summaryrefslogtreecommitdiff
path: root/mail/spamdyke
diff options
context:
space:
mode:
authorschmonz <schmonz>2010-07-04 14:37:13 +0000
committerschmonz <schmonz>2010-07-04 14:37:13 +0000
commit6483ceccefeccf7269bb1678c0f16c0154b1a4c8 (patch)
tree054b48d6c2cb1df09e45f860310005adfcde0db3 /mail/spamdyke
parentceb389db6440bee678b868c91ba8abfd855d1c70 (diff)
downloadpkgsrc-6483ceccefeccf7269bb1678c0f16c0154b1a4c8.tar.gz
Update to 4.1.0. From the changelog:
Changed the option "hostname-file" to read /var/qmail/control/me by default. Added the option "dns-resolv-conf" to read the nameserver from a file other than /etc/resolv.conf if necessary. Multiple files can be read, if needed. Changed all uses of strncpy() to memcpy() because strncpy() will fill the remainder of the destination buffer with zeroes if the source string is too short. This is not needed because all strings are being explicitly terminated after copies anyway. Added two new parameters to search_file() to allow the matching line data to be returned to the caller. Changed process_access() to save the contents of the RELAYCLIENT environment variable, if set. Added the timefilter program to the utils folder. Reversed a small change to spamdyke_log() made 4.0.8 that will prevent buffer overflows in obscure situations. Changed is_ip_in_name() to look for more patterns of IP addresses in rDNS names: 044.033.022.011, 44.033.022.011, 44.33.022.011 and 44.33.22.011. Thanks to Eduard Svarc for suggesting this one. Changed the syslog output to include an "encryption:" tag at the end that shows the current status of TLS/SSL encryption. Thanks to Eric Shubert for suggesting this one. Added a "-R" option to smtpdummy so it will reject all recipients. Completely rewrote find_address() to completely conform to RFC 2822 when parsing addresses, including quoting, comments, folded whitespace and all the rest. Added the option "reject-identical-sender-recipient" to block any messages where the sender and recipient are the same. Thanks to almost everyone on the mailing list for suggesting this one. Changed nihdns_mx() to tolerate MX records that contain IP addresses (illegal) instead of names. Fixed Makefile.in to use the CPPFLAGS variable from the "configure" script, if the user provided it in an environment variable. Thanks to Iavor Stoev for reporting this one. Fixed the "configure" script to correctly include header files on FreeBSD 7.0. Thanks to Andrew Khon for reporting this one. Added a "-S" flag to sendrecv to prevent it from starting a TLS session when it sees "STARTTLS". Improved sendrecv's usage display to document what each option does. Changed do_spamdyke() to set the stdin and stdout file descriptors to nonblocking before calling middleman(). This works around a bug in the SSL library that will block forever waiting for input, even after SSL_pending() and/or select() has already indicated the socket is ready. Thanks to Teodor Milkov for identifying this problem more than a year ago and trog for producing a patch to fix it! Fixed process_config_file() to reject configuration file lines with bad/missing characters. Fixed process_config_file() to print an "unknown option" error message instead of an "illegal option" message when an unknown option is found in a configuration file. Added option "rejection-text-identical-sender-recipient" to set the rejection message for the identical sender/recipient filter. Created dnsdummy to simulate a nameserver but exit after a short while for testing spamdyke's DNS routines. Converted all DNS-related tests to use dnsdummy and removed all references to spamdyke.org and silence.org. This will also allow the removal of the (hundreds of) bogus entries from the spamdyke.org zone file. Removed the use of getprotobyname() from dns.c and used the defined protocol values in netinet/in.h. Changed nihdns_query() to retry DNS queries via TCP if the response received via UDP has the "truncation" flag set (indicating the answers are too large for a UDP packet). Thanks to Roland Moelle for suggesting this one. Added option "dns-tcp" to control if spamdyke will retry DNS queries via TCP. Added option "dns-spoof" to control if spamdyke will attempt to detect DNS spoofing and, if so, what it should do about it. Fixed smtp_filter() to offer and accept SMTP AUTH (when appropriate) even if the connection is already whitelisted. Thanks to Ratko Rudic for reporting this one.
Diffstat (limited to 'mail/spamdyke')
-rw-r--r--mail/spamdyke/Makefile4
-rw-r--r--mail/spamdyke/PLIST3
-rw-r--r--mail/spamdyke/distinfo8
3 files changed, 7 insertions, 8 deletions
diff --git a/mail/spamdyke/Makefile b/mail/spamdyke/Makefile
index 606665515f8..bc97266b66f 100644
--- a/mail/spamdyke/Makefile
+++ b/mail/spamdyke/Makefile
@@ -1,7 +1,7 @@
-# $NetBSD: Makefile,v 1.23 2008/12/25 16:43:35 schmonz Exp $
+# $NetBSD: Makefile,v 1.24 2010/07/04 14:37:13 schmonz Exp $
#
-DISTNAME= spamdyke-4.0.10
+DISTNAME= spamdyke-4.1.0
CATEGORIES= mail
MASTER_SITES= ${HOMEPAGE}releases/
EXTRACT_SUFX= .tgz
diff --git a/mail/spamdyke/PLIST b/mail/spamdyke/PLIST
index 3c880f38646..ad22f57231a 100644
--- a/mail/spamdyke/PLIST
+++ b/mail/spamdyke/PLIST
@@ -1,4 +1,4 @@
-@comment $NetBSD: PLIST,v 1.6 2009/06/14 18:04:43 joerg Exp $
+@comment $NetBSD: PLIST,v 1.7 2010/07/04 14:37:13 schmonz Exp $
bin/spamdyke
share/doc/spamdyke/Changelog.txt
share/doc/spamdyke/FAQ.html
@@ -8,7 +8,6 @@ share/doc/spamdyke/README.html
share/doc/spamdyke/README_ip_file_format.html
share/doc/spamdyke/README_rdns_directory_format.html
share/doc/spamdyke/README_rdns_file_format.html
-share/doc/spamdyke/TODO.txt
share/doc/spamdyke/UPGRADING.txt
share/doc/spamdyke/UPGRADING_version_3_to_version_4.txt
share/examples/spamdyke/spamdyke.conf.example
diff --git a/mail/spamdyke/distinfo b/mail/spamdyke/distinfo
index 9735841790f..71f56988931 100644
--- a/mail/spamdyke/distinfo
+++ b/mail/spamdyke/distinfo
@@ -1,6 +1,6 @@
-$NetBSD: distinfo,v 1.23 2008/12/25 16:43:35 schmonz Exp $
+$NetBSD: distinfo,v 1.24 2010/07/04 14:37:13 schmonz Exp $
-SHA1 (spamdyke-4.0.10.tgz) = 69a94678a78ab845030177fa2916438b0ee98d9e
-RMD160 (spamdyke-4.0.10.tgz) = 2f31c939c949038265039c10704dfed3cea68802
-Size (spamdyke-4.0.10.tgz) = 454117 bytes
+SHA1 (spamdyke-4.1.0.tgz) = bdf9c1759c367edff6f872368185fa6fa1a78166
+RMD160 (spamdyke-4.1.0.tgz) = f4e9430ba9e6d3b1cb061ebebf9fda78880a8a7b
+Size (spamdyke-4.1.0.tgz) = 490106 bytes
SHA1 (patch-aa) = 1eeea810a457a9560258c761d828987a440c7f29