<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic SMTP Open Mail Relay vulnerability in Operating System - Linux</title>
    <link>https://community.hpe.com/t5/operating-system-linux/smtp-open-mail-relay-vulnerability/m-p/4003003#M28357</link>
    <description>Hi! &lt;BR /&gt;&lt;BR /&gt;I'm looking how can I fix the security issue abour "SMTP Open Mail Relay" on  the reports whit tool called Foundstone i have the vulnerability CVE-1999-0512, the report don't explain how solve the problen.&lt;BR /&gt;&lt;BR /&gt;Any body can help me??</description>
    <pubDate>Fri, 18 May 2007 09:14:20 GMT</pubDate>
    <dc:creator>Joel Pavon</dc:creator>
    <dc:date>2007-05-18T09:14:20Z</dc:date>
    <item>
      <title>SMTP Open Mail Relay vulnerability</title>
      <link>https://community.hpe.com/t5/operating-system-linux/smtp-open-mail-relay-vulnerability/m-p/4003003#M28357</link>
      <description>Hi! &lt;BR /&gt;&lt;BR /&gt;I'm looking how can I fix the security issue abour "SMTP Open Mail Relay" on  the reports whit tool called Foundstone i have the vulnerability CVE-1999-0512, the report don't explain how solve the problen.&lt;BR /&gt;&lt;BR /&gt;Any body can help me??</description>
      <pubDate>Fri, 18 May 2007 09:14:20 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/smtp-open-mail-relay-vulnerability/m-p/4003003#M28357</guid>
      <dc:creator>Joel Pavon</dc:creator>
      <dc:date>2007-05-18T09:14:20Z</dc:date>
    </item>
    <item>
      <title>Re: SMTP Open Mail Relay vulnerability</title>
      <link>https://community.hpe.com/t5/operating-system-linux/smtp-open-mail-relay-vulnerability/m-p/4003004#M28358</link>
      <description>Well, the SMTP Open Mail Relay vulnerability, is basically telling you that someone else, from another network is able to send mail using your SMTP server, so outsiders are able to for example, send spam through your server. To solve this problem, you should check your SMTP server's documentation, and for us to give a helping hand to you, we should at least know the product you're running [stmp server] and version.&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Leandro Daniel Costa</description>
      <pubDate>Fri, 18 May 2007 09:27:05 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/smtp-open-mail-relay-vulnerability/m-p/4003004#M28358</guid>
      <dc:creator>Leandro Daniel Costa</dc:creator>
      <dc:date>2007-05-18T09:27:05Z</dc:date>
    </item>
    <item>
      <title>Re: SMTP Open Mail Relay vulnerability</title>
      <link>https://community.hpe.com/t5/operating-system-linux/smtp-open-mail-relay-vulnerability/m-p/4003005#M28359</link>
      <description>Sorry, but how can I know the version of SMTP??  &lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Tnks.</description>
      <pubDate>Fri, 18 May 2007 09:43:41 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/smtp-open-mail-relay-vulnerability/m-p/4003005#M28359</guid>
      <dc:creator>Joel Pavon</dc:creator>
      <dc:date>2007-05-18T09:43:41Z</dc:date>
    </item>
    <item>
      <title>Re: SMTP Open Mail Relay vulnerability</title>
      <link>https://community.hpe.com/t5/operating-system-linux/smtp-open-mail-relay-vulnerability/m-p/4003006#M28360</link>
      <description>I was run the command snmpd and this is the output of the command;&lt;BR /&gt;&lt;BR /&gt;#snmpd&lt;BR /&gt;Start SNMP Master Network Management daemon&lt;BR /&gt;SNMP Research SNMP Agent Resident Module Version 14.2.1.7 &lt;BR /&gt;Copyright 1989, 1990, 1991, 1992, 1993, 1994, 1995, 1996, 1997 SNMP Research, Inc.&lt;BR /&gt; &lt;BR /&gt;&lt;BR /&gt;This is the version??</description>
      <pubDate>Fri, 18 May 2007 09:45:53 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/smtp-open-mail-relay-vulnerability/m-p/4003006#M28360</guid>
      <dc:creator>Joel Pavon</dc:creator>
      <dc:date>2007-05-18T09:45:53Z</dc:date>
    </item>
    <item>
      <title>Re: SMTP Open Mail Relay vulnerability</title>
      <link>https://community.hpe.com/t5/operating-system-linux/smtp-open-mail-relay-vulnerability/m-p/4003007#M28361</link>
      <description>Hi Joel, we are talking about SMTP, not SNMP. Don't worry, it's easy to mix the things.&lt;BR /&gt;&lt;BR /&gt;What we need to know is what is your mail transfer agent (MTA), for example, sendmail, postfix, exim, etc.&lt;BR /&gt;&lt;BR /&gt;One option to try to identify the information is to run:&lt;BR /&gt;&lt;BR /&gt;telnet localhost 25&lt;BR /&gt;&lt;BR /&gt;That "could" display server and version information.&lt;BR /&gt;&lt;BR /&gt;Or, if you use an rpm based linux distro, run:&lt;BR /&gt;&lt;BR /&gt;rpm -qa | grep -e "sendmail|postfix"</description>
      <pubDate>Fri, 18 May 2007 09:51:28 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/smtp-open-mail-relay-vulnerability/m-p/4003007#M28361</guid>
      <dc:creator>Ivan Ferreira</dc:creator>
      <dc:date>2007-05-18T09:51:28Z</dc:date>
    </item>
    <item>
      <title>Re: SMTP Open Mail Relay vulnerability</title>
      <link>https://community.hpe.com/t5/operating-system-linux/smtp-open-mail-relay-vulnerability/m-p/4003008#M28362</link>
      <description>This is the output of command.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;#telnet localhost 25&lt;BR /&gt;Trying...&lt;BR /&gt;Connected to localhost.&lt;BR /&gt;Escape character is '^]'.&lt;BR /&gt;220 gamhap25. ESMTP Sendmail @(#)Sendmail version 8.13.3 - Revision 2.004 - 06/29/2006/8.9.3; Fri, 18 May 2007 09:50:56 -0500 (CDT)&lt;BR /&gt;</description>
      <pubDate>Fri, 18 May 2007 09:58:06 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/smtp-open-mail-relay-vulnerability/m-p/4003008#M28362</guid>
      <dc:creator>Joel Pavon</dc:creator>
      <dc:date>2007-05-18T09:58:06Z</dc:date>
    </item>
    <item>
      <title>Re: SMTP Open Mail Relay vulnerability</title>
      <link>https://community.hpe.com/t5/operating-system-linux/smtp-open-mail-relay-vulnerability/m-p/4003009#M28363</link>
      <description>Try this:&lt;BR /&gt;&lt;BR /&gt;cat mysendmail.cf | grep FR-o&lt;BR /&gt;&lt;BR /&gt;If it outputs something like this:&lt;BR /&gt;&lt;BR /&gt;FR-o /etc/somefile&lt;BR /&gt;&lt;BR /&gt;Then, you should edit /etc/somefile and set from which hosts you're willing to relay mail for, the most common setup for this, is to relay mail from localhost and from your local network. You have to put for example:&lt;BR /&gt;&lt;BR /&gt;192.168.0.0/24&lt;BR /&gt;127.0.0.1&lt;BR /&gt;&lt;BR /&gt;In that file and then send a SIGHUP to sendmail: killall -1 sendmail&lt;BR /&gt;&lt;BR /&gt;Hope it helps</description>
      <pubDate>Fri, 18 May 2007 10:07:29 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/smtp-open-mail-relay-vulnerability/m-p/4003009#M28363</guid>
      <dc:creator>Leandro Daniel Costa</dc:creator>
      <dc:date>2007-05-18T10:07:29Z</dc:date>
    </item>
    <item>
      <title>Re: SMTP Open Mail Relay vulnerability</title>
      <link>https://community.hpe.com/t5/operating-system-linux/smtp-open-mail-relay-vulnerability/m-p/4003010#M28364</link>
      <description>Hola Joel, please see:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.usebox.net/jjm/sendmail/#relay" target="_blank"&gt;http://www.usebox.net/jjm/sendmail/#relay&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Que viva el tequila!</description>
      <pubDate>Fri, 18 May 2007 10:52:56 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/smtp-open-mail-relay-vulnerability/m-p/4003010#M28364</guid>
      <dc:creator>Ivan Ferreira</dc:creator>
      <dc:date>2007-05-18T10:52:56Z</dc:date>
    </item>
  </channel>
</rss>

