librbl1-2.11.0-bp154.3.3.1 4>$  Ape-!M@eee8{.^-@?O@yN9ND=~(MYUTӻkTO˱}vb&:hmk(-/$m|Z/%mlJTqT"?z>|Cԁ%)yn,d[#v Mʻn9O"2DN0Z4>'ݣm(%a,𞵛Aͤk^7={5T>RreRZН/efaefd2bacc1a67ab37f26e3722049d6c82512e63bbbc9a263c9ec72f435201ead4ae8b006bd9eeb6c5d77ef9edbf19f2eb9b513Ae-!M@eee pp:TDN _2o<|>@Z:yNlXzTȄ0锘 c2|.Mz\gd7imi!ƨԷI{I0ko\̧c{9GdH/םA)9jFaUlyzfLq;$24Y8D${/m`TI $o>`KRXa8|0֠NWWFkb*H:0SY%$u> WWI<- j9hH>p@'?'d   F&3 L]v|      08h   (898:>$@$F$G$H$I$X$Y$\%]% ^%(b%4c%d&e&f&l&u&v&w'<x'Dy'Lz'h'x'|''Clibrbl12.11.0bp154.3.3.1Realtime Blacklist (RBL) service libraryThis package provides librbl which is an interface to a facility to conduct Realtime Blacklist (RBL) queries and return their results. RBLs are described in RFC5782.e-~i04-ch4aG8SUSE Linux Enterprise 15openSUSEBSD-3-Clausehttp://bugs.opensuse.orgSystem/Librarieshttp://www.opendkim.org/linuxx86_64G8e-}e-}0fc98790284d0d7b2e27abc1a7d567ba6c7c269bb00784faa0d1e2bf30a99eadlibrbl.so.1.0.0rootrootrootrootopendkim-2.11.0-bp154.3.3.1.src.rpmlibrbl.so.1()(64bit)librbl1librbl1(x86-64)@@@@@@    /sbin/ldconfig/sbin/ldconfiglibc.so.6()(64bit)libc.so.6(GLIBC_2.2.5)(64bit)libc.so.6(GLIBC_2.3.4)(64bit)libc.so.6(GLIBC_2.4)(64bit)libresolv.so.2()(64bit)libresolv.so.2(GLIBC_2.2.5)(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.3e)1@amaah`E_=@__ L[[5@[5@[ @Y.XVwV&@U>$U>$T{T|X@Ferdinand Thiessen Johannes Segitz Togan Muftuoglu Christian Wittmer Dominique Leuenberger Thorsten Kukuk Thorsten Kukuk mrueckert@suse.demrueckert@suse.dekbabioch@suse.comopensuse@dstoecker.dejengelh@inai.derpm@fthiessen.demrueckert@suse.demrueckert@suse.demrueckert@suse.demrueckert@suse.demrueckert@suse.demrueckert@suse.de- Add fix-RSA_sign-call.patch * Fix bsc#1216117 * Fix call of RSA sign on big endian systems, patch origin: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1012506- Added hardening to systemd service (bsc#1181400). Added patch: * harden_opendkim.service.patch Modified: * opendkim.service- Add cve-2020-12272.patch (CVE-2020-12272) * Confirm that the value of "d=" is properly formed, fixed upstream in commit 14d54524e0a97d3fe9b80441907d7e356c9ded04 - Add unbound-fix.patch * Plug memory leak in Unbound callback https://github.com/trusteddomainproject/OpenDKIM/pull/57- add opendkim to Group unbound to be able to read TrustAnchorFile - add postfix to Group opendkim to be able to read/write to opendkim.sock - add %{_sysconfdir}/%{name}/keys dir - change /var/run to /run wherever used - rework opendkim-2.9.2_default_config.patch and renamed it to opendkim-default_config.patch- Fix usage of %{_libexecdir} when %{_tmpfilesdir} was meant to be used.- opendkim calls openssl, make sure the command is there- Use systemd_ordering instead of systemd_requires for container - Update to opendkim 2.11.0-Beta2 - Add support for ED25519 keys - Add compatibility with openssl-1.1.0 - Feature request #190: Reject signature object requests where the domain name or selector includes non-printable characters. - Feature requrest #187: Add option to match subdomains when generating zone files. - Many bug fixes - Obsoletes opendkim.ticket35+37.patch - Disable erlang, new erlang version seems to miss required files- https://src.fedoraproject.org/rpms/opendkim/raw/master/f/opendkim.ticket35+37.patch allow building on newer distros (openssl 1.1 support)- fix the previous change: source files got added but the renumbering was not applied to the reference to the source files -> signature file was installed as services file- Applied spec-cleaner to spec file - Removed conditionals around %license macro - Used OpenPGP signature provided upstream - Added opendkim.keyring containing the key used to sign official releases.- enable DNSSEC support (requires unbound library) ATTENTION: The file /var/lib/unbound/root.key must be readable by user opendkim, which is not the fact for older unbound packages- Remove some idempotent %if blocks.- Implemented shared-library-packaging-policy * Splitted shared libraries - Some spec file cleanup - Splitted autobuild and miltertest programs into own subpackages- require main package from devel package - fix conditional for sql support. it was mixed with sql and opendkim_sql - make RRD support optional pulls a lot of things. - use correct license for the sendmail part- update to 2.10.3 - LIBOPENDKIM: Make strict header checking non-destructive. The last change to this code resulted in failing signatures. Reported by Pedro Morales and Wez Furlong. - changes from 2.10.2 - Fix bug #221: Report a DKIM result of "policy" if MinimumKeyBits or UnprotectedKey cause the signature to result in a "pass" override. Reported by Kurt Roeckx. - Fix bug #227: Revert removal of SenderHeaders configuration setting. Document that it is now limited to signature selection. - LIBOPENDKIM: Fix bug #226: Deal with header fields that are wrapped before there's any content. Reported by Alessandro Vesely. - CONTRIB: Update to contrib/systemd/opendkim.service.in from Steve Jenkins. - refreshed opendkim-2.9.2_default_config.patch to apply cleanly again- cleanup build requires- update to 2.10.1 Make DB_SIGNINGTABLE symbol available in Lua scripts. Problem noted by Klaus Heinrich. Fix bug #214: Handle arbitrarily large From: fields. Reported by Tomohiko Sasaki. LIBOPENDKIM: Fix bug #213: Remove "dkim_default_senderhdrs" from dkim.h. Problem noted by Daniel J. Luke. LIBOPENDKIM: Fix bug #219: Unresolved CNAMEs are not failures, according to the DNS (see RFC6604), so report them as NXDOMAIN or similar. Reported by Alessandro Vesely. - changes from 2.10.0 Feature request #182: Remove "AddAllSignatureResults". All signature results will now be added via Authentication-Results header fields. Requested by Tomki Camp. Feature request #180: Rename "LDAPSoftStart" to "SoftStart" and apply it to SQL connections as well. Requested by Daniel Kauffman. Feature request #179: Add "IgnoreMalformedMail" option. Fix bug #183: Discontinue support for ADSP. This removes the following configuration file items: AddAllSignatureResults LocalADSP ADSPAction NoDiscardableMailTo ADSPNoSuchDomain On-PolicyError BogusPolicy SendADSPReports DisableADSP SenderHeaders LDAPSoftStart UnprotectedPolicy Make "rrvs" and "smime" recognized Authentication-Results methods. LIBOPENDKIM: Feature request #157: Add dkim_mail_parse_multi(). Suggested by Alessandro Vesely. LIBOPENDKIM: Feature request #185: Add dkim_set_dnssec(). Patch from Alec Peterson. LIBOPENDKIM: Fix bug #183: Discontinue support for ADSP. This means all of the following: - the dkim_policy_t type has been removed - the DKIM_POLICY_* constants have been removed - the DKIM_PRESULT_* constants have been removed - passing DKIM_OPTS_SENDERHDRS to dkim_options() now results in an error - the DKIM_PSTATE structure has been removed - all of the following functions have been removed: dkim_policy(), dkim_policy_dnssec(), dkim_policy_getqueries(), dkim_policy_getreportinfo(), dkim_policy_state_free(), dkim_policy_state_new(), dkim_policy_syntax(), dkim_getpolicystr(), dkim_getpresult(), dkim_getpresultstr(), dkim_set_policy_lookup(), dkim_test_adsp() LIBOPENDKIM: DKIM_LIBFLAGS_STRICTHDRS now also confirms syntactical validity of the From field before proceeding with a signing or verifying operation. Suggested by Wez Furlong. CONTRIB: Fix bug #207: Clean up the "stats" directory. CONTRIB: Add "repute" directory which could eventually replace the PHP implementation. Submitted by Daniel Black. CONTRIB: Patches to systemd and init/redhat from Steve Jenkins. - changes from 2.9.3 Fix bug #177: Plug leaking "result" structures when OpenLDAP is in use. Truncate configuration file lines at carriage return. Replace overlapping strlcpy() with memmove() in dkim_get_key_file(). Reported by Daniel J. Luke. Patch #32: Re-arrange the execution logic to drop privileges in proper order. LIBOPENDKIM: dkim_header() is now a lot more strict about the input it will accept (see RFC5322 Section 2.2). LIBOPENDKIM: Tighten relaxed modes to break on only DKIM-defined whitespace characters. Problem noted by Elizabeth Zwicky. LIBOPENDKIM: Fix bug #208: If a signature fails to verify for either reason (header hash mismatched or body hash mismatched), set DKIM_SIGERROR_BADSIG so that Authentication-Results doesn't report a failure with "no signature error". TOOLS: Feature request #178: Add "-F" flag to opendkim-genzone so records are created with the FQDN. Patch from Andreas Schulze. REPUTATION: Handle parameters safely in repute.php. Reported by Daniel Black. - refreshed patches to apply cleanly again: opendkim-2.9.2_compiler_warnings.patch opendkim-2.9.2_default_config.patch - use the correct signal for reloading the config - make sure that all the buildrequires we added are actually used by adding the needed --with-* options- more work on integration with the distribution - added init system support (systemd,sysvinit) - adapt the default config to change some defaults new patch: opendkim-2.9.2_default_config.patch - a few more buildrequires: libevent-devel, tre-devel, unbound-devel, erlang- initial package/sbin/ldconfig/sbin/ldconfigi04-ch4a 16974493422.11.0-bp154.3.3.12.11.0-bp154.3.3.1librbl.so.1librbl.so.1.0.0/usr/lib64/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protectionobs://build.opensuse.org/openSUSE:Maintenance:18120/openSUSE_Backports_SLE-15-SP4_Update/49d8527c7d2f80af89294fbc5533b921-opendkim.openSUSE_Backports_SLE-15-SP4_Updatecpioxz5x86_64-suse-linuxELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=379ab01d759fdb12872f9a3142c7a62e909c430d, not strippedPRRRRRR4. Iutf-8221efa5d051edf1abe415a0f50cfc0a4b07c0b056603c31b65b900c18df95757?7zXZ !t/HV] cr$x#I|S5kqV'Oc~fXZqߐ`¤ZM`ZB\ǹ{u8z<5BeTсעmY ӥMOaKg-2erՀm# >D >!/ĹV $>tB YiF)w!h=&<.r HȧJ"S25-KZԩA1ᅾ1xVN5;9CBWi:љ@*|;RC. 屳r#R"H-"4t裝Ҋ9UI:lefXy8 gQ슯|/J%=vhP=|QQn v&q`B+?I556<3ucd@[(,\[E̝׹ *z8g\ZQx-{k .`auaJ~xܾaa&nI2Ƿt7?ߡK߄sPJ0oH}Gkީ82zp~ Ыɪ#s{žIbΛB*vX$P-"TZűs׬\yF!qeɶ0ZܺNRf9i3<̝7K4NlhI[I\\=) sn P O,>W]|-]/ֱ5Szmb"1q&u& %YZ+Tg܂6NVQ)\!?GriC7 ;y˥tM߆zfE"z,sPd][ + Nv? &N{.1:`d¨<<?P") 48،'ރ?'Ct+&?~)s_G*EdbwgdLcIa ˏpDʏxBvfYǸ"ܵtBxu^w0-%d7&̕g>Skk!Dq f9l4V Wwo&fd ;Ko[npy\Met.f F!!7^3:X@`n}wNddeF%?'đy .GKzOO2eDnO]OcT~Ha]]/8tT7V,=M![96yxO󆥟@ƕ os=b)^"s14(vg8ktpkr A}5rd<Y2x54@q{]'9J%,# ?Bb\%vzEᝎ_ /[Os4?V"{ЄNM|8 Pf;ȡH d}@?H,{%_w[B{C{$N=g WXXgAP&i^xL.VU98 jVAި2\5,SOi&ß9e~&4|Åg* "V&p֎Wc8hҕYh/ R^*J ЄΏOswM8~I],Bu*U=c8M:mrN0$j'վ10T MO:r ,_erk N3jꟊUzW a &f{Ɵ:b> , C5iT R m^A,u$B ga K[25s88鳛1^Ni/_;yI鋻6s0Gԋ)3-lam;K|B6ף 2*bڶW$R#R83Ƭ5l`t)*3Cmbc=_oI䜔eL0 QN*F#_f,_d vPtƟ̈S wp׃ΛkiЕR=,k#g"^lsPHiDDpj sjc/{Zr_ְ};#,f19_~b?F]Qj1GRIy)9X3Bdqj2=) &iם"j^p>o?:I̾JmdM6FB .`Ԩ"WSߕ9Jjw^5}M2Ul5Sz,MKL,zx{,ocD*%18'u{%<&r18٥}|P -Z9cC ,(=Nec“*ZғF%߿Xtg9 HCl3JL9ol+,-A`_ie0L#4Y R8TS3+έ3Ks+e%?uˤ|7}QU>xr]N-ڃWSrwi.ѫ>Vp%pqTo1ړHuYmdW2=շOlyWFD*~gYM:N {XEC>7IPAMڭ9Z{8ΰEoŚQц7¡(VA΄Lu6zQKY .e k!5-1ȹLVZ(tP5{ Oҟ\j}嚢(q''ݸ Y[[hSGWdi6[vB {8^m)`D6,q"'}s^8F|>RM%Ev-)`IYF+wM X@Q睶0P Vcc .++!v\UK>͹,#!(s% O2?_Vt)&MGn()4[ :2 3_7ڽѳ#ŽCdd4oX_GS}٠zY7 ͹|L%Sz" c(K*cmCХHe5ܥի`]"TBQ1uÕ  9Gr8G7`W}gmy"["`< f'""kvBYlZ t,FsEۉN#7JsB m~쎡~ ``~K{>"yOJ-xiZIc!aЂxEc]w.QY'X;h6/"!HV`jaS}wT!6 JqrP!rjKN(w334)O]~-DSvt3s. SBG`RuY!e֭B(:a߹רZ;uzn7-!M!ܩxR#mZJt&se?AyҦhV̶E>n$F#2^gq1i&5%uv\U& +Ҁ;-9xǗLTZAlgV9eē)AGte+s<:b+t#~G>*HZ l̵vS-7o[>H#kx"CEO'wѵ[2<,^1R捴)-&Τ-Bc!q~jwENܼFD Əմvfz譻o]-%@%:A;zMњViv"WF(s/jӎ4|'!ӂ,e\DD)goתӰdYG05Wp-66m:+PÒ_`iM^2a"!=O͍^lYUSہ= n.Zz!gӢ(;j̤';oD߲(5j+ lHԵjNOl@=7?e!?3,)/M+En@mROaIF9IU hxт*G(@UENt>¦" %2;%SeDLXn:s#*X鍣wJGɽ}Y-"]vѱ5w9+ǃ;CsXs؞ɽ+b6lI"1fĝL:OZ\`T.1 3\\OT3zwh]"ֵR7Cʾs8!}]#v^/f)!βpSFWYCz/&¿-]&lF.45s0@ pirM [/ی}]1ZXubb_/p$~G0BlqM}~L3k?֬NX@N04:X,X|YE$NE]ZRJYi|cyG?Y0rXϠ\PÒ[lwr7հN?N\Pft-xm'miL*a $Bګ-=QEα3a,ea39I1l*6j яY~JjD/[ezzFb Q)R r1-ct9}LYOfJ~[t#Vgo3䰯˒>d 6dLzPHOf"esng}MrՒZ?+k; /âldW7t$b tU"W[ixFTKDq9XZ{(2|{b)alΡi"y#'?2:b۩%, Žb* j K3!_CΖDE-`'A_Ͻ4K aG;I}mkѕ&}p/-Ma͔ny_Uo.L7T,kUu.k3=N亄SvQ j3.6)OAET" E(%o\`W-_8AUXȨ1]r2Ǎ1. ѢcDE//ѴWe \pT2Ȭa>0 ڡb)ARm~+ؑE̶ YZ