On 29/12/2021 1:35 pm, Noel Butler via mailop wrote:

On 29/12/2021 03:50, Jaroslaw Rafa via mailop wrote:



It is Roundcube that is actually connecting to Dovecot/Postfix and
receiving/sending mail, not the user's browser, so the connecting IP that
Dovecot/Postfix gets is technically correct. No need to change it. On the
other hand, user's browser is talking HTTP to Roundcube, and Roundcube knows
it's IP address, so Roundcube is the point where restrictions should be
enforced, not Dovecot/Postfix.


Agreed, dovecot doesnt know - nor care - if its kmail, evolution, thunderbird, outlook, RC, imapproxy, or some other client, it's not its job to care.

RC has rcguard which works well, and as mentioned by another poster there is always fail2ban.

Frankly, I don't see any problem that needs addressing, and I guess neither do the RC team if this is as is claimed a "long standing" issue for a small minority.

As to the anti privacy brigade, suck it up, we are network operators, if we want to know who they are, we can, just means we have to multitask looking at two logs, i mean FFS, how hard is that, you already do this tracking local spammers actions and then looking them up in CRM or radius, or some other database.

get over it.


A bit harsh.

I use Roundcube myself and as a /user/ of the software, it hadn't occurred to me that, much like Gmail, people who send emails using this webmail tool have /full anonymity/ (except, of course, from the service operator).

In the case of Gmail we know that it's simply too big to police effectively, so we see a lot of malicious email come from gmail accounts and there's nothing that the recipient can do to identify the /actual/ source. We can report it to Google and hope they do something with it (black hole, never a response to a report) and whilst i'm sure a small percentage of people are diligent in doing this, the vast majority will never bother.

Similarly if you're a /good/ mail platform operator, you won't have a problem with cross-referencing two logs (as you say) but from the recipients perspective, all they have is the details of the server that generated the email.. they're relying on your good practices to ensure that something will come of a spam report they may place.

So your attitude is fine if you're a /good/ platform operator /and the victim knows this/.  ... or the victim will decide there's not enough incentive to report, and will remain a victim, and you (for all your good intentions) could remain oblivious to a spammer (or compromised account) in your midst.  Much as I'm sure Google are.  (And Google have the added advantage of being too-big-to-block... and whilst i'm sure they are doing /something/ about abuse reports filed with them... there's little evidence of this to an end-user/victim...)

I for one look forward to Roundcube building in the option to have the web IP included in headers, but i'm small enough fry that it's probably not a problem for me... after all i'm not the victim here. But with a victims perspective in mind, feels like it'd be nice to show some public accountability. (And your IP address shouldn't be treated as PII kid-gloves... you expose it every time you access network resources)

Mark.
_______________________________________________
mailop mailing list
[email protected]
https://list.mailop.org/listinfo/mailop

Reply via email to