Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 23 Apr 1996 09:58:33 -0400 (EDT)
From:      Charles Henrich <henrich@crh.cl.msu.edu>
To:        joerg_wunsch@uriah.heep.sax.de
Cc:        freebsd-hackers@freebsd.org, davidg@Root.COM
Subject:   Re: .forward and sendmail?
Message-ID:  <199604231358.JAA05012@crh.cl.msu.edu>
In-Reply-To: <199604230332.FAA21276@uriah.heep.sax.de> from "J Wunsch" at Apr 23, 96 05:32:42 am

next in thread | previous in thread | raw e-mail | index | archive | help
> Yes, but think about it.  It reads the .forward with the identity of
> `daemon', not `root'.  Otherwise, any user could link his ~/.forward
> to a file read-only for root, and try to figure out the contents of
> this file by sending mail to himself, and analyzing the bounces.  Not
> that this will compromise the entire file, but that's why i wrote: ``I
> would call it a security feature.''

Yes but think about it, .forwards WILL NOT WORK USUALLY EVER if sendmail doesnt
read .forward's as root!  Most home directories are 700!  This is a *bug* not a
feature.

-Crh

       Charles Henrich     Michigan State University     henrich@msu.edu

                         http://pilot.msu.edu/~henrich



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199604231358.JAA05012>