David Morton wrote:
> Matt Kettler wrote:
>
> >>> Also, make sure that /var/.spamassassin has world rwx privileges.
> >>>
> >>>     
> >> Doesn't this create a potential or real giant type security risk?
> > Well, regardless, the current user SA is running as has to be able to
> > read and write to the bayes DB. It has to write to the journal publish
> > atime updates at the very least. It will also want to be able to perform
> > autolearning, journal sync, and oportunistic expiry, unless you've
> > disabled those.
>
> > Without that, bayes cannot function.
>
> > Does it have a security risk? Yes, there's the possibility of someone
> > exploiting it for local-user privilege escalation. AFAIK, SA's bayes
> > code is very careful about how it accesses files to mitigate this risk,
> > but there's always room for mistakes.
>
> The point is that no one should be writing directly to /var/ like
> that,  by most
> filesystem standards it should be /var/*something*/.spamassassin,  maybe
> /var/lib/spamassassin, or /var/spool/spamassassin/ or since the user
> bound as
> user "elizabeth", maybe /home/elizabeth ??  but /var is not right.
>
>
Erm, you do realize .spamassassin is a DIRECTORY, not a file, right?

How is /var/*something*/.spamassassin/bayes_toks different from
/var/.spamassassin/bayes_toks?

I'd agree with you on style points, but from a security perspective
there's no difference.



Reply via email to