<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Recent changes to feature-requests</title><link>https://sourceforge.net/p/sid-milter/feature-requests/</link><description>Recent changes to feature-requests</description><atom:link href="https://sourceforge.net/p/sid-milter/feature-requests/feed.rss" rel="self"/><language>en</language><lastBuildDate>Mon, 06 Oct 2008 20:34:04 -0000</lastBuildDate><atom:link href="https://sourceforge.net/p/sid-milter/feature-requests/feed.rss" rel="self" type="application/rss+xml"/><item><title>disable/enable version functionality</title><link>https://sourceforge.net/p/sid-milter/feature-requests/24/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;I am requesting there be included an option to disable senderID, or if you like to enable only SPF (v1) &lt;/p&gt;
&lt;p&gt;The main reason for using SPF is to reject forgers, and SenderID protocol is incredibly broken when it comes to dealing with mailing lists, SPF v1 handles these fine, this would allow those of us wanting to do what SPF is intended to do, IOW, use r2 option etc to outright block, can do so without losing legitimate mail, after much google research, senderID recommends violating smtp RFCs to overcome this, this is very wrong, so a simple option allowing us control would be better, perhaps, for example it can do by default as it does now, unless we give a  -1  indicating only do SPFv1, and -2 for only do SenderID.&lt;/p&gt;
&lt;p&gt;EG- would overcome this :&lt;br /&gt;
This is the Postfix program at host outgoing3.securityfocus.com.I'm sorry to have to inform you that your message could not be delivered to one or more recipients. It's attached below.For further assistance, please send mail to &amp;lt;postmaster&amp;gt;If you do so, please include this problem report. You can delete your own text from the attached returned message.                      &lt;br /&gt;
&lt;/p&gt;
&lt;p&gt;The Postfix program &amp;lt;x@x.x&amp;gt;: host x.x.x[x.x.x.x] said: 550 5.7.1    Rejected due to Sender-ID policy for sender yyyy@y.y.y (in reply to    end of DATA command)&lt;/p&gt;
&lt;p&gt;Thanks&lt;br /&gt;
Noel&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Noel</dc:creator><pubDate>Mon, 06 Oct 2008 20:34:04 -0000</pubDate><guid>https://sourceforge.netda36934b16bf853494e739557c1f483ac1b090e1</guid></item><item><title>Option to apply best-guess SPF policy</title><link>https://sourceforge.net/p/sid-milter/feature-requests/23/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;See &lt;a href="http://new.openspf.org/FAQ/Best_guess_record" rel="nofollow"&gt;http://new.openspf.org/FAQ/Best_guess_record&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;</description><pubDate>Wed, 14 Mar 2007 23:03:24 -0000</pubDate><guid>https://sourceforge.net91196719fb59a97b1217de40c7c5e1fc09cd0a71</guid></item><item><title>-a list should support IPv6</title><link>https://sourceforge.net/p/sid-milter/feature-requests/22/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;The peer list that is set up with the -a argument should support IPv6 &lt;br /&gt;
addresses and subnets&lt;/p&gt;
&lt;p&gt;e.g.&lt;/p&gt;
&lt;p&gt;2002:40a8:47d1::/48&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Nick Sayer</dc:creator><pubDate>Wed, 21 Jun 2006 16:17:04 -0000</pubDate><guid>https://sourceforge.netc04716fdfc48862dc061deeeda3485f2422f4d5f</guid></item><item><title>Debug flag: make use of milter-API call smfi_quarantine</title><link>https://sourceforge.net/p/sid-milter/feature-requests/21/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Today, it can be hard to debug mails, because the mail&lt;br /&gt;
that make the milter fail, is rejected or gone. So to&lt;br /&gt;
solve that problem and ease debugging, you could create&lt;br /&gt;
a new option/flag (for debugging) that takes advantage&lt;br /&gt;
of the new milter-API call "smfi_quarantine" (in&lt;br /&gt;
sendmail 8.13.X). This debugging flag that should be&lt;br /&gt;
passed to the milter at startup, could make the milter&lt;br /&gt;
to use the call smfi_quarantine on messages, that for&lt;br /&gt;
some reason fails the milters tests. This way, it's&lt;br /&gt;
much easier to find out which mail that failed the&lt;br /&gt;
milter tests, and why it failed, since you have the&lt;br /&gt;
hole messages saved in sendmails quarantine directory.&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Fredrik Pettai</dc:creator><pubDate>Tue, 30 May 2006 21:08:21 -0000</pubDate><guid>https://sourceforge.net179f77571424f371308b41e085cc2fa8788026a3</guid></item><item><title>Add some more \"cause of reject\" messages to SMTP-returncod</title><link>https://sourceforge.net/p/sid-milter/feature-requests/20/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;This RFE is somewhat a compliment to the requested RFEs&lt;br /&gt;
1481666 by steve_mckenna.&lt;/p&gt;
&lt;p&gt;Then sid-milter are evaulating the SPF/PRA records from&lt;br /&gt;
a sender(s domain) and finds out that they are broken&lt;br /&gt;
in some way, and sid-milter rejects those mails&lt;br /&gt;
(depending on what enforcement policy the SPF/PRA&lt;br /&gt;
record has, of course).&lt;br /&gt;
Why not reject those mails with SMTP return code +&lt;br /&gt;
error message hinting about the broken SPF/PRA record,&lt;br /&gt;
for example like "Error(s) found in SPF/PRA policy&lt;br /&gt;
during evaluation of....". &lt;br /&gt;
This will give the sender a better clue of:&lt;br /&gt;
1. Why the mail was rejected.&lt;br /&gt;
2. That they have a broken SPF/PRA record in there domain.&lt;br /&gt;
(3.) Find libmarid parsing/error-handeling errors :-)&lt;/p&gt;
&lt;p&gt;Likewise, it would be extremly helpful to see this&lt;br /&gt;
information in the syslogs. (however, if you send this&lt;br /&gt;
SMTP error message, it will be show in the "reject=..."&lt;br /&gt;
field.&lt;/p&gt;
&lt;p&gt;/P&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Fredrik Pettai</dc:creator><pubDate>Thu, 25 May 2006 22:22:07 -0000</pubDate><guid>https://sourceforge.netb9f8237a2d975746b23e49b997050378df5d2bbb</guid></item><item><title>Ignore Responsible Domain and Reject on Failure</title><link>https://sourceforge.net/p/sid-milter/feature-requests/19/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;This is a feature request for the ability to reject&lt;br /&gt;
emails if they fail the SPF check but to not reject&lt;br /&gt;
emails if they do not pass the Responsible Domain check.&lt;/p&gt;
&lt;p&gt;So, it would be like enabling the -t flag to not reject&lt;br /&gt;
responsible domain but also allow -r 2 to work, where&lt;br /&gt;
it would reject emails if the actually fail.&lt;/p&gt;
&lt;p&gt;Thanks,&lt;br /&gt;
-Dan&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">schuster11</dc:creator><pubDate>Fri, 19 May 2006 18:47:42 -0000</pubDate><guid>https://sourceforge.net21b10dfdb7a682f24ab0d10a677e03dc26bdb543</guid></item><item><title>syslogging sm_marid_log calls</title><link>https://sourceforge.net/p/sid-milter/feature-requests/18/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;An enhancement that would be great for tracing plugin &lt;br /&gt;
activity, particularly dns lookups, would be to have &lt;br /&gt;
an option to syslog all sm_marid_log messages. For &lt;br /&gt;
example, adding something like this into sm_marid_log: &lt;/p&gt;
&lt;p&gt;sm_marid_log(sm_marid *context, sm_marid_loglevel &lt;br /&gt;
level, const char *fmt, ...) &lt;br /&gt;
{ &lt;br /&gt;
va_list va; &lt;br /&gt;
char buf[1024]; &lt;/p&gt;
&lt;p&gt;if (context == NULL || fmt == NULL) &lt;br /&gt;
return; &lt;/p&gt;
&lt;p&gt;va_start(va, fmt); &lt;br /&gt;
vsnprintf(buf, sizeof buf, fmt, va); &lt;br /&gt;
va_end(va); &lt;/p&gt;
&lt;p&gt;+ if ( sm_marid_logging ) &lt;br /&gt;
+ { &lt;br /&gt;
+         syslog(LOG_DEBUG, "%s", buf ); &lt;br /&gt;
+ } &lt;/p&gt;
&lt;p&gt;(* context-&amp;gt;sm_app_log)(context-&amp;gt;sm_app_data, level, &lt;br /&gt;
buf); &lt;br /&gt;
} &lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Steve McKenna</dc:creator><pubDate>Thu, 04 May 2006 08:00:06 -0000</pubDate><guid>https://sourceforge.neta23b2962b217ae30d90f9be50c9989f9ef5c02e9</guid></item><item><title>turn off syslogging of SMFIS_REJECT</title><link>https://sourceforge.net/p/sid-milter/feature-requests/17/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;When the logging option has been selected, currently &lt;br /&gt;
all SMFIS_REJECT cases are logged. Could we have an &lt;br /&gt;
option to turn off the syslogging of SMFIS_REJECT &lt;br /&gt;
rejections? &lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Steve McKenna</dc:creator><pubDate>Thu, 04 May 2006 07:59:05 -0000</pubDate><guid>https://sourceforge.net8eb94b7900563264cc19b3d0e912e643de7e0fa7</guid></item><item><title>set reply message for no pra</title><link>https://sourceforge.net/p/sid-milter/feature-requests/16/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;(Optionally?) set a reply message when the responsible &lt;br /&gt;
domain cannot be determined. Eg after the line: &lt;br /&gt;
/* XXX -- arrange to add a header maybe? */ &lt;br /&gt;
something like this would be good: &lt;br /&gt;
if (!testmode) smfi_setreply(ctx, "550", "5.7.1", "SPF &lt;br /&gt;
check can't determine responsible domain" ); &lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Steve McKenna</dc:creator><pubDate>Thu, 04 May 2006 07:57:50 -0000</pubDate><guid>https://sourceforge.net837f4bd6323eb76e2cc31918d2aa2e3d6de0cd27</guid></item><item><title>Option to specify reject message</title><link>https://sourceforge.net/p/sid-milter/feature-requests/15/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Please consider adding an option to specify a string &lt;br /&gt;
that can override the hard-coded "Rejected due to %s &lt;br /&gt;
policy for sender %s" string.  The override should &lt;br /&gt;
include placeholders that allow insertion of the &lt;br /&gt;
following:&lt;/p&gt;
&lt;p&gt;* IP address (variable 'ip' exists for this)&lt;br /&gt;
* Rejection type ("SPF" or "Sender-ID")&lt;br /&gt;
* Bad address (variable 'badaddr' exists for this)&lt;/p&gt;
&lt;p&gt;This would allow the sysadmin to specify a rejection &lt;br /&gt;
message template such as:&lt;/p&gt;
&lt;p&gt;Mail from {ip} rejected due to {sid_check} policy for &lt;br /&gt;
sender {sender} - see &lt;a href="http://www.openspf.org/why.html?" rel="nofollow"&gt;http://www.openspf.org/why.html?&lt;/a&gt;&lt;br /&gt;
sender={sender}&amp;amp;ip={ip}&lt;/p&gt;
&lt;p&gt;Which might expand to:&lt;/p&gt;
&lt;p&gt;Mail from 127.0.0.1 rejected due to SPF policy for &lt;br /&gt;
sender foo@bar.com - see &lt;br /&gt;
&lt;a href="http://www.openspf.org/why.html?" rel="nofollow"&gt;http://www.openspf.org/why.html?&lt;/a&gt;&lt;br /&gt;
sender=foo@bar.com&amp;amp;ip=127.0.0.1&lt;/p&gt;
&lt;p&gt;In addition to giving the sending client a more &lt;br /&gt;
useful message, this also gives the sysadmin a single &lt;br /&gt;
logfile line to aid in parsing.&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Morgan Davis</dc:creator><pubDate>Thu, 06 Apr 2006 08:39:31 -0000</pubDate><guid>https://sourceforge.neta8b174e95d872464c49067c7d9c1876cdee76e97</guid></item></channel></rss>