Re: default MTA

2013-07-29 Thread Kevin Chadwick
  It might help if we used a bit more precision in terimonolgy.  Not a full
  blown MTA as described here is a Mail Submission Agent (MSA).  See RFC
  5598 for details:

OpenSMTPD has quite recently been released for production and is rather
good and worth adding to the review list.

http://opensmtpd.org/

-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)
___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/405396.90524...@smtp120.mail.ir2.yahoo.com



Re: default MTA

2013-06-17 Thread Jean-Christophe Dubacq
Le 17/06/2013 06:12, Bob Proulx a écrit :
 David Weinehall wrote:
 Bjørn Mork wrote:
 The issue that worries me most about these desktop notification plans is
 the possibility that some package may decide to unnecessarily drop
 support for non-desktop systems, adding dependencies on the desktop
 notification system. I believe we already have had a few examples of
 such unnecessary dependencies on services which are nice to have, like
 GNOME depending on NetworkManager for example.

 I'm having a hard time understanding this particular gripe.  If you're
 running a non-desktop system (by this I take it to mean that you're not
 using a GUI), why would you worry about GNOME's dependencies anyhow?
 
 Here is an example: The emacs24-nox package, a typical headless server
 package for many of us, depends upon dbus.  Feature creep.
 

Putting emacs (which I use as my primary editor) and feature creep in
the same sentence is quite funny:

You are at a dead end of a dirt road.  The road goes to the east.
In the distance you can see that it will eventually fork off.  The
trees here are very tall royal palms, and they are spaced equidistant
from each other.
There is a shovel here.

Please remarke that there is libasound2 in there, too. I can see why
notifications (and not desktop notifications) are useful on a headless
server. Much less for sound.

Sincerly,
-- 
Jean-Christophe Dubacq



signature.asc
Description: OpenPGP digital signature


Re: default MTA

2013-06-16 Thread Daniel Pocock


On 15/06/13 13:04, David Weinehall wrote:
 On Thu, May 30, 2013 at 12:15:03PM +0200, Bjørn Mork wrote:
 The issue that worries me most about these desktop notification plans is
 the possibility that some package may decide to unnecessarily drop
 support for non-desktop systems, adding dependencies on the desktop
 notification system. I believe we already have had a few examples of
 such unnecessary dependencies on services which are nice to have, like
 GNOME depending on NetworkManager for example.
 
 I'm having a hard time understanding this particular gripe.  If you're
 running a non-desktop system (by this I take it to mean that you're not
 using a GUI), why would you worry about GNOME's dependencies anyhow?
 
 If you're using a desktop system it doesn't feel like a stretch to use
 functionality that fits in with the desktop system.  And vice versa,
 obviously.

This concern could be put another way: that if the mailer is not
present, developers will no longer assume it is present and will choose
other dependencies (maybe just syslog or maybe a GUI) as a way of
raising alerts

I prefer to look at it the other way though: how can we make mail
integration so effective that developers will want to use it for
everything and it works more seamlessly with or without a GUI?  I agree
that mail works, but in a default deployment, it does little to
prioritize or de-duplicate alerts from applications and the OS.


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/51bdbc98.5040...@pocock.com.au



Re: default MTA

2013-06-16 Thread Bob Proulx
David Weinehall wrote:
 Bjørn Mork wrote:
  The issue that worries me most about these desktop notification plans is
  the possibility that some package may decide to unnecessarily drop
  support for non-desktop systems, adding dependencies on the desktop
  notification system. I believe we already have had a few examples of
  such unnecessary dependencies on services which are nice to have, like
  GNOME depending on NetworkManager for example.
 
 I'm having a hard time understanding this particular gripe.  If you're
 running a non-desktop system (by this I take it to mean that you're not
 using a GUI), why would you worry about GNOME's dependencies anyhow?

Here is an example: The emacs24-nox package, a typical headless server
package for many of us, depends upon dbus.  Feature creep.

Bob


signature.asc
Description: Digital signature


Re: default MTA

2013-06-15 Thread Carlos Alberto Lopez Perez
On 31/05/13 08:41, Jean-Christophe Dubacq wrote:
 A utility to scan syslog and convey important information to the user
 would be much more useful than configuring all mailers in Debian to read
 root's local mail by default. I know how to redirect root's mail
 elsewhere, thank you for not making another mail account to check.

This utility already exists on Debian: is called logcheck.
Unfortunately (from your point of view) it requires that the user is
able to configure the mailer.

So maybe instead of trying to reinvent the wheel [1] we could fix the
current one, and make sure that the default configuration of the mailer
ensures that local mails are read by root or by the default system user.


[1] http://tr.im/44jc8



signature.asc
Description: OpenPGP digital signature


Re: default MTA

2013-06-15 Thread Marc Haber
On Fri, 14 Jun 2013 21:49:59 -0400, Chris Knadle
chris.kna...@coredump.us wrote:
On Friday, June 14, 2013 02:31:45, Marc Haber wrote:
 On Thu, 13 Jun 2013 16:42:15 -0400, Chris Knadle
 chris.kna...@coredump.us wrote:
 So right now I think that I probably just didn't know that this had been
 fixed, because I haven't been using the split file configuration for
 along time.  I clearly remember having _upgrade_ problems in 2003 with
 Exim on Debian Testing, but I might be confusing the root cause of those
 problems at that time; there are occasional required configuration
 changes, and that's another possible cause.

I should explain the above a bit further; when using the split file 
configuration and choosing N to certain config file updates, that leaves 
behind several .dpkg-dist config files.

And if you choose Y, .dpkg-old config files are left. That's basic
dpkg functionality, and it has always been the case that files that
don't match the [-a-z0-9] rule are ignored. .dpkg-foo files have a
period and get ignored. See run-parts(8)

Grüße
Marc
-- 
-- !! No courtesy copies, please !! -
Marc Haber |Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom  | http://www.zugschlus.de/
Nordisch by Nature | Lt. Worf, TNG Rightful Heir | Fon: *49 621 72739834


--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1unk3x-0001da...@swivel.zugschlus.de



Re: default MTA

2013-06-15 Thread Carlos Alberto Lopez Perez
On 30/05/13 12:15, Bjørn Mork wrote:
 Ben Hutchings b...@decadent.org.uk writes:
 On Wed, May 29, 2013 at 09:06:59PM +0200, Adam Borowski wrote:
 On Wed, May 29, 2013 at 05:11:35PM +0200, Josselin Mouette wrote:
 Le mercredi 29 mai 2013 à 16:31 +0200, Javier Fernandez-Sanguino a
 écrit : 
 Take for example, smartmoontools [1]. Currently, if an end-user
 installs smartmoontools and a hard-disk fails (i.e. smartd detects a
 problem with one HD) he will *not* see any notification: the failure
 is sent through local e-mail.

 He will see a notification on his desktop. Clear, understandable and
 translated in his configured language:
 https://git.gnome.org/browse/gnome-disk-utility/tree/src/notify/gdusdmonitor.c
 (The code is different but already here in squeeze and wheezy.)

 What you propose requires:
 * adding desktop environment specific code to every facility that may need
   to send notifications
 * adding such notifications to every other desktop environment

 Wrong, we already have org.freedesktop.Notifications in GNOME,
 KDE and Xfce.

  So those two points become:

 * adding cross-desktop code to every facility that may need to send
   notifications
 * adding a notification daemon to task-lxde

 There are libraries to help with the first point, of course.
 
 Wouldn't a daemon watching /var/mail/root and turning any mail into
 desktop notifications solve most of this, while still allowing the same
 notifications to reach a sysadmin on non-desktop systems?
 

I really think this is the way to go: By default install some
application on the debian-desktop tasksel that displays on the desktop
unread mails sent to root. Installing logcheck by default also would be
nice.

 The issue that worries me most about these desktop notification plans is
 the possibility that some package may decide to unnecessarily drop
 support for non-desktop systems, adding dependencies on the desktop
 notification system. I believe we already have had a few examples of
 such unnecessary dependencies on services which are nice to have, like
 GNOME depending on NetworkManager for example.
 

This issue is easily solved by ensuring that programs sending
notifications do it by mail to root@localhost and not to some fancy new
dbus thing.



signature.asc
Description: OpenPGP digital signature


Re: default MTA

2013-06-15 Thread David Weinehall
On Thu, May 30, 2013 at 12:15:03PM +0200, Bjørn Mork wrote:
 The issue that worries me most about these desktop notification plans is
 the possibility that some package may decide to unnecessarily drop
 support for non-desktop systems, adding dependencies on the desktop
 notification system. I believe we already have had a few examples of
 such unnecessary dependencies on services which are nice to have, like
 GNOME depending on NetworkManager for example.

I'm having a hard time understanding this particular gripe.  If you're
running a non-desktop system (by this I take it to mean that you're not
using a GUI), why would you worry about GNOME's dependencies anyhow?

If you're using a desktop system it doesn't feel like a stretch to use
functionality that fits in with the desktop system.  And vice versa,
obviously.


Regards: David
-- 
 /) David Weinehall t...@debian.org /) Rime on my window   (\
//  ~   //  Diamond-white roses of fire //
\)  http://www.acc.umu.se/~tao/(/   Beautiful hoar-frost   (/


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20130615110439.gc26...@hirohito.acc.umu.se



Re: default MTA

2013-06-14 Thread Marc Haber
On Thu, 13 Jun 2013 16:42:15 -0400, Chris Knadle
chris.kna...@coredump.us wrote:
So right now I think that I probably just didn't know that this had been 
fixed, because I haven't been using the split file configuration for along 
time.  I clearly remember having _upgrade_ problems in 2003 with Exim on 
Debian Testing, but I might be confusing the root cause of those problems at 
that time; there are occasional required configuration changes, and that's 
another possible cause.  

In 2003 the exim4 packages were in a kind of steady flux, everything
was new back than. The old exim 3 packages worked totally different. I
fully understand that exim4 2003 might have had serious and bad bugs,
but I think that most of them have been ironed out by now.

That doesn't mean that I am not going to break exim during the jessie
release cycle, but Andreas is there to fix it ;-)

Greetings
Marc
-- 
-- !! No courtesy copies, please !! -
Marc Haber |Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom  | http://www.zugschlus.de/
Nordisch by Nature | Lt. Worf, TNG Rightful Heir | Fon: *49 621 72739834


--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1unny1-0002ot...@swivel.zugschlus.de



Re: default MTA

2013-06-14 Thread Thomas Goirand
On 06/13/2013 04:03 AM, Jakub Wilk wrote:
 * Daniel Pocock dan...@pocock.com.au, 2013-06-12, 21:41:
 #4: Our priorities are our users and free software
 
 In any Debian discussion, given enough time, someone inevitably mentions
 SC§4. Once this occurs, the thread is over, and the person who mentioned
 it has automatically lost the argument.

I agree. SC§4 is the godwin of Debian.

Thomas


--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/51bb2d50.7010...@debian.org



Re: default MTA

2013-06-14 Thread Chris Knadle
On Friday, June 14, 2013 02:31:45, Marc Haber wrote:
 On Thu, 13 Jun 2013 16:42:15 -0400, Chris Knadle
 
 chris.kna...@coredump.us wrote:
 So right now I think that I probably just didn't know that this had been
 fixed, because I haven't been using the split file configuration for
 along time.  I clearly remember having _upgrade_ problems in 2003 with
 Exim on Debian Testing, but I might be confusing the root cause of those
 problems at that time; there are occasional required configuration
 changes, and that's another possible cause.

I should explain the above a bit further; when using the split file 
configuration and choosing N to certain config file updates, that leaves 
behind several .dpkg-dist config files.  If the upgrade goes badly because of 
required configuration changes, the first thing that catches one's eye are the 
.dpkg-dist files, making it _seem_ as though they could have been the root 
cause, even if they're not.  ;-)

 In 2003 the exim4 packages were in a kind of steady flux, everything
 was new back than. The old exim 3 packages worked totally different. I
 fully understand that exim4 2003 might have had serious and bad bugs,
 but I think that most of them have been ironed out by now.

Yes I ran Exim3 for a while also, so I know what you mean.  With Exim4 I think 
it was the in flux part that got me at the time concerning upgrades, which 
was exaserbated by my running Testing on the server.

 That doesn't mean that I am not going to break exim during the jessie
 release cycle, but Andreas is there to fix it ;-)

If that happens, it's fixable.  ;-)

  -- Chris

--
Chris Knadle
chris.kna...@coredump.us
GPG Key: 4096R/0x1E759A726A9FDD74


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/201306142149.59458.chris.kna...@coredump.us



Re: default MTA

2013-06-13 Thread Ian Campbell
On Wed, 2013-06-12 at 23:50 -0400, Chris Knadle wrote:
 One snag I ran into concerning the abstraction layer concerned customizing 
 the 
 split file configuration via conf.d/ files.  Upon upgrades dpkg recongizes 
 the changes in configuration files and prompts the user; choosing not to 
 replace the file with the maintain'er sversion drops a new .dpkg-dist file 
 next to the modified one, which is expected.  However what's _not_ expected 
 is 
 to use both the customized configuration file as well as the .dpkg-dist one.  
 :-/  Unfortunately in my experience, that's what happens.  And in this 
 condition Exim may fail to start, or might start and then reject mail with a 
 temporary failure.  I therefore consider the split configuration to be 
 dangerous.
 
 I had another look at this: it appears that in /usr/sbin/update-exim4.conf, 
 the cat_parts() function doesn't avoid files containing .dpkg-, but this 
 funtionality might be able to be added to the run_parts() function that 
 cat_parts() uses.

This sounds quite obviously like a bug to me, did you report it?

I've just tried this on Wheezy and stuff written in
in /etc/exim4/conf.d/acl/00-test.dpkg-dist didn't get included:
$ sudo update-exim4.conf  --verbose
using split configuration scheme from /etc/exim4/conf.d
internal run-parts: ignoring file: 
/etc/exim4/conf.d/acl/00-test.dpkg-dist

So it seems it has already been fixed.

Ian.



-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/1371107831.25232.17.ca...@dagon.hellion.org.uk



Re: default MTA

2013-06-13 Thread Andrei POPESCU
On Sb, 08 iun 13, 14:11:33, Andrei POPESCU wrote:
 
 If there are no objections within a few days I would like to make some 
 major changes to that page as follows:
 
 * the only options left under debate are:
   - exim (status quo)
   - postfix
   - dma
   - no MTA at all
   - (did I miss or forget something?)
 * popularity is irrelevant (the default MTA will always be much more 
   popular) the entire section will be removed
 * advanced use cases are irrelevant, since the admin of such a 
   system will install what she needs anyway, regardless of the default

Instead of doing that I followed Stefano's suggestion to have each 
position in its own subpage and simply added links to these sub-pages 
(not created yet):

http://wiki.debian.org/Debate/DefaultMTA/Exim
http://wiki.debian.org/Debate/DefaultMTA/Postfix
http://wiki.debian.org/Debate/DefaultMTA/DMA
http://wiki.debian.org/Debate/DefaultMTA/NoMTA

I might be working on either DMA or NoMTA (or both) myself, but people 
supporting the Exim and Postfix options should probably write these.

The old content is still there, but it should probably be moved to the 
corresponding sub-page (if still relevant) or just deleted. Most of it 
seams to deal with installs that are meant to handle real mail and it 
is my impression that this use case is not relevant for this debate; 
admins can simply apt-get their preferred MTA.

Kind regards,
Andrei
-- 
http://wiki.debian.org/FAQsFromDebianUser
Offtopic discussions among Debian users and developers:
http://lists.alioth.debian.org/mailman/listinfo/d-community-offtopic


signature.asc
Description: Digital signature


Re: default MTA

2013-06-13 Thread Marc Haber
On Thu, 13 Jun 2013 08:17:11 +0100, Ian Campbell i...@hellion.org.uk
wrote:
I've just tried this on Wheezy and stuff written in
in /etc/exim4/conf.d/acl/00-test.dpkg-dist didn't get included:
$ sudo update-exim4.conf  --verbose
using split configuration scheme from /etc/exim4/conf.d
internal run-parts: ignoring file: 
 /etc/exim4/conf.d/acl/00-test.dpkg-dist

So it seems it has already been fixed.

Before 2003, yes.

I checked out an early version of update-exim4.conf and found this
code:

|for F in $(ls $1); do
|if expr $F : '[[:alnum:]_-]\+$'  /dev/null 21; then
|if [ -f $1/$F ]  [ ! -f $1/${F}.disabled ] ; then
|echo $1/$F
|fi
|fi
|done;

Greetings
Marc
-- 
-- !! No courtesy copies, please !! -
Marc Haber |Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom  | http://www.zugschlus.de/
Nordisch by Nature | Lt. Worf, TNG Rightful Heir | Fon: *49 621 72739834


--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1un4xw-0006dn...@swivel.zugschlus.de



Re: default MTA

2013-06-13 Thread Jonathan Dowland
On Wed, Jun 12, 2013 at 09:41:27PM +0200, Daniel Pocock wrote:
 DFSG #4: Our priorities are our users and free software
 
 A court prosecuting/persecuting one of our users is not in scope

I'm now struggling to understand which side of the argument you are arguing.


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20130613105956.GB3956@debian



Re: default MTA

2013-06-13 Thread Chris Knadle
On Thursday, June 13, 2013 06:41:16, Marc Haber wrote:
 On Thu, 13 Jun 2013 08:17:11 +0100, Ian Campbell i...@hellion.org.uk
 
 wrote:
 I've just tried this on Wheezy and stuff written in
 
 in /etc/exim4/conf.d/acl/00-test.dpkg-dist didn't get included:
 $ sudo update-exim4.conf  --verbose
 using split configuration scheme from /etc/exim4/conf.d
 internal run-parts: ignoring file:
 /etc/exim4/conf.d/acl/00-test.dpkg-dist
 
 So it seems it has already been fixed.

Yes, I just did some testing myself and also find that it had been fixed.

I don't recall reporting a bug at the time -- when I last used the split 
configuration I think it was back before I was reporting bugs.  I think my 
first bug report was in early 2005.

 Before 2003, yes.

I remember still running into trouble with this in mid-2003 on Debian Testing.

However the exact timeframe of the fix doesn't matter much -- what matters is 
that it's fixed.  ;-)

  -- Chris

--
Chris Knadle
chris.kna...@coredump.us
GPG Key: 4096R/0x1E759A726A9FDD74


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/201306130725.35335.chris.kna...@coredump.us



Re: default MTA

2013-06-13 Thread Daniel Pocock
On 13/06/13 12:59, Jonathan Dowland wrote:
 On Wed, Jun 12, 2013 at 09:41:27PM +0200, Daniel Pocock wrote:
 DFSG #4: Our priorities are our users and free software

 A court prosecuting/persecuting one of our users is not in scope
 I'm now struggling to understand which side of the argument you are arguing.



Just that the user can make their own choice about whether they want to
enable or disable privacy features and we shouldn't worry about the
side-effects of those user decisions

It is my preference to make such features more easily accessible or
available by default, just like hashed passwords and other things that
are generally considered healthy



-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/51b9b483.3040...@pocock.com.au



Re: default MTA

2013-06-13 Thread Marc Haber
On Thu, 13 Jun 2013 07:25:34 -0400, Chris Knadle
chris.kna...@coredump.us wrote:
On Thursday, June 13, 2013 06:41:16, Marc Haber wrote:
 On Thu, 13 Jun 2013 08:17:11 +0100, Ian Campbell i...@hellion.org.uk
 
 wrote:
 I've just tried this on Wheezy and stuff written in
 
 in /etc/exim4/conf.d/acl/00-test.dpkg-dist didn't get included:
 $ sudo update-exim4.conf  --verbose
 using split configuration scheme from /etc/exim4/conf.d
 internal run-parts: ignoring file:
 /etc/exim4/conf.d/acl/00-test.dpkg-dist
 
 So it seems it has already been fixed.

Yes, I just did some testing myself and also find that it had been fixed.

I don't recall reporting a bug at the time -- when I last used the split 
configuration I think it was back before I was reporting bugs.  I think my 
first bug report was in early 2005.

 Before 2003, yes.

I remember still running into trouble with this in mid-2003 on Debian Testing.

If there was a bug in 2005, there still is. The code cited above is in
place since 2003.

Greetings
Marc
-- 
-- !! No courtesy copies, please !! -
Marc Haber |Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom  | http://www.zugschlus.de/
Nordisch by Nature | Lt. Worf, TNG Rightful Heir | Fon: *49 621 72739834


--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1un6re-00075h...@swivel.zugschlus.de



Re: default MTA

2013-06-13 Thread Chris Knadle
On Thursday, June 13, 2013 08:16:02, Marc Haber wrote:
 On Thu, 13 Jun 2013 07:25:34 -0400, Chris Knadle
 
 chris.kna...@coredump.us wrote:
 On Thursday, June 13, 2013 06:41:16, Marc Haber wrote:
  On Thu, 13 Jun 2013 08:17:11 +0100, Ian Campbell i...@hellion.org.uk
  
  wrote:
  I've just tried this on Wheezy and stuff written in
  
  in /etc/exim4/conf.d/acl/00-test.dpkg-dist didn't get included:
  $ sudo update-exim4.conf  --verbose
  using split configuration scheme from /etc/exim4/conf.d
  internal run-parts: ignoring file:
  /etc/exim4/conf.d/acl/00-test.dpkg-dist
  
  So it seems it has already been fixed.
 
 Yes, I just did some testing myself and also find that it had been fixed.
 
 I don't recall reporting a bug at the time -- when I last used the split
 configuration I think it was back before I was reporting bugs.  I think my
 first bug report was in early 2005.
 
  Before 2003, yes.
 
 I remember still running into trouble with this in mid-2003 on Debian
 Testing.
 
 If there was a bug in 2005, there still is. The code cited above is in
 place since 2003.

The testing I did this morning was copying a default Wheezy VM and 
reconfiguring Exim to use a split file config, and verifying that the 
contents of an added /etc/exim4/conf.d/main/04_exim-config_testing.dpkg-dist 
file doesn't get included in the generated configuration in 
/var/lib/exim4/config.autogenerated.

So right now I think that I probably just didn't know that this had been 
fixed, because I haven't been using the split file configuration for along 
time.  I clearly remember having _upgrade_ problems in 2003 with Exim on 
Debian Testing, but I might be confusing the root cause of those problems at 
that time; there are occasional required configuration changes, and that's 
another possible cause.  

  -- Chris

--
Chris Knadle
chris.kna...@coredump.us
GPG Key: 4096R/0x1E759A726A9FDD74


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/201306131642.15126.chris.kna...@coredump.us



Re: default MTA

2013-06-12 Thread Wouter Verhelst
On 11-06-13 18:37, Jonathan Dowland wrote:
 On Fri, Jun 07, 2013 at 12:45:07PM +0200, Marc Haber wrote:
 Sendmail has just one more layer of indirection by virtue of the m4
 macros. Postfix has most of its behavior hard coded in the C sources,
 while exim's behavior can be controlled by run-time configuration if
 an advanced user wants to do things that Debian's abstraction layer
 was not designed to handle.
 
 There are a class of users between beginner and exim expert for which the
 current state of affairs is not optimal. I don't know how big that class
 is but I've been in it for ten years.

To this exim expert, configuring exim is done as follows:

zcat /usr/share/doc/exim4/examples/example.conf.gz  /etc/exim4/exim4.conf

$EDITOR /etc/exim4/exim4.conf

the comments in that file are pretty self-explanatory, and the example
configuration is a good default in that it is a functional one for local
mail (possibly received through SMTP) while not being an open relay.

(this is not meant as criticism for the exim4-config stuff. I understand
and agree there's a need for this kind of thing for people who don't
need a lot of complex stuff; it just doesn't work for me, that's all)

-- 
This end should point toward the ground if you want to go to space.

If it starts pointing toward space you are having a bad problem and you
will not go to space today.

  -- http://xkcd.com/1133/


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/51b80e71.6050...@debian.org



Re: default MTA

2013-06-12 Thread Daniel Pocock


On 12/06/13 00:02, Jeremy Stanley wrote:
 On 2013-06-11 23:50:01 +0200 (+0200), Daniel Pocock wrote:
 Something that doesn't have these limitations:

 http://tools.ietf.org/html/rfc2487#section-7
 [...]
 
 That basically just makes the case for relying on (E)SMTP only for
 transporting messages, but leveraging OpenPGP or S/MIME to provide
 authentication and confidentiality where required (or for anonymity,
 Mixmaster et al).


OpenPGP and S/MIME don't guarantee anonymity as they don't (and can't
really) encrypt the headers/envelope

That is the type of `metadata' that allows a hostile party to start
building a social graph of who knows who.  Even if they can't see the
contents of the communications, those social graphs are undesirable and
an ideal solution would prevent that.


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/51b81051.8060...@pocock.com.au



Re: default MTA

2013-06-12 Thread Neil McGovern
On Wed, Jun 12, 2013 at 08:08:17AM +0200, Daniel Pocock wrote:
 On 12/06/13 00:02, Jeremy Stanley wrote:
  On 2013-06-11 23:50:01 +0200 (+0200), Daniel Pocock wrote:
  Something that doesn't have these limitations:
 
  http://tools.ietf.org/html/rfc2487#section-7
  [...]
  
  That basically just makes the case for relying on (E)SMTP only for
  transporting messages, but leveraging OpenPGP or S/MIME to provide
  authentication and confidentiality where required (or for anonymity,
  Mixmaster et al).
 
 
 OpenPGP and S/MIME don't guarantee anonymity as they don't (and can't
 really) encrypt the headers/envelope
 
 That is the type of `metadata' that allows a hostile party to start
 building a social graph of who knows who.  Even if they can't see the
 contents of the communications, those social graphs are undesirable and
 an ideal solution would prevent that.
 

Can I just check - have we really gone from a (far too long, IMO)
discussion on what default MTA we provide, to replacing SMTP?

Just so I know if it's worth killfiling the entire thread.

Neil
-- 


signature.asc
Description: Digital signature


Re: default MTA

2013-06-12 Thread Jonathan Dowland
On Wed, Jun 12, 2013 at 08:00:17AM +0200, Wouter Verhelst wrote:
 To this exim expert, configuring exim is done as follows:
 
 zcat /usr/share/doc/exim4/examples/example.conf.gz  /etc/exim4/exim4.conf

Absolutely. At some point in the last few years I was recommended this course
of action by a friend in the Debian community and it has greatly improved my
experiences. I got the impression that this is quite commonly done.


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20130612123828.GA24063@debian



Re: default MTA

2013-06-12 Thread Jonathan Dowland
On Tue, Jun 11, 2013 at 11:05:24PM +0200, Bernhard R. Link wrote:
 The only class of users I can imagine the current situation not optional
 is someone being used to postfix[1].

Well, that's not me…

 When I remember learning exim I found it quite nice that the config is quite
 self-explaining what it is actually doing.

The exim config — once I started to actually use it — is indeed, very
comfortable to understand and manipulate, in my experience to. The point
I'm making is the current arrangement gets in the way of doing that.


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20130612123928.GB24063@debian



Re: default MTA

2013-06-12 Thread Jonathan Dowland
On Wed, Jun 12, 2013 at 08:08:17AM +0200, Daniel Pocock wrote:
 OpenPGP and S/MIME don't guarantee anonymity as they don't (and can't
 really) encrypt the headers/envelope

Erm, they also identify the recipients, as it's the recipients key to which
the messages are encrypted. (and typically the sender is listed as a recipient
for convenience).

 That is the type of `metadata' that allows a hostile party to start
 building a social graph of who knows who.  Even if they can't see the
 contents of the communications, those social graphs are undesirable and
 an ideal solution would prevent that.

Indeed, there are court cases where this has been key.


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20130612124123.GC24063@debian



Re: default MTA

2013-06-12 Thread Adam Borowski
On Tue, Jun 11, 2013 at 11:50:01PM +0200, Daniel Pocock wrote:
 Something that doesn't have these limitations:
 
 http://tools.ietf.org/html/rfc2487#section-7
 
 This is also relevant (not just for Postfix):
 
 http://www.postfix.org/TLS_README.html#client_tls_encrypt
 
 Despite the potential for eliminating passive eavesdropping attacks,
 mandatory TLS encryption is not viable as a default security level for
 mail delivery to the public Internet. Most MX hosts do not support TLS
 at all, and some of those that do have broken implementations. On a host
 that delivers mail to the Internet, you should not configure mandatory
 TLS encryption as the default security level. 

So you want DANE.  That's the only reasonable way for mandatory TLS
encryption; too bad, server support is pretty bad currently.  Other
TLS schemes provide at most opportunist encryption: all it takes for
an attacker is to redirect a connection elsewhere.  With DANE, you
can securely tell whether your recipient supports encryption or not,
and obtain the TLS certificate.

Of course, this is for values of securely that trust ICANN, but at
least this is strictly better than the CA cartel.  And if we shipped
(tz style) keys of individual TLDs, even ICANN could be avoided.

-- 
ᛊᚨᚾᛁᛏᚣ᛫ᛁᛊ᛫ᚠᛟᚱ᛫ᚦᛖ᛫ᚹᛖᚨᚲ


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20130612134354.ga29...@angband.pl



Re: default MTA

2013-06-12 Thread Marc Haber
On Wed, 12 Jun 2013 13:39:28 +0100, Jonathan Dowland j...@debian.org
wrote:
On Tue, Jun 11, 2013 at 11:05:24PM +0200, Bernhard R. Link wrote:
 When I remember learning exim I found it quite nice that the config is quite
 self-explaining what it is actually doing.

The exim config — once I started to actually use it — is indeed, very
comfortable to understand and manipulate, in my experience to. The point
I'm making is the current arrangement gets in the way of doing that.

It is not. The contrary is true.

Btw, we go to lengths to make our configuration resemble upstream's
default configuration as closely as possible.

Greetings
Marc
-- 
-- !! No courtesy copies, please !! -
Marc Haber |Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom  | http://www.zugschlus.de/
Nordisch by Nature | Lt. Worf, TNG Rightful Heir | Fon: *49 621 72739834


--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1ummv6-0007ls...@swivel.zugschlus.de



Re: default MTA

2013-06-12 Thread Marc Haber
On Wed, 12 Jun 2013 13:38:28 +0100, Jonathan Dowland j...@debian.org
wrote:
On Wed, Jun 12, 2013 at 08:00:17AM +0200, Wouter Verhelst wrote:
 To this exim expert, configuring exim is done as follows:
 
 zcat /usr/share/doc/exim4/examples/example.conf.gz  /etc/exim4/exim4.conf

Absolutely. At some point in the last few years I was recommended this course
of action by a friend in the Debian community and it has greatly improved my
experiences. I got the impression that this is quite commonly done.

It is common with people who prefer to configure exim in the
traditional way. This is perfectly OK if you know what you're doing.

I violently object to people recommending this to novices.

Greetings
Marc
-- 
-- !! No courtesy copies, please !! -
Marc Haber |Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom  | http://www.zugschlus.de/
Nordisch by Nature | Lt. Worf, TNG Rightful Heir | Fon: *49 621 72739834


--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1ummwb-00089j...@swivel.zugschlus.de



Re: default MTA

2013-06-12 Thread Daniel Pocock
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256



On 12/06/13 12:29, Neil McGovern wrote:
 On Wed, Jun 12, 2013 at 08:08:17AM +0200, Daniel Pocock wrote:
 On 12/06/13 00:02, Jeremy Stanley wrote:
 On 2013-06-11 23:50:01 +0200 (+0200), Daniel Pocock wrote:
 Something that doesn't have these limitations:
 
 http://tools.ietf.org/html/rfc2487#section-7
 [...]
 
 That basically just makes the case for relying on (E)SMTP only
 for transporting messages, but leveraging OpenPGP or S/MIME to
 provide authentication and confidentiality where required (or
 for anonymity, Mixmaster et al).
 
 
 OpenPGP and S/MIME don't guarantee anonymity as they don't (and
 can't really) encrypt the headers/envelope
 
 That is the type of `metadata' that allows a hostile party to
 start building a social graph of who knows who.  Even if they
 can't see the contents of the communications, those social graphs
 are undesirable and an ideal solution would prevent that.
 
 
 Can I just check - have we really gone from a (far too long, IMO) 
 discussion on what default MTA we provide, to replacing SMTP?
 


Not quite, but SMTP encryption (and alternatives) are a relevant
factor for many mail server users

Whether it is relevant enough to the choice of default MTA is another
question, but for me it is relevant, because if encryption/privacy is
not there by default, then it is harder to get critical mass for (name
your solution)

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
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=N1IS
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/51b8af69.5050...@pocock.com.au



[OT] SMTP bad (was: default MTA)

2013-06-12 Thread Jeremy Stanley
On 2013-06-12 08:08:17 +0200 (+0200), Daniel Pocock wrote:
 On 12/06/13 00:02, Jeremy Stanley wrote:
  That basically just makes the case for relying on (E)SMTP only for
  transporting messages, but leveraging OpenPGP or S/MIME to provide
  authentication and confidentiality where required (or for anonymity,
  Mixmaster et al).
 
 OpenPGP and S/MIME don't guarantee anonymity as they don't (and can't
 really) encrypt the headers/envelope
[...]

Apologies if that message made it past the sarcasm filter, but I was
being flippant. As for anonymity, that's why I mentioned a type II
remailer... you can use Mixmaster without nyms as long as you don't
care about the recipient being able to respond to you. And if you
do, well that's pseudonymity not anonymity. (Though I really think
you meant confidentiality when you wrote anonymity there?)

The situation with SMTP is not so dire as you paint it, you simply
need to implement your own cryptography on top of it and be aware of
the characteristics it provides (for example put your real subject
in the message body if using OpenPGP, onion-routing/remailers if you
don't want an eavesdropper to know who you're talking to, et
cetera). Hop-by-hop opportunistic encryption on the honor system
does little more than give a false sense of security, but mailadmins
hopefully already know this long before they contemplate twisting
the shiny STARTTLS knob for remote deliveries?

In short, encrypted SMTP is there to protect your login credentials
when connecting directly to a known smarthost, and if you're doing
it right you're using proper certificate validation (at least TOFU
anyway). Any use beyond that is either misguided fantasy or a sales
pitch for the PKI (CA/TTP) cartels. As long as you accept the nature
of SMTP and use it in the ways it's intended, it's a perfectly fine
protocol which has withstood several decades of pounding while its
detractors have never managed to successfully replace it with
something better.
-- 
{ PGP( 48F9961143495829 ); FINGER( fu...@cthulhu.yuggoth.org );
WWW( http://fungi.yuggoth.org/ ); IRC( fu...@irc.yuggoth.org#ccl );
WHOIS( STANL3-ARIN ); MUD( kin...@katarsis.mudpy.org:6669 ); }


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20130612193519.gd1...@yuggoth.org



Re: default MTA

2013-06-12 Thread Daniel Pocock


On 12/06/13 14:41, Jonathan Dowland wrote:
 On Wed, Jun 12, 2013 at 08:08:17AM +0200, Daniel Pocock wrote:
 OpenPGP and S/MIME don't guarantee anonymity as they don't (and can't
 really) encrypt the headers/envelope
 
 Erm, they also identify the recipients, as it's the recipients key to which
 the messages are encrypted. (and typically the sender is listed as a recipient
 for convenience).
 
 That is the type of `metadata' that allows a hostile party to start
 building a social graph of who knows who.  Even if they can't see the
 contents of the communications, those social graphs are undesirable and
 an ideal solution would prevent that.
 
 Indeed, there are court cases where this has been key.
 

DFSG #4: Our priorities are our users and free software

A court prosecuting/persecuting one of our users is not in scope


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/51b8cee7.7090...@pocock.com.au



Re: default MTA

2013-06-12 Thread Wouter Verhelst
On 12-06-13 16:59, Marc Haber wrote:
 On Wed, 12 Jun 2013 13:38:28 +0100, Jonathan Dowland j...@debian.org
 wrote:
 On Wed, Jun 12, 2013 at 08:00:17AM +0200, Wouter Verhelst wrote:
 To this exim expert, configuring exim is done as follows:

 zcat /usr/share/doc/exim4/examples/example.conf.gz  /etc/exim4/exim4.conf
[...]
 I violently object to people recommending this to novices.

Yes, me too. It only works for me because I know exim pretty well, and
then the single-file approach is more transparent than any approach
involving generated files.

However, it's a large file containing many details which are
uninteresting to users who want a simple system. In that case, an
abstraction layer is a good thing.

That being said, personally I *do* recommend that people with less
common needs read the excellent exim documentation and start off the
example.conf file; if your needs are uncommon, making the investment to
learn how exim works pays off a lot more than trying to twist an
abstraction layer into doing things it wasn't meant to do. And once you
do know how it works, any abstraction layer (IMO) just gets in the way.

-- 
This end should point toward the ground if you want to go to space.

If it starts pointing toward space you are having a bad problem and you
will not go to space today.

  -- http://xkcd.com/1133/


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/51b8d436.9070...@debian.org



Re: default MTA

2013-06-12 Thread Jakub Wilk

* Daniel Pocock dan...@pocock.com.au, 2013-06-12, 21:41:

#4: Our priorities are our users and free software


In any Debian discussion, given enough time, someone inevitably mentions 
SC§4. Once this occurs, the thread is over, and the person who mentioned 
it has automatically lost the argument.


--
Jakub Wilk


--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20130612200325.ga3...@jwilk.net



Re: default MTA

2013-06-12 Thread Marc Haber
On Wed, 12 Jun 2013 22:04:06 +0200, Wouter Verhelst
wou...@debian.org wrote:
Yes, me too. It only works for me because I know exim pretty well, and
then the single-file approach is more transparent than any approach
involving generated files.

Exim's abstraction layer uses a single file as well (by default),
which accidentally looks a lot like Upstream's example conf. It just
has many more macros.

Greetings
Marc
-- 
-- !! No courtesy copies, please !! -
Marc Haber |Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom  | http://www.zugschlus.de/
Nordisch by Nature | Lt. Worf, TNG Rightful Heir | Fon: *49 621 72739834


--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1umrzy-0004yp...@swivel.zugschlus.de



Re: default MTA

2013-06-12 Thread Chris Knadle
On Wednesday, June 12, 2013 16:04:06, Wouter Verhelst wrote:
 On 12-06-13 16:59, Marc Haber wrote:
  On Wed, 12 Jun 2013 13:38:28 +0100, Jonathan Dowland j...@debian.org
  
  wrote:
  On Wed, Jun 12, 2013 at 08:00:17AM +0200, Wouter Verhelst wrote:
  To this exim expert, configuring exim is done as follows:
  
  zcat /usr/share/doc/exim4/examples/example.conf.gz 
  /etc/exim4/exim4.conf
 
 [...]
 
  I violently object to people recommending this to novices.
 
 Yes, me too. It only works for me because I know exim pretty well, and
 then the single-file approach is more transparent than any approach
 involving generated files.
 
 However, it's a large file containing many details which are
 uninteresting to users who want a simple system. In that case, an
 abstraction layer is a good thing.

Yes.

 That being said, personally I *do* recommend that people with less
 common needs read the excellent exim documentation and start off the
 example.conf file; if your needs are uncommon, making the investment to
 learn how exim works pays off a lot more than trying to twist an
 abstraction layer into doing things it wasn't meant to do. And once you
 do know how it works, any abstraction layer (IMO) just gets in the way.

I think that's true.

One snag I ran into concerning the abstraction layer concerned customizing the 
split file configuration via conf.d/ files.  Upon upgrades dpkg recongizes 
the changes in configuration files and prompts the user; choosing not to 
replace the file with the maintain'er sversion drops a new .dpkg-dist file 
next to the modified one, which is expected.  However what's _not_ expected is 
to use both the customized configuration file as well as the .dpkg-dist one.  
:-/  Unfortunately in my experience, that's what happens.  And in this 
condition Exim may fail to start, or might start and then reject mail with a 
temporary failure.  I therefore consider the split configuration to be 
dangerous.

I had another look at this: it appears that in /usr/sbin/update-exim4.conf, 
the cat_parts() function doesn't avoid files containing .dpkg-, but this 
funtionality might be able to be added to the run_parts() function that 
cat_parts() uses.

On servers I'm still using the abstraction via the single config method, but 
I've repeatedly been tempted to use a straight exim4.conf file.  [I probably 
should.]

  -- Chris

--
Chris Knadle
chris.kna...@coredump.us
GPG Key: 4096R/0x1E759A726A9FDD74


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/201306122350.29844.chris.kna...@coredump.us



Re: default MTA

2013-06-11 Thread Jonathan Dowland
On Fri, Jun 07, 2013 at 12:45:07PM +0200, Marc Haber wrote:
 Sendmail has just one more layer of indirection by virtue of the m4
 macros. Postfix has most of its behavior hard coded in the C sources,
 while exim's behavior can be controlled by run-time configuration if
 an advanced user wants to do things that Debian's abstraction layer
 was not designed to handle.

There are a class of users between beginner and exim expert for which the
current state of affairs is not optimal. I don't know how big that class
is but I've been in it for ten years.


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20130611163701.GB10760@debian



Re: default MTA

2013-06-11 Thread Daniel Pocock


On 28/05/13 03:02, Marco d'Itri wrote:
 Now that we are done with systemd for the time being, can we have the 
 flame war about replacing Exim with Postfix as the default MTA?
 
 Are there any objections other than but I like it this way!?
 


What about replacing SMTP?


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/51b76616.5060...@pocock.com.au



Re: default MTA

2013-06-11 Thread Chow Loong Jin
On Tue, Jun 11, 2013 at 08:01:58PM +0200, Daniel Pocock wrote:
 
 
 On 28/05/13 03:02, Marco d'Itri wrote:
  Now that we are done with systemd for the time being, can we have the 
  flame war about replacing Exim with Postfix as the default MTA?
  
  Are there any objections other than but I like it this way!?
  
 
 
 What about replacing SMTP?

With what?

-- 
Kind regards,
Loong Jin


signature.asc
Description: Digital signature


Re: default MTA

2013-06-11 Thread Jeremy Stanley
On 2013-06-12 02:09:24 +0800 (+0800), Chow Loong Jin wrote:
 On Tue, Jun 11, 2013 at 08:01:58PM +0200, Daniel Pocock wrote:
  
  What about replacing SMTP?
 
 With what?

With ESMTP, of course!
-- 
{ PGP( 48F9961143495829 ); FINGER( fu...@cthulhu.yuggoth.org );
WWW( http://fungi.yuggoth.org/ ); IRC( fu...@irc.yuggoth.org#ccl );
WHOIS( STANL3-ARIN ); MUD( kin...@katarsis.mudpy.org:6669 ); }


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20130611205635.ga1...@yuggoth.org



Re: default MTA

2013-06-11 Thread Bernhard R. Link
* Jonathan Dowland j...@debian.org [130611 18:35]:
 On Fri, Jun 07, 2013 at 12:45:07PM +0200, Marc Haber wrote:
  Sendmail has just one more layer of indirection by virtue of the m4
  macros. Postfix has most of its behavior hard coded in the C sources,
  while exim's behavior can be controlled by run-time configuration if
  an advanced user wants to do things that Debian's abstraction layer
  was not designed to handle.
 
 There are a class of users between beginner and exim expert for which the
 current state of affairs is not optimal. I don't know how big that class
 is but I've been in it for ten years.

The only class of users I can imagine the current situation not optional
is someone being used to postfix[1]. When I remember learning exim I found
it quite nice that the config is quite self-explaining what it is
actually doing. With postfix the config is just black magic, where one
has hardly any chance to understand what it does and how to change it to
do what you want to change.

[1] And those can simply install postfix and be done with it.

Bernhard R. Link


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20130611210523.gb3...@client.brlink.eu



Re: default MTA

2013-06-11 Thread Daniel Pocock


On 11/06/13 22:56, Jeremy Stanley wrote:
 On 2013-06-12 02:09:24 +0800 (+0800), Chow Loong Jin wrote:
 On Tue, Jun 11, 2013 at 08:01:58PM +0200, Daniel Pocock wrote:

 What about replacing SMTP?

 With what?
 
 With ESMTP, of course!

Something that doesn't have these limitations:

http://tools.ietf.org/html/rfc2487#section-7

This is also relevant (not just for Postfix):

http://www.postfix.org/TLS_README.html#client_tls_encrypt

Despite the potential for eliminating passive eavesdropping attacks,
mandatory TLS encryption is not viable as a default security level for
mail delivery to the public Internet. Most MX hosts do not support TLS
at all, and some of those that do have broken implementations. On a host
that delivers mail to the Internet, you should not configure mandatory
TLS encryption as the default security level. 


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/51b79b89.50...@pocock.com.au



Re: default MTA

2013-06-11 Thread Jeremy Stanley
On 2013-06-11 23:50:01 +0200 (+0200), Daniel Pocock wrote:
 Something that doesn't have these limitations:
 
 http://tools.ietf.org/html/rfc2487#section-7
[...]

That basically just makes the case for relying on (E)SMTP only for
transporting messages, but leveraging OpenPGP or S/MIME to provide
authentication and confidentiality where required (or for anonymity,
Mixmaster et al).
-- 
{ PGP( 48F9961143495829 ); FINGER( fu...@cthulhu.yuggoth.org );
WWW( http://fungi.yuggoth.org/ ); IRC( fu...@irc.yuggoth.org#ccl );
WHOIS( STANL3-ARIN ); MUD( kin...@katarsis.mudpy.org:6669 ); }


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20130611220230.gb1...@yuggoth.org



Re: default MTA

2013-06-08 Thread Andrei POPESCU
On Ma, 28 mai 13, 03:02:22, Marco d'Itri wrote:
 Now that we are done with systemd for the time being, can we have the 
 flame war about replacing Exim with Postfix as the default MTA?
 
 Are there any objections other than but I like it this way!?

I just moved the DefaultMTA page to Debate/DefaultMTA and did some small 
additions/changes.

If there are no objections within a few days I would like to make some 
major changes to that page as follows:

* the only options left under debate are:
  - exim (status quo)
  - postfix
  - dma
  - no MTA at all
  - (did I miss or forget something?)
* popularity is irrelevant (the default MTA will always be much more 
  popular) the entire section will be removed
* advanced use cases are irrelevant, since the admin of such a 
  system will install what she needs anyway, regardless of the default

Kind regards,
Andrei
-- 
http://wiki.debian.org/FAQsFromDebianUser
Offtopic discussions among Debian users and developers:
http://lists.alioth.debian.org/mailman/listinfo/d-community-offtopic


signature.asc
Description: Digital signature


Re: default MTA

2013-06-07 Thread Jonathan Dowland
On Thu, Jun 06, 2013 at 11:36:21PM +0800, Thomas Goirand wrote:
 Well, in that case, it failed to be as simple to configure as qmail.

Is ease of configuration an important criteria for default MTA? More
important than sensible-default?


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20130607084341.GB6619@debian



Re: default MTA

2013-06-07 Thread Marc Haber
On Thu, 6 Jun 2013 14:07:38 +0100, Jonathan Dowland j...@debian.org
wrote:
On Thu, May 30, 2013 at 06:38:52PM +0200, Marc Haber wrote:
 On Thu, 30 May 2013 16:53:56 +0200, m...@linux.it (Marco d'Itri) wrote:
 I think that ease of configurability is a major plus for Postfix when 
 compared to Exim, since a common configurations is just a few lines long.
 
 How many lines does an average update-exim4.conf.conf have?

You're right, in that the interface that a user has to exim-on-debian is
update-exim4.conf.conf, rather than exim4's configuration directly; however,
length aside, I don't see this as a strength, but a serious source of
confusion.

Sendmail has just one more layer of indirection by virtue of the m4
macros. Postfix has most of its behavior hard coded in the C sources,
while exim's behavior can be controlled by run-time configuration if
an advanced user wants to do things that Debian's abstraction layer
was not designed to handle.

Greetings
Marc
-- 
-- !! No courtesy copies, please !! -
Marc Haber |Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom  | http://www.zugschlus.de/
Nordisch by Nature | Lt. Worf, TNG Rightful Heir | Fon: *49 621 72739834


--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1ukuan-0002iq...@swivel.zugschlus.de



Re: default MTA

2013-06-07 Thread Marc Haber
On Thu, 6 Jun 2013 20:06:56 -0400, Chris Knadle
chris.kna...@coredump.us wrote:
On Thursday, June 06, 2013 16:30:48, Roger Lynn wrote:
 The smarthosts run by ISPs that most people will be using by default have
 to accept mail direct from MUAs such as Outlook and Thunderbird which will
 often be unable to generate compliant greetings. The pickier settings are
 more often used on incoming servers which expect to have proper SMTP
 servers speaking to them.

I think that's true, however I'd still rather not _count on_ that always being 
the case.

I have not seen an ISP smarthost that didn't accept any rubbish in the
EHLO string in years. Smarthosts can be configured to be even more
forgiving on Port 587.

For example, Debian's default exim configuration is configured to not
do recipient verification if the message comes in from a host for
which we are a smarthost (by virtue of being listed in
relay_from_hosts or by successful authentication) since we assume that
MUAs might hide SMTP error messages from the user. Exim, in this case,
will create a regular bounce for messages for non-existing recipients
instead of rejecting it at SMTP time which is the normal mode of
operation.

Greetings
Marc
-- 
-- !! No courtesy copies, please !! -
Marc Haber |Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom  | http://www.zugschlus.de/
Nordisch by Nature | Lt. Worf, TNG Rightful Heir | Fon: *49 621 72739834


--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1ukuf3-0002m4...@swivel.zugschlus.de



Re: default MTA

2013-06-06 Thread Chris Knadle
On Wednesday, June 05, 2013 15:35:14, Marc Haber wrote:
 On Sun, 2 Jun 2013 19:53:59 -0400, Chris Knadle
 
 chris.kna...@coredump.us wrote:
 On Sunday, June 02, 2013 17:10:02, Marc Haber wrote:
  Exim's default in the packages is not to send authentication data over
  a non-encrypted connection. The debconf code could try to check
  whether the smarthost allowes TLS, and if not, query the user whether
  it is ok to send the password over a non-encrypted connection.
 
 Yeah I see why this test could be useful; gnutls-bin is listed as a
 Suggests by exim4-base, so the TLS libraries may not be locally
 available.
 
 The TLS libraries are not in gnutls-bin. gnutls-bin contains debugging
 tools. Exim can, of course, use encryption by default.

Ah... okay.

 The normal way I know to check for TLS availability is to telnet to the
 SMTP port, give an EHLO FQDN (and it must be an EHLO) or EHLO
 [IP_address], and then look for a STARTTLS advertisement in the
 response from the server. Unfortunately this isn't always possible; some
 systems filter telnet from reaching the MTA.
 
 Selinux? or how do they do that?

I'm glad you asked this, because it prompted me to investigate further.  This 
was something I was told was commonly done, but it looks now like it might be 
a misnomer.  I'm not able to find a concrete example of a system that allows 
SMTP MTA transfers but doesn't allow telnet to the SMTP port.  [The instances 
that seemed to fit the symptoms look like they have more normal root causes, 
such as ISP port 25 filtering.]

Because I had repeatedly been told that telnet to the MTA was a security 
problem, prior to now I had suspected that blocking telnet to SMTP might be 
possible via firewall filtering that distinguished the type of service 
somehow, but after doing some packet sniffing and examining the resulting 
packet internals I'm starting to doubt this is possible.

 Attempting to use an FQDN is also troublesome, because Exim tries to use
 DNS to look up the FQDN, and falls back to using 'uname -n' which returns
 the local hostname without a domain name.  The SMTP RFCs require the
 HELO/HELO information to contain an FQDN or an IP address in [] brackets,
 and some mail systems reject connections containing non-conforming
 HELO/EHLO greetings.
 
 Smarthosts are usually a lot more forgiving in that regard.

Maybe so, but the smarthosts I run aren't, so I don't have the expectation 
that others are.  ACL rules for both Exim and Postfix for blocking 
noncompliant EHLO/HELO greetings are commonly suggested.

 In this example, the FQDN of the local machine is orac.example.com
 and the smarthost machine is smtp.example.com
 
 Create new file /etc/exim4/exim4.conf.localmacros containing:
 MAIN_TLS_ENABLE = true
 primary_hostname = orac.example.com
  
  I don't think you need MAIN_TLS_ENABLE to to TLS as a client.
 
 Tested this... looks like this is true.  :-)  Cool.  [I'm pretty sure this
 wasn't always the case, but I'm glad it is now.]
 
 Afair, it was always the case.

Okay -- I'll take your word for it.  ;-)

  You can set sc_smarthost to hostname::587 without having to change the
  transport, see update-exim4.conf(8) or the debconf template for
  dc_smarthost.
 
 Sweet.  Thanks!  This really helps because it means I can avoid having to
 modify exim4.conf.template altogether, which will simplify upgrades
 
 Indeed. The configuration was carefully crafted to allow this.

Cool.  Somehow I missed this particular setting.

 On the mail server machine (i.e. smtp.example.com), make an MD5
 
 passowrd hash of the password used on the client machine via command:
 #mkpasswd -H md5 SillyPassword
 $1$fUJ2RJ3J$1JvM9dutQs3dbM8DXts1H1
 
 Then modify /etc/exim4/passwd on the server to add a
 
 username:hashed_passwd:passwd triplet for the client:
 Orac:$1$fUJ2RJ3J$1JvM9dutQs3dbM8DXts1H1:SillyPassword
  
  You also can a more modern hash if the server is Debian exim as well.
 
 The exim4_files(5) man page recommends MD5, which is why I was using it,
 and thee README.Debian.gz document simply refers to this man page. 
 However crypt(3) indicates that sha-256 is supported too, so I tried it
 with Exim's passwd file... sure enough, that works.  ;-)
 
 I have committed a fix for the manpage that hasn't been touched in
 years. I hope that I pushed to the correct repository.

That's cool.  Thanks!

  -- Chris

--
Chris Knadle
chris.kna...@coredump.us
GPG Key: 4096R/0x1E759A726A9FDD74


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/201306060852.13676.chris.kna...@coredump.us



Re: default MTA

2013-06-06 Thread Jonathan Dowland
On Thu, May 30, 2013 at 06:38:52PM +0200, Marc Haber wrote:
 On Thu, 30 May 2013 16:53:56 +0200, m...@linux.it (Marco d'Itri) wrote:
 I think that ease of configurability is a major plus for Postfix when 
 compared to Exim, since a common configurations is just a few lines long.
 
 How many lines does an average update-exim4.conf.conf have?

You're right, in that the interface that a user has to exim-on-debian is
update-exim4.conf.conf, rather than exim4's configuration directly; however,
length aside, I don't see this as a strength, but a serious source of
confusion.


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20130606130738.GA22156@debian



Re: default MTA

2013-06-06 Thread Andrey Rahmatullin
On Thu, Jun 06, 2013 at 02:07:38PM +0100, Jonathan Dowland wrote:
 You're right, in that the interface that a user has to exim-on-debian is
 update-exim4.conf.conf, rather than exim4's configuration directly; however,
 length aside, I don't see this as a strength, but a serious source of
 confusion.
And the .conf.conf part contributes quite a lot of that.

-- 
WBR, wRAR


--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20130606130859.gc27...@belkar.wrar.name



Re: default MTA

2013-06-06 Thread Thomas Goirand
On 05/31/2013 12:27 AM, Philip Hands wrote:
 Well, I'd say that at least part of the motivation was actually to write
 a qmail replacement, that didn't have someone with DJB's atitute to
 licensing as upstream -- it was for a long time called vmailer
 (v==vapour) as coined by DJB, and adopted by Wietse because it amused
 him.
 
 Given that it was qmail inspired, which was writen with the similar
 approach of having a crowd of distinct daemons perfornming one task
 each, with a UID for each, I'd say that the intent was to match qmail's
 security focus.
 
 If one were simply trying to replace Sendmail, the result might well
 have looked a lot more like Exim, with a monolithic executable, that
 forks into the various roles required.

Well, in that case, it failed to be as simple to configure as qmail.

Even though I've switch to Postfix so long ago that I can't remember, I
still prefer the way to configure Qmail. Which I don't use anymore for
unrelated very valid reasons... like the deferred bounce (which since
have been fixed), but that's not all, and I believe any (old) Qmail user
know what I have in mind! :)

Thomas


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/51b0ac75.7020...@debian.org



Re: default MTA

2013-06-06 Thread Bernhard R. Link
* Chris Knadle chris.kna...@coredump.us [130606 14:53]:
 I'm glad you asked this, because it prompted me to investigate further.  This 
 was something I was told was commonly done, but it looks now like it might be 
 a misnomer.  I'm not able to find a concrete example of a system that allows 
 SMTP MTA transfers but doesn't allow telnet to the SMTP port.  [The instances 
 that seemed to fit the symptoms look like they have more normal root 
 causes, 
 such as ISP port 25 filtering.]
 
 Because I had repeatedly been told that telnet to the MTA was a security 
 problem, prior to now I had suspected that blocking telnet to SMTP might be 
 possible via firewall filtering that distinguished the type of service 
 somehow, but after doing some packet sniffing and examining the resulting 
 packet internals I'm starting to doubt this is possible.

Actually, it is possible to block telnet (and I've seen some ISPs do it).

In unrelated news, using telnet is a bad idea. If you want to connect to some
port and see what you get, use netcat.
Telnet is not a tool to show things coming from a port but a tool to
speak the telnet protocol.

Bernhard R. Link


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20130606171839.ga3...@client.brlink.eu



Re: default MTA

2013-06-06 Thread Chris Knadle
On Thursday, June 06, 2013 13:18:39, Bernhard R. Link wrote:
 * Chris Knadle chris.kna...@coredump.us [130606 14:53]:
  I'm glad you asked this, because it prompted me to investigate further. 
  This was something I was told was commonly done, but it looks now like
  it might be a misnomer.  I'm not able to find a concrete example of a
  system that allows SMTP MTA transfers but doesn't allow telnet to the
  SMTP port.  [The instances that seemed to fit the symptoms look like
  they have more normal root causes, such as ISP port 25 filtering.]
  
  Because I had repeatedly been told that telnet to the MTA was a security
  problem, prior to now I had suspected that blocking telnet to SMTP might
  be possible via firewall filtering that distinguished the type of
  service somehow, but after doing some packet sniffing and examining the
  resulting packet internals I'm starting to doubt this is possible.
 
 Actually, it is possible to block telnet (and I've seen some ISPs do it).

Okay.  I'm going to try to figure out how this is done, as this has been one 
of those things in the back of my mind for a bit too long.

 In unrelated news, using telnet is a bad idea. If you want to connect to
 some port and see what you get, use netcat.

Yep, netcat looks like the better tool for this.  Thanks for the hint!

  -- Chris

--
Chris Knadle
chris.kna...@coredump.us
GPG Key: 4096R/0x1E759A726A9FDD74


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/201306061337.55807.chris.kna...@coredump.us



Re: default MTA

2013-06-06 Thread Ron Scott-Adams
If you do discover how to do this reliably, I'd be interested in your solution. 
If you/someone else feels it's too unrelated to this list, feel free to email 
me directly, but I think this is generally interesting.


Ron Scott-Adams
r...@tohuw.net
The truth is incontrovertible. Malice may attack it, ignorance may deride it, 
but in the end, there it is. (Winston Churchill)





On Jun 6, 2013, at 13:37 , Chris Knadle chris.kna...@coredump.us wrote:

 On Thursday, June 06, 2013 13:18:39, Bernhard R. Link wrote:
 * Chris Knadle chris.kna...@coredump.us [130606 14:53]:
 I'm glad you asked this, because it prompted me to investigate further. 
 This was something I was told was commonly done, but it looks now like
 it might be a misnomer.  I'm not able to find a concrete example of a
 system that allows SMTP MTA transfers but doesn't allow telnet to the
 SMTP port.  [The instances that seemed to fit the symptoms look like
 they have more normal root causes, such as ISP port 25 filtering.]
 
 Because I had repeatedly been told that telnet to the MTA was a security
 problem, prior to now I had suspected that blocking telnet to SMTP might
 be possible via firewall filtering that distinguished the type of
 service somehow, but after doing some packet sniffing and examining the
 resulting packet internals I'm starting to doubt this is possible.
 
 Actually, it is possible to block telnet (and I've seen some ISPs do it).
 
 Okay.  I'm going to try to figure out how this is done, as this has been one 
 of those things in the back of my mind for a bit too long.
 
 In unrelated news, using telnet is a bad idea. If you want to connect to
 some port and see what you get, use netcat.
 
 Yep, netcat looks like the better tool for this.  Thanks for the hint!
 
  -- Chris
 
 --
 Chris Knadle
 chris.kna...@coredump.us
 GPG Key: 4096R/0x1E759A726A9FDD74
 
 
 -- 
 To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
 with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
 Archive: http://lists.debian.org/201306061337.55807.chris.kna...@coredump.us
 


--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/928757f7-fe35-43bd-a784-1c83ac755...@tohuw.net



Re: default MTA

2013-06-06 Thread Roger Lynn
On 06/06/13 14:00, Chris Knadle wrote:
 On Wednesday, June 05, 2013 15:35:14, Marc Haber wrote:
 On Sun, 2 Jun 2013 19:53:59 -0400, Chris Knadle
 chris.kna...@coredump.us wrote:
 Attempting to use an FQDN is also troublesome, because Exim tries to use
 DNS to look up the FQDN, and falls back to using 'uname -n' which returns
 the local hostname without a domain name.  The SMTP RFCs require the
 HELO/HELO information to contain an FQDN or an IP address in [] brackets,
 and some mail systems reject connections containing non-conforming
 HELO/EHLO greetings.
 
 Smarthosts are usually a lot more forgiving in that regard.
 
 Maybe so, but the smarthosts I run aren't, so I don't have the expectation 
 that others are.  ACL rules for both Exim and Postfix for blocking 
 noncompliant EHLO/HELO greetings are commonly suggested.

The smarthosts run by ISPs that most people will be using by default have to
accept mail direct from MUAs such as Outlook and Thunderbird which will
often be unable to generate compliant greetings. The pickier settings are
more often used on incoming servers which expect to have proper SMTP servers
speaking to them.

  I don't think you need MAIN_TLS_ENABLE to to TLS as a client.
 
 Tested this... looks like this is true.  :-)  Cool.  [I'm pretty sure this
 wasn't always the case, but I'm glad it is now.]
 
 Afair, it was always the case.
 
 Okay -- I'll take your word for it.  ;-)

The upstream spec for Exim 3.30 from 2001 says: It is not necessary to set
any options to have TLS work in the smtp transport. If TLS is advertised by
a server, the smtp transport will attempt to start a TLS session.

Roger


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/o4878a-c84@silverstone.rilynn.me.uk



Re: default MTA

2013-06-06 Thread Chris Knadle
On Thursday, June 06, 2013 16:30:48, Roger Lynn wrote:
 On 06/06/13 14:00, Chris Knadle wrote:
  On Wednesday, June 05, 2013 15:35:14, Marc Haber wrote:
  On Sun, 2 Jun 2013 19:53:59 -0400, Chris Knadle
  
  chris.kna...@coredump.us wrote:
  Attempting to use an FQDN is also troublesome, because Exim tries to
  use DNS to look up the FQDN, and falls back to using 'uname -n' which
  returns the local hostname without a domain name.  The SMTP RFCs
  require the HELO/HELO information to contain an FQDN or an IP address
  in [] brackets, and some mail systems reject connections containing
  non-conforming HELO/EHLO greetings.
  
  Smarthosts are usually a lot more forgiving in that regard.
  
  Maybe so, but the smarthosts I run aren't, so I don't have the
  expectation that others are.  ACL rules for both Exim and Postfix for
  blocking noncompliant EHLO/HELO greetings are commonly suggested.
 
 The smarthosts run by ISPs that most people will be using by default have
 to accept mail direct from MUAs such as Outlook and Thunderbird which will
 often be unable to generate compliant greetings. The pickier settings are
 more often used on incoming servers which expect to have proper SMTP
 servers speaking to them.

I think that's true, however I'd still rather not _count on_ that always being 
the case.  The RFCs accept [IP_address] such as [192.168.1.1] as a EHLO/HELO 
greeting, and that's something that's always available and should work with 
smarthosts that have more strict EHLO/HELO checks.

   I don't think you need MAIN_TLS_ENABLE to to TLS as a client.
  
  Tested this... looks like this is true.  :-)  Cool.  [I'm pretty sure
  this wasn't always the case, but I'm glad it is now.]
  
  Afair, it was always the case.
  
  Okay -- I'll take your word for it.  ;-)
 
 The upstream spec for Exim 3.30 from 2001 says: It is not necessary to set
 any options to have TLS work in the smtp transport. If TLS is advertised by
 a server, the smtp transport will attempt to start a TLS session.

Yep, that's definitive.  Thanks for taking the time to look this up.

  -- Chris

--
Chris Knadle
chris.kna...@coredump.us
GPG Key: 4096R/0x1E759A726A9FDD74


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/201306062006.57082.chris.kna...@coredump.us



Re: default MTA

2013-06-05 Thread Marc Haber
On Sun, 2 Jun 2013 19:53:59 -0400, Chris Knadle
chris.kna...@coredump.us wrote:
On Sunday, June 02, 2013 17:10:02, Marc Haber wrote:
 Exim's default in the packages is not to send authentication data over
 a non-encrypted connection. The debconf code could try to check
 whether the smarthost allowes TLS, and if not, query the user whether
 it is ok to send the password over a non-encrypted connection.

Yeah I see why this test could be useful; gnutls-bin is listed as a Suggests 
by exim4-base, so the TLS libraries may not be locally available.

The TLS libraries are not in gnutls-bin. gnutls-bin contains debugging
tools. Exim can, of course, use encryption by default.

The normal way I know to check for TLS availability is to telnet to the SMTP 
port, give an EHLO FQDN (and it must be an EHLO) or EHLO [IP_address], 
and then look for a STARTTLS advertisement in the response from the server.  
Unfortunately this isn't always possible; some systems filter telnet from 
reaching the MTA.

Selinux? or how do they do that?

Attempting to use an FQDN is also troublesome, because Exim tries to use DNS 
to look up the FQDN, and falls back to using 'uname -n' which returns the 
local hostname without a domain name.  The SMTP RFCs require the HELO/HELO 
information to contain an FQDN or an IP address in [] brackets, and some mail 
systems reject connections containing non-conforming HELO/EHLO greetings.

Smarthosts are usually a lot more forgiving in that regard.

In this example, the FQDN of the local machine is orac.example.com
and the smarthost machine is smtp.example.com

Create new file /etc/exim4/exim4.conf.localmacros containing:
MAIN_TLS_ENABLE = true
primary_hostname = orac.example.com
 
 I don't think you need MAIN_TLS_ENABLE to to TLS as a client.

Tested this... looks like this is true.  :-)  Cool.  [I'm pretty sure this 
wasn't always the case, but I'm glad it is now.]

Afair, it was always the case.

 You can set sc_smarthost to hostname::587 without having to change the
 transport, see update-exim4.conf(8) or the debconf template for
 dc_smarthost.

Sweet.  Thanks!  This really helps because it means I can avoid having to 
modify exim4.conf.template altogether, which will simplify upgrades

Indeed. The configuration was carefully crafted to allow this.

On the mail server machine (i.e. smtp.example.com), make an MD5

passowrd hash of the password used on the client machine via command:
#mkpasswd -H md5 SillyPassword
$1$fUJ2RJ3J$1JvM9dutQs3dbM8DXts1H1

Then modify /etc/exim4/passwd on the server to add a

username:hashed_passwd:passwd triplet for the client:
Orac:$1$fUJ2RJ3J$1JvM9dutQs3dbM8DXts1H1:SillyPassword
 
 You also can a more modern hash if the server is Debian exim as well.

The exim4_files(5) man page recommends MD5, which is why I was using it, and 
thee README.Debian.gz document simply refers to this man page.  However 
crypt(3) indicates that sha-256 is supported too, so I tried it with Exim's 
passwd file... sure enough, that works.  ;-)

I have committed a fix for the manpage that hasn't been touched in
years. I hope that I pushed to the correct repository.

Greetings
Marc
-- 
-- !! No courtesy copies, please !! -
Marc Haber |Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom  | http://www.zugschlus.de/
Nordisch by Nature | Lt. Worf, TNG Rightful Heir | Fon: *49 621 72739834


--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1ukjui-n6...@swivel.zugschlus.de



Re: default MTA

2013-06-05 Thread Marc Haber
On Sun, 02 Jun 2013 14:26:31 -0700, Russ Allbery r...@debian.org
wrote:
Marc Haber mh+debian-de...@zugschlus.de writes:
 Russ Allbery r...@debian.org wrote:
 Marc Haber mh+debian-de...@zugschlus.de writes:

 Certificates are usually only used in E-Mail when a server authenticates
 itself to a client before the client sends its authentication data. SMTP
 with client certificates is possible, but I have only seen this two
 times in 15 years of running E-Mail servers.

 All mail servers I run are configured with TLS certificates because
 that's how you encrypt SMTP traffic between servers.

 That's not a contradiction to what I have written.

You said that certificates are usually only used in e-mail when a server
authenticates itself to a client.  That's the statement with which I'm
partly disagreeing.

Now I see that I didn't write what I wanted to write. I just wanted to
say that client certificates are really seldomly used in SMTP.

Greetings
Marc
-- 
-- !! No courtesy copies, please !! -
Marc Haber |Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom  | http://www.zugschlus.de/
Nordisch by Nature | Lt. Worf, TNG Rightful Heir | Fon: *49 621 72739834


--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1ukjvd-ne...@swivel.zugschlus.de



Re: default MTA

2013-06-04 Thread Thibaut Paumard
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Le 29/05/2013 21:52, Marc Haber a écrit :
 But, alas, people are going to report every single mail in the
 local mailbox als Spam to their ISP.
 

MUAs tend to present mail in folders by accounts. They can be
configured to display local mail in a folder with an explicit title.

In addition, we can push a localized mail to each newly created local
account, such as Welcome to Debian, this mail folder usually contains
only system messages blah blah so that people know what to expect
here, especially for the user to which root's mail is forwarded.

Kind regards, Thibaut.



-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
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=JBsQ
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/51adaa08.5080...@debian.org



Re: default MTA

2013-06-02 Thread Jean-Christophe Dubacq
Le 31/05/2013 13:10, Marc Haber a écrit :
 On Fri, 31 May 2013 08:41:56 +0200, Jean-Christophe Dubacq
 jcduba...@free.fr wrote:
 Le 30/05/2013 18:29, Marc Haber a écrit :
 On Thu, 30 May 2013 13:56:02 +0200, Olav Vitters o...@vitters.nl
 wrote:
 Seems the solutions are very focussed on the assumption that things
 cannot be changed. E.g. programs currently send email, so email it has
 to be forever.

 It is not a good idea to drop the way that  90 % of programs use to
 deliver messages. I really hate the idea of having a thing as fragile
 as dbus on a server just to collect status messages.

 73.6% of all statistics are made up.
 
 You have a point here. I shold have written the vast majority.
 
 The way most programs deliver messages is actually syslog.
 
 Which is an epic nightmare to parse automatically if one needs to put
 messages in relation to each other and is only readable if all
 messages are shorter than, say, 160 characters. Even firewall log
 messages are way longer than that already.
 

And yet, I remain convinced that I do redirect many root accounts to my
own account, and I have yet to see very important messages coming that way.

When I stop receiving useless messages from one machine, *that* means
something, namely, that the machine is broken. But anyone seriously
keeping an eye on server will install some kind of munin/nagios, and on
desktops, disk tools will notify the user when the computer is used.

All the rest belongs to syslog. I seem to recall that some init system
has a specific additional format to store logs and make them easily
searchable, by the way.

Sincerly,
-- 
Jean-Christophe Dubacq



signature.asc
Description: OpenPGP digital signature


Re: default MTA

2013-06-02 Thread Marc Haber
On Sat, 1 Jun 2013 15:06:40 -0400, Chris Knadle
chris.kna...@coredump.us wrote:
I can understand why one would want this, but I can also understand why it 
hasn't been done.  Without first setting up TLS, this would involve passing a 
username/password over the 'net in the clear, which is something I try hard to 
never ever have happen.  This is especially something you don't want to do if 
it's your own personal email login, which is a likely use case for this 
proposed debconf code.  :-/

Exim's default in the packages is not to send authentication data over
a non-encrypted connection. The debconf code could try to check
whether the smarthost allowes TLS, and if not, query the user whether
it is ok to send the password over a non-encrypted connection.

   In this example, the FQDN of the local machine is orac.example.com
   and the smarthost machine is smtp.example.com

   Create new file /etc/exim4/exim4.conf.localmacros containing:

   MAIN_TLS_ENABLE = true
   primary_hostname = orac.example.com

I don't think you need MAIN_TLS_ENABLE to to TLS as a client.

   Modify /etc/exim4/exim4.conf.template for the remote_smtp_smarthost
   to change the sending port to 587.  (In the U.S. there are a lot of
   ISPs that block outbound port 25 except for the ISP's mail servers):

   ...
   remote_smtp_smarthost:
  debug_print = T: remote_smtp_smarthost for $local_part@$domain
  driver = smtp
port = 587# --- add this line
  ...

You can set sc_smarthost to hostname::587 without having to change the
transport, see update-exim4.conf(8) or the debconf template for
dc_smarthost.

   Modify /etc/exim4/passwd.client to add a smarthost:username:password
   triplet for sending email:

   smtp.example.com:Orac:SillyPassword

That's what I'd want to be debconfed

   On the mail server machine (i.e. smtp.example.com), make an MD5
   passowrd hash of the password used on the client machine via command:

   #mkpasswd -H md5 SillyPassword
   $1$fUJ2RJ3J$1JvM9dutQs3dbM8DXts1H1

   Then modify /etc/exim4/passwd on the server to add a
   username:hashed_passwd:passwd triplet for the client:

   Orac:$1$fUJ2RJ3J$1JvM9dutQs3dbM8DXts1H1:SillyPassword

You also can a more modern hash if the server is Debian exim as well.

As I mentioned previously, the reason I go through making a new 
username/password pair for each client is so that I don't risk a personal 
email account, and so that I can revoke any one machine's email login at the 
server in case of a client compromise of some kind.

Wise.

Greetings
Marc
-- 
-- !! No courtesy copies, please !! -
Marc Haber |Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom  | http://www.zugschlus.de/
Nordisch by Nature | Lt. Worf, TNG Rightful Heir | Fon: *49 621 72739834


--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1ujfxo-0005bm...@swivel.zugschlus.de



Re: default MTA

2013-06-02 Thread Marc Haber
On Sat, 01 Jun 2013 12:16:11 -0700, Russ Allbery r...@debian.org
wrote:
Marc Haber mh+debian-de...@zugschlus.de writes:
 Certificates are usually only used in E-Mail when a server authenticates
 itself to a client before the client sends its authentication data. SMTP
 with client certificates is possible, but I have only seen this two
 times in 15 years of running E-Mail servers.

All mail servers I run are configured with TLS certificates because that's
how you encrypt SMTP traffic between servers. 

That's not a contradiction to what I have written.

Greetings
Marc
-- 
-- !! No courtesy copies, please !! -
Marc Haber |Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom  | http://www.zugschlus.de/
Nordisch by Nature | Lt. Worf, TNG Rightful Heir | Fon: *49 621 72739834


--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1ujfys-0005bv...@swivel.zugschlus.de



Re: default MTA

2013-06-02 Thread Russ Allbery
Marc Haber mh+debian-de...@zugschlus.de writes:
 Russ Allbery r...@debian.org wrote:
 Marc Haber mh+debian-de...@zugschlus.de writes:

 Certificates are usually only used in E-Mail when a server authenticates
 itself to a client before the client sends its authentication data. SMTP
 with client certificates is possible, but I have only seen this two
 times in 15 years of running E-Mail servers.

 All mail servers I run are configured with TLS certificates because
 that's how you encrypt SMTP traffic between servers.

 That's not a contradiction to what I have written.

You said that certificates are usually only used in e-mail when a server
authenticates itself to a client.  That's the statement with which I'm
partly disagreeing.  I run multiple mail servers (and Stanford University
runs quite a few more) that have TLS certificates that have nothing to do
with authentication.

TLS certificates are a poor authentication system unless you restrict them
to only CAs under your control, but they're great as an easy way of
configuring effectively anonymous encryption.

-- 
Russ Allbery (r...@debian.org)   http://www.eyrie.org/~eagle/


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/87li6sfblk@windlord.stanford.edu



Re: default MTA

2013-06-02 Thread Chris Knadle
On Sunday, June 02, 2013 17:10:02, Marc Haber wrote:
 On Sat, 1 Jun 2013 15:06:40 -0400, Chris Knadle
 
 chris.kna...@coredump.us wrote:
 I can understand why one would want this, but I can also understand why it
 hasn't been done.  Without first setting up TLS, this would involve
 passing a username/password over the 'net in the clear, which is
 something I try hard to never ever have happen.  This is especially
 something you don't want to do if it's your own personal email login,
 which is a likely use case for this proposed debconf code.  :-/
 
 Exim's default in the packages is not to send authentication data over
 a non-encrypted connection. The debconf code could try to check
 whether the smarthost allowes TLS, and if not, query the user whether
 it is ok to send the password over a non-encrypted connection.

Yeah I see why this test could be useful; gnutls-bin is listed as a Suggests 
by exim4-base, so the TLS libraries may not be locally available.

The normal way I know to check for TLS availability is to telnet to the SMTP 
port, give an EHLO FQDN (and it must be an EHLO) or EHLO [IP_address], 
and then look for a STARTTLS advertisement in the response from the server.  
Unfortunately this isn't always possible; some systems filter telnet from 
reaching the MTA.  I don't yet know how to check a remote server for this 
using a local Exim binary; there's an -MCT option mentioned in the Exim man 
page for this, but it's an option used internally by Exim and not meant to be 
used by an external caller.

Attempting to use an FQDN is also troublesome, because Exim tries to use DNS 
to look up the FQDN, and falls back to using 'uname -n' which returns the 
local hostname without a domain name.  The SMTP RFCs require the HELO/HELO 
information to contain an FQDN or an IP address in [] brackets, and some mail 
systems reject connections containing non-conforming HELO/EHLO greetings.


I think swaks may be able to do this via something like:

   swaks --ehlo [192.168.1.1] --server smarthost_FQDN -p port \
 -tls -q TLS

... but swaks is a package Suggested by exim4-base rather than a Depends, so 
swaks may not be available for use with debconf.


Let me know if you have suggestions.

In this example, the FQDN of the local machine is orac.example.com
and the smarthost machine is smtp.example.com

Create new file /etc/exim4/exim4.conf.localmacros containing:
MAIN_TLS_ENABLE = true
primary_hostname = orac.example.com
 
 I don't think you need MAIN_TLS_ENABLE to to TLS as a client.

Tested this... looks like this is true.  :-)  Cool.  [I'm pretty sure this 
wasn't always the case, but I'm glad it is now.]

Modify /etc/exim4/exim4.conf.template for the remote_smtp_smarthost
to change the sending port to 587.  (In the U.S. there are a lot of

ISPs that block outbound port 25 except for the ISP's mail servers):
...

remote_smtp_smarthost:
   debug_print = T: remote_smtp_smarthost for $local_part@$domain
   driver = smtp
   
 port = 587# --- add this line
   
   ...
 
 You can set sc_smarthost to hostname::587 without having to change the
 transport, see update-exim4.conf(8) or the debconf template for
 dc_smarthost.

Sweet.  Thanks!  This really helps because it means I can avoid having to 
modify exim4.conf.template altogether, which will simplify upgrades.

Modify /etc/exim4/passwd.client to add a smarthost:username:password

triplet for sending email:
smtp.example.com:Orac:SillyPassword
 
 That's what I'd want to be debconfed

Right.

On the mail server machine (i.e. smtp.example.com), make an MD5

passowrd hash of the password used on the client machine via command:
#mkpasswd -H md5 SillyPassword
$1$fUJ2RJ3J$1JvM9dutQs3dbM8DXts1H1

Then modify /etc/exim4/passwd on the server to add a

username:hashed_passwd:passwd triplet for the client:
Orac:$1$fUJ2RJ3J$1JvM9dutQs3dbM8DXts1H1:SillyPassword
 
 You also can a more modern hash if the server is Debian exim as well.

The exim4_files(5) man page recommends MD5, which is why I was using it, and 
thee README.Debian.gz document simply refers to this man page.  However 
crypt(3) indicates that sha-256 is supported too, so I tried it with Exim's 
passwd file... sure enough, that works.  ;-)

Thanks for letting me know about this.

  -- Chris

--
Chris Knadle
chris.kna...@coredump.us
GPG Key: 4096R/0x1E759A726A9FDD74


signature.asc
Description: This is a digitally signed message part.


Re: default MTA

2013-06-01 Thread Tollef Fog Heen
]] Russ Allbery 

 Basically, what we're looking for here is the equivalent of a check engine
 light (except, of course, with better user-visible diagnostics available).
 That's what the end user actually wants: something clear and visible
 indicating that something is wrong, which they can drill down and see the
 details and dismiss the error condition if they want, or have all the
 details available to consult someone who knows more about computers if
 they don't know what to do with it themselves.  Historically, root cron
 mail has been exactly that, and that's still a great way of handling it
 for servers, since that mail can be sent off somewhere centrally, analyzed
 and assigned to sysadmins, used to open internal trouble tickets, etc.

I don't think it's a good way at all, since far too often, cron mails
aren't actionable.  I'll get a mail from some automated process that
tried to run apt-get update and that failed (during the middle of the
night).  Since that process runs every hour, it'll have succeeded
afterwards, and there's nothing I can do about the mail.

I wish we had a better system where some, but not all errors would latch
and need acknowledgment, there would be correlation (between hosts and
between messages, so if the router's down, you get a message about data
centre A not being able to successfully complete $process, rather than a
zillion individual messages), there would be merging of identical
messages, so I get a message about $process being broken for the last
$time period (or having a failure rate above $threshold), rather than a
thousand mails because of some error.

Oh, and a pony.  Don't forget the pony.  Or an otter, I like otters.

-- 
Tollef Fog Heen
UNIX is user friendly, it's just picky about who its friends are


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/m238t2maxt@rahvafeir.err.no



Re: default MTA

2013-06-01 Thread Vincent Lefevre
On 2013-05-28 13:05:25 +0200, Josselin Mouette wrote:
 Le mardi 28 mai 2013 à 12:13 +0200, Adam Borowski a écrit : 
  Being able to send outgoing mail, and to handle local (such as
  SMTP rejects or notifications from system daemons) seems plenty
  useful to me.
 
 Most clients (apart maybe from mailx) can use an external SMTP
 server to send email.

Is there a central configuration (when the SMTP connection is done
by the clients)?

 And on desktop systems, nobody reads local email.

I do (possibly remotely after synchronization).

 We might want to think of a better notification system, but email is
 definitely not fit for that anymore.

Email should still be available. Otherwise make sure that
notification is available remotely...

-- 
Vincent Lefèvre vinc...@vinc17.net - Web: http://www.vinc17.net/
100% accessible validated (X)HTML - Blog: http://www.vinc17.net/blog/
Work: CR INRIA - computer arithmetic / AriC project (LIP, ENS-Lyon)


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20130601185246.gb12...@xvii.vinc17.org



Re: default MTA

2013-06-01 Thread Chris Knadle
On Friday, May 31, 2013 07:15:36, Marc Haber wrote:
 On Thu, 30 May 2013 19:51:04 -0400, Chris Knadle
 
 chris.kna...@coredump.us wrote:
 For Exim, the one thing I would want to change would be to ship a
 configuration that by default created an SSL certificate and enabled
 MAIN_TLS_ENABLE to enable TLS SMTP transfers.
 
 For e-mail coming in from other clients, with the local exim acting as
 a server?

Interesting possibility, but no that's not what I had in mind.

 Certificates are usually only used in E-Mail when a server
 authenticates itself to a client before the client sends its
 authentication data.

Yes, you're right.  After I had pointed out the existence of Section 2.2 in 
/usr/share/doc/exim4-base/README.Debian.gz I re-read it, and it points out 
that the SSL certificates are only required for TLS when Exim is acting as a 
server, and are _not_ necessary when Exim is passing along email as a client 
to another MTA.

 SMTP with client certificates is possible, but I
 have only seen this two times in 15 years of running E-Mail servers.

Yes I'd expect this to be rare, and I can't recall using them for SMTP.

  [The Postfix package in Debian does this.]  There's documentation and
   help for doing this for Exim in/usr/share/doc/exim4-base/README.Debian.gz
   in Section 2.2 though, and so I suspect there's a _reason_ why this isn't
   the default.
 
 Noone has yet written code to do that, and volunteered to document and
 support it.
 
 Personally, I think that before we improve Exim's packaging in Debian
 to be an SMTP server, we should first make it easiert to use Exim as a
 client with a smart host, thus debconfing the username/password and
 authentication scheme. Noone has volunteered to write that code,
 either.

I can understand why one would want this, but I can also understand why it 
hasn't been done.  Without first setting up TLS, this would involve passing a 
username/password over the 'net in the clear, which is something I try hard to 
never ever have happen.  This is especially something you don't want to do if 
it's your own personal email login, which is a likely use case for this 
proposed debconf code.  :-/



I'll list the steps _I_ take for setting up an Exim4 client (now that I've 
finally formally documented them for myself).  This enables TLS, sets 
primary_hostname to set the full FQDN for the HELO greeting sent, and sends 
email to a smarthost with destination port 587 via SMTP AUTH.


   In this example, the FQDN of the local machine is orac.example.com
   and the smarthost machine is smtp.example.com

   Create new file /etc/exim4/exim4.conf.localmacros containing:

   MAIN_TLS_ENABLE = true
   primary_hostname = orac.example.com
   
   Modify /etc/exim4/exim4.conf.template for the remote_smtp_smarthost
   to change the sending port to 587.  (In the U.S. there are a lot of
   ISPs that block outbound port 25 except for the ISP's mail servers):

   ...
   remote_smtp_smarthost:
  debug_print = T: remote_smtp_smarthost for $local_part@$domain
  driver = smtp
port = 587# --- add this line
  ...

   Run '/etc/init.d/exim4 reload' to pull in the new configuration

   Modify /etc/exim4/passwd.client to add a smarthost:username:password
   triplet for sending email:

   smtp.example.com:Orac:SillyPassword

   On the mail server machine (i.e. smtp.example.com), make an MD5
   passowrd hash of the password used on the client machine via command:

   #mkpasswd -H md5 SillyPassword
   $1$fUJ2RJ3J$1JvM9dutQs3dbM8DXts1H1

   Then modify /etc/exim4/passwd on the server to add a
   username:hashed_passwd:passwd triplet for the client:

   Orac:$1$fUJ2RJ3J$1JvM9dutQs3dbM8DXts1H1:SillyPassword



As I mentioned previously, the reason I go through making a new 
username/password pair for each client is so that I don't risk a personal 
email account, and so that I can revoke any one machine's email login at the 
server in case of a client compromise of some kind.  [It's never happened, but 
I try to plan for it anyway.]

  This wiki page has a nice summary http://wiki.debian.org/DefaultMTA
 
 I think the negative point of Support community limited outside of
 Debian is untrue.  The exim-us...@exim.org mailing list is very active
 and responsive, and Exim has become the most popular MTA since sometime
 in 2008.
 
 Agreed, but exim's development speed has considerably slowed down
 since Philip Hazel retired. The exim community is still alive, but I'd
 say it's in limbo. Which is a real shame.

I know what you mean -- the community has slowed a bit, but I don't 
(personally) feel that it's gotten down to limbo, because there are people 
still supporting the code and making new features and improvements.

  -- Chris

--
Chris Knadle
chris.kna...@coredump.us
GPG Key: 4096R/0x1E759A726A9FDD74


signature.asc
Description: This is a digitally signed message part.


Re: default MTA

2013-06-01 Thread Russ Allbery
Marc Haber mh+debian-de...@zugschlus.de writes:

 For e-mail coming in from other clients, with the local exim acting as
 a server?

 Certificates are usually only used in E-Mail when a server authenticates
 itself to a client before the client sends its authentication data. SMTP
 with client certificates is possible, but I have only seen this two
 times in 15 years of running E-Mail servers.

All mail servers I run are configured with TLS certificates because that's
how you encrypt SMTP traffic between servers.  (Self-signed certificates
are fine for that purpose since the point is wire encryption, not
authentication.)  I don't see any reason to send my email in the clear
over the network when there's a simple alternative that's widely
supported.  Among other reasons, any little thing we can do to make life
harder for governments who think they should be able to wiretap network
traffic without a warrant seems like a good idea to me.

I don't know how Exim works in this regard, but for Postfix:

# Enable opportunistic TLS.
smtp_tls_loglevel   = 1
smtp_tls_security_level = may

# Present a server certificate to clients.
smtpd_tls_loglevel  = 1
smtpd_tls_received_header   = yes
smtpd_tls_security_level= may
smtpd_tls_cert_file = /etc/ssl/certs/hostname.pem
smtpd_tls_key_file  = /etc/ssl/private/hostname.key

will enable opportunistic TLS both sending and receiving without
interfering with one's ability to talk to mail servers that aren't willing
or configured to do TLS.

-- 
Russ Allbery (r...@debian.org)   http://www.eyrie.org/~eagle/


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/8738t1fxqc@windlord.stanford.edu



Re: default MTA

2013-06-01 Thread Chris Knadle
On Saturday, June 01, 2013 05:34:22, Tollef Fog Heen wrote:
 ]] Russ Allbery
 
  Basically, what we're looking for here is the equivalent of a check
  engine light (except, of course, with better user-visible diagnostics
  available). That's what the end user actually wants: something clear and
  visible indicating that something is wrong, which they can drill down
  and see the details and dismiss the error condition if they want, or
  have all the details available to consult someone who knows more about
  computers if they don't know what to do with it themselves. 
  Historically, root cron mail has been exactly that, and that's still a
  great way of handling it for servers, since that mail can be sent off
  somewhere centrally, analyzed and assigned to sysadmins, used to open
  internal trouble tickets, etc.
 
 I don't think it's a good way at all, since far too often, cron mails
 aren't actionable. I'll get a mail from some automated process that
 tried to run apt-get update and that failed (during the middle of the
 night).  Since that process runs every hour, it'll have succeeded
 afterwards, and there's nothing I can do about the mail.
 
 I wish we had a better system where some, but not all errors would latch
 and need acknowledgment, there would be correlation (between hosts and
 between messages, so if the router's down, you get a message about data
 centre A not being able to successfully complete $process, rather than a
 zillion individual messages), there would be merging of identical
 messages, so I get a message about $process being broken for the last
 $time period (or having a failure rate above $threshold), rather than a
 thousand mails because of some error.

Ugh.  :-/  Yeah these are good points.  The thinking was to change 
notifications (a) for Desktop boxes only and (b) the messages received and 
needing acknowledgement being from the local machine only.  However -- if 
there are many repeat events of some error that all have to be separately 
acknowledged, I can easily see how that could be very annoying.

 Oh, and a pony.  Don't forget the pony.  Or an otter, I like otters.

Otters are pretty cute looking.  They remind me of gophers.

  -- Chris

--
Chris Knadle
chris.kna...@coredump.us
GPG Key: 4096R/0x1E759A726A9FDD74


signature.asc
Description: This is a digitally signed message part.


Re: default MTA

2013-06-01 Thread Chris Knadle
On Wednesday, May 29, 2013 20:02:42, Russ Allbery wrote:
 Chris Knadle chris.kna...@coredump.us writes:
  On Wednesday, May 29, 2013 15:46:15, Russ Allbery wrote:
  That's exactly the point, and is why I would prefer not to write those
  notifications into a file that no one ever looks at.  (Which is why I
  don't find sending them to syslog much more appealing, since the
  average desktop user is never going to look there either.)
  
  Somehow this problem reminds me of the event log used on a popular
  operating system.  Most users don't read that log either.
 
 Yes, but what users *do* read is some sort of event log that throws an
 attention icon (or spawns a window) on login or on event that doesn't go
 away until the user looks through the messages.

Yes.

 I know we probably don't have something like this right now, but it's
 something that can be done, and would be much superior to email for a lot
 of users (including myself on a lot of systems).
 
 One could easily solve the persistent problem in a similar way if a
 history of such notifications were kept and could be retrieved by the user
 by manually launching the application.
 
 None of this seems particularly novel (we've written similar things at
 Stanford for managed desktop situations and deployed commercial products
 that do something similar, not to mention that it's how most anti-virus
 updators and now the OS patch updators work), which makes me wonder if
 someone is already working on (or has finished) a mechanism of corraling
 some desktop notifications into that sort of framework.

It at least has the potential to be a good solution, yes.

There are a number of notification packages in Debian that I'm having a look 
through.  At the moment I'm looking at notify-osd.

  https://wiki.ubuntu.com/NotifyOSD

  -- Chris

--
Chris Knadle
chris.kna...@coredump.us
GPG Key: 4096R/0x1E759A726A9FDD74


signature.asc
Description: This is a digitally signed message part.


Re: default MTA

2013-06-01 Thread Roger Lynn
On 31/05/13 07:50, Jean-Christophe Dubacq wrote:
 A utility to scan syslog and convey important information to the user
 would be much more useful than configuring all mailers in Debian to read
 root's local mail by default. I know how to redirect root's mail
 elsewhere, thank you for not making another mail account to check.

The mailers don't need to read root's mail, they just need to read the
user's own mail, which is something they should do anyway. The fact that
many apparently still don't is quite a startling omission. I remember being
surprised many years ago that Netscape and Mozilla apparently didn't support
reading local mail, which should be a basic function of any Unix MUA.

Roger


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/lk0q7a-69p@silverstone.rilynn.me.uk



Re: default MTA

2013-06-01 Thread Ben Hutchings
On Sat, 2013-06-01 at 15:06 -0400, Chris Knadle wrote:
 On Friday, May 31, 2013 07:15:36, Marc Haber wrote:
[...]
  SMTP with client certificates is possible, but I
  have only seen this two times in 15 years of running E-Mail servers.
 
 Yes I'd expect this to be rare, and I can't recall using them for SMTP.
[...]

I set up my smarthost to allow relaying from external servers that
present a CAcert-signed client certificate for a name under
decadent.org.uk.  Any machine outside the home LAN then needs such a
certificate installed before using this smarthost.

It wasn't that easy to set up, and the certificates need to be renewed
regularly (every 6 months for CAcert), but the credentials are now
clearly associated with a machine rather than a person and it
effectively validates that I'm using TLS for outgoing mail from my
laptop.  (But did I correctly enable validation of the smarthost's
server certificate?  Not sure.)

Ben.

-- 
Ben Hutchings
You can't have everything.  Where would you put it?


signature.asc
Description: This is a digitally signed message part


Re: default MTA

2013-05-31 Thread Jean-Christophe Dubacq
Le 30/05/2013 18:29, Marc Haber a écrit :
 On Thu, 30 May 2013 13:56:02 +0200, Olav Vitters o...@vitters.nl
 wrote:
 Seems the solutions are very focussed on the assumption that things
 cannot be changed. E.g. programs currently send email, so email it has
 to be forever.
 
 It is not a good idea to drop the way that  90 % of programs use to
 deliver messages. I really hate the idea of having a thing as fragile
 as dbus on a server just to collect status messages.

73.6% of all statistics are made up. And in my experience, email tends
to be much more fragile than dbus. How many times have I suddenly looked
at the queue of a computer that has been mis-configured and that
accumulated thousands of email from its system trying to repeatedly warn
the user that, well, the email smarthost cannot be contacted?

The way most programs deliver messages is actually syslog. The most
important of them being the kernel. We've been over it several times. As
far as I know, the kernel does not send emails.

Exaggerating this way just removes credit from all your mails. I can see
you are passionate about this issue (and several others), but this does
not help.

Most logs I receive on my email account come from cron (also a few from
the fetchmail daemon, but I suppose that one can live with sending local
emails, due to its nature). And I use a large variety of services. By
the way, parts of cron can even be replaced by systemd's services, and
at this point this will use whatever system for information transmission
systemd uses (I do not use systemd, I am not interested yet in knowing
how information is conveyed in systemd to the user or admin; I doubt
this is email).

A utility to scan syslog and convey important information to the user
would be much more useful than configuring all mailers in Debian to read
root's local mail by default. I know how to redirect root's mail
elsewhere, thank you for not making another mail account to check.

Sincerly,
-- 
-- 
Jean-Christophe Dubacq



signature.asc
Description: OpenPGP digital signature


Re: default MTA

2013-05-31 Thread Bjørn Mork
Jean-Christophe Dubacq jcduba...@free.fr writes:

 And in my experience, email tends to be much more fragile than dbus.

The warm fuzzy feeling you get when you don't know there is a
problem... 

 How many times have I suddenly looked
 at the queue of a computer that has been mis-configured and that
 accumulated thousands of email from its system trying to repeatedly warn
 the user that, well, the email smarthost cannot be contacted?

Yes, and dbus would have just dropped the messages that couldn't be
delivered instead of queueing them.


Bjørn


--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/8761xzlg2n@nemi.mork.no



Re: default MTA

2013-05-31 Thread Marc Haber
On Thu, 30 May 2013 23:25:15 +0300, Christian PERRIER
bubu...@debian.org wrote:
MTA on average people's desktop machine are point less. Is there
anyone who is *not* a Linux geek to deny this?

Non-Geeks are probably not aware that a system holds many packages of
software that expects to be able to deliver status messages as e-mail
via either /usr/lib/sendmail or tcp port 25 to localhost.

Geeks might be aware that there is relatively few software that can
accept e-mail messages by one of this means and is able to queue such
messages in case the real target is unavailable for some reason and
that is not called MTA.

Greetings
Marc
-- 
-- !! No courtesy copies, please !! -
Marc Haber |Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom  | http://www.zugschlus.de/
Nordisch by Nature | Lt. Worf, TNG Rightful Heir | Fon: *49 621 72739834


--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1uin90-0001dd...@swivel.zugschlus.de



Re: default MTA

2013-05-31 Thread Marc Haber
On Thu, 30 May 2013 20:25:12 -0400, Chris Knadle
chris.kna...@coredump.us wrote:
It's somewhat depressing when I ask for the person's email address and their 
response is I don't email, and they ask me for my Facebook ID and my 
response is I don't use Facebook.  It's a cultural divide that ends up 
causing an electronic communications divide.

Not ever having used Facebook, what is a facebook ID? From what I have
seen, Facebook uses the real name of people while not having something
that deserves to be called search, so people looking for Chris Scott
are basically hosed.

Greetings
Marc
-- 
-- !! No courtesy copies, please !! -
Marc Haber |Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom  | http://www.zugschlus.de/
Nordisch by Nature | Lt. Worf, TNG Rightful Heir | Fon: *49 621 72739834


--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1uinau-0001dn...@swivel.zugschlus.de



Re: default MTA

2013-05-31 Thread Marc Haber
On Fri, 31 May 2013 08:41:56 +0200, Jean-Christophe Dubacq
jcduba...@free.fr wrote:
Le 30/05/2013 18:29, Marc Haber a écrit :
 On Thu, 30 May 2013 13:56:02 +0200, Olav Vitters o...@vitters.nl
 wrote:
 Seems the solutions are very focussed on the assumption that things
 cannot be changed. E.g. programs currently send email, so email it has
 to be forever.
 
 It is not a good idea to drop the way that  90 % of programs use to
 deliver messages. I really hate the idea of having a thing as fragile
 as dbus on a server just to collect status messages.

73.6% of all statistics are made up.

You have a point here. I shold have written the vast majority.

The way most programs deliver messages is actually syslog.

Which is an epic nightmare to parse automatically if one needs to put
messages in relation to each other and is only readable if all
messages are shorter than, say, 160 characters. Even firewall log
messages are way longer than that already.

 The most
important of them being the kernel. We've been over it several times. As
far as I know, the kernel does not send emails.

The kernel does not use syslog as well. It just dumps the messages
into a ring buffer and relies on some user space software to process
those in time. If that user space software fails, messages are
eventually overwritten and lost.

A utility to scan syslog and convey important information to the user
would be much more useful than configuring all mailers in Debian to read
root's local mail by default. 

Alas, I would really love to have such an utility, I would even
participate in crowdfunding such an utiltiy, but it does not exist
yet. MTAs and MUAs exist and work.

Greetings
Marc
-- 
-- !! No courtesy copies, please !! -
Marc Haber |Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom  | http://www.zugschlus.de/
Nordisch by Nature | Lt. Worf, TNG Rightful Heir | Fon: *49 621 72739834


--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1uindz-0001df...@swivel.zugschlus.de



Re: default MTA

2013-05-31 Thread Marc Haber
On Thu, 30 May 2013 19:51:04 -0400, Chris Knadle
chris.kna...@coredump.us wrote:
For Exim, the one thing I would want to change would be to ship a 
configuration that by default created an SSL certificate and enabled 
MAIN_TLS_ENABLE to enable TLS SMTP transfers.

For e-mail coming in from other clients, with the local exim acting as
a server?

Certificates are usually only used in E-Mail when a server
authenticates itself to a client before the client sends its
authentication data. SMTP with client certificates is possible, but I
have only seen this two times in 15 years of running E-Mail servers.

  [The Postfix package in Debian 
does this.]  There's documentation and help for doing this for Exim in 
/usr/share/doc/exim4-base/README.Debian.gz in Section 2.2 though, and so I 
suspect there's a _reason_ why this isn't the default.

Noone has yet written code to do that, and volunteered to document and
support it.

Personally, I think that before we improve Exim's packaging in Debian
to be an SMTP server, we should first make it easiert to use Exim as a
client with a smart host, thus debconfing the username/password and
authentication scheme. Noone has volunteered to write that code,
either.

 This wiki page has a nice summary http://wiki.debian.org/DefaultMTA

I think the negative point of Support community limited outside of Debian is 
untrue.  The exim-us...@exim.org mailing list is very active and responsive, 
and Exim has become the most popular MTA since sometime in 2008.

Agreed, but exim's development speed has considerably slowed down
since Philip Hazel retired. The exim community is still alive, but I'd
say it's in limbo. Which is a real shame.

Greetings
Marc
-- 
-- !! No courtesy copies, please !! -
Marc Haber |Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom  | http://www.zugschlus.de/
Nordisch by Nature | Lt. Worf, TNG Rightful Heir | Fon: *49 621 72739834


--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1uinj2-0001ec...@swivel.zugschlus.de



Re: default MTA

2013-05-30 Thread Andrei POPESCU
On Mi, 29 mai 13, 15:59:35, Russ Allbery wrote:
 Andrei POPESCU andreimpope...@gmail.com writes:
 
  Exim is a listening daemon, even if it listens only on localhost in the 
  default configuration. I'd prefer dma instead.
 
 It's better to have a listening daemon on localhost.  There's no security
 threat, and there's some software that can't handle invoking a sendmail
 binary and always wants to speak SMTP to some port.  I've run into this
 with both Java and PHP applications.  This is, of course, possible to fix,
 but I can understand why Java programmers aren't thrilled by the idea of
 adding UNIX-specific code to fork and execute a program (which is
 something that you generally don't want to do in Java, since it's very
 expensive, and which is not portable), and similarly why web developers
 aren't enthused by fork and exec in a mod_php or similar context inside a
 possibly threaded web server.

Maybe it makes sense to have virtual packages like mta-daemon, 
mta-forwarder, etc.? (regardless of which, if any, is installed by 
default)

Kind regards,
Andrei
-- 
http://wiki.debian.org/FAQsFromDebianUser
Offtopic discussions among Debian users and developers:
http://lists.alioth.debian.org/mailman/listinfo/d-community-offtopic


signature.asc
Description: Digital signature


Re: default MTA

2013-05-30 Thread Bernhard R. Link
* Chris Knadle chris.kna...@coredump.us [130529 08:29]:
   - Exim configuration is more human readable than Postifx's, IMHO.
 
 Postfix configuration is concise but terse, and there are typically
 blocks of options separated by commas that doesn't easily allow
 commenting on specific config options.

Configurability is an important point. Having had to use postfix lately
I'm quite suprised anyone voluntarily uses that thing. Postfix feels
like some ad-hoc configuration gone absurd, by only making special use
cases configuable and then misusing those options for other things.
Together with this splitting in many little programs which all lack most
of the information, configuring postfix is a large puzzle and any
advanced postfix configuration (even from the official documentation)
looks like McGyver was out of duct-tape but had to build a nuclear reactor
from kitchen parts with only the transparent tape for office use.

The only positive thing you can say about Postfix' configuration is that
it might be better than sendmail's.

Bernhard R. Link


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20130530091105.ga3...@client.brlink.eu



Re: default MTA

2013-05-30 Thread Carlos Alberto Lopez Perez
On 29/05/13 08:18, Chris Knadle wrote:
   - Exim is more popular
 
 http://www.securityspace.com/s_survey/data/man.201201/mxsurvey.html

This is actually quite interesting.

Given that Postfix is the default MTA on RHEL/CentOS, SLES (SUSE) and
Ubuntu; meanwhile Exim is only the default on Debian (AFAIK).

I wonder if this means that Debian is used in more mail servers than the
rest of the distributions together.



signature.asc
Description: OpenPGP digital signature


Re: default MTA

2013-05-30 Thread Marc Haber
On Wed, 29 May 2013 23:12:39 +0300, Andrei POPESCU
andreimpope...@gmail.com wrote:
On Mi, 29 mai 13, 21:52:04, Marc Haber wrote:
 Yes. And many systems have intermittent connectivity, which rules out
 non-queueing mini-MTAs. Exim does the Job pretty well, and people who
 know what an MTA is will probably install their own anyway, so there
 is no need to change.

Exim is a listening daemon, even if it listens only on localhost in the 
default configuration.

It comes listening on localhost in default configuration. It can be
trivially configured not to listen at all, or to listen on all
interfaces.

Greetings
Marc
-- 
-- !! No courtesy copies, please !! -
Marc Haber |Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom  | http://www.zugschlus.de/
Nordisch by Nature | Lt. Worf, TNG Rightful Heir | Fon: *49 621 72739834


--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1ui00y-0008jk...@swivel.zugschlus.de



Re: default MTA

2013-05-30 Thread Marc Haber
On Thu, 30 May 2013 10:18:07 +0300, Andrei POPESCU
andreimpope...@gmail.com wrote:
Maybe it makes sense to have virtual packages like mta-daemon, 
mta-forwarder, etc.? (regardless of which, if any, is installed by 
default)

Show code, or at least an explanation about how you intend to do that.
How will, for example, the virtual package provided by exim change
depending on the setting for the QUEUERUNNER config option?

Greetings
Marc
-- 
-- !! No courtesy copies, please !! -
Marc Haber |Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom  | http://www.zugschlus.de/
Nordisch by Nature | Lt. Worf, TNG Rightful Heir | Fon: *49 621 72739834


--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1ui02t-0008jy...@swivel.zugschlus.de



Re: default MTA

2013-05-30 Thread Stefano Zacchiroli
On Thu, May 30, 2013 at 12:16:38PM +0200, Carlos Alberto Lopez Perez wrote:
 On 29/05/13 08:18, Chris Knadle wrote:
- Exim is more popular
  
  http://www.securityspace.com/s_survey/data/man.201201/mxsurvey.html
 This is actually quite interesting.
 
 Given that Postfix is the default MTA on RHEL/CentOS, SLES (SUSE) and
 Ubuntu; meanwhile Exim is only the default on Debian (AFAIK).
 
 I wonder if this means that Debian is used in more mail servers than the
 rest of the distributions together.

Indeed it is interesting. Whereas Debian has a majority of GNU/Linux
installation for _web_ servers according to:

  http://w3techs.com/technologies/details/os-linux/all/all

it's a _relative_ majority, smaller than the sum of the other distros
you've cited.

Here's an experimental way to test the assumption of Debian leadership
on the mail server market: let's switch our default to Postfix and see
if the figures change :-) /SCNR
-- 
Stefano Zacchiroli  . . . . . . .  z...@upsilon.cc . . . . o . . . o . o
Maître de conférences . . . . . http://upsilon.cc/zack . . . o . . . o o
Former Debian Project Leader  . . @zack on identi.ca . . o o o . . . o .
« the first rule of tautology club is the first rule of tautology club »


signature.asc
Description: Digital signature


Re: default MTA

2013-05-30 Thread Marc Haber
On Thu, 30 May 2013 04:04:14 +0800, Thomas Goirand z...@debian.org
wrote:
On 05/29/2013 11:32 PM, Javier Fernandez-Sanguino wrote:
 On 29 May 2013 17:11, Josselin Mouette j...@debian.org wrote:
  Le mercredi 29 mai 2013 à 16:31 +0200, Javier Fernandez-Sanguino a
  écrit :
  He will see a notification on his desktop. Clear, understandable and
  translated in his configured language:
  https://git.gnome.org/browse/gnome-disk-utility/tree/src/notify/gdusdmonitor.c
  (The code is different but already here in squeeze and wheezy.)
 I'm happy to see this use case is covered in GNOME.

Me as well.

Though not everyone uses GNOME (someone pointed out earlier in this list
that we have more than 40 window managers in Debian!), and it is
desirable, IMO, to also handle their use case.

I think that people who are able to replace the default desktop with
the desktop of their choice should be trusted to read their local mail
as well. We may document this, but I don't think that we should spend
personpower to provide a technical solution to that. There are things
more important than that.

We should make local mail or other messages trivially and
automatically visible for people who have installed Debian in NNF[1]
compliant way, but if one has gone to length to use something
non-default, I think we can safely trust those people with taking
other measures as well.

Greetings
Marc

[1] Next, next, finish
-- 
-- !! No courtesy copies, please !! -
Marc Haber |Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom  | http://www.zugschlus.de/
Nordisch by Nature | Lt. Worf, TNG Rightful Heir | Fon: *49 621 72739834


--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1ui04x-0008k9...@swivel.zugschlus.de



Re: default MTA

2013-05-30 Thread Scott Kitterman
On Thursday, May 30, 2013 12:16:38 PM Carlos Alberto Lopez Perez wrote:
 On 29/05/13 08:18, Chris Knadle wrote:
- Exim is more popular

  http://www.securityspace.com/s_survey/data/man.201201/mxsurvey.html
 
 This is actually quite interesting.
 
 Given that Postfix is the default MTA on RHEL/CentOS, SLES (SUSE) and
 Ubuntu; meanwhile Exim is only the default on Debian (AFAIK).
 
 I wonder if this means that Debian is used in more mail servers than the
 rest of the distributions together.

Since ~80% of the Exim installations are for an ancient version that AFAIK 
tell from a few moments of checking was never the version in a Debian release, 
I don't think that's it.

Scott K

signature.asc
Description: This is a digitally signed message part.


Re: default MTA

2013-05-30 Thread Bjørn Mork
Ben Hutchings b...@decadent.org.uk writes:
 On Wed, May 29, 2013 at 09:06:59PM +0200, Adam Borowski wrote:
 On Wed, May 29, 2013 at 05:11:35PM +0200, Josselin Mouette wrote:
  Le mercredi 29 mai 2013 à 16:31 +0200, Javier Fernandez-Sanguino a
  écrit : 
   Take for example, smartmoontools [1]. Currently, if an end-user
   installs smartmoontools and a hard-disk fails (i.e. smartd detects a
   problem with one HD) he will *not* see any notification: the failure
   is sent through local e-mail.
  
  He will see a notification on his desktop. Clear, understandable and
  translated in his configured language:
  https://git.gnome.org/browse/gnome-disk-utility/tree/src/notify/gdusdmonitor.c
  (The code is different but already here in squeeze and wheezy.)
 
 What you propose requires:
 * adding desktop environment specific code to every facility that may need
   to send notifications
 * adding such notifications to every other desktop environment

 Wrong, we already have org.freedesktop.Notifications in GNOME,
 KDE and Xfce.

  So those two points become:

 * adding cross-desktop code to every facility that may need to send
   notifications
 * adding a notification daemon to task-lxde

 There are libraries to help with the first point, of course.

Wouldn't a daemon watching /var/mail/root and turning any mail into
desktop notifications solve most of this, while still allowing the same
notifications to reach a sysadmin on non-desktop systems?

The issue that worries me most about these desktop notification plans is
the possibility that some package may decide to unnecessarily drop
support for non-desktop systems, adding dependencies on the desktop
notification system. I believe we already have had a few examples of
such unnecessary dependencies on services which are nice to have, like
GNOME depending on NetworkManager for example.

The Clear, understandable and translated in his configured language
point is unrelated the notification system.  That requirement should be
at least as strict for any mail to root.


Bjørn


--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/871u8opye0@nemi.mork.no



Re: default MTA

2013-05-30 Thread Marc Haber
On Wed, 29 May 2013 19:45:06 -0400, Chris Knadle
chris.kna...@coredump.us wrote:
I don't like the fact that the /etc/exim4/passwd.client 
file is in a plaintext format, but there are usually several such files on 
systems such that realistically we're only really safe as long as the 
machines we run haven't been broken into.

And if you think about things, it is clear that the client needs the
plaintext password to be able to use it.

Even if certificate authentication, the most secure authentication
scheme available today, is used, you need the private key on the
client.

 That's exactly the point, and is why I would prefer not to write those
 notifications into a file that no one ever looks at.  (Which is why I
 don't find sending them to syslog much more appealing, since the average
 desktop user is never going to look there either.)

Somehow this problem reminds me of the event log used on a popular 
operating system.  Most users don't read that log either.

This is partly caused by the utter unusability of the default program
delivered to read that binary log. Even the best Jvaqbjf people I know
need to be poked to use Rirag Ivrjre. Usually, this results in a quick
solution since the Jvaqbjf Event Log isn't as bad as its reputation
past the usual access method. But people rather continue blind
trial-and-error methods before taking a look at their logs.

Btw, I fear that systemd's binary logs are going to import this method
of inefficient work in our world. I surely hope I am wrong on this
count.

Greetings
Marc

-- 
-- !! No courtesy copies, please !! -
Marc Haber |Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom  | http://www.zugschlus.de/
Nordisch by Nature | Lt. Worf, TNG Rightful Heir | Fon: *49 621 72739834


--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1ui08g-0008ps...@swivel.zugschlus.de



Re: default MTA

2013-05-30 Thread Marc Haber
On Thu, 30 May 2013 11:11:06 +0200, Bernhard R. Link
brl...@debian.org wrote:
* Chris Knadle chris.kna...@coredump.us [130529 08:29]:
   - Exim configuration is more human readable than Postifx's, IMHO.
 
 Postfix configuration is concise but terse, and there are typically
 blocks of options separated by commas that doesn't easily allow
 commenting on specific config options.

Configurability is an important point. Having had to use postfix lately
I'm quite suprised anyone voluntarily uses that thing. Postfix feels
like some ad-hoc configuration gone absurd, by only making special use
cases configuable and then misusing those options for other things.
Together with this splitting in many little programs which all lack most
of the information, configuring postfix is a large puzzle and any
advanced postfix configuration (even from the official documentation)
looks like McGyver was out of duct-tape but had to build a nuclear reactor
from kitchen parts with only the transparent tape for office use.

While I don't consider postfix as bad as you describe, I tend to
describe Postfix as the menu in a better restaurant: A relatively
small number of sophisticated dishes which you can choose from, and if
you like them, you will be perfectly satisfied. If you want fries
instead of plain potatoes, you're basically hosed.

Exim, on the other hand, is the fully equipped kitchen with a full
larder and fridge, allowing you to cook exactly what you want, if
you're willing to learn cooking or already bring some cooking
knowledge. This approach might lead to something uneatable, though.

Both solutions have their advantages and disadvantages. People should
be able to choose.

For the default case of an user not knowing what an MTA is, both exim
and postfix are suitable to be the default in Debian. Exim's design is
a bit 1990ies, with a big suid root binary, while Postfix's design is
more modern regarding process structure and privilege separation.

Being biased myself, I'd say not to change a running system and to
keep exim as default. It would be nice to debconfize SMTP auth in the
exim is the client case though, as this is a quite common use case.
With my maintainer hat on, Patches are appreciated.

Greetings
Marc
-- 
-- !! No courtesy copies, please !! -
Marc Haber |Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom  | http://www.zugschlus.de/
Nordisch by Nature | Lt. Worf, TNG Rightful Heir | Fon: *49 621 72739834


--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1ui0gx-kg...@swivel.zugschlus.de



Re: default MTA

2013-05-30 Thread Scott Kitterman
On Wednesday, May 29, 2013 05:11:35 PM Josselin Mouette wrote:
 Le mercredi 29 mai 2013 à 16:31 +0200, Javier Fernandez-Sanguino a
 
 écrit :
  Take for example, smartmoontools [1]. Currently, if an end-user
  installs smartmoontools and a hard-disk fails (i.e. smartd detects a
  problem with one HD) he will *not* see any notification: the failure
  is sent through local e-mail.
 
 He will see a notification on his desktop. Clear, understandable and
 translated in his configured language:
 https://git.gnome.org/browse/gnome-disk-utility/tree/src/notify/gdusdmonitor
 .c (The code is different but already here in squeeze and wheezy.)
 
 I don’t see why he would need to see it again in a cryptic English
 e-mail. You are really looking for a solution to a nonexistent problem.

Desktop notifications are really only useful for informing the user of things 
as they happen.  If the user doesn't happen to be sitting at the screen when 
the notification happens, they'll never know.  Even if they are using a system 
that allows them to go back and review their notification history when they 
return to their system, that's not the normal usage pattern.

Desktop notifications are no more a complete solution to the problem of letting 
the user know than local mail is.

Scott K


--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/5100284.2cAPWE0nHA@scott-latitude-e6320



Re: default MTA

2013-05-30 Thread Carlos Alberto Lopez Perez
On 30/05/13 12:27, Scott Kitterman wrote:
 On Thursday, May 30, 2013 12:16:38 PM Carlos Alberto Lopez Perez wrote:
 On 29/05/13 08:18, Chris Knadle wrote:
   - Exim is more popular
   
 http://www.securityspace.com/s_survey/data/man.201201/mxsurvey.html

 This is actually quite interesting.

 Given that Postfix is the default MTA on RHEL/CentOS, SLES (SUSE) and
 Ubuntu; meanwhile Exim is only the default on Debian (AFAIK).

 I wonder if this means that Debian is used in more mail servers than the
 rest of the distributions together.
 
 Since ~80% of the Exim installations are for an ancient version that AFAIK 
 tell from a few moments of checking was never the version in a Debian 
 release, 
 I don't think that's it.
 
 Scott K
 
Exim 4.69 was shipped with Debian 5.0 (Lenny)

http://archive.debian.net/lenny/exim4



signature.asc
Description: OpenPGP digital signature


Re: default MTA

2013-05-30 Thread Scott Kitterman
On Thursday, May 30, 2013 01:01:46 PM Carlos Alberto Lopez Perez wrote:
 On 30/05/13 12:27, Scott Kitterman wrote:
  On Thursday, May 30, 2013 12:16:38 PM Carlos Alberto Lopez Perez wrote:
  On 29/05/13 08:18, Chris Knadle wrote:
- Exim is more popular

  http://www.securityspace.com/s_survey/data/man.201201/mxsurvey.html
  
  This is actually quite interesting.
  
  Given that Postfix is the default MTA on RHEL/CentOS, SLES (SUSE) and
  Ubuntu; meanwhile Exim is only the default on Debian (AFAIK).
  
  I wonder if this means that Debian is used in more mail servers than the
  rest of the distributions together.
  
  Since ~80% of the Exim installations are for an ancient version that AFAIK
  tell from a few moments of checking was never the version in a Debian
  release, I don't think that's it.
  
  Scott K
 
 Exim 4.69 was shipped with Debian 5.0 (Lenny)
 
 http://archive.debian.net/lenny/exim4

Thanks.  I was looking at it wrong.  It would, however, be a bit surprising if 
1/3 of the mail servers on the internet were running Lenny at this point.  

It's also worth noting that only something like half the servers that provided 
a banner provided enough information to identify the software in use, so I'm 
not sure how much it really tells us.

Scott K

signature.asc
Description: This is a digitally signed message part.


Re: default MTA

2013-05-30 Thread Wouter Verhelst
On 30-05-13 12:27, Marc Haber wrote:
 We should make local mail or other messages trivially and
 automatically visible for people who have installed Debian in NNF[1]
 compliant way, but if one has gone to length to use something
 non-default, I think we can safely trust those people with taking
 other measures as well.

While that's true, if we're going to be make the effort to make sure
such notifications are trivially and automatically visibe for NNF
users, it would be a waste if we didn't do it in such a way that people
who make only the slightest of modifications could benefit from it as well.

If we're making something GNOME-specific, we don't do that. If we make
an application that fits into any fdo-compliant notification area, we do.

-- 
This end should point toward the ground if you want to go to space.

If it starts pointing toward space you are having a bad problem and you
will not go to space today.

  -- http://xkcd.com/1133/


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/51a73882.4010...@debian.org



Re: default MTA

2013-05-30 Thread Wouter Verhelst
On 30-05-13 12:16, Carlos Alberto Lopez Perez wrote:
 On 29/05/13 08:18, Chris Knadle wrote:
   - Exim is more popular

 http://www.securityspace.com/s_survey/data/man.201201/mxsurvey.html
 
 This is actually quite interesting.
 
 Given that Postfix is the default MTA on RHEL/CentOS, SLES (SUSE) and
 Ubuntu; meanwhile Exim is only the default on Debian (AFAIK).
 
 I wonder if this means that Debian is used in more mail servers than the
 rest of the distributions together.

From the bottom of that page:

Exim (465,731 servers)

Version Number of Servers   Percent
4.69368,005 79.02%
4.7636,227  7.78%
4.7220,387  4.38%
4.7710,824  2.32%
4.678,297   1.78%
4.635,689   1.22%
Other   16,302  3.50%

4.69 was the version of exim that shipped with Lenny; squeeze shipped
with 4.72, wheezy with 4.80.

If these are indeed all Debian servers, that would mean that 79.02% of
44.23% of 45.88% of all MX servers queried by these people use a no
longer supported version of Debian.

(79.02%: all exim servers running 4.69; 44.23%: percentage of all
identifiable servers that is running exim; 45.88%: percentage of all MX
servers that is running an identifiable mail server)

-- 
This end should point toward the ground if you want to go to space.

If it starts pointing toward space you are having a bad problem and you
will not go to space today.

  -- http://xkcd.com/1133/


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/51a73b72.6020...@debian.org



Re: default MTA

2013-05-30 Thread Marc Haber
On Thu, 30 May 2013 06:46:46 -0400, Scott Kitterman
deb...@kitterman.com wrote:
Even if they are using a system 
that allows them to go back and review their notification history when they 
return to their system,

It just occurred to me that you are describing a mail client.

Greetings
Marc
-- 
-- !! No courtesy copies, please !! -
Marc Haber |Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom  | http://www.zugschlus.de/
Nordisch by Nature | Lt. Worf, TNG Rightful Heir | Fon: *49 621 72739834


--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1ui1nv-0001ra...@swivel.zugschlus.de



Re: default MTA

2013-05-30 Thread Chris Knadle
On Thursday, May 30, 2013 05:11:06, Bernhard R. Link wrote:
 * Chris Knadle chris.kna...@coredump.us [130529 08:29]:
- Exim configuration is more human readable than Postifx's, IMHO.

  Postfix configuration is concise but terse, and there are typically
  blocks of options separated by commas that doesn't easily allow
  commenting on specific config options.
 
 Configurability is an important point. Having had to use postfix lately
 I'm quite suprised anyone voluntarily uses that thing. Postfix feels
 like some ad-hoc configuration gone absurd, by only making special use
 cases configuable and then misusing those options for other things.

There's a reason it feels like this.  Postfix was designed with security in 
mind, but wasn't focused on being a general purpose MTA.  It happens to /work/ 
pretty well in that role in many cases, though.

   http://shearer.org/MTA_Comparison#Postfix

Exim is exactly the opposite: its design was focused on being a general 
purpose MTA, but wasn't focused on security.  Yet this doesn't mean that Exim 
is insecure.

   http://shearer.org/MTA_Comparison#Exim

 Together with this splitting in many little programs which all lack most
 of the information, configuring postfix is a large puzzle and any
 advanced postfix configuration (even from the official documentation)
 looks like McGyver was out of duct-tape but had to build a nuclear reactor
 from kitchen parts with only the transparent tape for office use.

This feels like a fitting description.  [Postfix's master.cf file is what I 
find the most confusing.]

 The only positive thing you can say about Postfix' configuration is that
 it might be better than sendmail's.

Sendmail's configuration is so unreadable that nobody [in their right mind] 
configures it in the native format and instead does it with m4 scripts.  
However with m4 scripts I think Sendmail configuration might actually be less 
confusing than Postfix's.

  -- Chris

--
Chris Knadle
chris.kna...@coredump.us
GPG Key: 4096R/0x1E759A726A9FDD74


signature.asc
Description: This is a digitally signed message part.


Re: default MTA

2013-05-30 Thread Olav Vitters
On Thu, May 30, 2013 at 12:31:22PM +0200, Marc Haber wrote:
 Btw, I fear that systemd's binary logs are going to import this method
 of inefficient work in our world. I surely hope I am wrong on this
 count.

journalctl gives pretty much exactly the same output as
/var/log/messages and so on. As a side-benefit, instead of using grep,
it indexes various things so you can more quickly filter.

For most use caes though, the switch is rather easy:
  journalctl | grep something
vs
  grep something /var/log/messages

and
  journalctl -f
vs
  tail -f /var/log/messages

So if you don't want to know anything, you don't need to know much.
Further, you can keep another syslog running.

In any case, journal is quite efficient.

-- 
Regards,
Olav


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20130530114817.ga16...@bkor.dhs.org



Re: default MTA

2013-05-30 Thread Olav Vitters
On Thu, May 30, 2013 at 01:31:14PM +0200, Wouter Verhelst wrote:
 If we're making something GNOME-specific, we don't do that. If we make
 an application that fits into any fdo-compliant notification area, we do.

Within GNOME we usually create a freedesktop.org solution, then use that
within GNOME. This is how udisks works. A large generic part, then
another GNOME-specific component.

Seems the solutions are very focussed on the assumption that things
cannot be changed. E.g. programs currently send email, so email it has
to be forever.

-- 
Regards,
Olav


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20130530115601.gb16...@bkor.dhs.org



Re: default MTA

2013-05-30 Thread Olav Vitters
On Thu, May 30, 2013 at 01:51:11PM +0200, Marc Haber wrote:
 On Thu, 30 May 2013 06:46:46 -0400, Scott Kitterman
 deb...@kitterman.com wrote:
 Even if they are using a system 
 that allows them to go back and review their notification history when they 
 return to their system,
 
 It just occurred to me that you are describing a mail client.

Suggest receiving nagios notifications via email. Sometimes when you're
busy your inbox is overloaded with stuff that is already up. Email is
one way of getting notifications, but for desktop things, it is rather
imperfect. Would be kind of funny to receive an email notification via
email though :P

-- 
Regards,
Olav


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20130530120057.gc16...@bkor.dhs.org



Re: default MTA

2013-05-30 Thread Wouter Verhelst
On 30-05-13 13:56, Olav Vitters wrote:
 On Thu, May 30, 2013 at 01:31:14PM +0200, Wouter Verhelst wrote:
 If we're making something GNOME-specific, we don't do that. If we make
 an application that fits into any fdo-compliant notification area, we do.
 
 Within GNOME we usually create a freedesktop.org solution, then use that
 within GNOME. This is how udisks works. A large generic part, then
 another GNOME-specific component.

Sure.

 Seems the solutions are very focussed on the assumption that things
 cannot be changed. E.g. programs currently send email, so email it has
 to be forever.

No, that's not how I interpret the discussion.

Doing important notifications through mail only means that many people
won't see the important notifications due to the way we handle mail by
default currently. So we need to fix that.

However, the mail approach does have certain upsides for large
installations and multi-user systems:
- Regular users can't always see what's in syslog, so getting the output
  of their cron or at jobs there won't help them.
- For the things that really really matter, it makes sense to have them
  sent to a central root mail address, so that in case of a large
  multi-system installation, the sysadmin knows when things go really
  really wrong.

If we configure things so that root mail gets sent to the user that was
created at install time by default, and then install some fdo
notification thing that allows a user to read and mark read or delete
(or both) mails in their local mailbox by default, that should work for
both use cases.

-- 
This end should point toward the ground if you want to go to space.

If it starts pointing toward space you are having a bad problem and you
will not go to space today.

  -- http://xkcd.com/1133/


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/51a7457e.6020...@debian.org



Re: default MTA

2013-05-30 Thread Bjørn Mork
Marc Haber mh+debian-de...@zugschlus.de writes:
 On Thu, 30 May 2013 06:46:46 -0400, Scott Kitterman
 deb...@kitterman.com wrote:
Even if they are using a system 
that allows them to go back and review their notification history when they 
return to their system,

 It just occurred to me that you are describing a mail client.

Let's add biff and we have cross-desktop real-time notification in place
:)


Bjørn


--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/8738t4oe7z@nemi.mork.no



  1   2   3   4   >