Nieuws

New: NEW: Allow external splash page pre-authentication to be turned off. GUI coming soon. Fixes: FIXED: Enabling Band Steering may result in high processor load and/or client connection issues. Known Issues: KNOWN ISSUE: CloudTrax may incorrectly report some clients as having a 169.x.x.x IP address. KNOWN ISSUE: Unblocked clients that were previously blocked via Manage -> Clients may remain blocked until reboot. KNOWN ISSUE: 5Ghz Meshing always uses 80Mhz channel width, regardless of CloudTrax channel
Firmware 6.4 Latest Development Release 6.4.5 (23-02-18) is de vervangende versie voor 6.3.16 Open-Mesh gaat niet verder met 6.3 en maken van 6.4.5 een “stable release” 6.4.5 (Jan 8, 2018) Fixes: FIXED: Using the SSID Band setting “Both – Unique SSIDs”, results in the first character of each SSID name being truncated. FIXED: AP may report N/A N/A for channels, despite broadcasting correctly. Known Issues: KNOWN ISSUE: Some clients may report being connected to the
6.4.3 (Dec 4, 2017) New Features: NEW: Client IP addresses reported to CloudTrax. NEW: Prefer 5Ghz 802.11ac meshing, if available. NEW: Firmware upgrade delay reduced and firmware can upgrade when in orphan mode, allowing for faster firmware updates. NEW: BATMAN Mesh Protocol reverted to BATMAN IV, to restore repeater mesh compatibility with 6.3.x firmware. NEW: Bridge multiple SSIDs to LAN. (GUI Coming Soon…) Fixes: FIX: Bandwidth throttling was not always being applied to some clients, when
Justitie gaat beginnen met het dwarsbomen van verdachte webshops. Als er drie aangiftes van internetoplichting over een winkel bij de politie binnen zijn gekomen, worden betaaldiensten ingeseind. Die kunnen het betaalverkeer van verdachte webshops blokkeren en zo voorkomen dat meer slachtoffers worden gemaakt. Op dit moment wordt samengewerkt met twaalf betaaldiensten en het Openbaar Ministerie om betalen via bijvoorbeeld iDeal onmogelijk te maken zonder een justitieel onderzoek af te wachten. Dat betekent dat nog niet
Latest Stable Release 6.3.16 (October 17, 2017) FIX: WPA2 “Key Reinstallation Attack (KRACK)” exploit (CVE-2017-13077, CVE-2017-13078, CVE-2017-13079, CVE-2017-13080, CVE-2017-13081, CVE-2017-13082, CVE-2017-13084, CVE-2017-13086, CVE-2017-13087, CVE-2017-13088)  FIX: Dnsmasq remote code execution vulnerability identified by Google (CVE-2017-14492, CVE-2017-14493, CVE-2017-14494, CVE-2017-14495, CVE-2017-14496, CVE-2017-13704, CVE-2017-14491) Known issues: The Neighbor list might not always be populated, we’re aware and working on a fix. NOTE: Due to higher memory requirements, this version does not support OM1P, MR500 and OM2Pv1 devices. The OM1P/MR500 are legacy devices and limited to 481 firmware on “legacy” networks only, the OM2P is supported only to 6.1.2, and the