V1.1.2
Security Updates
Fixed a potential vulnerability when encrypting agent passwords
Bug Fixes
- Added the ability to support agent passwords greater than 32 characters
V1.1.1
Security Updates
- Maintenance update for OpenSSL to patch to OpenSSL-1.0.2o.
Bug Fixes
- Fixed an issue where the SAM was not honoring the licensing inactivity delay when set to 'Never' unlicense agents. This relates to the SAM expiring agent licenses when the client never phones home to the SAM, the never option means the SAM will never release the license slot if the agent does not report on in to the SAM.
- Fix a potential bug when more than one license existed that could cause an agent to crash.
- Additionally fixed a bug where a controller based (SAM) license would be used over a standalone license if both existed.
...
- Agent status will display if the Snare Agent User Interface (UI) is disabled or enabled for any version 5.1+ agents. Please note that this UI status is only available when the agent is configured to communicate to SAM.
- SAM now reports on all devices running Snare, even if the product is not configured to report to the SAM. SAM will also report on which products have an incorrectly configured remote access password. The detection of these products is done during network scans. The SAM can still only detect agents if the web interface of the access is enabled and accessible from the network the SAM is running on.
- The default list of ports scanned by SAM has been updated. The ports scanned by default are 6161, 6162, 6163, 6164, 6165, 6169. This covers many of the Snare products. Users are asked to check their existing ports and update as required.
- Addition of OpenSSL version used by Snare Agent Manager available on Settings | About page.
- Added indicator of core license feature status on Dashboards License column, to visibly notify if SAM Key or Feature license is available.
- Exclusive SAM Key Licenses installed into SAM will no longer render the Support Expires date on the Licenses Registered or Dashboard pages.
- Time drift notification message on login page has been adjusted to an allowance of 5 minutes (previously 10 minutes).
- SAM will now force prompts for Administrative privileges at the start of an install / uninstall.
- SAM now acknowledges the Snare Enterprise Agent with WEC and will display it correctly in the agent license types rather than IA_WEC.
Security Updates
- Maintenance update for OpenSSL to patch to OpenSSL-1.0.2n.
Bug Fixes
- Issues with agent counts when cancelling a scan. This is now fixed, so that the Total Agents count shown post scan or a cancelled scan is correct.
- Fixed the issue where multiple MSSQL agents on the same host could show the license usage count exceeding its maximum. This did not affect SAM licensing the agents, as internally SAM correctly treated the license as not over limit. However this update does correct the usage counts when displaying license usage.
- It was possible that when upgrading the SAM, a duplicate entry could appear in the Add/Remove Programs for Control Panel. This has been fixed and only a single entry will exist when SAM is installed or upgraded.
- Fixed the detection of Linux agents, full Unix Epilog Agents and Solaris v4 agents when scanning a network using the SAM scanning feature.
- Fixed a bug where SAM would appear hung and would not license agents in very rare cases when the hostname of a machine that the agent was running on, had changed.
V1.0.3
Security Updates
- Maintenance update for OpenSSL to patch to OpenSSL-1.0.2m.
Bug Fixes
- Fix a bug where SAM could stop responding to agents if certain network events occurred. Additionally, the time it takes for SAM to respond to large amounts of agents has been reduced.
- Resolves issue with 'not reachable' graph statistics. Status of Agents Dashboard chart now displaying correctly.
...
- Addition of links from the License Usage tables feature column to a list of Agents associated with the feature.
- Alters references for Evaluation Licenses to Temporary Licenses.
Security Updates
- SAM is now protected against XSS attacks that the server is configured site-wide to use the X-XSS-Protection header with a value set to "1; mode=block" .
Bug Fixes
- SAM now issues licenses to agents with the Support-Expiry date matching that of the original license.
- Resolves issue that prevented manual licensing of agents from SAM.
...
- Logout all users when SAM restart has been requested.
- Key IDs are now styled to show alpha characters in black and numeric characters in a red tone. This is to make it easier for those that have problems seeing the different shades of grey.
- Settings - General page doesn't require manual restart after a change.
- Licenses may now list a KeyID of 0 (zero).
Security Updates
- Maintenance update for OpenSSL to patch to OpenSSL-1.0.2j.
Bug Fixes
- There was a limitation in previous version of the SAM that it can scan only ports 6161,6162 and 6163 on the network to detect snare agents. This limitation is removed in this release of SAM and now SAM can scan all those ports added in general configuration page.
- There was a limitation in previous version of the SAM that it cannot detect multiple instances of the SareMSSQL agents running on the same cluster node. Though this limitation was only prevalent when SnareMSSQL agents are not configured to communicate with SAM. This issue is fixed in this release and now SAM detects each instance of SnareMSSQL agents running on any cluster node, even when SnareMSSQL agents are not configured to communicate with SAM. As always, SAM network scan can only detect snare agents if GUI is enabled for them. If GUI is not enabled for snare agents then agents must be configured to communicate with SAM so that SAM can detect them.
- Fixed issue where an Expired license may incorrectly influence the counts of non expired licenses.
- There were some issues in previous release of SAM during network scan and the way SAM handles the legacy to v5 agents. Due to these issues, wrong license status of an agent can be shown when upgraded from legacy to v5 agents and/or duplicates agents can be shown. These issues are fixed in this release of SAM and now SAM properly handles the upgrade of legacy to v5 agents. Alongside, this release also fixes the duplicate issues for agents. It is worthwhile to mention that users *MUST* upgrade both, agents to v5.0.1 and SAM to v1.0.1 to avoid duplicate issues. Moreover, in very limited scenario SAM can still detect two agents as single agent. This scenario is following. - There are at least two different domains - There are at least two machines with the same host name on these networks i.e. hostname.domain1.xyz and hostname.domain2.xyz - These machines with the same host names have same type of operating system and are running the same type of legacy agents or the same v5.0.0 agents that are *NOT* taking to SAM i.e. SAM details are not given in these agents. - During SAM network scan, these agents will be listed as same agent i.e. one of them will be missed from the scan. To fix this issue, v5 agents should be configured to talk to SAM and then subsequently SAM will list them two separate agents.