masqmail

diff ChangeLog @ 379:193013200396

Updated ChangeLog and NEWS.
author markus schnalke <meillo@marmaro.de>
date Wed, 18 Jan 2012 09:31:35 +0100
parents 75f4a5676808
children 34c919a8d74e
line diff
     1.1 --- a/ChangeLog	Sat Jan 14 21:36:58 2012 +0100
     1.2 +++ b/ChangeLog	Wed Jan 18 09:31:35 2012 +0100
     1.3 @@ -7,6 +7,30 @@
     1.4  technical speach and with focus on compatibility.
     1.5  
     1.6  
     1.7 +0.3.4  Wed, 18 Jan 2012 09:21:54 +0100
     1.8 +	* Reworked the route concept. Better names: ``online_routes'' is now
     1.9 +	  known as ``query_routes'' and the ``local_net_route'' in now named
    1.10 +	  ``permanent_routes''. Removed the idea of the localnet because it
    1.11 +	  is only part of the more general concept: permanent routes. Removed
    1.12 +	  `local_nets'; they are now represented by allowed_recipients in a
    1.13 +	  permanent route. (See: examples/localnet.route) Now, there is no
    1.14 +	  more abiguity between `local' and `local net'. Run
    1.15 +	  admin/config-transition on your config to learn how to update it.
    1.16 +	* Switched the default group for masqmail from `trusted' to `mail'.
    1.17 +	* Fixed a problem with psb->remote_host, introduced in version 0.3.2
    1.18 +	  (changeset 412385b57dc4).
    1.19 +	* Fixed a bug in matching of allowed recipients. Thanks to Juergen
    1.20 +	  Daubert for finding and reporting the issue.
    1.21 +	* Enabled auth support per default.
    1.22 +	* Removed support for openssl linking. It had been rarely used and
    1.23 +	  could have caused legal problems. We don't miss functionality here,
    1.24 +	  because we already have builtin MD5 support.
    1.25 +	* Removed ident support. This had been discussed on the mailing list
    1.26 +	  in Oct 2011.
    1.27 +	* `local_hosts' now understands glob patterns like `*example.org'.
    1.28 +	* Lots of refactoring and removal of unused code.
    1.29 +	* Smaller cleanups of the man pages.
    1.30 +
    1.31  0.3.3  Wed, 31 Aug 2011 08:38:13 +0200
    1.32  	* Fixed a possible security problem, reported by John Lightsey. See
    1.33  	  Debian bug #638002. The return value of seteuid() calls was handled