What's New in Nullafi Shield v3.8.0
v3.8.0Released: April 22, 2026 · Container image: public.ecr.aws/nullafi/shield:v3.8.0
Deprecation Notice
Several HTTPS/ACME environment variable names have been updated for consistency and clarity. The legacy variable names (NULLAFI_HTTPS_ENABLE_ACME and NULLAFI_HTTPS_CERT_DIR) are still accepted in this release but will emit a deprecation warning in logs. Please migrate to the new variable names before the next major release. See the Deployment Options section for the full mapping.
Overview
-
2
New Features
-
8
Improvements
-
2
Bug Fixes
-
2
Security Fixes
Version 3.8.0 is centered on a major overhaul of the ICAP protocol implementation — bringing full RFC 3507 compliance, more reliable connection handling, and a stronger foundation for future capabilities. The release also delivers targeted security patches and a smarter default data-type detection profile.
New Features
Theme: Protocol Refactoring & Policy Expansion — Available to all editions.
-
Optimized Default Data Type Detection Profile
Shield now ships with a focused default detection profile. Ten high-value data types — including Credit Card numbers, Email addresses, SSN, IBAN, IP addresses, and SWIFT codes — are enabled out of the box. Less commonly needed types are disabled by default to reduce noise and improve performance; all remain available and can be enabled in your policy configuration.
Policy Deployment
-
Configurable Activity Log Buffer Size
A new environment variable allows administrators to tune the activity log ring buffer size to better match their deployment scale and logging requirements.
Deployment
Policy
Compliance requirements, data governance changes, and policy updates that take effect with this release.
Policy & Compliance
Optimized Default Detection Profile Fresh deployments now detect a curated set of high-priority data types by default. Organizations with existing deployments should review their active detection configuration after upgrade to ensure alignment with their data governance requirements. All previously available data types remain accessible.
Deployment
Infrastructure requirements, environment changes, and steps needed to deploy this release safely.
Deployment & Infrastructure
ACME Certificate Configuration — Variable Rename
Two HTTPS/ACME environment variables have been renamed for clarity and consistency. The legacy names are still accepted in this release and will generate a deprecation warning in logs. Update your configuration at your earliest convenience — support for legacy names will be removed in a future major release. Both NULLAFI_HTTPS_ACME_SERVER_URL and NULLAFI_HTTPS_ACME_DNS01_PROVIDER are still in use and remain unchanged.
| Old Variable (deprecated) | New Variable | Notes |
|---|---|---|
NULLAFI_HTTPS_ENABLE_ACME |
NULLAFI_HTTPS_ACME_CHALLENGE |
No longer just 'enable' and 'disable' Now controls the challenge type as well |
NULLAFI_HTTPS_CERT_DIR |
NULLAFI_HTTPS_ACME_CERT_DIR |
Just renaming to make clear that it is related to ACME certificates |
Activity Log Buffer Size A new environment variable has been introduced to control the activity log ring buffer size. No action is required; the existing default behavior is preserved unless the variable is explicitly set.
Improvements & Bug Fixes
Full list of resolved issues and quality improvements in this release.
| Type | Description | ID |
|---|---|---|
| Improvement | Full ICAP engine and server refactoring for improved RFC 3507 compliance, maintainability, and operational predictability. | NS-594, NS-595 |
| Improvement | The server now returns meaningful HTTP status codes instead of silently closing connections: 408 for timeouts, 503 when the queue is full, and 501 for unsupported methods — making integration issues significantly easier to diagnose. |
NS-593 |
| Improvement | ICAP protocol version is now validated on incoming requests; a warning is logged when a non-standard version is detected, surfacing misconfigured clients early. | NS-592 |
| Improvement | Shield now correctly validates the Allow: 204 capability header before sending a 204 No Content response, ensuring full compliance with RFC 3507 Section 4.6. |
NS-591 |
| Improvement | End-of-file detection in chunked ICAP transfers has been rewritten, reducing processing errors with edge-case clients. | NS-590 |
| Improvement | All ICAP responses now include the mandatory ISTag header as required by RFC 3507 Section 4.4.4, improving compatibility with strict ICAP clients and proxies. |
NS-587 |
| Improvement | The mandatory Host header is now properly validated on incoming ICAP requests per RFC 3507 Section 4.3.1, with non-conformant requests rejected with a clear error response. |
NS-589 |
| Improvement | OPTIONS responses now include the Encapsulated header as required by RFC 3507 Section 4.10.2, ensuring compatibility with standards-compliant ICAP clients. |
NS-588 |
| Improvement | Cross-provider directory group matching for user policies is now supported. Groups from different identity providers can be matched freely, removing friction for organizations with complex identity configurations. | NS-582 |
| Fix | Resolved an upgrade regression where the legacy NULLAFI_HTTPS_CERT_DIR variable was silently ignored, causing Shield to default to an incorrect certificate path. The legacy value is now honored with a deprecation warning. |
NS-579 |
| Fix | Corrected misleading wording in the unsaved-changes confirmation dialog in the Activity tab. | NS-580 |
| Security | Remediated a critical authorization bypass vulnerability (CVE-2026-33186, CVSS 9.1) in a core dependency. Specially crafted requests could previously bypass path-based access controls. No customer action is required; the fix is included automatically with this upgrade. | NS-597 |
| Security | All outstanding critical and high-severity dependency vulnerabilities in the frontend have been reviewed and resolved, including a known vulnerability in server-side rendering components. | NS-596, NS-575 |
Upgrade Instructions
Follow these steps before upgrading in production. Estimated time: 15 minutes.
-
Back up your database and configuration files Take a full snapshot of your database and export your current configuration — including your
.envand any custom policy files. Store backups off-instance before proceeding. -
Review environment variable changes If your deployment uses
NULLAFI_HTTPS_ENABLE_ACMEorNULLAFI_HTTPS_CERT_DIR, plan to migrate to the new variable names (NULLAFI_HTTPS_ACME_CHALLENGEandNULLAFI_HTTPS_ACME_CERT_DIRrespectively). Both legacy names remain functional in this release and will produce deprecation warnings in logs. -
Review the updated default detection profile If you are performing a fresh installation, note that only the ten default data types will be active out of the box. If you are upgrading an existing deployment, your current detection configuration is preserved and no immediate action is required.
-
Pull and deploy the updated container image
Configure your container runtime scripts or commands to use the new image. (If using Nullafi's sample Docker Compose files, modify the .env file so that SHIELD_IMAGE points to the new image.) Restart the Shield service after pulling the updated image.
nullafi.com · docs.nullafi.com · support@nullafi.com · Previous releases