On Wed, 9 Sep 2015 14:48:14 -0700
jdow wrote:

> On 2015-09-09 13:51, RW wrote:
> > On Wed, 9 Sep 2015 17:27:54 +0200
> > Marc Richter wrote:
> >
> >> Hi RW,
> >>
> >>> Do you mean that ww is a unix user? The normal way to do this is
> >>> to run spamd as root and run spamc as the unix user. Passing -u to
> >>> spamc is really intended for virtual users, I'm not sure whether
> >>> it works for unix users.  Are you sure it worked before?
> >>
> >> ww is a unix user, yes. And it worked before, yes.
> >
> > Supporting that sounds like a really bad idea. It would mean that
> > any user could make a spamd child run as any unix user they choose -
> > possibly even root. It's an unnecessary risk of privilege
> > escalation.
> >
> > It also gives users too much access to each other's databases. A
> > malicious user would be able to miss-train another user's Bayes or
> > manipulate reputations in TxRep or AWL. It would also be possible to
> > infer some of the contents of another users TxRep database from
> > suitable test emails.
> 
> Why don't you try to run spamc -u root as a common user and see what
> happens then talk about the results if it is warranted?


Given that it doesn't appear to be currently working with non-root
accounts, what would that prove? And it's still wrong even if root is a
special case. 

 

Reply via email to