http://bugzilla.spamassassin.org/show_bug.cgi?id=3937





------- Additional Comments From [EMAIL PROTECTED]  2004-10-29 15:14 -------
In unix the spamassasin file can be installed as a perl source file with
#!/usr/bin/perl -T -w as the first line. Windows command processor doesn't use 
that.

The Windows install uses p2bat which sticks some lines of batch file commands to
the head of the file that invokes perl on the file, and names that 
spamassassin.bat.

The perl command line installed by p2bat does not enable taint mode. So
SpamAssassin on Windows does not run in taint mode.

Taint mode under Windows is tricky because it checks that no directory in PATH
is world writeable, but it is not likely that anyone running under Windows has
their directories protected like that. It is theoretically possible to have
strict access controls using NTFS, but it is not in FAT and it is rare for
somebody to configure their system to use NTFS and have secure compartmentalized
access to directories.

At least this explains how it is that people are not able to run DCC and so on
from SpamAssassin under Windows. Perhaps dealing with this will lead to someone
putting in the effort to investigate that and get them working.

The most standard way I've found for people running perl under Windows to deal
with this is to set $ENV{'PATH'} explicitly. But it does require recognizing
that Windows does not provide a secure multiuser environment, and so some taint
checks just have to be bypassed when running under it. A tricky thing would be
to figure out what to set PATH to. That might have to be a configuration option,
specifying the correct minimal PATH to use when running SpamAssassin under 
Windows.



------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

Reply via email to