First my scenario:

I've build a custom script to add a disclaimer via altermime.
Due to the nature of altermime works, it needs to alter the mail message stored in the /var/qsheff/spool/.../_temp_file_name (passed to the script via %%mailfile%% var)

I have seen that qmail-qsheff is owned by uid root and gid qmail, and then setuid . This kind or permission does not allow my perl script to call altermime, because the env is not tainted.

So i've had modified the perimission of qmail-qsheff by removing setuid flag and giving it uid a gid of the right user (in my case vpopmail). I've also gave the right permission to /var/qsheff/* stuff ( so altermime could modify in the right way the spool file )

All seems to work, eg: mails gets altermimed and sended correctly to user, but my question is: Does this kind of setup introduce some level of
security risk ?


Thx in adavance,
Davide

---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to