public inbox for development@lists.ipfire.org
 help / color / mirror / Atom feed
From: Michael Tremer <michael.tremer@ipfire.org>
To: development@lists.ipfire.org
Subject: Re: Core Update 165 (testing) report
Date: Mon, 21 Mar 2022 16:05:12 +0000	[thread overview]
Message-ID: <607D75F7-00F5-472C-8BE8-4162895B4147@ipfire.org> (raw)
In-Reply-To: <bfe58b51-1640-d048-9dca-bbb43a574863@ipfire.org>

[-- Attachment #1: Type: text/plain, Size: 3087 bytes --]

Hello,

> On 20 Mar 2022, at 10:35, Peter Müller <peter.mueller(a)ipfire.org> wrote:
> 
> Hello development folks,
> 
> Core Update 165 (testing, see: https://blog.ipfire.org/post/ipfire-2-27-core-update-165-is-available-for-testing)
> is running here for roughly a day, with some minor and one major issue(s) spotted so far.
> 
> While installing the update went smooth (the improved Pakfire GUI is really nice - thanks
> again to Leo!), I bumped into some IPS-related trouble afterwards: Network connections timed
> out frequently, no matter whether they were directed to IPFire itself or not, and the GUI
> (especially the graphs) took ages to load, if at all.

This is a worry to me and should not happen.

> Stopping the IPS and starting it again via the GUI solved the problem - I believe we should
> do this in the update.sh script, but am not sure if there are cross-dependencies to something
> else. There is no bug raised for this yet.

This is even a bigger worry, because the IPS should not do this kind of stuff.

> Also, I noticed Squid was not restarted during the update, which caused trouble until I
> ran "/etc/init.d/squid restart" manually. Bug #12810 has been filed for this, and I just
> submitted a patch fixing this a few minutes ago.
> 
> Since my IPFire machine is rebooting every night via a scheduled job, I usually do not
> conduct a manual reboot immediately after installing an update. This time, I felt it was a
> good thing to do.

Do people still do scheduled reboots?

> Afterwards, Tor would not start again unless I disabled the "sandbox" feature manually. I
> believe this is not a general problem, but due to the fact that we did not ship libseccomp.
> Bug #12807 has been filed for this.

Thank you. Merged.

> Today (i. e. another reboot later), I noticed charon emitting some iptables warnings while
> establishing an IPsec connection (filed as bug #12808), and, more important, some location-
> based firewall rules not being properly loaded, which rendered DDNS - and subsequently IPsec
> and OpenVPN - useless for me, since I am getting IP addresses assigned dynamically.

Do you have more details on this? Do you believe the two problems are related?

> Bug #12809 has been filed for the latter, and I believe this is a show-stopper. Oddly enough,
> it did not appear after the first reboot, and _some_ location-based firewall rules were loaded
> correctly after the second one. Manually reloading the rules via the GUI "solved" the problem
> for now, but this is definitely something we need to have a look at before releasing C165.
> 
> Apart from these, things look good to me. Tested IPFire functionalities in detail:
> - IPsec (N2N connections only)
> - Squid (authentication enabled, using an upstream proxy)
> - OpenVPN (RW connections only)
> - IPS/Suricata (with Emerging Threats community ruleset enabled)
> - Guardian
> - Quality of Service
> - DNS (using DNS over TLS)
> - Dynamic DNS
> - Tor (relay mode)
> 
> Thanks, and best regards,
> Peter Müller

-Michael

  reply	other threads:[~2022-03-21 16:05 UTC|newest]

Thread overview: 8+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
     [not found] <164734440708.2330719.8637606495269936408.ipfire@ipfire.org>
2022-03-17  9:29 ` IPFire 2.27 - Core Update 165 is available for testing Adolf Belka
2022-03-17  9:50   ` Adolf Belka
2022-03-18 11:37     ` Adolf Belka
2022-03-18 12:58       ` Adolf Belka
2022-03-20 10:35   ` Core Update 165 (testing) report Peter Müller
2022-03-21 16:05     ` Michael Tremer [this message]
2022-03-23 17:08     ` [PATCH] rules.pl: Fix creating rules for location based groups Stefan Schantl
2022-03-23 17:12       ` Peter Müller

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=607D75F7-00F5-472C-8BE8-4162895B4147@ipfire.org \
    --to=michael.tremer@ipfire.org \
    --cc=development@lists.ipfire.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox