On Wednesday, April 6, 2016 8:33 PM, Wietse Venema <wie...@porcupine.org> wrote:


>Next, have a look at the permissions of the saslauthd socket AND
>of its parent directories. Are the directories mode 755, is the
>socket mode 644? If it is group-restricted then that may not work.

I thought maildrop relied on it's own authentication daemon 
(courier-authdaemon). I didn't have to change anything in saslauthd, only 
authdaemon. Quoting from my previous mail :


>I ended up changing master.cf back as it was before (just user=vmail) and 
>changing the file permissions of the directory /var/run/courier/authdaemon 
>like this :
>

>root@messagerie[10.10.10.20] /var/run/courier # chmod o+xr authdaemon/
>
>So now I have
>
>root <at> messagerie[10.10.10.20] /var/run/courier # ls
>total 16K
>drwxr-xr-x 2 daemon daemon 100 Apr  5 14:22 authdaemon
>-rw-r--r-- 1 root   root     5 Apr  5 14:22 imapd.pid
>-rw------- 1 root   root     0 Mar  7 16:39 imapd.pid.lock
>-rw-r--r-- 1 root   root     5 Apr  5 14:22 imapd-ssl.pid
>-rw------- 1 root   root     0 Mar  7 16:39 imapd-ssl.pid.lock
>-rw-r--r-- 1 root   root     5 Apr  5 14:22 pop3d.pid
>-rw------- 1 root   root     0 Mar  7 16:39 pop3d.pid.lock
>-rw-r--r-- 1 root   root     5 Apr  5 14:22 pop3d-ssl.pid
>-rw------- 1 root   root     0 Mar  7 16:39 pop3d-ssl.pid.lock
>root@messagerie[10.10.10.20] /var/run/courier #
>[...]

>Now maildrop finally works but at the cost of exposing this directory to the 
>world.

I don't know which is better though : to expose that directory to the world or 
to root setuid  maildrop ? my reasonning is that if maildrop is exploited that 
the attacker can do anything. In contrast, it the /var/run/courier/authdaemon 
directory is compromised, and since my passwords are encrypted, the only 
security problem I could face is my encrypted passwords to be stolen.

Yassine.

Reply via email to