Name: | exim-greylist |
---|---|
Version: | 4.92.3 |
Release: | 1.el7 |
Architecture: | aarch64 |
Group: | System Environment/Daemons |
Size: | 6502 |
License: | GPLv2+ |
RPM: | exim-greylist-4.92.3-1.el7.aarch64.rpm |
Source RPM: | exim-4.92.3-1.el7.src.rpm |
Build Date: | Mon Oct 07 2019 |
Build Host: | ca-buildarm01.us.oracle.com |
Vendor: | Oracle America |
URL: | http://www.exim.org/ |
Summary: | Example configuration for greylisting using Exim |
Description: | This package contains a simple example of how to do greylisting in Exim's ACL configuration. It contains a cron job to remove old entries from the greylisting database, and an ACL subroutine which needs to be included from the main exim.conf file. To enable greylisting, install this package and then uncomment the lines in Exim's configuration /etc/exim.conf which enable it. You need to uncomment at least two lines -- the '.include' directive which includes the new ACL subroutine, and the line which invokes the new subroutine. By default, this implementation only greylists mails which appears 'suspicious' in some way. During normal processing of the ACLs we collect a list of 'offended' which it's committed, which may include having SpamAssassin points, lacking a Message-ID: header, coming from a blacklisted host, etc. There are examples of these in the default configuration file, mostly commented out. These should be sufficient for you to you trigger greylisting for whatever 'offences' you can dream of, or even to make greylisting unconditional. |
- New version Resolves: rhbz#1756656 Resolves: CVE-2019-16928
- New version Resolves: CVE-2019-15846
- New version Resolves: rhbz#1742312
- New version - De-fuzzified patches
- Enabled DANE support Resolves: rhbz#1693202 - De-fuzzified support-proxies patch
- Enable proxy and socks support Resolves: rhbz#1542870
- New version Resolves: rhbz#1615158 - Dropped dynlookup-config patch (merged into config patch) - Dropped dec64table-read-fix patch (already upstream) - De-fuzzified patches
- Fixed dec64table OOB read in b64decode
- Fixed undefined symbols in mysql module
- New version Resolves: rhbz#1527710 - Fixed buffer overflow in utility function Resolves: CVE-2018-6789 - Updated and defuzzified patches - Dropped mariadb-macro-fix patch (not needed) - Dropped CVE-2017-1000369, calloutsize, CVE-2017-16943, CVE-2017-16944 patches (all upstreamed)