f2934b4859
you have a good client using an IP listed on a RBL, this person cannot have a chance to auth on qmail server if server uses rblsmtpd because connection is dropped before call qmail-smtpd. This patch fix this problem, changing rblsmtpd to doesn't drop the connection, just set a var, that will be checked by patched qmail-smtpd, and if person is authenticated, it ignores rbl check. PR: ports/98390 Approved by: maintainer
15 lines
1,016 B
Text
15 lines
1,016 B
Text
MD5 (ucspi-tcp-0.88.tar.gz) = 39b619147db54687c4a583a7a94c9163
|
|
SHA256 (ucspi-tcp-0.88.tar.gz) = 4a0615cab74886f5b4f7e8fd32933a07b955536a3476d74ea087a3ea66a23e9c
|
|
SIZE (ucspi-tcp-0.88.tar.gz) = 53019
|
|
MD5 (ucspi-tcp-0.88-man.tar.gz) = d33160cbd43bccbc0963d0499dfcebdb
|
|
SHA256 (ucspi-tcp-0.88-man.tar.gz) = 09b1dd69ca3722b62c030abb27df9560cb72ff5d6247e4628e0c61e957b408ef
|
|
SIZE (ucspi-tcp-0.88-man.tar.gz) = 7562
|
|
MD5 (ucspi-rss.diff) = 554ec0eb60f619667efde3fb5325310d
|
|
SHA256 (ucspi-rss.diff) = 5101354eb86d8e11edefd7b83df4e9c274a55b845f4cb2ce36dda912aced56f4
|
|
SIZE (ucspi-rss.diff) = 1828
|
|
MD5 (ucspi-tcp-ssl-20050405.patch.gz) = cbe2443539d5289ffb5ae2a036e0ba3d
|
|
SHA256 (ucspi-tcp-ssl-20050405.patch.gz) = 931ebeb9ca3ceb9394464aca0c4585048d04fc194fc5a9d4bb49bdd8ac249467
|
|
SIZE (ucspi-tcp-ssl-20050405.patch.gz) = 13173
|
|
MD5 (ucspi-tcp_rbl2smtpd.diff) = 3515b80cb3c50ad9990785704798020f
|
|
SHA256 (ucspi-tcp_rbl2smtpd.diff) = b31092bad79912c4cdaebf65863e249f0f8136d64d9cf486fafeb5561dbc2b88
|
|
SIZE (ucspi-tcp_rbl2smtpd.diff) = 570
|