|
System | : | Linux MiraNet 3.0.0-14-generic-pae #23-Ubuntu SMP Mon Nov 21 22:07:10 UTC 2011 i686 |
Software | : | Apache. PHP/5.3.6-13ubuntu3.10 |
ID | : | uid=65534(nobody) gid=65534(nogroup) groups=65534(nogroup)
|
|
Safe Mode | : | OFF |
Open_Basedir | : | OFF |
Freespace | : | 25.75 GB of 70.42 GB (36.57%) |
|
MySQL: ON MSSQL: OFF Oracle: OFF PostgreSQL: OFF Curl: OFF Sockets: ON Fetch: OFF Wget: ON Perl: ON |
Disabled Functions: pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,
|
[ System Info ]
[ Processes ]
[ SQL Manager ]
[ Eval ]
[ Encoder ]
[ Mailer ]
[ Back Connection ]
[ Backdoor Server ]
[ Kernel Exploit Search ]
[ MD5 Decrypter ]
[ Reverse IP ]
[ Kill Shell ]
[ FTP Brute-Force ]
|
|
/
usr/
src/
courier-0.66.1/
rfc1035/
- drwxrwxrwx
|
Viewing file: spf.h (2.22 KB) -rw-rw-rw-Select action/file-type:  ( +) |  ( +) |  ( +) | Code ( +) | Session ( +) |  ( +) | SDB ( +) |  ( +) |  ( +) |  ( +) |  ( +) |  ( +) |
/* ** Copyright 2004 Double Precision, Inc. ** See COPYING for distribution information. */
#ifndef rfc1035_spf_h #define rfc1035_spf_h
#include "rfc1035/rfc1035.h"
#ifdef __cplusplus extern "C" { #endif
/* An SPF client evaluates an SPF record and produces one of seven results:
None: The domain does not publish SPF data.
Neutral (?): The SPF client MUST proceed as if a domain did not publish SPF data. This result occurs if the domain explicitly specifies a "?" value, or if processing "falls off the end" of the SPF record.
Pass (+): the message meets the publishing domain's definition of legitimacy. MTAs proceed to apply local policy and MAY accept or reject the message accordingly.
Fail (-): the message does not meet a domain's definition of legitimacy. MTAs MAY reject the message using a permanent failure reply code. (Code 550 is RECOMMENDED. See [RFC2821] section 7.1.)
Softfail (~): the message does not meet a domain's strict definition of legitimacy, but the domain cannot confidently state that the message is a forgery. MTAs SHOULD accept the message but MAY subject it to a higher transaction cost, deeper scrutiny, or an unfavourable score.
There are two error conditions, one temporary and one permanent.
Error: indicates an error during lookup; an MTA SHOULD reject the message using a transient failure code, such as 450.
Unknown: indicates incomplete processing: an MTA MUST proceed as if a domain did not publish SPF data. */
#define SPF_NONE 0 #define SPF_NEUTRAL '?' #define SPF_PASS '+' #define SPF_FAIL '-' #define SPF_SOFTFAIL '~' #define SPF_ERROR '4'
/* Everything else is SPF_UNKNOWN */ #define SPF_UNKNOWN '5'
char rfc1035_spf_lookup(const char *mailfrom, const char *tcpremoteip, const char *tcpremotehost, const char *helodomain, const char *mydomain, char *errmsg_buf, size_t errmsg_buf_size);
struct rfc1035_spf_info { const char *mailfrom; const char *current_domain; const char *tcpremoteip; const char *tcpremotehost; const char *helodomain; const char *mydomain; char *errmsg_buf; size_t errmsg_buf_size;
size_t *lookup_cnt; };
#ifdef __cplusplus } #endif
#endif
|