Date: Thu, 11 Mar 1999 11:59:22 -0800 From: John Beck <sendmail+jbeck@sendmail.org> To: Gregory Neil Shapiro <sendmail+gshapiro@sendmail.org> Cc: John Beck <sendmail+jbeck@sendmail.org>, admin@wholesalehosting.com, freebsd-isp@FreeBSD.ORG, sendmail-questions@sendmail.org Subject: Re: I must be stupid Message-ID: <199903111959.LAA22056@opal.eng.sun.com> In-Reply-To: Your message of "Thu, 11 Mar 1999 11:48:11 PST." <14056.7675.167207.780586@scooter.sendmail.com> References: <36E7A1E938E.955CADMIN@domains.md> <199903111332.FAA20021@opal.eng.sun.com> <14056.5768.21905.815820@scooter.sendmail.com> <199903111939.LAA21852@opal.eng.sun.com> <14056.7675.167207.780586@scooter.sendmail.com>
next in thread | previous in thread | raw e-mail | index | archive | help
John> Well, in our case, we know everyone involved, and there is mutual trust, John> so no worries. But in general it's still easy to solve: simply: John> % grep -iv foo.tld foo.txt John> where foo.tld is the domain and foo.txt is the virtual user sub-table John> for that domain. Then cat the output of the grep for each domain into John> the master virtual user table before doing the makemap. Gregory> Nope again :) Gregory> Assuming I wanted to steal all mail to otherperson.com and I control Gregory> mydomain.com: Gregory> @otherperson.com gshapiro+mydomain.com@mydomain.com Gregory> Your grep would allow that through. It really needs a script which Gregory> only allows non-qualified user names on the left hand side (and a Gregory> default entry) and tacks on the domain that the user controls. Better Gregory> to be paranoid. OK, OK. It's still easy to do this, though. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-isp" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199903111959.LAA22056>