From: "Peter Müller" <peter.mueller@ipfire.org>
To: development@lists.ipfire.org
Subject: Re: Core Update 139 (testing) report
Date: Fri, 13 Dec 2019 17:40:00 +0000 [thread overview]
Message-ID: <20733f66-4b49-20da-dae3-eeadbfdd7d28@ipfire.org> (raw)
In-Reply-To: <870f0e4f-d807-f088-76c9-a876b3eea335@ipfire.org>
[-- Attachment #1: Type: text/plain, Size: 1932 bytes --]
Hello *,
> Hello *,
>
> upcoming Core Update 139 (testing, see: https://blog.ipfire.org/post/ipfire-2-23-core-update-139-is-available-for-testing)
> is running here for about 24 hours by now, and caused major trouble especially
> related to IPsec.
>
> First, the update did not triggered a "reboot is requried" message, which is
> obligatory since we are shipping some new Intel microcodes. Those need a reboot
> in order to be loaded into the CPU.
This is filed as #12258 and fixed by https://patchwork.ipfire.org/patch/2643/ .
>
> Second, I forgot to execute /usr/local/bin/sshctrl during update (update.sh),> so user settings were not applied to the SSH configuration. My fault (again).
This is filed as #12259 and fixed by https://patchwork.ipfire.org/patch/2642/ .
>
> Third, IPsec N2N connections are not set up automatically after rebooting although
> they were configured to be. Worse, something seems to go seriously wrong, as traffic
> to a destination IP address on the other side of the IPsec connection is emitted
> directly to the internet.
This is filed as #12256 and #12257. In addition, #12260 was opened by some community
tester - thank you! - due to Suricata crashing while parsing its configuration.
The latter one is fixed by https://patchwork.ipfire.org/patch/2644/ , while this
patch only partially resolves #12257 . I still did not get why IPsec tunnels did not
came up by themselves as described in #12256.
>
> Surprisingly enough, connections initiated from the remote network behind an IPsec
> connection succeed and response packets apparently are sent back through the tunnel.
> [...]
Apart from that, the following parts of IPFire seem to work correctly:
- DDNS
- OpenVPN (RW connections only)
- Squid proxy (including authentication and upstream proxy)
- Guardian
- Tor (acting as a relay)
- Quality of Service
Thanks, and best regards,
Peter Müller
prev parent reply other threads:[~2019-12-13 17:40 UTC|newest]
Thread overview: 3+ messages / expand[flat|nested] mbox.gz Atom feed top
2019-12-12 19:35 Peter Müller
2019-12-12 19:59 ` ummeegge
2019-12-13 17:40 ` Peter Müller [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20733f66-4b49-20da-dae3-eeadbfdd7d28@ipfire.org \
--to=peter.mueller@ipfire.org \
--cc=development@lists.ipfire.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox