Difference between revisions of "SME Server:9.2"

From SME Server
Jump to navigationJump to search
m (WIP)
 
(50 intermediate revisions by 4 users not shown)
Line 1: Line 1:
 
{{Languages}}
 
{{Languages}}
  
==SME Server 9.1 Release Notes==
+
We dedicate this release of SME Server 9.2 to [[Tony Keane]] who passed away on 1st April, 2016. He was a long time user and supporter of Koozali SME Server and one of the founding members of the Koozali Foundation.
 +
 
 +
==SME Server 9.2 Final ([[Tony Keane]])==
  
 
The SME Server development team is pleased to announce the release of
 
The SME Server development team is pleased to announce the release of
SME Server 9.1 which is based on CentOS 6.7 [http://lists.contribs.org/pipermail/updatesannounce/2015-December/000436.html Full Release Notes]
+
SME Server 9.2 which is based on CentOS 6.9, Release Notes detailed below.
  
 
Bug reports and reports of potential bugs should be raised in the bug
 
Bug reports and reports of potential bugs should be raised in the bug
Line 14: Line 16:
  
 
===Download===
 
===Download===
<center>
+
THIS VERSION IS NOW EOL</br>
{{currentreleases}}
+
You can download Koozali SME Server 9.2 from
</center>
+
http://mirror.contribs.org/smeserver/releases/9.2/iso/
 +
or for other methods see http://wiki.contribs.org/SME_Server:Download
 +
 
 +
Please note it may take up to 48 hours for mirrors to finish syncing,
 +
during this time you may experience problems.
  
 
===About SME Server===
 
===About SME Server===
Line 38: Line 44:
 
commensurate with the level of revenue you generate and the number of servers
 
commensurate with the level of revenue you generate and the number of servers
 
your have in the field. Please, help the project
 
your have in the field. Please, help the project
 +
 +
Please visit http://wiki.contribs.org/Donate to donate.
  
 
Koozali Inc is happy to supply an invoice for any donations received,  
 
Koozali Inc is happy to supply an invoice for any donations received,  
Line 45: Line 53:
 
The development team would like to thank all of those who have involved
 
The development team would like to thank all of those who have involved
 
themselves with this release.
 
themselves with this release.
 +
 +
===Note===
 +
In-place upgrades from SME Server prior to version 9.0 are not supported. It is necessary to backup and then restore.
 +
/boot partition is always RAID 1.
 +
 +
The spare handling for RAID arrays is not implemented.
 +
 +
USB installs are now supported, see:
 +
http://wiki.contribs.org/Install_From_USB#SME_Server_9
 +
  
 
===Installing===
 
===Installing===
Line 50: Line 68:
  
 
[[SME_Server:Documentation:Administration_Manual:Chapter5|Installation procedure]]
 
[[SME_Server:Documentation:Administration_Manual:Chapter5|Installation procedure]]
 +
 +
{{Warning box|SME 9.2 ISO only, DO NOT enable nic bonding on an initial install when server only mode is selected.
 +
 +
If your hardware has two network adapters installed or there are two nics configured in a VM and you have selected server only mode during the install you will be offered the opportunity to enable bonding of the nics, the current SME 9.2 ISO has an issue with this initial configuration and a loss of connectivity will result on reboot. 
 +
DO NOT enable bonding on initial install, carry out a yum update after initial install and then reconfigure and enable bonding if that is your wish.}}
  
 
===Upgrading===
 
===Upgrading===
  
 
===SME 9===
 
===SME 9===
 +
{{Note box|msg=In-place upgrades to SME 9.2 *are* supported - from 9.# only. # yum upgrade or yum update, see note below for caveats.}}
 +
{{Note box|Although a yum upgrade should return a working updated server, to be 100% sure, you are advised to only upgrade clean machines, e.g. without contribs or other modifications.
  
{{Note box|msg=In-place upgrades to SME 9.1 *are* supported - from 9.0 only.}}
+
yum upgrade forces the removal of obsolete packages, while yum update may or may not also do this. The removal of obsolete packages can be risky, as it may remove packages that you use.  
{{Note box|You are advised to only upgrade clean machines, e.g. without contribs or other modifications.}}
 
  
====CD====
+
This makes yum update a safer option when not knowing state of server..}}
 +
 
 +
Please see[[SME_Server_9.2_Addendum| The Addendum]] for additional notes released after initial ISO release.
 +
 
 +
====DVD/CD====
 
This is the most affordable way to get a clean and secure upgrade. During the upgrade process the existing installation is detected and the option to upgrade the existing system is displayed.
 
This is the most affordable way to get a clean and secure upgrade. During the upgrade process the existing installation is detected and the option to upgrade the existing system is displayed.
  
Line 68: Line 96:
 
====Check for contrib packages that may need upgrading====
 
====Check for contrib packages that may need upgrading====
 
Even though it is recommended that you only upgrade clean machines (e.g. without contribs or other modifications), it may be possible that you have a contrib installed that you forgot about. After the upgrade, check if any contribs may require an upgrade from the smecontribs repository.
 
Even though it is recommended that you only upgrade clean machines (e.g. without contribs or other modifications), it may be possible that you have a contrib installed that you forgot about. After the upgrade, check if any contribs may require an upgrade from the smecontribs repository.
 +
 +
====Known issues when upgrading from previous SME9.x====
 +
=====QPSMTPD stop accepting incoming mails=====
 +
Some plugins have a different name with the new version of qpsmtpd, the service in charge of the incoming emails. This is why some template custom and some not up to date contribs could make this service fail to start.
 +
 +
1. you must take attention to upgrade 3 contribs (if they are already installed) related to email, otherwise you server might stop receiving email
 +
# [[Mailstats|smeserver-mailstat]] >=1.1-9  (or your daily mail stats will be incomplete but email will work)
 +
# [[GeoIP|smeserver-geoip]] >=1.1.2-7 (as geoip database have changed)
 +
# '''[[Wbl|smeserver-wbl]] >=0.3.0-14 (or will prevent email service to start)'''
 +
yum update --enablerepo=smecontribs
 +
 +
2. you must pay attention with current custom-templates related to qpsmtpd. A quick way to check is
 +
/sbin/e-smith/audittools/templates
 +
If you see any templates in  /etc/e-smith/templates-custom/var/service/qpsmtpd/config/peers/, we suggest you to remove them.
 +
mkdir /root/qpsmtpd-old-custom-templates
 +
mv /etc/e-smith/templates-custom/var/service/qpsmtpd/config/peers /root/qpsmtpd-old-custom-templates/
 +
signal-event email-update
 +
You can then put them one after the other if you want to test them individually and really want some of them back. You can see a list of available plugins to control the name of your custom-templates by doing
 +
ll /usr/share/qpsmtpd/plugins
 +
 +
templates-custom related to plugins with new names known to conflict
 +
#10check_earlytalker see [[Qpsmtpd_check_earlytalker]]
 +
#31check_badmailfromto see [[Email#How_to_block_email_from_one_address_to_another_address_with_check_badmailfromto_plugin]]
 +
 +
=====Access to web panel of some contribs=====
 +
Security has been increased for the authorization mechanism and as a result the following 3 contribs need to be updated to keep access to their panel :
 +
# [[BackupPC|smeserver-BackupPC]]
 +
# [[PHPki|smeserver-phpki]]
 +
# [[FreePBX|smeserver-freepbx]]
 +
# [[Isoqlog|smeserver-isoqlog]]
 +
 +
the following should solve this:
 +
yum update  smeserver-BackupPC smeserver-phpki smeserver-freepbx smeserver-isoqlog --enablerepo=smecontribs
 +
 +
=====no external network access when using bonding=====
 +
with e-smith-base-5.6.0-30.el6.sme.noarch.rpm provided on the SME 9.2 ISO, if you are using bonding of two network interfaces (e.g. server-only with two indentical network adapter) the default route to the gateway  is not created.
 +
to check if you have any bonding on your server:
 +
# ifconfig |grep bond
 +
If it returns something then you have bonding.
 +
This is fixed in e-smith-base-5.6.0-31.el6.sme.noarch.rpm available in smeupdates since May the 4th, so you have nothing to worry if ou simply did a yum update after this date. If you installed the previous from an iso and do not have network here is how to fix this ( you can replace `db configuration get GatewayIP` by your gateway IP if you know it, but this command should give the value you previously configured). Alternatively. from SME9.2 iso you can just configure your server without bonding, do a yum update and use console to reconfigure your server with bonding.
 +
route add default gateway `db configuration get GatewayIP`
 +
yum update e-smith-base
 +
signal-event post-upgrade; signal-event reboot
  
 
===SME 8===
 
===SME 8===
Line 130: Line 201:
  
 
Where extensive modifications have been made to the "old server (eg SME8.1)", it is recommended to carry out a test backup & restore upgrade first, to discover any problems & ascertain suitable fixes & workarounds. Removing contribs & custom templates before upgrading is recommended.
 
Where extensive modifications have been made to the "old server (eg SME8.1)", it is recommended to carry out a test backup & restore upgrade first, to discover any problems & ascertain suitable fixes & workarounds. Removing contribs & custom templates before upgrading is recommended.
 +
 +
====Known issues upgrade from SME8====
 +
'''1.''' You might want to check what are the current installed extra rpm on your old SME 8 to be able to simply install them on your new SME 9. Usually this is simply done this way :
 +
# /sbin/e-smith/audittools/newrpms
 +
Loaded plugins: fastestmirror, protect-packages, smeserver
 +
Loading mirror speeds from cached hostfile
 +
 +
Cannot find a valid baseurl for repo: base
 +
YumRepo Error: All mirror URLs are not using ftp, http(s) or file.
 +
Eg. Invalid release/
 +
removing mirrorlist with no valid mirrors: /var/cache/yum/base/mirrorlist.txt
 +
 +
This is because Centos mirror are no longer available. Do not worry there is a workaround :
 +
db yum_repositories setprop base BaseURL  'http://vault.centos.org/5.11/os/$basearch/'
 +
db yum_repositories setprop updates BaseURL  'http://vault.centos.org/5.11/updates/$basearch/'
 +
db yum_repositories delprop base MirrorList
 +
db yum_repositories delprop updates MirrorList
 +
signal-event yum-modify
 +
yum clean all
 +
 +
and then you can issue the good old command without issue:
 +
/sbin/e-smith/audittools/newrpms
 +
 +
'''2.''' You might also want to check [[#Known_issues_when_upgrading_from_previous_SME9.x| SME9 specific issues]] as some might apply also for a migration from SME8.
  
 
===RAID===
 
===RAID===
Line 136: Line 231:
 
The spare handling for RAID arrays is not implemented.
 
The spare handling for RAID arrays is not implemented.
  
===Changes===
 
  
==== Changes from SME9rc1====
+
===Koozali SME Server 9.2 Release Notes===
USB Install working once again
+
26 April 2017
  
Anaconda lang syntax error
+
The Koozali SME Server (SME Server) development team is pleased to announce
 +
the release of SME Server 9.2 Final which is based on CentOS 6.9
  
====Changes from Beta 4====
+
Bug reports and reports of potential bugs should be raised in the bug
 +
tracker (and only there, please);
  
USB installs now supported.<br />
+
    http://bugs.contribs.org/
See: http://wiki.contribs.org/Install_From_USB#SME_Server_9
 
  
RAID 'n' now supported.
+
====Download====
 +
You can download Koozali SME Server 9.2 from
 +
http://mirror.contribs.org/smeserver/releases/9.2/iso/
 +
or for other methods see http://wiki.contribs.org/SME_Server:Download
  
ISOLINUX menu screen added.
+
Please note it may take up to 48 hours for mirrors to finish syncing,
 +
during this time you may experience problems.
  
Allow workstation backup to mounted drive.
+
====About SME Server====
 +
SME Server is the leading Linux distribution for small and medium
 +
enterprises. Loozali SME Server is brought to you by Koozali Foundation, Inc.,
 +
a non-profit corporation that exists to provide marketing and legal support
 +
for SME Server.
  
====Changes from Beta 3====
+
SME Server is freely available under the GNU General Public License and
The installer has been substantially modified in Beta 3.
+
is only possible through the efforts of the SME Server community.
 +
However, the availability and quality of SME Server is dependent on
 +
meeting our expenses, such as hosting costs, server hardware, etc.
  
The remaining relevant patches from SME Server 8 have been ported.
+
As such, we ask for a donation to offset costs and fund further development.
  
Note: The spare handling for RAID arrays is not implemented.
+
a) If you are a school, a church, a non-profit organisation or an individual
Workstation Backup has had many minor changes, see below for details.
+
using SME Server for private purposes, we would appreciate you to contribute
 +
within your means toward the costs associated with hosting, maintenance and
 +
development.
 +
 
 +
b) If you are a company or an integrator and you are deploying SME Server in
 +
the course of your work to generate revenue, we expect you to make a donation
 +
commensurate with the level of revenue you generate and the number of servers
 +
your have in the field. Please, help the project
  
A new feature has been introduced to block SSH login attempts,
+
Please visit http://wiki.contribs.org/Donate to donate.
http://wiki.contribs.org/AutoBlock
 
  
It is set by default to reject SSH connections when there have been 3
+
Koozali Inc is happy to supply an invoice for any donations received,
or more requests in the previous 15 minutes.
+
simply email treasurer@koozali.org
  
See the link above to tune the defaults, or to disable:
+
====Tony Keane====
 +
It is with huge sadness that we learnt the passing of Tony Keane on Friday
 +
1st April, 2016. He was a long time user and supporter of Koozali SME Server
 +
and one of the founding members of the Koozali Foundation.
 +
We dedicate this release of SME Server 9.2 to Tony.
 +
Without him and a handful of others the community would not have been secured
 +
with the Koozali foundation and our current cluster of servers to build and
 +
maintain your favourite distro. If you download and use it,  
 +
please remember him and his work, and that of all the other contributors
 +
who work tirelessly to make Koozali SME as good as it is.
  
db configuration setprop sshd AutoBlock enabled
+
We extend our thoughts and deepest sympathies to his family.
  
signal-event remoteaccess-update
+
https://wiki.koozali.org/Tony_Keane
  
====Changes from Beta 2====
+
====Notes====
The installer has been substantially modified in Beta 2.
+
In-place upgrades are not supported. It is necessary to backup and then restore.
It now creates the degraded RAID1 array with a single disk install.
+
/boot partition is always RAID 1.
Some, but not all,  install options are now supported.
 
  
The base has been updated to CentOS 6.5
+
The spare handling for RAID arrays is not implemented.
  
The network interface code has been reworked to remove all hardcoding
+
USB installs are now supported, see:
relating to eth0 and eth1.
+
http://wiki.contribs.org/Install_From_USB#SME_Server_9
  
 
===Major changes in this release===
 
===Major changes in this release===
Added functionality to use a Dummy NIC for the internal interface.
+
* Updated all to Koozali branding.  
Set the check update frequency of smecontribs through the server-manager.
+
* Server Manager - Allow access to the server-manager without SSL from the loopback, Don't redirect to http when login in/out of the server-manager from localhost.  
Disable SSLv3.
+
* File Server - added W10 support to SME Domain. Add support for specifying TLSv1.1 and TLSv1.2
Added Windows 10 support for SME Domain.  
+
* LDAP - Hook into the new ssl-update event.
 +
* Mail Server - Update qpsmtpd to release 0.99.6 (including multiple plugins and ability to ebale/disable same), Allow reading SSL_version from the tls_protocols config file (and turn TLSv1 back on by default), Modify whitelist_soft transaction to interact with dnsbl filter, Revert forcing TLSv1 patch as it breaks some inbound delivery, Remove karma rcpt handling, Check rua is defined before trying to parse it to prevent an error if a domain has a DMARC entry published with no rua, add support for the uribl plugin, add detailed spamassassin report headers.
 +
* Web Server - Hook into the new ssl-update event, Set TLSv1 back to enabled (but keep a prop to disable it if needed).
 +
* Other fixes and updates - Correctly display http URL to the server-manager in the console, Remove motd text from grub.cfg.
  
====Changes in this release====
+
===Detailed changes in this release===
Only the changes since SME Server 9.0 are listed, mainly
+
Only the changes since SME Server 9.1 are listed, mainly autogenerated from the changelogs.
autogenerated from the changelogs.  
 
  
Packages altered by Centos, Redhat, and Fedora-associated developers are
+
Packages altered by Centos, Redhat, and Fedora-associated developers are not included.
not included.
 
  
Backups
+
Text With Bug Numbers
-------
+
Text for ISO Release Notes with Bug Numbers
- dar new upstream version
+
The changelogs are written per package, and each package is assigned a group.
- dar add pkgconfig
 
- The mountpoint is tested before attempting the console backup
 
- Workstation Backup, do not fail backup for mtime/ctime mismatch
 
- Change the sub checkMount() to findmnt Ian Wells <esmith@wellsi.com>
 
- Add requires nfs-utils
 
- The nfs service is neither started or allowed to start
 
- Don't remove the apache group during restore
 
  
 
File Server
 
File Server
-----------
+
----------
  - The samba performance registry is now added in the win10samba.reg
+
  - fix outlook error code 0x8004011c when setting up and email account on a win10 computer joined to a domain (with  roaming profiles) [SME: 10106]
  - Fix samba audit parameters
+
  - Create V6 profile dir (for Win10 roaming profiles) [SME: 9772]
   Patch from Jorge Gonzalez
+
   proftpd
  Replace syslog template to rsyslog so samba audits are logged in the correct
+
- Additional tweak (to avoid null pointer dereference) for upstream bug 3868
  file
+
- Fix for CVE-2016-3125: usage of 1024 bit DH key even with manual parameters
  Corrected typo in patch of bad character '“', relative to roaming profile
+
   see (http://bugs.proftpd.org/show_bug.cgi?id=4230)
  e-smith-samba-2.4.0.bz9038.W10_registry.patch
+
  - Also fixed related issue where only first DH param in TLSDHParamFile is used,
   Roaming profiles follow Windows version (.V2,.V3,.V4,.V5)
+
   regardless of requested keylength (http://bugs.proftpd.org/show_bug.cgi?id=3868)
  added W10 support to SME Domain
+
  - Fix SUID/SGID directory permission setting regression introduced with fix
  e-smith-samba-2.4.0.bz9038.W10_registry.patch
+
  for CVE-2012-6095 (#1297264)
  - Added e-smith-samba-2.4.0.bz9048.RoamingProfileForW8.patch
+
- Add support for specifying TLSv1.1 and TLSv1.2 (#1281493)
   Modified the registry file for roaming profile with W8
 
  Roaming profiles follow Windows version (.V2,.V3,.V4,.V5)
 
  - Add dependency on perl(Crypt::Cracklib), needed for ftpasswd --use-cracklib
 
  Add -utils subpackage for support tools (#1258440), using a sub-package to
 
  ensure that the main package does not require perl
 
  Update ftpasswd to version from proftpd 1.3.5a for additional functionality
 
  (SHA passwords, locking and unlocking of accounts)
 
 
 
  
 
LDAP
 
LDAP
----
+
----------
- Remove size limit for search result
+
  - Disable SSLv3, but keep the possibility to enable it again [SME: 10113]
- Make pdbedit output independent from locale and timezone so it can be
+
  - Better default cipher suite, and honor global suite [SME: 10113]
  parsed
+
  - Hook into the new ssl-update event [SME: 9152]
- Symlink /etc/init.d/ldap to /usr/bin/sv
 
- Chown all DB files to ldap before staring slapd
 
- Set checkpoint in slapd.conf instead of DB_CONFIG
 
- Stop ldap on shutdown (rc0 and rc6)
 
  - Don't overwrite the ldif dump if slapcat's output is empty
 
  (code from Charlie Brady)
 
  - Run db_recover on startup
 
  - Don't wipe LDAP DB when the ldif dump is empty
 
  
 
Localisation
 
Localisation
------------
+
----------
  - apply locale smeserver-locale-2.4.0-locale-2015-07-12.patch
+
  - apply locale 2017-03-03 patch from pootle [SME: 9592]
- apply locale smeserver-locale-2.4.0-locale-2015-07-01.patch
+
  - Eliminated rpmbuild "bogus date" warnings due to inconsistent weekday,
- apply locale 2015-03-14 patch from pootle
+
  by assuming the date is correct and changing the weekday.
  - apply locale 2014-12-25 patch from pootle
 
  
 
Mail Server
 
Mail Server
-----------
+
----------
  - ClamAV Updated to release 0.98.7
+
  - Update to release 0.99.2 [SME: 9489]
  - Remove the patch e-smith-email-5.4.0-UEsDBBQDAAAIA-new-signature.patch
+
  - Add pcre-devel to BuildRequires [SME: 9151]
  - Add new zip file signatures to default mailpatterns database : UEsDBBQDAAAIA
+
- Hook into a new ssl-update event [SME: 9152]
  - Add new zip file signatures to default mailpatterns database : ZIPVOSX & ZIPV3
+
  - Allow setting SSL protocols from DB (and set TLSv1 back to enabled
  - Disable fips mode on stunnel
+
  on a default install) [SME: 9175]
  - Use stunnel instead of sslio to support TLS
+
- Disable TLSv1 [SME: 9169]
  - Revert forcing TLSv1 patch as it breaks some inbound delivery
+
  - Add possibility to exclude users or members of other groups from group
  - Revert whitelist_soft dnsbl as it hasn't been verified yet and we need to
+
  email address [SME: 9540]
   push the fix for TLSv1
+
- Consider literal <> as null sender [SME: 9883]
  - Modify whitelist_soft transaction to interact with dnsbl filter
+
  - Removed Message-Id validation, as it rejects MS account validation email [SME: 9773]
   by John Crisp <jcrisp@safeandsoundit.co.uk>
+
  - fix whitelist plugin to support helo with naughty rejecting at mail stage [SME: 10111]
  - Force usage of TLSv1
+
  - Validate domains found in uribl with Data::Validate::Domain [SME: 9499]
  - Increase MemLimit to 700M for clamav-0.98
+
- Use eval to fetch dkim policies, prevent fatal errors in case of DNS
  - Allow custom passdb args
+
  timeout [SME: 9504]
  - allow IP relayclient stored by DB
+
  - Remove karma rcpt handling (buggy and doesn't make a lot of sense) [SME: 9502]
   Code from Stefano ZAmboni <zamboni@mind-at-work.it>
+
- Check rua is defined before trying to parse it to prevent an errorif a domain has a DMARC
   & Charlie Brady <charlieb-contribs-bugzilla@budge.apana.org.au>
+
   entry published with no rua [SME: 9507]
  - allow IP relayclient stored by DB
+
- Fix error when RCPT TO is not valid [SME: 8861]
  Code from Stefano ZAmboni <zamboni@mind-at-work.it>
+
- Fix karma logic by checking negative strikes [SME: 9502]
 +
- Backport a fix for karma_tool so it can find its database [SME: 9502]
 +
- Update to 0.96 (with some backports from GIT head) [SME: 8861]
 +
- Allow reading SSL_version from the tls_protocols config file (and turn TLSv1 back on by default)
 +
  [SME: 9162]
 +
- Correctly log login attempts with nulls in login name [SME: 9167]
 +
- Disable TLSv1 [SME: 9162]
 +
  - remove whitelist_soft [SME: 10125]
 +
- Disable unofficial sigs for filesystem scans [SME: 9142]
 +
- Better default cipher suite, and honor global suite [SME: 10114]
 +
- Hook into the new ssl-update event [SME: 9152]
 +
- Allow settings SSL protocols from DB (and set TLSv1 back to enabled on a default install)
 +
   [SME: 9175]
 +
  - Disable TLSv1 [SME: 9175]
 +
  - updated regex for SBList in smeserver-qpsmtpd-2.4.0-change_rbl_sbl_list_separator.patch to take into
 +
  account list using a subdomain [SME: 10116]
 +
  - Eliminated rpmbuild "bogus date" warnings due to inconsistent weekday, by assuming the date is correct
 +
  and changing the weekday.
 +
- Set the default helo policy to lenient [SME: 9767]
 +
  - Turn SPF and DMARC rejects off by default [SME: 9654]
 +
- Fix disabling DMARC reporting [SME: 9507]
 +
- Remove o and r DKIM fields as they are not standard [SME: 9506]
 +
- In qpsmtpd-print-dns set DKIM options after the public key so the string will still be split correctly
 +
   [SME: 9506]
 +
- Fix a syntax error in the qpsmtpd-print-dns script [SME: 9507]
 +
- Remove warning about spool dir permission on startup [SME: 9511]
 +
- Add missing patch for DKIM signing [SME: 9506]
 +
- Add missing run time dependency on perl(DBD::SQLite) [SME: 9507]
 +
- Check SPF for inbound emails [SME: 9505]
 +
- Check DKIM for inbound emails [SME: 9504]
 +
- Check DMARC for inbound emails (based on the previous SPF and DKIM checks) [SME: 9507]
 +
- Store and send DMARC aggregate reports [SME: 9507]
 +
- Support DKIM signing for outbound emails [SME: 9506]
 +
- Use an additional badrcptto file list for external connections so local only pseudonymes work as expected
 +
   [SME: 9503]
 +
- Enable the bogus_bounce plugin [SME: 9501]
 +
- Use the naughty plugin to defer rejections, leaving users an opportunity to authenticate [SME: 9500]
 +
- Add support for the uribl plugin [SME: 9499]
 +
- Change separator for SBList and RBLlist from : to , [SME: 9498]
 +
- Switch to the clamdscan plugin [SME: 9497]
 +
- Enabe the loadcheck plugin [SME: 9508]
 +
- Add support for the karma plugin [SME: 9502]
 +
- Work with qpsmtpd 0.96 [SME: 8861]
 +
- Expand all ssl related conf in ssl-update [SME: 9152]
 +
- Hook into a new ssl-update event [SME: 9152]
 +
- Allow setting SSL protocols from DB [SME: 9162]
 +
  - Rewrite spamd run script to add support for --allow-tell [SME: 10138]
 +
- Add X-Spam-Details header (and simplify X-Spam-Status) [SME: 9509]
 +
- Disable ipv6 support to prevent a warning during startup [SME: 9153]
  
 
Server manager
 
Server manager
--------------
+
----------
  - fix gzfile accept paths with NUL character #1213407
+
  - reapply patch 4
- fix patch for CVE-2015-4024
+
  - Update server-manager to Koozali branding [SME: 9678]
  - fix more functions accept paths with NUL character #1213407
+
  - move fix to the right line to be effective [SME: 9920]
- soap: missing fix for #1222538 and #1204868
+
  - fix bad redirection parameter that might reveal session information to remote site temporarily
  - core: fix multipart/form-data request can use excessive
+
   reverting patch 4 for fast release of security fix please put it back at next release [SME: 9920]
  amount of CPU usage CVE-2015-4024
+
  - Update server-manager to Koozali branding [SME: 9678]
- fix various functions accept paths with NUL character
+
  - e-smith-manager-2.6.0-Koozali_manager.patch better syntax for removing Indexes option for the manager [SME: 9589]
  CVE-2015-4026, #1213407
+
  - Remove index option for manager's resources [SME: 9589]
- ftp: fix integer overflow leading to heap overflow when
+
  - fix 307 redirection to http when https is used [SME: 8825]
  reading FTP file listing CVE-2015-4022
+
  - update syntaxe for TKT Auth, bump 7 for typo, corrected typo in e-smith-manager-2.4.0
- phar: fix buffer over-read in metadata parsing CVE-2015-2783
+
   dont_rewrite_to_https_from_localhost.patch code from John H. Bennett III bennettj@johnbennettservices.com
- phar: invalid pointer free() in phar_tar_process_metadata()
+
  [SME: 9271]
  CVE-2015-3307
+
  - Really don't redirect to http when login in/out of the server-manager [SME: 9163]
  - phar: fix buffer overflow in phar_set_inode() CVE-2015-3329
+
  - Don't redirect to http when login in/out of the server-manager from localhost [SME: 9163]
- phar: fix memory corruption in phar_parse_tarfile caused by
+
  - Allow access to the server-manager without SSL from the loopback [SME: 9163]
   empty entry file name CVE-2015-4021
+
  - don't set environmental variable based on user supplied Proxy request header CVE-2016-5385
- soap: more fix type confusion through unserialize #1222538
+
  - fix wrong warning in openssl_encrypt() for missing IV when IV is not required #1260315
  - soap: more fix type confusion through unserialize #1204868
+
  - fix segfault's when you try and allocate an SplFixedArray with size >= 9999 #1071344
  - core: fix double in zend_ts_hash_graceful_destroy CVE-2014-9425
+
  - segfault in php_pgsql_meta_data CVE-2015-4644 #1234434
- core: fix use-after-free in unserialize CVE-2015-2787
+
  - add options to enable TLS in curl #1255920
  - exif: fix free on unitialized pointer CVE-2015-0232
+
  - fix segfault in gc_collect_cycles #1122681
- gd: fix buffer read overflow in gd_gif.c CVE-2014-9709
 
- date: fix use after free vulnerability in unserialize CVE-2015-0273
 
- enchant: fix heap buffer overflow in enchant_broker_request_dict
 
  CVE-2014-9705
 
- phar: use after free in phar_object.c CVE-2015-2301
 
- soap: fix type confusion through unserialize
 
  - fileinfo: fix out-of-bounds read in elf note headers. CVE-2014-3710
 
  - xmlrpc: fix out-of-bounds read flaw in mkgmtime() CVE-2014-3668
 
- core: fix integer overflow in unserialize() CVE-2014-3669
 
  - exif: fix heap corruption issue in exif_thumbnail() CVE-2014-3670
 
- spl: fix use-after-free in ArrayIterator due to object
 
  change during sorting. CVE-2014-4698
 
- spl: fix use-after-free in SPL Iterators. CVE-2014-4670
 
- gd: fix NULL pointer dereference in gdImageCreateFromXpm.
 
   CVE-2014-2497
 
- fileinfo: fix incomplete fix for CVE-2012-1571 in
 
  cdf_read_property_info. CVE-2014-3587
 
- core: fix incomplete fix for CVE-2014-4049 DNS TXT
 
  record parsing. CVE-2014-3597
 
- core: type confusion issue in phpinfo(). CVE-2014-4721
 
- date: fix heap-based buffer over-read in DateInterval. CVE-2013-6712
 
  - core: fix heap-based buffer overflow in DNS TXT record parsing.
 
  CVE-2014-4049
 
- core: unserialize() SPL ArrayObject / SPLObjectStorage type
 
  confusion flaw. CVE-2014-3515
 
- fileinfo: out-of-bounds memory access in fileinfo. CVE-2014-2270
 
  - fileinfo: unrestricted recursion in handling of indirect type
 
  rules. CVE-2014-1943
 
- fileinfo: out of bounds read in CDF parser. CVE-2012-1571
 
- fileinfo: cdf_check_stream_offset boundary check. CVE-2014-3479
 
  - fileinfo: cdf_count_chain insufficient boundary check. CVE-2014-3480
 
- fileinfo: cdf_unpack_summary_info() excessive looping
 
  DoS. CVE-2014-0237
 
  - fileinfo: CDF property info parsing nelements infinite
 
  loop. CVE-2014-0238
 
- add php_get_module_initialized internal function (#1053301)
 
- soap: fixRFC2616 transgression (#1045019)
 
  - fix static calling in non-static method (#953786)
 
  - fix autoload called from closing session (#954027)
 
  - drop unneeded part of CVE-2006-724.patch and fileinfo.patch
 
  extension not provided or git binary patches (#1064027)
 
  - odbc: fix incompatible pointer type (#1053982)
 
  - mysqli: fix possible segfault in mysqli_stmt::bind_result
 
  php bug 66762 (#1069167)
 
- mysql: fix php_mysql_fetch_hash writes long value into int
 
  php bug 52636 (#1054953)
 
  
 
Web Server
 
Web Server
 
----------
 
----------
  - DIsable SSLv3
+
  - Hook into the new ssl-update event [SME: 9152]
  - Revert CRIME mitigation patch, as it's not needed
+
  - Set TLSv1 back to enabled (but keep a prop to disable it if needed) [SME: 9154]
- Mitigate CVE-2012-4929
+
  - Disable TLSv1 [SME: 9154]
- Turn SSLEngine on in the SSL vhost (ProxyPassVirtualHosts)
 
  - Remove obsolete gpc_order setting from php.ini.
 
- Add an upload_tmp_folder setting by db command
 
- Thanks to Michael McCarn and Jean-philippe Pialasse
 
  
 
Other fixes and updates
 
Other fixes and updates
-----------------------
+
  - Use ip route syntax to define routes to local network [SME: 9905]
- Update /etc/mime.types templates
+
  - Allow /32 masks on the external interface, in which case we don't
  - Use sha256 algorithm for signature of SSL cert.
+
  check if the gateway is on the correct network) [SME: 9765]
  - Added new createlinks function event_templates event_actions event_services
+
  - Add a column to display forwarding address [SME: 9174]
- Don't claim to own /sbin and /sbin/e-smith
+
  - Correctly display http URL to the server-manager in the console [SME: 9163]
- display variable name in the server-manager $domainName, $domainDesc $domain
+
  - Fire ssl-update event when default cert is renewed [SME: 2257]
- Revert the upload_tmp_folder patch as it needs some more work
+
  - Expand /home/e-smith/ssl.pem/pem during ssl-update [SME: 9152]
  - Add dummy NIC support as InternalInterface
+
  - Quote filenames in genfilelist so filenames containing spaces are correctly
- Only fire the ip-change event when IP is assigned to WAN nic
+
  handled [SME: 9758]
  (Code by Charlie Brady and John Crisp)
+
  - Remove motd text from grub.cfg [SME: 9161]
  - Only reset service access when switching to or from private server mode
+
  - Allow empty comment when creating/modifying a hostname [SME: 9177]
  (Code by Charlie Brady)
+
  - Remove double / in SSL RewriteRule [SME: 9195]
- When quiting the console app with unsaved changes set the default selected
+
  - Adjust regex so adjust-service accepts sigusr1 and sigusr2 from files [SME: 9184]
  answer to NO
+
  - Allow custom file descriptor limit, and set default to 4096 [SME: 9911]
  - Added a comment to specify the real configuration file of dhcpd
+
  - Rebase on upstream 9.03.53-1 [SME: 9534]
  - Modified the patch of daniel e-smith-base-5.6.0-ensure_apache_alias_www.patch
+
  - Roll in CentOS Branding
- Ensure www group exists and that apache is an alias of www
+
  - functions: parse -d first
  - Check where running runlevel 4, not 7 in service wrapper
+
  - functions: fix ignored delay in killproc
- Correctly update NIC configuration on single NIC systems
+
  - netfs: only unmount loopback device mounted on top of netdev or with back-file on netdev
  - Symlink udev-post service in rc7
+
  - functions: improve killing loops
  - Fix PPPoE after a post-upgrade
+
  - netfs: tweak nfs umount
  - Remove dependency on microcode_ctl
+
  - sysctl.conf: mention sysctl -a
  - Prevent emailing about the normal, weekly, checks of RAID arrays, by Mark    Casey
+
  - sysconfig.txt: document PPPOE_EXTRA and PPPD_EXTRA
- Don't claim to own /sbin and /sbin/e-smith
+
  - spec: require plymouth
  - Add an upload_tmp_folder setting by db command
+
  - fix mangled sysconfig/init.s390
  Thanks to Michael McCarn and Jean-philippe Pialasse
+
  - rc.sysinit: don't perform fsck twice with /.autorelabel
  - the folder /tmp is created by the event init-ibays
+
  - ifdown-eth: fix comparison
  - the event ibay-modify create/chown/chmod the folder /tmp
+
  - ifup-eth: if arping fails, output responding MAC
  - Add an upload_tmp_folder setting by db command
+
  - network-functions: fix change_resolv_conf after grep update
  Thanks to Michael McCarn and Jean-philippe Pialasse
+
  - spec: add sysctl.d dir
  - Force SSL following ibays settings to the relevant domain
+
  - rc.sysinit: fix typo in fs
  - Perl::critic syntax modifications
+
  - rename_devices: comments need to have a blank before them
  - Add more PHP options to ibays only by db commands
+
  - rename_device: remove comments and trailing whitespaces
  - Add SSLRequireSSL to ibays when SSL is set to enabled
+
  - bonding: warn if the ifup for slave device failed
  - Allow the admin upsd in /etc/hosts.allow
+
  - clarify daemon() usage message
- Creation Admin Privilege for use of upscmd & upsrw
+
  - ifdown: clean ipv4 localhost addresses
  - Remove obsolete directives {allowfrom}
+
  - ifup-post: check resolve.conf also with DNS2
  - Access property created (default value is 'localhost')
+
  - ifup: add missing quotes
  - Remove obsolete directives {ACL,ACCEPT,REJECT} and switch to LISTEN
+
  - ifup-eth: some bridge options are applied later
  in /etc/ups/upsd.conf
+
  - init.d/halt: give init some time to reexecute
  - Allow NUT in /etc/hosts.allow and in /etc/services
+
  - network-scripts: DEVICE and HWADRR could be quoted by apostrophe
  Code change from Daniel B.<daniel@firewall-services.com>
+
- ifup-wireless: fix calling of phy_wireless_device
  - Revert the patch e-smith-tinydns-2.4.0_add_hostname_following_dhcpdleases_hostname.patch
+
  - rc.sysinit: apply quotas after system is relabeled
  - Duplicate hostnames with different IP are not used, a warn in log is printed
+
   mod_auth_tkt
  - The server hostname can not be used by a dhcp client, a warning in log is printed
+
  - backport to SME9 fix redirection when proxy ssl [SME: 8825]
  - Changed the name of /tmp/dhcpd.leases to /tmp/tmpdhcpd.leases
+
  - update apxs path for SME9 (sbin)
  when the dhcpd lease is modified
+
- Bump for beta1 release of 9.2 [SME: 9525]
  - Do template-expand of /var/service/tinydns/root/data
+
  - updated sources with new pictures fix hover color [SME: 9678]
  - Do sigus1 of dhcp-dns & dnscache
+
  - Koozali branding of manager [SME: 9678]
  - Forked DHCPparse for parsing the end of lease and remove old entry of dnscache
+
  - Eliminated rpmbuild "bogus date" warnings due to inconsistent weekday,by assuming the date is correct and
- Require perl-Text-DHCPparse removed
+
  changing the weekday.
- Timestamp added in tinydns, the entry in dnscache is cleared when the lease is over
+
  - Update copyright in server-manager footer [SME: 9266]
- Add new feature 'Parse dhcpd.leases and feed to tinydns'
+
  - Don't put motd content in /etc/redhat-release [SME: 9161]
  - e-smith-tinydns-2.4.0_add_hostname_following_dhcpdleases_hostname.patch
+
  - added centos SCLo SIG gpg rpm signing key [SME: 10102]
  made from the solution of Stefano Zamboni
+
  will allow to install SCL packages directly from smecontribs
- Make slapd service an alias for ldap
+
 
  - Switched to sysvinit from systemd (it's rhel-6)
+
===General features===
  - Fixed license tag Related: rhbz#632853
+
----------------
  - pptpd New version
+
- Based on CentOS 6.9 and all available updates
  - Dropped pppd-unbundle patch (upstreamed)
 
  - Various fixes according to Fedora review Related: rhbz#632853
 
  - Modified for Fedora Resolves: rhbz#632853
 
  - Update to upstream version 2.3.4, which fixes CVE-2012-3478 and CVE-2012-2252
 
  - Updated rsync-protocol.patch to fix CVE-2012-2251, and to apply on top of the
 
   CVE-2012-3478 and CVE-2012-2252 fixes.
 
  - Updated makefile.patch to preserve RPM CFLAGS.
 
  - Added command-line-error.patch (from Debian), correcting error message
 
  generated when insecure command line option is used (CVE-2012-3478 fix
 
  regression).
 
  - Rebuilt for https://fedoraproject.org/wiki/Fedora_18_Mass_Rebuild
 
  - Add patch for rsync3 compat (#485946)
 
  - Update runit to 2.1.2
 
  - Remove now uneeded obsolete directives
 
  - Remove openssl from the Exclude list of centos repo
 
  - Add a default Yum db property for check4contribsupdates
 
- Added a check-update for the smecontribs repository
 
- Move protected package list to the correct location
 
  
====General features====
 
- Based on CentOS 6.7 and all available updates
 
  
====Known issues====
+
Terry Fage
* It can happen that during installation or after changing network interfaces, they appear in reverse order to the system, leaving the network (LAN/WAN) non functional. This has been fixed.
+
---------
 +
- On behalf of the Koozali SME Server development team
 +
- Compilation of release data is thanks to Ian Wells
  
Fixed in e-smith-base-5.6.0-10
+
[[Category:SME Server Releases]]
 +
[[Category:Release Note]]

Latest revision as of 10:27, 27 April 2021


We dedicate this release of SME Server 9.2 to Tony Keane who passed away on 1st April, 2016. He was a long time user and supporter of Koozali SME Server and one of the founding members of the Koozali Foundation.

SME Server 9.2 Final (Tony Keane)

The SME Server development team is pleased to announce the release of SME Server 9.2 which is based on CentOS 6.9, Release Notes detailed below.

Bug reports and reports of potential bugs should be raised in the bug tracker (and only there, please);

   http://bugs.contribs.org/


The Koozali SME Server project

The Koozali Foundation Inc. is a nonprofit corporation that governs the open source Koozali SME Server project. Koozali SME Server is a stable, secure and easy to use/manage linux server that provides common server functionalities out of the box. Many open source contributions are available that can extend the default server functionality making Koozali SME Server an even more powerful and flexible business server solution. Thousands of Koozali SME Severs have been deployed as real or virtual servers and in the cloud to serve many small to medium enterprises, and this number is growing day by day. The Koozali SME Server is free to use but it takes a lot of effort and money to develop, make, and maintain. We therefore ask you for your considerations.

Volunteering

Koozali Foundation Inc. together with its community hosted at https://contribs.org is a collaborative effort of volunteers. You too can contribute to the development and continuity of the Koozali SME Server project as described on our volunteering page. Everybody is welcome to join the already 4000+ member contribs.org community and can contribute with any skill set.

Financial donations

You can also show your support by making financial donations. The preferred way to make financial donations is using the donate option in the forums. You are free to choose any amount and frequency, being monthly, yearly or only once. The benefit of donating through your forums account is that your forum user name will receive a badge, showing your donation status. If you do not have a forum account, you can create one, or select the below PayPal option to make your donations.

Commercial usage

Organizations that use Koozali SME Server for their business, provide professional services related to SME Server or in any other way benefit commercially from the Koozali SME Server project, are kindly requested to consider regular financial donations that reflect their business benefits.

Koozali Foundation Inc. is happy to supply an invoice for any donations received. For more information on invoicing please send a mail to treasurer@koozali.org.

Thank you for your considerations and support!

Download

THIS VERSION IS NOW EOL
You can download Koozali SME Server 9.2 from http://mirror.contribs.org/smeserver/releases/9.2/iso/ or for other methods see http://wiki.contribs.org/SME_Server:Download

Please note it may take up to 48 hours for mirrors to finish syncing, during this time you may experience problems.

About SME Server

SME Server is the leading Linux distribution for small and medium enterprises. SME Server is brought to you by Koozali Foundation, Inc., a non-profit corporation that exists to provide marketing and legal support for SME Server.

SME Server is freely available under the GNU General Public License and is only possible through the efforts of the SME Server community. However, the availability and quality of SME Server is dependent on meeting our expenses, such as hosting costs, server hardware, etc.

As such, we ask for a donation to offset costs and fund further development. a) If you are a school, a church, a non-profit organisation or an individual using SME Server for private purposes, we would appreciate you to contribute within your means toward the costs associated with hosting, maintenance and development. b) If you are a company or an integrator and you are deploying SME Server in the course of your work to generate revenue, we expect you to make a donation commensurate with the level of revenue you generate and the number of servers your have in the field. Please, help the project

Please visit http://wiki.contribs.org/Donate to donate.

Koozali Inc is happy to supply an invoice for any donations received, simply email treasurer@koozali.org

Thanks

The development team would like to thank all of those who have involved themselves with this release.

Note

In-place upgrades from SME Server prior to version 9.0 are not supported. It is necessary to backup and then restore. /boot partition is always RAID 1.

The spare handling for RAID arrays is not implemented.

USB installs are now supported, see: http://wiki.contribs.org/Install_From_USB#SME_Server_9


Installing

Hardware requirements

Installation procedure


Warning.png Warning:
SME 9.2 ISO only, DO NOT enable nic bonding on an initial install when server only mode is selected.

If your hardware has two network adapters installed or there are two nics configured in a VM and you have selected server only mode during the install you will be offered the opportunity to enable bonding of the nics, the current SME 9.2 ISO has an issue with this initial configuration and a loss of connectivity will result on reboot. DO NOT enable bonding on initial install, carry out a yum update after initial install and then reconfigure and enable bonding if that is your wish.


Upgrading

SME 9

Important.png Note:
In-place upgrades to SME 9.2 *are* supported - from 9.# only. # yum upgrade or yum update, see note below for caveats.


Important.png Note:
Although a yum upgrade should return a working updated server, to be 100% sure, you are advised to only upgrade clean machines, e.g. without contribs or other modifications.

yum upgrade forces the removal of obsolete packages, while yum update may or may not also do this. The removal of obsolete packages can be risky, as it may remove packages that you use.

This makes yum update a safer option when not knowing state of server..


Please see The Addendum for additional notes released after initial ISO release.

DVD/CD

This is the most affordable way to get a clean and secure upgrade. During the upgrade process the existing installation is detected and the option to upgrade the existing system is displayed.

Yum

Even if possible and tested the yum upgrade must be performed only with stable internet connections and, preferably, not remotely. Loosing connection may leave your system in an unknown state.

Check for known issues, here Dashboard and at open bugs for SME 9 in bugzilla.

Check for contrib packages that may need upgrading

Even though it is recommended that you only upgrade clean machines (e.g. without contribs or other modifications), it may be possible that you have a contrib installed that you forgot about. After the upgrade, check if any contribs may require an upgrade from the smecontribs repository.

Known issues when upgrading from previous SME9.x

QPSMTPD stop accepting incoming mails

Some plugins have a different name with the new version of qpsmtpd, the service in charge of the incoming emails. This is why some template custom and some not up to date contribs could make this service fail to start.

1. you must take attention to upgrade 3 contribs (if they are already installed) related to email, otherwise you server might stop receiving email

  1. smeserver-mailstat >=1.1-9 (or your daily mail stats will be incomplete but email will work)
  2. smeserver-geoip >=1.1.2-7 (as geoip database have changed)
  3. smeserver-wbl >=0.3.0-14 (or will prevent email service to start)
yum update --enablerepo=smecontribs

2. you must pay attention with current custom-templates related to qpsmtpd. A quick way to check is

/sbin/e-smith/audittools/templates

If you see any templates in /etc/e-smith/templates-custom/var/service/qpsmtpd/config/peers/, we suggest you to remove them.

mkdir /root/qpsmtpd-old-custom-templates
mv /etc/e-smith/templates-custom/var/service/qpsmtpd/config/peers /root/qpsmtpd-old-custom-templates/
signal-event email-update

You can then put them one after the other if you want to test them individually and really want some of them back. You can see a list of available plugins to control the name of your custom-templates by doing

ll /usr/share/qpsmtpd/plugins

templates-custom related to plugins with new names known to conflict

  1. 10check_earlytalker see Qpsmtpd_check_earlytalker
  2. 31check_badmailfromto see Email#How_to_block_email_from_one_address_to_another_address_with_check_badmailfromto_plugin
Access to web panel of some contribs

Security has been increased for the authorization mechanism and as a result the following 3 contribs need to be updated to keep access to their panel :

  1. smeserver-BackupPC
  2. smeserver-phpki
  3. smeserver-freepbx
  4. smeserver-isoqlog

the following should solve this:

yum update  smeserver-BackupPC smeserver-phpki smeserver-freepbx smeserver-isoqlog --enablerepo=smecontribs
no external network access when using bonding

with e-smith-base-5.6.0-30.el6.sme.noarch.rpm provided on the SME 9.2 ISO, if you are using bonding of two network interfaces (e.g. server-only with two indentical network adapter) the default route to the gateway is not created. to check if you have any bonding on your server:

# ifconfig |grep bond

If it returns something then you have bonding. This is fixed in e-smith-base-5.6.0-31.el6.sme.noarch.rpm available in smeupdates since May the 4th, so you have nothing to worry if ou simply did a yum update after this date. If you installed the previous from an iso and do not have network here is how to fix this ( you can replace `db configuration get GatewayIP` by your gateway IP if you know it, but this command should give the value you previously configured). Alternatively. from SME9.2 iso you can just configure your server without bonding, do a yum update and use console to reconfigure your server with bonding.

route add default gateway `db configuration get GatewayIP`
yum update e-smith-base 
signal-event post-upgrade; signal-event reboot

SME 8

Important.png Note:
In-place upgrades from SME 8.# to SME 9.x using yum or CD are not supported due to design constraints imposed by CentOS.

It is necessary to backup the old server & then restore to the new server. Contribs will need to be reinstalled.


The simplest way to do this is via a Console Backup to attached USB disk on the old server. Alternatively use one of the Backup & Restore options available in server manager panel, ie backup to desktop, or backup to workstation (either to attached USB or network share). Other non standard options exist to Backup virtual servers that do not have USB ports etc, & Restore to similar virtual systems, eg using ssh.


Information.png Tip:
The Restore from USB on first boot function (on a newly installed SME 9 server), will only utilise backups that are saved as smeserver.tgz files, which are the Console backup to USB or the server manager backup to Desktop. The server manager backup to Workstation (either to USB or network share) creates a "backupdate.dar" type filename (or multiple split parts) & cannot be used to restore using the Restore on first boot function, it can only be used for restores from server manager.



Information.png Tip:
After a Restore to new hardware, networking may not be functional. This is caused by the restored NIC settings being incorrect for the NIC's in the new hardware. To fix this, login as admin & from the console menu select Configure this server. Step through the screens & choose the new hardware network card (NIC) drivers, & leave other settings unchanged.


Upgrade via Console backup to USB drive

  • Log in as admin & Backup the old server via a Console Backup to attached USB disk. This may take many hours if you have a lot of data on your server, depending on USB port speed, USB drive speed, & types of files being backed up ie whether already compressed or not etc. Typically for 250Gb of data on your server hard drive, 2 to 4 hours.
  • Install the SME 9.x OS from CD on the new hardware (on new server).
  • Select to do a Restore on first boot of the newly installed SME Server 9. Only attach USB containing the backup file, when asked on first reboot. Restore may take a few hours depending on data size etc. Make sure you wait for the Restore complete message.

Upgrade via server manager backup to Desktop or Workstation (USB or network)

  • On the old server in server manager, configure the required backup in the Backup or Restore panel. Schedule the backup to run at a suitable time. This backup can be to a workstation desktop for systems with a smaller amount of data, which creates a smeserver.tgz backup file, or to a locally connected USB drive or to a network share, & creates xx...xx.dar files, split into multiple parts if configured & data size is large. This may take many hours to run depending on data size etc.
  • On the new SME9 server, manually configure the identical backup job in the server manager Backup or Restore panel. The backup job MUST point to the exact same location that the original backup file is saved to.
  • Select the Restore function within server manager & select the full backup you want to restore from. This may take many hours to run depending on data size, network speed etc. Make sure you wait for the Restore complete message.
  • Basic networking configuration of the new and/or restored SME9 server will be required if different from original server.

Upgrade using command line restore via ssh or USB

  • It is possible to use the command line to transfer a backup file via ssh (or USB) to the new server & then to run the restore. Standard & non standard backup concepts & procedures are outlined in the Backup server config Howto, http://wiki.contribs.org/Backup_server_config If using any non standard method, then the integrity of your SME server data cannot be guaranteed.
  • To do a standard backup & restore using CLI, on the old server log in as admin & perform the Console Backup to USB drive (to a locally connected USB). Alternatively using suitable commands, a smeserver.tgz backup file could be created & saved to / folder, refer Howto.
  • Install the SME 9.x OS from CD on the new hardware (on new server).
  • Answer No when asked if you want to restore from USB during the first boot.


  • If you created or have the backup file on the old server, transfer the smeserver.tgz backup file via ssh from your old server to your new server. Both servers must be connected & remote access enabled
  • On the old server do:
scp -P zzzz /smeserver.tgz newserverIP:/

(where zzzz = port number)


  • If you saved the backup file to USB, then transfer the smeserver.tgz backup file from USB to your new server
  • Log in as root or a root user on the new server & do:
mount /media/usbdisk
cp /media/usbdisk/Backup-date-folder/smeserver.tgz /

(replace usbdisk with actual mount point name & Backup-date-folder with actual folder date name)

  • After the backup file has been copied to the new server, on the new server do:
cd /
signal-event pre-restore
tar -C / -xzvf smeserver.tgz
/sbin/e-smith/signal-event post-upgrade
/sbin/e-smith/signal-event reboot
  • Before restarting the new server, disconnect old server from network (as you will have clashes due to duplicate IPs)
  • On new server do:
cd /
rm smeserver.tgz
  • Note the backup & restore may take many hours to complete depending on data size etc.
  • After restore, the Configuration of the new server should be identical to the old server.
  • Note with two servers connected during ssh copying operations, basic networking configuration of the new unrestored SME9 server will need to be temporarily different to the old server to avoid clashes

Reinstall Contribs after restore

Add on contrib rpm packages will need to be re-installed on the new SME 9.x server as these are NOT included in the backup. Contrib data & configuration is included in backups & will be restored, but its usefulness will depend on the contrib design being unchanged between older (SME7/el4 or SME8/el5) & SME9/el6 package versions.

Delete & Reconfigure Manual tweaks

Other manual tweaks eg custom templates or scripts, will need to be deleted & recreated in line with SME 9.x template code & base code.

Where extensive modifications have been made to the "old server (eg SME8.1)", it is recommended to carry out a test backup & restore upgrade first, to discover any problems & ascertain suitable fixes & workarounds. Removing contribs & custom templates before upgrading is recommended.

Known issues upgrade from SME8

1. You might want to check what are the current installed extra rpm on your old SME 8 to be able to simply install them on your new SME 9. Usually this is simply done this way :

# /sbin/e-smith/audittools/newrpms
Loaded plugins: fastestmirror, protect-packages, smeserver
Loading mirror speeds from cached hostfile

Cannot find a valid baseurl for repo: base
YumRepo Error: All mirror URLs are not using ftp, http(s) or file.
Eg. Invalid release/
removing mirrorlist with no valid mirrors: /var/cache/yum/base/mirrorlist.txt

This is because Centos mirror are no longer available. Do not worry there is a workaround :

db yum_repositories setprop base BaseURL  'http://vault.centos.org/5.11/os/$basearch/'
db yum_repositories setprop updates BaseURL  'http://vault.centos.org/5.11/updates/$basearch/'
db yum_repositories delprop base MirrorList
db yum_repositories delprop updates MirrorList
signal-event yum-modify
yum clean all

and then you can issue the good old command without issue:

/sbin/e-smith/audittools/newrpms

2. You might also want to check SME9 specific issues as some might apply also for a migration from SME8.

RAID

/boot partition is always RAID 1.

The spare handling for RAID arrays is not implemented.


Koozali SME Server 9.2 Release Notes

26 April 2017

The Koozali SME Server (SME Server) development team is pleased to announce the release of SME Server 9.2 Final which is based on CentOS 6.9

Bug reports and reports of potential bugs should be raised in the bug tracker (and only there, please);

   http://bugs.contribs.org/

Download

You can download Koozali SME Server 9.2 from http://mirror.contribs.org/smeserver/releases/9.2/iso/ or for other methods see http://wiki.contribs.org/SME_Server:Download

Please note it may take up to 48 hours for mirrors to finish syncing, during this time you may experience problems.

About SME Server

SME Server is the leading Linux distribution for small and medium enterprises. Loozali SME Server is brought to you by Koozali Foundation, Inc., a non-profit corporation that exists to provide marketing and legal support for SME Server.

SME Server is freely available under the GNU General Public License and is only possible through the efforts of the SME Server community. However, the availability and quality of SME Server is dependent on meeting our expenses, such as hosting costs, server hardware, etc.

As such, we ask for a donation to offset costs and fund further development.

a) If you are a school, a church, a non-profit organisation or an individual using SME Server for private purposes, we would appreciate you to contribute within your means toward the costs associated with hosting, maintenance and development.

b) If you are a company or an integrator and you are deploying SME Server in the course of your work to generate revenue, we expect you to make a donation commensurate with the level of revenue you generate and the number of servers your have in the field. Please, help the project

Please visit http://wiki.contribs.org/Donate to donate.

Koozali Inc is happy to supply an invoice for any donations received, simply email treasurer@koozali.org

Tony Keane

It is with huge sadness that we learnt the passing of Tony Keane on Friday 1st April, 2016. He was a long time user and supporter of Koozali SME Server and one of the founding members of the Koozali Foundation. We dedicate this release of SME Server 9.2 to Tony. Without him and a handful of others the community would not have been secured with the Koozali foundation and our current cluster of servers to build and maintain your favourite distro. If you download and use it, please remember him and his work, and that of all the other contributors who work tirelessly to make Koozali SME as good as it is.

We extend our thoughts and deepest sympathies to his family.

https://wiki.koozali.org/Tony_Keane

Notes

In-place upgrades are not supported. It is necessary to backup and then restore. /boot partition is always RAID 1.

The spare handling for RAID arrays is not implemented.

USB installs are now supported, see: http://wiki.contribs.org/Install_From_USB#SME_Server_9

Major changes in this release

  • Updated all to Koozali branding.
  • Server Manager - Allow access to the server-manager without SSL from the loopback, Don't redirect to http when login in/out of the server-manager from localhost.
  • File Server - added W10 support to SME Domain. Add support for specifying TLSv1.1 and TLSv1.2
  • LDAP - Hook into the new ssl-update event.
  • Mail Server - Update qpsmtpd to release 0.99.6 (including multiple plugins and ability to ebale/disable same), Allow reading SSL_version from the tls_protocols config file (and turn TLSv1 back on by default), Modify whitelist_soft transaction to interact with dnsbl filter, Revert forcing TLSv1 patch as it breaks some inbound delivery, Remove karma rcpt handling, Check rua is defined before trying to parse it to prevent an error if a domain has a DMARC entry published with no rua, add support for the uribl plugin, add detailed spamassassin report headers.
  • Web Server - Hook into the new ssl-update event, Set TLSv1 back to enabled (but keep a prop to disable it if needed).
  • Other fixes and updates - Correctly display http URL to the server-manager in the console, Remove motd text from grub.cfg.

Detailed changes in this release

Only the changes since SME Server 9.1 are listed, mainly autogenerated from the changelogs.

Packages altered by Centos, Redhat, and Fedora-associated developers are not included.

Text With Bug Numbers Text for ISO Release Notes with Bug Numbers The changelogs are written per package, and each package is assigned a group.

File Server


- fix outlook error code 0x8004011c when setting up and email account on a win10 computer joined to a domain (with   roaming profiles) [SME: 10106]
- Create V6 profile dir (for Win10 roaming profiles) [SME: 9772]
  proftpd
- Additional tweak (to avoid null pointer dereference) for upstream bug 3868
- Fix for CVE-2016-3125: usage of 1024 bit DH key even with manual parameters
  see (http://bugs.proftpd.org/show_bug.cgi?id=4230)
- Also fixed related issue where only first DH param in TLSDHParamFile is used,
  regardless of requested keylength (http://bugs.proftpd.org/show_bug.cgi?id=3868)
- Fix SUID/SGID directory permission setting regression introduced with fix
  for CVE-2012-6095 (#1297264)
- Add support for specifying TLSv1.1 and TLSv1.2 (#1281493)

LDAP


- Disable SSLv3, but keep the possibility to enable it again [SME: 10113]
- Better default cipher suite, and honor global suite [SME: 10113]
- Hook into the new ssl-update event [SME: 9152]

Localisation


- apply locale 2017-03-03 patch from pootle [SME: 9592]
- Eliminated rpmbuild "bogus date" warnings due to inconsistent weekday,
  by assuming the date is correct and changing the weekday.

Mail Server


- Update to release 0.99.2 [SME: 9489]
- Add pcre-devel to BuildRequires [SME: 9151]
- Hook into a new ssl-update event [SME: 9152]
- Allow setting SSL protocols from DB (and set TLSv1 back to enabled
  on a default install) [SME: 9175]
- Disable TLSv1 [SME: 9169]
- Add possibility to exclude users or members of other groups from group
  email address [SME: 9540]
- Consider literal <> as null sender [SME: 9883]
- Removed Message-Id validation, as it rejects MS account validation email [SME: 9773]
- fix whitelist plugin to support helo with naughty rejecting at mail stage [SME: 10111]
- Validate domains found in uribl with Data::Validate::Domain [SME: 9499]
- Use eval to fetch dkim policies, prevent fatal errors in case of DNS
  timeout [SME: 9504]
- Remove karma rcpt handling (buggy and doesn't make a lot of sense) [SME: 9502]
- Check rua is defined before trying to parse it to prevent an errorif a domain has a DMARC
  entry published with no rua [SME: 9507]
- Fix error when RCPT TO is not valid [SME: 8861]
- Fix karma logic by checking negative strikes [SME: 9502]
- Backport a fix for karma_tool so it can find its database [SME: 9502]
- Update to 0.96 (with some backports from GIT head) [SME: 8861]
- Allow reading SSL_version from the tls_protocols config file (and turn TLSv1 back on by default)
  [SME: 9162]
- Correctly log login attempts with nulls in login name [SME: 9167]
- Disable TLSv1 [SME: 9162]
- remove whitelist_soft [SME: 10125]
- Disable unofficial sigs for filesystem scans [SME: 9142]
- Better default cipher suite, and honor global suite [SME: 10114]
- Hook into the new ssl-update event [SME: 9152]
- Allow settings SSL protocols from DB (and set TLSv1 back to enabled on a default install)
  [SME: 9175]
- Disable TLSv1 [SME: 9175]
- updated regex for SBList in smeserver-qpsmtpd-2.4.0-change_rbl_sbl_list_separator.patch to take into
  account list using a subdomain [SME: 10116]
- Eliminated rpmbuild "bogus date" warnings due to inconsistent weekday, by assuming the date is correct
  and changing the weekday.
- Set the default helo policy to lenient [SME: 9767]
- Turn SPF and DMARC rejects off by default [SME: 9654]
- Fix disabling DMARC reporting [SME: 9507]
- Remove o and r DKIM fields as they are not standard [SME: 9506]
- In qpsmtpd-print-dns set DKIM options after the public key so the string will still be split correctly 
  [SME: 9506]
- Fix a syntax error in the qpsmtpd-print-dns script [SME: 9507]
- Remove warning about spool dir permission on startup [SME: 9511]
- Add missing patch for DKIM signing [SME: 9506]
- Add missing run time dependency on perl(DBD::SQLite) [SME: 9507]
- Check SPF for inbound emails [SME: 9505]
- Check DKIM for inbound emails [SME: 9504]
- Check DMARC for inbound emails (based on the previous SPF and DKIM checks) [SME: 9507]
- Store and send DMARC aggregate reports [SME: 9507]
- Support DKIM signing for outbound emails [SME: 9506]
- Use an additional badrcptto file list for external connections so local only pseudonymes work as expected 
  [SME: 9503]
- Enable the bogus_bounce plugin [SME: 9501]
- Use the naughty plugin to defer rejections, leaving users an opportunity to authenticate [SME: 9500]
- Add support for the uribl plugin [SME: 9499]
- Change separator for SBList and RBLlist from : to , [SME: 9498]
- Switch to the clamdscan plugin [SME: 9497]
- Enabe the loadcheck plugin [SME: 9508]
- Add support for the karma plugin [SME: 9502]
- Work with qpsmtpd 0.96 [SME: 8861]
- Expand all ssl related conf in ssl-update [SME: 9152]
- Hook into a new ssl-update event [SME: 9152]
- Allow setting SSL protocols from DB [SME: 9162]
- Rewrite spamd run script to add support for --allow-tell [SME: 10138]
- Add X-Spam-Details header (and simplify X-Spam-Status) [SME: 9509]
- Disable ipv6 support to prevent a warning during startup [SME: 9153]

Server manager


- reapply patch 4
- Update server-manager to Koozali branding [SME: 9678]
- move fix to the right line to be effective [SME: 9920]
- fix bad redirection parameter that might reveal session information to remote site temporarily
  reverting patch 4 for fast release of security fix please put it back at next release  [SME: 9920]
- Update server-manager to Koozali branding [SME: 9678]
- e-smith-manager-2.6.0-Koozali_manager.patch better syntax for removing Indexes option for the manager [SME: 9589]
- Remove index option for manager's resources [SME: 9589]
- fix 307 redirection to http when https is used [SME: 8825]
- update syntaxe for TKT Auth, bump 7 for typo, corrected typo in e-smith-manager-2.4.0 
  dont_rewrite_to_https_from_localhost.patch code from John H. Bennett III bennettj@johnbennettservices.com 
  [SME: 9271]
- Really don't redirect to http when login in/out of the server-manager [SME: 9163]
- Don't redirect to http when login in/out of the server-manager from localhost [SME: 9163]
- Allow access to the server-manager without SSL from the loopback [SME: 9163]
- don't set environmental variable based on user supplied Proxy request header CVE-2016-5385
- fix wrong warning in openssl_encrypt() for missing IV when IV is not required #1260315
- fix segfault's when you try and allocate an SplFixedArray with size >= 9999 #1071344
- segfault in php_pgsql_meta_data CVE-2015-4644 #1234434
- add options to enable TLS in curl #1255920
- fix segfault in gc_collect_cycles #1122681

Web Server


- Hook into the new ssl-update event [SME: 9152]
- Set TLSv1 back to enabled (but keep a prop to disable it if needed) [SME: 9154]
- Disable TLSv1 [SME: 9154]

Other fixes and updates

- Use ip route syntax to define routes to local network [SME: 9905]
- Allow /32 masks on the external interface, in which case we don't
  check if the gateway is on the correct network) [SME: 9765]
- Add a column to display forwarding address [SME: 9174]
- Correctly display http URL to the server-manager in the console [SME: 9163]
- Fire ssl-update event when default cert is renewed [SME: 2257]
- Expand /home/e-smith/ssl.pem/pem during ssl-update [SME: 9152]
- Quote filenames in genfilelist so filenames containing spaces are correctly
  handled [SME: 9758]
- Remove motd text from grub.cfg [SME: 9161]
- Allow empty comment when creating/modifying a hostname [SME: 9177]
- Remove double / in SSL RewriteRule [SME: 9195]
- Adjust regex so adjust-service accepts sigusr1 and sigusr2 from files [SME: 9184]
- Allow custom file descriptor limit, and set default to 4096 [SME: 9911]
- Rebase on upstream 9.03.53-1 [SME: 9534]
- Roll in CentOS Branding
- functions: parse -d first
- functions: fix ignored delay in killproc
- netfs: only unmount loopback device mounted on top of netdev or with back-file on netdev
- functions: improve killing loops
- netfs: tweak nfs umount
- sysctl.conf: mention sysctl -a
- sysconfig.txt: document PPPOE_EXTRA and PPPD_EXTRA
- spec: require plymouth
- fix mangled sysconfig/init.s390
- rc.sysinit: don't perform fsck twice with /.autorelabel
- ifdown-eth: fix comparison
- ifup-eth: if arping fails, output responding MAC
- network-functions: fix change_resolv_conf after grep update
- spec: add sysctl.d dir
- rc.sysinit: fix typo in fs
- rename_devices: comments need to have a blank before them
- rename_device: remove comments and trailing whitespaces
- bonding: warn if the ifup for slave device failed
- clarify daemon() usage message
- ifdown: clean ipv4 localhost addresses
- ifup-post: check resolve.conf also with DNS2
- ifup: add missing quotes
- ifup-eth: some bridge options are applied later
- init.d/halt: give init some time to reexecute
- network-scripts: DEVICE and HWADRR could be quoted by apostrophe
- ifup-wireless: fix calling of phy_wireless_device
- rc.sysinit: apply quotas after system is relabeled
  mod_auth_tkt
- backport to SME9 fix redirection when proxy ssl [SME: 8825]
- update apxs path for SME9 (sbin)
- Bump for beta1 release of 9.2 [SME: 9525]
- updated sources with new pictures fix hover color [SME: 9678]
- Koozali branding of manager [SME: 9678]
- Eliminated rpmbuild "bogus date" warnings due to inconsistent weekday,by assuming the date is correct and
  changing the weekday.
- Update copyright in server-manager footer [SME: 9266]
- Don't put motd content in /etc/redhat-release [SME: 9161]
- added centos SCLo SIG gpg rpm signing key [SME: 10102]
  will allow to install SCL packages directly from smecontribs

General features


- Based on CentOS 6.9 and all available updates


Terry Fage


- On behalf of the Koozali SME Server development team - Compilation of release data is thanks to Ian Wells