A new opensmtpd portable snapshot is available at: http://www.opensmtpd.org/archives/opensmtpd-201410152136p1.tar.gz
Checksum: SHA256 (opensmtpd-201410152136p1.tar.gz) = 4d468b339cced19fddd9087e4d0076548c1ff1f451f46f708a6c923b20631063 A summary of the content of this snapshot is available below. Please test and let us know if it breaks something! If this snapshot doesn't work, please also test with a previous one, to help us spot where the issue is coming from. You can access all previous snapshots here: http://www.opensmtpd.org/archives/ The OpenSMTPD team ;-) Summary of changes since last snapshot (opensmtpd-201410131657p1): ----------------------------------------------------------------- - failure in header parsing should always lead to MF_ERROR_MALFORMED - fix memory leak in rfc822 parser - add limit to the number of header lines we're willing to buffer - allow empty headers [1] - disallow SSLv3 [1] Author: Emmanuel Vadot -- You received this mail because you are subscribed to misc@opensmtpd.org To unsubscribe, send a mail to: misc+unsubscr...@opensmtpd.org