Dear Emmanuel, just tried 4.1.1 with configuration (using libspf2) and ran into a seg fault condition. Just wondering no one ran into this until know ... Some debugging uncovers a call to spf_check with a NULL pointer from milter-greylist.c via a macro SPF_CHECK forcing the first parameter (acl_data_t *ad) to be NULL. The extented implementation of ACL handling seems not to expect that this pointer can be NULL ... :( I enclosed my suggested patch. It would be nice to confirm and add this patch (if I am understand and implemented it right ;) ): In case the NULL pointer is given this is mapped to the desired ACL spf status MGSPF_PASS. This seems to provide the same behaviour right before the ACL extension has been added. With this patch milter-greylist works as before (already in production at our site). Johann
Message
milter-greylist 4.1.1 with spf support seg faults (patch)
2008-05-26 by Johann Klasek
Attachments
- No local attachments were found for this message.