Displaying 5 results from an estimated 5 matches for "restrict_setgid".
2009 May 19
2
expire-tool segmentation fault
Hi!
I'm using Dovecot 1.1.15 on OpenBSD 4.4.
How can I debug this?
# /usr/local/sbin/dovecot --exec-mail ext /usr/local/libexec/dovecot/expire-
tool
Segmentation fault (core dumped)
# gdb /usr/local/sbin/dovecot
(gdb) run --exec-mail ext /usr/local/libexec/dovecot/expire-tool
Starting program: /usr/local/sbin/dovecot --exec-mail ext
/usr/local/libexec/dovecot/expire-tool
Program received
2008 May 18
1
Domain variable in checkpassword
...'SERVICE' => 'IMAP',
'USERDB_1_DRIVER' => 'prefetch',
'USERNAME_CHARS' =>
'abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ01234567890.-_@',
'DOVECOT_MASTER' => '1',
'RESTRICT_SETGID' => '',
'AUTH_WORKER_MAX_COUNT' => '30',
'AUTH_WORKER_PATH' => '/var/run/dovecot/auth-worker.25291',
'PASSDB_2_ARGS' => '/etc/exim/checkp %d',
'USERNAME_FORMAT' => '',...
2006 Oct 13
1
Segfault in in rc7 when index does not exists
...ITE_LOCKS="dotlock fcntl"
POP3_CLIENT_WORKAROUNDS=""
POP3_LOGOUT_FORMAT="top=%t/%p, retr=%r/%b, del=%d/%m, size=%s"
POP3_UIDL_FORMAT=""
RESTRICT_CHROOT="/srv/vmbox/spool/test"
RESTRICT_GID_FIRST="1"
RESTRICT_SETEXTRAGROUPS="mail"
RESTRICT_SETGID="200"
RESTRICT_SETUID="200"
STDERR_CLOSE_SHUTDOWN="1"
SYSLOG_FACILITY="16"
USER="test at prato.linux.it"
The directory /srv/vmbox/spool/test contains:
# find /srv/vmbox/spool/test
/srv/vmbox/spool/test
/srv/vmbox/spool/test/cur
/srv/vmbox/spool/te...
2008 Mar 28
2
How to force working of a redirect features in sieve plugin?
Hello
Trying to setup dovecot installation with sieve plugin, can't configure how to make redirect working.
My setup
1 Exim + dovecot lda
begin transports
dovecot_virtual_delivery:
driver = pipe
command = /usr/local/dovecot/libexec/dovecot/deliver -d $local_part
message_prefix =
message_suffix =
delivery_date_add
envelope_to_add
return_path_add
log_output
user = exim
2
2003 Apr 15
1
PATCH allow_zero_gid option
...&& *chroot_dir != '\0')
env_put(t_strconcat("RESTRICT_CHROOT=", chroot_dir, NULL));
+ if (allow_zg == TRUE)
+ env_put(t_strdup("ALLOW_ZERO_GID=TRUE"));
env_put(t_strdup_printf("RESTRICT_SETUID=%s", dec2str(uid)));
env_put(t_strdup_printf("RESTRICT_SETGID=%s", dec2str(gid)));
@@ -45,6 +47,7 @@ void restrict_access_set_env(const char
void restrict_access_by_env(int disallow_root)
{
const char *env;
+ int allow_zero_gid;
gid_t gid;
uid_t uid;
@@ -97,8 +100,14 @@ void restrict_access_by_env(int disallow
i_fatal("We couldn't...