Skip to content
This repository has been archived by the owner on May 18, 2022. It is now read-only.

1.7.1 - Feature and Bugfix Release

Compare
Choose a tag to compare
@jgrancell jgrancell released this 23 Apr 19:59

Version 1.7.1

Release: April 20, 2018

  • New: Tripwire detection mode
  • Fixed: Corrected permission issue on log file. (fixes #15)
  • Updated: Changed the save path for the Tripwire whitelist file

Version 1.7.0

Release: March 22, 2018

  • Feature: Lock files are used to ensure multiple runs of malscan don't stack.
  • Feature: Configuration options can now be viewed using the malscan -c command. (fixes #10)
  • Feature: Configuration options can now be set using the malscan -s OPTION value command.
  • Fixed: malscan will now correctly check for sudo.
  • Fixed: malscan will now check to see if the user is in the malscan group, in lieu of being run as sudo.
  • Fixed: Notifications are now sent in a more spam-checker-friendly format, reducing issues with notifications ending up in the spam folder.
  • Updated: malscan will now use its own freshclam.conf file and /var/lib/malscan signatures directory, to prevent conflicts with ClamAV.
  • Updated: The malscan file structure has been updated to conform with the FHS. (fixes #7)
  • Updated: Rewrote the install.sh script to support Fedora, Debian, and CentOS/RHEL 7.
  • Updated: Created RPM packaging for CentOS/RHEL 6, 7, and Fedora 26/27. (fixes #8)
  • Updated: New exhaustive build testing CI pipeline for automated malscan testing.
  • Removed: Removed whitelisting and tripwire scanning until it can be re-worked in a later release.
  • Removed: Removed reporting until it can be re-developed in a later release.
  • Removed: Removed Ubuntu/Debian support while working on packaging.