On Mon, 6 Dec 1999, J. Scott Kasten wrote:
> Just because a process runs as root does not necessitate that it becomes a
> security hazard.
Yes, it can be.
> Running as root is actually a special case recognized by fetchmail where it will
> service remote pop accounts for all users and follow a mappings file to deliver
> them locally.
>
> Otherwise, you have dozens of daemons doing the same thing, but for different users.
Really? read the docs, again. I have mine doing the same thing as user
mailadmin. HE has no privs.
Jeff
> On Mon, Dec 06, 1999 at 11:23:46AM -0600, Jeff Smelser wrote:
> > On Sat, 4 Dec 1999, J. Scott Kasten wrote:
> >
> > > No need to CRON it. Config and run it as root and it daemonizes and serves
> > > all local users that you profile.
> > >
> > > On Sat, Dec 04, 1999 at 10:54:30AM -0800, Stephen King wrote:
> > > > I would imagine that fetchmail as a cron job would be the one for the job
> > > > of getting the mail from multiple POPs to local users and maybe diald to
> > > > connect the PPP when needed. Then have the network machines check for mail
> > > > on the local machine that is running the aforementioned progs.
> > > >
> >
> > Running as root is just another security hazard. It will run fine as a
> > normal user. Why run as root? It will Daemon under a user.
> >
> > Jeff
--
To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
as the Subject.