I wasn't referring to OS Security Holes.  I was referring to "true"
qmail holes.

If there were a real hole shown, I belive the DJB would fix it quickly
(and not just a quick fix as I think redhat would do).

Matt Soffen
Webmaster - http://www.iso-ne.com/
==============================================
Boss    - "My boss says we need some eunuch programmers."
Dilbert - "I think he means UNIX and I already know UNIX."
Boss    - "Well, if the company nurse comes by, tell her I said 
             never mind."
                                       - Dilbert -
==============================================

> ----------
> From:         Peter C. Norton[SMTP:[EMAIL PROTECTED]]
> Sent:         Tuesday, December 29, 1998 12:19 PM
> To:   Qmail mailing list
> Subject:      Re: Frivolous forking
> 
> On Tue, Dec 29, 1998 at 08:44:00AM -0500, Matthew Soffen wrote:
> > 
> > Name 1 security hole found in qmail that they would have had to fix.
> 
> Do you use ulimit before running your qmail-smtpd?  One place to fix
> this security hole is in qmail-smtpd.  Though Dan doesn't think it
> should be fixed in qmail itself, it reasonably could be.
> 
> Anyway, keep in mind that just because it hasn't broken yet doesn't
> mean it can't break.  Thinking that way is unwise.  Just because qmail
> hasn't been broken *yet* doesn't mean that anyone is willing to stick
> their neck out and claim that it can't be broken.  A group (I among
> them) have ponied up cash because there doesn't seem to be a way to do
> it.  Money isn't a conclusive proof that it can't happen.  It's just
> paper, it can't do a proof.
> 
> Also note that Dan's standing offer of $1k doesn't cover stupid holes
> in the OS qmail's running on.  If such an OS bug turned up, I hope
> that someone would write a work-around for qmail.  But since there's
> always a chance that something unforseen will break, why strutt around
> pretending otherwise?
> 
> -Peter
> 

Reply via email to