Path: utzoo!utgpu!watmath!clyde!att!rutgers!deimos!uxc!tank!mimsy!haven!decuac!felix!info-ultrix
From: mitch@tcgould.tn.cornell.edu (Mitch Collinsworth)
Newsgroups: comp.unix.ultrix
Subject: Re: virus & DEC...
Message-ID: <73120@felix.UUCP>
Date: 3 Dec 88 15:54:16 GMT
References: <3480@hubcap.UUCP> <71070@felix.UUCP>
Sender: info-ultrix@felix.UUCP
Reply-To: mitch@tcgould.tn.cornell.edu (Mitch Collinsworth)
Organization: Program of Computer Graphics, Cornell University, Ithaca, NY
Lines: 14
Approved: zemon@felix.UUCP
Reply-Path:

Reply-to: mitch@tcgould.tn.cornell.edu (Mitch Collinsworth)


In article <71070@felix.UUCP> mbr@BBN.COM (Mark Rosenthal) writes:

>Isn't there any way that the Ultrix group could fix sendmail so the security
>hole is closed, but still make it possible for the local administrator to debug
>a configuration file?  DEC - are you listening?

I find using test mode works pretty well, myself.  And it doesn't open any
security holes in the process!

-Mitch Collinsworth
 mitch@squid.tn.cornell.edu