Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Notice: OpenVPN 2.3 with integrated IPv6 released

    Scheduled Pinned Locked Moved 2.1 Snapshot Feedback and Problems - RETIRED
    28 Posts 6 Posters 5.6k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • jimpJ
      jimp Rebel Alliance Developer Netgate
      last edited by

      Better option may just be to install openssl from ports and use both, the older stable one for the base OS bits and the ports one for things like racoon, php, etc.

      There used to be an openssl port that overwrote the base version but it seems to have disappeared over the years.

      We would need to make sure that things like certificate generation and other operations the require openssl don't break in the process.

      At the very least I know we need to change/fix the code that generates certificates so that it puts the openssl config files in the right/expected place.

      Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

      Need help fast? Netgate Global Support!

      Do not Chat/PM for help!

      1 Reply Last reply Reply Quote 0
      • M
        msi
        last edited by

        Just in case, the patch in 8-STABLE bumping OpenSSL applies cleanly on RELENG_8_3:
        https://github.com/matsimon/pfsense-freebsd-patched/commit/ec497cbed721f4c6ccad30eccca599749fdfe438

        Extracting a patch for pfsense-tools is easy - but would you be willing to try?

        1 Reply Last reply Reply Quote 0
        • jimpJ
          jimp Rebel Alliance Developer Netgate
          last edited by

          might be worth trying.

          If you can turn that into a pull request and reference ticket https://redmine.pfsense.org/issues/2616 (It's in the pfSense-tools project area) we can look it over deeper, maybe do a test run.

          Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

          Need help fast? Netgate Global Support!

          Do not Chat/PM for help!

          1 Reply Last reply Reply Quote 0
          • M
            msi
            last edited by

            Done so, if you can pipe it through some builders.
            This also the version realease version of 9.1 ships with - at least in terms of testing it has gone through the 9.1 release engineering process.

            I'm definitely not an expert on OpenSSL, the only thing I did was to extract this one huge patch and add the patch to the tools. ;-)

            1 Reply Last reply Reply Quote 0
            • jimpJ
              jimp Rebel Alliance Developer Netgate
              last edited by

              Not sure this alone is going to be sufficient the more I think about it, since the port would still fail unless this patch was applied to the builder itself and compiled before building the pfPort. Not really a bad thing per se, but it adds another manual step to an otherwise automated process, unless we add more code to account for that as wellโ€ฆ

              Using the ports version of OpenSSL may end up being easier.

              Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

              Need help fast? Netgate Global Support!

              Do not Chat/PM for help!

              1 Reply Last reply Reply Quote 0
              • M
                msi
                last edited by

                Yes, as of now the pfPorts are built prior to 'make world' with the patches.
                Didn't think of this first, hmm.

                Well, adding the port could then be a better option, anyway maintaing OpenSSL
                then on our own is definitely something I'm very forward looking as well, OpenSSL still os considered being somehow a bit of a mess ;-)

                1 Reply Last reply Reply Quote 0
                • jimpJ
                  jimp Rebel Alliance Developer Netgate
                  last edited by

                  yeah, I think the time would be better spent making sure the openssl port works for us.

                  I believe it does, since we did run that way for a time earlier in the 2.x cycle accidentally, the only negative I recall was that we had to relocate the ssl configs otherwise cert generation failed.

                  PolarSSL looks interesting, not sure if that's another long-term option.

                  Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

                  Need help fast? Netgate Global Support!

                  Do not Chat/PM for help!

                  1 Reply Last reply Reply Quote 0
                  • M
                    msi
                    last edited by

                    Just as another update: While ipsec-tools require bumping OpenSSL somehow, OpenVPN 2.3 does not (yet) require us to do so.

                    I just used portmaster on a vanilla 8.3 to build from the now updated ports. Currently looking at how to mangle our port - and possibly
                    detect issues with the GUI - I hope databeestje will also be able to have a look.

                    1 Reply Last reply Reply Quote 0
                    • jimpJ
                      jimp Rebel Alliance Developer Netgate
                      last edited by

                      Yes, OpenVPN 2.3 should be an easy swap. I see the FreeBSD ports tree has openvpn at 2.3_1 already, too.

                      Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

                      Need help fast? Netgate Global Support!

                      Do not Chat/PM for help!

                      1 Reply Last reply Reply Quote 0
                      • jimpJ
                        jimp Rebel Alliance Developer Netgate
                        last edited by

                        Current snapshot build run will contain openvpn 2.3 when it finishes baking.

                        snapshots-8_3-amd64# pkg_info -Ix openvpn
                        openvpn-2.3.0_1ย  ย   Secure IP/Ethernet tunnel daemon
                        

                        Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

                        Need help fast? Netgate Global Support!

                        Do not Chat/PM for help!

                        1 Reply Last reply Reply Quote 0
                        • M
                          msi
                          last edited by

                          OK, good, I saw you catched the password file modification.

                          awaiting crashes ;-)

                          1 Reply Last reply Reply Quote 0
                          • jimpJ
                            jimp Rebel Alliance Developer Netgate
                            last edited by

                            Yeah and I also disabled easyrsa since we do not want that to be installed by default.

                            Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

                            Need help fast? Netgate Global Support!

                            Do not Chat/PM for help!

                            1 Reply Last reply Reply Quote 0
                            • jimpJ
                              jimp Rebel Alliance Developer Netgate
                              last edited by

                              as usual, the upgrade was a snoozefest.

                              I cheated and downloaded the update tgz directly from the builder so I wouldn't have to wait for the whole snapshot run to upload.

                              tablet connected right up to the vpn and it's like nothing really changed. Pulled an IPv4 and IPv6 IP over the VPN tunnel and things look happy. I'll wait for others to report success or failure but to me it looks like an all-around win. So far.

                              Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

                              Need help fast? Netgate Global Support!

                              Do not Chat/PM for help!

                              1 Reply Last reply Reply Quote 0
                              • M
                                msi
                                last edited by

                                Hehe - the positive effect of having had those large IPv6 patches allows now to quickly switch to 2.3 and its IPv6 capability.

                                My ISP doesn't do v6 but I'll at least v4 since that's what I can test more readily.
                                If things go right, any worries about dumping openvpn-ipv6 used in pfSense 2.0 and also switch to 2.3?

                                P.S. Thanks for you testings jimp!

                                1 Reply Last reply Reply Quote 0
                                • jimpJ
                                  jimp Rebel Alliance Developer Netgate
                                  last edited by

                                  No reservations from me, but I'll ask around.

                                  Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

                                  Need help fast? Netgate Global Support!

                                  Do not Chat/PM for help!

                                  1 Reply Last reply Reply Quote 0
                                  • D
                                    dhatz
                                    last edited by

                                    @MatSim:

                                    If things go right, any worries about dumping openvpn-ipv6 used in pfSense 2.0 and also switch to 2.3?

                                    IMHO it'd be best to focus onto finally shipping out 2.1, which is based on a supported FreeBSD release (whereas 2.0.x's FreeBSD 8.1 is EoL since Jul-2012) โ€ฆ

                                    1 Reply Last reply Reply Quote 0
                                    • jimpJ
                                      jimp Rebel Alliance Developer Netgate
                                      last edited by

                                      @dhatz - 2.0.3 is already happening. Too many issues in 2.0.2 to leave it until 2.1 ships.

                                      2.1 is getting closer, but the type of issues we can fix here take different people/resources than the things still broken on 2.1. It's not holding up anything on 2.1 to do this. The main question is if it could break something on 2.0.x in the process. If there's really any doubt, we tend to leave things alone, but openvpn tends to have really good releases that don't break much if anything at all.

                                      Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

                                      Need help fast? Netgate Global Support!

                                      Do not Chat/PM for help!

                                      1 Reply Last reply Reply Quote 0
                                      • P
                                        phil.davis
                                        last edited by

                                        2.1-BETA1 (i386)
                                        built on Mon Jan 14 11:26:01 EST 2013
                                        FreeBSD 8.3-RELEASE-p5
                                        OpenVPN 2.3.0 i386-portbld-freebsd8.3 [SSL (OpenSSL)] [LZO] [eurephia] [MH] [IPv6] built on Jan 14 2013
                                        Alix 2D13 nanoBSD
                                        Test system running a simple OpenVPN config fine - 2 IPV4-only site-to-site clients connecting out to 2 remote offices. (No IPv6 on this one)

                                        As the Greek philosopher Isosceles used to say, "There are 3 sides to every triangle."
                                        If I helped you, then help someone else - buy someone a gift from the INF catalog http://secure.inf.org/gifts/usd/

                                        1 Reply Last reply Reply Quote 0
                                        • C
                                          cmb
                                          last edited by

                                          @dhatz:

                                          (whereas 2.0.x's FreeBSD 8.1 is EoL since Jul-2012) โ€ฆ

                                          We're continuing to support 8.1, as we have since July. Most vendors use much older versions than 8.1 including a number of commercial firewall vendors.

                                          1 Reply Last reply Reply Quote 0
                                          • M
                                            msi
                                            last edited by

                                            @dhatz: If you look at pfsense-tools, it's more about getting rid of different openvpn ports laying around there.
                                            Actually 2.0.2 ships wih OpenVPN 2.2.0 with an IPv6 patch, so did 2.1 snapshots until today.

                                            While 8.1 is EoL deemed by FreeBSD, last time a vulnerability was discovered against in 8.3/9.x and found present in pfSense has backported it to 2.0, so no worries in terms of security.
                                            (https://github.com/bsdperimeter/pfsense-tools/blob/master/patches/RELENG_8_1/hostapd-8.diff)

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.