IPFire is een opensourcefirewall voor i586-, x86_64- en ARM-systemen. Het bevat onder andere een intrusion detection/prevention system, deelt het netwerk op in zones, doet stateful packet inspection en biedt vpn-mogelijkheden. Voor meer informatie verwijzen we naar deze pagina. De ontwikkelaars hebben versie 2.27 Core Update 168 uitgebracht voor productiesystemen. De bijbehorende aankondigingen zien er als volgt uit:
IPFire 2.27 - Core Update 168 released
Another update of IPFire is ready: IPFire 2.27 - Core Update 168. It comes with significant improvements to the Intrusion Prevention System (IPS), various security improvements, an updated version of Linux' firmware bundle, as well as a heap of updated packages and bug fixes.
Heads up! IPFire running on software RAIDs will need to rebuild their RAIDs. It is possible, that the RAID was damaged since the last update due to failure to initialise it correctly at boot time (#12862). Systems affected by this problem, would have run just fine, but without the RAID. During the installation of this update, the RAID will be fixed. For that, a reboot is required after installing the update, and it might be necessary to be able to boot from the secondary RAID device.Intrusion Prevention System improvements
Stefan contributed a patch series for notably improving the IPS, particularly when it comes to handling of ruleset providers. While many of the changes are done under the hood, the following are visible to the web interface:
3rd party firmware updates
- Monitoring mode can now be enabled for each ruleset provider individually. This makes baselining and testing much less of a hassle, since newly introduced IPS ruleset providers can now first be used for logging only, without risking disruptions or unintended side-effects.
- Parsing and restructuring changed or updated rulesets has been improved and is now faster by orders of magnitude.
- The downloader will now automatically check whether a ruleset has been updated on its providers' server by checking the
ETagHTTP header. This allows us to drop the update interval selection; every IPS ruleset will now updated automatically on the appropriate interval.
linux-firmware, the conglomerate of 3rd party firmware required for all sorts of hardware has been updated. Similar to a kernel update, this brings support for new devices requiring proprietary firmware, fixes bugs and plugs some security holes.
Firmware for APU borards has been updated as well, finally enabling their hardware-based random number generator to work properly. On APU-based IPFire installations, this will speed up cryptography operations (such as VPN traffic handling) a lot.Security improvements
- IPFire now drops any packet that is received on a different interface than it would have been routed back to. This thwarts entire classes of network spoofing attacks, particularly originating from or targeting internal networks.
- OpenSSH has been updated to 9.0p1, introducing (among other changes) quantum-resistant cryptography. IPFire's custom OpenSSH configuration has been updated to make use of it. Also, spoofable TCP-based keep-alive messages are no longer sent, preventing MITM attackers to force-keep an established SSH connection opened.
- As a defense-in-depth measure, various file permissions have been tightened to prevent any unprivileged attacker from reading potentially sensitive configuration on an IPFire installation.
- CUPS configuration is now properly processed while creating backups and restoring them.
- Various CGIs received fixes for HTML syntax validity and solving bugs, most notably the Pakfire CGI.
vnstatcalls have been removed from initscripts.
- All firewall rules required for IPsec N2N connections are now properly set up again after a tunnel comes up, resolving #12866.
- Updated packages:
mpfr4.1.0 (plus additional upstream patches),
openldap2.6.1, OpenSSH 9.0p1, OpenSSL 1.1.1o, OpenVPN 2.5.6,
sqlite3380300, Squid 5.5, Suricata 5.0.9,
- Updated add-ons:
pcengines-apu-firmware18.104.22.168, Postfix 3.7.1,
stunnel5.63, Tor 0.4.7.7,
- Any changes to the system cron table will be lost during this update, but any custom scripts in
/etc/fcron.*will remain in place.