On Mon, 15 Jul 2013 14:41:08 -0500 (CDT)
David B Funk wrote:

> It uses the Apache model. There is a parent process that runs as root
> to manage the sockets which then forks off children as the "-u" user
> to actually process the messages. If you don't specify the "-u" user
> the children stay as root and it barks at you because it's a potential
> security risk.

The spamd man page says:

   -u username, --username=username
           Run as the named user.  If this option is not set, the
           default behaviour is to setuid() to the user running "spamc",
           if "spamd" is running as root.

so presumably the children would need to start as root to setuid to the
unix user running spamc. The mail would then be scanned as an
unprivileged user whilst retaining access to the user's  home
directory, so it shouldn't be a security problem.

OTOH when I just tried this in 3.3.2, spamd didn't to pick-up a test
rule I added to ~/.spamassassin/user_prefs (which worked with the
spamassassin script).

Reply via email to