librbl1-2.11.0-bp154.3.3.1 4>$  Ape- !M@eeezw&eeG AϏ㹕 ~۠nv=Z$OrVF<6`$ζӪ Q9H_l~jZC iPL(<9Dgh[߅Ā8bEXʀƽbo0F"#s*13 F\4tx+`ejrld:'#4P 7uflo{+kA+-C}48ed05da6938ab53a09d01ab011f2d2f50a90613c12b2eb9b7d08b132e95479d66fda58fa3aa1c7d25c243be93d2de36205a43f0@0e- !M@eee/P[#k"E (7)skޘ_i‘|"3 <8'%vkyj+_i$ ]-q;ΙwiSҾK{_ĴoU䌫G+pX%> =<5!xU$y/ $a"ϽзV[ WQVAeVTh<ץ/Bi~ noQR"ĭ'o j"TPFzկ?Bb4½"Dx%>>>|Jx>p@'?'d   F&3 L]v|      08h   (89:>$a@$pF$G$H$I$X$Y$\$]$^%b% c%d&Ze&_f&bl&du&xv&w'x' y'(z'@'P'T'Z'Clibrbl12.11.0bp154.3.3.1Realtime Blacklist (RBL) service libraryThis package provides librbl which is an interface to a facility to conduct Realtime Blacklist (RBL) queries and return their results. RBLs are described in RFC5782.e- s390zl24HSUSE Linux Enterprise 15openSUSEBSD-3-Clausehttp://bugs.opensuse.orgSystem/Librarieshttp://www.opendkim.org/linuxs390xHءe- he- had289e727b1f3e07f35469ededf509f8f52b364e1deac0e5c7b0e6cb8480f71blibrbl.so.1.0.0rootrootrootrootopendkim-2.11.0-bp154.3.3.1.src.rpmlibrbl.so.1()(64bit)librbl1librbl1(s390-64)@@@@@    /sbin/ldconfig/sbin/ldconfiglibc.so.6()(64bit)libc.so.6(GLIBC_2.2)(64bit)libc.so.6(GLIBC_2.4)(64bit)libresolv.so.2()(64bit)libresolv.so.2(GLIBC_2.2)(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.3e)1@amaah`E_=@__ L[[5@[5@[ @Y.XVwV&@U>$U>$T{T|X@Ferdinand Thiessen Johannes Segitz Togan Muftuoglu Christian Wittmer Dominique Leuenberger Thorsten Kukuk Thorsten Kukuk mrueckert@suse.demrueckert@suse.dekbabioch@suse.comopensuse@dstoecker.dejengelh@inai.derpm@fthiessen.demrueckert@suse.demrueckert@suse.demrueckert@suse.demrueckert@suse.demrueckert@suse.demrueckert@suse.de- Add fix-RSA_sign-call.patch * Fix bsc#1216117 * Fix call of RSA sign on big endian systems, patch origin: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1012506- Added hardening to systemd service (bsc#1181400). Added patch: * harden_opendkim.service.patch Modified: * opendkim.service- Add cve-2020-12272.patch (CVE-2020-12272) * Confirm that the value of "d=" is properly formed, fixed upstream in commit 14d54524e0a97d3fe9b80441907d7e356c9ded04 - Add unbound-fix.patch * Plug memory leak in Unbound callback https://github.com/trusteddomainproject/OpenDKIM/pull/57- add opendkim to Group unbound to be able to read TrustAnchorFile - add postfix to Group opendkim to be able to read/write to opendkim.sock - add %{_sysconfdir}/%{name}/keys dir - change /var/run to /run wherever used - rework opendkim-2.9.2_default_config.patch and renamed it to opendkim-default_config.patch- Fix usage of %{_libexecdir} when %{_tmpfilesdir} was meant to be used.- opendkim calls openssl, make sure the command is there- Use systemd_ordering instead of systemd_requires for container - Update to opendkim 2.11.0-Beta2 - Add support for ED25519 keys - Add compatibility with openssl-1.1.0 - Feature request #190: Reject signature object requests where the domain name or selector includes non-printable characters. - Feature requrest #187: Add option to match subdomains when generating zone files. - Many bug fixes - Obsoletes opendkim.ticket35+37.patch - Disable erlang, new erlang version seems to miss required files- https://src.fedoraproject.org/rpms/opendkim/raw/master/f/opendkim.ticket35+37.patch allow building on newer distros (openssl 1.1 support)- fix the previous change: source files got added but the renumbering was not applied to the reference to the source files -> signature file was installed as services file- Applied spec-cleaner to spec file - Removed conditionals around %license macro - Used OpenPGP signature provided upstream - Added opendkim.keyring containing the key used to sign official releases.- enable DNSSEC support (requires unbound library) ATTENTION: The file /var/lib/unbound/root.key must be readable by user opendkim, which is not the fact for older unbound packages- Remove some idempotent %if blocks.- Implemented shared-library-packaging-policy * Splitted shared libraries - Some spec file cleanup - Splitted autobuild and miltertest programs into own subpackages- require main package from devel package - fix conditional for sql support. it was mixed with sql and opendkim_sql - make RRD support optional pulls a lot of things. - use correct license for the sendmail part- update to 2.10.3 - LIBOPENDKIM: Make strict header checking non-destructive. The last change to this code resulted in failing signatures. Reported by Pedro Morales and Wez Furlong. - changes from 2.10.2 - Fix bug #221: Report a DKIM result of "policy" if MinimumKeyBits or UnprotectedKey cause the signature to result in a "pass" override. Reported by Kurt Roeckx. - Fix bug #227: Revert removal of SenderHeaders configuration setting. Document that it is now limited to signature selection. - LIBOPENDKIM: Fix bug #226: Deal with header fields that are wrapped before there's any content. Reported by Alessandro Vesely. - CONTRIB: Update to contrib/systemd/opendkim.service.in from Steve Jenkins. - refreshed opendkim-2.9.2_default_config.patch to apply cleanly again- cleanup build requires- update to 2.10.1 Make DB_SIGNINGTABLE symbol available in Lua scripts. Problem noted by Klaus Heinrich. Fix bug #214: Handle arbitrarily large From: fields. Reported by Tomohiko Sasaki. LIBOPENDKIM: Fix bug #213: Remove "dkim_default_senderhdrs" from dkim.h. Problem noted by Daniel J. Luke. LIBOPENDKIM: Fix bug #219: Unresolved CNAMEs are not failures, according to the DNS (see RFC6604), so report them as NXDOMAIN or similar. Reported by Alessandro Vesely. - changes from 2.10.0 Feature request #182: Remove "AddAllSignatureResults". All signature results will now be added via Authentication-Results header fields. Requested by Tomki Camp. Feature request #180: Rename "LDAPSoftStart" to "SoftStart" and apply it to SQL connections as well. Requested by Daniel Kauffman. Feature request #179: Add "IgnoreMalformedMail" option. Fix bug #183: Discontinue support for ADSP. This removes the following configuration file items: AddAllSignatureResults LocalADSP ADSPAction NoDiscardableMailTo ADSPNoSuchDomain On-PolicyError BogusPolicy SendADSPReports DisableADSP SenderHeaders LDAPSoftStart UnprotectedPolicy Make "rrvs" and "smime" recognized Authentication-Results methods. LIBOPENDKIM: Feature request #157: Add dkim_mail_parse_multi(). Suggested by Alessandro Vesely. LIBOPENDKIM: Feature request #185: Add dkim_set_dnssec(). Patch from Alec Peterson. LIBOPENDKIM: Fix bug #183: Discontinue support for ADSP. This means all of the following: - the dkim_policy_t type has been removed - the DKIM_POLICY_* constants have been removed - the DKIM_PRESULT_* constants have been removed - passing DKIM_OPTS_SENDERHDRS to dkim_options() now results in an error - the DKIM_PSTATE structure has been removed - all of the following functions have been removed: dkim_policy(), dkim_policy_dnssec(), dkim_policy_getqueries(), dkim_policy_getreportinfo(), dkim_policy_state_free(), dkim_policy_state_new(), dkim_policy_syntax(), dkim_getpolicystr(), dkim_getpresult(), dkim_getpresultstr(), dkim_set_policy_lookup(), dkim_test_adsp() LIBOPENDKIM: DKIM_LIBFLAGS_STRICTHDRS now also confirms syntactical validity of the From field before proceeding with a signing or verifying operation. Suggested by Wez Furlong. CONTRIB: Fix bug #207: Clean up the "stats" directory. CONTRIB: Add "repute" directory which could eventually replace the PHP implementation. Submitted by Daniel Black. CONTRIB: Patches to systemd and init/redhat from Steve Jenkins. - changes from 2.9.3 Fix bug #177: Plug leaking "result" structures when OpenLDAP is in use. Truncate configuration file lines at carriage return. Replace overlapping strlcpy() with memmove() in dkim_get_key_file(). Reported by Daniel J. Luke. Patch #32: Re-arrange the execution logic to drop privileges in proper order. LIBOPENDKIM: dkim_header() is now a lot more strict about the input it will accept (see RFC5322 Section 2.2). LIBOPENDKIM: Tighten relaxed modes to break on only DKIM-defined whitespace characters. Problem noted by Elizabeth Zwicky. LIBOPENDKIM: Fix bug #208: If a signature fails to verify for either reason (header hash mismatched or body hash mismatched), set DKIM_SIGERROR_BADSIG so that Authentication-Results doesn't report a failure with "no signature error". TOOLS: Feature request #178: Add "-F" flag to opendkim-genzone so records are created with the FQDN. Patch from Andreas Schulze. REPUTATION: Handle parameters safely in repute.php. Reported by Daniel Black. - refreshed patches to apply cleanly again: opendkim-2.9.2_compiler_warnings.patch opendkim-2.9.2_default_config.patch - use the correct signal for reloading the config - make sure that all the buildrequires we added are actually used by adding the needed --with-* options- more work on integration with the distribution - added init system support (systemd,sysvinit) - adapt the default config to change some defaults new patch: opendkim-2.9.2_default_config.patch - a few more buildrequires: libevent-devel, tre-devel, unbound-devel, erlang- initial package/sbin/ldconfig/sbin/ldconfigs390zl24 16974508902.11.0-bp154.3.3.12.11.0-bp154.3.3.1librbl.so.1librbl.so.1.0.0/usr/lib64/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protectionobs://build.opensuse.org/openSUSE:Maintenance:18120/openSUSE_Backports_SLE-15-SP4_Update/49d8527c7d2f80af89294fbc5533b921-opendkim.openSUSE_Backports_SLE-15-SP4_Updatecpioxz5s390x-suse-linuxELF 64-bit MSB shared object, IBM S/390, version 1 (SYSV), dynamically linked, BuildID[sha1]=4a50b2b33c3763e6a6b4f50b7426896708376d23, not strippedPRRRRRm~YՃPutf-89d66787363bd7e9514ec2e4b9ce68f16b9da7e5d1c55de4d5e1d36b2ebbffcc1?7zXZ !t/Jw] cr$x#I|[T¦$^q@021nVPIkŪ\׈M:άbU=@naZ lU^5Ƀ|v,XT ْsENٯ~X&.P~n[.E6|l27ITwSsN cX*C e@BPךzCi:֠y!ڣJhK;WQj~eȕ$DKXhb{ϋUѱW`㜰8Fݩ&GmFT4aE ?QCZEBVG_\Oj:u9 Kxs#.y8I k\KW{6d}o}91>RJ΍H Y#eNk,$ék? * CNh!f ߏM_LNbNE/spxF7HZNMAKB Ԏ|k%r99UI Ho.ÐnJrRFS 4x-. C蒪yu4GiNYY3H&cJ Z#PVJO] a̞Ȓ|[ qaC/?ɝ5l %<σPO/>D/ˁC?)v#K<;:AkςXT_)0wLKu):ܛ\jR DCUqOysan}vϝ$ƯDWvxj%..D_a \x1RMgÒž8d)8_Qj\Da.ac#r׵0O&؉c}2-v~u#>̙D!g<7YJY +q0P7b*Ҽ\fA"NR0*<b<)j+ RiPqܷ< d;.tcW9plH BdpSwX9"]5V4<eO霙 7EQ9Wng$CTs=FTf [@|l"tB,/]pi5*r2w :7~\AVv]j'3$>|E4 #}/S7GY8;AкAe,_!շ3L#n(h7)$%K'.?5#wy3+E9 ( $yruݘ<Ş2CKk)7*j3 j">NDӓQcݔ\(ģu[ Y6GᆷC!(a0 f<^|^~ӥu$JK S> ~xWMd"?蝑ҙJ^+SheQeMzn<>6z2~ntObƥ4ʝkt *DԷ`CZ阊8_7Krp[goOG6j r`=UnQv{ ?h't2*|shX'm@18e \F#?NBI4_ZSEdS1(/OD:O &=E' `mJCiG)Zi~Ʊ*N+O*3>pva8&x@DLN]f<l$ZO+AXwϐ hѿZA!] @nk$D4<*v}˰^ +.d B|i U,z 1Oq$C #``vMsJqcYA57MJڑ0xI)?GM%BGuf369HkbTG$>B sOGf3پQMخ{&"VO_sc{x:9/IP؅\#=RrKSoށ沱<3 B?Ac7E׻\_5DԿ(`L|s5:E<;0;҅UPKߍ3溢^|<2bx t GQtݷoeX81;9G>~p4;Om΂7w>9*D{ʼn=H/G+Ɵ丫r^#ƬZ'췥ܫȻmuxJJVfQAկ, _yNQץX6qLf)MeXli:(7HE>ټ&h:'י _3)|мA ]:)2 JV4ba̱y.Ӧz Ω&D.a DqO%^,߽n z<TjEec<$ɉjp'?/y{j@mMsKh<h#Cz^l1f%7 t gz=[djS2ǐ|M0M"yZ_E]DQ+z_Xix)mTPpoC-9}VA\jC&U)f{$ǘ \2x4ň"ۍc*$w}[a,?siD}>/v[\tsgzYnOy?#"f X$::4| ; jwo&E' &VM/Y4,PW`[zȂ`|s"aZ(gA7YC4@B12g-Ϸk0ͼre:Ln@L7yS2=V?3-L~\:pxDhTj/P4D' M~ *Er4fg~$w:∹>Xe1lxq AQu\`$Te~#FDE_-g$Ų%ƿsV}ǠZa,r̀HeA>7.!gxȗ$~ qqVĠ jn/ay^2-{d4 xr]eZÁ*MI`Ci~njbQïN|{`@ l&%eJˆ?h7Oڋ!;悌/4o]ƨ FO( 8w`XB.2r{@L<7+j3e8|;') h-zeР{>nmƟ3 4ƌ#]9Lp8yI,˓e 0w!9:Ӻš:Rg/[Yr2ՐUg5WmX pe!̭)OE 01"0k^atW7C$*#{6Ɔg]B$>nSߒY=ohdJu98s9dyfŪ0P:]6ыZ=WB4C[ʦv(!f˜Z2ɵJK"Ē{z{ӹ&X }$;UCzUklmߊ2UQ0OG揄#R7)?EDx&77M]}R 0#A?keZ_]E!Ug 1?{;rX;F]'@<T`q@=u՛F ȡc5b>4`n<蝃1P59]#]/QfC7gH5?0(E¥$hդI]\mFG|A`-DYћ-.O)k rPvVY迧;jBLF3Ĺ5fewMln >8TSDXb^(߰]e df3:?? <%_ '%Ap8ML;eF_AtZF@I7~!t ʹd107$%@r#hLm{lk,6)M`S'S1s 0J59JLJC ,z$[E]K-YM\-W pOO/K.]PGCcM-QkҲ^~}- |V7c.XTQ<+dy$qB/ߴY4gIa%3qFX\9a Ɵ(AФ YZ