From: Wietse Venema
To turn on content filtering for mail arriving via SMTP only, append "-o content_filter=filter:dummy" to the master.cf diff --git a/postfix/html/postconf.5.html b/postfix/html/postconf.5.html index 1777b2787..500502a46 100644 --- a/postfix/html/postconf.5.html +++ b/postfix/html/postconf.5.html @@ -9693,8 +9693,8 @@ configurations in environments where DNS security is not assured.
List of TLS protocols that the Postfix SMTP client will exclude or include with opportunistic TLS encryption. Starting with Postfix 2.6, -the Postfix SMTP client will by default only use SSLv3 and TLSv1, the -SSLv2 protocol is insecure and obsolete.
+the Postfix SMTP client will by default not use the obsolete SSLv2 +protocol.In main.cf the values are separated by whitespace, commas or colons. In the policy table (see smtp_tls_policy_maps) the only valid diff --git a/postfix/man/man5/postconf.5 b/postfix/man/man5/postconf.5 index 290b269a9..54015f74f 100644 --- a/postfix/man/man5/postconf.5 +++ b/postfix/man/man5/postconf.5 @@ -5764,8 +5764,8 @@ This feature is available in Postfix 2.3 and later. .SH smtp_tls_protocols (default: !SSLv2) List of TLS protocols that the Postfix SMTP client will exclude or include with opportunistic TLS encryption. Starting with Postfix 2.6, -the Postfix SMTP client will by default only use SSLv3 and TLSv1, the -SSLv2 protocol is insecure and obsolete. +the Postfix SMTP client will by default not use the obsolete SSLv2 +protocol. .PP In main.cf the values are separated by whitespace, commas or colons. In the policy table (see smtp_tls_policy_maps) the only valid diff --git a/postfix/mantools/postlink b/postfix/mantools/postlink index 3d01af7c5..7d4d59e52 100755 --- a/postfix/mantools/postlink +++ b/postfix/mantools/postlink @@ -667,7 +667,6 @@ while (<>) { s;\btls_eecdh_ultra_curve\b;$&;g; s;\bfrozen_delivered_to\b;$&;g; - s;\bfrozen_owner_alias\b;$&;g; # Transport-dependent magical parameters. diff --git a/postfix/proto/FILTER_README.html b/postfix/proto/FILTER_README.html index 7ee33f665..d021d8a33 100644 --- a/postfix/proto/FILTER_README.html +++ b/postfix/proto/FILTER_README.html @@ -374,8 +374,8 @@ description of the command syntax below).
limit of 10 concurrent processes, use whatever process limit is feasible for your machine. Content inspection software can gobble up a lot of system resources, so you don't want to have too much -of it running at the same time. The empty null_sender feature is -both necessary and available with Postfix 2.3 and later. +of it running at the same time. The empty null_sender setting is +required with Postfix 2.3 and later.To turn on content filtering for mail arriving via SMTP only, append "-o content_filter=filter:dummy" to the master.cf diff --git a/postfix/proto/postconf.proto b/postfix/proto/postconf.proto index f46e246cc..083d51c48 100644 --- a/postfix/proto/postconf.proto +++ b/postfix/proto/postconf.proto @@ -11288,8 +11288,8 @@ the hostname and IP address. The logging format is "host[address]:port".
List of TLS protocols that the Postfix SMTP client will exclude or include with opportunistic TLS encryption. Starting with Postfix 2.6, -the Postfix SMTP client will by default only use SSLv3 and TLSv1, the -SSLv2 protocol is insecure and obsolete.
+the Postfix SMTP client will by default not use the obsolete SSLv2 +protocol. In main.cf the values are separated by whitespace, commas or
colons. In the policy table (see smtp_tls_policy_maps) the only valid
diff --git a/postfix/src/global/mail_version.h b/postfix/src/global/mail_version.h
index 80c6d4906..f0cc339ff 100644
--- a/postfix/src/global/mail_version.h
+++ b/postfix/src/global/mail_version.h
@@ -20,7 +20,7 @@
* Patches change both the patchlevel and the release date. Snapshots have no
* patchlevel; they change the release date only.
*/
-#define MAIL_RELEASE_DATE "20090426"
+#define MAIL_RELEASE_DATE "20090427"
#define MAIL_VERSION_NUMBER "2.7"
#ifdef SNAPSHOT
diff --git a/postfix/src/milter/milter.c b/postfix/src/milter/milter.c
index 718940445..afd227e12 100644
--- a/postfix/src/milter/milter.c
+++ b/postfix/src/milter/milter.c
@@ -160,12 +160,14 @@
/*
/* milter_rcpt_event() reports an RCPT TO event to the specified
/* milter instances, after sending the macros that were specified
-/* with the milter_create() rcpt_macros argument. When the flags
-/* argument is non-zero, it selects only milter instances that
-/* have at least one of the specificed flags. Known flags are:
+/* with the milter_create() rcpt_macros argument. The flags
+/* argument supports the following:
/* .IP MILTER_FLAG_WANT_RCPT_REJ
-/* This milter expects to receive rejected recipients with the
-/* {rcpt_mailer} macro set to "error".
+/* When this flag is cleared, invoke all milters. When this
+/* flag is set, invoke only milters that want to receive
+/* rejected recipients; with Sendmail V8 Milters, {rcpt_mailer}
+/* is set to "error", {rcpt_host} is set to an enhanced status
+/* code, and {rcpt_addr} is set to descriptive text.
/* .PP
/* milter_data_event() reports a DATA event to the specified
/* milter instances, after sending the macros that were specified
diff --git a/postfix/src/smtpd/smtpd_milter.c b/postfix/src/smtpd/smtpd_milter.c
index b129f352a..2557b3dcc 100644
--- a/postfix/src/smtpd/smtpd_milter.c
+++ b/postfix/src/smtpd/smtpd_milter.c
@@ -189,6 +189,7 @@ const char *smtpd_milter_eval(const char *name, void *ptr)
if (state->recipient[0] == 0)
return ("");
if (state->milter_reject_text) {
+ /* 554 5.7.1