summaryrefslogtreecommitdiff
path: root/doc/doc-txt/NewStuff
AgeCommit message (Collapse)Author
2013-10-22Bug 1400: Fix GnuTLS PKCS11 issuesTodd Lyons
Can disable PKCS11 in Makefile with AVOID_GNUTLS_PKCS11 build flag. Rename gnutls_enable_pkcs11 option to gnutls_allow_auto_pkcs11. Update Changelog
2013-10-03Mention Redis lookup in NewStuffTodd Lyons
2013-09-30Added documentation of features, acknowledgementsTodd Lyons
2013-09-27Document hexquote & udpsend in NewStuff/ChangeLogPhil Pennock
Tony documented his new features in 7a5698fa; this change simply adds them to the list of things that have changed.
2013-09-24Additions to the NewStuff summary fileTodd Lyons
2013-09-01GnuTLS website movesPhil Pennock
2013-05-20Support AUTH for verify-callout and cutthrough-delivery.Jeremy Harris
Refactored smtp transport to pull out AUTH-related routines so they could be also called from the verify code. Bugs 321, 823.
2013-04-01Clean & integrate force_command.Phil Pennock
Work by J. Nick Koston, for cPanel, Inc.
2013-03-23Rename dns_use_dnssec to dns_dnssec_ok.Phil Pennock
This per Tony's suggestion; this makes it clearer that we are merely setting resolver flags, not performing validation ourselves. Well, clearer to those who understand DNSSEC. For everyone else, they'll still be dependent upon a forthcoming new chapter to the Specification.
2013-01-26PRDR support, if compiled with EXPERIMENTAL_PRDRJeremy Harris
2013-01-07Typo & nit fixes.Phil Pennock
JH has made more changes than he realised. New second JH/11 to JH/13.
2013-01-06Restrict lifetime of $router_name and $transport_name. Bug 308.Jeremy Harris
The router name is explicitly nulled after the router exits; the transport name is set only in the subprocess it runs in.
2012-12-25Add $router_name and $transport_name variables. Bug 308.Jeremy Harris
2012-11-06Add optional authenticated_sender info to A= elements of log lines; bug 1314.Jeremy Harris
New log_selector, smtp_mailauth, to enable.
2012-10-264.81 to 4.82Phil Pennock
Avoiding confusion of 4.80.1 vs 4.81, we went with skipping to 4.82 instead.
2012-10-06Doc fix: log field M8S=, in details sectionPhil Pennock
2012-10-06Logging-only patch for 8BITMIME; bug 817.Jeremy Harris
2012-10-04Add expansion variable $headers_added returning newline-sep list of headersJeremy Harris
added in ACLs. Bug 199.
2012-09-05minor nits.Phil Pennock
Some whitespace changes; 4.73 item 8: bool_lax{} is an expansion condition, not e. operator. Fix a comma to a period.
2012-09-05Add dnsdb lookup pseudo-type "a+". Addresses bug 1269.Jeremy Harris
2012-07-27Bug #198: Add remove_header ACL modifier.Todd Lyons
Used patch from Magnus Holmgren dated 2007-02-20. Added documentation. Added tests to detect proper operation.
2012-07-08Multiple headers_add/remove options per router/transport - fixes bug 337Jeremy Harris
2012-07-01Merge branch 'acl'Jeremy Harris
2012-06-27Acl expansions: tests and documentationJeremy Harris
2012-06-24Add gnutls_enable_pkcs11 option.Phil Pennock
GnuTLS 2.12.0 adds PKCS11 support using p11-kit and by default will autoload modules, which interoperates badly with GNOME keyring integration, configured via paths in environment variables, and Exim invoked by the user (eg, mailq) will then try to load the modules, fail and spew warnings from the module for a library loaded by a library. http://www.gnu.org/software/gnutls/manual/gnutls.html#Smart-cards-and-HSMs documents that to prevent this, explicitly init PKCS11 before calling gnutls_global_init(). So we do so, unless the admin sets the new option. Reported by Andreas Metzler, who confirmed that the added calls fixed the problem for him.
2012-06-12Use custom variables for ACL args, up to nine. Add an arg-count variable.Jeremy Harris
2012-06-12Add ${acl {name}{arg}} expansion item.Jeremy Harris
2012-06-12Change names to "listnamed" and "listcount".Jeremy Harris
2012-06-10Add ${list:name} and ${nlist:string} expansion operators.Jeremy Harris
2012-06-04Basic documentation for cutthrough.Jeremy Harris
2012-06-03Implement -G => "control=suppress_local_fixups"Phil Pennock
fixes bug 1117
2012-06-03DSCP: inbound via control = dscp/<value>Phil Pennock
2012-06-02DSCP: take numeric values too.Phil Pennock
Also fix doc claim that value is unexpanded. Also strip affix whitespace before numeric conversion and fixed string comparison.
2012-06-02DSCP: document; hex print; -bI:dscpPhil Pennock
2012-06-01DNSSEC babystep: dns_use_dnssec & $sender_host_dnssecPhil Pennock
2012-06-01tls_dh_min_bits smtp transport optionPhil Pennock
Could not find an API for use with OpenSSL, so GnuTLS only
2012-06-01Make -n combine with -bP to inhibit namesPhil Pennock
2012-06-01Add -bI:help and -bI:sievePhil Pennock
2012-05-28Merge openssl_disable_ssl2 branchexim-4_80_RC7Phil Pennock
2012-05-27For DH, use standard primes from RFCsPhil Pennock
2012-05-20Added tls_dh_max_bits & check tls_require_ciphers early.Phil Pennock
Janne Snabb tracked down the GnuTLS 2.12 vs NSS (Thunderbird) interop problems to a hard-coded limit of 2236 bits for DH in NSS while GnuTLS was suggesting 2432 bits as normal. Added new global option tls_dh_max_bits to clamp all DH values (client or server); unexpanded integer. Default value to 2236. Apply to both GnuTLS and OpenSSL (which requires tls_dh_params for this). Tired of debugging "SMTP fails TLS" error messages in mailing-lists caused by OpenSSL library/include clashes, and of finding out I typo'd in tls_require_ciphers only at the STARTTLS handshake. During readconf, fork/drop-privs/initialise-TLS-library. In that, if tls_require_ciphers is set, then validate it. The validation child will panic if it can't initialise or if tls_require_ciphers can't be parsed, else it exits 0. If the child exits anything other than 0, the main Exim process will exit.
2012-05-17Insert new JH/02 entry for the ACL clean-upPhil Pennock
2012-05-18Documentation update for bug 1172.root
2012-05-174.78 -> 4.80Phil Pennock
2012-05-17Guards for older releases of GnuTLS.Phil Pennock
gnutls_sec_param_to_pk_bits() and gnutls_rnd() are both new as of GnuTLS 2.12.x. Guard their usage on 2.12.0+ at compile time. In older versions, the vaguely_random_number() function just immediately calls the fallback, so it's the same as before this change (just one extra indirection in the code-path). Define a constant of 1024 for dh-bits for use in those old releases where GnuTLS won't tell us how many we should use. Change the on-disk filename for generated D-H params again, replacing the -normal with -<bitcount>, so that it's 1024 or whatever, and as the value changes, Exim will automatically start using the new value.
2012-05-17dnsdb SPF support, from Janne SnabbPhil Pennock
2012-05-16Merge branch 'experimental_ocsp'Phil Pennock
2012-05-16Overhaul of GnuTLS code.Phil Pennock
GnuTLS code re-done, using cut&paste for preservation where appropriate. Stop using deprecated APIs. Stop hard-coding lists of ciphers. Use gnutls_priority_init() instead. Turns tls_require_ciphers into a string in the GnuTLS case, not just OpenSSL case. Deprecate three gnutls_require_* options; now ignored but not errors. (No warnings yet). Added TLS SNI support. Made the channel binding integration theoretically actually work. I had it guarded by an #ifdef but the value used was an enum instead. Oops. Fixed. New code much more amenable to future work permitting TLS in callouts. DH param sizes now chosen by GnuTLS maintainers, we use "normal"; that's suddenly a lot more bits, so the saved filename was changed too. (GNUTLS_SEC_PARAM_NORMAL). DH param setup only done for servers now, since clients don't need/use it. GnuTLS a lot more robust to library negotiation using stuff we don't support, error-ing out quickly for other authentication systems (PGP, etc). Renamed pseudo_random_number() to vaguely_random_number() which makes the nature clearer. GnuTLS now provides a vaguely_random_number() implementation, to match OpenSSL. Pull in <inttypes.h> to make the recent arithmetic changes compile on MacOS. Nuke test 2011 which related to the gnutls_require_* options now non-functional.
2012-05-13Use defines in config.h for type & scanf-patterns for eval. Update docs.Jeremy Harris
2012-05-12pcre-config support.Phil Pennock
Remove a couple of stray references to PCRE_CFLAGS too (dating from when PCRE was bundled).