[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: Smail spam-prevention filter?



More info:

Sure enough, there was a later version on the web site, 
taking me from v3.2 to 3.2.0.92-3.  :^>

So I installed the package, and tried the smtp_remote_allow
in the config file, as mentioned for smail 3.2. No such luck,
it doesn't know that configuration option.

*IF* that configuration option is possible under the smail
compiled under Libc6, then when the entire box is upgraded
maybe it will work. But for now, I seem stuck unless someone
has some magic tcp wrappers or smail configuration lines that
will do what smtp_remote_allow (or "-smtp_remote_allow") is
supposed to do.

Curt-

----- Begin Included Message -----

>From jim@jimpick.com  Thu May 28 12:07:59 1998
To: Curt Howland <howland@nsipo.nasa.gov>
Cc: security@debian.org
Subject: Re: Smail spam-prevention filter?
Content-Transfer-Encoding: 7bit
From: Jim Pick <jim@jimpick.com>
Date: 28 May 1998 12:07:50 -0700
Lines: 61
X-Mailer: Gnus v5.5/XEmacs 20.4 - "Emerald"
Content-Length: 1861


--pgp-sign-Multipart_Thu_May_28_12:07:47_1998-1
Content-Type: text/plain; charset=US-ASCII


Curt Howland <howland@nsipo.nasa.gov> writes:

> I obviously don't have my smail filter configured correctly,
> as last night I had to pull the ethernet plug from my Debian
> machine running smail to stop many thousands of spam emails
> using my machine as a remailer.
> 
> My question is: Preventing incoming mail "To:" anything other
> than the local machine, and "From:" anything but the local 
> machine would seem a standard form of security filter for
> smail.
> 
> Does anyone know of such a standard rules entry?
> 
> I don't know what list to send this to, if "security" is
> not a good place, I will try the "users" list.

Here's a good link:

http://maps.vix.com/tsi/ar-fix.html

It says:

  Smail Version 3

    Status:  Freely Available
    Systems: Unix
    Info:    http://www.sbay.org/smail-faq.html

   smail version 3.2 has support to block unauthorized relay. This is
   enabled by defining the smtp_remote_allow parameter in your config
   file. Set it to the list of local IP address ranges from which
   unrestricted relay is allowed. All other hosts will be refused.

   Smail version 3.1 is vulnerable to relay. It also has some well-known
   security problems. Please upgrade to either version 3.2 or exim.

Cheers,

 - Jim

--pgp-sign-Multipart_Thu_May_28_12:07:47_1998-1
Content-Type: application/pgp-signature
Content-Transfer-Encoding: 7bit

-----BEGIN PGP MESSAGE-----
Version: 2.6.3a
Comment: Processed by Mailcrypt 3.4, an Emacs/PGP interface

iQCVAwUBNW22BOQz770qyIfJAQHylgP/Y0onKmPceRpSYGc6OK1QobncmIcY9bcv
HRbjouV99nLzFi4st+GOncaZs7Ip1b11RTYDmISJq67K0M//7SEkEyQ1lutQvhDB
sAda23zBWG+3rBudSTv1W13Q7JvmrjT+nAckmmyMGBxLCZnu4Qjh7Iv08RcwVMIN
seZg3LRpJmU=
=7iCT
-----END PGP MESSAGE-----

--pgp-sign-Multipart_Thu_May_28_12:07:47_1998-1--


----- End Included Message -----


--
To UNSUBSCRIBE, email to debian-user-request@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org


Reply to: