[Users] Last security patch
L Mark Stone
lmstone at lmstone.com
Tue Mar 19 14:45:10 CET 2019
As regards ehcache, I had a Support Case open with Zimbra on this, and it was recommend to increase the ehcache size.
This is what I have now:
zimbra at my:~$ zmprov gacf | grep -i ehcach
zimbraActiveSyncEhcacheExpiration: 5m
zimbraActiveSyncEhcacheHeapSize: 10485760
zimbraActiveSyncEhcacheMaxDiskSize: 10737418240
zimbraImapActiveSessionEhcacheMaxDiskSize: 107374182400
zimbraImapInactiveSessionEhcacheMaxDiskSize: 107374182400
zimbraImapInactiveSessionEhcacheSize: 1048576
zimbra at my:~$
Hope that helps,
Mark
_________________________________________________
Another Message From... L. Mark Stone
________________________________
From: Victor d'Agostino <d.agostino.victor at gmail.com>
Sent: Tuesday, March 19, 2019 9:36 AM
To: David Touitou
Cc: L Mark Stone; users; Info Zeta Alliance
Subject: Re: [Users] Last security patch
Hello again
Security apart the article lets suppose a zimbraMemcachedClientServerList empty attribute is always safer, but IMAP performance could be better with it because the zimbra store would use the memcached service for IMAP protocol instead of EhCache.
The official Zimbra guide says :
zimbraMemcachedClientServerList : list of host:port for memcached servers; set to empty value to disable the use of memcached
I also have an empty attribute on my Zimbra 8.8.8 multi-store environment. If I have I/O performance issues on my zimbra stores, should I set the zimbraMemcachedClientServerList server attribute or let it empty ?
Why does the memcached service is better than EhCache which is memory based ?
Regards,
Victor
Cordialement,
Victor d'Agostino
Le mar. 19 mars 2019 à 14:30, David Touitou <david at network-studio.com<mailto:david at network-studio.com>> a écrit :
> Thanks David; it wasn't clear to me that the author was saying in the last
> section that all these exposures had been fixed.
I might be wrong.
But considereing there are attributed CVE numbers and patches, it looks to me as standard procedure:
. vulnerability discovered and embargoed
. software company contacted
. software company acknowledged the vulnerability
. software company issued patch
. a couple days later, vulnerability went public with explanations
David
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.zetalliance.org/pipermail/users_lists.zetalliance.org/attachments/20190319/64c70e4f/attachment.html>
More information about the Users
mailing list