Result for 3AECE8C7FD24EA24E33C4A32581131BC39713CFD

Query result

Key Value
FileName./etc/cron.daily/greylist-tidy.sh
FileSize192
MD5508F9B854F54A45A2C2B879FB83E895B
SHA-13AECE8C7FD24EA24E33C4A32581131BC39713CFD
SHA-2563D0EDFB3A811FDDC95F661270371EE1453E6FDE73738205A82D9EBF042BE5CAA
SSDEEP3:TKH/O+5XyBxqUABWXJrAD8FKhBxqUABWXgYnvQs/V5HgFeY3WIEg6mgZ+4evrDu:YJyBxq3mJrADUKhBxq3mgYvQs/V5AFeX
TLSHT106C01266A1DF6D282CFE53133575E0B605A4A01A7EEB079460047AC4180DBE79210781
hashlookup:parent-total15
hashlookup:trust100

Network graph view

Parents (Total: 15)

The searched file hash is included in 15 parent files which include package known and seen by metalookup. A sample is included below:

Key Value
MD52B77430373521F685200EC859664D904
PackageArcharmv7hl
PackageDescriptionExim is a message transfer agent (MTA) developed at the University of Cambridge for use on Unix systems connected to the Internet. It is freely available under the terms of the GNU General Public Licence. In style it is similar to Smail 3, but its facilities are more general. There is a great deal of flexibility in the way mail can be routed, and there are extensive facilities for checking incoming mail. Exim can be installed in place of sendmail, although the configuration of exim is quite different to that of sendmail.
PackageMaintainerFedora Project
PackageNameexim
PackageRelease3.fc33
PackageVersion4.94
SHA-17CAC85AA0AD4F2A7A65AFBC8AEECE6121FEBB6DE
SHA-256E3F9029FA2DBFFB49789354BF389FE089B4C4599C9EFF5B33FB72438CBFF654A
Key Value
MD53800B674C99F8F59CC531E29C13CA3CD
PackageArcharmv7hl
PackageDescriptionExim is a message transfer agent (MTA) developed at the University of Cambridge for use on Unix systems connected to the Internet. It is freely available under the terms of the GNU General Public Licence. In style it is similar to Smail 3, but its facilities are more general. There is a great deal of flexibility in the way mail can be routed, and there are extensive facilities for checking incoming mail. Exim can be installed in place of sendmail, although the configuration of exim is quite different to that of sendmail.
PackageMaintainerFedora Project
PackageNameexim
PackageRelease7.fc34
PackageVersion4.94
SHA-10A257AD02B991960EF34CF89AFE0D623681D4768
SHA-2565CCC182A1E6491347263E5E801E744730786DA3E5187B68982D27F5CA28F9EC0
Key Value
MD5A837B9827DA6B864532256F3F09F1D21
PackageArchppc64le
PackageDescriptionThis package contains a simple example of how to do greylisting in Exim's ACL configuration. It contains a cron job to remove old entries from the greylisting database, and an ACL subroutine which needs to be included from the main exim.conf file. To enable greylisting, install this package and then uncomment the lines in Exim's configuration /etc/exim.conf which enable it. You need to uncomment at least two lines -- the '.include' directive which includes the new ACL subroutine, and the line which invokes the new subroutine. By default, this implementation only greylists mails which appears 'suspicious' in some way. During normal processing of the ACLs we collect a list of 'offended' which it's committed, which may include having SpamAssassin points, lacking a Message-ID: header, coming from a blacklisted host, etc. There are examples of these in the default configuration file, mostly commented out. These should be sufficient for you to you trigger greylisting for whatever 'offences' you can dream of, or even to make greylisting unconditional.
PackageMaintainerFedora Project
PackageNameexim-greylist
PackageRelease1.el8
PackageVersion4.94
SHA-17299F26E35FD00EBAEA1C8169A390893D51048F3
SHA-256A76C6F6A051731F9F06A4BA6EEBC2B825CBFC5C0EF96E56217BC8D178A280D73
Key Value
MD5805C6B8FFFBD1B3F017516834D9CEC9C
PackageArchs390x
PackageDescriptionThis package contains a simple example of how to do greylisting in Exim's ACL configuration. It contains a cron job to remove old entries from the greylisting database, and an ACL subroutine which needs to be included from the main exim.conf file. To enable greylisting, install this package and then uncomment the lines in Exim's configuration /etc/exim.conf which enable it. You need to uncomment at least two lines -- the '.include' directive which includes the new ACL subroutine, and the line which invokes the new subroutine. By default, this implementation only greylists mails which appears 'suspicious' in some way. During normal processing of the ACLs we collect a list of 'offended' which it's committed, which may include having SpamAssassin points, lacking a Message-ID: header, coming from a blacklisted host, etc. There are examples of these in the default configuration file, mostly commented out. These should be sufficient for you to you trigger greylisting for whatever 'offences' you can dream of, or even to make greylisting unconditional.
PackageMaintainerFedora Project
PackageNameexim-greylist
PackageRelease3.el8
PackageVersion4.92.3
SHA-137BDB1FC9DBF6660A5AEB49CFAC5AC678642A92B
SHA-2564A74E71D8824CB855A87F6FDD93F7AFCA39741FE874FDCE3B5964A1F95BFE0AB
Key Value
MD5D306E5967B5EC587D654AD04AA652A4D
PackageArchaarch64
PackageDescriptionThis package contains a simple example of how to do greylisting in Exim's ACL configuration. It contains a cron job to remove old entries from the greylisting database, and an ACL subroutine which needs to be included from the main exim.conf file. To enable greylisting, install this package and then uncomment the lines in Exim's configuration /etc/exim.conf which enable it. You need to uncomment at least two lines -- the '.include' directive which includes the new ACL subroutine, and the line which invokes the new subroutine. By default, this implementation only greylists mails which appears 'suspicious' in some way. During normal processing of the ACLs we collect a list of 'offended' which it's committed, which may include having SpamAssassin points, lacking a Message-ID: header, coming from a blacklisted host, etc. There are examples of these in the default configuration file, mostly commented out. These should be sufficient for you to you trigger greylisting for whatever 'offences' you can dream of, or even to make greylisting unconditional.
PackageMaintainerFedora Project
PackageNameexim-greylist
PackageRelease3.el8
PackageVersion4.92.3
SHA-17496011C1C99367D67F22CE3EC4438D8F6E53969
SHA-2564ADF7F2CD2D00F47D59D8192E9FCFCDE09FD9F75C7DC7625F4D46E0639D52E11
Key Value
MD50832E3844EF2CA639393C8D7142EC343
PackageArcharmv7hl
PackageDescriptionExim is a message transfer agent (MTA) developed at the University of Cambridge for use on Unix systems connected to the Internet. It is freely available under the terms of the GNU General Public Licence. In style it is similar to Smail 3, but its facilities are more general. There is a great deal of flexibility in the way mail can be routed, and there are extensive facilities for checking incoming mail. Exim can be installed in place of sendmail, although the configuration of exim is quite different to that of sendmail.
PackageMaintainerFedora Project
PackageNameexim
PackageRelease4.fc32
PackageVersion4.93
SHA-13063D6A3AE2190559ED9FD668F3C62261EE129AD
SHA-2563BB2CFE9126B05F308FF4878E8AA2926FC5C64432624C6D1DEF281A3B3E77F86
Key Value
MD505FF376EDC3432202BE48CF49A732E24
PackageArchx86_64
PackageDescriptionThis package contains a simple example of how to do greylisting in Exim's ACL configuration. It contains a cron job to remove old entries from the greylisting database, and an ACL subroutine which needs to be included from the main exim.conf file. To enable greylisting, install this package and then uncomment the lines in Exim's configuration /etc/exim.conf which enable it. You need to uncomment at least two lines -- the '.include' directive which includes the new ACL subroutine, and the line which invokes the new subroutine. By default, this implementation only greylists mails which appears 'suspicious' in some way. During normal processing of the ACLs we collect a list of 'offended' which it's committed, which may include having SpamAssassin points, lacking a Message-ID: header, coming from a blacklisted host, etc. There are examples of these in the default configuration file, mostly commented out. These should be sufficient for you to you trigger greylisting for whatever 'offences' you can dream of, or even to make greylisting unconditional.
PackageMaintainerFedora Project
PackageNameexim-greylist
PackageRelease3.el8
PackageVersion4.92.3
SHA-178E13BCA3948BDC62955867C3F9985F5ED3CC44A
SHA-25648A811B8D7DDF95983AD41E4F2C84EA9023853B0849575170B86C2B58C7C9B22
Key Value
MD5FDAE4628708610B80636BCD4E9D6D89D
PackageArchaarch64
PackageDescriptionThis package contains a simple example of how to do greylisting in Exim's ACL configuration. It contains a cron job to remove old entries from the greylisting database, and an ACL subroutine which needs to be included from the main exim.conf file. To enable greylisting, install this package and then uncomment the lines in Exim's configuration /etc/exim.conf which enable it. You need to uncomment at least two lines -- the '.include' directive which includes the new ACL subroutine, and the line which invokes the new subroutine. By default, this implementation only greylists mails which appears 'suspicious' in some way. During normal processing of the ACLs we collect a list of 'offended' which it's committed, which may include having SpamAssassin points, lacking a Message-ID: header, coming from a blacklisted host, etc. There are examples of these in the default configuration file, mostly commented out. These should be sufficient for you to you trigger greylisting for whatever 'offences' you can dream of, or even to make greylisting unconditional.
PackageMaintainerFedora Project
PackageNameexim-greylist
PackageRelease1.el8
PackageVersion4.94
SHA-1AB4FE70BCDF4415E1D9CA60B0BBB910DDD6DFEC1
SHA-256932372C31F6D638C7B4A639FD92AE6582AC4A0DC66016F45725519AC021B426C
Key Value
MD52594A975694458BEC854A92BA65F9F11
PackageArchx86_64
PackageDescriptionThis package contains a simple example of how to do greylisting in Exim's ACL configuration. It contains a cron job to remove old entries from the greylisting database, and an ACL subroutine which needs to be included from the main exim.conf file. To enable greylisting, install this package and then uncomment the lines in Exim's configuration /etc/exim.conf which enable it. You need to uncomment at least two lines -- the '.include' directive which includes the new ACL subroutine, and the line which invokes the new subroutine. By default, this implementation only greylists mails which appears 'suspicious' in some way. During normal processing of the ACLs we collect a list of 'offended' which it's committed, which may include having SpamAssassin points, lacking a Message-ID: header, coming from a blacklisted host, etc. There are examples of these in the default configuration file, mostly commented out. These should be sufficient for you to you trigger greylisting for whatever 'offences' you can dream of, or even to make greylisting unconditional.
PackageMaintainerFedora Project
PackageNameexim-greylist
PackageRelease2.el8
PackageVersion4.94.2
SHA-1E004EE49E7EAFEC069922337E62E25CE134243F7
SHA-256DF3B898D518472014ABBE194F17CE128B982F1AA6686079D078C51A5C05393E2
Key Value
MD5EF67310C5C355694D3E70AAA0EFFCD58
PackageArchx86_64
PackageDescriptionThis package contains a simple example of how to do greylisting in Exim's ACL configuration. It contains a cron job to remove old entries from the greylisting database, and an ACL subroutine which needs to be included from the main exim.conf file. To enable greylisting, install this package and then uncomment the lines in Exim's configuration /etc/exim.conf which enable it. You need to uncomment at least two lines -- the '.include' directive which includes the new ACL subroutine, and the line which invokes the new subroutine. By default, this implementation only greylists mails which appears 'suspicious' in some way. During normal processing of the ACLs we collect a list of 'offended' which it's committed, which may include having SpamAssassin points, lacking a Message-ID: header, coming from a blacklisted host, etc. There are examples of these in the default configuration file, mostly commented out. These should be sufficient for you to you trigger greylisting for whatever 'offences' you can dream of, or even to make greylisting unconditional.
PackageMaintainerFedora Project
PackageNameexim-greylist
PackageRelease1.el8
PackageVersion4.94
SHA-192713917E15DAE2494CB761BA881D323F766029B
SHA-256374472353D6071472E5A4A240927B2FF905972464E0890E90AA0F74CA1522F47
Key Value
MD58D46B1EA6771696D1035582A6753CC4A
PackageArchaarch64
PackageDescriptionExim is a message transfer agent (MTA) developed at the University of Cambridge for use on Unix systems connected to the Internet. It is freely available under the terms of the GNU General Public Licence. In style it is similar to Smail 3, but its facilities are more general. There is a great deal of flexibility in the way mail can be routed, and there are extensive facilities for checking incoming mail. Exim can be installed in place of sendmail, although the configuration of exim is quite different to that of sendmail.
PackageMaintainerFedora Project
PackageNameexim
PackageRelease1.el8
PackageVersion4.94
SHA-10A591445B95A8051EBE1FA3AB3A89391CD42C6E2
SHA-2564C18B6F0489513A0E1AEEA3CFD05280E374A503484965023EA95019305445876
Key Value
MD51FA83DDF472C7697411423878324B826
PackageArchs390x
PackageDescriptionThis package contains a simple example of how to do greylisting in Exim's ACL configuration. It contains a cron job to remove old entries from the greylisting database, and an ACL subroutine which needs to be included from the main exim.conf file. To enable greylisting, install this package and then uncomment the lines in Exim's configuration /etc/exim.conf which enable it. You need to uncomment at least two lines -- the '.include' directive which includes the new ACL subroutine, and the line which invokes the new subroutine. By default, this implementation only greylists mails which appears 'suspicious' in some way. During normal processing of the ACLs we collect a list of 'offended' which it's committed, which may include having SpamAssassin points, lacking a Message-ID: header, coming from a blacklisted host, etc. There are examples of these in the default configuration file, mostly commented out. These should be sufficient for you to you trigger greylisting for whatever 'offences' you can dream of, or even to make greylisting unconditional.
PackageMaintainerFedora Project
PackageNameexim-greylist
PackageRelease2.el8
PackageVersion4.94.2
SHA-157898E09B3F8B462F445BFC498031C548EE1B87D
SHA-2562C76DA8B17515A1398F3E59329D32CF3D26EF3792FEC65682118C1027FBC3AA7
Key Value
MD5BD968A25DECA51C2E36F18E06BF7505F
PackageArchs390x
PackageDescriptionThis package contains a simple example of how to do greylisting in Exim's ACL configuration. It contains a cron job to remove old entries from the greylisting database, and an ACL subroutine which needs to be included from the main exim.conf file. To enable greylisting, install this package and then uncomment the lines in Exim's configuration /etc/exim.conf which enable it. You need to uncomment at least two lines -- the '.include' directive which includes the new ACL subroutine, and the line which invokes the new subroutine. By default, this implementation only greylists mails which appears 'suspicious' in some way. During normal processing of the ACLs we collect a list of 'offended' which it's committed, which may include having SpamAssassin points, lacking a Message-ID: header, coming from a blacklisted host, etc. There are examples of these in the default configuration file, mostly commented out. These should be sufficient for you to you trigger greylisting for whatever 'offences' you can dream of, or even to make greylisting unconditional.
PackageMaintainerFedora Project
PackageNameexim-greylist
PackageRelease1.el8
PackageVersion4.94
SHA-19F2F6352BA6075A881DB77A166EA7FAB543FD9EB
SHA-256C627A6E3DE495B1509F75F6E8D32842645F9B9191070A2D600B175B075C70275
Key Value
MD5F1956656FC8E112F9F5379C155CF8C0D
PackageArchppc64le
PackageDescriptionThis package contains a simple example of how to do greylisting in Exim's ACL configuration. It contains a cron job to remove old entries from the greylisting database, and an ACL subroutine which needs to be included from the main exim.conf file. To enable greylisting, install this package and then uncomment the lines in Exim's configuration /etc/exim.conf which enable it. You need to uncomment at least two lines -- the '.include' directive which includes the new ACL subroutine, and the line which invokes the new subroutine. By default, this implementation only greylists mails which appears 'suspicious' in some way. During normal processing of the ACLs we collect a list of 'offended' which it's committed, which may include having SpamAssassin points, lacking a Message-ID: header, coming from a blacklisted host, etc. There are examples of these in the default configuration file, mostly commented out. These should be sufficient for you to you trigger greylisting for whatever 'offences' you can dream of, or even to make greylisting unconditional.
PackageMaintainerFedora Project
PackageNameexim-greylist
PackageRelease3.el8
PackageVersion4.92.3
SHA-16777E6AF7E64A2B2F1FF2603BDB7889DEB128355
SHA-2563713A3E237E4B3726FE58BAF72783B46E5675A7A9BB81844230DAD26CB50663C
Key Value
MD5A3255B7138DD234CFD1E37FFF2A965A6
PackageArchaarch64
PackageDescriptionExim is a message transfer agent (MTA) developed at the University of Cambridge for use on Unix systems connected to the Internet. It is freely available under the terms of the GNU General Public Licence. In style it is similar to Smail 3, but its facilities are more general. There is a great deal of flexibility in the way mail can be routed, and there are extensive facilities for checking incoming mail. Exim can be installed in place of sendmail, although the configuration of exim is quite different to that of sendmail.
PackageMaintainerFedora Project
PackageNameexim
PackageRelease3.el8
PackageVersion4.92.3
SHA-17D0600EC34ABF31017AB9AA095AFAF9667FDBCB8
SHA-256065FE7065D524CD86B1E6951EC79FEE287832AFA100CAA5C6CEAE83D28653241