summaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
...
* Initialize session early for loggingmanuel2018-04-161-0/+1
|
* ignore AUTH parameters in MAIL FROMmanuel2018-04-041-1/+2
|
* add X-UD-Smtp-Session and remove ip from authed clientsmanuel2018-04-043-2/+87
|
* realrcptto: drop default QMAILQUEUE for catch-allmanuel2018-02-261-8/+0
|
* realrcptto: extract username from mailbox forwardsmanuel2017-12-061-0/+5
|
* realrcptto: stop resolving after dovecot-rda has been foundmanuel2017-12-061-4/+12
|
* SMTPUTF8: substract null terminationmanuel2017-10-101-0/+1
| | | | | qmail-remote assumes host is not null terminated. IDN requires null termination so subtract the trailing NULL after appending.
* SMTPUTF8: convert UTF-8 domains to IDNAmanuel2017-08-182-2/+31
| | | | | | | | | | | | | This isn't entirely correct according to RFC 6531 as it's better to not convert at all. However this would require we additionally add the UTF-8 form to qmails local recipient users/domains. Plus our SMTPUTF8 implementation doesn't convert outgoing UTF-8 mails if receiving MTA doesn't support SMTPUTF8. So mail forwarding might generate a bounce the user very likely doesn't understand. As MTAs who support SMTPUTF8 most likely also support the IDNA form, always converting is probably a good trade-off.
* add support for SMTPUTF8manuel2017-08-176-13/+126
|
* Implement plus addressing for virtualdomainsmanuel2017-08-162-1/+43
|
* realrcptto: extract username from dovecot-rda callsmanuel2017-08-161-1/+20
|
* make qmail support EC keysmanuel2016-08-072-3/+3
|
* implement tls before auth as environment variablemanuel2016-03-211-8/+10
|
* don't announce SMTP AUTH commands if not availablemanuel2016-03-211-7/+10
|
* disable SSLv2manuel2016-03-012-0/+2
|
* [PATCH] qmail queue custom error patchmanuel2015-07-272-1/+26
| | | | see google qmail-queue-custom-error-v2.patch
* update DANE support to libval 2.1 (+fixes)manuel2015-07-241-20/+35
|
* fix missing check for invalid dane statusmanuel2015-07-061-13/+14
| | | | | libval returns VAL_DANE_NOERROR if domain is insecure and no TLSA RR exists. we should stop all further dane handling in this case
* add SMTP DANE supportmanuel2015-07-043-63/+121
|
* add gitignoremanuel2015-07-041-0/+405
|
* opportunistic TLSmanuel2015-06-303-8/+50
| | | | When the TLS handshake fails, retry delivery with TLS disabled
* add support for ECDH as well as custom ec+dh params in certificatemanuel2015-06-232-6/+71
|
* Use DH parameters from OpenSSL and remove support for ephemeral RSAmanuel2015-06-228-101/+66
| | | | This adds support for DH parameters from 1024 to 8192 bits.
* Treat ECONNREFUSED the same as ETIMEDOUTmanuel2014-05-203-1/+9
| | | | | | | | After an SMTP connection attempt times out, qmail-remote records the relevant IP address. If the same address fails again (after at least two minutes with no intervening successful connections), qmail-remote assumes that further attempts will fail for at least another hour.
* Remove qmail-remote workaround that Dan Bernstein added on 1996-10-03...manuel2014-05-201-1/+1
| | | | | | ...to work around a bug in BIND versions earlier than version 4.9.4 We don't use the code any more but it does no harm.
* Increase memory buffer from 256 to 8kmanuel2014-05-201-2/+2
| | | | | | | | This patch increases the size of the memory buffer that qmail uses when querying the system for a list of all local IP addresses. This mailing list message describes the problem and includes the patch file. see http://www.mail-archive.com/qmail@id.wustl.edu/msg20935.html
* Fix qmail-remote to handle multiple MX records correctly as in rfc2821manuel2014-05-201-2/+3
| | | | | | | | This patch changes qmail-remote to skip over MX servers that greet with codes 400 to 499 and to bounce mail when any MX server that qmail tries greets with a code 500 to 599. see http://www-dt.e-technik.uni-dortmund.de/~ma/qmail/patch-qmail-1.03-rfc2821.diff
* get rid of DNS ANY querymanuel2014-02-181-24/+4
| | | | | | | | UltraDNS started blocking UDP-ANY queries so this is a problem. This will disable domain canonicalization of the envelope address of outgoing messages. This is as specified by RFC 1123 section 5.2.2. However this requirement is obsolete and modern MTAs have disabled it too.
* export TLS-Session to environmentmanuel2014-02-141-0/+1
|
* replace \r\n with \n in sendmail wrappermanuel2014-01-302-8/+60
|
* Replacing obsolete head/tail with POSIX compliant onesmanuel2014-01-271-2/+2
|
* add some sendmail parameters to qmail-injectmanuel2014-01-271-1/+6
| | | | | | -t, -Ffullname, -i, -o<whatever> additional support -f<> for null envelope mails
* make commands argument mandatorymanuel2014-01-275-25/+25
|
* [PATCH] protect qmail-smtpd from large received-linesmanuel2014-01-271-1/+1
| | | | | | | | | | | This patch corrects a small programming error in the blast() routine of qmail-smtpd.c. This is sometimes referred to as the "Guninski" bug, in reference to its discoverer. see * http://www.guninski.com/qmailcrash.html * http://thedjbway.b0llix.net/qmail/patches/qmail-1.03.smtpd-blast.patch
* doc: dot-qmail.9 updated as we've changed umaskmanuel2014-01-271-1/+1
|
* add support for -f<> to sendmail wrappermanuel2014-01-271-0/+1
|
* check for possible smtproutes in realrcpttomanuel2014-01-271-0/+8
|
* check for bad chars only for for non-relay sessionsmanuel2013-06-071-1/+1
| | | | | check introduced by ee944357ee374402f20eb1297a0b596f7ef4ea8d (qmail-smtpd-relay-reject.gentoo)
* fix compile errorsmanuel2013-02-066-6/+8
|
* add missing objects to TARGETSmanuel2013-02-061-0/+2
|
* fix obsolete POSIX head/tail callsmanuel2013-02-061-88/+88
|
* set configure/compiler parameters/flagsmanuel2013-02-063-3/+3
|
* disable CRAM_MD5 supportmanuel2013-02-061-1/+1
|
* [PATCH] rename mbox.5 + fix-manpagesmanuel2013-02-066-17/+11
|
* [PATCH] rewriteuser-0.1-qmail-smtpdmanuel2013-02-061-0/+42
|
* [PATCH] qmail-smtpd_auth-ssl-fix-sppmanuel2013-02-061-2/+11
|
* [PATCH] qmail-1.03-r17-greetdelaymanuel2013-02-061-0/+36
|
* [PATCH] realrcpttomanuel2013-02-054-3/+475
|
* fix compile (because of mfcheck patch)manuel2013-02-051-17/+18
|
* [PATCH] mfcheck: invalid-envelope-sender-logmanuel2013-02-051-1/+3
|