summaryrefslogtreecommitdiff
path: root/Mailman/SecurityManager.py
diff options
context:
space:
mode:
authorcotton1998-11-18 15:42:17 +0000
committercotton1998-11-18 15:42:17 +0000
commit416c06a736afeff26ec079144256fdf28dde1b19 (patch)
tree75bf03ac1393a17840bba0e709e21b39c93b970a /Mailman/SecurityManager.py
parentbe14e7ac55b424c137601505b8b3307a49bc7f3f (diff)
downloadmailman-416c06a736afeff26ec079144256fdf28dde1b19.tar.gz
mailman-416c06a736afeff26ec079144256fdf28dde1b19.tar.zst
mailman-416c06a736afeff26ec079144256fdf28dde1b19.zip
made Post look for the "sender" of the message like this: check for
the envelope sender and use it if it is found, otherwise, use msg.GetSender(). This is one of the many places where mailman checks the "sender" by looking for the sender header, which isn't as authoritative as the envelope sender if that's available from the unixfrom line. the sender is a header, the envelope sender is from the smtp transaction. Got bit hard by this one because a profane message posted to a 3k list through a forwarding address that should have been flagged as requiring approval wasn't because the forwarding address set the sender header to something other than the envelope sender, and what it set that too happened to be an approved address. scott
Diffstat (limited to 'Mailman/SecurityManager.py')
0 files changed, 0 insertions, 0 deletions