search for: restrict_setgid

Displaying 5 results from an estimated 5 matches for "restrict_setgid".

2009 May 19
2
expire-tool segmentation fault
Hi! I'm using Dovecot 1.1.15 on OpenBSD 4.4. How can I debug this? # /usr/local/sbin/dovecot --exec-mail ext /usr/local/libexec/dovecot/expire- tool Segmentation fault (core dumped) # gdb /usr/local/sbin/dovecot (gdb) run --exec-mail ext /usr/local/libexec/dovecot/expire-tool Starting program: /usr/local/sbin/dovecot --exec-mail ext /usr/local/libexec/dovecot/expire-tool Program received
2008 May 18
1
Domain variable in checkpassword
...'SERVICE' => 'IMAP', 'USERDB_1_DRIVER' => 'prefetch', 'USERNAME_CHARS' => 'abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ01234567890.-_@', 'DOVECOT_MASTER' => '1', 'RESTRICT_SETGID' => '', 'AUTH_WORKER_MAX_COUNT' => '30', 'AUTH_WORKER_PATH' => '/var/run/dovecot/auth-worker.25291', 'PASSDB_2_ARGS' => '/etc/exim/checkp %d', 'USERNAME_FORMAT' => '',...
2006 Oct 13
1
Segfault in in rc7 when index does not exists
...ITE_LOCKS="dotlock fcntl" POP3_CLIENT_WORKAROUNDS="" POP3_LOGOUT_FORMAT="top=%t/%p, retr=%r/%b, del=%d/%m, size=%s" POP3_UIDL_FORMAT="" RESTRICT_CHROOT="/srv/vmbox/spool/test" RESTRICT_GID_FIRST="1" RESTRICT_SETEXTRAGROUPS="mail" RESTRICT_SETGID="200" RESTRICT_SETUID="200" STDERR_CLOSE_SHUTDOWN="1" SYSLOG_FACILITY="16" USER="test at prato.linux.it" The directory /srv/vmbox/spool/test contains: # find /srv/vmbox/spool/test /srv/vmbox/spool/test /srv/vmbox/spool/test/cur /srv/vmbox/spool/te...
2008 Mar 28
2
How to force working of a redirect features in sieve plugin?
Hello Trying to setup dovecot installation with sieve plugin, can't configure how to make redirect working. My setup 1 Exim + dovecot lda begin transports dovecot_virtual_delivery: driver = pipe command = /usr/local/dovecot/libexec/dovecot/deliver -d $local_part message_prefix = message_suffix = delivery_date_add envelope_to_add return_path_add log_output user = exim 2
2003 Apr 15
1
PATCH allow_zero_gid option
...&& *chroot_dir != '\0') env_put(t_strconcat("RESTRICT_CHROOT=", chroot_dir, NULL)); + if (allow_zg == TRUE) + env_put(t_strdup("ALLOW_ZERO_GID=TRUE")); env_put(t_strdup_printf("RESTRICT_SETUID=%s", dec2str(uid))); env_put(t_strdup_printf("RESTRICT_SETGID=%s", dec2str(gid))); @@ -45,6 +47,7 @@ void restrict_access_set_env(const char void restrict_access_by_env(int disallow_root) { const char *env; + int allow_zero_gid; gid_t gid; uid_t uid; @@ -97,8 +100,14 @@ void restrict_access_by_env(int disallow i_fatal("We couldn't...