The 'Security Digest' Archives (TM)

Archive: About | Browse | Search | Contributions | Feedback
Site: Help | Index | Search | Contact | Notices | Changes

ARCHIVE: 'Phage List' - Archives (1988 - 1989)
DOCUMENT: phage #018 [Sendmail hacking] (1 message, 580 bytes)
SOURCE: http://securitydigest.org/exec/display?f=phage/archive/018.txt&t=text/plain
NOTICE: securitydigest.org recognises the rights of all third-party works.

START OF DOCUMENT

From: shaver@atanasoff.cs.iastate.edu (Dave Shaver)
To: phage
Date: Thu 23:15:52 03/11/1988 EST
Subject: Sendmail hacking
References: [Thread Prev: 017] [Thread Next: 019] [Message Prev: 385] [Message Next: 019]


For those of you "hacking" Sendmail source, there is another way to
catch the virus.

Change the definition of the prog mailer in the config file to use
something something other than /bin/sh.  I wrote a small program to
"catch" any messages sent to the prog mailer and save them for future
reference.

e.g.:

Change this:
Mprog,	P=/bin/sh,   F=lsDFMe,   S=10, R=20, A=sh -c $u
to this:
Mprog,	P=/bin/catcher,   F=lsDFMe,   S=10, R=20, A=sh -c $u

/bin/catcher can do whatever you feel is apropos.  Saves one
from hacking cc, etc, too.  Just a thought.

/\  Dave Shaver  -=*=-  CS Software Support Group, Iowa State University
\\  UUCP:  hplabs!hp-lsd!atanasoff!shaver
\/  Internet: shaver@atanasoff.cs.iastate.edu

END OF DOCUMENT