<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Another Sendmail Question in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/another-sendmail-question/m-p/2923221#M109983</link>
    <description>PS Use killsm or /sbin/init.d/sendmail stop for the momment.</description>
    <pubDate>Mon, 10 Mar 2003 15:27:15 GMT</pubDate>
    <dc:creator>Michael Steele_2</dc:creator>
    <dc:date>2003-03-10T15:27:15Z</dc:date>
    <item>
      <title>Another Sendmail Question</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/another-sendmail-question/m-p/2923217#M109979</link>
      <description>Hi:&lt;BR /&gt;&lt;BR /&gt;I shutdown sendmail to hopefully avoid the sendmail vulnerability.  However, I am still able to send mail from my J6000 to local and remote mail accounts.  &lt;BR /&gt;&lt;BR /&gt;Do I still need to worry about the sendmail vulnerability since ssendmail is shutdown?  &lt;BR /&gt;&lt;BR /&gt;How come I can still send messages?&lt;BR /&gt;&lt;BR /&gt;Tom&lt;BR /&gt;</description>
      <pubDate>Mon, 10 Mar 2003 14:48:44 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/another-sendmail-question/m-p/2923217#M109979</guid>
      <dc:creator>Tom Jackson</dc:creator>
      <dc:date>2003-03-10T14:48:44Z</dc:date>
    </item>
    <item>
      <title>Re: Another Sendmail Question</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/another-sendmail-question/m-p/2923218#M109980</link>
      <description>Hi Tom,&lt;BR /&gt;&lt;BR /&gt;The sendmail that you've disabled is the listening daemon (together with maybe a queue run timing switch), e.g.&lt;BR /&gt;&lt;BR /&gt;/usr/lib/sendmail -bd -q15m&lt;BR /&gt;&lt;BR /&gt;The ability to send out is not affected by you switching the daemon off, since sendmail can simply be run as a one-off command to "send mail".&lt;BR /&gt;&lt;BR /&gt;rgds, Robin</description>
      <pubDate>Mon, 10 Mar 2003 14:52:58 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/another-sendmail-question/m-p/2923218#M109980</guid>
      <dc:creator>Robin Wakefield</dc:creator>
      <dc:date>2003-03-10T14:52:58Z</dc:date>
    </item>
    <item>
      <title>Re: Another Sendmail Question</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/another-sendmail-question/m-p/2923219#M109981</link>
      <description>Hi Tom,&lt;BR /&gt;&lt;BR /&gt;Indeed sendmail can run as a daemon (permanent) to receive incomming emails(connections). But if installed and set your DS&lt;MAILHOST-SERVER&gt; in your /etc/mail/sendmail.cf or in /etc/mail/sendmail.cw you are able to send e-mails. &lt;BR /&gt;The period sendmail opens a connection is very short to send an e-mail, so security risc, yep sure but very minim.&lt;BR /&gt;/usr/lib/sendmail -q will be able to send e-mails at a specific time using cron. So, you take the choise what you want. Remove sendmail, or just minimize the impact.&lt;BR /&gt;&lt;BR /&gt;Regs David&lt;/MAILHOST-SERVER&gt;</description>
      <pubDate>Mon, 10 Mar 2003 15:01:57 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/another-sendmail-question/m-p/2923219#M109981</guid>
      <dc:creator>David_246</dc:creator>
      <dc:date>2003-03-10T15:01:57Z</dc:date>
    </item>
    <item>
      <title>Re: Another Sendmail Question</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/another-sendmail-question/m-p/2923220#M109982</link>
      <description>Could you elaborate about the vulnerability of sending messages via sendmail?  Current version address these problems I thought.&lt;BR /&gt;&lt;BR /&gt;Receiving email can be easily enought disabled.&lt;BR /&gt;&lt;BR /&gt;I know about .mailrc or .forward files for example.&lt;BR /&gt;&lt;BR /&gt;But to disable sendmail permanantly edit file /etc/rc.config.d/mailservs file and replace &lt;BR /&gt;export SENDMAIL_SERVER=1 &lt;BR /&gt;with &lt;BR /&gt;export SENDMAIL_SERVER=0</description>
      <pubDate>Mon, 10 Mar 2003 15:24:55 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/another-sendmail-question/m-p/2923220#M109982</guid>
      <dc:creator>Michael Steele_2</dc:creator>
      <dc:date>2003-03-10T15:24:55Z</dc:date>
    </item>
    <item>
      <title>Re: Another Sendmail Question</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/another-sendmail-question/m-p/2923221#M109983</link>
      <description>PS Use killsm or /sbin/init.d/sendmail stop for the momment.</description>
      <pubDate>Mon, 10 Mar 2003 15:27:15 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/another-sendmail-question/m-p/2923221#M109983</guid>
      <dc:creator>Michael Steele_2</dc:creator>
      <dc:date>2003-03-10T15:27:15Z</dc:date>
    </item>
    <item>
      <title>Re: Another Sendmail Question</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/another-sendmail-question/m-p/2923222#M109984</link>
      <description>I am *not* a mail specialist, so take this with a grain of salt, but I have looked into this for our/my own use, and, as far as I know, you *are* vulnerable, even if (unpatched) sendmail is shut down. I don't see why some [.]forward somewhere would not allow your sendmail to be attacked.&lt;BR /&gt;&lt;BR /&gt;*Please* correct me if I am wrong. I would sleep better and so would many others.</description>
      <pubDate>Tue, 11 Mar 2003 13:15:45 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/another-sendmail-question/m-p/2923222#M109984</guid>
      <dc:creator>Frank Slootweg</dc:creator>
      <dc:date>2003-03-11T13:15:45Z</dc:date>
    </item>
    <item>
      <title>Re: Another Sendmail Question</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/another-sendmail-question/m-p/2923223#M109985</link>
      <description>Frank:&lt;BR /&gt;&lt;BR /&gt;Thanks for sharing your concern.  Since I'm inside a firewall and we don't use sendmail for anything except to mail cron status, I thought shutting down sendmail would prevent the problem from occurring.&lt;BR /&gt;&lt;BR /&gt;One thing I noticed is that I still get my cron status mail messages, but I can't send messages to accounts on the system where sendmail is stopped.  I can also send from the system where sendmail is stopped.&lt;BR /&gt;&lt;BR /&gt;Does anyone know when a RELEASED patch will be available?  I am reluctant to install the binary fix since some sites are having problems and it hasn't gone through all of its testing.&lt;BR /&gt;&lt;BR /&gt;Are there any other options?&lt;BR /&gt;&lt;BR /&gt;Tom&lt;BR /&gt;</description>
      <pubDate>Tue, 11 Mar 2003 13:33:30 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/another-sendmail-question/m-p/2923223#M109985</guid>
      <dc:creator>Tom Jackson</dc:creator>
      <dc:date>2003-03-11T13:33:30Z</dc:date>
    </item>
    <item>
      <title>Re: Another Sendmail Question</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/another-sendmail-question/m-p/2923224#M109986</link>
      <description>Hmmmmm, Frank, can you spell facetious any other way?&lt;BR /&gt;&lt;BR /&gt;Dot files like .forward and .mailrc allow for executables and are subject to hijacking and certainly a security issue, especially if its world readable.  /etc/mail/alias is recommended instead.</description>
      <pubDate>Tue, 11 Mar 2003 13:39:01 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/another-sendmail-question/m-p/2923224#M109986</guid>
      <dc:creator>Michael Steele_2</dc:creator>
      <dc:date>2003-03-11T13:39:01Z</dc:date>
    </item>
    <item>
      <title>Re: Another Sendmail Question</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/another-sendmail-question/m-p/2923225#M109987</link>
      <description>Servers which can send outbound via sendmail but not receive inbound are vulnerable, to the extent that someone could transfer an exploit to the machine via FTP (etc) and then send it.  You have to evaluate this likelihood, but the threat from the Internet would appear very low.</description>
      <pubDate>Tue, 11 Mar 2003 13:54:05 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/another-sendmail-question/m-p/2923225#M109987</guid>
      <dc:creator>W.C. Epperson</dc:creator>
      <dc:date>2003-03-11T13:54:05Z</dc:date>
    </item>
    <item>
      <title>Re: Another Sendmail Question</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/another-sendmail-question/m-p/2923226#M109988</link>
      <description>M. (Cool name! :-)), &lt;BR /&gt;&lt;BR /&gt;Yes, I know of the dangers of non-safe/closed .forward and .mailrc files, but my point was that even if they *are* safe/closed, they do not (completely) disable *this* (sendmail) vulnerability.</description>
      <pubDate>Tue, 11 Mar 2003 13:56:09 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/another-sendmail-question/m-p/2923226#M109988</guid>
      <dc:creator>Frank Slootweg</dc:creator>
      <dc:date>2003-03-11T13:56:09Z</dc:date>
    </item>
  </channel>
</rss>

