From 47ae1804cce8f6f96975788bdba617199868c9da Mon Sep 17 00:00:00 2001
From: Wietse Z Venema
A policy example looks like this:
+A policy for domain example.com could look like this:
-@@ -49,11 +49,8 @@ _smtp._tls.example.com. IN TXT "v=TLSRPTv1; rua=mailto:smtp-tls-report@example.c
Translation: email sending systems are requested to generate daily -summaries of successful and failed SMTP over TLS connections to domain -example.com, and to report those summaries via email to the -specified address. Instead of mailto:, a policy may specify an -https: destination.
+Instead of mailto:, a policy may specify an https: +destination.
The diagram below shows how Postfix TLS handshake success and failure events are collected and processed into daily summary @@ -102,9 +99,9 @@ fetch, and report TLSRPT information, are implemented and maintained by sys4 at https://github.com/sys4/libtlsrpt and https://github.com/sys4/tlsrpt-reporter, respectively.
-The Postfix implementation supports domains with DANE (Postfix -built-in) and MTA-STS (through an smtp_tls_policy_maps plug-in). -
+The Postfix implementation supports TLSRPT or domains with DANE +(Postfix built-in) and MTA-STS (through an +smtp_tls_policy_maps plug-in).
The Postfix smtp(8) client process implements the SMTP client engine. With "smtp_tls_connection_reuse = no", the smtp(8) client @@ -335,8 +332,8 @@ generator's sender address):
Postfix supports MTA-STS though an smtp_tls_policy_maps policy plugin, which replies with a TLS security level and name=value attributes with certificate matching requirements. Postfix 3.10 and -later accept additional name=value attributes that are needed for -TLSRPT.
+later extend the policy plugin response with additional name=value +attributes that are needed for TLSRPT.Examples of smtp_tls_policy_maps plugins with MTA-STS support are:
@@ -357,7 +354,8 @@ that Postfix needs for TLSRPT support (as of February 2025). This is enabled by setting a tlsrpt boolean in a plugin configuration file. This setting is safe with Postfix 3.10 and later, even if Postfix TLSRPT support is disabled (at build time -or at run time). +or at run time). Postfix versions 3.9 and earlier will report a +policy error with "invalid attribute name". The examples in the text below apply to this MTA-STS policy example
given in policy_type=type Specify sts or no-policy-found. Specify sts or no-policy-found. Example: policy_type=sts policy_domain=name The domain that the MTA-STS policy applies to. Example: policy_domain=example.com
Example: policy_failure=sts-webpki-invalid
-policy_ttl=time
+policy_ttl=time (deprecated)
This attribute is deprecated. The time value is not used, and support for this attribute will eventually be removed from the @@ -438,9 +437,9 @@ code.
Postfix 3.10 and later will accept these additional -attributes in an MTA-STS response even if TLSRPT support is disabled -(at build time or at run time). With TLSRPT support turned off, -Postfix may still use the policy_failure +attributes in an MTA-STS response even if Postfix TLSRPT support +is disabled (at build time or at run time). With Postfix TLSRPT +support turned off, Postfix may still use the policy_failure attribute, and will ignore the attributes that are used only for TLSRPT.
diff --git a/postfix/html/postconf.5.html b/postfix/html/postconf.5.html index f61e58ed4..91e4ca42d 100644 --- a/postfix/html/postconf.5.html +++ b/postfix/html/postconf.5.html @@ -14049,8 +14049,9 @@ Postfix 2.3 and later use smtp_tlOptional lookup tables with the Postfix SMTP client TLS security policy by next-hop destination; when a non-empty value is specified, this overrides the obsolete smtp_tls_per_site parameter. See -TLS_README for a more detailed discussion of TLS security levels. -
+TLS_README for a more detailed discussion of TLS security levels, +and see TLSRPT_README for additional configuration that may be +needed for MTA-STS plugins.Specify zero or more "type:name" lookup tables, separated by @@ -14856,6 +14857,9 @@ summaries of successful and failed SMTP over TLS connections to their MX servers. This feature requires that Postfix is built with a TLSRPT supporting library.
+See TLSRPT_README for configuration examples and additional +requirements for MTA-STS smtp_tls_policy_maps plugins.
+This feature is available in Postfix ≥ 3.10.
@@ -14871,6 +14875,9 @@ sessions. Set this to "no" to log the TLSRPT status of all TLS handshakes, for example to troubleshoot Postfix TLSRPT support. +Note: if an SMTP over TLS connection is reused, there is no +second etc. TLS handshake to report.
+This feature is available in Postfix ≥ 3.10.
@@ -14884,6 +14891,9 @@ by a local TLSRPT reporting service. This parameter must specify a pathname (absolute, or relative to $queue_directory) when "smtp_tlsrpt_enable = yes". +See TLSRPT_README for configuration examples and additional +requirements for MTA-STS smtp_tls_policy_maps plugins.
+This feature is available in Postfix ≥ 3.10.
diff --git a/postfix/man/man5/postconf.5 b/postfix/man/man5/postconf.5 index 14cbf0155..c9d8793ba 100644 --- a/postfix/man/man5/postconf.5 +++ b/postfix/man/man5/postconf.5 @@ -9168,7 +9168,9 @@ Postfix 2.3 and later use smtp_tls_policy_maps instead. Optional lookup tables with the Postfix SMTP client TLS security policy by next\-hop destination; when a non\-empty value is specified, this overrides the obsolete smtp_tls_per_site parameter. See -TLS_README for a more detailed discussion of TLS security levels. +TLS_README for a more detailed discussion of TLS security levels, +and see TLSRPT_README for additional configuration that may be +needed for MTA\-STS plugins. .PP Specify zero or more "type:name" lookup tables, separated by whitespace or comma. Tables will be searched in the specified order @@ -9911,6 +9913,9 @@ summaries of successful and failed SMTP over TLS connections to their MX servers. This feature requires that Postfix is built with a TLSRPT supporting library. .PP +See TLSRPT_README for configuration examples and additional +requirements for MTA\-STS smtp_tls_policy_maps plugins. +.PP This feature is available in Postfix >= 3.10. .SH smtp_tlsrpt_skip_reused_handshakes (default: yes) Do not report the TLSRPT status for TLS protocol handshakes @@ -9919,6 +9924,9 @@ information to report). Report the TLSRPT status only for "new" TLS sessions. Set this to "no" to log the TLSRPT status of all TLS handshakes, for example to troubleshoot Postfix TLSRPT support. .PP +Note: if an SMTP over TLS connection is reused, there is no +second etc. TLS handshake to report. +.PP This feature is available in Postfix >= 3.10. .SH smtp_tlsrpt_socket_name (default: empty) The pathname of a UNIX\-domain datagram socket that is managed @@ -9926,6 +9934,9 @@ by a local TLSRPT reporting service. This parameter must specify a pathname (absolute, or relative to $queue_directory) when "smtp_tlsrpt_enable = yes". .PP +See TLSRPT_README for configuration examples and additional +requirements for MTA\-STS smtp_tls_policy_maps plugins. +.PP This feature is available in Postfix >= 3.10. .SH smtp_use_tls (default: no) Opportunistic mode: use TLS when a remote SMTP server announces diff --git a/postfix/mantools/make-relnotes b/postfix/mantools/make-relnotes index f5d26f37b..75f1be3a7 100755 --- a/postfix/mantools/make-relnotes +++ b/postfix/mantools/make-relnotes @@ -5,15 +5,14 @@ # # Input format: the leader text is copied verbatim; each section # starts with "Incompatible changes with snapshot YYYYMMDD" or "Major -# changes with snapshot YYYYMMDD"; each paragraph starts with [class, -# class] where a class specifies one or more categories that the -# change should be listed under. Adding class info is the only manual -# processing needed to go from a RELEASE_NOTES file to the transformed -# representation. +# changes with snapshot YYYYMMDD" underlined with "=======..."; each +# paragraph starts with [class, class] where a class specifies one or +# more categories that the change should be listed under. Adding class +# info is the only manual processing needed to go from a RELEASE_NOTES +# file to the transformed representation. # -# Output format: each category is printed with a little header and -# each paragraph is tagged with [Incompat yyyymmdd] or with [Feature -# yyyymmdd]. +# Output format: each category is printed with a little header and each +# paragraph is tagged with [Incompat yyyymmdd] or with [Feature yyyymmdd]. %leader = (); %body = (); $append_to = \%leader; diff --git a/postfix/proto/TLSRPT_README.html b/postfix/proto/TLSRPT_README.html index 7468b6fb1..9d4812dca 100644 --- a/postfix/proto/TLSRPT_README.html +++ b/postfix/proto/TLSRPT_README.html @@ -41,7 +41,7 @@ summary reports for successful and failed SMTP over TLS connections to that domain's MX hosts. Support for TLSRPT was added in Postfix 3.10. -A policy example looks like this:
+A policy for domain example.com could look like this:
-@@ -49,11 +49,8 @@ _smtp._tls.example.com. IN TXT "v=TLSRPTv1; rua=mailto:smtp-tls-report@example.c
Translation: email sending systems are requested to generate daily -summaries of successful and failed SMTP over TLS connections to domain -example.com, and to report those summaries via email to the -specified address. Instead of mailto:, a policy may specify an -https: destination.
+Instead of mailto:, a policy may specify an https: +destination.
The diagram below shows how Postfix TLS handshake success and failure events are collected and processed into daily summary @@ -102,9 +99,9 @@ fetch, and report TLSRPT information, are implemented and maintained by sys4 at https://github.com/sys4/libtlsrpt and https://github.com/sys4/tlsrpt-reporter, respectively.
-The Postfix implementation supports domains with DANE (Postfix -built-in) and MTA-STS (through an smtp_tls_policy_maps plug-in). -
+The Postfix implementation supports TLSRPT or domains with DANE +(Postfix built-in) and MTA-STS (through an +smtp_tls_policy_maps plug-in).
The Postfix smtp(8) client process implements the SMTP client engine. With "smtp_tls_connection_reuse = no", the smtp(8) client @@ -335,8 +332,8 @@ generator's sender address):
Postfix supports MTA-STS though an smtp_tls_policy_maps policy plugin, which replies with a TLS security level and name=value attributes with certificate matching requirements. Postfix 3.10 and -later accept additional name=value attributes that are needed for -TLSRPT.
+later extend the policy plugin response with additional name=value +attributes that are needed for TLSRPT.Examples of smtp_tls_policy_maps plugins with MTA-STS support are:
@@ -357,7 +354,8 @@ that Postfix needs for TLSRPT support (as of February 2025). This is enabled by setting a tlsrpt boolean in a plugin configuration file. This setting is safe with Postfix 3.10 and later, even if Postfix TLSRPT support is disabled (at build time -or at run time). +or at run time). Postfix versions 3.9 and earlier will report a +policy error with "invalid attribute name". The examples in the text below apply to this MTA-STS policy example
given in policy_type=type Specify sts or no-policy-found.
Specify sts or no-policy-found.
+ +Example: policy_type=sts
policy_domain=name
The domain that the MTA-STS policy applies to.
-Example: policy_domain=example.com
Example: policy_failure=sts-webpki-invalid
-policy_ttl=time
+policy_ttl=time (deprecated)
This attribute is deprecated. The time value is not used, and support for this attribute will eventually be removed from the @@ -438,9 +437,9 @@ code.
Postfix 3.10 and later will accept these additional -attributes in an MTA-STS response even if TLSRPT support is disabled -(at build time or at run time). With TLSRPT support turned off, -Postfix may still use the policy_failure +attributes in an MTA-STS response even if Postfix TLSRPT support +is disabled (at build time or at run time). With Postfix TLSRPT +support turned off, Postfix may still use the policy_failure attribute, and will ignore the attributes that are used only for TLSRPT.
diff --git a/postfix/proto/postconf.proto b/postfix/proto/postconf.proto index 25eef4da9..0a7b4702d 100644 --- a/postfix/proto/postconf.proto +++ b/postfix/proto/postconf.proto @@ -11532,8 +11532,9 @@ configuration parameter. See there for details.Optional lookup tables with the Postfix SMTP client TLS security policy by next-hop destination; when a non-empty value is specified, this overrides the obsolete smtp_tls_per_site parameter. See -TLS_README for a more detailed discussion of TLS security levels. -
+TLS_README for a more detailed discussion of TLS security levels, +and see TLSRPT_README for additional configuration that may be +needed for MTA-STS plugins.Specify zero or more "type:name" lookup tables, separated by @@ -19406,6 +19407,9 @@ summaries of successful and failed SMTP over TLS connections to their MX servers. This feature requires that Postfix is built with a TLSRPT supporting library.
+See TLSRPT_README for configuration examples and additional +requirements for MTA-STS smtp_tls_policy_maps plugins.
+This feature is available in Postfix ≥ 3.10.
%PARAM smtp_tlsrpt_socket_name @@ -19415,6 +19419,9 @@ by a local TLSRPT reporting service. This parameter must specify a pathname (absolute, or relative to $queue_directory) when "smtp_tlsrpt_enable = yes". +See TLSRPT_README for configuration examples and additional +requirements for MTA-STS smtp_tls_policy_maps plugins.
+This feature is available in Postfix ≥ 3.10.
%PARAM smtp_tlsrpt_skip_reused_handshakes yes @@ -19426,6 +19433,9 @@ sessions. Set this to "no" to log the TLSRPT status of all TLS handshakes, for example to troubleshoot Postfix TLSRPT support. +Note: if an SMTP over TLS connection is reused, there is no +second etc. TLS handshake to report.
+This feature is available in Postfix ≥ 3.10.
%PARAM full_name_encoding_charset utf-8 diff --git a/postfix/proto/stop b/postfix/proto/stop index a8b5522a5..d3c8a5cd8 100644 --- a/postfix/proto/stop +++ b/postfix/proto/stop @@ -1665,3 +1665,8 @@ RequireTLS requiretls sendopts tz +GID +SIGKILL +URI +URIs +bugfix diff --git a/postfix/src/global/mail_version.h b/postfix/src/global/mail_version.h index 27e83993c..f55824292 100644 --- a/postfix/src/global/mail_version.h +++ b/postfix/src/global/mail_version.h @@ -20,7 +20,7 @@ * Patches change both the patchlevel and the release date. Snapshots have no * patchlevel; they change the release date only. */ -#define MAIL_RELEASE_DATE "20250205" +#define MAIL_RELEASE_DATE "20250206" #define MAIL_VERSION_NUMBER "3.10" #ifdef SNAPSHOT -- 2.47.3