Solved

Linux RH6.2 Spam mail URGENT

Posted on 2002-07-21
2
239 Views
Last Modified: 2013-12-15
Hello friends

I am runing RH 6.2 with fetchmail sendmail and squid proxy
I am using dialup to connect local ISP
I see unwanted mails are going from my server
I saw some sockets are or some process are running who are sending mail to outside world,
Can anyone help how should I begin so as to stop this nuisance.


Tks
0
Comment
Question by:ranjan9999
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 15

Expert Comment

by:samri
ID: 7167772
Rajan,

What sendmail version are you running?  If the one you had is the sendmail that comes with RH6.2, chances are you would be running 8.9.3, and it would be better of to upgrade to a newer version.

Grab yourself a copy of Sendmail.org (http://www.sendmail.org/8.12.5.html)
And also take a look at the following pages

http://www.sendmail.org/tips/relaying.html
http://www.sendmail.org/~ca/email/relayingdenied.html
http://www.sendmail.org/~ca/email/chk-89f.html#RELAYING


cheers.
0
 

Accepted Solution

by:
aaroncarr earned 100 total points
ID: 7198524
One thing you don't mention is, do you need mail server functionality on this machine?

If not, stop sendmail entirely, and maybe consider uninstalling it.

If you actually need a mail server, I would suggest migrating to qmail [www.qmail.org].  It's much more lightweight than sendmail, also much faster and more secure.

Hope that helps.

Aaron
0

Featured Post

Comprehensive Backup Solutions for Microsoft

Acronis protects the complete Microsoft technology stack: Windows Server, Windows PC, laptop and Surface data; Microsoft business applications; Microsoft Hyper-V; Azure VMs; Microsoft Windows Server 2016; Microsoft Exchange 2016 and SQL Server 2016.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Daily system administration tasks often require administrators to connect remote systems. But allowing these remote systems to accept passwords makes these systems vulnerable to the risk of brute-force password guessing attacks. Furthermore there ar…
SSH (Secure Shell) - Tips and Tricks As you all know SSH(Secure Shell) is a network protocol, which we use to access/transfer files securely between two networked devices. SSH was actually designed as a replacement for insecure protocols that sen…
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…

756 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question