Bug#428392: dkim-filter.sock permissions should be more MTA friendly

2007-06-27 Thread Tony Hoyle
Mike Markley wrote: What user is Postfix running as when it attempts to connect to the socket, BTW? I'd like to update README.Debian with explicit instructions on how to add the correct user to the group. It's definable (setting mail_owner in main.cf) but by default runs as 'postfix'. A

Bug#428392: dkim-filter.sock permissions should be more MTA friendly

2007-06-26 Thread Mike Markley
tags 428392 + confirmed pending thanks On Fri, Jun 15, 2007 at 11:08:40AM +0100, Tony Hoyle [EMAIL PROTECTED] wrote: Postfix. It runs as its own unprivileged user (I'm surprised that sendmail doesn't do this also). What user is Postfix running as when it attempts to connect to the socket,

Bug#428392: dkim-filter.sock permissions should be more MTA friendly

2007-06-15 Thread Mike Markley
You don't specify which MTA you're running; stock Sendmail shouldn't have an issue. With that said, I'm perfectly fine with adding such a group, but I'll need to figure out the best way to make this happen. The socket's being created and having its permissions set out of libmilter by

Bug#428392: dkim-filter.sock permissions should be more MTA friendly

2007-06-15 Thread Tony Hoyle
Mike Markley wrote: You don't specify which MTA you're running; stock Sendmail shouldn't have an issue. Postfix. It runs as its own unprivileged user (I'm surprised that sendmail doesn't do this also). With that said, I'm perfectly fine with adding such a group, but I'll need to figure out

Bug#428392: dkim-filter.sock permissions should be more MTA friendly

2007-06-11 Thread Tony Hoyle
Package: dkim-filter Version: 1.0.0.dfsg-1 Severity: normal The default permissions of /var/run/dkim-filter/dkim-filter.sock only allow the dkim-filter user to write to it. This precludes the MTA being able to use it as a milter, since that runs as its own user. Also default permissions allow