Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 30 May 2000 12:07:04 +0100
From:      Tim Priebe <tim@polytechnic.edu.na>
To:        sen_ml@eccosys.com
Cc:        freebsd-security@FreeBSD.ORG
Subject:   Re: QPOPPER: Remote gid mail exploit
Message-ID:  <3933A0D8.5BDAA415@polytechnic.edu.na>
References:  <20000530165232H.1001@eccosys.com> <Pine.BSF.4.21.0005300147400.72232-100000@freefall.freebsd.org> <20000530180805Y.1001@eccosys.com>

next in thread | previous in thread | raw e-mail | index | archive | help
sen_ml@eccosys.com wrote:

> p.s. i started to wonder about whether there were any decent
> alternative pop daemons.  anyone have any suggestions?  i'd have
> switched to the pop daemon that comes w/ qmail but i don't want to
> convert to Maildir just yet.

Check cucipop in ports, the only problem I have had with it is that it seems
to consistantly report that it is going to send 9 more bytes than it actually
does.
It is also less resource intensive than qpopper.

Tim.



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3933A0D8.5BDAA415>