Current Known Issues: Difference between revisions

No edit summary
No edit summary
Line 4: Line 4:
=Current Known Issues=  
=Current Known Issues=  
<hr>
<hr>
{{KB|{{WIP}}|{{ZCS 8.8}}|}}  
{{KB|{{WIP}}|{{ZCS 9.0}}|}}  


====Problem====
==Current known issues with ZCS 8.8.15 patch 32==
Here is a list of known issues with the current patch release ZCS 8.8.15 patch 32


=====List of known issues=====
* ZBUG-2837 : zmconfigd is failing for ldap-only nodes. Apply the given workaround -


1. On the ldap server wget these two files for the respective versions in /tmp/:
'''Summary of the issue:''' zmconfigd is failing for ldap-only nodes.


8.8.15.p32
'''Bug number:''' ZBUG-2837
https://raw.githubusercontent.com/Zimbra/zm-core-utils/8.8.15.p32/src/libexec/zmconfigd
 
https://raw.githubusercontent.com/Zimbra/zm-jython/8.8.15.p32/jylibs/commands.py
'''Description:''' zmconfigd is failing for ldap-only nodes.
 
'''Workaround:''' Apply the given workaround
 
1. On the ldap server wget these two files for the respective versions in /tmp/:
 
    wget https://raw.githubusercontent.com/Zimbra/zm-core-utils/8.8.15.p32/src/libexec/zmconfigd
    wget https://raw.githubusercontent.com/Zimbra/zm-jython/8.8.15.p32/jylibs/commands.py


2. Take a backup and replace the files in this location:
2. Take a backup and replace the files in this location:


/opt/zimbra/common/lib/jylibs/commands.py
  /opt/zimbra/common/lib/jylibs/commands.py /opt/zimbra/libexec/zmconfigd
/opt/zimbra/libexec/zmconfigd


3. Restart zmconfigd
3. Restart zmconfigd


* ZBUG-2831 : SMTP authentication failure with 2FA application passcode


* ZBUG-2833 : All Zimlets are disabled from custom COS after redeploying the Zimlets
'''Summary of the issue:''' SMTP authentication failure with 2FA application passcode
 
'''Bug number:''' ZBUG-2831
 
'''Description:''' SMTP authentication failure with 2FA application passcode is configured in client like outlook, thunderbird etc.
 
'''Workaround:''' The following workaround can be applied on the affected server.
 
1. Open /opt/zimbra/jetty_base/etc/jetty.xml.in and add below statement on line no 41.
    <Set name="forwardedPortAsAuthority">false</Set>
2.  Restart mailbox after this
 
 
'''Summary of the issue:'''  All Zimlets are disabled from custom COS after redeploying the Zimlets
 
'''Bug number:''' ZBUG-2833
 
'''Description:''' When zimlets are redeployed on the server , then zimlets are disabled on the customer COS.
 
'''Workaround:''' Those zimlets can be enabled on the custom COS manually.
 
 
'''Summary of the issue:'''  No INFO logs while redeploying the Zimlets on the server.
 
'''Bug number:''' ZBUG-2834
 
'''Description:''' When a zimlet is deployed on the server, it shows the output but it doesn't show anything on the screen and zimlet gets deployed silently in backend.
 
'''Workaround:'''  N/A
 
 
'''Summary of the issue:'''  /var/log/syslog filling after applying the patch 8.8.15 patch 32. This leads to the disk space filling up.
 
'''Bug number:''' ZBUG-2835
 
'''Description:'''    /var/log/syslog filling after applying the patch 8.8.15 patch 32. This leads to the disk space filling up.
 
'''Workaround:''' The following workaround can be applied on the affected server.


* ZBUG-2834 : No INFO logs while redeploying the Zimlets
1. Open /opt/zimbra/conf/log4j.properties.in and update line no 195 and change value to info from debug.
2. Update line no 210 and remove SLOGGER from statement
3. Restart mailbox after this


*ZBUG-2835 : /var/log/syslog filling after applying the patch 8.8.15 patch 32. This leads to the disk space filling up.


* While deploying zimlets, if the following error is encountered, refer to the patch installation section to install the zimbra-common-core-jar, zimbra-common-core-libs, zimbra-mbox-store-libs packages in a particular order and re-deploy the zimlets  
* While deploying zimlets, if the following error is encountered, refer to the patch installation section to install the zimbra-common-core-jar, zimbra-common-core-libs, zimbra-mbox-store-libs packages in a particular order and re-deploy the zimlets  
<pre>/opt/zimbra/bin/zmjava: line 59: /bin/java: No such file or directory
<pre>/opt/zimbra/bin/zmjava: line 59: /bin/java: No such file or directory
Exception in thread "main" java.lang.NoClassDefFoundError: org/apache/logging/log4j/core/appender/ConsoleAppender$Target
Exception in thread "main" java.lang.NoClassDefFoundError: org/apache/logging/log4j/core/appender/ConsoleAppender$Target
Line 41: Line 82:
       at java.base/jdk.internal.loader.ClassLoaders$AppClassLoader.loadClass(ClassLoaders.java:178)
       at java.base/jdk.internal.loader.ClassLoaders$AppClassLoader.loadClass(ClassLoaders.java:178)
       at java.base/java.lang.ClassLoader.loadClass(ClassLoader.java:521)
       at java.base/java.lang.ClassLoader.loadClass(ClassLoader.java:521)
       ... 1 more </pre>
       ... 1 more</pre>


* From Kepler-Patch-25 onwards, customers using SSO will need to update zimbraVirtualHostName attribute for the domains. Please refer to the instructions to update the attribute
* From Kepler-Patch-25 onwards, customers using SSO will need to update zimbraVirtualHostName attribute for the domains. Please refer to the instructions to update the attribute.


* With OpenJDK 17, weaker Kerberos encryption types like 3DES and RC4 have now been disabled by default. This can cause SPNEGO auth to fail if described encryption types are being used. We recommend using stronger encryption types like AES256.
*     With OpenJDK 17, weaker Kerberos encryption types like 3DES and RC4 have now been disabled by default. This can cause SPNEGO auth to fail if described encryption types are being used. We recommend using stronger encryption types like AES256.


To get SPNEGO auth working with weak encryption types, weak encryption can be enabled by setting the allow_weak_crypto property to true in the krb5.conf configuration file. Please follow below instructions:
        To get SPNEGO auth working with weak encryption types, weak encryption can be enabled by setting the allow_weak_crypto property to true in the krb5.conf configuration file. Please follow below instructions:  


1. In /opt/zimbra/jetty_base/etc/krb5.ini.in -> [libdefaults] section, set allow_weak_crypto = true
1. In /opt/zimbra/jetty_base/etc/krb5.ini.in -> [libdefaults] section, set allow_weak_crypto = true
2. Restart mailboxd service:
2. Restart mailboxd service:


<pre>su - zimbra
<pre>su - zimbra
zmmailboxdctl restart</pre>
zmmailboxdctl restart</pre>
{{Article Footer|ZCS 8.8|2022-06-16}}

Revision as of 23:19, 16 June 2022

Current Known Issues


   KB 24443        Last updated on 2022-06-16  




0.00
(0 votes)

Current known issues with ZCS 8.8.15 patch 32

Summary of the issue: zmconfigd is failing for ldap-only nodes.

Bug number: ZBUG-2837

Description: zmconfigd is failing for ldap-only nodes.

Workaround: Apply the given workaround

1. On the ldap server wget these two files for the respective versions in /tmp/:

   wget https://raw.githubusercontent.com/Zimbra/zm-core-utils/8.8.15.p32/src/libexec/zmconfigd
   wget https://raw.githubusercontent.com/Zimbra/zm-jython/8.8.15.p32/jylibs/commands.py

2. Take a backup and replace the files in this location:

  /opt/zimbra/common/lib/jylibs/commands.py /opt/zimbra/libexec/zmconfigd

3. Restart zmconfigd


Summary of the issue: SMTP authentication failure with 2FA application passcode

Bug number: ZBUG-2831

Description: SMTP authentication failure with 2FA application passcode is configured in client like outlook, thunderbird etc.

Workaround: The following workaround can be applied on the affected server.

1. Open /opt/zimbra/jetty_base/etc/jetty.xml.in and add below statement on line no 41.

   <Set name="forwardedPortAsAuthority">false</Set>

2. Restart mailbox after this


Summary of the issue: All Zimlets are disabled from custom COS after redeploying the Zimlets

Bug number: ZBUG-2833

Description: When zimlets are redeployed on the server , then zimlets are disabled on the customer COS.

Workaround: Those zimlets can be enabled on the custom COS manually.


Summary of the issue: No INFO logs while redeploying the Zimlets on the server.

Bug number: ZBUG-2834

Description: When a zimlet is deployed on the server, it shows the output but it doesn't show anything on the screen and zimlet gets deployed silently in backend.

Workaround: N/A


Summary of the issue: /var/log/syslog filling after applying the patch 8.8.15 patch 32. This leads to the disk space filling up.

Bug number: ZBUG-2835

Description: /var/log/syslog filling after applying the patch 8.8.15 patch 32. This leads to the disk space filling up.

Workaround: The following workaround can be applied on the affected server.

1. Open /opt/zimbra/conf/log4j.properties.in and update line no 195 and change value to info from debug. 2. Update line no 210 and remove SLOGGER from statement 3. Restart mailbox after this


  • While deploying zimlets, if the following error is encountered, refer to the patch installation section to install the zimbra-common-core-jar, zimbra-common-core-libs, zimbra-mbox-store-libs packages in a particular order and re-deploy the zimlets
/opt/zimbra/bin/zmjava: line 59: /bin/java: No such file or directory
Exception in thread "main" java.lang.NoClassDefFoundError: org/apache/logging/log4j/core/appender/ConsoleAppender$Target
       at com.zimbra.cs.localconfig.LocalConfigCLI.main(LocalConfigCLI.java:353)
Caused by: java.lang.ClassNotFoundException: org.apache.logging.log4j.core.appender.ConsoleAppender$Target
       at java.base/jdk.internal.loader.BuiltinClassLoader.loadClass(BuiltinClassLoader.java:602)
       at java.base/jdk.internal.loader.ClassLoaders$AppClassLoader.loadClass(ClassLoaders.java:178)
       at java.base/java.lang.ClassLoader.loadClass(ClassLoader.java:521)
       ... 1 more
  • From Kepler-Patch-25 onwards, customers using SSO will need to update zimbraVirtualHostName attribute for the domains. Please refer to the instructions to update the attribute.
  • With OpenJDK 17, weaker Kerberos encryption types like 3DES and RC4 have now been disabled by default. This can cause SPNEGO auth to fail if described encryption types are being used. We recommend using stronger encryption types like AES256.
       To get SPNEGO auth working with weak encryption types, weak encryption can be enabled by setting the allow_weak_crypto property to true in the krb5.conf configuration file. Please follow below instructions: 

1. In /opt/zimbra/jetty_base/etc/krb5.ini.in -> [libdefaults] section, set allow_weak_crypto = true 2. Restart mailboxd service:

su - zimbra
zmmailboxdctl restart
Jump to: navigation, search