summaryrefslogtreecommitdiff
path: root/mail
AgeCommit message (Collapse)AuthorFilesLines
2020-01-18all: migrate several HOMEPAGEs to httpsrillig36-72/+72
pkglint --only "https instead of http" -r -F With manual adjustments afterwards since pkglint 19.4.4 fixed a few indentations in unrelated lines. This mainly affects projects hosted at SourceForce, as well as freedesktop.org, CTAN and GNU.
2020-01-18*: Recursive revision bump for openssl 1.1.1.jperkin88-157/+176
2020-01-18*: Recursive revision bump for openssl 1.1.1.jperkin24-39/+48
2020-01-17mutt: +sasl by default for easier times authing to remote mailservers.nia2-3/+4
Bump PKGREVISION
2020-01-16neomutt: build fix on illumos/SmartOStm3-2/+21
2020-01-16*: Remove USE_OLD_DES_API.jperkin1-2/+1
OpenSSL 1.1.1d no longer ships des_old.h, and the time for this being necessary appears to be behind us.
2020-01-14mail/roundcube-plugin-zipdownload: update to 1.4.2taca3-11/+5
Update roundcube-plugin-zipdownload to 1.4.2. pkgsrc change: * Use common patches/distinfo directory with roundcube. RELEASE 1.4-beta ---------------- - zipdownload: Added option to define size limit for multiple messages download (#5696)
2020-01-14mail/roundcube-plugin-password: update to 1.4.2taca3-11/+7
Update roundcube-plugin-password to 1.4.2. pkgsrc change: * Use common patches/distinfo directory with roundcube. RELEASE 1.4.2 ------------- - Password: Fix kpasswd and smb drivers' double-escaping bug (#7092) RELEASE 1.4-rc2 --------------- - Password: Added ldap_exop driver (#4992) - Password: Added support for SSHA512 password algorithm (#6805) RELEASE 1.4-rc1 --------------- - Password: Added 'modoboa' driver (#6361) - Password: Fix bug where password_dovecotpw_with_method setting could be ignored (#6436) - Password: Fix bug where new users could skip forced password change (#6434) - Password: Allow drivers to override default password comparisons (eg new is not same as current) (#6473) - Password: Allow drivers to override default strength checks (eg allow for 'not the same as last x passwords') (#246) - Passowrd: Allow drivers to define password strength rules displayed to the user - Password: Allow separate password saving and strength drivers for use of strength checking services (#5040) - Password: Add zxcvbn driver for checking password strength (#6479) - Password: Disallow control characters in passwords - Password: Add support for Plesk >= 17.8 (#6526) RELEASE 1.4-beta ---------------- - Password: Support host variables in password_db_dsn option (#5955) - Password: Automatic virtualmin domain setting, removed password_virtualmin_format option (#5759) - Password: Added password_username_format option (#5766)
2020-01-14thunderbird-l10n: Update to 68.4.1ryoon2-223/+223
* Sync with mail/thunderbird-68.4.1.
2020-01-14mail/roundcube-plugin-enigma: update to 1.4.2taca3-25/+14
Update roundcube-plugin-enigma to 1.4.2. pkgsrc change: * Use common patches/distinfo directory with roundcube. RELEASE 1.4.2 ------------- - Enigma: Add script to import keys from filesystem to the db storage (for multihost) RELEASE 1.4.1 ------------- - Enigma: Fix bug where signing option was set to disabled after saving a draft in Elastic skin (#6515) RELEASE 1.4-rc2 --------------- - Added 'keyservers' option to define list of HKP servers for Enigma/Mailvelope (#6326) - Enigma: For verified signatures, display the user id associated with the sender address (#5958) - Enigma: Fix bug where revoked users/keys were not greyed out in key info - Enigma: Fix error message when trying to encrypt with a revoked key (#6607) - Enigma: Fix "decryption oracle" bug [CVE-2019-10740] (#6638) - Enigma: Fix bug where signature verification could have been skipped for some message structures (#6838) RELEASE 1.4-rc1 --------------- - Enigma: Update to OpenPGPjs 4.2.1 - fixes user name encoding issues in key generation (#6524) - Enigma: Fixed multi-host synchronization of private and deleted keys and pubring.kbx file - Elastic: Fix bug where Enigma options in mail compose could sometimes be ignored (#6515) RELEASE 1.4-beta ---------------- - Enigma: Add button to send mail unencrypted if no key was found (#5913) - Enigma: Add options to set PGP cipher/digest algorithms (#5645) - Enigma: Multi-host support
2020-01-14thunderbird: Update to 68.4.1ryoon3-185/+7
Changelog: Changes Various improvements when setting up an account for a Microsoft Exchange server: Now offers IMAP/SMTP if available, better detection for Office 365 accounts; re-run configuration after password change. Fixes Attachments with one or more spaces in their names couldn't be opened under some circumstances After changing view layout, the message display pane showed garbled content under some circumstances Tags were lost on messages in shared IMAP folders under some circumstances Various theme changes to achieve "pixel perfection": Unread icon, "no results" icon, paragraph format and font selector, background of folder summary tooltip Calendar: Event attendee dialog was not displayed correctly Various security fixes Security fixes: CVE-2019-17026: IonMonkey type confusion with StoreElementHole and FallibleStoreElement #CVE-2019-17015: Memory corruption in parent process during new content process initialization on Windows #CVE-2019-17016: Bypass of @namespace CSS sanitization during pasting #CVE-2019-17017: Type Confusion in XPCVariant.cpp #CVE-2019-17021: Heap address disclosure in parent process during content process initialization on Windows #CVE-2019-17022: CSS sanitization does not escape HTML tags #CVE-2019-17024: Memory safety bugs fixed in Thunderbird 68.4.1
2020-01-14mail/roundcube: update to 1.4.2taca7-274/+364
Update roundcube ot 1.4.2. pkgsrc change: * Use "complete" distfile and avoid downloading each JavaScript libraries. * Use common patches/distinfo directory. * Use REPLACE_PHP. Here is release 1.4.0 announce (2019/11/09): It's a big honor for me to announce the final release of the long awaited major version 1.4 of Roundcube webmail. After more than two years of hard work by Alec and other volunteer contributors, Roundcube finally gets the responsive skin with full mobile device support - the Elastic. In addition to the new UI we introduce these new features: * Email Resent (Bounce) feature * Improved [Mailvelope](https://www.mailvelope.com) integration * Support for Redis and Memcached cache * Support for SMTPUTF8 and GSSAPI Plus numerous improvements and bug fixes collected from your precious feedback as well as updates to recent versions of 3rd party libraries like jQuery and TinyMCE. See the full changelog in the release notes on the Github download page [1]. The new Elastic theme, which is the new default skin, is built with LESS and of course the sources are included. They allow a certain degree of customization by adjusting some colors and variables using the `_styles.less` and `_variables.less` files. Please consider customizing your Roundcube installation in order to make phishing [2] harder. You'll find guidance in the README.md file inside the skin folder. This release is considered stable and we encourage you to update your productive installations after carefully testing the upgrade scenario and preparing your users to the significant changes in their webmail UI. Download it from https://roundcube.net/download. With the release of Roundcube 1.4.0, the previous stable release branches 1.3.x and 1.2.x will change into LTS low maintenance mode which means they will only receive important security updates but no longer any regular improvement updates. The 1.1.x series is no longer supported and maintained. RELEASE 1.4.1 (2019/11/22) ------------- - Elastic: Change HTML editor widget to improve form flow (#6992) - Elastic: Fix position of mobile floating action button (#7038) - Managesieve: Fix locked UI after opening filter frame (#7007) - Fix PHP warning: "array_merge(): Expected parameter 2 to be an array, null given in sendmail.inc (#7003) - Fix bug where cache keys could exceed length limit specified in db schema (#7004) - Fix invalid Signature button state after escaping Mailvelope mode (#7015) - Fix so 401 error is returned only on failed logon requests (#7010) - Fix db_prefix handling in queries with `TRUNCATE TABLE <name>` and `UNIQUE <name>` (#7013) - Fix so update.sh script warns about changed defaults (#7011) - Fix tables listing routine when DSN contained a database with unsupported suffix (#7034) - Fix so Elastic is also a default in jqueryui plugin (#7039) - Fix bug where the Installer would not warn about required schema upgrade (#7042) RELEASE 1.4.2 (2020/01/01) ------------- - Plugin API: Make actionbefore, before<action>, actionafter and after<action> events working with plugin actions (#7106) - Managesieve: Replace "Filter disabled" with "Filter enabled" (#7028) - Managesieve: Fix so modifier type select wasn't hidden after hiding modifier select on header change - Managesieve: Fix filter selection after removing a first filter (#7079) - Markasjunk: Fix marking more than one message as spam/ham with email_learn driver (#7121) - Installer: Fix DB Write test on SQLite database ("database is locked" error) (#7064) - Installer: Fix so SQLite DSN with a relative path to the database file works in Installer - Elastic: Fix contrast of warning toasts (#7058) - Elastic: Simple search in pretty selects (#7072) - Elastic: Fix hidden list widget on mobile/tablet when selecting folder while search menu is open (#7120) - Fix so type attribute on script tags is not used on HTML5 pages (#6975) - Fix unread count after purge on a folder that is not currently selected (#7051) - Fix bug where Enter key didn't work on messages list in "List" layout (#7052) - Fix bug where deleting a saved search in addressbook caused display issue on sources/groups list (#7061) - Fix bug where a new saved search added after removing all searches wasn't added to the list (#7061) - Fix bug where a new contact group added after removing all groups from addressbook wasn't added to the list - Fix bug where Ctype extension wasn't required in Installer and INSTALL file (#7049) - Fix so install-jsdeps.sh removes Bootstrap's sourceMappingURL (#7035) - Fix so use of Ctrl+A does not scroll the list (#7020) - Fix/remove useless keyup event handler on username input in logon form (#6970) - Fix bug where cancelling switching from HTML to plain text didn't set the flag properly (#7077) - Fix bug where HTML reply could add an empty line with extra indentation above the original message (#7088) - Fix matching multiple X-Forwarded-For addresses with 'proxy_whitelist' (#7107) - Fix so displayed maximum attachment size depends also on 'max_message_size' (#7105) - Fix bug where 'skins_allowed' option didn't enforce user skin preference (#7080) - Fix so contact's organization field accepts up to 128 characters (it was 50) - Fix bug where listing tables in PostgreSQL database with db_prefix didn't work (#7093) - Fix bug where 'text' attribute on body tag was ignored when displaying HTML message (#7109) - Fix bug where next message wasn't displayed after delete in List mode (#7096) - Fix so number of contacts in a group is not limited to 200 when redirecting to mail composer from Contacts (#6972) - Fix malformed characters in HTML message with charset meta tag not in head (#7116)
2020-01-13Regen.joerg1-4/+4
2020-01-12mutt: Update to version 1.13.3tron2-7/+7
- This is a bug fix release, fixing exit screen handling and a possible segv on imap-logout-all. 1.13.3 (2020-01-12): ! Bug fix release.
2020-01-12Fix build on NetBSD current.joerg7-4/+111
2020-01-12*: Recursive revbump from devel/boost-libsryoon28-36/+56
2020-01-12deforaos-mailer: update to 0.2.0khorben4-31/+13
Changes since 0.1.8: - Defaults to Gtk+ 3 (like libDesktop) - Re-licensed to 2-clause BSD - Use general-purpose version-flexible SSL/TLS methods
2020-01-10Drop SSLv3-only support. Don't look into internals of SSL structures.joerg2-13/+32
2020-01-10Use generic SSL version method instead of ancient SSLv3-only. Adjustjoerg4-5/+21
PLIST to match reality. Bump revision.
2020-01-10Revbump Go packages after Go default version bump.bsiegert1-2/+2
2020-01-08Define ALLOW_INSECURE_BZERO=ON only on Darwin, says the author. Rideschmonz1-2/+2
recent import.
2020-01-07thunderbird: Bump PKGREVISION for wayland default-on option.wiz1-1/+2
2020-01-07thunderbird: handle wayland support like in the firefox packageswiz2-4/+16
Sort PLIST while here.
2020-01-07Update MAINTAINER.kim2-4/+4
2020-01-07opendkim: Fix buildsborrill2-5/+14
Actually fix == bashism as referred to in patch's comment
2020-01-07Add and enable qsmtp.schmonz1-1/+2
2020-01-07Initial import of Qsmtp, a drop-in replacement for qmail-smtpd andschmonz5-0/+308
qmail-remote. The benefits: - Fast and small: written in plain C - IPv6 clean - Many antispam modules included, e.g. SPF, IP blacklists, domain blacklists, badmailfrom, helo filtering - Easy API to add your own spamfilters - For vpopmail hosts: does not create bounces for non-existing users - Tested: includes unit tests, nightly checks available at <http://my.cdash.org/index.php?project=Qsmtp>
2020-01-06rspamd: Create rundir via SMF method script.jperkin3-2/+18
Fixes first run after reboot. Bump PKGREVISION.
2020-01-05thunderbird60: Fix build with rust-1.40.0, bump PKGREVISIONryoon4-2/+71
2020-01-04thunderbird-enigmail: update to 2.1.5.wiz2-8/+8
Enigmail 2.1.5 Released 2019-12-31, works with Thunderbird 68 and Postbox 7. Notable Changes This is a maintenance release. Bugs fixed: Security issue: unsigned MIME parts displayed as signed Ensure that upgrading GnuPG 2.0.x to 2.2.x upgrade converts keyring format Make Enigmail Compatible with Protected-Headers spec, draft 2 See list of fixed defects for more fixed issues. Enigmail 2.1.4 Released 2019-12-12, works with Thunderbird 68 and Postbox 7. Notable Changes This is a maintenance release. Bugs fixed: Mixed classic/​pEp mode on startup if the pEp Engine is not fully operational Key Management menu bar unreadable on dark themes OpenPGP column re-appears after every startup "Attach my public key to message" option is not restored properly Better activity feedback in the "Create OpenPGP Key" window Automatic updating GnuPG does not work See list of fixed defects for more fixed issues.
2020-01-02fetchmailconf: update to 6.4.1 to match fetchmail and fix the bulk build.wiz1-3/+2
2020-01-01fetchmail: update to 6.4.1triaxx5-38/+14
upstream cheanges: ------------------ fetchmail-6.4.1 (released 2019-09-28, 27473 LoC): ## REGRESSION FIXES: * The bug fix Debian Bug#941129 was incomplete and caused + a regression in the default file locations, so that fetchmail was no longer able to find its configuration files in some situations. Reported by Cy Schubert. + a regression under _FORTIFY_SOURCE where PATH_MAX > minimal _POSIX_PATH_MAX. -------------------------------------------------------------------------------- fetchmail 6.4.0 (released 2019-09-27, 27429 LoC): # NOTE THAT FETCHMAIL IS NO LONGER PUBLISHED THROUGH IBIBLIO. * They have stopped accepting submissions and consider themselves an archive. ## SECURITY FIXES THAT AFFECT BEHAVIOUR AND MAY REQUIRE RECONFIGURATION * Fetchmail no longer supports SSLv2. * Fetchmail no longer attempts to negotiate SSLv3 by default, even with --sslproto ssl23. Fetchmail can now use SSLv3, or TLSv1.1 or a newer TLS version, with STLS/STARTTLS (it would previously force TLSv1.0 with STARTTLS). If the OpenSSL version used at build and run-time supports these versions, --sslproto ssl3 and --sslproto ssl3+ can be used to re-enable SSLv3. Doing so is discouraged because the SSLv3 protocol is broken. Along the lines suggested - as patch - by Kurt Roeckx, Debian Bug #768843. While this change is supposed to be compatible with common configurations, users may have to and are advised to change all explicit --sslproto ssl2 (change to newer protocols required), --sslproto ssl3, --sslproto tls1 to --sslproto auto, so that they can benefit from TLSv1.1 and TLSv1.2 where supported by the server. The --sslproto option now understands the values auto, ssl3+, tls1+, tls1.1, tls1.1+, tls1.2, tls1.2+, tls1.3, tls1.3+ (case insensitively), see CHANGES below for details. * Fetchmail defaults to --sslcertck behaviour. A new option --nosslcertck to override this has been added, but may be removed in future fetchmail versions in favour of another configuration option that makes the insecurity in using this option clearer. ## SECURITY FIXES * Fetchmail prevents buffer overruns in GSSAPI authentication with user names beyond c. 6000 characters in length. Reported by Greg Hudson. ## CHANGED REQUIREMENTS * fetchmail 6.4.0 is written in C99 and requires a SUSv3 (Single Unix Specification v3, a superset of POSIX.1-2001 aka. IEEE Std 1003.1-2001 with XSI extension) compliant system. For now, a C89 compiler should also work if the system is SUSv3 compliant. In particular, older fetchmail versions had workaround for several functions standardized in the Single Unix Specification v3, these have been removed. The trio/ library has been removed from the distribution. ## CHANGES * fetchmail 6.3.X is unsupported. * fetchmail now configures OpenSSL support by default. * fetchmail now requires OpenSSL v1.0.2 or newer. * Fetchmail now supports --sslproto auto and --sslproto tls1+ (same as ssl23). * --sslproto tls1.1+, tls1.2+, and tls1.3+ are now supported for auto-negotiation with a minimum specified TLS protocol version, and --sslproto tls1.1, --sslproto tls1.2 and --sslproto tls1.3 to force the specified TLS protocol version. Note that tls1.3 requires OpenSSL v1.1.1 or newer. * Fetchmail now detects if the server hangs up prematurely during SSL_connect() and reports this condition as such, and not just as SSL connection failure. (OpenSSL 1.0.2 reported incompatible with pop3.live.com by Jerry Seibert). * A foreground fetchmail can now accept a few more options while another copy is running in the background. * fetchmail now handles POP3 --keep UID lists more efficiently, by using Rainer Weikusat's P-Tree implementation. This reduces the complexity for handling a large UIDL from O(n^2) to O(n log n) and becomes noticably faster with thousands of kept messages. (IMAP does not currently track UIDs and is unaffected.) At the same time, the UIDL emulation code for deficient servers has been removed. It never worked really well. Servers that do not implement the optional UIDL command only work with --fetchall option set, which in itself is incompatible with the --keep option (it would cause message duplication). * fetchmail, when setting up TLS connections, now uses SSL_set_tlsext_host_name() to set up the SNI (Server Name Indication). Some servers (for instance googlemail) require SNI when using newer SSL protocols. * Fetchmail now sets the expected hostname through OpenSSL 1.0.2's new X509_VERIFY_PARAM_set1_host() function to enable OpenSSL's native certificate verification features. * fetchmail will drop the connection when fetching with IMAP and receiving an unexpected untagged "* BYE" response, to work around certain faulty servers. * The FETCHMAIL_POP3_FORCE_RETR environment variable is now documented, it forces fetchmail, when talking POP3, to always use the RETR command, even if it would otherwise use the TOP command. * Fetchmail's configure stage will try to query pkg-config or pkgconf for libssl and libcrypto, in case other system use .pc files to document specific library dependencies. (contributed by Fabrice Fontaine, GitLab merge request !14.) * The gethostbyname() API calls and compatibility functions have been removed. * These translations are shipped but not installed by default because they have less than 500 translated messages out of 714: el fi gl pt_BR sk tr -> Greek, Finnish, Galician, Brazilian Portuguese, Slovak, Turkish. * Fetchmail now refuses delivery if the MDA option contains single-quoted expansions. ## FIXES * Fix a typo in the FAQ. Submitted by David Lawyer, Debian Bug#706776. * Do not translate header tags such as "Subject:". Reported by Gonzalo Pérez de Olaguer Córdoba, Debian Bug#744907. * Convert most links from berlios.de to sourceforge.net. * Report error to stderr, and exit, if --idle is combined with multiple accounts. * Point to --idle from GENERAL OPERATION to clarify --idle and multiple mailboxes do not mix. In response to Jeremy Chadwick's trouble 2014-11-19, fetchmail-users mailing list. * Fix SSL-enabled build on systems that do not declare SSLv3_client_method(), or that #define OPENSSL_NO_SSL3 inside #include <openssl/ssl.h> Related to Debian Bug#775255. Fixes Debian Bug #804604. * Version report lists -SSLv3 on SSL-enabled no-ssl3 builds. * Fetchmail no longer adds a NUL byte to the username in GSSAPI authentication. This was reported to break Kerberos-based authentication with Microsoft Exchange 2013 by Greg Hudson. * Set umask properly before writing the .fetchids file, to avoid failing the security check on the next run. Reported by Fabian Raab, Fixes Debian Bug#831611. * When forwarding by LMTP, also check antispam response code when collecting the responses after the CR LF . CR LF sequence at the end of the DATA phase. (Contributed by Evil.2000, GitLab merge request !12.) * fetchmail will not try other protocols after a socket error. This avoids mismatches of how different prococols see messages as "seen" and re-fetches of known mail. (Fix contributed by Lauri Nurmi, GitLab Merge Request !10.) * fetchmail no longer reports "System error during SSL_connect(): Success." Fixes Debian Bug#928916, reported by Paul Kimoto. * fetchmailconf would ignore Edit or Delete actions on the first (topmost) item in a list (no matter if server list, user list, ...). * The mimedecode feature now properly detects multipart/mixed-type matches, so that quoted-printable-encoded multipart messages can get decoded. (Regression in 5.0.0 on 1999-03-27, as a side effect of a PGP-mimedecode fix attributed to Henrik Storner.) * FETCHMAILHOME can now safely be a relative path, which will be qualified through realpath(). Previously, it had to be absolute in daemon mode. Reported by Alex Andreotti, Debian Bug#941129.
2019-12-29msmtp: Update to 1.8.7leot2-8/+7
Changes: 1.8.7 ----- - Extend `from' command that sets the envelope from address: the patterns %U, %H, %C, %M are now replaced with user name, host name, canonicalized host name, and the contents of /etc/mailname. This is useful for system-wide installations and is more powerful than the old auto_from and maildomain commands, which are now deprecated (but still supported, of course). 1.8.6 ----- - Aliases are now expanded recursively - Minor bug fixes
2019-12-29Update to 1.3.1ryoon4-66/+9
* Enable SASL support Changelog: This is a long overdue maintenance release: - SSL now uses SNI, which for example GMail requires - fixed fallbacks for missing UIDPLUS extension (with e.g. DavMail) - fixed UIDVALIDITY recovery with really long Message-id headers - fixed GSSAPI authentication with Kerberos - fixed support for IMAP servers which do not sort search results (e.g., poczta.o2.pl) - fixed CopyArrivalDate on platforms without glibc - fixed useless SASL warnings with certain plugins - the perl 5.14 requirement is now made explicit - improved OpenBSD support - fixed a bunch of compiler warnings
2019-12-29Update to 68.3.1ryoon2-223/+223
* Sync with mail/thunderbird-68.3.1
2019-12-29Update to 68.3.1ryoon3-9/+10
Changelog: 68.3.1 Changes changed In dark theme unread messages no longer shown in blue to distinguish from tagged messages changed Account setup is now using client side DNS MX lookup instead of relying on a server. Fixes fixed Searching LDAP address book crashed in some circumstances fixed Message navigation with backward and forward buttons did not work in some circumstances fixed WebExtension toolbar icons were displayed too small fixed Calendar: Tasks due today were not listed in bold fixed Calendar: Last day of long-running events was not shown 68.3.0 What’s New new Message display toolbar action WebExtension API new Navigation buttons are now available in content tabs, for example those opened via an add-on search Changes changed "New email" icon in Windows systray changed from in-tray with arrow to envelope Fixes fixed Icons of attachments in the attachment pane of the Write window not always correct fixed Toolbar buttons of add-ons in the menubar not shown after startup fixed LDAP lookup not working when SSL was enabled. LDAP search not working when "All Address Books" was selected. fixed Scam link confirmation panel not working fixed In Write window, the Link Properties dialog wasn't showing named anchors in context menu fixed Calendar: Start-up failed if the application menu is not on the calendar toolbars fixed Chat: Account reordering via drag-and-drop not working on Instant messaging status dialog (Show Accounts) fixed Various security fixes Security fixes: #CVE-2019-17008: Use-after-free in worker destruction #CVE-2019-13722: Stack corruption due to incorrect number of arguments in WebRTC code #CVE-2019-11745: Out of bounds write in NSS when encrypting with a block cipher #CVE-2019-17009: Updater temporary files accessible to unprivileged processes #CVE-2019-17010: Use-after-free when performing device orientation checks #CVE-2019-17005: Buffer overflow in plain text serializer #CVE-2019-17011: Use-after-free when retrieving a document in antitracking #CVE-2019-17012: Memory safety bugs fixed in Firefox 71, Firefox ESR 68.3, and Thunderbird 68.3
2019-12-28Update to 60.9.1ryoon2-223/+223
* Sync with mail/thunderbird60-60.9.1
2019-12-28Update to 60.9.1ryoon7-7/+25204
* Fix build with rust-1.39.0 Changelog: 60.9.1: Fixed Problem with Google authentication (OAuth2) 60.9.0: New Offer to configure Exchange accounts for Office365. A third-party add-on is required for this account type. IMAP still exists as alternative. Security fixes #CVE-2019-11739: Covert Content Attack on S/MIME encryption using a crafted multipart/alternative message #CVE-2019-11746: Use-after-free while manipulating video #CVE-2019-11744: XSS by breaking out of title and textarea elements using innerHTML #CVE-2019-11742: Same-origin policy violation with SVG filters and canvas to steal cross-origin images #CVE-2019-11752: Use-after-free while extracting a key value in IndexedDB #CVE-2019-11743: Cross-origin access to unload event attributes #CVE-2019-11740: Memory safety bugs fixed in Firefox 69, Firefox ESR 68.1, Firefox ESR 60.9, Thunderbird 68.1, and Thunderbird 60.9
2019-12-19mutt: Update to version 1.13.2tron2-7/+7
Changes since version 1.13.1: ! Bug fix release. Update during freeze approved by gdt@
2019-12-18neomutt: update to 20191129.wiz2-7/+7
Leaf package. 2019-11-29 Richard Russon <rich@flatcap.org> * Features - Add raw mailsize expando (%cr) * Bug Fixes - Avoid double question marks in bounce confirmation msg - Fix bounce confirmation - fix new-mail flags and behaviour - fix: browser <descend-directory> - fix ssl crash - fix move to trash - fix flickering - Do not check hidden mailboxes for new mail - Fix new_mail_command notifications - fix crash in examine_mailboxes() - fix crash in mutt_sort_threads() - fix: crash after sending - Fix crash in tunnel's conn_close - fix fcc for deep dirs - imap: fix crash when new mail arrives - fix colour 'quoted9' - quieten messages on exit - fix: crash after failed mbox_check - browser: default to a file/dir view when attaching a file * Changed Config - Change $write_bcc to default off * Translations - 100% Portuguese (Brazil) - 92% Polish * Docs - Add a bit more documentation about sending - Clarify $write_bcc documentation. - Update documentation for raw size expando - docbook: set generate.consistent.ids to make generated html reproducible * Build - fix build/tests for 32-bit arches - tests: fix test that would fail soon - tests: fix context for failing idna tests
2019-12-18Deal with stricter constness of OpenSSL 1.1.joerg2-1/+24
2019-12-17mutt: Update to version 1.13.1tron2-7/+7
Changes since version 1.13.0: ! Bug fix release. + $sidebar_relative_shortpath_indent, default unset, enables the indentation and shortpath behavior introduced in 1.13.0. + $sidebar_use_mailbox_shortcuts, default unset, displays standard mailbox shortcuts, '~' and '=' in the sidebar. When unset, the sidebar will remove a $folder prefix but won't display mailbox shortcuts.
2019-12-13mail/dovecot2: update to 2.3.9.2taca2-7/+7
Update doveot2 to 2.3.9.2, previous fix for CVE-2019-19722 was partial fix. v2.3.9.2 2019-12-13 Aki Tuomi <aki.tuomi@open-xchange.com> - Mails with empty From/To headers can also cause crash in push notification drivers.
2019-12-13dovecot2: updated to 2.3.9.1adam2-8/+8
2.3.9.1: * CVE-2019-19722: Mails with group addresses in From or To fields caused crash in push notification drivers.
2019-12-13Revbump all Go packages after Go 1.12.14 update.bsiegert1-2/+2
2019-12-09exim: updated to 4.93adam7-44/+44
Exim version 4.93 ----------------- JH/01 OpenSSL: With debug enabled output keying information sufficient, server side, to decode a TLS 1.3 packet capture. JH/02 OpenSSL: Suppress the sending of (stateful) TLS1.3 session tickets. Previously the default library behaviour applied, sending two, each in its own TCP segment. JH/03 Debug output for ACL now gives the config file name and line number for each verb. JH/04 The default received_header_text now uses the RFC 8314 tls cipher clause. JH/05 DKIM: ensure that dkim_domain elements are lowercased before use. JH/06 Fix buggy handling of autoreply bounce_return_size_limit, and a possible buffer overrun for (non-chunking) other transports. JH/07 GnuTLS: Our use of late (post-handshake) certificate verification, under TLS1.3, means that a server rejecting a client certificate is not visible to the client until the first read of encrypted data (typically the response to EHLO). Add detection for that case and treat it as a failed TLS connection attempt, so that the normal retry-in-clear can work (if suitably configured). JB/01 Bug 2375: fix expansions of 822 addresses having comments in local-part and/or domain. Found and fixed by Jason Betts. JH/08 Add hardening against SRV & TLSA lookups the hit CNAMEs (a nonvalid configuration). If a CNAME target was not a wellformed name pattern, a crash could result. JH/09 Logging: Fix initial listening-on line for multiple ports for an IP when the OS reports them interleaved with other addresses. JH/10 OpenSSL: Fix aggregation of messages. Previously, when PIPELINING was used both for input and for a verify callout, both encrypted, SMTP responses being sent by the server could be lost. This resulted in dropped connections and sometimes bounces generated by a peer sending to this system. JH/11 Harden plaintext authenticator against a badly misconfigured client-send string. Previously it was possible to cause undefined behaviour in a library routine (usually a crash). Found by "zerons". JH/12 Bug 2384: fix "-bP smtp_receive_timeout". Previously it returned no output. JH/13 Bug 2386: Fix builds with Dane under LibreSSL 2.9.0 onward. Some old API was removed, so update to use the newer ones. JH/14 Bug 1891: Close the log file if receiving a non-smtp message, without any timeout set, is taking a long time. Previously we would hang on to a rotated logfile "forever" if the input was arriving with long gaps (a previous attempt to fix addressed lack, for a long time, of initial input). HS/01 Bug 2390: Use message_id for tempfile creation to avoid races in a shared (NFS) environment. The length of the tempfile name is now 4 + 16 ("hdr.$message_exim_id") which might break on file systems which restrict the file name length to lower values. (It was "hdr.$pid".) HS/02 Bug 2390: Use message_id for tempfile creation to avoid races in a shared (NFS) environment. HS/03 Bug 2392: exigrep does case sensitive *option* processing (as it did for all versions <4.90). Notably -M, -m, --invert, -I may be affected. JH/15 Use unsigned when creating bitmasks in macros, to avoid build errors on some platforms for bit 31. JH/16 GnuTLS: rework ciphersuite strings under recent library versions. Thanks to changes apparently associated with TLS1.3 handling some of the APIs previously used were either nonfunctional or inappropriate. Strings like TLS1.3:ECDHE_SECP256R1__RSA_PSS_RSAE_SHA256__AES_256_GCM__AEAD:256 and TLS1.2:ECDHE_SECP256R1__RSA_SHA256__AES_128_CBC__SHA256:128 replace the previous TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256 . This affects log line X= elements, the $tls_{in,out}_cipher variables, and the use of specific cipher names in the encrypted= ACL condition. JH/17 OpenSSL: the default openssl_options now disables ssl_v3. JH/18 GnuTLS: fix $tls_out_ocsp under hosts_request_ocsp. Previously the verification result was not updated unless hosts_require_ocsp applied. JH/19 Bug 2398: fix listing of a named-queue. Previously, even with the option queue_list_requires_admin set to false, non-admin users were denied the facility. JH/20 Bug 2389: fix server advertising of usable certificates, under GnuTLS in directory-of-certs mode. Previously they were advertised despite the documentation. JH/21 The smtp transport option "hosts_noproxy_tls" is now unset by default. A single TCP connection by a client will now hold a TLS connection open for multiple message deliveries, by default. Previoud the default was to not do so. JH/22 The smtp transport option "hosts_try_dane" now enables all hosts by default. If built with the facility, DANE will be used. The facility SUPPORT_DANE is now enabled in the prototype build Makefile "EDITME". JH/23 The build default is now for TLS to be included; the SUPPORT_TLS define is replaced with DISABLE_TLS. Either USE_GNUTLS or (the new) USE_OPENSSL must be defined and you must still, unless you define DISABLE_TLS, manage the the include-dir and library-file requirements that go with that choice. Non-TLS builds are still supported. JH/24 Fix duplicated logging of peer name/address, on a transport connection- reject under TFO. JH/25 The smtp transport option "hosts_try_fastopen" now enables all hosts by default. If the platform supports and has the facility enabled, it will be requested on all coneections. JH/26 The PIPE_CONNECT facility is promoted from experimental status and is now controlled by the build-time option SUPPORT_PIPE_CONNECT. PP/01 Unbreak heimdal_gssapi, broken in 4.92. JH/27 Bug 2404: Use the main-section configuration option "dsn_from" for success-DSN messages. Previously the From: header was always the default one for these; the option was ignored. JH/28 Fix the timeout on smtp response to apply to the whole response. Previously it was reset for every read, so a teergrubing peer sending single bytes within the time limit could extend the connection for a long time. Credit to Qualsys Security Advisory Team for the discovery. JH/29 Fix DSN Final-Recipient: field. Previously it was the post-routing delivery address, which leaked information of the results of local forwarding. Change to the original envelope recipient address, per standards. JH/30 Bug 2411: Fix DSN generation when RFC 3461 failure notification is requested. Previously not bounce was generated and a log entry of error ignored was made. JH/31 Avoid re-expansion in ${sort } expansion. (CVE-2019-13917) JH/32 Introduce a general tainting mechanism for values read from the input channel, and values derived from them. Refuse to expand any tainted values, to catch one form of exploit. JH/33 Bug 2413: Fix dkim_strict option. Previously the expansion result was unused and the unexpanded text used for the test. Found and fixed by Ruben Jenster. JH/34 Fix crash after TLS shutdown. When the TCP/SMTP channel was left open, an attempt to use a TLS library read routine dereffed a nul pointer, causing a segfault. JH/35 Bug 2409: filter out-of-spec chars from callout response before using them in our smtp response. JH/36 Have the general router option retry_use_local_part default to true when any of the restrictive preconditions are set (to anything). Previously it was only for check_local user. The change removes one item of manual configuration which is required for proper retries when a remote router handles a subset of addresses for a domain. JH/37 Appendfile: when evaluating quota use (non-quota_size_regex) take the file link count into consideration. HS/04 Fix handling of very log lines in -H files. If a -<key> <value> line caused the extension of big_buffer, the following lines were ignored. JH/38 Bug 1395: Teach the DNS negative-cache about TTL value from the SOA in accordance with RFC 2308. Previously there was no expiry, so a longlived receive process (eg. due to ACL delays) versus a short SOA value could surprise. HS/05 Handle trailing backslash gracefully. (CVE-2019-15846) JH/39 Promote DMARC support to mainline. JH/40 Bug 2452: Add a References: header to DSNs. JH/41 With GnuTLS 3.6.0 (and later) do not attempt to manage Diffie-Hellman parameters. The relevant library call is documented as "Deprecated: This function is unnecessary and discouraged on GnuTLS 3.6.0 or later. Since 3.6.0, DH parameters are negotiated following RFC7919." HS/06 Change the default of dnssec_request_domains to "*" JH/42 Bug 2545: Fix CHUNKING for all RCPT commands rejected. Previously we carried on and emitted a BDAT command, even when PIPELINING was not active. JH/43 Bug 2465: Fix taint-handling in dsearch lookup. Previously a nontainted buffer was used for the filename, resulting in a trap when tainted arguments (eg. $domain) were used. JH/44 With OpenSSL 1.1.1 (onwards) disable renegotiation for TLS1.2 and below; recommended to avoid a possible server-load attack. The feature can be re-enabled via the openssl_options main cofiguration option. JH/45 local_scan API: documented the current smtp_printf() call. This changed for version 4.90 - adding a "more data" boolean to the arguments. Bumped the ABI version number also, this having been missed previously; release versions 4.90 to 4.92.3 inclusive were effectively broken in respect of usage of smtp_printf() by either local_scan code or libraries accessed via the ${dlfunc } expansion item. Both will need coding adjustment for any calls to smtp_printf() to match the new function signature; a FALSE value for the new argument is always safe. JH/46 FreeBSD: fix use of the sendfile() syscall. The shim was not updating the file-offset (which the Linux syscall does, and exim expects); this resulted in an indefinite loop. JH/47 ARC: fix crash in signing, triggered when a configuration error failed to do ARC verification. The Authentication-Results: header line added by the configuration then had no ARC item.
2019-12-09Bump PKGREVISION by changing of default PHP version.taca2-4/+4
2019-12-09postfix: update to 3.4.8triaxx2-7/+7
upstream changes: ----------------- Fix for an Exim interoperability problem when postscreen after-220 checks are enabled. Bug introduced in Postfix 3.4: the code that detected "PIPELINING after BDAT" looked at the wrong variable. The warning now says "BDAT without valid RCPT", and the error is no longer treated as a command PIPELINING error, thus allowing mail to be delivered. Meanwhile, Exim has been fixed to stop sending BDAT commands when postscreen rejects all RCPT commands. Usability bug, introduced in Postfix 3.4: the parser for key/certificate chain files rejected inputs that contain an EC PARAMETERS object. While this is technically correct (the documentation says what types are allowed) this is surprising behavior because the legacy cert/key parameters will accept such inputs. For now, the parser skips object types that it does not know about for usability, and logs a warning because ignoring inputs is not kosher. Bug introduced in Postfix 2.8: don't gratuitously enable all after-220 tests when only one such test is enabled. This made selective tests impossible with 'good' clients. This will be fixed in older Postfix versions at some later time.
2019-12-08rspamd: update to 2.2triaxx5-30/+21
upstream changes: ----------------- [Conf] Antivirus: Fix the default config [Feature] Add verdict library in lua [Feature] Allow exception when choosing upstream [Feature] Allow to disable symbols from the metric config [Feature] Allow to limit maps per specific worker [Feature] Always validate Rspamd protocol output [Feature] Antivirus: Add preliminary virustotal support [Feature] Clickhouse: Rework Clickhouse collection logic [Feature] Improve base64 usage [Feature] Shutdown timeout is now associated with task timeout [Fix] #3129 Multiple classifiers on redis working incorrectly [Fix] Allow real upstreams configuration [Fix] Another try to fix slow callbacks and timers [Fix] Check results of write message as SSL can bork them [Fix] Clickhouse: Avoid potential races in collection [Fix] Clickhouse: Fix periodic script [Fix] Fail DNS upstream on each retransmit attempt [Fix] Fix consistent hashing when upstreams are marked inactive [Fix] Fix issues found [Fix] Fix off-by-one in retries for the proxy [Fix] Fix termination [Fix] Fix upstreams exclusion logic [Fix] Fix utf8 validation for symbols options and empty strings [Fix] Oops, fix maps reload [Fix] Rbl: Allow utf8 lookups for IDN domains [Fix] Sigh, another try to fix brain-damaged openssl [Project] Add fast utf8 validation library [Project] Use own utf8 validation instead of glib [Rework] Another phase of finish actions rework [Rework] Further cmake system rework [Rework] Further isolation of the controller’s functions [Rework] Make cmake structure more modular [Rework] Move cmake modules to a dedicated path [Rework] Replace controller functions by any scanner worker if needed [Rework] Rework final scripts logic [Rework] Rewrite rspamd_str_make_utf_valid function
2019-12-06rspamd: Disable inotify on SunOS, assumes Linux.jperkin1-1/+4