Hi. On 26.08.14, 12:25, Craig R. Skinner wrote: > On 2014-08-25 Mon 21:40 PM |, giacomo wrote: > > > > > > Join the Postfix users mailing list (http://www.postfix.org/lists.html) > > > > > > Send them a problem description & the output of both: > > > $ postconf -nf > > > $ postconf -Mf > > REALLY: Join the Postfix users mailing list and send them the output.
Excuse me I don't read carefully this part. Ok, I send it on postfix mailing list. > > > > > > > Sorry I can help further as I don't use SSL with SMTP as it can't be > > > enforced throughout a message's life - therefore I consider it a false > > > sense of security. > > > > Which is a solution, for you, to increase the security for connections from > > the outside > > , for example with a portable device (laptop,smartphone, etc) using a > > OpenBSD system? > > > > SMTP is not a point to point protocol, it is a redundant store & forward > protocol. SSL/TLS was an afterthought, and may be optionally negotiated > for each hop. The security of the channel is never guaranteed for each > leg of the journey. And the next hop never promises to encrypt the > onward connection. > > Mail gateways may accept an encrypted connection & forward it in clear > text to a LAN M$ exchange, Solaris or Loonix box. You don't know. Some > organisations also use 3rd party off-site MX backup boxes as well. Who > knows what they do with mail, and what route they forward it onwards by. > > Want proof? Send me a mail from your SSL/TLS MTA & watch the logs as the > message is sent in clear text to Scotland. I'll reply and you'll see > from your logs that your fancy SSL set up is ignored, and the message is > accepted by your box in plain text. > > Even if the message does (by random chance) happen to travel via an > encrypted channel, it then sits in clear text on Goatmail, Snotmail, > Yahtwits or AOL.con's servers for government agencies around the world > to read - years after it is 'deleted'. > > SMTP is resilient, but insecure. > > The best that can be done is to have the user PGP encrypt their message > before sending. To protect the user's authentication credentials on port > 587 is to use rather weak digest auth. > e.g: > 250-AUTH CRAM-MD5 > > NOT: > 250-AUTH PLAIN > 250-AUTH LOGIN > > Using SSL for SMTP-submission, IMAP or POP is to deceive users into > thinking their mail is secure. It is a lie. > > Otherwise, both ssh to a box & chat locally. > > Or use something like SILC: > http://en.wikipedia.org/wiki/SILC_%28protocol%29 Many thanks for the explanation. -- Isaia Luciano ---------------------------------------------- Le informazioni contenute nella presente e-mail e nei documenti/files eventualmente allegati sono confidenziali. Essi sono riservati esclusivamente al destinatario della stessa. La loro eventuale comunicazione, diffusione o, comunque, rivelazione a terzi, nonche' la copiatura e/o conservazione e' vietata. Se avete ricevuto questa e-mail per errore, Vi preghiamo cortesemente di informare immediatamente il mittente della stessa e di distruggerla o, comunque, cancellarla dal Vostro sistema. This e-mail contains confidential and/or privileged information. If you are not the intended recipient (or have received this e-mail in error), please notify the sender immediately and destroy this e-mail. Any unauthorised communication, diffusion, disclosure and copy of the material in this e-mail is strictly forbidden. ----------------------------------------------

