I was to fast, still having the problem and i have as described created a badmailto file where this is putted in:

# must not contain invalid characters, brakets or multiple @'s
[\W\D!%#:\*\^]
[\(\)]
[\{\}]
@.*@



But i�m still able to have a blank rcpt to:


Have ensured that qmail-send is replaced with the patched version.

;-Peter

Peter Nilsson writes:

First i had an error with the qregex patch...found the error, it was a earlier patch that created the problem, thanks:

It was a (mfcheck) from Nagy Balazs that created the problem

Now the problem is solved and my server is safe again.... :-)

;-Peter




Eero Volotinen writes:



It is possible to telnet to a qmail server and do this:


helo
mail from:[EMAIL PROTECTED]
rcpt to:
data
he he here is a delivery failure...you will be flooded with this
.


Se this enable an attacker to use your qmail server to create a flood of
delivery failures to the adresse given in mail from:....could be a person
you dont like.


How do I disable this? anyone have a solution?

If it can be disable, then i have to skip qmail (to risky to use then)

Other mailservers don�t accept a blank rcpt to:

This is not qmailadmin related, but I still help you.
You can use this patch http://www.unixpimps.org/software/qregex/


--
Eero








Reply via email to