Re: poprelayd and sendmail relay authentication problem (Cobalt Raq3)

From: Christopher X. Candreva (chrisat_private)
Date: Fri Jul 06 2001 - 13:04:16 PDT

  • Next message: richardcaat_private: "Windows MS-DOS Device Name DoS vulnerabilities"

    On Fri, 6 Jul 2001, Ram'on Reyes Carri'on wrote:
    
    > A quick workaround that I have just applied is to make sure that the
    > string does not contain /sendmail/ so it cannot be injected into syslog
    > via sendmail (may be injected some other way!).
    
    Another workaround is to simply have your POP/IMAP daemons log to their own
    facility (ie -- one of the locals). We've done this for years anyway, as it
    makes using the logs to find problems much easier.
    
    
    ==========================================================
    Chris Candreva  -- chrisat_private -- (914) 967-7816
    WestNet Internet Services of Westchester
    http://www.westnet.com/
    



    This archive was generated by hypermail 2b30 : Sat Jul 07 2001 - 12:59:28 PDT