Am 21.09.2014 um 02:43 schrieb Wietse Venema:
> li...@rhsoft.net:
>>
>> Am 21.09.2014 um 02:30 schrieb Wietse Venema:
>>> li...@rhsoft.net:
>>>> thank you - looks promising!
>>>>
>>>> could you attach this as unified diff-file?
>>>
>>> The patch is unified diff format. It just does not have some of the
>>> garbage that some version control systems add around it.  Let me know
>>> if this is a problem.
>>
>> rpmbuild refuses :-(
> 
> You need a different patch for 2.11 and earlier. See 
> earlier follow-up

thanks - after change the patch it get applied

may take some time for feedback because postscreen
is so damned good in reject junk before smtpd :-)

[builduser@buildserver:/rpmbuild/SPECS]$ cat /rpmbuild/SOURCES/postfix-ptr.patch
--- original/src/smtpd/smtpd_check.c    2013-11-12 13:00:11.000000000 -0500
+++ patched/src/smtpd/smtpd_check.c     2014-09-20 20:34:20.000000000 -0400
@@ -3844,7 +3844,7 @@
                                         SMTPD_NAME_CLIENT, def_acl);
        } else if (is_map_command(state, name, CHECK_REVERSE_CLIENT_ACL, &cpp)) 
{
            status = check_namadr_access(state, *cpp, state->reverse_name, 
state->addr,
-                                        FULL, &found, state->namaddr,
+                                        FULL, &found, state->reverse_name,
                                         SMTPD_NAME_REV_CLIENT, def_acl);
            forbid_whitelist(state, name, status, state->reverse_name);
        } else if (strcasecmp(name, REJECT_MAPS_RBL) == 0) {
@@ -3927,14 +3927,14 @@
        } else if (is_map_command(state, name, CHECK_REVERSE_CLIENT_NS_ACL, 
&cpp)) {
            if (strcasecmp(state->reverse_name, "unknown") != 0) {
                status = check_server_access(state, *cpp, state->reverse_name,
-                                            T_NS, state->namaddr,
+                                            T_NS, state->reverse_name,
                                             SMTPD_NAME_REV_CLIENT, def_acl);
                forbid_whitelist(state, name, status, state->reverse_name);
            }
        } else if (is_map_command(state, name, CHECK_REVERSE_CLIENT_MX_ACL, 
&cpp)) {
            if (strcasecmp(state->reverse_name, "unknown") != 0) {
                status = check_server_access(state, *cpp, state->reverse_name,
-                                            T_MX, state->namaddr,
+                                            T_MX, state->reverse_name,
                                             SMTPD_NAME_REV_CLIENT, def_acl);
                forbid_whitelist(state, name, status, state->reverse_name);
            }

Reply via email to