Postfix Release 20010228 Patchlevel 01 includes patches that were sent to the list in the last month, some portability enhancements, and updated documentation. The patch is too large to distribute via email. A patched version of the source code will be made available from the sites listed on the www.postfix.org web site. The primary distribution site is: ftp://ftp.porcupine.org/mirrors/postfix-release/ postfix-20010228-patch01.gz Source patch postfix-20010228-pl01.tar.sig Source code postfix-20010228-pl01.tar.gz.sig PGP signature Details of the patch can be found in the extracts from the RELEASE_NOTES and HISTORY files below the signature. Wietse RELEASE_NOTES extract: ====================== This release changes the names of the "fast ETRN" logfiles with delayed mail per destination. These files are maintained by the Postfix "fast flush" daemon. The old scheme failed with addresses of the form user@[ip.address] and user@a.domain.name. In order to populate the new "fast ETRN" logfiles, execute the command "sendmail -q". The old "fast ETRN" logfiles go away by themselves (default: after 7 days). HISTORY file extract: ===================== 20010313 Bugfix: the RFC 822 untokenizer quoted newlines inside comments. File: global/tok822_parse.c. 20010316 Cleanup: removed an extraneous warning when a queue file write error happened. 20010321 Workaround: LMTP connection caching never worked for destinations starting with unix: or inet:. File: lmtp/lmtp_connect.c. 20010322 Portability: Solaris <2.6 does not have srandom() and random() in libc. File: util/rand_sleep.c. It does not have to be cryptographically strong. Bugfix: the fast ETRN flush server could not handle [ipaddr] or domain names with one-character hostname part. This fix changes the destination to logfile name mapping, so that you need to populate the new files with "sendmail -q". The old files go away automatically. File: flush/flush.c. 20010327 Speed up mailq (sendmail -bp) display by flushing output after each file. File: showq/showq.c. Portability: missing string.h includes, %p wants (void *), Lamont Jones, HP. 20010328 Bugfix: swapped logic caused cleanup to stall when the queue file size exceeded the file size limit by less than one the VSTREAM buffer size, so that the "file too big" was detected after flushing the last queue file record. File: cleanup/cleanup.c. 20010329 Portability: workaround for missing prototype problem in dict_ldap.c. This module should move to the global directory, because it depends on Postfix main.cf parameter information. Prereq: "Release-20010228" diff -cr ../release-20010228/src/global/mail_version.h ./src/global/mail_version.h *** ../release-20010228/src/global/mail_version.h Wed Feb 28 14:13:32 2001 --- ./src/global/mail_version.h Thu Mar 29 19:39:46 2001 *************** *** 15,21 **** * Version of this program. */ #define VAR_MAIL_VERSION "mail_version" ! #define DEF_MAIL_VERSION "Release-20010228" extern char *var_mail_version; /* LICENSE --- 15,21 ---- * Version of this program. */ #define VAR_MAIL_VERSION "mail_version" ! #define DEF_MAIL_VERSION "Postfix-20010228-pl01" extern char *var_mail_version; /* LICENSE diff -cr ../release-20010228/FILTER_README ./FILTER_README *** ../release-20010228/FILTER_README Wed Feb 28 11:06:40 2001 --- ./FILTER_README Thu Mar 1 09:40:21 2001 *************** *** 128,136 **** you create no temporary files. Each temporary file adds another factor to the performance loss. ! We will set up a content filtering program listening on localhost ! port 10025 that receives mail via the SMTP protocol, and that ! submits mail back into Postfix via localhost port 10026. .................................. : Postfix : --- 128,136 ---- you create no temporary files. Each temporary file adds another factor to the performance loss. ! We will set up a content filtering program that receives SMTP mail ! via localhost port 10025, and that submits SMTP mail back into ! Postfix via localhost port 10026. .................................. : Postfix : *************** *** 162,168 **** smtpd and pickup servers. When a queue file has content filtering information, the queue ! manager will deliver the mail to the specified content filtering regardless of its final destination. The content filter can be set up with the Postfix spawn service, --- 162,168 ---- smtpd and pickup servers. When a queue file has content filtering information, the queue ! manager will deliver the mail to the specified content filter regardless of its final destination. The content filter can be set up with the Postfix spawn service, *************** *** 182,187 **** --- 182,190 ---- you want to have your filter listening on port localhost:10025 instead of Postfix, then you must run your filter as a stand-alone program. + + Note: the localhost port 10025 SMTP server filter should announce + itself as "220 localhost...", to silence warnings in the log. The /some/where/filter command is most likely a PERL script. PERL has modules that make talking SMTP easy. The command-line specifies diff -cr ../release-20010228/HISTORY ./HISTORY *** ../release-20010228/HISTORY Wed Feb 28 11:16:24 2001 --- ./HISTORY Thu Mar 29 12:36:25 2001 *************** *** 4919,4921 **** --- 4919,4971 ---- Code cleanup: some queue/transport operations need to be moved, after the code cleanup of the recipient/concurrency limit handling. Patrik Rak. Files: *qmgr/qmgr_message.c. + + 20010313 + + Bugfix: the RFC 822 untokenizer quoted newlines inside + comments. File: global/tok822_parse.c. + + 20010316 + + Cleanup: removed an extraneous warning when a queue file + write error happened. + + 20010321 + + Workaround: LMTP connection caching never worked for + destinations starting with unix: or inet:. File: + lmtp/lmtp_connect.c. + + 20010322 + + Portability: Solaris <2.6 does not have srandom() and + random() in libc. File: util/rand_sleep.c. It does not have + to be cryptographically strong. + + Bugfix: the fast ETRN flush server could not handle [ipaddr] + or domain names with one-character hostname part. This + fix changes the destination to logfile name mapping, so + that you need to populate the new files with "sendmail -q". + The old files go away automatically. File: flush/flush.c. + + 20010327 + + Speed up mailq (sendmail -bp) display by flushing output + after each file. File: showq/showq.c. + + Portability: missing string.h includes, %p wants (void *), + Lamont Jones, HP. + + 20010328 + + Bugfix: swapped logic caused cleanup to stall when the + queue file size exceeded the file size limit by less than + one the VSTREAM buffer size, so that the "file too big" + was detected after flushing the last queue file record. + File: cleanup/cleanup.c. + + 20010329 + + Portability: workaround for missing prototype problem in + dict_ldap.c. This module should move to the global directory, + because it depends on Postfix main.cf parameter information. diff -cr ../release-20010228/INSTALL ./INSTALL *** ../release-20010228/INSTALL Fri Feb 23 11:08:09 2001 --- ./INSTALL Thu Mar 29 14:54:01 2001 *************** *** 249,254 **** --- 249,259 ---- and watch your syslog file for any error messages. + % egrep '(reject|warning|error|fatal|panic):' /some/log/file + + Typical logfile names are: /var/log/maillog or /var/log/syslog. + See /etc/syslog.conf for actual logfile names. + When it is run for the first time, the Postfix startup shell script will create a bunch of subdirectories below the Postfix spool directory. *************** *** 290,295 **** --- 295,305 ---- and watch your syslog file for any error messages. + % egrep '(reject|warning|error|fatal|panic):' /some/log/file + + Typical logfile names are: /var/log/maillog or /var/log/syslog. + See /etc/syslog.conf for actual logfile names. + When it is run for the first time, the Postfix startup shell script will create a bunch of subdirectories below the Postfix spool directory. *************** *** 323,328 **** --- 333,343 ---- and watch the syslog file for any complaints from the mail system. + % egrep '(reject|warning|error|fatal|panic):' /some/log/file + + Typical logfile names are: /var/log/maillog or /var/log/syslog. + See /etc/syslog.conf for actual logfile names. + When it is run for the first time, the Postfix startup shell script will create a bunch of subdirectories below the Postfix spool directory. *************** *** 508,513 **** --- 523,534 ---- # postfix check # egrep '(reject|warning|error|fatal|panic):' /some/log/file + + Typical logfile names are: /var/log/maillog or /var/log/syslog. + See /etc/syslog.conf for actual logfile names. + + The first line (postfix check) causes Postfix to report file + permission/ownership discrepancies. The second line looks for problem reports from the mail software, and reports how effective the anti-relay and anti-UCE blocks are. diff -cr ../release-20010228/MYSQL_README ./MYSQL_README *** ../release-20010228/MYSQL_README Sun Dec 17 16:28:51 2000 --- ./MYSQL_README Thu Mar 29 13:57:38 2001 *************** *** 3,9 **** We've written code to add a mysql map type. It utilizes the mysql client library, which can be obtained from: ! http://www.tcx.se/download.html In order to build postfix with mysql map support, you will need to add -DHAS_MYSQL and -I for the directory containing the mysql headers, and --- 3,10 ---- We've written code to add a mysql map type. It utilizes the mysql client library, which can be obtained from: ! http://www.mysql.com/downloads/ ! http://sourceforge.net/projects/mysql/ In order to build postfix with mysql map support, you will need to add -DHAS_MYSQL and -I for the directory containing the mysql headers, and diff -cr ../release-20010228/RELEASE_NOTES ./RELEASE_NOTES *** ../release-20010228/RELEASE_NOTES Wed Feb 28 14:54:00 2001 --- ./RELEASE_NOTES Thu Mar 29 14:57:03 2001 *************** *** 1,16 **** ! This is the first official Postfix release that is not called BETA. ! May it help the people who cannot get BETA software past their ! management. ! ! Release 20010228 differs from snapshot 20010228 in that the virtual ! delivery agent and nqmgr queue manager are left out. That software ! will become part of the official release when it has not changed ! in a while. In the text below, incompatible changes are labeled with the Postfix version that introduced the change. If you upgrade from a later Postfix version, then you do not have to worry about that particular incompatibility. Major incompatible changes with release-20010228 ================================================ --- 1,22 ---- ! Release 20010228 is the first official Postfix release that is not ! called BETA. May it help the people who cannot get BETA software ! past their management. In the text below, incompatible changes are labeled with the Postfix version that introduced the change. If you upgrade from a later Postfix version, then you do not have to worry about that particular incompatibility. + + Major incompatible changes with release-20010228 Patch 01 + ========================================================= + + This release changes the names of the "fast ETRN" logfiles with + delayed mail per destination. These files are maintained by the + Postfix "fast flush" daemon. The old scheme failed with addresses + of the form user@[ip.address] and user@a.domain.name. In order to + populate the new "fast ETRN" logfiles, execute the command "sendmail + -q". The old "fast ETRN" logfiles go away by themselves (default: + after 7 days). Major incompatible changes with release-20010228 ================================================ diff -cr ../release-20010228/SASL_README ./SASL_README *** ../release-20010228/SASL_README Sat Jan 27 16:39:48 2001 --- ./SASL_README Wed Mar 28 20:07:24 2001 *************** *** 111,117 **** permit_mynetworks permit_sasl_authenticated ... In /usr/local/lib/sasl/smtpd.conf you need to specify how the server ! should validate client passwords. For example: /usr/local/lib/sasl/smtpd.conf: pwcheck_method: sasldb --- 111,126 ---- permit_mynetworks permit_sasl_authenticated ... In /usr/local/lib/sasl/smtpd.conf you need to specify how the server ! should validate client passwords. ! ! In order to authenticate against the UNIX password database, try: ! ! /usr/local/lib/sasl/smtpd.conf: ! pwcheck_method: pwcheck ! ! The pwcheck daemon is contained in the cyrus-sasl source tarball. ! ! In order to authenticate against SASL's own password database: /usr/local/lib/sasl/smtpd.conf: pwcheck_method: sasldb *************** *** 129,148 **** EXAMPLE: saslpasswd -c -u `postconf -h myhostname` exampleuser ! Instead of the SASL-specific password file you can configure the ! Postfix SMTP server to validate client passwords against the UNIX ! shadow password file: ! ! /usr/local/lib/sasl/smtpd.conf: ! pwcheck_method: shadow ! ! However this requires that Postfix has read access to the UNIX shadow ! password file, which is normally readable only by root. Shadow ! password support has been found to work for Solaris 2.7 and RedHat ! 6.1 but not with FreeBSD 3.4. ! To run software chrooted with SASL support is an interesting exercise. ! This is one of the many problems with the present SASL support. To test the whole mess, connect to the SMTP server, and you should be able to have a conversation like this: --- 138,148 ---- EXAMPLE: saslpasswd -c -u `postconf -h myhostname` exampleuser ! To run software chrooted with SASL support is an interesting ! exercise. It probably is not worth the trouble. ! Testing SASL authentication in the Postfix SMTP server ! ====================================================== To test the whole mess, connect to the SMTP server, and you should be able to have a conversation like this: diff -cr ../release-20010228/conf/access ./conf/access *** ../release-20010228/conf/access Tue Jan 23 19:09:09 2001 --- ./conf/access Wed Mar 28 20:07:11 2001 *************** *** 76,82 **** # octets separated by ".". # # ACTIONS ! # [45]XX text # Reject the address etc. that matches the pattern, # and respond with the numerical code and text. # --- 76,82 ---- # octets separated by ".". # # ACTIONS ! # [45]NN text # Reject the address etc. that matches the pattern, # and respond with the numerical code and text. # *************** *** 86,92 **** # OK Accept the address etc. that matches the pattern. # # restriction... ! # Apply the named UCE restriction (permit, reject, # reject_unauth_destination, and so on). # # REGULAR EXPRESSION TABLES --- 86,92 ---- # OK Accept the address etc. that matches the pattern. # # restriction... ! # Apply the named UCE restriction(s) (permit, reject, # reject_unauth_destination, and so on). # # REGULAR EXPRESSION TABLES diff -cr ../release-20010228/conf/main.cf ./conf/main.cf *** ../release-20010228/conf/main.cf Wed Feb 28 10:31:37 2001 --- ./conf/main.cf Wed Mar 28 20:08:11 2001 *************** *** 226,239 **** # $inet_interfaces. If this parameter is defined, then the SMTP server # will reject mail for unknown local users. # ! # The local_recipient_maps parameter accepts tables with bare usernames ! # such as unix:passwd.byname and alias maps. # # Beware: if the Postfix SMTP server runs chrooted, you may have to ! # copy the passwd database into the jail. This is system dependent. ! # ! # FOR THIS TO WORK, DO NOT SPECIFY VIRTUAL DOMAINS IN MYDESTINATION. ! # MYDESTINATION MUST LIST NON-VIRTUAL DOMAINS ONLY. # #local_recipient_maps = $alias_maps unix:passwd.byname --- 226,237 ---- # $inet_interfaces. If this parameter is defined, then the SMTP server # will reject mail for unknown local users. # ! # If you use the default Postfix local delivery agent for local ! # delivery, uncomment the definition below. # # Beware: if the Postfix SMTP server runs chrooted, you may have to ! # copy the passwd (not shadow) database into the jail. This is ! # system dependent. # #local_recipient_maps = $alias_maps unix:passwd.byname diff -cr ../release-20010228/conf/sample-compatibility.cf ./conf/sample-compatibility.cf *** ../release-20010228/conf/sample-compatibility.cf Thu Jan 18 20:44:44 2001 --- ./conf/sample-compatibility.cf Wed Mar 28 20:09:00 2001 *************** *** 4,9 **** --- 4,19 ---- # This file contains example settings of Postfix configuration # parameters that control compatibility with broken software. + # The broken_sasl_auth_clients controls inter-operability with SMTP + # clients that do not recognize that Postfix supports RFC 2554 (AUTH + # command). Examples of such clients are MicroSoft Outlook Express + # version 4 and MicroSoft Exchange version 5.0. + # + # Specify broken_sasl_auth_clients=yes to have Postfix advertise + # AUTH support in a non-standard way. + # + broken_sasl_auth_clients = no + # The ignore_mx_lookup_error parameter controls what happens when a # name server fails to respond to an MX lookup request. By default, # Postfix defers delivery and tries again after some delay. Specify diff -cr ../release-20010228/examples/chroot-setup/HPUX10 ./examples/chroot-setup/HPUX10 *** ../release-20010228/examples/chroot-setup/HPUX10 Tue Nov 17 14:02:49 1998 --- ./examples/chroot-setup/HPUX10 Wed Mar 28 20:09:26 2001 *************** *** 19,21 **** --- 19,23 ---- mkdir etc cp /etc/services etc + mkdir -p usr/lib + cp /usr/lib/tztab usr/lib diff -cr ../release-20010228/html/access.5.html ./html/access.5.html *** ../release-20010228/html/access.5.html Wed Jan 24 20:52:59 2001 --- ./html/access.5.html Wed Mar 28 20:09:54 2001 *************** *** 87,93 **** octets separated by ".". ACTIONS ! [45]XX text Reject the address etc. that matches the pattern, and respond with the numerical code and text. --- 87,93 ---- octets separated by ".". ACTIONS ! [45]NN text Reject the address etc. that matches the pattern, and respond with the numerical code and text. *************** *** 97,103 **** OK Accept the address etc. that matches the pattern. restriction... ! Apply the named UCE restriction (permit, reject, reject_unauth_destination, and so on). REGULAR EXPRESSION TABLES --- 97,103 ---- OK Accept the address etc. that matches the pattern. restriction... ! Apply the named UCE restriction(s) (permit, reject, reject_unauth_destination, and so on). REGULAR EXPRESSION TABLES diff -cr ../release-20010228/html/faq.html ./html/faq.html *** ../release-20010228/html/faq.html Tue Feb 27 16:57:30 2001 --- ./html/faq.html Wed Mar 28 19:56:00 2001 *************** *** 24,29 **** --- 24,31 ----
*************** *** 186,191 **** --- 198,205 ----
+
+
+
+
+
+ The envelope sender address is also the default value for the From:
+ header address, when none is specified in the message.
+
+
+
+ To fix, specify the envelope sender address on the sendmail command
+ line:
+
+ Problems with specific Operating Systems
+
+
+
+
+
+ Problems with Compaq
+
+
+
+
+
+ Problems with IRIX
+
+
+
POP or IMAP problems
***************
*** 970,975 ****
--- 1014,1043 ----
+ sendmail: unable to find out your login name
+
+ This message is logged when submitting mail from a process with a
+ userid that does not exist in the UNIX password file. Postfix uses
+ this information in order to set the envelope sender address.
+
+
+
+
+
+ sendmail -f user@domain ...
+
+
+
Running hundreds of Postfix processes on FreeBSD
With hundreds of Postfix processes, the kernel will eventually
***************
*** 1112,1143 ****
Postfix responds slowly to incoming SMTP connections
!
!
! The fix is to properly configure the naming service. If you can't ! have every host in the DNS, then configure the mail server to look ! in /etc/hosts before the DNS, and specify the clients in /etc/hosts. !
! My Postfix server is too slow. When I telnet to the SMTP port (telnet hostname 25), the response comes after 40 seconds. On the other hand, when I telnet to the the POP port (telnet hostname 110) the response comes with no delay. ++
! Answer: !
! You have a name service problem.! Postfix calls the C library routines gethostbyname() and ! gethostbyaddr() in order to find out the SMTP client hostname. ! These library routines use several system configuration files in ! order to satisfy the request. They may in fact end up calling the ! DNS for reasons that are not under control by Postfix. !
! ! Depending on your system, these controlling files can be named ! /etc/nsswitch.conf, /etc/svcorder, /etc/host.conf ! or otherwise. Those files specify whether the C library routines ! will use local /etc/hosts before or after DNS. ! !
+ + Enabling chroot operation adds a non-trivial barrier for + system penetrators. + +
+ + Two solutions: + +
+ +
+ Sendmail-style virtual domains are not supported in Postfix versions + released before 20001118. + +
+ Be sure to follow instructions in the virtual manual page. *************** *** 2906,2911 **** --- 3017,3052 ---- href="http://www.isc.org/"> http://www.isc.org/
. + ++ + Postfix sets the execute bit on a queue file to indicate that it + is done receiving a message. As long as a queue file does not have + the execute bit set, Postfix will ignore it as "mail still being + received". + +
+ + With enhanced security enabled, Compaq Tru64 UNIX has a feature + that disallows non-superuser attempts to set the execute bit on a + queuefile. Unfortunately, Postfix is never informed that such + attempts fail, and mail seems to disappear into a black hole. + +
+ + Postfix could be modified to use some other bit than the execute + bit, but that might equally well fail on other systems. Another + possibility is to allow non-superusers to set the execute bit on + files, and to mount the Postfix queue file system with the + noexec option or equivalent.
--- 109,116 ----
diff -cr ../release-20010228/man/man5/access.5 ./man/man5/access.5
*** ../release-20010228/man/man5/access.5 Wed Jan 24 20:52:54 2001
--- ./man/man5/access.5 Wed Mar 28 20:10:34 2001
***************
*** 69,75 ****
.nf
.ad
.fi
! .IP "[\fB45\fR]\fIXX text\fR"
Reject the address etc. that matches the pattern, and respond with
the numerical code and text.
.IP \fBREJECT\fR
--- 69,75 ----
.nf
.ad
.fi
! .IP "[\fB45\fR]\fINN text\fR"
Reject the address etc. that matches the pattern, and respond with
the numerical code and text.
.IP \fBREJECT\fR
***************
*** 78,84 ****
.IP \fBOK\fR
Accept the address etc. that matches the pattern.
.IP \fIrestriction...\fR
! Apply the named UCE restriction (\fBpermit\fR, \fRreject\fR,
\fBreject_unauth_destination\fR, and so on).
.SH REGULAR EXPRESSION TABLES
.na
--- 78,84 ----
.IP \fBOK\fR
Accept the address etc. that matches the pattern.
.IP \fIrestriction...\fR
! Apply the named UCE restriction(s) (\fBpermit\fR, \fRreject\fR,
\fBreject_unauth_destination\fR, and so on).
.SH REGULAR EXPRESSION TABLES
.na
diff -cr ../release-20010228/man/man8/pipe.8 ./man/man8/pipe.8
*** ../release-20010228/man/man8/pipe.8 Thu Feb 22 14:14:55 2001
--- ./man/man8/pipe.8 Wed Mar 28 20:10:48 2001
***************
*** 13,21 ****
.ad
.fi
The \fBpipe\fR daemon processes requests from the Postfix queue
! manager to deliver messages to external commands. Each delivery
! request specifies a queue file, a sender address, a domain or host
! to deliver to, and one or more recipients.
This program expects to be run from the \fBmaster\fR(8) process
manager.
--- 13,19 ----
.ad
.fi
The \fBpipe\fR daemon processes requests from the Postfix queue
! manager to deliver messages to external commands.
This program expects to be run from the \fBmaster\fR(8) process
manager.
***************
*** 23,28 ****
--- 21,44 ----
as finished, or it informs the queue manager that delivery should
be tried again at a later time. Delivery problem reports are sent
to the \fBbounce\fR(8) or \fBdefer\fR(8) daemon as appropriate.
+ .SH SINGLE-RECIPIENT DELIVERY
+ .na
+ .nf
+ .ad
+ .fi
+ Some external commands cannot handle more than one recipient
+ per delivery request. Examples of such transports are pagers,
+ fax machines, and so on.
+
+ To prevent Postfix from sending multiple recipients per delivery
+ request, specify
+
+ .ti +4
+ \fItransport\fB_destination_recipient_limit = 1\fR
+
+ in the Postfix \fBmain.cf\fR file, where \fItransport\fR
+ is the name in the first column of the Postfix \fBmaster.cf\fR
+ entry for the pipe-based delivery transport.
.SH COMMAND ATTRIBUTE SYNTAX
.na
.nf
***************
*** 82,99 ****
--- 98,118 ----
This macro expands to the extension part of a recipient address.
For example, with an address \fIuser+foo@domain\fR the extension is
\fIfoo\fR.
+ .sp
A command-line argument that contains \fB${\fBextension\fR}\fR expands
into as many command-line arguments as there are recipients.
.IP \fB${\fBmailbox\fR}\fR
This macro expands to the complete local part of a recipient address.
For example, with an address \fIuser+foo@domain\fR the mailbox is
\fIuser+foo\fR.
+ .sp
A command-line argument that contains \fB${\fBmailbox\fR}\fR
expands into as many command-line arguments as there are recipients.
.IP \fB${\fBnexthop\fR}\fR
This macro expands to the next-hop hostname.
.IP \fB${\fBrecipient\fR}\fR
This macro expands to the complete recipient address.
+ .sp
A command-line argument that contains \fB${\fBrecipient\fR}\fR
expands into as many command-line arguments as there are recipients.
.IP \fB${\fBsender\fR}\fR
***************
*** 105,110 ****
--- 124,130 ----
This macro expands to the username part of a recipient address.
For example, with an address \fIuser+foo@domain\fR the username
part is \fIuser\fR.
+ .sp
A command-line argument that contains \fB${\fBuser\fR}\fR expands
into as many command-line arguments as there are recipients.
.RE
diff -cr ../release-20010228/proto/access ./proto/access
*** ../release-20010228/proto/access Tue Jan 23 19:09:07 2001
--- ./proto/access Wed Mar 28 20:11:07 2001
***************
*** 57,63 ****
# ACTIONS
# .ad
# .fi
! # .IP "[\fB45\fR]\fIXX text\fR"
# Reject the address etc. that matches the pattern, and respond with
# the numerical code and text.
# .IP \fBREJECT\fR
--- 57,63 ----
# ACTIONS
# .ad
# .fi
! # .IP "[\fB45\fR]\fINN text\fR"
# Reject the address etc. that matches the pattern, and respond with
# the numerical code and text.
# .IP \fBREJECT\fR
***************
*** 66,72 ****
# .IP \fBOK\fR
# Accept the address etc. that matches the pattern.
# .IP \fIrestriction...\fR
! # Apply the named UCE restriction (\fBpermit\fR, \fRreject\fR,
# \fBreject_unauth_destination\fR, and so on).
# REGULAR EXPRESSION TABLES
# .ad
--- 66,72 ----
# .IP \fBOK\fR
# Accept the address etc. that matches the pattern.
# .IP \fIrestriction...\fR
! # Apply the named UCE restriction(s) (\fBpermit\fR, \fRreject\fR,
# \fBreject_unauth_destination\fR, and so on).
# REGULAR EXPRESSION TABLES
# .ad
diff -cr ../release-20010228/src/cleanup/cleanup.c ./src/cleanup/cleanup.c
*** ../release-20010228/src/cleanup/cleanup.c Wed Dec 13 19:15:27 2000
--- ./src/cleanup/cleanup.c Wed Mar 28 20:05:26 2001
***************
*** 215,222 ****
if (CLEANUP_OUT_OK(state) == 0 && type > 0) {
if ((state->errs & CLEANUP_STAT_CONT) == 0)
msg_warn("%s: skipping further client input", state->queue_id);
! while ((type = rec_get(src, buf, 0)) > 0
! && type != REC_TYPE_END)
/* void */ ;
}
--- 215,222 ----
if (CLEANUP_OUT_OK(state) == 0 && type > 0) {
if ((state->errs & CLEANUP_STAT_CONT) == 0)
msg_warn("%s: skipping further client input", state->queue_id);
! while (type != REC_TYPE_END
! && (type = rec_get(src, buf, 0)) > 0)
/* void */ ;
}
diff -cr ../release-20010228/src/cleanup/cleanup_extracted.c ./src/cleanup/cleanup_extracted.c
*** ../release-20010228/src/cleanup/cleanup_extracted.c Sat Sep 16 19:04:18 2000
--- ./src/cleanup/cleanup_extracted.c Wed Mar 28 20:05:36 2001
***************
*** 182,188 ****
* straightforward.
*/
if (vstream_fflush(state->dst)) {
- msg_warn("%s: write queue file: %m", state->queue_id);
if (errno == EFBIG) {
msg_warn("%s: queue file size limit exceeded", state->queue_id);
state->errs |= CLEANUP_STAT_SIZE;
--- 182,187 ----
diff -cr ../release-20010228/src/flush/Makefile.in ./src/flush/Makefile.in
*** ../release-20010228/src/flush/Makefile.in Sun Feb 25 18:33:53 2001
--- ./src/flush/Makefile.in Thu Mar 29 12:39:43 2001
***************
*** 62,68 ****
flush.o: ../../include/vstring.h
flush.o: ../../include/vstring_vstream.h
flush.o: ../../include/myflock.h
- flush.o: ../../include/valid_hostname.h
flush.o: ../../include/htable.h
flush.o: ../../include/dict.h
flush.o: ../../include/argv.h
--- 62,67 ----
diff -cr ../release-20010228/src/flush/flush.c ./src/flush/flush.c
*** ../release-20010228/src/flush/flush.c Sun Jan 28 10:26:18 2001
--- ./src/flush/flush.c Wed Mar 28 20:01:01 2001
***************
*** 129,134 ****
--- 129,136 ----
#include