Home page logo
/

oss-sec logo oss-sec mailing list archives

Re: Postfix incorrect permissions on configurations. Request.
From: Russ Thompson <russ () wildbit com>
Date: Tue, 9 Apr 2013 14:55:39 -0400

The scripts inside are -world- executable, is the main concern here.  Certainly this can be changed by the end user but 
seems like an insecure default.  I've seen discussions and CVE's assigned for past cases where log directories are 
world readable and vice versa, if this is not the correct place to send, please advise.

- Russ


On Tuesday, April 9, 2013 at 2:19 PM, Michael Tokarev wrote:

09.04.2013 22:08, Russ Thompson wrote:
Postfix is setting the following permissions by default on Debian Squeeze. I'm seeing roughly the same on 
RHEL/CentOS 6.x, this appears to be a requirement of "sendmail.postfix" 

0755 /etc/postfix
0644 /etc/postfix/*
0755 /etc/postfix-script
0755 /etc/post-install

Which allows all users to execute these scripts and read configurations. Setting to tighter/more typical 
permissions (i.e 640) results in: postfix/sendmail[21007]: fatal: open /etc/postfix/main.cf: Permission denied

That's all nice, but can you elaborate a bit -- what is wrong
with that? Which request do you have? What it has to do with
oss-security?

Thanks,

/mjt 


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]
AlienVault