| Commit message (Collapse) | Author | Age | Files | Lines | |
|---|---|---|---|---|---|
| * | sendmail: remove -bs and -bp | manuel | 2020-08-25 | 1 | -3/+3 |
| | | |||||
| * | Revert "Rewrite 554 smtp code for web.de/gmx.net/1&1 servers" | manuel | 2020-06-02 | 1 | -17/+1 |
| | | | | | This reverts commit f2ef25deb1aa356d41cdd3f6e46d9a68c48bfce0. | ||||
| * | Make sure to limit max alloc size | manuel | 2020-05-19 | 1 | -0/+5 |
| | | | | | see https://www.qualys.com/2020/05/19/cve-2005-1513/remote-code-execution-qmail.txt | ||||
| * | Rewrite 554 smtp code for web.de/gmx.net/1&1 servers | manuel | 2019-12-02 | 1 | -1/+17 |
| | | |||||
| * | increase recipients limit to 300 | manuel | 2019-06-12 | 1 | -1/+1 |
| | | |||||
| * | SMTP: limit max errors to 20 | manuel | 2019-06-11 | 1 | -24/+40 |
| | | |||||
| * | max recipients: make error message more consistent | manuel | 2019-06-11 | 1 | -1/+1 |
| | | |||||
| * | Add max recipients limit | manuel | 2019-06-11 | 1 | -1/+10 |
| | | |||||
| * | Fix compile warnings... | Manuel Mausz | 2019-06-11 | 94 | -124/+200 |
| | | |||||
| * | Only do deferrals in case qmail-remote does not spawn | manuel | 2019-05-28 | 1 | -1/+2 |
| | | |||||
| * | Fix CVE-2011-1431 | manuel | 2019-04-10 | 1 | -1/+4 |
| | | |||||
| * | Remove client certificate left overs | manuel | 2019-02-01 | 2 | -24/+0 |
| | | |||||
| * | Disable TLS 1.0 only for smtp auth/submission | manuel | 2018-12-26 | 1 | -4/+7 |
| | | |||||
| * | Disable TLS 1.0 | manuel | 2018-12-04 | 1 | -1/+1 |
| | | |||||
| * | plus addressing improvements | manuel | 2018-10-15 | 2 | -23/+34 |
| | | | | | | * first `+` splits local part from sub-address * prioritize plus addressing over domain wildcards | ||||
| * | Enable PRIORITIZE_CHACHA per default | manuel | 2018-09-17 | 3 | -3/+6 |
| | | |||||
| * | More OpenSSL 1.1 compatibility | manuel | 2018-06-28 | 1 | -0/+4 |
| | | |||||
| * | OpenSSL 1.1 compatibility | Manuel Mausz | 2018-06-27 | 8 | -137/+125 |
| | | | | | | | | | | | | | | | This adds compatibility for OpenSSL 1.1 Since renegotiation is removed from TLS 1.3 we also removed support for authentication via client certificates (control/tlsclients). In general this is still supported by TLS 1.3 however I'm just lazy and we don't need this feature anyway. This also adds optional support for OpenSSL configuration commands for qmail-smtpd and qmail-remote. Commands are loaded from control/opensslconf. For a list of supported commands see https://www.openssl.org/docs/man1.0.2/ssl/SSL_CONF_cmd.html#SUPPORTED-CONFIGURATION-FILE-COMMANDS | ||||
| * | work around a libval bug | manuel | 2018-04-16 | 1 | -0/+3 |
| | | |||||
| * | Disable SSLv3 and enable prefer server ciphers | manuel | 2018-04-16 | 2 | -2/+3 |
| | | |||||
| * | Initialize session early for logging | manuel | 2018-04-16 | 1 | -0/+1 |
| | | |||||
| * | ignore AUTH parameters in MAIL FROM | manuel | 2018-04-04 | 1 | -1/+2 |
| | | |||||
| * | add X-UD-Smtp-Session and remove ip from authed clients | manuel | 2018-04-04 | 3 | -2/+87 |
| | | |||||
| * | realrcptto: drop default QMAILQUEUE for catch-all | manuel | 2018-02-26 | 1 | -8/+0 |
| | | |||||
| * | realrcptto: extract username from mailbox forwards | manuel | 2017-12-06 | 1 | -0/+5 |
| | | |||||
| * | realrcptto: stop resolving after dovecot-rda has been found | manuel | 2017-12-06 | 1 | -4/+12 |
| | | |||||
| * | SMTPUTF8: substract null termination | manuel | 2017-10-10 | 1 | -0/+1 |
| | | | | | | qmail-remote assumes host is not null terminated. IDN requires null termination so subtract the trailing NULL after appending. | ||||
| * | SMTPUTF8: convert UTF-8 domains to IDNA | manuel | 2017-08-18 | 2 | -2/+31 |
| | | | | | | | | | | | | | | This isn't entirely correct according to RFC 6531 as it's better to not convert at all. However this would require we additionally add the UTF-8 form to qmails local recipient users/domains. Plus our SMTPUTF8 implementation doesn't convert outgoing UTF-8 mails if receiving MTA doesn't support SMTPUTF8. So mail forwarding might generate a bounce the user very likely doesn't understand. As MTAs who support SMTPUTF8 most likely also support the IDNA form, always converting is probably a good trade-off. | ||||
| * | add support for SMTPUTF8 | manuel | 2017-08-17 | 6 | -13/+126 |
| | | |||||
| * | Implement plus addressing for virtualdomains | manuel | 2017-08-16 | 2 | -1/+43 |
| | | |||||
| * | realrcptto: extract username from dovecot-rda calls | manuel | 2017-08-16 | 1 | -1/+20 |
| | | |||||
| * | make qmail support EC keys | manuel | 2016-08-07 | 2 | -3/+3 |
| | | |||||
| * | implement tls before auth as environment variable | manuel | 2016-03-21 | 1 | -8/+10 |
| | | |||||
| * | don't announce SMTP AUTH commands if not available | manuel | 2016-03-21 | 1 | -7/+10 |
| | | |||||
| * | disable SSLv2 | manuel | 2016-03-01 | 2 | -0/+2 |
| | | |||||
| * | [PATCH] qmail queue custom error patch | manuel | 2015-07-27 | 2 | -1/+26 |
| | | | | | see google qmail-queue-custom-error-v2.patch | ||||
| * | update DANE support to libval 2.1 (+fixes) | manuel | 2015-07-24 | 1 | -20/+35 |
| | | |||||
| * | fix missing check for invalid dane status | manuel | 2015-07-06 | 1 | -13/+14 |
| | | | | | | libval returns VAL_DANE_NOERROR if domain is insecure and no TLSA RR exists. we should stop all further dane handling in this case | ||||
| * | add SMTP DANE support | manuel | 2015-07-04 | 3 | -63/+121 |
| | | |||||
| * | add gitignore | manuel | 2015-07-04 | 1 | -0/+405 |
| | | |||||
| * | opportunistic TLS | manuel | 2015-06-30 | 3 | -8/+50 |
| | | | | | When the TLS handshake fails, retry delivery with TLS disabled | ||||
| * | add support for ECDH as well as custom ec+dh params in certificate | manuel | 2015-06-23 | 2 | -6/+71 |
| | | |||||
| * | Use DH parameters from OpenSSL and remove support for ephemeral RSA | manuel | 2015-06-22 | 8 | -101/+66 |
| | | | | | This adds support for DH parameters from 1024 to 8192 bits. | ||||
| * | Treat ECONNREFUSED the same as ETIMEDOUT | manuel | 2014-05-20 | 3 | -1/+9 |
| | | | | | | | | | After an SMTP connection attempt times out, qmail-remote records the relevant IP address. If the same address fails again (after at least two minutes with no intervening successful connections), qmail-remote assumes that further attempts will fail for at least another hour. | ||||
| * | Remove qmail-remote workaround that Dan Bernstein added on 1996-10-03... | manuel | 2014-05-20 | 1 | -1/+1 |
| | | | | | | | ...to work around a bug in BIND versions earlier than version 4.9.4 We don't use the code any more but it does no harm. | ||||
| * | Increase memory buffer from 256 to 8k | manuel | 2014-05-20 | 1 | -2/+2 |
| | | | | | | | | | This patch increases the size of the memory buffer that qmail uses when querying the system for a list of all local IP addresses. This mailing list message describes the problem and includes the patch file. see http://www.mail-archive.com/qmail@id.wustl.edu/msg20935.html | ||||
| * | Fix qmail-remote to handle multiple MX records correctly as in rfc2821 | manuel | 2014-05-20 | 1 | -2/+3 |
| | | | | | | | | | This patch changes qmail-remote to skip over MX servers that greet with codes 400 to 499 and to bounce mail when any MX server that qmail tries greets with a code 500 to 599. see http://www-dt.e-technik.uni-dortmund.de/~ma/qmail/patch-qmail-1.03-rfc2821.diff | ||||
| * | get rid of DNS ANY query | manuel | 2014-02-18 | 1 | -24/+4 |
| | | | | | | | | | UltraDNS started blocking UDP-ANY queries so this is a problem. This will disable domain canonicalization of the envelope address of outgoing messages. This is as specified by RFC 1123 section 5.2.2. However this requirement is obsolete and modern MTAs have disabled it too. | ||||
| * | export TLS-Session to environment | manuel | 2014-02-14 | 1 | -0/+1 |
| | | |||||
| * | replace \r\n with \n in sendmail wrapper | manuel | 2014-01-30 | 2 | -8/+60 |
| | | |||||
