Release Notes CPS 5.5.10

Collax Platform Server
13.08.2013

Installation Notes

Update Instructions

To install this update please follow the following steps:

Procedure

  1. It is highly recommended to backup of all server data with the Collax backup system before proceeding. Check that the backup was successful before proceeding with the update (this can be done within the backup information email).
  2. In the administration interface go to System → System Operation → Software → System Update and press Get Package List. This will download the listed update packages. If successful the message Done! will be displayed on the screen.
  3. Click Get Packages to download the update packages.
  4. Click Install. This installs the update. The end of this process is indicated by the message Done!.
  5. A new kernel will now be installed. The system will reboot automatically after installing the update. An appropriate note will be shown if the update process is completed.

New in this Version

Zarafa Groupware: New Version 7.1.5

With this Collax software update the new version 7.1.5 of Zarafa Groupware is going to be installed. This version includes mainly improvements, also for clients running on Windows 8 and Outlook 2013. Please find details here:

http://download.zarafa.com

Issues Fixed in this Version

Security: Strongswan IKE Daemon for VPN Connections

In the source code of Strongswan, the IKE Daemon for VPN Connections a security hole has been discovered, which treated empty signatures as valid. This hole is going to be closed with a patch for the version 4.6.1.0.

Authentication: Incorrect Calculation of the Primary Email Address when using ActiveDirectory and

the Collax AD-Proxy

The calculation of default mail addresses was broken for various reasons when user data was imported from ActiveDirectory via the Collax AD proxy. With this update a number of additional configuration variables are introduced to be used by the Collax AD proxy. This allows the calculation of the addresses to be performed correctly during runtime rather than configuration time.

Collax Web Security: Web Proxy does not start, Cache is deleted

When the proxy-cache has been emptied and reinitialized with the action “clear cache”, the directory structure could not be recreated in some cases. This resulted in the Web-Proxy-Service being unable to start. This will be fixed with this update.

Zarafa Groupware: Rewritten Sender Address, Wrong Primary Email Address

Newly created users got a wrong sender-address assigned, either with wrong maildomain or wrong user alias. For the same users the reply-address did not match the configured primary mail address. The corresponding filter used by zarafa to get the primary mail address has been adapted with this update. Zarafa users will now get the correct From-address assigned.

Connection Can Not be Established Manually

If the network ‘Internet’ got routed like a local network, it wasn’t guaranteed that the VPN tunnel connection got reestablished after a server reboot. In some cases it also wasn’t possible to restart the VPN connection via the administator interface. This update adapts the routing rules for these cases and VPN links can be started as expected.

Wrong Sender IP Address after Reboot

If there has been more than one IP address configured on a device used for VPN connections, a reboot resulted in the wrong Sender-IP being used for said VPN connections. The Sender-IP can now be configured explicitely for these routes.

UTF-8 Character within PSK String

Using special characters like € or @ in the preshared-key resulted in missing connection information in the gui under System → Monitoring/Analysis → Link Status and System → Monitoring/Analysis → IPsec. With this version the generation of the connection scripts has been improved in a way that UTF-8 characters are being used correctly. VPN status details are being shown correctly with this.

System Management: Logfiles when Checking LSI Controller Fills up Hard Disk

With this update the monitoring of LSI raid controller is going to be improved.

Add-on Software: Files with suspicious extensions are filtered

Files with a suspicious extension (e.g. .jpg.exe) are filtered by the Avira scanner.