Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

amavisd-new-2.7.0-20.3.1 RPM for i586

From OpenSuSE 12.1 for i586

Name: amavisd-new Distribution: openSUSE 12.1
Version: 2.7.0 Vendor: openSUSE
Release: 20.3.1 Build date: Wed Nov 2 11:45:08 2011
Group: Productivity/Networking/Security Build host: build06
Size: 1564443 Source RPM: amavisd-new-2.7.0-20.3.1.src.rpm
Summary: High-Performance E-Mail Virus Scanner
Amavisd-new is a high-performance interface between mailer (MTA) and
content checkers: virus scanners or SpamAssassin. It talks to the MTA
via (E)SMTP, LMTP. It works with the
following MTAs:

- postfix
- sendmail (sendmail-milter)
- exim






* Wed Nov 02 2011
  - Fix amavisd-milter binary name
* Wed Oct 26 2011
  - obsolete amavisd-milter package
* Thu Oct 13 2011
  - Integrate amavisd-milter
* Tue Oct 11 2011
  - bnc#718025 - amavisd-new 2.7.0 fails to start
* Sat Sep 17 2011
  - Remove redundant tags/sections from specfile
* Tue Sep 13 2011
  - update to 2.7.0 With a synergy of four solutions, using amavisd-new
    in a pre-queue filtering setup became a sensible / better behaved solution:
    - old helper programs amavis.c and amavis-milter.c are no longer distributed
      with the package, along with the whole helper-progs subdirectory.
      As a milter client please use the more modern 'amavisd-milter' package by
      Petr Rehor, available at
    - the "smtpd_proxy_options=speed_adjust" Postfix option, available since
      Postfix 2.7.0 (20091101), improves decoupling between SMTP clients
      and a content filter in a proxy setup, reducing the number of content
      filtering processes needed for the same mail load. With this option
      turned on, a Postfix SMTP server receives the entire message before
      connecting to a before-queue content filter;
    - a master_deadline option and its API equivalent, available in SpamAssassin
      since version 3.3.0, allows for time limiting on lengthy rules checking,
      while still providing results when a time limit is exceeded; this makes
      it more suitable for time-sensitive setups like a pre-queue filtering setup;
    - reworked sub-task time limiting in amavisd, along with its counterpart
      solution in SpamAssassin, makes it better suited to a real-time nature
      of pre-queue filtering setups, where one has no control over how long
      SMTP clients are willing to wait at the data-end stage;
    - a re-purposed command line option 'reload' now does a warm restart,
      keeping sockets available to an MTA client at all times, thus reducing
      a chance that an MTA would even notice a content filter's warm restart.
* Tue Aug 30 2011
  - bnc#710289 - amavisd-new: fails rpmlint check non-ghost-in-var-run
* Tue Jul 12 2011
  - Enable clamav as integrated scanner
  - Enable Avira Antivir personal
* Tue May 24 2011
  - update to 2.6.6
    - amavisd-release was not sending a 'mail_file' attribute when a quarantined
    message was a non-compressed file in a single-level directory quarantine
  - quarantining to SQL was sporadically failing, reporting some unrelated
    random error (like 'not available' or 'OpenSSL error: header too long');
  - avoid a warning "_WARN: Use of uninitialized value in string eq at ...
    line 275." when an SQL-based white/black-listing is used;
  - wrap the sql clause  SET NAMES 'utf8'  so that only a warning at
    a log level 2 is issued if an SQL server does not understand the
    command (SQLite, old versions of MySQL) instead of aborting;
  - when a back-end MTA rejected a message, amavisd would send a non-delivery
    status notification, but also propagate the reject status back, which is
    wrong, only one or the other response would be appropriate. A fix also
    allows choosing either a D_REJECT, D_BOUNCE or D_DISCARD response for
    such a case, configurable through %final_destiny_by_ccat at a CC_MTA
    entry, defaulting to D_REJECT;
* Mon Feb 21 2011
  - bnc#663726 - amavisd-new: group of /var/spool/amavis conflicts with av programms
* Sun Feb 20 2011
  - unrar should not be required (non-free software now)
* Thu Jun 24 2010
  - bnc#614316 - amavisd-new: amavisd-new/README.SuSE does not match /etc/amavisd.conf
* Mon May 10 2010
  - bnc#600409 - amavisd not starting after system crash because of stale pid file
* Mon Jul 20 2009
  - bnc#521366 - Amavisd-new sends bounces when it isn't allowed to do so (backscatter!)
  - update to 2.6.4
  - amavisd failed to start when spam scanning was disabled either
    by @bypass_spam_checks_maps=(1) or by @spam_scanners=(), giving:
      Can't locate object method "new" via package "Amavis::SpamControl"
  - several decoders failed to propagate "Exceeded storage quota" exception,
    so the protection of AV scanners against mail bombs was ineffective;
  - milter usage (AM.PDP): verbatim header edits inserted a header body of "1"
    instead of the correct string, for example: "Authentication-Results: 1";
  - updated AV entry for BitDefender's bdscan to recognize tabs around a colon
    in its output; contributed by Steve;
  - fix parsing of a combined result from DSPAM (option --classify), as
    earlier versions of DSPAM did not include a signature with a combined
    result line;
  - when logging to SQL (pen pals), the msgs.message_id field always received
    a value '1' instead of a Message-Id, thus making pen pals less effective
    (only matching on sender/recipient pairs worked, not on message threads)
    and letting some bounces bypass a bounce killer; bug was introduced with
    version 2.6.2;
  - timer was not reset after a persistent failure to connect to a daemonized
    virus scanner, so a subsequent call to a backup scanner only had 10 seconds
    available before it was aborted, which was often too short for a command
    line backup scanner like clamscan;
  - if a virus scanner interface did not find a name of a virus in the output
    of a virus scanner (despite noticing infection), the infection was ignored;
  - added missing /m flags to regular expressions in AV entries
    (a bug is revealed with Perl 5.10.0; previous versions of Perl happened
    to work, unintentionally accepting a /m flag if added late during a regexp
  - $banned_namepath_re setting only worked globally, but was not usable in
    policy banks;
  - do_uncompress: signal run_command_copy() errors, instead of returning a
    status, thus allowing decompose_part() to detect 'Exceeded storage quota'
    or 'Maximum number of files exceeded', and flag mail as CC_UNCHECKED;
  - if $mailfrom_notify_admin was not specified in a configuration file but
    defaulted to an e-mail address in $hdrfrom_notify_admin, the following
    was reported (due to missing angle brackets) on an attempt to submit
    a notification:
      (!)SEND via SMTP: -> <>...
      501 5.1.7 Bad sender address syntax
      (!)FAILED to notify admin: 501 5.1.7 Failed, id=40690-23,
      from MTA([::1]:10027): 501 5.1.7 Bad sender address syntax
    Notification was not sent, the rest of the processing was unaffected;
  - fetch_modules: only suppress the "Can't locate ... in @INC" diagnostics
    if exactly the requested module is missing, but do show the error if some
    subordinate module is missing and preventing the requested module to be
  - do_unrar: recognize an information line with a '<->';
  - fixed a syntax error in LDAP.ldif;
  - fixed a bug in SpamdClient;
  - provide a true SNMP agent and a MIB, facilitating monitoring the health
    of a content filtering system, its performance and mail characteristics;
  - a new AV interface to SMTP-based antivirus scanners;
  - allow customizing SMTP-status response reason text for blocked messages;
  - prevent inserting fake copies of certain important mail header fields
    without breaking a DKIM signature;
  - added a configuration variable @client_ipaddr_policy, which maps smtp
    client's IP address lookup lists to a policy bank name. This allows for
    loading a policy bank based on a client IP address, and generalizes a
    formerly hard-wired mapping of @mynetworks_maps into 'MYNETS'.
  - large messages beyond $sa_mail_body_size_limit are now partially passed
    to SpamAssassin and other spam scanners for checking: a copy passed to
    a spam scanner is truncated near or slightly past the indicated limit.
    Large messages are no longer given an almost free passage through spam
  - supports passing an extra argument suppl_attrib to $spamassassin->parse,
    as recognized by SpamAssassin 3.3.0, passing a set of DKIM signature
    objects to a SpamAssassin's plugin DKIM, which saves having to do the
    same signature verification operation again within a plugin, and provides
    uncrippled signatures to SpamAssassin even when a large message is
    truncated by amavisd and only partially submitted to spam analysis;
  - add global variables $sa_configpath and $sa_siteconfigpath (undef by
    default), which are passed to SpamAssassin as options 'rules_filename'
    and 'site_rules_filename' during its initialization call; this makes
    it easier to run multiple instances of amavisd, each with a different
    SpamAssassin configuration, using the same amavisd configurations file
    by taking advantage of option -i;  suggested by Noah Baker;
  - report process resource usage at log level 2 by calling getrusage(1)
    if a perl module Unix::Getrusage is available;



Generated by rpm2html 1.8.1

Fabrice Bellet, Sat Jun 10 06:20:49 2017