Chris and Scott, 2 pfSense developers, are considering putting together a 4 hour training course on pfSense, starting from an introduction and installation, and covering as much material as possibly can be done in 4 hours (4 hours is the max duration of a training slot at BSDCan 2008). The tutorial cost in previous years was something like $50. If the proposal is accepted, the course will take place in May 2008 in Ottawa, Canada.If you’re interesed in this course, just drop Chris an email.
LinuxReality.com (a site with Linux related podcasts – similar to the BSD focused bsdtalk.blogspot.com) has posted a podcast (episode 84) that focuses on Linux and (network) security. In this episode Paul Asadoorian and Larry Pesce of the Pauldotcom Security Weekly Podcast are interviewed.
Amongst the many things discussed, M0n0wall and pfSense are also mentioned.
The third annual pfSense hackathon has been a great success. There was a lot of cleaning up code and cleaning up the many new features that are already in the development branches, rather than adding more new features. This leaves pfSense in a better position to get out future releases.
The third annual pfSense Hackathon starts this coming weekend through the following weekend, in Louisville, KY US. Two developers (Holger and Seth) will be coming in from Europe, as well as Bill from the Chicago area, Gary with Centipede Networks from Tulsa, and Scott and I who both live in Louisville.
This is the longest hackathon yet, at 8 days from start to finish time.
If you’re interested, have a look at the ideas page with a list of things that may/may not be worked on. If you know of something you’d like to see, please contact Chris and it may get added to the list.
For contact details and more details, read the full post here.
The second release candidate of pfSense, a FreeBSD-based firewall, is ready for testing:
pfSense 1.2-RC2 has been released. Here are just a few of the new improvements and features that have made their way into this new version: automatically restarts racoon (ipsec-tools if it wedges); ensure CARP status page cache is cleared before load; updated lighttpd to 1.4.15; APC updated to 3.0.14; update to DNSMASQ 2.3.9; ensure that rules are cleared from UPNP when service is stopped; correctly show IPSEC firewall rules tab when Mobile IPSEC is enabled; quality graph miscellaneous alignments; backport show username on captive portal status screen; do not allow aliases named ‘pptp’; TCP timeout time fixes.
Read the complete changelog for full details.