Language Selection

English French German Italian Portuguese Spanish

SuSE Linux 10.1 RC3 Report

Filed under
Reviews
SUSE
-s

OpenSuSE released rc3 of their upcoming SuSE Linux 10.1 yesterday right on target as planned and reported on the Roadmap. I thought rc2 was just about gold worthy myself and was anxious to see the changelog for rc3. Well, they disappointed me on a few issues but all in all, they are probably getting closer to that final release.

The first disappointment came in the form of my preferred install method of hard drive installs. If I had to burn cds for each release, I'd be out about 60 cdrs by now. As such, I almost always utilize the hard drive install method when possible for any distro, not just SuSE. Well, my first attempt at a hard drve install of rc3 bombed out at the first summary screen when the installer could not read the sources catalogue. So choosing or installing any software was impossible.

So, I thought this might be a perfect opportunity to test the system upgrade capabilities of 10.1. I booted rc2 and updated the sources and found that the system update could not read the source catalogue either. The online update tried to work, but hung at 26% for a coupla hours - so I figured it wasn't going to complete either.

As a last resort, I burnt the 5 cdrs of SuSE Linux and the install proceded just fine. It was the same exact process we've described several times now and I suffered no glitches with even the net connection test or the online update configuration.

The system booted just fine as well and most of the yast components are functioning well. I tested the system update, but as a fresh install, there wasn't going to be much to test there. The online update module seemed to hang at the point it was going to download the patches I chose to test. I left it quite a while and it never did download them. Through the software manager, the online update selection did function properly and my patches were downloaded and installed. Other packages from local sources also installed with no issues. All in all, the software management suite is working ..mostly. I'm not sure what the difference is between choosing Online Update from the Yast Control Center or chosing online update in the Software Manager, but this is what happened here.

        

All regular applications opened, closed, and seemed to function well and hardware detection or manual setup went well too. My scanner wasn't properly autodetected as it didn't work until I went back in and selected my model manually by hand. As always I have to set my tv card manually and afterwhich it worked as desired.

Again, as always, SuSE is rock solid and has a very professional feel in actual use. Its performance is well above average, especially considering the size of its full featured install. Some folks might call it bloated, I call it full-featured. It's still a marvel of modern operating system development.

...Even if they managed to leave out the changelog. I'm not sure why or how, but the changelog included with this release consisted of items from Apr 2004 through Aug 2004. And that's it. I even searched the Factory mirrors and the changelog included there is completely empty. Nothing. Who's in charge of those changelogs anyway!? Big Grin

    

So, I guess we may never know what was changed from rc2 to rc3. Or perhaps the next release will bring us an updated changelog and we can investigate then. As it is, all we can surmize is that they either changed the location or the format of their installation file catalog. They apparently adjusted their regular gui installer, but once again overlooked the other alternative methods.

One other obvious change is the update of Firefox to version 1.5.0.3. The gang at OpenSuSE was right on the ball with that security update and users can rest assured in that area. The kernel version is now a 2.6.16.11, which if memory serves is also the latest security updated release as well.

So, some software version highlights can include:

  • kernel-source-2.6.16.11-4.i586.rpm

  • gcc-4.1.0-22.i586.rpm
  • python-2.4.2-16.i586.rpm
  • qt3-3.3.5-56.i586.rpm
  • perl-5.8.8-12.i586.rpm
  • xorg-x11-6.9.0-44.i586.rpm
  • kdebase3-3.5.1-67.i586.rpm
  • gnome-desktop-2.12.2-21.i586.rpm
  • OpenOffice_org-2.0.2-20.i586.rpm
  • gaim-1.5.0-48.i586.rpm
  • MozillaFirefox-1.5.0.3-4.i586.rpm
  • MozillaThunderbird-1.5-25.i586.rpm
  • xgl-cvs_060419-5.i586.rpm
  • libsvg-cairo-0.1.6-14.i586.rpm
  • compiz-cvs_060421-9.i586.rpm
  • alsa-1.0.11-29.i586.rpm
  • Full RPMlist.

        

The Most Annoying Bug List is again at a bare minimum, and in fact is almost a carbon copy of last release's:

    For RC3 there are only delta isos against RC2 and RC1. Have a look at the Applying Delta ISOs section of the Download Instructions how to use them.

    • Language dependent packages for the default language are not installed Bug 162064

    • YaST2 does not show the package description/summary for a lot of packages
    • The source with updates is added twice Bug 170113

    A special Add-On CD with non-OSS software is available as well

Well, that's about it this time. No major changes except in the update process to rc3 and hard drive installs due to a presumed change in the software catalogs. No changelog offered to the users this time leads to further disappointment for all. They did make some important security updates of key software packages. Once again, the system seems almost fully functional, stable, and just about goldmaster material. At this time we are still only given the "it will be announced when ready" for that blessed event.

More in Tux Machines

Canonical and Ubuntu

  • RADV & ANV Vulkan Drivers Are One Command Away On Ubuntu 17.04
    Similar to Ubuntu 16.10, the Mesa Vulkan drivers are not present by default on new Ubuntu installations. But to get the packaged Vulkan drivers, simply sudo apt install mesa-vulkan-drivers. When running some tests on Ubuntu 17.04 this weekend, I was a bit surprised to see that Mesa's Intel ANV and Radeon RADV drivers aren't present by default -- since it's been one year since the Vulkan 1.0 debut and the ANV/RADV drivers have matured a lot during this time. There's also more and more software becoming available that can make use of Vulkan while personally wishing for more Linux desktops to push Vulkan. But it's easy to install the Vulkan drivers as mentioned. Similarly, vulkan-utils isn't installed by default.
  • Wishful Thinking Of Non-Free Software Makers
    Regardless of my personal problems with non-Free software, the world has largely accepted FLOSS to SAS’s chagrin. I guess Canonical should be glad except they barely mention “Linux” on their site. What’s with that? They are like some purveyors of non-Free software that talk about the benefits of their products without even mentioning what the software actually does as if that’s best kept secret…
  • 2017: Should Linux Benchmarking Still Be Mostly Done With Ubuntu?
    Every year or so it comes up how some users believe that at Phoronix we should be benchmarking with Antergos/Arch, Debian, or [insert here any other distribution] instead of mostly using Ubuntu for our Linux benchmarking. That discussion has come back up in recent days. In our forums and Twitter the past few days, that discussion seems to have come up by some users requesting I use a different Linux distribution than Ubuntu as the main test platform for all of our benchmarking. As I've said before, Ubuntu is used given it's the most popular when it comes to Linux desktop usage as well as significant usage of it on servers / workstations / cloud. But I have no tie to it beyond focusing upon using the Linux distribution that's used by the most folks for obtaining the maximum relevance to users, gamers, and enthusiasts reading said articles. And for allowing easy comparisons / out-of-the-box expectations. On my main production system I still use Fedora Workstation as my personal favorite and in the basement server room there are a variety of operating systems -- both BSDs and Linux and from Antergos to openSUSE and Debian.

Linux Devices, Tizen, and Android

Leftovers: OSS

  • SAP buys into blockchain, joins Hyperledger Project
  • foss-north speaker line-up
    I am extremely pleased to have confirmed the entire speaker line-up for foss north 2017. This will be a really good year!
  • Chromium/Chrome Browser Adds A glTF Parser
    Google's Chrome / Chromium web-browser has added a native glTF 1.0 parser. The GL Transmission Format, of course, being Khronos' "3D asset delivery format" for dealing with compressed scenes and assets by WebGL, OpenGL ES, and other APIs. There are glTF utility libraries in JavaScript and other web-focused languages, but Google adding a native glTF 1.0 parser appears to be related to their VR push with supporting VR content on the web. Their glTF parser was added to Chromium Git on Friday.
  • Sex and Gor and open source
    A few weeks ago, Dries Buytaert, founder of the popular open-source CMS Drupal, asked Larry Garfield, a prominent Drupal contributor and long-time member of the Drupal community, “to leave the Drupal project.” Why did he do this? He refuses to say. A huge furor has erupted in response — not least because the reason clearly has much to do with Garfield’s unconventional sex life. [...] I’ll unpack the first: open-source communities/projects are crucially important to many people’s careers and professional lives — cf “the cornerstone of my career” — so who they allow and deny membership to, and how their codes of conduct are constructed and followed, is highly consequential.
  • Hazelcast Releases 3.8 – The Fastest Open Source In-Memory Data Grid
  • SecureDrop and Alexandre Oliva are 2016 Free Software Awards winners
  • MRRF 17: Lulzbot and IC3D Release Line Of Open Source Filament
    Today at the Midwest RepRap Festival, Lulzbot and IC3D announced the creation of an Open Source filament. While the RepRap project is the best example we have for what can be done with Open Source hardware, the stuff that makes 3D printers work – filament, motors, and to some extent the electronics – are tied up in trade secrets and proprietary processes. As you would expect from most industrial processes, there is an art and a science to making filament and now these secrets will be revealed.
  • RApiDatetime 0.0.2

Security Leftovers

  • NSA: We Disclose 90% of the Flaws We Find
    In the wake of the release of thousands of documents describing CIA hacking tools and techniques earlier this month, there has been a renewed discussion in the security and government communities about whether government agencies should disclose any vulnerabilities they discover. While raw numbers on vulnerability discovery are hard to come by, the NSA, which does much of the country’s offensive security operations, discloses more than nine of every 10 flaws it finds, the agency’s deputy director said.
  • EFF Launches Community Security Training Series
    EFF is pleased to announce a series of community security trainings in partnership with the San Francisco Public Library. High-profile data breaches and hard-fought battles against unlawful mass surveillance programs underscore that the public needs practical information about online security. We know more about potential threats each day, but we also know that encryption works and can help thwart digital spying. Lack of knowledge about best practices puts individuals at risk, so EFF will bring lessons from its comprehensive Surveillance Self-Defense guide to the SFPL. [...] With the Surveillance Self-Defense project and these local events, EFF strives to help make information about online security accessible to beginners as well as seasoned techno-activists and journalists. We hope you will consider our tips on how to protect your digital privacy, but we also hope you will encourage those around you to learn more and make better choices with technology. After all, privacy is a team sport and everyone wins.
  • NextCloud, a security analysis
    First, I would like to scare everyone a little bit in order to have people appreciate the extent of this statement. As the figure that opens the post indicates, there are thousands of vulnerable Owncloud/NextCloud instances out there. It will surprise many just how easy is to detect those by trying out common URL paths during an IP sweep.
  • FedEx will deliver you $5.00 just to install Flash
    Bribes on offer as courier's custom printing service needs Adobe's security sinkhole