2017-04-11 11:33:30 +02:00
|
|
|
$NetBSD: patch-ai,v 1.38 2017/04/11 09:33:30 adam Exp $
|
2008-09-04 10:25:19 +02:00
|
|
|
|
2016-03-23 13:55:18 +01:00
|
|
|
1) Add shlib definitions for NetBSD 5; the build system must be
|
|
|
|
hard-coded per OS per version. Not yet reported upstream.
|
|
|
|
|
|
|
|
2) Make this pkgsrc friendly.
|
2004-01-23 13:03:44 +01:00
|
|
|
|
2016-11-04 18:10:10 +01:00
|
|
|
3) Add support for FreeBSD 11 & 12.
|
|
|
|
|
2016-10-31 05:19:07 +01:00
|
|
|
--- makedefs.orig 2016-08-20 00:08:42.000000000 +0000
|
2012-02-27 04:01:30 +01:00
|
|
|
+++ makedefs
|
2016-11-04 18:10:10 +01:00
|
|
|
@@ -272,6 +272,24 @@ case "$SYSTEM.$RELEASE" in
|
|
|
|
: ${SHLIB_ENV="LD_LIBRARY_PATH=`pwd`/lib"}
|
|
|
|
: ${PLUGIN_LD="${CC} -shared"}
|
|
|
|
;;
|
|
|
|
+ FreeBSD.11*) SYSTYPE=FREEBSD11
|
|
|
|
+ : ${CC=cc}
|
|
|
|
+ : ${SHLIB_SUFFIX=.so}
|
|
|
|
+ : ${SHLIB_CFLAGS=-fPIC}
|
|
|
|
+ : ${SHLIB_LD="${CC} -shared"' -Wl,-soname,${LIB}'}
|
|
|
|
+ : ${SHLIB_RPATH='-Wl,-rpath,${SHLIB_DIR}'}
|
|
|
|
+ : ${SHLIB_ENV="LD_LIBRARY_PATH=`pwd`/lib"}
|
|
|
|
+ : ${PLUGIN_LD="${CC} -shared"}
|
|
|
|
+ ;;
|
|
|
|
+ FreeBSD.12*) SYSTYPE=FREEBSD12
|
|
|
|
+ : ${CC=cc}
|
|
|
|
+ : ${SHLIB_SUFFIX=.so}
|
|
|
|
+ : ${SHLIB_CFLAGS=-fPIC}
|
|
|
|
+ : ${SHLIB_LD="${CC} -shared"' -Wl,-soname,${LIB}'}
|
|
|
|
+ : ${SHLIB_RPATH='-Wl,-rpath,${SHLIB_DIR}'}
|
|
|
|
+ : ${SHLIB_ENV="LD_LIBRARY_PATH=`pwd`/lib"}
|
|
|
|
+ : ${PLUGIN_LD="${CC} -shared"}
|
|
|
|
+ ;;
|
|
|
|
DragonFly.*) SYSTYPE=DRAGONFLY
|
|
|
|
;;
|
|
|
|
OpenBSD.2*) SYSTYPE=OPENBSD2
|
|
|
|
@@ -309,6 +327,12 @@ case "$SYSTEM.$RELEASE" in
|
2016-03-23 13:55:18 +01:00
|
|
|
NetBSD.4*) SYSTYPE=NETBSD4
|
|
|
|
;;
|
|
|
|
NetBSD.5*) SYSTYPE=NETBSD5
|
|
|
|
+ : ${SHLIB_SUFFIX=.so}
|
|
|
|
+ : ${SHLIB_CFLAGS=-fPIC}
|
|
|
|
+ : ${SHLIB_LD="${CC-gcc} -shared"' -Wl,-soname,${LIB}'}
|
|
|
|
+ : ${SHLIB_RPATH='-Wl,-rpath,${SHLIB_DIR}'}
|
|
|
|
+ : ${SHLIB_ENV="LD_LIBRARY_PATH=`pwd`/lib"}
|
|
|
|
+ : ${PLUGIN_LD="${CC-gcc} -shared"}
|
|
|
|
;;
|
|
|
|
NetBSD.6*) SYSTYPE=NETBSD6
|
|
|
|
: ${SHLIB_SUFFIX=.so}
|
2016-11-04 18:10:10 +01:00
|
|
|
@@ -389,13 +413,6 @@ case "$SYSTEM.$RELEASE" in
|
2004-11-30 21:54:38 +01:00
|
|
|
esac
|
|
|
|
;;
|
|
|
|
ULTRIX.4*) SYSTYPE=ULTRIX4
|
|
|
|
- if [ -f /usr/local/lib/libdb.a ]; then
|
|
|
|
- SYSLIBS="$SYSLIBS -ldb"
|
|
|
|
- CCARGS="$CCARGS -DHAS_DB"
|
|
|
|
- if [ -d /usr/local/include/db ]; then
|
|
|
|
- CCARGS="$CCARGS -I/usr/local/include/db"
|
|
|
|
- fi
|
|
|
|
- fi
|
|
|
|
for l in syslog resolv; do
|
|
|
|
if [ -f /usr/local/lib/lib$l.a ]; then
|
|
|
|
SYSLIBS="$SYSLIBS -l$l"
|
2016-11-04 18:10:10 +01:00
|
|
|
@@ -437,33 +454,8 @@ case "$SYSTEM.$RELEASE" in
|
2004-11-30 21:54:38 +01:00
|
|
|
esac;;
|
|
|
|
# Tested with RedHat 3.03 on 20020729.
|
|
|
|
Linux.1*) SYSTYPE=LINUX1
|
Update postfix package to 2.10.2. Here is brief changes.
2.10.2
* TLS Interoperability workaround: turn on SHA-2 digests by force. This
improves interoperability with clients and servers that deploy SHA-2 digests
without the required support for TLSv1.2-style digest negotiation.
* TLS Performance workaround: the Postfix SMTP server TLS session cache had
become ineffective because recent OpenSSL versions enable session tickets by
default, resulting in a different ticket encryption key for each smtpd(8)
process. The workaround turns off session tickets. Postfix 2.11 will enable
session tickets properly.
* TLS Interoperability workaround: Debian Exim versions before 4.80-3 may fail
to communicate with Postfix and possibly other MTAs, with the following Exim
SMTP client error message:
TLS error on connection to server-name [server-address]
(gnutls_handshake): The Diffie-Hellman prime sent by the server is not
acceptable (not long enough)
See the RELEASE_NOTES file for a Postfix SMTP server configuration
workaround.
* Bugfix (defect introduced: 1997): memory leak while forwarding mail with the
local(8) delivery agent, in code that handles a cleanup(8) server error.
2.10.1
* Workaround: down-stream maintainers fail to install the new
smtpd_relay_restrictions safety net, causing breakage that could have been
avoided. We now hard-code the safety net instead.
2.10.0
* Separation of relay policy (with smtpd_relay_restrictions) from spam policy
(with smtpd_{client, helo, sender, recipient}_restrictions), which makes
accidental open relay configuration less likely. The default is backwards
compatible.
* HAproxy load-balancer support for postscreen(8) and smtpd(8). The nginx
proxy was already supported by Postfix 2.9 smtpd(8), using XCLIENT commands.
* Support for the TLSv1 and TLSv2 protocols, as well as support to turn them
off if needed for inter-operability.
* Laptop-friendly configuration. By default, Postfix now uses UNIX-domain
sockets instead of FIFOs, and thus avoids MTIME file system updates on an
idle mail system.
* Revised postconf(1) command. The "-x" option expands $name in a parameter
value (both main.cf and master.cf); the "-o name=value" option overrides a
main.cf parameter setting; and postconf(1) now warns about a $name that has
no name=value setting.
* Sendmail-style "socketmap" lookup tables.
2013-09-30 17:21:15 +02:00
|
|
|
- case "$CCARGS" in
|
|
|
|
- *-DNO_DB*) ;;
|
2014-02-09 06:34:13 +01:00
|
|
|
- *-DHAS_DB*) ;;
|
Update postfix package to 2.10.2. Here is brief changes.
2.10.2
* TLS Interoperability workaround: turn on SHA-2 digests by force. This
improves interoperability with clients and servers that deploy SHA-2 digests
without the required support for TLSv1.2-style digest negotiation.
* TLS Performance workaround: the Postfix SMTP server TLS session cache had
become ineffective because recent OpenSSL versions enable session tickets by
default, resulting in a different ticket encryption key for each smtpd(8)
process. The workaround turns off session tickets. Postfix 2.11 will enable
session tickets properly.
* TLS Interoperability workaround: Debian Exim versions before 4.80-3 may fail
to communicate with Postfix and possibly other MTAs, with the following Exim
SMTP client error message:
TLS error on connection to server-name [server-address]
(gnutls_handshake): The Diffie-Hellman prime sent by the server is not
acceptable (not long enough)
See the RELEASE_NOTES file for a Postfix SMTP server configuration
workaround.
* Bugfix (defect introduced: 1997): memory leak while forwarding mail with the
local(8) delivery agent, in code that handles a cleanup(8) server error.
2.10.1
* Workaround: down-stream maintainers fail to install the new
smtpd_relay_restrictions safety net, causing breakage that could have been
avoided. We now hard-code the safety net instead.
2.10.0
* Separation of relay policy (with smtpd_relay_restrictions) from spam policy
(with smtpd_{client, helo, sender, recipient}_restrictions), which makes
accidental open relay configuration less likely. The default is backwards
compatible.
* HAproxy load-balancer support for postscreen(8) and smtpd(8). The nginx
proxy was already supported by Postfix 2.9 smtpd(8), using XCLIENT commands.
* Support for the TLSv1 and TLSv2 protocols, as well as support to turn them
off if needed for inter-operability.
* Laptop-friendly configuration. By default, Postfix now uses UNIX-domain
sockets instead of FIFOs, and thus avoids MTIME file system updates on an
idle mail system.
* Revised postconf(1) command. The "-x" option expands $name in a parameter
value (both main.cf and master.cf); the "-o name=value" option overrides a
main.cf parameter setting; and postconf(1) now warns about a $name that has
no name=value setting.
* Sendmail-style "socketmap" lookup tables.
2013-09-30 17:21:15 +02:00
|
|
|
- *) SYSLIBS="-ldb";;
|
|
|
|
- esac
|
2004-01-23 13:03:44 +01:00
|
|
|
;;
|
|
|
|
Linux.2*) SYSTYPE=LINUX2
|
Update postfix package to 2.10.2. Here is brief changes.
2.10.2
* TLS Interoperability workaround: turn on SHA-2 digests by force. This
improves interoperability with clients and servers that deploy SHA-2 digests
without the required support for TLSv1.2-style digest negotiation.
* TLS Performance workaround: the Postfix SMTP server TLS session cache had
become ineffective because recent OpenSSL versions enable session tickets by
default, resulting in a different ticket encryption key for each smtpd(8)
process. The workaround turns off session tickets. Postfix 2.11 will enable
session tickets properly.
* TLS Interoperability workaround: Debian Exim versions before 4.80-3 may fail
to communicate with Postfix and possibly other MTAs, with the following Exim
SMTP client error message:
TLS error on connection to server-name [server-address]
(gnutls_handshake): The Diffie-Hellman prime sent by the server is not
acceptable (not long enough)
See the RELEASE_NOTES file for a Postfix SMTP server configuration
workaround.
* Bugfix (defect introduced: 1997): memory leak while forwarding mail with the
local(8) delivery agent, in code that handles a cleanup(8) server error.
2.10.1
* Workaround: down-stream maintainers fail to install the new
smtpd_relay_restrictions safety net, causing breakage that could have been
avoided. We now hard-code the safety net instead.
2.10.0
* Separation of relay policy (with smtpd_relay_restrictions) from spam policy
(with smtpd_{client, helo, sender, recipient}_restrictions), which makes
accidental open relay configuration less likely. The default is backwards
compatible.
* HAproxy load-balancer support for postscreen(8) and smtpd(8). The nginx
proxy was already supported by Postfix 2.9 smtpd(8), using XCLIENT commands.
* Support for the TLSv1 and TLSv2 protocols, as well as support to turn them
off if needed for inter-operability.
* Laptop-friendly configuration. By default, Postfix now uses UNIX-domain
sockets instead of FIFOs, and thus avoids MTIME file system updates on an
idle mail system.
* Revised postconf(1) command. The "-x" option expands $name in a parameter
value (both main.cf and master.cf); the "-o name=value" option overrides a
main.cf parameter setting; and postconf(1) now warns about a $name that has
no name=value setting.
* Sendmail-style "socketmap" lookup tables.
2013-09-30 17:21:15 +02:00
|
|
|
- case "$CCARGS" in
|
|
|
|
- *-DNO_DB*) ;;
|
2014-02-09 06:34:13 +01:00
|
|
|
- *-DHAS_DB*) ;;
|
Update postfix package to 2.10.2. Here is brief changes.
2.10.2
* TLS Interoperability workaround: turn on SHA-2 digests by force. This
improves interoperability with clients and servers that deploy SHA-2 digests
without the required support for TLSv1.2-style digest negotiation.
* TLS Performance workaround: the Postfix SMTP server TLS session cache had
become ineffective because recent OpenSSL versions enable session tickets by
default, resulting in a different ticket encryption key for each smtpd(8)
process. The workaround turns off session tickets. Postfix 2.11 will enable
session tickets properly.
* TLS Interoperability workaround: Debian Exim versions before 4.80-3 may fail
to communicate with Postfix and possibly other MTAs, with the following Exim
SMTP client error message:
TLS error on connection to server-name [server-address]
(gnutls_handshake): The Diffie-Hellman prime sent by the server is not
acceptable (not long enough)
See the RELEASE_NOTES file for a Postfix SMTP server configuration
workaround.
* Bugfix (defect introduced: 1997): memory leak while forwarding mail with the
local(8) delivery agent, in code that handles a cleanup(8) server error.
2.10.1
* Workaround: down-stream maintainers fail to install the new
smtpd_relay_restrictions safety net, causing breakage that could have been
avoided. We now hard-code the safety net instead.
2.10.0
* Separation of relay policy (with smtpd_relay_restrictions) from spam policy
(with smtpd_{client, helo, sender, recipient}_restrictions), which makes
accidental open relay configuration less likely. The default is backwards
compatible.
* HAproxy load-balancer support for postscreen(8) and smtpd(8). The nginx
proxy was already supported by Postfix 2.9 smtpd(8), using XCLIENT commands.
* Support for the TLSv1 and TLSv2 protocols, as well as support to turn them
off if needed for inter-operability.
* Laptop-friendly configuration. By default, Postfix now uses UNIX-domain
sockets instead of FIFOs, and thus avoids MTIME file system updates on an
idle mail system.
* Revised postconf(1) command. The "-x" option expands $name in a parameter
value (both main.cf and master.cf); the "-o name=value" option overrides a
main.cf parameter setting; and postconf(1) now warns about a $name that has
no name=value setting.
* Sendmail-style "socketmap" lookup tables.
2013-09-30 17:21:15 +02:00
|
|
|
- *) if [ -f /usr/include/db.h ]
|
|
|
|
- then
|
|
|
|
- : we are all set
|
|
|
|
- elif [ -f /usr/include/db/db.h ]
|
|
|
|
- then
|
|
|
|
- CCARGS="$CCARGS -I/usr/include/db"
|
|
|
|
- else
|
|
|
|
- # No, we're not going to try db1 db2 db3 etc.
|
|
|
|
- # On a properly installed system, Postfix builds
|
|
|
|
- # by including <db.h> and by linking with -ldb
|
|
|
|
- echo "No <db.h> include file found." 1>&2
|
|
|
|
- echo "Install the appropriate db*-devel package first." 1>&2
|
|
|
|
- exit 1
|
|
|
|
- fi
|
|
|
|
- SYSLIBS="-ldb"
|
|
|
|
- ;;
|
|
|
|
- esac
|
2004-04-14 14:55:20 +02:00
|
|
|
for name in nsl resolv $GDBM_LIBS
|
|
|
|
do
|
|
|
|
for lib in /usr/lib64 /lib64 /usr/lib /lib
|
2016-11-04 18:10:10 +01:00
|
|
|
@@ -524,25 +516,6 @@ EOF
|
2015-09-07 11:47:01 +02:00
|
|
|
: ${PLUGIN_LD="${CC-gcc} -shared"}
|
Update postfix package to 2.10.2. Here is brief changes.
2.10.2
* TLS Interoperability workaround: turn on SHA-2 digests by force. This
improves interoperability with clients and servers that deploy SHA-2 digests
without the required support for TLSv1.2-style digest negotiation.
* TLS Performance workaround: the Postfix SMTP server TLS session cache had
become ineffective because recent OpenSSL versions enable session tickets by
default, resulting in a different ticket encryption key for each smtpd(8)
process. The workaround turns off session tickets. Postfix 2.11 will enable
session tickets properly.
* TLS Interoperability workaround: Debian Exim versions before 4.80-3 may fail
to communicate with Postfix and possibly other MTAs, with the following Exim
SMTP client error message:
TLS error on connection to server-name [server-address]
(gnutls_handshake): The Diffie-Hellman prime sent by the server is not
acceptable (not long enough)
See the RELEASE_NOTES file for a Postfix SMTP server configuration
workaround.
* Bugfix (defect introduced: 1997): memory leak while forwarding mail with the
local(8) delivery agent, in code that handles a cleanup(8) server error.
2.10.1
* Workaround: down-stream maintainers fail to install the new
smtpd_relay_restrictions safety net, causing breakage that could have been
avoided. We now hard-code the safety net instead.
2.10.0
* Separation of relay policy (with smtpd_relay_restrictions) from spam policy
(with smtpd_{client, helo, sender, recipient}_restrictions), which makes
accidental open relay configuration less likely. The default is backwards
compatible.
* HAproxy load-balancer support for postscreen(8) and smtpd(8). The nginx
proxy was already supported by Postfix 2.9 smtpd(8), using XCLIENT commands.
* Support for the TLSv1 and TLSv2 protocols, as well as support to turn them
off if needed for inter-operability.
* Laptop-friendly configuration. By default, Postfix now uses UNIX-domain
sockets instead of FIFOs, and thus avoids MTIME file system updates on an
idle mail system.
* Revised postconf(1) command. The "-x" option expands $name in a parameter
value (both main.cf and master.cf); the "-o name=value" option overrides a
main.cf parameter setting; and postconf(1) now warns about a $name that has
no name=value setting.
* Sendmail-style "socketmap" lookup tables.
2013-09-30 17:21:15 +02:00
|
|
|
;;
|
2015-07-22 02:25:37 +02:00
|
|
|
Linux.[34].*) SYSTYPE=LINUX$RELEASE_MAJOR
|
Update postfix package to 2.10.2. Here is brief changes.
2.10.2
* TLS Interoperability workaround: turn on SHA-2 digests by force. This
improves interoperability with clients and servers that deploy SHA-2 digests
without the required support for TLSv1.2-style digest negotiation.
* TLS Performance workaround: the Postfix SMTP server TLS session cache had
become ineffective because recent OpenSSL versions enable session tickets by
default, resulting in a different ticket encryption key for each smtpd(8)
process. The workaround turns off session tickets. Postfix 2.11 will enable
session tickets properly.
* TLS Interoperability workaround: Debian Exim versions before 4.80-3 may fail
to communicate with Postfix and possibly other MTAs, with the following Exim
SMTP client error message:
TLS error on connection to server-name [server-address]
(gnutls_handshake): The Diffie-Hellman prime sent by the server is not
acceptable (not long enough)
See the RELEASE_NOTES file for a Postfix SMTP server configuration
workaround.
* Bugfix (defect introduced: 1997): memory leak while forwarding mail with the
local(8) delivery agent, in code that handles a cleanup(8) server error.
2.10.1
* Workaround: down-stream maintainers fail to install the new
smtpd_relay_restrictions safety net, causing breakage that could have been
avoided. We now hard-code the safety net instead.
2.10.0
* Separation of relay policy (with smtpd_relay_restrictions) from spam policy
(with smtpd_{client, helo, sender, recipient}_restrictions), which makes
accidental open relay configuration less likely. The default is backwards
compatible.
* HAproxy load-balancer support for postscreen(8) and smtpd(8). The nginx
proxy was already supported by Postfix 2.9 smtpd(8), using XCLIENT commands.
* Support for the TLSv1 and TLSv2 protocols, as well as support to turn them
off if needed for inter-operability.
* Laptop-friendly configuration. By default, Postfix now uses UNIX-domain
sockets instead of FIFOs, and thus avoids MTIME file system updates on an
idle mail system.
* Revised postconf(1) command. The "-x" option expands $name in a parameter
value (both main.cf and master.cf); the "-o name=value" option overrides a
main.cf parameter setting; and postconf(1) now warns about a $name that has
no name=value setting.
* Sendmail-style "socketmap" lookup tables.
2013-09-30 17:21:15 +02:00
|
|
|
- case "$CCARGS" in
|
|
|
|
- *-DNO_DB*) ;;
|
2014-02-09 06:34:13 +01:00
|
|
|
- *-DHAS_DB*) ;;
|
Update postfix package to 2.10.2. Here is brief changes.
2.10.2
* TLS Interoperability workaround: turn on SHA-2 digests by force. This
improves interoperability with clients and servers that deploy SHA-2 digests
without the required support for TLSv1.2-style digest negotiation.
* TLS Performance workaround: the Postfix SMTP server TLS session cache had
become ineffective because recent OpenSSL versions enable session tickets by
default, resulting in a different ticket encryption key for each smtpd(8)
process. The workaround turns off session tickets. Postfix 2.11 will enable
session tickets properly.
* TLS Interoperability workaround: Debian Exim versions before 4.80-3 may fail
to communicate with Postfix and possibly other MTAs, with the following Exim
SMTP client error message:
TLS error on connection to server-name [server-address]
(gnutls_handshake): The Diffie-Hellman prime sent by the server is not
acceptable (not long enough)
See the RELEASE_NOTES file for a Postfix SMTP server configuration
workaround.
* Bugfix (defect introduced: 1997): memory leak while forwarding mail with the
local(8) delivery agent, in code that handles a cleanup(8) server error.
2.10.1
* Workaround: down-stream maintainers fail to install the new
smtpd_relay_restrictions safety net, causing breakage that could have been
avoided. We now hard-code the safety net instead.
2.10.0
* Separation of relay policy (with smtpd_relay_restrictions) from spam policy
(with smtpd_{client, helo, sender, recipient}_restrictions), which makes
accidental open relay configuration less likely. The default is backwards
compatible.
* HAproxy load-balancer support for postscreen(8) and smtpd(8). The nginx
proxy was already supported by Postfix 2.9 smtpd(8), using XCLIENT commands.
* Support for the TLSv1 and TLSv2 protocols, as well as support to turn them
off if needed for inter-operability.
* Laptop-friendly configuration. By default, Postfix now uses UNIX-domain
sockets instead of FIFOs, and thus avoids MTIME file system updates on an
idle mail system.
* Revised postconf(1) command. The "-x" option expands $name in a parameter
value (both main.cf and master.cf); the "-o name=value" option overrides a
main.cf parameter setting; and postconf(1) now warns about a $name that has
no name=value setting.
* Sendmail-style "socketmap" lookup tables.
2013-09-30 17:21:15 +02:00
|
|
|
- *) if [ -f /usr/include/db.h ]
|
|
|
|
- then
|
|
|
|
- : we are all set
|
|
|
|
- elif [ -f /usr/include/db/db.h ]
|
|
|
|
- then
|
|
|
|
- CCARGS="$CCARGS -I/usr/include/db"
|
|
|
|
- else
|
|
|
|
- # On a properly installed system, Postfix builds
|
|
|
|
- # by including <db.h> and by linking with -ldb
|
|
|
|
- echo "No <db.h> include file found." 1>&2
|
|
|
|
- echo "Install the appropriate db*-devel package first." 1>&2
|
|
|
|
- exit 1
|
|
|
|
- fi
|
|
|
|
- SYSLIBS="-ldb"
|
|
|
|
- ;;
|
|
|
|
- esac
|
|
|
|
for name in nsl resolv
|
|
|
|
do
|
|
|
|
for lib in /usr/lib64 /lib64 /usr/lib /usr/lib/* /lib /lib/*
|
2016-11-04 18:10:10 +01:00
|
|
|
@@ -563,24 +536,6 @@ EOF
|
Update postfix package to 2.10.2. Here is brief changes.
2.10.2
* TLS Interoperability workaround: turn on SHA-2 digests by force. This
improves interoperability with clients and servers that deploy SHA-2 digests
without the required support for TLSv1.2-style digest negotiation.
* TLS Performance workaround: the Postfix SMTP server TLS session cache had
become ineffective because recent OpenSSL versions enable session tickets by
default, resulting in a different ticket encryption key for each smtpd(8)
process. The workaround turns off session tickets. Postfix 2.11 will enable
session tickets properly.
* TLS Interoperability workaround: Debian Exim versions before 4.80-3 may fail
to communicate with Postfix and possibly other MTAs, with the following Exim
SMTP client error message:
TLS error on connection to server-name [server-address]
(gnutls_handshake): The Diffie-Hellman prime sent by the server is not
acceptable (not long enough)
See the RELEASE_NOTES file for a Postfix SMTP server configuration
workaround.
* Bugfix (defect introduced: 1997): memory leak while forwarding mail with the
local(8) delivery agent, in code that handles a cleanup(8) server error.
2.10.1
* Workaround: down-stream maintainers fail to install the new
smtpd_relay_restrictions safety net, causing breakage that could have been
avoided. We now hard-code the safety net instead.
2.10.0
* Separation of relay policy (with smtpd_relay_restrictions) from spam policy
(with smtpd_{client, helo, sender, recipient}_restrictions), which makes
accidental open relay configuration less likely. The default is backwards
compatible.
* HAproxy load-balancer support for postscreen(8) and smtpd(8). The nginx
proxy was already supported by Postfix 2.9 smtpd(8), using XCLIENT commands.
* Support for the TLSv1 and TLSv2 protocols, as well as support to turn them
off if needed for inter-operability.
* Laptop-friendly configuration. By default, Postfix now uses UNIX-domain
sockets instead of FIFOs, and thus avoids MTIME file system updates on an
idle mail system.
* Revised postconf(1) command. The "-x" option expands $name in a parameter
value (both main.cf and master.cf); the "-o name=value" option overrides a
main.cf parameter setting; and postconf(1) now warns about a $name that has
no name=value setting.
* Sendmail-style "socketmap" lookup tables.
2013-09-30 17:21:15 +02:00
|
|
|
;;
|
|
|
|
GNU.0*|GNU/kFreeBSD.[567]*)
|
2014-02-09 06:34:13 +01:00
|
|
|
SYSTYPE=GNU0
|
Update postfix package to 2.10.2. Here is brief changes.
2.10.2
* TLS Interoperability workaround: turn on SHA-2 digests by force. This
improves interoperability with clients and servers that deploy SHA-2 digests
without the required support for TLSv1.2-style digest negotiation.
* TLS Performance workaround: the Postfix SMTP server TLS session cache had
become ineffective because recent OpenSSL versions enable session tickets by
default, resulting in a different ticket encryption key for each smtpd(8)
process. The workaround turns off session tickets. Postfix 2.11 will enable
session tickets properly.
* TLS Interoperability workaround: Debian Exim versions before 4.80-3 may fail
to communicate with Postfix and possibly other MTAs, with the following Exim
SMTP client error message:
TLS error on connection to server-name [server-address]
(gnutls_handshake): The Diffie-Hellman prime sent by the server is not
acceptable (not long enough)
See the RELEASE_NOTES file for a Postfix SMTP server configuration
workaround.
* Bugfix (defect introduced: 1997): memory leak while forwarding mail with the
local(8) delivery agent, in code that handles a cleanup(8) server error.
2.10.1
* Workaround: down-stream maintainers fail to install the new
smtpd_relay_restrictions safety net, causing breakage that could have been
avoided. We now hard-code the safety net instead.
2.10.0
* Separation of relay policy (with smtpd_relay_restrictions) from spam policy
(with smtpd_{client, helo, sender, recipient}_restrictions), which makes
accidental open relay configuration less likely. The default is backwards
compatible.
* HAproxy load-balancer support for postscreen(8) and smtpd(8). The nginx
proxy was already supported by Postfix 2.9 smtpd(8), using XCLIENT commands.
* Support for the TLSv1 and TLSv2 protocols, as well as support to turn them
off if needed for inter-operability.
* Laptop-friendly configuration. By default, Postfix now uses UNIX-domain
sockets instead of FIFOs, and thus avoids MTIME file system updates on an
idle mail system.
* Revised postconf(1) command. The "-x" option expands $name in a parameter
value (both main.cf and master.cf); the "-o name=value" option overrides a
main.cf parameter setting; and postconf(1) now warns about a $name that has
no name=value setting.
* Sendmail-style "socketmap" lookup tables.
2013-09-30 17:21:15 +02:00
|
|
|
- case "$CCARGS" in
|
|
|
|
- *-DNO_DB*) ;;
|
|
|
|
- *) if [ -f /usr/include/db.h ]
|
|
|
|
- then
|
|
|
|
- : we are all set
|
|
|
|
- elif [ -f /usr/include/db/db.h ]
|
|
|
|
- then
|
|
|
|
- CCARGS="$CCARGS -I/usr/include/db"
|
|
|
|
- else
|
|
|
|
- # On a properly installed system, Postfix builds
|
|
|
|
- # by including <db.h> and by linking with -ldb
|
|
|
|
- echo "No <db.h> include file found." 1>&2
|
|
|
|
- echo "Install the appropriate db*-devel package first." 1>&2
|
|
|
|
- exit 1
|
|
|
|
- fi
|
|
|
|
- SYSLIBS="-ldb"
|
|
|
|
- ;;
|
|
|
|
- esac
|
|
|
|
for name in nsl resolv
|
|
|
|
do
|
|
|
|
for lib in /usr/lib64 /lib64 /usr/lib /lib
|
2016-11-04 18:10:10 +01:00
|
|
|
@@ -611,25 +566,13 @@ EOF
|
2004-11-30 21:54:38 +01:00
|
|
|
HP-UX.A.09.*) SYSTYPE=HPUX9
|
|
|
|
SYSLIBS=-ldbm
|
|
|
|
CCARGS="$CCARGS -DMISSING_USLEEP"
|
|
|
|
- if [ -f /usr/lib/libdb.a ]; then
|
|
|
|
- CCARGS="$CCARGS -DHAS_DB"
|
|
|
|
- SYSLIBS="$SYSLIBS -ldb"
|
|
|
|
- fi
|
|
|
|
;;
|
|
|
|
HP-UX.B.10.*) SYSTYPE=HPUX10
|
|
|
|
CCARGS="$CCARGS `nm /usr/lib/libc.a 2>/dev/null |
|
|
|
|
(grep usleep >/dev/null || echo '-DMISSING_USLEEP')`"
|
|
|
|
- if [ -f /usr/lib/libdb.a ]; then
|
|
|
|
- CCARGS="$CCARGS -DHAS_DB"
|
|
|
|
- SYSLIBS=-ldb
|
|
|
|
- fi
|
|
|
|
;;
|
|
|
|
HP-UX.B.11.*) SYSTYPE=HPUX11
|
|
|
|
SYSLIBS=-lnsl
|
|
|
|
- if [ -f /usr/lib/libdb.a ]; then
|
|
|
|
- CCARGS="$CCARGS -DHAS_DB"
|
|
|
|
- SYSLIBS="$SYSLIBS -ldb"
|
|
|
|
- fi
|
|
|
|
;;
|
|
|
|
ReliantUNIX-?.5.43) SYSTYPE=ReliantUnix543
|
|
|
|
RANLIB=echo
|
2017-04-11 11:33:30 +02:00
|
|
|
@@ -671,12 +614,12 @@ ReliantUNIX-?.5.43) SYSTYPE=ReliantUnix5
|
|
|
|
esac
|
|
|
|
: ${SHLIB_CFLAGS=-fPIC}
|
|
|
|
: ${SHLIB_SUFFIX=.dylib}
|
|
|
|
- : ${SHLIB_LD='cc -shared -Wl,-flat_namespace -Wl,-undefined,dynamic_lookup -Wl,-install_name,@rpath/${LIB}'}
|
|
|
|
+ : ${SHLIB_LD='${CC} -shared -Wl,-flat_namespace -Wl,-undefined,dynamic_lookup -Wl,-install_name,@rpath/${LIB}'}
|
|
|
|
: ${SHLIB_RPATH='-Wl,-rpath,${SHLIB_DIR}'}
|
|
|
|
# In MacOS/X 10.11.x /bin/sh unsets DYLD_LIBRARY_PATH, so we
|
|
|
|
# have export it into postfix-install indirectly!
|
|
|
|
: ${SHLIB_ENV="DYLD_LIBRARY_PATH=`pwd`/lib SHLIB_ENV_VAR=DYLD_LIBRARY_PATH SHLIB_ENV_VAL=`pwd`/lib"}
|
|
|
|
- : ${PLUGIN_LD='cc -shared -Wl,-flat_namespace -Wl,-undefined,dynamic_lookup'}
|
|
|
|
+ : ${PLUGIN_LD='${CC} -shared -Wl,-flat_namespace -Wl,-undefined,dynamic_lookup'}
|
|
|
|
;;
|
|
|
|
dcosx.1*) SYSTYPE=DCOSX1
|
|
|
|
RANLIB=echo
|
2016-11-04 18:10:10 +01:00
|
|
|
@@ -757,8 +700,8 @@ esac
|
2016-10-31 05:19:07 +01:00
|
|
|
#
|
|
|
|
case "$CCARGS" in
|
|
|
|
*-DNO_EAI*) ;;
|
|
|
|
- *) icu_cppflags=`(icu-config --cppflags) 2>/dev/null` && {
|
|
|
|
- icu_ldflags=`(icu-config --ldflags) 2>/dev/null` && {
|
|
|
|
+ *) icu_cppflags=`(pkg-config --cflags icu-i18n) 2>/dev/null` && {
|
|
|
|
+ icu_ldflags=`(pkg-config --libs icu-i18n) 2>/dev/null` && {
|
|
|
|
trap 'rm -f makedefs.test makedefs.test.[co]' 1 2 3 15
|
|
|
|
cat >makedefs.test.c <<'EOF'
|
|
|
|
#include <unicode/uidna.h>
|