news...@acrocat.com wrote:
> I hate responding again...  I've set /usr/bin/dspam to 551, 6777, 6775,
> 755, 777, 2777, 1777, 4777, and a few others, and all with the same
> error.  Then I tried 2510 which is what I was using on my old RHEL4
> box.  Same error as well.
> 
> On 1/27/2011 11:34 PM, Frantisek Hanzlik wrote:
>> news...@acrocat.com wrote:
>>> Hi Franz -
>>>
>>> /etc/mail was:
>>> drwxr-sr-x   9 smmta smmsp
>>>
>>> /etc/mail/smrsh/
>>> drwsr-sr-x 2 root  root
>>>
>>> I changed them to what you had below (755 root:root).  Same error:
>>>
>>> Cannot exec /etc/mail/smrsh: Permission denied
>>> Jan 27 21:14:10 acrocatlabs sm-mta[11770]: p0QDZfKc004026:
>>> to="|/usr/bin/dspam --user global --class=spam --source=error",
>>> ctladdr=<s...@acrocat.com> (8/0), delay=1+07:38:26, xdelay=00:00:00, maile
>>>
>>> I'm really stumped on this one.  If they are 755 root:root, how can root
>>> not have perms to do this?
>>>
>>> One thing I noticed:
>>> ls -la /etc/mail/smrsh
>>>     drwsr-sr-x 2 root root 4096 2011-01-24 14:14 .
>>>     lrwxrwxrwx 1 root root   14 2011-01-24 14:14 dspam -> /usr/bin/dspam
>>>     lrwxrwxrwx 1 root root   26 2011-01-19 19:54 mail.local ->
>>> /usr/lib/sm.bin/mail.local
>>>     lrwxrwxrwx 1 root root   17 2011-01-19 19:54 procmail ->
>>> /usr/bin/procmail
>>>
>>> ls -la /usr/bin/dspam
>>>     -r-xr-s--- 1 root mail 258639 2011-01-26 15:25 /usr/bin/dspam
>>> ls -la /usr/bin/procmail
>>>     -rwsr-sr-x 1 root mail 89176 2010-08-04 19:49 /usr/bin/procmail
>>>
>>> The actual binaries are root:mail and the links under ../smrsh are
>>> root:root... could that be the issue?
>>>
>>> Ed
>>>
>>> On 1/27/2011 10:04 PM, Frantisek Hanzlik wrote:
>>>> It looks fine...
>>>> But, maybe are bad permissions on "/etc/mail" and "/etc/mail/smrsh"
>>>> directories himself. You wrote in previous mail they are:
>>>>
>>>> ls -la /etc/mail/smrsh/
>>>> drwxr-sr-x 2 root  root  4096 2011-01-24 14:14 .
>>>> drwxr-sr-x 9 smmta smmsp 4096 2011-01-26 09:06 ..
>>>>
>>>> Here is suspicious SGID bit on both direstories.
>>>> Fedora has "smrsh" directory directly under /etc, with permissions:
>>>> ls -ld /etc/smrsh
>>>> drwxr-xr-x. 2 root root 4096 21. led 00.40 /etc/smrsh
>>>>
>>>> ls -ld /etc/mail
>>>> drwxr-xr-x. 2 root root 4096 25. led 11.42 /etc/mail
>>>>
>>>> I think there isn't any reason to have SGID bits set on both these
>>>> directories, on the contrary this may cause these problems when sendmail
>>>> does any security checks.
>>>>
>>>> Franta Hanzlik
>> Oh, I make mistake - when sendmail call LDA, it is done with recipient
>> credentials. Thus, /usr/bin/dspam should be world runnable.
>>
>> Franta Hanzlik

I write small script to uncover alias program environment:

#!/bin/bash
echo "$UID, $EUID , $#." >>/tmp/testrun
id >>/tmp/testrun
cat >>/tmp/testrun
printenv >>/tmp/testrun

which is running from /etc/aliases:
testrun: "|/usr/local/bin/testrun --user root --class=spam --source=error"

And discover, that script is running as user mail (which is what
  define(`confDEF_USER_ID', ``8:12'')
in sendmail.mc define (DefaultUser) - user mail (UID=8), group
mail(GID=12) in my system).

Then I'm only doubt about:

- when You have "FEATURE(`smrsh', `/usr/sbin/smrsh')" defined in your
sendmail.mc (with correct smrsh path).

- which are smrsh permissions. Mine:
ls -l /usr/sbin/smrsh
-rwxr-xr-x. 1 root root 65656 14. zář 11.35 /usr/sbin/smrsh

eventually, smrsh and dspam directories should not be world-writable. But
in this case will be error message probably different.

Franta Hanzlik

------------------------------------------------------------------------------
Special Offer-- Download ArcSight Logger for FREE (a $49 USD value)!
Finally, a world-class log management solution at an even better price-free!
Download using promo code Free_Logger_4_Dev2Dev. Offer expires 
February 28th, so secure your free ArcSight Logger TODAY! 
http://p.sf.net/sfu/arcsight-sfd2d
_______________________________________________
Dspam-user mailing list
Dspam-user@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/dspam-user

Reply via email to