From 2e4733463a4bc714bc94da00e4e9da9f56fdd703 Mon Sep 17 00:00:00 2001 From: Jason Unovitch Date: Sun, 1 May 2016 01:13:06 +0000 Subject: mail/dspam: implement privilege separation (resolves bug running with suexec) - Runs as dspam:dspam instead of root:mail. The dspam UID/GID were created in r168311 when the UIDs/GIDs files were added but the port had always used root:mail. This had prevented running the dspam webUI under Apache with suexec due to a minimal requirement of UID/GID of 100. The original unsecure behavior is available with the SETUID option. - Default run directory is now /var/run/dspam. This follows the default upstream behavior and removes the patch to dspam.c as a result. Use RUN_DIR and correct the dspam.conf.sample file accordingly. - Default daemon/client communication port is now 2424. - Regen patches while here (portlint) UPDATING: Document privilege separated dspam PR: 115957 Reported by: tedm@ipinc.net, support@ipinc.net Submitted by: Danny Warren (maintainer) --- mail/dspam/files/patch-src__dspam.c | 11 ----------- 1 file changed, 11 deletions(-) delete mode 100644 mail/dspam/files/patch-src__dspam.c (limited to 'mail/dspam/files/patch-src__dspam.c') diff --git a/mail/dspam/files/patch-src__dspam.c b/mail/dspam/files/patch-src__dspam.c deleted file mode 100644 index 9234ef2a52cb..000000000000 --- a/mail/dspam/files/patch-src__dspam.c +++ /dev/null @@ -1,11 +0,0 @@ ---- src/dspam.c.orig 2012-04-11 11:48:33.000000000 -0700 -+++ src/dspam.c 2014-09-23 19:43:09.688194417 -0700 -@@ -4194,7 +4194,7 @@ - - pidfile = _ds_read_attribute(agent_config, "ServerPID"); - if ( pidfile == NULL ) -- pidfile = "/var/run/dspam/dspam.pid"; -+ pidfile = "/var/run/dspam.pid"; - - if (pidfile) { - FILE *file; -- cgit v1.2.3