Changes

From SME Server
Jump to navigationJump to search
689 bytes removed ,  21:39, 17 March 2017
Line 1: Line 1:  
{{Languages}}
 
{{Languages}}
   −
==SME Server 9.1 Release Notes==
+
==SME Server 9.2 Release Notes==
    
The SME Server development team is pleased to announce the release of
 
The SME Server development team is pleased to announce the release of
SME Server 9.1 which is based on CentOS 6.7 [http://lists.contribs.org/pipermail/updatesannounce/2015-December/000436.html Full Release Notes]
+
SME Server 9.2RC1 which is based on CentOS 6.8 [https://lists.contribs.org/pipermail/updatesannounce/2017-March/000457.html Release Notes]
    
Bug reports and reports of potential bugs should be raised in the bug
 
Bug reports and reports of potential bugs should be raised in the bug
Line 14: Line 14:     
===Download===
 
===Download===
<center>
+
You can download Koozali SME Server 9.2 RC1 from
{{currentreleases}}
+
http://mirror.contribs.org/smeserver/releases/testing/9.2.RC1/
</center>
+
or for other methods see http://wiki.contribs.org/SME_Server:Download
 +
 
 +
Please note it may take up to 48 hours for mirrors to finish syncing,
 +
during this time you may experience problems.
    
===About SME Server===
 
===About SME Server===
Line 38: Line 41:  
commensurate with the level of revenue you generate and the number of servers
 
commensurate with the level of revenue you generate and the number of servers
 
your have in the field. Please, help the project
 
your have in the field. Please, help the project
 +
 +
Please visit http://wiki.contribs.org/Donate to donate.
    
Koozali Inc is happy to supply an invoice for any donations received,  
 
Koozali Inc is happy to supply an invoice for any donations received,  
Line 45: Line 50:  
The development team would like to thank all of those who have involved
 
The development team would like to thank all of those who have involved
 
themselves with this release.
 
themselves with this release.
 +
 +
===Note===
 +
In-place upgrades are not supported. It is necessary to backup and then restore.
 +
/boot partition is always RAID 1.
 +
 +
The spare handling for RAID arrays is not implemented.
 +
 +
USB installs are now supported, see:
 +
http://wiki.contribs.org/Install_From_USB#SME_Server_9
 +
    
===Installing===
 
===Installing===
Line 136: Line 151:  
The spare handling for RAID arrays is not implemented.
 
The spare handling for RAID arrays is not implemented.
   −
===Changes===
+
Major changes in this release
 
+
=============================
==== Changes from SME9rc1====
+
Major Changes in this release. Updated all to Koozali branding. Server Manager - Allow access to the server-manager without SSL from the loopback, Don't redirect to http when login in/out of the server-manager from localhost. File Server - added W10 support to SME Domain. LDAP - Hook into the new ssl-update event. Mail Server - Update qpsmtpd to release 0.99.6 (including multiple plugins and ability to ebale/disable same), Allow reading SSL_version from the tls_protocols config file (and turn TLSv1 back on by default), Modify whitelist_soft transaction to interact with dnsbl filter, Revert forcing TLSv1 patch as it breaks some inbound delivery, Remove karma rcpt handling, Check rua is defined before trying to parse it to prevent an error if a domain has a DMARC entry published with no rua, add support for the uribl plugin, add detailed spamassassin report headers. Web Server - Hook into the new ssl-update event, Set TLSv1 back to enabled (but keep a prop to disable it if needed). Other fixes and updates - Correctly display http URL to the server-manager in the console, Remove motd text from grub.cfg.  
USB Install working once again
  −
 
  −
Anaconda lang syntax error
  −
 
  −
====Changes from Beta 4====
  −
 
  −
USB installs now supported.<br />
  −
See: http://wiki.contribs.org/Install_From_USB#SME_Server_9
  −
 
  −
RAID 'n' now supported.
  −
 
  −
ISOLINUX menu screen added.
  −
 
  −
Allow workstation backup to mounted drive.
     −
====Changes from Beta 3====
  −
The installer has been substantially modified in Beta 3.
     −
The remaining relevant patches from SME Server 8 have been ported.
+
Detailed changes in this release
 +
=======================
   −
Note: The spare handling for RAID arrays is not implemented.
+
Only the changes since SME Server 9.1 are listed, mainly autogenerated from the changelogs.
Workstation Backup has had many minor changes, see below for details.
     −
A new feature has been introduced to block SSH login attempts,
+
Packages altered by Centos, Redhat, and Fedora-associated developers are not included.
http://wiki.contribs.org/AutoBlock
     −
It is set by default to reject SSH connections when there have been 3
+
Text With Bug Numbers
or more requests in the previous 15 minutes.
+
Text for ISO Release Notes with Bug Numbers
 
+
The changelogs are written per package, and each package is assigned a group.
See the link above to tune the defaults, or to disable:
  −
 
  −
db configuration setprop sshd AutoBlock enabled
  −
 
  −
signal-event remoteaccess-update
  −
 
  −
====Changes from Beta 2====
  −
The installer has been substantially modified in Beta 2.
  −
It now creates the degraded RAID1 array with a single disk install.
  −
Some, but not all,  install options are now supported.
  −
 
  −
The base has been updated to CentOS 6.5
  −
 
  −
The network interface code has been reworked to remove all hardcoding
  −
relating to eth0 and eth1.
  −
 
  −
===Major changes in this release===
  −
Added functionality to use a Dummy NIC for the internal interface.
  −
Set the check update frequency of smecontribs through the server-manager.
  −
Disable SSLv3.
  −
Added Windows 10 support for SME Domain.
  −
 
  −
====Changes in this release====
  −
Only the changes since SME Server 9.0 are listed, mainly
  −
autogenerated from the changelogs.
  −
 
  −
Packages altered by Centos, Redhat, and Fedora-associated developers are
  −
not included.
  −
 
  −
Backups
  −
-------
  −
- dar new upstream version
  −
- dar add pkgconfig
  −
- The mountpoint is tested before attempting the console backup
  −
- Workstation Backup, do not fail backup for mtime/ctime mismatch
  −
- Change the sub checkMount() to findmnt Ian Wells <esmith@wellsi.com>
  −
- Add requires nfs-utils
  −
- The nfs service is neither started or allowed to start
  −
- Don't remove the apache group during restore
      
File Server
 
File Server
-----------
+
----------
  - The samba performance registry is now added in the win10samba.reg
+
  - Create V6 profile dir (for Win10 roaming profiles) [SME: 9772]
  - Fix samba audit parameters
+
  proftpd
  Patch from Jorge Gonzalez
+
  - Additional tweak (to avoid null pointer dereference) for upstream bug 3868
  Replace syslog template to rsyslog so samba audits are logged in the correct
+
- Fix for CVE-2016-3125: usage of 1024 bit DH key even with manual parameters
  file
+
   see (http://bugs.proftpd.org/show_bug.cgi?id=4230)
  Corrected typo in patch of bad character '“', relative to roaming profile
+
  - Also fixed related issue where only first DH param in TLSDHParamFile is used,
  e-smith-samba-2.4.0.bz9038.W10_registry.patch
+
   regardless of requested keylength (http://bugs.proftpd.org/show_bug.cgi?id=3868)
   Roaming profiles follow Windows version (.V2,.V3,.V4,.V5)
+
  - Fix SUID/SGID directory permission setting regression introduced with fix
  added W10 support to SME Domain
+
  for CVE-2012-6095 (#1297264)
  e-smith-samba-2.4.0.bz9038.W10_registry.patch
+
- Add support for specifying TLSv1.1 and TLSv1.2 (#1281493)
  - Added e-smith-samba-2.4.0.bz9048.RoamingProfileForW8.patch
  −
   Modified the registry file for roaming profile with W8
  −
  Roaming profiles follow Windows version (.V2,.V3,.V4,.V5)
  −
  - Add dependency on perl(Crypt::Cracklib), needed for ftpasswd --use-cracklib
  −
  Add -utils subpackage for support tools (#1258440), using a sub-package to
  −
  ensure that the main package does not require perl
  −
  Update ftpasswd to version from proftpd 1.3.5a for additional functionality
  −
  (SHA passwords, locking and unlocking of accounts)
  −
 
      
LDAP
 
LDAP
----
+
----------
- Remove size limit for search result
+
  - Disable SSLv3, but keep the possibility to enable it again [SME: 10113]
- Make pdbedit output independent from locale and timezone so it can be
+
  - Better default cipher suite, and honor global suite [SME: 10113]
  parsed
+
  - Hook into the new ssl-update event [SME: 9152]
- Symlink /etc/init.d/ldap to /usr/bin/sv
  −
- Chown all DB files to ldap before staring slapd
  −
- Set checkpoint in slapd.conf instead of DB_CONFIG
  −
- Stop ldap on shutdown (rc0 and rc6)
  −
  - Don't overwrite the ldif dump if slapcat's output is empty
  −
  (code from Charlie Brady)
  −
  - Run db_recover on startup
  −
  - Don't wipe LDAP DB when the ldif dump is empty
      
Localisation
 
Localisation
------------
+
----------
  - apply locale smeserver-locale-2.4.0-locale-2015-07-12.patch
+
  - apply locale 2017-03-03 patch from pootle [SME: 9592]
- apply locale smeserver-locale-2.4.0-locale-2015-07-01.patch
+
  - Eliminated rpmbuild "bogus date" warnings due to inconsistent weekday,
- apply locale 2015-03-14 patch from pootle
+
  by assuming the date is correct and changing the weekday.
  - apply locale 2014-12-25 patch from pootle
      
Mail Server
 
Mail Server
-----------
+
----------
  - ClamAV Updated to release 0.98.7
+
  - Update to release 0.99.2 [SME: 9489]
  - Remove the patch e-smith-email-5.4.0-UEsDBBQDAAAIA-new-signature.patch
+
  - Add pcre-devel to BuildRequires [SME: 9151]
  - Add new zip file signatures to default mailpatterns database : UEsDBBQDAAAIA
+
- Hook into a new ssl-update event [SME: 9152]
  - Add new zip file signatures to default mailpatterns database : ZIPVOSX & ZIPV3
+
  - Allow setting SSL protocols from DB (and set TLSv1 back to enabled
  - Disable fips mode on stunnel
+
  on a default install) [SME: 9175]
  - Use stunnel instead of sslio to support TLS
+
- Disable TLSv1 [SME: 9169]
  - Revert forcing TLSv1 patch as it breaks some inbound delivery
+
  - Add possibility to exclude users or members of other groups from group
  - Revert whitelist_soft dnsbl as it hasn't been verified yet and we need to
+
  email address [SME: 9540]
   push the fix for TLSv1
+
- Consider literal <> as null sender [SME: 9883]
  - Modify whitelist_soft transaction to interact with dnsbl filter
+
  - Removed Message-Id validation, as it rejects MS account validation email [SME: 9773]
   by John Crisp <jcrisp@safeandsoundit.co.uk>
+
  - fix whitelist plugin to support helo with naughty rejecting at mail stage [SME: 10111]
  - Force usage of TLSv1
+
  - Validate domains found in uribl with Data::Validate::Domain [SME: 9499]
  - Increase MemLimit to 700M for clamav-0.98
+
- Use eval to fetch dkim policies, prevent fatal errors in case of DNS
- Allow custom passdb args
+
  timeout [SME: 9504]
  - allow IP relayclient stored by DB
+
  - Remove karma rcpt handling (buggy and doesn't make a lot of sense) [SME: 9502]
   Code from Stefano ZAmboni <zamboni@mind-at-work.it>
+
- Check rua is defined before trying to parse it to prevent an errorif a domain has a DMARC
   & Charlie Brady <charlieb-contribs-bugzilla@budge.apana.org.au>
+
   entry published with no rua [SME: 9507]
  - allow IP relayclient stored by DB
+
- Fix error when RCPT TO is not valid [SME: 8861]
   Code from Stefano ZAmboni <zamboni@mind-at-work.it>
+
- Fix karma logic by checking negative strikes [SME: 9502]
 +
- Backport a fix for karma_tool so it can find its database [SME: 9502]
 +
- Update to 0.96 (with some backports from GIT head) [SME: 8861]
 +
- Allow reading SSL_version from the tls_protocols config file (and turn TLSv1 back on by default)
 +
  [SME: 9162]
 +
  - Correctly log login attempts with nulls in login name [SME: 9167]
 +
- Disable TLSv1 [SME: 9162]
 +
- remove whitelist_soft [SME: 10125]
 +
- Disable unofficial sigs for filesystem scans [SME: 9142]
 +
- Better default cipher suite, and honor global suite [SME: 10114]
 +
- Hook into the new ssl-update event [SME: 9152]
 +
- Allow settings SSL protocols from DB (and set TLSv1 back to enabled on a default install)
 +
   [SME: 9175]
 +
  - Disable TLSv1 [SME: 9175]
 +
  - updated regex for SBList in smeserver-qpsmtpd-2.4.0-change_rbl_sbl_list_separator.patch to take into
 +
  account list using a subdomain [SME: 10116]
 +
  - Eliminated rpmbuild "bogus date" warnings due to inconsistent weekday, by assuming the date is correct
 +
  and changing the weekday.
 +
   Thu May 11 2005 --> Thu May 05 2005 or Wed May 11 2005 or Thu May 12 2005 or ....
 +
   Sun Sep 25 2010 --> Sun Sep 19 2010 or Sat Sep 25 2010 or Sun Sep 26 2010 or ....
 +
- Set the default helo policy to lenient [SME: 9767]
 +
  - Turn SPF and DMARC rejects off by default [SME: 9654]
 +
- Fix disabling DMARC reporting [SME: 9507]
 +
- Remove o and r DKIM fields as they are not standard [SME: 9506]
 +
- In qpsmtpd-print-dns set DKIM options after the public key so the string will still be split correctly
 +
  [SME: 9506]
 +
- Fix a syntax error in the qpsmtpd-print-dns script [SME: 9507]
 +
- Remove warning about spool dir permission on startup [SME: 9511]
 +
- Add missing patch for DKIM signing [SME: 9506]
 +
- Add missing run time dependency on perl(DBD::SQLite) [SME: 9507]
 +
- Check SPF for inbound emails [SME: 9505]
 +
- Check DKIM for inbound emails [SME: 9504]
 +
- Check DMARC for inbound emails (based on the previous SPF and DKIM checks) [SME: 9507]
 +
- Store and send DMARC aggregate reports [SME: 9507]
 +
- Support DKIM signing for outbound emails [SME: 9506]
 +
- Use an additional badrcptto file list for external connections so local only pseudonymes work as expected
 +
   [SME: 9503]
 +
- Enable the bogus_bounce plugin [SME: 9501]
 +
- Use the naughty plugin to defer rejections, leaving users an opportunity to authenticate [SME: 9500]
 +
- Add support for the uribl plugin [SME: 9499]
 +
- Change separator for SBList and RBLlist from : to , [SME: 9498]
 +
- Switch to the clamdscan plugin [SME: 9497]
 +
- Enabe the loadcheck plugin [SME: 9508]
 +
- Add support for the karma plugin [SME: 9502]
 +
- Work with qpsmtpd 0.96 [SME: 8861]
 +
- Expand all ssl related conf in ssl-update [SME: 9152]
 +
- Hook into a new ssl-update event [SME: 9152]
 +
- Allow setting SSL protocols from DB [SME: 9162]
 +
- Rewrite spamd run script to add support for --allow-tell [SME: 10138]
 +
- Add X-Spam-Details header (and simplify X-Spam-Status) [SME: 9509]
 +
- Disable ipv6 support to prevent a warning during startup [SME: 9153]
    
Server manager
 
Server manager
--------------
+
----------
  - fix gzfile accept paths with NUL character #1213407
+
  - reapply patch 4
- fix patch for CVE-2015-4024
+
  - Update server-manager to Koozali branding [SME: 9678]
  - fix more functions accept paths with NUL character #1213407
+
  - move fix to the right line to be effective [SME: 9920]
- soap: missing fix for #1222538 and #1204868
+
  - fix bad redirection parameter that might reveal session information to remote site temporarily
  - core: fix multipart/form-data request can use excessive
+
   reverting patch 4 for fast release of security fix please put it back at next release [SME: 9920]
  amount of CPU usage CVE-2015-4024
+
  - Update server-manager to Koozali branding [SME: 9678]
- fix various functions accept paths with NUL character
+
  - e-smith-manager-2.6.0-Koozali_manager.patch better syntax for removing Indexes option for the manager [SME: 9589]
  CVE-2015-4026, #1213407
+
  - Remove index option for manager's resources [SME: 9589]
- ftp: fix integer overflow leading to heap overflow when
+
  - fix 307 redirection to http when https is used [SME: 8825]
  reading FTP file listing CVE-2015-4022
+
  - update syntaxe for TKT Auth, bump 7 for typo, corrected typo in e-smith-manager-2.4.0
- phar: fix buffer over-read in metadata parsing CVE-2015-2783
+
   dont_rewrite_to_https_from_localhost.patch code from John H. Bennett III bennettj@johnbennettservices.com
- phar: invalid pointer free() in phar_tar_process_metadata()
+
  [SME: 9271]
  CVE-2015-3307
+
  - Really don't redirect to http when login in/out of the server-manager [SME: 9163]
  - phar: fix buffer overflow in phar_set_inode() CVE-2015-3329
+
  - Don't redirect to http when login in/out of the server-manager from localhost [SME: 9163]
- phar: fix memory corruption in phar_parse_tarfile caused by
+
  - Allow access to the server-manager without SSL from the loopback [SME: 9163]
   empty entry file name CVE-2015-4021
+
  - don't set environmental variable based on user supplied Proxy request header CVE-2016-5385
- soap: more fix type confusion through unserialize #1222538
+
  - fix wrong warning in openssl_encrypt() for missing IV when IV is not required #1260315
  - soap: more fix type confusion through unserialize #1204868
+
  - fix segfault's when you try and allocate an SplFixedArray with size >= 9999 #1071344
  - core: fix double in zend_ts_hash_graceful_destroy CVE-2014-9425
+
  - segfault in php_pgsql_meta_data CVE-2015-4644 #1234434
- core: fix use-after-free in unserialize CVE-2015-2787
+
  - add options to enable TLS in curl #1255920
  - exif: fix free on unitialized pointer CVE-2015-0232
+
  - fix segfault in gc_collect_cycles #1122681
- gd: fix buffer read overflow in gd_gif.c CVE-2014-9709
  −
- date: fix use after free vulnerability in unserialize CVE-2015-0273
  −
- enchant: fix heap buffer overflow in enchant_broker_request_dict
  −
  CVE-2014-9705
  −
- phar: use after free in phar_object.c CVE-2015-2301
  −
- soap: fix type confusion through unserialize
  −
  - fileinfo: fix out-of-bounds read in elf note headers. CVE-2014-3710
  −
  - xmlrpc: fix out-of-bounds read flaw in mkgmtime() CVE-2014-3668
  −
- core: fix integer overflow in unserialize() CVE-2014-3669
  −
  - exif: fix heap corruption issue in exif_thumbnail() CVE-2014-3670
  −
- spl: fix use-after-free in ArrayIterator due to object
  −
  change during sorting. CVE-2014-4698
  −
- spl: fix use-after-free in SPL Iterators. CVE-2014-4670
  −
- gd: fix NULL pointer dereference in gdImageCreateFromXpm.
  −
   CVE-2014-2497
  −
- fileinfo: fix incomplete fix for CVE-2012-1571 in
  −
  cdf_read_property_info. CVE-2014-3587
  −
- core: fix incomplete fix for CVE-2014-4049 DNS TXT
  −
  record parsing. CVE-2014-3597
  −
- core: type confusion issue in phpinfo(). CVE-2014-4721
  −
- date: fix heap-based buffer over-read in DateInterval. CVE-2013-6712
  −
  - core: fix heap-based buffer overflow in DNS TXT record parsing.
  −
  CVE-2014-4049
  −
- core: unserialize() SPL ArrayObject / SPLObjectStorage type
  −
  confusion flaw. CVE-2014-3515
  −
- fileinfo: out-of-bounds memory access in fileinfo. CVE-2014-2270
  −
  - fileinfo: unrestricted recursion in handling of indirect type
  −
  rules. CVE-2014-1943
  −
- fileinfo: out of bounds read in CDF parser. CVE-2012-1571
  −
- fileinfo: cdf_check_stream_offset boundary check. CVE-2014-3479
  −
  - fileinfo: cdf_count_chain insufficient boundary check. CVE-2014-3480
  −
- fileinfo: cdf_unpack_summary_info() excessive looping
  −
  DoS. CVE-2014-0237
  −
  - fileinfo: CDF property info parsing nelements infinite
  −
  loop. CVE-2014-0238
  −
- add php_get_module_initialized internal function (#1053301)
  −
- soap: fixRFC2616 transgression (#1045019)
  −
  - fix static calling in non-static method (#953786)
  −
  - fix autoload called from closing session (#954027)
  −
  - drop unneeded part of CVE-2006-724.patch and fileinfo.patch
  −
  extension not provided or git binary patches (#1064027)
  −
  - odbc: fix incompatible pointer type (#1053982)
  −
  - mysqli: fix possible segfault in mysqli_stmt::bind_result
  −
  php bug 66762 (#1069167)
  −
- mysql: fix php_mysql_fetch_hash writes long value into int
  −
  php bug 52636 (#1054953)
      
Web Server
 
Web Server
 
----------
 
----------
  - DIsable SSLv3
+
  - Hook into the new ssl-update event [SME: 9152]
  - Revert CRIME mitigation patch, as it's not needed
+
  - Set TLSv1 back to enabled (but keep a prop to disable it if needed) [SME: 9154]
- Mitigate CVE-2012-4929
+
  - Disable TLSv1 [SME: 9154]
- Turn SSLEngine on in the SSL vhost (ProxyPassVirtualHosts)
  −
  - Remove obsolete gpc_order setting from php.ini.
  −
- Add an upload_tmp_folder setting by db command
  −
- Thanks to Michael McCarn and Jean-philippe Pialasse
      
Other fixes and updates
 
Other fixes and updates
-----------------------
+
  - Use ip route syntax to define routes to local network [SME: 9905]
- Update /etc/mime.types templates
+
  - Allow /32 masks on the external interface, in which case we don't
  - Use sha256 algorithm for signature of SSL cert.
+
  check if the gateway is on the correct network) [SME: 9765]
  - Added new createlinks function event_templates event_actions event_services
+
  - Add a column to display forwarding address [SME: 9174]
- Don't claim to own /sbin and /sbin/e-smith
+
  - Correctly display http URL to the server-manager in the console [SME: 9163]
- display variable name in the server-manager $domainName, $domainDesc $domain
+
  - Fire ssl-update event when default cert is renewed [SME: 2257]
- Revert the upload_tmp_folder patch as it needs some more work
+
  - Expand /home/e-smith/ssl.pem/pem during ssl-update [SME: 9152]
  - Add dummy NIC support as InternalInterface
+
  - Quote filenames in genfilelist so filenames containing spaces are correctly
- Only fire the ip-change event when IP is assigned to WAN nic
+
  handled [SME: 9758]
  (Code by Charlie Brady and John Crisp)
+
  - Remove motd text from grub.cfg [SME: 9161]
  - Only reset service access when switching to or from private server mode
+
  - Allow empty comment when creating/modifying a hostname [SME: 9177]
  (Code by Charlie Brady)
+
  - Remove double / in SSL RewriteRule [SME: 9195]
- When quiting the console app with unsaved changes set the default selected
+
  - Adjust regex so adjust-service accepts sigusr1 and sigusr2 from files [SME: 9184]
  answer to NO
+
  - Allow custom file descriptor limit, and set default to 4096 [SME: 9911]
  - Added a comment to specify the real configuration file of dhcpd
+
  - Rebase on upstream 9.03.53-1 [SME: 9534]
  - Modified the patch of daniel e-smith-base-5.6.0-ensure_apache_alias_www.patch
+
  - Roll in CentOS Branding
  - Ensure www group exists and that apache is an alias of www
+
  - functions: parse -d first
- Check where running runlevel 4, not 7 in service wrapper
+
  - functions: fix ignored delay in killproc
- Correctly update NIC configuration on single NIC systems
+
  - netfs: only unmount loopback device mounted on top of netdev or with back-file on netdev
  - Symlink udev-post service in rc7
+
  - functions: improve killing loops
  - Fix PPPoE after a post-upgrade
+
  - netfs: tweak nfs umount
  - Remove dependency on microcode_ctl
+
  - sysctl.conf: mention sysctl -a
  - Prevent emailing about the normal, weekly, checks of RAID arrays, by Mark    Casey
+
  - sysconfig.txt: document PPPOE_EXTRA and PPPD_EXTRA
- Don't claim to own /sbin and /sbin/e-smith
+
  - spec: require plymouth
  - Add an upload_tmp_folder setting by db command
+
  - fix mangled sysconfig/init.s390
  Thanks to Michael McCarn and Jean-philippe Pialasse
+
  - rc.sysinit: don't perform fsck twice with /.autorelabel
  - the folder /tmp is created by the event init-ibays
+
  - ifdown-eth: fix comparison
  - the event ibay-modify create/chown/chmod the folder /tmp
+
- ifup-eth: if arping fails, output responding MAC
  - Add an upload_tmp_folder setting by db command
+
  - network-functions: fix change_resolv_conf after grep update
  Thanks to Michael McCarn and Jean-philippe Pialasse
+
  - spec: add sysctl.d dir
  - Force SSL following ibays settings to the relevant domain
+
  - rc.sysinit: fix typo in fs
  - Perl::critic syntax modifications
+
  - rename_devices: comments need to have a blank before them
  - Add more PHP options to ibays only by db commands
+
  - rename_device: remove comments and trailing whitespaces
  - Add SSLRequireSSL to ibays when SSL is set to enabled
+
  - bonding: warn if the ifup for slave device failed
  - Allow the admin upsd in /etc/hosts.allow
+
  - clarify daemon() usage message
- Creation Admin Privilege for use of upscmd & upsrw
+
  - ifdown: clean ipv4 localhost addresses
  - Remove obsolete directives {allowfrom}
+
  - ifup-post: check resolve.conf also with DNS2
  - Access property created (default value is 'localhost')
+
  - ifup: add missing quotes
  - Remove obsolete directives {ACL,ACCEPT,REJECT} and switch to LISTEN
+
- ifup-eth: some bridge options are applied later
  in /etc/ups/upsd.conf
+
- init.d/halt: give init some time to reexecute
  - Allow NUT in /etc/hosts.allow and in /etc/services
+
  - network-scripts: DEVICE and HWADRR could be quoted by apostrophe
  Code change from Daniel B.<daniel@firewall-services.com>
+
  - ifup-wireless: fix calling of phy_wireless_device
  - Revert the patch e-smith-tinydns-2.4.0_add_hostname_following_dhcpdleases_hostname.patch
+
  - rc.sysinit: apply quotas after system is relabeled
  - Duplicate hostnames with different IP are not used, a warn in log is printed
+
  mod_auth_tkt
  - The server hostname can not be used by a dhcp client, a warning in log is printed
+
  - backport to SME9 fix redirection when proxy ssl [SME: 8825]
  - Changed the name of /tmp/dhcpd.leases to /tmp/tmpdhcpd.leases
+
  - update apxs path for SME9 (sbin)
  when the dhcpd lease is modified
+
  - Bump for beta1 release of 9.2 [SME: 9525]
  - Do template-expand of /var/service/tinydns/root/data
+
  - updated sources with new pictures fix hover color [SME: 9678]
  - Do sigus1 of dhcp-dns & dnscache
+
  - Koozali branding of manager [SME: 9678]
  - Forked DHCPparse for parsing the end of lease and remove old entry of dnscache
+
  - Eliminated rpmbuild "bogus date" warnings due to inconsistent weekday,by assuming the date is correct and
  - Require perl-Text-DHCPparse removed
+
  changing the weekday.
  - Timestamp added in tinydns, the entry in dnscache is cleared when the lease is over
+
   Fri Oct 24 2005 --> Fri Oct 21 2005 or Mon Oct 24 2005 or Fri Oct 28 2005 or ....
  - Add new feature 'Parse dhcpd.leases and feed to tinydns'
+
  Sat Oct 25 2005 --> Sat Oct 22 2005 or Tue Oct 25 2005 or Sat Oct 29 2005 or ....
  - e-smith-tinydns-2.4.0_add_hostname_following_dhcpdleases_hostname.patch
+
  Sat Dec 25 2005 --> Sat Dec 24 2005 or Sun Dec 25 2005 or Sat Dec 31 2005 or ....
  made from the solution of Stefano Zamboni
+
  Thu May 23 2006 --> Thu May 18 2006 or Tue May 23 2006 or Thu May 25 2006 or ....
  - Make slapd service an alias for ldap
+
   Sat Mar 07 2008 --> Sat Mar 01 2008 or Fri Mar 07 2008 or Sat Mar 08 2008 or ....
  - Switched to sysvinit from systemd (it's rhel-6)
+
  Sat Feb 03 2013 --> Sat Feb 02 2013 or Sun Feb 03 2013 or Sat Feb 09 2013 or ....
  - Fixed license tag Related: rhbz#632853
+
  - Update copyright in server-manager footer [SME: 9266]
  - pptpd New version
+
  - Don't put motd content in /etc/redhat-release [SME: 9161]
  - Dropped pppd-unbundle patch (upstreamed)
+
  - added centos SCLo SIG gpg rpm signing key [SME: 10102]
  - Various fixes according to Fedora review Related: rhbz#632853
+
  will allow to install SCL packages directly from smecontribs
  - Modified for Fedora Resolves: rhbz#632853
  −
  - Update to upstream version 2.3.4, which fixes CVE-2012-3478 and CVE-2012-2252
  −
  - Updated rsync-protocol.patch to fix CVE-2012-2251, and to apply on top of the
  −
   CVE-2012-3478 and CVE-2012-2252 fixes.
  −
- Updated makefile.patch to preserve RPM CFLAGS.
  −
- Added command-line-error.patch (from Debian), correcting error message
  −
   generated when insecure command line option is used (CVE-2012-3478 fix
  −
  regression).
  −
- Rebuilt for https://fedoraproject.org/wiki/Fedora_18_Mass_Rebuild
  −
- Add patch for rsync3 compat (#485946)
  −
- Update runit to 2.1.2
  −
  - Remove now uneeded obsolete directives
  −
  - Remove openssl from the Exclude list of centos repo
  −
- Add a default Yum db property for check4contribsupdates
  −
  - Added a check-update for the smecontribs repository
  −
- Move protected package list to the correct location
     −
====General features====
+
General features
- Based on CentOS 6.7 and all available updates
+
================
   −
====Known issues====
+
- Based on CentOS 6.8 and all available updates
* It can happen that during installation or after changing network interfaces, they appear in reverse order to the system, leaving the network (LAN/WAN) non functional. This has been fixed.
     −
Fixed in e-smith-base-5.6.0-10
+
Terry Fage
 +
Compilation of release data is thanks to Ian Wells
 +
On behalf of the Koozali SME Server development team

Navigation menu