2.7.1 New Features and Changes¶
This is a maintenance software release including new features and bug fixes.
Consult the Upgrade Guide before proceeding with any upgrade.
General¶
PHP has been upgraded to 8.2.11
The base operating system has been upgraded to a more recent point on FreeBSD 14-CURRENT
Support for SCTP has been improved in PF for firewall rules, NAT, and logging. Rules can now act on SCTP packets by port number, previously it was only possible to filter on source or destination address.
OpenSSL in the base system has been upgraded from 1.1.1t to 3.0.12.
For details, see OpenSSL upgraded to 3.0.12.
Kea DHCP Server has been added as an opt-in feature preview for IPv4 and IPv6 DHCP service. Kea will eventually replace the ISC DHCPD daemon which is EOL.
Warning
Kea is not yet feature complete. For details, see Kea DHCP Server feature preview now available.
IPv6 Router Advertisement configuration has been relocated to Services > Router Advertisement as a part of the ongoing DHCP Server changes.
Certain parts of the base system are being migrated to packages rather than grouping them all together in an archive in the “base” package. For the most part this should be entirely transparent to users.
Specifically, the code from the main pfSense software repository is now a part of the “pfSense” package. This lets management of files be handled entirely by
pkg
rather than carrying them in an archive. This migration is ongoing, so future versions will include additional portions of the system being packaged differently.The default driver for NVMe storage devices changed from
nvd(4)
tonda(4)
. For most users this will be a transparent change since the majority of installations are mounted by label and do not reference a storage device by name.Some swap configurations may reference the old device name in
/etc/fstab
. Editing that file and correcting device names fromnvd
tonda
, followed by a reboot, should restore swap functionality.If the new driver is problematic in certain environments the default can be changed back to
nvd(4)
by adding a loader tunable forhw.nvme.use_nvd=1
.
Troubleshooting¶
Due to changes in
pkg
, the new version ofpkg
may not be able to properly locate and use the CA trust store when running on the previous version before upgrading.If the firewall is unable to load packages or check for updates after selecting the CE 2.7.1 upgrade branch, run
certctl rehash
from the console, a root shell prompt, or via Diagnostics > Command Prompt. This will allowpkg
to utilize the system certificates until the next reboot.
OpenSSL upgraded to 3.0.12¶
OpenSSL has been upgraded to 3.0.12 from 1.1.1 in FreeBSD.
This change was necessary as OpenSSL 1.1.1 reached its End of Life (EOL) on September 11, 2023. This means there will be no security patches for vulnerabilities affecting OpenSSL 1.1.1.
The OpenSSL team decided to make an explicit jump in numbering from 1.1.x to 3.x to highlight that this new version included major structural, and more importantly, application programming interface (API) and application binary interface (ABI) changes compared to previous OpenSSL versions.
In addition to the differences in the library they also deprecated numerous weak algorithms of various types.
Due to these differences, changing from OpenSSL 1.1 to OpenSSL 3.0 is not a simple upgrade. Netgate developers have handled most of these changes as automatically as possible, though some things may still require manual adjustments. See the warnings in the next section for details.
OpenSSL 3.0.x Upgrade Warnings¶
Weak Certificate Digests such as SHA1 are Deprecated¶
Warning
OpenSSL 3.0.x no longer supports certificates signed with SHA1 or other older/weaker hashes. The minimum recommended hash strength is SHA256.
The upgrade process detects usage of weak certificates for the GUI, Captive Portal, and OpenVPN:
If the GUI or a Captive Portal zone utilizes a weak CA or server certificate, the upgrade process generates a new self-signed certificate as a stopgap measure to allow the processes to start and let the user in to make any necessary corrections.
If an OpenVPN instance is using a weak certificate, the instance is disabled as there is no viable general automated recovery method.
OpenVPN peers using SHA1 certificates will fail, but such issues must be corrected on the peers. This may mean renewing or reissuing certificates or re-exporting clients for peers if they are currently using weak certificates.
Other consumers of certificates, such as add-on packages, may be similarly affected but cannot be automatically adjusted.
The best practice is to reconfigure all services utilizing certificates with stronger certificates and to test these functions before performing an upgrade to ensure a smoother transition.
Numerous Deprecated Encryption and Digest Algorithms Removed¶
Warning
OpenSSL 3.0.x removes a large number of deprecated encryption and digest algorithms. This primarily affects OpenVPN, as other areas had not supported the affected algorithms in some time.
- Encryption algorithms removed from OpenVPN:
ARIA
Blowfish (e.g. BF-CBC), which was formerly an OpenVPN default
CAST5
DES
DESX
IDEA
RC2
RC5
SEED
SM4
- Hash algorithms removed from OpenVPN:
MD4
MDC2
SM3
Whirlpool
On upgrade, tunnels using these deprecated algorithms will be adjusted so they use more secure default values when necessary.
The best practice is to reconfigure tunnels using modern secure encryption and hashing, and to test tunnels before performing an upgrade to ensure a smoother transition.
Kea DHCP Server feature preview now available¶
The ISC DHCPD server has reached its End of Life (EOL) as of October 5, 2022. Though ISC has stated they may continue to publish security fixes if they are warranted.
Netgate developers have started the migration to Kea DHCP server from ISC as a replacement for ISC DHCPD for IPv4 and IPv6 DHCP service. Basic functionality is present, but not all features are supported at this time.
Warning
Currently the Kea implementation lacks the following DHCP server features:
Local DNS Resolver/Forwarder Registration for static and dynamic DHCP clients
Remote DNS server registration
DHCPv6 Prefix Delegation
High Availability Failover
Lease statistics/graphs
Custom DHCP options
Kea is available as an opt-in preview feature on this release. The UI and settings for Kea are shared with the existing DHCP server. Administrators can easily switch between ISC DHCPD and Kea by navigating to System > Advanced, Networking tab and changing the new Server Backend setting in the DHCP Options section.
After Kea integration is complete it will become the default DHCP server on a future release of pfSense software and eventually the deprecated ISC DHCP server will be removed. The exact timing of these changes has not been finalized.
Note
As a part of changes to the DHCP server, IPv6 Router Advertisement configuration has been separated from the DHCP server UI and relocated to Services > Router Advertisement.
Security¶
In addition to OpenSSL and other concerns in the base OS and packages, this release addresses the following vulnerabilities in pfSense software:
pfSense-SA-23_08.webgui (XSS in
getserviceproviders.php
, #14547)pfSense-SA-23_09.webgui (XSS in
status_logs_filter_dynamic.php
, #14548)pfSense-SA-23_10.webgui (Authenticated Command Execution in
interfaces_gif_edit.php
andinterfaces_gre_edit.php
, #14549)pfSense-SA-23_11.webgui (Authenticated Command Execution in
packet_capture.php
, #14809)
Tip
Patches for these issues are also available in the latest version of the System Patches Package for users of pfSense Plus software version 23.05.1 and pfSense CE software version 2.7.0.
pfSense CE¶
Changes in this version of pfSense CE software.
Aliases / Tables¶
Fixed: Firewall rules fail to load when a URL table alias file does not exist #13068
Added: Type column on Alias lists #13245
Fixed: Static ARP entries are not configured at boot #14374
Fixed: Firewall rules are not displayed properly when they reference a URL table alias and its file does not exist #14574
Authentication¶
Added: Option to invalidate GUI login session if the client address changes #14265
Backup / Restore¶
Changed: Increase timeout for password entry when restoring an encrypted configuration via ECL #14769
CARP¶
Captive Portal¶
Certificates¶
Fixed: Cannot validate Certificates against Certificate Revocation Lists for Intermediate Certificate Authorities #9889
Added: Improve System menu behavior for Certificate Manager privileges #14347
Fixed: CA and Certificate renewal page does not properly list some SHA1 certificates as being weak #14678
DHCP (IPv4)¶
Added: Introduce Kea DHCP as an alternative DHCP server for IPv4 and IPv6 #6960
DNS Resolver¶
Dashboard¶
Diagnostics¶
Fixed:
diag_edit.php
warning is not cleared after picking non-directory to load #7589Changed: Combining Interface and Rule ID state table filter fields returns no results #14399
Fixed: Improve error handling in
status.php
#14513Added: Status output plugin hook for packages to include their own data #14777
Dynamic DNS¶
Added: Include hostname being updated in Dynamic DNS notifications #9504
Added: Dynamic DNS support for Porkbun #14402
Fixed: PHP error with One.com Dynamic DNS provider #14649
Fixed: List of Dynamic DNS types with split host+domain name is missing several providers #14783
Fixed: Correct name of Gandi LiveDNS #14784
Fixed: Multi-WAN Dynamic DNS does not fail over when preferred WAN loses link #14829
Gateways¶
Fixed: Misleading error message when adding/editing static routes which use a gateway on a disabled interface #8846
Fixed: Cannot select IP Alias VIP with CARP VIP parent in Virtual IP drop-down on Gateway Groups #14524
Fixed: A default route can remain after setting the default gateway to None #14717
Hardware / Drivers¶
IGMP Proxy¶
IPsec¶
Changed: Clarify that the IPsec keep alive check option ignores Child SA Start Action #12762
Fixed: PHP error in
status_ipsec.php
after removing active IPsec tunnel configuration #14525Fixed: Multi-WAN IPsec does not fail over when preferred WAN loses link #14626
Added: Show IPsec phase 1 authentication type in Mode column of tunnel list #14726
Fixed: IPsec rejects certificate without any SANs #14831
IPv6 Router Advertisements (radvd/rtsold)¶
Fixed: IPv6 neighbor discovery protocol (NDP) fails in some cases #13423
Interfaces¶
Fixed: GIF-based interface MTU is assigned to parent interface on boot when parent interface is a LAGG #13218
Fixed: Cannot add a QinQ interface to a bridge #14377
Fixed:
find_interface_ipv6_ll()
can return a VIP instead of the interface address #14392Fixed: Interface value is not properly validated when submitted on
interfaces_gif_edit.php
andinterfaces_gre_edit.php
#14549Fixed: Primary interface address is incorrectly set to the last address on the interface #14623
Fixed: Link loss causes interfaces configured as Track Interface for IPv6 to lose their IPv4 addresses #14756
Changed: Eliminate direct config access in
interfaces.php
#14790
Logging¶
Notifications¶
OpenVPN¶
Fixed: OpenVPN can select the wrong interface IP address when multiple addresses are present #14646
Changed: Prevent weak SHA1 certificates from being used with OpenVPN clients and servers #14677
Changed: Check for deprecated OpenVPN encryption and digest options on upgrade #14686
Changed: Update OpenVPN to 2.6.7 #14985
Operating System¶
PHP Interpreter¶
Added: Option to configure a custom value for the PHP memory limit #13377
PPP Interfaces¶
PPPoE Server¶
Fixed: PPPoE Server address input validation is incorrectly allowing IPv6 #13903
Packet Capture¶
Rules / NAT¶
Added: Support interface macros in Outbound NAT rules #3288
Fixed: Negating
<interface> net
when a VIP exists on the interface results in unintended behavior #6799Added: Option to wait for interface selection before displaying firewall rules #13124
Added: Support interface groups in firewall rule source/destination fields #14448
Fixed: “Convert interface definitions” option is not respected when bulk copying rules #14576
Fixed: Rule separators are ordered incorrectly after removing rules in certain positions #14619
Fixed: Rule separators are hidden when their index is greater than the number of rules #14621
Added: Extend support for SCTP in firewall and NAT rules #14640
Fixed: Separators get shifted when copying firewall rules between interfaces #14691
Fixed:
ctype_digit()
returns unexpected result for values <=255
which can break some validation functions/usages #14702
System Logs¶
Fixed:
status_logs_filter_dynamic.php
does not encode value ofinterfacefilter
in raw mode #14548
Traffic Graphs¶
Traffic Shaper (ALTQ)¶
Fixed: Kernel panic when using traffic shaping on a PPPoE interface #14497
Translations¶
Fixed: Some functions fail if the Language does not exactly match an available Locale #13776
UPnP/NAT-PMP¶
Fixed: Remove broken
stun.sipgate.net
from UPnP STUN server list #14673
Upgrade¶
Fixed: Update check in GUI does not always honor the configured proxy settings #14609
User Manager / Privileges¶
Fixed: Copy function for User Manager Groups does not work for first group in list #14695
Web Interface¶
Fixed: Refactor IPsec code using config access functions #13704
Fixed: PHP error in CSRF Magic from invalid time value #14394
Fixed: Breadcrumb path missing on
system_register.php
#14462Changed: Prevent weak SHA1 certificates from being used with GUI and Captive Portal #14672
Fixed:
status_carp.php
anddiag_dump_states.php
unresponsive with large state tables #14758Fixed: Logo text is partially rendered when using Compact-RED theme on CE #14807
Fixed: GUI TCP port is not updated in the configuration when saving with the field empty to remove an existing value #14820
Wireless¶
Fixed: PHP error in
handle_wireless_post()
when toggling some wireless interface options #14579