aboutsummaryrefslogtreecommitdiffstats
path: root/deskutils/gourmet
diff options
context:
space:
mode:
authorohauer <ohauer@FreeBSD.org>2015-08-03 04:17:29 +0800
committerohauer <ohauer@FreeBSD.org>2015-08-03 04:17:29 +0800
commit44a9844e6b8ab862275ea28c01d4bfbc41256986 (patch)
treedc07c6374dfa2f33f266e836c1d136ce06f0d0e2 /deskutils/gourmet
parent3d4d07f9e70be1318a04f44124ab72bd5d6f9803 (diff)
downloadfreebsd-ports-gnome-44a9844e6b8ab862275ea28c01d4bfbc41256986.tar.gz
freebsd-ports-gnome-44a9844e6b8ab862275ea28c01d4bfbc41256986.tar.zst
freebsd-ports-gnome-44a9844e6b8ab862275ea28c01d4bfbc41256986.zip
- update to 3.0-20150719 (3.0.2)
20150501 Support for Linux 4.*, and some simplification for future makedefs files. Files: makedefs, util/sys_defs.h. 20150718 Security: opportunistic TLS by default uses "medium" or stronger ciphers instead of "export" or stronger. See the RELEASE_NOTES file for how to get the old settings back. Files: global/mail_params.h, proto/TLS_README.html, proto/postconf.proto, and files derived from those. 20150719 Security: Postfix TLS support by default no longer uses SSLv2 or SSLv3. See the RELEASE_NOTES file for how to get the old settings back. Files: global/mail_params.h, proto/postconf.proto, and files derived from those. Incompatible change with Postfix 2.11.6 / 3.0.2 ------------------------------------------------- As of the middle of 2015, all supported Postfix releases no longer enable "export" grade ciphers for opportunistic TLS, and no longer use the deprecated SSLv2 and SSLv3 protocols for mandatory or opportunistic TLS. These changes are very unlikely to cause problems with server-to-server communication over the Internet, but they may result in interoperability problems with ancient client or server implementations on internal networks. To address this problem, you can revert the changes with: Postfix SMTP client settings: lmtp_tls_ciphers = export smtp_tls_ciphers = export lmtp_tls_protocols = !SSLv2 smtp_tls_protocols = !SSLv2 lmtp_tls_mandatory_protocols = !SSLv2 smtp_tls_mandatory_protocols = !SSLv2 Postfix SMTP server settings: smtpd_tls_ciphers = export smtpd_tls_protocols = smtpd_tls_mandatory_protocols = !SSLv2 These settings, if put in main.cf, affect all Postfix SMTP client or server communication, which may be undesirable. To be more selective, use "-o name=value" parameter overrides on specific services in master.cf. Execute the command "postfix reload" to make the changes effective.
Diffstat (limited to 'deskutils/gourmet')
0 files changed, 0 insertions, 0 deletions