Re: Unusual TLS setting logged by Postfix

2019-10-21 Thread Viktor Dukhovni
On Mon, Oct 21, 2019 at 03:48:10PM -0400, J Doe wrote: > I am aware that this is not an error on Postfix’s fault, but I found the > following entry in one of mail server’s logs confusing. It is nevertheless rather ordinary... > Oct 21 06:09:51 server postfix/smtpd[31405]: > Anonymous TLS

Unusual TLS setting logged by Postfix

2019-10-21 Thread J Doe
Hello, I am aware that this is not an error on Postfix’s fault, but I found the following entry in one of mail server’s logs confusing. I am using Postfix 3.3.0: Oct 21 06:09:51 server postfix/smtpd[31405]: Anonymous TLS connection established from unknown[77.120.120.29]:33126: TLSv1 with

Re: TCP maps security risks & mitigations; Trualias alias mapping

2019-10-21 Thread m3047
Wietse, thanks. On Mon, 21 Oct 2019, Wietse Venema wrote: Fred Morris: [...] From an opsec perspective I wouldn't recommend running a service which enumerates accounts and email aliases for all the world to see, encrypted or not. However the risks and mitigations of doing so on loopback or in

Re: TCP maps security risks & mitigations; Trualias alias mapping

2019-10-21 Thread Wietse Venema
Fred Morris: > Hello everyone, and the 10 people who care. On Friday I wrote hoping for > contact with someone interested in discussing security risks pertaining > to TCP maps and there's been no response. > > Let me offer you some Monday morning entertainment with this: > > # postmap -q

Re: Outbound opportunistic TLS by default?

2019-10-21 Thread Wietse Venema
micah anderson: > Wietse Venema writes: > > > micah anderson: > >> Eray Aslan writes: > >> > >> > On Wed, Dec 19, 2018 at 02:36:50PM -0500, Viktor Dukhovni wrote: > >> >> If there are no objections, I can change the default to "may" when > >> >> TLS is compiled in. > >> > > >> > No objections

TCP maps security risks & mitigations; Trualias alias mapping

2019-10-21 Thread Fred Morris
Hello everyone, and the 10 people who care. On Friday I wrote hoping for contact with someone interested in discussing security risks pertaining to TCP maps and there's been no response. Let me offer you some Monday morning entertainment with this: # postmap -q "foo-mtausers-0t3"

Re: Remove duplicate header 'MIME-Version'

2019-10-21 Thread Chris Wedgwood
> Is there a way to remove the duplicate header in Postfix? it might (should) be possible with a milter > Alternatively, is it possible to remove the MIME-Version header(s) > altogether? Would this break the message (or the mail client from > the recipient)? it depends, it might break things

Re: Remove duplicate header 'MIME-Version'

2019-10-21 Thread Wietse Venema
luc...@dds.nl: > Hello Group, > > I have configured Postfix as a relay to forward all messages to the AWS > SES mail service. > > SES bounces some messages with the following error: > > status=bounced (host email-smtp.eu-west-1.amazonaws.com[52.48.248.62] > said: 554 Transaction failed:

Re: Outbound opportunistic TLS by default?

2019-10-21 Thread micah anderson
Wietse Venema writes: > micah anderson: >> Eray Aslan writes: >> >> > On Wed, Dec 19, 2018 at 02:36:50PM -0500, Viktor Dukhovni wrote: >> >> If there are no objections, I can change the default to "may" when >> >> TLS is compiled in. >> > >> > No objections for setting smtp_tls_security_level.

Remove duplicate header 'MIME-Version'

2019-10-21 Thread lucas2
Hello Group, I have configured Postfix as a relay to forward all messages to the AWS SES mail service. SES bounces some messages with the following error: status=bounced (host email-smtp.eu-west-1.amazonaws.com[52.48.248.62] said: 554 Transaction failed: Duplicate header 'MIME-Version'. (in

Re: Recipient address RESTRICTIONS are applied twice to the same e-mail with different parameters

2019-10-21 Thread Bill Cole
On 21 Oct 2019, at 10:08, jean-christophe manciot wrote: Hi there, The context is: Ubuntu 19.10 postfix 3.4.7-1 in /etc/postfix/main.cf smtpd_recipient_restrictions = permit_mynetworks, permit_sasl_authenticated, permit_auth_destination This setting should accept the e-mail sent to my domain

Recipient address RESTRICTIONS are applied twice to the same e-mail with different parameters

2019-10-21 Thread jean-christophe manciot
Hi there, The context is: Ubuntu 19.10 postfix 3.4.7-1 in /etc/postfix/main.cf smtpd_recipient_restrictions = permit_mynetworks, permit_sasl_authenticated, permit_auth_destination This setting should accept the e-mail sent to my domain from google.com. Yet, I get in the log:

Re: how to add warning / banner in email body ?

2019-10-21 Thread Bill Cole
On 21 Oct 2019, at 7:13, Jayesh Shinde wrote: Hi , For identifying external world & spoof emails , I am looking for solution where we can add notification / warning banner in email body like below . "_This e-mail is received from external domain. Please review before opening any

how to add warning / banner in email body ?

2019-10-21 Thread Jayesh Shinde
Hi , For identifying external world & spoof emails , I am looking for solution where we can add notification / warning banner in email body like below . "_This e-mail is received from external domain. Please review before opening any attachment or link_" This will help end user to