--- man/auth-relaytest.1 2004-01-06 18:14:45.000000000 +0000 +++ man/auth-relaytest.1 2005-01-06 17:49:19.000000000 +0000 @@ -26,7 +26,7 @@ In the first mode of operation shown, auth-relaytest attempts to authenticate using anonymous NTLM authentication. A well-known bug in certain Microsoft SMTP -server implementations (described at http://www.microsoft.com/technet/security/bulletin/MS02-011.asp) +server implementations (described at http://www.microsoft.com/technet/security/bulletin/MS02-011.mspx) will allow relaying for any client that authenticates in this way. In the second form of operation, auth-relaytest attempts to authenticate using --- conf/dsbl.conf 2004-01-07 20:51:06.000000000 +0000 +++ conf/dsbl.conf 2005-01-06 17:50:43.000000000 +0000 @@ -88,9 +88,9 @@ Notes on SMTP AUTH vulnerabilities: -AUTH NTLM: See http://www.microsoft.com/technet/security/bulletin/MS02-011.asp -AUTH LOGIN: See http://www.spamhaus.org/rokso/search.lasso?evidencefile=2669 -AUTH CRAM-MD5: See http://www.spamhaus.org/rokso/search.lasso?evidencefile=2669 +AUTH NTLM: See http://www.microsoft.com/technet/security/bulletin/MS02-011.mspx +AUTH LOGIN: See http://www.spamhaus.org/rokso/evidence.lasso?rokso_id=ROK2669 +AUTH CRAM-MD5: See http://www.spamhaus.org/rokso/evidence.lasso?rokso_id=ROK2669 ... and, obviously, don't choose weak passwords" # # Verbosity level