Sapphire SQL Worm Scanner

The Retina Sapphire SQL Worm Scanner is a tool created by eEye for scanning up to 254 IP addresses at once to determine if any are vulnerable to the Microsoft SQL buffer overflow vulnerability that the recent Sapphire Worm uses to propagate. If an IP address is found to be vulnerable to the MS SQL flaw, the Retina Sapphire SQL Worm Scanner will flag that address as vulnerable. Administrators can then double-click on the IP address for a link to a website with information on how to fix the vulnerability.

Continue reading Sapphire SQL Worm Scanner

mod_auth_mysql and apc-aa authentication

* Installing mod_auth_mysql *
(This works only for apache with mod_so installed)

1) Download mod_auth_mysql module from ( say in /usr/local/src)
(URL for the project site:

2) untar the module ( tar -zxvf mod_auth_mysql-3.2.tar.gz)
3) cd /usr/local/src/mod_auth_mysql-3.2
4) Edit the Makefile to suit your requirement. Edit the APXS and OPTS values. Sample Makefile is provided here:
—————— Sample Makfile —————————–
APXS = /usr/local/apache/bin/apxs # Location of apxs binary
SRCS = mod_auth_mysql.c
HDRS = mod_auth_mysql.h
OPTS = -I/usr/include/mysql -L/usr/lib/mysql -lmysqlclient

all: $(DSO)

$(DSO): $(SRCS) $(HDRS)
$(APXS) $(APXSFLAGS) -o $(DSO) $(OPTS) -c $(SRCS)

install: $(DSO)

-rm -f *.o $(DSO)
5) run make;make install
6) mod_auth_mysql has been installed now. If successfully installed, httpd.conf will now contain the following line:
LoadModule auth_mysql_module libexec/

Continue reading mod_auth_mysql and apc-aa authentication

Virtual Hosting with Mailman

This document is useful if:
1) Need to provide mailman to multiple domains
2) domain wants to have their customized mailman
3) list of one domain conflicts with another…


This doc assumes that mailman is already running on the server and that this doc is only for configuring mailman for multiple domains.

Installing Mailman for domain

1) mkdir /www/ ( where mailman would be installed for the additional domain)
2) chown -R mailman.mailman /www/
3) chmod 02755 /www/
4) Untar the mailman package.
5) Run: ./configure –prefix=/www/ –with-username=mailman –with-groupname=mailman –with-cgi-gid=1063 –with-mail-gid=47
where 1063 is gid of the user under which the cgis run, and 47 the uid of mail/sendmail/smmsp
6) If you had installed sendmail from source, you would now need to make a symlink to the mailman wrapper binary
a. cd /www/
b. ln -s wrapper wrapper2
c. cd /usr/adm/sm.bin ( or the dir where the symlink for smrsh to work properly are, which you had already configured for the initial mailman installation)
d. ln -s /www/ ./wrapper2
7) chmod -R 755 /www/
8) chown -R mailman.mailman /www/

Creating a list and configuring sendmail

Configuring Mailman for Virtualhosting for

1) su – mailman
2) cd /www/
3) ./newlist ( for example, news)
4) this will give the output like:
news: “|/www/ post news”
news-admin: “|/www/ mailowner news”
news-request: “|/www/ mailcmd news”
news-owner: news-admin

Copy the text ( DO NOT ADD THIS to /etc/mail/aliases yet)

5) Edit the text to:
mydomain_news: “|/www/ post news”
mydomain_news-admin: “|/www/ mailowner news”
mydomain_news-request: “|/www/ mailcmd news”
mydomain_news-owner: mydomain_news-admin

and as root, add to /etc/mail/aliases

6) Then, edit /etc/mail/virtusertable ( as root),and add the follwing: mydomain_news mydomain_news-admin mydomain_news-request mydomain_news-owner

7) as root, run /etc/rc.d/init.d/sendmail restart

List “news” is now created for