Ok, ok, no offence intended.
Can we mitigate it somewhat like what Roger Klorese suggested,
eg: restrict the info EHLO reveals or don't reveal actual hostname :
smtp_helo_name ($myhostname)
Use a fictitious hostname to send in the SMTP EHLO or HELO
command (& how do I do this?)
& from the url http://www.postfix.org/lmtp.8.html, can I insert something
like the following in main.cf :
smtp_never_send_ehlo (no)
Never send EHLO at the start of an SMTP session.
& from the url http://www.postfix.org/postconf.5.html
$helo_name
The hostname given in HELO or EHLO command or empty string
(& where & what's the syntax to set the above suggestions?)
Roger
On Tue, May 3, 2011 at 11:56 PM, Roger B.A. Klorese <[email protected]> wrote:
>
> On May 3, 2011, at 8:49 AM, Reindl Harald wrote:
>
> Am 03.05.2011 17:34, schrieb Roger Goh:
>
> Hi,
>
> During a VA scan, it's reported that my postfix server has
>
> a security vulnerability :
>
> EhloCheck: SMTP daemon supports EHLO
>
> where exactly is the security hole?
>
> you should not trust the output of every tool blind without
> try to understand what the output means
>
> EHLO is a part of ESMTP
> ____________________
>
> http://en.wikipedia.org/wiki/ESMTP
> Some relatively common keywords (not all of them corresponding to commands)
> used today are:
>
> * 8BITMIME — 8 bit data transmission, RFC 6152
> * ATRN — Authenticated TURN for On-Demand Mail Relay, RFC 2645
> * SMTP-AUTH — Authenticated SMTP, RFC 4954
> * CHUNKING — Chunking, RFC 3030
> * DSN — Delivery status notification, RFC 3461 (See Variable envelope
> return path)
> * ETRN — Extended version of remote message queue starting command TURN,
> RFC 1985
> * HELP — Supply helpful information, RFC 821
> * PIPELINING — Command pipelining, RFC 2920
> * SIZE — Message size declaration, RFC 1870
> * STARTTLS — Transport layer security, RFC 3207 (2002)
> * UTF8SMTP — Allow UTF-8 encoding in mailbox names and header fields, RFC
> 5336
>
>
>
> Quoting http://www.iss.net/security_center/reference/vuln/smtp-ehlo.htm
> Note that:
> - the SMTP standard requires it
> - it's rated as low-risk
> - You can restrict the info it shows
> SMTP daemon supports EHLO (EhloCheck)
>
> Vuln ID:323
> Risk Level: LowEhloCheck
> Platforms:IBM AIX, WindRiver BSDOS, SGI IRIX, Linux Kernel, Sun Solaris, IETF
> SMTP, IBM OS2, Microsoft Windows 95, Data General DG/UX, Microsoft Windows
> NT: 4.0, Microsoft Windows 98, SCO SCO Unix, Microsoft Windows 98SE,
> Microsoft Windows 2000, Microsoft Windows Me, Compaq Tru64, Microsoft Windows
> XP, Apple Mac OS, Microsoft Windows 2003 Server, Microsoft Windows Vista
> Description:
>
> SMTP daemons that support Extended HELO (EHLO) can release information that
> could be useful to an attacker in performing an attack. Attackers have been
> known to use the EHLO command to determine configuration information on SMTP
> daemons.
>
> Remedy:
>
> SMTP as defined in RFC 2821 (see References) requires EHLO. Some SMTP
> implementations allow you to disable EHLO, but this capability is neither
> required nor consistent across products.
>
> If you are uncomfortable with the information that the Extended SMTP features
> can reveal, you may choose to disable EHLO on your mail server (if
> applicable), or switch to a mail server that allows EHLO to be disabled.
> Consult your mail server documentation or contact your vendor for information
> on whether it is possible to modify your mail server configuration to disable
> EHLO.