OK, turing.

<- leave blank

Mon Nov 29 10:30:32 EST 2021

#!/bin/rc
rfork en
shift
sender=$1
shift
addr=$1
shift
exec /bin/upas/smtp -h `{cat /dev/sysname}^.inri.net $addr $sender $*


Mon Nov 29 10:22:57 EST 2021
--rw-rw-r-- M 111 upas upas 460 Oct 4 2019 blocked
--rw-rw-r-- M 111 sl sl 16935 Sep 22 2016 blocked.old
--rw-rw-r-- M 111 upas upas 80082 Oct 4 2019 classify.re
--rwxrwxr-x M 111 upas upas 533 Oct 4 2019 gone.fishing
--rw-rw-r-- M 111 upas upas 268 Oct 4 2019 gone.msg
--rw-rw-r-- M 111 upas upas 185 Oct 4 2019 ignore
--rwxrwxr-x M 111 upas upas 600 Oct 4 2019 isspam.rc
--rwxrwxr-x M 111 upas upas 100 Oct 4 2019 justqmail
--rwxrwxr-x M 111 upas upas 89 Oct 4 2019 kickqueue
--rwxrwxr-x M 111 upas upas 116 Oct 4 2019 lazyqmail
--rwxrwxr-x M 111 sl sl 138 May 8 2013 mail.rc
--rwxrwxr-x M 111 upas upas 440 Oct 4 2019 mailnews
--rwxrwxr-x M 111 upas upas 678 Oct 4 2019 msgcat.rc
--rw-rw-r-- M 111 upas upas 63 Oct 4 2019 namefiles
--rw-rw-r-- M 111 sl upas 4859 Aug 3 00:26 names.local
--rwxrwxr-x M 111 sl sl 197 May 8 2013 omail.rc
--rw-rw-r-- M 111 upas upas 602 Oct 4 2019 patterns
--rw-rw-r-- M 111 upas upas 129 Oct 4 2019 pipeto.bayes
--rw-rw-r-- M 111 upas upas 4182 Oct 4 2019 pipeto.lib
--rw-rw-r-- M 111 upas upas 13 Oct 4 2019 prof.mbox
--rw-rw-r-- M 111 upas upas 13 Oct 4 2019 prof.spam
--rwxrwxr-x M 111 upas upas 197 Mar 26 2021 qmail
--rwxrwxr-x M 111 upas upas 125 Aug 26 23:10 remotemail
--rw-rw-r-- M 111 sl upas 2111 Sep 6 10:53 rewrite
--rw-rw-r-- M 111 upas upas 1131 Oct 4 2019 rewrite.direct
--rw-rw-r-- M 111 upas upas 1164 Oct 4 2019 rewrite.gateway
--rwxrwxr-x M 111 upas upas 468 Oct 4 2019 setup.bayes
--rw-rw-r-- M 111 sl upas 2150 Sep 6 10:54 smtpd.conf
--rwxrwxr-x M 111 upas upas 400 Oct 4 2019 spam.rc
--rw-rw-r-- M 111 sl upas 28852 Nov 29 05:03 spamhaus
--rwxrwxr-x M 111 upas upas 400 Oct 4 2019 unspam.rc
--rwxrwxr-x M 111 upas upas 65 Oct 4 2019 validateaddress
--rwxrwxr-x M 111 upas upas 1210 Oct 4 2019 validateattachment
--rwxrwxr-x M 111 sl upas 2842 Jul 30 20:53 validatesender
--rw-rw-r-- M 111 upas upas 326 Oct 4 2019 white.starter


Mon Nov 29 10:20:50 EST 2021
: lib ; pwd
/mail/lib
: lib ; ls -ltr
--rw-rw-r-- M 79 upas upas 129 Feb 12 2012 pipeto.bayes
--rw-rw-r-- M 79 upas upas 4182 Feb 12 2012 pipeto.lib
--rw-rw-r-- M 79 upas upas 80082 Feb 12 2012 classify.re
--rw-rw-r-- M 79 upas upas 13 Feb 12 2012 prof.spam
--rwxrwxr-x M 79 upas upas 533 Feb 12 2012 gone.fishing
--rwxrwxr-x M 79 upas upas 400 Feb 12 2012 unspam.rc
--rwxrwxr-x M 79 upas upas 400 Feb 12 2012 spam.rc
--rwxrwxr-x M 79 upas upas 678 Feb 12 2012 msgcat.rc
--rwxrwxr-x M 79 upas upas 89 Feb 12 2012 kickqueue
--rwxrwxr-x M 79 upas upas 116 Feb 12 2012 lazyqmail
--rwxrwxr-x M 79 upas upas 100 Feb 12 2012 justqmail
--rw-rw-r-- M 79 upas upas 1164 Feb 12 2012 rewrite.gateway
--rwxrwxr-x M 79 upas upas 468 Feb 12 2012 setup.bayes
--rw-rw-r-- M 79 upas upas 602 Feb 12 2012 patterns
--rwxrwxr-x M 79 upas upas 65 Feb 12 2012 validateaddress
--rwxrwxr-x M 79 upas upas 1210 Feb 12 2012 validateattachment
--rw-rw-r-- M 79 upas upas 63 Feb 12 2012 namefiles
--rw-rw-r-- M 79 upas upas 326 Feb 12 2012 white.starter
--rw-rw-r-- M 79 upas upas 268 Feb 12 2012 gone.msg
--rw-rw-r-- M 79 upas upas 185 Feb 12 2012 ignore
--rwxrwxr-x M 79 upas upas 600 Feb 12 2012 isspam.rc
--rwxrwxr-x M 79 upas upas 440 Feb 12 2012 mailnews
--rw-rw-r-- M 79 upas upas 13 Feb 12 2012 prof.mbox
--rwxrwxr-x M 79 upas upas 1128 Feb 12 2012 validatesender


Mon Nov 29 10:17:04 EST 2021
#!/bin/rc
rfork en

# note the patterns in the exception lists are eval'd
# later, so wildcards may be quoted.
#
# force non-explicit matches to fail.  gmail specifies allowed hosts, but
# then says ?all, defeating all that work.  just fail jerks impersonating google.
spfescalate=(gmail.com)

# ignore spf mismatches from these domains
spfign=(*.bell-labs.com *.github.com *.imwan.com imwan.com mac.com
email.merveilles.town *.lulu.com *.mailgun.net mythic-beasts.com
*.mythic-beasts.com *.nintendo.com *.patreon.com quintile.net *.remarkable.com
*.society6.com stvincent.org)

# these domains get a spamhaus pass
shign=(*terzarima.net *zenzebra.mv.com)

# these people are special; give them a pass
# dom!addr style.
specialed=(yahoo.com!swardd)

# these domains are special; give them a pass
noping=('*.github.com' github.com'*.homeagain.com' imwan.com '*.imwan.com'
quintile.net)

# these particular senders are blacklisted
# motivated by the fact that yahoo calender
# is compromised.
dropuser=(reply.yahoo.com!calendar-invite comerrec.net!* ecoinfor.com!mail-bounces
sheilabret!att.net)

fn usage{
	echo 'usage: validatesender [-n /net] dom user [ip [hellodom]]' >[1=2]
	exit usage
}

fn checkspf{
	str=($h spf $*)
	spfflag=-v
	if(~ $1 $spfescalate)
		spfflag=$spfflag^e
	if(~ $#netroot 1)
		spfflag=($spfflag -n $netroot)
	upas/spf $spfflag $* >[2=1] | sed 's:^:'^$"str^' -> :g' >>$log
	spfstatus=$status
	spfstatus=`{echo $spfstatus | sed 's:\|.*::
		s/^spf [0-9]+://'}
	if(!  ~ $#spfstatus 0 && ! ~ $"spfstatus *none){
		if(~ $spfstatus deferred:*)
			exit $"spfstatus
		if(!  ~ $dom $2)
			exit 'rejected: spf '^$"spfstatus
	}
}

h=`{date -n} ^ ' ' ^ $sysname ^ ' ' ^ $pid
h=$"h
log=/sys/log/smtpd.mx #/fd/2
if(!  test -w $log)
	log = /dev/null
echo $h validatesender $* >>$log

netroot=/net.alt
if(~ $1 -n){
	shift
	netroot=$1
	shift
}
if(!  ~ $#* [234])
	usage

dom=$1; addr=$2; ip=$3; helo=$4

if(eval ~ '$dom!$addr' $dropuser)
	exit 'member of dropuser list'

if(~ $dom^!^$addr $specialed networksolutions.com!*)
	exit ''

if(!  ~ $#ip 0 && test -x /mail/lib/spamhaus){
	spamhaus=`{/mail/lib/spamhaus $ip}
	if(!  ~ $spamhaus '' && eval ! ~ '$dom' $shign){
		echo $h spamhaus '->' $spamhaus>>$log
		exit 'rejected: spamhaus: '^$"spamhaus
	}
	if(!  ~ $spamhaus '')
		echo $h spamhaus '->' $spamhaus '(ignored)'>>$log
}

if(eval ~ $helo $noping){
	echo $h validatesender noping ok >> $log
	exit ''
}

if(x=`{upas/smtp -p $netroot/tcp!$dom /dev/null $addr >[2=1] |
		tee >{sed 's/^/'$h' /' >> $log} |
		tail -1}){
	if(~ $#ip 0 || ! test -x /bin/upas/spf)
		exit ''
	if(eval ~ '$dom' $spfign)
		exit ''
	echo $h spf $dom $ip $addr $helo>>$log
	checkspf $dom $ip $addr $helo
	exit ''
}

smtpstatus=$status
if(~ $#x 0)
	x=$smtpstatus
if(~ $smtpstatus *'Permanent Failure'*)
	exit 'rejected: smtp ping: '^$"x
exit 'deferred: smtp ping: '^$"x


Mon Nov 29 10:14:33 EST 2021
: plan9front ; ls sys/lib/dist/mail/lib
blocked lazyqmail* prof.mbox smtpd.conf
classify.re mailnews* prof.spam spam.rc*
gone.fishing* msgcat.rc* qmail* unspam.rc*
gone.msg namefiles remotemail* validateaddress*
ignore names.local rewrite validateattachment*
isspam.rc* patterns rewrite.direct white.starter
justqmail* pipeto.bayes rewrite.gateway
kickqueue* pipeto.lib setup.bayes*
: plan9front ; pwd
/home/j/local/plan9/plan9front


Sun Nov 28 19:45:48 EST 2021
poop

Sun Nov 28 18:09:04 EST 2021
-> POST /acme/new-order HTTP/1.1
Host: acme-staging-v02.api.letsencrypt.org
-> Content-Length: 800
-> User-Agent: Mozilla/5.0 (compatible; hjdicks)
-> Connection: keep-alive
-> Accept: */*
-> Content-Type: application/jose+json

<- HTTP/1.1 400 Bad Request
<- Server: nginx
<- Date: Sun, 28 Nov 2021 23:08:37 GMT
<- Content-Type: application/problem+json
<- Content-Length: 199
<- Connection: keep-alive
<- Boulder-Requester: 35127048
<- Cache-Control: public, max-age=0, no-cache
<- Link:
<https://acme-staging-v02.api.letsencrypt.org/directory>;rel="index"
<- Replay-Nonce: 0001ls_xyUCnsImT-tBsyh0BOWCyFi4Q_ZLNOw6M3Dbigxk
resp=<nil>
hclose [0] tcp!acme-staging-v02.api.letsencrypt.org!https
auth/acmed: submit order: '/mnt/web/0/location' does not exist

Sun Nov 28 17:58:56 EST 2021
req="{
"protected":
"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",
"payload":
"eyJ0ZXJtc09mU2VydmljZUFncmVlZCI6IHRydWUsImNvbnRhY3QiOiBbIm1haWx0bzpzbEA5ZnJvbnQub3JnIl19",
"signature":
"w7pse1FnmEEuX1V5jfcZNfNBE_OmMy5vH_fqhv8HrgQiDuETQ_7kRhdbTRiGVG1-LdyJWywXdbEo89IGgUuleYDa-PB7QHXMFM640kMy_qCYP56vzAdaYfYVFnFsMTDPUsxj9zzXL_qYoHRLxIF1owphWubfIqhJfsUkJZppb7bp7cZbH1aTOsM1dnm3sYuej_p6VFxT7KXHei71G2Mc93Utt9j1tgHVOlwg2QVgUZ96AGKsjxhZGQPQ-IcVvgyAtyDLS4zlyZecjupxz7k6nIhBbYjj6ZpbH1e8dKo3vz0Q2NmswYVtSu4kEaYywSmch9LcXuBlR2dzeTUQX3kQ8g"
}
"
resp={
  "key": {
    "kty": "RSA",
    "n":
    "9KRkaioF8D4dGdz3MaRF56lNzx1hY3usIVS_awgbdsFfKNtvQRgKk3cNOaPTKtcw8XE9fBDuhsnT5fOlGm2P8zD3fSgHjIg0AAfqqqLHNpBq0zLJPkOFl2STxqrpi_13voGl56HeHJCsQV88rrR072z4QKkrQr9fmS0JczAt7ZzGZIP-twkEYeC_qdmYzKTN_jgRA7WDAx5smCrazyZnkla-f5FS3rlTRMmrPyyfjDRNd4XgpGXyX6ET-czH-fCk03dEO7ybf7CwqvoXBxDtdL1eaRr67RwvBvJ0szrmvTYViyCKBtPWUZsW_kBVMAmbO4AWU6d6-D8hJEz8orkujw",
    "e": "AQAB"
  },
  "contact": [
    "mailto:sl@9front.org"
  ],
  "initialIp": "216.126.196.35",
  "createdAt": "2021-11-28T04:25:56Z",
  "status": "valid"
}, loc=https://acme-staging-v02.api.letsencrypt.org/acme/acct/35127048
subject: sl@9front.org
req="{
"protected":
"eyJhbGciOiAiUlMyNTYiLCJub25jZSI6ICIwMDAxZ1ZWZzJyWnhtT3VNclpYMlNEREdIdkpSTkg5cEFsODR3VHRlQ2poam9kSSIsImtpZCI6ICJodHRwczovL2FjbWUtc3RhZ2luZy12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMzUxMjcwNDgiLCJ1cmwiOiAiaHR0cHM6Ly9hY21lLXN0YWdpbmctdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
"payload":
"eyAgImlkZW50aWZpZXJzIjogW3sgICJ0eXBlIjogImRucyIsICAidmFsdWUiOiAic2xAOWZyb250Lm9yZyJ9ICBdLCAgIndpbGRjYXJkIjogZmFsc2V9",
"signature":
"ENVa6zJwKGSsqKn9us4HMkyleT7t8EuEC3z-MiGSQPIOu6jRfvB8MAgWPu67FhIE-kmAK6X0imK02_i6zCC78yu0VdAVMf5OpNnAiq3OrtsXsr0TNvWmh_ix-oczDj_2Of9KcZRHdnNj6x5Y_e1UebTXDr7usvPODEV8Io0uUoILgdgY-fTB5FY6XBm5b3R0kpIfK56iCw6bznqljY6CN3rsRmtzlMmVQ8S0GGEA1pteFFhhapn0fPXqpywnZPZElfw10dRCcCTxIFqlX16Q3cDZO53RUkpck4CvL9ncVViePnwYu_nFMFYakMppyR2mnMeaTQiJgJpHl5yQwPGGgg"
}
"
resp=<nil>
auth/acmed: submit order: '/mnt/web/0/location' does not exist


Sun Nov 28 17:57:31 EST 2021
9pserve
COMMAND
Privileged Cont
Web Content
WebExtensions
acpi_thermal_pm
acpid
api
at-spi-bus-laun
at-spi2-registr
ata_sff
blkcg_punt_bio
card0-crtc0
card0-crtc1
cfg80211
cpuhp/0
cpuhp/1
dbus-daemon
dbus-run-sessio
devfreq_wq
dhcpcd
dwl
edac-poller
ext4-rsv-conver
firefox
firewire
firewire_ohci
foot
getty
gopls
inet_frag_wq
init
ipv6_addrconf
irq/17-b43
irq/18-mmc0
jbd2/sda1-8
jbd2/sda5-8
jbd2/sda6-8
jbd2/sda7-8
jbd2/sda9-8
kauditd
kblockd
kcompactd0
kdevtmpfs
khugepaged
kintegrityd
kmemstick
ksmd
ksoftirqd/0
ksoftirqd/1
kswapd0
kthreadd
kthrotld
kworker/0:0H-events_highpri
kworker/0:1-events
kworker/0:1H-events_highpri
kworker/0:2-events
kworker/1:0-events
kworker/1:0H-kblockd
kworker/1:1H-events_highpri
kworker/1:2-events
kworker/u4:0-phy0
kworker/u4:1-phy0
kworker/u4:2-phy0
kworker/u5:0-i915_flip
kworker/u5:1+i915_flip
kworker/u5:2-i915_flip
less
logger
login
mako
man
md
migration/0
migration/1
mld
mm_percpu_wq
mpd
nc
netns
nix-daemon
ntpd
nvim
oom_reaper
plumber
poweralertd
ps
r592_io
rc
rcu_gp
rcu_par_gp
rcu_sched
rcu_tasks_rude_
rcu_tasks_trace
s6-log
s6-supervise
s6-svscan
scsi_eh_0
scsi_eh_1
scsi_eh_2
scsi_eh_3
scsi_eh_4
scsi_eh_5
scsi_tmf_0
scsi_tmf_1
scsi_tmf_2
scsi_tmf_3
scsi_tmf_4
scsi_tmf_5
sdhci
seatd
smtpd
sort
sqlite3
sshd
supervise-daemo
syslogd
tmux: client
tmux: server
udevd
uniq
upowerd
watchdogd
wpa_supplicant
writeback


Sun Nov 28 17:54:22 EST 2021
diff 78c7ad88ffbfbd2b7a7269d863e5f4be7535b566 uncommitted
--- a/sys/src/cmd/webfs/http.c
+++ b/sys/src/cmd/webfs/http.c
@@ -824,7 +824,7 @@
		case 408: /* Request Timeout */
		case 409: /* Conflict */
		case 410: /* Gone */
- goto Error;
+ goto Ok;
		case 411: /* Length Required */
			if(qpost){
				needlength = 1;
@@ -915,6 +915,7 @@
		case 204: /* No Content */
		case 205: /* Reset Content */
			nobody = 1;
+ Ok:
		case 200: /* OK */
		case 201: /* Created */
		case 202: /* Accepted */


Sun Nov 28 17:54:05 EST 2021
Best internet site https://posud-services.ru

prev | next