nate at natetech.com
Mon Jul 30 14:39:08 MDT 2001
Use exim. ;-)
On Mon, Jul 30, 2001 at 01:56:07PM -0600, Sean Reifschneider wrote:
> On Mon, Jul 30, 2001 at 01:47:47AM -0600, D. Stimits wrote:
> >out in the first place. Sending logs via email to a machine that is
> >completely isolated from the breached machine is a way to do that
> >(separate machines with no direct interface).
> Sendmail has had more exploits than syslogd. I don't see why moving to a
> more complex setup that's using software with a history of more exploits
> against it would make it more secure.
> Give me immortality or give me death!
> Sean Reifschneider, Inimitably Superfluous <jafo at tummy.com>
> tummy.com - Linux Consulting since 1995. Qmail, KRUD, Firewalls, Python
> Web Page: http://lug.boulder.co.us
> Mailing List: http://lists.lug.boulder.co.us/mailman/listinfo/lug
Nate Duehr <nate at natetech.com>
GPG Key fingerprint = DCAF 2B9D CC9B 96FA 7A6D AAF4 2D61 77C5 7ECE C1D2
Public Key available upon request, or at wwwkeys.pgp.net and others.
More information about the LUG