Please read all the way to the bottom before replying.  It will save time.

>  a) single power-user system (notebook/desktop) which has a local MTA
>     to send their own mail out to a proper mail server somewhere on the
>     internet
>  b) running a proper mail server on the internet
> 
> I do both and would welcome non-chrooted by default for both scenarios
> in order to have a nicer, simpler and better integrated experience with
> the rest of the system with less special casing. postfix would e.g. way
> more profit from with namespace, capability and process restrictions set
> (via systemd units?).

I also do both of these things.

> For a) not really much of a problem because one sends his/her own stuff
> out without accepting mail from the outside, so relatively small chance
> of malicious mails that could trigger some postfix bug to compromise the
> system.

Locally exploitable vulnerabilities generally rate lower than remotely 
exploitable vulnerabilities.  This part is true.

However, privilege escalation is still a serious issue and should not be 
minimized by its likelihood.  The sort of attackers who exploit these 
vulnerabilities are not sitting around doing it by hand any more.  They are 
highly automated nowadays and very capable of doing things like this:

a) Determine that a remote system can be induced to execute code unprivileged.
b) Use remote unprivileged code execution to examine the rest of the system.
c) Use information from b) and abilities from a) to escalate privileges and 
take over the system.

> For b), the real abuse/danger of the system isn't a malicious mail to
> take out/over postfix, but the bazillion non-malicious-yet-unwanted
> mails aka spam.

No, the COMMON abuse is from that.  The "REAL" danger is the system takeover, 
as it is much more damaging to surrounding systems, harder to detect, and 
harder to recover from.

No one wants to join the botnet hordes.


ALL THAT SAID


This is not to say that we have to have chroot and it's the only way to make 
things safe.  Quite the opposite.  Using chroot is sometimes used as an excuse 
to leave things UNsafe, for obvious reasons.  Better to fix the underlying 
issues and have a less complex system.  Less complexity means easier to 
support, troubleshoot, AND keep secure.

But let us not minimize the importance of keeping our systems "un-pwned" by 
botnet operators.  It's not about YOU.  It's not about YOUR data.  It's about 
not allowing your resources to become tools for malicious actors to use against 
everyone else.

--J

P.S.  I have never run into any issues with postfix related to running in a 
chroot, myself, but I acknowledge that it's exactly the sort of thing that can 
suddenly become a real pain, so I won't be sad to see it become "not the 
default" any more.

Reply via email to