Date: Wed, 17 Dec 1997 13:20:46 +0200 From: Nadav Eiron <nadav@barcode.co.il> To: Charlie Roots <osiris2002@yahoo.com> Cc: freebsd-questions@FreeBSD.ORG Subject: Re: Sendmail HYPER-SECURITY Message-ID: <3497B58E.7A97@barcode.co.il> References: <19971217091842.5156.rocketmail@send1a.yahoomail.com>
next in thread | previous in thread | raw e-mail | index | archive | help
Charlie Roots wrote: > > Hi there, > special hugs and kisses to; > Doug White, and David Greenman. > > I understand that Sendmail was, once, a major security hole by which > attackers and hackers used to get the password file, and to obtain > unauthorized root access priviledges, and I also understand that > RECENT versions of sendmail has attacked the attackers by being more > secure than ever. This is abit out of the point, but still... Instead of relying on sendmail's security you may choose to use the TIS fwtk's smap+smapd combination (it's in the ports). I've been using them for over a year and they work great. What it does is provide you with a small smtp "stub" (smap) that's only smart enough so that your party will believe it's a mailer. It then saves whatever comes in in a file and a daemon (smspd) passes it over to sendmail. The advantage - there is *no* outside access to sendmail at all! This make me feel safe enough not to try and fill all possible security gaps inside sendmail, running it in a pretty much generic configuration. [snip] > Thanks for replying IN ADVANCE. > > == > MAY THE FORCE BE WITH YOU. > _________________________________________________________ > DO YOU YAHOO!? > Get your free @yahoo.com address at http://mail.yahoo.com Nadav
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3497B58E.7A97>