<> Trend Micro Incorporated September 3rd, 2021 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Trend Micro(TM) InterScan Web Security Virtual Appliance 6.5 - Service Pack 3 English - Linux - 64 Bits Service Pack - 3 Build 3257 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Contents ================================================================ 1. Service Pack Release Information 1.1 Resolved Known Issues 1.2 Enhancements 1.3 Files Included in This Release 2. Documentation Set 3. System Requirements 4. Installation 4.1 Installing 4.2 Uninstalling 5. Post-installation Configuration 6. Known Issues 7. Release History 8. Contact Information 9. About Trend Micro 10. License Agreement ================================================================ 1. Service Pack Release Information ======================================================================== InterScan Web Security Virtual Appliance (IWSVA) is an on-premise secure web gateway that gives you superior protection against dynamic online threats, while providing you with real-time visibility and control of employee internet usage. Interscan Web Security is also available in the cloud as a service. SP3 GM build can be downloaded from [Shared URL] https://powerbox-file.trend.org/SFDC/external_shared/5015a005fb8a7bb0bfb8217adad4bf78.php [URL Password] trendmicro Overview of This Release ==================================================================== IWSVA 6.5 Service Pack 3 is based on IWSVA 6.5 Service Pack 2 and provides the same malware protection, policy, logging, and reporting capabilities. IWSVA 6.5 Service Pack 3 contains all applicable previous fixes and patches releases after IWSVA 6.5 Service Pack 2. Who Should Install This Release ==================================================================== You should install this Service Pack if you are running any build of IWSVA released after version 6.5 Service Pack 2. Note: When upgrading from IWSVA 6.5 Service Pack 2, you must apply build 1948 due to the enhanced patch deployment mechanism. 1.1 Resolved Known Issues ==================================================================== There are no issues for this Service Pack release. 1.2 Enhancements ==================================================================== The following enhancements are included in this Service Pack: Enhancement 1: Operating System Enhancement - this Service Pack switches the operating system from OpenVA to standard CentOS to ensure consistent community support and maintain hardware/hypervisor compatibility with CentOS. Enhancement 2: HTTP service (IWSSD) Enhancement – this Service Pack removes the appd daemon and moves the related functions to IWSSD, including application control, bandwidth control, and bandwidth-related dashboard/log/report. This release also helps resolve the race issue between the appd daemon and kernel to enhance system stability. Enhancement 3: SunLDAP and Functions Enhancement – this Service Pack removes the SunLDAP/eDirectory support and the Windows management instrumentation (WMI), DC Agent, and Java Applet/ActiveX functions. Enhancement 4: Web Console Enhancement – This Service Pack improves product security by removing support for the HTTP and HTTPS TLS 1.0/1.1 protocols when accessing the web console. Enhancement 5: URL Categories Enhancement – this Service Pack enables InterScan Web Security Virtual Appliance (IWSVA) to support new URL categories, including "Insecure IoT Connections" and "Noteworthy". 1.3 Files Included in This Release ==================================================================== There are no files included in this Service Pack release. 2. Documentation Set ======================================================================== To download or view electronic versions of the documentation set for this product, go to http://docs.trendmicro.com - Online Help: The Online Help contains an overview of features and key concepts, and information on configuring and maintaining the product. To access the Online Help, go to http://docs.trendmicro.com - Installation Guide (IG): The Installation Guide contains information on requirements and procedures for installing and deploying the product. - Administrator's Guide (AG): The Administrator's Guide contains an overview of features and key concepts, and information on configuring and maintaining the product. - Getting Started Guide (GSG): The Getting Started Guide contains product overview, installation planning, installation and configuration instructions, and basic information intended to get the product 'up and running'. - Support Portal: The Support Portal contains information on troubleshooting and resolving known issues. - To access the Support Portal, go to http://success.trendmicro.com 3. System Requirements ======================================================================== 1. InterScan Web Security Virtual Appliance 6.5 Service Pack 2 Build 1948 - English - Linux - x64 Note: When upgrading from IWSVA 6.5 Service Pack 2, you must apply build 1948 due to the enhanced patch deployment mechanism. 4. Installation ======================================================================== This section explains key steps for installing the Service Pack. 4.1 Installing ==================================================================== 4.1 Fresh Installation ==================================================================== To install a fresh copy of this release: 1. Start the system using the IWSVA Installation DVD created from the IWSVA ISO image. A page appears displaying the IWSVA Installation Menu with the following options: - Install Appliance - Install Appliance via Serial Console - Exit 2. Select "Install Appliance". The license acceptance page appears. 3. Click "Accept" to continue. You will be prompted to choose the disks to use for the installation. 4. Select the driver(s) used for installation and click "Next". The "Hardware Profile" page displays. 5. Select "Continue". A warning page appears to notify you that the disks will be repartitioned and all data will be lost. 6. Select "Continue". The installation progress page appears. The system restarts automatically after the installation completes and the IWSVA CLI Shell page displays. 7. Login with the default system account "admin", and password "adminIWSS85". 8. Type in "enable" and the password "adminIWSS85" to enter privileged mode. 9. Run the following command. configure network basic 10. Follow the guide to set the following system configuration settings: * Host name * IPv4 address * Subnet mask * IPv4 gateway * Preferred IPv4 DNS * Alternate IPv4 DNS, this is optional setting and can be skipped 11. Type in "Y" to confirm the changes and restart. The system restarts to complete the fresh installation. 4.2 Inbox Upgrade from IWSVA 6.5 Service Pack 2 ==================================================================== The upgrade from IWSVA 6.5 Service Pack 2 to Service Pack 3 allows administrators to run it through the web console. After the upgrade completes, the related configuration and data generated by IWSVA 6.5 Service Pack 2 is retained by IWSVA 6.5 Service Pack 3, such as report templates, text logs, and logs held in databases. You should still back up your configuration and policy files for safe-keeping and for restoration later in case an unrecoverable error occurs during the upgrade. To perform an upgrade from the previous version of IWSVA to the current version, do the steps in 4.2.1 and 4.2.2. 4.2.1 To back up existing IWSVA 6.5 Service Pack 2 settings: -------------------------------------------------------------------- 1. Log on to the web console. 2. Go to "Administration > Config Backup/Restore". 3. Click "Export". The screen displays a progress bar. After the export process finishes, a page displays the results. If the configuration export was successful, the web console opens a notification that allows you to save the configuration file to a local disk. 4. Save the file to a local drive on your computer. 4.2.2 To upgrade an earlier version of IWSVA to IWSVA 6.5 Service Pack 3: -------------------------------------------------------------------- 1. Disable Sec proxy by setting the "Bypass" key to "true" in the "/usr/iwss/AdminUI/secproxy/secproxy.json", save the changes, and restart the web console service using the following command: /usr/iwss/S99IScanHttpd restart 2. Log on to the web console as administrator. NOTE: Trend Micro recommends that you use Google Chrome to perform upgrade tasks. Internal tests suggest that Chrome does these tasks more quickly than other browsers. Please change the IWSVA web console to SSL mode if the IWSVA web console is in Non-SSL mode. 3. Dissolve any clusters and set IWSVA to work in Standalone Mode before upgrading. Specifically, verify that IWSVA is not set to work in any of the following cluster modes: - Configuration Replication - Central Log/Reporting - High Availability (HA) mode 4. Go to "Administration > System Update" to verify the IWSVA 6.5 Service Pack 2 build. 5. If running a lower build, apply the latest patch/hotfix to IWSVA 6.5 Service Pack 2, Build 1948 or higher for the English version, and Build 1784 or higher for the Japanese version. This is to ensure that updates to the IWSVA patch security check mechanism are applied. 6. Download the IWSVA 6.5 Service Pack 3 upgrade package from the download page on the Trend Micro website to the host that will be performing the update. 7. Go to "Administration > System Updates", click "Browse", locate the upgrade package, and click "Open". 8. Click "Upload" to transfer and then click "Install" to install the upgrade package. After the upgrade finishes, IWSVA automatically restarts. Typically, the restart takes several minutes to complete. NOTES: * The Inbox upgrade package is huge, and requires a certificate check that may take 10 to 15 minutes after clicking the "upload" button. During this time, the web console will not be responding. Wait until the check has completed for the web console to respond. Do not attempt to interrupt the check. * The patch mechanism checks the Service Pack package and copies the upgrade script to "/var/upgrade_tool". * If you encounter the following message below, delete any TMP files or CDT files in IWSVA to free more space. "There is not enough free disk space. The minimum requirement is 3 GB." 9. After IWSVA restarts, refresh the web console page to log on. 10. If LDAP is configured, manually sync LDAP with the local database. Otherwise, the end user may not pass LDAP authentication. To do this, go to "Administration > IWSVA Configuration > User Identification > Advanced" and then click "Sync with LDAP servers". 11. Confirm or appropriately configure all new features and settings. NOTE: If needed, you can access the upgrade log information in "/var/upgrade_tool/upgrade.log". 4.2 Uninstalling ==================================================================== No special instructions are provided. 5. Post-installation Configuration ======================================================================== The Deployment Wizard launches when you first log into the web console. Use the Deployment Wizard to complete your installation. 6. Known Issues ======================================================================== Known issues in this release: #1 Known issue: [Reported at: IWSVA 6.5.0 GM B1200] This happens when IWSVA uses multiple authentication servers, and the Active Directory domain is configured before any other type of server. To fix this known issue, delete the Active Directory domain only, and configure it again. #2 Known issue: [Reported at: IWSVA 6.5.0 GM B1200] Some applications use HTTPS. Under this scenario, HTTPS decryption for this app URL must be enabled, otherwise, HTTPS-based applications cannot be blocked. For example, Yahoo mail uses HTTPS for Internet Explorer 10, Firefox 23, and Chrome 30.0. To keep granular application control working, an HTTPS decryption policy must be set. 1. Add a customized category in "HTTP > Configuration > Customized Categories". For example, "appcontrol". Add the application's connection URLs and URL keywords. 2. Enable HTTPS decryption and select a category to be decrypted. Such as: "HTTPS Decryption > Policies", enable "HTTPS Decryption". Select the URL category for "appcontrol" to be decrypted. #3 Known issue: [Reported at: IWSVA 6.5.0 GM B1200] If LDAP authentication is enabled in the bridge or WCCP mode, HTTPS requests will not trigger an LDAP query. If there are no HTTP requests to do an LDAP authentication on before the HTTPS is requested to set up the IP-user cache, HTTPS will not be able to do the user-based policy match. It will use "IP" or "Unknown" as the username. #4 Known issue: [Reported at: IWSVA 6.5.0 GM B1200] Log server mode triggers only log sources sending logs to the log server. For related configurations, log filtering settings, anonymous logging, and HTTPS tunneling settings will not take effect on the log sources as their configurations cannot be automatically synchronized between log servers and log sources. If those features are needed, it is strongly recommended to use replication configuration and make the log server a configuration replication source as well. Use the "Manual Replication," and select "Policy & Configuration Replication" to sync both policies and configurations from the log server to the log sources. #5 Known issue: [Reported at: IWSVA 6.5.0 GM B1200] HTTPS Decryption Limitation 1. When visiting HTTPS sites by IP address in bridge mode, the HTTPS requests will be tunneled. The workaround is to change the "client_hello_no_host_tunnel=no" key in the "intscan.ini" file. 2. For Windows XP+IE8, HTTPS will not do decryption in bridge mode. The workaround is to change the "client_hello_no_host_tunnel=no"key in the "intscan.ini" file. #6 Known issue: [Reported at: IWSVA 6.5.0 GM B1200] When Directory Settings are configured, IWSVA synchronizes with the listed LDAP server every 24 hours. When an LDAP user/group is added to the directory server, the change takes effect when the next synchronization cycle begins. For faster synchronization with the LDAP server, do a Manual Sync with the LDAP server. * On the "User Identification" page, click the "Sync with LDAP servers" button. #7 Known issue: [Reported at: IWSVA 6.5.0 GM B1200] Firefox users see a certification exception dialog when attempting to access HTTPS URLs with an IPv6 address in DNS. Workarounds include: * Use the host name of the IPV6 server. * Do not use the IP address to access HTTPS-related IPV6 web sites. * Use IE or Chrome web browsers to access the site. #8 Known issue: [Reported at: IWSVA 6.5.0 GM B1200] In reverse proxy mode, traffic cannot be forwarded to IPv6 servers with a link-local address. End-users cannot access the web server and will not be protected by IWSVA. The workaround is to use a global IPV6 address for the protected server behind IWSVA. #9 Known issue: [Reported at: IWSVA 6.5.0 GM B1200] Safari has a more stringent certificate-checking mechanism and does not accept IWSVA Captive Portal's default certificate. Workaround: Do not use Safari to surf the Internet through IWSVA, or deactivate cookie mode. #10 Known issue: [Reported at: IWSVA 6.5.0 GM B1200] The "show network interfaces status" command is a function of IWSVA CLISH. It helps an administrator check the current interface status. If the administrator does not type anything in CLISH within 900 seconds, CLISH cannot quit the usual way through the console. The administrator can use the "killall" and "shownic" commands to quit. To stop the current timeout process: 1. Change to another console by pressing ALT+F2. 2. Use the following "killall" command to end the timeout process. `killall -9 shownic` #11 Known issue: [Reported at: IWSVA 6.5.0 GM B1200] This issue occurs when IWSVA 6.0 is connected to a switch at the same time another machine is connected to the same switch. That machine's MAC IP address will float between its real port and the IWSVA port. This only occurs in the Transparent Bridge mode. To fix this issue, add the MAC address filter option. To do this, access the "/etc/iscan/network.ini" file using the CLISH tool, and run one of the following commands: * add mac_filter=[mac address which you want to skip] or * add mac_filter!=[mac address which you want to scan] Then, type the command `service network restart` on console. #12 Known issue: [Reported at: IWSVA 6.5.0 GM B1200] The Application Control feature only blocks new connections to the protocols specified in a new policy. If you deploy a new policy to block Skype after being logged on to Skype, then Skype is not blocked. However, if you log off Skype and then log on again, the policy works, and Skype is blocked. #13 Known issue: [Reported at: IWSVA 6.5.0 GM B1200] This is caused by the time quota implementation method. The default quota unit is five minutes. Trend Micro recommends that administrators set the "Time quota" value to a multiple of five. Otherwise, IWSVA ignores the remainder if it is less than five. For example, if the value is set to four minutes, IWSVA interprets that as zero minutes. If the value is set to nine minutes, IWSVA interprets that as five minutes. The time quota setting depends on the system time. For example, if it is now 10:03 and the time quota = 5, the end user could only have access for two minutes. That happens because the time quota is split into five-minute increments (10:00-10:05, 10:05-10:10, etc.). Every five minutes, a new increment begins. #14 Known issue: [Reported at: IWSVA 6.5.0 GM B1200] When you install IWSVA on a VMware ESX Virtual Machine, occasionally you might see the following error message: "Memory for crash kernel (0x0 to 0x0) not within permissible range" This message is normal and safe to ignore. #15 Known issue: [Reported at: IWSVA 6.5.0 GM B1200] If the machine cannot find a storage controller, the installer will check if the storage controller exists. If the storage controller does not exist, the installation will fail even if the minimum hardware requirements for memory and disk are met. The workaround is to skip the hardware check. To skip the hardware check: 1. When the "Minimum hardware requirements were not met" message is displayed, click "Next". 2. When the installation menu page appears, press "Tab" to open a command line. 3. Type "nohwfail" and press "Enter" to continue installing IWSVA. #16 Known issue: [Reported at: IWSVA 6.5.0 GM B1200] For example, the HTTP connection will be reset by IWSVA if a browser keeps posting a large file and ignoring the HTTP 403 block page notification from IWSVA. In another example, the Google search page does not show any response if the query is blocked by the IWSVA query keyword filter. This happens when the Google search setting "Use Google Instant predictions and results appear while typing" is enabled. This is because the Google page uses AJAX to query data with a private format, not normal HTML. As a result, it ignores the IWSVA 403 block notification page. The block page is displayed correctly after "Google Instant" is disabled. In these examples, the HTTP Inspection filter is working correctly, content is blocked, but the user may not receive feedback explaining why the content is blocked because the browser cannot display the IWSVA notification. #17 Known issue: [Reported at: IWSVA 6.5.0 GM B1200] If the time zone is UTC+4:30 or UTC+5:45, which is not the top of the hour. The data present on dashboard or log query data and raw log data might not sync with each other, but the log in database are correct. #18 Known issue: [Reported at: IWSVA 6.5.0 GM B1200] When deployed in the Proxy Chain, the application control daemon cannot get the source IP to match the policy. This is a limitation. #19 Known issue: [Reported at: IWSVA 6.5.3 Service Pack 3 B3257] IWSVA bandwidth control is implemented via Linux's traffic control subsystem, while content cache transfers the upstream traffic via the logical network interface, lo, which is not controlled by traffic control. As such, IWSVA bandwidth control does not control the upstream traffic which, instead, directs through lo. To work around this issue, disable content cache, and configure Apache Traffic Server (ATS) as an upstream proxy for IWSVA. 7. Release History ======================================================================== For more information about updates to this product, go to: http://www.trendmicro.com/download Prior Hotfixes ==================================================================== Only this Service Pack was tested for this release. Prior hotfixes were tested at the time of their release. [GM 1200] Enhancement 1: New Web-borne Advance Persistent Threat (APT) detection technology with real-time browser emulation to detect malicious Web content. Enhancement 2: Smart Scan provides fast, real-time file reputation lookup capability in the cloud or groups. Enhancement 3: Uses Role-based Administration to grant and control access to the IWSVA Web console. If there are several IWSVA administrators in your organization, you can use this feature to assign specific Web console privileges to the administrators and present them with only the tools and permissions necessary to perform specific tasks. Enhancement 4: If LDAP server enables encryption, IWSVA can support LDAPv3 StartTLS extension and LDAP over SSL. Enhancement 5: IWSVA enables you to create, edit, copy and delete the PAC file. This means, you do not require another Web service to maintain Proxy Auto-config (PAC) file. Enhancement 6: Schedule Configuration Replication replicates IWSVA policies and configurations. Enhancement 7: IWSVA uses Dynamic URL Categorization technology to perform real time categorization of the Web site, based on the Web site content and HTTP URL. Enhancement 8: Adds User Principle Name (UPN) authentication support for AD users. Enhancement 9: Adds SNMP V3 authentication and encryption support for SNMP notifications Enhancement 10: Adds Guest Port support in Forward proxy mode to enable Guest Policy, to provide Internet access to guest users. Enhancement 11: Adds exception list for HTTPS certification validation. Also, enhances URL filtering policy to match HTTPS Web sites even when the HTTPS feature in IWSVA is disabled. Enhancement 12: Adds log offload support to save logs to other locations for permanent storage, and retrieve logs for later analysis. Also, adds Device Group Management for Central Log/Reporting configuration. One-month limitation for log analysis is also removed in this version. Enhancement 13: Adds Device Group support in Report settings. This version also enables you to select bar and table charts in the same report. In addition, the following reports are new in this version: * Internet Activity Level by Days * Traffic bandwidth breakdown by days * Most Violation for HTTP Malware Scan Policy * Top Users by HTTP Inspection * Most Violation for URL Filtering Policy * Most Violation for Application Control Policy * Most Violation for Access Quota Control Policy * Most Violation for Applets and ActiveX policy * Most Violation for HTTP Inspection Policy * Most Violation for Data Loss Prevention Policy Enhancement 14: Adds support for the following platform and system integration servers: * VMware ESX 5.5 Support * Novell eDirectory Support * Windows AD 2012 Support 8. Contact Information ======================================================================== A license to Trend Micro software usually includes the right to product updates, pattern file updates, and basic technical support for one (1) year from the date of purchase only. After the first year, you must renew Maintenance on an annual basis at Trend Micro's then-current Maintenance fees. Contact Trend Micro via fax, phone, and email, or visit our website to download evaluation copies of Trend Micro products. https://www.trendmicro.com/en_us/contact.html NOTE: This information is subject to change without notice. 9. About Trend Micro ======================================================================== Smart, simple, security that fits. As a global leader in IT security, Trend Micro develops innovative security solutions that make the world safe for businesses and consumers to exchange digital information. Copyright 2022, Trend Micro Incorporated. All rights reserved. Trend Micro, the t-ball logo, OfficeScan, Trend Micro Security (for Mac), Control Manager, Trend Micro Apex One, and Trend Micro Apex Central are trademarks of Trend Micro Incorporated and are registered in some jurisdictions. All other product or company names may be trademarks or registered trademarks of their owners. 10. License Agreement ======================================================================== View information about your license agreement with Trend Micro at: https://www.trendmicro.com/en_us/about/legal.html Third-party licensing agreements can be viewed: - By selecting the "About" option in the application user interface - By referring to the "Legal" page of the Administrator's Guide