Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 17 Dec 1997 10:14:17 -0500
From:      Nicholas Merrill <lists@mojo.calyx.net>
To:        freebsd-questions@freebsd.org
Subject:   Re: Sendmail HYPER-SECURITY
Message-ID:  <199712171514.HAA17149@hub.freebsd.org>
In-Reply-To: <3497B58E.7A97@barcode.co.il>
References:  <19971217091842.5156.rocketmail@send1a.yahoomail.com>

index | next in thread | previous in thread | raw e-mail

At 01:20 PM 12/17/97 +0200, you wrote:
>Charlie Roots wrote:

>> I understand that Sendmail was, once, a major security hole by which
>> attackers and hackers used to get the password file, and to obtain
>> unauthorized root access priviledges, and I also understand that
>> RECENT versions of sendmail has attacked the attackers by being more
>> secure than ever.

Then Nadav replied:

>This is abit out of the point, but still... Instead of relying on
>sendmail's security you may choose to use the TIS fwtk's smap+smapd
>combination (it's in the ports). I've been using them for over a year
>and they work great. What it does is provide you with a small smtp
>"stub" (smap) that's only smart enough so that your party will believe
>it's a mailer. It then saves whatever comes in in a file and a daemon
>(smspd) passes it over to sendmail. The advantage - there is *no*
>outside access to sendmail at all! This make me feel safe enough not to
>try and fill all possible security gaps inside sendmail, running it in a
>pretty much generic configuration.

That's one way to handle it. Or you could also look into running qmail
(www.qmail.org) which is more secure to begin with.

Nick



home | help

Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199712171514.HAA17149>