I have setup exim to host my domain's SMTP services.
I am now looking for something to host POP3 on the same Debian potato
box.
I am asking the security list because that is my primary interest.
I would like to find something stable, reasonably known to be secure,
perhaps specifically recomme
On Friday, Dec 6, 2002, at 03:18 US/Pacific, Sven Hoexter wrote:
On Fri, Dec 06, 2002 at 12:07:10PM +0100, andres wrote:
apt-get install qpopper
Ok!
;-)
*rotfl* Hope that wasn't a serious answer.
apt-cache search pop3
I suggest popa3d from http://www.openwall.com but I'm not sure
if you ca
On Friday, Dec 6, 2002, at 04:48 US/Pacific, Jeff AA wrote:
Second the recommendation for courier.
Remember that pop3 by default is insecure in that user/passwords
pass in the clear over the net - DON'T make your mail users real users
with shell access or you are opening a large number of doo
I decided to go with popa3d, along with stunnel. Thanks to Tim van
Erven for inspiring this. Now I have some security questions in regards
to Exim. I see no reason to broadcast to the world exactly what version
of exim I am running, or even that I am running exim for smtp services.
I've already
On Friday, Aug 1, 2003, at 02:17 US/Pacific, Matthijs Mohlmann wrote:
I have here also key login. It's very easy.
ssh-keygen -t dsa
You got now two files id_dsa and id_dsa.pub. You put the id_dsa.pub in
~/.ssh/authorized_keys2 and id_dsa on your client in ~/.ssh/id_dsa.
When
you start now ss
On Tuesday, Sep 16, 2003, at 08:34 US/Pacific, Andreas Barth wrote:
* Thomas Horsten ([EMAIL PROTECTED]) [030916 17:32]:
Is there an emergency patch/workaround for this, if disabling ssh is
not
an option? Are systems with Privilege Separation affected?
Filtering access to allow only trusted
My secalert account for these lists is being drenched with 40 to 70 of
these fake Microsoft Update emails per day.
My filters on my client dump them to a Junk folder, but I would prefer
it if my Exim filter would do the job at the server level instead. I am
running Nigel Metheringham's system_fi
On Monday, Sep 22, 2003, at 16:22 US/Pacific, Josh Carroll wrote:
One solution is to use spamassassin, and in your
~/.spamassassin/user_prefs, do the following:
Actually, I wish to stop the entire procedure at the SMTP level.
However, I have found my answer. I had to increase
message_body_v
I have setup exim to host my domain's SMTP services.
I am now looking for something to host POP3 on the same Debian potato
box.
I am asking the security list because that is my primary interest.
I would like to find something stable, reasonably known to be secure,
perhaps specifically recommend
On Friday, Dec 6, 2002, at 03:18 US/Pacific, Sven Hoexter wrote:
On Fri, Dec 06, 2002 at 12:07:10PM +0100, andres wrote:
apt-get install qpopper
Ok!
;-)
*rotfl* Hope that wasn't a serious answer.
apt-cache search pop3
I suggest popa3d from http://www.openwall.com but I'm not sure
if you can
On Friday, Dec 6, 2002, at 04:48 US/Pacific, Jeff AA wrote:
Second the recommendation for courier.
Remember that pop3 by default is insecure in that user/passwords
pass in the clear over the net - DON'T make your mail users real users
with shell access or you are opening a large number of door
I decided to go with popa3d, along with stunnel. Thanks to Tim van
Erven for inspiring this. Now I have some security questions in regards
to Exim. I see no reason to broadcast to the world exactly what version
of exim I am running, or even that I am running exim for smtp services.
I've already
On Friday, Aug 1, 2003, at 02:17 US/Pacific, Matthijs Mohlmann wrote:
I have here also key login. It's very easy.
ssh-keygen -t dsa
You got now two files id_dsa and id_dsa.pub. You put the id_dsa.pub in
~/.ssh/authorized_keys2 and id_dsa on your client in ~/.ssh/id_dsa.
When
you start now ssh o
On Tuesday, Sep 16, 2003, at 08:34 US/Pacific, Andreas Barth wrote:
* Thomas Horsten ([EMAIL PROTECTED]) [030916 17:32]:
Is there an emergency patch/workaround for this, if disabling ssh is
not
an option? Are systems with Privilege Separation affected?
Filtering access to allow only trusted machi
My secalert account for these lists is being drenched with 40 to 70 of
these fake Microsoft Update emails per day.
My filters on my client dump them to a Junk folder, but I would prefer
it if my Exim filter would do the job at the server level instead. I am
running Nigel Metheringham's system_fi
On Monday, Sep 22, 2003, at 16:22 US/Pacific, Josh Carroll wrote:
One solution is to use spamassassin, and in your
~/.spamassassin/user_prefs, do the following:
Actually, I wish to stop the entire procedure at the SMTP level.
However, I have found my answer. I had to increase
message_body_visible
16 matches
Mail list logo