OT - Blocking ALL non-user clients - WAS Re: Blocking LinkedIn 'Intro' mail hijacking?

2013-10-28 Thread Charles Marcus
On 2013-10-27 1:13 PM, Charles Marcus cmar...@media-brokers.com wrote: Based on Noel's suggestion above I currently have: # submission_clients_banned linkedin.com REJECT Intro hijacker not welcome here rapportive.com REJECT Intro hijacker not welcome here Just added blackberry.net and

Re: Blocking LinkedIn 'Intro' mail hijacking?

2013-10-27 Thread Charles Marcus
On 2013-10-25 4:51 PM, Noel Jones njo...@megan.vbhcs.org wrote: Blackberry has done pretty much this same thing for years, and not too many people have been bent out of shape about it. Or maybe the different business model of BB convinced folks their email wasn't being mined. Mostly a moot

Re: Blocking LinkedIn 'Intro' mail hijacking?

2013-10-27 Thread Charles Marcus
Ok, first attempt isn't working properly... On 2013-10-25 3:21 PM, Noel Jones njo...@megan.vbhcs.org wrote: # banned_clients linkedin.com REJECT mail from LinkedIn not welcome here I have (changed cidr to hash for obvious - after I got the 'bad address pattern' error on first try with the

Re: Blocking LinkedIn 'Intro' mail hijacking?

2013-10-27 Thread Charles Marcus
On 2013-10-27 1:13 PM, Charles Marcus cmar...@media-brokers.com wrote: Ok, first attempt isn't working properly... Sorry - started that email before I fixed the 'bad address pattern' error... Current hashed version seems to be working... -- Best regards, */Charles/***

Re: Blocking LinkedIn 'Intro' mail hijacking?

2013-10-27 Thread Noel Jones
On 10/27/2013 10:38 AM, Charles Marcus wrote: On 2013-10-25 4:51 PM, Noel Jones njo...@megan.vbhcs.org wrote: Blackberry has done pretty much this same thing for years, and not too many people have been bent out of shape about it. Or maybe the different business model of BB convinced folks

Re: Blocking LinkedIn 'Intro' mail hijacking?

2013-10-27 Thread Charles Marcus
On 2013-10-27 3:58 PM, Noel Jones njo...@megan.vbhcs.org wrote: (disclaimer - no BB users left here, so this is based on past behavior. They could have changed, but I doubt it.) Yes, BB would fetch all IMAP messages from the company server, then push them to the client. Outbound would

Blocking LinkedIn 'Intro' mail hijacking?

2013-10-25 Thread Charles Marcus
Hello, I'm really hoping this is either a hoax or I'm seriously misunderstanding something... If it is true, how can they legally do this? And more importantly, how can SASL_AUTH attempts be blocked? Maybe block all SASL attempts from LinkedIn networks? Anyway, article here:

Re: Blocking LinkedIn 'Intro' mail hijacking?

2013-10-25 Thread Titanus Eramius
Fri, 25 Oct 2013 12:53:08 -0400 skrev Charles Marcus cmar...@media-brokers.com: Once you install the Intro app Well, if the app is not installed, it might solve the problem. Other than that, I think this is a bit off-topic for Postfix, since it only applys to Apples hand-held devices. Cheers,

Re: Blocking LinkedIn 'Intro' mail hijacking?

2013-10-25 Thread Simon B
On 25 Oct 2013 18:54, Charles Marcus cmar...@media-brokers.com wrote: Hello, I'm really hoping this is either a hoax or I'm seriously misunderstanding something... If it is true, how can they legally do this? And more importantly, how can SASL_AUTH attempts be blocked? Maybe block all SASL

Re: Blocking LinkedIn 'Intro' mail hijacking?

2013-10-25 Thread Charles Marcus
On 2013-10-25 1:29 PM, Titanus Eramius tita...@aptget.dk wrote: Well, if the app is not installed, it might solve the problem. Other than that, I think this is a bit off-topic for Postfix, since it only applys to Apples hand-held devices. Whether it is iOS specific or not (apparently it is, at

Re: Blocking LinkedIn 'Intro' mail hijacking?

2013-10-25 Thread Noel Jones
On 10/25/2013 1:42 PM, Charles Marcus wrote: On 2013-10-25 1:29 PM, Titanus Eramius tita...@aptget.dk wrote: Well, if the app is not installed, it might solve the problem. Other than that, I think this is a bit off-topic for Postfix, since it only applys to Apples hand-held devices. Whether

Re: Blocking LinkedIn 'Intro' mail hijacking?

2013-10-25 Thread Bron Gondwana
On Sat, Oct 26, 2013, at 06:21 AM, Noel Jones wrote: 1. block all *.linkedin.com clients BEFORE any permit_sasl_authenticated statement. This will also have the effect of blocking all incoming linkedin mail. That may be a little too strict for some folks, or maybe just fine with others. 2.

Re: Blocking LinkedIn 'Intro' mail hijacking?

2013-10-25 Thread Viktor Dukhovni
On Fri, Oct 25, 2013 at 02:21:11PM -0500, Noel Jones wrote: 1. block all *.linkedin.com clients BEFORE any permit_sasl_authenticated statement. This will also have the effect of blocking all incoming linkedin mail. That may be a little too strict for some folks, or maybe just fine with

Re: Blocking LinkedIn 'Intro' mail hijacking?

2013-10-25 Thread Manuel Bieling
On 2013.10.25 14:21:11 -0500, Noel Jones wrote: Apparently it is not a hoax, so the question remains, for those of us who do not have the enterprise tools to lock down iPhones and iPads, what is the best/most reliable way to simply block LinkedIn from being able to successfully connect to

Re: Blocking LinkedIn 'Intro' mail hijacking?

2013-10-25 Thread Charles Marcus
On 2013-10-25 3:41 PM, Viktor Dukhovni postfix-us...@dukhovni.org wrote: On Fri, Oct 25, 2013 at 02:21:11PM -0500, Noel Jones wrote: 1. block all *.linkedin.com clients BEFORE any permit_sasl_authenticated statement. This will also have the effect of blocking all incoming linkedin mail. That

Re: Blocking LinkedIn 'Intro' mail hijacking?

2013-10-25 Thread Viktor Dukhovni
On Fri, Oct 25, 2013 at 04:07:11PM -0400, Charles Marcus wrote: But should this check go directly on the submission service, ie: submission inet n - n - - smtpd -o syslog_name=postfix-587 -o smtpd_tls_security_level=encrypt -o smtpd_tls_auth_only=yes

Re: Blocking LinkedIn 'Intro' mail hijacking?

2013-10-25 Thread Harald Koch
On 25 October 2013 14:42, Charles Marcus cmar...@media-brokers.com wrote: Whether it is iOS specific or not (apparently it is, at least for the time being, iOS specific), it also applies to the smtp connection to my *postfix* server, so I disagree that it is OT. Apparently it is not a hoax,

Re: Blocking LinkedIn 'Intro' mail hijacking?

2013-10-25 Thread Charles Marcus
On 2013-10-25 4:17 PM, Viktor Dukhovni postfix-us...@dukhovni.org wrote: You've been on this list long enough to know that verbatim restriction definitions don't belong in master.cf: master.cf: submission inet n ... smtpd -o

Re: Blocking LinkedIn 'Intro' mail hijacking?

2013-10-25 Thread Charles Marcus
On 2013-10-25 4:28 PM, Harald Koch c...@pobox.com wrote: On 25 October 2013 14:42, Charles Marcus cmar...@media-brokers.com mailto:cmar...@media-brokers.com wrote: Whether it is iOS specific or not (apparently it is, at least for the time being, iOS specific), it also applies to the

Re: Blocking LinkedIn 'Intro' mail hijacking?

2013-10-25 Thread Noel Jones
On 10/25/2013 3:34 PM, Charles Marcus wrote: On 2013-10-25 4:28 PM, Harald Koch c...@pobox.com wrote: On 25 October 2013 14:42, Charles Marcus cmar...@media-brokers.com mailto:cmar...@media-brokers.com wrote: Whether it is iOS specific or not (apparently it is, at least for the time

Re: Blocking LinkedIn 'Intro' mail hijacking?

2013-10-25 Thread Harald Koch
On 25 October 2013 16:34, Charles Marcus cmar...@media-brokers.com wrote: Not according to this (from the second paragraph of the linked article): Once you install the Intro app, all of your emails, both sent and received, are transmitted via LinkedIn’s servers. LinkedIn is forcing all your