Security Check generated by AXENT Netrecom 3.0 points security flaw in qmail-smtpd

2001-08-14 Thread Agnaldo M. Monteiro
Hi all, I have qmail 1.03, with tcpserver, vpopmail and qmailscanner and when I test my network for vulnerabilities using AXENT Netrecom 3.0 the following security results is displayed about my qmail server host: SMTP allows remote command execution via recipient filter. Risk: 86 Description:

RES: errors from supervise

2001-08-14 Thread Agnaldo M. Monteiro
Hi, Remember qmail need UID and GID, if you uses qmail with vpomail try the following: This is a startup script for qmail/tcpserver/vpopamil/qmailscanner, in my System all works fine. echo Starting Qmail services with TcpServer: exec env - PATH=/var/qmail/bin:$PATH \ qmail-start

RES: /var/qmail tree

2001-08-14 Thread Agnaldo M. Monteiro
Hi, My qmail have theses permissions and work fine -rwxr-xr-x 1 root other204 Apr 20 15:35 rc drwxr-xr-x 2 root qmail512 May 21 11:01 users drwxr-xr-x 2 root qmail512 May 21 11:01 boot drwxr-xr-x 2 root qmail 1024 May 21 11:01 doc drwxr-xr-x

RES: stop relay messages :-)

2001-08-14 Thread Agnaldo M. Monteiro
Hi, If you know the ip range from your internet-provider, type this: For example if you provider have IPS from 199.200.101.1 to 199.200.101.254, the line in tcp.smtp file will be: 199.200.101.:allow,RELAYCLIENT= In the last case, all subnets from this internet-provider will be informed.