Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 16 Nov 1998 14:04:05 -0600
From:      William McVey <wam@sa.fedex.com>
To:        Warner Losh <imp@village.org>
Cc:        Matthew Dillon <dillon@apollo.backplane.com>, Andre Albsmeier <andre.albsmeier@mchp.siemens.de>, freebsd-security@FreeBSD.ORG
Subject:   Re: Would this make FreeBSD more secure? 
Message-ID:  <199811162004.OAA18023@s07.sa.fedex.com>

next in thread | raw e-mail | index | archive | help

Warner Losh wrote:
<snip>
>sendmail needs to run as root to deliver mail and to bind to port 25.
<snip>
>lpd needs to run as root to access the files that it is printing,
>and to bind to its listening port.

inetd can start processes like sendmail (or lpd) as unprivileged
users already bound to their ports.  If the service is started with
'wait' configured, then the daemon is launched as a unprivileged
user which has complete control of the socket for accepting new
connections.  I've seen this used successfully for mail relaying
(sendmail started as "unprivileged" user smtp out of inetd).   The
smtp user can write the mail queue, and can invoke the setuid
mail.local (which is set to root.mail 4750, so regular users can't
play with it).  Works like a charm.

 -- William

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199811162004.OAA18023>