X-Git-Url: https://git.exim.org/exim.git/blobdiff_plain/10385c155b0e1266c02535b76ab73b32fa83d73f..74935b987fd0312f535747fea636883ae22fec77:/doc/doc-txt/NewStuff diff --git a/doc/doc-txt/NewStuff b/doc/doc-txt/NewStuff index 03c0d4833..b9d88ff82 100644 --- a/doc/doc-txt/NewStuff +++ b/doc/doc-txt/NewStuff @@ -1,4 +1,4 @@ -$Cambridge: exim/doc/doc-txt/NewStuff,v 1.172 2010/06/06 02:46:13 pdp Exp $ +$Cambridge: exim/doc/doc-txt/NewStuff,v 1.176 2010/06/14 18:51:10 pdp Exp $ New Features in Exim -------------------- @@ -12,6 +12,9 @@ the documentation is updated, this file is reduced to a short list. Version 4.73 ------------ + NOTE: this version is not guaranteed backwards-compatible, please read the + items below carefully + 1. A new main configuration option, "openssl_options", is available if Exim is built with SSL support provided by OpenSSL. The option allows administrators to specify OpenSSL options to be used on connections; @@ -38,10 +41,14 @@ Version 4.73 av_scanner = clamd:192.0.2.3 1234:local + ClamAV's ExtendedDetectionInfo response format is now handled. + 4. There is now a -bmalware option, restricted to admin users. This option takes one parameter, a filename, and scans that file with Exim's malware-scanning framework. This is intended purely as a debugging aid to ensure that Exim's scanning is working, not to replace other tools. + Note that the ACL framework is not invoked, so if av_scanner references + ACL variables without a fallback then this will fail. 5. There is a new expansion operator, "reverse_ip", which will reverse IP addresses; IPv4 into dotted quad, IPv6 into dotted nibble. Examples: @@ -75,6 +82,40 @@ Version 4.73 then henceforth you will have to maintain your own local patches to strip the safeties off. + 8. There is a new expansion operator, bool_lax{}. Where bool{} uses the ACL + condition logic to determine truth/failure and will fail to expand many + strings, bool_lax{} uses the router condition logic, where most strings + do evaluate true. + Note: bool{00} is false, bool_lax{00} is true. + + 9. Routers now support multiple "condition" tests, + +10. There is now a runtime configuration option "tcp_wrappers_daemon_name". + Setting this allows an admin to define which entry in the tcpwrappers + config file will be used to control access to the daemon. This option + is only available when Exim is built with USE_TCP_WRAPPERS. The + default value is set at build time using the TCP_WRAPPERS_DAEMON_NAME + build option. + +11. [POSSIBLE CONFIG BREAKAGE] The default value for system_filter_user is now + the Exim run-time user, instead of root. + +12. [POSSIBLE CONFIG BREAKAGE] ALT_CONFIG_ROOT_ONLY is no longer optional and + is forced on. This is mitigated by the new build option + TRUSTED_CONFIG_PREFIX_LIST which defines a list of pathname prefices which + are trusted; if a config file is owned by root and is under that prefix, + then it may be used by the Exim run-time user. + +13. [POSSIBLE CONFIG BREAKAGE] The Exim user is no longer automatically + trusted to supply -D overrides on the command-line. Going + forward, we recommend using TRUSTED_CONFIG_PREFIX_LIST with shim configs + that include the main config. As a transition mechanism, we are + temporarily providing a work-around: the new build option + WHITELIST_D_MACROS provides a colon-separated list of macro names which + may be overriden by the Exim run-time user. The values of these macros + are constrained to the regex ^[A-Za-z0-9_/.-]*$ (which explicitly does + allow for empty values). + Version 4.72 ------------