> Why do we need to authenticate the user of spamc at all?  Are we
> worried about a remote user running spamc on their box and forging mail
> through ours?  A local user forging something through our box?

I think this was mentioned in an earlier thread, but as I understand it, 
the worry is that a local system user could call spamc with the -u option 
to specify a different uid than his/her own, and thus do things like 
delivering spam, or inflating auto whitelists so they will accept mail 
from spammers.

Purely a malicious thing...


anyway, while on this topic of modifying spamc, can we PLEASE make it have 
some way of passing certain info to spamd that it doesn't?  Maildrop 
(which is about as common as procmail these days, or at least getting to 
be so) passes $ENV{HOME} into its xfilters (external scripts) so that 
virtual users or users whose mail homedirs and user homedirs are different 
can actually get things delivered properly.

my example:   I have a bunch of virtual users living in 
[EMAIL PROTECTED] - all owned by apache.  If I turn 
spamassassin on globally, it looks at who owns the spamc process, which is 
apache, and then grabs /var/www as its homedir (which is owned/writable by 
root, NOT apache).  Anyway, security's not an issue since you would just 
have to make sure that the calling user owns the destination home 
directory (which you should be doing anyway).

And yes, I would contribute a patch for this, but I'm a perl coder, not a 
C coder (I'm more than happy to patch spamd, but it wouldn't do any good 
without matching spamc support).



-------------------------------------------------------
This sf.net email is sponsored by: To learn the basics of securing 
your web site with SSL, click here to get a FREE TRIAL of a Thawte 
Server Certificate: http://www.gothawte.com/rd524.html
_______________________________________________
Spamassassin-talk mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/spamassassin-talk

Reply via email to