24.7 “Thriving Tiger” Series
For more than 9 and a half years now, OPNsense is driving innovation through modularising and hardening the open source firewall, with simple and reliable firmware upgrades, multi-language support, fast adoption of upstream software updates as well as clear and stable 2-Clause BSD licensing.
24.7, nicknamed “Thriving Tiger”, features a new dashboard, system trust MVC/API support, GRE and GIF MVC/API support, NAT 1-to-1 MVC/API support, WireGuard QR code generator, dynamic IPsec VTI tunnel support, experimental OpenVPN DCO support, FreeBSD 14.1, Python 3.11 plus much more.
The upgrade path from 24.1.x will follow tomorrow. Do not be hasty. The major operating system upgrade has not happened in while and should be taken with the appropriate amount of care.
Download links, an installation guide [1] and the checksums for the images can be found below as well.
US East Coast: https://mirror.wdc1.us.leaseweb.net/opnsense/releases/24.7/
US West Coast: https://mirror.sfo12.us.leaseweb.net/opnsense/releases/24.7/
South America: http://mirror.ueb.edu.ec/opnsense/releases/24.7/
East Asia: https://mirror.ntct.edu.tw/opnsense/releases/24.7/
Full mirror list: https://opnsense.org/download/
24.7.11 (December 17, 2024)
This is a minor update all things considered, but it does bring you the long sought after Tailscale plugin courtesy of Sheridan Computers. Suricata is also updated to its latest version to fix a couple of CVEs.
In other news, 25.1 will contain FreeBSD 14.2 which will be available for BETA preview using images later this week as well. The 25.1-BETA will also include a rewritten theme (light and dark) using the new OPNsense logo already being used in the documentation. It also has MVC/API support for the user and group management plus more you can always find on the roadmap [1] in detail.
Here are the full patch notes:
system: show multiple SAN entries when supplied by the certificate
system: traffic dashboard widget should persist interface identifiers
system: reset dashboard widget options to the default if none of the options match
system: mismatch in returned “change” attribute for route toggle
system: suppress XML parse errors in announcement widget when forum is unreachable
system: catch PHP errors for Google Drive backups
system: ignore plugins_interfaces() errors in write_config()
system: fix snapshot ACL
interfaces: reload GUI in the background
firewall: remove faulty PPP exclusion in scrubbing rule creation
dhcp: allow radvd to use /128 CARP VIP as source
firmware: add “configctl firmware changelog current” backend command
firmware: refactor lock/unlock scripts using new output helpers
firmware: opnsense-code: support for origin selection during upgrade mode
firmware: opnsense-patch: improve patch behaviour for non-default account/repositories combinations
ipsec: remove hashing algorithm from null cipher
unbound: make OpenSSL bundle workaround permanent
mvc: last batch of sessionClose() cleanups in controllers
mvc: call initialize() after authentication
mvc: normalize multiple slashes in paths
plugins: os-caddy 1.7.6 [2]
plugins: os-ddclient 1.26 [3]
plugins: os-nut 1.9 [4]
plugins: os-qemu-guest-agent 1.3 [5]
plugins: os-tailscale 1.0 (contributed by Sheridan Computers)
plugins: os-telegraf 1.12.12 [6]
ports: monit 5.34.3 [7]
ports: suricata 7.0.8 [8]
24.7.10 (December 03, 2024)
This ships a number of base system changes, kernel fixes and driver updates. The time-loop authentication change is back with the fixed TOTP case and the Unbound domain overrides are now found in query forwarding since this offers the same functionality anyway.
Please note we had to hotfix the kernel which will not reinstall automatically if you caught the bad version. If you experience panics on 24.7.10 relating to pf(4) please reinstall from the GUI (which includes an automatic reboot) or run “opnsense-update -fk” from the shell followed by a manual reboot. The correct kernel identifies itself as “stable/24.7-n267981-8375762712f” using “uname -v”.
With the year almost over we are shifting focus to finishing the items on the roadmap and it is nice to note that the MVC/API conversions are already over 75% complete. That means it will not take another decade to migrate the other 25%. ;)
Here are the full patch notes:
system: readd a “time-loop” around authentication for failed attempts
system: remove the SSL bundles in default locations
system: prevent JS crashing out when dashboard widget title is not set
system: use system instead of sample defaults when reverting tunables
system: report actual LAN address being used after factory reset
interfaces: use Autoconf class to avoid raw ifctl file access
interfaces: remove ancient MAC address trickery to unbreak hostapd
interfaces: add missing neighbor and DNS lookup page ACL entries
interfaces: PPP device page ACL missed getserviceproviders.php
firmware: force CRL check on development deployment
firmware: use REQUEST to print a TLS/CRL usage hint
firmware: improved output helpers and associated cleanup in audit scripts
firmware: opnsense-update: add support for regression tests set
intrusion detection: limit stats.log logging (contributed by doktornotor)
kea-dhcp: add dhcp-socket-type option (contributed by Till Niederauer)
kea-dhcp: add MAC formatter to leases page (contributed by cpalv)
openvpn: support case-insensitive strict user CN matching for instances
unbound: move domain overrides to query forwarding
mvc: let JsonKeyValueStoreField cache configd call for the duration of the session
mvc: another batch of sessionClose() cleanups in controllers
mvc: cleanup in ApiMutableServiceControllerBase
mvc: fix hint display for “0”
ui: restore right tab border in standard theme
plugins: os-caddy 1.7.5 [1]
plugins: os-debug 1.7 [2]
src: atf/kyua: ship regression tests runtime support
src: if_bridge: mask MEXTPG if some members do not support it
src: if_tuntap: enable MEXTPG support
src: ice: update to 1.43.2-k et al
src: ipsec: fix IPv6 over IPv4 tunneling
src: ixgbe: add support for 1Gbit (active) DAC links
src: ixgbe: sysctl for TCP flag handling during TSO
src: jail: expose children.max and children.cur via sysctl
src: libfetch: add the error number to verify callback failure case
src: netlink: assorted stable backports
src: pf: prevent SCTP-based NULL dereference in pfi_kkif_match()
src: pf: let rdr rules modify the src port if doing so would avoid a conflict
src: pf: make pf_get_translation() more expressive
src: pf: let pf_state_insert() handle redirect state conflicts
src: pf: fix wrong pflog action in NAT rule
src: pf: fix potential state key leak
src: rc: ignore INSYDE BIOS placeholder UUID for /etc/hostid
src: route: fix failure to add an interface prefix route when route with the same prefix is already presented in the routing table
src: route: route: avoid overlapping strcpy
src: sfxge: defer ether_ifattach to when ifmedia_init is done
ports: curl 8.11.0 [3]
ports: expat 2.6.4 [4]
ports: nss 3.107 [5]
ports: openldap 2.6.9 [6]
ports: php 8.2.26 [7]
ports: sudo 1.9.16p2 [8]
A hotfix release was issued as 24.7.10_1:
unbound: use tls-cert-bundle to point to remaining valid bundle
A hotfix release was issued as 24.7.10_2:
system: fix TOTP regression when used with LDAP
src: reverted “pf: fix potential state key leak” due to reported panics
src: netlink: allow force remove on pinned delete from route binary
24.7.9 (November 20, 2024)
This is a minor update that further tweaks the trust store integration and firmware updates tying into it although in practice it does not change the current behaviour from a user perspective. If something is not behaving as usual afterwards please let us know.
A new plugin has been added to finally allow proxying ND messages for those people stuck on a single /64 prefix delegation. Otherwise it has been pretty quiet as you can see. But we will be back soon. ;)
Here are the full patch notes:
system: revert CRLs in bundles as the default bundles will be removed in 25.1
system: migrate authoritative bundle location to /usr/local/etc/ssl/cert.pem
system: flush the global OpenSSL configuration to /etc/ssl/openssl.cnf as well
system: ignore gateway monitor status on boot when setting up routes
system: fix IP address validation not being displayed in the gateway form
system: add a “time-loop” around authentication for failed attempts
reporting: ISO dates and logical ranges in health graphs (contributed by Roy Orbitson)
interfaces: kill defunct route-to states with the stale gateway IP
firewall: make loopback traffic stateful again to fix its use with syncookie option
firewall: add ‘Action’ property to list of retrieved rules
firewall: use UUIDs as rule labels to ease tracking
firmware: refactor for generic config.sh use and related code audit
firmware: move the bogons update script to the firmware scripts, improve logging messages and use config.sh
firmware: opnsense-version: restored pre-2019 default output format (contributed by TotalGriffLock)
openvpn: add Require Client Provisioning option for instances
backend: add ‘configd environment’ debug action
mvc: always do stop/start on forced restart
mvc: remove obsolete sessionClose() use in Base, Firmware, Unbound and WireGuard controllers
plugins: os-debug 1.6
plugins: os-ndproxy 1.0 adds an IPv6 Neighbour Discovery proxy
plugins: os-wazuh-agent 1.2 [1]
ports: py-duckdb 1.1.3 [2]
A hotfix release was issued as 24.7.9_1:
system: reverted “time-loop” patch as it makes Local+TOTP authentication fail
24.7.8 (November 06, 2024)
Minor update with FreeBSD security advisories and a number of stable branch patches for various Intel drivers. Two problems with the RRD rework are herby fixed as well.
Here are the full patch notes:
system: add missing MinProtocol in OpenSSL config template from trust settings
system: add SignatureAlgorithms option and fix minor form glitch in trust settings
system: bring CRLs into bundles as well
system: sync certctl to FreeBSD 14.1 base code et al
reporting: isset() vs. empty() on RRD enable
reporting: fix regression in RRD temperature readings
interfaces: parse part of SFP module information in legacy_interfaces_details()
firewall: add a note about stateless TCP during syncookie use
firewall: enhance validation that group name can not start or end with a digit
firmware: improve health script and use config.sh
firmware: rework CRL check in config.sh
firmware: use the trust store for CRL verification
lang: update available translations
ipsec: add swanctl.conf download button to settings page
ipsec: add description field to pre-shared-keys
isc-dhcp: safeguard output type for json_decode() in leases page
unbound: allow RFC 2181 compatible names in overrides
mvc: fix UpdateOnlyTextField incompatibility with DependConstraint (contributed by kumy)
plugins: os-bind 1.33 [1]
plugins: os-caddy 1.7.4 [2]
plugins: os-etpro-telemetry lowers log level of collection invoke (contributed by doktornotor)
plugins: os-iperf fixes JS TypeError when parsing result (contributed by Leo Huang)
plugins: os-tinc removes “pipes” Python module dependency (contributed by andrewhotlab)
src: multiple issues in the bhyve hypervisor [3]
src: unbounded allocation in ctl(4) CAM Target Layer [4]
src: XDG runtime directory file descriptor leak at login [5]
src: assorted FreeBSD stable patches for Intel ixgbe, igb, igc and e1000 drivers
src: cxgb: register ifmedia callbacks before ether_ifattach
src: enc: use new KPI to create enc interface
src: ifconfig: fix wrong indentation for the status of pfsync
src: iflib: simplify iflib_legacy_setup
src: iflib: use if_alloc_dev() to allocate the ifnet
src: netmap: make memory pools NUMA-aware
src: vlan: handle VID conflicts
ports: libpfctl 0.14
ports: nss 3.106 [6]
ports: php 8.2.25 [7]
24.7.7 (October 23, 2024)
A small update to keep things moving forward while things are quietening down a little bit. Still working on improving the trust store integration and already tackling new MVC/API conversions on the development end.
Here are the full patch notes:
system: add OpenSSH “RekeyLimit” with a limited set of choices
system: fix certificate condition in setCRL() (contributed by richierg)
system: untrusted directory changed in FreeBSD 14
system: remove obsolete banners from static pages
system: address CRL/cert subject hash mismatch during trust store rehash
reporting: refactor existing RRD backend code
firewall: throttle live logging on dashboard widget
interfaces: fix VXLAN interface being busy when vxlanlocal or vxlanremote is changed
interfaces: 6RD/6to4 route creation should be limited to IPv6
firmware: remove escaped slashes workaround on mirror/flavour write
firmware: CRL checking for business update mirror
firmware: introduce config.sh and use it in launcher.sh and connection.sh
firmware: restart cron on updates
intrusion detection: reorganise settings page with headers
intrusion detection: support configuration of eve-log for HTTP and TLS (contributed by Toby Chen)
ipsec: fix advanced option “max_ikev1_exchanges”
backend: cache file cleanup when TTL is reached
backend: correct template helper exists() return type (contributed by kumy)
mvc: fix config.xml file open mode in overwrite()
mvc: add missing request->hasQuery()
mvc: add missing request->getScheme()
mvc: add missing request->getURI()
mvc: extend sanity checks in isIPInCIDR()
ui: fix tree view style targeting elements outside this view
plugins: enforce defaults on devices
plugins: os-caddy 1.7.3 [1]
plugins: os-ddclient 1.25 [2]
plugins: os-freeradius 1.9.26 [3]
plugins: os-frr 1.42 [4]
plugins: os-lldpd 1.2 [5]
plugins: os-net-snmp 1.6 [6]
plugins: os-upnp 1.7 [7]
plugins: os-wazuh-agent 1.1 [8]
ports: monit 5.34.2 [9]
ports: nss 3.105 [10]
ports: openssh 9.9.p1 [11]
ports: pkg fix for for embedded libfetch when doing CRL verification
ports: py-duckdb 1.1.2 [12]
ports: syslog-ng 4.8.1 [13]
ports: unbound 1.22.0 [14]
24.7.6 (October 09, 2024)
A few security and reliability issues this week. Most notably Suricata and Unbound. The dashboard rework seems to be concluded now as the ACL behaviour was aligned and should match the user expectation on the “Lobby” section privileges. Note not all widgets have separate ACLs as it aims to provide a minimal safe selection of system widgets associated with the access to the dashboard page in general.
We will, however, continue to improve the dashboard further while we also tackle other interesting areas for 25.1. That being said have a look at the new roadmap [1] we published recently.
You may notice the increased activity on the trust store side due to our LINCE certification efforts. Valuable feedback and code changes have come from this process that will also find their way into other related projects in the near future.
Here are the full patch notes:
system: do not render non-reachable dashboard widget links
system: handle picture deletion via hidden input on general settings page
system: straighten out API ACL entries for several components
system: remove unreachable “page-getstats” ACL entry
system: adjust “page-system-login-logout” ACL entry to be used as a minimal dashboard privilege
system: deprecate the “page-dashboard-all” ACL entry as it will be removed in 25.1
system: add descriptions on CA and certificate downloads file names
system: show user icon when certificate is not otherwise used (in case CN matches any of our registered users)
system: add proper validation when certificates are being imported via CSR
system: add missing CRL changed event when CRLs are saved in the GUI
system: add a trust settings page and move existing trust settings there as well
system: optionally fetch and store CRLs attached to trusted authorities
system: improve and extend certctl.py script doing the trust store rehashing
system: enforce CRL behaviour for existing revocations in the trust store when doing remove syslog sending over TLS
interfaces: simplify and clarify pfsync reconfiguration hooks
interfaces: non-functional refactors in PPP configuration
interfaces: send IPv6 solicit immediately on WAN interfaces
firewall: add gateway groups to the list of gateways in automation rules
dhcrelay: refactor for plugins_argument_map() use
ipsec: add “make_before_break” option to settings
kea-dhcp: add configurable “max-unacked-clients” parameter and change its default to 2
kea-dhcp: add missing constraint on IP address for reservations
openvpn: register OpenVPN group immediately when setting up instances
openvpn: push “data-ciphers-fallback” in client export when configured to align with legacy setup
unbound: port to newwanip_map / plugins_interface_map()
ui: remove bold text from tab headers for consistency
plugins: os-acme-client 4.6 [2]
plugins: os-caddy 1.7.2 [3]
plugins: os-frr 1.41 [4]
plugins: os-smart 2.3 adds new dashboard widget (contributed by Francisco Dimattia)
src: pf: revert part of 39282ef3 to properly log the drop due to state limits
src: pflog: pass the action to pflog directly
src: various check removals for malloc(M_WAITOK) driver calls
src: libpfctl: ensure we return useful error codes
src: x86/ucode: add support for early loading of CPU ucode on AMD
src: libfetch: improve optional CRL verification
src: fetch: fix “–crl” option not working
ports: curl 8.10.1 [5]
ports: crowdsec fix for stuck service handling [6]
ports: dhcp6c 20241008 properly handle NoAddrAvail status code
ports: monit 5.34.1 [7]
ports: php 8.2.24 [8]
ports: dnspython 2.7.0
ports: py-duckdb 1.1.1 [9]
ports: suricata 7.0.7 [10]
ports: unbound 1.21.1 [11]
24.7.5 (September 26, 2024)
This release removes significant processing overhead from larger setups due to being able to coalesce parallel configuration requests for the same component instead of iterating over the list of selected interfaces one by one. A number of third party software updates and FreeBSD security advisories are included as well.
This update also disables NUMA by default which can bring a boost in network throughput on affected systems. And of course we are still working on dashboard improvements so now the treasured picture widget is back with a better integration approach.
Also take note that the NTP default changes to “restrict noquery” so that the system cannot externally be queried for revealing system internals anymore unless explicitly allowed.
The technical stuff out of the way we would simply like to add that we had a great time at EuroBSDCon in Dublin over the weekend. Lots of good and productive conversations. Looking forward to more of those! :)
Here are the full patch notes:
system: update default dashboard layout and include the services widget
system: render header for failed active widgets to allow identification and removal
system: add ability for widget referral links
system: cleaned up ACL definitions and use thereof
system: add a picture widget
system: default to vm.numa.disabled=1
system: handle log lines with no timestamp (contributed by Iain MacDonnell)
system: use interface maps in system_routing_configure() and dpinger_configure_do()
system: when only selecting TLS1.3 ciphers make sure to only allow 1.3 as well in web GUI
system: move web GUI restart to newwanip_map / plugins_argument_map() use
interfaces: move compatible event listeners to newwanip_map
interfaces: decouple PPP configure/reset from IPv4/IPv6 modes
interfaces: move legacy RFC2136 invoke to plugin hook
interfaces: add “spoofmac” device option and enforce it
interfaces: prevent CARP VIP removal when VHID group is in use by IP aliases
interfaces: routing configuration on changed interfaces only during apply
firmware: opnsense-update: support unescaped mirror input (contributed by Michael Gmelin)
firmware: opnsense-verify: show repository priority while listing active repositories
ipsec: convert to vpn_map event invoke and plugins_argument_map() use
monit: fix undefined function error in CARP script
network time: enable “restrict noquery” by default (contributed by doktornotor)
openssh: port to plugins_argument_map()
openvpn: validate “Auth Token Lifetime” to require a non-zero renegotiate time in instances
openvpn: convert to vpn_map event invoke and plugins_argument_map() use
wireguard: convert to vpn_map event invoke
ui: refine cookie policies and make them explicit
plugins: add plugins_argument_map() helper
plugins: os-caddy 1.7.1 [1]
src: bhyve: improve input validation in pci_xhci [2]
src: libnv: correct the calculation of the size of the structure [3]
src: ifnet: Remove if_getamcount()
src: ifnet: Add handling for toggling IFF_ALLMULTI in ifhwioctl()
src: ifconfig: Add an allmulti verb
src: date: include old and new time in audit log
src: bpf: Add IfAPI analogue for bpf_peers_present()
src: pf: use AF_INET6 when comparing IPv6 addresses
src: if_ovpn: ensure it is safe to modify the mbuf
src: if_ovpn: declare our dependency on the crypto module
ports: curl 8.10.0 [4]
ports: dhcp6c 20240919 reintroduced fixed arc4random() usage
ports: expat 2.6.3 [5]
ports: libpfctl 0.13
ports: libxml 2.11.9 [6]
ports: nss 3.104 [7]
ports: python 3.11.10 [8]
ports: sudo 1.9.16 [9]
A hotfix release was issued as 24.7.5_3:
system: due to observed timing issues avoid the use of closelog()
openvpn: fix “auth-gen-token” being supplied in server mode
24.7.4 (September 12, 2024)
Since we are currently having a vivid discussion about what constitutes a downstream or upstream issue in the FreeBSD scope we will revert the FreeBSD-SA-24:05.pf advisory until further notice. As confirmed by many users this brings ICMPv6 and therefore IPv6 back to an uneventful stable state. We will be trying to work with FreeBSD on the issue as it seems unavoidable that we meet it again when working on FreeBSD 14.2 inclusion.
In other IPv6 news we found a strange regression in dhcp6c introduced in 24.7.2 and reverted the offending commits for now. What this tells us, though, is that we did uncover an inherent issue with the timeout value generation that may be present since two decades in the code at least.
Apart from smaller fixes for the dashboard, trust pages, this update also ships the first backwards-compatible PPP rework patch. The ultimate goal here is to offer IPv6-only connectivity which requires untangling old code to be IP family agnostic. Should you note any change in behaviour please do not hesitate to contact us.
BTW, the roadmap for 25.1 has been decided and will be published soon.
Here are the full patch notes:
system: recover stuck monitors and offer a cron job
system: use built-in controller logic for JSON decoding on dashboard
system: map derivative field cert_type to expose purpose to the UI
system: handle stale “pfsyncinterfaces” and improve workflow
system: tweak the boot detection for code minimalism
system: do not save x/y widget coordinates on smaller screens
system: fix CARP widget on invalid CARP configuration
system: fix storing private key when creating a CSR
reporting: remove nonexistent 3G statistics
interfaces: force regeneration of link-local on spoofed MAC
interfaces: add proper validation for 6RD and 6to4
interfaces: add new “vpn_map” event to deprecate “vpn”
interfaces: unify PPP linkup/linkdown scripting
interfaces: replace “newwanip” from interface apply with “early”
interfaces: move IPv6 over IPv4 connectivity to a separate script
interfaces: port VXLAN to newwanip_map event
firewall: replace filter_(un)lock() with a FileObject lock
isc-dhcp: allow to disable a DHCPv6 server with faulty settings
firmware: remove auto-retry from fetch invokes
firmware: allow auto-configure patching via full URL
firmware: automatically handle most plugin conflicts
openssh: convert to newwanip_map and rework the code
openvpn: add username field to the status page
openvpn: add close-on-exec flag to service lock file
unbound: add discard-timeout (contributed by Nigel Jones)
wireguard: fix widget display with public key reuse
wireguard: add close-on-exec flag to service lock file
ui: allow style tag on headers
plugins: os-helloworld 1.4
plugins: os-caddy 1.7.0 [1]
src: revert FreeBSD-SA-24:05.pf until further notice to restore proper IPv6 behaviour [2]
src: agp: Set the driver-specific field correctly
src: cron(8) / periodic(8) session login [3]
src: multiple vulnerabilities in libnv [4]
src: bhyve(8) privileged guest escape via TPM device passthrough [5]
src: multiple issues in ctl(4) CAM target layer [6]
src: bhyve(8) privileged guest escape via USB controller [7]
src: possible DoS in X.509 name checks in OpenSSL [8]
src: umtx kernel panic or use-after-free [9]
src: revert “ixl: fix multicast filters handling” [10]
ports: dhcp6c 20240907 for now reverts instability regression in random number handling
ports: openssl 3.0.15 [11]
ports: php 8.2.23 [12]
A hotfix release was issued as 24.7.4_1:
interfaces: fix PPP regression of empty gateway default
24.7.3 (August 29, 2024)
Today we are switching pf stateful tracking of ICMPv6 neighbour discoveries off in order to fix the previous instability with the FreeBSD security advisory first shipped in 24.7.1. We do this in order to provide the same reliable IPv6 functionality that was on all previous versions prior to 24.7.1 at the cost of resurfacing CVE-2024-6640 until a better solution has been devised. A link to the long and difficult upstream bug report is included below.
But that is not all. The GUI gains snapshot support on ZFS installations by implementing what is called “boot environments” which allows one to move seamlessly from one snapshot to another via reboot. This functionality can also be accessed from the boot loader menu option “8” for a quick recovery ensuring that at least one other snapshot was created to boot into. A very special thank you to Sheridan Computers for contributing this feature.
Here are the full patch notes:
system: add snapshots (boot environments) support via MVC/API (contributed by Sheridan Computers)
system: remove obsolete dashboard sync
system: compact services widget on dashboard
system: convert lock mode to edit mode on dashboard
system: link certificates by subject on import
system: unify how log search clauses work and add a search time constraint
system: move to static imports for widget base classes on dashboard
system: fix ACL check on dashboard restore and add safety check for save action
system: change dashboard modify buttons to a bootstrap group (contributed by Jaka Prašnikar)
interfaces: add “newwanip_map” event and deprecate old “newwanip” one
interfaces: keep 24.7 backwards compatibility by allowing 6RD and 6to4 on PPP
interfaces: add logging to PPP link scripts to check for overlap
interfaces: return correct uppercase interface name in getArp()
interfaces: fix issue with PPP port not being posted
dhcrelay: start on “newwanip_map” event as well
intrusion detection: update the default suricata.yaml (contributed by Jim McKibben)
ipsec: move two logging settings to correct location misplaced in previous version
ipsec: fix migration and regression during handling of “disablevpnrules” setting
wireguard: support CARP VHID reuse on different interfaces
mvc: when a hint is provided, also show them for selectpickers
rc: fix banner HTTPS fingerprint
plugins: os-ddclient 1.24 [1]
plugins: os-theme-advanced 1.0 based on AdvancedTomato (contributed by Jaka Prašnikar)
plugins: os-theme-cicada 1.38 (contributed by Team Rebellion)
plugins: os-theme-vicuna 1.48 (contributed by Team Rebellion)
plugins: os-upnp 1.6 [2]
plugins: os-wol 2.5 adds widget for new dashboard (contributed by Michał Brzeziński)
src: pf: fully annotated patch of disabling ND state tracking and issues for ICMPv6 [3]
src: u3g: add SIERRA AC340U
ports: dhcrelay 1.0 switches to official release numbering, but otherwise equal to 0.6
ports: sqlite 3.46.1 [4]
A hotfix release was issued as 24.7.3_1:
intrusion detection: fix indent in suricata.yaml
24.7.2 (August 21, 2024)
Today a follow-up for the FreeBSD security advisory for pf/ICMP ships that addresses the undesired traceroute behaviour. A few dashboard improvements are included as well as better IPv6 recovery for dhcp6c and assorted stability fixes.
As a special note we now have native CPU microcode update plugins for either AMD or Intel to install from the GUI. Apart from a reboot these plugins require no further user interaction and will keep the applicable microcode at the latest known version as shipped in the packages repository.
We are currently working on making PPP capable of running in IPv6-only deployments; additionally ZFS snapshots (a.k.a boot environments) are coming to the next stable release and can already be previewed in the bundled development version.
Last but not least, an “importmap” free dashboard version is also ready for testing in the development release. We hereby ask for feedback so that it can be included in a subsequent stable release.
Here are the full patch notes:
system: CRL import ignored text input and triggered unrelated validations
system: improve the locking during web GUI restart
system: improve WireGuard and IPsec widgets
system: add CPU widget graph selection
system: reformat traffic graphs to bps
system: add gateway widget item selection
system: add table view to interface statistics widget on expansion
system: improve widget error recovery
system: fix wrong variable assignment in system log search backend
system: add missing delAction() for proper CRL removal
interfaces: require PPP interface to be in up state (contributed by Nicolai Scheer)
interfaces: lock down PPP modes when editing interfaces
interfaces: backport required interface_ppps_capable()
interfaces: retire interfaces_bring_up()
reporting: start using cron for RRD collection
firmware: remove inactive mirrors from the list
firmware: introduce sanity checks prior to upgrades
firmware: cleanup package manager temporary files prior to upgrades
kea-dhcp: fix privileges for page ACL
ipsec: advanced settings MVC/API conversion
ipsec: add retransmission settings in charon section in advanced settings
openvpn: unhide server fields for DCO instances
mvc: remove setJsonContent() and make sure Response->send() handles array types properly
mvc: FileObject write() should sync by default
rc: export default ZPOOL_IMPORT_PATH
ui: sidebar submenu expand fix (contributed by Team Rebellion)
plugins: os-caddy 1.6.3 [1]
plugins: os-cpu-microcode-amd 1.0
plugins: os-cpu-microcode-intel 1.0
plugins: os-freeradius 1.9.25 [2]
plugins: os-intrusion-detection-content-snort-vrt 1.2 switch to newer ruleset snapshot (contributed by Jim McKibben)
plugins: os-theme-tukan 1.28 (contributed by Dr. Uwe Meyer-Gruhl)
src: axgbe: implement ifdi_i2c_req for diagnostics information
src: if_clone: allow maxunit to be zero
src: if_pflog: limit the maximum unit via the new KPI
src: pf: invert direction for inner icmp state lookups
src: pf: fix icmp-in-icmp state lookup
src: pf: vnet-ify pf_hashsize, pf_hashmask, pf_srchashsize and V_pf_srchashmask
ports: dhcp6c 20240820 fixes two renewal edge cases
ports: nss 3.103 [3]
ports: phpseclib 3.0.41 [4]
ports: unbound 1.21.0 [5]
24.7.1 (August 08, 2024)
This release includes a batch of dashboard changes due to the reliable feedback we have received from you all so far. There will be more dashboard changes in the future mostly relating to UX and sane default behaviour so just know we are aware.
A few smaller regressions due to the Phalcon module replacement efforts have been fixed as well. IPv6 behaviour has been adjusted for SLAAC and the web GUI.
Last but not least we found and fixed a number of issues with FreeBSD 14.1 and are including its security advisories from yesterday while at it.
MVC/API conversions are already being carried out in the development version and it seems that PPP-related connectivity will get a bigger makeover too. The roadmap for 25.1 will be discussed and likely published later this month.
Here are the full patch notes:
system: guard destroy on traffic widget
system: adjust address display in interfaces widget
system: fix display of multiple sources in thermal sensor widget
system: add load average back to system info widget
system: remove dots from traffic widget graphs
system: add publication date to announcement widget
system: fix monit widget status code handling
system: allow and persist vertical resize in widgets
system: improve formatting of byte values in widgets
system: update OpenVPN widget server status color
system: add aggregated traffic information about connected children in IPsec widget
system: remove animated transition from row hover for table widgets
system: improve the styling of the widget lock button
system: apply locked state to newly added widgets as well
system: account for removal of rows in non-rotated widget tables with top headers
system: use “importmap” to force cache safe imports of base classes for widgets
system: allow custom fonts in the widgets with gauges (contributed by Jaka Prasnika)
system: add monitor IP to gateway API result (contributed by Herman Bonnes)
system: better define “in use” flag and safety guards in certificates section
system: export p12 resulted in mangled binary blob in certificates section
system: when using debug kernels prevent them from triggering unrelated panics on assertions
system: switch Twitter to Reddit URL in message of the day
system: fix API exception on empty CA selection
system: skip tentative IPv6 addresses for binding in the web GUI (contributed by tionu)
interfaces: avoid deprecating SLAAC address for now
firewall: show inspect button on “xs” size screen
firewall: fix parsing port alias names in /etc/services
captive portal: fix client disconnect (contributed by Vivek Panchal)
firmware: revoke old fingerprints
ipsec: add aggregated traffic totals to phase 1 view
kea-dhcp: ignore invalid hostnames in static mappings to prevent DNS services crashes
openvpn: use new trust model to link users by common_name in exporter
openvpn: DCO mode only supports UDP on FreeBSD
openvpn: add “float” option to instances (contributed by Christian Kohlstedde)
backend: patch -6 address support into pluginctl
mvc: fix API endpoint sending data without giving the Response object the chance to flush its headers
plugins: os-acme-client 4.5 [1]
plugins: os-apcupsd 1.2 [2]
plugins: os-caddy 1.6.2 [3]
plugins: os-ddclient 1.23 [4]
plugins: os-theme-rebellion 1.9.1 fixes more compatibility issues with new dashboard (contributed by Team Rebellion)
src: pf incorrectly matches different ICMPv6 states in the state table [5]
src: ktrace(2) fails to detach when executing a setuid binary [6]
src: NFS client accepts file names containing path separators [7]
src: xen/netfront: Decouple XENNET tags from mbuf lifetimes
src: dummynet: fix fq_pie traffic stall
src: mcast: fix leaked igmp packets on multicast cleanup
src: wg: change dhost to something other than a broadcast address (contributed by Sunny Valley Networks)
ports: curl 8.9.1 [8]
ports: dhcrelay 0.6 [9]
ports: kea 2.6.1 [10]
ports: nss 3.102 [11]
ports: php 8.2.22 [12]
ports: rrdtool 1.9.0 [13]
ports: syslog-ng 4.8.0 [14]
24.7 (July 25, 2024)
For more than 9 and a half years now, OPNsense is driving innovation through modularising and hardening the open source firewall, with simple and reliable firmware upgrades, multi-language support, fast adoption of upstream software updates as well as clear and stable 2-Clause BSD licensing.
24.7, nicknamed “Thriving Tiger”, features a new dashboard, system trust MVC/API support, GRE and GIF MVC/API support, NAT 1-to-1 MVC/API support, WireGuard QR code generator, dynamic IPsec VTI tunnel support, experimental OpenVPN DCO support, FreeBSD 14.1, Python 3.11 plus much more.
The upgrade path from 24.1.x will follow tomorrow. Do not be hasty. The major operating system upgrade has not happened in while and should be taken with the appropriate amount of care.
Download links, an installation guide [1] and the checksums for the images can be found below as well.
US East Coast: https://mirror.wdc1.us.leaseweb.net/opnsense/releases/24.7/
US West Coast: https://mirror.sfo12.us.leaseweb.net/opnsense/releases/24.7/
South America: http://mirror.ueb.edu.ec/opnsense/releases/24.7/
East Asia: https://mirror.ntct.edu.tw/opnsense/releases/24.7/
Full mirror list: https://opnsense.org/download/
Here are the full changes against version 24.1.10:
system: remove “load_balancer” configuration remnants from core
system: replace usage of mt_rand() with random_int()
system: rewrote Trust configuration using MVC/API
system: add XMLRPC option for OpenDNS
system: rewrote the high availability settings page using MVC/API
system: remove obsolete SSH DSA key handling
system: replaced the dashboard with a modern alternative with streaming widgets
system: harden a number of PHP settings according to best practices
system: support streaming of log files for the new dashboard widget
system: assorted dashboard widget tweaks
system: sidebar optimisation and fixes (contributed by Team Rebellion)
system: set short Cache-Control lifetime for widgets
interfaces: rewrote GRE configuration using MVC/API
interfaces: rewrote GIF configuration using MVC/API
interfaces: temporary flush SLAAC addresses in DHCPv6 WAN mode to avoid using them primarily
interfaces: add peer/peer6 options to CARP VIPs
interfaces: allow to assign a prefix ID to WAN interface in DHCPv6 as well
interfaces: allow to set manual interface ID in DHCPv6 and tracking modes
firewall: performance improvements in alias handling
firewall: refactor pftop output, move search to controller layer and implement cache for sessions page
firewall: support streaming of filter logs for the new dashboard widget
captive portal: add “Allow inbound” option to select interfaces which may enter the zone
captive portal: remove defunct transparent proxy settings
captive portal: clean up the codebase
ipsec: prevent gateway when remote gateway family does not match selected protocol in legacy tunnel configuration
isc-dhcp: do not reload DNS services when editing static mappings to match behaviour with Kea
monit: expose HTTPD username and password settings to GUI
openvpn: optionally support DCO devices for instances
openvpn: remove duplicate and irrelevant data for the client session in question
openvpn: add “remote_cert_tls” option to instances
backend: add “cache_ttl” parameter to allow for generic caching of actions
backend: run default action “configd actions” when none was specified
backend: extended support for streaming actions
installer: update the ZFS install script to the latest FreeBSD 14.1 code
installer: prefer ZFS over UFS in main menu selection
ui: assorted improvements for screen readers (contributed by Jason Fayre)
ui: add “select all” to standard form selectors and remove dialog on “clear all” for tokenizers
ui: lock save button while in progress to prevent duplicate input on Bootgrid
ui: backport accessibility fix in Bootstrap
mvc: replaced most of the Phalcon MVC use with a native band compatible implementation
mvc: improve searchRecordsetBase() filtering capabilities
mvc: improve container field cloning
mvc: remove obsolete getParams() usage in ApiControllerBase
mvc: hook default index action in API handler
plugins: os-acme-client 4.4 [2]
plugins: os-caddy 1.6.1 [3]
plugins: os-dec-hw 1.1 replaces the dashboard widget
plugins: os-etpro-telemetry 1.7 replaces dashboard widget
plugins: os-freeradius 1.29.4 [4]
plugins: os-nginx 1.34 [5]
plugins: os-theme-cicada 1.37 fixes dropdown element style (contributed by Team Rebellion)
plugins: os-theme-vicuna 1.47 fixes dropdown element style (contributed by Team Rebellion)
src: FreeBSD 14.1-RELEASE [6]
src: assorted backports from FreeBSD stable/14 branch
ports: hostapd 2.11 [7]
ports: libpfctl 0.12
ports: phalcon 5.8.0 [8]
ports: openvpn 2.6.12 [9]
ports: wpa_supplicant 2.11 [10]
A hotfix release was issued as 24.7_5:
system: fix disk widget byte unit “B” parsing crashing the whole widget
interfaces: improve apply of the new peer/peer6 options to avoid unneeded reset
firewall: fix one-to-one NAT migration with external address without a subnet set
openvpn: disable DCO permanently in legacy client/server configuration
mvc: fix API regression due to getParams() removal
plugins: os-udpbroadcastrelay API error fixes (contributed by Team Rebellion)
A hotfix release was issued as 24.7_9:
system: increase widget timeout to 5 seconds
system: cores and threads flipped in system widget
system: increase the PHP children count of the web GUI
mvc: make Response->setContentType() second argument optional
plugins: os-theme-rebellion 1.9 fixes compatibility issues with new dashboard (contributed by Team Rebellion)
Migration notes, known issues and limitations:
The dashboard has been replaced. Widgets from the old format are no longer supported and need to be rewritten by the respective authors.
ISC DHCP will no longer reload DNS services on static mapping edits. This is for feature parity with Kea DHCP and avoiding cross-service complications. If you expect your static mappings to show up in a particular DNS service please restart this service manually.
The public key for the 24.7 series is:
# -----BEGIN PUBLIC KEY-----
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAunCgLymz7ichjk+uZ4pR
# XwFX8FxG0KFBf4f6kCfQ+wNF9KTFBELzGg2tXPUmrJD/DzcMqQExP3WyTg0Z96ZW
# HofN2AbOCG84PpNlsKXpaUtm9Ow8kiYh7tn26eX7FaOEPtpJkMiwUymbCJJaPE0O
# smQbWGnJTvF8LTmuviPoiMrPv1cJ0kEyJvjDD0yMw1HrIgwPOazGmTQiuM3LoLOK
# F0KWf2p40c77QDOuGC7AIobQgDkZTabfU7PQUn6gDiKARYCst7y2xX3OQ7foXCJW
# nDDypfbfHixv77mVAeIED0h9ZsQaIHskL2dqqRbFHiY+OHjQTCAJP1Ptm/HGSCdj
# GOjpuD4WXvxru8AgcOCh6GpqO4IbByIHXu+67Ur3UBlxsp4x44lxBWXQzeemVhaS
# ZAmkJNemw51oRDTxYtpR7TF3OlgLAQBOB/0tqHmkbSBouQ6PK7HYzNglu9LStxo1
# uxgMss5q8GoZCkWKvRDz87YceeC75l0aWOVnkOMmC5Lf+fFMJp6TF7BzCi3ZC7CD
# DQchBlE2F98D3E7KiI4vGrLUj3qKwfwV41JSQ8OtwOV+KFGOmyHeNassTQHm1Mdn
# reTzHeusqUdAL7+pXH1XNwoFSZo7A6RoZzTzb0p7WYbKU9SV39DPytsYES7FsyY8
# l7+AsM+sBOY1ngeB/twBzyUCAwEAAQ==
# -----END PUBLIC KEY-----
# SHA256 (OPNsense-24.7-dvd-amd64.iso.bz2) = 4452df716417cac324bb06322fc4428870ac2a64fd6ae47675a421e8db0a18b5
# SHA256 (OPNsense-24.7-nano-amd64.img.bz2) = a44711b6c088d6d12434afef9a3ccadc4ef1b56e44babd13e4b199589170c51a
# SHA256 (OPNsense-24.7-serial-amd64.img.bz2) = a94207c3515389c3fab5c6d72eeda4951526f9f50f06794ad9a4c1478bc8e8d0
# SHA256 (OPNsense-24.7-vga-amd64.img.bz2) = 11031aecabce97f6d5502f943d347704b5a888ec213d7f9229200877d72f297c
24.7.r2 (July 19, 2024)
For more than 9 and a half years now, OPNsense is driving innovation through modularising and hardening the open source firewall, with simple and reliable firmware upgrades, multi-language support, fast adoption of upstream software updates as well as clear and stable 2-Clause BSD licensing.
We thank all of you for helping test, shape and contribute to the project! We know it would not be the same without you. <3
Download links, an installation guide [1] and the checksums for the images can be found below as well.
US East Coast: https://mirror.wdc1.us.leaseweb.net/opnsense/releases/24.7/
US West Coast: https://mirror.sfo12.us.leaseweb.net/opnsense/releases/24.7/
South America: http://mirror.ueb.edu.ec/opnsense/releases/24.7/
East Asia: https://mirror.ntct.edu.tw/opnsense/releases/24.7/
Full mirror list: https://opnsense.org/download/
Here are the full changes against version 24.7-RC1:
system: assorted dashboard widget tweaks
system: sidebar optimisation and fixes (contributed by Team Rebellion)
installer: update the ZFS install script to the latest FreeBSD 14.1 code
mvc: remove obsolete getParams() usage in ApiControllerBase
mvc: hook default index action in API handler
src: assorted backports from FreeBSD stable/14 branch
plugins: os-caddy 1.6.1 [2]
plugins: os-dec-hw 1.1 replaces the dashboard widget
plugins: os-nginx 1.34 [3]
plugins: os-theme-cicada 1.37 fixes dropdown element style (contributed by Team Rebellion)
plugins: os-theme-vicuna 1.47 fixes dropdown element style (contributed by Team Rebellion)
Migration notes, known issues and limitations:
The dashboard has been replaced. Widgets from the old format are no longer supported and need to be rewritten by the respective authors.
ISC DHCP will no longer reload DNS services on static mapping edits. This is for feature parity with Kea DHCP and avoiding cross-service complications. If you expect your static mappings to show up in a particular DNS service please restart this service manually.
The public key for the 24.7 series is:
# -----BEGIN PUBLIC KEY-----
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAunCgLymz7ichjk+uZ4pR
# XwFX8FxG0KFBf4f6kCfQ+wNF9KTFBELzGg2tXPUmrJD/DzcMqQExP3WyTg0Z96ZW
# HofN2AbOCG84PpNlsKXpaUtm9Ow8kiYh7tn26eX7FaOEPtpJkMiwUymbCJJaPE0O
# smQbWGnJTvF8LTmuviPoiMrPv1cJ0kEyJvjDD0yMw1HrIgwPOazGmTQiuM3LoLOK
# F0KWf2p40c77QDOuGC7AIobQgDkZTabfU7PQUn6gDiKARYCst7y2xX3OQ7foXCJW
# nDDypfbfHixv77mVAeIED0h9ZsQaIHskL2dqqRbFHiY+OHjQTCAJP1Ptm/HGSCdj
# GOjpuD4WXvxru8AgcOCh6GpqO4IbByIHXu+67Ur3UBlxsp4x44lxBWXQzeemVhaS
# ZAmkJNemw51oRDTxYtpR7TF3OlgLAQBOB/0tqHmkbSBouQ6PK7HYzNglu9LStxo1
# uxgMss5q8GoZCkWKvRDz87YceeC75l0aWOVnkOMmC5Lf+fFMJp6TF7BzCi3ZC7CD
# DQchBlE2F98D3E7KiI4vGrLUj3qKwfwV41JSQ8OtwOV+KFGOmyHeNassTQHm1Mdn
# reTzHeusqUdAL7+pXH1XNwoFSZo7A6RoZzTzb0p7WYbKU9SV39DPytsYES7FsyY8
# l7+AsM+sBOY1ngeB/twBzyUCAwEAAQ==
# -----END PUBLIC KEY-----
Please let us know about your experience!
# SHA256 (OPNsense-24.7.r2-dvd-amd64.iso.bz2) = 43617bcb97b40a4c681c9468e0f7837aef9e7ff3849377649ab350287ad4639b
# SHA256 (OPNsense-24.7.r2-nano-amd64.img.bz2) = 8fad59de6fdb07b9df2edb637a9d5f18a892d462d76118da6270dede90180a35
# SHA256 (OPNsense-24.7.r2-serial-amd64.img.bz2) = 5c4d9b6f7ef4baf555c43d949f5946b59856fea45303a4b32890c102909d9f75
# SHA256 (OPNsense-24.7.r2-vga-amd64.img.bz2) = 46f78b3fa40a429f52adbe1caf923cb8f4856e01ff61888b3db2658b43fe3f56
24.7.r1 (July 16, 2024)
If you have not heard: 24.7-RC1 is an online update. You can update from the 24.7-BETA and switch to the community release type for the stable track which leads into 24.7.x. The development version of the upcoming 24.1.11 release will also be able to update to the RC. An RC2 will follow up with the relevant images and additional information at the end of the week.
Here are the full changes against version 24.1.10:
system: remove “load_balancer” configuration remnants from core
system: replace usage of mt_rand() with random_int()
system: rewrote Trust configuration using MVC/API
system: add XMLRPC option for OpenDNS
system: rewrote the high availability settings page using MVC/API
system: remove obsolete SSH DSA key handling
system: replaced the dashboard with a modern alternative with streaming widgets
system: harden a number of PHP settings according to best practices
system: support streaming of log files for the new dashboard widget
interfaces: rewrote GRE configuration using MVC/API
interfaces: rewrote GIF configuration using MVC/API
interfaces: temporary flush SLAAC addresses in DHCPv6 WAN mode to avoid using them primarily
interfaces: add peer/peer6 options to CARP VIPs
interfaces: allow to assign a prefix ID to WAN interface in DHCPv6 as well
interfaces: allow to set manual interface ID in DHCPv6 and tracking modes
firewall: performance improvements in alias handling
firewall: refactor pftop output, move search to controller layer and implement cache for sessions page
firewall: support streaming of filter logs for the new dashboard widget
captive portal: add “Allow inbound” option to select interfaces which may enter the zone
captive portal: remove defunct transparent proxy settings
captive portal: clean up the codebase
ipsec: prevent gateway when remote gateway family does not match selected protocol in legacy tunnel configuration
isc-dhcp: do not reload DNS services when editing static mappings to match behaviour with Kea
monit: expose HTTPD username and password settings to GUI
openvpn: optionally support DCO devices for instances
openvpn: remove duplicate and irrelevant data for the client session in question
openvpn: add “remote_cert_tls” option to instances
backend: add “cache_ttl” parameter to allow for generic caching of actions
backend: run default action “configd actions” when none was specified
backend: extended support for streaming actions
ui: assorted improvements for screen readers (contributed by Jason Fayre)
ui: add “select all” to standard form selectors and remove dialog on “clear all” for tokenizers
ui: lock save button while in progress to prevent duplicate input on Bootgrid
ui: backport accessibility fix in Bootstrap
mvc: replaced most of the Phalcon MVC use with a native band compatible implementation
mvc: improve searchRecordsetBase() filtering capabilities
mvc: improve container field cloning
plugins: os-acme-client 4.4 [1]
plugins: os-etpro-telemetry 1.7 replaces dashboard widget
src: FreeBSD 14.1-RELEASE [2]
ports: phalcon 5.8.0 [3]
Migration notes, known issues and limitations:
The dashboard has been replaced. Widgets from the old format are no longer supported and need to be rewritten by the respective authors.
ISC DHCP will no longer reload DNS services on static mapping edits. This is for feature parity with Kea DHCP and avoiding cross-service complications. If you expect your static mappings to show up in a particular DNS service please restart this service manually.
24.7.b (June 13, 2024)
Since OPNsense 24.7 will be based on a newer FreeBSD major version it is crucial for us to release these BETA images based on the latest development state. This is not meant for production use but all plugins are provided and future updates of installations based on these images will be possible.
https://pkg.opnsense.org/releases/24.7/
There is a bit more work to be done yet most of the milestones have already been reached. If you have a test deployment or would like to check out some of the new features these images are for you. Together we can make OPNsense better than it ever was.
The final release date for 24.7 is July 24. A release candidate will follow in early July.
Highlights over the current 24.1 series include:
Dashboard replacement with streaming widgets
System: High Availability: Settings page has been converted to MVC
System: Trust section has been converted to MVC/API
Interfaces: GIF section has been converted to MVC/API
Interfaces: GRE section has been converted to MVC/API
Firewall: NAT 1-to-1 has been converted to MVC/API
Added experimental OpenVPN DCO device type support
Added unicast CARP support to Virtual IPs
DHCPv6 on WAN can now assign a prefix subnet to itself and support static interface identifiers
Built-in cache capability for backend commands
Captive portal backend refactor and new “Allow inbound interfaces” option
Large portions of Phalcon MVC have been replaced by native PHP implementation
FreeBSD 14.1
The public key for the 24.7 series is:
# -----BEGIN PUBLIC KEY-----
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAunCgLymz7ichjk+uZ4pR
# XwFX8FxG0KFBf4f6kCfQ+wNF9KTFBELzGg2tXPUmrJD/DzcMqQExP3WyTg0Z96ZW
# HofN2AbOCG84PpNlsKXpaUtm9Ow8kiYh7tn26eX7FaOEPtpJkMiwUymbCJJaPE0O
# smQbWGnJTvF8LTmuviPoiMrPv1cJ0kEyJvjDD0yMw1HrIgwPOazGmTQiuM3LoLOK
# F0KWf2p40c77QDOuGC7AIobQgDkZTabfU7PQUn6gDiKARYCst7y2xX3OQ7foXCJW
# nDDypfbfHixv77mVAeIED0h9ZsQaIHskL2dqqRbFHiY+OHjQTCAJP1Ptm/HGSCdj
# GOjpuD4WXvxru8AgcOCh6GpqO4IbByIHXu+67Ur3UBlxsp4x44lxBWXQzeemVhaS
# ZAmkJNemw51oRDTxYtpR7TF3OlgLAQBOB/0tqHmkbSBouQ6PK7HYzNglu9LStxo1
# uxgMss5q8GoZCkWKvRDz87YceeC75l0aWOVnkOMmC5Lf+fFMJp6TF7BzCi3ZC7CD
# DQchBlE2F98D3E7KiI4vGrLUj3qKwfwV41JSQ8OtwOV+KFGOmyHeNassTQHm1Mdn
# reTzHeusqUdAL7+pXH1XNwoFSZo7A6RoZzTzb0p7WYbKU9SV39DPytsYES7FsyY8
# l7+AsM+sBOY1ngeB/twBzyUCAwEAAQ==
# -----END PUBLIC KEY-----
Please let us know about your experience!
# SHA256 (OPNsense-devel-24.7.b-dvd-amd64.iso.bz2) = af740f12d4363d13e96ad95ac06dd1d659009c345af3e8ff6d544a66200ba93f
# SHA256 (OPNsense-devel-24.7.b-nano-amd64.img.bz2) = 394e150c3cb22b7f2d2b131fc2bcb545355e6a129b7d9afe2ced9c4364bfa862
# SHA256 (OPNsense-devel-24.7.b-serial-amd64.img.bz2) = a8770d247400859e66151aae177171f141ea7064de98728edfc22a77d8d5f447
# SHA256 (OPNsense-devel-24.7.b-vga-amd64.img.bz2) = 046bba7c48312578f819535a0f29210e24f9bcb1e8153256fb15a35a62f3d443