Re: [exim] short host name in local_domains

2019-06-06 Thread Jeremy Harris via Exim-users
On 6 June 2019 17:21:41 BST, Marc Haber via Exim-users  
wrote:
>That would be legal syntax as in
>
>|local_domains =
>@:localhost:${extract{1}{.}{$primary_hostname}}:other.domain.example
>
>?

That's how I read the docs on list-expansion;
they're string-expanded first.

As always, test.

-- 
Cheers,
  Jeremy

-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] short host name in local_domains

2019-06-06 Thread Marc Haber via Exim-users
On Thu, 06 Jun 2019 18:21:41 +0200, Marc Haber via Exim-users
 wrote:
>That would be legal syntax as in
>
>|local_domains = 
>@:localhost:${extract{1}{.}{$primary_hostname}}:other.domain.example
>
>?

Indeed, and it even makes its way through Debian's magic scripts,
making

|dc_other_hostnames='${extract{1}{.}{$primary_hostname}}'

valid and working in /etc/exim4/update-exim4.conf.conf

Greetings
Marc
-- 
-- !! No courtesy copies, please !! -
Marc Haber |   " Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 621 72739834

-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] short host name in local_domains

2019-06-06 Thread Marc Haber via Exim-users
On Thu, 6 Jun 2019 16:05:14 +0100, Jeremy Harris via Exim-users
 wrote:
>On 06/06/2019 15:07, Marc Haber via Exim-users wrote:
>> Am I doing things wrong by adding the short host name to
>> local_domains?
>
>If it works, it's hard to call it wrong.

It's a matter of personal style, I know, and I would like to know of
any situations where this might be a stupid idea.

>> Why does @ only expand to the FQDN and not to FQDN and
>> the short host name?
>
>Someone would be bound to complain, and ask for a way
>of making it only one or the other.
>
>> Why is there not q special expansion item
>> expanding to the short host name?
>
>Nobody's asked for one?
>People regard the FQDN as being more "real" for the host name?
>
>I'm guessing, only.

Obviously ;-)

>If you're wanting this for ease of deployment across many systems,
>use something like ${extract{1}{.}{$primary_hostname}}

That would be legal syntax as in

|local_domains = 
@:localhost:${extract{1}{.}{$primary_hostname}}:other.domain.example

?

Greetings
Marc

:
-- 
-- !! No courtesy copies, please !! -
Marc Haber |   " Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 621 72739834

-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] short host name in local_domains

2019-06-06 Thread Jeremy Harris via Exim-users
On 06/06/2019 15:07, Marc Haber via Exim-users wrote:
> in Debian, local_domains gets seeded with "@:localhost" plus whatever
> the local administrator has entered to augment the list of
> local_domains.
> 
> I am usually entering the short hostname of the host in that list, so
> that my local_domains usually ends up being like "@:localhost:myhost",
> knowing that @ gets expanded to myhost.domain.example by virtue of
> primary_hostname. This allows stupid local apps to send mail to
> localuser@myhost instead of localuser@myhost.domain.example to have
> localuser aliased away in the /etc/aliases file. Without myhost in
> local_domains, Mail to localuser@myhost would not be considered local
> and probably sent away to a smarthost without the virtue of having the
> local alias file consulted.
> 
> Am I doing things wrong by adding the short host name to
> local_domains?

If it works, it's hard to call it wrong.

> Why does @ only expand to the FQDN and not to FQDN and
> the short host name?

Someone would be bound to complain, and ask for a way
of making it only one or the other.

> Why is there not q special expansion item
> expanding to the short host name?

Nobody's asked for one?
People regard the FQDN as being more "real" for the host name?

I'm guessing, only.

If you're wanting this for ease of deployment across many systems,
use something like ${extract{1}{.}{$primary_hostname}}

-- 
Cheers,
  Jeremy

-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


[exim] short host name in local_domains

2019-06-06 Thread Marc Haber via Exim-users
Hi,

in Debian, local_domains gets seeded with "@:localhost" plus whatever
the local administrator has entered to augment the list of
local_domains.

I am usually entering the short hostname of the host in that list, so
that my local_domains usually ends up being like "@:localhost:myhost",
knowing that @ gets expanded to myhost.domain.example by virtue of
primary_hostname. This allows stupid local apps to send mail to
localuser@myhost instead of localuser@myhost.domain.example to have
localuser aliased away in the /etc/aliases file. Without myhost in
local_domains, Mail to localuser@myhost would not be considered local
and probably sent away to a smarthost without the virtue of having the
local alias file consulted.

Am I doing things wrong by adding the short host name to
local_domains? Why does @ only expand to the FQDN and not to FQDN and
the short host name? Why is there not q special expansion item
expanding to the short host name?

Greetings
Marc, having been a bit out of touch with e-mail servers for the last
years
-- 
-- !! No courtesy copies, please !! -
Marc Haber |   " Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 621 72739834

-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] CVE-2019-10149: 4.87 to 4.91 are vulnerable

2019-06-06 Thread Cyborg via Exim-users
Am 06.06.19 um 14:07 schrieb Heiko Schlittermann via Exim-users:
> Hi,
>
> Cyborg via Exim-users  (Do 06 Jun 2019 13:24:21 CEST):
>> As the Advisiory is a bit unspecific for a protection, shouldn't a check
>> for  "$" in
>>
>>   deny    message   = Restricted characters in address
>>       domains   = +local_domains
>>           local_parts   = ^[.] : ^.*[\$@%!/|]
> Yes, from my POV it suffices. As Jeremy said, for non-SMTP the same
> sould be done.
>
> But, for the 2nd exploit, you should do the same with the sender's
> address.
>
Before anyone asks :  for the seconds exploit :

acl_check_mail:

...
  drop message = Restricted characters in address
      condition = ${if match{$sender_address}{\N.*\$.*run.*\N}{1}{0}}

# BEFORE :  IMPORTANT!

  accept  hosts = +relay_from_hosts

"\$.*run" because some Bulkmail put "$randomids$randomids" into
bounceemailaddresses.

best regards,
Marius

-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] CVE-2019-10149: 4.87 to 4.91 are vulnerable

2019-06-06 Thread Cyborg via Exim-users
Am 06.06.19 um 14:25 schrieb Spencer Marshall via Exim-users:
> why is this only being applied to +local_domains? why not everything?
>  denymessage   = Restricted characters in address
>local_parts   = ^[.] : ^.*[\$@%!/|]
>
>

Because there are two Restricted Char rules, one for your domain, and
for other domains
and the Regex match differs a bit.

YOU can shrink that down if you like. Honestly, i wondered myself why
there a two rules,
but adding to it to two rules isn't that much more work, so i left it as
it was. (2 rules patched,1 added for exploit#2 )

Best regards,
Marius

-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] CVE-2019-10149: 4.87 to 4.91 are vulnerable

2019-06-06 Thread Graeme Fowler via Exim-users
On 6 Jun 2019, at 13:25, Spencer Marshall via Exim-users  
wrote:
> why is this only being applied to +local_domains? why not everything?
> denymessage   = Restricted characters in address
>   local_parts   = ^[.] : ^.*[\$@%!/|]

Primarily because you’re not in control of what remote systems consider to be 
valid or invalid characters in the local part of their email addresses.

You are in total control of your own (“local”) domains; if the specific 
instance of Exim only ever talks to systems you control, you can apply it 
across the board. If you have emails routing through it to remote, external 
domains outside your control… there be dragons.

Graeme
-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] CVE-2019-10149: 4.87 to 4.91 are vulnerable

2019-06-06 Thread Spencer Marshall via Exim-users
why is this only being applied to +local_domains? why not everything?
 denymessage   = Restricted characters in address
   local_parts   = ^[.] : ^.*[\$@%!/|]



Hi,

Cyborg via Exim-users  (Do 06 Jun 2019 13:24:21 CEST):
> As the Advisiory is a bit unspecific for a protection, shouldn't a check
> for  "$" in
>
>   denymessage   = Restricted characters in address
>   domains   = +local_domains
>   local_parts   = ^[.] : ^.*[\$@%!/|]

Yes, from my POV it suffices. As Jeremy said, for non-SMTP the same
sould be done.

But, for the 2nd exploit, you should do the same with the sender's
address.

Best regards from Dresden/Germany
Viele Grüße aus Dresden
Heiko Schlittermann
--
 SCHLITTERMANN.de  internet & unix support -
 Heiko Schlittermann, Dipl.-Ing. (TU) - {fon,fax}: +49.351.802998{1,3} -
 gnupg encrypted messages are welcome --- key ID: F69376CE -
 ! key id 7CBF764A and 972EAC9F are revoked since 2015-01  -
-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] CVE-2019-10149: 4.87 to 4.91 are vulnerable

2019-06-06 Thread Jeremy Harris via Exim-users
On 06/06/2019 12:56, Cyborg via Exim-users wrote:
>> exim -bV | grep -i support
> Support for: crypteq iconv() IPv6 PAM Perl Expand_dlfunc OpenSSL
> Content_Scanning DKIM DNSSEC Event OCSP PRDR TCP_Fast_Open
> 
> Does that "Event" mean, the code is in it or is it part of another string?

It means "the support for Events is present".

-- 
Cheers,
  Jeremy

-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] Incoming mails sometimes with no headers.

2019-06-06 Thread Jan Kriesten via Exim-users

Hi Jeremy,

Exim is connecting via 127.0.0.1:783 to SA, so it is just glancing at
it, not messing around with it (as far as I understand). And since
headers are already missing in SA, cyrus can be ruled out.

Best regards, --- Jan.


Am 06.06.19 um 14:00 schrieb Jeremy Harris via Exim-users:
> On 06/06/2019 12:43, Jan Kriesten via Exim-users wrote:
>> Occasionally, the inbound header is stripped (no to, from, subject)
> Any pattern you can see among the occurrences?
> 
> As well as SA being involved, you seem to be delivering via cyrus,
> so there are multiple possible places for breakage. Is your SA
> passing the message through, or just glancing at it as it
> goes past?  What interface to Exim is SA using?
> 



signature.asc
Description: OpenPGP digital signature
-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] CVE-2019-10149: 4.87 to 4.91 are vulnerable

2019-06-06 Thread Heiko Schlittermann via Exim-users
Hi,

Cyborg via Exim-users  (Do 06 Jun 2019 13:24:21 CEST):
> As the Advisiory is a bit unspecific for a protection, shouldn't a check
> for  "$" in
>
>   deny    message   = Restricted characters in address
>       domains   = +local_domains
>           local_parts   = ^[.] : ^.*[\$@%!/|]

Yes, from my POV it suffices. As Jeremy said, for non-SMTP the same
sould be done.

But, for the 2nd exploit, you should do the same with the sender's
address.

Best regards from Dresden/Germany
Viele Grüße aus Dresden
Heiko Schlittermann
--
 SCHLITTERMANN.de  internet & unix support -
 Heiko Schlittermann, Dipl.-Ing. (TU) - {fon,fax}: +49.351.802998{1,3} -
 gnupg encrypted messages are welcome --- key ID: F69376CE -
 ! key id 7CBF764A and 972EAC9F are revoked since 2015-01  -


signature.asc
Description: PGP signature
-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] Incoming mails sometimes with no headers.

2019-06-06 Thread Jeremy Harris via Exim-users
On 06/06/2019 12:43, Jan Kriesten via Exim-users wrote:
> Occasionally, the inbound header is stripped (no to, from, subject)
Any pattern you can see among the occurrences?

As well as SA being involved, you seem to be delivering via cyrus,
so there are multiple possible places for breakage. Is your SA
passing the message through, or just glancing at it as it
goes past?  What interface to Exim is SA using?

-- 
Cheers,
  Jeremy

-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] CVE-2019-10149: 4.87 to 4.91 are vulnerable

2019-06-06 Thread Cyborg via Exim-users
Hi Jeremy,

Am 06.06.19 um 13:40 schrieb Jeremy Harris via Exim-users:
> exim -bV | grep -i support
Support for: crypteq iconv() IPv6 PAM Perl Expand_dlfunc OpenSSL
Content_Scanning DKIM DNSSEC Event OCSP PRDR TCP_Fast_Open

Does that "Event" mean, the code is in it or is it part of another string?

I really hoped for something like this for apache: (httpd -V)

...
Server compiled with
 -D APR_HAS_SENDFILE
 -D APR_HAS_MMAP
 -D APR_HAVE_IPV6 (IPv4-mapped addresses enabled)
 -D APR_USE_SYSVSEM_SERIALIZE
 -D APR_USE_PTHREAD_SERIALIZE
 -D SINGLE_LISTEN_UNSERIALIZED_ACCEPT
 -D APR_HAS_OTHER_CHILD
 -D AP_HAVE_RELIABLE_PIPED_LOGS
 -D DYNAMIC_MODULE_LIMIT=256
 -D HTTPD_ROOT="/etc/httpd"
 -D SUEXEC_BIN="/usr/sbin/suexec"
 -D DEFAULT_PIDLOG="/run/httpd/httpd.pid"
 -D DEFAULT_SCOREBOARD="logs/apache_runtime_status"
 -D DEFAULT_ERRORLOG="logs/error_log"
 -D AP_TYPES_CONFIG_FILE="conf/mime.types"
 -D SERVER_CONFIG_FILE="conf/httpd.conf"

but if rejecting addresses with "$" is all "for now", i have enough
informations until the exim upgrade is run throu. Thx.

best regards,
marius

-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] CVE-2019-10149: 4.87 to 4.91 are vulnerable

2019-06-06 Thread Jeremy Harris via Exim-users
On 06/06/2019 12:24, Cyborg via Exim-users wrote:
> As the Advisiory is a bit unspecific for a protection, shouldn't a check
> for  "$" in
> 
>   deny    message   = Restricted characters in address
>       domains   = +local_domains
>           local_parts   = ^[.] : ^.*[\$@%!/|]

That would suffice.  You'd want to do the equivalent in the non-smtp
ACL also, and I'd personally not restrict it to local domains.


> Is it possible/pausible that fedora build it with "DISABLE_EVENT" defined,
> so the vulnerable code is not in there?
> 
> any way to check that ( did not find the show compile settings on the web ) ?

exim -bV | grep -i support

-- 
Cheers,
  Jeremy

-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


[exim] Incoming mails sometimes with no headers.

2019-06-06 Thread Jan Kriesten via Exim-users

Hey!

I've got something quite strange going on with our exim installation:

Occasionally, the inbound header is stripped (no to, from, subject) and
the only thing left is like following:

===
Return-Path: 
Received: from service ([unix socket])
 by service (Cyrus v2.4.20) with LMTPA;
 Thu, 06 Jun 2019 13:07:34 +0200
X-Sieve: CMU Sieve 2.4
Envelope-to: f...@dc.ba
Delivery-date: Thu, 06 Jun 2019 13:07:34 +0200
Received: from us-smtp-delivery.somedomain.com ([xxx.xxx.xxx.xxx])
by service with esmtps (TLSv1.2:ECDHE-RSA-AES256-SHA384:256)
(Exim 4.92)
(envelope-from )
id 1hYqF3-0007I9-JF
for f...@dc.ba; Thu, 06 Jun 2019 13:07:34 +0200
===

I run exim 4.92 w/ SpamAssassin and the spam-Check already is missing
the headers, too:

[Exim-log]
2019-06-06 13:07:34 1hYqF3-0007I9-JF <= a...@cd.ef
H=uus-smtp-delivery.somedomain.com [xxx.xxx.xxx.xxx] P=esmtps
X=TLSv1.2:ECDHE-RSA-AES256-SHA384:256 CV=no S=9865
2019-06-06 13:07:34 1hYqF3-0007I9-JF => fe  R=cyrus_vdom
T=cyrus_ltcp C="250 2.1.5 Ok SESSIONID="

[spamd-log]
Jun  6 13:07:34 service spamd[23669]: spamd: result: . -94 -
MISSING_DATE,MISSING_FROM,MISSING_HEADERS,MISSING_MID,MISSING_SUBJECT,TVD_SPACE_RATIO,USER_IN_WHITELIST
scantime=0.2,size=9949,user=nobody,uid=65534,required_score=5.0,rhost=127.0.0.1,raddr=127.0.0.1,rport=36240,mid=(unknown),autolearn=disabled

[cyrus-log]
Jun  6 13:07:34 service cyrus/lmtpunix[28007]: Delivered:
 to mailbox: user.fe

So, it looks to me, that those headers are already missing when
delivered to our server.

However, this mail got BCC'ed to a GMail-Host and there all headers were
availabe!

It seems to have something to do with adding BCC or CC to the recipient
list on the sender site, but I haven't been able to really find the
point on where and why it is failing.

Anyone any ideas?

Best regards, Jan.



signature.asc
Description: OpenPGP digital signature
-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] CVE-2019-10149: 4.87 to 4.91 are vulnerable

2019-06-06 Thread Cyborg via Exim-users
Am 05.06.19 um 17:17 schrieb Heiko Schlittermann via Exim-users:
> The fix for CVE-2019-10149 is public now.
>

As the Advisiory is a bit unspecific for a protection, shouldn't a check
for  "$" in

  deny    message   = Restricted characters in address
      domains   = +local_domains
          local_parts   = ^[.] : ^.*[\$@%!/|]

and the none local domains block, prevent such an attack on any version?

Like in this working example i executed 10 minutes ago:

[root@c1 ~]# nc 127.0.0.1 25
220 mytestserver.de ESMTP Exim 4.90_1 Thu, 06 Jun 2019 12:50:11 +0200
HELO d1.ret.de
250 mytestserver.de Hello localhost [127.0.0.1]
MAIL FROM: 
250 OK
RCPT TO: <${run{id}}@mytestserver.de>
550 Restricted characters in address

Tested on a live server. 

The advisory also says :

/Because expand_string() recognizes the "${run{ }}"
expansion item, and because new->address is the recipient of the mail
that is being delivered, //*a local attacker can simply send a mail to 
"${run{...}}@...alhost"
(where "localhost" is one of Exim's local_domains)*//and execute arbitrary 
commands, as root (deliver_drop_privilege is
false, by default):///
I did this, and nothing happend in an unprotected server config.
strace did not show an execution of the given command at all.

Is it possible/pausible that fedora build it with "DISABLE_EVENT" defined,
so the vulnerable code is not in there?

any way to check that ( did not find the show compile settings on the web ) ?


-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] CVE-2019-10149: 4.87 to 4.91 are vulnerable

2019-06-06 Thread julher--- via Exim-users
El mié, 05-06-2019 a las 17:17 +0200, Heiko Schlittermann via Exim-
users escribió:
> The fix for CVE-2019-10149 is public now.
> 
> 
> 
> https://git.exim.org/exim.git
> 
> Branch exim-4_91+fixes.
> 
> 
> 
> Thank you to
> 
> - Qualys for reporting it.
> 
> - Jeremy for fixing it.
> 
> - you for using Exim.

Thank you Qualys, Jeremy and Heiko, really.

greetings
-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] Trouble compiling Exim 4.92

2019-06-06 Thread Luca Bertoncello via Exim-users

Am 06.06.2019 10:28, schrieb Niels Dettenbach via Exim-users:

Hi Niels


Do you have

   -lspf2

in
   LOOKUP_LIBS

too? It seems, i need this.

You may even try to enable.

   EXPERIMENTAL_SPF=yes
   SUPPORT_SPF=yes


Got it! ;)

I added "-l spf2" in LOOKUP_LIBS and "EXPERIMENTAL_SPF=yes" and now I 
can compile Exim!


Thanks a lot
Luca Bertoncello
(lucab...@lucabert.de)

--
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] Trouble compiling Exim 4.92

2019-06-06 Thread Niels Dettenbach via Exim-users
Am Donnerstag, 6. Juni 2019, 10:09:20 CEST schrieb Luca Bertoncello via Exim-
users:
> I have these lines in Local/Makefile:
> 
> SUPPORT_SPF=yes
> CFLAGS  += -I/usr/include
> LDFLAGS += -L/usr/lib -lspf2
> 
> and of course I have libspf2 (and dev...) installed.
> I'm using a Debian Jessie.

Do you have

   -lspf2

in 
   LOOKUP_LIBS

too? It seems, i need this.

You may even try to enable.

   EXPERIMENTAL_SPF=yes
   SUPPORT_SPF=yes

and (just for sure) dont forget to do a 

   make clean

before try another build with this.


hth
best regards,



niels.
-- 
 ---
 Niels Dettenbach
 Syndicat IT & Internet
 http://www.syndicat.com
 PGP: https://syndicat.com/pub_key.asc
 ---
 







-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


[exim] Trouble compiling Exim 4.92

2019-06-06 Thread Luca Bertoncello via Exim-users

Hi list!

I'm trying to compile Exim 4.92, but I get this error:

gcc -o exim
drtables.o: In function `init_lookup_list':
drtables.c:(.text+0x20e): undefined reference to 
`spf_lookup_module_info'

collect2: error: ld returned 1 exit status
Makefile:645: recipe for target 'exim' failed
make[1]: *** [exim] Error 1
make[1]: Leaving directory 
'/home/download/exim/exim-4.92/build-Linux-x86_64'

Makefile:35: recipe for target 'all' failed
make: *** [all] Error 2

I have these lines in Local/Makefile:

SUPPORT_SPF=yes
CFLAGS  += -I/usr/include
LDFLAGS += -L/usr/lib -lspf2

and of course I have libspf2 (and dev...) installed.
I'm using a Debian Jessie.

Any idea?

Thanks
Luca Bertoncello
(lucab...@lucabert.de)

--
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/