Displaying 1 50 of 5,620 commits (5.058s)

NetBSD — doc 3RDPARTY, external/ibm-public/postfix/dist HISTORY makedefs

Pullup the following, requested by tron in ticket #459:

        doc/3RDPARTY                                        1.1195
        external/ibm-public/postfix/dist/HISTORY        patch
        external/ibm-public/postfix/dist/makedefs        patch
        external/ibm-public/postfix/dist/src/cleanup/cleanup.h patch
        external/ibm-public/postfix/dist/src/cleanup/cleanup_message.c patch
        external/ibm-public/postfix/dist/src/cleanup/cleanup_milter.c patch
        external/ibm-public/postfix/dist/src/cleanup/cleanup_state.c patch
        external/ibm-public/postfix/dist/src/global/mail_version.h patch
        external/ibm-public/postfix/dist/src/milter/milter.c patch
        external/ibm-public/postfix/dist/src/milter/milter.h patch
        external/ibm-public/postfix/dist/src/milter/milter8.c patch
        external/ibm-public/postfix/dist/src/qmqpd/qmqpd.c patch
        external/ibm-public/postfix/dist/src/smtpd/smtpd.c patch
        external/ibm-public/postfix/dist/src/smtpd/smtpd_check.c patch

Import Postfix 2.11.3. Changes since version 2.11.1:
- Fix for DMARC implementations based on SPF policy plus DKIM Milter.
  The PREPEND access/policy action added headers ABOVE Postfix's own
  Received: header, exposing Postfix's own Received: header to Milters
  (protocol violation) and hiding the PREPENDed header from Milters.
  PREPENDed headers are now added BELOW Postfix's own Received: header
  and remain visible to Milters.
- The Postfix SMTP server logged an incorrect client name in reject

    [11 lines not shown]

NetBSD — external/ibm-public/postfix/dist makedefs, external/ibm-public/postfix/dist/src/cleanup cleanup.h

Resolve conflicts from last import.

NetBSD — external/ibm-public/postfix/dist makedefs, external/ibm-public/postfix/dist/src/cleanup cleanup.h

Resolve conflicts from last import.

NetBSD — external/ibm-public/postfix/dist HISTORY, external/ibm-public/postfix/dist/src/cleanup cleanup_message.c cleanup_state.c

Import Postfix 2.11.3. Changes since version 2.11.1:
- Fix for DMARC implementations based on SPF policy plus DKIM Milter. The
  PREPEND access/policy action added headers ABOVE Postfix's own Received:
  header, exposing Postfix's own Received: header to Milters (protocol
  violation) and hiding the PREPENDed header from Milters. PREPENDed
  headers are now added BELOW Postfix's own Received: header and remain
  visible to Milters.
- The Postfix SMTP server logged an incorrect client name in reject
  messages for check_reverse_client_hostname_access and
  check_reverse_client_hostname_{mx,ns}_access. They replied with the
  verified client name, instead of the name that was rejected.
- The TLS client logged that an anonymous TLS connection was "Untrusted",
  instead of "Anonymous".
- Fix for configurations that prepend message headers with Postfix access
  maps, policy servers or Milter applications. Postfix now hides its own
  Received: header from Milters and exposes prepended headers to Milters,
  regardless of the mechanism used to prepend a header. This fix reverts
  a partial solution that was released on October 13, 2014, and replaces
  it with a complete solution.

NetBSD — external/ibm-public/postfix/dist HISTORY makedefs, external/ibm-public/postfix/dist/src/cleanup cleanup_message.c cleanup_state.c

Import Postfix 2.11.3. Changes since version 2.11.1:
- Fix for DMARC implementations based on SPF policy plus DKIM Milter. The
  PREPEND access/policy action added headers ABOVE Postfix's own Received:
  header, exposing Postfix's own Received: header to Milters (protocol
  violation) and hiding the PREPENDed header from Milters. PREPENDed
  headers are now added BELOW Postfix's own Received: header and remain
  visible to Milters.
- The Postfix SMTP server logged an incorrect client name in reject
  messages for check_reverse_client_hostname_access and
  check_reverse_client_hostname_{mx,ns}_access. They replied with the
  verified client name, instead of the name that was rejected.
- The TLS client logged that an anonymous TLS connection was "Untrusted",
  instead of "Anonymous".
- Fix for configurations that prepend message headers with Postfix access
  maps, policy servers or Milter applications. Postfix now hides its own
  Received: header from Milters and exposes prepended headers to Milters,
  regardless of the mechanism used to prepend a header. This fix reverts
  a partial solution that was released on October 13, 2014, and replaces
  it with a complete solution.

NetBSD — external/ibm-public/postfix/dist HISTORY, external/ibm-public/postfix/dist/src/cleanup cleanup_message.c cleanup_state.c

Import Postfix 2.11.3. Changes since version 2.11.1:
- Fix for DMARC implementations based on SPF policy plus DKIM Milter. The
  PREPEND access/policy action added headers ABOVE Postfix's own Received:
  header, exposing Postfix's own Received: header to Milters (protocol
  violation) and hiding the PREPENDed header from Milters. PREPENDed
  headers are now added BELOW Postfix's own Received: header and remain
  visible to Milters.
- The Postfix SMTP server logged an incorrect client name in reject
  messages for check_reverse_client_hostname_access and
  check_reverse_client_hostname_{mx,ns}_access. They replied with the
  verified client name, instead of the name that was rejected.
- The TLS client logged that an anonymous TLS connection was "Untrusted",
  instead of "Anonymous".
- Fix for configurations that prepend message headers with Postfix access
  maps, policy servers or Milter applications. Postfix now hides its own
  Received: header from Milters and exposes prepended headers to Milters,
  regardless of the mechanism used to prepend a header. This fix reverts
  a partial solution that was released on October 13, 2014, and replaces
  it with a complete solution.

OpenBSD — usr.sbin/relayd ssl_privsep.c relayd.h, usr.sbin/smtpd ssl_privsep.c ssl.h

LibreSSL now supports loading of CA certificates from memory, replace
the internal and long-serving ssl_ctx_load_verify_memory() function
with a call to the SSL_CTX_load_verify_mem() API function.  The
ssl_privsep.c file with hacks for using OpenSSL in privsep'ed
processes can now go away; portable versions of smtpd and relayd
should start depending on LibreSSL or they have to carry ssl_privsep.c
in openbsd-compat to work with legacy OpenSSL.  No functional change.

Based on previous discussions with gilles@ bluhm@ and many others
OK bluhm@ (as part of the libcrypto/libssl/libtls diff)

OpenBSD — usr.sbin/smtpd smtpd.h queue_fs.c

use <limits.h> comprehensively.  For now try to push <> includes to
each .c file, and out of the .h files.  To avoid overinclude.
ok gilles, in principle.  If this has been done right, -portable should
become easier to maintain.
Delta File
+38 -38 usr.sbin/smtpd/smtpd.h
+16 -16 usr.sbin/smtpd/queue_fs.c
+14 -14 usr.sbin/smtpd/smtp_session.c
+10 -10 usr.sbin/smtpd/smtpd.c
+9 -7 usr.sbin/smtpd/table.c
+8 -8 usr.sbin/smtpd/mta.c
+198 -131 61 files not shown
+293 -224 67 files

OpenBSD — usr.sbin/relayd ssl_privsep.c relay.c, usr.sbin/smtpd ssl_privsep.c ssl.c

SSL_CTX_use_certificate_chain() has been added to LibreSSL and there
is no need to keep a local copy in ssl_privsep.c.  This adds a little
burden on OpenSMTPD-portable because it will have to put it in
openbsd-compat for compatibility with legacy OpenSSL.

OK gilles@

OpenBSD — lib/libtls tls_server.c, usr.sbin/relayd relay.c

The SSL/TLS session Id context is limited to 32 bytes.  Instead of
using the name of relayd relay or smtpd pki, use a 32 byte arc4random
buffer that should be unique for the context.  This fixes an issue in
OpenSMTPD when a long pki name could break the configuration.

OK gilles@ benno@

OpenBSD — bin/cat cat.c, bin/cp cp.c utils.c

Replace <sys/param.h> with <limits.h> and other less dirty headers where
possible.  Annotate <sys/param.h> lines with their current reasons.  Switch
to PATH_MAX, NGROUPS_MAX, HOST_NAME_MAX+1, LOGIN_NAME_MAX, etc.  Change
MIN() and MAX() to local definitions of MINIMUM() and MAXIMUM() where
sensible to avoid pulling in the pollution.  These are the files confirmed
through binary verification.
ok guenther, millert, doug (helped with the verification protocol)
Delta File
+22 -22 usr.bin/cvs/client.c
+21 -21 usr.bin/cvs/file.c
+20 -20 usr.bin/cvs/server.c
+18 -18 libexec/ftpd/ftpd.c
+18 -17 usr.sbin/crunchgen/crunchgen.c
+16 -16 usr.bin/cvs/add.c
+2,090 -2,106 663 files not shown
+2,205 -2,220 669 files

OpenBSD — usr.sbin/smtpd enqueue.c smtpd.c

when enqueueing offline mails from within the daemon session, we should not
rely on getlogin() otherwise mail will end up enqueued as coming from user
who started smtpd.

bug spotted by deraadt@, diff ok todd@

OpenBSD — usr.sbin/smtpd table.c

recipient and sender lists now support the user+TAG notation, allowing
among other things a secondary MX to filter recipients to be relayed to a
primary MX even if they are using tags. there are other nice things to do
with that feature, use your imagination.

tested and ok florian@, tested by several users for a few days too
Delta File
+17 -2 usr.sbin/smtpd/table.c
+17 -2 1 file

OpenBSD — usr.sbin/smtpd smtp_session.c

bring back reverted commits, the crash was unrelated
Delta File
+23 -17 usr.sbin/smtpd/smtp_session.c
+23 -17 1 file

OpenBSD — usr.sbin/smtpd smtp_session.c

revert two latest commits until a crash is fixed
Delta File
+17 -23 usr.sbin/smtpd/smtp_session.c
+17 -23 1 file

OpenBSD — usr.sbin/smtpd smtp_session.c

revert two latest commits until a crash is fixed
Delta File
+17 -23 usr.sbin/smtpd/smtp_session.c
+17 -23 1 file

OpenBSD — usr.sbin/smtpd delivery_filename.c

unbreak the delivery_filename backend, now that it no longer prepends the
From separator line but gets it injected in its iobuf by the mda process,
we need to make sure not to escape the first 'From ' we receive.

spotted by deraadt@
Delta File
+10 -3 usr.sbin/smtpd/delivery_filename.c
+10 -3 1 file

OpenBSD — usr.sbin/smtpd delivery_filename.c

unbreak the delivery_filename backend, now that it no longer prepends the
From separator line but gets it injected in its iobuf by the mda process,
we need to make sure not to escape the first 'From ' we receive.

spotted by deraadt@
Delta File
+10 -3 usr.sbin/smtpd/delivery_filename.c
+10 -3 1 file

OpenBSD — usr.sbin/smtpd parser.c

rename a variable to avoid a warning

spotted by deraadt@
Delta File
+15 -15 usr.sbin/smtpd/parser.c
+15 -15 1 file

OpenBSD — usr.sbin/smtpd parser.c

rename a variable to avoid a warning

spotted by deraadt@
Delta File
+15 -15 usr.sbin/smtpd/parser.c
+15 -15 1 file

OpenBSD — usr.sbin/ntpd log.c

log as LOG_DAEMON in log_init again.

I mirrored from smtpd a little too literally.
Delta File
+2 -2 usr.sbin/ntpd/log.c
+2 -2 1 file

OpenBSD — usr.sbin/ntpd log.c

log as LOG_DAEMON in log_init again.

I mirrored from smtpd a little too literally.
Delta File
+2 -2 usr.sbin/ntpd/log.c
+2 -2 1 file

OpenBSD — usr.sbin/ntpd log.c log.h

sync log.c from smtpd.

Reduces the number of log.c snowflakes by a little, and gives ntpd a
variadic fatal() function to be used later.

ok deraadt@

OpenBSD — usr.sbin/ntpd log.c log.h

sync log.c from smtpd.

Reduces the number of log.c snowflakes by a little, and gives ntpd a
variadic fatal() function to be used later.

ok deraadt@

OpenBSD — usr.sbin/smtpd smtp_session.c

fix ctype casting bug spotted by Jonas 'Sortie' Termansen
Delta File
+5 -4 usr.sbin/smtpd/smtp_session.c
+5 -4 1 file

OpenBSD — usr.sbin/smtpd smtp_session.c

fix ctype casting bug spotted by Jonas 'Sortie' Termansen
Delta File
+5 -4 usr.sbin/smtpd/smtp_session.c
+5 -4 1 file

OpenBSD — usr.sbin/smtpd smtp_session.c

move the message parser init earlier to avoid a possible use after free in
an unlikely error code path
Delta File
+20 -15 usr.sbin/smtpd/smtp_session.c
+20 -15 1 file

OpenBSD — usr.sbin/smtpd smtp_session.c

move the message parser init earlier to avoid a possible use after free in
an unlikely error code path
Delta File
+20 -15 usr.sbin/smtpd/smtp_session.c
+20 -15 1 file

OpenBSD — usr.sbin/smtpd dns.c

fix whitespace and indentation, by Kyle Milz
Delta File
+3 -3 usr.sbin/smtpd/dns.c
+3 -3 1 file

OpenBSD — usr.sbin/smtpd dns.c

fix whitespace and indentation, by Kyle Milz
Delta File
+3 -3 usr.sbin/smtpd/dns.c
+3 -3 1 file

OpenBSD — usr.sbin/smtpd mda.c delivery_filename.c

some third-party mda require a prepended From separator line, so remove the
prepending from delivery_filename backend and prepend conditionally earlier
in the code path if delivery method is through mda or filename.

ok eric@

OpenBSD — usr.sbin/smtpd mda.c delivery_filename.c

some third-party mda require a prepended From separator line, so remove the
prepending from delivery_filename backend and prepend conditionally earlier
in the code path if delivery method is through mda or filename.

ok eric@

OpenBSD — usr.sbin/smtpd smtpd.h

bump version
Delta File
+2 -2 usr.sbin/smtpd/smtpd.h
+2 -2 1 file

OpenBSD — usr.sbin/smtpd mta_session.c ioev.c

Correctly fallback to PLAIN if opportunistics TLS fails during TLS handshake.

fix by Stefan Sieg

ok gilles

OpenBSD — usr.sbin/smtpd ca.c

missing include
Delta File
+2 -1 usr.sbin/smtpd/ca.c
+2 -1 1 file

Bitrig — distrib/sets/lists/base mi, usr.sbin/smtpd/smtpd Makefile

Links smtpd's sendmail.8 to the build; ok pedro@

Bitrig — distrib/sets/lists/base mi, usr.sbin/smtpd/smtpd Makefile

Links smtpd's sendmail.8 to the build.

Bitrig — usr.sbin/smtpd smtp_session.c

Use log_warnx() not log_warn() for mail loop warning since errno
is not set.  OK gilles@
Delta File
+2 -2 usr.sbin/smtpd/smtp_session.c
+2 -2 1 file

OpenBSD — usr.sbin/smtpd smtp_session.c

Use log_warnx() not log_warn() for mail loop warning since errno
is not set.  OK gilles@
Delta File
+2 -2 usr.sbin/smtpd/smtp_session.c
+2 -2 1 file

OpenBSD — usr.sbin/smtpd rfc822.c rfc822.h, usr.sbin/smtpd/smtpd Makefile

these are no longer used, remove

Bitrig — usr.sbin/smtpd rfc822.c rfc822.h, usr.sbin/smtpd/smtpd Makefile

these are no longer used, remove

Bitrig — usr.sbin/smtpd smtpd.conf.5

Add DKIM signing example based on eric@'s asiabsdcon slides
OK gilles@ jmc@
Delta File
+18 -2 usr.sbin/smtpd/smtpd.conf.5
+18 -2 1 file

OpenBSD — usr.sbin/smtpd smtpd.conf.5

Add DKIM signing example based on eric@'s asiabsdcon slides
OK gilles@ jmc@
Delta File
+18 -2 usr.sbin/smtpd/smtpd.conf.5
+18 -2 1 file

OpenBSD — usr.sbin/smtpd queue_backend.c

no need for arc4random_uniform() here, arc4random() does the job

spotted by deraadt@, ok eric@
Delta File
+3 -3 usr.sbin/smtpd/queue_backend.c
+3 -3 1 file

Bitrig — usr.sbin/smtpd queue_backend.c

no need for arc4random_uniform() here, arc4random() does the job

spotted by deraadt@, ok eric@
Delta File
+3 -3 usr.sbin/smtpd/queue_backend.c
+3 -3 1 file

Bitrig — usr.sbin/smtpd queue_backend.c

no need for arc4random_uniform() here, arc4random() does the job

spotted by deraadt@, ok eric@
Delta File
+3 -3 usr.sbin/smtpd/queue_backend.c
+3 -3 1 file

NetBSD — . build.sh BUILDING, bin Makefile.inc Makefile

Use C99 types. u_int{8,16,32,64}_t to uint{8,16,32,64}_t.

No functional change.

NetBSD — . build.sh BUILDING, bin Makefile.inc Makefile

Creating branch nick-nhusb

OpenBSD — usr.sbin/smtpd rfc2822.c

some third-party applications generate malformed headers which we can still
parse correctly, do not reject message as malformed in this case
Delta File
+7 -2 usr.sbin/smtpd/rfc2822.c
+7 -2 1 file

Bitrig — usr.sbin/smtpd rfc2822.c

some third-party applications generate malformed headers which we can still
parse correctly, do not reject message as malformed in this case
Delta File
+7 -2 usr.sbin/smtpd/rfc2822.c
+7 -2 1 file