Hi everybody,

a new set of packages released for the community.
If you don't have already an account to update your system please register
your email here: http://www.endian.com/community/register/

*If you haven't already done, join our telegram channel at
https://t.me/efw_community_official <https://t.me/efw_community_official>
to be always updated about releases, features and news about your favorite
UTM distribution.*

Product       |  Machine       | Version
--------------|----------------|---------
community-x64 | softwarex86-64 | 3.3.0

#### Core Authentication layer

[CORE-3287](https://jira.endian.com/browse/CORE-3287)
Improvement: Add user IP address to authentication daemon logs

#### Core Base system

[CORE-2157](https://jira.endian.com/browse/CORE-2157)
Task: Introduce Python requests library
[CORE-3320](https://jira.endian.com/browse/CORE-3320)
Improvement: Upgrade to OpenSSH 7.1p2

#### Core Uplinksdaemon

[CORE-3815](https://jira.endian.com/browse/CORE-3815)
Bug: Uplink failover when main uplink is PPPoE is too slow

#### UTM Antispam: SpamAssassin

[UTM-2261](https://jira.endian.com/browse/UTM-2261)
Improvement: Add support for SSL and custom IMAP server port in Spam
training

#### UTM VPN: IPsec

[UTM-2267](https://jira.endian.com/browse/UTM-2267)
Bug: Data not removed from ipsec.secrets when ipsec tunnel is disabled

#### UTM VPN: OpenVPN

[UTM-2246](https://jira.endian.com/browse/UTM-2246)
Bug: Purple ip range is validated also in not bridged instances
[UTM-2249](https://jira.endian.com/browse/UTM-2249)
Bug: The purple subnet for the default Openvpn server is wrong
[UTM-2263](https://jira.endian.com/browse/UTM-2263)
Bug: Cannot disable channel encryption to OpenVPN instances
-- 

:: E n d i a n
:: secure EveryThing

:: Matteo Nova - Head of QA and Training
:: phone +39 0471 631763
:: http://www.endian.com  :: m.nova (at) endian (dot) com
_______________________________________________
Efw-user mailing list
Efw-user@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/efw-user

Reply via email to