Joe Marcus Clarke
032bee58d2
Revert my last commit. According to ache, the maintainer, this is fixed
...
locally in this port's patches. Sorry for jumping the gun, but better safe
than sorry.
Requested by: ache
2003-12-11 20:02:16 +00:00
Joe Marcus Clarke
d831818e69
With my portmgr hat on, mark this port FORBIDDEN as it contains a remotely
...
exploitable privilege escalation vulnerability. See
http://www.eudora.com/qpopper/#BUFFER for more details.
Reported by: kensmith
2003-12-11 16:49:26 +00:00
Max Khon
45cbe92344
Fix build with gcc 3.3.1.
...
Approved by: ache (MAINTAINER)
2003-08-12 15:12:18 +00:00
Ade Lovett
7e52725f2a
Clear moonlight beckons.
...
Requiem mors pacem pkg-comment,
And be calm ports tree.
E Nomini Patri, E Fili, E Spiritu Sancti.
2003-03-07 06:14:21 +00:00
Andrey A. Chernov
ed7ab5650c
Use LATEST_LINK = popper to stop confusing with qpopper
...
Submitted by: "Akinori MUSHA" <knu@iDaemons.org>
2001-11-07 13:18:22 +00:00
Andrey A. Chernov
0c85b2532d
Use ${SH} to run pkg-install. It seems that CTM not preserve x-bit
2001-11-02 10:04:27 +00:00
Andrey A. Chernov
8c027b5c1d
Move user adding into pkg-install
2001-10-19 11:26:37 +00:00
Andrey A. Chernov
b9d89fac0e
Add pop:mail automatically
2001-10-17 14:00:24 +00:00
Andrey A. Chernov
36c37f4256
Fix auth for non-OPIE users
2001-10-02 17:01:23 +00:00
Andrey A. Chernov
58bf95c7e4
Rename variables using WITH_POPPER_ prefix
2001-08-12 20:11:38 +00:00
Andrey A. Chernov
919e336a9b
Switch to OPIE
2001-07-30 15:51:33 +00:00
Andrey A. Chernov
6a50c45647
Bump PORTREVISION I forget
2001-02-19 15:58:19 +00:00
Andrey A. Chernov
7c6b3b814b
Remove wrong uidl_found increment
...
PR: 19038
Submitted by: "Aaron D.Gifford" <agifford@infowest.com>
2001-02-18 10:33:54 +00:00
Maxim Sobolev
2b1a883dc4
Massive style enforcement - use ^I instead of spaces for variables identation.
2001-01-16 17:33:20 +00:00
Maxim Sobolev
5504b50b48
Add "@dirrm etc/popper" to make bento happy.
...
Submitted by: bento
2000-06-05 09:47:59 +00:00
Kris Kennaway
a11b23934f
unFORBID this port by closing the overflow
2000-05-25 07:50:10 +00:00
Kris Kennaway
e3d1e0fa36
Mark FORBIDDEN due to Yet Another Qpopper Overflow
2000-05-24 19:55:30 +00:00
Maxim Sobolev
e56f11fbf0
Add a WWW.
2000-05-23 08:56:48 +00:00
Maxim Sobolev
d1568d3028
Distfile has been moved into different directory, so update MASTER_SITES.
...
PR: 18746
Submitted by: Jeff Palmer <jeff@isni.net>
2000-05-23 07:11:48 +00:00
Andrey A. Chernov
f13ab6a55c
1) Popper always assume that fgets got whole line, so it is easy to make
...
fake headers by special long lines aligned to buffer boundary - popper
treat them as separate lines.
Whole code needs rewriting. As workaround increase MAXLINE to the value
sendmail use, hoping sendmail itself not makes longer lines.
2) Fix EUIDL responses not properly \n terminated.
2000-04-17 19:35:40 +00:00
Chris Piazza
28849e36e9
Update to use PORTNAME/PORTVERSION
2000-04-13 20:01:08 +00:00
Steve Price
968503f292
Better error message when the connecting client's IP address is
...
unresolvable.
PR: 12618
Submitted by: Mikhail Teterin <mi@aldan.algebra.com>
1999-12-29 08:32:31 +00:00
Peter Wemm
7b8fca1447
$Id$ -> $FreeBSD$
1999-08-30 12:09:14 +00:00
David E. O'Brien
f3a9c6c81e
Change Id->FreeBSD.
1999-08-25 06:51:17 +00:00
Tim Vanderhoek
dd9ff05a6a
Commit #3/4 to enforce caps, no period.
...
FWIW, checkout of these things took 5+hrs, staying on the local
.freebsd.org net w/o hitting the 'net at all.
As promised,
$ time cvs ci
real 67m51.701s
user 0m1.250s
sys 0m5.345s
1999-06-26 19:12:45 +00:00
SADA Kenji
96d4c405a7
Add a notation about user restriction.
...
PR: ports/10114
Submitted by: Issei Suzuki <issei@jp.FreeBSD.ORG>
1999-02-26 14:51:31 +00:00
Tim Vanderhoek
751f2992ec
Remove more manpages, as part of the great manpage removal project.
1998-08-17 05:19:34 +00:00
Andrey A. Chernov
693741eef7
add optional youbin support
1998-08-04 22:45:21 +00:00
Andrey A. Chernov
68cdc2ff00
Make full pop debugging optional
1998-08-02 20:34:29 +00:00
Andrey A. Chernov
9908e919aa
Upgrade to 2.53
1998-07-18 21:36:45 +00:00
Andrey A. Chernov
20c0e99bb4
Upgrade to 2.52
1998-07-02 04:09:37 +00:00
Andrey A. Chernov
1e71b91012
path changed back
1998-07-01 02:13:58 +00:00
Andrey A. Chernov
45341bd43e
eudora goes old
1998-06-30 22:38:32 +00:00
Andrey A. Chernov
ea465d63d9
Fix longstanding bug with Content-Length counted in messages size
1998-06-30 20:31:15 +00:00
Andrey A. Chernov
90c94122e6
Upgrade to 2.5
1998-06-30 19:14:17 +00:00
Andrey A. Chernov
6cf03c5c09
Enable debugging code
1998-06-30 06:51:47 +00:00
Andrey A. Chernov
ee32660240
Fix another place with UIDL check too
...
Calculate UIDL size and lines number properly now
1998-06-30 06:44:00 +00:00
Andrey A. Chernov
76441fe1da
Fix two longstanding bugs with Return-Path patch
...
1) wrong mbox size calculation
2) Return-Path was _never_ sent out
1998-06-30 06:42:18 +00:00
Andrey A. Chernov
60b8be15ee
Check password length too
...
Submitted by: idea from "Aaron D. Gifford" <agifford@infowest.com>
1998-06-29 14:18:42 +00:00
Andrey A. Chernov
390ebaef38
Add check for max parameter length
...
Submitted by: "Aaron D. Gifford" <agifford@infowest.com>
1998-06-28 23:02:15 +00:00
Andrey A. Chernov
3ca86b2cb5
Use snprintf now
1998-06-28 22:15:59 +00:00
Andrey A. Chernov
0a8957adfe
oops, forget to add 1 for newline for max UIDL check
1998-06-28 21:56:00 +00:00
Andrey A. Chernov
27ccfb65b0
Increase allowed UIDL length to 70 chars per rfc1939
1998-06-28 21:44:59 +00:00
Andrey A. Chernov
61b9aa4259
Prevent overflow on too long From:
...
Do not return stack buffer
Submitted by: "Aaron D. Gifford" <agifford@infowest.com>
1998-06-28 21:31:18 +00:00
Andrey A. Chernov
198779dfae
Reject too long X-UIDL
1998-06-28 21:11:55 +00:00
Andrey A. Chernov
a255968eaa
Fix broken code that people tries to commit again and again despite the
...
fact that I am this port maintainer and still alive.
1998-06-28 17:50:22 +00:00
Jordan K. Hubbard
af81de00cc
DOH! Correct stupid brain-o with strcat() in my last commit. Now
...
popper should get a bit further without dumping core now. :-)
1998-06-28 08:44:01 +00:00
Joerg Wunsch
51b8ca739a
Well, it's always a bad idea to introduce new bugs when trying to fix
...
one... strncat(3) takes a string as its second arg, and a len as its
third one, not the other way round. =:-)
The ``consistency'' of the C library sucks, of course.
1998-06-28 08:04:07 +00:00
Jordan K. Hubbard
d5ff240d34
Close a missing overflow with strcat() in my original change
...
and add an extra overflow fix to pop_log.c. This is just a place-holder
until Peter comes along with a more comprehensive set of patches.
1998-06-27 21:47:34 +00:00
Andrey A. Chernov
2ab4aaac95
Add -3 to len as room for \n\r\0
1998-06-27 20:47:27 +00:00