ACC SHELL

Path : /proc/self/root/usr/share/doc/release-notes/openSUSE/
File Upload :
Current File : //proc/self/root/usr/share/doc/release-notes/openSUSE/RELEASE-NOTES.ko.rtf

 <h1>openSUSE 11.3 Release
  Notes</h1>

 <p>Copyright © 2010 Novell, Inc.</p>
 <p>이 문서를 자유 소프트웨어 재단 발행의 GNU 자유 문서 이용 허가 계약서(버전 1.2나 그 이후 버전 중 하나)가 정하는 조건 아래 복사, 배포 혹은 수정 하는것을 허락합니다. 변경 할 수 없는 부준, 겉표지 글, 뒷표지 글은 없습니다. 이 이용 허가 계약서는 <tt>fdl.txt</tt> 파일에 있습니다.</p>


 



 <p>
  The release notes are under constant development.  Download the newest
  version as part of the Internet test or refer to <tt>http://www.suse.com/relnotes/i386/openSUSE/11.3/RELEASE-NOTES.en.html</tt>.

  

  

</p>
<p>
 If you upgrade from an older version to this openSUSE release, see
 previous release notes listed here:
 <tt>http://en.opensuse.org/Release_Notes</tt>
</p>


 
 

 <p>이 출시 정보에는 다음의 분야에 관한 정보가 있습니다.</p>

 <ul>
  
 <li>
   <p>설치: 스크래치로부터 시스템에 설치하려면 이것을 확인하세요.</p>
  </li>

 <li>
   <p>일반: 모든 사용자를 대상으로 한 정보 입니다.</p>
  </li>

  <li><p>System Upgrade:
    Issues related to the process if you run a system upgrade from the previous
    release to this openSUSE version.</p></li>

  <li><p>기술: 이 장에는 상급 사용자를 위한 기술적인 변경 사항이나 개선 사항이 기록되어 있습니다.</p></li>
 </ul>




 
  <h2>오픈수세 설치</h2>
  <p>N/A</p>
  

 
  <h2>일반</h2>

  
  
   <h3>오픈수세 설명서</h3>

   <ul>
    <li><p>
   Installation Quick Start guides you step-by-step through the 
   installation process.
  </p></li>
    <li><p>
   In Start-Up, find information about installation and basic
   system configuration.
  </p></li>
    <li><p>
   Reference covers deployment, administration, and system  
   configuration in detail and explains how to set up various network services.
  </p></li>
    <li><p>
   KDE and GNOME Quick Start give a short introduction to the
   desktops and some key applications running on it.
  </p></li>
    <li><p>
   The KDE and GNOME User Guide guide you through using and configuring the 
   desktops and help you perform key tasks.
  </p></li>

    <li>
     <p>응용프로그램 길잡이에는 브라우저, 전자 우편 클라이언트, 오피스, 협업 도구, 그래픽, 멀티미디어 응용프로그램 소개가 들어있습니다.</p>
    </li>

    <li><p>보안 길잡이에는 시스템 보안에 관한 기본 개념이나, 로컬 환경과 네트워크 환경에서의 보안 개요가 포함되어 있습니다.</p></li>
   </ul>
  

  
  
   <h3>LXDE—a New Desktop Environment</h3>

   <p>
LXDE provides a lightweight desktop environment for old and obsolete computers
with limited hardware resources.</p>

   <p>pcmanfm and libfm (LXDE File Manager and its main library) are
released as RC1 versions and will get updated with the official updates (stable
versions) as soon as possible.</p>

  

 


 
  <h2>System Upgrade</h2>

  
  
  <h3>Samba: smbfs Service Renamed to cifs</h3>
  
  <p>Since quite some time, smbfs is no longer part of the kernel.
  The cifs component has replaced it.  To avoid confusion with the name
  of the service, we finally renamed it accordingly.
  </p>

  <p>
   During the upgrade of a system with an installed samba-client
   package, the state of the service will be saved,
   <tt>/etc/samba/smbfstab</tt> migrated to
   <tt>/etc/samba/cifstab</tt>, and the state of the service
   restored, if required.
  </p>
  

  
  
   <h3>Incompatible IPsec and strongSwan Changes</h3>

   <p>The "sha256"/"sha2_256" keywords now configure the kernel with 128-bit
    truncation, not the non-standard 96-bit truncation used by previous
    releases. If you depend on the 96-bit truncation scheme, use the new
    "sha256_96" keyword—this might be necessary, if you want to establish a
    connection with an old kernel (openSUSE 11.2 or earlier).</p>

   <p>In those case modify the connection settings to the old and
    non-standard 96-bit truncation in the <tt>ipsec.conf</tt> of
    the new system:</p>

   <pre>esp=aes128-sha256_96</pre>

   <p>There is also an incompatible strongSwan change.  IPComp in tunnel
    mode was fixed to strip out the duplicated outer header.  This change makes
    IPComp tunnel mode connections incompatible with previous releases.
    Disable compression on such tunnels.</p>
  

 


 
  <h2>기술</h2>

  
  
   <h3>Initializing Graphics with KMS (Kernel Mode Setting)</h3>

   <p>
With openSUSE 11.3 we are switching to KMS (Kernel Mode Setting) for Intel, ATI
and NVIDIA graphics, which now is our default. If you encounter problems with
the KMS driver support (intel, radeon, nouveau), disable KMS by adding
<tt>nomodeset</tt> to the kernel boot command line. To set this
permanently, add it to the kernel command line in
<tt>/boot/grub/menu.lst</tt>.  This option makes sure the
appropriate kernel module (intel, radeon, nouveau) is loaded with
<tt>modeset=0</tt> in <tt>initrd</tt>, i.e. KMS is
disabled.</p>

   <p>
In the rare cases when loading the DRM module from <tt>initrd</tt>
is a general problem and unrelated to KMS, it is even possible to disable
loading of the DRM module in <tt>initrd</tt> completely.  For this
set the <tt>NO_KMS_IN_INITRD</tt> sysconfig variable to
<tt>yes</tt> via YAST, which then recreates
<tt>initrd</tt> afterwards. Reboot your machine.</p>

   <p>
On Intel without KMS the Xserver falls back to the <tt>fbdev</tt>
driver (the <tt>intel</tt> driver only supports KMS); alternatively,
there is the "intellegacy" driver
(<tt>xorg-x11-driver-video-intel-legacy</tt> package) which
still supports UMS (User Mode Setting).  To use it, edit
<tt>/etc/X11/xorg.conf.d/50-device.conf</tt> and change the driver
entry to <tt>intellegacy</tt>.</p>

   <p>
On ATI for current GPUs it falls back to <tt>radeonhd</tt>. On NVIDIA
without KMS the <tt>nv</tt> driver is used (the
<tt>nouveau</tt> driver only supports KMS).</p>
  


  
  
  
   <h3>Samba: mount.cifs setuid root</h3>

   <p>The setuid root capability of <tt>mount.cifs</tt> is
   re-enabled, because known security bugs in
   <tt>mount.cifs</tt> have been fixed.
   </p>
  

  
  
   <h3>SSH Public Key Authentication</h3>

   <p>In <tt>/etc/ssh/sshd_config</tt> relative paths are no
   longer allowed.  When pointing to the <tt>authorized_keys</tt>
   file, use <tt>%h/</tt> in front of the path.  Otherwise logging in
   using SSH Public Key Authentication will fail with openSSH 5.4 and
   later.</p>

   <p>Example:</p>

<pre>PubkeyAuthentication yes
AuthorizedKeysFile %h/.ssh/authorized_keys
</pre>

  

 


ACC SHELL 2018