That's a popular conception, but I don't know that it's really true.  I 
believe that Cyrus is a better conceived product in that it abandon's 
the use of individually owned mailspools and maintains it's own 
database (figuratively speaking) and amanages access to the individual 
sppols.  Cyrus also gives you a lot of options in terms of acls for 
sharing mailboxes -- such as a collective mailbox that various people 
in the department access regularly, meaning that personal passwords 
don't have to be shared or group passwords created.  In that kind of a 
situation, since I continue to use my personal password to access the 
collective maildrop, it is more secure.

The big issue, however, is sendmail.  And ny effort to hack through 
your mail system via your email system (i.e., through port 25) goes 
through sendmail before Cyrus ever sees it, and most of those attacks 
are designed to get sendmail to execute some program with its root 
privileges.  Since all the mailboxes are owned by the Cyrus user, what 
would be more secure  of a system that just does mail delivery woulkd 
be a hack to sendmail so that once it attaches to port 25 it drops root 
and runs as the Cyrus user.  Show me a hack like that, and Cyrus wins 
hands down (or two thumbs up) because you can't do that with UofW. 
Mail spools are all individually owned, and sendmail has to have root 
privileges in order to invoke the delivery agent with a different uid 
every time.  There are a lot of server programs that do just that 
(i.e., do the initializations that require root as root and than drop 
to a non-privleged user), and of the mail systems I've seen, Cyrus (or 
it's commercial derivatives -- I know of at least one) is the only mail 
server I know of that such a scheme would work with.  But alas, 
sendmail doersn't do that and so Cyrus's security advantage is really 
pretty much restricted to the flexible application of acls to mailboxes 
which eliminates the need to share common passwords and/or establish 
group accounts.  That advantage is more than trivial, most certainly, 
but Cyrus can't help in securing the other end of the pipe, which is 
sendmail.

(I know a lot of people swear by postfix, but I stick with sendmail 
because I know the product and in this world of nasty hackers, using an 
unfamiliar MTA is a very scarry thought.  But does anyone know, can 
postfix be configured to drop root to some other specified user after 
it initializes?)

-- Rob
--On Wednesday, March 14, 2001 11:52:02 AM -0400 The Hermit Hacker 
<[EMAIL PROTECTED]> wrote:

>
> Trying to convince a group that Cyrus is more secure, but my
> arguments are about as lame as can be :(
>
> Does anyone have a URL that I can use in my args, that compares them
> better?
>
> Thanks ...
>
> Marc G. Fournier                   ICQ#7615664               IRC
> Nick: Scrappy Systems Administrator @ hub.org
> primary: [EMAIL PROTECTED]           secondary:
> scrappy@{freebsd|postgresql}.org
>




       _ _ _ _           _    _ _ _ _ _
      /\_\_\_\_\        /\_\ /\_\_\_\_\_\
     /\/_/_/_/_/       /\/_/ \/_/_/_/_/_/  QUIDQUID LATINE DICTUM SIT,
    /\/_/__\/_/ __    /\/_/    /\/_/          PROFUNDUM VIDITUR
   /\/_/_/_/_/ /\_\  /\/_/    /\/_/
  /\/_/ \/_/  /\/_/_/\/_/    /\/_/         (Whatever is said in Latin
  \/_/  \/_/  \/_/_/_/_/     \/_/              appears profound)

  Rob Tanner
  UNIX and Networks Manager
  Linfield College, McMinnville OR
  (503) 434-2558 <[EMAIL PROTECTED]>

Reply via email to