From mboxrd@z Thu Jan 1 00:00:00 1970 From: Adolf Belka To: development@lists.ipfire.org Subject: Re: IPFire 2.27 - Core Update 176 is available for testing Date: Thu, 29 Jun 2023 19:18:30 +0200 Message-ID: <2b8530a5-7836-5075-6339-dbed09a64ba3@ipfire.org> In-Reply-To: <168803400577.813793.16129722323304756022.ipfire@ipfire.org> MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="===============5763342442820758837==" List-Id: --===============5763342442820758837== Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Hi All, So far everything I have tested has worked as expected. That includes the Ope= nVPN roadwarrior connection. Looking good so far :crossed_fingers: Regards, Adolf. On 29/06/2023 12:20, IPFire Project wrote: > IPFire Logo >=20 > there is a new post from Peter M=C3=BCller on the IPFire Blog: >=20 > *IPFire 2.27 - Core Update 176 is available for testing* >=20 > The next update, IPFire 2.27 - Core Update 176, is available for testin= g. It features a toolchain and package updates (among the security-relevant o= f them are Intel microcodes), brings the latest batch of bug fixes. >=20 > Click Here To Read More >=20 > The IPFire Project > Don't like these emails? Unsubscribe . >=20 --===============5763342442820758837==--