From owner-freebsd-questions@FreeBSD.ORG Sat Nov 29 17:04:13 2008 Return-Path: Delivered-To: freebsd-questions@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id A8136106564A for ; Sat, 29 Nov 2008 17:04:13 +0000 (UTC) (envelope-from dan-freebsd-questions@ourbrains.org) Received: from ourbrains.org (li48-221.members.linode.com [66.246.76.221]) by mx1.freebsd.org (Postfix) with SMTP id 4CAE38FC18 for ; Sat, 29 Nov 2008 17:04:13 +0000 (UTC) (envelope-from dan-freebsd-questions@ourbrains.org) Received: (qmail 32052 invoked by uid 1000); 29 Nov 2008 17:04:34 -0000 Date: Sat, 29 Nov 2008 12:04:34 -0500 From: Dan To: "freebsd-questions@freebsd.org" Message-ID: <20081129170434.GB27853@ourbrains.org> Mail-Followup-To: "freebsd-questions@freebsd.org" References: <26face530811221316y5be5bf40ra5c38f389f554ca1@mail.gmail.com> <20081124173650.GA933@ourbrains.org> <20081124193819.GF55491@gizmo.acns.msu.edu> <20081129160329.GA27853@ourbrains.org> <47D7B64C-E783-48C8-A33B-A48AB66DA2E5@boosten.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <47D7B64C-E783-48C8-A33B-A48AB66DA2E5@boosten.org> User-Agent: Mutt/1.5.18 (2008-05-17) Subject: Re: Unix program that sends email directly using MX record X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 29 Nov 2008 17:04:13 -0000 Peter Boosten(peter@boosten.org)@2008.11.29 17:34:28 +0100: >> It's not prejudicial. I do not wish to start yet another MTA flamewar, >> but you can't deny Sendmail's poor security, design, performance, and >> complex configuration. The poor security history is there, the poor >> funnel design and conf files that require a scripting language are >> obviously ugly. > > Yeah, in 1845 it was. Sendmail is as secure as any other mta. And using Simply not true. Sendmail has had TONS of remote vulnerabilities. Many people have fallen victims to exploits and had their servers rooted. The recent one is of 20006. http://web.nvd.nist.gov/view/vuln/detail?execution=e2s1 qmail has never had a remote root vulnerability or a similar flaw because it's designed with security in mind. Sendmail never was.