[Date Prev][Date Next] [Chronological] [Thread] [Top]

ldapdb and ldapi:/// (unix socket connection) file permissions

I've found the problem with this..
OpenLDAP creates the unix domain sockets with the permissions 600 which
has the lovely side effect of not being able to be used by cyrus-imapd
OR postfix (via cyrus-sasl) due to the fact that both run as a NON root
Is there an easy way to change the default permissions and groups
ownership that this socket gets created? So that I could create a
"shadow" group that cyrus and postix belong to.. (I am assuming there is
a good security reason as to why that file was created read/writable by
root only)

Edward Rudd <eddie@omegaware.com>