| Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
| Name: opendkim-devel | Distribution: SUSE Linux Enterprise 16 |
| Version: 2.11.0 | Vendor: openSUSE |
| Release: bp160.1.4 | Build date: Mon Feb 26 13:38:44 2024 |
| Group: Development/Libraries/C and C++ | Build host: reproducible |
| Size: 89674 | Source RPM: opendkim-2.11.0-bp160.1.4.src.rpm |
| Packager: https://bugs.opensuse.org | |
| Url: http://www.opendkim.org/ | |
| Summary: Development files to develop with opendkim | |
DomainKeys Identified Mail (DKIM) lets an organization take responsibility for a message that is in transit. The organization is a handler of the message, either as its originator or as an intermediary. Their reputation is the basis for evaluating whether to trust the message for further handling, such as delivery. Technically DKIM provides a method for validating a domain name identity that is associated with a message through cryptographic authentication. This package holds the development files.
BSD-3-Clause AND Sendmail
* Mon Feb 26 2024 Dominique Leuenberger <dimstar@opensuse.org>
- Use %patch -P N instead of deprecated %patchN.
* Mon Feb 05 2024 Marcus Rueckert <mrueckert@suse.de>
- Add Provides for user/group needed by rpm 4.19
* Fri Oct 13 2023 Ferdinand Thiessen <rpm@fthiessen.de>
- Add fix-RSA_sign-call.patch
* Fix bsc#1216117
* Fix call of RSA sign on big endian systems, patch origin:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1012506
* Mon Oct 18 2021 Johannes Segitz <jsegitz@suse.com>
- Added hardening to systemd service (bsc#1181400). Added patch:
* harden_opendkim.service.patch
Modified:
* opendkim.service
* Thu Oct 14 2021 Togan Muftuoglu <toganm@opensuse.org>
- Add cve-2020-12272.patch (CVE-2020-12272)
* Confirm that the value of "d=" is properly formed, fixed
upstream in commit 14d54524e0a97d3fe9b80441907d7e356c9ded04
- Add unbound-fix.patch
* Plug memory leak in Unbound callback
https://github.com/trusteddomainproject/OpenDKIM/pull/57
* Tue Jul 06 2021 Christian Wittmer <chris@computersalat.de>
- add opendkim to Group unbound to be able to read TrustAnchorFile
- add postfix to Group opendkim to be able to read/write to opendkim.sock
- add %{_sysconfdir}/%{name}/keys dir
- change /var/run to /run wherever used
- rework opendkim-2.9.2_default_config.patch and renamed it to
opendkim-default_config.patch
* Wed Aug 19 2020 Dominique Leuenberger <dimstar@opensuse.org>
- Fix usage of %{_libexecdir} when %{_tmpfilesdir} was meant to be
used.
* Wed Jul 15 2020 Thorsten Kukuk <kukuk@suse.com>
- opendkim calls openssl, make sure the command is there
* Mon Jul 13 2020 Thorsten Kukuk <kukuk@suse.com>
- Use systemd_ordering instead of systemd_requires for container
- Update to opendkim 2.11.0-Beta2
- Add support for ED25519 keys
- Add compatibility with openssl-1.1.0
- Feature request #190: Reject signature object requests
where the domain name or selector includes non-printable
characters.
- Feature requrest #187: Add option to match subdomains when
generating zone files.
- Many bug fixes
- Obsoletes opendkim.ticket35+37.patch
- Disable erlang, new erlang version seems to miss required files
* Sat Jun 02 2018 mrueckert@suse.de
- https://src.fedoraproject.org/rpms/opendkim/raw/master/f/opendkim.ticket35+37.patch
allow building on newer distros (openssl 1.1 support)
* Fri Jun 01 2018 mrueckert@suse.de
- fix the previous change:
source files got added but the renumbering was not applied to the
reference to the source files -> signature file was installed as
services file
* Fri Jun 01 2018 kbabioch@suse.com
- Applied spec-cleaner to spec file
- Removed conditionals around %license macro
- Used OpenPGP signature provided upstream
- Added opendkim.keyring containing the key used to sign official
releases.
* Mon May 28 2018 opensuse@dstoecker.de
- enable DNSSEC support (requires unbound library)
ATTENTION: The file /var/lib/unbound/root.key must be readable by
user opendkim, which is not the fact for older unbound packages
* Fri Apr 28 2017 jengelh@inai.de
- Remove some idempotent %if blocks.
* Tue Apr 04 2017 rpm@fthiessen.de
- Implemented shared-library-packaging-policy
* Splitted shared libraries
- Some spec file cleanup
- Splitted autobuild and miltertest programs into own subpackages
* Thu Feb 11 2016 mrueckert@suse.de
- require main package from devel package
- fix conditional for sql support. it was mixed with sql and
opendkim_sql
- make RRD support optional pulls a lot of things.
- use correct license for the sendmail part
* Wed Feb 10 2016 mrueckert@suse.de
- update to 2.10.3
- LIBOPENDKIM: Make strict header checking non-destructive. The
last change to this code resulted in failing signatures.
Reported by Pedro Morales and Wez Furlong.
- changes from 2.10.2
- Fix bug #221: Report a DKIM result of "policy" if
MinimumKeyBits or UnprotectedKey cause the signature to result
in a "pass" override. Reported by Kurt Roeckx.
- Fix bug #227: Revert removal of SenderHeaders configuration
setting. Document that it is now limited to signature
selection.
- LIBOPENDKIM: Fix bug #226: Deal with header fields that are
wrapped before there's any content. Reported by Alessandro
Vesely.
- CONTRIB: Update to contrib/systemd/opendkim.service.in from
Steve Jenkins.
- refreshed opendkim-2.9.2_default_config.patch to apply cleanly
again
* Mon Apr 27 2015 mrueckert@suse.de
- cleanup build requires
* Mon Apr 27 2015 mrueckert@suse.de
- update to 2.10.1
Make DB_SIGNINGTABLE symbol available in Lua scripts. Problem noted
by Klaus Heinrich.
Fix bug #214: Handle arbitrarily large From: fields. Reported by
Tomohiko Sasaki.
LIBOPENDKIM: Fix bug #213: Remove "dkim_default_senderhdrs" from
dkim.h. Problem noted by Daniel J. Luke.
LIBOPENDKIM: Fix bug #219: Unresolved CNAMEs are not failures,
according to the DNS (see RFC6604), so report them as
NXDOMAIN or similar. Reported by Alessandro Vesely.
- changes from 2.10.0
Feature request #182: Remove "AddAllSignatureResults". All signature
results will now be added via Authentication-Results header
fields. Requested by Tomki Camp.
Feature request #180: Rename "LDAPSoftStart" to "SoftStart" and apply
it to SQL connections as well. Requested by Daniel Kauffman.
Feature request #179: Add "IgnoreMalformedMail" option.
Fix bug #183: Discontinue support for ADSP. This removes the
following configuration file items:
AddAllSignatureResults LocalADSP
ADSPAction NoDiscardableMailTo
ADSPNoSuchDomain On-PolicyError
BogusPolicy SendADSPReports
DisableADSP SenderHeaders
LDAPSoftStart UnprotectedPolicy
Make "rrvs" and "smime" recognized Authentication-Results methods.
LIBOPENDKIM: Feature request #157: Add dkim_mail_parse_multi().
Suggested by Alessandro Vesely.
LIBOPENDKIM: Feature request #185: Add dkim_set_dnssec(). Patch
from Alec Peterson.
LIBOPENDKIM: Fix bug #183: Discontinue support for ADSP. This
means all of the following:
- the dkim_policy_t type has been removed
- the DKIM_POLICY_* constants have been removed
- the DKIM_PRESULT_* constants have been removed
- passing DKIM_OPTS_SENDERHDRS to dkim_options() now
results in an error
- the DKIM_PSTATE structure has been removed
- all of the following functions have been removed:
dkim_policy(), dkim_policy_dnssec(),
dkim_policy_getqueries(), dkim_policy_getreportinfo(),
dkim_policy_state_free(), dkim_policy_state_new(),
dkim_policy_syntax(), dkim_getpolicystr(),
dkim_getpresult(), dkim_getpresultstr(),
dkim_set_policy_lookup(), dkim_test_adsp()
LIBOPENDKIM: DKIM_LIBFLAGS_STRICTHDRS now also confirms syntactical
validity of the From field before proceeding with a signing or
verifying operation. Suggested by Wez Furlong.
CONTRIB: Fix bug #207: Clean up the "stats" directory.
CONTRIB: Add "repute" directory which could eventually replace the
PHP implementation. Submitted by Daniel Black.
CONTRIB: Patches to systemd and init/redhat from Steve Jenkins.
- changes from 2.9.3
Fix bug #177: Plug leaking "result" structures when OpenLDAP is in use.
Truncate configuration file lines at carriage return.
Replace overlapping strlcpy() with memmove() in dkim_get_key_file().
Reported by Daniel J. Luke.
Patch #32: Re-arrange the execution logic to drop privileges in
proper order.
LIBOPENDKIM: dkim_header() is now a lot more strict about the input
it will accept (see RFC5322 Section 2.2).
LIBOPENDKIM: Tighten relaxed modes to break on only DKIM-defined
whitespace characters. Problem noted by Elizabeth Zwicky.
LIBOPENDKIM: Fix bug #208: If a signature fails to verify for either
reason (header hash mismatched or body hash mismatched), set
DKIM_SIGERROR_BADSIG so that Authentication-Results doesn't
report a failure with "no signature error".
TOOLS: Feature request #178: Add "-F" flag to opendkim-genzone so
records are created with the FQDN. Patch from Andreas Schulze.
REPUTATION: Handle parameters safely in repute.php. Reported by
Daniel Black.
- refreshed patches to apply cleanly again:
opendkim-2.9.2_compiler_warnings.patch
opendkim-2.9.2_default_config.patch
- use the correct signal for reloading the config
- make sure that all the buildrequires we added are actually used
by adding the needed --with-* options
* Sun Dec 14 2014 mrueckert@suse.de
- more work on integration with the distribution
- added init system support (systemd,sysvinit)
- adapt the default config to change some defaults
new patch: opendkim-2.9.2_default_config.patch
- a few more buildrequires:
libevent-devel, tre-devel, unbound-devel, erlang
* Mon Dec 01 2014 mrueckert@suse.de
- initial package
/usr/include/opendkim /usr/include/opendkim/opendkim /usr/include/opendkim/opendkim/dkim.h /usr/include/opendkim/rbl /usr/include/opendkim/rbl/rbl.h /usr/include/opendkim/repute /usr/include/opendkim/repute/repute.h /usr/include/opendkim/ut /usr/include/opendkim/ut/ut.h /usr/include/opendkim/vbr /usr/include/opendkim/vbr/vbr.h /usr/lib64/libopendkim.so /usr/lib64/librbl.so /usr/lib64/librepute.so /usr/lib64/libvbr.so /usr/lib64/opendkim-2.11.0/libut.so /usr/lib64/pkgconfig/opendkim.pc /usr/lib64/pkgconfig/rbl.pc /usr/lib64/pkgconfig/repute.pc /usr/lib64/pkgconfig/ut.pc /usr/lib64/pkgconfig/vbr.pc /usr/share/man/man3/rbl.3.gz /usr/share/man/man3/ut.3.gz /usr/share/man/man3/vbr.3.gz
Generated by rpm2html 1.8.1
Fabrice Bellet, Fri Oct 31 22:29:59 2025