Confucius:
No, I meant that reports of possible compromises should only be sent only security@e-smith.com. We're not planning on taking the information and hiding it; we know that that would not be in your best interests or in ours.
We *are* interested in finding the problem, helping the admin
of the compromised server secure his machine (or at least identify the problem to avoid repeating it on a freshly-installed system), preparing a workaround, and informing customers and the developer community once armed with reliable, verified information about the problem.
Obtaining that information is not always a quick process. In requesting that admins who believe their server to have been compromised inform us first, we can do our best to ensure that
the public announcement of the vulnerability contains the information necessary to understand it and prevent its exploitation on other systems.
Knowing that a server has possibly been compromised, with no idea as to the scope of the compromise, the nature of the vulnerability, and whether or not any other systems have been exposed to that vulnerability, is little good to anyone involved.
Jean-Phillipe:
Full disclosure does not mean announcing publicly that a single
server has been compromised; that's not in anyone's interest,
especially not that of the person whose server has been
compromised.
Full disclosure is about not only explaining that a vulnerability
exists, but the details of the vulnerability (whether in terms
of "here is the problem" or "here is the exploit"). In this
particular case, no-one knows what the vulnerability is (or even
if the server was exploited through a software vulnerability).
As it turns out, the majority of reported compromises are unrelated to SME Server as it is shipped -- instead being caused by locally-installed and unsupported software which is poorly written or misconfigured, or misunderstandings about the normal operations of the server.
I encourage you to read the definitions of Full Disclosure
(0.1.6) and of Security by Obscurity (0.1.7), and the recommended protocol for reporting security problems (0.1.

in the BUGTRAQ FAQ, at
http://www.securityfocus.com/popups/forums/bugtraq/faq.shtml#0.1.6At no time will we ever be concealing security problems from our customers and developer community -- but there seems to be little
benefit in creating fear by announcing rumors of possible
vulnerabilities before taking the time to determine what
the vulnerability, if any, *is*.
Essentially, full disclosure means detailed information, and in requesting that users who think they have been compromised contact us first, we aim to be able to provide that information rapidly and reliably while minimizing other servers' exposure risk.
I hope this clarifies our position with regards to reports of compromises.
Warm regards,
Rich Lafferty
Network Server Solutions Group
Mitel Networks