aboutsummaryrefslogtreecommitdiff
path: root/security/courieruserinfo/pkg-message
diff options
context:
space:
mode:
authorCheng-Lung Sung <clsung@FreeBSD.org>2006-07-27 08:07:23 +0000
committerCheng-Lung Sung <clsung@FreeBSD.org>2006-07-27 08:07:23 +0000
commitc9c4d0a1c68dc34043b947e4ac77c33ce31beb2e (patch)
tree459a3a484f8a64ee8954d10096e6f73efbe031f6 /security/courieruserinfo/pkg-message
parent4adef23672f71942245a56b40b8e689736b48471 (diff)
downloadports-c9c4d0a1c68dc34043b947e4ac77c33ce31beb2e.tar.gz
ports-c9c4d0a1c68dc34043b947e4ac77c33ce31beb2e.zip
Add courieruserinfo 1.1.2, user account information retrieval utility.
PR: ports/100900 Submitted by: Andrew St. Jean <andrew at arda.homeunix.net>
Notes
Notes: svn path=/head/; revision=168861
Diffstat (limited to 'security/courieruserinfo/pkg-message')
-rw-r--r--security/courieruserinfo/pkg-message44
1 files changed, 44 insertions, 0 deletions
diff --git a/security/courieruserinfo/pkg-message b/security/courieruserinfo/pkg-message
new file mode 100644
index 000000000000..0540fc049697
--- /dev/null
+++ b/security/courieruserinfo/pkg-message
@@ -0,0 +1,44 @@
+
+#########################################################################
+NOTES FOR RUNNING COURIERUSERINFO
+
+In order to use courieruserinfo, it must be able to access the
+authdaemon domain socket, named 'socket'. When courieruserinfo runs as
+root, this presents no problem. However, if you need to run courieruserinfo
+as a non-root user, you have three options, all of which require some
+manual work.
+
+Option 1: Add the user courieruserinfo will run as to the group that
+owns the authdaemon socket directory in /etc/group. More than one user
+can be added to the group vector in this way. This arrangement works
+well if courieruserinfo will be run by only a small number of users.
+If the authdaemon socket directory is owned by courier:courier and you
+run courieruserinfo as user vmail, your /etc/group file will have a line
+something like this:
+
+ courier:x:465:vmail
+
+Option 2: Some programs, such as tcpserver, allow you to separately set
+the uid and gid of programs they call but don't honour the group vector
+found in /etc/group. If you invoke courieruserinfo from such a program,
+set the gid to the group ownership of the authdaemon socket directory.
+
+Option 3: Change the permissions on courieruserinfo to set gid to the
+group ownership of the socket directory. Again, if the socket directory
+is owned by courier:courier, change the ownership and permissions
+of courieruserinfo like so:
+
+ chgrp courier courieruserinfo
+ chmod g+s courieruserinfo
+
+Be aware that this will allow any user on the system to access user
+account information through courieruserinfo.
+
+To mitigate possible security risks posed by running courieruserinfo
+setgid, courieruserinfo cannot retrieve passwords.
+
+The location of the authdaemon domain socket is listed in the
+authdaemonrc configuration file as the parameter authdaemonvar.
+
+#########################################################################
+