Ralph Seichter via Postfix-users wrote in
 <87a5i6pesk....@ra.horus-it.com>:
 |* Steffen Nurpmeso:
 |
 |>>I think it is more than "a bit flakey". You ask Wietse to support
 |>>something which introduces a significant security risk.
 |>
 |> Now you exaggerate a bit.
 |
 |Not really, the original example of invoking "iptables" directly
 |requires root provileges. That could be mitigated by using sudo, but
 |this step was not included in the example. Wietse could provide a

Only because spawn explicitly avoids support of root.

 |security wrapper, but why should he bother? The core argument as far as

Well i mean basically because it is only fewest syscalls that make
up a difference, and he practically has them because he needs
them, anyway.  He "only" does not give admins the possibility to
use them.  For example i see "his" set_eugid(), setgroups(),
closefrom(), setsid(), he has anything to cleanup environment
(src/util/environ.c), he would only need to add a one that throws
away most of it.  Ie a slightly extended variant of his
chroot_uid(), to be entered for a specific new command to be used
in combination, ie REJECT-EXEC, or DUNNO-EXEC, or whatever.  That
is: theoretically.

 |I am concerned is that it is not part of Postfix's responsibilities to
 |trigger external processes when a login error occurs or somebody targets
 |a honeypot address. Postfix writes to a log, and I think that's enough.

For discussion-partie's sake only i disagree.
Because in practice he gives away the responsibility, and requires
people to program fully fledged server applications, each and
every one of which needs to understand and implement the full
security dance on its own; in addition each of those needs to be
administrated aka be driven as a system service, and all of the
time.  And this is true even for help applications which are
satellites of postfix only, and cannot be used for any other
purpose, never.  Ie, *i* could think about starting off in
a cleaned environment as root just in order to be able to do a few
things, then do a terminating sete?*id() (actually i better search
for "how to give up all user and group privileges" first) to give
up all privileges.

 |An interested party could hook into syslog, removing the need to scan
 |log files (although the latter is easy enough). That would have the
 |added benefit of also taking care of other software, like Dovecot or
 |OpenLDAP. The analysis I require is not limited to Postfix logs, and I
 |don't think I am alone in this regard.

Where is the difference in between parsing the log file and
hooking into the syslog daemon, except for a possible speed
improvement as the data is read at the pipe/socket?
Or do you mean syslog(3)?  You want to hook into the C library via
LD_PRELOAD, d-oh??  You sneaky thing you!!
Environment cleanup is missing in postfix per se me things.

 |> Heck my mailing-lists still use mailman2 and python2 [...]
 |
 |Mailman2 was written for Python 2.x. That is different from people
 |asking me to retroactively add Python 3.6 support for software I wrote
 |for versions >= 3.7.

Ok.  Sure.  (Also it, i think, is only local.)

Ciao.  And good night!

--steffen
|
|Der Kragenbaer,                The moon bear,
|der holt sich munter           he cheerfully and one by one
|einen nach dem anderen runter  wa.ks himself off
|(By Robert Gernhardt)
|
| Only during dog days:
| On the 81st anniversary of the Goebbel's Sportpalast speech
| von der Leyen gave an overlong hypocritical inauguration one.
| The brew's essence of our civilizing advancement seems o be:
|   Total war - shortest war -> Permanent war - everlasting war
_______________________________________________
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an email to postfix-users-le...@postfix.org

Reply via email to