Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Patching/Upgrading OpenSSL

    Scheduled Pinned Locked Moved Problems Installing or Upgrading pfSense Software
    150 Posts 50 Posters 77.8k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • D
      drees
      last edited by

      @joltman:

      Looks like 2.1.2 is up?

      Yep:
      https://www.pfsense.org/download/

      1 Reply Last reply Reply Quote 0
      • CNLiberalC
        CNLiberal
        last edited by

        I just saw some people in the forum are getting an error when they're editing their rules.  I'm going to hold off for now.

        pfSense 2.7.2-RELEASE

        Dell R210 II
        Intel E3-1340 v2
        8GB RAM
        SSD ZFS Mirror
        Intel X520-DA2, RJ45 SFP+ (WAN) and 10Gb SFP+ DAC (LAN)
        1 x Cisco 3850 12XS-S (Core Switch)
        2 x Cisco 3750X PoE Gig Switch (Access Stack)
        3 x Cisco 2802i APs (Mobility Express)

        1 Reply Last reply Reply Quote 0
        • C
          Criggie
          last edited by

          @joltman:

          I just saw some people in the forum are getting an error when they're editing their rules.  I'm going to hold off for now.

          2.1.2 installed, working for me.  Joltman: what's your IP address? …..

          1 Reply Last reply Reply Quote 0
          • CNLiberalC
            CNLiberal
            last edited by

            ??

            pfSense 2.7.2-RELEASE

            Dell R210 II
            Intel E3-1340 v2
            8GB RAM
            SSD ZFS Mirror
            Intel X520-DA2, RJ45 SFP+ (WAN) and 10Gb SFP+ DAC (LAN)
            1 x Cisco 3850 12XS-S (Core Switch)
            2 x Cisco 3750X PoE Gig Switch (Access Stack)
            3 x Cisco 2802i APs (Mobility Express)

            1 Reply Last reply Reply Quote 0
            • A
              adam65535
              last edited by

              jimp posted that it is fixed…  problem with autoconfigbackup package which was just updated to fix it...

              https://forum.pfsense.org/index.php?topic=75060.msg409582#msg409582

              The github commit to the package...

              https://github.com/pfsense/pfsense-packages/commit/8869c3d78abf2bf7e72fe079ed457c28f3f8edab

              1 Reply Last reply Reply Quote 0
              • JeGrJ
                JeGr LAYER 8 Moderator
                last edited by

                @joltman: As I was reporting this, I agree to adams statement. Getting rid of autoconfbackup package before upgrading should completely avoid this. Afterwards it can be installed to it's new version (1.22) again without hiccups. Problem was completely related to the package, not the main distro.

                Greets Jens

                Don't forget to upvote 👍 those who kindly offered their time and brainpower to help you!

                If you're interested, I'm available to discuss details of German-speaking paid support (for companies) if needed.

                1 Reply Last reply Reply Quote 0
                • CNLiberalC
                  CNLiberal
                  last edited by

                  Cool.  I'm proceeding.  Poor ESF servers getting hammered hard.

                  EDIT:  Finished.  Looks good!

                  pfSense 2.7.2-RELEASE

                  Dell R210 II
                  Intel E3-1340 v2
                  8GB RAM
                  SSD ZFS Mirror
                  Intel X520-DA2, RJ45 SFP+ (WAN) and 10Gb SFP+ DAC (LAN)
                  1 x Cisco 3850 12XS-S (Core Switch)
                  2 x Cisco 3750X PoE Gig Switch (Access Stack)
                  3 x Cisco 2802i APs (Mobility Express)

                  1 Reply Last reply Reply Quote 0
                  • F
                    Fmstrat
                    last edited by

                    Hi all, I see the founder tweeted that keys may be OK:

                    https://twitter.com/neelmehta/status/453625474879471616

                    However I also know that people have pulled keys from FreeBSD. For OpenVPN users, do we need to swap our keys if we were using PFsense 2.1.x?

                    Thanks.

                    1 Reply Last reply Reply Quote 0
                    • D
                      dannyman
                      last edited by

                      Thanks for getting 2.1.2 out!

                      This will be my first upgrade.  I assume the firewall will need to reboot.  Any quick advice or how long an upgrade takes, how long is the downtime, maybe these questions are already covered somewhere?

                      Does the secondary firewall upgrade when it sees it peer upgrade or do I trigger that manually?

                      I've announced 5+ minutes downtime in a 1 hour maintenance window.  Looks like there's a backup / rollback option so I'm hoping that even if I hit a snag I won't be dead in the water!

                      Thanks,
                      -danny

                      1 Reply Last reply Reply Quote 0
                      • BBcan177B
                        BBcan177 Moderator
                        last edited by

                        Upgraded one of my boxes from 2.0.3 to 2.1.2.

                        No issues to report!  ;)

                        Except that Suricata lost all of its interface settings. Looks like a new install of that package. Snort was also installed and it came back 100%

                        Great Work Guys!

                        "Experience is something you don't get until just after you need it."

                        Website: http://pfBlockerNG.com
                        Twitter: @BBcan177  #pfBlockerNG
                        Reddit: https://www.reddit.com/r/pfBlockerNG/new/

                        1 Reply Last reply Reply Quote 0
                        • BBcan177B
                          BBcan177 Moderator
                          last edited by

                          What testing method is recommended to test the Bleeding Heart issue in pfSense?

                          "Experience is something you don't get until just after you need it."

                          Website: http://pfBlockerNG.com
                          Twitter: @BBcan177  #pfBlockerNG
                          Reddit: https://www.reddit.com/r/pfBlockerNG/new/

                          1 Reply Last reply Reply Quote 0
                          • B
                            Bluejay
                            last edited by

                            I registered just to comment on what an amazing job you guys did in getting this patch out so quickly. There are commercial routers costing hundreds of dollars (if not thousands) that I imagine will be vulnerable for weeks…

                            1 Reply Last reply Reply Quote 0
                            • T
                              th3r3isnospoon
                              last edited by

                              Thank you Jim Pingle, Chris Buechler, all the other devs and the community members that helped make this happen!  It's much appreciated!

                              I will be buying a gold subscription to show my thanks!

                              -th3r3isnospoon

                              1 Reply Last reply Reply Quote 0
                              • P
                                phong
                                last edited by

                                @dannyman:

                                Any quick advice or how long an upgrade takes, how long is the downtime

                                It took my pfSense box about 5-10 minutes for the whole process (which was without any problems).
                                The downtime was only 1 minute 30 seconds (the time I couldn't access internet or ping the pfSense box). My pfSense box is quite an old PC (Pentium 3 or 4).

                                Thank you admins for your work on this serious bug.

                                1 Reply Last reply Reply Quote 0
                                • J
                                  jasonlitka
                                  last edited by

                                  @dannyman:

                                  Thanks for getting 2.1.2 out!

                                  This will be my first upgrade.  I assume the firewall will need to reboot.  Any quick advice or how long an upgrade takes, how long is the downtime, maybe these questions are already covered somewhere?

                                  Does the secondary firewall upgrade when it sees it peer upgrade or do I trigger that manually?

                                  I've announced 5+ minutes downtime in a 1 hour maintenance window.  Looks like there's a backup / rollback option so I'm hoping that even if I hit a snag I won't be dead in the water!

                                  Thanks,
                                  -danny

                                  You're using CARP on all interfaces?  If so, the downtime will be basically zero.

                                  Upgrade the backup first.  Once it's back up and running disable CARP on the first box to force a failover.  Once you're sure things are working on the backup, upgrade the primary.  Once the upgrade is done everyone will fail back to the primary automatically.

                                  I can break anything.

                                  1 Reply Last reply Reply Quote 0
                                  • G
                                    gertk
                                    last edited by

                                    What about windows OpenVPN client programs? I have to upgrade them too or not?

                                    1 Reply Last reply Reply Quote 0
                                    • D
                                      doktornotor Banned
                                      last edited by

                                      @gertk:

                                      What about windows OpenVPN client programs? I have to upgrade them too or not?

                                      https://forum.pfsense.org/index.php?topic=74948.0

                                      1 Reply Last reply Reply Quote 0
                                      • A
                                        Atomicslave
                                        last edited by

                                        Just want to say a big Thanks to all the Devs who put time in on this, upgraded my home firewall last night and my work one this morning.

                                        Thanks again guys Awesome Job!

                                        1 Reply Last reply Reply Quote 0
                                        • E
                                          Ecnerwal
                                          last edited by

                                          Happily my "system where VPN runs and security matters" is still on 2.0.3, as I've I've had continuing nags with 2.1 where I did try it that made me not upgrade that one since 2.0.3 is nice and stable and I can put up with complaints from the users of the other system more easily as I try to work the 2.1 issues out there (or wait for them to be worked out, more likely.) Hopefully 2.1.2 will be better than 2.1, and if not, I guess there's always heading back to 2.0.3 on both systems.

                                          pfSense on i5 3470/DQ77MK/16GB/500GB

                                          1 Reply Last reply Reply Quote 0
                                          • A
                                            adam65535
                                            last edited by

                                            @Jason:

                                            You're using CARP on all interfaces?  If so, the downtime will be basically zero.

                                            Upgrade the backup first.  Once it's back up and running disable CARP on the first box to force a failover.  Once you're sure things are working on the backup, upgrade the primary.  Once the upgrade is done everyone will fail back to the primary automatically.

                                            Unless you are dependent on packages being installed like some routing daemons, squid, etc.  The current disable carp feature on the carp status page does not survive reboots.  The primary will take over immediately after the reboot before those get re-installed fully so there will be some downtime in that case.  If you don't depend on any packages then it should be 0 downtime.

                                            Someone has submitted a feature in 2.2 version that allows you to put a carp member in maintenance mode so that the member you put into maintenance mode will not take over when it boots up unless carp detects that the other member is down.

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.