Difference between revisions of "Spamdyke"

From Atomicorp Wiki
Jump to: navigation, search
(New page: == Overview == www.spamdyke.org == Known Issues == Spamdyke under el4 (CentOS4 and RHEL4) does not create dynamic executables, and is therefore in conflict with the stack protection ...)
 
Line 1: Line 1:
 
 
== Overview ==
 
== Overview ==
  
Line 8: Line 7:
 
== Known Issues ==
 
== Known Issues ==
  
 +
'''RHEL4/CentOS4'''
 
Spamdyke under el4 (CentOS4 and RHEL4) does not create dynamic executables, and is therefore in conflict with the stack protection in the ASL kernel. As such spamdyke is not supported under ASL in *ANY WAY*.
 
Spamdyke under el4 (CentOS4 and RHEL4) does not create dynamic executables, and is therefore in conflict with the stack protection in the ASL kernel. As such spamdyke is not supported under ASL in *ANY WAY*.
 +
 +
 +
'''Plesk'''
 +
As a general recommendation, all RBL's should be implemented in spamdyke, and not through the plesk interface. This allows blacklisted hosts to still send mail using authentication

Revision as of 13:17, 11 February 2009

Overview

www.spamdyke.org


Known Issues

RHEL4/CentOS4 Spamdyke under el4 (CentOS4 and RHEL4) does not create dynamic executables, and is therefore in conflict with the stack protection in the ASL kernel. As such spamdyke is not supported under ASL in *ANY WAY*.


Plesk As a general recommendation, all RBL's should be implemented in spamdyke, and not through the plesk interface. This allows blacklisted hosts to still send mail using authentication

Personal tools