[16228] in bugtraq
Re: reporting local security problems (was: for WinNT)
daemon@ATHENA.MIT.EDU (Claus Assmann)
Mon Aug 14 14:47:42 2000
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Message-ID: <20000811202318.A18196@zardoc.endmail.org>
Date: Fri, 11 Aug 2000 20:23:18 -0700
Reply-To: Claus Assmann <ca+bugtraq@ZARDOC.ENDMAIL.ORG>
From: Claus Assmann <ca+bugtraq@ZARDOC.ENDMAIL.ORG>
X-To: der Mouse <mouse@RODENTS.MONTREAL.QC.CA>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To: <200008111628.MAA16162@Twig.Rodents.Montreal.QC.CA>; from
mouse@RODENTS.MONTREAL.QC.CA on Fri, Aug 11,
2000 at 12:28:46PM -0400
On Fri, Aug 11, 2000, der Mouse wrote:
> Unfortunately it also finds non-problems too. I have a system on which
> the directories in the path leading to the aliases files are
> group-writeable, by design. (The system has all of two users, both of
> whom are trusted.) Sendmail kvetches about this every time I run
> newaliases - I consider it broken for it to arrogate to itself the
> right to tell me how my system should be set up, or that something like
> this is a problem, and if it refused to run, or if it complained more
> often or more verbosely, I would fix it (or, perhaps, switch).
sendmail allows you to override most of it's safety checks.
See doc/op/op.{me,ps}, look for
DontBlameSendmail=option,option,...
DontWarnForwardFileInUnsafeDirPath
ForwardFileInUnsafeDirPath
ForwardFileInUnsafeDirPathSafe
ForwardFileIngroupWritableDirPath
GroupWritableForwardFileSafe
and many more...
sendmail just has been blamed too often for misconfigured systems
("My /etc is world writable and now someone got root access using
sendmail") that's why all of these checks are in there.