Subversion Repositories libspf2

Compare Revisions

Ignore whitespace Rev 11 → Rev 12

/trunk/debian/changelog
1,3 → 1,19
libspf2 (1.2.5.dfsg-3) unstable; urgency=low
 
* 22_spfquery_fallback_segfault.dpatch: Fix fallback-related segfault in
spfquery (Closes: #430414). Thanks to Robert Millan.
* Correct debian/copyright (Closes: #433047). Thanks to Julian Mehnle.
* A second patch from Robert split into three:
* 40_permanent_include_errors.dpatch: Make permanent errors in
processing an include: directive cause the parent evaluation to return
a permanent error as well (Closes: #435139).
* 41_none_not_neutral.dpatch: Use a diffent explanation for
SPF_RESULT_NONE than the one for SPF_RESULT_NEUTRAL (Closes: #435140).
* 42_empty_sender.dpatch: Use the HELO identity in MAIL FROM checks if
the sender address has been set to the empty string (Closes: #431239).
 
-- Magnus Holmgren <magnus@kibibyte.se> Wed, 22 Aug 2007 17:05:16 +0200
 
libspf2 (1.2.5.dfsg-2) unstable; urgency=low
 
* 21_spfquery_infininte_loop.dpatch: Fix infinite loop when giving
/trunk/debian/patches/00list
5,5 → 5,9
20_spf_dns_include_std_headers
20_spf_server_unnecessary_include
21_spfquery_infininte_loop
22_spfquery_fallback_segfault
25_maxvals
30_spfd_check_unlink_failure
40_permanent_include_errors
41_none_not_neutral
42_empty_sender
/trunk/debian/README.Debian
0,0 → 1,22
libspf2 for Debian
==================
 
Debian's version of libspf2 does a couple of things slightly
differently compared to the upstream version (usually meaning: more
RFC-compliantly). You can always see all applied patches by
downloading the source package and looking in the debian/patches
subdirectory. All patches should also be mentioned in the Debian
changelog. Some deserve further comment, though:
 
* 42_empty_sender.dpatch changes SPF_request_set_env_sender() so that
if called with an empty envelope sender, the envelope sender in the
SPF_request_struct structure will be set to the HELO identity
instead ("postmaster@" + the HELO domain), provided that
SPF_request_set_helo_dom() has been called beforehand. This should
improve behaviour of applications that (incorrectly) call
SPF_request_set_env_sender() with an empty envelope sender address.
However, applications SHOULD NOT RELY ON THIS, but should check if
the envelope sender address is empty, and in that case pass the HELO
identity instead, or use the result of an earlier HELO check.
 
-- Magnus Holmgren <magnus@kibibyte.se>, Wed, 22 Aug 2007 17:10:07 +0200