1
0
mirror of https://git.FreeBSD.org/ports.git synced 2024-12-28 05:29:48 +00:00
freebsd-ports/security/courierpasswd/pkg-message
Cheng-Lung Sung c17dc6b441 - Update to release 1.1.2
- Port now installs some extra documentation into ${DOCSDIR}.
- Added pkg-message and pkg-plist to port.

PR:		ports/100897
Submitted by:	maintainer (andrew_AT_arda dot homeunix)
2006-07-27 07:03:34 +00:00

52 lines
2.1 KiB
Plaintext

#########################################################################
NOTES FOR RUNNING COURIERPASSWD
In order to use courierpasswd, it must be able to access the
authdaemon domain socket, named 'socket'. When courierpasswd runs as
root, this presents no problem. However, if you need to run courierpasswd
as a non-root user, you have three options, all of which require some
manual work.
Option 1: Add the user courierpasswd will run as to the group that
owns the authdaemon socket directory in /etc/group. More than one user
can be added to the group vector in this way. This arrangement works
well if courierpasswd will be run by only a small number of users.
If the authdaemon socket directory is owned by courier:courier and you
run courierpasswd as user vmail, your /etc/group file will have a line
something like this:
courier:x:465:vmail
Option 2: Some programs, such as tcpserver, allow you to separately set
the uid and gid of programs they call but don't honour the group vector
found in /etc/group. If you invoke courierpasswd from such a program,
set the gid to the group ownership of the authdaemon socket directory.
For tcpserver, you could do something like this:
#!/bin/sh
QMAILUID=`/usr/bin/id -u qmaild`
COURIERGID=`/usr/bin/id -g courier`
exec /usr/local/bin/tcpserver -u "$QMAILUID" -g "$COURIERGID" \
0 smtp /var/qmail/bin/qmail-smtpd /usr/local/sbin/courierpasswd -- \
/usr/bin/true 2>&1
Option 3: Change the permissions on courierpasswd to set gid to the
group ownership of the socket directory. Again, if the socket directory
is owned by courier:courier, change the ownership and permissions
of courierpasswd like so:
chgrp courier courierpasswd
chmod g+s courierpasswd
Be aware that courierpasswd does not provide any max-failed-retry
functionality so it is possible for local users to perform dictionary
attacks against account passwords if courierpasswd is set up this way.
The location of the authdaemon domain socket is listed in the
authdaemonrc configuration file as the parameter authdaemonvar.
#########################################################################