On Wed, Jul 07, 2004 at 10:18:55AM +0100, Philip Hazel wrote:
> You have two reasonable choices and one unreasonable choice:
>
> Reasonable:
>
> (1) Arrange for the exim user to have access to your data.
>
> (2) Have the verification call a setuid program or a daemon
> that runs as root and does the verification.
Depending on the precise details, sudo may be a good way of solving
this.
--
Bruce
I am now a little wary of bananas.