public inbox for development@lists.ipfire.org
 help / color / mirror / Atom feed
* Core Update 161 (testing) report
@ 2021-11-02  8:01 Peter Müller
  2021-11-02 10:34 ` Michael Tremer
  0 siblings, 1 reply; 15+ messages in thread
From: Peter Müller @ 2021-11-02  8:01 UTC (permalink / raw)
  To: development

[-- Attachment #1: Type: text/plain, Size: 2486 bytes --]

Hello *,

Core Update 161 (testing; no release announcement or changelog has been published, yet)
is running here for about 12 hours by now without any major issues known so far.

During the upgrade, I noticed the Pakfire CGI still does not display log messages as it
used to do, but at least there is now a spinning loading icon displaying the message that
an operation is currently in progress. From a UX perspective, this is okay I guess.

The reconnection necessary for upgrading pppd went smooth, albeit Pakfire could not download
add-on upgrades afterwards since the VPN did not came back in time, so I had to do this
manually.

To my surprise, some IPsec N2N connections did not reconnect automatically, even after
rebooting the testing machine. After manually clicking on one of the "restart" buttons
on the IPsec CGI, they came back instantly, and have been stable ever since.

This affected N2N connections not being in the "on-demand" mode only. While it is not
really a show-stopper if someone is sitting in front of his/her/its IPFire machine, remote
upgrades might be tricky.

Apart from that, this update looks quite good to me. The IPS changes are really noticeable,
and bring a throughput I think I never experienced with IPFire and the IPS turned on. :-)
This is certainly worth mentioning, as it finally makes the IPS suitable for everyone,
hence massively increasing security without worrying too much of performance impacts.

(For the sake of completeness: Unfortunately I did not yet have time do conduct a penetration
test against this. Personally, I can imagine the IPS changes permitting some attacks
after Suricata decided it cannot analyse a connection further. Switching protocols might
be an issue, starting with TLS, while using something completely different afterwards.

While I do not really consider this to be a critical attack surface, I wanted to look deeper
into this as soon as I have some spare time to do so.)

Tested IPFire functionalities in detail:
- PPPoE dial-up via a DSL connection
- IPsec (N2N connections only)
- Squid (authentication enabled, using an upstream proxy)
- OpenVPN (RW connections only)
- IPS/Suricata (with Emerging Threats community ruleset enabled)
- Guardian
- Quality of Service
- DNS (using DNS over TLS and strict QNAME minimisation)
- Dynamic DNS
- Tor (relay mode)

I am looking forward to the release of Core Update 161.

Thanks, and best regards,
Peter Müller

^ permalink raw reply	[flat|nested] 15+ messages in thread

end of thread, other threads:[~2021-11-18 17:05 UTC | newest]

Thread overview: 15+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2021-11-02  8:01 Core Update 161 (testing) report Peter Müller
2021-11-02 10:34 ` Michael Tremer
2021-11-02 10:58   ` Bernhard Bitsch
2021-11-04 12:37     ` Michael Tremer
2021-11-04 21:07       ` Bernhard Bitsch
2021-11-10 12:48         ` Adolf Belka
2021-11-10 15:00           ` Michael Tremer
2021-11-12 17:32   ` Peter Müller
2021-11-12 18:54     ` Kienker, Fred
2021-11-12 22:33       ` Bernhard Bitsch
2021-11-14 10:29         ` Bernhard Bitsch
2021-11-14 10:52         ` Bernhard Bitsch
2021-11-15 14:09           ` Bernhard Bitsch
2021-11-18  9:58             ` Michael Tremer
2021-11-18 17:05               ` Bernhard Bitsch

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox