On 04/21/2014 03:06 PM, Alexander Dalloz wrote:
Am 21.04.2014 19:11, schrieb Dan Thurman:
DAEMON_OPTIONS(`Port=smtp, Name=MTA')dnl
Drop 1 below:
DAEMON_OPTIONS(`Family=inet, Port=465, Name=MTA-SSL M=s')dnl
Add 2 below:
DAEMON_OPTIONS(`Port=submission, Name=MSA, M=Ea')dnl
DAEMON_OPTIONS(`Port
On 04/21/2014 03:15 PM, Alexander Dalloz wrote:
That's good. It would even be better to know what action has made it
stopping. Do you still see spammers trying to misused your Sendmail as
a relay? That would be something to be expected once the system got
identified as a misusable relay.
Actio
Am 21.04.2014 20:02, schrieb Dan Thurman:
I found an old posting you made here:
http://compgroups.net/comp.mail.sendmail/problem-using-port-587/1312021
The internet does not forget ;)
Knute Johnson wrote:
[...]
:: I want to be able to have the outside world connect to my sendmail on
:: port
Am 21.04.2014 19:11, schrieb Dan Thurman:
DAEMON_OPTIONS(`Port=smtp, Name=MTA')dnl
Drop 1 below:
DAEMON_OPTIONS(`Family=inet, Port=465, Name=MTA-SSL M=s')dnl
Add 2 below:
DAEMON_OPTIONS(`Port=submission, Name=MSA, M=Ea')dnl
DAEMON_OPTIONS(`Port=smtps, Name=TLSMTA, M=s')dnl
So far, the spammi
On 04/21/2014 10:11 AM, Dan Thurman wrote:
On 04/21/2014 07:10 AM, Alexander Dalloz wrote:
Am 21.04.2014 09:12, schrieb Dan Thurman:
On 04/20/2014 02:00 PM, Dan Thurman wrote:
I have F8 and F18. F8 is not affected by HB and F18 is HB
fixed (recompiled) and certificates regenerated. Both Fedo
On 04/21/2014 07:10 AM, Alexander Dalloz wrote:
Am 21.04.2014 09:12, schrieb Dan Thurman:
On 04/20/2014 02:00 PM, Dan Thurman wrote:
I have F8 and F18. F8 is not affected by HB and F18 is HB
fixed (recompiled) and certificates regenerated. Both Fedora
versions have the same "open-relay" issue
Am 21.04.2014 09:12, schrieb Dan Thurman:
On 04/20/2014 02:00 PM, Dan Thurman wrote:
I have F8 and F18. F8 is not affected by HB and F18 is HB
fixed (recompiled) and certificates regenerated. Both Fedora
versions have the same "open-relay" issues and both have
similar or nearly identical sendm
On 04/20/2014 02:00 PM, Dan Thurman wrote:
On 04/20/2014 01:38 PM, jdow wrote:
Heartbleed... Anybody running an OpenSSL server has compromised
passwords
for anybody using the system at least from when the vulnerability was
revealed until it was repaired should consider every password on the
sys
Am 20.04.2014 21:23, schrieb Dan Thurman:
for some reason, spammers are getting through TLS
and are bypassing/ignoring access database? I poured
over the Internet but have yet to figure it out...
TLS is no protection against a misused of your MTA.
How can I prevent spammers from using my sen
On 04/20/2014 01:38 PM, jdow wrote:
Heartbleed... Anybody running an OpenSSL server has compromised passwords
for anybody using the system at least from when the vulnerability was
revealed until it was repaired should consider every password on the
system is compromised. They should ALL be change
Heartbleed... Anybody running an OpenSSL server has compromised passwords
for anybody using the system at least from when the vulnerability was
revealed until it was repaired should consider every password on the
system is compromised. They should ALL be changed, pronto. And you should
make sure i
Dan Thurman writes:
for some reason, spammers are getting through TLS
and are bypassing/ignoring access database? I poured
over the Internet but have yet to figure it out...
The most common way is by hacking the client's PC, and authenticating to the
mail server using the stolen loginid and
On 04/20/2014 12:23 PM, Dan Thurman wrote:
How can I prevent spammers from using my sendmail
server as an open relay even though open-relay is closed?
Use Port 587 and SMTPAuth.
--
users mailing list
users@lists.fedoraproject.org
To unsubscribe or change subscription options:
https://admin.fedo
for some reason, spammers are getting through TLS
and are bypassing/ignoring access database? I poured
over the Internet but have yet to figure it out...
How can I prevent spammers from using my sendmail
server as an open relay even though open-relay is closed?
Note STARTTLS=client and deferred
14 matches
Mail list logo