10ea73
diff --git a/modules/md/mod_md_os.c b/modules/md/mod_md_os.c
10ea73
index f96d566..8df0248 100644
10ea73
--- a/modules/md/mod_md_os.c
10ea73
+++ b/modules/md/mod_md_os.c
10ea73
@@ -41,14 +41,20 @@
10ea73
 
10ea73
 apr_status_t md_try_chown(const char *fname, unsigned int uid, int gid, apr_pool_t *p)
10ea73
 {
10ea73
-#if AP_NEED_SET_MUTEX_PERMS
10ea73
-    if (-1 == chown(fname, (uid_t)uid, (gid_t)gid)) {
10ea73
-        apr_status_t rv = APR_FROM_OS_ERROR(errno);
10ea73
-        if (!APR_STATUS_IS_ENOENT(rv)) {
10ea73
-            ap_log_perror(APLOG_MARK, APLOG_ERR, rv, p, APLOGNO(10082)
10ea73
-                         "Can't change owner of %s", fname);
10ea73
+#if AP_NEED_SET_MUTEX_PERMS && HAVE_UNISTD_H
10ea73
+    /* Since we only switch user when running as root, we only need to chown directories
10ea73
+     * in that case. Otherwise, the server will ignore any "user/group" directives and
10ea73
+     * child processes have the same privileges as the parent.
10ea73
+     */
10ea73
+    if (!geteuid()) {
10ea73
+        if (-1 == chown(fname, (uid_t)uid, (gid_t)gid)) {
10ea73
+            apr_status_t rv = APR_FROM_OS_ERROR(errno);
10ea73
+            if (!APR_STATUS_IS_ENOENT(rv)) {
10ea73
+                ap_log_perror(APLOG_MARK, APLOG_ERR, rv, p, APLOGNO(10082)
10ea73
+                              "Can't change owner of %s", fname);
10ea73
+            }
10ea73
+            return rv;
10ea73
         }
10ea73
-        return rv;
10ea73
     }
10ea73
     return APR_SUCCESS;
10ea73
 #else 
10ea73
@@ -58,11 +64,7 @@ apr_status_t md_try_chown(const char *fname, unsigned int uid, int gid, apr_pool
10ea73
 
10ea73
 apr_status_t md_make_worker_accessible(const char *fname, apr_pool_t *p)
10ea73
 {
10ea73
-#if AP_NEED_SET_MUTEX_PERMS
10ea73
     return md_try_chown(fname, ap_unixd_config.user_id, -1, p);
10ea73
-#else 
10ea73
-    return APR_ENOTIMPL;
10ea73
-#endif
10ea73
 }
10ea73
 
10ea73
 #ifdef WIN32