DVB-Cube BETA <<< Das deutsche PC und DVB-Forum >>>

PC-Ecke => # Security Center => Software (PC-Sicherheit) => Thema gestartet von: SiLæncer am 05 Juli, 2010, 13:23

Titel: Firewall-Distributionen diverses
Beitrag von: SiLæncer am 05 Juli, 2010, 13:23
Jan Paul Tuecking hat die sofortige Verfügbarkeit der speziellen Linux-Distribution IPFire 2.7 angekündigt. Das System dient als Firewall.
Wie in der Ankündigung zu lesen gibt es vorerst nur ISO-Abbilder von IPFire 2.7. Die Updates via Pakfire sollen am kommenden Freitag zur Verfügung stehen. Als Grund geben die Entwickler an, dass man die IPSec-Software von OpenSwan zu StrongSwan umgestellt hat. Somit seien Veränderungen in der Konfiguration von net2net-Verbindungen unabdingbar.

Die neue Version von IPFire enthält laut eigener Aussage ungefähr 400 Änderungen. Unter anderem wurden OpenSSL und dem Linux-Kernel Updates spendiert. Interessierte können die Firewall-Distribution aus dem Download-Bereich (http://www.ipfire.org/en/download) der Projektseite herunterladen.

Quelle : www.tecchannel.de
Titel: IPFire 2.9 Core 52 ist veröffentlicht
Beitrag von: SiLæncer am 19 September, 2011, 13:17
Die Entwickler von IPFire haben Update Nummer 52 für die zweite Serie der Firewall-Distribution zur Verfügung gestellt.

Core Update 52 von IPFire 2.9 adressiert diverse Sicherheits-Probleme im Zusammenhang mit dem Webproxy-Dienst und dem Apache Webserver. Ebenso wird die Sprache Russisch unterstützt und es kamen kleinere Funktionen hinzu. Die Entwickler empfehlen ein baldiges Update. Administratoren sollten im Hinterkopf behalten, dass beide Dienste bei einem Update neu gestartet werden.

Neu mit an Bord befinden sich die Pakete Squid 3.1.15, Apache 2.2.20 und ethtool 3.0. Interessierte finden weitere Informationen in der offiziellen Ankündigung (http://www.ipfire.org/news/ipfire-2-9-core-update-52-released) oder dem umfangreichen Changelog (http://git.ipfire.org/?p=ipfire-2.x.git;a=shortlog;h=refs/heads/core52).


Quelle : www.tecchannel.de
Titel: pfSense 2.0 erschienen
Beitrag von: SiLæncer am 21 September, 2011, 09:29
pfSense (http://www.pfsense.org/) ist eine freie Distribution für den Einsatz als Firewall und Router. Es beruht auf FreeBSD und enthält ein Paketsystem zur Installation von Erweiterungen. Das Projekt begann 2004 als Abspaltung von m0n0wall, zielt aber eher auf die Installation auf PCs denn auf eingebettete Hardware. Trotzdem bietet pfSense auch ein Image an, das auf Compact-Flash-Medien installiert werden kann.

Die neue Version 2.0 von pfSense war über drei Jahre in Entwicklung und bringt zahlreiche neue Funktionen. Version 2.0 beruht auf FreeBSD 8.1, das bereits über ein Jahr alt ist. Zu den Neuerungen gehören GRE- und GIF-Tunnels, Unterstützung von 3G, Modems und Multi-Link PPP (MLPPP), Gruppierung von Netzwerkschnittstellen, virtuelle IP-Adressen, Gateways, neuer Traffic-Shaper, Protokollfilterung auf Schicht 7, erweiterte NAT-Funktionalität, eine verbesserte und zentralisierte Benutzerverwaltung, eine neue Zertifikatsverwaltung, Unterstützung von Radius und LDAP in OpenVPN, Captive Portal und vieles mehr. Die Einzelheiten können in der Übersicht über die Änderungen (http://doc.pfsense.org/index.php/2.0_New_Features_and_Changes) nachgelesen werden.

pfSense wird über eine Weboberfläche verwaltet, eine Shell steht ebenfalls zur Verfügung. Das System bietet zahlreiche weitere Funktionen, und mehrere pfSense-Systeme können parallel eingesetzt werden, um Lastausgleich und Ausfallsicherheit zu garantieren. pfSense ist nach Angaben der Entwickler sehr populär und besitzt eine breite Unterstützerbasis aus der Gemeinschaft. Die neue Version 2.0 soll bei einigen Kunden bereits länger im Produktivbetrieb laufen und sich durch Stabilität auszeichnen. Zum Download stehen 32- und 64-Bit-x86-Varianten als ISO-, USB- oder VMware-Image bereit.

Quelle : www.pro-linux.de
Titel: Firewalldistri IPCop 2.0 mit OpenVPN
Beitrag von: SiLæncer am 24 September, 2011, 13:28
Das IPCop-Team hat seine ressourcenschonende Router- und Firewall-Distribution in der Version 2.0 veröffentlicht. IPCop läuft bereits auf betagten 486ern, erfordert mindestens 32 MB Ram und zwei Netzwerkschnittstellen.

(http://www.pro-linux.de/images/NB3/imgdb/o_bootmenu-ipcop.jpg)
IPCop 2.0 (http://sourceforge.net/mailarchive/message.php?msg_id=28131816) basiert auf einem Kernel 2.6.32 und nutzt IPtables, um Netzwerkpakete zuzulassen oder zu blockieren. Mittels OpenVPN 2.2.1 offerieren die Entwickler eine Alternative zum komplex zu konfigurierenden IPSec, mit der Anwender eigene virtuelle private Netze (VPNs) betreiben können. IPCop 2.0 verwendet andere Ports als die Vorgängerversionen. So ist die HTTPS-Weboberfläche nun auf Port 8443 zu erreichen und der SSH-Server lauscht auf Port 8022. Die Weboberfläche verfügt über einen neuen Scheduler, neue Punkte im Statusmenü für Systeminfo, Traffic-Erfassung und IPtables sowie neue Seiten für den Zeitserver ntpd, den Web-Proxy Squid 3.1.15 und den DHCP-Server DNSMasq 2.57, der DHCPD ersetzt.

Die neue IPCop-Version unterstützt Cobalt-, Sparc- und PPC-Plattformen und bietet einen überarbeiteten Installer, um die Distribution auf Festplatten oder Flash-Speicher zu installieren. Das Intrusion Detection System Snort ist nicht mehr standardmäßig enthalten und soll später als Erweiterung angeboten werden.

Die Router- und Firewall-Distribution IPCop existiert seit 2001 und steht unter der GPL. Die aktuelle Version 2.0 ist für x86-Architekturen auf Sourceforge.net als Download (http://sourceforge.net/projects/ipcop/files/IPCop/IPCop%202.0.0/ipcop-2.0.0-install-cd.i486.iso) verfügbar.

Quelle : www.pro-linux.de
Titel: IPCop 2.0.3
Beitrag von: SiLæncer am 15 Februar, 2012, 21:30
Infos zu dieser Version: Klick (http://marc.info/?l=ipcop-announce&m=132923114103045&w=2)

http://www.ipcop.org/
Titel: IPCop 2.0.4
Beitrag von: SiLæncer am 17 Februar, 2012, 06:40
Infos zu dieser Version : Klick (http://marc.info/?l=ipcop-announce&m=132940888132749&w=2)

http://www.ipcop.org/
Titel: Linux-Firewall-Distribution IPFire startet Wunschliste
Beitrag von: SiLæncer am 13 November, 2012, 16:40
Die Linux-Firewall-Distribution IPFire ermöglicht es ab sofort Spendern, die Entwicklung von neuen Funktionen für das System gezielt zu fördern.

IPFire ist eine leicht installierbare Firewall, die es laut den Entwicklern problemlos mit Smoothwall, IPCop oder der Endian-Firewall aufnehmen kann. Sie soll sich mit wenigen Tastenklicks konfigurieren lassen und ist durch diverse Addons, beispielsweise Samba, Cups, FTP und NFS, Asterisk und Multimedia, zu einem Server erweiterbar.

Der ganze Artikel (http://www.pro-linux.de/news/1/19108/linux-firewall-distribution-ipfire-startet-wunschliste.html)

Quelle : www.pro-linux.de
Titel: Opensource-Firewall IPFire in Version 2.13 erhätlich
Beitrag von: SiLæncer am 28 November, 2013, 14:08
Die Opensource-Firewall IPFire ist nun in Version 2.13 Core Update 73 erhältlich. Das kleine Update haben die Entwickler noch kurz vor dem nächsten "Major Release" eingeschoben, an dem sie parallel arbeiten. Es enthält etliche kleine Fehlerbereinigungen, aber auch Updates von zentralen Diensten. Die wichtigsten Updates betreffen den Web Proxy Squid, OpenSSH sowie den PHP Hypertext Processor.

Der ganze Artikel (http://www.heise.de/newsticker/meldung/Update-Opensource-Firewall-IPFire-in-Version-2-13-erhaetlich-2056519.html)

Quelle : www.heise.de
Titel: Kleines Update: IPFire in Version 2.13 Core 75 erhältlich
Beitrag von: SiLæncer am 13 Januar, 2014, 18:45
Die Opensource-Firewall IPFire ist nun in Version 2.13 Core Update 75 erhältlich. Mit dem kleinen Update beheben die Entwickler drei Fehler. Zwei betreffen die OpenVPN-Kommunikation. Im ersten Fall geht es um die Prüfung von TLS-Zertifikaten. Diese mislingen wegen einer Formatänderung in OpenVPN 2.3, die dazu führt, dass IPFire nicht mehr nach dem korrekten Common-Name-Parameter eines Zertifikats sucht.

Das Update enthält ein verbessertes Skript, das den Common Name korrekt extrahiert. Im zweiten Fall behandelt das Update ausbleibende Übermittlung der Routen-Konfiguration an Clients. Der dritte Bugfix betrifft Pakfire; eine leere Spiegel-Liste blockiert die Software auf der Suche an einem aktiven Spiegel-Server. IPFire umgeht das Problem, indem es Pakete vom Haupt-Server lädt, wenn es keine aktiven Spiegel-Server findet. Die vollständige Liste der Änderungen gibt es hier (http://www.ipfire.org/news/ipfire-2-13-core-update-75-released). Das ISO-Installations-Image (http://downloads.ipfire.org/releases/ipfire-2.x/2.13-core75/ipfire-2.13.i586-full-core75.iso) belegt rund 103 MByte auf der Platte.

Quelle : www.heise.de
Titel: IPCop 2.1.1
Beitrag von: SiLæncer am 14 Februar, 2014, 21:20
Infos zu dieser Version : Klick (http://marc.info/?l=ipcop-announce&m=139231052115182&w=2)

http://www.ipcop.org/
Titel: IPCop 2.1.4
Beitrag von: SiLæncer am 16 April, 2014, 21:20
Infos zu dieser Version : Klick (http://marc.info/?l=ipcop-announce&m=139697815506679&w=2)

http://www.ipcop.org/
Titel: IPCop 2.1.5
Beitrag von: SiLæncer am 03 Mai, 2014, 06:45
Zitat
IPCop 2.1.5 is released v2.1.5 can be installed using the installation images or as an update from version 2.1.4. You need to reboot to use the new kernel after upgrading to 2.1.5.

In addition to several updates to software used in IPCop, v2.1.5 adds CA certificates to better support SSL/TLS email.

http://www.ipcop.org/
Titel: IPFire 2.13 Core Update 75 veröffentlicht
Beitrag von: SiLæncer am 08 Juli, 2014, 15:50
Wichtige Änderungen und Verbesserungen des Updates betreffen vor allem die OpenVPN-Konfiguration und den Linux-Kernel, den IPFire mitbringt.

Die für diverse Hardware-Plattformen erhältliche Firewall-Distribution IPFire bringt in der neuen Version 2.13, Core Update 75, laut den Entwicklern zahlreiche Fehlerbehebungen und Verbesserungen mit. Die wichtigsten Änderungen erhöhen laut den Programmierern das Sicherheitsniveau der VPN-Software OpenVPN.

Das OpenVPN-Modul, das IPFire mit dem Core Update 75 mitbringt, weist Verbesserungen in den Bereichen Certificate Authorities, Diffie-Hellman-Parameter, Ciphers, HMAC/Hashing und TLS-Authentifizierung auf. Einige der inzwischen geknackten Cipher-Kombinationen, sind für das Core Update 75 entfernt worden, nämlich DES-CBC, RC2-CBC, RC2-64-CBC und RC2-40-CBC.

Der ganze Artikel (http://www.heise.de/netze/meldung/Firewall-Update-IPFire-2-13-Core-Update-75-veroeffentlicht-2251637.html)

Quelle : www.heise.de
Titel: Firewall IPFire: Update schließt OpenSSL-Lücken
Beitrag von: SiLæncer am 11 August, 2014, 20:57
Das Core Update 81 für die Firewall IPFire schließt insgesamt 9 Sicherheitslücken in der OpenSSL-Implementierung und behebt kleinere Fehler.

In IPFire 2.15 Core Update 81 hat das Entwicklerteam die OpenSSL-Implementierung auf Version 1.0.1i aktualisiert und so neun Sicherheitslücken geschlossen. Die Schwachstellen betrafen laut der Update-Mitteilung verschiedene Protokolle und Bestandteile der Programmbibliotheken. Die Entwickler stufen das Sicherheitsrisiko als moderat ein. Die genauen Änderungen der neuen OpenSSL-Version beschreibt die Aktualisierungsmitteilung der OpenSSL-Entwickler.

Der ganze Artikel (http://www.heise.de/newsticker/meldung/Firewall-IPFire-Update-schliesst-OpenSSL-Luecken-2290050.html)

Quelle : www.heise.de
Titel: IPFire 2.15 Core Update 83
Beitrag von: SiLæncer am 30 September, 2014, 18:00
Release Notes : http://www.ipfire.org/news/ipfire-2-15-core-update-83-released#

http://www.ipfire.org
Titel: IPCop 2.1.7
Beitrag von: SiLæncer am 29 Oktober, 2014, 20:00
Zitat
IPCop 2.1.7 is released

v2.1.7 can be installed using the installation images or as an update from version 2.1.6.

v2.1.7 fixes PPPoE dialup.

http://www.ipcop.org/
Titel: IPFire 2.15 Core 86
Beitrag von: SiLæncer am 26 Januar, 2015, 13:43
Release Notes : http://www.ipfire.org/news/ipfire-2-15-core-update-86-released

http://www.ipfire.org
Titel: pfSense 2.2 veröffentlicht
Beitrag von: SiLæncer am 01 Februar, 2015, 14:31
Die freie, auf FreeBSD basierende Firewall-Distribution pfSense ist in der Version 2.2 erschienen. Die Entwickler korrigierten in pfSense 2.2 über 300 Fehler und fügten 55 neue Funktionalitäten hinzu.

Eine Neuerung in pfSense 2.2 ist, dass das zugrunde liegende Betriebssystem FreeBSD auf die Version 10.1 aktualisiert wurde. Beim IPSec-Backend wechselten die Entwickler von Racoon auf StrongSwan. Das PHP-Backend nutzt nun PHP 5.5 und PHP-FPM anstelle von FastCGI und der DNS-Resolver Unbound ist in neuen Installationen standardmäßig aktiviert. Bei der Standardkonfiguration schalteten die Entwickler den DNS-Forwarder dnsmasq ab, änderten die Default-NICs von vr auf em und räumten die config.xml auf.

Hinsichtlich der Sicherheit prüft pfSense nun SSL-Zertifikate von HTTPS-URLs, warnt Nutzer vor inoffiziellen Paket-Repositorien und nutzt bei der grafischen Weboberfläche öfter POST- anstelle von GET-Anfragen. Das sshd-Banner teilt nicht mehr die zugrunde liegende Free-BSD-Version mit, jQuery ist in der Version 1.11.1 enthalten und SSLv3 und RC4-Cipher sind in Lighttpd abgeschaltet. Beim Routing erlauben es die Entwickler den Nutzern, ein Gateway in der GUI als Down zu markieren und das Gateway auszuwählen, über das DynDNS-Updates versendet werden. Für statische Routen lässt sich die -iface-Option für PPPoE nutzen, falls mehrere PPoE-Verbindungen über das selbe Gateway laufen.

Der ganze Artikel (http://www.pro-linux.de/news/1/21973/pfsense-22-veroeffentlicht.html)

Quelle : www.pro-linux.de
Titel: Linux-Firewall: IPFire-Korrektur bringt neue Funktionen
Beitrag von: SiLæncer am 22 April, 2015, 16:47
IPFire 2.17 korrigiert mit dem Core Update 89 nicht nur eine Reihe von Fehlern. Es erweitert auch den DynDNS-Updater und die Statistiken der Linux-Firewall.

Das Core-Update 89 von IPFire 2.17 behebt Fehler und aktualisiert zahlreiche Tools und Dienste der Linux-Firewall. Das Update erweitert die Linux-Firewall zudem um neue Funktionen: So sammelt IPFire nun Statistiken zu Netz-zu-Netz-Verbindungen von OpenVPN und stellt sie grafisch dar. Der DynDNS-Updater protokolliert Updates und stößt bei fehlgeschlagenen Versuchen erneute Versuche an. Zusätzlich unterstützt die Software nun mehr DynDNS2-Anbieter und sie erkennt, ob ein DynDNS-Anbieter den Zugriff gesperrt hat. Außerdem wurden eine Reihe von Problemen mit DynDNS-Diensten behoben.

Das Update aktualisierte den DNS- und DHCP-Server dnsmasq und behebt damit unter anderem Fehler bei der DNSSEC-Unterstützung. Die Entwickler haben den Proxy haproxy 1.5 und Prozessverwaltungstool monit 5.11 zu IPFires Softwareausstattung hinzugefügt und mehrere Fehler im Webinterface (Firewall, Squid-Accounting), bei der Lebensdauer von IPSec- und OpenVPN-Zertifikaten sowie beim Backup und im Installer korrigiert. Weitere Details zu den Änderungen und Neuheiten von IPFire 2.17 Core Update 89 verrät die Release-Mitteilung (http://www.ipfire.org/news/ipfire-2-17-core-update-89-freigegeben).

Quelle: www.heise.de
Titel: Linux-Firewall IPFire mit GeoIP-Filter
Beitrag von: SiLæncer am 29 Mai, 2015, 16:40
Im neuen Update 90 der Linux-Firewall IPFire 2.17 beschleunigen die Entwickler zudem verschiedene Crypto-Algorithmen, schalten anfällige SSL-Versionen ab und verbessern das Zusammenspiel zwischen IPSec-Server und dem IPSec-Windows-Client.

Das Core-Update 90 der Linux-Firewall IPFire 2.17 aktualisiert nicht nur zahlreiche Softwarepakete und Voreinstellungen. Dank Spenden könnten die Entwickler die Firewall nun um einen GeoIP-Filter erweitern, der ein- und ausgehenden Netzwerkverkehr anhand geografischer Daten (GeoIP) blockieren oder passieren lässt.

Der Filter erschwert automatische Scans nach verwundbaren Diensten und hilft, die eigenen Angebote abzusichern: So lassen sich etwa leicht die von Schadsoftware genutzten Command-and-Control-Servern blockieren und Fernwartungszugänge auf einzelne Länder beschränken. Kommuniziert man eher selten mit bestimmten Regionen, legt man beispielsweise Limits für neue Verbindungen aus diesen Ländern fest.

Der ganze Artikel (http://www.heise.de/newsticker/meldung/Linux-Firewall-IPFire-mit-GeoIP-Filter-2671078.html?wt_mc=rss.ho.beitrag.atom)

Quelle : www.heise.de
Titel: Linux-Firewall IPFire erneuert OpenSSL- und StrongSwan-Komponenten
Beitrag von: SiLæncer am 13 Juni, 2015, 17:49
Anwender der IPFire-Version 2.17 sollten das Core-Update 91 bald einspielen, denn es schließt unter anderem die jüngst hochgekommene Logjam-Lücke in OpenSSL.

Mit dem Core-Update 91 stopft die Firewall-Distribution IPFire 2.17 Sicherheitslücken in der OpenSSL-Bibliothek sowie in der VPN-Server- und -Client-Komponente StrongSwan. Die OpenSSL-Version 1.0.2b schließt sechs Löcher, darunter die kritische Logjam-Lücke, mit der sich SSL-Verbindungen auf ein unsicheres Verschlüsselungsniveau zurückstufen ließen. StrongSwan 5.3.1 behebt eine Angriffsmöglichkeit, die zum Denial-of-Service und eventuell zur Code-Ausführung genutzt werden konnte. Außerdem wurden einige weitere Pakete aufgefrischt.

Der ganze Artikel (http://www.heise.de/netze/meldung/Linux-Firewall-IPFire-erneuert-OpenSSL-und-StrongSwan-Komponenten-2690138.html)

Quelle : www.heise.de
Titel: Linux-Firwall IPFire 2.17, Core Update 93 erschienen
Beitrag von: SiLæncer am 18 August, 2015, 13:40
Mit den Änderungen schließen die Entwickler hauptsächlich einige Sicherheitslücken. Darüber hinaus sind einige Pakete aktualisiert und eine Filterfunktion hinzugefügt worden, die bei bestimmten SSD-Laufwerken die TRIM-Funktion abschaltet.

Das Firewall-Paket IPFire stopft in der neuen Version 2.17 Core Update 93 eine Hand voll Sicherheitslücken im Web-Proxy Squid, im DNS-Server dnsmasq und in einer Perl-kompatiblen Bibliothek. Der zugehörige DDNS-Client soll in der neuen Version 008 unter anderem robuster gegenüber Netzwerk- und Serverfehlern von sein und nun auch Dienste der Anbieter joker.com und DNSmadeEasy nutzen.

Der ganze Artikel (http://www.heise.de/newsticker/meldung/Linux-Firwall-IPFire-2-17-Core-Update-93-erschienen-2782392.html)

Quelle : www.heise.de
Titel: IPFire 2.17 Core Update 95
Beitrag von: SiLæncer am 14 Dezember, 2015, 21:06
Infos hierzu : http://www.ipfire.org/news/ipfire-2-17-core-update-95-released

http://www.ipfire.org/download
Titel: IPFire 2.17 Core Update 96
Beitrag von: SiLæncer am 21 Januar, 2016, 17:01
Release Notes

This is the official release announcement for IPFire 2.17 – Core Update 96. This update comes with many smaller changes and security fixes.

Ramdisk usage change

IPFire uses round-robin databases to collect system data and generate beautiful graphs. The databases have usually been kept in memory. This change was made in early versions of IPFire to keep the amount of writes to the block device to a minimum. However, the number of the databases has been growing and many systems don’t have enough capacity in memory. The objective was also that ordinary flash storage is quite slow. These systems are now however less commonly used which makes this change unnecessary.

To give an example, many of the ALIX boards use very slow compact flash storage and do only have 256 or even 128 MB of memory. So neither is really an option. Systems you will purchase today usually come with fast SSD storage and a few gigabytes of memory. So both is a viable option to store these databases.

New installed IPFire systems will now only use the persistent storage to store these database files. All updates systems will stick with the old behaviour if they have about 512 MB of RAM or more. Otherwise upgraded systems will also fall back to the persistent storage.
Misc

    openssl has been updated to version 1.0.2e which fixes various security vulnerabilities: CVE-2015-3193, CVE-2015-3194, CVE-2015-3195, CVE-2015-3196
    The NTP service was unable to communicate with the local clock and therefore not able to provide time to the network.
    strongswan is updated to version 5.3.5 which fixes various security issues
        The connection list in the web user interface when IPsec subnets with multiple local or remote subnets are used.
    The firewall engine handles SNAT rules more restrictive and avoids overmatching of packages that are sent over an IPsec network
    Various patches to improve dnsmasq have been imported from upstream
    curl wasn’t able to validate publicly signed SSL certificates because it could not find the certificate store. This is now fixed.
    dma, the internal mail agent, now handles authentication against remote mail servers better due to a patch sent to the project by the IPFire developers
    Support for cryptodev has been dropped
    mdadm has been updated to version 3.3.4, arping has been updated to version 2.15, rrdtool has been updated to version 1.5.5, libnet 1.1.6 is now shipped with the core distribution
    On x86-based systems, GRUB, the bootloader, has been patched against an integer overflow vulnerability filed under CVE-2015-8370 which allowed users to bypass authentication after pressing backspace for 28 times
    Snort now also monitors alias address on red if any have been configured
    The Turkish translation has been updated

Updated add-ons

    nano has been updated to 2.5.0
    Midnight Commander has been updated to 4.8.15
    clamav has been updated to version 0.99
    openvmtools have been updated to version 10.0.5
    squid-accounting has received minor bug fixes
    tripwire has been dropped

[close]

http://www.ipfire.org/download
Titel: IPFire 2.17 Core Update 97
Beitrag von: SiLæncer am 01 Februar, 2016, 19:00
Release Notes

This is the official release announcement for IPFire 2.17 – Core Update 97. An other OpenSSL security fix has been released, which is shipped in this Core Update among some other security vulnerabilities. As this is a rather urgent update, we recommend to install it as soon as possible. We also recommend rebooting after the update has been installed.

OpenSSL security fixes – 1.0.2f

It is possible to exploit the Diffie-Hellman key exchange (CVE-2016-0701)and get hold of the server’s private exponent. With that any future connections can be decrypted. Please check out the original security advisory for more details.

A second fix (CVE-2015-3197) in the OpenSSL library fixes the deactivation of some SSLv2 ciphers.

An other change will strengthen SSL connections against being taken over by a man-in-the-middle attack that tries to downgrade the length of the Diffie-Hellman key that is being used.

OpenSSH 7.1p2

An information leak (CVE-2016-0777) flaw was found in the way the OpenSSH client roaming feature was implemented. A malicious server could potentially use this flaw to leak portions of memory (possibly including private SSH keys) of a successfully authenticated OpenSSH client.

The SSH daemon will be restarted during the update in case it is enabled.

[close]

http://www.ipfire.org/download
Titel: IPFire 2.17 Core Update 98
Beitrag von: SiLæncer am 25 Februar, 2016, 18:00
Release Notes

Due to a recently discovered security vulnerability in glibc, we are releasing this Core Update that contains a fix for CVE-2015-7547.
CVE-2015-7547 in glibc/getaddrinfo

The getaddrinfo() interface is glibc, the system’s main C library, is used to resolve names into IP addresses using DNS. An attacker can exploit the process in the system performing this request by sending a forged reply that is too long causing a stack buffer overflow. Code can potentially be injected and executed.

IPFire is however not directly exploitable by this vulnerability as it is using a DNS proxy, that rejects DNS responses that are too long. So IPFire itself and all systems on the network that use IPFire as DNS proxy are protected by the DNS proxy. However, we decided to push out a patch for this vulnerability as quickly as we can.

[close]

http://www.ipfire.org/download
Titel: IPFire 2.17 Core Update 99
Beitrag von: SiLæncer am 08 März, 2016, 17:00
Release Notes

This is the official release announcement for IPFire 2.17 – Core Update 99. Another OpenSSL security fix has been released, so that we created this Core Update that fixes that among some other security vulnerabilities.
OpenSSL security fixes – 1.0.2g

Please check out the original security advisory for more details.

    Cross-protocol attack on TLS using SSLv2 (DROWN) (CVE-2016-0800)
    Double-free in DSA code (CVE-2016-0705)
    Memory leak in SRP database lookups (CVE-2016-0798)
    BN_hex2bn/BN_dec2bn NULL pointer deref/heap corruption (CVE-2016-0797)
    Fix memory issues in BIO_*printf functions (CVE-2016-0799)
    Side channel attack on modular exponentiation (CVE-2016-0702)
    Divide-and-conquer session key recovery in SSLv2 (CVE-2016-0703)
    Bleichenbacher oracle in SSLv2 (CVE-2016-0704)

IPFire is most likely not vulnerable by the most famous of all these vulnerabilities known as DROWN. However we recommend updating as soon as possible and we also recommend to reboot the system afterwards.
OpenSSH 7.2p1

This is primarily a bugfix release.

The SSH daemon will be restarted during the update in case it is enabled.

[close]

http://www.ipfire.org/download
Titel: IPFire 2.19 Core Update 100
Beitrag von: SiLæncer am 15 April, 2016, 06:00
Release Notes

It is a great moment to us and we are very proud to release the 100th Core Update today.

This update will bring you IPFire 2.19 which we release for 64 bit on Intel (x86_64) for the first time. This release was delayed by the various security vulnerabilities in openssl and glibc, but is packed with many improvements under the hood and various bug fixes.

64 bit

There will be no automatic update path from a 32 bit installation to a 64 bit installation. It is required to manually reinstall the system for those who want to change, but a previously generated backup can be restored so that the entire procedure takes usually less than half an hour.

There are not too many advantages over a 64 bit version except some minor performance increases for some use cases and of course the ability to address more memory. IPFire is able to address up to 64GB of RAM on 32 bit, so there is not much need to migrate. We recommend to use 64 bit images for new installations and stick with existing installations as they are.

Kernel Update

As with all major releases, this one comes with an updated Linux kernel to fix bugs and improve hardware compatibility. Linux 3.14.65 with many backported drivers from Linux 4.2 is also hardened stronger against common attacks like stack buffer overflows.

Many firmware blobs for wireless cards and other components have been updated just as the hardware database.

Hyper-V performance issues

A backport of a recent version of the Microsoft Hyper-V network driver module will allow transferring data at higher speeds again. Previous versions had only very poor throughput on some versions of Hyper-V.

Firewall Updates

It is now possible to enable or disable certain connection tracking modules. These Application Layer Gateway (ALG) modules help certain protocols like SIP or FTP to work with NAT. Some VoIP phones or PBXes have problems with those so that they can now be disabled. Some need them.

The firewall has also been optimised to allow more throughput with using slightly less system resources.

Misc

    Many programs and tools of the toolchain that is used have been updated. A new version of the GNU Compiler Collections offers more efficient code, stronger hardening and compatibility for C++11
        GCC 4.9.3, binutils 2.24, bison 3.0.4, grep 2.22, m4 1.4.17, sed 4.2.2, xz 5.2.2
    dnsmasq, the IPFire-internal DNS proxy has been updated and many instability issues have been fixed
    openvpn has been updated to version 2.3.7 and the generated configuration files have been updated to be compatible with upcoming versions of OpenVPN
    IPFire will now wait with booting up when the time needs to synchronised and DHCP is used until the connection is established and then continue booting up
    bind was updated to version 9.10.3-P2
    ntp was updated to version 4.2.8p5
    tzdata, the database for timezone definitions, was updated to version 2016b
    Various cosmetic fixes were done on the web user interface
    A bug causing VLAN devices not being created when the parent NIC comes up has been fixed
    DHCP client: Resetting the MTU on broken NICs that lose link has been fixed
    A ramdisk to store the databases of the graphs shown in the web user interface is now used by default again on installations that use the flash image when more than 400MB of memory is available
    A bug that the Quality of Service could not be stopped has been fixed
    Some old code has been refurbished and some unused code has been dropped in some internal IPFire components

Add-ons

    owncloud has been updated to version 7.0.11
    nano has been updated to version 2.5.1
    rsync has been updated to version 3.1.2

[close]

http://www.ipfire.org/download
Titel: IPFire 2.19 Core 104
Beitrag von: SiLæncer am 22 September, 2016, 18:00
Changelog

Linux 3.14.79:

The Linux kernel has been updated to version 3.14.79 and brings you various bug-fixes, stability improvements and supports more hardware.

Guardian:

Guardian is an Intrusion-Prevention-System that is hooked into Snort, the Intrusion Detection System. It reacts on reported events by blocking access for hosts where malicious traffic was detected to originate from. That enables IPFire to be a dynamic firewall and block any abuse or other unwanted behaviour automatically.
Since the old implementation was quite old and rather limited, Stefan Schantl started a complete rewrite which is faster, more efficient in resource usage and of course more reliable.
If you want to use Guardian, you will have to install the guardian add-on package.
This Core Update updates Snort to version 2.9.8.2.

Misc:

The IPFire web user interface is hardened against a potential environment variable injection attacked known under the name HTTPoxy. This was never possible to exploit in IPFire.
Dynamic DNS Updater
Add support for DuckDNS
Update URL for spdyn
OpenSSH has been updated to 7.3p1 which fixes various security issues
Updated packages: shadow 4.2.1, libarchive 3.2.1, libcap 2.25, acl 2.2.52, iputils s20160308, curl 7.49.1, popt 1.16, pcre 8.39, acpid 2.0.26, which 2.21, libtiff 4.0.6, ntp 4.2.8p8, wget 1.18
Correction of wrong spelled unit “bit”

Add-ons:

Updated:

htop 2.0.2
nano 2.6.1
nginx 1.8.1
p7zip fixes CVE-2016-2334, CVE-2016-2335

New packages:

Indepently from this Core Update, libvirt has been released as a new add-on. Read all about it on its IPFire Planet post.
freeradius, console configuration only

[close]

http://www.ipfire.org/download
Titel: IPFire 2.19 Core 105
Beitrag von: SiLæncer am 28 September, 2016, 17:00
Whats new:>>

IPFire 2.19 Core Update 105 patches a number of security issues in two cryptographic libaries: openssl and libgcrypt. We recommend installing this update as soon as possible and reboot the IPFire system to complete the update.

http://www.ipfire.org/download
Titel: IPFire 2.19 Core 106
Beitrag von: SiLæncer am 03 November, 2016, 17:00
Release Notes

This is the official release announcement for IPFire 2.19 – Core Update 106 which comes with a number of exciting new features, many bug fixes and a few security improvements.
Change of the DNS Proxy

IPFire used dnsmasq as DNS proxy before which is now replaced by unbound. The latter is in contrast to the former software that is specifically designed as an DNS forwarding proxy or DNS recursor and implemented DNSSEC from early on.

Because of our decision to enable DNSSEC by default and various problems in dnsmasq we have been toying with the idea of replacing it for a very long time. Unfortunately development resources are tight and because of this being a substantial part of the system and hooked into many other things, this was a very time-consuming project.

Finally, this new solution should now bring various advantages:
Performance

unbound is multi-threaded and IPFire will start one thread per CPU core that is available. That will allow execution of multiple queries in parallel which should increase responsiveness and throughput.

The cache size is adjusted based on memory available on the system. Bigger systems will have a significantly bigger DNS cache which will speed up browsing especially in larger environments like universities with a large number of clients.
Better DNSSEC reliability

DNSSEC is enabled by default (as it was before). However, unbound does not rely on the upstream servers being validating resolvers, too. This will bring DNSSEC to many more users. DNS servers are now tested before being passed on for use and any malfunctioning DNS servers won’t be used. Status of this can be seen on the user web interface.

Please see this list of various DNS services on the Internet for more details.

If none of the DNS servers configured or received from the provider can be used, unbound will fall back to full recursor mode.

With the next key rollover of the DNS root zone, IPFire will automatically download and validate the new key according to RFC5011.
Enhanced Features

DHCP leases will be published into the local DNS zone as before. Static leases are imported as well which is a new feature. Everything IP address will resolve to its hostname by publishing PTR records.
Misc

    Passwords are now saved with a stronger hash (SHA512) which was MD5 before. Please change the root password using the setup tools to store your passwords with the improved hash.
    Firewall: An incorrect validation of destination IP addresses for rules that use Destination NAT caused that some valid addresses were not accepted. This is fixed now.
    PPP connections no longer require a password being set (some providers require these being empty)
    The NTP client now waits correctly for WiFi connections being established before continuing to boot
    The samba add-on enables SMBv2 by default
    IPFire now ships the firmware for MediaTek 7601 series devices
    Various old software components that are not used any more are cleaned up from the systems
    The iptables page on the web user interface has been improved to be more readable

Updated Packages

This update installs a large number of updated packages:

    openssl 1.0.2j which fixes some implementation errors and DoS introduced in the 1.0.2i update
    strongswan has been updated to version 5.5.0
    attr 2.4.47, dejagnu 1.6, diffutils 3.5, expat 2.2.0, file 5.28, flex 2.6.1, gettext 0.19.8.1, gnupg 1.4.21, iproute2 4.7.0, ipset 6.29, libassuan 2.4.3, libgcrypt 1.7.3, libidn 1.33, libgpg-error 1.24, libnetfilter_conntrack 1.0.6, libmnl 1.0, make 4.2.1, smartmontools 6.5, squid 3.5.21, usb_modeswitch 2.4.0, usb_modeswitch_data 20160803

Add-ons

    The new Guardian 2.0 add-on’s user interface received some cosmetic changes

Updated Packages

    asterisk 11.23.1
    krb 1.14.4
    Midnight Commander 4.8.18
    monit 5.19.0
    nano 2.6.3
    transmission 2.92

[close]

http://www.ipfire.org/download
Titel: IPFire 2.19 Core 108
Beitrag von: SiLæncer am 23 Dezember, 2016, 13:00
Changelog

Asynchronous Logging:

Asynchronous logging is now enabled by default and not configurable any more. This made some programs that wrote an extensive amount of log messages slow down and possible unresponsive over the network which causes various problems. This was seen on systems with very slow flash media and virtual environments.

Miscellaneous:

The check that tests DNS servers for any misconfiguration assumed some name servers being validating although they were not and very likely not working at all. This has been fixed now and systems using these broken name servers should fall back to recursor mode.
A problem in the firewall GUI was fixed that prohibited adding an IPsec VPN connection and OpenVPN connection with the same name to a firewall group.

Updated Core Packages:

strongswan was updated to version 5.5.1 which fixes various bugs
ntp was updated to version 4.2.8p9 which fixes various security issues
ddns was updated to version 008

Updated Add-ons:

nano, the text editor, was updated to version 2.7.1
tor, the anonymity network, was updated to version 0.2.8.10

[close]

http://www.ipfire.org/download
Titel: IPFire 2.19 Core 109
Beitrag von: SiLæncer am 20 Februar, 2017, 17:00
Changelog

DNS Fixes:

The DNS proxy which is working inside IPFire has been updated to unbound 1.6.0 which brings various bug fixes. Therefore, QNAME minimisation and hardening below NX domains have been re-activated.
At start time, IPFire now also checks if a router in front of IPFire drops DNS responses which are longer than a certain threshold (some Cisco devices do this to “harden” DNS). If this is detected, the EDNS buffer size if reduced which makes unbound fall back to TCP for larger responses. This might slow down DNS slightly, but keeps it working after all in those misconfigured environments.

Misc:

openssl has been updated to 1.0.2k which fixes a number of security vulnerabilities with “moderate” severity
The kernel is now supporting some newer eMMC modules
The backup script is now working more reliably on all architectures
The network scripts that created MACVTAP bridges for virtualisation among other things now support standard 802.3 bridges, too
The firewall GUI denied creating subnets which were a subnet of any of the standard networks which has been fixed
Matthias Fischer submitted package updates for: bind 9.11.0-P2 with some security fixes, libpcap 1.8.1, logrotate 3.9.1, perl-GeoIP module 1.25, snort 2.9.9.0, squid 3.5.24 which fixes various bugs, sysklogd 1.5.1, zlib 1.2.11
Furthermore, libpng has been updated to 1.2.57 which fixes some security vulnerabilities

Add-ons:

Jonatan Schlag packaged Python 3 for IPFire
He also updated libvirt to version 2.5 and qemu to version 2.8
Matthias Fischer submitted a number of updates for the following packages: nano 2.7.2, tcpdump 4.8.1, tmux 2.3
tor has been updated to 0.2.9.9 which fixes a number of denial-of-service vulnerabilities
sarg has been updated to 2.3.10

[close]

http://www.ipfire.org/download
Titel: IPFire 2.19 Core 110
Beitrag von: SiLæncer am 03 Mai, 2017, 20:00
Changelog

On-Demand IPsec VPNs:

IPFire used to keep IPsec VPNs up all the time. This wastes resources if a connection is not used very often for example for a daily backup only.
Core Update 110 allows to configure IPsec VPNs in an On-Demand mode which will establish the connection as soon as it is needed and will close it after 15 minutes of inactivity to save resources.
This is especially handy for people who have a large number of IPsec net-to-net connections on either weak hardware or connections that are not required all the time like maintenance or backup connections, etc.

Performance Enhancements for DNS:

unbound, the DNS resolver working inside IPFire, has been tuned to allow more concurrent queries and assigned more memory to keep a larger DNS cache.
Especially in large networks or when a burst of DNS queries needs to be handled, there is a notable increase of performance.

Misc.:

Graphs in the web user interface are now larger to show more detail
Packets that are received from a bridge interface are not passed through the firewall engine any more
Apache allows more concurrent connections now, which speeds up distributing proxy.pac, updates from Update Accelerator and more
The GeoIP database is now regularly updated over HTTPS
Gabriel Rolland has updated the Italian translation
Jonatan Schlag reorganised all initscripts in the build system which makes packaging add-ons easier
setup allows now to set the subnet mask of the RED interface to 255.255.255.255. This is required with some web hosting companies which are trying to save IPv4 addresses and then need a host route for the default gateway.

Updated Packages:

apcupsd 3.14.14, bind 9.11.0-P3, cairo 1.14.8, conntrack-tools 1.4.4, fontconfig 2.12.1, freetype 2.7.1, lm_sensors 3.4.0, nettle 3.3, ntp 4.2.8p10, openssh 7.4p1 – for PCI compliance, pixman 0.34.0, squid 3.5.25, unbound 1.6.1, wget 1.19.1

Add-ons:

cups 2.2.2 & cups-filter, ffmpeg 3.2.4, ghostscript 9.20, mc 4.8.19, motion 4.0.1, tcpdump 4.9.0

New Packages:

gnutls, an SSL library
epson-inkjet-printer-escpr for EPSON printers
lcms2, an image library
qpdf and poppler PDF rendering libraries

Dropped Packages:

Avahi has been dropped because of lack of a maintainer

[close]

http://www.ipfire.org/download
Titel: IPFire 2.19 Core 111
Beitrag von: SiLæncer am 15 Juni, 2017, 18:00
Changelog

WPA Enterprise Authentication in Client Mode:

The firewall can now authenticate itself with a wireless network that uses Extensible Authentication Protocol (EAP). These are commonly used in enterprises and require a username and password in order to connect to the network.
IPFire supports PEAP and TTLS which are the two most common ones. They can be found in the configured on the “WiFi Client” page which only shows up when the RED interface is a wireless device. This page also shows the status and protocols used to establish the connection.
The index page also shows various information about the status, bandwidth and quality of the connection to a wireless network. That also works for wireless networks that use WPA/WPA2-PSK or WEP.

QoS Multi-Queueing:

The Quality of Service is now using all CPU cores to balance traffic. Before, only one processor core was used which caused a slower connection on systems with weaker processors like the Intel Atom series, etc. but fast Ethernet adapters. This has now been changed so that one processor is no longer a bottle neck any more.
New crypto defaults:

In many parts of IPFire cryptographic algorithms play a huge role. However, they age. Hence we changed the defaults on new systems and for new VPN connections to something that is newer and considered to be more robust.

IPsec:

The latest version of strongSwan supports Curve 25519 for the IKE and ESP proposals which is also available in IPFire now and enabled by default.
The default proposal for new connections now only allows the explicitly selected algorithms which maximises security but might have a compatibility impact on older peers: SHA1 is dropped, SHA2 256 or higher must be used; the group type must use a key with length of 2048 bit or larger
Since some people use IPFire in association with ancient equipment, it is now allowed to select MODP-768 in the IKE and ESP proposals. This is considered broken and marked so.

OpenVPN:

OpenVPN used SHA1 for integrity by default which has now been changed to SHA512 for new installations. Unfortunately OpenVPN cannot negotiate this over the connection. So if you want to use SHA512 on an existing system, you will have to re-download all client connections as well.
Various markers have been added to highlight that certain algorithms (e.g. MD5 and SHA1) are considered broken or cryptographically weak.

Misc.:

IPsec VPNs will be shown as “Connecting” when they are not established, but the system is trying to
A shutdown bug has been fixed that delayed the system shutting down when the RED interface was configured as static
The DNSSEC status is now shown correctly on all systems
The following packages have been updated: acpid 2.0.28, bind 9.11.1, coreutils 8.27, cpio 2.12, dbus 1.11.12, file 5.30, gcc 4.9.4, gdbm 1.13, gmp 6.1.2, gzip 1.8, logrotate 3.12.1, logwatch 7.4.3, m4 1.4.18, mpfr 3.1.5, openssl 1.0.2l (only bug fixes), openvpn 2.3.16 which fixes CVE-2017-7479 and CVE-2017-7478, pcre 8.40, pkg-config 0.29.1, rrdtool 1.6.0, strongswan 5.5.2, unbound 1.6.2, unzip 60, vnstat 1.17
Matthias Fischer contributed some cosmetic changes for the firewall log section
Gabriel Rolland improved the Italian translation
Various parts of the build system have been cleaned up

Add-ons:

New Add-ons:

ltrace: A tool to trace library calls of a binary

Updated Add-ons:

The samba addon has been patched for a security vulnerability (CVE-2017-7494) which allowed a remote code executing on writable shares.
ipset 6.32
libvirt 3.1.0 + python3-libvirt 3.6.1
git 2.12.1
nano 2.8.1
netsnmpd which now supports reading temperature sensors with help of lm_sensors
nmap 7.40
tor 0.3.0.7

[close]

http://www.ipfire.org/download
Titel: IPFire 2.19 Core 112
Beitrag von: SiLæncer am 13 August, 2017, 21:00
Changelog

This Core Update mainly comes with updates under the hood. Core system libraries have been updated to new major versions and the build toolchain got major updates.

These are:

glibc 2.25
GNU Compiler Collection 6.3.0
binutils 2.29
Python 2.7.13
ccache 3.3.4, bc 1.07.1, cmake 3.8.1, flex 2.6.4, fuse 2.9.7, boost 1.64.0, gawk 4.1.4, gnutls 3.5.11, grep 2.27, libarchive 3.3.1, libgcrypt 1.7.7, libgpg-error 1.27, libxml2 2.9.4, mdadm 4.0, openssl 1.0.2l, pkg-config 2.29.2, reiserfsprogs 3.6.25, SDL 1.2.15, squid 3.5.26, strongswan 5.5.3, unbound 1.6.3, util-linux 2.28.2

Misc:

openvpn (2.3.17) has received some security updates that have been discovered recently.
A remote command execution vulnerarbility in ids.cgi has been closed with could be used by authenticated users to run shell commands with non-superuser rights.
It is now possible to create networks in the firewall that are a subnet of any of the internal zones.
The toolchain and build scripts have also been cleaned up and improved.
The IPFire netboot has been updated so that always the best architecture for a system is used (i.e. the 64 bit version is installed when the system supports it).

Add-ons:

Updated:

7zip 16.02
bird 1.6.3
cyrus-imapd 2.5.11
iperf 2.0.9
directfb 1.7.7
freeradius 3.0.14
monit 5.23.0
miniupnpd is now listening on GREEN by default
tmux 2.5
tor 3.0.8

Dropped:

imspector and tcpick are not maintained upstream any more

[close]

http://www.ipfire.org/download
Titel: IPFire 2.19 Core 113
Beitrag von: SiLæncer am 04 September, 2017, 20:00
Changelog

Who Is Online?:

Who Is Online? (or WIO in short) has finally arrived on IPFire. It has been ported by the original author Stephan Feddersen and Alex Marx and is available as a usual add-on package called wio.
It is a builtin monitoring service for the local network showing what devices are connected, which ones are online and can also send alarms on various events. Give it a try!

Misc.:

The DNS root keys have been updated to make DNS work beyond October 2017 after the DNSSEC key rollover has been performed
Serial consoles now automatically detect the baudrate after the kernel has been booted
Package updates by Matthias Fischer: bind 9.11.2, gnutls 3.5.14, libgcrypt 1.8.0, logrotate 3.12.3, nano 2.8.6, pcre 8.41, squid 3.5.26, unbound 1.6.4

Add-Ons:

iftop has been updated to 1.0pre4 by Erik Kapfer
Matthias Fischer updated: hostapd 2.6, tor 0.3.0.10

[close]

http://www.ipfire.org/download
Titel: pfSense 2.4.1
Beitrag von: SiLæncer am 28 Oktober, 2017, 21:00
Changelog

Fixes for the set of WPA2 Key Reinstallation Attack issues commonly known as KRACK
Fixed a VT console race condition panic at boot on VMware platforms (especially ESXi 6.5.0U1)
Fixed a bsnmpd problem that causes it to use excess CPU and RAM with the hostres module in cases where drives support removable media but have no media inserted
Fixed an upgrade problem due to FreeBSD 11 removing legacy ada aliases, which caused some older installs to fail when mounting root post-upgrade
Changed the boot-time fsck process the ensure the disk is mounted read-only before running fsck in preen mode
Changed the VLAN interface names to use the ‘dotted’ format now utilized by FreeBSD, which is shorter and helps to keep the interface name smaller than the limit (16) This fixes the 4 digit VLAN issues when the NIC name is 6 bytes long. This change was made not only to fix the name length issue, but also to reduce the differences between how FreeBSD uses VLANs and how they are used by pfSense interface functions.
These VLAN changes prevent PPP sessions from working on VLAN parent interfaces.
Fixed setting VLAN Priority in VLAN interface configuration

[close]

http://www.pfsense.com/
Titel: IPFire 2.19 Core 115
Beitrag von: SiLæncer am 03 November, 2017, 17:00
Changelog

Hello Community,

finally, we are releasing the long-awaited IPFire 2.19 – Core Update 115 which brings the shiny new Captive Portal and various security and performance improvements as well as fixing security vulnerabilities.

This is a large Core Update with a huge number of changes and to support our efforts to develop new features and maintain the existing system as well as constantly improving it, we would like to ask you to donate!

Captive Portal

The new IPFire Captive Portal comes pre-installed on every IPFire system and allows easy access control for wireless and even wired networks. It is simple and very easy to set with only a few configuration options. That makes it versatile for many adminstrators and also very simple for all users.

It comes with two configuration modes: The default mode asks the user to accept terms and conditions. After doing so, access to the network is granted for a configurable time. After the time has expired, Internet access is blocked again immediately.

Optionally you can generate coupons that allow access for one device for a set time. Those coupons can also be exported as a PDF document and being printed so that they can be handed out easily at a hotel reception for example.

Although, Germany has just abolished the controversial law that made the subscriber of on Internet connection liable for everything anyone does over that connection (Störerhaftung), this is still a great feature for 2017 where WiFi networks in hotels, cafes and everywhere else are a must. It allows to only give access to the people who booked a room in your hotel, or bought a cup of coffee in your cafe. That will keep the WiFi from being overloaded and it will be fast for everyone.

The full documentation can be found on our wiki.

Thanks go to all the people of our community who have worked on this for a very long time.

Security Improvements

The web user interface has been hardened by a series of patches from Peter Müller:

    When establishing a new TLS connection, ECDSA is now preferred over RSA which makes the TLS handshake much faster and uses less resources on the client and server. It is also considered to be stronger to brute-force.
    An additional ECDSA key is now generated in addition to the existing RSA key which improves security of any TLS connections to the web user interface.
    Previously, some attacks were possible to make the web browser submit login credentials via HTTP without encryption. The apache configuration has been changed to never ask for login without establishing a TLS connection before.
    A smaller information leak has also been fixed where anyone could access the credits.cgi page which revealed the version information of the installed system.

These changes require to restart the web server that runs the web user interface. This happens automatically during the installation of this Core Update but might render the web user interface unavailable for a short moment.

OpenVPN Configuration Updates

The OpenVPN project has deprecated some configuration options. This has been updated in IPFire as well which will now generate new configuration files when ever a new certificate has been issued. The old configuration files and certificates will remain but won’t be compatible with OpenVPN 2.5 any more. There is no need for action right now, but old connections might not work with clients that run a newer version of OpenVPN in the future. New connections will work fine with any recent and future version of OpenVPN.

Thanks for Erik for sending in a patch for this.

Misc

    The WiFi access point add-on has already been patched against the KRACK attacks on the day those were announced. The wpa_supplicant package which implements the WiFi client feature of IPFire has been patched in this release against those attacks.
    IPsec VPNs that use Curve25519 would not want to come up after installing the previous Core Update. This has been fixed now.
    Updated packages: logrotate 3.13.0, openvpn 2.3.18, unbound 1.6.7
    Some files that have been unused for a very long time have been cleaned up.
    All downloads of the project’s ISO files are now done over HTTPS.

Updated Add-Ons

    tor 3.1.7

[close]

http://www.ipfire.org/download
Titel: IPFire 2.19 Core 116
Beitrag von: SiLæncer am 08 November, 2017, 21:00
Changelog

openssl 1.0.2m:

The OpenSSL project released version 1.0.2m and issued two security advisories in the last week. The two vulnerabilities that were discovered were of moderate and low security, but we have decided to ship you this update as soon as possible. Hence it is recommended to update as soon as possible, too.
The more severe vulnerability referenced as CVE-2017-3736 fixes a problem with modern Intel Broadwell and AMD Ryzen processors where OpenSSL uses some modern DMI1, DMI2 and ADX extensions and calculates the square root incorrectly. This could be exploited by an attacker who is able to put significant resources into recover a private key more easy alas this attack is still considered virtually unfeasible by the OpenSSL security team.
The less severe vulnerability was caused by overreading certificate data when a certificate has a malformed IPAddressFamily extension. This could lead lead to erroneous display of the certificate in text format. This vulnerability is tracked under CVE-2017-3735.

Misc:

wget also suffered from two security vulnerabilities that allowed an attacker to execute arbitrary code. They are referenced under CVE-2017-13089 and CVE-2017-13090.
apache was updated to version 2.4.29 which fixes a number of bugs.
snort has been updated to version 2.9.11.
xz has also been updated to version 5.2.3 which brings various improvements.

[close]

http://www.ipfire.org/download
Titel: IPFire 2.19 Core 117
Beitrag von: SiLæncer am 05 Januar, 2018, 20:00
Changelog

OpenSSL 1.0.2n:

One moderate and one low security vulnerability have been patched in OpenSSL 1.0.2n. The official security advisory can be found here.

IPsec:

It is now possible to define the inactivity timeout time when an idle IPsec VPN tunnel is being closed
Support for MODP groups with subgroups has been dropped
Compression is now disabled by default because it is not very effective at all
strongswan has been updated to 5.6.1

OpenVPN:

It is now easier to route OpenVPN Roadwarrior Clients to IPsec VPN networks by choosing routes in each client’s configuration. This makes hub-and-spoke designs easier to configure.

Build toolchain:

Some build scripts have been refactored to clean up the build process and the toolchain has been moved from /tools to /tools_< arch >.
nasm, the Net Assembler, has been updated to 2.13.2

Misc:

SSL compression and SSL session tickets have been disabled in Apache. This will improve the security of the web user interface.
At various places, GeoIP information is available where IP addresses are shown and that information is useful to know
Adding static routes over the web user interface has been fixed
Some aesthetic issues on the captive portal configuration pages have been fixed and the captive portal is now working together with the proxy in transparent mode
Syslogging to a remove server can now be configured to either use TCP or UDP

Add-ons:

Samba has been updated to fix several security issues
mc has been updated to 4.8.20
nano has been updated to 2.9.1
sslscan, vsftpd and Pound have been dropped because they are not maintained upstream any more and incompatible with OpenSSL 1.1.0

[close]

http://www.ipfire.org/download
Titel: IPFire 2.19 Core 119
Beitrag von: SiLæncer am 14 März, 2018, 19:00
Release Notes

This is the release announcement for IPFire 2.19 – Core Update 119. It updates the toolchain of the distribution and fixes a number of smaller bug and security issues. Therefore this update is another one of a series of general housekeeping updates to make IPFire better, faster and of course more secure!

Thanks for the people who contributed to this Core Update by submitting their patches and please help us to support everyone’s work with your donation!

Toolchain Updates

The toolchain is a collection of programs that is used to build the distribution. One of the most important one is the compiler GCC which has been updated to version 7.3.0 which mainly adds support for retpoline. This is needed to build protection against Spectre into newer kernels.

The main C library, glibc, has been updated to version 2.27 and brings various stability fixes, performance improvents and bug fixes.

Other toolchain packages that have been updated: binutils 2.30, ccache 3.4.1, diffutils 3.1.6, swig 3.0.12

Security-Relevant Changes

    On the OpenVPN configuration page, ciphers that are considered weak are now marked as such and we do not recommend using any of these.
    strongswan’s certificate parser had a vulnerability (CVE-2018-6459)
    Programs that use the C++ standard library are being recompiled to perform extra out-of-bounds checks that are cheap, but add some extra security.
    dma, the Dragonfly Mail Agent, was hardcoded to only use TLSv1.0 which has been patched to always use the best available protocol version of TLS that is available.
    The Apache server signature is now fully hidden

Misc

    Reverse lookup zones did not work and have been fixed
    IPsec subnets for tunnels that route multiple networks are now shown correctly on the start page
    Updated packages: hostname 3.20, iproute2 4.14.1, pam 1.30.0
    Support for ISDN was removed
    Userspace tools for I2C busses have been added

Add-Ons

The following packages have been updated: asterisk 13.18.5, bacula 9.0.6, bwm-ng 0.6.1-f54b3fa, flac 1.3.2, haproxy 1.8.0, nginx 1.13.7, nut 2.7.4, openvmtools 10.2.0, postfix 3.2.4, powertop 2.9, sarg 2.3.11, stunnel 5.44

These packages have been dropped and will be removed with this Core Update: lcr, mysql which was very outdated and is not needed by any add-ons.

[close]

http://www.ipfire.org/download
Titel: pfSense 2.4.3
Beitrag von: SiLæncer am 31 März, 2018, 15:00
Release Notes

This release includes several important security patches:

    Kernel PTI mitigations for Meltdown (optional tunable) FreeBSD-SA-18:03.speculative_execution.asc
    IBRS mitigation for Spectre V2 (requires updated CPU microcode) FreeBSD-SA-18:03.speculative_execution.asc
    Fixes for FreeBSD-SA-18:01.ipsec
    Fixed three potential XSS vectors, and two potential CSRF issues
    CSRF protection for all dashboard widgets
    Updated several base system packages to address CVEs

In addition to security fixes, pfSense software version 2.4.3 also includes important bug fixes.

Notable bug fixes in 2.4.3 include:

    Fixed hangs due to Limiters and pfsync in High Availability configurations
    Imported a netstat fix to improve performance and reduce CPU usage, especially on the Dashboard and ARM platforms
    Fixed a memory leak in the pfSense PHP module
    Fixed DHCPv6 lease display for entries that were not parsed properly from the lease database
    Fixed issues on assign_interfaces.php with large numbers of interfaces
    Fixed multiple issues that could result in an invalid ruleset being generated
    Fixed multiple Captive Portal voucher synchronization issues with HA
    Fixed issues with XMLRPC user account synchronization causing GUI inaccessibility on secondary HA nodes
    … and many more!

There are several new features in 2.4.3, some of the more important ones are:

    Changed IPsec Phase 1 to allow selecting both IPv4 and IPv6 so the local side can allow inbound connections to either address family
    Changed IPsec Phase 1 to allow configuration of multiple IKE encryption algorithms, key lengths, hashes, and DH groups
    Changed SMTP notifications handling so they are batched, to avoid sending multiple e-mail messages in a short amount of time
    Added options to RFC 2136 Dynamic DNS for server key algorithm and to change the source address used to send updates
    Added VLAN priority tagging for DHCPv6 client requests
    Hardware support for the new XG-7100 including C3000 SoC support, C3000 NIC support, and Marvell 88E6190 switch support (Factory installations only)
    … and more!

[close]

http://www.pfsense.com/
Titel: IPFire 2.19 Core 120
Beitrag von: SiLæncer am 02 Mai, 2018, 20:00
Release Notes

RAM-only Proxy:

In some installations it might be desirable to only let the proxy cache objects in memory and not on disk. Especially when Internet connectivity is fast and storage is slow this is most useful.
The web UI now allows to set the disk cache size to zero which will disable the disk cache entirely. Thanks to Daniel for working on this.

OpenVPN 2.4:

IPFire has migrated to OpenVPN 2.4 which introduces new ciphers of the AES-GCM class which will increase throughput on systems that have hardware acceleration for it. The update also brings various other smaller improvements.
Erik has been working on integration this which has required some work under the hood but is compatible with any previous configurations for both roadwarrior connections and net-to-net connections.

Improved Cryptography:

Cryptography is one of the foundations to a secure system. We have updated the distribution to use the latest version of the OpenSSL cryptography library (version 1.1.0). This comes with a number of new ciphers and major refacturing of the code base has been conducted.
With this change, we have decided to entirely deprecate SSLv3 and the web user interface will require TLSv1.2 which is also the default for many other services. We have configured a hardened list of ciphers which only uses recent algorithms and entirely removes broken or weak algorithms like RC4, MD5 and so on.
Please check before this update if you are relying on any of those, and upgrade your dependent systems.
Various packages in IPFire had to be patched to be able to use the new library. This major work was necessary to provide IPFire with the latest cryptography, migrate away from deprecated algorithms and take advantage of new technology. For example the ChaCha20-Poly1305 ciphersuite is available which performs faster on mobile devices.
The old version of the OpenSSL library (1.0.2) is still left in the system for compatibility reasons and will continue to be maintained by us for a short while. Eventually, this will be removed entirely, so please migrate any custom-built add-ons away from using OpenSSL 1.0.2.

Misc:

Pakfire has now learned which mirror servers support HTTPS and will automatically contact them over HTTPS. This improves privacy.
We have also started phase one of our planned Pakfire key rollover.
Path MTU Discovery has been disabled in the system. This has continuously created issues with the stability of IPsec tunnels that have chosen paths over networks that were incorrectly configured.
The QoS template could miscalculate the bandwidth which has now been fixed that the sum of the guaranteed bandwidth over all classes does not exceed 100%

Updated packages:

bind 9.11.3, curl 7.59.0, dmidecode 3.1, gnupg 1.4.22, hdparm 9.55, logrotate 3.14.0, Net-SSLeay 1.82, ntp 4.2.8p11, openssh 7.6p1, python-m2crypto 0.27.0, unbound 1.7.0, vnstat 1.18

Add-ons:

These add-ons have been updated: clamav 0.99.4, htop 2.1.0, krb5 1.15.2, ncat 7.60, nano 2.9.4, rsync 3.1.3, tor 0.3.2.10, wio 1.3.2

[close]

http://www.ipfire.org/download
Titel: pfSense 2.4.3-p1
Beitrag von: SiLæncer am 18 Mai, 2018, 18:00
Release Notes

This release includes several important security patches, including the issues discussed last week:

    FreeBSD Security Advisory for CVE-2018-8897 FreeBSD-SA-18:06.debugreg
    FreeBSD Errata Notice for CVE-2018-6920 and CVE-2018-6921 FreeBSD-EN-18:05.mem
    Fixed a potential LFI in pkg_mgr_install.php #8485 pfSense-SA-18_04.webgui
    Fixed a potential XSS in pkg_mgr_install.php #8486 pfSense-SA-18_05.webgui

Additionally, 2.3.5-p2 includes corrections for items already addressed in the 2.4.x release branch:

    Fixed a potential XSS vector in RRD error output encoding #8269 pfSense-SA-18_01.packages
    Fixed a potential XSS vector in diag_system_activity.php output encoding #8300 pfSense-SA-18_02.webgui
    Changed sshd to use delayed compression #8245
    Added encoding for firewall schedule range descriptions #8259

Aside from security updates, the new versions include a handful of beneficial bug fixes for various minor issues.

For a complete list of changes, see the 2.4.3-p1 Release Notes and 2.3.5-p2 Release Notes.
Important Information

At this time, pfSense 2.3.x is a Security and Errata maintenance branch only. pfSense 2.4.x is the primary stable supported branch. If the firewall hardware is capable of running pfSense 2.4.x, consider upgrading to that release instead.

If you have not yet upgraded to pfSense version 2.4.0 or later, read the information in the 2.4.0 Release Announcement before updating for important information that may impact the ability of a firewall to upgrade to pfSense version 2.4.x.

If either by choice or by hardware limitations a firewall cannot be upgraded to pfSense 2.4.x, see the pfSense 2.3.5-RELEASE announcement for information on obtaining the latest 2.3.x release.

[close]

http://www.pfsense.com/
Titel: SmoothWall 3.1
Beitrag von: SiLæncer am 19 Juli, 2018, 21:00
(https://s26.postimg.cc/3uk34566x/screenshot_346.png)
SmoothWall is a secure operating system that converts a redundant PC, workstation, fileserver, or rackmount device into a firewall and VPN gateway, but goes way beyond that remit. It is Webmanaged so no keyboard, monitor, or mouse on the device is needed. It supports Internal ISDN, all popular NICS, all popular connection types: Modem, ISDN, Cable, ADSL, USB ADSL, and Ethernet. It also features a fully logging firewall, DHCP server, IPSEC VPN capabilities, and much more.

Freeware

http://www.smoothwall.org/
Titel: IPFire 2.21 Core 122
Beitrag von: SiLæncer am 30 Juli, 2018, 18:00
Release Notes

Highlight: Linux 4.14:

The distribution was rebased from our old long-term supported kernel to the new kernel 4.14.50.
Most importantly, this kernel improves the security of the system, increases performance and makes the core of IPFire more up to date and modern again. This update also enables mitigation against Meltdown and Spectre on some architectures. On Intel-based platforms, we update the microcode of the CPUs when the system boots up to avoid any performance penalties caused by the mitigation techniques.
Unfortunately, grsecurity is incompatible with any newer kernels and has been removed. This is connected to the decision of the grsecurity project to no longer open source their patches. Luckily the kernel developers have backported many features so that this kernel is still hardened and secure.
ARM systems won’t be able to install this update due to the kernel change which also requires changes on some bootloaders. For those users, we recommend to backup the system, reinstall and then restore the backup. The re-installed system will only come with a single ARM kernel instead of multiple for different platforms that we had before. It helps us to keep the distribution smaller and makes development efforts easier.

Misc:

Updated packages: apache 2.4, beep 1.3 with fixes for CVE-2018-0492, bwm-ng 0.6.1-f54b3fa, cmake 3.11.2, crda 3.18, ISC dhcp 4.4.1, dhcpcd 6.11.5, diffutils 3.1.6, gcc 7.3.0, grub 2.02, htop 2.2.0, iw 4.14, libidn 1.34, nano 2.9.7, nmap 7.70, openssh 7.7p1, pcre 8.42, powertop 2.9, rng-tools 6.2, sarg 2.3.11, tar 1.30, u-boot 2018.03, unbound 1.7.1, wget 1.19.5, xtables-addons 2.13, xz 5.2.4
The list of trusted Certificate Authorities has been updated and many have been removed
Also we updated firmware for various drivers and baseboards
The Web User Interface now shows any users logged in on the console

Smaller images due to more efficient compression:

We have tried to make the download of the distribution faster and make it use less space on our servers. As a first step, the flash images have been merged together and there is only one image that boots on systems with serial console and normal video output. Secondly, we now compress all images with the XZ algorithm so that they download faster and even decompress quicker, too.

New partition layout:

This release also changes the partition layout of the distribution. We have dropped the /var partition which was used for log files and data that the system collected. This data is now located on a single partition together with the OS. The size of the /boot partition has been increased to 128MB in the default partition layout.

Updated add-ons:

clamav 0.100.0
nagios-nrpe 3.2.1

[close]

http://www.ipfire.org/download
Titel: IPFire 2.21 Core 123
Beitrag von: SiLæncer am 07 September, 2018, 20:00
Changelog

    OpenSSL has been updated to versions 1.1.0i and for legacy applications version 1.0.2p (CVE-2018-0732 and CVE-2018-0737)

    IPsec

    IPsec now supports ChaCha20/Poly1305 for encryption
    It also allows to configure a connection to passively wait until a peer initiates it. This is helpful in some environments where one peer is behind NAT.

    OpenVPN

    Creating Diffie-Hellman keys with length of 1024 bits is no longer possible because they are considered insecure and not being supported by OpenVPN any more
    There is better warnings about this and other cryptographic issues on the web user interface

    Intrusion Detection

    Links in the log files have been fixed to open the correct page with details about a certain attack
    Downloads of rulesets properly validate any TLS certificates
    The /proc filesystem has been hardened so that no kernel pointers are being exposed any more
    nss-myhostname is now being used to dynamically determine the hostname of the IPFire system. Before /etc/hosts was changed which is no longer required.
    collectd: The cpufreq plugin has been fixed
    Generating a backup ISO file has been fixed
    Updated packages: apache 2.4.34, conntrack-tools 1.4.5, coreutils 8.29, fireinfo, gnupg 1.4.23, iana-etc 2.30, iptables 1.6.2, libgcrypt 1.8.3, libnetfilter_conntrack 1.0.7, libstatgrab 0.91, multipath-tools 0.7.7, openvpn 2.4.6, postfix 3.2.6, rng-tools 6.3.1, smartmontools 6.6, squid 3.5.28, strongswan 5.6.3, tzdata 2018e, unbound 1.7.3

    Add-ons:

    Support for owncloud has been removed from guardian (version 2.0.2)
    Updates: clamav 0.100.1, fping 4.0, hplip 3.18.6, ipset 6.38, lynis 2.6.4, mtr 0.92, nginx 1.15.1, tmux 2.7, tor 0.3.3.9
    avahi has been brought back in version 0.7 as it is required as a dependency by cups which has been fixed to automatically find any printers on the local network automatically
    asterisk is now compiled with any optimisation for the build system which was accidentally enabled by the asterisk build system


[close]

http://www.ipfire.org/download
Titel: IPFire 2.21 Core 124
Beitrag von: SiLæncer am 15 Oktober, 2018, 21:30
Changelog

Kernel Hardening:

We have updated the Linux kernel to version 4.14.72 which comes with a large number of bug fixes, especially for network adapters. It has also been hardened against various attack vectors by enabling and testing built-in kernel security features that prohibit access to privileged memory by unprivileged users and similar mechanisms.

OpenSSH Hardening:

Peter has contributed a number of patches that improve security of the SSH daemon running inside IPFire. For those, who have SSH access enabled, it will now require latest ciphers and key exchange algorithms that make the key handshake and connection not only more secure, but also faster when transferring data.
For those admins who use the console: The SSH client has also been enabled to show a graphic representation of the SSH key presented by the server so that comparing those is easier and man-in-the-middle attacks can be spotted quickly and easily.

Unbound Hardening:

The settings of the IPFire DNS proxy unbound have been hardened to avoid and DNS cache poisoning and use aggressive NSEC by default. The latter will reduce the load on DNS servers on the internet through more aggressive caching and will make DNS resolution of DNSSEC-enabled domains faster.

EFI:

IPFire now supports booting in EFI mode on BIOSes that support it. Some newer hardware only supports EFI mode and booting IPFire on it was impossible before this update. EFI is only supported on x86_64.
Existing installations won’t be upgraded to use EFI. However, the flash image and systems installed with one of the installation images of this update are compatible to be booted in both, BIOS and EFI mode.
Although this change does not improve performance and potentially increases the attack vector on the whole firewall system because of software running underneath the IPFire operating system, we are bringing this change to you to support more hardware. It might be considered to disable EFI in the BIOS if your hardware allows for it.

Misc:

CVE-2018-16232: Remote shell command injection in backup.cgi: It has been brought to our attention that it was possible for an authenticated attacker to inject shell commands through the backup.cgi script of the web user interface. Those commands would have been executed as a non-priviledged user. Thanks to Reginald Dodd to spot this vulnerability and informing us through responsible disclosure.
The hostname of the system was set incorrectly in the kernel before and is now being set correctly
Firewall: Creating rules with the same network as source and destination is now possible and renaming a network/host group is now correctly updating all firewall rules
Cryptography: ChaCha20-Poly1305 is now working on ARM, too
IPsec: The status of connections in waiting state is now shown correctly at all times; before, they always showed up as enabled although they were disabled.
pakfire: Some old and unused code has been cleaned out and the mirror health check has been removed, because a download will fail-over to another available mirror anyways
Intrusion Detection: Emerging Threats rules are now being downloaded over HTTPS rather than HTTP
Updated packages: bind 9.11.4-P1, iproute2 4.18.0, ntp 4.2.8p12, openssh 7.8p1, parted 3.2, pciutils 3.5.6, rng-tools 6.4, syslinux 6.04-pre1, unbound 1.8.0

Add-Ons:

Updated packages: nano 3.1, postfix 3.3.1

[close]

http://www.ipfire.org/download
Titel: IPFire 2.21 Core 125
Beitrag von: SiLæncer am 26 November, 2018, 21:00
Changelog

802.11ac WiFi:

The IPFire Access Point add-on now supports 802.11ac WiFi if the chipset supports it. This allows better coverage and higher network throughputs. Although IPFire might not be the first choice as a wireless access point in larger environments, it is perfect to run a single office or apartment.
Additionally, a new switch allows to disable the so called neighbourhood scan where the access point will search for other wireless networks in the area. If those are found, 40 MHz channel bandwidth is disabled leading to slower throughput.

Misc:

strongswan 5.7.1: This updated fixes various security vulnerabilities filed under CVE-2018-16151, CVE-2018-16152 and CVE-2018-17540. Several flaws in the implementation that parsed and verified RSA signatures in the gmp plugin may allow for Bleichenbacher-style low-exponent signature forgery in certificates and during IKE authentication.
The IO graphs now support NVMe disks
The SFTP subsystem is enabled again in the OpenSSH Server
Swap behaviour has been changed so that the kernel will make space for a large process when not enough physical memory is available. Before, sudden jumps in memory consumption where not possible and the process requesting that memory was terminated.
The backup scripts have been rewritten in Shell and now package all add-ons backups with the main backup. Now, it is no longer required to save any add-on configuration separately.
Updated packages: apache 2.4.35, bind 9.11.4-P2, coreutils 8.30, dhcpcd 7.0.8, e2fsprogs 1.44.4, eudev 3.2.6, glibc 2.28, gnutls 3.5.19, json-c 0.13.1, keyutils 1.5.11, kmod 25, LVM2 2.02.181, ntfs-3g 2017.3.23, reiserfsprogs 3.6.27, sqlite 3.25.2.0, squid 3.5.28, tzdata 2018g, xfsprogs 4.18.0

New Add-Ons:

dehydrated - A lightweight client to retrieve certificates from Let's Encrypt written in bash
frr, an IP routing protocol suite and BGP and OSPF are supported on IPFire. Find out more on their website.
observium-agent - An xinet.d-based agent for Observium, a network monitoring platform

Updated Add-Ons:

clamav has been updated to 0.100.2 and the virus database files have been moved to the /var partition. This makes more space available on the root partition.
nfs 2.3.3, haproxy 1.8.14, hostapd 2.6, libvirt 4.6.0, tor 0.3.4.9

[close]

http://www.ipfire.org/download
Titel: IPFire 2.21 Core 126
Beitrag von: SiLæncer am 10 Januar, 2019, 21:00
Changelog

Linux 4.14.86:

The kernel has been updated to the latest version of the Linux 4.14.x branch which brings various improvements around stability, enhances performance and fixes some security vulnerabilities. This kernel also has major updates for the Spectre and Meltdown vulnerabilities that remove previously existent performance penalties in some use-cases.
The kernel's modules are now compressed with the XZ algorithm which will save some space on disk as the kernel is one of the largest components of IPFire.

Misc:

openssl has been updated to 1.1.0j and 1.0.2q which fixes some minor security issues and has various bug fixes
The bind package has now changed to ship shared libraries which it did not before. Those allow that commands like dig and host use those shared libraries and are no longer statically linked. This makes the files a lot smaller.
Stéphane Pautrel has substantially improved the French translation of IPFire. Thank you very much for that!

Add-ons:

Updated packages: bird 2.0.2, nano 3.2
New packages: shairport-sync

[close]

http://www.ipfire.org/download
Titel: IPFire 2.21 Core 127
Beitrag von: SiLæncer am 06 Februar, 2019, 19:00
Changelog

Squid 4.5 - Making the web proxy faster and more secure:

We have finally updated to squid 4.5, the latest version of the web proxy working inside IPFire. It has various improvements in speed due to major parts being rewritten in C++.
We have as well changed some things on the user interface to make its configuration easier and to avoid any configuration mistakes.
One of the major changes is that we have removed a control that allowed to configure the number of child processes for each redirector (e.g. URL filter, Update Accelerator, etc.). This is now statically configured to the number of processors. Due to that, we only use as many processes as the system has memory for but allow to use maximum CPU power by being able to saturate all cores at the same time. That makes the URL filter and other redirectors faster and more efficient in their resource consumption. They will now also be launched at the start of the web proxy so that there is no wait any more for the first request being handled or when the proxy is under higher load.
We expect these improvements to make proxies that serve hundreds or even thousands of users at the same time to become faster by being more efficient.
We have dropped some features that no longer make sense in 2019: Those are the web browser check and download throttling by file extension. Since the web is migrating more and more towards HTTPS, those neither work for all the traffic, nor are they very reliable or commonly used.
We have also removed authentication against Microsoft Windows NT 4.0 domains. Those authentication protocols used back then are unsafe for years and nobody should be using those any more. Please consider this when updating to this release.
We have also mitigated a security issue in the proxy authentication against Microsoft Windows Active Directory domains. Due to squid's default configuration, an authenticated user was remembered by their IP address for up to one second. That means that with an authenticated browser, any other software coming from the same system was allowed for one second to send requests to the web proxy being properly authenticated. This could have been exploited by malware or other software running inside a virtual machine or similar services to get access to the internet without having valid credentials. This is now resolved and (re-)authorisation is always required.
New installations will now be recommended to set up a proxy with slightly more cache in memory and no cache on disk. Ultimately, this is something that should be considered for each installation individually, but is a better default than the previous values.
Furthermore, some minor usability improvements of the web proxy configuration page have been implemented.

DNS Forwarding:

The DNS forwarding feature has been extended to make using it more flexible. It now accepts hostnames as well as IP addresses to forward requests to multiple servers that are found by resolving the hostname. It is also possible to add multiple servers as a comma-separated list so that multiple servers can be queries for one single domain. Before only one IP address was supported which rendered the domain unresolvable in case of that specific server becoming unreachable.
These changes allow to redirect requests to DNS blacklists for example directly to the right name servers and not worry about any changes of IP addresses at the provider. There is also load-balancing between multiple servers and the fastest server is being preferred so that DNS resolution for all domains is faster and more resilient, too.

Misc:

Kernel modules that initialised framebuffer are no longer being loaded again. This cause some crashes on various hardware with processors from VIA and was a regression introduced by compression kernel modules with the last Core Update.
Creating certificates for IPsec and OpenVPN threw an error before which has now been fixed by ensuring that the internal certificate database is initialised correctly
We have enabled a Just-In-Time compiler for the Perl Regular Expressions engine. This will increase speed of various modules that use it like the Intrusion Detection system which might have significantly more throughput as well as speed of the URL filter and various other components on the system.
fireinfo now supports authentication against any upstream web proxies
Installing IPFire from ISO on i586-based systems failed because of a bug in the EFI code of the installer. This has now been fixed.
Installing IPFire on XFS filesystems is now also working again. Before, the installed system was not able to boot because GRUB did not support some modern file system features.
The description on which SSH port IPFire is listening has been fixed.
Connection Tracking support is now enabled by default for Linux Virtual Servers, i.e. layer-4 load-balancers.
GeoIP: Scripts have been updated to use a new format of the GeoIP database
Updated packages: bind 9.11.5-P1, ipvsadm 1.29, Python 2.7.15, snort 2.9.12, sqlite 3.26.0 which fixes a couple of security vulnerabilities, squid 4.5, tar 1.31 which fixes a couple of security vulnerabilities, unbound 1.8.3, wget 1.20.1

Add-ons:

Updated packages: clamav 0.101.1, libvirt 4.10 which fixes some problems with stopping and resuming virtual machines, mc 4.8.22, transmission 2.94
The haproxy package now correctly handles its backup

[close]

http://www.ipfire.org/download
Titel: IPFire 2.21 Core 129
Beitrag von: SiLæncer am 10 April, 2019, 18:00
Changelog

IPsec Reloaded:

IPsec has been massively extended. Although IPsec in IPFire is already quite versatile and delivered high performance, some features for experts were required and are now available through the web UI...
Routed VPNs with GRE & VTI [2]
Transport Mode for net-to-net tunnels
IPsec connections can now originate from any public IP address of the IPFire installation. This can be selected on a per-connection basis.
The code has also been cleaned up the UI has been made a little bit tidier to accommodate for the new settings.

Smaller changes include:

The "On-Demand" mode is finally the default setting. Tunnels will shut down when they are not used and they will be established again when they are required.

Misc:

DHCP: A crash has been fixed when filenames containing a slash have been entered for PXE boot.
DHCP: Editing static leases has been fixed
Domains in the "DNS Forwarding" section can now be disabled for DNSSEC validation. This is a dangerous change, but has been requested by many users.
Updated packages: bind 9.11.6, groff 1.22.4, ipset 7.1, iptables 1.8.2, less 530, libgcrypt 1.8.4, openssl 1.1.1b, openvpn 2.4.7, squid 4.6, tar 1.32, unbound 1.9.0, wpa_supplicant 2.7
New commands: kdig 2.8.0
The build system has been optimised to reduce build time of the whole distribution to around 4-5 hours on a fast machine.

Add-Ons:

Alexander Koch has contributed zabbix_agentd which is the agent that is installed on the monitored machine. With this [3], IPFire can now be integrated into an environment that is monitored by Zabbix.
On that note, the SNMP daemon has also been updated to version 5.8 for people who use the SNMP protocol for monitoring.
tor has been updated to 0.3.5.8 and some minor bugs have been fixed in the web user interface
The spectre-meltdown-checker script is available as an add-on which allows IPFire users to test their hardware for vulnerabilities
Other updates: amavisd 2.11.1, hostapd 2.7, postfix 3.4.3

[close]

http://www.ipfire.org/download
Titel: IPFire 2.21 Core 130
Beitrag von: SiLæncer am 17 April, 2019, 20:00
Changelog

Apache 2.4.39: The Apache Web Server, which runs the IPFire Web User Interface, was vulnerable for various privilege escalations (CVE-2019-0211), access control bypasses (CVE-2019-0215, CVE-2019-0217), DoS attacks (CVE-2019-0197), buffer overflow (CVE-2019-0196) and a URL normalisation inconsistency (CVE-2019-0220). They are all regarded to be of "low" severity.
wget 1.20.3: wget has had multiple vulnerabilities that allowed an attacker to execute arbitrary code (CVE-2019-5953).
clamav 0.101.2: ClamAV, the virus scanner, has had multiple vulnerabilities that allowed DoS and a buffer overflow in a bundled third-party library.

IPsec Regression:

The last update introduced a regression in the IPsec stack that caused that the firewall could no longer access any hosts on the remote side when the tunnel was run in tunnel mode without any VTI/GRE interfaces. This update fixes that.

[close]

http://www.ipfire.org/download
Titel: IPFire 2.21 Core 131
Beitrag von: SiLæncer am 16 Mai, 2019, 21:00
Release Notes



Finally, we are releasing another big release of IPFire. In IPFire 2.23 - Core Update 131, we are rolling out our new Intrusion Prevention System. On top of that, this update also contains a number of other bug fixes and enhancements.

Thank you very much to everyone who has contributed to this release. If you want to contribute, too, and if you want to support our team to have more new features in IPFire, please donate today!
A New Intrusion Prevention System

We are finally shipping our recently announced IPS - making all of your networks more secure by deeply inspecting packets and trying to identify threats.

This new system has many advantages over the old one in terms of performance, security and it simply put - more modern. We would like to thank the team at Suricata on which it is based for their hard work and for creating such an important tool that is now working inside of IPFire.

We have put together some documentation on how to set up the IPS, what rulesets are supported and what hardware resources you will need.
Migration from the older Intrusion Detection System

Your settings will automatically be converted if you are using the existing IDS and replicated with the new IPS. However, you will need to select the ruleset and rules that you want to use again, since those cannot be migrated. Please note that the automatic migration will enable the new IPS, but in monitoring mode only. This is that we won't break any existing configurations. Please disable the monitoring mode if you want the IPS to filter packets, too.

If you restore an old backup, the IDS settings won't be converted.

The guardian add-on is no longer required any more for the IDS to work but still provides means against SSH brute-force attacks and brute-force attacks against the IPFire Web UI.
OS Updates

This release rebases the IPFire kernel on 4.14.113 which brings various bug and security fixes. We have disabled some debugging functionality that we no longer need which will give all IPFire systems a small performance boost.

Updated packages: gnutls 3.6.7.1, lua 5.3.5, nettle 3.4.1, ntp 4.2.8p13, rrdtool 1.7.1, unbound 1.9.1. The wireless regulatory database has also been updated.
Misc.

    SSH Agent Forwarding: This can now be enabled on the IPFire SSH service which allows administrators to connect to the firewall and use SSH Agent authentication when using the IPFire as a bastion host and connecting onwards to an internal server.
    When multiple hosts are created to overwrite the local DNS zone, a PTR record was automatically created too. Sometimes hosts might have multiple names which makes it desirable to not create a PTR record for an alias which can now be done with an additional checkbox.
    A bug in the firewall UI has been fixed which caused that the rule configuration page could not be rendered when the GeoIP database has not been downloaded, yet. This was an issue when a system was configured, but never connected to the internet before.
    On systems with a vast number of DHCP leases, the script that imports them into the DNS system has been optimised to make sure that they are imported faster and that at no time a half-written file is available on disk which lead unbound to crash under certain circumstances.
    Some minor UI issues on the IPsec VPN pages have been fixed: On editing existing connections, the MTU field is now filled with the default;
    We are no longer trying to search for any temperature sensors on AWS. This caused a large number of error messages in the system log.

Add-ons

    Package updates: borgbackup 1.1.9, dnsdist 1.3.3, freeradius 4.0.18, nginx 1.15.9, postfix 3.4.5, zabbix_agentd 4.2.0
    tor has received an extra firewall chain for custom rules to control outgoing traffic (TOR_OUTPUT). This allows to create rules for traffic that originates from the local tor relay. The service is also running as an own user now.
    Wireless Access Point: It is now possible to enable client isolation so that wireless clients won't be able to communicate with each other through the access point.

New Packages

    flashrom - A tool to update firmware

[close]

https://www.ipfire.org/download
Titel: IPFire 2.21 Core 132
Beitrag von: SiLæncer am 09 Juni, 2019, 00:00
Release Notes

    Intel Vulnerabilities: RIDL, Fallout & ZombieLoad:

    Two new types of vulnerabilities have been found in Intel processors. They cannot be fixed unless the hardware is changed, but can be somewhat mitigated through some changes in the Linux kernel (4.14.120) and an update microcode (version 20190514). Both is shipped in this release.

    VLAN Configuration:

    Florian Bührle has contributed a UI to configure VLAN interfaces for zones. This way, it can be done graphically and the system needs to be rebooted to apply the changes.
    The GUI also allows to set up a zone in bridge mode which is helpful for advanced users who need some custom configuration.

    Misc:

    The new IPS now starts on systems with more than 16 CPU cores
    For improved security of the web UI, the web service now prefers ciphers in GCM mode over CBC. This is because CBC seems to be weakened by new attack vectors.
    OpenVPN has received some changes to the UI and improvements of its security.
    Alexander Koch sent in some changes around the wpad.dat handling: It is now possible to define a list of exceptions to this file on the web UI and all VPN networks are included by default.
    Captive Portal: A stored cross-site scripting vulnerability has been fixed in the argument handling of the title; an uploaded logo file can now be deleted
    The same type of stored cross-site scripting attack was resolved in the static routing UI
    Log entries for Suricata now properly show up in the system log section
    Updated packages (all from Matthias Fischer): bind 9.11.6-P1, dhcpcd 7.2.2, knot 2.8.1, libedit 20190324-3.1

    Add-ons:

    Wireless AP:

    For hardware that supports it, Automatic Channel Selection can be enabled, which scans the environment and automatically selects the best channel for the wireless access point. When it is activated, 80 MHz channel bandwidth will be enabled for 802.11ac networks doubling throughput.
    DFS is supported (on hardware that supports it, too) which is needed to use higher channels in the 5 GHz spectrum
    Management Frame Protection can optionally be enabled to encrypt messages between the station and the access point. This prevents a rogue attacker to deauthenticate stations from the wireless LAN or other denial-of-service attacks.

    Updates:

    igmpproxy 0.2.1, tor 0.4.0.5, zabbix_agentd 4.2.1
    Qemu is now being hardened with libseccomp which is a "syscall firewall". It limits what actions a virtual machine can perform and is enabled by default


[close]

https://www.ipfire.org/download
Titel: IPFire 2.21 Core 134
Beitrag von: SiLæncer am 05 Juli, 2019, 14:00
Release Notes

    SACK Panic (CVE-2019-11477 & CVE-2019-11478):

    The Linux kernel was vulnerable for two DoS attacks against its TCP stack. The first one made it possible for a remote attacker to panic the kernel and a second one could trick the system into transmitting very small packets so that a data transfer would have used the whole bandwidth but filled mainly with packet overhead.
    The IPFire kernel is now based on Linux 4.14.129, which fixes this vulnerability and fixes various other bugs.
    The microcode for some Intel processors has also been updated and includes fixes for some vulnerabilities of the Spectre/Meltdown class for some Intel Xeon processors.

    Misc:

    Package updates: bind 9.11.8, unbound 1.9.2, vim 8.1
    The French translation has been updated by Stéphane Pautrel and translates various strings as well as improving some others
    We now prefer other cipher modes over CBC when IPFire itself opens a TLS connection. CBC is now considered to be substantially weaker than GCM.
    Email addresses entered in the web UI can now contain underscores.
    The Captive Portal now comes up properly after IPFire is being rebooted.



[close]

https://www.ipfire.org/download
Titel: IPFire 2.21 Core 135
Beitrag von: SiLæncer am 19 September, 2019, 21:00
Release Notes

    Kernel Update:

    The IPFire Linux kernel has been rebased on 4.14.138 and various improvements have been added. Most notably, this kernel - once again - fixes CPU vulnerabilities.

    Misc:

    On x86_64, the effectiveness of KASLR has been improved which prevents attackers from executing exploits or injecting code
    DNS: unbound has been improved so that it will take much less time to start up in case a DNS server is unavailable.
    Scripts that boot up IPFire have been improved, rewritten and cleaned up for a faster boot and they now handle some error cases better
    Updated packages: dhcpcd 7.2.3, nettle 3.5.1, squid 4.8, tzdata 2019b

    Add-ons:

    bird 2.0.4
    clamav 0.101.3
    iperf 2.0.13
    iperf3 3.7
    mc 4.8.23
    pcengines-firmware 4.9.0.7

[close]

https://www.ipfire.org/download
Titel: IPFire 2.21 Core 136
Beitrag von: SiLæncer am 11 Oktober, 2019, 21:00
Release Notes

    OpenSSL 1.1.1d:

    This update ships the latest update of the OpenSSL library which has received some important fixes in its latest release...
    CVE-2019-1547: With custom elliptic curves, timing attacks were made possible again. This is of very low risk in IPFire, since we are not using any custom curves.
    CVE-2019-1549: Forked processes could have shared the same seed for their random number generator which is being fixed in this one by mixing in a high precision timer.
    CVE-2019-1563: Another padding oracle for large PKCS7 messages
    All of these are classified as "low severity". However, we recommend to install this update as soon as possible.

    Perl 5.30:

    Arne has been busy and been working on replacing Perl with the latest stable version. This requires that loads of applications that use Perl - like our own web user interface - have to be shipped again as well as many add-ons. Hence this update is rather large.

    GeoIP:

    Since Maxmind is no longer publishing their GeoIP database in the original format, but unfortunately not providing any good bindings for the new release, we have only had an outdated version of the database that we made available in IPFire.
    There is now a script that converts the current data into the old format which allows us to provide a recent database again.
    This database is however only being used for showing the country flags on the web UI. GeoIP blocking uses a database in a different format and therefore always has recent data to only block the right things.

    Misc:

    The firewall has a limit for log messages so that flooding the firewall with packets won't cause a Denial-of-Service by filling up the hard drive with gigabytes of logs and also to not starve on write operations. This limit was however very low for modern standards and has therefore been increased to 10 logged packets per second. That will ensure that we won't drop a packet without logging it.
    Updated packages: apache 2.4.41, bind 9.11.10, clamav 0.101.4, dhcpcd 8.0.3, knot 2.8.3, logrotate 3.5.1, openssh 8.0p1, patch 2.7.6, texinfo 6.6, unbound 1.9.3, usb_modeswitch 1.5.2
    logwatch and logrotate could conflict when running at the same time. This has been changed so only one of them is running at the same time.
    Log messages for DMA, the IPFire mailer, and Postfix are now shown on the web UI
    The toolchain now ships a compiler for Go

    Add-ons

    Updated packages: freeradius 3.0.19, haproxy 2.0.5, postfix 3.4.6, spamassassin 3.4.2, zabbix_agent 4.2.6
    dnsdist has had its limit of open connections increased to work better in bigger environments
    tor: A permission problem has been fixed so that the web UI can save settings again
    wio: The RRD files will now be included in the backup as well as various UI improvements have been done

[close]

https://www.ipfire.org/download
Titel: IPFire 2.21 Core 137
Beitrag von: SiLæncer am 17 November, 2019, 10:00
Release Notes

    An improved and faster QoS:

    As explained in detail in a separate blog post from the engine room, we have been working hard on improving our Quality of Service (QoS).
    It allows to pass a lot more traffic on smaller systems as well as reduces packet latency on faster ones to create a more responsive and faster network.
    To take full advantage of these changes, we recommend to reboot the system after installing the update.

    Linux 4.14.150:

    The IPFire Kernel has been rebased on Linux 4.14.150 and equipped with our usual hardening and other patches.
    The kernel has been tuned to deliver more throughput for IP connections as well as reducing latency to a minimum to keep your network as responsive and fast as possible.
    An especially nasty bug that caused the system to drop DNS packets when the Intrusion Detection System was enabled has been tracked down by a large group of IPFire developers and additional help of the suricata team.

    Misc:

    Downloaded GeoIP databases were not always cleaned up from /tmp when a download was unsuccessful. This can cause that the script is filling up the root partition. You can reboot your system to free up space if this has happened to you, too. The script has now been cleaned up, and catches any errors to cleanup afterwards.
    IPsec now supports Curve 448 with 224 bit of security. It is a lightweight and slightly faster alternative to Curve25519 and enabled by default for new connections.
    Tim Fitzgeorge contributed a patch that restarts the syslog daemon after a backup is being restored to close old log files and write to the restored ones
    /var/log/mail is now being rotated
    Updated packages: bind 9.11.12, iptables 1.8.3, iproute2 5.3.0, knot 2.8.4, libhtp 0.5.30, libnetfilter_queue 1.0.4, libpcap 1.9.1, libssh 0.9.0, Net-SSLeay 1.88, pcre 8.43, strongswan 5.8.1, suricata 4.1.5, tzdata 2019c, unbound 1.9.4, wpa_supplicant 2.9

    Add-ons:

    New: speedtest-cli
    This is a handy tool to perform a regular speedtest on the console. It was packaged to test the QoS but is handy to test throughput of the firewall to and from the Internet on the console.

    Updated Packages:

    bird 2.0.6 now supports RPKI validation by connecting to a process that holds the key material either via TCP or using SSH
    sane has been updated to version 1.0.28 and now supports more hardware
    A French translation is now available for the Who is Online? add-on
    Others: clamav 0.102.0, hostapd 2.9, ipset 7.3, mtr 0.93, nano 4.5, ncat 7.80, nmap 7.80, shairport-sync 3.3.2, tcpdump 4.9.3, tor 0.4.1.6, tshark 3.0.5


[close]

https://www.ipfire.org/download
Titel: IPFire 2.21 Core 138
Beitrag von: SiLæncer am 19 November, 2019, 21:00
Release Notes

    Intel Vulnerabilities:

    Intel has blessed us again with a variety of hardware vulnerabilities which need to be mitigated in software. Unfortunately those will further decrease the performance of your IPFire systems due to changes in Intel's microcodes which are also shipped with this Core Update.

[close]

https://www.ipfire.org/download
Titel: IPFire 2.21 Core 139
Beitrag von: SiLæncer am 09 Januar, 2020, 18:00
Release Notes

    Improved Booting & Reconnecting:

    Dialup scripts have been cleaned up to avoid any unnecessary delays after the system has been handed a DHCP lease from the Internet Service Provider. This allows the system to reconnect quicker after loss of the Internet connection and booting up and connecting to the Internet is quicker, too.

    Improvements to the Intrusion Prevention System:

    Various smaller bug fixes have been applied in this Core Update which makes our IPS a little bit better with every release. To take advantage of deeper analysis of DNS packets, the IPS is now informed about which DNS servers are being used by the system.

    TLS:

    IPFire is configured as securely as possible. At the same time we focus on performance, too. For connections to the web user interface, we do not allow using CBC any more. This cipher mode is begin to crack and the more robust GCM is available.
    Whenever an SSL/TLS connection is being established to the firewall, we used to prefer ChaCha20/Poly1305 as a cipher. Since AESNI is becoming and more and more popular even on smaller hardware, it makes sense to prefer AES. A vast majority of client systems support this as well which will allow to communicate faster with IPFire systems and save battery power.

    Misc:

    The microcode for Intel processors has been updated again to mitigate vulnerabilities from the last Core Update
    PC Engines APU LEDs are now controlled using the ACPI subsystem which is made possible using the latest BIOS version 4.10.0.3
    Captive Portal: Expired clients are now automatically removed
    Dynamic DNS: Support for NoIP.com has been fixed in ddns 12
    Updated packages: Python 2.7.17, bash 5.0, bind 9.11.13, cpio 2.13, libarchive 3.4.0, logwatch 7.5.2, lz4 1.9.2, openvpn 2.4.8, openssh 8.1p1, readline 8.0 (and compat version 6.3), squid 4.9, unbound 1.9.5

    Add-Ons:

    clamav has been updated to 0.102.1 which include various security fixes
    libvirt has been updated to version 5.6.0 for various bug fixes or feature enhancements and support for LVM has been enabled.
    qemu has been updated to 4.1.0
    Various others: nano 4.6, postfix 3.4.8, spectre-meltdown-checker 0.42

[close]

https://www.ipfire.org/download
Titel: IPFire 2.25 Core Update 141
Beitrag von: SiLæncer am 22 Februar, 2020, 20:00
Release Notes -> https://blog.ipfire.org/post/ipfire-2-25-core-update-141-is-available-for-testing

https://www.ipfire.org/download
Titel: IPFire 2.25 - Core Update 142
Beitrag von: SiLæncer am 10 März, 2020, 20:30
Release Notes -> https://blog.ipfire.org/post/ipfire-2-25-core-update-142-is-available-for-testing

https://www.ipfire.org/download
Titel: IPFire 2.25 - Core Update 144
Beitrag von: SiLæncer am 24 Mai, 2020, 20:45
Release Notes -> https://blog.ipfire.org/post/ipfire-2-25-core-update-144-released

https://www.ipfire.org/download
Titel: IPFire 2.25 - Core Update 145
Beitrag von: SiLæncer am 02 Juni, 2020, 04:30
Release Notes -> https://blog.ipfire.org/post/ipfire-2-25-core-update-145-is-available-for-testing

https://www.ipfire.org/download
Titel: IPFire 2.25 - Core Update 146
Beitrag von: SiLæncer am 20 Juli, 2020, 14:00
Release Notes

Today, we have updated IPFire on AWS to IPFire 2.25 - Core Update 146 - the latest official release of IPFire.

Since IPFire is available on AWS, we are gaining more and more users who are securing their cloud infrastructure behind an easy to configure, yet fast and secure firewall.

This update brings a new kernel as well as many other exciting changes.

The most important change for the cloud is that on AWS, IPFire will now default to a MTU of 9001 bytes for all internal interfaces. The RED interface will remain on 1500 bytes, since this is the Internet defaults to that size and we prefer IPFire performing any fragmentation and reassembly of packets over Amazon’s network stack.

This allows more network throughput with less overhead.

[close]

https://www.ipfire.org/download
Titel: IPFire 2.25 - Core Update 147
Beitrag von: SiLæncer am 28 Juli, 2020, 18:00
Release Notes

Another update is available for IPFire: IPFire 2.25 - Core Update 147. It contains a vast amount of package updates and brings some security updates.

Security Updates

The squid web proxy had a number of security vulnerabilities that have been patched in version 4.12. Those are:

    CVE-2020-15049 - (SQUID-2020:7) - Cache Poisoning Issue in HTTP Request processing

There was a third vulnerability in the TLS component of squid which is not activated in IPFire and therefore IPFire is not vulnerable (CVE-2020-14058).

Misc.

    The Linux firmware package was updated to version 20200519 and brings various improvements to hardware components and adds support for more hardware.
    A long-standing issue with forwarding GRE connections has been resolved. It was absolutely impossible to get such connections through the firewall, because IPFire's internal connection tracking refused to handle them.
    Amazon Web Services: The firewall will now configure all zones to use jumbo frames by default. Since Amazon's network allows packets with up to 9001 bytes, this will increase bandwidth in the cloud. The RED interface is exempt, because the Internet still defaults to only 1500 bytes per packet.
    Updated packages: bind 9.11.20, dhcpcd 9.1.2, GnuTLS 3.6.14, gmp 6.2.0, iproute2 5.7.0, libassuan 2.5.3, libgcrypt 1.8.5, libgpg-error 1.38, OpenSSH 8.3p1, squidguard 1.6.0

Add-ons

Updates

    Bacula, a backup solution, was updated to version 9.6.5 by Adolf Belka
    borgbackup 1.1.13
    haproxy 2.1.7
    Joe 4.6

[close]

https://www.ipfire.org/download
Titel: IPFire 2.25 - Core Update 148
Beitrag von: SiLæncer am 02 August, 2020, 18:00
Release Notes

This is an update I have personally been waiting for a long time: We finally roll out replacing Maxmind's GeoIP database by our own improved implementation.

IPFire Location

As we have already pre-announced some time ago this side-project inside the IPFire Project is finally ready for prime time.

It comes with a new implementation to build, organise and access a highly optimised database packages with loads of helpful data for our firewall engines, as well as our analytics to analyse where attacks against the firewall are originating from.

With it, IPFire can block attackers from certain countries, or do the opposite - only permit access to certain servers from certain places. Combining rules with the rate-limiting feature allows to limit connections from certain locations which is very helpful for DoS attacks.

No new features have been added, but those that we had have been massively improved. The database is now being updated once a week which makes it more accurate and we no longer require complicated scripts to convert it into different formats to be used in different parts of the operating system.

Instead the database can be opened and ready extremely quickly which allows access in realtime making pages on the web user interface load significantly faster.

We hope that many other projects choose to use our implementation as well, since we have chosen a truly open license for the data as well as the library that works behind it.

[close]

https://www.ipfire.org/download
Titel: IPFire 2.25 - Core Update 149
Beitrag von: SiLæncer am 04 September, 2020, 19:00
Release Notes



We have been busy baking another large update for you which is full of oozy goodness. It includes an updated toolchain based on GCC 10 and glibc 2.32 and we have added a lot of tuning which makes IPFire 33% faster on some systems.

Toolchain Update

IPFire is based on glibc 2.32, the standard library for all C programs, and GCC 10.2, the GNU Compiler Collection. Both bring various bug fixes and improvements.

The most notable change is that we have decided to remove a mitigation Spectre 2 which caused that user space programs in IPFire were running about 50% slower due to using a microcode feature which is called "retpoline". Those "return trampolines" disable the branch prediction engine in out-of-order processors which was considered to help with mitigating leaking any information from any unaccessible kernel space.

This is however not as effective as thought and massively decreases performance in the user land which mainly affects features like our Intrusion Prevention System, Web Proxy and URL filter. We still use this mechanism to avoid leaking any kernel memory into the user space.

On top of that, we have updated various tools used for building IPFire as well as core libraries.

We have also enabled a new GCC feature called "stack clash protection" on x86_64 and aarch64 which adds additional checks to mitigate exploits and we have enabled "CF protection" which hardens all software against attackers gaining control over a program flow and circumventing security checks like password or signature validation.

BootHole, aka GRUB 2.04

As reported on the media, there were various security vulnerabilities in the GRUB boot loader which is used in IPFire on x86_64, i586 and aarch64. These have now been patched in IPFire and the new boot loader is installed automatically.

Intel Security Vulnerabilities & Virtual Machines

In May 2019, we have announced to disable SMT on all machines. This is now disabled for any virtual machines since the mitigation is required to be activated on the host system.

Emulated processors might run on multiple physical processors which IPFire in a virtual machine has no control over. However, we still recommend against running IPFire in a virtual environment.

Deprecating i586

This release also officially degrades the i586 architecture to a secondary architecture. On the download page, you will already find downloads for that architecture at the bottom of the page.

This is because various security mitigations are not available for i586 and development work on the Linux kernel and other software that IPFire relies on is mainly done for x86_64 or other modern 64 bit architectures. This is a development that we saw coming for a while now, and despite that we will try to keep IPFire available in this architecture.

We urge everyone who's hardware supports it to update their systems to x86_64. You will see a notification on the web user interface if you are affected.

Misc.

    OpenSSL: We have removed all ciphers that do not support Perfect Forward Secrecy from the default cipher list. That means that all programs in IPFire that initiate TLS connections will no longer accept any "weak" ciphers without PFS.
    OpenVPN
        In order to make IPFire compliant with PCI DSS, OpenVPN requires all clients to use TLS 1.2 or newer. This change is automatically enabled on all systems and very old clients might need to be updated. Please check if you are using any outdated clients before updating.
        The maximum number of simultaneous OpenVPN connections can now be set to up to 1024 and was limited to 255 before.
    New packages: zstd, a modern and fast compression algorithm is now part of IPFire
    Updated packages: apache 2.4.46, bind 9.11.21, bison 3.7.1, curl 7.71.1, GRUB 2.04, intel-microcode 20200616, hyperscan 5.3.0, iproute2 5.8.0, kbd 2.2.0, logrotate 3.17.0, lsof 4.91, mpfr 4.1.0, popt 1.18, unbound 1.11.0, xfsprogs 5.7.0

Add-ons

    Updated: clamav 0.102.4, dnsdist 1.5.0, haproxy 2.2.2, fping 5.0, libvirt 6.5.0, minicom 2.7.1, nfs 2.5.1, postfix 3.5.6, qemu 5.0.0, rsync 3.2.3, spandsp 0.0.6, tor 0.4.3.6, tshark 3.2.6, usbredir 0.8.0, watchdog 5.16, WIO
    Marcel Follert has contributed a new package: socat, a CLI tool which can be used to communicate with UNIX sockets.

We ask everyone who can to install this update and report and feedback back to us. That way, you can help to make IPFire better and contribute to the community. If you cannot test, you can donate!

[close]

https://www.ipfire.org/download
Titel: IPFire 2.25 - Core Update 150
Beitrag von: SiLæncer am 29 September, 2020, 21:00
Release Notes

The upcoming Core Update is available for testing: It brings an updated kernel, various package updates and bug fixes.

Linux 4.14.198

The IPFire kernel is now based on Linux 4.14.198 which brings various security and stability fixes in the network stack as well as improvements throughout the whole rest of the kernel.

In connection with this, the new Location database has received some bug fixes. Formerly, some networks could not be found in the extracted part of the database which was loaded into the kernel. This has been fixed and there will be no more false-positives for selected countries.

Connection Tracking Graph

We have extended the monitoring features of IPFire which introduce a new graph with the size of the connection tracking table. It shows how many connections are open at the same time and helps to debug any networking issues or overload.

In addition to that, the CPU graph has been fixed. An empty graph was rendered after the number of processor cores has changed.

Add-ons

    Updated packages: clamav 0.103.0, htop 3.0.2, nano 5.2, postfix 3.5.7

[close]

https://www.ipfire.org/download
Titel: IPFire 2.25 - Core Update 152
Beitrag von: SiLæncer am 15 November, 2020, 09:00
Release Notes

It is time for another Core Update: IPFire 2.25 - Core Update 152. It comes with various smaller bug fixes and improvements and updates the Windows File Sharing Add-on.

IPFire is a small team of people from a range of backgrounds sharing one goal: make the Internet a safer place for everyone. Like many of our open source friends, we’ve taken a hit this year and would like to ask for your continued support. Please follow the link below where your donation can help fund our continued development: https://www.ipfire.org/donate
Changes

    Intrusion Prevention System: The IPS has been updated to suricata 5.0.4 which fixes various bugs and security vulnerabilities
    Leo-Andres Hofman contributed for the first time and cleaned up code that shows the DHCP leases on the web user interface. They are now sorted and expired leases are shown at the bottom of the list for better usability.
    Steffen Klammer fixed a bug which rendered an invalid proxy.pac configuration file when subnets where added in the CIDR notation
    Values for average, minimum and maximum were swapped in the firewall hits graph which has been corrected in this release
    Updated packages: knot 3.0.1, libhtp 0.94, python 2.7.18, python3 3.8.2, unbound 1.12.0, yaml 0.2.5

Add-ons

    Updated packages: mtr 0.94, nano 5.3, tor 0.4.4.5
    Updated Python 3 packages: botocore 1.16.1, colorama 0.4.3, dateutil 2.8.1, docutils 0.16, jmespath 0.9.5, pyasn1 0.4.8, rsa 4.0, s3transfer 0.3.3, six 1.14.0,

Windows File Sharing Services

Samba, has been updated to 4.13.0. Because of various reasons and lack of development time, we were stuck on Samba 3 which is unmaintained for a while. With this new version of Samba, new protocol features like SMB3 and encryption are supported. We have also rewritten large parts of the web user interface, made them tidier and fixed some usability issues.

We also dropped some features which we believe are not being used any more. This mainly concerns compatibility to MS-DOS clients, WINS, and using IPFire as Primary Domain Controller for Windows NT domains.

The new streamlines web user interface provides fewer controls and we have changed some defaults to work in modern networks - or that were ineffective in the newer release of Samba.

New features are as follows:

    Printing with CUPS now works out of the box
    SMB file transfers are faster, because of some performance tuning
    IPFire will now always try to become the master browser for its workgroup
    The file sharing and printing services will be announced to the local network using mDNS with Avahi
    Extensions for Mac OS X are enabled by default

Because of the vast amount of changes, we need some extra help to find any regressions introduced here. Please also consider if running this package is following best-practise rules in your organization.

[close]

https://www.ipfire.org/download
Titel: IPFire 2.25 - Core Update 153
Beitrag von: SiLæncer am 12 Januar, 2021, 22:00
Release Notes

This is the official release announcement for the last planned Core Update of this year: IPFire 2.25 - Core Update 153.

Before we talk about what is new, I would like to as you for your support for our project. IPFire is a small team of people from a range of backgrounds sharing one goal: make the Internet a safer place for everyone. Like many of our open source friends, we’ve taken a hit this year and would like to ask for your continued support. Please follow the link below where your donation can help fund our continued development: https://www.ipfire.org/donate
Location Database

The location database has received significant updates that improve its accuracy. This was possible by importing more data into it and correlating it with existing data from other sources.

We have also improved performance of loading data from the database into the kernel for firewall rules which removes a class of issues where IP addresses could have matched more than one country.

Many weeks have been invested into this to optimise the database import and export algorithms to provide this functionality even on hardware that is weak on processor power and/or memory.
WPA3 - Making WiFi Safe Again

WPA3 is the new upcoming standard to protect wireless connections and is now supported in IPFire. It can be enabled together with WPA2 so that you can support any devices that do not support WPA3, yet.

WiFi can also be made more secure by optionally enable Management Frame Protection which hardens the network against any attackers that try to de-authenticate stations and therefore denial-of-service your network.

There is more on a detailed post about this new feature: IPFire Wireless Access Point: Introducing WPA3
Another Intel Security Vulnerability

We have of course spent a lot of our valuable development time on this month's security issues created by Intel. As you might have heard from the news, it is possible to profile instructions and extrapolate information through measuring the power consumption of the processor when that instruction is being executed.

We consider this not exploitable on IPFire, because we do not allow running any third-party code, but are of course shipping fixes in form of a patched Linux kernel based on 4.14.212 and updated microcode where available for all affected processors (version 20201118).
Misc.

    The most recent OpenSSL security vulnerability CVE-2020-1971 has been patched by updating the package to version 1.1.1i
    Safe Search now allows excluding YouTube
    The zone configuration page now highlights network devices that are assigned to a zone. This change improves usability and avoids any mistakes
    IPsec tunnels are now showing correctly when they are established or not. A programming error could show connected tunnels as "connecting..." before.
    The log summary no longer shows useless entries for clients that have renewed their DHCP lease and the iptables summary has been removed, since it does not produce any useful output
    The IP address information page is now showing the Autonomous System for each IP address
    Some cosmetic improvements for the web user interface have been implemented by Matthias Fischer.
    On systems with insufficient memory, some pages of the web user interface could not be loaded when they were using the new location library. Thanks to Bernhard Bitsch for reporting this problem.
    DDNS: Support for DuckDNS has been reinstated after a significant API change
    Updated packages: bash 5.0.18, curl 7.73.0, file 5.39, go 1.15.4, knot 3.0.2, libhtp 0.5.63, openvpn 2.5.0, pcengines-firmware 4.12.0.6, strongswan 5.9.1, suricata 5.0.5, tzdata 2020d, usb_modeswitch 2.6.1, usb_modeswitch_data 20191128

Add-ons

    Updated packages: amazon-ssm-agent 3.0.356.0, aws-cli 1.18.188, ghostscript 9.53.3, libseccomp 2.4.4, lynis 3.0.1, python-botocore 1.19.28, python-urllib3, spectre-meltdown-checker 0.44, transmission 3.00, vdr 2.4.4
    Tor has been updated to version 0.4.4.6 and is now using the new location database for showing the relay country. It is also now possible to define a list of exit nodes to use and to select certain countries to use for guard nodes.
    amavis and spamassassin have been dropped because they have been unused and unmaintained for a long time
    git has been fixed so that all features implemented in Perl can be used again.
    The apcupsd package now correctly backups and restores its configuration

[close]

https://www.ipfire.org/download
Titel: OPNsense 21.1
Beitrag von: SiLæncer am 29 Januar, 2021, 21:00
(https://i.postimg.cc/BQw6P33K/screenshot-2881.png)
OPNsense is an open-source, easy-to-use, and easy-to-build HardenedBSD based firewall and routing platform.

License: Open Source

Release Notes -> https://opnsense.org/opnsense-21-1-marvelous-meerkat-released/

https://opnsense.org/about/about-opnsense/
Titel: pfSense 2.5.0
Beitrag von: SiLæncer am 17 Februar, 2021, 20:00
Release Notes

We are excited to announce the release of pfSense® Plus software version 21.02 and pfSense Community Edition (CE) software version 2.5.0, now available for new installations and upgrades!

This is the first release of pfSense Plus software, formerly known as Factory Edition. For more details about the distinctions between pfSense Plus and pfSense CE, read the pfSense Plus Announcement. Customers running the Factory Edition of pfSense software version 2.4.5-p1 and older can upgrade in-place automatically to pfSense Plus software version 21.02 as with any other previous upgrade.

These versions are the result of an immense development effort taking place over the last several years. Over 550 issues are resolved, including bug fixes, new features, and other significant changes.

pfSense Plus software version 21.02-RELEASE updates are available now. For installation images, contact Netgate TAC.

pfSense software Community Edition version 2.5.0-RELEASE updates and installation images are available for download now.
Highlights

The new versions include a long list of significant changes.

Notably, pfSense Plus adds:

    Support for Intel® QuickAssist Technology, also known as QAT.
        QAT accelerates cryptographic and hashing operations on supported hardware, and can be used to accelerate IPsec, OpenVPN, and other OpenCrypto Framework-aware software.
        Supported hardware includes many C3000 and C2000 systems sold by Netgate and some other types of built-in QAT support and add-on cards.
    Improved SafeXcel cryptographic accelerator support for the Netgate SG-2100 and Netgate SG-1100 which can improve IPsec performance.

    Updated IPsec profile export
        Exports Apple profiles compatible with current iOS and OS X versions
        New export function for Windows clients to configure tunnels using PowerShell

Both pfSense Plus and pfSense CE include:

    Base OS upgraded to FreeBSD 12.2-STABLE
    OpenSSL upgraded to 1.1.1
    Performance improvements

    Kernel WireGuard implementation, as mentioned in a previous WireGuard blog post
        WireGuard is a new VPN Layer 3 protocol designed for speed and simplicity
        The pfSense documentation site includes information on how to configure WireGuard as well as example configuration recipes

    IPsec enhancements
        Configuration for the strongSwan IPsec backend was changed from the deprecated ipsec.conf/stroke format to the new swanctl/VICI format
        Various improvements to tunnel configuration, including better options for lifetime and rekey to avoid duplicate security associations

    OpenVPN upgraded to 2.5.0
        OpenVPN 2.5.0 now mandates data cipher negotiation, but also tries to be friendly to older clients
        ChaCha20-Poly1305 is now supported, which is the same cipher used by WireGuard and may offer speed improvements on some platforms
        OpenVPN now disables compression by default because it is insecure, but it can still decompress traffic received from clients while not transmitting compressed packets

    Certificate Manager updates
        The GUI now supports renewing certificate manager entries (certificate authorities and certificates)
        Notifications are generated for expiring certificate entries
        Certificate keys and PKCS #12 archives can now be exported with password protection
        Support was added for elliptic curve (ECDSA) certificates
        Internal and imported CA entries can be added to the system-wide trust store
    Significant changes in Captive Portal backend and HA behavior

For more details, see the Release Notes and Redmine.

[close]

http://www.pfsense.com/
Titel: IPFire 2.25 - Core Update 155
Beitrag von: SiLæncer am 02 April, 2021, 22:00
Release Notes -> https://blog.ipfire.org/post/ipfire-2-25-core-update-155-released-security-advisory

https://www.ipfire.org/download
Titel: IPFire 2.25 - Core Update 156
Beitrag von: SiLæncer am 09 Mai, 2021, 23:00
Release Notes -> https://blog.ipfire.org/post/ipfire-2-25-core-update-156-released

https://www.ipfire.org/download
Titel: IPFire 2.25 - Core Update 157
Beitrag von: SiLæncer am 25 Juni, 2021, 22:00
Release Notes

After a little break, IPFire 2.25 - Core Update 157 is out! This is the largest release in size we have ever had and updates various parts of the operating system and brings an updated kernel.

Since IPFire is built from source and not based on any distribution, we get to select the best versions of open source software to be a part of it. This release is the second part of our "spring clean" release which updates various software packages and we have also dropped software that we no longer need. The vast amount of this work has been done by Adolf Belka who has been spending many nights in front of a compiler trying to make it all work. If you want to support him and the entire development team, please help us with your donation.
Deprecating Python 2

We have made huge efforts to migrate away from Python 2 which has reached its end of life on January 1st of this year. That includes repackaging third-party modules for Python 3 and migrating our own software to Python 3.

The work will continue over the next couple of weeks and we are hopeful to remove all Python 2 code with the next release. We will keep Python 2 around for a little bit longer to give everyone with custom scripts a little bit of time to migrate them away, too.
Misc.

    The IPFire kernel has been rebased on Linux 4.14.232 which brings various security and stability fixes
    Updated packages: bash 5.1.4, boost 1.76.0, cmake 3.20.2, curl 7.76.1, dejavu-fonts-ttf 2.37, expat 2.3.0, file 5.40, fuse 3.10.3, gdb 10.2, glib 2.68.1, iproute2 5.12.0, less 581.2, libaio 0.3.112, libarchive 3.5.1, libcap-ng 0.8.2, libedit 20210419-3.1, libevent2 2.1.12, libexif 0.6.22, libgcrypt 1.9.3, libgpg-error 1.42, libtiff 4.3.0, libupnp 1.14.6, libxcrypt 4.4.20, libxml2 2.9.10, lm_sensors 3.6.0, lua 5.4.3, meson 0.58.0, OpenSSH 8.6p1, perl-Canary-Stability, perl-Convert-TNET 0.18, perl-Convert-UUlib 1.8, perl-Crypt-PasswdMD5 1.41, perl-Digest 1.19, pixman 0.40.0, poppler 21.05.0 (and poppler-data 0.4.10), pppd 2.4.9, readline 8.1, sqlite 3.35.5, squid 4.15, sudo 1.9.7, wireless-regdb 2020.11.20, xfsprogs 5.11.0
    Some packages that are no longer needed for the build process have been dropped
    Peter Müller has cleaned up the web server configuration for the web user interface and removed various quirks and hacks for old software like Microsoft Internet Explorer 8
    Leo-Andres Hofmann has contributed some cosmetic changes for the live graphs
    A security vulnerability has been reported by Mücahit Saratar (#12619) where it was possible to change a script as an unprivileged user due to a file permission error which could later be executed as root. Thank you for reporting this to us.

Add-ons

    Updated packages: cifs-utils 6.13, cups 2.3.3op2, cups-filters 1.28.8, dnsdist 1.6.0, elfutils 0.184, fetchmail 6.4.19, ffmpeg 4.4, libmicrohttpd 0.9.73, mpd 0.22.6, ncat 7.91, nmap 7.91, samba 4.14.4, Tor 0.4.5.8

[close]

https://www.ipfire.org/
Titel: IPFire 2.25 - Core Update 158
Beitrag von: SiLæncer am 22 Juli, 2021, 22:00
Release Notes

IPFire 2.25 - Core Update 158 is generally available. It comes with one-click VPNs for Apple iOS and Mac OS devices as well as with various fixes across the board including security fixes.

Before we talk about what is new, I would like to ask you for your support for our project. IPFire is a small team of people from a range of backgrounds sharing one goal: make the Internet a safer place for everyone. Like many of our open source friends, we’ve taken a hit this year and would like to ask for your continued support. Please follow the link below where your donation can help fund our continued development: https://www.ipfire.org/donate.

IPsec with Apple iOS & Mac OS

It is now possible to export IPsec road warrior connections for Apple devices so that they can easily be imported into those with only a few clicks. This makes creating secure connections with these devices quick and fool-proof - even when certificates are involved.

Various smaller changes come with these changes: Certificates now have sane expiry times (instead of a hundred years).

Unfortunately time did not allow to provide any detailed documentation for this feature, but this will be added in the near future. If you want to help the team, you can do this with your donation.

Misc.

    IPsec
        Curve448 is now listed above Curve25519 since it provides better security, but is computationally more expensive at the same time
        There will no longer be any safety rules installed for IPsec connections in "on-demand" mode. Leaking packets is not possible in this mode and it makes certain configurations easier when it is not necessary to work around the block rules
    The web proxy removed options to fake the Referrer and User-Agent. This is practically not effective since the majority of connections are encrypted where this feature did not work.
    We have progressed in removing Python 2 from the system by porting fireinfo to Python 3
    Leo-Andres Hofmann fixed the memory usage table which showed inconsistent values
    Updated packages of the core system: apache 2.4.48, bind 9.11.32, cmake 3.20.4, curl 7.77.0, dmidecode 3.3, ethtool 5.12, expat 2.4.1, fuse 3.10.4, glib 2.68.3, gnutls 3.6.16, gzip 1.10, iputils 20210202, knot 3.0.7, libcap 2.50, libedit 20210522-3.1, libnl-3 3.5.0, libpcap 1.10.1, libusb 1.0.24, libxcrypt 4.4.22, linux-firmware 20210511 as preparation for a new kernel, nettle 3.7.3, pcre2 10.37, perl-CGI 4.53, perl-TimeDate 2.33, perl-XML-Parser 2.46, python3-setuptools, python3-pyparsing 2.4.7, qpdf 10.3.2, rng-tools 6.12, smartmontools 7.2, sudo 1.9.7p1, vnstat 2.7, xfsprogs 5.12.0, zd1211-firmware 1.5, zerofree 1.1.1, zstd 1.5.0
    Microcode updates for Intel processors are shipped in this release (20210608) to address these hardware security vulnerabilities:
        INTEL-SA-00442 - 2021.1 IPU - Intel® VT-d Advisory
        INTEL-SA-00464 - 2021.1 IPU - Intel® Processor Advisory
        INTEL-SA-00465 - 2021.1 IPU - Intel Atom® Processor Advisory
    IPFire is also vulnerable where an authenticated third-party could inject and execute shell commands as a non-privileged user (#12616, CVE-2021-33393). This has been fixed by going through over 65000 lines of code to investigate where this is possible. The underlying reason is the Perl function to call shell commands unexpectedly performs shell expansion and might perform more than just the intended command. Functions that no longer allow this behaviour have been written, tested and replaced any vulnerable places. Unfortunately this vulnerability was published without responsible disclosure.
    The root partition of the flash image has been increased to 1600 MiB by default. The minimum required disk size is still 2GB, but it is getting tight...

Add-ons

    dnsdist received an improved initscript which will print any configuration issues before trying to start or restart the daemon
    Updated packages: cups-filter 1.28.9, elfutils 0.185, flac 1.3.3, libogg 1.3.5, nano 5.8, netsnmpd 5.9.1, Postfix 3.6.1, sarg 2.4.0, tcpdump 4.99.1, tmux 3.2a, Tor 0.4.6.5

Some packages have been dropped since they didn't have a maintainer for a long while, the upstream project has been discontinued, or it is unlikely that there are any users left out there. We recommend to install these applications on a different machine than the firewall itself: Asterisk, dpfhack, lcd4linux, miniupnpd, motion, SANE, sendEmail. They will automatically be uninstalled on all systems.

[close]

https://www.ipfire.org/
Titel: OPNsense 21.7
Beitrag von: SiLæncer am 02 August, 2021, 18:30
(https://i.postimg.cc/BQw6P33K/screenshot-2881.png)
OPNsense is an open-source, easy-to-use, and easy-to-build HardenedBSD based firewall and routing platform.

License: Open Source

Release Notes -> https://opnsense.org/opnsense-21-7-released/

https://opnsense.org/about/about-opnsense/
Titel: IPFire 2.27 - Core Update 160
Beitrag von: SiLæncer am 06 Oktober, 2021, 18:00
Release Notes

This is the release announcement for IPFire 2.27 - Core Update 160. It comes with a large number of bug fixes and package updates and prepares for removing Python 2 which has reached its end of life.

Before we talk about what is new, I would like to ask you for your support. IPFire is a small team of people and like many of our open source friends, we’ve taken a hit this year and would like to ask you to help us out. Please follow the link below where your donation can help fund our continued development: https://www.ipfire.org/donate.

Improving Network Throughput

In recent days and months, the development team has spent a lot of time on finding bottlenecks and removing those. Our goal is to increase throughput on hardware and bringing latency down, for a faster network.

This update brings a first change which will enable network interfaces that support it, to send packets that belong to the same stream to the same processor core. This allows taking advantage of better cache locality and the firewall engine as well as the Intrusion Prevention System benefit from this, especially with a large number of connections and especially on hardware with smaller CPU caches.

This feature is automatically enabled on all hardware that supports it.

Removing Python 2

Python 2 has reached its end-of-life (EOL) at January 1st, 2021. In the past months and years, we have moved our own code to Python 3 which has been completed with this update.

However, Python 2 is still present in the distribution for all users who still have to port any custom scripts. With the next Core Update, we will remove Python 2 which means that you have to act now to port any custom scripts written in Python 2.

Misc.

    In the firewall engine, support for redirecting services as been added and long-standing bug #12265 has been fixed
    Some bugs have been fixed in the IPsec VPN scripts that prevented users to create certificate-based connections
    The web proxy can now be used on systems that do not have a GREEN network
    The firewall log viewer now displays IP protocol names instead of numbers.
    All graphs are now rendered in SVG format which makes any scaling in the browser smoother
    Updated packages: cURL 7.78.0, ddns 014, e2fsprogs 1.46.3, ethtool 5.13, glibc was patched for CVE-2021-33574 and a follow-up issue, iproute2 5.13.0, less 590, libloc 0.9.7, libhtp 5.0.38, libidn 1.38, libssh 0.9.6, OpenSSH 8.7p1, openssl 1.1.1k which fixes CVE-2021-3712 and CVE-2021-3711, pcre 8.45, poppler 21.07.0, sqlite3 3.36, sudo 1.9.7p2, strongswan 5.9.3, suricata 5.0.7, sysstat 12.5.4, sysfsutils 2.1.1

Add-ons

    Updated packages: alsa 1.2.5.1, bird 2.0.8, clamav 0.104.0, faad2 2.10.0, freeradius 3.0.23, frr 8.0.1, Ghostscript 9.54.0, hplip 3.21.6, iperf3 3.10.1, lynis 3.0.6, mc 7.8.27, monit 5.28.1, minidlna 1.3.0, ncat 7.91, ncdu 1.16, taglib 1.12, Tor 0.4.6.7, traceroute 2.1.0, Postfix 3.6.2, spice 0.15.0

[close]

https://www.ipfire.org/