28 août 2019 09:04 "Martijn van Duren" a
écrit:
> Currently looking into writing an spf filter based on libopensmtpd.
> While working through the spec I found in RFC7208 section 7.3 that:
> The "r" macro expands to the name of the receiving MTA.
> In other words the hostname presented in the
28 août 2019 14:07 "Martijn van Duren" a
écrit:
>>
>> So my understanding is that you'd like a filter to be able to use the
>> result from an SPF lookup to reject a message in your filter and have
>> the hostname that was used in the banner part of the message.
>
> Yes, because that's the only
28 août 2019 15:10 "Martijn van Duren" a
écrit:
> On 8/28/19 2:52 PM, gil...@poolp.org wrote:
>
>> Yes sorry my bad, but this still covers the textstring argument:
>>
>> We need to be able to reject at banner and this is going to be implemented
>> as a filter phase, so basically if we expect
28 août 2019 12:26 "Gilles Chehade" a écrit:
> On Wed, Aug 28, 2019 at 10:33:29AM +0200, Martijn van Duren wrote:
>
>> On 8/28/19 9:23 AM, gil...@poolp.org wrote:
>> 28 ao??t 2019 09:04 "Martijn van Duren" a
>> ??crit:
>>
>> Currently
25 août 2019 07:01 "Martijn van Duren" a
écrit:
> Right now all we get is "Misbehaving filter", which doesn't tell the
> developer a lot.
>
Indeed
> Diff below does the following:
> - Make the register_hooks actually fail on misbehaviour.
> - Change some *ep = 0 to a more semantically
September 2, 2019 5:23 PM, "Martijn van Duren"
wrote:
> Gilles should probably elaborate, but the way things are now is that
> system(3) is used to start the filters, allowing us to run any arbitrary
> (set of) command(s) as a filter.
>
> Since the filters now in
September 2, 2019 5:55 PM, gil...@poolp.org wrote:
> September 2, 2019 5:23 PM, "Martijn van Duren"
> wrote:
>
>> Gilles should probably elaborate, but the way things are now is that
>> system(3) is used to start the filters, allowing us to run any arbitrary
>
The following diff introduces the junk action which allows builtin
filters to junk a session or transaction.
The following would junk a session if it doesn't have rdns when it
reaches the helo filtering hook:
match "check-rdns" phase helo match !rdns junk
Currently this is not doable so
September 2, 2019 7:29 PM, "Martijn van Duren"
wrote:
> On 9/2/19 6:00 PM, gil...@poolp.org wrote:
>
>> September 2, 2019 5:55 PM, gil...@poolp.org wrote:
>>
>>> September 2, 2019 5:23 PM, "Martijn van Duren"
>>> wrote:
>>
&
committed thanks !
August 31, 2019 1:57 PM, "Ross L Richardson" wrote:
> ...unless I'm very mistaken!
>
> Ross
>
>
> Index: smtpc.c
> ===
> RCS file: /cvs/src/usr.sbin/smtpd/smtpc.c,v
> retrieving revision 1.6
> diff -u -p
ember 2, 2019 5:55 PM, gil...@poolp.org wrote:
>>
>> September 2, 2019 5:23 PM, "Martijn van Duren"
>> wrote:
>>
>> Gilles should probably elaborate, but the way things are now is that
>> system(3) is used to start the filters, allowing us to run any arb
no you're not, i'll commit this tomorrow unless eric@ beats me to it
31 août 2019 13:57 "Ross L Richardson" a écrit:
> ...unless I'm very mistaken!
>
> Ross
>
>
> Index: smtpc.c
> ===
> RCS file:
29 août 2019 07:02 "Martijn van Duren" a
écrit:
> Since we don't support any smtp-out events at time of writing, so we
> might as well throw an error if people try to register one. This way
> people won't be surprised if the registration succeeds, but no event
> ever arrives.
>
> OK?
>
no
September 19, 2019 7:26 PM, "Eric Faurot" wrote:
> On Thu, Sep 19, 2019 at 05:46:47PM +0200, Gilles Chehade wrote:
>
>> Hello,
>>
>> The RFC for SMTP states the following (section 2.3.8):
>>
>> In addition, the appearance of "bare"
September 21, 2019 10:03 AM, "Sebastien Marie" wrote:
> Hi,
>
> The current code in smtp_verify_server_cert() has a dead assignment for return
> code of ssl_check_name().
>
> At first stance, I was a bit unsure if return code should be checked or not to
> detect certificate error. but as soon
t; This resulted in a few mails being PERMFAIL.
>
> I talked to gilles@ about this and he's somewhat inclined to agree with
> me that this is a TEMPFAIL situation. Even if the directory where the
> mail is supposed to be delivered is permanently not accessible I'd
> argue that
December 5, 2019 4:34 PM, "Ingo Schwarze" wrote:
> Hi Jason,
>
> Jason McIntyre wrote on Thu, Dec 05, 2019 at 02:54:20PM +:
>
>> i have reverted it, with a heavy heart.
>
> Do you think i should try and convince the groff folks to always
> render .Aq/.Ao/.Ac as ASCII '<' and '>', even in
October 4, 2019 9:55 AM, "Martijn van Duren"
wrote:
>
> This is similar to the diff I send a few months ago, but still doesn't
> fix the case when someone sends a standalone '\n' as line-ending.
>
Unsure I understand that, can you elaborate ?
> I'd prefer if we go with reverting (=my
yes ok
January 30, 2020 2:02 PM, "Solene Rapenne" wrote:
> on https://opensmtpd.org the OpenBSD version file says 6.6.2 while we
> currently have 6.6.1 in CVS.
>
> Should we bump to 6.6.2?
>
> Index: smtpd.h
> ===
> RCS file:
about
what made
it possible and what plans we have so similar bugs don't lead to similar
consequences,
two ideas have been discussed to lock things down.
But for now, it's syspatch time.
Gilles
April 8, 2020 11:51 PM, gil...@poolp.org wrote:
> April 8, 2020 6:15 PM, "Joerg Jung" wrote:
>
>>> On 8. Apr 2020, at 17:19, Eric Faurot wrote:
>>>
>>> Some users had issues with report events for MAIL FROM and RCPT TO
>>> when "|" appear in the mail address (yes, it seems to happen), because
April 8, 2020 6:15 PM, "Joerg Jung" wrote:
>> On 8. Apr 2020, at 17:19, Eric Faurot wrote:
>>
>> Some users had issues with report events for MAIL FROM and RCPT TO
>> when "|" appear in the mail address (yes, it seems to happen), because
>> that's also the field separator. To make parsing the
April 20, 2020 9:07 PM, "Eric Faurot" wrote:
> Hi again,
>
> We had a report of a crash when running "smtpctl discover" on an
> envelope that has a invalid dispatcher (action name changed in the
> config).
>
> The issue is that the dispatcher is not checked after the envelope is
> loaded as a
April 21, 2020 4:28 AM, "Todd C. Miller" wrote:
> On Mon, 20 Apr 2020 15:01:31 +0200, Eric Faurot wrote:
>
>> There has been a discussion a while ago about the issue of trailing CR
>> in smtp lines (https://marc.info/?l=openbsd-tech=156890805128121=2).
>>
>> It is agreed that stripping an
April 28, 2020 11:02 AM, "Joerg Jung" mailto:m...@umaxx.net?to=%22Joerg%20Jung%22%20)> wrote:
On 28. Apr 2020, at 10:10, gil...@poolp.org (mailto:gil...@poolp.org) wrote:
April 28, 2020 8:55 AM, "Joerg Jung" mailto:m...@umaxx.net)>
wrote:
Also this change might break existing valid setups
April 26, 2020 10:34 AM, "Christopher Zimmermann" wrote:
> Hi,
>
> I further developed my approach to allow running smtpd with fewer privileges.
> This diff does two
> things:
>
> - always run lmtp deliveries as SMTPD_USER. The change to mda_unpriv.c is
> needed, because otherwise
> all
observed no issue, still running w/ your diff
April 23, 2020 1:10 PM, "Eric Faurot" wrote:
> On Tue, Apr 21, 2020 at 07:08:48AM +, gil...@poolp.org wrote:
>
>> April 21, 2020 4:28 AM, "Todd C. Miller" wrote:
>>
>> On Mon, 20 Apr 2020 15:01:31 +0200, Eric Faurot wrote:
>>
>> There has
gt; *@domain
@ => *
and this is not an aliases only thing, this is how table lookups are
performed for type K_MAILADDR.
This allows you to do stuff like follows:
root : root
gil...@poolp.org : gilles
e...@faurot.net : eric
@poolp.org : poolpcatchall
@faurot.net
it's slightly different:
ca is for "crypto agent" unsure if there's really an interest in renaming
internally,
furthermore there's a separate crypto API for encrypted queue so not
distinguishing
between crypto api and crypto agent might be confusing.
Gilles
December 27, 20
a tx is over,
but it isn't. call io_free() on the channel in smtp_tx_free() if we do
have a channel ready.
Gilles
diff --git a/usr.sbin/smtpd/lka_filter.c b/usr.sbin/smtpd/lka_filter.c
index 9891e6140a3..6eb0829efca 100644
--- a/usr.sbin/smtpd/lka_filter.c
+++ b/usr.sbin/smtpd/lka_filter.c
December 17, 2020 4:02 PM, gil...@poolp.org wrote:
> Hello,
>
> The following diffs plug two memory leaks in smtpd:
>
> a- in lka_filter.c, the name of the filter chain for a session is strdup()-ed
> upon session allocation but not released upon session release. free() it
> in lka_filter_end().
Hello,
Whenever a rule with a local action (mbox, maildir, lmtp or mda) is matched,
smtpd will
attempt to search for a ~/.forward file in the recipient directory and process
it. This
may be convenient for some setups but it is an implicit behavior that's not
overridable
and not always wanted.
December 19, 2020 11:26 PM, "Martijn van Duren"
wrote:
> Personally I'd rather wait to keep the names in sync, especially since
> it's an easy 2 line diff that can easily be incorperated in the bigger
> thing. But it's not something I'm going to loose sleep over if others
> thing it can go in
Hello,
A very long time ago, smtpd had several more processes which then got factored
into a single one. We couldn't find a decent name back then but since a hacker
had requested a pony from me I temporarily named the process "pony express" as
it was in charge of delivering mail. Later, reyk
Hello,
As is done in other MTA, smtpd allows execution of a custom command in forward
files so
users can plug their procmail, fdm and other. It is currently not possible to
allow the
users to forward their mail through a .forward file without also allowing them
to run a
custom mda.
This diff
I agree but I thought this should be done in a second time as it is quite
invasive and not required for the change to be visible outside the daemon
December 19, 2020 11:13 PM, "Martijn van Duren"
wrote:
> I'm in favour of this change, since I like proper nomenclature.
> But I think you should
Last diff of the series:
This introduces the same logic as forward-file for executing commands.
Executing commands from aliases should be discouraged as you can always achieve
the same
through a forward file and benefit from the privilege separation of running a
command as
a separate user
November 18, 2020 10:17 PM, "Joerg Jung" wrote:
> On Wed, Nov 18, 2020 at 08:57:48PM +, gil...@poolp.org wrote:
>
>> November 18, 2020 9:54 PM, "Joerg Jung" wrote:
>>
>> Hi,
>>
>> in my opinion revision 1.423 of smtp_session.c went a bit too far.
>> Enforcing that ORCPT has to have
January 21, 2021 11:25 AM, "Claus Assmann" wrote:
> On Thu, Jan 21, 2021, Martin Vahlensieck wrote:
>
>> I think the backslash at the beginning of the line is an error.
>
> Why? Does it fail when used as described?
>
>> -\eeric, "|/usr/bin/vacation -a allman eric"
>
> Originally this was to
January 21, 2021 11:45 AM, gil...@poolp.org wrote:
> January 21, 2021 11:25 AM, "Claus Assmann" wrote:
>
>> On Thu, Jan 21, 2021, Martin Vahlensieck wrote:
>>
>>> I think the backslash at the beginning of the line is an error.
>>
>> Why? Does it fail when used as described?
>>
>>> -\eeric,
January 27, 2021 9:47 AM, "Lauri Tirkkonen" wrote:
> On Wed, Jan 27 2021 09:36:31 +0100, Eric Faurot wrote:
>
>> There has been a plan for some time now to make smtpd use libtls
>> instead of openssl. Recent changes in libtls allow to move forward
>> with this. Here is a diff to start the
June 22, 2021 11:14 PM, "Aisha Tammy" wrote:
>> [...]
>>
>> WRT to handshake, it has multiple uses ranging from ensuring the addons get
>> their configuration
>> from the daemon to synchronising the daemon start with addons readiness.
>> Remember, we didn’t have this with filters and realised
August 29, 2021 10:16 PM, gil...@poolp.org wrote:
> Hellow,
>
> The K_STRING and K_REGEX lookup kinds are missing from table_db even though
> nothing prevents
> them from working technically. The following diff is enough to allow db
> tables to be used on
> regex or string contexts.
>
>
Hellow,
The K_STRING and K_REGEX lookup kinds are missing from table_db even though
nothing prevents
them from working technically. The following diff is enough to allow db tables
to be used on
regex or string contexts.
Index: table_db.c
October 8, 2021 11:34 PM, "aisha" wrote:
> Hi all,
> I am still working on the table-procexec for opensmtpd
> and while there, I was thinking of how to do authentication
> using LDAP, which the current table-ldap from ports does not
> support.
> The primary reason for that, I believe, is that
nst char *value)
K_SOURCE match on a list, key is not set:
table_match(table, K_SOURCE, NULL, "192.168.0.1");
K_CREDENTIALS match on a mapping, key is used to resolve:
table_match(table, K_CREDENTIALS, "gilles", "ilovecandies");
This is just an idea, but I still think this should be done
after proc-exec :-)
Hello,
Someone asked about selectable curves in the OpenSMTPD portable tracker,
and it turns out I had a diff for that among a few others.
The diff below adds support for the curves keyword in listener and relay
directives,
allowing to specify a curve string suitable for
August 12, 2023 4:34 PM, "Theo Buehler" wrote:
> On Sat, Aug 12, 2023 at 02:29:45PM +, gil...@poolp.org wrote:
>
>> Hello,
>>
>> Someone asked about selectable curves in the OpenSMTPD portable tracker,
>> and it turns out I had a diff for that among a few others.
>
> Why do they need
June 23, 2023 11:58 AM, "Omar Polo" wrote:
> another diff from the -portable repo:
>
> https://github.com/OpenSMTPD/OpenSMTPD/pull/1150
>
> per rfc-5321 § 4.1.1.9 the NOOP command allows optionally one argument
> that we SHOULD ignore.
>
> The original diff set the check function in the
May 15, 2023 3:34 PM, "Todd C. Miller" wrote:
> On Mon, 15 May 2023 13:54:35 +0200, Omar Polo wrote:
>
>> almost always (cast)var. I've adjusted the spacing in the line I was
>> touching, grepping for common types I could only find one instance of
>> a '(long long) src' in envelope.c which I'm
,\
-EXT2FS, VFS, NTFS, UDF, FUSEFS, TMPFS
+EXT2FS, VFS, NTFS, UDF, FUSEFS, TMPFS, \
+9P
/*
* Each underlying filesystem allocates its own private area and hangs
--
Gilles Chehade
https://www.poolp.org
. this was correctly handled
at the smtp level, but headers were not updated to reflect that.
issue experienced by several people, fix tested by ajacoutot@ and I
ok eric@
++
The enqueue utility should not add a User-Agent header to emails.
ok gilles jcs
Index: enqueue.c
@@ -125,7 +125,7 @@ table_socketmap_connect(const char *s)
return 1;
err:
- if (sock) {
+ if (sock != -1) {
close(sock);
sock = -1;
}
--
Gilles Chehade
https://www.poolp.org @poolpOrg
type, r;
+ bzero(res, sizeof(res));
switch (imsg.hdr.type) {
case PROC_TABLE_OPEN:
table_msg_get(op, sizeof op);
Sincerely,
Martijn van Duren
--
Gilles Chehade
https://www.poolp.org @poolpOrg
to store a truncated key with its value, or not
to store any value at all :-/
--
Gilles Chehade
https://www.poolp.org @poolpOrg
, clean and nice.
I'll give a real try when I'm done with some stuff that are keeping me
busy these days.
--
Gilles Chehade
https://www.poolp.org @poolpOrg
));
memset(context-buffer, 0, sizeof(context-buffer));
--
Gilles Chehade
https://www.poolp.org @poolpOrg
Hi,
On Sun, Dec 22, 2013 at 07:08:53PM -0500, Ted Unangst wrote:
1. bigger is better. make a link to sha512.
yay
2. simplify md5.c. there's really only two modes.
wow md5.c is confusing, I had to go through md5.c twice to understand
why your diff was correct ...
ok gilles@
3. add
compilers
support it, rather than further complicate the ifdef.)
ok gilles@
Index: md4.c
===
RCS file: /cvs/src/lib/libc/hash/md4.c,v
retrieving revision 1.7
diff -u -p -r1.7 md4.c
--- md4.c 8 Aug 2005 08:05:35 -
.
*/
- if (target target[tarindex] != 0)
+ if (target tarindex targsize
+ target[tarindex] != 0)
return (-1);
}
} else {
--
Gilles Chehade
https://www.poolp.org
to sell CDs or teeshirts anymore, just coding, paying
electricity and coders.
--
Au revoir, 09 51 84 42 42
Gilles Lamiral. France, Baulon (35580) 06 20 79 76 06
/etc/shells # and so on
/a
/a
$ ls -l /etc/shells
-rw-r--r-- 1 root wheel 49152 Jan 15 22:40 /etc/shells
$ chpass
Segmentation fault
Okay?
ok gilles@
Index: getusershell.c
===
RCS file: /var/www/cvs/src/lib/libc/gen
, we would fail in an ioctl
call a bit later rather than right away).
Anyways, all calls are now checked and you can review the commits which
were done today, I made it clear in every commit log was fixed.
NOW IS TIME FOR WINE AND CHEEZE.
--
Gilles Chehade
https://www.poolp.org
it wants
the user to be in, whereas now you just list the groups you want to add.
[...]
So please don't change that behaviour. If you want to remove a group for
a user, you can still edit /etc/group.
Yeah, please no, this is a recipe to fuckups ...
--
Gilles Chehade
On Sun, May 15, 2011 at 11:57:13AM +0200, Gilles Chehade wrote:
Hi tech@,
summary:
This huge diff is unsplittable. it gets rid of a structure that has
grown out of control, that's used everywhere and that prevents some
long-awaited features from being implemented. it needs more work
On Sun, May 15, 2011 at 02:09:41PM +0200, Christopher Zimmermann wrote:
On 05/15/11 11:57, Gilles Chehade wrote:
Please test and report breakage of your existing setups :-)
No breakage for me. I use smtpd as MTA for local-to-local delivery and
to relay mail to my ISP using tls.
great :-)
Hi tech@,
An updated version of the diff fixes a crash that would occur in some
setups mixing aliases, virtual entries and relaying to external mails
http://users.poolp.org/~gilles/smtpd.diff
Got only positive feedbacks so far, if I don't experience other crash
by tomorrow, I'll commit
r_amap;
time_t r_qexpire;
};
@@ -376,6 +377,7 @@ struct delivery_mda {
struct delivery_mta {
struct relayhost relay;
+ struct mailaddr relay_as;
};
struct delivery {
--
Gilles Chehade
http://www.poolp.org
On Thu, May 26, 2011 at 12:03:45AM +0200, Gilles Chehade wrote:
@@ -376,6 +377,7 @@ struct delivery_mda {
struct delivery_mta {
struct relayhost relay;
+ struct mailaddr relay_as;
};
that part you can ignore, it's unused and will go away
--
Gilles Chehade
http
On Wed, Aug 31, 2011 at 12:56:30PM -0600, Gilles Chehade wrote:
Log message:
add support for per-line DATA callbacks, this allows filters to take their
decisions *while* the message is being received by the client.
Until filters are enabled, this should not impact anyone ... however
Mh,
Did you update OpenSMTPD while your queue was not empty ?
You should just rename the directories by removing the prepended 0, it
should fix your issue.
Gilles
On Fri, Nov 11, 2011 at 04:30:52PM +0100, Christopher Zimmermann wrote:
I have no clue what is wrong here. maybe just the '0
On an unrelated note, I am almost done with a qwalk rewrite that makes it
more tolerant to errors amongst other things
Gilles
On Fri, Nov 11, 2011 at 04:40:26PM +0100, Gilles Chehade wrote:
Mh,
Did you update OpenSMTPD while your queue was not empty ?
You should just rename
Will commit shortly, thanks
Gilles
Peter J. Philipp p...@centroid.eu a C)critB :
Thanks to kdump I was able to figure this one out before reading the source.
-peter
? smtpd.conf.5.patch
Index: smtpd.conf.5
===
RCS file: /cvs/src
On Tue, Mar 13, 2012 at 05:07:58PM -0600, Gilles Chehade wrote:
CVSROOT: /cvs
Module name: src
Changes by: gil...@cvs.openbsd.org 2012/03/13 17:07:58
Modified files:
usr.sbin/smtpd : scheduler_ramqueue.c
Log message:
When moving back envelope from offload tree to msg
+part of an Internet address.
.Sh SEE ALSO
.Xr byteorder 3 ,
.Xr inet 3 ,
--
Gilles Chehade
https://www.poolp.org @poolpOrg
For what it's worth, this fixes the issue on my laptop.
I still can't highlight a portion of a line, but at least I can copy / paste a
word now \o/
Thanks a *LOT* as it was plenty annoying
Gilles
On Wed, Jul 11, 2012 at 12:53:00AM +0600, Alexandr Shadchin wrote:
Now in clickpad mode
no my area, but I like it better so ok gilles@ ;-)
On Fri, Jul 13, 2012 at 03:37:08PM +0600, Alexandr Shadchin wrote:
Use NULL instead of 0 for pointers
--
Alexandr Shadchin
Index: kbd_wscons.c
===
RCS file: /cvs/src/sbin
via tls+auth://smtp.example.com auth secrets
.Ed
.Pp
In this second example,
committed thanks
--
Gilles Chehade
https://www.poolp.org @poolpOrg
on.
There will be no major feature written and committed for our very first
release, so just make sure that you test it enough so that we can reach
the quality you'd expect from us.
Please let us know if it works fine for you or if you hit bugs. You can
mail us three (eric@, chl@, gilles@). Do
I use it on 5.1 but it requires a -current checkout of both src/usr.sbin/smtpd
and src/lib/libc/asr
bofh goodb...@gmail.com a écrit :
On Mon, Aug 20, 2012 at 5:01 PM, Gilles Chehade gil...@poolp.org wrote:
Dear misc@ and tech@,
We are getting closer to a stable version of OpenSMTPD and now
project:
https://poolp.org/~gilles/projects/procstated/
I don't know if it's a better implementation, but it used to do
the job quite well for my needs back then ;-)
Yes there are other implementations that can do about the same,
but I wanted to write something the OpenBSD way.
I hope
my word's not worth much on this but I like the idea
gilles
On Wed, Sep 05, 2012 at 03:16:16PM -0400, Ted Unangst wrote:
We have several programs using the pbkdf2 function. More people
should (and are likely to) use it. So move it to libutil.
I think this needs a man page now
in the future to extend smtpctl so that an admin can
fix the aftermaths of a config fuckup *manually* ;-)
--
Gilles Chehade
https://www.poolp.org @poolpOrg
Argh, you should have talked to me first ...
Both require ssl and require auth are implemented already ... I did
not commit yet because we stabilized a release and decided to not
add new features to it unless they are critical.
This feature should be committed in a few days
Gilles
On Tue, Oct
On Tue, Oct 09, 2012 at 03:43:03PM +0200, Alexander Hall wrote:
On 10/09/12 15:33, Gilles Chehade wrote:
Argh, you should have talked to me first ...
Both require ssl and require auth are implemented already ... I did
not commit yet because we stabilized a release and decided to not
add new
On Tue, Oct 09, 2012 at 03:48:44PM +0200, Gilles Chehade wrote:
On Tue, Oct 09, 2012 at 03:43:03PM +0200, Alexander Hall wrote:
On 10/09/12 15:33, Gilles Chehade wrote:
Argh, you should have talked to me first ...
Both require ssl and require auth are implemented already ... I did
On Tue, Oct 09, 2012 at 09:05:42AM -0600, Bob Beck wrote:
Gilles, I'm actually wondering - should there even be a difference?
Every practical implementation of 587 I've ever seen requires auth. Is there
any sane reason to have enable auth not actually require it? I.E. what
I'm asking
On Tue, Oct 09, 2012 at 09:29:25AM -0600, Bob Beck wrote:
On Tue, Oct 9, 2012 at 9:25 AM, Gilles Chehade gil...@poolp.org wrote:
I agree with you that people will probably not want port 587 without auth
turned on so on a practical point of view, we could make it implicit.
There's
for me and I like smaller conf
but I'm unsure everyone feels the same.
Do we want to go that path ?
--
Gilles Chehade
https://www.poolp.org @poolpOrg
it was doing what
it was supposed to during my testing :-)
Other than that, reads fine.
okie dokie !
--
Gilles Chehade
https://www.poolp.org @poolpOrg
the opposite ?
listen on fxp0 [...] auth # 99% case
listen on fxp0 [...] auth-optional # 1% case
--
Gilles Chehade
https://www.poolp.org @poolpOrg
established a secure channel first ;-)
--
Gilles Chehade
https://www.poolp.org @poolpOrg
what comes out of it; may take a little
bit of time though.
Yup, same here
--
Gilles Chehade
https://www.poolp.org @poolpOrg
to waste, I will happily volunteer to work on that.
--
Gilles Chehade
https://www.poolp.org @poolpOrg
is ok by me
--
Gilles Chehade
On Tue, Aug 31, 2010 at 07:29:16AM +, Mark Lumsden wrote:
Remove unused variable, linkfail. Unused since v1.6.
ok?
mark
yup, it should have been removed in 1.6, ok gilles@
Index: stat.c
===
RCS file: /cvs/src
ok by me, commited
gilles
On 09/06/10 11:48, Gregory Edigarov wrote:
Hi everybody,
The following diff adds sender expansions to OpenSMTPD.
%U for sender localpart
%D for sender domainpart
--- lka.c.orig Sun Jun 20 12:56:26 2010
+++ lka.c Sun Sep 5 16:41:37 2010
@@ -55,11 +55,11
@@ lka_queue_append(struct smtpd *env, stru
s-id, 0, -1, message, sizeof message);
TAILQ_REMOVE(s-deliverylist, path, entry);
free(path);
+ return 1;
}
int
--
Gilles Chehade
freelance developer/sysadmin/consultant
http://www.poolp.org
, by removing some information to save bytes
here
and there.
I think this optimization has been commited too early and I'd like to back it
out.
The many ideas behind it are good but I think it should be reintroduced later
when
we know we are not making it hard to work on smtpd.
Objections ?
Gilles
relay via to be handled as relay rules.
A tarball to test: http://www.poolp.org/~gilles/smtpd-asyncdns.tar.gz
This is smtpd-current, queue is unchanged, please test as it is experimental
code. I will run it for a few days and commit if I see no drawbacks and I do
not receive mails saying it breaks
1 - 100 of 263 matches
Mail list logo