Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 29 Nov 2008 18:15:58 +0100
From:      Peter Boosten <peter@boosten.org>
To:        "freebsd-questions@freebsd.org" <freebsd-questions@freebsd.org>
Subject:   Re: Unix program that sends email directly using MX record
Message-ID:  <493178CE.8070005@boosten.org>
In-Reply-To: <20081129170434.GB27853@ourbrains.org>
References:  <26face530811221316y5be5bf40ra5c38f389f554ca1@mail.gmail.com>	<20081124173650.GA933@ourbrains.org>	<20081124193819.GF55491@gizmo.acns.msu.edu>	<20081129160329.GA27853@ourbrains.org>	<47D7B64C-E783-48C8-A33B-A48AB66DA2E5@boosten.org> <20081129170434.GB27853@ourbrains.org>

next in thread | previous in thread | raw e-mail | index | archive | help


Dan wrote:
> Peter Boosten(peter@boosten.org)@2008.11.29 17:34:28 +0100:
>>> It's not prejudicial. I do not wish to start yet another MTA flamewar,
>>> but you can't deny Sendmail's poor security, design, performance, and
>>> complex configuration. The poor security history is there, the poor
>>> funnel design and conf files that require a scripting language are
>>> obviously ugly.
>> Yeah, in 1845 it was. Sendmail is as secure as any other mta. And using 
> 
> Simply not true. Sendmail has had TONS of remote vulnerabilities. Many
> people have fallen victims to exploits and had their servers rooted.
> 
> The recent one is of 20006.
> http://web.nvd.nist.gov/view/vuln/detail?execution=e2s1

Hmmm: ERROR, "null" is not valid. The CVE either does not exist or is
not in the format of CVE-XXX-XXXX.

The most recent vulnerabilities of Postfix are from August and September
2008, and I still use it. Also I use (with great happyness) Sendmail on
two machines, without any problems. The only problem ever caused was by
clamav.

Peter

-- 
http://www.boosten.org



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?493178CE.8070005>