librbl1-2.11.0-bp155.3.15 >  A dkLI%z ^4Lw 7uvYsPCJ9$1B7cii$RfU$HA /24d Z[% ζY0`TLxpR5Ξf iۑ'YwOZ=r)ͬ-X˾0#]Q4_sMG^*E6<;V?3-lR15f7'la۬՘0Gu Ghf]=T{JZS^ʼnЏnZRd'%c]ZIi K?ct0Wɵ /Li!"q)u| 8*WCSJ)Qq5m.џoP+%I隭>q =,'kB 23dc3c21624a7f46f31389420f5891082512a38480f9e0987519f2ce267ee8c6280db75d2b2579af19e186b93b626b92874a0206=dkLI%z #d.n"y\bJDzE<0o@yڗe#g HCxr~w8گhN1}]ڰzzrDRaM '2#WE/u' H!;0?,"} <h\瞗\LwDuHˊP -}Ж>4;'Ð|h3礻K+sʑlIcp@&?&d   E"/ IZsy     ,4d   (890:>#@#F#G#H#I#X#Y$\$(]$0^$Lb$Xc%d%ke%pf%sl%uu%v%w& x&(y&0z&L&\&`&f&Clibrbl12.11.0bp155.3.15Realtime Blacklist (RBL) service libraryThis package provides librbl which is an interface to a facility to conduct Realtime Blacklist (RBL) queries and return their results. RBLs are described in RFC5782.dkLlamb067SUSE Linux Enterprise 15 SP5openSUSEBSD-3-Clausehttps://bugs.opensuse.orgSystem/Librarieshttp://www.opendkim.org/linuxx86_647dkLdkL8b5a1233d26feb77710e5e08f2cac46646698b220f9513d462d0305534a4bf64librbl.so.1.0.0rootrootrootrootopendkim-2.11.0-bp155.3.15.src.rpmlibrbl.so.1()(64bit)librbl1librbl1(x86-64)@@@@@@    /sbin/ldconfig/sbin/ldconfiglibc.so.6()(64bit)libc.so.6(GLIBC_2.2.5)(64bit)libc.so.6(GLIBC_2.3.4)(64bit)libc.so.6(GLIBC_2.4)(64bit)libresolv.so.2()(64bit)libresolv.so.2(GLIBC_2.2.5)(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.3amaah`E_=@__ L[[5@[5@[ @Y.XVwV&@U>$U>$T{T|X@Johannes Segitz Togan Muftuoglu Christian Wittmer Dominique Leuenberger Thorsten Kukuk Thorsten Kukuk mrueckert@suse.demrueckert@suse.dekbabioch@suse.comopensuse@dstoecker.dejengelh@inai.derpm@fthiessen.demrueckert@suse.demrueckert@suse.demrueckert@suse.demrueckert@suse.demrueckert@suse.demrueckert@suse.de- Added hardening to systemd service (bsc#1181400). Added patch: * harden_opendkim.service.patch Modified: * opendkim.service- Add cve-2020-12272.patch (CVE-2020-12272) * Confirm that the value of "d=" is properly formed, fixed upstream in commit 14d54524e0a97d3fe9b80441907d7e356c9ded04 - Add unbound-fix.patch * Plug memory leak in Unbound callback https://github.com/trusteddomainproject/OpenDKIM/pull/57- add opendkim to Group unbound to be able to read TrustAnchorFile - add postfix to Group opendkim to be able to read/write to opendkim.sock - add %{_sysconfdir}/%{name}/keys dir - change /var/run to /run wherever used - rework opendkim-2.9.2_default_config.patch and renamed it to opendkim-default_config.patch- Fix usage of %{_libexecdir} when %{_tmpfilesdir} was meant to be used.- opendkim calls openssl, make sure the command is there- Use systemd_ordering instead of systemd_requires for container - Update to opendkim 2.11.0-Beta2 - Add support for ED25519 keys - Add compatibility with openssl-1.1.0 - Feature request #190: Reject signature object requests where the domain name or selector includes non-printable characters. - Feature requrest #187: Add option to match subdomains when generating zone files. - Many bug fixes - Obsoletes opendkim.ticket35+37.patch - Disable erlang, new erlang version seems to miss required files- https://src.fedoraproject.org/rpms/opendkim/raw/master/f/opendkim.ticket35+37.patch allow building on newer distros (openssl 1.1 support)- fix the previous change: source files got added but the renumbering was not applied to the reference to the source files -> signature file was installed as services file- Applied spec-cleaner to spec file - Removed conditionals around %license macro - Used OpenPGP signature provided upstream - Added opendkim.keyring containing the key used to sign official releases.- enable DNSSEC support (requires unbound library) ATTENTION: The file /var/lib/unbound/root.key must be readable by user opendkim, which is not the fact for older unbound packages- Remove some idempotent %if blocks.- Implemented shared-library-packaging-policy * Splitted shared libraries - Some spec file cleanup - Splitted autobuild and miltertest programs into own subpackages- require main package from devel package - fix conditional for sql support. it was mixed with sql and opendkim_sql - make RRD support optional pulls a lot of things. - use correct license for the sendmail part- update to 2.10.3 - LIBOPENDKIM: Make strict header checking non-destructive. The last change to this code resulted in failing signatures. Reported by Pedro Morales and Wez Furlong. - changes from 2.10.2 - Fix bug #221: Report a DKIM result of "policy" if MinimumKeyBits or UnprotectedKey cause the signature to result in a "pass" override. Reported by Kurt Roeckx. - Fix bug #227: Revert removal of SenderHeaders configuration setting. Document that it is now limited to signature selection. - LIBOPENDKIM: Fix bug #226: Deal with header fields that are wrapped before there's any content. Reported by Alessandro Vesely. - CONTRIB: Update to contrib/systemd/opendkim.service.in from Steve Jenkins. - refreshed opendkim-2.9.2_default_config.patch to apply cleanly again- cleanup build requires- update to 2.10.1 Make DB_SIGNINGTABLE symbol available in Lua scripts. Problem noted by Klaus Heinrich. Fix bug #214: Handle arbitrarily large From: fields. Reported by Tomohiko Sasaki. LIBOPENDKIM: Fix bug #213: Remove "dkim_default_senderhdrs" from dkim.h. Problem noted by Daniel J. Luke. LIBOPENDKIM: Fix bug #219: Unresolved CNAMEs are not failures, according to the DNS (see RFC6604), so report them as NXDOMAIN or similar. Reported by Alessandro Vesely. - changes from 2.10.0 Feature request #182: Remove "AddAllSignatureResults". All signature results will now be added via Authentication-Results header fields. Requested by Tomki Camp. Feature request #180: Rename "LDAPSoftStart" to "SoftStart" and apply it to SQL connections as well. Requested by Daniel Kauffman. Feature request #179: Add "IgnoreMalformedMail" option. Fix bug #183: Discontinue support for ADSP. This removes the following configuration file items: AddAllSignatureResults LocalADSP ADSPAction NoDiscardableMailTo ADSPNoSuchDomain On-PolicyError BogusPolicy SendADSPReports DisableADSP SenderHeaders LDAPSoftStart UnprotectedPolicy Make "rrvs" and "smime" recognized Authentication-Results methods. LIBOPENDKIM: Feature request #157: Add dkim_mail_parse_multi(). Suggested by Alessandro Vesely. LIBOPENDKIM: Feature request #185: Add dkim_set_dnssec(). Patch from Alec Peterson. LIBOPENDKIM: Fix bug #183: Discontinue support for ADSP. This means all of the following: - the dkim_policy_t type has been removed - the DKIM_POLICY_* constants have been removed - the DKIM_PRESULT_* constants have been removed - passing DKIM_OPTS_SENDERHDRS to dkim_options() now results in an error - the DKIM_PSTATE structure has been removed - all of the following functions have been removed: dkim_policy(), dkim_policy_dnssec(), dkim_policy_getqueries(), dkim_policy_getreportinfo(), dkim_policy_state_free(), dkim_policy_state_new(), dkim_policy_syntax(), dkim_getpolicystr(), dkim_getpresult(), dkim_getpresultstr(), dkim_set_policy_lookup(), dkim_test_adsp() LIBOPENDKIM: DKIM_LIBFLAGS_STRICTHDRS now also confirms syntactical validity of the From field before proceeding with a signing or verifying operation. Suggested by Wez Furlong. CONTRIB: Fix bug #207: Clean up the "stats" directory. CONTRIB: Add "repute" directory which could eventually replace the PHP implementation. Submitted by Daniel Black. CONTRIB: Patches to systemd and init/redhat from Steve Jenkins. - changes from 2.9.3 Fix bug #177: Plug leaking "result" structures when OpenLDAP is in use. Truncate configuration file lines at carriage return. Replace overlapping strlcpy() with memmove() in dkim_get_key_file(). Reported by Daniel J. Luke. Patch #32: Re-arrange the execution logic to drop privileges in proper order. LIBOPENDKIM: dkim_header() is now a lot more strict about the input it will accept (see RFC5322 Section 2.2). LIBOPENDKIM: Tighten relaxed modes to break on only DKIM-defined whitespace characters. Problem noted by Elizabeth Zwicky. LIBOPENDKIM: Fix bug #208: If a signature fails to verify for either reason (header hash mismatched or body hash mismatched), set DKIM_SIGERROR_BADSIG so that Authentication-Results doesn't report a failure with "no signature error". TOOLS: Feature request #178: Add "-F" flag to opendkim-genzone so records are created with the FQDN. Patch from Andreas Schulze. REPUTATION: Handle parameters safely in repute.php. Reported by Daniel Black. - refreshed patches to apply cleanly again: opendkim-2.9.2_compiler_warnings.patch opendkim-2.9.2_default_config.patch - use the correct signal for reloading the config - make sure that all the buildrequires we added are actually used by adding the needed --with-* options- more work on integration with the distribution - added init system support (systemd,sysvinit) - adapt the default config to change some defaults new patch: opendkim-2.9.2_default_config.patch - a few more buildrequires: libevent-devel, tre-devel, unbound-devel, erlang- initial package/sbin/ldconfig/sbin/ldconfiglamb06 16847535482.11.0-bp155.3.152.11.0-bp155.3.15librbl.so.1librbl.so.1.0.0/usr/lib64/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Backports:SLE-15-SP5/standard/7414f105c75cdfceb5825cf465e376a1-opendkimcpioxz5x86_64-suse-linuxELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=38f7b44d7313e10de7ccdff469457f82d4dce869, strippedPRRRRRRfȁW4#l.utf-8ada48001d71208b6755d85df975276d0c8d60a83faf5b8245cbcad86facb3286?7zXZ !t/9?] cr$x#H n\JHCQo}/ 02<mL7o|=EnUsx{p0gL _.8〣"+]N1XjrG]I!`nT8yY.3f圦3 8F<8o2gs?:쯜Gffg8?_\x}W*/EL@+LtPژ廝'@KSkRz,=1{h^|c))XghFvq>pR͘@dXl渺B>S ֳ& 4 ߭WX%,M}ހ9)YH\N; 猇uT 7{ ïѧ^upLSGnLayf}Zg8%_RD?g|bK`R" tC/jfնItaz[9תG3ˇSJNa{UUn(62P`;:^zR+d <8i NwPoTӔ$ue x`6xS ?\D{XBOֹ iq$VL$Vew [= Ƙ a'i! )j.mT>6=8=DWT,*1a`uM͢f=ԫDکfX{!vsX7sʳ->V3l̢'O -+M~>9%͌CJf' "8J_F1֗CL-Jx@ XrBH ?H#1]PQI^-M0]5:,/@aفz\6y Tjn.*&}G& ĉW!r!Qd)[aKU~TJ i/ѳIK,Sdsd,.|:z\2cDi ZR< ~0Bc6cs)LhUef,rBvVcE$7fcDl&:9ˢbUzEM-0۽]Xbl{کVl 7\H 4-Pp<1lPaicg4e5gAɗzCDZk&8 z*J voIR!F?Ue?rC-m˲i|Ȭ7t)9"B0%ˢɡܡ5:u e à=PbFU/aɇ$.lK,"Ҧ$<PҎuhwhWᰱ4*\Cگ|laY79j٠$ous*! ʲ`#d)<a:ܛ[A_mDt) շڒ- ŽfYI z>3+7힤pxyujYkˉq*$XzT{l`azrNT00cQOuh‘7&\J='V^-5&sZvY(/P6g2 JyqOFӛZ+^ קvºp6z"/Y"[UqΜ%YB0?D/>6,gaz`GnϽ6,}̴2XЮj.6^TDZm}[08%>)d!X{j*#tA0/Oj+=X3~bu vh D,20T@/U8XMsa#uJ*&B QpԼL mI~4-0HA3˕Z^d&*W3,XlKv`L&ΧP o^'$TI3.X#ƂӵbvHxgnТRbv2B_OtLȓiG_rl+)8O.fe}8&8ccnw!]]Ux-mXP: UNO S\4!E%#iE]k%!Gs7>s B>QOm'nE;5dnO7ހҳWJD6xB|ԴGkE紬=7 )GXWy}ݺYRJ:Dܨh{Y޷P^fz;|O}2;ΧMŢ62`ANN/;0wJs1%*649RDHuh{>N=B+NZ;hU2eE^\X )W nY*{yq5ƨnC.g%rWK YZ