php IHDR w Q )Ba pHYs sRGB gAMA a IDATxMk\U s&uo,mD )Xw+e?tw.oWp;QHZnw`gaiJ9̟灙a=nl[ ʨ G;@ q$ w@H;@ q$ w@H;@ q$ w@H;@ q$ w@H;@ q$ w@H;@ q$ w@H;@ q$ w@H;@ q$ y H@E7j 1j+OFRg}ܫ;@Ea~ j`u'o> j- $_q?qS XzG'ay
files >> /usr/lib/mailman/Mailman/Bouncers/ |
files >> //usr/lib/mailman/Mailman/Bouncers/SMTP32.pyc |
Pc @ s\ d Z d d k Z d d k Z e i d e i Z e i d e i e i B Z d Z d S( s Something which claims X-Mailer: <SMTP32 vXXXXXX> What the heck is this thing? Here's a recent host: % telnet 207.51.255.218 smtp Trying 207.51.255.218... Connected to 207.51.255.218. Escape character is '^]'. 220 X1 NT-ESMTP Server 208.24.118.205 (IMail 6.00 45595-15) iNs original message followss ( # several different prefixes user\ mailbox[^:]*: # have been spotted in the |delivery\ failed[^:]*: # wild... |unknown\ user[^:]*: |undeliverable\ +to |delivery\ userid[^:]*: ) \s* # space separator (?P<addr>[^\s]*) # and finally, the address c C s | i d d } | i d p d Sh } x\ t i i | D]H } t i | o Pn t i | } | o d | | i d <q@ q@ W| i S( Ns x-mailert s <SMTP32 vi t addr( t gett startswitht emailt Iteratorst body_line_iteratort ecret searcht acret groupt keys( t msgt mailert addrst linet mo( ( s` /builddir/build/BUILDROOT/mailman-2.1.12-18.el6.i386//usr/lib/mailman/Mailman/Bouncers/SMTP32.pyt process1 s ( t __doc__t reR t compilet IGNORECASER t VERBOSER R ( ( ( s` /builddir/build/BUILDROOT/mailman-2.1.12-18.el6.i386//usr/lib/mailman/Mailman/Bouncers/SMTP32.pyt <module> sy~or5J={Eeu磝Qk ᯘG{?+]ן?wM3X^歌>{7پK>on\jy Rg/=fOroNVv~Y+ NGuÝHWyw[eQʨSb> >}Gmx[o[<{Ϯ_qFvM IENDB`