[Mimedefang] OT: sendmail dnsbl
All, Is there a way to change the port number that sendmail's dnsbl and endnsbl features use? I run a local rbldnsd server and rsync some blacklists. I want to know which list rejected an IP, so cant just have one FEATURE(`dnsbl') in sendmail.mc. Rather than having to bind a separate IP address to the rbldnsd server for every list, i'd rather just have rbldnsd listen on a differet port for each list. Anyone doing this? thanks for any ideas... ray -- =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= Ray DeJean http://www.r-a-y.org Systems EngineerSoutheastern Louisiana University IBM Certified Specialist AIX Administration, AIX Support =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= ___ NOTE: If there is a disclaimer or other legal boilerplate in the above message, it is NULL AND VOID. You may ignore it. Visit http://www.mimedefang.org and http://www.roaringpenguin.com MIMEDefang mailing list MIMEDefang@lists.roaringpenguin.com http://lists.roaringpenguin.com/mailman/listinfo/mimedefang
Re: [Mimedefang] OT: sendmail dnsbl
[EMAIL PROTECTED] wrote on 04/07/2006 11:13:12 AM: All, Is there a way to change the port number that sendmail's dnsbl and endnsbl features use? I run a local rbldnsd server and rsync some blacklists. I want to know which list rejected an IP, so cant just have one FEATURE(`dnsbl') in sendmail.mc. Rather than having to bind a separate IP address to the rbldnsd server for every list, i'd rather just have rbldnsd listen on a differet port for each list. Anyone doing this? thanks for any ideas... Are you going to log and/or add to each message's header or will you be checking it manually if there is a question? If the latter, use something like the spam database lookup at http://dnsstuff.com ___ NOTE: If there is a disclaimer or other legal boilerplate in the above message, it is NULL AND VOID. You may ignore it. Visit http://www.mimedefang.org and http://www.roaringpenguin.com MIMEDefang mailing list MIMEDefang@lists.roaringpenguin.com http://lists.roaringpenguin.com/mailman/listinfo/mimedefang
Re: [Mimedefang] OT: sendmail dnsbl
On Fri, 7 Apr 2006 [EMAIL PROTECTED] wrote: Are you going to log and/or add to each message's header or will you be checking it manually if there is a question? If the latter, use something like the spam database lookup at http://dnsstuff.com No it will be logged. I have a script that runs through the maillog and makes some rrdtool graphs, and i want stats on the number of hits for each rbl. So i need sendmail to log a different entry for each rbl. ray -- =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= Ray DeJean http://www.r-a-y.org Systems EngineerSoutheastern Louisiana University IBM Certified Specialist AIX Administration, AIX Support =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= ___ NOTE: If there is a disclaimer or other legal boilerplate in the above message, it is NULL AND VOID. You may ignore it. Visit http://www.mimedefang.org and http://www.roaringpenguin.com MIMEDefang mailing list MIMEDefang@lists.roaringpenguin.com http://lists.roaringpenguin.com/mailman/listinfo/mimedefang
Re: [Mimedefang] OT: sendmail dnsbl
[EMAIL PROTECTED] wrote on 04/07/2006 11:34:19 AM: No it will be logged. I have a script that runs through the maillog and makes some rrdtool graphs, and i want stats on the number of hits for each rbl. So i need sendmail to log a different entry for each rbl. You might research how combined lists such as Spamhaus' XBL do this. http://www.spamhaus.org/faq/answers.lasso?section=Spamhaus%20XBL#136 You can then log the returned address and parse it to determine which RBL(s) it was listed on. ___ NOTE: If there is a disclaimer or other legal boilerplate in the above message, it is NULL AND VOID. You may ignore it. Visit http://www.mimedefang.org and http://www.roaringpenguin.com MIMEDefang mailing list MIMEDefang@lists.roaringpenguin.com http://lists.roaringpenguin.com/mailman/listinfo/mimedefang
Re: [Mimedefang] Wiki updates
[EMAIL PROTECTED] wrote: Anyone else have any comments about the example or the strategy? Very nice. If anyone ends up using it, and/or making improvements on it, please report your experience to me or the list. Thanks. ___ NOTE: If there is a disclaimer or other legal boilerplate in the above message, it is NULL AND VOID. You may ignore it. Visit http://www.mimedefang.org and http://www.roaringpenguin.com MIMEDefang mailing list MIMEDefang@lists.roaringpenguin.com http://lists.roaringpenguin.com/mailman/listinfo/mimedefang
OT - Re: [Mimedefang] Phishing Question
- Original Message - From: Mark Johnson [EMAIL PROTECTED] Kevin A. McGrail wrote: Great idea but unfeasible. In Virginia, this would be considered malicious programming and probably computer trespass as well :-( I used to live in Virginia and I don't miss that place. I cringe even when I have to drive through it :) Only place I know that you could hinder the efforts of a criminal organization and spend 10x more time in jail than they do... I used to have a similar view that it was too conservative in Virginia as well but I've grown older and seen more reasons that the conservative stance just works. I also haven't heard of many cases where people were convicted and given unreasonable sentences despite the laws that were on the books for technology. For example, people used to have firewalls that when attacked would launch a counterattack automatically. Sounded like a great idea until the majority of attacks began occurring from owned machines or people would forge attacks to create a DoS. Same thing happened with viruses. Great idea to notify people that they have sent you a virus until you realize that you are actually sometimes part of a DoS because the headers are all forged. And, I also remember when programmers would add malicious code to their own programs so that if people pirated it, the software would do nasty things to the computer's hard drive or the files. All well and good until technology changed or parallel port timing went wonky a few times and innocent people's hard drives were wiped and 3D studio meshes were corrupted. Anyway, the philosophy of two wrongs don't make a right is a sane solution that has lasted through more than a decade of changes in the technology field which is pretty good when you think about it. Regards, KAM ___ NOTE: If there is a disclaimer or other legal boilerplate in the above message, it is NULL AND VOID. You may ignore it. Visit http://www.mimedefang.org and http://www.roaringpenguin.com MIMEDefang mailing list MIMEDefang@lists.roaringpenguin.com http://lists.roaringpenguin.com/mailman/listinfo/mimedefang
Re: [Mimedefang] Phishing Question
On Thu, 2006-04-06 at 15:23, John Nemeth wrote: The flip side to this is that the day when people are held responsible for not securing their servers and allowing them to be used to attack others is probably not very far off. I can see this be similar to attractive nuisance laws. I always wonder what things would be like today if the blame for the original 1987 internet worm had been placed on the vendor who sold the vulnerable software instead of pretending that everyone on the network could be expected to be honest and friendly. It might have been painful for a short time as the problems were cleaned up, but then another vendor would not have been able to flood the world with software with no consideration about security at all. In any case it shouldn't be left as a problem for the end user to fix their software distribution. -- Les Mikesell [EMAIL PROTECTED] ___ NOTE: If there is a disclaimer or other legal boilerplate in the above message, it is NULL AND VOID. You may ignore it. Visit http://www.mimedefang.org and http://www.roaringpenguin.com MIMEDefang mailing list MIMEDefang@lists.roaringpenguin.com http://lists.roaringpenguin.com/mailman/listinfo/mimedefang