Re: [qmailtoaster] Security - TLS/SSL ciphers

2014-03-26 Thread Peter Peltonen
Hi,

On Tue, Mar 25, 2014 at 2:27 AM, Eric Shubert  wrote:

> It came to my attention recently that the ciphers used by the stock QMT
> aren't as secure as they might be. In fact, QMT was simply using all
> available ciphers in no particular priority.
>
> The general intention of QMT is to be as secure as reasonably possible in
> the stock configuration, and if security is too tight for someone, then can
> deliberately relax the security configuration.
>
> With this in mind, I've modified the soon-to-be-offically-released qmail
> for COS6 to include the following cipher string:
> MEDIUM:HIGH:!SSLv2:!MD5:!RC4:!3DES
> If anyone needs something more lenient, they can adjust their
> tlsserverciphers file accordingly.
>
> For those of you on COS5 (or present COS6 hosts) who want to beef up their
> TLS/SSL security, the following command will do it:
> # openssl ciphers 'MEDIUM:HIGH:!SSLv2:!MD5:!RC4:!3DES' \
>>/var/qmail/control/tlsserverciphers
>

Thanks Eric, much appreciated!

One question: does qmail need to be restarted after issuing the openssl
command?

Regards,
Peter


Re: [qmailtoaster] Security

2010-02-08 Thread Phil Leinhauser


Aren't snapshots GREAT!!!

BTW: For anyone using VM with Windows
domain controllers, DO NOT snapshot DCs!  Very bad juju happens when
the old version comes back.

> To many more conflicts,
> Not worth the bother, glad I tested on a VM, just restore to a
previous
> snapshot.
> 
> 
> 
>
sysadmin wrote:
>> I am looking at installing ,
>>
Atomic Secured Linux,
>> On my Qmail-toaster box ( VM )
>>
>> On installation I get, a conflict with the
already installed version
>> of Clam AV,.
>> can I
just use rpm -e to remove ClamAV, as you would any other Linux
>> Version, or will it " break " the qmail install (
done with ISO install
>> )
>>
>>
Thanks
>>
>>
>>
-
>>
>> Qmailtoaster is sponsored by Vickers Consulting
Group
>> (www.vickersconsulting.com)
>>Vickers
Consulting Group offers Qmailtoaster support and
>>
installations.
>>  If you need professional help with your
setup, contact them today!
>>
-
>>
>> Please visit qmailtoaster.com for the latest
news, updates, and
>> packages.
>>  To
unsubscribe, e-mail:
>>
qmailtoaster-list-unsubscr...@qmailtoaster.com
>> For
additional commands, e-mail:
>>
qmailtoaster-list-h...@qmailtoaster.com
>>
>>
>>
>>
> 
> 
>
-
> Qmailtoaster is sponsored by Vickers Consulting Group
>
(www.vickersconsulting.com)
> Vickers Consulting Group offers
Qmailtoaster support and
> installations.
>   If you
need professional help with your setup, contact them today!
>
-
>  Please visit qmailtoaster.com for the latest news, updates,
and
> packages.
> 
>   To unsubscribe,
e-mail:
> qmailtoaster-list-unsubscr...@qmailtoaster.com
>
 For additional commands, e-mail:
>
qmailtoaster-list-h...@qmailtoaster.com
> 
> 
>


Re: [qmailtoaster] Security

2010-02-08 Thread Aleksander Podsiadły
Dnia 2010-02-08, o godz. 11:08:02
sysadmin  napisał(a):

> I am looking at installing ,
> Atomic Secured Linux,
> On my Qmail-toaster box ( VM )
What for, if You would like to be secure read it:
http://www.nsa.gov/ia/_files/factsheets/rhel5-pamphlet-i731.pdf
http://www.nsa.gov/ia/_files/os/redhat/rhel5-guide-i731.pdf


-- 
Pozdrawiam / Regards,
Aleksander Podsiadły
mail: a...@westside.kielce.pl
jid: a...@jabber.westside.kielce.pl
ICQ: 201121279
gg: 9150578
N:50.88409 S:20.58425

-
Qmailtoaster is sponsored by Vickers Consulting Group 
(www.vickersconsulting.com)
Vickers Consulting Group offers Qmailtoaster support and installations.
  If you need professional help with your setup, contact them today!
-
 Please visit qmailtoaster.com for the latest news, updates, and packages.

  To unsubscribe, e-mail: qmailtoaster-list-unsubscr...@qmailtoaster.com
 For additional commands, e-mail: qmailtoaster-list-h...@qmailtoaster.com




Re: [qmailtoaster] Security

2010-02-08 Thread sysadmin

To many more conflicts,
Not worth the bother, glad I tested on a VM, just restore to a previous 
snapshot.




sysadmin wrote:

I am looking at installing ,
Atomic Secured Linux,
On my Qmail-toaster box ( VM )

On installation I get, a conflict with the already installed version 
of Clam AV,.
can I just use rpm -e to remove ClamAV, as you would any other Linux 
Version, or will it " break " the qmail install ( done with ISO install )


Thanks


- 

Qmailtoaster is sponsored by Vickers Consulting Group 
(www.vickersconsulting.com)
   Vickers Consulting Group offers Qmailtoaster support and 
installations.

 If you need professional help with your setup, contact them today!
- 

Please visit qmailtoaster.com for the latest news, updates, and 
packages.
 To unsubscribe, e-mail: 
qmailtoaster-list-unsubscr...@qmailtoaster.com
For additional commands, e-mail: 
qmailtoaster-list-h...@qmailtoaster.com








-
Qmailtoaster is sponsored by Vickers Consulting Group 
(www.vickersconsulting.com)
   Vickers Consulting Group offers Qmailtoaster support and installations.
 If you need professional help with your setup, contact them today!
-
Please visit qmailtoaster.com for the latest news, updates, and packages.

 To unsubscribe, e-mail: qmailtoaster-list-unsubscr...@qmailtoaster.com

For additional commands, e-mail: qmailtoaster-list-h...@qmailtoaster.com




Re: [qmailtoaster] Security Holes?

2007-10-21 Thread toaster-admin
> In addition to setting up an SPF record, consider removing your catchall
> account configuration. Even with an SPF record, you can receive this type
> of
> bounce message. Many SMTP servers do not check the SPF record so they do
> not
> know that the from email address is a forgery and generate a bounce
> message.
> I was receiving many of these bounce messages every day, even with a
> proper
> SPF record.
>
> Regards,
> Tim

Thanks guys!

Tim,
--snip--

$TTL 86400

@   IN  SOA ns1.carolina-hosting.com. 
admin.carolina-customs.com. (
2007102101  ; serial number YYMMDDNN
28800   ; Refresh
7200; Retry
864000  ; Expire
86400   ; Min TTL
)

NS  ns1.carolina-hosting.com.
NS  ns2.carolina-hosting.com.
NS  ns3.carolina-hosting.com.

MX  10 mail.carolina-hosting.com.


$ORIGIN carolina-customs.com.

carolina-customs.comIN  A   68.159.106.99

@IN  A   68.159.106.99 ;added a @

*IN  A   68.159.106.99
ns1  IN  A   68.159.106.99
ns2  IN  A   68.159.106.99
ns3  IN  A   68.159.106.99

mail IN  A   68.159.106.99


carolina-customs.com. IN TXT "v=spf1 ip4:68.152.106.99 a mx
a:mail.carolina-hosting.com mx:mail.carolina-hosting.com ~all"
adsl-068-159-106-099.sip.gsp.bellsouth.net. IN TXT "v=spf1 a -all"
mail.carolina-customs.com. IN TXT "v=spf1 a -all"

--/snip--

Until I get my T1 setup, I've only got an adsl single ip right now
I'm trying to setup SPF on carolina-customs.com
My mail is on mail.carolina-hosting.com box

Does this zone look right to you?
Thanks
~RD




>
> - Original Message -
> From: <[EMAIL PROTECTED]>
> To: 
> Cc: 
> Sent: Sunday, October 21, 2007 12:18 PM
> Subject: Re: [qmailtoaster] Security Holes?
>
>
>>> What you are seeing might not have anything to do with your box.  If
>>> you
>>> do
>>> not have SPF records set up for your domain, anyone can send mail with
>>> your
>>> domain in the From address, claiming that it came from you.  When the
>>> spam
>>> hits an invalid email address, the bounce will come back to you, since
>>> you
>>> are the host of the domain in the "From" address.
>>>
>>> W
>>
>>
>>
>> Hummm,
>> You might have hit the nail on the head.
>> I did not setup any SPF.
>>
>> Thanks,
>> ~RD
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>>
>>> On 10/21/07, [EMAIL PROTECTED] <
>>> [EMAIL PROTECTED]> wrote:
>>>>
>>>> > [EMAIL PROTECTED] wrote:
>>>> >> Hello guys,
>>>> >> I run custom compiled Gentoo headless boxes for hosting. Qmail
>>>> Toaster
>>>> >> won
>>>> >> me over about a year ago. So I put CentOS/QT on another server just
>>>> for
>>>> >> mail only.
>>>> >>
>>>> >> I had to take my QT box offline when I kept getting bounces from
>>>> >> everywhere to my catchall account. Somehow one of my domains was
>>>> sending
>>>> >> mails like crazy from different "names"@mydomain.com.
>>>> >>
>>>> >> I've shut that box down and have been watching my firewall logs and
>>>> I
>>>> >> had
>>>> >> several ip's pounding port 25.
>>>> >>
>>>> >> Now I've started up another one of my backup servers and did a
>>>> complete
>>>> >> re-install.
>>>> >>
>>>> >> I've installed QT/CentOS from the QT - The Easy Way...
>>>> >> The only thing I have not did within the guide is setup any domain
>>>> keys
>>>> >> and I have my own firewall rules. Other than that, this is up and
>>>> >> running
>>>> >> out of the box.
>>>> >>
>>>> >> Any security holes or steps you guys can inform me about?
>>>> >>
>>>> >> I'm going to look at the wiki as soon as I get time.
>>>> >>
>>>> >
>>>> > Lots of good info on the wiki.
>>>> > There are not any security holes per se. If you have a rogue/badly
>>>> &g

Re: [qmailtoaster] Security Holes?

2007-10-21 Thread Tim Mancour
In addition to setting up an SPF record, consider removing your catchall 
account configuration. Even with an SPF record, you can receive this type of 
bounce message. Many SMTP servers do not check the SPF record so they do not 
know that the from email address is a forgery and generate a bounce message. 
I was receiving many of these bounce messages every day, even with a proper 
SPF record.


Regards,
Tim

- Original Message - 
From: <[EMAIL PROTECTED]>

To: 
Cc: 
Sent: Sunday, October 21, 2007 12:18 PM
Subject: Re: [qmailtoaster] Security Holes?



What you are seeing might not have anything to do with your box.  If you
do
not have SPF records set up for your domain, anyone can send mail with
your
domain in the From address, claiming that it came from you.  When the 
spam
hits an invalid email address, the bounce will come back to you, since 
you

are the host of the domain in the "From" address.

W




Hummm,
You might have hit the nail on the head.
I did not setup any SPF.

Thanks,
~RD













On 10/21/07, [EMAIL PROTECTED] <
[EMAIL PROTECTED]> wrote:


> [EMAIL PROTECTED] wrote:
>> Hello guys,
>> I run custom compiled Gentoo headless boxes for hosting. Qmail
Toaster
>> won
>> me over about a year ago. So I put CentOS/QT on another server just
for
>> mail only.
>>
>> I had to take my QT box offline when I kept getting bounces from
>> everywhere to my catchall account. Somehow one of my domains was
sending
>> mails like crazy from different "names"@mydomain.com.
>>
>> I've shut that box down and have been watching my firewall logs and I
>> had
>> several ip's pounding port 25.
>>
>> Now I've started up another one of my backup servers and did a
complete
>> re-install.
>>
>> I've installed QT/CentOS from the QT - The Easy Way...
>> The only thing I have not did within the guide is setup any domain
keys
>> and I have my own firewall rules. Other than that, this is up and
>> running
>> out of the box.
>>
>> Any security holes or steps you guys can inform me about?
>>
>> I'm going to look at the wiki as soon as I get time.
>>
>
> Lots of good info on the wiki.
> There are not any security holes per se. If you have a rogue/badly
> written PHP mailer script on one of your websites, that has nothing to
> do with Toaster, Qmail, or any other mailer program.
> You can throttle people on port 25 if you'd like. Check the wiki (it
may
> be in the archives, don't remember), but there's a firewall rule you
can
> add in that will deny connections from IPs that connect more than x
> number of times in y number of minutes.  This cuts down on the bots
some
> - I use it on some of my machines. You just have to be careful with
it.
> I have one client that has 75+ machines on a network, and they all set
> their Outlook to check for messages every 2 minutes which flagged them
> by this rule and blocked them for a while (too bad they're my most
> self-important client as well.). But that will all be a moot point
> if you have a spam-bot (PHP script or whatever) on your machine
anyway.
> You may just be seeing the bounces from the joe-job that was running
on
> your machine.
>
Thanks for the reply...
I'm sure it wasn't any php or script mailers.
The reason I asked about any security holes is none of the accounts were
showing up in admin, qmailadmin or vpopadmin etc. I run several servers
behind an ipcop linux firewall/router. I'm no guru at MTA's but I
forward
the mail ports to the mail server box.

Well thnks again,
I'll get to the wiki asap,
RD




-
 QmailToaster hosted by: VR Hosted <http://www.vr.org>
-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]








-
QmailToaster hosted by: VR Hosted <http://www.vr.org>
-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]





-
QmailToaster hosted by: VR Hosted <http://www.vr.org>
-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: [qmailtoaster] Security Holes?

2007-10-21 Thread toaster-admin
> What you are seeing might not have anything to do with your box.  If you
> do
> not have SPF records set up for your domain, anyone can send mail with
> your
> domain in the From address, claiming that it came from you.  When the spam
> hits an invalid email address, the bounce will come back to you, since you
> are the host of the domain in the "From" address.
>
> W



Hummm,
You might have hit the nail on the head.
I did not setup any SPF.

Thanks,
~RD











>
> On 10/21/07, [EMAIL PROTECTED] <
> [EMAIL PROTECTED]> wrote:
>>
>> > [EMAIL PROTECTED] wrote:
>> >> Hello guys,
>> >> I run custom compiled Gentoo headless boxes for hosting. Qmail
>> Toaster
>> >> won
>> >> me over about a year ago. So I put CentOS/QT on another server just
>> for
>> >> mail only.
>> >>
>> >> I had to take my QT box offline when I kept getting bounces from
>> >> everywhere to my catchall account. Somehow one of my domains was
>> sending
>> >> mails like crazy from different "names"@mydomain.com.
>> >>
>> >> I've shut that box down and have been watching my firewall logs and I
>> >> had
>> >> several ip's pounding port 25.
>> >>
>> >> Now I've started up another one of my backup servers and did a
>> complete
>> >> re-install.
>> >>
>> >> I've installed QT/CentOS from the QT - The Easy Way...
>> >> The only thing I have not did within the guide is setup any domain
>> keys
>> >> and I have my own firewall rules. Other than that, this is up and
>> >> running
>> >> out of the box.
>> >>
>> >> Any security holes or steps you guys can inform me about?
>> >>
>> >> I'm going to look at the wiki as soon as I get time.
>> >>
>> >
>> > Lots of good info on the wiki.
>> > There are not any security holes per se. If you have a rogue/badly
>> > written PHP mailer script on one of your websites, that has nothing to
>> > do with Toaster, Qmail, or any other mailer program.
>> > You can throttle people on port 25 if you'd like. Check the wiki (it
>> may
>> > be in the archives, don't remember), but there's a firewall rule you
>> can
>> > add in that will deny connections from IPs that connect more than x
>> > number of times in y number of minutes.  This cuts down on the bots
>> some
>> > - I use it on some of my machines. You just have to be careful with
>> it.
>> > I have one client that has 75+ machines on a network, and they all set
>> > their Outlook to check for messages every 2 minutes which flagged them
>> > by this rule and blocked them for a while (too bad they're my most
>> > self-important client as well.). But that will all be a moot point
>> > if you have a spam-bot (PHP script or whatever) on your machine
>> anyway.
>> > You may just be seeing the bounces from the joe-job that was running
>> on
>> > your machine.
>> >
>> Thanks for the reply...
>> I'm sure it wasn't any php or script mailers.
>> The reason I asked about any security holes is none of the accounts were
>> showing up in admin, qmailadmin or vpopadmin etc. I run several servers
>> behind an ipcop linux firewall/router. I'm no guru at MTA's but I
>> forward
>> the mail ports to the mail server box.
>>
>> Well thnks again,
>> I'll get to the wiki asap,
>> RD
>>
>>
>>
>>
>> -
>>  QmailToaster hosted by: VR Hosted 
>> -
>> To unsubscribe, e-mail: [EMAIL PROTECTED]
>> For additional commands, e-mail: [EMAIL PROTECTED]
>>
>>
>



-
 QmailToaster hosted by: VR Hosted 
-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: [qmailtoaster] Security Holes?

2007-10-21 Thread Warren Melnick
What you are seeing might not have anything to do with your box.  If you do
not have SPF records set up for your domain, anyone can send mail with your
domain in the From address, claiming that it came from you.  When the spam
hits an invalid email address, the bounce will come back to you, since you
are the host of the domain in the "From" address.

W

On 10/21/07, [EMAIL PROTECTED] <
[EMAIL PROTECTED]> wrote:
>
> > [EMAIL PROTECTED] wrote:
> >> Hello guys,
> >> I run custom compiled Gentoo headless boxes for hosting. Qmail Toaster
> >> won
> >> me over about a year ago. So I put CentOS/QT on another server just for
> >> mail only.
> >>
> >> I had to take my QT box offline when I kept getting bounces from
> >> everywhere to my catchall account. Somehow one of my domains was
> sending
> >> mails like crazy from different "names"@mydomain.com.
> >>
> >> I've shut that box down and have been watching my firewall logs and I
> >> had
> >> several ip's pounding port 25.
> >>
> >> Now I've started up another one of my backup servers and did a complete
> >> re-install.
> >>
> >> I've installed QT/CentOS from the QT - The Easy Way...
> >> The only thing I have not did within the guide is setup any domain keys
> >> and I have my own firewall rules. Other than that, this is up and
> >> running
> >> out of the box.
> >>
> >> Any security holes or steps you guys can inform me about?
> >>
> >> I'm going to look at the wiki as soon as I get time.
> >>
> >
> > Lots of good info on the wiki.
> > There are not any security holes per se. If you have a rogue/badly
> > written PHP mailer script on one of your websites, that has nothing to
> > do with Toaster, Qmail, or any other mailer program.
> > You can throttle people on port 25 if you'd like. Check the wiki (it may
> > be in the archives, don't remember), but there's a firewall rule you can
> > add in that will deny connections from IPs that connect more than x
> > number of times in y number of minutes.  This cuts down on the bots some
> > - I use it on some of my machines. You just have to be careful with it.
> > I have one client that has 75+ machines on a network, and they all set
> > their Outlook to check for messages every 2 minutes which flagged them
> > by this rule and blocked them for a while (too bad they're my most
> > self-important client as well.). But that will all be a moot point
> > if you have a spam-bot (PHP script or whatever) on your machine anyway.
> > You may just be seeing the bounces from the joe-job that was running on
> > your machine.
> >
> Thanks for the reply...
> I'm sure it wasn't any php or script mailers.
> The reason I asked about any security holes is none of the accounts were
> showing up in admin, qmailadmin or vpopadmin etc. I run several servers
> behind an ipcop linux firewall/router. I'm no guru at MTA's but I forward
> the mail ports to the mail server box.
>
> Well thnks again,
> I'll get to the wiki asap,
> RD
>
>
>
>
> -
>  QmailToaster hosted by: VR Hosted 
> -
> To unsubscribe, e-mail: [EMAIL PROTECTED]
> For additional commands, e-mail: [EMAIL PROTECTED]
>
>


Re: [qmailtoaster] Security Holes?

2007-10-21 Thread toaster-admin
> [EMAIL PROTECTED] wrote:
>> Hello guys,
>> I run custom compiled Gentoo headless boxes for hosting. Qmail Toaster
>> won
>> me over about a year ago. So I put CentOS/QT on another server just for
>> mail only.
>>
>> I had to take my QT box offline when I kept getting bounces from
>> everywhere to my catchall account. Somehow one of my domains was sending
>> mails like crazy from different "names"@mydomain.com.
>>
>> I've shut that box down and have been watching my firewall logs and I
>> had
>> several ip's pounding port 25.
>>
>> Now I've started up another one of my backup servers and did a complete
>> re-install.
>>
>> I've installed QT/CentOS from the QT - The Easy Way...
>> The only thing I have not did within the guide is setup any domain keys
>> and I have my own firewall rules. Other than that, this is up and
>> running
>> out of the box.
>>
>> Any security holes or steps you guys can inform me about?
>>
>> I'm going to look at the wiki as soon as I get time.
>>
>
> Lots of good info on the wiki.
> There are not any security holes per se. If you have a rogue/badly
> written PHP mailer script on one of your websites, that has nothing to
> do with Toaster, Qmail, or any other mailer program.
> You can throttle people on port 25 if you'd like. Check the wiki (it may
> be in the archives, don't remember), but there's a firewall rule you can
> add in that will deny connections from IPs that connect more than x
> number of times in y number of minutes.  This cuts down on the bots some
> - I use it on some of my machines. You just have to be careful with it.
> I have one client that has 75+ machines on a network, and they all set
> their Outlook to check for messages every 2 minutes which flagged them
> by this rule and blocked them for a while (too bad they're my most
> self-important client as well.). But that will all be a moot point
> if you have a spam-bot (PHP script or whatever) on your machine anyway.
> You may just be seeing the bounces from the joe-job that was running on
> your machine.
>
Thanks for the reply...
I'm sure it wasn't any php or script mailers.
The reason I asked about any security holes is none of the accounts were
showing up in admin, qmailadmin or vpopadmin etc. I run several servers
behind an ipcop linux firewall/router. I'm no guru at MTA's but I forward
the mail ports to the mail server box.

Well thnks again,
I'll get to the wiki asap,
RD




-
 QmailToaster hosted by: VR Hosted 
-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: [qmailtoaster] Security Holes?

2007-10-21 Thread Jake Vickers

[EMAIL PROTECTED] wrote:

Hello guys,
I run custom compiled Gentoo headless boxes for hosting. Qmail Toaster won
me over about a year ago. So I put CentOS/QT on another server just for
mail only.

I had to take my QT box offline when I kept getting bounces from
everywhere to my catchall account. Somehow one of my domains was sending
mails like crazy from different "names"@mydomain.com.

I've shut that box down and have been watching my firewall logs and I had
several ip's pounding port 25.

Now I've started up another one of my backup servers and did a complete
re-install.

I've installed QT/CentOS from the QT - The Easy Way...
The only thing I have not did within the guide is setup any domain keys
and I have my own firewall rules. Other than that, this is up and running
out of the box.

Any security holes or steps you guys can inform me about?

I'm going to look at the wiki as soon as I get time.
  


Lots of good info on the wiki.
There are not any security holes per se. If you have a rogue/badly 
written PHP mailer script on one of your websites, that has nothing to 
do with Toaster, Qmail, or any other mailer program.
You can throttle people on port 25 if you'd like. Check the wiki (it may 
be in the archives, don't remember), but there's a firewall rule you can 
add in that will deny connections from IPs that connect more than x 
number of times in y number of minutes.  This cuts down on the bots some 
- I use it on some of my machines. You just have to be careful with it. 
I have one client that has 75+ machines on a network, and they all set 
their Outlook to check for messages every 2 minutes which flagged them 
by this rule and blocked them for a while (too bad they're my most 
self-important client as well.). But that will all be a moot point 
if you have a spam-bot (PHP script or whatever) on your machine anyway. 
You may just be seeing the bounces from the joe-job that was running on 
your machine.




smime.p7s
Description: S/MIME Cryptographic Signature


Re: [qmailtoaster] security problem...

2005-12-01 Thread Nigel Reed
On Thu, Dec 01, 2005 at 03:36:11PM +0200, Erol KAHRAMAN wrote:
> 
> hi everybody,
> 
> I can connect to my qmail server from tcp 25 and send e-mail to
> [EMAIL PROTECTED] from [EMAIL PROTECTED] Think, if i can send e-mail to
> you, from your boss with the subject "you are free for a week" :))...
> Is there anyway to prevent this security hole.

It's an inherent weakness in the SMTP protocol. If your domain is
abc.net and you receive email for that domain, then anyone can send an
email to an @abc.net address. Surely you've received spam with a forged
mail from: line. 

Regards
Nigel
-- 
www.myoldcontacts.com - Tell your friends to tell their friends
www.sysadmininc.com  - Consultancy, Service, Sales, Networking...
www.british-expats.com - Connect with British Expats World Wide
www.kxez.com/shows_britishinvasion.php - 9-11pm Sunday. KXEZ 92.1 FM


"I reject your reality and substitute it with my own" --Adam Savage.

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]