Wietse Venema via Postfix-users:
> As part of a non-responsible disclosure process, SEC Consult has
> published an email spoofing attack that involves a composition of
> different mail service behaviors with respect to broken line endings.

Also on-line at httpps://www.postfix.org/smtp-smuggling.html

        Wietse

> A short-term fix may deployed now, before the upcoming long holiday:
> 
> - Postfix 3.9 (stable release early 2024), rejects unuthorised
>   pipelining by default: "smtpd_forbid_unauth_pipelining = yes".
> 
> - Postfix 3.8.1, 3.7.6, 3.6.10 and 3.5.20 include the same feature,
>   but the "smtpd_forbid_unauth_pipelining" parameter defaults to
>   "no".
> 
> Setting "smtpd_forbid_unauth_pipelining = yes" may break legitimate
> SMTP clients that mis-implement SMTP, but such clients are exceedingly
> rare, especially when email is sent across the Internet.
> 
> This short-term fix will stop the published form of the attack, but
> other forms exist that will not be stopped in this manner.
> 
> The longer-term fix stops all forms of the smuggling attacks and is
> in testing. For most sites, this fix will be too late for deployment
> before a long holiday break, when typically production changes are
> not allowed until January.
> 
> Timeline:
> Dec 18 SEC Consult publishes an attack (composition of mail service behaviors)
> Dec 19 Implement fix for Postfix, start testing and Q/A
> Dec ?? Publish updated stable Postfix versions 3.8, 3.7, 3.6, 3.5
> Dec 23 First day of a 10+ day holiday break and production freeze
> 
> References:
> https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/
> 
>       Wietse
> _______________________________________________
> Postfix-users mailing list -- postfix-users@postfix.org
> To unsubscribe send an email to postfix-users-le...@postfix.org
> 
_______________________________________________
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an email to postfix-users-le...@postfix.org

Reply via email to