Received: from mail.netbsd.org (mail.netbsd.org [149.20.53.66]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mail.netbsd.org", Issuer "Postmaster NetBSD.org" (verified OK)) by mollari.NetBSD.org (Postfix) with ESMTPS id 39EBBA6F56 for ; Wed, 23 Jul 2014 14:09:58 +0000 (UTC) Received: by mail.netbsd.org (Postfix, from userid 605) id E158814A1C1; Wed, 23 Jul 2014 14:09:57 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by mail.netbsd.org (Postfix) with ESMTP id A0AFE14A1BE for ; Wed, 23 Jul 2014 14:09:53 +0000 (UTC) X-Virus-Scanned: amavisd-new at NetBSD.org Received: from mail.netbsd.org ([127.0.0.1]) by localhost (mail.NetBSD.org [127.0.0.1]) (amavisd-new, port 10025) with ESMTP id MCCBBunC0158 for ; Wed, 23 Jul 2014 14:09:53 +0000 (UTC) Received: from cvs.netbsd.org (cvs.NetBSD.org [IPv6:2001:4f8:3:7:2e0:81ff:fe30:95bd]) by mail.netbsd.org (Postfix) with ESMTP id E9BAB14A1B9 for ; Wed, 23 Jul 2014 14:09:52 +0000 (UTC) Received: by cvs.netbsd.org (Postfix, from userid 500) id E376696; Wed, 23 Jul 2014 14:09:52 +0000 (UTC) Content-Disposition: inline Content-Transfer-Encoding: 8bit Content-Type: text/plain; charset="US-ASCII" MIME-Version: 1.0 Date: Wed, 23 Jul 2014 14:09:52 +0000 From: "Adam Ciarcinski" Subject: CVS commit: pkgsrc/mail To: pkgsrc-changes@NetBSD.org Reply-To: adam@netbsd.org X-Mailer: log_accum Message-Id: <20140723140952.E376696@cvs.netbsd.org> Sender: pkgsrc-changes-owner@NetBSD.org List-Id: pkgsrc-changes.NetBSD.org Precedence: bulk Module Name: pkgsrc Committed By: adam Date: Wed Jul 23 14:09:52 UTC 2014 Modified Files: pkgsrc/mail/exim: Makefile distinfo pkgsrc/mail/exim-html: Makefile distinfo pkgsrc/mail/exim/patches: patch-lookups_Makefile Log Message: Changes 4.83: 1. If built with the EXPERIMENTAL_PROXY feature enabled, Exim can be configured to expect an initial header from a proxy that will make the actual external source IP:host be used in exim instead of the IP of the proxy that is connecting to it. 2. New verify option header_names_ascii, which will check to make sure there are no non-ASCII characters in header names. Exim itself handles those non-ASCII characters, but downstream apps may not, so Exim can detect and reject if those characters are present. 3. New expansion operator ${utf8clean:string} to replace malformed UTF8 codepoints with valid ones. 4. New malware type "sock". Talks over a Unix or TCP socket, sending one command line and matching a regex against the return data for trigger and a second regex to extract malware_name. The mail spoofile name can be included in the command line. 5. The smtp transport now supports options "tls_verify_hosts" and "tls_try_verify_hosts". If either is set the certificate verification is split from the encryption operation. The default remains that a failed verification cancels the encryption. 6. New SERVERS override of default ldap server list. In the ACLs, an ldap lookup can now set a list of servers to use that is different from the default list. 7. New command-line option -C for exiqgrep to specify alternate exim.conf file when searching the queue. 8. OCSP now supports GnuTLS also, if you have version 3.1.3 or later of that. 9. Support for DNSSEC on outbound connections. 10. New variables "tls_(in,out)_(our,peer)cert" and expansion item "certextract" to extract fields from them. Hash operators md5 and sha1 work over them for generating fingerprints, and a new sha256 operator for them added. 11. PRDR is now supported dy default. 12. OCSP stapling is now supported by default. 13. If built with the EXPERIMENTAL_DSN feature enabled, Exim will output Delivery Status Notification messages in MIME format, and negociate DSN features per RFC 3461. To generate a diff of this commit: cvs rdiff -u -r1.133 -r1.134 pkgsrc/mail/exim/Makefile cvs rdiff -u -r1.58 -r1.59 pkgsrc/mail/exim/distinfo cvs rdiff -u -r1.26 -r1.27 pkgsrc/mail/exim-html/Makefile cvs rdiff -u -r1.20 -r1.21 pkgsrc/mail/exim-html/distinfo cvs rdiff -u -r1.2 -r1.3 pkgsrc/mail/exim/patches/patch-lookups_Makefile Please note that diffs are not public domain; they are subject to the copyright notices on the relevant files.