File: INSTALL

package info (click to toggle)
courierpassd 1.1.2-1
  • links: PTS
  • area: main
  • in suites: etch, etch-m68k, lenny, squeeze
  • size: 1,356 kB
  • ctags: 109
  • sloc: sh: 7,884; ansic: 798; makefile: 16
file content (174 lines) | stat: -rw-r--r-- 6,025 bytes parent folder | download | duplicates (3)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
REQUIREMENTS:

The Courier authentication library.

A super-server such as tcpserver or xinetd.


INSTALLATION:

Before building courierpassd, build and install courier-authlib, the
Courier authentication library.

To build and install courierpassd, unpack the tarball and follow these
commands.

cd /path/to/courierpassd-<version>
./configure
make
su root
make install

That's it. If you installed the authentication library in a non-standard
place, the configure script will complain. Just follow the instructions to
tell it where to find courierauthconfig, a program that is installed as
part of the authentication library.

Courierpassd configure options are:

	--with-minuid[=UID]
		Sets the minimum uid for which courierpassd
		will change the password. Below this uid,
		attempts to change a password will always
		fail. If this option is not used, or a uid
		not indicated, the value defaults to 100.

	--with-badpassdelay[=sec]
		Sets the time in seconds that courierpassd
		will sleep after a failed attempt to change
		a password. This option is intended to make
		brute force attacks against passwords harder
		to perform. This value defaults to 3.

Use ./configure --help to see the full range of available configure
options.

Courierpassd is installed in /usr/local/sbin.
The courierpassd man page is installed in /usr/local/man.

Courierpassd has been successfully built on:
    Debian 4.0
    Mandrake Linux 10.1
    FreeBSD 5.4, 6.1

For courierpassd to be of any use, the Courier authentication library
must be installed and user accounts set up which can be accessed by the
installed authentication modules. See the library documentation for
details on how to do this.


TROUBLESHOOTING BUILD ISSUES:

If make fails on your FreeBSD system, try using gmake. Gmake is available
in the FreeBSD ports tree. I haven't needed to use gmake on FreeBSD
5.X or 6.X.

If make fails with an error like this:

        courierauth.h: No such file or directory

then your compiler doesn't know where you keep your courier-authlib header
files. Find where courierauth.h is (look in /usr/local/include first) and
then set the CPPFLAGS environment variable to point to that directory. So
if courierauth.h is in /usr/local/include, set CPPFLAGS like so:

        CPPFLAGS=-I/usr/local/include


SUPER-SERVER SETUP:

Because courierpassd relies on a super-server to handle network connections,
it is easy to set up courierpassd to listen on whatever port is desired.
Since courierpassd uses the poppassd protocol to talk to clients, however,
the use of port 106 is recommended unless there is a compelling reason to
do otherwise.

A typical xinetd entry for courierpassd would look like this:

    service courierpassd
    {
            port            = 106
            socket_type     = stream
            protocol        = tcp
            user            = courier
            server          = /usr/local/sbin/courierpassd
            server_args     = -s imap
            wait            = no
            only_from       = 192.168.1.0 127.0.0.1
            instances       = 4
            disable         = no
    }

Courierpassd can also be used with tcpserver from the ucspi-tcp package
written by Dan Bernstein. A simple example of a courierpassd run script
would look like this:

    #!/bin/sh

    AUTHUID=`/usr/bin/id -u courier`
    AUTHGID=`/usr/bin/id -g courier`

    tcpserver -R -x /etc/tcprules.d/tcp.poppassd.cdb \
    -u "$AUTHUID" -g "$AUTHGID" 0 106 courierpassd -s imap &

If you use the daemontools package to control tcpserver, you can take
advantage of multilog and courierpassd's --stderr switch to provide
a consistent logging interface. In this case, the run script would look 
something like this:

    #!/bin/sh

    AUTHUID=`/usr/bin/id -u courier`
    AUTHGID=`/usr/bin/id -g courier`

    exec tcpserver -v -R -x /etc/tcprules.d/tcp.poppassd.cdb \
    -u "$AUTHUID" -g "$AUTHGID" 0 106 courierpassd -s imap --stderr 2>&1

And the corresponding log run script would look like this:

    #!/bin/sh

    exec multilog t /var/log/courierpassd

See the documentation that comes with ucspi-tcp and daemontools for
more information on how to use these packages and why you might want
to.


SECURITY CONSIDERATIONS:

The user you choose to run courierpassd as is determined by the ownership
of the directory in which the authdaemon domain socket, named 'socket',
resides. The location of the socket directory is listed in the
authdaemonrc configuration file as the parameter authdaemonvar.
You should run courierpassd as the user and group of this directory to
allow it to communicate with the authentication library.

Because courierpassd interacts with clients at remote locations,
careful thought must be given to access control.

When configuring the super-server, restrict the machines from which 
connections will be accepted. Restrict access to particular machines or
at least to particular subnets. If your network is protected by a firewall,
make sure the firewall blocks incoming requests to the port courierpassd
listens on.

Use of the --with-minuid configure option is highly recommended. The default
value of 100 should be seen as providing a minimal level of security which can
be improved upon. It is safest to peruse /etc/passwd and set minuid to the
lowest user account uid found there. On Linux systems, user accounts often
begin at uid 501 so setting minuid to 501 would be a good choice in this
situation. Under no circumstances should minuid be set to 0. The root account
has no business changing its password from across the network.

Using courierpassd means there will be plain text user IDs and passwords
transiting the network. If there is a possibility that passwords can be
captured on the wire by packet sniffers, use tunneling software such
as stunnel to encrypt the connection between server and clients.


FURTHER READING:

Use the command 'courierpassd --help' for a brief explanation of available
options. See the courierpassd man page for additional information.