Date: Thu, 30 Oct 2014 10:32:39 +1100 (EST) From: Dave Horsfall <dave@...sfall.org> To: oss-security <oss-security@...ts.openwall.com> Subject: Re: list policy (Re: Truly scary SSL 3.0 vuln to be revealed soon:) On Wed, 29 Oct 2014, Michal Zalewski wrote: > (BUGTRAQ, too, although that list seems to be in a pretty bad shape > these days and perhaps its days are numbered). It could be because they're hosted at Security Focus, whose mailserver could best be described as erratic. It doesn't like long banners or greet pauses (both anti-spammer defences) and retries frequently, as if that will make any difference. I'm told that this is a "feature" of Qmail (along with its other antisocial habits). Oddly enough, I do receive the occasional BugTraq message, so sometimes it works, hence my description of them being erratic. For example, this one worked: Received: from sf01smtp2.securityfocus.com (smtp.securityfocus.com [126.96.36.199]) yet these failed miserably: Oct 30 09:46:20 aneurin sm-mta: s9TMhmHs079426: smtp.securityfocus.com [188.8.131.52] did not issue MAIL/EXPN/VRFY/ETRN during connection to IPv4 Oct 30 09:46:30 aneurin sm-mta: s9TMhv1H079427: smtp.securityfocus.com [184.108.40.206] did not issue MAIL/EXPN/VRFY/ETRN during connection to IPv4 Feedback to list owner, abuse, and postmaster go implacably unanswered. -- Dave Horsfall (VK2KFU) "Bliss is a MacBook with a FreeBSD server." http://www.horsfall.org/spam.html (and check the home page whilst you're there)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Powered by Openwall GNU/*/Linux - Powered by OpenVZ