IPFire 2.15 Core 79 发布
IPFire是一份Linux发行,它注重轻松的装备、方便的操作和高级别的安全。它通过一份直观的基于网页的界面来进行操作管理,该界面为新手级及老练 的系统管理员提供很多直观的配置选项。IPFire由一群关注安全及经常更新该产品以保持其安全的开发者来维护。IPFire带有一份定制的叫做 Pakfire的包管理器,系统也可以通过各种附件来进行扩展。
IPFire 2.15 – Core Update 79 is finally arriving with many bug fixes and enhancements. Among the big changes with this update are lots feature enhancements that massively increase the security level of OpenV*N connections, some enhancements of the web user interface and a lot more awesome stuff under the hood.
OpenV*N
The OpenV*N capabilities have been massively extended by Erik Kapfer:
Certificate Authorities
The certificate authority that can be created on the OpenV*N page now uses much better hashes to protect the integrity of itself. The CA root certificate uses a SHA512 hash and a RSA key with length of 4096 bit. All new created host certificates use a RSA key with 2048 bit length and a SHA256 hash.
Additionally, a set of Diffie-Hellman parameters can be generated for better protection of the session keys. The length of the pregenerated DH parameters can be chosen in the web interface.
Ciphers
The cipher that is used for each net-to-net connection can be changed now to for example take benefit of hardware crypto processors. To the list of already supported ciphers came SEED.
ATTENTION: Some other ciphers that are evidently broken have been removed for use with the roadwarrior server. Those are: DES-CBC, RC2-CBC, RC2-64-CBC and RC2-40-CBC. If you are using one of these, please replace all your roadwarrior connections.
HMAC/Hashing
To ensure that the transmitted data has not been altered on the way from sender to receiver a hash function is used. This hash is now configurable with a couple of options: SHA2 (512, 384 and 256 bit), Whirpool (512 bit) and SHA1 (160 bit).
To mitigate DoS attacks against the OpenV*N server, the tls-auth option can be enabled which uses a HMAC function that lets the server very quickly decide if a packet is coming from a legitimate sender and needs to be decrypted (which is a very costly operation) or if it is just some spoofed data sent to slow down the server. In the latter case the HMAC does not match and the packet can be discarded right away.
All this may sound a bit complicated, but in the end the OpenV*N feature is usable just in the same and easy way as you know it in IPFire. Everything described here works under the hood and gives you better protection for your data.
Kernel Update
The Linux kernel running inside IPFire has been updated to version 3.10.44 which adds better support for some hardware, comes with lots of stability fixes and closes some security issues. The vendor drivers for Intel network adapters have been updated, too.
One of the most significant changes is that the system now uses the PCIe ASPM configuration from the BIOS. The former option was to save as much power as possible which may lead to instabilities with some PCIe periphery. It is now possible to easily configure the desired operation mode in the BIOS of the system.
Various changes have been applied to the Xen image so installing IPFire on para-virtualized systems runs much more smoothly now.
PPP dial-in
pppd, the Point-to-Point-Protocol Daemon, has been updated to version 2.4.6 which comes with some stability and security fixes. For PPPoE sessions, the system will try to connect to the Internet for a longer time now before giving up. This helps us to establish a connection even if there is some really weird modems around that need some time to initialize when the network link goes up (seen with radio link antennas).
LTE/3G Modem Status
The IPFire web interface got a new status page for modems. This includes all serial modems from 56k analogue modems up to LTE and 3G modems. On this page there will be various information about the connected network, signal quality and SIM card if one is available.
Squid Web Proxy Update
The Squid web proxy server has been updated to version 3.4.5. As this is a major version update, several deprecated things and incompatibilities had to be resolved. The redirect wrapper process has been rewritten and all the redirect helpers (URL-Filter, Update Accelerator and squidclamav) have been patched to be able to communicate with the proxy process again.
When using proxy.pac
for automatic client configuration, please note that access to the web proxy is now only granted for the actual subnets of the firewall and not for the entire private RFC1918 address space any more. In addition to that, accessing resources of the same subdomain as the clients (i.e. internet network access) circumvents the proxy as well.
Support for the internal Quality of Service has been compiled in.
Intrusion Detection System
snort, the Intrusion Detection System, has been updated to version 2.9.6.1. Downloading of rules will be possible for some time now.
Misc
- Alf Høgemark contributed an updated version of
vnstat
which is a tool to measure the consumed traffic on each network interface and generates beautiful graphs out of it. - He also contributed a new log page on the IPFire web interface that shows from which country the most firewall hits originate from.
- The new firewall GUI now supports blocking access to the GREEN firewall interface from the GREEN network.
- The PIE packet scheduler has been added for experienced users to experiment.
- Lots of cleanup of the generated HTML output of the CGI web interface scripts has been done.
- The Turkish translating has been updated by Ersan Yildirim.
- The
net-utils
which provided the basic tools likeping
has been removed and now only the version ofping
that comes with theiputils
package is used. Thehostname
command has been replaced by a version that is maintained by Debian. - Updated packages: daq 2.0.2, libpcap 1.4.0, openV*N 2.3.4, sudo 1.8.10p3
- The build system is now able to use qemu and compile for ARM on x86 machines.
- Enabling the front LEDs on an ALIX system has been fixed when a RED device has been assigned but the system actually uses a dial-in connection.
Installer
- Installation on systems that only got a serial console is now possible from the ISO image. The baudrate has been set to 115200 throughout the entire process which has formerly been broken and it was needed to change the baudrate a couple of times.
- The default size of the root partition has been increased.
- The backup ISO that can be generated on the backup page of the IPFire web interface is now a hybrid image as well so that it can be put on an USB key instead of burning it on a disk.
Dynamic DNS providers
Some new dynamic DNS providers have been added: spdns.de (Bernhard Bitsch), twodns.de, variomedia.de (Stefan Ernst)
Add-ons
New Arrivals
- icinga 1.11.4 (The nagios package may be dropped in the near future)
- sslscan 1.10.2 – A simple tool to scan which SSL features and ciphers a remote host supports
Updates
- cacti 0.8.8b
- clamav 0.98.4
- nut 2.7.2 (Dirk Wagner)
- samba 3.6.24
- transmission 2.83
Dropped add-ons
- icecc
Download: ipfire-2.15.i586-full-core79.iso (126MB, SHA1).