Date: Thu, 6 Mar 2003 13:55:03 -0700 From: Duncan Patton a Campbell <campbell@neotext.ca> To: Mike Tancsa <mike@sentex.net> Cc: freebsd-security@FreeBSD.ORG Subject: Re: network audit of sendmail Message-ID: <20030306135503.304f5034.campbell@neotext.ca> In-Reply-To: <5.2.0.9.0.20030306094902.06e759a8@marble.sentex.ca> References: <5.2.0.9.0.20030306094902.06e759a8@marble.sentex.ca>
next in thread | previous in thread | raw e-mail | index | archive | help
--lQfQovP8vB_=.1z? Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit On Thu, 06 Mar 2003 10:41:43 -0500 Mike Tancsa <mike@sentex.net> wrote: > > I want to go through my network to a) ensure all my machines are updated > and b)look for customer machines running vulnerable versions of > sendmail. I put together a quick perl script, but its sequential and does > not scan in parallel. (this is slow for 16,000 hosts). Can anyone recommend My two bits werth: if you have a secure rsh, propagate a networm of your own to use those hosts you can as scanners. I also thing this is the way to propagate damage-reduction virii opposed to damaging ones across a net. Dhu --lQfQovP8vB_=.1z? Content-Type: application/pgp-signature -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.7 (FreeBSD) iD8DBQE+Z7WnXgQtJ7uBra8RApQeAKChHB8U4sExDmiZxlg82lZQj0iqUgCg04XL 2DVAur5ZCTyTrkFQdu1IP3w= =dRI/ -----END PGP SIGNATURE----- --lQfQovP8vB_=.1z?-- To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20030306135503.304f5034.campbell>