From owner-freebsd-hackers Thu May 8 20:11:06 1997 Return-Path: Received: (from root@localhost) by hub.freebsd.org (8.8.5/8.8.5) id UAA06476 for hackers-outgoing; Thu, 8 May 1997 20:11:06 -0700 (PDT) Received: from panda.hilink.com.au (panda.hilink.com.au [203.2.144.5]) by hub.freebsd.org (8.8.5/8.8.5) with ESMTP id UAA06462 for ; Thu, 8 May 1997 20:11:00 -0700 (PDT) Received: (from danny@localhost) by panda.hilink.com.au (8.8.5/8.8.5) id NAA09809; Fri, 9 May 1997 13:16:11 +1000 (EST) Date: Fri, 9 May 1997 13:16:10 +1000 (EST) From: "Daniel O'Callaghan" To: Jim Bryant cc: freebsd-hackers@FreeBSD.ORG Subject: Re: ESCAPE! Florida Cruise/Vacation $598/4 People In-Reply-To: <199705090205.VAA10188@argus> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-hackers@FreeBSD.ORG X-Loop: FreeBSD.org Precedence: bulk On Thu, 8 May 1997, Jim Bryant wrote: > anyone bother to do a whois on these... jordan, how about an identd > at least for sendmail.... whois says both domains are fake... One of my customers was used as a relay yesterday. Some idiot in Hackensack NJ used my customer in Melbourne as a relay for over 1000 outbound messages. I've just installed the patches which Adrian Chadd posted, and they seem to work quite well to prevent relay. I think the sendmail.cf which is shipped with FreeBSD should have something like this in it. If someone is going to tweak their sendmail.cf, then they will probably be able to add the patches themselves, but the shipped config is used by the masses. Danny