2
0
mirror of https://github.com/vdukhovni/postfix synced 2025-08-30 13:48:06 +00:00

postfix-2.3-20050330

This commit is contained in:
Wietse Venema
2005-03-30 00:00:00 -05:00
committed by Viktor Dukhovni
parent c04936c1b0
commit 2bc17f05a7
13 changed files with 55 additions and 36 deletions

View File

@@ -10567,6 +10567,13 @@ Apologies for any names omitted.
tls/tls_mgr.h, tls/tls_mgr.c, tls/tls_client.c, tls/tls.h,
smtp/smtp_proto.c.
20050330
Bugfix: in some compilation environments the SMTP and LMTP
clients could ignore enhanced status codes in server replies.
Bug introduced 20050329 while polishing working code. Files:
smtp/smtp_chat.c, lmtp/lmtp_chat.c.
Open problems:
Med: disable header address rewriting after XCLIENT?

View File

@@ -159,8 +159,9 @@ domains that often appear in forged email.
bigfoot.com reject_unverified_sender
... etcetera ...
A list of frequently forged MAIL FROM domains can be found at http://
www.monkeys.com/anti-spam/filtering/sender-domain-validate.in.
At some point in cyberspace/time, a list of frequently forged MAIL FROM domains
could be found at http://www.monkeys.com/anti-spam/filtering/sender-domain-
validate.in.
NOTE: One of the first things you might want to do is to turn on sender address
verification for all your own domains.

View File

@@ -11,10 +11,12 @@
# postmap -q - /etc/postfix/virtual <inputfile
#
# DESCRIPTION
# The optional virtual(5) alias table specifies address
# aliasing for arbitrary local or non-local recipient
# addresses. Virtual aliasing is recursive, and is done by
# the Postfix cleanup(8) daemon.
# The optional virtual(5) alias table rewrites recipient
# addresses for all local, virtual and remote mail destina-
# tions. This is unlike the aliases(5) table which is used
# only for local(8) delivery. Virtual aliasing is recur-
# sive, and is implemented by the Postfix cleanup(8) daemon
# before mail is queued.
#
# The main applications of virtual aliasing are:
#
@@ -142,8 +144,8 @@
# virtual_alias_maps = hash:/etc/postfix/virtual
#
# Note: some systems use dbm databases instead of hash.
# See the output from "postconf -m" for available
# database types.
# See the output from "postconf -m" for available data-
# base types.
#
# /etc/postfix/virtual:
# virtual-alias.domain anything (right-hand content does not matter)
@@ -182,8 +184,8 @@
# constituent parts, nor is user+foo broken up into user and
# foo.
#
# Patterns are applied in the order as specified in the
# table, until a pattern is found that matches the search
# Patterns are applied in the order as specified in the ta-
# ble, until a pattern is found that matches the search
# string.
#
# Results are the same as with indexed file lookups, with
@@ -193,9 +195,9 @@
# TCP-BASED TABLES
# This section describes how the table lookups change when
# lookups are directed to a TCP-based server. For a descrip-
# tion of the TCP client/server lookup protocol, see
# tcp_table(5). This feature is not available up to and
# including Postfix version 2.2.
# tion of the TCP client/server lookup protocol, see tcp_ta-
# ble(5). This feature is not available up to and including
# Postfix version 2.2.
#
# Each lookup operation uses the entire address once. Thus,
# user@domain mail addresses are not broken up into their

View File

@@ -274,9 +274,9 @@ specific domains that often appear in forged email. </p>
</pre>
</blockquote>
<p> A list of frequently forged MAIL FROM domains can be found at
<a href="http://www.monkeys.com/anti-spam/filtering/sender-domain-validate.in">http://www.monkeys.com/anti-spam/filtering/sender-domain-validate.in</a>.
</p>
<p> At some point in cyberspace/time, a list of frequently forged
MAIL FROM domains could be found at
<a href="http://www.monkeys.com/anti-spam/filtering/sender-domain-validate.in">http://www.monkeys.com/anti-spam/filtering/sender-domain-validate.in</a>. </p>
<p> NOTE: One of the first things you might want to do is to turn
on sender address verification for all your own domains. </p>

View File

@@ -17,10 +17,12 @@ VIRTUAL(5) VIRTUAL(5)
<b>postmap -q - /etc/postfix/virtual</b> &lt;<i>inputfile</i>
<b>DESCRIPTION</b>
The optional <a href="virtual.5.html"><b>virtual</b>(5)</a> alias table specifies address
aliasing for arbitrary local or non-local recipient
addresses. Virtual aliasing is recursive, and is done by
the Postfix <a href="cleanup.8.html"><b>cleanup</b>(8)</a> daemon.
The optional <a href="virtual.5.html"><b>virtual</b>(5)</a> alias table rewrites recipient
addresses for all local, virtual and remote mail destina-
tions. This is unlike the <a href="aliases.5.html"><b>aliases</b>(5)</a> table which is used
only for <a href="local.8.html"><b>local</b>(8)</a> delivery. Virtual aliasing is recur-
sive, and is implemented by the Postfix <a href="cleanup.8.html"><b>cleanup</b>(8)</a> daemon
before mail is queued.
The main applications of virtual aliasing are:

View File

@@ -16,9 +16,12 @@ Postfix virtual alias table format
.SH DESCRIPTION
.ad
.fi
The optional \fBvirtual\fR(5) alias table specifies address aliasing
for arbitrary local or non-local recipient addresses. Virtual aliasing
is recursive, and is done by the Postfix \fBcleanup\fR(8) daemon.
The optional \fBvirtual\fR(5) alias table rewrites recipient
addresses for all local, virtual and remote mail destinations.
This is unlike the \fBaliases\fR(5) table which is used
only for \fBlocal\fR(8) delivery. Virtual aliasing is
recursive, and is implemented by the Postfix \fBcleanup\fR(8)
daemon before mail is queued.
The main applications of virtual aliasing are:
.IP \(bu

View File

@@ -274,9 +274,9 @@ specific domains that often appear in forged email. </p>
</pre>
</blockquote>
<p> A list of frequently forged MAIL FROM domains can be found at
http://www.monkeys.com/anti-spam/filtering/sender-domain-validate.in.
</p>
<p> At some point in cyberspace/time, a list of frequently forged
MAIL FROM domains could be found at
http://www.monkeys.com/anti-spam/filtering/sender-domain-validate.in. </p>
<p> NOTE: One of the first things you might want to do is to turn
on sender address verification for all your own domains. </p>

View File

@@ -10,9 +10,12 @@
#
# \fBpostmap -q - /etc/postfix/virtual <\fIinputfile\fR
# DESCRIPTION
# The optional \fBvirtual\fR(5) alias table specifies address aliasing
# for arbitrary local or non-local recipient addresses. Virtual aliasing
# is recursive, and is done by the Postfix \fBcleanup\fR(8) daemon.
# The optional \fBvirtual\fR(5) alias table rewrites recipient
# addresses for all local, virtual and remote mail destinations.
# This is unlike the \fBaliases\fR(5) table which is used
# only for \fBlocal\fR(8) delivery. Virtual aliasing is
# recursive, and is implemented by the Postfix \fBcleanup\fR(8)
# daemon before mail is queued.
#
# The main applications of virtual aliasing are:
# .IP \(bu

View File

@@ -20,7 +20,7 @@
* Patches change the patchlevel and the release date. Snapshots change the
* release date only.
*/
#define MAIL_RELEASE_DATE "20050329"
#define MAIL_RELEASE_DATE "20050330"
#define MAIL_VERSION_NUMBER "2.3"
#define VAR_MAIL_VERSION "mail_version"

View File

@@ -238,7 +238,7 @@ LMTP_RESP *lmtp_chat_resp(LMTP_STATE *state)
rdata.code = atoi(STR(state->buffer));
for (cp = STR(state->buffer) + 4; *cp == ' '; cp++)
/* void */ ;
if ((len = dsn_valid(cp)) > 0 && len < sizeof(DSN_SIZE)) {
if ((len = dsn_valid(cp)) > 0) {
DSN_UPDATE(rdata.dsn, cp, len);
} else if (strchr("245", STR(state->buffer)[0]) != 0) {
DSN_UPDATE(rdata.dsn, "0.0.0", sizeof("0.0.0") - 1);

View File

@@ -224,6 +224,7 @@ static DNS_RR *smtp_addr_one(DNS_RR *addr_list, char *host, unsigned pref,
freeaddrinfo(res0);
if (found == 0) {
dsn_vstring_update(why, "5.4.4", "%s: host not found", host);
if (smtp_errno != SMTP_ERR_RETRY)
smtp_errno = SMTP_ERR_FAIL;
}
return (addr_list);

View File

@@ -261,7 +261,7 @@ SMTP_RESP *smtp_chat_resp(SMTP_SESSION *session)
rdata.code = atoi(STR(session->buffer));
for (cp = STR(session->buffer) + 4; *cp == ' '; cp++)
/* void */ ;
if ((len = dsn_valid(cp)) > 0 && len < sizeof(DSN_SIZE)) {
if ((len = dsn_valid(cp)) > 0) {
DSN_UPDATE(rdata.dsn, cp, len);
} else if (strchr("245", STR(session->buffer)[0]) != 0) {
DSN_UPDATE(rdata.dsn, "0.0.0", sizeof("0.0.0") - 1);