Changelog for minor software releases



Code Version   Text Date
Bugfix-624 8.4-4 Fix the {ip_asn} token when using Sensor Cluster 2025-01-12
Feature-625 8.4-4 Implement /v1/authentication_services REST API calls 2025-01-12
Improvement-627 8.4-4 Change references in the REST API from "Execute a command or script with dynamic parameters as arguments" to "Execute a command or script" 2025-01-12
Improvement-626 8.4-4 Change references in the REST API from "dynamic parameters" to "tokens" 2025-01-12
Feature-622 8.4-3 Implement conversion tool to UTF8 2025-01-03
Feature-621 8.4-2 Implement {json_*} tokens and add an option to pass tokens to the STDIN of custom scripts 2025-01-02
Feature-620 8.4-1 Release notes at https://www.andrisoft.com/blog/news/item/wanguard-8-4 2024-12-20
Feature-619 8.3-21 Support draft-ietf-idr-flowspec-redirect-ip-02 on Huawei routers 2024-09-07
Feature-618 8.3-21 New option that allows the BGP Announcements sent via the REST API to override the parameters from the BGP Connector 2024-09-07
Bugfix-617 8.3-21 Fix a segfault that may happen on recent builds running on CentOS 7 2024-09-07
Improvement-616 8.3-20 Permit overriding of the BGP Neighbor 2024-08-29
Bugfix-614 8.3-20 Fix a bug introduced in 8.3-18 that affected the per-subnet thresholds 2024-08-29
Bugfix-613 8.3-20 Fix a bug that causes BGP announcements sent during Filter startup not to be automatically withdrawn 2024-08-29
Improvement-615 8.3-20 Update the geoip database to reflect the latest ASN additions 2024-08-29
Bugfix-612 8.3-19 Fix a potential crash in the Sensor code from 8.3-18 2024-08-14
Feature-611 8.3-18 Initial support for Ubuntu 24.04 LTS 2024-08-12
Bugfix-610 8.3-18 Fix the listing of flows for the anomalies detected by the HTTPS decoder 2024-08-12
Feature-609 8.3-18 Implement a new option in Packet Sensor for the Snapshot Length 2024-08-12
Improvement-608 8.3-18 Optimize Packet Sensor for loading very large IP Zones 2024-08-12
Feature-607 8.3-17 Add a new Dynamic Parameter {attacked_isp} that returns the email of the ISP under attack, when it can be extracted from the Whois database 2024-06-20