From: Wietse Venema Date: Mon, 22 Apr 2013 02:45:19 +0000 (-0400) Subject: postfix-2.11-20130422-nonprod X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=7966ad1091cd20f8a7cf8227cec457953bb03f27;p=thirdparty%2Fpostfix.git postfix-2.11-20130422-nonprod --- diff --git a/postfix/.indent.pro b/postfix/.indent.pro index 8722d185e..88f1aa130 100644 --- a/postfix/.indent.pro +++ b/postfix/.indent.pro @@ -349,3 +349,6 @@ -Tsize_t -Tssize_t -Ttime_t +-TRESPONSE +-TSTATE +-TOPTIONS diff --git a/postfix/AAAREADME b/postfix/AAAREADME index cb11a0ada..e20091c87 100644 --- a/postfix/AAAREADME +++ b/postfix/AAAREADME @@ -164,6 +164,7 @@ Postfix daemons: Test programs: src/fsstone/ Measure file system overhead + src/posttls-finger/ Postfix SMTP/LMTP TLS probe utility src/smtpstone/ SMTP and QMQP server torture test Miscellaneous: diff --git a/postfix/HISTORY b/postfix/HISTORY index 438539c16..270abd967 100644 --- a/postfix/HISTORY +++ b/postfix/HISTORY @@ -18505,3 +18505,12 @@ Apologies for any names omitted. creation. Temporarily link session->tls to state->tls. Files: smtp/smtp.h, smtp/smtp_connect.c, smtp/smtp_reuse.c, smtp/smtp_tls_policy.c. + +20130422 + + Feature: smtptls-finger test program for SMTP over TLS. + Viktor Dukhovni. Files: Makefile.in, html/Makefile.in, + man/Makefile.in, mantools/postlink, posttls-finger/.indent.pro, + posttls-finger/Makefile.in, posttls-finger/posttls-finger.c, + posttls-finger/tlsmgrmem.c, posttls-finger/tlsmgrmem.h, + tls/tls.h, tls/tls_misc.c. diff --git a/postfix/Makefile.in b/postfix/Makefile.in index a16c89fdf..7145bc437 100644 --- a/postfix/Makefile.in +++ b/postfix/Makefile.in @@ -9,7 +9,8 @@ DIRS = src/util src/global src/dns src/tls src/xsasl src/milter src/master \ src/postkick src/postlock src/postlog src/postmap src/postqueue \ src/postsuper src/qmqpd src/spawn src/flush src/verify \ src/virtual src/proxymap src/anvil src/scache src/discard src/tlsmgr \ - src/postmulti src/postscreen src/dnsblog src/tlsproxy + src/postmulti src/postscreen src/dnsblog src/tlsproxy \ + src/posttls-finger MANDIRS = proto man html LIBEXEC = libexec/post-install libexec/postfix-files libexec/postfix-script \ libexec/postfix-wrapper libexec/main.cf libexec/master.cf \ diff --git a/postfix/README_FILES/TLS_README b/postfix/README_FILES/TLS_README index 82dfd3149..b66803c68 100644 --- a/postfix/README_FILES/TLS_README +++ b/postfix/README_FILES/TLS_README @@ -958,7 +958,7 @@ administrator should publish such EE records in preference to all types. The pre-requisites for DANE support in the Postfix SMTP client are: - * An compile-time OpenSSL library that supports the TLS SNI extension and the + * A compile-time OpenSSL library that supports the TLS SNI extension and the "sha256" and "sha512" message digests. * A compile-time DNS resolver library that supports DNSSEC. Postfix binaries built on an older system will not support DNSSEC even if deployed on a @@ -976,8 +976,8 @@ plans to implement SNI in the Postfix SMTP server. Note: The Postfix SMTP client's internal stub DNS resolver is DNSSEC-aware, but it does not itself validate DNSSEC records, rather it delegates DNSSEC validation to the operating system's configured recursive DNS nameserver. The -Postfix DNS resolver relies on a secure-channel to the cache for DNSSEC -integrity, but does not support TSIG to protect the transmission channel +Postfix DNS client relies on a secure channel to the resolver's cache for +DNSSEC integrity, but does not support TSIG to protect the transmission channel between itself and the nameserver. Therefore, it is strongly recommended (DANE security guarantee void otherwise) that each MTA run a local DNSSEC-validating recursive resolver ("unbound" from nlnetlabs.nl is a reasonable choice) diff --git a/postfix/WISHLIST b/postfix/WISHLIST index 7170996e4..be937b5c5 100644 --- a/postfix/WISHLIST +++ b/postfix/WISHLIST @@ -8,6 +8,16 @@ Wish list: Spellcheck and double-word check. + Fix a false cache-sharing problem. After the SASL handshake, + the connection cache client does not store SASL credentials + in the destination properties; it stores them in the endpoint + label only. When the connection cache client reuses the + connection with smtp_reuse_nexthop(), it does not restore + the SASL credentials. When it saves the connection afterwards, + it creates a new endpoint label without SASL credentials, + so the authenticated connection can now be used for unrelated + deliveries. + Begin code revision, after DANE support stabilizes. This should be one pass that changes only names and no code. diff --git a/postfix/html/Makefile.in b/postfix/html/Makefile.in index 2778e7bac..39b47d707 100644 --- a/postfix/html/Makefile.in +++ b/postfix/html/Makefile.in @@ -13,7 +13,7 @@ COMMANDS= mailq.1.html newaliases.1.html postalias.1.html postcat.1.html \ postconf.1.html postfix.1.html postkick.1.html postlock.1.html \ postlog.1.html postdrop.1.html postmap.1.html postmulti.1.html \ postqueue.1.html postsuper.1.html sendmail.1.html \ - smtp-source.1.html smtp-sink.1.html \ + smtp-source.1.html smtp-sink.1.html posttls-finger.1.html \ qmqp-source.1.html qmqp-sink.1.html \ qshape.1.html CONFIG = access.5.html aliases.5.html canonical.5.html relocated.5.html \ @@ -225,6 +225,10 @@ smtp-sink.1.html: ../src/smtpstone/smtp-sink.c PATH=../mantools:$$PATH; \ srctoman $? | $(AWK) | nroff -man | uniq | $(MAN2HTML) | postlink >$@ +posttls-finger.1.html: ../src/posttls-finger/posttls-finger.c + PATH=../mantools:$$PATH; \ + srctoman $? | $(AWK) | nroff -man | uniq | $(MAN2HTML) | postlink >$@ + qmqp-source.1.html: ../src/smtpstone/qmqp-source.c PATH=../mantools:$$PATH; \ srctoman $? | $(AWK) | nroff -man | uniq | $(MAN2HTML) | postlink >$@ diff --git a/postfix/html/TLS_README.html b/postfix/html/TLS_README.html index 5dcff92fa..2dde0c0bb 100644 --- a/postfix/html/TLS_README.html +++ b/postfix/html/TLS_README.html @@ -204,7 +204,7 @@ or via public-key infrastructure. This means that the Postfix server public-key certificate file must include the server certificate first, then the issuing CA(s) (bottom-up order). The Postfix SMTP server certificate must be usable as SSL server certificate and -hence pass the "openssl verify -purpose sslserver ..." test. +hence pass the "openssl verify -purpose sslserver ..." test.

The examples that follow show how to create a server certificate @@ -1296,7 +1296,7 @@ EE records in preference to all types.

The pre-requisites for DANE support in the Postfix SMTP client are: