* Core Update 143 (testing) report
@ 2020-04-12 14:01 Peter Müller
0 siblings, 0 replies; only message in thread
From: Peter Müller @ 2020-04-12 14:01 UTC (permalink / raw)
To: development
[-- Attachment #1: Type: text/plain, Size: 945 bytes --]
Hello *,
upcoming Core Update 143 (testing, see: https://blog.ipfire.org/post/ipfire-2-25-core-update-143-is-available-for-testing)
is running here since Thursday without any unexpected behaviour so far.
Since testing machine runs on x86_64, remote login via OpenSSH 8.2p1 did not cause any trouble
(tested with RSA public key authentication only), however, Arne patched sandbox-seccomp-filter.c
so it works on i[5-6]86, too. Interesting to see that this kind of thing is necessary... :-/
Tested IPFire functionalities in detail:
- IPsec (N2N connections only)
- Squid (authentication enabled, using an upstream proxy)
- OpenVPN (RW connections only)
- IPS/Suricata (with Emerging Threats ruleset enabled)
- Guardian
- Quality of Service
- DNS (with DNS over TLS and strict QNAME minimisation)
- Tor (relay mode)
I look forward to the release of Core Update 143. Happy Easter!
Thanks, and best regards,
Peter Müller
^ permalink raw reply [flat|nested] only message in thread
only message in thread, other threads:[~2020-04-12 14:01 UTC | newest]
Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2020-04-12 14:01 Core Update 143 (testing) report Peter Müller
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox