librbl1-2.11.0-bp154.3.3.1 4>$  Ape-!M@eee.@BO$1_MLb<7F{s_  w7oܭ ; mLx)aB&= !PuOs]ʽ"okiҌ SB50\Sq\ >w iop󾾓T%g~NʞP `X,zo갹 t$Z`Blf#28e3936c5eb427fe53efe3e8e3a404021377c9d735250bbbd9a5e3c4dc5b1fb0f0b70a72c53883c39a31ba28ce800c1925fa2865De-!M@eeen2mEfNOl:),lLЂP4܋54zC{*p]񨡴 6WuHa_7%NaY@9&gwϹ=9s3> AA[s7\/OF3JO95鰤US(I0\I=%i24, _aL)pcu%&P>p@'?'d   F!*7 Paz     4<l   (89:>$E@$TF$cG$|H$I$X$Y$\$]$^$b$c%d&Be&Gf&Jl&Lu&`v&hw'x'y' z'4'D'H'N'Clibrbl12.11.0bp154.3.3.1Realtime Blacklist (RBL) service libraryThis package provides librbl which is an interface to a facility to conduct Realtime Blacklist (RBL) queries and return their results. RBLs are described in RFC5782.e-obs-power8-05SUSE Linux Enterprise 15openSUSEBSD-3-Clausehttp://bugs.opensuse.orgSystem/Librarieshttp://www.opendkim.org/linuxppc64lee-e-f05eecdd3bb75778f952ec62a65b976af52b409e399a4574802d247fc5e8d90elibrbl.so.1.0.0rootrootrootrootopendkim-2.11.0-bp154.3.3.1.src.rpmlibrbl.so.1()(64bit)librbl1librbl1(ppc-64)@@@@    /sbin/ldconfig/sbin/ldconfiglibc.so.6()(64bit)libc.so.6(GLIBC_2.17)(64bit)libresolv.so.2()(64bit)libresolv.so.2(GLIBC_2.17)(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.3e)1@amaah`E_=@__ L[[5@[5@[ @Y.XVwV&@U>$U>$T{T|X@Ferdinand Thiessen Johannes Segitz Togan Muftuoglu Christian Wittmer Dominique Leuenberger Thorsten Kukuk Thorsten Kukuk mrueckert@suse.demrueckert@suse.dekbabioch@suse.comopensuse@dstoecker.dejengelh@inai.derpm@fthiessen.demrueckert@suse.demrueckert@suse.demrueckert@suse.demrueckert@suse.demrueckert@suse.demrueckert@suse.de- Add fix-RSA_sign-call.patch * Fix bsc#1216117 * Fix call of RSA sign on big endian systems, patch origin: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1012506- Added hardening to systemd service (bsc#1181400). Added patch: * harden_opendkim.service.patch Modified: * opendkim.service- Add cve-2020-12272.patch (CVE-2020-12272) * Confirm that the value of "d=" is properly formed, fixed upstream in commit 14d54524e0a97d3fe9b80441907d7e356c9ded04 - Add unbound-fix.patch * Plug memory leak in Unbound callback https://github.com/trusteddomainproject/OpenDKIM/pull/57- add opendkim to Group unbound to be able to read TrustAnchorFile - add postfix to Group opendkim to be able to read/write to opendkim.sock - add %{_sysconfdir}/%{name}/keys dir - change /var/run to /run wherever used - rework opendkim-2.9.2_default_config.patch and renamed it to opendkim-default_config.patch- Fix usage of %{_libexecdir} when %{_tmpfilesdir} was meant to be used.- opendkim calls openssl, make sure the command is there- Use systemd_ordering instead of systemd_requires for container - Update to opendkim 2.11.0-Beta2 - Add support for ED25519 keys - Add compatibility with openssl-1.1.0 - Feature request #190: Reject signature object requests where the domain name or selector includes non-printable characters. - Feature requrest #187: Add option to match subdomains when generating zone files. - Many bug fixes - Obsoletes opendkim.ticket35+37.patch - Disable erlang, new erlang version seems to miss required files- https://src.fedoraproject.org/rpms/opendkim/raw/master/f/opendkim.ticket35+37.patch allow building on newer distros (openssl 1.1 support)- fix the previous change: source files got added but the renumbering was not applied to the reference to the source files -> signature file was installed as services file- Applied spec-cleaner to spec file - Removed conditionals around %license macro - Used OpenPGP signature provided upstream - Added opendkim.keyring containing the key used to sign official releases.- enable DNSSEC support (requires unbound library) ATTENTION: The file /var/lib/unbound/root.key must be readable by user opendkim, which is not the fact for older unbound packages- Remove some idempotent %if blocks.- Implemented shared-library-packaging-policy * Splitted shared libraries - Some spec file cleanup - Splitted autobuild and miltertest programs into own subpackages- require main package from devel package - fix conditional for sql support. it was mixed with sql and opendkim_sql - make RRD support optional pulls a lot of things. - use correct license for the sendmail part- update to 2.10.3 - LIBOPENDKIM: Make strict header checking non-destructive. The last change to this code resulted in failing signatures. Reported by Pedro Morales and Wez Furlong. - changes from 2.10.2 - Fix bug #221: Report a DKIM result of "policy" if MinimumKeyBits or UnprotectedKey cause the signature to result in a "pass" override. Reported by Kurt Roeckx. - Fix bug #227: Revert removal of SenderHeaders configuration setting. Document that it is now limited to signature selection. - LIBOPENDKIM: Fix bug #226: Deal with header fields that are wrapped before there's any content. Reported by Alessandro Vesely. - CONTRIB: Update to contrib/systemd/opendkim.service.in from Steve Jenkins. - refreshed opendkim-2.9.2_default_config.patch to apply cleanly again- cleanup build requires- update to 2.10.1 Make DB_SIGNINGTABLE symbol available in Lua scripts. Problem noted by Klaus Heinrich. Fix bug #214: Handle arbitrarily large From: fields. Reported by Tomohiko Sasaki. LIBOPENDKIM: Fix bug #213: Remove "dkim_default_senderhdrs" from dkim.h. Problem noted by Daniel J. Luke. LIBOPENDKIM: Fix bug #219: Unresolved CNAMEs are not failures, according to the DNS (see RFC6604), so report them as NXDOMAIN or similar. Reported by Alessandro Vesely. - changes from 2.10.0 Feature request #182: Remove "AddAllSignatureResults". All signature results will now be added via Authentication-Results header fields. Requested by Tomki Camp. Feature request #180: Rename "LDAPSoftStart" to "SoftStart" and apply it to SQL connections as well. Requested by Daniel Kauffman. Feature request #179: Add "IgnoreMalformedMail" option. Fix bug #183: Discontinue support for ADSP. This removes the following configuration file items: AddAllSignatureResults LocalADSP ADSPAction NoDiscardableMailTo ADSPNoSuchDomain On-PolicyError BogusPolicy SendADSPReports DisableADSP SenderHeaders LDAPSoftStart UnprotectedPolicy Make "rrvs" and "smime" recognized Authentication-Results methods. LIBOPENDKIM: Feature request #157: Add dkim_mail_parse_multi(). Suggested by Alessandro Vesely. LIBOPENDKIM: Feature request #185: Add dkim_set_dnssec(). Patch from Alec Peterson. LIBOPENDKIM: Fix bug #183: Discontinue support for ADSP. This means all of the following: - the dkim_policy_t type has been removed - the DKIM_POLICY_* constants have been removed - the DKIM_PRESULT_* constants have been removed - passing DKIM_OPTS_SENDERHDRS to dkim_options() now results in an error - the DKIM_PSTATE structure has been removed - all of the following functions have been removed: dkim_policy(), dkim_policy_dnssec(), dkim_policy_getqueries(), dkim_policy_getreportinfo(), dkim_policy_state_free(), dkim_policy_state_new(), dkim_policy_syntax(), dkim_getpolicystr(), dkim_getpresult(), dkim_getpresultstr(), dkim_set_policy_lookup(), dkim_test_adsp() LIBOPENDKIM: DKIM_LIBFLAGS_STRICTHDRS now also confirms syntactical validity of the From field before proceeding with a signing or verifying operation. Suggested by Wez Furlong. CONTRIB: Fix bug #207: Clean up the "stats" directory. CONTRIB: Add "repute" directory which could eventually replace the PHP implementation. Submitted by Daniel Black. CONTRIB: Patches to systemd and init/redhat from Steve Jenkins. - changes from 2.9.3 Fix bug #177: Plug leaking "result" structures when OpenLDAP is in use. Truncate configuration file lines at carriage return. Replace overlapping strlcpy() with memmove() in dkim_get_key_file(). Reported by Daniel J. Luke. Patch #32: Re-arrange the execution logic to drop privileges in proper order. LIBOPENDKIM: dkim_header() is now a lot more strict about the input it will accept (see RFC5322 Section 2.2). LIBOPENDKIM: Tighten relaxed modes to break on only DKIM-defined whitespace characters. Problem noted by Elizabeth Zwicky. LIBOPENDKIM: Fix bug #208: If a signature fails to verify for either reason (header hash mismatched or body hash mismatched), set DKIM_SIGERROR_BADSIG so that Authentication-Results doesn't report a failure with "no signature error". TOOLS: Feature request #178: Add "-F" flag to opendkim-genzone so records are created with the FQDN. Patch from Andreas Schulze. REPUTATION: Handle parameters safely in repute.php. Reported by Daniel Black. - refreshed patches to apply cleanly again: opendkim-2.9.2_compiler_warnings.patch opendkim-2.9.2_default_config.patch - use the correct signal for reloading the config - make sure that all the buildrequires we added are actually used by adding the needed --with-* options- more work on integration with the distribution - added init system support (systemd,sysvinit) - adapt the default config to change some defaults new patch: opendkim-2.9.2_default_config.patch - a few more buildrequires: libevent-devel, tre-devel, unbound-devel, erlang- initial package/sbin/ldconfig/sbin/ldconfigobs-power8-05 16974494302.11.0-bp154.3.3.12.11.0-bp154.3.3.1librbl.so.1librbl.so.1.0.0/usr/lib64/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protectionobs://build.opensuse.org/openSUSE:Maintenance:18120/openSUSE_Backports_SLE-15-SP4_Update/49d8527c7d2f80af89294fbc5533b921-opendkim.openSUSE_Backports_SLE-15-SP4_Updatecpioxz5ppc64le-suse-linuxELF 64-bit LSB shared object, 64-bit PowerPC or cisco 7500, version 1 (SYSV), dynamically linked, BuildID[sha1]=626de61477ac59eb55a24ba8f62c5ad9e87e4225, not strippedPRRRR">8#NW)ڊ~utf-8120488e4bf71d6c5fa90cff4e0eecd36e1efcd819ce41abcd59e388d74a79cc6?7zXZ !t/O] cr$x#I|SpE<S2P dGYo~zDWȦEnE)Br仚ߕ,\ëW=]Q0ol7YV;͕~X2jry֕\o09nrurwFc fLʎCv(0"=B-{rqh#P tאtFQ Tl t&%G3CFLJz:z r'n V-Nhe %_z+]#gc>Zj.iŦ?zzLXSR캦m ?s+v6E fuu]JJ8jv}|&Ϙ W o .B5+d|#?s9+YdN 5nSURpKU -2?EЫ#Y<-'Hպ$Y1tzh\e_눒;Iq3Y-}s~RoY `q1vJ]ؽmFWg{V{#8S?x34dz%`x>rMEګv ~'Ζ )Z)pഔèu17GfvŻa@>\ uT].U>=?u2ځL`둫y c2R~|>2*k*KhZ x&p=U#V42{bbjS9!%O4jmUT̺XqQPo7`*f MţpNb`B|_~yo fwT'R8\KlnDj"wE9C/LByN^| }<&3%Ѐl:@] }'ibb*]q0hԉo8GxS<>O]܂{&z"I\ny8ۺ1LCHUL3j jOa硩ZHV-g!qsQe4(vpScFx1DR6,<0c%< tٹCP&c.dMFQlbUC?@3}Zkm;g]34lbWݑgqK7|5L/ u*E ^J GW ၜ.$M=17,SSn2;J/ksa{)fg:V^ owG-BSSkKH0bLŻMtc1vX0a`"#uZAYTrAӛ1{͈=9H tCۜ/a_C7R? XjN5F+vӧ8׾+> 1autf># @ר 'O|nK3HL'xѕZ91'H={("ÅsV:O n =)\Y2\'oh!6tH."A3*iVz vaxØ&RĵQ>!%w-=f&9y˹̀[Z=w,4*/jITWPWhJypZ[q:-RC=] ){twl_nx "[Lp_ذBw(m}~Z/D2+I\<)s 3d:tcw7u5x;'~"<@mW=\HU@s6HlON?ث_o2§Vkd#ь13Z )OiW٭[+FܐĠ$:T'z^L\'w]07jt{quH MP@YX .e-Hθs{n &:~Т]o~kvHYŘ1qHsZ5jߪА,%vG-D9J x}zW$tM8Z wJQ휸 |N8?a P)IsQ9,f~eCS!|*GR.p_I)w%Dnu NKxJx -F&pWF)gOesj{PfSv430HD$scʫ'Zf9kْ./]&fSf/ o<>C[Չ)(k>'eC*2ц K !Q:=avֽ4T6AGE_|=-# uw"6O3< 6`a~vkǐDExoD*I:@4[UqP1TM̲ĘZ]hzB|<耝ZreP4N4yx*w9ӑ cN[q+I'.pn6IqE8u IF9_.ϱƘݽE4@+Ցjd/gc&Q*VS򂆎!L,Yj\!lrLkFBf??*8_b=b:XZP2 2zoqzGc%Etv6]O*a)`/1Z w?(9:,֏Fk*C`2À,V/1K7ZntEO52N%rrm3t_ttѼā$4Ʉt,҃-;Lvqn?88ӫF,@B('3T'dS3-4mi*0}֭-\=_{/4xy/.+xϮVaB4t\G@c$wZ.Wz¹6qw7jܸnvu:~kr觷|4J-Py'qM)*y&Eu|xT}pBD[{Ćd))h5q6P/R+؁矍TAq`yLI5fPdndTt*C., r~.2?Lt| &R xdU8`~))n%KMas,'N+~zD Wa-9v6N?DPae{0ĖGgG]Rgh~#BCJtk* fՀRϐEH_cpղW!r[XAFNtZ5䄡ʏD0zPp̗ɖ l4IһHo{LH(RN"4GR_R&D~hvuBʌjNFcgU.aQ?\dҠn3QAa+&vy^ x4{O d!(X;.t B,  Sk,ziKDzũfcu!L ~.I9+:i$Z OsyiOOEJa| -q8Z>'ԺI#A|* # 4|BK1[m?.ArO%0F 'CBwDOR]eN I ع]ގhn 76 ah]w%cq>^AAik^Gn%xНV.Ac%t~0v,hJHB;hV'iЀ%<AD\\ 's՝MK|B>Yʠb74!RG0˜4vW"+j 97SUZz4GT2){ɍ_y$7Y{+*$5x 09l3EcA_m5KO$kAj?-0{G祴1zy ؙQeA{D18؉ 'rC״{z2VAXjHm(/7bhQ ~S2.w~}b:9-ۙG4u"=ԭ22TAq)˶ nϒ={{t ѣ<byp 4v#[24a(ٌ q9L[cDI!fS%rQk-NΊ< w;ߩNmQ88xM-Ie4Tv6p"D!otOr%O-3 +LЅ/Aú(Kˠ庛SiՋnUj\ML;#(?EC)XU9#25߇4 Ueff$~x0Cg{ Ye]4mP[v<1.OE`HhNuGozMa| tYQCskt5l%f oI؋tvzS UjEOOJ?^5,bc( ks&QgZNc?!Lq~l10SC_n$lWDr>/43rAĞ\ +A ~ pҷg,h[1r@5H~-+FonιڧY0!IK{(Z;p3%)FJgѺ48LQ$- Z›2@V虒cartȹB\2x:$ /C%;Շ6s:UpyK %o+VYPC{IJGoh]IiYMd;RƜs{Njs]k2(