Take a look at the output of the 'mailq' command and see if your mail in /var/spool/mail or mqueue is recognized by sendmail and if there are any errors associated with sending the mail (i.e. domain lookup failure or something more specific than its just sitting there).
Also, look at...
One caveat to what TalentedFool talked about -- you need to compile NEWDB support into sendmail to use the access_db feature (since you have to 'makemap' on the access file you create to make the access file into a db file).
I unfortunately only know the quirks of Linux to get NEWDB support...
Asusming that since this is in the Sendmail forum you are running sendmail....
within your sendmail.cf file, create an entry such as follows (this example runs the program 'inflex' which is a virus
scanning front end for sendmail):
Minflex, P=/usr/local/inflex/inflex...
You need to ensure that you have either 'libdb.a' or 'libdb.so', (look in sendmail/README for more info) which is what sendmail is looking for when it compiles. Additionally, 'db.h' needs to be available and within the include portion of the Build script.
Here is what I do to compile sendmail...
First, how are you assigning IPs to the workstations? If you are using DHCP, try setting a static IP, or simply hard-code the DNS server within the TCP/IP properties.
Secondly, as for the P2P sharing software - most of those connect via IP to the person you are downloading from - no DNS gets...
I have a Linux firewall/mailserver running kernel 2.4.10 and sendmail 8.12.1. There are a few domains that I cannot send mail to from the firewall. However - if I try to send mail from an internal box, mail flows to the same domain just fine. The firewall is NAT'ing using the external...
Your best source of information regarding nearly ANY command is the manpage. Using 'man <command>' (ie 'man rm') will help you not only know what that command does, but gets you used to using the included help system within any *NIX.
Don't know exactly the command to use??? 'man -k word'...
'rm -r dirname' will recursively delete the directory. Be very, very careful with this, many people have accidentially deleted an important directory in the process...
Take a look at 'man rm' for more information.
Hope this helps,
Paul
This is a computer trying to see if you have any servers that are vulnerable to Nimda. Even if you are fully patched/not vulnerable, you are going to see these requests - and A LOT of them. My home network has over 21000 requests for cmd.exe alone in the last few days.
This is nothing to fear...
If you have been only seeing this for the past couple of days, I would point to the Nimda virus. Even if you are not vulnerable and/or are completely protected, other hosts that have already been compromised are scanning networks for vulnerabilities.
My home account, which does not have...
AAA Authentication is the route that you want to take. Do a search on cisco.com for "AAA Authentication" and you should find more than enough resources for setting up exactly what you are looking for.
Hope this helps,
Paul
What are you trying to find out? Look at 'man host' for the usage. 'host -l xxxxx' will attempt to perform a zone transfer, which most sites will not allow. If you are looking at detailed information about a site without the actual zone transfer -- take a look at dig or nslookup.
Hope this...
In all honesty - if you have an infected/compromised server, no matter what it is infected/compromised with - your first course of action should be to remove it from the network and rebuilt it from a known, good backup. Who knows what else might have gotten in through the same hole...
Having...
Take a look at the DNS-HOWTO -- it has excellent information about getting your DNS Server up and running. Alos, think about getting the "DNS and Bind" book by O'Reilley Publishing, that is by far the best source of info for all your DNS needs.
Hope this helps,
Paul
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.