On Monday 10 July 2006 13:39, Alan J. Flavell took the opportunity to write:
> On Mon, 10 Jul 2006, Wayne Pascoe wrote:
> > On 10 Jul 2006, at 11:40, Tony Finch wrote:
> > > On Sun, 9 Jul 2006, Wayne Pascoe wrote:
> > > >  server_condition = "${if pam{$2:$3}{1}{0}}"
> > >
> > > Does exim have read access to /etc/shadow?
> >
> > No, it didn't. Doh!
>
> Hang on - it's not supposed to, is it?  The whole point of /etc/shadow
> is to hide the crypted tokens away.  Then a mechanism is provided
> (PAM) for checking passwords without having to expose the shadow file.

The problem is that libpam is just a library. It doesn't get any privileges 
that the process using it doesn't already have. The solution, besides adding 
exim to the shadow group, is to use a method involving some daemon, e.g. 
pam_ldap or pam_winbind (pam_mysql won't be any better since you need to 
protect the password that gives access to the encrypted passwords).

-- 
Magnus Holmgren        [EMAIL PROTECTED]
                       (No Cc of list mail needed, thanks)

Attachment: pgpRF7AT84fl1.pgp
Description: PGP signature

-- 
## List details at http://www.exim.org/mailman/listinfo/exim-users 
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://www.exim.org/eximwiki/

Reply via email to