On Fri, Mar 15, 2002 at 02:23:37PM -0800, Harry Putnam wrote:
> 
> Did you make and adjustments to disallow any traffic from the internet
> on 143? (Or I guess 110 in your case) I wondered how to make it so
> only 192.XXX.XXX is allowed to connect to it.  Or even so that it
> isn't even seen from the internet.  So a scan would not show it open
> or running.

I've got a Linksys firewall between my Linux system and the outside world.
The Linksys only passed a few pre-defined ports through (like 25 and 80).
Everything is blocked by default.  You could do the same thing using 
ipchains or similar.  I believe you should be able to do in your xinetd.d
config file.  See http://www.xinetd.org/sample.shtml for a sample config that
restricts access this way.

> So, with imapd running and accounts with mail in them in
> /var/spool/mail/$USER.  A network computer with a setting of popserver
> aimed at the linux box would press send/recieve or something and her
> software would connect to port 143.  The imapd would know what to do
> from there, and handles the uid/passwd negotiation.. and pass out the
> mail?
> 
> Do there actually have to be user accounts on the machine, or just
> a file in /var/spool/mail/$USER?

You actually have to have a user account since that account is the only one
that has access to the mail file.  imapd/popd does the username/password
negotiation, and the username doesn't exist, you're dead in the water.

-- 
Ed Wilts, Mounds View, MN, USA
mailto:[EMAIL PROTECTED]



_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to