[pfx] Re: DISPUTED: SMTP Smuggling with long-term fix

2024-01-08 Thread Wietse Venema via Postfix-users
Also on-line at https://www.postfix.org/false-smuggling-claims.html and linked from https://www.postfix.org/smtp-smuggling.html I expect to do a stable release update in a week or so, that will include non-emergency fixes that I wanted to release in December, and that silences false vulnerability

[pfx] Re: Redirect deferred mails via IP4 or IP6 addresses (automatically)

2024-01-08 Thread Wietse Venema via Postfix-users
Michael Grimm via Postfix-users: > > Postfix has a "rule based language" for receiving mail, but there > > is no such thing for outbound deliveries. > > I am only curious of how much functionality would be needed for > that? There is zero code, so that would be a lot of work. To give an example,

[pfx] Re: Redirect deferred mails via IP4 or IP6 addresses (automatically)

2024-01-08 Thread Wietse Venema via Postfix-users
Michael Grimm via Postfix-users: > [FreeBSD 14-STABLE, postfix 3.8.4, dovecot 2.3.21, rspamd 3.7.5] > > Hi > > Sometimes outgoing mail is deferred due to "reputational issues" > at the receiving side. These "reputational issues" mostly concerned > my IP6 addresses, thus I removed IP6 mailing comp

[pfx] DISPUTED: SMTP Smuggling with long-term fix

2024-01-07 Thread Wietse Venema via Postfix-users
Damian via Postfix-users: > If I remember correctly, on the wire there was \r\n\r\n.\r\r\n That is not a viable spoofing attack pattern. To understand why, recall that an authenticated attacker sends an email message to email service A, that contains a non-standard End-of-DATA in the middle follo

[pfx] Re: SMTP Smuggling with long-term fix

2024-01-06 Thread Wietse Venema via Postfix-users
People are welcome to test tools against postfix-3.9-20240106. Wietse ___ Postfix-users mailing list -- postfix-users@postfix.org To unsubscribe send an email to postfix-users-le...@postfix.org

[pfx] Re: SMTP Smuggling with long-term fix

2024-01-06 Thread Wietse Venema via Postfix-users
Damian: > If I remember correctly, on the wire there was \r\n\r\n.\r\r\n Viktor Dukhovni: > Does that also need to be more strict? :-( Indeed, and as usual the fix is trivial. This process is backwards, it is what we get with publication before the analysis, tooling, and software fixes are compl

[pfx] Re: SMTP Smuggling with long-term fix

2024-01-06 Thread Wietse Venema via Postfix-users
BTW All smuggling tests are invalid when the client is allowlisted with smtpd_forbid_bare_newline_exclusions (default: $mynetworks). Wietse ___ Postfix-users mailing list -- postfix-users@postfix.org To unsubscribe send an email to postfix-users-

[pfx] Re: SMTP Smuggling with long-term fix

2024-01-06 Thread Wietse Venema via Postfix-users
Wietse Venema via Postfix-users: > Damian via Postfix-users: > > > The recommended

[pfx] Re: SMTP Smuggling with long-term fix

2024-01-06 Thread Wietse Venema via Postfix-users
Damian via Postfix-users: > > The recommended settings are: > > > > > >

[pfx] Re: CVE-2023-51764

2024-01-05 Thread Wietse Venema via Postfix-users
Gerben Wierda via Postfix-users: > Is > > smtpd_data_restrictions = > reject_unauth_pipelining, > permit_mynetworks, > permit_sasl_authenticated, > reject_multi_recipient_bounce > > enough to stop this small(?) risk (before I manage to upgrade)? Please see https:/

[pfx] Re: Behaviour in case of multiple relay hosts with multiple DNS records

2024-01-05 Thread Wietse Venema via Postfix-users
Peter Wienemann via Postfix-users: > Dear Wietse, > > thanks for your careful review. > > On 2024-01-05 16:11:56 +0100, Wietse Venema via Postfix-users wrote: > > Peter Wienemann via Postf

[pfx] Re: Behaviour in case of multiple relay hosts with multiple DNS records

2024-01-05 Thread Wietse Venema via Postfix-users
Peter Wienemann via Postfix-users: > Hi Viktor, > > On 2024-01-02 18:13:22 +0100, Viktor Dukhovni via Postfix-users wrote: > > That said, indeed the documentation is not explicit on this point, one > > has to read "between the lines". If your technical writing skills are > > adequate, perhaps you

[pfx] Re: SMTP Smuggling, workarounds and fix

2024-01-04 Thread Wietse Venema via Postfix-users
Geert Hendrickx via Postfix-users: > On Thu, Jan 04, 2024 at 10:36:23 -0500, Wietse Venema via Postfix-users wrote: > > Wietse Venema via Postfix-users: > > > Geert Hendrickx via Postfix-users: > > > > I just found an unexpected side effect of this particular confi

[pfx] Re: SMTP Smuggling, workarounds and fix

2024-01-04 Thread Wietse Venema via Postfix-users
Wietse Venema via Postfix-users: > Geert Hendrickx via Postfix-users: > > On Thu, Dec 21, 2023 at 07:51:31 -0500, Wietse Venema via Postfix-users > > wrote: > > > * With all Postfix versions, "smtpd_data_restrictions = > > > reject_unauth_pipel

[pfx] Re: SMTP Smuggling, workarounds and fix

2024-01-04 Thread Wietse Venema via Postfix-users
Geert Hendrickx via Postfix-users: > On Thu, Dec 21, 2023 at 07:51:31 -0500, Wietse Venema via Postfix-users wrote: > > * With all Postfix versions, "smtpd_data_restrictions = > > reject_unauth_pipelining" will stop the published exploit. > > > Hi &g

[pfx] Re: Different outgoing IP address by virtual domain

2024-01-01 Thread Wietse Venema via Postfix-users
Wietse Venema via Postfix-users: > Emmett Culley via Postfix-users: > > I have a long time running Postfix server (version 2.10) where I need to > > send from specific IP addresses for some virtual domains. > > > > I have it working, sort of. If I send email

[pfx] Re: Different outgoing IP address by virtual domain

2024-01-01 Thread Wietse Venema via Postfix-users
Emmett Culley via Postfix-users: > I have a long time running Postfix server (version 2.10) where I need to send > from specific IP addresses for some virtual domains. > > I have it working, sort of. If I send email from this server to another > server running postfix, it all seems to work. Th

[pfx] Re: How to configure lmtp delivery

2023-12-31 Thread Wietse Venema via Postfix-users
toganm--- via Postfix-users: > WVvP> To integrate Dovecot, see Dovecot documentation for examples. > > That does not help because dovecot is not running on the same machine. It DOES NOT matter where Dovecot runs. Wietse ___ Postfix-users ma

[pfx] Re: How to configure lmtp delivery

2023-12-31 Thread Wietse Venema via Postfix-users
> mailbox_transport = lmtp:172.16.0.216:24 > virtual_transport = lmtp:172.16.0.216:24 No more random experiments. To integrate Dovecot, see Dovecot documentation for examples. Wietse ___ Postfix-users mailing list -- postfix-users@postfix.org T

[pfx] Re: postfix 'non-interactive-package' build/install to non-default target location requires existence of /etc/postfix/{main,master}.cf ?

2023-12-30 Thread Wietse Venema via Postfix-users
pgnd via Postfix-users: > What config &/or build/install options are necessary to complete > a non-interactive Postfix build, with no prior Postfix instance > or configs needed? It is probably a missing "postconf -c /config/dir/name" option. For example, to use the files in the $POSTFIXSOURCE/conf

[pfx] Re: SMTP Smuggling, workarounds and fix

2023-12-30 Thread Wietse Venema via Postfix-users
"Hakon Alstadheim wrote: >Just FYI, I got postfix 3.7.9-0+deb12u1 from bookworm-updates (i.e. >Debian) today. Scott Kitterman: > For those still using Debian Bullseye (oldstable), postfix > 3.5.23-0+deb11u1 is also available from bullseye-updates. Both > of these stable updates were released yest

[pfx] Re: The SMTP HELP command

2023-12-29 Thread Wietse Venema via Postfix-users
John R. Levine via Postfix-users: > On Fri, 29 Dec 2023, Wietse Venema wrote: > > The real reason is that it's easier to convince a few delinquent > > MTA implementors, than an IETF working group. > > The WG isn't opposed but we have a very long list of nits to cle

[pfx] Re: The SMTP HELP command

2023-12-29 Thread Wietse Venema via Postfix-users
John R. Levine via Postfix-users: > On Fri, 29 Dec 2023, Theodore Ts'o wrote: > > Of course, implementing a HELP command is also not much work, so why > > not? > > That's the conclusion we came to in emailcore. It's so easy to implement > that even though it's been a long time (if ever) since it

[pfx] Re: Behaviour in case of multiple relay hosts with multiple DNS records

2023-12-29 Thread Wietse Venema via Postfix-users
Peter Wienemann via Postfix-users: > Dear Wietse, > > On 2023-12-15 22:17:08 +0100, Wietse Venema via Postfix-users wrote: > > Peter Wienemann via Postfix-users: > >> Thanks Wietse! Your pseudo-code clarifies the approach chosen by > >> Postfix. What still rema

[pfx] Re: The SMTP HELP command

2023-12-29 Thread Wietse Venema via Postfix-users
Wietse Venema via Postfix-users: > John Levine via Postfix-users: > > Over in the IETF we're slowly working on updating RFC 5321. > > > > Today's topic is the HELP command. The current spec says that it is > > mandatory to implment it. Most MTAs implement i

[pfx] Re: The SMTP HELP command

2023-12-28 Thread Wietse Venema via Postfix-users
John Levine via Postfix-users: > Over in the IETF we're slowly working on updating RFC 5321. > > Today's topic is the HELP command. The current spec says that it is > mandatory to implment it. Most MTAs implement it by returning a fixed > string, or something close to fixed, e.g., gmail's answer a

[pfx] Re: SMTP Smuggling, workarounds and fix // Clarification on BDAT

2023-12-27 Thread Wietse Venema via Postfix-users
Damian via Postfix-users: > > It really does not matter much, but leaving BDAT enabled can help in > > some cases. It is not necessary to go this deep down the rabbit hole. > > So what could be smuggled into a Postfix that defines > "reject_unauth_pipelining" but does not define > "smtpd_discard_

[pfx] Re: SMTP Smuggling and filters

2023-12-26 Thread Wietse Venema via Postfix-users
Pedro David Marco: > To my understanding, the Smuggled email contains SMTP data plus > headers, plus body... , so what is the problem if filters check > them as well? Wietse: > The problem is that Postfix receives TWO messages. > https://www.postfix.org/smtp-smuggling.html#impact Pedro David Marc

[pfx] Re: SMTP Smuggling and filters

2023-12-26 Thread Wietse Venema via Postfix-users
Pedro David Marco via Postfix-users: > To my understanding, the Smuggled email contains SMTP data plus > headers, plus body... , so what is the problem if filters check > them as well? The problem is that Postfix receives TWO messages. https://www.postfix.org/smtp-smuggling.html#impact W

[pfx] Re: The log is overflowed with same error message "end-of-input while reading request from tlsmgr socket: Application error"

2023-12-25 Thread Wietse Venema via Postfix-users
Dmitry Katsubo via Postfix-users: > Dear Postfix team, > > In some rare cases when OS is CPU-loaded, the log is overflowed with the > following messages from Postfix, which fills up log space very quickly: > > 2023-12-24 18:04:41.016972 postfix/tlsmgr[105819]: warning: end-of-input > while read

[pfx] Re: SMTP Smuggling disclosure process & VINCE

2023-12-24 Thread Wietse Venema via Postfix-users
Geert Hendrickx via Postfix-users: > On Sat, Dec 23, 2023 at 18:09:10 -0500, Wietse Venema via Postfix-users wrote: > > Note that only the encapsulating message can contain a DKIM signature > > by the authenticated sender's domain. The smuggled message caannot > > conta

[pfx] Re: SMTP Smuggling disclosure process & VINCE

2023-12-23 Thread Wietse Venema via Postfix-users
John D'Orazio via Postfix-users: > I believe some users are in fact confusing DMARC and DKIM. DMARC is a > policy that lets receiving servers know how to deal with mail that seems to > be coming from your server but has *not* passed SPF and DKIM checks. From > the Google support forum: > > DMARC (

[pfx] Re: SMTP Smuggling disclosure process & VINCE

2023-12-23 Thread Wietse Venema via Postfix-users
Bill Sommerfeld via Postfix-users: > On 12/22/23 17:30, Vijay S Sarvepalli via Postfix-users wrote: > > Arguably the second server is at fault > > here for "SPF" signing two emails, nevertheless the vulnerability is due > > to the combinatorial or Composition Attack as Wietse has identified. >

[pfx] Re: SMTP Smuggling disclosure process & VINCE

2023-12-23 Thread Wietse Venema via Postfix-users
Tim Weber via Postfix-users: > I think this is a very good way to look at it, and a helpful lesson > from this situation. Especially since, reading the article as it > was published, it is obvious that SEC must have known the impact > to Postfix and Sendmail. I understand their urge to notify Cisco

[pfx] Re: Add custom header depending on envelope rcpt to

2023-12-23 Thread Wietse Venema via Postfix-users
Peter Uetrecht via Postfix-users: > Hello everyone, > > I need an easy way to add a custom header that depends on the domain part > of the envelope rcpt to. If the receiving domain matches the custom header > should be added. I know about header_checks, but that can?t be used because > the receive

[pfx] Re: SMTP Smuggling disclosure process & VINCE

2023-12-22 Thread Wietse Venema via Postfix-users
Wietse Venema via Postfix-users: > Wietse Venema via Postfix-users: > > Tim Weber via Postfix-users: > > > Hi Wietse, > > > > > > thanks for getting back to me so quickly. Please rest assured that > > > I'm not looking for someone to blame. My mo

[pfx] Postfix stable release 3.5.23

2023-12-22 Thread Wietse Venema via Postfix-users
[An on-line version of this announcement will be available at https://www.postfix.org/announcements/postfix-3.5.23.html] Fixed with Postfix 3.5.23: * Security: this release adds support to defend against an email spoofing attack (SMTP smuggling) on recipients at a Postfix server. For b

[pfx] Re: SMTP Smuggling disclosure process & VINCE

2023-12-22 Thread Wietse Venema via Postfix-users
Wietse Venema via Postfix-users: > Tim Weber via Postfix-users: > > Hi Wietse, > > > > thanks for getting back to me so quickly. Please rest assured that > > I'm not looking for someone to blame. My motivation is to try to > > find out whether SEC's rel

[pfx] Postfix 3.6.13 stable release

2023-12-22 Thread Wietse Venema via Postfix-users
[An on-line version of this announcement will be available at https://www.postfix.org/announcements/postfix-3.6.13.html] Fixed with Postfix 3.6.13: * Security: this release adds support to defend against an email spoofing attack (SMTP smuggling) on recipients at a Postfix server. For b

[pfx] Re: SMTP Smuggling disclosure process & VINCE

2023-12-22 Thread Wietse Venema via Postfix-users
Tim Weber via Postfix-users: > Hi Wietse, > > thanks for getting back to me so quickly. Please rest assured that > I'm not looking for someone to blame. My motivation is to try to > find out whether SEC's release process really has been as responsible > as they claim: Sorry, you are talking to th

[pfx] Postfix 3.7.9 stable release

2023-12-22 Thread Wietse Venema via Postfix-users
[An on-line version of this announcement will be available at https://www.postfix.org/announcements/postfix-3.7.9.html] Fixed with Postfix 3.7.9: * Security: this release adds support to defend against an email spoofing attack (SMTP smuggling) on recipients at a Postfix server. For bac

[pfx] Re: SMTP Smuggling disclosure process & VINCE

2023-12-22 Thread Wietse Venema via Postfix-users
We had no indication thet there was a succesful spoofing attack that required the composition of TWO servers with specific differences in their handling of non-standard line endings in SMTP. Otherwise, we would certainly have convinced SEC Consult to change their time schedule until after people h

[pfx] Re: SMTP Smuggling disclosure process & VINCE

2023-12-22 Thread Wietse Venema via Postfix-users
[Reposted, as I din't see the response show up] CERT/CC reached out to Postfix developers. At no point were we made aware that there was a successful SPF spoofing attack that required the combination of TWO email services with SPECIFIC DIFFERENCES in the way they handle line endings other than .

[pfx] Postfix stable release 3.8.4

2023-12-22 Thread Wietse Venema via Postfix-users
[An on-line version of this announcement will be available at https://www.postfix.org/announcements/postfix-3.8.4.html] Fixed with Postfix 3.8.4: * Security: this release adds support to defend against an email spoofing attack (SMTP smuggling) on recipients at a Postfix server. For bac

[pfx] Re: Vulnerability disclosure process documentation?

2023-12-22 Thread Wietse Venema via Postfix-users
The www.postfix.org home page links to my personal home page. My personal home page contains my email address and PGP key. There are no process requirements, just talk to me. Wietse ___ Postfix-users mailing list -- postfix-users@postfix.org To

[pfx] Re: [pfx-ann] SMTP Smuggling, workarounds and fix

2023-12-21 Thread Wietse Venema via Postfix-users
Viktor Dukhovni via Postfix-users: > On Thu, Dec 21, 2023 at 04:29:20PM -0500, Wietse Venema via Postfix-users > wrote: > > > > > https://gitlab.com/ohisee/block-shodan-stretchoid-census > > > > > > I feel no particular urge to block them. > > >

[pfx] Re: [pfx-ann] SMTP Smuggling, workarounds and fix

2023-12-21 Thread Wietse Venema via Postfix-users
Viktor Dukhovni via Postfix-users: > On Thu, Dec 21, 2023 at 03:08:57PM -0500, pgnd via Postfix-users wrote: > > > > This even includes "shodan" looking > > > > ugh. shodan. > > > > this can help a bit > > > > https://gitlab.com/ohisee/block-shodan-stretchoid-census > > I feel no particular

[pfx] Re: [pfx-ann] SMTP Smuggling, workarounds and fix

2023-12-21 Thread Wietse Venema via Postfix-users
Kim Sindalsen via Postfix-users: > I'm reading that either " smtpd_data_restrictions = > reject_unauth_pipelining" or "smtpd_forbid_unauth_pipelining = yes" should > *work* for shor-term workaround, right? They look for the same thing but at different times. > I've had data-restrictions for years

[pfx] Re: postfix and smuggling spoofing

2023-12-21 Thread Wietse Venema via Postfix-users
natan: > https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/ Wietse: > See:https://www.postfix.org/smtp-smuggling.html natan: > reject_unauth_pipelining in: smtpd_data_restrictions > or maybe only in smtpd_end_of_data_restrictions ? Then, Postfix will have to receive t

[pfx] Re: postfix and smuggling spoofing

2023-12-21 Thread Wietse Venema via Postfix-users
natan via Postfix-users: > Hi > I found today > > https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/ See: https://www.postfix.org/smtp-smuggling.html ___ Postfix-users mailing list -- postfix-users@postfix.org To unsubscribe

[pfx] Re: SMTP Smuggling still possible after disabling pipelining

2023-12-21 Thread Wietse Venema via Postfix-users
Till W. via Postfix-users: [ Charset ISO-8859-1 converted... ] > Dear team, > we enabled smtpd_forbid_unauth_pipelining in our Postfix, but unfortunately > it still accepts \n.\n (.) as EOD. This is our configuration in > main.cf: > > smtpd_forbid_unauth_pipelining = yes > smtpd_discard_ehlo_key

[pfx] Re: SMTP Smuggling still possible after disabling pipelining

2023-12-21 Thread Wietse Venema via Postfix-users
Till W. via Postfix-users: > Dear team, > we enabled smtpd_forbid_unauth_pipelining in our Postfix, but unfortunately > it still accepts \n.\n (.) as EOD. This is our configuration in > main.cf: > Of course it does. It is supposed to reject message content that is received IN THE SAME PACKET as

[pfx] SMTP Smuggling, workarounds and fix

2023-12-21 Thread Wietse Venema via Postfix-users
[A longer and updated version of this text may be found at https://www.postfix.org/smtp-smuggling.html] SUMMARY As part of a non-responsible disclosure process, SEC Consult has published an email spoofing attack that involves a composition of email services with specific differences in the way t

[pfx] Re: SMTP smuggling

2023-12-20 Thread Wietse Venema via Postfix-users
Phil Biggs via Postfix-users: > Thursday, December 21, 2023, 10:05:41 AM, Wietse Venema via Postfix-users > wrote: > > > Viktor Dukhovni via Postfix-users: > >> smtpd_data_restrictions=reject_unauth_pipelining. > > > That will, as Viktor observes, on port

[pfx] Re: SMTP smuggling

2023-12-20 Thread Wietse Venema via Postfix-users
Viktor Dukhovni via Postfix-users: > smtpd_data_restrictions=reject_unauth_pipelining. That will, as Viktor observes, on port 25 mitigate the published attack. I'll update the text at https://www.postfix.org/smtp-smuggling.html Wietse ___ Postf

[pfx] Re: SMTP Smuggling short & long term fixes

2023-12-20 Thread Wietse Venema via Postfix-users
Wietse Venema via Postfix-users: > As part of a non-responsible disclosure process, SEC Consult has > published an email spoofing attack that involves a composition of > different mail service behaviors with respect to broken line endings. Also on-line at httpps://www.postfix

[pfx] Re: Postfix using proxy protocol outbound?

2023-12-20 Thread Wietse Venema via Postfix-users
Wietse: >A Postfix implementation will have to work for other use cases, >too. It would be good to know how nginx in forward proxy mode >handles or ignores client address and port info, now and in the >forseeable future. Joachim Lindenberg via Postfix-users: > I double checked documentation at >

[pfx] Re: SMTP Smuggling short & long term fixes'

2023-12-20 Thread Wietse Venema via Postfix-users
Linkcheck via Postfix-users: > On 20/12/2023 3:51 pm, Wietse Venema via Postfix-users wrote: > > "smtpd_forbid_unauth_pipelining = yes > > I tried that (3.7.6) and got... > warning: unknown smtpd restriction: "smtpd_forbid_unauth_pipelining" > > Where sh

[pfx] SMTP Smuggling short & long term fixes

2023-12-20 Thread Wietse Venema via Postfix-users
As part of a non-responsible disclosure process, SEC Consult has published an email spoofing attack that involves a composition of different mail service behaviors with respect to broken line endings. A short-term fix may deployed now, before the upcoming long holiday: - Postfix 3.9 (stable relea

[pfx] Re: Postfix authenticated sender and From: header verification

2023-12-19 Thread Wietse Venema via Postfix-users
Wietse Venema via Postfix-users: > Viktor Dukhovni via Postfix-users: > [. in BDAT payload] > > > If my suspicion is correct, a dwnstream server may receive the > > > normal and suggled content as two separate messages. > > > > I don't see why. It sho

[pfx] Re: Postfix authenticated sender and From: header verification

2023-12-19 Thread Wietse Venema via Postfix-users
Viktor Dukhovni via Postfix-users: [. in BDAT payload] > > If my suspicion is correct, a dwnstream server may receive the > > normal and suggled content as two separate messages. > > I don't see why. It shouldn't matter how Microsoft's MTA ends up > with a message containing "." or (.), so long a

[pfx] Re: Postfix using proxy protocol outbound?

2023-12-19 Thread Wietse Venema via Postfix-users
Wietse > This means that nginx ignores the source port in the proxy protocol. > Is that documented somewhere? Joachim Lindenberg: > It does not ignore it, the variable exists. My configuration doesn't > use it for outbound, as plenty of ports are in used, and dynamic > is ok for the use case. Does

[pfx] Re: Postfix using proxy protocol outbound?

2023-12-19 Thread Wietse Venema via Postfix-users
Joachim Lindenberg via Postfix-users: > >Is there a technical spec of that protocol? Does it look in any > way like HaProxy protocol version 1 or 2? What are the source IP > address and port? > https://nginx.org/en/docs/stream/ngx_stream_proxy_module.html#:~:text=Enables%20the%20PROXY%20protocol >

[pfx] Re: SMTP smuggling in Postfix

2023-12-19 Thread Wietse Venema via Postfix-users
John Levine via Postfix-users: > This paper describes a clever hack that uses defective line endings to embed > a second SMTP session inside a first one, which has the practical effect > of letting you send fake authenticated mail from anyone else who uses the > same mail system you do. If that sy

[pfx] Re: Postfix using proxy protocol outbound?

2023-12-19 Thread Wietse Venema via Postfix-users
Joachim Lindenberg via Postfix-users: > >How is this used to connect to an arbitrary destination on the Internet? > > This is probably nginx implementation specific, but one can configure a > stream proxy as follows: > > stream { > server { > listen 10.200.200.1:12345 proxy_protocol;

[pfx] Re: Postfix authenticated sender and From: header verification

2023-12-19 Thread Wietse Venema via Postfix-users
Wietse Venema via Postfix-users: > Rejecting stray and while receiving mail will prevent > Postfix from receiving "smuggled" SMTP commands after a malformed > end-of-data sequence, and thus, it will prevent Postfix from > forwarding them. > > So would rejectin

[pfx] Re: Postfix using proxy protocol outbound?

2023-12-19 Thread Wietse Venema via Postfix-users
Joachim Lindenberg via Postfix-users: > I'd like to challenge that. (HA) Proxy protocol essentially implies > to connect to another configured address and then prepend a string > with connection info to the TCP stream. Indeed. The (HA) proxy accepts a connection from an arbitrary client IP addres

[pfx] Re: Postfix using proxy protocol outbound?

2023-12-18 Thread Wietse Venema via Postfix-users
Wietse; > inside Postfix -reverse haproxy-> remote MTAs in the Internet > That is currently not implemented, and no design exists. Joachim Lindenberg via Postfix-users: > Hello Wietse, > Yes, exactly, no second instance. Ok, implies I haven't overlooked > something. Is this an option you are

[pfx] Re: Postfix authenticated sender and From: header verification

2023-12-18 Thread Wietse Venema via Postfix-users
Wietse: > - Don't accept mail with a broken end-of-data sequence (Postfix > currently allows zero or more followed by ). Or more > generally, don't accept or that aren't part of a > sequence. Postfix does not support BDAT with BINARYMIME, so there > is no valid use of stray or bytes. Vijay S

[pfx] Re: Postfix authenticated sender and From: header verification

2023-12-18 Thread Wietse Venema via Postfix-users
Viktor Dukhovni via Postfix-users: > - Postfix 3.9 (pending official release soon), rejects unuthorised > pipelining by default: "smtpd_forbid_unauth_pipelining = yes". > > - Postfix 3.8.1, 3.7.6, 3.6.10 and 3.5.20 include the same supporting > code as 3.9 snapshots, but the "smtpd_forbid_unau

[pfx] Re: Postfix authenticated sender and From: header verification

2023-12-18 Thread Wietse Venema via Postfix-users
Bill Cole via Postfix-users: > On 2023-12-18 at 11:31:47 UTC-0500 (Mon, 18 Dec 2023 16:31:47 +) > Vijay S Sarvepalli via Postfix-users > is rumored to have said: > > > Hello Viktor, Wietse, > > (I am copying the Postfix community as the report is out in the public > > now) > > > > First of a

[pfx] Re: mail in SRS-format in destination bypasses postfix rules

2023-12-18 Thread Wietse Venema via Postfix-users
Kristoff via Postfix-users: > Dec 17 04:32:05 smtp postfix/smtp[725772]: 4F58E6A10A0: > to=u...@example.com, > orig_to=SRS0=zxmM=H4=example.com=u...@ourhobbyclubdomain.com, > relay=mail.example.com[A.B.C.D]:25, delay=0.16, delays=0.05/0/0.08/0.02, > dsn=2.0.0, status=sent (250 2.0.0 Ok: queued

[pfx] Re: Postfix using proxy protocol outbound?

2023-12-18 Thread Wietse Venema via Postfix-users
Did you mean instead of inside Postix -> outside Postfix -> remote MTAs in the Internet Use inside Postfix -reverse haproxy-> remote MTAs in the Internet Theat is currently not implemented, and no design exists. Wietse ___ Postfix-us

[pfx] Re: mail in SRS-format in destination bypasses postfix rules

2023-12-17 Thread Wietse Venema via Postfix-users
POstfix does not use he sender email addres for relay permission checks, unless *you* configired Postfix to do so. For further support we need output from: postconf -n postconf -P and logging NON-DEBUG from postfix smtpd (the server). Wietse

[pfx] Re: sasl_passwd hash

2023-12-17 Thread Wietse Venema via Postfix-users
saunders.nicholas--- via Postfix-users: > /etc/postfix/sasl/sasl_passwd is where I have it. The example is: That file is mainained by Cyrus SASL. Questions about implementation details are bettere asked there. Wietse ___ Postfix-users mailing

[pfx] Re: Behaviour in case of multiple relay hosts with multiple DNS records

2023-12-15 Thread Wietse Venema via Postfix-users
Peter Wienemann via Postfix-users: > On 2023-12-12 15:51:58 +0100, Wietse Venema via Postfix-users wrote: > > Peter Wienemann via Postfix-users: > >> Dear Postfix experts, > >> > >> checking the documentation for the relayhost parameter [0] I find no > >&

[pfx] Re: Exposing the Postfix-generated Received: header to Milters

2023-12-13 Thread Wietse Venema via Postfix-users
Steffen Nurpmeso via Postfix-users: > Wietse Venema via Postfix-users wrote in > <4sr8hc44p7zj...@spike.porcupine.org>: > |Currently, Postfix does not send the Postfix-generated Received: > |header to Milters, because that is how Sendmail works, that is what > ... >

[pfx] Re: PATCH: using Milter to change a PREPENDed header

2023-12-13 Thread Wietse Venema via Postfix-users
Jiri Bourek via Postfix-users: > My response was quoting the message that mentions the patch changing > behaviour of PREPEND - message from 10 Dec 2023 19:04:55 -0500 (EST). I > now spotted the "With this, no change is needed to the Postfix SMTP > daemon" sentence in message from 12 Dec 2023 19:

[pfx] Exposing the Postfix-generated Received: header to Milters

2023-12-13 Thread Wietse Venema via Postfix-users
Currently, Postfix does not send the Postfix-generated Received: header to Milters, because that is how Sendmail works, that is what Milters expect, and changing the behavior unilaterally would break compatibility with a large installed base. This information would improve the Milter's analysis.

[pfx] Re: PATCH: using Milter to change a PREPENDed header

2023-12-13 Thread Wietse Venema via Postfix-users
Jiri Bourek via Postfix-users: > Example for current behaviour: > > Received-SPF: Pass *<-- only we could've add this* > Received: from some.server by this.server > > With the new one: > > Received: from some.server by this.server > Received-SPF: Pass *<-- did scammer add it or did we?* Once ag

[pfx] Re: printer ip SMTP AUTH / mynetworks question

2023-12-13 Thread Wietse Venema via Postfix-users
lists--- via Postfix-users: > I have a user with an 'old' printer/scanner who wants to scan/email scans > from the home located device > > printer offers: > machine email address: > SMTP server: > SMTP server port: > > send authentication: PoPb4SMTP/SMTP AUTH: Plain/Login/CRAM-MD5/Auto If the pr

[pfx] Re: Postfix Milter, the gift that keeps on giving (was: PATCH: using Milter to change a PREPENDed header)

2023-12-12 Thread Wietse Venema via Postfix-users
Carlos Velasco via Postfix-users: > > Thus, the Postfix code that handles header update/delete requests > > was still naively skipping the first header, making calls to delete > > the prepended Received-SPF: header ineffective, and mis-directing > > calls to delete the first Milter-visible Received

[pfx] Re: Postfix Milter, the gift that keeps on giving (was: PATCH: using Milter to change a PREPENDed header)

2023-12-12 Thread Wietse Venema via Postfix-users
Carlos Velasco via Postfix-users: > > Wietse Venema via Postfix-users escribi? el 11/12/2023 a las 22:30: > > Wietse Venema: > >> Patch below. > > Carlos Velasco: > >> Tested patch against 3.8.3, now it works as expected. Thank you. > >> No duplicat

[pfx] Re: Behaviour in case of multiple relay hosts with multiple DNS records

2023-12-12 Thread Wietse Venema via Postfix-users
Peter Wienemann via Postfix-users: > Dear Postfix experts, > > checking the documentation for the relayhost parameter [0] I find no > indication how Postfix behaves in case of multiple relay hosts with > multiple DNS entries. Let us assume the following setting: for each destination d in re

[pfx] Re: Postfix Milter, the gift that keeps on giving (was: PATCH: using Milter to change a PREPENDed header)

2023-12-11 Thread Wietse Venema via Postfix-users
Carlos Velasco via Postfix-users: > I think you are absolutely correct in your analysis. > I've been looking over the code and, although there is a lot I > still don't understand, your yesterday patch seems more a (good) > workaround to the real problem. > I also located the cleanup_header_done_cal

[pfx] Postfix Milter, the gift that keeps on giving (was: PATCH: using Milter to change a PREPENDed header)

2023-12-11 Thread Wietse Venema via Postfix-users
Wietse Venema: > Patch below. Carlos Velasco: > Tested patch against 3.8.3, now it works as expected. Thank you. > No duplicated "Received-SPF" and *removing "Received" in position > 1 is now not the own generated, is really the first one Received > seen in the

[pfx] Re: Milter own Postfix-prepended Received

2023-12-11 Thread Wietse Venema via Postfix-users
is talking here about breaking any compatibility, re-read the > >> > messages. > > >Bill Cole via Postfix-users: > >> What did I miss? Are you not asking for Postfix to support providing > >> milters with a header that none of them expect and which no o

[pfx] Re: Milter own Postfix-prepended Received

2023-12-11 Thread Wietse Venema via Postfix-users
Bill Cole via Postfix-users: > On 2023-12-11 at 09:37:39 UTC-0500 (Mon, 11 Dec 2023 15:37:39 +0100) > Carlos Velasco via Postfix-users > is rumored to have said: > > > Bill Cole via Postfix-users escribi? el 11/12/2023 a las 15:31: > >> On 2023-12-10 at 16:37:16 UTC-0500 (Sun, 10 Dec 2023 22:37:1

[pfx] Re: PATCH: using Milter to change a PREPENDed header

2023-12-11 Thread Wietse Venema via Postfix-users
Carlos Velasco via Postfix-users: > > Wietse Venema via Postfix-users escribi? el 11/12/2023 a las 1:11: > > Patch below. > Tested patch against 3.8.3, now it works as expected. Thank you. > No duplicated "Received-SPF" and removing "Received" in position

[pfx] Re: PATCH: using Milter to change a PREPENDed header

2023-12-10 Thread Wietse Venema via Postfix-users
Patch below. Wietse --- /var/tmp/postfix-3.9-20231210/src/smtpd/smtpd.c 2023-10-12 11:34:40.0 -0400 +++ src/smtpd/smtpd.c 2023-12-10 18:52:56.0 -0500 @@ -3404,13 +3404,6 @@ } /* - * PREPEND message headers above our own Received: header. - */ -

[pfx] PATCH: using Milter to change a PREPENDed header

2023-12-10 Thread Wietse Venema via Postfix-users
Wietse Venema via Postfix-users: > Wietse: > > I asked for a copy of the (headers of the) resulting message that > > Postfix delivers. > > - Does it have a Received-SPF header? > > - Does it have two? > > Carlos Velasco: > > 1. Deleting the header in th

[pfx] Re: Milter own Postfix-prepended Received

2023-12-10 Thread Wietse Venema via Postfix-users
Wietse: > I asked for a copy of the (headers of the) resulting message that > Postfix delivers. > - Does it have a Received-SPF header? > - Does it have two? Carlos Velasco: > 1. Deleting the header in the milter or doing nothing in the milter > has the same result: final email has only 1 Received

[pfx] Re: Milter own Postfix-prepended Received

2023-12-10 Thread Wietse Venema via Postfix-users
Carlos Velasco via Postfix-users: > > Wietse Venema via Postfix-users escribi? el 10/12/2023 a las 21:53: > > Carlos Velasco via Postfix-users: > >> Wietse Venema via Postfix-users escribi? el 10/12/2023 a las 19:44: > >>> Carlos Velasco via Postfix-users: >

[pfx] Re: Milter own Postfix-prepended Received

2023-12-10 Thread Wietse Venema via Postfix-users
Carlos Velasco via Postfix-users: > Wietse Venema via Postfix-users escribi? el 10/12/2023 a las 19:44: > > Carlos Velasco via Postfix-users: > >> *** And there is the milter, is custom made *** > > You need to reduce complexity. > > > > - If you remove the Mi

[pfx] Re: Milter own Postfix-prepended Received

2023-12-10 Thread Wietse Venema via Postfix-users
Carlos Velasco via Postfix-users: > *** And there is the milter, is custom made *** You need to reduce complexity. - If you remove the Milter, is the header still duplicated? - If you keep the milter and rmeove the polocy lookup, is eom other header duplicated? Wietse __

[pfx] Re: Milter own Postfix-prepended Received

2023-12-10 Thread Wietse Venema via Postfix-users
Carlos Velasco via Postfix-users: > > That means you are somehow calling the policy server twice. > > > > You didn't mention what version of the SPF policy server you are > > using. Recent versions (under the project name SPF Engine, since > > it's not just a policy server anymore) also provide a

[pfx] Re: Milter own Postfix-prepended Received

2023-12-10 Thread Wietse Venema via Postfix-users
Carlos Velasco via Postfix-users: > 2. Duplicated SMTP Access Policy Delegation > This issue is related to headers too. > I'm using pypolicyd-spf as policy daemon to check SPF. It is working fine. > The execution happens before milter. This is ok. > Prepended "Received-SPF" header by pypolicyd-spf

[pfx] Re: Glitches in smtpd_restriction_classes?

2023-12-10 Thread Wietse Venema via Postfix-users
Juerg Reimann via Postfix-users: > I have to following configuration: > > -- -- > > /etc/postfix/main.cf: > smtpd_recipient_restrictions = > ... > check_recipient_access hash:/etc/postfix/protected_destinations, What is in the ...? Wietse __

[pfx] Re: Logging received from address

2023-12-09 Thread Wietse Venema via Postfix-users
Doug Hardie via Postfix-users: > I am using postfix with postsrsd. Is there a way for postfix to > log the from address as originally received? The only addresses > I find in postfix's log are the converted addresses from postsrsd. > Both addresses are logged by postsrsd, but there is no way to t

[pfx] Re: Postscreen & HAProxy Protocol v2

2023-12-07 Thread Wietse Venema via Postfix-users
duluxoz via Postfix-users: > Hi All, > > When using `postscreen_upstream_proxy_protocol = haproxy` is there > anything "special" that needs to be specified to ensure the use of v2 of > the haproxy protocol, or does postfix automatically detect which version > of the haproxy protocol is in use?

<    1   2   3   4   5   6   7   8   9   10   >