Date: Sat, 29 Nov 2008 18:15:58 +0100 From: Peter Boosten <peter@boosten.org> To: "freebsd-questions@freebsd.org" <freebsd-questions@freebsd.org> Subject: Re: Unix program that sends email directly using MX record Message-ID: <493178CE.8070005@boosten.org> In-Reply-To: <20081129170434.GB27853@ourbrains.org> References: <26face530811221316y5be5bf40ra5c38f389f554ca1@mail.gmail.com> <20081124173650.GA933@ourbrains.org> <20081124193819.GF55491@gizmo.acns.msu.edu> <20081129160329.GA27853@ourbrains.org> <47D7B64C-E783-48C8-A33B-A48AB66DA2E5@boosten.org> <20081129170434.GB27853@ourbrains.org>
next in thread | previous in thread | raw e-mail | index | archive | help
Dan wrote: > Peter Boosten(peter@boosten.org)@2008.11.29 17:34:28 +0100: >>> It's not prejudicial. I do not wish to start yet another MTA flamewar, >>> but you can't deny Sendmail's poor security, design, performance, and >>> complex configuration. The poor security history is there, the poor >>> funnel design and conf files that require a scripting language are >>> obviously ugly. >> Yeah, in 1845 it was. Sendmail is as secure as any other mta. And using > > Simply not true. Sendmail has had TONS of remote vulnerabilities. Many > people have fallen victims to exploits and had their servers rooted. > > The recent one is of 20006. > http://web.nvd.nist.gov/view/vuln/detail?execution=e2s1 Hmmm: ERROR, "null" is not valid. The CVE either does not exist or is not in the format of CVE-XXX-XXXX. The most recent vulnerabilities of Postfix are from August and September 2008, and I still use it. Also I use (with great happyness) Sendmail on two machines, without any problems. The only problem ever caused was by clamav. Peter -- http://www.boosten.org
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?493178CE.8070005>