Re: [gentoo-user] Thunderbird 78

2020-08-21 Thread james

On 8/20/20 8:19 PM, Jack wrote:

On 2020.08.20 18:42, james wrote:

On 8/20/20 1:20 PM, Neil Bothwick wrote:

On Thu, 20 Aug 2020 13:06:39 -0400, james wrote:


As you do document all you are doing, and the information you gather, I 
see several interrelated but distinct areas.� hardware, software 
(several possibilities for each of several tasks,) network provisioning, 
and network configuration.� I'd prefer a better term for that last one - 
but I mean things like assuring your IP address doesn't end up (or start 
out) in a blacklisted block for any smtp attempts.� In my case, it's 
mostly that one (plus spam filtering) which gives me hesitation to 
attempt rolling my own.


Black listing seems a valid issue. Here:

Down  the list is blacklisting. For me it is simple; if Blacklisting 
occurs, based on the IP addresses I get from Frontier, I'll just ask for 
different ones and cancel the bad (blacklisted) IPs. I'm telling 
Frontier up front, that is the reason for the IPs (to run email 
services) and my "commercial, extra cost" service with them. Power of 
the checkbook.


Truthfully, I *should* be able to ferret out IP addresses that are 
blacklisted, right? This issue seems to now be the only impediment to 
continuing this email server(s) of static ip address(es).


Frontier is in this document:


https://www.ipvoid.com/ip-blacklist-check/


So I can just forward this list and any other tools that identify 'black 
listed IPs' to my sales contacts at Frontier, Verizon, Spectrum or any 
other ISP, willing to sell to me bandwidth, bonded with static IP 
addresses, right?


James



Re: [gentoo-user] tips on running a mail server in a cheap vps provider run but not-so-trusty admins?

2020-08-21 Thread Rich Freeman
On Fri, Aug 21, 2020 at 3:37 PM Grant Taylor
 wrote:
>
> On 8/21/20 6:37 AM, Rich Freeman wrote:
> > This stuff can be interesting to discuss, but email is SO entrenched
> > that I don't see any of this changing because of all the legacy issues.
> > You would need to offer something that is both easier and better to
> > use to such a degree that people are willing to change.
>
> "something that is /both/ *easier* and *better*".
>
> That's a VERY tall bar to clear.

Hence I'm going to basically reply to only a few lines of your email -
this isn't going to go anywhere so I really don't want to get into an
endless argument about why people use webservices/etc.

> What does JSON / XML / etc. on top of HTTP(S) provide that SMTP doesn't
> provide?

It is what just about every other modern application in existence
uses.  I'm sure there are hundreds of articles on the reasons for this
that are far better than anything I'd come up with here.

> > ... use more standard libraries/etc.
>
> There are many libraries to interface with SMTP.

And they don't work for anything OTHER than SMTP.

A library for JSON/webservices/whatever works for half the
applications being written today.


>
> Stop focusing on HTTP(S)  for a few minutes.
>
> If you were to create a new protocol from the ground up, why would you
> introduce additional layers into the application stack — which represent
> additional dependencies and complications — if you didn't have to?
>
> Not everything is a web server.  Not everything can benefit from being
> forced through a web server.

This is simple.  This is how just about EVERYBODY does it these days.
http works as a transport mechanism.  And obviously when I say http I
mean http/https with the latter being preferred.  That is the beauty
of standards like this - somebody else figured out SSL on top of HTTP
so we don't need an email-specific reimplementation of that.

I mean, why use TCP?  Why not use something more tailored to email?
TCP probably has a dozen optional features that nobody uses with
email, so why implement all that just to send email?

The answer is that it makes WAY more sense to recycle a standard
protocol than to invent one.  If SMTP didn't exist, and we needed a
way to post a bunch of data to a remote server, you'd use HTTP,
because it already works.

> > Most of the benefits only accrue if you adopt PKI as well, which is
> > a problem that is hard to scale out to the masses.
>
> PKI is relatively easy to scale.  (For a given value.)  Hence the
> thriving CA industry.
>
> Doing so in a trust worthy manner is the problem.  Especially if you
> want to avoid a single point of control / failure / GEO political / etc.

It isn't just the trust problem.  It is also the ease of use problem.

Let's assume you trust all the CAs out there.  Why isn't anybody using
SSL for email?  It is built into half the email clients out there.
The problem is that exchanging certificates at an individual level is
hard.

Oh, for an organization with an IT department it isn't a problem.  The
IT department can just issue a certificate to everybody, generating
keys for them.  Then it can stick all the certs in some kind of
directory that their email clients all use.

Getting your cousin to use SSL certs for their email is a whole
different matter.  Heck, just using it between two different
companies, both supported by professional IT depts, is a pain.  You
could use TLS for the transport itself and have the email servers
configured to only use TLS for those domains, but actually doing E2E
encryption is hard with email because there aren't a lot of standards
for key exchange across unrelated orgs.

> If we throw all the trusted CAs out the window, how do you /bootstrap/
> encrypted communications?  -  My personal opinion is DNS.
>

DNSSEC is:

1.  Still poorly supported even where it makes sense.
2.  A great hypothetical solution for the 0.002% of email users who
own a domain name, like you and me.

-- 
Rich



Re: [gentoo-user] tips on running a mail server in a cheap vps provider run but not-so-trusty admins?

2020-08-21 Thread Caveman Al Toraboran
thanks.  highly appreciate your time.  to save
space i'll skip parts where i fully agree
with/happily-learned.

(e.g. loop detection; good reminder, i wasn't
thinking about it.  plus didn't know of acronyms
DSN, MDNs, etc; nice keywords for further
googing).

‐‐‐ Original Message ‐‐‐
On Friday, August 21, 2020 8:59 PM, Grant Taylor 
 wrote:

> On 8/20/20 7:39 PM, Caveman Al Toraboran wrote:
>
> >  1. receipt by final mail server (mandatory).
> >
>
> You're missing the point that each and every single server along the
> path between the original submission server and the final destination
> server is on the hook for delivery of the message -or- notification of
> it's failure back to the purported sender address. So "final mail
> server" is not sufficient.

i was thinking (and still) if such relay-by-relay
delivery increases probability of error by a
factor of n (n = number of relays in the middle).
e.g. probability of accidental silent mail loss is
if one, or more, accidentally said "yes got it!"
but actually didn't.  i.e.:

Pr(silent loss) =

sum_{k=1}^n
{n choose k}
* Pr(mistake)**k
* Pr(no mistake)**{n-k}

n  = number of relays in the middle.
*  = mult.
** = exponent.

i wonder if it would be better if only the entry
relay aims at the confirmation from the terminal
server?  this way we won't need to assume that
relays in the middle are honouring their guarantees,
hence the probability above would be smaller since
k is limited up to 2 despite n's growth.


> Of course, there are servers that go against the RFC "MUST" directives
> and either don't safely commit messages to disk /before/ saying
> "Okay..." and / or don't deliver failure messages.

care to point part of the rfc that defines "safe"
commit to disk?  e.g. how far does the rfc expect
us to go?  should we execute `sync`'s equivalent
to ensure that data is actually written on disk
and is not in operating system's file system write
buffer?


> Signing will be of somewhat limited value as it will quite likely be
> subject to the same problem that DMARC / ARC suffer from now. Mail
> servers can sign what they receive. But in doing so, they alter what is
> sent to include their signature. As such, the data that the next server
> receives is different. The real problem is working backwards. Down
> stream servers don't have a reliable way to undo what upstream servers
> have done to be able to get back to the original message to validate
> signatures.

onion signatures?  e.g. message is wrapped around
several layers of signatures for every relay in
the path?


> > this way we can have group-level rules.
>
> I'm not quite sure what you mean by group-level rules in this context.

e.g. whitelisting, tagging, spam filtration,
prioritizing, etc, based on entities that
onion-signed the message.




Re: [gentoo-user] Thunderbird 78

2020-08-21 Thread Victor Ivanov
On 21/08/2020 15:36, Jack wrote:
> On 8/21/20 8:28 AM, Victor Ivanov wrote:
> I seem to be slow on the pickup with parts of this thread, but I'm not
> sure exactly what you are looking for here.  I assume you did find how
> Balsa handles encryption for sending and receiving mail. If you are
> talking about encrypting the local storage of all or selected messages,
> I agree it is not a current option.

Apologies, I kind of didn't want to fully hijack the thread.

You're almost correct except that I'd like to encrypt the remote
storage, not the local. Since IMAP works in both directions and allows
for a full message, including headers, to be pushed to a given folder
(handy for provider migration) one can use this feature to:

(1) download a message in full
(2) PGP encrypt the message according to RFC and a key of choice
(3) push the encrypted message to the server
(4) delete/expunge the previous, unencrypted message

Both TB/Enigmail and KMail can use this technique to permanently decrypt
a PGP encrypted message. The reverse, however, is a bit more clunky.

KMail, has a working PGP encrypt filter but its message pushing is not
always RFC compliant when it issues the IMAP "APPEND" command to push
the message. It uses the current date/time instead of the one in the
message's "Date" header which should take precedence according to RFC.
This only appears to happen with multi-part messages, is easily
reproducible even without PGP, and I have filed a bug report which has
never been looked into. Plain-text messages are APPENDed correctly.

The net result here is that as some providers, such as GMail, use the
timestamp provided in the APPEND command to overwrite the message's Date
header this leads to incorrect date/time indexing in folders/labels. So
an old message now becomes recent when uploaded. KMail also fails to
expunge the old message properly leaving the unencrypted message in
addition to the newly pushed encrypted.

TB/Enigmail too offers an "Encrypt to key" filter which ought to do the
job but is completely broken and does not work at all. On the other hand
pushing a message via IMAP works correctly for both plain-text and
multi-part messages.

The other mail clients that I have mentioned all have a correct APPEND
implementation but do not seem to have an option (or filter choices) to
perform the PGP procedure above. I'm hopeful that TB 78.2 will have this
feature in one form or another.

- V



signature.asc
Description: OpenPGP digital signature


Re: [gentoo-user] tips on running a mail server in a cheap vps provider run but not-so-trusty admins?

2020-08-21 Thread Caveman Al Toraboran
‐‐‐ Original Message ‐‐‐
On Friday, August 21, 2020 4:28 PM, Wols Lists  wrote:

> You're re-inventing the wheel.

yes, i do consider re-inventing octagonal wheels.
though this wasn't my point here.

here, i'm just "asking" to see what makes the
"safely stored" guarantee.  perhaps i should've
asked more directly (and yes, i know these are not
new features).



> > 1. receipt by final mail server (mandatory).
> >
>
> This is part of SMTP already, in that each server (post office)
> acknowledges that the message has been received AND SAFELY STORED.
> Without that last guarantee, "receipt by the server" isn't worth
> diddley-squat.

got any specific definition of what makes a
storage "guaranteed"?  e.g. what kind of tests
does the mail server do in order to say "yup, i
can now guarantee this is stored safely!"?


> > the job of a relay would be to optionally add some
> > metadata (e.g. maybe describing sender's role) and
> > sign the whole thing (e.g. by company's private
> > key). this way we can have group-level rules.
>
> Except that SMTP allows for the fact that a message may (or may not)
> pass through several post-offices on the way. The old internet thing of
> "don't assume any computer will survive a nuclear attack - take whatever
> route you can find ..." so there is no guarantee that a relay going in
> one direction will even see a message going back in the other.

so?  not sure how this relates to what i said.  i
guess you think that i meant that a relay should
be mandatory?  or maybe i'm misunderstanding your
point?

(yes, a relay doesn't have to be used.  i'm just
describing some uses of relays that i think make
sense.  (1) indicate trust hierarchy, (2) offload
mail delivery so that i can close my laptop and
let the relay have fun with the retries.  not sure
there is any other use.  anyone?)




Re: [gentoo-user] tips on running a mail server in a cheap vps provider run but not-so-trusty admins?

2020-08-21 Thread Grant Taylor

On 8/21/20 11:54 AM, Caveman Al Toraboran wrote:
thanks.  highly appreciate your time.  to save space i'll skip parts 
where i fully agree with/happily-learned.


You're welcome.

(e.g. loop detection; good reminder, i wasn't thinking about it. 
plus didn't know of acronyms DSN, MDNs, etc; nice keywords for 
further googing).


;-)

i was thinking (and still) if such relay-by-relay delivery increases 
probability of error by a factor of n (n = number of relays in the 
middle).  e.g. probability of accidental silent mail loss is if one, 
or more, accidentally said "yes got it!"  but actually didn't.  i.e.:


It definitely won't be a factor of n, where n is the number of relays.

i wonder if it would be better if only the entry relay aims at the 
confirmation from the terminal server?  this way we won't need to 
assume that relays in the middle are honouring their guarantees, 
hence the probability above would be smaller since k is limited up 
to 2 despite n's growth.


Nope.

Each and every server MUST behave the same way.

care to point part of the rfc that defines "safe" commit to disk? 
e.g. how far does the rfc expect us to go?  should we execute `sync`'s 
equivalent to ensure that data is actually written on disk and is 
not in operating system's file system write buffer?


TL;DR:  Yes on all accounts.

See the recent reply about guarantee and relays for more details.

onion signatures?  e.g. message is wrapped around several layers of 
signatures for every relay in the path?


That doesn't help the problem.  We sort of have an onion already.

It's quite likely possible to validate the signature of the immediate 
sending server.  But how does the receiving server know how to undo any 
modifications that the immediate sending server made to be able to 
validate the previous sending server's signature?  Rinse, later, repeat 
out multiple levels.


What if some of the servers signs what they send vs what they receive?

These are the types of problems that don't currently have a solution.

e.g. whitelisting, tagging, spam filtration, prioritizing, etc, 
based on entities that onion-signed the message.


How is doing those things based on signature different than doing them 
based on the system sending to you?


The only thing that comes to mind is trusting an upstream signature, but 
not the immediate sending system.  But, you have to unwrap the onion to 
be able to validate the signature.  But to do that you need to know what 
the server(s) downstream of the signature being validated did to the 
message.


Some of this is a one way trap door without any indication of what each 
trap door did to the message.




--
Grant. . . .
unix || die



Re: [gentoo-user] tips on running a mail server in a cheap vps provider run but not-so-trusty admins?

2020-08-21 Thread Grant Taylor

On 8/21/20 11:01 AM, Caveman Al Toraboran wrote:

yes, i do consider re-inventing octagonal wheels.


I think that it's occasionally a good thing to have a thought experiment 
about how $THING might be made better.


It's probably good to have discussions around green feel types of 
replacements.


But it's important to eventually assess the pros and cons of the old (as 
it exists), the new (as from green field), and the transition between 
the two.


Sometimes the new doesn't warrant the transition, but it does provide an 
option that might be worth augmenting into the old.


If nothing else, it's good to have the discussions and be able to answer 
why something was done or chosen to remain the same.


here, i'm just "asking" to see what makes the "safely stored" 
guarantee.


MTAs are supposed to be written such that they commit the message to 
persistent storage medium (disk) before returning an OK message to the 
sending server.


There is some nebulous area around what that actually means.  But the 
idea is that the receiving server believes, in good faith, that it has 
committed the message to persistent storage.  Usually this involves 
writing the message to disk, probably via a buffered channel, and then 
issued system calls to ask the OS to flush the buffer to disk.


Is there room for error?  Probably.

Had the server made (more than) reasonable effort to commit the message 
to disk?  Yes.


The point being, don't acknowledge receipt of the message while the 
message is only in the MTA's memory buffer.  Take some steps to commit 
it to persistent storage.


That being said, there are some questionable servers / configurations 
that will bypass this safety step in the name of performance.  And they 
/do/ /loose/ /email/ as a negative side effect if (when) they do crash. 
This is a non-default behavior that has been explicitly chosen by the 
administrators to violate the SMTP specification.  Some MTAs will log a 
warning that they are configured to violate RFCs.


got any specific definition of what makes a storage "guaranteed"? 
e.g. what kind of tests does the mail server do in order to say "yup, 
i can now guarantee this is stored safely!"?


It's more that they do something safe (write the message to disk) 
instead of risky (only store it in memory).


Everything can fail at some point.  It's a matter of what and how many 
reasonable steps did you take to be safe.  Read: Don't cut corners and 
do something risky.



i guess you think that i meant that a relay should be mandatory?


Sending / outbound SMTP servers /are/ a relay for any messages not 
destined to the local server.


There is almost always at least two SMTP servers involved in any given 
email delivery.  All but the final receiving system is a relay.


(yes, a relay doesn't have to be used.  i'm just describing some uses 
of relays that i think make sense.  (1) indicate trust hierarchy, (2) 
offload mail delivery so that i can close my laptop and let the relay 
have fun with the retries.  not sure there is any other use.  anyone?)


There are many uses for email relays.  A common one, and best practice, 
is to have an /inbound/ relay, commonly known as a backup email server. 
The idea being it can receive inbound messages while the primary email 
server is down (presumably for maintenance).


Many SaaS Email Service Providers (ESPs) /are/ relay servers.  They 
receive email from someone and send it to someone else.


A number of email hygiene appliances function as an email relay between 
the world and your ultimate internal email server.  Services that filter 
inbound email qualify here too.


It is common, and I think it's best practice, to have web applications 
send email via localhost, which is usually a relay to a more capable hub 
email server which sends outbound email.  Both of these layers are relays.


A relay is the same thing for email that a router is for a network.



--
Grant. . . .
unix || die



Re: [gentoo-user] tips on running a mail server in a cheap vps provider run but not-so-trusty admins?

2020-08-21 Thread Grant Taylor

On 8/21/20 6:37 AM, Rich Freeman wrote:
This stuff can be interesting to discuss, but email is SO entrenched 
that I don't see any of this changing because of all the legacy issues. 
You would need to offer something that is both easier and better to 
use to such a degree that people are willing to change.


"something that is /both/ *easier* and *better*".

That's a VERY tall bar to clear.


1. Modernizing the actual data exchange using http/etc.

I don't think you'll get much argument that SMTP isn't the way 
somebody would do things if they were designing everything from 
scratch.


SMTP may not be the best, but I do think that it has some merits. 
Merits that the previously mentioned HTTP/2 alternative misses.


Remember, SMTP is a protocol, or a set of rules, for how two email 
servers are supposed to exchange email.  These rules include the following:


1)  Proper server greeting, used to identify the features that can be 
used.  (HELO for SMTP and EHLO for ESMTP.)

2)  Identifying the sender.
3)  Identifying the recipient(s).
4)  Sending the message payload.

Each of these discrete steps is a bi-directional communication. 
Communication that can alter all subsequent aspects of a given SMTP 
exchange.


The server could be an older server that only speaks SMTP and as such 
doesn't support STARTTLS.  Thus causing the client to /not/ try to use 
STARTTLS in accordance with current best practices.  Other ESMTP 
features come into play here like message size, 8-bit, notification 
features, etc.


The receiving server has the ability to assess the sending server's 
behavior at each point to use that as an indication to know if the 
sender is a legitimate email server or something more nefarious and 
undesirable.  --  There is a surprising amount of email hygiene based on 
sending server's behavior.


The receiving server may carte blanch reject messages from specific 
senders / sending domains and / or specific recipients, particularly 
non-existent recipients.


SMTP has low overhead in that the message body is not transferred from 
the sending server to the receiving server if any part of steps 1-3 
aren't satisfactory to the receiving server.


I'm not an API expert but I imagine that just about any of the modern 
alternatives would be an improvement.


Maybe.  Maybe not.

What is the actual problem with SMTP as it is?

What /need/ to be improved?  What could benefit from improvement even if 
it's not /needed/?



http would be a pretty likely protocol to handle the transportation,


Why HTTP?

Did you mean to imply HTTPS?

Why add an additional protocol to the stack?

TCP / SMTP is two layers.

TCP / HTTP / $Email-protocol-de-jure is three layers.

UDP / HTTP / $Email-protocol-de-jusre is three layers.

Why introduce an additional layer?

Why introduce an additional dependency in the application stack?

Why co-mingle email with other non-email traffic?  --  Or are you 
wanting to run HTTP(S) on TCP port 25?



likely with something like JSON/xml/etc carrying the payload.


Why add an additional encapsulation on top of the additional layer?

What does JSON / XML / etc. on top of HTTP(S) provide that SMTP doesn't 
provide?


What is the gain?

Is the gain worth the cost of doing so?

You might want to tweak things slightly so that recipient validity can 
be tested prior to transferring data.


Definitely.  (See above for more details as to why.)

But now you are doing multiple exchanges.

If we extrapolate this out to also include sender validation, and 
probably hello messages, you are back to four or more exchanges.


How is this better than SMTP on TCP port 25?  What is the benefit?  What 
does it cost to get this benefit?


A mail server doesn't want to accept a 20MB encrypted payload if it can 
bounce the whole message based on the recipient or a non-authenticated 
sender or whatever.


Which is one of the many reasons why there are multiple exchanges back 
and forth.


However, in principle there are plenty of modern ways to build a 
transport protocol that would be an improvement on SMTP ...


Please elaborate.

Please include what network layer (3) protocol(s) you want to use and why.

Please include what application layer (7) protocol(s) you want to use 
and why.


Please include any encoding / encapsulation you want to use and why.


... use more standard libraries/etc.


There are many libraries to interface with SMTP.

Also, handing a message off to an SMTP server alleviates the application 
from having to deal with failed deliveries, queuing, and retrying.


Why add that complexity into each and every application?  Especially if 
you don't have to?


Note:  Pulling it in via a library is still indirectly adding it to each 
and every application.


How is SMTP /not/ standard?

Also:  https://xkcd.com/927/  --  Standards

I think this is actually the part of your proposal that might be 
more likely to take off.  You could have a new type of MX field in 
DNS ...


So yet more complexity in ad

Re: [gentoo-user] tips on running a mail server in a cheap vps provider run but not-so-trusty admins?

2020-08-21 Thread Grant Taylor

On 8/20/20 7:39 PM, Caveman Al Toraboran wrote:

 1. receipt by final mail server (mandatory).


You're missing the point that each and every single server along the 
path between the original submission server and the final destination 
server is on the hook for delivery of the message -or- notification of 
it's failure back to the purported sender address.  So "final mail 
server" is not sufficient.


Each receiving server in the chain tells the sending server a definitive 
message that means "Okay, I've received the message and I will dutifully 
pass it on to the next server -or- report a problem."


The RFCs defining SMTP don't consider a server crashing / power failing 
/ etc. after saying "Okay..." as sufficient reason to fail to perform 
the job.  Even in the event of a crash / power fail, the receiving 
server MUST process the email when it recovers.


Of course, there are servers that go against the RFC "MUST" directives 
and either don't safely commit messages to disk /before/ saying 
"Okay..." and / or don't deliver failure messages.  There are still 
other servers that don't accept such incoming failure notices.  Both of 
which are against RFC "MUST" directives and as such violating the SMTP 
specification and thereby breaking interoperability.  Particularly the 
"trust" part there of.


These failure notifications have standardized on Delivery Status 
Notification, a.k.a. DSN, and historically called a "bounce".  There has 
been evolution from many disparate formats of a bounce to an industry 
standard DSN.  Said industry standard DSN is defined in RFCs.


DSNs MUST be non-optional for failure.  The only exception is if the 
sending system uses an extra option to specify that a DSN should /not/ 
be sent in the event of a failure.  Receiving systems are compelled to 
send DSNs in the absence of said option.



 2. receipt by end user(s) (optional).
 3. opening by end user(s) (optional).


These notifications are generally considered to be Message Disposition 
Notifications, and are optional.  Further, the client is what sends MDNs 
/if/ it chooses to do so.  MDNs are even more unreliable than DSNs.


(1) is required by the server, else mail will be retransmitted from 
source relay(s) (or client if done directly).  (2) is optional by 
final server, (3) is optional by end user's client.


#1 is generated by RFC compliant servers.  Not all servers are RFC 
compliant.


#2 and #3 are generated by end user clients.  Not all clients are 
willing to to do so.



the job of a relay would be to optionally add some metadata


This really isn't optional.

*SOMETHING* /standard/ *MUST* be added.  If for no other reason than to 
detect and prevent loops.


(e.g. maybe describing sender's role) and sign the whole thing (e.g. by 
company's private key).


I would suggest a /server's/ private key, and *NOT* the company's 
private key.  There is a HUGE difference in potential for private key 
exposure.  If one server is compromised, the entire company could be 
crippled if the /company's/ private key is used.  Conversely, if the 
/server's/ private key is used, then /only/ /the/ /server/ is compromised.


It is quite possible to have the company's public key published such 
that the company's internal CA can issue individual keys to each server.


Signing will be of somewhat limited value as it will quite likely be 
subject to the same problem that DMARC / ARC suffer from now.  Mail 
servers can sign what they receive.  But in doing so, they alter what is 
sent to include their signature.  As such, the data that the next server 
receives is different.  The real problem is working backwards.  Down 
stream servers don't have a reliable way to undo what upstream servers 
have done to be able to get back to the original message to validate 
signatures.


There is also the fact that various fields of the email are allowed to 
have specific trivial modifications made to them, such a line wrapping 
or character encoding conversion.  Such changes don't alter the content 
of the message, but they do alter the bit pattern of the message.  These 
types of changes are even more difficult to detect and unroll as part of 
signature validation.



this way we can have group-level rules.


I'm not quite sure what you mean by group-level rules in this context.



--
Grant. . . .
unix || die



Re: [gentoo-user] Thunderbird 78

2020-08-21 Thread james

On 8/20/20 8:19 PM, Jack wrote:

On 2020.08.20 18:42, james wrote:

On 8/20/20 1:20 PM, Neil Bothwick wrote:

On Thu, 20 Aug 2020 13:06:39 -0400, james wrote:


Look at what I just received:

  From  
"Dear User

Your Verizon✔ Version is outdated and has expired in the database as
you know we are moving our Email Platform to AOl Mail.

Failure to Upgrade to the newest Verizon✔ AOL Version 12.9 will result
in inefficient usage of mailbox and might result to shutdown

UPDATE HERE  to Visit your login page Log-in to restore.

Thanks
Verizon✔ My Account
Verizon✔ © 2020 All Right reserved  "


That looks like a phishing mail to me.


OK. How do I verify or ferret out this to know.

Ferret out what?


Thunderbird on gentoo is vulnerable?
Vulnerable to what?  Any email client is subject to receiving SPAM and 
phishing attempts.  Some email clients do have some amount of filtering 
included, and there are plenty of addons available.  I used one of the 
Bayesian based ones for a while (can't remember the name) and finally 
gave up due to the difficulty of integrating with Balsa's pop3 
fetching.  As I remember, it would have been easier to integrate with a 
mail server than with the client.


I've charted my own pathway, via R.P.4 boards and static IP addresses.
That way, I can add whatever I want, test, and just run very few codes 
on those arm8 boards Sure, this has been on my todo list, as I 
prepare to live/work out of a RV. Eventually, I'll add a satellite 
link, when all else fails, without large attached files. I'm keeping 
the home, where the hub/static-IPs will connect, but I can be home or 
mobile, controlling my own email servers. I've just groan very tired 
of someone else managing and making decisions on MY email. I've 
received too many private emails from folks, with the same sentiment.


If what I do is well documented, then a plethora of folks can  have 
custom setups, in a well documented fashion. Mine is the hard case 
with the eventual address of daily mobility, cellular and satellite 
comms.


Migration to R.P.4 has been on my goals list too, for a while.

MY goal, via gentoo, is to fix and document this once and for ALL. 
Your expertise and the rest of the band of Gentoo folks are deeply 
appreciated in this effort. This action has been brewing for a few 
years. Email is critical for me, and I do not want vendors dictating 
its future for me. Enough is Enough.
As you do document all you are doing, and the information you gather, I 
see several interrelated but distinct areas.  hardware, software 
(several possibilities for each of several tasks,) network provisioning, 
and network configuration.  I'd prefer a better term for that last one - 
but I mean things like assuring your IP address doesn't end up (or start 
out) in a blacklisted block for any smtp attempts.  In my case, it's 
mostly that one (plus spam filtering) which gives me hesitation to 
attempt rolling my own.


So can/how to I research if the IPv6 addresses offered have been 
blacklisted ?


Same question, should I be able to get (2) IPv4 address.

So if I request they are out of different blocks of IPv4, is that 
better?  Just (2) single IP addresses from different blocks?


Nest week I start that conversation with carriers. With what I have seen 
and heard, you'd think carriers, the folks with fiber in the ground, 
would be happy for a guy like me build a robust and secure email server 
services system. After all, it is their "ineptness" of employee 
selection that causes them such pains to run an email system.


Surely punting to AOL and such, brings them little or no revenue 
(speculation on my part). Any insight to these venues, would help me 
negotiate the resources I need. Surely, this is just for me and a few 
friends. But, what I read and what other technical friends tell me, is 
this is an eruption waiting to happen. For many long time unix/bsd/linux 
folks email is a most critical tool for daily endeavors.  The amount of 
code-snippets alone, in mine, is a treasure trove.



James






James

Jack


So



Re: [gentoo-user] Thunderbird 78

2020-08-21 Thread Jack

On 8/21/20 8:28 AM, Victor Ivanov wrote:

On 21/08/2020 01:28, Jack wrote:

Per my suggtion elsewhere in the thread, have you tried Balsa?

I hadn't heard of Balsa up until this thread. It's minimalistic. I like
it. But it too fails to satisfy the PGP requirement for filtering and
encrypting existing mail. Unless I somehow failed to find the relevant
filtering options (v2.6.1).
I seem to be slow on the pickup with parts of this thread, but I'm not 
sure exactly what you are looking for here.  I assume you did find how 
Balsa handles encryption for sending and receiving mail. If you are 
talking about encrypting the local storage of all or selected messages, 
I agree it is not a current option.  However, from my experience dealing 
with the development team, they are likely to be receptive to a 
request/suggestion.  I'll be glad to forward the request to them, but 
only if I better understand what I'm asking them to do.




Re: [gentoo-user] tips on running a mail server in a cheap vps provider run but not-so-trusty admins?

2020-08-21 Thread Rich Freeman
On Thu, Aug 20, 2020 at 9:39 PM Caveman Al Toraboran
 wrote:
>
> ‐‐‐ Original Message ‐‐‐
> On Thursday, August 20, 2020 11:41 AM, antlists  
> wrote:
>
> > Will that python script allow for the situation that the message is
> > received, but the message was NOT safely stored for onwards transmission
> > before the receiver crashed, and as such the message has not been
> > SUCCESSFULLY received?
> >
> > SMTP has lots of things specifically meant to ensure messages survive
> > the internet jungle on their journey ...
>
> thanks for the point.  would it suffice if we have
> these notifications:
>
> 1. receipt by final mail server (mandatory).
> 2. receipt by end user(s) (optional).
> 3. opening by end user(s) (optional).
>

I don't really want to get into the gory details and have only skimmed
the discussion, but my sense is that you're talking about a new way to
deliver mail that makes two sorts of changes:

1. Modernizing the actual data exchange using http/etc.
2. Changing the model around email moving to something more
PKI-based/etc and redefining what an email address is.

This stuff can be interesting to discuss, but email is SO entrenched
that I don't see any of this changing because of all the legacy
issues.  You would need to offer something that is both easier and
better to use to such a degree that people are willing to change.

However, I'll comment on both of these issues:

1. Modernizing the actual data exchange using http/etc.

I don't think you'll get much argument that SMTP isn't the way
somebody would do things if they were designing everything from
scratch.  I'm not an API expert but I imagine that just about any of
the modern alternatives would be an improvement.  http would be a
pretty likely protocol to handle the transportation, likely with
something like JSON/xml/etc carrying the payload.  You might want to
tweak things slightly so that recipient validity can be tested prior
to transferring data.  A mail server doesn't want to accept a 20MB
encrypted payload if it can bounce the whole message based on the
recipient or a non-authenticated sender or whatever.  However, in
principle there are plenty of modern ways to build a transport
protocol that would be an improvement on SMTP and use more standard
libraries/etc.

I think this is actually the part of your proposal that might be more
likely to take off.  You could have a new type of MX field in DNS and
if it is set then it defines servers that will use the new protocol,
and you could have backup SMTP servers for legacy transition.  You
could change the transport side of things without redefining how email
works, so the same messages are interoperable with both systems.

On the flip side, while I think this is an easier change to make, I
don't think it necessarily offers huge improvements.  SMTP still gets
the job done, and the new system wouldn't really be a major
improvement from a sysadmin standpoint, so I don't see everybody
running out to change.  Just changing the transport protocols doesn't
provide any anti-spam/etc benefits.  SMTP already supports TLS so it
isn't any more secure.  No doubt if we were starting from scratch this
is how it would be done, but it isn't enough of a reason to change.
That said, if there were even modest benefits for large mail providers
I could see it taking off simply because it could leverage a lot of
existing libraries and standards, and could have legacy compatibility.

2. Changing the model around email moving to something more
PKI-based/etc and redefining what an email address is.

This is where you could have revolutionary improvements for
privacy/spam/etc.  However, it completely breaks everything that
exists with email today, so it is a hard change.  Most of the benefits
only accrue if you adopt PKI as well, which is a problem that is hard
to scale out to the masses.

If somebody comes up with a way to make PKI take off in a real way,
then I could see something like this taking off eventually.
Otherwise, this stuff is only going to be of interest to the sorts who
use gpg to sign their email, and nobody else.

-- 
Rich



Re: [gentoo-user] Memory cards, device notifier and remembering sd* designations.

2020-08-21 Thread Michael
On Thursday, 20 August 2020 21:50:28 BST Dale wrote:

> new problem.  I have one card that tests fine.  I've reformatted it a
> couple times but device notifier, DN, just will not see that it has been
> plugged in.

Does udisks see it?  Have you tried plugging it in, while keeping an eye on 
the output of:

$ udisksctl monitor

udisks will identify the device being plugged in, the formatted block device 
on it, and finally any partitions on the fs, in consequent sections in its 
output.


> I tried a different card reader, different adapter for
> going from a TF or micro to SD card etc.  Other cards I plug in work
> like they should.  I can mount the weird card manually without error. 
> The pictures on it were fine.  No sign of corruption at all.  I think
> what happened, I mounted it manually the other day.  I seem to recall
> reading somewhere that if you mount something manually, DN won't mount
> it for you in the future until you tell it to forget the manual
> mounting.

I use Plasma's DN, udisks, pmount and even manual mount as root occasionally, 
but have not come across this problem yet.

However, I do not use DN's automounting.


> Thing is, I can't find where that is stored so I can remove
> it.  Maybe it isn't supposed to do that anymore but is anyway.  Does
> anyone know where those settings are stored?  Anyone know where I go to
> tell it to see the card and offer to mount it with DN? I've looked
> everywhere I can think of for this.

Perhaps it is stored in some akonadi entry, or some .qmcl setting.  In the 
first instance I suggest you right click on the Device Notifier in the Plasma 
tool tray, then select 'Configure Removable Devices' and un-tick:

- Only automatically mount removable media that has been mounted before

- Enable automatic mounting of removable media

This will hopefully flush out any cached USB drive details.  If you need these 
settings you can reset them later on.



signature.asc
Description: This is a digitally signed message part.


Re: [gentoo-user] Thunderbird 78

2020-08-21 Thread Victor Ivanov
On 21/08/2020 01:28, Jack wrote:
> Per my suggtion elsewhere in the thread, have you tried Balsa?

I hadn't heard of Balsa up until this thread. It's minimalistic. I like
it. But it too fails to satisfy the PGP requirement for filtering and
encrypting existing mail. Unless I somehow failed to find the relevant
filtering options (v2.6.1).


> Can you elaborate on how threading and conversations are different? ...
> In terms of combining sent and received messages, unless you are going
> to have some way of showing conversations across folders (which don't
> exist in gmail) the only way I can think of is to copy your sent
> messages into the folder the replies are in, and I do sometimes do
> this.  I try to set all my mailing lists to send me copies of my own
> messages, but doing a bcc to yourself would have the same effect.

Well... that's exactly what "conversation" view is. I don't think I have
much more to add. Sure, GMail uses labels instead of folders and
emulates the latter in IMAP but that's totally irrelevant, so long as
said "categories" are available to the mail client.

Most email clients can be configured to sync either just mail headers or
entire emails for the last X number of days (or all mail). So, at the
very least, being able to have an "extended" threaded view (e.g. by
means of a virtual folder - just like a unified inbox) so to speak that
combines emails from both Inbox and Sent seems rather trivial and could
be done whenever (re)indexing subscribed folders.

BCC'ing myself or having both sent and incoming mail in one mailbox is a
workaround - not a solution. It's neither elegant nor should it be
necessary to achieve the above behaviour.

KMail so far comes as close as it gets (from what I've seen) to
customising threading and appearance of email listing though it too
can't combine multiple folders.

Anyway, as I said, the PGP and standalone (or exportable) config to me
are more important in a mail client. "Conversation" view is more of a
desirable feature rather than something I can't live without.

- V



signature.asc
Description: OpenPGP digital signature


Re: [gentoo-user] tips on running a mail server in a cheap vps provider run but not-so-trusty admins?

2020-08-21 Thread Wols Lists
On 21/08/20 02:39, Caveman Al Toraboran wrote:
> ‐‐‐ Original Message ‐‐‐
> On Thursday, August 20, 2020 11:41 AM, antlists  
> wrote:
> 
>> Will that python script allow for the situation that the message is
>> received, but the message was NOT safely stored for onwards transmission
>> before the receiver crashed, and as such the message has not been
>> SUCCESSFULLY received?
>>
>> SMTP has lots of things specifically meant to ensure messages survive
>> the internet jungle on their journey ...
> 
> thanks for the point.  would it suffice if we have
> these notifications:

You're re-inventing the wheel.
> 
> 1. receipt by final mail server (mandatory).

This is part of SMTP already, in that each server (post office)
acknowledges that the message has been received AND SAFELY STORED.
Without that last guarantee, "receipt by the server" isn't worth
diddley-squat.

> 2. receipt by end user(s) (optional).

This is part of current mail protocol - dunno what it's called but I can
switch on a flag in Thunderbird, and I will get a message back saying my
email is in the recipient's inbox.

> 3. opening by end user(s) (optional).

Likewise, I will get a notification that the email has been "read".
> 
> ?
> 
> 
> 
> (1) is required by the server, else mail will be
> retransmitted from source relay(s) (or client if
> done directly).  (2) is optional by final server,
> (3) is optional by end user's client.
> 
> the job of a relay would be to optionally add some
> metadata (e.g. maybe describing sender's role) and
> sign the whole thing (e.g. by company's private
> key).  this way we can have group-level rules.
> 
Except that SMTP allows for the fact that a message may (or may not)
pass through several post-offices on the way. The old internet thing of
"don't assume any computer will survive a nuclear attack - take whatever
route you can find ..." so there is no guarantee that a relay going in
one direction will even see a message going back in the other.

And as an example of how hard this is, look at what a mess the telcos
have made of SMS, which is basically the same thing! How often on New
Year's Eve do (or did) the system fall over so all the "Happy New Year"
messages either disappeared, or arrived several days late ...

Cheers,
Wol