[pfx] Re: Troubleshooting mail loop issue

2023-08-15 Thread Bill Cole via Postfix-users
On 2023-08-15 at 21:52:52 UTC-0400 (Tue, 15 Aug 2023 21:52:52 -0400) Alex via Postfix-users is rumored to have said: [...] Yes, it is a loop. The loop occurs inside MS365. Apparently Microsoft does not understand how to get mail from CompanyA to CompanyB internally, so they follow the DNS.

[pfx] Re: smtp auth on port 25

2023-08-15 Thread Jon Smart via Postfix-users
> > > On August 15, 2023 2:15:21 AM GMT+02:00, Jon Smart via Postfix-users > wrote: >>Hello, >> >>I have disabled port 587/465 to be accessed publicly. >> >>but port 25 must be open to internet for MTA communications. >> >>My question is, can external users access port 25 for smtp auth and send

[pfx] Re: Troubleshooting mail loop issue

2023-08-15 Thread Alex via Postfix-users
Hi, On Tue, Aug 15, 2023 at 8:49 AM Bill Cole via Postfix-users < postfix-users@postfix.org> wrote: > On 2023-08-14 at 17:23:34 UTC-0400 (Mon, 14 Aug 2023 17:23:34 -0400) > Alex via Postfix-users > is rumored to have said: > > > Hi, > > I have what appears to be a complicated mail loop problem

[pfx] Re: Troubleshooting mail loop issue

2023-08-15 Thread Alex via Postfix-users
Hi, On Tue, Aug 15, 2023 at 11:53 AM Paul Enlund via Postfix-users < postfix-users@postfix.org> wrote: > Hi > > One thing to check is that your MX server allowed recipients is in sync > with M365 allowed recipients. > Can you explain more of what you mean here? In this case, the recipient does

[pfx] Re: Troubleshooting mail loop issue

2023-08-15 Thread Alex via Postfix-users
Hi, On Tue, Aug 15, 2023 at 11:02 AM Wietse Venema via Postfix-users < postfix-users@postfix.org> wrote: > Your loop, based on Received: headers, newer at the top, older at > the bottom: > > Received: from xavier.example.com (209.216.111.114) by > CO1PEPF44F7.mail.protection.outlook.com

[pfx] Re: local_recipient_maps does not apply to local mail submission

2023-08-15 Thread Viktor Dukhovni via Postfix-users
On Wed, Aug 16, 2023 at 01:51:24AM +0200, Étienne Miret via Postfix-users wrote: > I found this discrepancy surprising and am suggesting it is removed. In > case others argue it is useful or that removing it will break some > configurations, I am asking it is documented. The discrepancy is

[pfx] Re: local_recipient_maps does not apply to local mail submission

2023-08-15 Thread Étienne Miret via Postfix-users
Hello, Did you mean command-line submission with /usr/sbin/sendmail? Yes, as well as internal submission by a Postfix process when using aliasing. Sorry, I thought I was explicit (albeit the typo in "command"). This will receive and then bounce the message. Nope. My tests (using the

[pfx] Re: new waves of connect/disconnect from *.outlook.com; any add'l pfx configs useful for further remediation?

2023-08-15 Thread Viktor Dukhovni via Postfix-users
On Tue, Aug 15, 2023 at 05:12:53PM -0400, Viktor Dukhovni via Postfix-users wrote: > > 2023-08-14T13:12:00.131049-04:00 svr01 > > postfix/postscreen-internal/smtpd[27907]: disconnect from > > mail-eastus2azon11020017.outbound.protection.outlook.com[52.101.56.17] > > ehlo=1 starttls=1 quit=1

[pfx] Re: local_recipient_maps does not apply to local mail submission

2023-08-15 Thread Wietse Venema via Postfix-users
?tienne Miret via Postfix-users: Checking application/pgp-signature: FAILURE -- Start of PGP signed section. > Hello, > > After troubleshooting an issue on my Postfix server, I found out that > the local_recipient_maps parameter is ignored for locally submitted > emails. That is, a recipient

[pfx] local_recipient_maps does not apply to local mail submission

2023-08-15 Thread Étienne Miret via Postfix-users
Hello, After troubleshooting an issue on my Postfix server, I found out that the local_recipient_maps parameter is ignored for locally submitted emails. That is, a recipient not listed there will: - be rejected for mail received from the Internet, - still get mails from the sendmail commnd

[pfx] Re: new waves of connect/disconnect from *.outlook.com; any add'l pfx configs useful for further remediation?

2023-08-15 Thread pgnd via Postfix-users
OK mail from outlook does make it's way thru; e.g., since Monday, xzegrep "250 2.0.0 Queued as.*outbound.protection.outlook.com" /var/log/postfix/postfix.log | wc -l 4343 Isn't that outbound mail*to* Microsoft-hosted domains? I wouldn't expect that to appear in logs of incoming

[pfx] Re: new waves of connect/disconnect from *.outlook.com; any add'l pfx configs useful for further remediation?

2023-08-15 Thread pgnd via Postfix-users
There is no protection you can add to prevent this fair enuf other than firewalling them completely. the wishful-thinking of fw'ing MS's entire ASN has crossed my mind more than once ;-) Why do they do this? Only they know. if they do, they certainly don't respond to @support/etc

[pfx] Re: new waves of connect/disconnect from *.outlook.com; any add'l pfx configs useful for further remediation?

2023-08-15 Thread Viktor Dukhovni via Postfix-users
On Tue, Aug 15, 2023 at 04:14:58PM -0400, pgnd via Postfix-users wrote: > 2023-08-14T13:11:53.782611-04:00 svr01 postfix/postscreen[27910]: CONNECT > from [52.101.56.17]:32607 to [209.123.234.54]:25 > 2023-08-14T13:11:59.860098-04:00 svr01 postfix/postscreen[27910]: PASS NEW >

[pfx] Re: new waves of connect/disconnect from *.outlook.com; any add'l pfx configs useful for further remediation?

2023-08-15 Thread Noel Jones via Postfix-users
On 8/15/2023 3:14 PM, pgnd via Postfix-users wrote: my "BFFs" @ M$'s *.outlook.com have decided over the last month or so to send many 10K's of these 2023-08-14T13:11:53.782611-04:00 svr01 postfix/postscreen[27910]: CONNECT from [52.101.56.17]:32607 to [209.123.234.54]:25

[pfx] new waves of connect/disconnect from *.outlook.com; any add'l pfx configs useful for further remediation?

2023-08-15 Thread pgnd via Postfix-users
my "BFFs" @ M$'s *.outlook.com have decided over the last month or so to send many 10K's of these 2023-08-14T13:11:53.782611-04:00 svr01 postfix/postscreen[27910]: CONNECT from [52.101.56.17]:32607 to [209.123.234.54]:25 2023-08-14T13:11:59.860098-04:00 svr01

[pfx] PATCH: Postfix does not fallback to plaintext

2023-08-15 Thread Wietse Venema via Postfix-users
Viktor Dukhovni via Postfix-users: > On Tue, Aug 15, 2023 at 11:33:08AM -0400, Wietse Venema via Postfix-users > wrote: > > > With that, the condition evaluates to: > > > > 1: session->tls_context == 0 true > > 2: state->tls->level == TLS_LEV_MAYpresumably

[pfx] Re: Postfix does not fallback to plaintext

2023-08-15 Thread Viktor Dukhovni via Postfix-users
On Tue, Aug 15, 2023 at 11:51:07AM -0400, Wietse Venema via Postfix-users wrote: > > That's my instinct also. Waiting out transient glitches by retrying on > > the next delivery attempt is not an option for probes. And probes don't > > leak message content in the clear, nor even the full

[pfx] Re: Troubleshooting mail loop issue

2023-08-15 Thread Paul Enlund via Postfix-users
Hi One thing to check is that your MX server allowed recipients is in sync with M365 allowed recipients. Regards Paul On 14/08/2023 22:23, Alex via Postfix-users wrote: Hi, I have what appears to be a complicated mail loop problem that I can't figure out. I suspect that their receiving

[pfx] Re: Postfix does not fallback to plaintext

2023-08-15 Thread Wietse Venema via Postfix-users
Viktor Dukhovni via Postfix-users: > On Tue, Aug 15, 2023 at 11:33:08AM -0400, Wietse Venema via Postfix-users > wrote: > > > With that, the condition evaluates to: > > > > 1: session->tls_context == 0 true > > 2: state->tls->level == TLS_LEV_MAYpresumably

[pfx] Re: Postfix does not fallback to plaintext

2023-08-15 Thread Serg via Postfix-users
Well, in my case this is recipient verification - I am sending abuse complaints in bulk and to eliminate tons of email bounces I have enabled address verification. On 8/15/23 15:43, Viktor Dukhovni via Postfix-users wrote: So it seems that legitimate domains (from which one actually cares to

[pfx] Re: Postfix does not fallback to plaintext

2023-08-15 Thread Viktor Dukhovni via Postfix-users
On Tue, Aug 15, 2023 at 11:33:08AM -0400, Wietse Venema via Postfix-users wrote: > With that, the condition evaluates to: > > 1: session->tls_context == 0 true > 2: state->tls->level == TLS_LEV_MAYpresumably true > 3: PREACTIVE_DELAY >=

[pfx] Re: Postfix does not fallback to plaintext

2023-08-15 Thread Wietse Venema via Postfix-users
Viktor Dukhovni via Postfix-users: > > > Aug 15 12:22:18 flopster postfix/cleanup[9839]: 5058916E081A: > > > message-id=<20230815092218.5058916e0...@flopster.at.encryp.ch> > > > Aug 15 12:22:18 flopster postfix/qmgr[11478]: 5058916E081A: > > > from=, size=316, nrcpt=1 (queue active) > > > Aug 15

[pfx] Re: Postfix does not fallback to plaintext

2023-08-15 Thread Serg via Postfix-users
On 8/15/23 14:49, Viktor Dukhovni via Postfix-users wrote: smtp_tls_loglevel = 0 Level 1 is typically more informative at negligible additional cost. I have set this option and tried to send email once again: Aug 15 18:11:48 flopster postfix/smtp[6025]: warning: TLS library problem:

[pfx] Re: Troubleshooting mail loop issue

2023-08-15 Thread Wietse Venema via Postfix-users
Your loop, based on Received: headers, newer at the top, older at the bottom: Received: from xavier.example.com (209.216.111.114) by CO1PEPF44F7.mail.protection.outlook.com (10.167.241.197) with Microsoft S Received: from localhost by xavier.example.com (Postfix) with ESMTP id

[pfx] Re: Postfix does not fallback to plaintext

2023-08-15 Thread Viktor Dukhovni via Postfix-users
[ $subject would have been more clear had the OP mentioned that he's talking about address verification probes. ] On Tue, Aug 15, 2023 at 01:29:14PM +, Serg via Postfix-users wrote: > > admin@flopster ~ $ sudo postconf | grep ^smtp_tls > > smtp_tls_cert_file =

[pfx] Postfix does not fallback to plaintext

2023-08-15 Thread Serg via Postfix-users
Hello, I have following configuration applied: admin@flopster ~ $ sudo postconf | grep ^smtp_tls smtp_tls_CAfile = smtp_tls_CApath = smtp_tls_block_early_mail_reply = no smtp_tls_cert_file = /etc/ssl/domains/flopster.at.encryp.ch/fullchain smtp_tls_chain_files = smtp_tls_ciphers = medium

[pfx] Re: Block based on subject and rcpt to

2023-08-15 Thread Bill Cole via Postfix-users
On 2023-08-14 at 15:13:54 UTC-0400 (Mon, 14 Aug 2023 16:13:54 -0300) SysAdmin EM via Postfix-users is rumored to have said: Hi, Is it possible to discard an email based on the Subject and the destination email address? I try this and not work: /^Subject:.*Test email subject

[pfx] Re: Troubleshooting mail loop issue

2023-08-15 Thread Bill Cole via Postfix-users
On 2023-08-14 at 17:23:34 UTC-0400 (Mon, 14 Aug 2023 17:23:34 -0400) Alex via Postfix-users is rumored to have said: Hi, I have what appears to be a complicated mail loop problem that I can't figure out. I suspect that their receiving system (M365) is somehow reinjecting the message back to

[pfx] Re: smtp auth on port 25

2023-08-15 Thread Marvin Renich via Postfix-users
* Benny Pedersen via Postfix-users [230815 05:10]: > Peter via Postfix-users skrev den 2023-08-15 10:44: > > > This is a bad idea for several reasons. If you want submission use > > ports 465 and/or 587 as they are intended. Don't try to use a service > > that is meant for a different purpose

[pfx] Re: smtp auth on port 25

2023-08-15 Thread Benny Pedersen via Postfix-users
Peter via Postfix-users skrev den 2023-08-15 10:44: This is a bad idea for several reasons. If you want submission use ports 465 and/or 587 as they are intended. Don't try to use a service that is meant for a different purpose for this. mta to mta can use port 465 or 587 aswell for intended

[pfx] Re: smtp auth on port 25

2023-08-15 Thread Peter via Postfix-users
On 15/08/23 12:15, Jon Smart via Postfix-users wrote: I have disabled port 587/465 to be accessed publicly. These are the submission and submissions ports, for user submission of mail. but port 25 must be open to internet for MTA communications. Port 25 is for MX to MX communication, for a

[pfx] Re: smtp auth on port 25

2023-08-15 Thread Christian Kivalo via Postfix-users
On August 15, 2023 2:15:21 AM GMT+02:00, Jon Smart via Postfix-users wrote: >Hello, > >I have disabled port 587/465 to be accessed publicly. > >but port 25 must be open to internet for MTA communications. > >My question is, can external users access port 25 for smtp auth and send >mail then?

[pfx] Re: Postfix Help with a rejection message

2023-08-15 Thread Christian Kivalo via Postfix-users
On August 15, 2023 7:05:32 AM GMT+02:00, Chad Lundquist via Postfix-users wrote: >I am getting legitimate emails REJECTED by postfix and I need to figure out a >way to forward them or whitelist them from getting blocked. > > > >I am using PFLogsumm and see this: > > > >message reject