Am 19.07.2011 17:02, schrieb Lars Täuber:
> Hi Wietse,
> 
> the unix socket can't be used by other users than root or postfix.
> Is there a way to configure ownership and/or permissions for the socket?
> 
> I thought under Linux the filesystem permissions reflect the permissions to
> the unix socket.
> 
> Here is my config and the socket:
> master.cf:
> backdoor
>           unix  n       -       n       -       3       smtpd
> 
> # ls -l /var/spool/postfix/public/backdoor 
> srw-rw-rw- 1 postfix postdrop 0 2011-07-19 14:15 
> /var/spool/postfix/public/backdoor
> # sudo -u dspam /usr/bin/socat - 
> UNIX-CONNECT:/var/spool/postfix/public/backdoor
> 2011/07/19 16:53:44 socat[23143] E connect(3, AF=1 
> "/var/spool/postfix/public/backdoor", 36): Permission denied
> 
> Am I doing something wrong?

Don't forget about the directory permissions. The dspam user needs
execute permission for all containing directories, i. e.
/var/spool/postfix/public, /var/spool/postfix, /var/spool, /var, and /.

I supposed your dspam system user probably doesn't have access to the
/var/spool/postfix/public directory (1), which check.

If that's indeed the situation, review the security implications; you
can either use ACLs to permit the dspam user execute permission fix that
up (if supported and enabled on your /var filesystem), or you can
consider making dspam a member of the postdrop group.


(1) mine looks like this on Postfix 2.8:

drwx--s--- 2 postfix postdrop 4096 2011-07-19 00:44
/var/spool/postfix/public

Reply via email to