nullmailer - Sending failed: Could not exec program
Gene Heskett
gheskett at wdtv.com
Sun Jun 22 14:37:29 UTC 2014
On Sunday 22 June 2014 06:55:59 Graham Watkins did opine
And Gene did reply:
> On 22/06/14 11:44, Chris Green wrote:
> > On Sat, Jun 21, 2014 at 05:38:13PM +0100, Graham Watkins wrote:
> >> On 21/06/14 16:47, Gene Heskett wrote:
> >>> On Saturday 21 June 2014 11:33:01 Graham Watkins did opine
> >>> And Gene did reply:
> >>>
> >>>
> >>> That is an outside address. Does your dns resolver know who
> >>> ntlworld.com is?
> >>
> >> Haven't the foggiest. How would I check?
> >
> > Say 'host ntlworld.com' and see if it finds it.
>
> Hi Chris
>
> host ntlworld.com brings up the following (which was not exactly what I
> was expecting):
>
> host ntlworld.com
> ntlworld.com has address 212.250.162.12
Security lesson time:
This is an "outside" address. Anyone in the world can find it, and exploit
it if possible. And an unpatched windows machine will be rooted by someone
in eastern Europe, or even stateside, often within 30 seconds of plugging
in the CAT5 cable. Linux machines are far better, but not invincible.
One thing I have done for over a decade now, is to run my local network,
all of it, on local addresses that cannot pass thru a router. There are
at least 2 IPV4 address blocks that are filtered that way. I use a local
address for all my machines in the 192.168.xx.xx range, and program the
router to Native Address Translate that address to the address the router
gets from my ISP. Running IPTables, its sorta one way but it remembers
data requests from me to wherever, and NATs the response back to my
address. The router I use has enough flash memory that it can be re-
flashed to DD-WRT, one of several choices available for considerably
enhanced security.
The end result is that only one person has come into this machine in 10
years, and I gave him the usernames & passwords to do that. The router
gets banged on many thousands of times a day, but no one has gotten thru
it except the above person.
Any router, particularly those supplied by your ISP, has back doors
(plural, one for your ISP and one for NSA use too if you are in the US)
until you put good software in it. That is what I'd call Pro-Active
security. And its totally transparent to me.
> ntlworld.com mail is handled by 5 alt1.aspmx.l.google.com.
> ntlworld.com mail is handled by 5 alt2.aspmx.l.google.com.
> ntlworld.com mail is handled by 10 aspmx2.googlemail.com.
> ntlworld.com mail is handled by 10 aspmx3.googlemail.com.
> ntlworld.com mail is handled by 1 aspmx.l.google.com.
>
> I don't know if this has anything to do with my changing the nullmailer
> remotes file to use gmail - perhaps you can tell me.
My point is that to send an email message to you the user on that machine,
from that machine, is that the message never has to leave the machine.
What you are doing is bouncing it off the google servers, which it should
not have to do.
As I use /etc/host files for the local stuff, I have never configured my
local dns lookup for a response to the host command, so I get this for
that command:
gene at coyote:~$ host coyote.coyote.den
Host coyote.coyote.den not found: 3(NXDOMAIN)
> I have now got a result (see below). Thanks for your input.
>
> Cheers,
>
> Graham
Cheers, Gene Heskett
--
"There are four boxes to be used in defense of liberty:
soap, ballot, jury, and ammo. Please use in that order."
-Ed Howdershelt (Author)
Genes Web page <http://geneslinuxbox.net:6309/gene>
US V Castleman, SCOTUS, Mar 2014 is grounds for Impeaching SCOTUS
More information about the ubuntu-users
mailing list