--- cdrom.image/sme9/README.txt 2016/07/21 19:42:48 1.20 +++ cdrom.image/sme9/README.txt 2017/04/09 20:38:22 1.26 @@ -1,421 +1,282 @@ -Koozali SME Server 9.2 Beta 1 Release Notes -=========================================== - -20 July 2016 - -The Koozali SME Server (SME Server) development team is pleased to announce -the release of SME Server 9.2 Beta 1 which is based on CentOS 6.8 - -Bug reports and reports of potential bugs should be raised in the bug -tracker (and only there, please); - - http://bugs.contribs.org/ - -Download -======== - -You can download Koozali SME Server 9.2 Beta 1 from -http://mirror.contribs.org/smeserver/releases/testing/9.2.beta1/ -or for other methods see http://wiki.contribs.org/SME_Server:Download - -Please note it may take up to 48 hours for mirrors to finish syncing, -during this time you may experience problems. - - -About SME Server -================ - -SME Server is the leading Linux distribution for small and medium -enterprises. Loozali SME Server is brought to you by Koozali Foundation, Inc., -a non-profit corporation that exists to provide marketing and legal support -for SME Server. - -SME Server is freely available under the GNU General Public License and -is only possible through the efforts of the SME Server community. -However, the availability and quality of SME Server is dependent on -meeting our expenses, such as hosting costs, server hardware, etc. - -As such, we ask for a donation to offset costs and fund further development. - -a) If you are a school, a church, a non-profit organisation or an individual -using SME Server for private purposes, we would appreciate you to contribute -within your means toward the costs associated with hosting, maintenance and -development. - -b) If you are a company or an integrator and you are deploying SME Server in -the course of your work to generate revenue, we expect you to make a donation -commensurate with the level of revenue you generate and the number of servers -your have in the field. Please, help the project - -Please visit http://wiki.contribs.org/Donate to donate. - -Koozali Inc is happy to supply an invoice for any donations received, -simply email treasurer@koozali.org - - -Notes -===== - -In-place upgrades are not supported. It is necessary to backup and then restore. -/boot partition is always RAID 1. - -The spare handling for RAID arrays is not implemented. - -USB installs are now supported, see: -http://wiki.contribs.org/Install_From_USB#SME_Server_9 - - -Major changes in this release -============================= - -Major Changes in this release. LDAP - Hook into the new ssl-update event, Mail Server - Allow reading SSL_version from the tls_protocols config file (and turn TLSv1 back on by default), Modify whitelist_soft transaction to interact with dnsbl filter, Revert forcing TLSv1 patch as it breaks some inbound delivery, Remove karma rcpt handling, Check rua is defined before trying to parse it to prevent an error if a domain has a DMARC entry published with no rua, add support for the uribl plugin, add detailed spamassassin report headers. Server Manager - Allow access to the server-manager without SSL from the loopback, Don't redirect to http when login in/out of the server-manager from localhost. Web Server - Hook into the new ssl-update event, Set TLSv1 back to enabled (but keep a prop to disable it if needed). Other fixes and updates - Correctly display http URL to the server-manager in the console, Remove motd text from grub.cfg - - -Detailoed changes in this release -======================= - -Only the changes since SME Server 9.1 are listed, mainly -autogenerated from the changelogs. - -Packages altered by Centos, Redhat, and Fedora-associated developers are -not included. - -File Server - - - Additional tweak (to avoid null pointer dereference) for upstream bug 3868 - - Fix for CVE-2016-3125: usage of 1024 bit DH key even with manual parameters - set (http://bugs.proftpd.org/show_bug.cgi?id=4230) - - Also fixed related issue where only first DH param in TLSDHParamFile is used, - regardless of requested keylength (http://bugs.proftpd.org/show_bug.cgi?id=3868) - - Fix SUID/SGID directory permission setting regression introduced with fix - for CVE-2012-6095 (#1297264) - - Add support for specifying TLSv1.1 and TLSv1.2 (#1281493) - - Add dependency on perl(Crypt::Cracklib), needed for ftpasswd --use-cracklib - - Add -utils subpackage for support tools (#1258440), using a sub-package to - ensure that the main package does not require perl - - Update ftpasswd to version from proftpd 1.3.5a for additional functionality - (SHA passwords, locking and unlocking of accounts) - -LDAP - - - Hook into the new ssl-update event - - Remove size limit for search result - - Make pdbedit output independent from locale and timezone so it can be - parsed - - Symlink /etc/init.d/ldap to /usr/bin/sv, - Chown all DB files to ldap before staring slapd - - Set checkpoint in slapd.conf instead of DB_CONFIG, - Don't overwrite the ldif dump if slapcat's output is empty - (code from Charlie Brady) - - Stop ldap on shutdown (rc0 and rc6) - - Run db_recover on startup - - Don't wipe LDAP DB when the ldif dump is empty - -Localisation - - - Apply locale 2016-06-15 patch from pootle - -Mail Server - - - Update to release 0.99.2 - - Add pcre-devel to BuildRequires - - Hook into a new ssl-update event - - Allow setting SSL protocols from DB (and set TLSv1 back to enabled - on a default install) - - Disable TLSv1 - - Disable fips mode on stunnel - - Use stunnel instead of sslio to support TLS - - Add possibility to exclude users or members of other groups from group - email address - - Remove karma rcpt handling, Fix karma logic by checking negative strikes - Backport a fix for karma_tool so it can find its database - - Check rua is defined before trying to parse it to prevent an error - if a domain has a DMARC entry published with no rua - - Fix error when RCPT TO is not valid - - Update to 0.96 (with some backports from GIT head) - - Allow reading SSL_version from the tls_protocols config file (and turn - TLSv1 back on by default) - - Correctly log login attempts with nulls in login name - - Modify whitelist_soft transaction to interact with dnsbl filter - - by John Crisp - - Added qpsmtpd-0.84-make-dnsbl-more-whitelist_soft-aware.patch - - Disable SSLv3 - - New notls conf to set hosts you dont want to advertize STARTTLS to - - Revert forcing TLSv1 patch as it breaks some inbound delivery - - Revert whitelist_soft dnsbl as it hasn't been verified yet and we need to - push the fix for TLSv1 - - Modify whitelist_soft transaction to interact with dnsbl filter - - by John Crisp - - Force usage of TLSv1 - - Disable unofficial sigs for filesystem scans - - Double the memory limit as we do not have enough room - - Increase MemLimit to 700M for clamav-0.98 - - Hook into the new ssl-update event - - Allow settings SSL protocols from DB (and set TLSv1 back to enabled - on a default install) - - Disable TLSv1 - - Allow custom passdb args - - Remove o and r DKIM fields as they are not standard - - In qpsmtpd-print-dns set DKIM options after the public key so the string - will still be split correctly - - Fix a syntax error in the qpsmtpd-print-dns script - - Remove warning about spool dir permission on startup - - Add missing patch for DKIM signing - - Create needed directories - - Add missing run time dependency on perl(DBD::SQLite) - - Check SPF for inbound emails - - Check DKIM for inbound emails - - Check DMARC for inbound emails (based on the previous SPF and DKIM checks) - - Store and send DMARC aggregate reports - - Support DKIM signing for outbound emails - - Use an additional badrcptto file list for external connections so - local only pseudonymes work as expected - - Enable the bogus_bounce plugin - - Use the naughty plugin to defer rejections, leaving users an opportunity - to authenticate - - Add support for the uribl plugin - - Change separator for SBList and RBLlist from : to , - - Switch to the clamdscan plugin - - Enabe the loadcheck plugin - - Add support for the karma plugin - - Work with qpsmtpd 0.96 - - Expand all ssl related conf in ssl-update - - Hook into a new ssl-update event - - Allow setting SSL protocols from DB - - Add domain part to bcc user if missing - - allow IP relayclient stored by DB - - Code from Stefano ZAmboni - - & Charlie Brady - - allow IP relayclient stored by DB - - Code from Stefano ZAmboni - - Add X-Spam-Details header (and simplify X-Spam-Status) - - Disable ipv6 support to prevent a warning during startup - -Server manager - - - Better syntax for removing Indexes option for the manager - - Remove index option for manager's resources - - fix 307 redirection to http when https is used - - update syntaxe for TKT Auth bump 7 for typo - corrected typo in e-smith-manager-2.4.0-dont_rewrite_to_https_from_localhost.patch - code from John H. Bennett III bennettj@johnbennettservices.com - - Really don't redirect to http when login in/out of the server-manager - - Don't redirect to http when login in/out of the server-manager from - localhost - - Allow access to the server-manager without SSL from the loopback - - fix wrong warning in openssl_encrypt() for missing IV - when IV is not required #1260315 - - fix segfault's when you try and allocate an SplFixedArray - with size >= 9999 #1071344 - - segfault in php_pgsql_meta_data CVE-2015-4644 #1234434 - - add options to enable TLS in curl #1255920 - - fix segfault in gc_collect_cycles #1122681 - - fix gzfile accept paths with NUL character #1213407 - - fix patch for CVE-2015-4024 - - fix more functions accept paths with NUL character #1213407 - - soap: missing fix for #1222538 and #1204868 - - core: fix multipart/form-data request can use excessive - amount of CPU usage CVE-2015-4024 - - fix various functions accept paths with NUL character - CVE-2015-4026, #1213407 - - ftp: fix integer overflow leading to heap overflow when - reading FTP file listing CVE-2015-4022 - - phar: fix buffer over-read in metadata parsing CVE-2015-2783 - - phar: invalid pointer free() in phar_tar_process_metadata() - CVE-2015-3307 - - phar: fix buffer overflow in phar_set_inode() CVE-2015-3329 - - phar: fix memory corruption in phar_parse_tarfile caused by - empty entry file name CVE-2015-4021 - - soap: more fix type confusion through unserialize #1222538 - - soap: more fix type confusion through unserialize #1204868 - - core: fix double in zend_ts_hash_graceful_destroy CVE-2014-9425 - - core: fix use-after-free in unserialize CVE-2015-2787 - - exif: fix free on unitialized pointer CVE-2015-0232 - - gd: fix buffer read overflow in gd_gif.c CVE-2014-9709 - - date: fix use after free vulnerability in unserialize CVE-2015-0273 - - enchant: fix heap buffer overflow in enchant_broker_request_dict - CVE-2014-9705 - - phar: use after free in phar_object.c CVE-2015-2301 - - soap: fix type confusion through unserialize - - fileinfo: fix out-of-bounds read in elf note headers. CVE-2014-3710 - - xmlrpc: fix out-of-bounds read flaw in mkgmtime() CVE-2014-3668 - - core: fix integer overflow in unserialize() CVE-2014-3669 - - exif: fix heap corruption issue in exif_thumbnail() CVE-2014-3670 - - spl: fix use-after-free in ArrayIterator due to object - change during sorting. CVE-2014-4698 - - spl: fix use-after-free in SPL Iterators. CVE-2014-4670 - - gd: fix NULL pointer dereference in gdImageCreateFromXpm. - CVE-2014-2497 - - fileinfo: fix incomplete fix for CVE-2012-1571 in - cdf_read_property_info. CVE-2014-3587 - - core: fix incomplete fix for CVE-2014-4049 DNS TXT - record parsing. CVE-2014-3597 - - core: type confusion issue in phpinfo(). CVE-2014-4721 - - date: fix heap-based buffer over-read in DateInterval. CVE-2013-6712 - - core: fix heap-based buffer overflow in DNS TXT record parsing. - CVE-2014-4049 - - core: unserialize() SPL ArrayObject / SPLObjectStorage type - confusion flaw. CVE-2014-3515 - - fileinfo: out-of-bounds memory access in fileinfo. CVE-2014-2270 - - fileinfo: unrestricted recursion in handling of indirect type - rules. CVE-2014-1943 - - fileinfo: out of bounds read in CDF parser. CVE-2012-1571 - - fileinfo: cdf_check_stream_offset boundary check. CVE-2014-3479 - - fileinfo: cdf_count_chain insufficient boundary check. CVE-2014-3480 - - fileinfo: cdf_unpack_summary_info() excessive looping - DoS. CVE-2014-0237 - - fileinfo: CDF property info parsing nelements infinite - loop. CVE-2014-0238 - - add php_get_module_initialized internal function (#1053301) - - soap: fixRFC2616 transgression (#1045019) - - fix static calling in non-static method (#953786) - - fix autoload called from closing session (#954027) - - drop unneeded part of CVE-2006-724.patch and fileinfo.patch - extension not provided or git binary patches (#1064027) - - odbc: fix incompatible pointer type (#1053982) - - mysqli: fix possible segfault in mysqli_stmt::bind_result - php bug 66762 (#1069167) - - mysql: fix php_mysql_fetch_hash writes long value into int - php bug 52636 (#1054953) - -Web Server - - - Hook into the new ssl-update event - - Set TLSv1 back to enabled (but keep a prop to disable it if needed) - - Disable TLSv1 - - Disable SSLv3 - - Revert CRIME mitigation patch, as it's not needed - - Mitigate CVE-2012-4929 - - Turn SSLEngine on in the SSL vhost (ProxyPassVirtualHosts) - -Other fixes and updates - - - Add a column to display forwarding address - - Correctly display http URL to the server-manager in the console - - Fire ssl-update event when default cert is renewed - - Expand /home/e-smith/ssl.pem/pem during ssl-update - - Update /etc/mime.types templates - - Use sha256 algorithm for signature of SSL cert. - - Fix including /etc/selinux directory - - Add templates for /etc/selinux/config - - Add dummy NIC support as InternalInterface - - Only fire the ip-change event when IP is assigned to WAN nic - (Code by Charlie Brady and John Crisp) - - Only reset service access when switching to or from private server mode - (Code by Charlie Brady) - - When quiting the console app with unsaved changes set the default selected - - answer to NO Hsing-Foo Wang - - Added a comment to specify the real configuration file of dhcpd - - Modified the patch of daniel e-smith-base-5.6.0-ensure_apache_alias_www.patch - - Ensure www group exists and that apache is an alias of www - - Ensure www group exists and that apache is an alias of www - - Check were running runlevel 4, not 7 in service wrapper - - Correctly update NIC configuration on single NIC systems - - Symlink udev-post service in rc7 - - Fix PPPoE after a post-upgrade - - Remove dependency on microcode_ctl - - Prevent emailing about the normal, weekly, checks of RAID arrays, by Mark Casey - - Remove motd text from grub.cfg - - Allow empty comment when creating/modifying a hostname - - Add a migrate fragment to sanitize the host comment - - Code done by Charlie Brady - - and Huib - - Add a validator for the comment and the hostname field - - Remove double / in SSL RewriteRule - - Revert the upload_tmp_folder patch as it needs some more work - - Add an upload_tmp_folder setting by db command - - Thanks to Michael McCarn and Jean-philippe Pialasse - - init-ibays create the folder tmp within all i-bays root directory - - ibay-modify create/chown/chmod the folder tmp within the i-bays root directory - - Add an upload_tmp_folder setting by db command - - Thanks to Michael McCarn and Jean-philippe Pialasse - - Force SSL following ibays settings to the relevant domain - - Perl::critic syntax modifications - - Add more PHP options to ibays only by db commands - - Add SSLRequireSSL to ibays when SSL is set to enabled - - Adjust regex so adjust-service accepts sigusr1 and sigusr2 from files - - Added a password creation (set_secret) - - code from Charlie Brady - - Rebase on upstream 9.03.53-1 - - Roll in CentOS Branding - - functions: parse -d first - - functions: fix ignored delay in killproc - - netfs: only unmount loopback device mounted on top of netdev or with back-file on netdev - - functions: improve killing loops - - netfs: tweak nfs umount - - sysctl.conf: mention sysctl -a - - sysconfig.txt: document PPPOE_EXTRA and PPPD_EXTRA - - spec: require plymouth - - fix mangled sysconfig/init.s390 - - rc.sysinit: don't perform fsck twice with /.autorelabel - - ifdown-eth: fix comparison - - ifup-eth: if arping fails, output responding MAC - - network-functions: fix change_resolv_conf after grep update - - spec: add sysctl.d dir - - rc.sysinit: fix typo in fs - - rename_devices: comments need to have a blank before them - - rename_device: remove comments and trailing whitespaces - - bonding: warn if the ifup for slave device failed - - clarify daemon() usage message - - ifdown: clean ipv4 localhost addresses - - ifup-post: check resolve.conf also with DNS2 - - ifup: add missing quotes - - ifup-eth: some bridge options are applied later - - init.d/halt: give init some time to reexecute - - network-scripts: DEVICE and HWADRR could be quoted by apostrophe - - ifup-wireless: fix calling of phy_wireless_device - - rc.sysinit: apply quotas after system is relabeled - - network-functions: fix change_resolv_conf after grep update - - use new -m option to pidof - - rc.sysinit: be more verbose - - init.d/functions: rc.debug option to debug initscripts - - ifup-aliases: inherit ARPCHECK from parent device - - netfs: don't race NFS umount to network shutdown - - network: report that we can't shut down network for root on netfs - - Fix tcsh + grep-2.7. (#636552) - - sysctl.conf: move bridge setting to module-init-tools - - rc.sysinit: set affinity also for current shell - - ifdown-eth: use scope host for lo - - improve_check_for_bond_master_in_install_bonding_driver - - network-functions: fix check in install_bonding_driver - - ifdown-post: remove resolv.conf only in specific cases - - netconsole: lets run earlier - - ipcalc: support RFC3021 (#997271) - - halt: add delay after upsdrvctl shutdown - - ifup: also set multicast_snooping after the bridge is up - - ifup,vlan: fix typo - - ifup,vlan: fix typo - - backport to SME9 - - fix redirection when proxy ssl - - update apxs path for SME9 (sbin) - - Bump for beta1 release of 9.2 - - Bump for 9.1 final - - Bump for release candidate 1 - - Bump for beta3 of 9.1 - - Bump for beta2 of 9.1 and update displayversion as well - - Update for beta1 release of 9.1 - - Update copyright in server-manager footer - - Don't put motd content in /etc/redhat-release - - created a template for /etc/system-release - - Added smeserver-support-2.6.0.bz8939.system-release-template.patch - - added a motd message to increase involvements or donations - - Code done by John Crisp and - - Stefano Zamboni - - Remove now uneeded obsolete directives - - Remove openssl from the Exclude list of centos repo - - Example to update contribs 1 by 1 - - Set the check update frequency of smecontribs through the server-manager - - Add a default Yum db property for check4contribsupdates - - Added a check-update for the smecontribs repository - - Move protected package list to the correct location - - - -General features -================ - -- Based on CentOS 6.8 and all available updates - - -Terry Fage -On behalf of the Koozali SME Server development team +Koozali SME Server 9.2 RC2 Release Notes +=========================================== + +10 April 2017 + +The Koozali SME Server (SME Server) development team is pleased to announce +the release of SME Server 9.2 RC2 which is based on CentOS 6.9 + +Bug reports and reports of potential bugs should be raised in the bug +tracker (and only there, please); + + http://bugs.contribs.org/ + +Download +======== + +You can download Koozali SME Server 9.2 RC2 from +http://mirror.contribs.org/smeserver/releases/testing/9.2.RC2/ +or for other methods see http://wiki.contribs.org/SME_Server:Download + +Please note it may take up to 48 hours for mirrors to finish syncing, +during this time you may experience problems. + +About SME Server +================ + +SME Server is the leading Linux distribution for small and medium +enterprises. Loozali SME Server is brought to you by Koozali Foundation, Inc., +a non-profit corporation that exists to provide marketing and legal support +for SME Server. + +SME Server is freely available under the GNU General Public License and +is only possible through the efforts of the SME Server community. +However, the availability and quality of SME Server is dependent on +meeting our expenses, such as hosting costs, server hardware, etc. + +As such, we ask for a donation to offset costs and fund further development. + +a) If you are a school, a church, a non-profit organisation or an individual +using SME Server for private purposes, we would appreciate you to contribute +within your means toward the costs associated with hosting, maintenance and +development. + +b) If you are a company or an integrator and you are deploying SME Server in +the course of your work to generate revenue, we expect you to make a donation +commensurate with the level of revenue you generate and the number of servers +your have in the field. Please, help the project + +Please visit http://wiki.contribs.org/Donate to donate. + +Koozali Inc is happy to supply an invoice for any donations received, +simply email treasurer@koozali.org + + +Notes +===== + +In-place upgrades are not supported. It is necessary to backup and then restore. +/boot partition is always RAID 1. + +The spare handling for RAID arrays is not implemented. + +USB installs are now supported, see: +http://wiki.contribs.org/Install_From_USB#SME_Server_9 + + +Major changes in this release +============================= + +Major Changes in this release. Updated all to Koozali branding. Server Manager - Allow access to the server-manager without SSL from the loopback, Don't redirect to http when login in/out of the server-manager from localhost. File Server - added W10 support to SME Domain. LDAP - Hook into the new ssl-update event. Mail Server - Update qpsmtpd to release 0.99.6 (including multiple plugins and ability to ebale/disable same), Allow reading SSL_version from the tls_protocols config file (and turn TLSv1 back on by default), Modify whitelist_soft transaction to interact with dnsbl filter, Revert forcing TLSv1 patch as it breaks some inbound delivery, Remove karma rcpt handling, Check rua is defined before trying to parse it to prevent an error if a domain has a DMARC entry published with no rua, add support for the uribl plugin, add detailed spamassassin report headers. Web Server - Hook into the new ssl-update event, Set TLSv1 back to enabled (but keep a prop to disable it if needed). Other fixes and updates - Correctly display http URL to the server-manager in the console, Remove motd text from grub.cfg. + + +Detailed changes in this release +======================= + +Only the changes since SME Server 9.1 are listed, mainly autogenerated from the changelogs. + +Packages altered by Centos, Redhat, and Fedora-associated developers are not included. + +Text With Bug Numbers +Text for ISO Release Notes with Bug Numbers +The changelogs are written per package, and each package is assigned a group. + +File Server + +e-smith-samba +- Create V6 profile dir (for Win10 roaming profiles) [SME: 9772] +proftpd +- Additional tweak (to avoid null pointer dereference) for upstream bug 3868 +- Fix for CVE-2016-3125: usage of 1024 bit DH key even with manual parameters see (http://bugs.proftpd.org/show_bug.cgi?id=4230) +- Also fixed related issue where only first DH param in TLSDHParamFile is used, regardless of requested keylength (http://bugs.proftpd.org/show_bug.cgi?id=3868) +- Fix SUID/SGID directory permission setting regression introduced with fix for CVE-2012-6095 (#1297264) +- Add support for specifying TLSv1.1 and TLSv1.2 (#1281493) + +LDAP + +e-smith-ldap +- Disable SSLv3, but keep the possibility to enable it again [SME: 10113] +- Better default cipher suite, and honor global suite [SME: 10113] +- Hook into the new ssl-update event [SME: 9152] + +Localisation + +smeserver-locale +- apply locale 2017-03-03 patch from pootle [SME: 9592] +- Eliminated rpmbuild "bogus date" warnings due to inconsistent weekday, by assuming the date is correct and changing the weekday. + +Mail Server + +clamav +- Update to release 0.99.2 [SME: 9489] +- Add pcre-devel to BuildRequires [SME: 9151] +e-smith-pop3 +- Hook into a new ssl-update event [SME: 9152] +- Allow setting SSL protocols from DB (and set TLSv1 back to enabled on a default install) [SME: 9175] +- Disable TLSv1 [SME: 9169] +e-smith-qmail +- Add possibility to exclude users or members of other groups from group email address [SME: 9540] +qmail +- Consider literal <> as null sender [SME: 9883] +qpsmtpd +- Removed Message-Id validation, as it rejects MS account validation email [SME: 9773] +- fix whitelist plugin to support helo with naughty rejecting at mail stage [SME: 10111] +- Validate domains found in uribl with Data::Validate::Domain [SME: 9499] +- Use eval to fetch dkim policies, prevent fatal errors in case of DNS timeout [SME: 9504] +- Remove karma rcpt handling (buggy and doesn't make a lot of sense) [SME: 9502] +- Check rua is defined before trying to parse it to prevent an errorif a domain has a DMARC entry published with no rua [SME: 9507] +- Fix error when RCPT TO is not valid [SME: 8861] +- Fix karma logic by checking negative strikes [SME: 9502] +- Backport a fix for karma_tool so it can find its database [SME: 9502] +- Update to 0.96 (with some backports from GIT head) [SME: 8861] +- Allow reading SSL_version from the tls_protocols config file (and turn TLSv1 back on by default) [SME: 9162] +- Correctly log login attempts with nulls in login name [SME: 9167] +- Disable TLSv1 [SME: 9162] +qpsmtpd-plugins +- remove whitelist_soft [SME: 10125] +smeserver-clamav +- Disable unofficial sigs for filesystem scans [SME: 9142] +smeserver-dovecot +- Better default cipher suite, and honor global suite [SME: 10114] +- Hook into the new ssl-update event [SME: 9152] +- Allow settings SSL protocols from DB (and set TLSv1 back to enabled on a default install) [SME: 9175] +- Disable TLSv1 [SME: 9175] +smeserver-qpsmtpd +- updated regex for SBList in smeserver-qpsmtpd-2.4.0-change_rbl_sbl_list_separator.patch to take into account list using a subdomain [SME: 10116] +- Eliminated rpmbuild "bogus date" warnings due to inconsistent weekday, by assuming the date is correct and changing the weekday. +- Set the default helo policy to lenient [SME: 9767] +- Turn SPF and DMARC rejects off by default [SME: 9654] +- Fix disabling DMARC reporting [SME: 9507] +- Remove o and r DKIM fields as they are not standard [SME: 9506] +- In qpsmtpd-print-dns set DKIM options after the public key so the string will still be splitted correctly [SME: 9506] +- Fix a syntax error in the qpsmtpd-print-dns script [SME: 9507] +- Remove warning about spool dir permission on startup [SME: 9511] +- Add missing patch for DKIM signing [SME: 9506] +- Add missing run time dependency on perl(DBD::SQLite) [SME: 9507] +- Check SPF for inbound emails [SME: 9505] +- Check DKIM for inbound emails [SME: 9504] +- Check DMARC for inbound emails (based on the previous SPF and DKIM checks) [SME: 9507] +- Store and send DMARC aggregate reports [SME: 9507] +- Support DKIM signing for outbound emails [SME: 9506] +- Use an additional badrcptto file list for external connections so local only pseudonymes work as expected [SME: 9503] +- Enable the bogus_bounce plugin [SME: 9501] +- Use the naughty plugin to defer rejections, leaving users an opportunity to authenticate [SME: 9500] +- Add support for the uribl plugin [SME: 9499] +- Change separator for SBList and RBLlist from : to , [SME: 9498] +- Switch to the clamdscan plugin [SME: 9497] +- Enabe the loadcheck plugin [SME: 9508] +- Add support for the karma plugin [SME: 9502] +- Work with qpsmtpd 0.96 [SME: 8861] +- Expand all ssl related conf in ssl-update [SME: 9152] +- Hook into a new ssl-update event [SME: 9152] +- Allow setting SSL protocols from DB [SME: 9162] +smeserver-spamassassin +- Rewrite spamd run script to add support for --allow-tell [SME: 10138] +- Add X-Spam-Details header (and simplify X-Spam-Status) [SME: 9509] +- Disable ipv6 support to prevent a warning during startup [SME: 9153] + +Server manager + +e-smith-manager +- reapply patch 4 +- Update server-manager to Koozali branding [SME: 9678] +- move fix to the right line to be effective [SME: 9920] +- fix bad redirection parameter that might reveal session information to remote site temporarily reverting patch 4 for fast release of security fix please put it back at next release [SME: 9920] +- Update server-manager to Koozali branding [SME: 9678] +- e-smith-manager-2.6.0-Koozali_manager.patch better syntax for removing Indexes option for the manager [SME: 9589] +- Remove index option for manager's resources [SME: 9589] +- fix 307 redirection to http when https is used [SME: 8825] +- update syntaxe for TKT Auth, bump 7 for typo, corrected typo in e-smith-manager-2.4.0_dont_rewrite_to_https_from_localhost.patch code from John H. Bennett III bennettj@johnbennettservices.com [SME: 9271] +- Really don't redirect to http when login in/out of the server-manager [SME: 9163] +- Don't redirect to http when login in/out of the server-manager from localhost [SME: 9163] +- Allow access to the server-manager without SSL from the loopback [SME: 9163] +php +- don't set environmental variable based on user supplied Proxy request header CVE-2016-5385 +- fix wrong warning in openssl_encrypt() for missing IV when IV is not required #1260315 +- fix segfault's when you try and allocate an SplFixedArray with size >= 9999 #1071344 +- segfault in php_pgsql_meta_data CVE-2015-4644 #1234434 +- add options to enable TLS in curl #1255920 +- fix segfault in gc_collect_cycles #1122681 + +Webmail and Groupware + +Web Server + +e-smith-apache +- Hook into the new ssl-update event [SME: 9152] +- Set TLSv1 back to enabled (but keep a prop to disable it if needed) [SME: 9154] +- Disable TLSv1 [SME: 9154] + +Other fixes and updates + +e-smith-base +- Use ip route syntax to define routes to local network [SME: 9905] +- Allow /32 masks on the external interface, in which case we don't check if the gateway is on the correct network) [SME: 9765] +- Add a column to display forwarding address [SME: 9174] +- Correctly display http URL to the server-manager in the console [SME: 9163] +- Fire ssl-update event when default cert is renewed [SME: 2257] +- Expand /home/e-smith/ssl.pem/pem during ssl-update [SME: 9152] +e-smith-devtools +- Quote filenames in genfilelist so filenames containing spaces are correctly handled [SME: 9758] +e-smith-grub +- Remove motd text from grub.cfg [SME: 9161] +e-smith-hosts +- Allow empty comment when creating/modifying a hostname [SME: 9177] +e-smith-ibays +- Remove double / in SSL RewriteRule [SME: 9195] +e-smith-lib +- Adjust regex so adjust-service accepts sigusr1 and sigusr2 from files [SME: 9184] +e-smith-proxy +- Allow custom file descriptor limit, and set default to 4096 [SME: 9911] +initscripts +- Rebase on upstream 9.03.53-1 [SME: 9534] +- Roll in CentOS Branding +- functions: parse -d first +- functions: fix ignored delay in killproc +- netfs: only unmount loopback device mounted on top of netdev or with back-file on netdev +- functions: improve killing loops +- netfs: tweak nfs umount +- sysctl.conf: mention sysctl -a +- sysconfig.txt: document PPPOE_EXTRA and PPPD_EXTRA +- spec: require plymouth +- fix mangled sysconfig/init.s390 +- rc.sysinit: don't perform fsck twice with /.autorelabel +- ifdown-eth: fix comparison +- ifup-eth: if arping fails, output responding MAC +- network-functions: fix change_resolv_conf after grep update +- spec: add sysctl.d dir +- rc.sysinit: fix typo in fs +- rename_devices: comments need to have a blank before them +- rename_device: remove comments and trailing whitespaces +- bonding: warn if the ifup for slave device failed +- clarify daemon() usage message +- ifdown: clean ipv4 localhost addresses +- ifup-post: check resolve.conf also with DNS2 +- ifup: add missing quotes +- ifup-eth: some bridge options are applied later +- init.d/halt: give init some time to reexecute +- network-scripts: DEVICE and HWADRR could be quoted by apostrophe +- ifup-wireless: fix calling of phy_wireless_device +- rc.sysinit: apply quotas after system is relabeled mod_auth_tkt +- backport to SME9 fix redirection when proxy ssl [SME: 8825] +- update apxs path for SME9 (sbin) + smeserver-release +- Bump for beta1 release of 9.2 [SME: 9525] + smeserver-support +- updated sources with new pictures fix hover color [SME: 9678] +- Koozali branding of manager [SME: 9678] +- Eliminated rpmbuild "bogus date" warnings due to inconsistent weekday,by assuming the date is correct and changing the weekday. +- Update copyright in server-manager footer [SME: 9266] +- Don't put motd content in /etc/redhat-release [SME: 9161] + smeserver-yum +- added centos SCLo SIG gpg rpm signing key [SME: 10102] + will allow to install SCL packages directly from smecontribs + +General features +================ + +- Based on CentOS 6.9 and all available updates + +Terry Fage +Compilation of release data is thanks to Ian Wells +On behalf of the Koozali SME Server development team