From mboxrd@z Thu Jan 1 00:00:00 1970 From: Michael Tremer To: development@lists.ipfire.org Subject: Re: IPFire 2.27 - Core Update 176 is available for testing Date: Sat, 01 Jul 2023 10:05:18 +0100 Message-ID: <14953D83-593B-4E8C-9251-9437368A24BA@ipfire.org> In-Reply-To: <2b8530a5-7836-5075-6339-dbed09a64ba3@ipfire.org> MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="===============6233429973569958499==" List-Id: --===============6233429973569958499== Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Thank you for your feedback. I didn=E2=80=99t hear anything bad yet either. -Michael > On 29 Jun 2023, at 18:18, Adolf Belka wrote: >=20 >=20 > Hi All, >=20 > So far everything I have tested has worked as expected. That includes the O= penVPN roadwarrior connection. >=20 > Looking good so far :crossed_fingers: >=20 > Regards, >=20 > Adolf. >=20 >=20 > On 29/06/2023 12:20, IPFire Project wrote: >> IPFire Logo >> there is a new post from Peter M=C3=BCller on the IPFire Blog: >> *IPFire 2.27 - Core Update 176 is available for testing* >> The next update, IPFire 2.27 - Core Update 176, is available for testin= g. It features a toolchain and package updates (among the security-relevant o= f them are Intel microcodes), brings the latest batch of bug fixes. >> Click Here To Read More >> The IPFire Project >> Don't like these emails? Unsubscribe . --===============6233429973569958499==--