Bug#922048: please allow socket-activation of dkimpy-milter via systemd

2019-02-21 Thread Daniel Kahn Gillmor
Control: forwarded 922048 https://code.launchpad.net/~dkimpy-milter-dev/dkimpy-milter/+git/dkimpy-milter/+ref/dkg/socket-activation On Mon 2019-02-11 17:15:53 -0500, Scott Kitterman wrote: > In the near-term, I think we need to have two ways to start: one with systemd > (socket activation) and o

Bug#922048: please allow socket-activation of dkimpy-milter via systemd

2019-02-13 Thread Daniel Kahn Gillmor
On Mon 2019-02-11 17:15:53 -0500, Scott Kitterman wrote: > I can see advantages to this approach. I took the path I did since I was > implementing an opendkim replacement and that's how it's done there. > > I think the milter would have to do something obnoxious like fail to start if > it had wr

Bug#922048: please allow socket-activation of dkimpy-milter via systemd

2019-02-11 Thread Daniel Kahn Gillmor
On Mon 2019-02-11 10:31:12 -0500, Scott Kitterman wrote: > The one trick I don't think that can be managed this way is that currently > dkimpy-milter reads the private key files as root and then drops privileges > so > that it doesn't have access to the key while running (it's only in memory).

Bug#922048: please allow socket-activation of dkimpy-milter via systemd

2019-02-11 Thread Scott Kitterman
The one trick I don't think that can be managed this way is that currently dkimpy-milter reads the private key files as root and then drops privileges so that it doesn't have access to the key while running (it's only in memory). Opendkim does similar, which is where I got the idea. I'm happy

Bug#922048: please allow socket-activation of dkimpy-milter via systemd

2019-02-11 Thread Daniel Kahn Gillmor
Package: dkimpy-milter Severity: wishlist Version: 1.0.0-1 When running dkimpy-milter on a system that runs systemd, it would be great to have it be socket-activated. This would allow dkimpy-milter to avoid needing to drop privileges (because systemd could start the daemon with privileges already