summaryrefslogtreecommitdiffstats
path: root/src/plugins/dkim_check.c
Commit message (Collapse)AuthorAgeFilesLines
* [Rework] Further types conversion (no functional changes)Vsevolod Stakhov2024-03-181-72/+72
|
* [Rework] Remove some of the GLib types in lieu of standard onesVsevolod Stakhov2024-03-181-4/+4
| | | | This types have constant conflicts with the system ones especially on OSX.
* [Rework] Use clang-format to unify formatting in all sourcesVsevolod Stakhov2023-07-261-680/+681
| | | | No meaningful changes.
* [Minor] Remove unused functionVsevolod Stakhov2022-12-011-3/+0
|
* [Rework] Use dynamic items for calling callbacksVsevolod Stakhov2022-05-091-4/+4
| | | | | It is trivial to get a static item by dynamic item by just subtracting pointers. So there is no need in other complications.
* [Minor] Fix a name and the description of bogus `user` field in the taskVsevolod Stakhov2022-01-241-1/+1
|
* [Project] Rework API for the modified headersVsevolod Stakhov2021-02-231-1/+1
|
* [Rework] Distinguish between strict config test modeVsevolod Stakhov2020-12-261-5/+11
|
* [Rework] Track maps originsVsevolod Stakhov2020-10-261-1/+1
|
* [Minor] dkim_signing - add list-unsubscribe-post to sign_headersCarsten Rosenberg2020-09-301-2/+3
|
* [Minor] Dkim: Use IDNA translation in DKIM checks as wellVsevolod Stakhov2020-09-231-0/+2
|
* [Fix] Fix unused resultsVsevolod Stakhov2020-09-041-3/+5
|
* [Project] CDB maps: Start making cdb a first class citizenVsevolod Stakhov2020-02-141-4/+8
|
* [Rework] Move local IPs checkVsevolod Stakhov2020-02-121-1/+1
|
* [Rework] Further project structure reorganisationVsevolod Stakhov2020-02-111-2/+2
|
* [Minor] Fix dmarc after changeVsevolod Stakhov2019-12-021-1/+2
|
* [Feature] Allow to limit maps per specific workerVsevolod Stakhov2019-11-111-3/+5
|
* [Feature] Allow to disable symbols from the metric configVsevolod Stakhov2019-11-081-2/+2
|
* [Minor] Fix compile warningsVsevolod Stakhov2019-10-101-1/+2
|
* [Fix] Allow to set 0 size for spf/dkim cachesVsevolod Stakhov2019-07-221-46/+65
| | | | Issue: #2991
* [Minor] Oops, fix format stringVsevolod Stakhov2019-07-121-1/+1
|
* [Project] Adopt main routines and pluginsVsevolod Stakhov2019-07-121-17/+12
|
* [Minor] Add flags for rspamd_lua_parse_table_argumentsVsevolod Stakhov2019-07-011-0/+1
|
* [Fix] Add missing groups to C callback symbolsVsevolod Stakhov2019-06-241-0/+9
|
* [Project] Another iterationVsevolod Stakhov2019-06-221-5/+5
|
* [Rework] Dkim: Remove signing codeVsevolod Stakhov2019-05-311-233/+1
|
* [Fix] Do not use lightuserdata for tracebackVsevolod Stakhov2019-05-241-4/+3
| | | | | | | | | | LuaJIT limits lightuserdata usage to 47 bits. On Arm64, this leads to break of the C <-> Lua interoperability using this type. This rework has changed traceback function behaviour from lightuserdata opaque pointer (GString * in particular) to luaL_Buffer. Issue: #2906
* [Minor] Change the default list of oversigned headersVsevolod Stakhov2019-05-131-2/+2
| | | | | | | | | | | | | | | | | | | Trivia: `Subject` header needs to be oversigned as an attacker could add some 'bad' subject to DKIM signed emails with no subject (rare but possible case). This header is clearly displayed to a user hence, its presence as well as absence MUST be oversigned explicitly. `Reply-To` header is widely used to designate a special address used for replies only but not for authentication checks. It is thus possible to add a malicious `Reply-To` header to force users to reply to a DKIM signed email to some attacker's controlled email address. It clearly opens surface for social engineering like attacks and this header must thus be unconditionally oversigned even if not presented in an original message. Issue: #2887
* [Minor] Sign list-help headerVsevolod Stakhov2019-05-101-2/+2
| | | | Issue: #2887
* [Fix] Change the default oversigning headers to a more sane listVsevolod Stakhov2019-05-101-8/+8
| | | | Issue: #2887
* [Fix] Fix memory in arc signing logicVsevolod Stakhov2019-05-031-0/+5
|
* [Conf] oversign openpgp and autocrypt headersheraklit2562019-04-151-2/+2
|
* [Minor] Add more logging for DKIM keys cachingVsevolod Stakhov2019-04-051-0/+6
|
* [Feature] Support User-Agent in HTTP requestsVsevolod Stakhov2019-02-201-1/+7
| | | | | Issue: #2750 Closes: #2750
* [Minor] Another fix to dkim keys format detection logicVsevolod Stakhov2019-02-191-3/+0
|
* [Fix] Fix HTTP headers signing caseVsevolod Stakhov2019-02-181-5/+13
|
* [Minor] Move DKIM keys load to DKIM common codeVsevolod Stakhov2019-02-111-86/+13
|
* Add multiple signature support.John McKay2019-02-021-5/+19
| | | | Configuration is not clean and milter doesn't support it yet
* Refactor dkim private key loadsJohn McKay2019-02-021-267/+261
|
* [Minor] Try better to keep cached records aliveVsevolod Stakhov2019-02-011-12/+14
|
* [Minor] Add some fail safetyVsevolod Stakhov2019-01-221-4/+27
|
* [Fix] Arc: Use a separated list of headers for arc signingVsevolod Stakhov2019-01-111-4/+28
| | | | | Issue: #2704 Closes: #2704
* [Minor] Save dkim check result in mempool variableVsevolod Stakhov2018-12-011-3/+26
|
* [Project] Rework DKIM checks resultsVsevolod Stakhov2018-12-011-27/+42
|
* [Feature] Write DKIM selector in dkim allow/reject symbolsVsevolod Stakhov2018-11-161-5/+8
|
* [Project] Another rework for symbols cacheVsevolod Stakhov2018-10-291-29/+29
|
* [Rework] Add more traces to async events, get rid of GQuarksVsevolod Stakhov2018-10-261-2/+4
|
* [Minor] More fixes to the internal modulesVsevolod Stakhov2018-10-221-0/+13
|
* [Fix] Various fixes in embedded pluginsVsevolod Stakhov2018-10-211-15/+17
|
* [Fix] Fix finalization for internal pluginsVsevolod Stakhov2018-10-211-0/+3
|