On Sun, Dec 05, 1999 at 08:07:21PM -0500, John R. Levine wrote:
> >   | forward "$LOCAL"@bigbang.af.mil
> 
> > I will think of a better fix in a couple of days, hints are
> > welcome. My first urge was to just have it bounce everything with a
> > % in it,
> 
> First answer: so long as you're not relaying spam, there's no reason
> to worry about being in ORBS since almost nobody uses it.  Alan listed
> me for spite a couple of times, the amount of mail that bounced as a
> result was infinitesimal, two messages out of many thousands, other
> than to my anti-spam fanatic pals on my spamtools list.
> 
> Second answer: tell your friends who run sendmail to fig their config
> to turn off the percent hack, since it's a security hole there whether
> or not the mail is relayed from your host.  The fixes are well known,
> see www.sendmail.org for links.
> 
> Third answer: if your sendmail manager isn't up to the task of
> managing sendmail (most aren't), it's really easy to add a little bit
> to your .qmail to bounce mail with addresses that are likely to
> provoke sendmail bugs:
> 
> (put this on one line, of course)
> 
> | case "$LOCAL" in 
>       '*[%"@]*') bouncesaying 'Go away,' ;;
>        *) forward "$LOCAL"@bigbang.af.mil ;; esac

The pattern matching didn't work with the quotes around it so I removed
those, I also took care of bangpaths (!) and route-addresses (whatever those
may be but somebody hinted me to those). This is what I'm using now:

|case "$LOCAL" in *[%\"@\!:\;]*) bouncesaying 'You are evil. Get Lost(tm).' ;; *) 
|forward "$LOCAL"@haarlem-2000.vuurwerk.nl ;; esac

(Yes that is a long line and yes it's not very decent of me to post in 
long lines but I know so don't flame :)

Greetz, Peter.
-- 
Peter van Dijk - student/sysadmin/ircoper/womanizer/pretending coder 
|  
| 'C makes it easy to shoot yourself in the foot;
|  C++ makes it harder, but when you do it blows your whole leg off.'
|                             Bjarne Stroustrup, Inventor of C++

Reply via email to