2.4.5-p1 New Features and Changes¶
pfSense® software version 2.4.5-p1 addresses performance, security, and other miscellaneous issues found in 2.4.5.
Warning
Proceed with caution when upgrading pfSense software while COVID-19 travel restrictions are in effect.
During this time of travel limitations, remote upgrades of pfSense software should be carefully considered, and avoided where possible. Travel restrictions may complicate any repair of any issue, including hardware-related issues that render the system unreachable. Should these issues require onsite physical access to remedy, repair of the issue may not be possible while travel restrictions related to COVID-19 are in effect.
Tip
For those who have not yet updated to 2.4.4-p3 or 2.4.4, consult the previous release notes and blog posts for those releases to read all important information and warnings before proceeding.
Note
Upgrading to pfSense software version 2.4.5-p1 requires
pfSense-upgrade
version 0.70 or later. Most installations will
automatically pick up the new version and upgrade normally. If this does not
happen automatically and the upgrade to version 2.4.5-p1 is not offered, use
the following procedure:
Navigate to System > Updates
Set Branch to Previous stable version
Wait a few moments for the upgrade check to complete
Optional: Confirm that the latest version of pfSense-upgrade is present (version >= 0.70) using
pkg-static info -x pfSense-upgrade
.If the correct version is not present, wait a bit longer and check again as that package may be updating in the background.
Set Branch to Latest stable version
Wait a few moments for the upgrade check to complete
At this point, the upgrade check should see 2.4.5-p1 and the upgrade can proceed.
Note
pfSense software version 2.4.5-p1 includes pkg
version 1.13.x
which introduces a new metadata version. Most installations will
automatically pick up the new version and upgrade normally. In certain cases,
especially coming from much older versions, the pkg
utility may require a
manual update before it can correctly process the new metadata.
The pkg
utility can be upgraded manually with the following command run
from an ssh or console shell:
# pkg-static bootstrap -f
See Repository Metadata Version Errors for more details.
Security / Errata¶
Addressed an issue with large
pf
tables causing system instability and high CPU usage during filter reload events #10414Fixed an issue with
sshguard
which could prevent it from protecting against brute force logins #10488Updated
unbound
to address CVE-2020-12662 and CVE-2020-12663 #10576Updated
json-c
to address CVE-2020-12762 #10609Addressed FreeBSD Security Advisories & Errata Notices including:
Authentication¶
Backup / Restore¶
Fixed handling of redundant/extraneous RRD tags when making configuration backups #10508
Certificates¶
Fixed a bug which prevented the user from removing a CA private key when editing #10509
Configuration Upgrade¶
Fixed a PHP error during upgrade from <2.4.3 with empty tags in the IPsec configuration #10458
DHCP (IPv6)¶
DHCP Relay¶
DHCP Server¶
Diagnostics¶
DNS Resolver¶
Dynamic DNS¶
Hardware / Drivers¶
IPsec¶
Fixed selection of IPsec VTI Phase 2 local network address/mask values #10418
Fixed saving IPsec connection breaking FRR BGP on VTI interfaces #10351
Updated DH group warnings to say that group 5 is also weak #10221
Fixed disabling IPsec Phase 1 with a VTI Phase 2 #10190
Fixed disabled IPsec Phase 2 entries being unintentionally included in
vpn_networks
table #7622
L2TP¶
Limiters¶
OpenVPN¶
Operating System¶
Packages¶
Fixed handling of FreeRADIUS passwords containing non-XML-safe characters #4497
Fixed handling of Squid LDAP search filters containing an accent #7654
Fixed issues preventing FRR from working on certain platforms such as SG-1100 (arm64/aarch64) #10444
Fixed issues preventing Suricata from working on certain platforms such as SG-1100 (arm64/aarch64) #10228
Rules / NAT¶
Fixed Duplicate Outbound NAT entries from L2TP server addresses #10247
Fixed Outbound NAT rules for mobile IPsec users with per-user addresses defined #9320
Fixed IPv6 IP Alias VIPs not being added to Interface Network macros #8256
Fixed Destination port range “Any” in Port Forward rules #7704
Fixed display of interfaces on the Floating rules list #4629
Fixed rule description validation to reject
\
#10542Fixed setting NAT reflection timeout values #10591