Work at SourceForge, help us to make it a better place! We have an immediate need for a Support Technician in our San Francisco or Denver office.
I was suggested to incorporate commit  in the Debian dspam package.
However, I was rightfully asked wether this is overflow-safe since strcpy is
used. I suppose one of the _getline function is used to ensure CTX->username
always ends with a '\0' and contains at max 1024 bytes but what about size of
ATX->recipient >= strlen(CTX->username) + 1 ?