notbugAs an Amazon Associate I earn from qualifying purchases.
Want a good read? Try FreeBSD Mastery: Jails (IT Mastery Book 15)

Why was the website so slow for so long?

The cause of the slowdown was a change to the ZFS dataset. In conjunction with the database server, very little caching was being done. This combination resulted in increased disk I/O as the system churned through the database. Details in the blog post which outlines the various things which changed. Many graphs.

non port: mail/postfix/files/patch-src_tls_tls__rsa.c
SVNWeb

Number of commits found XX: 2

Sun, 31 Mar 2019
[ 13:08 ohauer ] Original commit   Revision:497399
497399 mail/postfix/Makefile
497399 mail/postfix/distinfo
497399 mail/postfix/files/patch-src_tls_tls__client.c
497399 mail/postfix/files/patch-src_tls_tls__rsa.c
497399 mail/postfix/files/patch-src_tls_tls__server.c
- update to postfix-3.3.4

Changelog:
20190312
  Bugfix (introduced: Postfix 2.2): reject_multi_recipient_bounce
  has been producing false rejects starting with the Postfix
  2.2 smtpd_end_of_data_restrictons, and for the same reasons,
  did the same with the Postfix 3.4 BDAT command. The latter
  was reported by Andreas Schulze. File: smtpd/smtpd_check.c.

20190328
  Bugfix (introduced: Postfix 3.0): LMTP connections over
  UNIX-domain sockets were cached but not reused, due to a
  cache lookup key mismatch. Therefore, idle cached connections
  could exhaust LMTP server resources, resulting in two-second
  pauses between email deliveries. This problem was investigated
  by Juliana Rodrigueiro. File: smtp/smtp_connect.c.
Mon, 29 Aug 2016
[ 19:23 brnrd ] Original commit   Revision:421091
421091 mail/postfix/Makefile
421091 mail/postfix/files/patch-src_posttls-finger_posttls-finger.c
421091 mail/postfix/files/patch-src_tls_tls__client.c
421091 mail/postfix/files/patch-src_tls_tls__dane.c
421091 mail/postfix/files/patch-src_tls_tls__rsa.c
421091 mail/postfix/files/patch-src_tls_tls__server.c
mail/postfix: Fix runtime issues with LibreSSL

  - Add LibreSSL checks to <> 1.1.0 OpenSSL checks
  - Bump portrevision

PR:		212223
Submitted by:	Markus Kohlmeier <rootservice@gmail.com>
Reported by:	Markus Kohlmeier <rootservice@gmail.com>
Approved by:	ohauer (via PR)
MFH:		2016Q3

Number of commits found XX: 2

Login
User Login
Create account

Servers and bandwidth provided by
New York Internet, iXsystems, and RootBSD

This site
What is FreshPorts?
About the authors
Issues
FAQ
How big is it?
The latest upgrade!
Privacy
Blog
Contact

Search
Enter Keywords:
 
more...

Latest Vulnerabilities
gitlab-ceMay 28
sane-backendsMay 28
powerdns-recursorMay 26
sympaMay 26
chromiumMay 24
piwigoMay 23
drupal7May 22
sympaMay 22
tomcat-develMay 22
tomcat7May 22
tomcat85May 22
tomcat9May 22
unboundMay 22
zabbix3-proxyMay 20
zabbix3-serverMay 20

18 vulnerabilities affecting 176 ports have been reported in the past 14 days

* - modified, not new

All vulnerabilities

Last updated:
2020-05-28 11:20:48


Ports
Home
Categories
Deleted ports
Sanity Test Failures
Newsfeeds

Statistics
Graphs
NEW Graphs (Javascript)
Traffic

Calculated hourly:
Port count 39438
Broken 79
Deprecated 627
Ignore 347
Forbidden 5
Restricted 147
No CDROM 76
Vulnerable 24
Expired 15
Set to expire 581
Interactive 0
new 24 hours 0
new 48 hours3
new 7 days32
new fortnight79
new month230

Servers and bandwidth provided by
New York Internet, iXsystems, and RootBSD
Valid HTML, CSS, and RSS.
Copyright © 2000-2020 Dan Langille. All rights reserved.