This question comes up a lot on YouTube, forums, and many other sites. I wanted to have a reply with links and details for the people who keep asking, or sometimes insisting, that I do OPNSense videos.
Despite OPNsense having a more frequent update cycle, they are slower to get out security fixes. Here are some examples with links to posts from OPNSense & pfsense:
-
OpenSSL 1.1.1 is no long supported & Systems must be upgraded to supported version to 3
Fixed in pfsense Plus November 06, 2023
Netgate Releases pfSense Plus Software Version 23.09
Fixed in pfsense CE November 16, 2023
Netgate Releases pfSense CE Software Version 2.7.1
Fixed in OPNSense 24.1.1 released Feb 6 2024
OPNsense 24.1.1 released -
SSH Terrapin
Fixed in pfsense on December 18th, 2023
Terrapin SSH Attack | Netgate Forum
Fixed in OPNSense on December 28th 2023
[SOLVED] Mitigations for Terrapin ssh attack? -
TCP spoofing vulnerability
Fixed in pfsense December 7th 2023
Netgate Releases pfSense Plus Software Version 23.09.1 and pfSense CE Software Version 2.7.2
Fixed in OPNSense December 12th 2023
OPNsense 23.7.10 released
Fixed in OPNSense business December 19th 2023
Netgate sponsored the fix for that issue pf: remove incorrect fragmentation check · freebsd/freebsd-src@6284d5f · GitHub
While I recognize from an interface standpoint the their code base has drifted apart since the fork, for clarification when I say “OPNSense relies on Netgate for features and fixes” that is because Netgate contributes a lot back to upstream FreeBSD.
Netgate is funded by selling their hardware that comes with pfsense+ or selling licences for pfsense+. This is similar to OPNSense that sells hardware and business licences.
From that income Netgate staffs numerous developers who’s job at Negate is to contribute to code for FreeBSD and continue creating builds for pfsnese CE which is free. And more important than just the percentage of the code that is committed, is what code they commit. Which of course is lots of enchantments benefit firewall related features and performance.
Source at the 1:13:20 mark
And you can use the GitHub search for “Rubicon Communications, LLC (Netgate)” to see all that code pulled downstream into OPNSense.
This is also why pfsense out performs OPNSense when it comes to WireGuard VPN performance. While the code is open source, how that code is integrated is very important.
OpenVPN DCO work was upstreamed to FreeBSD sponsored by (paid for) by Netgate back in 2022
Almost 2 years later it’s getting coming to OPNSense.
https://www.reddit.com/r/opnsense/comments/1czpnuy/247_community_release_freebsd_141_et_al/
Probably not an issue with the home user market but pfsense supports GW Group which allows you to select the GW Group as the interface in the Phase1 setup, whereas OpnSense does not.
Also worth noting that pfsnese moved to FreeBSD Main but OPNsense has not. Here is a post from Franco at OPNSense pointing out that they are lagging behind on features because they are using FreeBSD 13 and new features are not being backported.