Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 9 Apr 2013 14:55:39 -0400
From: Russ Thompson <>
To: Michael Tokarev <>
Subject: Re: Postfix incorrect permissions on
 configurations. Request.

The scripts inside are -world- executable, is the main concern here.  Certainly this can be changed by the end user but seems like an insecure default.  I've seen discussions and CVE's assigned for past cases where log directories are world readable and vice versa, if this is not the correct place to send, please advise.

- Russ

On Tuesday, April 9, 2013 at 2:19 PM, Michael Tokarev wrote:

> 09.04.2013 22:08, Russ Thompson wrote:
> > Postfix is setting the following permissions by default on Debian Squeeze. I'm seeing roughly the same on RHEL/CentOS 6.x, this appears to be a requirement of "sendmail.postfix" 
> > 
> > 0755 /etc/postfix
> > 0644 /etc/postfix/*
> > 0755 /etc/postfix-script
> > 0755 /etc/post-install
> > 
> > Which allows all users to execute these scripts and read configurations. Setting to tighter/more typical permissions (i.e 640) results in: postfix/sendmail[21007]: fatal: open /etc/postfix/ Permission denied
> That's all nice, but can you elaborate a bit -- what is wrong
> with that? Which request do you have? What it has to do with
> oss-security?
> Thanks,
> /mjt 

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.