On Tue, Apr 28, 2020 at 08:12:30AM +0100, Russell King via Exim-users wrote:
> I believe so - exim is being called from a perl script running as the
> user stated in the log line thusly:
> 
>       /usr/sbin/sendmail -oi -t
...
> > If you have root, the moral equivalent of
> > 
> > # service exim stop && exim -d+all -bd 2>&1 | tee log
> > ...
> > ctrl-c
> > # service exim start
> > # less log
> 
> How does that help when the process that accepted the message and
> delivered it was started by the user concerned, and the message
> was not handled by the daemonised exim?

 Write a wrapper over /usr/sbin/sendmail which should start exim
 as root and with additional debug flags.

> Due to the implemented security on setuid processes started by non-root
> users, I don't think I can.

 If you have root access to this machine, you can do anything.
 If you are not, just delegate this work to sysadmin.
-- 
 Eugene Berdnikov

-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/

Reply via email to