]> git.ipfire.org Git - thirdparty/postfix.git/commitdiff
postfix-2.7.2 v2.7.2
authorWietse Venema <wietse@porcupine.org>
Tue, 23 Nov 2010 05:00:00 +0000 (00:00 -0500)
committerViktor Dukhovni <postfix-users@dukhovni.org>
Sat, 10 Feb 2018 19:11:55 +0000 (14:11 -0500)
postfix/HISTORY
postfix/RELEASE_NOTES
postfix/src/cleanup/cleanup_milter.c
postfix/src/global/mail_version.h
postfix/src/global/pipe_command.c
postfix/src/smtpd/smtpd.c
postfix/src/smtpd/smtpd_check.c
postfix/src/smtpd/smtpd_proxy.c

index 72ec08c6b4ebab5d0c54fa6ef85edd43040e81e9..8c8fda563c072791137d1191e5a9122959a5bcaa 100644 (file)
@@ -15774,10 +15774,45 @@ Apologies for any names omitted.
        Bugfix (introduced Postfix 2.2): Postfix no longer appends
        the system default CA certificates to the lists specified
        with *_tls_CAfile or with *_tls_CApath.  This prevents
-       third-party certificates from being trusted and given mail
-       relay permission with permit_tls_all_clientcerts.  This
-       change may break valid configurations that do not use
-       permit_tls_all_clientcerts.  To get the old behavior, specify
-       "tls_append_default_CA = yes".  Files: tls/tls_certkey.c,
-       tls/tls_misc.c, global/mail_params.h.  proto/postconf.proto,
-       mantools/postlink.
+       third-party certificates from getting mail relay permission
+       with the permit_tls_all_clientcerts feature.  Unfortunately
+       this may cause compatibility problems with configurations
+       that rely on certificate verification for other purposes.
+       To get the old behavior, specify "tls_append_default_CA =
+       yes".  Files: tls/tls_certkey.c, tls/tls_misc.c,
+       global/mail_params.h.  proto/postconf.proto, mantools/postlink.
+
+20100714
+
+       Compatibility with Postfix < 2.3: fix 20061207 was incomplete
+       (undoing the change to bounce instead of defer after
+       pipe-to-command delivery fails with a signal). Fix by Thomas
+       Arnett. File: global/pipe_command.c.
+
+20100727
+
+       Bugfix: the milter_header_checks parser provided only the
+       actions that change the message flow (reject, filter,
+       discard, redirect) but disabled the non-flow actions (warn,
+       replace, prepend, ignore, dunno, ok).  File:
+       cleanup/cleanup_milter.c.
+
+20100827
+
+       Performance: fix for poor smtpd_proxy_filter TCP performance
+       over loopback (127.0.0.1) connections. Problem reported by
+       Mark Martinec.  Files: smtpd/smtpd_proxy.c.
+
+20101023
+
+       Cleanup: don't apply reject_rhsbl_helo to non-domain forms
+       such as network addresses.  This would cause false positives
+       with dbl.spamhaus.org.  File: smtpd/smtpd_check.c.
+
+20101117
+
+       Bugfix: the "421" reply after Milter error was overruled
+       by Postfix 1.1 code that replied with "503" for RFC 2821
+       compliance. We now make an exception for "final" replies,
+       as permitted by RFC. Solution by Victor Duchovni. File:
+       smtpd/smtpd.c.
index fd52b840fec3aca566dc90d040b0eab3085f597e..251967b1ba5cdf10c904d93a23dd3c745002f7a2 100644 (file)
@@ -19,12 +19,12 @@ Incompatibility with Postfix 2.7.2
 
 Postfix no longer appends the system-supplied default CA certificates
 to the lists specified with *_tls_CAfile or with *_tls_CApath. This
-prevents third-party certificates from being trusted and given mail
-relay permission with permit_tls_all_clientcerts.
-
-Unfortunately this change may break certificate verification on
-sites that don't use permit_tls_all_clientcerts.  Specify
-"tls_append_default_CA = yes" for backwards compatibility.
+prevents third-party certificates from getting mail relay permission
+with the permit_tls_all_clientcerts feature.
+Unfortunately this change may cause compatibility problems when
+configurations rely on certificate verification for other purposes.
+Specify "tls_append_default_CA = yes" for backwards compatibility.
 
 Major changes - performance
 ---------------------------
index 6ecfa4c3b01d290fc779408f7af8b064739608d9..05ded61672485fccd6c6e13d354493c2139d7524 100644 (file)
@@ -370,8 +370,7 @@ static char *cleanup_milter_hbc_extend(void *context, const char *command,
        }
        return ((char *) buf);
     }
-    msg_warn("unknown command in %s map: %s", map_class, command);
-    return ((char *) buf);
+    return ((char *) HBC_CHECKS_STAT_UNKNOWN);
 }
 
 /* cleanup_milter_header_checks - inspect Milter-generated header */
index 570260265bdc0f1219769da34250c7a7afe66bc3..2257bda315909a60e52b6ec77576b6cf5b6dd850 100644 (file)
@@ -20,8 +20,8 @@
   * Patches change both the patchlevel and the release date. Snapshots have no
   * patchlevel; they change the release date only.
   */
-#define MAIL_RELEASE_DATE      "20100707"
-#define MAIL_VERSION_NUMBER    "2.7.2-RC2"
+#define MAIL_RELEASE_DATE      "20101123"
+#define MAIL_VERSION_NUMBER    "2.7.2"
 
 #ifdef SNAPSHOT
 # define MAIL_VERSION_DATE     "-" MAIL_RELEASE_DATE
index ce3bad0a91ce613e000d519412fec3d6b0c425e3..6cd4100ede591593f09bd9f6889358850e5df34d 100644 (file)
@@ -628,7 +628,7 @@ int     pipe_command(VSTREAM *src, DSN_BUF *why,...)
         */
        if (!NORMAL_EXIT_STATUS(wait_status)) {
            if (WIFSIGNALED(wait_status)) {
-               dsb_unix(why, "5.3.0", log_len ?
+               dsb_unix(why, "4.3.0", log_len ?
                         log_buf : sys_exits_detail(EX_SOFTWARE)->text,
                         "Command died with signal %d: \"%s\"%s%s",
                         WTERMSIG(wait_status), args.command,
index 307cdd406fbfd5d200c0e49e9b8386247a6fde1c..b25cf6146353c79feae7c010d7b1f7d56f9f1c9f 100644 (file)
@@ -4487,6 +4487,11 @@ static void smtpd_proto(SMTPD_STATE *state)
            }
            /* XXX We use the real client for connect access control. */
            if (state->access_denied && cmdp->action != quit_cmd) {
+               /* XXX Exception for Milter override. */
+               if (strncmp(state->access_denied + 1, "21", 2) == 0) {
+                   smtpd_chat_reply(state, "%s", state->access_denied);
+                   continue;
+               }
                smtpd_chat_reply(state, "503 5.7.0 Error: access denied for %s",
                                 state->namaddr);       /* RFC 2821 Sec 3.1 */
                state->error_count++;
index 7b7e53b3adeac665326477ce10eda4ddca0f443f..c31e608c5392b10a59be51c2377b7a37e9f2f169 100644 (file)
@@ -3789,7 +3789,8 @@ static int generic_checks(SMTPD_STATE *state, ARGV *restrictions,
                         name);
            else {
                cpp += 1;
-               if (state->helo_name)
+               if (state->helo_name
+                   && valid_hostname(state->helo_name, DONT_GRIPE))
                    status = reject_rbl_domain(state, *cpp, state->helo_name,
                                               SMTPD_NAME_HELO);
            }
index 0968f5b5bb213edcc82f7b01594c25beef98d64c..015866cb3cbe92a6a29913bfaef094092994955b 100644 (file)
@@ -355,6 +355,9 @@ static int smtpd_proxy_connect(SMTPD_STATE *state)
     /* Needed by our DATA-phase record emulation routines. */
     vstream_control(proxy->service_stream, VSTREAM_CTL_CONTEXT,
                    (char *) state, VSTREAM_CTL_END);
+    /* Avoid poor performance when TCP MSS > VSTREAM_BUFSIZE. */
+    if (connect_fn == inet_connect)
+       vstream_tweak_tcp(proxy->service_stream);
     smtp_timeout_setup(proxy->service_stream, proxy->timeout);
 
     /*