Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 16 Jun 2004 16:13:47 -0400
From:      Jim Trigg <jtrigg@spamcop.net>
To:        freebsd-questions@freebsd.org
Subject:   Re: Mail
Message-ID:  <20040616201347.GB29666@spamcop.net>
In-Reply-To: <16592.38955.399680.399710@jerusalem.litteratus.org>
References:  <40D023A1.8090009@cs.uiowa.edu> <20040616140305.GD32001@millerlite.local.mark-and-erika.com> <20040616145305.GB15913@ei.bzerk.org> <40D081D1.1060606@mac.com> <16592.38955.399680.399710@jerusalem.litteratus.org>

next in thread | previous in thread | raw e-mail | index | archive | help
On Wed, Jun 16, 2004 at 02:57:47PM -0400, Robert Huff wrote:
> 
> Chuck Swiger writes:
> 
> >  There have been around 70 security issues mentioned since the
> >  beginning of sendmail-8 circa 1993, or about six per year.
> >  Recently, things have gotten better, but a dispassionate
> >  evaluation of the security history of sendmail does not inspire
> >  any great confidence that one can set up sendmail, leave it
> >  unpatched, and expect the software to still be free of known
> >  remotely-exploitable security problems two years later.
> 
> 	Would you care to nominate an inherently network-accessible
> program with such a track record?  For example: 5.2.1 was released
> in late February; there are currently 12 security advisories*, of
> which I would consider at least 5 to be part of the core system.
> (As opposed to things in the base system, like BIND.)

Postfix and Exim.  I found no security advisories for either on the CERT
website; that actually covers their entire lifecycles.

Jim Trigg
-- 
Jim Trigg, Lord High Everything Else  O-          /"\
                                                  \ /  ASCII RIBBON CAMPAIGN
Hostmaster, Huie Kin family website                X    HELP CURE HTML MAIL
Verger, All Saints Church - Sharon Chapel         / \



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20040616201347.GB29666>