[dovecot-cvs] dovecot dovecot-example.conf,1.194.2.39,1.194.2.40

tss at dovecot.org tss at dovecot.org
Tue Mar 6 17:43:36 EET 2007


Update of /var/lib/cvs/dovecot
In directory talvi:/tmp/cvs-serv8338

Modified Files:
      Tag: branch_1_0
	dovecot-example.conf 
Log Message:
Updated valid_chroot_dirs and mail_chroot comments.



Index: dovecot-example.conf
===================================================================
RCS file: /var/lib/cvs/dovecot/dovecot-example.conf,v
retrieving revision 1.194.2.39
retrieving revision 1.194.2.40
diff -u -d -r1.194.2.39 -r1.194.2.40
--- dovecot-example.conf	15 Feb 2007 17:00:53 -0000	1.194.2.39
+++ dovecot-example.conf	6 Mar 2007 15:43:34 -0000	1.194.2.40
@@ -330,10 +330,11 @@
 
 # ':' separated list of directories under which chrooting is allowed for mail
 # processes (ie. /var/mail will allow chrooting to /var/mail/foo/bar too).
-# This setting doesn't affect login_chroot or auth_chroot variables.
+# This setting doesn't affect login_chroot or auth chroot variables.
 # WARNING: Never add directories here which local users can modify, that
 # may lead to root exploit. Usually this should be done only if you don't
-# allow shell access for users. See doc/configuration.txt for more information.
+# allow shell access for users.
+# http://wiki.dovecot.org/Chrooting
 #valid_chroot_dirs = 
 
 # Default chroot directory for mail processes. This can be overridden for
@@ -341,6 +342,7 @@
 # (eg. /home/./user chroots into /home). Note that usually there is no real
 # need to do chrooting, Dovecot doesn't allow users to access files outside
 # their mail directory anyway.
+# http://wiki.dovecot.org/Chrooting
 #mail_chroot = 
 
 ##



More information about the dovecot-cvs mailing list