FreshPorts -- The Place For Ports If you buy from Amazon USA, please support us by using this link.
Follow us
Blog
Twitter

Port details
postfix24 A secure alternative to widely-used Sendmail
2.4.14,1 mail Deleted on this many watch lists=0 search for ports that depend on this port This port version is marked as vulnerable. Find issues related to this port Report an issue related to this port
Deprecated DEPRECATED: no further upstream development; please consider upgrading
Expired This port expired on: 2011-06-02
Maintainer: mnag@FreeBSD.org search for ports maintained by this maintainer
Port Added: 28 Feb 2008 20:04:24
Also Listed In: ipv6
License: not specified in port
Postfix attempts to be fast, easy to administer, and secure, while at the same
time being sendmail compatible enough to not upset existing users. Thus, the
outside has a sendmail-ish flavor, but the inside is completely different.

Some feautures:

Connection cache for SMTP, DSN status notifications, IP version 6, Plug-in
support for multiple SASL implementations (Cyrus, Dovecot), TLS encryption and
authentication, Configurable status notification message text, Access control
per client/sender/recipient/etc, Content filter (built-in, external before
queue, external after queue), Berkeley DB database, LDAP database, MySQL
database, PostgreSQL database, Maildir and mailbox format, Virtual domains,
VERP envelope return addresses and others.

WWW:	http://www.postfix.org/
SVNWeb : Homepage : PortsMon

No installation instructions: this port has been deleted.

The package name of this deleted port was: postfix

PKGNAME: postfix

distinfo: There is no distinfo for this port.


NOTE: FreshPorts displays only information on required and default dependencies. Optional dependencies are not covered.

Build dependencies:
  1. perl5.8.9 : lang/perl5.8
Runtime dependencies:
  1. dovecot : mail/dovecot
Library dependencies:
  1. pcre.0 : devel/pcre
There are no ports dependent upon this port

Configuration Options
===> The following configuration options are available for postfix-2.4.14,1:
     PCRE=on (default) "Perl Compatible Regular Expressions"
     SASL2=off (default) "Cyrus SASLv2 (Simple Auth. and Sec. Layer)"
     DOVECOT=off (default) "Dovecot SASL authentication method"
     SASLKRB=off (default) "If your SASL req. Kerberos select this option"
     SASLKRB5=off (default) "If your SASL req. Kerberos5 select this option"
     SASLKMIT=off (default) "If your SASL req. MIT Kerberos5 select this option"
     TLS=off (default) "Enable SSL and TLS support"
     BDB=off (default) "Berkeley DB (choose version with WITH_BDB_VER)"
     MYSQL=off (default) "MySQL maps (choose version with WITH_MYSQL_VER)"
     PGSQL=off (default) "PostgreSQL maps (choose with DEFAULT_PGSQL_VER)"
     OPENLDAP=off (default) "OpenLDAP maps (choose ver. with WITH_OPENLDAP_VER)"
     CDB=off (default) "CDB maps lookups"
     NIS=off (default) "NIS maps lookups"
     VDA=off (default) "VDA (Virtual Delivery Agent)"
     TEST=off (default) "SMTP/LMTP test server and generator"
===> Use 'make config' to modify these settings

Master Sites:
  1. ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/distfiles/postfix/
  2. ftp://ftp.aet.tu-cottbus.de/pub/postfix_tls/./
  3. ftp://ftp.aet.tu-cottbus.de/pub/postfix_tls/old/
  4. ftp://ftp.aet.tu-cottbus.de/pub/postfix_tls/related/postfix/
  5. ftp://ftp.porcupine.org/mirrors/postfix-release/official/
  6. ftp://ftp.samurai.com/pub/postfix/official/
  7. ftp://ftp.tux.org/pub/net/postfix/official/
  8. ftp://ftp.utoronto.ca/mirror/packages/postfix/official/
  9. http://ring.nict.go.jp/archives/net/mail/postfix/official/./
  10. http://ring.nict.go.jp/archives/net/mail/postfix/official/old/
  11. http://ring.nict.go.jp/archives/net/mail/postfix/official/related/postfix/
  12. http://ring.riken.jp/archives/net/mail/postfix/official/./
  13. http://ring.riken.jp/archives/net/mail/postfix/official/old/
  14. http://ring.riken.jp/archives/net/mail/postfix/official/related/postfix/
Port Moves
  • port deleted on 2011-06-03
    REASON: Has expired: no further upstream development; please consider upgrading

Number of commits found: 11

Commit History - (may be incomplete: see SVNWeb link above for full details)
DateByDescription
03 Jun 2011 09:57:09
Original commit files touched by this commit  2.4.14,1
 This port version is marked as vulnerable.
rene search for other commits by this committer
Remove expired and vulnerable port:
2011-06-02 mail/postfix24: no further upstream development; please consider
upgrading
03 May 2011 01:35:07
Original commit files touched by this commit  2.4.14,1
 This port version is marked as vulnerable.
sahil search for other commits by this committer
Mark DEPRECATED and set EXPIRATION_DATE; encourage
users to upgrade to a newer release.

Approved by:    portmgr (linimon)
13 Apr 2010 13:19:32
Original commit files touched by this commit  2.4.14,1
 This port version is marked as vulnerable.
mnag search for other commits by this committer
- Update to 2.4.14
- Fix build when WITH_SASLKRB5 is set on 8.0 & 9.0 which have the new Heimdal

PR:             145394
Submitted by:   Sahil Tandon <sahil___tandon.net>
27 Mar 2010 00:15:24
Original commit files touched by this commit  2.4.13
 This port version is marked as vulnerable.
dougb search for other commits by this committer
Begin the process of deprecating sysutils/rc_subr by
s#. %%RC_SUBR%%#. /etc/rc.subr#
19 Jan 2010 23:10:41
Original commit files touched by this commit  2.4.13,1
 This port version is marked as vulnerable.
mnag search for other commits by this committer
- Update to version 2.4.13

PR:             142269
Submitted by:   olli hauer <ohauer___gmx.de>
27 Sep 2009 18:06:28
Original commit files touched by this commit  2.4.11,1
 This port version is marked as vulnerable.
mnag search for other commits by this committer
- Fixed build to FreeBSD 9.
- Mark as jobs safe.

PR:             138923
Submitted by:   Sylvio Cesar <scjamorim___bsd.com.br>
Feature safe:   yes
30 Jul 2009 00:22:14
Original commit files touched by this commit  2.4.11,1
 This port version is marked as vulnerable.
mnag search for other commits by this committer
- Fix build with new closefrom(2)

Reported by:    pointyhat
15 Jul 2009 16:56:10
Original commit files touched by this commit  2.4.11,1
 This port version is marked as vulnerable.
dougb search for other commits by this committer
Fix a few "bad example" problems in the rc.d scripts that have been
propogated by copy and paste.

1. Primarily the "empty variable" default assignment, which is mostly
${name}_flags="", but fix a few others as well.
2. Where they are not already documented, add the existence of the _flags
(or other deleted empties) option to the comments, and in some cases add
comments from scratch.
3. Replace things that look like:
prefix=%%PREFIX%%
command=${prefix}/sbin/foo
to just use %%PREFIX%%. In many cases the $prefix variable is only used
once, and in some cases it is not used at all.
4. In a few cases remove ${name}_flags from command_args
5. Remove a long-stale comment about putting the port's rc.d script in
/etc/rc.d (which is no longer necessary).

No PORTREVISION bumps because all of these changes are noops.
24 May 2009 22:27:48
Original commit files touched by this commit  2.4.11,1
 This port version is marked as vulnerable.
mnag search for other commits by this committer
- Update to 2.4.11
22 Feb 2009 03:52:13
Original commit files touched by this commit  2.4.10,1
 This port version is marked as vulnerable.
mnag search for other commits by this committer
- Update to 2.4.10
28 Feb 2008 20:04:09
Original commit files touched by this commit  2.4.7,1
 This port version is marked as vulnerable.
mnag search for other commits by this committer
- Update to 2.4.7
- Update VDA patch to 2.4.6
- Change MAINTAINER
- Added NO_LATEST_LINK

Repocopied by:  marcus
Repocopy from:  mail/postfix

Number of commits found: 11

Login
User Login
Create account

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD

This site
What is FreshPorts?
About the authors
Issues
FAQ
How big is it?
The latest upgrade!
Privacy
Forums
Blog
Contact

Search
Enter Keywords:
 
more...

Latest Vulnerabilities
asterisk11Dec 09
asterisk13Dec 09
asterisk13Dec 09
apache24Dec 06
cryptoppDec 06
mod_http2-develDec 06
py-cryptography*Dec 06
qemu*Dec 06
qemu-devel*Dec 06
qemu-sbruno*Dec 06
chromiumDec 05
ImageMagickDec 04
ImageMagick-nox11Dec 04
ImageMagick7Dec 04
ImageMagick7Dec 04

35 vulnerabilities affecting 66 ports have been reported in the past 14 days

* - modified, not new

All vulnerabilities


Ports
Home
Categories
Deleted ports
Sanity Test Failures
Newsfeeds

Statistics
Graphs
NEW Graphs (Javascript)
Traffic

Calculated hourly:
Port count 26973
Broken 309
Deprecated 169
Ignore 573
Forbidden 1
Restricted 214
No CDROM 82
Vulnerable 61
Expired 7
Set to expire 148
Interactive 0
new 24 hours 7
new 48 hours15
new 7 days66
new fortnight126
new month299

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD
Valid HTML, CSS, and RSS.
Copyright © 2000-2014 Dan Langille. All rights reserved.