Hello.
Two ways you can accomplish this:
1. If you have an external e-mail address (for your wife e.g. yahoo.com or
hotmail.com) then:
pico /etc/mail/aliases
and add the following line next to the local username (pop3 user-id):
WifeMailBox:TAB WifeMailBox,[EMAIL PROTECTED]
exist the pico
Found the problem.
IPTABLES was set for the following;
/sbin/iptables -A INPUT -p tcp --syn -s 10.2.2.120/32 --destination-port
22
-j ACCEPT
/sbin/iptables -A INPUT -p tcp --syn -s 10.2.2.120/32 --destination-port
1241 -j ACCEPT
/sbin/iptables -A INPUT -p tcp --syn -j DROP
Once I flushed
, 2003 21:43
Subject: RE: Sendmail problem
These are the only rules as this is a client workstation.
Mark
-Original Message-
From: aljuhani [mailto:[EMAIL PROTECTED]
Sent: Tuesday, July 08, 2003 2:38 PM
To: [EMAIL PROTECTED]
Subject: Re: Sendmail problem
Found the problem
-A INPUT -p tcp --syn -s 10.2.2.6/32 --destination-port
25 -j
ACCEPT
/sbin/iptables -A INPUT -p tcp --syn -j DROP
Mark
-Original Message-
From: aljuhani [mailto:[EMAIL PROTECTED]
Sent: Tuesday, July 08, 2003 2:56 PM
To: [EMAIL PROTECTED]
Subject: Re: Sendmail problem
Ok then add
don't have it locked
down as much. No other machine needs access to this linux machine except
for when I telnet in to manage it. That is what IP 10.2.2.120 is used
for.
Mark
-Original Message-
From: aljuhani [mailto:[EMAIL PROTECTED]
Sent: Tuesday, July 08, 2003 3:48 PM
To: [EMAIL
Redhat List Searchable Archives is available here:
http://marc.theaimsgroup.com/?l=redhat-list
[EMAIL PROTECTED]
= Original Message From [EMAIL PROTECTED] =
On Mon, Dec 23, 2002 at 11:40:34AM -0800, Rick Johnson wrote:
Leonard den Ottolander wrote:
| I am a little surprised that I
/bin/mail is a binary file. If you have your OS RPMs run the following
command:
rpm -Fvh
This command if applied to all RPM stored in a directory or on OS CD, It will
update ONLY the installed RPMs and will not change any system configs or file
structures you have.
The echo command is used
Hello,
You may have an open relay mail server (smtp). Port 25 is always open to
receive messages to local users. If the spammer is using your SMTP as a
gateway to send messages to outside domains (outside your box) then you have
an open relay SMTP. You need to use pop before smtp i.e. local
Hi.
You can post the header of one of the spam messages here. Also, you can test
your mail server relay (if open to outside world) by simply trying yourself
from any ISP to relay messages through your box, OR you can test online. Go
to http://www.abuse.net/relay.html and in the form just
= Original Message From [EMAIL PROTECTED] =
I wonder if there is possibility that sendmail can push the emails to client
in time automatically?
Sendmail stores email to /var/spool/mail/user-id. What kind of notification
you need for your clients.
If not, if there is a linux-based email
I'm sure someone is already doing this on the list,
but I'm going to create a cronjob for chkrootkit and
have it print out to a log on maybe a daily/weekly
basis just to keep watch.
If you want to get a daily email of chkroot output, here is how:
pico /etc/cron.daily/chkrootkit.sh
insert
Hi.
This is what I use to backup my system Manually but you can insert the
following commands into a cron-run shell script.
I have a directory under home called backup where all backups are stored. You
can use tape or ftp to some other machine.
The directories are Tared and can be restored
in the hosts.allow enter:
in.telnetd: x.x.x.
where x.x.x. is the IP address of your address also you need to add localhost
as below:
in.telnetd: localhost IP_Address1 IP_Address2 IP_Address3
in the hosts.deny add the following:
ALL: ALL
to block all and only allow any hosts under
Hi.
No there is not need to start xinetd or any other service. Saving any changes
to hosts.allow or .deny will make whatever in there applied.
Al-Juhani
[EMAIL PROTECTED]
= Original Message From [EMAIL PROTECTED] =
On Mon, Oct 28, 2002 at 11:26:53AM -, David Davenport wrote:
Am I
had
lost my gateway playing with service) everything works. Now I
need to find a good book on ipchains so I how it all works.
Linda
On Thu, 24 Oct 2002, aljuhani wrote:
Hello,
You need some accept rules for tcp, udp, and ICMP, see example below:
eth0 is your interface
Well explained here:
http://linux.oreillynet.com/pub/a/linux/lpt/20_08.html
Al-Juhani
[EMAIL PROTECTED]
= Original Message From [EMAIL PROTECTED] =
Hash: SHA1
On Sat, 26 Oct 2002 16:47:19 -0400, MET wrote:
I have a folder called 'webroot'. Inside of webroot I have 2 dozen
folders
Hello,
Is your sendmail lisening to port 110. Type netstat -a at shell prompt to
check. Also do you have a firewall setup, may be it is blocking certain
ports.
Al-Juhani
[EMAIL PROTECTED]
= Original Message From [EMAIL PROTECTED] =
Dear List
I am running Redhat 7.0 and my problem
These are Nimba and Code Red scan. You are ok but to count and ban all IPs
trying to scan your http header, use the script below:
Pico filename and insert script below the chmod to root and execute, it will
print to a file all offending IPs.
---Script Starts HERE---
#!/bin/sh
echo Nimba
Yes it is possible. What you are doing is called a catch-all mail account
that accept all emails and forward them to one account admin in your case.
You will need a software that access the admin account and download messages
and copy according to user to users folder. Fetchmail is a good
If you reboot the machine you will lose your settings. You need to add this
line:
/sbin/ipchains -I input -s 111.222.333.444 -j DENY -l
to the bottom of the file /etc/rc.d/rc.local
You need to make a chainrules file that you can execute to apply rules and
also you can append to it new IPs
It is your TCP Wrapper in the target machine. OK check the /etc/hosts.deny on
the target machine, if your host machine IP address there, then remove it.
Or it could be that the target machine hosts.deny is setup to deny all access
and only allow the localhost connection. In that case you will
Hello,
You need some accept rules for tcp, udp, and ICMP, see example below:
eth0 is your interface.
===EXAMPLE RULES===
# TCP
# serve ftp for NON-passive clients_ONLY_
-A input -i eth0 -p tcp --destination-port 20:21 --syn -j ACCEPT -l
# serve ssh - 22
-A input -i eth0 -p tcp
22 matches
Mail list logo