Hola,

On Mon, Dec 16, 2024 at 05:51:34PM +0300, Michael Tokarev wrote:
> Hi!
> 
> For 25 years, Postfix the MTA in Debian has been setup to run chrooted by
> default (that's where most postfix internal components run chrooted in
> /var/spool/postfix/, to limit possible system damage after a possible
> compromise).
> 
> This setup has been criticized for 25 years, because of significant pain
> it caused to users and upstream and postfix-users support.  The conclusion
> by Wietse Venema, who is the author of Postfix:

I am running (also professionally) postfix mail relays and i had never
the requirement to "un-chroot" - there is always a way to map the
required resource, and only those, into the postfix chroot.

And i am running postfix with uucp and satellite connections, imap setups
of various sizes, high volume mail exchanger frontends for MS Exchange
setups etc etc.

As an admin i like the "security first" approach here and thats the way
debian should handle it.

The default setting should be to be chrooted as thats what 99.5% ours
users are using today without issues, and it its another layer in the
cheese model for security. Even if we find a vulnerability in one of the
network facing services, it makes it harder to abuse the machine and
lets me sleep well.

And in the end - its easy as changing a "y" to a "n" in master.cf to
unchroot for the setups where users fail to adapt their postfix from the
chroot.

But the default should be security first.

Flo
-- 
Florian Lohoff                                                     f...@zz.de
  Any sufficiently advanced technology is indistinguishable from magic.

Attachment: signature.asc
Description: PGP signature

Reply via email to