On Sun, Dec 05, 1999 at 08:07:21PM -0500, John R. Levine wrote:
> > | forward "$LOCAL"@bigbang.af.mil
>
> > I will think of a better fix in a couple of days, hints are
> > welcome. My first urge was to just have it bounce everything with a
> > % in it,
>
> First answer: so long as you're not relaying spam, there's no reason
> to worry about being in ORBS since almost nobody uses it. Alan listed
> me for spite a couple of times, the amount of mail that bounced as a
> result was infinitesimal, two messages out of many thousands, other
> than to my anti-spam fanatic pals on my spamtools list.
Well thanks for this one, you made my day :)
> Second answer: tell your friends who run sendmail to fig their config
> to turn off the percent hack, since it's a security hole there whether
> or not the mail is relayed from your host. The fixes are well known,
> see www.sendmail.org for links.
Ehm it's a security hole only from internal hosts, the sendmailhost doesn't
accept the percenthack from outside hosts. But I will talk to them.
> Third answer: if your sendmail manager isn't up to the task of
> managing sendmail (most aren't), it's really easy to add a little bit
> to your .qmail to bounce mail with addresses that are likely to
> provoke sendmail bugs:
>
> (put this on one line, of course)
>
> | case "$LOCAL" in
> '*[%"@]*') bouncesaying 'Go away,' ;;
> *) forward "$LOCAL"@bigbang.af.mil ;; esac
I was planning to do something similar to this. Is there any chance of sendmail
acting funny with banged addresses (with '!' in them)? Any other tricks I
should watch out for?
Greetz, Peter.
--
Peter van Dijk - student/sysadmin/ircoper/womanizer/pretending coder
|
| 'C makes it easy to shoot yourself in the foot;
| C++ makes it harder, but when you do it blows your whole leg off.'
| Bjarne Stroustrup, Inventor of C++