Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 6 Mar 2003 13:55:03 -0700
From:      Duncan Patton a Campbell <campbell@neotext.ca>
To:        Mike Tancsa <mike@sentex.net>
Cc:        freebsd-security@FreeBSD.ORG
Subject:   Re: network audit of sendmail
Message-ID:  <20030306135503.304f5034.campbell@neotext.ca>
In-Reply-To: <5.2.0.9.0.20030306094902.06e759a8@marble.sentex.ca>
References:  <5.2.0.9.0.20030306094902.06e759a8@marble.sentex.ca>

index | next in thread | previous in thread | raw e-mail

[-- Attachment #1 --]
On Thu, 06 Mar 2003 10:41:43 -0500
Mike Tancsa <mike@sentex.net> wrote:

> 
> I want to go through my network to a) ensure all my machines are updated 
> and b)look for customer machines running vulnerable versions of 
> sendmail.  I put together a quick perl script, but its sequential and does 
> not scan in parallel. (this is slow for 16,000 hosts). Can anyone recommend 

My two bits werth: if you have a secure rsh, propagate a networm of your own
to use those hosts you can as scanners.  I also thing this is the way to 
propagate damage-reduction virii opposed to damaging ones across a net.

Dhu

[-- Attachment #2 --]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (FreeBSD)

iD8DBQE+Z7WnXgQtJ7uBra8RApQeAKChHB8U4sExDmiZxlg82lZQj0iqUgCg04XL
2DVAur5ZCTyTrkFQdu1IP3w=
=dRI/
-----END PGP SIGNATURE-----
help

Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20030306135503.304f5034.campbell>