGP and OSPF are supported on IPFire. Find out more on their website.
observium-agent - An xinet.d-based agent for Observium, a network monitoring platform

Updated Add-Ons:

clamav has been updated to 0.100.2 and the virus database files have been moved to the /var partition. This makes more space available on the root partition.
nfs 2.3.3, haproxy 1.8.14, hostapd 2.6, libvirt 4.6.0, tor 0.3.4.9

[close]

http://www.ipfire.org/download
Titel: IPFire 2.21 Core 126
Beitrag von: SiLæncer am 10 Januar, 2019, 21:00
Changelog

Linux 4.14.86:

The kernel has been updated to the latest version of the Linux 4.14.x branch which brings various improvements around stability, enhances performance and fixes some security vulnerabilities. This kernel also has major updates for the Spectre and Meltdown vulnerabilities that remove previously existent performance penalties in some use-cases.
The kernel's modules are now compressed with the XZ algorithm which will save some space on disk as the kernel is one of the largest components of IPFire.

Misc:

openssl has been updated to 1.1.0j and 1.0.2q which fixes some minor security issues and has various bug fixes
The bind package has now changed to ship shared libraries which it did not before. Those allow that commands like dig and host use those shared libraries and are no longer statically linked. This makes the files a lot smaller.
Stéphane Pautrel has substantially improved the French translation of IPFire. Thank you very much for that!

Add-ons:

Updated packages: bird 2.0.2, nano 3.2
New packages: shairport-sync

[close]

http://www.ipfire.org/download
Titel: IPFire 2.21 Core 127
Beitrag von: SiLæncer am 06 Februar, 2019, 19:00
Changelog

Squid 4.5 - Making the web proxy faster and more secure:

We have finally updated to squid 4.5, the latest version of the web proxy working inside IPFire. It has various improvements in speed due to major parts being rewritten in C++.
We have as well changed some things on the user interface to make its configuration easier and to avoid any configuration mistakes.
One of the major changes is that we have removed a control that allowed to configure the number of child processes for each redirector (e.g. URL filter, Update Accelerator, etc.). This is now statically configured to the number of processors. Due to that, we only use as many processes as the system has memory for but allow to use maximum CPU power by being able to saturate all cores at the same time. That makes the URL filter and other redirectors faster and more efficient in their resource consumption. They will now also be launched at the start of the web proxy so that there is no wait any more for the first request being handled or when the proxy is under higher load.
We expect these improvements to make proxies that serve hundreds or even thousands of users at the same time to become faster by being more efficient.
We have dropped some features that no longer make sense in 2019: Those are the web browser check and download throttling by file extension. Since the web is migrating more and more towards HTTPS, those neither work for all the traffic, nor are they very reliable or commonly used.
We have also removed authentication against Microsoft Windows NT 4.0 domains. Those authentication protocols used back then are unsafe for years and nobody should be using those any more. Please consider this when updating to this release.
We have also mitigated a security issue in the proxy authentication against Microsoft Windows Active Directory domains. Due to squid's default configuration, an authenticated user was remembered by their IP address for up to one second. That means that with an authenticated browser, any other software coming from the same system was allowed for one second to send requests to the web proxy being properly authenticated. This could have been exploited by malware or other software running inside a virtual machine or similar services to get access to the internet without having valid credentials. This is now resolved and (re-)authorisation is always required.
New installations will now be recommended to set up a proxy with slightly more cache in memory and no cache on disk. Ultimately, this is something that should be considered for each installation individually, but is a better default than the previous values.
Furthermore, some minor usability improvements of the web proxy configuration page have been implemented.

DNS Forwarding:

The DNS forwarding feature has been extended to make using it more flexible. It now accepts hostnames as well as IP addresses to forward requests to multiple servers that are found by resolving the hostname. It is also possible to add multiple servers as a comma-separated list so that multiple servers can be queries for one single domain. Before only one IP address was supported which rendered the domain unresolvable in case of that specific server becoming unreachable.
These changes allow to redirect requests to DNS blacklists for example directly to the right name servers and not worry about any changes of IP addresses at the provider. There is also load-balancing between multiple servers and the fastest server is being preferred so that DNS resolution for all domains is faster and more resilient, too.

Misc:

Kernel modules that initialised framebuffer are no longer being loaded again. This cause some crashes on various hardware with processors from VIA and was a regression introduced by compression kernel modules with the last Core Update.
Creating certificates for IPsec and OpenVPN threw an error before which has now been fixed by ensuring that the internal certificate database is initialised correctly
We have enabled a Just-In-Time compiler for the Perl Regular Expressions engine. This will increase speed of various modules that use it like the Intrusion Detection system which might have significantly more throughput as well as speed of the URL filter and various other components on the system.
fireinfo now supports authentication against any upstream web proxies
Installing IPFire from ISO on i586-based systems failed because of a bug in the EFI code of the installer. This has now been fixed.
Installing IPFire on XFS filesystems is now also working again. Before, the installed system was not able to boot because GRUB did not support some modern file system features.
The description on which SSH port IPFire is listening has been fixed.
Connection Tracking support is now enabled by default for Linux Virtual Servers, i.e. layer-4 load-balancers.
GeoIP: Scripts have been updated to use a new format of the GeoIP database
Updated packages: bind 9.11.5-P1, ipvsadm 1.29, Python 2.7.15, snort 2.9.12, sqlite 3.26.0 which fixes a couple of security vulnerabilities, squid 4.5, tar 1.31 which fixes a couple of security vulnerabilities, unbound 1.8.3, wget 1.20.1

Add-ons:

Updated packages: clamav 0.101.1, libvirt 4.10 which fixes some problems with stopping and resuming virtual machines, mc 4.8.22, transmission 2.94
The haproxy package now correctly handles its backup

[close]

http://www.ipfire.org/download
Titel: IPFire 2.21 Core 129
Beitrag von: SiLæncer am 10 April, 2019, 18:00
Changelog

IPsec Reloaded:

IPsec has been massively extended. Although IPsec in IPFire is already quite versatile and delivered high performance, some features for experts were required and are now available through the web UI...
Routed VPNs with GRE & VTI [2]
Transport Mode for net-to-net tunnels
IPsec connections can now originate from any public IP address of the IPFire installation. This can be selected on a per-connection basis.
The code has also been cleaned up the UI has been made a little bit tidier to accommodate for the new settings.

Smaller changes include:

The "On-Demand" mode is finally the default setting. Tunnels will shut down when they are not used and they will be established again when they are required.

Misc:

DHCP: A crash has been fixed when filenames containing a slash have been entered for PXE boot.
DHCP: Editing static leases has been fixed
Domains in the "DNS Forwarding" section can now be disabled for DNSSEC validation. This is a dangerous change, but has been requested by many users.
Updated packages: bind 9.11.6, groff 1.22.4, ipset 7.1, iptables 1.8.2, less 530, libgcrypt 1.8.4, openssl 1.1.1b, openvpn 2.4.7, squid 4.6, tar 1.32, unbound 1.9.0, wpa_supplicant 2.7
New commands: kdig 2.8.0
The build system has been optimised to reduce build time of the whole distribution to around 4-5 hours on a fast machine.

Add-Ons:

Alexander Koch has contributed zabbix_agentd which is the agent that is installed on the monitored machine. With this [3], IPFire can now be integrated into an environment that is monitored by Zabbix.
On that note, the SNMP daemon has also been updated to version 5.8 for people who use the SNMP protocol for monitoring.
tor has been updated to 0.3.5.8 and some minor bugs have been fixed in the web user interface
The spectre-meltdown-checker script is available as an add-on which allows IPFire users to test their hardware for vulnerabilities
Other updates: amavisd 2.11.1, hostapd 2.7, postfix 3.4.3

[close]

http://www.ipfire.org/download
Titel: IPFire 2.21 Core 130
Beitrag von: SiLæncer am 17 April, 2019, 20:00
Changelog

Apache 2.4.39: The Apache Web Server, which runs the IPFire Web User Interface, was vulnerable for various privilege escalations (CVE-2019-0211), access control bypasses (CVE-2019-0215, CVE-2019-0217), DoS attacks (CVE-2019-0197), buffer overflow (CVE-2019-0196) and a URL normalisation inconsistency (CVE-2019-0220). They are all regarded to be of "low" severity.
wget 1.20.3: wget has had multiple vulnerabilities that allowed an attacker to execute arbitrary code (CVE-2019-5953).
clamav 0.101.2: ClamAV, the virus scanner, has had multiple vulnerabilities that allowed DoS and a buffer overflow in a bundled third-party library.

IPsec Regression:

The last update introduced a regression in the IPsec stack that caused that the firewall could no longer access any hosts on the remote side when the tunnel was run in tunnel mode without any VTI/GRE interfaces. This update fixes that.

[close]

http://www.ipfire.org/download
Titel: IPFire 2.21 Core 131
Beitrag von: SiLæncer am 16 Mai, 2019, 21:00
Release Notes



Finally, we are releasing another big release of IPFire. In IPFire 2.23 - Core Update 131, we are rolling out our new Intrusion Prevention System. On top of that, this update also contains a number of other bug fixes and enhancements.

Thank you very much to everyone who has contributed to this release. If you want to contribute, too, and if you want to support our team to have more new features in IPFire, please donate today!
A New Intrusion Prevention System

We are finally shipping our recently announced IPS - making all of your networks more secure by deeply inspecting packets and trying to identify threats.

This new system has many advantages over the old one in terms of performance, security and it simply put - more modern. We would like to thank the team at Suricata on which it is based for their hard work and for creating such an important tool that is now working inside of IPFire.

We have put together some documentation on how to set up the IPS, what rulesets are supported and what hardware resources you will need.
Migration from the older Intrusion Detection System

Your settings will automatically be converted if you are using the existing IDS and replicated with the new IPS. However, you will need to select the ruleset and rules that you want to use again, since those cannot be migrated. Please note that the automatic migration will enable the new IPS, but in monitoring mode only. This is that we won't break any existing configurations. Please disable the monitoring mode if you want the IPS to filter packets, too.

If you restore an old backup, the IDS settings won't be converted.

The guardian add-on is no longer required any more for the IDS to work but still provides means against SSH brute-force attacks and brute-force attacks against the IPFire Web UI.
OS Updates

This release rebases the IPFire kernel on 4.14.113 which brings various bug and security fixes. We have disabled some debugging functionality that we no longer need which will give all IPFire systems a small performance boost.

Updated packages: gnutls 3.6.7.1, lua 5.3.5, nettle 3.4.1, ntp 4.2.8p13, rrdtool 1.7.1, unbound 1.9.1. The wireless regulatory database has also been updated.
Misc.

    SSH Agent Forwarding: This can now be enabled on the IPFire SSH service which allows administrators to connect to the firewall and use SSH Agent authentication when using the IPFire as a bastion host and connecting onwards to an internal server.
    When multiple hosts are created to overwrite the local DNS zone, a PTR record was automatically created too. Sometimes hosts might have multiple names which makes it desirable to not create a PTR record for an alias which can now be done with an additional checkbox.
    A bug in the firewall UI has been fixed which caused that the rule configuration page could not be rendered when the GeoIP database has not been downloaded, yet. This was an issue when a system was configured, but never connected to the internet before.
    On systems with a vast number of DHCP leases, the script that imports them into the DNS system has been optimised to make sure that they are imported faster and that at no time a half-written file is available on disk which lead unbound to crash under certain circumstances.
    Some minor UI issues on the IPsec VPN pages have been fixed: On editing existing connections, the MTU field is now filled with the default;
    We are no longer trying to search for any temperature sensors on AWS. This caused a large number of error messages in the system log.

Add-ons

    Package updates: borgbackup 1.1.9, dnsdist 1.3.3, freeradius 4.0.18, nginx 1.15.9, postfix 3.4.5, zabbix_agentd 4.2.0
    tor has received an extra firewall chain for custom rules to control outgoing traffic (TOR_OUTPUT). This allows to create rules for traffic that originates from the local tor relay. The service is also running as an own user now.
    Wireless Access Point: It is now possible to enable client isolation so that wireless clients won't be able to communicate with each other through the access point.

New Packages

    flashrom - A tool to update firmware

[close]

https://www.ipfire.org/download
Titel: IPFire 2.21 Core 132
Beitrag von: SiLæncer am 09 Juni, 2019, 00:00
Release Notes

    Intel Vulnerabilities: RIDL, Fallout & ZombieLoad:

    Two new types of vulnerabilities have been found in Intel processors. They cannot be fixed unless the hardware is changed, but can be somewhat mitigated through some changes in the Linux kernel (4.14.120) and an update microcode (version 20190514). Both is shipped in this release.

    VLAN Configuration:

    Florian Bührle has contributed a UI to configure VLAN interfaces for zones. This way, it can be done graphically and the system needs to be rebooted to apply the changes.
    The GUI also allows to set up a zone in bridge mode which is helpful for advanced users who need some custom configuration.

    Misc:

    The new IPS now starts on systems with more than 16 CPU cores
    For improved security of the web UI, the web service now prefers ciphers in GCM mode over CBC. This is because CBC seems to be weakened by new attack vectors.
    OpenVPN has received some changes to the UI and improvements of its security.
    Alexander Koch sent in some changes around the wpad.dat handling: It is now possible to define a list of exceptions to this file on the web UI and all VPN networks are included by default.
    Captive Portal: A stored cross-site scripting vulnerability has been fixed in the argument handling of the title; an uploaded logo file can now be deleted
    The same type of stored cross-site scripting attack was resolved in the static routing UI
    Log entries for Suricata now properly show up in the system log section
    Updated packages (all from Matthias Fischer): bind 9.11.6-P1, dhcpcd 7.2.2, knot 2.8.1, libedit 20190324-3.1

    Add-ons:

    Wireless AP:

    For hardware that supports it, Automatic Channel Selection can be enabled, which scans the environment and automatically selects the best channel for the wireless access point. When it is activated, 80 MHz channel bandwidth will be enabled for 802.11ac networks doubling throughput.
    DFS is supported (on hardware that supports it, too) which is needed to use higher channels in the 5 GHz spectrum
    Management Frame Protection can optionally be enabled to encrypt messages between the station and the access point. This prevents a rogue attacker to deauthenticate stations from the wireless LAN or other denial-of-service attacks.

    Updates:

    igmpproxy 0.2.1, tor 0.4.0.5, zabbix_agentd 4.2.1
    Qemu is now being hardened with libseccomp which is a "syscall firewall". It limits what actions a virtual machine can perform and is enabled by default


[close]

https://www.ipfire.org/download
Titel: IPFire 2.21 Core 134
Beitrag von: SiLæncer am 05 Juli, 2019, 14:00
Release Notes

    SACK Panic (CVE-2019-11477 & CVE-2019-11478):

    The Linux kernel was vulnerable for two DoS attacks against its TCP stack. The first one made it possible for a remote attacker to panic the kernel and a second one could trick the system into transmitting very small packets so that a data transfer would have used the whole bandwidth but filled mainly with packet overhead.
    The IPFire kernel is now based on Linux 4.14.129, which fixes this vulnerability and fixes various other bugs.
    The microcode for some Intel processors has also been updated and includes fixes for some vulnerabilities of the Spectre/Meltdown class for some Intel Xeon processors.

    Misc:

    Package updates: bind 9.11.8, unbound 1.9.2, vim 8.1
    The French translation has been updated by Stéphane Pautrel and translates various strings as well as improving some others
    We now prefer other cipher modes over CBC when IPFire itself opens a TLS connection. CBC is now considered to be substantially weaker than GCM.
    Email addresses entered in the web UI can now contain underscores.
    The Captive Portal now comes up properly after IPFire is being rebooted.



[close]

https://www.ipfire.org/download
Titel: IPFire 2.21 Core 135
Beitrag von: SiLæncer am 19 September, 2019, 21:00
Release Notes

    Kernel Update:

    The IPFire Linux kernel has been rebased on 4.14.138 and various improvements have been added. Most notably, this kernel - once again - fixes CPU vulnerabilities.

    Misc:

    On x86_64, the effectiveness of KASLR has been improved which prevents attackers from executing exploits or injecting code
    DNS: unbound has been improved so that it will take much less time to start up in case a DNS server is unavailable.
    Scripts that boot up IPFire have been improved, rewritten and cleaned up for a faster boot and they now handle some error cases better
    Updated packages: dhcpcd 7.2.3, nettle 3.5.1, squid 4.8, tzdata 2019b

    Add-ons:

    bird 2.0.4
    clamav 0.101.3
    iperf 2.0.13
    iperf3 3.7
    mc 4.8.23
    pcengines-firmware 4.9.0.7

[close]

https://www.ipfire.org/download
Titel: IPFire 2.21 Core 136
Beitrag von: SiLæncer am 11 Oktober, 2019, 21:00
Release Notes

    OpenSSL 1.1.1d:

    This update ships the latest update of the OpenSSL library which has received some important fixes in its latest release...
    CVE-2019-1547: With custom elliptic curves, timing attacks were made possible again. This is of very low risk in IPFire, since we are not using any custom curves.
    CVE-2019-1549: Forked processes could have shared the same seed for their random number generator which is being fixed in this one by mixing in a high precision timer.
    CVE-2019-1563: Another padding oracle for large PKCS7 messages
    All of these are classified as "low severity". However, we recommend to install this update as soon as possible.

    Perl 5.30:

    Arne has been busy and been working on replacing Perl with the latest stable version. This requires that loads of applications that use Perl - like our own web user interface - have to be shipped again as well as many add-ons. Hence this update is rather large.

    GeoIP:

    Since Maxmind is no longer publishing their GeoIP database in the original format, but unfortunately not providing any good bindings for the new release, we have only had an outdated version of the database that we made available in IPFire.
    There is now a script that converts the current data into the old format which allows us to provide a recent database again.
    This database is however only being used for showing the country flags on the web UI. GeoIP blocking uses a database in a different format and therefore always has recent data to only block the right things.

    Misc:

    The firewall has a limit for log messages so that flooding the firewall with packets won't cause a Denial-of-Service by filling up the hard drive with gigabytes of logs and also to not starve on write operations. This limit was however very low for modern standards and has therefore been increased to 10 logged packets per second. That will ensure that we won't drop a packet without logging it.
    Updated packages: apache 2.4.41, bind 9.11.10, clamav 0.101.4, dhcpcd 8.0.3, knot 2.8.3, logrotate 3.5.1, openssh 8.0p1, patch 2.7.6, texinfo 6.6, unbound 1.9.3, usb_modeswitch 1.5.2
    logwatch and logrotate could conflict when running at the same time. This has been changed so only one of them is running at the same time.
    Log messages for DMA, the IPFire mailer, and Postfix are now shown on the web UI
    The toolchain now ships a compiler for Go

    Add-ons

    Updated packages: freeradius 3.0.19, haproxy 2.0.5, postfix 3.4.6, spamassassin 3.4.2, zabbix_agent 4.2.6
    dnsdist has had its limit of open connections increased to work better in bigger environments
    tor: A permission problem has been fixed so that the web UI can save settings again
    wio: The RRD files will now be included in the backup as well as various UI improvements have been done

[close]

https://www.ipfire.org/download
Titel: IPFire 2.21 Core 137
Beitrag von: SiLæncer am 17 November, 2019, 10:00
Release Notes

    An improved and faster QoS:

    As explained in detail in a separate blog post from the engine room, we have been working hard on improving our Quality of Service (QoS).
    It allows to pass a lot more traffic on smaller systems as well as reduces packet latency on faster ones to create a more responsive and faster network.
    To take full advantage of these changes, we recommend to reboot the system after installing the update.

    Linux 4.14.150:

    The IPFire Kernel has been rebased on Linux 4.14.150 and equipped with our usual hardening and other patches.
    The kernel has been tuned to deliver more throughput for IP connections as well as reducing latency to a minimum to keep your network as responsive and fast as possible.
    An especially nasty bug that caused the system to drop DNS packets when the Intrusion Detection System was enabled has been tracked down by a large group of IPFire developers and additional help of the suricata team.

    Misc:

    Downloaded GeoIP databases were not always cleaned up from /tmp when a download was unsuccessful. This can cause that the script is filling up the root partition. You can reboot your system to free up space if this has happened to you, too. The script has now been cleaned up, and catches any errors to cleanup afterwards.
    IPsec now supports Curve 448 with 224 bit of security. It is a lightweight and slightly faster alternative to Curve25519 and enabled by default for new connections.
    Tim Fitzgeorge contributed a patch that restarts the syslog daemon after a backup is being restored to close old log files and write to the restored ones
    /var/log/mail is now being rotated
    Updated packages: bind 9.11.12, iptables 1.8.3, iproute2 5.3.0, knot 2.8.4, libhtp 0.5.30, libnetfilter_queue 1.0.4, libpcap 1.9.1, libssh 0.9.0, Net-SSLeay 1.88, pcre 8.43, strongswan 5.8.1, suricata 4.1.5, tzdata 2019c, unbound 1.9.4, wpa_supplicant 2.9

    Add-ons:

    New: speedtest-cli
    This is a handy tool to perform a regular speedtest on the console. It was packaged to test the QoS but is handy to test throughput of the firewall to and from the Internet on the console.

    Updated Packages:

    bird 2.0.6 now supports RPKI validation by connecting to a process that holds the key material either via TCP or using SSH
    sane has been updated to version 1.0.28 and now supports more hardware
    A French translation is now available for the Who is Online? add-on
    Others: clamav 0.102.0, hostapd 2.9, ipset 7.3, mtr 0.93, nano 4.5, ncat 7.80, nmap 7.80, shairport-sync 3.3.2, tcpdump 4.9.3, tor 0.4.1.6, tshark 3.0.5


[close]

https://www.ipfire.org/download
Titel: IPFire 2.21 Core 138
Beitrag von: SiLæncer am 19 November, 2019, 21:00
Release Notes

    Intel Vulnerabilities:

    Intel has blessed us again with a variety of hardware vulnerabilities which need to be mitigated in software. Unfortunately those will further decrease the performance of your IPFire systems due to changes in Intel's microcodes which are also shipped with this Core Update.

[close]

https://www.ipfire.org/download
Titel: IPFire 2.21 Core 139
Beitrag von: SiLæncer am 09 Januar, 2020, 18:00
Release Notes

    Improved Booting & Reconnecting:

    Dialup scripts have been cleaned up to avoid any unnecessary delays after the system has been handed a DHCP lease from the Internet Service Provider. This allows the system to reconnect quicker after loss of the Internet connection and booting up and connecting to the Internet is quicker, too.

    Improvements to the Intrusion Prevention System:

    Various smaller bug fixes have been applied in this Core Update which makes our IPS a little bit better with every release. To take advantage of deeper analysis of DNS packets, the IPS is now informed about which DNS servers are being used by the system.

    TLS:

    IPFire is configured as securely as possible. At the same time we focus on performance, too. For connections to the web user interface, we do not allow using CBC any more. This cipher mode is begin to crack and the more robust GCM is available.
    Whenever an SSL/TLS connection is being established to the firewall, we used to prefer ChaCha20/Poly1305 as a cipher. Since AESNI is becoming and more and more popular even on smaller hardware, it makes sense to prefer AES. A vast majority of client systems support this as well which will allow to communicate faster with IPFire systems and save battery power.

    Misc:

    The microcode for Intel processors has been updated again to mitigate vulnerabilities from the last Core Update
    PC Engines APU LEDs are now controlled using the ACPI subsystem which is made possible using the latest BIOS version 4.10.0.3
    Captive Portal: Expired clients are now automatically removed
    Dynamic DNS: Support for NoIP.com has been fixed in ddns 12
    Updated packages: Python 2.7.17, bash 5.0, bind 9.11.13, cpio 2.13, libarchive 3.4.0, logwatch 7.5.2, lz4 1.9.2, openvpn 2.4.8, openssh 8.1p1, readline 8.0 (and compat version 6.3), squid 4.9, unbound 1.9.5

    Add-Ons:

    clamav has been updated to 0.102.1 which include various security fixes
    libvirt has been updated to version 5.6.0 for various bug fixes or feature enhancements and support for LVM has been enabled.
    qemu has been updated to 4.1.0
    Various others: nano 4.6, postfix 3.4.8, spectre-meltdown-checker 0.42

[close]

https://www.ipfire.org/download
Titel: IPFire 2.25 Core Update 141
Beitrag von: SiLæncer am 22 Februar, 2020, 20:00
Release Notes -> https://blog.ipfire.org/post/ipfire-2-25-core-update-141-is-available-for-testing

https://www.ipfire.org/download
Titel: IPFire 2.25 - Core Update 142
Beitrag von: SiLæncer am 10 März, 2020, 20:30
Release Notes -> https://blog.ipfire.org/post/ipfire-2-25-core-update-142-is-available-for-testing

https://www.ipfire.org/download
Titel: IPFire 2.25 - Core Update 144
Beitrag von: SiLæncer am 24 Mai, 2020, 20:45
Release Notes -> https://blog.ipfire.org/post/ipfire-2-25-core-update-144-released

https://www.ipfire.org/download
Titel: IPFire 2.25 - Core Update 145
Beitrag von: SiLæncer am 02 Juni, 2020, 04:30
Release Notes -> https://blog.ipfire.org/post/ipfire-2-25-core-update-145-is-available-for-testing

https://www.ipfire.org/download
Titel: IPFire 2.25 - Core Update 146
Beitrag von: SiLæncer am 20 Juli, 2020, 14:00
Release Notes

Today, we have updated IPFire on AWS to IPFire 2.25 - Core Update 146 - the latest official release of IPFire.

Since IPFire is available on AWS, we are gaining more and more users who are securing their cloud infrastructure behind an easy to configure, yet fast and secure firewall.

This update brings a new kernel as well as many other exciting changes.

The most important change for the cloud is that on AWS, IPFire will now default to a MTU of 9001 bytes for all internal interfaces. The RED interface will remain on 1500 bytes, since this is the Internet defaults to that size and we prefer IPFire performing any fragmentation and reassembly of packets over Amazon’s network stack.

This allows more network throughput with less overhead.

[close]

https://www.ipfire.org/download
Titel: IPFire 2.25 - Core Update 147
Beitrag von: SiLæncer am 28 Juli, 2020, 18:00
Release Notes

Another update is available for IPFire: IPFire 2.25 - Core Update 147. It contains a vast amount of package updates and brings some security updates.

Security Updates

The squid web proxy had a number of security vulnerabilities that have been patched in version 4.12. Those are:

    CVE-2020-15049 - (SQUID-2020:7) - Cache Poisoning Issue in HTTP Request processing

There was a third vulnerability in the TLS component of squid which is not activated in IPFire and therefore IPFire is not vulnerable (CVE-2020-14058).

Misc.

    The Linux firmware package was updated to version 20200519 and brings various improvements to hardware components and adds support for more hardware.
    A long-standing issue with forwarding GRE connections has been resolved. It was absolutely impossible to get such connections through the firewall, because IPFire's internal connection tracking refused to handle them.
    Amazon Web Services: The firewall will now configure all zones to use jumbo frames by default. Since Amazon's network allows packets with up to 9001 bytes, this will increase bandwidth in the cloud. The RED interface is exempt, because the Internet still defaults to only 1500 bytes per packet.
    Updated packages: bind 9.11.20, dhcpcd 9.1.2, GnuTLS 3.6.14, gmp 6.2.0, iproute2 5.7.0, libassuan 2.5.3, libgcrypt 1.8.5, libgpg-error 1.38, OpenSSH 8.3p1, squidguard 1.6.0

Add-ons

Updates

    Bacula, a backup solution, was updated to version 9.6.5 by Adolf Belka
    borgbackup 1.1.13
    haproxy 2.1.7
    Joe 4.6

[close]

https://www.ipfire.org/download
Titel: IPFire 2.25 - Core Update 148
Beitrag von: SiLæncer am 02 August, 2020, 18:00
Release Notes

This is an update I have personally been waiting for a long time: We finally roll out replacing Maxmind's GeoIP database by our own improved implementation.

IPFire Location

As we have already pre-announced some time ago this side-project inside the IPFire Project is finally ready for prime time.

It comes with a new implementation to build, organise and access a highly optimised database packages with loads of helpful data for our firewall engines, as well as our analytics to analyse where attacks against the firewall are originating from.

With it, IPFire can block attackers from certain countries, or do the opposite - only permit access to certain servers from certain places. Combining rules with the rate-limiting feature allows to limit connections from certain locations which is very helpful for DoS attacks.

No new features have been added, but those that we had have been massively improved. The database is now being updated once a week which makes it more accurate and we no longer require complicated scripts to convert it into different formats to be used in different parts of the operating system.

Instead the database can be opened and ready extremely quickly which allows access in realtime making pages on the web user interface load significantly faster.

We hope that many other projects choose to use our implementation as well, since we have chosen a truly open license for the data as well as the library that works behind it.

[close]

https://www.ipfire.org/download
Titel: IPFire 2.25 - Core Update 149
Beitrag von: SiLæncer am 04 September, 2020, 19:00
Release Notes



We have been busy baking another large update for you which is full of oozy goodness. It includes an updated toolchain based on GCC 10 and glibc 2.32 and we have added a lot of tuning which makes IPFire 33% faster on some systems.

Toolchain Update

IPFire is based on glibc 2.32, the standard library for all C programs, and GCC 10.2, the GNU Compiler Collection. Both bring various bug fixes and improvements.

The most notable change is that we have decided to remove a mitigation Spectre 2 which caused that user space programs in IPFire were running about 50% slower due to using a microcode feature which is called "retpoline". Those "return trampolines" disable the branch prediction engine in out-of-order processors which was considered to help with mitigating leaking any information from any unaccessible kernel space.

This is however not as effective as thought and massively decreases performance in the user land which mainly affects features like our Intrusion Prevention System, Web Proxy and URL filter. We still use this mechanism to avoid leaking any kernel memory into the user space.

On top of that, we have updated various tools used for building IPFire as well as core libraries.

We have also enabled a new GCC feature called "stack clash protection" on x86_64 and aarch64 which adds additional checks to mitigate exploits and we have enabled "CF protection" which hardens all software against attackers gaining control over a program flow and circumventing security checks like password or signature validation.

BootHole, aka GRUB 2.04

As reported on the media, there were various security vulnerabilities in the GRUB boot loader which is used in IPFire on x86_64, i586 and aarch64. These have now been patched in IPFire and the new boot loader is installed automatically.

Intel Security Vulnerabilities & Virtual Machines

In May 2019, we have announced to disable SMT on all machines. This is now disabled for any virtual machines since the mitigation is required to be activated on the host system.

Emulated processors might run on multiple physical processors which IPFire in a virtual machine has no control over. However, we still recommend against running IPFire in a virtual environment.

Deprecating i586

This release also officially degrades the i586 architecture to a secondary architecture. On the download page, you will already find downloads for that architecture at the bottom of the page.

This is because various security mitigations are not available for i586 and development work on the Linux kernel and other software that IPFire relies on is mainly done for x86_64 or other modern 64 bit architectures. This is a development that we saw coming for a while now, and despite that we will try to keep IPFire available in this architecture.

We urge everyone who's hardware supports it to update their systems to x86_64. You will see a notification on the web user interface if you are affected.

Misc.

    OpenSSL: We have removed all ciphers that do not support Perfect Forward Secrecy from the default cipher list. That means that all programs in IPFire that initiate TLS connections will no longer accept any "weak" ciphers without PFS.
    OpenVPN
        In order to make IPFire compliant with PCI DSS, OpenVPN requires all clients to use TLS 1.2 or newer. This change is automatically enabled on all systems and very old clients might need to be updated. Please check if you are using any outdated clients before updating.
        The maximum number of simultaneous OpenVPN connections can now be set to up to 1024 and was limited to 255 before.
    New packages: zstd, a modern and fast compression algorithm is now part of IPFire
    Updated packages: apache 2.4.46, bind 9.11.21, bison 3.7.1, curl 7.71.1, GRUB 2.04, intel-microcode 20200616, hyperscan 5.3.0, iproute2 5.8.0, kbd 2.2.0, logrotate 3.17.0, lsof 4.91, mpfr 4.1.0, popt 1.18, unbound 1.11.0, xfsprogs 5.7.0

Add-ons

    Updated: clamav 0.102.4, dnsdist 1.5.0, haproxy 2.2.2, fping 5.0, libvirt 6.5.0, minicom 2.7.1, nfs 2.5.1, postfix 3.5.6, qemu 5.0.0, rsync 3.2.3, spandsp 0.0.6, tor 0.4.3.6, tshark 3.2.6, usbredir 0.8.0, watchdog 5.16, WIO
    Marcel Follert has contributed a new package: socat, a CLI tool which can be used to communicate with UNIX sockets.

We ask everyone who can to install this update and report and feedback back to us. That way, you can help to make IPFire better and contribute to the community. If you cannot test, you can donate!

[close]

https://www.ipfire.org/download
Titel: IPFire 2.25 - Core Update 150
Beitrag von: SiLæncer am 29 September, 2020, 21:00
Release Notes

The upcoming Core Update is available for testing: It brings an updated kernel, various package updates and bug fixes.

Linux 4.14.198

The IPFire kernel is now based on Linux 4.14.198 which brings various security and stability fixes in the network stack as well as improvements throughout the whole rest of the kernel.

In connection with this, the new Location database has received some bug fixes. Formerly, some networks could not be found in the extracted part of the database which was loaded into the kernel. This has been fixed and there will be no more false-positives for selected countries.

Connection Tracking Graph

We have extended the monitoring features of IPFire which introduce a new graph with the size of the connection tracking table. It shows how many connections are open at the same time and helps to debug any networking issues or overload.

In addition to that, the CPU graph has been fixed. An empty graph was rendered after the number of processor cores has changed.

Add-ons

    Updated packages: clamav 0.103.0, htop 3.0.2, nano 5.2, postfix 3.5.7

[close]

https://www.ipfire.org/download
Titel: IPFire 2.25 - Core Update 152
Beitrag von: SiLæncer am 15 November, 2020, 09:00
Release Notes

It is time for another Core Update: IPFire 2.25 - Core Update 152. It comes with various smaller bug fixes and improvements and updates the Windows File Sharing Add-on.

IPFire is a small team of people from a range of backgrounds sharing one goal: make the Internet a safer place for everyone. Like many of our open source friends, we’ve taken a hit this year and would like to ask for your continued support. Please follow the link below where your donation can help fund our continued development: https://www.ipfire.org/donate
Changes

    Intrusion Prevention System: The IPS has been updated to suricata 5.0.4 which fixes various bugs and security vulnerabilities
    Leo-Andres Hofman contributed for the first time and cleaned up code that shows the DHCP leases on the web user interface. They are now sorted and expired leases are shown at the bottom of the list for better usability.
    Steffen Klammer fixed a bug which rendered an invalid proxy.pac configuration file when subnets where added in the CIDR notation
    Values for average, minimum and maximum were swapped in the firewall hits graph which has been corrected in this release
    Updated packages: knot 3.0.1, libhtp 0.94, python 2.7.18, python3 3.8.2, unbound 1.12.0, yaml 0.2.5

Add-ons

    Updated packages: mtr 0.94, nano 5.3, tor 0.4.4.5
    Updated Python 3 packages: botocore 1.16.1, colorama 0.4.3, dateutil 2.8.1, docutils 0.16, jmespath 0.9.5, pyasn1 0.4.8, rsa 4.0, s3transfer 0.3.3, six 1.14.0,

Windows File Sharing Services

Samba, has been updated to 4.13.0. Because of various reasons and lack of development time, we were stuck on Samba 3 which is unmaintained for a while. With this new version of Samba, new protocol features like SMB3 and encryption are supported. We have also rewritten large parts of the web user interface, made them tidier and fixed some usability issues.

We also dropped some features which we believe are not being used any more. This mainly concerns compatibility to MS-DOS clients, WINS, and using IPFire as Primary Domain Controller for Windows NT domains.

The new streamlines web user interface provides fewer controls and we have changed some defaults to work in modern networks - or that were ineffective in the newer release of Samba.

New features are as follows:

    Printing with CUPS now works out of the box
    SMB file transfers are faster, because of some performance tuning
    IPFire will now always try to become the master browser for its workgroup
    The file sharing and printing services will be announced to the local network using mDNS with Avahi
    Extensions for Mac OS X are enabled by default

Because of the vast amount of changes, we need some extra help to find any regressions introduced here. Please also consider if running this package is following best-practise rules in your organization.

[close]

https://www.ipfire.org/download
Titel: IPFire 2.25 - Core Update 153
Beitrag von: SiLæncer am 12 Januar, 2021, 22:00
Release Notes

This is the official release announcement for the last planned Core Update of this year: IPFire 2.25 - Core Update 153.

Before we talk about what is new, I would like to as you for your support for our project. IPFire is a small team of people from a range of backgrounds sharing one goal: make the Internet a safer place for everyone. Like many of our open source friends, we’ve taken a hit this year and would like to ask for your continued support. Please follow the link below where your donation can help fund our continued development: https://www.ipfire.org/donate
Location Database

The location database has received significant updates that improve its accuracy. This was possible by importing more data into it and correlating it with existing data from other sources.

We have also improved performance of loading data from the database into the kernel for firewall rules which removes a class of issues where IP addresses could have matched more than one country.

Many weeks have been invested into this to optimise the database import and export algorithms to provide this functionality even on hardware that is weak on processor power and/or memory.
WPA3 - Making WiFi Safe Again

WPA3 is the new upcoming standard to protect wireless connections and is now supported in IPFire. It can be enabled together with WPA2 so that you can support any devices that do not support WPA3, yet.

WiFi can also be made more secure by optionally enable Management Frame Protection which hardens the network against any attackers that try to de-authenticate stations and therefore denial-of-service your network.

There is more on a detailed post about this new feature: IPFire Wireless Access Point: Introducing WPA3
Another Intel Security Vulnerability

We have of course spent a lot of our valuable development time on this month's security issues created by Intel. As you might have heard from the news, it is possible to profile instructions and extrapolate information through measuring the power consumption of the processor when that instruction is being executed.

We consider this not exploitable on IPFire, because we do not allow running any third-party code, but are of course shipping fixes in form of a patched Linux kernel based on 4.14.212 and updated microcode where available for all affected processors (version 20201118).
Misc.

    The most recent OpenSSL security vulnerability CVE-2020-1971 has been patched by updating the package to version 1.1.1i
    Safe Search now allows excluding YouTube
    The zone configuration page now highlights network devices that are assigned to a zone. This change improves usability and avoids any mistakes
    IPsec tunnels are now showing correctly when they are established or not. A programming error could show connected tunnels as "connecting..." before.
    The log summary no longer shows useless entries for clients that have renewed their DHCP lease and the iptables summary has been removed, since it does not produce any useful output
    The IP address information page is now showing the Autonomous System for each IP address
    Some cosmetic improvements for the web user interface have been implemented by Matthias Fischer.
    On systems with insufficient memory, some pages of the web user interface could not be loaded when they were using the new location library. Thanks to Bernhard Bitsch for reporting this problem.
    DDNS: Support for DuckDNS has been reinstated after a significant API change
    Updated packages: bash 5.0.18, curl 7.73.0, file 5.39, go 1.15.4, knot 3.0.2, libhtp 0.5.63, openvpn 2.5.0, pcengines-firmware 4.12.0.6, strongswan 5.9.1, suricata 5.0.5, tzdata 2020d, usb_modeswitch 2.6.1, usb_modeswitch_data 20191128

Add-ons

    Updated packages: amazon-ssm-agent 3.0.356.0, aws-cli 1.18.188, ghostscript 9.53.3, libseccomp 2.4.4, lynis 3.0.1, python-botocore 1.19.28, python-urllib3, spectre-meltdown-checker 0.44, transmission 3.00, vdr 2.4.4
    Tor has been updated to version 0.4.4.6 and is now using the new location database for showing the relay country. It is also now possible to define a list of exit nodes to use and to select certain countries to use for guard nodes.
    amavis and spamassassin have been dropped because they have been unused and unmaintained for a long time
    git has been fixed so that all features implemented in Perl can be used again.
    The apcupsd package now correctly backups and restores its configuration

[close]

https://www.ipfire.org/download
Titel: OPNsense 21.1
Beitrag von: SiLæncer am 29 Januar, 2021, 21:00
(https://i.postimg.cc/BQw6P33K/screenshot-2881.png)
OPNsense is an open-source, easy-to-use, and easy-to-build HardenedBSD based firewall and routing platform.

License: Open Source

Release Notes -> https://opnsense.org/opnsense-21-1-marvelous-meerkat-released/

https://opnsense.org/about/about-opnsense/
Titel: pfSense 2.5.0
Beitrag von: SiLæncer am 17 Februar, 2021, 20:00
Release Notes

We are excited to announce the release of pfSense® Plus software version 21.02 and pfSense Community Edition (CE) software version 2.5.0, now available for new installations and upgrades!

This is the first release of pfSense Plus software, formerly known as Factory Edition. For more details about the distinctions between pfSense Plus and pfSense CE, read the pfSense Plus Announcement. Customers running the Factory Edition of pfSense software version 2.4.5-p1 and older can upgrade in-place automatically to pfSense Plus software version 21.02 as with any other previous upgrade.

These versions are the result of an immense development effort taking place over the last several years. Over 550 issues are resolved, including bug fixes, new features, and other significant changes.

pfSense Plus software version 21.02-RELEASE updates are available now. For installation images, contact Netgate TAC.

pfSense software Community Edition version 2.5.0-RELEASE updates and installation images are available for download now.
Highlights

The new versions include a long list of significant changes.

Notably, pfSense Plus adds:

    Support for Intel® QuickAssist Technology, also known as QAT.
        QAT accelerates cryptographic and hashing operations on supported hardware, and can be used to accelerate IPsec, OpenVPN, and other OpenCrypto Framework-aware software.
        Supported hardware includes many C3000 and C2000 systems sold by Netgate and some other types of built-in QAT support and add-on cards.
    Improved SafeXcel cryptographic accelerator support for the Netgate SG-2100 and Netgate SG-1100 which can improve IPsec performance.

    Updated IPsec profile export
        Exports Apple profiles compatible with current iOS and OS X versions
        New export function for Windows clients to configure tunnels using PowerShell

Both pfSense Plus and pfSense CE include:

    Base OS upgraded to FreeBSD 12.2-STABLE
    OpenSSL upgraded to 1.1.1
    Performance improvements

    Kernel WireGuard implementation, as mentioned in a previous WireGuard blog post
        WireGuard is a new VPN Layer 3 protocol designed for speed and simplicity
        The pfSense documentation site includes information on how to configure WireGuard as well as example configuration recipes

    IPsec enhancements
        Configuration for the strongSwan IPsec backend was changed from the deprecated ipsec.conf/stroke format to the new swanctl/VICI format
        Various improvements to tunnel configuration, including better options for lifetime and rekey to avoid duplicate security associations

    OpenVPN upgraded to 2.5.0
        OpenVPN 2.5.0 now mandates data cipher negotiation, but also tries to be friendly to older clients
        ChaCha20-Poly1305 is now supported, which is the same cipher used by WireGuard and may offer speed improvements on some platforms
        OpenVPN now disables compression by default because it is insecure, but it can still decompress traffic received from clients while not transmitting compressed packets

    Certificate Manager updates
        The GUI now supports renewing certificate manager entries (certificate authorities and certificates)
        Notifications are generated for expiring certificate entries
        Certificate keys and PKCS #12 archives can now be exported with password protection
        Support was added for elliptic curve (ECDSA) certificates
        Internal and imported CA entries can be added to the system-wide trust store
    Significant changes in Captive Portal backend and HA behavior

For more details, see the Release Notes and Redmine.

[close]

http://www.pfsense.com/
Titel: IPFire 2.25 - Core Update 155
Beitrag von: SiLæncer am 02 April, 2021, 22:00
Release Notes -> https://blog.ipfire.org/post/ipfire-2-25-core-update-155-released-security-advisory

https://www.ipfire.org/download
Titel: IPFire 2.25 - Core Update 156
Beitrag von: SiLæncer am 09 Mai, 2021, 23:00
Release Notes -> https://blog.ipfire.org/post/ipfire-2-25-core-update-156-released

https://www.ipfire.org/download
Titel: IPFire 2.25 - Core Update 157
Beitrag von: SiLæncer am 25 Juni, 2021, 22:00
Release Notes

After a little break, IPFire 2.25 - Core Update 157 is out! This is the largest release in size we have ever had and updates various parts of the operating system and brings an updated kernel.

Since IPFire is built from source and not based on any distribution, we get to select the best versions of open source software to be a part of it. This release is the second part of our "spring clean" release which updates various software packages and we have also dropped software that we no longer need. The vast amount of this work has been done by Adolf Belka who has been spending many nights in front of a compiler trying to make it all work. If you want to support him and the entire development team, please help us with your donation.
Deprecating Python 2

We have made huge efforts to migrate away from Python 2 which has reached its end of life on January 1st of this year. That includes repackaging third-party modules for Python 3 and migrating our own software to Python 3.

The work will continue over the next couple of weeks and we are hopeful to remove all Python 2 code with the next release. We will keep Python 2 around for a little bit longer to give everyone with custom scripts a little bit of time to migrate them away, too.
Misc.

    The IPFire kernel has been rebased on Linux 4.14.232 which brings various security and stability fixes
    Updated packages: bash 5.1.4, boost 1.76.0, cmake 3.20.2, curl 7.76.1, dejavu-fonts-ttf 2.37, expat 2.3.0, file 5.40, fuse 3.10.3, gdb 10.2, glib 2.68.1, iproute2 5.12.0, less 581.2, libaio 0.3.112, libarchive 3.5.1, libcap-ng 0.8.2, libedit 20210419-3.1, libevent2 2.1.12, libexif 0.6.22, libgcrypt 1.9.3, libgpg-error 1.42, libtiff 4.3.0, libupnp 1.14.6, libxcrypt 4.4.20, libxml2 2.9.10, lm_sensors 3.6.0, lua 5.4.3, meson 0.58.0, OpenSSH 8.6p1, perl-Canary-Stability, perl-Convert-TNET 0.18, perl-Convert-UUlib 1.8, perl-Crypt-PasswdMD5 1.41, perl-Digest 1.19, pixman 0.40.0, poppler 21.05.0 (and poppler-data 0.4.10), pppd 2.4.9, readline 8.1, sqlite 3.35.5, squid 4.15, sudo 1.9.7, wireless-regdb 2020.11.20, xfsprogs 5.11.0
    Some packages that are no longer needed for the build process have been dropped
    Peter Müller has cleaned up the web server configuration for the web user interface and removed various quirks and hacks for old software like Microsoft Internet Explorer 8
    Leo-Andres Hofmann has contributed some cosmetic changes for the live graphs
    A security vulnerability has been reported by Mücahit Saratar (#12619) where it was possible to change a script as an unprivileged user due to a file permission error which could later be executed as root. Thank you for reporting this to us.

Add-ons

    Updated packages: cifs-utils 6.13, cups 2.3.3op2, cups-filters 1.28.8, dnsdist 1.6.0, elfutils 0.184, fetchmail 6.4.19, ffmpeg 4.4, libmicrohttpd 0.9.73, mpd 0.22.6, ncat 7.91, nmap 7.91, samba 4.14.4, Tor 0.4.5.8

[close]

https://www.ipfire.org/
Titel: IPFire 2.25 - Core Update 158
Beitrag von: SiLæncer am 22 Juli, 2021, 22:00
Release Notes

IPFire 2.25 - Core Update 158 is generally available. It comes with one-click VPNs for Apple iOS and Mac OS devices as well as with various fixes across the board including security fixes.

Before we talk about what is new, I would like to ask you for your support for our project. IPFire is a small team of people from a range of backgrounds sharing one goal: make the Internet a safer place for everyone. Like many of our open source friends, we’ve taken a hit this year and would like to ask for your continued support. Please follow the link below where your donation can help fund our continued development: https://www.ipfire.org/donate.

IPsec with Apple iOS & Mac OS

It is now possible to export IPsec road warrior connections for Apple devices so that they can easily be imported into those with only a few clicks. This makes creating secure connections with these devices quick and fool-proof - even when certificates are involved.

Various smaller changes come with these changes: Certificates now have sane expiry times (instead of a hundred years).

Unfortunately time did not allow to provide any detailed documentation for this feature, but this will be added in the near future. If you want to help the team, you can do this with your donation.

Misc.

    IPsec
        Curve448 is now listed above Curve25519 since it provides better security, but is computationally more expensive at the same time
        There will no longer be any safety rules installed for IPsec connections in "on-demand" mode. Leaking packets is not possible in this mode and it makes certain configurations easier when it is not necessary to work around the block rules
    The web proxy removed options to fake the Referrer and User-Agent. This is practically not effective since the majority of connections are encrypted where this feature did not work.
    We have progressed in removing Python 2 from the system by porting fireinfo to Python 3
    Leo-Andres Hofmann fixed the memory usage table which showed inconsistent values
    Updated packages of the core system: apache 2.4.48, bind 9.11.32, cmake 3.20.4, curl 7.77.0, dmidecode 3.3, ethtool 5.12, expat 2.4.1, fuse 3.10.4, glib 2.68.3, gnutls 3.6.16, gzip 1.10, iputils 20210202, knot 3.0.7, libcap 2.50, libedit 20210522-3.1, libnl-3 3.5.0, libpcap 1.10.1, libusb 1.0.24, libxcrypt 4.4.22, linux-firmware 20210511 as preparation for a new kernel, nettle 3.7.3, pcre2 10.37, perl-CGI 4.53, perl-TimeDate 2.33, perl-XML-Parser 2.46, python3-setuptools, python3-pyparsing 2.4.7, qpdf 10.3.2, rng-tools 6.12, smartmontools 7.2, sudo 1.9.7p1, vnstat 2.7, xfsprogs 5.12.0, zd1211-firmware 1.5, zerofree 1.1.1, zstd 1.5.0
    Microcode updates for Intel processors are shipped in this release (20210608) to address these hardware security vulnerabilities:
        INTEL-SA-00442 - 2021.1 IPU - Intel® VT-d Advisory
        INTEL-SA-00464 - 2021.1 IPU - Intel® Processor Advisory
        INTEL-SA-00465 - 2021.1 IPU - Intel Atom® Processor Advisory
    IPFire is also vulnerable where an authenticated third-party could inject and execute shell commands as a non-privileged user (#12616, CVE-2021-33393). This has been fixed by going through over 65000 lines of code to investigate where this is possible. The underlying reason is the Perl function to call shell commands unexpectedly performs shell expansion and might perform more than just the intended command. Functions that no longer allow this behaviour have been written, tested and replaced any vulnerable places. Unfortunately this vulnerability was published without responsible disclosure.
    The root partition of the flash image has been increased to 1600 MiB by default. The minimum required disk size is still 2GB, but it is getting tight...

Add-ons

    dnsdist received an improved initscript which will print any configuration issues before trying to start or restart the daemon
    Updated packages: cups-filter 1.28.9, elfutils 0.185, flac 1.3.3, libogg 1.3.5, nano 5.8, netsnmpd 5.9.1, Postfix 3.6.1, sarg 2.4.0, tcpdump 4.99.1, tmux 3.2a, Tor 0.4.6.5

Some packages have been dropped since they didn't have a maintainer for a long while, the upstream project has been discontinued, or it is unlikely that there are any users left out there. We recommend to install these applications on a different machine than the firewall itself: Asterisk, dpfhack, lcd4linux, miniupnpd, motion, SANE, sendEmail. They will automatically be uninstalled on all systems.

[close]

https://www.ipfire.org/
Titel: OPNsense 21.7
Beitrag von: SiLæncer am 02 August, 2021, 18:30
(https://i.postimg.cc/BQw6P33K/screenshot-2881.png)
OPNsense is an open-source, easy-to-use, and easy-to-build HardenedBSD based firewall and routing platform.

License: Open Source

Release Notes -> https://opnsense.org/opnsense-21-7-released/

https://opnsense.org/about/about-opnsense/
Titel: IPFire 2.27 - Core Update 160
Beitrag von: SiLæncer am 06 Oktober, 2021, 18:00
Release Notes

This is the release announcement for IPFire 2.27 - Core Update 160. It comes with a large number of bug fixes and package updates and prepares for removing Python 2 which has reached its end of life.

Before we talk about what is new, I would like to ask you for your support. IPFire is a small team of people and like many of our open source friends, we’ve taken a hit this year and would like to ask you to help us out. Please follow the link below where your donation can help fund our continued development: https://www.ipfire.org/donate.

Improving Network Throughput

In recent days and months, the development team has spent a lot of time on finding bottlenecks and removing those. Our goal is to increase throughput on hardware and bringing latency down, for a faster network.

This update brings a first change which will enable network interfaces that support it, to send packets that belong to the same stream to the same processor core. This allows taking advantage of better cache locality and the firewall engine as well as the Intrusion Prevention System benefit from this, especially with a large number of connections and especially on hardware with smaller CPU caches.

This feature is automatically enabled on all hardware that supports it.

Removing Python 2

Python 2 has reached its end-of-life (EOL) at January 1st, 2021. In the past months and years, we have moved our own code to Python 3 which has been completed with this update.

However, Python 2 is still present in the distribution for all users who still have to port any custom scripts. With the next Core Update, we will remove Python 2 which means that you have to act now to port any custom scripts written in Python 2.

Misc.

    In the firewall engine, support for redirecting services as been added and long-standing bug #12265 has been fixed
    Some bugs have been fixed in the IPsec VPN scripts that prevented users to create certificate-based connections
    The web proxy can now be used on systems that do not have a GREEN network
    The firewall log viewer now displays IP protocol names instead of numbers.
    All graphs are now rendered in SVG format which makes any scaling in the browser smoother
    Updated packages: cURL 7.78.0, ddns 014, e2fsprogs 1.46.3, ethtool 5.13, glibc was patched for CVE-2021-33574 and a follow-up issue, iproute2 5.13.0, less 590, libloc 0.9.7, libhtp 5.0.38, libidn 1.38, libssh 0.9.6, OpenSSH 8.7p1, openssl 1.1.1k which fixes CVE-2021-3712 and CVE-2021-3711, pcre 8.45, poppler 21.07.0, sqlite3 3.36, sudo 1.9.7p2, strongswan 5.9.3, suricata 5.0.7, sysstat 12.5.4, sysfsutils 2.1.1

Add-ons

    Updated packages: alsa 1.2.5.1, bird 2.0.8, clamav 0.104.0, faad2 2.10.0, freeradius 3.0.23, frr 8.0.1, Ghostscript 9.54.0, hplip 3.21.6, iperf3 3.10.1, lynis 3.0.6, mc 7.8.27, monit 5.28.1, minidlna 1.3.0, ncat 7.91, ncdu 1.16, taglib 1.12, Tor 0.4.6.7, traceroute 2.1.0, Postfix 3.6.2, spice 0.15.0

[close]

https://www.ipfire.org/
Titel: IPFire 2.27 - Core Update 161 Test
Beitrag von: SiLæncer am 11 November, 2021, 22:00
Release Notes

A new update is available for testing: IPFire 2.27 - Core Update 161. It comes with a huge performance improvement for the Intrusion Prevention System which allows it to deliver excellent throughput even on smaller hardware. On top of that come a brand new kernel and various security and bug fixes.

Please note, that this update will reconnect any PPP connections and we recommend performing a reboot after the update has been installed.
Boosting Intrusion Prevention System Performance

The most notable change in this update is a large increase of throughput of the IPS. It can now decide to no longer see traffic from a certain IP connection and tell the kernel to bypass it. That removes all overhead for these connections and therefore increases throughput.

On systems like the Lightning Wire Labs Mini Appliance which comes with four CPU cores each at 1 GHz clock speed, it boosts throughput from about 120 MBit/s on full CPU load to 1 GBit/s on about 20% load on one CPU core for this type of connection. This releases more CPU time for scanning other traffic and allowing this device being properly used on connections with more than 100 MBit/s throughput.

For this change, a lot of work around the QoS and VPNs were necessary because of touch points in the firewall engine. Here, we were also able to tidy up code and make the system more efficient.
Fast Flux Detection in Web Proxy

This update brings Fast Flux Detection as introduced by Peter.

Updated OS Kernel

The IPFire kernel is now based on Linux 5.10.76 and various configuration changes have been made:

    Hardening of stack variables: All of those will now be zero-initialised to avoid any information leak inside the kernel's memory space
    TPM hardware is now being used as a source for entropy if available
    The kernel will now wake up more often in order to keep packet forward latency down and make the system more responsive.
    Some debugging/overhead functions have been disabled for slight performance gains

Misc.

    Python 2 has been removed from IPFire with this release
    IPFire now supports ExFAT
    Logwatch now includes status of software RAID configurations
    Regressions in the disk utilization stats due to a change in iostat(8)'s output have been fixed
    After launching an update, the Pakfire page did not correctly show the locked state
    The web proxy will now always hide its version number due avoid any information leaks
    Support for FriendlyARM NanoPI R2S has been added
    Updated packages: apache 2.4.51 fixing CVE-2021-42013 introduced due to an incomplete fix for CVE-2021-41773, curl 7.79.1, dosfsutils 4.2, GD-Graph 1.54, gd 2.3.3, iproute2 5.14.0, perl-GD 2.73, strongSwan 5.9.4

Add-ons

    Tor will now use any hardware acceleration for cryptographic operations if available
    Updated packages: 7zip 17.04, cups-filters 1.28.10, Ghostscript 9.55.0, Git 2.33.1, htop 3.1.1, krb5 1.19.2, monit 5.29.0, nano 5.9, pcengines-apu-firmware 4.14.0.4, shairport-sync 3.3.8
    avahi's and minidlna's confguration is now correctly backed up and restored on updates

[close]

https://www.ipfire.org/
Titel: OPNsense 22.1
Beitrag von: SiLæncer am 27 Januar, 2022, 21:00
Changelog


o system: improved visibility and flexibility of tunables
o system: move multiple sysctl manipulations to tunables framework to allow overriding them
o system: prevent more than one default route by default
o system: sync recovery utility contents with FreeBSD 13
o system: prevent syslog-ng from crashing after update due to "syslog-ng-ctl reload" use
o system: add severity to syslog output and allow to filter for it
o system: create latest.log links for easier log consumption
o system: added opnsense-log utility to inspect logs on the console
o system: removed circular logging support
o system: background all cron backend command invokes
o system: unified cron start between legacy and MVC components
o system: improve the fallback after failing to look up specific IPv4 address match for dpinger
o system: use correct IPv6 interface for dpinger gateway monitoring when using 6RD
o system: default net.inet6.ip6.intr_queue_maxlen to 1000 like its IPv4 counterpart
o system: default net.inet6.ip6.redirect to off like its IPv4 counterpart
o system: fix potential issues with "search" syntax in resolv.conf
o system: fix general settings PHP warnings that only appear when validation fails
o system: allow additional search domain (Pierre Fevre)
o system: make /var MFS work when /var directories are mount points, e.g. on ZFS
o system: optionally disconnect PPP interfaces when going into CARP backup mode
o system: fix new PPP CARP hook function call (contributed by Markus Reiter)
o system: separate core and thread count in information widget
o system: MSDOS file system awareness in information widget for new /boot/efi partition
o system: no longer display duplicated mounted partitions on the dashboard
o system: remove spurious XML validation that cannot cope with attributes from backup restore
o system: refactor GUI rebind protection and remove its os-dyndns/os-rfc2136 references
o reporting: fix display of total in/out traffic values
o interfaces: LAGG support in console port assignment (contributed by sarthurdev)
o interfaces: improve LAGG/VLAN assignments via console option
o interfaces: repair get_interface_list() for console use
o interfaces: aligned the name and use of special /tmp files for internal interface handling
o interfaces: correctly write nameserverv6 and searchdomainv6 information on dhcp6c lease acquire
o interfaces: make cache IP files exclusive to rc.newwan and rc.newwanv6 scripts to avoid missing IP changes
o interfaces: refactored linkup event handler to avoid unnecessary recursion in the code
o interfaces: removed opportunistic functions find_interface_ip(), find_interface_ipv6() and find_interface_ipv6_ll()
o interfaces: get_interface_ip() and get_interface_ipv6() now return a valid IP address if one was given to support VIP aliases
o interfaces: interfaces_addresses() can now map a configuration interface to returned addresses to track its origin
o interfaces: VIPs now support the "no bind" option to exclude them from automatic service use when configured
o interfaces: interfaces_primary_address() is now being used like its IPv6 equivalent throughout the code
o interfaces: interfaces_primary_address6() is now considering addresses from tracking interfaces when needed
o interfaces: interfaces_scoped_address6() is now being used throughout the code
o interfaces: "tentative" state now leads to the address being ignored during configuration like "deprecated"
o interfaces: removed unmaintained 3G statistics gathering for Huawei modems that could lock up other modems
o interfaces: reworked interface creation on boot up
o interfaces: spoof MAC now only applies to actual interface and not all of its VLAN siblings or parent
o interfaces: added permanent promiscuous mode setting
o interfaces: add the interface description via ifconfig to its respective device
o interfaces: stop special treatment of bridge interfaces on linkup
o interfaces: improve validations and fix defaults for bridges
o interfaces: allow bridges to attach to VXLAN on boot
o interfaces: background all interface reconfiguration script hooks
o interfaces: no longer allow and apply media configuration for non-parent devices
o interfaces: removed restriction from interfaces without configuration to not being able to hold VIPs
o interfaces: remove defunct link support for GRE
o interfaces: align GIF configuration with base system options
o firewall: properly kill all connections from and to a WAN IPv4 on an address change
o firewall: skip rule ID for NAT type log entries (contributed by kulikov-a)
o firewall: display interface descriptions on normalisation rules (contributed by vnxme)
o firewall: dynamic IPv6 host alias support (contributed by Team Rebellion)
o firewall: removed obsolete kill states option on gateway failure
o firewall: removed the $aliastable cache
o firewall: support "no scrub" option in normalisation rules
o firewall: correctly handle IPv6 NAT in states view
o firewall: plain log default logging severity selection is now "informational"
o firewall: improve maximum shaper value validation and add Gbit/s support
o captive portal: prevent session removal crashing when no IP address was registered
o dhcp: allow for ARM architectures in network boot options (contributed by Keith Cirkel)
o dhcp: allow router advertisements to use a specific link-local VIP alias
o dhcp: refactor the IPv4 and IPv6 configuration pages and add minimal subnet size requirement hints
o dhcp: rework router advertisement "static" mode flags to separate advanced options
o dnsmasq: fix all-server overwriting strict-order configuration directive (contributed by Christian Tramnitz)
o dnsmasq: no-hosts option (contributed by agh1467)
o firmware: add a "status_reboot" variable to API return data to make clear it belongs to the offered minor update or major upgrade
o firmware: add random delays to existing firmware cron jobs to avoid update server load spikes
o firmware: added an automatic cron job to fetch changelog daily to use it as a lightweight check for updates on the dashboard
o firmware: implement cross-ABI reinstall of all packages for future use
o firmware: opnsense-update: exclude /boot/efi permission reset from base set extract
o firmware: removed obsolete business repository fingerprints and added 22.1 fingerprint
o firmware: return product info for status endpoint even when no firmware check was done
o installer: fix installation of rc.conf keymap setting selected earlier during installation
o installer: add EFI partition as a default mount point
o installer: increase EFI partition size to 260 MB
o installer: improve disk and ZFS pool scan and display
o intrusion detection: prevent config migration from crashing
o intrusion detection: update to ET-Open to version 6
o ipsec: update security of default settings when creating new phase 1 and 2
o ipsec: remove hashes and algorithms no longer supported by FreeBSD 13
o ipsec: migrated tunnel settings page to MVC
o lang: update translations for Chinese, French, German, Italian, Japanese, Norwegian, Spanish, and Turkish
o lang: demote Italian to development-only language due to lowered translation ratio
o monit: move logging to own target
o network time: add iburst option and stop using it by default (contributed by Patrick M. Hausen)
o network time: detach "limited" from "kod" option (contributed by Zsolt Zsiros)
o network time: remove PID file use as it can be unreliable
o openvpn: kill by common name when kill by address does not work
o unbound: disable do-not-query-localhost on local address server use
o unbound: update DNS with hostname-only static entries (contributed by Gareth Owen)
o update: opnsense-bootstrap: -z snapshot mode
o update: opnsense-bootstrap: improved type detection
o update: opnsense-code: -r for repository removal
o update: opnsense-fetch: emit error message of failed download
o update: opnsense-update: handle kernel debug directory like /boot/kernel
o update: opnsense-update: removed "firmware-upgrade" file support
o update: opnsense-verify: synced shared code with FreeBSD 13
o backend: unify use of configctl utility
o images: removed deprecated os-dyndns plugin from default installation
o mvc: fix logging of configd errors
o mvc: Add BlankDesc to ModelRelationField (contributed by agh1467)
o mvc: emulation versioning empty nodes for the legacy configuration sections
o mvc: add getInterfaceConfig endpoint to interface API (contributed by Paolo Asperti)
o mvc: add hint support for text fields (contributed by agh1467)
o ui: add support for terabytes, and petabytes to format_bytes() (contributed by agh1467)
o ui: universal striping adjustment for MVC components (contributed by kulikov-a)
o ui: move storing jQuery Bootgrid settings in browser from core to bootgrid (contributed by Manuel Faux)
o src: FreeBSD 13-STABLE as of 4ee9fbcd853
o src: migrated to LUA boot loader (contributed by Kyle Evans)
o src: revert upstream permission change for /root directory
o src: fix kernel build creating wrong linkers.hint file
o src: carp: fix send error demotion recovery
o src: ixgbe: prevent subsequent I2C bus read timeouts
o src: reworked shared forwarding
o plugins: os-acme-client 3.8[2]
o plugins: os-bind 1.20[3]
o plugins: os-ddclient 1.0 as an eventual replacement for os-dyndns
o plugins: os-dyndns adds local copy of get_dyndns_ip()
o plugins: os-freeradius 1.9.18[4]
o plugins: os-frr 1.26[5]
o plugins: os-haproxy 3.10[6]
o plugins: os-nginx 1.26[7]
o plugins: os-openconnect 1.4.2[8]
o plugins: os-postfix 1.21[9]
o plugins: os-rfc2136 adds local copy of get_dyndns_ip()
o plugins: os-telegraf 1.12.4[10]
o plugins: os-wireguard 1.10[11]
o plugins: os-wol adds cron support for wake action (contributed by digitalshow)
o plugins: os-zabbix-proxy 1.7[12]
o ports: expat 2.4.2[13]
o ports: filterlog 0.6[14]
o ports: flock 2.37.2
o ports: hostapd 2.10[15]
o ports: lighttpd 1.4.63[16]
o ports: nss 3.74[17]
o ports: openssl 1.1.1m[18]
o ports: openvpn 2.5.5[19]
o ports: pecl-psr 1.2.0[20]
o ports: phalcon 4.1.3[21]
o ports: php 7.4.27[22]
o ports: pkg fixes validation failures on HTTPS fetch in static binary[23]
o ports: sqlite 3.37.2[24]
o ports: syslog-ng 3.35.1[25]
o ports: unbound 1.14.0[26]
o ports: wpa_supplicant 2.10[27]

Known issues and limitations:

o This release contains a new major operating system version and should be carried out with the necessary care.  Despite extended test coverage changes made by FreeBSD may still affect operation without our knowledge.  Except for ZFS boot environments rollbacks between major operating system versions are extremely fragile and a reinstall of an older version should be attempted in the worst case.  For more information please consult the FreeBSD 13.0 release notes[28].
o IPsec hash and cipher removals in FreeBSD 13 can affect existing setups as insecure cryptographic options have been removed upstream.  If you are using MD5, Blowfish, DES, 3DES, or CAST128 in your phase 2 please move to more secure settings prior to the upgrade.  Note that phase 1 settings are unaffected, but insecure settings should still be avoided.  For more information see the FreeBSD commit in question[29].
o The Realtek vendor driver is no longer bundled with the updated FreeBSD kernel.  If unsure whether FreeBSD 13 supports your Realtek NIC please install the os-realtek-re plugin prior to upgrading to retain operability of your NICs.
o MAC spoofing now only pertains to the configured interface and not the VLAN siblings or parent interface.  This can introduces unwanted configuration due to previous side effects in the code.  Make sure to assign and set the spoofed MAC for all interfaces that require a spoofed MAC.
o Media settings are no longer shown for non-parent interfaces and need to be set individually to take effect.  This can introduce unwanted configuration due to previous side effects in the code.  If the parent interface was not previously assigned please assign it to reapply the required media settings.
o NTPD defaults changed to exclude the "iburst" option by default.  "limited" setting was detached from "kod" option.  In both cases configuration adjustments can achieve previous behaviour if required.
o Rebind checks through os-dyndns or os-rfc2136 will no longer work due to the deprecation of both plugins.  Please add your rebind hosts manually or disable rebind protection prior to the upgrade.
o GRE link1 support has been removed and needs a static route to function now.
o Circular logging support has been removed.  No user interaction is required.

[close]

https://opnsense.org/about/about-opnsense/
Titel: OPNsense 22.7
Beitrag von: SiLæncer am 29 Juli, 2022, 21:00
Changelog


o Europe: https://opnsense.c0urier.net/releases/22.7/
o US East Coast: https://mirror.wdc1.us.leaseweb.net/opnsense/releases/22.7/
o US West Coast: https://mirror.sfo12.us.leaseweb.net/opnsense/releases/22.7/
o South America: http://mirror.ueb.edu.ec/opnsense/releases/22.7/
o East Asia: https://mirror.ntct.edu.tw/opnsense/releases/22.7/
o Full mirror list: https://opnsense.org/download/

Here are the full patch notes against 22.1.10:

o system: changed certificate revocation to use the phpseclib library
o system: performance improvement for set_single_sysctl()
o system: restart syslog fully and only once after all services have been started
o system: new setting for deployment mode to control PHP error flow
o system: /tmp MFS now uses a maximum of 50% of RAM by default and can be adjusted
o system: /var MFS becomes /var/log MFS and uses a maximum of 50% of RAM by default and can be adjusted
o system: previous special /var MFS content is now permanently stored under /var to ensure full operability
o system: flush all core Python pyc files on updates
o system: protect syslog-ng against out of memory kills
o system: add filter to system log widget (contributed by kulikov-a)
o system: disable RRD and NetFlow shutdown backups by default
o system: render interfaces in convert_config()
o system: apply default firewall policy before interface configuration
o system: move remote backup script to proper file system location
o system: disable flag was not removing static route
o system: Net_IPv6::compress() should not compress "::" to ""
o system: fix RADIUS config validation for port requirement (contributed by Josh Soref)
o system: remove last bits of circular logging (CLOG) support
o system: removed legacy Diffie-Hellman parameter handling
o interfaces: refactored LAGG, wireless and static ARP handling
o interfaces: provide automatic startup of Loopback, IPsec, OpenVPN, VXLAN devices
o interfaces: removed the side effect reliance on /var/run/booting file
o interfaces: add dynamic reload of required devices
o interfaces: add WPA enterprise configuration for infrastructure mode (contributed by Manuel Faux)
o interfaces: fix "Allow service binding" for multiple aliases per interface (contributed by Adam Dawidowski)
o interfaces: auto-detect far gateway requirement for default route
o interfaces: switch to MVC/API variant for DNS lookup page
o interfaces: refactor DHCP and PPPoE scripts to use ifctl exclusively
o interfaces: prevent the removal of default routes in dhclient-script
o interfaces: fix inconsistencies in wireless handling
o interfaces: fix unable to bring up multiple loopback (contributed Johnny S. Lee)
o interfaces: fix unable to bring up multiple VXLAN
o interfaces: check if int before passing to convert_seconds_to_hms()
o interfaces: disable IPv6 inside 4in6 and 4in4 GIF tunnels (contributed by Maurice Walker)
o interfaces: ping diagnostics tool must explicitly set IP version (contributed by Maurice Walker)
o interfaces: remove other inconsistencies regarding ping utility changes in FreeBSD 13
o interfaces: correct regex validation for dhcp6c expire statement (contributed by Josh Soref)
o interfaces: add missing scope to link-local GIF host route
o interfaces: add iwlwiwi(4) to wireless devices
o firewall: improved port alias performance
o firewall: obsoleted notices inside the synchronization code
o firewall: support logging in NPT rules
o firewall: append missing link-local to inet6 :network selector
o firewall: move inspect action into its own async API action to prevent long page loads
o firewall: internal aliases cannot be disabled
o firewall: performance improvement for reading live log
o firewall: ignore age/expire when not provided or empty in sessions page
o firewall: add general firewall log for alias and filter system log messages
o dhcp: no longer automatically add a link-local address to bridges if IPv6 service is running on it
o dhcp: allow running relay service on bridges
o dhcp: clean up IPv6 prefixes script
o dhcp: include ddns-hostname and other cleanups (contributed by Sascha Buxhofer)
o dhcp: remove duplicated ddnsupdate static mapping switch
o dhcp: remove print_content_box() use
o dhcp: switch to shell-based DHCPv6 lease watcher
o dhcp: rewrite prefix merge for dynamic IPv6 tracking to support bitwise selection
o dnsmasq: switch to a Python-based DHCP lease watcher
o firmware: console script can now show changelog using "less" before update
o firmware: disable crash reporter in development deployment mode
o firmware: limit changelog-based update check on dashboard to release version
o firmware: provide an upgrade log audit
o intrusion detection: remove dead link to McAfee rule references
o ipsec: add "IPv4+6" protocol for mobile phase 1 entries (contributed by vnxme)
o ipsec: mobile property boolean duplication in phase 2
o ipsec: remember phase 1 setting for next action
o ipsec: switch to MVC/API variants of SPD, SAD and connection pages
o ipsec: small UX tweaks in status page
o openvpn: pinned Diffie-Hellman parameter to RFC 7919 4096 bit key
o unbound: prevent crash of DHCP lease watcher due to unhandled CalledProcessError exception
o lang: bring back Italian and update all languages to latest available translations
o mvc: bugfix search and sort issues for searchRecordsetBase()
o mvc: add support for non-persistent (memory) models
o mvc: throw when no mount found in model (contributed by agh1467)
o mvc: fix rowCount when all is selected in searchRecordsetBase()
o mvc: fix two regressions in BaseField for Phalcon 5
o mvc: store configuration changes only when actual changes exist
o ui: removed Internet Explorer support
o ui: boostrap-select ignored header height
o ui: merge option objects instead of replacing them in bootgrid (contributed by agh1467)
o ui: correct required API for command-info in bootgrid (contributed by agh1467)
o ui: add catch undefined TypeError in SimpleActionButton (contributed by agh1467)
o ui: fix assorted typos in the code base (contributed by Josh Soref)
o ui: handle HTTP 500 error gracefully in MVC pages
o plugins: os-apcupsd 1.0[2] (contributed by David Berry, Dan Lundqvist and Nicola Pellegrini)
o plugins: os-boot-delay is no longer available[3]
o plugins: os-crowdsec 1.0[4]
o plugins: os-nginx fix for missing DH parameter file
o plugins: os-postfix fix for missing DH parameter file
about plugins: os-tayga 1.2[5]
o plugins: os-tor no longer available on LibreSSL due to incompatibilities with newer Tor versions
o plugins: os-web-proxy-useracl is no longer available, no updates since 2017
o src: FreeBSD 13.1-RELEASE[6]
o src: axgbe: also validate configuration register in GPIO expander
o src: pf: ensure that pfiio_name is always nul terminated
o src: pf: make sure that pfi_update_status() always zeros counters
o src: igc: change default duplex setting
o src: e1000: try auto-negotiation for fixed 100 or 10 configuration
o ports: php 8.0.20[7]
o ports: sqlite 3.39.0[8]
o ports: suricata 6.0.6[9]
o ports: unbound 1.16.1[10]

A hotfix release was issued as 22.7_4:

o system: IXR_Library using incorrect constructor format for PHP 8
o interfaces: fix issues with PPP uptime display in PHP 8
o firewall: do not emit link-local address on IPv6 network outbound NAT
o mvc: remove stray error_reporting(E_ALL) calls

Known issues and limitations:

o The DH parameter is no longer available in OpenVPN server configuration and now fixed to the RFC 7919 4096 bit key.  The only downside may be lower performance on older machines.
o The infamous /var MFS feature was reduced to the /var/log scope in order to avoid future issues with plugins requiring persistent storage under /var.  In practice people who used /var MFS had no benefit over it with software that required persistent storage under /var to operate in the first place.  Periodic configuration file writes to /var are negligible on SSD-based systems.
o The os-dyndns plugin is still available due to the fact that ddclient did not release a non-development release so far since we started os-ddclient.  Availability thereof might change later in 22.7.x.
o The console firmware update will now display text-based changelogs for the update to be installed if available.  Use the arrow keys to scroll the changelog and type "q" to resume the update process.
o The manual DHCPv6 tracking mode now requires a proper prefix range given like its counterpart with a static address.  If a previous prefix ID type input is detecte

[close]

https://opnsense.org/about/about-opnsense/
Titel: IPFire 2.27 - Core Update 170
Beitrag von: SiLæncer am 19 September, 2022, 19:00
Release Notes

The next Core Update is released: IPFire 2.27 - Core Update 170. It features new IP blocklists for the firewall engine, significant improvements to Pakfire, modernizes the default cryptographic algorithm selection for IPsec connections, as well as a new kernel, and a plethora of bug fixes and security improvements under the hood.
IP-Reputation Blocking to keep known threats out

Based on prior development by Tim FitzGeorge, Stefan brought a new feature to the firewall engine, which allows the easy activation of various public IP-based blocklists, just by a single click.

All enabled blocklists are updated automatically at an appropriate interval (a technique we already deployed for updating IPS rulesets), and protect against various threats, such as IP addresses or networks having a poor reputation, being involved with cyber crime hosting, or simply not allocated, hence no traffic should be routed to and from them.

You probably wonder why IPFire now comes with yet another way for IP-based blocking. There are several motivations behind this:

    IP blocklists are already available for the Intrusion Prevention System. However, it is a rather expensive way for dealing with network traffic that can already be safely dropped based on the reputation of involved IPs. There is no need to waste more CPU resources on it than absolutely necessary - why not let the firewall engine itself handle such traffic, and bother the IPS with more relevant stuff?
    The "drop all traffic from and to hostile networks" feature is meant as a basic level of network protection suitable for IPFire's entire user base, hence enabled by default. It protects against "the baddest of the bad" on the internet, and does not require any attention or maintenance whatsoever.
    IP blocklists, as introduced with this Core Update, provide a more fine-grained level, and your mileage may vary: For example, blocking Tor traffic might be appropriate for some IPFire users, but certainly not for all of them. Some may find certain blocklists to be too aggressive for their use-case.

One size doesn't always fit all. The IP blocklist feature is IPFire's way of take this into account, and make further protection against network threats easy and resource-efficient.
IPsec: MODP-2048 is ejected for new connections in favour of ECP-384/-521

Following recommendations not to use Diffie-Hellman groups shorter than 3,000 bits after 2022, MODP-2048 has been dropped from the default cryptographic algorithm selection for new IPsec connections. To provide a more performant alternative to MODP-3072 and MODP-4096 and to be more compatible to other vendors in the default configuration, the NIST-standardized elliptic curves ECP-384 and ECP-521 have been added to the defaults for new IPsec connections.

Existing IPsec connections remain unchanged. However, IPFire users operating IPsec connections are advised to revise the cryptographic settings for these, and drop using weak algorithms, if possible.
Linux Kernel 5.15.59

Among bug fixes throughout the kernel including security fixes and hardware support improvements, the updated kernel also adds mitigations against Retbleed, another CPU vulnerability affecting various Intel and AMD processors. IPFire's web interface has been updated to display the mitigation state of Retbleed accordingly.

The following kernel-related changes have been made in addition:

    On x86_64, Intel DMA Remapping Devices (better known as IOMMU) are enabled by default during boot, if available.
    To reduce attack surface, legacy DRM drivers are no longer available. Since the respective kernel modules have already been blocklisted for a long time, thus unusable, this should not have an impact in production.
    64-bit ARM users experience improved KASLR thanks to the kernel's memory address now being randomized before unpacking it (#12363).
    Merging slab caches is no longer permitted, to prevent kernel heap overflows, and adversaries interfering with cache structures used by several programs.
    Support for PCI pass-through has been enabled to allow mapping PCI devices into VMs running on IPFire (#12754).

Miscellaneous

    Robin Roevens contributed a series of improvements to Pakfire, such as better error handling on downloads, and refactored a lot of code under the hood.
    He also updated and improved the Zabbix agent add-on, which now features version 6.0.6 (LTS).
    Support for assigning aliases to multiple RED interfaces has been added.
    Non-unique hardware UUIDs as well as empty serial numbers are now ignored for computing Fireinfo profile IDs (#12896).
    The blocklist of the University of Toulouse is now downloaded via HTTPS (#12891).
    Logwatch summaries are now properly included in backups (#12827).
    ncurses terminfo files for tmux are now properly shipped, resolving #12905.
    All logged IPS events are now correctly displayed in the web interface (#12899).
    Mount options of /boot have been hardened on both existing installations and new x86_64 IPFire instances.
    On new installations, the partition's size has also been increased to 256 MiB, since components such as the kernel keep getting bigger and bigger.
    amazon-ssm-agent is now available on 64-bit ARM as well.
    pyfuse3 is now packaged for BorgBackup (#12611).
    Two stored XSS vulnerabilities have been fixed, thanks to JPCERT for reaching out (#12925).
    Updated packages: Bash 5.1.16, bind 9.16.31, GnuTLS 3.7.7, harfbuzz 4.4.1, hdparm 9.64, intel-microcode 20220809, kmod 30, krb5 1.20, logwatch 7.7, lsof 4.95.0, nano 6.4, ninja 1.11.0, OpenSSL 1.1.1q, rpcsvc-proto 1.4.3, screen 4.9.0, sqlite 33900000, suricata 5.0.10, unbound 1.16.2, usbutils 014, vim 9.0, xfsprogs 5.18.0, zlib to incorporate a fix for CVE-2022-37434.
    Updated add-ons: ClamAV 0.105.1, fmt 9.0.0, git 2.37.1, gptfdisk 1.0.9, gutenprint 5.3.4, haproxy 2.6.0, htop 3.2.1, i2c-tools 4.3,iperf 2.1.7, mpd 0.23.8, NRPE 4.1.0, openvmtools 12.0.5, pcengines-apu-firmware 4.17.0.1, python3-cryptography 36.0.2, qemu 7.0.0, qemu-ga 7.0.0, rsync to patch CVE-2022-29154, Samba 4.16.4, shairport-sync 3cc1ec6

As always, we thank all people contributing to this release in whatever shape and form. Please note IPFire is backed by volunteers, maintaining and improving this distribution in their spare time - should you like what we are doing, please donate to keep the lights on, an consider becoming engaged in development to distribute the load over more shoulders.

[close]

https://www.ipfire.org/
Titel: IPFire 2.27 - Core Update 171
Beitrag von: SiLæncer am 20 Oktober, 2022, 21:00
Release Notes

Today, we release IPFire 2.27 - Core Update 171. It updates major parts of the distribution, such as the kernel and the IPS engine, and features bug fixes as well as stability and security improvements - most notably, upstream fixes against a strain of vulnerabilities in the kernel's WiFi components. Particularly IPFire users running WiFi networking hardware are advised to install this update as soon as possible, and reboot their systems afterwards.

Also, this Core Update initiates the deprecation of IPFire support for 32-bit ARM hardware, ultimately taking effect on February 28, 2023.

Modernizing system components

Several core parts of IPFire have been updated and modernized:

    Suricata has been updated to the 6.x versioning branch, after a show-stopping issue (#12548) has been resolved upstream. IPFire users will benefit from more stable, secure, and versatile IPS functionality.
    The Linux kernel has been updated to 5.15.71, providing IPFire users with hardware support improvements and security fixes.
        Most notably, it resolves issues affecting ASIX USB3-to-LAN adapters using the ax88179-178a driver.
        Upstream patches for fixing CVE-2022-41674 and CVE-2022-42719 to CVE-2022-42722 have been incorporated, plugging several security vulnerabilities in the kernel's WiFi components that could have lead to RCE and DoS attacks, simply by emitting crafted WiFi beacons.
        To cut attack surface, some debugging functionalities have been removed, for which there is no legitimate use-case on an IPFire machine.
        ARM installations will experience a security benefit thanks to seccomp support enabled. Doing so previously caused issues on some boards, hence it was enabled on x86 only.
        Mathew McBride submitted patches to add support for the 64-bit ARM Traverse Ten64 board family.

Sunsetting 32-bit ARM support

Back in the glory days, the IPFire development team was optimistic about ARM becoming an affordable yet powerful alternative to the x86 architecture. Support was added in IPFire 2.11, 13 years ago. Soon, we finally would see some diversification among the hardware landscape, forcing competition and ultimately better products - or so we hoped.

Disappointment kicked in just two years later, when we realized hardware vendors were just dumping new SoCs on the marked without caring about proper operating system support at all. Existing boards disappeared quicker than the kernel developers could reverse engineer them and implement drivers. Very few of these boards actually met IPFire's demands, such as having at least two properly connected NICs.

Things did not improve afterwards, as we had to assess that there was no innovation on the market, and given the hardware specifications of the vast majority of 32-bit ARM boards, the architecture quickly became very much a legacy burden to us. Maintaining our own ARM kernel patchset started to eat into the spare time of IPFire's developers, while the amount of IPFire installations actually running on ARM never exceeded 10%. At some point, we decided not to support any additional SoCs without proper mainline kernel drivers, to prevent the situation from escalating to a DDoS against the people behind IPFire.

Today, despite significant efforts on our part, we are left with a patchy list of ARM boards supported, scanty upstream support (much like 32-bit x86), and a general disinterest in this architecture. Unsurprisingly, at the time of writing, only 0.86% of all IPFire installations out there run on 32-bit ARM.

Due to all these reasons, we decided to discontinue IPFire support for 32-bit ARM on February 28, 2023. Users are recommended to replace their hardware; after that date, IPFire won't provide updates for this architecture anymore.

64-bit ARM board support will continue, and while it is not a mainstream architecture to us (backing only 1.25% of all IPFire installations), supporting it is much less of a hassle, thanks to better upstream development and big server vendors and cloud providers rapidly shifting to 64-bit ARM. As to be expected, the boards available are much more powerful and suitable for firewalling purposes as well. We hope our decision will gain us resources to focus on more important work, such as the development of IPFire 3.

Miscellaneous

    Perl, all its modules and related packages were updated to 5.36.0, resolving functional and security issues.
    The toolchain, comprising of glibc, binutils and more, was modernized as well.
    linux-firmware, the conglomerate of proprietary 3rd-party firmware files, has been updated as well. By removing some firmware files related to unsupported hardware, especially Bluetooth devices, we save a couple of megabytes.
    Creating full-ISO backups is now possible again, resolving #12932.
    libsodium is now shipped with the core system, required as a dependency to some add-ons (#12929).
    Faulty links to IP blocklist source websites have been fixed (#12938).
    Orphaned RRD graphs are now cleaned automatically on a weekly basis, saving disk space.
    NUT logs can now be viewed in the web interface (#12921).
    Connections to literal IPv6 addresses no longer crash IPFires' proxy (#12826).
    IPFire's default domain is now used for DHCP leases where no domain can be determined, rather than defaulting to localdomain.
    Updated packages: bind 9.16.33, binutils 2.39, curl 7.84.0, dhcp 4.4.3-P1, efibootmgr 18, efivar 38, expat 2.4.9, glibc 2.36, iproute2 5.19.0, kbd 2.5.1, libarchive 3.6.1, libhtp 0.5.41, linux-firmware 20220913, nettle 3.8.1, OpenVPN 2.5.7, Perl 5.36.0, sqlite 3390200, Squid 5.7, strongSwan 5.9.7, Suricata 6.0.8, udev 3.2.11, Unbound 1.16.3, util-linux 2.38.1, wireless-regdb 2022-08-12
    Updated add-ons: elfutils 0.187, fetchmail 6.4.32, hplip 3.22.6, lcdproc 0e2ce9b, ncat 7.92, rsync 2.3.6, Tor 0.4.7.10

As always, we thank all people contributing to this release in whatever shape and form. Please note IPFire is backed by volunteers, maintaining and improving this distribution in their spare time - should you like what we are doing, please donate to keep the lights on, an consider becoming engaged in development to distribute the load over more shoulders.

[close]

https://www.ipfire.org/
Titel: IPFire 2.27 - Core Update 172
Beitrag von: SiLæncer am 29 Dezember, 2022, 21:00
Release Notes

Shortly after Christmas, we release IPFire 2.27 - Core Update 172. It comes with cryptography improvements for IPsec and OpenVPN, as well as security improvements under the hood, a plethora of package updates and various bugs fixed across the place.

Future-proofing VPN cryptography

This Core Update updates the key lengths of host certificates for both IPsec and OpenVPN clients/peers to 4,096 bit RSA, since the previous default of 2,048 bit is no longer recommended for long-term security purposes.

Both IPsec and OpenVPN root CA length has always been 4,096 bit, as has the key pair generated for IPFire's web interface - no action is required on that front. Unfortunately, existing IPsec/OpenVPN client/peer configurations cannot be migrated automatically, and have to be phased-out manually. Thanks to the respective CA certificates not requiring an update, complete disruptions of VPN infrastructure can, however, be avoided.

OpenVPN is automatically reconfigured to use a secure Diffie-Hellman parameter, both of sufficient length of 4,096 bit and standardized (see RFC 7919, section A.3, bug #12632). All OpenVPN clients and peers will automatically benefit from this cryptography improvement; no manual action is required. This also obsoletes the necessity of generating or uploading Diffie-Hellman parameters while configuring OpenVPN, saving a lot of time, as the generation of such parameters could have taken hours on slower hardware.

For early 2023, we anticipate post-quantum cryptography (PQC) to land in IPFire for IPsec, for which there is a strong (and growing) need, thanks to so-called "capture now, decrypt later" attacks endangering the confidentiality of information with long-term secrecy demand, such as biometric and health data.

Miscellaneous

    IPFire's trust store has been updated to incorporate Mozilla's decision to distrust the root certificates of TrustCor Systems S. DE R.L. (further media coverage)1
    Displaying the status and actions of add-ons whose service names differed from their package names is fixed (#12935). The same page has also seen some translation improvements.
    Certificate Revocation Lists (CRLs) of OpenVPN are now properly backed up and reloaded before OpenVPN is (re-)started.
    Adolf Belka submitted a massive patchset for updating Python.
    Roberto Peña updated and improved the Spanish translation of IPFire's web interface.
    Some unnecessary files from linux-firmware are no longer shipped and automatically removed from existing installations to keep the system as lean as possible.
    Various file permissions have been tightened as a defense in-depth measure.
    The obsolete gnu-netcat add-on has been dropped.
    Updated packages: arm-trusted-firmware 2.7, bash 5.2, bind 9.16.35, conntrack-tools 1.4.7, curl 7.86.0, elinks 0.15.1, ethtool 6.0, expat 2.5.0, iana-etc 20221107, intel-microcode 20221108, iproute2 6.0.0, libedit 20221030-3.1, libhtp 0.5.42, libloc 0.9.15, libnetfilter_conntrack 1.0.9, libpng , 1.6.39, libtasn1 4.19.0, libtiff 4.4.0, libuv 1.44.2, libxcrypt 4.4.33, libxml2 2.10.3, linux-firmware 20221109, memtest86+ 6.00, nano 7.0, OpenSSH 9.1p1, OpenSSL 1.1.1s, OpenVPN 2.5.8, poppler 22.11.0, python3 3.10.8, readline 8.2, sed 4.9, sqlite 3400000, strongswan 5.9.8, sudo 1.9.12p1, suricata 6.0.9, sysstat 12.7.1, tzdata 2022e, u-boot 2022.10, unbound 1.17.0, usbutils 015, vnstat 2.10, xz 5.2.8, zlib 1.2.13
    Updated add-ons: cups-filters 1.28.16, ddrescue 1.26, dehydrated 0.7.1, fetchmail 6.4.34, ffmpeg 5.1.2, flac1.4.2, fmt 9.1.0, git 2.38.1, libassuan 2.5.5, libvirt 8.9.0, mpd 0.23.10, nginx 1.22.1, pcengines-apu-firmware 4.17.0.2, qemu 7.1.0, qemu-ga 7.1.0, rsync 3.2.7, samba 4.17.3, sdl2 2.26.0, Tor 0.4.7.12

As always, we thank all people contributing to this release in whatever shape and form. Please note IPFire is backed by volunteers, maintaining and improving this distribution in their spare time - should you like what we are doing, please donate to keep the lights on, an consider becoming engaged in development to distribute the load over more shoulders.

[close]

https://www.ipfire.org/
Titel: OPNsense 23.1
Beitrag von: SiLæncer am 27 Januar, 2023, 19:00
Changelog


o system: replaced log_error() use with log_msg() and adjusted logging levels accordingly
o system: introduced a service boot log
o system: the LibreSSL flavour has been discontinued
o system: simplify gateway monitoring setup code
o system: add option to skip gateway monitor host route
o system: populate /etc/hosts file with IPv6 addresses too
o system: simplify and guard host route creation
o system: merge system_staticroutes_configure() into system_routing_configure()
o system: do not yield process after calling shutdown command
o system: apply tunables during late boot in case a module was loaded depending on them to be set to a specific value
o system: show size of ZFS ARC (adaptive replacement cache) in system widget
o system: introduce support tier annotations for core and plugins[2]
o system: add cron tasks for scrubbing and trimming ZFS pools (contributed by Iain Henderson)
o system: fix 6rd/6to4 gateway interface detection (contributed by Frans J Elliott)
o reporting: add Unbound DNS statistics frontend including client drill-down
o interfaces: heavy cleanup of the wireless device integration
o interfaces: use 802.1ad protocol for stacked VLAN parent (QinQ)
o interfaces: GIF and GRE now support subnet-based IPv6 configurations instead of always falling back to a point-to-point (/128) setup
o interfaces: GIF and GRE now disable IPv6 on IPv4 tunnels (contributed by Maurice Walker)
o interfaces: add isolated PPPoEv6 mode to selectively enable IPv6 CP negotiation and turn it off when no IPv6 mode is set
o interfaces: add support for SLAAC WAN interfaces without DHCPv6 (contributed by Maurice Walker)
o interfaces: register LAGG, PPP, VLAN and wireless devices as plugins
o interfaces: simplified get_real_interface() function
o interfaces: removed obsolete "defaultgw" files
o interfaces: simplified rc.linkup script
o interfaces: improve IP address cache behaviour in rc.newwanip(v6) scripts
o interfaces: converted virtual IPs to MVC/API
o interfaces: add MAC filtering to packet capture
o interfaces: convert ARP/NDP pages to server-side searchable variant
o interfaces: create null route for DHCPv6 delegated prefix
o interfaces: tighten the concept of hardware interfaces and pull supported plugin devices into assignments page automatically
o firewall: remove deprecated "Dynamic state reset" mechanic
o firewall: invalidate port forward rule entry when no target is specified
o firewall: hide deprecated source OS rule setting under advanced
o firewall: add group option to prevent grouping in interfaces menu
o firewall: safeguard against missing name from the alias API call
o intrusion detection: keep grid to prevent widgets being removed
o intrusion detection: reload grid after log drop (contributed by kulikov-a)
o intrusion detection: add verbose logging mode selector
o ipsec: disable charon.install_routes completely in case upstream would implement it for FreeBSD later on
o ipsec: move user PSK (pre-shared key) and static PSK items to new MVC/API implementation
o ipsec: migrate existing configuration from ipsec.conf to swanctl.conf
o ipsec: add a new independent connections MVC/API component to manage IPsec in a layout matching swanctl.conf syntax more closely
o ipsec: rewrote lease status page in MVC/API
o ipsec: add configurable "unique" setting to phase 1
o ipsec: missing correct phase 1 to collect "Network List" option
o monit: support start timeout setting (contributed by spoutin)
o openvpn: add unique daemon name to each instance
o unbound: add statistics database backend
o unbound: add exact domain blocking
o mvc: call plugins_interfaces() optionally on service reconfigure
o mvc: match UUID for multiple values (contributed by kulikov-a)
o mvc: convert setBase() to an upsert operation
o mvc: change default sorting to case-insensitive
o mvc: add TextField tests (contributed by agh1467)
o mvc: implement required getRealInterface() variant
o ui: assorted improvements in bootgrid and form controls
o ui: switch to pure JSON data in bootgrids
o plugins: os-bind 1.25[3]
o plugins: os-ddclient 1.11[4]
o plugins: os-dyndns end of life note moves to 23.7
o plugins: os-freeradius 1.9.22[5]
o plugins: os-frr 1.32[6]
o plugins: os-haproxy 4.0[7]
o plugins: os-puppet-agent 1.1[8]
o plugins: os-sslh 1.0[9] (contributed by agh1467)
o plugins: os-theme-cicada 1.32 (contributed by Team Rebellion)
o plugins: os-upnp 1.5[10]
o plugins: os-wireguard switches to kernel module with a separate os-wireguard-go variant available for installation to keep the old behaviour
o src: assorted FreeBSD 13 stable fixes for e.g. bpf, bridge, bsdinstall ifconfig, iflib, ipfw, ipsec, lagg, netmap, pf, route and vlan components
o ports: php 8.1.14[11]
o ports: sudo 1.9.12p2[12]

Migration notes, known issues and limitations:

o LibreSSL flavour has been discontinued.  Switch to OpenSSL flavour to proceed with the upgrade.
o StrongSwan IPsec configuration now uses the preferred swanctl.conf instead of the deprecated ipsec.conf which could lead to connectivity issues in ambiguous cases.  Subtle bugs cannot be ruled out as well so please raise an issue on GitHub to be able to investigate each case.
o The new IPsec connections pages and API create an independent set of connections following the design of swanctl.conf.  Legacy tunnel settings cannot be managed from the API and are not migrated.

Stay safe,
Your OPNsense team

[close]

https://opnsense.org/about/about-opnsense/
Titel: IPFire 2.27 - Core Update 173
Beitrag von: SiLæncer am 27 Februar, 2023, 19:00
Release Notes

The first Core Update in 2023 has been released: IPFire 2.27 - Core Update 173. It introduces support for 4G and 5G modems that use the QMI interface, features a kernel fresh from the latest 6.1 stable series, as well as the usual plethora of package updates, security improvements and bug fixes.

IPFire users running 32-bit ARM devices should note that support for this architecture will sunset at the end of this month, and are advised to migrate their installations to a hardware architecture supported by IPFire now. Consequently, this will be the last update released for this architecture.
Introducing QMI support

The Qualcomm MSM Interface is a proprietary interface increasingly used by 4G and 5G cellular modems. Commencing with this Core Update, IPFire supports interacting with such modems, thus significantly expanding its hardware compatibility to QMI-only cellular modems, and providing a faster and more modern interface.

Thanks to Michael for implementing this feature. On that occasion, he also refactored related networking code.
Linux Kernel 6.1.11

Arne has updated the Linux kernel to the most recent stable series, 6.1.11, which has become the new long-term series. Aside from the usual improvements such major kernel updates bring like bug fixes, improved hardware support and security improvements, we took the occasion to bring several new hardening changes to IPFire users:

    System calls permitting processes to read or write other processes' memory are no longer provided by the kernel.
    On EFI systems supporting it, the firmware is now instructed to wipe all memory when rebooting, to hamper cold boot attacks.
    Landlock support has been enabled.
    GCC's "latent entropy" plugin has been disabled, since it does not generate cryptographically secure entropy.
    To cut attack surface, support for both the ACPI configuration file system and obsolete PCMCIA/CardBus subsystem has been removed.
    On 64-bit ARM installations, direct memory access via malicious PCI devices is no longer possible.

Miscellaneous

    The OpenVPN 2FA authenticator will no longer enter an infinite loop if the socket connection to OpenVPN is lost (#12963).
    A user group necessary for interaction between D-Bus and Avahi is now properly created while installing the latter add-on (#13017).
    The OpenVPN GUI has seen minor improvements and cleanups (#13030).
    A bug in the firewall engine permitting the creation of rules with invalid sources has been resolved.
    Input like *.example.com is now properly treated as a wildcard domain by the web interface (#12937).
    libtirpc is now part of the core system, since it is needed as a dependency by lsof (#13015).
    The obsolete spandsp add-on has been dropped.
    Updated packages: Apache 2.4.55, bind 9.16.37, curl 7.87.0, ethtool 6.1, file 5.44, fontconfig 2.14.1, fuse 3.13.0, grep 3.8, harfbuzz 6.0.0, iana-etc 20221226, iproute2 6.1.0, ipset 7.17, iptables 1.8.9, iputils 20221126, iw 5.19, jquery 3.6.3, json-c 0.16, keyutils 1.6.3, knot 3.2.4, krb5 1.20.1, lcms2 2.14, less 608, libarchive 3.6.2, libcap 2.66, libconfig 1.7.3, libffi 3.4.4, libgpg-error 1.46, libidn 1.41, libinih r56, libjpeg 2.1.4, libloc 0.9.16, libmpc 1.3.1, libpcap 1.10.3, libssh 0.10.4, libstatgrab 0.92.1, libtiff 4.5.0, libtool 2.4.7, libusb 1.0.26, libxslt 1.1.37, libyang 2.1.4, linux-firmware 20221214, logrotate 3.21.0, lz4 1.9.4, memtest86+ 6.01, mpfr 4.2.0, nano 7.2, ncurses 6.4, OpenSSH 9.2p1, OpenSSL 1.1.1t, pcre2 10.42, perl-HTML-Parser 3.78, pixman 0.42.2, poppler 23.01.0, psmisc 23.6, rust 1.65, sdl2 2.26.2, shadow 4.13, sqlite 3400100, squid-asnbl 0.2.4 (resolving #13023), strongswan 5.9.9, sudo 1.9.12p2, suricata 6.0.10, xfsprogs 6.1.1, xz 5.4.1
    Updated add-ons: alsa 1.2.8, bird 2.0.11, borgbackup 1.2.3 (resolving #13032), ClamAV 1.0.1, dbus 1.14.4, dnsdist 1.7.3, ghostscript 10.0.0, haproxy 2.7.1, igmpproxy 0.4, iotop 1.22, iperf 2.1.8, iperf3 3.12, libcdada 0.4.0, libexif 0.6.24, libpciaccess 0.17, libshout 2.4.6, libtalloc 2.3.4, libusbredir 0.13.0, libvirt 8.10.0, mc 4.8.29, nfs 2.6.2, nqptp ad384f9, pcengines-apu-firmware 4.17.0.3, python3-packaging 23.0, samba 4.17.4, shairport-sync 4.1.1, strace 6.1, tcpdump 4.99.3, Tor 0.4.7.13

As always, we thank all people contributing to this release in whatever shape and form. Please note IPFire is backed by volunteers, maintaining and improving this distribution in their spare time - should you like what we are doing, please donate to keep the lights on, an consider becoming engaged in development to distribute the load over more shoulders.

[close]

https://www.ipfire.org/
Titel: IPFire 2.27 - Core Update 174
Beitrag von: SiLæncer am 18 April, 2023, 20:00
Release Notes

The next Core Update has been released: IPFire 2.27 - Core Update 174. It is a traditional spring clean release which updates major parts of the core system and comes with a large number of bug fixes throughout.

This update also comes with a number of security patches in Apache, cURL and more, but none of them have been assessed as being exploitable on IPFire. Nevertheless, we intend to bring those updates to all of our users as soon as possible, and encourage speedy installation of Core Update 174.
Updated Toolchain

The "toolchain" includes the most basic parts to build software and consists of GCC as the compiler, Binutils as the assembler and linker, and glibc as the C standard library. They have been updated to their latest versions improving performance for all generated code and fixing bugs.

Although they are not as exciting for our users, they are the building blocks IPFire is founded on and make it the modern, fast and secure distribution that it is.
Bug Fixes

    The OpenVPN CGI will now display the expiry date of certificates.
    Duplicate address issuance by the DHCP server in case of overlapping fixed leases has been corrected (#10629).
    Customizing the Snort/VRT GPLv2 Community IPS ruleset has been fixed (#12948).
    The logs of apcupsd are now accessible through the system log viewer (#12950), as are the logs of the HAProxy add-on (#12922).
    Several CGIs have received CSS cleanups, resulting in better appearance (#13024, #13039).
    The Content-Type header of e-mails generated by the core system itself and various add-ons has been changed from multipart/mixed to multipart/alternative to avoid useless attachment icon display in some MUAs (#13040).
    Faulty CGI behaviour after toggling logging of dropped packages by the IP blocklists firewall component has been fixed (#12979).
    An overly permissive regular expression for parsing unbound log data has been corrected.
    The external traffic status page will now always use the correct interface to display traffic data from.
    efivar is now properly instructed to adjust instructions to the target architecture rather than that of the build host.
    The CPU graph has been redesigned for systems with large numbers of processor cores (#12890).
    Reloading IP blocklists after an update has been fixed (#13072).

Miscellaneous

    rng-tools has been moved from the core system to an add-on (#12900).
    Conversely, perl-TimeDate is now part of the core system, since it became a dependency of the OpenVPN CGI.
    Arne has worked a lot on bringing the RISC-V build up to speed.
    IPFire's trust store has been synced against Mozilla's current trusted CA certificate bundle.
    Useless Qualcomm Bluetooth firmware files are no longer shipped (IPFire dropped Bluetooth support a long time ago due to security reasons), saving a couple of megabytes on new and existing IPFire installations alike.
    Updated packages: apache 2.4.56, apr 1.7.2, bind 9.16.38, binutils 2.40, boost 1.81.0, curl 7.88.1, elinks 0.16.0, ethtool 6.2, freetype 2.13.0, gcc 12.2.0, glibc 2.37, gnutls 3.8.0, grep 3.9, harfbuzz 7.0.1, intel-microcode 20230214, iproute2 6.2.0, libtirpc 1.3.3, liburcu 0.14.0, linux-firmware 20230210, lmdb 0.9.30, logwatch 7.8, lsof 4.98.0, pango 1.50.13, poppler 23.03.0, poppler-data 0.4.12, qpdf 11.3.0, rust 1.67.0, squid 5.8, strongswan 5.9.10 (fixes CVE-2023-26463, which is not exploitable on IPFire unless heavily customized IPsec connections have been configured using the CLI rather than the IPsec web interface), sudo 1.9.13p3, tzdata 2022g, wireless-regdb 2023-02-12, zstd 1.5.4
    Updated add-ons: cups 2.4.2, dbus 1.14.6, epson-inkjet-printer-escpr 1.7.23, fetchmail 6.4.36, HAProxy 2.7.4, htop 3.2.2, make 4.4.1, monit 5.33.0, pcengines-apu-firmware 4.19.0.1, python3-setuptools 67.5.1, samba 4.17.5

[close]

https://www.ipfire.org/
Titel: IPFire 2.27 - Core Update 175
Beitrag von: SiLæncer am 12 Juni, 2023, 19:00
Release Notes

Finally, the next update, IPFire 2.27 - Core Update 175, has been released! It updates OpenSSL to the 3.1 branch, features a kernel update as well as a large number of package updates and a variety of bug fixes.

Before we start talking about the changes in detail, we would like to ask for your support. This update has taken a lot of effort to put together and we can't do it without you. So please, if you can, donate to the project helping us to put more resources to bring you more and better updates. It is very much appreciated by all of us here!

OpenSSL 3.1.1

IPFire heavily relies on cryptography which is being implemented by OpenSSL - a library that brings lots of cryptographic primitives and so on. Keeping it up to date is essential for the development team.

Since this release is bringing a major update to OpenSSL 3.1.1 with lots of API changes, a lot of work was necessary under the hood. I would like to highlight that Adolf from our team has been working a lot of overtime to finally get lots of problems especially with OpenVPN resolved (#13137, #13138).

To avoid breaking any custom software IPFire users may run on their installations, OpenSSL 1.1.1's files remain untouched on existing installations until the release of Core Update 176. However, please note that OpenSSL 1.1.1 is scheduled for end of life on September 11, 2023, and ensure any custom changes are made compatible to OpenSSL 3.1.x as soon as possible.

Linux 6.1.30

This Core Update features an update of the Linux kernel. Aside from the usual heap of hardware support improvements, bug fixes, and other improvements, this fixes CVE-2023-32233, a flaw in Linux' Netfilter subsystem permitting local privilege escalation; IPFire installations properly kept up-to-date are thus not considered to be affected. Nevertheless, IPFire users are advised to install Core Update 175 as soon as possible once released, and reboot their systems afterwards.

The kernel now also supports the Armada 38X RTC (#12856) and Intel's XHCI USB Role Switch feature. In addition, IPFire now supports both the OrangePi R1 Plus LTS and NanoPi R2C (plus) SoC.

Miscellaneous

    The hostapd add-on now enables QCA vendor extensions to nl80211, improving performance and stability of WiFi networks provided by an IPFire system with Qualcomm and Atheros cards considerably.
    Legacy firewall rules for PPPoE/PPTP have been dropped, since they are no longer needed, and pose a security risk to IPFire installations with QMI enabled.
    In addition, any bogon filtering has been adjusted to no longer interfere with 224.0.0.0/4, used for multicasting services, such as IPTV.
    rsnapshot has been contributed by Gerd Hoerst and Jon Murphy as a new add-on.
    Downloading large backup files will no longer trigger the OOM killer (#13096).
    The size of the boot partition has been extended to 512 MBytes, which is XFS' minimum requirement.
    Firmware files for APU1 boards are now provided again, to ensure firmware-update can update even very outdated APU boards properly.
    The powertop add-on has been removed, since it requires kernel functionalities which have been disabled due to security concerns in Core Update 171.
    CUPS' HTTPS websites are now properly accessible again (#12924).
    The dbus add-on is now properly terminated after uninstallation (#13094).
    Robin Roevens contributed a patch for displaying the logs crated by Zabbix Agent in IPFire's web interface.
    Installation and removal procedure of the alsa add-on have seen notable improvements (#13087).
    FUSE mounts in BorgBackup are now working properly again (#13076).
    Updated packages: acpid 2.0.34, apache 2.4.57, apr 1.7.4, aprutil 1.6.3, arping 2.23, automake 1.16.5, bash 5.2 (with patches 1 to 15), bind 9.16.39, grep 3.10, harfbuzz 7.2.0, iproute2 6.3.0, libcap 2.67, libgcrypt 1.10.2, libgpg-error 1.47, libhtp 0.5.43, libpcap 1.10.4, libxml2 2.11.1, linux-firmware 20230404, lvm2 2.03.21, memtest86+ 6.10, newt 0.52.23, OpenSSH 9.3p1, parted 3.6, pciutils 3.9.0, slang 2.3.3, sqlite 3410200, Squid 5.9, Suricata 6.0.12, tzdata 2023b, unbound 1.17.1, xfsprogs 6.2.0, zstd 1.5.5
    Updated add-ons: 7zip 17.05, alsa 1.2.9, amazon-ssm-agent 3.2.582.0, aws-cli 1.27.100, bird 2.0.12, ClamAV 1.1.0, dnsdist 1.8.0, elfutils 0.189, ffmpeg 6.0, freeradius 3.0.26, ghostscript 10.01.1, nfs 2.6.3, opus 1.4, pmacct 1.7.8, Postfix 3.8.0, rng-tools 2.16, samba 4.18.1, sdl2 2.26.5, tcpdump 4.99.4, zabbix_agentd 6.0.16 (LTS)

[close]

https://www.ipfire.org/
Titel: IPFire 2.27 - Core Update 176
Beitrag von: SiLæncer am 12 Juli, 2023, 11:00
Release Notes

We are pleased to announce the release of IPFire 2.27 - Core Update 176. It features a large amount of package updates which include a security fixed and updated microcode for Intel processors as well as a couple of bug fixes.

Before we start talking about the changes in detail, we would like to ask for your donation. We have put a lot of effort into building and testing this update and could not do any of this without you. Please, if you can, donate to the project helping us to put more resources to bring you more and better updates. It is very much appreciated by all of us here!

Bug Fixes

    An edge case related to bug #13138, which caused IPsec root/host certificate generation to fail on the first attempt only, has been fixed.
    While editing OpenVPN static IP address pools, spaces are now handled correctly again (#13136).
    udev rules for LVM volumes have been fixed, allowing for configured LVM volumes to start properly on boot again (#13151).
    Remove entries for additional mass storage via the web interface of the ExtraHD add-on have been fixed, partially resolving #12863.

Miscellaneous

    Filesystem journal features are now always enabled for cloud images, and as soon as a disk with SMART support is detected.
    misc-progs, the safety net between IPFire's web interface and the core system, have been improved under the hood to allow for better return code enumeration.
    Stéphane Pautrel has contributed improvements to the French translation of IPFire's web interface.
    Updated packages: curl 8.1.0, dhcpcd 10.0.1, diffutils 3.9, ed 1.19, ethtool 6.3, freetype 2.13.1, gawk 5.2.2, gcc 13.1.0, gdb 13.2, go 1.20.4, grep 3.11, harfbuzz 7.3.0, intel-microcode 20230613, less 633, libcap 2.69, libhtp 0.5.44, man 2.11.2, nettle 3.9, pam 1.5.3, pciutils 3.10.0, procps 4.0.3, sqlite 3420000, strongswan 5.9.11, suricata 6.0.13, texinfo 7.0.3, whois 5.5.17
    Updated add-ons: CUPS 2.4.6, fping 5.1, minidlna 1.3.2, nginx 1.24.0, Postfix 3.8.1, strace 6.3, stress 1.0.7, stunnel 5.69, transmission 4.0.3, wavemon 0.9.4

Please reboot your system after installing this update if you are running on an Intel processor.

[close]

https://www.ipfire.org/
Titel: OPNsense 23.7
Beitrag von: SiLæncer am 02 August, 2023, 19:00
Changelog


o system: use parse_url() to validate if the provided login redirect string is actually parseable to prevent redirect
o system: fix assorted PHP 8.2 deprecation notes
o system: fix assorted permission-after-write problems
o system: introduce a gateway watcher service and fix issue with unhandled "loss" trigger when "delay" is also reported
o system: enabled web GUI compression (contributed by kulikov-a)
o system: disable PHP deprecation notes due to Phalcon emitting such messages breaking the API responses
o system: allow "." DNS search domain override
o system: on boot let template generation wait for configd socket for up to 10 seconds
o system: do not allow state modification on GET for power off and reboot actions
o system: better validation and escaping for cron commands
o system: better validation for logging user input
o system: improve configuration import when interfaces or console settings do not match
o system: name unknown tunables as "environment" as they could still be supported by e.g. the boot loader
o system: sanitize $act parameter in trust pages
o system: add severity filter in system log widget (contributed by kulikov-a)
o system: mute openssl errors pushed to stderr
o system: add opnsense-crypt utility to encrypt/decrypt a config.xml
o system: call opnsense-crypt from opnsense-import to deal with encrypted imports
o interfaces: extend/modify IPv6 primary address behaviour
o interfaces: fix bug with reported number of flapping LAGG ports (contributed by Neil Greatorex)
o interfaces: introduce a lock and DAD timer into newwanip for IPv6
o interfaces: rewrite LAGG pages via MVC/API
o interfaces: allow manual protocol selection for VLANs
o interfaces: remove null_service toggle as empty service name in PPPoE works fine
o interfaces: on forceful IPv6 reload do not lose the event handling
o interfaces: allow primary address function to emit device used
o firewall: move all automatic rules for interface connectivity to priority 1
o firewall: rewrote group handling using MVC/API
o firewall: clean up AliasField to use new getStaticChildren()
o firewall: "kill states in selection" button was hidden when selecting only a rule for state search
o firewall: cleanup port forward page and only show the associated filter rule for this entry
o captive portal: safeguard template overlay distribution
o dhcp: rewrote both IPv4 and IPv6 lease pages using MVC/API
o dhcp: allow underscores in DNS names from DHCP leases in Dnsmasq and Unbound watchers (contributed by bugfixin)
o dhcp: align router advertisements VIP code and exclude /128
o dhcp: allow "." for DNSSL in router advertisements
o dhcp: print interface identifier and underlying device in "found no suitable address" warnings
o firmware: opnsense-version: remove obsolete "-f" option stub
o firmware: properly escape crash reports shown
o firmware: fix a faulty JSON construction during partial upgrade check
o firmware: fetch bogons/changelogs from amd64 ABI only
o ipsec: add missing config section for HA sync
o ipsec: add RADIUS server selection for "Connections" when RADIUS is not defined in legacy tunnel configuration
o ipsec: only write /var/db/ipsecpinghosts if not empty
o ipsec: check IPsec config exists before use (contributed by agh1467)
o ipsec: fix RSA key pair generation with size other than 2048
o ipsec: deprecating tunnel configuration in favour of new connections GUI
o ipsec: clean up SPDField and VTIField types to use new getStaticChildren()
o ipsec: add passthrough networks when specified to prevent overlapping "connections" missing them
o monit: fix alert script includes
o openvpn: rewrote OpenVPN configuration as "Instances" using MVC/API available as a separate configuration option[2]
o openvpn: rewrote client specific overrides using MVC/API
o unbound: rewrote general settings and ACL handling using MVC/API
o unbound: add forward-tcp-upstream in advanced settings
o unbound: move unbound-blocklists.conf to configuration location
o unbound: add database import/export functions for when DuckDB version changes on upgrades
o unbound: add cache-max-negative-ttl setting (contributed by hp197)
o unbound: fix upgrade migration when database is not enabled
o unbound: minor endpoint cleanups for DNS reporting page
o wizard: restrict to validating only IPv4 addresses
o backend: minor regression in deeper nested command structures in configd
o mvc: fill missing keys when sorting in searchRecordsetBase()
o mvc: properly support multi clause search phrases
o mvc: allow legacy services to hook into ApiMutableServiceController
o mvc: implement new Trust class usage in OpenVPN client export, captive portal and Syslog-ng
o mvc: add generic static record definition for ArrayField
o ui: introduce collapsible table headers for MVC forms
o plugins: os-acme-client 3.18[3]
o plugins: os-bind 1.27[4]
o plugins: os-dnscrypt-proxy 1.14[5]
o plugins: os-dyndns removed due to unmaintained code base
o plugins: os-frr 1.34[6]
o plugins: os-firewall 1.3 allows floating rules without interface set (contributed by Michael Muenz)
o plugins: os-telegraf 1.12.8[7]
o plugins: os-zabbix62-agent removed due to Zabbix 6.2 EoL
o plugins: os-zabbix62-proxy removed due to Zabbix 6.2 EoL
o src: axgbe: enable RSF to prevent zero-length packets while in Netmap mode
o src: axgbe: only set CSUM_DONE when IFCAP_RXCSUM enabled
o src: ipsec: add PMTUD support
o src: FreeBSD 13.2-RELEASE[8]
o ports: krb 1.21.1[9]
o ports: nss 3.91[10]
o ports: phalcon 5.2.3[11]
o ports: php 8.2.8[12]
o ports: py-duckdb 0.8.1
o ports: py-vici 5.9.11
o ports: sudo 1.9.14p3[13]
o ports: suricata now enables Netmap V14 API

Migration notes, known issues and limitations:

o The Unbound ACL now defaults to accept all traffic and no longer generates automatic entries.  This was done to avoid connectivity issues on dynamic address setups -- especially with VPN interfaces.  If this is undesirable you can set it to default to block instead and add your manual entries to pass.
o Dpinger no longer triggers alarms on its own as its mechanism is too simplistic for loss and delay detection as provided by apinger a long time ago.  Delay and loss triggers have been fixed and logging was improved.  The rc.syshook facility "monitor" still exists but is only provided for compatibility reasons with existing user scripts.
o IPsec "tunnel settings" GUI is now deprecated and manual migration to the "connections" GUI is recommended.  An appropriate EoL announcement will be made next year.
o The new OpenVPN instances pages and API create an independent set of instances more closely following the upstream documentation of OpenVPN.  Legacy client/server settings cannot be managed from the API and are not migrated, but will continue to work independently.
o The old DynDNS plugin was removed in favor of the newer MVC/API plugin for ddclient.  We are aware of the EoL state of ddclient which was unfortunately announced only one year after we started working on the new plugin.  We will try to add upstream fixes that have not been released yet and already offer our own ddclient-less Python backend in the same plugin as an alternative.

[close]

https://opnsense.org/about/about-opnsense/
Titel: IPFire 2.27 - Core Update 178
Beitrag von: SiLæncer am 14 August, 2023, 20:00
Release Notes

The next Core Update is available for testing: IPFire 2.27 - Core Update 178 which includes kernel and microcode fixes to mitigate vulnerabilities in Intel and AMD processors.

Intel

    Downfall attacks target a critical weakness found in billions of modern processors used in personal and cloud computers. This vulnerability, identified as CVE-2022-40982, enables a user to access and steal data from other users who share the same computer. For instance, a malicious app obtained from an app store could use the Downfall attack to steal sensitive information like passwords, encryption keys, and private data such as banking details, personal emails, and messages. Similarly, in cloud computing environments, a malicious customer could exploit the Downfall vulnerability to steal data and credentials from other customers who share the same cloud computer.

AMD

    Inception (CVE-2023-20569) is a novel transient execution attack that leaks arbitrary data on all AMD Zen CPUs in the presence of all previously deployed software- and hardware mitigations. As in the movie of the same name, Inception plants an “idea” in the CPU while it is in a sense “dreaming”, to make it take wrong actions based on supposedly self conceived experiences. Using this approach, Inception hijacks the transient control-flow of return instructions on all AMD Zen CPUs.

    Phantom (CVE-2022-23825) enables an attacker to create a transient window at arbitrary instructions. Suddenly, a seemingly harmless XOR instruction can behave like a call instruction, and allow the attacker to create a transient window.

How is IPFire affected?

IPFire is not directly affected by any of these attacks as the firewall never executes untrusted code. All programs on IPFire come from our package management system which signs all updates. However, it might be possible for an attacker to inject any code remotely by some undiscovered vulnerability and using these CPU vulnerabilities might allow the attacker to create more damage. Therefore, we recommend to install this update as soon as possible and to reboot your firewall.

This update has been added into the regular release cycle of IPFire. A previous version of Core Update 178 has been moved to 179 and users who installed the previous update from the unstable tree should reinstall this update once again to receive all fixes.

[close]

https://www.ipfire.org/
Titel: IPFire 2.27 - Core Update 179
Beitrag von: SiLæncer am 26 September, 2023, 18:00
Release Notes

It is time to upgrade your systems to IPFire 2.27 - Core Update 179. It will bring you Indirect Brand Tracking in user space in order to better mitigate any injected code, a completely rewritten ExtraHD and a large number of package updates & the usual bunch of bug fixes.

But before we start talking about the changes in detail, we would like to take a moment and ask for your donation. We put a lot of effort into building and testing this update and could not do any of this without your donation. Please, donate to the project helping us to put more resources to bring you more and better updates. It is very much appreciated by all of us here!
Indirect Branch Tracking for User Space

This technology uses a CPU extension which (if available) will check if a program returns from a function or jump correctly. If not, for example in case of injected code, an exception is being raised and the program is being terminated.

This is a follow-up after hardening our kernel against the same attack vector in Core Update 177 and had to be split off to keep updates an easier to handle smaller size.

ExtraHD

This feature that allows mounting any extra storage into IPFire has been entirely rewritten. The code was hard to extend and some smaller issues became hard to fix which resulted in us making the decision for a rewrite. It should now be a lot more robust and easy to use.

Misc.

    An issue where connected OpenVPN clients were shown disconnected (#13190)
    A non-critical validation error of location group names as been fixed.
    Package updates: cURL 8.2.1, eudev 3.2.12, fmt 10.0.0, freefont 20100919, fuse 3.15.0, glib 2.77.0, GNU Gettext 0.22, GMP 6.3.0, groff 1.23.0, harfbuzz 8.1.1, libarchive 3.7.0, libxcrypt 4.4.36, libxml2 2.11.4, LVM2 2.03.22, meson 1.2.0, mpfr 4.2.0p12, ninja 1.11.1, ntfs-3g 2022.10.3, rpcsvc-proto 1.4.4, oauth-toolkit 2.6.9, OpenLDAP 2.6.5, openjpeg 2.5.0, OpenSSL 3.1.2, popt 1.19, poppler 23.08.0, PPP 2.5.0, qpdf 11.5.0, SDL2 2.28.1, smartmontools 7.4, suricata 6.0.14, GNU tar 1.35, xfsprogs 6.4.0, XZ 5.4.4
    Samba has UNIX filesystem extensions disabled by default now (#13193)
    Updated add-ons: ebtables 2.0.11, FreeRADIUS 3.2.3, FRR 8.5.2, Git 2.41.0, HAProxy 2.8.1, hplip 3.23.5, MPD 0.23.13, ncat 7.94, nmap 7.94, Observium Agent 23.1, oci-cli 3.29.4, oci-python-sdk 2.107.0, QEMU + Guest Agent 8.0.3, Zabbix Agent 6.0.19 (LTS)
    The sox package has been dropped as it is only useful in combination with Asterisk which has been dropped some while ago

As always, we thank all people contributing to this release.

[close]

https://www.ipfire.org/
Titel: IPFire 2.27 - Core Update 180
Beitrag von: SiLæncer am 14 Oktober, 2023, 20:00
Release Notes

It is time for another update for your most favourite firewall: IPFire 2.27 - Core Update 180 is out - coming with an updated toolchain, a large number of package updates, deprecation for ReiserFS as well as a number of bug and security fixes.
Toolchain Update

IPFire has been rebased on the latest version of the GNU toolchain comprising of glibc 2.38, GCC 13.2.0 & binutils 2.41. This allows us to keep IPFire modern, taking advantage of the latest advances in hardware support and acceleration, but most importantly use the latest hardening technologies available to us.
ReiserFS Deprecation

The Linux kernel maintainers have deprecated support for ReiserFS.

This filesystem has been available for installation in IPFire in the past, but we have removed the option to create new systems in Core Update 167. Therefore we do not expect many people to be using this on IPFire. If you do, you will see a warning on the web console that will warn you about using ReiserFS. Unfortunately, you will need to backup your system and perform a reinstall with a different filesystem, and finally restore the backup.

If you don't use see the warning, you ware using a different filesystem and no action is required.
Misc.

    cURL has been patched against a heap buffer overflow (CVE-2023-38545)
    Package updates: bind 9.16.44, Boost 1.83.0, dhcpcd 10.0.2, freetype 2.13.2, gzip 1.3, hwdata, iana-etc 20230810, json-c 0.17, krb5 1.21.2, libedit 20230828-3.1, libgudev 238, libtiff 4.5.1, libnl-3 3.8.0, mpfr 4.2.1, OpenSSH 9.4p1, procps 4.0.4, sqlite 3.43.0, squid 6.3, tcl 8.6.13, tzdata 2023c, unbound 1.18.0, util-linux 2.39.2, wireless-regdb 2023-05-03, vnstat 2.11, wget 1.21.4, whois 5.5.18, zlib 1.3
    Updated add-ons: bacula 11.0.6, clamav 1.2.0, foomatic 4.0.13, Git 2.42.0, mc 4.8.30, ncdu 1.18.1, samba 4.19.0, SDL 2.28.3, Tor 0.4.8.5, traceroute 2.1.2, transmission 4.0.4, xinetd 2.3.15.4, zabbix-agent 6.0.21
    Jonatan Schlag cleaned up some no longer used functionality from the network scripts
    wtmp files are now rotated monthly, keeping them for one year

Although this change log does not read very long, the update is a large step and moves IPFire forward to become an even better firewall. If you would like to support us, please donate!

[close]

https://www.ipfire.org/
Titel: IPFire 2.27 - Core Update 181
Beitrag von: SiLæncer am 25 November, 2023, 12:00
Release Notes

Happy Thanksgiving! Today, we are releasing the latest update for IPFire as our special Black Friday gift for you. It comes with a large number of security updates in OpenSSL, Suricata, Apache & Samba as well as a number of kernel fixes.

If you haven't spent all your money on all the great Black Friday offers, maybe consider making a donation to IPFire today. It helps us to bring you these updates more frequently and allows us to pack more exciting things into them. If you would like to support us, please donate today!

Under The Hood

This update features yet another kernel update based on Linux 6.1.61. It brings various security & stability fixes as well as improving IOMMU handling on ARM. To improve security, we have followed Google and disabled io_uring for the time being as it seems to have a lot of security issues.

We have also switched from eudev to the upstream udev which is now part of systemd as eudev is no longer maintained and was lagging behind upstream.

Security Updates

    OpenSSL 3.1.4: The OpenSSL project announced a security vulnerability (CVE-2023-5363)
    suricata 6.0.15: This update patches a potential denial-of-service vulnerability in the MIME decoder
    Apache 2.4.58 patches a number of security issues in the HTTP/2.0 engine (CVE-2023-45802, CVE-2023-43622 & CVE-2023-31122)
    Samba 4.19.2: Various security issues have been fixed which could be exploited to cause data loss and elevate privileges (CVE-2023-3961, CVE-2023-4091, CVE-2023-4154, CVE-2023-42669 & CVE-2023-42670)

Misc.

    A long standing issue in OpenVPN has been fixed where the web UI offered to download a configuration package in an incorrect format when no password was configured (#11048)
    Other package updates: lynis 3.0.9, Postfix 3.8.2, sysvinit 3.08, Tor 0.4.8.7, Zabbix Agent 6.0.22

[close]

https://www.ipfire.org/
Titel: IPFire 2.29 - Core Update 184
Beitrag von: SiLæncer am 15 März, 2024, 19:00
Release Notes

We are celebrating the next release of IPFire: Version 2.29 - Core Update 184. This release comes with a number of improvements around the entire operating system and a large number of packages updates. Although this change log isn't the longest, this update packs a lot of important changes and we recommend to install while it is still hot!

If you like to support the developers, please donate. It really helps a lot to keep you bringing these updates and making IPFire a little bit better every day!

What's in it?

    Intrusion Prevention System: Suricata has been updated to version 6.0.16 which fixes a number of vulnerabilities
    It is now possible to individually enable logging for packets from and to hostile networks. This allows for easier monitoring of compromised systems on the local network without a lot of noise from portscans and similar things from the Internet. They are also graphed individually in the firewall hits graph.
    A bug has been fixed in the installer: The process now fails if the boot loader could not be installed, when before, the installation completed successfully but left a newly installed system unbootable.
    Updated packages: acl 2.3.2, attr 2.5.2, bash 5.2.26, BIND 9.16.48, dhcpcd 10.0.6, diffutils 3.10, dmidecode 3.5, ed 1.20, expat 2.6.0 (CVE-2023-52425, CVE-2023-52426), file 5.45, fmt 10.2.1, gettext 0.22.4, GnuTLS 3.8.3 (CVE-2024-0553, CVE-2024-0567), help2man 1.49.3, iana-etc 20240125, iproute2 6.7.0, ipset 7.19, iputils 20240117, libhtp 0.5.46, libidn 1.42, libpng 1.6.41, libtalloc 2.4.1, libyang 2.1.148, lvm2 2.03.23, lzip 1.24, memtest86+ 7.0.0, PAM 1.6.0, pixman 43.0, poppler 24.01.0, readline 8.2.10, shadow 4.14.3, SQLite 3.45.1, squid 6.7, suricata 6.0.16, unbound 1.19.1 (CVE-2023-50387 & CVE-2023-50868), vnstat 2.12, xz 5.4.6, zlib 1.3.1

Add-ons

    Updated add-ons: bird 2.14, borgbackup 1.2.7 (CVE-2023-36811), FRR 9.1 (CVE-2023-47235, CVE-2023-47235), HAProxy 2.9.2, libvirt 10.0.0 (CVE-2023-3750), lshw B.02.00, mc 4.8.31, stunnel 5.71, transmission 4.0.5, VDR 2.6.6 + Plugins, wavemon 0.9.5
    mympd is a new package which provides a web user interface to mpd

[close]

https://www.ipfire.org/
Titel: IPFire 2.29 - Core Update 185
Beitrag von: SiLæncer am 18 April, 2024, 10:00
Release Notes

This update is another testing version for IPFire: It comes with the brand release of the IPFire IPS, a number of bug fixes across the entire system and a good amount of package updates. Test it while it's still hot!
Suricata 7 - Intrusion Prevention System

Finally, Suricata 7 is here. A new major version of what the IPFire IPS is based on. It finally brings support for HTTP/2 which is no longer considered experiental and now supports deflate compression and byte-ranges. There are new keywords for HTTP header inspection, and support for handling TLS client certificates, support for IKEv1, the PostgreSQL protocol, a BitTorrent parser, and last but not least QUICv1 and GQUIC. Suricata is also locking itself down more using Linux Landlocked to prevent any damage in case the process could be exploited; and the developers have spent time to make it slightly more memory efficient.

From abuse.ch, we have added the ThreatFox Indicators Of Compromise Rules. Those rules help to identify any local hosts that might have been compromised by detecting traffic to for example botnets. The PT Attack and Secureworks rulesets have been dropped as they are no longer available.

Toolchain Update

IPFire has been rebased on glibc 2.39 - the C standard library and binutils 2.42. IPFire is also now being compiled with the highest set of source fortification -D_FORTIFY_SOURCE=3. That means, that the compiler is adding compile time and runtime checks to avoid common errors like buffer overruns and overflows and so any undetected security vulnerabilities will be harder to exploit. Finally, we are now compiling the system with less debugging information which we don't need which slightly speeds up the compilation process.

Misc.

    OpenVPN

        Previously, the UI allowed creating certificates with a common name that was already in use (#13404)
        Imported net-to-net connections did not show correctly whether the certificate was password-protected (#13548)
        The OpenSSL configuration file has been cleaned up (#13595)
    The time server configuration page is now showing the current system time
    Custom DHCP options of type "integer 8" are now possible to configure (#12395)
    Comments have sometimes been incorrectly encoded to ISO-8859-1 which broke Umlauts and other special and non-ASCII characters

    Intel has published microcode updates for various of their processors to fix or mitigate the following security vulnerabilities:

        INTEL-SA-00972
        INTEL-SA-00982
        INTEL-SA-00898
        INTEL-SA-00960
        INTEL-SA-01045

    The CA certificate bundle has been updated
    Some basic functions of the initscripts have been cleaned up and enhanced to write shorter scripts
    Updated packages: elfutils 0.191, ethtool 6.7, expat 2.6.2, knot 3.3.5, libffi 3.4.6, libpng 1.6.42, libplist 2.4.0, libgpg-error 1.48, intel-microcode 20240312, iproute2 6.8.0, meson 1.4.0, newt 0.52.24, OpenJPEG 2.5.2, OpenSSH 9.7p1, pango 1.52.0, pciutils 3.11.1, pixman 0.43.4, poppler 24.03.0, qpdf 11.9.0, shadow 4.15.0, SQLite 3.45.2, squid 6.8, Suricata 7.0.3, Tcl 8.6.14, Unbound 1.19.3, util-linux 2.39.3, wget 1.24.5, whois 5.5.21, xz 5.6.1

Add-Ons

    wsdd is a service that implements the Web Service Discovery protocol for Windows. This enables clients from Windows 10 or older to discover any file shares exported by the Samba service. It will be automatically installed on all machines that run Samba. (#13445)
    Updated packages: ClamAV 1.3.0, dnsdist 1.9.1, GDB 14.2, Ghostscript 10.03.0, Git 2.44.0, gptfdisk 1.0.10, libmpdclient 2.22, mpc 0.35, mpd 0.23.15, mympd 14.1.0, opus 1.5.1, Samba 4.19.5, SDL 2.30.1, Zabbix Agent 6.0.24 (LTS)
    Entries to the IPFire web UI menu have been added for VDR and transmission if installed

[close]

https://www.ipfire.org/