> sendmail these days should be about as secure as any other mailer and its
> still pretty much the email standard.
This may be true, but sendmail's design isn't very secure.
Before sending any flames, let me explain. Sendmail runs as a
single root process that performs all actions of an MTA. Postfix,
and especially qmail, break the functions of an MTA into separate
programs that each serve a special purpose. I'm not as familiar
with Postfix, but I know that the programs that make up qmail do
not trust one another. Each program performs it's own set of
"sanity" checks.
So, when a bug is found in sendmail, the chances of it being
exploited to gain root access is far greater than Postfix or qmail
because sendmail runs as root. With qmail, most of the
functionality is performed by processes that are not running as
root. Only qmail-lspawn runs as root and it needs to run as root in
order to spawn qmail-local as the user to whom the mail is being
delivered to locally.
When evaluating the security of a particular program, it's design
should be considered in addition to it's security track record.
History has shown that almost all software has bugs. So a design
that limits the effects of a bug is very important. This is true with
all software, not just MTAs. vsftp is good example of an ftp server
that was designed with security in mind. In fact, there are even
patches for OpenSSH that make it more modular so that some of
the protocol handling is performed by a process running as a non-
root user (these patches may already be included in development
versions, I'm not sure).
Steve