Kevin Coyner writes:

problem.  My build was on a debian box so everything came in .deb
packages, but I believe upstream source downloads might have the same
problem.  Anyway, the process ID's for all courier programs reside in
/var/run/courier.  In my build of courier, the default permissions for
/var/run/courier were 770 with uid/gid of daemon.daemon.  Getting
sqwebmail to run was solved by ...

    chmod 755 /var/run/courier

Indeed, I checked an old email server that has been running
courier/sqwebmail for a long while now, and its permissions were 755,
not 770 as in the default build.

FYI there is a bug filed already in the Debian BTS for this.

If /var/run/courier is where authdaemon creates its socket, then this is the wrong fix. It opens up a security hole. The correct fix is to fix the permissions on the sqwebmail binary, so that it is setuid root.



Attachment: pgpmEXkQE49Xb.pgp
Description: PGP signature

Reply via email to