On Wed, 8 Sep 1999, Russell Nelson wrote:

> Dmitry Niqiforoff writes:
>  >   Yesterday I found that any user are able to start any program at
>  > server with .qmail file. This could be potentially dangerous, AFAIU.
> 
> Only if you let users edit their own .qmail files.  Don't.  Deny them
> write permission in their home directory.  If they need to upload
> html, give them write permission in public_html.  If you really,
> *really* need to allow them to change their .qmail files, give them a
> "qmail" home directory, and have a root cron job which copies .qmail
> files from that directory into their home directory, editing out
> program deliveries on the way.

Will this work?  What I did was edited qmail-local.c and changed the
/bin/sh to /bin/qsh.  Then copied /bin/sh to /bin/qsh and removed all
rights to 'other'.   It tests ok, non priv'd users can't exec env whereas
priv'd users can from within a .qmail file.  Could I be missing something?

If not, perhaps Dan can add this to qmail2 (provided he didn't already 
come up with something).  If this works I'll write something up for 
www.qmail.org.

Vince.
-- 
==========================================================================
Vince Vielhaber -- KA8CSH   email: [EMAIL PROTECTED]   flame-mail: /dev/null
       # include <std/disclaimers.h>                   TEAM-OS2
        Online Campground Directory    http://www.camping-usa.com
       Online Giftshop Superstore    http://www.cloudninegifts.com
==========================================================================


Reply via email to