From owner-freebsd-security Tue May 30 6:19:26 2000 Delivered-To: freebsd-security@freebsd.org Received: from naughty.monkey.org (naughty.monkey.org [63.77.239.20]) by hub.freebsd.org (Postfix) with ESMTP id BDEB737BDAC for ; Tue, 30 May 2000 06:19:23 -0700 (PDT) (envelope-from dugsong@monkey.org) Received: by naughty.monkey.org (Postfix, from userid 1001) id 5638A1086A4; Tue, 30 May 2000 09:19:21 -0400 (EDT) Received: from localhost (localhost [127.0.0.1]) by naughty.monkey.org (Postfix) with ESMTP id 4F64110773E for ; Tue, 30 May 2000 09:19:21 -0400 (EDT) Date: Tue, 30 May 2000 09:19:21 -0400 (EDT) From: Dug Song To: freebsd-security@FreeBSD.ORG Subject: Re: QPOPPER: Remote gid mail exploit In-Reply-To: <20000530180805Y.1001@eccosys.com> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org On Tue, 30 May 2000 sen_ml@eccosys.com wrote: > p.s. i started to wonder about whether there were any decent > alternative pop daemons. anyone have any suggestions? Solar Designer's popa3d is quite nice. http://www.openwall.com/popa3d/ -d. --- http://www.monkey.org/~dugsong/ To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message