SPELL=pyspf VERSION=2.0.11 SOURCE=$SPELL-$VERSION.tar.gz SOURCE_URL[0]=http://downloads.sourceforge.net/sourceforge/pymilter/$SOURCE SOURCE_URL[1]=http://pypi.python.org/packages/source/${SPELL:0:1}/$SPELL/$SOURCE SOURCE_HASH=sha512:b1de35b1ee7b0e7bd88ea882e1eba4e78395b93d537b00970be033d9f23cc242dc1e4c56b7b61ecd522e335d543c903578edf53cb1c227fd45fb18e1877e53b2 SOURCE_DIRECTORY="$BUILD_DIRECTORY/$SPELL-$VERSION" WEB_SITE="http://bmsi.com/python/milter.html" LICENSE[0]=PYTHON ENTERED=20081007 SHORT="SPF (Sender Policy Framework) implemented in Python" cat << EOF SPF does email sender validation. For more information about SPF, please see http://www.openspf.org/ One incompatible change was introduced in version 1.7. Prior to version 1.7, connections from a local IP address (127...) would always return a Pass result. The special case was eliminated. Programs calling pySPF should not do SPF checks on locally submitted mail. This SPF client is intended to be installed on the border MTA, checking if incoming SMTP clients are permitted to forward mail. The SPF check should be done during the MAIL FROM:<...> command. EOF .