Mail's Best Friend LLC

Mail's Best Friend LLC We help our clients build and maintain the best Email solutions in the world.

We help our clients build and maintain the best Email solutions in the world. We offer: Fully integrated eMail solutions using best-of-breed components. Fully customized integration, support, and management resources. Solutions that reduce costs, improve performance, and provide a sustainable competitive advantage. If you work with Email, you need Mail's Best Friend!

Mission: Our mission is to be the one-stop-shop for all things Email and Web related.


Hey everyone. If you are using Declude and SmarterMail, please hold off on upgrading to SM version 7459. We have discovered an issue and are working towards a resolution. We will provide an update as soon as we can.


Today Exim 4.94. was released!

There are no significant changes since RC2.

For changes in 4.94 that ARE LIKELY TO AFFECT existing runtime
configurations please see:

For new features and new options in 4.94 please see:

For changes that could affect an existing runtime configuration
please see:

You can find Exim 4.94 in the following locations:
Git repository:

tagged as exim-4.94

Tarballs and Docs:

The tagged commit, the tag, the tarballs, and the checksum files are
signed with my GPG key. The key can be found e.g. here: and in many other
places. Please crosscheck.

(The Exim website may not be updated yet.)

Postfix stable release 3.5.2 and legacy releases 3.4.12, 3.2.10, 3.2.15!Postfix versions 3.5.2, 3.4.12, 3.2.10, 3.2.15: ...
The Postfix Home Page

Postfix stable release 3.5.2 and legacy releases 3.4.12, 3.2.10, 3.2.15!

Postfix versions 3.5.2, 3.4.12, 3.2.10, 3.2.15:

* A TLS error for a database client caused a false 'lost connection'
error for an SMTP over TLS session in the same Postfix process.
Reported by Alexander Vasarab, diagnosed by Viktor Dukhovni.
This bug was introduced with Postfix 2.2.

* The same bug existed in the tlsproxy(8) daemon, where a TLS
error for one TLS session could cause a false 'lost connection'
error for a concurrent TLS session in the same process. This
bug was introduced with Postfix 2.8.

* The Postfix build now disables DANE support on Linux systems
with libc-musl such as Alpine, because libc-musl provides no
indication whether DNS responses are authentic. This broke DANE
support without a clear explanation.

* Due to implementation changes in the ICU library, some Postfix
daemons reported file access errrors (U_FILE_ACCESS_ERROR) after
chroot(). This was fixed by initializing the ICU library before
making the chroot() call.

* Minor code changes to silence a compiler that special-cases
string literals.

Postfix 3.5.2, 3.4.12:

* Segfault (null pointer) in the tlsproxy(8) client role when the
server role was disabled. This typically happened on systems
that do not receive mail, after configuring connection reuse
for outbound SMTP over TLS.

* The date portion of the maillog_file_rotate_suffix default value
used the minute (%M) instead of the month (%m). Reported by
Larry Stone.

You can find the updated Postfix source code at the mirrors listed

What is Postfix? It is Wietse Venema's mail server that started life at IBM research as an alternative to the widely-used Sendmail program. Now at Google, Wietse continues to support Postfix.


Exim 4.94 RC1 published!

Hash: SHA256

Release Candidate 1 for Exim release 4.94...

The commit for RC1 is 632b9f8daa, at git://

- ---------------------------------------------------------
New features since RC0:

- - An option on all single-key lookups, to return (on a hit) a de-tainted
version of the lookup key rather than the looked-up data.

- - $domain_data and $localpart_data are now set by all list-match
Previously only list items that performed lookups did so.
Also, matching list items that are tail-match or RE-match now set the
numeric variables $0 (etc) in the same way os other RE matches.

- - bounce_message_file and warn_message_file are now expanded before use.

Changes since RC0:

- - Fix a memory-handling bug: when a connection carried multiple messages
and an ACL use a lookup for checking either the local_part or domain,
stale data could be accessed. Ensure that variable references are
dropped between messages.

- - Fix SPA authenticator. Running as a server, an offset supplied
by the client was not checked as pointing within response data before
being used. A malicious client could thus cause an out-of-bounds read and
possibly gain authentication. Fix by adding the check.

- - Internationalisation: change the default for downconversion in the smtp
transport to be "if needed". Previously it was "as previously set" for
the message, which usually meant "if needed" for message-submission but
"no" for everything else. However, MTAs have been seen using SMTPUTF8
even when the envelope addresses did not need it, resulting in forwarding
failures to non-supporting MTAs. A downconvert in such cases will be
a no-op on the addresses, merely dropping the use of SMTPUTF8 by the
transport. The change does mean that addresses needing conversion will
be converted when previously a delivery failure would occur.

- - Fix possible long line in DSN. Previously when a very long SMTP error
response was received it would be used unchecked in a fail-DSN, violating
standards on line-length limits. Truncate if needed.

- --------------------------------------------------------------

Checksums for RC1:

SHA256 (exim-4.94-RC1.tar.bz2) = 24718d7b9354c3cdf65a6b261fcb5102d67163220dddc346caa1fe6bd3cc40b5
SHA256 (exim-4.94-RC1.tar.gz) = 0c6bb17cd0ee12fbb3ca3ebbfccbbb1462f8d111d36d49385946e354614fd508
SHA256 (exim-4.94-RC1.tar.xz) = 85c24cbcb3142934083fb492774fdedd5bfa814a850b47b3a75d3bedf03c562e
SHA256 (exim-html-4.94-RC1.tar.bz2) = 4be463206f9f404f88a484ea7d7d597d4249e387c39b82a333618e9514a9f450
SHA256 (exim-html-4.94-RC1.tar.gz) = f1466910671299d883ada2f4c7d2e319b9f6f10ff19bcc19b7eb477730883c93
SHA256 (exim-html-4.94-RC1.tar.xz) = 52dddc5f159ed4e709bc4b1f3c8c84c0039fb21df6b11095474512db4702ae7f
SHA256 (exim-pdf-4.94-RC1.tar.bz2) = 12bbb769f233156a2107e6c55731b960f172a55746dbdc926bbd0e758f30cd5d
SHA256 (exim-pdf-4.94-RC1.tar.gz) = 6c5835b5b8f7367e6a7e00ebea0ceb146a6c8e8deef998c007886652423c46fc
SHA256 (exim-pdf-4.94-RC1.tar.xz) = f2005e65929dcdf5d42e2ce63ad8b03fced85208e484b0e0995c81c3db27c2ea
SHA256 (exim-postscript-4.94-RC1.tar.bz2) = bc7c39bb7fdea1c1cf0b5a7d22ea9f76858c9be736ac490eadbcb6eef4592e99
SHA256 (exim-postscript-4.94-RC1.tar.gz) = f55b3753178f3fc351294f047251400a4f9cd044ae551a5886a37ae9ed35415f
SHA256 (exim-postscript-4.94-RC1.tar.xz) = b594a4980f6bf04589f6cba8f08305df16ce076f0ca10b4995258d6e768ea6fc

There are PGP signature files in the same ftp directory, signed by Jeremy using
key A986F3A6BD6377D8730958DEBCE58C8CE41F32DF.

- --


## List details at
## Exim details at
## Please use the Wiki with this list -


Postfix stable release 3.5.1 and legacy releases 3.4.11, 3.3.9, 3.2.14 Now Available!

Postfix versions 3.5.1, 3.4.11, 3.3.9, 3.2.14:

Bitrot workaround for broken builds after an incompatible change in GCC 10.

Bitrot workaround for broken DANE/DNSSEC support after an incompatible change in GLIBC 2.31.
This change avoids the need for new options in /etc/resolv.conf.

Postfix 3.3.9, 3.2.14:

Bitrot workarounds for Linux 5 and GLIBC resolver flags.

You can find the updated Postfix source code at the mirrors listed at


Any cPanel app/plugin developers out there looking for work and willing to chat with us about a contract-based development project? If yes, please contact us at [email protected]. Please pass this around. Thanks!


Leesburg, VA

Opening Hours

Monday 09:00 - 17:00
Tuesday 09:00 - 17:00
Wednesday 09:00 - 17:00
Thursday 09:00 - 17:00
Friday 09:00 - 17:00


(866) 919-2075


Be the first to know and let us send you an email when Mail's Best Friend LLC posts news and promotions. Your email address will not be used for any other purpose, and you can unsubscribe at any time.

Contact The Business

Send a message to Mail's Best Friend LLC:

Nearby computer & electronics services

Other Computer services in Leesburg

Show All