librepute1-2.11.0-bp154.3.3.1 4>$  Ape-!M@eeev_ͲaA2 ;xF5iqIѷ~Ë́c RU]ęSߗEͨYϝ-w*t}zIaUl_f5'.BV, 񫐋m>j`$ -C\=[`C:jd$ϴo0td8NIݡ9<>L*@mCyꚹy?pL_^v%br= @[LzZE.-Q18fba8da723d916a35f53d7078a1360ff7136dc94fc9d8f96495ab8be04257b3085b3d2a269b462859a4e54adea3709a4f91fc27ATe-!M@eee.VTz$p0/$Ւ#H[뺴(>O3ckӖ*r|cl<߶s{j5imZ25Iv^|#s/0RMOnntKIH2\> TBT$_}1q D$Wś8a=i"&}Q7%,M!i{ 2vAGкaev⨚* ;Pڃj م޾ bkJmr,p@(p?(`d   Y -FLT\ ` d l   D9(b8l9:>% @%F%'G%<H%DI%LX%PY%\\%]%^%b%c&`d'e' f'l'u'$v',w'x'y' z(((((\Clibrepute12.11.0bp154.3.3.1Library for performing REPUTE queries for spammy domainsThis package provides the shared library librepute which performs REPUTE queries for spammy domains.e-~i04-ch4aESUSE Linux Enterprise 15openSUSEBSD-3-Clausehttp://bugs.opensuse.orgSystem/Librarieshttp://www.opendkim.org/linuxx86_64Ee-}e-}5da222fb20a9aa9a9c7be8fbc03fd0d3aaa5bd958faacb6ae7ec19705b462c61librepute.so.1.0.0rootrootrootrootopendkim-2.11.0-bp154.3.3.1.src.rpmlibrepute.so.1()(64bit)librepute1librepute1(x86-64)@@@@@@@@@@@    /sbin/ldconfig/sbin/ldconfiglibc.so.6()(64bit)libc.so.6(GLIBC_2.14)(64bit)libc.so.6(GLIBC_2.2.5)(64bit)libc.so.6(GLIBC_2.3.4)(64bit)libc.so.6(GLIBC_2.4)(64bit)libcurl.so.4()(64bit)libjansson.so.4()(64bit)libjansson.so.4(libjansson.so.4)(64bit)libpthread.so.0()(64bit)libpthread.so.0(GLIBC_2.2.5)(64bit)libut.so.1()(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.3e)1@amaah`E_=@__ L[[5@[5@[ @Y.XVwV&@U>$U>$T{T|X@Ferdinand Thiessen Johannes Segitz Togan Muftuoglu Christian Wittmer Dominique Leuenberger Thorsten Kukuk Thorsten Kukuk mrueckert@suse.demrueckert@suse.dekbabioch@suse.comopensuse@dstoecker.dejengelh@inai.derpm@fthiessen.demrueckert@suse.demrueckert@suse.demrueckert@suse.demrueckert@suse.demrueckert@suse.demrueckert@suse.de- Add fix-RSA_sign-call.patch * Fix bsc#1216117 * Fix call of RSA sign on big endian systems, patch origin: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1012506- Added hardening to systemd service (bsc#1181400). Added patch: * harden_opendkim.service.patch Modified: * opendkim.service- Add cve-2020-12272.patch (CVE-2020-12272) * Confirm that the value of "d=" is properly formed, fixed upstream in commit 14d54524e0a97d3fe9b80441907d7e356c9ded04 - Add unbound-fix.patch * Plug memory leak in Unbound callback https://github.com/trusteddomainproject/OpenDKIM/pull/57- add opendkim to Group unbound to be able to read TrustAnchorFile - add postfix to Group opendkim to be able to read/write to opendkim.sock - add %{_sysconfdir}/%{name}/keys dir - change /var/run to /run wherever used - rework opendkim-2.9.2_default_config.patch and renamed it to opendkim-default_config.patch- Fix usage of %{_libexecdir} when %{_tmpfilesdir} was meant to be used.- opendkim calls openssl, make sure the command is there- Use systemd_ordering instead of systemd_requires for container - Update to opendkim 2.11.0-Beta2 - Add support for ED25519 keys - Add compatibility with openssl-1.1.0 - Feature request #190: Reject signature object requests where the domain name or selector includes non-printable characters. - Feature requrest #187: Add option to match subdomains when generating zone files. - Many bug fixes - Obsoletes opendkim.ticket35+37.patch - Disable erlang, new erlang version seems to miss required files- https://src.fedoraproject.org/rpms/opendkim/raw/master/f/opendkim.ticket35+37.patch allow building on newer distros (openssl 1.1 support)- fix the previous change: source files got added but the renumbering was not applied to the reference to the source files -> signature file was installed as services file- Applied spec-cleaner to spec file - Removed conditionals around %license macro - Used OpenPGP signature provided upstream - Added opendkim.keyring containing the key used to sign official releases.- enable DNSSEC support (requires unbound library) ATTENTION: The file /var/lib/unbound/root.key must be readable by user opendkim, which is not the fact for older unbound packages- Remove some idempotent %if blocks.- Implemented shared-library-packaging-policy * Splitted shared libraries - Some spec file cleanup - Splitted autobuild and miltertest programs into own subpackages- require main package from devel package - fix conditional for sql support. it was mixed with sql and opendkim_sql - make RRD support optional pulls a lot of things. - use correct license for the sendmail part- update to 2.10.3 - LIBOPENDKIM: Make strict header checking non-destructive. The last change to this code resulted in failing signatures. Reported by Pedro Morales and Wez Furlong. - changes from 2.10.2 - Fix bug #221: Report a DKIM result of "policy" if MinimumKeyBits or UnprotectedKey cause the signature to result in a "pass" override. Reported by Kurt Roeckx. - Fix bug #227: Revert removal of SenderHeaders configuration setting. Document that it is now limited to signature selection. - LIBOPENDKIM: Fix bug #226: Deal with header fields that are wrapped before there's any content. Reported by Alessandro Vesely. - CONTRIB: Update to contrib/systemd/opendkim.service.in from Steve Jenkins. - refreshed opendkim-2.9.2_default_config.patch to apply cleanly again- cleanup build requires- update to 2.10.1 Make DB_SIGNINGTABLE symbol available in Lua scripts. Problem noted by Klaus Heinrich. Fix bug #214: Handle arbitrarily large From: fields. Reported by Tomohiko Sasaki. LIBOPENDKIM: Fix bug #213: Remove "dkim_default_senderhdrs" from dkim.h. Problem noted by Daniel J. Luke. LIBOPENDKIM: Fix bug #219: Unresolved CNAMEs are not failures, according to the DNS (see RFC6604), so report them as NXDOMAIN or similar. Reported by Alessandro Vesely. - changes from 2.10.0 Feature request #182: Remove "AddAllSignatureResults". All signature results will now be added via Authentication-Results header fields. Requested by Tomki Camp. Feature request #180: Rename "LDAPSoftStart" to "SoftStart" and apply it to SQL connections as well. Requested by Daniel Kauffman. Feature request #179: Add "IgnoreMalformedMail" option. Fix bug #183: Discontinue support for ADSP. This removes the following configuration file items: AddAllSignatureResults LocalADSP ADSPAction NoDiscardableMailTo ADSPNoSuchDomain On-PolicyError BogusPolicy SendADSPReports DisableADSP SenderHeaders LDAPSoftStart UnprotectedPolicy Make "rrvs" and "smime" recognized Authentication-Results methods. LIBOPENDKIM: Feature request #157: Add dkim_mail_parse_multi(). Suggested by Alessandro Vesely. LIBOPENDKIM: Feature request #185: Add dkim_set_dnssec(). Patch from Alec Peterson. LIBOPENDKIM: Fix bug #183: Discontinue support for ADSP. This means all of the following: - the dkim_policy_t type has been removed - the DKIM_POLICY_* constants have been removed - the DKIM_PRESULT_* constants have been removed - passing DKIM_OPTS_SENDERHDRS to dkim_options() now results in an error - the DKIM_PSTATE structure has been removed - all of the following functions have been removed: dkim_policy(), dkim_policy_dnssec(), dkim_policy_getqueries(), dkim_policy_getreportinfo(), dkim_policy_state_free(), dkim_policy_state_new(), dkim_policy_syntax(), dkim_getpolicystr(), dkim_getpresult(), dkim_getpresultstr(), dkim_set_policy_lookup(), dkim_test_adsp() LIBOPENDKIM: DKIM_LIBFLAGS_STRICTHDRS now also confirms syntactical validity of the From field before proceeding with a signing or verifying operation. Suggested by Wez Furlong. CONTRIB: Fix bug #207: Clean up the "stats" directory. CONTRIB: Add "repute" directory which could eventually replace the PHP implementation. Submitted by Daniel Black. CONTRIB: Patches to systemd and init/redhat from Steve Jenkins. - changes from 2.9.3 Fix bug #177: Plug leaking "result" structures when OpenLDAP is in use. Truncate configuration file lines at carriage return. Replace overlapping strlcpy() with memmove() in dkim_get_key_file(). Reported by Daniel J. Luke. Patch #32: Re-arrange the execution logic to drop privileges in proper order. LIBOPENDKIM: dkim_header() is now a lot more strict about the input it will accept (see RFC5322 Section 2.2). LIBOPENDKIM: Tighten relaxed modes to break on only DKIM-defined whitespace characters. Problem noted by Elizabeth Zwicky. LIBOPENDKIM: Fix bug #208: If a signature fails to verify for either reason (header hash mismatched or body hash mismatched), set DKIM_SIGERROR_BADSIG so that Authentication-Results doesn't report a failure with "no signature error". TOOLS: Feature request #178: Add "-F" flag to opendkim-genzone so records are created with the FQDN. Patch from Andreas Schulze. REPUTATION: Handle parameters safely in repute.php. Reported by Daniel Black. - refreshed patches to apply cleanly again: opendkim-2.9.2_compiler_warnings.patch opendkim-2.9.2_default_config.patch - use the correct signal for reloading the config - make sure that all the buildrequires we added are actually used by adding the needed --with-* options- more work on integration with the distribution - added init system support (systemd,sysvinit) - adapt the default config to change some defaults new patch: opendkim-2.9.2_default_config.patch - a few more buildrequires: libevent-devel, tre-devel, unbound-devel, erlang- initial package/sbin/ldconfig/sbin/ldconfigi04-ch4a 16974493422.11.0-bp154.3.3.12.11.0-bp154.3.3.1librepute.so.1librepute.so.1.0.0/usr/lib64/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protectionobs://build.opensuse.org/openSUSE:Maintenance:18120/openSUSE_Backports_SLE-15-SP4_Update/49d8527c7d2f80af89294fbc5533b921-opendkim.openSUSE_Backports_SLE-15-SP4_Updatecpioxz5x86_64-suse-linuxELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=2b619954d355348542b6395d794d8ca43af054d0, not stripped PR R RRRRRRR R R4. Iutf-86341bf7840740de887ee2637191bdd279b333a9b73210c5291213bf05aabb97a?7zXZ !t/G|] cr$x#I|S 1lxA5 ojUo$o@KK9â,D t@r=x4peLAfNN }L6vcLO9`٥ sd@v&u1.]\O%։^7Yd=5@u&F'-rDFӈZ"vy:CM܀55!t{va,[,q88Lh\]ielf䙒)p zoo|l\x9L04"TLMK$>g6/)bVpZDITL m͒udC v:eS p턦N8iG: d%ѰGw:‡3'rz'9 s5kI {wkἎiFMa7e>ӦT6!!uVjn&OZ֯އ<9b>^>Gqa2$`1X1w)g1V'I92س/WPQBZo9'~ 8tł1<$Nƒw;='DVŶD( NĦAT1 VdUpJ{3|ۿc6 ^Z_)"#~\=²•7,H&L_UBOz$_&چ33 V+_Q}D#ջ*@#D ,ZjcD \Ǜ0JU2R 6 %AYzPgB׶_%%LktxD??)xK$U~GISC#;F{6IGݿёƲ}hulPމ9;C~a0>Pn)T0yĴEwV %&wbzJ UڮR}s\qe:'bk{b`q"DѴF=5 QB FȄQ۾9-_ t_ʽ[x~#L04)Qk; |v4#O` IܣٵO, sJIܫ;ašM'⹸^6N>5Y*)肜?JP;15D+y)#AF0LD E 퓪/3e#9$u, |y!Vl )!4ku!Jk+poxft~ 1nNR~H^Th}İې/XlBjt-E* -uRIq2Z0h!= TFl ı4i:j;B"VFESc9[~~]*ND!!8/p YpҏWy"!M uїx͟Y<3i8O}Nͷ|݂ށrÜ A"!/ C-ʴ,ߴX?Y6x\3:F,V9~)bFԻ!0t|_ȋ!\DW,hY NMW&X;|=|; Ȏ'''|VlxGOph(/%~@K1Z{?$1X/yx;ьgAX[ro%U1v}*AJCDlCK"1%a#ףJ$xe@ 8ئ9R -(q=)χo隂mxkTo2d7E=ݾyŨӕZ\e /N~$ A&$t9n'a,2Z#oNP`VfS* /t&"-]'le mʞz-f6o2G7[lNd|, P:\ _qgn WZp˰Σ2WctٗO~4*f8Ufiub,[6BQ.ݝp8#I&_7 ՈaN(S,L@E3 *bB1dYyWYSj/f;aN/ZlB;>W6eL_k.MSltөG[ Ur"iz+~c]0SOY<.RpGka}'xB&? K*$+GuQ .z ]ӳNtLm]| W,Vi?~EӷiC FlDh6q.,s#( VDD#=٭t;Kwoj^&a!#[imF3eTUC8|U娇-\iuΓ}^&wz|/J P+x|ݧcSq56;P"}whmwdBr&a?mmz\1d? ~e(, td~'O}g߾-wK:Ufӣ΄QHRɖ4 i&7 {j3J{7=E73\J Z}rG60}Mv)( ;iqO]KHA*fxc[ V vd m;>}Z?;lG> M cבl'ҔCj+KB`OE> Լ+?CD!@Hxǿ'!F\k\cT2+Z<*O'(!Nٯ.YSG/k s3}T՗CDdVb<.0L ~&Sab_ =^JlƪRu^ 7a$ (t+ÿkD .AȷlY`utn(K18A>'X)vi`9Im{[6AEm楻p=/X){Y:q?C3Omu8Pm2S]a+l˯tFDKŰBU.ۈIjZngΉkigωL}"Ues(qGȥYV攵3H,^;` \?o7~+ٱ$0eEG|K<ـ"{)k!I0SLXT8h:A+Jw ~-q`b25vw#?< W r+<!i>Lwj\F|lQз&n^O_pex!*;#]UaԼ[ml~J'_xW ***:\r5'680wm=2c$uET-yCbP;ApDbQ7tLn&+GFʼn`W /8&kX#dݿ |EsGZTsfɮ;2.i,g߯[{qpQz (wZp ^6tA$T8 kN+{WfVҵJ9INBtng"_B&@-Rmh:.EP.Ɓ?rو{9o&Z# 2ғu`MٙU$|uby>vH"Zp-˂;oq)4Xpvؑ awcm_KЅ́촊ֵeg9W`KD'e1~2GI=#j޸!ݵIe0e;8NXjE9[w>i~ 6%{褼2(&WeXEo#@k-1 |n d4Cc\R 27]֟۞7` + .3b|v)k8ȱ5