Important note about SSL VPN compatibility for 20.0 MR1 with EoL SFOS versions and UTM9 OS. Learn more in the release notes.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Sophos Firewall: v19.0 GA: Feedback and experiences

Parents Reply Children
  • The problem was discovered recently and only affects Cyberoam Appliances or old installations coming from Cyberoam.

    Sophos always recommend to read the Release notes carefully: https://docs.sophos.com/releasenotes/index.html?productGroupID=nsg&productID=xg&versionID=19.0

    The Upgrade and known issue section is explaining the issue. 

    This will be addressed in the next version.

    __________________________________________________________________________________________________________________

  • One option is to put it in the release notes and rely of the user reading them before the upgrade. Fair for most people on this forum, we're a bit geeky, not sure about the standard business user who just wants to upgrade their firmware, and receives no prompt on the GUI interface to read the release notes first. Also bear in mind Sophos often push out emails saying "Make sure you're running the latest firmware or you could be at risk / unsupported"

    Another option may be a re-release of the existing v19 with a built in check - (if coming from Cyberoam, do not apply, and prompt with message) or equivalent.

    I guess what I'm implying is, lets not try to move too much of the emphasis to the end user when trying to offer a user friendly product.

    ------------------------------------------------

    worlds number one free ICMP monitoring platform: https://pinescore.com

  • It is not that easy to re release a product / firmware from such perspective. There are many implication on doing this. Not only technical, legal etc. 

    __________________________________________________________________________________________________________________

  • ahhh I see, okay cool

    ------------------------------------------------

    worlds number one free ICMP monitoring platform: https://pinescore.com

  • Ryan summaries my concerns better than I have.

    For us, we manage over 100 Sophos units. We upgraded 1 without issue, waited a few weeks, then did another 5 and again no issues, so push out the update to the rest of the units centrally. Then all of a sudden we had 12 clients dead in the water with no internet access. And because upgrades to critical infrastructure has to happen out of hours, the failures occurred at night and we have to wait until the morning when suddenly 12 different units are down and staff can't work. It's fine for an MSP to perform the steps to rectify, but you can't get a client to log in to advanced shell and run those commands.

    I get the issues with reissuing firmware to resolve a bug, but what I don't understand is that if the Sophos knows it's doing a firmware update and then it ends up in Failsafe mode, it clearly knows the process has failed. Why can't it mark that FW image as faulty so that next the time appliance boots it goes back to the known good FW image? That way we could just tell the client to power cycle the unit and they'd be back online and log in remotely to fix. This was one of my biggest issues with Cyberoam previously as well. If a FW fails to boot, next time boot to the other one. That way the client is not dead in the water.

  • First of all, a SIG/ISO build is a finish state. You are using a build XYZ version. In this version, the issue was not discovered. So to "flag this as a failed image" the code is not there to flag in, as the issue was not known to the firewall at this point.

    Sophos could revoke the entire build. This means pull back build XYZ for all customers. Re release a new version (build ABC with the fix). This takes a long time to go through all cycles (QA checks, legal, release infrastructure etc.). 

    Failsafe is some issue, which is actually quite rare in the latest releases. I guess the last time i saw failsafe was 2 years ago. So this is not a common issue. If the migration does not work, it can pull back to the old version. But fail safe is some sort of kernel panic mode. So the entire firewall stopped at this point. 

    There is a lot of background work currently to get a state of this cannot happen again. 

    And again, we do not talk about "every customer is affected". It seems like only a customer base with a old configuration coming from cyberoam. 

    __________________________________________________________________________________________________________________

  • I fully understand you can't revoke the entire build, and I understand that the issue wasn't known when the firmware was released, but what I'm saying is that if the Sophos does an upgrade and the device enters "failsafe" then when entering "failsafe mode" it should automatically mark the alternative image as default for the next boot of the device. That way, if a firmware update fails and breaks the device - for whatever reason - we can just tell the customer to power cycle the device and it will boot back in to the previous firmware.

  • I would have to agree with Ryan. At least put it in the release notes (you finally did) and notify users. This version has been out for almost 2 months, but you just added it to the release notes. This was a known issue but took weeks to document it, and IMO, it's not emphasized enough. I also don't agree with Sophos using a rolling release notes page that you just add to as you find issues. It makes it look like you notified end users before the upgrade, but a lot of "know issues" have been added after V19 GA was released. There should be addendums so users that already did the upgrade can decipher what is new. I really love the XG, but you guys do a terrible job of notifying end users of issues.