Based on Shad Lords' original work, I've updated the mailman contrib to 2.1.5+ patch from 2.1.6 for the recent password harvesting vulnerability. The + newe-smith-mailman adds a simple panel to the server manager to enable/disable the service, with updated configuration for version 2.1.5. Find them here. http://www.ibiblio.org/pub/linux/distributions/e-smith/contrib/MichaelSoulier/6.0/RPMS/i386/mailman-2.1.5-23es02.i386.rpmhttp://www.ibiblio.org/pub/linux/distributions/e-smith/contrib/MichaelSoulier/6.0/RPMS/i386/e-smith-mailman-1.1.10-01.noarch.rpmThe second will be moved to the noarch directory shortly. Tested on 6.0. Installation directions:* install rpms* /etc/e-smith/events/actions/initialize-default-databases* /etc/e-smith/events/actions/navigation-conf* go to server-manager, load Mailman page* enable and saveYour initial mailman password will be saved as the SitePass property of the mailman record in the configuration database. Change it with /opt/mailman/bin/mmsitepass.