indeed. well, i tried running a simple "hello world" CGI in perl, and it too returns the same error, so I know for sure that it's an apache/OpenBSD issue, and not one with qmailadmin per se.
for the record, i tried a fresh install of apache, and ran into the same error. i also tried su'ing to www and the cgi was executable. i even tried qmailadmin 1.0.28 for kicks. no dice. i bumped the apache logging level up to debug and i'm now also receiving a: (2)No such file or directory: exec of /vhosts/org.3x3x3.www/cgi-bin/test.cgi failed error with my perl cgi. ugh. it seems that this problem is not neccessarily appropriate for discussion on this mailing list, though i appreciate all of the help so far. i /do/ think there's something involved with the chrooted apache, but i'm kinda stumped as to where to go from here. has anyone gotten qmailadmin and/or vQadmin running on OpenBSD > 3.2 with the default install of apache? I'd love to hear your secrets... thanks, darren > On Monday, October 20, 2003, at 05:32 PM, Chris Hallgren wrote: >> Maybe the standard apache is preventing it from running too I know >> apache >> runs in a jailed enviroment. read >> http://www.openbsd.org/faq/faq10.html#httpdchroot My suggestion is to >> remove >> the standard apache (httpd) and compile one by hand. It makes it alot >> easier >> and you can add tons of modules. > > That kind of defeats the purpose of using OpenBSD as a more secure OS. > > Two things to try. One is to su to the user that apache runs as and > try to run qmailadmin from the command line. This will tell you if > it's a permissions issue. > > The second would be to find out more about the directory structure the > CGI has access to. It might be failing to read the HTML templates > typically found in /usr/local/share/qmailadmin. > > -- > Tom Collins - [EMAIL PROTECTED] > Note: The Tom Logic offices will be closed October 23 to November 18. > QmailAdmin: http://qmailadmin.sf.net/ Vpopmail: http://vpopmail.sf.net/ > Info on the Sniffter hand-held Network Tester: http://sniffter.com/ > > >
