From owner-freebsd-security Sun Jan 5 18:01:08 1997 Return-Path: Received: (from root@localhost) by freefall.freebsd.org (8.8.4/8.8.4) id SAA29506 for security-outgoing; Sun, 5 Jan 1997 18:01:08 -0800 (PST) Received: from terra.stack.nl (terra.stack.nl [131.155.140.128]) by freefall.freebsd.org (8.8.4/8.8.4) with ESMTP id SAA29494 for ; Sun, 5 Jan 1997 18:01:03 -0800 (PST) Received: (from uucp@localhost) by terra.stack.nl (8.8.4) with UUCP id CAA12812; Mon, 6 Jan 1997 02:58:33 +0100 (MET) Received: (from maikel@localhost) by escape.stack.nl (8.8.4/8.8.4) id CAA09010; Mon, 6 Jan 1997 02:53:06 +0100 From: Maikel Verheijen Message-Id: <199701060153.CAA09010@escape.stack.nl> Subject: Re: sendmail....tricks... To: moke@fools.ecpnet.com (Jimbo Bahooli) Date: Mon, 6 Jan 1997 02:53:05 +0100 (MET) Cc: freebsd-security@freebsd.org In-Reply-To: from "Jimbo Bahooli" at Jan 5, 97 06:47:29 pm Reply-To: maikel@stack.nl X-Mailer: ELM [version 2.4 PL25] MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: owner-security@freebsd.org X-Loop: FreeBSD.org Precedence: bulk Quoting "Jimbo Bahooli": Any comments on this? Time permitting I am going to explore running sendmail on a non-root port and having netcat forward connections to it from inetd. What if people start connecting to the real sendmail??? If there are vulnerabilities in sendmail, they can still read the mails of all users on the system (If the attacker has an account) -moke@fools.ecpnet.com Greetings, Maikel Verheijen