pfsense < 2.2 have a split-brain openssl. so to test the version that you're getting with the openvpn service, you need to check the openssl linked to it. In this case "/usr/lcoal/bin/openssl version" will tell you it is newer.
However, as everyone says, update to newest version of pfSense is your best move. Disabling export grade ciphers is also good advice. On Thu, Mar 19, 2015 at 4:57 AM, Amit Saxena <amit.sax...@fosteringlinux.com > wrote: > > > Dear Team, >> >> I am working on pfsense firewall as well as configured as a Opnevpn server >> I got the information that "Freak vulnerable" so i want to know it >> affected to Pfsense box >> My pfsense Detail >> >> Pf sense version 2.1 and opnessl version 0.9.8y >> >> [image: Description: >> C:\Users\KAUSHA~1\AppData\Local\Temp\SNAGHTMLbb0771b2.PNG] >> >> Regards >> Amit saxena >> >> > > _______________________________________________ > pfSense mailing list > https://lists.pfsense.org/mailman/listinfo/list > Support the project with Gold! https://pfsense.org/gold >
_______________________________________________ pfSense mailing list https://lists.pfsense.org/mailman/listinfo/list Support the project with Gold! https://pfsense.org/gold