[dovecot-cvs] dovecot dovecot-example.conf,1.194.2.39,1.194.2.40
tss at dovecot.org
tss at dovecot.org
Tue Mar 6 17:43:36 EET 2007
Update of /var/lib/cvs/dovecot
In directory talvi:/tmp/cvs-serv8338
Modified Files:
Tag: branch_1_0
dovecot-example.conf
Log Message:
Updated valid_chroot_dirs and mail_chroot comments.
Index: dovecot-example.conf
===================================================================
RCS file: /var/lib/cvs/dovecot/dovecot-example.conf,v
retrieving revision 1.194.2.39
retrieving revision 1.194.2.40
diff -u -d -r1.194.2.39 -r1.194.2.40
--- dovecot-example.conf 15 Feb 2007 17:00:53 -0000 1.194.2.39
+++ dovecot-example.conf 6 Mar 2007 15:43:34 -0000 1.194.2.40
@@ -330,10 +330,11 @@
# ':' separated list of directories under which chrooting is allowed for mail
# processes (ie. /var/mail will allow chrooting to /var/mail/foo/bar too).
-# This setting doesn't affect login_chroot or auth_chroot variables.
+# This setting doesn't affect login_chroot or auth chroot variables.
# WARNING: Never add directories here which local users can modify, that
# may lead to root exploit. Usually this should be done only if you don't
-# allow shell access for users. See doc/configuration.txt for more information.
+# allow shell access for users.
+# http://wiki.dovecot.org/Chrooting
#valid_chroot_dirs =
# Default chroot directory for mail processes. This can be overridden for
@@ -341,6 +342,7 @@
# (eg. /home/./user chroots into /home). Note that usually there is no real
# need to do chrooting, Dovecot doesn't allow users to access files outside
# their mail directory anyway.
+# http://wiki.dovecot.org/Chrooting
#mail_chroot =
##
More information about the dovecot-cvs
mailing list