Thanx for all the replies - I now understand the reason for master
daemon to run with superuser privileges. They were really helpful.

But then, is postfix not running the same risk as "sendmail" ?

As a student, I was told that sendmail is a single monolithic binary,
performing all its functions as superuser; therefore if an attacker
could control the sendmail process, he/she would have superuser
access.

Does it mean, that unless run in a chroot environment, postfix is
susceptible to the same risks as sendmail and gives an attacker
capability of causing similar damage (despite having a far better
system of tasks divided amongst various unprivileged processes
designed to perform specific tasks) ?


Regards

On Sun, Jan 30, 2011 at 11:47 PM, Victor Duchovni
<victor.ducho...@morganstanley.com> wrote:
> On Sun, Jan 30, 2011 at 05:22:39PM +0530, varad gupta wrote:
>
>> Is it not a risk running master as root (the same reason for running
>> other processes as unprivileged) ?
>
> No, quite the opposite. It takes privileges to "drop" privileges.  A well
> designed system (such as Postfix) is *more* secure by in part using root
> privileges to enable it to operate in multiple security contexts.
>
> My short maxim for this is indebted to a marketing campaign:
>
>    http://en.wikipedia.org/wiki/Frank_Perdue
>
>    "it takes a tough man to make a tender chicken"
>
> By which I mean that you sometimes need higher privileges to optimally
> use lower privileges.
>
> --
>        Viktor.
>

Reply via email to