Commit graph

10773 commits

Author SHA1 Message Date
tnn
af4fdbe790 dbmail: update to 3.2.5
3.2.5
Added
  IMAP Daemon: added switch to control the diffential state reload
    (mailbox_update_strategy=2), more information in dbmail.conf,
    mailbox_update_strategy_2_max_iterations [#81]
  IMAP Daemon: added switch to control UNSEEN first message in SELECT commands

Changed
  IMAP Daemon: allow reporting UID COPY success in case of various failures
    (except quota), reporting issues are sent to error log as warnings [#87]

Optimizations
  optimizing differential state [#81]
  optimizing fetch message headers [#85]

Issues
  fixing issue related to copy message in regard to RFC 3501, section 6.4.8
  fixing issues related group_concat for PostgreSql [#75], [#78]
  fixing issue related to lastRowId [#71]
  fixing issues related with differential update [#70], [#73]
  fixing proc not being used in BSD systems [#74]
  IMAP Daemon: segmentation fault [#68]

3.2.4
Added
  IMAP Daemon: mailbox-update-strategy switch (see dbmail.conf), experimental
  support for application_name in database connection uri
  IMAP Daemon: mailbox_search_strategy switch (see dbmail.conf)

Changed
  systemd unit changed to type notify
  mailbox state is build using only valid messages [#39]

Optimizations
  IMAP Daemon: optimization of sql queries in relation to message headers
  libevent increased priority on accepting new connections
  libevent optimization on reading and writing to sockets
  simplify libzdb configuration (AC_CHECK_HEADERS)

Issues
  fix segmentation fault in imap_append_hash_as_string [#12]
  dbmail-users: sql issue on deleting alias user [#18]
  IMAP Daemon: generation of invalid BODYSTRUCTURE in Content-Type field [#23]
  fix support for jemalloc latest version [#35]
  IMAP Deamon: BYE Command now offers optional message even on normal operations
  IMAP Deamon: idle message now offers optional message (* OK Still Here)
  IMAP Daemon: random hangs when single user is connected [#37]
  fix fd leaks
  IMAP Daemon: fix MODIFIED keyword, too many '[' and ']'
  fix segmentation fault in find_end_of_header
  fix gcc 10 compilation issue, duplicated definition
2020-08-15 10:52:50 +00:00
wiz
c02712e862 neomutt: update to 20200814.
2020-08-14  Richard Russon  <rich@flatcap.org>
* Security
  - Add mitigation against DoS from thousands of parts
* Features
  - Allow index-style searching in postpone menu
  - Open NeoMutt using a mailbox name
  - Add `cd` command to change the current working directory
  - Add tab-completion menu for patterns
  - Allow renaming existing mailboxes
  - Check for missing attachments in alternative parts
  - Add one-liner docs to config items
* Bug Fixes
  - Fix logic in checking an empty From address
  - Fix Imap crash in `cmd_parse_expunge()`
  - Fix setting attributes with S-Lang
  - Fix: redrawing of `$pager_index_lines`
  - Fix progress percentage for syncing large mboxes
  - Fix sidebar drawing in presence of indentation + named mailboxes
  - Fix retrieval of drafts when "postponed" is not in the mailboxes list
  - Do not add comments to address group terminators
  - Fix alias sorting for degenerate addresses
  - Fix attaching emails
  - Create directories for nonexistent file hcache case
  - Avoid creating mailboxes for failed subscribes
  - Fix crash if rejecting cert
* Changed Config
  - Add `$copy_decode_weed`, `$pipe_decode_weed`, `$print_decode_weed`
  - Change default of `$crypt_protected_headers_subject` to "..."
  - Add default keybindings to history-up/down
* Translations
  - 100% Czech
  - 100% Spanish
* Build
  - Allow building against Lua 5.4
  - Fix when sqlite3.h is missing
* Docs
  - Add a brief section on stty to the manual
  - Update section "Terminal Keybindings" in the manual
  - Clarify PGP Pseudo-header `S<id>` duration
* Code
  - Clean up String API
  - Make the Sidebar more independent
  - De-centralise the Config Variables
  - Refactor dialogs
  - Refactor: Help Bar generation
  - Make more APIs Context-free
  - Adjust the edata use in Maildir and Notmuch
  - Window refactoring
  - Convert libsend to use Config functions
  - Refactor notifications to reduce noise
  - Convert Keymaps to use STAILQ
  - Track currently selected email by msgid
  - Config: no backing global variable
  - Add events for key binding
* Upstream
  - Fix imap postponed mailbox use-after-free error
  - Speed up thread sort when many long threads exist
  - Fix ~v tagging when switching to non-threaded sorting
  - Add message/global to the list of known "message" types
  - Print progress meter when copying/saving tagged messages
  - Remove ansi formatting from autoview generated quoted replies
  - Change postpone mode to write Date header too
  - Unstuff `format=flowed`
2020-08-14 20:09:53 +00:00
bsiegert
9fad3613b8 Revbump all Go packages after go114 update 2020-08-14 20:01:19 +00:00
taca
5f2390cadc mail/dovecot2-pigeonhole: distfile changes
Distfile changes.

1. Official annoucne says "The only change here is that the configure.ac
   file has correctly formatted version number."

2. Name of distfile is changed to match previous file naming scheme.
   Old distfile is still available.

3. automake 1.15.1 is used instead of previous 1.15.  So, generated files
   by it are changed.

4. Other files are not changed, so there is no functional change.

Bump PKGREVISION.
2020-08-13 15:28:45 +00:00
schmonz
d2284fe0bf Set CMAKE_INSTALL_NAME_DIR to lib/rspamd so that shlibs are built with
correct install_name_tool -id on macOS, where this fixes CHECK_SHLIBS
(and probably runtime behavior too). While here, the patch to link with
-lrt on NetBSD has been upstreamed; remove. Bump PKGREVISION.
2020-08-12 20:00:30 +00:00
taca
8e0b3fff87 mail/dovecot2-pigeonhole: update to 0.5.11
Update dovecot2-pigeonhole to 0.5.11.


v0.5.11 2020-08-12  Aki Tuomi <aki.tuomi@open-xchange.com>

	* managesieve: managesieve_max_line_length setting is now a "size" type
	  instead of just number of bytes. This allows using e.g. "64k" as the
	  value.
	- lib-sieve: When folding white space is used in the Message-ID header,
	  it is not stripped away correctly before the message ID value is used,
	  causing e.g. garbled log lines at delivery.
2020-08-12 15:58:02 +00:00
taca
326aadf108 mail/dovocot2: update to 2.3.11.3
Update dovecot2 and related packages to 2.3.11.3.

v2.3.11.3 2020-07-29	Aki Tuomi <aki.tuomi@open-xchange.com>

	- pop3-login: Login didn't handle commands in multiple IP packets properly.
	  This mainly affected large XCLIENT commands or a large SASL initial
	  response parameter in the AUTH command.
	- pop3: pop3_deleted_flag setting was broken, causing:
	  Panic: file seq-range-array.c: line 472 (seq_range_array_invert):
	  assertion failed: (range[count-1].seq2 <= max_seq)

v2.3.11.2 2020-07-13	Aki Tuomi <aki.tuomi@open-xchange.com>

	- auth: Lua passdb/userdb leaks stack elements per call, eventually
	  causing the stack to become too deep and crashing the auth or
	  auth-worker process.
	- lib-mail: v2.3.11 regression: MIME parts not returned correctly by
	  Dovecot MIME parser.
	- pop3-login: Login would fail with "Input buffer full" if the initial
	  response for SASL was too long.

v2.3.11 2020-06-17  Aki Tuomi <aki.tuomi@open-xchange.com>

	* CVE-2020-12100: Parsing mails with a large number of MIME parts could
	  have resulted in excessive CPU usage or a crash due to running out of
	  stack memory.
	* CVE-2020-12673: Dovecot's NTLM implementation does not correctly check
	  message buffer size, which leads to reading past allocation which can
	  lead to crash.
	* CVE-2020-12674: Dovecot's RPA mechanism implementation accepts
	  zero-length message, which leads to assert-crash later on.
	* Events: Fix inconsistency in events. See event documentation in
	  https://doc.dovecot.org.
	* imap_command_finished event's cmd_name field now contains "unknown"
	  for unknown commands. A new "cmd_input_name" field contains the
	  command name exactly as it was sent.
	* lib-index: Renamed mail_cache_compress_* settings to mail_cache_purge_*.
	  Note that these settings are mainly intended for testing and usually
	  shouldn't be changed.
	* events: Renamed "index" event category to "mail-index".
	* events: service:<name> category is now using the name from
	  configuration file.
	* dns-client: service dns_client was renamed to dns-client.
	* log: Prefixes generally use the service name from configuration file.
	  For example dict-async service will now use
	  "dict-async(pid): " log prefix instead of "dict(pid): "
	* *-login: Changed logging done by proxying to use a consistent prefix
	  containing the IP address and port.
	* *-login: Changed disconnection log messages to be slightly clearer.
	+ dict: Add events for dictionaries.
	+ lib-index: Finish logging with events.
	+ oauth2: Support local validation of JWT tokens.
	+ stats: Add support for dynamic histograms and grouping. See
	  https://doc.dovecot.org/configuration_manual/stats/.
	+ imap: Implement RFC 8514: IMAP SAVEDATE
	+ lib-index: If a long-running transaction (e.g. SORT/FETCH on a huge
	  folder) adds a lot of data to dovecot.index.cache file, commit those
	  changes periodically to make them visible to other concurrent sessions
	  as well.
	+ stats: Add OpenMetrics exporter for statistics. See
	  https://doc.dovecot.org/configuration_manual/stats/openmetrics/.
	+ stats: Support disabling stats-writer socket by setting
	  stats_writer_socket_path="".
	- auth-worker: Process keeps slowly increasing its memory usage and
	  eventually dies with "out of memory" due to reaching vsz_limit.
	- auth: Prevent potential timing attacks in authentication secret
	  comparisons: OAUTH2 JWT-token HMAC, imap-urlauth token, crypt() result.
	- auth: Several auth-mechanisms allowed input to be truncated by NUL
	  which can potentially lead to unintentional issues or even successful
	  logins which should have failed.
	- auth: When auth policy returned a delay, auth_request_finished event
	  had policy_result=ok field instead of policy_result=delayed.
	- auth: auth process crash when auth_policy_server_url is set to an
	  invalid URL.
	- dict-ldap: Crash occurs if var_expand template expansion fails.
	- dict: If dict client disconnected while iteration was still running,
	  dict process could have started using 100% CPU, although it was still
	  handling clients.
	- doveadm: Running doveadm commands via proxying may hang, especially
	  when doveadm is printing a lot of output.
	- imap: "MOVE * destfolder" goes to a loop copying the last mail to the
	  destination until the imap process dies due to running out of memory.
	- imap: Running "UID MOVE 1:* Trash" on an empty folder goes to infinite
	  loop.
	- imap: SEARCH doesn't support $.
	- lib-compress: Buffer over-read in zlib stream read.
	- lib-dns: If DNS lookup times out, lib-dns can cause crash in calling
	  process.
	- lib-index: Fixed several bugs in dovecot.index.cache handling that
	  could have caused cached data to be lost.
	- lib-index: Writing to >=1 GB dovecot.index.cache files may cause
	  assert-crashes:
	  Panic: file mail-index-util.c: line 37 (mail_index_uint32_to_offset):
	  assertion failed: (offset < 0x40000000)
	- lib-ssl-iostream: Fix buggy OpenSSL error handling without
	  assert-crashing. If there is no error available, log it as an error
	  instead of crashing:
	  Panic: file iostream-openssl.c: line 599 (openssl_iostream_handle_error):
	  assertion failed: (errno != 0)
	- lib-ssl-iostream: ssl_key_password setting did not work.
	- submission: A segfault crash may occur when the client or server
	  disconnects while a non-transaction command like NOOP or VRFY is still
	  being processed.
	- virtual: Copying/moving mails with IMAP into a virtual folder assert-crashes:
	  Panic: file cmd-copy.c: line 152 (fetch_and_copy): assertion failed:
	  (copy_ctx->copy_count == seq_range_count(&copy_ctx->saved_uids))
2020-08-12 15:54:38 +00:00
taca
a929c817f1 mail/roundcube: update to 1.4.8
Update roundcube to 1.4.8, security release.


RELEASE 1.4.8
-------------
- Security: Fix potential XSS issue in HTML editor of the identity signature input (#7507)
- Managesieve: Fix too-small input field in Elastic when using custom headers (#7498)
- Fix support for an error as a string in message_before_send hook (#7475)
- Elastic: Fix redundant scrollbar in plain text editor on mail reply (#7500)
- Elastic: Fix deleted and replied+forwarded icons on messages list (#7503)
- Managesieve: Allow angle brackets in out-of-office message body (#7518)
- Fix bug in conversion of email addresses to mailto links in plain text messages (#7526)
- Fix format=flowed formatting on plain text part derived from the HTML content (#7504)
- Fix incorrect rewriting of internal links in HTML content (#7512)
- Fix handling links without defined protocol (#7454)
- Fix paging of search results on IMAP servers with no SORT capability (#7462)
- Fix detecting special folders on servers with both SPECIAL-USE and LIST-STATUS (#7525)
- Security: Fix cross-site scripting (XSS) via HTML messages with malicious svg content [CVE-2020-16145]
- Security: Fix cross-site scripting (XSS) via HTML messages with malicious math content
2020-08-10 22:30:41 +00:00
wiz
7cdcbaf495 rspamd: create the maps.d directory in sysconfdir.
Needed for binary packages.

Bump PKGREVISION.
2020-08-08 14:35:37 +00:00
schmonz
b301b44dcb Update to 3.12.1. From the changelog:
* Fix calling opmlexport without arguments
2020-08-03 07:57:43 +00:00
schmonz
44bda70a95 Update to 3.12. From the changelog:
* Drop support for EOL Python 3.4, add support for Python 3.8
* Add List_ID and List_Post headers to the generated emails
* Add a new `reply-changes` setting
* Improve configurability of text wrapping for the emails
* Use `platform.node()` instead of "dev.null.invalid" in
  "Message-ID" header
* Improve locking support for when multiple rss2email instances are run
  in parallel
* Fix handling of __VERSION__ and __URL__ in user-agent strings
* Fix opmlexport
2020-08-02 20:59:09 +00:00
oster
2e17c15b0f Bump pkgrevision. Thanks, Joerg. 2020-07-27 22:28:47 +00:00
oster
c6f7694c8a Fix resource leakage observed when using opendmarc on NetBSD.
Use res_ndestroy() instead of res_nclose() to properly cleanup resources
on NetBSD (and others that use __res_ndestroy() or res_ndestroy() instead
of res_nclose()).  Original patch by Roy Marples.
2020-07-27 20:41:09 +00:00
wen
a5da5ef733 Update to 1.20200331.1
Upstream changes:
1.20200331.1 2020-03-31 03:31:13+00:00 UTC
        - Treat an undefined value as emptystring in search
2020-07-23 11:18:29 +00:00
wen
77a96eb94b Update to 3.005
Upstream changes:
version 3.005: Wed 22 Jul 10:40:05 CEST 2020

        Improvements:
        - warn to use ::SMTP, not ::SendMail on bulk messages.
        - much lower elapse time on ::SMTP (local?) delivery.

version 3.004: Fri  3 May 09:29:07 CEST 2019

        Improvements:
        - add imap/imap4
2020-07-23 11:14:41 +00:00
schmonz
4a98825356 Remove outdated MESSAGE. Add local copies of online manpages. Bump PKGREVISION. 2020-07-18 13:31:44 +00:00
wiz
5eff19ff66 thunderbird-enigmail: update to 2.1.7.
Enigmail 2.1.7

Released 2020-06-27, works with Thunderbird 68 and Postbox 7.

Notable Changes

This release displays information about the upcoming release of Thunderbird 78.
2020-07-17 23:33:12 +00:00
bsiegert
20b9b74c5f Revbump all Go packages after go114 update. 2020-07-17 18:04:11 +00:00
tron
4c925c3d48 mutt: Update to version 1.14.6
This is a bug-fix release fixing a problem resetting access times that snuck
in starting with 1.11.0.  This only affected relative-path mailboxes, but
caused Mutt to "forget" new mail in mbox files.
2020-07-12 07:08:43 +00:00
ryoon
10a36091d4 notmuch: Update to 0.30
Changelog:
Notmuch 0.30 (2020-07-10)
=========================

S/MIME
------

Handle S/MIME (PKCS#7) messages -- one-part signed messages, encrypted
messages, and multilayer messages. Treat them symmetrically to
OpenPGP messages. This includes handling protected headers
gracefully.

If you're using Notmuch with S/MIME, you currently need to configure
gpgsm appropriately.

Mixed-up MIME Repair
--------------------

Detect and automatically repair a common form of message mangling
created by Microsoft Exchange (see index.repaired=mixedup in
notmuch-properties(7)).

Protected Headers
-----------------

Avoid indexing the legacy-display part of an encrypted message that
has protected headers (see
index.repaired=skip-protected-headers-legacy-display in
notmuch-properties(7)).

Python
------

Drop support for python2, focus on python3.

Introduce new CFFI-based python bindings in the python module named
"notmuch2".  Officially deprecate (but still support) the older
"notmuch" module.

Dependencies
------------

Support for Xapian 1.2 is removed. The minimum supported version of
Xapian is now 1.4.0.

Notmuch 0.29.3 (2019-11-27)
===========================

General
-------

Fix for use-after-free in notmuch_config_list_{key,val}.

Fix for double close of file in notmuch-dump.

Debian
------

Drop python2 support from shipped debian packaging.

Notmuch 0.29.2 (2019-10-19)
===========================

General
-------

Fix for file descriptor leak when opening gzipped mail files. Thanks
to James Troup for the bug report and the fix.

Notmuch 0.29.1 (2019-06-11)
===========================

Build
-----

Fix for installation failure with `configure --without-emacs`.
2020-07-12 01:48:36 +00:00
taca
2dc1006b11 mail/roundcube: update to 1.4.7
Update roundcube to 1.4.7.


RELEASE 1.4.7
-------------
- Fix bug where subfolders of special folders could have been duplicated on folder list
- Increase maximum size of contact jobtitle and department fields to 128 characters
- Fix missing newline after the logged line when writing to stdout (#7418)
- Elastic: Fix context menu (paste) on the recipient input (#7431)
- Fix problem with forwarding inline images attached to messages with no HTML part (#7414)
- Fix problem with handling attached images with same name when using database_attachments/redundant_attachments (#7455)
- Security: Fix cross-site scripting (XSS) via HTML messages with malicious svg/namespace
2020-07-07 04:37:26 +00:00
schmonz
d517291f5b Skip building and installing API docs with Doxygen, as suggested
by the author. Bump PKGREVISION.
2020-07-04 14:11:40 +00:00
ryoon
7c23adaf4d thunderbird-l10n: Update to 68.10.0
* Sync with mail/thunderbird-l10n-68.10.0.
2020-07-04 05:12:51 +00:00
ryoon
6c08394a83 thunderbird: Update to 68.10.0
Changelog:
Fixes

fixed Chat: Topics displayed some characters improperly
fixed Calendar: Filtering tasks did not work when "Incomplete Tasks" was selected

Security fixes:
CVE-2020-12417: Memory corruption due to missing sign-extension for ValueTags on ARM64
#CVE-2020-12418: Information disclosure due to manipulated URL object
#CVE-2020-12419: Use-after-free in nsGlobalWindowInner
#CVE-2020-12420: Use-After-Free when trying to connect to a STUN server
#MFSA-2020-0001: Automatic account setup leaks Microsoft Exchange login credentials
#CVE-2020-12421: Add-On updates did not respect the same certificate trust rules as software updates
2020-07-04 05:11:25 +00:00
schmonz
65fd92e30d Build with OpenSSL 1.1.x. While here, wrap long line in MESSAGE. 2020-07-02 08:50:09 +00:00
nia
0982bc8b2f thunderbird: Remove cargo SUBSTs, there's no clear patches for rust crates 2020-07-01 09:19:13 +00:00
rillig
1deaf712fa mail/thunderbird: remove commented-out SUBST block 2020-07-01 07:18:14 +00:00
schmonz
f404dc68dc Modernize patch filenames. NFCI. 2020-06-30 17:15:28 +00:00
taca
24fb6a0680 mail/pear-Mail_Mime: update to 1.10.9
Update pear-Mail_Mime to 1.10.9.


1.10.9 (2020-06-27 04:37 UTC)

Changelog:

* Added a workaround for an opcache bug on OpenSuse 15.1 [alec]
2020-06-30 15:26:02 +00:00
taca
652c5e8d1c mail/postfix: update to 3.5.4
Update postfix to 3.5.4.


Fixed in Postfix 3.5.4, 3.4.14:

  * The connection_reuse attribute in smtp_tls_policy_maps always
    resulted in an "invalid attribute name" error. Fix by Thorsten
    Habich.

  * SMTP over TLS connection reuse always failed for Postfix SMTP
    client configurations that specify explicit trust anchors (remote
    SMTP server certificates or public keys). Reported by Thorsten
    Habich.

Fixed in Postfix versions 3.5.4, 3.4.14, 3.3.12, 3.2.17:

  * The Postfix SMTP client's DANE implementation would always send
    an SNI option with the name in a destination's MX record, even
    if the MX record pointed to a CNAME record. MX records that
    point to CNAME records are not conformant with RFC5321, and so
    are rare.

    Based on the DANE survey of ~2 million hosts it was found that
    with the corrected SMTP client behavior, sending SNI with the
    CNAME-expanded name, the SMTP server would not send a different
    certificate. This fix should therefore be safe.
2020-06-30 15:00:45 +00:00
schmonz
4861b2cd58 Modernize patch filenames, adding patch comments. NFCI. 2020-06-30 13:40:53 +00:00
nia
af5d6328f9 Detect if gtk3 was built with Wayland properly in Mozilla packages.
thanks jperkin for the hint.
2020-06-29 11:53:09 +00:00
schmonz
c8c4529c1b Assign non-default SUBST_FILES.djberrno with =, not += (because it
doesn't actually append).
2020-06-26 16:37:22 +00:00
schmonz
3948870bde Retire 'djbware-errno-hack' and associated options.mk cleverness.
Instead:

1. Package makefiles including their own options.mk
2. Packages say "SUBST_CLASSES+=djberrno" to get the hack, if needed
3. Packages adjust SUBST_FILES.djberrno, if needed

Should fix bulk build failures due to multiple inclusions of options.mk
and/or incorrect definitions of DJB_ERRNO_HACK.

Approved during the freeze by wiz@.
2020-06-25 05:42:36 +00:00
wiz
e9a209ef86 mutt: update to 1.14.5.
This release fixes a regression from the 1.14.3 release.  Encryption settings
are no longer checked when using $tunnel to connect to a preauthenticated IMAP
server.
2020-06-24 06:34:02 +00:00
wiz
f48f075a76 mutt: update to 1.14.4.
Remove some patches that would get voting rights soon.
Remove support for NetBSD 1.5.
pkglint cleanup.
XXX: someone should send the remaining patches upstream.

Mutt 1.14.4 was released on June 18, 2020. This is an important
bug-fix release. It fixes a possible machine-in-the-middle response
injection attack when using STARTTLS with IMAP, POP3, and SMTP
(CVE-2020-14954).

Mutt 1.14.3 was released on June 14, 2020. This is an important
bug-fix release. It fixes a possible IMAP fcc/postpone
machine-in-the-middle attack (CVE-2020-14093). It also fixes some
GnuTLS certificate prompt issues.

Mutt 1.14.2 was released on May 25, 2020. This is a bug-fix release,
fixing a few prompt buffer-size issues and adding a potential DoS
mitigation.

Mutt 1.14.1 was released on May 16, 2020. This is a bug-fix release,
fixing a documentation build issue and a few other small bugs.

Mutt 1.14.0 was released on May 2, 2020. This release has new
features and bug fixes. See the UPDATING file, or for more details
see the release notes page.
2020-06-22 06:24:15 +00:00
wiz
19e5628cfc neomutt: update to 20200619.
2020-06-19  Richard Russon  <rich@flatcap.org>
* Security
  - Abort GnuTLS certificate check if a cert in the chain is rejected
  - TLS: clear data after a starttls acknowledgement
  - Prevent possible IMAP MITM via PREAUTH response
* Features
  - add config operations +=/-= for number,long
  - Address book has a comment field
  - Query menu has a comment field
* Contrib
  - sample.neomuttrc-starter: Do not echo promted password
* Bug Fixes
  - make "news://" and "nntp://" schemes interchangeable
  - Fix CRLF to LF conversion in base64 decoding
  - Double comma in query
  - compose: fix redraw after history
  - Crash inside empty query menu
  - mmdf: fix creating new mailbox
  - mh: fix creating new mailbox
  - mbox: error out when an mbox/mmdf is a pipe
  - Fix list-reply by correct parsing of List-Post headers
  - Decode references according to RFC2047
  - fix tagged message count
  - hcache: fix keylen not being considered when building the full key
  - sidebar: fix path comparison
  - Don't mess with the original pattern when running IMAP searches
  - Handle IMAP "NO" resps by issuing a msg instead of failing badly
  - imap: use the connection delimiter if provided
  - Memory leaks
* Changed Config
  - `$alias_format` default changed to include `%c` comment
  - `$query_format` default changed to include `%e` extra info
* Translations
  - 100% Lithuanian
  - 84% French
  - Log the translation in use
* Docs
  - Add missing commands unbind, unmacro to man pages
* Build
  - Check size of long using `LONG_MAX` instead of `__WORDSIZE`
  - Allow ./configure to not record cflags
  - fix out-of-tree build
  - Avoid locating gdbm symbols in qdbm library
* Code
  - Refactor unsafe TAILQ returns
  - add window notifications
  - flip negative ifs
  - Update to latest acutest.h
  - test: add store tests
  - test: add compression tests
  - graphviz: email
  - make more opcode info available
  - refactor: `main_change_folder()`
  - refactor: `mutt_mailbox_next()`
  - refactor: `generate_body()`
  - compress: add `{min,max}_level` to ComprOps
  - emphasise empty loops: "// do nothing"
  - prex: convert `is_from()` to use regex
  - Refactor IMAP's search routines

2020-05-01  Richard Russon  <rich@flatcap.org>
* Bug Fixes
  - Make sure buffers are initialized on error
  - fix(sidebar): use abbreviated path if possible
* Translations
  - 100% Lithuanian
* Docs
  - make header cache config more explicit
2020-06-22 06:08:35 +00:00
mef
ab32bbc19a (mail/mailagent) Fix -> $* is no longer supported, I am not sure,sorry 2020-06-21 07:35:25 +00:00
leot
55dfe877fa mpop: Update to 1.4.10
pkgsrc changes:
- Update MASTER_SITES and HOMEPAGE to current ones

Changes:
Version 1.4.10:
- Improved handling of temporary files on Windows systems.
- Re-enabled support for systems lacking vasprintf(), such as IBM i PASE.

Version 1.4.9:
- No significant changes.

Version 1.4.8:
- Added a new socket command and --socket option to connect via local sockets.
- Added a new tls_host_override command and --tls-host-override option to
  override the host name used for TLS verification.
- Fixed the source_ip command for proxies.

Version 1.4.7:
- Minor bug fixes.

Version 1.4.6:
- Minor bug fixes.

Version 1.4.5:
- Fixed OAUTHBEARER.
- Support for TLS client certificates via PKCS11 devices, e.g. smart cards.
- Various small bug fixes and improvements.

Version 1.4.4:
- Added support for the OAUTHBEARER authentication method.
- Several minor bug fixes.

Version 1.4.3:
- This version fixes a security problem that affects version 1.4.2 (older
  versions are not affected): when the new default value system for
  tls_trust_file is used, the result of certificate verification was not
  properly checked.

Version 1.4.2:
- To simplify TLS setup, the tls_trust_file command has a new default value
  'system' that selects the system default trust. Now you just need tls=on to
  use TLS; the other TLS options are only required in special cases.
  To make this work without breaking compatibility with older mpop versions,
  tls_fingerprint now overrides tls_trust_file, and tls_certcheck=off overrides
  both (previously, you could not specify contradicting options).
- To simplify setup, a new option '--configure <mailaddress>' was added that
  automatically generates a configuration file for a given mail address.
  However, this only works if the mail domain publishes appropriate SRV records.

Version 1.4.1:
- Fixed our TLS code to support TLS 1.3 with GnuTLS.

Version 1.4.0:
- Using OpenSSL is discouraged and may not be supported in the future. Please
  use GnuTLS instead. The reasons are explained here:
  https://marlam.de/mpop/news/openssl-discouraged/
- As using GNU SASL is most likely unnecessary, it is disabled by default now.
  Since everything uses TLS nowadays and thus can use PLAIN authentication, you
  really only need it for GSSAPI.
- If your system requires a library for IDN support, libidn2 is now used instead
  of the older libidn.
- The APOP and CRAM-MD5 authentication method are marked as obsolete / insecure
  and will not be chosen automatically anymore.
- The passwordeval command does not require the password to be terminated by a
  new line character anymore.
- Builtin default port numbers are now used instead of consulting /etc/services.
- Support for DJGPP and for systems lacking vasprintf(), mkstemp(), or tmpfile()
  is removed.

Version 1.2.8:
- Fix support for ~/.config/mpop/config as configuration file
- Add --source-ip option and source_ip command to bind the outgoing connection
  to a specific source IP address.
- Enable SNI for TLS

Version 1.2.7:
- Add support for ~/.config/mpop/config as configuration file
- Add network timeout handling on Windows
- Fix command line handling of SHA256 TLS fingerprints
- Update german translation


Discussed and ok with <reed>, thanks!
2020-06-18 20:50:26 +00:00
taca
6e31dc6e10 lang/rails60: update to 6.0.3.2
Update Ruby on Rails to 6.0.3.2.

www/ruby-actionpack60 is the really updated package and other packages
have no change except version.

CHANGELOG of www/ruby-actionpack60 is here:

## Rails 6.0.3.2 (June 17, 2020) ##

* [CVE-2020-8185] Only allow ActionableErrors if
  show_detailed_exceptions is enabled
2020-06-18 13:38:45 +00:00
nia
52cb390e86 thunderbird: Remove patches for NetBSD 7, rust dropped support for NetBSD 7 2020-06-17 18:00:09 +00:00
bsiegert
121a05e61b Revbump Go packages after Go 1.14.4 update. 2020-06-17 09:54:00 +00:00
nia
fc6a67c089 thunderbird: Sync with firefox68
- Re-enable multiprocess mode
- Drop hacks for crossprocess semaphores on NetBSD
- Drop OSS support
- Drop unused gnome option

Bump PKGREVISION
2020-06-15 15:44:22 +00:00
taca
758932859e mail/postfix: update to 3.5.3
Update postfix and related pacakges to 3.5.3.


Quote freom release announce.

Postfix 3.5.3, 3.4.13:

  * TLS handshake failure in the Postfix SMTP server during SNI
    processing, after the server-side TLS engine sent a TLSv1.3
    HelloRetryRequest (HRR) to a remote SMTP client. Reported by
    J??n M??t??, fixed by Viktor Dukhovni.

Postfix versions 3.5.3, 3.4.13, 3.3.11, 3.2.16:

  * The command "postfix tls deploy-server-cert" did not handle a
    missing optional argument. This bug was introduced in Postfix
    3.1.
2020-06-15 15:43:32 +00:00
nia
dd88971af3 thunderbird: sync cargo cksum bits with lang/rust 2020-06-15 08:31:19 +00:00
taca
e9e6a686c8 mail/pear-Mail_Mime: update to 1.10.8
Update pear-Mail_Mime to 1.10.8.


1.10.8 (2020-06-13 03:00 UTC)

Changelog:

* Fix encoding issues with ISO-2022-JP-MS input labelled with ISO-2022-JP
  [shirosaki]
2020-06-13 15:59:48 +00:00
ryoon
d39fceb18d isync: Increase PassCmd output buffer size to work with Gmail 2020-06-12 13:46:22 +00:00
ryoon
40dec41d07 msmtp: Update to 1.8.11
Changelog:
Version 1.8.11:
- Add a new undisclosed_recipients command and --undisclosed-recipients option
  to replace To, Cc, Bcc with a single "To: undisclosed-recipients:;" header.
- Improved handling of temporary files on Windows systems.
- Re-enabled support for systems lacking vasprintf(), such as IBM i PASE.
2020-06-11 17:28:47 +00:00
markd
29920a1c12 kde: update kde release service to 20.04.1
changes unknown
2020-06-09 11:56:05 +00:00
nia
92154537f7 sqwebmail: expects mime.types in SYSCONFDIR 2020-06-09 10:41:20 +00:00
nia
0537d0b8d5 heirloom-mailx: wants mime.types in SYSCONFDIR 2020-06-09 10:36:43 +00:00
nia
5910410954 mutt: Depend on mime-types, don't install internal mime.types to SYSCONFDIR 2020-06-09 10:18:49 +00:00
taca
d345e23b1d mail/roundcube: update to 1.14.6
Update roundcube to 1.14.6.


RELEASE 1.4.6
-------------
- Installer: Fix regression in SMTP test section (#7417)
2020-06-09 00:25:19 +00:00
taca
d370564bbb mail/roundcube-plugin-password: update to 1.4.5
Update roundcube-plugin-password to 1.4.5


RELEASE 1.4.5
-------------
- Password: Fix issue with Modoboa driver (#7372)
2020-06-07 22:08:37 +00:00
taca
96c14857ec mail/roundcube: update to 1.4.5
Update roundcube to 1.4.5, including some security fixes.

pkgsrc change:

* Proper replace PHP interpreter.
* Fix php-sockets option to work.


RELEASE 1.4.5
-------------
- Fix bug in extracting required plugins from composer.json that led to spurious error in log (#7364)
- Fix so the database setup description is compatible with MySQL 8 (#7340)
- Markasjunk: Fix regression in jsevent driver (#7361)
- Fix missing flag indication on collapsed thread in Larry and Elastic (#7366)
- Fix default keyservers (use keys.openpgp.org), add note about CORS (#7373, #7367)
- Mailvelope: Use sender's address to find pubkeys to check signatures (#7348)
- Mailvelope: Fix Encrypt button hidden in Elastic (#7353)
- Fix PHP warning: count(): Parameter must be an array or an object... in ID command handler (#7392)
- Fix error when user-configured skin does not exist anymore (#7271)
- Elastic: Fix aspect ratio of a contact photo in mail preview (#7339)
- Fix bug where PDF attachments marked as inline could have not been attached on mail forward (#7382)
- Security: Fix a couple of XSS issues in Installer (#7406)
- Security: Fix XSS issue in template object 'username' (#7406)
- Security: Better fix for CVE-2020-12641
- Security: Fix cross-site scripting (XSS) via malicious XML attachment
2020-06-07 22:07:04 +00:00
nia
ff834919fb thunderbird: Add SUPERSEDES 2020-06-07 10:30:38 +00:00
nia
f76458d071 mail: Remove thunderbird60 - EOL
Note: the release strategy of Thunderbird has changed and there
will be no more non-extended-support releases, so mail/thunderbird
contains the most recent extended support release, derived from firefox68
2020-06-07 10:27:11 +00:00
otis
f8bb8aa5f2 mail/amavisd-new: Fix build after removal of replace-interpreter
- Add NO_BUILD=yes
- Move SUBST_STAGE to pre-configure target
2020-06-06 11:55:39 +00:00
jperkin
38fe454b9c *: Apply revbump for graphics/giflib API change. 2020-06-05 12:48:58 +00:00
ryoon
e6e5c90ff0 thunderbird-l10n: Update to 68.9.0
* Sync with mail/thunderbird-68.9.0.
2020-06-05 03:58:46 +00:00
ryoon
8a51ed84a6 thunderbird: Update to 68.9.0
Changelog:
Fixes
fixed Custom headers added for searching or filtering could not be removed
fixed Calendar: Today Pane updated prior to loading all data
fixed Stability improvements
fixed Various security fixes

Security fixes:
#CVE-2020-12399: Timing attack on DSA signatures in NSS library
#CVE-2020-12405: Use-after-free in SharedWorkerService
#CVE-2020-12406: JavaScript Type confusion with NativeTypes
#CVE-2020-12410: Memory safety bugs fixed in Thunderbird 68.9.0
#CVE-2020-12398: Security downgrade with IMAP STARTTLS leads to information leakage
2020-06-05 03:57:58 +00:00
nia
339d47ab23 Switch legacy mozilla software over to ffmpeg4
While here, clean up options.mk.

Bump PKGREVISIONs
2020-06-04 13:47:19 +00:00
jperkin
af3b49a311 dspam: Add SMF manifest.
Provided by erwinlem in joyent/pkgsrc#267.
2020-06-02 15:04:27 +00:00
adam
6bd0c30da6 Revbump for icu 2020-06-02 08:22:31 +00:00
bouyer
cc2de50862 Update to 6.2.56. Changes since 6.2.54:
Security fix for https://sympa-community.github.io/security/2020-002.html
Translation updates
2020-06-01 21:46:25 +00:00
rillig
5389247a0f mail/claws-mail-*: suppress USE_TOOLS+=perl warning 2020-06-01 20:01:17 +00:00
adam
36437ec4c1 exim exim-html: updated to 4.94
Exim version 4.94
-----------------

JH/01 Avoid costly startup code when not strictly needed.  This reduces time
      for some exim process initialisations.  It does mean that the logging
      of TLS configuration problems is only done for the daemon startup.

JH/02 Early-pipelining support code is now included unless disabled in Makefile.

JH/03 DKIM verification defaults no long accept sha1 hashes, to conform to
      RFC 8301.  They can still be enabled, using the dkim_verify_hashes main
      option.

JH/04 Support CHUNKING from an smtp transport using a transport_filter, when
      DKIM signing is being done.  Previously a transport_filter would always
      disable CHUNKING, falling back to traditional DATA.

JH/05 Regard command-line receipients as tainted.

JH/06 Bug 340: Remove the daemon pid file on exit, whe due to SIGTERM.

JH/07 Bug 2489: Fix crash in the "pam" expansion condition.  It seems that the
      PAM library frees one of the arguments given to it, despite the
      documentation.  Therefore a plain malloc must be used.

JH/08 Bug 2491: Use tainted buffers for the transport smtp context.  Previously
      on-stack buffers were used, resulting in a taint trap when DSN information
      copied from a received message was written into the buffer.

JH/09 Bug 2493: Harden ARC verify against Outlook, whick has been seen to mix
      the ordering of its ARC headers.  This caused a crash.

JH/10 Bug 2492: Use tainted memory for retry record when needed.  Previously when
      a new record was being constructed with information from the peer, a trap
      was taken.

JH/11 Bug 2494: Unset the default for dmarc_tld_file.  Previously a naiive
      installation would get error messages from DMARC verify, when it hit the
      nonexistent file indicated by the default.  Distros wanting DMARC enabled
      should both provide the file and set the option.
      Also enforce no DMARC verification for command-line sourced messages.

JH/12 Fix an uninitialised flag in early-pipelining.  Previously connections
      could, depending on the platform, hang at the STARTTLS response.

JH/13 Bug 2498: Reset a counter used for ARC verify before handling another
      message on a connection.  Previously if one message had ARC headers and
      the following one did not, a crash could result when adding an
      Authentication-Results: header.

JH/14 Bug 2500: Rewind some of the common-coding in string handling between the
      Exim main code and Exim-related utities.  The introduction of taint
      tracking also did many adjustments to string handling.  Since then, eximon
      frequently terminated with an assert failure.

JH/15 When PIPELINING, synch after every hundred or so RCPT commands sent and
      check for 452 responses.  This slightly helps the inefficieny of doing
      a large alias-expansion into a recipient-limited target.  The max_rcpt
      transport option still applies (and at the current default, will override
      the new feature).  The check is done for either cause of synch, and forces
      a fast-retry of all 452'd recipients using a new MAIL FROM on the same
      connection.  The new facility is not tunable at this time.

JH/16 Fix the variables set by the gsasl authenticator.  Previously a pointer to
      library live data was being used, so the results became garbage.  Make
      copies while it is still usable.

JH/17 Logging: when the deliver_time selector ise set, include the DT= field
      on delivery deferred (==) and failed (**) lines (if a delivery was
      attemtped).  Previously it was only on completion (=>) lines.

JH/18 Authentication: the gsasl driver not provides the $authN variables in time
      for the expansion of the server_scram_iter and server_scram_salt options.

WB/01 SPF: DNS lookups for the obsolete SPF RR type done by the libspf2 library
      are now specifically given a NO_DATA response without hitting the system
      resolver.  The library goes on to do the now-standard TXT lookup.
      Use of dnsdb lookups is not affected.

JH/19 Bug 2507: Modules: on handling a dynamic-module (lookups) open failure,
      only retrieve the errormessage once.  Previously two calls to dlerror()
      were used, and the second one (for mainlog/paniclog) retrieved null
      information.

JH/20 Taint checking: disallow use of tainted data for
      - the appendfile transport file and directory options
      - the pipe transport command
      - the autoreply transport file, log and once options
      - file names used by the redirect router (including filter files)
      - named-queue names
      - paths used by single-key lookups
      Previously this was permitted.

JH/21 Bug 2501: Fix init call in the heimdal authenticator.  Previously it
      adjusted the size of a major service buffer; this failed because the
      buffer was in use at the time.  Change to a compile-time increase in the
      buffer size, when this authenticator is compiled into exim.

JH/22 Taint-checking: move to safe-mode taint checking on all platforms.  The
      previous fast-mode was untenable in the face of glibs using mmap to
      support larger malloc requests.

PP/01 Update the openssl_options possible values through OpenSSL 1.1.1c.
      New values supported, if defined on system where compiled:
      allow_no_dhe_kex, cryptopro_tlsext_bug, enable_middlebox_compat,
      no_anti_replay, no_encrypt_then_mac, prioritize_chacha, tlsext_padding

JH/23 Performance improvement in the initial phase of a two-pass queue run.  By
      running a limited number of proceses in parallel, a benefit is gained. The
      amount varies with the platform hardware and load.  The use of the option
      queue_run_in_order means we cannot do this, as ordering becomes
      indeterminate.

JH/24 Bug 2524: fix the cyrus_sasl auth driver gssapi usage.  A previous fix
      had introduced a string-copy (for ensuring NUL-termination) which was not
      appropriate for that case, which can include embedded NUL bytes in the
      block of data.  Investigation showed the copy to actually be needless, the
      data being length-specified.

JH/25 Fix use of concurrent TLS connections under GnuTLS.  When a callout was
      done during a receiving connection, and both used TLS, global info was
      used rather than per-connection info for tracking the state of data
      queued for transmission.  This could result in a connection hang.

JH/26 Fix use of the SIZE parameter on MAIL commands, on continued connections.
      Previously, when delivering serveral messages down a single connection
      only the first would provide a SIZE.  This was due to the size information
      not being properly tracked.

JH/27 Bug 2530: When operating in a timezone with sub-minute offset, such as
      TAI (at 37 seconds currently), pretend to be in UTC for time-related
      expansion and logging.  Previously, spurious values such as a future
      minute could be seen.

JH/28 Bug 2533: Fix expansion of ${tr } item.  When called in some situations
      it could crash from a null-deref.  This could also affect the
      ${addresses: } operator and ${readsock } item.

JH/29 Bug 2537: Fix $mime_part_count.  When a single connection had a non-mime
      message following a mime one, the variable was not reset.

JH/30 When an pipelined-connect fails at the first response, assume incorrect
      cached capability (perhaps the peer reneged?) and immediately retry in
      non-pipelined mode.

JH/31 Fix spurious detection of timeout while writing to transport filter.

JH/32 Bug 2541: Fix segfault on bad cmdline -f (sender) argument.  Previously
      an attempt to copy the string was made before checking it.

JH/33 Fix the dsearch lookup to return an untainted result.  Previously the
      taint of the lookup key was maintained; we now regard the presence in the
      filesystem as sufficient validation.

JH/34 Fix the readsocket expansion to not segfault when an empty "options"
      argument is supplied.

JH/35 The dsearch lookup now requires that the directory is an absolute path.
      Previously this was not checked, and nonempty relative paths made an
      access under Exim's current working directory.

JH/36 Bug 2554: Fix msg:defer event for the hosts_max_try_hardlimit case.
      Previously no event was raised.

JH/37 Bug 2552: Fix the check on spool space during reception to use the SIZE
      parameter supplied by the sender MAIL FROM command.  Previously it was
      ignored, and only the check_spool_space option value for the required
      leeway checked.

JH/38 Fix $dkim_key_length.  This should, after a DKIM verification, present
      the size of the signing public-key.  Previously it was instead giving
      the size of the signature hash.

JH/39 DKIM verification: the RFC 8301 restriction on sizes of RSA keys is now
      the default.  See the (new) dkim_verify_min_keysizes option.

JH/40 Fix a memory-handling bug: when a connection carried multiple messages
      and an ACL use a lookup for checking either the local_part or domain,
      stale data could be accessed.  Ensure that variable references are
      dropped between messages.

JH/41 Bug 2571: Fix SPA authenticator.  Running as a server, an offset supplied
      by the client was not checked as pointing within response data before
      being used.  A malicious client could thus cause an out-of-bounds read and
      possibly gain authentication.  Fix by adding the check.

JH/42 Internationalisation: change the default for downconversion in the smtp
      transport to be "if needed".  Previously it was "as previously set" for
      the message, which usually meant "if needed" for message-submission but
      "no" for everything else.  However, MTAs have been seen using SMTPUTF8
      even when the envelope addresses did not need it, resulting in forwarding
      failures to non-supporting MTAs.  A downconvert in such cases will be
      a no-op on the addresses, merely dropping the use of SMTPUTF8 by the
      transport.  The change does mean that addresses needing conversion will
      be converted when previously a delivery failure would occur.

JH/43 Fix possible long line in DSN.  Previously when a very long SMTP error
      response was received it would be used unchecked in a fail-DSN, violating
      standards on line-length limits.  Truncate if needed.

HS/01 Remove parameters of the link to www.open-spf.org. The linked form
      doesn't work. (Additionally add a new main config option to configure the
      spf_smtp_comment)
2020-06-01 19:42:48 +00:00
rillig
4d1a23b6f3 mail/teapop: remove unknown configure option
The correct option would be --enable-lock=flock.
2020-05-31 17:34:15 +00:00
rillig
f4e49541e7 mail/sylpheed: remove unknown configure option 2020-05-31 17:26:30 +00:00
rillig
fcf9b9cd6c mail/php-imap: remove unknow configure option 2020-05-31 16:51:29 +00:00
rillig
2229d6a88e mail/claws-mail: suppress USE_TOOLS+=perl warning 2020-05-31 09:31:58 +00:00
adam
939b354b44 py-email_validator: updated to 1.1.1
1.1.1:
Unknown changes
2020-05-29 08:56:54 +00:00
ryoon
9a7929be75 thunderbird-l10n: Update to 68.8.1
* Sync with mail/thunderbird-68.8.1.
2020-05-27 11:42:10 +00:00
ryoon
6f7a90b6a9 thunderbird: Update to 68.8.1
Changelog:
Fixes:
fixed IMAP stability improvements
fixed HTML tags in IRC topic changes were rendered incorrectly
fixed MailExtensions: Websockets could not be used
2020-05-27 11:40:29 +00:00
taca
c63f2b0979 mail/Makefile: add and enable ruby-roadie-rails 2020-05-25 14:10:11 +00:00
taca
38ab4dba85 mail/ruby-roadie-rails: add package version 2.1.1
Add ruby-roadie-rails package version 2.1.1 based on wip/ruby-roadie-rails52.


roadie-rails

This gem hooks up your Rails application with Roadie to help you generate
HTML emails.
2020-05-25 14:09:08 +00:00
taca
1db4fa5d4e mail/Makefile: add and enable ruby-roadie 2020-05-25 14:07:02 +00:00
taca
b5a4a8cfdd mail/ruby-roadie: add package version 4.0.0
Add ruby-roadie package version 4.0.0 based on wip/ruby-roadie.


Roadie

Roadie tries to make sending HTML emails a little less painful by inlining
stylesheets and rewriting relative URLs for you inside your emails.
2020-05-25 14:06:14 +00:00
taca
a2931befef mail/ruby-mime-types-data: update to 3.2020.05.12
Update ruby-mime-types-data to 3.2020.05.12.


## 3.2020.05.12 / 2020-05-12

- Updated the IANA media registry entires as of release date.

- Added file extensions for HEIC image types. [#34][].
2020-05-25 14:01:30 +00:00
nia
c31c1b6c61 mail: remove etpan
Unmaintained upstream and no longer supported by newer libetpan versions
2020-05-25 11:49:47 +00:00
rillig
b927d16c68 mail/libetpan: skip bashisms check for macOS 2020-05-25 05:58:40 +00:00
rillig
bc596f62eb mail/thunderbird60: skip shell portability 2020-05-25 05:36:38 +00:00
rillig
c9d0627de1 mail/ja-mh: document possible array[char] bug 2020-05-25 05:35:35 +00:00
rillig
99015b79a4 mail/gmime3: remove unknown configure option 2020-05-25 05:34:49 +00:00
rillig
6cbf694c93 mail/courier-*: remove unknown configure option 2020-05-25 05:33:59 +00:00
mef
6c54128b34 (mail/courier-mta) Fix build: Remove no effective SUBST file 2020-05-24 01:22:42 +00:00
schmonz
369c26d7cb Restore missing .include of options.mk. 2020-05-23 21:32:14 +00:00
schmonz
de7f8545e7 Update to notqmail 1.08 (as qmail-1.03nb49). From the changelog:
## Fix bugs

- Vulnerabilities we've inherited from qmail 1.03, reported by Qualys.
    - CVE-2005-1515: fix signedness wraparound in `substdio_{put,bput}()`.
    - CVE-2005-1514: fix possible signed integer overflow in `commands()`.
    - CVE-2005-1513: fix integer overflow in `stralloc_readyplus()`.
    - Fix several other places where variables could overflow.
- `qmail-pop3d`: instead of running as root if root authenticates (and
  being a vector for a dictionary attack on the root password), exit 1
  to look just like a failed `checkpassword` login.
- `qmail-inject`: do not parse header recipients if `-a` is given.
- Correctly detect multiple IP addresses on the same interface.
- Remove workaround for ancient DNS servers that do not properly
  support CNAME.
- Fix possible integer overflow in `alloc()`.

## Reduce bug likelihood

- Remove `dnscname` and `dnsmxip` programs that were being built but not
  installed.
- Remove `systype` and related platform detection.
- Remove unused variable in `maildir.c`.
- Reduce variable scope in `tcpto.c`.
- Avoid local variables shadowing same-named globals.
- Avoid needing `exit.h` in named-pipe bug check.
- Add a `test` target and some unit tests, using Check.
- Add missing function declarations in `cdbmss.h`, `scan.h`.
- Add missing return types to `main()`.
- Add `hier.h` for inclusion in `instcheck.c`, `instchown.c`, `instpackage.c`.
- Use system headers and types instead of the `HASSHORTSETGROUPS` check.
- Use system headers instead of redeclaring `exit()`, `read()`,
  `write()`, `malloc()`, `free()`, `fork()`, `uint32_t`.
- Use C89 function signatures for code we've touched so far.
- Automated builds:
    - TravisCI: move setting `MAKEFLAGS` out of the script and into
      the matrix.
    - Add FreeBSD builds with CirrusCI.
    - Add a GitHub Actions build.

## Other changes

- Remove DJB's TODO.
- Replace many `pobox.com` URLs.
- Acknowledge Erik Sjölund's `qmail-local.c` bugfix that we've
  inherited from netqmail.
- Avoid generating catted manpages by building with `NROFF=true`.
- Optionally create a `systemd` service file.
- Run an alternate `qmail-remote` by setting `QMAILREMOTE` in
  `qmail-send`'s environment.

## Intent to remove

In the course of developing this release, we found programs that we
intend to remove in the next release. We believe none of these remains
necessary or useful enough to be worth the cost of maintaining. If you
disagree, please let us know!

- Remove `qsmhook`, long since replaced by `preline`.
- Remove inefficient `maildirwatch`.
- Remove obsolete mail client wrappers.
- Remove `qmail-pop3d`, since Maildir is well supported by actively
  maintained POP3 servers.
2020-05-23 20:50:02 +00:00
nia
a7b7a3c765 *: Remove references to mysql55 2020-05-23 13:08:51 +00:00
rillig
c33f2e6201 mail/fml: remove unknown configure option 2020-05-23 12:49:26 +00:00
rillig
4ee6ee7f86 mail/dbmail: remove unknown configure option 2020-05-23 12:36:35 +00:00
rillig
23230f9bb0 mail/dspam: remove unknown configure option 2020-05-23 12:33:22 +00:00
rillig
5d0f8dce0b mail/offlineimap: clean up REPLACE_PYTHON 2020-05-22 21:35:03 +00:00
rillig
0b6e08ab4e mail/turba: clean up and sort REPLACE_FILES 2020-05-22 21:28:52 +00:00
rillig
b935597127 erlang, amavisd, policyd: remove redundant replace-interpreter
Since do-configure-pre-hook already depends on replace-interpreter, there
is no point in making any other stage depend on that as well.  At best,
it has no effect.  At worst it creates a hard-to-find difference between
builds that run "bmake install" directly and builds that split the build
into "bmake configure && bmake build && bmake install", as bulk builds
do.
2020-05-22 18:12:15 +00:00
adam
d62c903eea revbump after updating security/nettle 2020-05-22 10:55:42 +00:00
taca
70e54393f8 Remove RUBY_VERSIONS_INCOMPATIBLE for ruby24. 2020-05-21 16:04:21 +00:00
nia
400c33f713 balsa: Update to 2.6.1
* Balsa-2.6.1 release. Release date 2020-05-10

- fix server identity verification.
2020-05-21 14:19:46 +00:00
mef
53a7211e97 (mail/courier-imap) Remove (one more) no-op files from SUBST block 2020-05-21 13:31:59 +00:00
nia
a21cbc4ac0 libetpan: Missing tools 2020-05-21 10:07:03 +00:00