--- rpms/qpsmtpd/sme9/qpsmtpd.spec 2013/05/05 05:49:53 1.4 +++ rpms/qpsmtpd/sme9/qpsmtpd.spec 2016/01/07 18:08:47 1.21 @@ -1,8 +1,8 @@ -# $Id: qpsmtpd.spec,v 1.3 2013/04/25 07:21:05 burnat Exp $ +# $Id: qpsmtpd.spec,v 1.20 2016/01/06 16:16:41 vip-ire Exp $ Name: qpsmtpd Version: 0.84 -Release: 6%{?dist} +Release: 18%{?dist} Summary: qpsmtpd + qpsmtpd-apache + qpsmtpd-async License: MIT Group: System Environment/Daemons @@ -12,6 +12,7 @@ BuildRequires: perl >= 0:5.00503 BuildRequires: perl(ExtUtils::MakeMaker) BuildArch: noarch Requires: perl(Mail::Header), perl(Net::DNS) perl(Net::IP) +Requires: perl(IO::Socket::SSL) >= 1.70 Requires(pre): coreutils, shadow-utils, perl Source0: %{name}-%{version}.tar.gz @@ -68,6 +69,15 @@ Patch100: qpsmtpd-0.40-badrcptto_allowre Patch101: qpsmtpd-0.83-peer_hooks.patch Patch102: qpsmtpd-0.83-loginit.patch Patch103: qpsmtpd-forkserver-keepalive.patch +Patch104: qpsmtpd-0.84-accept-empty-email.patch +Patch105: qpsmtpd-0.84-fix_eq_operator.patch +Patch106: qpsmtpd-0.84-remove_denysoft_on_spf_softfail.patch +Patch107: qpsmtpd-0.84-notls_conf.patch +Patch108: qpsmtpd-0.84-disable_sslv3.patch +Patch109: qpsmtpd-0.84-make-dnsbl-more-whitelist_soft-aware.patch +Patch110: qpsmtpd-0.84-disable_tlsv1.patch +Patch111: qpsmtpd-0.84-deny_login_with_null.patch +Patch112: qpsmtpd-0.84-allow_tls_proto_from_config.patch %description qpsmtpd is a flexible smtpd daemon written in Perl. Apart from the core @@ -143,6 +153,15 @@ qpsmpd-async which uses it. %patch101 -p1 %patch102 -p1 %patch103 -p0 +%patch104 -p1 +%patch105 -p1 +%patch106 -p1 +%patch107 -p1 +%patch108 -p1 +%patch109 -p1 +%patch110 -p1 +%patch111 -p1 +%patch112 -p1 %build CFLAGS="$RPM_OPT_FLAGS" perl Makefile.PL INSTALLDIRS="vendor" PREFIX="%{buildroot}%{_prefix}" @@ -227,6 +246,49 @@ fi %pre %changelog +* Thu Jan 7 2016 Daniel Berteaud 0.84-18.sme +- Allow reading SSL_version from the tls_protocols config file (and turn + TLSv1 back on by default) [SME: 9162] + +* Wed Jan 6 2016 Daniel Berteaud 0.84-17.sme +- Correctly log login attempts with nulls in login name [SME: 9167] + +* Wed Jan 6 2016 Daniel Berteaud 0.84-16.sme +- Disable TLSv1 [SME: 9162] + +* Fri Sep 11 2015 stephane de Labrusse 0.84-15.sme +- Modify whitelist_soft transaction to interact with dnsbl filter [SME: 8747] +- by John Crisp +- Added qpsmtpd-0.84-make-dnsbl-more-whitelist_soft-aware.patch + +* Tue May 19 2015 Daniel Berteaud 0.84-14.sme +- Disable SSLv3 [SME: 8926] + +* Fri May 15 2015 Daniel Berteaud 0.84-13.sme +- New notls conf to set hosts you dont want to advertize STARTTLS to [SME: 8863] + +* Sun Feb 15 2015 Daniel Berteaud 0.84-12.sme +- Revert forcing TLSv1 patch as it breaks some inbound delivery [SME: 8851] +- Revert whitelist_soft dnsbl as it hasn't been verified yet and we need to + push the fix for TLSv1 [SME: 8747] + +* Fri Dec 26 2014 stephane de Labrusse 0.84-11.sme +- Modify whitelist_soft transaction to interact with dnsbl filter [SME: 8747] +- by John Crisp + +* Mon Dec 22 2014 Daniel Berteaud 0.84-10.sme +- Force usage of TLSv1 [SME: 8726] + +* Thu Mar 13 2014 Daniel Berteaud 0.84-9.sme +- Remove DENYSOFT on SPF softfail [SME: 8273] + +* Mon Dec 9 2013 Daniel Berteaud 0.84-8.sme +- Fix handling of messages with no body and no trailing \n after headers (eq was + used in attempted assignment). [SME: 8051, see SME: 7754] + +* Fri Jul 5 2013 Ian Wells 0.84-7.sme +- Accept messages with no body and no trailing \n after headers [SME: 7754] + * Thu Apr 25 2013 chris burnat 0.84-6.sme - Fix Net::DNS update breaks qpsmtpd, codes suggested by Ian [SME: 7561]