--- cdrom.image/sme8/README.txt 2014/02/20 04:29:58 1.29 +++ cdrom.image/sme8/README.txt 2015/03/27 08:26:14 1.33 @@ -1,16 +1,27 @@ -SME Server 8.1 Release Candidate 1 Release Notes -================================= +Koozali SME Server 8.2 Release Notes +==================================== -23 February 2014 +18 March 2015 -The SME Server development team is pleased to announce the release of -SME Server 8.1 Release Candidate 1 which is based on CentOS 5.10 +The Koozali SME Server (SME Server) development team is pleased to announce +the release of SME Server 8.2 beta2 which is based on CentOS 5.11 Bug reports and reports of potential bugs should be raised in the bug tracker (and only there, please); http://bugs.contribs.org/ +Download +======== + +You can download SME Server 8.2 beta2 from +http://mirror.contribs.org/smeserver/releases/testing/8.2.beta2/ +or for other methods see http://wiki.contribs.org/SME_Server:Download + +Please note it may take up to 48 hours for mirrors to finish syncing, +during this time you may experience problems. + + About SME Server ================ @@ -19,16 +30,19 @@ enterprises. SME Server is brought to yo a non-profit corporation that exists to provide marketing and legal support for SME Server. + SME Server is freely available under the GNU General Public License and is only possible through the efforts of the SME Server community. However, the availability and quality of SME Server is dependent on meeting our expenses, such as hosting costs, server hardware, etc. As such, we ask for a donation to offset costs and fund further development. + a) If you are a school, a church, a non-profit organisation or an individual using SME Server for private purposes, we would appreciate you to contribute within your means toward the costs associated with hosting, maintenance and development. + b) If you are a company or an integrator and you are deploying SME Server in the course of your work to generate revenue, we expect you to make a donation commensurate with the level of revenue you generate and the number of servers @@ -39,70 +53,42 @@ Please visit http://wiki.contribs.org/Do Koozali Inc is happy to supply an invoice for any donations received, simply email treasurer@koozali.org + Thanks ====== The development team would like to thank all of those who have involved themselves with this release. + Notes ===== -1. CentOS 5 has dropped support for i586 and therefore SME Server 8.1 +1. CentOS 5 has dropped support for i586 and therefore SME Server 8.2 will not work on i586 hardware. [See bugzilla:2845]. i586 hardware means processors before and including Intel Pentium, Pentium MMX; AMD K5, K6, K6-II, K6-III and Via C3. i686 architecture processors are Intel Pentium Pro, Pentium II, Pentium III; AMD Athlon, Athlon XP and later. -2. Some notes on SME Server 8.1 including help on upgrades can be found at + +2. Some notes on SME Server 8.2 including help on upgrades can be found at http://wiki.contribs.org/SME_Server_8 -3. Please note it may take up to 48 hours for mirrors to finish syncing, - during this time you may experience problems. - You can download SME Server 8.1 from - http://mirror.contribs.org/smeserver/releases/testing/8/iso/i386/ - or for other methods see http://wiki.contribs.org/SME_Server_8 -Changes from Beta 4 -=================== +3. Please note Upstream policy on Production Phase 3 for EL5. Only those + security updates deemed crucial are now being released upstream for EL5 + (so also for SME8) The Koozali team recommends that you start moving + workloads from SME Server 8 to SME Server 9. + Planned EOL for CentOS 5 is Mar 31 2017 -There are no major changes. -Update with ca-bundle.crt from SME 9. -Changes from Beta 3 -=================== +4. Please note it may take up to 48 hours for mirrors to finish syncing, + during this time you may experience problems. + You can download SME Server 8.2 from + http://mirror.contribs.org/smeserver/releases/8.2/iso/i386/ + or for other methods see http://wiki.contribs.org/SME_Server_8 -Set sme-server as the default workgroup and domain name for -new installations. -Remove insecure SSL ciphers. -Due to SMTP servers not handling SMTP Auth well only present -one auth method at a time, in order, to NET::SMTP. -Allow webmail access to be selected for only the local network. -Provide the ability to force https per ibay. - -Changes from Beta 2 -=================== - -Update to CentOS 5.10 -Update footer copyright and renew full copyright text. -Latest version of Dar, 2.4.11, for workstation backup. -Workstation Backup, fix selective restore by requesting array of results -from CGI.pm -Workstation Backup, new method to show files being restored is needed -when using dar 2.4 - -Changes from Beta 1 -=================== - -nodmraid is now the default install option as many issues have been seen with -dmraid. -Installer warning updated to clarify all attached disks will be reformatted. -SME Server changes to initscripts included. -Replace vfs_shadow_copy with vfs_shadow_copy2 for shadow snapshots. -Updated to latest Antivirus, ClamAV, 0.98. -Added donation text and graphic to login page and server-manager. -Modules necessary to implement .htaccess have now been loaded by default. Changes in this release ======================= @@ -110,213 +96,127 @@ Changes in this release Packages altered by Centos, Redhat, and Fedora-associated developers are not included. - Backups ------- -- Latest version of Dar, 2.4.11, for workstation backup. -- Workstation Backup allows the day of the week to be specified on which a - full backup occurs. This now works correctly for all days of the week. -- To increase reliability of backups to a Microsoft Vista drive, a one second - delay was added to the backup. This issue is not seen on the newer Microsoft - OS. -- Allow user setting of compression level for Desktop and Console Backups. - For example: config setprop backupconsole CompressionLevel -6 - The default is -6, where -1 is fastest and -9 is optimal compression. -- In the console, under item 8, refer to removable media instead of USB - device. -- After a restore from the console the post-upgrade event was not being - performed. -- Add an option to use Wake on LAN before starting Workstation Backup. -- Workstation Backup, report cifs mount errors. -- Workstation Backup, remove temporary directory on success . -- Workstation Backup, add a choice to delete old backup before or after - backup. -- Workstation Backup, ensure that the pathname passed to dar_manager is quoted - to allow backup destinations with spaces, eg some USB drives. -- Workstation Backup, count backup sets from 1 and delete the obsolete set0 - when it goes out of scope. -- Workstation Backup, do not fail backup for mtime/ctime mismatch -- Workstation Backup, fix selective restore by requesting array - of results from CGI.pm -- Workstation Backup, new method to show files being restored is needed - when using dar 2.4 -- Don't remove the apache group during restore. -- Workstation Backup, suppress ctime error message on incremental backups. -- Workstation Backup, selective restore of deleted files. + - Add pkgconfig dar + - New Upstream Version dar + - Add requires nfs-utils + - The nfs service is neither started or allowed to start + - Workstation Backup, do not create folder in / -File Server ------------ -- Replace vfs_shadow_copy with vfs_shadow_copy2 for shadow snapshots. -- Add support for Windows 8 domain joining & user login with a new registry - file. - /server-resources/regedit/win8samba.reg -- New optional samba property smb{WideLinks}, valid values are 'no' or 'yes'. - The current samba default is 'no'. - see http://www.samba.org/samba/docs/man/manpages-3/smb.conf.5.html#WIDELINKS - For example to enable samba Wide Links - # config setprop smb WideLinks yes -- Add windows network performance enhancements registry file that can help - Windows slow logons. - /server-resources/regedit/windows_samba_performance.reg -- Two new optional samba properties smb{ServerMaxProtocol} & - smb{ClientMaxProtocol}. - For example: # config setprop smb ServerMaxProtocol NT1 -- Remove the samba_audit specific logrotate configuration which was causing an - email to be sent to the admin every night. -- Enable smb auditing per ibay, it is disabled by default. - Auditing is enabled via - # db accounts setprop ibayname Audit enabled - # signal-event ibay-modify ibayname -- Prevent emailing about the normal, weekly, checks of RAID arrays -- Update ServerName (Samba netbios name) when SystemName is updated -- Workaround a deficiency in the proftpd package where it does not handle long - lines correctly in its configuration file. This caused FTP to fail when - large numbers of local networks were configured. -- Ensure Deny from all is on its own line in 15LimitLOGIN -- Update default ServerName in 30smbServerName, and change default - Workgroup and Domain to sme-server - - -LDAP (Optional in SME 8.1, and considered experimental) +LDAP ---- -- Fix init-account script when LDAP auth is enabled. -- Fix group creation/modification when LDAP auth is enabled. -- The ldap.init script which starts just after the ldap service waits for - slapd to be to available. The logic to check if slapd is ready was - corrected. -- Add missing dependency on openldap-servers. -- The ldap log files can take significant space on servers with a lot of - users. This update will ensure old BDB log files are removed. + - Make pdbedit output independent from locale and timezone so it can be + parsed Localisation ------------ -- Latest translations included. + - apply locale 2015-03-14 patch from pootle + - apply locale 2014-12-25 patch from pootle + - apply locale 2014-03-08 patch from pootle Mail Server ----------- -- Updated to latest Antivirus, ClamAV, 0.98.1 -- Fetchmail multidrop mode follows TCPPort setting. -- Avoid use of unitialised variables in smtp migrate fragments. -- Allow smtp_auth_proxy to use port 587 with STARTTLS. -- Due to SMTP servers not handling SMTP Auth well only present - one auth method at a time, in order, to NET::SMTP and enable - the use of a blacklist to remove the troublesome methods. - For example to remove CRAM-MD5: - # db configuration setprop smtp-auth-proxy Blacklist CRAM-MD5 - # sv t /service/smtp-auth-proxy - More than one method can be removed: - # db configuration setprop smtp-auth-proxy Blacklist "CRAM-MD5 DIGEST-MD5" - # sv t /service/smtp-auth-proxy -- Handle exceptions during attempted SASL auth. Add more debug tracing. -- imap-relocate-maildirs action was removed.It was no longer necessary and was - sometimes very slow. -- The soft memory limits for pop3 and pop3s were increased. Two new optional - database properties pop3{MemLimit} and pop3s{MemLimit} - For example to increase the memory limit - # config setprop pop3s MemLimit 50000000 - # expand-template /var/service/pop3s/env/MEMLIMIT - # config setprop pop3 MemLimit 50000000 - # expand-template /var/service/pop3/env/MEMLIMIT -- New optional qmail property qmail{ConcurrencyLocal} and default for - /var/qmail/control/concurrencylocal changed to 20. - For example to decrease the local concurrecny limit - # config setprop qmail ConcurrencyLocal 6 -- Modify domain style pseudonym pointing to user with dot in name. -- Accept messages with no body and no trailing \n after headers. -- Prevent email delivery failure with required updates for perl-Net-DNS and - qpsmtpd. -- New optional spamassassin property spamassassin{MaxMessageSize} to allow for - spamassassin qpsmtpd's plugin size limit to be changed. - For example to also scan larger files - # config setprop spamassassin MaxMessageSize 1500000 -- Make CipherSuite secure by default and tls ciphers defaults to disallow - SSLv2. -- Fix how qpsmtpd tags spam email. -- Add template to extend the functionality of SSL verified certificate to IMAP - and SSMTP transactions -- Update ClamAV to release 0.97.8. -- Load TextCat plugin if ok_languages is enabled. -- Removed the databytes file from qpsmtpd config to honor the maximum message - size settings. See http://wiki.contribs.org/Email#Set_max_email_size -- Include /usr/bin/refreshclam -- Remove workarounds for how qpsmtpd tags spam email. -- Remove insecure SSL ciphers. -- Add keepalive option for tcpsvd for imap and imaps services. -- Use stunnel-tls instead of sslio to wrap imaps service. + - Updated to ClamAV release 0.98.6 + - Add BuildRequires for openssl-devel and libxml2-devel + - Remove Packager and Vendor from ClamAV spec file. + - Add new zip file signatures to default mailpatterns database : ZIPVOSX & + ZIPV3 + - Fix stunnel path + - Use stunnel instead of sslio to support TLS + - Modify whitelist_soft transaction to interact with dnsbl filter + by John Crisp + - Remove DENYSOFT on SPF softfail qpsmtpd + - Increase MemLimit to 700M for clamav-0.98 + - Remove dnsbl.ahbl.org RBL List -Server manager + +PHP -------------- -- Added donation text and graphic to login page and server-manager. -- Update footer copyright and renew full copyright text. -- Do not load mod_ssl for httpd-admin as it is not needed and creates log - noise. -- If the browser used to access the server-manager used lower case for - %escapes a blank screen would be shown. The server manager URL processing is - now case-insensitive for %escapes. -- Fix more uninitialized warnings in log (httpd/admin_error_log) from HTML.pm. -- Remove log noise (httpd/admin-error-log) when accessing the Create Starter - Web panel in server-manager. - - -Webmail and Groupware ---------------------- -- If IMAP is disabled in the server manager email panel, IMAP will now listen - to the loopback interface to allow webmail to function. -- Webmail no longer uses SSL over loopback interface. -- Allow webmail access to be selected for only the local network. + - Resync with upstream php53, which include + fileinfo: fix out-of-bounds read in elf note headers. CVE-2014-3710 + xmlrpc: fix out-of-bounds read flaw in mkgmtime() CVE-2014-3668 + core: fix integer overflow in unserialize() CVE-2014-3669 + exif: fix heap corruption issue in exif_thumbnail() CVE-2014-3670 + - Resync with upstream php53, which include + spl: fix use-after-free in ArrayIterator due to object + change during sorting. CVE-2014-4698 + spl: fix use-after-free in SPL Iterators. CVE-2014-4670 + gd: fix NULL pointer dereference in gdImageCreateFromXpm. + CVE-2014-2497 + fileinfo: fix incomplete fix for CVE-2012-1571 in + cdf_read_property_info. CVE-2014-3587 + core: fix incomplete fix for CVE-2014-4049 DNS TXT + record parsing. CVE-2014-3597 + - Resync with upstream php53, which include + core: type confusion issue in phpinfo(). CVE-2014-4721 + date: fix heap-based buffer over-read in DateInterval. CVE-2013-6712 + core: fix heap-based buffer overflow in DNS TXT record parsing. + CVE-2014-4049 + core: unserialize() SPL ArrayObject / SPLObjectStorage type + confusion flaw. CVE-2014-3515 + fileinfo: out-of-bounds memory access in fileinfo. CVE-2014-2270 + fileinfo: unrestricted recursion in handling of indirect type + rules. CVE-2014-1943 + fileinfo: out of bounds read in CDF parser. CVE-2012-1571 + fileinfo: cdf_check_stream_offset boundary check. CVE-2014-3479 + fileinfo: cdf_count_chain insufficient boundary check. CVE-2014-3480 + fileinfo: cdf_unpack_summary_info() excessive looping + DoS. CVE-2014-0237 + fileinfo: CDF property info parsing nelements infinite + loop. CVE-2014-0238 Web Server ---------- -- Modules necessary to implement .htaccess have now been loaded by default. -- Disable index listing of Apache icons folder. -- PHP's magic_quotes are deprecated so should no longer be used. The php.ini - will now have "magic_quotes Off" instead of fully removing it as the default - is ON. -- Change wording of Software Update button. -- Remove insecure SSL ciphers. + - Disable SSLv3 Other fixes and updates ----------------------- -- Remove old System Name from the Hosts DB -- Fix warning in /var/log/messages by correctly initialising the relevant - variable. The warning related to the HW Address of a NIC. -- user-modify-unix script could take many minutes, it has now been optimised - to take only seconds -- The memory limit for pppoe was increased to 100Mb. -- On upgrading from SME Server 7 to SME Server 8 an email could be sent to the - admin everyday due to a modified /etc/updatedb.conf file. This update - ensures the correct /etc/updatedb.conf file. -- Updated SME root server template as D-root changed its IPv4 address on the - 3rd of January 2013. -- The console would crash when no value is entered as static gateway in - servergateway(-private) mode. Improved error-checking in isValidIP() - prevents this. -- Use file locking to make sure that only one copy of the masq script is - running at any particular time. -- Add python-hashlib so we can read newer repodata signatures. -- Point mirrorlist to mirrorlist.contribs.org -- Increase memory limit for ntpd. -- Add an audit for groups. -- Set sme-server as the default workgroup and domain name for - new installations. -- Provide the ability to force https per ibay. -- Prevent server being used in NTP amplification attacks. -- Modify template to allow Squid proxy https access to ports - other than 443,563 -- Add logcheck to help analyse errors in the log files. -- Refer to removable media not CDROM in console restore. -- Remove old images. -- Update with ca-bundle.crt from SME 9 + - When quiting the console app with unsaved changes set the default selected + answer to NO + - Add a verification in the console of number of pptp clients against ip + allowed in dhcpd + - Add a verification in remoteaccess panel of number of pptp clients against + ip allowed in dhcpd + - Reset primary ibay default type + - Add a migrate fragment to sanitize the host comment for illegal characters + in the server-manager. + Sanitize existing hostname records, Add a validator for the comment in the + hostname field + Code done by Charlie Brady + and Huib + - Force SSL following ibays settings to the relevant domain + - Move mysql logging to multilog + - Allow ntp status queries from localhost. + - Avoid uninitialized variable warning from last update. + - Add ssh-autoblock for external interface - patch by Chris Maltby + - Update to upstream version 2.3.4, which fixes CVE-2012-3478 and + CVE-2012-2252 + - Updated rsync-protocol.patch to fix CVE-2012-2251, and to apply on top of + the + CVE-2012-3478 and CVE-2012-2252 fixes. + - Updated makefile.patch to preserve RPM CFLAGS. + - Added command-line-error.patch (from Debian), correcting error message + generated when insecure command line option is used (CVE-2012-3478 fix + regression). + - Rebuilt for https://fedoraproject.org/wiki/Fedora_18_Mass_Rebuild + - Add patch for rsync3 compat (#485946) + - Update smeserver-release for beta1 of SME Server 8.2 + - Set the check update frequency of smecontribs through the server-manager + - Add a default Yum db property for check4contribsupdates + - Added a check-update for the smecontribs repository General features ================ -- Based on CentOS 5.10 and all available updates +- Based on CentOS 5.11 and all available updates + -$Id: README.txt,v 1.28 2014/02/17 16:42:38 wellsi Exp $ +Terry Fage +On behalf of the SME Server development team