Here is a list of junk subject patterns in case someone is interested.
Alain
junkMailPatterns.gz
Description: Binary data
Can the mailing list software add a X-Subscribed : yes/no in the
mail headers ? Then people decide to filter it out or not.
Alain
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Here is a list of junk subject patterns in case someone is interested.
Alain
junkMailPatterns.gz
Description: Binary data
Can the mailing list software add a X-Subscribed : yes/no in the
mail headers ? Then people decide to filter it out or not.
Alain
On Thu, 10 Jun 2004 18:58:33 +1000
Russell Coker [EMAIL PROTECTED] wrote:
For mailing lists this can be achieved by making the list subscriber-only.
For individual accounts such behaviour is very anti-social as it results in
confirmation messages being sent in response to virus messages.
On Thu, 10 Jun 2004 18:58:33 +1000
Russell Coker [EMAIL PROTECTED] wrote:
For mailing lists this can be achieved by making the list subscriber-only.
For individual accounts such behaviour is very anti-social as it results in
confirmation messages being sent in response to virus messages.
On Thu, 16 Oct 2003 14:02:23 -0500
Micah Anderson [EMAIL PROTECTED] wrote:
Pretty exciting... is there any place that we can track the progress
of this? I'm very interested to make an assessment of what is going on
to determine if I should just patch the existing logcheck so that it
stops
On Thu, 16 Oct 2003 14:02:23 -0500
Micah Anderson [EMAIL PROTECTED] wrote:
Pretty exciting... is there any place that we can track the progress
of this? I'm very interested to make an assessment of what is going on
to determine if I should just patch the existing logcheck so that it
stops
Micah Anderson wrote:
Speaking of which, has anyone found a way to configure the active
system attack key words? There is a user on my system whose email has
the word attacK' in it so that triggers logcheck, and I've tried
every different exclusion file and regexp there is to make it ignore
it,
Micah Anderson wrote:
Speaking of which, has anyone found a way to configure the active
system attack key words? There is a user on my system whose email has
the word attacK' in it so that triggers logcheck, and I've tried
every different exclusion file and regexp there is to make it ignore
it,
On Mon, 16 Jun 2003 09:05:20 +1000
Mark Devin [EMAIL PROTECTED] wrote:
Jun 16 04:36:02 jack sshd[20026]: Connection from 212.202.204.149 port 2323
Jun 16 04:36:03 jack sshd[20027]: Connection from 212.202.204.149 port 2810
Jun 16 04:36:04 jack sshd[20027]: scanned from 212.202.204.149 with
On Mon, 16 Jun 2003 09:05:20 +1000
Mark Devin [EMAIL PROTECTED] wrote:
Jun 16 04:36:02 jack sshd[20026]: Connection from 212.202.204.149 port 2323
Jun 16 04:36:03 jack sshd[20027]: Connection from 212.202.204.149 port 2810
Jun 16 04:36:04 jack sshd[20027]: scanned from 212.202.204.149 with
On Tue, 06 May 2003 13:07:24 -0500
Mark Edgington [EMAIL PROTECTED] wrote:
it doesn't matter if others are
connecting to port 80, etc. while he is doing these connections, as long as
no-one
else is trying to connect to any of the ports in the trigger-sequence list --
this is
the only
On Wed, 23 Apr 2003 15:17:03 +0100
David Ramsden [EMAIL PROTECTED] wrote:
I'm building a 'secure' server.
I downloaded the 2.4.20 kernel source from kernel.org and patched with
grsecurity (latest patch).
I also disabled loadable modules or any module support in the kernel for
added
On Sat, 15 Mar 2003 20:24:04 +0100
Arnaud Fontaine [EMAIL PROTECTED] wrote:
Hello everybody,
I have installed a chroot environment on my web server under a Debian Woody in
/var/services/chroot/sshs.
/etc/passwd :
sshd:x:100:65534::/var/run/sshd:/bin/false
On Fri, 03 Jan 2003 18:19:43 +0100
Stefano Salvi [EMAIL PROTECTED] wrote:
Makejail from testing has a script about apache, but does it support Tomcat
and PHP4?
And how about CGIs?
It supports php and CGIs, I've tested it with a search engine with php/mysql,
I'm about to use it for phpnuke.
On Mon, 18 Nov 2002 22:31:31 -0800
Vince Hillier [EMAIL PROTECTED] wrote:
It could be something more also, compare the md5sum of the netstat binary with a
known safe version
And a safe version of md5sum too !
Alain
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of
On Mon, 18 Nov 2002 22:31:31 -0800
Vince Hillier [EMAIL PROTECTED] wrote:
It could be something more also, compare the md5sum of the netstat binary
with a known safe version
And a safe version of md5sum too !
Alain
On Tue, 22 Oct 2002 23:26:55 +0700
Indra Kusuma [EMAIL PROTECTED] wrote:
# Yes, jailtool takes Debian Package Dependencies and/or CPAN .packlist
# files. I didn't know about 'makejail', I think I'll have a look at it...
theres also another one called jailer, but if you want to secure your
On Tue, 22 Oct 2002 23:26:55 +0700
Indra Kusuma [EMAIL PROTECTED] wrote:
# Yes, jailtool takes Debian Package Dependencies and/or CPAN .packlist
# files. I didn't know about 'makejail', I think I'll have a look at it...
theres also another one called jailer, but if you want to secure your
Packets on port 0 are invalid and like packets with private IPs or bad TCP
flags,
they can be used for fingerprinting the target system.
I don't see any other reason to see a packet on port 0.
Alain
Sorry for the copy-paste in the webmail to the wrong message
J'essaie de patcher le noyau 2.4.18 en 2.4.19 (pour récupérer le
support son de mon portable).
J'ai eu des problèmes aussi avec ce patch, il me semble que quand ca ne
marche pas sans aucun problème il vaut mieux recharger un noyau tout neuf.
Alain
On Tue, 25 Jun 2002 14:50:30 + (UTC)
Rob Andrews [EMAIL PROTECTED] wrote:
Oh, the package created an 'sshd' user, and set it's homedir to
$HOMEDIRS/sshd, but didn't create the homedir itself. Since there isn't any
PoC code to test this with, I don't know how the chroot will end up.
On 22 Jun 2002 03:20:53 +0200
Guille -bisho- [EMAIL PROTECTED] wrote:
I'm worried about the serious bug found in Apache reciently.
Debian currently has only provided a patch for the stable version.
Anybody knows were I can get preliminar packages or something like that
of apache 1.3.26?
On Sat, 22 Jun 2002 13:22:19 + (UTC)
Martin WHEELER [EMAIL PROTECTED] wrote:
I've installed unstable packages on woody, it runs fine.
apt-get -t unstable install apache apache-common
[EMAIL PROTECTED]:~# apt-get -t unstable install apache apache-common
Reading Package Lists...
On Fri, 24 May 2002 15:04:50 +0200 (MET DST)
Lars Roland Kristiansen [EMAIL PROTECTED] wrote:
Hi i have configuret postfix, pop-before-smpt and ipop3 (ssl). On a debian
mail server. I have 200 users and whant some new more secure passwords
(not to long though). Is there a simple way to
On Fri, 24 May 2002 15:04:50 +0200 (MET DST)
Lars Roland Kristiansen [EMAIL PROTECTED] wrote:
Hi i have configuret postfix, pop-before-smpt and ipop3 (ssl). On a debian
mail server. I have 200 users and whant some new more secure passwords
(not to long though). Is there a simple way to
On Mon, 22 Apr 2002 22:35:53 +1000
Ian Cumming [EMAIL PROTECTED] wrote:
Marcin,
I've come across this problem too. I think i searched freshmeat.net, and
found a few scripts which did the trick - however I wasn't confident
enough to put them into place.
Is www a priority? You could
On Tue, 19 Feb 2002 13:18:14 +0100 (CET)
Attila Nagy [EMAIL PROTECTED] wrote:
Hello,
http://www.floc.net/makejail/
There is also a similar tool, called jailer.
See: http://www.balabit.hu/downloads/jailer/
Hi, I've seen it, it uses debian package.list files and package
dependencies,
On Tue, 19 Feb 2002 15:05:18 +0100
Davy Gigan [EMAIL PROTECTED] wrote:
Alain Tesio writes:
Hi, I'm releasing the first version of makejail
I've successfully tested your makejail with syslog-ng (i'm currently
running two syslog-ng processes, one of them chrooted and listening
to udp
On Tue, 19 Feb 2002 13:18:14 +0100 (CET)
Attila Nagy [EMAIL PROTECTED] wrote:
Hello,
http://www.floc.net/makejail/
There is also a similar tool, called jailer.
See: http://www.balabit.hu/downloads/jailer/
Hi, I've seen it, it uses debian package.list files and package
dependencies,
On Tue, 19 Feb 2002 15:05:18 +0100
Davy Gigan [EMAIL PROTECTED] wrote:
Alain Tesio writes:
Hi, I'm releasing the first version of makejail
I've successfully tested your makejail with syslog-ng (i'm currently
running two syslog-ng processes, one of them chrooted and listening
to udp
Hi, I'm releasing the first version of makejail
A short description is:
The objective of makejail is to help an administrator creating
and updating a chroot jail with short configuration files.
Makejails attempts to guess and install into the jail all files
required by the daemon.
You can find
Hi, I'm releasing the first version of makejail
A short description is:
The objective of makejail is to help an administrator creating
and updating a chroot jail with short configuration files.
Makejails attempts to guess and install into the jail all files
required by the daemon.
You can find
Hi, I didn't look at your problem precisely,
I'm writing a script to chroot services automatically,
I've tested it with bind9, here is the log and the
files I have in the jail, it looks to work.
Hope this helps, I'll release the script soon.
Alain
bind9.find
Description: Binary data
On Wed, 13 Feb 2002 20:26:11 +0100
Marcus Frings [EMAIL PROTECTED] wrote:
Huh, you've put quite much in the jail. I wonder why this might be
necessary since the HOWTO just suggests to put very few files like the
configuration and zone data files in the chroot jail. I'll try to
resolve the
Hi, I didn't look at your problem precisely,
I'm writing a script to chroot services automatically,
I've tested it with bind9, here is the log and the
files I have in the jail, it looks to work.
Hope this helps, I'll release the script soon.
Alain
bind9.find
Description: Binary data
On Wed, 13 Feb 2002 20:26:11 +0100
Marcus Frings [EMAIL PROTECTED] wrote:
Huh, you've put quite much in the jail. I wonder why this might be
necessary since the HOWTO just suggests to put very few files like the
configuration and zone data files in the chroot jail. I'll try to
resolve the
You can telnet to relay-test.mail-abuse.org to check
if your machine relays mails.
Alain
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
You can telnet to relay-test.mail-abuse.org to check
if your machine relays mails.
Alain
Oystein Viggen [EMAIL PROTECTED] wrote on 14/01/2002 (15:24) :
:0
* ^Content-Type: text/html|\
Look here: ^
^Subject:.*=\?ks_c_5601-1987\?
Spambox
You should also filter on:
Content-Type: text/html; charset=ks_c_5601-1987
Or just use spamassassin (package in sid and
Oystein Viggen [EMAIL PROTECTED] wrote on 14/01/2002 (15:24) :
:0
* ^Content-Type: text/html|\
Look here: ^
^Subject:.*=\?ks_c_5601-1987\?
Spambox
You should also filter on:
Content-Type: text/html; charset=ks_c_5601-1987
Or just use spamassassin (package in sid and
On Sun, 30 Dec 2001 18:53:38
[EMAIL PROTECTED] wrote:
I found this in message log,what it is
Dec 30 06:50:55 debian syslogd 1.3-3#33.1: restart.
Dec 30 07:13:36 debian -- MARK --
Dec 30 07:33:36 debian -- MARK --
Dec 30 07:53:36 debian -- MARK --
Dec 30 08:13:36 debian -- MARK --
Dec 30
My procmail rules catched the initial spam but not
the bunch of usual and useless replies.
Alain
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
My procmail rules catched the initial spam but not
the bunch of usual and useless replies.
Alain
46 matches
Mail list logo