[pfx] Re: [off-topic] aarch inclusion in Linux distros (was: IPv6 and Cloud server CPU)

2023-11-23 Thread Peter via Postfix-users

On 24/11/23 19:52, Peter via Postfix-users wrote:
It's not the distro.  It's common for Linux distros to fully support 
ARM, but that does not put any obligation on 3rd-party distros, just 
like if someone were to create a 3rd-party distro for BSD it would be up 
to them to decide which arches they want to support and that does not 
reflect on the support by the distro itself.


That was meant to say "3rd party repos", not distros.


Peter
___
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an email to postfix-users-le...@postfix.org


[pfx] [off-topic] aarch inclusion in Linux distros (was: IPv6 and Cloud server CPU)

2023-11-23 Thread Peter via Postfix-users

On 23/11/23 21:08, Charles Sprickman via Postfix-users wrote:

This ^.  Specifically if you want to run an EL distro there are good 
choices that offer ARM support and come with stock postfix and dovecot 
packages, but if you want to run the GhettoForge packages (which have newer 
versions of Postfix and Dovecot than that offered by the stock distros) then 
I'm afraid you're stuck with x86_64 for now.  Similarily you might have issues 
with other supporting software that is only available from 3rd-party repos or 
where 3rd-party repos have newer versions taht you want to use, but not for ARM.


Is this a common thing with Linux distros? I've not dabbled there in ages, but on the 
various *BSDs they tend to have a designation for each architecture, for example FreeBSD 
at some point moved most ARM variants to "Tier 1" which generally means there's 
parity with x86 for the average user.


It's not the distro.  It's common for Linux distros to fully support 
ARM, but that does not put any obligation on 3rd-party distros, just 
like if someone were to create a 3rd-party distro for BSD it would be up 
to them to decide which arches they want to support and that does not 
reflect on the support by the distro itself.



Peter
___
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an email to postfix-users-le...@postfix.org


[pfx] Re: TAKE NOTE 2: Future Let's Encrypt CA choice randomisation.

2023-11-23 Thread duluxoz via Postfix-users

Thanks Victor - so more t-shooting on our end, then - cool

On 24/11/2023 04:16, Viktor Dukhovni via Postfix-users wrote:

On Thu, Nov 23, 2023 at 07:48:33PM +1100, duluxoz via Postfix-users wrote:

Hi All,

This may be a stupid Q, but we're getting a `postfix/tlsproxy[89206]: TLS
handshake failed for service=smtp peer=[104.199.96.85]:25` error in our logs
when trying to relay via an SMTP Relay Service (both Mailjet and
Brevo/SendInBlue). Could our issue be related to this LE issue?

No, failure to complete the TLS handshake is not related to any issues
with the certificates.  That said, the handshake works for me:

 posttls-finger: Untrusted TLS connection established to
 104.199.96.85[104.199.96.85]:25: TLSv1.3 with cipher
 TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519
 server-signature RSA-PSS (2048 bits) server-digest SHA256
 posttls-finger: > EHLO straasha.imrryr.org
 posttls-finger: < 250-smtpin.mailjet.com
 posttls-finger: < 250-PIPELINING
 posttls-finger: < 250-SIZE 15728640
 posttls-finger: < 250-VRFY
 posttls-finger: < 250-ETRN
 posttls-finger: < 250-AUTH PLAIN LOGIN DIGEST-MD5 CRAM-MD5
 posttls-finger: < 250-AUTH=PLAIN LOGIN DIGEST-MD5 CRAM-MD5
 posttls-finger: < 250-ENHANCEDSTATUSCODES
 posttls-finger: < 250-8BITMIME
 posttls-finger: < 250-SMTPUTF8
 posttls-finger: < 250 CHUNKING
 posttls-finger: > QUIT
 posttls-finger: < 221 2.0.0 Bye

Unclear why your tlsproxy is having issues.  Perhaps the same problem as
Patrick was having with SELinux?  Don't configure any client
certificates on your end, or don't enable SELinux?



___
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an email to postfix-users-le...@postfix.org


[pfx] Re: TAKE NOTE 2: Future Let's Encrypt CA choice randomisation.

2023-11-23 Thread Viktor Dukhovni via Postfix-users
On Thu, Nov 23, 2023 at 07:48:33PM +1100, duluxoz via Postfix-users wrote:
> Hi All,
> 
> This may be a stupid Q, but we're getting a `postfix/tlsproxy[89206]: TLS
> handshake failed for service=smtp peer=[104.199.96.85]:25` error in our logs
> when trying to relay via an SMTP Relay Service (both Mailjet and
> Brevo/SendInBlue). Could our issue be related to this LE issue?

No, failure to complete the TLS handshake is not related to any issues
with the certificates.  That said, the handshake works for me:

posttls-finger: Untrusted TLS connection established to
104.199.96.85[104.199.96.85]:25: TLSv1.3 with cipher
TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519
server-signature RSA-PSS (2048 bits) server-digest SHA256
posttls-finger: > EHLO straasha.imrryr.org
posttls-finger: < 250-smtpin.mailjet.com
posttls-finger: < 250-PIPELINING
posttls-finger: < 250-SIZE 15728640
posttls-finger: < 250-VRFY
posttls-finger: < 250-ETRN
posttls-finger: < 250-AUTH PLAIN LOGIN DIGEST-MD5 CRAM-MD5
posttls-finger: < 250-AUTH=PLAIN LOGIN DIGEST-MD5 CRAM-MD5
posttls-finger: < 250-ENHANCEDSTATUSCODES
posttls-finger: < 250-8BITMIME
posttls-finger: < 250-SMTPUTF8
posttls-finger: < 250 CHUNKING
posttls-finger: > QUIT
posttls-finger: < 221 2.0.0 Bye

Unclear why your tlsproxy is having issues.  Perhaps the same problem as
Patrick was having with SELinux?  Don't configure any client
certificates on your end, or don't enable SELinux?

-- 
Viktor.
___
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an email to postfix-users-le...@postfix.org


[pfx] Re: TAKE NOTE 2: Future Let's Encrypt CA choice randomisation.

2023-11-23 Thread Viktor Dukhovni via Postfix-users
On Thu, Nov 23, 2023 at 12:25:19PM +, Alan Munday via Postfix-users wrote:

> > > It may be prudent to mark your calendar to check the Let's Encrypt
> > > certificate page once or twice a year, and make appropriate changes if
> > > new intermediate issuer CAs are introduced, or extant ones retired.
> > > 
> > >  https://letsencrypt.org/certificates/
>
> Can I check I have not missed something here.
> 
> 
> When I use Viktor's chaingen.sh  I get a TLSA 3 1 1  which matches the
> TLSA 2 1 1 above.

That's because you're trying to use "chaingen.sh" on just the chain file
with the issuer CAs, rather than the complete chain with the server
certificate *followed* by the issuer CAs.  For Let's Encrypt, the
therefore, you need either concatenate the "cert" and "fullchain" (not
really) files:

h=$(uname -n) # or whatever MX hostname you use
l=$(uname -n) # or whatever "lineage" name is pertinent
d=/etc/letsencrypt/live/$l
eechain=$(mktemp -t fullchain.XX)
cat $d/cert.pem $d/fullchain.pem > $eechain
chaingen.sh $eechain $h
rm $eechain

or just know that all the issuer CA usages should be "2" not "3"
when running "chaingen" on a partial chain that is missing the
end-entity (EE, i.e. leaf or server) certificate.

-- 
Viktor.
___
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an email to postfix-users-le...@postfix.org


[pfx] Re: How to temporarily pause virtual mail delivery?

2023-11-23 Thread Wietse Venema via Postfix-users
Ralph Seichter via Postfix-users:
> * Wietse Venema via Postfix-users:
> 
> >> Now that I think of it again, I wonder if the reload command is even
> >> necessary?
> >
> > Yes, because it is implemented in the queue manager which is a
> > long-running process.
> 
> Thank you. I have been using the reload step for so long, but I could
> not recall why I did it. It might have been a belt-and-suspenders kind
> of situation. ;-)
> 
> > If you use defer_transports to freeze mail deliveries, then some
> > messages may get close to the bounce_queue_lifetime, meaning that
> > Postfix will try to deliver them only once.
> 
> Interesting. Given the default bounce_queue_lifetime of five days, a
> value I rarely touch in Postfix setups, I would not intuitively consider
> this a possible reason for concern?

It's unlikely to be a problem, especially for local deliveries
which rarely require a retry.

Wietse
___
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an email to postfix-users-le...@postfix.org


[pfx] Re: TLS server certificate verification fails

2023-11-23 Thread Marc Dierksen via Postfix-users

On 11/20/23 19:57, Viktor Dukhovni via Postfix-users wrote:

 This mail comes from external sender! 


On Mon, Nov 20, 2023 at 04:01:05PM +0100, Marc Dierksen via Postfix-users wrote:


For the domain 'shieldersme.com' outbound TLS is configured via this entry
in the TLS policy map:

shieldersme.com verify match=hostname:nexthop:dot-nexthop ciphers=high
protocols=>=TLSv1.2

When trying to send mail I am getting the following error:

Nov 17 12:23:50 postfix-outbound/smtp[11269]: server certificate
verification failed for shieldersme.com[5.79.80.155]:25: num=62:hostname
mismatch


This is easily reproducible:

 $ posttls-finger -c -Lsummary -lsecure "shieldersme.com" hostname nexthop 
dot-nexthop
 posttls-finger: server certificate verification failed for 
shieldersme.com[5.79.80.155]:25: num=62:hostname mismatch
 posttls-finger: Untrusted TLS connection established to 
shieldersme.com[5.79.80.155]:25: TLSv1.2 with cipher 
ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)

And expected (i.e. works as indended and specified in all relevant RFCs):

 $ posttls-finger -cC -Lsummary -lsecure "shieldersme.com" hostname nexthop 
dot-nexthop 2>&1 |
 openssl crl2pkcs7 -nocrl -certfile /dev/stdin |
 openssl pkcs7 -print_certs -text |
 grep -E 'Subject:|DNS:'
 Subject: CN=liger.hibridmena.com
 DNS:liger.hibridmena.com
 Subject: C=US, ST=TX, L=Houston, O=cPanel, Inc., CN=cPanel, Inc. 
Certification Authority
 Subject: C=GB, ST=Greater Manchester, L=Salford, O=COMODO CA 
Limited, CN=COMODO RSA Certification Authority

The actual certificate presented to Postfix is for:

 liger.hibridmena.com

Your tests with "openssl s_client" sent a default SNI etension, but
Postfix does not by default.  With SMTP, it is unclear, in general, what
the SNI should be, and sending the "wrong" SNI can sometimes cause
connection aborts.  Therefore, if you want to solicit a particular
certificate, you have to configure the SNI explicitly.

 $ posttls-finger -cC -s shieldersme.com -Lsummary -lsecure "shieldersme.com" 
hostname nexthop dot-nexthop 2>&1 |
 openssl crl2pkcs7 -nocrl -certfile /dev/stdin |
 openssl pkcs7 -print_certs -text |
 grep -E 'Subject:|DNS:'
 Subject: CN=*.shieldersme.com
 DNS:*.shieldersme.com, DNS:shieldersme.com
 Subject: C=US, O=Let's Encrypt, CN=R3
 Subject: C=US, O=Internet Security Research Group, CN=ISRG Root X1

Relevant documentation:

 posttls-finger(1):
-s servername
   The server name to send with the TLS Server Name Indication
   (SNI) extension.  When the server has DANE TLSA records, this
   parameter is ignored and the TLSA base domain is used instead.
   Otherwise, SNI is not used by default, but can be enabled by
   specifying the desired value with this option.

 postconf(5):
mayOpportunistic TLS. Since sending in the clear is acceptable,
   demanding stronger than default TLS security merely reduces
   interoperability. The optional "ciphers", "exclude", and
   "protocols" attributes (available for opportunistic TLS with
   Postfix >= 2.6) and "connection_reuse" attribute (Postfix >=
   3.4) override the "smtp_tls_ciphers",
   "smtp_tls_exclude_ciphers", "smtp_tls_protocols", and
   "smtp_tls_connection_reuse" configuration parameters. In the
   policy table, multiple ciphers, protocols or excluded ciphers
   must be separated by colons, as attribute values may not contain
  >whitespace or commas.  At this level and higher, the optional
  >"servername" attribute (available with Postfix >= 3.4) overrides
  >the global "smtp_tls_servername" parameter, enabling
  >per-destination configuration of the SNI extension sent to the
  >remote SMTP server.  The optional "enable_rpk" attribute
   (Postfix >= 3.9) overrides the main.cf smtp_tls_enable_rpk
   parameter.  When opportunistic TLS handshakes fail, Postfix
   retries the connection with TLS disabled.  This allows mail
   delivery to sites with non-interoperable TLS implementations.

You need to add "servername=shieldersme.com" to the policy table entry.

Also, in this case, using "hostname" is a bad idea, it means you'd trust
insecurely obtained forged MX records to tell the client what name to
match, so any active attacker can compromise the connection by sending
a suitably crafted MX response.  The match pattern you want here is

 nexthop:dot-nexthop

*without* "hostname".  Or (less fungible) even just "nexthop", if by
mutual agreement with the receiving system, you're sure that the cert
will "always" include the domain.



Viktor, thank you for your explanation. Now 

[pfx] Re: TAKE NOTE 2: Future Let's Encrypt CA choice randomisation.

2023-11-23 Thread Alan Munday via Postfix-users

On 19/11/2023 06:24, Viktor Dukhovni via Postfix-users wrote:
On Sat, Nov 18, 2023 at 04:33:46PM +0900, Byung-Hee HWANG via 
Postfix-users wrote:



or if you prefer:

 _25._tcp.mx1.org.example. IN CNAME _25._tlsa.org.example.
 _25._tcp.mx2.org.example. IN CNAME _25._tlsa.org.example.
 ...
 _25._tcp.mxN.org.example. IN CNAME _25._tlsa.org.example.
 ;
 _25._tlsa.org.example. IN TLSA 2 1 1 
8d02536c887482bc34ff54e41d2ba659bf85b341a0a20afadb5813dcfbcf286d ; R3
 _25._tlsa.org.example. IN TLSA 2 1 1 
e5545e211347241891c554a03934cde9b749664a59d26d615fe58f77990f2d03 ; R4
 _25._tlsa.org.example. IN TLSA 2 1 1 
276fe8a8c4ec7611565bf9fce6dcace9be320c1b5bea27596b2204071ed04f10 ; E1
 _25._tlsa.org.example. IN TLSA 2 1 1 
bd936e72b212ef6f773102c6b77d38f94297322efc25396bc3279422e0c89270 ; E2

Thank you for the clear summary. I did update all again.


Good job, you're set until some future change a few years down the line.

 _25._tcp.yw-0919.doraji.xyz. IN CNAME rfc7671.doraji.xyz.
 _25._tcp.yw-1204.doraji.xyz. IN CNAME rfc7671.doraji.xyz.
 rfc7671.doraji.xyz. IN TLSA 2 1 1 
8d02536c887482bc34ff54e41d2ba659bf85b341a0a20afadb5813dcfbcf286d
 rfc7671.doraji.xyz. IN TLSA 2 1 1 
e5545e211347241891c554a03934cde9b749664a59d26d615fe58f77990f2d03
 rfc7671.doraji.xyz. IN TLSA 2 1 1 
276fe8a8c4ec7611565bf9fce6dcace9be320c1b5bea27596b2204071ed04f10
 rfc7671.doraji.xyz. IN TLSA 2 1 1 
bd936e72b212ef6f773102c6b77d38f94297322efc25396bc3279422e0c89270


It may be prudent to mark your calendar to check the Let's Encrypt
certificate page once or twice a year, and make appropriate changes if
new intermediate issuer CAs are introduced, or extant ones retired.

 https://letsencrypt.org/certificates/


Can I check I have not missed something here.


When I use Viktor's changen.sh  I get a TLSA 3 1 1  which matches the 
TLSA 2 1 1 above.



;; subject=C = US, O = Let's Encrypt, CN = R3

;; issuer=C = US, O = Internet Security Research Group, CN = ISRG Root X1
;; notBefore=Sep  4 00:00:00 2020 GMT
;; notAfter=Sep 15 16:00:00 2025 GMT
;;
_25._tcp.mx.org.example. IN TLSA 3 1 1 
8d02536c887482bc34ff54e41d2ba659bf85b341a0a20afadb5813dcfbcf286d



And I get a TLSA 2 1 1 which is not listed:


;; subject=C = US, O = Internet Security Research Group, CN = ISRG Root X1
;; issuer=O = Digital Signature Trust Co., CN = DST Root CA X3
;; notBefore=Jan 20 19:14:03 2021 GMT
;; notAfter=Sep 30 18:14:03 2024 GMT
;;
_25._tcp.mx.org.example. IN TLSA 2 1 1 
0b9fa5a59eed715c26c1020c711b4f6ec42d58b0015e14337a39dad301c5afc3



___
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an email to postfix-users-le...@postfix.org


[pfx] Re: How to temporarily pause virtual mail delivery?

2023-11-23 Thread Ralph Seichter via Postfix-users
* Wietse Venema via Postfix-users:

>> Now that I think of it again, I wonder if the reload command is even
>> necessary?
>
> Yes, because it is implemented in the queue manager which is a
> long-running process.

Thank you. I have been using the reload step for so long, but I could
not recall why I did it. It might have been a belt-and-suspenders kind
of situation. ;-)

> If you use defer_transports to freeze mail deliveries, then some
> messages may get close to the bounce_queue_lifetime, meaning that
> Postfix will try to deliver them only once.

Interesting. Given the default bounce_queue_lifetime of five days, a
value I rarely touch in Postfix setups, I would not intuitively consider
this a possible reason for concern?

-Ralph
___
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an email to postfix-users-le...@postfix.org


[pfx] Re: TAKE NOTE 2: Future Let's Encrypt CA choice randomisation.

2023-11-23 Thread duluxoz via Postfix-users

Hi All,

This may be a stupid Q, but we're getting a `postfix/tlsproxy[89206]: 
TLS handshake failed for service=smtp peer=[104.199.96.85]:25` error in 
our logs when trying to relay via an SMTP Relay Service (both Mailjet 
and Brevo/SendInBlue). Could our issue be related to this LE issue?


On 19/11/2023 06:24, Viktor Dukhovni via Postfix-users wrote:

On Sat, Nov 18, 2023 at 04:33:46PM +0900, Byung-Hee HWANG via Postfix-users 
wrote:


or if you prefer:

 _25._tcp.mx1.org.example. IN CNAME _25._tlsa.org.example.
 _25._tcp.mx2.org.example. IN CNAME _25._tlsa.org.example.
 ...
 _25._tcp.mxN.org.example. IN CNAME _25._tlsa.org.example.
 ;
 _25._tlsa.org.example. IN TLSA 2 1 1 
8d02536c887482bc34ff54e41d2ba659bf85b341a0a20afadb5813dcfbcf286d ; R3
 _25._tlsa.org.example. IN TLSA 2 1 1 
e5545e211347241891c554a03934cde9b749664a59d26d615fe58f77990f2d03 ; R4
 _25._tlsa.org.example. IN TLSA 2 1 1 
276fe8a8c4ec7611565bf9fce6dcace9be320c1b5bea27596b2204071ed04f10 ; E1
 _25._tlsa.org.example. IN TLSA 2 1 1 
bd936e72b212ef6f773102c6b77d38f94297322efc25396bc3279422e0c89270 ; E2

Thank you for the clear summary. I did update all again.


Good job, you're set until some future change a few years down the line.

 _25._tcp.yw-0919.doraji.xyz. IN CNAME rfc7671.doraji.xyz.
 _25._tcp.yw-1204.doraji.xyz. IN CNAME rfc7671.doraji.xyz.
 rfc7671.doraji.xyz. IN TLSA 2 1 1 
8d02536c887482bc34ff54e41d2ba659bf85b341a0a20afadb5813dcfbcf286d
 rfc7671.doraji.xyz. IN TLSA 2 1 1 
e5545e211347241891c554a03934cde9b749664a59d26d615fe58f77990f2d03
 rfc7671.doraji.xyz. IN TLSA 2 1 1 
276fe8a8c4ec7611565bf9fce6dcace9be320c1b5bea27596b2204071ed04f10
 rfc7671.doraji.xyz. IN TLSA 2 1 1 
bd936e72b212ef6f773102c6b77d38f94297322efc25396bc3279422e0c89270

It may be prudent to mark your calendar to check the Let's Encrypt
certificate page once or twice a year, and make appropriate changes if
new intermediate issuer CAs are introduced, or extant ones retired.

 https://letsencrypt.org/certificates/


___
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an email to postfix-users-le...@postfix.org


[pfx] Re: IPv6 and Cloud server CPU

2023-11-23 Thread mailmary--- via Postfix-users


About Docker, you may want to do some research on it, because it may not be 
desirable for production systems due to its monolithic design, it uses a single 
Docker daemon, while competitors like podman use a daemonless architecture.

Look how "easy" it is to secure Docker:
https://cheatsheetseries.owasp.org/cheatsheets/Docker_Security_Cheat_Sheet.html





On Thu, 23 Nov 2023 19:01:56 +1300 DL Neil via Postfix-users 
 wrote:

> New to me was Docker Mailserver. This appears to be more cut-down, but 
> also gives (me) the impression that main.cf and master.cf are either 
> hidden-away or totally-inaccessible. Nr1 difference is 'no RDBMS', which 
> I guess I could live-with (am quite at-home with SQL and such) and don't 
> need it for (eg) the web-site side of things, so...
> 
> Do you have experience using this package?
> (is it sufficiently "Postfix" to be suitable conversation on this list?)
> 
> -- 
> Regards =dn
> ___
> Postfix-users mailing list -- postfix-users@postfix.org
> To unsubscribe send an email to postfix-users-le...@postfix.org
___
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an email to postfix-users-le...@postfix.org


[pfx] Re: IPv6 and Cloud server CPU

2023-11-23 Thread Charles Sprickman via Postfix-users


> On Nov 22, 2023, at 11:20 PM, Peter via Postfix-users 
>  wrote:
> 
> On 23/11/23 14:22, Gerald Galster via Postfix-users wrote:
>>> Q2:
>>> given the minuscule work-load, is there any preference/preclusion between 
>>> employing the 'usual' x86 processor or 2 Arm Ampere processors? Both offer 
>>> Linux. Cost is effectively same.
>> You should check if the software you want to use is available
>> for the desired platform. Distributions might provide dovecot
>> packages for ARM while the official dovecot repository might
>> not. Then you would have to compile the sources yourself.
> 
> This ^.  Specifically if you want to run an EL distro there are good 
> choices that offer ARM support and come with stock postfix and dovecot 
> packages, but if you want to run the GhettoForge packages (which have newer 
> versions of Postfix and Dovecot than that offered by the stock distros) then 
> I'm afraid you're stuck with x86_64 for now.  Similarily you might have 
> issues with other supporting software that is only available from 3rd-party 
> repos or where 3rd-party repos have newer versions taht you want to use, but 
> not for ARM.

Is this a common thing with Linux distros? I've not dabbled there in ages, but 
on the various *BSDs they tend to have a designation for each architecture, for 
example FreeBSD at some point moved most ARM variants to "Tier 1" which 
generally means there's parity with x86 for the average user.

Charles

> k
> 
> Peter
> ___
> Postfix-users mailing list -- postfix-users@postfix.org
> To unsubscribe send an email to postfix-users-le...@postfix.org

___
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an email to postfix-users-le...@postfix.org