V?clav Pernica:
> 
> Wietse Venema:
> 
> > Alas, as documented tcp_table(5) is an insecure table (no secure
> > communication) so Postfix probably will not allow you to look up
> > mailbox pathnames with this.
> 
> You are right it doesn't work:
> fatal: tcp:127.0.0.1:2527 map is not allowed for security sensitive data
> 
> Is there an option how to allow it?

The real solution is to add Oracle support, perhaps in the form
of an ODBC driver. I don't use databases. so I can't write that.

Here's a workaround for a workaround.

/etc/postfix/main.cf:
    virtual_mailbox_maps = tcp:host:port btree:/some/where/virtual_mailbox

The tcp_table server updates the file-based table and replies with
"not found". Postfix then searches the file-based table. 

However, this is not guaranteed to work even if the tcp_table server
uses the same(*) locking method as Postfix (flock() on BSD-ish
systems, fcntl() on SYSV-ish systems incl. Solaris, AIX, SGI, Linux).

It is also possible that Postfix will refuse to read sensitive data
from a file that is not owned by root. After all, the system was
built to resist privilege escalation attacks.

        Wietse

(*) Another piece of first-generation code that yet has to be made
    run-time configurable.

Reply via email to