set: ssmtp patch update

This commit is contained in:
Anton Bolshakov 2013-01-18 01:50:39 +00:00
parent 09036f6d2b
commit 85bbdb9920
2 changed files with 30 additions and 14 deletions

View file

@ -1,3 +1,3 @@
AUX set 41 SHA256 61fa527c1906be500005f480446cdfe04e45e48e9ce1a7415e90570ff9f74a27 SHA512 c517eef81963a486b3ef4e7a2d07c88ab3f6e85dc00ead372ee4a207a9e98b084da8dcb723762927322e159a3593bd8a8269613d63bb6ea07e381cdb682276f1 WHIRLPOOL 7b4e2eb82436b0397d8686e9401fe78d501855dd6f282f995baab524680b8b3585d9c05c49aa66ff318ab087aec5a319f2f2aeb839ce3a79850180afdee8d81d
AUX set-ssmtp.patch 3671 SHA256 94acad1ecc24d29a5609a48ab9738319fe396a76c8725e15ebdde8eba6e31b2f SHA512 46e800a05c5eb1f68811ddd4feefd8d1b80370ccae1e69ba9972faf308ebfa6e862376899f71bc97a45a757903f746f9e0eb0d9b51487074775f893aadec2085 WHIRLPOOL f2363a9a2c8dbd9cca03c1b8105ef04d755172f6c55c393f715dc4bde812ca117d5a6ef75358255c2e0ab088601b3799e58f918030cb3582f47abcdf427d7351
AUX set-ssmtp.patch 4332 SHA256 6ad5057bb384667c8c01f9130a704f104b95f4f82bf6b7f7a1af7c2dd671c319 SHA512 5ba0923b5e3fad0a47dd2030505ee2ed21c58d645b108e576f6bcd025fb94808429fb6a79838b44ea7ddacb22cf7ca2a98b10c1a979aef33fe22f699fc5a1975 WHIRLPOOL 9215ecbe2fb6372dc8c0717fecc7ca6704c49c02557552a7f2874301732f0712e4ab9cb44b5f79d1fe2436e730fa565cf1742cb2697ec8e39883441f5d7a25b0
EBUILD set-9999.ebuild 2411 SHA256 25267d1ebd9d679fda4064cd96cf8ec199b9bd3e4917c26863a3ffd5dd7ad7ae SHA512 65db0f8021d536ef1dc3f82d10cffe61203f3b1249f4934fe1e5bd25832fee88345c768637660c6e38d2074a0c7d038ed0e81d9a91f81e8f8f078c792566f1d6 WHIRLPOOL 511b7766af2c4b834e3ea4dbcd1a08cbfdbd75633c2a966bb911f9006b092a8acd4d0d7ba770cfc253441ffa6f3992242635a6b729f637d6aa236180b867edc3

View file

@ -1,9 +1,19 @@
--- src/phishing/smtp/client/smtp_client.py.orig 2013-01-18 09:21:39.239828665 +0800
+++ src/phishing/smtp/client/smtp_client.py 2013-01-18 09:29:05.109850244 +0800
@@ -38,17 +38,10 @@
sendmail_choice = yesno_prompt(["1"], "Start Sendmail? [yes|no]")
# if yes, then do some good stuff
if sendmail_choice == "YES":
--- src/phishing/smtp/client/smtp_client.py.orig 2013-01-18 09:43:44.000000000 +0800
+++ src/phishing/smtp/client/smtp_client.py 2013-01-18 09:45:28.630897843 +0800
@@ -29,29 +29,16 @@
# strip carriage returns
line=line.rstrip()
match=re.search("SENDMAIL=",line)
- if match:
+ if match:
# if match and if line is flipped on continue on
if line == ("SENDMAIL=ON"):
- print_info("Sendmail is a Linux based SMTP Server, this can be used to spoof email addresses.")
- print_info("Sendmail can take up to three minutes to start FYI.")
- print_status("Sendmail is set to ON")
- sendmail_choice = yesno_prompt(["1"], "Start Sendmail? [yes|no]")
- # if yes, then do some good stuff
- if sendmail_choice == "YES":
- print_info("NOTE: Sendmail can take 3-5 minutes to start.")
- if os.path.isfile("/etc/init.d/sendmail"):
- subprocess.Popen("/etc/init.d/sendmail start", shell=True).wait()
@ -15,13 +25,19 @@
- port = ("25")
- # Flip sendmail switch to get rid of some questions
- sendmail=1
+ print_info("You need to configure EMAIL_PROVIDER and /etc/ssmtp/* paramters manually before")
+ print_info("running this option")
+ # Flip sendmail switch to get rid of some questions
+ sendmail=1
# just throw user and password to blank, needed for defining below
user=''
pwd=''
- # just throw user and password to blank, needed for defining below
- user=''
- pwd=''
+ print_info("You need to configure EMAIL_PROVIDER and /etc/ssmtp/* paramters manually before")
+ print_info("running this option")
+ # Flip sendmail switch to get rid of some questions
+ sendmail=1
+ # just throw user and password to blank, needed for defining below
+ user=''
+ pwd=''
# Search for SMTP provider we will be using
match1=re.search("EMAIL_PROVIDER=", line)
--- src/phishing/smtp/client/smtp_web.py.orig 2013-01-18 09:26:51.000000000 +0800
+++ src/phishing/smtp/client/smtp_web.py 2013-01-18 09:25:42.797840452 +0800
@@ -42,25 +42,13 @@