HomeCII/OTIPFire Releases 200th Core Update Featuring New Domain Blocklist and Kernel Upgrade

IPFire Releases 200th Core Update Featuring New Domain Blocklist and Kernel Upgrade

Published on

spot_img

IPFire Releases Major Update: Core Update 200 Marks a New Milestone

The open-source network firewall distribution, IPFire, has released Core Update 200, a significant milestone as it marks the 200th incremental update to the 2.29 branch. This release is set to enhance the security and performance of the system, incorporating a series of crucial updates, including a kernel upgrade, a beta domain blocklist service, security patches for critical libraries like OpenSSL and glibc, and several component updates that contribute to the overall robustness of the platform.

The latest update sees the kernel rebased on Linux 6.18.7 LTS, introducing substantial hardware security mitigations that will improve the network’s throughput and latency. Notable changes include the deprecation of ReiserFS support, which means installations operating on that filesystem will need to reinstall on a supported filesystem to apply this update successfully.

Introduction of IPFire DBL

Among the new features is the debut of the IPFire Domain Blocklist (DBL), a service developed to replace the now-retired Shalla list that had previously served as the backbone for the web proxy’s filtering capabilities, targeting malware, social networking sites, and adult content. The DBL will be accessible through two avenues: as a URL filter for proxy-based blocking and as a source for Suricata rules. This integration allows for deep packet inspection across a variety of connections, including DNS, TLS, HTTP, and QUIC, enhancing the firewall’s capability to maintain a secure environment.

IPFire’s project team has described DBL as currently being in beta, inviting community feedback to refine the product further. Future milestones for the project include developing a DNS firewall with native content filtering capabilities.

Enhancements to Suricata and IPS

Recent updates have addressed issues within Suricata, including a bug from a previous version release that caused the pre-compiled signature cache to grow uncontrollably, consuming significant disk space. A backported patch now enables Suricata to automatically clean up unused signatures. Additionally, changes to the Suricata reporter will improve alert clarity, surfacing hostname information and extra protocol metadata for DNS, HTTP, TLS, and QUIC connections. This enhancement will be instrumental for administrators, as they will receive more context when investigating potential policy violations.

Adjustments in OpenVPN Configuration

In another significant update, several behaviors in OpenVPN client configurations have been modified. Previously static MTU values will now be pushed from the server, granting administrators greater flexibility to adjust them post-deployment. Furthermore, one-time password (OTP) authentication tokens will likewise be served from the server when OTP is enabled. The update also removes the CA certificate from client configuration files to mitigate import failures in NetworkManager, as this certificate is now included in the PKCS12 container.

Improvements to DNS Proxy and Wireless Access Point

The DNS proxy component, Unbound, has received a performance enhancement by switching to a multi-threaded model; it will now utilize one thread per CPU core instead of operating on a single thread. This change is expected to significantly reduce response times under heavy load, increasing efficiency across systems.

Also addressed were bugs related to wireless access points. The support for 802.11a/g has been restored, as it had been unintentionally dropped in a previous release. Furthermore, fixes have been implemented to alleviate excessive logging by hostapd during debugging, and improvements have been made to accept Pre-Shared Key (PSK) values that contain special characters.

Critical Security Patches

Security remains a top priority in this update, with OpenSSL being upgraded to version 3.6.1 to patch twelve critical vulnerabilities, including CVE-2025-11187, CVE-2025-15467, and others. The glibc library also received substantial patches addressing CVEs such as CVE-2026-0861 and CVE-2025-15281.

Updated Component Versions

This release features notable updates to various core components of IPFire, including Apache 2.4.66, BIND 9.20.18, cURL 8.18.0, OpenVPN 2.6.17, strongSwan 6.0.4, Suricata 8.0.3, Unbound 1.24.2, ClamAV 1.5.1, Samba 4.23.4, and Tor 0.4.8.21.

In conclusion, IPFire’s Core Update 200 provides vital enhancements in security and functionality. By introducing new tools and improving existing components, the project aims to strengthen its user base’s confidence while reinforcing its commitment to open-source cybersecurity solutions. As an open-source platform, IPFire continues to harness community contributions to refine and enhance the system, ensuring it remains a viable choice for network security.

Source link

Latest articles

Meta AI in WhatsApp Streamlines Chats and Raises Privacy Concerns

Meta AI Integration in WhatsApp Sparks Conversations on Privacy and Organization The ongoing trend of...

Cyber Briefing – March 2, 2026: CyberMaterial

Cybersecurity Alert: ClawJacked Flaw Exposes OpenClaw Users In a significant development within the cybersecurity realm,...

Chrome Unveils Plan for Quantum-Safe HTTPS Certificates

Google Chrome Initiates Quantum-Resistant HTTPS Initiative In a proactive response to the imminent threats posed...

Link11 European Cyber Report 2026 Highlights Increasing DDoS Threats

Frankfurt am Main, Germany – March 2, 2026, CyberNewswire Recent insights released by Link11 in...

More like this

Meta AI in WhatsApp Streamlines Chats and Raises Privacy Concerns

Meta AI Integration in WhatsApp Sparks Conversations on Privacy and Organization The ongoing trend of...

Cyber Briefing – March 2, 2026: CyberMaterial

Cybersecurity Alert: ClawJacked Flaw Exposes OpenClaw Users In a significant development within the cybersecurity realm,...

Chrome Unveils Plan for Quantum-Safe HTTPS Certificates

Google Chrome Initiates Quantum-Resistant HTTPS Initiative In a proactive response to the imminent threats posed...