From owner-freebsd-hackers@FreeBSD.ORG Wed Apr 28 00:27:11 2004 Return-Path: Delivered-To: freebsd-hackers@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 575B816A4CE for ; Wed, 28 Apr 2004 00:27:11 -0700 (PDT) Received: from dazed.slacker.com (dazed.slacker.com [68.93.27.60]) by mx1.FreeBSD.org (Postfix) with ESMTP id 024FB43D5C for ; Wed, 28 Apr 2004 00:27:11 -0700 (PDT) (envelope-from nugget@slacker.com) Received: by dazed.slacker.com (Postfix, from userid 1000) id 7E3F4BDE60; Wed, 28 Apr 2004 02:27:10 -0500 (CDT) Resent-From: nugget@slacker.com Resent-Date: Wed, 28 Apr 2004 02:27:10 -0500 Resent-Message-ID: <20040428072710.GA22618@slacker.com> Resent-To: freebsd-hackers@freebsd.org In-Reply-To: <255A839665EA24408EB27A6AAE15518EACC5@europa.ad.hartbrothers.com> References: <255A839665EA24408EB27A6AAE15518EACC5@europa.ad.hartbrothers.com> Mime-Version: 1.0 (Apple Message framework v613) Content-Type: multipart/signed; micalg=sha1; boundary=Apple-Mail-5--401780888; protocol="application/pkcs7-signature" Message-Id: <8EC6A6D7-98D9-11D8-9BA8-000393DB55E6@slacker.com> X-Image-Url: http://slacker.com/~nugget/images/me64.jpg From: David McNett Date: Wed, 28 Apr 2004 01:01:57 -0500 To: X-Content-Filtered-By: Mailman/MimeDel 2.1.1 cc: Dave Hart cc: Shawn Harrison Subject: Re: Loosing STDOUT after file rotation X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 28 Apr 2004 07:27:11 -0000 --Apple-Mail-5--401780888 Content-Transfer-Encoding: 7bit Content-Type: text/plain; charset=US-ASCII; format=flowed On Apr 28, 2004, at 12:53 AM, wrote: > over. Similarly, I'd rather see worm attempts to infect > davehart@distributed.net result in the worm failing to send the email > in > the first place, rather than having it send it successfully only to > have > distributed.net's mailserver send a helpful bounce to an innocent > purported sender (remember, worms lie about sender habitually) > containing a copy > of the infection vector. Speaking on behalf of the poor distributed.net mailserver in question, this is only half the story when it comes to the damage done by qmail's behavior in this case. Not only is the accept-then-bounce behavior generating annoying and irrelevant bounces for innocent email addresses, it's also generated an outbound queue of bounces to domains and emails which don't exist which numbers in the tens of thousands. These mails clog up the outbound queue for 7 days with qmail dutifully attempting delivery periodically never quite coming to grips with the fact that the addresses are pure bunk. I switched my home server to postfix this past weekend and plan to do the same to the distributed.net servers now that I know how the conversion is done. -- David McNett http://www.slacker.com/~nugget/ --Apple-Mail-5--401780888--