Release Notes CPS 7.0.14
Collax Platform Server
To install this update please follow the following steps:
- It is highly recommended to backup of all server data with the Collax backup system before proceeding. Check that the backup was successful before proceeding with the update (this can be done within the backup information email).
- In the administration interface go to System → System Operation → Software → System Update and press Get Package List. This will download the listed update packages. If successful the message Done! will be displayed on the screen.
- Click Get Packages to download the update packages.
- Click Install. This installs the update. The end of this process is indicated by the message Done!.
- A new kernel will now be installed. The system will reboot automatically after installing the update. An appropriate note will be shown if the update process is completed.
New in this Version
Security: Important security relevant System Components
This update will also install/update the following important system components:
- mariadb 10.0.31
- libgcrypt 1.8.1
- postfix 3.1.6
GUI: Clean-up form statistics
In the dialog “Clean-up” in the menu Status->Toolbox->Clean-up it is possible to remove the data saved by the GUI. Within this release the system statistics can be removed.
Security: Collax Anti Spam powered by Kaspersky™
With the Update 7.0.14 for Security Gateway, Business Server, Groupware Suite und Platform Server Collax introduces the new product Collax Anti Spam powered by Kaspersky™. Collax Anti Spam contains a bunch of new and up-to-date applications to guarantee the security of email-servers. With Collax Anti Spam you can setup complex mail-gateways on base of Collax Servers. Collax Anti Spam uses a hybrid apporach, in the cloud an on-premise, to protect against spam and phishing mails. Some of the methods are cloud-based and enable an effective detection and blocking of emails.
E-Mail: IMAP Service Cyrus
In the source code of cyrus bug fixes have been closed. Within this update cyrus version 2.5.11 is going to be installed.
Kopano Groupware: Kopano Core 8.3.4
With this Collax software update the new version 8.3.4 of Kopano Core is going to be installed. Please find details here:
Kopano Groupware: New version of Z-Push
With this Collax software update, Z-Push 2.3.8 is going to be installed. More information on:
Issues Fixed in this Version
Collax E-Mail Archive: Downloading attachements
When using the Mailarchive the download of attachments didn’t work anymore. This is going to be fixed within this release.
E-Mail: Increased required space when using IMAP and full-text index
The option “Generate full-text index” in the options of the dialog “Mail and Messaging -> Mail Storage -> IMAP and POP3” generates a full-text index of the local IMAP folders which accelerates the search within the IMAP folders and e-mails. While activated, the system could use up to 20% more space compared to the former release (also with activated index) for the service cyrus. Please check the space requirements of the service cyrus in advance. Under the dialog “Status -> System -> Statistics” the graph “filesystem/data” shows further details.
Security: Security warning - Z-Push ActiveSync Clients
A security hole in our implementation of Z-Push into the Collax authentication system may allow unauthorized access to Kopano’s email accounts. This vulnerability affects all Collax installations using Kopano and the Collax version 7 Z-Push module. With the release version 7.0.14 the bug has been fixed. The update includes a current z-push and a new z-push web services package as well as a system library. The vulnerability is classified as critical. Please update all Collax server systems accordingly on which Kopano and Z-Push are used.
System Management: Monitoring Media Erros on LSI Controllers
Within this update the active monitoring of media errors on LSI RAID-Controllers has been customized. Up to now a warning information for hard disks with a single media error has been issued, although the controller was able to handle those errors and correct them automatically. From now on the warning threshold is 100 errors.