diff --git a/postfix/HISTORY b/postfix/HISTORY index 8482b6195..da3b242d2 100644 --- a/postfix/HISTORY +++ b/postfix/HISTORY @@ -19528,3 +19528,23 @@ Apologies for any names omitted. 20140110-15 Miscellaneous documentation cleanups. + +20140116 + + Workaround: prepend "-I. -I../../include" to CCARGS, to + avoid name clashes with non-Postfix header files. File: + makedefs. + +20140125 + + Cleanup: assorted documentation glitches. + +20140209 + + Workaround: the Postfix SMTP client now also falls back to + plaintext when TLS fails after the TLS protocol handshake. + Files: smtp/smtp.h, smtp/smtp_connect.c, smtp/smtp_trouble.c. + + Testbed: unsupported HANGUP access map action that drops + the connection without responding to the remote SMTP client. + File: smtpd/smtpd_check.c. diff --git a/postfix/README_FILES/FORWARD_SECRECY_README b/postfix/README_FILES/FORWARD_SECRECY_README index b81bfcbea..8d6fa3dac 100644 --- a/postfix/README_FILES/FORWARD_SECRECY_README +++ b/postfix/README_FILES/FORWARD_SECRECY_README @@ -181,12 +181,13 @@ main.cf. FFoorrwwaarrdd SSeeccrreeccyy iinn tthhee PPoossttffiixx SSMMTTPP CClliieenntt The Postfix >= 2.2 SMTP client supports forward secrecy in its default -configuration. No configuration changes are needed besides turning on elliptic- -curve support with Postfix 2.6 and 2.7 (see the quick-start section). If the -remote SMTP server supports cipher suites with forward secrecy (and does not -override the SMTP client's cipher preference), then the traffic between the -server and client will resist decryption even if the server's long-term -authentication keys are later compromised. +configuration. All supported OpenSSL releases support EDH key exchange. OpenSSL +releases >= 1.0.0 also support EECDH key exchange (provided elliptic-curve +support has not been disabled by the vendor as in some versions of RedHat +Linux). If the remote SMTP server supports cipher suites with forward secrecy +(and does not override the SMTP client's cipher preference), then the traffic +between the server and client will resist decryption even if the server's long- +term authentication keys are later compromised. The default Postfix SMTP client cipher lists are correctly ordered to prefer EECDH and EDH cipher suites ahead of similar cipher suites that don't implement @@ -200,12 +201,16 @@ a case-by-case basis via the TLS policy table. GGeettttiinngg ssttaarrtteedd,, qquuiicckk aanndd ddiirrttyy -EEEECCDDHH CClliieenntt aanndd sseerrvveerr ssuuppppoorrtt ((PPoossttffiixx >>== 22..66 wwiitthh OOppeennSSSSLL >>== 11..00..00)) +EEEECCDDHH CClliieenntt ssuuppppoorrtt ((PPoossttffiixx >>== 22..22 wwiitthh OOppeennSSSSLL >>== 11..00..00)) + +This works "out of the box" without additional configuration. + +EEEECCDDHH SSeerrvveerr ssuuppppoorrtt ((PPoossttffiixx >>== 22..66 wwiitthh OOppeennSSSSLL >>== 11..00..00)) With Postfix 2.6 and 2.7, enable elliptic-curve support in the Postfix SMTP -client and server. This is the default with Postfix >= 2.8. Note, however, that -elliptic-curve support may be disabled by the vendor, as in some versions of -RedHat Linux. +server. This is the default with Postfix >= 2.8. Note, however, that elliptic- +curve support may be disabled by the vendor, as in some versions of RedHat +Linux. /etc/postfix/main.cf: # Postfix 2.6 or 2.7 only. This is default with Postfix 2.8 and later. diff --git a/postfix/html/FORWARD_SECRECY_README.html b/postfix/html/FORWARD_SECRECY_README.html index af0f53d15..1e0adc0e1 100644 --- a/postfix/html/FORWARD_SECRECY_README.html +++ b/postfix/html/FORWARD_SECRECY_README.html @@ -253,9 +253,10 @@ more curves at the desired security level without any changes to
The Postfix ≥ 2.2 SMTP client supports forward secrecy in -its default configuration. No configuration changes are needed -besides turning on elliptic-curve support with Postfix 2.6 and 2.7 -(see the quick-start section). If the +its default configuration. All supported OpenSSL releases support +EDH key exchange. OpenSSL releases ≥ 1.0.0 also support EECDH +key exchange (provided elliptic-curve support has not been disabled +by the vendor as in some versions of RedHat Linux). If the remote SMTP server supports cipher suites with forward secrecy (and does not override the SMTP client's cipher preference), then the traffic between the server and client will resist decryption even @@ -277,11 +278,14 @@ href="TLS_README.html#client_tls_policy">TLS policy table.
This works "out of the box" without additional configuration.
+ +With Postfix 2.6 and 2.7, enable elliptic-curve support in the -Postfix SMTP client and server. This is the default with Postfix +Postfix SMTP server. This is the default with Postfix ≥ 2.8. Note, however, that elliptic-curve support may be disabled by the vendor, as in some versions of RedHat Linux.
diff --git a/postfix/html/postconf.1.html b/postfix/html/postconf.1.html index ecaed1a25..aa16a13a4 100644 --- a/postfix/html/postconf.1.html +++ b/postfix/html/postconf.1.html @@ -123,6 +123,8 @@ POSTCONF(1) POSTCONF(1) The default is as if "-C all" is specified. + This feature is available with Postfix 2.9 and later. + -d Print main.cf default parameter settings instead of actual set- tings. Specify -df to fold long lines for human readability (Postfix 2.9 and later). @@ -330,6 +332,8 @@ POSTCONF(1) POSTCONF(1) -p Show main.cf parameter settings. This is the default. + This feature is available with Postfix 2.11 and later. + -P Show master.cf service parameter settings (by default all ser- vices and all parameters). formatted as one "ser- vice/type/parameter=value" per line. Specify -Pf to fold long @@ -444,8 +448,10 @@ POSTCONF(1) POSTCONF(1) The Secure Mailer license must be distributed with this software. AUTHOR(S) - Wietse Venema IBM T.J. Watson Research P.O. Box 704 Yorktown - Heights, NY 10598, USA + Wietse Venema + IBM T.J. Watson Research + P.O. Box 704 + Yorktown Heights, NY 10598, USA POSTCONF(1)