head 1.27; access; symbols pkgsrc-2023Q4:1.26.0.36 pkgsrc-2023Q4-base:1.26 pkgsrc-2023Q3:1.26.0.34 pkgsrc-2023Q3-base:1.26 pkgsrc-2023Q2:1.26.0.32 pkgsrc-2023Q2-base:1.26 pkgsrc-2023Q1:1.26.0.30 pkgsrc-2023Q1-base:1.26 pkgsrc-2022Q4:1.26.0.28 pkgsrc-2022Q4-base:1.26 pkgsrc-2022Q3:1.26.0.26 pkgsrc-2022Q3-base:1.26 pkgsrc-2022Q2:1.26.0.24 pkgsrc-2022Q2-base:1.26 pkgsrc-2022Q1:1.26.0.22 pkgsrc-2022Q1-base:1.26 pkgsrc-2021Q4:1.26.0.20 pkgsrc-2021Q4-base:1.26 pkgsrc-2021Q3:1.26.0.18 pkgsrc-2021Q3-base:1.26 pkgsrc-2021Q2:1.26.0.16 pkgsrc-2021Q2-base:1.26 pkgsrc-2021Q1:1.26.0.14 pkgsrc-2021Q1-base:1.26 pkgsrc-2020Q4:1.26.0.12 pkgsrc-2020Q4-base:1.26 pkgsrc-2020Q3:1.26.0.10 pkgsrc-2020Q3-base:1.26 pkgsrc-2020Q2:1.26.0.8 pkgsrc-2020Q2-base:1.26 pkgsrc-2020Q1:1.26.0.4 pkgsrc-2020Q1-base:1.26 pkgsrc-2019Q4:1.26.0.6 pkgsrc-2019Q4-base:1.26 pkgsrc-2019Q3:1.26.0.2 pkgsrc-2019Q3-base:1.26 pkgsrc-2019Q2:1.23.0.34 pkgsrc-2019Q2-base:1.23 pkgsrc-2019Q1:1.23.0.32 pkgsrc-2019Q1-base:1.23 pkgsrc-2018Q4:1.23.0.30 pkgsrc-2018Q4-base:1.23 pkgsrc-2018Q3:1.23.0.28 pkgsrc-2018Q3-base:1.23 pkgsrc-2018Q2:1.23.0.26 pkgsrc-2018Q2-base:1.23 pkgsrc-2018Q1:1.23.0.24 pkgsrc-2018Q1-base:1.23 pkgsrc-2017Q4:1.23.0.22 pkgsrc-2017Q4-base:1.23 pkgsrc-2017Q3:1.23.0.20 pkgsrc-2017Q3-base:1.23 pkgsrc-2017Q2:1.23.0.16 pkgsrc-2017Q2-base:1.23 pkgsrc-2017Q1:1.23.0.14 pkgsrc-2017Q1-base:1.23 pkgsrc-2016Q4:1.23.0.12 pkgsrc-2016Q4-base:1.23 pkgsrc-2016Q3:1.23.0.10 pkgsrc-2016Q3-base:1.23 pkgsrc-2016Q2:1.23.0.8 pkgsrc-2016Q2-base:1.23 pkgsrc-2016Q1:1.23.0.6 pkgsrc-2016Q1-base:1.23 pkgsrc-2015Q4:1.23.0.4 pkgsrc-2015Q4-base:1.23 pkgsrc-2015Q3:1.23.0.2 pkgsrc-2015Q3-base:1.23 pkgsrc-2015Q2:1.22.0.10 pkgsrc-2015Q2-base:1.22 pkgsrc-2015Q1:1.22.0.8 pkgsrc-2015Q1-base:1.22 pkgsrc-2014Q4:1.22.0.6 pkgsrc-2014Q4-base:1.22 pkgsrc-2014Q3:1.22.0.4 pkgsrc-2014Q3-base:1.22 pkgsrc-2014Q2:1.22.0.2 pkgsrc-2014Q2-base:1.22 pkgsrc-2014Q1:1.20.0.6 pkgsrc-2014Q1-base:1.20 pkgsrc-2013Q4:1.20.0.4 pkgsrc-2013Q4-base:1.20 pkgsrc-2013Q3:1.20.0.2 pkgsrc-2013Q3-base:1.20 pkgsrc-2013Q2:1.19.0.6 pkgsrc-2013Q2-base:1.19 pkgsrc-2013Q1:1.19.0.4 pkgsrc-2013Q1-base:1.19 pkgsrc-2012Q4:1.19.0.2 pkgsrc-2012Q4-base:1.19 pkgsrc-2012Q3:1.18.0.4 pkgsrc-2012Q3-base:1.18 pkgsrc-2012Q2:1.18.0.2 pkgsrc-2012Q2-base:1.18 pkgsrc-2012Q1:1.17.0.44 pkgsrc-2012Q1-base:1.17 pkgsrc-2011Q4:1.17.0.42 pkgsrc-2011Q4-base:1.17 pkgsrc-2011Q3:1.17.0.40 pkgsrc-2011Q3-base:1.17 pkgsrc-2011Q2:1.17.0.38 pkgsrc-2011Q2-base:1.17 pkgsrc-2011Q1:1.17.0.36 pkgsrc-2011Q1-base:1.17 pkgsrc-2010Q4:1.17.0.34 pkgsrc-2010Q4-base:1.17 pkgsrc-2010Q3:1.17.0.32 pkgsrc-2010Q3-base:1.17 pkgsrc-2010Q2:1.17.0.30 pkgsrc-2010Q2-base:1.17 pkgsrc-2010Q1:1.17.0.28 pkgsrc-2010Q1-base:1.17 pkgsrc-2009Q4:1.17.0.26 pkgsrc-2009Q4-base:1.17 pkgsrc-2009Q3:1.17.0.24 pkgsrc-2009Q3-base:1.17 pkgsrc-2009Q2:1.17.0.22 pkgsrc-2009Q2-base:1.17 pkgsrc-2009Q1:1.17.0.20 pkgsrc-2009Q1-base:1.17 pkgsrc-2008Q4:1.17.0.18 pkgsrc-2008Q4-base:1.17 pkgsrc-2008Q3:1.17.0.16 pkgsrc-2008Q3-base:1.17 cube-native-xorg:1.17.0.14 cube-native-xorg-base:1.17 pkgsrc-2008Q2:1.17.0.12 pkgsrc-2008Q2-base:1.17 cwrapper:1.17.0.10 pkgsrc-2008Q1:1.17.0.8 pkgsrc-2008Q1-base:1.17 pkgsrc-2007Q4:1.17.0.6 pkgsrc-2007Q4-base:1.17 pkgsrc-2007Q3:1.17.0.4 pkgsrc-2007Q3-base:1.17 pkgsrc-2007Q2:1.17.0.2 pkgsrc-2007Q2-base:1.17 pkgsrc-2007Q1:1.16.0.2 pkgsrc-2007Q1-base:1.16 pkgsrc-2006Q4:1.15.0.6 pkgsrc-2006Q4-base:1.15 pkgsrc-2006Q3:1.15.0.4 pkgsrc-2006Q3-base:1.15 pkgsrc-2006Q2:1.15.0.2 pkgsrc-2006Q2-base:1.15 pkgsrc-2006Q1:1.13.0.4 pkgsrc-2006Q1-base:1.13 pkgsrc-2005Q4:1.13.0.2 pkgsrc-2005Q4-base:1.13 pkgsrc-2005Q3:1.10.0.2 pkgsrc-2005Q3-base:1.10 pkgsrc-2005Q2:1.6.0.2 pkgsrc-2005Q2-base:1.6 pkgsrc-2005Q1:1.4.0.2 pkgsrc-2005Q1-base:1.4 pkgsrc-2004Q4:1.3.0.2 pkgsrc-2004Q4-base:1.3 pkgsrc-2004Q3:1.2.0.2 pkgsrc-2004Q3-base:1.2; locks; strict; comment @# @; 1.27 date 2024.01.15.04.43.22; author jnemeth; state Exp; branches; next 1.26; commitid ibRTU6YcoLIM7vUE; 1.26 date 2019.07.15.05.30.33; author jnemeth; state Exp; branches; next 1.25; commitid m61ouFnqEHAXe6vB; 1.25 date 2019.07.15.04.32.49; author jnemeth; state Exp; branches; next 1.24; commitid jIGa2kaE2N2eT5vB; 1.24 date 2019.07.15.02.06.42; author jnemeth; state Exp; branches; next 1.23; commitid ELNR2eQxnQc785vB; 1.23 date 2015.07.11.10.08.32; author jnemeth; state Exp; branches; next 1.22; commitid m1Z58SvKc3AZTQsy; 1.22 date 2014.06.15.21.04.30; author jnemeth; state Exp; branches; next 1.21; commitid tPGp11AtSHeL6FEx; 1.21 date 2014.06.15.20.48.49; author jnemeth; state Exp; branches; next 1.20; commitid y0gYCG4vNLA71FEx; 1.20 date 2013.09.19.10.54.05; author manu; state Exp; branches; next 1.19; commitid KRA7jNTfzpSwm26x; 1.19 date 2012.12.28.05.27.06; author jnemeth; state Exp; branches; next 1.18; 1.18 date 2012.06.12.15.45.58; author wiz; state Exp; branches; next 1.17; 1.17 date 2007.04.26.06.26.27; author jnemeth; state Exp; branches; next 1.16; 1.16 date 2007.01.20.20.08.32; author tv; state Exp; branches; next 1.15; 1.15 date 2006.05.31.18.22.24; author ghen; state Exp; branches; next 1.14; 1.14 date 2006.04.13.21.45.14; author wiz; state Exp; branches; next 1.13; 1.13 date 2005.10.20.15.10.01; author adrianp; state Exp; branches; next 1.12; 1.12 date 2005.10.20.15.07.26; author adrianp; state Exp; branches; next 1.11; 1.11 date 2005.10.05.13.29.50; author wiz; state Exp; branches; next 1.10; 1.10 date 2005.08.01.15.27.00; author wiz; state Exp; branches; next 1.9; 1.9 date 2005.07.18.21.33.24; author adrianp; state Exp; branches; next 1.8; 1.8 date 2005.07.16.01.19.13; author jlam; state Exp; branches; next 1.7; 1.7 date 2005.07.02.01.12.52; author tv; state Exp; branches; next 1.6; 1.6 date 2005.05.31.10.01.38; author dillo; state Exp; branches; next 1.5; 1.5 date 2005.03.28.09.39.57; author jlam; state Exp; branches; next 1.4; 1.4 date 2005.01.02.11.59.36; author adrianp; state Exp; branches; next 1.3; 1.3 date 2004.11.17.19.56.49; author xtraeme; state Exp; branches; next 1.2; 1.2 date 2004.09.02.21.09.17; author adrianp; state Exp; branches; next 1.1; 1.1 date 2004.08.30.20.16.28; author adrianp; state Exp; branches; next ; desc @@ 1.27 log @Update to sendmail 8.17.2: some feature updates and a bunch of bug fixes. pkgsrc changes: - remove some backported patches now included upstream - rename blacklistd option to blacklist to match defaults/mk.conf - accept old opiton blacklistd - add new smtputf8 option to enable SMTP SMTPUTF8 protocol option SENDMAIL RELEASE NOTES This listing shows the version of the sendmail binary, the version of the sendmail configuration files, the date of release, and a summary of the changes in that release. 8.17.2/8.17.2 2023/06/03 Make sure DANE checks (if enabled) are performed even if CACertPath or CACertFile are not set or unusable. Note: if the code to set up TLS in the client fails, then {verify} will be set to TEMP but DANE requirements will be ignored, i.e., by default mail will be sent without STARTTLS. This can be changed via a LOCAL_TLS_SERVER ruleset. Pass server name to clt_features ruleset instead of client name to account for limitations in macro availability described below in CONFIG section. This may break custom clt_features rulesets which expect to receive the client name as input. Fix a regression introduced in 8.17.1: aliases file which contain continuation lines caused parsing errors. Add an FFR (for future release) compile time option _FFR_LOG_STAGE to log the protocol stage as stage= for some errors during delivery attempts to make troubleshooting simpler. This new logging may be enabled in a future release. When EAI is enabled, milters also got the arguments of MAIL/RCPT commands in argv[0] for xxfi_envfrom()/xxfi_envrcpt() callbacks instead of just the mail address. Problem reported by Dilyan Palauzo. When EAI is enabled, mailq prints UTF-8 addresses as such if SMTPUTF8 was used. When EAI is enabled, the $h macro is now in the correct format. Previously this could cause wrong values for relay= in log entries and the mailer argument vector. When the compile time option USE_EAI is enabled, vacation could fail to respond when it should. Problem reported by Alex Hautequest. When EAI was enabled, header truncation might not have been logged even when it happened. Problem reported by Werner Wiethege. Handle a possible change in an upcoming release of Cyrus-SASL (2.1.28) by changing the definition of an internal flag. Patch from Dilyan Palauzo. Avoid an assertion failure when an smtps connection is made to the server and a milter is unavailable. Problem reported by Dilyan Palauzo. Fixed some spelling errors in documentation and comments, based on a codespell report by Jens Schleusener of fossies.org. The result of try_tls is now logged using status= instead of reject=. If tls_rcpt rejected the delivery of a recipient then a bogus dsn= entry might have been logged under some circumstances. If a server replied with 421 to a RCPT command then a bogus reply= might have been logged. When quoting the value for ${currHeader} avoid causing a syntax error (Unbalanced '"') when truncating a header value which is too long. Problem reported by Werner Wiethege. Reduce the performance impact of a change introduced in 8.12.9: the default for MaxMimeHeaderLength was set to 2048/1024. Problem reported by Tabata Shintaro of Internet Initiative Japan Inc. CONFIG: The default clt_features ruleset tried to access ${server_name} and ${server_addr} which are not set when the ruleset is invoked. Only the server name is available which is passed as an argument. CONFIG: Properly quote host variable to prevent cf build breakage when a hostname contains 'dnl'. Problem reported by Maxim Shalomikhin of Kaspersky. DEVTOOLS: Add configure.sh support for BSD's mandoc as an alternative man page formatting tool. DOC: Document that USAGE is a possible value for {verify}. LIBMILTER: The macros for the EOH and EOM callbacks are sent in reverse order which means accessing macros in the EOM callback got the macro for the EOH callback. Store those macros in the expected order in libmilter. Note: this does not affect sendmail because the macros for both callbacks are the same because the message is sent to libmilter after it is completely read by sendmail. Fix and problem report from David Buergin. Portability: Make use of IN_LOOPBACK, if defined, to determine if using a loopback address. Patch from Mike Karels of FreeBSD. On Linux use gethostbyname2(3) if glibc 2.19 or newer is used to avoid potential problems with IPv6 lookups. Patch from Werner Wiethege. Add support for Darwin 21 and Darwin 22. Solaris 12 has been renamed to Solaris 11.4, hence adapt a condition for sigwait(2) taking one argument. Patch from John Beck. New Files: devtools/M4/UNIX/sharedlib.m4 devtools/OS/Darwin.21.x devtools/OS/Darwin.22.x sendmail/sched.c libsm/notify.h 8.17.1/8.17.1 2021/08/17 Deprecation notice: due to compatibility problems with some third party code, we plan to finally switch from K&R to ANSI C. If you are using sendmail on a system which does not have a compiler for ANSI C contact us with details as soon as possible so we can determine how to proceed. Experimental support for SMTPUTF8 (EAI, see RFC 6530-6533) is available when using the compile time option USE_EAI (see also devtools/Site/site.config.m4.sample for other required settings) and the cf option SMTPUTF8. If a mail submission via the command line requires the use of SMTPUTF8, e.g., because a header uses UTF-8 encoding, but the addresses on the command line are all ASCII, then the new option -U must be used, and the cf option SMTPUTF8 must be set in submit.cf. Please test and provide feedback. Experimental support for SMTP MTA Strict Transport Security (MTA-STS, see RFC 8461) is available when using - the compile time option _FFR_MTA_STS (which requires STARTTLS, MAP_REGEX, SOCKETMAP, and _FFR_TLS_ALTNAMES), - FEATURE(sts), which implicitly sets the cf option StrictTransportSecurity, - postfix-mta-sts-resolver, see https://github.com/Snawoot/postfix-mta-sts-resolver.git New ruleset check_other which is called for all unknown SMTP commands in the server and for commands which do not have specific rulesets, e.g., NOOP and VERB. New ruleset clt_features which can be used to select features in the SMTP client per server. Currently only two flags are available: D/M to disable DANE/MTA-STS, respectively. New compile time option NO_EOH_FIELDS to disable the special meaning of the headers Message: and Text: to denote the end of the message header. Avoid leaking session macros for an envelope between delivery attempts to different servers. This problem could have affected check_compat. Avoid leaking actual SMTP replies between delivery attempts to different servers which could cause bogus logging of reply= entries. Change default SMTP reply code for STARTTLS related problems from 403 to 454 to better match the RFCs. Fix a theoretical buffer overflow when encountering an unknown/unsupported socket address family on an operating system where sa_data is larger than 30 (the standard is 14). Based on patch by Toomas Soome. Several potential memory leaks and other similar problems (mostly in error handling code) have been fixed. Problems reported by Tomas Korbar of RedHat. Previously the commands GET, POST, CONNECT, or USER terminate a connection immediately only if sent as first command. Now this is also done if any of these is sent directly after STARTTLS or if the 'h' option is set via srv_features. CDB map locking has been changed so a sendmail process which does have a CDB map open does not block an in-place update of the map by makemap. The simple workaround for that problem in earlier versions is to create the map under a different name and then move it into place. On some systems the rejection of a RCPT by a milter could silently fail. CONFIG: New FEATURE(`check_other') to provide a default check_other ruleset. CONFIG: FEATURE(`tls_failures') is deprecated and will be removed in future versions because it has a fundamental problem: it is message oriented but STARTTLS is session oriented. For example, having multiple RCPTs in one envelope for different destinations, with different temporary errors, does not work properly, as the persistent macro applies to all RCPTs and hence implicitly to all destinations (servers). The option TLSFallbacktoClear should be used if needed. CONTRIB: AuthRealm.p0 has been modified for 8.16.1 by Anne Bennett. CONTRIB: Added cidrexpand -O option for suppressing duplicates from a CIDR expansion that overlaps a later entry and -S option for skipping comments exactly like makemap does. MAIL.LOCAL: Enhance some error messages to simplify troubleshooting. Portability: Add support for Darwin 19 & 20. Use proper FreeBSD version define to allow for cross compiling. Fix from Brooks Davis of the FreeBSD project. NOTE: File locking using fcntl() does not interoperate with Berkeley DB 5.x (and probably later). Use CDB, flock() (-DHASFLOCK), or an earlier Berkeley DB version. Problem noted by Harald Hannelius. New Files: cf/feature/check_other.m4 cf/feature/sts.m4 devtools/OS/Darwin.19.x devtools/OS/Darwin.20.x include/sm/ixlen.h libsm/ilenx.c libsm/lowercase.c libsm/strcaseeq.c libsm/t-ixlen.c libsm/t-ixlen.sh libsm/t-streq.c libsm/t-streq.sh libsm/utf8_valid.c libsm/uxtext_unquote.c libsm/xleni.c libsmutil/t-lockfile.c libsmutil/t-lockfile-0.sh libsmutil/t-maplock-0.sh @ text @# $NetBSD: options.mk,v 1.26 2019/07/15 05:30:33 jnemeth Exp $ PKG_OPTIONS_VAR= PKG_OPTIONS.sendmail PKG_SUPPORTED_OPTIONS= inet6 db2 db4 ldap sasl tls tcpwrappers PKG_SUPPORTED_OPTIONS+= sendmail-ffr-tls sendmail-ffr-badrcptshutdown PKG_SUPPORTED_OPTIONS+= smtputf8 PKG_SUGGESTED_OPTIONS= inet6 tcpwrappers tls .include "../../mk/bsd.prefs.mk" .for dir in ${COMPILER_INCLUDE_DIRS} . if exists(${dir}/blacklist.h) PKG_SUPPORTED_OPTIONS+= blacklist PKG_SUGGESTED_OPTIONS+= blacklist PKG_OPTIONS_LEGACY_OPTS+= blacklistd:blacklist . endif .endfor PKG_OPTIONS_LEGACY_OPTS+= starttls:tls ffr_tls_1:sendmail-ffr-tls .include "../../mk/bsd.options.mk" ### ### Berkeley DB version 2/4 format for on disk databases e.g. aliases ### .if !empty(PKG_OPTIONS:Mdb2) . include "../../databases/db/buildlink3.mk" .elif !empty(PKG_OPTIONS:Mdb4) . include "../../databases/db4/buildlink3.mk" .endif ### ### Use OpenLDAP for remote database access ### .if !empty(PKG_OPTIONS:Mldap) . include "../../databases/openldap-client/buildlink3.mk" .endif ### ### Use SASL/v2 for SMTP AUTH ### .if !empty(PKG_OPTIONS:Msasl) . include "../../security/cyrus-sasl/buildlink3.mk" .endif ### ### Use OpenSSL libraries for SMTP STARTTLS support ### .if !empty(PKG_OPTIONS:Mtls) . include "../../security/openssl/buildlink3.mk" .endif ### ### 'For Future Release' _FFR_TLS_* options: CipherList, multiple certs ### # Nothing to do here, activation is done in Makefile ### ### 'For Future Release' _FFR_BADRCPT_SHUTDOWN options: ### BadRcptShutdown, BadRcptShutdownGood ### # Nothing to do here, activation is done in Makefile ### ### Use tcpwrappers for network access control to sendmail ### .if !empty(PKG_OPTIONS:Mtcpwrappers) . include "../../security/tcp_wrappers/buildlink3.mk" .endif ### ### IPv6 support. ### .if !empty(PKG_OPTIONS:Minet6) .endif ### ### NetBSD blacklistd(8) support. ### # Nothing to do here, activation is done in Makefile ### ### SMTPUTF8 support ### .if !empty(PKG_OPTIONS:Msmtputf8) . include "../../textproc/icu/buildlink3.mk" .endif @ 1.26 log @Change from using ${OPSYS} to looking for /usr/include/blacklist.h to determine whether to use the blacklistd feature. This allows for automatically picking up new OSes that provide blacklistd as well as ignoring older versions of NetBSD and FreeBSD that don't have blacklistd. Add UseBlacklist to M4 config generator. This means that you can turn it on by doing something like: LOCAL_CONFIG ... define(`confUSE_BLACKLIST', `True')dnl ... It is set to false as the feature is experimental having just been created. Ride previous PKGREVISION bump as it was less than an hour ago. @ text @d1 1 a1 1 # $NetBSD: options.mk,v 1.25 2019/07/15 04:32:49 jnemeth Exp $ d6 1 d13 3 a15 2 PKG_SUPPORTED_OPTIONS+= blacklistd PKG_SUGGESTED_OPTIONS+= blacklistd d82 7 @ 1.25 log @Add support for working with blacklistd. These patches were originally created for FreeBSD and were ported to pkgsrc by Hauke Fath with some cleanup by myself. These patches add a new "UseBlacklist" option to sendmail to have it send authentication failure notices to blacklistd. @ text @d1 1 a1 1 # $NetBSD: options.mk,v 1.24 2019/07/15 02:06:42 jnemeth Exp $ d10 2 a11 1 .if ${OPSYS} == "NetBSD" || ${OPSYS} == "FreeBSD" d14 2 a15 1 .endif @ 1.24 log @Add sendmail-ffr-badrcptshutdown option. This option enables the sendmail options BadRcptShutdown and BadRcptShutdownGood to be used. "ffr" stands for For Future Release, which means it is a beta test feature that may show up in a future release of sendmail. The sendmail-ffr-badrcptshutdown option is disabled by default so no change to binary packages, thus not bumping PKGREVISION. @ text @d1 1 a1 1 # $NetBSD: options.mk,v 1.23 2015/07/11 10:08:32 jnemeth Exp $ d8 7 d72 6 @ 1.23 log @Update sendmail to 8.15.2. pkgsrc change: default to enable TLS - this has been requested a couple of times and most systems are going to have a recent enough version of openssl so in most cases there won't be additional dependencies 8.15.2/8.15.2 2015/07/03 If FEATURE(`nopercenthack') is used then some bogus input triggered a recursion which was caught and logged as SYSERR: rewrite: excessive recursion (max 50) ... Fix based on patch from Ondrej Holas. DHParameters now by default uses an included 2048 bit prime. The value 'none' previously caused a log entry claiming there was an error "cannot read or set DH parameters". Also note that this option applies to the server side only. The U= mailer field didn't accept group names containing hyphens, underbars, or periods. Based on patch from David Gwynne of the University of Queensland. CONFIG: Allow connections from IPv6:0:0:0:0:0:0:0:1 to relay again. Patch from Lars-Johan Liman of Netnod Internet Exchange. CONFIG: New option UseCompressedIPv6Addresses to select between compressed and uncompressed IPv6 addresses. The default value depends on the compile-time option IPV6_FULL: For 1 the default is False, for 0 it is True, thus preserving the current behaviour. Based on patch from John Beck of Oracle. CONFIG: Account for IPv6 localhost addresses in FEATURE(`block_bad_helo'). Suggested by Andrey Chernov from FreeBSD and Robert Scheck from the Fedora Project. CONFIG: Account for IPv6 localhost addresses in check_mail ruleset. LIBMILTER: Deal with more invalid protocol data to avoid potential crashes. Problem noted by Dimitri Kirchner. LIBMILTER: Allow a milter to specify an empty macro list ("", not NULL) in smfi_setsymlist() so no macro is sent for the selected stage. MAKEMAP: A change to check TrustedUser in fewer cases which was made in 2013 caused a potential regression when makemap was run as root (which should not be done anyway). Note: sendmail often contains options "For Future Releases" (prefix _FFR_) which might be enabled in a subsequent version or might simply be removed as they turned out not to be really useful. These features are usually not documented but if they are, then the required (FFR) options are listed in - doc/op/op.* for rulesets and macros, - cf/README for mc/cf options. @ text @d1 1 a1 1 # $NetBSD: options.mk,v 1.22 2014/06/15 21:04:30 jnemeth Exp $ d5 1 a5 1 PKG_SUPPORTED_OPTIONS+= sendmail-ffr-tls d43 7 a49 1 ### 'For Future Release' FFR_TLS_* options: CipherList, multiple certs @ 1.22 log @Rename ffr-tls option to sendmail-ffr-tls as requested by wiz@@. Ride version change done a few minutes ago. @ text @d1 1 a1 1 # $NetBSD: options.mk,v 1.21 2014/06/15 20:48:49 jnemeth Exp $ d6 1 a6 1 PKG_SUGGESTED_OPTIONS= inet6 tcpwrappers @ 1.21 log @Update to sendmail 8.14.9: this fixes a minor potential security issue pkgsrc changes: - consolidate several patches into site.config.m4 - pkgsrc LDFLAGS should always be used - don't bother specifying file owner/group anywhere except in Makefile - create include/sm/os/sm_os_netbsd.h to fix warnings and OS specific stuff - install mail.local and rmail - convert to use res_n* functions - allows for linking against threaded libraries - add a TODO file - PR/35249 - Loren M. Lang - can't find libraries on Linux, this should be fixed by using pkgsrc LDFLAGS - PR/46694 - Makoto Fujiwara - bring back netbsd-proto.mc from when sendmail was part of the base system - PR/47207 - Richard Palo - let pkgsrc infrastructure handle file ownership and group - PR/48566 - Emmanuel Dreyfus - always set _FFR_USE_GETPWNAM_ERRNO on NetBSD - roll ffr_tls_1 and the suggested ffr_tls_ec into one new ffr_tls option - not enabled by default because it changes behaviour 8.14.9/8.14.9 2014/05/21 SECURITY: Properly set the close-on-exec flag for file descriptors (except stdin, stdout, and stderr) before executing mailers. Fix a misformed comment in conf.c: "/*" within comment which may cause a compilation error on some systems. Problem reported by John Beck of Oracle. DEVTOOLS: Fix regression in auto-detection of libraries when only shared libraries are available. Problem reported by Bryan Costales. @ text @d1 1 a1 1 # $NetBSD: options.mk,v 1.20 2013/09/19 10:54:05 manu Exp $ d4 2 a5 1 PKG_SUPPORTED_OPTIONS= inet6 db2 db4 ldap sasl tls tcpwrappers ffr-tls d8 1 a8 1 PKG_OPTIONS_LEGACY_OPTS+= starttls:tls ffr_tls_1:ffr-tls @ 1.20 log @Add a ffr_tls_1 option to sendmail, which enable the O CipherList option for sendmail.cf. it is required in order to remove weak ciphers, and enforce Forward Secrecy on modern MUA Usage example: O CipherList=DH@@STRENGTH:HIGH:!MD5:!DES:!aNULL:!eNULL @ text @d1 1 a1 1 # $NetBSD: options.mk,v 1.19 2012/12/28 05:27:06 jnemeth Exp $ d4 1 a4 1 PKG_SUPPORTED_OPTIONS= inet6 db2 ldap sasl tls tcpwrappers ffr_tls_1 d7 1 a7 1 PKG_OPTIONS_LEGACY_OPTS+= starttls:tls d12 1 a12 1 ### Berkeley DB version 2 format for on disk databases e.g. aliases d16 2 d42 1 a42 1 ### 'For Future Release' FFR_TLS_1 options: CipherList, multiple certs @ 1.19 log @sendmail is incompatible with current versions of databases/db4 as the latter is now threaded, so delete the option @ text @d1 1 a1 1 # $NetBSD: options.mk,v 1.18 2012/06/12 15:45:58 wiz Exp $ d4 1 a4 1 PKG_SUPPORTED_OPTIONS= inet6 db2 ldap sasl tls tcpwrappers d40 5 @ 1.18 log @Add inet6 to default suggested options. It's 2012. @ text @d1 1 a1 1 # $NetBSD: options.mk,v 1.17 2007/04/26 06:26:27 jnemeth Exp $ d4 1 a4 1 PKG_SUPPORTED_OPTIONS= inet6 db2 db4 ldap sasl tls tcpwrappers d12 1 a12 1 ### Berkeley DB version 2/4 format for on disk databases e.g. aliases a15 2 .elif !empty(PKG_OPTIONS:Mdb4) . include "../../databases/db4/buildlink3.mk" @ 1.17 log @Update to sendmail-8.14.1. Major changes since sendmail-8.13.8: 8.14.1/8.14.1 2007/04/03 Even though a milter rejects a recipient the MTA will still keep it in its list of recipients and deliver to it if the transaction is accepted. This is a regression introduced in 8.14.0 due to the change for SMFIP_RCPT_REJ. Bug found by Andy Fiddaman. The new DaemonPortOptions which begin with a lower case character could not be set in 8.14.0. If a server shut down the connection in response to a STARTTLS command, sendmail would log a misleading error message due to an internal inconsistency. Problem found by Werner Wiethege. Document how some sendmail.cf options change the behavior of mailq. Noted by Paul Menchini of the North Carolina School of Science and Mathematics. CONFIG: Add confSOFT_BOUNCE m4 option for setting SoftBounce. CONFIG: 8.14.0's RELEASE_NOTES failed to mention the addition of the confMAX_NOOP_COMMANDS and confSHARED_MEMORY_KEY_FILE m4 options for setting MaxNOOPCommands and SharedMemoryKeyFile. CONFIG: Add confMILTER_MACROS_EOH and confMILTER_MACROS_DATA m4 options for setting Milter.macros.eoh and Milter.macros.data. CONTRIB: Use flock() and fcntl() in qtool.pl if necessary. Patch from Daniel Carroll of Mesa State College. LIBMILTER: Make sure an unknown command does not affect the currently available macros. Problem found by Andy Fiddaman. LIBMILTER: The MTA did not offer SMFIF_SETSYMLIST during option negotiation. Problem reported by Bryan Costales. LIBMILTER: Fix several minor errors in the documentation. Patches from Bryan Costales. PORTABILITY FIXES: AIX 5.{1,2}: libsm/util.c failed to compile due to redefinition of several macros, e.g., SIG_ERR. Patch from Jim Pirzyk with assistance by Bob Booth, University of Illinois at Urbana-Champaign. Add support for QNX.6. Patch from Sean Boudreau of QNX Software Systems. New Files: devtools/M4/depend/QNX6.m4 devtools/OS/QNX.6.x include/sm/os/sm_os_qnx.h New Files added in 8.14.0, but not shown in the release notes entry: libmilter/docs/smfi_chgfrom.html libmilter/docs/smfi_version.html 8.14.0/8.14.0 2007/01/31 Header field values are now 8 bit clean. Notes: - header field names are still restricted to 7 bit. - RFC 2822 allows only 7 bit (US-ASCII) characters in headers. Preserve spaces after the colon in a header. Previously, any number of spaces after the colon would be changed to exactly one space. In some cases of deeply nested aliases/forwarding, mail can be silently lost. Moreover, the MaxAliasRecursion limit may be reached too early, e.g., the counter may be off by a factor of 4 in case of a sequence of .forward files that refer to others. Patch from Motonori Nakamura of Kyoto University. Fix a regression in 8.13.8: if InputMailFilters is set then "sendmail -bs" can trigger an assertion because the hostname of the client is undefined. It is now set to "localhost" for the xxfi_connect() callback. Avoid referencing a freed variable during cleanup when terminating. Problem reported and diagnosed by Joe Maimon. New option HeloName to set the name for the HELO/EHLO command. Patch from Nik Clayton. New option SoftBounce to issue temporary errors (4xy) instead of permanent errors (5xy). This can be useful for testing. New suboptions for DaemonPortOptions to set them individually per daemon socket: DeliveryMode DeliveryMode refuseLA RefuseLA delayLA DelayLA queueLA QueueLA children MaxDaemonChildren New option -K for LDAP maps to replace %1 through %9 in the lookup key with the LDAP escaped contents of the arguments specified in the map lookup. Loosely based on patch from Wolfgang Hottgenroth. Log the time after which a greet_pause delay triggered. Patch from Nik Clayton. If a client is rejected via TCP wrapper or some other check performed by validate_connection() (in conf.c) then do not also invoke greet_pause. Problem noted by Jim Pirzyk of the University of Illinois at Urbana-Champaign. If a client terminates the SMTP connection during a pause introduced by greet_pause, then a misleading message was logged previously. Problem noted by Vernon Schryver et.al., patch from Matej Vela. New command "mstat" for control socket to provide "machine readable" status. New named config file rule check_eom which is called at the end of a message, its parameter is the size of the message. If the macro {addr_type} indicates that the current address is a header address it also distinguishes between recipient and sender addresses (as it is done for envelope addresses). When a macro is set in check_relay, then its value is accessible by all transactions in the same SMTP session. Increase size of key for ldap lookups to 1024 (MAXKEY). New option MaxNOOPCommands to override default of 20 for the number of "useless" commands before the SMTP server will slow down responding. New option SharedMemoryKeyFile: if shared memory support is enabled, the MTA can be asked to select a shared memory key itself by setting SharedMemoryKey to -1 and specifying a file where to store the selected key. Try to deal with open HTTP proxies that are used to send spam by recognizing some commands from them. If the first command from the client is GET, POST, CONNECT, or USER, then the connection is terminated immediately. New PrivacyOptions noactualrecipient to avoid putting X-Actual-Recipient lines in DSNs revealing the actual account that addresses map to. Patch from Dan Harkless. New options B, z, and Z for DNS maps: -B: specify a domain that is always appended to queries. -z: specify the delimiter at which to cut off the result of a query if it is too long. -Z: specify the maximum number of entries to be concatenated to form the result of a lookup. New target "check" in the Makefile of libsm: instead of running tests implicitly while building libsm, they must be explicitly started by using "make check". Fixed some inconsistent checks for NULL pointers that have been reported by the SATURN tool which has been developed by Isil Dillig and Thomas Dillig of Stanford University. Fix a potential race condition caused by a signal handler for terminated child processes. Problem noted by David F. Skoll. When a milter deleted a recipient, that recipient could cause a queue group selection. This has been disabled as it was not intended. New operator 'r' for the arith map to return a random number. Patch from Motonori Nakamura of Kyoto University. New compile time option MILTER_NO_NAGLE to turn off the Nagle algorithm for communication with libmilter ("cork" on Linux), which may improve the communication performance on some operating systems. Patch from John Gardiner Myers of Proofpoint. If sendmail received input that contained a CR without subsequent LF (thus violating RFC 2821 (2.3.7)), it could previously generate an additional blank line in the output as the last line. Restarting persistent queue runners by sending a HUP signal to the "queue control process" (QCP) works now. Increase the length of an input line to 12288 to deal with really long lines during SMTP AUTH negotiations. Problem noted by Werner Wiethege. If ARPANET mode (-ba) was selected STARTTLS would fail (due to a missing initialization call for that case). Problem noted by Neil Rickert of Northern Illinois University. If sendmail is linked against a library that initializes Cyrus-SASL before sendmail did it (such as libnss-ldap), then SMTP AUTH could fail for the sendmail client. A patch by Moritz Both works around the API design flaw of Cyrus-SASLv2. CONFIG: Make it possible to unset the StatusFile option by undefining STATUS_FILE. By not setting StatusFile, the MTA will not attempt to open a statistics file on each delivery. CONFIG: New FEATURE(`require_rdns') to reject messages from SMTP clients whose IP address does not have proper reverse DNS. Contributed by Neil Rickert of Northern Illinois University and John Beck of Sun Microsystems. CONFIG: New FEATURE(`block_bad_helo') to reject messages from SMTP clients which provide a HELO/EHLO argument which is either unqualified, or is one of our own names (i.e., the server name instead of the client name). Contributed by Neil Rickert of Northern Illinois University and John Beck of Sun Microsystems. CONFIG: New FEATURE(`badmx') to reject envelope sender addresses (MAIL) whose domain part resolves to a "bad" MX record. Based on contribution from William Dell Wisner. CONFIG: New macros SMTP_MAILER_LL and RELAY_MAILER_LL to override the maximum line length of the smtp mailers. CONFIG: New option `relaytofulladdress' for FEATURE(`access_db') to allow entries in the access map to be of the form To:user@@example.com RELAY CONFIG: New subsuboptions eoh and data to specify the list of macros a milter should receive at those stages in the SMTP dialogue. CONFIG: New option confHELO_NAME for HeloName to set the name for the HELO/EHLO command. CONFIG: dnsbl and enhdnsbl can now also discard or quarantine messages by using those values as second argument. Patches from Nelson Fung. CONTRIB: cidrexpand uses a hash symbol as comment character and ignores everything after it unless it is in quotes or preceeded by a backslash. DEVTOOLS: New macro confMKDIR: if set to a program that creates directories, then it used for "make install" to create the required installation directories. DEVTOOLS: New macro confCCLINK to specify the linker to use for executables (defaults to confCC). LIBMILTER: A new version of the milter API has been created that has several changes which are listed below and documented in the webpages reachable via libmilter/docs/index.html. LIBMILTER: The meaning of the version macro SMFI_VERSION has been changed. It now refers only to the version of libmilter, not to the protocol version (which is used only internally, it is not user/milter-programmer visible). Additionally, a version function smfi_version() has been introduced such that a milter program can check the libmilter version also at runtime which is useful if a shared library is used. LIBMILTER: A new callback xxfi_negotiate() can be used to dynamically (i.e., at runtime) determine the available protocol actions and features of the MTA and also to specify which of these a milter wants to use. This allows for more flexibility than hardcoding these flags in the xxfi_flags field of the smfiDesc structure. LIBMILTER: A new callback xxfi_data() is available so milters can act on the DATA command. LIBMILTER: A new callback xxfi_unknown() is available so milters can receive also unknown SMTP commands. LIBMILTER: A new return code SMFIS_NOREPLY has been added which can be used by the xxfi_header() callback provided the milter requested the SMFIP_NOHREPL protocol action. LIBMILTER: The new return code SMFIS_SKIP can be used in the xxfi_body() callback to skip over further body chunks and directly advance to the xxfi_eom() callback. This is useful if a milter can make a decision based on the body chunks it already received without reading the entire rest of the body and the milter wants to invoke functions that are only available from the xxfi_eom() callback. LIBMILTER: A new function smfi_addrcpt_par() can be used to add new recipients including ESMTP parameters. LIBMILTER: A new function smfi_chgfrom() can be used to change the envelope sender including ESMTP parameters. LIBMILTER: A milter can now request to be informed about rejected recipients (RCPT) too. This requires to set the protocol flag SMFIP_RCPT_REJ during option negotiation. Whether a RCPT has been rejected can be checked by comparing the value of the macro {rcpt_mailer} with "error". LIBMILTER: A milter can now override the list of macros that it wants to receive from the MTA for each protocol step by invoking the function smfi_setsymlist() during option negotiation. LIBMILTER: A milter can receive header field values with all leading spaces by requesting the SMFIP_HDR_LEADSPC protocol action. Also, if the flag is set then the MTA does not add a leading space to headers that are added, inserted, or replaced. LIBMILTER: If a milter sets the reply code to "421" for the HELO callback, the SMTP server will terminate the SMTP session with that error to match the behavior of all other callbacks. New Files: cf/feature/badmx.m4 cf/feature/block_bad_helo.m4 cf/feature/require_rdns.m4 devtools/M4/UNIX/check.m4 include/sm/misc.h include/sm/sendmail.h include/sm/tailq.h libmilter/docs/smfi_addrcpt_par.html libmilter/docs/smfi_setsymlist.html libmilter/docs/xxfi_data.html libmilter/docs/xxfi_negotiate.html libmilter/docs/xxfi_unknown.html libmilter/example.c libmilter/monitor.c libmilter/worker.c libsm/memstat.c libsm/t-memstat.c libsm/t-qic.c libsm/util.c sendmail/daemon.h sendmail/map.h @ text @d1 1 a1 1 # $NetBSD: options.mk,v 1.16 2007/01/20 20:08:32 tv Exp $ d5 1 a5 1 PKG_SUGGESTED_OPTIONS= tcpwrappers @ 1.16 log @REPLACE_PERL works even if Perl is not registered as a dependency. So, compile socketmap support in unconditionally (as the Perl scripts are actually only examples of socketmap functionality; any language can be used in reality). Remove socketmap related OPTIONs completely. @ text @d1 1 a1 1 # $NetBSD: options.mk,v 1.15 2006/05/31 18:22:24 ghen Exp $ d16 1 a16 1 . elif !empty(PKG_OPTIONS:Mdb4) @ 1.15 log @The databases/openldap package has been split in -client and -server component packages. Convert LDAP-based applications to depend on openldap-client, and bump PKGREVISION for those that depend on it by default. @ text @d1 1 a1 1 # $NetBSD: options.mk,v 1.14 2006/04/13 21:45:14 wiz Exp $ d4 1 a4 1 PKG_SUPPORTED_OPTIONS= inet6 db2 db4 ldap sasl tls tcpwrappers sendmail-socketmap a7 1 PKG_OPTIONS_LEGACY_OPTS+= socketmap:sendmail-socketmap a48 8 ### Enable Sendmail SOCKETMAP support ### .if !empty(PKG_OPTIONS:Msendmail-socketmap) USE_TOOLS+= perl:run REPLACE_PERL= contrib/socketmapClient.pl contrib/socketmapServer.pl .endif ### @ 1.14 log @Update path from cyrus-sasl2 to cyrus-sasl. @ text @d1 1 a1 1 # $NetBSD: options.mk,v 1.13 2005/10/20 15:10:01 adrianp Exp $ d25 1 a25 1 . include "../../databases/openldap/buildlink3.mk" @ 1.13 log @While I'm here add back the PKG_OPTIONS_LEGACY_OPTS for socketmap @ text @d1 1 a1 1 # $NetBSD: options.mk,v 1.12 2005/10/20 15:07:26 adrianp Exp $ d32 1 a32 1 . include "../../security/cyrus-sasl2/buildlink3.mk" @ 1.12 log @Update options.mk with a PKG_OPTIONS_LEGACY_OPTS to migrate from starttls to tls. Pointed out by Gilles@@Gravier.org on netbsd-users@@ @ text @d1 1 a1 1 # $NetBSD: options.mk,v 1.11 2005/10/05 13:29:50 wiz Exp $ d6 1 d8 1 @ 1.11 log @Remove some more *LEGACY* settings that are over a month old and thus were before 2005Q3. @ text @d1 1 a1 1 # $NetBSD: options.mk,v 1.10 2005/08/01 15:27:00 wiz Exp $ d6 1 @ 1.10 log @Rename socketmap option to sendmail-socketmap. @ text @d1 1 a1 1 # $NetBSD: options.mk,v 1.9 2005/07/18 21:33:24 adrianp Exp $ a6 3 PKG_OPTIONS_LEGACY_OPTS+= starttls:tls PKG_OPTIONS_LEGACY_OPTS+= socketmap:sendmail-socketmap @ 1.9 log @- Move option from "starttls" to "tls" as pointed out by schmonz@@ in private email. - Use PKG_OPTIONS_LEGACY_OPTS to deal with the change. @ text @d1 1 a1 1 # $NetBSD: options.mk,v 1.8 2005/07/16 01:19:13 jlam Exp $ d4 1 a4 1 PKG_SUPPORTED_OPTIONS= inet6 db2 db4 ldap sasl tls tcpwrappers socketmap d7 2 a8 1 PKG_OPTIONS_LEGACY_OPTS= starttls:tls d52 1 a52 1 .if !empty(PKG_OPTIONS:Msocketmap) @ 1.8 log @Get rid of USE_PERL5. The new way to express needing the Perl executable around at either build-time or at run-time is: USE_TOOLS+= perl # build-time USE_TOOLS+= perl:run # run-time Also remove some places where perl5/buildlink3.mk was being included by a package Makefile, but all that the package wanted was the Perl executable. @ text @d1 1 a1 1 # $NetBSD: options.mk,v 1.7 2005/07/02 01:12:52 tv Exp $ d4 1 a4 2 PKG_SUPPORTED_OPTIONS= inet6 db2 db4 ldap sasl starttls tcpwrappers \ socketmap d7 2 d37 1 a37 1 .if !empty(PKG_OPTIONS:Mstarttls) @ 1.7 log @standardize whitespace in .include directives @ text @d1 1 a1 1 # $NetBSD: options.mk,v 1.6 2005/05/31 10:01:38 dillo Exp $ d51 1 a51 1 USE_PERL5= YES @ 1.6 log @Packages have no business modifying PKG_DEFAULT_OPTIONS -- it's a user settable variable. Set PKG_SUGGESTED_OPTIONS instead. Also, make use of PKG_OPTIONS_LEGACY_VARS. Reviewed by wiz. @ text @d1 1 a1 1 # $NetBSD: options.mk,v 1.5 2005/03/28 09:39:57 jlam Exp $ d14 3 a16 3 . include "../../databases/db/buildlink3.mk" . elif !empty(PKG_OPTIONS:Mdb4) . include "../../databases/db4/buildlink3.mk" d23 1 a23 1 . include "../../databases/openldap/buildlink3.mk" d30 1 a30 1 . include "../../security/cyrus-sasl2/buildlink3.mk" d37 1 a37 1 . include "../../security/openssl/buildlink3.mk" d44 1 a44 1 . include "../../security/tcp_wrappers/buildlink3.mk" @ 1.5 log @Remove security/cyrus-sasl and security/cy-login. These packages tracked the Cyrus SASL 1.5.x releases, which are no longer maintained. Adjust packages to use security/cyrus-sasl2 instead for SASL support. This closes PR pkg/28218 and PR pkg/29736. @ text @d1 1 a1 1 # $NetBSD: options.mk,v 1.4 2005/01/02 11:59:36 adrianp Exp $ d6 1 a6 4 .if !defined(PKG_OPTIONS.sendmail) PKG_DEFAULT_OPTIONS+= tcpwrappers .endif @ 1.4 log @Remove inet6 from PKG_DEFAULT_OPTIONS as this can cause the package to build in IPv6 support on systems where USE_INET6 has been set to NO. This addresses PR #28708 opened by georg.schwarz (at) freenet.de @ text @d1 1 a1 1 # $NetBSD: options.mk,v 1.3 2004/11/17 19:56:49 xtraeme Exp $ d4 1 a4 1 PKG_SUPPORTED_OPTIONS= inet6 db2 db4 ldap sasl sasl2 starttls tcpwrappers \ a13 8 ### Can't support SASLv1 and SASLv2 ### .if !empty(PKG_OPTIONS:Msasl) && !empty(PKG_OPTIONS:Msasl2) PKG_FAIL_REASON+= "SASLv1 and SASLv2 cannot both be compiled in." \ "Please change ${PKG_OPTIONS_VAR} to one or the other." .endif ### d33 1 a33 3 . include "../../security/cyrus-sasl/buildlink3.mk" . elif !empty(PKG_OPTIONS:Msasl2) . include "../../security/cyrus-sasl2/buildlink3.mk" @ 1.3 log @Remove obsolete variables. You'll want to use: PKG_OPTIONS.+= foo blah @ text @d1 1 a1 1 # $NetBSD: options.mk,v 1.2 2004/09/02 21:09:17 adrianp Exp $ d8 1 a8 1 PKG_DEFAULT_OPTIONS+= inet6 tcpwrappers @ 1.2 log @options.mk fixes for this package including: - Option handling was ignoring old USE_* statements - Don't try and compile sendmail with SASLv1 _and_ SASLv2 support - Add missing migration option for USE_STARTTLS @ text @d1 1 a1 25 # $NetBSD: options.mk,v 1.1 2004/08/30 20:16:28 adrianp Exp $ # Global and legacy options .if defined(USE_DB2) && !empty(USE_DB2:M[yY][eE][sS]) PKG_DEFAULT_OPTIONS+= db2 . elif defined(USE_DB4) && !empty(USE_DB4:M[yY][eE][sS]) PKG_DEFAULT_OPTIONS+= db4 .endif .if defined(USE_OPENLDAP) && !empty(USE_OPENLDAP:M[yY][eE][sS]) PKG_DEFAULT_OPTIONS+= ldap .endif .if defined(USE_SASL) && !empty(USE_SASL:M[yY][eE][sS]) PKG_DEFAULT_OPTIONS+= sasl . elif defined(USE_SASL2) && !empty(USE_SASL2:M[yY][eE][sS]) PKG_DEFAULT_OPTIONS+= sasl2 .endif .if defined(USE_TCPWRAPPERS) && !empty(USE_TCPWRAPPERS:M[yY][eE][sS]) PKG_DEFAULT_OPTIONS+= tcpwrappers .endif .if defined(USE_INET6) && !empty(USE_INET6:M[yY][eE][sS]) PKG_DEFAULT_OPTIONS+= inet6 .endif .if defined(USE_STARTTLS) && !empty(USE_STARTTLS:M[yY][eE][sS]) PKG_DEFAULT_OPTIONS+= starttls .endif @ 1.1 log @Update of sendmail to 8.13.1 pkgsrc changes: - move to use options.mk framework - solaris support tidy-up - fix linux man page extension handling bug - allow for a user defined smrsh directory - update MASTER_SITES - optional SOCKETMAP support and sample script installation - ok'ed snj@@/wiz@@ Summary of some of the major changes include: - New map "socket" to query maps via TCP/IP sockets. - Connection rate control as well as control over the number of incoming open connections. - Several LDAP enhancements such as LDAP recursion and LDAP URI support. - Message quarantining. - AUTH EXTERNAL will only be enabled if STARTTLS was successful and the client has been authenticated, i.e., {verify} is OK. - Basic support for certificate revocation lists. - New queue timeouts for DSN messages. - Experimental support for MTAMark. For a full list of changes see: - http://www.sendmail.org/8.13.0.html - http://www.sendmail.org/8.13.1.html @ text @d1 1 a1 1 # $NetBSD$ d23 3 d38 8 @