li...@rhsoft.net:
> thank you - looka promising!
> 
> could you attach this as unified diff-file?

The patch is unified diff format. It just does not have some of the
garbage that some version control systems add around it.  Let me know
if this is a problem.

        Wietse

> that makes it easy to include it in rpmbuild for test/feedback
> copy&paste usually damages something in patches
>
> Am 21.09.2014 um 02:08 schrieb Wietse Venema:
> > Does the following address the problem? This fixes the responses for:
> > 
> >     check_reverse_client_hostname_access
> >     check_reverse_client_hostname_a_access
> >     check_reverse_client_hostname_mx_access
> >     check_reverse_client_hostname_ns_access
> > 
> > Basically, with all SMTP server responses of the form 
> > 
> >     5XX 5.X.X <stuff>: Unverified Client host rejected: ....
> > 
> > the stuff should contain the unverified client hostname, not the
> > verified client hostname (which may be "unknown") and IP address.
> > 
> >     Wietse
> > 
> > --- src/smtpd/smtpd_check.c-        2014-09-17 12:31:07.000000000 -0400
> > +++ src/smtpd/smtpd_check.c 2014-09-20 19:55:29.000000000 -0400
> > @@ -3941,7 +3941,7 @@
> >                                      SMTPD_NAME_CLIENT, def_acl);
> >     } else if (is_map_command(state, name, CHECK_REVERSE_CLIENT_ACL, &cpp)) 
> > {
> >         status = check_namadr_access(state, *cpp, state->reverse_name, 
> > state->addr,
> > -                                    FULL, &found, state->namaddr,
> > +                                    FULL, &found, state->reverse_name,
> >                                      SMTPD_NAME_REV_CLIENT, def_acl);
> >         forbid_whitelist(state, name, status, state->reverse_name);
> >     } else if (strcasecmp(name, REJECT_MAPS_RBL) == 0) {
> > @@ -4031,21 +4031,21 @@
> >     } else if (is_map_command(state, name, CHECK_REVERSE_CLIENT_NS_ACL, 
> > &cpp)) {
> >         if (strcasecmp(state->reverse_name, "unknown") != 0) {
> >             status = check_server_access(state, *cpp, state->reverse_name,
> > -                                        T_NS, state->namaddr,
> > +                                        T_NS, state->reverse_name,
> >                                          SMTPD_NAME_REV_CLIENT, def_acl);
> >             forbid_whitelist(state, name, status, state->reverse_name);
> >         }
> >     } else if (is_map_command(state, name, CHECK_REVERSE_CLIENT_MX_ACL, 
> > &cpp)) {
> >         if (strcasecmp(state->reverse_name, "unknown") != 0) {
> >             status = check_server_access(state, *cpp, state->reverse_name,
> > -                                        T_MX, state->namaddr,
> > +                                        T_MX, state->reverse_name,
> >                                          SMTPD_NAME_REV_CLIENT, def_acl);
> >             forbid_whitelist(state, name, status, state->reverse_name);
> >         }
> >     } else if (is_map_command(state, name, CHECK_REVERSE_CLIENT_A_ACL, 
> > &cpp)) {
> >         if (strcasecmp(state->reverse_name, "unknown") != 0) {
> >             status = check_server_access(state, *cpp, state->reverse_name,
> > -                                        T_A, state->namaddr,
> > +                                        T_A, state->reverse_name,
> >                                          SMTPD_NAME_REV_CLIENT, def_acl);
> >             forbid_whitelist(state, name, status, state->reverse_name);
> >         }
> > 
> 

Reply via email to