I am running Dovecot with system users (userdb passwd), but some of those users don't have shell accounts on the IMAP server so their shell on that machine is set to /usr/sbin/nologin. Currently I am using maildirs and this is not a problem, but I am in the process of switching to dbox which means I will need a cronjob running 'doveadm purge -A'. During testing I found that those users with a 'nologin' shell are not included in the list returned by the userdb iterator, and that the iterator doesn't honour the first/last_valid_uid settings. This inconsistency seems undesirable, so the attached patch - makes lookup perform the same checks as iteration, - makes the 'nologin' check configurable, - adds a new optional check that the user owns their home directory. The last check was the one performed by qmail, and seems to me to be a more reliable 'is this a real user' check than a nologin shell. If this patch is applied, the release notes for the next release should probably mention that system users with a 'nologin' shell will no longer be allowed to log in to IMAP until the 'auth_check_nologin' setting is changed from true to false. Also, there seem to be two first/last_valid_uid settings: first_valid_uid itself, which is honoured by the storage subsystem, and auth_first_valid_uid, which is honoured by the 'passwd' userdb. Is this intentional? Ben -------------- next part -------------- A non-text attachment was scrubbed... Name: userdb-passwd-nologin.patch Type: text/x-diff Size: 4203 bytes Desc: not available URL: <http://dovecot.org/pipermail/dovecot/attachments/20130131/afec23bb/attachment-0004.bin>
On 1.2.2013, at 0.35, Ben Morrow <ben at morrow.me.uk> wrote:> I am running Dovecot with system users (userdb passwd), but some of > those users don't have shell accounts on the IMAP server so their shell > on that machine is set to /usr/sbin/nologin. Currently I am using > maildirs and this is not a problem, but I am in the process of switching > to dbox which means I will need a cronjob running 'doveadm purge -A'. > > During testing I found that those users with a 'nologin' shell are not > included in the list returned by the userdb iterator, and that the > iterator doesn't honour the first/last_valid_uid settings. This > inconsistency seems undesirable, so the attached patch > > - makes lookup perform the same checks as iteration,Hmmh. You could also just have them aliased to other users, so this wouldn't be necessary..> - makes the 'nologin' check configurable, > - adds a new optional check that the user owns their home directory.These settings are passwd-specific, so they would have to something like: userdb { driver = passwd args = check-nologin=n check-home=y }> The last check was the one performed by qmail, and seems to me to be a > more reliable 'is this a real user' check than a nologin shell.It also performs disk I/O, slowing down the lookup.> If this patch is applied, the release notes for the next release should > probably mention that system users with a 'nologin' shell will no longer > be allowed to log in to IMAP until the 'auth_check_nologin' setting is > changed from true to false.The default will in any case be the same as it is now.> Also, there seem to be two first/last_valid_uid settings: > first_valid_uid itself, which is honoured by the storage subsystem, and > auth_first_valid_uid, which is honoured by the 'passwd' userdb. Is this > intentional?Nope, that's a bug. Fixed that in v2.2: http://hg.dovecot.org/dovecot-2.2/rev/18661d1d6ed0
Hi Ben, Ben Morrow wrote:> + if (set->check_nologin) { > + /* skip entries that don't have a valid shell. > + they're again probably not real users. */ > + if (strcmp(pw->pw_shell, "/bin/false") == 0 || > + strcmp(pw->pw_shell, "/sbin/nologin") == 0 || > + strcmp(pw->pw_shell, "/usr/sbin/nologin") == 0) > + return FALSE; > + }Valid shells are defined in /etc/shells and "locked" users, I would strongly discourage from hardcoding a list of no-login shells here. Users locked with "passwd -l" can also be detected by a ! at the beginning of the password hash. Regards Daniel -- https://plus.google.com/103021802792276734820
After thinking about this for a while, I think the best solution is simply to remove the shell check unconditionally. I'm not sure if anyone else except me ever wanted it (and I can live with a couple of unnecessary users getting mailboxes). Done for v2.2: http://hg.dovecot.org/dovecot-2.2/rev/4eea2224e16b I did also wonder about using a special "dovecot-skip" GECOS field for this, but maybe not a good idea either. On 1.2.2013, at 0.35, Ben Morrow <ben at morrow.me.uk> wrote:> I am running Dovecot with system users (userdb passwd), but some of > those users don't have shell accounts on the IMAP server so their shell > on that machine is set to /usr/sbin/nologin. Currently I am using > maildirs and this is not a problem, but I am in the process of switching > to dbox which means I will need a cronjob running 'doveadm purge -A'. > > During testing I found that those users with a 'nologin' shell are not > included in the list returned by the userdb iterator, and that the > iterator doesn't honour the first/last_valid_uid settings. This > inconsistency seems undesirable, so the attached patch > > - makes lookup perform the same checks as iteration, > - makes the 'nologin' check configurable, > - adds a new optional check that the user owns their home directory. > > The last check was the one performed by qmail, and seems to me to be a > more reliable 'is this a real user' check than a nologin shell. > > If this patch is applied, the release notes for the next release should > probably mention that system users with a 'nologin' shell will no longer > be allowed to log in to IMAP until the 'auth_check_nologin' setting is > changed from true to false. > > Also, there seem to be two first/last_valid_uid settings: > first_valid_uid itself, which is honoured by the storage subsystem, and > auth_first_valid_uid, which is honoured by the 'passwd' userdb. Is this > intentional? > > Ben > > <userdb-passwd-nologin.patch>