Package Release Info

opendkim-2.11.0-bp154.3.3.1

Update Info: openSUSE-2023-305
Available in Package Hub : 15 SP4 Update

platforms

AArch64
ppc64le
s390x
x86-64

subpackages

autobuild
libopendkim11
librbl1
librepute1
libut1
libvbr2
miltertest
opendkim
opendkim-devel

Change Logs

* Fri Oct 13 2023 Ferdinand Thiessen <rpm@fthiessen.de>
- Add fix-RSA_sign-call.patch
  * Fix bsc#1216117
  * Fix call of RSA sign on big endian systems, patch origin:
    https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1012506
Version: 2.11.0-bp154.2.31
* Mon Oct 18 2021 Johannes Segitz <jsegitz@suse.com>
- Added hardening to systemd service (bsc#1181400). Added patch:
  * harden_opendkim.service.patch
  Modified:
  * opendkim.service
* Thu Oct 14 2021 Togan Muftuoglu <toganm@opensuse.org>
- Add cve-2020-12272.patch (CVE-2020-12272)
  * Confirm that the value of "d=" is properly formed, fixed
    upstream in commit 14d54524e0a97d3fe9b80441907d7e356c9ded04
- Add unbound-fix.patch
  * Plug memory leak in Unbound callback
    https://github.com/trusteddomainproject/OpenDKIM/pull/57
* Tue Jul 06 2021 Christian Wittmer <chris@computersalat.de>
- add opendkim to Group unbound to be able to read TrustAnchorFile
- add postfix to Group opendkim to be able to read/write to opendkim.sock
- add %{_sysconfdir}/%{name}/keys dir
- change /var/run to /run wherever used
- rework opendkim-2.9.2_default_config.patch and renamed it to
  opendkim-default_config.patch
* Wed Aug 19 2020 Dominique Leuenberger <dimstar@opensuse.org>
- Fix usage of %{_libexecdir} when %{_tmpfilesdir} was meant to be
  used.
* Wed Jul 15 2020 Thorsten Kukuk <kukuk@suse.com>
- opendkim calls openssl, make sure the command is there
* Mon Jul 13 2020 Thorsten Kukuk <kukuk@suse.com>
- Use systemd_ordering instead of systemd_requires for container
- Update to opendkim 2.11.0-Beta2
  - Add support for ED25519 keys
  - Add compatibility with openssl-1.1.0
  - Feature request #190: Reject signature object requests
    where the domain name or selector includes non-printable
    characters.
  - Feature requrest #187: Add option to match subdomains when
    generating zone files.
  - Many bug fixes
  - Obsoletes opendkim.ticket35+37.patch
- Disable erlang, new erlang version seems to miss required files
Version: 2.10.3-bp151.1.2
* Sat Jun 02 2018 mrueckert@suse.de
- https://src.fedoraproject.org/rpms/opendkim/raw/master/f/opendkim.ticket35+37.patch
  allow building on newer distros (openssl 1.1 support)
* Fri Jun 01 2018 mrueckert@suse.de
- fix the previous change:
  source files got added but the renumbering was not applied to the
  reference to the source files -> signature file was installed as
  services file
* Fri Jun 01 2018 kbabioch@suse.com
- Applied spec-cleaner to spec file
- Removed conditionals around %license macro
- Used OpenPGP signature provided upstream
- Added opendkim.keyring containing the key used to sign official
  releases.
* Mon May 28 2018 opensuse@dstoecker.de
- enable DNSSEC support (requires unbound library)
  ATTENTION: The file /var/lib/unbound/root.key must be readable by
  user opendkim, which is not the fact for older unbound packages
* Fri Apr 28 2017 jengelh@inai.de
- Remove some idempotent %if blocks.
* Tue Apr 04 2017 rpm@fthiessen.de
- Implemented shared-library-packaging-policy
  * Splitted shared libraries
- Some spec file cleanup
- Splitted autobuild and miltertest programs into own subpackages
* Thu Feb 11 2016 mrueckert@suse.de
- require main package from devel package
- fix conditional for sql support. it was mixed with sql and
  opendkim_sql
- make RRD support optional pulls a lot of things.
- use correct license for the sendmail part
* Wed Feb 10 2016 mrueckert@suse.de
- update to 2.10.3
  - LIBOPENDKIM: Make strict header checking non-destructive. The
    last change to this code resulted in failing signatures.
    Reported by Pedro Morales and Wez Furlong.
- changes from 2.10.2
  - Fix bug #221: Report a DKIM result of "policy" if
    MinimumKeyBits or UnprotectedKey cause the signature to result
    in a "pass" override.  Reported by Kurt Roeckx.
  - Fix bug #227: Revert removal of SenderHeaders configuration
    setting.  Document that it is now limited to signature
    selection.
  - LIBOPENDKIM: Fix bug #226: Deal with header fields that are
    wrapped before there's any content.  Reported by Alessandro
    Vesely.
  - CONTRIB: Update to contrib/systemd/opendkim.service.in from
    Steve Jenkins.
- refreshed opendkim-2.9.2_default_config.patch to apply cleanly
  again
* Mon Apr 27 2015 mrueckert@suse.de
- cleanup build requires
* Mon Apr 27 2015 mrueckert@suse.de
- update to 2.10.1
  Make DB_SIGNINGTABLE symbol available in Lua scripts.  Problem noted
    by Klaus Heinrich.
  Fix bug #214: Handle arbitrarily large From: fields.  Reported by
    Tomohiko Sasaki.
  LIBOPENDKIM: Fix bug #213: Remove "dkim_default_senderhdrs" from
    dkim.h.  Problem noted by Daniel J. Luke.
  LIBOPENDKIM: Fix bug #219: Unresolved CNAMEs are not failures,
    according to the DNS (see RFC6604), so report them as
    NXDOMAIN or similar.  Reported by Alessandro Vesely.
- changes from 2.10.0
  Feature request #182: Remove "AddAllSignatureResults".  All signature
    results will now be added via Authentication-Results header
    fields.  Requested by Tomki Camp.
  Feature request #180: Rename "LDAPSoftStart" to "SoftStart" and apply
    it to SQL connections as well.  Requested by Daniel Kauffman.
  Feature request #179: Add "IgnoreMalformedMail" option.
  Fix bug #183: Discontinue support for ADSP.  This removes the
    following configuration file items:
    AddAllSignatureResults  LocalADSP
    ADSPAction    NoDiscardableMailTo
    ADSPNoSuchDomain  On-PolicyError
    BogusPolicy   SendADSPReports
    DisableADSP   SenderHeaders
    LDAPSoftStart   UnprotectedPolicy
  Make "rrvs" and "smime" recognized Authentication-Results methods.
  LIBOPENDKIM: Feature request #157: Add dkim_mail_parse_multi().
    Suggested by Alessandro Vesely.
  LIBOPENDKIM: Feature request #185: Add dkim_set_dnssec().  Patch
    from Alec Peterson.
  LIBOPENDKIM: Fix bug #183: Discontinue support for ADSP.  This
    means all of the following:
  - the dkim_policy_t type has been removed
  - the DKIM_POLICY_* constants have been removed
  - the DKIM_PRESULT_* constants have been removed
  - passing DKIM_OPTS_SENDERHDRS to dkim_options() now
    results in an error
  - the DKIM_PSTATE structure has been removed
  - all of the following functions have been removed:
    dkim_policy(), dkim_policy_dnssec(),
    dkim_policy_getqueries(), dkim_policy_getreportinfo(),
    dkim_policy_state_free(), dkim_policy_state_new(),
    dkim_policy_syntax(), dkim_getpolicystr(),
    dkim_getpresult(), dkim_getpresultstr(),
    dkim_set_policy_lookup(), dkim_test_adsp()
  LIBOPENDKIM: DKIM_LIBFLAGS_STRICTHDRS now also confirms syntactical
    validity of the From field before proceeding with a signing or
    verifying operation.  Suggested by Wez Furlong.
  CONTRIB: Fix bug #207: Clean up the "stats" directory.
  CONTRIB: Add "repute" directory which could eventually replace the
    PHP implementation.  Submitted by Daniel Black.
  CONTRIB: Patches to systemd and init/redhat from Steve Jenkins.
- changes from 2.9.3
  Fix bug #177: Plug leaking "result" structures when OpenLDAP is in use.
  Truncate configuration file lines at carriage return.
  Replace overlapping strlcpy() with memmove() in dkim_get_key_file().
    Reported by Daniel J. Luke.
  Patch #32: Re-arrange the execution logic to drop privileges in
    proper order.
  LIBOPENDKIM: dkim_header() is now a lot more strict about the input
    it will accept (see RFC5322 Section 2.2).
  LIBOPENDKIM: Tighten relaxed modes to break on only DKIM-defined
    whitespace characters.  Problem noted by Elizabeth Zwicky.
  LIBOPENDKIM: Fix bug #208: If a signature fails to verify for either
    reason (header hash mismatched or body hash mismatched), set
    DKIM_SIGERROR_BADSIG so that Authentication-Results doesn't
    report a failure with "no signature error".
  TOOLS: Feature request #178: Add "-F" flag to opendkim-genzone so
    records are created with the FQDN.  Patch from Andreas Schulze.
  REPUTATION: Handle parameters safely in repute.php.  Reported by
    Daniel Black.
- refreshed patches to apply cleanly again:
  opendkim-2.9.2_compiler_warnings.patch
  opendkim-2.9.2_default_config.patch
- use the correct signal for reloading the config
- make sure that all the buildrequires we added are actually used
  by adding the needed --with-* options
* Sun Dec 14 2014 mrueckert@suse.de
- more work on integration with the distribution
  - added init system support (systemd,sysvinit)
  - adapt the default config to change some defaults
    new patch: opendkim-2.9.2_default_config.patch
- a few more buildrequires:
  libevent-devel, tre-devel, unbound-devel, erlang
* Mon Dec 01 2014 mrueckert@suse.de
- initial package