Re: Root privileges

2011-01-31 Thread varad gupta
Thanx for all the responses, especially Daniel. And as Wietse says, lets close the thread... Regards On Tue, Feb 1, 2011 at 2:00 AM, Wietse Venema wrote: > Victor Duchovni: >> On Mon, Jan 31, 2011 at 05:06:08AM +0100, Morten P.D. Stevens wrote: >> >> > Whatever you use, postfix or sendmail ...

Re: Root privileges

2011-01-31 Thread Wietse Venema
Victor Duchovni: > On Mon, Jan 31, 2011 at 05:06:08AM +0100, Morten P.D. Stevens wrote: > > > Whatever you use, postfix or sendmail ... the theoretical risk of > > attack is exactly the same. > > This is nonsense, design matters. Some software is safer by design. > > Implementation flaws are sti

Re: Root privileges

2011-01-31 Thread Victor Duchovni
On Mon, Jan 31, 2011 at 05:06:08AM +0100, Morten P.D. Stevens wrote: > Whatever you use, postfix or sendmail ... the theoretical risk of > attack is exactly the same. This is nonsense, design matters. Some software is safer by design. Implementation flaws are still possible, but in *safer by des

Re: Root privileges

2011-01-30 Thread Morten P.D. Stevens
2011/1/31 varad gupta : > > But then, is postfix not running the same risk as "sendmail" ? Sendmail is not a security risk. These are old horror stories. Why use big companies like IBM or Red Hat still sendmail when postfix is supposed to be so much safer? Why is sendmail the default MTA on Sola

Re: Root privileges

2011-01-30 Thread Michael J Wise
On Jan 30, 2011, at 6:50 PM, Chris Tandiono wrote: > On 30 Jan 2011, at 18:46 , Victor Duchovni wrote: > >> On Mon, Jan 31, 2011 at 08:02:28AM +0530, varad gupta wrote: >> >>> Thanx for all the replies - I now understand the reason for master >>> daemon to run with superuser privileges. They we

Re: Root privileges

2011-01-30 Thread Chris Tandiono
On 30 Jan 2011, at 18:46 , Victor Duchovni wrote: > On Mon, Jan 31, 2011 at 08:02:28AM +0530, varad gupta wrote: > >> Thanx for all the replies - I now understand the reason for master >> daemon to run with superuser privileges. They were really helpful. >> >> But then, is postfix not running th

Re: Root privileges

2011-01-30 Thread Daniel Bromberg
No, quite the opposite. It takes privileges to "drop" privileges. A well designed system (such as Postfix) is *more* secure by in part using root privileges to enable it to operate in multiple security contexts. My short maxim for this is indebted to a marketing campaign: http://en.wikipe

Re: Root privileges

2011-01-30 Thread Victor Duchovni
On Mon, Jan 31, 2011 at 08:02:28AM +0530, varad gupta wrote: > Thanx for all the replies - I now understand the reason for master > daemon to run with superuser privileges. They were really helpful. > > But then, is postfix not running the same risk as "sendmail" ? No. > Does it mean, that unle

Re: Root privileges

2011-01-30 Thread varad gupta
ster as root (the same reason for running >> other processes as unprivileged) ? > > No, quite the opposite. It takes privileges to "drop" privileges.  A well > designed system (such as Postfix) is *more* secure by in part using root > privileges to enable it to operate in

Re: Root privileges

2011-01-30 Thread Victor Duchovni
*more* secure by in part using root privileges to enable it to operate in multiple security contexts. My short maxim for this is indebted to a marketing campaign: http://en.wikipedia.org/wiki/Frank_Perdue "it takes a tough man to make a tender chicken" By which I mean that

Re: Root privileges

2011-01-30 Thread Wietse Venema
varad gupta: > Hi > > A colleague asked me a question to which I had not given much thought before. > > We all know that most postfix daemons/services run as unpriviliged > users (apart from local and virtual) but the master daemon runs with > root privileges? > &g

Re: Root privileges

2011-01-30 Thread Ralf Hildebrandt
* varad gupta : > Hi > > A colleague asked me a question to which I had not given much thought before. That happens from time to time :) > We all know that most postfix daemons/services run as unpriviliged > users (apart from local and virtual) but the master daemon runs with &g

Root privileges

2011-01-30 Thread varad gupta
Hi A colleague asked me a question to which I had not given much thought before. We all know that most postfix daemons/services run as unpriviliged users (apart from local and virtual) but the master daemon runs with root privileges? Is it not a risk running master as root (the same reason for