On Sun, Dec 05, 1999 at 08:07:21PM -0500, John R. Levine wrote:
> >   | forward "$LOCAL"@bigbang.af.mil
> 
> > I will think of a better fix in a couple of days, hints are
> > welcome. My first urge was to just have it bounce everything with a
> > % in it,
> 
> First answer: so long as you're not relaying spam, there's no reason
> to worry about being in ORBS since almost nobody uses it.  Alan listed
> me for spite a couple of times, the amount of mail that bounced as a
> result was infinitesimal, two messages out of many thousands, other
> than to my anti-spam fanatic pals on my spamtools list.

Well thanks for this one, you made my day :)

> Second answer: tell your friends who run sendmail to fig their config
> to turn off the percent hack, since it's a security hole there whether
> or not the mail is relayed from your host.  The fixes are well known,
> see www.sendmail.org for links.

Ehm it's a security hole only from internal hosts, the sendmailhost doesn't
accept the percenthack from outside hosts. But I will talk to them.

> Third answer: if your sendmail manager isn't up to the task of
> managing sendmail (most aren't), it's really easy to add a little bit
> to your .qmail to bounce mail with addresses that are likely to
> provoke sendmail bugs:
> 
> (put this on one line, of course)
> 
> | case "$LOCAL" in 
>       '*[%"@]*') bouncesaying 'Go away,' ;;
>        *) forward "$LOCAL"@bigbang.af.mil ;; esac

I was planning to do something similar to this. Is there any chance of sendmail
acting funny with banged addresses (with '!' in them)? Any other tricks I
should watch out for?

Greetz, Peter.
-- 
Peter van Dijk - student/sysadmin/ircoper/womanizer/pretending coder 
|  
| 'C makes it easy to shoot yourself in the foot;
|  C++ makes it harder, but when you do it blows your whole leg off.'
|                             Bjarne Stroustrup, Inventor of C++

Reply via email to