Blog - IPFire 2.25 - Core Update 142 released

Hi.

Only have this activate:

 - whitelist.rules
 - emerging-worm.rules
 - emerging-inappropriate.rules
 - emerging-attack_response.rules
 - emerging-current_events.rules
 - tor.rules
 - emerging-misc.rules
 - emerging-mobile_malware.rules
 - botcc.portgrouped.rules
 - drop.rules
 - compromised.rules
 - dshield.rules
 - emerging-dos.rules
 - emerging-p2p.rules
 - emerging-exploit.rules
 - ciarmy.rules
 - emerging-trojan.rules
 - botcc.rules
 - emerging-malware.rules

I have tried to activate Suricata with the Green interface and it works correctly. It only fails when the Red interface is activated.

iā€™m in the same situation of @roberto
i donā€™t think this is the culprit, until two weeks ago never haver had a problem with dns system
and the rules were the same from the beginning of IPS in ipfire.

I noticed that the problem has not appeared again when our IPS gave us form 10 down - 4 up,
20 down - 15 up last week. Maybe when the upload speed is slow IPS is too aggressive?

Letā€™s hear a comment from the dev.

PS: there is always the problem that i canā€™t see or login to people.ipfire.org, community.ipfire.org and blog.ipfire.org unless i use brave browser tor inprivate session in the PC, tried with my ISP with two different machine, same thing via VPN. Via cell phone no problem so far.

UT1

We have changed the starting order because suricata sometime not got the dns based rules working or block the dns at reconnect.

Unbound does a lot dns request at start to got the rootzones and validate the keys.Im not sure how large the queue must be.

I have partially solved the problem. I have had to configure the Protocol for DNS queries in TLS and so it does work with Suricata activated.

In UDP mode no works.

Regards.

@arne_f.
ok thanks for the answer, i was just guessing. Again, if there is some log or whatever we can do to make you and ipfire dev team to understand better the situation, just ask. in my little knoledge of linux and ipfire i will try to give info you may need.

regards

UT1

We have not found a way to get logs from the suricataā€™s dns part yet. This simply doesnā€™t log anythingā€¦

ok. thanks

UT1

Hy @roberto, could you explain better how you managed the problem?

The only way to have Suricata and Unbound working has been to configure it in TLS mode. Putting the DNS of Google and in TLS Hostname, putting ā€œdns.googleā€.

I also have little knowledge of Linux and I have been looking at forums and all that without getting anything. The only thing, configure it as TLS.

Have you tried it?.

Greetings.

iā€™m on tls too, i always been in fact, with or without dns not working.
Thanks for the reply @roberto

Hallo!

Iā€™m still on 141 and unsure, wether itā€™s safe to update or not. Can somebody provide a summary of this topic, under which circumstances 142 should not be used?

(BTW, because of such things, I wait some days and search the forum before updating ā€¦ unfortunately it seems, that even problematic updates are never drawn back ā€¦)

Michael

Thatā€™s the reason why Iā€™m still on core 139.

Reports on that forum talk about broken DNS and some issues with IPS rulesets, hence Iā€™m still waiting for some more days.

Whatā€™s more important to me, currently Iā€™m stuck in my home office so I cannot afford a breakdown of the internet connection.

@roberto you might be masking another factor. Changing any parameter on the Domain Name System page causes unbound to restart. It is the latter that gets DNS working for me, whether by changing the parameters or via CLI stop/start.

FWIW my opinionā€¦ thatā€™s the third time in a row (140, 141, 142) that a lot of problems are appearing into IPFire Community.
So this minus, added to:

  • Lacking of MultiWAN
  • Lacking of IPv6
  • Lacking of configuration management (i can only backup and restore)

Makes me sayā€¦ Not time for IPFire, today (2020). And i am sorry for that

Exspecially Core update 140 was really problematic!!! :rofl:

But I agreeā€¦ itā€™s the first time Iā€™ve encountered multiple bugs in ipfire. Never had problems before.

Donā€™t get me wrong, no anger or disrespect on what the developers are doing.
But facts and experiences areā€¦ visible and countable. Therefore for the current year all projects wonā€™t rely on IPFire, but on other products.
I do not want that an update (which is monolithic and i have no chance to cherry pick every single change) can break a starting project/site, which seems to be happening too often in recent months. On the parallel lane, if the infrastructure allows me, i will realize side machines for not-so-cold spare in case of update breakup by IPFire.

For me it looks more like a suricata bugs that drops dns queries without logging it and ignore configuration reloads at reconnect and such things.
With core139 some suricata dns features was simply not working at all. Now it works but not in some configurations like slow red connections.

unbound on core 142 also stopped dhcp. I noticed it only when a newly started PC failed to get an address.

FYI: I didnā€™t notice such problems. My system is a ā€œstandardā€ installation on a small system without suricata. Thus Arneā€™s opinion may be right.

dhcp server and client are not changed in core142

https://git.ipfire.org/?p=ipfire-2.x.git;a=tree;f=config/rootfiles/core/142/filelists;h=42544ae2cf1913db9a2c83bb50892cd9a1ee5517;hb=70af65df4198c58f99a333748faa39b39ad1c3c4