Date: Tue, 23 Apr 1996 09:58:33 -0400 (EDT) From: Charles Henrich <henrich@crh.cl.msu.edu> To: joerg_wunsch@uriah.heep.sax.de Cc: freebsd-hackers@freebsd.org, davidg@Root.COM Subject: Re: .forward and sendmail? Message-ID: <199604231358.JAA05012@crh.cl.msu.edu> In-Reply-To: <199604230332.FAA21276@uriah.heep.sax.de> from "J Wunsch" at Apr 23, 96 05:32:42 am
next in thread | previous in thread | raw e-mail | index | archive | help
> Yes, but think about it. It reads the .forward with the identity of > `daemon', not `root'. Otherwise, any user could link his ~/.forward > to a file read-only for root, and try to figure out the contents of > this file by sending mail to himself, and analyzing the bounces. Not > that this will compromise the entire file, but that's why i wrote: ``I > would call it a security feature.'' Yes but think about it, .forwards WILL NOT WORK USUALLY EVER if sendmail doesnt read .forward's as root! Most home directories are 700! This is a *bug* not a feature. -Crh Charles Henrich Michigan State University henrich@msu.edu http://pilot.msu.edu/~henrich
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199604231358.JAA05012>