[Tails-dev] Testing EHLO messages: simplification proposal |
Aquest missatge és part del següent fil: | |
---|---|
![]() ![]() | l'arbre de fils complet ordenat per data |
![]() ![]() | |
![]() | sajolida en ![]() |
* Check that the profile works and is torified (specifically the EHLO/HELO SMTP messages it sends):
1. Send an email using Claws and a non-anonymizing SMTP relay. 2. Then check that email's headers once received, especially the Received: and Message-ID: ones.
* Also check that the EHLO/HELO SMTP message is not leaking anything with a packet sniffer: 1. start Claws using the panel icon. 1. Disable SSL/TLS for SMTP in Claws (so take precautions for not leaking your password in plaintext by either changing it temporarily or using a disposable account). 2. Run `sudo tcpdump -n -i lo -w dump` to capture the packets before Tor encrypts it, then close tcpdump, and check the dump for the HELO/EHLO message and verify that it only contains `localhost`.
Aquest missatge es va enviar a les següents llistes de correu: | ||||
---|---|---|---|---|
tails-dev Informació sobre la llista de correu | Missatges propers | ![]() | Re: [Tails-dev] tails logo | [Tails-dev] When to EOL incremental upgrade paths and clean up IUKs? | ![]() |
lists.autistici.org administrat per postmaster | Lurker (versió 2.3) |