Postfix : root and system user authentication
jeremy ardley
jeremy at ardley.org
Thu Mar 16 01:58:38 UTC 2023
On 16/3/23 06:31, Aymeric Agon-Rambosson wrote:
>
> I have a solution to my problem.
>
> For reference, I am putting it here :
>
>
> A simple way to restrict login based on uids is to modify the file as
> such :
>
> #%PAM-1.0
>
> auth required pam_succeed_if.so uid > 500 quiet
> @include common-auth
> @include common-account
> @include common-session
>
>
It is possible for dovecot sasl component to use different authorisation
back-ends, such as LDAP, GSSAPI, MySQL etc. These do not necessarily
have the ability to reject uid < 500.
However, generally, these backends can be used by pam as well. In
default debian installations:
cat dovecot
#%PAM-1.0
#auth required pam_faillock.so preauth silent audit
#auth [default=die] pam_faillock.so authfail audit
@include common-auth
@include common-account
@include common-session
cat common-auth
#
# /etc/pam.d/common-auth - authentication settings common to all services
#
# This file is included from other service-specific PAM config files,
# and should contain a list of the authentication modules that define
# the central authentication scheme for use on the system
# (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the
# traditional Unix authentication mechanisms.
A good practice would be to use postfix --> dovecot/sasl --> pam -->
backend server and do the uid vetting in the dovecot pam configuration
--
Jeremy
More information about the dovecot
mailing list