535d3a4dbc
- [sle16][postfix] postfix service failed to start due to "chmod: cannot access '/etc/postfix/virtual.lmdb': No such file or directory" (bsc#1243409)
Peter Varkoly2025-05-21 11:50:40 +00:00
9d789c3f7e
- [sle16][postfix] postfix service failed to start due to "chmod: cannot access '/etc/postfix/virtual.lmdb': No such file or directory" (bsc#1243409)
Peter Varkoly2025-05-21 11:50:40 +00:00
163007bd87
- move /var/spool/mail/ to separate package (bsc#1179574)
Peter Varkoly2025-05-20 18:03:29 +00:00
8fe26fec39
- move /var/spool/mail/ to separate package (bsc#1179574)
Peter Varkoly2025-05-20 18:03:29 +00:00
2f7b99fef6
Accepting request 1275464 from server:mail
Ana Guerrero2025-05-09 16:39:20 +00:00
d7973f2cf7
Accepting request 1275464 from server:mail
Ana Guerrero2025-05-09 16:39:20 +00:00
6ca790a281
- postfix incorrect logic for the master.cf handling for tls ports (bsc#1242822)
Peter Varkoly2025-05-08 08:09:18 +00:00
068f7ca613
- postfix incorrect logic for the master.cf handling for tls ports (bsc#1242822)
Peter Varkoly2025-05-08 08:09:18 +00:00
750bae3f21
Accepting request 1272118 from server:mail
Ana Guerrero2025-04-24 15:25:00 +00:00
021cb80dfb
Accepting request 1272118 from server:mail
Ana Guerrero2025-04-24 15:25:00 +00:00
cb2ffc2dfb
Accepting request 1272024 from home:adkorte:branches:server:mail
Peter Varkoly2025-04-23 09:37:35 +00:00
28d99e202c
- update to 3.10.2 * Bugfix (defect introduced: date 19991116): when appending a setting to a main.cf or master.cf file that did not end in a newline character, the "postconf -e" command did not add an extra newline character before appending the new setting, causing information to become garbled. * Bugfix (defect introduced: Postfix 2.3, date 20051222): the Dovecot auth client did not attempt to create a new connection after an I/O error on an existing connection. * Improved and corrected error messages when converting (host or service) information to (symbolic text, numerical text, or binary) form. * Documentation: updated link to Dovecot documentation.
Peter Varkoly2025-04-23 09:37:35 +00:00
a838307188
Accepting request 1269991 from server:mail
Ana Guerrero2025-04-18 14:14:14 +00:00
44d71b9523
Accepting request 1269991 from server:mail
Ana Guerrero2025-04-18 14:14:14 +00:00
d4029faef3
Accepting request 1269715 from home:gcomes.obs
Peter Varkoly2025-04-16 11:40:32 +00:00
a9ee33d6c4
Accepting request 1248481 from home:adkorte:branches:server:mail
Peter Varkoly2025-02-26 06:19:37 +00:00
573c71e7fe
- update to 3.10.1 * Bugfix (defect introduced: 20250210): a recent 'fix' for the default smtp_tls_dane_insecure_mx_policy setting resulted in unnecessary 'dnssec_probe' warnings, on systems that disable DNSSEC lookups (which is the default). - update to 3.10.0 * Internal protocol change: Postfix needs "postfix reload" (or "postfix stop" and "postfix start") after upgrade, because of a change in the delivery agent protocol. If this step is skipped, Postfix delivery agents will log a warning: unexpected attribute smtputf8 from xxx socket (expecting: sendopts) where xxx is the delivery agent service name. * Forward compatibility: Support for OpenSSL 3.5 post-quantum cryptography. To manage algorithm selection, OpenSSL introduces new TLS group syntax that Postfix will not attempt to imitate. Instead, Postfix now allows the tls_eecdh_auto_curves and tls_ffdhe_auto_groups parameter values to have an empty value. When both are set empty, the algorithm selection can be managed through OpenSSL configuration. For more, look for "Post-quantum" in the postconf(5) manpage. * Support for the RFC 8689 "TLS-Required: no" message header to request delivery of messages (such as TLSRPT summaries) even if the preferred TLS security policy cannot be enforced. This limits the Postfix SMTP client to "smtp_tls_security_level = may" which does not authenticate server certificates and which allows falling back to plaintext. * Support for the REQUIRETLS SMTP service extension will evolve in Postfix 3.11. * Support for the TLSRPT protocol (defined in RFC 8460). With this, a domain can publish a policy in DNS that requests daily summary reports for successful and failed SMTP-over-TLS connections to that domain's MX hosts. This supports both DANE (built-in) and MTA-STS (via an smtp_tls_policy_maps plugin). The implementation uses a TLSRPT library and reporting infrastructure that are maintained by sys4. For details, see TLSRPT_README. * Privacy: With "smtpd_hide_client_session = yes", the Postfix SMTP server generates a Received: header without client session info. This setting may be used with the MUA submission services (port 465 and 587). * Support for RFC 2047 encoding of non-ASCII "full name" information in Postfix-generated From: message headers. Encoding non-ASCII full names can avoid the need to use SMTPUTF8, and therefore can avoid incompatibility with sites that do not support SMTPUTF8. See the full_name_encoding_charset parameter description for details. * Database performance: When mysql: or pgsql: configuration specifies a single host, assume that it is a load balancer and reconnect immediately after a single failure, instead of failing all requests for 60s. * The Postfix Milter implementation now logs the reason for a 'quarantine' action, instead of "milter triggers HOLD action". * The SMTP server now logs the queue ID (or "NOQUEUE") when a connection ends abnormally (timeout, lost connection, or too many errors), and the cleanup server now logs "queueid: canceled" when a message transaction is started but not completed. These changes simplify logfile analysis. * Dovecot SASL client logging for "Invalid authentication mechanism" now includes the name of that mechanism. * Postfix SMTP server 'reject' logging now shows the sasl_method, sasl_username, and sasl_sender if available. - update to 3.10.1 * Bugfix (defect introduced: 20250210): a recent 'fix' for the default smtp_tls_dane_insecure_mx_policy setting resulted in unnecessary 'dnssec_probe' warnings, on systems that disable DNSSEC lookups (which is the default). - update to 3.10.0 * Internal protocol change: Postfix needs "postfix reload" (or "postfix stop" and "postfix start") after upgrade, because of a change in the delivery agent protocol. If this step is skipped, Postfix delivery agents will log a warning: unexpected attribute smtputf8 from xxx socket (expecting: sendopts) where xxx is the delivery agent service name. * Forward compatibility: Support for OpenSSL 3.5 post-quantum cryptography. To manage algorithm selection, OpenSSL introduces new TLS group syntax that Postfix will not attempt to imitate. Instead, Postfix now allows the tls_eecdh_auto_curves and tls_ffdhe_auto_groups parameter values to have an empty value. When both are set empty, the algorithm selection can be managed through OpenSSL configuration. For more, look for "Post-quantum" in the postconf(5) manpage. * Support for the RFC 8689 "TLS-Required: no" message header to request delivery of messages (such as TLSRPT summaries) even if the preferred TLS security policy cannot be enforced. This limits the Postfix SMTP client to "smtp_tls_security_level = may" which does not authenticate server certificates and which allows falling back to plaintext. * Support for the REQUIRETLS SMTP service extension will evolve in Postfix 3.11. * Support for the TLSRPT protocol (defined in RFC 8460). With this, a domain can publish a policy in DNS that requests daily summary reports for successful and failed SMTP-over-TLS connections to that domain's MX hosts. This supports both DANE (built-in) and MTA-STS (via an smtp_tls_policy_maps plugin). The implementation uses a TLSRPT library and reporting infrastructure that are maintained by sys4. For details, see TLSRPT_README. * Privacy: With "smtpd_hide_client_session = yes", the Postfix SMTP server generates a Received: header without client session info. This setting may be used with the MUA submission services (port 465 and 587). * Support for RFC 2047 encoding of non-ASCII "full name" information in Postfix-generated From: message headers. Encoding non-ASCII full names can avoid the need to use SMTPUTF8, and therefore can avoid incompatibility with sites that do not support SMTPUTF8. See the full_name_encoding_charset parameter description for details. * Database performance: When mysql: or pgsql: configuration specifies a single host, assume that it is a load balancer and reconnect immediately after a single failure, instead of failing all requests for 60s. * The Postfix Milter implementation now logs the reason for a 'quarantine' action, instead of "milter triggers HOLD action". * The SMTP server now logs the queue ID (or "NOQUEUE") when a connection ends abnormally (timeout, lost connection, or too many errors), and the cleanup server now logs "queueid: canceled" when a message transaction is started but not completed. These changes simplify logfile analysis. * Dovecot SASL client logging for "Invalid authentication mechanism" now includes the name of that mechanism. * Postfix SMTP server 'reject' logging now shows the sasl_method, sasl_username, and sasl_sender if available.
Peter Varkoly2025-02-26 06:19:37 +00:00
d0003b9ea2
Accepting request 1232867 from server:mail
Ana Guerrero2024-12-22 16:58:59 +00:00
bed1de1905
Accepting request 1232867 from server:mail
Ana Guerrero2024-12-22 16:58:59 +00:00
1094e27529
Accepting request 1228585 from home:adkorte:branches:server:mail
Peter Varkoly2024-12-20 16:01:24 +00:00
def8724640
- update to 3.9.1 * The mail_version configuration parameter did not have a three-number value (3.9 instead of 3.9.0; it still had the two-number version from the development releases postfix-3.9-yyyymmdd). This broke pathnames derived from the mail_version value, such as shlib_directory. * Bugfix (defect introduced: Postfix 2.9, date 20111218): with "smtpd_sasl_auth_enable = no", the permit_sasl_authenticated feature ignored information that was received with the XCLIENT LOGIN command, so that the client was treated as unauthenticated. This was fixed by removing an unnecessary test. * Bugfix (defect introduced: postfix 3.0): the default master.cf syslog_name setting for the relay service did not preserve multi-instance information, which complicated logfile analysis. * Bugfix (defect introduced: Postfix 2.3, date 20051222): file descriptor leak after failure to connect to a Dovecot auth server. The impact is limited because Dovecot auth failures are rare, there are limits on the number of retries (one), on the number of errors per SMTP session (smtpd_hard_error_limit), on the number of sessions per SMTP server process (max_use), and on the number of file handles per process (managed with sysctl). * Bugfix (defect introduced: Postfix 3.4, date 20190121): the postsuper command failed with "open logfile '/path/to/file': Permission denied" when the maillog_file parameter specified a filename and Postfix was not running. This was fixed by opening the maillog_file before dropping root privileges. * Bugfix (defect introduced Postfix 3.0). No autodetection of UTF8 text when missing message headers were automatically added by Postfix (for example, a From: header with UTF8 full name information from the password file). This caused Postfix to send UTF8 in message headers without using the SMTPUTF8 protocol. - update to 3.9.1 * The mail_version configuration parameter did not have a three-number value (3.9 instead of 3.9.0; it still had the two-number version from the development releases postfix-3.9-yyyymmdd). This broke pathnames derived from the mail_version value, such as shlib_directory. * Bugfix (defect introduced: Postfix 2.9, date 20111218): with "smtpd_sasl_auth_enable = no", the permit_sasl_authenticated feature ignored information that was received with the XCLIENT LOGIN command, so that the client was treated as unauthenticated. This was fixed by removing an unnecessary test. * Bugfix (defect introduced: postfix 3.0): the default master.cf syslog_name setting for the relay service did not preserve multi-instance information, which complicated logfile analysis. * Bugfix (defect introduced: Postfix 2.3, date 20051222): file descriptor leak after failure to connect to a Dovecot auth server. The impact is limited because Dovecot auth failures are rare, there are limits on the number of retries (one), on the number of errors per SMTP session (smtpd_hard_error_limit), on the number of sessions per SMTP server process (max_use), and on the number of file handles per process (managed with sysctl). * Bugfix (defect introduced: Postfix 3.4, date 20190121): the postsuper command failed with "open logfile '/path/to/file': Permission denied" when the maillog_file parameter specified a filename and Postfix was not running. This was fixed by opening the maillog_file before dropping root privileges. * Bugfix (defect introduced Postfix 3.0). No autodetection of UTF8 text when missing message headers were automatically added by Postfix (for example, a From: header with UTF8 full name information from the password file). This caused Postfix to send UTF8 in message headers without using the SMTPUTF8 protocol.
Peter Varkoly2024-12-20 16:01:24 +00:00
b8f492ebb1
Accepting request 1202891 from server:mail
Ana Guerrero2024-09-25 19:52:35 +00:00
20d0bdbb40
Accepting request 1202891 from server:mail
Ana Guerrero2024-09-25 19:52:35 +00:00
a5e9b3b248
- postfix gives warnings about deprecated parameters (bsc#1225397)
Peter Varkoly2024-08-01 08:38:17 +00:00
007aee8fe4
- postfix gives warnings about deprecated parameters (bsc#1225397)
Peter Varkoly2024-08-01 08:38:17 +00:00
9c15eb6d35
Accepting request 1181563 from server:mail
Ana Guerrero2024-06-19 14:36:49 +00:00
5e44cd1a28
Accepting request 1181563 from server:mail
Ana Guerrero2024-06-19 14:36:49 +00:00
febb402b3a
Accepting request 1181561 from home:computersalat:devel:mail
Christian Wittmer
2024-06-18 18:57:02 +00:00
022da9e4a8
Fix for Invalid cross-device link (etc/localtime)
Christian Wittmer
2024-06-18 18:57:02 +00:00
4afb11d794
Accepting request 1180049 from server:mail
Ana Guerrero2024-06-12 13:37:44 +00:00
ab10e397c0
Accepting request 1180049 from server:mail
Ana Guerrero2024-06-12 13:37:44 +00:00
8284700c55
Accepting request 1180009 from home:adamm:branches:server:mail
Peter Varkoly2024-06-11 16:38:27 +00:00
f8d0931c2c
Accepting request 1180009 from home:adamm:branches:server:mail
Peter Varkoly2024-06-11 16:38:27 +00:00
2733e7aa8d
Accepting request 1175398 from server:mail
Ana Guerrero2024-05-21 16:33:12 +00:00
f99e41ccac
Accepting request 1175398 from server:mail
Ana Guerrero2024-05-21 16:33:12 +00:00
5e488a53e7
Accepting request 1175397 from home:computersalat:devel:mail
Christian Wittmer
2024-05-20 21:14:13 +00:00
ea53e42589
Accepting request 1175397 from home:computersalat:devel:mail
Christian Wittmer
2024-05-20 21:14:13 +00:00
bb0abca255
Accepting request 1174920 from server:mail
Ana Guerrero2024-05-20 16:09:43 +00:00
bb1494b9b1
Accepting request 1174920 from server:mail
Ana Guerrero2024-05-20 16:09:43 +00:00
9b6215e4ef
- config.postfix needs updating (bsc#1224207) * chkconfig -> systemctl * Link Cyrus lmtp only if this exsists * /usr/lib64/sasl2 does not need to exist * Fetch timezone via readlink from /etc/localtime
Peter Varkoly2024-05-17 15:50:58 +00:00
0c726e5bd8
- config.postfix needs updating (bsc#1224207) * chkconfig -> systemctl * Link Cyrus lmtp only if this exsists * /usr/lib64/sasl2 does not need to exist * Fetch timezone via readlink from /etc/localtime
Peter Varkoly2024-05-17 15:50:58 +00:00
35b20b9f98
Accepting request 1173989 from server:mail
Ana Guerrero2024-05-16 15:12:37 +00:00
f86eea3b6a
Accepting request 1173989 from server:mail
Ana Guerrero2024-05-16 15:12:37 +00:00
a8fbf74395
Accepting request 1156371 from home:adkorte:branches:server:mail
Dirk Stoecker2024-05-14 13:19:15 +00:00
113e4ff966
Accepting request 1156371 from home:adkorte:branches:server:mail
Dirk Stoecker2024-05-14 13:19:15 +00:00
d1c4229a58
Accepting request 1166904 from server:mail
Ana Guerrero2024-04-12 15:33:52 +00:00
598d743825
Accepting request 1166904 from server:mail
Ana Guerrero2024-04-12 15:33:52 +00:00
d4992bd2e7
Accepting request 1165385 from home:crameleon:branches:server:mail
Dirk Stoecker2024-04-11 15:37:21 +00:00
b15c7168cb
Accepting request 1165385 from home:crameleon:branches:server:mail
Dirk Stoecker2024-04-11 15:37:21 +00:00