On Mon, 6 Dec 1999, J. Scott Kasten wrote:

> Just because a process runs as root does not necessitate that it becomes a
> security hazard.

Yes, it can be.
 
> Running as root is actually a special case recognized by fetchmail where it will
> service remote pop accounts for all users and follow a mappings file to deliver
> them locally.
> 
> Otherwise, you have dozens of daemons doing the same thing, but for different users.

Really? read the docs, again. I  have mine doing the same thing as user
mailadmin. HE has no privs.

Jeff
 
> On Mon, Dec 06, 1999 at 11:23:46AM -0600, Jeff Smelser wrote:
> > On Sat, 4 Dec 1999, J. Scott Kasten wrote:
> > 
> > > No need to CRON it.  Config and run it as root and it daemonizes and serves
> > > all local users that you profile.
> > > 
> > > On Sat, Dec 04, 1999 at 10:54:30AM -0800, Stephen King wrote:
> > > > I would imagine that fetchmail as a cron job would be the one for the job
> > > > of getting the mail from multiple POPs to local users and maybe diald to
> > > > connect the PPP when needed.  Then have the network machines check for mail
> > > > on the local machine that is running the aforementioned progs.
> > > > 
> > 
> > Running as root is just another security hazard. It will run fine as a
> > normal user. Why run as root? It will Daemon under a user.
> > 
> > Jeff


-- 
To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
as the Subject.

Reply via email to