Your message dated Mon, 16 Aug 2004 01:47:23 -0400 with message-id <[EMAIL PROTECTED]> and subject line Bug#261093: fixed in libspf 0.99-1.0.0rc4-1 has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -------------------------------------- Received: (at submit) by bugs.debian.org; 23 Jul 2004 15:58:20 +0000 >From [EMAIL PROTECTED] Fri Jul 23 08:58:20 2004 Return-path: <[EMAIL PROTECTED]> Received: from absinthe.ifi.unizh.ch (diamond.madduck.net) [130.60.75.58] by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1Bo2R9-0006xJ-00; Fri, 23 Jul 2004 08:58:19 -0700 Received: from localhost (diamond.madduck.net [127.0.0.1]) by diamond.madduck.net (postfix) with ESMTP id 4221A1450; Fri, 23 Jul 2004 17:58:14 +0200 (CEST) Received: by diamond.madduck.net (postfix, from userid 1000) id E794B1073; Fri, 23 Jul 2004 17:58:13 +0200 (CEST) Date: Fri, 23 Jul 2004 17:58:13 +0200 From: martin f krafft <[EMAIL PROTECTED]> To: Debian Bug Tracking System <[EMAIL PROTECTED]> Cc: James Couzens <[EMAIL PROTECTED]> Subject: ITP: libspf -- official ANSI C sender policy framework (SPF) library Message-ID: <[EMAIL PROTECTED]> Mime-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="Dxnq1zWXvFF0Q93v" Content-Disposition: inline X-Reportbug-Version: 2.63 X-Debbugs-Cc: debian-devel@lists.debian.org Organization: Debian GNU/Linux X-OS: Debian GNU/Linux testing/unstable kernel 2.6.7-1-k7-smp i686 X-Motto: Keep the good times rollin' X-Subliminal-Message: debian/rules! User-Agent: Mutt/1.5.6+20040523i X-Virus-Scanned: by diamond.madduck.net Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-8.0 required=4.0 tests=HAS_PACKAGE,X_DEBBUGS_CC autolearn=ham version=2.60-bugs.debian.org_2004_03_25 X-Spam-Level: --Dxnq1zWXvFF0Q93v Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Package: wnpp Severity: wishlist * Package name : libspf Version : 1.0.0 rc4 Upstream Author : James Couzens <[EMAIL PROTECTED]> * URL : http://www.libspf.org * License : see below Description : official ANSI C sender policy framework (SPF) library libSPF is an ANSI[0] C implementation of the SPF[1] ("Sender Policy Framework"). libSPF's focus is to be as small and as portable as possible and to provide a working example of how SPF would ideally be implemented for authors of MTA's and implementors of RFC's 2821 and 2822. libSPF currently only implements[2] explicitly what is set out in the SPF Internet Draft as it was sent off to the I-D archive ( http://archives.listbox.com/[EMAIL PROTECTED]/200405/0128.html) of which copy can be found at the libSPF website: http://libspf.org/files/spf-draft-200405.txt [0] to support the method of debugging employed in libSPF the library looses its C/89 compliance to take advantage of Variadic Arguments (__VA_VARARGS__) which are taken from the ISO C/99 C standard. Any stable branch of libSPF = will loose the debugging code and reclaim C/89 compliance. [1] SPF is formerly known as Sender Policy Framework. [2] The development branch of libSPF contains feature enhancements not identified in the RFC of which most notably is the AVL-Tree DNS caching lay= er which will be back ported into the 1.0-STABLE tree when it arrives at the STABLE status. Technical tidbits about the underlying implementation are that libSPF employs an "on the fly" parse method where records are evaluated in a byte by byte manner allowing the parser to return results at the first sign of success or failure for much of the SPF Query language. This parsing method affords a speed advantage over all other implementations which perform an unnecessary validation of the entire query before moving on to data evaluation. Great care has been taken to use unsigned integers whenever possible, and to employ only safe string handling functions (eg: snprintf over sprintf). Further care has been spent allocating memory only to the very byte that is necessary and employing dynamic allocation where appropriate. Several memory leak detection implementations most notably Valgrind have been employed since the beginning to ensure that memory is not leaked, and every single byte of allocated memory is explicitly freed irregardless of the natural cleanup of a modern kernel. This attention to detail has led to an efficient and secure library with which it is hoped will lend confidence to those who intend to implement it. At the time of this writing libSPF ships with patches for Qmail, Sendmail and Courier, and includes an API example entitled "SPF Query" which doubles as an SPF validation test tool found within the source tree. I encourage anyone who can to contribute by submitting patches for the any and all MTA's or related software. Lastly the LICENSE that libSPF is released under is a derivative of the Apache license aptly named "the libSPF license", intentionally authored to encourage FREE commercial use without worry, something that unfortunately the GPL and LGPL do not afford. /* * License: * * The libspf Software License, Version 1.0 * * Copyright (c) 2004 James Couzens & Sean Comeau All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in * the documentation and/or other materials provided with the * distribution. * * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE * DISCLAIMED. IN NO EVENT SHALL THE AUTHORS MAKING USE OF THIS LICENSE * OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF * USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND * ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT * OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. */ -- System Information: Debian Release: testing/unstable APT prefers testing APT policy: (600, 'testing'), (98, 'unstable'), (1, 'experimental') Architecture: i386 (i686) Kernel: Linux 2.6.7-1-k7-smp Locale: LANG=3Den_GB.UTF-8, LC_CTYPE=3Den_GB.UTF-8 --=20 Please do not CC me when replying to lists; I read them! =20 .''`. martin f. krafft <[EMAIL PROTECTED]> : :' : proud Debian developer, admin, and user `. `'` `- Debian - when you have better things to do than fixing a system =20 Invalid/expired PGP subkeys? Use subkeys.pgp.net as keyserver! --Dxnq1zWXvFF0Q93v Content-Type: application/pgp-signature; name="signature.asc" Content-Description: Digital signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.4 (GNU/Linux) iD8DBQFBATWVIgvIgzMMSnURAki7AJ9WP75zdrIgEsdc+d9Q4wFpa8SkNwCgh/jb 2aJzRUk5Ef2WWZWGA3NgbTQ= =GRUd -----END PGP SIGNATURE----- --Dxnq1zWXvFF0Q93v-- --------------------------------------- Received: (at 261093-close) by bugs.debian.org; 16 Aug 2004 05:53:18 +0000 >From [EMAIL PROTECTED] Sun Aug 15 22:53:18 2004 Return-path: <[EMAIL PROTECTED]> Received: from newraff.debian.org [208.185.25.31] (mail) by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1BwaQo-0005Uj-00; Sun, 15 Aug 2004 22:53:18 -0700 Received: from rdonald by newraff.debian.org with local (Exim 3.35 1 (Debian)) id 1BwaL5-0001d8-00; Mon, 16 Aug 2004 01:47:23 -0400 From: [EMAIL PROTECTED] (martin f. krafft) To: [EMAIL PROTECTED] X-Katie: lisa $Revision: 1.30 $ Subject: Bug#261093: fixed in libspf 0.99-1.0.0rc4-1 Message-Id: <[EMAIL PROTECTED]> Sender: Randall Donald <[EMAIL PROTECTED]> Date: Mon, 16 Aug 2004 01:47:23 -0400 Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER autolearn=no version=2.60-bugs.debian.org_2004_03_25 X-Spam-Level: Source: libspf Source-Version: 0.99-1.0.0rc4-1 We believe that the bug you reported is fixed in the latest version of libspf, which is due to be installed in the Debian FTP archive: libspf-dev_0.99-1.0.0rc4-1_i386.deb to pool/main/libs/libspf/libspf-dev_0.99-1.0.0rc4-1_i386.deb libspf-doc_0.99-1.0.0rc4-1_all.deb to pool/main/libs/libspf/libspf-doc_0.99-1.0.0rc4-1_all.deb libspf0_0.99-1.0.0rc4-1_i386.deb to pool/main/libs/libspf/libspf0_0.99-1.0.0rc4-1_i386.deb libspf_0.99-1.0.0rc4-1.diff.gz to pool/main/libs/libspf/libspf_0.99-1.0.0rc4-1.diff.gz libspf_0.99-1.0.0rc4-1.dsc to pool/main/libs/libspf/libspf_0.99-1.0.0rc4-1.dsc libspf_0.99-1.0.0rc4.orig.tar.gz to pool/main/libs/libspf/libspf_0.99-1.0.0rc4.orig.tar.gz spfqtool_0.99-1.0.0rc4-1_i386.deb to pool/main/libs/libspf/spfqtool_0.99-1.0.0rc4-1_i386.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. martin f. krafft <[EMAIL PROTECTED]> (supplier of updated libspf package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Fri, 23 Jul 2004 18:03:33 +0200 Source: libspf Binary: spfqtool libspf-doc libspf0 libspf-dev Architecture: source i386 all Version: 0.99-1.0.0rc4-1 Distribution: unstable Urgency: low Maintainer: martin f. krafft <[EMAIL PROTECTED]> Changed-By: martin f. krafft <[EMAIL PROTECTED]> Description: libspf-dev - the ANSI C SPF reference library (development files) libspf-doc - the ANSI C SPF reference library (documentation) libspf0 - the ANSI C SPF reference library (runtime library) spfqtool - command-line SPF query tool Closes: 261093 Changes: libspf (0.99-1.0.0rc4-1) unstable; urgency=low . * Initial release (closes: Bug#261093) Thanks to Stephane Bortzmeyer for testing the packages. Files: 8e47989cfc91921f1448815901e9a138 623 mail extra libspf_0.99-1.0.0rc4-1.dsc dd603fbf4f43c920805f87e58710b4d6 923355 mail extra libspf_0.99-1.0.0rc4.orig.tar.gz 03b47c481f73009af65bf1b013da61cb 27076 mail extra libspf_0.99-1.0.0rc4-1.diff.gz 9230998196677051684b6a2459c9ddea 409762 doc extra libspf-doc_0.99-1.0.0rc4-1_all.deb 45369f3e3ae9098a91ca38b4054148c6 31514 libdevel extra libspf-dev_0.99-1.0.0rc4-1_i386.deb abd27dec729c95c4cb8684dbd39c90f1 26214 libs extra libspf0_0.99-1.0.0rc4-1_i386.deb 6f0093ef092200602286cc3895f8ede9 3666 mail extra spfqtool_0.99-1.0.0rc4-1_i386.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.4 (GNU/Linux) iD8DBQFBCpbuIgvIgzMMSnURAod6AKDuKxVXQWovfaT3eMdMrHwLjsxQ/ACeJN2q u96Xl6jYgI2vbv2uc8gZ7Jo= =hHJ/ -----END PGP SIGNATURE-----