Hello,

I am running postfix (3.3.0-1ubuntu0.2) confined by Apparmor and I
noticed the tlsproxy process is apparently trying to connect to tlsmgr's
Unix socket while still running as root.

Since tlsmgr's socket is stored under $queue_directory/private that has
perms set to 0700 and owned by postfix:root, the tlsproxy process needs
to override the DAC checks using the CAP_DAC_READ_SEARCH capability.

I can think of 2 ways to workaround this. One is to tell Apparmor to
grant the tlsproxy process the needed capability and the other is to
have the $queue_directory/private directory perms set to 0710 with the
same owner/group.

Tuning the private directory perms removes the need for the capability
so that's my current workaround [*] but I'm looking for feedback on the
possible ramifications of this diversion from the default perms.

Regards,
Simon


*: I created postfix-files.d/private-group-search.files with
   "$queue_directory/private:d:$mail_owner:-:710:uc"

P.S: while testing further, I also noticed that smtpd processes need the
same cap to access proxymap's Unix socket also under
queue_directory/private.

Reply via email to