- Original Message -
From: <[EMAIL PROTECTED]>
> Just thinking out loud.
>
> The approach of tarpitting is to slow down the attacker without impacting
> your network or requiring additional resources on your end to deal with
> the cracker. I *think* it does this by analyzing the vol
don't forget the files in /var/qmail/control also...
btw, what in between heaven and earth made you accidently delete /var/qmail
:-)
- Original Message -
From: "Tom Collins" <[EMAIL PROTECTED]>
To: "vpopmail list" <[EMAIL PROTECTED]>
Sent: Monday, September 01, 2003 9:11 PM
Subject: Re:
On Monday, September 1, 2003, at 11:34 AM, T. Albert wrote:
i accidently deleted my /var/qmail, and now my vpopmail didnot
recognize the
virtual domains. i have a backup of my /var/qmail (not the recent
one). and
now some of my domains can't be recognize. how can i fix this ? OR
is there a way i
hi,
i accidently deleted my /var/qmail, and now my vpopmail didnot recognize the
virtual domains. i have a backup of my /var/qmail (not the recent one). and
now some of my domains can't be recognize. how can i fix this ? OR
is there a way i can rebuild my assign file ?
On Saturday, August 30, 2003, at 10:52 AM, Evren Yurtesen wrote:
1. Auth the user against the database using their email/passwd
2. Change the last auth value to a year ago.
3. Display a message that they have until the next quarter hour
to change their mind about deleting their account, and if
Hi Jesus,
> i'm using qmail with vpopmail 5.2.1, and in my qmail log files this
> message continues to appear
>
> "warning: trouble injecting bounce message, will try later"
>
> I have plenty of disk space, and i don't know where to look for the
> problem.
You already posted exactly this questi
[EMAIL PROTECTED] writes:
> The approach of tarpitting is to slow down the attacker without impacting
> your network or requiring additional resources on your end to deal with
> the cracker.
That is the ideal. The ideal is unachievable.
> I *think* it does this by analyzing the volume of incom
i'm using qmail with vpopmail 5.2.1, and in my qmail log files this message
continues to appear
"warning: trouble injecting bounce message, will try later"
I have plenty of disk space, and i don't know where to look for the problem.
Thanks in advance,
Jesus
I have the same problem i check the file permission and they are ok, and i
also check that qmail-send don't restart very often.
I'm using qmail, with vpopmail 5.2.1 and spamcontrol2.09
[EMAIL PROTECTED] /root]# svstat /service/*
/service/qmail-pop3d: up (pid 1129) 7392 seconds
/service/qmail-sen
Just another thought.
What is done through the ckuser patch, is what all other e-mail systems
(escluding native qmail) all do usually.
So, this is a general problem for all e-mail systems.
Ciao,
Tonino
At 01/09/03 01/09/03 -0500, [EMAIL PROTECTED] wrote:
Just thinking out loud.
The approa
Just thinking out loud.
The approach of tarpitting is to slow down the attacker without impacting
your network or requiring additional resources on your end to deal with
the cracker. I *think* it does this by analyzing the volume of incoming
SMTP requests from the same host.
The approach of
I thought of this initially, but then I forgot because of the general
gain this patch gives.
We could introduce a delay for each not existing user, or a limit for the
maximum number of "rcpt to". But for a massive hacker, that
could not be a problem.
I'm thinking of a more sophisticated code, bu
Tom Collins writes:
> I'd love to hear from someone who's tried with a recent version, and
> whether it worked or failed (and if it did fail, where/how did it fail).
I tried it with 5.3.24 and authdaemon authentication worked fine. I
then had to switch to 5.3.26 because of a bug in 5.3.24 and
Title: Message
Yes,
you should be using some form of tarpitting as well with this
patch.
There
is no need for someone to be connecting xx number of times
per
minute.
Shane
-Original Message-From: Brad Dameron
[mailto:[EMAIL PROTECTED] Sent: Monday, 1 September 2003 7:38
Title: Message
Speaking of this patch. I think there is a
potential of people being able to harvest e-mail accounts using a dictionary,
etc. They can connect up and just validate e-mail addresses with this patch to
determine if they are valid or not. This could be a spammers dream come true.
> What does your /var/qmail/rc file look like?
My qmail/rc file looks like this:
===START===
#!/bin/sh
# Using stdout for logging
# Using control/defaultdelivery from qmail-local to deliver messages by
default
exec env - PATH="/var/qmail/bin:$PATH" \
qmail-start "`cat /var/qmail/control/defaultd
Title: Message
Tonino,
Thanks for the reply. That has fixed the problem. Compiles now, and
it works still with
the
mysql backend.
cheers
Shane
-Original Message-From: tonix (Antonio
Nati) [mailto:[EMAIL PROTECTED] Sent: Monday, 1 September 2003
5:05 AMTo: [EMAIL PROT
17 matches
Mail list logo