Version 4.0.2 bug fixes
Support reference 74927
To prevent compatibility issues with embedded programs or certain browsers, especially in iOS 13 and MacOS 10.15, the size of certificate keys that the SSL proxy generates for SSL connections has been raised to 2048 bits.
Support reference 74427
When the certification authority of the SSL proxy expired, the firewall would sometimes stop attempting to generate new keys unnecessarily for some events, e.g., when reloading the filter policy or network configuration, or when changing the date on the firewall. This would cause excessive CPU usage.
Support references 66508 - 71870
In heavy traffic, the proxy would sometimes shut down during a failed HTTP header analysis. This issue has been fixed.
Support reference 71870
The proxy no longer shuts down unexpectedly whenever the SSL proxy is used and the maximum number of simultaneous connections is reached.
Support references 70721 - 74552 - 75874
Memory consumption is now optimized when the proxy is used.
Proxy - URL filtering
Support reference 73516
The connection between the HTTP/HTTPS proxy and the URL filtering engine of the Extended Web Control solution would occasionally be lost; this would display the URL filtering is pending page to clients whose connections used the proxy. This issue has been fixed.
Filter - NAT
Support references 76343 - 76231
If several consecutive rules use the same object, they will no longer prevent the filter policy from reloading.
Support references 74551 - 74456
An anomaly in the IPSec function key_dup_keymsg(), which would generate the errorCannot access memory at address and cause the firewall to shut down suddenly, has been fixed.
Support reference 74425
A parameter would occasionally prevent ResponderOnly mode from running properly whenever Dead Peer Detection (DPD) was enabled. This anomaly has been fixed.
IPSec VPN (IKEv2 / IKEv1 + IKEv2)
Support reference 68796
In configurations that use IKEv2 IPSec policies or which combine IKEv1 and IKEv2, the firewall would sometimes fail to send a network mask to the Stormshield IPSec VPN client when it set up the mobile tunnel in config mode. The network mask that the IPSec client arbitrarily chose would then occasionally conflict with the local network configuration on the client workstation.
The firewall now always sends the network mask /32 (255.255.255.255) to the IPSec VPN client for mobile tunnels in config mode.
Global host objects included in router objects
Support reference 71974
When global host objects included in router objects are renamed, the change is correctly applied in the router object concerned.
Certificates and PKI
Support reference 76048
When certification authorities are imported, spaces in the import path are now correctly interpreted and no longer cause the import to fail.
ANSSI "Diffusion Restreinte" mode
When the ANSSI "Diffusion Restreinte" mode is enabled (System > Configuration > General configuration tab), a mechanism now checks the compatibility of Diffie-Hellmann (DH) groups used in the configuration of IPSec peers with this mode. The list of allowed DH groups has been updated; now only DH 19 and 28 groups must be used.
Excessive memory consumption of the serverd daemon
Support references 76158 - 75155
The memory consumption of the serverd daemon would increase to an excessive extent with the number of remote connections set up via SMC. This issue, which could prevent connections from being set up with the firewall's web administration interface, has been fixed.
Support reference 76121
When no Sandboxing license has been installed (Stormshield Breach Fighter option) or when the license has expired, the AVD daemon would no longer shut down unexpectedly when users attempt to reload their configuration.
Support reference 72938
On the incoming interface of a bridge, policy-based (PBR) routing instructions now take priority over the option to keep initial routing. This new order of priority does not apply to DHCP responses when the IPS automatically adds the option to keep initial routing.
Support reference 72508
Router objects with load balancing that have been configured as the default gateway on the firewall would sometimes override static routes. As a result of this, connections would be initiated from the firewall with the wrong source IP address. This anomaly has been fixed.
Trusted Platform Module (TPM)
Support reference 76181
When the IKE2 / IKEv1+IKEv2 IPSec tunnel manager retrieves the encryption key stored on the TPM, it no longer causes memory leaks.
Support reference 75997
When a sent SIP packet and its reply contained a field with an anonymous IP address, and the 465 alarm "SIP: anonymous address in the SDP connection" was configured to Pass, the firewall would restart unexpectedly. This anomaly has been fixed.
Support reference 72984
The SNMP protocol analysis no longer wrongly raises the Prohibited SNMP user name alarm (snmp:393) for IDs specified in the whitelist of the SNMPv3 protocol.
Trusted Platform Module (TPM)
Support reference 76181
An anomaly in a function would sometimes cause a shortage of handles, or object identifiers, used for authentication on the TPM, making communication with the TPM impossible. This anomaly has been fixed.
Elastic Virtual Appliances (EVA)
CLIB /B serverd commands
The CLIB / Serverd MONITORB HEALTH command run on an EVA now returns the value N/A for absent physical modules (e.g., fan, disk, etc.) instead of Unknown, which caused an anomaly on SMC administration consoles.
Web administration interface
Authentication portal (captive portal)
Support reference 76398
The focus of the connection window in the captive portal is no longer set by default on the Cancel value. Pressing [Enter] on the keyboard after typing the login and password no longer logs off the user by mistake.