Today, we are releasing IPFire 2.25- Core Update 155 which comes with various security fixes to mitigate NAT Slipstreaming attacks and important fixes in the OpenSSL library which allowed that attackers could have crashed services that use TLS on the firewall.
Before we talk about what is new, I would like to as you for your support for our project. IPFire is a small team of people from a range of backgrounds sharing one goal: make the Internet a safer place for everyone. Like many of our open source friends, we’ve taken a hit this year and would like to ask for your continued support. Please follow the link below where your donation can help fund our continued development: https://www.ipfire.org/donate.
We recommend installing this update as soon as possible and reboot the system.
Mitigating NAT Slipstreaming
Peter has recently announced our measures against NAT Slipstreaming. Through feedback from the community, we have seen that most people are not affected by these changes.
We are going to disable and remove support for all Application Layer Gateways. This includes SIP, FTP, H.323, IRC, PPTP and TFTP. They will be automatically disabled on systems that install this update and will no longer be available.
This change might require some attention if you are using any software that relies on the ALG. This is most likely the case for VoIP solutions that use SIP. From feedback during the testing period of this update, we can confirm that only a very small fraction of users is affected.
Spanning Tree Protocol support in Zone Configuration
The zone configuration allows configuring Spanning Tree Protocol (STP) for bridges. Since it is possible add multiple interfaces to the same bridge, it becomes a danger that loops are being created on the network. STP avoids those by disabling bridge ports when a loop is being detected.
OpenSSL Security Vulnerabilities
The OpenSSL team released version 1.1.1k which fixes two rather severe security issues:
- CVE-2021-3449: TLS servers could have been crashed with a maliciously crafted renegotiation message. In IPFire this could be used to deny service of the web user interface or some add-ons like haproxy
- CVE-2021-3450: Enabling strict certificate checking caused the opposite effect that some certificates were evaluated as valid when they were actually not
- The wireless client configuration is now processing priorities correctly. Before, wireless networks were prioritised in the opposite order
- The QoS graphs will now have consistent colours in the downstream and upstream direction
- The Update Accelerator "Passive Mode" option has been clarified
- New packages: PCRE2, which is an improved version of PCRE, implementing Perl-compatible Regular Expressions
- Updated packages:
libxcrypt4.4.17 which replaces libcrypt which came bundled with glibc,
openssh8.5p1, Python 3.8.7,
- IPFire can experimentally be compiled for RISC-V for 64bit
- Various older versions of operating system libraries have been removed. They were needed to keep older programs compatible without need of recompiling them. Those were: Berkeley DB, GMP,
- On i586, SSE2-optimised versions of performance-critical libraries have been dropped. This affects GMP and OpenSSL, which might result in lower VPN throughput with OpenVPN on affected systems. Support for this will be removed with the next release of glibc.
- The unattended installer started in regular mode on serial consoles
- Roberto Peña has contributed Spanish translation for the Captive Portal
- Updated packages: