public inbox for development@lists.ipfire.org
 help / color / mirror / Atom feed
* Core Update 143 (testing) report
@ 2020-04-12 14:01 Peter Müller
  0 siblings, 0 replies; only message in thread
From: Peter Müller @ 2020-04-12 14:01 UTC (permalink / raw)
  To: development

[-- Attachment #1: Type: text/plain, Size: 945 bytes --]

Hello *,

upcoming Core Update 143 (testing, see: https://blog.ipfire.org/post/ipfire-2-25-core-update-143-is-available-for-testing)
is running here since Thursday without any unexpected behaviour so far.

Since testing machine runs on x86_64, remote login via OpenSSH 8.2p1 did not cause any trouble
(tested with RSA public key authentication only), however, Arne patched sandbox-seccomp-filter.c
so it works on i[5-6]86, too. Interesting to see that this kind of thing is necessary... :-/

Tested IPFire functionalities in detail:
- IPsec (N2N connections only)
- Squid (authentication enabled, using an upstream proxy)
- OpenVPN (RW connections only)
- IPS/Suricata (with Emerging Threats ruleset enabled)
- Guardian
- Quality of Service
- DNS (with DNS over TLS and strict QNAME minimisation)
- Tor (relay mode)

I look forward to the release of Core Update 143. Happy Easter!

Thanks, and best regards,
Peter Müller

^ permalink raw reply	[flat|nested] only message in thread

only message in thread, other threads:[~2020-04-12 14:01 UTC | newest]

Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2020-04-12 14:01 Core Update 143 (testing) report Peter Müller

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox