Russell Nelson writes:
> binaries vary from machine to machine, and
> cannot be compared against a known-good copy.

The same is true of all sorts of configuration files, so of course the
system can deal with it.

> Restore the system to a usable state through removal of tainted binaries.

If your machine has been compromised, you must reinstall. If you merely
verify the constant files, you are missing hundreds of security-critical
system-dependent files. Your suggestion, manual inspection, is absurd.

> That means that qmail must carry its own binary editor around with it.

Simple matter of programming, already done in qmail 1.03. No problem.

> If modification is not possible,

Red herring. Modification is possible.

Do you have any other claimed benefits of run-time uid configuration?

---Dan

Reply via email to