some patches ...
firedns-local-bind
MessageWall paranoia mail trace ("Received" header) / fakedbighost_reject
This adds a check method to detect faked mails from big sites/domains like hotmail or aol. It checks
the by/from fields in the mail trace header "Received:" for a host name that matches the domain
of the senders address.
A new profile option is available to configure which domains to check.
The patch updates everything needed, the program itself, the messagewallstats program and the man pages.
example:
in profile: fakedbighost_reject=1,hotmail.com
sender: your_real_friend@hotmail.com
Received: from 192.168.43.78 by hotmail.com with Microsoft SMTPSVC; Mon, 02 Dec 2002 18:43:11 GMT
this looks good the mail traveled thru a hotmail mail server other wise the mail score would grow by one.
patch: paranoia.patch for MessageWall 1.0.8
patch: paranoia_m110.patch for MessageWall 1.1.0 (devel)
a list with verified big hosts suitable for the fakebighost check: big_hosts.txt
MessageWall qmail-dash
Adds the ability to match qmail dash wildcard addresses
to the actual email account to select the correct profile. As configured in the special_users file of MessageWall.
example:
in special_users: collin@example.com:CollinsProfile
incoming mail for: collin-amazon@example.com
first step: collin-amazon@example.com is checked (as normal)
second step: "-amazon" is removed, collin@example.com is checked (this is new!)
third step: example.com is checked (not in this example because collin@example.com all ready has a match)
patch: qmail_dash.patch for MessageWall 1.0.8 and 1.1.0 (devel)
MessageWall spam stats
MessageWall broken parameter value
Some email viruses use badly composed mime attachments, especially unquoted filenames that contain
spaces. MessageWall can't handle these by default. This badly breaks the detection of files with
unwanted extensions (like .pdf/.vbs/etc...). This patch removes this disadvantage.
patch: broken_parameter_value.patch for MessageWall 1.0.8 (should be apply able to devel)
All MessageWall patches are compatible, just apply using patch -p0 <patchfile
OpenBSD / authpf prevent multiple logins (as config option)
Authpf normally only checks if there is more than one login from the same IP. With this patch it is possible to restrict the concurrent logins
of a user to one - so accounts can't be used to login more then one pc. I made this for our university student access point, to prevent
account sharing among the students.
The anti-double login works like the IP switch, if a user logs on from an other IP then the old session gets terminated (this is needed as
a workaround for crashing windows clients).
patch: authpf_patch
arpwatch scriptable report function
arpwatch normally notifys root about events like new stations or flipflops via email by running sendmail. With arpwatch_report
arpwatch trys to run aprwatch_report handing over all data via parameters and stdin if aprwatch_report can't be run arpwatch
falls back to sendmail.
This is great for monitoring dynamic environments. README and sample report script included!
patch: arpwatch_repscr.patch
Linux-WLan-NG set MAC address by config. profile
adds the possibility to configure a different MAC address for each SSID profile, simply set the variable MAC_ADDRESS in
the profile to the desired address
patch: linux-wlan-ng-CUSTOM_MAC_ADDRESS.patch
BlueZ better L2CAP RAW socket support
At the moment there is only very limited support for L2CAP RAW sockets in BlueZ, a RAW socket only gets
a very limited range of packets on the sig-channel (the l2cap command channel). This patch just changes this
behavior, it puts all packages on the sig-channel to ALL RAW sockets (each RAW socket has to filter out
the interesting parts). As RAW sockets are not used very often this should not have a bad effect on speed.
patch: bluez-l2cap-raw-socket.patch
This patch is now included in the latest (>= 2.4.26 and >= 2.6.6) Linux Kernel versions.
BlueZ RFCOMM dynamic channel allocation and bind() to specific local BDADDR fix
When binding to specific local BT device address (not equal to BDADDR_ANY) dynamic RFCOMM channel allocation
doesn't work. This patch fixes this problem.
patch for /usr/src/linux/net/bluetooth/rfcomm/sock.c
patch: rfcomm_dynamic_channel_alloc_fix.patch
Cyrus-SASL saslauthd rimap realm (full email address patch)
I've added a small option to sasl auth_rimap, it gives the possibility
to use user + realm for authentication instead of just the user part.
This comes in handy if you use email addresses as smtp_auth logins and
need more the just the user part, e.g: "collin@example.com" would
end up as "collin" for IMAP authentication which wouldn't work because
the full email address is required (which is the case if you host
multiple domains).
The new rimap option (-O) with this patch applied is:
host/service/delimiter where delimiter can be anything thats >= one (1) charracters long
(normaly one would use an '@'), e.g. "localhost/imap/@"
Ofcourse the old behavior is kept when not using this option.
patch: sasl2_rimap_realm.patch
-[ Home ]-[ Weblog ]-[ Bluetooth ]-[ Windows Mobile ]-[ Symbian ]-[ PalmOS ]-[ J2ME ]-[ Maemo ]-[ Security ]-[ iPhone ]-[ Android ]-[ NFC ]-[ Contact ]-