XM*8.0*24 (5444)    BUILD (9.6)

Name Value
NAME XM*8.0*24
DATE DISTRIBUTED 2004-03-17 00:00:00
PACKAGE FILE LINK MAILMAN
REQUIRED BUILD
  • XM*8.0*6
    ACTION:   Don't install, leave global
TYPE SINGLE PACKAGE
DESCRIPTION OF ENHANCEMENTS
Patch XM*8.0*24

                           It is strongly recommended that you answer YES
                           to prevent your site from unwittingly relaying
                           destructive mail.

                           If you answer YES, you should define your
                           "inside" sites in the MY DOMAIN (field #41)
                           multiple, so that MailMan can distinguish them
                           from outside sites.

                           Note: This does NOT prevent users from
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
                           receiving mail from outside sites.  It also
                           does NOT prevent users from forwarding mail to
                           outside sites.  Such uses are perfectly OK.

4.3,41   MY DOMAINS             4.1;0 Multiple #4.341

4.341,.01  MY DOMAINS             0;1 FREE TEXT (Multiply asked)

           INPUT TRANSFORM:  K:$L(X)>30!($L(X)<3) X
           LAST EDITED:      FEB 09, 2004

           HELP-PROMPT:      Answer must be 3-30 characters in length.
           DESCRIPTION:      If you answered YES to PREVENT MESSAGE
                             RELAYING? (field #40), to stop your site from
                             relaying messages from outside sites through
                             your site to other outside sites, you may add
                             entries here, in order to define what is an
                             "inside" site, or sites whose messages your
                             site is willing to relay.

                             For example, if your site is a VA site, then
NOIS: MWV-0104-22303, TUC-0104-62259, MAD-0104-42234, PAL-0204-60051
                             other VA sites are "inside" sites, and your
                             site should relay mail for them.  So, any
                             site whose domain name ends in ".DOMAIN.EXT" is
                             an "inside" site.  So VA sites should have
                             only one record in this multiple, and it
                             should be ".DOMAIN.EXT".

                             The default, if there are no entries in this
                             multiple, is your site's domain name.

Test Sites: FORUM; Martinsburg, WV; Martinez, CA; Palo Alto, CA; FO-Hines;
                             MailMan will check the site name of any site
                             which connects to it, and identifies itself
                             in the SMTP HELO <sitename> command.  If the
                             sitename ends in any of the entries in this
                             multiple, then any mail coming from that site
                             through your site to other sites, will be
                             accepted and relayed onward.

                             If the sitename does not end in any of the
                             entries in this multiple, then messages will
            Madison, WI; FO-Albany; Central Alabama HCS; Montana HCS;
                             only be accepted that are addressed to
                             recipients whose sitenames end in one of the
                             entries in this multiple.  Otherwise, the
                             site will receive an error message telling it
                             that relaying is denied, and messages will
                             not be accepted for relaying onward.

           CROSS-REFERENCE:  4.341^B
                             1)= S ^XMB(1,DA(1),4.1,"B",$E(X,1,30),DA)=""
                             2)= K ^XMB(1,DA(1),4.1,"B",$E(X,1,30),DA)
            Columbus, OH

The post-init routine, ^XMYP24, will populate these fields for VA sites.
Specifically, PREVENT MESSAGE RELAYING? (#40) will be set to YES, and
".DOMAIN.EXT" will be added to the MY DOMAIN (#41) multiple.  Non-VA sites
will have to populate these fields manually if they want to prevent message
relaying.  Routine ^XMYP24 will be deleted once it has run.

Option XMKSP [MailMan Site Parameters] and Help Frame
XM-I-S-SITE PARAMETERS-REMOTE have been modified to include the new fields.


NOTE: This patch should be installed during off hours, when user activity
is at a minimum. It requires patch XM*8.0*6.  This patch will take less
than one minute to install.

IMPORTANT NOTE TO NON-VA SITES:
This patch is only active for VA sites.  VA sites are sites whose domain
name ends in ".DOMAIN.EXT".  This patch will have absolutely no effect at
non-VA sites.  If you want to prevent MailMan at your non-VA site from
acting as an unwitting relay, you must edit fields 40 and 41 in file 4.3.
============================================================================ 
Recently, a MailMan site unwittingly acted as a relay for a non-VA site

ROUTINES:
The second line of the routine now looks like:
       ;;8.0;MailMan;**[patch list]**;Jun 28, 2002

              Before          After
Name          Checksum        Checksum        Patch List
------------------------------------------------------------------
XMR1          11104837        13422146        6,24
XMYP24        * NEW *           138765        24
sending a message containing the MyDoom virus to another non-VA site.  To
* Checksums produced by CHECK^XTSUMBLD

This patch introduces routine ^XMYP24, which will be deleted once the
post-init has run.
===========================================================================
 
INSTALLATION:
NOTE: This patch should be installed during off hours, when user activity
is at a minimum. It requires patch XM*8.0*6.  This patch will take less
than 1 minute to install.

correct this, MailMan will no longer relay mail from a non-VA site to a
1.  Users may be on the system during installation of this patch.
2.  DSM Sites: If any of these routines is mapped, disable mapping for the 
    affected routine(s).  
3.  On the PackMan menu, use the 'INSTALL/CHECK MESSAGE' option.  This loads 
    the patch into a Transport Global on your system.  
4.  Users may be on the system.  You do not need to stop TaskMan or the
    background filer.
5.  On the KIDS:Installation menu, use the following options to install the
    Transport Global:
       Verify Checksums in Transport Global
non-VA site.  This patch is about trying to prevent spammers and virus
       Print Transport Global
       Compare Transport Global to Current System
       Backup a Transport Global
       Install Package(s)
 Select INSTALL NAME:    XM*8.0*24     Loaded from Distribution  <date/time>
                         =========
 Install Questions for XM*8.0*24

 Incoming Files:

propagators from sending their email through your site and from disguising
   4.3       MAILMAN SITE PARAMETERS  (Partial Definition)
 Note:  You already have the 'MAILMAN SITE PARAMETERS' File.

 Want KIDS to Rebuild Menu Trees Upon Completion of Install? YES// YES
                                                                   ===
 Want KIDS to INHIBIT LOGONs during the install? YES// NO
                                                       ==
 Want to DISABLE Scheduled Options, Menu Options, and Protocols? YES// NO
                                                                       ==
 Enter the Device you want to print the Install messages.
their messages to appear to be coming from your site.
 You can queue the install by enter a 'Q' at the device prompt.
 Enter a '^' to abort the install.

 DEVICE: HOME// <You may queue it if you wish>
                ------------------------------
6.  DSM Sites: After patch has installed, rebuild your map set, if necessary.
7.  Enter a MAIL GROUP for the new bulletin XM RELAY ATTEMPTED.
===========================================================================

Let's be clear here.  We're talking about when a site connects to your
site, and says, hi, I've got some messages for you.  For instance, if the
site is AOL, it will say, HELO AOL.COM.  Your site says "Hey, wassup?".
The other site says I've got a message from so-and-so, to FRED@YAHOO.COM.
Before this patch, MailMan would say, OK, and accept the message and
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
relay it on to FRED@YAHOO.COM.  Now, however, MailMan will say, I'm sorry
but I'm not going to relay this message and act as a stooge for you - do
it yourself.  Here's an example.  (I'm using AOL and Yahoo just because
they're familiar.  I'm not suggesting that they are part of the problem.)

11:24:48 R: HELO AOL.COM                           <--- from outside site
11:24:48 S: 250 OK DOMAIN.EXT [8.0,DUP,SER,FTP]  <--- through FORUM
11:24:48 Waiting for input
11:24:48 R: MAIL FROM:<WILMA@AOL.COM>
11:24:48 S: 250 OK Message-ID:9979753@DOMAIN.EXT

11:24:48 Waiting for input
11:24:48 R: RCPT TO:<FRED@YAHOO.COM>               <--- to an outside user
11:24:48 S: 550 Relaying denied.                   <--- No way!

If WILMA at AOL sends you a message at your site, and you want to forward
the message on to FRED@YAHOO.COM, that's fine.  This patch will not prevent
you from doing that.  That's something completely different from what this
patch is designed to prevent.

This patch adds a new bulletin which will notify the POSTMASTER any time
                             ATTENTION!
MailMan refuses to relay a message.  You are encouraged to add a mail group
to the bulletin to notify additional responsible persons.
Here's the bulletin:

NAME: XM RELAY ATTEMPTED           SUBJECT: Potential SPAM or VIRUS stopped
  RETENTION DAYS: 7
 MESSAGE:   A site calling itself |1| attempted to relay a message from: |3|
 to:   |2| through this site.
  
 This attempt was denied.
   You should enter a MAIL GROUP for the new bulletin XM RELAY ATTEMPTED.
  
 By far the most important thing that a service provider can do to reduce
 spam or viruses is to ensure that any mail servers in operation accept only
 outgoing mail from machines within their own domains.  This prohibits SMTP
 relaying, denying spammers and virus propagators a necessary component of
 anonymity.
MAIL GROUP: POSTMASTER
 DESCRIPTION:   This bulletin is sent when MailMan prevents an outside site
 from relaying a message to an outside site through this site.
PARAMETER: 1

 DESCRIPTION:   The name of the site attempting to relay the message through
 this site.
PARAMETER: 2
 DESCRIPTION:   The intended recipient of the message.
PARAMETER: 3
 DESCRIPTION:   The envelope from of the message.

This patch adds two new fields to the MAILMAN SITE PARAMETERS (#4.3) file:

STANDARD DATA DICTIONARY #4.3 -- MAILMAN SITE PARAMETERS FILE
   Non-VA sites should read the patch description carefully.  Non-VA sites
STORED IN ^XMB(1,  (1 ENTRY)
DATA     NAME                  GLOBAL        DATA
ELEMENT  TITLE                 LOCATION      TYPE
--------------------------------------------------------------------------
4.3,40   PREVENT MESSAGE RELAY? 4;1 SET

                           '1' FOR YES;
                           '0' FOR NO;
         LAST EDITED:      FEB 09, 2004
         HELP-PROMPT:      Should message relaying be prevented?
                 will need to set new fields manually.
         DESCRIPTION:      Answer YES if you want to prevent outside sites
                           from sending mail through your site to other
                           outside sites.  Spammers and Virus propagators
                           use this technique to disguise the source of
                           their mail, and to make it appear to come from
                           a trusted source, namely your site.

                           Answer NO if you want your site to act as a
                           relay site for anyone.

TRACK PACKAGE NATIONALLY YES
FILE
  • DD NUMBER:
    • MAILMAN SITE PARAMETERS (File-top level)
      FIELD NUMBER:
      • PREVENT MESSAGE RELAY?
    • MY DOMAINS (sub-file)
    UPDATE THE DATA DICTIONARY:   YES
    SEND SECURITY CODE:   YES
    SEND FULL OR PARTIAL DD:   PARTIAL
    DATA COMES WITH FILE:   NO
    MAY USER OVERRIDE DATA UPDATE:   NO
BUILD COMPONENTS
  • ENTRIES:
    • XMKSP
      ACTION:   SEND TO SITE
  • ENTRIES:
    • XM RELAY ATTEMPTED
      ACTION:   SEND TO SITE
  • ENTRIES:
    • XM-I-S-SITE PARAMETERS-REMOTE
      ACTION:   SEND TO SITE
  • ENTRIES:
    • XMR1
      ACTION:   SEND TO SITE
      CHECKSUM:   B63434402
    • XMYP24
      ACTION:   SEND TO SITE
      CHECKSUM:   B214056
POST-INSTALL ROUTINE ENTER^XMYP24
DELETE POST-INIT ROUTINE Yes