* Remove dead master site
* Add the URL with the old versions to master sites to prevent 1.04
release rendering our port unfetchable
* Remove unnecessary -lstdc++ from CXXFLAGS
* Remove our implementation of SMTP authentication, since one has been
implemented by the authors (remove files/patch-doc-nullmailer-send.8,
files/patch-lib-list.h and files/patch-smtp_authentication)
* Add a note that the SMTP authentication option has been changed
Submitted by: vd
The reason is strong. A quote from submitter:
In current state choose of native or nullmailer's
sendmail/mailq depends on order of paths in $PATH
instead of sysadmins choose. (/etc/mail/mail.conf in general case)
PR: ports/45152
Submitted by: "."@babolo.ru
vulnerability.
No trojan, no privilege gain. Because nullmailer is not DSN aware,
it has nothing to do if the smart relay refuses to relay correctly.
Stopping itself in such condition is a bug, or not a proper feature.
On bugtraq, it's a vulnerability anyway.
o Completely package-safe (with evil tricks)
o Bump PORTREVISION
Because I haven't invented any convenient dialog script to ask people
what protocol (smtp/qmqp) and what address of their mail server, there
still one comment left in pkg-message.
If there's any, please tell me where to steal^h^h^hudy.
Reviewed by: Sybolt de Boer <bolt@xs4all.nl>
If you want to create a file, visit that file with C-x C-f,
then enter the text in that file's own buffer.
Add nullmailer, a sendmail compatible MTA which only does one thing:
send mail to a SMTP or QMQP smart relay.
NOTICE: This port is usable now, but not yet dumb-safe. Please pay
attention on its pkg-message.