Release Notes CSG 7.2.38
Collax Security Gateway
02.12.2025
Installation Notes
Update Instructions
To install this update please follow the following steps:
Procedure
- It is highly recommended to backup of all server data with the Collax backup system before proceeding. Check that the backup was successful before proceeding with the update (this can be done within the backup information email).
- In the administration interface go to Menu → Software → System Update and press Get Package List. This will download the listed update packages. If successful the message Done! will be displayed on the screen.
- Click Get Packages to download the update packages.
- Click Install. This installs the update. The end of this process is indicated by the message Done!.
- A new kernel will now be installed. The system will reboot automatically after installing the update. An appropriate note will be shown if the update process is completed.
New in this version
LDAP: Remote Authentication
The LDAP directory service has been expanded to include the “slapo-remoteauth” function. This allows password verification to be passed on to an external system. In particular, this allows authentication against an Active Directory server. This makes it easier to log in a Grommunio user with an email address instead of a login name against a third-party authentication system. Communication takes place on the encrypted port 636 via the LDAPS protocol. Note: For synchronized LDAP servers, the master should be updated first, followed by the replicas. Otherwise, passwords that have been changed and users that have been deleted during the transition period would only be distributed to all replicas after the master has been updated.
System Management: Linux kernel 6.6.116
This update installs Linux kernel 6.6.116.
Security: Security-related and general updates
Various software packages have been updated in this release. In addition to security-related updates, general maintenance and servicing updates have also been carried out.
The updates and bug fixes affect the following packages:
- Web proxy Squid
- Libraries pam, libmxl2
Issues fixed in this version
fail2ban: Improved intrusion detection and prevention
The intrusion detection and prevention system fail2ban has been updated. In addition, the detection of login attempts has been refined so that even more attack attempts are detected and prevented.
UPS support: Reactivation of messages on the administration interface
In update 7.2.34, the UPS service NUT was updated. As a result, some UPS models shut down too early, even though battery power was still available. This was fixed with the latest update 7.2.36. However, this required the information continuously displayed on the administration interface (job notify) to be disabled. A new update with this update of the NUT UPS service now allows the information to be displayed again.
Notes
Additional software: Bitdefender - Proxy for updates
The virus pattern updates are carried out according to a set cycle. It is currently not possible to use an http proxy for the pattern update of the Bitdefender virus and spam filter.
Additional software: Bitdefender - pattern update after commissioning
After starting up the Collax Antivirus powered by Bitdefender module, it may take a few minutes for the current virus patterns to be downloaded. If you click on Update Bitdefender in the virus scanner form during this time, you will receive an error message “Error connecting to server at /opt/lib/bitdefender//bdamsocket: -3”, because the background process has not yet been fully executed.
GUI: Sporadic hangs during running jobs
The progress of configuration jobs is displayed in the top right-hand corner of the web administration. In the case of extensive changes in the network area, especially with country locks (geo-ip), it can happen in rare cases that the job display hangs during activation. As of release 7.2.28, you will now receive the message “Network connection has been interrupted: Messages may be lost until the connection can be re-established.” informs you about such situations.
VPN: Fix for IKEv2 with Microsoft Windows crashes after 7.6 hours
VPN connections with IKEv2 and the on-board tools of Microsoft Windows are interrupted after interrupted after exactly 7.6 hours. The error occurs because Microsoft Windows proposes different algorithms during the IKE re-encryption than during the first connection. The problem can be solved with a registry fix by the value “NegotiateDH2048_AES256” under HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RasMan\Parameters to 1 is set.
Under the following link you will find a REG file (registry entry) that adds the registry key. Collax accepts no liability for system errors resulting from this.