meta data for this page
  •  

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
linux:exim:issues [2019/08/22 08:27] – linux:issues renamed to linux:exim:issues niziaklinux:exim:issues [2021/04/30 10:30] (current) niziak
Line 1: Line 1:
 +====== Issues ======
 +
 +====== F=<>: Unrouteable address ======
 +
 +<code>
 +www-data@hostnaname.example.com F=<>: Unrouteable address
 +</code>
 +
 +Test routing path:
 +<code>
 +exim -bt www-data@example.com
 +
 +DEBUG: system_aliases for www@example.com
 +DEBUG: procmail for www-data@example.com
 +www-data@example.com is undeliverable: Unrouteable address
 +</code>
 +
 +So the reason of problem is suffix based aliases search pattern. Address ''www-data'' is translated to ''www'' which doesn't exists.
 +
 +**Workaround:**  add some workaround aliases like:
 +<code>
 +www@example.com: user
 +www: user:
 +</code>
 +
 +
 ====== unable to set gid=33 ====== ====== unable to set gid=33 ======
  
Line 11: Line 37:
 <file php mailtest.php> <file php mailtest.php>
 <?php <?php
-    $email = "w.nizinski@grinn-global.com";+    $email = "user@domain.com";
     $subject = "test z phpa";     $subject = "test z phpa";
     $message = "lorem ipsum";     $message = "lorem ipsum";
Line 18: Line 44:
     print ($mail);     print ($mail);
 ?> ?>
- 
 </file> </file>
 +
 +Reason:
 +
 +**Apache Module MPM ITK**
 +The MPM ITK Apache module implements restrictions on the use of the setuid() function and the setgid() function. As a result, scripts that depend on these functions may encounter problems. This includes scripts that use the mail() function, the shell_exec function, or the sudo command. 
 +
 +You can resolve these restrictions with one of the following methods:
 +
 +  * Do not use the MPM ITK Apache module. 
 +  * Update your script to no longer require escalated privileges.
 +  * Turn off the security and allow users to execute scripts as the root user. You can allow users with a UID or GID between 0 and 4294496296  to bypass security if you add the following code to your ''/etc/apache2/conf.d/includes/pre_virtualhost_global.conf'' file. 
 +    <file>
 +    <IfModule mpm_itk.c>
 +    LimitUIDRange 0 4294496296
 +    LimitGIDRange 0 4294496296
 +    </IfModule>
 +    </file>
 +    
 +    **Warning:**  We strongly recommend that you do not enable root privileges for your users. This action has major security implications and could endanger your server.
 +
 +To work around it, you would have to change your php or php-apps to 
 +send mails via SMTP to localhost instead of invoking /usr/lib/sendmail 
 +directly. I can't give any advice on how to do that, though. Or maybe 
 +there is some way to install some minimal MTA like ssmtp or nullmailer 
 +as /usr/lib/sendmail that forwards the mail to exim via SMPT. Not sure 
 +how easy it is to install those parallel to exim, though. Maybe it 
 +could work by diverting exim's /usr/lib/sendmail .
 +