Path: utzoo!utgpu!watmath!clyde!att!rutgers!deimos!uxc!tank!mimsy!haven!decuac!felix!info-ultrix From: mitch@tcgould.tn.cornell.edu (Mitch Collinsworth) Newsgroups: comp.unix.ultrix Subject: Re: virus & DEC... Message-ID: <73120@felix.UUCP> Date: 3 Dec 88 15:54:16 GMT References: <3480@hubcap.UUCP> <71070@felix.UUCP> Sender: info-ultrix@felix.UUCP Reply-To: mitch@tcgould.tn.cornell.edu (Mitch Collinsworth) Organization: Program of Computer Graphics, Cornell University, Ithaca, NY Lines: 14 Approved: zemon@felix.UUCP Reply-Path: Reply-to: mitch@tcgould.tn.cornell.edu (Mitch Collinsworth) In article <71070@felix.UUCP> mbr@BBN.COM (Mark Rosenthal) writes: >Isn't there any way that the Ultrix group could fix sendmail so the security >hole is closed, but still make it possible for the local administrator to debug >a configuration file? DEC - are you listening? I find using test mode works pretty well, myself. And it doesn't open any security holes in the process! -Mitch Collinsworth mitch@squid.tn.cornell.edu