[jboss-cvs] JBossAS SVN: r87477 - in projects/docs/enterprise/4.3.3/Common_Criteria_Guide/en-US: images and 1 other directory.

jboss-cvs-commits at lists.jboss.org jboss-cvs-commits at lists.jboss.org
Fri Apr 17 04:48:54 EDT 2009


Author: Darrin
Date: 2009-04-17 04:48:54 -0400 (Fri, 17 Apr 2009)
New Revision: 87477

Modified:
   projects/docs/enterprise/4.3.3/Common_Criteria_Guide/en-US/Ports.xml
   projects/docs/enterprise/4.3.3/Common_Criteria_Guide/en-US/System_Installation.xml
   projects/docs/enterprise/4.3.3/Common_Criteria_Guide/en-US/images/CSP-Patch-Info.png
   projects/docs/enterprise/4.3.3/Common_Criteria_Guide/en-US/images/RHN_download.png
   projects/docs/enterprise/4.3.3/Common_Criteria_Guide/en-US/images/RHN_select_version.png
   projects/docs/enterprise/4.3.3/Common_Criteria_Guide/en-US/images/lookup_MD5_value.png
   projects/docs/enterprise/4.3.3/Common_Criteria_Guide/en-US/images/rhn_certificate.png
   projects/docs/enterprise/4.3.3/Common_Criteria_Guide/en-US/images/software_downloads.png
Log:
JBOSSCC-40 - updated MD5 values, RHN & CSP download info

Modified: projects/docs/enterprise/4.3.3/Common_Criteria_Guide/en-US/Ports.xml
===================================================================
--- projects/docs/enterprise/4.3.3/Common_Criteria_Guide/en-US/Ports.xml	2009-04-17 07:24:31 UTC (rev 87476)
+++ projects/docs/enterprise/4.3.3/Common_Criteria_Guide/en-US/Ports.xml	2009-04-17 08:48:54 UTC (rev 87477)
@@ -5,7 +5,6 @@
 <appendix id="appe-ports">
 <title>Port Configuration in JBoss EAP</title>
 
-
 <table frame='all'><title>TCP Port Configuration</title>
 <tgroup cols='4' align='left' colsep='1' rowsep='1'>
     <colspec colname='c1' colwidth="1*"/>

Modified: projects/docs/enterprise/4.3.3/Common_Criteria_Guide/en-US/System_Installation.xml
===================================================================
--- projects/docs/enterprise/4.3.3/Common_Criteria_Guide/en-US/System_Installation.xml	2009-04-17 07:24:31 UTC (rev 87476)
+++ projects/docs/enterprise/4.3.3/Common_Criteria_Guide/en-US/System_Installation.xml	2009-04-17 08:48:54 UTC (rev 87477)
@@ -5,12 +5,17 @@
 
 <chapter id="chap-Common_Criteria_Guide-System_Installation">
 	<title>Downloading and Verifying the Packages</title>
-    <para>JBoss EAP is delivered on line through the Red Hat JBoss Customer Support Portal (CSP) at 
-	    <ulink url="https://support.redhat.com/jbossnetwork/restricted/main.html">https://support.redhat.com/jbossnetwork/restricted/main.html</ulink> and through the Red Hat Network (RHN) at the following address:  <ulink url="https://rhn.redhat.com">https://rhn.redhat.com</ulink>. The EAP is available as ZIP files from the CSP and as ZIP and RPM files from the RHN.
+    <para>
+    JBoss EAP is delivered on line through the Red Hat JBoss Customer Support Portal (CSP) at 
+	<ulink url="https://support.redhat.com/jbossnetwork/restricted/main.html">https://support.redhat.com/jbossnetwork/restricted/main.html</ulink> 
+	and through the Red Hat Network (RHN) at  <ulink url="https://rhn.redhat.com">https://rhn.redhat.com</ulink>. 
+	JBoss EAP is available as ZIP files from CSP and as ZIP and RPM files from RHN.
     </para>
     
-    <para>To ensure the authenticity of the downloaded software you need to verify 
-    the authenticity of the files and their source.</para>
+    <para>
+    To ensure the authenticity of the downloaded software you need to verify 
+    the authenticity of the files and their source.
+    </para>
 
     <important>
         <para>Unless specifically stated otherwise the screenshots and other samples shown 
@@ -18,23 +23,27 @@
         may change overtime.</para>
     </important>
     
+   <!-- section: Verify the Authenticity of the Download Site. --> 
    <section id="verify_authenticity_of_site">
         <title>Verify the Authenticity of the Download Site.</title>
 
-        <para>Red Hat JBoss Customer Support Portal and Red Hat Network are secure sites.  This is 
+        <para>
+        Red Hat JBoss Customer Support Portal and Red Hat Network are secure sites.  This is 
         indicated by the 'lock' icon in the browser status bar. The lock may also present itself in 
-        the address bar depending on what browser you are using.</para>  
+        the address bar depending on what browser you are using.
+        </para>  
 
         <important>
-            <para>The following images have been taken with the Firefox3 and Firefox2 web browsers. While most 
-            popular web-browsers display this information in a very similar manner it may 
-            differ slightly to these images.</para>
+            <para>
+            The following images have been taken with the Firefox3 and Firefox2 web browsers. 
+            While most popular web-browsers display this information in a very similar manner 
+            it may differ slightly to these images.</para>
         </important>
 
-	<figure><title>Secure site 'lock' icon displayed in the Firefox3 status bar.</title>
-		<mediaobject>
-			<imageobject><imagedata fileref="images/ssl_statusbar.png" /></imageobject>
-		</mediaobject>
+	    <figure><title>Secure site 'lock' icon displayed in the Firefox3 status bar.</title>
+		    <mediaobject>
+			    <imageobject><imagedata fileref="images/ssl_statusbar.png" /></imageobject>
+		    </mediaobject>
         </figure>
 	
         <figure><title>Secure site 'lock' icon displayed in the Firefox2 address bar.</title>
@@ -43,76 +52,85 @@
             </mediaobject>
         </figure>
         
-	<para>
-	If these items are not visible you may wish to check the authenticity of the 
-	site by viewing the identity certificate. To give an example of how this can be 
-	done, we will use the Firefox web browser.
-	</para>
-	<para>
-	Within the Firefox browser, go to Tools in the top menu bar and then click on 
-	Page Info. From here click the Security icon and then the <guibutton>View Certificate</guibutton> 
-	button. 
-	</para>
+	    <para>
+	    If these items are not visible you may wish to check the authenticity of the 
+	    site by viewing the identity certificate. To give an example of how this can be 
+	    done, we will use the Firefox web browser.
+	    </para>
+	
+    	<para>
+    	Within the Firefox browser, go to Tools in the top menu bar and then click on 
+    	Page Info. From here click the Security icon and then the <guibutton>View Certificate</guibutton> 
+    	button. 
+    	</para>
 
-	<para>
-	The certificate will display details such as who the owner of the page is, who 
-	issued the certificate, when it was issued and when it expires as well as SHA1 
-	and MD5 fingerprint verification strings. An example of the certificate for 
-	<ulink url="https://rhn.redhat.com">https://rhn.redhat.com</ulink> follows. 
-	</para>
+    	<para>
+    	The certificate will display details such as who the owner of the page is, who 
+    	issued the certificate, when it was issued and when it expires as well as SHA1 
+    	and MD5 fingerprint verification strings. An example of the certificate for 
+    	<ulink url="https://rhn.redhat.com">https://rhn.redhat.com</ulink> follows. 
+    	</para>
 	
-	<figure><title>The RHN certification certificate</title>
-		<mediaobject>
-			<imageobject><imagedata fileref="images/rhn_certificate.png" /></imageobject>
-		</mediaobject>
+    	<figure><title>The RHN certification certificate</title>
+    		<mediaobject>
+    			<imageobject><imagedata fileref="images/rhn_certificate.png" /></imageobject>
+    		</mediaobject>
         </figure>
 	
-	<para>If neither of the lock icons are present in your browser and a verified certificate 
-    cannot be found, this may mean that you are not at the correct site. If you are unable to 
-    reach the secure Red Hat JBoss Customer Support Portal or Red Hat Network sites you should 
-    contact Red Hat Support and report this problem.</para>
-
-<!--        <para>When the 'lock' icon is clicked a dialog window will be displayed with the details 
-        of the site certificate.  If this dialog does not specify that the web sites identity is 
-        verified then you are not at the correct site.</para>
-
-        <figure><title>Firefox Security dialog displaying verification for support.redhat.com.</title>
-            <mediaobject>
-                <imageobject><imagedata fileref="images/certificate.png" /></imageobject>
-            </mediaobject>
-        </figure>
--->
+	    <para>
+	    If neither of the lock icons are present in your browser and a verified certificate 
+        cannot be found, this may mean that you are not at the correct site. If you are unable to 
+        reach the secure Red Hat JBoss Customer Support Portal or Red Hat Network sites you should 
+        contact Red Hat Support and report this problem.
+        </para>
     </section>
     
+    <!-- section: Downloading JBoss EAP from the Red Hat JBoss Customer Support Portal -->
     <section id="verify_downloaded_files_Customer_Support_Site">
-        <title>Verifying the Downloaded Files from the Red Hat JBoss Customer Support Portal</title>
-        <para>The JBoss EAP evaluated configuration is found for download on the 
-        Customer support site by browsing to <guimenuitem>JBoss Enterprise Middleware</guimenuitem>, 
-        <guimenuitem>Application Platform</guimenuitem>, <guimenuitem>Certified downloads</guimenuitem>.</para>
+        <title>Downloading JBoss EAP from the Red Hat JBoss Customer Support Portal</title>
         
-        <figure><title>Software downloads page showing available files</title>
+        <para>
+        JBoss EAP can be downloaded from the Red Hat JBoss Customer Support Portal,  
+        <ulink url="https://support.redhat.com/jbossnetwork/">https://support.redhat.com/jbossnetwork/</ulink>.
+        </para>
+        
+        <para>After you have logged in, navigate to 
+        <guimenuitem>JBoss Enterprise Platforms</guimenuitem>,  
+        <guimenuitem>Application Platform</guimenuitem> and select 
+        <guimenuitem>4.3.0.GA_CP03</guimenuitem> from the <guilabel>Version</guilabel> menu.
+        </para>
+        
+        <!-- figure: Software downloads page showing available files -->
+        <figure id="fig-csp_software_downloads_page">
+            <title>Software downloads page showing available files</title>
             <mediaobject>
                 <imageobject><imagedata fileref="images/software_downloads.png" /></imageobject>
             </mediaobject>
         </figure>
         
-        <para>The packages can be downloaded using either the download link on that page, 
+        <para>
+        The packages can be downloaded using either the download link on that page, 
         or by using the download link on the software details page for that package.  The 
         software details page is reached by clicking on the package name rather than the 
-        download link.</para>
+        download link.
+        </para>
 
-        <para>The software details page for each package also contains the MD5 and SHA-256 
-        checksum values for that package.  These values are used to verify the integrity 
-        of your downloaded files.</para>
+        <para>
+        The software details page for each package also contains the MD5 checksum value for 
+        that package.  These values are used to verify the integrity 
+        of your downloaded files.
+        </para>
         
-        <figure><title>MD5 &amp; SHA-256 information displayed for a download at the Red Hat JBoss Customer Support Portal</title>
+        <figure><title>MD5 information displayed for a download at the Red Hat JBoss Customer Support Portal</title>
             <mediaobject>
                 <imageobject><imagedata fileref="images/lookup_MD5_value.png" /></imageobject>
             </mediaobject>
         </figure>
         
         <para>
-        In addition, download the Security Notice for CVE-2009-0027.
+        You also must download the patch for Security Notice CVE-2009-0027.  This is found by
+        clicking on the <guilabel>Security Advisories</guilabel> link.  Installation instructions 
+        for this patch are found in <xref linkend="sect-installing_patch" />.
         </para>
 
         <!-- figure: Security Notice for CVE-2009-0027 -->
@@ -126,86 +144,34 @@
         </figure>
         
         <para>
-        You can use either the <command>md5sum</command> or <command>sha256sum</command> utilities 
-        as detailed below to calculate the checksum values of the files to compare to the supplied 
-        values on the website.
-        </para>  
+        After downloading these files you need to validate their authenticity according to the
+        directions in <xref linkend="verify_RHN_downloaded_files_MD5" />.
+        </para>
         
-        <note>
-            <para>The command line examples given are accurate for most Linux and 
-            Unix operating systems.  Mac OS X includes the equivalent command 
-            <command>md5</command>.</para>  
-            
-            <para>If you are using Microsoft Windows you will have to download a 
-            third party utility to perform these steps as it does not include a 
-            MD5SUM or SHA256SUM tool.</para>
-        </note>
-
-        <para>The values that are generated by these tools should be the same as those 
-        on the Software Details page. If it is not then your download is either incomplete 
-        or corrupted. You will need to download it again. </para>
-
-        <warning>
-            <para>If after several attempts you are unable to download a copy of the file that 
-            produces a valid checksum values you should open a support case to report the 
-            problem. </para>
-        </warning>
-        
-        <section id="verify_downloaded_files_MD5">
-            <title>Verifying the Downloaded Files</title>
-            <para>After you have downloaded the file, run the <command>md5sum</command> command-line utility and specify 
-            the file you downloaded as the first argument. </para>
-            
-            <example><title>Using the md5sum tool on Linux or Unix</title>
-<screen>$ md5sum jboss-eap-4.3.0.GA_CP03.zip
-4ebffbd38fcb7e259d1d9abbd40b058a  jboss-eap-4.3.0.GA_CP03.zip
-
-$ md5sum jbeap-4.3.0.GA_CP03_CVE-2009-0027.zip
-45a3abcfd95d40322d92bd5a0e7dd6ee  jbeap-4.3.0.GA_CP03_CVE-2009-0027.zip</screen></example>
-           
-        </section>
-            
-        <section id="verify_downloaded_files_SHA256">
-            <title>Verifying the Downloaded Files</title>
-            <para>After you have downloaded the file, run the <command>sha256sum</command> command-line utility and specify 
-            the file you downloaded as the first argument. </para>
-            
-            <example><title>Using the sha256sum tool</title>
-<screen>$ sha256sum jboss-eap-4.3.0.GA_CP03.zip
-c96fae2fa809077ab0d0b969ac279bb5cba892916d06f832908204265916684a jboss-eap-4.3.0.GA_CP03.zip
-
-$ sha256sum jbeap-4.3.0.GA_CP03_CVE-2009-0027.zip
-51c127882d1e0509c27076e42efe16b440f99bc9  jbeap-4.3.0.GA_CP03_CVE-2009-0027.zip</screen></example>
-            
-        </section>
-
     </section>
 
+    <!-- section: Downloading JBoss EAP from the Red Hat Network -->
     <section id="verify_downloaded_files_RHN">
-        <title>Verifying the Downloaded Files from the Red Hat Network</title>
-        <para>The JBoss EAP evaluated configuration is found for download on the Red Hat 
-        Network by first logging into RHN and then locating and selecting the download. 
-        This section will detail the steps necessary to download the EAP from RHN and 
-        then the verification of the download.</para>
-    
-        <para>Firstly you will have to login to the Red Hat Network with your Red Hat login and 
-        password. If you have lost these details, click on the <guilabel>Lost login/Password?</guilabel> 
-        link and follow the prompts.</para>
+        <title>Downloading JBoss EAP from the Red Hat Network</title>
+        <para>
+        JBoss EAP can be downloaded from the Red Hat Network,  
+        <ulink url="https://rhn.redhat.com">https://rhn.redhat.com</ulink>.
+        </para>
 
-        <figure><title>RHN login page</title>
-            <mediaobject>
-                <imageobject><imagedata fileref="images/RHN_Login.png" /></imageobject>
-            </mediaobject>
-        </figure>
+        <para>
+        After you have logged in, you can locate the appropriate download channel for 
+        your system by clicking on the <guimenuitem>Channels</guimenuitem> menu item at 
+        the top of the page.  From the <guimenu>Filter by Product Channel</guimenu> 
+        menu select the <guilabel>JBoss Application Platform</guilabel>, version 
+        <guilabel>4.3.0</guilabel>, the architecture of your server, and then click on 
+        the <guibutton>Filter</guibutton> button. 
+        </para>
 
-        <para>To find the JBoss EAP download, begin by clicking on the <guimenuitem>Channels</guimenuitem> 
-        menu item at the top of the page.  From the dropdown menu system, select the <guilabel>JBoss 
-        Application Platform</guilabel>, version <guilabel>4.3.0</guilabel> (as it is the certified version) 
-        followed by the architecture of your system and then click on the <guibutton>Filter</guibutton> button. </para>
-        
-        <para>The following image is an example filter search and displays all versions of the EAP 
-        that are available. For the certified version select 
-        <guilabel>JBoss Enterprise Application Platform 4.3.0</guilabel>. </para>
+        <para>
+        The following image is an example filter search and displays all versions of the EAP 
+        that are available. For the certified version of JBoss EAP select 
+        <guilabel>JBoss Enterprise Application Platform 4.3.0</guilabel>. 
+        </para>
 
         <important>
             <para>
@@ -216,163 +182,231 @@
             </para>
         </important>
 
-        <figure><title>Searching for the JBoss Enterprise Application Platform</title>
+        <figure>
+            <title>Searching for the JBoss Enterprise Application Platform</title>
             <mediaobject>
                 <imageobject><imagedata fileref="images/RHN_select_version.png" /></imageobject>
             </mediaobject>
         </figure>
-
+        
         <para>
-        Select the appropriate JBoss EAP ISO image:
+        Each of the displayed channels for JBoss EAP delivers the files in the slightly 
+        different way.  These are described in the following two sections.
         </para>
-        <!-- table: jboss eap ISO images and MD5 values -->
-        <table id="table-eap_isos_md5s">
-            <title>JBoss EAP ISO Images and MD5 values</title>
-            <tgroup align="left" cols="2" colsep="1" rowsep="1">
-                <colspec colname="c1" colwidth="4*"/>
-                <colspec colname="c2" colwidth="3*"/>
-                <thead>
-                    <row><entry>ISO Image</entry><entry>MD5 Checksum</entry></row>
-                </thead>
-                <tbody>
-                    <row><entry>JBEAP4.3.0-re20090408.0-i386-disc1-ftp.iso</entry><entry>5561e56f493049b6cd147cdf481d6b57</entry></row>
-                    <row><entry>JBEAP4.3.0-re20090408.0-x86_64-disc1-ftp.iso</entry><entry>07ef18ab2b14858be0efd9a7e1af1e5d</entry></row>
-                    <row><entry>RHEL5.2-JBEAP-4.3.0-20090408.0-i386-disc1-ftp.iso</entry><entry>c9b80dacc96a5c31c9de2352cbe87011</entry></row>
-                    <row><entry>RHEL5.2-JBEAP-4.3.0-20090408.0-x86_64-disc1-ftp.iso</entry><entry>077f2fd28ce3a05c769e2963f29c97cf</entry></row>
-                </tbody>
-            </tgroup>
-        </table>
 
-        <para>
-        From the filtered list that is returned and after selecting the appropriate version 
-        of the JBoss EAP for your system, another page will be displayed which outlines the 
-        details of the download. 
-        </para>
+        <!-- section: JBoss EAP Channels -->
+        <section id="sect-downloading_ZIP">
+            <title>JBoss Enterprise Middleware (All)</title>
+            <para>
+            This channel provides JBoss EAP packaged in zip files as well as
+            a Java installer.  These can be installed on any supported platform.
+            </para>
+            
+            <para>
+            After you have selected the JBoss Enterprise Middleware channel,
+            you are presented with the <guilabel>Download Details</guilabel> page for
+            JBoss EAP.  Initially the <guimenuitem>Details</guimenuitem> 
+            tab will be selected. Clicking on the tab labeled 
+            <guimenuitem>Downloads</guimenuitem> and the list of the downloads for 
+            JBoss EAP will be displayed. 
+            </para>
 
-        <figure><title>JBoss EAP download details</title>
-            <mediaobject>
-                <imageobject><imagedata fileref="images/RHN_EAP_details.png" /></imageobject>
-            </mediaobject>
-        </figure>
+            <important>
+                <para>The files listed here are those of the most recent
+                JBoss Enterprise Application Server release.  Once 4.3.CP03 is 
+                superseded by another version you will have to click on the 
+                <guilabel>View ISO Images for Older Releases</guilabel> link 
+                and then <guilabel>JBoss Enterprise Application Platform 4.3.0 CP03</guilabel> 
+                to access the files for the evaluated configuration.</para>
+            </important>
 
-        <para>Under the JBoss Application Platform title is a list of tabs. Currently the 
-        <guimenuitem>Details</guimenuitem> tab is selected. By clicking on the last tab 
-        called <guimenuitem>Downloads</guimenuitem>, a list of all the downloads which 
-        form the JBoss EAP will be displayed. </para>
+            <figure>
+                <title>JBoss EAP download file list </title>
+                <mediaobject>
+                    <imageobject><imagedata fileref="images/RHN_download.png" /></imageobject>
+                </mediaobject>
+            </figure>
 
-        <important>
-            <para>The files listed here are those of the most recent
-            JBoss Enterprise Application Server release.  Once 4.3.CP03 is 
-            superseded by another version you will have to click on the 
-            <guilabel>View ISO Images for Older Releases</guilabel> link 
-            and then <guilabel>JBoss Enterprise Application Platform 4.3.0 CP03</guilabel> 
-            to access the files for the evaluated configuration.</para>
-        </important>
+            <para>The packages listed above can be explained as follows:</para>
+            <itemizedlist>
+                <listitem>
+                    <para>
+                        <filename>enterprise-installer-4.3.0.GA_CP03.jar</filename>: The graphical installer for EAP 4.3.0.CP03.
+                    </para>
+                </listitem>
+                <listitem>
+                    <para>
+                        <filename>jboss-eap-4.3.0.GA_CP03.zip</filename>: The files that make up the EAP 4.3.0.CP03 install.
+                    </para>
+                </listitem>
+                <listitem>
+                    <para>
+                        <filename>jboss-eap-docs-4.3.0.GA_CP03.zip</filename>: The documentation for EAP 4.3.0.CP03.
+                    </para>
+                </listitem>
+                <listitem>
+                    <para>
+                        <filename>jboss-eap-src-4.3.0.GA_CP03.zip</filename>: The source code distribution for EAP 4.3.0.CP03.
+                    </para>
+                </listitem>
+                <listitem>
+                    <para><filename>jbeap-4.3.0.GA_CP03_CVE-2009-0027.zip</filename>: The patch for Security Notice CVE-2009-0027.</para>
+                </listitem>
+            </itemizedlist>
 
-        <figure>
-            <title>JBoss EAP download file list </title>
-            <mediaobject>
-                <imageobject><imagedata fileref="images/RHN_download.png" /></imageobject>
-            </mediaobject>
-        </figure>
-
+            <para>
+            As well as the installation package of your choice you must also download the 
+            patch for Security Notice CVE-2009-0027.  Installation instructions for this
+            patch are found in <xref linkend="sect-installing_patch" />.
+            </para>
         
-
-        <para>The packages listed above can be explained as follows:</para>
+            <para>
+            After downloading these files you need to validate their authenticity according to the
+            directions in <xref linkend="verify_RHN_downloaded_files_MD5" />.
+            </para>
         
-        <itemizedlist>
-            <listitem>
-                <para>
-                    <filename>enterprise-installer-4.3.0.GA_CP03.jar</filename>: The graphical installer for EAP 4.3.0.CP03.
-                </para>
-            </listitem>
-            <listitem>
-                <para>
-                    <filename>jboss-eap-4.3.0.GA_CP03.zip</filename>: The files that make up the EAP 4.3.0.CP03 install.
-                </para>
-            </listitem>
-            <listitem>
-                <para>
-                    <filename>jboss-eap-docs-4.3.0.GA_CP03.zip</filename>: The documentation for EAP 4.3.0.CP03.
-                </para>
-            </listitem>
-            <listitem>
-                <para>
-                    <filename>jboss-eap-src-4.3.0.GA_CP03.zip</filename>: The source code distribution for EAP 4.3.0.CP03.
-                </para>
-            </listitem>
-            <listitem>
-                <para>
-                    <filename>jbeap-4.3.0.GA_CP03_CVE-2009-0027.zip</filename>: Patch for RHSA-2009:0349-5 
-                </para>
-            </listitem>
-        </itemizedlist>
+        </section>
+        
+        <!-- section:  -->
+        <section id="sect-downloading_RPMS">
+            <title>Red Hat Enterprise Linux AS 4, ES 5, Server 5</title>
+            <para>
+            This channel provides JBoss EAP as an ISO disk image that contains
+            the RPM packages for installation on Red Hat Enterprise Linux Systems.
+            </para>
 
+            <para>
+            After you have selected the appropriate Red Hat Enterprise Linux channel,
+            you are presented with the <guilabel>Download Details</guilabel> page.  
+            Initially the <guimenuitem>Details</guimenuitem> tab will be selected. 
+            Clicking on the tab labeled <guimenuitem>Downloads</guimenuitem> and the 
+            list of the downloads for JBoss EAP will be displayed. 
+            </para>
+
+            <para>
+            Only a single file will be listed here, the the ISO image that contains all 
+            the RPM packages for JBoss EAP.  This ISO image also includes the RPM packages 
+            for the CVE-2009-0027 Security Advisory patch.
+            </para>
+
+            <!-- figure: ISO Image downloads for Red Hat Enterprise Linux -->
+            <figure id="fig-rhel_iso_download">
+                <title>ISO Image downloads for Red Hat Enterprise Linux Server 5</title>
+                <mediaobject>
+                    <imageobject>
+                        <imagedata fileref="images/rhel_iso_download.png"/>
+                    </imageobject>
+                </mediaobject>
+            </figure>
+
+            <para>
+            After downloading these files you need to validate their authenticity according to the
+            directions in <xref linkend="verify_RHN_downloaded_files_MD5" />.
+            </para>
+
+        </section>
+
+    </section>
+    
+    <!-- Verifying the Downloaded Files -->
+    <section id="verify_RHN_downloaded_files_MD5">
+        <title>Verifying the Downloaded Files</title>
+
         <para>
-        The software details page also contains the MD5 checksum values for each package. 
-        These values are used to verify the integrity of your downloaded files.  You can use the 
-        <command>md5sum</command> utility as detailed below to calculate the checksum values of 
-        the files to compare to the supplied values on the website.
-        </para>  
+        The software details page for each download also contains the MD5 checksum values 
+        for that download. These values are used to verify the integrity of your downloaded 
+        files.  You can use the <command>md5sum</command> utility as detailed below to 
+        calculate the checksum values of the files to compare to the supplied values on the 
+        website.  The checksum values are also documented in <xref linkend="table-eap_isos_md5s" /> 
+        for completeness.
+        </para>
 
         <note>
-            <para>The command line examples given are accurate for most Linux and 
+            <para>
+            The command line examples given are accurate for most Linux and 
             Unix operating systems.  Mac OS X includes the equivalent command 
-            <command>md5</command>.</para>  
-
-            <para>If you are using Microsoft Windows you will have to download a 
+            <command>md5</command>.
+            </para>  
+            <para>
+            If you are using Microsoft Windows you will have to download a 
             third party utility to perform these steps as it does not include a 
-            MD5SUM tool.</para>
+            MD5SUM tool.
+            </para>
         </note>
 
         <para>
-        The values that are generated by the MD5SUM tool should be the same as the value on 
-        the Downloads page. If it is not then your download is either incomplete or corrupted. 
-        You will need to download it again. If after several attempts you are unable to 
-        download a copy of the file that produces a valid checksum values you should open a 
-        support case to report the problem. 
+        After you have downloaded the file, run the <command>md5sum</command> utility 
+        and specify the file you downloaded as the first argument as demonstrated here: 
         </para>
 
+        <example>
+            <title>Using the md5sum tool on Linux or Unix</title>
+            <screen>$ md5sum jboss-eap-4.3.0.GA_CP03.zip 
+4ebffbd38fcb7e259d1d9abbd40b058a jboss-eap-4.3.0.GA_CP03.zip</screen></example>
 
-        <section id="verify_RHN_downloaded_files_MD5">
-            <title>Verifying the Downloaded Files</title>
-            <para>After you have downloaded the file, run the <command>md5sum</command> command-line utility and specify 
-                the file you downloaded as the first argument. </para>
+        <para>
+        The values that are generated by the <command>md5sum</command> utility must 
+        be the same as both the values that are displayed on the Downloads page for the 
+        file and those documented in <xref linkend="table-eap_isos_md5s" />. If they 
+        are not the same then then your download is either incomplete or corrupted. You 
+        will need to download it again. If after several attempts you are unable to download 
+        a copy of the file that produces a valid checksum values you should open a support 
+        case to report the problem. 
+        </para>
 
-            <example><title>Using the md5sum tool on Linux or Unix</title>
-            <screen>$ md5sum enterprise-installer-4.3.0.GA_CP03.jar
-7020b8fea3abdfb6c1caeae577dba059 enterprise-installer-4.3.0.GA_CP03.jar 
+        <para>
+        Below is the complete list of the MD5 checksums for all the JBoss EAP
+        packages available for download.
+        </para>
 
-$ md5sum jboss-eap-4.3.0.GA_CP03.zip 
-4ebffbd38fcb7e259d1d9abbd40b058a jboss-eap-4.3.0.GA_CP03.zip 
-
-$ md5sum jboss-eap-docs-4.3.0.GA_CP03.zip 
-b981279cb8e9127d918d62beddda3516 jboss-eap-docs-4.3.0.GA_CP03.zip
-
-$ md5sum jboss-eap-src-4.3.0.GA_CP03.zip
-3f750b0bd3ec997658a7368cb46e912a jboss-eap-src-4.3.0.GA_CP03.zip
-
-$ md5sum jbeap-4.3.0.GA_CP03_CVE-2009-0027.zip 
-45a3abcfd95d40322d92bd5a0e7dd6ee jbeap-4.3.0.GA_CP03_CVE-2009-0027.zip</screen></example>
-		
+        <!-- table: jboss eap MD5 values -->
+        <table id="table-eap_isos_md5s">
+            <title>JBoss EAP MD5 checksum values</title>
+            <tgroup align="left" cols="2" colsep="1" rowsep="1">
+                <colspec colname="c1" colwidth="3*"/>
+                <colspec colname="c2" colwidth="2*"/>
+                <thead>
+                    <row><entry>File</entry><entry>MD5 Checksum</entry></row>
+                </thead>
+                <tbody>
+                    <row><entry>JBEAP4.3.0-re20090408.0-i386-disc1-ftp.iso</entry><entry>5561e56f493049b6cd147cdf481d6b57</entry></row>
+                    <row><entry>JBEAP4.3.0-re20090408.0-x86_64-disc1-ftp.iso</entry><entry>07ef18ab2b14858be0efd9a7e1af1e5d</entry></row>
+                    <row><entry>RHEL5.2-JBEAP-4.3.0-20090408.0-i386-disc1-ftp.iso</entry><entry>c9b80dacc96a5c31c9de2352cbe87011</entry></row>
+                    <row><entry>RHEL5.2-JBEAP-4.3.0-20090408.0-x86_64-disc1-ftp.iso</entry><entry>077f2fd28ce3a05c769e2963f29c97cf</entry></row>
+                    <row><entry>enterprise-installer-4.3.0.GA_CP03.jar</entry><entry>7020b8fea3abdfb6c1caeae577dba059</entry></row>
+                    <row><entry>jboss-eap-4.3.0.GA_CP03.zip</entry><entry>4ebffbd38fcb7e259d1d9abbd40b058a</entry></row>
+                    <row><entry>jboss-eap-docs-4.3.0.GA_CP03.zip</entry><entry>b981279cb8e9127d918d62beddda3516</entry></row>
+                    <row><entry>jboss-eap-src-4.3.0.GA_CP03.zip</entry><entry>3f750b0bd3ec997658a7368cb46e912a</entry></row>
+                    <row><entry>jbeap-4.3.0.GA_CP03_CVE-2009-0027.zip</entry><entry>45a3abcfd95d40322d92bd5a0e7dd6ee</entry></row>
+                </tbody>
+            </tgroup>
+        </table>
+        
+        
         </section>
-    </section>
-
+    
+    <!-- section: Installing the RHSA-2009:0349-5 patch -->
     <section id="sect-installing_patch">
-        <title>Installing the RHSA-2009:0349-5 patch</title>
+        <title>Installing the Security Notice CVE-2009-0027 patch</title>
         <para>
-        After you have installed JBoss EAP you must also install a security patch.  
-        This patch resolves an issue where a remote attacker could read arbitrary XML 
-        files with the permissions of the EAP process.  You can refer to 
+        After you have installed JBoss EAP you must also install the Security Notice 
+        CVE-2009-0027 patch.  This patch resolves an issue where a remote attacker could 
+        read arbitrary XML files with the permissions of the EAP process.  You can refer to 
         <ulink url="http://rhn.redhat.com/errata/RHSA-2009-0349.html">http://rhn.redhat.com/errata/RHSA-2009-0349.html</ulink>
         for additional information regarding this exploit. 
         </para>
         
         <para>
         The exact files you will need to download will vary according to whether you have
-        installed the RPM version of JBoss EAP or the zip version.  The files for the RPM
-        install are included in the ISO image, while the files for the zip package install
-        must be downloaded separately as described in 
+        installed the RPM version of JBoss EAP or the zip version.
+        </para>
+        
+        <para>
+        The files for the RPM install are included in the ISO image.
+        </para>
+        
+        <para>
+        The files for the zip package install must be downloaded separately as described in 
         <xref linkend="verify_downloaded_files_Customer_Support_Site" />.
         </para>
         
@@ -394,29 +428,25 @@
                 </thead>
                 <tbody>
                     <row>
-                        <entry>jbossws-2.0.1-3.SP2_CP04.3.ep1.el4.noarch.rpm</entry>
-                        <entry>92d3c1460cb63159b3ce52c55ba9d2ab</entry>
+                        <entry>jbossws-2.0.1-3.SP2_CP04.4.1.ep1.el5.noarch.rpm</entry>
+                        <entry>2b94cc1b052280f2a8cf5856c64972c5</entry>
                     </row>
                     <row>
-                        <entry>jbossws-2.0.1-3.SP2_CP04.3.1.ep1.el5.noarch.rpm</entry>
-                        <entry>9ac95504f40a1b110e645d95ec8b0a3c</entry>
+                        <entry>jbossws-2.0.1-3.SP2_CP04.4.1.ep1.el5.src.rpm</entry>
+                        <entry>ccb6c9bd951b3d4df4a4004973533980</entry>
                     </row>
                     <row>
-                        <entry>jbossws-2.0.1-3.SP2_CP04.3.1.ep1.el5.src.rpm</entry>
-                        <entry>cb111927f7ceffa683a9c6f0678f6a86</entry>
+                        <entry>jbossws-2.0.1-3.SP2_CP04.4.ep1.el4.noarch.rpm</entry>
+                        <entry>bf61c04a503d914186d0bd68f47dea9b</entry>
                     </row>
                     <row>
-                        <entry>jbossws-2.0.1-3.SP2_CP04.3.ep1.el4.src.rpm</entry>
-                        <entry>e457ef94b4a14e89e22884fe9d0221c0</entry>
+                        <entry>jbossws-2.0.1-3.SP2_CP04.4.ep1.el4.src.rpm</entry>
+                        <entry>31a4fd98ce9eb02a3b98d7fa7306e8ba</entry>
                     </row>
                     <row>
-                        <entry>jbossws-core.jar</entry>
-                        <entry>961e3d84b1d4d92d258c191cd25df540</entry>
+                        <entry>jbeap-4.3.0.GA_CP03_CVE-2009-0027.zip</entry> 
+                        <entry>45a3abcfd95d40322d92bd5a0e7dd6ee</entry>
                     </row>
-                    <row>
-                        <entry>jbossws-client.jar</entry>
-                        <entry>4b50cc131a9e238c25888c32d1e5bc41</entry>
-                    </row>
                 </tbody>
             </tgroup>
         </table>
@@ -528,7 +558,7 @@
             <listitem>
                 <para>Using the Web Console</para>
                 <para>
-                When the JBoss EAP server is running you can can retreive its version information from 
+                When the JBoss EAP server is running you can can retrieve its version information from 
                 the first page of the Web Console as well.  This is located at 
                 <ulink url="http://localhost:8080/web-console/">http://localhost:8080/web-console/</ulink>.
                 </para>

Modified: projects/docs/enterprise/4.3.3/Common_Criteria_Guide/en-US/images/CSP-Patch-Info.png
===================================================================
(Binary files differ)

Modified: projects/docs/enterprise/4.3.3/Common_Criteria_Guide/en-US/images/RHN_download.png
===================================================================
(Binary files differ)

Modified: projects/docs/enterprise/4.3.3/Common_Criteria_Guide/en-US/images/RHN_select_version.png
===================================================================
(Binary files differ)

Modified: projects/docs/enterprise/4.3.3/Common_Criteria_Guide/en-US/images/lookup_MD5_value.png
===================================================================
(Binary files differ)

Modified: projects/docs/enterprise/4.3.3/Common_Criteria_Guide/en-US/images/rhn_certificate.png
===================================================================
(Binary files differ)

Modified: projects/docs/enterprise/4.3.3/Common_Criteria_Guide/en-US/images/software_downloads.png
===================================================================
(Binary files differ)




More information about the jboss-cvs-commits mailing list