Robin M. wrote:
I have also been considering setting this up. I was thinking of having a
globally shared mailbox which users can 'drag' spam into. The dragging
could also be a 'report as spam', or 'this is not spam' button.
Wouldn't it be nice if there was a sieve extension that fed messages
into
[EMAIL PROTECTED] wrote:
Dear user of Cmu.edu mailing system,
Our antivirus software has detected a large ammount of viruses outgoing
from your email account, you may use our free anti-virus tool to clean up
your computer software.
Further details can be obtained from attached file.
Here's the problem:
$ telnet mail.intellinetinc.com smtp
Trying 139.142.54.37...
Connected to h139-142-54-37.gtcust.grouptelecom.net.
Escape character is '^]'.
220 intellinetinc.com ESMTP Sendmail 8.12.4/8.12.4; Thu, 23 Jan 2003
01:28:23 -0700 (MST)
ehlo joe
250-intellinetinc.com Hello
Works fine for us. Tis nice not having to worry about running out
of inodes. ;-) (Using Solaris vxfs, BTW.)
Hah! I've been using vxfs for so long I'd completely forgotten
about having to pre-allocate indodes! Oh bugger, another thing
to miss when I have to stop using UnixWare.
Title: 9800¶àÍòÈ«¹úÓÊÖ·×Ü¿â
What kind of anti-spam is this list
using? It doesn't seem to be
working too well.
- Original Message -
From:
[EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Wednesday, January 05, 2000 1:08
PM
Subject:
We're using vxfs on solaris, taking a snapshot of the applicable
filesystem, backing up the filesystem, aned then deleting the
snapshot.
This leads to perfect consistancy, though it does require the
creation of a snapshot on a live system.
That's what I do with vxfs on UnixWare.
What's
I'm probably misremembering something from our testing, since the
load created by running gzip for a few hours is definately more
than any brief load spike while a snapshot was created.
How are you doing the actual backup? I cannot recommend vxdump
too highly, it is rather awkward to use but
privileges. Since all the mailboxes are owned by the Cyrus user, what
would be more secure of a system that just does mail delivery woulkd
be a hack to sendmail so that once it attaches to port 25 it drops root
and runs as the Cyrus user. Show me a hack like that, and Cyrus wins
hands
Rob Tanner [EMAIL PROTECTED] writes:
[ re cyrus vs UW imap security ]
The big issue, however, is sendmail. And ny effort to hack through
your mail system via your email system (i.e., through port 25) goes
through sendmail before Cyrus ever sees it, and most of those attacks
are designed
So, do people who run cyrus imapd usualy use the db_recover/db_checkpoint
utilities? db_deadlock?
Anyone have a nice startup/shutdown script?
--
John Hughes [EMAIL PROTECTED],
CalvaEDI SA.Tel: +33-1-4313-3131
66 rue du Moulin de la Pointe
10 matches
Mail list logo