Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:35584 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 17785 invoked by uid 1010); 19 Feb 2008 11:17:47 -0000 Delivered-To: ezmlm-scan-internals@lists.php.net Delivered-To: ezmlm-internals@lists.php.net Received: (qmail 17770 invoked from network); 19 Feb 2008 11:17:47 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 19 Feb 2008 11:17:47 -0000 Authentication-Results: pb1.pair.com header.from=paul@vanbrouwershaven.com; sender-id=unknown Authentication-Results: pb1.pair.com smtp.mail=paul@vanbrouwershaven.com; spf=permerror; sender-id=unknown Received-SPF: error (pb1.pair.com: domain vanbrouwershaven.com from 213.249.65.178 cause and error) X-PHP-List-Original-Sender: paul@vanbrouwershaven.com X-Host-Fingerprint: 213.249.65.178 mx1.networking4all.com Linux 2.4/2.6 Received: from [213.249.65.178] ([213.249.65.178:53482] helo=s009.networking4all.com) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id AE/D7-55225-9DABAB74 for ; Tue, 19 Feb 2008 06:17:46 -0500 Received: from [192.168.1.34] (212-123-152-214.dsl.ip.tiscali.nl [212.123.152.214]) by s009.networking4all.com (Postfix) with ESMTP id D50E6778D9; Tue, 19 Feb 2008 12:10:21 +0100 (CET) Message-ID: <47BABACF.9020109@vanbrouwershaven.com> Disposition-Notification-To: Paul van Brouwershaven Date: Tue, 19 Feb 2008 12:17:35 +0100 User-Agent: Thunderbird 2.0.0.9 (Windows/20071031) MIME-Version: 1.0 To: Daevel CC: internals@lists.php.net References: <47BAB83E.5070208@daevel.net> In-Reply-To: <47BAB83E.5070208@daevel.net> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-Scan-Status: Clean X-MailScanner-To: internals@lists.php.net, php-dev.list@daevel.net Subject: Re: [PHP-DEV] PHP mail() header patch for SafeMode From: paul@vanbrouwershaven.com (Paul van Brouwershaven) Daevel wrote: > Hello, > > without any patch you can modify the "sendmail_path" parameter and add > what you want no ? > > With mod_php I use this in my virtualhosts : > php_admin_value sendmail_path "/usr/sbin/sendmail -t -i -f > XXXX@DDDDD.TTT" Yes, I have done this.. but now is the question where is the spamming script? > An with CGI module, we already have the username. > > It should be enough to identify which member is involved ; no ? Yes, but not to identify which the script