SEARCH
NEW RPMS
DIRECTORIES
ABOUT
FAQ
VARIOUS
BLOG

 
 
Changelog for postfix-debuginfo-2.9.6-179.1.i586.rpm :
Tue Jul 30 14:00:00 2013 schwabAATTsuse.de
- postfix-main.cf.patch: remove duplicate entry for inet_protocols

Mon Jun 17 14:00:00 2013 chrisAATTcomputersalat.de
- fix for warning

* unused parameter: virtual_create_maildirsize=yes

* unused parameter: virtual_mailbox_extended=yes

* rework main.cf.patch
- fix rcpostfix for sysvinit systems

* /etc/postfix/system/update_postmaps: No such file or directory
- rebase patches

* vda-v11-2.9.5 -> vda-v11-2.9.6
- fix file postfix-SuSE.tar.gz

* made a tar.gz

Sun Jun 16 14:00:00 2013 jengelhAATTinai.de
- postfix.spec forces the use of SSL and SASL libraries,
so make sure the BuildRequires are there

Fri Jun 14 14:00:00 2013 jengelhAATTinai.de
- Add postfix-db6.diff to fix compile abort with libdb-6.0

Mon Apr 22 14:00:00 2013 idonmezAATTsuse.com
- Add Source URL, see https://en.opensuse.org/SourceUrls
- Add GPG verification

Sat Apr 20 14:00:00 2013 crrodriguezAATTopensuse.org
- postfix-SuSE/postfix.service do not Require or
order after syslog.target as it no longer exists
postfix will fail to start in the next systemd version.

Sat Feb 23 13:00:00 2013 rmilasanAATTsuse.com
- Install postfix.service accordingly (/usr/lib/systemd for 12.3
and up or /lib/systemd for older versions).

Wed Feb 6 13:00:00 2013 varkolyAATTsuse.com
- update to 2,9.6
Bugfix: the local(8) delivery agent dereferenced a null pointer
while delivering to null command (for example, \"|\" in a .forward file).
Bugfix: memory leak in program initialization. tls/tls_misc.c.
Bugfix: he undocumented OpenSSL X509_pubkey_digest() function is
unsuitable for computing certificate PUBLIC KEY fingerprints.
Postfix now provides a correct procedure that accounts for
the algorithm and parameters in addition to the key data. Specify
\"tls_legacy_public_key_fingerprints = yes\" if you need backwards compatibility.

Thu Jan 17 13:00:00 2013 varkolyAATTsuse.com
- bnc#796162 - script to assign path elements not working in postfix install Build-0284(iso)

Thu Jan 10 13:00:00 2013 chrisAATTcomputersalat.de
- rebase patches

* vda-v10-2.8.12 -> vda-v11-2.9.5 (and to be a p0)

* main, master, post-instal, ssl-release-buffers (remove version)

* dynamic_maps, dynamic_maps_pie, pointer_to_literals

Thu Jan 10 13:00:00 2013 varkolyAATTsuse.com
- update to 2,9.5

* tls support:
Support to turn off the TLSv1.1 and TLSv1.2 protocols:
To temporarily turn off problematic protocols globally:
/etc/postfix/main.cf:
smtp_tls_protocols = !SSLv2, !TLSv1.1, !TLSv1.2
smtp_tls_mandatory_protocols = !SSLv2, !TLSv1.1, !TLSv1.2
However, it may be better to temporarily turn off problematic
protocols for broken sites only:
/etc/postfix/main.cf:
smtp_tls_policy_maps = hash:/etc/postfix/tls_policy
/etc/postfix/tls_policy:
example.com may protocols=!SSLv2:!TLSv1.1:!TLSv1.2

* 20111012 To simplify integration with third-party
applications, the Postfix sendmail command now always transforms
all input lines ending in into UNIX format (lines ending
in ). Specify \"sendmail_fix_line_endings = strict\" to restore
historical Postfix behavior (i.e. convert all input lines ending
in only if the first line ends in ).

* 20120114 Logfile-based alerting systems may need to be
updated to look for \"error\" messages in addition to \"fatal\" messages.
Specify \"daemon_table_open_error_is_fatal = yes\" to get the historical
behavior (immediate termination with \"fatal\" message).

* enable_long_queue_ids Postfix 2.9 introduces support for non-repeating queue IDs (also
used as queue file names). These names are encoded in a mix of upper
case, lower case and decimal digit characters. Long queue IDs are
disabled by default to avoid breaking tools that parse logfiles and
that expect queue IDs with the smaller [A-F0-9] character set.

* 20111209 memcache lookup and update support. This provides
a way to share postscreen(8) or verify(8) caches between Postfix
instances. See MEMCACHE_README and memcache_table(5) for details
and limitations.

* 20111218 To support external SASL authentication, e.g.,
in an NGINX proxy daemon, the Postfix SMTP server now always checks
the smtpd_sender_login_maps table, even without having
\"smtpd_sasl_auth_enable = yes\" in main.cf.

* ipv6
o The default inet_protocols value is now \"all\" instead of \"ipv4\",
meaning use both IPv4 and IPv6.
o The default smtp_address_preference value is now \"any\" instead
of \"ipv6\", meaning choose randomly between IPv6 and IPv4. With
this the Postfix SMTP client will have more success delivering
mail to sites that have problematic IPv6 configurations.

Sat Dec 15 13:00:00 2012 chrisAATTcomputersalat.de
- update to 2.8.13

* 20121029
Workaround: strip datalink suffix from IPv6 addresses
returned by the system getaddrinfo() routine. Such suffixes
mess up the default mynetworks value, host name/address
verification and possibly more. This change obsoletes the
20101108 change that removes datalink suffixes in the SMTP
and QMQP servers, but we leave that code alone. File:
util/myaddrinfo.c.

* 20121013
Cleanup: to compute the LDAP connection cache lookup key,
join the numeric fields with null, just like string fields.
Viktor Dukhovni. File: global/dict_ldap.c.

* 20121010
Bugfix (introduced: Postfix 2.5): memory leak in program
initialization. Reported by Coverity. File: tls/tls_misc.c.
Bugfix (introduced: Postfix 2.3): memory leak in the unused
oqmgr program. Reported by Coverity. File: oqmgr/qmgr_message.c.

* 20121003
Bugfix: the postscreen_access_list feature was case-sensitive
in the first character of permit, reject, etc. Reported by
Feancis Picabia. File: global/server_acl.c.
- rebase dynamic_maps_pie patch
- rpmlint

* invalid-suse-version-check 1140

* obsolete-suse-version-check 920 (changes file)

Fri Dec 14 13:00:00 2012 varkolyAATTsuse.com
- bnc#790141 - Command SuSEconfig.postfix reports ERROR -
\"can not find /lib/YaST/SuSEconfig.functions!!\"

Thu Nov 8 13:00:00 2012 varkolyAATTsuse.com
- bnc#782048 - postfix uses /sbin/conf.d
- bnc#784659 - remove SuSEconfig calls from yast2-mail

Fri Aug 10 14:00:00 2012 chrisAATTcomputersalat.de
- update to 2.8.12

* 20120730
Bugfix (introduced: 20000314): AUTH is not allowed after
MAIL. Timo Sirainen. File: smtpd/smtpd_sasl_proto.c.

* 20120702
Bugfix (introduced: 19990127): the BIFF client leaked an
unprivileged UDP socket. Fix by Jaroslav Skarvada. File:
local/biff_notify.c.

* 20120621
Bugfix (introduced: Postfix 2.8): the unused \"pass\" trigger
client could close the wrong file descriptors. File:
util/unix_pass_trigger.c.
- fix for bnc#771303

* add \'version = 3\' to ldap_aliases.cf
- rebase patches

* main, master, post-install: 2.8.3 -> 2.8.12

* ssl-release-buffers: 2.8.5 -> 2.8.12

* vda-v10: 2.8.9 -> 2.8.12

* dynamic_maps, dynamic_maps_pie, ipv6_disabled, pointer_to_literals
- fix changes file

Thu Jul 19 14:00:00 2012 varkolyAATTsuse.com
- bnc#771811 - postfix update does not regenerate the maps

Mon Jun 11 14:00:00 2012 varkolyAATTsuse.com
- update to 2.8.11

* 20120520
- Bugfix (introduced Postfix 2.4): the event_drain() function
was comparing bitmasks incorrectly causing the program to
always wait for the full time limit. This error affected
the unused postkick command, but only after s/fifo/unix/
in master.cf. File: util/events.c.
- Cleanup: laptop users have always been able to avoid
unnecessary disk spin-up by doing s/fifo/unix/ in master.cf
(this is currently not supported on Solaris systems).
However, to make this work reliably, the \"postqueue -f\"
command must wait until its requests have reached the pickup
and qmgr servers before closing the UNIX-domain request
sockets. Files: postqueue/postqueue.c, postqueue/Makefile.in.

Wed May 9 14:00:00 2012 varkolyAATTsuse.com
- bnc#753910 - {name} instead of %{name} in postfix .spec
- bnc#756452 - VUL-1: postfix: VRFY allows enumerating users

Thu May 3 14:00:00 2012 chrisAATTcomputersalat.de
- update to 2.8.10

* 20120401
Bitrot: shut up useless warnings about Cyrus SASL call-back
function pointer type mis-matches. Files: xsasl/xsasl_cyrus.h,
xsasl/xsasl_cyrus_server.c, xsasl/xsasl_client.c.

* 20120422
Bit-rot: OpenSSL 1.0.1 introduces new protocols. Update the
known TLS protocol list so that protocols can be turned off
selectively to work around implementation bugs. Based on
a patch by Victor Duchovni. Files: proto/TLS_README.html,
proto/postconf.proto, tls/tls.h, tls/tls_misc.c, tls/tls_client.c,
tls/tls_server.c.
- update to 2.8.9

* 20120217
Cleanup: missing #include statement for bugfix code added
20111226. File: local/unknown.c.

* 20120214
Bugfix (introduced: Postfix 2.4): extraneous null assignment
caused core dump when postlog emitted the \"usage\" message.
Reported by Kant (fnord.hammer). File: postlog/postlog.c.

* 20120202
Bugfix (introduced: Postfix 2.3): the \"change header\" milter
request could replace the wrong header. A long header name
could match a shorter one, because a length check was done
on the wrong string. Reported by Vladimir Vassiliev. File:
cleanup/cleanup_milter.c.
- use latest VDA patch (2.8.9)

Thu Apr 12 14:00:00 2012 varkolyAATTsuse.com
- bnc#756450 - postfix: remove version from banner

Mon Apr 9 14:00:00 2012 brunoAATTioda-net.ch
- add port 587 smtp-auth submission to postfix-fw bnc#756289

Mon Apr 2 14:00:00 2012 dmuellerAATTsuse.de
- set exit code explicitely in cond_slp, systemd checks for it

Tue Mar 13 13:00:00 2012 varkolyAATTsuse.com
- Documentation for bnc#751994 - SuSEconfig module postfix does not exist

Wed Mar 7 13:00:00 2012 varkolyAATTsuse.com
- rcpostfix now updates the aliases too

Mon Feb 27 13:00:00 2012 chrisAATTcomputersalat.de
- update to 2.8.8
Bugfixes:
tlsproxy(8) stored TLS sessions with a serverID of
\"tlsproxy\" instead of \"smtpd\", wasting an opportunity for
session reuse. File: tlsproxy/tlsproxy.c.
missing lookup table entry and terminator, causing
proxymap server segfault when postscreen(8) or verify(8)
attempted to access their cache via the proxymap server.
This could never have worked anyway, because the Postfix
2.8 proxymap protocol does not support cache cleanup. File
util/dict.c.
the Postfix client sqlite
quoting routine returned the unquoted result instead of the
quoted text. The opportunities for misuse are limited,
because Postfix sqlite files are usually owned by root, and
Postfix daemons usually run with non-root privileges so
they can\'t corrupt the database. Problem reported by Rob
McGee (rob0). File: global/dict_sqlite.c.
the trace service did not
distinguish between notifications for a non-bounce or a
bounce message. This code pre-dates DSN support and should
have been updated when it was re-purposed to handle DSN
SUCCESS notifications. Problem reported by Sabahattin
Gucukoglu. File: bounce/bounce_trace_service.c.
- use latest VDA patch (2.8.5)

Wed Jan 25 13:00:00 2012 varkolyAATTsuse.com
- bnc#743369 - yast2 mail module does not open the firewall
- Set MD5DIR in SuSEconfig.postfix to avoid warnings

Tue Jan 17 13:00:00 2012 varkolyAATTsuse.com
- bnc738693 - upgrade from 11.4 enables mysql service for systemd

Thu Jan 12 13:00:00 2012 varkolyAATTsuse.com
- Add postmap rebuild script to systemv init script too

Wed Jan 11 13:00:00 2012 varkolyAATTsuse.com
- bnc#738900 - cyrus-imapd not receiving mail from postfix

Tue Dec 13 13:00:00 2011 varkolyAATTsuse.com
- Move the post map rebuild script into the start script

Tue Dec 6 13:00:00 2011 varkolyAATTsuse.com
- Fix the last change in %post

Fri Dec 2 13:00:00 2011 varkolyAATTsuse.com
- bnc#728308 - warning output after update the postfix package

Wed Nov 9 13:00:00 2011 varkolyAATTsuse.com
- update to 2.8.7
Bugfixes:
smtpd(8) did not sanitize newline characters in cleanup(8)
REJECT messages, causing them to be sent out via SMTP as bare newline characters.
smtpd(8) sent multi-line responses from a before-queue content filter as text with
bare instead of .
Workaround: postscreen sent non-compliant SMTP responses (220- followed by 421)
when it could not give a connection to a real smtpd process, causing some
remote SMTP clients to bounce mail.

Thu Nov 3 13:00:00 2011 varkolyAATTsuse.com
- Use the systemd macros in the spec file

Fri Oct 14 14:00:00 2011 mhruseckyAATTsuse.cz
- only fix files that exists in %post

Sun Oct 9 14:00:00 2011 crrodriguezAATTopensuse.org
- Use SSL_MODE_RELEASE_BUFFERS if available, see
SSL_CTX_set_mode man page and
http://www.imperialviolet.org/2010/06/25/overclocking-ssl.html
for the full details.

Tue Sep 6 14:00:00 2011 chrisAATTcomputersalat.de
- update to 2.8.5

* Bugfix: allow for Milters that send an SMTP server reply
without RFC 3463 enhanced status code. Reported by Vladimir
Vassiliev. File: milter/milter8.c.

Mon Aug 22 14:00:00 2011 varkolyAATTnovell.com
- bnc#684304 - server:mail/postfix: Bugs in SuSEconfig chroot setup script
- Aplly SASL_SOCKET_DIR patch

Thu Aug 18 14:00:00 2011 varkolyAATTnovell.com
- Move SuSEconfig.postfix into /usr/sbin/
(FATE#311272: Do not rewrite postfix.cf via SuSEconfig)
SuSEconfig.postfix will be executed only once after installation
automaticaly. Afterwards only you can start it manually or via
yast2 mail module.

Fri Aug 12 14:00:00 2011 wernerAATTsuse.de
- Just the first strep forward to systemd, please test out
/etc/postfix/system/update_chroot
/etc/postfix/system/wait_qmgr
/etc/postfix/system/cond_slp
and
/lib/systemd/system/postfix.service
and also fill out the missing description.

Tue Aug 9 14:00:00 2011 chrisAATTcomputersalat.de
- rework SuSE patch

* add missing SASL stuff in rc.postfix

Mon Jul 25 14:00:00 2011 chrisAATTcomputersalat.de
- when chrooted and using SASL
o mount -o bind SASL_SOCKET_DIR into postfix CHROOT

Mon Jul 11 14:00:00 2011 chrisAATTcomputersalat.de
- update to 2.8.4
o Linux kernel version 3 support.
for more info see ChangeLog

Wed Jul 6 14:00:00 2011 varkolyAATTnovell.com
- bnc#686436 - postfix bounces messages with improper use of 8-bit data in message body
- Apply patch

Fri Jul 1 14:00:00 2011 chrisAATTcomputersalat.de
- rework master.cf patch
o fix receive_override_options line
- rework SuSE patch
o sysconfig: remove POSTFIX_WITH_POP_BEFORE_SMTP
o SuSEconfig: fix receive_override_options line

Thu Jun 30 14:00:00 2011 chrisAATTcomputersalat.de
- replace vda patch
o 2.8.1 -> 2.8.3
- fix files doc
o remove \'doc auxiliary\'
instead cp to pf_docdir

Sat May 28 14:00:00 2011 varkolyAATTnovell.com
- fix spec for building on all repos

Tue May 24 14:00:00 2011 varkolyAATTnovell.com
- bnc#679187 - suseconfig/postfix: missing dependency

Tue May 17 14:00:00 2011 chrisAATTcomputersalat.de
- fix master.cf
o fix missing
- amavis unix - - n - 4 smtp
- localhost:10025 inet n - n - - smtpd
o add master.cf patch
- rework patches
o main.cf (add two missing sasl vars)
o postfix-SuSE (SuSEconfig, cleanup those vars,...)

Sun May 15 14:00:00 2011 chrisAATTcomputersalat.de
- rework TLS stuff
o reworked main.cf patch
o added postfix-SuSE patch
o added post-install patch
Editing /etc/postfix/master.cf, adding missing entry for tlsmgr service
add only if it really does not exist
- removed Author from description
- updated vda patch
o vda-2.7.1 > vda-v10-2.8.1
- fix build for SLE_10
o no fdupes ;)

Wed May 11 14:00:00 2011 varkolyAATTnovell.com
- remove document paths from postfix-files to avoid error messages
when postfix-doc is not installed

Tue May 10 14:00:00 2011 varkolyAATTnovell.com
- update to 2.8.3 - VUL-0: postfix memory corruption

Sun Apr 10 14:00:00 2011 varkolyAATTnovell.com
- bnc#641271 - postfix-2.7.1: init script cannot properly stop
multi-instance configurations

Wed Mar 30 14:00:00 2011 varkolyAATTnovell.com
- update to 2.8.2

* DNSBL/DNSWL:
o Support for address patterns in DNS blacklist and whitelist lookup results.
o The Postfix SMTP server now supports DNS-based whitelisting with several safety features

* Support for read-only sqlite database access.

* Alias expansion:
o Postfix now reports a temporary delivery error when the result
of virtual alias expansion would exceed the virtual_alias_recursion_limit
or virtual_alias_expansion_limit.
o To avoid repeated delivery to mailing lists with pathological
nested alias configurations, the local(8) delivery agent now keeps
the owner-alias attribute of a parent alias, when delivering mail
to a child alias that does not have its own owner alias.

* The Postfix SMTP client no longer appends the local domain when
looking up a DNS name without \".\".

* The SMTP server now supports contact information that is appended
to \"reject\" responses: smtpd_reject_footer

* Postfix by default no longer adds a \"To: undisclosed-recipients:;\"
header when no recipient specified in the message header.

* tls support:
o The Postfix SMTP server now always re-computes the SASL mechanism
list after successful completion of the STARTTLS command.
o The smtpd_starttls_timeout default value is now stress-dependent.
o Postfix no longer appends the system-supplied default CA certificates
to the lists specified with
*_tls_CAfile or with
*_tls_CApath.

* New feature: Prototype postscreen(8) server that runs a number
of time-consuming checks in parallel for all incoming SMTP connections,
before clients are allowed to talk to a real Postfix SMTP server.
It detects clients that start talking too soon, or clients that appear
on DNS blocklists, or clients that hang up without sending any command.

Thu Feb 10 13:00:00 2011 varkolyAATTnovell.com
- bnc#667299 - Postfix LICENSE not marked as documentation

Mon Jan 17 13:00:00 2011 chrisAATTcomputersalat.de
- add some min LDAP support for virtual LDAP-users
o sysconfig \"WITH_LDAP\"
o add ldap_aliases.cf
o SuSEconfig.postfix
virtual_alias_maps = ... ldap:/etc/postfix/ldap_aliases.cf

Tue Jan 4 13:00:00 2011 chrisAATTcomputersalat.de
- update to 2.7.2

* Bugfix (introduced Postfix 2.2): Postfix no longer appends
the system default CA certificates to the lists specified
with
*_tls_CAfile or with
*_tls_CApath. This prevents
third-party certificates from getting mail relay permission
with the permit_tls_all_clientcerts feature. Unfortunately
this may cause compatibility problems with configurations
that rely on certificate verification for other purposes.
To get the old behavior, specify \"tls_append_default_CA =
yes\". Files: tls/tls_certkey.c, tls/tls_misc.c,
global/mail_params.h. proto/postconf.proto, mantools/postlink.

* Compatibility with Postfix < 2.3: fix 20061207 was incomplete
(undoing the change to bounce instead of defer after
pipe-to-command delivery fails with a signal). Fix by Thomas
Arnett. File: global/pipe_command.c.

* Bugfix: the milter_header_checks parser provided only the
actions that change the message flow (reject, filter,
discard, redirect) but disabled the non-flow actions (warn,
replace, prepend, ignore, dunno, ok). File:
cleanup/cleanup_milter.c.

* Performance: fix for poor smtpd_proxy_filter TCP performance
over loopback (127.0.0.1) connections. Problem reported by
Mark Martinec. Files: smtpd/smtpd_proxy.c.

* Cleanup: don\'t apply reject_rhsbl_helo to non-domain forms
such as network addresses. This would cause false positives
with dbl.spamhaus.org. File: smtpd/smtpd_check.c.

* Bugfix: the \"421\" reply after Milter error was overruled
by Postfix 1.1 code that replied with \"503\" for RFC 2821
compliance. We now make an exception for \"final\" replies,
as permitted by RFC. Solution by Victor Duchovni. File:
smtpd/smtpd.c.

Sat Dec 11 13:00:00 2010 chrisAATTcomputersalat.de
- update vda patch
o remove 2.6.1-vda-ng.patch
o remove 2.6.1-vda-ng-64bit.patch
o add vda-2.7.1.patch
- rework main.cf.patch
o remove 2.2.9-main.cf.patch
o add 2.7.1-main.cf.patch

Tue Dec 7 13:00:00 2010 cooloAATTnovell.com
- prereq init scripts network and syslog

Thu Aug 12 14:00:00 2010 varkolyAATTnovell.com
- Remove obsolate postscripts
- bnc#625657 - SuSEconfig.postfix and smtp_use_tls
- bnc#622873 - postfix doesn\'t start if ipv6 is disabled

Tue Jul 6 14:00:00 2010 chrisAATTcomputersalat.de
- reworked bnc#606251 stuff (not checked in to Factory)
o used my_print_defaults command for parsing of /etc/my.cnf
o using quotation marks: \"$PF_CHROOT\"
o added sysconfig option POSTFIX_MYSQL_CONN=(socket,tcp)

Wed Jun 16 14:00:00 2010 chrisAATTcomputersalat.de
- bnc#606251 - postfix chrooted mysql.sock lost on mysql restart
o Now MYSQL_SOCK_DIR is mounted with \'-o bind\' to postfix CHROOT

Thu Jun 10 14:00:00 2010 varkolyAATTnovell.com
- update to 2.7.1

* Bugfix (introduced Postfix 2.6) in the XFORWARD implementation,
which sends remote SMTP client attributes through SMTP-based content filters.
The Postfix SMTP client did not skip \"unknown\" SMTP client attributes,
causing a syntax error when sending an \"unknown\" client PORT attribute.

* Robustness: skip LDAP queries with non-ASCII search strings, instead of failing with a database lookup error.

* Safety: Postfix processes now log a warning when a matchlist has
a #comment at the end of a line (for example mynetworks or relay_domains).

* Portability: OpenSSL 1.0.0 changes the priority of anonymous cyphers.

* Portability: Berkeley DB 5.x is now supported.

Thu May 20 14:00:00 2010 chrisAATTcomputersalat.de
- fix obviously lost POSTFIX_MYHOSTNAME in SuSEconfig.postfix

Wed Apr 7 14:00:00 2010 varkolyAATTnovell.com
- New file check_mail_queue. This script checks if there are some
mails in the queue and starts postfix if necessary. After delivering
the mails postfix will be stoped.

Thu Apr 1 14:00:00 2010 varkolyAATTnovell.com
- bnc#559145 - Changed Domain name not reflected when sending mail
First /var/run/dhcp-hostname will be evaluated
- Now POSTFIX_SMTP_TLS_CLIENT is ternary : no yes must

Sun Feb 28 13:00:00 2010 varkolyAATTnovell.com
- update to 2.7.0

* performance
- Periodic cache cleanup for the verify(8) cache database.
- Improved before-queue filter performance.

* sender reputation
- The FILTER action in access maps or header/body_checks now supports sender
reputation schemes that dynamically choose the SMTP source IP address.

* address verification
- The verify(8) service now uses a persistent cache by default.

* content filter
- The meaning of an empty filter next-hop destination has changed.
- The FILTER action in access maps or header/body_checks now supports sender
reputation schemes that dynamically choose the SMTP source IP address.

* milter
- Support for header checks on Milter-generated message headers.
Please read /usr/share/doc/packages/postfix/RELEASE_NOTES for details.

Thu Feb 11 13:00:00 2010 cooloAATTnovell.com
- revert the change to PreReq openldap-devel, this increases the
default installation several MBs

Tue Feb 2 13:00:00 2010 varkolyAATTnovell.com
- bnc#567569 - Postfix: move ldap support to a separate package
- bnc#557239 - postfix delivers mail to user\'s home instead of /var/spool/mail

Tue Jan 5 13:00:00 2010 chrisAATTcomputersalat.de
- rpmlint fixes
o init-script-undefined-dependency $network-remotefs
- fix for SuSEconfig.postfix
o if use_amavis eq \"yes\"
then content_filter \"amavis:[127.0.0.1]:10024]\" is defined,
so removed \"-o content_filter=smtp:[127.0.0.1]:10024\" for smtp
- s#ldconfig#/sbin/ldconfig#

Tue Dec 22 13:00:00 2009 freespacerAATTgmx.de
- Add support for dovecot as MDA to SuSEconfig.

Wed Dec 16 13:00:00 2009 jengelhAATTmedozas.de
- Package documentation as noarch

Thu Dec 10 13:00:00 2009 varkolyAATTsuse.de
- Remove postfixs update script. This does not work now.

Tue Dec 8 13:00:00 2009 varkolyAATTsuse.de
- Fix the %post section add missed %{fillup_only -an mail}

Mon Nov 16 13:00:00 2009 varkolyAATTsuse.de
- bnc#555814 – VUL-0: SMTPD_LISTEN_REMOTE=\"yes\" by default
- bnc#555732 - Invalid $(hostname -i) usage SuSEconfig.postfix
- bnc#547928 – Postfix does not start during boot process
- Avoid append relay multiple times in POSTFIX_MAP_LIST

Mon Oct 26 13:00:00 2009 varkolyAATTsuse.de
- bnc#549612 – SuSEconfig.postfix

Mon Sep 28 14:00:00 2009 varkolyAATTsuse.de
- bnc#540538 – postfix-2.6.1-10.1 installs new files in /etc/postfix and does not generate .db
- bnc#519438 - Postfix: Running chrooted lets qmgr loosing his syslog-socket
- remove obsolate version tests from SuSEconfig.postfix

Mon Sep 28 14:00:00 2009 varkolyAATTsuse.de
- bnc#525825 - when using cyrus in a chroot environment Suseconfig does not
create socket /var/lib/imap/socket/lmtp

Mon Sep 14 14:00:00 2009 chrisAATTcomputersalat.de
- spec
o fdupes if >= 1100

Thu Sep 10 14:00:00 2009 chrisAATTcomputersalat.de
- update to 2.6.1
o merge home:varkoly:Factory and o:F
- spec mods
o use of getent
- rpmlint
o remove unneeded dists from examples/chroot-setup/
o postin-without-ldconfig
o files-duplicate /usr/share/doc/packages/postfix-doc/html/
o files-duplicate /usr/share/man/man?

Mon Apr 13 14:00:00 2009 chrisAATTcomputersalat.de
- added VDA patch
o Mailbox / Maildir size limit, known also as \"soft quota\",
to avoid user take all you disk space
o Customizable \"limit\" message when the soft quota limit is reached.
NOTE: message is sent to senders, but NOT to the owner of the mailbox.
o Limit only \'INBOX\', because some people use IMAP and don\'t want
the same limit in IMAP folder that are differents from INBOX.
o Support for \'Courier\' style Maildir, usefull for people that
use courier as pop3/imap server and to get fast soft quota summary.
Note that it is also compatible with qmail maildir per default.
o Supports for Courier \'maildirsize\' file in Maildir folder that
is used to read quotas quickly. Note that this option is not
actived per default and can be dangerous on some NFS client
implementation
(like for example Solaris that cache some filesystem operations).
o Customisable suffix for Maildir support, when share same external
dict between postfix and pop3/imap server sometime \"Maildir/\" suffix
is needed to avoid extra database handling (eg LDAP, MySQL...).
- some improvements of SuSEconfig.postfix
o POSTFIX_LISTEN: Comma separated list of IP\'s
o POSTFIX_INET_PROTO: ipv4, ipv6, all
o POSTFIX_MYHOSTNAME: define SMTPs FQHOSTNAME
o POSTFIX_WITH_MYSQL: when using MySQL as backend
o POSTFIX_BASIC_SPAM_PREVENTION: \"custom\"
you can now define your own rules
- POSTFIX_SMTPD_CLIENT_RESTRICTIONS
- POSTFIX_SMTPD_HELO_RESTRICTIONS
- POSTFIX_SMTPD_SENDER_RESTRICTIONS
- POSTFIX_SMTPD_RECIPIENT_RESTRICTIONS
- added helo_access for helo checks
- added relay for relaying domain
- added MySQL stuff when using MySQL as backend (virtuser)
o you should consider postfixAdmin as mgmnt interface
o when runninng postfix chrooted:
you have to run SUSEconfig each time when you have restarted MySQL
because of linking mysql.sock

Sun Mar 29 14:00:00 2009 varkolyAATTsuse.de
- bnc#439287 - not all POSTFIX_ADD_
* values are properly handled
by SuSEconfig.postfix
- bnc#483208 - Postfix configuration trashed after update
- bnc#488268 - SuSEconfig.postfix chroot setup misses /etc/ssl/certs

Mon Jan 12 13:00:00 2009 varkolyAATTsuse.de
- bnc#465165 - postfix src package

Fri Jan 9 13:00:00 2009 varkolyAATTsuse.de
- bnc#464869 - SuSEconfig.postfix causes DNS lookup
- bnc#460442 - amavisd-new and Postfix need fqdn-hostname in \"uname -n\"

Mon Jan 5 13:00:00 2009 varkolyAATTsuse.de
- update to 2.5.6
- The SMTP server did not ask for a client certificate
with \"smtpd_tls_req_ccert = yes\". Reported by Rob Foehl.
- Avoid reduced TCP performance when reusing an SMTP connection
with a larger than 4096-byte TCP MSS value. In practice, this
could happen only with loopback (localhost) connections.

Sun Nov 16 13:00:00 2008 varkolyAATTsuse.de
- (bnc#442456) - chrooted postfix and saslauthd

Tue Nov 4 13:00:00 2008 roAATTsuse.de
- fix build

Tue Nov 4 13:00:00 2008 varkolyAATTsuse.de
- upgrade must not be executed during installation

Tue Oct 14 14:00:00 2008 varkolyAATTsuse.de
- (bnc#403976) - permissions on /var/lib/postfix changed
- (bnc#433916) - postfix should be splitted into postfix and postfix-doc

Thu Sep 11 14:00:00 2008 varkolyAATTsuse.de
- (bnc#415216) - Postfix RPM Install Displays Multiple Warnings
- clean up spec file

Tue Sep 9 14:00:00 2008 varkolyAATTsuse.de
- Update to Version 2.5 patchlevel 5

* Bugfix (introduced Postfix 2.4): epoll file descriptor leak.
With Postfix >= 2.4 on Linux >= 2.6, Postfix has an epoll
file descriptor leak when it executes non-Postfix commands
in, for example, user-controlled $HOME/.forward files.

* Security: some systems have changed their link() semantics,
and will hardlink a symlink, contrary to POSIX and XPG4.
Sebastian Krahmer, SuSE. File: util/safe_open.c.
The solution introduces the following incompatible change:
when the target of mail delivery is a symlink, the parent
directory of that symlink must now be writable by root only
(in addition to the already existing requirement that the
symlink itself is owned by root). This change will break
legitimate configurations that deliver mail to a symbolic
link in a directory with less restrictive permissions.

* Bugfix: dangling pointer in vstring_sprintf_prepend().
File: util/vstring.c.

Mon Aug 25 14:00:00 2008 mtAATTsuse.de
- init script: copy LSB
*-Start tags to
*-Stop
- spec file: removed obsolete rc.config update hooks

Wed Aug 6 14:00:00 2008 varkolyAATTsuse.de
- (bnc#414959) postfix doesn\'t have any \"Name: \" tag in firewall definition
- (bnc#405900) SuSEconfig.postfix changes owner and permissions of
/tmp if smtpd_tls_CApath is not set
- Update to Version 2.5 patchlevel 3

* Cleanup of code

* defer delivery when a mailbox file is not owned by the recipient.
Requested by Sebastian Krahmer, SuSE.
Specify \"strict_mailbox_ownership=no\" to ignore ownership discrepancies.

* Bugfix: null-terminate CN comment string after sanitization.

* Bugfix (introduced Postfix 2.0): after \"warn_if_reject
reject_unlisted_recipient/sender\", the SMTP server mistakenly
remembered that recipient/sender validation was already done.

Wed Jul 9 14:00:00 2008 varkolyAATTsuse.de
- (fate#305005) Enable SMTPS in postfix ootb

Tue Jun 17 14:00:00 2008 varkolyAATTsuse.de
- (bnc#396985) sending of NUL character disallowed by RFC2822
- (bnc#397127) without relay is silent about undeliverable mails

Tue May 13 14:00:00 2008 varkolyAATTsuse.de
- (bnc#389670) - postfix generates invalid config

Tue Apr 1 14:00:00 2008 mkoenigAATTsuse.de
- remove dir /usr/share/omc/svcinfo.d as it is provided now
by filesystem

Tue Feb 26 13:00:00 2008 varkolyAATTsuse.de
- Update to Version 2.5 patchlevel 1
Changes: The Postfix 2.5 \"postfix upgrade-configuration\" command
now works even with Postfix 2.4 or earlier versions of the
postfix command. When installing Postfix 2.5.0 without upgrading
from an existing master.cf file, the new master.cf file had an
incorrect process limit for the proxywrite service. This service
is used only by the obscure \"smtp_sasl_auth_cache_name\" and
\"lmtp_sasl_auth_cache_name\" configuration parameters. Someone
needed multi-line support for header/body Milter replies. The
LDAP client\'s TLS support was broken in several ways.

Wed Feb 13 13:00:00 2008 varkolyAATTsuse.de
- #360572 - postfix %post script leaves lots of backup files in /etc/postfix/

Wed Jan 30 13:00:00 2008 varkolyAATTsuse.de
- Update to Version 2.5 patchlevel 0
Major changes - critical
- -----------------------
[Incompat 20071224] The protocol to send Milter information from
smtpd(8) to cleanup(8) processes was cleaned up. If you use the
Milter feature, and upgrade a live Postfix system, you may see an
\"unexpected record type\" warning from a cleanup(8) server process.
To prevent this, execute the command \"postfix reload\". The
incompatibility affects only systems that use the Milter feature.
It does not cause loss of mail, just a minor delay until the remote
SMTP client retries.
[Incompat 20071212] The allow_min_user feature now applies to both
sender and recipient addresses in SMTP commands. With earlier Postfix
versions, only recipients were subject to the allow_min_user feature,
and the restriction took effect at mail delivery time, causing mail
to be bounced later instead of being rejected immediately.
[Incompat 20071206] The \"make install\" and \"make upgrade\" procedures
now create a Postfix-owned directory for Postfix-writable data files
such as caches and random numbers. The location is specified with
the \"data_directory\" parameter (default: \"/var/lib/postfix\"), and
the ownership is specified with the \"mail_owner\" parameter.
[Incompat 20071206] The tlsmgr(8) and verify(8) servers no longer
use root privileges when opening the address_verify_map,

* _tls_session_cache_database, and tls_random_exchange_name cache
files. This avoids a potential security loophole where the ownership
of a file (or directory) does not match the trust level of the
content of that file (or directory).
[Incompat 20071206] The tlsmgr(8) and verify(8) cache files should
now be stored as Postfix-owned files under the Postfix-owned
data_directory. As a migration aid, attempts to open these files
under a non-Postfix directory are redirected to the Postfix-owned
data_directory, and a warning is logged.
This is an example of the warning messages:
Dec 6 12:56:22 bristle postfix/tlsmgr[7899]: warning: request
to update file /etc/postfix/prng_exch in non-postfix directory
/etc/postfix
Dec 6 12:56:22 bristle postfix/tlsmgr[7899]: warning: redirecting
the request to postfix-owned data_directory /var/lib/postfix
If you wish to continue using a pre-existing tls_random_exchange_name
or address_verify_map file, move it to the Postfix-owned data_directory
and change ownership from root to Postfix (that is, change ownership
to the account specified with the mail_owner configuration parameter).
[Feature 20071205] The \"make install\" and \"make upgrade\" procedures
now create a Postfix-owned directory for Postfix-writable data files
such as caches and random numbers. The location is specified with
the \"data_directory\" parameter (default: \"/var/lib/postfix\"), and
the ownership is specified with the \"mail_owner\" parameter.
[Incompat 20071203] The \"make upgrade\" procedure adds a new service
\"proxywrite\" to the master.cf file, for read/write lookup table
access. If you copy your old configuration file over the updated
one, you may see warnings in the maillog file like this:
connect #xx to subsystem private/proxywrite: No such file or directory
To recover, run \"postfix upgrade-configuration\" again.
[Incompat 20070613] The pipe(8) delivery agent no longer allows
delivery with the same group ID as the main.cf postdrop group.
Major changes - malware defense
- ------------------------------
[Feature 20080107] New \"pass\" service type in master.cf. Written
years ago, this allows future front-end daemons to accept all
connections from the network, and to hand over connections from
well-behaved clients to Postfix. Since this feature uses file
descriptor passing, it imposes no overhead once a connection is
handed over to Postfix. See master(5) for a few details.
[Feature 20070911] Stress-adaptive behavior. When a \"public\" network
service runs into an \"all processes are busy\" condition, the master(8)
daemon logs a warning, restarts the service, and runs it with \"-o
stress=yes\" on the command line (under normal conditions it runs
the service with \"-o stress=\" on the command line). This can be
used to make main.cf parameter settings stress dependent, for
example:
/etc/postfix/main.cf:
smtpd_timeout = ${stress?10}${stress:300}
smtpd_hard_error_limit = ${stress?1}${stress:20}
Translation: under conditions of stress, use an smtpd_timeout value
of 10 seconds instead of 300, and use smtpd_hard_error_limit of 1
instead of 20. The syntax is explained in the postconf(5) manpage.
The STRESS_README file gives examples of how to mitigate flooding
problems.
Major changes - tls support
- --------------------------
[Incompat 20080109] TLS logging output has changed to make it more
useful. Existing logfile parser regular expressions may need
adjustment.
- More log entries include the \"hostnamename[ipaddress]\" of the
remote SMTP peer.
- Certificate trust chain error reports show only the first
error certificate (closest to the trust chain root), and the
reporting is more human-readable for the most likely errors.
- After the completion of the TLS handshake, the session is logged
with TLS loglevel >= 1 as either \"Untrusted\", \"Trusted\" or
\"Verified\" (SMTP client only).
- \"Untrusted\" means that the certificate trust chain is invalid,
or that the root CA is not trusted.
- \"Trusted\" means that the certificate trust chain is valid, and
that the root CA is trusted.
- \"Verified\" means that the certificate meets the SMTP client\'s
matching criteria for the destination:
- In the case of a destination name match, \"Verified\" also
implies \"Trusted\".
- In the case of a fingerprint match, CA trust is not applicable.
- The logging of protocol states with TLS loglevel >= 2 no longer
reports bogus error conditions when OpenSSL asks Postfix to refill
(or flush) network I/O buffers. This loglevel is for debugging
only; use 0 or 1 in production configurations.
[Feature 20080109] The Postfix SMTP client has a new \"fingerprint\"
security level. This avoids dependencies on CAs, and relies entirely
on bi-lateral exchange of public keys (really self-signed or private
CA signed X.509 public key certificates). Scalability is clearly
limited. For details, see the fingerprint discussion in TLS_README.
[Feature 20080109] The Postfix SMTP server can now use SHA1 instead
of MD5 to compute remote SMTP client certificate fingerprints. For
backwards compatibility, the default algorithm is MD5. For details,
see the \"smtpd_tls_fingerprint_digest\" parameter in the postconf(5)
manual.
[Feature 20080109] The maximum certificate trust chain depth
(verifydepth) is finally implemented in the Postfix TLS library.
Previously, the parameter had no effect. The default depth was
changed to 9 (the OpenSSL default) for backwards compatibility.
If you have explicity limited the verification depth in main.cf,
check that the configured limit meets your needs. See the
\"lmtp_tls_scert_verifydepth\", \"smtp_tls_scert_verifydepth\" and
\"smtpd_tls_ccert_verifydepth\" parameters in the postconf(5) manual.
[Feature 20080109] The selection of SSL/TLS protocols for mandatory
TLS can now use exclusion rather than inclusion. Either form is
acceptable; see the \"lmtp_tls_mandatory_protocols\",
\"smtp_tls_mandatory_protocols\" and \"smtpd_tls_mandatory_protocols\"
parameters in the postconf(5) manual.
Major changes - scheduler
- ------------------------
[Feature 20071130] Revised queue manager with separate mechanisms
for per-destination concurrency control and for dead destination
detection. The concurrency control supports less-than-1 feedback
to allow for more gradual concurrency adjustments, and uses hysteresis
to avoid rapid oscillations. A destination is declared \"dead\" after
a configurable number of pseudo-cohorts(
*) reports connection or
handshake failure.
(
*) A pseudo-cohort is a number of delivery requests equal to a
destination\'s delivery concurrency.
The drawbacks of the old +/-1 feedback scheduler are a) overshoot
due to exponential delivery concurrency growth with each pseudo-cohort(
*)
(5-10-20...); b) throttling down to zero concurrency after a single
pseudo-cohort(
*) failure. The latter was especially an issue with
low-concurrency channels where a single failure could be sufficient
to mark a destination as \"dead\", and suspend further deliveries.
New configuration parameters: destination_concurrency_feedback_debug,
default_destination_concurrency_positive_feedback,
default_destination_concurrency_negative_feedback,
default_destination_concurrency_failed_cohort_limit, as well as
transport-specific versions of the same.
The default parameter settings are backwards compatible with older
Postfix versions. This may change after better defaults are field
tested.
The updated SCHEDULER_README document describes the theory behind
the new concurrency scheduler, as well as Patrik Rak\'s preemptive
job scheduler. See postconf(5) for more extensive descriptions of
the configuration parameters.
Major changes - small/home office
- --------------------------------
[Feature 20080115] Preliminary SOHO_README document that combines
bits and pieces from other document in one place, so that it is
easier to find. This document describes the \"mail sending\" side
only.
[Feature 20071202] Output rate control in the queue manager. For
example, specify \"smtp_destination_rate_delay = 5m\", to pause five
minutes between message deliveries. More information in the postconf(5)
manual under \"default_destination_rate_delay\".
Major changes - smtp client
- --------------------------
[Incompat 20080114] The Postfix SMTP client now by default defers
mail after a remote SMTP server rejects a SASL authentication
attempt. Specify \"smtp_sasl_auth_soft_bounce = no\" for the old
behavior.
[Feature 20080114] The Postfix SMTP client can now avoid making
repeated SASL login failures with the same server, username and
password. To enable this safety feature, specify for example
\"smtp_sasl_auth_cache_name = proxy:btree:/var/lib/postfix/sasl_auth_cache\"
(access through the proxy service is required). Instead of trying
to SASL authenticate, the Postfix SMTP client defers or bounces
mail as controlled with the new smtp_sasl_auth_soft_bounce configuration
parameter.
[Feature 20071111] Header/body checks are now available in the SMTP
client, after the implementation was moved from the cleanup server
to a library module. The SMTP client provides only actions that
don\'t change the message delivery time or destination: warn, replace,
prepend, ignore, dunno, ok.
[Incompat 20070614] By default, the Postfix Cyrus SASL client no
longer sends a SASL authoriZation ID (authzid); it sends only the
SASL authentiCation ID (authcid) plus the authcid\'s password. Specify
\"send_cyrus_sasl_authzid = yes\" to get the old behavior.
Major changes - smtp server
- --------------------------
[Feature 20070724] Not really major. New support for RFC 3848
(Received: headers with ESMTPS, ESMTPA, or ESMTPSA); updated SASL
support according to RFC 4954, resulting in small changes to SMTP
reply codes and (DSN) enhanced status codes.
Major changes - milter
- ---------------------
[Incompat 20071224] The protocol to send Milter information from
smtpd(8) to cleanup(8) processes was cleaned up. If you use the
Milter feature, and upgrade a live Postfix system, you may see an
\"unexpected record type\" warning from a cleanup(8) server process.
To prevent this, execute the command \"postfix reload\". The
incompatibility affects only systems that use the Milter feature.
It does not cause loss of mail, just a minor delay until the remote
SMTP client retries.
[Feature 20071221] Support for most of the Sendmail 8.14 Milter
protocol features.
To enable the new features specify \"milter_protocol = 6\" and link
the filter application with a libmilter library from Sendmail 8.14
or later.
Sendmail 8.14 Milter features supported at this time:
- NR_CONN, NR_HELO, NR_MAIL, NR_RCPT, NR_DATA, NR_UNKN, NR_HDR,
NR_EOH, NR_BODY: The filter can tell Postfix that it won\'t reply
to some of the SMTP events that Postfix sends. This makes the
protocol less chatty and improves performance.
- SKIP: The filter can tell Postfix to skip sending the rest of
the message body, which also improves performance.
- HDR_LEADSPC: The filter can request that Postfix does not delete
the first space character between header name and header value
when sending a header to the filter, and that Postfix does not
insert a space character between header name and header value
when receiving a header from the filter. This fixes a limitation
in the old Milter protocol that can break DKIM and DK signatures.
- SETSYMLIST: The filter can override one or more of the main.cf
milter_xxx_macros parameter settings.
Sendmail 8.14 Milter features not supported at this time:
- RCPT_REJ: report rejected recipients to the mail filter.
- CHGFROM: replace sender, with optional ESMTP command parameters.
- ADDRCPT_PAR: add recipient, with optional ESMTP command parameters.
It is unclear when (if ever) the missing features will be implemented.
SMFIP_RCPT_REJ requires invasive changes in the SMTP server recipient
processing and error handling. SMFIR_CHGFROM and SMFIR_ADDRCPT_PAR
require ESMTP command-line parsing in the cleanup server. Unfortunately,
Sendmail\'s documentation does not specify what ESMTP options are
supported, but only discusses examples of things that don\'t work.
Major changes - address verification
- -----------------------------------
[Incompat 20070514] The default sender address for address verification
probes was changed from \"postmaster\" to \"double-bounce\", so that
the Postfix SMTP server no longer causes surprising behavior by
excluding \"postmaster\" from SMTP server access controls.
Major changes - ldap
- -------------------
[Incompat 20071216] Due to an incompatible API change between
OpenLDAP 2.0.11 and 2.0.12, an LDAP client compiled for OpenLDAP
version <= 2.0.11 will refuse to work with an OpenLDAP library
version >= 2.0.12 and vice versa.
Major changes - logging
- ----------------------
[Incompat 20080109] TLS logging output has changed to make it more
useful. Existing logfile parser regular expressions may need
adjustment.
- More log entries include the \"hostnamename[ipaddress]\" of the
remote SMTP peer.
- Certificate trust chain error reports show only the first
error certificate (closest to the trust chain root), and the
reporting is more human-readable for the most likely errors.
- After the completion of the TLS handshake, the session is logged
with TLS loglevel >= 1 as either \"Untrusted\", \"Trusted\" or
\"Verified\" (SMTP client only).
- \"Untrusted\" means that the certificate trust chain is invalid,
or that the root CA is not trusted.
- \"Trusted\" means that the certificate trust chain is valid, and
that the root CA is trusted.
- \"Verified\" means that the certificate meets the SMTP client\'s
matching criteria for the destination:
- In the case of a destination name match, \"Verified\" also
implies \"Trusted\".
- In the case of a fingerprint match, CA trust is not applicable.
- The logging of protocol states with TLS loglevel >= 2 no longer
reports bogus error conditions when OpenSSL asks Postfix to refill
(or flush) network I/O buffers. This loglevel is for debugging
only; use 0 or 1 in production configurations.
[Incompat 20071216] The SMTP \"transcript of session\" email now
includes the remote SMTP server TCP port number.
Major changes - loop detection
- -----------------------------
[Incompat 20070422] [Incompat 20070422] When the pipe(8) delivery
agent is configured to create the optional Delivered-To: header,
it now first checks if that same header is already present in the
message. If so, the message is returned as undeliverable. This test
should have been included with Postfix 2.0 when Delivered-To: support
was added to the pipe(8) delivery agent.

Tue Jan 8 13:00:00 2008 varkolyAATTsuse.de
- Remove previous fix

Sun Dec 30 13:00:00 2007 varkolyAATTsuse.de
- #301335 - [SuSEconfig]: Postfix module uses stderr

Tue Dec 4 13:00:00 2007 varkolyAATTsuse.de
- Update to Version 2.4 patchlevel 6
Bugfix (introduced Postfix 2.2.11): TLS client certificate
with unparsable canonical name caused the SMTP server\'s
policy client to allocate zero-length memory, triggering
an assertion that it shouldn\'t do such things. File:
smtpd/smtpd_check.c.
Bugfix (introduced Postfix 2.4) missing initialization of
event mask in the event_mask_drain() routine (used by the
obsolete postkick(1) command). Found by Coverity. File:
util/events.c.
Workaround: the flush daemon forces an access time update
for the per-destination logfile, to prevent an excessive
rate of delivery attempts when the queue file system is
mounted with \"noatime\". File: flush/flush.c.
- #330276 – /sbin/conf.d/SuSEconfig.postfix could copy certs into smtpd_tls_CApath

Mon Oct 22 14:00:00 2007 sbrabecAATTsuse.cz
- Use correct SuSEfirewall2 rule directory.

Wed Oct 17 14:00:00 2007 varkolyAATTsuse.de
- #333629 - saslauthd typo in SuSEconfig.postfix

Mon Oct 8 14:00:00 2007 varkolyAATTsuse.de
- #331044 - Postfix uses receive_override_options in main.cf

Sun Sep 9 14:00:00 2007 varkolyAATTsuse.de
- fix the last fix

Mon Sep 3 14:00:00 2007 cthielAATTsuse.de
- fix the last fix

Mon Sep 3 14:00:00 2007 varkolyAATTsuse.de
- Fixing bug: #297622 - SMTPD_LISTEN_REMOTE has no effect

Sun Aug 5 14:00:00 2007 mrueckertAATTsuse.de
- Update to Version 2.4 patchlevel 5
Bugfix: the loopback TCP performance workaround was ineffective
due to a wetware bit-flip during code cleanup. File:
util/vstream_tweak.c.
(patch level 4)
Bugfix: the Milter client assumed that a Milter application
does not modify the message header or envelope, after that
same Milter application has modified the message body of
that same email message. This is not a problem with updates
by different Milter applications. Problem was triggered
by Jose-Marcio Martins da Cruz. Also simplified the handling
of queue file update errors. File: milter/milter8.c.
Workaround: some non-Cyrus SASL SMTP servers require SASL
login without authzid (authoriZation ID), i.e. the client
must send only the authcid (authentiCation ID) + the authcid\'s
password. In this case the server is supposed to derive
the authzid from the authcid. This works as expected when
authenticating to a Cyrus SASL SMTP server. To get the old
behavior specify \"send_cyrus_sasl_authzid = yes\", in which
case Postfix sends the (authzid, authcid, password), with
the authzid equal to the authcid. File: xsasl/xsasl_cyrus_client.c.
Portability: /dev/poll support for Solaris chroot jail setup
scripts. Files: examples/chroot-setup/Solaris8,
examples/chroot-setup/Solaris10.
Cleanup: Milter client error handling, so that the (Postfix
SMTP server\'s Milter client) does not get out of sync with
Milter applications after the (cleanup server\'s Milter
client) encounters some non-recoverable problem. Files:
milter/milter8.c, smtpd/smtpd.c.
Performance: workaround for poor TCP performance on loopback
(127.0.0.1) connections. Problem reported by Mark Martinec.
Files: util/vstream_tweak.c, milter/milter8.c, smtp/smtp_connect.c,
smtpstone/
*source.c.
Bugfix: when a milter replied with ACCEPT at or before the
first RCPT command, the cleanup server would apply the
non_smtpd_milters setting as if the message was a local
submission. Problem reported by Jukka Salmi. Also, the
cleanup server would get out of sync with the milter when
a milter replied with ACCEPT at the DATA command. Files:
cleanup/cleanup_envelope.c, smtpd/smtpd.c, milter/milters.c.
- rediffed patches

Tue Jul 31 14:00:00 2007 varkolyAATTsuse.de
- Update to Version 2.4 patchlevel 3
(patch level 1)
Bugfix (introduced Postfix 2.3): segfault with HOLD action
in access/header_checks/body_checks on 64-bit platforms.
File: cleanup/cleanup_api.c.
Portability (introduced 20070325): the fix for hardlinks
and symlinks in postfix-install forgot to work around shells
where \"IFS=/ command\" makes the IFS setting permanent. This
is allowed by some broken standard, and affects Solaris.
File: postfix-install.
Portability (introduced 20070212): the workaround for
non-existent library bugs with descriptors >= FD_SETSIZE
broke with \"fcntl F_DUPFD: Invalid argument\" on 64-bit
Solaris. Files: master/multi_server.c,
*qmgr/qmgr_transport.c.
Cleanup: on (Linux) platforms that cripple signal handlers
with deadlock, \"postfix stop\" now forcefully stops all the
processes in the master\'s process group, not just the master
process alone. File: conf/postfix-script.
(patch level 2)
Bugfix: don\'t falsely report \"lost connection from
localhost[127.0.0.1]\" when Postfix is being portscanned.
Files: smtpd/smtpd_peer.c, qmqpd/qmqpd_peer.c.
Robustness: recommend a \"0\" process limit for policy servers
to avoid \"connection refused\" problems when the smtpd process
limit exceeds the default process limit. File:
proto/SMTPD_POLICY_README.html.
Safety: when IPv6 (or IPv4) is turned off, don\'t treat an
IPv6 (or IPv4) connection from e.g. inetd as if it comes
from localhost[127.0.0.1]. Files: smtpd/smtpd_peer.c,
qmqpd/qmqpd_peer.c.
Bugfix: Content-Transfer-Encoding: attribute values are
case insensitive. File: src/cleanup/cleanup_message.c.
Bugfix: mailbox_transport(_maps) and fallback_transport(_maps)
were broken when used with the error(8) or discard(8)
transports. Cause: insufficient documentation. Files:
error/error.c, discard/discard.c.
Bugfix (problem introduced Postfix 2.3): when DSN support
was introduced it broke \"agressive\" recipient duplicate
elimination with \"enable_original_recipient = no\". File:
cleanup/cleanup_out_recipient.c.
Bugfix (introduced Postfix 2.3): the sendmail/postdrop
commands would hang when trying to submit a message larger
than the per-message size limit. File: postdrop/postdrop.c.
Sabotage the saboteur who insists on breaking Postfix by
adding gethostbyname() calls that cause maildir delivery
to fail when the machine name is not found in /etc/hosts,
or that cause Postfix processes to hang when the network
is down.
(patch level 3)
Portability: Victor helpfully pointed out that change
20070425 broke on non-IPv6 systems. Files: smtpd/smtpd_peer.c,
qmqpd/qmqpd_peer.c.

Thu Jun 21 14:00:00 2007 varkolyAATTsuse.de
- Bug 285553 amavisd inconsistency

Tue Jun 19 14:00:00 2007 dmuellerAATTsuse.de
- provide smtp meta-service as well

Mon Jun 11 14:00:00 2007 lruppAATTsuse.de
- don\'t PreRequire /sbin/ip: removed call in SuSEconfig.postfix

Thu May 3 14:00:00 2007 varkolyAATTsuse.de
- dynamic_maps.patch: readded the chunk for dict_tcp and dict_pcre
- replaced prereq for postfix with a prereq on
%{name} = %{version}
- updated to postfix 2.4, patchlevel 0
Major changes - safety

* As a safety measure, Postfix now by default creates mailbox dotlock
files on all systems. This prevents problems with GNU POP3D which
subverts kernel locking by creating a new mailbox file and deleting
the old one
Major changes - Milter support

* The support for Milter header modification
requests was revised. With minimal change in the on-disk representation,
the code was greatly simplified, and regression tests were updated
to ensure that old errors were not re-introduced. The queue file
format is entirely backwards compatible with Postfix 2.3.

* Support for Milter requests to replace the message
body. Postfix now implements all the header/body modification
requests that are available with Sendmail 8.13.

* A new field is added to the queue file \"size\"
record that specifies the message content length. Postfix 2.3 and
older Postfix 2.4 snapshots will ignore this field, and will report
the message size as it was before the body was replaced.
Major changes - TLS support

* The check_smtpd_policy client sends TLS certificate
attributes (client ccert_subject, ccert_issuer) only after successful
client certificate verification. The reason is that the certification
verification status itself is not available in the policy request.

* The check_smtpd_policy client sends TLS certificate
fingerprint information even when the certificate itself was not
verified.

* The remote SMTP client TLS certificate fingerprint
can be used for access control even when the certificate itself was
not verified.

* The format of SMTP server TLS session cache
lookup keys has changed. The lookup key now includes the master.cf
service name.
Major changes - performance

* Better support for systems that run thousands
of Postfix processes. Postfix now supports FreeBSD kqueue(2),
Solaris poll(7d) and Linux epoll(4) as more scalable alternatives
to the traditional select(2) system call, and uses poll(2) when
examining a single file descriptor for readability or writability.
These features are supported on sufficiently recent versions of
FreeBSD, NetBSD, OpenBSD, Solaris and Linux; support for other
systems will be added as evidence becomes available that usable
implementations exist.
Major changes - delivery status notifications

* Small changes were made to the default bounce
message templates, to prevent HTML-aware software from hiding or
removing the text \"\", and producing misleading text.

* Postfix no longer announces its name in delivery
status notifications. Users believe that Wietse provides a free
help desk service that solves all their email problems.
Major changes - ETRN support

* More precise queue flushing with the ETRN,
\"postqueue -s site\", and \"sendmail -qRsite\" commands, after
minimization of race conditions. New per-queue-file flushing with
\"postqueue -i queueid\" and \"sendmail -qIqueueid\".
Major changes - small office/home office support

* Postfix no longer requires a domain name. It
uses \"localdomain\" as the default Internet domain name when no
domain is specified via main.cf or via the machine\'s hostname.
Major changes - SMTP access control

* The check_smtpd_policy client sends TLS certificate
attributes (client ccert_subject, ccert_issuer) only after successful
client certificate verification. The reason is that the certification
verification status itself is not available in the policy request.

* The check_smtpd_policy client sends TLS certificate
fingerprint information even when the certificate itself was not
verified.

* The remote SMTP client TLS certificate fingerprint can be used for
access control even when the certificate itself was not verified.

* The Postfix installation procedure no longer
updates main.cf with \"unknown_local_recipient_reject_code = 450\".
Four years after the introduction of mandatory recipient validation,
this transitional tool is no longer neeed.

Thu Mar 29 14:00:00 2007 rguentherAATTsuse.de
- Add pwdutils BuildRequires to allow postinst script to succeed.
- Add /usr/share/omc directory.

Mon Feb 26 13:00:00 2007 varkolyAATTsuse.de
- #247351 - postfix - Ports for SuSEfirewall added via packages
- Move postfix.xml into the postfix-SuSE tarball
- #228479 - Postfix is configured for inet_protocols=all if
selecting ipv4 only support during installation.
Now we set both inet_protocols and inet_interfaces to all.
This means the available interfaces and protocols will be used.
To avoid bogus warnings inet_proto.c was patched.
- #251598 - postfix use pointers for literals

Mon Jan 15 13:00:00 2007 varkolyAATTsuse.de
- #144104 - postfix does not start
- Implementing Fate #301840: Postfix XML Service Description Document
- Enhancing /etc/sysconfig/postfix descripton to avoid problems
like Bug 228678 - Problems with setting up chroot environment if
/var/spool is not on same filesystem as /var

Wed Nov 22 13:00:00 2006 mrueckertAATTsuse.de
- moved the dict handling into a preun script instead of postun
and do not remove the dict entry on upgrade (#223176)
- removed duplicates in the filelists.

Fri Nov 10 13:00:00 2006 varkolyAATTsuse.de
- #218229 - Postfix SuSEconfig script increases the max_proc line each run in master.cf

Sat Oct 28 14:00:00 2006 varkolyAATTsuse.de
- #206414 - /usr/lib/sasl2/smtpd.conf misplaced

Tue Oct 24 14:00:00 2006 varkolyAATTsuse.de
- #202119 – SuSEconfig script for Postfix incomplete
- #202162 – Postfix 2.3.2 slightly incorrect, Cyrus SASL unavailable
- #203174 – /sbin/conf.d/SuSEconfig.postfix should configure a TLS session cache for postfix 2.2
- #203575 – postfix-2.2.9-10 chokes without scache
- #213589 - No development package/headers for postfix

Tue Aug 15 14:00:00 2006 roAATTsuse.de
- also add libpostfix-milter.so
*

Mon Aug 14 14:00:00 2006 varkolyAATTsuse.de
- updated to postfix 2.3, patchlevel 2
- Major changes
- Name server replies that contain a malformed hostname are now flagged
as permanent errors instead of transient errors.
- DSN support as described in RFC 3461 .. RFC 3464.
- The SMTP client now implements the LMTP protocol.
- Milter (mail filter) application support, compatible with Sendmail
version 8.13.6 and earlier.
- Major changes - SASL authentication
- Plug-in support for SASL authentication in the SMTP server and in the
SMTP/LMTP client.
- The Postfix-with-Cyrus-SASL build procedure has changed.
- Support for sender-dependent ISP accounts.
- Major changes - SMTP client
- The SMTP client now implements the LMTP protocol.
- This version addresses a performance stability problem with remote
SMTP servers.
- Major changes - SMTP server
- The Postfix SMTP server now refuses to receive mail from the network
if it isn\'t running with postfix mail_owner privileges.
- Optional suppression of remote SMTP client hostname lookup and hostname
verification.
- SMTPD Access control based on the existence of an address->name mapping
- Major changes - TLS
- New concept: TLS security levels (\"none\", \"may\", \"encrypt\", \"verify\"
or \"secure\") in the Postfix SMTP client.
- Both the Postfix SMTP client and server can be configured without a
client or server certificate.
- See
/usr/share/doc/packages/postfix/RELEASE_NOTES
/usr/share/doc/packages/postfix/TLS_CHANGES
/usr/share/doc/packages/postfix/README_FILES/SASL_README
for detailed informations.

Wed Aug 2 14:00:00 2006 varkolyAATTsuse.de
- Only %{conf_backup_dir} is contained by the package not /var/adm/backup

Mon Jul 10 14:00:00 2006 varkolyAATTsuse.de
- Bugfix: #190639 Default number of processes for postfix
- Bugfix: #190270 postfix-postgresql


 
ICM