1
0
mirror of https://github.com/mail-in-a-box/mailinabox.git synced 2025-04-03 00:07:05 +00:00
# Conflicts:
#	README.md
This commit is contained in:
downtownallday 2023-12-22 18:59:26 -05:00
commit 96b315c368
3 changed files with 11 additions and 1 deletions

View File

@ -1,6 +1,11 @@
CHANGELOG CHANGELOG
========= =========
Version 67 (December 22, 2023)
------------------------------
* Guard against a newly published vulnerability called SMTP Smuggling. See https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/.
Version 66 (December 17, 2023) Version 66 (December 17, 2023)
------------------------------ ------------------------------

View File

@ -51,7 +51,7 @@ if [ -z "$TAG" ]; then
if [ "$UBUNTU_VERSION" == "Ubuntu 22.04 LTS" ]; then if [ "$UBUNTU_VERSION" == "Ubuntu 22.04 LTS" ]; then
# This machine is running Ubuntu 22.04, which is supported by # This machine is running Ubuntu 22.04, which is supported by
# Mail-in-a-Box versions 60 and later. # Mail-in-a-Box versions 60 and later.
TAG=v66 TAG=v67
elif [ "$UBUNTU_VERSION" == "Ubuntu 18.04 LTS" ]; then elif [ "$UBUNTU_VERSION" == "Ubuntu 18.04 LTS" ]; then
# This machine is running Ubuntu 18.04, which is supported by # This machine is running Ubuntu 18.04, which is supported by
# Mail-in-a-Box versions 0.40 through 5x. # Mail-in-a-Box versions 0.40 through 5x.

View File

@ -80,6 +80,11 @@ tools/editconf.py /etc/postfix/main.cf \
bounce_queue_lifetime=1d \ bounce_queue_lifetime=1d \
policy-spf_time_limit=3600 policy-spf_time_limit=3600
# Guard against SMTP smuggling
# This short-term workaround is recommended at https://www.postfix.org/smtp-smuggling.html
tools/editconf.py /etc/postfix/main.cf \
smtpd_data_restrictions=reject_unauth_pipelining
# ### Outgoing Mail # ### Outgoing Mail
# Enable the 'submission' ports 465 and 587 and tweak their settings. # Enable the 'submission' ports 465 and 587 and tweak their settings.