Another Core Update is available for testing. It comes with significant improvements to the Intrusion Prevention System (IPS), various security improvements, an updated version of Linux' firmware bundle, as well as a heap of updated packages and bug fixes.
Intrusion Prevention System improvements
Stefan contributed a patch series for notably improving the IPS, particularly when it comes to handling of ruleset providers. While many of the changes are done under the hood, the following are visible to the web interface:
- Monitoring mode can now be enabled for each ruleset provider individually. This makes baselining and testing much less of a hassle, since newly introduced IPS ruleset providers can now first be used for logging only, without risking disruptions or unintended side-effects.
- Parsing and restructuring changed or updated rulesets has been improved and is now faster by orders of magnitude.
- The downloader will now automatically check whether a ruleset has been updated on its providers' server by checking the
ETagHTTP header. This allows us to drop the update interval selection; every IPS ruleset will now updated automatically on the appropriate interval.
3rd party firmware updates
linux-firmware, the conglomerate of 3rd party firmware required for all sorts of hardware has been updated. Similar to a kernel update, this brings support for new devices requiring proprietary firmware, fixes bugs and plugs some security holes.
Firmware for APU borards has been updated as well, finally enabling their hardware-based random number generator to work properly. On APU-based IPFire installations, this will speed up cryptography operations (such as VPN traffic handling) a lot.
- IPFire now drops any packet that is received on a different interface than it would have been routed back to. This thwarts entire classes of network spoofing attacks, particularly originating from or targeting internal networks.
- OpenSSH has been updated to 9.0p1, introducing (among other changes) quantum-resistant cryptography. IPFire's custom OpenSSH configuration has been updated to make use of it. Also, spoofable TCP-based keep-alive messages are no longer sent, preventing MITM attackers to force-keep an established SSH connection opened.
- As a defense-in-depth measure, various file permissions have been tightened to prevent any unprivileged attacker from reading potentially sensitive configuration on an IPFire installation.
- CUPS configuration is now properly processed while creating backups and restoring them.
- Various CGIs received fixes for HTML syntax validity and solving bugs, most notably the Pakfire CGI.
vnstatcalls have been removed from initscripts.
- Updated packages:
mpfr4.1.0 (plus additional upstream patches),
openldap2.6.1, OpenSSH 9.0p1, OpenSSL 1.1.1o, OpenVPN 2.5.6,
sqlite3380300, Squid 5.5, Suricata 5.0.9,
- Updated add-ons:
pcengines-apu-firmware220.127.116.11, Postfix 3.7.1,
stunnel5.63, Tor 0.4.7.7,
As always, we thank all people contributing to this release in whatever shape and form. Please test this update, especially if you are using exotic hardware or uncommon network setups, and provide feedback. IPFire is backed by volunteers - should you like what we are doing, please donate to keep the lights on.