The NetBSD Project

CVS log for pkgsrc/mail/exim/distinfo

[BACK] Up to [cvs.NetBSD.org] / pkgsrc / mail / exim

Request diff between arbitrary revisions


Keyword substitution: kv
Default branch: MAIN


Revision 1.88: download - view: text, markup, annotated - select for diffs
Fri Jul 12 07:04:45 2024 UTC (4 months, 4 weeks ago) by adam
Branches: MAIN
CVS tags: pkgsrc-2024Q3-base, pkgsrc-2024Q3, HEAD
Diff to: previous 1.87: preferred, colored
Changes since revision 1.87: +4 -4 lines
exim exim-html: updated to 4.98

4.98
This is a security release. It addresses the SMTP smuggling attack to which SMTP servers may be vulnerable.
Exim got CVE-2023-51766 assigned for this issue.

Revision 1.87: download - view: text, markup, annotated - select for diffs
Fri Dec 29 17:06:24 2023 UTC (11 months, 1 week ago) by bsiegert
Branches: MAIN
CVS tags: pkgsrc-2024Q2-base, pkgsrc-2024Q2, pkgsrc-2024Q1-base, pkgsrc-2024Q1
Diff to: previous 1.86: preferred, colored
Changes since revision 1.86: +4 -4 lines
exim: update to 4.97.1 (security)

This is a patch release of 4.97 containing fixes for CVE-2023-51766.

Revision 1.86: download - view: text, markup, annotated - select for diffs
Thu Nov 16 08:55:38 2023 UTC (12 months, 3 weeks ago) by adam
Branches: MAIN
CVS tags: pkgsrc-2023Q4-base, pkgsrc-2023Q4
Diff to: previous 1.85: preferred, colored
Changes since revision 1.85: +4 -4 lines
exim exim-html: updated to 4.97

Exim version 4.97
-----------------

JH/01 The hosts_connection_nolog main option now also controls "no MAIL in
      SMTP connection" log lines.

JH/02 Option default value updates:
        - queue_fast_ramp (main)        true (was false)
        - remote_max_parallel (main)    4 (was 2)

JH/03 Cache static regex pattern compilations, for use by ACLs.

JH/04 Bug 2903: avoid exit on an attempt to rewrite a malformed address.
      Make the rewrite never match and keep the logging.  Trust the
      admin to be using verify=header-syntax (to actually reject the message).

JH/05 Follow symlinks for placing a watch on TLS creds files.  This means
      (under Linux) we watch the dir containing the final file; previously
      it would be the dir with the first symlink.  We still do not monitor
      the entire path.

JH/06 Check for bad chars in rDNS for sender_host_name.  The OpenBSD (at least)
      dn_expand() is happy to pass them through.

JH/07 OpenSSL Fix auto-reload of changed server OCSP proof.  Previously, if
      the file with the proof had an unchanged name, the new proof(s) were
      loaded on top of the old ones (and nover used; the old ones were stapled).

JH/08 Bug 2915: Fix use-after-free for $regex<n> variables. Previously when
      more than one message arrived in a single connection a reference from
      the earlier message could be re-used.  Often a sigsegv resulted.
      These variables were introduced in Exim 4.87.
      Debug help from Graeme Fowler.

JH/09 Fix ${filter } for conditions that modify $value.  Previously the
      modified version would be used in construction the result, and a memory
      error would occur.

JH/10 GnuTLS: fix for (IOT?) clients offering no TLS extensions at all.
      Find and fix by Jasen Betts.

JH/11 OpenSSL: fix for ancient clients needing TLS support for versions earlier
      than TLSv1,2,  Previously, more-recent versions of OpenSSL were permitting
      the systemwide configuration to override the Exim config.

HS/01 Bug 2728: Introduce EDITME option "DMARC_API" to work around incompatible
      API changes in libopendmarc.

JH/12 Bug 2930: Fix daemon startup.  When started from any process apart from
      pid 1, in the normal "background daemon" mode, having to drop process-
      group leadership also lost track of needing to create listener sockets.

JH/13 Bug 2929: Fix using $recipients after ${run...}.  A change made for 4.96
      resulted in the variable appearing empty.  Find and fix by Ruben Jenster.

JH/14 Bug 2933: Fix regex substring match variables for null matches. Since 4.96
      a capture group which obtained no text (eg. "(abc)*" matching zero
      occurrences) could cause a segfault if the corresponding $<n> was
      expanded.

JH/15 Fix argument parsing for ${run } expansion. Previously, when an argument
      included a close-brace character (eg. it itself used an expansion) an
      error occurred.

JH/16 Move running the smtp connect ACL to before, for TLS-on-connect ports,
      starting TLS.  Previously it was after, meaning that attackers on such
      ports had to be screened using the host_reject_connection main config
      option. The new sequence aligns better with the STARTTLS behaviour, and
      permits defences against crypto-processing load attacks, even though it
      is strictly an incompatible change.
      Also, avoid sending any SMTP fail response for either the connect ACL
      or host_reject_connection, for TLS-on-connect ports.

JH/17 Permit the ACL "encrypted" condition to be used in a HELO/EHLO ACL,
      Previously this was not permitted, but it makes reasonable sense.
      While there, restore a restriction on using it from a connect ACL; given
      the change JH/16 it could only return false (and before 4.91 was not
      permitted).

JH/18 Fix a fencepost error in logging.  Previously (since 4.92) when a log line
      was exactly sized compared to the log buffer, a crash occurred with the
      misleading message "bad memory reference; pool not found".
      Found and traced by Jasen Betts.

JH/19 Bug 2911: Fix a recursion in DNS lookups.  Previously, if the main option
      dns_again_means_nonexist included an element causing a DNS lookup which
      itself returned DNS_AGAIN, unbounded recursion occurred.  Possible results
      included (though probably not limited to) a process crash from stack
      memory limit, or from excessive open files.  Replace this with a paniclog
      whine (as this is likely a configuration error), and returning
      DNS_NOMATCH.

JH/20 Bug 2954: (OpenSSL) Fix setting of explicit EC curve/group.  Previously
      this always failed, probably leading to the usual downgrade to in-clear
      connections.

JH/21 Fix TLSA lookups.  Previously dns_again_means_nonexist would affect
      SERVFAIL results, which breaks the downgrade resistance of DANE.  Change
      to not checking that list for these lookups.

JH/22 Bug 2434: Add connection-elapsed "D=" element to more connection
      closure log lines.

JH/23 Fix crash in string expansions. Previously, if an empty variable was
      immediately followed by an expansion operator, a null-indirection read
      was done, killing the process.

JH/24 Bug 2997: When built with EXPERIMENTAL_DSN_INFO, bounce messages can
      include an SMTP response string which is longer than that supported
      by the delivering transport.  Alleviate by wrapping such lines before
      column 80.

JH/25 Bug 2827: Restrict size of References: header in bounce messages to 998
      chars (RFC limit).  Previously a limit of 12 items was made, which with
      a not-impossible References: in the message being bounced could still
      be over-large and get stopped in the transport.

JH/26 For a ${readsocket } in TLS mode, send a TLS Close Alert before the TCP
      close.  Previously a bare socket close was done.

JH/27 Fix ${srs_encode ..}.  Previously it would give a bad result for one day
      every 1024 days.

JH/28 Bug 2996: Fix a crash in the smtp transport.  When finding that the
      message being considered for delivery was already being handled by
      another process, and having an SMTP connection already open, the function
      to close it tried to use an uninitialized variable.  This would afftect
      high-volume sites more, especially when running mailing-list-style loads.
      Pollution of logs was the major effect, as the other process delivered
      the message.  Found and partly investigated by Graeme Fowler.

JH/29 Change format of the internal ID used for message identification. The old
      version only supported 31 bits for a PID element; the new 64 (on systems
      which can use Base-62 encoding, which is all currently supported ones
      but not Darwin (MacOS) or Cygwin, which have case-insensitive filesystems
      and must use Base-36).  The new ID is 23 characters rather than 16, and is
      visible in various places - notably logs, message headers, and spool file
      names.  Various of the ancillary utilities also have to know the format.
        As well as the expanded PID portion, the sub-second part of the time
      recorded in the ID is expanded to support finer precision.  Theoretically
      this permits a receive rate from a single comms channel of better than the
      previous 2000/sec.
        The major timestamp part of the ID is not changed; at 6 characters it is
      usable until about year 3700.
        Updating from previously releases is fully supported: old-format spool
      files are still usable, and the utilities support both formats.  New
      message will use the new format.  The one hints-DB file type which uses
      message-IDs (the transport wait- DB) will be discarded if an old-format ID
      is seen; new ones will be built with only new-format IDs.
      Optionally, a utility can be used to convert spool files from old to new,
      but this is only an efficiency measure not a requirement for operation
        Downgrading from new to old requires running a provided utility, having
      first stopped all operations.  This will convert any spool files from new
      back to old (losing time-precision and PID information) and remove any
      wait- hints databases.

JH/30 Bug 3006: Fix handling of JSON strings having embedded commas. Previously
      we treated them as item separators when parsing for a list item, but they
      need to be protected by the doublequotes.  While there, add handling for
      backslashes.

JH/31 Bug 2998: Fix ${utf8clean:...} to disallow UTF-16 surrogate codepoints.
      Found and fixed by Jasen Betts. No testcase for this as my usual text
      editor insists on emitting only valid UTF-8.

JH/32 Fix "tls_dhparam = none" under GnuTLS.  At least with 3.7.9 this gave
      a null-indirection SIGSEGV for the receive process.

JH/33 Fix free for live variable $value created by a ${run ...} expansion during
      -bh use.  Internal checking would spot this and take a panic.

JH/34 Bug 3013: Fix use of $recipients within arguments for ${run...}.
      In 4.96 this would expand to empty.

JH/35 Bug 3014: GnuTLS: fix expiry date for an auto-generated server
      certificate.  Find and fix by Andreas Metzler.

JH/36 Add ARC info to DMARC hostory records.

JH/37 Bug 3016: Avoid sending DSN when message was accepted under fakereject
      or fakedefer.  Previously the sender could discover that the message
      had in fact been accepted.

JH/38 Taint-track intermediate values from the peer in multi-stage authentation
      sequences.  Previously the input was not noted as being tainted; notably
      this resulted in behaviour of LOGIN vs. PLAIN being inconsistent under
      bad coding of authenticators.

JH/39 Bug 3023: Fix crash induced by some combinations of zero-length strings
      and ${tr...}.  Found and diagnosed by Heiko Schlichting.

JH/40 Bug 2999: Fix a possible OOB write in the external authenticator, which
      could be triggered by externally-supplied input.  Found by Trend Micro.
      CVE-2023-42115

JH/41 Bug 3000: Fix a possible OOB write in the SPA authenticator, which could
      be triggered by externally-controlled input.  Found by Trend Micro.
      CVE-2023-42116

JH/42 Bug 3001: Fix a possible OOB read in the SPA authenticator, which could
      be triggered by externally-controlled input.  Found by Trend Micro.
      CVE-2023-42114

JH/43 Bug 2903: avoid exit on an attempt to rewrite a malformed address.
      Make the rewrite never match and keep the logging.  Trust the
      admin to be using verify=header-syntax (to actually reject the message).

JH/44 Bug 3033: Harden dnsdb lookups against crafted DNS responses.
      CVE-2023-42219

Revision 1.83.10.2: download - view: text, markup, annotated - select for diffs
Mon Oct 23 18:30:09 2023 UTC (13 months, 2 weeks ago) by bsiegert
Branches: pkgsrc-2023Q3
Diff to: previous 1.83.10.1: preferred, colored; branchpoint 1.83: preferred, colored; next MAIN 1.84: preferred, colored
Changes since revision 1.83.10.1: +4 -4 lines
Pullup ticket #6813 - requested by prlw1
mail/exim: security fix

Revisions pulled up:
- mail/exim/Makefile                                            1.198
- mail/exim/distinfo                                            1.85

---
   Module Name:    pkgsrc
   Committed By:   prlw1
   Date:           Mon Oct 16 14:59:27 UTC 2023

   Modified Files:
           pkgsrc/mail/exim: Makefile distinfo

   Log Message:
   Update exim to 4.96.2

   Security fixes:

   JH/01 Bug 3033: Harden dnsdb lookups against crafted DNS responses.
         CVE-2023-42219

   HS/01 Fix string_is_ip_address() CVE-2023-42117 (Bug 3031)

Revision 1.85: download - view: text, markup, annotated - select for diffs
Mon Oct 16 14:59:26 2023 UTC (13 months, 3 weeks ago) by prlw1
Branches: MAIN
Diff to: previous 1.84: preferred, colored
Changes since revision 1.84: +4 -4 lines
Update exim to 4.96.2

Security fixes:

JH/01 Bug 3033: Harden dnsdb lookups against crafted DNS responses.
      CVE-2023-42219

HS/01 Fix string_is_ip_address() CVE-2023-42117 (Bug 3031)

Revision 1.83.10.1: download - view: text, markup, annotated - select for diffs
Thu Oct 12 15:28:14 2023 UTC (13 months, 4 weeks ago) by bsiegert
Branches: pkgsrc-2023Q3
Diff to: previous 1.83: preferred, colored
Changes since revision 1.83: +4 -4 lines
Pullup ticket #6806 - requested by prlw1
mail/exim: security fix

Revisions pulled up:
- mail/exim/Makefile                                            1.197
- mail/exim/distinfo                                            1.84

---
   Module Name:    pkgsrc
   Committed By:   prlw1
   Date:           Tue Oct  3 08:42:44 UTC 2023

   Modified Files:
           pkgsrc/mail/exim: Makefile distinfo

   Log Message:
   Update exim to 4.96.1

   Exim version 4.96.1
   -------------------

   This is a security release.

   JH/01 Bug 2999: Fix a possible OOB write in the external authenticator, which
         could be triggered by externally-supplied input.  Found by Trend Micro.
         CVE-2023-42115

   JH/02 Bug 3000: Fix a possible OOB write in the SPA authenticator, which could
         be triggered by externally-controlled input.  Found by Trend Micro.
         CVE-2023-42116

   JH/03 Bug 3001: Fix a possible OOB read in the SPA authenticator, which could
         be triggered by externally-controlled input.  Found by Trend Micro.
         CVE-2023-42114

Revision 1.84: download - view: text, markup, annotated - select for diffs
Tue Oct 3 08:42:44 2023 UTC (14 months, 1 week ago) by prlw1
Branches: MAIN
Diff to: previous 1.83: preferred, colored
Changes since revision 1.83: +4 -4 lines
Update exim to 4.96.1

Exim version 4.96.1
-------------------

This is a security release.

JH/01 Bug 2999: Fix a possible OOB write in the external authenticator, which
      could be triggered by externally-supplied input.  Found by Trend Micro.
      CVE-2023-42115

JH/02 Bug 3000: Fix a possible OOB write in the SPA authenticator, which could
      be triggered by externally-controlled input.  Found by Trend Micro.
      CVE-2023-42116

JH/03 Bug 3001: Fix a possible OOB read in the SPA authenticator, which could
      be triggered by externally-controlled input.  Found by Trend Micro.
      CVE-2023-42114

Revision 1.83: download - view: text, markup, annotated - select for diffs
Sat Jul 2 09:24:34 2022 UTC (2 years, 5 months ago) by adam
Branches: MAIN
CVS tags: pkgsrc-2023Q3-base, pkgsrc-2023Q2-base, pkgsrc-2023Q2, pkgsrc-2023Q1-base, pkgsrc-2023Q1, pkgsrc-2022Q4-base, pkgsrc-2022Q4, pkgsrc-2022Q3-base, pkgsrc-2022Q3
Branch point for: pkgsrc-2023Q3
Diff to: previous 1.82: preferred, colored
Changes since revision 1.82: +4 -4 lines
exim exim-html: updated to 4.96

New stuff we've added since 4.95:

  - A new ACL condition: seen. Records/tests a timestamp against a key.
  - A variant of the "mask" expansion operator to give normalised IPv6.
  - UTC output option for exim_dumpdb, exim_fixdb.
  - An event for failing TLS connects to the daemon.
  - The ACL "debug" control gains options "stop", "pretrigger" and "trigger".
  - Query-style lookups are now checked for quoting, if the query string is
     built using untrusted data ("tainted").  For now lack of quoting is merely
     logged; a future release will upgrade this to an error.
  - The expansion conditions match_<list-type> and inlist now set $value for
     the expansion of the "true" result of the ${if}.  With a static list, this
     can be used for de-tainting.

Notable removals since 4.95:

   - the "allow_insecure_tainted_data" main config option and the
     "taint" log_selector.  These were deprecated in the 4.95 release.

Revision 1.82: download - view: text, markup, annotated - select for diffs
Sun Nov 14 20:19:08 2021 UTC (3 years ago) by adam
Branches: MAIN
CVS tags: pkgsrc-2022Q2-base, pkgsrc-2022Q2, pkgsrc-2022Q1-base, pkgsrc-2022Q1, pkgsrc-2021Q4-base, pkgsrc-2021Q4
Diff to: previous 1.81: preferred, colored
Changes since revision 1.81: +4 -4 lines
exim exim-html: updated to 4.95

Version 4.95
------------

 1. The fast-ramp two phase queue run support, previously experimental, is
    now supported by default.

 2. The native SRS support, previously experimental, is now supported. It is
    not built unless specified in the Local/Makefile.

 3. TLS resumption support, previously experimental, is now supported and
    included in default builds.

 4. Single-key LMDB lookups, previously experimental, are now supported.
    The support is not built unless specified in the Local/Makefile.

 5. Option "message_linelength_limit" on the smtp transport to enforce (by
    default) the RFC 998 character limit.

 6. An option to ignore the cache on a lookup.

 7. Quota checking during reception (i.e. at SMTP time) for appendfile-
    transport-managed quotas.

 8. Sqlite lookups accept a "file=<path>" option to specify a per-operation
    db file, replacing the previous prefix to the SQL string (which had
    issues when the SQL used tainted values).

 9. Lsearch lookups accept a "ret=full" option, to return both the portion
    of the line matching the key, and the remainder.

10. A command-line option to have a daemon not create a notifier socket.

11. Faster TLS startup.  When various configuration options contain no
    expandable elements, the information can be preloaded and cached rather
    than the previous behaviour of always loading at startup time for every
    connection.  This helps particularly for the CA bundle.

12. Proxy Protocol Timeout is configurable via "proxy_protocol_timeout"
    main config option.

13. Option "smtp_accept_max_per_connection" is now expanded.

14. Log selector "queue_size_exclusive", enabled by default, to exclude the
    time taken for reception from QT log elements.

15. Main option "smtp_backlog_monitor", to set a level above which listen
    socket backlogs are logged.

16. Main option "hosts_require_helo", requiring HELO or EHLO before MAIL.

17. A main config option "allow_insecure_tainted_data" allows to turn

18. TLS ALPN handling.  By default, refuse TLS connections that try to specify
    a non-smtp (eg. http) use.  Options for customising.

19. Support for MacOS (darwin) has been dropped.

Revision 1.81: download - view: text, markup, annotated - select for diffs
Tue Oct 26 10:53:59 2021 UTC (3 years, 1 month ago) by nia
Branches: MAIN
Diff to: previous 1.80: preferred, colored
Changes since revision 1.80: +2 -2 lines
mail: Replace RMD160 checksums with BLAKE2s checksums

All checksums have been double-checked against existing RMD160 and
SHA512 hashes

The following distfiles were unfetchable (possibly fetched
conditionally?):

./mail/qmail/distinfo netqmail-1.05-TAI-leapsecs.patch

Revision 1.80: download - view: text, markup, annotated - select for diffs
Thu Oct 7 14:25:17 2021 UTC (3 years, 2 months ago) by nia
Branches: MAIN
Diff to: previous 1.79: preferred, colored
Changes since revision 1.79: +1 -2 lines
mail: Remove SHA1 hashes for distfiles

Revision 1.78.6.1: download - view: text, markup, annotated - select for diffs
Fri May 7 19:05:18 2021 UTC (3 years, 7 months ago) by bsiegert
Branches: pkgsrc-2021Q1
Diff to: previous 1.78: preferred, colored; next MAIN 1.79: preferred, colored
Changes since revision 1.78: +5 -6 lines
Pullup ticket #6455 - requested by abs
mail/exim: security fix

Revisions pulled up:
- mail/exim/Makefile                                            1.185
- mail/exim/distinfo                                            1.79
- mail/exim/patches/patch-src_store.c                           deleted

---
   Module Name:    pkgsrc
   Committed By:   abs
   Date:           Tue May  4 20:29:39 UTC 2021

   Modified Files:
           pkgsrc/mail/exim: Makefile distinfo

   Log Message:
   Updated mail/exim to 4.94.2

   This includes a number of serious security fixes (one of which was
   included in a now obsoleted pkgsrc patch)

       CVE-2020-28016
       CVE-2020-BDATA
       CVE-2020-EXOPT
       CVE-2020-PFPSN
       CVE-2020-RCPTL
       CVE-2020-SLCWD
       CVE-2020-SPRSS

   Since Exim version 4.94
   -----------------------

   JH/02 Bug 2587: Fix pam expansion condition.  Tainted values are commonly used
         as arguments, so an implementation trying to copy these into a local
         buffer was taking a taint-enforcement trap.  Fix by using dynamically
         created buffers.  Similar fix for radius expansion condition.

   JH/03 Bug 2586: Fix listcount expansion operator.  Using tainted arguments is
         reasonable, eg. to count headers.  Fix by using dynamically created
         buffers rather than a local.  Do similar fixes for ACL actions "dcc",
         "log_reject_target", "malware" and "spam"; the arguments are expanded
         so could be handling tainted values.

   JH/04 Bug 2590: Fix -bi (newaliases).  A previous code rearrangement had
         broken the (no-op) support for this sendmail command.  Restore it
         to doing nothing, silently, and returning good status.

   JH/05 Bug 2593: Fix "vacation" in Exim filter.  Previously, when a "once"
         record path was given (or the default used) without a leading directory
         path, an error occurred on trying to open it.  Use the transport's working
         directory.

   JH/06 Bug 2594: Change the name used for certificate name checks in the smtp
         transport.  Previously it was the name on the DNS A-record; use instead
         the head of the CNAME chain leading there (if there is one).  This seems
         to align better with RFC 6125.

   JH/07 Bug 2597: Fix a resource leak.  Using a lookup in obtaining a value for
         smtp_accept_max_per_host allocated resources which were not released
         when the limit was exceeded.  This eventually crashed the daemon.  Fix
         by adding a relase action in that path.

   JH/08 Bug 2598: Fix verify ACL condition.  The options for the condition are
         expanded; previously using tainted values was rejected.  Fix by using
         dynamically-created buffers.

   JH/10 Bug 2603: Fix coding of string copying to only evaluate arguments once.
         Previously a macro used one argument twice; when called with the
         argument as an expression having side-effects, incorrect operation
         resulted.  Use an inlineable function.

   JH/11 Bug 2604: Fix request to cutthrough-deliver when a connection is already
         held open for a verify callout.  Previously this wan not accounted for
         and a corrupt onward SMTP conversation resulted.

   JH/13 Fix dsearch "subdir" filter to ignore ".".  Previously only ".." was
         excluded, not matching the documentation.

   JH/14 Bug 2606: Fix a segfault in sqlite lookups.  When no, or a bad, filename
         was given for the sqlite_dbfile a trap resulted.

   JH/15 Bug 2620: Fix "spam" ACL condition.  Previously, tainted values for the
         "name" argument resulted in a trap.  There is no reason to disallow such;
         this was a coding error.

   JH/16 Bug 2615: Fix pause during message reception, on systems that have been
         suspended/resumed.  The Linux CLOCK_MONOTONIC does not account for time
         spent suspended, ignoring the Posix definition.  Previously we assumed
         it did and a constant offset from real time could be used as a correction.
         Change to using the same clock source for the start-of-message and the
         post-message next-tick-wait.  Also change to using CLOCK_BOOTTIME if it
         exists, just to get a clock slightly more aligned to reality.

   JH/17 Bug 2295: Fix DKIM signing to always semicolon-terminate.  Although the
         RFC says it is optional some validators care.  The missing char was not
         intended but triggered by a line-wrap alignement.  Discovery and fix by
         Guillaume Outters, hacked on by JH.

   JH/18 Bug 2617: Fix a taint trap in parse_fix_phrase().  Previously when the
         name being quoted was tainted a trap would be taken.  Fix by using
         dynamicaly created buffers.  The routine could have been called by a
         rewrite with the "h" flag, by using the "-F" command-line option, or
         by using a "name=" option on a control=submission ACL modifier.

   JH/21 Bug 2630: Fix eol-replacement string for the ${readsocket } expansion.
         Previously when a whitespace character was specified it was not inserted
         after removing the newline.

   JH/24 Bug 2634: Fix a taint trap seen on NetBSD: the testing coded for
         is_tainted() had an off-by-one error in the overenthusiastic direction.
         Find and fix by Gavan.  Although NetBSD is not a supported platform for
         4.94 this bug could affect other platforms.

   JH/24 Bug 2634: Fix a taint trap seen on NetBSD: the testing coded for
         is_tainted() had an off-by-one error in the overenthusiastic direction.
         Find and fix by Gavan.  Although NetBSD is not a supported platform for
         4.94 this bug could affect other platforms.
   JH/21 Bug 2630: Fix eol-replacement string for the ${readsocket } expansion.
         Previously when a whitespace character was specified it was not inserted
         after removing the newline.

   JH/22 Bug 2265: Force SNI usage for smtp transport DANE'd connections, to be
         the domain part of the recipient address.  This overrides any tls_sni
         option set, which was previously used.

   JH/23 Logging: with the +tls_sni log_selector, do not wrap the received SNI
         in quotes.

   JH/26 Bug 2646: fix a memory usage issue in ldap lookups.  Previously, when more
         than one server was defined and depending on the platform memory layout
         details, an internal consistency trap could be hit while walking the list
         of servers.

   JH/27 Bug 2648: fix the passing of an authenticator public-name through spool
         files.  The value is used by the authresults expansion item.  Previously
         if this was used in a router or transport, a crash could result.

   JH/30 Bug 2677: fix matching of long addresses. Since 4.93 a limit of 256 was
         applied. This resulted, if any header-line rewrite rules were configured,
         in a panic-log trigerrable by sending a message with a long address in
         a header. Fix by increaing the arbitrary limit to larger than a single
         (dewrapped) 5322 header line maximum size.

   JH/31 The ESMTP option name advertised for the SUPPORT_EARLY_PIPE build option
         is changed from X_PIPE_CONNECT to PIPE_CONNECT. This is in line with
         RFC 6648 which deprecates X- options in protocols as a general practice.
         Changeover between the implementations is handled by the mechanisms
         alrready coded.

   JH/32 Bug 2599: fix delay of delivery to a local address where there is also
         a remote which uses callout/hold.  Previously the local was queued.

   JH/33 Fix a taint trap in the ${listextract } expansion when the source data
         was tainted.

   JH/35 Bug 2343: Harden exim_tidydb against corrupt wait- files.

   JH/36 Bug 2687: Fix interpretation of multiple ^ chars in a plaintext
         authenticator client_send option.  Previously the next char, after a pair
         was collapsed, was taken verbatim (so ^^^foo became ^^foo; ^^^^foo became
         ^^\x00foo). Fixed to get ^\x00foo and ^^foo respectively to match the
         documentation.  There is still no way to get a leading ^ immediately
         after a NUL (ie. for the password of a PLAIN method authenticator.

   JH/39 Bug 2691: fix $local_part_data.  When the matching list element
         referred to a file, bad data was returned.  This likely also affected
         $domain_part_data.

   JH/41 Fix daemon SIGHUP on FreeBSD.  Previously, a named socket for IPC was
         left undeleted; the attempt to re-create it then failed - resulting in
         the usual "SIGHUP tp have daemon reload configuration" to not work.
         This affected any platform not supporting "abstract" Unix-domain
         sockets (i.e. not Linux).

   JH/42 Bug 2692: Harden against a peer which reneges on a 452 "too many
         recipients" response to RCPT in a later response, with a 250.  The
         previous coding assumed this would not happen, and under PIPELINING
         would result in both lost and duplicate recipients for a message.

   JH/43 Bug 2694: Fix weighted distribution of work to multiple spamd servers.
         Previously the weighting was incorrectly applied.  Similar fix for socks
         proxies.  Found and fixed by Heiko Schlichting.

   JH/44 Bug 2701: Fix list-expansion of dns_ipv4_lookup.  Previously, it did
         not handle sub-lists included using the +namedlist syntax.  While
         investigating, the same found for dns_trust_aa, dns_again_means_nonexist,
         dnssec_require_domains, dnssec_request_domains, srv_fail_domains,
         mx_fail_domains.

   HS/01 Enforce absolute PID file path name.

   HS/02 Handle SIGINT as we handle SIGTERM: terminate the Exim process.

   PP/01 Add a too-many-bad-recipients guard to the default config's RCPT ACL.

   PP/02 Bug 2643: Correct TLS DH constants.
         A missing NUL termination in our code-generation tool had led to some
         incorrect Diffie-Hellman constants in the Exim source.
         Reported by kylon94, code-gen tool fix by Simon Arlott.

   PP/03 Impose security length checks on various command-line options.
         Fixes CVE-2020-SPRSS reported by Qualys.

   PP/04 Fix Linux security issue CVE-2020-SLCWD and guard against PATH_MAX
         better.  Reported by Qualys.

   PP/05 Fix security issue CVE-2020-PFPSN and guard against cmdline invoker
         providing a particularly obnoxious sender full name.
         Reported by Qualys.

   PP/06 Fix CVE-2020-28016 (PFPZA): Heap out-of-bounds write in parse_fix_phrase()

   PP/07 Refuse to allocate too little memory, block negative/zero allocations.
         Security guard.

   PP/08 Change default for recipients_max from unlimited to 50,000.

   PP/09 Fix security issue with too many recipients on a message (to remove a
         known security problem if someone does set recipients_max to unlimited,
         or if local additions add to the recipient list).
         Fixes CVE-2020-RCPTL reported by Qualys.

   PP/10 Fix security issue in SMTP verb option parsing
         Fixes CVE-2020-EXOPT reported by Qualys.

   PP/11 Fix security issue in BDAT state confusion.
         Ensure we reset known-good where we know we need to not be reading BDAT
         data, as a general case fix, and move the places where we switch to BDAT
         mode until after various protocol state checks.
         Fixes CVE-2020-BDATA reported by Qualys.

   HS/03 Die on "/../" in msglog file names

   QS/01 Creation of (database) files in $spool_dir: only uid=0 or the uid of
         the Exim runtime user are allowed to create files.

   QS/02 PID file creation/deletion: only possible if uid=0 or uid is the Exim
         runtime user.

   QS/03 When reading the output from interpreted forward files we do not
         pass the pipe between the parent and the interpreting process to
         executed child processes (if any).

   QS/04 Always die if requested from internal logging, even is logging is
         disabled.

---
   Module Name:    pkgsrc
   Committed By:   wiz
   Date:           Thu May  6 07:08:54 UTC 2021

   Removed Files:
           pkgsrc/mail/exim/patches: patch-src_store.c

   Log Message:
   exim: remove patch from distinfo that was removed from repository during update

Revision 1.79: download - view: text, markup, annotated - select for diffs
Tue May 4 20:29:38 2021 UTC (3 years, 7 months ago) by abs
Branches: MAIN
CVS tags: pkgsrc-2021Q3-base, pkgsrc-2021Q3, pkgsrc-2021Q2-base, pkgsrc-2021Q2
Diff to: previous 1.78: preferred, colored
Changes since revision 1.78: +5 -6 lines
Updated mail/exim to 4.94.2

This includes a number of serious security fixes (one of which was
included in a now obsoleted pkgsrc patch)

    CVE-2020-28016
    CVE-2020-BDATA
    CVE-2020-EXOPT
    CVE-2020-PFPSN
    CVE-2020-RCPTL
    CVE-2020-SLCWD
    CVE-2020-SPRSS

Since Exim version 4.94
-----------------------

JH/02 Bug 2587: Fix pam expansion condition.  Tainted values are commonly used
      as arguments, so an implementation trying to copy these into a local
      buffer was taking a taint-enforcement trap.  Fix by using dynamically
      created buffers.  Similar fix for radius expansion condition.

JH/03 Bug 2586: Fix listcount expansion operator.  Using tainted arguments is
      reasonable, eg. to count headers.  Fix by using dynamically created
      buffers rather than a local.  Do similar fixes for ACL actions "dcc",
      "log_reject_target", "malware" and "spam"; the arguments are expanded
      so could be handling tainted values.

JH/04 Bug 2590: Fix -bi (newaliases).  A previous code rearrangement had
      broken the (no-op) support for this sendmail command.  Restore it
      to doing nothing, silently, and returning good status.

JH/05 Bug 2593: Fix "vacation" in Exim filter.  Previously, when a "once"
      record path was given (or the default used) without a leading directory
      path, an error occurred on trying to open it.  Use the transport's working
      directory.

JH/06 Bug 2594: Change the name used for certificate name checks in the smtp
      transport.  Previously it was the name on the DNS A-record; use instead
      the head of the CNAME chain leading there (if there is one).  This seems
      to align better with RFC 6125.

JH/07 Bug 2597: Fix a resource leak.  Using a lookup in obtaining a value for
      smtp_accept_max_per_host allocated resources which were not released
      when the limit was exceeded.  This eventually crashed the daemon.  Fix
      by adding a relase action in that path.

JH/08 Bug 2598: Fix verify ACL condition.  The options for the condition are
      expanded; previously using tainted values was rejected.  Fix by using
      dynamically-created buffers.

JH/10 Bug 2603: Fix coding of string copying to only evaluate arguments once.
      Previously a macro used one argument twice; when called with the
      argument as an expression having side-effects, incorrect operation
      resulted.  Use an inlineable function.

JH/11 Bug 2604: Fix request to cutthrough-deliver when a connection is already
      held open for a verify callout.  Previously this wan not accounted for
      and a corrupt onward SMTP conversation resulted.

JH/13 Fix dsearch "subdir" filter to ignore ".".  Previously only ".." was
      excluded, not matching the documentation.

JH/14 Bug 2606: Fix a segfault in sqlite lookups.  When no, or a bad, filename
      was given for the sqlite_dbfile a trap resulted.

JH/15 Bug 2620: Fix "spam" ACL condition.  Previously, tainted values for the
      "name" argument resulted in a trap.  There is no reason to disallow such;
      this was a coding error.

JH/16 Bug 2615: Fix pause during message reception, on systems that have been
      suspended/resumed.  The Linux CLOCK_MONOTONIC does not account for time
      spent suspended, ignoring the Posix definition.  Previously we assumed
      it did and a constant offset from real time could be used as a correction.
      Change to using the same clock source for the start-of-message and the
      post-message next-tick-wait.  Also change to using CLOCK_BOOTTIME if it
      exists, just to get a clock slightly more aligned to reality.

JH/17 Bug 2295: Fix DKIM signing to always semicolon-terminate.  Although the
      RFC says it is optional some validators care.  The missing char was not
      intended but triggered by a line-wrap alignement.  Discovery and fix by
      Guillaume Outters, hacked on by JH.

JH/18 Bug 2617: Fix a taint trap in parse_fix_phrase().  Previously when the
      name being quoted was tainted a trap would be taken.  Fix by using
      dynamicaly created buffers.  The routine could have been called by a
      rewrite with the "h" flag, by using the "-F" command-line option, or
      by using a "name=" option on a control=submission ACL modifier.

JH/21 Bug 2630: Fix eol-replacement string for the ${readsocket } expansion.
      Previously when a whitespace character was specified it was not inserted
      after removing the newline.

JH/24 Bug 2634: Fix a taint trap seen on NetBSD: the testing coded for
      is_tainted() had an off-by-one error in the overenthusiastic direction.
      Find and fix by Gavan.  Although NetBSD is not a supported platform for
      4.94 this bug could affect other platforms.

JH/24 Bug 2634: Fix a taint trap seen on NetBSD: the testing coded for
      is_tainted() had an off-by-one error in the overenthusiastic direction.
      Find and fix by Gavan.  Although NetBSD is not a supported platform for
      4.94 this bug could affect other platforms.
JH/21 Bug 2630: Fix eol-replacement string for the ${readsocket } expansion.
      Previously when a whitespace character was specified it was not inserted
      after removing the newline.

JH/22 Bug 2265: Force SNI usage for smtp transport DANE'd connections, to be
      the domain part of the recipient address.  This overrides any tls_sni
      option set, which was previously used.

JH/23 Logging: with the +tls_sni log_selector, do not wrap the received SNI
      in quotes.

JH/26 Bug 2646: fix a memory usage issue in ldap lookups.  Previously, when more
      than one server was defined and depending on the platform memory layout
      details, an internal consistency trap could be hit while walking the list
      of servers.

JH/27 Bug 2648: fix the passing of an authenticator public-name through spool
      files.  The value is used by the authresults expansion item.  Previously
      if this was used in a router or transport, a crash could result.

JH/30 Bug 2677: fix matching of long addresses. Since 4.93 a limit of 256 was
      applied. This resulted, if any header-line rewrite rules were configured,
      in a panic-log trigerrable by sending a message with a long address in
      a header.	Fix by increaing the arbitrary limit to larger than a single
      (dewrapped) 5322 header line maximum size.

JH/31 The ESMTP option name advertised for the SUPPORT_EARLY_PIPE build option
      is changed from X_PIPE_CONNECT to PIPE_CONNECT. This is in line with
      RFC 6648 which deprecates X- options in protocols as a general practice.
      Changeover between the implementations is handled by the mechanisms
      alrready coded.

JH/32 Bug 2599: fix delay of delivery to a local address where there is also
      a remote which uses callout/hold.  Previously the local was queued.

JH/33 Fix a taint trap in the ${listextract } expansion when the source data
      was tainted.

JH/35 Bug 2343: Harden exim_tidydb against corrupt wait- files.

JH/36 Bug 2687: Fix interpretation of multiple ^ chars in a plaintext
      authenticator client_send option.  Previously the next char, after a pair
      was collapsed, was taken verbatim (so ^^^foo became ^^foo; ^^^^foo became
      ^^\x00foo). Fixed to get ^\x00foo and ^^foo respectively to match the
      documentation.  There is still no way to get a leading ^ immediately
      after a NUL (ie. for the password of a PLAIN method authenticator.

JH/39 Bug 2691: fix $local_part_data.  When the matching list element
      referred to a file, bad data was returned.  This likely also affected
      $domain_part_data.

JH/41 Fix daemon SIGHUP on FreeBSD.  Previously, a named socket for IPC was
      left undeleted; the attempt to re-create it then failed - resulting in
      the usual "SIGHUP tp have daemon reload configuration" to not work.
      This affected any platform not supporting "abstract" Unix-domain
      sockets (i.e. not Linux).

JH/42 Bug 2692: Harden against a peer which reneges on a 452 "too many
      recipients" response to RCPT in a later response, with a 250.  The
      previous coding assumed this would not happen, and under PIPELINING
      would result in both lost and duplicate recipients for a message.

JH/43 Bug 2694: Fix weighted distribution of work to multiple spamd servers.
      Previously the weighting was incorrectly applied.  Similar fix for socks
      proxies.  Found and fixed by Heiko Schlichting.

JH/44 Bug 2701: Fix list-expansion of dns_ipv4_lookup.  Previously, it did
      not handle sub-lists included using the +namedlist syntax.  While
      investigating, the same found for dns_trust_aa, dns_again_means_nonexist,
      dnssec_require_domains, dnssec_request_domains, srv_fail_domains,
      mx_fail_domains.

HS/01 Enforce absolute PID file path name.

HS/02 Handle SIGINT as we handle SIGTERM: terminate the Exim process.

PP/01 Add a too-many-bad-recipients guard to the default config's RCPT ACL.

PP/02 Bug 2643: Correct TLS DH constants.
      A missing NUL termination in our code-generation tool had led to some
      incorrect Diffie-Hellman constants in the Exim source.
      Reported by kylon94, code-gen tool fix by Simon Arlott.

PP/03 Impose security length checks on various command-line options.
      Fixes CVE-2020-SPRSS reported by Qualys.

PP/04 Fix Linux security issue CVE-2020-SLCWD and guard against PATH_MAX
      better.  Reported by Qualys.

PP/05 Fix security issue CVE-2020-PFPSN and guard against cmdline invoker
      providing a particularly obnoxious sender full name.
      Reported by Qualys.

PP/06 Fix CVE-2020-28016 (PFPZA): Heap out-of-bounds write in parse_fix_phrase()

PP/07 Refuse to allocate too little memory, block negative/zero allocations.
      Security guard.

PP/08 Change default for recipients_max from unlimited to 50,000.

PP/09 Fix security issue with too many recipients on a message (to remove a
      known security problem if someone does set recipients_max to unlimited,
      or if local additions add to the recipient list).
      Fixes CVE-2020-RCPTL reported by Qualys.

PP/10 Fix security issue in SMTP verb option parsing
      Fixes CVE-2020-EXOPT reported by Qualys.

PP/11 Fix security issue in BDAT state confusion.
      Ensure we reset known-good where we know we need to not be reading BDAT
      data, as a general case fix, and move the places where we switch to BDAT
      mode until after various protocol state checks.
      Fixes CVE-2020-BDATA reported by Qualys.

HS/03 Die on "/../" in msglog file names

QS/01 Creation of (database) files in $spool_dir: only uid=0 or the uid of
      the Exim runtime user are allowed to create files.

QS/02 PID file creation/deletion: only possible if uid=0 or uid is the Exim
      runtime user.

QS/03 When reading the output from interpreted forward files we do not
      pass the pipe between the parent and the interpreting process to
      executed child processes (if any).

QS/04 Always die if requested from internal logging, even is logging is
      disabled.

Revision 1.78: download - view: text, markup, annotated - select for diffs
Thu Aug 20 16:40:57 2020 UTC (4 years, 3 months ago) by gavan
Branches: MAIN
CVS tags: pkgsrc-2021Q1-base, pkgsrc-2020Q4-base, pkgsrc-2020Q4, pkgsrc-2020Q3-base, pkgsrc-2020Q3
Branch point for: pkgsrc-2021Q1
Diff to: previous 1.77: preferred, colored
Changes since revision 1.77: +2 -1 lines
exim: fix crash on startup if log_buffer is allocated right after taint pool

The check whether a block of memory is tainted erroneously returns true
if the block in question starts the very next byte after a block in the
tainted pool. Depending on the memory allocator, this can cause problems.
For example, on NetBSD/amd64 9.0, this seems to allocate the first tainted
block immediately before log_buffer. This leads to a recursive error in
log_write the first time anything is written to the log, leading to a
segmentation fault when the stack fills up.

Revision 1.77: download - view: text, markup, annotated - select for diffs
Mon Jun 1 19:42:48 2020 UTC (4 years, 6 months ago) by adam
Branches: MAIN
CVS tags: pkgsrc-2020Q2-base, pkgsrc-2020Q2
Diff to: previous 1.76: preferred, colored
Changes since revision 1.76: +5 -5 lines
exim exim-html: updated to 4.94

Exim version 4.94
-----------------

JH/01 Avoid costly startup code when not strictly needed.  This reduces time
      for some exim process initialisations.  It does mean that the logging
      of TLS configuration problems is only done for the daemon startup.

JH/02 Early-pipelining support code is now included unless disabled in Makefile.

JH/03 DKIM verification defaults no long accept sha1 hashes, to conform to
      RFC 8301.  They can still be enabled, using the dkim_verify_hashes main
      option.

JH/04 Support CHUNKING from an smtp transport using a transport_filter, when
      DKIM signing is being done.  Previously a transport_filter would always
      disable CHUNKING, falling back to traditional DATA.

JH/05 Regard command-line receipients as tainted.

JH/06 Bug 340: Remove the daemon pid file on exit, whe due to SIGTERM.

JH/07 Bug 2489: Fix crash in the "pam" expansion condition.  It seems that the
      PAM library frees one of the arguments given to it, despite the
      documentation.  Therefore a plain malloc must be used.

JH/08 Bug 2491: Use tainted buffers for the transport smtp context.  Previously
      on-stack buffers were used, resulting in a taint trap when DSN information
      copied from a received message was written into the buffer.

JH/09 Bug 2493: Harden ARC verify against Outlook, whick has been seen to mix
      the ordering of its ARC headers.  This caused a crash.

JH/10 Bug 2492: Use tainted memory for retry record when needed.  Previously when
      a new record was being constructed with information from the peer, a trap
      was taken.

JH/11 Bug 2494: Unset the default for dmarc_tld_file.  Previously a naiive
      installation would get error messages from DMARC verify, when it hit the
      nonexistent file indicated by the default.  Distros wanting DMARC enabled
      should both provide the file and set the option.
      Also enforce no DMARC verification for command-line sourced messages.

JH/12 Fix an uninitialised flag in early-pipelining.  Previously connections
      could, depending on the platform, hang at the STARTTLS response.

JH/13 Bug 2498: Reset a counter used for ARC verify before handling another
      message on a connection.  Previously if one message had ARC headers and
      the following one did not, a crash could result when adding an
      Authentication-Results: header.

JH/14 Bug 2500: Rewind some of the common-coding in string handling between the
      Exim main code and Exim-related utities.  The introduction of taint
      tracking also did many adjustments to string handling.  Since then, eximon
      frequently terminated with an assert failure.

JH/15 When PIPELINING, synch after every hundred or so RCPT commands sent and
      check for 452 responses.  This slightly helps the inefficieny of doing
      a large alias-expansion into a recipient-limited target.  The max_rcpt
      transport option still applies (and at the current default, will override
      the new feature).  The check is done for either cause of synch, and forces
      a fast-retry of all 452'd recipients using a new MAIL FROM on the same
      connection.  The new facility is not tunable at this time.

JH/16 Fix the variables set by the gsasl authenticator.  Previously a pointer to
      library live data was being used, so the results became garbage.  Make
      copies while it is still usable.

JH/17 Logging: when the deliver_time selector ise set, include the DT= field
      on delivery deferred (==) and failed (**) lines (if a delivery was
      attemtped).  Previously it was only on completion (=>) lines.

JH/18 Authentication: the gsasl driver not provides the $authN variables in time
      for the expansion of the server_scram_iter and server_scram_salt options.

WB/01 SPF: DNS lookups for the obsolete SPF RR type done by the libspf2 library
      are now specifically given a NO_DATA response without hitting the system
      resolver.  The library goes on to do the now-standard TXT lookup.
      Use of dnsdb lookups is not affected.

JH/19 Bug 2507: Modules: on handling a dynamic-module (lookups) open failure,
      only retrieve the errormessage once.  Previously two calls to dlerror()
      were used, and the second one (for mainlog/paniclog) retrieved null
      information.

JH/20 Taint checking: disallow use of tainted data for
      - the appendfile transport file and directory options
      - the pipe transport command
      - the autoreply transport file, log and once options
      - file names used by the redirect router (including filter files)
      - named-queue names
      - paths used by single-key lookups
      Previously this was permitted.

JH/21 Bug 2501: Fix init call in the heimdal authenticator.  Previously it
      adjusted the size of a major service buffer; this failed because the
      buffer was in use at the time.  Change to a compile-time increase in the
      buffer size, when this authenticator is compiled into exim.

JH/22 Taint-checking: move to safe-mode taint checking on all platforms.  The
      previous fast-mode was untenable in the face of glibs using mmap to
      support larger malloc requests.

PP/01 Update the openssl_options possible values through OpenSSL 1.1.1c.
      New values supported, if defined on system where compiled:
      allow_no_dhe_kex, cryptopro_tlsext_bug, enable_middlebox_compat,
      no_anti_replay, no_encrypt_then_mac, prioritize_chacha, tlsext_padding

JH/23 Performance improvement in the initial phase of a two-pass queue run.  By
      running a limited number of proceses in parallel, a benefit is gained. The
      amount varies with the platform hardware and load.  The use of the option
      queue_run_in_order means we cannot do this, as ordering becomes
      indeterminate.

JH/24 Bug 2524: fix the cyrus_sasl auth driver gssapi usage.  A previous fix
      had introduced a string-copy (for ensuring NUL-termination) which was not
      appropriate for that case, which can include embedded NUL bytes in the
      block of data.  Investigation showed the copy to actually be needless, the
      data being length-specified.

JH/25 Fix use of concurrent TLS connections under GnuTLS.  When a callout was
      done during a receiving connection, and both used TLS, global info was
      used rather than per-connection info for tracking the state of data
      queued for transmission.  This could result in a connection hang.

JH/26 Fix use of the SIZE parameter on MAIL commands, on continued connections.
      Previously, when delivering serveral messages down a single connection
      only the first would provide a SIZE.  This was due to the size information
      not being properly tracked.

JH/27 Bug 2530: When operating in a timezone with sub-minute offset, such as
      TAI (at 37 seconds currently), pretend to be in UTC for time-related
      expansion and logging.  Previously, spurious values such as a future
      minute could be seen.

JH/28 Bug 2533: Fix expansion of ${tr } item.  When called in some situations
      it could crash from a null-deref.  This could also affect the
      ${addresses: } operator and ${readsock } item.

JH/29 Bug 2537: Fix $mime_part_count.  When a single connection had a non-mime
      message following a mime one, the variable was not reset.

JH/30 When an pipelined-connect fails at the first response, assume incorrect
      cached capability (perhaps the peer reneged?) and immediately retry in
      non-pipelined mode.

JH/31 Fix spurious detection of timeout while writing to transport filter.

JH/32 Bug 2541: Fix segfault on bad cmdline -f (sender) argument.  Previously
      an attempt to copy the string was made before checking it.

JH/33 Fix the dsearch lookup to return an untainted result.  Previously the
      taint of the lookup key was maintained; we now regard the presence in the
      filesystem as sufficient validation.

JH/34 Fix the readsocket expansion to not segfault when an empty "options"
      argument is supplied.

JH/35 The dsearch lookup now requires that the directory is an absolute path.
      Previously this was not checked, and nonempty relative paths made an
      access under Exim's current working directory.

JH/36 Bug 2554: Fix msg:defer event for the hosts_max_try_hardlimit case.
      Previously no event was raised.

JH/37 Bug 2552: Fix the check on spool space during reception to use the SIZE
      parameter supplied by the sender MAIL FROM command.  Previously it was
      ignored, and only the check_spool_space option value for the required
      leeway checked.

JH/38 Fix $dkim_key_length.  This should, after a DKIM verification, present
      the size of the signing public-key.  Previously it was instead giving
      the size of the signature hash.

JH/39 DKIM verification: the RFC 8301 restriction on sizes of RSA keys is now
      the default.  See the (new) dkim_verify_min_keysizes option.

JH/40 Fix a memory-handling bug: when a connection carried multiple messages
      and an ACL use a lookup for checking either the local_part or domain,
      stale data could be accessed.  Ensure that variable references are
      dropped between messages.

JH/41 Bug 2571: Fix SPA authenticator.  Running as a server, an offset supplied
      by the client was not checked as pointing within response data before
      being used.  A malicious client could thus cause an out-of-bounds read and
      possibly gain authentication.  Fix by adding the check.

JH/42 Internationalisation: change the default for downconversion in the smtp
      transport to be "if needed".  Previously it was "as previously set" for
      the message, which usually meant "if needed" for message-submission but
      "no" for everything else.  However, MTAs have been seen using SMTPUTF8
      even when the envelope addresses did not need it, resulting in forwarding
      failures to non-supporting MTAs.  A downconvert in such cases will be
      a no-op on the addresses, merely dropping the use of SMTPUTF8 by the
      transport.  The change does mean that addresses needing conversion will
      be converted when previously a delivery failure would occur.

JH/43 Fix possible long line in DSN.  Previously when a very long SMTP error
      response was received it would be used unchecked in a fail-DSN, violating
      standards on line-length limits.  Truncate if needed.

HS/01 Remove parameters of the link to www.open-spf.org. The linked form
      doesn't work. (Additionally add a new main config option to configure the
      spf_smtp_comment)

Revision 1.76: download - view: text, markup, annotated - select for diffs
Sat Apr 25 12:48:57 2020 UTC (4 years, 7 months ago) by gavan
Branches: MAIN
Diff to: previous 1.75: preferred, colored
Changes since revision 1.75: +2 -1 lines
Patch exicyclog to work when commands have spaces in them

By default, pkgsrc uses 'mv -f' as MV_COMMAND. exicyclog is not resilient
to this, and breaks as a result. This patch quotes the command names
that are substituted into this script.

Revision 1.75: download - view: text, markup, annotated - select for diffs
Tue Apr 14 19:34:39 2020 UTC (4 years, 7 months ago) by wiz
Branches: MAIN
Diff to: previous 1.74: preferred, colored
Changes since revision 1.74: +5 -5 lines
exim: update to 4.93.0.4.

Based on patch provided by Mike Pumford on pkgsrc-users.

Exim version 4.93+fixes
-----------------------
This is not an official release. It is just a branch, collecting
proposed bugfixes. Depending on your environment the fixes may be
necessary to build and/or run Exim successfully.

JH/05 Regard command-line receipients as tainted.

JH/07 Bug 2489: Fix crash in the "pam" expansion condition.  It seems that the
      PAM library frees one of the arguments given to it, despite the
      documentation.  Therefore a plain malloc must be used.

JH/08 Bug 2491: Use tainted buffers for the transport smtp context.  Previously
      on-stack buffers were used, resulting in a taint trap when DSN information
      copied from a received message was written into the buffer.

JH/09 Bug 2493: Harden ARC verify against Outlook, whick has been seen to mix
      the ordering of its ARC headers.  This caused a crash.

JH/10 Bug 2492: Use tainted memory for retry record when needed.  Previously when
      a new record was being constructed with information from the peer, a trap
      was taken.

JH/11 Bug 2494: Unset the default for dmarc_tld_file.  Previously a naiive
      installation would get error messages from DMARC verify, when it hit the
      nonexistent file indicated by the default.  Distros wanting DMARC enabled
      should both provide the file and set the option.
      Also enforce no DMARC verification for command-line sourced messages.

JH/12 Fix an uninitialised flag in early-pipelining.  Previously connections
      could, depending on the platform, hang at the STARTTLS response.

JH/13 Bug 2498: Reset a counter used for ARC verify before handling another
      message on a connection.  Previously if one message had ARC headers and
      the following one did not, a crash could result when adding an
      Authentication-Results: header.

JH/14 Bug 2500: Rewind some of the common-coding in string handling between the
      Exim main code and Exim-related utities.  The introduction of taint
      tracking also did many adjustments to string handling.  Since then, eximon
      frequently terminated with an assert failure.

JH/16 Fix the variables set by the gsasl authenticator.  Previously a pointer to
      library live data was being used, so the results became garbage.  Make
      copies while it is still usable.

Revision 1.74: download - view: text, markup, annotated - select for diffs
Mon Dec 9 18:46:00 2019 UTC (5 years ago) by adam
Branches: MAIN
CVS tags: pkgsrc-2020Q1-base, pkgsrc-2020Q1, pkgsrc-2019Q4-base, pkgsrc-2019Q4
Diff to: previous 1.73: preferred, colored
Changes since revision 1.73: +6 -6 lines
exim: updated to 4.93

Exim version 4.93
-----------------

JH/01 OpenSSL: With debug enabled output keying information sufficient, server
      side, to decode a TLS 1.3 packet capture.

JH/02 OpenSSL: Suppress the sending of (stateful) TLS1.3 session tickets.
      Previously the default library behaviour applied, sending two, each in
      its own TCP segment.

JH/03 Debug output for ACL now gives the config file name and line number for
      each verb.

JH/04 The default received_header_text now uses the RFC 8314 tls cipher clause.

JH/05 DKIM: ensure that dkim_domain elements are lowercased before use.

JH/06 Fix buggy handling of autoreply bounce_return_size_limit, and a possible
      buffer overrun for (non-chunking) other transports.

JH/07 GnuTLS: Our use of late (post-handshake) certificate verification, under
      TLS1.3, means that a server rejecting a client certificate is not visible
      to the client until the first read of encrypted data (typically the
      response to EHLO).  Add detection for that case and treat it as a failed
      TLS connection attempt, so that the normal retry-in-clear can work (if
      suitably configured).

JB/01 Bug 2375: fix expansions of 822 addresses having comments in local-part
      and/or domain.  Found and fixed by Jason Betts.

JH/08 Add hardening against SRV & TLSA lookups the hit CNAMEs (a nonvalid
      configuration).  If a CNAME target was not a wellformed name pattern, a
      crash could result.

JH/09 Logging: Fix initial listening-on line for multiple ports for an IP when
      the OS reports them interleaved with other addresses.

JH/10 OpenSSL: Fix aggregation of messages.  Previously, when PIPELINING was
      used both for input and for a verify callout, both encrypted, SMTP
      responses being sent by the server could be lost.  This resulted in
      dropped connections and sometimes bounces generated by a peer sending
      to this system.

JH/11 Harden plaintext authenticator against a badly misconfigured client-send
      string.  Previously it was possible to cause undefined behaviour in a
      library routine (usually a crash).  Found by "zerons".

JH/12 Bug 2384: fix "-bP smtp_receive_timeout".  Previously it returned no
      output.

JH/13 Bug 2386: Fix builds with Dane under LibreSSL 2.9.0 onward.  Some old
      API was removed, so update to use the newer ones.

JH/14 Bug 1891: Close the log file if receiving a non-smtp message, without
      any timeout set, is taking a long time.  Previously we would hang on to a
      rotated logfile "forever" if the input was arriving with long gaps
      (a previous attempt to fix addressed lack, for a long time, of initial
      input).

HS/01 Bug 2390: Use message_id for tempfile creation to avoid races in a
      shared (NFS) environment. The length of the tempfile name is now
      4 + 16 ("hdr.$message_exim_id") which might break on file
      systems which restrict the file name length to lower values.
      (It was "hdr.$pid".)

HS/02 Bug 2390: Use message_id for tempfile creation to avoid races in a
      shared (NFS) environment.

HS/03 Bug 2392: exigrep does case sensitive *option* processing (as it
      did for all versions <4.90). Notably -M, -m, --invert, -I may be
      affected.

JH/15 Use unsigned when creating bitmasks in macros, to avoid build errors
      on some platforms for bit 31.

JH/16 GnuTLS: rework ciphersuite strings under recent library versions.  Thanks
      to changes apparently associated with TLS1.3 handling some of the APIs
      previously used were either nonfunctional or inappropriate.  Strings
      like TLS1.3:ECDHE_SECP256R1__RSA_PSS_RSAE_SHA256__AES_256_GCM__AEAD:256
      and TLS1.2:ECDHE_SECP256R1__RSA_SHA256__AES_128_CBC__SHA256:128 replace
      the previous TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256 .
      This affects log line X= elements, the $tls_{in,out}_cipher variables,
      and the use of specific cipher names in the encrypted= ACL condition.

JH/17 OpenSSL: the default openssl_options now disables ssl_v3.

JH/18 GnuTLS: fix $tls_out_ocsp under hosts_request_ocsp. Previously the
      verification result was not updated unless hosts_require_ocsp applied.

JH/19 Bug 2398: fix listing of a named-queue.  Previously, even with the option
      queue_list_requires_admin set to false, non-admin users were denied the
      facility.

JH/20 Bug 2389: fix server advertising of usable certificates, under GnuTLS in
      directory-of-certs mode.  Previously they were advertised despite the
      documentation.

JH/21 The smtp transport option "hosts_noproxy_tls" is now unset by default.
      A single TCP connection by a client will now hold a TLS connection open
      for multiple message deliveries, by default.  Previoud the default was to
      not do so.

JH/22 The smtp transport option "hosts_try_dane" now enables all hosts by
      default.  If built with the facility, DANE will be used.  The facility
      SUPPORT_DANE is now enabled in the prototype build Makefile "EDITME".

JH/23 The build default is now for TLS to be included; the SUPPORT_TLS define
      is replaced with DISABLE_TLS.  Either USE_GNUTLS or (the new) USE_OPENSSL
      must be defined and you must still, unless you define DISABLE_TLS, manage
      the the include-dir and library-file requirements that go with that
      choice.  Non-TLS builds are still supported.

JH/24 Fix duplicated logging of peer name/address, on a transport connection-
      reject under TFO.

JH/25 The smtp transport option "hosts_try_fastopen" now enables all hosts by
      default.  If the platform supports and has the facility enabled, it will
      be requested on all coneections.

JH/26 The PIPE_CONNECT facility is promoted from experimental status and is now
      controlled by the build-time option SUPPORT_PIPE_CONNECT.

PP/01 Unbreak heimdal_gssapi, broken in 4.92.

JH/27 Bug 2404: Use the main-section configuration option "dsn_from" for
      success-DSN messages.  Previously the From: header was always the default
      one for these; the option was ignored.

JH/28 Fix the timeout on smtp response to apply to the whole response.
      Previously it was reset for every read, so a teergrubing peer sending
      single bytes within the time limit could extend the connection for a
      long time.  Credit to Qualsys Security Advisory Team for the discovery.

JH/29 Fix DSN Final-Recipient: field.  Previously it was the post-routing
      delivery address, which leaked information of the results of local
      forwarding.  Change to the original envelope recipient address, per
      standards.

JH/30 Bug 2411: Fix DSN generation when RFC 3461 failure notification is
      requested.  Previously not bounce was generated and a log entry of
      error ignored was made.

JH/31 Avoid re-expansion in ${sort } expansion. (CVE-2019-13917)

JH/32 Introduce a general tainting mechanism for values read from the input
      channel, and values derived from them.  Refuse to expand any tainted
      values, to catch one form of exploit.

JH/33 Bug 2413: Fix dkim_strict option.  Previously the expansion result
      was unused and the unexpanded text used for the test.  Found and
      fixed by Ruben Jenster.

JH/34 Fix crash after TLS shutdown.  When the TCP/SMTP channel was left open,
      an attempt to use a TLS library read routine dereffed a nul pointer,
      causing a segfault.

JH/35 Bug 2409: filter out-of-spec chars from callout response before using
      them in our smtp response.

JH/36 Have the general router option retry_use_local_part default to true when
      any of the restrictive preconditions are set (to anything).  Previously it
      was only for check_local user.  The change removes one item of manual
      configuration which is required for proper retries when a remote router
      handles a subset of addresses for a domain.

JH/37 Appendfile: when evaluating quota use (non-quota_size_regex) take the file
      link count into consideration.

HS/04 Fix handling of very log lines in -H files. If a -<key> <value> line
      caused the extension of big_buffer, the following lines were ignored.

JH/38 Bug 1395: Teach the DNS negative-cache about TTL value from the SOA in
      accordance with RFC 2308.  Previously there was no expiry, so a longlived
      receive process (eg. due to ACL delays) versus a short SOA value could
      surprise.

HS/05 Handle trailing backslash gracefully. (CVE-2019-15846)

JH/39 Promote DMARC support to mainline.

JH/40 Bug 2452: Add a References: header to DSNs.

JH/41 With GnuTLS 3.6.0 (and later) do not attempt to manage Diffie-Hellman
      parameters.  The relevant library call is documented as "Deprecated: This
      function is unnecessary and discouraged on GnuTLS 3.6.0 or later. Since
      3.6.0, DH parameters are negotiated following RFC7919."

HS/06 Change the default of dnssec_request_domains to "*"

JH/42 Bug 2545: Fix CHUNKING for all RCPT commands rejected.  Previously we
      carried on and emitted a BDAT command, even when PIPELINING was not
      active.

JH/43 Bug 2465: Fix taint-handling in dsearch lookup.  Previously a nontainted
      buffer was used for the filename, resulting in a trap when tainted
      arguments (eg. $domain) were used.

JH/44 With OpenSSL 1.1.1 (onwards) disable renegotiation for TLS1.2 and below;
      recommended to avoid a possible server-load attack.  The feature can be
      re-enabled via the openssl_options main cofiguration option.

JH/45 local_scan API: documented the current smtp_printf() call. This changed
      for version 4.90 - adding a "more data" boolean to the arguments.
      Bumped the ABI version number also, this having been missed previously;
      release versions 4.90 to 4.92.3 inclusive were effectively broken in
      respect of usage of smtp_printf() by either local_scan code or libraries
      accessed via the ${dlfunc } expansion item.  Both will need coding
      adjustment for any calls to smtp_printf() to match the new function
      signature; a FALSE value for the new argument is always safe.

JH/46 FreeBSD: fix use of the sendfile() syscall.  The shim was not updating
      the file-offset (which the Linux syscall does, and exim expects); this
      resulted in an indefinite loop.

JH/47 ARC: fix crash in signing, triggered when a configuration error failed
      to do ARC verification.  The Authentication-Results: header line added
      by the configuration then had no ARC item.

Revision 1.73: download - view: text, markup, annotated - select for diffs
Mon Sep 30 19:25:58 2019 UTC (5 years, 2 months ago) by wiedi
Branches: MAIN
CVS tags: pkgsrc-2019Q3-base, pkgsrc-2019Q3
Diff to: previous 1.72: preferred, colored
Changes since revision 1.72: +5 -5 lines
exim: update to 4.92.3

Fix for CVE-2019-16928

Revision 1.70.4.2: download - view: text, markup, annotated - select for diffs
Fri Sep 6 18:43:35 2019 UTC (5 years, 3 months ago) by bsiegert
Branches: pkgsrc-2019Q2
Diff to: previous 1.70.4.1: preferred, colored; branchpoint 1.70: preferred, colored; next MAIN 1.71: preferred, colored
Changes since revision 1.70.4.1: +5 -5 lines
Pullup ticket #6049 - requested by wiedi
mail/exim: security fix (remote root)

Revisions pulled up:
- mail/exim/Makefile                                            1.170
- mail/exim/distinfo                                            1.72

---
   Module Name:    pkgsrc
   Committed By:   wiedi
   Date:           Fri Sep  6 12:57:33 UTC 2019

   Modified Files:
           pkgsrc/mail/exim: Makefile distinfo

   Log Message:
   exim: update to 4.92.2

   Exim version 4.92.2
   -------------------

   HS/01 Handle trailing backslash gracefully. (CVE-2019-15846)

Revision 1.72: download - view: text, markup, annotated - select for diffs
Fri Sep 6 12:57:33 2019 UTC (5 years, 3 months ago) by wiedi
Branches: MAIN
Diff to: previous 1.71: preferred, colored
Changes since revision 1.71: +5 -5 lines
exim: update to 4.92.2

Exim version 4.92.2
-------------------

HS/01 Handle trailing backslash gracefully. (CVE-2019-15846)

Revision 1.70.4.1: download - view: text, markup, annotated - select for diffs
Fri Aug 9 13:25:41 2019 UTC (5 years, 4 months ago) by bsiegert
Branches: pkgsrc-2019Q2
Diff to: previous 1.70: preferred, colored
Changes since revision 1.70: +5 -5 lines
Pullup ticket #6016 - requested by abs
mail/exim: security fix

Revisions pulled up:
- mail/exim/Makefile                                            1.168
- mail/exim/distinfo                                            1.71

---
   Module Name:    pkgsrc
   Committed By:   abs
   Date:           Sun Jul 28 21:17:28 UTC 2019

   Modified Files:
           pkgsrc/mail/exim: Makefile distinfo

   Log Message:
   Updated mail/exim to 4.92.1

   Exim version 4.92.1
   -------------------

   JH/31 Avoid re-expansion in ${sort } expansion.
   (CVE-2019-13917, OVE-20190718-0006)

Revision 1.71: download - view: text, markup, annotated - select for diffs
Sun Jul 28 21:17:28 2019 UTC (5 years, 4 months ago) by abs
Branches: MAIN
Diff to: previous 1.70: preferred, colored
Changes since revision 1.70: +5 -5 lines
Updated mail/exim to 4.92.1

Exim version 4.92.1
-------------------

JH/31 Avoid re-expansion in ${sort } expansion.
(CVE-2019-13917, OVE-20190718-0006)

Revision 1.70: download - view: text, markup, annotated - select for diffs
Sun Feb 24 20:31:00 2019 UTC (5 years, 9 months ago) by adam
Branches: MAIN
CVS tags: pkgsrc-2019Q2-base, pkgsrc-2019Q1-base, pkgsrc-2019Q1
Branch point for: pkgsrc-2019Q2
Diff to: previous 1.69: preferred, colored
Changes since revision 1.69: +5 -5 lines
exim: updated to 4.92

4.92:
New features include:
- ${l_header:<name>} expansion
- ${readsocket} now supports TLS
- "utf8_downconvert" option (if built with SUPPORT_I18N)
- "pipelining" log_selector
- JSON variants for ${extract } expansion
- "noutf8" debug option
- TCP Fast Open support on MacOS

Revision 1.69: download - view: text, markup, annotated - select for diffs
Mon Apr 23 07:28:18 2018 UTC (6 years, 7 months ago) by adam
Branches: MAIN
CVS tags: pkgsrc-2018Q4-base, pkgsrc-2018Q4, pkgsrc-2018Q3-base, pkgsrc-2018Q3, pkgsrc-2018Q2-base, pkgsrc-2018Q2
Diff to: previous 1.68: preferred, colored
Changes since revision 1.68: +5 -5 lines
exim: updated to 4.91

Version 4.91

 1. Dual-certificate stacks on servers now support OCSP stapling, under GnuTLS
    version 3.5.6 or later.

 2. DANE is now supported under GnuTLS version 3.0.0 or later.  Both GnuTLS and
    OpenSSL versions are moved to mainline support from Experimental.
    New SMTP transport option "dane_require_tls_ciphers".

 3. Feature macros for the compiled-in set of malware scanner interfaces.

 4. SPF support is promoted from Experimental to mainline status.  The template
    src/EDITME makefile does not enable its inclusion.

 5. Logging control for DKIM verification.  The existing DKIM log line is
    controlled by a "dkim_verbose" selector which is _not_ enabled by default.
    A new tag "DKIM=<domain>" is added to <= lines by default, controlled by
    a "dkim" log_selector.

 6. Receive duration on <= lines, under a new log_selector "receive_time".

 7. Options "ipv4_only" and "ipv4_prefer" on the dnslookup router and on
    routing rules in the manualroute router.

 8. Expansion item ${sha3:<string>} / ${sha3_<N>:<string>} now also supported
    under OpenSSL version 1.1.1 or later.

 9. DKIM operations can now use the Ed25519 algorithm in addition to RSA, under
    GnuTLS 3.6.0 or OpenSSL 1.1.1 or later.

10. Builtin feature-macros _CRYPTO_HASH_SHA3 and _CRYPTO_SIGN_ED25519, library
    version dependent.

11. "exim -bP macro <name>" returns caller-usable status.

12. Expansion item ${authresults {<machine>}} for creating an
    Authentication-Results: header.

13. EXPERIMENTAL_ARC.  See the experimental.spec file.
    See also new util/renew-opendmarc-tlds.sh script for use with DMARC/ARC.

14: A dane:fail event, intended to facilitate reporting.

15. "Lightweight" support for Redis Cluster. Requires redis_servers list to
    contain all the servers in the cluster, all of which must be reachable from
    the running exim instance. If the cluster has master/slave replication, the
    list must contain all the master and slave servers.

16. Add an option to the Avast scanner interface: "pass_unscanned". This
    allows to treat unscanned files as clean. Files may be unscanned for
    several reasons: decompression bombs, broken archives.

Revision 1.67.10.1: download - view: text, markup, annotated - select for diffs
Thu Mar 8 20:22:06 2018 UTC (6 years, 9 months ago) by spz
Branches: pkgsrc-2017Q4
Diff to: previous 1.67: preferred, colored; next MAIN 1.68: preferred, colored
Changes since revision 1.67: +5 -5 lines
Pullup ticket #5719 - requested by maya
mail/exim-html: security update

Revisions pulled up:
- mail/exim-html/Makefile                                       1.36
- mail/exim-html/PLIST                                          1.17
- mail/exim-html/distinfo                                       1.29
- mail/exim/Makefile                                            1.158
- mail/exim/distinfo                                            1.68
- mail/exim/files/Makefile-DragonFly                            deleted
- mail/exim/files/os.h-DragonFly                                deleted

-------------------------------------------------------------------
   Module Name:    pkgsrc
   Committed By:   adam
   Date:           Wed Mar  7 08:24:47 UTC 2018

   Modified Files:
           pkgsrc/mail/exim: Makefile distinfo
           pkgsrc/mail/exim-html: Makefile PLIST distinfo
   Removed Files:
           pkgsrc/mail/exim/files: Makefile-DragonFly os.h-DragonFly

   Log Message:
   exim: updated to 4.90.1

   Exim version 4.90.1

   JH/03 Fix pgsql lookup for multiple result-tuples with a single column.
         Previously only the last row was returned.

   JH/04 Bug 2217: Tighten up the parsing of DKIM signature headers. Previously
         we assumed that tags in the header were well-formed, and parsed the
         element content after inspecting only the first char of the tag.
         Assumptions at that stage could crash the receive process on malformed
         input.

   JH/05 Bug 2215: Fix crash associated with dnsdb lookup done from DKIM ACL.
         While running the DKIM ACL we operate on the Permanent memory pool so that
         variables created with "set" persist to the DATA ACL.  Also (at any time)
         DNS lookups that fail create cache records using the Permanent pool.  But
         expansions release any allocations made on the current pool - so a dnsdb
         lookup expansion done in the DKIM ACL releases the memory used for the
         DNS negative-cache, and bad things result.  Solution is to switch to the
         Main pool for expansions.
         While we're in that code, add checks on the DNS cache during store_reset,
         active in the testsuite.
         Problem spotted, and debugging aided, by Wolfgang Breyha.

   JH/06 Fix issue with continued-connections when the DNS shifts unreliably.
         When none of the hosts presented to a transport match an already-open
         connection, close it and proceed with the list.  Previously we would
         queue the message.  Spotted by Lena with Yahoo, probably involving
         round-robin DNS.

   JH/07 Bug 2214: Fix SMTP responses resulting from non-accept result of MIME ACL.
         Previously a spurious "250 OK id=" response was appended to the proper
         failure response.

   JH/10 Bug 2223: Fix mysql lookup returns for the no-data case (when the number of
         rows affected is given instead).

   JH/12 Bug 2230: Fix cutthrough routing for nonfirst messages in an initiating
         SMTP connection.  Previously, when one had more receipients than the
         first, an abortive onward connection was made.  Move to full support for
         multiple onward connections in sequence, handling cutthrough connection
         for all multi-message initiating connections.

   JH/13 Bug 2229: Fix cutthrough routing for nonstandard port numbers defined by
         routers.  Previously, a multi-recipient message would fail to match the
         onward-connection opened for the first recipient, and cause its closure.

   JH/14 Bug 2174: A timeout on connect for a callout was also erroneously seen as
         a timeout on read on a GnuTLS initiating connection, resulting in the
         initiating connection being dropped.  This mattered most when the callout
         was marked defer_ok.  Fix to keep the two timeout-detection methods
         separate.

   HS/01 Fix Buffer overflow in base64d() (CVE-2018-6789)

   JH/16 Fix bug in DKIM verify: a buffer overflow could corrupt the malloc
         metadata, resulting in a crash in free().

   PP/01 Fix broken Heimdal GSSAPI authenticator integration.
         Broken in f2ed27cf5, missing an equals sign for specified-initialisers.
         Broken also in d185889f4, with init system revamp.


   To generate a diff of this commit:
   cvs rdiff -u -r1.157 -r1.158 pkgsrc/mail/exim/Makefile
   cvs rdiff -u -r1.67 -r1.68 pkgsrc/mail/exim/distinfo
   cvs rdiff -u -r1.35 -r1.36 pkgsrc/mail/exim-html/Makefile
   cvs rdiff -u -r1.16 -r1.17 pkgsrc/mail/exim-html/PLIST
   cvs rdiff -u -r1.28 -r1.29 pkgsrc/mail/exim-html/distinfo
   cvs rdiff -u -r1.1 -r0 pkgsrc/mail/exim/files/Makefile-DragonFly \
       pkgsrc/mail/exim/files/os.h-DragonFly

Revision 1.68: download - view: text, markup, annotated - select for diffs
Wed Mar 7 08:24:47 2018 UTC (6 years, 9 months ago) by adam
Branches: MAIN
CVS tags: pkgsrc-2018Q1-base, pkgsrc-2018Q1
Diff to: previous 1.67: preferred, colored
Changes since revision 1.67: +5 -5 lines
exim: updated to 4.90.1

Exim version 4.90.1

JH/03 Fix pgsql lookup for multiple result-tuples with a single column.
      Previously only the last row was returned.

JH/04 Bug 2217: Tighten up the parsing of DKIM signature headers. Previously
      we assumed that tags in the header were well-formed, and parsed the
      element content after inspecting only the first char of the tag.
      Assumptions at that stage could crash the receive process on malformed
      input.

JH/05 Bug 2215: Fix crash associated with dnsdb lookup done from DKIM ACL.
      While running the DKIM ACL we operate on the Permanent memory pool so that
      variables created with "set" persist to the DATA ACL.  Also (at any time)
      DNS lookups that fail create cache records using the Permanent pool.  But
      expansions release any allocations made on the current pool - so a dnsdb
      lookup expansion done in the DKIM ACL releases the memory used for the
      DNS negative-cache, and bad things result.  Solution is to switch to the
      Main pool for expansions.
      While we're in that code, add checks on the DNS cache during store_reset,
      active in the testsuite.
      Problem spotted, and debugging aided, by Wolfgang Breyha.

JH/06 Fix issue with continued-connections when the DNS shifts unreliably.
      When none of the hosts presented to a transport match an already-open
      connection, close it and proceed with the list.  Previously we would
      queue the message.  Spotted by Lena with Yahoo, probably involving
      round-robin DNS.

JH/07 Bug 2214: Fix SMTP responses resulting from non-accept result of MIME ACL.
      Previously a spurious "250 OK id=" response was appended to the proper
      failure response.

JH/10 Bug 2223: Fix mysql lookup returns for the no-data case (when the number of
      rows affected is given instead).

JH/12 Bug 2230: Fix cutthrough routing for nonfirst messages in an initiating
      SMTP connection.  Previously, when one had more receipients than the
      first, an abortive onward connection was made.  Move to full support for
      multiple onward connections in sequence, handling cutthrough connection
      for all multi-message initiating connections.

JH/13 Bug 2229: Fix cutthrough routing for nonstandard port numbers defined by
      routers.  Previously, a multi-recipient message would fail to match the
      onward-connection opened for the first recipient, and cause its closure.

JH/14 Bug 2174: A timeout on connect for a callout was also erroneously seen as
      a timeout on read on a GnuTLS initiating connection, resulting in the
      initiating connection being dropped.  This mattered most when the callout
      was marked defer_ok.  Fix to keep the two timeout-detection methods
      separate.

HS/01 Fix Buffer overflow in base64d() (CVE-2018-6789)

JH/16 Fix bug in DKIM verify: a buffer overflow could corrupt the malloc
      metadata, resulting in a crash in free().

PP/01 Fix broken Heimdal GSSAPI authenticator integration.
      Broken in f2ed27cf5, missing an equals sign for specified-initialisers.
      Broken also in d185889f4, with init system revamp.

Revision 1.67: download - view: text, markup, annotated - select for diffs
Sat Mar 18 07:08:23 2017 UTC (7 years, 8 months ago) by adam
Branches: MAIN
CVS tags: pkgsrc-2017Q4-base, pkgsrc-2017Q3-base, pkgsrc-2017Q3, pkgsrc-2017Q2-base, pkgsrc-2017Q2, pkgsrc-2017Q1-base, pkgsrc-2017Q1
Branch point for: pkgsrc-2017Q4
Diff to: previous 1.66: preferred, colored
Changes since revision 1.66: +8 -8 lines
Version 4.89
------------

 1. Allow relative config file names for ".include"

 2. A main-section config option "debug_store" to control the checks on
    variable locations during store-reset.  Normally false but can be enabled
    when a memory corrution issue is suspected on a production system.

Revision 1.66: download - view: text, markup, annotated - select for diffs
Sun Dec 25 11:29:54 2016 UTC (7 years, 11 months ago) by wiedi
Branches: MAIN
CVS tags: pkgsrc-2016Q4-base, pkgsrc-2016Q4
Diff to: previous 1.65: preferred, colored
Changes since revision 1.65: +6 -6 lines
Update exim to 4.88
Security update to address CVE-2016-9963

Exim version 4.88
-----------------
JH/01 Use SIZE on MAIL FROM in a cutthrough connection, if the destination
      supports it and a size is available (ie. the sending peer gave us one).

JH/02 The obsolete acl condition "demime" is removed (finally, after ten
      years of being deprecated). The replacements are the ACLs
      acl_smtp_mime and acl_not_smtp_mime.

JH/03 Upgrade security requirements imposed for hosts_try_dane: previously
      a downgraded non-dane trust-anchor for the TLS connection (CA-style)
      or even an in-clear connection were permitted.  Now, if the host lookup
      was dnssec and dane was requested then the host is only used if the
      TLSA lookup succeeds and is dnssec.  Further hosts (eg. lower priority
      MXs) will be tried (for hosts_try_dane though not for hosts_require_dane)
      if one fails this test.
      This means that a poorly-configured remote DNS will make it incommunicado;
      but it protects against a DNS-interception attack on it.

JH/04 Bug 1810: make continued-use of an open smtp transport connection
      non-noisy when a race steals the message being considered.

JH/05 If main configuration option tls_certificate is unset, generate a
      self-signed certificate for inbound TLS connections.

JH/06 Bug 165: hide more cases of password exposure - this time in expansions
      in rewrites and routers.

JH/07 Retire gnutls_require_mac et.al.  These were nonfunctional since 4.80
      and logged a warning sing 4.83; now they are a configuration file error.

JH/08 Bug 1836: Fix crash in VRFY handling when handed an unqualified name
      (lacking @domain).  Apply the same qualification processing as RCPT.

JH/09 Bug 1804: Avoid writing msglog files when in -bh or -bhc mode.

JH/10 Support ${sha256:} applied to a string (as well as the previous
      certificate).

JH/11 Cutthrough: avoid using the callout hints db on a verify callout when
      a cutthrough deliver is pending, as we always want to make a connection.
      This also avoids re-routing the message when later placing the cutthrough
      connection after a verify cache hit.
      Do not update it with the verify result either.

JH/12 Cutthrough: disable when verify option success_on_redirect is used, and
      when routing results in more than one destination address.

JH/13 Cutthrough: expand transport dkim_domain option when testing for dkim
      signing (which inhibits the cutthrough capability).  Previously only
      the presence of an option was tested; now an expansion evaluating as
      empty is permissible (obviously it should depend only on data available
      when the cutthrough connection is made).

JH/14 Fix logging of errors under PIPELINING.  Previously the log line giving
      the relevant preceding SMTP command did not note the pipelining mode.

JH/15 Fix counting of empty lines in $body_linecount and $message_linecount.
      Previously they were not counted.

JH/16 DANE: treat a TLSA lookup response having all non-TLSA RRs, the same
      as one having no matching records.  Previously we deferred the message
      that needed the lookup.

JH/17 Fakereject: previously logged as a norml message arrival "<="; now
      distinguished as "(=".

JH/18 Bug 1867: make the fail_defer_domains option on a dnslookup router work
      for missing MX records.  Previously it only worked for missing A records.

JH/19 Bug 1850: support Radius libraries that return REJECT_RC.

JH/20 Bug 1872: Ensure that acl_smtp_notquit is run when the connection drops
      after the data-go-ahead and data-ack.  Patch from Jason Betts.

JH/21 Bug 1846: Send DMARC forensic reports for reject and quaratine results,
      even for a "none" policy.  Patch from Tony Meyer.

JH/22 Fix continued use of a connection for further deliveries. If a port was
      specified by a router, it must also match for the delivery to be
      compatible.

JH/23 Bug 1874: fix continued use of a connection for further deliveries.
      When one of the recipients of a message was unsuitable for the connection
      (has no matching addresses), we lost track of needing to mark it
      deferred.  As a result mail would be lost.

JH/24 Bug 1832: Log EHLO response on getting conn-close response for HELO.

JH/25 Decoding ACL controls is now done using a binary search; the source code
      takes up less space and should be simpler to maintain.  Merge the ACL
      condition decode tables also, with similar effect.

JH/26 Fix problem with one_time used on a redirect router which returned the
      parent address unchanged.  A retry would see the parent address marked as
      delivered, so not attempt the (identical) child.  As a result mail would
      be lost.

JH/27 Fix a possible security hole, wherein a process operating with the Exim
      UID can gain a root shell.  Credit to http://www.halfdog.net/ for
      discovery and writeup.  Ubuntu bug 1580454; no bug raised against Exim
      itself :(

JH/28 Enable {spool,log} filesystem space and inode checks as default.
      Main config options check_{log,spool}_{inodes,space} are now
      100 inodes, 10MB unless set otherwise in the configuration.

JH/29 Fix the connection_reject log selector to apply to the connect ACL.
      Previously it only applied to the main-section connection policy
      options.

JH/30 Bug 1897: fix callouts connection fallback from TLS to cleartext.

PP/01 Changed default Diffie-Hellman parameters to be Exim-specific, created
      by me.  Added RFC7919 DH primes as an alternative.

PP/02 Unbreak build via pkg-config with new hash support when crypto headers
      are not in the system include path.

JH/31 Fix longstanding bug with aborted TLS server connection handling.  Under
      GnuTLS, when a session startup failed (eg because the client disconnected)
      Exim did stdio operations after fclose.  This was exposed by a recent
      change which nulled out the file handle after the fclose.

JH/32 Bug 1909: Fix OCSP proof verification for cases where the proof is
      signed directly by the cert-signing cert, rather than an intermediate
      OCSP-signing cert.  This is the model used by LetsEncrypt.

JH/33 Bug 1914: Ensure socket is nonblocking before draining after SMTP QUIT.

HS/01 Fix leak in verify callout under GnuTLS, about 3MB per recipient on
      an incoming connection.

HS/02 Bug 1802: Do not half-close the connection after sending a request
      to rspamd.

HS/03 Use "auto" as the default EC curve parameter. For OpenSSL < 1.0.2
      fallback to "prime256v1".

JH/34 SECURITY: Use proper copy of DATA command in error message.
      Could leak key material.  Remotely explaoitable.  CVE-2016-9963.

ok wiz@

Revision 1.65: download - view: text, markup, annotated - select for diffs
Sat Apr 9 10:49:39 2016 UTC (8 years, 8 months ago) by adam
Branches: MAIN
CVS tags: pkgsrc-2016Q3-base, pkgsrc-2016Q3, pkgsrc-2016Q2-base, pkgsrc-2016Q2
Diff to: previous 1.64: preferred, colored
Changes since revision 1.64: +5 -6 lines
Version 4.87

 1. The ACL conditions regex and mime_regex now capture substrings
    into numeric variables $regex1 to 9, like the "match" expansion condition.

 2. New $callout_address variable records the address used for a spam=,
    malware= or verify= callout.

 3. Transports now take a "max_parallel" option, to limit concurrency.

 4. Expansion operators ${ipv6norm:<string>} and ${ipv6denorm:<string>}.
    The latter expands to a 8-element colon-sep set of hex digits including
    leading zeroes. A trailing ipv4-style dotted-decimal set is converted
    to hex.  Pure ipv4 addresses are converted to IPv4-mapped IPv6.
    The former operator strips leading zeroes and collapses the longest
    set of 0-groups to a double-colon.

 5. New "-bP config" support, to dump the effective configuration.

 6. New $dkim_key_length variable.

 7. New base64d and base64 expansion items (the existing str2b64 being a
    synonym of the latter).  Add support in base64 for certificates.

 8. New main configuration option "bounce_return_linesize_limit" to
    avoid oversize bodies in bounces. The dafault value matches RFC
    limits.

 9. New $initial_cwd expansion variable.

Revision 1.62.2.1: download - view: text, markup, annotated - select for diffs
Thu Mar 3 20:22:52 2016 UTC (8 years, 9 months ago) by bsiegert
Branches: pkgsrc-2015Q4
Diff to: previous 1.62: preferred, colored; next MAIN 1.63: preferred, colored
Changes since revision 1.62: +6 -6 lines
Pullup ticket #4942 - requested by wiedi
mail/exim: security fix

Revisions pulled up:
- mail/exim-html/Makefile                                       1.30-1.31
- mail/exim-html/PLIST                                          1.14
- mail/exim-html/distinfo                                       1.25-1.26
- mail/exim/Makefile                                            1.142-1.143
- mail/exim/distinfo                                            1.63-1.64
- mail/exim/patches/patch-aa                                    1.24

---
   Module Name:    pkgsrc
   Committed By:   bsiegert
   Date:           Sun Jan 10 20:55:57 UTC 2016

   Modified Files:
           pkgsrc/mail/exim: Makefile distinfo
           pkgsrc/mail/exim/patches: patch-aa

   Log Message:
   Update exim to 4.86.

   Exim version 4.86
   -----------------
   JH/01 Bug 1545: The smtp transport option "retry_include_ip_address" is now
         expanded.

   JH/02 The smtp transport option "multi_domain" is now expanded.

   JH/03 The smtp transport now requests PRDR by default, if the server offers
         it.

   JH/04 Certificate name checking on server certificates, when exim is a client,
         is now done by default.  The transport option tls_verify_cert_hostnames
         can be used to disable this per-host.  The build option
         EXPERIMENTAL_CERTNAMES is withdrawn.

   JH/05 The value of the tls_verify_certificates smtp transport and main options
         default to the word "system" to access the system default CA bundle.
         For GnuTLS, only version 3.0.20 or later.

   JH/06 Verification of the server certificate for a TLS connection is now tried
         (but not required) by default.  The verification status is now logged by
         default, for both outbound TLS and client-certificate supplying inbound
         TLS connections

   JH/07 Changed the default rfc1413 lookup settings to disable calls.  Few
         sites use this now.

   JH/08 The EXPERIMENTAL_DSN compile option is no longer needed; all Delivery
         Status Notification (bounce) messages are now MIME format per RFC 3464.
         Support for RFC 3461 DSN options NOTIFY,ENVID,RET,ORCPT can be advertised
         under the control of the dsn_advertise_hosts option, and routers may
         have a dsn_lasthop option.

   JH/09 A timeout of 2 minutes is now applied to all malware scanner types by
         default, modifiable by a malware= option.  The list separator for
         the options can now be changed in the usual way.  Bug 68.

   JH/10 The smtp_receive_timeout main option is now expanded before use.

   JH/11 The incoming_interface log option now also enables logging of the
         local interface on delivery outgoing connections.

   JH/12 The cutthrough-routing facility now supports multi-recipient mails,
         if the interface and destination host and port all match.

   JH/13 Bug 344: The verify = reverse_host_lookup ACL condition now accepts a
         /defer_ok option.

   JH/14 Bug 1573: The spam= ACL condition now additionally supports Rspamd.
         Patch from Andrew Lewis.

   JH/15 Bug 670: The spamd_address main option (for the spam= ACL condition)
         now supports optional time-restrictions, weighting, and priority
         modifiers per server.  Patch originally by <rommer%active.by@localhost>.

   JH/16 The spamd_address main option now supports a mixed list of local
         and remote servers.  Remote servers can be IPv6 addresses, and
         specify a port-range.

   JH/17 Bug 68: The spamd_address main option now supports an optional
         timeout value per server.

   JH/18 Bug 1581: Router and transport options headers_add/remove can
         now have the list separator specified.

   JH/19 Bug 392: spamd_address, and clamd av_scanner, now support retry
         option values.

   JH/20 Bug 1571: Ensure that $tls_in_peerdn is set, when verification fails
         under OpenSSL.

   JH/21 Support for the A6 type of dns record is withdrawn.

   JH/22 Bug 608: The result of a QUIT or not-QUIT toplevel ACL now matters
         rather than the verbs used.

   JH/23 Bug 1572: Increase limit on SMTP confirmation message copy size
         from 255 to 1024 chars.

   JH/24 Verification callouts now attempt to use TLS by default.

   HS/01 DNSSEC options (dnssec_require_domains, dnssec_request_domains)
         are generic router options now. The defaults didn't change.

   JH/25 Bug 466: Add RFC2322 support for MIME attachment filenames.
         Original patch from Alexander Shikoff, worked over by JH.

   HS/02 Bug 1575: exigrep falls back to autodetection of compressed
         files if ZCAT_COMMAND is not executable.

   JH/26 Bug 1539: Add timout/retry options on dnsdb lookups.

   JH/27 Bug 286: Support SOA lookup in dnsdb lookups.

   JH/28 Bug 1588: Do not use the A lookup following an AAAA for setting the FQDN.
         Normally benign, it bites when the pair was led to by a CNAME;
         modern usage is to not canoicalize the domain to a CNAME target
         (and we were inconsistent anyway for A-only vs AAAA+A).

   JH/29 Bug 1632: Removed the word "rejected" from line logged for ACL discards.

   JH/30 Check the forward DNS lookup for DNSSEC, in addition to the reverse,
         when evaluating $sender_host_dnssec.

   JH/31 Check the HELO verification lookup for DNSSEC, adding new
         $sender_helo_dnssec variable.

   JH/32 Bug 1397: Enable ECDHE on OpenSSL, just the NIST P-256 curve.

   JH/33 Bug 1346: Note MAIL cmd seen in -bS batch, to avoid smtp_no_mail log.

   JH/34 Bug 1648: Fix a memory leak seen with "mailq" and large queues.

   JH/35 Bug 1642: Fix support of $spam_ variables at delivery time.  Was
         documented as working, but never had.  Support all but $spam_report.

   JH/36 Bug 1659: Guard checking of input smtp commands again pseudo-command
         added for tls authenticator.

---
   Module Name:    pkgsrc
   Committed By:   adam
   Date:           Mon Jan 11 08:35:32 UTC 2016

   Modified Files:
           pkgsrc/mail/exim-html: Makefile PLIST distinfo

   Log Message:
   Match mail/exim version

---
   Module Name:    pkgsrc
   Committed By:   wiedi
   Date:           Wed Mar  2 20:13:18 UTC 2016

   Modified Files:
           pkgsrc/mail/exim: Makefile distinfo
           pkgsrc/mail/exim-html: Makefile distinfo

   Log Message:
   Update mail/exim and mail/exim-html to 4.86.2

   Exim version 4.86.2
   -------------------
   Portability relase of 4.86.1

   Exim version 4.86.1
   -------------------
   HS/04 Add support for keep_environment and add_environment options.
         This fixes CVE-2016-1531.

   All installations having Exim set-uid root and using 'perl_startup' are
   vulnerable to a local privilege escalation. Any user who can start an
   instance of Exim (and this is normally *any* user) can gain root
   privileges. If you do not use 'perl_startup' you *should* be safe.

   New options
   -----------

   We had to introduce two new configuration options:

      keep_environment =
      add_environment =

   Both options are empty per default. That is, Exim cleans the complete
   environment on startup. This affects Exim itself and any subprocesses,
   as transports, that may call other programs via some alias mechanisms,
   as routers (queryprogram), lookups, and so on. This may affect used
   libraries (e.g. LDAP).

   ** THIS MAY BREAK your existing installation **

   If both options are not used in the configuration, Exim issues a warning
   on startup. This warning disappears if at least one of these options is
   used (even if set to an empty value).

   keep_environment should contain a list of trusted environment variables.
   (Do you trust PATH?). This may be a list of names and REs.

      keep_environment = ^LDAP_ : FOO_PATH

   To add (or override) variables, you can use add_environment:

      add_environment = <; PATH=/sbin:/usr/sbin

   New behaviour
   -------------

   Now Exim changes it's working directory to / right after startup,
   even before reading it's configuration. (Later Exim changes it's working
   directory to $spool_directory, as usual.)

   Exim only accepts an absolute configuration file path now, when using
   the -C option.

Revision 1.64: download - view: text, markup, annotated - select for diffs
Wed Mar 2 20:13:18 2016 UTC (8 years, 9 months ago) by wiedi
Branches: MAIN
CVS tags: pkgsrc-2016Q1-base, pkgsrc-2016Q1
Diff to: previous 1.63: preferred, colored
Changes since revision 1.63: +5 -5 lines
Update mail/exim and mail/exim-html to 4.86.2

Exim version 4.86.2
-------------------
Portability relase of 4.86.1

Exim version 4.86.1
-------------------
HS/04 Add support for keep_environment and add_environment options.
      This fixes CVE-2016-1531.

All installations having Exim set-uid root and using 'perl_startup' are
vulnerable to a local privilege escalation. Any user who can start an
instance of Exim (and this is normally *any* user) can gain root
privileges. If you do not use 'perl_startup' you *should* be safe.

New options
-----------

We had to introduce two new configuration options:

   keep_environment =
   add_environment =

Both options are empty per default. That is, Exim cleans the complete
environment on startup. This affects Exim itself and any subprocesses,
as transports, that may call other programs via some alias mechanisms,
as routers (queryprogram), lookups, and so on. This may affect used
libraries (e.g. LDAP).

** THIS MAY BREAK your existing installation **

If both options are not used in the configuration, Exim issues a warning
on startup. This warning disappears if at least one of these options is
used (even if set to an empty value).

keep_environment should contain a list of trusted environment variables.
(Do you trust PATH?). This may be a list of names and REs.

   keep_environment = ^LDAP_ : FOO_PATH

To add (or override) variables, you can use add_environment:

   add_environment = <; PATH=/sbin:/usr/sbin

New behaviour
-------------

Now Exim changes it's working directory to / right after startup,
even before reading it's configuration. (Later Exim changes it's working
directory to $spool_directory, as usual.)

Exim only accepts an absolute configuration file path now, when using
the -C option.

Revision 1.63: download - view: text, markup, annotated - select for diffs
Sun Jan 10 20:55:56 2016 UTC (8 years, 11 months ago) by bsiegert
Branches: MAIN
Diff to: previous 1.62: preferred, colored
Changes since revision 1.62: +6 -6 lines
Update exim to 4.86.

Exim version 4.86
-----------------
JH/01 Bug 1545: The smtp transport option "retry_include_ip_address" is now
      expanded.

JH/02 The smtp transport option "multi_domain" is now expanded.

JH/03 The smtp transport now requests PRDR by default, if the server offers
      it.

JH/04 Certificate name checking on server certificates, when exim is a client,
      is now done by default.  The transport option tls_verify_cert_hostnames
      can be used to disable this per-host.  The build option
      EXPERIMENTAL_CERTNAMES is withdrawn.

JH/05 The value of the tls_verify_certificates smtp transport and main options
      default to the word "system" to access the system default CA bundle.
      For GnuTLS, only version 3.0.20 or later.

JH/06 Verification of the server certificate for a TLS connection is now tried
      (but not required) by default.  The verification status is now logged by
      default, for both outbound TLS and client-certificate supplying inbound
      TLS connections

JH/07 Changed the default rfc1413 lookup settings to disable calls.  Few
      sites use this now.

JH/08 The EXPERIMENTAL_DSN compile option is no longer needed; all Delivery
      Status Notification (bounce) messages are now MIME format per RFC 3464.
      Support for RFC 3461 DSN options NOTIFY,ENVID,RET,ORCPT can be advertised
      under the control of the dsn_advertise_hosts option, and routers may
      have a dsn_lasthop option.

JH/09 A timeout of 2 minutes is now applied to all malware scanner types by
      default, modifiable by a malware= option.  The list separator for
      the options can now be changed in the usual way.  Bug 68.

JH/10 The smtp_receive_timeout main option is now expanded before use.

JH/11 The incoming_interface log option now also enables logging of the
      local interface on delivery outgoing connections.

JH/12 The cutthrough-routing facility now supports multi-recipient mails,
      if the interface and destination host and port all match.

JH/13 Bug 344: The verify = reverse_host_lookup ACL condition now accepts a
      /defer_ok option.

JH/14 Bug 1573: The spam= ACL condition now additionally supports Rspamd.
      Patch from Andrew Lewis.

JH/15 Bug 670: The spamd_address main option (for the spam= ACL condition)
      now supports optional time-restrictions, weighting, and priority
      modifiers per server.  Patch originally by <rommer@active.by>.

JH/16 The spamd_address main option now supports a mixed list of local
      and remote servers.  Remote servers can be IPv6 addresses, and
      specify a port-range.

JH/17 Bug 68: The spamd_address main option now supports an optional
      timeout value per server.

JH/18 Bug 1581: Router and transport options headers_add/remove can
      now have the list separator specified.

JH/19 Bug 392: spamd_address, and clamd av_scanner, now support retry
      option values.

JH/20 Bug 1571: Ensure that $tls_in_peerdn is set, when verification fails
      under OpenSSL.

JH/21 Support for the A6 type of dns record is withdrawn.

JH/22 Bug 608: The result of a QUIT or not-QUIT toplevel ACL now matters
      rather than the verbs used.

JH/23 Bug 1572: Increase limit on SMTP confirmation message copy size
      from 255 to 1024 chars.

JH/24 Verification callouts now attempt to use TLS by default.

HS/01 DNSSEC options (dnssec_require_domains, dnssec_request_domains)
      are generic router options now. The defaults didn't change.

JH/25 Bug 466: Add RFC2322 support for MIME attachment filenames.
      Original patch from Alexander Shikoff, worked over by JH.

HS/02 Bug 1575: exigrep falls back to autodetection of compressed
      files if ZCAT_COMMAND is not executable.

JH/26 Bug 1539: Add timout/retry options on dnsdb lookups.

JH/27 Bug 286: Support SOA lookup in dnsdb lookups.

JH/28 Bug 1588: Do not use the A lookup following an AAAA for setting the FQDN.
      Normally benign, it bites when the pair was led to by a CNAME;
      modern usage is to not canoicalize the domain to a CNAME target
      (and we were inconsistent anyway for A-only vs AAAA+A).

JH/29 Bug 1632: Removed the word "rejected" from line logged for ACL discards.

JH/30 Check the forward DNS lookup for DNSSEC, in addition to the reverse,
      when evaluating $sender_host_dnssec.

JH/31 Check the HELO verification lookup for DNSSEC, adding new
      $sender_helo_dnssec variable.

JH/32 Bug 1397: Enable ECDHE on OpenSSL, just the NIST P-256 curve.

JH/33 Bug 1346: Note MAIL cmd seen in -bS batch, to avoid smtp_no_mail log.

JH/34 Bug 1648: Fix a memory leak seen with "mailq" and large queues.

JH/35 Bug 1642: Fix support of $spam_ variables at delivery time.  Was
      documented as working, but never had.  Support all but $spam_report.

JH/36 Bug 1659: Guard checking of input smtp commands again pseudo-command
      added for tls authenticator.

Revision 1.62: download - view: text, markup, annotated - select for diffs
Tue Nov 3 23:27:05 2015 UTC (9 years, 1 month ago) by agc
Branches: MAIN
CVS tags: pkgsrc-2015Q4-base
Branch point for: pkgsrc-2015Q4
Diff to: previous 1.61: preferred, colored
Changes since revision 1.61: +2 -1 lines
Add SHA512 digests for distfiles for mail category

Problems found locating distfiles:
	Package mutt: missing distfile patch-1.5.24.rr.compressed.gz
	Package p5-Email-Valid: missing distfile Email-Valid-1.198.tar.gz
	Package pine: missing distfile fancy.patch.gz
	Package postgrey: missing distfile targrey-0.31-postgrey-1.34.patch
	Package qmail: missing distfile badrcptto.patch
	Package qmail: missing distfile outgoingip.patch
	Package qmail: missing distfile qmail-1.03-realrcptto-2006.12.10.patch
	Package qmail: missing distfile qmail-smtpd-viruscan-1.3.patch
	Package thunderbird24: missing distfile enigmail-1.7.2.tar.gz
	Package thunderbird31: missing distfile enigmail-1.7.2.tar.gz

Otherwise, existing SHA1 digests verified and found to be the same on
the machine holding the existing distfiles (morden).  All existing
SHA1 digests retained for now as an audit trail.

Revision 1.61: download - view: text, markup, annotated - select for diffs
Sat Feb 14 07:33:19 2015 UTC (9 years, 9 months ago) by adam
Branches: MAIN
CVS tags: pkgsrc-2015Q3-base, pkgsrc-2015Q3, pkgsrc-2015Q2-base, pkgsrc-2015Q2, pkgsrc-2015Q1-base, pkgsrc-2015Q1
Diff to: previous 1.60: preferred, colored
Changes since revision 1.60: +4 -4 lines
Exim version 4.85
-----------------
TL/01 When running the test suite, the README says that variables such as
      no_msglog_check are global and can be placed anywhere in a specific
      test's script, however it was observed that placement needed to be near
      the beginning for it to behave that way. Changed the runtest perl
      script to read through the entire script once to detect and set these
      variables, reset to the beginning of the script, and then run through
      the script parsing/test process like normal.

TL/02 The BSD's have an arc4random API. One of the functions to induce
      adding randomness was arc4random_stir(), but it has been removed in
      OpenBSD 5.5. Detect this OpenBSD version and skip calling this
      function when detected.

JH/01 Expand the EXPERIMENTAL_TPDA feature.  Several different events now
      cause callback expansion.

TL/03 Bugzilla 1518: Clarify "condition" processing in routers; that
      syntax errors in an expansion can be treated as a string instead of
      logging or causing an error, due to the internal use of bool_lax
      instead of bool when processing it.

JH/02 Add EXPERIMENTAL_DANE, allowing for using the DNS as trust-anchor for
      server certificates when making smtp deliveries.

JH/03 Support secondary-separator specifier for MX, SRV, TLSA lookups.

JH/04 Add ${sort {list}{condition}{extractor}} expansion item.

TL/04 Bugzilla 1216: Add -M (related messages) option to exigrep.

TL/05 GitHub Issue 18: Adjust logic testing for true/false in redis lookups.
      Merged patch from Sebastian Wiedenroth.

JH/05 Fix results-pipe from transport process.  Several recipients, combined
      with certificate use, exposed issues where response data items split
      over buffer boundaries were not parsed properly.  This eventually
      resulted in duplicates being sent.  This issue only became common enough
      to notice due to the introduction of conection certificate information,
      the item size being so much larger.  Found and fixed by Wolfgang Breyha.

JH/06 Bug 1533: Fix truncation of items in headers_remove lists.  A fixed
      size buffer was used, resulting in syntax errors when an expansion
      exceeded it.

JH/07 Add support for directories of certificates when compiled with a GnuTLS
      version 3.3.6 or later.

JH/08 Rename the TPDA expermimental facility to Event Actions.  The #ifdef
      is EXPERIMENTAL_EVENT, the main-configuration and transport options
      both become "event_action", the variables become $event_name, $event_data
      and $event_defer_errno.  There is a new variable $verify_mode, usable in
      routers, transports and related events.  The tls:cert event is now also
      raised for inbound connections, if the main configuration event_action
      option is defined.

TL/06 In test suite, disable OCSP for old versions of openssl which contained
      early OCSP support, but no stapling (appears to be less than 1.0.0).

JH/09 When compiled with OpenSSL and EXPERIMENTAL_CERTNAMES, the checks on
      server certificate names available under the smtp transport option
      "tls_verify_cert_hostname" now do not permit multi-component wildcard
      matches.

JH/10 Time-related extraction expansions from certificates now use the main
      option "timezone" setting for output formatting, and are consistent
      between OpenSSL and GnuTLS compilations.  Bug 1541.

JH/11 Fix a crash in mime ACL when meeting a zero-length, quoted or RFC2047-
      encoded parameter in the incoming message.  Bug 1558.

JH/12 Bug 1527: Autogrow buffer used in reading spool files.  Since they now
      include certificate info, eximon was claiming there were spoolfile
      syntax errors.

JH/13 Bug 1521: Fix ldap lookup for single-attr request, multiple-attr return.

JH/14 Log delivery-related information more consistently, using the sequence
      "H=<name> [<ip>]" wherever possible.

TL/07 Bug 1547: Omit RFCs from release. Draft and RFCs have licenses which
      are problematic for Debian distribution, omit them from the release
      tarball.

JH/15 Updates and fixes to the EXPERIMENTAL_DSN feature.

JH/16 Fix string representation of time values on 64bit time_t anchitectures.
      Bug 1561.

JH/17 Fix a null-indirection in certextract expansions when a nondefault
      output list separator was used.

Revision 1.60: download - view: text, markup, annotated - select for diffs
Sun Aug 17 08:16:58 2014 UTC (10 years, 3 months ago) by adam
Branches: MAIN
CVS tags: pkgsrc-2014Q4-base, pkgsrc-2014Q4, pkgsrc-2014Q3-base, pkgsrc-2014Q3
Diff to: previous 1.59: preferred, colored
Changes since revision 1.59: +4 -4 lines
Changes 4.84:
TL/01 Bugzilla 1506: Re-add a 'return NULL' to silence complaints from static
      checkers that were complaining about end of non-void function with no
      return.

JH/01 Bug 1513: Fix parsing of quoted parameter values in MIME headers.
      This was a regression intruduced in 4.83 by another bugfix.

JH/02 Fix broken compilation when EXPERIMENTAL_DSN is enabled.

TL/02 Bug 1509: Fix exipick for enhanced spoolfile specification used when
      EXPERIMENTAL_DNS is enabled.

Revision 1.59: download - view: text, markup, annotated - select for diffs
Wed Jul 23 14:09:52 2014 UTC (10 years, 4 months ago) by adam
Branches: MAIN
Diff to: previous 1.58: preferred, colored
Changes since revision 1.58: +5 -5 lines
Changes 4.83:

 1. If built with the EXPERIMENTAL_PROXY feature enabled, Exim can be
    configured to expect an initial header from a proxy that will make the
    actual external source IP:host be used in exim instead of the IP of the
    proxy that is connecting to it.

 2. New verify option header_names_ascii, which will check to make sure
    there are no non-ASCII characters in header names.  Exim itself handles
    those non-ASCII characters, but downstream apps may not, so Exim can
    detect and reject if those characters are present.

 3. New expansion operator ${utf8clean:string} to replace malformed UTF8
    codepoints with valid ones.

 4. New malware type "sock".  Talks over a Unix or TCP socket, sending one
    command line and matching a regex against the return data for trigger
    and a second regex to extract malware_name.  The mail spoofile name can
    be included in the command line.

 5. The smtp transport now supports options "tls_verify_hosts" and
    "tls_try_verify_hosts".  If either is set the certificate verification
    is split from the encryption operation. The default remains that a failed
    verification cancels the encryption.

 6. New SERVERS override of default ldap server list.  In the ACLs, an ldap
    lookup can now set a list of servers to use that is different from the
    default list.

 7. New command-line option -C for exiqgrep to specify alternate exim.conf
    file when searching the queue.

 8. OCSP now supports GnuTLS also, if you have version 3.1.3 or later of that.

 9. Support for DNSSEC on outbound connections.

10. New variables "tls_(in,out)_(our,peer)cert" and expansion item
    "certextract" to extract fields from them. Hash operators md5 and sha1
    work over them for generating fingerprints, and a new sha256 operator
    for them added.

11. PRDR is now supported dy default.

12. OCSP stapling is now supported by default.

13. If built with the EXPERIMENTAL_DSN feature enabled, Exim will output
    Delivery Status Notification messages in MIME format, and negociate
    DSN features per RFC 3461.

Revision 1.58: download - view: text, markup, annotated - select for diffs
Thu May 29 09:27:37 2014 UTC (10 years, 6 months ago) by adam
Branches: MAIN
CVS tags: pkgsrc-2014Q2-base, pkgsrc-2014Q2
Diff to: previous 1.57: preferred, colored
Changes since revision 1.57: +4 -4 lines
Changes 4.82.1:
This is a SECURITY release, addressing a CRITICAL remote code execution
flaw in Exim version 4.82 (only) when built with DMARC support (an
experimental feature, not on by default). This release is identical to
4.82 except for the small change needed to plug the security hole. The
next release of Exim will, eventually, be 4.83, which will include the
many improvements we've made since 4.82, but which will require the
normal release candidate baking process before release.

You are not vulnerable unless you built Exim with EXPERIMENTAL_DMARC.

This issue is known by the CVE ID of CVE-2014-2957, was reported
directly to the Exim development team by a company which uses Exim for
its mail server. An Exim developer constructed a small patch which
altered the way the contents of the From header is parsed by converting
it to use safer and better internal functions. It was applied and
tested on a production server for correctness. We were notified of the
vulnerability Friday night, created a patch on Saturday, applied and
tested it on Sunday, notified OS packagers on Monday/Tuesday, and are
releasing on the next available work day, which is Wednesday.

This is why we have made the smallest feasible changes to prevent
exploit: we want this chagne to be as safe as possible to expedite into
production (if the packages were built with DMARC).

Revision 1.57: download - view: text, markup, annotated - select for diffs
Wed Apr 2 17:36:00 2014 UTC (10 years, 8 months ago) by wiedi
Branches: MAIN
Diff to: previous 1.56: preferred, colored
Changes since revision 1.56: +2 -2 lines
Add two new options for exim:
	- exim-lookup-redis: allow quering redis from within the exim
	                     config, needs hiredis
	- opendmarc: enables DMARC support
Both are disabled by default.

Revision 1.56: download - view: text, markup, annotated - select for diffs
Wed Oct 30 07:30:03 2013 UTC (11 years, 1 month ago) by adam
Branches: MAIN
CVS tags: pkgsrc-2014Q1-base, pkgsrc-2014Q1, pkgsrc-2013Q4-base, pkgsrc-2013Q4
Diff to: previous 1.55: preferred, colored
Changes since revision 1.55: +4 -4 lines
Version 4.82
 1. New command-line option -bI:sieve will list all supported sieve extensions
    of this Exim build on standard output, one per line.
    ManageSieve (RFC 5804) providers managing scripts for use by Exim should
    query this to establish the correct list to include in the protocol's
    SIEVE capability line.
 2. If the -n option is combined with the -bP option, then the name of an
    emitted option is not output, only the value (if visible to you).
    For instance, "exim -n -bP pid_file_path" should just emit a pathname
    followed by a newline, and no other text.
 3. When built with SUPPORT_TLS and USE_GNUTLS, the SMTP transport driver now
    has a "tls_dh_min_bits" option, to set the minimum acceptable number of
    bits in the Diffie-Hellman prime offered by a server (in DH ciphersuites)
    acceptable for security.  (Option accepted but ignored if using OpenSSL).
    Defaults to 1024, the old value.  May be lowered only to 512, or raised as
    far as you like.  Raising this may hinder TLS interoperability with other
    sites and is not currently recommended.  Lowering this will permit you to
    establish a TLS session which is not as secure as you might like.
    Unless you really know what you are doing, leave it alone.
 4. If not built with DISABLE_DNSSEC, Exim now has the main option
    dns_dnssec_ok; if set to 1 then Exim will initialise the resolver library
    to send the DO flag to your recursive resolver.  If you have a recursive
    resolver, which can set the Authenticated Data (AD) flag in results, Exim
    can now detect this.  Exim does not perform validation itself, instead
    relying upon a trusted path to the resolver.
    Current status: work-in-progress; $sender_host_dnssec variable added.
 5. DSCP support for outbound connections: on a transport using the smtp driver,
    set "dscp = ef", for instance, to cause the connections to have the relevant
    DSCP (IPv4 TOS or IPv6 TCLASS) value in the header.
    Similarly for inbound connections, there is a new control modifier, dscp,
    so "warn control = dscp/ef" in the connect ACL, or after authentication.
    Supported values depend upon system libraries.  "exim -bI:dscp" to list the
    ones Exim knows of.  You can also set a raw number 0..0x3F.
 6. The -G command-line flag is no longer ignored; it is now equivalent to an
    ACL setting "control = suppress_local_fixups".  The -L command-line flag
    is now accepted and forces use of syslog, with the provided tag as the
    process name.  A few other flags used by Sendmail are now accepted and
    ignored.
 7. New cutthrough routing feature.  Requested by a "control = cutthrough_delivery"
    ACL modifier; works for single-recipient mails which are recieved on and
    deliverable via SMTP.  Using the connection made for a recipient verify,
    if requested before the verify, or a new one made for the purpose while
    the inbound connection is still active.  The bulk of the mail item is copied
    direct from the inbound socket to the outbound (as well as the spool file).
    When the source notifies the end of data, the data acceptance by the destination
    is negociated before the acceptance is sent to the source.  If the destination
    does not accept the mail item, for example due to content-scanning, the item
    is not accepted from the source and therefore there is no need to generate
    a bounce mail.  This is of benefit when providing a secondary-MX service.
    The downside is that delays are under the control of the ultimate destination
    system not your own.
    The Recieved-by: header on items delivered by cutthrough is generated
    early in reception rather than at the end; this will affect any timestamp
    included.  The log line showing delivery is recorded before that showing
    reception; it uses a new ">>" tag instead of "=>".
    To support the feature, verify-callout connections can now use ESMTP and TLS.
    The usual smtp transport options are honoured, plus a (new, default everything)
    hosts_verify_avoid_tls.
    New variable families named tls_in_cipher, tls_out_cipher etc. are introduced
    for specific access to the information for each connection.  The old names
    are present for now but deprecated.
    Not yet supported: IGNOREQUOTA, SIZE, PIPELINING.
 8. New expansion operators ${listnamed:name} to get the content of a named list
    and ${listcount:string} to count the items in a list.
 9. New global option "gnutls_allow_auto_pkcs11", defaults false.  The GnuTLS
    rewrite in 4.80 combines with GnuTLS 2.12.0 or later, to autoload PKCS11
    modules.  For some situations this is desirable, but we expect admin in
    those situations to know they want the feature.  More commonly, it means
    that GUI user modules get loaded and are broken by the setuid Exim being
    unable to access files specified in environment variables and passed
    through, thus breakage.  So we explicitly inhibit the PKCS11 initialisation
    unless this new option is set.
    Some older OS's with earlier versions of GnuTLS might not have pkcs11 ability,
    so have also added a build option which can be used to build Exim with GnuTLS
    but without trying to use any kind of PKCS11 support.  Uncomment this in the
    Local/Makefile:
    AVOID_GNUTLS_PKCS11=yes
10. The "acl = name" condition on an ACL now supports optional arguments.
    New expansion item "${acl {name}{arg}...}" and expansion condition
    "acl {{name}{arg}...}" are added.  In all cases up to nine arguments
    can be used, appearing in $acl_arg1 to $acl_arg9 for the called ACL.
    Variable $acl_narg contains the number of arguments.  If the ACL sets
    a "message =" value this becomes the result of the expansion item,
    or the value of $value for the expansion condition.  If the ACL returns
    accept the expansion condition is true; if reject, false.  A defer
    return results in a forced fail.
11. Routers and transports can now have multiple headers_add and headers_remove
    option lines.  The concatenated list is used.
12. New ACL modifier "remove_header" can remove headers before message gets
    handled by routers/transports.
13. New dnsdb lookup pseudo-type "a+".  A sequence of "a6" (if configured),
    "aaaa" and "a" lookups is done and the full set of results returned.
14. New expansion variable $headers_added with content from ACL add_header
    modifier (but not yet added to messsage).
15. New 8bitmime status logging option for received messages.  Log field "M8S".
16. New authenticated_sender logging option, adding to log field "A".
17. New expansion variables $router_name and $transport_name.  Useful
    particularly for debug_print as -bt commandline option does not
    require privilege whereas -d does.
18. If built with EXPERIMENTAL_PRDR, per-recipient data responses per a
    proposed extension to SMTP from Eric Hall.
19. The pipe transport has gained the force_command option, to allow
    decorating commands from user .forward pipe aliases with prefix
    wrappers, for instance.
20. Callout connections can now AUTH; the same controls as normal delivery
    connections apply.
21. Support for DMARC, using opendmarc libs, can be enabled. It adds new
    options: dmarc_forensic_sender, dmarc_history_file, and dmarc_tld_file.
    It adds new expansion variables $dmarc_ar_header, $dmarc_status,
    $dmarc_status_text, and $dmarc_used_domain.  It adds a new acl modifier
    dmarc_status.  It adds new control flags dmarc_disable_verify and
    dmarc_enable_forensic.
22. Add expansion variable $authenticated_fail_id, which is the username
    provided to the authentication method which failed.  It is available
    for use in subsequent ACL processing (typically quit or notquit ACLs).
23. New ACL modifer "udpsend" can construct a UDP packet to send to a given
    UDP host and port.
24. New ${hexquote:..string..} expansion operator converts non-printable
    characters in the string to \xNN form.
25. Experimental TPDA (Transport Post Delivery Action) function added.
    Patch provided by Axel Rau.
26. Experimental Redis lookup added. Patch provided by Warren Baker.

Revision 1.55: download - view: text, markup, annotated - select for diffs
Mon Sep 2 16:04:13 2013 UTC (11 years, 3 months ago) by jperkin
Branches: MAIN
CVS tags: pkgsrc-2013Q3-base, pkgsrc-2013Q3
Diff to: previous 1.54: preferred, colored
Changes since revision 1.54: +2 -1 lines
Avoid use of non-portable "local" keyword in shell scripts.  Fixes build on
SunOS >= 5.11 where /bin/sh is ksh93.

Revision 1.53.4.1: download - view: text, markup, annotated - select for diffs
Sun Nov 4 12:07:02 2012 UTC (12 years, 1 month ago) by spz
Branches: pkgsrc-2012Q3
Diff to: previous 1.53: preferred, colored; next MAIN 1.54: preferred, colored
Changes since revision 1.53: +4 -4 lines
Pullup ticket #3957 - requested by abs
mail/exim: security update

Revisions pulled up:
- mail/exim/Makefile                                            1.118
- mail/exim/distinfo                                            1.54

-------------------------------------------------------------------
   Module Name:    pkgsrc
   Committed By:   abs
   Date:           Tue Oct 30 20:12:20 UTC 2012

   Modified Files:
           pkgsrc/mail/exim: Makefile distinfo

   Log Message:
   Updated mail/exim to 4.80.1

   Exim version 4.80.1
   -------------------

   PP/01 SECURITY: protect DKIM DNS decoding from remote exploit.
         CVE-2012-5671
         This, or similar/improved, will also be change PP/11 of 4.81.

   See: https://secunia.com/advisories/51098/


   To generate a diff of this commit:
   cvs rdiff -u -r1.117 -r1.118 pkgsrc/mail/exim/Makefile
   cvs rdiff -u -r1.53 -r1.54 pkgsrc/mail/exim/distinfo

Revision 1.54: download - view: text, markup, annotated - select for diffs
Tue Oct 30 20:12:20 2012 UTC (12 years, 1 month ago) by abs
Branches: MAIN
CVS tags: pkgsrc-2013Q2-base, pkgsrc-2013Q2, pkgsrc-2013Q1-base, pkgsrc-2013Q1, pkgsrc-2012Q4-base, pkgsrc-2012Q4
Diff to: previous 1.53: preferred, colored
Changes since revision 1.53: +4 -4 lines
Updated mail/exim to 4.80.1

Exim version 4.80.1
-------------------

PP/01 SECURITY: protect DKIM DNS decoding from remote exploit.
      CVE-2012-5671
      This, or similar/improved, will also be change PP/11 of 4.81.

See: https://secunia.com/advisories/51098/

Revision 1.53: download - view: text, markup, annotated - select for diffs
Mon Jun 11 11:41:24 2012 UTC (12 years, 6 months ago) by adam
Branches: MAIN
CVS tags: pkgsrc-2012Q3-base, pkgsrc-2012Q2-base, pkgsrc-2012Q2
Branch point for: pkgsrc-2012Q3
Diff to: previous 1.52: preferred, colored
Changes since revision 1.52: +8 -9 lines
Changes 4.80:
 1. New authenticator driver, "gsasl".  Server-only (at present).
    This is a SASL interface, licensed under GPL, which can be found at
    http://www.gnu.org/software/gsasl/.
    This system does not provide sources of data for authentication, so
    careful use needs to be made of the conditions in Exim.
 2. New authenticator driver, "heimdal_gssapi".  Server-only.
    A replacement for using cyrus_sasl with Heimdal, now that $KRB5_KTNAME
    is no longer honoured for setuid programs by Heimdal.  Use the
    "server_keytab" option to point to the keytab.
 3. The "pkg-config" system can now be used when building Exim to reference
    cflags and library information for lookups and authenticators, rather
    than having to update "CFLAGS", "AUTH_LIBS", "LOOKUP_INCLUDE" and
    "LOOKUP_LIBS" directly.  Similarly for handling the TLS library support
    without adjusting "TLS_INCLUDE" and "TLS_LIBS".
    In addition, setting PCRE_CONFIG=yes will query the pcre-config tool to
    find the headers and libraries for PCRE.
 4. New expansion variable $tls_bits.
 5. New lookup type, "dbmjz".  Key is an Exim list, the elements of which will
    be joined together with ASCII NUL characters to construct the key to pass
    into the DBM library.  Can be used with gsasl to access sasldb2 files as
    used by Cyrus SASL.
 6. OpenSSL now supports TLS1.1 and TLS1.2 with OpenSSL 1.0.1.
    Avoid release 1.0.1a if you can.  Note that the default value of
    "openssl_options" is no longer "+dont_insert_empty_fragments", as that
    increased susceptibility to attack.  This may still have interoperability
    implications for very old clients (see version 4.31 change 37) but
    administrators can choose to make the trade-off themselves and restore
    compatibility at the cost of session security.
 7. Use of the new expansion variable $tls_sni in the main configuration option
    tls_certificate will cause Exim to re-expand the option, if the client
    sends the TLS Server Name Indication extension, to permit choosing a
    different certificate; tls_privatekey will also be re-expanded.  You must
    still set these options to expand to valid files when $tls_sni is not set.
    The SMTP Transport has gained the option tls_sni, which will set a hostname
    for outbound TLS sessions, and set $tls_sni too.
    A new log_selector, +tls_sni, has been added, to log received SNI values
    for Exim as a server.
 8. The existing "accept_8bitmime" option now defaults to true.  This means
    that Exim is deliberately not strictly RFC compliant.  We're following
    Dan Bernstein's advice in http://cr.yp.to/smtp/8bitmime.html by default.
    Those who disagree, or know that they are talking to mail servers that,
    even today, are not 8-bit clean, need to turn off this option.
 9. Exim can now be started with -bw (with an optional timeout, given as
    -bw<timespec>).  With this, stdin at startup is a socket that is
    already listening for connections.  This has a more modern name of
    "socket activation", but forcing the activated socket to fd 0.  We're
    interested in adding more support for modern variants.
10. ${eval } now uses 64-bit values on supporting platforms.  A new "G" suffix
    for numbers indicates multiplication by 1024^3.
11. The GnuTLS support has been revamped; the three options gnutls_require_kx,
    gnutls_require_mac & gnutls_require_protocols are no longer supported.
    tls_require_ciphers is now parsed by gnutls_priority_init(3) as a priority
    string, documentation for which is at:
    http://www.gnu.org/software/gnutls/manual/html_node/Priority-Strings.html
    SNI support has been added to Exim's GnuTLS integration too.
    For sufficiently recent GnuTLS libraries, ${randint:..} will now use
    gnutls_rnd(), asking for GNUTLS_RND_NONCE level randomness.
12. With OpenSSL, if built with EXPERIMENTAL_OCSP, a new option tls_ocsp_file
    is now available.  If the contents of the file are valid, then Exim will
    send that back in response to a TLS status request; this is OCSP Stapling.
    Exim will not maintain the contents of the file in any way: administrators
    are responsible for ensuring that it is up-to-date.
13. ${lookup dnsdb{ }} supports now SPF record types. They are handled
    identically to TXT record lookups.
14. New expansion variable $tod_epoch_l for higher-precision time.
15. New global option tls_dh_max_bits, defaulting to current value of NSS
    hard-coded limit of DH ephemeral bits, to fix interop problems caused by
    GnuTLS 2.12 library recommending a bit count higher than NSS supports.
16. tls_dhparam now used by both OpenSSL and GnuTLS, can be path or identifier.
    Option can now be a path or an identifier for a standard prime.
    If unset, we use the DH prime from section 2.2 of RFC 5114, "ike23".
    Set to "historic" to get the old GnuTLS behaviour of auto-generated DH
    primes.
17. SSLv2 now disabled by default in OpenSSL.  (Never supported by GnuTLS).
    Use "openssl_options -no_sslv2" to re-enable support, if your OpenSSL
    install was not built with OPENSSL_NO_SSL2 ("no-ssl2").

Revision 1.52: download - view: text, markup, annotated - select for diffs
Mon Oct 10 12:20:49 2011 UTC (13 years, 2 months ago) by adam
Branches: MAIN
CVS tags: pkgsrc-2012Q1-base, pkgsrc-2012Q1, pkgsrc-2011Q4-base, pkgsrc-2011Q4
Diff to: previous 1.51: preferred, colored
Changes since revision 1.51: +4 -4 lines
Changes 4.77:
* Solaris build fix for Oracle's LDAP libraries.
* HP/UX build fix: avoid arithmetic on a void pointer.
* DKIM Verification: Fix relaxed canon for empty headers w/o whitespace trailer
* Fix a couple more cases where we did not log the error message when unlink()
  failed.
* Make the exiwhat support code safe for signals. Previously Exim might lock up
  or crash if it happened to be inside a call to libc when it got a SIGUSR1
  from exiwhat.
* Improved ratelimit ACL condition.
* Removed a few PCRE remnants.
* Automatically extract Exim's version number from tags in the git repository
  when doing development or release builds.
* Raise smtp_cmd_buffer_size to 16kB.
* Implement SSL-on-connect outbound with protocol=smtps on smtp transport.
* Use .dylib instead of .so for dynamic library loading on MacOS.
* Variable $av_failed, true if the AV scanner deferred.
* Stop make process more reliably on build failure.
* Make maildir_use_size_file an _expandable_ boolean.
* Handle ${run} returning more data than OS pipe buffer size.
* Handle IPv6 addresses with SPF.
* GnuTLS: support TLS 1.2 & 1.1.
* match_* no longer expand right-hand-side by default.
* fix uninitialised greeting string from PP/03 (smtps client support).
* shell and compiler warnings fixes for RC1-RC4 changes.

Revision 1.51: download - view: text, markup, annotated - select for diffs
Mon May 9 13:30:47 2011 UTC (13 years, 7 months ago) by adam
Branches: MAIN
CVS tags: pkgsrc-2011Q3-base, pkgsrc-2011Q3, pkgsrc-2011Q2-base, pkgsrc-2011Q2
Diff to: previous 1.50: preferred, colored
Changes since revision 1.50: +6 -8 lines
Changes 4.76:
* The new ldap_require_cert option would segfault if used.  Fixed.
* Harmonised TLS library version reporting; only show if debugging.
  Layout now matches that introduced for other libraries in 4.74 PP/03.
* New openssl_options items: no_sslv2 no_sslv3 no_ticket no_tlsv1
* New "dns_use_edns0" global option.
* Don't segfault on misconfiguration of ref:name exim-user as uid.
* Extra paranoia around buffer usage at the STARTTLS transition.
  nb: Exim is not vulnerable to http://www.kb.cert.org/vuls/id/555316
* Updated PolarSSL code to 0.14.2.
* Catch divide-by-zero in ${eval:...}.
* Condition negation of bool{}/bool_lax{} did not negate.  Fixed.
* CVE-2011-1764 - DKIM log line was subject to a format-string attack --
  SECURITY: remote arbitrary code execution.
* SECURITY - DKIM signature header parsing was double-expanded, second
  time unintentionally subject to list matching rules, letting the header
  cause arbitrary Exim lookups (of items which can occur in lists, *not*
  arbitrary string expansion). This allowed for information disclosure.
* Fix another SIGFPE (x86) in ${eval:...} expansion, this time related to
  INT_MIN/-1 -- value coerced to INT_MAX.

Revision 1.50: download - view: text, markup, annotated - select for diffs
Sat May 7 14:32:02 2011 UTC (13 years, 7 months ago) by drochner
Branches: MAIN
Diff to: previous 1.49: preferred, colored
Changes since revision 1.49: +2 -1 lines
add patch from upstream to fix format string vulnerability (CVE-2011-1764)
bump PKGREV

Revision 1.49: download - view: text, markup, annotated - select for diffs
Tue Mar 22 13:52:19 2011 UTC (13 years, 8 months ago) by adam
Branches: MAIN
CVS tags: pkgsrc-2011Q1-base, pkgsrc-2011Q1
Diff to: previous 1.48: preferred, colored
Changes since revision 1.48: +5 -8 lines
Changes 4.75:
1. In addition to the existing LDAP and LDAP/SSL ("ldaps") support, there
   is now LDAP/TLS support, given sufficiently modern OpenLDAP client
   libraries.  The following global options have been added in support of
   this: ldap_ca_cert_dir, ldap_ca_cert_file, ldap_cert_file, ldap_cert_key,
   ldap_cipher_suite, ldap_require_cert, ldap_start_tls.
2. The pipe transport now takes a boolean option, "freeze_signal", default
   false.  When true, if the external delivery command exits on a signal then
   Exim will freeze the message in the queue, instead of generating a bounce.
3. Log filenames may now use %M as an escape, instead of %D (still available).
   The %M pattern expands to yyyymm, providing month-level resolution.
4. The $message_linecount variable is now updated for the maildir_tag option,
   in the same way as $message_size, to reflect the real number of lines,
   including any header additions or removals from transport.
5. When contacting a pool of SpamAssassin servers configured in spamd_address,
   Exim now selects entries randomly, to better scale in a cluster setup.

Revision 1.48: download - view: text, markup, annotated - select for diffs
Thu Jan 27 07:48:51 2011 UTC (13 years, 10 months ago) by adam
Branches: MAIN
Diff to: previous 1.47: preferred, colored
Changes since revision 1.47: +4 -4 lines
Changes 4.74:
* Failure to get a lock on a hints database can have serious
  consequences so log it to the panic log.
* Log LMTP confirmation messages in the same way as SMTP,
  controlled using the smtp_confirmation log selector.
* Include the error message when we fail to unlink a spool file.
* Bugzilla 139: Support dynamically loaded lookups as modules.
* Bugzilla 139: Documentation and portability issues.
  Avoid GNU Makefile-isms, let Exim continue to build on BSD.
  Handle per-OS dynamic-module compilation flags.
* Let /dev/null have normal permissions.
  The 4.73 fixes were a little too stringent and complained about the
  permissions on /dev/null.  Exempt it from some checks.
* Report version information for many libraries, including
  Exim version information for dynamically loaded libraries.  Created
  version.h, now support a version extension string for distributors
  who patch heavily. Dynamic module ABI change.
* CVE-2011-0017 - check return value of setuid/setgid. This is a
  privilege escalation vulnerability whereby the Exim run-time user
  can cause root to append content of the attacker's choosing to
  arbitrary files.
* Bugzilla 1041: merged DCC maintainer's fixes for return code.
* Bugzilla 1071: fix delivery logging with untrusted macros.
  If dropping privileges for untrusted macros, we disabled normal logging
  on the basis that it would fail; for the Exim run-time user, this is not
  the case, and it resulted in successful deliveries going unlogged.

Revision 1.46.2.1: download - view: text, markup, annotated - select for diffs
Sat Jan 22 10:56:42 2011 UTC (13 years, 10 months ago) by tron
Branches: pkgsrc-2010Q4
Diff to: previous 1.46: preferred, colored; next MAIN 1.47: preferred, colored
Changes since revision 1.46: +9 -5 lines
Pullup ticket #3330 - requested by gls
mail/exim: security update

Revisions pulled up:
- mail/exim/Makefile				1.104
- mail/exim/distinfo				1.47
- mail/exim/patches/patch-aa			1.21
- mail/exim/patches/patch-ba			1.1
- mail/exim/patches/patch-bb			1.1
- mail/exim/patches/patch-bc			1.1
- mail/exim/patches/patch-bd			1.1
---
Module Name:	pkgsrc
Committed By:	adam
Date:		Wed Jan 12 07:52:45 UTC 2011

Modified Files:
	pkgsrc/mail/exim: Makefile distinfo
	pkgsrc/mail/exim/patches: patch-aa
Added Files:
	pkgsrc/mail/exim/patches: patch-ba patch-bb patch-bc patch-bd

Log Message:
Changes 4.73:
* Date: & Message-Id: revert to normally being appended to a message,
  only prepend for the Resent-* case.  Fixes regression introduced in
  Exim 4.70 by NM/22 for Bugzilla 607.
* Include check_rfc2047_length in configure.default because we're seeing
  increasing numbers of administrators be bitten by this.
* Added DISABLE_DKIM and comment to src/EDITME
* Bugzilla 994: added openssl_options main configuration option.
* Bugzilla 995: provide better SSL diagnostics on failed reads.
* Bugzilla 834: provide a permit_coredump option for pipe transports.
* Adjust NTLM authentication to handle SASL Initial Response.
* If TLS negotiated an anonymous cipher, we could end up with SSL but
  without a peer certificate, leading to a segfault because of an
  assumption that peers always have certificates.  Be a little more
paranoid.
* Bugzilla 926: switch ClamAV to use the new zINSTREAM API for content
  filtering; old API available if built with WITH_OLD_CLAMAV_STREAM=yes
  NB: ClamAV planning to remove STREAM in "middle of 2010".
  CL also introduces -bmalware, various -d+acl logging additions and
  more caution in buffer sizes.
* Implemented reverse_ip expansion operator.
* Bugzilla 937: provide a "debug" ACL control.
* Bugzilla 922: Documentation dusting, patch provided by John Horne.
* Bugzilla 973: Implement --version.
* Bugzilla 752: Refuse to build/run if Exim user is root/0.
* Build without WITH_CONTENT_SCAN. Path from Andreas Metzler.
* Bugzilla 816: support multiple condition rules on Routers.
* Add bool_lax{} expansion operator and use that for combining multiple
  condition rules, instead of bool{}.  Make both bool{} and bool_lax{}
  ignore trailing whitespace.
* prevent non-panic DKIM error from being sent to paniclog
* added tcp_wrappers_daemon_name to allow host entries other than
  "exim" to be used
* Fix malware regression for cmdline scanner introduced in PP/08.
  Notification from Dr Andrew Aitchison.
* Change ClamAV response parsing to be more robust and to handle ClamAV's
  ExtendedDetectionInfo response format.
* OpenSSL 1.0.0a compatibility const-ness change, should be backwards
  compatible.

Revision 1.47: download - view: text, markup, annotated - select for diffs
Wed Jan 12 07:52:44 2011 UTC (13 years, 11 months ago) by adam
Branches: MAIN
Diff to: previous 1.46: preferred, colored
Changes since revision 1.46: +9 -5 lines
Changes 4.73:
* Date: & Message-Id: revert to normally being appended to a message,
  only prepend for the Resent-* case.  Fixes regression introduced in
  Exim 4.70 by NM/22 for Bugzilla 607.
* Include check_rfc2047_length in configure.default because we're seeing
  increasing numbers of administrators be bitten by this.
* Added DISABLE_DKIM and comment to src/EDITME
* Bugzilla 994: added openssl_options main configuration option.
* Bugzilla 995: provide better SSL diagnostics on failed reads.
* Bugzilla 834: provide a permit_coredump option for pipe transports.
* Adjust NTLM authentication to handle SASL Initial Response.
* If TLS negotiated an anonymous cipher, we could end up with SSL but
  without a peer certificate, leading to a segfault because of an
  assumption that peers always have certificates.  Be a little more paranoid.
* Bugzilla 926: switch ClamAV to use the new zINSTREAM API for content
  filtering; old API available if built with WITH_OLD_CLAMAV_STREAM=yes
  NB: ClamAV planning to remove STREAM in "middle of 2010".
  CL also introduces -bmalware, various -d+acl logging additions and
  more caution in buffer sizes.
* Implemented reverse_ip expansion operator.
* Bugzilla 937: provide a "debug" ACL control.
* Bugzilla 922: Documentation dusting, patch provided by John Horne.
* Bugzilla 973: Implement --version.
* Bugzilla 752: Refuse to build/run if Exim user is root/0.
* Build without WITH_CONTENT_SCAN. Path from Andreas Metzler.
* Bugzilla 816: support multiple condition rules on Routers.
* Add bool_lax{} expansion operator and use that for combining multiple
  condition rules, instead of bool{}.  Make both bool{} and bool_lax{}
  ignore trailing whitespace.
* prevent non-panic DKIM error from being sent to paniclog
* added tcp_wrappers_daemon_name to allow host entries other than
  "exim" to be used
* Fix malware regression for cmdline scanner introduced in PP/08.
  Notification from Dr Andrew Aitchison.
* Change ClamAV response parsing to be more robust and to handle ClamAV's
  ExtendedDetectionInfo response format.
* OpenSSL 1.0.0a compatibility const-ness change, should be backwards
  compatible.

Revision 1.46: download - view: text, markup, annotated - select for diffs
Mon Nov 8 13:59:11 2010 UTC (14 years, 1 month ago) by adam
Branches: MAIN
CVS tags: pkgsrc-2010Q4-base
Branch point for: pkgsrc-2010Q4
Diff to: previous 1.45: preferred, colored
Changes since revision 1.45: +3 -2 lines
* Fix resolver on NetBSD when Exim is linked with pthreads (e.g. when using
  sqlite).
* Pass LDFLAGS for linking (useful with different SDKs on Mac OS X).

Revision 1.45: download - view: text, markup, annotated - select for diffs
Sun Jun 6 14:15:30 2010 UTC (14 years, 6 months ago) by adam
Branches: MAIN
CVS tags: pkgsrc-2010Q3-base, pkgsrc-2010Q3, pkgsrc-2010Q2-base, pkgsrc-2010Q2
Diff to: previous 1.44: preferred, colored
Changes since revision 1.44: +4 -4 lines
Changes 4.72:
* installed exipick 20100104.1, adding $max_received_linelength, $data_path,
  and $header_path variables; fixed documentation bugs and typos
* installed exipick 20100222.0, added --input-dir and --finput to allow
   exipick to access non-standard spools, including the "frozen" queue (Finput)
* Support mysql stored procedures.
* Spacing fix (syntax error) on Makefile directives for NetBSD
* Documentation fix for max_rcpts.
* Fix for unknown responses from Dovecot authenticator.
* Added umask to procmail example.
* installed exipick 20100323.0, fixing doc bug
* CVE-2010-2023 - prevent hardlink attack on sticky mail directory.
* Upgrade PolarSSL files to upstream version 0.12.1.
* Improve log output when DKIM signing operation fails.
* Treat the transport option dkim_domain as a colon separated list, not as
  a single string, and sign the message with each element, omitting multiple
  occurences of the same signer.
* Null terminate DKIM strings, Null initialise DKIM variable
* dnsdb DNS TXT record bug fix (DKIM-related)
* CVE-2010-2024 - work round race condition on MBX locking.

Revision 1.44: download - view: text, markup, annotated - select for diffs
Sun Jan 31 21:06:29 2010 UTC (14 years, 10 months ago) by heinz
Branches: MAIN
CVS tags: pkgsrc-2010Q1-base, pkgsrc-2010Q1
Diff to: previous 1.43: preferred, colored
Changes since revision 1.43: +2 -2 lines
Added complete support for installation to DESTDIR. The Exim executable
file cannot run without EXIM_USER being present on the system, so
scripts/exim_install was changed to derive the Exim version from the
pkgsrc package version (see PKGSRC_EXIM_VERSION in the Makefile and patch-ae).

Added LICENSE information.

Ok'd by abs@

Revision 1.43: download - view: text, markup, annotated - select for diffs
Mon Dec 7 14:29:09 2009 UTC (15 years ago) by adam
Branches: MAIN
CVS tags: pkgsrc-2009Q4-base, pkgsrc-2009Q4
Diff to: previous 1.42: preferred, colored
Changes since revision 1.42: +4 -4 lines
Changes 4.71:
* Fix DKIM segfault on empty headers/body
* Documentation fix for gnutls_* options.
* Documentation for randint.  Better randomness defaults.
* Enable DNSDB lookup by default.
* Flag broken perl installation during build.

Revision 1.42: download - view: text, markup, annotated - select for diffs
Tue Nov 17 06:39:32 2009 UTC (15 years ago) by adam
Branches: MAIN
Diff to: previous 1.41: preferred, colored
Changes since revision 1.41: +6 -8 lines
Changes 4.70:
* Added patch by Johannes Berg that expands the main option
  "spamd_servers" if it starts with a dollar sign.
* Write list of recipients to X-Envelope-Sender header when building
  the mbox-format spool file for content scanning.
* Added patch by Wolfgang Breyha that adds experimental DCC
  (http://www.dcc-servers.net/) support via dccifd. Activated by
  setting EXPERIMENTAL_DCC=yes in Local/Makefile. Check out
  experimental_spec.txt for more documentation.
* Bugzilla 673: Add f-protd malware scanner support.
* Bugzilla 657: Embedded PCRE removed from the exim source tree.
  When building exim an external PCRE library is now needed -
  PCRE is a system library on the majority of modern systems.
  See entry on PCRE_LIBS in EDITME file.
* Bugzilla 646: Removed unwanted C/R in Dovecot authenticator
  conversation.  Added nologin parameter to request.
* Do not log submission mode rewrites if they do not change the address.
* Bugzilla 662: Fix stack corruption before exec() in daemon.c.
* Bugzilla 602: exicyclog now handles panic log, and creates empty
  log files in place.  Contributed by Roberto Lima
* Bugzilla 667: close socket used by dovecot authenticator
* Bugzilla 615: When checking the local_parts router precondition
  after a local_part_suffix or local_part_prefix option, Exim now
  does not use the address's named list lookup cache, since this
  contains cached lookups for the whole local part.
* Bugzilla 521: Integrated SPF Best Guess support contributed by
  Robert Millan.  Documentation is in experimental-spec.txt
* Bugzilla 668: Fix parallel build (make -j).
* Bugzilla 437: Prevent Maildir aux files being created with mode 000
* Bugzilla 598: Improvement to Dovecot authenticator handling.
* Leading white space used to be stripped from $spam_report which
  wrecked the formatting. Now it is preserved.
* Save $spam_score, $spam_bar, and $spam_report in spool files, so
  that they are available at delivery time.
* Fix the way ${extract is skipped in the untaken branch of a conditional.
* TLS error reporting now respects the incoming_interface and
  incoming_port log selectors.
* more...

Revision 1.41: download - view: text, markup, annotated - select for diffs
Fri Feb 13 15:28:03 2009 UTC (15 years, 10 months ago) by abs
Branches: MAIN
CVS tags: pkgsrc-2009Q3-base, pkgsrc-2009Q3, pkgsrc-2009Q2-base, pkgsrc-2009Q2, pkgsrc-2009Q1-base, pkgsrc-2009Q1
Diff to: previous 1.40: preferred, colored
Changes since revision 1.40: +2 -2 lines
Add PKG_DESTDIR_SUPPORT=destdir

Revision 1.40: download - view: text, markup, annotated - select for diffs
Mon Jan 12 18:59:24 2009 UTC (15 years, 11 months ago) by abs
Branches: MAIN
Diff to: previous 1.39: preferred, colored
Changes since revision 1.39: +3 -1 lines
Update exim to 4.69nb4
- Add support for getifaddrs() and enable on NetBSD - submitted back to
  exim bugzilla as http://bugs.exim.org/show_bug.cgi?id=802
- Increase size of addrbuf[512] used in old style ioctl() version of
  os_common_find_running_interfaces()
Fixes issue on NetBSD 5.0

Revision 1.39: download - view: text, markup, annotated - select for diffs
Mon Jan 14 18:57:39 2008 UTC (16 years, 11 months ago) by adam
Branches: MAIN
CVS tags: pkgsrc-2008Q4-base, pkgsrc-2008Q4, pkgsrc-2008Q3-base, pkgsrc-2008Q3, pkgsrc-2008Q2-base, pkgsrc-2008Q2, pkgsrc-2008Q1-base, pkgsrc-2008Q1, cwrapper, cube-native-xorg-base, cube-native-xorg
Diff to: previous 1.38: preferred, colored
Changes since revision 1.38: +4 -4 lines
Changes 4.69:
* Add preliminary DKIM support.
* Bugzilla 592: --help option is handled incorrectly if exim is invoked
  as mailq or other aliases.  Changed the --help handling significantly
  to do whats expected.  exim_usage() emits usage/help information.
* Added the -bylocaldomain option to eximstats.
* Bugzilla 619: Defended against bad data coming back from gethostbyaddr
* Bugzilla 613: Documentation fix for acl_not_smtp
* Bugzilla 628: PCRE update to 7.4 (work done by John Hall)

Revision 1.38: download - view: text, markup, annotated - select for diffs
Sun Oct 14 19:14:57 2007 UTC (17 years, 2 months ago) by adam
Branches: MAIN
CVS tags: pkgsrc-2007Q4-base, pkgsrc-2007Q4
Diff to: previous 1.37: preferred, colored
Changes since revision 1.37: +4 -7 lines
Changes 4.68:
* Bug fixes

Revision 1.37: download - view: text, markup, annotated - select for diffs
Sun Jun 24 10:55:41 2007 UTC (17 years, 5 months ago) by abs
Branches: MAIN
CVS tags: pkgsrc-2007Q3-base, pkgsrc-2007Q3, pkgsrc-2007Q2-base, pkgsrc-2007Q2
Diff to: previous 1.36: preferred, colored
Changes since revision 1.36: +5 -5 lines
Update mail/exim to 4.67:

	Prompted by report from Peter Avalos that exim 4.66 would not build
	against openssl 0.9.8e

Changelog:

MH/01 Fix for bug #448, segfault in Dovecot authenticator when interface_address
      is unset (happens when testing with -bh and -oMi isn't used). Thanks to
      Jan Srzednicki.

PH/01 Added a new log selector smtp_no_mail, to log SMTP sessions that do not
      issue a MAIL command.

PH/02 In an ACL statement such as

        deny dnslists = X!=127.0.0.2 : X=127.0.0.2

      if a client was not listed at all, or was listed with a value other than
      127.0.0.2, in the X list, but was listed with 127.0.0.2 in the Y list,
      the condition was not true (as it should be), so access was not denied.
      The bug was that the ! inversion was incorrectly passed on to the second
      item. This has been fixed.

PH/03 Added additional dnslists conditions == and =& which are different from
      = and & when the dns lookup returns more than one IP address.

PH/04 Added gnutls_require_{kx,mac,protocols} to give more control over the
      cipher suites used by GnuTLS. These options are ignored by OpenSSL.

PH/05 After discussion on the list, added a compile time option ENABLE_DISABLE_
      FSYNC, which compiles an option called disable_fsync that allows for
      bypassing fsync(). The documentation is heavily laced with warnings.

SC/01 Updated eximstats to collate all SpamAssassin rejects into one bucket.

PH/06 Some tidies to the infrastructure of the Test Suite that is concerned
      with the auxiliary C programs that it uses: (1) Arrange for BIND_8_COMPAT
      to be defined when compiling on OSX (Darwin); (2) Tidies to the Makefile,
      including adding "make clean"; (3) Added -fPIC when compiling the test
      dynamically loaded module, to get rid of a warning.

MH/02 Fix for bug #451, causing paniclog entries to be written if a bounce
      message fails, move_frozen_messages = true and ignore_bounce_errors_after
      = 0s. The bug is otherwise harmless.

PH/07 There was a bug in the dovecot authenticator such that the value of
      $auth1 could be overwritten, and so not correctly preserved, after a
      successful authentication. This usually meant that the value preserved by
      the server_setid option was incorrect.

PH/08 Added $smtp_count_at_connection_start, deliberately with a long name.

PH/09 Installed PCRE release 7.0.

PH/10 The acl_not_smtp_start ACL was, contrary to the documentation, not being
      run for batched SMTP input. It is now run at the start of every message
      in the batch. While fixing this I discovered that the process information
      (output by running exiwhat) was not always getting set for -bs and -bS
      input. This is fixed, and it now also says "batched" for BSMTP.

PH/11 Added control=no_pipelining.

PH/12 Added $sending_ip_address and $sending_port (mostly Magnus Holmgren's
      patch, slightly modified), and move the expansion of helo_data till after
      the connection is made in the smtp transport (so it can use these
      values).

PH/13 Added ${rfc2047d: to decoded RFC 2047 strings.

PH/14 Added log_selector = +pid.

PH/15 Flush SMTP output before delaying, unless control=no_delay_flush is set.

PH/16 Add ${if forany and ${if forall.

PH/17 Added dsn_from option to vary the From: line in DSNs.

PH/18 Flush SMTP output before performing a callout, unless control =
      no_callout_flush is set.

PH/19 Change 4.64/PH/36 introduced a bug: when address_retry_include_sender
      was true (the default) a successful delivery failed to delete the retry
      item, thus causing premature timeout of the address. The bug is now
      fixed.

PH/20 Added hosts_avoid_pipelining to the smtp transport.

PH/21 Long custom messages for fakedefer and fakereject are now split up
      into multiline reponses in the same way that messages for "deny" and
      other ACL rejections are.

PH/22 Applied Jori Hamalainen's speed-up changes and typo fixes to exigrep,
      with slight modification.

PH/23 Applied sieve patches from the maintainer "tracking the latest notify
      draft, changing the syntax and factoring some duplicate code".

PH/24 When the log selector "outgoing_port" was set, the port was shown as -1
      for deliveries of the second and subsequent messages over the same SMTP
      connection.

PH/25 Applied Magnus Holmgren's patch for ${addresses, ${map, ${filter, and
      ${reduce, with only minor "tidies".

SC/02 Applied Daniel Tiefnig's patch to improve the '($parent) =' pattern match.

PH/26 Added a "continue" ACL modifier that does nothing, for the benefit of its
      expansion side effects.

PH/27 When a message times out after an over-quota error from an Exim-imposed
      quota, the bounce message says "mailbox is full". This message was not
      being given when it was a system quota that was exceeded. It now should
      be the same.

MH/03 Made $recipients available in local_scan(). local_scan() already has
      better access to the recipient list through recipients_list[], but
      $recipients can be useful in postmaster-provided expansion strings.

PH/28 The $smtp_command and $smtp_command_argument variables were not correct
      in the case of a MAIL command with additional options following the
      address, for example: MAIL FROM:<foo@bar> SIZE=1234. The option settings
      were accidentally chopped off.

PH/29 SMTP synchronization checks are implemented when a command is read -
      there is a check that no more input is waiting when there shouldn't be
      any. However, for some commands, a delay in an ACL can mean that it is
      some time before the response is written. In this time, more input might
      arrive, invalidly. So now there are extra checks after an ACL has run for
      HELO/EHLO and after the predata ACL, and likewise for MAIL and RCPT when
      pipelining has not been advertised.

PH/30 MH's patch to allow iscntrl() characters to be list separators.

PH/31 Unlike :fail:, a custom message specified with :defer: was not being
      returned in the SMTP response when smtp_return_error_details was false.
      This has been fixed.

PH/32 Change the Dovecot authenticator to use read() and write() on the socket
      instead of the C I/O that was originally supplied, because problems were
      reported on Solaris.

PH/33 Compile failed with OpenSSL 0.9.8e. This was due to a coding error in
      Exim which did not show up earlier: it was assuming that a call to
      SSL_CTX_set_info_callback() might give an error value. In fact, there is
      no error. In previous releases of OpenSSL, SSL_CTX_set_info_callback()
      was a macro that became an assignment, so it seemed to work. This has
      changed to a proper function call with a void return, hence the compile
      error. Exim's code has been fixed.

PH/34 Change HDA_SIZE in oracle.c from 256 to 512. This is needed for 64-bit
      cpus.

PH/35 Applied a patch from the Sieve maintainer which fixes a bug in "notify".

PH/36 Applied John Jetmore's patch to add -v functionality to exigrep.

PH/37 If a message is not accepted after it has had an id assigned (e.g.
      because it turns out to be too big or there is a timeout) there is no
      "Completed" line in the log. When some messages of this type were
      selected by exigrep, they were listed as "not completed". Others were
      picked up by some special patterns. I have improved the selection
      criteria to be more general.

PH/38 The host_find_failed option in the manualroute router can now be set
      to "ignore", to completely ignore a host whose IP address cannot be
      found. If all hosts are ignored, the behaviour is controlled by the new
      host_all_ignored option.

PH/39 In a list of hosts for manualroute, if one item (either because of multi-
      homing or because of multiple MX records with /mx) generated more than
      one IP address, and the following item turned out to be the local host,
      all the secondary addresses of the first item were incorrectly removed
      from the list, along with the local host and any following hosts (which
      is what is supposed to happen).

PH/40 When Exim receives a message, it writes the login name, uid, and gid of
      whoever called Exim into the -H file. In the case of the daemon it was
      behaving confusingly. When first started, it used values for whoever
      started the daemon, but after a SIGHUP it used the Exim user (because it
      calls itself on a restart). I have changed the code so that it now always
      uses the Exim user.

PH/41 (Following a suggestion from Tony Finch) If all the RCPT commands in a
      message are rejected with the same error (e.g. no authentication or bad
      sender address), and a DATA command is nevertheless sent (as can happen
      with PIPELINING or a stupid MUA), the error message that was given to the
      RCPT commands is included in the rejection of the DATA command. This is
      intended to be helpful for MUAs that show only the final error to their
      users.

PH/42 Another patch from the Sieve maintainer.

SC/02 Eximstats - Differentiate between permanent and temporary rejects.
      Eximstats - Fixed some broken HTML links and added missing column headers
                  (Jez Hancock).
      Eximstats - Fixed Grand Total Summary Domains, Edomains, and Email
                  columns for Rejects, Temp Rejects, Ham, and Spam rows.

SC/03 Eximstats - V1.58 Fix to get <> and blackhole to show in edomain tables.

PH/43 Yet another patch from the Sieve maintainer.

PH/44 I found a way to check for a TCP/IP connection going away before sending
      the response to the final '.' that terminates a message, but only in the
      case where the client has not sent further data following the '.'
      (unfortunately, this is allowed). However, in many cases there won't be
      any further data because there won't be any more messages to send. A call
      to select() can be used: if it shows that the input is "ready", there is
      either input waiting, or the socket has been closed. An attempt to read
      the next input character can distinguish the two cases. Previously, Exim
      would have sent an OK response which the client would never have see.
      This could lead to message repetition. This fix should cure that, at
      least in a lot of common cases.

PH/45 Do not advertise STARTTLS in response to HELP unless it would be
      advertised in response to EHLO.

Revision 1.36: download - view: text, markup, annotated - select for diffs
Wed Jan 10 12:54:36 2007 UTC (17 years, 11 months ago) by abs
Branches: MAIN
CVS tags: pkgsrc-2007Q1-base, pkgsrc-2007Q1
Diff to: previous 1.35: preferred, colored
Changes since revision 1.35: +5 -5 lines
Update mail/exim from 4.63 to 4.66

Exim version 4.66
-----------------

PH/01 Two more bugs that were introduced by 4.64/PH/07, in addition to the one
      fixed by 4.65/MH/01 (is this a record?) are fixed:

      (i)  An empty string was always treated as zero by the numeric comparison
           operators. This behaviour has been restored.

      (ii) It is documented that the numeric comparison operators always treat
           their arguments as decimal numbers. This was broken in that numbers
           starting with 0 were being interpreted as octal.

      While fixing these problems I realized that there was another issue that
      hadn't been noticed. Values of message_size_limit (both the global option
      and the transport option) were treated as octal if they started with 0.
      The documentation was vague. These values are now always treated as
      decimal, and I will make that clear in the documentation.


Exim version 4.65
-----------------

TK/01 Disable default definition of HAVE_LINUX_SENDFILE. Clashes with
      Linux large file support (_FILE_OFFSET_BITS=64) on older glibc
      versions. (#438)

MH/01 Don't check that the operands of numeric comparison operators are
      integers when their expansion is in "skipping" mode (fixes bug
      introduced by 4.64-PH/07).

PH/01 If a system filter or a router generates more than SHRT_MAX (32767)
      child addresses, Exim now panics and dies. Previously, because the count
      is held in a short int, deliveries were likely to be lost. As such a
      large number of recipients for a single message is ridiculous
      (performance will be very, very poor), I have chosen to impose a limit
      rather than extend the field.


Exim version 4.64
-----------------

TK/01 Bugzilla #401. Fix DK spooling code so that it can overwrite a
      leftover -K file (the existence of which was triggered by #402).
      While we were at it, introduced process PID as part of the -K
      filename. This should rule out race conditions when creating
      these files.

TK/02 Bugzilla #402. Apply patch from Simon Arlott, speeding up DK signing
      processing considerably. Previous code took too long for large mails,
      triggering a timeout which in turn triggers #401.

TK/03 Introduced HAVE_LINUX_SENDFILE to os.h-Linux. Currently only used
      in the DK code in transports.c. sendfile() is not really portable,
      hence the _LINUX specificness.

TF/01 In the add_headers option to the mail command in an Exim filter,
      there was a bug that Exim would claim a syntax error in any
      header after the first one which had an odd number of characters
      in the field name.

PH/01 If a server that rejects MAIL FROM:<> was the target of a sender
      callout verification, Exim cached a "reject" for the entire domain. This
      is correct for most verifications, but it is not correct for a recipient
      verification with use_sender or use_postmaster set, because in that case
      the callout does not use MAIL FROM:<>. Exim now distinguishes the special
      case of MAIL FROM:<> rejection from other early rejections (e.g.
      rejection of HELO). When verifying a recipient using a non-null MAIL
      address, the cache is ignored if it shows MAIL FROM:<> rejection.
      Whatever the result of the callout, the value of the domain cache is
      left unchanged (for any other kind of callout, getting as far as trying
      RCPT means that the domain itself is ok).

PH/02 Tidied a number of unused variable and signed/unsigned warnings that
      gcc 4.1.1 threw up.

PH/03 On Solaris, an unexpectedly close socket (dropped connection) can
      manifest itself as EPIPE rather than ECONNECT. When tidying away a
      session, the daemon ignores ECONNECT errors and logs others; it now
      ignores EPIPE as well.

PH/04 Applied Nico Erfurth's refactoring patch to tidy up mime.c
      (quoted-printable decoding).

PH/05 Applied Nico Erfurth's refactoring patch to tidy up spool_mbox.c, and
      later the small subsequent patch to fix an introduced bug.

PH/06 Installed the latest Cygwin Makefile from the Cygwin maintainer.

PH/07 There was no check for overflow in expansions such as ${if >{1}{4096M}}.

PH/08 An error is now given if message_size_limit is specified negative.

PH/09 Applied and tidied up Jakob Hirsch's patch for allowing ACL variables
      to be given (somewhat) arbitrary names.

JJ/01 exipick 20060919.0, allow for arbitrary acl_ variables introduced
      in 4.64-PH/09.

JJ/02 exipick 20060919.0, --show-vars args can now be regular expressions,
      miscellaneous code fixes

PH/10 Added the log_reject_target ACL modifier to specify where to log
      rejections.

PH/11 Callouts were setting the name used for EHLO/HELO from $smtp_active_
      hostname. This is wrong, because it relates to the incoming message (and
      probably the interface on which it is arriving) and not to the outgoing
      callout (which could be using a different interface). This has been
      changed to use the value of the helo_data option from the smtp transport
      instead - this is what is used when a message is actually being sent. If
      there is no remote transport (possible with a router that sets up host
      addresses), $smtp_active_hostname is used.

PH/12 Installed Andrey Panin's patch to add a dovecot authenticator. Various
      tweaks were necessary in order to get it to work (see also 21 below):
      (a) The code assumed that strncpy() returns a negative number on buffer
          overflow, which isn't the case. Replaced with Exim's string_format()
          function.
      (b) There were several signed/unsigned issues. I just did the minimum
          hacking in of casts. There is scope for a larger refactoring.
      (c) The code used strcasecmp() which is not a standard C function.
          Replaced with Exim's strcmpic() function.
      (d) The code set only $1; it now sets $auth1 as well.
      (e) A simple test gave the error "authentication client didn't specify
          service in request". It would seem that Dovecot has changed its
          interface. Fortunately there's a specification; I followed it and
          changed what the client sends and it appears to be working now.

PH/13 Added $message_headers_raw to provide the headers without RFC 2047
      decoding.

PH/14 Corrected misleading output from -bv when -v was also used. Suppose the
      address A is aliased to B and C, where B exists and C does not. Without
      -v the output is "A verified" because verification stops after a
      successful redirection if more than one address is generated. However,
      with -v the child addresses are also verified. Exim was outputting "A
      failed to verify" and then showing the successful verification for C,
      with its parentage. It now outputs "B failed to verify", showing B's
      parentage before showing the successful verification of C.

PH/15 Applied Michael Deutschmann's patch to allow DNS black list processing to
      look up a TXT record in a specific list after matching in a combined
      list.

PH/16 It seems that the options setting for the resolver (RES_DEFNAMES and
      RES_DNSRCH) can affect the behaviour of gethostbyname() and friends when
      they consult the DNS. I had assumed they would set it the way they
      wanted; and indeed my experiments on Linux seem to show that in some
      cases they do (I could influence IPv6 lookups but not IPv4 lookups).
      To be on the safe side, however, I have now made the interface to
      host_find_byname() similar to host_find_bydns(), with an argument
      containing the DNS resolver options. The host_find_byname() function now
      sets these options at its start, just as host_find_bydns() does. The smtp
      transport options dns_qualify_single and dns_search_parents are passed to
      host_find_byname() when gethostbyname=TRUE in this transport. Other uses
      of host_find_byname() use the default settings of RES_DEFNAMES
      (qualify_single) but not RES_DNSRCH (search_parents).

PH/17 Applied (a modified version of) Nico Erfurth's patch to make
      spool_read_header() do less string testing, by means of a preliminary
      switch on the second character of optional "-foo" lines. (This is
      overdue, caused by the large number of possibilities that now exist.
      Originally there were few.) While I was there, I also converted the
      str(n)cmp tests so they don't re-test the leading "-" and the first
      character, in the hope this might squeeze out yet more improvement.

PH/18 Two problems with "group" syntax in header lines when verifying: (1) The
      flag allowing group syntax was set by the header_syntax check but not
      turned off, possible causing trouble later; (2) The flag was not being
      set at all for the header_verify test, causing "group"-style headers to
      be rejected. I have now set it in this case, and also caused header_
      verify to ignore an empty address taken from a group. While doing this, I
      came across some other cases where the code for allowing group syntax
      while scanning a header line wasn't quite right (mostly, not resetting
      the flag correctly in the right place). These bugs could have caused
      trouble for malformed header lines. I hope it is now all correct.

PH/19 The functions {pwcheck,saslauthd}_verify_password() are always called
      with the "reply" argument non-NULL. The code, however (which originally
      came from elsewhere) had *some* tests for NULL when it wrote to *reply,
      but it didn't always do it. This confused somebody who was copying the
      code for some other use. I have removed all the tests.

PH/20 It was discovered that the GnuTLS code had support for RSA_EXPORT, a
      feature that was used to support insecure browsers during the U.S. crypto
      embargo. It requires special client support, and Exim is probably the
      only MTA that supported it -- and would never use it because real RSA is
      always available. This code has been removed, because it had the bad
      effect of slowing Exim down by computing (never used) parameters for the
      RSA_EXPORT functionality.

PH/21 On the advice of Timo Sirainen, added a check to the dovecot
      authenticator to fail if there's a tab character in the incoming data
      (there should never be unless someone is messing about, as it's supposed
      to be base64-encoded). Also added, on Timo's advice, the "secured" option
      if the connection is using TLS or if the remote IP is the same as the
      local IP, and the "valid-client-cert option" if a client certificate has
      been verified.

PH/22 As suggested by Dennis Davis, added a server_condition option to *all*
      authenticators. This can be used for authorization after authentication
      succeeds. (In the case of plaintext, it servers for both authentication
      and authorization.)

PH/23 Testing for tls_required and lost_connection in a retry rule didn't work
      if any retry times were supplied.

PH/24 Exim crashed if verify=helo was activated during an incoming -bs
      connection, where there is no client IP address to check. In this
      situation, the verify now always succeeds.

PH/25 Applied John Jetmore's -Mset patch.

PH/26 Added -bem to be like -Mset, but loading a message from a file.

PH/27 In a string expansion for a processed (not raw) header when multiple
      headers of the same name were present, leading whitespace was being
      removed from all of them, but trailing whitespace was being removed only
      from the last one. Now trailing whitespace is removed from each header
      before concatenation. Completely empty headers in a concatenation (as
      before) are ignored.

PH/28 Fixed bug in backwards-compatibility feature of PH/09 (thanks to John
      Jetmore). It would have mis-read ACL variables from pre-4.61 spool files.

PH/29 [Removed. This was a change that I later backed out, and forgot to
      correct the ChangeLog entry (that I had efficiently created) before
      committing the later change.]

PH/30 Exim was sometimes attempting to deliver messages that had suffered
      address errors (4xx response to RCPT) over the same connection as other
      messages routed to the same hosts. Such deliveries are always "forced",
      so retry times are not inspected. This resulted in far too many retries
      for the affected addresses. The effect occurred only when there were more
      hosts than the hosts_max_try setting in the smtp transport when it had
      the 4xx errors. Those hosts that it had tried were not added to the list
      of hosts for which the message was waiting, so if all were tried, there
      was no problem. Two fixes have been applied:

      (i)  If there are any address or message errors in an SMTP delivery, none
           of the hosts (tried or untried) are now added to the list of hosts
           for which the message is waiting, so the message should not be a
           candidate for sending over the same connection that was used for a
           successful delivery of some other message. This seems entirely
           reasonable: after all the message is NOT "waiting for some host".
           This is so "obvious" that I'm not sure why it wasn't done
           previously. Hope I haven't missed anything, but it can't do any
           harm, as the worst effect is to miss an optimization.

      (ii) If, despite (i), such a delivery is accidentally attempted, the
           routing retry time is respected, so at least it doesn't keep
           hammering the server.

PH/31 Installed Andrew Findlay's patch to close the writing end of the socket
      in ${readsocket because some servers need this prod.

PH/32 Added some extra debug output when updating a wait-xxx database.

PH/33 The hint "could be header name not terminated by colon", which has been
      given for certain expansion errors for a long time, was not being given
      for the ${if def:h_colon_omitted{...  case.

PH/34 The spec says: "With one important exception, whenever a domain list is
      being scanned, $domain contains the subject domain." There was at least
      one case where this was not true.

PH/35 The error "getsockname() failed: connection reset by peer" was being
      written to the panic log as well as the main log, but it isn't really
      panic-worthy as it just means the connection died rather early on. I have
      removed the panic log writing for the ECONNRESET error when getsockname()
      fails.

PH/36 After a 4xx response to a RCPT error, that address was delayed (in queue
      runs only) independently of the message's sender address. This meant
      that, if the 4xx error was in fact related to the sender, a different
      message to the same recipient with a different sender could confuse
      things. In particualar, this can happen when sending to a greylisting
      server, but other circumstances could also provoke similar problems.
      I have changed the default so that the retry time for these errors is now
      based a combination of the sender and recipient addresses. This change
      can be overridden by setting address_retry_include_sender=false in the
      smtp transport.

PH/37 For LMTP over TCP/IP (the smtp transport), error responses from the
      remote server are returned as part of bounce messages. This was not
      happening for LMTP over a pipe (the lmtp transport), but now it is the
      same for both kinds of LMTP.

PH/38 Despite being documented as not happening, Exim was rewriting addresses
      in header lines that were in fact CNAMEs. This is no longer the case.

PH/39 If -R or -S was given with -q<time>, the effect of -R or -S was ignored,
      and queue runs started by the daemon processed all messages. This has
      been fixed so that -R and -S can now usefully be given with -q<time>.

PH/40 Import PCRE release 6.7 (fixes some bugs).

PH/41 Add bitwise logical operations to eval (courtesy Brad Jorsch).

PH/42 Give an error if -q is specified more than once.

PH/43 Renamed the variables $interface_address and $interface_port as
      $received_ip_address and $received_port, to make it clear that these
      values apply to message reception, and not to the outgoing interface when
      a message is delivered. (The old names remain recognized, of course.)

PH/44 There was no timeout on the connect() call when using a Unix domain
      socket in the ${readsocket expansion. There now is.

PH/45 Applied a modified version of Brad Jorsch's patch to allow "message" to
      be meaningful with "accept".

SC/01 Eximstats V1.43
     Bug fix for V1.42 with -h0 specified. Spotted by Chris Lear.

SC/02 Eximstats V1.44
      Use a glob alias rather than an array ref in the generated
      parser. This improves both readability and performance.

SC/03 Eximstats V1.45 (Marco Gaiarin / Steve Campbell)
      Collect SpamAssassin and rejection statistics.
      Don't display local sender or destination tables unless
      there is data to show.
      Added average volumes into the top table text output.

SC/04 Eximstats V1.46
      Collect data on the number of addresses (recipients)
      as well as the number of messages.

SC/05 Eximstats V1.47
      Added 'Message too big' to the list of mail rejection
      reasons (thanks to Marco Gaiarin).

SC/06 Eximstats V1.48
      Mainlog lines which have GMT offsets and are too short to
      have a flag are now skipped.

SC/07 Eximstats V1.49 (Alain Williams)
      Added the -emptyok flag.

SC/08 Eximstats V1.50
      Fixes for obtaining the IP address from reject messages.

JJ/03 exipick.20061117.2, made header handling as similar to exim as possible
      (added [br]h_ prefixes, implemented RFC2047 decoding.  Fixed
      whitesspace changes from 4.64-PH/27

JJ/04 exipick.20061117.2, fixed format and added $message_headers_raw to
      match 4.64-PH/13

JJ/05 exipick.20061117.2, bug fixes (error out sooner when invalid criteria
      are found, allow negative numbers in numeric criteria)

JJ/06 exipick.20061117.2, added new $message_body_missing variable

JJ/07 exipick.20061117.2, added $received_ip_address and $received_port
      to match changes made in 4.64-PH/43

PH/46 Applied Jori Hamalainen's patch to add features to exiqsumm.

PH/47 Put in an explicit test for a DNS lookup of an address record where the
      "domain" is actually an IP address, and force a failure. This locks out
      those revolvers/nameservers that support "A-for-A" lookups, in
      contravention of the specifications.

PH/48 When a host name was looked up from an IP address, and the subsequent
      forward lookup of the name timed out, the host name was left in
      $sender_host_name, contrary to the specification.

PH/49 Although default lookup types such as lsearch* or cdb*@ have always been
      restricted to single-key lookups, Exim was not diagnosing an error if
      * or *@ was used with a query-style lookup.

PH/50 Increased the value of DH_BITS in tls-gnu.c from 768 to 1024.

MH/01 local_scan ABI version incremented to 1.1. It should have been updated
      long ago, but noone interested enough thought of it. Let's just say that
      the "1.1" means that there are some new functions that weren't there at
      some point in the past.

PH/51 Error processing for expansion failure of helo_data from an smtp
      transport during callout processing was broken.

PH/52 Applied John Jetmore's patch to allow tls-on-connect and STARTTLS to be
      tested/used via the -bh/-bhc/-bs options.

PH/53 Added missing "#include <time.h>" to pcre/pcretest.c (this was a PCRE
      bug, fixed in subsequent PCRE releases).

PH/54 Applied Robert Bannocks' patch to avoid a problem with references that
      arises when using the Solaris LDAP libraries (but not with OpenLDAP).

PH/55 Check for a ridiculously long file name in exim_dbmbuild.

Revision 1.35: download - view: text, markup, annotated - select for diffs
Mon Nov 20 11:56:42 2006 UTC (18 years ago) by abs
Branches: MAIN
CVS tags: pkgsrc-2006Q4-base, pkgsrc-2006Q4
Diff to: previous 1.34: preferred, colored
Changes since revision 1.34: +2 -2 lines
Update mail/exim to 4.63nb1
- Add options exim-appendfile-maildir exim-appendfile-mailstore
  exim-appendfile-mbx exim-lookup-cdb exim-tcp-wrappers exim-tls
  All but exim-lookup-cdb default to off, to preserve previous
  defaults.

Revision 1.34: download - view: text, markup, annotated - select for diffs
Wed Aug 30 21:11:37 2006 UTC (18 years, 3 months ago) by abs
Branches: MAIN
CVS tags: pkgsrc-2006Q3-base, pkgsrc-2006Q3
Diff to: previous 1.33: preferred, colored
Changes since revision 1.33: +4 -4 lines
Update mail/exim from 4.62 to 4.63:

SC/01 Use a glob alias rather than an array ref in eximstats generated
      parser. This improves both readability and performance.

SC/02 Collect SpamAssassin and rejection statistics in eximstats.
      Don't display local sender or destination tables in eximstats unless
      there is data to show.
      Added average volumes into the eximstats top table text output.

SC/03 Collect data on the number of addresses (recipients) as well
      as the number of messages in eximstats.

TF/01 Correct an error in the documentation for the redirect router. Exim
      does (usually) call initgroups() when daemonizing.

TF/02 Call initgroups() when dropping privilege in exim.c, so that Exim runs
      with consistent privilege compared to when running as a daemon.

TF/03 Note in the spec that $authenticated_id is not set for local
      submissions from trusted users.

TF/04 The ratelimit per_rcpt option now works correctly in acl_not_smtp.
      Thanks to Dean Brooks for the patch.

TF/05 Make it easier to get SMTP authentication and TLS/SSL support working
      by adding some example configuration directives to the default
      configuration file. A little bit of work is required to uncomment the
      directives and define how usernames and passwords are checked, but
      there is now a framework to start from.

PH/01 Added #define LDAP_DEPRECATED 1 to ldap.c because some of the "old"
      functions that Exim currently uses aren't defined in ldap.h for OpenLDAP
      without this. I don't know how relevant this is to other LDAP libraries.

PH/02 Add the verb name to the "unknown ACL verb" error.

PH/03 Magnus Holmgren's patch for filter_prepend_home.

PH/03 Fixed Bugzilla #101: macro definition between ACLs doesn't work.

PH/04 Applied Magnus Holmgren's patch to fix Bugzilla #98: transport's home
      directory not expanded when it should be if an expanded home directory
      was set for the address (which is overridden by the transport).

PH/05 Applied Alex Kiernan's patch to fix Bugzilla #99: a problem with
      libradius.

PH/06 Added acl_not_smtp_start, based on Johannes Berg's patch, and set the
      bit to forbid control=suppress_local_fixups in the acl_not_smtp ACL,
      because it is too late at that time, and has no effect.

PH/07 Changed ${quote_pgsql to quote ' as '' instead of \' because of a
      security issue with \' (bugzilla #107). I could not use the
      PQescapeStringConn() function, because it needs a PGconn value as one of
      its arguments.

PH/08 When testing addresses using -bt, indicate those final addresses that
      are duplicates that would not cause an additional delivery. At least one
      person was confused, thinking that -bt output corresponded to deliveries.
      (Suppressing duplicates isn't a good idea as you lose the information
      about possibly different redirections that led to the duplicates.)

PH/09 Applied patch from Erik to use select() instead of poll() in spam.c on
      systems where poll() doesn't work, in particular OS X.

PH/10 Added more information to debugging output for retry time not reached.

PH/11 Applied patch from Arkadiusz Miskiewicz to apply a timeout to read
      operations in malware.c.

PH/12 Applied patch from Magnus Holmgren to include the "h" tag in Domain Keys
      signatures.

PH/13 If write_rejectlog was set false when logging was sent to syslog with
      syslog_duplication set false, log lines that would normally be written
      both the the main log and to the reject log were not written to syslog at
      all.

PH/14 In the default configuration, change the use of "message" in ACL warn
      statements to "add_header".

PH/15 Diagnose a filter syntax error for "seen", "unseen", or "noerror" if not
      not followed by a command (e.g. "seen endif").

PH/16 Recognize SMTP codes at the start of "message" in ACLs and after :fail:
      and :defer: in a redirect router. Add forbid_smtp_code to suppress the
      latter.

PH/17 Added extra conditions to the default value of delay_warning_condition
      so that it is now:

        ${if or { \
            { !eq{$h_list-id:$h_list-post:$h_list-subscribe:}{} } \
            { match{$h_precedence:}{(?i)bulk|list|junk} } \
            { match{$h_auto-submitted:}{(?i)auto-generated|auto-replied} } \
            }{no}{yes}}

      The Auto-Submitted: and various List- headers are standardised, whereas I
      don't think Precedence: ever was.

PH/18 Refactored debugging code in route_finduser() to show more information,
      in particular, the error code if getpwnam() issues one.

PH/19 Added PQsetClientEncoding(conn, "SQL_ASCII") to the pgsql code module.
      This is apparently needed in addition to the PH/07 change above to avoid
      any possible encoding problems.

PH/20 Perl can change the locale. Exim was resetting it after a ${perl call,
      but not after initializing Perl.

PH/21 Added a call to PQsetNoticeProcessor() to catch pgsql "notices" and
      output them only if debugging. By default they are written stderr,
      apparently, which is not desirable.

PH/22 Added Alain Williams' LDAP patch to support setting REFERRALS=off on
      queries.

JJ/01 exipick: added --reverse (and -R synonym), --random, --size, --sort and
      --not options

JJ/02 exipick: rewrote --help documentation to hopefully make more clear.

PH/23 Made -oMaa and -oMt work with -bh and -bs to pretend the connection is
      authenticated or an ident call has been made. Suppress the default
      values for $authenticated_id and $authenticated_sender (but permit -oMai
      and -oMas) when testing with -bh.

PH/24 Re-jigged the order of the tests in the default configuration so that the
      tests for valid domains and recipients precede the DNS black list and CSA
      tests, on the grounds that those ones are more expensive.

PH/25 Exim was not testing for a space following SMTP commands such as EHLO
      that require one. Thus, EHLORHUBARB was interpreted as a valid command.
      This bug exists in every version of Exim that I still have, right back to
      0.12.

PH/26 (n)wildlsearch lookups are documented as being done case-insensitively.
      However, an attempt to turn on case-sensitivity in a regex key by
      including (?-i) didn't work because the subject string was already
      lowercased, and the effects were non-intuitive. It turns out that a
      one-line patch can be used to allow (?-i) to work as expected.

Revision 1.33: download - view: text, markup, annotated - select for diffs
Tue Aug 8 15:24:01 2006 UTC (18 years, 4 months ago) by abs
Branches: MAIN
Diff to: previous 1.32: preferred, colored
Changes since revision 1.32: +11 -11 lines
Update exim from 4.54 to 4.62

Exim version 4.62
-----------------

TF/01 Fix the add_header change below (4.61 PH/55) which had a bug that (amongst
      other effects) broke the use of negated acl sub-conditions.

PH/01 ${readsocket now supports Internet domain sockets (modified John Jetmore
      patch).

PH/02 When tcp-wrappers is called from Exim, it returns only "deny" or "allow".
      "Deny" causes Exim to reject the incoming connection with a 554 error.
      Unfortunately, if there is a major crisis, such as a disk failure,
      tcp-wrappers gives "deny", whereas what one would like would be some
      kind of temporary error. A kludge has been added to help with this.
      Before calling hosts_ctl(), errno is set zero. If the result is "deny", a
      554 error is used if errno is still zero or contains ENOENT (which occurs
      if either of the /etc/hosts.{allow,deny} files is missing). Otherwise, a
      451 error is used.

PH/03 Add -lutil to the default FreeBSD LIBS setting.

PH/04 Change PH/19 for 4.61 was too wide. It should not be applied to host
      errors. Otherwise a message that provokes a temporary error (when other
      messages do not) can cause a whole host to time out.

PH/05 Batch deliveries by appendfile and pipe transports did not work when the
      addresses were routed directly to files or pipes from a redirect router.
      File deliveries just didn't batch; pipe deliveries might have suffered
      odd errors.

PH/06 A failure to get a lock for a hints database would erroneously always say
      "Failed to get write lock", even when it was really a read lock.

PH/07 The appendfile transport was creating MBX lock files with a fixed mode
      of 0600. This has been changed to use the value of the lockfile_mode
      option (which defaults to 0600).

PH/08 Applied small patch from the Sieve maintainer.

PH/09 If maildir_quota_directory_regex was set to exclude (say) the .Trash
      folder from quota calculations, a direct delivery into this folder messed
      up the contents of the maildirsize file. This was because the regex was
      used only to exclude .Trash (or whatever) when the size of the mailbox
      was calculated. There was no check that a delivery was happening into an
      excluded directory. This bug has been fixed by ignoring all quota
      processing for deliveries into excluded directories.

PH/10 Added the maildirfolder_create_regex option to appendfile.


Exim version 4.61
-----------------

PH/01 The code for finding all the local interface addresses on a FreeBSD
      system running IPv6 was broken. This may well have applied to all BSD
      systems, as well as to others that have similar system calls. The broken
      code found IPv4 interfaces correctly, but gave incorrect values for the
      IPv6 interfaces. In particular, ::1 was not found. The effect in Exim was
      that it would not match correctly against @[] and not recognize the IPv6
      addresses as local.

PH/02 The ipliteral router was not recognizing addresses of the form user@
      [ipv6:....] because it didn't know about the "ipv6:" prefix.

PH/03 Added disable_ipv6.

PH/04 Changed $reply_address to use the raw form of the headers instead of the
      decoded form, because it is most often used to construct To: headers
      lines in autoreplies, and the decoded form may well be syntactically
      invalid. However, $reply_address has leading white space removed, and all
      newlines turned into spaces so that the autoreply transport does not
      grumble.

PH/05 If group was specified without a user on a router, and no group or user
      was specified on a transport, the group from the router was ignored.

PH/06 Increased the number of ACL variables to 20 of each type, and arranged
      for visible compile-time settings that can be used to change these
      numbers, for those that want even more. Backwards compatibility with old
      spool files has been maintained. However, going back to a previous Exim
      release will lost any variables that are in spool files.

PH/07 Two small changes when running in the test harness: increase delay when
      passing a TCP/IP connection to a new process, in case the original
      process has to generate a bounce, and remove special handling of
      127.0.0.2 (sic), which is no longer necessary.

PH/08 Changed debug output of dbfn_open() flags from numbers to names, so as to
      be the same on different OS.

PH/09 Moved a debug statement in filter processing to avoid a race problem when
      testing.

JJ/01 exipick: fixed bug where -b (brief) output option showed "Vars:"
      whether --show-vars was specified or not

JJ/02 exipick: Added support for new ACL variable spool format introduced
      in 4.61-PH/06

PH/10 Fixed another bug related to PH/04 above: if an incoming message had a
      syntactically invalid From: or Reply-to: line, and a filter used this to
      generate an autoreply, and therefore failed to obtain an address for the
      autoreply, Exim could try to deliver to a non-existent relative file
      name, causing unrelated and misleading errors. What now happens is that
      it logs this as a hard delivery error, but does not attempt to create a
      bounce message.

PH/11 The exinext utility has a -C option for testing purposes, but although
      the given file was scanned by exinext itself; it wasn't being passed on
      when Exim was called.

PH/12 In the smtp transport, treat an explicit ECONNRESET error the same as
      an end-of-file indication when reading a command response.

PH/13 Domain literals for IPv6 were not recognized unless IPv6 support was
      compiled. In many other places in Exim, IPv6 addresses are always
      recognized, so I have changed this. It also means that IPv4 domain
      literals of the form [IPV4:n.n.n.n] are now always recognized.

PH/14 When a uid/gid is specified for the queryprogram router, it cannot be
      used if the router is not running as root, for example, when verifying at
      ACL time, or when using -bh. The debugging output from this situation was
      non-existent - all you got was a failure to exec. I have made two
      changes:

      (a) Failures to set uid/gid, the current directory, or a process leader
          in a subprocess such as that created by queryprogram now generate
          suitable debugging ouput when -d is set.

      (b) The queryprogram router detects when it is not running as root,
          outputs suitable debugging information if -d is set, and then runs
          the subprocess without attempting to change uid/gid.

PH/15 Minor change to Makefile for building test_host (undocumented testing
      feature).

PH/16 As discussed on the list in Nov/Dec: Exim no longer looks at the
      additional section of a DNS packet that returns MX or SRV records.
      Instead, it always explicitly searches for A/AAAA records. This avoids
      major problems that occur when a DNS server includes only records of one
      type (A or AAAA) in an MX/SRV packet. A byproduct of this change has
      fixed another bug: if SRV records were looked up and the corresponding
      address records were *not* found in the additional section, the port
      values from the SRV records were lost.

PH/17 If a delivery to a pipe, file, or autoreply was deferred, Exim was not
      using the correct key (the original address) when searching the retry
      rules in order to find which one to use for generating the retry hint.

PH/18 If quota_warn_message contains a From: header, Exim now refrains from
      adding the default one. Similarly, if it contains a Reply-To: header, the
      errors_reply_to option, if set, is not used.

PH/19 When calculating a retry time, Exim used to measure the "time since
      failure" by looking at the "first failed" field in the retry record. Now
      it does not use this if it is later than than the arrival time of the
      message. Instead it uses the arrival time. This makes for better
      behaviour in cases where some deliveries succeed, thus re-setting the
      "first failed" field. An example is a quota failure for a huge message
      when small messages continue to be delivered. Without this change, the
      "time since failure" will always be short, possible causing more frequent
      delivery attempts for the huge message than are intended.
      [Note: This change was subsequently modified - see PH/04 for 4.62.]

PH/20 Added $auth1, $auth2, $auth3 to contain authentication data (as well as
      $1, $2, $3) because the numerical variables can be reset during some
      expansion items (e.g. "match"), thereby losing the authentication data.

PH/21 Make -bV show the size of off_t variables so that the test suite can
      decide whether to run tests for quotas > 2G.

PH/22 Test the values given for quota, quota_filecount, quota_warn_threshold,
      mailbox_size, and mailbox_filecount in the appendfile transport. If a
      filecount value is greater than 2G or if a quota value is greater than 2G
      on a system where the size of off_t is not greater than 4, a panic error
      is given.

PH/23 When a malformed item such as 1.2.3/24 appears in a host list, it can
      never match. The debug and -bh output now contains an explicit error
      message indicating a malformed IPv4 address or mask.

PH/24 An host item such as 1.2.3.4/abc was being treated as the IP address
      1.2.3.4 without a mask. Now it is not recognized as an IP address, and
      PH/23 above applies.

PH/25 Do not write to syslog when running in the test harness. The only
      occasion when this arises is a failure to open the main or panic logs
      (for which there is an explicit test).

PH/26 Added the /no_tell option to "control=freeze".

PH/27 If a host name lookup failed very early in a connection, for example, if
      the IP address matched host_lookup and the reverse lookup yielded a name
      that did not have a forward lookup, an error message of the form "no IP
      address found for host xxx.xxx.xxx (during SMTP connection from NULL)"
      could be logged. Now it outputs the IP address instead of "NULL".

PH/28 An enabling patch from MH: add new function child_open_exim2() which
      allows the sender and the authenticated sender to be set when
      submitting a message from within Exim. Since child_open_exim() is
      documented for local_scan(), the new function should be too.

PH/29 In GnuTLS, a forced expansion failure for tls_privatekey was not being
      ignored. In both GnuTLS and OpenSSL, an expansion of tls_privatekey that
      results in an empty string is now treated as unset.

PH/30 Fix eximon buffer overflow bug (Bugzilla #73).

PH/31 Added sender_verify_fail logging option.

PH/32 In November 2003, the code in Exim that added an empty Bcc: header when
      needed by RFC 822 but not by RFC 2822 was commented out. I have now
      tidied the source and removed it altogether.

PH/33 When a queue run was abandoned because the load average was too high, a
      log line was always written; now it is written only if the queue_run log
      selector is set. In addition, the log line for abandonment now contains
      information about the queue run such as the pid. This is always present
      in "start" and "stop" lines but was omitted from the "abandon" line.

PH/34 Omit spaces between a header name and the colon in the error message that
      is given when verify = headers_syntax fails (if there are lots of them,
      the message gets confusing).

PH/35 Change the default for dns_check_names_pattern to allow slashes within
      names, as there are now some PTR records that contain slashes. This check
      is only to protect against broken name servers that fall over on strange
      characters, so the fact that it applies to all lookups doesn't matter.

PH/36 Now that the new test suite is complete, we can remove some of the
      special code in Exim that was needed for the old test suite. For example,
      sorting DNS records because real resolvers return them in an arbitrary
      order. The new test suite's fake resolver always returns records in the
      same order.

PH/37 When running in the test harness, use -odi for submitted messages (e.g.
      bounces) except when queue_only is set, to avoid logging races between
      the different processes.

PH/38 Panic-die if .include specifies a non-absolute path.

PH/39 A tweak to the "H" retry rule from its user.

JJ/03 exipick: Removed parentheses from 'next' and 'last' calls that specified
      a label.  They prevented compilation on older perls.

JJ/04 exipick: Refactored code to prevent implicit split to @_ which caused
      a warning to be raised on newish perls.

JJ/05 exipick: Fixed bug where -bpc always showed a count of all messages
      on queue.  Changes to match documented behaviour of showing count of
      messages matching specified criteria.

PH/40 Changed the default ident timeout from 30s to 5s.

PH/41 Added support for the use of login_cap features, on those BSD systems
      that have them, for controlling the resources used by pipe deliveries.

PH/42 The content-scanning code uses fopen() to create files in which to put
      message data. Previously it was not paying any attention to the mode of
      the files. Exim runs with umask(0) because the rest of the code creates
      files with open(), and sets the required mode explicitly. Thus, these
      files were ending up world-writeable. This was not a big issue, because,
      being within the spool directory, they were not world-accessible. I have
      created a function called modefopen, which takes an additional mode
      argument. It sets umask(777), creates the file, chmods it to the required
      mode, then resets the umask. All the relevant calls to fopen() in the
      content scanning code have been changed to use this function.

PH/43 If retry_interval_max is set greater than 24 hours, it is quietly reset
      to 24 hours. This avoids potential overflow problems when processing G
      and H retry rules. I suspect nobody ever tinkers with this value.

PH/44 Added STRIP_COMMAND=/usr/bin/strip to the FreeBSD Makefile.

PH/45 When the plaintext authenticator is running as a client, the server's
      challenges are checked to ensure they are valid base64 strings. By
      default, the authentication attempt is cancelled if an invalid string is
      received. Setting client_ignore_invalid_base64 true ignores these errors.
      The decoded challenge strings are now placed in $auth1, $auth2, etc. as
      they are received. Thus, the responses can be made to depend on the
      challenges. If an invalid string is ignored, an empty string is placed in
      the variable.

PH/46 Messages that are created by the autoreply transport now contains a
      References: header, in accordance with RFCs 2822 and 3834.

PH/47 Added authenticated_sender_force to the smtp transport.

PH/48 The ${prvs expansion was broken on systems where time_t was long long.

PH/49 Installed latest patch from the Sieve maintainer.

PH/50 When an Exim quota was set without a file count quota, and mailbox_size
      was also set, the appendfile transport was unnecessarily scanning a
      directory of message files (e.g. for maildir delivery) to find the count
      of files (along with the size), even though it did not need this
      information. It now does the scan only if it needs to find either the
      size of the count of files.

PH/51 Added ${time_eval: to convert Exim time strings into seconds.

PH/52 Two bugs concerned with error handling when the smtp transport is
      used in LMTP mode:

      (i) Exim was not creating retry information for temporary errors given
      for individual recipients after the DATA command when the smtp transport
      was used in LMTP mode. This meant that they could be retried too
      frequently, and not timed out correctly.

      (ii) Exim was setting the flag that allows error details to be returned
      for LMTP errors on RCPT commands, but not for LMTP errors for individual
      recipients that were returned after the DATA command.

PH/53 This is related to PH/52, but is more general: for any failing address,
      when detailed error information was permitted to be returned to the
      sender, but the error was temporary, then after the final timeout, only
      "retry timeout exceeded" was returned. Now it returns the full error as
      well as "retry timeout exceeded".

PH/54 Added control=allow_auth_unadvertised, as it seems there are clients that
      do this, and (what is worse) MTAs that accept it.

PH/55 Added the add_header modified to ACLs. The use of "message" with "warn"
      will now be deprecated.

PH/56 New os.c-cygwin from the Cygwin maintainer.

JJ/06 exipick: added --unsorted option to allow unsorted output in all output
      formats (previously only available in exim formats via -bpr, -bpru,
      and -bpra.  Now also available in native and exiqgrep formats)

JJ/07 exipick: added --freeze and --thaw options to allow faster interaction
      with very large, slow to parse queues

JJ/08 exipick: added ! as generic prefix to negate any criteria format

JJ/09 exipick: miscellaneous performance enhancements (~24% improvements)

PH/57 Tidies in SMTP dialogue display in debug output: (i) It was not showing
      responses to authentication challenges, though it was showing the
      challenges; (ii) I've removed the CR characters from the debug output for
      SMTP output lines.

PH/58 Allow for the insertion of a newline as well as a space when a string
      is turned into more than one encoded-word during RFC 2047 encoding. The
      Sieve code now uses this.

PH/59 Added the following errors that can be detected in retry rules: mail_4xx,
      data_4xx, lost_connection, tls_required.

PH/60 When a VRFY deferred or FAILED, the log message rather than the user
      message was being sent as an SMTP response.

PH/61 Add -l and -k options to exicyclog.

PH/62 When verifying, if an address was redirected to one new address, so that
      verification continued, and the new address failed or deferred after
      having set something in $address_data, the value of $address_data was not
      passed back to the ACL. This was different to the case when no
      redirection occurred. The value is now passed back in both cases.

PH/63 Changed the macro HAVE_LOGIN_CAP (see PH/41 for this release above) to
      HAVE_SETCLASSRESOURCES because there are different APIs in use that all
      use login_cap.h, so on its own it isn't the distinguishing feature. The
      new name refers directly to the setclassresources() function.

PH/65 Added configuration files for NetBSD3.

PH/66 Updated OS/Makefile-HP-UX for gcc 4.1.0 with HP-UX 11.

PH/67 Fixed minor infelicity in the sorting of addresses to ensure that IPv6
      is preferred over IPv4.

PH/68 The bounce_return_message and bounce_return_body options were not being
      honoured for bounces generated during the reception of non-SMTP messages.
      In particular, this applied to messages rejected by the ACL. This bug has
      been fixed. However, if bounce_return_message is true and bounce_return_
      body is false, the headers that are returned for a non-SMTP message
      include only those that have been read before the error was detected.
      (In the case of an ACL rejection, they have all been read.)

PH/69 The HTML version of the specification is now built in a directory called
      spec_html instead of spec.html, because the latter looks like a path with
      a MIME-type, and this confuses some software.

PH/70 Catch two compiler warnings in sieve.c.

PH/71 Fixed an obscure and subtle bug (thanks Alexander & Matthias). The
      function verify_get_ident() calls ip_connect() to connect a socket, but
      if the "connect()" function timed out, ip_connect() used to close the
      socket. However, verify_get_ident() also closes the socket later, and in
      between Exim writes to the log, which may get opened at this point. When
      the socket was closed in ip_connect(), the log could get the same file
      descriptor number as the socket. This naturally causes chaos. The fix is
      not to close the socket in ip_connect(); the socket should be closed by
      the function that creates it. There was only one place in the code where
      this was missing, in the iplookup router, which I don't think anybody now
      uses, but I've fixed it anyway.

PH/72 Make dns_again_means_nonexist apply to lookups using gethostbyname() as
      well as to direct DNS lookups. Otherwise the handling of names in host
      lists is inconsistent and therefore confusing.


Exim version 4.60
-----------------

PH/01 Two changes to the default runtime configuration:

      (1) Move the checks for relay_from_hosts and authenticated clients from
          after to before the (commented out) DNS black list checks.

      (2) Add control=submission to the relay_from_hosts and authenticated
          clients checks, on the grounds that messages accepted by these
          statements are most likely to be submissions.

PH/02 Several tidies to the handling of ${prvs and ${prvscheck:

      (1) Generate an error if the third argument for the ${prvs expansion is
          not a single digit.

      (2) Treat a missing third argument of ${prvscheck as if it were an empty
          string.

      (3) Reset the variables that are obtained from the first argument of
          ${prvscheck and used in the second argument before leaving the code,
          because their memory is reclaimed, so using them afterwards may do
          silly things.

      (4) Tidy up the code for expanding the arguments of ${prvscheck one by
          one (it's much easier than Tom thought :-).

      (5) Because of (4), we can now allow for the use of $prvscheck_result
          inside the third argument.

PH/03 For some reason, the default setting of PATH when running a command from
      a pipe transport was just "/usr/bin". I have changed it to
      "/bin:/usr/bin".

PH/04 SUPPORT_TRANSLATE_IP_ADDRESS and MOVE_FROZEN_MESSAGES did not cause
      anything to be listed in the output from -bV.

PH/05 When a filter generated an autoreply, the entire To: header line was
      quoted in the delivery log line, like this:

        => >A.N.Other <ano@some.domain> <original@ddress> ...

      This has been changed so that it extracts the operative address. There
      may be more than one such address. If so, they are comma-separated, like
      this:

        => >ano@some.domain,ona@other.domain <original@ddress> ...

PH/06 When a client host used a correct literal IP address in a HELO or EHLO
      command, (for example, EHLO [1.2.3.4]) and the client's IP address was
      not being looked up in the rDNS to get a host name, Exim was showing the
      IP address twice in Received: lines, even though the IP addresses were
      identical. For example:

        Received: from [1.2.3.4] (helo=[1.2.3.4])

      However, if the real host name was known, it was omitting the HELO data
      if it matched the actual IP address. This has been tidied up so that it
      doesn't show the same IP address twice.

PH/07 When both +timestamp and +memory debugging was on, the value given by
      $tod_xxx expansions could be wrong, because the tod_stamp() function was
      called by the debug printing, thereby overwriting the timestamp buffer.
      Debugging no longer uses the tod_stamp() function when +timestamp is set.

PH/08 When the original message was included in an autoreply transport, it
      always said "this is a copy of the message, including all the headers",
      even if body_only or headers_only was set. It now gives an appropriate
      message.

PH/09 Applied a patch from the Sieve maintainer which:

      o  fixes some comments
      o  adds the (disabled) notify extension core
      o  adds some debug output for the result of if/elsif tests
      o  points to the current vacation draft in the documentation
         and documents the missing references header update

      and most important:

      o  fixes a bug in processing the envelope test (when testing
         multiple envelope elements, the last element determinted the
         result)

PH/10 Exim was violating RFC 3834 ("Recommendations for Automatic Responses to
      Electronic Mail") by including:

        Auto-submitted: auto-generated

      in the messages that it generates (bounce messages and others, such as
      warnings). In the case of bounce messages for non-SMTP mesages, there was
      also a typo: it was using "Auto_submitted" (underscore instead of
      hyphen). Since every message generated by Exim is necessarily in response
      to another message, thes have all been changed to:

        Auto-Submitted: auto-replied

      in accordance with these statements in the RFC:

        The auto-replied keyword:

        -  SHOULD be used on messages sent in direct response to another
           message by an automatic process,

        -  MUST NOT be used on manually-generated messages,

        -  MAY be used on Delivery Status Notifications (DSNs) and Message
           Disposition Notifications (MDNs),

        -  MUST NOT be used on messages generated by automatic or periodic
           processes, except for messages which are automatic responses to
           other messages.

PH/11 Added "${if def:sender_address {(envelope-from <$sender_address>)\n\t}}"
      to the default Received: header definition.

PH/12 Added log selector acl_warn_skipped (default on).

PH/13 After a successful wildlsearch lookup, discard the values of numeric
      variables because (a) they are in the wrong storage pool and (b) even if
      they were copied, it wouldn't work properly because of the caching.

PH/14 Add check_rfc2047_length to disable enforcement of RFC 2047 length
      checking when decoding. Apparently there are clients that generate
      overlong encoded strings. Why am I not surprised?

PH/15 If the first argument of "${if match_address" was not empty, but did not
      contain an "@" character, Exim crashed. Now it writes a panic log message
      and treats the condition as false.

PH/16 In autoreply, treat an empty string for "once" the same as unset.

PH/17 A further patch from the Sieve maintainer: "Introduce the new Sieve
      extension "envelope-auth".  The code is finished and in agreement with
      other implementations, but there is no documentation so far and in fact,
      nobody wrote the draft yet.  This extension is currently #undef'ed, thus
      not changing the active code.

      Print executed "if" and "elsif" statements when debugging is used. This
      helps a great deal to understand what a filter does.

      Document more things not specified clearly in RFC3028.  I had all this
      sorted out, when out of a sudden new issues came to my mind.  Oops."

PH/18 Exim was not recognizing the "net-" search type prefix in match_ip lists
      (Bugzilla #53).

PH/19 Exim expands the IPv6 address given to -bh to its full non-abbreviated
      canonical form (as documented). However, after a host name lookup from
      the IP address, check_host() was doing a simple string comparison with
      addresses acquired from the DNS when checking that the found name did
      have the original IP as one of its addresses. Since any found IPv6
      addresses are likely to be in abbreviated form, the comparison could
      fail. Luckily, there already exists a function for doing the comparison
      by converting both addresses to binary, so now that is used instead of
      the text comparison.

PH/20 There was another similar case to PH/19, when a complete host name was
      given in a host list; looking up its IP address could give an abbreviated
      form, whereas the current host's name might or might not be abbreviated.
      The same fix has been applied.

Revision 1.32: download - view: text, markup, annotated - select for diffs
Wed Jun 14 22:43:39 2006 UTC (18 years, 6 months ago) by abs
Branches: MAIN
CVS tags: pkgsrc-2006Q2-base, pkgsrc-2006Q2
Diff to: previous 1.31: preferred, colored
Changes since revision 1.31: +2 -1 lines
Relax SPAMD_TIMEOUT from 120 to 240 secs to reduce spamd timeouts on
slower machines, as suggested by Andreas Hallmann in PR33654.
Update pkg to exim-4.54nb3

Revision 1.31: download - view: text, markup, annotated - select for diffs
Sun Oct 23 20:07:19 2005 UTC (19 years, 1 month ago) by rillig
Branches: MAIN
CVS tags: pkgsrc-2006Q1-base, pkgsrc-2006Q1, pkgsrc-2005Q4-base, pkgsrc-2005Q4
Diff to: previous 1.30: preferred, colored
Changes since revision 1.30: +2 -2 lines
Added RCS Id to patch-aa. Removed trailing white-space from options.mk.

Revision 1.30: download - view: text, markup, annotated - select for diffs
Sun Oct 9 10:43:50 2005 UTC (19 years, 2 months ago) by abs
Branches: MAIN
Diff to: previous 1.29: preferred, colored
Changes since revision 1.29: +4 -4 lines
Update exim to 4.54. Changes since 4.52

Exim version 4.54
-----------------

PH/01 The ${base62: operator adjusted itself to base 36 when BASE_62 was
      set to 36 (for Darwin and Cygwin), but the ${base62d: operator did not.
      It now does.

PH/02 Two minor problems detected in Cygwin: the os.{c,h} files had lost */ on
      the CVS lines, and there was a missing #if HAVE_IPV6 in host.c.

PH/03 Typo: missing ".o" in src/pcre/Makefile.

PH/04 Tighten up "personal" tests: Instead of testing for any "List-"
      header line, restrict the check to what is listed in RFCs 2369 and 2929.
      Also, for "Auto-Submitted", treat anything other than "no" as
      non-personal, in accordance with RFC 3834. (Previously it treated
      anything starting "auto-" as non-personal.)

TF/01 The control=submission/name=... option had a problem with syntax
      errors if the name included a slash character. The /name= option
      now slurps the rest of the string, so it can include any characters
      but it must come last in the list of options (after /sender_retain
      or /domain=).

PH/05 Some modifications to the interface to the fake nameserver for the new
      testing suite.


Exim version 4.53
-----------------

TK/01 Added the "success_on_redirect" address verification option. See
      NewStuff for rationale and an example.

PH/01 Added support for SQLite, basic code supplied by David Woodhouse.

PH/02 Patch to exigrep to allow it to work on syslog lines.

PH/03 When creating an mbox file for a virus/spam scan, use fseek() instead of
      fread() to skip over the body file's header line, because in Cygwin the
      header line is locked and is inaccessible.

PH/04 Added $message_exim_id, ultimately to replace $message_id (they will both
      co-exist for some time) to make it clear that it is the Exim ID that is
      referenced, not the Message-ID: header line.

PH/05 Replaced all Tom's calls to snprintf() with calls to the internal
      string_format() function, because snprintf() does not exist on all
      operating systems.

PH/06 The use of forbid_filter_existstest now also locks out the use of the
      ${stat: expansion item.

PH/07 Changed "SMTP protocol violation: synchronization error" into "SMTP
      protocol synchronization error", to keep the pedants happy.

PH/08 Arrange for USE_INET_NTOA_FIX to be set in config.h for AIX systems as
      well as for IRIX systems, when gcc is being used. See the host.c source
      file for comments.

PH/09 Installed latest Cygwin configuration files from the Cygwin maintainer.

PH/10 Named domain lists were not working if used in a queue_smtp_domains
      setting.

PH/11 Added support for the IGNOREQUOTA extension to LMTP, both to the lmtp
      transport and to the smtp transport in LMTP mode.

TK/02 Remove one case of BASE64 error detection FTTB (undocumented anyway).

PH/12 There was a missing call to search_tidyup() before the fork() in rda.c to
      run a filter in a subprocess. This could lead to confusion in subsequent
      lookups in the parent process. There should also be a search_tidyup() at
      the end of the subprocess.

PH/13 Previously, if "verify = helo" was set in an ACL, the condition was true
      only if the host matched helo_try_verify_hosts, which caused the
      verification to occur when the EHLO/HELO command was issued. The ACL just
      tested the remembered result. Now, if a previous verification attempt has
      not happened, "verify = helo" does it there and then.

JJ/01 exipick: added $message_exim_id variable (see 4.53-PH/04)

TK/03 Fix log output including CR from clamd.

PH/14 A reference to $reply_address when Reply-to: was empty and From: did not
      exist provoked a memory error which could cause a segfault.

PH/15 Installed PCRE 6.2

PH/17 Defined BIND_8_COMPAT in the Darwin os.h file.

PH/18 Reversed 4.52/PH/17 because the HP-UX user found it wasn't the cause
      of the problem. Specifically, suggested +O2 rather than +O1 for the
      HP-UX compiler.

PH/19 Added sqlite_lock_timeout option (David Woodhouse's patch).

PH/20 If a delivery was routed to a non-standard port by means of an SRV
      record, the port was not correctly logged when the outgoing_port log
      selector was set (it logged the transort's default port).

PH/21 Added support for host-specific ports to manualroute, queryprogram,
      fallback_hosts, and "hosts" in the smtp transport.

PH/22 If the log selector "outgoing_port" is set, the port is now also given on
      host errors such as "Connection refused".

PH/23 Applied a patch to fix problems with exim-4.52 while doing radius
      authentication with radiusclient 0.4.9:

      - Error returned from rc_read_config was caught wrongly
      - Username/password not passed on to radius server due to wrong length.

      The presumption is that some radiusclient API changes for 4.51/PH/17
      were not taken care of correctly. The code is still untested by me (my
      Linux distribution still has 0.3.2 of radiusclient), but it was
      contributed by a Radius user.

PH/24 When doing a callout, the value of $domain wasn't set correctly when
      expanding the "port" option of the smtp transport.

TK/04 MIME ACL: Fix buffer underrun that occurs when EOF condition is met
      while reading a MIME header. Thanks to Tom Hughes for a patch.

PH/24 Include config.h inside local_scan.h so that configuration settings are
      available.

PH/25 Make $smtp_command_argument available after all SMTP commands. This means
      that in an ACL for RCPT (for example), you can examine exactly what was
      received.

PH/26 Exim was recognizing IPv6 addresses of the form [IPv6:....] in EHLO
      commands, but it was not correctly comparing the address with the actual
      client host address. Thus, it would show the EHLO address in Received:
      header lines when this was not necessary.

PH/27 Added the % operator to ${eval:}.

PH/28 Exim tries to create and chdir to its spool directory when it starts;
      it should be ignoring failures (because with -C, for example, it has lost
      privilege). It wasn't ignoring creation failures other than "already
      exists".

PH/29 Added "crypteq" to the list of supported features that Exim outputs when
      -bV or -d is used.

PH/30 Fixed (presumably very longstanding) bug in exim_dbmbuild: if it failed
      because an input line was too long, either on its own, or by virtue of
      too many continuations, the temporary file was not being removed, and the
      return code was incorrect.

PH/31 Missing "BOOL" in function definition in filtertest.c.

PH/32 Applied Sieve patches from the maintainer.

TK/05 Domainkeys: Accomodate for a minor API change in libdomainkeys 0.67.

PH/33 Added "verify = not_blind".

PH/34 There are settings for CHOWN_COMMAND and MV_COMMAND that can be used in
      Local/Makefile (with some defaults set). These are used in built scripts
      such as exicyclog, but they have never been used in the exim_install
      script (though there are many overriding facilities there). I have
      arranged that the exim_install script now takes note of these two
      settings.

PH/35 Installed configuration files for Dragonfly.

PH/36 When a locally submitted message by a trusted user did not contain a
      From: header, and the sender address was obtained from -f or from an SMTP
      MAIL command, and the trusted user did not use -F to supply a sender
      name, $originator_name was incorrectly used when constructing a From:
      header. Furthermore, $originator_name was used for submission mode
      messages from external hosts without From: headers in a similar way,
      which is clearly wrong.

PH/37 Added control=suppress_local_fixups.

PH/38 When log_selector = +received_sender was set, and the addition of the
      sender made the log line's construction buffer exactly full, or one byte
      less than full, an overflow happened when the terminating "\n" was
      subsequently added.

PH/39 Added a new log selector, "unknown_in_list", which provokes a log entry
      when the result of a list match is failure because a DNS lookup failed.

PH/40 RM_COMMAND is now used in the building process.

PH/41 Added a "distclean" target to the top-level Makefile; it deletes all
      the "build-* directories that it finds.

PH/42 (But a TF fix): In a domain list, Exim incorrectly matched @[] if the IP
      address in a domain literal was a prefix of an interface address.

PH/43 (Again a TF fix): In the dnslookup router, do not apply widen_domains
      when verifying a sender address, unless rewrite_headers is false.

PH/44 Wrote a long comment about why errors_to addresses are verified as
      recipients, not senders.

TF/01 Add missing LIBS=-lm to OS/Makefile-OpenBSD which was overlooked when
      the ratelimit ACL was added.

PH/45 Added $smtp_command for the full command (cf $smtp_command_argument).

PH/46 Added extra information about PostgreSQL errors to the error string.

PH/47 Added an interface to a fake DNS resolver for use by the new test suite,
      avoiding the need to install special zones in a real server. This is
      backwards compatible; if it can't find the fake resolver, it drops back.
      Thus, both old and new test suites can be run.

TF/02 Added util/ratelimit.pl

TF/03 Minor fix to the ratelimit code to improve its behaviour in case the
      clock is set back in time.

TF/04 Fix the ratelimit support in exim_fixdb. Patch provided by Brian
      Candler <B.Candler@pobox.com>.

TF/05 The fix for PH/43 was not completely correct; widen_domains is always
      OK for addresses that are the result of redirections.

PH/48 A number of further additions for the benefit of the new test suite,
      including a fake gethostbyname() that interfaces to the fake DNS resolver
      (see PH/47 above).

TF/06 The fix for widen_domains has also been applied to qualify_single and
      search_parents which are the other dnslookup options that can cause
      header rewrites.

PH/49 Michael Haardt's randomized retrying, but as a separate retry parameter
      type ("H").

PH/50 Make never_users, trusted_users, admin_groups, trusted_groups expandable.

TF/07 Exim produced the error message "an SRV record indicated no SMTP
      service" if it encountered an MX record with an empty target hostname.
      The message is now "an MX or SRV record indicated no SMTP service".

TF/08 Change PH/13 introduced the possibility that verify=helo may defer,
      if the DNS of the sending site is misconfigured. This is quite a
      common situation. This change restores the behaviour of treating a
      helo verification defer as a failure.

PH/51 If self=fail was set on a router, the bounce message did not include the
      actual error message.

Revision 1.29: download - view: text, markup, annotated - select for diffs
Sat Sep 10 23:11:40 2005 UTC (19 years, 3 months ago) by abs
Branches: MAIN
CVS tags: pkgsrc-2005Q3-base, pkgsrc-2005Q3
Diff to: previous 1.28: preferred, colored
Changes since revision 1.28: +3 -3 lines
Update exim to 4.52nb2
- Fix NetBSD statvfs check for NetBSD 2.1
- Move options into options.mk,
- breakout lookup_dsearch (default on)
- add saslauthd (Requested by Peter Avalos)

Revision 1.28: download - view: text, markup, annotated - select for diffs
Mon Aug 29 18:29:05 2005 UTC (19 years, 3 months ago) by reed
Branches: MAIN
Diff to: previous 1.27: preferred, colored
Changes since revision 1.27: +2 -2 lines
Work when installing and using as non-root:
 Use VARBASE instead of hard-coded /var
 Set INST_CHOWN for the installer script.

Bump PKGREVISION.

Revision 1.27: download - view: text, markup, annotated - select for diffs
Wed Jul 20 06:32:29 2005 UTC (19 years, 4 months ago) by grant
Branches: MAIN
Diff to: previous 1.26: preferred, colored
Changes since revision 1.26: +4 -4 lines
update exim to 4.52.

summary of changes since 4.51 (general bug fixes and portability
fixes ommitted for brevity, see the ChangeLog for details):

Exim version 4.52
-----------------

TF/01 Added support for Client SMTP Authorization. See NewStuff for details.

PH/02 Reduce the amount of output that "make" produces by default. Full output
      can still be requested.

PH/04 Installed a modified version of Tony Finch's patch to make submission
      mode fix the return path as well as the Sender: header line, and to
      add a /name= option so that you can make the user's friendly name appear
      in the header line.

TF/03 Added the control = fakedefer ACL modifier.

TF/04 Added the ratelimit ACL condition. See NewStuff for details. Thanks to
      Mark Lowes for thorough testing.

TK/02 Rewrote SPF support to work with libspf2 versions >1.2.0.

TK/03 Merged latest SRS patch from Miles Wilton.

TK/04 Added simple SPF lookup method in EXPERIMENTAL_SPF. See NewStuff for
      details. Thanks to Chris Webb <chris@arachsys.com> for the patch!

PH/07 Added "fullpostmaster" verify option, which does a check to <postmaster>
      without a domain if the check to <postmaster@domain> fails.

SC/01 Eximstats: added -xls and the ability to specify output files
     (patch written by Frank Heydlauf).

SC/02 Eximstats: use FileHandles for outputing results.

SC/03 Eximstats: allow any combination of xls, txt, and html output.

SC/06 Eximstats: added the -include_original_destination flag

TK/06 MBOX spool code: Add real "From " MBOX separator line
      so the .eml file is really in mbox format (even though
      most programs do not really care). Patch from Alex Miller.

TK/07 MBOX spool code: Add X-Envelope-From: and X-Envelope-To: headers.
      The latter is generated from $received_to and is only set if the
      message has one envelope recipient. SA can use these headers,
      obviously out-of-the-box. Patch from Alex Miller.

PH/11 Upgraded appendfile so that quotas larger than 2G are now supported.
      This involved changing a lot of size variables from int to off_t. It
      should work with maildirs and everything.

PH/12 Applied Alex Kiernan's patch for the API change for the error callback
      function for BDB 4.3.

PH/13 Changed auto_thaw such that it does not apply to bounce messages.

PH/14 Imported PCRE 6.0; this was more than just a trivial operation because
      the sources for PCRE have been re-arranged and more files are now
      involved.

PH/16 Applied Matthew Newton's patch to exicyclog: "If log_file_path is set in
      the configuration file to be ":syslog", then the script "guesses" where
      the logs files are, rather than using the compiled in default. In our
      case the guess is not the same as the compiled default, so the script
      suddenly stopped working when I started to use syslog. The patch checks
      to see if log_file_path is "". If so, it attempts to read it from exim
      with no configuration file to get the compiled in version, before it
      falls back to the previous guessing code."

TK/09 Added "prvs" and "prvscheck" expansion items. These help a lot with
      implementing BATV in an Exim configuration. See NewStuff for the gory
      details.

PH/18 If the "use_postmaster" option was set for a recipient callout together
      with the "random" option, the postmaster address was used as the MAIL
      FROM address for the random test, but not for the subsequent recipient
      test. It is now used for both.

PH/19 Applied Michael Haardt's patch to update Sieve to RFC3028bis. "The
      patch removes a few documentation additions to RFC 3028, because the
      latest draft now contains them. It adds the new en;ascii-case comparator
      and a new error check for 8bit text in MIME parts. Comparator and
      require names are now matched exactly. I enabled the subaddress
      extension, but it is not well tested yet (read: it works for me)."

PH/23 Added daemon_startup_retries and daemon_startup_sleep.

PH/24 Added ${if match_ip condition.

PH/28 Changed -d+all to exclude +memory, because that information is very
      rarely of interest, but it makes the output a lot bigger. People tend to
      do -d+all out of habit.

PH/30 Exim's DNS code uses the original T_xxx names for DNS record times. These
      aren't the modern standard, and it seems that some systems' include files
      don't always have them. Exim was already checking for some of the newer
      ones like T_AAAA, and defining it itself. I've added checks for all the
      record types that Exim uses.

TK/11 Domainkeys: Change the logic how the "testing" policy flag is retrieved
      from DNS. If the selector record carries the flag, it now has
      precedence over the domain-wide flag.

SC/09 Eximstats: added the -show_rt<list> and the -show_dt<list> flags
      as requested by Marc Sherman.

SC/10 Eximstats: added histograms for user specified patterns as requested
      by Marc Sherman.

Revision 1.26: download - view: text, markup, annotated - select for diffs
Tue May 17 17:06:11 2005 UTC (19 years, 6 months ago) by abs
Branches: MAIN
CVS tags: pkgsrc-2005Q2-base, pkgsrc-2005Q2
Diff to: previous 1.25: preferred, colored
Changes since revision 1.25: +10 -14 lines
Update exim from 4.44 to 4.51.
The main change is the incorporation of the content scanning from
the exiscan patch. (There are over 650 lines of Changes)
Retire exim-exiscan
Update exim-html from 4.40 to 4.50

Revision 1.25: download - view: text, markup, annotated - select for diffs
Thu Feb 24 09:59:22 2005 UTC (19 years, 9 months ago) by agc
Branches: MAIN
CVS tags: pkgsrc-2005Q1-base, pkgsrc-2005Q1
Diff to: previous 1.24: preferred, colored
Changes since revision 1.24: +3 -1 lines
Add RMD160 digests.

Revision 1.24: download - view: text, markup, annotated - select for diffs
Thu Feb 3 12:58:03 2005 UTC (19 years, 10 months ago) by abs
Branches: MAIN
Diff to: previous 1.23: preferred, colored
Changes since revision 1.23: +5 -5 lines
Update exim to 4.44 and exim-exiscan to 4.44_28.

Changes in Exim version 4.44

 1. Change 4.43/35 introduced a bug that caused file counts to be
    incorrectly computed when quota_filecount was set in an appendfile
    transport

 2. Closing a stable door: arrange to panic-die if setitimer() ever fails. The
    bug fixed in 4.43/37 would have been diagnosed quickly if this had been in
    place.

 3. Give more explanation in the error message when the command for a transport
    filter fails to execute.

 4. There are several places where Exim runs a non-Exim command in a
    subprocess. The SIGUSR1 signal should be disabled for these processes. This
    was being done only for the command run by the queryprogram router. It is
    now done for all such subprocesses. The other cases are: ${run, transport
    filters, and the commands run by the lmtp and pipe transports.

 5. Some older OS have a limit of 256 on the maximum number of file
    descriptors. Exim was using setrlimit() to set 1000 as a large value
    unlikely to be exceeded. Change 4.43/17 caused a lot of logging on these
    systems. I've change it so that if it can't get 1000, it tries for 256.

 6. "control=submission" was allowed, but had no effect, in a DATA ACL. This
    was an oversight, and furthermore, ever since the addition of extra
    controls (e.g. 4.43/32), the checks on when to allow different forms of
    "control" were broken. There should now be diagnostics for all cases when a
    control that does not make sense is encountered.

 7. $recipients is now available in the predata ACL (oversight).

 8. Tidy the search cache before the fork to do a delivery from a message
    received from the command line. Otherwise the child will trigger a lookup
    failure and thereby defer the delivery if it tries to use (for example) a
    cached ldap connection that the parent has called unbind on.

 9. If verify=recipient was followed by verify=sender in a RCPT ACL, the value
    of $address_data from the recipient verification was clobbered by the
    sender verification.

10. If FIXED_NEVER_USERS was defined, but empty, Exim was assuming the uid 0
    was its contents. (It was OK if the option was not defined at all.)

11. A "Completed" log line is now written for messages that are removed from
    the spool by the -Mrm option.

12. $host_address is now set to the target address during the checking of
    ignore_target_hosts.

13. When checking ignore_target_hosts for an ipliteral router, no host name was
    being passed; this would have caused $sender_host_name to have been used if
    matching the list had actually called for a host name (not very likely,
    since this list is usually IP addresses). A host name is now passed as
    "[x.x.x.x]".

14. Changed the calls that set up the SIGCHLD handler in the daemon to use the
    code that specifies a non-restarting handler (typically sigaction() in
    modern systems) in an attempt to fix a rare and obscure crash bug.

15. Narrowed the window for a race in the daemon that could cause it to ignore
    SIGCHLD signals. This is not a major problem, because they are used only to
    wake it up if nothing else does.

16. A malformed maildirsize file could cause Exim to calculate negative values
    for the mailbox size or file count. Odd effects could occur as a result.
    The maildirsize information is now recalculated if the size or filecount
    end up negative.

17. Added HAVE_SYS_STATVFS_H to the os.h file for Linux, as it has had this
    support for a long time. Removed HAVE_SYS_VFS_H.

18. Updated exipick to current release from John Jetmore.

19. Allow an empty sender to be matched against a lookup in an address list.
    Previously the only cases considered were a regular expression, or an
    empty pattern.

20. Exim went into a mad DNS lookup loop when doing a callout where the
    host was specified on the transport, if the DNS lookup yielded more than
    one IP address.

21. The RFC2047 encoding function was originally intended for short strings
    such as real names; it was not keeping to the 75-character limit for
    encoded words that the RFC imposes. It now respects the limit, and
    generates multiple encoded words if necessary. To be on the safe side, I
    have increased the buffer size for the ${rfc2047: expansion operator from
    1024 to 2048 bytes.

22. Failure to deliver a bounce message always caused it to be frozen, even if
    there was an errors_to setting on the router. The errors_to setting is now
    respected.

23. If an IPv6 address is given for -bh or -bhc, it is now converted to the
    canonical form (fully expanded) before being placed in
    $sender_host_address.

24. Updated eximstats to version 1.33

25. Include certificate and key file names in error message when GnuTLS fails
    to set them up, because the GnuTLS error message doesn't include the name
    of the failing file when there is a problem reading it.

26. Expand error message when OpenSSL has problems setting up cert/key files.
    As per change 25.

27. Reset the locale to "C" after calling embedded Perl, in case it was changed
    (this can affect the format of dates).

28. exim_tidydb, when checking for the continued existence of a message for
    which it has found a message-specific retry record, was not finding
    messages that were in split spool directories. Consequently, it was
    deleting retry records that should have stayed in existence.

29. eximstats updated to version 1.35
    1.34 - allow eximstats to parse syslog lines as well as mainlog lines
    1.35 - bugfix such that pie charts by volume are generated correctly

30. The SPA authentication driver was not abandoning authentication and moving
    on to the next authenticator when an expansion was forced to fail,
    contradicting the general specification for all authenticators. Instead it
    was generating a temporary error. It now behaves as specified.

31. The default ordering of permitted cipher suites for GnuTLS was pessimal
    (the order specifies the preference for clients). The order is now AES256,
    AES128, 3DES, ARCFOUR128.

31. Small patch to Sieve code - explicitly set From: when generating an
    autoreply.

32. Exim crashed if a remote delivery caused a very long error message to be
    recorded - for instance if somebody sent an entire SpamAssassin report back
    as a large number of 550 error lines. This bug was coincidentally fixed by
    increasing the size of one of Exim's internal buffers (big_buffer) that
    happened as part of the Exiscan merge. However, to be on the safe side, I
    have made the code more robust (and fixed the comments that describe what
    is going on).

33. Some experimental protocols are using DNS PTR records for new purposes. The
    keys for these records are domain names, not reversed IP addresses. The
    dnsdb PTR lookup now tests whether its key is an IP address. If not, it
    leaves it alone. Component reversal etc. now happens only for IP addresses.
    CAN-2005-0021

34. The host_aton() function is supposed to be passed a string that is known
    to be a valid IP address. However, in the case of IPv6 addresses, it was
    not checking this. This is a hostage to fortune. Exim now panics and dies
    if the condition is not met. A case was found where this could be provoked
    from a dnsdb PTR lookup with an IPv6 address that had more than 8
    components; fortuitously, this particular loophole had already been fixed
    by change 4.50/55 or 4.44/33 above.

    If there are any other similar loopholes, the new check in host_aton()
    itself should stop them being exploited. The report I received stated that
    data on the command line could provoke the exploit when Exim was running as
    exim, but did not say which command line option was involved. All I could
    find was the use of -be with a bad dnsdb PTR lookup, and in that case it is
    running as the user.
    CAN-2005-0021

35. There was a buffer overflow vulnerability in the SPA authentication code
    (which came originally from the Samba project). I have added a test to the
    spa_base64_to_bits() function which I hope fixes it.
    CAN-2005-0022

36. The daemon start-up calls getloadavg() while still root for those OS that
    need the first call to be done as root, but it missed one case: when
    deliver_queue_load_max is set with deliver_drop_privilege. This is
    necessary for the benefit of the queue runner, because there is no re-exec
    when deliver_drop_privilege is set.

37. Caching of lookup data for "hosts =" ACL conditions, when a named host list
    was in use, was not putting the data itself into the right store pool;
    consequently, it could be overwritten for a subsequent message in the same
    SMTP connection. (Fix 4.40/11 dealt with the non-cache case, but overlooked
    the caching.)

38. Sometimes the final signoff response after QUIT could fail to get
    transmitted in the non-TLS case. Testing !tls_active instead of tls_active
    < 0 before doing a fflush(). This bug looks as though it goes back to the
    introduction of TLS in release 3.20, but "sometimes" must have been rare
    because the tests only now provoked it.

Revision 1.23: download - view: text, markup, annotated - select for diffs
Mon Nov 1 17:25:25 2004 UTC (20 years, 1 month ago) by abs
Branches: MAIN
CVS tags: pkgsrc-2004Q4-base, pkgsrc-2004Q4
Diff to: previous 1.22: preferred, colored
Changes since revision 1.22: +2 -1 lines
Update exim to 4.43nb1
Update exim-exiscan to 4.43_28nb1
Add back patch to ensure fork() is not called with closed fd 0, 1, or 2

Revision 1.22: download - view: text, markup, annotated - select for diffs
Thu Oct 7 17:29:16 2004 UTC (20 years, 2 months ago) by abs
Branches: MAIN
Diff to: previous 1.21: preferred, colored
Changes since revision 1.21: +6 -6 lines
Update exim to 4.43 from 4.42
Update exim-exiscan to 4.43_28 from 4.42_27
Update exim-html to 4.40 from 4.30

exim-exiscan:

28  - Added F-Secure support, thanks to Johan Thelmen <jth@home.se>.

    - Upgraded SRS support to libsrs_alt 0.5 via Miles
      Wilton's patch.

    - REMOVED exiscan-acl implementation of custom header
      placement in favor of Philip Hazel's native implementation.
      However, a new option option was added for it to
      mimic the behaviour of the old header_pos_middle option.
      Read section 10 of exiscan-acl-spec.txt.

exim:
 1. Fixed a longstanding but relatively impotent bug: a long time ago, before
    PIPELINING, the function smtp_write_command() used to return TRUE or FALSE.
    Now it returns an integer. A number of calls were still expecting a T/F
    return. Fortuitously, in all cases, the tests worked in OK situations,
    which is the norm. However, things would have gone wrong on any write
    failures on the smtp file descriptor. This function is used when sending
    messages over SMTP and also when doing verify callouts.

 2. When Exim is called to do synchronous delivery of a locally submitted
    message (the -odf or -odi options), it no longer closes stderr before doing
    the delivery.

 3. Implemented the mua_wrapper option.

 4. Implemented mx_fail_domains and srv_fail_domains for the dnslookup router.

 5. Implemented the functions header_remove(), header_testname(),
    header_add_at_position(), and receive_remove_recipient(), and exported them
    to local_scan().

 6. If an ACL "warn" statement specified the addition of headers, Exim already
    inserted X-ACL-Warn: at the start if there was no header name. However, it
    was not making this test for the second and subsequent header lines if
    there were newlines in the string. This meant that an invalid header could
    be inserted if Exim was badly configured.

 7. Allow an ACL "warn" statement to add header lines at the start or after all
    the Received: headers, as well as at the end.

 8. Added the rcpt_4xx retry error code.

 9. Added postmaster_mailfrom=xxx to callout verification option.

10. Added mailfrom=xxxx to the callout verification option, for verify=
    header_sender only.

11. ${substr_1_:xxxx} and ${substr__3:xxxx} are now diagnosed as syntax errors
    (they previously behaved as ${substr_1_0:xxxx} and ${substr:_0_3:xxxx}).

12. Inserted some casts to stop certain compilers warning when using pointer
    differences as field lengths or precisions in printf-type calls (mostly
    affecting debugging statements).

13. Added optional readline() support for -be (dynamically loaded).

14. Obscure bug fix: if a message error (e.g. 4xx to MAIL) happened within the
    same clock tick as a message's arrival, so that its received time was the
    same as the "first fail" time on the retry record, and that message
    remained on the queue past the ultimate address timeout, every queue runner
    would try a delivery (because it was past the ultimate address timeout) but
    after another failure, the ultimate address timeout, which should have then
    bounced the address, did not kick in. This was a "< instead of <=" error;
    in most cases the first failure would have been in the next clock tick
    after the received time, and all would be well.

15. The special items beginning with @ in domain lists (e.g. @mx_any) were not
    being recognized when the domain list was tested by the match_domain
    condition in an expansion string.

16. Added the ${str2b64: operator.

17. Exim was always calling setrlimit() to set a large limit for the number of
    processes, without checking whether the existing limit was already
    adequate. (It did check for the limit on file descriptors.) Furthermore,


18. Imported PCRE 5.0.

19. Trivial typo in log message " temporarily refused connection" (the leading
    space).

20. If the log selector return_path_on_delivery was set and an address was
    redirected to /dev/null, the delivery process crashed because it assumed
    that a return path would always be set for a "successful" delivery. In this
    case, the whole delivery is bypassed as an optimization, and therefore no
    return path is set.

21. Internal re-arrangement: the function for sending a challenge and reading
    a response while authentication was assuming a zero-terminated challenge
    string. It's now changed to take a pointer and a length, to allow for
    binary data in such strings.

22. Added the cyrus_sasl authenticator (code supplied by MBM).

23. Exim was not respecting finduser_retries when seeking the login of the
    uid under which it was called; it was always trying 10 times. (The default
    setting of finduser_retries is zero.) Also, it was sleeping after the final
    failure, which is pointless.

24. Implemented tls_on_connect_ports.

25. Implemented acl_smtp_predata.

26. If the domain in control=submission is set empty, Exim assumes that the
    authenticated id is a complete email address when it generates From: or
    Sender: header lines.

27. Added "#define SOCKLEN_T int" to OS/os.h-SCO and OS/os.h-SCO_SV. Also added
    definitions to OS/Makefile-SCO and OS/Makefile-SCO_SV that put basename,
    chown and chgrp in /bin and hostname in /usr/bin.

28. Exim was keeping the "process log" file open after each use, just as it
    does for the main log. This opens the possibility of it remaining open for
    long periods when the USR1 signal hits a daemon. Occasional processlog
    errors were reported, that could have been caused by this. Anyway, it seems
    much more sensible not to leave this file open at all, so that is what now
    happens.

29. The long-running daemon process does not normally write to the log once it
    has entered its main loop, and it closes the log before doing so. This is
    so that log files can straightforwardly be renamed and moved. However,
    there are a couple of unusual error situations where the daemon does write
    log entries, and I had neglected to close the log afterwards.

30. The text of an SMTP error response that was received during a remote
    delivery was being truncated at 512 bytes. This is too short for some of
    the long messages that one sometimes sees. I've increased the limit to
    1024.

31. It is now possible to make retry rules that apply only when a message has a
    specific sender, in particular, an empty sender.

32. Added "control = enforce_sync" and "control = no_enforce_sync". This makes
    it possible to be selective about when SMTP synchronization is enforced.

33. Added "control = caseful_local_part" and "control = "caselower_local_part".

32. Implemented hosts_connection_nolog.

33. Added an ACL for QUIT.

34. Setting "delay_warning=" to disable warnings was not working; it gave a
    syntax error.

35. Added mailbox_size and mailbox_filecount to appendfile.

36. Added control = no_multiline_responses to ACLs.

37. There was a bug in the logic of the code that waits for the clock to tick
    in the case where the clock went backwards by a substantial amount such
    that the microsecond fraction of "now" was more than the microsecond
    fraction of "then" (but the whole seconds number was less).

38. Added support for the libradius Radius client library this is found on
    FreeBSD (previously only the radiusclient library was supported).

Revision 1.21: download - view: text, markup, annotated - select for diffs
Sat Sep 25 07:45:51 2004 UTC (20 years, 2 months ago) by grant
Branches: MAIN
Diff to: previous 1.20: preferred, colored
Changes since revision 1.20: +2 -1 lines
statvfs() fix for NetBSD >=2.0D.

Revision 1.20: download - view: text, markup, annotated - select for diffs
Fri Aug 27 10:46:52 2004 UTC (20 years, 3 months ago) by abs
Branches: MAIN
CVS tags: pkgsrc-2004Q3-base, pkgsrc-2004Q3
Diff to: previous 1.19: preferred, colored
Changes since revision 1.19: +10 -11 lines
Update exim to 4.42 and exim-exiscan to 4.42_27:
Feature changes in exim since 4.34 (bugfixes not listed):

    Version 4.42
    ------------

     1. The "personal" filter test is brought up-to-date with
	recommendations from the Sieve specification: (a) The list
	of non-personal From:  addresses now includes "listserv",
	"majordomo", and "*-request"; (b) If the message contains
	any header line starting with "List=-" it is treated as
	non-personal.

     2. The Sieve functionality has been extended to support the
	 "copy" and "vacation" extensions, and comparison tests.

     3. There is now an overall timeout for performing a callout
	verification. It defaults to 4 times the callout timeout,
	which applies to individual SMTP commands during the callout.
	The overall timeout applies when there is more than one
	host that can be tried. The timeout is checked before trying
	the next host. This prevents very long delays if there are
	a large number of hosts and all are timing out (e.g. when
	the network connections are timing out). The value of the
	overall timeout can be changed by specifying an additional
	sub-option for "callout", called "maxwait". For example:

	  verify = sender/callout=5s,maxwait=20s

     4. Changes to the "personal" filter test:

	(1) The list of non-personal local parts in From: addresses
	has been extended to include "listserv", "majordomo",
	"*-request", and "owner-*", taken from the Sieve specification
	recommendations.

	(2) If the message contains any header line starting with
	"List-" it is treated as non-personal.

	(3) The test for "circular" in the Subject: header line
	has been removed because it now seems ill-conceived.

     5. The autoreply transport has a new option called never_mail.
	This is an address list. If any run of the transport
	creates a message with a recipient that matches any item
	in the list, that recipient is quietly discarded. If all
	recipients are discarded, no message is created.

    Version 4.40
    ------------

    The documentation is up-to-date for the 4.40 release. What
    follows here is a brief list of the new features that have been
    added since 4.30.

     1. log_incoming_interface affects more log lines.

     2. New ACL modifier "control = submission".

     3. CONFIGURE_OWNER can be set at build time to define an
	 alternative owner for the configuration file, in addition
	to root and exim.

     4. Added expansion variables $body_zerocount, $recipient_data,
        and $sender_data.

     5. The time of last modification of the "new" subdirectory is
	 now used as the "mailbox time last read" when there is a
	quota error for a maildir delivery.

     6. The special item "+ignore_unknown" may now appear in host
        lists.

     7. The special domain-matching patterns @mx_any, @mx_primary,
        and @mx_secondary can now be followed by "/ignore=<ip list>".

     8. New expansion conditions: match_domain, match_address,
	 match_local_part, lt, lti, le, lei, gt, gti, ge, and new
	expansion operators time_interval, eval10, and base62d.

     9. New lookup type called "iplsearch".

    10. New log selectors ident_timeout, tls_certificate_verified,
	queue_time, deliver_time, outgoing_port, return_path_on_delivery.

    11. New global options smtp_active_hostname and tls_require_ciphers.

    12. Exinext has -C and -D options.

    13. "domainlist_cache" forces caching of an apparently variable
	list.

    14. For compatibility with Sendmail, the command line option
	-prval:sval is equivalent to -oMr rval -oMs sval.

    15. New callout options use_sender and use_postmaster for use
	when verifying recipients.

    16. John Jetmore's "exipick" utility has been added to the
	distribution.

    17. The TLS code now supports CRLs.

    18. The dnslookup router and the dnsdb lookup type now support
	the use of SRV records.

    19. The redirect router has a new option called qualify_domain.

    20. exigrep's output now also includes lines that are not
	related to any particular message, but which do match the
	pattern.

    21. New global option write_rejectlog. If it is set false, Exim
	no longer writes anything to the reject log.


Changes in exim-exiscan since 4.34_22

    27  - Changed algorithm of header_pos_middle to add headers
	  before the first header which is NOT Received: or
	  Resent-*:.

    exim 4.42 ---------------------------------------------------

    26  - Fixed header corruption when using header_pos_top.
	  (Thanks to Michael Deutschmann).

	- Fixed headers being added before any Received-SPF:
	  header when using header_pos_middle (Thanks to
	  Michael Deutschmann).

	- DrWeb malware support: Add flag to treat .eml file
	  as plain mail (Thanks to Alex Miller).

    25  - Fixed include location of libspf2 headers.

	- Added support for Kaspersky AV Version 5 (aveserver).

	- Added expansion of av_scanner global variable
	  when it starts with a dollar sign. This is useful
	  for implementing multiple malware scanners.

	- Added support for adding ACL headers at the beginning
	  and in the "middle" of the message header block.
	  (This is a preliminary solution, see comment in SPF
	  section of exiscan-acl-spec).

    24  - Changed documentation to reflect libspf_alt->libspf2
	  name change.

	- Upgraded included SRS patch to 0.3 (author Miles Wilton).
	  Also added a small doc chapter for SRS.

	- Brightmail: put notes for users of new 6.x version in the
	  docs (search for "BMI6.x").
	  BMI Version 6 should work OK, an upgraded SDK is now on
	  Brightmail's download site.

    exim 4.41 ----------------------------------------------------

    23  - Added patch to support SRS in the redirect router, done
	  by Miles Wilton. Please check http://srs.mirtol.com/
	  for more information.

	- Fixed the negation operator for SPF support. Thanks
	  to Michael Haardt for sending a patch.

	- Increased buffer size for large SA reports (when using
	  custom SA rulesets).

	- Increased buffer size for large BMI verdicts. Should now
	  handle large number of recipients gracefully.

Revision 1.19: download - view: text, markup, annotated - select for diffs
Sun Jun 6 22:10:51 2004 UTC (20 years, 6 months ago) by abs
Branches: MAIN
CVS tags: pkgsrc-2004Q2-base, pkgsrc-2004Q2
Diff to: previous 1.18: preferred, colored
Changes since revision 1.18: +5 -6 lines
Update exim to 4.34, Update exim-exiscan to 4.34_22.  From Jeremy C. Reed

Exim changes in 4.34

 1. Very minor rewording of debugging text in manualroute to say "list of
    hosts" instead of "hostlist".

 2. If verify=header_syntax was set, and a header line with an unqualified
    address (no domain) and a large number of spaces between the end of the
    name and the colon was received, the reception process suffered a buffer
    overflow, and (when I tested it) crashed. This was caused by some obsolete
    code that should have been removed. The fix is to remove it!

 3. When running in the test harness, delay a bit after writing a bounce
    message to get a bit more predictability in the log output.

 4. Added a call to search_tidyup() just before forking a reception process. In
    theory, someone could use a lookup in the expansion of smtp_accept_max_
    per_host which, without the tidyup, could leave open a database connection.

 5. Added the variables $recipient_data and $sender_data which get set from a
    lookup success in an ACL "recipients" or "senders" condition, or a router
    "senders" option, similar to $domain_data and $local_part_data.

 6. Moved the writing of debug_print from before to after the "senders" test
    for routers.

 7. Change 4.31/66 (moving the time when the Received: is generated) caused
    problems for message scanning, either using a data ACL, or using
    local_scan() because the Received: header was not generated till after they
    were called (in order to set the time as the time of reception completion).
    I have revised the way this works. The header is now generated after the
    body is received, but before the ACL or local_scan() are called. After they
    are run, the timestamp in the header is updated.

Exim-exiscan version 4.34

22  - added SPF support via libspf_alt. Please read the
      docs.

21  - Fix missing fclose() in regex.c. This was causing
      scan directories not to be deleted on NFS spools.

    - Remove "shutdown socket for writing" from clamd malware
      code. It seems to cause problems with the latest
      clamd 0.70 release.

    - Fix allow tables in acl.c to disallow exiscan conditions
      in the RCPT ACL.

    - adapted patch to exim 4.34

Revision 1.18: download - view: text, markup, annotated - select for diffs
Fri Jun 4 00:10:34 2004 UTC (20 years, 6 months ago) by reed
Branches: MAIN
Diff to: previous 1.17: preferred, colored
Changes since revision 1.17: +2 -2 lines
Add support for a variable called EXIM_DB.  By default, it will
use native (since it is the first BDB_ACCEPTED choice). So under
NetBSD this does not change anything.

It can be set to "gdbm" if desiring gdbm as the DB method used.
Else it will use the mk/bdb.buildlink3.mk method.

For example, to choose a specific Berkeley DB implementation
(like DB hash version 7), then do: "make BDB_DEFAULT=db3"
(when EXIM_DB is unset or not set to "gdbm").

Please note that if you change the method, exim may complain
about DB problems. This is okay. You can delete the db files
and regenerate. (exim provides some db management tools too.)

This fixes the problem where exim will not build when
the system's db is not available or correct.

This will close my old PR pkg/19277.

This was discussed with maintainer, David Brownlee.

Revision 1.17: download - view: text, markup, annotated - select for diffs
Fri May 7 17:47:32 2004 UTC (20 years, 7 months ago) by abs
Branches: MAIN
Diff to: previous 1.16: preferred, colored
Changes since revision 1.16: +12 -11 lines
Update exim3 to exim-3.36nb2
  - Fix buffer overflows listed at http://www.guninski.com/exim1.html

Update exim to exim-4.33nb1 (from 4.22nb5)
  - Fix buffer overflow listed at http://www.guninski.com/exim1.html
  - Leave nb1 to indicate we have a local change from stock 4.33
  - 1086 lines of changes - http://www.exim.org/ftp/ChangeLogs/ChangeLog-4.33
  - Remove dependancy on exim-user - now looks up EXIM_{USER,GROUP} at runtime

Update exim-exiscan to 4.33_20nb1 (from 4.22-12)
  - Fix buffer overflow listed at http://www.guninski.com/exim1.html
  - Leave nb1 to indicate we have a local change from stock 4.33_20
  - Same exim changes - http://www.exim.org/ftp/ChangeLogs/ChangeLog-4.33
  - Changes (http://duncanthrax.net/exiscan-acl/CHANGELOG) include
    - added option to use multiple spamd servers
    - many mime changes
    - Added Brightmail Antispam support
    - clamd fixes

Update exim-html to 4.30 (from 4.20)
  - Update to latest docs

Delete exim-user
  - No longer required - exim now looks up EXIM_{USER,GROUP} at runtime

Revision 1.16: download - view: text, markup, annotated - select for diffs
Fri Mar 5 12:28:45 2004 UTC (20 years, 9 months ago) by abs
Branches: MAIN
CVS tags: pkgsrc-2004Q1-base, pkgsrc-2004Q1
Diff to: previous 1.15: preferred, colored
Changes since revision 1.15: +3 -2 lines
Update exim to 4.22nb4 & exim-exiscan to 4.22-12nb2 from Norm at cackhanded.net
    - Avoid "set{u,g}id ... invoked ... with fd 1 closed" warnings
    - Cleanup DLOPEN from Local/Makefile.pkgsrc

Revision 1.15: download - view: text, markup, annotated - select for diffs
Fri Sep 5 02:55:59 2003 UTC (21 years, 3 months ago) by taca
Branches: MAIN
CVS tags: pkgsrc-2003Q4-base, pkgsrc-2003Q4
Diff to: previous 1.14: preferred, colored
Changes since revision 1.14: +3 -3 lines
Reflect update of exim-exiscan update.

Revision 1.14: download - view: text, markup, annotated - select for diffs
Tue Sep 2 12:19:36 2003 UTC (21 years, 3 months ago) by abs
Branches: MAIN
Diff to: previous 1.13: preferred, colored
Changes since revision 1.13: +3 -3 lines
Update exim to 4.22nb1
Update exim-exiscan to 4.22-11nb1
    Include exiqgrep in PLIST, and commit distinfo from previous exim-exiscan
    change. Whole exim update was overly hurried due to security announcement.

Revision 1.13: download - view: text, markup, annotated - select for diffs
Tue Sep 2 11:14:16 2003 UTC (21 years, 3 months ago) by abs
Branches: MAIN
Diff to: previous 1.12: preferred, colored
Changes since revision 1.12: +2 -2 lines
Fix patch in last and remove reference to non-existant exim-exiscan-acl

Revision 1.12: download - view: text, markup, annotated - select for diffs
Tue Sep 2 10:33:39 2003 UTC (21 years, 3 months ago) by abs
Branches: MAIN
Diff to: previous 1.11: preferred, colored
Changes since revision 1.11: +10 -8 lines
Update exim to 4.22. Too many changes to list since 4.10
Package changes include addition of Makefile.common (to be used by
Upcoming exim-exiscan-acl package), and exim.8

Revision 1.11: download - view: text, markup, annotated - select for diffs
Sat Aug 2 17:00:08 2003 UTC (21 years, 4 months ago) by jmmv
Branches: MAIN
Diff to: previous 1.10: preferred, colored
Changes since revision 1.10: +6 -6 lines
Convert exim and exim-user to the bsd.pkg.install.mk framework:
- Introduce EXIM_GROUP and EXIM_USER to tune the details of the group and
  user used by the daemon.
- Honour PKG_SYSCONFDIR.
- Install sample files under the examples directory.
- Automatically install example files under sysconfdir using CONF_FILES.
  This simplifies exim's set up from admin's point of view.
- Use RCD_SCRIPTS to handle the startup script.

As a result, bump PKGREVISION of exim and exim-user.

Revision 1.10: download - view: text, markup, annotated - select for diffs
Sat Mar 22 12:37:24 2003 UTC (21 years, 8 months ago) by jmmv
Branches: MAIN
Diff to: previous 1.9: preferred, colored
Changes since revision 1.9: +2 -2 lines
Explicitly set TLS_INCLUDE to where OpenSSL headers are found.
Fixes PR pkg/20609 by Mirko Thiesen.

Revision 1.9: download - view: text, markup, annotated - select for diffs
Mon Dec 9 11:38:04 2002 UTC (22 years ago) by ad
Branches: MAIN
CVS tags: netbsd-1-6-1-base, netbsd-1-6-1
Diff to: previous 1.8: preferred, colored
Changes since revision 1.8: +5 -4 lines
Update top exim-4.10. Guts provided by dawszy at arhea.net in pkg/19230,
with some additions by me. Those running exim are advised to update.

Highlights from ChangeLog

1. Added HAVE_SA_LEN=YES to the OS/Makefile-Darwin file.
3. The code for computing load averages was broken in 64-bit Solaris.
10. Tidies to code for calls to fork(); some failures not logged.
26. Fixed some problems with retrying address errors in remote deliveries.

Local changes (will make next release):

Undo the OS/Makefile-NetBSD split that made it into the main tree. This
causes all manner of breakage.

Revision 1.8: download - view: text, markup, annotated - select for diffs
Fri Oct 25 12:18:15 2002 UTC (22 years, 1 month ago) by wiz
Branches: MAIN
Diff to: previous 1.7: preferred, colored
Changes since revision 1.7: +2 -2 lines
buildlink1 -> buildlink2.

Revision 1.6.2.1: download - view: text, markup, annotated - select for diffs
Sun Jun 23 18:51:10 2002 UTC (22 years, 5 months ago) by jlam
Branches: buildlink2
Diff to: previous 1.6: preferred, colored; next MAIN 1.7: preferred, colored
Changes since revision 1.6: +7 -6 lines
Merge from pkgsrc-current to buildlink2 branch.

Revision 1.7: download - view: text, markup, annotated - select for diffs
Wed Jun 19 16:02:26 2002 UTC (22 years, 5 months ago) by ad
Branches: MAIN
CVS tags: pkgviews-base, pkgviews, netbsd-1-6-RELEASE-base, netbsd-1-6, buildlink2-base
Diff to: previous 1.6: preferred, colored
Changes since revision 1.6: +7 -6 lines
Update to exim-4.05. This is a major update. Details of the changes from
exim 3 can be had from www.exim.org.

Revision 1.6: download - view: text, markup, annotated - select for diffs
Wed Dec 19 17:11:03 2001 UTC (22 years, 11 months ago) by ad
Branches: MAIN
CVS tags: netbsd-1-5-PATCH003
Branch point for: buildlink2
Diff to: previous 1.5: preferred, colored
Changes since revision 1.5: +3 -3 lines
Update to exim-3.34. Change logs can be found at http://www.exim.org/.

This update contains an important security fix for those using the pipe
transport directly from a director/router.

Revision 1.5: download - view: text, markup, annotated - select for diffs
Mon Aug 13 08:11:55 2001 UTC (23 years, 4 months ago) by ad
Branches: MAIN
Diff to: previous 1.4: preferred, colored
Changes since revision 1.4: +3 -3 lines
Update to exim-3.32. This is a bugfix release; change logs can be found
at http://www.exim.org/.

Revision 1.4: download - view: text, markup, annotated - select for diffs
Sat Jul 14 18:17:21 2001 UTC (23 years, 5 months ago) by ad
Branches: MAIN
Diff to: previous 1.3: preferred, colored
Changes since revision 1.3: +4 -5 lines
Update to exim-3.30. This is mainly a bugfix release. Changelogs can be
found at http://www.exim.org/.

Revision 1.3: download - view: text, markup, annotated - select for diffs
Mon Jun 11 12:15:45 2001 UTC (23 years, 6 months ago) by ad
Branches: MAIN
Diff to: previous 1.2: preferred, colored
Changes since revision 1.2: +2 -2 lines
Enable LMTP.

Revision 1.2: download - view: text, markup, annotated - select for diffs
Fri Apr 20 13:09:56 2001 UTC (23 years, 7 months ago) by agc
Branches: MAIN
CVS tags: netbsd-1-5-PATCH001
Diff to: previous 1.1: preferred, colored
Changes since revision 1.1: +5 -3 lines
Move to sha1 digests, and add distfile sizes.

Revision 1.1: download - view: text, markup, annotated - select for diffs
Tue Apr 17 11:33:46 2001 UTC (23 years, 8 months ago) by agc
Branches: MAIN
+ move the distfile digest/checksum value from files/md5 to distinfo
+ move the patch digest/checksum values from files/patch-sum to distinfo

Diff request

This form allows you to request diffs between any two revisions of a file. You may select a symbolic revision name using the selection box or you may type in a numeric name using the type-in text box.

Log view options

CVSweb <webmaster@jp.NetBSD.org>