Release Notes for SUSE Linux Enterprise Desktop 11 Service Pack 3 (SP3)
Version 11.3.17 (2013-05-27)
Abstract
These release notes are generic for all SUSE Linux Enterprise Desktop 11 based
products. Some parts may not apply to particular architectures or products.
Where this is not obvious, the respective architectures are listed explicitly.
An Installation Quick Start can be found in the docu directory on the media.
Any documentation (if installed) can be found below /usr/share/doc/ in the
installed system.
This SUSE product includes materials licensed to SUSE under the GNU General
Public License (GPL). The GPL requires SUSE to provide the source code that
corresponds to the GPL-licensed material. The source code is available for
download at http://www.suse.com/download-linux/source-code.html. Also, for up
to three years after distribution of the SUSE product, upon request, Novell
will mail a copy of the source code. Requests should be sent by e-mail to
mailto:sle_source_request@novell.com or as otherwise instructed at http://
www.suse.com/download-linux/source-code.html. Novell may charge a reasonable
fee to recover distribution costs.
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
1. Purpose
2. Important Upgrade Information
3. Support Statement for SUSE Linux Enterprise Desktop
3.1. Erasing All Registration Data
3.2. Software Requiring Specific Contracts
3.2.1. Adobe Acrobat Update Cycles for Linux
4. Installation Related Notes
4.1. Current Limitations in a UEFI Secure Boot Context
4.2. uEFI Secure Boot
4.3. Support for 4 KB/Sector Hard Disk Drives
4.4. UEFI 2.3.1 Support
4.5. Installation via USB
4.6. Mapping Network Interface Names to Names Written on the Chassis
(biosdevname)
4.7. CJK Languages Support in Text-mode Installation
4.8. Unable to Detect Display with Lid Closed
4.9. Development Packages Moved to the SDK
4.10. Installation Using Persistent Device Names
4.11. MD Devices on Top of iSCSI Not Supported
4.12. Using NetworkManager and DHCP
5. New Features
5.1. Desktop
5.1.1. FreeRDP Is Going to Replace rdesktop
5.1.2. The LibreOffice Suite replaces the OpenOffice.org Packages
5.2. Security
5.2.1. OpenSCAP Tools and Libraries Added
5.2.2. PAM Configuration
5.3. Network
5.3.1. Mapping Network Interface Names to Names Written on the Chassis
(biosdevname)
5.4. Server
5.4.1. Upgrading MySQL to Version 5.5
5.5. Systems Management
5.6. Kernel and Toolchain
5.6.1. USB3 Power Savings Features
5.7. Other Changes and Version Updates
6. Update-Related Notes
6.1. General Update Notes
6.1.1. Upgrading PostgreSQL Installations from 8.3 to 9.1.
6.1.2. Migrating to SLE 11 SP3 Using Zypper
6.1.3. Online Migration from SP2 to SP3
6.1.4. Graphics Drivers Using KMS
6.1.5. Updating KDE
6.1.6. GroupWise 8 Client
6.1.7. Kernel Package Split in Subpackages
6.1.8. Displaying Manual Pages with the Same Name
6.1.9. AppArmor
6.1.10. Fine-Tuning Firewall Settings
6.2. Update from SUSE Linux Enterprise Desktop 11 SP 2
6.2.1. Augeas Framework Updated
6.2.2. Postfix: Incompatibility Issues and New Features
6.2.3. unixODBC Updated to Version 2.3.1
7. Driver Updates
7.1. X.Org: fbdev Used in UEFI Secure Boot Mode (ASpeed Chipset)
7.2. X.Org Driver Used in UEFI Secure Boot Mode (Matrox)
7.3. Network Drivers
7.3.1. Emulex be2net Driver
7.3.2. Support for Intel Centrino Wireless Adapters
7.4. Storage Drivers
7.5. Other Drivers
7.5.1. Updated Support for Intel Integrated Graphics
8. Other Updates
8.1. openJDK 7 as a Replacement for openJDK 6
8.2. Update of ICAClient
8.3. Package python-ethtool
8.4. Update Python to 2.6.8
9. Technology Previews
9.1. eCryptfs Filesystem
9.2. KVM
9.3. Read-Only Root Filesystem
9.4. Linux Filesystem Capabilities
10. Deprecated Functionality
10.1. X.Org: fbdev Used in UEFI Secure Boot Mode (ASpeed Chipset)
10.2. X.Org Driver Used in UEFI Secure Boot Mode (Matrox)
10.3. Support for the JFS File System
10.4. Deprecation of Package ncpfs
10.5. Support for Portmap to End with SUSE Linux Enterprise 11 SP3
10.6. L3 Support for Openswan Is Scheduled to Expire
10.7. FreeRDP Is Going to Replace rdesktop
10.8. Removed Packages
10.9. Deprecated Packages
10.10. JFS File System
11. Infrastructure, Package and Architecture Specific Information
11.1. Systems Management
11.1.1. Providing the URL of an Add-on Media at the Command Line during
Installation
11.1.2. Snapper Enhancements
11.2. Architecture Independent Information
11.2.1. Current Limitations in a UEFI Secure Boot Context
11.2.2. Change of libzypp History
11.2.3. Changes in Packaging and Delivery
11.2.4. Cross Architecture Information
11.3. AMD64/Intel64 64-Bit (x86_64) and Intel/AMD 32-Bit (x86) Specific
Information
11.3.1. Virtualization
12. Technical Information
12.1. Kernel Limits
12.2. Xen Limits
12.2.1. XEN: Secure Boot
12.3. File Systems
12.3.1. XFS Realtime Volumes
12.3.2. ext4: Runtime Switch for Write Support
12.4. IPv6 Implementation and Compliance
12.4.1. IPv6 Support for NFSv3
12.4.2. IPv6 Support to AutoFS
12.5. Other Technical Information
12.5.1. Boot Device Larger Than 2 TiB
12.5.2. Better Sound Functionality with Pulseaudio 0.9.14 or Higher
12.5.3. netconfig Utility to Apply Additional Network Settings
12.5.4. Atheros Wireless Cards
12.5.5. Detecting Lenovo ThinkPad Laptops
12.5.6. Stopping Cron Status Messages
13. Known Issues
13.1. Latest Release Notes
13.2. Network Issues After Updating
13.3. Kopete Lacks IRC Support
13.4. Hardware Related Issues
13.4.1. Limited Graphics Support on IBM SurePOS 700 4800-7X3 during
Installation
13.4.2. Graphical Distortions on the FIC GE2 Plattform (Transtec
SENYO600)
14. Documentation
14.1. Application Guide: Firefox—Disabling Features
15. More Information and Feedback
16. Miscellaneous
17. Legal Notices
Chapter 1. Purpose
SUSE Linux Enterprise Desktop is the market's only enterprise-quality Linux
desktop ready for routine business use. Developed and backed by SUSE, SUSE
Linux Enterprise Desktop provides market-leading usability, seamless
interoperability with existing IT systems, and dozens of essential
applications—all at a fraction of the price of proprietary operating systems.
It comes bundled with the latest versions of leading applications such as
LibreOffice office productivity suite, Mozilla Firefox web browser, and
Evolution email and calendar suite. In addition, it integrates with Microsoft
SharePoint and Novell Teaming for group collaboration and supports a wide range
of multimedia file formats, wireless and networking standards, and
plug-and-play devices.
Through the latest enhancements in power management and security, SUSE Linux
Enterprise Desktop also provides an environmentally friendly IT experience
(Green IT) and an error-proof desktop. Finally, SUSE Linux Enterprise Desktop
unparalleled flexibility. You can deploy it on a wide range of thick client
devices (including desktops, notebooks, netbooks, and workstations), on thin
client devices, or as a virtual desktop. By leveraging the power of SUSE Linux
Enterprise Desktop, your business can dramatically reduce costs, improve
end-user security and increase workforce productivity.
Chapter 2. Important Upgrade Information
For users upgrading from a previous SUSE Linux Enterprise Desktop release it is
recommended to review:
• Chapter 3, Support Statement for SUSE Linux Enterprise Desktop
• Section 6.1, “General Update Notes”
• Chapter 12, Technical Information
These Release Notes are identical across all architectures, and the most recent
version is always available online at http://www.suse.com/releasenotes/.
Chapter 3. Support Statement for SUSE Linux Enterprise Desktop
To receive support, see http://www.suse.com/products/desktop/.
3.1. Erasing All Registration Data
Sometimes you may want to remove all data that was created during the
registration of a SUSE Linux Enterprise system, so you can cleanly re-register
it with different credentials.
This can now be accomplished with suse_register by using the new option
"--erase-local-regdata". Note that this does not free the subscription that the
system may have consumed in the Customer Center. This needs to be done from the
Customer Center's Web UI.
3.2. Software Requiring Specific Contracts
The following packages require additional support contracts to be obtained by
the customer in order to receive full support:
3.2.1. Adobe Acrobat Update Cycles for Linux
Adobe has announced to change the Acrobat Reader update cycles for Linux to
twice a year.
SUSE will adjust the frequence of security updates of Adobe Reader 9.x for
Linux accordingly. It is recommended to switch to an alternate PDF viewer such
as evince or okular, if possible. SUSE may in future releases discontinue
Acrobat Reader due to Adobe's update policy.
Chapter 4. Installation Related Notes
This section includes installation related information for this release.
4.1. Current Limitations in a UEFI Secure Boot Context
When booting in Secure Boot mode, the following restrictions apply:
• bootloader, kernel and kernel modules must be signed
• kexec and kdump are disabled
• hibernation (suspend on disk) is disabled
• access to /dev/kmem and /dev/mem is not possible, even as root user
• access to IO port is not possible, even as root user. All X11 graphical
drivers must use a kernel driver
• PCI BAR access through sysfs is not possible
• 'custom_method' in ACPI is not available
• debugfs for "asus-wmi" module is not available
• 'acpi_rsdp' parameter doesn't have any effect on kernel
4.2. uEFI Secure Boot
SLES11-SP3 and SLED11-SP3 implement uEFI Secure Boot. Installation media
supports Secure Boot. Secure Boot is only supported on new installations (not
on upgraded systems from older SLES11 installations), if Secure Boot flag is
enabled in the uEFI firmware at installation time.
For more informations, see Administration Guide, section Secure Boot.
4.3. Support for 4 KB/Sector Hard Disk Drives
Support for 4 KB/sector hard disk drives requires support from all code that
directly accesses the hard disk drives.
SUSE Linux Enterprise fully supports 4 KB/sector drives in all conditions and
architectures with one exception. The 4KB/sector hard disk drives are not
supported as a boot drive on x86_64 systems booting with a legacy BIOS.
4.4. UEFI 2.3.1 Support
SP3 is supporting booting systems following UEFI specification up to version
2.3.1 errata C.
Note: Installating SLE 11 SP3 on Apple hardware is not supported.
4.5. Installation via USB
FATE 312662 RN missing
4.6. Mapping Network Interface Names to Names Written on the Chassis
(biosdevname)
This feature addresses the issue that eth0 does not map to em1 (as labeled on
server chassis), when a server has multiple network adapters.
This issue is solved for Dell hardware, which has the corresponding BIOS
support, by renaming onboard network interfaces to em[1234], which maps to
Embedded NIC[1234] as labeled on server chassis. (em stands for
ethernet-on-motherboard.)
The renaming will be done by using the biosdevname utility.
biosdevname is automatically installed and used if YaST2 detects hardware
suitable to be used with biosdevname. biosdevname can be disabled during
installation by using "biosdevname=0" on the kernel commandline. The usage of
biosdevname can be enforced on every hardware with "biosdevname=1". If the BIOS
has no support, no network interface names are renamed.
4.7. CJK Languages Support in Text-mode Installation
CJK (Chinese, Japanese, and Korean) languages do not work properly during
text-mode installation if the framebuffer is not used (Text Mode selected in
boot loader).
There are three alternatives to resolve this issue:
1. Use English or some other non-CJK language for installation then switch to
the CJK language later on a running system using YaST+System+Language.
2. Use your CJK language during installation, but do not choose Text Mode in
the boot loader using F3 Video Mode. Select one of the other VGA modes
instead. Select the CJK language of your choice using F2 Language, add
textmode=1 to the boot loader command-line and start the installation.
3. Use graphical installation (or install remotely via SSH or VNC).
4.8. Unable to Detect Display with Lid Closed
During the installation YaST resp. SaX2 tries to detect displays and determine
the display size and resolution. If you are installing on a notebook with a
closed lid it is not be possible to detect the display. To avoid this problem
you must keep the lid open during installation.
If the detection fails, start YaST and click Hardware+Graphics Card and
Monitor. Then configure the display manually.
4.9. Development Packages Moved to the SDK
As many development packages and sub-packages as possible have been moved to
the SDK.
4.10. Installation Using Persistent Device Names
The installer uses persistent device names by default. If you plan to add
storage devices to your system after the installation, we strongly recommend
you use persistent device names for all storage devices.
To switch to persistent device names on a system that has already been
installed, start the YaST2 partitioner. For each partition, select Edit and go
to the FStab Options dialog. Any mount option except Device name provides you
persistent device names. In addition, rerun the boot loader module in YaST to
switch the bootloader to using the persistent device name. Start the module
Boot Loader and select Finish to write the new proposed configuration to disk.
This needs to be done before adding new storage devices.
For further information, visit http://en.opensuse.org/
SDB:Persistant_storage_device_names.
4.11. MD Devices on Top of iSCSI Not Supported
iSCSI devices cannot be used for Linux Software RAID. Using MD devices on top
of iSCSI triggers a cyclic dependency that leads to a system crash.
4.12. Using NetworkManager and DHCP
To make NetworkManager send the hostname to the DHCP server, create a new
network profile (see the Administration Guide for more information). Modify
this profile with GNOME Configuration Editor (gconf-editor) and add the key /
system/networking/connections/$number/ipv4/dhcp-hostname (replace "$number"
with the actual number) with a string value. NetworkManager will send this
value to the DHCP server. A special value system-hostname can be used to send
the current hostname.
Chapter 5. New Features
5.1. Desktop
• GNOME 2.28
GNOME was updated to version 2.28 with SP1, only selected packages got an
update for SP2 or SP3.
• KDE 4.3
SUSE introduced KDE 4 with SUSE Linux Enterprise Desktop 11 as an
innovative free software desktop and applications such as the Konqueror web
browser, the Dolphin file manager, the Okular document reader, the System
Settings control center and more.
KDE was updated to 4.3.4 version with SP1.
This new version of KDE is built on KDE Libraries which provide easy access
to resources on the network by means of KIO and advanced visual
capabilities through Qt4. Phonon and Solid. Customers migrating from SUSE
Linux Enterprise Desktop 10 using KDE are getting a new user experience in
version 11 Service Pack 1 and later. We recommend backing up your user home
directory when upgrading from SUSE Linux Enterprise Desktop 10. (Partly
based on http://www.kde.org/announcements/4.0/.)
• X.org 7.4
The X server libraries were updated to version 1.6.5. The client libraries
were kept the same, except for libgl.
5.1.1. FreeRDP Is Going to Replace rdesktop
In some scenarios, FreeRDP performs better than the rdesktop client, which is
currently available as the Linux RDP client. Thus we add support for FreeRDP in
SUSE Linux Enteprise Desktop 11 SP2. With the upcoming SP3, we will drop
rdesktop in favor of FreeRDP.
5.1.2. The LibreOffice Suite replaces the OpenOffice.org Packages
OpenOffice.org has been replaced with LibreOffice with SP1. If you perform an
upgrade, manual interaction is needed, otherwise you will stay with the old
OpenOffice.org packages. Future updates will only be prepared and published for
LibreOffice. Some parts of the documentation packages still mention
'OpenOffice.org'.
5.2. Security
5.2.1. OpenSCAP Tools and Libraries Added
OpenSCAP is a set of open source libraries providing a path for integration of
SCAP (Security Content Automation Protocol). SCAP is a collection of standards
managed by NIST with the goal of providing a standard language for the
expression of Computer Network Defense related information. For more
information about SCAP, see http://nvd.nist.gov .
5.2.2. PAM Configuration
The common PAM configuration files (/etc/pam.d/common-*) are now created and
managed with pam-config.
5.3. Network
5.3.1. Mapping Network Interface Names to Names Written on the Chassis
(biosdevname)
This feature addresses the issue that eth0 does not map to em1 (as labeled on
server chassis), when a server has multiple network adapters.
This issue is solved for Dell hardware, which has the corresponding BIOS
support, by renaming onboard network interfaces to em[1234], which maps to
Embedded NIC[1234] as labeled on server chassis. (em stands for
ethernet-on-motherboard.)
The renaming will be done by using the biosdevname utility.
biosdevname is automatically installed and used if YaST2 detects hardware
suitable to be used with biosdevname. biosdevname can be disabled during
installation by using "biosdevname=0" on the kernel commandline. The usage of
biosdevname can be enforced on every hardware with "biosdevname=1". If the BIOS
has no support, no network interface names are renamed.
5.4. Server
5.4.1. Upgrading MySQL to Version 5.5
Replacing an unmaintained version of MySQL.
SLES11-SP3 introduces the upgrade of the MySQL database to version 5.5. This
upgrade involves a change of the database format and the database needs to be
converted before MySQL can run again. Therefore MySQL is not running directly
after the upgrade.
To mgirate the MySQL database, run following commands as root:
touch /var/lib/mysql/.force_upgrade
rcmysql restart
To verify failures during the server start check the log files under /var/log/
mysql/ .
We strongly recommend to back up the database before migrating it (mostly /var/
lib/mysql ).
5.5. Systems Management
• Improved Update Stack
SUSE Linux Enterprise Desktop 11 comes with an improved update stack and
the command line tool zypper to manage the install/update packages and
repositories.
• Enhanced YaST Partitioner
• Extended Built-in Management Infrastructure
CIM enablement with SFCB CIMON.
5.6. Kernel and Toolchain
• GCC 4.3.4
• glibc 2.11
• Linux kernel 3.0.10
5.6.1. USB3 Power Savings Features
USB3 Link Power Management and Latency Tolerance Messaging have been
implemented for improved power efficiency.
5.7. Other Changes and Version Updates
• EVMS2 Replaced with LVM2
• Default Filesystem
The default file system in new installations was changed from ReiserFS to
ext3 with SUSE Linux Enterprise Desktop 11. A public statement can be found
at http://www.suse.com/products/server/technical-information/#FileSystem.
• Samba 3.4.3
• UEFI Enablement on AMD64
• SWAP over NFS
• Python 2.6.0
• Perl 5.10
• Ruby 1.87
Chapter 6. Update-Related Notes
This section includes update-related information for this release.
6.1. General Update Notes
6.1.1. Upgrading PostgreSQL Installations from 8.3 to 9.1.
To upgrade a PostgreSQL server installation from version 8.3 to 9.1, the
database files need to be converted to the new version.
Newer versions of PostgreSQL come with the pg_upgrade tool that simplifies and
speeds up the migration of a PostgreSQL installation to a new version. Formerly
dump and restore was needed that was much slower.
pg_upgrade needs to have the server binaries of both versions available. To
allow this, we had to change the way PostgreSQL is packaged as well as the
naming of the packages, so that two or more versions of PostgreSQL can be
installed in parallel.
Starting with version 9.1, PostgreSQL package names contain numbers indicating
the major version. In PostgreSQL terms the major version consists of the first
two components of the version number, i.e. 8.3, 8.4, 9.0, or 9.1. So, the
packages for Postgresql 9.1 are named postgresql91, postgresql91-server, etc.
Inside the packages the files were moved from their standard locations to a
versioned location such as /usr/lib/postgresql83/bin or /usr/lib/postgresql91/
bin to avoid file conflicts if packages are installed in parallel. The
update-alternatives mechanism creates and maintains symbolic links that cause
one version (by default the highest installed version) to re-appear in the
standard locations. By default, database data are stored under /var/lib/pgsql/
data on SUSE Linux.
The following preconditions have to be fulfilled before data migration can be
started:
1. If not already done, the packages of the old PostgreSQL version must be
upgraded to the new packaging scheme through a maintenance update. For
SLE11 this means to install the patch that upgrades PostgreSQL from version
8.3.14 to 8.3.19 or higher.
2. The packages of the new PostgreSQL major version need to be installed. For
SLE11 this means to install postgresql91-server and all the packages it
depends on. As pg_upgrade is contained in postgresql91-contrib, that one
has to be installed as well, at least until the migration is done.
3. Unless pg_upgrade is used in link mode, the server must have enough free
disk space to temporarily hold a copy of the database files. If the
database instance was installed in the default location, the needed space
in megabytes can be determined by running the follwing command as root: "du
-hs /var/lib/pgsql/data". If space is tight, it might help to run the
"VACUUM FULL" SQL command on each database in the instance to be migrated,
but be aware that it might take very long.
Upstream documentation about pg_upgrade including step by step instructions for
performing a database migration can be found under file:///usr/share/doc/
packages/postgresql91/html/pgupgrade.html (if the postgresql91-docs package is
installed), or online under http://www.postgresql.org/docs/9.1/static/
pgupgrade.html . NOTE: The online documentation starts with explaining how you
can install PostgreSQL from the upstream sources (which is not necessary on
SLES) and also uses other directory names ( /usr/local instead of the
update-alternatives based path as described above).
For background information about the inner workings of pg_admin and a
performance comparison with the old dump and restore method, see http://
momjian.us/main/writings/pgsql/pg_upgrade.pdf .
6.1.2. Migrating to SLE 11 SP3 Using Zypper
To migrate the system to the Service Pack 3 level with zypper, proceed as
follows:
• Open a root shell.
• Run zypper ref -s to refresh all services and repositories.
• Run zypper patchto install package management updates.
• Now it is possible to install all available updates for SLES/SLED 11 SP2;
run zypper patch again.
• Now the installed products contain information about distribution upgrades
and which migration products should be installed to perform the migration.
Read the migration product information from /etc/products.d/*.prod and
install them.
• Enter the following command:
grep 'sle-sdk-SP3-migration
SUSE_SLED-SP3-migration
• Install these migration products (example):
zypper in -t product sle-sdk-SP3-migration SUSE_SLED-SP3-migration
• Run suse_register -d 2 -L /root/.suse_register.log to register the products
in order to get the corresponding SP3 Update repositories.
• Run zypper ref -s to refresh services and repositores.
• Check the repositories using zypper lr. Disable SP1 and SP2 repositories
after the registration and enable the new SP3 repositories (such as
SP3-Pool, SP3-Updates):
zypper mr --disable
zypper mr --enable
Also disable repositories you do not want to update from.
• Then perform a distribution upgrade by entering the following command:
zypper dup --from SLES11-SP3-Pool --from SLES11-SP3-Updates \
--from SLE11-SP2-WebYaST-1.3-Pool --from SLE11-SP2-WebYaST-1.3-Updates
Add more SP3 repositories here if needed, e.g. in case add-on products are
installed. For WebYaST, it is actually SLE11-SP2-*, because there is one
WebYaST release that runs on two SP code bases.
Note
If you make sure that only repositories, which you migrate from, are
enabled, you can omit the --from parameters.
• zypper will report that it will delete the migration product and update the
main products. Confirm the message to continue updating the RPM packages.
• To do a full update, run zypper patch.
• After the upgrade is finished, register the new products again:
suse_register -d 2 -L /root/.suse_register.log
• Run zypper patch after re-registering. Some products donot use the update
repositories during the migration and they are not active at this point of
time.
• Reboot the system.
6.1.3. Online Migration from SP2 to SP3
Online migration from SP2 to SP3 is not supported, if debuginfo packages are
installed.
6.1.4. Graphics Drivers Using KMS
Beginning with SLE11-SP1, we switched to use KMS (Kernel Mode Setting) for
Intel graphics support. This means that mode setting is now done in kernel
space instead of user space (X driver).
If—in rare cases—the new driver concept does not work for you, create an X.Org
configuration manually:
1. Boot into failsafe mode without X (add "3" to the failsafe mode options)
and run 'sax2 -r -m 0=fbdev' to create an fbdev based xorg.conf.
2. Then disable KMS permanently by setting the NO_KMS_IN_INITRD sysconfig
variable to "yes" and run mkinitrd.
3. Finally, reboot again (normal mode) to activate this new X.Org
configuration.
6.1.5. Updating KDE
You can update your previous KDE installation (SUSE Linux Enterprise Desktop 11
or earlier) during system upgrade as described in the manual or as a package
update using YaST or zypper. Because of a huge amount of package renaming, it
is not possible to update your previous KDE installation using plain rpm
commands.
For more information about KDE 4.3, see Section 5.1, “Desktop”.
6.1.6. GroupWise 8 Client
We ship the GroupWise 8 client with this release. If you want to keep the
GroupWise 7 client, enter Software Manager and disable the GroupWise update.
The Groupwise 7 client is available in the extras-repository which can be
enabled after registration.
6.1.7. Kernel Package Split in Subpackages
With SUSE Linux Enterprise Desktop11 the kernel RPMs are split into different
parts:
• kernel-flavor-base
Very reduced hardware support, intended to be used in virtual machine
images.
• kernel-flavor
Extends the base package; contains all supported kernel modules.
• kernel-flavor-extra
All other kernel modules which may be useful but are not supported. This
package will not be installed by default.
6.1.8. Displaying Manual Pages with the Same Name
The man command now asks which manual page the user wants to see if manual
pages with the same name exist in different sections. The user is expected to
type the section number to make this manual page visible.
If you want to get back the previous behavior, set MAN_POSIXLY_CORRECT=1 in a
shell initialization file such as ~/.bashrc.
6.1.9. AppArmor
This release of SUSE Linux Enterprise Desktop ships with AppArmor. The AppArmor
intrusion prevention framework builds a firewall around your applications by
limiting the access to files, directories, and POSIX capabilities to the
minimum required for normal operation. AppArmor protection can be enabled via
the AppArmor control panel, located in YaST under Security and Users. For
detailed information about using AppArmor, see the documentation in /usr/share/
doc/packages/apparmor-docs.
The AppArmor profiles included with SUSE Linux have been developed with our
best efforts to reproduce how most users use their software. The profiles
provided work unmodified for many users, but some users find our profiles too
restrictive for their environments.
If you discover that some of your applications do not function as you expected,
you may need to use the AppArmor Update Profile Wizard in YaST (or use the
aa-logprof(8) command line utility) to update your AppArmor profiles. Place all
your profiles into learning mode with the following: aa-complain /etc/
apparmor.d/*
When a program generates a high number of complaints, the system's performance
is degraded. To mitigate this, we recommend periodically running the Update
Profile Wizard (or aa-logprof(8)) to update your profiles, even if you choose
to leave them in learning mode. This reduces the number of learning events
logged to disk, which improves the performance of the system.
6.1.10. Fine-Tuning Firewall Settings
SuSEfirewall2 is enabled by default. That means that by default you cannot log
in from remote systems. It also interferes with network browsing and multicast
applications, such as SLP and Samba ("Network Neighborhood"). You can fine-tune
the firewall settings using YaST.
6.2. Update from SUSE Linux Enterprise Desktop 11 SP 2
6.2.1. Augeas Framework Updated
The Augeas framework was updated to version 0.9.
6.2.2. Postfix: Incompatibility Issues and New Features
To benefit from enhancements and improvements which have been developed in the
upstream community, postfix is upgraded from version 2.5.13 to the current
version 2.9.4.
Incompatibility Issues:
• The default milter_protocol setting is increased from 2 to 6; this enables
all available features up to and including Sendmail 8.14.0.
• When a mailbox file is not owned by its recipient, the local and virtual
delivery agents now log a warning and defer delivery. Specify
"strict_mailbox_ownership = no" to ignore such ownership discrepancies.
• The Postfix SMTP client(!) no longer tries to use the obsolete SSLv2
protocol by default, as this may prevent the use of modern SSL features.
Lack of SSLv2 support should never be a problem, since SSLv3 was defined in
1996, and TLSv1 in 1999. You can undo the change by specifying empty
main.cf values for smtp_tls_protocols and lmtp_tls_protocols.
• Postfix SMTP server replies for address verification have changed.
unverified_recipient_reject_code and unverified_sender_reject_code now
handle "5XX" rejects only. The "4XX" rejects are now controlled with
unverified_sender_defer_code and unverified_recipient_defer_code.
• postfix-script , postfix-files and post-install are moved away from /etc/
postfix to $daemon_directory.
• Postfix now adds (Resent-) From:, Date:, Message-ID: or To: headers only
when clients match $local_header_rewrite_clients. Specify
"always_add_missing_headers = yes" for backwards compatibility.
• The verify(8) service now uses a persistent cache by default
(address_verify_map = btree:$data_directory/verify_cache). To disable,
specify "address_verify_map ="
• The meaning of an empty filter next-hop destination has changed (for
example, "content_filter = foo:" or "FILTER foo:"). Postfix now uses the
recipient domain, instead of using $myhostname as in Postfix 2.6 and
earlier. To restore the old behavior specify "default_filter_nexthop =
$myhostname", or specify a non-empty next-hop content filter destination.
• Postfix now requests default delivery status notifications when adding a
recipient with the Milter smfi_addrcpt action, instead of "never notify" as
with Postfix automatically-added recipients.
• Postfix now reports a temporary delivery error when the result of virtual
alias expansion would exceed the virtual_alias_recursion_limit or
virtual_alias_expansion_limit.
• To avoid repeated delivery to mailing lists with pathological nested alias
configurations, the local(8) delivery agent now keeps the owner-alias
attribute of a parent alias, when delivering mail to a child alias that
does not have its own owner alias.
• The Postfix SMTP client no longer appends the local domain when looking up
a DNS name without ".". Specify "smtp_dns_resolver_options = res_defnames"
to get the old behavior, which may produce unexpected results.
• The format of the "postfix/smtpd[pid]: queueid: client=host[addr]" logfile
record has changed. When available, the before-filter client information
and the before-filter queue ID are now appended to the end of the record.
• Postfix by default no longer adds a "To: undisclosed-recipients:;" header
when no recipient specified in the message header. For backwards
compatibility, specify: "undisclosed_recipients_header = To:
undisclosed-recipients:;"
• The Postfix SMTP server now always re-computes the SASL mechanism list
after successful completion of the STARTTLS command. Earlier versions only
re-computed the mechanism list when the values of
smtp_sasl_tls_security_options and smtp_sasl_security_options differ. This
could produce incorrect results, because the Dovecot authentication server
may change responses when the SMTP session is encrypted.
• The smtpd_starttls_timeout default value is now stress-dependent. By
default, TLS negotiations must now complete under overload in 10s instead
of 300s.
• Postfix no longer appends the system-supplied default CA certificates to
the lists specified with *_tls_CAfile or with *_tls_CApath. This prevents
third-party certificates from getting mail relay permission with the
permit_tls_all_clientcerts feature. Unfortunately this change may cause
compatibility problems when configurations rely on certificate verification
for other purposes. Specify "tls_append_default_CA = yes" for backwards
compatibility.
• The VSTREAM error flags are now split into separate read and write error
flags. As a result of this change, all programs that use Postfix VSTREAMs
MUST be recompiled.
• For consistency with the SMTP standard, the (client-side)
smtp_line_length_limit default value was increased from 990 characters to
999 (i.e. 1000 characters including ). Specify
"smtp_line_length_limit = 990" to restore historical Postfix behavior.
• To simplify integration with third-party applications, the Postfix sendmail
command now always transforms all input lines ending in into UNIX
format (lines ending in ). Specify "sendmail_fix_line_endings = strict"
to restore historical Postfix behavior.
• To work around broken remote SMTP servers, the Postfix SMTP client by
default no longer appends the "AUTH=<>" option to the MAIL FROM command.
Specify "smtp_send_dummy_mail_auth = yes" to restore the old behavior.
• Instead of terminating immediately with a "fatal" message when a database
file can't be opened, a Postfix daemon program now logs an "error" message,
and continues execution with reduced functionality. Logfile-based alerting
systems may need to be updated to look for "error" messages in addition to
"fatal" messages. Specify "daemon_table_open_error_is_fatal = yes" to get
the historical behavior (immediate termination with "fatal" message).
• Postfix now logs the result of successful TLS negotiation with TLS logging
levels of 0.
• The default inet_protocols value is now "all" instead of "ipv4", meaning
use both IPv4 and IPv6. To avoid an unexpected loss of performance for
sites without global IPv6 connectivity, the commands "make upgrade" and
"postfix upgrade-configuration" now append "inet_protocols = ipv4" to
main.cf when no explicit inet_protocols setting is already present.
New Features:
• Support for managing multiple Postfix instances. Multi-instance support
allows you to do the following and more: - Simplify post-queue content
filter configuration by using separate Postfix instances before and after
the filter. - Implement per-user content filters (or no filter) via
transport map lookups instead of content_filter settings. - Test new
configuration settings (on a different server IP address or TCP port)
without disturbing production instances.
• check_reverse_client_hostname_access, to make access decisions based on the
unverified client hostname.
• With "reject_tempfail_action = defer", the Postfix SMTP server immediately
replies with a 4xx status after some temporary error.
• The Postfix SMTP server automatically hangs up after replying with "521".
This makes overload handling more effective. See also RFC 1846 for prior
art on this topic.
• Stress-dependent behavior is enabled by default. Under conditions of
overload, smtpd_timeout is reduced from 300s to 10s, smtpd_hard_error_limit
is reduced from 20 to 1, and smtpd_junk_command_limit is reduced from 100
to 1.
• Specify "tcp_windowsize = 65535" (or less) to work around routers with
broken TCP window scaling implementations.
• New "lmtp_assume_final = yes" flag to send correct DSN "success"
notifications when LMTP delivery is "final" as opposed to delivery into a
content filter.
• The Postfix SMTP server's SASL authentication was re-structured. With
"smtpd_tls_auth_only = yes", SASL support is now activated only after a
successful TLS handshake. Earlier Postfix SMTP server versions could
complain about unavailable SASL mechanisms during the plaintext phase of
the SMTP protocol.
• Improved before-queue filter performance. With "smtpd_proxy_options =
speed_adjust", the Postfix SMTP server receives the entire message before
it connects to a before-queue content filter. This means you can run more
SMTP server processes with the same number of running content filter
processes, and thus, handle more mail. This feature is off by default until
it is proven to create no new problems.
• sender_dependent_default_transport_maps, a per-sender override for
default_transport.
• milter_header_checks: Support for header checks on Milter-generated message
headers. This can be used, for example, to control mail flow with
Milter-generated headers that carry indicators for badness or goodness.
Currently, all header_checks features are implemented except PREPEND.
• Support to turn off the TLSv1.1 and TLSv1.2 protocols. Introduced with
OpenSSL version 1.0.1, these are known to cause inter-operability problems
with for example hotmail. The radical workaround is to temporarily turn off
problematic protocols globally: smtp_tls_protocols = !SSLv2, !TLSv1.1, !
TLSv1.2 smtp_tls_mandatory_protocols = !SSLv2, !TLSv1.1, !TLSv1.2
• Prototype postscreen(8) server that runs a number of time-consuming checks
in parallel for all incoming SMTP connections, before clients are allowed
to talk to a real Postfix SMTP server. It detects clients that start
talking too soon, or clients that appear on DNS blocklists, or clients that
hang up without sending any command.
• Support for address patterns in DNS blacklist and whitelist lookup results.
• The Postfix SMTP server now supports DNS-based whitelisting with several
safety features: permit_dnswl_client whitelists a client by IP address, and
permit_rhswl_client whitelists a client by its hostname. These features use
the same syntax as reject_rbl_client and reject_rhsbl_client, respectively.
The main difference is that they return PERMIT instead of REJECT.
• The SMTP server now supports contact information that is appended to
"reject" responses. This includes SMTP server responses that aren't logged
to the maillog file, such as responses to syntax errors, or unsupported
commands.
• tls_disable_workarounds parameter specifies a list or bit-mask of OpenSSL
bug work-arounds to disable.
• The lower-level code in the TLS engine was simplified by removing an
unnecessary layer of data copying. OpenSSL now writes directly to the
network.
• enable_long_queue_ids Introduces support for non-repeating queue IDs (also
used as queue file names). These names are encoded in a mix of upper case,
lower case and decimal digit characters. Long queue IDs are disabled by
default to avoid breaking tools that parse logfiles and that expect queue
IDs with the smaller [A-F0-9] character set.
• memcache lookup and update support. This provides a way to share postscreen
(8) or verify(8) caches between Postfix instances.
• Support for TLS public key fingerprint matching in the Postfix SMTP client
(in smtp_tls_policy_maps) and server (in check_ccert access maps).
• Support for external SASL authentication via the XCLIENT command. This is
used to accept SASL authentication from an SMTP proxy such as NGINX. This
support works even without having to specify "smtpd_sasl_auth_enable =
yes".
6.2.3. unixODBC Updated to Version 2.3.1
unixODBC 2.3.1 provides the most recent upstream fixes; this helps for seamless
population of DB2 data using automated tools and improves interoperability with
MS SQL server.
Chapter 7. Driver Updates
7.1. X.Org: fbdev Used in UEFI Secure Boot Mode (ASpeed Chipset)
The unaccelerated fbdev driver is used as a fallback in UEFI secure boot mode
with the ast KMS driver, EFI VGA, and other currently unknown frame buffer
drivers.
7.2. X.Org Driver Used in UEFI Secure Boot Mode (Matrox)
The unaccelerated "mgag200"/"modesetting" (generic X.Org) driver combo is used
instead of the "mga" X.Org driver if machine is running in UEFI secure boot
mode. The driver does not load in other cases and a warning message is written
into the kernel log.
7.3. Network Drivers
7.3.1. Emulex be2net Driver
Updating Ethernet Firmware
The Emulex Ethernet driver supports updating the firmware image in the UCNA
flash through the request_firmware interface in Linux. You can perform this
update when the UCNA is online and passing network/storage traffic.
To update the ethernet firmware image:
Copy the latest firmware image under the /lib/firmware directory:
cp be3flash.ufi /lib/firmware
Start the update process:
ethtool -f eth be3flash.ufi 0
Limitation in Bridging on Emulex 10Gb E Virtual Fabric Adapter with SR-IOV
Enabled
PING is not working when attempting to bridge the ports of the Emulex 10Gb E
Virtual Fabric adapter to the virtual machines when SR-IOV is enabled in the
BIOS. This issue occurs due to limitations of the virtual Ethernet bridge in
the adapter. Please reference the Emulex Release Notes for further information
before enabling SR-IOV
7.3.2. Support for Intel Centrino Wireless Adapters
This Service Pack adds official support for the following Intel Centrino
Wireless Adapters:
• Centrino Advanced-N 6235
• Centrino Wireless-N 2230
• Centrino Wireless-N 2200
• Centrino Wireless-N 135
• Centrino Wireless-N 105
7.4. Storage Drivers
7.5. Other Drivers
7.5.1. Updated Support for Intel Integrated Graphics
This Service Pack adds support for the 4th Generation Intel(R) Core™ Processor
integrated graphics core.
Chapter 8. Other Updates
8.1. openJDK 7 as a Replacement for openJDK 6
Because openJDK 6 will no longer get security fixes we need to perform the
upgrade to openJDK 7.
The upgrade for openJDK 7 as a replacement for openJDK 6 introduces some
incompatibilities. The most important changes are:
Some APIs in the sun.* packages have changed. These APIs are not intended to be
used by developers. Developers importing from sun.* packages do so at their own
risk. For more information, see Why Developers Should Not Write Programs That
Call sun.* Packages (referenced in the Web resource below).
Other changes are documented at http://www.oracle.com/technetwork/java/javase/
compatibility-417013.html .
8.2. Update of ICAClient
Citrix has released version 12 of the Citrix Server, which is incompatible with
version 11. We have therefore updated the client to version 12.
8.3. Package python-ethtool
The Python bindings for ethtool were updated in SLE11 SP3 to version 0.7. This
update introduced several stability bugfixes and support for handling IPv6.
8.4. Update Python to 2.6.8
Python 2.6.7 and 2.6.8 are security only updates to 2.6.6.
Python 2.6 helps with migrating to Python 3.0, which is a major redesign of the
language. Whenever possible, Python 2.6 incorporates new features and syntax
changes from 3.0 while remaining compatible with existing code. In case of
conflict, Python 2.6 adds compatibility functions in a future_builtins module
and a -3 switch to warn about usages that will become unsupported in 3.0.
Some significant new packages have been added to the standard library, such as
the multiprocessing and json modules.
Chapter 9. Technology Previews
Technology Preview features are either not supported or supported in a limited
fashion. These features are mainly included for customer convenience and be
functionally incomplete, unstable or in other ways not suitable for production
use.
9.1. eCryptfs Filesystem
The eCryptfs kernel modules and the ecryptfs-utils package shipped with SUSE
Linux Enterprise Desktop 11 are a preview of a stacked cryptographic filesystem
for Linux.
9.2. KVM
SUSE Linux Enterprise Desktop 11 contains KVM as an additional virtualization
solution. It is not supported by SUSE, but is an area of interest for future
development and deliveries.
9.3. Read-Only Root Filesystem
It is possible to run SUSE Linux Enterprise Desktop 11 on a read-only root
filesystem. Due to the huge number of possible configurations, this is
currently not a supported scenario.
The /tmp and /var directories need to be on a separate partition and cannot be
mounted read-only.
After the installation has finished and all services are configured, login as
root and do the following modifications:
Modify /etc/fstab and add "ro" to the mount options of the root filesystem
entry.
rm /etc/mtab
ln -s /proc/mounts /etc/mtab
mkdir /var/lib/hwclock
mv /etc/adjtime /var/lib/hwclock
ln -s /var/lib/hwclock/adjtime /etc/adjtime
# the following two steps are only necessary if you use dhcp:
mv /etc/resolv.conf /var/lib/misc/
ln -s /var/lib/misc/resolv.conf /etc/resolv.conf
# Now mount root filesystem read-only and reboot
mount -o remount,ro /
reboot
9.4. Linux Filesystem Capabilities
Our kernel is compiled with support for Linux Filesystem Capabilities. It is
disabled by default. Enable it by adding file_caps=1 as a kernel boot option.
Chapter 10. Deprecated Functionality
10.1. X.Org: fbdev Used in UEFI Secure Boot Mode (ASpeed Chipset)
The unaccelerated fbdev driver is used as a fallback in UEFI secure boot mode
with the ast KMS driver, EFI VGA, and other currently unknown frame buffer
drivers.
10.2. X.Org Driver Used in UEFI Secure Boot Mode (Matrox)
The unaccelerated "mgag200"/"modesetting" (generic X.Org) driver combo is used
instead of the "mga" X.Org driver if machine is running in UEFI secure boot
mode. The driver does not load in other cases and a warning message is written
into the kernel log.
10.3. Support for the JFS File System
In connection with the change in the JFS support status the corresponding
kernel module has been moved to the extra kernel RPM (kernel-flavor-extra).
10.4. Deprecation of Package ncpfs
The package ncpfs is now deprecated and will be removed with SLED 11 SP4. The
functionality provided by ncpfs is also provided by novell-qtgui-cli in
combination with novell-novfsd.
10.5. Support for Portmap to End with SUSE Linux Enterprise 11 SP3
In SUSE Linux Enterprise we provide "rpcbind", which is compatible with
portmap. "rpcbind" provides full IPv6 support. Thus portmap is now deprecated,
and support for portmap will end end with the release of SUSE Linux Enterprise
11 SP3.
10.6. L3 Support for Openswan Is Scheduled to Expire
L3 support for Openswan is scheduled to expire. This decision is driven by the
fact that Openswan development stalled substantially and there are no tangible
signs that this will change in the future.
In contrast to this the strongSwan project is vivid and able to deliver a
complete implementation of current standards. Compared to Openswan all relevant
features are available by the package strongSwan plus strongSwan is the only
complete Open Source implementation of the RFC 5996 IKEv2 standard whereas
Openswan only implements a small mandatory subset. For now and the expected
future only strongSwan qualifies to be an enterprise-ready solution for
encrypted TCP/IP connectivity.
10.7. FreeRDP Is Going to Replace rdesktop
In some scenarios, FreeRDP performs better than the rdesktop client, which is
currently available as the Linux RDP client. Thus we add support for FreeRDP in
SUSE Linux Enteprise Desktop 11 SP2. With the upcoming SP3, we will drop
rdesktop in favor of FreeRDP.
10.8. Removed Packages
The following list of current functionalities has been removed with this SUSE
Linux Enterprise Desktop release.
• amor
• dante
• powertweak
• zmd
10.9. Deprecated Packages
The following packages are deprecated and will be removed with SUSE Linux
Enterprise Desktop 12:
• lprng
• sendmail
• qt3
10.10. JFS File System
The JFS file system is no longer supported for new installations. The kernel
file system driver is still available, but YaST does not offer partitioning
with JFS.
Chapter 11. Infrastructure, Package and Architecture Specific Information
11.1. Systems Management
11.1.1. Providing the URL of an Add-on Media at the Command Line during
Installation
Add-on media like the Software Development Kit or third party driver media can
be added to SUSE Linux Enterprise during installation or later in the running
system. Sometimes it's advisable that an add-on media is available from the
very beginning, for example to make drivers for new hardware available.
It is now possible to provide one or more URLs that point to the location of
add-on media at the installer's command line by providing an "addon=url"
parameter. Multiple add-ons need to be provided as a comma-separated list
("addon=url1,url2,...").
11.1.2. Snapper Enhancements
Snapper, which was introduced in previous service pack, has been implemented
following enhancements:
• snapshots can be managed also by non-root users
• the performance of snapshots comparison has been improved
• snapper provides a D-Bus interface for better integration into other
applications
• added support for LVM Thin Provisioning
For more information, see the Administration Guide.
11.2. Architecture Independent Information
11.2.1. Current Limitations in a UEFI Secure Boot Context
When booting in Secure Boot mode, the following restrictions apply:
• bootloader, kernel and kernel modules must be signed
• kexec and kdump are disabled
• hibernation (suspend on disk) is disabled
• access to /dev/kmem and /dev/mem is not possible, even as root user
• access to IO port is not possible, even as root user. All X11 graphical
drivers must use a kernel driver
• PCI BAR access through sysfs is not possible
• 'custom_method' in ACPI is not available
• debugfs for "asus-wmi" module is not available
• 'acpi_rsdp' parameter doesn't have any effect on kernel
11.2.2. Change of libzypp History
The libzypp history in /var/log/zypp/history now contains a transaction ID
added to each record. Any scripts, which parse the history file and which rely
on the order of data fields, need to be checked that they still parse the
history file properly.
11.2.3. Changes in Packaging and Delivery
11.2.3.1. Python Updated to Version 2.6.8 with "collections.OrderedDict"
Functionality
The "OrderedDict" functionality ensures that Python dictionaries emitted for
conversion into strings maintain their original order. This functionality is
important for data analytics applications.
11.2.3.2. Postfix: Incompatibility Issues and New Features
To benefit from enhancements and improvements which have been developed in the
upstream community, postfix is upgraded from version 2.5.13 to the current
version 2.9.4.
Incompatibility Issues:
• The default milter_protocol setting is increased from 2 to 6; this enables
all available features up to and including Sendmail 8.14.0.
• When a mailbox file is not owned by its recipient, the local and virtual
delivery agents now log a warning and defer delivery. Specify
"strict_mailbox_ownership = no" to ignore such ownership discrepancies.
• The Postfix SMTP client(!) no longer tries to use the obsolete SSLv2
protocol by default, as this may prevent the use of modern SSL features.
Lack of SSLv2 support should never be a problem, since SSLv3 was defined in
1996, and TLSv1 in 1999. You can undo the change by specifying empty
main.cf values for smtp_tls_protocols and lmtp_tls_protocols.
• Postfix SMTP server replies for address verification have changed.
unverified_recipient_reject_code and unverified_sender_reject_code now
handle "5XX" rejects only. The "4XX" rejects are now controlled with
unverified_sender_defer_code and unverified_recipient_defer_code.
• postfix-script , postfix-files and post-install are moved away from /etc/
postfix to $daemon_directory.
• Postfix now adds (Resent-) From:, Date:, Message-ID: or To: headers only
when clients match $local_header_rewrite_clients. Specify
"always_add_missing_headers = yes" for backwards compatibility.
• The verify(8) service now uses a persistent cache by default
(address_verify_map = btree:$data_directory/verify_cache). To disable,
specify "address_verify_map ="
• The meaning of an empty filter next-hop destination has changed (for
example, "content_filter = foo:" or "FILTER foo:"). Postfix now uses the
recipient domain, instead of using $myhostname as in Postfix 2.6 and
earlier. To restore the old behavior specify "default_filter_nexthop =
$myhostname", or specify a non-empty next-hop content filter destination.
• Postfix now requests default delivery status notifications when adding a
recipient with the Milter smfi_addrcpt action, instead of "never notify" as
with Postfix automatically-added recipients.
• Postfix now reports a temporary delivery error when the result of virtual
alias expansion would exceed the virtual_alias_recursion_limit or
virtual_alias_expansion_limit.
• To avoid repeated delivery to mailing lists with pathological nested alias
configurations, the local(8) delivery agent now keeps the owner-alias
attribute of a parent alias, when delivering mail to a child alias that
does not have its own owner alias.
• The Postfix SMTP client no longer appends the local domain when looking up
a DNS name without ".". Specify "smtp_dns_resolver_options = res_defnames"
to get the old behavior, which may produce unexpected results.
• The format of the "postfix/smtpd[pid]: queueid: client=host[addr]" logfile
record has changed. When available, the before-filter client information
and the before-filter queue ID are now appended to the end of the record.
• Postfix by default no longer adds a "To: undisclosed-recipients:;" header
when no recipient specified in the message header. For backwards
compatibility, specify: "undisclosed_recipients_header = To:
undisclosed-recipients:;"
• The Postfix SMTP server now always re-computes the SASL mechanism list
after successful completion of the STARTTLS command. Earlier versions only
re-computed the mechanism list when the values of
smtp_sasl_tls_security_options and smtp_sasl_security_options differ. This
could produce incorrect results, because the Dovecot authentication server
may change responses when the SMTP session is encrypted.
• The smtpd_starttls_timeout default value is now stress-dependent. By
default, TLS negotiations must now complete under overload in 10s instead
of 300s.
• Postfix no longer appends the system-supplied default CA certificates to
the lists specified with *_tls_CAfile or with *_tls_CApath. This prevents
third-party certificates from getting mail relay permission with the
permit_tls_all_clientcerts feature. Unfortunately this change may cause
compatibility problems when configurations rely on certificate verification
for other purposes. Specify "tls_append_default_CA = yes" for backwards
compatibility.
• The VSTREAM error flags are now split into separate read and write error
flags. As a result of this change, all programs that use Postfix VSTREAMs
MUST be recompiled.
• For consistency with the SMTP standard, the (client-side)
smtp_line_length_limit default value was increased from 990 characters to
999 (i.e. 1000 characters including ). Specify
"smtp_line_length_limit = 990" to restore historical Postfix behavior.
• To simplify integration with third-party applications, the Postfix sendmail
command now always transforms all input lines ending in into UNIX
format (lines ending in ). Specify "sendmail_fix_line_endings = strict"
to restore historical Postfix behavior.
• To work around broken remote SMTP servers, the Postfix SMTP client by
default no longer appends the "AUTH=<>" option to the MAIL FROM command.
Specify "smtp_send_dummy_mail_auth = yes" to restore the old behavior.
• Instead of terminating immediately with a "fatal" message when a database
file can't be opened, a Postfix daemon program now logs an "error" message,
and continues execution with reduced functionality. Logfile-based alerting
systems may need to be updated to look for "error" messages in addition to
"fatal" messages. Specify "daemon_table_open_error_is_fatal = yes" to get
the historical behavior (immediate termination with "fatal" message).
• Postfix now logs the result of successful TLS negotiation with TLS logging
levels of 0.
• The default inet_protocols value is now "all" instead of "ipv4", meaning
use both IPv4 and IPv6. To avoid an unexpected loss of performance for
sites without global IPv6 connectivity, the commands "make upgrade" and
"postfix upgrade-configuration" now append "inet_protocols = ipv4" to
main.cf when no explicit inet_protocols setting is already present.
New Features:
• Support for managing multiple Postfix instances. Multi-instance support
allows you to do the following and more: - Simplify post-queue content
filter configuration by using separate Postfix instances before and after
the filter. - Implement per-user content filters (or no filter) via
transport map lookups instead of content_filter settings. - Test new
configuration settings (on a different server IP address or TCP port)
without disturbing production instances.
• check_reverse_client_hostname_access, to make access decisions based on the
unverified client hostname.
• With "reject_tempfail_action = defer", the Postfix SMTP server immediately
replies with a 4xx status after some temporary error.
• The Postfix SMTP server automatically hangs up after replying with "521".
This makes overload handling more effective. See also RFC 1846 for prior
art on this topic.
• Stress-dependent behavior is enabled by default. Under conditions of
overload, smtpd_timeout is reduced from 300s to 10s, smtpd_hard_error_limit
is reduced from 20 to 1, and smtpd_junk_command_limit is reduced from 100
to 1.
• Specify "tcp_windowsize = 65535" (or less) to work around routers with
broken TCP window scaling implementations.
• New "lmtp_assume_final = yes" flag to send correct DSN "success"
notifications when LMTP delivery is "final" as opposed to delivery into a
content filter.
• The Postfix SMTP server's SASL authentication was re-structured. With
"smtpd_tls_auth_only = yes", SASL support is now activated only after a
successful TLS handshake. Earlier Postfix SMTP server versions could
complain about unavailable SASL mechanisms during the plaintext phase of
the SMTP protocol.
• Improved before-queue filter performance. With "smtpd_proxy_options =
speed_adjust", the Postfix SMTP server receives the entire message before
it connects to a before-queue content filter. This means you can run more
SMTP server processes with the same number of running content filter
processes, and thus, handle more mail. This feature is off by default until
it is proven to create no new problems.
• sender_dependent_default_transport_maps, a per-sender override for
default_transport.
• milter_header_checks: Support for header checks on Milter-generated message
headers. This can be used, for example, to control mail flow with
Milter-generated headers that carry indicators for badness or goodness.
Currently, all header_checks features are implemented except PREPEND.
• Support to turn off the TLSv1.1 and TLSv1.2 protocols. Introduced with
OpenSSL version 1.0.1, these are known to cause inter-operability problems
with for example hotmail. The radical workaround is to temporarily turn off
problematic protocols globally: smtp_tls_protocols = !SSLv2, !TLSv1.1, !
TLSv1.2 smtp_tls_mandatory_protocols = !SSLv2, !TLSv1.1, !TLSv1.2
• Prototype postscreen(8) server that runs a number of time-consuming checks
in parallel for all incoming SMTP connections, before clients are allowed
to talk to a real Postfix SMTP server. It detects clients that start
talking too soon, or clients that appear on DNS blocklists, or clients that
hang up without sending any command.
• Support for address patterns in DNS blacklist and whitelist lookup results.
• The Postfix SMTP server now supports DNS-based whitelisting with several
safety features: permit_dnswl_client whitelists a client by IP address, and
permit_rhswl_client whitelists a client by its hostname. These features use
the same syntax as reject_rbl_client and reject_rhsbl_client, respectively.
The main difference is that they return PERMIT instead of REJECT.
• The SMTP server now supports contact information that is appended to
"reject" responses. This includes SMTP server responses that aren't logged
to the maillog file, such as responses to syntax errors, or unsupported
commands.
• tls_disable_workarounds parameter specifies a list or bit-mask of OpenSSL
bug work-arounds to disable.
• The lower-level code in the TLS engine was simplified by removing an
unnecessary layer of data copying. OpenSSL now writes directly to the
network.
• enable_long_queue_ids Introduces support for non-repeating queue IDs (also
used as queue file names). These names are encoded in a mix of upper case,
lower case and decimal digit characters. Long queue IDs are disabled by
default to avoid breaking tools that parse logfiles and that expect queue
IDs with the smaller [A-F0-9] character set.
• memcache lookup and update support. This provides a way to share postscreen
(8) or verify(8) caches between Postfix instances.
• Support for TLS public key fingerprint matching in the Postfix SMTP client
(in smtp_tls_policy_maps) and server (in check_ccert access maps).
• Support for external SASL authentication via the XCLIENT command. This is
used to accept SASL authentication from an SMTP proxy such as NGINX. This
support works even without having to specify "smtpd_sasl_auth_enable =
yes".
11.2.3.3. openJDK 7 as a Replacement for openJDK 6
Because openJDK 6 will no longer get security fixes we need to perform the
upgrade to openJDK 7.
The upgrade for openJDK 7 as a replacement for openJDK 6 introduces some
incompatibilities. The most important changes are:
Some APIs in the sun.* packages have changed. These APIs are not intended to be
used by developers. Developers importing from sun.* packages do so at their own
risk. For more information, see Why Developers Should Not Write Programs That
Call sun.* Packages (referenced in the Web resource below).
Other changes are documented at http://www.oracle.com/technetwork/java/javase/
compatibility-417013.html .
11.2.3.4. Ftrace Linux Kernel Internal Tracer Enablement
trace-cmd is now provided to make ftrace kernel facility accessible to SLE
users. See trace-cmd(1) manual page and /usr/src/linux/Documentation/trace/
ftrace.txt for more details.
11.2.4. Cross Architecture Information
11.2.4.1. Myricom 10-Gigabit Ethernet Driver and Firmware
SUSE Linux Enterprise 11 (x86, x86_64 and IA64) is using the Myri10GE driver
from mainline Linux kernel. The driver requires a firmware file to be present,
which is not being delivered with SUSE Linux Enterprise 11.
Download the required firmware at http://www.myricom.com.
11.3. AMD64/Intel64 64-Bit (x86_64) and Intel/AMD 32-Bit (x86) Specific
Information
11.3.1. Virtualization
Chapter 12. Technical Information
This section contains a number of technical changes and enhancements for the
experienced user.
12.1. Kernel Limits
12.2. Xen Limits
12.2.1. XEN: Secure Boot
Xen hypervisor is shipped as an EFI application, and signed. It will negotiate
with the shim loader to validate the Dom0 kernel signature before booting it.
Enabling the alternative kernel image format takes as a prerequisite the
bumping of the backward compatibility level from 3.2 to 4.X, so we are not able
to boot a SLE11 SP3 PV guest on SLE10 SP4, even if secure boot is not enable.
12.3. File Systems
12.3.1. XFS Realtime Volumes
XFS Realtime Volumes is an experimental feature, available for testing and
experimenting. If you encounter any issues, SUSE is interested in feedback.
Please, submit a support request through the usual access methods.
12.3.2. ext4: Runtime Switch for Write Support
The SLE 11 SP3 kernel contains a fully supported ext4 file system module, which
provides read-only access to the file system.
Read-write access to an ext4 file system can be acquired by setting the rw
kernel module parameter to 1, either through module load time options or after
module load through the kernel sysctl interface. Be aware that this action will
render the kernel module and the kernel as the whole as unsupported upon first
read-write mount of an ext4 file system.
ext4 is not supported for the installation of the SUSE Linux Enterprise
operating system.
Since SUSE Linux Enterprise 11 SP2 we support offline migration from ext4 to
the supported btrfs file system.
12.4. IPv6 Implementation and Compliance
SUSE Linux Enterprise Desktop 11 is compliant to IPv6 Logo Phase 2. However,
when running the respective tests, you may see some tests failing. For various
reasons, we cannot enable all the configuration options by default, which are
necessary to pass all the tests.
12.4.1. IPv6 Support for NFSv3
Kernel configuration and NFS userland utilities have been updated to fully
support NFSv3 over the IPv6 protocol. The same functionality for NFSv4 has
already been enabled since SUSE Linux Enterprise 11 SP2.
12.4.2. IPv6 Support to AutoFS
AutoFS now mounts NFS volumes over IPv6.
12.5. Other Technical Information
• Locale Settings in ~/.i18n
If you are not satisfied with locale system defaults, change the settings
in ~/.i18n. Entries in ~/.i18n override system defaults from /etc/sysconfig
/language. Use the same variable names but without the RC_ namespace
prefixes. For example, use LANG instead of RC_LANG. For information about
locales in general, see "Language and Country-Specific Settings" in the
Administration Guide.
• Configuration of kdump
The kernel is crashing or otherwise not behaving normally and a kernel core
dump needs to be captured for analysis.
A description on how to setup kdump can be found at http://www.novell.com/
support/search.do?cmd=displayKC&docType=kc&externalId=3374462&sliceId=
SAL_Public.
• Realtime Applications
When running real-time applications on larger systems, lower maximum
latencies can be achieved by employing the new disable_buffer_lru kernel
command-line option. This disables the per-CPU LRU in the buffer cache, and
may thus decrease overall filesystem performance.
• JPackage Standard for Java Packages
Java packages are changed to follow the JPackage Standard (http://
www.jpackage.org/). Read the documentation in /usr/share/doc/packages/
jpackage-utils/ for information.
• Loading Unsupported Kernel Drivers
Every kernel module has a 'supported' flag. If this flag is not set, then
loading this module will taint the kernel. Kernels which are tainted are
not supported. To avoid this, unsupported Kernel modules are part of an
extra RPM (kernel--extra). Since this would a problem for most
desktops, the loading of those drivers is allowed by default.
To prevent the loading of unsupported kernel drivers automatically during
boot, change the line allow_unsupported_modules 1 in /etc/modprobe.d/
unsupported-modules to allow_unsupported_modules 0.
• Nonexecutable Stack
Already introduced for SUSE Linux Enterprise Desktop 9 on the x86-64
(AMD64) architecture with 64-bit kernels, the Linux kernel in SUSE Linux
Enterprise Desktop also supports nonexecutable stack (NX) on x86 for CPUs
that support it (Intel Prescott and AMD64) with 32-bit kernels. For this to
work, the kernel with PAE support, kernel-pae, must be installed. Go into
YaST and install that kernel instead of your default kernel. For 64-bit
kernels, all kernels support NX.
The nonexecutable stack improves the security of your system. Many security
vulnerabilities are stack overflows, where an attacker overwrites the stack
of your program by feeding oversized data to the application that fails to
properly check the length. Depending on the details of the program (with a
nonexecutable stack), these vulnerabilities may either not be exploitable
(and only crash the program, resulting in a Denial of Service) or at least
be significantly harder to exploit.
Some applications do require executable stacks. The compiler detects this
during compilation and marks the binaries accordingly. The kernel enables
an executable stack to allow them to work.
To provide a higher level of security on x86-64, the user can pass noexec=
on on the kernel command line. The kernel then uses a nonexecutable stack
unconditionally and also marks the data section of a program as
nonexecutable. This provides a higher protection level than just the
nonexecutable stack, but potentially causes problems for some applications.
SUSE has not found any problems during testing the most commonly used
applications and services. Because it is not the default, this has not been
tested as extensively as the stack protection alone, so SUSE only
recommends this setup for servers after the administrator has verified that
all needed services continue to function properly.
12.5.1. Boot Device Larger Than 2 TiB
Due to limitations of the legacy x86 and x86_64 BIOS implementations booting
from devices larger than 2 TiB is technically not possible using legacy
partition tables (DOS MBR).
With SUSE Linux Enterprise Desktop 11 Service Pack 2 we support installation
and boot using uEFI on the x86_64 architecture and certified hardware.
12.5.2. Better Sound Functionality with Pulseaudio 0.9.14 or Higher
For better sound functionality we strongly recommend that pulseaudio 0.9.14 or
higher is installed. This version is available via maintenance channels for
SUSE Linux Enterprise systems registered with SUSE.
12.5.3. netconfig Utility to Apply Additional Network Settings
The modify_resolvconf script is removed in favor of the more versatile
netconfig script. This new script handles specific network settings from
multiple sources more flexibly and transparently. For more information, see the
updated manuals and the netconfig man-page.
12.5.4. Atheros Wireless Cards
Instead of the madwifi driver the ath5k/ath9k in-kernel replacement is now
available. ath5k/ath9k does not support access point mode yet, but normal
networks (infrastructure and ad-hoc) are well supported by the new driver.
12.5.5. Detecting Lenovo ThinkPad Laptops
Lenovo ThinkPad laptops have special code in the MBR (master boot record)
because of the "Blue ThinkVantage button" functionality. If proper detection
and preparation fails, it might be necessary to restore the boot sector.
If you have a ThinkPad, ensure that the bootloader is not installed into the
MBR (verify it in the installation proposal!) and the MBR is not rewritten by
generic code (in installation proposel select Bootloader -> Boot Loader
Installation -> Boot Loader Options -> Write Generic Boot Code to MBR -- should
be unchecked).
If your MBR gets rewritten, the ThinkVantage button will not work anymore. The
back-up of the MBR is stored in /var/lib/YaST2/backup_boot_sectors/.
12.5.6. Stopping Cron Status Messages
To avoid the mail-flood caused by cron status messages, the default value of
SEND_MAIL_ON_NO_ERROR in /etc/sysconfig/cron is now set to "no" for new
installations. Even with this setting to "no", cron data output will still be
send to the MAILTO address, as documented in the cron manpage.
In the update case it is recommended to set these values according to your
needs.
Chapter 13. Known Issues
13.1. Latest Release Notes
For the latest version of SUSE Linux Enterprise Desktop 11 SP3 Release Notes,
see http://www.suse.com/releasenotes/i586/SUSE-SLED/11-SP3/.
13.2. Network Issues After Updating
If you were using a static IP with NetworkManager, you will lose this
configuration while updating from SLED 10 SP4 to SLED 11. You must re-enter
this information. The traditional networking method with ifup is not affected
by this issue.
Name server lookup information of resolv.conf configured with the traditional
networking method with ifup is missing after updating.
13.3. Kopete Lacks IRC Support
Kopete as shipped with KDE4 does not support the IRC protocol. Install and use
xchat, if you want to participate in IRC messaging.
13.4. Hardware Related Issues
13.4.1. Limited Graphics Support on IBM SurePOS 700 4800-7X3 during
Installation
There is only limited graphics support on IBM SurePOS 700 4800-7X3 systems with
4820-2GN monitors. During a graphical installation you can encounter an error
message from the monitor (OSD = On Screen Display) such as:
OUT OF RANGE
H: -48.4 KHz V: -60.1 Hz.
To work around this issue try a different resolution, VESA or text-mode for
installation. Another option is to choose the native driver by specifying
acceleratedx=1 on the boot prompt. It might also help to update the BIOS.
After system installation the problem no longer occurs and the graphics system
is fully supported.
13.4.2. Graphical Distortions on the FIC GE2 Plattform (Transtec SENYO600)
On the FIC GE2 platform (when using 24 BPP color depth and resolutions >=
1280x1024 on the DVI interface) stripes are displayed on the X server. This
distorts all windows.
Changing to 16 BPP color depth seems to solve this problem.
Chapter 14. Documentation
For SUSE Linux Enterprise Desktop 11 documentation, see http://www.suse.com/
documentation/sled11/, where you can download PDF documents. For installation
with YaST software management or with zypper, packages are available on the
installation media. Some of these packages are installed by default. These are
the package names:
• sled-installquick_en-pdf: SLED 11 Installation Quick Start
• sled-gnomequick_en-pdf: SLED 11 GNOME Quick Start
• sled-kdequick_en-pdf: SLED 11 KDE Quick Start
• sled-gnomeuser_en-pdf: SLED 11 GNOME User Guide
• sled-kdeuser_en-pdf: SLED 11 KDE User Guide
• sled-apps_en-pdf: SLED 11 Application Guide
• sled-admin_en-pdf: SLED 11 Administration Guide
• sled-deployment_en-pdf: SLED 11 Deployment Guide
• sled-security_en-pdf: SLED 11 Security Guide
• sle-apparmor-quick_en-pdf : AppArmor 2.3.1 Quick Start
• sle-audit-quick_en-pdf: Linux Audit Quick Start
• sled-xen_en-pdf: SLED 11 Virtualization Guide
• sled-tuning_en-pdf: SLED 11 Tuning Guide
• sled-manuals_en: the set of all SLED books in HTML format
14.1. Application Guide: Firefox—Disabling Features
By default, Firefox does not honor settings made with the GConf system. In
order to make the GConf lockdown keys effective, edit /usr/lib/firefox/
local-configuration.js and set config.use_system_prefs to true. This file
allows the administrator to set and lock preferences that will apply to every
Firefox user.
Chapter 15. More Information and Feedback
• Read the READMEs on the CDs.
• Get the detailed changelog information about a particular package from the
RPM:
rpm --changelog -qp .rpm
. is the name of the RPM.
• Check the ChangeLog file in the top level of CD1 for a chronological log of
all changes made to the updated packages.
• Find more information in the docu directory of CD1 of the SUSE Linux
Enterprise Desktop 11 CDs. This directory includes PDF versions of the SUSE
Linux Enterprise Desktop 11 Installation Quick Start and Deployment Guides.
• http://www.suse.com/documentation/sled11/ contains additional or updated
documentation for SUSE Linux Enterprise Desktop 11.
• Visit http://www.suse.com/products/ for the latest product news from SUSE
and http://www.suse.com/download-linux/source-code.html for additional
information on the source code of SUSE Linux Enterprise products.
Chapter 16. Miscellaneous
Chapter 17. Legal Notices
SUSE makes no representations or warranties with respect to the contents or use
of this documentation, and specifically disclaims any express or implied
warranties of merchantability or fitness for any particular purpose. Further,
SUSE reserves the right to revise this publication and to make changes to its
content, at any time, without the obligation to notify any person or entity of
such revisions or changes.
Further, SUSE makes no representations or warranties with respect to any
software, and specifically disclaims any express or implied warranties of
merchantability or fitness for any particular purpose. Further, SUSE reserves
the right to make changes to any and all parts of SUSE software, at any time,
without any obligation to notify any person or entity of such changes.
Any products or technical information provided under this Agreement may be
subject to U.S. export controls and the trade laws of other countries. You
agree to comply with all export control regulations and to obtain any required
licenses or classifications to export, re-export, or import deliverables. You
agree not to export or re-export to entities on the current U.S. export
exclusion lists or to any embargoed or terrorist countries as specified in U.S.
export laws. You agree to not use deliverables for prohibited nuclear, missile,
or chemical/biological weaponry end uses. Please refer to http://www.novell.com
/info/exports/ for more information on exporting SUSE software. SUSE assumes no
responsibility for your failure to obtain any necessary export approvals.
Copyright (c) 2010, 2011, 2012 SUSE. All rights reserved. No part of this
publication may be reproduced, photocopied, stored on a retrieval system, or
transmitted without the express written consent of the publisher.
SUSE has intellectual property rights relating to technology embodied in the
product that is described in this document. In particular, and without
limitation, these intellectual property rights may include one or more of the
U.S. patents listed at http://www.novell.com/company/legal/patents/ and one or
more additional patents or pending patent applications in the U.S. and other
countries.
For SUSE trademarks, see Novell Trademark ad Service Mark list (http://
www.novell.com/company/legal/trademarks/tmlist.html). All third-party
trademarks are the property of their respective owners.