Source-Changes-HG archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

[src/trunk]: src/external/ibm-public/postfix/dist Import Postfix 2.11.6. Chan...



details:   https://anonhg.NetBSD.org/src/rev/d99474bdcc23
branches:  trunk
changeset: 810684:d99474bdcc23
user:      tron <tron%NetBSD.org@localhost>
date:      Sat Sep 12 08:20:22 2015 +0000

description:
Import Postfix 2.11.6. Changes since version 2.11.4:
- Preparation for OpenSSL 1.2 API changes
- The sender_dependent_relayhost_maps feature ignored the relayhost setting
  in the case of a DUNNO lookup result. It would use the recipient domain
  instead.
- The default TLS settings no longer enable export-grade ciphers, and no
  longer enable the SSLv2 and SSLv3 protocols. These ciphers and protocols
  have little if any legitimate use today, and have instead become a
  vehicle for downgrade attacks.

diffstat:

 external/ibm-public/postfix/dist/HISTORY                       |  45 +++++++++-
 external/ibm-public/postfix/dist/README_FILES/RELEASE_NOTES    |  34 +++++++
 external/ibm-public/postfix/dist/RELEASE_NOTES                 |  34 +++++++
 external/ibm-public/postfix/dist/html/lmtp.8.html              |   6 +-
 external/ibm-public/postfix/dist/html/smtp.8.html              |   6 +-
 external/ibm-public/postfix/dist/html/smtpd.8.html             |   6 +-
 external/ibm-public/postfix/dist/man/man8/smtp.8               |   8 +-
 external/ibm-public/postfix/dist/man/man8/smtpd.8              |   8 +-
 external/ibm-public/postfix/dist/src/global/mail_version.h     |   6 +-
 external/ibm-public/postfix/dist/src/tls/tls_dane.c            |  12 +-
 external/ibm-public/postfix/dist/src/trivial-rewrite/resolve.c |  15 ++-
 11 files changed, 148 insertions(+), 32 deletions(-)

diffs (truncated from 385 to 300 lines):

diff -r 597050cf7586 -r d99474bdcc23 external/ibm-public/postfix/dist/HISTORY
--- a/external/ibm-public/postfix/dist/HISTORY  Fri Sep 11 22:27:17 2015 +0000
+++ b/external/ibm-public/postfix/dist/HISTORY  Sat Sep 12 08:20:22 2015 +0000
@@ -17919,7 +17919,7 @@
 
 20120824
 
-       Feature: support for "sendmail -R hdrs|full". Jan Kundrát.
+       Feature: support for "sendmail -R hdrs|full". Jan Kundr?t.
        File: sendmail/sendmail.c.
 
 20120902
@@ -19641,3 +19641,46 @@
 
        Cleanup: missing " in \%s\" in postconf(1) fatal error
        messages. Iain Hibbert. File: postconf/postconf_master.c.
+
+20150324
+
+       Bugfix (introduced: Postfix 2.6): sender_dependent_relayhost_maps
+       ignored the relayhost setting in the case of a DUNNO lookup
+       result.  It would use the recipient domain instead.  Viktor
+       Dukhovni. Wietse took the pieces of code that enforce the
+       precedence of a sender-dependent relayhost, the global
+       relayhost, and the recipient domain, and put that code
+       together in once place so that it is easier to maintain.
+       File: trivial-rewrite/resolve.c.
+
+20150330
+
+       Bitrot: prepare for future changes in OpenSSL API. Viktor
+       Dukhovni. File: tls_dane.c.
+
+20150408
+
+       Portability: FreeBSD10 support. Files: makedefs, util/sys_defs.h.
+
+       Incompatibility: specifying "make makefiles" with "CC=command"
+       will no longer override the default WARN setting.
+
+20150501
+
+       Support for Linux 4.*, and some simplification for future
+       makedefs files. Files: makedefs, util/sys_defs.h.
+
+20150718
+
+       Security: opportunistic TLS by default uses "medium" or
+       stronger ciphers instead of "export" or stronger. See the
+       RELEASE_NOTES file for how to get the old settings back.
+       Files: global/mail_params.h, proto/TLS_README.html,
+       proto/postconf.proto, and files derived from those.
+
+20150719
+
+       Security: Postfix TLS support by default no longer uses
+       SSLv2 or SSLv3.  See the RELEASE_NOTES file for how to get
+       the old settings back. Files: global/mail_params.h,
+       proto/postconf.proto, and files derived from those.
diff -r 597050cf7586 -r d99474bdcc23 external/ibm-public/postfix/dist/README_FILES/RELEASE_NOTES
--- a/external/ibm-public/postfix/dist/README_FILES/RELEASE_NOTES       Fri Sep 11 22:27:17 2015 +0000
+++ b/external/ibm-public/postfix/dist/README_FILES/RELEASE_NOTES       Sat Sep 12 08:20:22 2015 +0000
@@ -14,6 +14,40 @@
 If you upgrade from Postfix 2.9 or earlier, read RELEASE_NOTES-2.10
 before proceeding.
 
+Incompatible change with Postfix 2.11.6
+---------------------------------------
+
+As of the middle of 2015, all supported Postfix releases no longer
+enable "export" grade ciphers for opportunistic TLS, and no longer
+use the deprecated SSLv2 and SSLv3 protocols for mandatory or
+opportunistic TLS.
+
+These changes are very unlikely to cause problems with server-to-server
+communication over the Internet, but they may result in interoperability
+problems with ancient client or server implementations on internal
+networks.  To address this problem, you can revert the changes with:
+
+Postfix SMTP client settings:
+
+    lmtp_tls_ciphers = export
+    smtp_tls_ciphers = export
+    lmtp_tls_protocols = !SSLv2
+    smtp_tls_protocols = !SSLv2
+    lmtp_tls_mandatory_protocols = !SSLv2
+    smtp_tls_mandatory_protocols = !SSLv2
+
+Postfix SMTP server settings:
+
+    smtpd_tls_ciphers = export
+    smtpd_tls_protocols =
+    smtpd_tls_mandatory_protocols = !SSLv2
+
+These settings, if put in main.cf, affect all Postfix SMTP client
+or server communication, which may be undesirable. To be more
+selective, use "-o name=value" parameter overrides on specific
+services in master.cf. Execute the command "postfix reload" to make
+the changes effective.
+
 Major changes - tls
 -------------------
 
diff -r 597050cf7586 -r d99474bdcc23 external/ibm-public/postfix/dist/RELEASE_NOTES
--- a/external/ibm-public/postfix/dist/RELEASE_NOTES    Fri Sep 11 22:27:17 2015 +0000
+++ b/external/ibm-public/postfix/dist/RELEASE_NOTES    Sat Sep 12 08:20:22 2015 +0000
@@ -14,6 +14,40 @@
 If you upgrade from Postfix 2.9 or earlier, read RELEASE_NOTES-2.10
 before proceeding.
 
+Incompatible change with Postfix 2.11.6
+---------------------------------------
+
+As of the middle of 2015, all supported Postfix releases no longer
+enable "export" grade ciphers for opportunistic TLS, and no longer
+use the deprecated SSLv2 and SSLv3 protocols for mandatory or
+opportunistic TLS.
+
+These changes are very unlikely to cause problems with server-to-server
+communication over the Internet, but they may result in interoperability
+problems with ancient client or server implementations on internal
+networks.  To address this problem, you can revert the changes with:
+
+Postfix SMTP client settings:
+
+    lmtp_tls_ciphers = export
+    smtp_tls_ciphers = export
+    lmtp_tls_protocols = !SSLv2
+    smtp_tls_protocols = !SSLv2
+    lmtp_tls_mandatory_protocols = !SSLv2
+    smtp_tls_mandatory_protocols = !SSLv2
+
+Postfix SMTP server settings:
+
+    smtpd_tls_ciphers = export
+    smtpd_tls_protocols =
+    smtpd_tls_mandatory_protocols = !SSLv2
+
+These settings, if put in main.cf, affect all Postfix SMTP client
+or server communication, which may be undesirable. To be more
+selective, use "-o name=value" parameter overrides on specific
+services in master.cf. Execute the command "postfix reload" to make
+the changes effective.
+
 Major changes - tls
 -------------------
 
diff -r 597050cf7586 -r d99474bdcc23 external/ibm-public/postfix/dist/html/lmtp.8.html
--- a/external/ibm-public/postfix/dist/html/lmtp.8.html Fri Sep 11 22:27:17 2015 +0000
+++ b/external/ibm-public/postfix/dist/html/lmtp.8.html Sat Sep 12 08:20:22 2015 +0000
@@ -432,7 +432,7 @@
               policy by next-hop destination; when a non-empty value is speci-
               fied, this overrides the obsolete <a href="postconf.5.html#smtp_tls_per_site">smtp_tls_per_site</a> parameter.
 
-       <b><a href="postconf.5.html#smtp_tls_mandatory_protocols">smtp_tls_mandatory_protocols</a> (!SSLv2)</b>
+       <b><a href="postconf.5.html#smtp_tls_mandatory_protocols">smtp_tls_mandatory_protocols</a> (!SSLv2, !SSLv3)</b>
               List  of SSL/TLS protocols that the Postfix SMTP client will use
               with mandatory TLS encryption.
 
@@ -497,11 +497,11 @@
 
        Available in Postfix version 2.6 and later:
 
-       <b><a href="postconf.5.html#smtp_tls_protocols">smtp_tls_protocols</a> (!SSLv2)</b>
+       <b><a href="postconf.5.html#smtp_tls_protocols">smtp_tls_protocols</a> (!SSLv2, !SSLv3)</b>
               List of TLS protocols that the Postfix SMTP client will  exclude
               or include with opportunistic TLS encryption.
 
-       <b><a href="postconf.5.html#smtp_tls_ciphers">smtp_tls_ciphers</a> (export)</b>
+       <b><a href="postconf.5.html#smtp_tls_ciphers">smtp_tls_ciphers</a> (medium)</b>
               The  minimum  TLS cipher grade that the Postfix SMTP client will
               use with opportunistic TLS encryption.
 
diff -r 597050cf7586 -r d99474bdcc23 external/ibm-public/postfix/dist/html/smtp.8.html
--- a/external/ibm-public/postfix/dist/html/smtp.8.html Fri Sep 11 22:27:17 2015 +0000
+++ b/external/ibm-public/postfix/dist/html/smtp.8.html Sat Sep 12 08:20:22 2015 +0000
@@ -432,7 +432,7 @@
               policy by next-hop destination; when a non-empty value is speci-
               fied, this overrides the obsolete <a href="postconf.5.html#smtp_tls_per_site">smtp_tls_per_site</a> parameter.
 
-       <b><a href="postconf.5.html#smtp_tls_mandatory_protocols">smtp_tls_mandatory_protocols</a> (!SSLv2)</b>
+       <b><a href="postconf.5.html#smtp_tls_mandatory_protocols">smtp_tls_mandatory_protocols</a> (!SSLv2, !SSLv3)</b>
               List  of SSL/TLS protocols that the Postfix SMTP client will use
               with mandatory TLS encryption.
 
@@ -497,11 +497,11 @@
 
        Available in Postfix version 2.6 and later:
 
-       <b><a href="postconf.5.html#smtp_tls_protocols">smtp_tls_protocols</a> (!SSLv2)</b>
+       <b><a href="postconf.5.html#smtp_tls_protocols">smtp_tls_protocols</a> (!SSLv2, !SSLv3)</b>
               List of TLS protocols that the Postfix SMTP client will  exclude
               or include with opportunistic TLS encryption.
 
-       <b><a href="postconf.5.html#smtp_tls_ciphers">smtp_tls_ciphers</a> (export)</b>
+       <b><a href="postconf.5.html#smtp_tls_ciphers">smtp_tls_ciphers</a> (medium)</b>
               The  minimum  TLS cipher grade that the Postfix SMTP client will
               use with opportunistic TLS encryption.
 
diff -r 597050cf7586 -r d99474bdcc23 external/ibm-public/postfix/dist/html/smtpd.8.html
--- a/external/ibm-public/postfix/dist/html/smtpd.8.html        Fri Sep 11 22:27:17 2015 +0000
+++ b/external/ibm-public/postfix/dist/html/smtpd.8.html        Sat Sep 12 08:20:22 2015 +0000
@@ -446,7 +446,7 @@
               Postfix SMTP server cipher list at mandatory TLS  security  lev-
               els.
 
-       <b><a href="postconf.5.html#smtpd_tls_mandatory_protocols">smtpd_tls_mandatory_protocols</a> (!SSLv2)</b>
+       <b><a href="postconf.5.html#smtpd_tls_mandatory_protocols">smtpd_tls_mandatory_protocols</a> (!SSLv2, !SSLv3)</b>
               The  SSL/TLS  protocols accepted by the Postfix SMTP server with
               mandatory TLS encryption.
 
@@ -494,11 +494,11 @@
 
        Available in Postfix version 2.6 and later:
 
-       <b><a href="postconf.5.html#smtpd_tls_protocols">smtpd_tls_protocols</a> (empty)</b>
+       <b><a href="postconf.5.html#smtpd_tls_protocols">smtpd_tls_protocols</a> (!SSLv2, !SSLv3)</b>
               List  of TLS protocols that the Postfix SMTP server will exclude
               or include with opportunistic TLS encryption.
 
-       <b><a href="postconf.5.html#smtpd_tls_ciphers">smtpd_tls_ciphers</a> (export)</b>
+       <b><a href="postconf.5.html#smtpd_tls_ciphers">smtpd_tls_ciphers</a> (medium)</b>
               The minimum TLS cipher grade that the Postfix SMTP  server  will
               use with opportunistic TLS encryption.
 
diff -r 597050cf7586 -r d99474bdcc23 external/ibm-public/postfix/dist/man/man8/smtp.8
--- a/external/ibm-public/postfix/dist/man/man8/smtp.8  Fri Sep 11 22:27:17 2015 +0000
+++ b/external/ibm-public/postfix/dist/man/man8/smtp.8  Sat Sep 12 08:20:22 2015 +0000
@@ -1,4 +1,4 @@
-.\"    $NetBSD: smtp.8,v 1.1.1.7 2014/07/06 19:27:46 tron Exp $
+.\"    $NetBSD: smtp.8,v 1.1.1.8 2015/09/12 08:20:33 tron Exp $
 .\"
 .TH SMTP 8 
 .ad
@@ -403,7 +403,7 @@
 Optional lookup tables with the Postfix SMTP client TLS security
 policy by next-hop destination; when a non-empty value is specified,
 this overrides the obsolete smtp_tls_per_site parameter.
-.IP "\fBsmtp_tls_mandatory_protocols (!SSLv2)\fR"
+.IP "\fBsmtp_tls_mandatory_protocols (!SSLv2, !SSLv3)\fR"
 List of SSL/TLS protocols that the Postfix SMTP client will use with
 mandatory TLS encryption.
 .IP "\fBsmtp_tls_scert_verifydepth (9)\fR"
@@ -453,10 +453,10 @@
 certificate fingerprints.
 .PP
 Available in Postfix version 2.6 and later:
-.IP "\fBsmtp_tls_protocols (!SSLv2)\fR"
+.IP "\fBsmtp_tls_protocols (!SSLv2, !SSLv3)\fR"
 List of TLS protocols that the Postfix SMTP client will exclude or
 include with opportunistic TLS encryption.
-.IP "\fBsmtp_tls_ciphers (export)\fR"
+.IP "\fBsmtp_tls_ciphers (medium)\fR"
 The minimum TLS cipher grade that the Postfix SMTP client
 will use with opportunistic TLS encryption.
 .IP "\fBsmtp_tls_eccert_file (empty)\fR"
diff -r 597050cf7586 -r d99474bdcc23 external/ibm-public/postfix/dist/man/man8/smtpd.8
--- a/external/ibm-public/postfix/dist/man/man8/smtpd.8 Fri Sep 11 22:27:17 2015 +0000
+++ b/external/ibm-public/postfix/dist/man/man8/smtpd.8 Sat Sep 12 08:20:22 2015 +0000
@@ -1,4 +1,4 @@
-.\"    $NetBSD: smtpd.8,v 1.1.1.7 2014/07/06 19:27:46 tron Exp $
+.\"    $NetBSD: smtpd.8,v 1.1.1.8 2015/09/12 08:20:33 tron Exp $
 .\"
 .TH SMTPD 8 
 .ad
@@ -416,7 +416,7 @@
 .IP "\fBsmtpd_tls_mandatory_exclude_ciphers (empty)\fR"
 Additional list of ciphers or cipher types to exclude from the
 Postfix SMTP server cipher list at mandatory TLS security levels.
-.IP "\fBsmtpd_tls_mandatory_protocols (!SSLv2)\fR"
+.IP "\fBsmtpd_tls_mandatory_protocols (!SSLv2, !SSLv3)\fR"
 The SSL/TLS protocols accepted by the Postfix SMTP server with
 mandatory TLS encryption.
 .IP "\fBsmtpd_tls_received_header (no)\fR"
@@ -454,10 +454,10 @@
 for \fBcheck_ccert_access\fR and \fBpermit_tls_clientcerts\fR.
 .PP
 Available in Postfix version 2.6 and later:
-.IP "\fBsmtpd_tls_protocols (empty)\fR"
+.IP "\fBsmtpd_tls_protocols (!SSLv2, !SSLv3)\fR"
 List of TLS protocols that the Postfix SMTP server will exclude
 or include with opportunistic TLS encryption.
-.IP "\fBsmtpd_tls_ciphers (export)\fR"
+.IP "\fBsmtpd_tls_ciphers (medium)\fR"
 The minimum TLS cipher grade that the Postfix SMTP server
 will use with opportunistic TLS encryption.
 .IP "\fBsmtpd_tls_eccert_file (empty)\fR"
diff -r 597050cf7586 -r d99474bdcc23 external/ibm-public/postfix/dist/src/global/mail_version.h
--- a/external/ibm-public/postfix/dist/src/global/mail_version.h        Fri Sep 11 22:27:17 2015 +0000
+++ b/external/ibm-public/postfix/dist/src/global/mail_version.h        Sat Sep 12 08:20:22 2015 +0000
@@ -1,4 +1,4 @@
-/*     $NetBSD: mail_version.h,v 1.1.1.23 2015/02/21 11:56:49 tron Exp $       */
+/*     $NetBSD: mail_version.h,v 1.1.1.24 2015/09/12 08:20:35 tron Exp $       */
 
 #ifndef _MAIL_VERSION_H_INCLUDED_
 #define _MAIL_VERSION_H_INCLUDED_
@@ -22,8 +22,8 @@
   * Patches change both the patchlevel and the release date. Snapshots have no
   * patchlevel; they change the release date only.
   */



Home | Main Index | Thread Index | Old Index