On Wed, 15 Oct 2025 11:23:13 +0200 Andrey Albershteyn <[email protected]> wrote:
On 2025-10-13 16:34:24, Darrick J. Wong wrote:
> From: Darrick J. Wong <[email protected]>
> > Iustin Pop reports that the xfs_scrub_fail service fails to email
> problem reports on Debian when postfix is installed.  This is apparently
> due to several factors:
> > 1. postfix's sendmail wrapper calling postdrop directly,
> 2. postdrop requiring the ability to write to the postdrop group,
> 3. lockdown preventing the xfs_scrub_fail@ service to have postdrop in
>    the supplemental group list or the ability to run setgid programs
> > Item (3) could be solved by adding the whole service to the postdrop
> group via SupplementalGroups=, but that will fail if postfix is not
> installed and hence there is no postdrop group.
> > It could also be solved by forcing msmtp to be installed, bind mounting
> msmtp into the service container, and injecting a config file that
> instructs msmtp to connect to port 25, but that in turn isn't compatible
> with systems not configured to allow an smtp server to listen on ::1.
> > So we'll go with the less restrictive approach that e2scrub_fail@ does,
> which is to say that we just turn off all the sandboxing. :( :(

It looks like we has become too addicted to this sandboxig stuff,
without thinking where such sandboxing makes sense and where it is
not.  And `systemd-analyze security` is definitely not helping here, --
there's no reason to turn something on just to have more green in
the output of this utility.

The service (xfs_scrub_fail) does not need sandboxing to begin with,
since it is not security-sensitive.

Can we fix this for trixie please?  It is hurting.

/mjt

Reply via email to