diff options
author | vsevolod <vsevolod@FreeBSD.org> | 2014-07-22 23:39:44 +0800 |
---|---|---|
committer | vsevolod <vsevolod@FreeBSD.org> | 2014-07-22 23:39:44 +0800 |
commit | e0da321c1bd198034dbdf5e91d6aa5a736a5cddb (patch) | |
tree | 19bbae85fd6e60f76bc00eb82df6cb57677d18b3 /mail/exim-doc-html | |
parent | 6903463f32073f1eb9fa7908246e750e53c96614 (diff) | |
download | freebsd-ports-gnome-e0da321c1bd198034dbdf5e91d6aa5a736a5cddb.tar.gz freebsd-ports-gnome-e0da321c1bd198034dbdf5e91d6aa5a736a5cddb.tar.zst freebsd-ports-gnome-e0da321c1bd198034dbdf5e91d6aa5a736a5cddb.zip |
Update to 4.83.
Changes in the port:
- Added new options:
* DNSSEC: validate peers using TLSA records
* PRDR: Per-Recipient-Data-Response support
* CERTNAMES: Check certiticates ownership
* DSN: Delivery Status Notifications
* PROXY: Experimental Proxy Protocol
- Enable OCSP stapling by default
- Disable NIS by default
- SRS support is now radio group
- DNSSEC and PRDR are now enabled by default
Changes in exim itself:
This release contains the following enhancements and bugfixes:
+ PRDR was promoted from Experimental to mainline
+ OCSP Stapling was promoted from Experimental to mainline
+ new Experimental feature Proxy Protocol
+ new Experimental feature DSN (Delivery Status Notifications)
+ TLS session improvements
+ TLS SNI fixes
+ LDAP enhancements
+ DMARC fixes (previous CVE-2014-2957) and new $dmarc_domain_policy
+ several new operations (listextract, utf8clean, md5, sha1)
+ enforce header formatting with verify=header_names_ascii
+ new commandline option -oMm
+ new TLSA dns lookup
+ new malware "sock" type
+ cutthrough routing enhancements
+ logging enhancements
+ DNSSEC enhancements
+ exiqgrep enhancements
+ deprecating non-standard SPF results
+ build and portability fixes
+ documentation fixes and enhancements
Uncompatible changes:
This release of Exim includes one incompatible fix: the behavior of
expansion of arguments to math comparison functions (<, <=, =, =>, >)
was unexpected, expanding the values twice. This fix also addresses a
security advisory, CVE-2014-2972. This is not a remote exploit, but if
content that is searched by the above math comparison functions is under
the control of an attacker, specially crafted data can be inserted that
will cause the Exim mail server to perform various file-system functions
as the exim user.
Diffstat (limited to 'mail/exim-doc-html')
-rw-r--r-- | mail/exim-doc-html/Makefile | 2 | ||||
-rw-r--r-- | mail/exim-doc-html/distinfo | 12 |
2 files changed, 7 insertions, 7 deletions
diff --git a/mail/exim-doc-html/Makefile b/mail/exim-doc-html/Makefile index 0e0d651873a3..cdf6fbc01e3d 100644 --- a/mail/exim-doc-html/Makefile +++ b/mail/exim-doc-html/Makefile @@ -2,7 +2,7 @@ # $FreeBSD$ PORTNAME= exim -PORTVERSION= 4.82.1 +PORTVERSION= 4.83 CATEGORIES= mail MASTER_SITES= ${MASTER_SITE_EXIM:S/$/:exim/} MASTER_SITE_SUBDIR= exim4/:exim diff --git a/mail/exim-doc-html/distinfo b/mail/exim-doc-html/distinfo index 80f67147bd00..15688c5f2783 100644 --- a/mail/exim-doc-html/distinfo +++ b/mail/exim-doc-html/distinfo @@ -1,6 +1,6 @@ -SHA256 (exim/exim-html-4.82.1.tar.bz2) = 81d0237cff64b259d47c758d5c82da93bd2e7b8ce048974d53d90e597eee122e -SIZE (exim/exim-html-4.82.1.tar.bz2) = 458569 -SHA256 (exim/exim-pdf-4.82.1.tar.bz2) = 2e3705504f22633a14d417ffcb72c6beddc2f142e38ff4f01394b83ae583ff42 -SIZE (exim/exim-pdf-4.82.1.tar.bz2) = 1835284 -SHA256 (exim/exim-postscript-4.82.1.tar.bz2) = f9c69153b1da3ef854c73ac98ec5bcef842438c5630819bc2287dec869bd039d -SIZE (exim/exim-postscript-4.82.1.tar.bz2) = 1008574 +SHA256 (exim/exim-html-4.83.tar.bz2) = d7b38922f2aedd9eb4db7aa0e1e1c0fcd948777a4c8bac7971eaf4b2959bf0de +SIZE (exim/exim-html-4.83.tar.bz2) = 464789 +SHA256 (exim/exim-pdf-4.83.tar.bz2) = 478fca2c13fbda403fb0c373dc61e82aa434e7167c0341f24b83195afd294b82 +SIZE (exim/exim-pdf-4.83.tar.bz2) = 1856787 +SHA256 (exim/exim-postscript-4.83.tar.bz2) = 7f8ef825a832debdab54173bfb4e86acaaa6eb139a64e8b87a785183354375cf +SIZE (exim/exim-postscript-4.83.tar.bz2) = 1019858 |