IP Address: 80.252.133.24:443 You: 216.73.216.51
| |||||||||||||||||||
|
| ||||||||||||||||||
MySQL: ON MSSQL: OFF Oracle: OFF PostgreSQL: OFF Curl: OFF Sockets: ON Fetch: OFF Wget: ON Perl: ON | |||||||||||||||||||
Disabled Functions: pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority, | |||||||||||||||||||
[ System Info ]
[ Processes ]
[ SQL Manager ]
[ Eval ]
[ Encoder ]
[ Mailer ]
[ Back Connection ]
[ Backdoor Server ]
[ Kernel Exploit Search ]
[ MD5 Decrypter ]
[ Reverse IP ]
[ Kill Shell ]
[ FTP Brute-Force ] |
|||||||||||||||||||
| |||||||||||||||||||
/ usr/ src/ courier-0.66.1/ maildir/ - drwxrwxrwx |
Viewing file:
Select action/file-type: Namemaildiracl — manage access control lists Synopsis
DESCRIPTIONmaildiracl manages “access control lists” (or ACLs) of the Courier IMAP server maildir folders. Access control lists are used primarily to provide fine-grained control for accessing virtual shared folders via IMAP. NoteThe Courier IMAP server server implements two types of shared folders: filesystem permission-based shared folders, as well as virtual shared folders based on IMAP access control lists. Use the maildiracl command to set up access control lists for virtual shared folders. Use the maildirmake(1), command to implement shared folders based on filesystem permissions. See the Courier IMAP server documentation for additional information on setting up virtual shared folders. ACL overview
ACLs provide a fine-grained mechanism for controlling
access to shared folders.
ACLs may be used to specify, for example, that
Each folder maintains its own individual access control list, that specifies
who can do what to the folder.
An ACL is a list of “identifier” and “rights”
pairs.
Each “identifier” and “rights” pair means that an
entity called “identifier”
(using the
Negative rights
An ACL entry of “-identifier” and “rights”
is called a “negative right”, which
explicitly removes “rights” from “identifier”.
More than one “identifier” is usually used to determine the
actual rights someone has for the given folder.
The actual access rights are determined by taking all rights from all
applicable IdentifiersAccess rights on a given folder are computed by obtained the rights on the following identifiers, then subtracting the negative rights on the same identifiers:
Consider the following access control list: owner aceilrstwx anyone lr user=john w -user=mary r administrators aceilrstwx This access control list specifies that the folder's owner has complete control over the mailbox (as well as the administrators, which have complete access to every folder); everyone else can see it and open it, except for “mary” who can see that the mailbox exists, but can't open it; additionally, “john” can change the status and keywords of individual messages (but not mark them as deleted/undeleted or seen/unseen, which requires additional rights). OPTIONS
This command resets access control lists in
NoteThe Courier IMAP server normally performs this maintenance function automatically. It is not necessary to run this command under normal conditions.
This command
lists the access control lists set for
Puts maildiracl -set /home/user1/Maildir INBOX.Sent user=john lr maildiracl -set /home/user2/Maildir INBOX.Notes anyone -r maildiracl -set /home/user3/Maildir INBOX.Private -user=tom +r NoteObserve that the last command revokes the “r” right from “tom”, by adding it as a negative right.
This command removes
This command takes a list of one or more
maildiracl -compute /home/tom46/Maildir INBOX.Sent owner user=tom46 This command computes access rights “tom46” has on his own folder. maildiracl -compute /home/john34/Maildir INBOX.Public user=tom46 This command computes access rights “tom46” has on “john34”'s folder. IRREVOCABLE ACCESS RIGHTS
The owner of the mailbox must always have the “a” amd
“l” access rights.
The BUGS
All identifiers are specified using the
All non-Latin letters in folder names are specified using the
This implementation of access control lists is based on version 2 (or “ACL2”) of IMAP access control lists, which is a work-in-progress. The existing IMAP ACL, RFC 2086 is transparently implemented inside the ACL2 model. If history's of any guidance, ACL2 is subject to change at any time. Be sure to check the release notes when upgrading to a newer version of this software. The “ACL overview” portion of this manual page is a very brief summary of ACL2, which leaves out optional parts of ACL2 that are not implemented. |
Command: | |
Quick Commands: | |
Upload: | |
PHP Filesystem: |
<@ |
Search File: | |
Create File: | |
View File: | |
Mass Defacement: |