qmail Digest 15 Nov 2000 11:00:00 -0000 Issue 1184

Topics (messages 52138 through 52229):

Re: MX routing question
        52138 by: Paul Farber

HELP!
        52139 by: Casey Allen Shobe

Fresh Installation
        52140 by: Mark Anderson
        52141 by: James Raftery

reg. qmail-qmqpd and qmail-qmtpd
        52142 by: RamKumar
        52150 by: Dave Sill

Startup Script
        52143 by: Travis Turner
        52145 by: Charles Cazabon
        52179 by: Roger Walker
        52194 by: Greg Cope

how best to log rblsmtpd?
        52144 by: brandon.discontent.com

hello
        52146 by: Alexander Mardirossian
        52149 by: Dave Sill

Removing Delivered-To header
        52147 by: Peter Cavender

accessing $local in fastforward alias file
        52148 by: Tristan Graham
        52155 by: Charles Cazabon
        52159 by: Tristan Graham

Re: Antispam with authorization from POP3 server.
        52151 by: Dave Sill

Re: How do I route to another host?
        52152 by: Dave Sill
        52154 by: mark.sidell.org

Re: Clear the queue of qmail
        52153 by: Dave Sill

secrets and lies
        52156 by: Mate Wierdl
        52158 by: Dave Sill
        52160 by: Adam McKenna
        52161 by: anon-dns.sitefoundry.com
        52162 by: Charles Cazabon
        52163 by: Ryan Russell
        52164 by: markd.bushwire.net
        52165 by: Bennett Todd
        52166 by: Mate Wierdl
        52167 by: Ian Lance Taylor
        52168 by: markd.bushwire.net
        52169 by: Mate Wierdl
        52170 by: Paul Jarc
        52171 by: Adam McKenna
        52172 by: Matthias Andree
        52173 by: Chris K. Young
        52174 by: Mate Wierdl
        52175 by: Gustavo Vieira Goncalves Coelho Rios
        52176 by: Paul Jarc
        52177 by: Mate Wierdl
        52178 by: Bennett Todd
        52180 by: Paul Jarc
        52181 by: Lipscomb, Al
        52182 by: Robin S. Socha
        52183 by: Bennett Todd
        52184 by: Bennett Todd
        52185 by: Russ Allbery
        52186 by: Russ Allbery
        52187 by: Adam McKenna
        52188 by: Travis Turner
        52189 by: Travis Turner
        52190 by: Adam McKenna
        52191 by: Bennett Todd
        52192 by: Lipscomb, Al
        52193 by: Felix von Leitner
        52195 by: Mate Wierdl
        52196 by: Ryan Russell
        52197 by: Felix von Leitner
        52198 by: Adam McKenna
        52199 by: markd.bushwire.net
        52200 by: markd.bushwire.net
        52201 by: Felix von Leitner
        52202 by: dreamwvr
        52203 by: David Dyer-Bennet
        52204 by: Bennett Todd
        52205 by: Andre Oppermann
        52207 by: Adam McKenna
        52208 by: Bennett Todd
        52210 by: Chris K. Young
        52211 by: Russ Allbery
        52212 by: markd.bushwire.net
        52213 by: Adam McKenna
        52214 by: Ryan Russell
        52217 by: Mate Wierdl
        52218 by: Mate Wierdl
        52219 by: Nathan J. Mehl
        52220 by: David Dyer-Bennet
        52221 by: Chris Olson
        52224 by: Mate Wierdl
        52225 by: Chris K. Young
        52227 by: Adam McKenna

Personalising emails to lists and prohibited subjects in ezmlm-idx/qmail
        52157 by: Darren Honeyball
        52209 by: Darren Honeyball

Alias - .qmail-default
        52206 by: Expert

User mail delivery statistics
        52215 by: Mikko Hänninen

accepting and delivering locally for a different IP ...
        52216 by: wolfgang zeikat

Help Required .....
        52222 by: RamKumar
        52223 by: Charles Warwick

DFSG and DJB (was Re: secrets and lies)
        52226 by: Greg Hudson

running daemontools on qmail with large locals and rcpthosts files
        52228 by: Eric Yu

Qmailanalog ...
        52229 by: Daniel POGAC

Administrivia:

To unsubscribe from the digest, e-mail:
        [EMAIL PROTECTED]

To subscribe to the digest, e-mail:
        [EMAIL PROTECTED]

To bug my human owner, e-mail:
        [EMAIL PROTECTED]

To post to the list, e-mail:
        [EMAIL PROTECTED]


----------------------------------------------------------------------


take the non-local domains out of the locals file.

Paul Farber
Farber Technology
[EMAIL PROTECTED]
Ph  570-628-5303
Fax 570-628-5545

On Mon, 13 Nov 2000, Oliver Menzel wrote:

> Hi,
> 
> I'm trying to make all mail incoming for a bunch of hosts to be
> delivered to this one mail host.
> 
> So i've setup an MX record for each one of those domains to be that
> mail host.  
> 
> Problem is, the mail is always delivered for that host, ie: if I send
> mail to [EMAIL PROTECTED], and the MX is mx.host.com, the mail will be
> delivered to host.com, regardless of the MX entry.
> 
> Is this a DNS problem, or the way qmail delivers mail?
> 
> Thanks in advance,
> Oliver
> 
> __________________________________________________
> Do You Yahoo!?
> Yahoo! Calendar - Get organized for the holidays!
> http://calendar.yahoo.com/
> 






Hi, I cannot unsubscribe an old email address which I no longer use but 
forwards to this one.

I'd like to subscribe using the proper account, but don't want duplicates...

-- 
Casey Allen Shobe
[EMAIL PROTECTED]
http://aixos.net

**Using AixOS.net Webmail Interface**





I just moved from Sendmail to Qmail and I'm having problems with it.
Mails from a mail client seem to go through without any problems but
when I manually send a mail through a telnet connection to port 25 I
get the following error after I send the EOF during the message section;

451 unable to exec qq (#4.3.0)

I toke the brave step to find the error in the source code. It was returned
from a switch/case clause in qmail.c I believe.

Any help... please...

Mark Anderson





On Tue, Nov 14, 2000 at 02:54:00PM -0000, Mark Anderson wrote:
> 451 unable to exec qq (#4.3.0)

To place a message in to the queue qmail needs to run
/var/qmail/bin/qmail-queue

The error you're seeing is often caused by having /var mounted with the
nosuid option (qmail-queue is setuid).

james




Hi
i would like to know what qmail-qmqpd and qmail-qmtpd are used for? and
where i could get more information about the same.

thanks
ram






"RamKumar" <[EMAIL PROTECTED]> wrote:

>i would like to know what qmail-qmqpd and qmail-qmtpd are used for? and
>where i could get more information about the same.

QMQP is the Quick Mail Queueing Protocol.
QMTP is the Quick Mail Transfer Protocol.

QMQP is used by clients of smart hosts to pawn off delivery to the
smart host.

QMTP is a high speed SMTP replacement. The only client I'm aware of is 
maildirqmtp from serialmail.

More information on both of the daemons is in their man pages.

-Dave




Does any one Have a good startup script for qmail on RH 6.2 Linux.  The one 
that came with the "Running Qmail" book has some sort of error in it.  It 
basically gives me an error on startup that says line 14 error somewhere 
around stop).  I would appreciate the help

Regards,
Travis
Travis Turner
Information Technology Manager
Applied Integration Corporation
Tucson, Arizona  U.S.A.
Phone (520) 743-3095
Fax (520) 623-1683

"Do not meddle in the affairs of dragons for you are crunchy
and taste good with ketchup."







Travis Turner <[EMAIL PROTECTED]> wrote:
> Does any one Have a good startup script for qmail on RH 6.2 Linux.  The one 
> that came with the "Running Qmail" book has some sort of error in it.

The quality of that book has been questioned on this list and elsewhere.

Try "Life with qmail" by Dave Sill.  You can find a pointer to it on
www.qmail.org under User-contributed Documentation IIRC.  It contains a
flexible startup script.

Charles
-- 
-----------------------------------------------------------------------
Charles Cazabon                            <[EMAIL PROTECTED]>
GPL'ed software available at:  http://www.qcc.sk.ca/~charlesc/software/
Any opinions expressed are just that -- my opinions.
-----------------------------------------------------------------------




On Tue, 14 Nov 2000, Travis Turner wrote:

> Does any one Have a good startup script for qmail on RH 6.2 Linux.  The one 
> that came with the "Running Qmail" book has some sort of error in it.  It 
> basically gives me an error on startup that says line 14 error somewhere 
> around stop).  I would appreciate the help

            csh -cf '/var/qmail/rc &'

        I think that's the line you are looking for to get it started
within the script. The 'rc' script is the real startup script, and is a
copy of one of several in the /var/qmail/boot/ directory, depending on
whether or not you want to use procmail, etc. Using 'daemon' to start the
script fails - possibly because the 'rc' script dies after it executes.

-- 
Roger Walker                         <http://www.rat-hole.com>
Voice/Fax 1-780-440-2685             <http://www.man-from-linux.com>
"HIS Pain; YOUR Gain"                <http://www.rope.net>
<http://www.rope.net/signature.html>





Travis Turner wrote:
> 
> Does any one Have a good startup script for qmail on RH 6.2 Linux.  The one
> that came with the "Running Qmail" book has some sort of error in it.  It
> basically gives me an error on startup that says line 14 error somewhere
> around stop).  I would appreciate the help

mine works fine - what is the exact error ?

Greg


> 
> Regards,
> Travis
> Travis Turner
> Information Technology Manager
> Applied Integration Corporation
> Tucson, Arizona  U.S.A.
> Phone (520) 743-3095
> Fax (520) 623-1683
> 
> "Do not meddle in the affairs of dragons for you are crunchy
> and taste good with ketchup."







Gang -

I've just reimplemented rblsmtpd and have received requests to log seperately
the hosts which are beign denied. A cursory scan of the log shows that I
should be able to parse the log based on the 451 errors, but I am an unskilled
scripter and cannot figure out how to further manipulate multilog to log
the 451's seperately.

I thought I might be able to use qmailanalog to help, but I can't figure out
how to get the desired output, even after straining through the list
archives.

Anyone out there have any suggestions? I have RATFMICF, but no luck.
Also, although I can find several threads in the archives on how tai64nfrac
helps multilogs work with qmailanalog, I can't get it to work myself.
Any suggestions there?

Thanks,
Brandon Dudley




how do I erase the contents of the mailqueue! I put large mails by
mistake for sending. Since I'm paying my traffic, i would like to
erase all that is in the queue. How do i do that?

Thank you!




[EMAIL PROTECTED] wrote:

>how do I erase the contents of the mailqueue! I put large mails by
>mistake for sending. Since I'm paying my traffic, i would like to
>erase all that is in the queue. How do i do that?

See:

  http://www.faqts.com/knowledge-base/view.phtml/aid/6567/fid/286/lang/en

-Dave




Hi-

I have a qmail server hosting several virtual domains, and all mail 
delivered to recipients in the virtual domains have a Delivered-To 
header line indicating the "main" domain name of the server.

I want to delete this line, and I understand that the -d option to 
preline is the way to do this, but *where* do do do this?

TIA

--Pete




Hi,

I need to implement forwarding of the form user@somedomain -> 
user@someotherdomain. i.e. the original user at the original domain is 
propagated to the forwarded domain. Are there any mystical variables that 
can be used within the alias file ?

If anyone can help I would be most grateful,

Tristan Graham,
Inweb.





Tristan Graham <[EMAIL PROTECTED]> wrote:
> 
> I need to implement forwarding of the form user@somedomain -> 
> user@someotherdomain. i.e. the original user at the original domain is 
> propagated to the forwarded domain. Are there any mystical variables that 
> can be used within the alias file ?

The variables cannot be used within a .qmail file; however, you can use
them in a shell script which is called by a .qmail file.  Use a command
delivery in the .qmail file (like '|scriptname').  In the script, do
something like:

#!/bin/sh

qmail-inject -f"$SENDER" "$LOCAL@otherdomain"

Charles
-- 
-----------------------------------------------------------------------
Charles Cazabon                            <[EMAIL PROTECTED]>
GPL'ed software available at:  http://www.qcc.sk.ca/~charlesc/software/
Any opinions expressed are just that -- my opinions.
-----------------------------------------------------------------------




Ok,

I was a little reserved about calling another script due to performance 
issues, but if that is the only way then that will suffice...

Many Thanks,

Tristan Graham.


At 13:01 14/11/2000 -0600, Charles Cazabon wrote:
>Tristan Graham <[EMAIL PROTECTED]> wrote:
> >
> > I need to implement forwarding of the form user@somedomain ->
> > user@someotherdomain. i.e. the original user at the original domain is
> > propagated to the forwarded domain. Are there any mystical variables that
> > can be used within the alias file ?
>
>The variables cannot be used within a .qmail file; however, you can use
>them in a shell script which is called by a .qmail file.  Use a command
>delivery in the .qmail file (like '|scriptname').  In the script, do
>something like:
>
>#!/bin/sh
>
>qmail-inject -f"$SENDER" "$LOCAL@otherdomain"
>
>Charles
>--
>-----------------------------------------------------------------------
>Charles Cazabon                            <[EMAIL PROTECTED]>
>GPL'ed software available at:  http://www.qcc.sk.ca/~charlesc/software/
>Any opinions expressed are just that -- my opinions.
>-----------------------------------------------------------------------





"Michael A. Borisov" <[EMAIL PROTECTED]> wrote:

>Hello. It is necessary to me to authorize everyone, who tries to send mail
>through my SMTP server. I want to use for this purpose authorization of a
>POP3 server.

Sounds like you want SMTP-after-POP. I.e., users who successfully
authenticate via POP are allowed to relay via SMTP for some short
period of time. Look for "open-smtp" on www.qmail.org.

>I want that authorization was requested for the user, which is
>specified in a field 'from:' of the head of the sent message. How it is
>possible to solve this problem?

Now you're saying you want to allow relaying based on the From header
field? That's a very bad idea because some spammers (and realy
checkers) are aware of this method and forge their headers to take
advantage of it.

-Dave




[EMAIL PROTECTED] wrote:

>My qmail host, mail.sidell.org, is the MX host for domain sidell.org.
>I have another host named lyris.sidell.org.  (Actually, it's another
>IP address on the same host, being handled by Lyris.)
>
>If I SMTP to mail.sidell.org and send a message addressed to
>[EMAIL PROTECTED], qmail replies with the bounce:
>
>Sorry. Although I'm listed as a best-preference MX or A for that host,
>it isn't in my control/locals file, so I don't treat it as local.
>(#5.4.6)

What does qmail-showctl for mail.sidell.org say?

Do you have a separate smtp daemon for lyris.sidell.org?

-Dave




On Tue, 14 Nov 2000 13:27:10 -0500, Dave Sill wrote:

> [EMAIL PROTECTED] wrote:
> 
> >My qmail host, mail.sidell.org, is the MX host for domain sidell.org.
> >I have another host named lyris.sidell.org.  (Actually, it's another
> >IP address on the same host, being handled by Lyris.)
> >
> >If I SMTP to mail.sidell.org and send a message addressed to
> >[EMAIL PROTECTED], qmail replies with the bounce:
> >
> >Sorry. Although I'm listed as a best-preference MX or A for that host,
> >it isn't in my control/locals file, so I don't treat it as local.
> >(#5.4.6)
> 
> What does qmail-showctl for mail.sidell.org say?
> 
> Do you have a separate smtp daemon for lyris.sidell.org?

I think I figured out the problem.  I'm running the lyris listserv on
the same system as qmail.  I have the qmail smtp daemon listening on
one IP address, and the lyris daemon listening on another.

Apparently, qmail-remote complains if it looks up a destination host
address and discovers that it is one of the IPs assigned to the host
on which qmail-remote is running.  The workaround is to add an entry
to smtproutes that maps the host name to an IP address.

-- 
Mark




"Pedro Pires" <[EMAIL PROTECTED]> wrote:

>Can anyone tell me how do i clear the queue of qmail?

See:

  http://www.faqts.com/knowledge-base/view.phtml/aid/6567/fid/286/lang/en

-Dave




I am reading this book by B. Schneier, in particular, the section
`Cracking and hacking contests'.  He thinks that contests (like
offering $1000 for finding a security hole in a product) are bad for
four main reasons, the first reason being that the contests are
usually unfair since the author of the software decides what he/she
considers a "hole".

He also thinks that even having a software out and used for a few
years without incidence does not imply that it is secure.  He says,
the best way to evaluate the security of a product is to have it
audited by security experts.

So has any expert ever audited qmail or djbdns?

Mate




Mate Wierdl <[EMAIL PROTECTED]> wrote:

>I am reading this book by B. Schneier, in particular, the section
>`Cracking and hacking contests'.  He thinks that contests (like
>offering $1000 for finding a security hole in a product) are bad for
>four main reasons, the first reason being that the contests are
>usually unfair since the author of the software decides what he/she
>considers a "hole".

He's right, of course. However, the qmail challenge I ran was not
judged by Dan, and, although I'd have been pleased to pay out the
$1000 because it would have closed a major security hole, the primary
purpose was promoting qmail, which I think it did pretty effectively.

>He also thinks that even having a software out and used for a few
>years without incidence does not imply that it is secure.  He says,
>the best way to evaluate the security of a product is to have it
>audited by security experts.

Again, he's right. Of course, he'd be happy to sell you such an
audit. :-)

>So has any expert ever audited qmail or djbdns?

No. Any audit worth doing would be prohibitively expensive for a
freeware project. $1000 wouldn't even begin to cover it, at least for
qmail.

-Dave




On Tue, Nov 14, 2000 at 02:39:25PM -0500, Dave Sill wrote:
> >So has any expert ever audited qmail or djbdns?
> 
> No. Any audit worth doing would be prohibitively expensive for a
> freeware project. $1000 wouldn't even begin to cover it, at least for
> qmail.

Not to mention that the whole point of freeware and open source software in
general is to give everyone the ability to audit the software, not just a
select few.  It sounds like the author of this book is a M$-type weenie.

--Adam

-- 
Adam McKenna <[EMAIL PROTECTED]> | "No matter how much it changes, 
http://flounder.net/publickey.html   |  technology's just a bunch of wires 
GPG: 17A4 11F7 5E7E C2E7 08AA        |  connected to a bunch of other wires."
     38B0 05D0 8BF7 2C6D 110A        |  Joe Rogan, _NewsRadio_
  2:48pm  up 157 days, 13:04, 10 users,  load average: 0.03, 0.03, 0.00




At 11:49 AM -0800 on 11/14/00, Adam McKenna wrote:


> It sounds like the author of this book is a M$-type weenie.

No, I think not. He regularly publishes articles about weak 
encryption in Microsoft products. His perspective is just
different than yours.

See http://www.counterpane.com (especially the CRYPTO-GRAM
newsletter past issues) for more info.

--
matt.






re: Schneier's commentary in Secrets and Lies

Mate Wierdl <[EMAIL PROTECTED]> wrote:
> 
> He says, the best way to evaluate the security of a product is to have it
> audited by security experts.
> So has any expert ever audited qmail or djbdns?

As Dave Sill pointed out, no formal security audit has been conducted by
an independent party.

However, as far as qmail goes:  all the crackers in the world have had access
to the qmail source code and design documentation for years, and none have
yet found an exploitable security hole.  You could consider that a fairly
thorough audit-by-fire.

Charles 
-- 
-----------------------------------------------------------------------
Charles Cazabon                              <[EMAIL PROTECTED]>
GPL'ed software available at:  http://www.qcc.sk.ca/~charlesc/software/
Any opinions expressed are just that -- my opinions.
-----------------------------------------------------------------------




On Tue, 14 Nov 2000, Adam McKenna wrote:

> Not to mention that the whole point of freeware and open source software in
> general is to give everyone the ability to audit the software, not just a
> select few.  It sounds like the author of this book is a M$-type weenie.
> 

Who, Bruce?  Bwahaha...  no.  Suggest you do some reading of Bruce's works
before you continue down that train of thought.  The Crypto-gram is a good
start:

http://www.counterpane.com/crypto-gram.html

                                                Ryan





On Tue, Nov 14, 2000 at 01:20:32PM -0600, Mate Wierdl wrote:
> I am reading this book by B. Schneier, in particular, the section
> `Cracking and hacking contests'.  He thinks that contests (like
> offering $1000 for finding a security hole in a product) are bad for
> four main reasons, the first reason being that the contests are
> usually unfair since the author of the software decides what he/she
> considers a "hole".
> 
> He also thinks that even having a software out and used for a few
> years without incidence does not imply that it is secure.  He says,
> the best way to evaluate the security of a product is to have it
> audited by security experts.

Does he mean by a company such as the one he runs (that sells security
audit services - surprise surprise) or does he mean a non-commercial audit
such as that done by the OpenBSD folk or the informal one of a "thousand
eyes" of the open source community?

It's all about increasing confidence levels. Whilst an audit is a good idea,
I don't see how a competition and time in the field can actual make matters
worse. Certainly no worse than relying on an audit and happening to select an
incompeted expert (of which there are plenty specializing in security
at the moment - one recently expressed surprise to me that qmail was running
an x86 Solaris as "that was usually installed on Sparcs").

But to answer your question, I've not seen mention of a formal audit
of qmail by certified security experts (or by self-appointed script kiddies
for that matter).

However, it would be very interesting to see such an audit. Mr Schneier could
convince a lot of sceptics if he conducted an eye-opening audit on qmail.


Regards.




> > >So has any expert ever audited qmail or djbdns?
> > 
> > No. Any audit worth doing would be prohibitively expensive for a
> > freeware project. $1000 wouldn't even begin to cover it, at
> > least for qmail.

Whoa, sure, it'd cost a load if you paid someone to do it, but open
source has other routes. A team can be formed. I betcha if someone
could get a dozen or so volunteers who were serious programmers who
were willing to invest serious time on the project, that they could
approach the folks at OpenBSD, who have been doing a perpetual
on-going security audit with _great_ results for some years now, and
get a lot of assistence and instruction in exchange for some good
press.

> Not to mention that the whole point of freeware and open source
> software in general is to give everyone the ability to audit the
> software, not just a select few.

So if we want to try and pursue an audit it might be more harmonious
with our whole approach if we did so using a volunteer effort
coordinated over the internet and open to anybody with the necessary
resources to donate.

> It sounds like the author of this book is a M$-type weenie.

I'm afraid that doesn't follow at all. Bruce Schneier has some very
strong opinions, and his long-standing dislike of these "challenges"
is very well defended in its setting. Bruce is also a vocal
proponent of open source in security-critical settings, and a really
vicious critic of Microsoft.

The view that you dispute (that the only way to get a good security
audit is to pay a bazillion dollars to a company for a commercial
one) isn't a view that I'd expect Bruce to advocate, and in fact
really hasn't been expressly advocated by anyone here, it's more of
an implication that you sorta tripped over. Neither Bruce nor dsill
are what you'd call Microsoft drones:-).

-Bennett

PGP signature





On Tue, Nov 14, 2000 at 02:39:25PM -0500, Dave Sill wrote:
> >So has any expert ever audited qmail or djbdns?
> 
> No. Any audit worth doing would be prohibitively expensive for a
> freeware project. $1000 wouldn't even begin to cover it, at least for
> qmail.

I need to add that Schneier thinks open source is the only way for
secure software.  Are not there many experts/half experts regularly
auditing the Linux kernel?  It is weird that no one has ever audited
qmail or djbdns, while many big businesses are using them...

Mate




   Date: Tue, 14 Nov 2000 14:49:34 -0500
   From: Adam McKenna <[EMAIL PROTECTED]>

   Not to mention that the whole point of freeware and open source software in
   general is to give everyone the ability to audit the software, not just a
   select few.  It sounds like the author of this book is a M$-type weenie.

Bruce Schneier is a very long way from being an ``M$-type weenie.''
He's a pretty serious security dude.  See, e.g.,
    http://www.counterpane.com/crypto-gram.html.

Ian




> Not to mention that the whole point of freeware and open source software in
> general is to give everyone the ability to audit the software, not just a
> select few.  It sounds like the author of this book is a M$-type weenie.

I don't think so. He's the author of perhaps the most popular book on computer
security that's available to the public. He's generally well regarded - though
having sendmail 8.8.8 on the secondary MX of his domain doesn't make you feel
super confident :>


Regards.




On Tue, Nov 14, 2000 at 02:49:34PM -0500, Adam McKenna wrote:
> Not to mention that the whole point of freeware and open source software in
> general is to give everyone the ability to audit the software, not just a
> select few.  It sounds like the author of this book is a M$-type weenie.

I cannot agree on this one.  He always gives arguments/examples when
he states something.  And he does contribute to open source: he
created Blowfish, for example.  Many of you would enjoy his
remarks/examples on Microsoft's "security" policies.

Mate




Adam McKenna <[EMAIL PROTECTED]> writes:
> On Tue, Nov 14, 2000 at 02:39:25PM -0500, Dave Sill wrote:
> > >So has any expert ever audited qmail or djbdns?
> > 
> > No. Any audit worth doing would be prohibitively expensive for a
> > freeware project. $1000 wouldn't even begin to cover it, at least for
> > qmail.
> 
> Not to mention that the whole point of freeware and open source software in
> general is to give everyone the ability to audit the software, not just a
> select few.

Dan's software isn't open source.  I imagine he might value peer
review, but I'm not aware of his having stated so - certainly not in
regard to motivation for his distribution terms.  Also, making source
available does not give everyone the ability to audit the software.
It gives them permission.  But most people won't be any better able to
do a quality audit for having the source.  Only the "select few" will
be able to audit it well, regardless of the license, and they can
afford to charge a hefty fee, regardless of the license.


paul




On Tue, Nov 14, 2000 at 12:02:40PM -0800, Ryan Russell wrote:
> On Tue, 14 Nov 2000, Adam McKenna wrote:
> 
> > Not to mention that the whole point of freeware and open source software in
> > general is to give everyone the ability to audit the software, not just a
> > select few.  It sounds like the author of this book is a M$-type weenie.
> > 
> 
> Who, Bruce?  Bwahaha...  no.  Suggest you do some reading of Bruce's works
> before you continue down that train of thought.  The Crypto-gram is a good
> start:
> 
> http://www.counterpane.com/crypto-gram.html

OK, I stand corrected.  But you have to realize that this is the same
argument put forward by many people pushing closed source solutions over open
source ones (that it has been analyzed by "experts"), and invariably many
security holes are found anyway.  Cases in point, most major closed-source
firewall software, MS's shoddy PPTP implementation, etc.

--Adam

-- 
Adam McKenna <[EMAIL PROTECTED]> | "No matter how much it changes, 
http://flounder.net/publickey.html   |  technology's just a bunch of wires 
GPG: 17A4 11F7 5E7E C2E7 08AA        |  connected to a bunch of other wires."
     38B0 05D0 8BF7 2C6D 110A        |  Joe Rogan, _NewsRadio_
  3:09pm  up 157 days, 13:25, 10 users,  load average: 0.06, 0.04, 0.00




Adam McKenna <[EMAIL PROTECTED]> writes:

> Not to mention that the whole point of freeware and open source software in
> general is to give everyone the ability to audit the software, not just a
> select few.  It sounds like the author of this book is a M$-type weenie.

Do you know Bruce Schneier? Have you read anything that he wrote except
these summaries out of context?

If not so, please refrain from personal judgement about people that
cannot even hear these claims and thus cannot defend themselves.

Mr. Schneier is respected for his expertise and cryptography, and just
because he states that head money for bugs is no good, does not make him
an M S type weenie.

These are DJBDNS and QMail mailing lists, not meant for personal ranting
against somebody you don't know, and if you know that person, you better
discuss that over a good beer or in mail or on the telephone.

-- 
Matthias Andree




Quoted from Adam McKenna [15 Nov 2000]:
> Not to mention that the whole point of freeware and open source software in
> general is to give everyone the ability to audit the software, not just a
> select few.

I agree with the general statement, but neither qmail nor djbdns are
open source (I don't know the definition of ``freeware'', so I'll
leave it alone). I believe (without further justification) that a
piece of software without general modification permissions does not
really inspire improvement from the general public.

At http://www.technocrat.net/974143798/974162475/index_html we have
this nugget from Bruce Perens:

   It happened to me once - I was an early tester for Qmail, and then DJB
   pulled his wierd license thing on the release. Now, I am more careful.

A non-free software licence also deters people from looking at the
source, for fear of tainting their own free software projects.

        ---Chris K.
-- 
 Chris, the Young One |_ but what's a dropped message between friends? 
  Auckland, New Zealand |_ this is UDP, not TCP after all ;) ---John H. 
 GnuPG: CCC6114E/706A6AAD |_ Robinson, IV  




On Tue, Nov 14, 2000 at 02:01:07PM -0600, Charles Cazabon wrote:
> re: Schneier's commentary in Secrets and Lies
> 
> Mate Wierdl <[EMAIL PROTECTED]> wrote:
> > 
> > He says, the best way to evaluate the security of a product is to have it
> > audited by security experts.
> > So has any expert ever audited qmail or djbdns?
> 
> As Dave Sill pointed out, no formal security audit has been conducted by
> an independent party.
> 
> However, as far as qmail goes:  all the crackers in the world have had access
> to the qmail source code and design documentation for years, and none have
> yet found an exploitable security hole.  You could consider that a fairly
> thorough audit-by-fire.

Not really.  There are many examples to the contrary---quoted in the
book.  For example, there were buffer overflows discovered in Kerberos
which had been in the code for 10 years, or Mailman had glaring
security flows no one noticed for three years.

It seems the comforting thing would be if some commercial companies using
qmail would pay for auditing.

Mate




Mate Wierdl wrote:
> 
> I am reading this book by B. Schneier, in particular, the section
> `Cracking and hacking contests'.  He thinks that contests (like
> offering $1000 for finding a security hole in a product) are bad for
> four main reasons, the first reason being that the contests are
> usually unfair since the author of the software decides what he/she
> considers a "hole".
> 
> He also thinks that even having a software out and used for a few
> years without incidence does not imply that it is secure.  He says,
> the best way to evaluate the security of a product is to have it
> audited by security experts.
> 
> So has any expert ever audited qmail or djbdns?
> 
> Mate


Yeah! he is right! Just because you don't have runned into crash does
not mean i have no bug!

Although it's not possible to garantee software correctness, you can get
close to, by using a formal design approach. I would use the Z language
for that, the same used by QNX (very rigorous mission critical needs).

While UNIX does not get into a formal approach, developing secure
systems will be only a wish, not a fact (even considering openbsd).




Mate Wierdl <[EMAIL PROTECTED]> writes:
> So has any expert ever audited qmail or djbdns?

I imagine Dan has, and many would consider him an expert, but one is
rarely the best auditor of one's own work.


paul




On Tue, Nov 14, 2000 at 03:16:27PM -0500, Paul Jarc wrote:
> Mate Wierdl <[EMAIL PROTECTED]> writes:
> > So has any expert ever audited qmail or djbdns?
> 
> I imagine Dan has, and many would consider him an expert, but one is
> rarely the best auditor of one's own work.

Indeed, it would be interesting what kind of testing he is running on
qmail, say (he says there are over 100 tests), and how he is trying to
make sure his software is secure.  Perhaps his closed to the public
cryptography course notes would give a hint.

In any case, Dan's auditing his own software does not mean much in
this context. 

Can we say with confidence that now Postfix is secure just because the
last security problem it had was 2 years ago?

Mate




2000-11-14-15:01:07 Charles Cazabon:
> However, as far as qmail goes: all the crackers in the world have
> had access to the qmail source code and design documentation for
> years, and none have yet found an exploitable security hole. You
> could consider that a fairly thorough audit-by-fire.

And a case could be made that the charming and personable way qmail
has been represented in various public fora makes this audit-by-fire
even better: at this point, there are enough people around the world
who hate djb's guts and would never touch anything that he even
advocated much less wrote, just because of how much they like his
way of carrying on discussions in public mailing lists, that I kinda
expect more than one person has gone wading through qmail with blood
in his eye, desperately hoping to wipe the smug grin off djb's face
and get him to knock off the damned gloating already. Hasn't
happened yet. _That's_ trial by fire.

In a backwards kind of way this reminds me of a funny I heared
referenced recently, apparently some exceptionally unnaturally
clueless spammer harvested _bugtraq_. Makes me feel all warm and
snuggly just thinking about it:-). Hmm. Wonder if he was located in
the mid-east, maybe all this news about a "cyber-war" there is just
bystanders being taken out by the schrapnel thrown from the smoking
hole where that spammer used to reside.

-Bennett

PGP signature





[EMAIL PROTECTED] writes:
> Whilst an audit is a good idea, I don't see how a competition and
> time in the field can actual make matters worse.

It can make people think a program is secure when no audit has been
done, reducing the likelihood that anyone will call for an audit,
leaving holes undiscovered.


paul




> 
> He also thinks that even having a software out and used for a few
> years without incidence does not imply that it is secure.  He says,
> the best way to evaluate the security of a product is to have it
> audited by security experts.
> 

There is no one right answer for this. Payment for a discovery will tend to
bring out some discoveries. For example if I was looking over some code and
found something odd for the potential reward I may think it over a little
more to see what may come of it.

The time a product is out will increase the chances that some errors will be
found. But a lot of code is under constant change and new problems only take
one little coding error to open up a major exploit. Older products will tend
to be better understood and some errors will be harder to introduce.

Security "experts" are a dime a dozen.

What you want is software written and reviewed by competent programmers. The
fewer defects in software the fewer exploits (i.e. If I check my array
bounds I will not overflow a buffer). Good code will not crash and will not
be hacked.





* Dave Sill <[EMAIL PROTECTED]> writes:
> Mate Wierdl <[EMAIL PROTECTED]> wrote:

>> So has any expert ever audited qmail or djbdns?

> No. Any audit worth doing would be prohibitively expensive for a
> freeware project. $1000 wouldn't even begin to cover it, at least for
> qmail.

Doesn't the fact that they are included in OpenBSD (as ports) hint at
the fact that some of the OpenBSD guys have had at least a cursory
glance at it?
-- 
Robin S. Socha <http://socha.net/>




2000-11-14-15:07:28 [EMAIL PROTECTED]:
> [Bruce Schneier is] the author of perhaps the most popular book on
> computer security that's available to the public.

Which book are you referring to? "Secrets and Lies"? While it's a
powerful contribution in the way of standing back and re-examining
the big picture from a different direction, and has some important
thoughts on limitations of what can be achieved, I'm not sure I'd
cite it as the most popular book on computer security. It's hard to
say what that might be, but I'd be more inclined to nominate
Practical Unix and Internet Security.

If you mean Applied Cryptography, it's certainly the most valuable
and popular book on applied crypto available to the public, it
approaches being the final and definitive work on the topic, and if
he keeps updating it to track developing crypto technology (as he's
uniquely qualified to do) it may hold that role for some time. But
cryptography is only loosely related to computer security; it's a
tool which can sometimes be used to help with some security
problems, is all.

> He's generally well regarded - though having sendmail 8.8.8 on
> the secondary MX of his domain doesn't make you feel super
> confident :>

As a computer security generalist (as opposed to a cryptanalyst),
his major thrust seems to be an argument that it's impossible to
really secure systems, and after perhaps some superficial efforts to
knock out the biggest problems, the place to concentrate your
efforts is on monitoring and risk management. With that as a given,
I expect he runs sendmail and BIND; things like qmail and djbdns are
for those of us who haven't given up on really completely securing
our systems:-).

-Bennett

PGP signature





2000-11-14-15:11:43 Paul Jarc:
> Only the "select few" will be able to audit it well, regardless of
> the license, and they can afford to charge a hefty fee, regardless
> of the license.

They certainly can. They do not always choose to do so, however. If
enough people really wanted to get a determined and thorough audit
of qmail done, and they included some reasonably skilled
programmers, I expect that we could borrow the missing auditing
expertise from the big name-brand squadron of open source code
auditors, the OpenBSD team.

-Bennett

PGP signature





Mate Wierdl <[EMAIL PROTECTED]> writes:

> I am reading this book by B. Schneier, in particular, the section
> `Cracking and hacking contests'.  He thinks that contests (like offering
> $1000 for finding a security hole in a product) are bad for four main
> reasons, the first reason being that the contests are usually unfair
> since the author of the software decides what he/she considers a "hole".

He's not alone in that opinion; I think that opinion has a lot of merit,
although I wouldn't go so far as to say that such contests are *bad*.  But
I don't think they actually prove anything.

> He also thinks that even having a software out and used for a few years
> without incidence does not imply that it is secure.  He says, the best
> way to evaluate the security of a product is to have it audited by
> security experts.

It's worth bearing in mind, when evaluating this opinion, that Bruce
Schneier is a security expert that people hire to perform such security
audits.  He has a point, but it's also unsurprising that he's in favor of
the work that he personally does.

-- 
Russ Allbery ([EMAIL PROTECTED])             <http://www.eyrie.org/~eagle/>




Adam McKenna <[EMAIL PROTECTED]> writes:

> OK, I stand corrected.  But you have to realize that this is the same
> argument put forward by many people pushing closed source solutions over
> open source ones (that it has been analyzed by "experts"), and
> invariably many security holes are found anyway.  Cases in point, most
> major closed-source firewall software, MS's shoddy PPTP implementation,
> etc.

I believe that Bruce Schneier, like most (although not all) security and
cryptography experts, is pretty strongly opposed to closed-source
solutions to security problems due to precisely the sorts of things that
you're talking about.  I think his point is more that just having the
source available doesn't automatically mean that the software has been
audited.  Having the source be closed is obviously worse, but open source
isn't a sufficient condition.

-- 
Russ Allbery ([EMAIL PROTECTED])             <http://www.eyrie.org/~eagle/>




On Tue, Nov 14, 2000 at 03:11:43PM -0500, Paul Jarc wrote:
> Adam McKenna <[EMAIL PROTECTED]> writes:
> > Not to mention that the whole point of freeware and open source software in
> > general is to give everyone the ability to audit the software, not just a
> > select few.
> 
> Dan's software isn't open source.  I imagine he might value peer
> review, but I'm not aware of his having stated so - certainly not in
> regard to motivation for his distribution terms.  Also, making source
> available does not give everyone the ability to audit the software.
> It gives them permission.  But most people won't be any better able to
> do a quality audit for having the source.

I said, "freeware and open source software".  Do you always selectively
ignore part of what someone says to make your point?

> Only the "select few" will
> be able to audit it well, regardless of the license, and they can
> afford to charge a hefty fee, regardless of the license.

I think "select few" as you have used it needs clarification -- even if only
one half of one percent of all advanced C programmers are part of the "select
few", that's still hundreds or thousands of people, and many of those people 
are part of the open source community.  A hell of a lot more, anyway, than 
are working at so-called "security firms", ready to stamp their approval on 
any product they get six or seven digit payments to "certify".

--Adam

-- 
Adam McKenna <[EMAIL PROTECTED]> | "No matter how much it changes, 
http://flounder.net/publickey.html   |  technology's just a bunch of wires 
GPG: 17A4 11F7 5E7E C2E7 08AA        |  connected to a bunch of other wires."
     38B0 05D0 8BF7 2C6D 110A        |  Joe Rogan, _NewsRadio_
  4:06pm  up 157 days, 14:22, 10 users,  load average: 0.13, 0.08, 0.03




I am going to go out on a limb here and declare Bruce a non-M$ weenie.  It 
took guts I tell you.

Regards,
Travis

At 03:11 PM 11/14/2000 -0500, Paul Jarc wrote:
>Adam McKenna <[EMAIL PROTECTED]> writes:
> > On Tue, Nov 14, 2000 at 02:39:25PM -0500, Dave Sill wrote:
> > > >So has any expert ever audited qmail or djbdns?
> > >
> > > No. Any audit worth doing would be prohibitively expensive for a
> > > freeware project. $1000 wouldn't even begin to cover it, at least for
> > > qmail.
> >
> > Not to mention that the whole point of freeware and open source software in
> > general is to give everyone the ability to audit the software, not just a
> > select few.
>
>Dan's software isn't open source.  I imagine he might value peer
>review, but I'm not aware of his having stated so - certainly not in
>regard to motivation for his distribution terms.  Also, making source
>available does not give everyone the ability to audit the software.
>It gives them permission.  But most people won't be any better able to
>do a quality audit for having the source.  Only the "select few" will
>be able to audit it well, regardless of the license, and they can
>afford to charge a hefty fee, regardless of the license.
>
>
>paul

Travis Turner
Information Technology Manager
Applied Integration Corporation
Tucson, Arizona  U.S.A.
Phone (520) 743-3095
Fax (520) 623-1683

"Do not meddle in the affairs of dragons for you are crunchy
and taste good with ketchup."







I am going to go out on a limb here and declare Bruce a non-M$ weenie.  It 
took guts I tell you.

Regards,
Travis

At 03:11 PM 11/14/2000 -0500, Paul Jarc wrote:
>Adam McKenna <[EMAIL PROTECTED]> writes:
> > On Tue, Nov 14, 2000 at 02:39:25PM -0500, Dave Sill wrote:
> > > >So has any expert ever audited qmail or djbdns?
> > >
> > > No. Any audit worth doing would be prohibitively expensive for a
> > > freeware project. $1000 wouldn't even begin to cover it, at least for
> > > qmail.
> >
> > Not to mention that the whole point of freeware and open source software in
> > general is to give everyone the ability to audit the software, not just a
> > select few.
>
>Dan's software isn't open source.  I imagine he might value peer
>review, but I'm not aware of his having stated so - certainly not in
>regard to motivation for his distribution terms.  Also, making source
>available does not give everyone the ability to audit the software.
>It gives them permission.  But most people won't be any better able to
>do a quality audit for having the source.  Only the "select few" will
>be able to audit it well, regardless of the license, and they can
>afford to charge a hefty fee, regardless of the license.
>
>
>paul

Travis Turner
Information Technology Manager
Applied Integration Corporation
Tucson, Arizona  U.S.A.
Phone (520) 743-3095
Fax (520) 623-1683

"Do not meddle in the affairs of dragons for you are crunchy
and taste good with ketchup."







On Tue, Nov 14, 2000 at 09:11:32PM +0100, Matthias Andree wrote:
> Mr. Schneier is respected for his expertise and cryptography, and just
> because he states that head money for bugs is no good, does not make him
> an M S type weenie.

You're right, Bruce Scheiner is a god, and I'm really sorry for disagreeing
with him.

--Adam

-- 
Adam McKenna <[EMAIL PROTECTED]> | "No matter how much it changes, 
http://flounder.net/publickey.html   |  technology's just a bunch of wires 
GPG: 17A4 11F7 5E7E C2E7 08AA        |  connected to a bunch of other wires."
     38B0 05D0 8BF7 2C6D 110A        |  Joe Rogan, _NewsRadio_
  4:23pm  up 157 days, 14:39,  9 users,  load average: 0.09, 0.06, 0.01




2000-11-14-15:11:55 Adam McKenna:
> But you have to realize that this is the same argument put forward
> by many people pushing closed source solutions over open source
> ones (that it has been analyzed by "experts"), and invariably many
> security holes are found anyway.

Again, it helps to understand his particular background on the
matter. He's very very specifically criticising "hack me"
challenges, as contrasted with open audits of the design, and this
is right out of his crypto roots.

> Cases in point, [...] MS's shoddy PPTP implementation, [...]

of which Bruce Schneier is the most vocal and respected critic,
always cited in disputes over the merits or demerits of the protocol
design and implementation.

See <URL:http://www.counterpane.com/pptp.html>, the leading
reference on PPTP's insecurity.

What is more interesting to me is that Bruce has distinctly waffled
on the topic of full disclosure re security problems. If you want to
attack his views, I recommend looking there:-).

-Bennett

PGP signature





> I agree with the general statement, but neither qmail nor djbdns are
> open source (I don't know the definition of ``freeware'', so I'll
> leave it alone). I believe (without further justification) that a
> piece of software without general modification permissions does not
> really inspire improvement from the general public.
>

Open Source is often used to describe software that has its source code
available regardless of the license involved. "Free Software" as promoted by
the Free Software Foundation (FSF) is a different thing. I belive that the
DJB software is Open Source, but not free.

Based on the FSF definition it is not the cost, but what you are allowed to
do with it that is the issue. 





Thus spake Mate Wierdl ([EMAIL PROTECTED]):
> Not really.  There are many examples to the contrary---quoted in the
> book.  For example, there were buffer overflows discovered in Kerberos
> which had been in the code for 10 years, or Mailman had glaring
> security flows no one noticed for three years.

Great.  So why are you lamenting here instead of doing such an audit or
finding someone who will?  You are at a University, for God's sake,
where if not there can you find people who would actually be willing to
use something like Z?

Don't talk.  Do.

Felix




On Tue, Nov 14, 2000 at 12:04:46PM -0800, Ian Lance Taylor wrote:
> Bruce Schneier is a very long way from being an ``M$-type weenie.''
> He's a pretty serious security dude.  See, e.g.,
>     http://www.counterpane.com/crypto-gram.html.

Indeed, he is using ezmlm (idx!) for his newsletter.  So he *does*
have a clue.

Mate




On Tue, 14 Nov 2000, Mate Wierdl wrote:

> Indeed, it would be interesting what kind of testing he is running on
> qmail, say (he says there are over 100 tests), and how he is trying to
> make sure his software is secure. 

If you want to see some of the tests he does, check out rts.tests that
comes in the djbdns distribution.  I happened to be looking at that last
night.  It's far from a complete security audit, of course, but it does
try out a lot of the obvious stuff.  It would probably be fun to point his
tests at someone else's DNS software...

                                        Ryan





Thus spake Mate Wierdl ([EMAIL PROTECTED]):
> Indeed, it would be interesting what kind of testing he is running on
> qmail, say (he says there are over 100 tests), and how he is trying to
> make sure his software is secure.  Perhaps his closed to the public
> cryptography course notes would give a hint.

Mate, what kind of problem do you have?
What does qmail have to do with cryptography?
Do you need a break?  Maybe you should go on vacation for a few weeks.

Please have a look at the qmail architecture and show me, even if there
were buffer overflow in qmail-smtpd, how you would do harm to the
system.  Please have a look with what privileges the different
components run.

> In any case, Dan's auditing his own software does not mean much in
> this context.

Nobody's audit means much.

If the Gartner Group came and declared that they had spent $250 billion
on auditing qmail for two years and found it to be secure, would that
mean anything?  No, of course not.

Software security auditing does not work that way.

Software is secure iff the architecture and trust model is sound, which
you can verify yourself in a few hours.  Other concerns like technical
errors in the implementation are much less important.  And there has not
even been one of those in the last years.

> Can we say with confidence that now Postfix is secure just because the
> last security problem it had was 2 years ago?

Who cares if Postfix is secure?
Postfix has several times the size of qmail and there have been several
catastrophic errors in the past that could cause mail loss.  Nothing the
Postfix authors do can restore trust in this software.

Again, I beg of you: Don't talk.  Do.

Felix




On Tue, Nov 14, 2000 at 03:35:35PM -0500, Paul Jarc wrote:
> [EMAIL PROTECTED] writes:
> > Whilst an audit is a good idea, I don't see how a competition and
> > time in the field can actual make matters worse.
> 
> It can make people think a program is secure when no audit has been
> done, reducing the likelihood that anyone will call for an audit,
> leaving holes undiscovered.

And a formal audit can miss security holes, reducing the likelihood that 
anyone will call for further audits, leaving holes undiscovered -- it's a 
double-edged sword.  Auditing is an ongoing process, not something which takes
place at one point in time and unilaterally declares something "secure".

--Adam

-- 
Adam McKenna <[EMAIL PROTECTED]> | "No matter how much it changes, 
http://flounder.net/publickey.html   |  technology's just a bunch of wires 
GPG: 17A4 11F7 5E7E C2E7 08AA        |  connected to a bunch of other wires."
     38B0 05D0 8BF7 2C6D 110A        |  Joe Rogan, _NewsRadio_
  5:21pm  up 157 days, 15:37, 10 users,  load average: 0.08, 0.02, 0.01




On Tue, Nov 14, 2000 at 03:35:35PM -0500, Paul Jarc wrote:
> [EMAIL PROTECTED] writes:
> > Whilst an audit is a good idea, I don't see how a competition and
> > time in the field can actual make matters worse.
> 
> It can make people think a program is secure when no audit has been
> done, reducing the likelihood that anyone will call for an audit,
> leaving holes undiscovered.

Conversely, maybe an audit reduces the likelihood that anyone will bother
to scuitinize the source, leaving holes undiscovered...

All we're doing is speculating about which source of a "false sense of
security" is worse. Both have serious weaknesses.

Ideally of course we have lots of points of reference to give us confidence - a
formal audit, public scrutiny, large field usage, etc. I don't think that any one
is enough. On that basis, the more boxes you tick off, the closer you get to
feeling comfortable.


Regards.




On Tue, Nov 14, 2000 at 04:13:19PM -0500, Bennett Todd wrote:
> 2000-11-14-15:07:28 [EMAIL PROTECTED]:
> > [Bruce Schneier is] the author of perhaps the most popular book on
> > computer security that's available to the public.
> 
> Which book are you referring to? "Secrets and Lies"? While it's a

Nup.

> If you mean Applied Cryptography, it's certainly the most valuable

Yup.

> > He's generally well regarded - though having sendmail 8.8.8 on
> > the secondary MX of his domain doesn't make you feel super
> > confident :>
> 
> As a computer security generalist (as opposed to a cryptanalyst),
> his major thrust seems to be an argument that it's impossible to
> really secure systems, and after perhaps some superficial efforts to
> knock out the biggest problems, the place to concentrate your
> efforts is on monitoring and risk management. With that as a given,
> I expect he runs sendmail and BIND; things like qmail and djbdns are
> for those of us who haven't given up on really completely securing
> our systems:-).

Postfix is on the primary MX, go figure. Biodiversity I suppose...


Regards.




Thus spake Robin S. Socha ([EMAIL PROTECTED]):
> > No. Any audit worth doing would be prohibitively expensive for a
> > freeware project. $1000 wouldn't even begin to cover it, at least for
> > qmail.
> Doesn't the fact that they are included in OpenBSD (as ports) hint at
> the fact that some of the OpenBSD guys have had at least a cursory
> glance at it?

The OpenBSD guys lost their credibility as software security authority
when they decided to include sendmail as standard MTA.  Theo is rumored
to have said something like "There were no remote root exploits for two
years, so it must be secure now, right?"

Felix




hi,
    Agreed seems IMHO that ifone wanted to smear djb they would do it
as soon as they had the evidence and they have tried and so far failed
to provide evidence that the specific proggies are flawed. Whereas
some of the add ons have been shown to be.. One of the reasons am
interested in rolling out djbdns is to let fire be the judge but confort
zone is with the programs as each day passes a bit more:-))
Best Regards,
[EMAIL PROTECTED]
Bennett Todd wrote:

> 2000-11-14-15:01:07 Charles Cazabon:
> > However, as far as qmail goes: all the crackers in the world have
> > had access to the qmail source code and design documentation for
> > years, and none have yet found an exploitable security hole. You
> > could consider that a fairly thorough audit-by-fire.
>
> And a case could be made that the charming and personable way qmail
> has been represented in various public fora makes this audit-by-fire
> even better: at this point, there are enough people around the world
> who hate djb's guts and would never touch anything that he even
> advocated much less wrote, just because of how much they like his
> way of carrying on discussions in public mailing lists, that I kinda
> expect more than one person has gone wading through qmail with blood
> in his eye, desperately hoping to wipe the smug grin off djb's face
> and get him to knock off the damned gloating already. Hasn't
> happened yet. _That's_ trial by fire.
>
> In a backwards kind of way this reminds me of a funny I heared
> referenced recently, apparently some exceptionally unnaturally
> clueless spammer harvested _bugtraq_. Makes me feel all warm and
> snuggly just thinking about it:-). Hmm. Wonder if he was located in
> the mid-east, maybe all this news about a "cyber-war" there is just
> bystanders being taken out by the schrapnel thrown from the smoking
> hole where that spammer used to reside.
>
> -Bennett
>
>   ------------------------------------------------------------------------
>    Part 1.2Type: application/pgp-signature





Lipscomb, Al <[EMAIL PROTECTED]> writes on 14 November 2000 at 15:37:51 -0500

 > Security "experts" are a dime a dozen.

That's certainly true.  I've actually testified in court on the topic,
which goes to show how desperate people get sometimes.  (I suspect I
know more relevant stuff than quite a few security "experts", and
would never call myself expert or even professionally competent at
computer security.  Luckily it's not my profession.) 
-- 
David Dyer-Bennet      /      Welcome to the future!      /      [EMAIL PROTECTED]
SF: http://www.dd-b.net/dd-b/          Minicon: http://www.mnstf.org/minicon/
Photos: http://dd-b.lighthunters.net/




2000-11-14-16:24:36 Adam McKenna:
> Bruce Scheiner is a god, [...]

It's possible you're being sarcastic, but there are those who would
very nearly agree with you. While he may not actually be a god, he
is certainly the single most important contributor to getting really
top notch crypto out of research and into engineering; he's been
teaching a lot of us the basic principles of sound design with
crypto for a decade or more.

-Bennett

PGP signature





Paul Jarc wrote:
> 
> Mate Wierdl <[EMAIL PROTECTED]> writes:
> > So has any expert ever audited qmail or djbdns?
> 
> I imagine Dan has, and many would consider him an expert, but one is
> rarely the best auditor of one's own work.

I, as the author of the qmail-ldap patch, have looked deeply into the
guts of qmail and found it to be secure. If one actually reads the
source and see's the way Dan writes software he would find that qmail
is secure. The only possible holes are OS bugs or issues.

-- 
Andre




On Tue, Nov 14, 2000 at 06:22:27PM -0500, Bennett Todd wrote:
> 2000-11-14-16:24:36 Adam McKenna:
> > Bruce Scheiner is a god, [...]
> 
> It's possible you're being sarcastic, but there are those who would
> very nearly agree with you. While he may not actually be a god, he
> is certainly the single most important contributor to getting really
> top notch crypto out of research and into engineering; he's been
> teaching a lot of us the basic principles of sound design with
> crypto for a decade or more.

For what its worth, I was only originally expression an opinion on the few
paragraphs that Mate posted, from some book that I had never heard of, by a
"B. Schneier" [sic]  I didn't know who he was talking about at first, and I
was reacting to getting attacked from all sides.  Perhaps in the future when
people post quotes from print, they should include a little bit more context, 
and perhaps an ISBN number to eliminate confusion.

By the way, why are the cr.yp.to lists so slow lately?  Have we finally
reached the limit of processing power on the list server?

--Adam

-- 
Adam McKenna <[EMAIL PROTECTED]> | "No matter how much it changes, 
http://flounder.net/publickey.html   |  technology's just a bunch of wires 
GPG: 17A4 11F7 5E7E C2E7 08AA        |  connected to a bunch of other wires."
     38B0 05D0 8BF7 2C6D 110A        |  Joe Rogan, _NewsRadio_
  6:32pm  up 157 days, 16:48, 10 users,  load average: 0.01, 0.02, 0.00




2000-11-14-16:37:06 Lipscomb, Al:
> Open Source is often used to describe software that has its source
> code available regardless of the license involved.

Could be, people use words as they wish. But if you'll take a visit
to <URL:http://www.opensource.org/>, you'll find that the term was
very specifically drafted by a group of people with an agenda, and
they've produced a branding service based on an Open Source
Definition, which definitely excludes weirdo licenses like djb's.

> "Free Software" as promoted by the Free Software Foundation (FSF)
> is a different thing. I belive that the DJB software is Open
> Source, but not free.

Unlike Open Source, the phrase "free software" strongly predates the
Free Software Foundation and they've made no attempt at branding it;
rather, they pursue branding the GNU General Public License (GPL),
which is stricter than (but compatible with) the Open Source
Definition.

> Based on the FSF definition it is not the cost, but what you are
> allowed to do with it that is the issue.

The FSF and the Open Source Initiative (OSI) are in pretty close
agreement in a lot of these basics, and neither of them would
endorse djb's license; he chooses to prohibit his users from making
unrestricted use of the code he writes: they aren't allowed to
distributed modified versions. That restriction is what leaves qmail
and djbdns a bit off the main stream of the free software movement
as it's crusading these days; people believe that that ability
contributes in a basic and important way to preserving their
investment in the time and effort required to become really expert
in a package. If ever djb decides to stop maintaining his software,
it stagnates, because while individuals may do so for their own
benefit, the community as a whole cannot work together to do so ---
redistribution of modified versions is critical for that sort of
collaboration.

Heck, even doing standards-compliant software packaging of his
software is prohibited. It's not free software or open source in a
fairly important way. This doesn't matter to djb, but it's important
and this distinction shouldn't be glossed over.

-Bennett

PGP signature





Quoted from Lipscomb, Al [15 Nov 2000]:
> Open Source is often used to describe software that has its source code
> available regardless of the license involved.

Just because it's ``often'' done doesn't mean it's correct. To me, and
possibly others, open source is used to describe software that uses a
licence conforming to the Open Source Definition.

Have a look at clause 4, and let me know if you think that's consistent
with the qmail and djbdns licences. Specifically: ``The [licence] must
explicitly permit distribution of software built from modified source
code.''.

>                                                          I belive that the
> DJB software is Open Source, but not free.

I used to too, and once advocated that view in my Linux users group. I
was shot down pretty quickly.... :-)

> Based on the FSF definition it is not the cost, but what you are allowed to
> do with it that is the issue. 

Of course. Whenever I say ``free software'', that is always what I mean
(``freedom, not price''---don't you just love propaganda from the free
software movement?).

        ---Chris K.
-- 
 Chris, the Young One |_ If you can't afford a backup system, you can't 
  Auckland, New Zealand |_ afford to have important data on your computer. 
 GnuPG: CCC6114E/706A6AAD |_ ---Tracy R. Reed  




Bennett Todd <[EMAIL PROTECTED]> writes:

> Could be, people use words as they wish. But if you'll take a visit to
> <URL:http://www.opensource.org/>, you'll find that the term was very
> specifically drafted by a group of people with an agenda, and they've
> produced a branding service based on an Open Source Definition, which
> definitely excludes weirdo licenses like djb's.

> Unlike Open Source, the phrase "free software" strongly predates the
> Free Software Foundation and they've made no attempt at branding it;
> rather, they pursue branding the GNU General Public License (GPL), which
> is stricter than (but compatible with) the Open Source Definition.

RMS tries to "brand" the term free software just as much as the Open
Source folks try to "brand" the term open source; neither of them have any
kind of trademark or service mark on the term (the one on Open Source
wasn't pursued) and both of them have been known to argue at great length
over the precise meaning of the terms with people who they feel are using
them incorrectly.

-- 
Russ Allbery ([EMAIL PROTECTED])             <http://www.eyrie.org/~eagle/>




On Wed, Nov 15, 2000 at 01:14:15PM +1300, Chris K. Young wrote:
> Quoted from Lipscomb, Al [15 Nov 2000]:
> > Open Source is often used to describe software that has its source code
> > available regardless of the license involved.
> 
> Just because it's ``often'' done doesn't mean it's correct. To me, and
> possibly others, open source is used to describe software that uses a
> licence conforming to the Open Source Definition.
> 
> Have a look at clause 4, and let me know if you think that's consistent
> with the qmail and djbdns licences. Specifically: ``The [licence] must
> explicitly permit distribution of software built from modified source
> code.''.

I'm confused. How exactly does any of this affect the ability of people
to download the source and examine/use it to determine if it's secure
or not? After all, wasn't that the point of the discussion?


Regards.




On Wed, Nov 15, 2000 at 01:14:15PM +1300, Chris K. Young wrote:
> Quoted from Lipscomb, Al [15 Nov 2000]:
> > Open Source is often used to describe software that has its source code
> > available regardless of the license involved.
> 
> Just because it's ``often'' done doesn't mean it's correct. To me, and
> possibly others, open source is used to describe software that uses a
> licence conforming to the Open Source Definition.
> 
> Have a look at clause 4, and let me know if you think that's consistent
> with the qmail and djbdns licences. Specifically: ``The [licence] must
> explicitly permit distribution of software built from modified source
> code.''.
> 
> >                                                          I belive that the
> > DJB software is Open Source, but not free.
> 
> I used to too, and once advocated that view in my Linux users group. I
> was shot down pretty quickly.... :-)

qmail conforms loosely to the OSD, there is a footnote to section 4 that
(ambiguously) states that licenses that allow third party distribution of
patches conform.  The main problem is that qmail doesn't really have a
"license" that ships with it.  All people have to go on is public remarks 
made by Dan, http://cr.yp.to/qmail/dist.html, and 
http://cr.yp.to/softwarelaw.html .

--Adam

-- 
Adam McKenna <[EMAIL PROTECTED]> | "No matter how much it changes, 
http://flounder.net/publickey.html   |  technology's just a bunch of wires 
GPG: 17A4 11F7 5E7E C2E7 08AA        |  connected to a bunch of other wires."
     38B0 05D0 8BF7 2C6D 110A        |  Joe Rogan, _NewsRadio_
  8:06pm  up 157 days, 18:23, 10 users,  load average: 0.08, 0.06, 0.01




On Tue, 14 Nov 2000 [EMAIL PROTECTED] wrote:

> I'm confused. How exactly does any of this affect the ability of people
> to download the source and examine/use it to determine if it's secure
> or not? After all, wasn't that the point of the discussion?
> 

Some folks who are capable of doing good audit work won't spend their time
on projects that don't have the right license.  This is either because
they would rather spend their time contributing work towards their
favorite license, or because there might later be accusation that someone
stole code from qmail, and used it in another product with an incompatible
license.  For example, there was a flap recently when some MS code may
have been stolen.  There was concern that if any Samba teams members saw
the code, they couldn't work on the project anymore; they'd be "tainted".  

There are some OS distributions that will only include code of a
particular license, and some of those do code audits.

So, the license can have some affect on how much review a program
gets.  No, in general the license won't stop people whose motivation is to
publish holes, or who want to use qmail for themselves.

                                        Ryan





On Tue, Nov 14, 2000 at 01:21:03PM -0800, Russ Allbery wrote:
> He's not alone in that opinion; I think that opinion has a lot of merit,
> although I wouldn't go so far as to say that such contests are *bad*.  But
> I don't think they actually prove anything.

Exactly Schneier's opinion: contests could be good (like RSA's), but
alone they prove absolutely nothing about the security of a product. 

What I do not understand is this: why not treat a software as a
research paper?  A research paper is usually refereed---and in most
sciences referees are not paid a dime.  Referees get their salaries
from elsewhere, but they usually do their refereeing very thoroughly
because it is in the culture to accept this pro bono job as one's very
important responsibility. The expectation is that if I publish a
paper, I'd like to have a tough referee's opinion---if for nothing
else but to check the correctness of the result, and I also must
return the favor.

Mate




On Tue, Nov 14, 2000 at 11:25:27PM +0100, Felix von Leitner wrote:
> Thus spake Mate Wierdl ([EMAIL PROTECTED]):
> > make sure his software is secure.  Perhaps his closed to the public
> > cryptography course notes would give a hint.
> 
> Mate, what kind of problem do you have?
> What does qmail have to do with cryptography?

I thought it was possible that Dan would give some hints on his view
on secure programming in these notes.

> Software security auditing does not work that way.
> 
> Software is secure iff the architecture and trust model is sound, which
> you can verify yourself in a few hours. 

You make software security look easy, and Schneier's book tells me
otherwise.  

My two points: 

1) It seems that systematic (scientific?) testing of qmail
   or djbdns has not happened---except by Dan.

2) The only way we could get a hint on the guiding ideas of Dan on
   secure computing is to read the source code he writes.  But this is
   reverse engineering, and is similar to trying to undertand Gauss's
   ideas by reading his proofs---good luck.  

Or does everybody on this list who read qmail's sources is writing
100% secure software now?

Does everybody have a clear idea what Dan considers a security
problem?  For example, he clearly does not care about preventing some
DoS attacks.  Is it clear for everybody which ones are considered
unimportant by Dan?  DoS attacks against djbdns or qmail will not give
you $1000 but there are two attacks listed at
http://cr.yp.to/maildisasters/sendmail.html.

Mate




In the immortal words of Adam McKenna ([EMAIL PROTECTED]):
> 
> It sounds like the author of this book is a M$-type weenie.

Bruce Schneier, "M$-type weenie."

God I'm glad I wasn't trying to eat or drink anything when I read
that...

"That would be `no.'"

-n

-------------------------------------------------------------<[EMAIL PROTECTED]>
"Many argue that it is an outrage to expect Elián González to live in a place 
that tolerates no dissent or freedom of political expression. But I don't think
Miami is so bad."                                              (--Maureen Dowd)
<http://www.blank.org/memory/>-------------------------------------------------




Mate Wierdl <[EMAIL PROTECTED]> writes on 14 November 2000 at 15:57:34 -0600
 > On Tue, Nov 14, 2000 at 12:04:46PM -0800, Ian Lance Taylor wrote:
 > > Bruce Schneier is a very long way from being an ``M$-type weenie.''
 > > He's a pretty serious security dude.  See, e.g.,
 > >     http://www.counterpane.com/crypto-gram.html.
 > 
 > Indeed, he is using ezmlm (idx!) for his newsletter.  So he *does*
 > have a clue.

In fact, crypto-gram has so far been sent out from my server, because
that was where the employee who set it up had shell access.

I hear they do plan to eventually move it to corporate hardware, and I
don't know what they'll be running there.

It's by far the biggest email activity on this system, every month (in
fact, tomorrow, if they're on schedule).  They're closing in on 50,000
subscribers; that's not immense by some of your standards, or by ezmlm
and qmail standards, but this Cyrix P166+ with 96 meg of ram and IDE
disks wasn't really planned to be a mail blaster.  But it tears
through it pretty darned well anyway.
-- 
David Dyer-Bennet      /      Welcome to the future!      /      [EMAIL PROTECTED]
SF: http://www.dd-b.net/dd-b/          Minicon: http://www.mnstf.org/minicon/
Photos: http://dd-b.lighthunters.net/




Ryan Russell wrote:
 
> If you want to see some of the tests he does, check out rts.tests that
> comes in the djbdns distribution.  I happened to be looking at that last
> night.  It's far from a complete security audit, of course, but it does
> try out a lot of the obvious stuff.  It would probably be fun to point his
> tests at someone else's DNS software...

BIND8 fails at least a dozen of his tests.  I'm running BIND right now
but plan on switching to djbdns in the near future......

-- 
Chris Olson




On Tue, Nov 14, 2000 at 04:13:19PM -0500, Bennett Todd wrote:
> efforts is on monitoring and risk management. With that as a given,
> I expect he runs sendmail and BIND; things like qmail and djbdns are
> for those of us who haven't given up on really completely securing
> our systems:-).

First I thought B.S. runs qmail and ezmlm, but it seems his
mailinglist is run by DD-B. counterpane.com servers run postfix and
sendmail---as you indicated. 

Mate




Quoted from Adam McKenna [15 Nov 2000]:
> On Wed, Nov 15, 2000 at 01:14:15PM +1300, Chris K. Young wrote:
> >                                                   ``The [licence] must
> > explicitly permit distribution of software built from modified source
    ^^^^^^^^^^
> > code.''.
> 
> qmail conforms loosely to the OSD, there is a footnote to section 4 that
> (ambiguously) states that licenses that allow third party distribution of
> patches conform.

Allowing patches is necessary, but it's not sufficient. Debian's Free
Software Guidelines has a similar clause, and I see no other clause
that DJB's licence conflicts with. If I go by your statement, why is
qmail listed under the non-free section?

>                   The main problem is that qmail doesn't really have a
> "license" that ships with it.  All people have to go on is public remarks 
> made by Dan, http://cr.yp.to/qmail/dist.html

I say that dist.html should be considered authoritative. There are
references in the qmail and djbdns documentation that contain the
URL to their respective pages.

        ---Chris K.
-- 
 Chris, the Young One |_ If you can't afford a backup system, you can't 
  Auckland, New Zealand |_ afford to have important data on your computer. 
 GnuPG: CCC6114E/706A6AAD |_ ---Tracy R. Reed  




On Wed, Nov 15, 2000 at 08:18:29PM +1300, Chris K. Young wrote:
> Quoted from Adam McKenna [15 Nov 2000]:
> > On Wed, Nov 15, 2000 at 01:14:15PM +1300, Chris K. Young wrote:
> > >                                                   ``The [licence] must
> > > explicitly permit distribution of software built from modified source
>     ^^^^^^^^^^
> > > code.''.
> > 
> > qmail conforms loosely to the OSD, there is a footnote to section 4 that
> > (ambiguously) states that licenses that allow third party distribution of
> > patches conform.
> 
> Allowing patches is necessary, but it's not sufficient. Debian's Free
> Software Guidelines has a similar clause, and I see no other clause
> that DJB's licence conflicts with. If I go by your statement, why is
> qmail listed under the non-free section?

That's why it conforms loosely.  It only violates one part, and the rationale
for that part explains why an author would want to make his license that way.
I can't speak for the strictness of the Debian project because I am not a
part of it, but it has been my experience that it doesn't take much of an
infracton of the OSD (which was originally the DFSG) to get exiled to
non-free.

> >                   The main problem is that qmail doesn't really have a
> > "license" that ships with it.  All people have to go on is public remarks 
> > made by Dan, http://cr.yp.to/qmail/dist.html
> 
> I say that dist.html should be considered authoritative. There are
> references in the qmail and djbdns documentation that contain the
> URL to their respective pages.

That's what you say.  But there isn't a definitive license (i.e. LICENSE or
COPYING) in the qmail distribution that explains those rights -- some web
page could be altered or taken down at any time, leaving users without any
rights whatsoever.

--Adam

-- 
Adam McKenna <[EMAIL PROTECTED]> | "No matter how much it changes, 
http://flounder.net/publickey.html   |  technology's just a bunch of wires 
GPG: 17A4 11F7 5E7E C2E7 08AA        |  connected to a bunch of other wires."
     38B0 05D0 8BF7 2C6D 110A        |  Joe Rogan, _NewsRadio_
  3:12am  up 158 days,  1:28, 10 users,  load average: 0.01, 0.01, 0.00




Hi,

I'm running qmail-1.03, ezmlm-idx, verh patch, big concurrency patch.

We have subscribers to morning, midday and afternoon bulletins that receive
a single message with no personalisation.

I'd like to send one-off email that are personalised (i.e. Dear Name-Here).
My current set-up for this is a script which queries a database with an
email address, retrieves a name, and the uses qmail-inject to send the mail.
My question is, is there anyway using ezmlm-idx to perform this function?
Maybe adding a comment field when manually subscribing a user? Which
qmail/ezmlm can then substitute with some kind of meta tag in the message
body??

Also, is there anyway to make ezmlm-idx prohibit a subject if it's already
been sent to a particular mailing list?  The outbound bulletins don't want
to be sent twice! (Our current system does this).

TIA,

Darren
--
+----------------------------+----------------------------+
| Darren Honeyball           | DDI:    +44(0)20 7863 1672 |
| Senior Systems Consultant  | Office: +44(0)20 7863 1600 |
| & Technical Team Leader    | Fax:    +44(0)20 7863 1601 |
| TheStreet.com (UK) Ltd     | Mobile: +44(0)7971  032292 |
+----------------------------+----------------------------+



*********************************************************************
*                         http://www.thestreet.co.uk                *
*                                                                   *
* This E-Mail is intended for the use of the addressee only and may *
* contain confidential information. If you are not the intended     *
* recipient, you are hereby notified that any use or dissemination  *
* of this communication is strictly prohibited.                     *
* If you receive this transmission in error, please notify us       *
* immediately then delete this E-Mail.                              *
*                                                                   *
*    [EMAIL PROTECTED]                                     *
*********************************************************************




Hi,

I'm running qmail-1.03, ezmlm-idx, verh patch, big concurrency patch.

We have subscribers to morning, midday and afternoon bulletins that receive
a single message with no personalisation.

I'd like to send one-off email that are personalised (i.e. Dear Name-Here).
My current set-up for this is a script which queries a database with an
email address, retrieves a name, and the uses qmail-inject to send the mail.
My question is, is there anyway using ezmlm-idx to perform this function?
Maybe adding a comment field when manually subscribing a user? Which
qmail/ezmlm can then substitute with some kind of meta tag in the message
body??

Also, is there anyway to make ezmlm-idx prohibit a subject if it's already
been sent to a particular mailing list?  The outbound bulletins don't want
to be sent twice! (Our current system does this).

TIA,

Darren

--
+----------------------------+----------------------------+
| Darren Honeyball           | DDI:    +44(0)20 7863 1672 |
| Senior Systems Consultant  | Office: +44(0)20 7863 1600 |
| & Technical Team Leader    | Fax:    +44(0)20 7863 1601 |
| TheStreet.com (UK) Ltd     | Mobile: +44(0)7971  032292 |
+----------------------------+----------------------------+



*********************************************************************
*                         http://www.thestreet.co.uk                *
*                                                                   *
* This E-Mail is intended for the use of the addressee only and may *
* contain confidential information. If you are not the intended     *
* recipient, you are hereby notified that any use or dissemination  *
* of this communication is strictly prohibited.                     *
* If you receive this transmission in error, please notify us       *
* immediately then delete this E-Mail.                              *
*                                                                   *
*    [EMAIL PROTECTED]                                     *
*********************************************************************




Hi,

        My .qmail-default have the line: | /var/qmail/bin/fastforward -d
/etc/aliases.cdb. The /etc/aliases have the line: MAILER-DAEMON: admin . I'm
receiving a lot of emails from someone trying to spam me but, the accounts
that the spamer is trying to spam doesn't exists so, the qmail send a
MAILER-DAEMON message to admin saying that the account doesn't exists. I
disabled this line from .qmail-default in order to prevent the qmail from
send this message but, I looked at the logs and I saw that when a message to
an unknown arrive this logs the message DID. My question is : Where this
messages to an unknown user is stored ? Is this message discarded ?

                                Roberto Samarone Araujo





Hi,

I'm currently using a single address for all my list mail, and I run
procmail to filter the emails to their respective mail folders.  I'd
like to switch to separate addresses (one per list) and filter the
mails with .qmail-listname files.  However, the reason I've not yet
changed is that I have a nice perl script that reads procmail's log
file and tells me statistics about the delivered mail.  Here's an
example output:

Delivered mail messages:
IN.42: 1
IN.corrs: 1
IN.corrs-friends: 27
INBOX: 4
own: 1
Total of 34 delivered messages in 5 folders.

Before I switch to separate .qmail-list mail filtering, I want to have
similar kind of mail accounting/statistics in place.  It should be
simple enough, just add an additional delivery instruction to a program
that will log the mail.  And then have a separate program for displaying
the current statistics and possibly clearing the accumulated data.

My question is, has anyone yet done such a program?  I looked on the
qmail.org web page, but couldn't find anything.  If there is no such
program, I guess I will have to write it myself.


Regards,
Mikko
-- 
// Mikko Hänninen, aka. Wizzu  // [EMAIL PROTECTED] //  http://www.wizzu.com /
// The Corrs list maintainer  //  net.freak   //   DALnet IRC operator /
// Interests: roleplaying, Linux, the Net, fantasy & scifi, the Corrs /
Energizer Bunny arrested, charged with battery.




how can i make qmail accept mails for
user@[123.123.123.123] when the machine 123.123.123.123 forwards all mails
to our qmail server?

wolfgang






My proposed setup is something like this. clients connect for smtp and pop to this machine mach1. When i receive a mail from remote or from local, it goes through the usual routine of checking for receipt host and other things and writes to the qmail queue. From the queue the mail has to be taken and sent to the machine 2 (where i do some checking for virus and spam) and put it in the mailboxes which are shared by both these machines machine1 and machine 2.
 
 
                       Machine1 ---------------------------------------------------------------------------------- Machine2
                             |                                                                                                                       |
                             |                                                                                                                       |
                             |                                                                                                                       |
                             ------------------------------------MailBOXes----------------------------------------------
 
I wanted to know how i could get the mails from the queue and pump it out to the machine 2. Can somebody help ?
 
thanks and regards.
ram




You can use the smtproutes control file to send domains on to another machine from the queue.
 
eg:
 
echo domain.com:[xxx.xxx.xxx.xxx{ >> /var/qmail/control/smtproutes
 
where domain.com is the domain to send to machine2 and xxx.xxx.xxx.xxx is the IP address of machine2
 
Regards,
 
Charles Warwick
-----Original Message-----
From: RamKumar [mailto:[EMAIL PROTECTED]]
Sent: Wednesday, 15 November 2000 3:47 PM
To: [EMAIL PROTECTED]
Subject: Help Required .....

My proposed setup is something like this. clients connect for smtp and pop to this machine mach1. When i receive a mail from remote or from local, it goes through the usual routine of checking for receipt host and other things and writes to the qmail queue. From the queue the mail has to be taken and sent to the machine 2 (where i do some checking for virus and spam) and put it in the mailboxes which are shared by both these machines machine1 and machine 2.
 
 
                       Machine1 ---------------------------------------------------------------------------------- Machine2
                             |                                                                                                                       |
                             |                                                                                                                       |
                             |                                                                                                                       |
                             ------------------------------------MailBOXes----------------------------------------------
 
I wanted to know how i could get the mails from the queue and pump it out to the machine 2. Can somebody help ?
 
thanks and regards.
ram


Please Note:

The information contained in this email is confidential. If you are not the intended recipient, you may not disclose or use the information in this email in any way. If you have received this email in error, kindly notify the sender. The sender does not guarantee the integrity of this email or any attached files.





> Allowing patches is necessary, but it's not sufficient. Debian's
> Free Software Guidelines has a similar clause, and I see no other
> clause that DJB's licence conflicts with. If I go by your statement,
> why is qmail listed under the non-free section?

Ability to distribute binaries built from modified source would seem
to be the key issue.  From DFSG section 4:

        The license must explicitly permit distribution of software
        built from modified source code.

(As a note of personal preference, I think allowing "you can only
distribute the pristine source since patches" is a ridiculous
concession, and I don't consider software with such a license to be
"free" in the liberated sense at all.  But my personal preference
isn't especially relevant to this discussion.)




Dear all,

I'd upgraded my daemontools on qmail from version 0.53 to 0.7.
The file size for both /var/qmail/control/locals and rcpthosts exceeds
1M (this incl. around 65000 cobrands).
However using the new daemontool with svscan somehow prevent qmail from
running
with big locals and rcpthosts, i hv try to reducing the file size to
around 160K (around 10000 cobrands) and it works. However when i add
5000 cobrand more into the locals and rcpthosts, it crashes again.
The error shown when telneting port 25 as follows:

bash-2.03# telnet localhost 25
Trying 127.0.0.1...
Connected to localhost.
Escape character is '^]'.
421 unable to read controls (#4.3.0)
Connection closed by foreign host.

Now I'd role back to previous daemontools version 0.53, it works for a
day or two but now it comes up with the same error message again!!!!!!
I'm using SunOS 5.8, did someone has such an experience? Is it because
the locals and rcpthosts too large?
I'd be highly appreciated if someone can give me any suggestion.

(p.s. Please also cc to my email address.)

thanks,
Eric





Can you help me with use qmail analog ??? I have installed qmailanalog and
have log file without time stamps...

I think that i use incorrect syntaxes...


Daniel POGAČ
Tech. Support
TatraSoft Group s.r.o
Sibírska 4
83102 Bratislava
tel: +421-7-55574033
fax: +421-7-55566385
[EMAIL PROTECTED]




Reply via email to