Age | Commit message (Collapse) | Author |
|
|
|
Broken-by: 9438970c97
|
|
Broken-by: 98eb959291
|
|
|
|
|
|
response. Bug 2409
|
|
Broken-by: ea97267cea
|
|
|
|
|
|
|
|
|
|
(cherry picked from commit 25d5d9f98ebb30acc8b269c6594f4bc1e1abe654)
|
|
(cherry picked from commit 60c02b350a7d325e64ae0a656cfd37a9fbd162a7)
|
|
yet. Bug 2341
|
|
|
|
|
|
|
|
|
|
Treat scanner errors as malware. Defer on scanner tmpfail
only.
|
|
|
|
indicating guess
|
|
Based on a patch by Victor Ustugov.
|
|
<= lines.
New log_selector controls "dkim" and "dkim_verbose".
|
|
|
|
|
|
As far as I can see this was broken back in 2013, f4c1088 for 4.82
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
open both for
further recipients and for eventual delivery.
|
|
|
|
Broken-by: 560e71cc5451
|
|
Actually test only the first header line, but still do full line-ending canonicalisation on the
remainder of the message in case a Evil Person slips past that.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
When connection not opened by verify and target hard-rejects a RCPT,
the reject was not being passed to the originating system (just the
cutthrough connection was being dropped). Fix this.
|