From owner-freebsd-security Wed Oct 4 6:57:29 2000 Delivered-To: freebsd-security@freebsd.org Received: from whistle.com (s205m131.whistle.com [207.76.205.131]) by hub.freebsd.org (Postfix) with ESMTP id 1C1EA37B502 for ; Wed, 4 Oct 2000 06:57:27 -0700 (PDT) Received: (from smap@localhost) by whistle.com (8.10.0/8.10.0) id e94DvQA06427 for ; Wed, 4 Oct 2000 06:57:26 -0700 (PDT) Received: from pau-amma.whistle.com( 207.76.205.64) by whistle.com via smap (V2.0) id xma006425; Wed, 4 Oct 2000 06:57:26 -0700 Received: (from dhw@localhost) by pau-amma.whistle.com (8.11.0/8.11.0) id e94DvQc92408 for security@FreeBSD.ORG; Wed, 4 Oct 2000 06:57:26 -0700 (PDT) (envelope-from dhw) Date: Wed, 4 Oct 2000 06:57:26 -0700 (PDT) From: David Wolfskill Message-Id: <200010041357.e94DvQc92408@pau-amma.whistle.com> Subject: Re: cvs commit: src/etc inetd.conf Cc: security@FreeBSD.ORG In-Reply-To: <200010031722.NAA41823@khavrinen.lcs.mit.edu> Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org >Date: Tue, 3 Oct 2000 13:22:27 -0400 (EDT) >From: Garrett Wollman >< said: >> gets no response (after a time-out) it would be entitled to retry a >> few times in case of packet loss. *But* if it gets a RST, which is a >If net.inet.tcp.blackhole is set, an RST will not be emitted. If the concern is that you don't want sendmail to even try to do the auth, just insert define(`confTO_IDENT', `0s')dnl in the .mc file from which the .cf is generated, and it won't do that any more. [Sorry; had hoped to respond yesterday, and got involved with oyther things. And the mail backlog may be such that someone already pointed this out; my apologies if so. dhw] Cheers, david -- David Wolfskill dhw@whistle.com UNIX System Administrator Desk: 650/577-7158 TIE: 8/499-7158 Cell: 650/759-0823 To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message