Re: [vchkpw] Old Problem Re-visited

2003-11-06 Thread Michael Bowe

- Original Message - 
From: Tom Collins [EMAIL PROTECTED]
To: vpopmail list [EMAIL PROTECTED]
Sent: Thursday, November 06, 2003 5:51 PM
Subject: Re: [vchkpw] Old Problem Re-visited


 On Tuesday, November 4, 2003, at 08:03  AM, Rick Macdougall wrote:
  Well my apologies.  Mad props to Michael Bowe then, and a virtual beer 
  :)
 
 I'll be meeting Michael face-to-face in a few days.  It just so happens 
 that he's less than 100km away from the Melbourne stop on my Australia 
 vacation.
 
 Send a few bucks to my PayPal account and I'll buy us both a real beer! 
   :-)

Haha! Nice one!

Michael.



Re: [vchkpw] IMP, vpopmail, and v-users changing passwords?

2003-11-06 Thread Tom Collins
On Wednesday, November 5, 2003, at 12:22  PM, David Wolfskill wrote:
Would anyone care to provide a pointer to a hint for how to accomplish
allowing virtual users to change their own passwords?
Take a look at qmailadmin.  It's overkill for changing passwords, but 
one of the only ways I know to do it.

A feature request for the next development cycle of qmailadmin is to 
have a simple change password interface where a user can type their 
email address, old password, and new password (twice) to make the 
change.

--
Tom Collins  -  [EMAIL PROTECTED]
Note: The Tom Logic offices will be closed October 23 to November 18.
QmailAdmin: http://qmailadmin.sf.net/  Vpopmail: http://vpopmail.sf.net/
Info on the Sniffter hand-held Network Tester: http://sniffter.com/



Re: [vchkpw] qmailadmin version

2003-11-06 Thread Tom Collins
On Wednesday, November 5, 2003, at 11:54  AM, Remo Mattei wrote:
I have problem once I install qmailadmin on a version that is higher
than .16 any suggestions? I do can log in but I cannot see anything 
else
other than logout in the menu list any suggestions?
I made changes in 1.0.28 that might be related to that problem, so 
please try it (download from qmailadmin.sf.net) and let us know if you 
continue to have problems.

--
Tom Collins  -  [EMAIL PROTECTED]
Note: The Tom Logic offices will be closed October 23 to November 18.
QmailAdmin: http://qmailadmin.sf.net/  Vpopmail: http://vpopmail.sf.net/
Info on the Sniffter hand-held Network Tester: http://sniffter.com/



Re: [vchkpw] Re: Inserting new users via mysql-insert into the vpopmail database

2003-11-06 Thread Tom Collins
On Tuesday, November 4, 2003, at 05:40  AM, Nick Harring wrote:
Actually, this is already a right place to put this, which is in 
randltr. Oddly that's what's used for generating the salt, but not 
what's used for generating the password. Instead the password just 
uses an ugly rand call.
I'd change vgen_pass to do this:

for (i = 0; i  len; i++) {
 k = randltr();
 p[i] = gen_chars[k];
}
return p;
randltr selects from 64 valid salt characters.  The password generator 
pulls from a larger selection of possible characters.

I'd even consider modifying the random password generator to not use 
letters that can be confused with each other (1/I/l and 0/O).

Also, randltr is relying on something else to seed srand, which is 
really a bad idea. One mistake and suddenly everyone's vpopmail 
everywhere is seeding with 1. Oops.
randltr is only used by mkpasswd3() which seeds srandom.  You need to 
be careful to seed rand/random only once.

I agree that we should use /dev/urandom (or /dev/random) if available.  
The code should read in enough bytes to generate an entire salt or 
random password (however the case may be).  I'm willing to explore 
adding this to the next development cycle.  Right now, I want to get a 
5.3.30 release done (and maybe even call it 5.4.0-pre1) so we can have 
a stable release for people who've been waiting to upgrade from 5.2.2.

I'll still say that I think this is overkill.  I find it extremely 
unlikely that someone could determine the random password generated by 
vpopmail.

--
Tom Collins  -  [EMAIL PROTECTED]
Note: The Tom Logic offices will be closed October 23 to November 18.
QmailAdmin: http://qmailadmin.sf.net/  Vpopmail: http://vpopmail.sf.net/
Info on the Sniffter hand-held Network Tester: http://sniffter.com/



Re: [vchkpw] IMP, vpopmail, and v-users changing passwords?

2003-11-06 Thread Hugo Cisneiros
Juging from the subject, if you're using IMP, you can get the 'Passwd' 
module that integrates a interface to change passwords for users. The 
new version includes support for the vpopmail, and in my case, I just 
hacked the code a little to fit my install (very easy to do).

[]'s
Hugo
Tom Collins wrote:

On Wednesday, November 5, 2003, at 12:22  PM, David Wolfskill wrote:

Would anyone care to provide a pointer to a hint for how to accomplish
allowing virtual users to change their own passwords?
Take a look at qmailadmin.  It's overkill for changing passwords, but 
one of the only ways I know to do it.

A feature request for the next development cycle of qmailadmin is to 
have a simple change password interface where a user can type their 
email address, old password, and new password (twice) to make the change.

--
Tom Collins  -  [EMAIL PROTECTED]
Note: The Tom Logic offices will be closed October 23 to November 18.
QmailAdmin: http://qmailadmin.sf.net/  Vpopmail: http://vpopmail.sf.net/
Info on the Sniffter hand-held Network Tester: http://sniffter.com/





[vchkpw] skel

2003-11-06 Thread Raboo Treed
Isn't there a way to have like a /etc/skel but for vpopmail users

like a skel with a  dot qmail file and some extra imap folders and such?

if not that would be a great feutre request..

/R




Re: [vchkpw] qmailadmin version

2003-11-06 Thread Michael Bowe
  i recently install qmailadmin-stable (and latest devel)  with
  vpopmail-5.3.29 with postgresql auth,
  instalation work fine, but qmailadmin not do his job. , i can login
with
  postmaster account, but every link that i click, return with empty
page.
  and error from apache;

 I have duplicated that fault on my test server
 I have an idea where it is coming from

 Hopefully I can post a patch soon.

OK, I have found the bug.

It is in the vauth_getall() function

I have opened tracker on sourceforge for it [837139]

Patch to be uploaded shortly.

Michael.




RE: [vchkpw] Has the format of vpasswd file changed?

2003-11-06 Thread Kleiner, Peter
 We added a clear password field that used to be default turned off
 for backwards compatibility. I think in later versions of 5.3 folks
 updated the code to support either. I'd recommend backing up
 your vpopmail/bin, lib and include directory then doing a regular
 install of vpopmail with --enable-clear-passwd=n. Re config/compile
 courier-imap from scratch. If that does not work you can put
 the old binaries back. I bet it would work. 
It's a good bet.  Everything's working well now.  Thanks for the 
suggestion.



 my 2cents
Worth a lot more than that!



[vchkpw] vpopmail and smtp-auth...

2003-11-06 Thread Johannes Findeisen
Hello All,

i have a stupid problem with vpopmail and smtp-after-pop or smtp-auth. I have 
read a howto in the web where vpopmail is used to make smtp-after-pop or 
smtp-auth. I have configured my run script for pop3d and smtpd like it was 
configured in the howto but it doesn't work. The virual Domains are running 
and the pop3d is running too but i could not get smtpd running with 
authentification.

Here is my qmail-smtpd/run script:

#!/bin/bash
QMAILDUID=`id -u vpopmail`
NOFILESGID=`id -g vpopmail`
MAXSMTPD=`cat /var/qmail/control/concurrencyincoming`

exec /usr/bin/softlimit -m 6600 \
/usr/bin/tcpserver -H -R -v -p -x /etc/tcp.smtp.cdb \
-c $MAXSMTPD -u $QMAILDUID -g $NOFILESGID \
0 smtp /var/qmail/bin/qmail-smtpd `hostname --fqdn` \
/var/vpopmail/bin/vchkpw /bin/true 21

could someone tell me whats wrong here? is it possible to do it like i want 
it?

Only people who are in registered as virtual-domain-email-user should be 
allowed to send email thrue my smtp server.  I don't need smtp-after-pop, 
smtp-auth is doing all i need but it could be smtp-after-pop too...

Okay, sorry for my English and maybe stupid question...

Regards
hanez

P.S.: My logs are looking okay... No Errors are registered there and smtp is 
working but without any control.

-- 
BASH Boy for life!

Key fingerprint = DCD0 990F 6BD8 6E5F 439D  4257 D5ED FB77 F58D 4435
http://pgp.mit.edu:11371/pks/lookup?search=you%40hanez.orgop=index




[vchkpw] RE: vpopmail and smtp-auth...

2003-11-06 Thread Kleiner, Peter
 Hello All,
 
 i have a stupid problem with vpopmail and smtp-after-pop or 
 smtp-auth. I have 
 read a howto in the web where vpopmail is used to make 
 smtp-after-pop or 
 smtp-auth. I have configured my run script for pop3d and 
 smtpd like it was 
 configured in the howto but it doesn't work. The virual 
 Domains are running 
 and the pop3d is running too but i could not get smtpd running with 
 authentification.
 
 Here is my qmail-smtpd/run script:
 
 #!/bin/bash
 QMAILDUID=`id -u vpopmail`
 NOFILESGID=`id -g vpopmail`
 MAXSMTPD=`cat /var/qmail/control/concurrencyincoming`
 
 exec /usr/bin/softlimit -m 6600 \
 /usr/bin/tcpserver -H -R -v -p -x /etc/tcp.smtp.cdb \
 -c $MAXSMTPD -u $QMAILDUID -g $NOFILESGID \
 0 smtp /var/qmail/bin/qmail-smtpd `hostname --fqdn` \
 /var/vpopmail/bin/vchkpw /bin/true 21
 
 could someone tell me whats wrong here? is it possible to do 
 it like i want 
 it?
 
 Only people who are in registered as 
 virtual-domain-email-user should be 
 allowed to send email thrue my smtp server.  I don't need 
 smtp-after-pop, 
 smtp-auth is doing all i need but it could be smtp-after-pop too...

Three questions:
1. have you checked to make sure that `hostname --fqdn` returns your
domain name?
2. Did you apply the smtp-auth patch to qmail before running make?
3. Are you sure that the path to vchkpw is /var/vpopmail/bin and not
/home/vpopmail/bin?  I think that the default install directory for
vpopmail is in /home.



Re: [vchkpw] RE: vpopmail and smtp-auth...

2003-11-06 Thread Johannes Findeisen
 Three questions:
 1. have you checked to make sure that `hostname --fqdn` returns your
 domain name?

Yes, it returns the hostname of my Server but the domain name is not a virtual 
host...  should it be that?

 2. Did you apply the smtp-auth patch to qmail before running make?

Yes, i use Gentoo-Linux and the Patch is inluded and qmail should be 
patched... I have thought that it could the problem already.

 3. Are you sure that the path to vchkpw is /var/vpopmail/bin and not
 /home/vpopmail/bin?  I think that the default install directory for
 vpopmail is in /home.

Yes, thats right but in Gentoo they have changed the path from /home/vpopmail 
to /var/vpopmail. I have checked that and vchkpw is in this path.

Is my solution possible?

regards
hanez

-- 
BASH Boy for life!

Key fingerprint = DCD0 990F 6BD8 6E5F 439D  4257 D5ED FB77 F58D 4435
http://pgp.mit.edu:11371/pks/lookup?search=you%40hanez.orgop=index




[vchkpw] RE: vpopmail and smtp-auth...

2003-11-06 Thread Kleiner, Peter
  Three questions:
  1. have you checked to make sure that `hostname --fqdn` returns your
  domain name?
 
 Yes, it returns the hostname of my Server but the domain name 
 is not a virtual 
 host...  should it be that?
No, shouldn't matter.

  2. Did you apply the smtp-auth patch to qmail before running make?
 
 Yes, i use Gentoo-Linux and the Patch is inluded and qmail should be 
 patched... I have thought that it could the problem already.
OK.  Had to ask, anyway.  I'm not familiar with Gentoo.

  3. Are you sure that the path to vchkpw is /var/vpopmail/bin and not
  /home/vpopmail/bin?  I think that the default install directory for
  vpopmail is in /home.
 
 Yes, thats right but in Gentoo they have changed the path 
 from /home/vpopmail 
 to /var/vpopmail. I have checked that and vchkpw is in this path.
Figured as much.

 Is my solution possible?
It should be.  How are you deducing that amtp-auth is not working?
What have you tried?



Re: [vchkpw] RE: vpopmail and smtp-auth...

2003-11-06 Thread Girish G
   Three questions:
   1. have you checked to make sure that `hostname --fqdn` returns your
   domain name?
 
  Yes, it returns the hostname of my Server but the domain name
  is not a virtual
  host...  should it be that?
 No, shouldn't matter.

   2. Did you apply the smtp-auth patch to qmail before running make?
 
  Yes, i use Gentoo-Linux and the Patch is inluded and qmail should be
  patched... I have thought that it could the problem already.
 OK.  Had to ask, anyway.  I'm not familiar with Gentoo.

   3. Are you sure that the path to vchkpw is /var/vpopmail/bin and not
   /home/vpopmail/bin?  I think that the default install directory for
   vpopmail is in /home.
 
  Yes, thats right but in Gentoo they have changed the path
  from /home/vpopmail
  to /var/vpopmail. I have checked that and vchkpw is in this path.
 Figured as much.

  Is my solution possible?
 It should be.  How are you deducing that amtp-auth is not working?
 What have you tried?

Yes that is it ..
you may have tried it from telnet fqdn 25
but .. it should need a encripted password ...
better try with Outlook or so ...
also send the Telnet out put 
Also .. to the List Guys .. is there any problem with vpopmail to be used
for smpt auth .  [i mean some open relay probelm in any of the versions
of vpopmail]


regards
Girish






Re: [vchkpw] RE: vpopmail and smtp-auth...

2003-11-06 Thread Johannes Findeisen
 What have you tried?

I'm using KMail in KDE and it has a function in the server setup where i can 
check what auhentication methods are supported by the server. KMail said that 
PLAIN, LOGIN and CRAM-MD5 are supported. When i'm configuring my SMTP Setup 
for using CRAM-MD5 the server said authorization failed (#5.7.0).

Okay, i have found a permission problem on the dirs and smtp-after-pop is 
working now but shouldn't smtp-auth work too? It doesn't! I got the above 
message when trying to send a mail before i have logged in via pop3.

hanez

-- 
BASH Boy for life!

Key fingerprint = DCD0 990F 6BD8 6E5F 439D  4257 D5ED FB77 F58D 4435
http://pgp.mit.edu:11371/pks/lookup?search=you%40hanez.orgop=index




Re: [vchkpw] Re: Inserting new users via mysql-insert into the vpopmail database

2003-11-06 Thread Nick Harring
Tom Collins wrote:

On Tuesday, November 4, 2003, at 05:40  AM, Nick Harring wrote:

Actually, this is already a right place to put this, which is in 
randltr. Oddly that's what's used for generating the salt, but not 
what's used for generating the password. Instead the password just 
uses an ugly rand call.
I'd change vgen_pass to do this:

for (i = 0; i  len; i++) {
 k = randltr();
 p[i] = gen_chars[k];
}
return p;


randltr selects from 64 valid salt characters.  The password generator 
pulls from a larger selection of possible characters.

I'd even consider modifying the random password generator to not use 
letters that can be confused with each other (1/I/l and 0/O). 
That'd be foolish in the extreme. If the user, or administrator, wants 
passwords that are easy to remember or hard to confuse then they 
should take the onerous burden on themselves. The random password 
function, by using the word random, is promising a certain functionality 
and what you propose doesn't deliver it. Narrowing the possible scope 
for each letter to 64 from some larger group but increasing the entropy 
that goes into selecting each character seems like a good idea to me.
The valid salt chars for DES, with which we must maintain backwards 
compatability, are [a-zA-Z0-9./]. The additional characters that 
vgen_pass() can be using are [EMAIL PROTECTED]*()-_=+\|]}[{';:, by my count 
that's 29 new characters. A decently larger set, but not substantially so.
This means that an 8 character password, which is what gets created when 
vpopmail creates a random password for you, can be one of either  
6.27710173538668e+57 or 9.71334446112865e+83 combinations, depending on 
how many characters you allow. I personally think we should lean towards 
higher entropy within a smaller field rather than dramatically lower 
entropy within a somewhat larger field. I do not, however, have any 
evidence to back this up at the moment. If you'd like me to back the 
above up, or withdraw it, based on an actual expert opinion I'd be more 
than happy to do some research this evening to see what the pro's say.
We could also increase the size of the MD5 salt, since we're allowed 8 
characters plus the leading $1$ and an optional, terminating $. This'd 
be easy to do, backwards compatible, and ought to increase security to 
at least some extent.



Also, randltr is relying on something else to seed srand, which is 
really a bad idea. One mistake and suddenly everyone's vpopmail 
everywhere is seeding with 1. Oops.


randltr is only used by mkpasswd3() which seeds srandom.  You need to 
be careful to seed rand/random only once. 
There's no real reason that I can determine, from either the man pages, 
my experience, or the experience of the people around me that says you 
need to be careful to seed the random pool only once. It doesn't break 
anything. At worst its inefficient.
If you are so terribly worried you can waste 1 byte of memory with a 
flag indicating that srand has been called and thus not do it again. 
Since you've not yet done that, but instead relied on nobody calling 
mkpasswd3() AND vgen_pass() in a series, I'm guessing you weren't that 
worried.



I agree that we should use /dev/urandom (or /dev/random) if 
available.  The code should read in enough bytes to generate an entire 
salt or random password (however the case may be).  I'm willing to 
explore adding this to the next development cycle.  Right now, I want 
to get a 5.3.30 release done (and maybe even call it 5.4.0-pre1) so we 
can have a stable release for people who've been waiting to upgrade 
from 5.2.2. 
A stable release would be a Good Thing. I'm one of those people waiting 
to upgrade, however I'd consider this a fairly serious, albeit still 
theoretical, bug in the password generating and hashing functions.



I'll still say that I think this is overkill.  I find it extremely 
unlikely that someone could determine the random password generated by 
vpopmail. 
People found it extremely unlikely that anyone could brute force DES 
crypted passwords for a long time. Then someone did it and everyone 
moved to MD5. Remember, the crypted password used to be kept in 
/etc/passwd, which was world readable, since no one worried about it.
Shrugging off easily fixable bugs as theoretical keeps getting people 
into trouble, and yet everyone keeps trying to shrug them off. Even 
worse, shrugging them off publicly seems to invite people to prove you 
wrong.
As far as I'm concerned, when it comes to security the line between 
enough and overkill is very very blurry. I usually draw it when 
something is measurably secure AND the workload to continue making it 
more secure begins going up dramatically. In this case I just don't see 
the workload going up by very much, but the level of security would seem 
to be going up dramatically.



--
Tom Collins  -  [EMAIL PROTECTED]
Note: The Tom Logic offices will be closed October 23 to November 18.
QmailAdmin: http://qmailadmin.sf.net/  

Re: [vchkpw] RE: vpopmail and smtp-auth...

2003-11-06 Thread Nick Harring




Johannes Findeisen wrote:

  
What have you tried?

  
  
I'm using KMail in KDE and it has a function in the server setup where i can 
check what auhentication methods are supported by the server. KMail said that 
PLAIN, LOGIN and CRAM-MD5 are supported. When i'm configuring my SMTP Setup 
for using CRAM-MD5 the server said "authorization failed (#5.7.0)".

Didn't see this asked or answered earlier, but are you running a recent
enough version of vpopmail that it supports cram-md5 auth? Also, are
you running with cleartext passwords enabled? These both must be true
for cram-md5 to work. Perhaps you should try forcing KMail to use plain
or login, or test them yourself with telnet and perl. 

  

Okay, i have found a permission problem on the dirs and smtp-after-pop is 
working now but shouldn't smtp-auth work too? It doesn't! I got the above 
message when trying to send a mail before i have logged in via pop3.

hanez

  

Hope that Helps,
Nick Harring




Re: [vchkpw] skel

2003-11-06 Thread Jay Tortorelli
On Thu, 2003-11-06 at 04:34, Raboo Treed wrote:
 Isn't there a way to have like a /etc/skel but for vpopmail users
 
 like a skel with a  dot qmail file and some extra imap folders and such?
 
 if not that would be a great feutre request..

Below is a copy of an email and patch submitted by David Winkler back in
September to handle just that.

--enable-vpopmail-skel=y



Hello again,

I seem to have answered my own question. Here
is my unified diff against cvs if anyone is interested.

Enjoy!

David

Index: vpopmail.c
===
RCS file: /cvsroot/vpopmail/vpopmail/vpopmail.c,v
retrieving revision 1.2
diff -u -r1.2 vpopmail.c
--- vpopmail.c  14 Sep 2003 22:17:30 -  1.2
+++ vpopmail.c  23 Sep 2003 19:12:45 -
@@ -1655,6 +1655,7 @@
  struct vqpasswd *mypw;
  char calling_dir[MAX_BUFF];
  char domain_dir[MAX_BUFF];
+ char tmpbuf[MAX_BUFF];
 
   verrori = 0;
   /* record the dir where the command was run from */
@@ -1701,6 +1702,7 @@
 return(NULL);
   }
 
+#ifndef ENABLE_VPOPMAIL_SKEL
   if (mkdir(Maildir,VPOPMAIL_DIR_MODE) == -1){ 
 /* back out of changes made above */
 chdir(domain_dir); chdir(user_hash); vdelfiles(username);
@@ -1743,6 +1745,12 @@
 
   /* set permissions on the user's dir */
   chdir(../..);
+#else
+  sprintf(tmpbuf, cp -rf %s/etc/skel/* %s/%s,
VPOPMAILDIR,domain_dir,username);
+  system(tmpbuf);
+  chdir(../);
+#endif
+
   r_chown(username, uid, gid);
 
   /* see if the user already exists in the auth backend */
Index: acconfig.h
===
RCS file: /cvsroot/vpopmail/vpopmail/acconfig.h,v
retrieving revision 1.1.1.1
diff -u -r1.1.1.1 acconfig.h
--- acconfig.h  10 Sep 2003 20:43:14 -  1.1.1.1
+++ acconfig.h  23 Sep 2003 19:12:45 -
@@ -1,3 +1,5 @@
+#undef ENABLE_VPOPMAIL_SKEL
+
 #undef PS_COMMAND
 
 #undef ENABLE_PASSWD
Index: Makefile.am
===
RCS file: /cvsroot/vpopmail/vpopmail/Makefile.am,v
retrieving revision 1.1.1.1
diff -u -r1.1.1.1 Makefile.am
--- Makefile.am 10 Sep 2003 20:43:12 -  1.1.1.1
+++ Makefile.am 23 Sep 2003 19:12:45 -
@@ -94,6 +94,12 @@
  $(DESTDIR)@vpopmaildir@/@domains_dir@
 
$(INSTALL) -d $(DESTDIR)@vpopmaildir@/etc
+   $(INSTALL) -d $(DESTDIR)@vpopmaildir@/etc/skel
+   $(INSTALL) -d $(DESTDIR)@vpopmaildir@/etc/skel/Maildir
+   $(INSTALL) -d $(DESTDIR)@vpopmaildir@/etc/skel/Maildir/new
+   $(INSTALL) -d $(DESTDIR)@vpopmaildir@/etc/skel/Maildir/cur
+   $(INSTALL) -d $(DESTDIR)@vpopmaildir@/etc/skel/Maildir/tmp
+
echo [EMAIL PROTECTED]@/include  @vpopmaildir@/etc/inc_deps
echo [EMAIL PROTECTED]@/lib -lvpopmail @auth_libs@ 
@vpopmaildir@/etc/lib_deps
 
Index: configure.in
===
RCS file: /cvsroot/vpopmail/vpopmail/configure.in,v
retrieving revision 1.1.1.1
diff -u -r1.1.1.1 configure.in
--- configure.in10 Sep 2003 20:43:11 -  1.1.1.1
+++ configure.in23 Sep 2003 19:12:45 -
@@ -342,6 +342,23 @@
  ;;
 esac
 
+AC_ARG_ENABLE(vpopmail-skel,   
+ [ --enable-vpopmail-skel=y|nTurn on (y) or off (n,
default) to use
+vpopmail skeleton for new users.],
+ ENABLE_VPOPMAIL_SKEL=$enableval,
+ [
+ ENABLE_VPOPMAIL_SKEL=n
+ ])
+ 
+case $ENABLE_VPOPMAIL_SKEL in
+1*|y*|Y*)
+  ENABLE_VPOPMAIL_SKEL=1
+
AC_DEFINE_UNQUOTED(ENABLE_VPOPMAIL_SKEL,$ENABLE_VPOPMAIL_SKEL)
+  ;;
+*)
+  ;;
+esac
+
 AC_ARG_ENABLE(md5-passwords,
 [  --enable-md5-passwords=y|n   Turn on (y default ) or off (n)
to store encrypted passwords as md5.],
 ENABLE_MD5_PASSWORDS=$enableval,
@@ -1315,6 +1332,15 @@
  ;;
 esac
 
+case $ENABLE_VPOPMAIL_SKEL in
+1*|y*|Y*)
+echo  vpop skel = ON  --enable-vpopmail-skel=y
+echo  --enable-vpopmail-skel=y \\  vpopmail.config.sh
+  ;;
+*)  
+echo  vpop skel = OFF --enable-vpopmail-skel=n (default)
+  ;;
+esac
 
 case $ENABLE_LOGGING in
 1*|y*|Y*)




[vchkpw] disable/redirect bounce message using valias

2003-11-06 Thread Klaus P. Gapp
I am using qmail with vpopmail. Using the valias functionality, I provide
users an alias email address
on our mail server.

However, if e.g. the users email address is not valid or his account is
full, the relayed message will bounce.
Unfortunately, the bounced message will then also contain the users original
email address. And thus his identity is
no longer protected.

Is there any chance that I can use the valias relaying technique without up
the privacy of the user when a bounce occurs?

Thanks a lot

Klaus

---  part of the bounce 

Hi. This is the qmail-send program at sun.
I'm afraid I wasn't able to deliver your message to the following addresses.
This is a permanent error; I've given up. Sorry it didn't work out.

[EMAIL PROTECTED]:
217.72.192.149 does not like recipient.
Remote host said: 550 Unknown local part 34985785753857984 in
[EMAIL PROTECTED]
Giving up on

--- log file ---

2003-11-06 21:09:38.841125500 info msg 6532: bytes 1217 from
[EMAIL PROTECTED] qp 21688 uid 504
2003-11-06 21:09:38.981216500 starting delivery 218: msg 6532 to local
[EMAIL PROTECTED]
2003-11-06 21:09:38.981235500 status: local 1/10 remote 0/20
2003-11-06 21:09:39.115389500 new msg 6534
2003-11-06 21:09:39.115498500 info msg 6534: bytes 1319 from
[EMAIL PROTECTED] qp 21693 uid 89
2003-11-06 21:09:39.225814500 starting delivery 219: msg 6534 to remote
[EMAIL PROTECTED]
2003-11-06 21:09:39.225832500 status: local 1/10 remote 1/20
2003-11-06 21:09:39.225886500 delivery 218: success:
vdelivermail:_valiases_processed/did_0+0+1/
2003-11-06 21:09:39.226298500 status: local 0/10 remote 1/20
2003-11-06 21:09:39.228225500 end msg 6532
2003-11-06 21:09:39.295339500 delivery 219: failure:
217.72.192.149_does_not_like_recipient./Remote_host_said:_550_Unknown_local_
part_34985785753857984_in_[EMAIL PROTECTED]/Giving_up_on_217.
72.192.149./
2003-11-06 21:09:39.296037500 status: local 0/10 remote 0/20
2003-11-06 21:09:39.401720500 bounce msg 6534 qp 21695
2003-11-06 21:09:39.401978500 end msg 6534
2003-11-06 21:09:39.402656500 new msg 6581
2003-11-06 21:09:39.402749500 info msg 6581: bytes 1975 from  qp 21695 uid
509
2003-11-06 21:09:39.524934500 starting delivery 220: msg 6581 to remote
[EMAIL PROTECTED]
2003-11-06 21:09:39.524952500 status: local 0/10 remote 1/20





Re: [vchkpw] Has the format of vpasswd file changed?

2003-11-06 Thread Tom Collins
On Friday, November 7, 2003, at 12:15  AM, Kleiner, Peter wrote:
I'd recommend backing up
your vpopmail/bin, lib and include directory then doing a regular
install of vpopmail with --enable-clear-passwd=n. Re config/compile
courier-imap from scratch. If that does not work you can put
the old binaries back. I bet it would work.
It's a good bet.  Everything's working well now.  Thanks for the
suggestion.
Vpopmail 5.2.2 includes the clear-passwd patches from the 5.3 series.  
You can --enable-clear-passwd and it will work properly with old 
vpasswd files.

--
Tom Collins  -  [EMAIL PROTECTED]
Note: The Tom Logic offices will be closed October 23 to November 18.
QmailAdmin: http://qmailadmin.sf.net/  Vpopmail: http://vpopmail.sf.net/
Info on the Sniffter hand-held Network Tester: http://sniffter.com/



Re: [vchkpw] skel

2003-11-06 Thread Raboo Treed
Tom, Ken Can't anyone of you guys add this to the vpopmail code?

I think it's a great feautre, and I also think that many would agree with me
about this..

- Original Message - 
From: Jay Tortorelli [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Thursday, November 06, 2003 7:52 PM
Subject: Re: [vchkpw] skel


 On Thu, 2003-11-06 at 04:34, Raboo Treed wrote:
  Isn't there a way to have like a /etc/skel but for vpopmail users
 
  like a skel with a  dot qmail file and some extra imap folders and
such?
 
  if not that would be a great feutre request..

 Below is a copy of an email and patch submitted by David Winkler back in
 September to handle just that.

 --enable-vpopmail-skel=y



 Hello again,

 I seem to have answered my own question. Here
 is my unified diff against cvs if anyone is interested.

 Enjoy!

 David

 Index: vpopmail.c
 ===
 RCS file: /cvsroot/vpopmail/vpopmail/vpopmail.c,v
 retrieving revision 1.2
 diff -u -r1.2 vpopmail.c
 --- vpopmail.c  14 Sep 2003 22:17:30 -  1.2
 +++ vpopmail.c  23 Sep 2003 19:12:45 -
 @@ -1655,6 +1655,7 @@
   struct vqpasswd *mypw;
   char calling_dir[MAX_BUFF];
   char domain_dir[MAX_BUFF];
 + char tmpbuf[MAX_BUFF];

verrori = 0;
/* record the dir where the command was run from */
 @@ -1701,6 +1702,7 @@
  return(NULL);
}

 +#ifndef ENABLE_VPOPMAIL_SKEL
if (mkdir(Maildir,VPOPMAIL_DIR_MODE) == -1){
  /* back out of changes made above */
  chdir(domain_dir); chdir(user_hash); vdelfiles(username);
 @@ -1743,6 +1745,12 @@

/* set permissions on the user's dir */
chdir(../..);
 +#else
 +  sprintf(tmpbuf, cp -rf %s/etc/skel/* %s/%s,
 VPOPMAILDIR,domain_dir,username);
 +  system(tmpbuf);
 +  chdir(../);
 +#endif
 +
r_chown(username, uid, gid);

/* see if the user already exists in the auth backend */
 Index: acconfig.h
 ===
 RCS file: /cvsroot/vpopmail/vpopmail/acconfig.h,v
 retrieving revision 1.1.1.1
 diff -u -r1.1.1.1 acconfig.h
 --- acconfig.h  10 Sep 2003 20:43:14 -  1.1.1.1
 +++ acconfig.h  23 Sep 2003 19:12:45 -
 @@ -1,3 +1,5 @@
 +#undef ENABLE_VPOPMAIL_SKEL
 +
  #undef PS_COMMAND

  #undef ENABLE_PASSWD
 Index: Makefile.am
 ===
 RCS file: /cvsroot/vpopmail/vpopmail/Makefile.am,v
 retrieving revision 1.1.1.1
 diff -u -r1.1.1.1 Makefile.am
 --- Makefile.am 10 Sep 2003 20:43:12 -  1.1.1.1
 +++ Makefile.am 23 Sep 2003 19:12:45 -
 @@ -94,6 +94,12 @@
   $(DESTDIR)@vpopmaildir@/@domains_dir@

 $(INSTALL) -d $(DESTDIR)@vpopmaildir@/etc
 +   $(INSTALL) -d $(DESTDIR)@vpopmaildir@/etc/skel
 +   $(INSTALL) -d $(DESTDIR)@vpopmaildir@/etc/skel/Maildir
 +   $(INSTALL) -d $(DESTDIR)@vpopmaildir@/etc/skel/Maildir/new
 +   $(INSTALL) -d $(DESTDIR)@vpopmaildir@/etc/skel/Maildir/cur
 +   $(INSTALL) -d $(DESTDIR)@vpopmaildir@/etc/skel/Maildir/tmp
 +
 echo [EMAIL PROTECTED]@/include  @vpopmaildir@/etc/inc_deps
 echo [EMAIL PROTECTED]@/lib -lvpopmail @auth_libs@ 
 @vpopmaildir@/etc/lib_deps

 Index: configure.in
 ===
 RCS file: /cvsroot/vpopmail/vpopmail/configure.in,v
 retrieving revision 1.1.1.1
 diff -u -r1.1.1.1 configure.in
 --- configure.in10 Sep 2003 20:43:11 -  1.1.1.1
 +++ configure.in23 Sep 2003 19:12:45 -
 @@ -342,6 +342,23 @@
   ;;
  esac

 +AC_ARG_ENABLE(vpopmail-skel,
 + [ --enable-vpopmail-skel=y|nTurn on (y) or off (n,
 default) to use
 +vpopmail skeleton for new users.],
 + ENABLE_VPOPMAIL_SKEL=$enableval,
 + [
 + ENABLE_VPOPMAIL_SKEL=n
 + ])
 +
 +case $ENABLE_VPOPMAIL_SKEL in
 +1*|y*|Y*)
 +  ENABLE_VPOPMAIL_SKEL=1
 +
 AC_DEFINE_UNQUOTED(ENABLE_VPOPMAIL_SKEL,$ENABLE_VPOPMAIL_SKEL)
 +  ;;
 +*)
 +  ;;
 +esac
 +
  AC_ARG_ENABLE(md5-passwords,
  [  --enable-md5-passwords=y|n   Turn on (y default ) or off (n)
 to store encrypted passwords as md5.],
  ENABLE_MD5_PASSWORDS=$enableval,
 @@ -1315,6 +1332,15 @@
   ;;
  esac

 +case $ENABLE_VPOPMAIL_SKEL in
 +1*|y*|Y*)
 +echo  vpop skel = ON  --enable-vpopmail-skel=y
 +echo  --enable-vpopmail-skel=y \\  vpopmail.config.sh
 +  ;;
 +*)
 +echo  vpop skel = OFF --enable-vpopmail-skel=n (default)
 +  ;;
 +esac

  case $ENABLE_LOGGING in
  1*|y*|Y*)







Re: [vchkpw] skel

2003-11-06 Thread X-Istence
Raboo Treed wrote:

Tom, Ken Can't anyone of you guys add this to the vpopmail code?

I think it's a great feautre, and I also think that many would agree with me
about this..
snip

 

Personally i have to disagree. It works fine the standard way it 
currently is, and i dont see a need for this. It would only add more 
confusion. Unless its a compile time configurable argument, in which 
case it would be okay.

X




Re: [vchkpw] Re: Inserting new users via mysql-insert into the vpopmail database

2003-11-06 Thread Tom Collins
On Friday, November 7, 2003, at 02:27  AM, Nick Harring wrote:
I'd even consider modifying the random password generator to not use 
letters that can be confused with each other (1/I/l and 0/O).
That'd be foolish in the extreme. If the user, or administrator, wants 
passwords that are easy to remember or hard to confuse then they 
should take the onerous burden on themselves. The random password 
function, by using the word random, is promising a certain 
functionality and what you propose doesn't deliver it.
I think that's somewhat extreme.  A random password is just that -- 
randomly generated.  No guarantees on the randomness of the random 
number generator, or on the number of characters selected from.  
Eliminating 5 characters from a possible 70-80 is not foolish.  Having 
admins set up new accounts with passwords like PASSWORD or the user's 
last name is foolish.

 Narrowing the possible scope for each letter to 64 from some larger 
group but increasing the entropy that goes into selecting each 
character seems like a good idea to me.
Remember that we're only selecting 8 random characters -- that's about 
40-bits of random numbers.  No one has shown that the current method 
results in a limited set of possible passwords.  I'm not arguing 
against using /dev/[u]random, I'm just saying that it's possible to 
over-engineer a random password generator...

The valid salt chars for DES, with which we must maintain backwards 
compatability, are [a-zA-Z0-9./]. The additional characters that 
vgen_pass() can be using are [EMAIL PROTECTED]*()-_=+\|]}[{';:, by my count 
that's 29 new characters. A decently larger set, but not substantially 
so.
This means that an 8 character password, which is what gets created 
when vpopmail creates a random password for you, can be one of either  
6.27710173538668e+57 or 9.71334446112865e+83 combinations, depending 
on how many characters you allow. I personally think we should lean 
towards higher entropy within a smaller field rather than dramatically 
lower entropy within a somewhat larger field.
I'm not sure how to measure entropy, but with the small number of bits 
we're looking at, you reach a point where additional entropy gains you 
nothing, whereas additional characters to choose from does.

 I do not, however, have any evidence to back this up at the moment. 
If you'd like me to back the above up, or withdraw it, based on an 
actual expert opinion I'd be more than happy to do some research this 
evening to see what the pro's say.
I'm not an encryption expert, so I'm open to professional opinions on 
the subject.

We could also increase the size of the MD5 salt, since we're allowed 8 
characters plus the leading $1$ and an optional, terminating $. This'd 
be easy to do, backwards compatible, and ought to increase security to 
at least some extent.
The more recent versions of vpopmail use the full-size salt.

Also, randltr is relying on something else to seed srand, which is 
really a bad idea. One mistake and suddenly everyone's vpopmail 
everywhere is seeding with 1. Oops.
randltr is only used by mkpasswd3() which seeds srandom.  You need to 
be careful to seed rand/random only once.
There's no real reason that I can determine, from either the man 
pages, my experience, or the experience of the people around me that 
says you need to be careful to seed the random pool only once. It 
doesn't break anything. At worst its inefficient.
If you seed it repeatedly with the same value (for example, based on 
time() and pid) then you reset the random number generator and get 
repeated results.

If you are so terribly worried you can waste 1 byte of memory with a 
flag indicating that srand has been called and thus not do it again. 
Since you've not yet done that, but instead relied on nobody calling 
mkpasswd3() AND vgen_pass() in a series, I'm guessing you weren't that 
worried.
You're right, I only use local flags for each routine.  Making a global 
flag would be better.

I agree that we should use /dev/urandom (or /dev/random) if 
available.  The code should read in enough bytes to generate an 
entire salt or random password (however the case may be).  I'm 
willing to explore adding this to the next development cycle.  Right 
now, I want to get a 5.3.30 release done (and maybe even call it 
5.4.0-pre1) so we can have a stable release for people who've been 
waiting to upgrade from 5.2.2.
A stable release would be a Good Thing. I'm one of those people 
waiting to upgrade, however I'd consider this a fairly serious, albeit 
still theoretical, bug in the password generating and hashing 
functions.
I disagree.  I made improvements on the code because I ran into an 
instance where vadduser could generate the same random password when 
called twice in a row.  Adding configure options to detect the presence 
of /dev/random or /dev/urandom and modifying the code to use either is 
not a simple change.

After we release 5.4.0, we can introduce the new code into the 5.5 
series, 

Re: [vchkpw] skel

2003-11-06 Thread Tom Collins
On Friday, November 7, 2003, at 10:02  AM, Raboo Treed wrote:
Tom, Ken Can't anyone of you guys add this to the vpopmail code?

I think it's a great feautre, and I also think that many would agree 
with me
about this..
It's a good feature, but not ready for the release version of vpopmail. 
 It makes use of a system call to copy the files.

I emailed the original author with code to handle the copying within 
vpopmail.  If that gets integrated, replacing the system call to cp, 
then I'll consider adding it.

--
Tom Collins  -  [EMAIL PROTECTED]
Note: The Tom Logic offices will be closed October 23 to November 18.
QmailAdmin: http://qmailadmin.sf.net/  Vpopmail: http://vpopmail.sf.net/
Info on the Sniffter hand-held Network Tester: http://sniffter.com/



Re: [vchkpw] skel

2003-11-06 Thread Raboo Treed
hmm
well this patch was bad, cause it had some text-wrapping... I fixed that...
but still that patch doesn't work with the latest devel of vpopmail
Does anyone have a working one with 5.3.29?

 It's a good feature, but not ready for the release version of vpopmail.
I think I'm gonna have to dissagree, thats exactly what many ppl are looking
for in a new stable release, some new useful feautres, and this feautre is
good for anti-spam, anti-virus setup's

   It makes use of a system call to copy the files.

 I emailed the original author with code to handle the copying within
 vpopmail.  If that gets integrated, replacing the system call to cp,
 then I'll consider adding it.
David Winkler would you fix that Tom just said if you by any chance are
reading this or anyone else that got the times and knowdlege to do it?

And seriously, I'm not a coder, but I think like this, the code is
probibly(I would think) applied to the vadduser part of the code?
So that would mean you must be either vpopmail or root to run it,, hence it
isn't suid..
So if a intruder would get access as root or vpopmail user they wouldn't
use some vadduser binary to insecure your system...?? Or just maybe
someone would be able in some difficult way thru qmailadmin be able to
haxx0r your system just cause of the vadduser code is using system??

I think it's safe enough..
I don't know about this for sure, but for me it sounds pretty hard???

/Raboo




Re: [vchkpw] skel

2003-11-06 Thread Nick Harring
Raboo Treed wrote:

hmm
well this patch was bad, cause it had some text-wrapping... I fixed that...
but still that patch doesn't work with the latest devel of vpopmail
Does anyone have a working one with 5.3.29?
 

So if a intruder would get access as root or vpopmail user they wouldn't
use some vadduser binary to insecure your system...?? Or just maybe
someone would be able in some difficult way thru qmailadmin be able to
haxx0r your system just cause of the vadduser code is using system??
A root compromise of the system isn't the only thing one has to worry 
about. I'd be pretty pissed if someone inserted something into my skel 
that resulted in all of my email being duplicated and sent to someone 
else. Using cp when you could just copy the files in C in a secure 
manner is just silly. Its also less efficient, as an added bonus.

I think it's safe enough..
I don't know about this for sure, but for me it sounds pretty hard???
/Raboo

 

Exploitable just isn't safe enough. I've disagreed with Tom about the 
level of paranoia required (see the password/salt generation thread), 
but in this case he's absolutely right about requiring more than the 
current patch supplies.

Cheers,
Nick Harring
Webley Systems


Re: [vchkpw] skel

2003-11-06 Thread Nick Harring
X-Istence wrote:

Raboo Treed wrote:

Tom, Ken Can't anyone of you guys add this to the vpopmail code?

I think it's a great feautre, and I also think that many would agree 
with me
about this..

snip

 

Personally i have to disagree. It works fine the standard way it 
currently is, and i dont see a need for this. It would only add more 
confusion. Unless its a compile time configurable argument, in which 
case it would be okay.

X

Notice the --enable-feature part of the description of the patch? By 
default this would suck, as an option its perfect.

Cheers,
Nick Harring
Webley Systems


Re: [vchkpw] skel

2003-11-06 Thread Raboo Treed

 A root compromise of the system isn't the only thing one has to worry
 about. I'd be pretty pissed if someone inserted something into my skel
 that resulted in all of my email being duplicated and sent to someone
 else. Using cp when you could just copy the files in C in a secure
 manner is just silly. Its also less efficient, as an added bonus.

 Exploitable just isn't safe enough. I've disagreed with Tom about the
 level of paranoia required (see the password/salt generation thread),
 but in this case he's absolutely right about requiring more than the
 current patch supplies.

Who will be our saviour and take on the task to make the patch secure and
worthy to be a part of vpopmail future releases

( P.S. sorry Nick if you've recived the message twice 
I pressed the wrong reply button at first )



Re: [vchkpw] skel

2003-11-06 Thread David Winkler
I'm planning on rewriting it correctly. At the time I really hadn't
considered the implications of how it worked, and the fact that
it isn't really cross platform.

I'll submit another with a more secure, cross platform diff, as soon
as I am able against whatever is current in cvs at the time.

Thanks!

David

- Original Message - 
From: Raboo Treed [EMAIL PROTECTED]
To: vpopmail list [EMAIL PROTECTED]
Sent: Thursday, November 06, 2003 6:25 PM
Subject: Re: [vchkpw] skel


 
  A root compromise of the system isn't the only thing one has to worry
  about. I'd be pretty pissed if someone inserted something into my skel
  that resulted in all of my email being duplicated and sent to someone
  else. Using cp when you could just copy the files in C in a secure
  manner is just silly. Its also less efficient, as an added bonus.
 
  Exploitable just isn't safe enough. I've disagreed with Tom about the
  level of paranoia required (see the password/salt generation thread),
  but in this case he's absolutely right about requiring more than the
  current patch supplies.
 
 Who will be our saviour and take on the task to make the patch secure and
 worthy to be a part of vpopmail future releases
 
 ( P.S. sorry Nick if you've recived the message twice 
 I pressed the wrong reply button at first )