Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <516464F4.3030109@msgid.tls.msk.ru>
Date: Tue, 09 Apr 2013 22:59:00 +0400
From: Michael Tokarev <mjt@....msk.ru>
To: oss-security@...ts.openwall.com
CC: Russ Thompson <russ@...dbit.com>
Subject: Re: Postfix incorrect permissions on configurations.
 Request.

09.04.2013 22:55, Russ Thompson wrote:
> The scripts inside are -world- executable, is the main concern here.  Certainly this can be changed by the end user but seems like an insecure default.  I've seen discussions and CVE's assigned for past cases where log directories are world readable and vice versa, if this is not the correct place to send, please advise.

What's wrong with the scripts being world-executable?
They run with user permissions, if the user can't read
or write something the script wont do it either.
There's no need to change the default.

And especially there's no need to change permissions
for main.cf and master.cf - these files don't contain
private information (if you use, say, sql map, its
username+password is stored in a separate file with
proper permissions).

Please don't top-post.

Thanks,

/mjt

> On Tuesday, April 9, 2013 at 2:19 PM, Michael Tokarev wrote:
> 
>> 09.04.2013 22:08, Russ Thompson wrote:
>>> Postfix is setting the following permissions by default on Debian Squeeze. I'm seeing roughly the same on RHEL/CentOS 6.x, this appears to be a requirement of "sendmail.postfix" 
>>>
>>> 0755 /etc/postfix
>>> 0644 /etc/postfix/*
>>> 0755 /etc/postfix-script
>>> 0755 /etc/post-install
>>>
>>> Which allows all users to execute these scripts and read configurations. Setting to tighter/more typical permissions (i.e 640) results in: postfix/sendmail[21007]: fatal: open /etc/postfix/main.cf: Permission denied
>>
>> That's all nice, but can you elaborate a bit -- what is wrong
>> with that? Which request do you have? What it has to do with
>> oss-security?
>>
>> Thanks,
>>
>> /mjt 
> 
> 

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.