Hello David,
thanks for the quick response. After comparing your configuration to mine, I resolved the issue by trading possible security implications. See below.
Am 03.10.2022 um 15:15 schrieb David Bürgin <
dbue...@gluet.ch>:
> Can you include the steps to reproduce this? I don’t see this behaviour on my installation (opendkim 2.11.0~beta2-5).
Will try to do so.
> Some of my configuration bits below:
>
> $ grep -i -e keyfile -e userid -e umask -e socket -e requiresafekeys /etc/opendkim.conf
> KeyFile /etc/dkimkeys/2020.private
> UserID opendkim
> UMask 007
> Socket local:/var/spool/postfix/opendkim/opendkim.sock
Mine is here.
UMask 002
Socket local:/var/run/opendkim/opendkim.sock
RequireSafeKeys no
UserID opendkim
> $ sudo ls -ld /etc/dkimkeys{,/2020.private}
> drwx------ 2 opendkim opendkim 4096 Aug 25 2021 /etc/dkimkeys
> -rw------- 1 opendkim opendkim 1679 Nov 20 2020 /etc/dkimkeys/2020.private
I do have multiple domains configured and thus use /etc/opendkim/domainname as base directory for keyfiles. Those belong to root:opendkim and are mode 2755.
-rw-r----- 1 root opendkim 887 Oct 26 2015 /etc/opendkim/
pocnet.net/m201510.private
-rw-r--r-- 1 root opendkim 323 Oct 26 2015 /etc/opendkim/
pocnet.net/m201510.txt
> $ sudo ls -ld /var/spool/postfix/opendkim{,/opendkim.sock}
> drwxr-x--- 2 opendkim opendkim 27 Sep 29 16:32 /var/spool/postfix/opendkim
> srwxrwx--- 1 opendkim opendkim 0 Sep 29 16:32 /var/spool/postfix/opendkim/opendkim.sock
-rw-r--r-- 1 root root 7 Oct 3 14:18 /var/run/opendkim/opendkim.pid
srwxrwxr-x 1 opendkim opendkim 0 Oct 3 14:18 /var/run/opendkim/opendkim.sock
> $ groups postfix | grep -o opendkim
> opendkim
# groups postfix | grep -o opendkim
opendkim
When I've configured opendkim for the first time, I tried to keep the key files belonging to root, so they couldn't be changed from opendkim itself — lessen attack surface.
After chown opendkim, and chmod 400 to the private key files, the warning message is — to be expected — gone, because there is no group access granted anymore. But there is a small — probably mostly theoretical — decrease in security, because key files now belong to the opendkim user, and a missing write bit can be overridden on owner match — having done this sometimes with vi and text files.
What's your opinion on that?
Thanks!
:wq! PoC