improved overall security of the code e.g. by fixing https://www.exploit-db.com/exploits/39038/ a few months earlier than announced
There is an exploit in the wild and the current release version hasn't been patched, but the dev version has? And the original plan was to wait a few months?I'm new to the project and trying to understand how I would patch our instance against 0days.
* [security] ports: ntp 4.2.8p5[7]* ports: suricata 2.0.11[2], dhcp6 20080615_5[3], lighttpd 1.4.39[4]* ports: syslogd 10.2, mpd 5.8[5], ca_root_nss 3.21, dnsmasq 2.75_1[6]* ports: php 5.6.17[8], python 2.7.11_1[9]* ports: miniupnpd 1.9.20151212, openvpn 2.3.10[10]* opnsense-update: add opnsense-verify and opnsense-sign* opnsense-update: improve verification of signatures of kernel and base upgrades* menu: bring back dashboard entry due to popular demand...
and FreeBSD 10.2 underneath will help newer hardware to run more smoothly
16.1 is still scheduled for January 28 (hence "development series"), see https://opnsense.org/about/road-map/
We're not yet ready to provide reliable test kernels for development releases
as well as having to build multiple package mirrors for different OS versions. Too much strain for our project at the moment to handle.
I'll build the new FreeBSD 10.2 based on the latest patches till tomorrow. This is likely the one that will be in 16.1, minus the OPNsense branding, which is still in the pipe (minor boot loader stuff). Deal?