Date: Tue, 30 May 2000 12:07:04 +0100 From: Tim Priebe <tim@polytechnic.edu.na> To: sen_ml@eccosys.com Cc: freebsd-security@FreeBSD.ORG Subject: Re: QPOPPER: Remote gid mail exploit Message-ID: <3933A0D8.5BDAA415@polytechnic.edu.na> References: <20000530165232H.1001@eccosys.com> <Pine.BSF.4.21.0005300147400.72232-100000@freefall.freebsd.org> <20000530180805Y.1001@eccosys.com>
next in thread | previous in thread | raw e-mail | index | archive | help
sen_ml@eccosys.com wrote: > p.s. i started to wonder about whether there were any decent > alternative pop daemons. anyone have any suggestions? i'd have > switched to the pop daemon that comes w/ qmail but i don't want to > convert to Maildir just yet. Check cucipop in ports, the only problem I have had with it is that it seems to consistantly report that it is going to send 9 more bytes than it actually does. It is also less resource intensive than qpopper. Tim. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3933A0D8.5BDAA415>