Wietse Venema via Postfix-users:
> Geert Hendrickx via Postfix-users:
> > On Thu, Dec 21, 2023 at 07:51:31 -0500, Wietse Venema via Postfix-users 
> > wrote:
> > >   * With all Postfix versions, "smtpd_data_restrictions =
> > >     reject_unauth_pipelining" will stop the published exploit.
> > 
> > 
> > Hi
> > 
> > I just found an unexpected side effect of this particular configuration
> > (unrelated to SMTP smuggling).
> > 
> > We have a mail relay that has DISCARD rules for specific clients, senders
> > and recipients.  When a discard rule is triggered in smtpd_*_restrictions
> > before DATA, smtpd_data_restrictions is not evaluated, so those senders
> > are "allowed" to pipeline.  Or stated differently: one can now detect a
> > DISCARD rule via unauthorized pipelining, it is no longer 100% equivalent
> > to an "OK" from an outside POV.
> > 
> > The same goes for eg. recipient validation when a sender triggers DISCARD.
> > 
> > I'm not sure this really matters, just sharing an observation from testing
> > the reject_unauth_pipelining restriction (on a Postfix 3.5.9 from RHEL 9
> > that doesn't have the smtpd_forbid_unauth_pipelining feature yet).
> 
> I suppose that is why one is called a temporary fix (which addresses
> many cases but not necessarily all) and a permanent fix (which roots
> out the problem).

To be clear, DISCARD disables this "temporary fix" for the smuggled
message. It is just one example that the temporary fix with
smtpd_data_restrictions cannot cover.

        Wietse
_______________________________________________
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an email to postfix-users-le...@postfix.org

Reply via email to