[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: How do I fix this?



On Saturday 08 April 2006 18:32, Doofus wrote:
>S. Keeling wrote:
>>In linux.debian.user, you wrote:
>>> Hi there Got this from my ISP the other day:
>>>
>>>   We have been forced to take your server off line, since your
>>> server is performing phishing from your secondary IP address
>>> xxx.xxx.xxx.224.
>>>
>>> That IP address was one [of] my secondary IP's, using Debian Sarge,
>>> have iptables firewall, using qmail as the mail server ..
>>
>>"aptitude install exim4" should get rid of that insecure piece of
>> !@#$ qmail for you.  Alternatives include Postfix, ssmtp, and even
>> Sendmail among others.  "aptitude search smtp"
>>
>>Google "qmail phish"
>
>I'm no expert on the subject but I'm wondering what your rather
> sweeping statement is based on.
>
>Your google suggestion returned one result unrelated to this
> discussion.
>
>However, google hits for:
>
>+qmail +phish = 15200
>+sendmail +phish = 41800
>+exim +phish = 54700
>
>
>There seems to be no shortage of people out there who say qmail is far
>and away the most secure MTA avaiable (not to say the fastest). While
>these google searches are hardly quantitative, the MTA/phish results
>above certainly lean that way.

I am in this same camp.  The only time we ever had a qmail server 
compromised, it was on a RH6.2 machine with the buffer overflow hole in 
named that one could drive a large truck through.  And that wasn't 
qmails fault by any stretch.

-- 
Cheers, Gene
People having trouble with vz bouncing email to me should add the word
'online' between the 'verizon', and the dot which bypasses vz's
stupid bounce rules.  I do use spamassassin too. :-)
Yahoo.com and AOL/TW attorneys please note, additions to the above
message by Gene Heskett are:
Copyright 2006 by Maurice Eugene Heskett, all rights reserved.



Reply to: