Procmail Vulnerabilities check

Matthias Apitz guru at unixarea.de
Fri Dec 8 19:30:31 UTC 2017


El día viernes, diciembre 08, 2017 a las 11:19:03a. m. -0700, Warren Block escribió:

> > I do, and invoke procmail from a .forward file.
> >
> > %  cat ~/.forward
> > "|exec /usr/local/bin/procmail -f-"
> >
> > Do you know if maildrop can be used in a similar way?  I
> > suppose I have some reading to do.
> 
> I have not used a .forward file in a long time, but certainly it can be 
> done... found this in http://www.postfix.org/MAILDROP_README.html:

I do use ~/.forward and ~/.procmailrc for many years and they do just
fine (I filter some mail local to special folders and all the rest goes
to spamc of SpanAssassin, and as result if the decision of the latter
to my mbox or to dustbin); as I read the PR, this chain is not affected
by the bug, and I will just continue doing so;

> /home/you/.forward:
>      "|/path/to/maildrop -d ${USER}"

Hmm, why -d ${USER} if this is already known who I am from the
~/.forward file location?

	matthias
-- 
Matthias Apitz, ✉ guru at unixarea.de, ⌂ http://www.unixarea.de/  📱 +49-176-38902045
Public GnuPG key: http://www.unixarea.de/key.pub
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <http://lists.freebsd.org/pipermail/freebsd-ports/attachments/20171208/0b2f9e94/attachment.sig>


More information about the freebsd-ports mailing list