freebsd-ports/security/courieruserinfo/pkg-message
Cheng-Lung Sung c9c4d0a1c6 Add courieruserinfo 1.1.2, user account information retrieval utility.
PR:		ports/100900
Submitted by:	Andrew St. Jean <andrew at arda.homeunix.net>
2006-07-27 08:07:23 +00:00

44 lines
1.9 KiB
Text

#########################################################################
NOTES FOR RUNNING COURIERUSERINFO
In order to use courieruserinfo, it must be able to access the
authdaemon domain socket, named 'socket'. When courieruserinfo runs as
root, this presents no problem. However, if you need to run courieruserinfo
as a non-root user, you have three options, all of which require some
manual work.
Option 1: Add the user courieruserinfo will run as to the group that
owns the authdaemon socket directory in /etc/group. More than one user
can be added to the group vector in this way. This arrangement works
well if courieruserinfo will be run by only a small number of users.
If the authdaemon socket directory is owned by courier:courier and you
run courieruserinfo as user vmail, your /etc/group file will have a line
something like this:
courier:x:465:vmail
Option 2: Some programs, such as tcpserver, allow you to separately set
the uid and gid of programs they call but don't honour the group vector
found in /etc/group. If you invoke courieruserinfo from such a program,
set the gid to the group ownership of the authdaemon socket directory.
Option 3: Change the permissions on courieruserinfo to set gid to the
group ownership of the socket directory. Again, if the socket directory
is owned by courier:courier, change the ownership and permissions
of courieruserinfo like so:
chgrp courier courieruserinfo
chmod g+s courieruserinfo
Be aware that this will allow any user on the system to access user
account information through courieruserinfo.
To mitigate possible security risks posed by running courieruserinfo
setgid, courieruserinfo cannot retrieve passwords.
The location of the authdaemon domain socket is listed in the
authdaemonrc configuration file as the parameter authdaemonvar.
#########################################################################