I guess I found my problem. Plesk also has a smtps_psa which needs the same
settings like smtp_psa.

Then I tried your hint by blacklisting my domain (using wildcard @web-vision.de
in blacklist_senders).

To make sure that I have no greylisting entries already, I flushed my greylist
folder completely.

 

And now, guess what - it's running like it should. No more open_relay and
logfile now shows auth-message. Thanks for your help! Great!!!

 

Eric Shubert <[email protected]> hat am 20. Mai 2010 um 22:30 geschrieben:

> Sorry, I can't answer this. I use qmail-toaster, not plesk.
> Perhaps a plesk user (or a plesk list) would be helpful.
>
> --
> -Eric 'shubes'
>
> b.hinzer wrote:
> >
> >
> > Could this be, because of the fact that the settings are wrong in
> > /etc/xinet.d/smtp_psa are wrong (or even in wrong order)?
> >
> > 
> >
> > server_args     = -Rt0  /var/qmail/bin/relaylock /usr/local/bin/spamdyke
> > -f /etc/spamdyke.conf /var/qmail/bin/qmail-smtpd
> > /var/qmail/bin/smtp_auth /var/qmail/bin/true /var/qmail/bin/cmd5checkpw
> > /var/qmail/bin/true
> >
> > 
> >
> > 
> >
> > 
> >
> > Eric Shubert <[email protected]> hat am 20.
> > Mai 2010 um 20:09 geschrieben:
> >
> >  > Right-o, Sebastian. :)
> >  >
> >  > Boris, once you have all your users authenticating, you'll want to
> >  > *blacklist* your local domains. This will block emails where the senders
> >  > are faked with your domain.
> >  >
> >  > --
> >  > -Eric 'shubes'
> >  >
> >  > Sebastian Grewe wrote:
> >  > > That would still require your clients to actually enable SMTP
> >  > > authentication on their end to do the process of authentication. They
> >  > > have to send the username and password and once approved they are
> >  > > allowed to send.
> >  > >
> >  > > On Thu, 2010-05-20 at 19:58 +0200, Boris Hinzer wrote:
> >  > >> We are running standard Plesk qmail and also have SMTP auth enabled.
> >  > >>
> >  > >>
> >  > >> Am 20.05.2010 um 19:40 schrieb Eric Shubert
> > <[email protected]>:
> >  > >>
> >  > >>> I believe Sebastian's right. Greylisting won't come into play if the
> >  > >>> sender is authenticating successfully. Your problem is that
> >  > >>> authentication isn't happening, for whatever reason.
> >  > >>>
> >  > >>> In order to track down the problem, we need to know a bit more about
> >  > >>> your configuration. Are you using any particular 'flavor' of qmail?
> >  > >>>
> >  > >>> In your client configuration, there should be a "server requires
> >  > >>> authentication" or "use username and password" setting of some sort
> >  > >>> (varies by client program). Be sure that's checked.
> >  > >>>
> >  > >>> --
> >  > >>> -Eric 'shubes'
> >  > >>>
> >  > >>> Sebastian Grewe wrote:
> >  > >>>> Hey,
> >  > >>>>
> >  > >>>> I think there is an issue somewhere else. We are using SMTP Auth on
> >  > >>>> Qmail Level and it works fine with Greylisting. Users are not being
> >  > >>>> rejected when sending mail through the servers after SMTP
> >  > >>>> authentication.
> >  > >>>>
> >  > >>>> I have no experience with Spamdyke doing the authentication. But
> > make
> >  > >>>> sure the users are actually doing the authentication process.
> >  > >>>>
> >  > >>>> Cheers,
> >  > >>>> Sebastian
> >  > >>>>
> >  > >>>> On Thu, 2010-05-20 at 19:03 +0200, Boris Hinzer wrote:
> >  > >>>>> Am 20.05.2010 um 18:15 schrieb Eric Shubert
> > <[email protected]>:
> >  > >>>>>
> >  > >>>>>> Boris Hinzer wrote:
> >  > >>>>>>> Hello,
> >  > >>>>>>>
> >  > >>>>>>> can anybody verify this behavior?
> >  > >>>>>>> We are facing the situation, that if we whiteliste local
> >  > >>>>>>> emailadresse the smtp auth is completely skipped.
> >  > >>>>>>> Server is then acting like an open relay for these mailaddresses.
> >  > >>>>>>>
> >  > >>>>>>> In spamdyke.conf we have the following:
> >  > >>>>>>> smtp-auth-command=/var/qmail/bin/smtp_auth /var/qmail/bin/true /
> >  > >>>>>>> var/
> >  > >>>>>>> qmail/bin/cmd5checkpw /bin/true
> >  > >>>>>>> smtp-auth-level=ondemand-encrypted
> >  > >>>>>>>
> >  > >>>>>>> Best regards,
> >  > >>>>>>>
> >  > >>>>>>> Boris
> >  > >>>>>> I can't verify, but this is the behavior I would expect. If
> >  > >>>>>> something is
> >  > >>>>>> whitelisted, all filters are bypassed. Likewise if a session is
> >  > >>>>>> authenticated. Whitelisting can be dangerous, especially
> >  > >>>>>> whitelisting
> >  > >>>>>> your own domain(s). Whitelisting is intended more for getting
> >  > >>>>>> around
> >  > >>>>>> trusted mail servers that are misconfigured (rDNS issues
> >  > >>>>>> typically).
> >  > >>>>>>
> >  > >>>>>> If your local users all authenticate (which they should), you can
> >  > >>>>>> *blacklist* your local domains, which effectively blocks spam
> > which
> >  > >>>>>> spoofs/forges your domains. This is counter intuitive, but since
> >  > >>>>>> your
> >  > >>>>>> users authenticate, they will not be affected by the blacklist.
> >  > >>>>>>
> >  > >>>>>> What circumstance lead you to whitelist your local domain in the
> >  > >>>>>> first
> >  > >>>>>> place? Difficulty authenticating?
> >  > >>>>>>
> >  > >>>>>> --
> >  > >>>>>> -Eric 'shubes'
> >  > >>>>>>
> >  > >>>>>> _______________________________________________
> >  > >>>>>> spamdyke-users mailing list
> >  > >>>>>> [email protected]
> >  > >>>>>> http://www.spamdyke.org/mailman/listinfo/spamdyke-users
> >  > >>>>> Actually if we don't whitelist our local users they also run into
> >  > >>>>> greylisting process. This leads to very annoying messages in
> >  > >>>>> Outlook,
> >  > >>>>> which our users don't understand.
> >  > >>>>>
> >  > >>>>> At the moment we removed senders from whitelist and started an ip
> >  > >>>>> based whitelist, which is IMHO second best solution (thinking of
> >  > >>>>> cell
> >  > >>>>> phones, ipad, etc.).
> >  > >>>>>
> >  > >>>>> We are also facing the fact that mails where senders are faked and
> >  > >>>>> equal to receivers are getting through.
> >  > >>>>>
> >  > >>>>> Best regards,
> >  > >>>>>
> >  > >>>>> Boris
> >  > >>>>> _______________________________________________
> >  > >>>>> spamdyke-users mailing list
> >  > >>>>> [email protected]
> >  > >>>>> http://www.spamdyke.org/mailman/listinfo/spamdyke-users
> >  > >>> _______________________________________________
> >  > >>> spamdyke-users mailing list
> >  > >>> [email protected]
> >  > >>> http://www.spamdyke.org/mailman/listinfo/spamdyke-users
> >  > >> _______________________________________________
> >  > >> spamdyke-users mailing list
> >  > >> [email protected]
> >  > >> http://www.spamdyke.org/mailman/listinfo/spamdyke-users
> >  >
> >  > _______________________________________________
> >  > spamdyke-users mailing list
> >  > [email protected]
> >  > http://www.spamdyke.org/mailman/listinfo/spamdyke-users
> >
> >
> > ------------------------------------------------------------------------
> >
> > _______________________________________________
> > spamdyke-users mailing list
> > [email protected]
> > http://www.spamdyke.org/mailman/listinfo/spamdyke-users
>
> _______________________________________________
> spamdyke-users mailing list
> [email protected]
> http://www.spamdyke.org/mailman/listinfo/spamdyke-users
_______________________________________________
spamdyke-users mailing list
[email protected]
http://www.spamdyke.org/mailman/listinfo/spamdyke-users

Reply via email to