Kevin Coyner writes:
problem. My build was on a debian box so everything came in .deb packages, but I believe upstream source downloads might have the same problem. Anyway, the process ID's for all courier programs reside in /var/run/courier. In my build of courier, the default permissions for /var/run/courier were 770 with uid/gid of daemon.daemon. Getting sqwebmail to run was solved by ...
chmod 755 /var/run/courier
Indeed, I checked an old email server that has been running courier/sqwebmail for a long while now, and its permissions were 755, not 770 as in the default build.
FYI there is a bug filed already in the Debian BTS for this.
If /var/run/courier is where authdaemon creates its socket, then this is the wrong fix. It opens up a security hole. The correct fix is to fix the permissions on the sqwebmail binary, so that it is setuid root.
pgpmEXkQE49Xb.pgp
Description: PGP signature
