We’ve just rolled out IPFire 2.29 - Core Update 195 for testing!
This update brings a range of new features and improvements, and we need your help to ensure everything works smoothly before the official release.
One of the highlights is the addition of WireGuard VPN support a modern, lightweight VPN protocol known for its simplicity and performance.
Here’s what you can explore with WireGuard in this update:
Full integration into the IPFire WUI.
Support for net-to-net and host-to-net (Roadwarrior) connections.
Multiple peer configurations with individual settings.
QR code display and config file export for quick mobile setup.
A WireGuard config importer.
Full support for Intrusion Prevention System and Connection Tracking.
WireGuard can run alongside existing VPN services, offering a separate option for secure connections. Check out the WireGuard documentation for setup details:
This update also includes other enhancements, like updated packages (e.g., OpenSSH 10.0.p1, OpenSSL 3.5.0) and usability improvements to Pakfire. You can read the full list of improvements on the blog
How to Help with Testing
This is a testing phase, not the final release, your feedback is crucial! Please:
Test WireGuard and other new features in your environment.
Share your experiences to help us refine this update.
We’re looking forward to hearing your thoughts!
A Quick Reminder
IPFire is free to use, but it’s not free to develop and maintain. Your donations keep this project alive and help us add new features like this. If you’re able, please consider supporting us at www.ipfire.org - Donate Every contribution makes a difference!
Also went smoothly for me. I upgraded, from CU 194 Testing, via WUI, without problems. This testing installation is on x86_64 hardware. I use few addons.
Technically, the throughput should be better than OpenVPN. We tested throughput from IPFire’s data centre to my ISP, but I think some external QoS was limiting us somewhere at around 500 Mbps.
Also, enabling IPS on WireGuard can slow down throughput if the hardware’s CPU isn’t up to scratch.
Do I think correctly that the Wireguard Client Pool should be different from the OpenVPN subnet address range , OpenVPN Static IP address pools , IPsec Host-to-Net Virtual Private Network (RoadWarrior)?
On your IPS page (cgi-bin/ids.cgi), which interfaces have you enabled?
I’ve noticed that in the /var/ipfire/suricata/suricata-homenet.yaml file, when both WireGuard and IPS scanning for WG are enabled, the subnet of the WG interface doesn’t appear in the file. I’m not entirely sure if this is expected though.
This bug has been reported and a patch has been submitted. Hopefully in the next few days we’ll have an updated testing build with the the identified bugs fixed.
IMHO it would make more sense to have IPfire prevent configuring overlapping ranges in the first place (don’t know if this happens, but sounds like it does not).
Of course, yes. However, it requires additional work by developers to implement the additional code .
IMHO without this additional feature IPFire2 will work, and the time for additional work is better spent on the development of version 3 of IPFire.