On Tue, Apr 28, 2020 at 08:12:30AM +0100, Russell King via Exim-users wrote: > I believe so - exim is being called from a perl script running as the > user stated in the log line thusly: > > /usr/sbin/sendmail -oi -t ... > > If you have root, the moral equivalent of > > > > # service exim stop && exim -d+all -bd 2>&1 | tee log > > ... > > ctrl-c > > # service exim start > > # less log > > How does that help when the process that accepted the message and > delivered it was started by the user concerned, and the message > was not handled by the daemonised exim?
Write a wrapper over /usr/sbin/sendmail which should start exim as root and with additional debug flags. > Due to the implemented security on setuid processes started by non-root > users, I don't think I can. If you have root access to this machine, you can do anything. If you are not, just delegate this work to sysadmin. -- Eugene Berdnikov -- ## List details at https://lists.exim.org/mailman/listinfo/exim-users ## Exim details at http://www.exim.org/ ## Please use the Wiki with this list - http://wiki.exim.org/
