2013-06-06 21:25:45 +02:00
|
|
|
OPTIONS_DEFINE+= ALT_CONFIG_PREFIX \
|
|
|
|
CONTENT_SCAN \
|
|
|
|
DAEMON \
|
|
|
|
DEBUG \
|
|
|
|
DISABLE_D_OPT \
|
|
|
|
DKIM \
|
Update to 4.83.
Changes in the port:
- Added new options:
* DNSSEC: validate peers using TLSA records
* PRDR: Per-Recipient-Data-Response support
* CERTNAMES: Check certiticates ownership
* DSN: Delivery Status Notifications
* PROXY: Experimental Proxy Protocol
- Enable OCSP stapling by default
- Disable NIS by default
- SRS support is now radio group
- DNSSEC and PRDR are now enabled by default
Changes in exim itself:
This release contains the following enhancements and bugfixes:
+ PRDR was promoted from Experimental to mainline
+ OCSP Stapling was promoted from Experimental to mainline
+ new Experimental feature Proxy Protocol
+ new Experimental feature DSN (Delivery Status Notifications)
+ TLS session improvements
+ TLS SNI fixes
+ LDAP enhancements
+ DMARC fixes (previous CVE-2014-2957) and new $dmarc_domain_policy
+ several new operations (listextract, utf8clean, md5, sha1)
+ enforce header formatting with verify=header_names_ascii
+ new commandline option -oMm
+ new TLSA dns lookup
+ new malware "sock" type
+ cutthrough routing enhancements
+ logging enhancements
+ DNSSEC enhancements
+ exiqgrep enhancements
+ deprecating non-standard SPF results
+ build and portability fixes
+ documentation fixes and enhancements
Uncompatible changes:
This release of Exim includes one incompatible fix: the behavior of
expansion of arguments to math comparison functions (<, <=, =, =>, >)
was unexpected, expanding the values twice. This fix also addresses a
security advisory, CVE-2014-2972. This is not a remote exploit, but if
content that is searched by the above math comparison functions is under
the control of an attacker, specially crafted data can be inserted that
will cause the Exim mail server to perform various file-system functions
as the exim user.
2014-07-22 17:39:44 +02:00
|
|
|
DNSSEC \
|
2014-07-15 18:14:15 +02:00
|
|
|
DOCS \
|
2013-06-06 21:25:45 +02:00
|
|
|
EMBEDDED_PERL \
|
|
|
|
EXIMON \
|
|
|
|
ICONV \
|
|
|
|
IPV6 \
|
|
|
|
LISTMATCH_RHS \
|
|
|
|
LMTP \
|
2014-07-04 14:51:23 +02:00
|
|
|
OCSP \
|
2013-06-06 21:25:45 +02:00
|
|
|
OLD_DEMIME \
|
Update to 4.83.
Changes in the port:
- Added new options:
* DNSSEC: validate peers using TLSA records
* PRDR: Per-Recipient-Data-Response support
* CERTNAMES: Check certiticates ownership
* DSN: Delivery Status Notifications
* PROXY: Experimental Proxy Protocol
- Enable OCSP stapling by default
- Disable NIS by default
- SRS support is now radio group
- DNSSEC and PRDR are now enabled by default
Changes in exim itself:
This release contains the following enhancements and bugfixes:
+ PRDR was promoted from Experimental to mainline
+ OCSP Stapling was promoted from Experimental to mainline
+ new Experimental feature Proxy Protocol
+ new Experimental feature DSN (Delivery Status Notifications)
+ TLS session improvements
+ TLS SNI fixes
+ LDAP enhancements
+ DMARC fixes (previous CVE-2014-2957) and new $dmarc_domain_policy
+ several new operations (listextract, utf8clean, md5, sha1)
+ enforce header formatting with verify=header_names_ascii
+ new commandline option -oMm
+ new TLSA dns lookup
+ new malware "sock" type
+ cutthrough routing enhancements
+ logging enhancements
+ DNSSEC enhancements
+ exiqgrep enhancements
+ deprecating non-standard SPF results
+ build and portability fixes
+ documentation fixes and enhancements
Uncompatible changes:
This release of Exim includes one incompatible fix: the behavior of
expansion of arguments to math comparison functions (<, <=, =, =>, >)
was unexpected, expanding the values twice. This fix also addresses a
security advisory, CVE-2014-2972. This is not a remote exploit, but if
content that is searched by the above math comparison functions is under
the control of an attacker, specially crafted data can be inserted that
will cause the Exim mail server to perform various file-system functions
as the exim user.
2014-07-22 17:39:44 +02:00
|
|
|
PRDR \
|
2013-06-06 21:25:45 +02:00
|
|
|
READLINE \
|
|
|
|
SUID \
|
|
|
|
TCP_WRAPPERS \
|
2016-04-21 17:52:23 +02:00
|
|
|
WISHLIST \
|
|
|
|
EVENT \
|
|
|
|
PROXY \
|
|
|
|
SOCKS \
|
|
|
|
INTERNATIONAL
|
2013-06-06 21:25:45 +02:00
|
|
|
|
|
|
|
OPTIONS_DEFAULT+= AUTH_CRAM_MD5 \
|
|
|
|
AUTH_DOVECOT \
|
|
|
|
AUTH_PLAINTEXT \
|
|
|
|
AUTH_SPA \
|
|
|
|
CDB \
|
|
|
|
DAEMON \
|
|
|
|
DISABLE_D_OPT \
|
|
|
|
DKIM \
|
|
|
|
DNSDB \
|
Update to 4.83.
Changes in the port:
- Added new options:
* DNSSEC: validate peers using TLSA records
* PRDR: Per-Recipient-Data-Response support
* CERTNAMES: Check certiticates ownership
* DSN: Delivery Status Notifications
* PROXY: Experimental Proxy Protocol
- Enable OCSP stapling by default
- Disable NIS by default
- SRS support is now radio group
- DNSSEC and PRDR are now enabled by default
Changes in exim itself:
This release contains the following enhancements and bugfixes:
+ PRDR was promoted from Experimental to mainline
+ OCSP Stapling was promoted from Experimental to mainline
+ new Experimental feature Proxy Protocol
+ new Experimental feature DSN (Delivery Status Notifications)
+ TLS session improvements
+ TLS SNI fixes
+ LDAP enhancements
+ DMARC fixes (previous CVE-2014-2957) and new $dmarc_domain_policy
+ several new operations (listextract, utf8clean, md5, sha1)
+ enforce header formatting with verify=header_names_ascii
+ new commandline option -oMm
+ new TLSA dns lookup
+ new malware "sock" type
+ cutthrough routing enhancements
+ logging enhancements
+ DNSSEC enhancements
+ exiqgrep enhancements
+ deprecating non-standard SPF results
+ build and portability fixes
+ documentation fixes and enhancements
Uncompatible changes:
This release of Exim includes one incompatible fix: the behavior of
expansion of arguments to math comparison functions (<, <=, =, =>, >)
was unexpected, expanding the values twice. This fix also addresses a
security advisory, CVE-2014-2972. This is not a remote exploit, but if
content that is searched by the above math comparison functions is under
the control of an attacker, specially crafted data can be inserted that
will cause the Exim mail server to perform various file-system functions
as the exim user.
2014-07-22 17:39:44 +02:00
|
|
|
DNSSEC \
|
2013-06-06 21:25:45 +02:00
|
|
|
DSEARCH \
|
|
|
|
EMBEDDED_PERL \
|
2016-04-21 17:52:23 +02:00
|
|
|
EVENT \
|
2013-06-06 21:25:45 +02:00
|
|
|
ICONV \
|
2016-04-21 17:52:23 +02:00
|
|
|
INTERNATIONAL \
|
2015-07-13 13:52:12 +02:00
|
|
|
LMTP \
|
2013-06-06 21:25:45 +02:00
|
|
|
LSEARCH \
|
|
|
|
MAILDIR \
|
|
|
|
MAILSTORE \
|
|
|
|
MBX \
|
Update to 4.83.
Changes in the port:
- Added new options:
* DNSSEC: validate peers using TLSA records
* PRDR: Per-Recipient-Data-Response support
* CERTNAMES: Check certiticates ownership
* DSN: Delivery Status Notifications
* PROXY: Experimental Proxy Protocol
- Enable OCSP stapling by default
- Disable NIS by default
- SRS support is now radio group
- DNSSEC and PRDR are now enabled by default
Changes in exim itself:
This release contains the following enhancements and bugfixes:
+ PRDR was promoted from Experimental to mainline
+ OCSP Stapling was promoted from Experimental to mainline
+ new Experimental feature Proxy Protocol
+ new Experimental feature DSN (Delivery Status Notifications)
+ TLS session improvements
+ TLS SNI fixes
+ LDAP enhancements
+ DMARC fixes (previous CVE-2014-2957) and new $dmarc_domain_policy
+ several new operations (listextract, utf8clean, md5, sha1)
+ enforce header formatting with verify=header_names_ascii
+ new commandline option -oMm
+ new TLSA dns lookup
+ new malware "sock" type
+ cutthrough routing enhancements
+ logging enhancements
+ DNSSEC enhancements
+ exiqgrep enhancements
+ deprecating non-standard SPF results
+ build and portability fixes
+ documentation fixes and enhancements
Uncompatible changes:
This release of Exim includes one incompatible fix: the behavior of
expansion of arguments to math comparison functions (<, <=, =, =>, >)
was unexpected, expanding the values twice. This fix also addresses a
security advisory, CVE-2014-2972. This is not a remote exploit, but if
content that is searched by the above math comparison functions is under
the control of an attacker, specially crafted data can be inserted that
will cause the Exim mail server to perform various file-system functions
as the exim user.
2014-07-22 17:39:44 +02:00
|
|
|
OCSP \
|
2013-06-06 21:25:45 +02:00
|
|
|
OLD_DEMIME \
|
|
|
|
PAM \
|
|
|
|
PASSWD \
|
Update to 4.83.
Changes in the port:
- Added new options:
* DNSSEC: validate peers using TLSA records
* PRDR: Per-Recipient-Data-Response support
* CERTNAMES: Check certiticates ownership
* DSN: Delivery Status Notifications
* PROXY: Experimental Proxy Protocol
- Enable OCSP stapling by default
- Disable NIS by default
- SRS support is now radio group
- DNSSEC and PRDR are now enabled by default
Changes in exim itself:
This release contains the following enhancements and bugfixes:
+ PRDR was promoted from Experimental to mainline
+ OCSP Stapling was promoted from Experimental to mainline
+ new Experimental feature Proxy Protocol
+ new Experimental feature DSN (Delivery Status Notifications)
+ TLS session improvements
+ TLS SNI fixes
+ LDAP enhancements
+ DMARC fixes (previous CVE-2014-2957) and new $dmarc_domain_policy
+ several new operations (listextract, utf8clean, md5, sha1)
+ enforce header formatting with verify=header_names_ascii
+ new commandline option -oMm
+ new TLSA dns lookup
+ new malware "sock" type
+ cutthrough routing enhancements
+ logging enhancements
+ DNSSEC enhancements
+ exiqgrep enhancements
+ deprecating non-standard SPF results
+ build and portability fixes
+ documentation fixes and enhancements
Uncompatible changes:
This release of Exim includes one incompatible fix: the behavior of
expansion of arguments to math comparison functions (<, <=, =, =>, >)
was unexpected, expanding the values twice. This fix also addresses a
security advisory, CVE-2014-2972. This is not a remote exploit, but if
content that is searched by the above math comparison functions is under
the control of an attacker, specially crafted data can be inserted that
will cause the Exim mail server to perform various file-system functions
as the exim user.
2014-07-22 17:39:44 +02:00
|
|
|
PRDR \
|
2013-06-06 21:25:45 +02:00
|
|
|
SUID \
|
|
|
|
TLS
|
|
|
|
|
2014-07-04 18:07:17 +02:00
|
|
|
OPTIONS_RADIO_TLS= TLS GNUTLS
|
|
|
|
TLS_DESC= TLS support
|
2014-11-04 17:14:30 +01:00
|
|
|
OPTIONS_RADIO_LS= SA_EXIM
|
2014-07-04 18:07:17 +02:00
|
|
|
LS_DESC= Local scan patch
|
2015-01-13 14:45:51 +01:00
|
|
|
OPTIONS_RADIO_SRSR= SRS
|
Update to 4.83.
Changes in the port:
- Added new options:
* DNSSEC: validate peers using TLSA records
* PRDR: Per-Recipient-Data-Response support
* CERTNAMES: Check certiticates ownership
* DSN: Delivery Status Notifications
* PROXY: Experimental Proxy Protocol
- Enable OCSP stapling by default
- Disable NIS by default
- SRS support is now radio group
- DNSSEC and PRDR are now enabled by default
Changes in exim itself:
This release contains the following enhancements and bugfixes:
+ PRDR was promoted from Experimental to mainline
+ OCSP Stapling was promoted from Experimental to mainline
+ new Experimental feature Proxy Protocol
+ new Experimental feature DSN (Delivery Status Notifications)
+ TLS session improvements
+ TLS SNI fixes
+ LDAP enhancements
+ DMARC fixes (previous CVE-2014-2957) and new $dmarc_domain_policy
+ several new operations (listextract, utf8clean, md5, sha1)
+ enforce header formatting with verify=header_names_ascii
+ new commandline option -oMm
+ new TLSA dns lookup
+ new malware "sock" type
+ cutthrough routing enhancements
+ logging enhancements
+ DNSSEC enhancements
+ exiqgrep enhancements
+ deprecating non-standard SPF results
+ build and portability fixes
+ documentation fixes and enhancements
Uncompatible changes:
This release of Exim includes one incompatible fix: the behavior of
expansion of arguments to math comparison functions (<, <=, =, =>, >)
was unexpected, expanding the values twice. This fix also addresses a
security advisory, CVE-2014-2972. This is not a remote exploit, but if
content that is searched by the above math comparison functions is under
the control of an attacker, specially crafted data can be inserted that
will cause the Exim mail server to perform various file-system functions
as the exim user.
2014-07-22 17:39:44 +02:00
|
|
|
SRSR_DESC= Sender Rewriting Scheme
|
|
|
|
OPTIONS_RADIO= TLS LS SRSR
|
2014-07-04 18:07:17 +02:00
|
|
|
|
|
|
|
OPTIONS_GROUP_AUTH= AUTH_CRAM_MD5 AUTH_DOVECOT AUTH_PLAINTEXT AUTH_RADIUS AUTH_SASL AUTH_SPA SASLAUTHD PAM PASSWD
|
|
|
|
AUTH_DESC= SMTP Authorization
|
2014-07-05 17:09:15 +02:00
|
|
|
OPTIONS_GROUP_LOOKUP= CDB BDB DNSDB DSEARCH LSEARCH MYSQL NIS OPENLDAP PGSQL REDIS SQLITE
|
2014-07-04 18:07:17 +02:00
|
|
|
LOOKUP_DESC= Lookup support
|
|
|
|
OPTIONS_GROUP_STORAGE= MAILDIR MAILSTORE MBX
|
|
|
|
STORAGE_DESC= Supported storage formats
|
2016-04-21 17:52:23 +02:00
|
|
|
OPTIONS_GROUP_EXPERIMENTAL= CERTNAMES DANE DCC DMARC DSN SPF
|
Update to 4.83.
Changes in the port:
- Added new options:
* DNSSEC: validate peers using TLSA records
* PRDR: Per-Recipient-Data-Response support
* CERTNAMES: Check certiticates ownership
* DSN: Delivery Status Notifications
* PROXY: Experimental Proxy Protocol
- Enable OCSP stapling by default
- Disable NIS by default
- SRS support is now radio group
- DNSSEC and PRDR are now enabled by default
Changes in exim itself:
This release contains the following enhancements and bugfixes:
+ PRDR was promoted from Experimental to mainline
+ OCSP Stapling was promoted from Experimental to mainline
+ new Experimental feature Proxy Protocol
+ new Experimental feature DSN (Delivery Status Notifications)
+ TLS session improvements
+ TLS SNI fixes
+ LDAP enhancements
+ DMARC fixes (previous CVE-2014-2957) and new $dmarc_domain_policy
+ several new operations (listextract, utf8clean, md5, sha1)
+ enforce header formatting with verify=header_names_ascii
+ new commandline option -oMm
+ new TLSA dns lookup
+ new malware "sock" type
+ cutthrough routing enhancements
+ logging enhancements
+ DNSSEC enhancements
+ exiqgrep enhancements
+ deprecating non-standard SPF results
+ build and portability fixes
+ documentation fixes and enhancements
Uncompatible changes:
This release of Exim includes one incompatible fix: the behavior of
expansion of arguments to math comparison functions (<, <=, =, =>, >)
was unexpected, expanding the values twice. This fix also addresses a
security advisory, CVE-2014-2972. This is not a remote exploit, but if
content that is searched by the above math comparison functions is under
the control of an attacker, specially crafted data can be inserted that
will cause the Exim mail server to perform various file-system functions
as the exim user.
2014-07-22 17:39:44 +02:00
|
|
|
EXPERIMENTAL_DESC= Experimental options
|
|
|
|
OPTIONS_GROUP= AUTH LOOKUP STORAGE EXPERIMENTAL
|
2013-06-06 21:25:45 +02:00
|
|
|
|
|
|
|
ALT_CONFIG_PREFIX_DESC= Restrict the set of configuration files
|
|
|
|
AUTH_CRAM_MD5_DESC= Enable CRAM-MD5 authentication mechanisms
|
|
|
|
AUTH_DOVECOT_DESC= Enable Dovecot authentication mechanisms
|
|
|
|
AUTH_PLAINTEXT_DESC= Enable plaintext authentication
|
|
|
|
AUTH_RADIUS_DESC= Enable radius (RFC 2865) authentication
|
|
|
|
AUTH_SASL_DESC= Enable use of Cyrus SASL auth library
|
|
|
|
AUTH_SPA_DESC= Enable Secure Password Authentication
|
Update to 4.83.
Changes in the port:
- Added new options:
* DNSSEC: validate peers using TLSA records
* PRDR: Per-Recipient-Data-Response support
* CERTNAMES: Check certiticates ownership
* DSN: Delivery Status Notifications
* PROXY: Experimental Proxy Protocol
- Enable OCSP stapling by default
- Disable NIS by default
- SRS support is now radio group
- DNSSEC and PRDR are now enabled by default
Changes in exim itself:
This release contains the following enhancements and bugfixes:
+ PRDR was promoted from Experimental to mainline
+ OCSP Stapling was promoted from Experimental to mainline
+ new Experimental feature Proxy Protocol
+ new Experimental feature DSN (Delivery Status Notifications)
+ TLS session improvements
+ TLS SNI fixes
+ LDAP enhancements
+ DMARC fixes (previous CVE-2014-2957) and new $dmarc_domain_policy
+ several new operations (listextract, utf8clean, md5, sha1)
+ enforce header formatting with verify=header_names_ascii
+ new commandline option -oMm
+ new TLSA dns lookup
+ new malware "sock" type
+ cutthrough routing enhancements
+ logging enhancements
+ DNSSEC enhancements
+ exiqgrep enhancements
+ deprecating non-standard SPF results
+ build and portability fixes
+ documentation fixes and enhancements
Uncompatible changes:
This release of Exim includes one incompatible fix: the behavior of
expansion of arguments to math comparison functions (<, <=, =, =>, >)
was unexpected, expanding the values twice. This fix also addresses a
security advisory, CVE-2014-2972. This is not a remote exploit, but if
content that is searched by the above math comparison functions is under
the control of an attacker, specially crafted data can be inserted that
will cause the Exim mail server to perform various file-system functions
as the exim user.
2014-07-22 17:39:44 +02:00
|
|
|
CERTNAMES_DESC= Check certiticates ownership
|
2014-07-05 17:09:15 +02:00
|
|
|
BDB_DESC= Enable Berkeley DB lookups
|
2013-06-06 21:25:45 +02:00
|
|
|
CDB_DESC= Enable CDB-style lookups
|
|
|
|
CONTENT_SCAN_DESC= Enable exiscan email content scanner
|
|
|
|
DAEMON_DESC= Install scripts to run as a daemon
|
2015-01-13 14:45:51 +01:00
|
|
|
DANE_DESC= Enable experimental DANE support
|
2013-06-06 21:25:45 +02:00
|
|
|
DCC_DESC= Enable DCC at ACL support via dccifd
|
|
|
|
DISABLE_D_OPT_DESC= Disable macros overrides using option -D
|
|
|
|
DKIM_DESC= Enable support for DKIM
|
2014-07-04 14:51:23 +02:00
|
|
|
DMARC_DESC= Enable DMARC support
|
2013-06-06 21:25:45 +02:00
|
|
|
DNSDB_DESC= Enable DNS-style lookups
|
Update to 4.83.
Changes in the port:
- Added new options:
* DNSSEC: validate peers using TLSA records
* PRDR: Per-Recipient-Data-Response support
* CERTNAMES: Check certiticates ownership
* DSN: Delivery Status Notifications
* PROXY: Experimental Proxy Protocol
- Enable OCSP stapling by default
- Disable NIS by default
- SRS support is now radio group
- DNSSEC and PRDR are now enabled by default
Changes in exim itself:
This release contains the following enhancements and bugfixes:
+ PRDR was promoted from Experimental to mainline
+ OCSP Stapling was promoted from Experimental to mainline
+ new Experimental feature Proxy Protocol
+ new Experimental feature DSN (Delivery Status Notifications)
+ TLS session improvements
+ TLS SNI fixes
+ LDAP enhancements
+ DMARC fixes (previous CVE-2014-2957) and new $dmarc_domain_policy
+ several new operations (listextract, utf8clean, md5, sha1)
+ enforce header formatting with verify=header_names_ascii
+ new commandline option -oMm
+ new TLSA dns lookup
+ new malware "sock" type
+ cutthrough routing enhancements
+ logging enhancements
+ DNSSEC enhancements
+ exiqgrep enhancements
+ deprecating non-standard SPF results
+ build and portability fixes
+ documentation fixes and enhancements
Uncompatible changes:
This release of Exim includes one incompatible fix: the behavior of
expansion of arguments to math comparison functions (<, <=, =, =>, >)
was unexpected, expanding the values twice. This fix also addresses a
security advisory, CVE-2014-2972. This is not a remote exploit, but if
content that is searched by the above math comparison functions is under
the control of an attacker, specially crafted data can be inserted that
will cause the Exim mail server to perform various file-system functions
as the exim user.
2014-07-22 17:39:44 +02:00
|
|
|
DNSSEC_DESC= Enable DNSSEC validation
|
2013-06-06 21:25:45 +02:00
|
|
|
DSEARCH_DESC= Enable directory-list lookups
|
2015-01-13 14:45:51 +01:00
|
|
|
DSN_DESC= Enable Delivery Status Notifications
|
2013-06-06 21:25:45 +02:00
|
|
|
EMBEDDED_PERL_DESC= Enable embedded Perl interpreter
|
2015-01-13 14:45:51 +01:00
|
|
|
EVENT_DESC= Messages events support (TPDA namely)
|
2014-07-05 17:09:15 +02:00
|
|
|
EXIMON_DESC= Build eximon monitor (requires X libraries)
|
2013-06-06 21:25:45 +02:00
|
|
|
ICONV_DESC= Enable header charset conversion
|
2015-07-27 21:42:14 +02:00
|
|
|
INTERNATIONAL_DESC= Enable support for the transmission of UTF-8 envelope addresses
|
2013-06-06 21:25:45 +02:00
|
|
|
LISTMATCH_RHS_DESC= Enable pre-4.77 behaviour for match_*
|
|
|
|
LMTP_DESC= RFC2033 SMTP over command pipe transport
|
|
|
|
LSEARCH_DESC= Enable wildcarded-file lookups
|
|
|
|
MAILDIR_DESC= Enable Maildir mailbox format
|
|
|
|
MAILSTORE_DESC= Enable Mailstore mailbox format
|
|
|
|
MBX_DESC= Enable MBX mailbox format
|
2014-07-04 18:07:17 +02:00
|
|
|
MYSQL_DESC= Enable mysql lookups
|
2013-06-06 21:25:45 +02:00
|
|
|
NIS_DESC= Enable NIS-style lookups
|
|
|
|
OLD_DEMIME_DESC= Enable old, deprecated "demime" ACL
|
2014-07-04 18:07:17 +02:00
|
|
|
OPENLDAP_DESC= Enable LDAP lookups
|
2014-07-04 14:51:23 +02:00
|
|
|
OCSP_DESC= Enable OCSP stapling
|
2013-06-06 21:25:45 +02:00
|
|
|
PAM_DESC= Enable PAM authentication mechanisms
|
|
|
|
PASSWD_DESC= Enable /etc/passwd lookups
|
2014-07-04 18:07:17 +02:00
|
|
|
PGSQL_DESC= Enable postgresql lookups
|
Update to 4.83.
Changes in the port:
- Added new options:
* DNSSEC: validate peers using TLSA records
* PRDR: Per-Recipient-Data-Response support
* CERTNAMES: Check certiticates ownership
* DSN: Delivery Status Notifications
* PROXY: Experimental Proxy Protocol
- Enable OCSP stapling by default
- Disable NIS by default
- SRS support is now radio group
- DNSSEC and PRDR are now enabled by default
Changes in exim itself:
This release contains the following enhancements and bugfixes:
+ PRDR was promoted from Experimental to mainline
+ OCSP Stapling was promoted from Experimental to mainline
+ new Experimental feature Proxy Protocol
+ new Experimental feature DSN (Delivery Status Notifications)
+ TLS session improvements
+ TLS SNI fixes
+ LDAP enhancements
+ DMARC fixes (previous CVE-2014-2957) and new $dmarc_domain_policy
+ several new operations (listextract, utf8clean, md5, sha1)
+ enforce header formatting with verify=header_names_ascii
+ new commandline option -oMm
+ new TLSA dns lookup
+ new malware "sock" type
+ cutthrough routing enhancements
+ logging enhancements
+ DNSSEC enhancements
+ exiqgrep enhancements
+ deprecating non-standard SPF results
+ build and portability fixes
+ documentation fixes and enhancements
Uncompatible changes:
This release of Exim includes one incompatible fix: the behavior of
expansion of arguments to math comparison functions (<, <=, =, =>, >)
was unexpected, expanding the values twice. This fix also addresses a
security advisory, CVE-2014-2972. This is not a remote exploit, but if
content that is searched by the above math comparison functions is under
the control of an attacker, specially crafted data can be inserted that
will cause the Exim mail server to perform various file-system functions
as the exim user.
2014-07-22 17:39:44 +02:00
|
|
|
PRDR_DESC= Enable Per-Recipient-Data-Response support
|
|
|
|
PROXY_DESC= Enable Experimental Proxy Protocol
|
2013-06-06 21:25:45 +02:00
|
|
|
READLINE_DESC= Enable readline(3) library
|
2016-04-21 17:52:23 +02:00
|
|
|
REDIS_DESC= Enable redis lookups
|
2013-06-06 21:25:45 +02:00
|
|
|
SASLAUTHD_DESC= Enable use of Cyrus SASL auth daemon
|
2014-07-04 18:07:17 +02:00
|
|
|
SA_EXIM_DESC= Build with Spamassassin local scan
|
2015-07-27 21:42:14 +02:00
|
|
|
SOCKS_DESC= Enable smtp transport via socks5 proxies
|
2013-06-06 21:25:45 +02:00
|
|
|
SPF_DESC= Enable Sender Policy Framework checking
|
|
|
|
SQLITE_DESC= Enable SQLite lookups
|
|
|
|
SRS_DESC= Enable Sender Rewriting Scheme
|
|
|
|
SUID_DESC= Install the exim binary suid root
|
|
|
|
TCP_WRAPPERS_DESC= Enable /etc/hosts.allow access control
|
|
|
|
GNUTLS_DESC= Use GnuTLS instead of OpenSSL for TLS
|
|
|
|
WISHLIST_DESC= Include the unsupported patches
|