Bill, Eero, John -
Thanks very much for the quick, on target replies.
It turns out that the situation with AOL has to do with a reverse-DNS issue (even though my server has been running for a long long time and the configuration hasn't changed, they decided to get picky about it now). Nonetheless, I think I'd like to address the problem that you guys have brought up.
I added the host name to the /var/qmail/supervise/qmail-smtpd/run file and re-ran the tests from http://spamlart.homeunix.org and got the same results (a lot of "Potential Vulnerabilities"). I guess I need to "grab the 0.5 patch from shupp.org. You'll have to patch a fresh copy of qmail." I hate to be too dense here, but are there some instructions for doing this to a live mail server? I'd really like to avoid demolishing something that works well. Is this something I should do in the middle of the night? Are there any non-obvious configuration files that need to be backed up first?
Thanks again for all your help - it is very much appreciated.
Assuming your old files are still there...
cd /var/src/tar wget http://shupp.org/patches/qmail-toaster-0.5.patch.bz2 cd ../ mv qmail-1.03 qmail-1.03-old tar -xzf tar/qmail-1.03.tar.gz cd qmail-1.03 bunzip2 -c ../tar/qmail-toaster-0.5.patch.bz2 | patch make qmailctl stop killall -TERM qmail-remote qmail-smtpd make setup check qmailctl start
That SHOULD do it. But if you have problems, or are not confident in being able to solve them quickly, then do it off hours.
Regards,
Bill