From owner-freebsd-security Thu Mar 6 12:52:10 2003 Delivered-To: freebsd-security@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 5572237B401 for ; Thu, 6 Mar 2003 12:52:07 -0800 (PST) Received: from localhost.neotext.ca (h24-70-64-200.ed.shawcable.net [24.70.64.200]) by mx1.FreeBSD.org (Postfix) with ESMTP id 9687443F93 for ; Thu, 6 Mar 2003 12:52:05 -0800 (PST) (envelope-from campbell@localhost.neotext.ca) Received: from localhost.neotext.ca (localhost.neotext.ca [127.0.0.1]) by localhost.neotext.ca (8.12.8/8.12.5) with ESMTP id h26Kt3fv089576; Thu, 6 Mar 2003 13:55:03 -0700 (MST) (envelope-from campbell@localhost.neotext.ca) Received: (from campbell@localhost) by localhost.neotext.ca (8.12.8/8.12.5/Submit) id h26Kt3WC089575; Thu, 6 Mar 2003 13:55:03 -0700 (MST) Date: Thu, 6 Mar 2003 13:55:03 -0700 From: Duncan Patton a Campbell To: Mike Tancsa Cc: freebsd-security@FreeBSD.ORG Subject: Re: network audit of sendmail Message-Id: <20030306135503.304f5034.campbell@neotext.ca> In-Reply-To: <5.2.0.9.0.20030306094902.06e759a8@marble.sentex.ca> References: <5.2.0.9.0.20030306094902.06e759a8@marble.sentex.ca> Organization: Index Express Ltd. X-Mailer: Sylpheed version 0.8.6 (GTK+ 1.2.10; i386-unknown-freebsd4.7) Mime-Version: 1.0 Content-Type: multipart/signed; protocol="application/pgp-signature"; micalg="pgp-sha1"; boundary="lQfQovP8vB_=.1z?" Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.org --lQfQovP8vB_=.1z? Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit On Thu, 06 Mar 2003 10:41:43 -0500 Mike Tancsa wrote: > > I want to go through my network to a) ensure all my machines are updated > and b)look for customer machines running vulnerable versions of > sendmail. I put together a quick perl script, but its sequential and does > not scan in parallel. (this is slow for 16,000 hosts). Can anyone recommend My two bits werth: if you have a secure rsh, propagate a networm of your own to use those hosts you can as scanners. I also thing this is the way to propagate damage-reduction virii opposed to damaging ones across a net. Dhu --lQfQovP8vB_=.1z? Content-Type: application/pgp-signature -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.7 (FreeBSD) iD8DBQE+Z7WnXgQtJ7uBra8RApQeAKChHB8U4sExDmiZxlg82lZQj0iqUgCg04XL 2DVAur5ZCTyTrkFQdu1IP3w= =dRI/ -----END PGP SIGNATURE----- --lQfQovP8vB_=.1z?-- To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message