Today, the IPFire development team released the 68th Core Update for IPFire 2. This update brings various bug fixes and minor enhancements.
strongswan security update (version 5.0.4)
The strongswan team released version 5.0.4, which fixes an authentication bypass for certificates that use Elliptic Curves. As we don’t use them in IPFire by default, this is not a too serious issue for us, but we still updated the strongswan package.
The update also contains some changes that fix unstable IPsec connections, a minority of users was experiencing.
OpenVPN roadwarrior connections
Since Core Update 65, disabling OpenVPN roadwarrior connections had no effect, so that users could still connect. This has also been fixed with this release.
New status bar
The web user interface comes with a new status bar which now has a cleaner design and provides more information. Thanks to Jörn-Ingo Weigert for working on this.
Sortable connection tracking list
The connection list on the web user interface is now sortable in every possible way. Patches have been sent by Kay-Michael Köhler.
- Network modules have been added to the installer, so PXE installations work again.
- Installation with certain USB keyboards is now possible, because kernel modules have been added to the installer.
- The broken monospace font in graphs on the web interface has been fixed.
- The kernel module for Intel’s MEI chipsets has been blacklisted, because the buggy modules causes some Supermicro hardware to fail shutting down or to freeze on booting up.
sysbench has been added as new package. It’s a system benchmark tool for command line.
We recommend that everyone updates to this version of IPFire as soon as possible. Please donate, to help funding the IPFire project! If you cannot afford to donate, you can also help testing the new firewall interface. Both is very much appreciated.
[VIDEO] How to install IPFire?
Aaron Philpott made a nice video on YouTube on How to install IPFire! It’s a great start for newbies but also comes with lots of valueable tipps and tricks. Check it out!