Re: [Exim] Configuration data that is sensitive

Top Page
Delete this message
Reply to this message
Author: Philip Hazel
Date:  
To: Brian K. West
CC: exim-users
Subject: Re: [Exim] Configuration data that is sensitive
On Fri, 29 Sep 2000, Brian K. West wrote:

>     I am inclined to say limit it to root only.  Anyone else shouldn't have
> a use for this option.  I could give out additional info that is not needed
> by a normal user.  But I am paranoid as hell.


I think there are some arguably legitimate uses. I wouldn't restrict it
to root; I'm all for admin users doing their job with as little root
access as necessary.

One legitimate use is the exicyclog script, which uses it to find where
the logs are. This does not have to be run as root.

-- 
Philip Hazel            University of Cambridge Computing Service,
ph10@???      Cambridge, England. Phone: +44 1223 334714.