Re: [exim] greylisting and spf

2022-03-14 Thread Niels Dettenbach via Exim-users
Am Freitag, 11. März 2022, 13:31:22 CET schrieb Zakaria via Exim-users:
> Yet, this is my experience so far with spam. I started my mail server setup
> in mind to configure Greylisting, and once I came to it, I decided to drop
> it down. I just found it unnecessary with SpamAssassin and Pyzor scanning
> along with EXIM DNS black lists test, DANE, DKIM, SPF, DMARC and ARC
> validation. Whenever any of these validation measures fails, I add unique
> relevant “ could be spam " header, and use pigeonhole to rewrite subject
> and forward it to spam folder. I get very rarely spam emails, and if I do,
> I know what kind of failure it ended up with in spam, mostly marked spam
> content from SA or DKIM, SPF and recently ARC verifying fails.

...for us, greylisting (with SA at SMTP time) - beside all of this mechanisms 
incl. further weighted DNSBL results - still is a important part of the 
chain, even if mainly higher volume and/or more widely known / "older" mail-
addresses / mailboxes profit from (which get a high amount of spam).

Most of these mechs only validate the "technical source", but not if it's 
spam. There is atill lot of spam (at least spam for our users) outgpoing from 
mass hosters like hotmail, gmail and Co. which provide "valid" email senders 
/ connections.

As typical, we lead "grey" stuff only to greylisting - with "self learning" to 
avoid further greylist delays for known white "connections" (sender/
recipient). This typicall lead to a few more delayed emails at the beginning 
for new email users - but after time only a very small percentage of emails 
are delayed to the user thorugh the greylisting mech.


just my .02$,


niels.


-- 
 ---
 Niels Dettenbach
 Syndicat IT & Internet
 https://www.syndicat.com
 PGP: https://syndicat.com/pub_key.asc
 ---
 





signature.asc
Description: This is a digitally signed message part.
-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] Better way to deal with phished users?

2021-07-05 Thread Niels Dettenbach via Exim-users
Am Montag, 5. Juli 2021, 13:19:45 CEST schrieb Niels Kobschätzki:
> The moment I identify them I lock them out of the system, remove all their
> mails in the queues and they have to reset their password before they can
> do anything again. The problem is the identification because you usually
> get to know it only, when the accounts are actively misused. If I get to
> know that users where specifically targeted I inform them. And at 2am in
> the night it might already be too late (you landed yourself on blacklists)
> - even though you still kick them from the system.

...beside exims "ratelimiting" (which is just lowering the impact at the cost 
of all users) - is there any way to monitor the webmail webserver or 
application logs from your webmail system (most known webmail solutions do/
allow some way to log with "username")? If someone sends out hundreds of 
mails per hour per webmail, this is probably bot behaviour (fail2ban or 
similiat tools may help then reacting with "some command")...

just as an idea...


niels.


-- 
 ---
 Niels Dettenbach
 Syndicat IT & Internet
 https://www.syndicat.com
 PGP: https://syndicat.com/pub_key.asc
 ---
 







-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] Better way to deal with phished users?

2021-07-05 Thread Niels Dettenbach via Exim-users
Am Montag, 5. Juli 2021, 09:04:16 CEST schrieb Niels Kobschätzki:
> On 5 Jul 2021, at 7:54, Niels Dettenbach via Exim-users wrote:
> Phished users are users from my mail system which are proven regular users
> who have their accounts for years and whose credentials got compromised
> and are now suddenly used for sending spam- or phishing mails from my mail
> system to other systems (and in that special case they are using the
> Webmail-interface to send out mails and thus they really look like normal
> users from the point of view of the mailing system).
> 
> Thus I want to prevent sending out spam/scam mails from my system to others
> (yes I already have diverse counter-measures in place but for the kind
> mentioned above they all Gail  and I have to intervene manually)
ouch,

ok.

>From my view, the primary way is to force the users to set new credentials 
(if you really mean access credentials - like passwords). As a network / 
email operator on the internet, by "netiquette" it is your responsibility to 
minimize / block abusive traffic from your systems.

At least some countries have regulations by law forcing you to do this (at 
least if you "get aware of").

Until that you may strongly ratelimit or block such users (if you could 
identify them and if it is possible with your contracts / policies) to avoid 
harm to others and (not at least) your own email system (reputation etc.).


best regards,


niels.
-- 
 ---
 Niels Dettenbach
 Syndicat IT & Internet
 https://www.syndicat.com
 PGP: https://syndicat.com/pub_key.asc
 ---
 







-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] Better way to deal with phished users?

2021-07-05 Thread Niels Dettenbach via Exim-users
Am Montag, 5. Juli 2021, 05:40:04 CEST schrieb Niels Kobschätzki via Exim-
users:
> I have again and again problems with phished users.
just my view to this:

what are "phished users"?

email addresses are (by idea) no "secrets". "Secreting" mail addresses as a " 
anti spam measure" is just weird and - as the current "hotmail" spam shows it 
- widely useless. 

Minimize spam could and should be the issue of the regarding email isp / 
admin / hostmasters, independend from how "old" and widely used a email 
adress is and how open it is shown in the web etc..

These "current" hotmail CC spam in most cases is coming from outlook.com 
servers (Microsoft) and it is their thing to solve that - if not, their 
senders get a problem because of a horrible reputation of their email 
provider.

For us, we solved it by giving hotmail.com senders a significant "lower 
reputation" until Microsoft solves this.


just my .02$


niels.


-- 
 ---
 Niels Dettenbach
 Syndicat IT & Internet
 https://www.syndicat.com
 PGP: https://syndicat.com/pub_key.asc
 ---
 







-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] Change PAM service name

2020-09-17 Thread Niels Dettenbach via Exim-users


Am 16.09.2020 um 23:48 schrieb Yves Goergen via Exim-users 
:
> 
> > The PAM module is initialized with the service name “exim”
> 
> Can I change this? Is there a config option or something or should I give up 
> my search and change my PAM configuration? I'd like to share the service with 
> Dovecot (IMAP, POP3) to simplify the backend and prefer not to use the name 
> "exim" for Dovecot as it could be confusing, but rather a generic name like 
> "email".

Just a potential alternative: just use symbolic links in /etc/pam.d for 
different service names who should use the same pam service config.

but without checking byself, i would expect you‘ll find some regarding 
variables in 
src/globals.c or
src/globals.h

if not in the Makefile template.

have fun,


niels.


—
Niels Dettenbach
https://www.syndicat.com
https://www.syndicat.com/pub_key.asc



-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] mysql config

2020-08-14 Thread Niels Dettenbach via Exim-users
Am Mittwoch, 12. August 2020, 18:33:52 CEST schrieb Dan Egli via Exim-users:
> I'm trying to setup exim to read a mysql database to identify users and
> their maildirs. I used an example from the internet but apparently it's for
> too old a version of exim or something because it says the router should
> use the aliasfile driver,but exim says it can't find an aliasfile driver.

I use such routers (with redirect - just a simple example):

mysql_aliases:
driver  = redirect
allow_fail
allow_defer
data= ${lookup mysql {MYSQL_LOCAL_DEST}{$value}}
user= mail
file_transport  = address_file
pipe_transport  = address_pipe



somewhere top in global config:

# MySQL connection
## MySQL defines
MYSQL_SERVER=localhost
MYSQL_USER=maildb
MYSQL_PASSWORD=**
MYSQL_DB=maildb
hide mysql_servers = "MYSQL_SERVER/MYSQL_DB/MYSQL_USER/MYSQL_PASSWORD"

MYSQL_DOMAIN=SELECT DISTINCT domain_name FROM domaindb WHERE 
domain_name='$domain'
MYSQL_LOCAL_DEST=SELECT dest FROM aliasesdb WHERE alias='$local_part@$domain' 
OR alias='$local_part'

# you should adapt the SQL to your database structure / layout.

You may use 

   exim -bt -d t...@domain.tld

to debug the address resolution / routing etc. from console.

Not sure if this is conform to the new de-taint mech in exim 9.94, but it still 
seems to work.


hth,


niels.

-- 
 ---
 Niels Dettenbach
 Syndicat IT & Internet
 http://www.syndicat.com
 PGP: https://syndicat.com/pub_key.asc
 ---
 







-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] av_scanner and Sophos 9

2020-06-26 Thread Niels Dettenbach via Exim-users


> Am 26.06.2020 um 23:19 schrieb Heiko Schlittermann via Exim-users 
> :
> 
> Hi,
> 
> does anybody use Sophos 9 
> 
>   SAV: 9.16.0, Engine: 3.77.1, Data: 5.76
> 
> as av_scanner with Exim? If yes, how? The sophie type of av_scanner
> seems to work half-a-way, Sophos detects the malware, but doesn't report
> it back to exim.


Hi Heiko,

i still use amavis-ng for av integration (only - no sa) in exim, because it 
offers more decicated functionality and runs on external host with many 
standard av scanners (without own email integration).

reporting is done by amavis - so the report does not provide any details about 
the av products used..


greetz,


niels.

—
Niels Dettenbach
https://www.syndicat.com
https://www.syndicat.com/pub_key.asc
-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] Mail Content-Scanner

2020-04-16 Thread Niels Dettenbach via Exim-users


Am 16.04.2020 um 16:38 schrieb basti via Exim-users :
> 
> Any suggestions?
Expand clamav with commercial subscriptions from third parties.

niels.

—
Niels Dettenbach
https://www.syndicat.com
https://www.syndicat.com/pub_key.asc
-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] Are there any good tutorials on setting up Exim MTA/SMTP Server?

2020-03-31 Thread Niels Dettenbach via Exim-users
Am Montag, 30. März 2020, 15:01:00 CEST schrieb Turritopsis Dohrnii Teo En 
Ming via Exim-users:
> I have deployed cPanel web hosting control panel before and Exim was
> installed and configured automatically by cPanel.
> 
> If I want to install Exim as a standalone MTA/SMTP server, are there any
> good tutorials which I can follow?
There are many ones - for many application scenarios - with more or less 
focus on security / anti spam and such, but even more important for different 
combinations with third party software to "form" "typical" "mailservers" 
(i.e. with cyrus, dovecot, xSQL, user management, anti spam / anti virus 
solutions etc. - and this is still except higher scale setups...). So it 
really depends from what your "target application" is and in which 
"environment" you want to place it.
 

-- 
 ---
 Niels Dettenbach
 Syndicat IT & Internet
 http://www.syndicat.com
 PGP: https://syndicat.com/pub_key.asc
 ---
 







-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] html vacation message

2019-12-17 Thread Niels Dettenbach via Exim-users
Am Dienstag, 17. Dezember 2019, 13:12:31 CET schrieb Andrew McGlashan via 
Exim-users:
> I've had vacation messages set up for years, but they have always been
> plain text content.
> 
> How can I provide html content for the vacation message?


hmm,
at leats rfc 5230 has something like this

--- snip ---
   require "vacation";
   vacation :mime text:
   Content-Type: multipart/alternative; boundary=foo

   --foo

   I'm at the beach relaxing.  Mmmm, surf...

   --foo
   Content-Type: text/html; charset=us-ascii

   http://www.w3.org/TR/REC-html40/strict.dtd;>
   How to relax
   http://home.example.com/pictures/;>
   I'm at the beach relaxing.
   Mmmm, surf...
   

   --foo--
   .
--- snap ---

but not tested that on EXIMs SIEVE stack.

But if remember correctly, this is not a good idea nor "recommended" to do 
that for some compatibility reasons - but i'm not remembering why (DSN stuff 
or disabled mime extension on most platforms for sec reasons?).

has someone a clearification on hand?


niels.

-- 
 ---
 Niels Dettenbach
 Syndicat IT & Internet
 http://www.syndicat.com
 PGP: https://syndicat.com/pub_key.asc
 ---
 







-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] Major confusing with manual compile of Exim

2019-11-04 Thread Niels Dettenbach via Exim-users
Am Montag, 4. November 2019, 11:43:51 CET schrieb Odhiambo Washington via 
Exim-users:
> root@gw:/usr/local/SRC/Exim/exim-4.93-RC1 # make
> /bin/sh scripts/source_checks
> `Makefile' is up to date.
> 
> gcc buildconfig.c
> make[1]: exec(gcc) failed (No such file or directory)
> *** Error code 1

...just a shot in the dark:

Did you created the Makefile in "Local" (Local/Makefile) as described in the 
original exim install docs? 

The Makefile in the project root references it - see i.e. section "all:" in 
the top Makefile.


good luck,


niels.

-- 
 ---
 Niels Dettenbach
 Syndicat IT & Internet
 http://www.syndicat.com
 PGP: https://syndicat.com/pub_key.asc
 ---
 







-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] data timeout on connection

2019-10-28 Thread Niels Dettenbach via Exim-users
Am Dienstag, 22. Oktober 2019, 13:19:28 CET schrieb Hardy via Exim-users:
> I didn't change effectively anything, neither to cause nor to resolve
> the problems, and the sender sides were too many different ones as I
> would think it plausible they had a problem.
> 
> Some of you in this list suggested mis-aligned network. I suspect this
> happened on my hoster's part. They did not communicate any problem,
> though. I suspect they misconfigured and corrected silently, whatever it
> was. According to my logs this situation lasted for about 12+ hours.
I would add a +1 here for this because i did not found any further prob yet 
since weeks now, but we are "hosting" byself anything - except the BGP gates 
- with "plain internet access". i've contacted our NOC / upstream partner for 
this while he had no clue at all about this effect - so i putted this 
beside...

Possibly any proprietary) routing / network firmware of a (Tier 1?) IP 
"network device" got updated in the last?

bit crazy...

thanks  to you guys for sharing your details and the logging hints.


niels

-- 
 ---
 Niels Dettenbach
 Syndicat IT & Internet
 http://www.syndicat.com
 PGP: https://syndicat.com/pub_key.asc
 ---
 





-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] SMTP error from remote mail server after pipelined MAIL

2019-09-28 Thread Niels Dettenbach via Exim-users
Am Samstag, 28. September 2019, 03:26:27 EDT schrieb Graeme Fowler via Exim-
users:
> On 28 Sep 2019, at 07:48, necktwi via Exim-users  
wrote:
> > you made me to compramise my identity? does strace.log and exim.log even
> > contain my private key?
> No, he’s not “made” you do anything, he suggested some diagnostics be
> provided for the issue you’ve reported.

Afair it is "common practice" that the Sender of Logs or Traces is 
responsible for what he sends (and what parts to "anonymize" how far) to 
Third Parties - because he knows what data he want not published to any 
thirds - and take over the work for it byself.

-- 
 ---
 Niels Dettenbach
 Syndicat IT & Internet
 http://www.syndicat.com
 PGP: https://syndicat.com/pub_key.asc
 ---
 







-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] for europeans only: EU GDPR and mitigation of CVE-2019-15846

2019-09-06 Thread Niels Dettenbach via Exim-users
Am Freitag, 6. September 2019, 14:37:23 CEST schrieb Cyborg via Exim-users:
> Article 32 p 1 EU GDPR states, that the transport of personal data has
> to be protected,

I know that cr**, but:

 - just "forcing" TLS is not "securing", because many servers until today use 
certificates without a certificate signed from the x509 CA "mob" (BA - who 
financed the "encrypt everything" campaign in EU, W3org and others). 

 - if a user decides to send his emails without encryption (senders as 
recipients in Email are responsible for their "own side", incl. MX as MTA on 
their side - if they (whyever) decide not to use encryption (i.e. because 
they are only allowed to send unencrypted because of their local law), this 
should be "their thing".

This EU law is still producing a huge amount of new law insecurity (because 
of i.e. contradictory rules as policies with very wide rooms for 
interpretations) and existencial fines (for companies - not really for public 
/ gov entities for which services you can't decide...) are existencially. by 
this law, even a post card (service) could be "violating"...

The internet is a global network of non geolocatable users and it is ugly how 
that EU law is still affecting non-EU companies (see i.e. the destroyed WHOIS 
of many non-EU Registries) and limits our access to non EU news sources and 
other services, because they block "EU" users 451 to avoid any "trouble".

Don't get me wrong here - i'm a huge fan of personal data security in the 
meaning of informational self determination and encryption is (only) one 
important tool for - but this law works vice versa / abusive in reality. 
There are many options for Email users to "secure" their Email against what 
they want (we know, there is no "100% secure against anything...") - i.e. by 
deciding for any kind of security-granting provider, (foreign) VPN services 
or by really end-to-end encrypt their stuff with PGP or S/MIME.
 
> Thats also the reason, why you have
> to use https with contact forms in websites since 2016 )
...so that users "know they are secure without to check byself that the lock 
is closed" - while that's not true (but the business principle mof the BA CA 
"mob" until today). Which user is checking only one Certificate Path in 
reality?


just my .02$,


niels.

-- 
 ---
 Niels Dettenbach
 Syndicat IT & Internet
 http://www.syndicat.com
 PGP: https://syndicat.com/pub_key.asc
 ---
 







-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] While expecting fix for CVE-2019-15846

2019-09-05 Thread Niels Dettenbach via Exim-users
Am Donnerstag, 5. September 2019, 11:37:27 CEST schrieb Konstantin Boyandin 
via Exim-users:
> Just curious, whether Exim is regularly tested for vulnerabilities as
> it's developed?

This is a bit simple view onto software security. There is no internet 
software without any security issues as it is impossible to "write secure 
software".

At least one of the CVEs was initiated by a exim developer who found problems 
while working on "his" own (earlier) code - this is not a "standard case" in 
many OS software projects (even less proprietary).

And at least some of the CVE only affected a sub-amount of the users.

>From my view it seems that EXIMs code is getting much more auditing attention 
since 2019 then before (what - for mke - is a good sign).


> The critical security updates are being announced way too often last
> year.
hmm, another option would be to choose software which did not get any 
security updates, because no one checks / audits them so far or if, publishes 
it's knowledge to the users

regular / fast security updates / patches are necessary on any internet host 
today (is no "honeypot" or similiar) - independent from exim.


best regards,


niels.

-- 
 ---
 Niels Dettenbach
 Syndicat IT & Internet
 http://www.syndicat.com
 PGP: https://syndicat.com/pub_key.asc
 ---
 







-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] Exim and Postfix

2019-08-28 Thread Niels Dettenbach via Exim-users
Am Mittwoch, 28. August 2019, 10:12:36 CEST schrieb Viktor Dukhovni via Exim-
users:
> So the key architectural difference is that Postfix is not
> a single monolithic program, but a collection of programs
> that handle various aspects of message processing.  Monolithic
> programs are more difficult to secure.
No.

The "regular" EXIM setup includes the building from sources after Your 
customized configuration what to build into that monolith. While exim 
potentially offers a large amount of features and interfaces, in practice only 
a few of them are required in a typical setup and if you build "your" Exim 
byself, only these code/functionality is part of the monolith.

This allows to minimize the amount and surface of any security related access 
vectors. But even if you use pre-built binaries with "the most options 
active" there is no real difference between monolithic or multilithic MTAs 
regarding security, because most emails are processed by multiple / all 
"similiar" parts just over multiple binaries/processes (which typically are 
not really "more secured" against each other). Just parts of "process-
communication" is "just" external - i.e. over sockets.

And even with exim you get multiple binaries for different administrative 
tasks.

That the most Linux distros today prefer (or based on) binary distribution 
(and the most (end-)users use that way for installation of their exim) is 
another topic...

just my .02$



niels.

-- 
 ---
 Niels Dettenbach
 Syndicat IT & Internet
 http://www.syndicat.com
 PGP: https://syndicat.com/pub_key.asc
 ---
 







-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] Extra copies of list mail (was Re: CVE-2019-10149: already vulnerable ?)

2019-06-26 Thread Niels Dettenbach via Exim-users
Am Dienstag, 25. Juni 2019, 16:08:08 CEST schrieb Russell King via Exim-
users:
> > I entirely concur, but it is an understandable error given what the
> > mailing
> > list is now doing to sidestep DMARC risks:
> Yes, but there's more points on this subject too...
> 
> Given that different lists have different policies, and that it takes
> a mental decision by the replier to choose the correct reply method,
> it seems to me that mistakes will happen.

I did it conscious as i've found it is "usual" on several to "many" other 
mailing lists i'm on. But may be this is bad practice by any common or list 
specific netiquette or rfc i didn't read yet. Most of the lists are not about 
email expertise...

Beside interferences from DMARC and similiar, many (at least large) lists 
have significant "delays" of up to several hours it takes to at least some 
recipients got mailed, leading sometimes to "confusions" or "broken" 
discussions and some list members use filters on list traffic to forward it 
into 
some IMAP folder or similiar for a private "list archive" and read that only 
sporadically.

And if i add the senders address, (at least by my intention) "show" him 
"technically" that i will accept off-list answers from him too if he want to 
decide for (i.e. if it not fit's the list audience).

At least for me it is no "burden" if someone adds me "twice" (on/off-list), 
but in respect of others here i will not follow this practice further. sorry 
for the noise.

many thanks and
best regards,


niels.

-- 
 ---
 Niels Dettenbach
 Syndicat IT & Internet
 http://www.syndicat.com
 PGP: https://syndicat.com/pub_key.asc
 ---
 







-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] CVE-2019-10149: already vulnerable ?

2019-06-25 Thread Niels Dettenbach via Exim-users
Am Dienstag, 25. Juni 2019, 15:03:02 CEST schrieb Jeremy Harris via Exim-
users:
> Indeed; but only the banner was being asked about.
ok, sorry for the noise. for me, the the Recvd header is a kind of "banner" 
too. seems a misunderstanding from my side.

> You're interested in received_header_text, I suspect.
possible too - but easy to "break" any less known rfcs or "expected 
practices" without a proven "default" and so deeper experience about that - 
and i was not sure if EXIM does publish that string in any other possible 
remote "access vector" too.
 

-- 
 ---
 Niels Dettenbach
 Syndicat IT & Internet
 http://www.syndicat.com
 PGP: https://syndicat.com/pub_key.asc
 ---
 





signature.asc
Description: This is a digitally signed message part.
-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] CVE-2019-10149: already vulnerable ?

2019-06-25 Thread Niels Dettenbach via Exim-users
Am Dienstag, 25. Juni 2019, 13:53:26 CEST schrieb Jeremy Harris via Exim-
users:
> No recompile needed.  smtp_banner.
This only set's the banner, but not the SMTP-Headers " by " which are 
"public" too and used as a idicator for "security researchers" (by my 
experience) - i.e. germany BSI.

hth,


niels.
-- 
 ---
 Niels Dettenbach
 Syndicat IT & Internet
 http://www.syndicat.com
 PGP: https://syndicat.com/pub_key.asc
 ---
 





signature.asc
Description: This is a digitally signed message part.
-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] The most used Exim version is the vulnerable one

2019-06-11 Thread Niels Dettenbach via Exim-users
Am Dienstag, 11. Juni 2019, 18:57:41 CEST schrieb Konstantin Boyandin via 
Exim-users:
> If I am not mistaken, CentOS 6.10 EPEL didn't apply any patches,
> original Exim 4.91 is still their last version.

The "initial official" date for patch releases was "officially set" by Exim 
project / security list onto the 11.06.2019 (today) - so possibly some "less 
aware" (LTS) distributors will use that date ("in respect for the project") 
for their release...

The distros i.e. i work with mainly (i.e. Gentoo, different BSDs etc.) are 
"on" 4.92 "since published". Debian seems announced/released patches too:
https://security-tracker.debian.org/tracker/CVE-2019-10149

RedHat (Enterprise) seems "not affected":
https://access.redhat.com/security/cve/cve-2019-10149
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10149

> So either build manually, or switch to another MTA, or hope that
> "allowed chars" trick will be good enough protection.
or switch to a "proper distro"...ß)


-- 
 ---
 Niels Dettenbach
 Syndicat IT & Internet
 http://www.syndicat.com
 PGP: https://syndicat.com/pub_key.asc
 ---
 





signature.asc
Description: This is a digitally signed message part.
-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] Trouble compiling Exim 4.92

2019-06-06 Thread Niels Dettenbach via Exim-users
Am Donnerstag, 6. Juni 2019, 10:09:20 CEST schrieb Luca Bertoncello via Exim-
users:
> I have these lines in Local/Makefile:
> 
> SUPPORT_SPF=yes
> CFLAGS  += -I/usr/include
> LDFLAGS += -L/usr/lib -lspf2
> 
> and of course I have libspf2 (and dev...) installed.
> I'm using a Debian Jessie.

Do you have

   -lspf2

in 
   LOOKUP_LIBS

too? It seems, i need this.

You may even try to enable.

   EXPERIMENTAL_SPF=yes
   SUPPORT_SPF=yes

and (just for sure) dont forget to do a 

   make clean

before try another build with this.


hth
best regards,



niels.
-- 
 ---
 Niels Dettenbach
 Syndicat IT & Internet
 http://www.syndicat.com
 PGP: https://syndicat.com/pub_key.asc
 ---
 







-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] anti-spam pointers please

2019-04-02 Thread Niels Dettenbach via Exim-users
Am Dienstag, 2. April 2019, 09:20:26 CEST schrieb Rory Campbell-Lange via 
Exim-users:
> required_score 3.0
this is very low from my experience (if you work with "default" SA setup - 
especially if you enabled  most of the available extensions). This typoically 
leads to a lot of false positives if you have a typical SA setup. If you have 
most extensions disabled, then 3.0 may be "fitting", but then SA could not 
recognize spam well, because it has not much facts to decide / value a email.

SA default is 5.0 which is a good value for "typical" personal usage. 2.5-3.0 
is more typical for greylisting or similiar more "soft" limits.

Typcial values in multi-user environments are around 5.0-7.0, while every 0.1 
is important. If you go under 5.0 you (very) propably will loose some ham. On 
a machine with around 200.000 SMTP sessions per day i tweaked the score over 
monthes in a range of 0.4 to find working results.

With further own extensions (or score "additions" in EXIM) the score could 
rise further - so even a bit higher values may required.


hth a bit,
best regards,


niels.


-- 
 ---
 Niels Dettenbach
 Syndicat IT & Internet
 http://www.syndicat.com
 PGP: https://syndicat.com/pub_key.asc
 ---
 







-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] local_scan_path change ?

2019-03-29 Thread Niels Dettenbach via Exim-users
Am Freitag, 29. März 2019, 11:08:04 CET schrieben Sie:
> Right at the top of the Changelog:
many thanks,

rtfm seems still a good advise sometimes...ß)

so i try to solve or "backport" it for the regarding setup here by diggin 
sources or find a "alternative" to fully substitute sa-exim with the new 
spamc/d interface or so.

many thanks for help pointin me.


best regards,


niels.

-- 
 ---
 Niels Dettenbach
 Syndicat IT & Internet
 http://www.syndicat.com
 PGP: https://syndicat.com/pub_key.asc
 ---
 







-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] local_scan_path change ?

2019-03-29 Thread Niels Dettenbach via Exim-users
Am Freitag, 29. März 2019, 07:08:08 CET schrieb Thomas Krichel via Exim-
users:
> Something seems very wrong here. I'm afraid it could be me.
I'm in similiar situation btw...ß) 

It seems local_scan.c ist not longer called / used in sa-exim setups since 
>=exim 4.92 builds - tried that yesterday (own EXIM build on NetBSD). Until 
now i didn't find any time to investigate the changes in exim sources yet - so 
any tip / hint is welcome here too...ß)

many thanks for any hints.


best regards,


niels.
-- 
 ---
 Niels Dettenbach
 Syndicat IT & Internet
 http://www.syndicat.com
 PGP: https://syndicat.com/pub_key.asc
 ---
 







-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] Spam though my server

2019-02-19 Thread Niels Dettenbach via Exim-users
Am Dienstag, 19. Februar 2019, 15:57:07 CET schrieb Sebastian Nielsen via 
Exim-users:
> Most better firewalls do have an built-in country/GeoIP database, if not,
> you can easily add one.
GeoIP is far from "reliable" for any SMTP/MTA, as there is no geolocation of 
a IP address. It offers only a "probably in this country" info in context of a 
IP address (user). This means the amount of false positives in practice is 
significant, except if users came from "known" AS networks or RIR assignmenets 
/ route info. So this may (!) help/work in small and/or very defined network 
topologies.

I know the situation in germany is a bit different, as the internet topology / 
"market" is very "centralized" here, but even in germany many less kown IP 
access products / services available get "geo-resolved" over other (usually 
western) countries / regions by GeoIP (even the commercial version). 

I know from many african and asian Mail Providers who use "US", "european" or 
"canadian" IPs for their service to get around "problems" with such Geo-
blocking solutions.

Proper geolocation of IPs is a "science by itself", but still far from 
reliable. Many brute force attack attempts against our exim systems 
(germany+luxembourg) are currently coming from france and germany today.

For smaller systems, solutions like fail2ban could help "far":
https://www.fail2ban.org/wiki/index.php/Exim

But even here: Be aware of possible "bad cases" where i.e. larger NAT 
networks "use" the service and "sloppy" user clients generate false 
positives.

Beside Exim functionality (see Exim DOS prevention - incl. resource "reserve" 
subsystem) firewall rules to slow out "to much" of new initiated sessions 
within a time window could help. But brute force attackes are normal / usual 
on larger SMTP services today - important is to make it difficult to prevent 
any success of such attackes (even distributed ones) and "DOS effects" of them 
and similiar attackes.


good luck,


niels.


-- 
 ---
 Niels Dettenbach
 Syndicat IT & Internet
 http://www.syndicat.com
 PGP: https://syndicat.com/pub_key.asc
 ---
 







-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] Spam though my server

2019-02-19 Thread Niels Dettenbach via Exim-users
Am Dienstag, 19. Februar 2019, 11:38:22 CET schrieb Odhiambo Washington via 
Exim-users:
> How they end up hacking this account is something of a mystery now. This is
> the second time in as many months.
..."usually" they got user login credentials in any way. 

from my experience, most typical is:

 - the user uses a easy to brute force PW (exim provides different limits to 
make this more difficult - if configured/set in the config, but additional 
firewall rules or IPS may required too to block massive brute forcing on EXIM 
by SMTP)

 - the users PW got hacked on a client in any way or

 - the same users PW got discovered/"hacked" on a foreign website or internet 
service

 - the (usually encrypted) "password storage" (i.e. a SQL database, LDAP, 
shadow or whatever got "hacked" / copied and this PW was cracked). very 
typical seems attacks on SQL databases behind any LAMP or similiar web 
management tool or by other web applications which use the same database 
installation - using insecure grants or security holes in the database or a 
LAMP stack.

 - PW sniffed from a non encrypted SMTP session with exim (if allowed in exim 
and on client)


this just to point you into a few typical directions.

good luck,


niels.


-- 
 ---
 Niels Dettenbach
 Syndicat IT & Internet
 http://www.syndicat.com
 PGP: https://syndicat.com/pub_key.asc
 ---
 







-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] The Google Lie

2019-02-13 Thread Niels Dettenbach via Exim-users
Am Mittwoch, 13. Februar 2019, 01:46:21 CET schrieb Christian Balzer via 
Exim-users:
> And come to name it here as "The Google Lie".
> 
> On the face of it this looks like another attempt to ram the
> unpalatable SPF/DKIM/DMARC cocktail down everybody's throat because of
> course Google knows best and is also a cute 800kg gorilla that won't do
> evil (honest guv!).

hmm, i'm personally not a fan of Googles Email services, but this conclusion 
sound's a bit strong to me. 

As the linked page states, there are "basic" things like reverse DNS and 
similiar which gmail expects from "non authenticated" users - things which 
are typical for many other mail services too and even recommend by major 
rfcs. Without DKIM i'm not sure as i did not tested that yet - but without 
DKIM it seems difficult to get a "reliable" email service up today.

>From my experience, GMail doesn't require DMARC or SPF from senders, but it 
could help shifting reputation for mail services where it may makes sense..

For higher volumes GMail offers a "GMail Postmaster Account" where Postmasters 
can "list" their mailservers which send to GMail - Google seems to use this 
as a "abuse contact" too (which many mailservers did not really have yet but 
"should" by rfc).

DMARC is not a general solution for everyone, but could help some email 
entities with special applications (i.e. financial services).

> Received-SPF: pass (google.com: best guess record for domain of
> ch...@gol.com designates 203.216.5.73 as permitted sender)
> client-ip=203.216.5.73; ---
> 
> So why do we see those failures then?
Checking the DNSBLs could makes sense, as these DNSBLs are used in many email 
services and anti-spam "solutions". Currently i see i.e. a listing in:
https://www.anticaptcha.net/check/?ip=203.216.5.73

> As it turns out, Google uses Spamhaus (they're a customer, but won't admit
> to using their RBLs in public) and in particular checks mails for their
> origin IP against XBL (CBL).
There are many others who does that too - at least by any weightings.


> So Google:
> a) lies, the error is based on the origin-IP.
I did not see this as a "ly" - each Mail ISP is able to define his own 
"authentication" policies to prevent spam. And as i can see your email 
session was not a "authenticated one" - which leads GMail (as many others) to 
much stricter validity / "authentity" checks then for authenticated one.

There is no absolute Email Service, as users have very different expectations 
onto i.e. "spam" filtering / anti-abuse actions - including a different view 
onto the definition of "spam".

GMail is very restrictive in this - this means GMail users have to accept 
that they did not get any email they might want to - as a cost of a highly 
spam reduced inbox traffic. This is a contract/decision between GMail and GMail 
customers/users and not the senders to GMail.

DKIM/SPF/DMARC are not any killer solutions - they only "makes sense" in 
(different) special scenarios which do not fit all email users.

Mail Providers could do their best to get around "any" anti-spam ratings of 
whatever target systems in many different ways of shifting their reputations. 
Even the definition of "reputation" is very diverse in the net. I.e. there are 
many who did not accept non-auth emails from known dynamic. The diversity is 
as large as the customer profiles and expectations in the world. This is why i 
pertsonally don't like GMail - their "usage rules" (filter rules) would not fit 
my personal expectations. There is no "perfect" email service.

i know the good old story of customers complaining "they did not got my 
email" - but this is a issue / resposibility of the reciever (and his 
decision for a emails ervice provider) as long as the sender fulfills official 
specs. If this comes transparent, the stories of the "bad monopolies" who 
"dictate the internet" are over. I do not know any professional operating 
company relying onto highly diverse Email traffic using standard GMail for 
their Email stuff.


hth,
best regards,


niels.

-- 
 ---
 Niels Dettenbach
 Syndicat IT & Internet
 http://www.syndicat.com
 PGP: https://syndicat.com/pub_key.asc
 ---
 







-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] How to block using exim re:[doc...@nk.ca: Your account has been hacked! You need to unlock.]

2019-01-28 Thread Niels Dettenbach via Exim-users
Am Sonntag, 27. Januar 2019, 20:56:03 CET schrieb Ellen Van Landingham via 
Exim-users:
> Personally, I have an Exim filter that rejects any message
> containing the word "bitcoin" in $message_body.  This won't be
> useful for you if you actually use bitcoins for anything, but it
> works for me.

This is usually a very bad idea - even for pure personal usage, as there are 
many ham mails around where these word could be found in their content (i.e. 
incl. well known newspapers, financial infos and online shopping e-commerce 
who offer payment by bitcoin (or describe why not in their notification mails) 
etc. - or your own list mail here f.i). On the other hand, i've seen a 
lot of spam which contains "hot" terms/words in a mutated / non-official way - 
i.e. "bitc0in" or "bitco1n"...

fighting spam in a reliable way is a "science by itself" (as the spammer 
business is still huge and clever) - unfortunately simple dictionary filters 
are not working reliable anymore since decades. we've seen customers who 
build such simple word filters (by sieve or similiar) byself and complained 
monthes later about "lost" important mails...


hth
best regards,

niels.
-- 
 ---
 Niels Dettenbach
 Syndicat IT & Internet
 http://www.syndicat.com
 PGP: https://syndicat.com/pub_key.asc
 ---
 







-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] Spam Filtering / dnslists

2018-02-08 Thread Niels Dettenbach via Exim-users
Am Donnerstag, 8. Februar 2018, 08:16:54 CET schrieb Odhiambo Washington via 
Exim-users:
> So, I have to ask what people are using these days when it comes to
> dnslists?
> And what other tools/tricks are in use that would help fight spam?

hmm,
in my experience, dnslists are just one step of effective anti spam filtering 
today. We developed a complex multi-stage anti-spam system for our email 
services which had to be tuned and managed actively, but with the smallest 
amount of time/work possible.

I think by principle the (by far) most efficient anti-spam fighting still is 
possible on MXes and not on SMTP/Mail "hops" "behind". A good DNS setup for 
outgoing email to reduce/avoid bounces from "hijacked" sender addresses is 
important too.

If you look for a in-exim "easy to handle" list, i could recommend 
(currently):

sbl-xbl.spamhaus.org
nomail.rhsbl.sorbs.net/$sender_address_domain 
cbl.abuseat.org 
web.dnsbl.sorbs.net 
socks.dnsbl.sorbs.net 
http.dnsbl.sorbs.net 
zen.spamhaus.org 
b.barracudacentral.org 
psbl.surriel.com

but be warned, the most effective lists contain a few (known) "false 
positives" (i.e. spamhaus) of large email services (i.e. yahoo, local free 
mail services), because they do not handle their large email traffic within the 
DNSBLs policies (i.e. contain lot of spam). You have to watch and whitelist 
them by hand in the beginning. Place i.e. a proper error message with a url 
pointing to further details and a contact to you / postmaster. 

But DNSBLs are just one thing - todays spammers try to get access and use 
proper relays with hijacked sender addresses (to go through DMARC / SPF / 
DKIM) which is important to reach i.e. gmail recipients.

DNSBL will block real email.

Our Anti-Spam solution (handling a few hunderthousands of mails by day) has 
three "main stages":

- EXIM SA (with Greylisting)
- EXIM ACL and a few DNSBL, DMARC (SPF/DKIM)
- Spamassassin (with compiled rluez - DCC, Pyzor2, Razor and Bayesian)
- EXIM - AMAVIS Antivirus (with two scanners)

We use a long list of DNSBLs with a "spam propability" value on each added 
(or subtracted) to/from a spam propability counter which goes into 
Spamassassin. SA internally works similiar and in SA we handle DCC (and razor 
+ pyzor2). You may ask at SA lists / view SA docs for more indepth details as 
this would be off list here.

This means each (new) email sender generates a lot of connections (primarily 
DNS). It may makes sense to have your own DNS resolvers (against root) and 
possibly DCC instance.

The Bayesian Subsystem of SA as the antivirus subsystem takes significant CPU 
/ system load. Be aware of local laws if you "read" the users emails (our 
customers allows us to use their email content for spam analysis - check 
possible local law).

Over many years now the solution works very well for our users/customers, 
which (as business users) have a very low acceptance for false positives as 
for (real) spam. Depending from time we get around 97%-99.5% of "real" spam 
out, while the measuring there is not very sharp, because it "hits" against 
the definition of "spam". If we go higher,, inacceptable false positives will 
arise.

At the beginning we had to fill in a few hard whitelist entries in different 
subsystems for a few very large (mostly local and freemail) email providers 
which "go their own way"). If a bounce rises today to a real sender the 
reason is on his side (defect email or temporary defect on the mail system on 
senders side). It is important to deliver proper / helpful error messages 
(without giving to much info to spammers out).

We do not have any "Spam folder" in users mailboxes as this doenst saves time 
for the users. 

We recommend our users to disable such in email clients as the amount of 
false positives could be higher then "real" spam landing there. There will be 
email which is recognized by users as "spam" which is regular list / 
newsletter email the user has accepted in the past - let users marking them 
as "spam" this often leads to further problems with false positives later.



hth a bit,

best regards,

Niels.
-- 
 ---
 Niels Dettenbach
 Syndicat IT & Internet
 http://www.syndicat.com
 PGP: https://syndicat.com/pub_key.asc
 ---
 





signature.asc
Description: This is a digitally signed message part.
-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] Start working with exim config files

2017-06-13 Thread Niels Dettenbach via Exim-users
Hi John,


Am Dienstag, 13. Juni 2017, 12:30:52 CEST schrieb John Smith:
>I added the "MAIN_TLS_ENABLE = yes" in the
>conf.d/main/03_exim4-config_tlsoptions. Here it works after restarting
>Exim : I can see STARTTLS after EHLO localhost on telnet.
>But after that I wanted to set other options like (for examples) :
>tls_certificate =  /etc/ssl/certs/file1.crt
>tls_privatekey  =  /etc/ssl/certs/private/file2.key
> 
>(I know that Exim takes by default the exim.key and  exim.crt in
>/etc/exim4 folder so I can unset the two lines above and use the files
>generated by gencert command...

Just to clearify a bit:

Exim does (nearly) nothing "by default". Anything has to be configured within 
the config file. 

Exim has typically one config file, which could include further files if a user 
want's to use that in any way. 

"MAIN_TLS_ENABLE" is not a EXIM directive. Debian (as Ubuntu) use their own 
(splitted) very complex config file with many own directives (mostly upper case 
names) to "switch on/off" parts of their "configuration snippets". 

So at the end, it is related to Debian how they handle that - and how you 
could officially "fiddle in" your own config directives without breaking their 
setup. If you want to use that, you may ask that within Debian community.

If you want (or must) to go a bit deeper into Exim, it may make sense to work 
out your own config file (i.e. a single one) from one of the many examples in 
the docs or the net. This is less "ugly" then it may seem to beginners and 
gives you a much better readable config.

Personally i'm not using the Debian config files - so i can't help you with 
this 
- had problems with breaks after security updates etc some years ago even on 
"small systems".


hth a bit,
good luck,


Niels.

-- 
 ---
 Niels Dettenbach
 Syndicat IT & Internet
 http://www.syndicat.com
 PGP: https://syndicat.com/pub_key.asc
 ---
 





-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] DMARC spf_domain= empty

2017-06-06 Thread Niels Dettenbach via Exim-users
Am Montag, 5. Juni 2017, 11:32:37 CEST schrieb Jeremy Harris:
> Aha:
> 
> https://bugs.exim.org/show_bug.cgi?id=1994

...this could make sense. Did not found that before.

I've patched my EXIM 4.89 build (a bit wondering, why it is not in that 
version / tarball) now and investigate it further.

many thanks for your time.

Niels.

-- 
 ---
 Niels Dettenbach
 Syndicat IT & Internet
 http://www.syndicat.com
 PGP: https://syndicat.com/pub_key.asc
 ---
 





-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


Re: [exim] DMARC spf_domain= empty

2017-05-31 Thread Niels Dettenbach via Exim-users
Am Mittwoch, 31. Mai 2017, 14:50:16 CEST schrieb Jeremy Harris:
> > /* Use the envelope sender domain for this part of DMARC */
> > spf_sender_domain = expand_string(US"$sender_address_domain");
> 
> It's using $sender_address_domain - so what was that for this mail?
should be "googlemail.com" in this case, but is empty, if i let write it into 
the log_message from a DMARC acl (in acl_check_data). Within other acls it 
seems properly working. hmm...

The same effect on other sender domains. 

It seems that DKIM uses the correct $sender_address_domain and the (libspf2) 
Exim SPF seems to work properly too and .

many thanks for your time!
many greetings,


Niels.
-- 
 ---
 Niels Dettenbach
 Syndicat IT & Internet
 http://www.syndicat.com
 PGP: https://syndicat.com/pub_key.asc
 ---
 





-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/


[exim] DMARC spf_domain= empty

2017-05-31 Thread Niels Dettenbach via Exim-users
Hiho Dears,


after investigating my EXIM DMARC (opendmarc EXP) setup and the current docs 
about Exim DMARC in more detail i've found that anything seems to work except 
that the SPF variable(s) - expescially "spf_domain=" are not filled correctly 
within dmarc.c. This leads to bad XML reports too, because of "failed" empty 
SPF fields.

Could someone pls explain how the "spf_domain" vs. spf data within DMARC whould 
work?

Here is an example of a googlemail.com email going through DMARC here:

--- snip ---
2017-05-31 10:40:11 1dFzAp-0007cW-UY DKIM: d=googlemail.com s=20161025 
c=relaxed/relaxed a=rsa-sha256 b=2048 [verification succeeded]
2017-05-31 10:40:11 1dFzAp-0007cW-UY DMARC results: spf_domain= 
dmarc_domain=googlemail.com spf_align=no dkim_align=yes enforcement='Accept'
2017-05-31 10:40:11 1dFzAp-0007cW-UY H=mail-wr0-f195.google.com 
[209.85.128.195] Warning: [DMARC] ACCEPTED: accept googlemail.com
2017-05-31 10:40:11 1dFzAp-0007cW-UY H=mail-wr0-f195.google.com 
[209.85.128.195] Warning: [DMARC] DEBUG: 'accept' for googlemail.com STATUS 
Accept USED_DOMAIN googlemail.com DMARC_HEADER Authentication-Results: 
mail.syndicat.com; dmarc=pass header.from=googlemail.com
--- snap ---

I use EXIM 4.89nb1 on NetBSD

build against:
- libspf2-1.2.10
- opendmarc 1.3.1

with:
LOOKUP_LIBS=-lmysqlclient -lssl -lcrypto -lopendmarc -Wl,-R/usr/pkg/lib 
-L/usr/pkg/lib -lsasl2 -lspf2
EXPERIMENTAL_SPF=yes
EXPERIMENTAL_DMARC=yes
WITH_CONTENT_SCAN=YES
...

OpenDMARC is build with SPF support (tried it without too):
opendmarc: OpenDMARC Filter v1.3.1
SMFI_VERSION 0x101
libmilter version 1.0.1
Active code options:
WITH_SPF

in opendmarc.conf these are commented our / default:

##  SPFIgnoreResults { true | false }
##  default "false"

#SPFSelfValidate true

##  Syslog { true | false }
##  default "false"

I'm not sure if Exim DMARC uses this over i.e. libopendmarc or SPF directly 
from libspf2. 

As described, i do the SPF checks "before" DMARC checks within 


acl_check_rcpt:
...

### SPF native

warnset acl_m_spf_record = ${lookup 
dnsdb{txt=$sender_address_domain}{$value}}

# No record
warn!condition  = ${if def:acl_m_spf_record}
!hosts  = +3rdmxes : +relay_from_hosts
log_message = [SPF] no record

# SPF +all is meaningless
warncondition   = ${if match {$acl_m_spf_record}{\\+all}}
log_message = [SPF] meaningless +all
!hosts  = +3rdmxes : +relay_from_hosts

warnspf = fail
!hosts  = +3rdmxes : +relay_from_hosts : 
+nosa_from_hosts
log_message = [SPF] $sender_host_address is not allowed to 
send mail from $sender_address_domain

# Add a SPF-Received: header to the message
warnmessage = $spf_received
!hosts  = +3rdmxes : +relay_from_hosts

accept  spf = pass
log_message = [SPF] pass
!hosts  = +3rdmxes : +relay_from_hosts


### DMARC niels
# --- check sender's DMARC policy
warndomains= +local_domains
hosts  = +3rdmxes : +relay_from_hosts
log_message= [DMARC] no check for OUR hosts
control= dmarc_disable_verify


warn!domains   = +screwed_up_dmarc_records
#log_message= [DMARC] check forensics
control= dmarc_enable_forensic
###

and then DMARC (as described) in 

acl_check_data:
...

## test
  # --- check sender's DMARC policy
  warn   dmarc_status   = *
 add_header = $dmarc_ar_header

  deny   dmarc_status   = reject
 message= Rejected by sender's DMARC policy

  warn   dmarc_status   = quarantine
 set acl_c0 = ${eval:$acl_c0+40}
 set acl_c1 = QDMARC(40) suspicious message according DMARC policy; 
$acl_c1

## test


For me it seems, in dmarc.c spf_domain is set not correctly (however?)., but 
seems relatively "hard wired" there Any idea, what could be wrong here?
https://github.com/Exim/exim/blob/master/src/src/dmarc.c
--- snip ---
  /* Use the envelope sender domain for this part of DMARC */
  spf_sender_domain = expand_string(US"$sender_address_domain");
  if (!spf_response)
{
/* No spf data means null envelope sender so generate a domain name
 * from the sender_helo_name  */
if (!spf_sender_domain)
  {
  spf_sender_domain = sender_helo_name;
  log_write(0, LOG_MAIN, "DMARC using synthesized SPF sender domain = %s\n",
 spf_sender_domain);
  DEBUG(D_receive)
debug_printf("DMARC using synthesized SPF sender domain = %s\n",
  spf_sender_domain);
  }
dmarc_spf_result = DMARC_POLICY_SPF_OUTCOME_NONE;