Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 16 Dec 1996 23:44:54 +0800 (HKT)
From:      Doug Kwan ~{9XUq5B~} <ctkwan@cs.hku.hk>
To:        mika ruohotie <bsdsec@shadows.aeon.net>
Cc:        security@freebsd.org
Subject:   Re: mail bomb!
Message-ID:  <Pine.SUN.3.91.961216233834.9815A-100000@champion>
In-Reply-To: <199612161201.OAA11649@shadows.aeon.net>

next in thread | previous in thread | raw e-mail | index | archive | help
Hi,

On Mon, 16 Dec 1996, mika ruohotie wrote:

> you are using sendmail, right?
> 
> you should atleast have this in your /etc/sendmail.cf
> 
> O PrivacyOptions=authwarnings,needmailhelo,needexpnhelo,novrfy
> 
> and then run it with loglevel 12, that should atleast help you from
> tracking down from where he's connecting, assuming you have no clue.
Our mail daemon always logs the IP address of the incoming mails but that
bastard uses relaying hosts. So if the relaying hosts do not log
the IP address of the mail source we cannot trace the origin. We have
to contact the administrators of the relaying hosts for information.
Some are will to help but not all. 

Typically, what we do not is to set our routers to stop all traffic
between us and a relaying host. Now all the spam mails will be stuck
in the relaying host. We will send a warning message to the adminstrator
there via another channel telling him/her better cleanning the out-going
mail queue before it is too late.

> 
> but still, the administrative messages should _always_ be authenticated.
> 
Will do.

Thanks 

-Doug



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.SUN.3.91.961216233834.9815A-100000>