Re: PATCH: miltermilter and almost-large messages

2011-05-03 Thread Michael Tokarev
28.04.2011 18:22, Wietse Venema пишет: Michael Tokarev: 28.04.2011 15:08, Wietse Venema wrote: Michael Tokarev: postfix/cleanup: warning: milter8_message: vstream_fseek incoming/4BE085028D: File too large Why is this reported as a 450 4.3.0 error? This should be a permanent error

Re: FYI - Postfix 2.8.2 and CentOS 5.6

2011-05-03 Thread Nikolaos Milas
On 3/5/2011 1:35 πμ, Steve Jenkins wrote: I actually didn't have it in either - I was under the (apparently false) impression that just putting the exclude in yum.conf would apply to any repo. It's in the CentOS-Base.repo file in [base] and [updates] now, tho. Thank you. :) I also have

Re: Selective RCPT TO restrictions.

2011-05-03 Thread Randy Ramsdell
Randy Ramsdell wrote: I am trying to configure a very selective list on who can send to a certain local accounts ( could be many and currently contains maybe 30 ). Currently, this is covered by: smtpd_recipient_restrictions = check_recipient_access

security vulnerability : SMTP daemon supports EHLO

2011-05-03 Thread Roger Goh
Hi, During a VA scan, it's reported that my postfix server has a security vulnerability : EhloCheck: SMTP daemon supports EHLO 1. How can I disable EHLO still send/receive mails? 2. Or is there a later version of postfix (let me know the version) that addresses this or any patch to

Re: security vulnerability : SMTP daemon supports EHLO

2011-05-03 Thread Roger Goh
1 more question: if there's a way to disable EHLO or fixing it via a patch, how do I verify (without running VA scan) that this EHLO vulnerability has been fixed? TIA Roger

Re: security vulnerability : SMTP daemon supports EHLO

2011-05-03 Thread Roger B.A. Klorese
On May 3, 2011, at 8:42 AM, Roger Goh wrote: 1 more question: if there's a way to disable EHLO or fixing it via a patch, how do I verify (without running VA scan) that this EHLO vulnerability has been fixed? What vulnerability?! Who doesn't use EHLO?!?! Perhaps you should use a

Re: security vulnerability : SMTP daemon supports EHLO

2011-05-03 Thread Noel Jones
On 5/3/2011 10:34 AM, Roger Goh wrote: Hi, During a VA scan, it's reported that my postfix server has a security vulnerability : EhloCheck: SMTP daemon supports EHLO EHLO is not a security vulnerability, rather it is a standard feature of SMTP (not just postfix, but all mail servers).

Re: security vulnerability : SMTP daemon supports EHLO

2011-05-03 Thread Reindl Harald
Am 03.05.2011 17:34, schrieb Roger Goh: Hi, During a VA scan, it's reported that my postfix server has a security vulnerability : EhloCheck: SMTP daemon supports EHLO where exactly is the security hole? you should not trust the output of every tool blind without try to understand

Re: security vulnerability : SMTP daemon supports EHLO

2011-05-03 Thread Roger B.A. Klorese
On May 3, 2011, at 8:49 AM, Reindl Harald wrote:Am 03.05.2011 17:34, schrieb Roger Goh:Hi,During a VA scan, it's reported that my postfix server hasa security vulnerability : EhloCheck: SMTP daemon supports EHLOwhere exactly is the security hole?you should not trust the output of every tool blind

Re: security vulnerability : SMTP daemon supports EHLO

2011-05-03 Thread Rich Wales
During a VA scan, it's reported that my postfix server has a security vulnerability : EhloCheck: SMTP daemon supports EHLO As Roger Klorese pointed out, there is an advertised, fuzzy vulnerability advisory out there regarding EHLO. However, as Noel Jones indicated, EHLO is a standard part of

Re: security vulnerability : SMTP daemon supports EHLO

2011-05-03 Thread Roger Goh
Ok, ok, no offence intended. Can we mitigate it somewhat like what Roger Klorese suggested, eg: restrict the info EHLO reveals or don't reveal actual hostname : smtp_helo_name ($myhostname) Use a fictitious hostname to send in the SMTP EHLO or HELO command ( how do I do

Re: security vulnerability : SMTP daemon supports EHLO

2011-05-03 Thread Roger Goh
from the url Roger Klorese provided, http://www.iss.net/security_center/reference/vuln/smtp-ehlo.htm it says : SMTP daemons that support Extended HELO (EHLO) can release information that could be useful to an attacker in performing an attack. Attackers have been known to use the EHLO command

Re: antyspam.onet.pl

2011-05-03 Thread Dominik Schulz
Am Montag, 2. Mai 2011, 12:57:01 schrieb Reindl Harald: Am 02.05.2011 12:49, schrieb Mihira Fernando: how stoopid can anybody be to make server-answers form a spamfilter with 451 in polish and a form nobody out there can read followed by a RED SUCCESS MESSAGE (finding out success after

Re: security vulnerability : SMTP daemon supports EHLO

2011-05-03 Thread Wietse Venema
Roger Goh: Hi, During a VA scan, it's reported that my postfix server has a security vulnerability : EhloCheck: SMTP daemon supports EHLO EHLO is required by the SMTP standard (RFC 5321). Wietse

Re: security vulnerability : SMTP daemon supports EHLO

2011-05-03 Thread Rich Wales
Can we mitigate it somewhat like what Roger Klorese suggested, eg: restrict the info EHLO reveals or don't reveal actual hostname : All the configuration items you mentioned are things that affect what your Postfix will or won't do as a client talking to other servers. These configuration

Re: security vulnerability : SMTP daemon supports EHLO

2011-05-03 Thread Rich Wales
So what other 'vulnerable' configuration information EHLO reveals how they can disabled/mitigated/fabricated ? You may want to suppress the SIZE information (maximum size of a message that your server will accept). Some hackers might take this as a challenge and try to exploit it in a

Silly question but I can't figure it out / postscreen implementation / mail transport unavailable

2011-05-03 Thread Bailey, Damian S.
Hey all, I just updated by backup mail gateway (Postfix/Clam/SA/Amavis) to 2.8 to use postscreen. I followed the instructions from here: http://www.postfix.org/POSTSCREEN_README.html I now keep getting these errors in my mail.log: May 3 13:30:31 ubuntu-spam2 postfix/error[15293]:

Re: security vulnerability : SMTP daemon supports EHLO

2011-05-03 Thread Victor Duchovni
On Tue, May 03, 2011 at 10:00:58AM -0700, Rich Wales wrote: So what other 'vulnerable' configuration information EHLO reveals how they can disabled/mitigated/fabricated ? You may want to suppress the SIZE information (maximum size of a message that your server will accept). Some hackers

Re: Silly question but I can't figure it out / postscreen implementation / mail transport unavailable

2011-05-03 Thread Scott Kitterman
On Tuesday, May 03, 2011 01:36:50 PM Bailey, Damian S. wrote: Hey all, I just updated by backup mail gateway (Postfix/Clam/SA/Amavis) to 2.8 to use postscreen. You may be suffering from this bug: https://bugs.launchpad.net/bugs/764096 a duplicate report:

RE: security vulnerability : SMTP daemon supports EHLO

2011-05-03 Thread Murray S. Kucherawy
-Original Message- From: owner-postfix-us...@postfix.org [mailto:owner-postfix-us...@postfix.org] On Behalf Of Rich Wales Sent: Tuesday, May 03, 2011 9:18 AM To: postfix users Subject: Re: security vulnerability : SMTP daemon supports EHLO I can imagine that some hackers might

Re: milter postfix for the geolocation addresses and headers X-Anti-Abuse

2011-05-03 Thread fakessh
Le lundi 2 mai 2011 17:22, Wietse Venema a écrit : fakessh: hello list hello gurus hello ? Wietse Venema a) Free crystal balls. yes I possess crystal balls some nice numbers thank you b) Free telepathic services. yes I possess powers parapsychic I discuss with a large Indian

Re: security vulnerability : SMTP daemon supports EHLO

2011-05-03 Thread Rich Wales
You may want to suppress the SIZE information . . . . No, this is silly, one is better off advertising the maximum size to avoid the vast majority unnecessary partial transmission of overly large messages. An attacker can tie up SMTP server resources whether the SIZE limit is known or not.

RE: Silly question but I can't figure it out / postscreen implementation / mail transport unavailable

2011-05-03 Thread Bailey, Damian S.
Scott, Thanks, but I don't think this is my issue. (Thought the bugs are good to know!) My mail just isn't being relayed to my email server. I am running Ubuntu, though it's 10.04.2 LTS Damian Bailey | baile...@lcps.k12.va.us Lead Technician | LCPS Technology 540.894.4373x8220 Shipping

Re: Silly question but I can't figure it out / postscreen implementation / mail transport unavailable

2011-05-03 Thread Scott Kitterman
On Tuesday, May 03, 2011 02:14:40 PM Bailey, Damian S. wrote: -Original Message- From: owner-postfix-us...@postfix.org [mailto:owner-postfix-us...@postfix.org] On Behalf Of Scott Kitterman Sent: Tuesday, May 03, 2011 2:00 PM To: postfix-users@postfix.org Subject: Re: Silly

Re: Silly question but I can't figure it out / postscreen implementation / mail transport unavailable

2011-05-03 Thread Wietse Venema
Bailey, Damian S.: May 3 13:30:31 ubuntu-spam2 postfix/error[15293]: 0126F2235EB: to=spam...@lcps.k12.va.us, relay=none, delay=927, delays=927/0.03/0/0.07, dsn=4.3.0, status=deferred (mail transport unavailable) I know it's due to changes I made to activate postscreen, but I honestly

Re: Selective RCPT TO restrictions.

2011-05-03 Thread Randy Ramsdell
Randy Ramsdell wrote: Randy Ramsdell wrote: I am trying to configure a very selective list on who can send to a certain local accounts ( could be many and currently contains maybe 30 ). Currently, this is covered by: smtpd_recipient_restrictions = check_recipient_access

Re: Postscreen: whitelisting by domains

2011-05-03 Thread Benny Pedersen
On Tue, 22 Mar 2011 19:38:22 -0400 (EDT), Wietse Venema Sorry, postscreen will not look up client hostnames. It needs to make a decision in milliseconds time to avoid slowing down good clients. postscreen is perfect if i have permit_sasl_authenticated supported, i have tryed to make this but

Re: security vulnerability : SMTP daemon supports EHLO

2011-05-03 Thread Victor Duchovni
On Tue, May 03, 2011 at 11:15:57AM -0700, Rich Wales wrote: A followup question. If I suppress the advertising of an extended feature by listing it in smtpd_discard_ehlo_keywords, does that also disable the feature? Or do I have to do other things to actually turn a feature off and make it

Re: security vulnerability : SMTP daemon supports EHLO

2011-05-03 Thread Reindl Harald
Am 03.05.2011 19:00, schrieb Rich Wales: So what other 'vulnerable' configuration information EHLO reveals how they can disabled/mitigated/fabricated ? You may want to suppress the SIZE information (maximum size of a message that your server will accept). Some hackers might take this as

Re: Postscreen: whitelisting by domains

2011-05-03 Thread Wietse Venema
Benny Pedersen: On Tue, 22 Mar 2011 19:38:22 -0400 (EDT), Wietse Venema Sorry, postscreen will not look up client hostnames. It needs to make a decision in milliseconds time to avoid slowing down good clients. postscreen is perfect if i have permit_sasl_authenticated supported, i have

Changing SASL Auth from Cyrus to Dovecot

2011-05-03 Thread Simon Brereton
Hi I'm trying to change my SASL auth from Cyrus to Dovecot. I have Dovecot all set up - it's authenticating IMAP users and postfix is using dovecot-lda to deliver mail, but when I changes main.cf to use Dovecot SMTP Auth wasn't working. After a few hours of fruitless searching I finally

RE: Changing SASL Auth from Cyrus to Dovecot

2011-05-03 Thread Simon Brereton
-Original Message- From: Wietse Venema [mailto: Simon Brereton: Hi I'm trying to change my SASL auth from Cyrus to Dovecot. You have not shown any evidence that your Postfix version actually comes with Dovecot support. Actually - because I knew you'd say that - I included

Hildebrandt/Koetter book ch. 16 testsaslauthd -p -u works but Mechanism vs. Method does not work

2011-05-03 Thread david
Hello, recently I purchased the Hildebrandt/Koetter book: Postfix. I read through chapter 16 minus the dialup material. SASL by inspection is great but Simple it is not. I have tried many combinations of Mechanism vs. Method. Ostensibly this translates to chapters 15 16. I have read these over

Re: Hildebrandt/Koetter book ch. 16 testsaslauthd -p -u works but Mechanism vs. Method does not work

2011-05-03 Thread Sahil Tandon
On Wed, 2011-05-04 at 03:41:11 +, da...@davidwbrown.name wrote: [inadequate problem report snipped] The question is: is there anyone in postfix land that has configured SASL successfully in recent history? Yes. Please carefully review the following link:

Re: FYI - Postfix 2.8.2 and CentOS 5.6

2011-05-03 Thread Steve Jenkins
On Tue, May 3, 2011 at 2:48 AM, Nikolaos Milas nmi...@noa.gr wrote: I only have an exclude for postfix* in yum.conf and all upgrades (with yum update) went without problems. My Postfix was not replaced by the distribution's package. Ahhh... found the problem. I had excluded postfix-* instead