Re: How do I fix this?
On Saturday 08 April 2006 18:32, Doofus wrote:
>S. Keeling wrote:
>>In linux.debian.user, you wrote:
>>> Hi there Got this from my ISP the other day:
>>>
>>> We have been forced to take your server off line, since your
>>> server is performing phishing from your secondary IP address
>>> xxx.xxx.xxx.224.
>>>
>>> That IP address was one [of] my secondary IP's, using Debian Sarge,
>>> have iptables firewall, using qmail as the mail server ..
>>
>>"aptitude install exim4" should get rid of that insecure piece of
>> !@#$ qmail for you. Alternatives include Postfix, ssmtp, and even
>> Sendmail among others. "aptitude search smtp"
>>
>>Google "qmail phish"
>
>I'm no expert on the subject but I'm wondering what your rather
> sweeping statement is based on.
>
>Your google suggestion returned one result unrelated to this
> discussion.
>
>However, google hits for:
>
>+qmail +phish = 15200
>+sendmail +phish = 41800
>+exim +phish = 54700
>
>
>There seems to be no shortage of people out there who say qmail is far
>and away the most secure MTA avaiable (not to say the fastest). While
>these google searches are hardly quantitative, the MTA/phish results
>above certainly lean that way.
I am in this same camp. The only time we ever had a qmail server
compromised, it was on a RH6.2 machine with the buffer overflow hole in
named that one could drive a large truck through. And that wasn't
qmails fault by any stretch.
--
Cheers, Gene
People having trouble with vz bouncing email to me should add the word
'online' between the 'verizon', and the dot which bypasses vz's
stupid bounce rules. I do use spamassassin too. :-)
Yahoo.com and AOL/TW attorneys please note, additions to the above
message by Gene Heskett are:
Copyright 2006 by Maurice Eugene Heskett, all rights reserved.
Reply to: