What's new in 3.3.5.36
- Modernize Web Portal look and feel - TB-4450
- The Web Portal pages have been redesigned with a new modern look and lightweight colors.
- New "security level" parameter for SIP over TLS - TB-5093
- Along with TLS 1.3 support, a new parameter has been added to specify the minimum security baseline for SIP over TLS communications:
Security Level
This parameter is configurable through the “TLS Profiles”.- Level 1 (default): RSA 1024 bits or ECDSA 160 bits certificates minimum.
- Level 2: RSA 2048 bits or ECDSA 224 bits certificates minimum, no SHA1, no AES 128.
- Level 3: RSA 3072 bits or ECDSA 256 bits certificates minimum, ECDHE ciphers only.
- Level 4: RSA 7680 bits or ECDSA 384 bits certificates minimum.
- Level 5: RSA 15360 bits or ECDSA 512 bits certificates minimum.
- Along with TLS 1.3 support, a new parameter has been added to specify the minimum security baseline for SIP over TLS communications:
- Potential issues with fragmented RTP packets - TB-5222
- Fixed bad handling of fragmented RTP or RTCP packets.
- Tracking 26055 - TTL of 0 is not respected for some DNS responses - TB-5242
- For DNS queries made using the DNS Groups feature, DNS entries with a TTL of 0 will no longer be added to the cache and therefore can no longer poison future DNS requests.
- TLS 1.3 for SIP - TB-5291
- Introduced support of TLS version 1.3 for SIP over TLS communications.This update also bring modern encryption for both TLS 1.2 and TLS 1.3:
- Forward secrecy encryption, with ECDHE ciphers.
- Stronger AES 256 encryption.
- Broader range of ciphers, e.g. TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
- Support for ECDSA certificates (elliptic-curve keys). Previously, only RSA certificates were supported.
- Introduced support of TLS version 1.3 for SIP over TLS communications.This update also bring modern encryption for both TLS 1.2 and TLS 1.3: