home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: comp.sys.next.sysadmin
- Path: sparky!uunet!psinntp!juliet!news
- From: lemson@fnbc.com (David Lemson)
- Subject: Re: Syntax for .forward file?
- Message-ID: <1992Jul30.133947.4102@fnbc.com>
- Sender: news@fnbc.com
- Reply-To: lemson@fnbc.com
- Organization: First National Bank Of Chicago, Chicago IL, USA
- References: <1992Jul29.170030.6941@ifi.unizh.ch>
- Date: Thu, 30 Jul 92 13:39:47 GMT
- Lines: 18
-
- In article <1992Jul29.170030.6941@ifi.unizh.ch>
- lytras@avalon.physik.unizh.ch (Lytras Apostolos) writes:
- > irving@Happy-Man.com (Irving_Wolfe) writes:
- > : Here's my .forward file; I hope it helps:
- > : |/usr/local/bin/deliver irving
- >
- > The .forward file is used by sendmail which is running suid root, so I
- > wonder if there is a chance someone might use this feature (forwarding
- > through pipes) to gain special privileges (a.k.a. hacking). Or is send-
- > mail prepared to deal with such an attempt?
- I assume that sendmail does a set[r][e]uid(2) call to the user whose
- program is running. I hope it doesn't run the named program as root! (I'm
- pretty sure it doesn't, even in the ancient sendmail shipped with NeXT
- 2.x)
- --
- David Lemson (312) 732-4741
- FNBC Sys Admin (Summer) UIUC NeXT Campus Consultant(rest of the time)
- E-mail to: lemson@fnbc.com NeXTMail accepted
-