[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#261093: marked as done (ITP: libspf -- official ANSI C sender policy framework (SPF) library)



Your message dated Mon, 16 Aug 2004 01:47:23 -0400
with message-id <E1BwaL5-0001d8-00@newraff.debian.org>
and subject line Bug#261093: fixed in libspf 0.99-1.0.0rc4-1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 23 Jul 2004 15:58:20 +0000
>From madduck@diamond.madduck.net Fri Jul 23 08:58:20 2004
Return-path: <madduck@diamond.madduck.net>
Received: from absinthe.ifi.unizh.ch (diamond.madduck.net) [130.60.75.58] 
	by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
	id 1Bo2R9-0006xJ-00; Fri, 23 Jul 2004 08:58:19 -0700
Received: from localhost (diamond.madduck.net [127.0.0.1])
	by diamond.madduck.net (postfix) with ESMTP id 4221A1450;
	Fri, 23 Jul 2004 17:58:14 +0200 (CEST)
Received: by diamond.madduck.net (postfix, from userid 1000)
	id E794B1073; Fri, 23 Jul 2004 17:58:13 +0200 (CEST)
Date: Fri, 23 Jul 2004 17:58:13 +0200
From: martin f krafft <madduck@debian.org>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Cc: James Couzens <jcouzens@6o4.ca>
Subject: ITP: libspf -- official ANSI C sender policy framework (SPF) library
Message-ID: <20040723155813.GA20343@diamond.madduck.net>
Mime-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1;
	protocol="application/pgp-signature"; boundary="Dxnq1zWXvFF0Q93v"
Content-Disposition: inline
X-Reportbug-Version: 2.63
X-Debbugs-Cc: debian-devel@lists.debian.org
Organization: Debian GNU/Linux
X-OS: Debian GNU/Linux testing/unstable kernel 2.6.7-1-k7-smp i686
X-Motto: Keep the good times rollin'
X-Subliminal-Message: debian/rules!
User-Agent: Mutt/1.5.6+20040523i
X-Virus-Scanned: by diamond.madduck.net
Delivered-To: submit@bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 
	(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=HAS_PACKAGE,X_DEBBUGS_CC 
	autolearn=ham version=2.60-bugs.debian.org_2004_03_25
X-Spam-Level: 


--Dxnq1zWXvFF0Q93v
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

Package: wnpp
Severity: wishlist

* Package name    : libspf
  Version         : 1.0.0 rc4
  Upstream Author : James Couzens <jcouzens@6o4.ca>
* URL             : http://www.libspf.org
* License         : see below
  Description     : official ANSI C sender policy framework (SPF) library

libSPF is an ANSI[0] C implementation of the SPF[1] ("Sender Policy
Framework").  libSPF's focus is to be as small and as portable as
possible and to provide a working example of how SPF would ideally be
implemented for authors of MTA's and implementors of RFC's 2821 and 2822.
libSPF currently only implements[2] explicitly what is set out in the SPF
Internet Draft as it was sent off to the I-D archive (
http://archives.listbox.com/spf-discuss@v2.listbox.com/200405/0128.html) of
which copy can be found at the libSPF website:
http://libspf.org/files/spf-draft-200405.txt

[0] to support the method of debugging employed in libSPF the library looses
its C/89 compliance to take advantage of Variadic Arguments (__VA_VARARGS__)
which are taken from the ISO C/99 C standard.  Any stable branch of libSPF =
will
loose the debugging code and reclaim C/89 compliance.

[1] SPF is formerly known as Sender Policy Framework.

[2] The development branch of libSPF contains feature enhancements not
identified in the RFC of which most notably is the AVL-Tree DNS caching lay=
er
which will be back ported into the 1.0-STABLE tree when it arrives at the
STABLE status.

Technical tidbits about the underlying implementation are that libSPF
employs an "on the fly" parse method where records are evaluated in a
byte by byte manner allowing the parser to return results at the first
sign of success or failure for much of the SPF Query language.  This
parsing method affords a speed advantage over all other implementations
which perform an unnecessary validation of the entire query before
moving on to data evaluation.  Great care has been taken to use unsigned
integers whenever possible, and to employ only safe string handling
functions (eg: snprintf over sprintf).  Further care has been spent
allocating memory only to the very byte that is necessary and employing
dynamic allocation where appropriate.  Several memory leak detection
implementations most notably Valgrind have been employed since the
beginning to ensure that memory is not leaked, and every single byte of
allocated memory is explicitly freed irregardless of the natural cleanup
of a modern kernel.  This attention to detail has led to an efficient
and secure library with which it is hoped will lend confidence to those
who intend to implement it.

At the time of this writing libSPF ships with patches for Qmail,
Sendmail and Courier, and includes an API example entitled "SPF Query"
which doubles as an SPF validation test tool found within the source
tree.  I encourage anyone who can to contribute by submitting patches
for the any and all MTA's or related software.  Lastly the LICENSE that
libSPF is released under is a derivative of the Apache license aptly
named "the libSPF license", intentionally authored to encourage FREE
commercial use without worry, something that unfortunately the GPL and
LGPL do not afford.

/*
*  License:
*
*  The libspf Software License, Version 1.0
*
*  Copyright (c) 2004 James Couzens & Sean Comeau  All rights reserved.
*
*  Redistribution and  use  in source and  binary forms, with or without
*  modification, are  permitted  provided that  the following conditions
*  are met:
*
*  1. Redistributions  of  source code must  retain  the above copyright
*     notice, this list of conditions and the following disclaimer.
*
*  2. Redistributions  in binary form must reproduce the above copyright
*     notice,  this list of conditions  and the following  disclaimer in
*     the   documentation  and/or  other  materials  provided  with  the
*     distribution.
*
*  THIS SOFTWARE  IS  PROVIDED  ``AS IS''  AND ANY  EXPRESSED OR IMPLIED
*  WARRANTIES,  INCLUDING,  BUT  NOT  LIMITED TO, THE IMPLIED WARRANTIES
*  OF   MERCHANTABILITY  AND  FITNESS  FOR  A  PARTICULAR   PURPOSE  ARE
*  DISCLAIMED.  IN NO EVENT SHALL THE AUTHORS MAKING USE OF THIS LICENSE
*  OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
*  SPECIAL,  EXEMPLARY, OR   CONSEQUENTIAL DAMAGES  (INCLUDING, BUT  NOT
*  LIMITED  TO,  PROCUREMENT OF SUBSTITUTE  GOODS OR  SERVICES; LOSS  OF
*  USE, DATA,  OR PROFITS;  OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
*  ON ANY THEORY OF LIABILITY,  WHETHER IN  CONTRACT, STRICT  LIABILITY,
*  OR TORT (INCLUDING  NEGLIGENCE OR  OTHERWISE)  ARISING IN ANY WAY OUT
*  OF THE USE OF THIS SOFTWARE,  EVEN IF  ADVISED OF  THE POSSIBILITY OF
*  SUCH DAMAGE.
*/


-- System Information:
Debian Release: testing/unstable
  APT prefers testing
  APT policy: (600, 'testing'), (98, 'unstable'), (1, 'experimental')
Architecture: i386 (i686)
Kernel: Linux 2.6.7-1-k7-smp
Locale: LANG=3Den_GB.UTF-8, LC_CTYPE=3Den_GB.UTF-8

--=20
Please do not CC me when replying to lists; I read them!
=20
 .''`.     martin f. krafft <madduck@debian.org>
: :'  :    proud Debian developer, admin, and user
`. `'`
  `-  Debian - when you have better things to do than fixing a system
=20
Invalid/expired PGP subkeys? Use subkeys.pgp.net as keyserver!

--Dxnq1zWXvFF0Q93v
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Digital signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFBATWVIgvIgzMMSnURAki7AJ9WP75zdrIgEsdc+d9Q4wFpa8SkNwCgh/jb
2aJzRUk5Ef2WWZWGA3NgbTQ=
=GRUd
-----END PGP SIGNATURE-----

--Dxnq1zWXvFF0Q93v--

---------------------------------------
Received: (at 261093-close) by bugs.debian.org; 16 Aug 2004 05:53:18 +0000
>From rdonald@newraff.debian.org Sun Aug 15 22:53:18 2004
Return-path: <rdonald@newraff.debian.org>
Received: from newraff.debian.org [208.185.25.31] (mail)
	by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
	id 1BwaQo-0005Uj-00; Sun, 15 Aug 2004 22:53:18 -0700
Received: from rdonald by newraff.debian.org with local (Exim 3.35 1 (Debian))
	id 1BwaL5-0001d8-00; Mon, 16 Aug 2004 01:47:23 -0400
From: madduck@debian.org (martin f. krafft)
To: 261093-close@bugs.debian.org
X-Katie: lisa $Revision: 1.30 $
Subject: Bug#261093: fixed in libspf 0.99-1.0.0rc4-1
Message-Id: <E1BwaL5-0001d8-00@newraff.debian.org>
Sender: Randall Donald <rdonald@newraff.debian.org>
Date: Mon, 16 Aug 2004 01:47:23 -0400
Delivered-To: 261093-close@bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 
	(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
	autolearn=no version=2.60-bugs.debian.org_2004_03_25
X-Spam-Level: 

Source: libspf
Source-Version: 0.99-1.0.0rc4-1

We believe that the bug you reported is fixed in the latest version of
libspf, which is due to be installed in the Debian FTP archive:

libspf-dev_0.99-1.0.0rc4-1_i386.deb
  to pool/main/libs/libspf/libspf-dev_0.99-1.0.0rc4-1_i386.deb
libspf-doc_0.99-1.0.0rc4-1_all.deb
  to pool/main/libs/libspf/libspf-doc_0.99-1.0.0rc4-1_all.deb
libspf0_0.99-1.0.0rc4-1_i386.deb
  to pool/main/libs/libspf/libspf0_0.99-1.0.0rc4-1_i386.deb
libspf_0.99-1.0.0rc4-1.diff.gz
  to pool/main/libs/libspf/libspf_0.99-1.0.0rc4-1.diff.gz
libspf_0.99-1.0.0rc4-1.dsc
  to pool/main/libs/libspf/libspf_0.99-1.0.0rc4-1.dsc
libspf_0.99-1.0.0rc4.orig.tar.gz
  to pool/main/libs/libspf/libspf_0.99-1.0.0rc4.orig.tar.gz
spfqtool_0.99-1.0.0rc4-1_i386.deb
  to pool/main/libs/libspf/spfqtool_0.99-1.0.0rc4-1_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 261093@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
martin f. krafft <madduck@debian.org> (supplier of updated libspf package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Fri, 23 Jul 2004 18:03:33 +0200
Source: libspf
Binary: spfqtool libspf-doc libspf0 libspf-dev
Architecture: source i386 all
Version: 0.99-1.0.0rc4-1
Distribution: unstable
Urgency: low
Maintainer: martin f. krafft <madduck@debian.org>
Changed-By: martin f. krafft <madduck@debian.org>
Description: 
 libspf-dev - the ANSI C SPF reference library (development files)
 libspf-doc - the ANSI C SPF reference library (documentation)
 libspf0    - the ANSI C SPF reference library (runtime library)
 spfqtool   - command-line SPF query tool
Closes: 261093
Changes: 
 libspf (0.99-1.0.0rc4-1) unstable; urgency=low
 .
   * Initial release (closes: Bug#261093)
     Thanks to Stephane Bortzmeyer for testing the packages.
Files: 
 8e47989cfc91921f1448815901e9a138 623 mail extra libspf_0.99-1.0.0rc4-1.dsc
 dd603fbf4f43c920805f87e58710b4d6 923355 mail extra libspf_0.99-1.0.0rc4.orig.tar.gz
 03b47c481f73009af65bf1b013da61cb 27076 mail extra libspf_0.99-1.0.0rc4-1.diff.gz
 9230998196677051684b6a2459c9ddea 409762 doc extra libspf-doc_0.99-1.0.0rc4-1_all.deb
 45369f3e3ae9098a91ca38b4054148c6 31514 libdevel extra libspf-dev_0.99-1.0.0rc4-1_i386.deb
 abd27dec729c95c4cb8684dbd39c90f1 26214 libs extra libspf0_0.99-1.0.0rc4-1_i386.deb
 6f0093ef092200602286cc3895f8ede9 3666 mail extra spfqtool_0.99-1.0.0rc4-1_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFBCpbuIgvIgzMMSnURAod6AKDuKxVXQWovfaT3eMdMrHwLjsxQ/ACeJN2q
u96Xl6jYgI2vbv2uc8gZ7Jo=
=hHJ/
-----END PGP SIGNATURE-----



Reply to: