with that minimally invasive approach.
Regards,
Thomas
--
supp...@ibh.de Tel. +49 351 477 77 30
www.ibh.de Fax +49 351 477 77 39
---
Dipl.-Ing. Thomas Liske
Netzwerk- und System
Re,
Lupe Christoph wrote:
On Monday, 2009-08-10 at 14:35:06 +0200, Bernhard R. Link wrote:
* Lupe Christoph l...@lupe-christoph.de [090810 13:53]:
On Monday, 2009-08-10 at 13:46:38 +0200, Thomas Liske wrote:
last week, there was an article on heise security about MTAs[1] which
relay mails
. +49 351 477 77 30
www.ibh.de Fax +49 351 477 77 39
---
Dipl.-Ing. Thomas Liske
Netzwerk- und System-Design
IBH IT-Service GmbH Amtsgericht Dresden
Gostritzer Str. 61-63
Re,
#Lupe Christoph wrote:
On Monday, 2009-08-10 at 13:46:38 +0200, Thomas Liske wrote:
last week, there was an article on heise security about MTAs[1] which
relay mails for hosts having a reverse resolution of 'localhost'. Doing
a small test shows that sendmail on etch seems
Re,
Jan de Groot wrote:
On Mon, 2009-08-10 at 14:03 +0200, Thomas Liske wrote:
if an access line like:
Connect:localhost RELAY
turns a MTA into an Open Relay than I would prefere a DSA, since the
ACL
implementation is broken IMHO.
As long as reverse DNS can be faked, I would
Hi,
you might have a look at apt-dater[1] (part of unstable [2]). It is uses
SSH to retrieve package informations from client hosts using public key
authentification and uses sudo to call apt-get/sudo. It is a ncurses
based CLI, but it has a report function to retrieve distri name
version,
6 matches
Mail list logo