Thanks for all the input
@Matus I’ll look into using fail2ban in this way
@Serhi, delaying the rejection of invalid RCPT TO, do you know how I can
accomplish that?
@Bill, thanks, the parameter “smtpd_reject_unlisted_sender” works
successfully for local users


On Tue 15 Oct 2024 at 18:48, Bill Cole via Postfix-users <
postfix-users@postfix.org> wrote:

> On 2024-10-15 at 13:02:02 UTC-0400 (Tue, 15 Oct 2024 17:02:02 +0000)
> Serhii via Postfix-users <li...@at.encryp.ch>
> is rumored to have said:
>
> On 10/15/24 16:52, Bill Cole via Postfix-users wrote:
>
> Unless you've intentionally enabled EXPN in your config, you probably have
> not done anything really wrong but not all defaults are ideal. There are
> some non-defaults which will break SOME enumeration attempts:
>
> main.cf:
>
> smtpd_reject_unlisted_sender = yes
> disable_vrfy_command = yes
>
> What version of nmap do you have?
>
> 7.95. At the top of that script it says:
>
> Attempts to enumerate the users on a SMTP server by issuing the VRFY, EXPN
> or RCPT TO
> commands. The goal of this script is to discover all the user accounts in
> the remote
> system.
>
> It also shows its last change as 2011-06-03, so it's not exactly in active
> development.
>
> In my case nmap used RCPT TO for checking recipients, so disabling VRFY is
> of no help:
>
> Oct 15 16:44:25 cheems postfix/smtpd[1051067]: disconnect from
> x.x.x.x[x.x.x.x]:46118 ehlo=1 mail=1 rcpt=10 quit=1 commands=13
>
> As for smtpd_reject_unlisted_sender, it won't help for address that is not
> in local, virtual or relay address class:
> https://www.postfix.org/ADDRESS_CLASS_README.html#classes
>
> Exactly. It breaks the MAIL command, because that enumeration script needs
> to use something as a sender address. It uses usertest@[host], an
> invented address which won't be rejected unless you have
> smtpd_reject_unlisted_sender (or reject_unlisted_sender in a restriction
> list) OR happen to have a user named usertest.
>
> So I get the test showing up in the summary log lines like this:
>
> Oct 15 12:36:37 shiny postfix/submit/smtpd[4882]: disconnect from
> HOST[IP.AD.DR.ESS] ehlo=1 mail=0/1 commands=1/2
> Oct 15 12:36:50 shiny postfix/smtpd[4886]: disconnect from
> HOST[IP.AD.DR.ESS] ehlo=1 mail=1/2 rcpt=0/1 vrfy=0/1 unknown=0/2
> commands=2/7
> Oct 15 12:36:50 shiny postfix/smtps/smtpd[4884]: disconnect from
> HOST[IP.AD.DR.ESS] ehlo=1 mail=1/2 rcpt=0/1 vrfy=0/1 unknown=0/2
> commands=2/7
>
> Note that the usernames.lst file which nmap uses by default only has 10
> usernames, so by default a run where every RCPT is sent and fails is not
> much of a burden. However, an actual malicious enumerator will have a much
> longer list, so if you let them get to RCPT they may be connected for much
> longer.
>
>    b...@scconsult.com or billc...@apache.org
>    (AKA @grumpybozo@toad.social and many *@billmail.scconsult.com addresses)
>    Not Currently Available For Hire
>
> _______________________________________________
> Postfix-users mailing list -- postfix-users@postfix.org
> To unsubscribe send an email to postfix-users-le...@postfix.org
>
_______________________________________________
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an email to postfix-users-le...@postfix.org

Reply via email to