head 1.7; access; symbols pkgsrc-2026Q1:1.7.0.2 pkgsrc-2026Q1-base:1.7 pkgsrc-2025Q4:1.6.0.16 pkgsrc-2025Q4-base:1.6 pkgsrc-2025Q3:1.6.0.14 pkgsrc-2025Q3-base:1.6 pkgsrc-2025Q2:1.6.0.12 pkgsrc-2025Q2-base:1.6 pkgsrc-2025Q1:1.6.0.10 pkgsrc-2025Q1-base:1.6 pkgsrc-2024Q4:1.6.0.8 pkgsrc-2024Q4-base:1.6 pkgsrc-2024Q3:1.6.0.6 pkgsrc-2024Q3-base:1.6 pkgsrc-2024Q2:1.6.0.4 pkgsrc-2024Q2-base:1.6 pkgsrc-2024Q1:1.6.0.2 pkgsrc-2024Q1-base:1.6 pkgsrc-2023Q4:1.4.0.20 pkgsrc-2023Q4-base:1.4 pkgsrc-2023Q3:1.4.0.18 pkgsrc-2023Q3-base:1.4 pkgsrc-2023Q2:1.4.0.16 pkgsrc-2023Q2-base:1.4 pkgsrc-2023Q1:1.4.0.14 pkgsrc-2023Q1-base:1.4 pkgsrc-2022Q4:1.4.0.12 pkgsrc-2022Q4-base:1.4 pkgsrc-2022Q3:1.4.0.10 pkgsrc-2022Q3-base:1.4 pkgsrc-2022Q2:1.4.0.8 pkgsrc-2022Q2-base:1.4 pkgsrc-2022Q1:1.4.0.6 pkgsrc-2022Q1-base:1.4 pkgsrc-2021Q4:1.4.0.4 pkgsrc-2021Q4-base:1.4 pkgsrc-2021Q3:1.4.0.2 pkgsrc-2021Q3-base:1.4 pkgsrc-2021Q2:1.3.0.16 pkgsrc-2021Q2-base:1.3 pkgsrc-2021Q1:1.3.0.14 pkgsrc-2021Q1-base:1.3 pkgsrc-2020Q4:1.3.0.12 pkgsrc-2020Q4-base:1.3 pkgsrc-2020Q3:1.3.0.10 pkgsrc-2020Q3-base:1.3 pkgsrc-2020Q2:1.3.0.8 pkgsrc-2020Q2-base:1.3 pkgsrc-2020Q1:1.3.0.4 pkgsrc-2020Q1-base:1.3 pkgsrc-2019Q4:1.3.0.6 pkgsrc-2019Q4-base:1.3 pkgsrc-2019Q3:1.3.0.2 pkgsrc-2019Q3-base:1.3 pkgsrc-2019Q2:1.2.0.40 pkgsrc-2019Q2-base:1.2 pkgsrc-2019Q1:1.2.0.38 pkgsrc-2019Q1-base:1.2 pkgsrc-2018Q4:1.2.0.36 pkgsrc-2018Q4-base:1.2 pkgsrc-2018Q3:1.2.0.34 pkgsrc-2018Q3-base:1.2 pkgsrc-2018Q2:1.2.0.32 pkgsrc-2018Q2-base:1.2 pkgsrc-2018Q1:1.2.0.30 pkgsrc-2018Q1-base:1.2 pkgsrc-2017Q4:1.2.0.28 pkgsrc-2017Q4-base:1.2 pkgsrc-2017Q3:1.2.0.26 pkgsrc-2017Q3-base:1.2 pkgsrc-2017Q2:1.2.0.22 pkgsrc-2017Q2-base:1.2 pkgsrc-2017Q1:1.2.0.20 pkgsrc-2017Q1-base:1.2 pkgsrc-2016Q4:1.2.0.18 pkgsrc-2016Q4-base:1.2 pkgsrc-2016Q3:1.2.0.16 pkgsrc-2016Q3-base:1.2 pkgsrc-2016Q2:1.2.0.14 pkgsrc-2016Q2-base:1.2 pkgsrc-2016Q1:1.2.0.12 pkgsrc-2016Q1-base:1.2 pkgsrc-2015Q4:1.2.0.10 pkgsrc-2015Q4-base:1.2 pkgsrc-2015Q3:1.2.0.8 pkgsrc-2015Q3-base:1.2 pkgsrc-2015Q2:1.2.0.6 pkgsrc-2015Q2-base:1.2 pkgsrc-2015Q1:1.2.0.4 pkgsrc-2015Q1-base:1.2 pkgsrc-2014Q4:1.2.0.2 pkgsrc-2014Q4-base:1.2 pkgsrc-2014Q3:1.1.0.4 pkgsrc-2014Q3-base:1.1 pkgsrc-2014Q2:1.1.0.2 pkgsrc-2014Q2-base:1.1; locks; strict; comment @# @; 1.7 date 2026.03.02.07.39.29; author jnemeth; state Exp; branches; next 1.6; commitid hRaoxTwMYU3L7nwG; 1.6 date 2024.02.19.04.12.36; author jnemeth; state Exp; branches; next 1.5; commitid iOtoSag0liZ2RZYE; 1.5 date 2024.02.12.03.23.06; author jnemeth; state Exp; branches; next 1.4; commitid jhDAzIcn7w9vN5YE; 1.4 date 2021.07.04.07.57.13; author jnemeth; state Exp; branches; next 1.3; commitid L27iNpThA37ZWDZC; 1.3 date 2019.07.15.04.32.49; author jnemeth; state Exp; branches; next 1.2; commitid jIGa2kaE2N2eT5vB; 1.2 date 2014.12.06.23.22.20; author jnemeth; state Exp; branches; next 1.1; commitid nOUaBVqh43Tkc21y; 1.1 date 2014.06.15.20.48.50; author jnemeth; state Exp; branches; next ; commitid y0gYCG4vNLA71FEx; desc @@ 1.7 log @Update to sendmail 8.18.2 pkgsrc changes: - fix one thing related to resn - convert from NetBSD's old blocklistd to blacklistd NOTE: UseBlocklist is now UseBlacklist SENDMAIL RELEASE NOTES This listing shows the version of the sendmail binary, the version of the sendmail configuration files, the date of release, and a summary of the changes in that release. 8.18.2/8.18.2 2025/12/27 Avoid adding a second To: header to DSNs, instead any additional addresses are appended to an existing To: header (this also applies to Cc: and Bcc:). Fix matching of wildcard SANs in the experimental support for SMTP MTA Strict Transport Security (MTA-STS). Problem reported by Dilyan Palauzo. The experimental support for SMTP MTA Strict Transport Security has been significantly rewritten to handle the problems caused by it being tied to the domain of a RCPT address (instead to an SMTP server for all the domains it handles - compare DANE). The most visible change is that an SMTP transaction where the first RCPT has an STS policy will have only RCPTs with the same domain instead of all RCPTs going to the same servers (MX). Accordingly, MTA-STS can be disabled per RCPT domain by adding access map entries of the form STS:domain NO Successful deliveries to RCPTs which have an STS policy show STS=OK in the to=... stat=Sent log entry. If an STS policy for a RCPT could not be fulfilled then the RCPT is not being sent and an error containing the string "STS" is logged. MaxQueueAge is now observed for all types of QueueSortOrder even those which internally skip some code (including the MaxQueueAge check). On some systems the rejection of a RCPT by a milter could silently be ignored. Increase size for an internal buffer which can contain AUTH data because XOAUTH2 could use very long tokens. Patch from Frank Schmirler. Portability: Add support for Darwin 24 and 25. LIBSM: Fix compilation of vfscanf.c with gcc-15. Problem reported by Jaroslav Škarvada of RedHat. MAILSTATS: Fix compilation with gcc-15. Problem reported by Jaroslav Škarvada of RedHat. New Files: cf/feature/same_domain_only.m4 devtools/OS/Darwin.24.x devtools/OS/Darwin.25.x @ text @$NetBSD: patch-az,v 1.6 2024/02/19 04:12:36 jnemeth Exp $ --- sendmail/srvrsmtp.c.orig 2024-01-31 06:38:32.000000000 +0000 +++ sendmail/srvrsmtp.c @@@@ -51,6 +51,10 @@@@ static bool tls_ok_srv = false; static bool NotFirstDelivery = false; #endif +#if NAMED_BIND +extern struct __res_state sm_res; +#endif + /* server features */ #define SRV_NONE 0x00000000 /* none... */ #define SRV_OFFER_TLS 0x00000001 /* offer STARTTLS */ @@@@ -1537,6 +1541,7 @@@@ smtp(nullserver, d_flags, e) (int) tp->tv_sec + (tp->tv_usec >= 500000 ? 1 : 0) ); + BLOCKLIST_NOTIFY(BLOCKLIST_AUTH_FAIL, sm_io_getinfo(InChannel, SM_IO_WHAT_FD, NULL), "pre-greeting traffic"); } } } @@@@ -1822,7 +1827,12 @@@@ smtp(nullserver, d_flags, e) /* get an OK if we're done */ if (result == SASL_OK) { + int fd; + authenticated: + fd = sm_io_getinfo(InChannel, SM_IO_WHAT_FD, NULL); + BLOCKLIST_NOTIFY(BLOCKLIST_AUTH_OK, sm_io_getinfo(InChannel, SM_IO_WHAT_FD, NULL), "AUTH OK"); + message("235 2.0.0 OK Authenticated"); authenticating = SASL_IS_AUTH; macdefine(&BlankEnvelope.e_macro, A_TEMP, @@@@ -1967,6 +1977,7 @@@@ smtp(nullserver, d_flags, e) { \ SET_AUTH_USER_CONDITIONALLY \ message("535 5.7.0 authentication failed"); \ + BLOCKLIST_NOTIFY(BLOCKLIST_AUTH_FAIL, sm_io_getinfo(InChannel, SM_IO_WHAT_FD, NULL), "AUTH FAIL"); \ if (LogLevel >= 9) \ sm_syslog(LOG_WARNING, e->e_id, \ "AUTH failure (%s): %s (%d) %s%s%.*s, relay=%.100s", \ @@@@ -2082,6 +2093,10 @@@@ smtp(nullserver, d_flags, e) if (nullserver != NULL && ++n_badcmds > MAXBADCOMMANDS) { + int fd; + + fd = sm_io_getinfo(InChannel, SM_IO_WHAT_FD, NULL); + BLOCKLIST_NOTIFY(BLOCKLIST_ABUSIVE_BEHAVIOR, sm_io_getinfo(InChannel, SM_IO_WHAT_FD, NULL), "too many bad commands"); message("421 4.7.0 %s Too many bad commands; closing connection", MyHostName); @@@@ -3926,7 +3941,11 @@@@ smtp(nullserver, d_flags, e) #if MAXBADCOMMANDS > 0 if (++n_badcmds > MAXBADCOMMANDS) { + int fd; + stopattack: + fd = sm_io_getinfo(InChannel, SM_IO_WHAT_FD, NULL); + BLOCKLIST_NOTIFY(BLOCKLIST_ABUSIVE_BEHAVIOR, sm_io_getinfo(InChannel, SM_IO_WHAT_FD, NULL), "too many bad commands"); message("421 4.7.0 %s Too many bad commands; closing connection", MyHostName); @@@@ -4422,8 +4441,8 @@@@ smtp_data(smtp, e, check_stuffing) id = e->e_id; #if NAMED_BIND - _res.retry = TimeOuts.res_retry[RES_TO_FIRST]; - _res.retrans = TimeOuts.res_retrans[RES_TO_FIRST]; + sm_res.retry = TimeOuts.res_retry[RES_TO_FIRST]; + sm_res.retrans = TimeOuts.res_retrans[RES_TO_FIRST]; #endif #if _FFR_PROXY @ 1.6 log @PR/57936 -- fix build problem on netbsd-9 @ text @d1 1 a1 1 $NetBSD$ d20 1 a20 1 + BLACKLIST_NOTIFY(BLACKLIST_AUTH_FAIL, sm_io_getinfo(InChannel, SM_IO_WHAT_FD, NULL), "pre-greeting traffic"); d32 1 a32 1 + BLACKLIST_NOTIFY(BLACKLIST_AUTH_OK, sm_io_getinfo(InChannel, SM_IO_WHAT_FD, NULL), "AUTH OK"); d41 1 a41 1 + BLACKLIST_NOTIFY(BLACKLIST_AUTH_FAIL, sm_io_getinfo(InChannel, SM_IO_WHAT_FD, NULL), "AUTH FAIL"); \ d52 1 a52 1 + BLACKLIST_NOTIFY(BLACKLIST_ABUSIVE_BEHAVIOR, sm_io_getinfo(InChannel, SM_IO_WHAT_FD, NULL), "too many bad commands"); d64 1 a64 1 + BLACKLIST_NOTIFY(BLACKLIST_ABUSIVE_BEHAVIOR, sm_io_getinfo(InChannel, SM_IO_WHAT_FD, NULL), "too many bad commands"); @ 1.5 log @Update to sendmail 8.18.1. Main changes are: - stricter RFC compliance to close some security issues - FIPS 3 support - full DANE support SENDMAIL RELEASE NOTES This listing shows the version of the sendmail binary, the version of the sendmail configuration files, the date of release, and a summary of the changes in that release. 8.18.1/8.18.1 2024/01/31 sendmail is now stricter in following the RFCs and rejects some invalid input with respect to line endings and pipelining: - Prevent transaction stuffing by ensuring SMTP clients wait for the HELO/EHLO and DATA response before sending further SMTP commands. This can be disabled using the new srv_features option 'F'. Issue reported by Yepeng Pan and Christian Rossow from CISPA Helmholtz Center for Information Security. - Accept only CRLF . CRLF as end of an SMTP message as required by the RFCs, which can disabled by the new srv_features option 'O'. - Do not accept a CR or LF except in the combination CRLF (as required by the RFCs). These checks can be disabled by the new srv_features options 'U' and 'G', respectively. In this case it is suggested to use 'u2' and 'g2' instead so the server replaces offending bare CR or bare LF with a space. It is recommended to only turn these protections off for trusted networks due to the potential for abuse. Full DANE support is available if OpenSSL versions 1.1.1 or 3.x are used, i.e., TLSA RR 2-x-y and 3-x-y are supported as required by RFC 7672. OpenSSL version 3.0.x is supported. Note: OpenSSL 3 loads by default an openssl.cnf file from a location specified in the library which may cause unwanted behaviour in sendmail. Hence sendmail sets the environment variable OPENSSL_CONF to /etc/mail/sendmail.ossl to override the default. The file name can be changed by defining confOPENSSL_CNF in the mc file; using an empty value prevents setting OPENSSL_CONF. Note: referring to a file which does not exist does not cause an an error. Two new values have been added for {verify}: "DANE_TEMP": DANE verification failed temporarily. "DANE_NOTLS": DANE was required but STARTTLS was not offered by the server. The default rules return a temporary error for these cases, so delivery is not attempted. If the TLS setup code in the client fails and DANE requirements exist then {verify} will be set to "DANE_TEMP" thus preventing delivery by default. DANE related logging has been slightly changed for clarification: "DANE configured in DNS but no STARTTLS available" changed to "DANE configured in DNS but STARTTLS not offered" When the compile time option USE_EAI is enabled, vacation could fail to respond when it should (the code change in 8.17.2 was incomplete). Problem reported by Alex Hautequest. If SMTPUTF8 BODY=7BIT are used as parameters for the MAIL command the parsing of UTF8 addresses could fail (USE_EAI). If a reply to a previous RCPT was received while sending another RCPT in pipelining mode then parts of the reply could have been assigned to the wrong RCPT. New DontBlameSendmail option CertOwner to relax requirement for certificate public and private key ownership. Based on suggestion from Marius Strobl of the FreeBSD project. clt_features was not checked for connections via Unix domain sockets. CONFIG: FEATURE(`enhdnsbl') did not handle multiple replies from DNS lookups thus potentially causing random "false negatives". Note: the fix creates an incompatibility: the arguments must not have a trailing dot anymore because the -a. option has been removed (as it only applies to the entire result, not individual values). CONFIG: New FEATURE(`fips3') for basic FIPS support in OpenSSL 3. VACATION: Add support for Return-Path header to set sender to match OpenBSD and NetBSD functionality. VACATION: Honor RFC3834 and avoid an auto-reply if 'Auto-Submitted: no' is found in the headers to match OpenBSD and NetBSD functionality. VACATION: Avoid an auto-reply if a 'List-Id:' is found in the headers to match OpenBSD functionality. VACATION: Add support for $SUBJECT in .vacation.msg which is replaced with the first line of the subject of the original message to match OpenBSD and NetBSD functionality. Portability: Add support for Darwin 23. New Files: cf/feature/fips3.m4 devtools/OS/Darwin.23.x @ text @d20 1 a20 1 + BLACKLIST_NOTIFY(BLACKLIST_AUTH_FAIL, fd, "pre-greeting traffic"); d32 1 a32 1 + BLACKLIST_NOTIFY(BLACKLIST_AUTH_OK, fd, "AUTH OK"); d52 1 a52 1 + BLACKLIST_NOTIFY(BLACKLIST_ABUSIVE_BEHAVIOR, fd, "too many bad commands"); d64 1 a64 1 + BLACKLIST_NOTIFY(BLACKLIST_ABUSIVE_BEHAVIOR, fd, "too many bad commands"); @ 1.4 log @comms/sendmail: update to 8.16.1 8.16.1/8.16.1 2020/07/05 SECURITY: If sendmail tried to reuse an SMTP session which had already been closed by the server, then the connection cache could have invalid information about the session. One possible consequence was that STARTTLS was not used even if offered. This problem has been fixed by clearing out all relevant status information when a closed session is encountered. OpenSSL versions before 0.9.8 are no longer supported. OpenSSL version 1.1.0 and 1.1.1 are supported. Initial support for DANE (see RFC 7672 et.al.) is available if the compile time option DANE is set. Only TLSA RR 3-1-x is currently implemented. New options SSLEngine and SSLEnginePath to support OpenSSL engines. Note: this feature has so far only been tested with the "chil" engine; please report problems with other engines if you encounter any. New option CRLPath to specify a directory which contains hashes pointing to certificate revocations files. Based on patch from Al Smith. New rulesets tls_srv_features and tls_clt_features which can return a (semicolon separated) list of TLS related options, e.g., CipherList, CertFile, KeyFile, see doc/op/op.me for details. To automatically handle TLS interoperability problems for outgoing mail, sendmail can now immediately try a connection again without STARTTLS after a TLS handshake failure. This can be configured globally via the option TLSFallbacktoClear or per session via the 'C' flag of tls_clt_features. This also adds the new value "CLEAR" for the macro {verify}: STARTTLS has been disabled internally for a clear text delivery attempt. Apply Timeout.starttls also to the server waiting for the TLS handshake to begin. Based on patch from Simon Hradecky. New compile time option TLS_EC to enable the use of elliptic curve cryptography in STARTTLS (previously available as _FFR_TLS_EC). Handle MIME boundaries specified in headers which contain CRLF. Fix detection of loopback net (it was broken when compiled with NETINET6) and only set the macros {if_addr_out} and {if_family_out} if the interface of the outgoing connection does not belong to the loopback net. Fix logic to enable a milter to delete a recipient in DeliveryMode=interactive even if it might be subject to alias expansion. Log name of a milter making changes (this was missing for some functions). Log the actual reply of a server when an SMTP delivery problem occurs in a "reply=" field if possible. Log user= for failed AUTH attempts if possible. Based on patch from Packet Hack, Jim Hranicky, Kevin A. McGrail, and Joe Quinn. Add CDB as map type. Note: CDB is a "Constant DataBase", i.e., no changes can be made after it is created, hence it does not work with vacation(1) nor editmap(8) (except for query mode). Fix some memory leaks (mostly in error cases) and properly handle copied varargs in sm_io_vfprintf(). The issues were found using Coverity Scan and reported (including patches) by Ondřej Lysoněk of Red Hat. Do not override ServerSSLOptions and ClientSSLOptions when they are specified on the command line. Based on patch from Hiroki Sato. Add RFC7505 Null MX support for domains that declare they do not accept mail. New compile time option LDAP_NETWORK_TIMEOUT which is set automatically when LDAPMAP is used and LDAP_OPT_NETWORK_TIMEOUT is available to enable the new -c option for LDAP maps to specify the network timeout. CONFIG: New FEATURE(`tls_session_features') to enable standard rules for tls_srv_features and tls_clt_features; for details see cf/README. CONFIG: New options confSSL_ENGINE and confSSL_ENGINE_PATH for SSLEngine and SSLEnginePath, respectively. CONFIG: New options confDANE to enable DANE support. CONFIG: New option confTLS_FALLBACK_TO_CLEAR for TLSFallbacktoClear. CONFIG: New extension CITag: for TLS restrictions, see cf/README for details. CONFIG: FEATURE(`blacklist_recipients') renamed to FEATURE(`blocklist_recipients'). CONTRIB: cidrexpand updated to support IPv6 CIDR ranges and to canonicalize IPv6 addresses; if cidrexpand is used with IPv6 addresses then UseCompressedIPv6Addresses must be disabled. DOC: The dns map can return multiple values in a single result if the -z option is used. DOC: Note to set MustQuoteChars=. due to DKIM signatures. LIBMILTER: Fix typo in a macro. Patch from Ignacio Goyret of Alcatel-Lucent. LIBMILTER: Fix reference in xxfi_negotiate documentation. Patch from Sven Neuhaus. LIBMILTER: Fix function name in smfi_addrcpt_par documentation. Patch from G.W. Haywood. LIBMILTER: Fix a potential memory leak in smfi_setsymlist(). Patch from Martin Svec. MAKEMAP: New map type "implicit" refers to the first available type, i.e., it depends on the compile time options NEWDB, DBM, and CDB. This can be used in conjunction with the "implicit" map type in sendmail.cf. Note: makemap, libsmdb, and sendmail must be compiled with the same options (and library versions of course). Portability: Add support for Darwin 14-18 (Mac OS X 10.x). New option HAS_GETHOSTBYNAME2: set if your system supports gethostbyname2(2). Set SM_CONF_SEM=2 for FreeBSD 12 and later due to changes in sys/sem.h On Linux set MAXHOSTNAMELEN (the maximum length of a FQHN) to 256 if it is less than that value. Added Files: cf/feature/blocklist_recipients.m4 cf/feature/tls_failures.m4 devtools/OS/Darwin.14.x devtools/OS/Darwin.15.x devtools/OS/Darwin.16.x libsmdb/smcdb.c sendmail/ratectrl.h @ text @d3 1 a3 1 --- sendmail/srvrsmtp.c.orig 2020-06-08 08:35:03.000000000 +0000 d5 1 a5 1 @@@@ -48,6 +48,10 @@@@ static bool tls_ok_srv = false; d14 5 a18 5 #define SRV_NONE 0x0000 /* none... */ #define SRV_OFFER_TLS 0x0001 /* offer STARTTLS */ @@@@ -1408,6 +1412,7 @@@@ smtp(nullserver, d_flags, e) (int) tp.tv_sec + (tp.tv_usec >= 500000 ? 1 : 0) d24 1 a24 1 @@@@ -1680,7 +1685,12 @@@@ smtp(nullserver, d_flags, e) d37 1 a37 1 @@@@ -1825,6 +1835,7 @@@@ smtp(nullserver, d_flags, e) d45 1 a45 1 @@@@ -1940,6 +1951,10 @@@@ smtp(nullserver, d_flags, e) d56 1 a56 1 @@@@ -3663,7 +3678,11 @@@@ doquit: d68 1 a68 1 @@@@ -4136,8 +4155,8 @@@@ smtp_data(smtp, e) @ 1.3 log @Add support for working with blacklistd. These patches were originally created for FreeBSD and were ported to pkgsrc by Hauke Fath with some cleanup by myself. These patches add a new "UseBlacklist" option to sendmail to have it send authentication failure notices to blacklistd. @ text @d3 1 a3 1 --- sendmail/srvrsmtp.c.orig 2015-03-18 11:47:12.000000000 +0000 d5 1 a5 1 @@@@ -46,6 +46,10 @@@@ static bool tls_ok_srv = false; d7 1 a7 1 #endif /* _FFR_DM_ONE */ d16 1 a16 1 @@@@ -1328,6 +1332,7 @@@@ smtp(nullserver, d_flags, e) d24 1 a24 1 @@@@ -1589,7 +1594,12 @@@@ smtp(nullserver, d_flags, e) d37 13 a49 5 @@@@ -1721,8 +1731,12 @@@@ smtp(nullserver, d_flags, e) } else { + int fd; d51 6 a56 8 /* not SASL_OK or SASL_CONT */ message("535 5.7.0 authentication failed"); + fd = sm_io_getinfo(InChannel, SM_IO_WHAT_FD, NULL); + BLACKLIST_NOTIFY(BLACKLIST_AUTH_FAIL, fd, "AUTH FAIL"); if (LogLevel > 9) sm_syslog(LOG_WARNING, e->e_id, "AUTH failure (%s): %s (%d) %s, relay=%.100s", @@@@ -3523,7 +3537,11 @@@@ doquit: d68 1 a68 1 @@@@ -3992,8 +4010,8 @@@@ smtp_data(smtp, e) d76 1 a76 1 #endif /* NAMED_BIND */ @ 1.2 log @Update sendmail to 8.15.1: this is mostly a feature/bugfix release. Note that there was an incompatible config change for IPv6 users. See the MESSAGE file for details. pkgsrc change: delete a couple of patches that have been upstreamed Proofpoint, Inc., and the Sendmail Consortium announce the availability of sendmail 8.15.1. This release: o offers more TLS related features, o does not ignore temporary map lookup failures during header rewriting, o uses uncompressed IPv6 addresses by default, which is an incompatible change that requires to update IPv6 related configuration data. as well as many other enhancements. For details see the release notes below. SENDMAIL RELEASE NOTES This listing shows the version of the sendmail binary, the version of the sendmail configuration files, the date of release, and a summary of the changes in that release. 8.15.1/8.15.1 2014/12/06 SECURITY: Properly set the close-on-exec flag for file descriptors (except stdin, stdout, and stderr) before executing mailers. If header rewriting fails due to a temporary map lookup failure, queue the mail for later retry instead of sending it without rewriting the header. Note: this is done while the mail is being sent and hence the transaction is aborted, which only works for SMTP/LMTP mailers hence the handling of temporary map failures is suppressed for other mailers. SMTP/LMTP servers may complain about aborted transactions when this problem occurs. See also "DNS Lookups" in sendmail/TUNING. Incompatible Change: Use uncompressed IPv6 addresses by default, i.e., they will not contain "::". For example, instead of ::1 it will be 0:0:0:0:0:0:0:1. This permits a zero subnet to have a more specific match, such as different map entries for IPv6:0:0 vs IPv6:0. This change requires that configuration data (including maps, files, classes, custom ruleset, etc) must use the same format, so make certain such configuration data is updated before using 8.15. As a very simple check search for patterns like 'IPv6:[0-9a-fA-F:]*::' and 'IPv6::'. If necessary, the prior format can be retained by compiling with: APPENDDEF(`conf_sendmail_ENVDEF', `-DIPV6_FULL=0') in your devtools/Site/site.config.m4 file. If debugging is turned on (-d0.14) also print the OpenSSL versions, both build time and run time (provided STARTTLS is compiled in). If a connection to the MTA is dropped by the client before its hostname can be validated, treat it as "may be forged", so that the unvalidated hostname is not passed to a milter in xxfi_connect(). Add a timeout for communication with socket map servers which can be specified using the -d option. Add a compile time option HESIOD_ALLOW_NUMERIC_LOGIN to allow numeric logins even if HESIOD is enabled. The new option CertFingerprintAlgorithm specifies the finger- print algorithm (digest) to use for the presented cert. If the option is not set, md5 is used and the macro {cert_md5} contains the cert fingerprint. However, if the option is set, the specified algorithm (e.g., sha1) is used and the macro {cert_fp} contains the cert fingerprint. That is, as long as the option is not set, the behaviour does not change, but otherwise, {cert_md5} is superseded by {cert_fp} even if you set CertFingerprintAlgorithm to md5. The options ServerSSLOptions and ClientSSLOptions can be used to set SSL options for the server and client side respectively. See SSL_CTX_set_options(3) for a list. Note: this change turns on SSL_OP_NO_SSLv2 and SSL_OP_NO_TICKET for the client. See doc/op/op.me for details. A new map type "arpa" is available to reverse an IP (IPv4 or IPv6) address. It returns the string for the PTR lookup, but without trailing {ip6,in-addr}.arpa. New operation mode 'C' just checks the configuration file, e.g., sendmail -C new.cf -bC will perform a basic syntax/consistency check of new.cf. The mailer flag 'I' is deprecated and will be removed in a future version. Allow local (not just TCP) socket connections to the server, e.g., O DaemonPortOptions=Family=local, Addr=/var/mta/server.sock can be used. If the new option MaxQueueAge is set to a value greater than zero, entries in the queue will be retried during a queue run only if the individual retry time has been reached which is doubled for each attempt. The maximum retry time is limited by the specified value. New DontBlameSendmail option GroupReadableDefaultAuthInfoFile to relax requirement for DefaultAuthInfo file. Reset timeout after receiving a message to appropriate value if STARTTLS is in use. Based on patch by Kelsey Cummings of Sonic.net. Report correct error messages from the LDAP library for a range of small negative return values covering those used by OpenLDAP. Fix compilation with Berkeley DB 5.0 and 6.0. Patch from Allan E Johannesen of Worcester Polytechnic Institute. CONFIG: FEATURE(`nopercenthack') takes one parameter: reject or nospecial which describes whether to disallow "%" in the local part of an address. DEVTOOLS: Fix regression in auto-detection of libraries when only shared libraries are available. Problem reported by Bryan Costales. LIBMILTER: Mark communication socket as close-on-exec in case a user's filter starts other applications. Based on patch from Paul Howarth. Portability: SunOS 5.12 has changed the API for sigwait(2) to conform with XPG7. Based on patch from Roger Faulkner of Oracle. Deleted Files: libsm/path.c @ text @d1 1 a1 1 $NetBSD: patch-az,v 1.1 2014/06/15 20:48:50 jnemeth Exp $ d3 1 a3 1 --- sendmail/srvrsmtp.c.orig 2014-11-12 03:02:04.000000000 +0000 d16 47 a62 1 @@@@ -3983,8 +3987,8 @@@@ smtp_data(smtp, e) @ 1.1 log @Update to sendmail 8.14.9: this fixes a minor potential security issue pkgsrc changes: - consolidate several patches into site.config.m4 - pkgsrc LDFLAGS should always be used - don't bother specifying file owner/group anywhere except in Makefile - create include/sm/os/sm_os_netbsd.h to fix warnings and OS specific stuff - install mail.local and rmail - convert to use res_n* functions - allows for linking against threaded libraries - add a TODO file - PR/35249 - Loren M. Lang - can't find libraries on Linux, this should be fixed by using pkgsrc LDFLAGS - PR/46694 - Makoto Fujiwara - bring back netbsd-proto.mc from when sendmail was part of the base system - PR/47207 - Richard Palo - let pkgsrc infrastructure handle file ownership and group - PR/48566 - Emmanuel Dreyfus - always set _FFR_USE_GETPWNAM_ERRNO on NetBSD - roll ffr_tls_1 and the suggested ffr_tls_ec into one new ffr_tls option - not enabled by default because it changes behaviour 8.14.9/8.14.9 2014/05/21 SECURITY: Properly set the close-on-exec flag for file descriptors (except stdin, stdout, and stderr) before executing mailers. Fix a misformed comment in conf.c: "/*" within comment which may cause a compilation error on some systems. Problem reported by John Beck of Oracle. DEVTOOLS: Fix regression in auto-detection of libraries when only shared libraries are available. Problem reported by Bryan Costales. @ text @d1 1 a1 1 $NetBSD$ d3 1 a3 1 --- sendmail/srvrsmtp.c.orig 2014-05-16 20:40:15.000000000 +0000 d16 1 a16 1 @@@@ -3731,8 +3735,8 @@@@ smtp_data(smtp, e) d26 1 a26 1 @