Release Notes
Version | 5.5.1 |
---|---|
Release date | 30 May 2024 |
Scope | Focused on enhancements and bug fixes |
Making sure to check out the Release Notes and documentation:
New Features, Improvements and Enhancements
Details | |
---|---|
Native proxy configuration GUI | MetaDefender ICAP Server now supports users to control proxy setting for the product via UI setting, and also proxy authentication is supported. The new feature also provide options to define separate proxy settings for each MetaDefender ICAP Server functionalities that requires network connection. This addition ensures consistent experience when deploying both MetaDefender Core and MetaDefender ICAP Server, streamlining the overall user experience for IT administrators. For those customers upgrading to MetaDefender ICAP Server 5.5.1 using system proxy via environmental variable, the product will keep the same for backward compatibility. |
Request filtration by URL under workflow | Besides other existing filtration options, now MetaDefender ICAP Server enrich the feature to provide a way to filter requests based on request URL. For example: below setting will filter the request which have request URL in ICAP message contain string "google.com" or begin with "https://www.opswat.com" |
Security enhancements |
|
Logging improvements | New configuration to collect system resource information on server where MetaDefender ICAP Server resides for Splunk integration, instead of using Splunk Universal Forwarder.
More detail, refer to Configuration file |
Performance improvements |
|
Bug Fixes
Details | |
---|---|
Fixes on product stability issues |
|
Some minor issues | Some UI cosmetics and minor bugs are addressed. |
Known Limitations
Details | |
---|---|
Unable to create new SAML directory (SSO integration) on MetaDefender ICAP Server 5.5.0 via Web UI | UI (frontend) issue which can workround via using REST API. Having no impact on existing SAML directory when upgrading to MetaDefender ICAP Server 5.5.0. The issue will be addressed on MetaDefender ICAP Server 5.5.1 or newer. |
Stability issues on Red Hat / CentOS with its kernel version 372 | MetaDefender ICAP Server 5.1.0 or newer might not be able to work properly with Red Hat /Cent OS with its kernel 372. The vendor Red Hat has already fixed issues with latest kernel version 425 |
MetaDefender ICAP Server's NGINX web server will not start if using weak cipher suites for HTTPS | On MetaDefender ICAP Server 5.1.0 or newer, OpenSSL 1.x is replaced by OpenSSL 3.x within the product and other dependencies (NGINX) as a security improvement, and prevent known vulnerabilities found on OpenSSL 1.x NGINX's OpenSSL 3.x on MetaDefender ICAP Server has the enforcement in place to reject all weak cipher suites. It only accepts "HIGH" encryption cipher suites https://www.openssl.org/docs/man1.1.1/man1/ciphers.html (MD5 and SHA1 hashing based will not be accepted as well). As a result, if you already configured MetaDefender ICAP Server for HTTPS connection, but using a weak SSL cipher with your certificate, then MetaDefender ICAP Server will not be able to start due to NGINX's OpenSSL 3.x enforcement. |
no_proxy configuration | From MD ICAP Server 5.1.0, no_proxy setting must support CIDR for IP address, refer to No Proxy configuration |
Connect with MD Core with TLS on Debian OS | MetaDefender ICAP Server v5.1.0 on Debian OS must execute 2 bellows command to connect with MetaDefender Core via TLS enable. sudo mkdir -p /etc/pki/tls/certs/ sudo ln -s /etc/ssl/certs/ca-certificates.crt /etc/pki/tls/certs/ca-bundle.crt This issue has already fixed since MetaDefender ICAP Server v5.1.1 |
TLS 1.3 does not support on Windows Server 2012 | Tls 1.3 will not work on Windows Server 2012 due to limitation of Schannel https://learn.microsoft.com/en-us/windows/win32/secauthn/protocols-in-tls-ssl--schannel-ssp- |