First i had an error with the qregex patch...found the error, it was a earlier patch that created the problem, thanks:

It was a (mfcheck) from Nagy Balazs that created the problem

Now the problem is solved and my server is safe again.... :-)

;-Peter




Eero Volotinen writes:



It is possible to telnet to a qmail server and do this:


helo
mail from:[EMAIL PROTECTED]
rcpt to:
data
he he here is a delivery failure...you will be flooded with this
.


Se this enable an attacker to use your qmail server to create a flood of
delivery failures to the adresse given in mail from:....could be a person
you dont like.


How do I disable this? anyone have a solution?

If it can be disable, then i have to skip qmail (to risky to use then)

Other mailservers don�t accept a blank rcpt to:

This is not qmailadmin related, but I still help you.
You can use this patch http://www.unixpimps.org/software/qregex/


--
Eero





Reply via email to