Current Stories
PermaLink Sophos UTM Up2Date 9.408004 package11/10/2016 06:45 PM
 
We just did the upgrade in the OTAP.

Image:Badkey Corner - Sophos UTM Up2Date 9.408004 package

Remarks:
System will be rebooted
Configuration will be upgraded
Connected REDs will perform firmware upgrade

News:  Maintenance Release

Bugfixes:
 Fix [NUTM-5349]: [AWS] Restore fails if UTM is created with backup file in user data
 Fix [NUTM-5466]: [AWS] ssh disabled - No connection to stack instances
 Fix [NUTM-5546]: [AWS] UTM Cloud Update does not work in GovCloud
 Fix [NUTM-5654]: [AWS] Conversion should not be visible for HA and AS
 Fix [NUTM-3203]: [Access & Identity] [RED] If creation of RED device fails, certificates are not deleted
 Fix [NUTM-4948]: [Access & Identity] [RED] Enabling wireless on RED15w causes 'link down'
 Fix [NUTM-5068]: [Access & Identity] [RED] TCP Vulnerability (CVE-2016-5696)
 Fix [NUTM-5173]: [Basesystem] Memory (swap) leak in RAID monitor
 Fix [NUTM-5407]: [Basesystem] OpenSSL security update (1.0.1u)
 Fix [NUTM-5461]: [Basesystem] BIND Security update (CVE-2016-2776)
 Fix [NUTM-5714]: [Basesystem] CVE-2016-5195 - Linux Kernel - Dirty Cow
 Fix [NUTM-3042]: [Configuration Management] Advanced Threat Protection page error when login as Network Protection Auditor
 Fix [NUTM-4215]: [Documentation, Email] POP3 Proxy reporting source IP of 0.0.0.0
 Fix [NUTM-4840]: [Email] Email is automatically released after timeout from Sandstorm
 Fix [NUTM-5285]: [Email] SMTP file extension filter is case sensitive
 Fix [NUTM-5599]: [Email] Mails with the same recipient set twice lead to corrupt mail queue
 Fix [NUTM-4938]: [Endpoint] Customers who expand their EP license do not get EP Protection enabled
 Fix [NUTM-5049]: [Endpoint] Liveconnect Connectivity Issue
 Fix [NUTM-4400]: [HA/Cluster] pg_ctl: PID file "/var/storage/pgsql92/data/postmaster.pid" does not exist
 Fix [NUTM-3158]: [Kernel] Kernel freeze when running Web Proxy in full transparent mode
 Fix [NUTM-3490]: [Network] Ethernet Bridge with dynamic IP looses connectivity after IP renewal
 Fix [NUTM-4592]: [Network] OSPF: SSL VPN route injection still not working in 9.404
 Fix [NUTM-5147]: [Network] Kernel panic on several SG135 - Kernel Fixes
 Fix [NUTM-5542]: [SUM] Availability Group is unresolved after it was re-deployed without a real change
 Fix [NUTM-5207]: [Sandboxd] Sandbox error when downloading a file with an umlaut in file name
 Fix [NUTM-5209]: [Sandboxd] sandboxd is unable to open database file due to wrong ownership
 Fix [NUTM-4816]: [Up2Date] Up2Date downloader logs errors in uplink balancing setups
 Fix [NUTM-488]: [Virtualization] Fix unstable NIC ordering on VMWare
 Fix [NUTM-5334]: [WebAdmin] Authenticated users might gain access to stored passwords (CVE-2016-7397, CVE-2016-7442)
 Fix [NUTM-4167]: [Web] Web Protection Reporting filtered by departments doesn't provide all data
 Fix [NUTM-4806]: [Web] sandboxd is unable to insert into TransactionLog on HA setup
 Fix [NUTM-4876]: [Web] URL request to parent proxy seems to be send as http request instead of https
 Fix [NUTM-5136]: [Web] Web proxy in transparent mode removes authentication header
 Fix [NUTM-5082]: [WiFi] IPSec traffic is not routed properly if the client is connected over Hotspot
 Fix [NUTM-5303]: [WiFi] Characters in Hotspot terms of use not encoded correctly

RPM packages contained:
 libopenssl1_0_0-1.0.1k-377.g141d7d0.rb6.i686.rpm  
 libopenssl1_0_0_httpproxy-1.0.1k-377.g141d7d0.rb6.i686.rpm
 libudev0-147-0.84.1.1627.ge0459ac.rb3.i686.rpm    
 awslogs-agent-1.3-0.239376395.g5d4adea.rb3.noarch.rpm
 cm-nextgen-agent-9.40-12.gb09699e.rb2.i686.rpm    
 openssl-1.0.1k-377.g141d7d0.rb6.i686.rpm          
 perf-tools-3.12.58-0.242991202.g6d80412.i686.rpm  
 red-firmware2-5035-0.239114881.gbf961ff.rb1.noarch.rpm
 red15-firmware-5035-0.242907480.g0c31ce4.noarch.rpm
 udev-147-0.84.1.1627.ge0459ac.rb3.i686.rpm        
 vmware-tools-10.0.5.3227872-4.ga4d6c51.rb4.i686.rpm
 ep-aua-9.40-37.g1ed9537.rb4.i686.rpm              
 ep-branding-ASG-afg-9.40-48.g7e7ac40.rb4.noarch.rpm
 ep-branding-ASG-ang-9.40-48.g7e7ac40.rb4.noarch.rpm
 ep-branding-ASG-asg-9.40-48.g7e7ac40.rb4.noarch.rpm
 ep-branding-ASG-atg-9.40-48.g7e7ac40.rb4.noarch.rpm
 ep-branding-ASG-aug-9.40-48.g7e7ac40.rb4.noarch.rpm
 ep-confd-9.40-813.g1f7ad66.rb1.i686.rpm          
 ep-confd-tools-9.40-759.g324aec8.rb10.i686.rpm    
 ep-ha-aws-9.40-217.g381995a.rb2.noarch.rpm        
 ep-logging-9.40-3.gc1acc31.rb2.i686.rpm          
 ep-mdw-9.40-504.g56eb6d4.i686.rpm                
 ep-raidtools-9.40-1.gc070d91.rb3.i686.rpm        
 ep-repctl-0.1-0.239828293.gcd71515.rb3.i686.rpm  
 ep-restd-9.40-0.243093672.gaf004a9.rb1.i686.rpm  
 ep-sandboxd-9.40-0.239754530.g04924b1.rb2.i686.rpm
 ep-up2date-9.40-15.gacd1c39.rb5.i686.rpm          
 ep-up2date-downloader-9.40-15.gacd1c39.rb5.i686.rpm
 ep-up2date-pattern-install-9.40-15.gacd1c39.rb5.i686.rpm
 ep-up2date-system-install-9.40-15.gacd1c39.rb5.i686.rpm
 ep-webadmin-9.40-674.gc39ecfa.rb6.i686.rpm        
 ep-cloud-ec2-9.40-35.ga95c9eb.rb2.i686.rpm        
 ep-chroot-httpd-9.40-20.g92cce9f.rb4.noarch.rpm  
 ep-chroot-smtp-9.40-116.g9971304.rb2.i686.rpm    
 chroot-bind-9.10.4_P3-0.240528799.g5a47ed3.rb5.i686.rpm
 chroot-httpd-2.4.18-1.g2b998a8.rb6.i686.rpm      
 chroot-openvpn-9.40-27.g2d31a41.rb3.i686.rpm      
 ep-chroot-pop3-9.40-11.g1291cd5.rb2.i686.rpm      
 ep-httpproxy-9.40-357.g7e74ab8.rb5.i686.rpm      
 kernel-smp-3.12.58-0.242991202.g6d80412.i686.rpm  
 kernel-smp64-3.12.58-0.242991202.g6d80412.x86_64.rpm
 ep-release-9.408-4.noarch.rpm
More @sophos.com

The Badkey Team

icon-linkedin.jpg icon-monsterboard.jpg icon-Twitter.jpg icon-rss.jpg icon_googleplus.jpg icon-YouTube.jpg icon-PlanetLotus.jpg icon-Route66.jpg icon_facebbook.jpg icon-email.jpg icon_googlemaps.jpg

Technorati:
PermaLink Running VMware Virtual Center 5.5.0 build-4180647. Update 3e10/01/2016 01:49 PM
2016-01-10  Badkey OTAP Running VMware Virtual Center 5.5.0 build-4180647. Update 3e (evaluatie)

* Use this link:  VMware vCenter Release and Build Number History

VMware vCenter ServerŽ 5.5 Update 3e Release Notes

Image:Badkey Corner - Running VMware Virtual Center 5.5.0 build-4180647. Update 3e
Image:Badkey Corner - Running VMware Virtual Center 5.5.0 build-4180647. Update 3e Image:Badkey Corner - Running VMware Virtual Center 5.5.0 build-4180647. Update 3e

Image:Badkey Corner - Running VMware Virtual Center 5.5.0 build-4180647. Update 3e


LinkedIn  Monsterboard  Twitter  RSS  Google+  YouTube  Planet Lotus  Route66  FaceBook  E-mail  Google Maps 

The Badkey Team

Technorati:
PermaLink Badkey OTAP on VMware ESXi 5.5.0 Build 4179633 09/14/2016 12:00 AM
2016-08-04

* Use this link:  https://esxi-patches.v-front.de/ESXi-5.5.0.html#2016-08-04

Image:Badkey Corner - Badkey OTAP on VMware ESXi 5.5.0 Build 4179633

LinkedIn  Monsterboard  Twitter  RSS  Google+  YouTube  Planet Lotus  Route66  FaceBook  E-mail  Google Maps 

The Badkey Team

Technorati:
PermaLink CentOS Linux Kernel Update 2.6.32-573.22.1 Released04/01/2016 09:17 PM
 

LinkedIn  Monsterboard  Twitter  RSS  Google+  YouTube  Planet Lotus  Route66  FaceBook  E-mail  Google Maps 

CentOS Linux Kernel Update 2.6.32-573.22.1 Released, we just upgraded the OTAP.

RHSA-2016:0494 - Red Hat Customer Portal (22 mrt. 2016)

Back in June of 2015, CVE-2015-1805 a kernel patch was released to implement a fix for vectored pipe read and write functionality which could potentially result in memory corruption. A local, unprivileged user could use the flaw in an unpatched kernel to crash the system or escalate their privileges on the system.

Recently it was found that the fix for this issue incorrectly kept buffer offset/length in sync on a failed atomic read.
This could result in a pipe buffer state corruption – and a local, unprivileged user could use this to crash the system / leak kernel memory to the user space.

This affects Red Hat / CentOS 6. Red Hat / CentOS 7 is not affected.

Here are some helpful links with more information about this issue:
https://access.redhat.com/security/cve/CVE-2016-0774
https://access.redhat.com/security/cve/cve-2015-1805
https://lists.centos.org/pipermail/centos-announce/2016-March/021769.html

The Badkey Team

LinkedIn  Monsterboard  Twitter  RSS  Google+  YouTube  Planet Lotus  Route66  FaceBook  E-mail  Google Maps 

Technorati:
PermaLink IBM Messaging Roadmap. Updated 20-Apr-2015.03/22/2016 03:00 PM
 
This is only a recap info, for myself, as a lot of other bloggers did it already.

IBM Messaging and Domino - Application Vision Roadmap. 19-05-2015. By Pete Janzen. @slideshare.net
Kramer Reeves and Peter Janzen #MWLUG2015 OGS. 21 aug. 2015. @YouTube
What is the future of Notes/Domino?  2015-11-25. @Volker Weber
IBM roadmap for messaging and social platform - updated Sep 1 2015. 8-9-2015. by Chris Miller. @IdoNotes
Update on IBM Verse and the IBM Messaging Roadmap. 10-6-2015. by Chris Miller. @IdoNotes

IBM Messaging Roadmap. Updated 20-Apr-2015. Click here for the FULL image.
Image:Badkey Corner - IBM Messaging Roadmap. Updated 20-Apr-2015.

IBM Notes and Domino 2016 Roadmap. Domino features.
Image:Badkey Corner - IBM Messaging Roadmap. Updated 20-Apr-2015.

IBM Notes and Domino 2016 Roadmap. Notes client features.
Image:Badkey Corner - IBM Messaging Roadmap. Updated 20-Apr-2015.

IBM Notes and Domino 2016 Roadmap. Domino designer features.
Image:Badkey Corner - IBM Messaging Roadmap. Updated 20-Apr-2015.

IBM Notes and Domino 2016 Roadmap. iNotes features.
Image:Badkey Corner - IBM Messaging Roadmap. Updated 20-Apr-2015.

Icon UK (IBM Notes User Group) in September 2015 Presentation (25Mb) and link to the website.

Image:Badkey Corner - IBM Messaging Roadmap. Updated 20-Apr-2015.


The Badkey Team

LinkedIn  Monsterboard  Twitter  RSS  Google+  YouTube  Planet Lotus  Route66  FaceBook  E-mail  Google Maps 

Technorati:
PermaLink IBM Domino after update vulnerability Linux kernel (CVE-2016-0728)03/18/2016
 


January 19th 2016 a vulnerability was discovered in the Linux kernel. Linux kernel: CVE-2016-0728




´Google has claimed, as expected, that Perception Point claims – about 66 percent of all Android devices are also exposed to the serious Linux kernel flaw – are not entirely accurate.´ Source: Thehackernews.com

´On January 19th 2016 a vulnerability was discovered in the Linux kernel. This vulnerability could allowed a regular user to escalate privileges. Perception Point ´ Source: Redhat.com

´De kwetsbaarheid zit in versie 3.8 van de Linux-kernel die in 2012 verscheen, ontdekte beveiligingsbedrijf´  Bron: Nu.nl

IBM Domino after update vulnerability Linux kernel (CVE-2016-0728)
@CentOS 7. Here at Badkey.com no problem.

Ook de volgende updates:
ISC DHCP security update  CVE-2015-8605
Bind Vulnerability CVE-2015-8000
OpenSSH security update CVE-2016-0777, CVE-2016-0778

Linux vulnerability leaves thousands open to DNS attack. (CVE-2015-7547)
Source: ITpro.co.uk

Dutch: CentOS      https://nl.wikipedia.org/wiki/CentOS
English: CentOS   https://en.wikipedia.org/wiki/CentOS

The Badkey Team

LinkedIn  Monsterboard  Twitter  RSS  Google+  YouTube  Planet Lotus  Route66  FaceBook  E-mail  Google Maps 

Technorati:
PermaLink Sophos UTM Up2Date 9.355001 package02/25/2016 09:30 PM

Started with Astaro 7: Saturday 24th, January 2009
Sophos Free Home UTM 9 Review and First Look - YouTube

We already did it on Badkey OTAP:

21-02-2016 Vulnerability was discovered in the Linux kernel. Linux kernel: CVE-2016-0728
´Google has claimed, as expected, that Perception Point claims – about 66 percent of all Android devices are also exposed to the serious Linux kernel flaw – are not entirely accurate.´

Firmware version: 9.355001
 
We just did the upgrade in the OTAP.

Image:Badkey Corner - Sophos UTM Up2Date 9.355001 package

Features
Security Update

Bugfixes:
 Fix [36375]: glibc security update (CVE-2015-7547) [9.35]

RPM packages contained:
glibc-2.11.3-17.95.2.1656.ga688674.rb4.i686.rpm  
glibc-locale-2.11.3-17.95.2.1656.ga688674.rb4.i686.rpm
u2d-appctrl43-9-13.i686.rpm                      
ep-release-9.355-1.noarch.rpm    

We also installed an AP30 on the network:  ( already 29-11-2014 Sophos UTM 9.3 firewall and Sophos AP30 access point )
Technical Specifications AP 30

Free Sophos UTM Home Edition

Overview:
Our Free Home Use Firewall is a fully equipped software version of the Sophos UTM firewall, available at no cost for home users
– no strings attached. It features full Network, Web, Mail and Web Application Security with VPN functionality and protects up to 50 IP addresses.

The Sophos UTM Free Home Use firewall contains its own operating system and will overwrite all data on the computer during the installation process.
Therefore, a separate, dedicated computer is needed, which will change into a fully functional security appliance. Just right for the spare PC you have sitting in the corner!

More @sophos.com

The Badkey Team

icon-linkedin.jpg icon-monsterboard.jpg icon-Twitter.jpg icon-rss.jpg icon_googleplus.jpg icon-YouTube.jpg icon-PlanetLotus.jpg icon-Route66.jpg icon_facebbook.jpg icon-email.jpg icon_googlemaps.jpg

Technorati:
PermaLink Sophos UTM Up2Date 9.354004 package and Sophos UTM Home Edition02/12/2016
Firmware version:  9.354004

We just did the upgrade in the OTAP.

Image:Badkey Corner - Sophos UTM Up2Date 9.354004 package and Sophos UTM Home Edition

Sophos (and Astaro before them) did a nice thing in allowing Home Users to run the product for up to 50 internal IP addresses for free.  
You can download the home version of the product here, including a VMware Appliance, which is what I use.

Sophos Blog on up2date:
https://blogs.sophos.com/tag/up2date/

Up2Date 9.354004 package description:

Bugfixes:
 Fix [36136]: ISC DHCP security update (CVE-2015-8605)
 Fix [36201]: Bind Vulnerability CVE-2015-8000
 Fix [36266]: OpenSSH security update (CVE-2016-0777, CVE-2016-0778)
 Fix [36281]: XSS vulnerability in mod_url_hardening [9.35]
 Fix [36282]: XSS vulnerability in mod_avscan [9.35]

RPM packages contained:
 modavscan-9.35-11.gf2793ad.rb2.i686.rpm          
 modurlhardening-9.35-10.g2349e23.rb2.i686.rpm    
 openssh-6.2p2-0.24.1.1542.gc691ac7.rb5.i686.rpm  
 chroot-bind-9.9.8_P2-2.gef3615e.rb6.i686.rpm      
 dhcp-chroot-client-4.3.3_P1-2.g78158b9.rb7.i686.rpm
 dhcp-chroot-server-4.3.3_P1-2.g78158b9.rb7.i686.rpm
 ep-release-9.354-4.noarch.rpm              

The Badkey Team

LinkedIn  Monsterboard  Twitter  RSS  Google+  YouTube  Planet Lotus  Route66  FaceBook  E-mail  Google Maps 

Technorati:
Cloud Tag
ClustrMaps
Locations of visitors to this page
My World Travel (21%)
world66.gif
47 countries World66 Member
Sophos Virus protection
Domino Social Edition
Cisco Meraki
Website Monitor
WeBBuddy Website Monitor
TOPdesk
Service Management Simplified TOPdesk voor lokale overheid
StatCounter
statcounter-tmp.jpg
Twitter blogroll
Google+ John Willemse
IBM Connect 2017
San Francisco
February 19-22

Twitter @IBMConnect
Pensioenleeftijd
AOW leeftijd 67
en 3 maanden

Wijzeringeldzaken