Russell Nelson writes:
> binaries vary from machine to machine, and
> cannot be compared against a known-good copy.
The same is true of all sorts of configuration files, so of course the
system can deal with it.
> Restore the system to a usable state through removal of tainted binaries.
If your machine has been compromised, you must reinstall. If you merely
verify the constant files, you are missing hundreds of security-critical
system-dependent files. Your suggestion, manual inspection, is absurd.
> That means that qmail must carry its own binary editor around with it.
Simple matter of programming, already done in qmail 1.03. No problem.
> If modification is not possible,
Red herring. Modification is possible.
Do you have any other claimed benefits of run-time uid configuration?
---Dan