On Sun, Jan 30, 2022 at 10:55:40AM +0100, Eric Faurot wrote:
> Hi.
>
> This diff makes use of the new libtls signer api to simplify tls privsep.
Updated diff after libtls signer api tweak by jsing@
Eric.
Index: ca.c
===
Hi.
This diff makes use of the new libtls signer api to simplify tls privsep.
Eric.
Index: ca.c
===
RCS file: /cvs/src/usr.sbin/smtpd/ca.c,v
retrieving revision 1.40
diff -u -p -r1.40 ca.c
--- ca.c14 Jun 2021 17:58:15 -
+1 improvement here too.
before: ~50 mbit/s
after: ~75 mbit/s
hth,
cheers,
eric.
On Tue, Oct 12, 2021 at 8:27 PM Felix Kronlage-Dammers
wrote:
>
> On Tue, Oct 12, 2021 at 04:29:47PM +0200, Hrvoje Popovski wrote:
>
> > > Please sync your source tree before attempting t
Hi.
A user reported that decoded SRS addresses are not correctly evaluated
against the ruleset. That's because the ruleset always matches against
the expanded address ("dest") and not the original address ("rcpt").
This diff should fix it.
Eric.
oad
speed..
Upload: 74.45 Mbit/s
HTH,
Eric.
On Sat, Sep 11, 2021 at 12:15 PM Stefan Sperling wrote:
>
> On Fri, Sep 10, 2021 at 06:49:49PM +0200, Stefan Sperling wrote:
> > Here is another attempt at adding T
Hello,
X1 gen5 continues to work fine.
X1 gen9 x11 stopped crashing and is now usable! (Tiger lake)
Thank you!
Eric
On Thu, 8 Jul 2021 at 09:41, Jonathan Gray wrote:
>
> The latest xf86-video-amdgpu release was in 2019.
>
> xf86-video-amdgpu-19.1.0..origin/master
>
> minus
Except for specific cases, SMTP servers do not expect client
certificates for TLS sessions. The log message for missing certificate
is not very useful in practice (handshake fails before if it was
required anyway), and it is even confusing for people.
I think it can go away.
Eric.
Index
tation could be factorized a bit, but that's a
detail at this time. I think the close operation (is it really useful anyway?)
should use fclose() instead of kill(), and maybe wait() too?
Eric.
Hi.
Slightly updated diff, including sys/tree.h in smtpd.h.
Eric.
Index: aliases.c
===
RCS file: /cvs/src/usr.sbin/smtpd/aliases.c,v
retrieving revision 1.78
diff -u -p -r1.78 aliases.c
--- aliases.c 28 Apr 2020 21:46:43 -
On Thu, May 27, 2021 at 08:13:36AM -0600, Todd C. Miller wrote:
> On Thu, 27 May 2021 13:14:30 +0200, Eric Faurot wrote:
>
> > New diff with small tweaks.
>
> It looks like you are relying on sys/queue.h being included implicitly.
> Since smtpd.h uses the TAILQ macros,
New diff with small tweaks.
Eric.
Index: aliases.c
===
RCS file: /cvs/src/usr.sbin/smtpd/aliases.c,v
retrieving revision 1.78
diff -u -p -r1.78 aliases.c
--- aliases.c 28 Apr 2020 21:46:43 - 1.78
+++ aliases.c 26 May
Cruft has accumulated on that front. This diff cleans it up: the few
headers that are directly required for smtpd.h are included there, and
unnecessary includes are removed from the rest of the files.
Eric.
Index: aliases.c
===
RCS
() is called early in smtpctl.c, since it uses files (iobuf.c)
that uses the log api. It still logs to stderr though.
Eric.
Index: bounce.c
===
RCS file: /cvs/src/usr.sbin/smtpd/bounce.c,v
retrieving revision 1.83
diff -u -p -r1.83 bounce.c
This diff removes more unused code.
Eric.
Index: config.c
===
RCS file: /cvs/src/usr.sbin/smtpd/config.c,v
retrieving revision 1.55
diff -u -p -r1.55 config.c
--- config.c9 Apr 2021 16:43:43 - 1.55
+++ config.c25
(undocumented) that can be recycled too
Eric.
Index: smtp.1
===
RCS file: /cvs/src/usr.sbin/smtpd/smtp.1,v
retrieving revision 1.11
diff -u -p -r1.11 smtp.1
--- smtp.1 22 May 2021 12:16:06 - 1.11
+++ smtp.1 22 May
Here is an updated diff integrating different suggestions I received.
- use -T (for TLS) instead of -O
- use getsubopt(3) which I didn't know
- manpage tweaks
Eric.
Index: smtp.1
===
RCS file: /cvs/src/usr.sbin/smtpd/smtp.1,v
Hello.
This diff allows to specify protcols and ciphers in smtp(1).
I thought it was cleaner to added a generic -O option flag for this.
Eric.
Index: smtp.1
===
RCS file: /cvs/src/usr.sbin/smtpd/smtp.1,v
retrieving revision 1.9
On Wed, Apr 21, 2021 at 11:21:51AM +0200, Eric Faurot wrote:
> There is actually no reason to defer calls to tls_accept_socket() and
> tls_connect_socket() in an event callback. The code can be simplified
> by a great deal. It also eliminates the issue of keeping a reference
> to
There is actually no reason to defer calls to tls_accept_socket() and
tls_connect_socket() in an event callback. The code can be simplified
by a great deal. It also eliminates the issue of keeping a reference
to the listener tls context in the io structure.
Eric.
Index: ioev.c
On Sun, Apr 11, 2021 at 01:54:32PM +0200, Eric Faurot wrote:
> Certificate verification is done by libtls. The former code is not used
> anymore and can be unplugged.
Anyone willing to ok this?
> Eric.
>
> Inde
On Mon, Apr 12, 2021 at 07:56:57AM -0400, Dave Voutila wrote:
>
> Eric Faurot writes:
>
> > Certificate verification is done by libtls. The former code is not used
> > anymore and can be unplugged.
>
> Should cert.c be removed? I don't think it's used by smtp{d,ctl}
Certificate verification is done by libtls. The former code is not used
anymore and can be unplugged.
Eric.
Index: dispatcher.c
===
RCS file: /cvs/src/usr.sbin/smtpd/dispatcher.c,v
retrieving revision 1.2
diff -u -p -r1.2
Do not build unused files and remove related prototypes.
Also remove bogus libm dependency.
Index: smtpd.h
===
RCS file: /cvs/src/usr.sbin/smtpd/smtpd.h,v
retrieving revision 1.666
diff -u -p -r1.666 smtpd.h
--- smtpd.h 10 Apr
This diff removes unused code and lib depends from smtp(1).
Eric.
Index: smtpc.c
===
RCS file: /cvs/src/usr.sbin/smtpd/smtpc.c,v
retrieving revision 1.14
diff -u -p -r1.14 smtpc.c
--- smtpc.c 5 Mar 2021 12:37:32 - 1.14
Hi,
This diff allows to specify tls ciphers and protocols on listen rules,
as it's been done already for relay actions. While there, sanitize
error checking on protocols config in the mta.
Eric.
Index: config.c
===
RCS file: /cvs
If not cipher list is specified for a relay rule, fallback to
the global cipher list if defined, rather than libtls default.
This is closer to the previous behavior.
Eric.
Index: mta.c
===
RCS file: /cvs/src/usr.sbin/smtpd/mta.c,v
Any objection or ok?
On Sat, Mar 27, 2021 at 12:52:11PM +0100, Eric Faurot wrote:
> Hello.
>
> I get reports from people seeing "vfprintf %s NULL" in their logs
> recently. The problem is in a function that should be fixed,
> but that function is only expected to
uated when tracing is not set.
Eric.
Index: smtpd.h
===
RCS file: /cvs/src/usr.sbin/smtpd/smtpd.h,v
retrieving revision 1.662
diff -u -p -r1.662 smtpd.h
--- smtpd.h 5 Mar 2021 12:37:32 - 1.662
+++ smtpd.h 23 Mar 202
Hi.
This diff allows to specify the protocol versions and ciphers
to use for outgoing TLS sessions on a per relay basis.
Eric.
Index: mta.c
===
RCS file: /cvs/src/usr.sbin/smtpd/mta.c,v
retrieving revision 1.235
diff -u -p -r1.235
As spotted by krw@, the mta should use the mx hostname for sni, not
the reverse dns for the peer address.
Eric.
Index: mta_session.c
===
RCS file: /cvs/src/usr.sbin/smtpd/mta_session.c,v
retrieving revision 1.139
diff -u -p -r1.139
Hi.
The diff seems to work for the few people who tested it (thanks).
Anyone wants to ok this?
Eric.
Index: ca.c
===
RCS file: /cvs/src/usr.sbin/smtpd/ca.c,v
retrieving revision 1.37
diff -u -p -r1.37 ca.c
--- ca.c31 Dec
No much report so far.
Anybody had a chance to test this?
Here is the same diff again with manpage update this time.
Eric.
Index: ca.c
===
RCS file: /cvs/src/usr.sbin/smtpd/ca.c,v
retrieving revision 1.37
diff -u -p -r1.37 ca.c
istener must have at least one certificate
explicitly set. The extra ones are used for SNI, and only the specified
certificates will be used for this listener. So there is no more fallback
or global lookup on configured pki names.
Tests and comments would be greatly ap
ing in place and just need to hook it up.
>
> OK?
ok eric@
> martijn@
>
> Index: smtpc.c
> ===
> RCS file: /cvs/src/usr.sbin/smtpd/smtpc.c,v
> retrieving revision 1.11
> diff -u -p -r1.11 smtpc.c
>
straight-forward and should not
change the current behaviour.
Please test and report if you are using server-side tls.
Eric.
Index: smtp_session.c
===
RCS file: /cvs/src/usr.sbin/smtpd/smtp_session.c,v
retrieving revision 1.426
diff
then "user"
expands to "catchall" because it is interpreted as "user@" (empty
domain).
The catch-all fallback mechanism is really meant for full email
addresses in virtual context, and should not happen for usernames.
The
Hi,
The current code for aliases_get() is a bit contorted I think.
This diff makes it clearer.
Eric.
Index: aliases.c
===
RCS file: /cvs/src/usr.sbin/smtpd/aliases.c,v
retrieving revision 1.77
diff -u -p -r1.77 aliases.c
is way, it is also explaining our behaviour in case
> of inet6 vs inet4 conditions.
>
> So... I think it should stay. Eric, do you have an opinion?
The doc lies because the inet6 option does not set the RES_USE_INET6
flag as stated. I think we should leave the entry in the doc but
On Tue, Apr 21, 2020 at 07:08:48AM +, gil...@poolp.org wrote:
> April 21, 2020 4:28 AM, "Todd C. Miller" wrote:
>
> > On Mon, 20 Apr 2020 15:01:31 +0200, Eric Faurot wrote:
> >
> >> There has been a discussion a while ago about the issue of trailing CR
the other envelope validation checks
that happen at envelope load time.
Eric.
Index: queue.c
===
RCS file: /cvs/src/usr.sbin/smtpd/queue.c,v
retrieving revision 1.189
diff -u -p -r1.189 queue.c
--- queue.c 30 Dec 2018 23:0
at the protocol level if needed.
So this diffs moves the CR stripping from io level to protocol level for
SMTP dialogs. Other uses of io_getline() are internal and expect simple LF
line ending. The current behavior should not change.
Comments?
Eric.
Index: bounce.c
eld.
Note that this is a protocol change, so external filters will have
to be updated.
Eric.
Index: lka_filter.c
===
RCS file: /cvs/src/usr.sbin/smtpd/lka_filter.c,v
retrieving revision 1.60
diff -u -p -r1.60 lka_filter.c
--- lka_filter.c
This diff makes the local enqueuer use CRLF line ending during the
SMTP dialog, as required by the protocol.
Eric.
Index: enqueue.c
===
RCS file: /cvs/src/usr.sbin/smtpd/enqueue.c,v
retrieving revision 1.117
diff -u -p -r1.117
all the lookup function.
Another point, I don't understand how the parse_sender() function is
supposed to work. Can you give examples with cidr4 and cidr6?
Eric.
>
> Index: usr.sbin/smtpd/spfwalk.c
> ===
> RCS file: /
e is a diff for that.
Note that it strips the '\r' on all input, not just DATA.
Eric.
Index: smtp_session.c
===
RCS file: /cvs/src/usr.sbin/smtpd/smtp_session.c,v
retrieving revision 1.414
diff -u -p -r1.414 smtp_session.c
--- smtp_session.
ays the client must not transmit them. So maybe
we should just discard them at receive time...
To me, the only real problem with '\r' is at the end of lines. It's confusing
since you never really know whether it's part of the content or the protocol.
So I suggest that we strip all '\r' found at the end of a line,
and retain the others.
Eric.
On Tue, Sep 10, 2019 at 06:12:12PM +0100, Stuart Henderson wrote:
> > + if (!SSL_CTX_load_verify_locations(ssl_ctx, "/etc/ssl/cert.pem", NULL))
>
> shouldn't that use X509_get_default_cert_file()?
Yes, that looks better.
Updated locally.
Eric.
On Fri, Sep 06, 2019 at 08:41:21AM +0200, Eric Faurot wrote:
> Hi,
>
> This patch adds the missing bits for verifying the server certificate
> in smtp(1).
Take two: now check the name(s) of the server certificate.
I borrowed code from libtls for now. This will be cleaned up whe
Hi,
This patch adds the missing bits for verifying the server certificate
in smtp(1).
Eric.
Index: smtpc.c
===
RCS file: /cvs/src/usr.sbin/smtpd/smtpc.c,v
retrieving revision 1.8
diff -u -p -r1.8 smtpc.c
--- smtpc.c 2 Sep 2019
Hi Richard,
I'm still getting congestion using acpihpet0. Not sure about
the arp, i don't think there is that much. Older hardware
using bsd.mp on the same lan doesn't have this issue.
Thanks!
On Aug 22, 2019, at 5:57 AM, Richard Procter
wrote:
Hi Eric,
I was unfamiliar with how
. Only default daemons
and nsd are running.
Can somebody help me figure this out ?
Thanks !
Eric Camirand
===
sysctl kern.netlivelocks
kern.netlivelocks=2
===
Status: Enabled for 0 days 19:25:59 Debug: info
Hostid: 0xdc985578
Checksum: 0x5b36311462da2ab76b362f191125df49
ot set on the lookup
directive, which feels consistent.
I have to review the resolver logic to see if a fix is needed at deeper
level. But still, this diff makes sense on its own, so ok eric@.
Eric.
On Wed, Jun 26, 2019 at 11:57:10AM +0200, Martijn van Duren wrote:
> Found this yesterday whi
).
Eric.
Index: smtpd.h
===
RCS file: /cvs/src/usr.sbin/smtpd/smtpd.h,v
retrieving revision 1.594
diff -u -p -r1.594 smtpd.h
--- smtpd.h 13 Dec 2018 17:08:10 - 1.594
+++ smtpd.h 17 Dec 2018 16:33:09 -
@@ -375,8 +375,8
laptop output)
tried usb-c yubikey and usb-c harddrive, nothing happens, no new
devices, no power to the device
HTH,
Eric.
On Tue, Oct 23, 2018 at 1:11 PM Peter Hessler wrote:
>
> On 2018 Oct 22 (Mon) at 21:45:06 +0200 (+0200), Mark Kettenis wrote:
> :Diff below adds an acpipci(4) driver
constistent altogether, and in practice it should not be
a problem because most smarthost configurations uses strict TLS.
Now, for the secondary MX example, the rule would look like:
action "do-backup" relay backup tls
Comments?
Eric.
Index: mta.c
==
With the recent changes in the smarthost syntax, and the removal of
the "secure" keyword, it's now possible to clarify the mta code by
changing the TLS option from a set flags to exclusive values.
This is far less confusing.
More cleanup to come in mta_session.c after that.
Eric.
In
Hi.
Same diff with associated manpage update.
If there is no objection, I'd like to commit this quickly.
Eric.
Index: smtpd.conf.5
===
RCS file: /cvs/src/usr.sbin/smtpd/smtpd.conf.5,v
retrieving revision 1.199
diff -u -p -r1.199
mails would be sent over a secure channel instead of plain text.
- an "smtp+tls://" relay would not fallback to plain text if STARTTLS fails,
and the mail will tempfail.
- in all other cases, the mail will tempfail with a warning.
Does that look fine?
Eric.
Index: to.c
the
following intended improvements:
- Use a more straightforward interface rather than the callback approach.
- Avoid unnecessary string copy.
- Stop using fixed-size string buffers, especially on the stack.
This is a step towards better handling of message line length in the daemon.
Please test an
we want to replace this with a simpler set of
IMSGs matching the standard resolver interface.
The rest of the code will be adapted little by little.
Eric.
Index: dns.c
===
RCS file: /cvs/src/usr.sbin/smtpd/dns.c,v
retrieving
your proposal. It makes the
documentatino more accurate: the server certificate is always
verified, the flag is only meant to accept invalid certificates. It
also fixes build (apparently the mta.c chunk was incorrect).
Eric.
Index: mta.c
==
what conditions leads to rewriting the sender. As a
bonus, it also fixes a bug (actually not triggerable) in the removed
code ("!= 1" should be "== -1").
Please test, especially if you are using the "masquerade" option.
On Tue, Aug 29, 2017 at 10:26:19AM +0200, Eric Faurot wrote:
> Now that the filter code path has been short-circuited, start removing stub
> smtp_filter_*() indirections. I'm doing this one function at a time to keep
> the diffs simple, starting with smtp_filter_connect().
Actually the
Now that the filter code path has been short-circuited, start removing stub
smtp_filter_*() indirections. I'm doing this one function at a time to keep
the diffs simple, starting with smtp_filter_connect().
Eric.
Index: smtp_session.c
parsed
according to the table type. The "list" type can also be forced by using
the "@list" directive in a comment. This allows to define list of entries
containing a separator.
Existing table files should still be working as expected.
As a bonus, parse errors are now logge
Remove the table_static_parse() indirection for parsing the file content.
The "type" parameter is useless since the "(t->t_type & type)" test is always
true. I think this is a left-over from the old design when table parsing was
done in context of its intended use
that filter.c can be unhooked.
This is what the following diff does:
- drop filter configuration,
- drop filter events,
- simulate a positive reply for all filter queries,
- write message content directly to the file.
There should be no functionnal change.
Eric.
Index: pony.c
;as_ctx->ac_options & RES_USE_DNSSEC);
> + as->as_ctx->ac_options & (RES_USE_EDNS0 | RES_USE_DNSSEC));
> if (p.err) {
> DPRINT("error packing query");
> errno = EINVAL;
The current code is correct, RES_USE_EDNS0 does not imply RES_USE_DNSSEC.
The real problem is that there is no resolv.conf option for RES_USE_DNSSEC.
It can only be set in user code by tweaking _res.options.
Eric.
he session if the data_io path
> > hits the low water mark.
> >
> > Mr. Wolk tested this diff against smtpd on 6.1 as well as a against
> > -current version of smtpd (compiled on the same system running 6.1).
> >
>
> Nice catch, the diff reads fine to me, I'll commit
d set this meaning it has
> authenticated the data. I wrote a patch for DNSSEC (possibly erroneous
> by comparing it to you) and posted it to #opensmtpd in hopes that eric
> would see it. Much of that functionality is superfluous now but it does
> have an "AD_MASK" check.
>
> Here
stfix or exim.
>
> Since RES_USE_DNSSEC now actually adds an EDNS0 OPT record to the
> outgoing packet, one can be concerned with problems with resolvers out
> there. Windows seems to have a way to disable EDNS0, I am not aware of
> existing mechanisms elsewhere.
>
>
gt; Comments welcome.
>
Well, I like the as_flags cleanup part of the diff. Internal flags should
indeed be on the asr_query structure directly, so they are not confused
with query-specific parameters.
For the flags inheritance, I'm not so sure. I would rather keep the current
internal API for no
Report the errno set by getifaddrs(3) if the setup for AI_ADDRCONFIG fails,
rather than a non-informative EAI_FAIL. Compare to -1 for error detection
while here.
Eric.
Index: asr/getaddrinfo_async.c
===
RCS file: /cvs/src/lib/libc
s feature. I'm not
> suggesting that we use it by default right now, but this could be
> a desirable change.
>
> ok?
Yes, I like it a lot.
One small comment tough: better use T_OPT rather than 41 in _asr_pack_edns0().
Besides that, ok eric@
>
> In
of iobuf_*
The diff is mostly mechanical.
Eric.
Index: bounce.c
===
RCS file: /cvs/src/usr.sbin/smtpd/bounce.c,v
retrieving revision 1.76
diff -u -p -r1.76 bounce.c
--- bounce.c22 Nov 2016 07:28:42 - 1.76
+++ bounce.c28
changes, it's now possible to make it a lot simpler
by triggering an event reload internally when data is queued. So the
api user does not have to worry about it.
Eric.
Index: ioev.c
===
RCS file: /cvs/src/usr.sbin/smtpd/ioev.c,v
The api user should not have to care about normalizing the io input
buffer (i.e. resetting the read/write pos in the buffer).
Do it internally when reloading the io event.
Eric.
Index: bounce.c
===
RCS file: /cvs/src/usr.sbin/smtpd
of the daemon.
Eric.
Index: ioev.c
===
RCS file: /cvs/src/usr.sbin/smtpd/ioev.c,v
retrieving revision 1.28
diff -u -p -r1.28 ioev.c
--- ioev.c 17 Nov 2016 07:33:06 - 1.28
+++ ioev.c 17 Nov 2016 14:01:28 -
This diff removes the IO_TLSVERIFIED which is not a io event, and
inlines the necessary code where the callback functions are called
for this event.
Eric.
Index: ioev.c
===
RCS file: /cvs/src/usr.sbin/smtpd/ioev.c,v
retrieving
structure. There
are places where the callback function is triggered outside of the io
layer. It's not desirable, and it needs to be fixed in a separate diff.
Eric.
Index: bounce.c
===
RCS file: /cvs/src/usr.sbin/smtpd/bounce.c,v
the listener(s)
to the current config list of listeners.
- make the fallback chain between interface(), host_v4() host_v6()
and host_dns() obvious when creating an if_listener.
- fix a bug where the specified family was ignored if the listener
is given as a hostname.
Comments?
Eric.
Index
o stop now. When doing so, they log as "debug" instead
of "info" because useless logs are useless.
This makes the shutdown sequence much saner.
Eric.
Index: ca.c
===
RCS file: /cvs/src/usr.sbin/smtpd/ca.c,v
retri
The smtpd processes are not expected to ever leave their event loop.
So stop pretending that the *_shutdown() functions could ever be called
in this context, and just fatal() if event_dispatch() returns.
Eric.
Index: ca.c
===
RCS
On Sat, Sep 03, 2016 at 08:12:20PM +0200, Gilles Chehade wrote:
> On Sat, Sep 03, 2016 at 08:09:25PM +0200, Eric Faurot wrote:
> > Hi,
> >
> > Here is a diff to remove the "smtpctl stop" command.
> > The proper way to stop a daemon is kill(1)/pkill(1) only.
&g
Hi,
Here is a diff to remove the "smtpctl stop" command.
The proper way to stop a daemon is kill(1)/pkill(1) only.
It makes no sense to have different code path for that.
Eric.
Index: control.c
===
RCS file: /cvs/src/usr.
Can you guys try this diff?
Eric.
Index: rfc2822.c
===
RCS file: /cvs/src/usr.sbin/smtpd/rfc2822.c,v
retrieving revision 1.7
diff -u -p -r1.7 rfc2822.c
--- rfc2822.c 4 Feb 2016 22:35:17 - 1.7
+++ rfc2822.c 20 Aug 2016
-spamd.net
Below is the output from "bgpd -d".
Could this be related to recent tame changes?
BR,
Eric Ripa
startup
rereading config
route decision engine ready
session engine ready
listening on 0.0.0.0
listening on ::
SE reconfigured
neighbor 217.31.80.170: state change None -> Idle,
--- INSTALL.armv7.orig 2015-09-08 09:48:21.0 -0700
+++ INSTALL.armv7 2015-09-08 09:48:35.0 -0700
@@ -91,7 +91,7 @@ out as follows:
A miniroot filesystem to be used for
installation; Cubieboard1 version.
-
that files
like /etc/rc.d/rwhod or /usr/bin/rwho should be removed.
How much of a catastrophy is this?
Question for the community: Do you want the upgrade instructions to
be 100% useful, or 100% complete?
Hi,
IMHO, first useful then complete .
--
Eric JACQUOT
Neither; 100% is unrealistic. Getting '90%' on either measure exceeds
my expectations.
The same percentage of flights would be acceptable?
I think that problem has been highlighted and we now belongs to all users to
check and submit oversights.
My 2 cents,
Regards,
--
Eric JACQUOT
=1.29f=h
Eric.
On Sun, Feb 02, 2014 at 03:12:36PM +0100, IMAP List Administration wrote:
[I forgot to send this to the list]
Hi Eric,
On 02/01/2014 11:43 AM, Eric Faurot wrote:
The following diff fixes the problems with the example IPs you gave us.
- subsequent PTR records are now set as aliases
with the example IPs you gave us.
- subsequent PTR records are now set as aliases in the hostent
- need to accept '/' in dname labels (maybe others?)
Please check if it works for you.
Eric.
Index: asr_utils.c
===
RCS file: /cvs/src
/include before building.
Comments welcome.
Eric.
Index: include/Makefile
===
RCS file: /cvs/src/include/Makefile,v
retrieving revision 1.181
diff -u -p -r1.181 Makefile
--- include/Makefile8 Dec 2013 17:05:09 - 1.181
--- index.html 23 Mar 2013 17:56:07 - 1.166
+++ index.html 2 Apr 2013 13:01:44 -
@@ -18,6 +18,13 @@
h3Presentations: AsiaBSDCon 2013/h3
blockquote
font color=#009000strong
+a href=https://poolp.org/~eric/asiabsdcon2013-smtpd/;OpenSMTPD: We
deliver!/a,
+Eric Faurot
+/strong
that the change doesn't
introduce a regression. So please test and report problems you notice
to gil...@openbsd.org and e...@openbsd.org.
Thank you.
Eric.
Could I ask what your use-case is?
-E
On Fri, Aug 24, 2012 at 01:41:21PM +0200, Patrick Wildt wrote:
the diff below adds an option to the ntpd(8), which has him provide
time, even though he's not synced.
ok?
Index: ntpd.8
On Sat, Aug 11, 2012 at 09:47:23PM +0200, Christiano F. Haesbaert wrote:
On Tue, Aug 07, 2012 at 11:50:26AM -0400, Eric P. Mangold wrote:
[...]
I would prefer this to be done on the path processing block, if
possible. Just make sure you test the scheme for http/https, sorry for
slacking
be URL-encoded if it is to appear literally in a URL and
not be interpreted as the start of a fragment identifier.
Regards,
Eric P. Mangold
Index: fetch.c
===
RCS file: /cvs/src/usr.bin/ftp/fetch.c,v
retrieving revision 1.103
diff -u
They are only necessary for split isochronous transactions, which are
not currently supported. So nothing uses those at the moment, but it
doesn't hurt to have them right.
Eric.
Index: ehcireg.h
===
RCS file: /cvs/src/sys/dev/usb
1 - 100 of 111 matches
Mail list logo