Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

msmtp-1.4.22-4.1 RPM for x86_64

From OpenSuSE 11.4 for x86_64

Name: msmtp Distribution: openSUSE 11.4
Version: 1.4.22 Vendor: openSUSE
Release: 4.1 Build date: Sat Feb 19 08:28:13 2011
Group: Productivity/Networking/Email/Utilities Build host: build14
Size: 281467 Source RPM: msmtp-1.4.22-4.1.src.rpm
Summary: Lightweight SMTP Client
msmtp is an SMTP client that can be used as a plug-in for Mutt and
other mail user agents.  It forwards mail to an SMTP server that does
the delivery.  msmtp supports multiple accounts.

    Martin Lambers <>






* Mon Jan 10 2011
  - update to version 1.4.22
    - avoid different account selection behaviour in --pretend mode,
      and print more informational messages about account selection
      in --pretend and --debug mode
    - add a new passwordeval command and --passwordeval option, to
      set the password from the output of a command
    - a few documentation improvements
    - report platform in --version output
    - fix building with newer OpenSSL versions
    - updated script
    - fixed building without TLS/SSL support
  - removed obsolete msmtp-fix-newopenssl.patch
* Mon Apr 19 2010
  - fix build with new openSSL
* Sun Mar 21 2010
  - update to version 1.4.20
    - adds support for the authentication mechanism SCRAM-SHA-1 via
      GNU SASL (only on openSUSE >= 11.2)
    - the new command tls_fingerprint allows one to trust one
      particular TLS certificate, in case tls_trust_file cannot be
      used for some reason
    - the new script manages Gnome Keyring
      passwords for msmtp (currently disabled in this build)
  - moved documentation files to a -doc subpackage
* Fri Nov 20 2009
  - update to version 1.4.19
    - When using OpenSSL, msmtp now correctly handles NUL characters
      in the Common Name and Subject Alternative Name fields of
      certificates. This fixes a security problem. Note that msmtp is
      not affected by this problem if GnuTLS is used. (bnc#557181)
    - Disable security checks on the user configuration file when run
      as root.  Fixes Debian bug #534829.
  - additional changes from version 1.4.18:
    - mostly code worker
  - additional changes from version 1.4.17:
    - Msmtp now also reads SYSCONFDIR/netrc if the password was not
      found in ~/.netrc.
    - Support for the GNOME keyring was added by Satoru SATOH.
  - additional changes from version 1.4.16:
    - mostly code rework
  - additional changes from version 1.4.15:
    - The configuration command tls_crl_file was added. This allows
      to use certificate revocation lists (CRLs) during certificate
    - The configuration command tls_min_dh_prime_bits was added. This
      may be needed to use TLS/SSL with servers that use a small
      Diffie-Hellman (DH) prime size.
    - The configuration command tls_priorities was added. This allows
      to fine tune TLS/SSL session parameters.
* Sat Sep 06 2008
  - update to version 1.4.16
    - Changed all scripts to '#!/usr/bin/env bash' instead of
      '#!/bin/sh' or '#!/bin/bash', because they use bash features
      that are not available in POSIX /bin/sh and because bash might
      not live in /bin, e.g. on BSD systems. This is a quick fix for
      Debian bug #489635.
    - Accept both 250 and 251 in return of the RCPT TO command, as
      required by RFC 2821 sections 4.3.2 and 3.4. Reported and fixed
      by Matthias Bernhardt.  Thanks!
    - Fix scripts/msmtpqueue/ An error made while
      applying a patch accidently broke it. Reported by Thomas Weber.
      (this obsoletes
  - additional changes from version 1.4.15
    - Added the new tls_crl_file configuration command and the
      corresponding --tls-crl-file option.
    - Added the new tls_min_dh_prime_bits configuration command and
      the corresponding --tls-min-dh-prime-bits option. This closes
      Debian bug #440344.
    - Added the new tls_priorities configuration command and the
      corresponding --tls-priorities option.
    - Gnulib upate to 2008-06-02. Use getpass-gnu instead of getpass
    - Add msmtpq scripts by Chris Gianniotis to the scripts
      directory. Suggest them as a replacement in the README of the
      msmtpqueue scripts.
    - Do not let getpass() read from stdin, because we read the mail
      from there.  Reported by Karol Lewandowski. Thanks!
    - Updated the set_sendmail script by Gautam Iyer. Thanks!
    - Return EX_TEMPFAIL instead of EX_DATAERR in case of  4xx
      replies to the MAIL FROM, RCPT TO and DATA commands. Reported
      by Kent Vinther Friis. Thanks!
  - install msmtpq
* Wed May 07 2008
  - fix
* Tue Mar 18 2008
  - update to version 1.4.14
    - The -t option now properly supports Resent-* headers.
    - The --read-envelope-from option was added. It allows to read
      the envelope from address from the From header.
    - The environment variables SMTPSERVER and EMAIL can be used to
      configure msmtp for simple use cases.
    - Support for the Mac OS X keychain was added by Jay Soffian.
* Sat Aug 04 2007
  - update to version 1.4.13
    - Added the script by Gautam Iyer to the new
      scripts subdirectory.
    - Added the msmtpqueue scripts to the new scripts subdirectory.
    - Make the search of an account by the envelope from address case
      insensitive.  Problem reported and fixed by Brandon Philips.
    - Update the license of the source code to GPLv3 or later, and
      change the license of the documentation to the GFDLv1.2 or
    - Gnulib update to 2007-07-15.
  - no longer use the external msmtpqueue package.
* Sun Jun 17 2007
  - update to version 1.4.12:
    o Handle MAILER-DAEMON correctly
    o documentation updates
    o Require tls_trust_file or tls_certcheck=off for TLS sessions
    o Do not use NTLM authentication automatically
    o Gnulib update
    o bug fixes
  - update to msmtpqueue 0.5:
    o Added the script
* Tue Apr 10 2007
  - update to 1.4.11:
    - Require either tls_trust_file or tls_certcheck=off for TLS
      sessions, so that msmtp is not silently vulnerable to
      man-in-the-middle attacks.
    - Do not use NTLM authentication automatically anymore unless TLS
      is active.  NTLM is not an open standard and must therefore be
      considered broken.
    - Gnulib update 2007-04-07.



Generated by rpm2html 1.8.1

Fabrice Bellet, Mon Jul 10 03:28:18 2017