Name: | exim-greylist |
---|---|
Version: | 4.96 |
Release: | 3.el8 |
Architecture: | aarch64 |
Group: | Unspecified |
Size: | 8276 |
License: | GPLv2+ |
RPM: | exim-greylist-4.96-3.el8.aarch64.rpm |
Source RPM: | exim-4.96-3.el8.src.rpm |
Build Date: | Fri Oct 28 2022 |
Build Host: | build-ol8-aarch64.oracle.com |
Vendor: | Oracle America |
URL: | https://www.exim.org/ |
Summary: | Example configuration for greylisting using Exim |
Description: | This package contains a simple example of how to do greylisting in Exim's ACL configuration. It contains a cron job to remove old entries from the greylisting database, and an ACL subroutine which needs to be included from the main exim.conf file. To enable greylisting, install this package and then uncomment the lines in Exim's configuration /etc/exim.conf which enable it. You need to uncomment at least two lines -- the '.include' directive which includes the new ACL subroutine, and the line which invokes the new subroutine. By default, this implementation only greylists mails which appears 'suspicious' in some way. During normal processing of the ACLs we collect a list of 'offended' which it's committed, which may include having SpamAssassin points, lacking a Message-ID: header, coming from a blacklisted host, etc. There are examples of these in the default configuration file, mostly commented out. These should be sufficient for you to you trigger greylisting for whatever 'offences' you can dream of, or even to make greylisting unconditional. |
- Fixed use after free in regex handler Resolves: CVE-2022-3559
- Fixed "tainted search query is not properly quoted" for greylisting, patch provided by Marcel Härry <mh+fedora@scrit.ch>
- New version Resolves: rhbz#2119687
- New version Resolves: rhbz#2100385
- Fix dmarc checks - fixes bz#1989089
- New version
- Release bump to fix greylisting
- Fixed cname handling in TLS certificate verification Resolves: rhbz#1942583
- New version Resolves: rhbz#1842590 - Used Exim maintainers keyring for GPG verification - Dropped CVE-2020-12783 patch (upstreamed) - Used better workaround for rhbz#1791878 Resolves: rhbz#1842633
- Fixed out-of-bounds read in the SPA authenticator Resolves: CVE-2020-12783