Difference between revisions of "Spamdyke"
From Atomicorp Wiki
(New page: == Overview == www.spamdyke.org == Known Issues == Spamdyke under el4 (CentOS4 and RHEL4) does not create dynamic executables, and is therefore in conflict with the stack protection ...) |
|||
Line 1: | Line 1: | ||
− | |||
== Overview == | == Overview == | ||
Line 8: | Line 7: | ||
== Known Issues == | == Known Issues == | ||
+ | '''RHEL4/CentOS4''' | ||
Spamdyke under el4 (CentOS4 and RHEL4) does not create dynamic executables, and is therefore in conflict with the stack protection in the ASL kernel. As such spamdyke is not supported under ASL in *ANY WAY*. | Spamdyke under el4 (CentOS4 and RHEL4) does not create dynamic executables, and is therefore in conflict with the stack protection in the ASL kernel. As such spamdyke is not supported under ASL in *ANY WAY*. | ||
+ | |||
+ | |||
+ | '''Plesk''' | ||
+ | As a general recommendation, all RBL's should be implemented in spamdyke, and not through the plesk interface. This allows blacklisted hosts to still send mail using authentication |
Revision as of 12:17, 11 February 2009
Overview
www.spamdyke.org
Known Issues
RHEL4/CentOS4 Spamdyke under el4 (CentOS4 and RHEL4) does not create dynamic executables, and is therefore in conflict with the stack protection in the ASL kernel. As such spamdyke is not supported under ASL in *ANY WAY*.
Plesk
As a general recommendation, all RBL's should be implemented in spamdyke, and not through the plesk interface. This allows blacklisted hosts to still send mail using authentication