2.4.5-p1 New Features and Changes¶
pfSense® software version 2.4.5-p1 addresses performance, security, and other miscellaneous issues found in 2.4.5.
Warning
Proceed with caution when upgrading pfSense software while COVID-19 travel restrictions are in effect.
During this time of travel limitations, remote upgrades of pfSense software should be carefully considered, and avoided where possible. Travel restrictions may complicate any repair of any issue, including hardware-related issues that render the system unreachable. Should these issues require onsite physical access to remedy, repair of the issue may not be possible while travel restrictions related to COVID-19 are in effect.
Tip
For those who have not yet updated to 2.4.5-p1, consult the previous release notes and blog posts for those releases to read all important information and warnings before proceeding.
Note
Upgrading to pfSense software version 2.4.5-p1 requires pfSense-upgrade
version 0.70 or later. Most installations will automatically pick up the new
version and upgrade normally. If this does not happen automatically and the
upgrade to version 2.4.5-p1 is not offered, use the following procedure:
Navigate to System > Updates
Set Branch to Previous stable version
Wait a few moments for the upgrade check to complete
Optional: Confirm that the latest version of pfSense-upgrade is present (version >= 0.70) using
pkg-static info -x pfSense-upgrade
.If the correct version is not present, wait a bit longer and check again as that package may be updating in the background.
Set Branch to Latest stable version
Wait a few moments for the upgrade check to complete
At this point, the upgrade check should see 2.4.5-p1 and the upgrade can proceed.
Note
pfSense software version 2.4.5-p1 includes pkg
version 1.13.x which
introduces a new metadata version. Most installations will automatically pick
up the new version and upgrade normally. In certain cases, especially coming
from much older versions, the pkg
utility may require a manual update
before it can correctly process the new metadata.
The pkg
utility can be upgraded manually with the following command run
from an ssh or console shell:
# pkg-static bootstrap -f
See Repository Metadata Version Errors for more details.
Security / Errata¶
Addressed an issue with large
pf
tables causing system instability and high CPU usage during filter reload events #10414Fixed an issue with
sshguard
which could prevent it from protecting against brute force logins #10488Updated
unbound
to address CVE-2020-12662 and CVE-2020-12663 #10576Updated
json-c
to address CVE-2020-12762 #10609Addressed FreeBSD Security Advisories & Errata Notices including:
Aliases / Tables¶
Fixed handling of URL/URL table aliases with IDN hostnames #10321
Authentication¶
Backup / Restore¶
Fixed handling of redundant/extraneous RRD tags when making configuration backups #10508
CARP¶
Fixed handling of IPv6 CARP VIPs with non-significant zeros during XMLRPC sync #6579
Certificates¶
Fixed a bug which prevented the user from removing a CA private key when editing #10509
Configuration Upgrade¶
Fixed a PHP error during upgrade from <2.4.3 with empty tags in the IPsec configuration #10458
DHCP (IPv6)¶
DHCP Relay¶
DHCP Server¶
Diagnostics¶
DNS Resolver¶
Dynamic DNS¶
Hardware / Drivers¶
IPsec¶
Fixed selection of IPsec VTI Phase 2 local network address/mask values #10418
Fixed saving IPsec connection breaking FRR BGP on VTI interfaces #10351
Updated DH group warnings to say that group 5 is also weak #10221
Fixed disabling IPsec Phase 1 with a VTI Phase 2 #10190
Fixed disabled IPsec Phase 2 entries being unintentionally included in
vpn_networks
table #7622
L2TP¶
Limiters¶
Notifications¶
Fixed SMTP notification SSL validation to respect the user-selected behavior #10317
NTPD¶
Added
localhost
to NTP Interface selection options #10348
OpenVPN¶
Operating System¶
Packages¶
Fixed handling of FreeRADIUS passwords containing non-XML-safe characters #4497
Fixed handling of Squid LDAP search filters containing an accent #7654
Fixed issues preventing FRR from working on certain platforms such as SG-1100 (arm64/aarch64) #10444
Fixed issues preventing Suricata from working on certain platforms such as SG-1100 (arm64/aarch64) #10228
Rules / NAT¶
Fixed Duplicate Outbound NAT entries from L2TP server addresses #10247
Fixed Outbound NAT rules for mobile IPsec users with per-user addresses defined #9320
Fixed IPv6 IP Alias VIPs not being added to Interface Network macros #8256
Fixed Destination port range “Any” in Port Forward rules #7704
Fixed display of interfaces on the Floating rules list #4629
Fixed rule description validation to reject
\
#10542Fixed setting NAT reflection timeout values #10591
Translations¶
Fixed language selection for Chinese (Taiwan) / HK Translations #10525
Services¶
Fixed
is_process_running()
handling of empty process, which could lead to an error when using the CLI to query the status of a service which does not exist #10540