Les Mikesell said:
> Do you think we can get enough people to do that to convince the
> qmail author that the SMTP design really does have good reasons
> for handling multiple recipients per message?
People have been trying to get him to change qmail for years.
Doubtful.
He generally rejects all p
Nels Lindquist said:
> Hey, there's absolutely nothing wrong with "defense in depth". :-)
If its a mail relay you can also lockdown sendmail to only allow writes to
a subdirectory. So a sendmail exploit won't get you anywhere, I think.
dnl # SAFE_FILE_ENV: [undefined] If set, sendmail will do a c
Bill Maidment wrote:
Hi
Is it possible that since moving the call to the virus scanners from
the mimedefang-filter perl script to the C code, that somehow the
virus scanners are not always being called?
Oops. Forget that comment about the C code. It was moved to the
mimedefang.pl perl sc
Hi
My set up is RedHat 9, sendmail-8.12.8-9.90, MimeDefang-2.42,
File-Scan-1.02, and ClamAV-0.70 (with freshclam updating).
Because File-Scan identifies the NetSky virus and variants with that
name and ClamAV identifies the same viruses as SomeFool, I would have
expected the first virus scanne
On 20 Apr 2004 at 11:32, [EMAIL PROTECTED] wrote:
> Thanks. This may be slightly moot, now that I think about it. The server
> sits behind a firewall that only has port 25 open from the outside world.
> Port 80 is open only to the inside, and SSH is only open to the IP address
> of computer,
On 20 Apr 2004 at 11:28, Murat Isik wrote:
> within mimedefang itself, not on sendmail. I am trying to do this since I
> will exclude some domains from spam checking like:
You *can* do this in MIMEDefang, but it's probably more efficient to
do it in Sendmail. You'll need "feature(`delay_checks'
Yeah, I try to delete it, when I post but I guess I missed it.
Jimmy Hayes
-Original Message-
From: David F. Skoll [mailto:[EMAIL PROTECTED]
Sent: Tuesday, April 20, 2004 8:57 AM
To: [EMAIL PROTECTED]
Subject: Useless disclaimer (was RE: [Mimedefang] sendmail not working
after mimedefa
sub filter_relay {
my ( $ip, $name, $helo) = @_;
if (relay_is_blacklisted($ip, 'sbl.spamcop.net')) {
return('REJECT', 'You are listed in sbl.spamcop.net, see url=$ip for
more
details);
}
}
Bryan Martin
- Original Message -
From: "Murat I
On Tue, 20 Apr 2004, Jimmy Hayes wrote:
> THIS MESSAGE, TOGETHER WITH ANY ATTACHMENTS, IS INTENDED ONLY FOR THE
> USE OF THOSE TO WHOM IT IS ADDRESSED [...]
You are aware that this list is archived in several places? :-)
Regards,
David.
___
Visit http
Cool thanks, I'll go checkout the Archives.
Jimmy Hayes
Systems Administrator
Verilet, HealthCare IT
1-858-617-6331
Fax 1-858-617-6351
www.verilet.com
THIS MESSAGE, TOGETHER WITH ANY ATTACHMENTS, IS INTENDED ONLY FOR THE
USE OF THOSE TO WHOM IT IS ADDRESSED AND
No no - I think people misunderstand...
in Sendmail, RCPT TO throttle doesn't occur with lots of rcpt to commands.. it
happens when more than the user threshold of BAD recpt to's is crossed.
I have mine set for 2.
I have 15 people on my server... and between 2 of us, we block > 5000 spams per
[EMAIL PROTECTED] wrote on 04/20/2004 10:11:57
AM:
> > Excellent point. As a linux learner, how do I do this?
>
> Bone up on pam. Here's an example...
>
> http://www.linux.ucla.edu/pipermail/linux/2000-November/004102.html
Thanks. This may be slightly moot, now that I think about it. The
Am Di, den 20.04.2004 schrieb Jimmy Hayes um 16:38:
> Cool, when you say headers I assume you mean in the files /var/mail/user
> and /var/log/maillog. I can see the x-scanned there. However all my mail
> including spam Is being received no problem. What should I do to block
> it? Is it possible to
[EMAIL PROTECTED] wrote on 04/20/2004 10:53:50
AM:
> What hardware & O/S are you using? For example, on Sun w/ Solaris 8 or
> later, just hitting the power switch can allow a non-root user to do
> a controlled shutdown. Check the man page for your /etc/inittab and
> see if it has a POWERFAIL acti
On Tue, 2004-04-20 at 08:01, Ben Kamen wrote:
> To mention again - I wrote a TCL script that watches for "RCPT TO"
> flooding which IS a settable thing in sendmail - as soon as the log
> message "Possible RCPT TO flooding, throttling" (or whatever it is)
> comes through the log, the script does
> -Original Message-
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] On
> Behalf Of Jimmy Hayes
>
> Cool, when you say headers I assume you mean in the files
> /var/mail/user
> and /var/log/maillog. I can see the x-scanned there. However
> all my mail
> including spam Is being re
On Tue, 20 Apr 2004, David F. Skoll wrote:
> > As a public service, I would like to tar pit connections delivering
> > various worms or spam.
>
> This feature will never make it into MIMEDefang. [...]
Thank you and others for pointing out that tar pitting in MIMEDefang is a
bad idea.
You (and ot
[EMAIL PROTECTED] wrote:
I need to develop a procedure to allow a non-priveledged user (computer
room operator) to shut down my mail filter systems in case of power
failure and the large room UPS running out of power.
What hardware & O/S are you using? For example, on Sun w/ Solaris 8 or
later
Cool, when you say headers I assume you mean in the files /var/mail/user
and /var/log/maillog. I can see the x-scanned there. However all my mail
including spam Is being received no problem. What should I do to block
it? Is it possible to send all spam to a mailbox to analyze?
Thanks,
Jimmy Haye
>> Dont forget to also restrict logins for that account to just the
>> physical console. You dont want people being able to telnet in
>> to do this.
> Excellent point. As a linux learner, how do I do this?
Bone up on pam. Here's an example...
http://www.linux.ucla.edu/pipermail/linux/2000-
[EMAIL PROTECTED] wrote on 04/20/2004 09:27:12
AM:
> Dont forget to also restrict logins for that account to just the
physical
> console. You dont want people being able to telnet in to do this.
Excellent point. As a linux learner, how do I do this?
_
Hello,
I am using mimedefang 2.39 on FC1 machine successfully and I am really happy
with it. What I am wondering is that is there a way or code to use
sendmail's dnsbl checks like
FEATURE(dnsbl,`bl.spamcop.net', `554 Spam blocked see:
http://spamcop.net/bl.shtml?$&{client_addr}')dnl
FEATURE(dnsbl
Make the special login shell the shutdown program (or shutdown script)
or you can use sudo to accomplish the same thing.
On Tue, 2004-04-20 at 05:49, [EMAIL PROTECTED] wrote:
> I need to develop a procedure to allow a non-priveledged user (computer
>
>
>
>
Dont forget to also restrict logins for that account to just the physical
console. You dont want people being able to telnet in to do this.
As for the post regarding control-alt-delete "and then powering down before
it reboots", any production Linux server should have it's "3-finger salute"
comme
I think this is what sudo is for. There are ways to configure it to allow
for a specific user to run a specific command as another user.
So you should be able to configure it to allow a user to run only shutdown
Regards,
KAM
> I need to develop a procedure to allow a non-priveledged user (compu
On Tue, 20 Apr 2004 [EMAIL PROTECTED] wrote:
> I need to develop a procedure to allow a non-priveledged user (computer
> room operator) to shut down my mail filter systems in case of power
> failure and the large room UPS running out of power.
If the operator has physical access to the machine, h
Dave's right...
To mention again - I wrote a TCL script that watches for "RCPT TO"
flooding which IS a settable thing in sendmail - as soon as the log
message "Possible RCPT TO flooding, throttling" (or whatever it is)
comes through the log, the script doesn't tar pit them, it blackhole's
them
I need to develop a procedure to allow a non-priveledged user (computer
room operator) to shut down my mail filter systems in case of power
failure and the large room UPS running out of power.
I was think of giving them a special login that would initiate the shut
down. How would this be imple
--On Monday, April 19, 2004 8:17 PM -0700 Jeffrey Goldberg
<[EMAIL PROTECTED]> wrote:
As a public service, I would like to tar pit connections delivering
various worms or spam.
So in filter_end, I would like to have functions like
action_tarpit_discard()
action_tarpit_bounce()
action_tarpu
On Mon, 19 Apr 2004, Jeffrey Goldberg wrote:
> As a public service, I would like to tar pit connections delivering
> various worms or spam.
This feature will never make it into MIMEDefang. Tarpitting needs to
be done at the Sendmail level, or (more appropriately) at the kernel
level.
By the tim
El lun, 19-04-2004 a las 19:28, David F. Skoll escribió:
> On Mon, 19 Apr 2004, Administrador DyR wrote:
>
> > The last week I received a typical mail-delivery error-message caused by
> > the Netsky virus. The notifying message had, as attached message, the
> > whole original message, and this one
31 matches
Mail list logo