On Mon, 2002-02-04 at 02:34, Matt Sergeant wrote: Not much of a DoS attack to launch it against your own email server, and leave the trace in your own user file ;-) Well, I could get user-level access to your mail server through some other method, then discover you're running SA, edit ~/.spamassassin/user_prefs, send the compromised account a couple dozen emails, and clog up your SA server.
However you can probably execute some sort of perl code in there, which is a risk if you're running as root. Yeah, and that, except it won't be running as root, unless you're running spamd -u root -x -q, which would just be silly. C _______________________________________________ Spamassassin-talk mailing list [EMAIL PROTECTED] https://lists.sourceforge.net/lists/listinfo/spamassassin-talk