On Sun, Dec 05, 1999 at 08:07:21PM -0500, John R. Levine wrote:
> > | forward "$LOCAL"@bigbang.af.mil
>
> > I will think of a better fix in a couple of days, hints are
> > welcome. My first urge was to just have it bounce everything with a
> > % in it,
>
> First answer: so long as you're not relaying spam, there's no reason
> to worry about being in ORBS since almost nobody uses it. Alan listed
> me for spite a couple of times, the amount of mail that bounced as a
> result was infinitesimal, two messages out of many thousands, other
> than to my anti-spam fanatic pals on my spamtools list.
>
> Second answer: tell your friends who run sendmail to fig their config
> to turn off the percent hack, since it's a security hole there whether
> or not the mail is relayed from your host. The fixes are well known,
> see www.sendmail.org for links.
>
> Third answer: if your sendmail manager isn't up to the task of
> managing sendmail (most aren't), it's really easy to add a little bit
> to your .qmail to bounce mail with addresses that are likely to
> provoke sendmail bugs:
>
> (put this on one line, of course)
>
> | case "$LOCAL" in
> '*[%"@]*') bouncesaying 'Go away,' ;;
> *) forward "$LOCAL"@bigbang.af.mil ;; esac
The pattern matching didn't work with the quotes around it so I removed
those, I also took care of bangpaths (!) and route-addresses (whatever those
may be but somebody hinted me to those). This is what I'm using now:
|case "$LOCAL" in *[%\"@\!:\;]*) bouncesaying 'You are evil. Get Lost(tm).' ;; *)
|forward "$LOCAL"@haarlem-2000.vuurwerk.nl ;; esac
(Yes that is a long line and yes it's not very decent of me to post in
long lines but I know so don't flame :)
Greetz, Peter.
--
Peter van Dijk - student/sysadmin/ircoper/womanizer/pretending coder
|
| 'C makes it easy to shoot yourself in the foot;
| C++ makes it harder, but when you do it blows your whole leg off.'
| Bjarne Stroustrup, Inventor of C++