SHA256
1
0
forked from pool/postfix

Accepting request 57075 from home:computersalat:devel:mail

OBS-URL: https://build.opensuse.org/request/show/57075
OBS-URL: https://build.opensuse.org/package/show/server:mail/postfix?expand=0&rev=56
This commit is contained in:
Cristian Rodríguez 2011-01-07 18:21:49 +00:00 committed by Git OBS Bridge
parent acd06eca6f
commit 3ee76b1e4e
4 changed files with 40 additions and 5 deletions

View File

@ -1,3 +0,0 @@
version https://git-lfs.github.com/spec/v1
oid sha256:ea3b1b0344d250cdcdbd9b8ab58bca1a3c543d719aa7eec7a5d15890da6e48e8
size 2548661

3
postfix-2.7.2.tar.bz2 Normal file
View File

@ -0,0 +1,3 @@
version https://git-lfs.github.com/spec/v1
oid sha256:39be135564bd9d6d11b64bc9bf97b4da70abf14e9a8a0f97da5f8de3012a9617
size 2481850

View File

@ -1,3 +1,38 @@
-------------------------------------------------------------------
Tue Jan 4 12:14:06 UTC 2011 - chris@computersalat.de
- update to 2.7.2
* Bugfix (introduced Postfix 2.2): Postfix no longer appends
the system default CA certificates to the lists specified
with *_tls_CAfile or with *_tls_CApath. This prevents
third-party certificates from getting mail relay permission
with the permit_tls_all_clientcerts feature. Unfortunately
this may cause compatibility problems with configurations
that rely on certificate verification for other purposes.
To get the old behavior, specify "tls_append_default_CA =
yes". Files: tls/tls_certkey.c, tls/tls_misc.c,
global/mail_params.h. proto/postconf.proto, mantools/postlink.
* Compatibility with Postfix < 2.3: fix 20061207 was incomplete
(undoing the change to bounce instead of defer after
pipe-to-command delivery fails with a signal). Fix by Thomas
Arnett. File: global/pipe_command.c.
* Bugfix: the milter_header_checks parser provided only the
actions that change the message flow (reject, filter,
discard, redirect) but disabled the non-flow actions (warn,
replace, prepend, ignore, dunno, ok). File:
cleanup/cleanup_milter.c.
* Performance: fix for poor smtpd_proxy_filter TCP performance
over loopback (127.0.0.1) connections. Problem reported by
Mark Martinec. Files: smtpd/smtpd_proxy.c.
* Cleanup: don't apply reject_rhsbl_helo to non-domain forms
such as network addresses. This would cause false positives
with dbl.spamhaus.org. File: smtpd/smtpd_check.c.
* Bugfix: the "421" reply after Milter error was overruled
by Postfix 1.1 code that replied with "503" for RFC 2821
compliance. We now make an exception for "final" replies,
as permitted by RFC. Solution by Victor Duchovni. File:
smtpd/smtpd.c.
------------------------------------------------------------------- -------------------------------------------------------------------
Sat Dec 11 19:50:25 UTC 2010 - chris@computersalat.de Sat Dec 11 19:50:25 UTC 2010 - chris@computersalat.de

View File

@ -1,5 +1,5 @@
# #
# spec file for package postfix (Version 2.7.1) # spec file for package postfix (Version 2.7.2)
# #
# Copyright (c) 2010 SUSE LINUX Products GmbH, Nuernberg, Germany. # Copyright (c) 2010 SUSE LINUX Products GmbH, Nuernberg, Germany.
# #
@ -21,7 +21,7 @@
Name: postfix Name: postfix
Summary: A fast, secure, and flexible mailer Summary: A fast, secure, and flexible mailer
Version: 2.7.1 Version: 2.7.2
Release: 6 Release: 6
License: IBM Public License .. License: IBM Public License ..
Group: Productivity/Networking/Email/Servers Group: Productivity/Networking/Email/Servers