Default, full install.
Boot up the new system, and sendmail is listening on two TCP sockets.
I don't think this is wise. As well as the obvious "big root daemon" risks,
there are less obvious risks. Recent RedHat builds of sendmail are linking
in more and more libraries. The most worrying of these is Kerberos. I'd
really rather that Kerberos code paths were not remotely available in the
default install ;-)
As far as I know, the default listening behaviour of sendmail was disabled
late in the RH7.0 beta cycle. But, it was re-enabled again in RH7.0 final
due to a few glitches this caused.
If sendmail network listening is disabled for an early RH7.1 beta, there
might be time to sort out all the issues this time round.
In fact if we fix this, we'd be heading towards OpenBSD levels of security on a
I was a proponent too last time around -- the counter-argument was
pathological programs which talk to localhost:25, rather than
handing content off through a "| mailx"
If this is closed with a DEFER or WONT in the 7.x series, can we
at least give 'fair warning' that it is depreicated contduct, and
likely to break in future major releases? That way, we can fairly
disable in th 8.0 and see what else breaks, and catch them early enough
in the release and design phase to avoid major wailing.
We only listen on the loopback device at the moment and
only on the smtp port. Please send in problem reports if this
is not the way to go.