Prereq: "2.4.0" diff -cr /var/tmp/postfix-2.4.0/src/global/mail_version.h ./src/global/mail_version.h *** /var/tmp/postfix-2.4.0/src/global/mail_version.h Wed Mar 28 14:12:37 2007 --- ./src/global/mail_version.h Mon Apr 23 19:22:51 2007 *************** *** 20,27 **** * Patches change both the patchlevel and the release date. Snapshots have no * patchlevel; they change the release date only. */ ! #define MAIL_RELEASE_DATE "20070328" ! #define MAIL_VERSION_NUMBER "2.4.0" #ifdef SNAPSHOT # define MAIL_VERSION_DATE "-" MAIL_RELEASE_DATE --- 20,27 ---- * Patches change both the patchlevel and the release date. Snapshots have no * patchlevel; they change the release date only. */ ! #define MAIL_RELEASE_DATE "20070423" ! #define MAIL_VERSION_NUMBER "2.4.1" #ifdef SNAPSHOT # define MAIL_VERSION_DATE "-" MAIL_RELEASE_DATE diff -cr /var/tmp/postfix-2.4.0/HISTORY ./HISTORY *** /var/tmp/postfix-2.4.0/HISTORY Wed Mar 28 14:12:56 2007 --- ./HISTORY Mon Apr 23 19:21:53 2007 *************** *** 13396,13398 **** --- 13396,13424 ---- Workaround: Eric Raymond's man page formatters don't handle low-level *roff .in or .ti controls. We now use .nf and .fi instead. Files: many. + + 20070331 + + Bugfix (introduced Postfix 2.3): segfault with HOLD action + in access/header_checks/body_checks on 64-bit platforms. + File: cleanup/cleanup_api.c. + + 20070402 + + Portability (introduced 20070325): the fix for hardlinks + and symlinks in postfix-install forgot to work around shells + where "IFS=/ command" makes the IFS setting permanent. This + is allowed by some broken standard, and affects Solaris. + File: postfix-install. + + Portability (introduced 20070212): the workaround for + non-existent library bugs with descriptors >= FD_SETSIZE + broke with "fcntl F_DUPFD: Invalid argument" on 64-bit + Solaris. Files: master/multi_server.c, *qmgr/qmgr_transport.c. + + 20070421 + + Cleanup: on (Linux) platforms that cripple signal handlers + with deadlock, "postfix stop" now forcefully stops all the + processes in the master's process group, not just the master + process alone. File: conf/postfix-script. diff -cr /var/tmp/postfix-2.4.0/README_FILES/BUILTIN_FILTER_README ./README_FILES/BUILTIN_FILTER_README *** /var/tmp/postfix-2.4.0/README_FILES/BUILTIN_FILTER_README Sat Apr 17 15:54:40 2004 --- ./README_FILES/BUILTIN_FILTER_README Mon Apr 2 19:19:47 2007 *************** *** 18,25 **** Because the built-in filter is optimized for stopping specific worms and virus outbreaks, it has limitations that make it NOT suitable for general junk email and virus detection. For that, you should use one of the external content ! inspection methods that are described in the FILTER_README and ! SMTPD_PROXY_README documents. The following diagram gives an over-all picture of how Postfix built-in content inspection works: --- 18,25 ---- Because the built-in filter is optimized for stopping specific worms and virus outbreaks, it has limitations that make it NOT suitable for general junk email and virus detection. For that, you should use one of the external content ! inspection methods that are described in the FILTER_README, SMTPD_PROXY_README ! and MILTER_README documents. The following diagram gives an over-all picture of how Postfix built-in content inspection works: diff -cr /var/tmp/postfix-2.4.0/README_FILES/SMTPD_PROXY_README ./README_FILES/SMTPD_PROXY_README *** /var/tmp/postfix-2.4.0/README_FILES/SMTPD_PROXY_README Sun Mar 25 14:58:52 2007 --- ./README_FILES/SMTPD_PROXY_README Mon Apr 2 19:19:47 2007 *************** *** 12,18 **** As of version 2.1, the Postfix SMTP server can forward all incoming mail to a content filtering proxy server that inspects all mail BEFORE it is stored in ! the Postfix mail queue. The before-queue content filter is meant to be used as follows: --- 12,20 ---- As of version 2.1, the Postfix SMTP server can forward all incoming mail to a content filtering proxy server that inspects all mail BEFORE it is stored in ! the Postfix mail queue. It is roughly equivalent in capabilities to the ! approach described in MILTER_README, except that the latter uses a dedicated ! protocol instead of SMTP. The before-queue content filter is meant to be used as follows: diff -cr /var/tmp/postfix-2.4.0/conf/postfix-script ./conf/postfix-script *** /var/tmp/postfix-2.4.0/conf/postfix-script Sun Mar 25 19:07:50 2007 --- ./conf/postfix-script Sun Apr 22 10:08:47 2007 *************** *** 136,142 **** sleep 1 done $WARN stopping the Postfix mail system with force ! kill -9 `sed 1q pid/master.pid` ;; abort) --- 136,143 ---- sleep 1 done $WARN stopping the Postfix mail system with force ! pid=`awk '{ print $1; exit 0 } END { exit 1 }' pid/master.pid` && ! kill -9 -$pid ;; abort) diff -cr /var/tmp/postfix-2.4.0/html/BUILTIN_FILTER_README.html ./html/BUILTIN_FILTER_README.html *** /var/tmp/postfix-2.4.0/html/BUILTIN_FILTER_README.html Tue Feb 22 09:02:05 2005 --- ./html/BUILTIN_FILTER_README.html Thu Mar 29 10:20:56 2007 *************** *** 37,44 **** worms and virus outbreaks, it has limitations that make it NOT suitable for general junk email and virus detection. For that, you should use one of the external content inspection ! methods that are described in the FILTER_README and SMTPD_PROXY_README ! documents.

The following diagram gives an over-all picture of how Postfix built-in content inspection works:

--- 37,44 ---- worms and virus outbreaks, it has limitations that make it NOT suitable for general junk email and virus detection. For that, you should use one of the external content inspection ! methods that are described in the FILTER_README, SMTPD_PROXY_README ! and MILTER_README documents.

The following diagram gives an over-all picture of how Postfix built-in content inspection works:

*************** *** 353,359 ****

The easiest approach is to configure ONE Postfix instance with ! multiple SMTP server IP addresses in master.cf: