-
Notifications
You must be signed in to change notification settings - Fork 42
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Chmod and chown whole opendkim key directory #15
Conversation
Looking at the source https://github.com/trusteddomainproject/OpenDKIM/blob/5c539587561785a66c1f67f720f2fb741f320785/opendkim/opendkim.c#L4695 it seems it will make sure all parents are secure which make sense. Maybe fixes #14
@hemberger should be ok? any idea why you didnt see this? |
The comment in the code that you linked is:
When I look in a container (using the current version on the master branch), the permissions already satisfy these criteria:
As the current image is working for me without any DKIM permission errors, I do not think this change is necessary. It would be somewhat disruptive for my use case because it would make the volume-mounted directory unreadable by my user (and, therefore, would interfere with git tracking). If we have no other ways to solve #14, then I am fine with this solution (if it is tested and working), but let me comment on that Issue, because I have an idea what the problem may be. |
Let me propose another solution - I noticed in another project that the DKIM keys were in another folder. What if you do this
This way the rights does not need to be changed in the /etc/opendkim/keys and thus opendkim won't complain. But you can still reuse the keys when the container is recreated. Note you have to copy the keys when they are generated to the "temp" folder. |
Yeah that is an option, but then we have crippled the safety check for ppl who actually would like to know that their private keys are read or writable. Not sure what ppl expect hmm. How about make it possible to explicitly configure RequireSafeKeys=no easily? |
That would work. |
@hemberger what do you think? |
Is this a change you'd want to make even if we can solve #14 in another way? I would think we'd want to avoid encouraging people to use |
@hemberger In my world this should work out of the box - with no need for extra parameters. |
Workaround possible with #18 |
Looking at the source https://github.com/trusteddomainproject/OpenDKIM/blob/5c539587561785a66c1f67f720f2fb741f320785/opendkim/opendkim.c#L4695
it seems it will make sure all parents are secure which make sense.
Maybe fixes #14