[qmailadmin] Re: [vchkpw] question about autoresponder change

2003-09-16 Thread Tom Collins
On Tuesday, September 16, 2003, at 04:08 PM, Jeremy Kitchen wrote: Upon further investigation I saw that autoresponder, when coming across a Mailing-List header, would exit 100, causing qmail-local/vdelivermail to bounce the message. Am I wrong to think that autoresponder should silently ignore me

Re: [qmailadmin] Re: rcpt to bounce security risk

2003-09-16 Thread Eero Volotinen
> I don´t wan´t to start a big discussion but i don´t think you understand the > potential risk here. Looks like you don't really know anything about smtp and how it should work. This is only issue of knowledgeless. -- Eero

Re: [qmailadmin] Re: rcpt to bounce security risk

2003-09-16 Thread Paul Theodoropoulos
It really makes no sense posting this here. The qmail mailing list is the place to discuss these concerns. why not do so? At 08:41 AM 9/16/2003, Peter Nilsson wrote: I don´t wan´t to start a big discussion but i don´t think you understand the potential risk here. The reson why i wrote it to this

Re: [qmailadmin] Re: rcpt to bounce security risk

2003-09-16 Thread Claus Alboege
"Peter Nilsson" <[EMAIL PROTECTED]> writes: > I don´t wan´t to start a big discussion but i don´t think you understand > the potential risk here. The reson why i wrote it to this list was also > to warn about this issue, its a bad thing that qmail accept this kind of > abuse as default No, you to

[qmailadmin] Re: rcpt to bounce security risk

2003-09-16 Thread Peter Nilsson
I don´t wan´t to start a big discussion but i don´t think you understand the potential risk here. The reson why i wrote it to this list was also to warn about this issue, its a bad thing that qmail accept this kind of abuse as default No it is not a big security risk. it is a risk that a us

Re: [qmailadmin] rcpt to bounce security risk

2003-09-16 Thread Claus Alboege
"Peter Nilsson" <[EMAIL PROTECTED]> writes: > Hi! I know that this group isn´t about qmail, Then why post here in the first place? Use the qmail list. > but maybe someone know about qmails blank rcp to problem, its a big > security risk. No it is not a big security risk. > It is possible to

Re: [qmailadmin] [ot] Re: rcpt to bounce security risk

2003-09-16 Thread Eero Volotinen
> just put !@ in badmailto, there is no fix, i have searched many ours and > didn´t find any patches, tried qregex patch first but your qmail has to be > clean and unpatched otherwise you will get errors when patching. > > after that i patched for glibc compile errors so it can compile on redhat >

Re: [qmailadmin] Re: rcpt to bounce security risk

2003-09-16 Thread Eero Volotinen
> I've been following this [offtopic] thread with some interest. Just to > clarifyare the patches required for htis fix, or can you just put the !@ > in the badmailto? This: http://www.unixpimps.org/software/qregex/ Have fun. -- Eero

[qmailadmin] Mailing list problem (qmail-queue error)

2003-09-16 Thread Rick Glunt
The mailing list 'staff' was setup using qmailadmin and my qmail server name is 'walleye'. I (rjg) tried to send a message to [EMAIL PROTECTED] and cog the following in maillog: Sep 16 09:59:02 walleye qmail: 1063720742.650329 new msg 161734 Sep 16 09:59:02 walleye qmail: 1063720742.651732 info

[qmailadmin] Re: rcpt to bounce security risk

2003-09-16 Thread Peter Nilsson
Trey Nolen writes: I've been following this [offtopic] thread with some interest. Just to clarifyare the patches required for htis fix, or can you just put the !@ in the badmailto? just put !@ in badmailto, there is no fix, i have searched many ours and didn´t find any patches, tried qreg

Re: [qmailadmin] Re: rcpt to bounce security risk

2003-09-16 Thread Trey Nolen
I've been following this [offtopic] thread with some interest. Just to clarifyare the patches required for htis fix, or can you just put the !@ in the badmailto? Trey Nolen > That did the trick, it is now solved, thank you everyone here that came with > suggestions to howto solve my problem

[qmailadmin] Re: some, ideas. much faster development of qmailadmin

2003-09-16 Thread Paul L. Allen
Eero Volotinen writes: > Well, I think that C-interface is now antique and it slows too much > development of qmailadmin. But at least it runs quickly and isn't a major security hole. Without an equivalent of suexec then your mail directories have to be readable and writeable by the Apache user

Re: [qmailadmin] some, ideas. much faster development of qmailadmin

2003-09-16 Thread Eero Volotinen
> | If enought vpopmail functions are contributed to php > | (http://fi.php.net/vpopmail) then > | qmailadmin can ported to php and it get much faster development speed? > > That sounds like a nice idea. It would be very nice if I could use that > level of integration for my PHP sites! Well, I thi

Re: [qmailadmin] some, ideas. much faster development of qmailadmin

2003-09-16 Thread Christian Axelsson
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Eero Volotinen wrote: | Some thoughts: | | If enought vpopmail functions are contributed to php | (http://fi.php.net/vpopmail) then | qmailadmin can ported to php and it get much faster development speed? That sounds like a nice idea. It would be very n

[qmailadmin] Re: rcpt to bounce security risk

2003-09-16 Thread Peter Nilsson
That did the trick, it is now solved, thank you everyone here that came with suggestions to howto solve my problem. My server now responsethats perfect 220 loke.yanet.dk ESMTP helo 250 loke.yanet.dk mail from:[EMAIL PROTECTED] 250 ok rcpt to: 533 sorry, your envelope recipient has been den

[qmailadmin] Re: rcpt to bounce security risk

2003-09-16 Thread Eero Volotinen
> ok, but my problem isn´t fixed, what about your server is it secure? i will > wubscribe to the qmail mailling list. My mailserver is secure. You can put !@ to /var/qmail/control/badmailto, it fixes your problem. You can get chkuser patch from shupp.org, first install big qmail toaster patch an

Re: [qmailadmin] Re: rcpt to bounce security risk

2003-09-16 Thread Eero Volotinen
> But i´m still able to have a blank rcpt to: > > Have ensured that qmail-send is replaced with the patched version. Put !@ to /var/qmail/control/badmailto rcpt field must contain @ char. -- Eero

[qmailadmin] Re: rcpt to bounce security risk

2003-09-16 Thread Peter Nilsson
Eero Volotinen writes: I was to fast, still having the problem and i have as described created a You use vpopmail? then apply this patch too (http://www.shupp.org/patches/chkuser.patch) It checks that receiver exists before you can send mail or build regexp to badmailto what blocks If not happy

Re: [qmailadmin] Re: rcpt to bounce security risk

2003-09-16 Thread Eero Volotinen
> I was to fast, still having the problem and i have as described created a > badmailto file where this is putted in: > > # must not contain invalid characters, brakets or multiple @'s > [\W\D!%#:\*\^] > [\(\)] > [\{\}] > @.*@ > > > But i´m still able to have a blank rcpt to: > You use vpopmail? t

[qmailadmin] Re: rcpt to bounce security risk

2003-09-16 Thread Peter Nilsson
I was to fast, still having the problem and i have as described created a badmailto file where this is putted in: # must not contain invalid characters, brakets or multiple @'s [\W\D!%#:\*\^] [\(\)] [\{\}] @.*@ But i´m still able to have a blank rcpt to: Have ensured that qmail-send is repla

[qmailadmin] Re: rcpt to bounce security risk

2003-09-16 Thread Peter Nilsson
First i had an error with the qregex patch...found the error, it was a earlier patch that created the problem, thanks: It was a (mfcheck) from Nagy Balazs that created the problem Now the problem is solved and my server is safe again :-) ;-Peter Eero Volotinen writes: It is possibl

Re: [qmailadmin] rcpt to bounce security risk

2003-09-16 Thread Eero Volotinen
> > It is possible to telnet to a qmail server and do this: > > helo > mail from:[EMAIL PROTECTED] > rcpt to: > data > he he here is a delivery failure...you will be flooded with this > . > > Se this enable an attacker to use your qmail server to create a flood of > delivery failures to the adresse