WhatsNew Service Pack 975 for Artica 4.30.000000
FIX
- ERROR: Can`t create temporary directory /var/lib/clamav/tmp during the Clamav databases update.
- Compatibility issue for Active Directory DNS Cache with French Active Directory server.
- Incompatibility with DNS Cache service and nis system configuration.
- Could not handshake: An unexpected TLS packet was received for APT manager when using SSL with an Internet upstream Proxy.
- Direct acls objects to deny using proxy parents are not applied to the proxy configuration.
- Artica did not clean postgresql trace files.
- Memcached was handled by systemd and was not started using correct parameters.
- Unable to reset the Gold License.
- Sometimes Artica generates error Helper: Generic [ArtCategories] issue! [action=emergency!]
- Cannot display the Certificate signed Request content in the certificate center.
- MySQL error for default values when using PowerDNS during new domain creation.
- Increase performance and visibility on Security Reputation Network.
- Masquerade interface are not applied when not using any proxy or firewall service.
- Backup to NAS use the same parameters when using the cluster configuration.
- Bad property warnings found in proxy events
- statscom-error.log file was not cleaned and consume disk space.
- PDF proxy reports stucks at 5% of progress.
- Unable to upgrade system packages caused by clamav-freshclam and clamav-daemon
- HotSpot template was not builded that cause guest clients was not redirected to the splash screen.
- Artica is unable to stop and restart proxy service.
- statistics Inconsistencies related to the MAC address which can be masked by the routers.
- Artica did not checks Proxy ports after defines global parameters.
- Unable to connect to VPN PPTP service using Artica as gateway ( see more information here )
- Missing dependency of libbrotlicommon.so.1 for ICAP Scanner.
- Too few processes for MacToUid proxy rule.
- Import a certificat using a zip file did not import the certificat request and the private key.
- Bad understanding between importing a specific Artica certificate backup file and importing the real certificate: change the buttons method to avoid this behavior
- Upgrading the system did not upgrade the notification of softwares that must be upgraded.
- Security hole discovered by Rheinmetall Cyber Solutions GmbH company. Using the Web-filtering page service allows to read any file on the system
- Improve the progress task of install/uninstall in features section.
- Unable to start NtopNG because new version 4.x require full installation paths.
- nics_virtual table was not created.
- exec.syslog-engine.php still try to connect to MySQL server.
- Missing field AuthParentPort in proxy ports table
- SPAN Interface is not visible as real ok STATUS and displayed as a specific interface.
- TailScale Interface can be modified using the unix console.
- TailScale network starts before the main network that break the network configfuration.
- TailScale section is not protected by the VPN Manager privilege.
- Certificate Center did not import CSR and Private Key in some cases.
- Certificate Center did not parse CSR data (if provided ) in order to import correct certificate information.
- Certificate center did not import RSA PRIVATE KEYs
- Unable to Install DWAgent Service.
- Artica did not clean /var/log/conntrackd-stats.log
- Crash of SMTP events parser ( see more information here )
- Too many events timeout on read select() in syslog according to Artica Category cloud.
- Bungled in misstyped or missing outgoing interfaces in proxy acls.
- Enforce syslog log file checking - remove if size exceed 1GB
- Many logs : delay_pool 0 has no delay_access configured
- ACLS checker notice the ALL object as empty that is expected.
- Too much memory eating by exec.squidMins.php
- Artica did not display memcached version.
- Change Security Network feature to The Shields ( see more information here )
- Issue in SMTP TLS while creating the private key - special thanks to Peter Sikkes ( see more information here )
- Reload ICAP service will stop the service after few seconds, switch it to restart quickly.
- Call to undefined function posix_getuid() in class.unix.inc
- Unable to query correctly ICAP threats in the search engine.
- Unable to search entry inside Proxy DNS cache table
- Cache DNS Troubles when using the redis memory database. caused by records never removed, added a task that remove periodically the redis database
- Reload command make the C-ICAP stop, now Artica use a quick stop/start for reload task
- progress bar stuck when disabling SSL emergency
- Cannot access to the Gold License section.
- Web-filtering service consider as whitelist all sites if there an empy line in the whitelist database.
- Rebuild the authenticator for RDS Proxy
- A warning - outdated RDS proxy version - is displayed after upgrading to 9.x Proxy RDS Version.
- Internal Error 379 on reverse RDS proxy service when using Active Directory.
- Proxy bandwidth limiting was not correctly understood by administrators ( see more information here )
- The Shields block some webistes categorized as Apple, Microsoft, Web plugins and Science Computing
- Some website categories are not displayed in the realtime access events.
- Maximum fildescriptors parameter is not always understood by the proxy service.
- Artica did not check the Active Directory IP address parameter for an Active Directory connection
- Several bugs for RDS Proxy service with Active Directory settings caused by python3 migration
- Serveral customers forget to add networks in RDS Proxy rules. Add an explicit red text for this case
- Possible bugs on top-right notifications icon about new available versions.
- Upgrading RDS Proxy version did not compile again parameters that cause the authenticator not working.
- minor bugs on RDS Proxy service authenticator
- Cannot authenticate trough the RDS proxy login screen.
- Not all PostgreSQL events are sent to syslog
- Consolidate ACLs objects interface gameplay
- Unable to download Maxmind GeoIP databases ( see more information here )
- Webfilter client crash when proxy did not send its local port
- Web filter client crash evertytime after the SP975
- Sometimes the logfile tail service is not running
- Minor data table issue on failover service
- Sometimes the proxy did not authenticate kerberos users caused by an upgrade from 3.x
- Postpone crowdsec support
- Down the level of FATAL: Proxy is unable to connect to xxxx on port xxxx
- Issue on callback shutdown on Proxy Watchdog service.
- The Shields deny requests when Artica put websites into cache
- Some option in The Shields feature are not saved.
- Unable to send test SMTP in Web filtering rules.
- No backup watchdog for log viewer service.
- In some cases the proxy refuse any connection because the final rule is deny by default.
- Minor bug fixes in the failover feature.
- Wrong regex pattern in The Shields categorization cache
- multiple same rules in iptables when using Proxy in transparent mode
- Time synchronizing is not perform when using the Active Directory as NTP server ( see more information here )
- Sometimes it is unable to upgrade the system caused by clamav updating processing.
- Rebuild the external_acl_first plugin for better peformances ( beta 1)
- Display The Shields icon instead of text in the proxy realtime monitor.
- Wrong display in the Cache management section.
- Proxy issue on no_suid
- Artica uninstall NetData service after Installing the service
- Proxy Requests are denied for Office Network acl when using local LDAP authentication method
- Artica status Daemon crash after Service Pack 327
- Finishing NetDATA compliance
- Unable to update clamav updates with 0.104 new clamav version.
- Several bugs found by CybarWorks company ( see more information here )
- SQLite error database schema has changed
- The Shield was in debug mode by default that causing stressed CPU.
- New "Centralized" The Shield beta 2
- The Shields statistics are stopped since SP975
- Graph of number of DNS queries was not working
- The Shields icon set in red when there is no block by the Shields
- Bandwidth icon is not correctly displayed on the realtime access log
- The Use of basic Authentication on Local LDAP fature is not enabled on proxy side.
- Whitelisted sites from The Shields detected threads did not working
- Global Whitelisted sites are not correctly understood by The Shields when pattern start with a dot.
- An Artica with a Gold Licence cannot unlock The Shields server parameters form.
- Security hole on cyrus.events.php - special thanks to researcher357
- Loop on a widget in the Dashboard
- Log rotation issue when using HaCluster on access events ( see more information here )
- The Shields save whitelisted sites as threats
- The proxy ACL finally allow all did not working as expected
- issue on category service section that loading and stress the proxy.
- Increase The Shields performance
- Troubles and CGuard categories queries
- Whitelisting with Office365 macro make issues in the ACLs checker
- Active Directory Authentication whitelist did not working as expected ( see more information here )
- Local The Shields engine was not used that make unecessaries DNS queries.
- Generate a support tool stuck if some logs files exceed 1GB
- Uncaught ArithmeticError: Bit shift by negative number when calculating netbit of a network mask
- Wrong support tool for DHCP server
- Cannot add an inboud domain without relay address in SMTP service.
- SMTP healthcheck in failover service.
- Cannot enable TLS remote support on artica SMTP relay
- Authentication Whitelist did not accept correcly defined patterns.
- Artica turn to emergency if proxy claim of Cannot allocate memory, it is changed with a quick service restart
- Change filedescriptors values settings to a multiple of 64
- tweaks on The Shields performance.
- Authentication using local LDAP did not allow whitelisted websites
- Some Whitelisted websites are not totally applied.
- sometimes, the shields lost DNS configuration that make periodically categories search to unknown mode.
- Unable to understand the way to install The Shields as it is already installed
- SMTP notifications did not work as expected
- Unable to start The Shields service.
- Unable to start The Shields service.
- Unable to make The Shields binding an external network Interface
- Too much long time for installing Synology backup client.
- Administrative requests pass trough the parent proxy that causing broken TCP connections
- Extend partition did not correctly perform a resize2fs
- Some SQLite tables are not created because Artica did not detects missing tables.
- Sometimes The Shields did not parse queries.
- Tables creation in IDS service.
- Proxy ACLs are not builded since Service Pack 401
- Unable to modify ICAP antivirus template ( see more information here )
- Updating IDS servide for 4.19.0-18 Debian Kernel.
- The Shields categories compile crash when encounter standard PostreSQL error
- Artica try several times to install php7.0-sqlite3 on Debian 9.0
- Change trust password failed when using NTLM method with the proxy ( see more information here )
- Active Directory NTLM status watchdog is not performed periodically.
- Error in syntax or out of memory when tries add a new dns record in unbound
- Possibility to return back to proxy version 4 ( see more information here )
- local Port conflict between proxy watchdog and the winbindd process
- Artica did not restore the correct value for filedescriptors of the system.
- More tuning in order to avoid proxy filedescriptors issues.( see more information here )
- Unable to install dstat local package.
- Personal categories displays CGuard categories even the if Hide Officials Categories option is active
- Whitelists from The Shields did not working when using the Web-filtering engine.
- Remove the "Enabled" function in The Shields as The Shields is always enabled in all cases.
- The Shield did not allows whitelisting if it is not enabled as the enabled function did not exists
- Sometimes, the logger engine is not correctly initialized in The Shields Daemon
- many "NONE/000 0 NONE - -" events in HaCluster requests.
- IndexError: tuple index out of range in The Shields
- SQL error while creating DNS Firewall example rules.
- Fatal system Exception while compiling categories when there is no parameter in command line
- Unable to download Clamav Database because target directory is a file.
- Segmentation fault when stopping, restarting, starting proxy service.
- Artica Web interface console is restarted each 5 minutes when Web service as been installed and uninstalled.
- Artica did not check availability of python-redis for manual installation
- Artica did not check availability of lighttpd for manual installation
- Artica did not check availability of php-mysql for manual installation
- Artica did not check availability of php-sqlite3 for manual installation
- Infinite loop when booting the server if the final wizard did not perform properly the installation. ( during manual installation )
- Artica is unable to build network caused by missing MySQL php library that is not necessary
- Failover feature installation stuck at 5%
- Failed over feature installation
- Rebuild totally the Statistics daemon service and add more debug information ( see more information here )
- Automatically disable unecessary Mosquitto service.
- Uncaught TypeError: Return value of duplicated_tokens() when configuring the Web service.
- Error: Call to undefined function posix_getuid() on the framework when upgrading PHP engine.
- Urls too loog that expand the web page design on the proxy active connections monitor
- The Shields crashes when calculating users
- Increase net.core.somaxconn to 2048 as default To avoid Error 11 Resource Temporarly unavailable on The Shields
- Proxy stare all sites when enable SSL decrypt on proxy.
- The ACL categories load an external plugin that is no longer used with The Shields daemon.
- Memcached status screen design.
- DNS Firewall must connect to 127.0.0.1 to the Shields instead of Unix socket
- The Shields query tool must connect to 127.0.0.1 to the Shields instead of Unix socket
- The Watchdog must check 127.0.0.1 Shields socket instead of Unix socket
- The upgrade Artica procedure must restart theshields service and reload the proxy service
- The Shields Crash #1
- Old token block The Shields to not query the Artica cloud service.
- Add timeout on sQLite I/O operations
- The Shield crash #2.
- Rules inj proxy parents did not reflect expected order
- The Thields when using categories only new features.
- Remove the Shield class did not remove all items.
- Bungled caused by acl KeepSSL ssl::server_name
- Add possibility to save SSL certificates generated by the proxy in memory.
- DNS Firewall did not want to query The Shields for categorization.
- Disable a group in ACLs will disable the group on all acls.
- Unable to access to Artica Web console when using a strict parent proxy.
- The Shield issue when enabling "Only fro queries" and "Logs queries" in The Shields client
- The Shield issue when no MAC or no IP address is sent from the proxy service.
- SMTP service crash to non integer SSL switch defined.
- Artica is unable to perform Artica Statistics Migration.
- Fatal error when compiling categories.
- cicap_sandbox is not created before access to the status table.
- Issue on Artica Stats migration
- Some update errors when using the system update
- Minors bugs and reviewed DNSSEC methods in PowerDNS ( see more information here )
- Remove depreciated configuration token local-ipv6 that make the PowerDNS service unavailable on 4.5.2 version
- Unable to start new PowerDNS version 4.5x with the following error One of the backends does not support zone caching
- Strict-Transport-Security header is added twice in reverse-proxy configuration
- Sometimes the reverse-proxy claim that modsecurity_rules_file does not exists when enabling WAF engine
- notification to update The Shields client cannot be removed.
- crash on some URLs in The Shields
- The Shields did not block any detection from Artica Engine.
- Saving global options in reverse-proxy will remove rules generated in this section.
- Unable to enable HTTP/2 on the reverse Proxy.
- Searchs in DHCP events, leases, requests is not correcly understood, the search engine as been simplified.
- Unable to connect to the Active Directory using Kerberos in HaCluster mode - since Service Pack 500
- The Shields logs are not added to the support tool.
- The Shields Client is enabled in both method - Web filtering and ACL method
- Web-filtering crashes when parsing a default None rule.
- If WAF is not installed, the listed server did not display WAF sticker
- Crashes of proxy plugin categorization and The Shields client engine.
- TheShields client use the proxy to connect to TheShields server
- Web-filtering did not care about the login user
- Client continue to analyze the Web-filtering without username
- Web-filtering did not send the correct protocol to the proxy.
- Web-filtering is disconnected from the proxy service by the Service Pack 597.
- HaCluster incompatible with Cisco Webex meeting
- Artica did not perform the log rotation of the Load-balancer service.
- Unable to add a record on DNS Cache caused by the prio field.
- Modify settings in PostreSQL database did not restart the local service.
- Reverse-Proxy crashes on the Cluster client due to the bind network interface issue.
- Compiling websites take too long time when building all websites
- Reverse-Proxy WAF events are replicated when using reverse-proxy in cluster mode.
- Unable to search by ruleid or domains in WAF threats section.
- Enable to export the whole certificate database in Certficates Center.
- Recover the database when encounter "file is not a database" issue when importing a PFX certificate
- Remove serve-expired-client-timeout in DNS Cache service
- Crash on Web-filtering when receive connection error from Web-filtering error.
- some Internal HTTP requests are not whitelisted by the web-filtering engine.
- If there is no personal category to export, the cluster will replicate the whole PostgreSQL database.
- White-listing to authentication did not working on Proxy service caused to reversed ACls.
- Wrong checkbox in use Local Proxy on WebCopy
- Unable to define protocol in Filebeat configuration
- Missing SN.png,ERR_PROTOCOL_UNKNOWN, error-details.txt files when reloading proxy service.
- Whitelist issue with Web-filter service
- ressources/categorizeclass.so line 3478, in get_category_perso KeyError:
- K5start did not start in HaCluster method.
- Sometimes /etc/postfix/bad_recipients.db is not compiled in SMTP gateway
- Authentication issue when using plain text on a remote peer in the SMTP gateway ( see more information here )
- NameError: global name 'GET_INFO' is not defined when using categories cache on the proxy plugin.
- Whitelists are applied in the wrong format
- EOFError in ressources/categorizeclass.so when loading cache database
- Firewall rules are not flushed when modify proxy transparent ports
- The Shields did not deny detected threads.
- Process#012UnboundLocalError: local variable 'VIRTUAL_USER' referenced before assignment on The Shields Client
- Fix ThreddSrnObject instance have no attribute when using speed mode in The Shields
- catogoryclass.so crashes when privileges is not correctly set for the local cache.
- Artica did not resolv categories when host is not resolvable
- The Shields clients are not killed from memory
- The Shields Crashes when using "Speed Mode" in Connector.
- Unable to compile ACLs with Active Directory enabled since SP975
- False alarm on wrong configuration in Artica Statistics since SP975
- Unable to access to events system since SP975
- Unable to install Categories Cloud service.
- Artica watchdog is unable to uninstall The Shields Daemon.
- Fix: Security hole found by Jordan Miles
- DNS Load-balancer is not monitored by Artica.
- Artica did not understand OpenSSL version for Cipher configuration.
- Load-Balancer crashes caused by no items set in cache configuration.
- WCCP cannot be displayed in Community Edition
- HaCluster is not compatible with new version 2.2x branchs or above.
- Artica take care about the OpenSSL compiled with nginx for the Ciphers list on the reverse-proxy service.
- Sometimes the unicode.mapping is corrupted during complete reverse-proxy reconfiguration
- Warning during boot when enabling Bottleneck Bandwidth and RTT kernel feature.
- Web interface going crazy when displaying the SandBox connector section.
- False alarm on filedescriptors notifications.
- SQL Error on debian_packages table
- Missing jquery.peity.min.js from Service Pack 671
- bad addr or host: None (Name or service not known) on OpenSSH server caused by a wrong IP format
- Redirect HTTP connections to HTTPs connections did not take care about the listen interfaces defined in reverse-proxy.
- Unable to access to HotSpot sessions management with HotSpot Manager rights
- Bungled proxy configuration when using HotSpot service and Active Directory
- SMTP engine error when ssl is not configured.
- ACLs issues on the Universal Proxy service.
- Proxy acls checker will not longer claim of empty acls objects.
- Web-filtering connector - invalid literal for int() with base 10: none when using a none rule
- Web-filtering connector - NameError: global name WEBFILTER_RULE_NAME is not defined when using a none rule
- Filtering menu is displayed when only using SMTP service.
- Web-filtering connector: NameError: global name filename is not defined when writing threats
- Exception on the Web-filtering client if Web-filtering server return nothing.
- Artica Status Daemon crashes since SP975 ( see more information here )
- Preventing sometimes register a license cause loop in register processing.
- Unable to restore backuped PowerDNS data
- wrong characters added when insterting a new domain in PowerDNS.
- Duplicate domain in host when adding a new NS record in PowerDNS.
- Statistic collector of WAF events crashes and did not populate SQL tables.
- Unable to Activate Kerberos authentication when using the single Kerberos method
- Unable to start/restart OpenVPN service using the webconsole.
- DNS Firewall cannot start if there more than 2 DNS servers in default configuration.
- Wrong pattern in DNS Firewall listen address when using multiple network interfaces
- Wrong configuration on Artica Web console service since SP975
- Unable to save Proxy parents general parameters
- Do not use the proxy and Always use direct acls rules are not applied when using parent proxies.
- Some Web application Firewall whitelists make the reverse-proxy crashing.
- Too many files *.conn.err generated that loading the server
- Loop on SQL errors collector that perform a loop and turn to unstable server ( only if server encounter disk performances issues )
- e2label process take a loop and long time to process ( only if server encounter disk performances issues )
- Unable to change password of an LDAP member
- Privileges Allow Add Group or Allow Add user only can access to the web console.
- Unable to add rules in whitelist for Web Application firewall rule
- Disconnect memcache daemon stop/start script from systemd.
- Web Application firewall internal error did not deny accesses to web sites.
- Web Application firewall XML parsing error did not deny accesses to web sites.
- Unbound Array error in The Shields Client when using Web-filtering method.
- bound error on array on proxyport in The Shields Client.
- Wrong Status for StatsCom missing netcat-openbsd
- Error Run Clamav Updates pattern missing each 3 minutes.
- Fix icap error in logs Unknown syslog facility/priority
- parse_delay_pool_rates: Ignoring pool 0 not in 1 .. 2 in ACLs bandwidth
- Wrong URL compiled on the new Web-Filtering feature.
- Unable to display DNS events when DNS Cache service and the Proxy service are installed.
- Modify watchdog on DNS services in order to prevent false alarms and multiples DNS restarts.
- Default Firewall DNS redirectors are pointed with eDNS that has been refused by Public Google DNS.
- False alarms on the PostgreSQL watchdog monitor.
- Duplicate whitelisted unique id in Web Application Firewall
- Trust an item inside My Network did not restart Fail2ban for whitelisting
- Some Web Application Firewall rules in phase 1
- Proxy service did not use parents proxy when using load-balancing method.
- Overloaded system and low reloads when add more than 20 websites with Web Application Firewall.
- Whitelist apth from Web Application Firewall, break the reverse-proxy root.
- Too long time to compile sites in Web Application Firewall
- Proxy will not logging if there an acls that deny log with a disabled object.
- Artica did not take care about the bundle field act as Root CA for SSL Client verification
- Rebuild totally the client certificate procedure.
- Unable to start a transparent backend trough the HaCluster interface section.
- missing go-shield-server binary
- unbound-control[38287:0] fatal error: could not exec unbound: No such file or directory
- Unable to save weight in HaCluster
- Unable to migrate to Go Shields server.
- Logon page username field is limited to 20 characters
- Issues on Go shield server
- Language parameter is not restored with the new login design page.
- Sometimes the watchdog did not find the memcached PID number
- auto-generated proxy certificates are not parsed by Artica.
- ps_mem and percpu process consume load, change it to daemon.
- Artica enables The Shields reputation by default that is not required.
- Performances on Statistics Communicator. The daemon as been totally rebuilded. Redis server is no longer used.
- go-shield-server did not have chmod 755 after upgrading from 4.30 SP206
- FATAL: Bungled /etc/squid3/external_categorize.conf
- unable to replicate personal databases in cluster environment
- Unstable Google SafeSearch in DNS firewall
- Issue shields sends PASS, WITHILIST,.. to statistics
- Minor bugs fix in bounding
- Minor bugs fix in hotspot
- Sometimes the proxy access.log is freeze, a new watchdog is created.
- Unable to connect to the Active Directory with wizard and HaCluster.
- DNS Load-balancing for the Proxy service limit only 10 DNS queries per second.
- Daemon monior failed to start with Active Directory REST service in SSL mode
- DNS Load-balancing for Proxy was unstable caused by the eDNS.
- Unable to install/uninstall The Shields service.
- Unable to uninstall Web-Filtering feature using the widget.
- The Filtering service is not necessary in HaCluster environment
- Unable to move correctly destination proxies in Proxy.PAC rules.
- Missing informations in Admin Track events by syslog.
- Missing Admin Track notification in failed logon on the Web console
- Unable to restart Proxy-pac service.
- Proxy-pac service did not increment the connections counter
- False alarm on rsyslog software update notification caused by a wrong version calculation.
- HotSpot service is not correctly linked to the proxy after installation.
- Testing ldap connection failed on Active Directory class caused by ldap/ldaps format.
- Ticket 861, Web service did not start after SP975 (see more information here )
- Unable to create an encrypted Artica Snapshot.
- Unable to save Network restrictions in DNS Firewall.
- Cannot start DNS Load-balancing service for Proxy service
- 100% CPU of dstat process that sometimes parse large and old statistics files
- Zombies created by the go-exec daemon.
- Issue while getting OpenLDAP server version.
- Filedescriptors not correctly applied when using Proxy service v5x
- Remove the limitation of max 300 000 filedescriptors in proxy service.
- CVE-2022-37153 ( see more information here)
- Clamav Daemon cannot start because AppArmor block the unix socket creation.
- Proxy ICAP service cannot start because no available free inodes in /dev/shm
- Cannot display Web filtering error page with error code 500 after Service Pack 887
- Some AppArmor events as false alarms are displayed when executing ntpd
- Using regex pattern in Do not cache proxy ACLS in order to avoid conflicts
- Add Kerberos authentication and HotSpot network make the proxy service unavailable.
- New login page have a password limited to 16 characters.
- Realtime SMTP Monitor did not parse UTF-8 subjects.
- Realtime SMTP Monitor table did not take care of column width.
- Realtime SMTP Monitor installation did not install syslog configuration.
- Unable to click on "investigate" tab after SP975
- Restarting Proxy service did not apply file descriptors especially on Proxy v5.x
- Reconfiguring network using the Unix console did not rebuild OpenSSH server service.
- Realtime SMTP Monitor did not display full time.
- Removed PowerDNS menus since last services pack.
- Search engine in DNS records did not work as expected.
- Unable to send SMTP notification if no authentication is defined in settings
- Sometimes system upgrade failed with /etc/group.lock /etc/gshadow.lock /etc/passwd.lock
- Unable to displays Active Directory members and groups after update to latests service packs.
- Unable to start monit - Artica did not pay attention of the local ports conflicts
- Sometimes Artica did not detects disks and warn that disk are not linked to boot loader.
- ArticaStats did not understand events sent by a Proxy with multiple processors.
- Conflict with systemd some "start-stop-daemon process" using 100% CPU.
- Conflict with systemd sometimes snmpd is started and took 100% CPU.
- Test Categorization feature and Re-Categorize query the Shield Server
- Auth logs deamon memory crashes after debian updates, moving code to go deamon.
- Local DNS Cache service did not work when the IP of the server is a public IP address.
- Advanced drop-down lists are not disabled when form is disabled.
- auth-log service cannot start.
- Go-shield daemon cannot start when no active directory defined
- auth-log service and letsencrypt-plugin cannot start.
- Go-shield server creash when usign only LDAP server
- Go-Shield server did not allow Gold License.
- auth-log is a part of openSSH server, remove/install it automatically when needed.
- Sometimes cluster packages are not owned for the Web console service.
- Daemon monitor crashes when the 2 network interfaces have the watchdog enabled.
- Go-exec Daemon have some issues while executing auth-log daemon.
- List of objects section did not understand Group of Objects acl object.
- Remove existing /bin/go-* binaries and moved all the services to /usr/bin
- Minor bugs in kibana, elastisearch and filebeat
- Buttons of ACL disapears when using Group of rules in the Proxy ACL section.
- Artica did not take care about no port with SSL used and the defined certificate that causing issues en reverse-proxy.
- Latest Load-balancer version is not compatible with the Load-balancing for parent proxies ( see more information here )
- Unable to to select an automount connection ( see more information here )
- Reverse-proxy understand that only setting a certificate will make all ports using SSL.
- HotSpot did not parse HotSpot allowed networks.
- Cannot save Only executed by schedule option in Legal logs section
- Cannot save Legal logs options if a crypt password is not defined.
- Disable a reversed-website did not affect the main daemon.
- Unable to restart openSSH daemon using the Web-console
- Artica system events are not parsed and added into database. ( http://bugs.articatech.com/show_bug.cgi?id=333 )
- Unable to upload the kerberos ticket in haCluster.
- Reset parameters did not clean all settings in HaCluster.
- Restarting OPenSSH service using the web console report failed as the service is correctly restarted.
- Sometimes logs cleaning generated by the Syslog engine is not performed, adding a task to force this operation every day at 05:30
- Refresh Network rule page display a blank page.
- Code cleaning in network class
- kernel.hostname and kernel.domainname are not correctly converted when changing the system hostname
- Filtering service generates error 004 when using Proxy version 4.x instead proxy service 5.x
- 25 improved securities default parameters as been added.
- SSL rules are always stamped as inactive that is false.
- Incorrect proxy configuration on HotSpotNets acl where no HotSpot network has been defined
- Panic: interface conversion: interface {} is string, not int for the Proxy LDAP Group plugin
- Panic: interface conversion: interface {} is string, not int for the Filtering service
- Minor issues for ufdbguards engine for the Filtering service
- Remove /var/log/rsyslog.error.log that using too much disk space Filedecriptor > 4096
- The local DNS Cache service make the network failed to create the default gateway
- Artica cluster slave did not apply file descriptors correctly if it was defined by the master server.
- Typo in proxy acls that generates a bungled configuration on --------FTP string.
- unbable to configure DNS Firewall and DNS Cache service.
- Wrong information made by the Web console on the used DNS by the proxy service.
- double-check on the local DNS cache service about the use of 127.0.0.1 and double entries.
- Somtimes, formatted text area fields do not display the content until the user clicks inside the text box
- k5start did not running when using NTLM method - wrong monitored keytab
- Unable to configure settings on the NTLM watchdog.
- Reconfigure ICAP service options disable the use of Antivirus.
- DNS Firewall cannot start caused by old instances of DNS Cache server - kill old instances before start service.
- Sometimes, the right-top side-bar cannot be displayed.
- clamav.artica.center: Remote HTTP Service Unavailable: 405 Not Allowed ( see more information here )
- 530 5.7.0 Must issue a STARTTLS command first on a remote relay that enforce SMTP TLS in Artica SMTP
- Wrong and garbage records created when creating a new domain in PowerDNS edition.
- Creating a new DNS domain did not close the windows Popup.
- Creating a new DNS domain did not refresh the table.
- Remote path backend in Reverse-proxy did not take care about the root path
ADD
- Possibility to Add a Caching Active Directory records From an Active Directory Connection ( see more information here )
- Dedicated menu console for SSH service.( see more information here )
- Monitoring and compatibility of Microsoft Hyper-V virtualization.
- Security Reputation Network beta 1 (see more information here )
- Possibility to list all open ports on the Artica server ( see more information here )
- Possibility to display Proxy statistics daily disk usage ( see more information here )
- Dedicated section for the log files and statistics retentions ( see more information here )
- Possibility to import or export Proxy statistics database ( see more information here )
- Possibility to manually remove statistics data by retention. ( see more information here )
- Possibility to display events about log files cleaning and retention data cleaning.
- Possibility to exclude reverse PTR resolutions and queries to specific domains in DNS statistics.
- Possibility to install/uninstall userspace ARP daemon
- New wizard "Gateway mode" to allows installing Artica on limited hardware ( see more information here )
- Watchdog on cgroups php limitation.
- Possibility to created a simplified and quick DHCP service by Network interface ( see more information here )
- Possibility to bridge network interfaces using Proxy ARP method ( see more information here )
- Possibility to add multiple network addresses in SNMPv2 network limitation.
- New feature Dynamic routing as OSPF protocol support ( see more information here )
- move URLHaus and NoTrack feature to the SRN feature.
- Possibility to global exclude domains from the use of any parent proxies. ( see more information here )
- 2FA authentication for both SSH service and Artica Web console. ( see more information here )
- Double verification for clone detection.
- function that scan suspcious files for malwares scanning on the ArticaBox itself.
- Possibility to send Proxy realtime events to several syslog servers ( see more information here )
- Beta of TailScale VPN feature.
- Beta of Synology backup client.
- Support of Synology Active Backup for Business client ( see more information here )
- New Proxy ACLs Checker ( see more information here )
- Possibility to change the name of the certificate in the certificate center section.
- Possibility to modify the TCP Keepalive Timeout on proxy port ( see more information here )
- Possibility to link Artica Proxy to Kaspersky Web traffic Security ( see more information here )
- Possibility to switch to Proxy version 5.x or 4.x branch
- Display ACLs rule names in realtime proxy events ( see more information here )
- Notification of new memcached version on the dashboard.
- New memcached v1.6.10 available for both Debian 9 and Debian 10
- New Squid Cache v5.1 available for both Debian 9 and Debian 10
- Automatic install of new Debian package unrar and p7zip
- More statistics for The Shields graphs section.
- Possibility to perform fast stop,start,restart proxy service in proxy status section
- Release of Kasperksy SandBox integration ( see more information here )
- More description / Information on Host Forgery issue ( see more information here )
- The Shields can be switched to be an object of ACLS rule ( see more information here )
- Improve Proxy SSL initialize task
- Ensure compatibility with the new version 9.x of the RDS Proxy, older versions will be not compatible.
- Community Artica version on the RDS proxy service will limited to maximum simultaneous connections.
- Possibility to quickly connect to the RDP target ( see more information here )
- Possibility to turn the RDP service and the Authenticator in debug mode.
- Possibility to disable the RDS Proxy login screen ( see more information here )
- The Shields is upgraded to 10.0 version this new version stores more than 25 000 trackers sites in local cache.
- Possibility to see more information here that passed trough the bandwith limitation ( see https://wiki.articatech.com/proxy-service/monitoring/monitor-bandwidth-rules )
- Now RDS Proxy service is able to query directly Active Directory DNS in the case of the Artica server did not have the target Active Directory as primary DNS server
- Possibility to create a bandwidth rule without any limitation in proxy bandwidth limitation acls
- Top-right notification on new RDS Proxy service version.
- Possibility to perosonalize RDS proxy error messages.
- Status in RDS Proxy status page
- DNS Firewall feature alpha 1
- DNS Firewall Feature alpha 2
- Possibility to launch installation of mandatories modules in status
- Failover support.
- DNS Firewall Feature Beta 1
- DNS Monitoring tool for better help proxy performance DNS settings.
- Support of use-caps-for-id in DNS Cache service. ( Feature called Increased DNS Forgery Resistance )
- DNS Firewall feature RC1
- Possibility to download the "The Shields" events logfile
- Possibility to set a default page inside a reverse-proxy site ( see more information here )
- Rebuild the ITCharter internal engine for better performances
- ITCharter is now Cluster aware
- Handle k5start error getting credentials: Preauthentication failed in syslog
- ITCharter Active Directory Alpha1
- ITCharter with Active Directory Filter feature release candidate 1
- Whitelisted adservice.google.* in The Shields when allowing Google Advertising option.
- Specials checks on DNS Quality servers when using Artica Categories or The Shields features.
- Possibility to disable the Artica resolve operation when using Kerberos authentication ( see more information here )
- Turn Kerberos method into emergency mode if "Local hostname could not be determined. Please specify the service principal" is discovered
- New Reputation service engine "CGuard" inside The Shields and Categories service.
- New testing procedure for Kerberos Authentication method
- Increase performances of whitelisting and The Shields plugins
- Automatic updates of Artica proxy plugin especially for MacToUid
- Possibility to send syslog daemon events to remote syslog server.
- Merge The Shields with external_acl_first for better performances.
- Possibility to define Authentication methods preferences ( see more information here )
- Possibility to stress any proxy server in order to see more information here and evaluate the pre production ( see https://wiki.articatech.com/en/proxy-service/tuning/stress-your-proxy-server )
- Performances settings for proxy external modules.
- New "Centralized" The Shield beta 1
- New "Centralized" The Shield Release candidate 1
- The Shields use it's own memory cache management for better performances.
- Support of proxy version 5.2
- Possibility to dynamically flush the shield cache.
- Possibility to find requests in the legals logs section. ( see more information here )
- Status of cached items in The Shields.
- Improve cache reset action in the Shields.
- New kerberos ticket renewal procedure that running at 04:45 each day
- Performances charts for the proxy memory usage ( see more information here )
- Monitoring function for the proxy filedescriptors value
- Possibility to generate a support-tool for the DHCP service ( see more information here )
- Possibility to export the generated DHCP configuration file that cause issue on DHCP service
- Central SMTP notifications beta 1
- Possibility to send all syslog events to a remote syslog server.
- Central SMTP notifications beta 2
- Central SMTP notification Release Candidate 1
- New watchdog on expired certificate issue.
- Possibility to set a VLAN Interface for the DHCP server listen address.
- Watchdog on proxy service memory usage ( see more information here )
- Possibility to create a real load-balancing with parents proxies. ( see more information here )
- Possibility to manually query the Shields server ( see more information here )
- Possibility to enable Proxy service to debug level 5
- More verifications when installing ClamAV SecuriteInfo databases.
- Disable Proxy update notification if the available major proxy version is different than the installed proxy version.
- Extract cron daemon events from syslog to /var/log/cron.log
- Artica is now able to categorize remote public IP addresses especially when running artica as transparent proxy.
- Performance statistics such as CPU use in percent, memory usage, Load, file descriptors and connections Tracking.
- Auto-installation of performances statistics.
- Local Virus detection of BV:Miner-GZ [Drp]
- Possibility to set a personal category act as a global whitelist ( see more information here )
- Number of proxy members and statistics of the proxy number of members.
- Watchdog on specials characters when inserting proxy requests and PostreSQL database
- Possibility to connect the HaCluster to the Active Directory using a wizard.
- If the Load-balancer renew kerberos certificate, the nodes will be updated automatically.
- Possibility to enable a DHCP service for a VLAN interface ( see more information here )
- DNS Firewall using the same proxy method to query The Shields server.
- DNS Firewall events by default.
- DNS Firewall write all events inside PostgreSQL database
- Possibility to query DNS Firewall events saved in PostreSQL database ( see more information here )
- Possibility to perform apply operation in DNS firewall rules section.
- Statistics of the DNS Firewall about the number of queries and the number of users.
- Possibility to filter google authentication by domain ( see more information here )
- Monitor proxy behavior with an external URL ( see more information here )
- Possibility to import a PKCS7 certificate ( see more information here )
- Memory cache for the Shields Client.
- Possibility to define the value of net.core.somaxconn in the Shields Client.
- Internal Cache in the Shields.
- The Shield Emergency mode remove completly The Shields in proxy service.
- Possibility to use only the Shield Client as categorization.
- Count the number of cached items.
- Status of Proxy Parent rules in order to see more information here there are really applied to the system.
- multi-process and multi-threads engines for The Shields Client and Daemon.
- More errors explains in proxy requests events ( added to SP206 in HotFix )
- Possibility to remove an header with the reverse-proxy ( see more information here )
- Possibility do duplicate headers rules in the reverse-proxy service ( see more information here )
- Possibility to upgrade TailScale Service using the system update package manager ( see more information here )
- Possibility to duplicate gzip compression rules in reverse-proxy.
- Possibility to install the WAF for the reverse-proxy in the features section.
- Possibility to quick add computers items in events, leases and requests tables.
- New section that allows creating rules to remove HTTP headers in the reverse-proxy service
- Possibility to set TheSields cache database removal task.
- Beta 1 merging The Shields and Web-filtering service.
- Possibility to disable the SSL cache.( see more information here )
- Possibility to not display proxy error pages using SSL decryption. ( see more information here )
- Possibility to remove the Kibana and ElasticSearch softwares from the disk ( see more information here )
- New "Expert mode" feature for PowerDNS system ( see more information here )
- The Shields with "Only categorization" use dirdectly cloud DNS servers
- K5Start daemon is detached from syslog for better troubleshooting.
- Possibility to use local officials categories and increase speed for categories ACLs. ( see more information here )
- Possibility to tune timeouts for HaCluster service ( see more information here )
- 10% of Portuguese translation.
- Possibility to disable WAF rules globally ( see more information here )
- TheShields Client us fully multi-threads
- Possibility to use the Artica Cloud categories Service - same Artica 4.30 SP206 method ( see more information here )
- WebCopy feature on Reverse-Proxy beta 1
- Possibility to whitelist rules from the Web Application Firewall
- 20% of the Portuguese translation.
- Possibility to schedule the WebCopy task for each website.
- Notification on the top-right that claim if the Web-Filtering is disconnected from the proxy service.
- Webfilter policies can bypass all the web-filtering policies including The Shields too.
- Possibility to use a remote PostgreSQL server
- Possibility to import Web-Filtering databases and settings from an old Artica 3.x snapshot container.
- WebCopy general section.
- Quick links in routing tables rules
- Possibility to view and send to kernel events to remote syslog.
- Possibility to synchronize Web Application Firewall default rules
- Possibility to delete Web Application Firewall threats by rule ID
- PostgreSQL database Maintenance operation ( vacccum and reindex ) is now only executed in non-production time.
- Watchdog to ensure that Web-filtering client is correcly enabled on proxy.
- Possibility to return back to the Official Artica version - without any service pack
- Whitelisted Web Application Firewall rules are no longer parsed for statistics.
- Possibility to purge Web application Firewall database with its own parameters - default 7 days.
- Possibility to compile Web application firewall rules inside the detected threads section.
- New Macro to whitelist Windows Updates sites.
- Possibility to use a remote Categories Cache server.
- Improve performance of the categorization plugin
- Possibility to balance network on different proxies on the proxy.pac service. ( see more information here )
- new tests functions to ensure that the Web API rest service is still alive
- watchdog function that ensure monit startup script is not corrupted.
- Possbility to reset the uuid inside the system information section and license section.
- Improve performance on Web-filtering connector
- Improve The Shields performance.
- The Shields take care of the availability of queried domain before query the Artica cloud service.
- function that eliminates bad patterns "*." used in personal categories.
- Compatibilities of the new php-fpm versions.
- Possibilities to add mandatrories tokens in Web-filtering error pages.
- Possibilities to send Webfiltering threats to a remote syslog server
- New daemon and increase performance when using filtering service as a central server.
- Increase threads performances on the Web-filtering client / ACL module
- Integrating ITCharter into the new The Shields engine.
- Automatic affect to "reaffected" category for not resolvable hosts and not categorized hosts
- The Shields modules are only loaded if needed in order to reduce memory usage
- Client-Side Certificate Authentication in reverse proxy ( see more information here )
- New widget for DNS Cache service in dashboard.
- DNS Firewall is now New The Shields architecture aware.
- All proxy error pages are now embeeded in the same page.
- Explanation when no data can generates graph in the DNS Firewall status.
- Version of the DNS Firewall.
- PowerDNS 4.6.0, DNS Load-balancer 1.7.0
- Possibility to send by remote syslog DNS Load-balancer events. ( see more information here )
- Possibility to setup cache in DNS Load-balancer ACLS ( see more information here )
- Possibility to enforce host resolution in the DNS Load-balancer service ( see more information here )
- Possibility to force using a specific backend accordind to clients network in HaCluster ( see more information here )
- Possibility to display DNS Load-balancer events in real-time. ( see more information here )
- WebSockets support in reverse-proxy edition. ( see more information here )
- HTTP Proxy DNS load-balancing mode beta 1
- HTTP Proxy DNS load-balancing release ( see more information here )
- Starting Dashboard for the DNS Load-balancer service.
- Help about inactive label in Proxy parent acl rule.
- Possibility to upgrade the DNS Load-balancer software ( see more information here )
- Possibility to display Load-balanced backends status ( see more information here )
- Spanish language translated to 20%.
- Watchdog when proxy claim connection timed out with clients.
- Tiny design Graphs on dashboard and for some services status
- EDNS support on the DNS load-balancing service.
- Detail error when WAF threats did not display any information.
- Watchdog on ERROR: Collapsed forwarding queue overflow for kid1 at 1024 items proxy cache service.
- Watchdog on error assertion failed: store_client.cc:214: "entry->hasDisk() && !entry->swapoutFailed() on proxy cache service
- Possibility to forge multiple IP addresses in DNS Load-balancer ( see more information here )
- Possibility to masquerade VLAN interfaces ( see more information here )
- Posibility to balance DNS-Over-HTTPs downstream servers on the DNS Load-balancing service. ( see more information here )
- Dedicated section for Proxy multiple CPUs configuration.
- Beta version of ACL categories for the DNS Load-balancing service.
- Possibility to add categories checking in DNS Load-balancer ACLs ( see more information here )
- Possibility to authenticate senders via Active Directory in Artica SMTP edition ( see more information here )
- Possibility to create an ACL based on Web-filtering service. ( see more information here )
- Possibility to create an ACL based on DNS Query type ( see more information here )
- Possibility to use The Shields in load-balancing acls ( see more information here )
- Possibility to check countries of Client IP address in load-balancing ( see more information here )
- More information in DNS Cache service events
- New tack that clean bad records in PowerDNS database
- O-Day patterns for blocking most malicious sites ( see more information here )
- Compatibility with OpenVPN in PFSense ( see more information here )
- PHP 7.4 upgrade support. ( see more information here )
- Dedicated section for Proxy filedescriptors parameter
- First Beta version of the "Go Shields Service"
- DDOS Protection on selected interfaces ( see more information here )
- Displays how many times the network cable was unplugged ( see more information here )
- Possibility to remove ClamAV from the system ( see more information here )
- New design interface for the logon page.
- Size Limitation on Web Application firewall events.
- Web application firewall reports storage can be defined by threat level.
- Improve design of error generated when attempting to a wrong record in PowerDNS system.
- Fake php compatibility between php 7.3 and php 7.4
- Possibility to display all Web Application Firewall whitelisted rules.
- Possibility to add a description on Artica snapshots
- Realtime monitor for the Web Application Firewall requests. ( see more information here )
- Possibility to display all Web Application Firewall whitelisted rules ( see more information here )
- Possibility to remove or rotate Web application Firewall real-time accesses log ( see more information here )
- Possibility to schedule an HaCluster service reload task ( defined to each 3h by default )
- Possibility to create whitelist Web Application Firewall rules based on User-Agent header ( see more information here )
- Possibility to download stored reports from the Web Application Firewall realtime threads.
- Possibility to disable or enable Web application firewall in one click from the Web sites list.
- Possibility to directly forge multiple records and multiple domains inside a rule without need to create objects ( see more information here )
- Possibility to bond network interfaces ( see more information here )
- Multipart request body failed strict validation in Web Application firewall is now disabled.
- Phase 1 and 2 in Web Application Firewall rules
- AdminTrack feature ( see more information here )
- New Watchdog that testing the connectivity with backends proxy from the HaCluster service.
- Possibility to turn the Proxy in Emergency Mode in Proxy service Status
- PostGreSQL logs in the support tool.
- Possibility to force restarting proxy service after log rotation.
- Possibility to export built configuration of a reversed web site ( see more information here )
- Possibility to backup reports and specify a WAF behavior for each website ( see more information here )
- Possibility to allow HTTP protocol methods in Web Application Firewall. ( see more information here )
- Possibility to compile Web Application Firewall rules from the Whitelist section.
- Possibility to enable/disable Web Application Firewall whitelist rule.
- Dedicated section for Client-Side Certificate in Reverse-Proxy
- Possibility to set a password for PFX Client-Side Certificate in Reverse-Proxy
- Possibility to download Client certificates in PEM and TEXT format in Reverse-Proxy
- Servers Certificates and Clients certificates in Reverse-Proxy follow iOS SSL Certificates rules
- Double-verification of reconfiguring proxy during reboot option.
- Possibility to change the Connections Tracking max value in HaCluster
- When installing HaCluster, some features are automatically uninstalled (Firewall, DHCP.. ) and removed from feature list
- Possibility to see more information here metrics from the remote proxies using SNMP with HaCluster.
- Improve load-balancing transparent service in HaCluster.
- HaCluster clients proxies now sends metrics to the HaCluster load-balancer
- HaCluster now send checks by parsing remote proxies HTTP status page.
- New design for proxy DNS settings
- Possibility to switch between new Extended Proxy Connector and Native Proxy Connector.
- More information about the Filtering Go service network availability
- Interface that pay attention that the local hostname can be resolved.
- Display in the notification that some proxy ports are unavailable.
- Possibility to quick add host to be resolved when using DNS Firewall.
- German language support for the Web interface
- possibility to display compiled rules in DNS Firewall.
- Possibility to set specific Web page error address for The Shields detections.
- Double-Quotes are not supported when set the Manager password: Add a watchdog on this behavior
- Possibility to deny replicating Artica web console parameters in cluster system.
- Possibility to generate a CSR certificate based on an already generated certificate.
- DNS Firewall and DNS Cache service are statistics appliance compliance.
- SafeSearch for brave.com search engine.
- Syslog support for new go modules
- hotspot / itchart support for squid (url_rewrite)
- Categorization / shields dns metrics
- Feature to log notcategorized websites
- Possibility to increase / decrease bigcache shards trounght gui
- Possibility to import / export network routing rules (see more information here )
- Possibility to reconfigure only one server in HaCluster Load-balancing.
- Possibility to display events of an HaCluster backend.
- Notification when an new HaCluster main software is available.
- Notification when an new Dameon monitor software is available.
- Notification when an new Dameon monitor software is available.
- Possibility to add specific DNS rules for the DNS Load-balancing for the Proxy service feature.
- possibility to add whitelisted domains for the limit senders domain feature ( see more information here )
- Possibility to tune the Max requests per seconds in DNS Firewall
- Artica take care of duplicated SPN when using the wizard in HaCluster.
- Possibility to display the Kerberos Ticket in HaClutser environment
- DNS Load-balancer for proxy service allow all internal interfaces to query the service.
- Metrics For the HaCluster Load-balancer.
- Warning if HaCluster is connected to Proxy v4.x, add a notification to upgrade to 5.x
- Ensure that /lib/squid3/go-shield-connector is correctly installed after upgrading.
- Proxy.pac service doesn't require an Entreprise License
- Possibility to enable/disable a destination proxy in proxy.pac rules.
- Possibility to restrict routing only to a set of domains in Artica SMTP ( see more information here )
- Spkunk compatibilities for Administrators accesses to the Artica Web Console. ( see more information here )
- Possibility to list privileges affected by Administrators using Active Directory
- Status for mandatories HotSpot required parameters
- New HotSpot verification in status section of the linked Artica Connector
- Go Shield Server performance improvements.
- Files Descriptors support for Go Shield Server
- Possibility to disable metrics in Go Shield Server
- Go Shield is now started by Go Exec instead PHP shell_exec.
- Possibility to change language from the top menu.
- Left menu of proxy connector is now always displayed.
- CRON and Proxy service fully compatible with go-exec daemon.
- Possibility to use Wan Proxy Compressor using only SOCKS ( see more information here )
- Function that detects Zombies processes.
- Go-fork to avoid zombies.
- multiple language translations
- Introducing LDAP Cluster.
- OpenLDAP replication MASTER - SLAVE Support ( see more information here )
- On some commands, Artica took hash of the configuration directory in order to avoid proxy service reloads for nothing.
- Possibility to disable realtime proxy access logs on Proxy backend in HaCluster configuration ( see more information here )
- New feature for haCluster: HaCluster Client ( see more information here )
- Improve ClamAV updates processes and events.
- Possibility to IPv4 and IPv6 traffic performance. ( see more information here )
- New function that tests the availability of the ClamAV repository before starting the update task.
- Possiblity to create Groups of objects in Proxy ACLs. ( see more information here )
- Rebuild and change Interface for better understanding of the Firewall For Web services ( see more information here )
- Possibility to not replicate Active Directory parameters in Cluster mode.
- Possibility to send SMTP events to a remote syslog system.
- Enforce session timeout ( see more information here )
- RBAC enforcement.
- New RBAC privilege "Database administrator" ( see more information here )
- Upgrade Jquery framework to 3.6.0
- Build an entire SMTP service for managing SMTP notifications and Proxy statistics PDF reports.
- OpenVPN 2.6 on repository
- New realtime monitor for Artica SMTP appliance ( see more information here )
- Possibility to export Artica-milter events to a log file.
- Possibility to export Artica Milter events in CSV format
- IDS engine improvements
- New note on Proxy v5x acl for the last checked rule.
- Default the system will use local installed DNS service.
- Possibility to create a Debian local Mirror ( see more information here )
- Possibility to link Debian local mirror service with the reverse-proxy ( see more information here )
- Remove some Microsoft sites in the default Proxy whitelisting and add an option to add it if needed.
- Possibility to start the proxy service Daemon by restoring last configuation snapshot before.
- Bulk API for the Shield Server - curl 127.0.0.1:3333/bulk-categories/domain1,domain2,domain3...
- Bulk importation on ACL object Destination domain ( see more information here )
- Possibility to generate a Let's Encrypt Certificate for Artica For Wordpress edition. ( see more information here )
- New tool for Proxy Network analysis ( see more information here )
- Possibility to encrypt Legal logs backup ( see more information here )
- Possibility to export/import proxy ACLs ( see more information here )
- Critical Notification if the go-shield server is started by the watchdog after a crash.
- Filesdescriptors support to elasticsearch
- Updated the filebeat pipeline to support squid users domain name, DOMAIN/USER
- Possibility to setup a DoH service on the DNS Firewall edition ( see more information here )
- New feature Filesystem monitoring service ( see more information here )
- Possibility to send proxy.pac script according the requested domain name ( see more information here )
- Information about the use of reverse-proxy and proxy-pac feature.
- Monitoring of /var/log/rsyslog.error.log file.
- Enable web pages optimization on-the-fly on the reverse Proxy ( see more information here )
- Possibility to enforce query the CGuard reputation service for websites categorization ( see more information here )
- Improve design and feature of the Load-balancing for parent proxies ( see more information here )
- Revive the Reverse Proxy For MS Exchange project (see more information here )
- Possibility to add CGuard categories in ACLs ( see more information here )
- Possibility to activate the Web Application Firewall inside the Web firewall section ( see more information here )
- Possibility to disable "hardcoded" categories ( see more information here )
- Memory monitor of max 2100 MB for the Go shield service.
- New dedicated service "Web Error page service" beta stage ( see more information here )
- New more fastest plugins for checking Active Directory groups
- New watchdog executed each 5 minutes to ensure that HaCluster logs file did not exceed the maximum value.
- Possibility to Restore a Wordpress duplicator backup container ( see more information here )
- Proxy LDAP Group Plugin: Now first read KerbAuthInfos to get AD infos and then ActiveDirectoryConnections for child domains
- Proxy LDAP Group Plugin: Added support for ACL with multiple AD groups.
- Proxy LDAP Group Plugin: Add support for ldap.escape filter
- XSS Protection on the Web Error page service
- Possibility to turn the global proxy configuration into read-only mode ( see more information here )
- Hacluster clients reports now the Artica Version.
- Possibility to adjust Kerberos encryption types on HaCluster ( see more information here )
- HaCluster clients sends Artica full version to HaCluster Load-balancer.
- Possibility to turn in Debug mode the Web Error page service.
- Possibility to use the web page service using ACLs ( see more information here )
- SSL decryption whitelists rules and SSL encryption rules are now displayed in the realtime monitor ( see more information here )
- By default, SSL stream to RFC local IPs will be not decrypted by the proxy.
- Complete modification and improvement of the Error Page Service ( see more information here )
- Possibility to whitelisting SSL decryption using the remote SSL certificate fingerprint ( see more information here )
- Improve the SSL Certificate fingerprint acl object ( see more information here )
- Improve FTP service web interface ( see more information here )
- Top-right notification to notify apply network configuration if network as changed.
- New feature Closing the session on Artica Web console by inactivity ( see more information here )
- New watchdog that ensures the local hostname is added inside the system hosts table.
- New Active Directory NTLM watchdog settings for Automatic emergency ( see more information here )
- Possibility to send NTLM watchdog events to remote syslog server ( see more information here )
- Active Directory Emergency is simplified, instead of rebuild the proxy configuration without Active Directory objetcs, it creates an "allow all" rule on the top of rules.
- Possibility to create a category service fo query personal categories remotely ( see more information here )
- Possibility to display and remove cached records in DNS Firewall service ( see more information here )
- Possibility to populate personal categories with external sources ( see more information here )
- Compliance between categories service and DNS Firewall
- Possibility to search inside events generated for personal categories, categories service and categories updates ( see more information here )
- Filtering service service was automatically updated.
- Added support for LDAPS for the Proxy LDAP Group plugin
- Close AD conns after bind complete for the Proxy LDAP Group plugin
- Timeouts for connection and ldap search - The timeout values can be defined in webconsole for the Proxy LDAP Group plugin
- Support for LDAPS for the Filtering service
- Close AD conns after bind complete for the Filtering service
- Timeouts for connection and ldap search (the timeout values can be defined in webconsole) for the Filtering service
- Integration with new categories service for the Filtering service
- ITChart support for child domains for the Filtering service
- New local DNS cache service to serve Artica local services ( see more information here )
- Wazhu manager support ( see more information here )
- New real-time requests monitor for reverse-proxy ( see more information here )
- Possibility to deny incoming connections using the Web firewall ( see more information here )
- Possibility to deny incoming connections in the Web Firewall using the real-time requests monitor ( see more information here )
- Red label on the reverse-proxy websites list if the local configuration is not saved on disk.
- Cybercrime IP feeds feature for Web firewall ( see more information here )
- WebSockets support using proxy version 5.x - need to reconfigure to make it in production mode.
- Possibility to use the local DNS cache service with the DNS Firewall or the DNS Cache ( see more information here )
- Display an error when the local configuration file si not builded using Artica For Wordpress Edition.
- double check on clustering the reverse-proxy service.
- Possibility to remove Backuped Service Packs.
- New statistics on Proxy DNS queries engine.
- New feature, possibility to reverse proxy in paths ( see more information here )
- New feature, possibility to create replace rules in paths ( see more information here )
- Possibility to modify the Web error page for the ICAP proxy antivirus ( see more information here )
- ICAP Policies that allow to create whitelists for ICAP protocol ( see more information here )
- watchdogs in order to restart local Proxy ICAP service only if needed.
- writing to /var/log/activedirectory.log all bind failed for troubleshooting
- More options on the SSH service in order to enforce SSH security ( see more information here )
- ICAP service Listen IP address is now defined by listen Interface instead of hardcoded IP address.
- Possibility to define Load-balancing health-check parameters for the DNS Firewall ( see more information here )
- ICAP HTTP Security service status widget on the dashboard when using only ICAP HTTP Security service on the appliance
- New tool to test ICAP detection by uploading a sample.( see more information here )
- Possibility to send by syslog Proxy Antivirus ICAP detections ( see more information here )
- New Web-filtering engine v1.0.60
- Add support fo NRDs category ( see more information here )
- Improve categoritations speed
- Go Shield File Watcher 1.0.2
- HotSpot rev 4 beta 1
- Support of new PowerDNS 4.7.2 version support
- New version of DNS Firewall version 1.7.3
- New notification bell when there is a new DNS Firewall version available.
- Support of record type ALIAS when using PowerDNS ( see more information here )
- Possibility to repair PowerDNS database ( see more information here )
- HotSpot rev 4 beta 2 ( see more information here )
- HotSpot rev 5 RC1.
MOVE
- Proxy SSL cache directory to /etc/squid3 for more stability
- PDF Statistics reports are now sent via Central SMTP notifications
- Change the support creation tool to the new support system. ( see more information here )
- ITCharters are moved into The Shields service.
UPDATE
- Updating repositories for C-ICAP 5.0.9, Haproxy 2.4.4, Clamav 0.104.0
- Updating repositories for ntopng 5.1, monit 5.29, netdata 1.31
- Create a cloud ArticaTech dedicated ClamAV repository. ( see more information here )
- Debian apt-get error APT repository changes its Suite value from X to Y: This must be accepted explicitly before updates for this repository can be applied
- Proxy version 4.17 available on repository.
- New version of memcached 1.6.12 for Debian 10 in repository
- Available PowerDNS 4.5.2 in Cloud repository
- Notification when a new PowerDNS version is available in the Artica cloud repository
- Memcached 1.6.13 to updates repositories.
- Netdata 1.32.1 to updates repositories.
- ClamAV 0.104.2 to updates repositories.
- Proxy cache version 5.4 in repository
- Load-balancer version 2.5.2 in repository
- Haproxy v2.5.4 in Artica repository
- Update SSH reverse-proxy bastion to 2.0.2 to repository for Debian 10
- MemCached 1.6.14 to repository for Debian 10.
- Monit 5.31.0 to repository for Debian 10.
- NetData 1.33.1 to repository for Debian 10.
- DNS Cache service (unbound) version 1.15.0 in repositories for Debian 9 and Debian 10
- PowerDNS 4.6.1 in repositories for Debian 10
- Load-balancing service 2.5.5 in repositories for Debian 10
- PowerDNS service 4.6.2 in repositories for Debian 10
- Proxy Service 5.5 in repositories for Debian 10
- Memcached service 1.6.15 in repositories for Debian 10
- Netdata service 1.34.0 in repositories for Debian 10
- DNS Firewall version 1.7.1 in repositories for Debian 10
- Siege software to 4.1.3 version.
- Filtering Go service to 1.0.19
- Filtering Go service to 1.0.20
- Filtering Go service to 1.0.22
- Filtering Go service to 1.0.23
- Load-balancer engine v2.6.0 to public repository
- DNS Cache service 1.16.0 to public repository
- Filtering Go service to 1.0.27
- Advanced Monitoring service 1.35.0
- 1.21.4.1 reverse-proxy version on Debian 9
- Syslog Server version 8.2208.0 on repository for Debian 9 and Debian 10
- DNS Firewall version 1.7.2 on the repository server.
- Go shield server to 1.0.31
- ClamaAV 0.105.0, C-ICAP 0.5.10 in repositories.
- go-exec to 1.0.8
- ArticaStats to 1.2.4
- Failover service 2.2.7 version to repositories.
- IDS Engine to 6.0.6 version to repositories.
- MemCached daemon 1.6.17 to repositories.
- Upgrade Shield Server to v1.0.36
- Go-Exec to v1.0.9, this new version introduces compliance with systemd
- NTOPNG to v5.5.220909 to repositories
- go-shield server to 1.0.37
- exec.go.exec.php and exec.go.shields.server.php to handle new binary dir
- exec.nighly.php to force run exec.go.shields.server.php to correct recreate the service files after update
- exec.installv2.php to force recreate the elasticseatch and filebeat service files after update
- kibana and elasticsearch to 7.17.6
- filebeat to 8.4.1
- Proxy-cache version 5.7 on repository.
- Artica Web error page service to v1.1.10
REMOVE
- Feature that testing the kerberos connection - too many false alarms
- The use of DNSBL reputation service is removed, detection rate of The Shields is enough
- Categories Services section is now removed ( unecessary )
- filedescriptors issue frontend notification
- Installing DNS Cache or PowerDNS did not force the system to use local DNS service.
- Sandbox connector is removed due that Kaspersky SandBox is no longer supported by Kaspersky.
- HotSpot WIFI4EU feature - need an official uuid from a municipality to supports this feature -
CHANGE
- THe Category service is removed and replaced by The Shields, any Artica version can use Personal Categories using the Shields.
- Proxy store type and caches in aufs is definitively not supported in SMP configuration ( change to rock type )
- Caches directories for each CPU is no longer used.
- The Shield will listen 127.0.0.1 instead of unix socket in order to avoid issue Err 95 Operation not supported.
- The use of ACL categories no longer requires a valid license.
- The Shields service as been improved by using HTTP protocol and is now fully multithreads
- The Shields section in left menus as been modified for better understanding features options.
- Web-Filtering client is now depreciated and The Shields Client is used instead.
- If The Shields is not enabled as remote, id doesn't use the local service for query reputation.
- The Shields service is now only an option only used for centralize Filtering services.
- WebCopy feature did not longer use the local proxy if configured - it must be enabled in configuration
- Redirect to Web-filtering error pages can be fully defined using rules method.
- Deny cache feature is added even the Proxy Cache feature is not enabled in order to avoid caching in memory
- : Not blocking if Web Application firewall cannot handle max body response size.
- Switch the Web-filtering connector to original connector if only web-filtering is defined.
- redesign proxy ssl certificates section.
- redesign and increase proxy-pac daemon performance.
- HotSpot rebuild to Go engine.
- Rebuild totally the ICAP HTTP antivirus watchdog in order to get best performance.
IMPROVE
- Proxy Outgoing addresses rules.
WEB
- Application Firewall rules beta mode
- Application Firewall rules beta 1
REBUILD
- the Proxy watchdog to Goland v1.4.34
RENAME
- DNS Load-balancing service to DNS Firewall service.
DNS
- Firewall take care of search domains defined in DNS default settings.