[packages/opendmarc] Rel 2; fixes from debian

arekm arekm at pld-linux.org
Thu Mar 13 11:10:58 CET 2025


commit 51a5a3bf0dc4f50815fa663565787a3ee1c365f3
Author: Arkadiusz Miśkiewicz <arekm at maven.pl>
Date:   Thu Mar 13 10:06:24 2025 +0100

    Rel 2; fixes from debian

 arc-override-quarantine.patch               |  71 ++++++++++++++
 arcares-segfaults.patch                     |  49 ++++++++++
 arcseal-segfaults.patch                     |  50 ++++++++++
 check-correct-domain.patch                  |  22 +++++
 check_domain.patch                          |  22 +++++
 cleanup-buflen.patch                        |  22 +++++
 conf_refcnt.patch                           |  22 +++++
 cve-2024-25768.patch                        |  22 +++++
 free-arcdomain.patch                        |  25 +++++
 insheader.patch                             |  49 ++++++++++
 opendmarc-1.4.0-remove-docs-configure.patch |  27 ++++++
 opendmarc.spec                              |  35 ++++++-
 parse-arc-leaks.patch                       |  35 +++++++
 ticket168.patch                             | 141 ++++++++++++++++++++++++++++
 ticket193.patch                             | 108 +++++++++++++++++++++
 ticket204.patch                             |  40 ++++++++
 ticket207.patch                             |  49 ++++++++++
 ticket208.patch                             | 131 ++++++++++++++++++++++++++
 ticket212.patch                             |  27 ++++++
 19 files changed, 946 insertions(+), 1 deletion(-)
---
diff --git a/opendmarc.spec b/opendmarc.spec
index 7a711ab..d42e03f 100644
--- a/opendmarc.spec
+++ b/opendmarc.spec
@@ -6,12 +6,29 @@
 Summary:	DMARC milter and library
 Name:		opendmarc
 Version:	%{ver_dot}
-Release:	1
+Release:	2
 License:	BSD
 Group:		Daemons
 Source0:	https://github.com/trusteddomainproject/OpenDMARC/archive/refs/tags/rel-%{name}-%{ver}.tar.gz
 # Source0-md5:	658d951db84a0305b0c5d9312eff5b64
 Source1:	%{name}.tmpfiles
+Patch0:		ticket168.patch
+Patch1:		ticket193.patch
+Patch2:		ticket204.patch
+Patch3:		ticket207.patch
+Patch4:		ticket208.patch
+Patch5:		ticket212.patch
+Patch6:		insheader.patch
+Patch7:		check_domain.patch
+Patch8:		arcseal-segfaults.patch
+Patch9:		conf_refcnt.patch
+Patch10:	free-arcdomain.patch
+Patch11:	arc-override-quarantine.patch
+Patch12:	cleanup-buflen.patch
+Patch13:	check-correct-domain.patch
+Patch14:	arcares-segfaults.patch
+Patch15:	parse-arc-leaks.patch
+Patch16:	cve-2024-25768.patch
 URL:		http://www.trusteddomain.org/opendmarc.html
 BuildRequires:	libspf2-devel
 BuildRequires:	pkgconfig
@@ -49,6 +66,22 @@ files required for developing applications against libopendmarc.
 
 %prep
 %setup -q -n OpenDMARC-rel-%{name}-%{ver}
+%patch -P1 -p1
+%patch -P2 -p1
+%patch -P3 -p1
+%patch -P4 -p1
+%patch -P5 -p1
+%patch -P6 -p1
+%patch -P7 -p1
+%patch -P8 -p1
+%patch -P9 -p1
+%patch -P10 -p1
+%patch -P11 -p1
+%patch -P12 -p1
+%patch -P13 -p1
+%patch -P14 -p1
+%patch -P15 -p1
+%patch -P16 -p1
 
 %build
 autoreconf -v -i
diff --git a/arc-override-quarantine.patch b/arc-override-quarantine.patch
new file mode 100644
index 0000000..3dfdb8d
--- /dev/null
+++ b/arc-override-quarantine.patch
@@ -0,0 +1,71 @@
+From: "@KIC-8462852" <>
+Date: Tue, 18 Jan 2022 11:57:01 -0500
+Subject: Add ARC override for policy "quarantine"
+
+Origin: other, https://github.com/trusteddomainproject/OpenDMARC/files/6697440/opendmarc-arc-overwrite-for-quarantines-patch.txt
+Bug: https://github.com/trusteddomainproject/OpenDMARC/issues/24
+---
+ opendmarc/opendmarc.c | 29 +++++++++++++++++------------
+ 1 file changed, 17 insertions(+), 12 deletions(-)
+
+diff --git a/opendmarc/opendmarc.c b/opendmarc/opendmarc.c
+index be3d496..9317817 100644
+--- a/opendmarc/opendmarc.c
++++ b/opendmarc/opendmarc.c
+@@ -3637,16 +3637,7 @@ mlfi_eom(SMFICTX *ctx)
+ 		    conf->conf_holdquarantinedmessages &&
+ 		    random() % 100 < pct)
+ 		{
+-			snprintf(replybuf, sizeof replybuf,
+-			         "quarantined by DMARC policy for %s",
+-			         pdomain);
+-
+-			status = smfi_quarantine(ctx, replybuf);
+-			if (status != MI_SUCCESS && conf->conf_dolog)
+-			{
+-				syslog(LOG_ERR, "%s: smfi_quarantine() failed",
+-				       dfc->mctx_jobid);
+-			}
++			/* quarantine will be deferred to after the ARC policy eval */
+ 
+ 			ret = SMFIS_ACCEPT;
+ 			result = DMARC_RESULT_QUARANTINE;
+@@ -3683,7 +3674,7 @@ mlfi_eom(SMFICTX *ctx)
+ 	**  arc.chain to assist with administrative debugging.
+ 	*/
+ 
+-	if (result == DMARC_RESULT_REJECT &&
++	if ((result == DMARC_RESULT_REJECT || result == DMARC_RESULT_QUARANTINE) &&
+ 	    dfc->mctx_arcpass == ARES_RESULT_PASS &&
+ 	    dfc->mctx_arcpolicypass != DMARC_ARC_POLICY_RESULT_PASS &&
+ 	    conf->conf_dolog)
+@@ -3693,7 +3684,7 @@ mlfi_eom(SMFICTX *ctx)
+ 		       dfc->mctx_jobid);
+ 	}
+ 
+-	if (result == DMARC_RESULT_REJECT &&
++	if ((result == DMARC_RESULT_REJECT || result == DMARC_RESULT_QUARANTINE) &&
+ 	    dfc->mctx_arcpolicypass == DMARC_ARC_POLICY_RESULT_PASS)
+ 	{
+ 		ret = SMFIS_ACCEPT;
+@@ -3706,6 +3697,20 @@ mlfi_eom(SMFICTX *ctx)
+ 		}
+ 	}
+ 
++	if (result == DMARC_RESULT_QUARANTINE)
++	{
++		snprintf(replybuf, sizeof replybuf,
++		         "quarantined by DMARC policy for %s",
++		         pdomain);
++
++		status = smfi_quarantine(ctx, replybuf);
++		if (status != MI_SUCCESS && conf->conf_dolog)
++		{
++			syslog(LOG_ERR, "%s: smfi_quarantine() failed",
++			       dfc->mctx_jobid);
++		}
++	}
++
+ 	/*
+  	**  Append arc override to historyfile.  The format 
+ 	**
diff --git a/arcares-segfaults.patch b/arcares-segfaults.patch
new file mode 100644
index 0000000..2fa9fc9
--- /dev/null
+++ b/arcares-segfaults.patch
@@ -0,0 +1,49 @@
+From: "@KIC-8462852" <>
+Date: Sat, 17 Jun 2023 11:48:36 +0100
+Subject: Fix segfaults in ARC-Authentication-Results headers
+
+Origin: other, https://github.com/trusteddomainproject/OpenDMARC/files/11602352/opendmarc-arcares.patch.txt
+Bug: https://github.com/trusteddomainproject/OpenDMARC/issues/242
+---
+ opendmarc/opendmarc-arcares.c | 12 +++++++++++-
+ 1 file changed, 11 insertions(+), 1 deletion(-)
+
+diff --git a/opendmarc/opendmarc-arcares.c b/opendmarc/opendmarc-arcares.c
+index 0beebda..f7a5c83 100644
+--- a/opendmarc/opendmarc-arcares.c
++++ b/opendmarc/opendmarc-arcares.c
+@@ -179,6 +179,9 @@ opendmarc_arcares_parse (u_char *hdr, struct arcares *aar)
+ 		if (*token_ptr == '\0')
+ 		        return 0;
+ 		tag_label = strsep(&token_ptr, "=");
++		if (token_ptr == NULL)
++		        return -1;
++
+ 		tag_value = token_ptr;
+ 		tag_code = opendmarc_arcares_convert(aar_tags, tag_label);
+ 
+@@ -201,8 +204,9 @@ opendmarc_arcares_parse (u_char *hdr, struct arcares *aar)
+ 			/* next value will be unlabeled authserv_id */
+ 			if ((token = strsep((char **) &tmp_ptr, ";")) != NULL)
+ 			{
+-				leading_space_len = strspn(token, " \n\t");
+ 				tag_value = opendmarc_arcares_strip_whitespace(token);
++				if (tag_value == NULL)
++				        return -1;
+ 				strlcpy(aar->authserv_id, tag_value, sizeof aar->authserv_id);
+ 			}
+ 			break;
+@@ -266,7 +270,13 @@ opendmarc_arcares_arc_parse (u_char *hdr_arc, struct arcares_arc_field *arc)
+ 		if (*token_ptr == '\0')
+ 			return 0;
+ 		tag_label = strsep(&token_ptr, "=");
++		if (token_ptr == NULL)
++		        return -1;
++
+ 		tag_value = opendmarc_arcares_strip_whitespace(token_ptr);
++		if (tag_value == NULL)
++		        return -1;
++
+ 		tag_code = opendmarc_arcares_convert(aar_arc_tags, tag_label);
+ 
+ 		switch (tag_code)
diff --git a/arcseal-segfaults.patch b/arcseal-segfaults.patch
new file mode 100644
index 0000000..a40817f
--- /dev/null
+++ b/arcseal-segfaults.patch
@@ -0,0 +1,50 @@
+From: "@KIC-8462852" <>
+Date: Tue, 18 Jan 2022 11:57:01 -0500
+Subject: Fix segfaults, increase token max lengths in ARC-Seal headers
+
+Origin: other, https://github.com/trusteddomainproject/OpenDMARC/files/6717466/opendmarc-arcseal.patch.txt
+Bug: https://github.com/trusteddomainproject/OpenDMARC/issues/183
+---
+ opendmarc/opendmarc-arcseal.c | 7 ++++++-
+ opendmarc/opendmarc-arcseal.h | 2 +-
+ 2 files changed, 7 insertions(+), 2 deletions(-)
+
+diff --git a/opendmarc/opendmarc-arcseal.c b/opendmarc/opendmarc-arcseal.c
+index 73eebb7..a5ae77b 100644
+--- a/opendmarc/opendmarc-arcseal.c
++++ b/opendmarc/opendmarc-arcseal.c
+@@ -29,7 +29,7 @@
+ #include "opendmarc.h"
+ 
+ #define OPENDMARC_ARCSEAL_MAX_FIELD_NAME_LEN 255
+-#define OPENDMARC_ARCSEAL_MAX_TOKEN_LEN      512
++#define OPENDMARC_ARCSEAL_MAX_TOKEN_LEN      768
+ 
+ /* tables */
+ struct opendmarc_arcseal_lookup
+@@ -167,7 +167,12 @@ opendmarc_arcseal_parse(u_char *hdr, struct arcseal *as)
+ 		if (*token_ptr == '\0')
+ 			return 0;
+ 		tag_label = strsep(&token_ptr, "=");
++		if (token_ptr == NULL)
++			return -1;
++
+ 		tag_value = opendmarc_arcseal_strip_whitespace(token_ptr);
++		if (tag_value == NULL)
++			return -1;
+ 
+ 		tag_code = opendmarc_arcseal_convert(as_tags, tag_label);
+ 
+diff --git a/opendmarc/opendmarc-arcseal.h b/opendmarc/opendmarc-arcseal.h
+index 4eb0927..6e11a06 100644
+--- a/opendmarc/opendmarc-arcseal.h
++++ b/opendmarc/opendmarc-arcseal.h
+@@ -32,7 +32,7 @@
+ /* max header tag value length (short) */
+ #define OPENDMARC_ARCSEAL_MAX_SHORT_VALUE_LEN 256
+ /* max header tag value length (long) */
+-#define OPENDMARC_ARCSEAL_MAX_LONG_VALUE_LEN  512
++#define OPENDMARC_ARCSEAL_MAX_LONG_VALUE_LEN  768
+ 
+ /* names and field labels */
+ #define OPENDMARC_ARCSEAL_HDRNAME	"ARC-Seal"
diff --git a/check-correct-domain.patch b/check-correct-domain.patch
new file mode 100644
index 0000000..a78230c
--- /dev/null
+++ b/check-correct-domain.patch
@@ -0,0 +1,22 @@
+From: Maximilian Eschenbacher <maximilian at eschenbacher.email>
+Date: Thu, 16 Mar 2023 11:17:39 +0100
+Subject: opendmarc-check: print correct domain in loop
+
+Bug: https://github.com/trusteddomainproject/OpenDMARC/pull/209
+---
+ opendmarc/opendmarc-check.c | 2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
+
+diff --git a/opendmarc/opendmarc-check.c b/opendmarc/opendmarc-check.c
+index c569cd4..48f0fc3 100644
+--- a/opendmarc/opendmarc-check.c
++++ b/opendmarc/opendmarc-check.c
+@@ -223,7 +223,7 @@ main(int argc, char **argv)
+ 		rua = opendmarc_policy_fetch_rua(dmarc, NULL, 0, 1);
+ 		ruf = opendmarc_policy_fetch_ruf(dmarc, NULL, 0, 1);
+ 
+-		fprintf(stdout, "DMARC record for %s:\n", argv[1]);
++		fprintf(stdout, "DMARC record for %s:\n", argv[c]);
+ 		fprintf(stdout, "\tSample percentage: %d\n", pct);
+ 		fprintf(stdout, "\tDKIM alignment: %s\n", adkim);
+ 		fprintf(stdout, "\tSPF alignment: %s\n", aspf);
diff --git a/check_domain.patch b/check_domain.patch
new file mode 100644
index 0000000..7824458
--- /dev/null
+++ b/check_domain.patch
@@ -0,0 +1,22 @@
+From: =?utf-8?q?David_B=C3=BCrgin?= <dbuergin at gluet.ch>
+Date: Tue, 18 Jan 2022 11:57:01 -0500
+Subject: Make function check_domain static
+
+Bug: https://github.com/trusteddomainproject/OpenDMARC/pull/177
+---
+ libopendmarc/opendmarc_policy.c | 2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
+
+diff --git a/libopendmarc/opendmarc_policy.c b/libopendmarc/opendmarc_policy.c
+index 32053db..c864906 100644
+--- a/libopendmarc/opendmarc_policy.c
++++ b/libopendmarc/opendmarc_policy.c
+@@ -35,7 +35,7 @@
+ **  	TRUE if the syntax was fine, FALSE otherwise.
+ */
+ 
+-bool check_domain(u_char *domain)
++static bool check_domain(u_char *domain)
+ {
+ 	u_char *dp;
+ 
diff --git a/cleanup-buflen.patch b/cleanup-buflen.patch
new file mode 100644
index 0000000..373dcbe
--- /dev/null
+++ b/cleanup-buflen.patch
@@ -0,0 +1,22 @@
+From: devgs <devgs at ukr.net>
+Date: Tue, 18 Jan 2022 11:57:01 -0500
+Subject: Fix off-by-one error buffer overrun in opendmarc_util_cleanup
+
+Bug: https://github.com/trusteddomainproject/OpenDMARC/pull/188
+---
+ libopendmarc/opendmarc_util.c | 2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
+
+diff --git a/libopendmarc/opendmarc_util.c b/libopendmarc/opendmarc_util.c
+index 4ab8ac0..86cc69b 100644
+--- a/libopendmarc/opendmarc_util.c
++++ b/libopendmarc/opendmarc_util.c
+@@ -160,7 +160,7 @@ opendmarc_util_cleanup(u_char *str, u_char *buf, size_t buflen)
+ {
+ 	char *sp, *ep;
+ 
+-	if (str == NULL || buf == NULL || strlen((char *)str) > buflen)
++	if (str == NULL || buf == NULL || strlen((char *)str) >= buflen)
+ 	{
+ 		errno = EINVAL;
+ 		return NULL;
diff --git a/conf_refcnt.patch b/conf_refcnt.patch
new file mode 100644
index 0000000..8b59a5b
--- /dev/null
+++ b/conf_refcnt.patch
@@ -0,0 +1,22 @@
+From: =?utf-8?b?0JTQuNC70Y/QvSDQn9Cw0LvQsNGD0LfQvtCy?= <git-dpa at aegee.org>
+Date: Tue, 18 Jan 2022 11:57:01 -0500
+Subject: opendmarc/opendmarc.c:dmarfc_config_free: don't assert
+ conf->conf_refcnt == 0
+
+Bug: https://github.com/trusteddomainproject/OpenDMARC/issues/18
+---
+ opendmarc/opendmarc.c | 1 -
+ 1 file changed, 1 deletion(-)
+
+diff --git a/opendmarc/opendmarc.c b/opendmarc/opendmarc.c
+index fbb6e40..fbf06b6 100644
+--- a/opendmarc/opendmarc.c
++++ b/opendmarc/opendmarc.c
+@@ -4225,7 +4225,6 @@ static void
+ dmarcf_config_free(struct dmarcf_config *conf)
+ {
+ 	assert(conf != NULL);
+-	assert(conf->conf_refcnt == 0);
+ 
+ 	if (conf->conf_data != NULL)
+ 		config_free(conf->conf_data);
diff --git a/cve-2024-25768.patch b/cve-2024-25768.patch
new file mode 100644
index 0000000..3996384
--- /dev/null
+++ b/cve-2024-25768.patch
@@ -0,0 +1,22 @@
+From: =?utf-8?q?David_B=C3=BCrgin?= <dbuergin at gluet.ch>
+Date: Thu, 23 May 2024 17:35:20 +0200
+Subject: Fix null pointer dereference in opendmarc_policy.c (CVE-2024-25768)
+
+Bug: https://github.com/trusteddomainproject/OpenDMARC/issues/256
+---
+ libopendmarc/opendmarc_policy.c | 2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
+
+diff --git a/libopendmarc/opendmarc_policy.c b/libopendmarc/opendmarc_policy.c
+index c864906..35b23c1 100644
+--- a/libopendmarc/opendmarc_policy.c
++++ b/libopendmarc/opendmarc_policy.c
+@@ -1475,7 +1475,7 @@ opendmarc_policy_fetch_ruf(DMARC_POLICY_T *pctx, u_char *list_buf, size_t size_o
+ 	{
+ 		return NULL;
+ 	}
+-	if (list_buf != NULL || size_of_buf > 0)
++	if (list_buf != NULL && size_of_buf > 0)
+ 	{
+ 		(void) memset(list_buf, '\0', size_of_buf);
+ 		sp = list_buf;
diff --git a/free-arcdomain.patch b/free-arcdomain.patch
new file mode 100644
index 0000000..af96676
--- /dev/null
+++ b/free-arcdomain.patch
@@ -0,0 +1,25 @@
+From: "@KIC-8462852" <>
+Date: Tue, 18 Jan 2022 11:57:01 -0500
+Subject: Fix memory leak when evaluating ARC chain by freeing temporary
+ string "arcdomain"
+
+Origin: other, https://github.com/trusteddomainproject/OpenDMARC/files/6682308/opendmarc-free-arcdomain-patch.txt
+Bug: https://github.com/trusteddomainproject/OpenDMARC/issues/182
+---
+ opendmarc/opendmarc.c | 3 +++
+ 1 file changed, 3 insertions(+)
+
+diff --git a/opendmarc/opendmarc.c b/opendmarc/opendmarc.c
+index fbf06b6..be3d496 100644
+--- a/opendmarc/opendmarc.c
++++ b/opendmarc/opendmarc.c
+@@ -3009,6 +3009,9 @@ mlfi_eom(SMFICTX *ctx)
+ 							eptr = hsearch(entry,
+ 							               FIND);
+ 							pthread_rwlock_unlock(&hash_lock);
++
++							free(arcdomain);
++
+ 							if (eptr == NULL)
+ 								continue;
+ 
diff --git a/insheader.patch b/insheader.patch
new file mode 100644
index 0000000..b0ba383
--- /dev/null
+++ b/insheader.patch
@@ -0,0 +1,49 @@
+From: =?utf-8?q?David_B=C3=BCrgin?= <dbuergin at gluet.ch>
+Date: Tue, 18 Jan 2022 11:57:01 -0500
+Subject: Insert trace headers at index 0
+
+Bug: https://github.com/trusteddomainproject/OpenDMARC/pull/171
+---
+ opendmarc/opendmarc.c | 8 ++++----
+ 1 file changed, 4 insertions(+), 4 deletions(-)
+
+diff --git a/opendmarc/opendmarc.c b/opendmarc/opendmarc.c
+index 5b09c3f..fbb6e40 100644
+--- a/opendmarc/opendmarc.c
++++ b/opendmarc/opendmarc.c
+@@ -3177,7 +3177,7 @@ mlfi_eom(SMFICTX *ctx)
+ 					 authservid, pass_fail, use_domain);
+ 			}
+ 
+-			if (dmarcf_insheader(ctx, 1, AUTHRESULTSHDR,
++			if (dmarcf_insheader(ctx, 0, AUTHRESULTSHDR,
+ 					     header) == MI_FAILURE)
+ 			{
+ 				if (conf->conf_dolog)
+@@ -3242,7 +3242,7 @@ mlfi_eom(SMFICTX *ctx)
+ 		         "%s; dmarc=permerror header.from=%s",
+ 		         authservid, dfc->mctx_fromdomain);
+ 
+-		if (dmarcf_insheader(ctx, 1, AUTHRESULTSHDR,
++		if (dmarcf_insheader(ctx, 0, AUTHRESULTSHDR,
+ 		                     header) == MI_FAILURE)
+ 		{
+ 			if (conf->conf_dolog)
+@@ -3791,7 +3791,7 @@ mlfi_eom(SMFICTX *ctx)
+ 		         conf->conf_authservidwithjobid ? dfc->mctx_jobid : "",
+ 		         aresult, apolicy, adisposition, dfc->mctx_fromdomain);
+ 
+-		if (dmarcf_insheader(ctx, 1, AUTHRESULTSHDR,
++		if (dmarcf_insheader(ctx, 0, AUTHRESULTSHDR,
+ 		                     header) == MI_FAILURE)
+ 		{
+ 			if (conf->conf_dolog)
+@@ -3910,7 +3910,7 @@ mlfi_eom(SMFICTX *ctx)
+ 		         dfc->mctx_jobid != NULL ? dfc->mctx_jobid
+ 		                                 : JOBIDUNKNOWN);
+ 
+-		if (dmarcf_insheader(ctx, 1, SWHEADERNAME,
++		if (dmarcf_insheader(ctx, 0, SWHEADERNAME,
+ 		                     header) == MI_FAILURE)
+ 		{
+ 			if (conf->conf_dolog)
diff --git a/opendmarc-1.4.0-remove-docs-configure.patch b/opendmarc-1.4.0-remove-docs-configure.patch
new file mode 100644
index 0000000..fd0d898
--- /dev/null
+++ b/opendmarc-1.4.0-remove-docs-configure.patch
@@ -0,0 +1,27 @@
+diff --color -Nur OpenDMARC-rel-opendmarc-1-4-0.orig/configure.ac OpenDMARC-rel-opendmarc-1-4-0/configure.ac
+--- OpenDMARC-rel-opendmarc-1-4-0.orig/configure.ac	2021-01-28 09:35:29.000000000 -0800
++++ OpenDMARC-rel-opendmarc-1-4-0/configure.ac	2021-04-24 21:18:14.467833053 -0700
+@@ -139,15 +139,9 @@
+ AC_SEARCH_LIBS(res_ninit, resolv,
+ 	AC_DEFINE(HAVE_RES_NINIT, 1,
+ 	[Define to 1 if you have the `res_ninit()' function.]))
+-AC_SEARCH_LIBS(res_ndestroy, resolv,
+-        AC_DEFINE(HAVE_RES_NDESTROY, 1,
+-        [Define to 1 if you have the `res_ndestroy()' function.]))
+ AC_SEARCH_LIBS(__res_ninit, resolv,
+         AC_DEFINE(HAVE_RES_NINIT, 1,
+         [Define to 1 if you have the `__res_ninit()' function.]))
+-AC_SEARCH_LIBS(__res_ndestroy, resolv,
+-        AC_DEFINE(HAVE_RES_NDESTROY, 1,
+-        [Define to 1 if you have the `__res_ndestroy()' function.]))
+  
+ m4_rename_force([saved_AC_LANG_CALL], [AC_LANG_CALL])
+ AC_CHECK_LIB(idn, idn_free)
+@@ -513,7 +507,6 @@
+ 	contrib/spec/Makefile
+ 		contrib/spec/opendmarc.spec
+ 	db/Makefile
+-	docs/Makefile
+ 	libopendmarc/Makefile
+ 	libopendmarc/tests/Makefile
+ 	libopendmarc/tests/testfiles/Makefile
diff --git a/parse-arc-leaks.patch b/parse-arc-leaks.patch
new file mode 100644
index 0000000..39edb2d
--- /dev/null
+++ b/parse-arc-leaks.patch
@@ -0,0 +1,35 @@
+From: "@KIC-8462852" <>
+Date: Sat, 17 Jun 2023 11:48:36 +0100
+Subject: Fix memory leaks when parsing ARC headers
+
+Origin: other, https://github.com/trusteddomainproject/OpenDMARC/files/11602321/opendmarc.patch.txt
+Bug: https://github.com/trusteddomainproject/OpenDMARC/issues/241
+---
+ opendmarc/opendmarc.c | 6 ++++++
+ 1 file changed, 6 insertions(+)
+
+diff --git a/opendmarc/opendmarc.c b/opendmarc/opendmarc.c
+index 9317817..e53953e 100644
+--- a/opendmarc/opendmarc.c
++++ b/opendmarc/opendmarc.c
+@@ -2614,6 +2614,8 @@ mlfi_eom(SMFICTX *ctx)
+ 		/* parse it */
+ 		if (opendmarc_arcares_parse(hdr->hdr_value, &aar_hdr_new->arcares) != 0)
+ 		{
++			free(aar_hdr_new);
++			aar_hdr_new = NULL;
+ 			syslog(LOG_WARNING,
+ 			       "%s: ignoring invalid %s header \"%s\"",
+ 			       dfc->mctx_jobid, hdr->hdr_name, hdr->hdr_value);
+@@ -2660,7 +2662,11 @@ mlfi_eom(SMFICTX *ctx)
+ 
+ 		/* parse it */
+ 		if (opendmarc_arcseal_parse(hdr->hdr_value, &as_hdr_new->arcseal) != 0)
++		{
++			free(as_hdr_new);
++			as_hdr_new = NULL;
+ 			continue;
++		}
+ 
+ 		if (dfc->mctx_ashead == NULL)
+ 		{
diff --git a/ticket168.patch b/ticket168.patch
new file mode 100644
index 0000000..e4136eb
--- /dev/null
+++ b/ticket168.patch
@@ -0,0 +1,141 @@
+From: Scott Kitterman <scott at kitterman.com>
+Date: Mon, 23 Dec 2019 11:12:36 -0500
+Subject: allow one to configure the SMTP Reject reason. This patch adds the
+ RejectString option.
+
+Bug: https://sourceforge.net/p/opendmarc/tickets/168/
+---
+ opendmarc/opendmarc-config.h    |  1 +
+ opendmarc/opendmarc.c           | 34 +++++++++++++++++++++++++++++++++-
+ opendmarc/opendmarc.conf.5.in   |  7 +++++++
+ opendmarc/opendmarc.conf.sample |  8 ++++++++
+ opendmarc/opendmarc.h           |  1 +
+ 5 files changed, 50 insertions(+), 1 deletion(-)
+
+diff --git a/opendmarc/opendmarc-config.h b/opendmarc/opendmarc-config.h
+index 1b781df..8398007 100644
+--- a/opendmarc/opendmarc-config.h
++++ b/opendmarc/opendmarc-config.h
+@@ -47,6 +47,7 @@ struct configdef dmarcf_config[] =
+ 	{ "RequiredHeaders",		CONFIG_TYPE_BOOLEAN,	FALSE },
+ 	{ "RejectFailures",		CONFIG_TYPE_BOOLEAN,	FALSE },
+ 	{ "RejectMultiValueFrom",	CONFIG_TYPE_BOOLEAN,	FALSE },
++	{ "RejectString",		CONFIG_TYPE_STRING,	FALSE },
+ 	{ "ReportCommand",		CONFIG_TYPE_STRING,	FALSE },
+ 	{ "Socket",			CONFIG_TYPE_STRING,	FALSE },
+ 	{ "SoftwareHeader",		CONFIG_TYPE_BOOLEAN,	FALSE },
+diff --git a/opendmarc/opendmarc.c b/opendmarc/opendmarc.c
+index aee0d48..687ef6d 100644
+--- a/opendmarc/opendmarc.c
++++ b/opendmarc/opendmarc.c
+@@ -190,6 +190,7 @@ struct dmarcf_config
+ 	char *			conf_historyfile;
+ 	char *			conf_pslist;
+ 	char *			conf_ignorelist;
++	char *			conf_rejectstring;
+ 	char **			conf_trustedauthservids;
+ 	char **			conf_ignoredomains;
+ 	struct list *		conf_domainwhitelist;
+@@ -1419,6 +1420,10 @@ dmarcf_config_load(struct config *data, struct dmarcf_config *conf,
+ 		                  &conf->conf_rejectfail,
+ 		                  sizeof conf->conf_rejectfail);
+ 
++		(void) config_get(data, "RejectString",
++                                  &conf->conf_rejectstring,
++                                  sizeof conf->conf_rejectstring);
++
+ 		(void) config_get(data, "RequiredHeaders",
+ 		                  &conf->conf_reqhdrs,
+ 		                  sizeof conf->conf_reqhdrs);
+@@ -1627,6 +1632,33 @@ dmarcf_config_load(struct config *data, struct dmarcf_config *conf,
+ 
+ 	pthread_rwlock_unlock(&hash_lock);
+ 
++        if ( conf->conf_rejectstring == NULL ) {
++                conf->conf_rejectstring = DEFREJECTSTR;
++        }
++        else {
++                /* Count occurrences of "%s" in RejectString */
++                int countocc = 0;
++                const char *tmp = conf->conf_rejectstring;
++                while(tmp = strstr(tmp, "%s"))
++                {
++                        countocc++;
++                        tmp++;
++                }
++                switch ( countocc ) {
++                        case 0:
++                                snprintf(err, errlen, "%s: The RejectString doesn't contain %%s!",
++                                         basedir);
++                                return -1;
++                        case 1:
++                                break;
++                        default:
++                                snprintf(err, errlen, "%s: The RejectString contains %d occurrences of %%s instead of one!",
++                                                basedir, countocc);
++                                return -1;
++                }
++	}
++
++
+ 	return 0;
+ }
+ 
+@@ -3561,7 +3593,7 @@ mlfi_eom(SMFICTX *ctx)
+ 		    random() % 100 < pct)
+ 		{
+ 			snprintf(replybuf, sizeof replybuf,
+-			         "rejected by DMARC policy for %s", pdomain);
++			         conf->conf_rejectstring, pdomain);
+ 
+ 			status = dmarcf_setreply(ctx, DMARC_REJECT_SMTP,
+ 			                         DMARC_REJECT_ESC, replybuf);
+diff --git a/opendmarc/opendmarc.conf.5.in b/opendmarc/opendmarc.conf.5.in
+index f7cea9a..ced6ddb 100644
+--- a/opendmarc/opendmarc.conf.5.in
++++ b/opendmarc/opendmarc.conf.5.in
+@@ -272,6 +272,13 @@ If set, messages with multiple addresses in the From: field of the message
+ will be rejected unless all domain names in that field are the same.  They
+ will otherwise be ignored by the filter (the default).
+ 
++.TP
++.I RejectString (string)
++This string describes the reason of reject at SMTP level.
++The message MUST contain the word "%s" once, which will be replaced by
++the RFC5322.From domain.
++The default is "rejected by DMARC policy for %s"
++
+ .TP
+ .I ReportCommand (string)
+ Indicates the shell command to which failure reports should be passed for
+diff --git a/opendmarc/opendmarc.conf.sample b/opendmarc/opendmarc.conf.sample
+index 69c9afb..2accc6f 100644
+--- a/opendmarc/opendmarc.conf.sample
++++ b/opendmarc/opendmarc.conf.sample
+@@ -325,6 +325,14 @@
+ # 
+ # RejectMultiValueFrom false
+ 
++## RejectString string
++##	default ("rejected by DMARC policy for %s")
++##
++## This string describes the reason of reject. The message MUST contain the
++## word "%s" (only once), which will be replaced by the RFC5322.From domain.
++#
++# RejectString rejected by DMARC policy for %s
++
+ ##  ReportCommand string
+ ##  	default "/usr/sbin/sendmail -t"
+ ##
+diff --git a/opendmarc/opendmarc.h b/opendmarc/opendmarc.h
+index e36f93a..a3b053e 100644
+--- a/opendmarc/opendmarc.h
++++ b/opendmarc/opendmarc.h
+@@ -34,6 +34,7 @@
+ #define	BUFRSZ		2048
+ #define	DEFCONFFILE	CONFIG_BASE "/opendmarc.conf"
+ #define	DEFREPORTCMD	"/usr/sbin/sendmail -t -odq"
++#define        DEFREJECTSTR	"rejected by DMARC policy for %s"
+ #define	JOBIDUNKNOWN	"(unknown-jobid)"
+ #define	MAXARGV		65536
+ #define	MAXHEADER	1024
diff --git a/ticket193.patch b/ticket193.patch
new file mode 100644
index 0000000..3400964
--- /dev/null
+++ b/ticket193.patch
@@ -0,0 +1,108 @@
+From: Scott Kitterman <scott at kitterman.com>
+Date: Mon, 23 Dec 2019 11:12:36 -0500
+Subject: ticket193
+
+Bug: https://sourceforge.net/p/opendmarc/tickets/193/
+---
+ db/Makefile.am                   |  2 +-
+ db/README.update-db-schema.mysql |  8 ++++++++
+ db/schema.mysql                  |  3 ++-
+ db/update-db-schema.mysql        | 12 ++++++++++++
+ reports/opendmarc-expire.in      | 13 ++++++++++++-
+ 5 files changed, 35 insertions(+), 3 deletions(-)
+ create mode 100644 db/README.update-db-schema.mysql
+ create mode 100644 db/update-db-schema.mysql
+
+diff --git a/db/Makefile.am b/db/Makefile.am
+index 43b8614..83bc1d1 100644
+--- a/db/Makefile.am
++++ b/db/Makefile.am
+@@ -1,3 +1,3 @@
+ # Copyright (c) 2012, The Trusted Domain Project.  All rights reserved.
+ 
+-dist_doc_DATA = README.schema schema.mysql
++dist_doc_DATA = README.schema schema.mysql README.update-db-schema.mysql update-db-schema.mysql
+diff --git a/db/README.update-db-schema.mysql b/db/README.update-db-schema.mysql
+new file mode 100644
+index 0000000..8a6a909
+--- /dev/null
++++ b/db/README.update-db-schema.mysql
+@@ -0,0 +1,8 @@
++
++To update your database to the current state use this script like this:
++
++  mysql -u <user> -p <passwd> --force < update-db-schema.mysql
++
++You might receive up to four errors about duplicate keys - this is expected if your database
++already has these keys (because you used the MySQL schema in the db sub-direcory instead of
++the obsolete schema in the reports sub-dirctory).
+diff --git a/db/schema.mysql b/db/schema.mysql
+index 059c3de..926d141 100644
+--- a/db/schema.mysql
++++ b/db/schema.mysql
+@@ -5,6 +5,7 @@
+ 
+ CREATE DATABASE IF NOT EXISTS opendmarc;
+ USE opendmarc;
++SET TIME_ZONE='+00:00';
+ 
+ -- A table for mapping domain names and their DMARC policies to IDs
+ CREATE TABLE IF NOT EXISTS domains (
+@@ -66,7 +67,7 @@ CREATE TABLE IF NOT EXISTS requests (
+ 	pct TINYINT NOT NULL DEFAULT '0',
+ 	locked TINYINT NOT NULL DEFAULT '0',
+ 	firstseen TIMESTAMP NOT NULL DEFAULT CURRENT_TIMESTAMP,
+-	lastsent TIMESTAMP NOT NULL DEFAULT '1970-01-01 00:00:00',
++	lastsent TIMESTAMP NOT NULL DEFAULT '1970-01-01 00:00:01',
+ 
+ 	PRIMARY KEY(id),
+ 	KEY(lastsent),
+diff --git a/db/update-db-schema.mysql b/db/update-db-schema.mysql
+new file mode 100644
+index 0000000..5c0a190
+--- /dev/null
++++ b/db/update-db-schema.mysql
+@@ -0,0 +1,12 @@
++use opendmarc;
++SET TIME_ZONE="+00:00";
++ALTER TABLE ipaddr MODIFY COLUMN addr VARCHAR(64) NOT NULL;
++DELETE FROM ipaddr WHERE addr = NULL;
++ALTER TABLE messages MODIFY COLUMN spf TINYINT NOT NULL;
++ALTER TABLE requests ALTER COLUMN locked SET DEFAULT '0';
++ALTER TABLE requests ALTER COLUMN lastsent SET DEFAULT '1970-01-01 00:00:01';
++ALTER TABLE requests ADD UNIQUE KEY domain (domain);
++ALTER TABLE requests ADD KEY lastsent (lastsent);
++ALTER TABLE messages ADD KEY date (date);
++ALTER TABLE signatures ADD KEY message (message);
++
+diff --git a/reports/opendmarc-expire.in b/reports/opendmarc-expire.in
+index 326a5a3..0115429 100755
+--- a/reports/opendmarc-expire.in
++++ b/reports/opendmarc-expire.in
+@@ -210,6 +210,17 @@ if ($verbose)
+ 	print STDERR "$progname: connected to database\n";
+ }
+ 
++# switch to UTC to have a defined date behaviour
++$dbi_s = $dbi_h->prepare("SET TIME_ZONE='+00:00'");
++
++if (!$dbi_s->execute())
++{
++	print STDERR "$progname: failed to change to UTC: " . $dbi_h->errstr . "\n";
++	$dbi_s->finish;
++	$dbi_h->disconnect;
++	exit(1);
++}
++
+ #
+ # Expire messages
+ #
+@@ -414,7 +425,7 @@ if ($verbose)
+ 	print STDERR "$progname: expiring request data older than $maxage days\n";
+ }
+ 
+-$dbi_s = $dbi_h->prepare("DELETE FROM requests WHERE lastsent <= DATE_SUB(CURRENT_TIMESTAMP(), INTERVAL ? DAY) AND NOT lastsent = '0000-00-00 00:00:00'");
++$dbi_s = $dbi_h->prepare("DELETE FROM requests WHERE lastsent <= DATE_SUB(CURRENT_TIMESTAMP(), INTERVAL ? DAY) AND NOT lastsent <= '1970-01-01 00:00:01'");
+ $rows = $dbi_s->execute($maxage);
+ if (!$rows)
+ {
diff --git a/ticket204.patch b/ticket204.patch
new file mode 100644
index 0000000..435149c
--- /dev/null
+++ b/ticket204.patch
@@ -0,0 +1,40 @@
+From: Scott Kitterman <scott at kitterman.com>
+Date: Mon, 23 Dec 2019 11:12:36 -0500
+Subject: ticket204
+
+Bug: https://sourceforge.net/p/opendmarc/tickets/204/
+---
+ reports/opendmarc-import.in | 6 +++---
+ 1 file changed, 3 insertions(+), 3 deletions(-)
+
+diff --git a/reports/opendmarc-import.in b/reports/opendmarc-import.in
+index 3a2f404..0169c9e 100755
+--- a/reports/opendmarc-import.in
++++ b/reports/opendmarc-import.in
+@@ -649,7 +649,7 @@ while (<$inputfh>)
+ 				}
+ 
+ 	  case "from"		{
+-					$fdomain = $value;
++					$fdomain = lc($value);
+ 				}
+ 
+ 	  case "job"		{
+@@ -691,7 +691,7 @@ while (<$inputfh>)
+ 				}
+ 
+ 	  case "mfrom"		{
+-					$envdomain = $value;
++					$envdomain = lc($value);
+ 				}
+ 
+ 	  case "p"		{
+@@ -703,7 +703,7 @@ while (<$inputfh>)
+ 				}
+ 
+ 	  case "pdomain"	{
+-					$pdomain = $value;
++					$pdomain = lc($value);
+ 				}
+ 
+ 	  case "policy"		{
diff --git a/ticket207.patch b/ticket207.patch
new file mode 100644
index 0000000..14154e0
--- /dev/null
+++ b/ticket207.patch
@@ -0,0 +1,49 @@
+From: Scott Kitterman <scott at kitterman.com>
+Date: Mon, 23 Dec 2019 11:12:36 -0500
+Subject: ticket207
+
+Bug: https://sourceforge.net/p/opendmarc/tickets/207/
+---
+ reports/opendmarc-reports.in | 8 +++++++-
+ 1 file changed, 7 insertions(+), 1 deletion(-)
+
+diff --git a/reports/opendmarc-reports.in b/reports/opendmarc-reports.in
+index 69a2194..143997e 100755
+--- a/reports/opendmarc-reports.in
++++ b/reports/opendmarc-reports.in
+@@ -65,6 +65,7 @@ my $domainset;
+ my $forcedomain;
+ my @skipdomains;
+ 
++my $poldomain;
+ my $policy;
+ my $spolicy;
+ my $policystr;
+@@ -447,7 +448,7 @@ foreach (@$domainset)
+ 		next;
+ 	}
+ 
+-	$dbi_s = $dbi_h->prepare("SELECT repuri, adkim, aspf, policy, spolicy, pct, UNIX_TIMESTAMP(lastsent) FROM requests WHERE domain = ?");
++	$dbi_s = $dbi_h->prepare("SELECT repuri, adkim, aspf, requests.policy, spolicy, pct, UNIX_TIMESTAMP(lastsent), domains.name FROM requests JOIN messages ON messages.from_domain=requests.domain LEFT JOIN domains ON messages.policy_domain = domains.id WHERE domain = ? GROUP BY policy_domain");
+ 	if (!$dbi_s->execute($domainid))
+ 	{
+ 		print STDERR "$progname: can't get reporting URI for domain $domain: " . $dbi_h->errstr . "\n";
+@@ -457,6 +458,7 @@ foreach (@$domainset)
+ 	}
+ 
+ 	undef $repuri;
++	$poldomain=$domain;
+ 
+ 	while ($dbi_a = $dbi_s->fetchrow_arrayref())
+ 	{
+@@ -488,6 +490,10 @@ foreach (@$domainset)
+ 		{
+ 			$lastsent = $dbi_a->[6];
+ 		}
++		if (defined($dbi_a->[7]))
++		{
++			$poldomain = $dbi_a->[7];
++		}
+ 	}
+ 
+ 	$dbi_s->finish;
diff --git a/ticket208.patch b/ticket208.patch
new file mode 100644
index 0000000..cb7ef50
--- /dev/null
+++ b/ticket208.patch
@@ -0,0 +1,131 @@
+From: Scott Kitterman <scott at kitterman.com>
+Date: Mon, 23 Dec 2019 11:12:36 -0500
+Subject: ticket208
+
+Bug: https://sourceforge.net/p/opendmarc/tickets/208/
+---
+ opendmarc/opendmarc-config.h    |  1 +
+ opendmarc/opendmarc.c           | 36 +++++++++++++++++++++++++++++++++++-
+ opendmarc/opendmarc.conf.5.in   |  7 +++++++
+ opendmarc/opendmarc.conf.sample | 10 ++++++++++
+ 4 files changed, 53 insertions(+), 1 deletion(-)
+
+diff --git a/opendmarc/opendmarc-config.h b/opendmarc/opendmarc-config.h
+index 8398007..84cdcc5 100644
+--- a/opendmarc/opendmarc-config.h
++++ b/opendmarc/opendmarc-config.h
+@@ -40,6 +40,7 @@ struct configdef dmarcf_config[] =
+ 	{ "IgnoreAuthenticatedClients",	CONFIG_TYPE_BOOLEAN,	FALSE },
+ 	{ "IgnoreHosts",		CONFIG_TYPE_STRING,	FALSE },
+ 	{ "IgnoreMailFrom",		CONFIG_TYPE_STRING,	FALSE },
++	{ "IgnoreMailTo",		CONFIG_TYPE_STRING,	FALSE },
+ 	{ "MilterDebug",		CONFIG_TYPE_INTEGER,	FALSE },
+ 	{ "PidFile",			CONFIG_TYPE_STRING,	FALSE },
+ 	{ "PublicSuffixList",		CONFIG_TYPE_STRING,	FALSE },
+diff --git a/opendmarc/opendmarc.c b/opendmarc/opendmarc.c
+index 687ef6d..5b09c3f 100644
+--- a/opendmarc/opendmarc.c
++++ b/opendmarc/opendmarc.c
+@@ -195,6 +195,7 @@ struct dmarcf_config
+ 	char **			conf_ignoredomains;
+ 	struct list *		conf_domainwhitelist;
+ 	unsigned int		conf_domainwhitelisthashcount;
++	char **                 conf_ignorereceivers;
+ };
+ 
+ /* LIST -- basic linked list of strings */
+@@ -1381,6 +1382,11 @@ dmarcf_config_load(struct config *data, struct dmarcf_config *conf,
+ 		if (str != NULL)
+ 			dmarcf_mkarray(str, ",", &conf->conf_ignoredomains);
+ 
++		str = NULL;
++		(void) config_get(data, "IgnoreMailTo", &str, sizeof str);
++		if (str != NULL)
++			dmarcf_mkarray(str, ",", &conf->conf_ignorereceivers);
++
+ 		(void) config_get(data, "AuthservIDWithJobID",
+ 		                  &conf->conf_authservidwithjobid,
+ 		                  sizeof conf->conf_authservidwithjobid);
+@@ -2339,6 +2345,7 @@ sfsistat
+ mlfi_eom(SMFICTX *ctx)
+ {
+ 	_Bool wspf = FALSE;
++	int skiphistory;
+ 	int c;
+ 	int pc;
+ 	int policy;
+@@ -3803,7 +3810,34 @@ mlfi_eom(SMFICTX *ctx)
+ 	**  Record activity in the history file.
+ 	*/
+ 
+-	if (conf->conf_historyfile != NULL &&
++	skiphistory = 0;
++	if (conf->conf_ignorereceivers != NULL)
++	{
++		struct dmarcf_header *to = dmarcf_findheader(dfc, "To", 0);
++		if (to != NULL)
++		{
++			char *val = to->hdr_value;
++			while (*val && !skiphistory)
++			{
++				memset(addrbuf, '\0', sizeof addrbuf);
++				strncpy(addrbuf, val, sizeof addrbuf - 1);
++				status = dmarcf_mail_parse(addrbuf, &user, &domain);
++				if (status == 0 && user != NULL && domain != NULL)
++				{
++					snprintf(replybuf, sizeof replybuf - 1, "%s@%s", user, domain);
++					if(dmarcf_match(replybuf, conf->conf_ignorereceivers, TRUE))
++					{
++						skiphistory = 1;
++					}
++				}
++				while(*val && *val != ',' && *val != ';')
++					++val;
++				if(*val)
++					++val;
++			}
++		}
++	}
++	if (!skiphistory && conf->conf_historyfile != NULL &&
+ 	    (conf->conf_recordall || ostatus != DMARC_DNS_ERROR_NO_RECORD))
+ 	{
+ 		FILE *f;
+diff --git a/opendmarc/opendmarc.conf.5.in b/opendmarc/opendmarc.conf.5.in
+index ced6ddb..dcb518c 100644
+--- a/opendmarc/opendmarc.conf.5.in
++++ b/opendmarc/opendmarc.conf.5.in
+@@ -231,6 +231,13 @@ be ignored by the filter.  The list should be comma-separated.  Matching
+ against this list is case-insensitive.  The default is an empty list, meaning
+ no mail is ignored.
+ 
++.TP
++.I IgnoreMailTo (string)
++Gives a list of mail addresses which aren't entered into the history file.
++This is useful to prevent exchanging mutual message reports.  The
++list should be comma-separated.  Matching against this list is
++case-insensitive.  The default is an empty list, meaning no mail is ignored.
++
+ .TP
+ .I MilterDebug (integer)
+ Sets the debug level to be requested from the milter library.  The
+diff --git a/opendmarc/opendmarc.conf.sample b/opendmarc/opendmarc.conf.sample
+index 2accc6f..4e1f1ab 100644
+--- a/opendmarc/opendmarc.conf.sample
++++ b/opendmarc/opendmarc.conf.sample
+@@ -268,6 +268,16 @@
+ #
+ # IgnoreMailFrom example.com
+ 
++##  IgnoreMailTo email[,...]
++##  	default (none)
++##
++##  Gives a list of mail addresses which aren't entered into the history file.
++##  This is useful to prevent exchanging mutual message reports.  The
++##  list should be comma-separated.  Matching against this list is
++##  case-insensitive.  The default is an empty list, meaning no mail is ignored.
++#
++# IgnoreMailTo dmarc-ruf at example.com
++
+ ##  MilterDebug (integer)
+ ##  	default 0
+ ##
diff --git a/ticket212.patch b/ticket212.patch
new file mode 100644
index 0000000..3cba64e
--- /dev/null
+++ b/ticket212.patch
@@ -0,0 +1,27 @@
+From: Scott Kitterman <scott at kitterman.com>
+Date: Mon, 23 Dec 2019 11:12:36 -0500
+Subject: ticket212
+
+Bug: https://sourceforge.net/p/opendmarc/tickets/212/
+---
+ libopendmarc/opendmarc_tld.c | 7 +++++--
+ 1 file changed, 5 insertions(+), 2 deletions(-)
+
+diff --git a/libopendmarc/opendmarc_tld.c b/libopendmarc/opendmarc_tld.c
+index 6dd889d..fa2de26 100644
+--- a/libopendmarc/opendmarc_tld.c
++++ b/libopendmarc/opendmarc_tld.c
+@@ -134,8 +134,11 @@ opendmarc_tld_read_file(char *path_fname, char *commentstring, char *drop, char
+ 		return (errno == 0) ? ENOMEM : errno;
+ 
+ 	fp = fopen(path_fname, "r");
+-	if (fp == NULL)
+-		return errno;
++	if (fp == NULL) {
++		ret = errno;
++		opendmarc_hash_shutdown(hashp);
++		return ret;
++	}
+ 
+ 	errno = 0;
+ 	while (fgets((char *)buf, sizeof buf, fp) != NULL)
================================================================

---- gitweb:

http://git.pld-linux.org/gitweb.cgi/packages/opendmarc.git/commitdiff/51a5a3bf0dc4f50815fa663565787a3ee1c365f3




More information about the pld-cvs-commit mailing list