postfixadmin-tracker Mailing List for PostfixAdmin (Page 28)
Brought to you by:
christian_boltz,
gingerdog
You can subscribe to this list here.
| 2007 |
Jan
|
Feb
|
Mar
|
Apr
|
May
|
Jun
|
Jul
|
Aug
|
Sep
(5) |
Oct
(67) |
Nov
(83) |
Dec
(47) |
|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2008 |
Jan
(57) |
Feb
(15) |
Mar
(21) |
Apr
(38) |
May
(27) |
Jun
(38) |
Jul
(35) |
Aug
(50) |
Sep
(8) |
Oct
(9) |
Nov
(59) |
Dec
(59) |
| 2009 |
Jan
(27) |
Feb
(42) |
Mar
(63) |
Apr
(46) |
May
(26) |
Jun
(25) |
Jul
(40) |
Aug
(19) |
Sep
(17) |
Oct
(35) |
Nov
(26) |
Dec
(21) |
| 2010 |
Jan
(11) |
Feb
(19) |
Mar
(40) |
Apr
(25) |
May
(23) |
Jun
(17) |
Jul
(10) |
Aug
(18) |
Sep
(21) |
Oct
(12) |
Nov
(10) |
Dec
(22) |
| 2011 |
Jan
(30) |
Feb
(23) |
Mar
(23) |
Apr
(38) |
May
(32) |
Jun
(19) |
Jul
(20) |
Aug
(36) |
Sep
(11) |
Oct
(28) |
Nov
(4) |
Dec
(4) |
| 2012 |
Jan
(6) |
Feb
(3) |
Mar
(16) |
Apr
(28) |
May
(29) |
Jun
(10) |
Jul
(2) |
Aug
(3) |
Sep
|
Oct
(13) |
Nov
(1) |
Dec
(1) |
| 2013 |
Jan
(11) |
Feb
(7) |
Mar
(29) |
Apr
(2) |
May
(3) |
Jun
(15) |
Jul
(8) |
Aug
(5) |
Sep
(5) |
Oct
(4) |
Nov
(27) |
Dec
(81) |
| 2014 |
Jan
(12) |
Feb
(13) |
Mar
(5) |
Apr
|
May
(41) |
Jun
(16) |
Jul
(7) |
Aug
(10) |
Sep
(24) |
Oct
(50) |
Nov
|
Dec
(2) |
| 2015 |
Jan
(5) |
Feb
(2) |
Mar
(7) |
Apr
(20) |
May
(1) |
Jun
(3) |
Jul
(12) |
Aug
(1) |
Sep
(17) |
Oct
(5) |
Nov
(20) |
Dec
(10) |
| 2016 |
Jan
(10) |
Feb
(11) |
Mar
(22) |
Apr
(30) |
May
(33) |
Jun
(3) |
Jul
|
Aug
(12) |
Sep
(20) |
Oct
(11) |
Nov
(15) |
Dec
(8) |
| 2017 |
Jan
(1) |
Feb
(11) |
Mar
(10) |
Apr
|
May
(3) |
Jun
|
Jul
|
Aug
(1) |
Sep
|
Oct
(1) |
Nov
|
Dec
(3) |
| 2018 |
Jan
(2) |
Feb
|
Mar
(1) |
Apr
|
May
(4) |
Jun
(2) |
Jul
(4) |
Aug
|
Sep
|
Oct
|
Nov
|
Dec
|
| 2019 |
Jan
|
Feb
|
Mar
|
Apr
(3) |
May
|
Jun
|
Jul
|
Aug
|
Sep
|
Oct
|
Nov
|
Dec
|
| 2021 |
Jan
|
Feb
|
Mar
(1) |
Apr
|
May
|
Jun
|
Jul
|
Aug
|
Sep
|
Oct
|
Nov
|
Dec
|
|
From: SourceForge.net <no...@so...> - 2009-12-06 01:03:21
|
Bugs item #2908994, was opened at 2009-12-04 20:26 Message generated for change (Comment added) made by christian_boltz You can respond by visiting: https://sourceforge.net/tracker/?func=detail&atid=937964&aid=2908994&group_id=191583 Please note that this message will contain a full copy of the comment thread, including the initial issue submission, for this request, not just the latest update. Category: Core Group: v 2.3 >Status: Closed >Resolution: Fixed Priority: 5 Private: No Submitted By: seb (seb_ja_perpi) Assigned to: Nobody/Anonymous (nobody) Summary: Old php short tag <? instead of <?php Initial Comment: postfixadmin-2.3/templates/main.php:<? if ($CONF['sendmail'] == "YES") { ?> postfixadmin-2.3/templates/main.php:<? } ?> ---------------------------------------------------------------------- >Comment By: Christian Boltz (christian_boltz) Date: 2009-12-06 02:03 Message: Fixed in 2.3 branch (SVN r786) - thanks for the report! ---------------------------------------------------------------------- You can respond by visiting: https://sourceforge.net/tracker/?func=detail&atid=937964&aid=2908994&group_id=191583 |
|
From: SourceForge.net <no...@so...> - 2009-12-05 16:06:02
|
Bugs item #2909334, was opened at 2009-12-05 19:06 Message generated for change (Tracker Item Submitted) made by fly-away You can respond by visiting: https://sourceforge.net/tracker/?func=detail&atid=937964&aid=2909334&group_id=191583 Please note that this message will contain a full copy of the comment thread, including the initial issue submission, for this request, not just the latest update. Category: Interface (example) Group: v 2.3 Status: Open Resolution: None Priority: 5 Private: No Submitted By: ololo (fly-away) Assigned to: Nobody/Anonymous (nobody) Summary: seems to be alias_control in postfixadmin 2.3 broken Initial Comment: postfixadmin 2.3, php-5.3.1, mysql 5.0.77 Now I set all 3 params to YES: $CONF['alias_control'] = 'YES'; $CONF['alias_control_admin'] = 'YES'; $CONF['special_alias_control'] = 'YES'; and still cant see forward in 'Virtual list' BTW, I can see it in search output. ---------------------------------------------------------------------- You can respond by visiting: https://sourceforge.net/tracker/?func=detail&atid=937964&aid=2909334&group_id=191583 |
|
From: SourceForge.net <no...@so...> - 2009-12-04 19:26:11
|
Bugs item #2908994, was opened at 2009-12-04 19:26 Message generated for change (Tracker Item Submitted) made by seb_ja_perpi You can respond by visiting: https://sourceforge.net/tracker/?func=detail&atid=937964&aid=2908994&group_id=191583 Please note that this message will contain a full copy of the comment thread, including the initial issue submission, for this request, not just the latest update. Category: Core Group: v 2.3 Status: Open Resolution: None Priority: 5 Private: No Submitted By: seb (seb_ja_perpi) Assigned to: Nobody/Anonymous (nobody) Summary: Old php short tag <? instead of <?php Initial Comment: postfixadmin-2.3/templates/main.php:<? if ($CONF['sendmail'] == "YES") { ?> postfixadmin-2.3/templates/main.php:<? } ?> ---------------------------------------------------------------------- You can respond by visiting: https://sourceforge.net/tracker/?func=detail&atid=937964&aid=2908994&group_id=191583 |
|
From: SourceForge.net <no...@so...> - 2009-12-02 17:26:49
|
Bugs item #2905599, was opened at 2009-11-29 05:39 Message generated for change (Comment added) made by libertytrek You can respond by visiting: https://sourceforge.net/tracker/?func=detail&atid=937964&aid=2905599&group_id=191583 Please note that this message will contain a full copy of the comment thread, including the initial issue submission, for this request, not just the latest update. Category: Core Group: v 2.3 Status: Open Resolution: Fixed Priority: 5 Private: No Submitted By: https://www.google.com/accounts () Assigned to: Nobody/Anonymous (nobody) Summary: wapity found XSS in login.php Initial Comment: Penetration tests with Wapity 1.6 found a XSS vulnerability in login.php. Site is running version 2.3. on https. . dani@danici:~$ wapiti https://postfixadmin-server/pfadm Wapiti-1.1.6 (wapiti.sourceforge.net) .... Attacking urls (GET)... ----------------------- Attacking forms (POST)... ------------------------- Found XSS in https://postfixadmin-server/pfadm/users/login.php with params = lang=on&fUsername=%3Cscript%3Evar+wapiti_68747470733a2f2f6272756767652e7479646e65742e6f72672f706661646d2f75736572732f6c6f67696e2e706870_66557365726e616d65%3Dnew+Boolean%28%29%3B%3C%2Fscript%3E&fPassword=on&submit=Login coming from https://postfixadmin-server/pfadm/users/login.php ---------------------------------------------------------------------- Comment By: Charles (libertytrek) Date: 2009-12-02 12:26 Message: Thanks! So... will there be ongoing bugfix releases for the 2.3 non-smarty version going forward? Or is the plan for 2.3.1 to be the first smarty based release? ---------------------------------------------------------------------- Comment By: GingerDog (gingerdog) Date: 2009-12-02 08:25 Message: Ah good point Charles; sorry I should have realised that. Patch to do this : Index: login.php =================================================================== --- login.php (revision 782) +++ login.php (working copy) @@ -65,7 +65,7 @@ { $error = 1; $tMessage = '<span class="error_msg">' . $PALANG['pLogin_failed'] . '</span>'; - $tUsername = $fUsername; + $tUsername = htmlentities($fUsername, ENT_QUOTES, 'UTF-8'); } } else (See changeset 783) ---------------------------------------------------------------------- Comment By: Charles (libertytrek) Date: 2009-12-02 06:56 Message: Question... This bug was reported against 2.3 - but 2.3 is NOT a smarty version... There WILL be NON-smarty 2.3.x bugfix releases, right? ---------------------------------------------------------------------- Comment By: GingerDog (gingerdog) Date: 2009-12-02 05:33 Message: Hi, I'll agree this is a bug/security flaw. I had assumed that Smarty would have been configured to escape all output (i.e using something like htmlentities($data, ENT_QUOTES, 'uff-8'); but it hasn't been I've changed the inc.smarty.php file in revision 782 And now I get the following : orange:~ $ wapiti http://orange/david/postfixadmin/trunk Wapiti-1.1.6 (wapiti.sourceforge.net) .... Attacking urls (GET)... ----------------------- Attacking forms (POST)... ------------------------- Looking for permanent XSS ------------------------- Thanks for reporting this; and thanks for making me aware of wapiti - i hadn't come across it before :) ---------------------------------------------------------------------- Comment By: GingerDog (gingerdog) Date: 2009-12-02 05:33 Message: Thanks for the bug report; we believe this has been fixed in subversion. ---------------------------------------------------------------------- Comment By: Christian Boltz (christian_boltz) Date: 2009-11-29 16:30 Message: I just read the code and can't follow you. The only result I get is a message that my username or password is wrong (as expected), but the script tag is not included anywhere AFAIK. Can you give some details how to exploit this without using wapity? ---------------------------------------------------------------------- You can respond by visiting: https://sourceforge.net/tracker/?func=detail&atid=937964&aid=2905599&group_id=191583 |
|
From: SourceForge.net <no...@so...> - 2009-12-02 13:25:40
|
Bugs item #2905599, was opened at 2009-11-29 10:39 Message generated for change (Comment added) made by gingerdog You can respond by visiting: https://sourceforge.net/tracker/?func=detail&atid=937964&aid=2905599&group_id=191583 Please note that this message will contain a full copy of the comment thread, including the initial issue submission, for this request, not just the latest update. Category: Core Group: v 2.3 Status: Open Resolution: Fixed Priority: 5 Private: No Submitted By: https://www.google.com/accounts () Assigned to: Nobody/Anonymous (nobody) Summary: wapity found XSS in login.php Initial Comment: Penetration tests with Wapity 1.6 found a XSS vulnerability in login.php. Site is running version 2.3. on https. . dani@danici:~$ wapiti https://postfixadmin-server/pfadm Wapiti-1.1.6 (wapiti.sourceforge.net) .... Attacking urls (GET)... ----------------------- Attacking forms (POST)... ------------------------- Found XSS in https://postfixadmin-server/pfadm/users/login.php with params = lang=on&fUsername=%3Cscript%3Evar+wapiti_68747470733a2f2f6272756767652e7479646e65742e6f72672f706661646d2f75736572732f6c6f67696e2e706870_66557365726e616d65%3Dnew+Boolean%28%29%3B%3C%2Fscript%3E&fPassword=on&submit=Login coming from https://postfixadmin-server/pfadm/users/login.php ---------------------------------------------------------------------- >Comment By: GingerDog (gingerdog) Date: 2009-12-02 13:25 Message: Ah good point Charles; sorry I should have realised that. Patch to do this : Index: login.php =================================================================== --- login.php (revision 782) +++ login.php (working copy) @@ -65,7 +65,7 @@ { $error = 1; $tMessage = '<span class="error_msg">' . $PALANG['pLogin_failed'] . '</span>'; - $tUsername = $fUsername; + $tUsername = htmlentities($fUsername, ENT_QUOTES, 'UTF-8'); } } else (See changeset 783) ---------------------------------------------------------------------- Comment By: Charles (libertytrek) Date: 2009-12-02 11:56 Message: Question... This bug was reported against 2.3 - but 2.3 is NOT a smarty version... There WILL be NON-smarty 2.3.x bugfix releases, right? ---------------------------------------------------------------------- Comment By: GingerDog (gingerdog) Date: 2009-12-02 10:33 Message: Hi, I'll agree this is a bug/security flaw. I had assumed that Smarty would have been configured to escape all output (i.e using something like htmlentities($data, ENT_QUOTES, 'uff-8'); but it hasn't been I've changed the inc.smarty.php file in revision 782 And now I get the following : orange:~ $ wapiti http://orange/david/postfixadmin/trunk Wapiti-1.1.6 (wapiti.sourceforge.net) .... Attacking urls (GET)... ----------------------- Attacking forms (POST)... ------------------------- Looking for permanent XSS ------------------------- Thanks for reporting this; and thanks for making me aware of wapiti - i hadn't come across it before :) ---------------------------------------------------------------------- Comment By: GingerDog (gingerdog) Date: 2009-12-02 10:33 Message: Thanks for the bug report; we believe this has been fixed in subversion. ---------------------------------------------------------------------- Comment By: Christian Boltz (christian_boltz) Date: 2009-11-29 21:30 Message: I just read the code and can't follow you. The only result I get is a message that my username or password is wrong (as expected), but the script tag is not included anywhere AFAIK. Can you give some details how to exploit this without using wapity? ---------------------------------------------------------------------- You can respond by visiting: https://sourceforge.net/tracker/?func=detail&atid=937964&aid=2905599&group_id=191583 |
|
From: SourceForge.net <no...@so...> - 2009-12-02 11:56:56
|
Bugs item #2905599, was opened at 2009-11-29 05:39 Message generated for change (Comment added) made by libertytrek You can respond by visiting: https://sourceforge.net/tracker/?func=detail&atid=937964&aid=2905599&group_id=191583 Please note that this message will contain a full copy of the comment thread, including the initial issue submission, for this request, not just the latest update. Category: Core Group: v 2.3 Status: Open Resolution: Fixed Priority: 5 Private: No Submitted By: https://www.google.com/accounts () Assigned to: Nobody/Anonymous (nobody) Summary: wapity found XSS in login.php Initial Comment: Penetration tests with Wapity 1.6 found a XSS vulnerability in login.php. Site is running version 2.3. on https. . dani@danici:~$ wapiti https://postfixadmin-server/pfadm Wapiti-1.1.6 (wapiti.sourceforge.net) .... Attacking urls (GET)... ----------------------- Attacking forms (POST)... ------------------------- Found XSS in https://postfixadmin-server/pfadm/users/login.php with params = lang=on&fUsername=%3Cscript%3Evar+wapiti_68747470733a2f2f6272756767652e7479646e65742e6f72672f706661646d2f75736572732f6c6f67696e2e706870_66557365726e616d65%3Dnew+Boolean%28%29%3B%3C%2Fscript%3E&fPassword=on&submit=Login coming from https://postfixadmin-server/pfadm/users/login.php ---------------------------------------------------------------------- Comment By: Charles (libertytrek) Date: 2009-12-02 06:56 Message: Question... This bug was reported against 2.3 - but 2.3 is NOT a smarty version... There WILL be NON-smarty 2.3.x bugfix releases, right? ---------------------------------------------------------------------- Comment By: GingerDog (gingerdog) Date: 2009-12-02 05:33 Message: Hi, I'll agree this is a bug/security flaw. I had assumed that Smarty would have been configured to escape all output (i.e using something like htmlentities($data, ENT_QUOTES, 'uff-8'); but it hasn't been I've changed the inc.smarty.php file in revision 782 And now I get the following : orange:~ $ wapiti http://orange/david/postfixadmin/trunk Wapiti-1.1.6 (wapiti.sourceforge.net) .... Attacking urls (GET)... ----------------------- Attacking forms (POST)... ------------------------- Looking for permanent XSS ------------------------- Thanks for reporting this; and thanks for making me aware of wapiti - i hadn't come across it before :) ---------------------------------------------------------------------- Comment By: GingerDog (gingerdog) Date: 2009-12-02 05:33 Message: Thanks for the bug report; we believe this has been fixed in subversion. ---------------------------------------------------------------------- Comment By: Christian Boltz (christian_boltz) Date: 2009-11-29 16:30 Message: I just read the code and can't follow you. The only result I get is a message that my username or password is wrong (as expected), but the script tag is not included anywhere AFAIK. Can you give some details how to exploit this without using wapity? ---------------------------------------------------------------------- You can respond by visiting: https://sourceforge.net/tracker/?func=detail&atid=937964&aid=2905599&group_id=191583 |
|
From: SourceForge.net <no...@so...> - 2009-12-02 10:33:51
|
Bugs item #2905599, was opened at 2009-11-29 10:39 Message generated for change (Settings changed) made by gingerdog You can respond by visiting: https://sourceforge.net/tracker/?func=detail&atid=937964&aid=2905599&group_id=191583 Please note that this message will contain a full copy of the comment thread, including the initial issue submission, for this request, not just the latest update. Category: Core Group: v 2.3 Status: Open >Resolution: Fixed Priority: 5 Private: No Submitted By: https://www.google.com/accounts () Assigned to: Nobody/Anonymous (nobody) Summary: wapity found XSS in login.php Initial Comment: Penetration tests with Wapity 1.6 found a XSS vulnerability in login.php. Site is running version 2.3. on https. . dani@danici:~$ wapiti https://postfixadmin-server/pfadm Wapiti-1.1.6 (wapiti.sourceforge.net) .... Attacking urls (GET)... ----------------------- Attacking forms (POST)... ------------------------- Found XSS in https://postfixadmin-server/pfadm/users/login.php with params = lang=on&fUsername=%3Cscript%3Evar+wapiti_68747470733a2f2f6272756767652e7479646e65742e6f72672f706661646d2f75736572732f6c6f67696e2e706870_66557365726e616d65%3Dnew+Boolean%28%29%3B%3C%2Fscript%3E&fPassword=on&submit=Login coming from https://postfixadmin-server/pfadm/users/login.php ---------------------------------------------------------------------- >Comment By: GingerDog (gingerdog) Date: 2009-12-02 10:33 Message: Hi, I'll agree this is a bug/security flaw. I had assumed that Smarty would have been configured to escape all output (i.e using something like htmlentities($data, ENT_QUOTES, 'uff-8'); but it hasn't been I've changed the inc.smarty.php file in revision 782 And now I get the following : orange:~ $ wapiti http://orange/david/postfixadmin/trunk Wapiti-1.1.6 (wapiti.sourceforge.net) .... Attacking urls (GET)... ----------------------- Attacking forms (POST)... ------------------------- Looking for permanent XSS ------------------------- Thanks for reporting this; and thanks for making me aware of wapiti - i hadn't come across it before :) ---------------------------------------------------------------------- Comment By: GingerDog (gingerdog) Date: 2009-12-02 10:33 Message: Thanks for the bug report; we believe this has been fixed in subversion. ---------------------------------------------------------------------- Comment By: Christian Boltz (christian_boltz) Date: 2009-11-29 21:30 Message: I just read the code and can't follow you. The only result I get is a message that my username or password is wrong (as expected), but the script tag is not included anywhere AFAIK. Can you give some details how to exploit this without using wapity? ---------------------------------------------------------------------- You can respond by visiting: https://sourceforge.net/tracker/?func=detail&atid=937964&aid=2905599&group_id=191583 |
|
From: SourceForge.net <no...@so...> - 2009-12-02 10:25:19
|
Bugs item #2898500, was opened at 2009-11-16 14:07 Message generated for change (Settings changed) made by gingerdog You can respond by visiting: https://sourceforge.net/tracker/?func=detail&atid=937964&aid=2898500&group_id=191583 Please note that this message will contain a full copy of the comment thread, including the initial issue submission, for this request, not just the latest update. Category: Languages Group: SVN (please specify revision!) Status: Closed >Resolution: Fixed Priority: 5 Private: No Submitted By: Falco (fschmutz) Assigned to: Nobody/Anonymous (nobody) Summary: French Language Initial Comment: Hello, Just a little submission about french language. Best regards, Falco ---------------------------------------------------------------------- Comment By: Christian Boltz (christian_boltz) Date: 2009-11-16 21:55 Message: commited to SVN r771 Thanks! ---------------------------------------------------------------------- You can respond by visiting: https://sourceforge.net/tracker/?func=detail&atid=937964&aid=2898500&group_id=191583 |
|
From: SourceForge.net <no...@so...> - 2009-11-29 21:30:52
|
Bugs item #2905599, was opened at 2009-11-29 11:39 Message generated for change (Comment added) made by christian_boltz You can respond by visiting: https://sourceforge.net/tracker/?func=detail&atid=937964&aid=2905599&group_id=191583 Please note that this message will contain a full copy of the comment thread, including the initial issue submission, for this request, not just the latest update. Category: Core Group: v 2.3 Status: Open Resolution: None Priority: 5 Private: No Submitted By: https://www.google.com/accounts () Assigned to: Nobody/Anonymous (nobody) Summary: wapity found XSS in login.php Initial Comment: Penetration tests with Wapity 1.6 found a XSS vulnerability in login.php. Site is running version 2.3. on https. . dani@danici:~$ wapiti https://postfixadmin-server/pfadm Wapiti-1.1.6 (wapiti.sourceforge.net) .... Attacking urls (GET)... ----------------------- Attacking forms (POST)... ------------------------- Found XSS in https://postfixadmin-server/pfadm/users/login.php with params = lang=on&fUsername=%3Cscript%3Evar+wapiti_68747470733a2f2f6272756767652e7479646e65742e6f72672f706661646d2f75736572732f6c6f67696e2e706870_66557365726e616d65%3Dnew+Boolean%28%29%3B%3C%2Fscript%3E&fPassword=on&submit=Login coming from https://postfixadmin-server/pfadm/users/login.php ---------------------------------------------------------------------- >Comment By: Christian Boltz (christian_boltz) Date: 2009-11-29 22:30 Message: I just read the code and can't follow you. The only result I get is a message that my username or password is wrong (as expected), but the script tag is not included anywhere AFAIK. Can you give some details how to exploit this without using wapity? ---------------------------------------------------------------------- You can respond by visiting: https://sourceforge.net/tracker/?func=detail&atid=937964&aid=2905599&group_id=191583 |
|
From: SourceForge.net <no...@so...> - 2009-11-29 10:39:01
|
Bugs item #2905599, was opened at 2009-11-29 10:39 Message generated for change (Tracker Item Submitted) made by You can respond by visiting: https://sourceforge.net/tracker/?func=detail&atid=937964&aid=2905599&group_id=191583 Please note that this message will contain a full copy of the comment thread, including the initial issue submission, for this request, not just the latest update. Category: Core Group: v 2.3 Status: Open Resolution: None Priority: 5 Private: No Submitted By: https://www.google.com/accounts () Assigned to: Nobody/Anonymous (nobody) Summary: wapity found XSS in login.php Initial Comment: Penetration tests with Wapity 1.6 found a XSS vulnerability in login.php. Site is running version 2.3. on https. . dani@danici:~$ wapiti https://postfixadmin-server/pfadm Wapiti-1.1.6 (wapiti.sourceforge.net) .... Attacking urls (GET)... ----------------------- Attacking forms (POST)... ------------------------- Found XSS in https://postfixadmin-server/pfadm/users/login.php with params = lang=on&fUsername=%3Cscript%3Evar+wapiti_68747470733a2f2f6272756767652e7479646e65742e6f72672f706661646d2f75736572732f6c6f67696e2e706870_66557365726e616d65%3Dnew+Boolean%28%29%3B%3C%2Fscript%3E&fPassword=on&submit=Login coming from https://postfixadmin-server/pfadm/users/login.php ---------------------------------------------------------------------- You can respond by visiting: https://sourceforge.net/tracker/?func=detail&atid=937964&aid=2905599&group_id=191583 |
|
From: SourceForge.net <no...@so...> - 2009-11-27 00:37:41
|
Feature Requests item #2903105, was opened at 2009-11-24 14:17 Message generated for change (Settings changed) made by christian_boltz You can respond by visiting: https://sourceforge.net/tracker/?func=detail&atid=937967&aid=2903105&group_id=191583 Please note that this message will contain a full copy of the comment thread, including the initial issue submission, for this request, not just the latest update. Category: Interface Improvements (example) Group: None >Status: Closed >Resolution: Duplicate Priority: 5 Private: No Submitted By: J.Kruis (jan-kruis) Assigned to: Nobody/Anonymous (nobody) Summary: css file depending on language Initial Comment: Is it possible to select a different css file depending on the language a user or admin selects during login? I think that this is improving the interface because the amount of caracters depend on the language, for instance in my language dutch many of the tabpositions are to small so that words are spread over two lines in stead of one line in the englisch language. It would be nice to have the oppurtunity to change a css file depending on the choice of language. ---------------------------------------------------------------------- >Comment By: Christian Boltz (christian_boltz) Date: 2009-11-27 01:37 Message: duplicate of https://sourceforge.net/tracker/?func=detail&atid=937967&aid=2903088&group_id=191583 ---------------------------------------------------------------------- You can respond by visiting: https://sourceforge.net/tracker/?func=detail&atid=937967&aid=2903105&group_id=191583 |
|
From: SourceForge.net <no...@so...> - 2009-11-27 00:35:39
|
Feature Requests item #2904488, was opened at 2009-11-26 12:26 Message generated for change (Comment added) made by christian_boltz You can respond by visiting: https://sourceforge.net/tracker/?func=detail&atid=937967&aid=2904488&group_id=191583 Please note that this message will contain a full copy of the comment thread, including the initial issue submission, for this request, not just the latest update. Category: None Group: None >Status: Closed >Resolution: Works For Me Priority: 5 Private: No Submitted By: Tony Hoyle (tonyhoyle) Assigned to: Nobody/Anonymous (nobody) Summary: Allow aliases of real accounts Initial Comment: One of the things that postfix allows, and that I've used quite a bit in the past, is to create accounts that keep a local copy and also send to a remote user, eg. (account) foo (alias) foo: foo, ot...@us... postfixadmin doesn't allow this as it treats the alias and the real account as being in the same namespace and blocks it. I can create the above directly in SQL and postfix doesn't mind, but it upsets postfixadmin somewhat as it puts real accounts into the aliases table & you lose the ability to edit the alias with the UI (as it assumes it's a mailbox not an alias). If it's too difficult to make it work fully just making the alias display in the UI (assuming manual modification of the database) would be a great start. ---------------------------------------------------------------------- >Comment By: Christian Boltz (christian_boltz) Date: 2009-11-27 01:35 Message: This is already possible - you probably just didn't find the config settings to enable this feature ;-) Have a look at [the description of] $CONF['alias_control'], $CONF['alias_control_admin'] and $CONF['special_alias_control']... ---------------------------------------------------------------------- You can respond by visiting: https://sourceforge.net/tracker/?func=detail&atid=937967&aid=2904488&group_id=191583 |
|
From: SourceForge.net <no...@so...> - 2009-11-26 11:26:13
|
Feature Requests item #2904488, was opened at 2009-11-26 11:26 Message generated for change (Tracker Item Submitted) made by tonyhoyle You can respond by visiting: https://sourceforge.net/tracker/?func=detail&atid=937967&aid=2904488&group_id=191583 Please note that this message will contain a full copy of the comment thread, including the initial issue submission, for this request, not just the latest update. Category: None Group: None Status: Open Resolution: None Priority: 5 Private: No Submitted By: Tony Hoyle (tonyhoyle) Assigned to: Nobody/Anonymous (nobody) Summary: Allow aliases of real accounts Initial Comment: One of the things that postfix allows, and that I've used quite a bit in the past, is to create accounts that keep a local copy and also send to a remote user, eg. (account) foo (alias) foo: foo, ot...@us... postfixadmin doesn't allow this as it treats the alias and the real account as being in the same namespace and blocks it. I can create the above directly in SQL and postfix doesn't mind, but it upsets postfixadmin somewhat as it puts real accounts into the aliases table & you lose the ability to edit the alias with the UI (as it assumes it's a mailbox not an alias). If it's too difficult to make it work fully just making the alias display in the UI (assuming manual modification of the database) would be a great start. ---------------------------------------------------------------------- You can respond by visiting: https://sourceforge.net/tracker/?func=detail&atid=937967&aid=2904488&group_id=191583 |
|
From: SourceForge.net <no...@so...> - 2009-11-24 13:17:39
|
Feature Requests item #2903105, was opened at 2009-11-24 14:17 Message generated for change (Tracker Item Submitted) made by jan-kruis You can respond by visiting: https://sourceforge.net/tracker/?func=detail&atid=937967&aid=2903105&group_id=191583 Please note that this message will contain a full copy of the comment thread, including the initial issue submission, for this request, not just the latest update. Category: Interface Improvements (example) Group: None Status: Open Resolution: None Priority: 5 Private: No Submitted By: J.Kruis (jan-kruis) Assigned to: Nobody/Anonymous (nobody) Summary: css file depending on language Initial Comment: Is it possible to select a different css file depending on the language a user or admin selects during login? I think that this is improving the interface because the amount of caracters depend on the language, for instance in my language dutch many of the tabpositions are to small so that words are spread over two lines in stead of one line in the englisch language. It would be nice to have the oppurtunity to change a css file depending on the choice of language. ---------------------------------------------------------------------- You can respond by visiting: https://sourceforge.net/tracker/?func=detail&atid=937967&aid=2903105&group_id=191583 |
|
From: SourceForge.net <no...@so...> - 2009-11-24 12:49:17
|
Feature Requests item #2903088, was opened at 2009-11-24 13:49 Message generated for change (Tracker Item Submitted) made by jan-kruis You can respond by visiting: https://sourceforge.net/tracker/?func=detail&atid=937967&aid=2903088&group_id=191583 Please note that this message will contain a full copy of the comment thread, including the initial issue submission, for this request, not just the latest update. Category: Interface Improvements (example) Group: None Status: Open Resolution: None Priority: 5 Private: No Submitted By: J.Kruis (jan-kruis) Assigned to: Nobody/Anonymous (nobody) Summary: css file depending on language Initial Comment: Is it possible to select a different css file depending on the language a user or admin selects during login? I think that this is improving the interface because the amount of caracters depend on the language, for instance in my language dutch many of the tabpositions are to small so that words are spread over two lines in stead of one line in the englisch language. It would be nice to have the oppurtunity to change a css file depending on the choice of language. ---------------------------------------------------------------------- You can respond by visiting: https://sourceforge.net/tracker/?func=detail&atid=937967&aid=2903088&group_id=191583 |
|
From: SourceForge.net <no...@so...> - 2009-11-19 23:02:16
|
Patches item #2900334, was opened at 2009-11-19 10:44 Message generated for change (Settings changed) made by christian_boltz You can respond by visiting: https://sourceforge.net/tracker/?func=detail&atid=937966&aid=2900334&group_id=191583 Please note that this message will contain a full copy of the comment thread, including the initial issue submission, for this request, not just the latest update. Category: Languages Group: None >Status: Closed >Resolution: Accepted Priority: 5 Private: No Submitted By: Pavel Usischev (pusischev) Assigned to: Nobody/Anonymous (nobody) Summary: Updated ru.lang Initial Comment: Attached is updated ru.lang based on svn rev. 772. ---------------------------------------------------------------------- Comment By: Christian Boltz (christian_boltz) Date: 2009-11-20 00:01 Message: Thanks! commited to SVN r773 ---------------------------------------------------------------------- You can respond by visiting: https://sourceforge.net/tracker/?func=detail&atid=937966&aid=2900334&group_id=191583 |
|
From: SourceForge.net <no...@so...> - 2009-11-19 23:01:53
|
Patches item #2900334, was opened at 2009-11-19 10:44 Message generated for change (Comment added) made by christian_boltz You can respond by visiting: https://sourceforge.net/tracker/?func=detail&atid=937966&aid=2900334&group_id=191583 Please note that this message will contain a full copy of the comment thread, including the initial issue submission, for this request, not just the latest update. Category: Languages Group: None Status: Open Resolution: None Priority: 5 Private: No Submitted By: Pavel Usischev (pusischev) Assigned to: Nobody/Anonymous (nobody) Summary: Updated ru.lang Initial Comment: Attached is updated ru.lang based on svn rev. 772. ---------------------------------------------------------------------- >Comment By: Christian Boltz (christian_boltz) Date: 2009-11-20 00:01 Message: Thanks! commited to SVN r773 ---------------------------------------------------------------------- You can respond by visiting: https://sourceforge.net/tracker/?func=detail&atid=937966&aid=2900334&group_id=191583 |
|
From: SourceForge.net <no...@so...> - 2009-11-19 09:44:55
|
Patches item #2900334, was opened at 2009-11-19 12:44 Message generated for change (Tracker Item Submitted) made by pusischev You can respond by visiting: https://sourceforge.net/tracker/?func=detail&atid=937966&aid=2900334&group_id=191583 Please note that this message will contain a full copy of the comment thread, including the initial issue submission, for this request, not just the latest update. Category: Languages Group: None Status: Open Resolution: None Priority: 5 Private: No Submitted By: Pavel Usischev (pusischev) Assigned to: Nobody/Anonymous (nobody) Summary: Updated ru.lang Initial Comment: Attached is updated ru.lang based on svn rev. 772. ---------------------------------------------------------------------- You can respond by visiting: https://sourceforge.net/tracker/?func=detail&atid=937966&aid=2900334&group_id=191583 |
|
From: SourceForge.net <no...@so...> - 2009-11-18 11:35:59
|
Feature Requests item #2899733, was opened at 2009-11-18 12:35 Message generated for change (Tracker Item Submitted) made by christian_boltz You can respond by visiting: https://sourceforge.net/tracker/?func=detail&atid=937967&aid=2899733&group_id=191583 Please note that this message will contain a full copy of the comment thread, including the initial issue submission, for this request, not just the latest update. Category: Core Group: None Status: Open Resolution: None Priority: 5 Private: No Submitted By: Christian Boltz (christian_boltz) Assigned to: Nobody/Anonymous (nobody) Summary: add session test to setup.php Initial Comment: I had to debug some problems with the session cookies in #postfixadmin over the last weeks . There were various reasons why it failed, for example: - chrooted apache on openbsd, and the session.safe_path (/tmp) did not exist in chroot - broken setting of session.cookie_path We should add a test to setup.php: (the code below needs some enhancements before it goes to setup.php) session_start(); $_SESSION['works'] = 1; header ('Location: session.php?sessiontest=' . session_id() ); and with sessiontest=1 set: session-start(); if ($_SESSION['works'] == 1) { echo "session works"; } elseif (session_id() != $_GET['session_id']) { echo "error with session cookie - does your browser allow cookies?"; } elseif ($_SESSION['works'] != 1) { echo "Session did not save data"; } else { echo "unknown session problem"; } The cookie check should also be implemented in login.php by adding the session id to a hidden field in the login form. ---------------------------------------------------------------------- You can respond by visiting: https://sourceforge.net/tracker/?func=detail&atid=937967&aid=2899733&group_id=191583 |
|
From: SourceForge.net <no...@so...> - 2009-11-16 21:56:09
|
Patches item #2894512, was opened at 2009-11-09 12:37 Message generated for change (Comment added) made by christian_boltz You can respond by visiting: https://sourceforge.net/tracker/?func=detail&atid=937966&aid=2894512&group_id=191583 Please note that this message will contain a full copy of the comment thread, including the initial issue submission, for this request, not just the latest update. Category: Languages Group: None >Status: Closed >Resolution: Accepted Priority: 5 Private: No Submitted By: Iñaki R. (virtualminds) Assigned to: Nobody/Anonymous (nobody) Summary: ES translation Initial Comment: ES translation update ---------------------------------------------------------------------- >Comment By: Christian Boltz (christian_boltz) Date: 2009-11-16 22:56 Message: commited to SVN r771 Thanks! ---------------------------------------------------------------------- You can respond by visiting: https://sourceforge.net/tracker/?func=detail&atid=937966&aid=2894512&group_id=191583 |
|
From: SourceForge.net <no...@so...> - 2009-11-16 21:55:50
|
Bugs item #2898500, was opened at 2009-11-16 15:07 Message generated for change (Comment added) made by christian_boltz You can respond by visiting: https://sourceforge.net/tracker/?func=detail&atid=937964&aid=2898500&group_id=191583 Please note that this message will contain a full copy of the comment thread, including the initial issue submission, for this request, not just the latest update. Category: Languages Group: SVN (please specify revision!) >Status: Closed >Resolution: Accepted Priority: 5 Private: No Submitted By: Falco (fschmutz) Assigned to: Nobody/Anonymous (nobody) Summary: French Language Initial Comment: Hello, Just a little submission about french language. Best regards, Falco ---------------------------------------------------------------------- >Comment By: Christian Boltz (christian_boltz) Date: 2009-11-16 22:55 Message: commited to SVN r771 Thanks! ---------------------------------------------------------------------- You can respond by visiting: https://sourceforge.net/tracker/?func=detail&atid=937964&aid=2898500&group_id=191583 |
|
From: SourceForge.net <no...@so...> - 2009-11-16 21:22:15
|
Bugs item #2897326, was opened at 2009-11-13 17:28 Message generated for change (Comment added) made by christian_boltz You can respond by visiting: https://sourceforge.net/tracker/?func=detail&atid=937964&aid=2897326&group_id=191583 Please note that this message will contain a full copy of the comment thread, including the initial issue submission, for this request, not just the latest update. Category: Interface (example) Group: v 2.2 >Status: Closed >Resolution: Works For Me Priority: 5 Private: No Submitted By: Sammitch () Assigned to: Nobody/Anonymous (nobody) Summary: User cannot be added to domain and subdomain Initial Comment: Let's say we have two mail domains: example.com and dev.example.com. If I create a mailbox te...@ex... I am not permitted to create another mailbox for te...@de..., or vice versa. The error returned is "The EMAIL is not valid!" ---------------------------------------------------------------------- >Comment By: Christian Boltz (christian_boltz) Date: 2009-11-16 22:22 Message: I'm 99% sure that your "dev.example.com" is not resolvable by your nameserver. Postfixadmin does a DNS lookup by default, and will then display the error message you listed. The best solution is to setup the domain in your nameserver (it probably won't be able to receive mails otherwise). If you really don't want the DNS checks, set $CONF['emailcheck_resolve_domain'] to NO. If your problem is in the remaining 1% ;-) feel free to reopen this bugreport. BTW: Postfixadmin 2.3 has a more detailed error message in this case, which explicitely lists non-resolvable domains. It also contains several new features and lots of bugfixes - I strongly recommend to upgrade. ---------------------------------------------------------------------- You can respond by visiting: https://sourceforge.net/tracker/?func=detail&atid=937964&aid=2897326&group_id=191583 |
|
From: SourceForge.net <no...@so...> - 2009-11-16 15:34:33
|
Feature Requests item #2898540, was opened at 2009-11-16 16:34 Message generated for change (Tracker Item Submitted) made by fschmutz You can respond by visiting: https://sourceforge.net/tracker/?func=detail&atid=937967&aid=2898540&group_id=191583 Please note that this message will contain a full copy of the comment thread, including the initial issue submission, for this request, not just the latest update. Category: None Group: None Status: Open Resolution: None Priority: 5 Private: No Submitted By: Falco (fschmutz) Assigned to: Nobody/Anonymous (nobody) Summary: Multi Vacation Activation Initial Comment: Hello, After a fast discussion in forum :-) I m very low in php, but the idea is very simple. Some of my customer need sometime to active vacation system for a group of people (example 'Sales Team'). We think maybe is a good way to do it by domain admin. Like checkbox for select account and edit area message must be the best practice. Thanks ! :o) Falco ---------------------------------------------------------------------- You can respond by visiting: https://sourceforge.net/tracker/?func=detail&atid=937967&aid=2898540&group_id=191583 |
|
From: SourceForge.net <no...@so...> - 2009-11-16 14:07:38
|
Bugs item #2898500, was opened at 2009-11-16 15:07 Message generated for change (Tracker Item Submitted) made by fschmutz You can respond by visiting: https://sourceforge.net/tracker/?func=detail&atid=937964&aid=2898500&group_id=191583 Please note that this message will contain a full copy of the comment thread, including the initial issue submission, for this request, not just the latest update. Category: Languages Group: SVN (please specify revision!) Status: Open Resolution: None Priority: 5 Private: No Submitted By: Falco (fschmutz) Assigned to: Nobody/Anonymous (nobody) Summary: French Language Initial Comment: Hello, Just a little submission about french language. Best regards, Falco ---------------------------------------------------------------------- You can respond by visiting: https://sourceforge.net/tracker/?func=detail&atid=937964&aid=2898500&group_id=191583 |
|
From: SourceForge.net <no...@so...> - 2009-11-13 16:28:15
|
Bugs item #2897326, was opened at 2009-11-13 09:28 Message generated for change (Tracker Item Submitted) made by You can respond by visiting: https://sourceforge.net/tracker/?func=detail&atid=937964&aid=2897326&group_id=191583 Please note that this message will contain a full copy of the comment thread, including the initial issue submission, for this request, not just the latest update. Category: Interface (example) Group: v 2.2 Status: Open Resolution: None Priority: 5 Private: No Submitted By: Sammitch () Assigned to: Nobody/Anonymous (nobody) Summary: User cannot be added to domain and subdomain Initial Comment: Let's say we have two mail domains: example.com and dev.example.com. If I create a mailbox te...@ex... I am not permitted to create another mailbox for te...@de..., or vice versa. The error returned is "The EMAIL is not valid!" ---------------------------------------------------------------------- You can respond by visiting: https://sourceforge.net/tracker/?func=detail&atid=937964&aid=2897326&group_id=191583 |