From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail02.haj.ipfire.org (localhost [IPv6:::1]) by mail02.haj.ipfire.org (Postfix) with ESMTP id 4c0xCF43R5z32Pn for ; Mon, 11 Aug 2025 14:02:01 +0000 (UTC) Received: from mail01.ipfire.org (mail01.haj.ipfire.org [IPv6:2001:678:b28::25]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mail01.haj.ipfire.org", Issuer "R11" (verified OK)) by mail02.haj.ipfire.org (Postfix) with ESMTPS id 4c0xCB07DVz2y0C for ; Mon, 11 Aug 2025 14:01:58 +0000 (UTC) Received: from [127.0.0.1] (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange x25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by mail01.ipfire.org (Postfix) with ESMTPSA id 4c0xC70qxxz2gF for ; Mon, 11 Aug 2025 14:01:55 +0000 (UTC) DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=ipfire.org; s=202003ed25519; t=1754920915; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=AYc8cgk/YZd8utMhOAKABDaLdD0N8qrJIEOzo/JczA8=; b=eB/gvD87H/aHRH4LKVJ6AK2NQKkmdLMtqSR6/loYRyeaNGyR+cnOkmKbHPqsW7gssa6nge xzcGajSZJI4iXeDw== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ipfire.org; s=202003rsa; t=1754920915; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=AYc8cgk/YZd8utMhOAKABDaLdD0N8qrJIEOzo/JczA8=; b=g0xKYQoRDmzIbm1DCegWbgKoDNFZeLXVMTmC74QCOboGrDcuAFDlsQDKPdi9vrj9xwtuBW 0pAkMVRSt25fLYKhbaXFA9RA0k/f58F6cUQBu4gHJBDCY3NQpyLx5bmMydOYxcgq/GNSHa +WyerDpDQJRNpyhDr3mD8BMZdhGxkC2v+IjCwk2+UP/dyHkFCQL9+YJdv6nQLsXv1TM2Qq J/FBO/zdEqpESWC24AkgS9QMYpO31QYOzRJZo3Cpmvjx4UNewkZeHspiKMqFyf/kcacJUc FHF/aw2Mtr4PfA9tJs4vCkbN2uBgdO7Luvx5LRsla6oVLYXd78w9cg3mpPVGzQ== Message-ID: <8c5b754f-002b-4a80-b757-9a74aeb57f7e@ipfire.org> Date: Mon, 11 Aug 2025 16:01:51 +0200 Precedence: list List-Id: List-Subscribe: , List-Unsubscribe: , List-Post: List-Help: Sender: Mail-Followup-To: MIME-Version: 1.0 Subject: Re: IPFire 2.29 - Core Update 197 is available for testing To: "IPFire: Development-List" References: <175490371612.107547.14288613781884197415.ipfire@ipfire.org> Content-Language: en-GB From: Adolf Belka In-Reply-To: <175490371612.107547.14288613781884197415.ipfire@ipfire.org> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit Hi All, Have found a little issue. Not sure if it is critical or not. My existing connections on OpenVPN are working fine and the network topology has been changed in most places but not in the ccd files. I have a connection called ipfiretesting which before the upgrade had 10.110.30.5 and 10.110.30.6. After the upgrade to 197 if I edit the entry it shows that it is using 10.110.30.6 However if I look in /var/ipfire/ovpn/ccd/ipfiretesting it still has the line ifconfig-push 10.110.26.6 10.110.26.5 If I then create a new client connection then all the ccd files get updated and ipfiretesting now contains ifconfig-push 10.110.30.6 255.255.255.0 So if a user upgrades but doesn't create a new client connection all the ccd files will stay with the old format. Not sure what this would or wouldn't do for the connection but I think after the upgrade it would be good to update all the ccd files but not sure how to make that happen. Regards, Adolf. On 11/08/2025 11:28, IPFire Project wrote: > **IPFire 2.29 – Core Update 197** is now available for testing. This release introduces a significant overhaul of OpenVPN, upgrading to version 2.6 with improved security, broader client compatibility, and a modernised codebase — all without requiring changes to existing configurations. System performance has also been optimised to allow the CPU to remain in power-saving states more often, reducing energy consumption. As with every release, this update includes a large number of package updates to ensure your system remains secure and reliable. > ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ > > > IPFire_ > > > IPFire 2.29 - Core Update 197 is available for testing > > **IPFire 2.29 – Core Update 197** is now available for testing. This release introduces a significant overhaul of OpenVPN, upgrading to version 2.6 with improved security, broader client compatibility, and a modernised codebase — all without requiring changes to existing configurations. System performance has also been optimised to allow the CPU to remain in power-saving states more often, reducing energy consumption. As with every release, this update includes a large number of package updates to ensure your system remains secure and reliable. > > Read The Full Post On Our Blog > > The IPFire Project, c/o Lightning Wire Labs GmbH, Gerhardstraße 8, 45711 Datteln, Germany > > Unsubscribe >