./mail/postfix, Postfix SMTP server and tools

[ CVSweb ] [ Homepage ] [ RSS ] [ Required by ] [ Add to tracker ]


Branch: pkgsrc-2015Q2, Version: 2.11.6, Package name: postfix-2.11.6, Maintainer: pkgsrc-users

Postfix aims to be an alternative to the widely-used sendmail
program. Sendmail is responsible for 70% of all e-mail delivered
on the Internet. With an estimated 100 million users, that's an
estimated 10 billion (10^10) messages daily. A stunning number.

Although IBM supported the Postfix development, it abstains from
control over its evolution. The goal is to have Postfix installed
on as many systems as possible. To this end, the software is given
away with no strings attached to it, so that it can evolve with
input from and under control by its users.

In other words, IBM releases Postfix only once. I will be around
to guide its development for a limited time.

MESSAGE.NetBSD [+/-]
MESSAGE.sasl [+/-]


Package options: tls

Master sites: (Expand)

SHA1: 005f84264ae8fa6989181bc61b756a0fd8e99dfa
RMD160: 54a35e148ec169d86528857484e002e9326dc56e
Filesize: 3935.951 KB

Version history: (Expand)


CVS history: (Expand)


   2015-07-22 22:16:13 by Matthias Scheler | Files touched by this commit (3) | Package updated
Log message:
Pullup ticket #4780 - requested by taca
mail/postfix: security update

Revisions pulled up:
- mail/postfix/Makefile                                         1.284
- mail/postfix/distinfo                                         1.160
- mail/postfix/patches/patch-ai                                 1.33

---
   Module Name:	pkgsrc
   Committed By:	taca
   Date:		Wed Jul 22 00:25:37 UTC 2015

   Modified Files:
   	pkgsrc/mail/postfix: Makefile distinfo
   	pkgsrc/mail/postfix/patches: patch-ai

   Log message:
   Update postfix to 2.11.6, security release.

   With all supported Postfix releases, the default settings have been
   updated so that they no longer enable export-grade ciphers, and no
   longer enable the SSLv2 and SSLv3 protocols. These ciphers and
   protocols have little if any legitimate use today, and have instead
   become a vehicle for downgrade attacks. There are no other code
   changes.

   Postfix documentation has been updated to reflect the new default
   settings and their rationale; the RELEASE_NOTES give suggestions
   for how to enable the old ciphers and protocols if your infrastructure
   requires them.

   Finally, abandoning deprecated ciphers and protocols does not really
   improve TLS security without measures to better authenticate remote
   servers. Secure DNS and TLSA are steps in that direction.