Received: with ECARTIS (v1.0.0; list gopher);
 Sat, 27 Nov 2004 15:47:29 -0600 (CST)
Received: from dns2.eurnetcity.net ([80.68.196.9])
	by glockenspiel.complete.org with esmtp
	(Exim 4.34)
	id 1CYAPe-0007s7-5o
	for gopher@complete.org; Sat, 27 Nov 2004 15:47:28 -0600
Received: from brillante.route-add.net (postfix@brillante.route-add.net
 [80.68.194.26] (may be forged))
	by dns2.EurNetCity.NET (8.11.6p2-20030924/8.11.6) with SMTP id iARLZWY27704
	for <gopher@complete.org>; Sat, 27 Nov 2004 22:35:32 +0100
Received: from marana (marana [192.168.1.4])
	by brillante.route-add.net (Postfix) with ESMTP id 675F11031
	for <gopher@complete.org>; Sat, 27 Nov 2004 22:46:59 +0100 (CET)
Date: Sat, 27 Nov 2004 22:47:02 +0100 (CET)
From: Alessandro Selli <dhatarattha@route-add.net>
To: Gopher Mailing-list <gopher@complete.org>
Subject: [gopher] About Bucktooth
Message-ID: <Pine.LNX.4.60.0411272237050.10416@tanatos>
MIME-Version: 1.0
Content-type: text/plain; charset=US-ASCII
X-EurNetCity-MailScanner-Information: Please contact the ISP for more
 information
X-EurNetCity-MailScanner: Found to be clean
X-MailScanner-From: dhatarattha@route-add.net
X-Spam-Status: No (score 0.0)
X-Virus-Scanned: by Exiscan on glockenspiel.complete.org at Sat,
 27 Nov 2004 15:47:28 -0600
Content-Transfer-Encoding: 8bit
X-archive-position: 954
X-ecartis-version: Ecartis v1.0.0
Sender: gopher-bounce@complete.org
Errors-to: gopher-bounce@complete.org
X-original-sender: dhatarattha@route-add.net
Precedence: bulk
Reply-to: gopher@complete.org
List-help: <mailto:ecartis@complete.org?Subject=help>
List-unsubscribe: <mailto:gopher-request@complete.org?Subject=unsubscribe>
List-software: Ecartis version 1.0.0
List-Id: Gopher <gopher.complete.org>
X-List-ID: Gopher <gopher.complete.org>
List-subscribe: <mailto:gopher-request@complete.org?Subject=subscribe>
List-owner: <mailto:jgoerzen@complete.org>
List-post: <mailto:gopher@complete.org>
List-archive: <http://www.complete.org/mailinglists/archives/>
X-list: gopher


I was considering installing Bucktooth on "route-add.net",
but I wonder how safe can this idea be considering that
Bucktooth seems not to have undegone any changes for three
years and the following lines in the INSTALL file that make
me both laugh and jitter:

>This is a very, very scruffy hack of Bucktooth into a form that can be
>used by outside server administrators. It is *NOT* a polished, end-user
>product. If you don't know how to hack Perl, do NOT use it. There are
>probably a billion security holes in it, and no doubt about a trillion
>bugs. YMMV, CYA and pregnancy may result if improperly positioned.

   What are your Bucktooth experiences like?  Who's using it?
Should I just laugh about the INSTALL warnings and go ahead installing
Bucktooth with little or no worry, or should I definitely put the
software aside?


-- 
Alessandro Selli
Tel: 340.839.73.05
http://alessandro.route-add.net