On Fri, Sep 24, 2010 at 22:33:25 +0100, Timo Sirainen wrote:
[...]
The dict socket is opened only after root privileges are dropped, so its
permissions should have been the same as what the dropped privileges are
(i.e. accessible for the user that the imap processes are typically
running as).
Reviewing some mailing list archives and the wiki, I still don't have
a real clear picture of why I'd want to use mdbox. What I've taken from
the info I've reviewed says mdbox is more complicated (than sdbox), has
greater potential for breakage (simply because it's more complex), and
has a
On 24/09/2010 19:57, Timo Sirainen wrote:
Just a note to myself and whoever else cares, should be added to wiki once it
has its own page about this:
I have been meaning to say we should have a wiki page about this.
With single-dbox messages can be copied with hard linking. This means
Daniel L. Miller schrieb:
Reviewing some mailing list archives and the wiki, I still don't have a
real clear picture of why I'd want to use mdbox. What I've taken from
the info I've reviewed says mdbox is more complicated (than sdbox), has
greater potential for breakage (simply because it's more
Daniel L. Miller schrieb:
Reviewing some mailing list archives and the wiki, I still don't have a
real clear picture of why I'd want to use mdbox. What I've taken from
the info I've reviewed says mdbox is more complicated (than sdbox), has
greater potential for breakage (simply because it's more
On 25.9.2010, at 9.49, Daniel L. Miller wrote:
On 9/24/2010 11:57 AM, Timo Sirainen wrote:
Just a note to myself and whoever else cares, should be added to wiki
once it has its own page about this:
With single-dbox messages can be copied with hard linking. This means
that there can be
On 25.9.2010, at 11.50, William Blunn wrote:
I can't think of any other reasonable way to handle this though, so unless
someon has some great ideas, I think the solution is to simply
add enough warnings that message store shouldn't be accessed directly. Maybe
add some import/export commands
Let's say one has a SQL table with following fields for John Doe:
login: u0007
password: {SHA1}...
mailhome: /path/to/joeshome
email: john@example.com
To log in, for internal policy reasons, John MUST make use of his userid