mirror of
https://github.com/vdukhovni/postfix
synced 2025-08-30 13:48:06 +00:00
postfix-2.3-20050330
This commit is contained in:
committed by
Viktor Dukhovni
parent
c04936c1b0
commit
2bc17f05a7
@@ -10567,6 +10567,13 @@ Apologies for any names omitted.
|
|||||||
tls/tls_mgr.h, tls/tls_mgr.c, tls/tls_client.c, tls/tls.h,
|
tls/tls_mgr.h, tls/tls_mgr.c, tls/tls_client.c, tls/tls.h,
|
||||||
smtp/smtp_proto.c.
|
smtp/smtp_proto.c.
|
||||||
|
|
||||||
|
20050330
|
||||||
|
|
||||||
|
Bugfix: in some compilation environments the SMTP and LMTP
|
||||||
|
clients could ignore enhanced status codes in server replies.
|
||||||
|
Bug introduced 20050329 while polishing working code. Files:
|
||||||
|
smtp/smtp_chat.c, lmtp/lmtp_chat.c.
|
||||||
|
|
||||||
Open problems:
|
Open problems:
|
||||||
|
|
||||||
Med: disable header address rewriting after XCLIENT?
|
Med: disable header address rewriting after XCLIENT?
|
||||||
|
@@ -159,8 +159,9 @@ domains that often appear in forged email.
|
|||||||
bigfoot.com reject_unverified_sender
|
bigfoot.com reject_unverified_sender
|
||||||
... etcetera ...
|
... etcetera ...
|
||||||
|
|
||||||
A list of frequently forged MAIL FROM domains can be found at http://
|
At some point in cyberspace/time, a list of frequently forged MAIL FROM domains
|
||||||
www.monkeys.com/anti-spam/filtering/sender-domain-validate.in.
|
could be found at http://www.monkeys.com/anti-spam/filtering/sender-domain-
|
||||||
|
validate.in.
|
||||||
|
|
||||||
NOTE: One of the first things you might want to do is to turn on sender address
|
NOTE: One of the first things you might want to do is to turn on sender address
|
||||||
verification for all your own domains.
|
verification for all your own domains.
|
||||||
|
@@ -1,4 +1,4 @@
|
|||||||
# VIRTUAL(5) VIRTUAL(5)
|
# VIRTUAL(5) VIRTUAL(5)
|
||||||
#
|
#
|
||||||
# NAME
|
# NAME
|
||||||
# virtual - Postfix virtual alias table format
|
# virtual - Postfix virtual alias table format
|
||||||
@@ -11,10 +11,12 @@
|
|||||||
# postmap -q - /etc/postfix/virtual <inputfile
|
# postmap -q - /etc/postfix/virtual <inputfile
|
||||||
#
|
#
|
||||||
# DESCRIPTION
|
# DESCRIPTION
|
||||||
# The optional virtual(5) alias table specifies address
|
# The optional virtual(5) alias table rewrites recipient
|
||||||
# aliasing for arbitrary local or non-local recipient
|
# addresses for all local, virtual and remote mail destina-
|
||||||
# addresses. Virtual aliasing is recursive, and is done by
|
# tions. This is unlike the aliases(5) table which is used
|
||||||
# the Postfix cleanup(8) daemon.
|
# only for local(8) delivery. Virtual aliasing is recur-
|
||||||
|
# sive, and is implemented by the Postfix cleanup(8) daemon
|
||||||
|
# before mail is queued.
|
||||||
#
|
#
|
||||||
# The main applications of virtual aliasing are:
|
# The main applications of virtual aliasing are:
|
||||||
#
|
#
|
||||||
@@ -142,8 +144,8 @@
|
|||||||
# virtual_alias_maps = hash:/etc/postfix/virtual
|
# virtual_alias_maps = hash:/etc/postfix/virtual
|
||||||
#
|
#
|
||||||
# Note: some systems use dbm databases instead of hash.
|
# Note: some systems use dbm databases instead of hash.
|
||||||
# See the output from "postconf -m" for available
|
# See the output from "postconf -m" for available data-
|
||||||
# database types.
|
# base types.
|
||||||
#
|
#
|
||||||
# /etc/postfix/virtual:
|
# /etc/postfix/virtual:
|
||||||
# virtual-alias.domain anything (right-hand content does not matter)
|
# virtual-alias.domain anything (right-hand content does not matter)
|
||||||
@@ -182,8 +184,8 @@
|
|||||||
# constituent parts, nor is user+foo broken up into user and
|
# constituent parts, nor is user+foo broken up into user and
|
||||||
# foo.
|
# foo.
|
||||||
#
|
#
|
||||||
# Patterns are applied in the order as specified in the
|
# Patterns are applied in the order as specified in the ta-
|
||||||
# table, until a pattern is found that matches the search
|
# ble, until a pattern is found that matches the search
|
||||||
# string.
|
# string.
|
||||||
#
|
#
|
||||||
# Results are the same as with indexed file lookups, with
|
# Results are the same as with indexed file lookups, with
|
||||||
@@ -193,9 +195,9 @@
|
|||||||
# TCP-BASED TABLES
|
# TCP-BASED TABLES
|
||||||
# This section describes how the table lookups change when
|
# This section describes how the table lookups change when
|
||||||
# lookups are directed to a TCP-based server. For a descrip-
|
# lookups are directed to a TCP-based server. For a descrip-
|
||||||
# tion of the TCP client/server lookup protocol, see
|
# tion of the TCP client/server lookup protocol, see tcp_ta-
|
||||||
# tcp_table(5). This feature is not available up to and
|
# ble(5). This feature is not available up to and including
|
||||||
# including Postfix version 2.2.
|
# Postfix version 2.2.
|
||||||
#
|
#
|
||||||
# Each lookup operation uses the entire address once. Thus,
|
# Each lookup operation uses the entire address once. Thus,
|
||||||
# user@domain mail addresses are not broken up into their
|
# user@domain mail addresses are not broken up into their
|
||||||
@@ -274,4 +276,4 @@
|
|||||||
# P.O. Box 704
|
# P.O. Box 704
|
||||||
# Yorktown Heights, NY 10598, USA
|
# Yorktown Heights, NY 10598, USA
|
||||||
#
|
#
|
||||||
# VIRTUAL(5)
|
# VIRTUAL(5)
|
||||||
|
@@ -274,9 +274,9 @@ specific domains that often appear in forged email. </p>
|
|||||||
</pre>
|
</pre>
|
||||||
</blockquote>
|
</blockquote>
|
||||||
|
|
||||||
<p> A list of frequently forged MAIL FROM domains can be found at
|
<p> At some point in cyberspace/time, a list of frequently forged
|
||||||
<a href="http://www.monkeys.com/anti-spam/filtering/sender-domain-validate.in">http://www.monkeys.com/anti-spam/filtering/sender-domain-validate.in</a>.
|
MAIL FROM domains could be found at
|
||||||
</p>
|
<a href="http://www.monkeys.com/anti-spam/filtering/sender-domain-validate.in">http://www.monkeys.com/anti-spam/filtering/sender-domain-validate.in</a>. </p>
|
||||||
|
|
||||||
<p> NOTE: One of the first things you might want to do is to turn
|
<p> NOTE: One of the first things you might want to do is to turn
|
||||||
on sender address verification for all your own domains. </p>
|
on sender address verification for all your own domains. </p>
|
||||||
|
@@ -17,10 +17,12 @@ VIRTUAL(5) VIRTUAL(5)
|
|||||||
<b>postmap -q - /etc/postfix/virtual</b> <<i>inputfile</i>
|
<b>postmap -q - /etc/postfix/virtual</b> <<i>inputfile</i>
|
||||||
|
|
||||||
<b>DESCRIPTION</b>
|
<b>DESCRIPTION</b>
|
||||||
The optional <a href="virtual.5.html"><b>virtual</b>(5)</a> alias table specifies address
|
The optional <a href="virtual.5.html"><b>virtual</b>(5)</a> alias table rewrites recipient
|
||||||
aliasing for arbitrary local or non-local recipient
|
addresses for all local, virtual and remote mail destina-
|
||||||
addresses. Virtual aliasing is recursive, and is done by
|
tions. This is unlike the <a href="aliases.5.html"><b>aliases</b>(5)</a> table which is used
|
||||||
the Postfix <a href="cleanup.8.html"><b>cleanup</b>(8)</a> daemon.
|
only for <a href="local.8.html"><b>local</b>(8)</a> delivery. Virtual aliasing is recur-
|
||||||
|
sive, and is implemented by the Postfix <a href="cleanup.8.html"><b>cleanup</b>(8)</a> daemon
|
||||||
|
before mail is queued.
|
||||||
|
|
||||||
The main applications of virtual aliasing are:
|
The main applications of virtual aliasing are:
|
||||||
|
|
||||||
|
@@ -16,9 +16,12 @@ Postfix virtual alias table format
|
|||||||
.SH DESCRIPTION
|
.SH DESCRIPTION
|
||||||
.ad
|
.ad
|
||||||
.fi
|
.fi
|
||||||
The optional \fBvirtual\fR(5) alias table specifies address aliasing
|
The optional \fBvirtual\fR(5) alias table rewrites recipient
|
||||||
for arbitrary local or non-local recipient addresses. Virtual aliasing
|
addresses for all local, virtual and remote mail destinations.
|
||||||
is recursive, and is done by the Postfix \fBcleanup\fR(8) daemon.
|
This is unlike the \fBaliases\fR(5) table which is used
|
||||||
|
only for \fBlocal\fR(8) delivery. Virtual aliasing is
|
||||||
|
recursive, and is implemented by the Postfix \fBcleanup\fR(8)
|
||||||
|
daemon before mail is queued.
|
||||||
|
|
||||||
The main applications of virtual aliasing are:
|
The main applications of virtual aliasing are:
|
||||||
.IP \(bu
|
.IP \(bu
|
||||||
|
@@ -274,9 +274,9 @@ specific domains that often appear in forged email. </p>
|
|||||||
</pre>
|
</pre>
|
||||||
</blockquote>
|
</blockquote>
|
||||||
|
|
||||||
<p> A list of frequently forged MAIL FROM domains can be found at
|
<p> At some point in cyberspace/time, a list of frequently forged
|
||||||
http://www.monkeys.com/anti-spam/filtering/sender-domain-validate.in.
|
MAIL FROM domains could be found at
|
||||||
</p>
|
http://www.monkeys.com/anti-spam/filtering/sender-domain-validate.in. </p>
|
||||||
|
|
||||||
<p> NOTE: One of the first things you might want to do is to turn
|
<p> NOTE: One of the first things you might want to do is to turn
|
||||||
on sender address verification for all your own domains. </p>
|
on sender address verification for all your own domains. </p>
|
||||||
|
@@ -10,9 +10,12 @@
|
|||||||
#
|
#
|
||||||
# \fBpostmap -q - /etc/postfix/virtual <\fIinputfile\fR
|
# \fBpostmap -q - /etc/postfix/virtual <\fIinputfile\fR
|
||||||
# DESCRIPTION
|
# DESCRIPTION
|
||||||
# The optional \fBvirtual\fR(5) alias table specifies address aliasing
|
# The optional \fBvirtual\fR(5) alias table rewrites recipient
|
||||||
# for arbitrary local or non-local recipient addresses. Virtual aliasing
|
# addresses for all local, virtual and remote mail destinations.
|
||||||
# is recursive, and is done by the Postfix \fBcleanup\fR(8) daemon.
|
# This is unlike the \fBaliases\fR(5) table which is used
|
||||||
|
# only for \fBlocal\fR(8) delivery. Virtual aliasing is
|
||||||
|
# recursive, and is implemented by the Postfix \fBcleanup\fR(8)
|
||||||
|
# daemon before mail is queued.
|
||||||
#
|
#
|
||||||
# The main applications of virtual aliasing are:
|
# The main applications of virtual aliasing are:
|
||||||
# .IP \(bu
|
# .IP \(bu
|
||||||
|
@@ -193,7 +193,7 @@ int cleanup_flush(CLEANUP_STATE *state)
|
|||||||
int status;
|
int status;
|
||||||
char *encoding;
|
char *encoding;
|
||||||
CLEANUP_STAT_DETAIL *detail = 0;
|
CLEANUP_STAT_DETAIL *detail = 0;
|
||||||
DSN_SPLIT dp;
|
DSN_SPLIT dp;
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Raise these errors only if we examined all queue file records.
|
* Raise these errors only if we examined all queue file records.
|
||||||
|
@@ -20,7 +20,7 @@
|
|||||||
* Patches change the patchlevel and the release date. Snapshots change the
|
* Patches change the patchlevel and the release date. Snapshots change the
|
||||||
* release date only.
|
* release date only.
|
||||||
*/
|
*/
|
||||||
#define MAIL_RELEASE_DATE "20050329"
|
#define MAIL_RELEASE_DATE "20050330"
|
||||||
#define MAIL_VERSION_NUMBER "2.3"
|
#define MAIL_VERSION_NUMBER "2.3"
|
||||||
|
|
||||||
#define VAR_MAIL_VERSION "mail_version"
|
#define VAR_MAIL_VERSION "mail_version"
|
||||||
|
@@ -238,7 +238,7 @@ LMTP_RESP *lmtp_chat_resp(LMTP_STATE *state)
|
|||||||
rdata.code = atoi(STR(state->buffer));
|
rdata.code = atoi(STR(state->buffer));
|
||||||
for (cp = STR(state->buffer) + 4; *cp == ' '; cp++)
|
for (cp = STR(state->buffer) + 4; *cp == ' '; cp++)
|
||||||
/* void */ ;
|
/* void */ ;
|
||||||
if ((len = dsn_valid(cp)) > 0 && len < sizeof(DSN_SIZE)) {
|
if ((len = dsn_valid(cp)) > 0) {
|
||||||
DSN_UPDATE(rdata.dsn, cp, len);
|
DSN_UPDATE(rdata.dsn, cp, len);
|
||||||
} else if (strchr("245", STR(state->buffer)[0]) != 0) {
|
} else if (strchr("245", STR(state->buffer)[0]) != 0) {
|
||||||
DSN_UPDATE(rdata.dsn, "0.0.0", sizeof("0.0.0") - 1);
|
DSN_UPDATE(rdata.dsn, "0.0.0", sizeof("0.0.0") - 1);
|
||||||
|
@@ -224,7 +224,8 @@ static DNS_RR *smtp_addr_one(DNS_RR *addr_list, char *host, unsigned pref,
|
|||||||
freeaddrinfo(res0);
|
freeaddrinfo(res0);
|
||||||
if (found == 0) {
|
if (found == 0) {
|
||||||
dsn_vstring_update(why, "5.4.4", "%s: host not found", host);
|
dsn_vstring_update(why, "5.4.4", "%s: host not found", host);
|
||||||
smtp_errno = SMTP_ERR_FAIL;
|
if (smtp_errno != SMTP_ERR_RETRY)
|
||||||
|
smtp_errno = SMTP_ERR_FAIL;
|
||||||
}
|
}
|
||||||
return (addr_list);
|
return (addr_list);
|
||||||
}
|
}
|
||||||
|
@@ -261,7 +261,7 @@ SMTP_RESP *smtp_chat_resp(SMTP_SESSION *session)
|
|||||||
rdata.code = atoi(STR(session->buffer));
|
rdata.code = atoi(STR(session->buffer));
|
||||||
for (cp = STR(session->buffer) + 4; *cp == ' '; cp++)
|
for (cp = STR(session->buffer) + 4; *cp == ' '; cp++)
|
||||||
/* void */ ;
|
/* void */ ;
|
||||||
if ((len = dsn_valid(cp)) > 0 && len < sizeof(DSN_SIZE)) {
|
if ((len = dsn_valid(cp)) > 0) {
|
||||||
DSN_UPDATE(rdata.dsn, cp, len);
|
DSN_UPDATE(rdata.dsn, cp, len);
|
||||||
} else if (strchr("245", STR(session->buffer)[0]) != 0) {
|
} else if (strchr("245", STR(session->buffer)[0]) != 0) {
|
||||||
DSN_UPDATE(rdata.dsn, "0.0.0", sizeof("0.0.0") - 1);
|
DSN_UPDATE(rdata.dsn, "0.0.0", sizeof("0.0.0") - 1);
|
||||||
|
Reference in New Issue
Block a user