Bug 84844 - praliases command fails
praliases command fails
Product: Red Hat Linux
Classification: Retired
Component: sendmail (Show other bugs)
i386 Linux
medium Severity medium
: ---
: ---
Assigned To: Florian La Roche
David Lawrence
Depends On:
  Show dependency treegraph
Reported: 2003-02-21 18:30 EST by Chris Negus
Modified: 2007-04-18 12:51 EDT (History)
0 users

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2003-09-01 10:24:45 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

  None (edit)
Description Chris Negus 2003-02-21 18:30:13 EST
From Bugzilla Helper:
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.0.1) Gecko/20020830

Description of problem:
The /usr/sbin/praliases command should display mail aliases. Instead, when I ran
the command as root user, it said the following:

praliases: /etc/aliases: open: Permission denied.

Permissions on the /etc/aliases file is 644 and owned by root/root. It seems to
be trying to open /etc/aliases.db, which has 640 permissions and is owned by

After opening permissions:
    chmod 644 /etc/aliases.db

The praliases command displays aliases as expected.

Version-Release number of selected component (if applicable):

How reproducible:

Steps to Reproduce:
1. As root, type /usr/sbin/praliases

Actual Results:  Error messages says /etc/aliases: open: Permission denied.

Expected Results:  It should have displayed system aliases. Is there some reason
why this database should not be readable by root by default? Maybe you want
praliases to run as smmsp?

The message should at least identify the proper file that is failing to open.

Additional info:
Comment 1 Florian La Roche 2003-09-01 10:24:45 EDT
I want to leave sendmail with the more strict default permissions for

Thanks for your report,

Florian La Roche

Note You need to log in before you can comment on or make changes to this bug.