John Allen wrote:
As far as I recall, IMAP servers generally don't allow access to root.

According to the Dovecot wiki, this is hard-coded in the binary:
http://wiki.dovecot.org/MainConfig see under "first_valid_uid"

If the root user is receiving emails, these need to be redirected to another user so they can be read via IMAP.
---
   I guess the source needs a patch.

   Why would dovecot choose to play nursemaid to people who want to read
   root email remotely via IMAPS?

I can log in via SSH, so why not allow it with secure IMAP?  I suppose
really, if someone wants to run as root with no password dovecot should be
**configurable** to allow  this -- as we can't always understand the needs
of end users.

Example.  You have a system on which  root uid=0 means nothing (assigns no
privs -- all assigned via privilege/capability bits).

This means dovecot is hardcoded to lock out a user that may have no
privileges, but has no prob permitting access to those with full
Capability/priv sets.

That is NOT remotely a secure design -- Not that it "allows login to those
w/caps", but that it bogusly tries to invalidate site-security policies
that it doesn't like


Samba has done this and actually disparages people who don't use
conventional security policies 'insecure', when those same people can
point out a multitude of ways samba can be easily --  in the ways that the
samba team, _recommend_, that samba can be accidentally or surreptitiously
configured insecurely. When it is asked why alternate security policies are
insecure -- they change the subject and agree grudgingly to re-allow
'banned' commands under  options like "allow insecure XXXX"...


Trying to 'play nursemaid' to users is a bad security policy -- since as
soon you (like samba team leader said, "we had to make it impossible to
configure samba insecurely", you are asking for trouble;  cuz then users
think they don't have to worry about how they config things, it will
always be secure...and we know  that is very untrue!




Reply via email to