Skip to content

BIG-IP 10.2.1 Build 496.0 HF2 がリリースされています。新機能の追加は無く、安定性の向上を目的としたリリースのようです。以下はリリースノートから抜粋した Hotfix の内容です。

Hot Fix Release Information

ID Number Description
222455 TMM will now queue more than one packet for a given destination when there is a pending neighbor ARP request. The default depth is 4 packets, and can be configured by adding the bigdb variable 'tmm.nbr.pbqlen'
226423 The Access Policy Manager's active sessions graph no longer erroneously reports a maximum value for times when active sessions exist and a failover event occurs.
339951 The Access Policy Manager now includes body in HTTP 404 Not Found error codes returned as a result of clients trying to access URIs that they are not authorized for. The message in the body for these errors is configurable and is part of the 'logout' group. This error page is cacheable by the Local Traffic Manager's RAMcache, but not by client browsers.
340096 The Access Policy Manager now supports clients connecting with Mozilla Firefox 4.0.
344362 The default values for 'Packet Loss Ignore Burst' and 'Packet Loss Ignore Rate' were reversed. This has been corrected.
344874 The Access Policy Manager, when running in minimal rewrite mode, no longer erroneously prepends the protocol schema (e.g., "http://", "https://") to the Host header value.
345266 TMM no longer reverts the datagram_lb setting when configured in a UDP profile along with a message-based load balancing configuration.
345850 The Access Policy Manager no longer fails to rewrite Location header values when running in minimal rewrite mode.
346501 Clients can now connect with 4096-bit key/certificate pairs to virtual servers that utilize cryptographic acceleration hardware and require client certificate authentication.
347479 The Access Policy Manager no longer fails to return a response when a client queries the status of an expired session. A 404 Not Found HTTP response is now sent back instead.
348422 ASM was enhanced to better detect SQLi attacks.
348640 The Access Policy Manager now correctly detects the client operating system when Firefox 4.0 browsers are used.
348742 The Access Policy Manager now allows clients identifying themselves with an Internet Explorer 9 User-Agent header value.
348778 ASM's detection of cross-site scripting (XSS) attacks has been improved.
348876 Support for Trend Micro's Worry-Free Business Security had been added to OPSWAT.
349373 A defect has been addressed which could cause TMM to core and restart under some conditions when an iRule command causes the TCL interpreter to suspend and resume. The failure condition could be accompanied by a variety of log messages in /var/log/tmm, including the following: Assertion "valid tclconn for cf" failed.
349410 ASM now supports byte order mark (BOM) in the middle of XML stream. This can be used to avoid blocking or triggering an XML violation when uploaded Microsoft documents are included in the XML payload, such as with Outlook Web App (OWA).here is a new internal parameter "allowBOMInXMLValue", not displayed in the Configuration utility, which enables you to turn on BOM support in the middle of XML stream. To do this, you must change the default value of "allowBOMInXMLValue" from 0 (off) to 1 (on).
350434 A defect has been addressed which could cause certain commands to not complete when executed in CLIENT_CLOSED. These commands include, but are not limited to, "table" and "persist".
350652 A defect has been addressed which could cause TMM to core and restart in certain connection teardown conditions when using ramcache.
350824 We changed the order of the month and date remote logging format from "yyyy-dd-mm" to "yyyy-mm-dd".
351390 The help information for the "Highly Managed" template had been removed as the template is no longer used.
351455 The Web Accelerator module no longer erroneously removes "Accept-Ranges" headers with the value of "none" from origin web server responses.
351579 Moving a virtual server from one server definition to another in the wideip.conf configuration file will no longer cause stale monitor configurations to remain in operation.
351757 The Access Policy Manager's client power management feature now functions correctly for clients connecting from Microsoft Windows 7 and Vista systems.
352275 The pvac process no longer leaks memory when Web Accelerator policies are reloaded and document invalidations exist.
352555 PVAC no longer cores when showing a blocking page with both ASM and WA enabled in httpclass
352761 BIND has been updated to 9.6.3 to address an issue where DNSSEC validation could fail when a new Delegation Signer record is inserted into a trusted DNSSEC validation tree.
353134 You can set the minimum TPS threshold before the system treats an IP address as suspicious or considers an IP address to be an attacker IP address. You can also set the minimum TPS threshold before the system treats a URL as suspicious or to be under attack. To configure these settings, there are two new internal parameters (not available from the Configuration utility): "dos_min_detection_ip_threshold" - The default value is 1 transaction per second. "dos_min_detection_object_threshold" - The default value is 1 transaction per second.
353755 After the Policy Builder automatically detects the web application language, the system now detects the "Attack signature stating" violation.
353830 PVAC now correctly handles a HEAD request for a PDF.
354338 You can configure whether the system continues to try writing to the remote logger if the remote logging server is unreachable. This is done by changing the configuration of the new internal parameter "guarantee_remote_logging" (not available from the Configuration utility). The default value is 1, meaning that the system continues to try writing to the remote logger if the remote logging server is unreachable. Note that this behavior may cause response latency. To stop the system from trying to write to the remote logger, change the value of "guarantee_remote_logging" to 0.
354597 The tmm process no longer cores and restarts when an empty input string is passed to any of the URI:: iRule commands.
354630 When running an Oracle Access Manager configuration, the Access Policy Manager no longer fails to forward HTTP cookies from the back-end webserver to the client.
354651 A specific issue that occurred in SOAP XML message multi-referencing was fixed.
354748 The Access Policy Manager no longer fails to rewrite some URLs in server responses when the back-end webserver has the same hostname as the virtual server.
354784 The Requests List on the Requests screen is now scrollable in FireFox version 4.
354807 Web scraping bots detection now generates DNS lookups only for requests containing user agent header of known bots.