[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
RE: [cobalt-users] POP before SMTP, Open relay still open
- Subject: RE: [cobalt-users] POP before SMTP, Open relay still open
- From: "J. Patrick Lanigan" <patl@xxxxxxxxxxx>
- Date: Thu Jul 5 23:33:33 2001
- List-id: Mailing list for users to share thoughts on Cobalt products. <cobalt-users.list.cobalt.com>
> Jonathan Michaelson wrote:
>
> If you tested the exploit before applying the hack, did you delete the
> offending IP from the poprelayd database before running the exploit again?
>
> To do so, use the following to list the IP's in the database:
> perl /usr/local/sbin/poprelayd -p
>
> And use the following to delete the offending IP (e.g. 66.66.66.66):
> perl /usr/local/sbin/poprelayd -r 66.66.66.66
>
> Now add the hack and test the exploit to see if 66.66.66.66 is re-entered
> into the poprelayd d/b.
Jonathan,
Thanks for the info, but after checking to see if the IP was in the DB(it
wasn't), I went back to http://members.iinet.net.au/~remmie/relay/ to see if
it still got through. Indeed it does. RegEx is my weakest knowledge when it
come to perl coding, but that hack looks like it ought to work to me. Anyone
have any other open relay testing pages they could point me at?
Thanks,
Patrick