From 8234b8bb76c3ec98466435ab0c84301ae9788ca0 Mon Sep 17 00:00:00 2001 From: Eric Wong Date: Fri, 1 Oct 2021 09:54:37 +0000 Subject: doc: lei-security: some more updates Virtual users will probably be used for read-write IMAP/JMAP support. The potential for various kernel/hardware bugs and attacks also needs to be highlighted. --- Documentation/lei-security.pod | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) (limited to 'Documentation') diff --git a/Documentation/lei-security.pod b/Documentation/lei-security.pod index 02305b90..8cbd8993 100644 --- a/Documentation/lei-security.pod +++ b/Documentation/lei-security.pod @@ -18,6 +18,9 @@ permissions support. It does not use POSIX ACLs, extended attributes, nor any other security-related functions which require non-standard Perl modules. +There is preliminary support for "virtual users", but it is +incomplete and undocumented. + =head1 INTERNAL FILES lei runs with a umask of 077 to prevent other users on the @@ -93,7 +96,7 @@ lei uses L to prompt users for IMAP and NNTP usernames and passwords. These passwords are not encrypted in memory and get transferred across processes via anonymous UNIX sockets and pipes. They may be exposed via syscall tracing -tools (e.g. L). +tools (e.g. L), kernel and hardware bugs/attacks. While credentials are not written to the filesystem by default, it is possible for them to end up on disk if processes are -- cgit v1.2.3-24-ge0c7