<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Sendmail: Patch &amp;amp; IPF or Remove? in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/sendmail-patch-amp-ipf-or-remove/m-p/2924783#M110314</link>
    <description>Hi Karl,&lt;BR /&gt;&lt;BR /&gt;No need to remove sendmail, just turn off it's ability to accept mail. That's what this latest exploit was targeting - systems that *accept* mail.&lt;BR /&gt;To stop sendmail run&lt;BR /&gt;&lt;BR /&gt;/sbin/init.d/sendmail stop&lt;BR /&gt;&lt;BR /&gt;Then to disable it from starting at next boot edit&lt;BR /&gt;&lt;BR /&gt;/etc/rc.config.d/mailservs&lt;BR /&gt;&lt;BR /&gt;and set &lt;BR /&gt;&lt;BR /&gt;export SENDMAIL_SERVER=0&lt;BR /&gt;&lt;BR /&gt;I doubt IPF rules would stop this exploit. The header was where the danger was &amp;amp; I'm not sure IPF can interrogate the header of mail msgs.&lt;BR /&gt;&lt;BR /&gt;Rgds,&lt;BR /&gt;Jeff</description>
    <pubDate>Wed, 12 Mar 2003 00:54:24 GMT</pubDate>
    <dc:creator>Jeff Schussele</dc:creator>
    <dc:date>2003-03-12T00:54:24Z</dc:date>
    <item>
      <title>Sendmail: Patch &amp; IPF or Remove?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/sendmail-patch-amp-ipf-or-remove/m-p/2924782#M110313</link>
      <description>Context:  I work at a bank, and we get an awful lot of security warnings, the most recent about sendmail.&lt;BR /&gt;&lt;BR /&gt;General Question:  Are the latest patches enough to  address standard security concerns?  I have the option to turn it off completely, as it's not being used, except by the system itself for various messages generated when I do software installs, etc.  The systems are devoted to other uses.&lt;BR /&gt;&lt;BR /&gt;Specific Question:  If inclined, how would I go about removing sendmail from the system, is it as simple as swremove and clearning out the mail queue?  Bonus:  Can't a few nifty IPF rules solve this and leave the nicely patched sendmail intact?</description>
      <pubDate>Wed, 12 Mar 2003 00:46:42 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/sendmail-patch-amp-ipf-or-remove/m-p/2924782#M110313</guid>
      <dc:creator>Karl Balsmeier</dc:creator>
      <dc:date>2003-03-12T00:46:42Z</dc:date>
    </item>
    <item>
      <title>Re: Sendmail: Patch &amp; IPF or Remove?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/sendmail-patch-amp-ipf-or-remove/m-p/2924783#M110314</link>
      <description>Hi Karl,&lt;BR /&gt;&lt;BR /&gt;No need to remove sendmail, just turn off it's ability to accept mail. That's what this latest exploit was targeting - systems that *accept* mail.&lt;BR /&gt;To stop sendmail run&lt;BR /&gt;&lt;BR /&gt;/sbin/init.d/sendmail stop&lt;BR /&gt;&lt;BR /&gt;Then to disable it from starting at next boot edit&lt;BR /&gt;&lt;BR /&gt;/etc/rc.config.d/mailservs&lt;BR /&gt;&lt;BR /&gt;and set &lt;BR /&gt;&lt;BR /&gt;export SENDMAIL_SERVER=0&lt;BR /&gt;&lt;BR /&gt;I doubt IPF rules would stop this exploit. The header was where the danger was &amp;amp; I'm not sure IPF can interrogate the header of mail msgs.&lt;BR /&gt;&lt;BR /&gt;Rgds,&lt;BR /&gt;Jeff</description>
      <pubDate>Wed, 12 Mar 2003 00:54:24 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/sendmail-patch-amp-ipf-or-remove/m-p/2924783#M110314</guid>
      <dc:creator>Jeff Schussele</dc:creator>
      <dc:date>2003-03-12T00:54:24Z</dc:date>
    </item>
    <item>
      <title>Re: Sendmail: Patch &amp; IPF or Remove?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/sendmail-patch-amp-ipf-or-remove/m-p/2924784#M110315</link>
      <description>We have faced similar concerns.  Our systems use sendmail to route outbound messages from cron to mailboxes that indicate the cron job has succeeded in doing important things like backing up the database.&lt;BR /&gt;&lt;BR /&gt;So sendmail has to run and its possible to direct mail at this exploit with a telnet session.&lt;BR /&gt;&lt;BR /&gt;So we installed the latest sendmail 8.11.1 patch and will be installed the new binaries after making sure the patch didn't do anything bad.&lt;BR /&gt;&lt;BR /&gt;Here is how we keep up on these security issues.&lt;BR /&gt;&lt;BR /&gt;Fist we subscribe to itrc security bulletins, which you apparently already do.&lt;BR /&gt;&lt;BR /&gt;Next we use the following tools to harden security on our system and notify us of security patches.&lt;BR /&gt;&lt;BR /&gt;Bastille Security hardening&lt;BR /&gt;&lt;A href="http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=B6849AA" target="_blank"&gt;http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=B6849AA&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Perl which the above needs.&lt;BR /&gt;&lt;A href="http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=PERL" target="_blank"&gt;http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=PERL&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Security Patch Check&lt;BR /&gt;&lt;A href="http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=B6834AA" target="_blank"&gt;http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=B6834AA&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;TCP Wrappers&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=TCPWRAP" target="_blank"&gt;http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=TCPWRAP&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;IDS/9000 (Intrusion Detection Sytstem)&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=J5083AA" target="_blank"&gt;http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=J5083AA&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Get all these products working you'll be quite secure.&lt;BR /&gt;&lt;BR /&gt;SEP&lt;BR /&gt;</description>
      <pubDate>Wed, 12 Mar 2003 03:57:38 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/sendmail-patch-amp-ipf-or-remove/m-p/2924784#M110315</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2003-03-12T03:57:38Z</dc:date>
    </item>
  </channel>
</rss>

