Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Extremly long time between updates

    Scheduled Pinned Locked Moved General pfSense Questions
    9 Posts 6 Posters 1.1k Views 7 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • S Offline
      sand7000
      last edited by

      Is there a reason for the lack of updates to pfsense? I tried to look into it and found posts like this:

      https://www.reddit.com/r/PFSENSE/comments/epjsg8/lack_of_updates_to_pfsense/

      that pretty much just say its more stable this way. That isn't very convincing. The most recent version is based on FreeBSD 12.2-STABLE. Two major releases of FreeBSD have come out since 12.2. I skimmed the release notes for FreeBSD 12.3 and among other things they fixed a kernel panic issue and a radius DOS issue. Both seem pretty relevant to PFSense. This leads to several questions:

      1. Is there a good reason to not worry about this?

      2. Does netgate review vulnerabilities as they come out and decide if if a minor release is needed or are minor releases just not going to happen?

      3. Is it possible for me to patch pfsense with updates made to FreeBSD or to run pfsense on an updated version of FreeBSD?

      4. Is pfsense+ netgate's real focus and updates to pfsense are just not a concern anymore?

      johnpozJ S 2 Replies Last reply Reply Quote 0
      • johnpozJ Online
        johnpoz LAYER 8 Global Moderator @sand7000
        last edited by johnpoz

        @sand7000 the next version of pfsense is on freebsd 12.3 and should drop really soon 2.6 or the 22.01

        Its out in RC now if you want to update, etc.

        12.3 just came out in dec 2021 did it not?

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 24.11 | Lab VMs 2.8, 24.11

        S 1 Reply Last reply Reply Quote 0
        • S Offline
          sand7000 @johnpoz
          last edited by

          @johnpoz

          12.3 just came out in dec 2021 did it not?

          That's almost 2 months ago, pretty long time to not be patched against known vulnerabilities. Last release of pfsense was in July. Hard to believe there hasn't been a single vulnerability since then that merited a timely patch.

          1 Reply Last reply Reply Quote 0
          • stephenw10S Offline
            stephenw10 Netgate Administrator
            last edited by

            pfSense is extremely cut-down compared to a standard FreeBSD install, it has a much smaller attack surface. Many (most?) of the vulnerabilites you see reported against FreeBSD are either not applicable or not exploitable in pfSense. If there was a critical vulnerability we would have a point release to address it. As has happened in the past.

            Steve

            johnpozJ S 2 Replies Last reply Reply Quote 3
            • johnpozJ Online
              johnpoz LAYER 8 Global Moderator @stephenw10
              last edited by johnpoz

              ^ exactly.. Lets take 2 major vulnerabilities of late, the log4j and PwnKit problems - they just not a concern on pfsense..

              Or at least they shouldn't be - unless users took it upon themselves to side load stuff that should never be on a firewall..

              An intelligent man is sometimes forced to be drunk to spend time with his fools
              If you get confused: Listen to the Music Play
              Please don't Chat/PM me for help, unless mod related
              SG-4860 24.11 | Lab VMs 2.8, 24.11

              1 Reply Last reply Reply Quote 1
              • AndyRHA Offline
                AndyRH
                last edited by

                I look at it differently from the outside. Careful addition of features and improvements coupled with solid testing can result is release delays and can also reduce hurried patches which can lead to a patch loop.

                Plus, I prefer to upgrade as little as posable, there is always risk in an upgrade.

                o||||o
                7100-1u

                1 Reply Last reply Reply Quote 0
                • S Offline
                  SteveITS Rebel Alliance @sand7000
                  last edited by

                  @sand7000 If you look back at the blog post about about Plus, it said, "pfSense Plus customers will be able to reliably manage their IT infrastructure changes around three releases per year - planned for January, May, and September." They had 21.2 and 21.5, and 21.9 was planned but eventually skipped, with multiple minor updates to the first two.

                  Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                  When upgrading, allow 10-15 minutes to reboot, or more depending on packages, and device or disk speed.
                  Upvote 👍 helpful posts!

                  1 Reply Last reply Reply Quote 0
                  • S Offline
                    sand7000 @stephenw10
                    last edited by

                    @stephenw10

                    Thanks for this info. Is there any kind of documentation or periodic news release on vulnerabilities that were investigated and deemed not a threat?

                    Our company is audited regularly. If a network vulnerability scan reports that pfsense runs on old version of FreeBSD we would need documentation that it is not susceptible to the same vulnerabilities.

                    ? 1 Reply Last reply Reply Quote 0
                    • ? Offline
                      A Former User @sand7000
                      last edited by

                      @sand7000 In my case, I always test and try to exploit every 1 of the published vulnerabilities

                      to confirm for myself that they are not applicable

                      Until now, it has been shown to be very, very reliable.

                      1 Reply Last reply Reply Quote 0
                      • First post
                        Last post
                      Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.