Release Notes
Version | 5.8.0 |
---|---|
Release date | 20 March 2025 |
Scope | Focused on new functionalities, enhancements and bug fixes |
Making sure to check out the Release Notes and documentation:
OPSWAT will discontinue support for CentOS 7 and RHEL 7 with the release of MD ICAP Server version 5.9.0.
MD ICAP Server v5.8.0 is the last version with support for these OS versions.
New Features, Improvements and Enhancements
Details | ||
---|---|---|
New OS support: Rocky Linux 9 | We are introducing Rocky Linux 9.4 support as a replacement for CentOS 7 starting with the next version release (ICAP v5.9.0) We will also provide a new Docker image based on the official Rocky Linux repository (MD ICAP Server Rocky Linux image) | |
Support user login for nested AD groups | When you enable the checkbox "Nested Group Login" for Active Directory, direct or indirect remote users who are members of added AD group can login to MD ICAP Server successfully and will inherit the roles and rights of corresponding AD group. ![]() | |
Email notification | Registered users will receive email notification about licensing expiration. This feature can be enabled by administrator (refer to: Email Notification)
| |
Security enhancements | Upgraded third-party libraries for vulnerability fixes:
| |
Support secure TCP syslog | Secure TCP syslog (TLS) is now supported (refer to Configuration file) | |
Usability enhancements/changes |
|
Bug Fixes
Details | |
---|---|
Minor Fixes |
|
Known Limitations
Details | |
---|---|
Proxy configuration | HTTPS proxy configuration is currently not supported. |
SAML directory (SSO integration) limitation | In MetaDefender ICAP Server v5.5.0, users cannot create a new SAML directory via the web UI.
|
Stability issues on Red Hat/CentOS with kernel version 372 | MetaDefender ICAP Server 5.1.0 or newer may encounter stability issues on Red Hat /Cent OS systems running kernel version 372. Solution: Red Hat has addressed this issues in the latest kernel version 425 |
MetaDefender ICAP Server's NGINX web server fails to start with weak cipher suites for HTTPS | In MetaDefender ICAP Server v5.1.0 or newer, OpenSSL 1.x has been replaced with OpenSSL 3.x within the product and other dependencies to enhance security and address vulnerabilities. NGINX's OpenSSL 3.x on MetaDefender ICAP Server has the enforcement in place to reject all weak cipher suites. The web server only accepts "HIGH" encryption cipher suites https://www.openssl.org/docs/man1.1.1/man1/ciphers.html (MD5 and SHA1 hashing based are also not accepted). As a result, if you already configured MetaDefender ICAP Server for HTTPS using a weak SSL cipher with your certificate, the server will not start due to NGINX's OpenSSL 3.x enforcement. |
no_proxy configuration | Starting with MetaDefender ICAP Server v5.1.0, the no_proxy setting must support CIDR for IP addresses.
For more details, refer to No Proxy configuration |
Connect to MetaDefender Core with TLS on Debian OS | MetaDefender ICAP Server v5.1.0 on Debian OS must execute the two following commands to enable TLS when connecting to MetaDefender Core.
Resolution: This issue is fixed in MetaDefender ICAP Server v5.1.1 |
TLS 1.3 is not supported on Windows Server 2012 | TLS 1.3 is not supported on Windows Server 2012 due to limitations with Schannel SSP. Reference |