Changeset d524862 for server


Ignore:
Timestamp:
12/30/2023 05:33:09 AM (4 months ago)
Author:
Douglas R. Reno <renodr@…>
Branches:
12.1, ken/TL2024, lazarus, plabs/newcss, rahul/power-profiles-daemon, trunk, xry111/llvm18
Children:
d8ce086
Parents:
418dddd
Message:

Update to postfix-3.8.4 (Security Update)

File:
1 edited

Legend:

Unmodified
Added
Removed
  • server/mail/postfix.xml

    r418dddd rd524862  
    1010  <!ENTITY postfix-download-http "https://ghostarchive.org/postfix/postfix-release/official/postfix-&postfix-version;.tar.gz">
    1111  <!ENTITY postfix-download-ftp  " ">
    12   <!ENTITY postfix-md5sum        "7edfadf15fafe73523266829172d890f">
     12  <!ENTITY postfix-md5sum        "f2e5ac23387a5824bc365675697277e9">
    1313  <!ENTITY postfix-size          "4.6 MB">
    14   <!ENTITY postfix-buildsize     "156 MB">
     14  <!ENTITY postfix-buildsize     "208 MB">
    1515  <!ENTITY postfix-time          "0.2 SBU (Using parallelism=4)">
    1616]>
     
    407407echo 'alias_database = lmdb:/etc/aliases' &gt;&gt; /etc/postfix/main.cf &amp;&amp;
    408408echo 'alias_maps = lmdb:/etc/aliases'     &gt;&gt; /etc/postfix/main.cf</userinput></screen>
     409
     410      <para>
     411        To protect your server against the recent SMTP smuggling attacks,
     412        additonal steps are required. Add two lines into
     413        <filename>/etc/postfix/mail.cf</filename> to disconnect remote SMTP
     414        clients that send bare newlines, while also allowing clients on your
     415        network with non-standard SMTP implementations to still send mail:
     416      </para>
     417
     418<screen role="root"><userinput>echo 'smtpd_forbid_bare_newline = yes' &gt;&gt; /etc/postfix/main.cf &amp;&amp;
     419echo 'smtpd_forbid_bare_newline_exclusions = $mynetworks' &gt;&gt; /etc/postfix/main.cf</userinput></screen>
    409420
    410421      <para>
Note: See TracChangeset for help on using the changeset viewer.