Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package postfix for openSUSE:Factory checked 
in at 2024-05-16 17:12:37
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/postfix (Old)
 and      /work/SRC/openSUSE:Factory/.postfix.new.1880 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "postfix"

Thu May 16 17:12:37 2024 rev:238 rq:1173989 version:3.9.0

Changes:
--------
--- /work/SRC/openSUSE:Factory/postfix/postfix-bdb.changes      2024-03-06 
23:03:59.604142328 +0100
+++ /work/SRC/openSUSE:Factory/.postfix.new.1880/postfix-bdb.changes    
2024-05-16 17:12:51.886897723 +0200
@@ -1,0 +2,88 @@
+Thu Mar  7 18:42:30 UTC 2024 - Arjen de Korte <suse+bu...@de-korte.org>
+
+- update to 3.9.0
+  * As described in DEPRECATION_README, the SMTP server features
+    "permit_naked_ip_address", "check_relay_domains", and
+    "reject_maps_rbl" have been removed, after they have been logging
+    a warning for some 20 years. These features now log a warning
+    and return a "server configuration error" response.
+  * The MySQL client no longer supports MySQL versions < 4.0. MySQL
+    version 4.0 was released in 2003.
+  * As covered in DEPRECATION_README, the configuration parameter
+    "disable_dns_lookup" and about a dozen TLS-related parameters
+    are now officially obsolete. These parameters still work, but
+    the postconf command logs warnings that they will be removed
+    from Postfix.
+  * As covered in DEPRECATION_README, "permit_mx_backup" logs a
+    warning that it will be removed from Postfix.
+  * In message headers, Postfix now formats numerical days as
+    two-digit days, i.e. days 1-9 have a leading zero instead of a
+    leading space. This change was made because the RFC 5322 date
+    and time specification recommends (i.e. SHOULD) that a single
+    space be used in each place that folding white space appears.
+    This change avoids a breaking change in the length of a date
+    string.
+  * The MySQL client default characterset is now configurable with
+    the "charset" configuration file attribute. The default is
+    "utf8mb4", consistent with the MySQL 8.0 built-in default, but
+    different from earlier MySQL versions where the built-in default
+    was "latin1".
+  * Support to query MongoDB databases, contributed by Hamid Maadani,
+    based on earlier code by Stephan Ferraro. See MONGODB_README
+    and mongodb_table(5)
+  * The RFC 3461 envelope ID is now exported in the local(8) delivery
+    agent with the ENVID environment variable, and in the pipe(8)
+    delivery agent with the ${envid} command-line attribute.
+  * Configurable idle and retry timer settings in the mysql: and
+    pgsql: clients. A shorter than default retry timer can sped up
+    the recovery after error, when Postfix is configured with only
+    one server in the "hosts" attribute. After the code was frozen
+    for release, we have learned that Postfix can recover faster
+    from some errors when the single server is specified multiple
+    times in the "hosts" attribute.
+  * Optional Postfix TLS support to request an RFC7250 raw public
+    key instead of an X.509 public-key certificate. The configuration
+    settings for raw key public support will be ignored when there
+    is no raw public key support in the local TLS implementation
+    (i.e. Postfix with OpenSSL versions before 3.2). See RELEASE_NOTES
+    for more information.
+  * Preliminary support for OpenSSL configuration files, primarily
+    OpenSSL 1.1.1b and later. This introduces two new parameters
+    "tls_config_file" and "tls_config_name", which can be used to
+    limit collateral damage from OS distributions that crank up
+    security to 11, increasing the number of plaintext email
+    deliveries. Details are in the postconf(5) manpage under
+    "tls_config_file" and "tls_config_name".
+  * With "smtpd_forbid_unauth_pipelining = yes" (the default),
+    Postfix defends against multiple "blind" SMTP attacks. This
+    feature was back-ported to older stable releases but disabled
+    by default.
+  * With "smtpd_forbid_bare_newline = normalize" (the default)
+    Postfix defends against SMTP smuggling attacks. See RELEASE_NOTES
+    for details. This feature was back-ported to older stable
+    releases but disabled by default.
+  * Prevent outbound SMTP smuggling, where an attacker uses Postfix
+    to send email containing a non-standard End-of-DATA sequence,
+    to exploit inbound SMTP smuggling at a vulnerable remote SMTP
+    server. With "cleanup_replace_stray_cr_lf = yes" (the default),
+    the cleanup daemon replaces each stray <CR> or <LF> character
+    in message content with a space character. This feature was
+    back-ported to older stable releases with identical functionality.
+  * The Postfix DNS client now limits the total size of DNS lookup
+    results to 100 records; it drops the excess records, and logs
+    a warning. This limit is 20x larger than the number of server
+    addresses that the Postfix SMTP client is willing to consider
+    when delivering mail, and is far below the number of records
+    that could cause a tail recursion crash in dns_rr_append() as
+    reported by Toshifumi Sakaguchi. This also introduces a similar
+    limit on the number of DNS requests that a check_*_*_access
+    restriction can make. All this was back-ported to older stable
+    releases with identical functionality.
+- refreshed patch:
+  % postfix-no-md5.patch
+- change obsoleted "disable_dns_lookups" to "smtp_dns_support_level"
+  % postfix-SUSE.tar.gz
+  % postfix-main.cf.patch
+  % postfix-master.cf.patch
+
+-------------------------------------------------------------------
postfix.changes: same change

Old:
----
  postfix-3.8.6.tar.gz
  postfix-3.8.6.tar.gz.asc

New:
----
  postfix-3.9.0.tar.gz
  postfix-3.9.0.tar.gz.asc

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ postfix-bdb.spec ++++++
--- /var/tmp/diff_new_pack.90suQF/_old  2024-05-16 17:12:58.595140854 +0200
+++ /var/tmp/diff_new_pack.90suQF/_new  2024-05-16 17:12:58.599140999 +0200
@@ -59,7 +59,7 @@
 %endif
 %bcond_without ldap
 Name:           postfix-bdb
-Version:        3.8.6
+Version:        3.9.0
 Release:        0
 Summary:        A fast, secure, and flexible mailer
 License:        EPL-2.0 OR IPL-1.0

postfix.spec: same change
++++++ postfix-3.8.6.tar.gz -> postfix-3.9.0.tar.gz ++++++
++++ 27791 lines of diff (skipped)

++++++ postfix-SUSE.tar.gz ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/postfix-SUSE/config.postfix 
new/postfix-SUSE/config.postfix
--- old/postfix-SUSE/config.postfix     2023-09-18 14:39:38.192120920 +0200
+++ new/postfix-SUSE/config.postfix     2024-03-08 13:22:11.000000000 +0100
@@ -417,9 +417,9 @@
     fi
 
     if test  "$POSTFIX_NODNS" == "yes"; then
-       $PCONF -e "disable_dns_lookups = yes"
+       $PCONF -e "smtp_dns_support_level = disabled"
     else
-       $PCONF -e "disable_dns_lookups = no"
+       $PCONF -e "smtp_dns_support_level = enabled"
     fi
     if test -n "$POSTFIX_RELAYHOST"; then
        $PCONF -e "relayhost = $POSTFIX_RELAYHOST"
@@ -1083,7 +1083,7 @@
        } else {
            $line = "  ".$1;
        }
-    } elsif ( /^\#?\s\s(-o\s+disable_dns_lookups=.*)/ ) {
+    } elsif ( /^\#?\s\s(-o\s+smtp_dns_support_level=.*)/ ) {
        if ( $use_amavis ne "yes" ) {
            $line = "#  ".$1;
        } else {

++++++ postfix-main.cf.patch ++++++
--- /var/tmp/diff_new_pack.90suQF/_old  2024-05-16 17:13:00.191198701 +0200
+++ /var/tmp/diff_new_pack.90suQF/_new  2024-05-16 17:13:00.195198846 +0200
@@ -71,7 +71,7 @@
 +biff = no
 +content_filter = 
 +delay_warning_time = 0h
-+disable_dns_lookups = no
++smtp_dns_support_level = enabled
 +disable_mime_output_conversion = no
 +disable_vrfy_command = yes
 +inet_interfaces = all

++++++ postfix-master.cf.patch ++++++
--- /var/tmp/diff_new_pack.90suQF/_old  2024-05-16 17:13:00.207199281 +0200
+++ /var/tmp/diff_new_pack.90suQF/_new  2024-05-16 17:13:00.211199426 +0200
@@ -9,7 +9,7 @@
 +#amavis    unix  -       -       n       -       4       smtp
 +#  -o smtp_data_done_timeout=1200
 +#  -o smtp_send_xforward_command=yes
-+#  -o disable_dns_lookups=yes
++#  -o smtp_dns_support_level=disabled
 +#  -o max_use=20
  #smtp      inet  n       -       n       -       1       postscreen
  #smtpd     pass  -       -       n       -       -       smtpd

++++++ postfix-no-md5.patch ++++++
--- /var/tmp/diff_new_pack.90suQF/_old  2024-05-16 17:13:00.223199861 +0200
+++ /var/tmp/diff_new_pack.90suQF/_new  2024-05-16 17:13:00.227200006 +0200
@@ -2,7 +2,7 @@
 ===================================================================
 --- src/global/mail_params.h.orig
 +++ src/global/mail_params.h
-@@ -1387,7 +1387,7 @@ extern char *var_smtpd_tls_mand_excl;
+@@ -1391,7 +1391,7 @@ extern char *var_smtpd_tls_mand_excl;
  
  #define VAR_SMTPD_TLS_FPT_DGST        "smtpd_tls_fingerprint_digest"
  #define DEF_SMTPD_TLS_FPT_DGST        "${{$compatibility_level} <level {3.6} 
? " \
@@ -11,7 +11,7 @@
  extern char *var_smtpd_tls_fpt_dgst;
  
  #define VAR_SMTPD_TLS_512_FILE        "smtpd_tls_dh512_param_file"
-@@ -1549,10 +1549,10 @@ extern char *var_smtp_tls_mand_excl;
+@@ -1553,10 +1553,10 @@ extern char *var_smtp_tls_mand_excl;
  
  #define VAR_SMTP_TLS_FPT_DGST "smtp_tls_fingerprint_digest"
  #define DEF_SMTP_TLS_FPT_DGST "${{$compatibility_level} <level {3.6} ? " \
@@ -23,5 +23,5 @@
 +                                "{sha1} : {sha256}}"
  extern char *var_smtp_tls_fpt_dgst;
  
- #define VAR_SMTP_TLS_TAFILE   "smtp_tls_trust_anchor_file"
+ #define VAR_SMTP_TLS_ENABLE_RPK       "smtp_tls_enable_rpk"
 

Reply via email to