From owner-freebsd-hackers Mon Apr 22 21:21:39 1996 Return-Path: owner-hackers Received: (from root@localhost) by freefall.freebsd.org (8.7.3/8.7.3) id VAA01810 for hackers-outgoing; Mon, 22 Apr 1996 21:21:39 -0700 (PDT) Received: from irz301.inf.tu-dresden.de (irz301.inf.tu-dresden.de [141.76.1.11]) by freefall.freebsd.org (8.7.3/8.7.3) with SMTP id VAA01800 for ; Mon, 22 Apr 1996 21:21:33 -0700 (PDT) Received: from sax.sax.de by irz301.inf.tu-dresden.de (8.6.12/8.6.12-s1) with ESMTP id GAA20173; Tue, 23 Apr 1996 06:21:00 +0200 Received: by sax.sax.de (8.6.11/8.6.12-s1) with UUCP id GAA06456; Tue, 23 Apr 1996 06:20:58 +0200 Received: (from j@localhost) by uriah.heep.sax.de (8.7.5/8.6.9) id FAA21276; Tue, 23 Apr 1996 05:32:43 +0200 (MET DST) From: J Wunsch Message-Id: <199604230332.FAA21276@uriah.heep.sax.de> Subject: Re: .forward and sendmail? To: freebsd-hackers@freebsd.org (FreeBSD hackers) Date: Tue, 23 Apr 1996 05:32:42 +0200 (MET DST) Cc: davidg@Root.COM, henrich@crh.cl.msu.edu Reply-To: joerg_wunsch@uriah.heep.sax.de (Joerg Wunsch) In-Reply-To: <199604282251.PAA00388@Root.COM> from "David Greenman" at Apr 28, 96 03:51:41 pm X-Phone: +49-351-2012 669 X-Mailer: ELM [version 2.4 PL24 ME8a] MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: owner-hackers@freebsd.org X-Loop: FreeBSD.org Precedence: bulk As David Greenman wrote: > >I think it must be readable by `daemon' (and i would even call this a > >security feature, as opposed to reading the file with root > >privileges). Of course, your directory doesn't need to be readable by > >`daemon', it's sufficient if it is _search_able by him (e.g.., > >drwxr-x--x). > > sendmail is _supposed_ to run as suid root: Yes, but think about it. It reads the .forward with the identity of `daemon', not `root'. Otherwise, any user could link his ~/.forward to a file read-only for root, and try to figure out the contents of this file by sending mail to himself, and analyzing the bounces. Not that this will compromise the entire file, but that's why i wrote: ``I would call it a security feature.'' -- cheers, J"org joerg_wunsch@uriah.heep.sax.de -- http://www.sax.de/~joerg/ -- NIC: JW11-RIPE Never trust an operating system you don't have sources for. ;-)