On Thu, May 13, 2004 at 10:44:36PM +0200, Paul J Stevens wrote:
> Sorry Dan, but you'r wrong again:
> 
> #> ps|grep postfix
> 
> root       874  0.0  0.3  2756  816 ?        Ss   May11   0:00 
> /usr/lib/postfix/master
> postfix    878  0.0  0.6  5900 1600 ?        S    May11   0:00 qmgr -l 
> -t fifo -u -c
> postfix  20510  0.0  0.7  5880 2040 ?        S    21:41   0:00 pickup -l 
> -t fifo -u -c
> 
> Postfix uses a master process running as root to spawn seperate setuid 
> programs.
> 
> You are correct in seeing network server running uid root as potentially 
> exploitable. But best practice as shown by apache, postfix and mysql for 
> that matter is to run a single limitedly scoped process that forks, 
> spawns or begets in any conceivable fashion some seperate or forked 
> processes with reduced privileges.

Since we don't have anything that needs root, we should not be using
it.  MySQL, Apache, and Postfix are storing user access passwords in
logs.  They need their logs to be owned by root.  Otherwise, an
attacker could gain all sorts of access with their logs.  Apache also
uses it for its reload stuff.  Its best to not take chances, when you
don't need to take them.

-- Dan Weber

Attachment: signature.asc
Description: Digital signature

Reply via email to