[exim-cvs] cvs commit: exim/exim-doc/doc-docbook spec.xfpt …

Góra strony
Delete this message
Reply to this message
Autor: Phil Pennock
Data:  
Dla: exim-cvs
Temat: [exim-cvs] cvs commit: exim/exim-doc/doc-docbook spec.xfpt exim/exim-doc/doc-txt ChangeLog
pdp 2010/06/09 02:30:16 BST

  Modified files:
    exim-doc/doc-docbook spec.xfpt 
    exim-doc/doc-txt     ChangeLog 
  Log:
  Minor doc updates:
   * -bmalware, note that not running as invoking user and emphasize that it's
     for debugging Exim, not for general scanning.
   * permit_codedump ?  coRedump.
   * Anon SSL lacking cert has been confirmed, fix works, remove the
     "(I believe)" (which also might have been inferred to mean I did the
     diagnosis; I didn't, I just convinced myself that Martin's analysis was
     correct).


  Revision  Changes    Path
  1.86      +7 -1      exim/exim-doc/doc-docbook/spec.xfpt
  1.631     +3 -3      exim/exim-doc/doc-txt/ChangeLog


  Index: spec.xfpt
  ===================================================================
  RCS file: /home/cvs/exim/exim-doc/doc-docbook/spec.xfpt,v
  retrieving revision 1.85
  retrieving revision 1.86
  diff -u -r1.85 -r1.86
  --- spec.xfpt    7 Jun 2010 08:42:15 -0000    1.85
  +++ spec.xfpt    9 Jun 2010 01:30:16 -0000    1.86
  @@ -1,4 +1,4 @@
  -. $Cambridge: exim/exim-doc/doc-docbook/spec.xfpt,v 1.85 2010/06/07 08:42:15 pdp Exp $
  +. $Cambridge: exim/exim-doc/doc-docbook/spec.xfpt,v 1.86 2010/06/09 01:30:16 pdp Exp $
   .
   . /////////////////////////////////////////////////////////////////////////////
   . This is the primary source of the Exim Manual. It is an xfpt document that is
  @@ -3183,7 +3183,13 @@
   this option, so if av_scanner's value is dependent upon an expansion then
   the expansion should have defaults which apply to this invocation.  Exim will
   have changed working directory before resolving the filename, so using fully
  -qualified pathnames is advisable.  This option requires admin privileges.
  +qualified pathnames is advisable.  Exim will be running as the Exim user
  +when it tries to open the file, rather than as the invoking user.
  +This option requires admin privileges.
  +
  +The &%-bmalware%& option will not be extended to be more generally useful,
  +there are better tools for file-scanning.  This option exists to help
  +administrators verify their Exim and AV scanner configuration.


.vitem &%-bt%&
.oindex "&%-bt%&"

  Index: ChangeLog
  ===================================================================
  RCS file: /home/cvs/exim/exim-doc/doc-txt/ChangeLog,v
  retrieving revision 1.630
  retrieving revision 1.631
  diff -u -r1.630 -r1.631
  --- ChangeLog    7 Jun 2010 08:42:15 -0000    1.630
  +++ ChangeLog    9 Jun 2010 01:30:16 -0000    1.631
  @@ -1,4 +1,4 @@
  -$Cambridge: exim/exim-doc/doc-txt/ChangeLog,v 1.630 2010/06/07 08:42:15 pdp Exp $
  +$Cambridge: exim/exim-doc/doc-txt/ChangeLog,v 1.631 2010/06/09 01:30:16 pdp Exp $


Change log file for Exim from version 4.21
-------------------------------------------
@@ -19,13 +19,13 @@

PP/04 Bugzilla 995: provide better SSL diagnostics on failed reads.

-PP/05 Bugzilla 834: provide a permit_codedump option for pipe transports.
+PP/05 Bugzilla 834: provide a permit_coredump option for pipe transports.

PP/06 Adjust NTLM authentication to handle SASL Initial Response.

   PP/07 If TLS negotiated an anonymous cipher, we could end up with SSL but
  -      without a peer certificate (I believe), leading to a segfault because of
  -      an assumption that peers always have certificates.  Be a little more
  +      without a peer certificate, leading to a segfault because of an
  +      assumption that peers always have certificates.  Be a little more
         paranoid.  Problem reported by Martin Tscholak.


PP/08 Bugzilla 926: switch ClamAV to use the new zINSTREAM API for content