File: ReleaseNotes-2.6.0.md

package info (click to toggle)
weakforced 3.0.0-3
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid
  • size: 3,040 kB
  • sloc: cpp: 20,397; python: 2,002; sh: 700; makefile: 432
file content (46 lines) | stat: -rw-r--r-- 1,976 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
# Release Notes for OX Abuse Shield 2.6.0

## New Features

* REST API supports TLS/HTTPS natively
* Multiple REST API listeners can be configured
* Outbound HTTPS connection TLS behaviour is configurable
* Build on Debian Bullseye
* Remove support for building on Debian Stretch

## Bug Fixes/Changes

* Fix issue where building of geoip2 functionality was dependent on legacy geoip library being installed

## REST API Supports TLS/HTTPS natively

The `webserver()` configuration command is now deprecated, and is replaced with `addListener()`,
which enables both TLS and non-TLS listeners to be created, as well as enabling multiple listeners
to be created concurrently. The new command `setWebserverPassword()` is used to set the password
for the REST API (previously this was set as part of the `webserver()` command).

An example listener without TLS:
* `addListener("0.0.0.0:8084", false, "", "", {})`

An example listener with TLS:
* `addListener("1.2.3.4:1234", true, "/etc/wforce/cert.pem", "/etc/wforce/key.pem", {minimum_protocol="TLSv1.2"})`
`

For more details, see the man page for wforce.conf.

## Outbound HTTPS connection TLS behaviour is configurable

Various options for the configuration of outbound HTTPS connections are now supported, specifically:

* Mutual TLS Authentication - `setCurlClientCertAndKey()` is used to specify the location of a client certificate 
  and key for mTLS.
* Using a different CA for checking server certificates - `setCurlCABundleFile()` is used to specify the location
  of a file containing certs to use for this purposes.
* Disable checking peer certificates - `disableCurlPeerVerification()` disables checking of peer certificates 
  (not recommended except for debugging).
* Disable peer certificate hostname checking - `disableCurlHostVerification()` disables checking of the hostname
  in peer certificates (not recommended except for debugging).

## Build on Debian Bullseye

Support for building on debian bullseye.