[squid-dev] [PATCH] Initial libsecurity API

Amos Jeffries squid3 at treenet.co.nz
Sun Feb 8 12:18:51 UTC 2015


Spam detection software, running on the system "master.squid-cache.org",
has identified this incoming email as possible spam.  The original
message has been attached to this so you can view it or label
similar future email.  If you have any questions, see
@@CONTACT_ADDRESS@@ for details.

Content preview:  New patch attached for review. On 27/01/2015 8:26 a.m., Alex
   Rousskov wrote: > On 01/14/2015 08:50 AM, Amos Jeffries wrote: >> This is
   the first step(s) towards a generic TLS/SSL security API for >> Squid. >
  > >> + // BUG: ssl_client.sslContext will leak on reconfigure when Config
  gets memset() > ... >> + Config.ssl_client.sslContext = Security::ProxyOutgoingConfig.createContext();
   > > Which memset(Config) call are you referring to here? > >> void >> configFreeMemory(void)
   >> { >> free_all(); >> #if USE_OPENSSL >> SSL_CTX_free(Config.ssl_client.sslContext);
   >> #endif >> } > > And is not Config.ssl_client.sslContext destroyed in the
   old > configFreeMemory() function quoted above? [...] 

Content analysis details:   (8.3 points, 5.0 required)

 pts rule name              description
---- ---------------------- --------------------------------------------------
 1.8 URIBL_BLACK            Contains an URL listed in the URIBL blacklist
                            [URIs: configure.ac]
 3.6 RCVD_IN_PBL            RBL: Received via a relay in Spamhaus PBL
                            [121.98.158.196 listed in zen.spamhaus.org]
 1.6 RCVD_IN_BRBL_LASTEXT   RBL: No description available.
                            [121.98.158.196 listed in bb.barracudacentral.org]
 0.9 SPF_FAIL               SPF: sender does not match SPF record (fail)
[SPF failed: Please see http://www.openspf.org/Why?s=mfrom;id=squid3%40treenet.co.nz;ip=121.98.158.196;r=master.squid-cache.org]
 0.0 UNPARSEABLE_RELAY      Informational: message has unparseable relay lines
 0.4 RDNS_DYNAMIC           Delivered to internal network by host with
                            dynamic-looking rDNS

The original message was not completely plain text, and may be unsafe to
open with some email clients; in particular, it may contain a virus,
or confirm that your address can receive spam.  If you wish to view
it, it may be safer to save it to a file and open it with an editor.

-------------- next part --------------
An embedded message was scrubbed...
From: Amos Jeffries <squid3 at treenet.co.nz>
Subject: Re: [squid-dev] [PATCH] Initial libsecurity API
Date: Mon, 09 Feb 2015 01:18:51 +1300
Size: 92100
URL: <http://lists.squid-cache.org/pipermail/squid-dev/attachments/20150209/4d6d467c/attachment-0001.mht>


More information about the squid-dev mailing list