Download:
fix Duplicate entries within the service_tunnel_accesseslog.
fix Tunnel access policies were not editable when CIDR entries were empty.
fix MASQUERADE rule was only being used for the default user interface.
fix In Access Tier versions greater than 2.4.2, using a hosted website with two services using the same frontend domain but different dns_names caused the browser name resolution to fail.
Download:
fix Remove API key after Access Tier install package.
Download:
hotfix Search Domains: Domain names and FQDNs are now case insensitive.
Download:
Netagent bypasses systemd-resolved.
Download:
Performance enhancements for the Global Edge.
Download:
Performance enhancements for the Global Edge.
Download:
new Enhanced Netagent performance (lowered CPU usage).
Download:
fix Connection test was failing for hosted web services with capitalized Access Tier names.
Download:
fix (Discover Public Resources) Accessing the same FQDN resource using a second Service Tunnel was not updating the tunnel information on the list page or in the "Last Reported" status.
Download:
fix Improved support for private resource discovery
new /health API endpoint supports query parameters to filter results specific to a service or component
Download:
fix Access Tiers were collecting stale certificates from outdated services.
new Support for non-standard websockets (like socket.io), enabled via Access Tier Local Config API.
Download:
new Netagent Health Check.
Download:
fix Enabling ITP misroutes DNS in Ubunutu.
Download:
new Debugging interface now enabled by default (memprofile set to true).
fix Users were intermittently being disconnected from Infra Services and Service Tunnel; warnings were generated but error messages were not.
Download:
fix ICMP admin prohibited packets are returned for rejected traffic.
Efficiency improvements in Service Tunnel L4 policy changes.
Download:
fix Hotfix for Netagent - Shield connection.
Download:
Improved Netagent reporting.
new StatsD support for monitoring Service Tunnels.
Download:
fix FQDNs used in Tunnel-based policies were failing to resolve in some cases.
Download:
fix Domain-based policies weren't working as expected when FQDNs' IP addresses were changed.
Download:
fix When using intermediate CA certificates, the CA certificate format was incorrectly written, causing the Netagent to fail on start.
fix WireGuard kernel module, required for running kernel version in Amazon Linux 2, was missing.
Browser-based Error messages have been updated.
Download:
fix Private domains (ipv6) were not resolving over Service Tunnel.
Download:
fix Hotfix for Service Tunnel with Connector.
Download:
new Service Tunnel for Public Domains.
new Service Tunnel Discovery.
Download:
Simplified the Access Tier installation process.
new Local configs (i.e., advanced configs) are done via API/UI instead of the config.yaml file.
Download:
new Netagent logs will now report the TLS ciphers and versions for every connection.
new Access type Event Logs will now report Access Tier name along with its public address for every connection.
Download:
Performance and stability improvements.
Download:
fix Netagent was unable to correctly handle websocket connections in case of OIDC exempt requests.
Download:
fix Websocket connections were not being closed in certain conditions.
fix Netagent logs were not being collected through Netagent Support Bundle.
Download:
fix Banyan’s Private DNS resolution was case-sensitive; DNS resolution is no longer case-sensitive.
fix Enhanced DNS routing was not resolving correctly for Windows.
Download:
fix Updating the Access Tier tunnel configuration in Banyan’s Cloud Command Center was causing Netagent to bring down the WireGuard (wg) interface.
fix In some scenarios, enhanced DNS routing was not resolving correctly.
Download:
new Option to disable Strict-Transport-Security HTTP R
new Option to disable Strict-Transport-Security HTTP Response Header within Netagent configuration.
Download:
new Support for Service Accounts in the Cloud Command Center.
Admins can customize the SameSite cookie property of the bnn_trust cookie used by Hosted Websites.
fix Service Tunnel iptables rules were not deleting after the Access Tier was removed from the Service Tunnel.
Download:
fix Service Tunnel issues that were causing select TrustScores to be ignored.
Download:
fix Service Tunnel users were experiencing packet loss when users were added or removed.
Download:
new Admins can now easily define L7 rules within web policies through the Banyan console.
new Admins can now create network-level (L4) Service Tunnel policies.
Download:
fix Netagent was stripping out invalid HTTP cookies. Now, it forwards invalid cookies.
fix macOS users now receive the correct IP address when they use Service Tunnel.
Download:
new Netagent now returns a connection test response when it receives a request from
shield with * in the site name.
new The REST API server now reports for all access-tiers in a cluster.
Download:
Restored “Netagent Details” for hosted websites and infrastructure
Removed enforcement of “Site Domain Names” configuration parameter
Download:
Metrics collection using statsd to send metrics to Datadog via Dogstatsd
Use Let's Encrypt certificates for hosted websites
Frontend domain with upper case letters
Download:
Performance and stability improvements.
Download:
Various improvements to Access events.
reported_by field to display the specific Netagent sending the event.correlation_id identifies the TCP connection.Added Headers field under HTTP Settings in the Service Spec.
Download:
Optimized standard config parameters down to only four values and updated defaults for many parameters to simplify common Netagent configurations. The following defaults have changed:
secure_bootstrap = trueaccess_tier = true, site_domain_names = "*"code_flow = true, groups_by_userinfo = true, redirect_to_https = trueMiscellaneous Access event improvements.
(Bug fix) If a request had two Trust cookies -- one that is valid and a second one which is not valid -- then depending on the order in which they are getting processed by Netagent, the valid one could end up getting deleted, which would make the user have to re-authenticate. Now, in that scenario the valid cookie will not be deleted.
(Bug fix) Netagent v1.34.0 did not properly handle expired cookies, which caused end users' browsers to get stuck in an endless redirect loop when attempting to access a web service.
Download:
Wildcard Web Service definitions (such as *.example.com) now support the root domain (example.com).
(Bug fix) Netagent handling of cookies for wildcard domains.
(Bug Fix) Valid short-lived certificates that were older than 24 hours were rejected. Now, short-lived certificates can be up to 72-hours old.
Performance and stability improvements.
Performance and stability improvements.
OIDC Services - Added ability to exempt specific Source IPs from Policies
OIDC Services - Add ability for Netagent to query TrustProvider's userinfo endpoint to obtain a user's group membership. This is especially useful for organizations where the end users belong to a large number of groups, which increases group information included in the TrustCookie and triggers browser limitations on cookie size.
(Bug Fix) OIDC Services - the bnn_return cookie logic used to return the end user to the original path they were attempting to access (for example, /foo) now also supports query parameters (such as, foo?bar=123).
Enriched information collected about a Netagent when generating a one-click support bundle. The bundle now collects additional Netagent configuration files and CIDR ranges as well as common commands support staff needs to better understand the Netagent environment.
Ability to create allow list of backends and ports (including CIDR ranges) when configuring services.
(Bug Fix) OIDC Services - Previously, when configuring CORS, the target parameter only supported a wildcard (*). Now, the target parameter supports actual domains.
Updated a shared-library dependency involving default values for the allow_user_override metadata tag, which (in some scenarios) reset admin-configurations and led to erroneous blocking of end user access.
Added HTTP_CONNECT mode for Backend routing; when set, Netagent will rely on an HTTP Connect request to derive the backend target address (i.e., ipaddress:port or fqdn:port).
(Bug Fix) Successful WebSocket closure statuses were returning incorrectly.
(Bug Fix) Netagent Service configurations were not properly updating.
(Bug Fix) Netagent v.1.25.0 introduced a regression for Cognito that passed an OAuth “scope” called “groups”, which Cognito does not support.
Support of exempting CORS traffic.
Added ability to zip up logs folder and send, via Shield, to the Command Center to create a Support Bundle for troubleshooting.
Fixed cookie logic for WebSockets and Multi-domain Services so that Banyan TrustCookies are removed from HTTP requests that are forwarded to upstream servers.
The Banyan TrustCookie still can be forwarded by setting the forward_trust_cookie parameter to true. Banyan TrustCookie removal is performed both with and without the domain parameter to avoid a browser redirect loop scenario.
Added a configuration option redirect_to_https to redirect traffic from Port 80 (HTTP) to Port 443 (HTTPS).
Added a configuration option https_proxy to use an HTTP Connect Proxy to make outbound connections to Shield and TrustProvider
Added a configuration option forward_trust_cookie to not strip out the bnn_trust cookie before sending an HTTP request to the backend application
(Bug Fix) OIDC Services - Strip out the bnn_ cookies, that are used in OIDC authentication flows, before sending an HTTP request to the backend application. This enables Netagent to proxy traffic to applications that cannot tolerate additional cookies due to their max-http-header-size parameter.
Service configuration details are now reported from Netagent and displayed in the Banyan Command Center.
The service spec has a new exempted_paths field which allows specifying a list of HTTP paths that will be accessible without OpenID Connect authentication.
In the Service Spec, the oidc_settings.service_domain_name URL value can include a wildcard (*) in the first component of the domain name. Including the wildcard enables one Banyan service to permit a dynamic, non-fixed set of OpenID Connect redirect URLs. Please note: The OpenID Connect standard does not support wildcard redirect URLs, and so this feature should be used with care.
Added a configuration option code_flow for opt-in support for OpenID Connect Authorization Code flow. The default mechanism for OIDC authentication remains OpenID Connect Implicit Code flow.
Changed wildcard support in site_domain_names parameter in the config.yaml settings file, used when Netagent is run in Access Tier mode. Now, the wildcard (*) will match any prefix, not just the first component, of the SNI name. Previously, "*.example.com" in the service_domain_names parameter would match SNI "www.example.com" but not "alpha.beta.example.com"; now, it will match both.
(Bug Fix) OIDC Services - Fixed a race condition at the token validation stage that was causing sporadic hanging of connections to applications.
(Bug Fix) Fixed issue where Netagent stopped working if the underlying host was upgraded.
Performance and stability improvements.
Disconnect existing TCP connections (SSH, RDP, etc.) automatically if the device's TrustScore drops below the level specified in the Policy condition.
Added name_delimiter field to backend target in Service spec
Performance and stability improvements
Configuration guardrails - Require site name, site address, or site domain name
(Bug Fix) Proxy WebSocket - Passing all headers for WebSocket request
Improvements to log messages
(Bug Fix) Workload identification - Improved handling when process or parent process has exited
(Bug Fix) Workload identification - Client cert issued to Unidentified container even if it has no roles
(Bug Fix) OIDC Services - robust deep-linking
Support for Services with mixed (user and workload) client types
OIDC Services - Trust cookie is a session cookie (auto-removed on browser shutdown)
(Bug Fix) OIDC Services - Obey Source IP Exceptions as long as Service is non-SNI
(Bug Fix) Workload Roles - Affix Roles even if workload is "Unidentified"
Inactivity & max session timeouts
"BadActor" module for DoS prevention
Connection IDs in events & log files for easier troubleshooting
OIDC Services - deep-linking, HTTP Strict Transport Security (HSTS)
Support for proxying Websocket
Send complete cert chain on TLS handshake
Uninstall script
GA Release
Access Tier mode
Trust Scoring support
Service definition via Web Console
CIDRs automatically installed from Service definition
OIDC workflows
HTTP authorization policies
Forwarding Gateway mode
Various stability enhancements