> sendmail these days should be about as secure as any other mailer and its
> still pretty much the email standard.

        This may be true, but sendmail's design isn't very secure.  
Before sending any flames, let me explain.  Sendmail runs as a 
single root process that performs all actions of an MTA.  Postfix, 
and especially qmail, break the functions of an MTA into separate 
programs that each serve a special purpose.  I'm not as familiar 
with Postfix, but I know that the programs that make up qmail do 
not trust one another.  Each program performs it's own set of 
"sanity" checks.
        So, when a bug is found in sendmail, the chances of it being 
exploited to gain root access is far greater than Postfix or qmail 
because sendmail runs as root.  With qmail, most of the 
functionality is performed by processes that are not running as 
root.  Only qmail-lspawn runs as root and it needs to run as root in 
order to spawn qmail-local as the user to whom the mail is being 
delivered to locally.
        When evaluating the security of a particular program, it's design 
should be considered in addition to it's security track record.  
History has shown that almost all software has bugs.  So a design 
that limits the effects of a bug is very important.  This is true with 
all software, not just MTAs.  vsftp is good example of an ftp server 
that was designed with security in mind.  In fact, there are even 
patches for OpenSSH that make it more modular so that some of 
the protocol handling is performed by a process running as a non-
root user (these patches may already be included in development 
versions, I'm not sure).

Steve  

Reply via email to