HTTPS is now required for accessing the Poly Rove system web interface.
The SHA-256 digest algorithm is now available for use in validating custom Root CA certificate checksums, for HTTP digest authentication to provisioning services, and for authentication when accessing the Poly Rove system's web interface.
- Configure certificate checksums using SHA-256
Configure SHA-256 in the checksum options in the system web interface
- SHA-256 for provisioning services
The Poly Rove HTTP client can now use SHA-256 and SHA-256-sess digest algorithms when authenticating to HTTP provisioning services for configuration files and software as defined in RFC 7616. These new algorithms are on by default and are available in addition to MD5 for backwards compatibility. Poly Rove systems will use the digest method provided by the topmost authentication challenge header in an HTTP GET response.
- Configure SHA-256 digest authentication for the system web interface
Optionally configure the system web interface to require SHA-256 digest access authentication for login (RFC 7616).
Configure certificate checksums using SHA-256
Configure SHA-256 in the checksum options in the system web interface
Procedure
- In the system web interface, go to .
- Under Platform CA N, enter the URL of the root CA certificate to download in the Value column for the DownloadURL parameter.
- Optional: If you want the device to validate the integrity of the certificate file, enter the MD5 or SHA-256 checksum of the certificate file in the Value column.
- Select Submit.
SHA-256 for provisioning services
The Poly Rove HTTP client can now use SHA-256 and SHA-256-sess digest algorithms when authenticating to HTTP provisioning services for configuration files and software as defined in RFC 7616. These new algorithms are on by default and are available in addition to MD5 for backwards compatibility. Poly Rove systems will use the digest method provided by the topmost authentication challenge header in an HTTP GET response.
Configure SHA-256 digest authentication for the system web interface
Optionally configure the system web interface to require SHA-256 digest access authentication for login (RFC 7616).
For backwards compatibility with services unable to support SHA-256, MD5 remains available. You can disable it using new configuration parameters to specify which digest algorithm is permitted.
Procedure
- In the system web interface, go to .
- Under Web Server, select either MD5 or SHA-256 as the value for AuthDigestAlgorithm in the Value column.
- Select Submit.
System web interface login protection
You can now configure the system web interface to lock out a user after a set number of failed login attempts in a specific time frame. This feature can protect the interface from a brute force attack.
- Web protection parameters
Configure the web protection feature using the following settings.
Web protection parameters
Configure the web protection feature using the following settings.
- LockOutPeriod
-
The period of time the user is locked out of the web server.
60 to 300 seconds
60 (default)
- LockOutInvalidAttempts
-
Specifies the maximum number of failed login attempts after which the user is locked out from the web server.
3 to 20
5 (default)
- LockOutInvalidAttemptsDuration
-
After a user reaches the maximum failed login attempts within this time duration, the user is locked out from the web server.
60 to 300 seconds
60 (default)
Minimum TLS version now defaults to TLS 1.2
As of this software release, fallback to deprecated TLS versions is disabled.
TLS 1.2 is now the minimum version permitted for fallback when connecting to external services in order to adhere to industry security recommendations by the IETF and NIST.
TLS Platform Profile 1 now defaults to TLS v1.2 and is accessible from the system web interface at .
For services that require deprecated TLS versions,
TLSv1.0andTLSv1.1remain available as configuration options for backwards compatibility.Resolved issues in Poly Rove 8.0.12
Review the resolved issues in this release.
Note: These release notes don’t provide a complete listing of all resolved issues that are included in the software. User Experience updates, performance fixes, and enhancements might not be included. In addition, the information in these release notes is provided as-is at the time of release and is subject to change without notice.Table 1. Resolved issues Category
Issue ID
Description
Audio
O-832
The caller can occasionally hear a brief click or burst of static-like noise immediately after a call connects.
Audio
O-807
In cases where a Poly Rove system is configured to prioritize wideband codecs (such as Opus or G.722) over narrowband codecs, for the first call that routes through services where early-media codec negotiation takes place in the SIP 180 or 183 responses to choose G.711u-law, G.711a-law, or G.726, two-way audio is missing from the call.
Calling
O-820
If a call is put on hold from Poly Rove and the held party blind transfers the call to a transfer destination that supports audio codecs that are different from the audio codec used in the original call, then the call is disconnected when Poly Rove resumes the call.
Calling
O-340
When Poly Rove receives a negative or rejected request from a BroadSoft centralized conference call request, the initial call fails.
Interoperability
O-798
Poly Rove uses the wrong Dialog IDs when retrieving a parked call using the INVITE+Replaces method.
Logs
O-846
Syslog and SIP log exports fail from the system web interface when the Poly Rove web server is configured for HTTPS (port 443).
Network
O-848
Web server pages are slow to load over HTTPS with certain cipher suites.
Network
O-824
After an extended network or service provider outage, Poly Rove tries to failover to the SIP service using only the UDP transport. This causes registration failures when the service provider doesn’t offer UDP transport for SIP.
Software Updates
O-774
If the Broadworks XSI credentials are configured manually from the system web interface and the base station is upgraded from a release prior to 8.0.7 to 8.0.7 or later, incorrect XSI credentials are used and the handset can’t access the Broadworks directory.
User interface
O-819
Poly Rove can't parse the contact directory if the contact is missing the <telephone> tag or if there is a blank entry in the directory list.
Release History
This section lists the release history of Poly Rove.Release History
Release Release Date Features
8.0.12
Sep 2025
- Minimum TLS 1.2
- Web Protection
- SHA-256
- Group Paging
April 2025
- Installing custom certificates via PEM
- Updated Root CA Certificate list
- Extended character length for SIP AuthUserName parameter
- Call park pickup enhancements
July 2024
- Support for Backup Proxy Server
- Support for multipart/mixed content type in the SIP INVITE
- New parameter to control expiry for SIP SUBSCRIBE requests
- Other Fixes and enhancements
Mar 2024
- Zoom Phone aim park call support
Dec 2023
- Additional function types for line keys
- New TLS platform parameter
- Support for mediasec
- Removed support for SECP192K1 and SECP192R1
Aug 2023
• Enhanced PTT
• Strict Line Seize
• Time-Limited Search on Directory Server
• Extended Character Length for BroadWorks Fields
May 2023
• Support for XML App Development
• Japanese Language Support
April 2023
• Single-Cell Base Station
• Wireless Handset and SIP Registrations
• DECT Repeaters
• Programmable Line Keys
• Improved Battery Life
• 3.5 mm Headset Port
• Enhanced Call Parking
8.0.5
February 2023
• Handset Sanitized Mode
• New Ringtones Added
• Option to Provide Transport Attribute in lowercase
• New Option to Adjust Handset Volume
• New Name – PVOS-L
July 2022
• Phone Line Status Display on the Home Screen
• Configure E911/HELD in Poly Rove
• Easy Registration for the Poly Rove B4 Base Station
• Manual Designation of a Provisioning Primary Cell
January 2022
• Request Configuration Files with a check-sync SIP NOTIFY Message
• DTMF Enhancements
July 2021
• Configure TLS Cipher Suite
• Support for ITSP SIP User Agent Name
• Removed X_LineName Parameter
• Added Ability to Remove Handsets and Repeaters through Provisioning
• New Device Maintenance Description
8.0.0
March 2021
• Single/Dual-Cell and Multi-Cell Base Stations
• Wireless Handset and SIP Registrations
• DECT Repeaters
• Antimicrobial Coating
• Bluetooth Pairing
• Programmable Emergency Button
• Programmable Function Keys
• UC Software Configuration