Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 1 Jul 2019 14:21:44 +0200
From:      Peter Boosten <peter@boosten.org>
To:        Roderick <hruodr@gmail.com>
Cc:        Polytropon <freebsd@edvax.de>, freebsd-questions <freebsd-questions@freebsd.org>
Subject:   Re: sendmail
Message-ID:  <E04D2766-DBB7-4BEE-986E-4462096B634C@boosten.org>
In-Reply-To: <alpine.BSF.2.21.9999.1907011156350.1062@fbsd.local>
References:  <CAL2OhpoSxnK2Uy_OKxqnWyXuqg=tNBm6wy2r1%2BukVWwPnPrj0g@mail.gmail.com> <20190630092535.7913d305.freebsd@edvax.de> <D25B22FD-2164-4281-AE21-9C5FD188AA38@gmail.com> <alpine.BSF.2.21.9999.1907010639210.1006@fbsd.local> <A3CEF82D-B71D-4B4F-87AD-E3408559DE26@boosten.org> <alpine.BSF.2.21.9999.1907011156350.1062@fbsd.local>

next in thread | previous in thread | raw e-mail | index | archive | help


> Op 1 jul. 2019, om 14:02 heeft Roderick <hruodr@gmail.com> het =
volgende geschreven:
>=20
>=20
> On Mon, 1 Jul 2019, Peter Boosten via freebsd-questions wrote:
>=20
>> _and_ that sendmail is based on a single executable, while other MTAs
>> spread the tasks over several.
>=20
> Is that really so bad? Why people do not hammer exim, the standard MTA =
in
> debian, for the same reason? Does it have advantages that neutralizes =
it?

Exim has its share of vulnerabilities right now =
(https://www.zdnet.com/article/new-rce-vulnerability-impacts-nearly-half-o=
f-the-internets-email-servers/ =
<https://www.zdnet.com/article/new-rce-vulnerability-impacts-nearly-half-o=
f-the-internets-email-servers/>).

The thing with a single executable is that it runs as root, while with =
postfix most services run as =E2=80=98postfix=E2=80=99.

Peter=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?E04D2766-DBB7-4BEE-986E-4462096B634C>