SNS 3.7.15 LTSB bug fixes

IMPORTANT

In some situations, memory leaks may affect the proxy, causing the service to restart unexpectedly. Contact Stormshield support if you think that this issue might affect you.

System

Proxies

Support reference 78432

Issues with memory leaks in proxies, which would sometimes restart the service unexpectedly, have been fixed.

SSL VPN

Support reference 76762

The Available networks or hosts field was wrongly used to calculate the possible number of SSL VPN clients, and therefore skewed the calculation. This issue has been fixed.

Support references 73353 - 77976

The SSL VPN client now applies the interval before key renegotiation set by default on the SSL VPN server to 14400 seconds (4 hours). Users who do not have the Stormshield Network SSL VPN client must retrieve a new configuration file from the firewall's authentication portal so that the client applies the interval.

Find out more

VPN SSL in portal mode

Support reference 68759

SSL VPN in portal mode now uses a component that is component with:

This makes it possible to work around the suspension of public versions of Java JRE 8, scheduled in the near future.

IPsec VPN IKEv2 or IKEv1 + IKEv2

Support reference 77722

The presence of the same trusted certification authority with a CRL in both the local IPsec policy and global IPsec policy no longer causes a failure when the IPsec configuration is enabled on the firewall.

Monitoring gateways

Support references 71502 - 74524

During the startup sequence of the gateway monitoring mechanism, if any of the gateways used in filter rules switched from an internal "maybe down" status (pinging failed) to an internal "reachable" status, the filter would still consider such gateways disabled. This anomaly has been fixed.

When the status of a gateway changes, it will now be logged as an event.

Support reference 76802

In some configurations, the process that relied on the gateway monitoring engine would consume an excessive amount of the firewall's CPU resources. This anomaly has been fixed.

High availability (HA)

Support references 78758 - 75581

Memory leak issues, especially in the mechanism that manages HA status and role swapping in a cluster, have been fixed.

High availability (HA) - link aggregation

In high availability configurations, the mechanism that switches a node from active to passive has been enhanced so that it no longer renegotiates aggregate links (LACP) when:

  • The option Reboot all interfaces during switchover (except HA interfaces) is enabled (Configuration > System > High availability module, under Advanced properties, Swap configuration),

    - and -
  • The LacpWhenPassive parameter is enabled with a value of "1" (file /usr/Firewall/ConfigFiles/HA/highavailability Global LACPWhenPassive <0|1>).

Support reference 76748

In high availability configurations, an active node switching to passive mode would no longer wrongly disable VLAN interfaces that belonged to a link aggregate (LACP).

High availability (HA) - IPsec VPN IKEv2 or IKEv1 + IKEv2

Support references 68832 - 71456

During the reconstruction of a cluster after the physical replacement of the passive firewall, and whenever the quality of the active firewall was lower than the quality of the new passive firewall, established IPsec tunnels would be renegotiated. This anomaly has been fixed.

Automatic backups

Support reference 75051

The mechanism that checks the certificates of automatic backup servers was modified after the expiry of the previous certificate.

Local storage

Support reference 75301

Firewalls with damaged SD cards (and therefore damaged log storage partitions) would restart in loop. This anomaly has been fixed.

SMTP proxy

Support reference 77207

In configurations that use the SMTP proxy in an SMTP filter rule:

  • In “Firewall” security inspection mode,

    - or -
  • In "IDS" or "IPS" security inspection mode but without SMTP protocol analysis (Application protection > Protocols SMTP module > IPS tab: Automatically detect and inspect the protocol checkbox unselected),

when the SMTP server shut down a connection after sending an SMTP/421 server message, the STMP proxy would occasionally freeze. This anomaly has been fixed.

Directory configuration

Support reference 76576

The default port used to access the backup LDAP server is now the same as the port that the main LDAP server uses.

Network

Interfaces

Support references 73236 - 73504

On SN2100, SN3100, SN6100 and SNi40 firewall models, packets would occasionally be lost when a cable was connected to:

  • One of the management ports (MGMT) on SN2100, SN3100 or SN6100 models,

    - or -
  • One of the interfaces of an SNi40 firewall.

This anomaly was fixed after the driver was updated on these interfaces.

Intrusion prevention

DNS protocol

Support reference 71552

Requests to update DNS records are now better managed in compliance with RFC 2136 and no longer trigger the block alarm "Bad DNS protocol" (alarm dns:88).

RTSP protocol

Support reference 73084

When an RTSP request that uses an RTP/AVP/UDP transport mode passes through the firewall, the RTSP analysis engine no longer deletes the Transport field and broadcast channels are set up correctly.

User names

Support reference 74102

User names are no longer case-sensitive when they are saved in the tables of the intrusion prevention engine. This guarantees that names are mapped to filter rules based on the names of authenticated users.

sfctl command

Support reference 78769

Using the sfctl command with a filter on a MAC address no longer restarts the firewall unexpectedly.

OPC UA protocol

Support reference 72255

An anomaly during the analysis of the Industrial protocol OPC UA (value of the SecureChannel field in an OPN packet) would wrongly raise the block alarm "OPCUA invalid protocol". This anomaly has been fixed.