Brian Ristuccia wrote:
> Package: clamsmtp
> Version: 1.2-3
> Severity: serious
> 
> The init.d script for clamsmtp breaks with start-stop-daemon in dpkg
> (1.9.21) because it doesn't provide the --group option. It needs to use one
> of the various dependancy mechanisms to make sure a newer dpkg providing
> this option gets upgraded on install. Clamsmtp doesn't work unless the
> init.d script is manually edited or dpkg is manually upgraded.

Although, I agree that this is a policy error, the scope of the error
only applies to back porting the package.  In any case, I added the
dependency checking to the control file as suggested.

I've been debating whether or not to add a dedicated system user and
group for clamsmtp for a number of reasons.  Although there is no policy
mandating daemons run as their own user and group, doing so might make
things a bit more flexible and secure for the daemon.

Now that clamsmtp can actually run scripts, I'm not too comfortable
having it run as clamav:clamav.  A systems administrator may have added
the clamav user to priveleged groups for scanning protected filesystems.
A poorly written and exploited script run from clamsmtp may now have
access to these documents.  Granted, it might not be likely such an
attack would be probable or even successful, there's no reason to tempt
fate.

Essentially, if I were to add a clamsmtp:clamsmtp user/group and add
clamav to the clamsmtp group so it would have access to the quarantine
directory, I wouldn't need to worry about the "--group" switch to
start-stop-daemon.  As a result, the package would be easier to
back-port to sarge.

There is some fragility to this setup, in the face of system
administrator customizations.  However, we can be reasonably certain
that the user and group clamav:clamav will be install.

-- 
Chad Walstrom <[EMAIL PROTECTED]>           http://www.wookimus.net/
           assert(expired(knowledge)); /* core dump */

Attachment: signature.asc
Description: Digital signature

Reply via email to