Ok, ok, no offence intended. Can we mitigate it somewhat like what Roger Klorese suggested, eg: restrict the info EHLO reveals or don't reveal actual hostname :
smtp_helo_name ($myhostname) Use a fictitious hostname to send in the SMTP EHLO or HELO command (& how do I do this?) & from the url http://www.postfix.org/lmtp.8.html, can I insert something like the following in main.cf : smtp_never_send_ehlo (no) Never send EHLO at the start of an SMTP session. & from the url http://www.postfix.org/postconf.5.html $helo_name The hostname given in HELO or EHLO command or empty string (& where & what's the syntax to set the above suggestions?) Roger On Tue, May 3, 2011 at 11:56 PM, Roger B.A. Klorese <rog...@queernet.org> wrote: > > On May 3, 2011, at 8:49 AM, Reindl Harald wrote: > > Am 03.05.2011 17:34, schrieb Roger Goh: > > Hi, > > During a VA scan, it's reported that my postfix server has > > a security vulnerability : > > EhloCheck: SMTP daemon supports EHLO > > where exactly is the security hole? > > you should not trust the output of every tool blind without > try to understand what the output means > > EHLO is a part of ESMTP > ____________________ > > http://en.wikipedia.org/wiki/ESMTP > Some relatively common keywords (not all of them corresponding to commands) > used today are: > > * 8BITMIME — 8 bit data transmission, RFC 6152 > * ATRN — Authenticated TURN for On-Demand Mail Relay, RFC 2645 > * SMTP-AUTH — Authenticated SMTP, RFC 4954 > * CHUNKING — Chunking, RFC 3030 > * DSN — Delivery status notification, RFC 3461 (See Variable envelope > return path) > * ETRN — Extended version of remote message queue starting command TURN, > RFC 1985 > * HELP — Supply helpful information, RFC 821 > * PIPELINING — Command pipelining, RFC 2920 > * SIZE — Message size declaration, RFC 1870 > * STARTTLS — Transport layer security, RFC 3207 (2002) > * UTF8SMTP — Allow UTF-8 encoding in mailbox names and header fields, RFC > 5336 > > > > Quoting http://www.iss.net/security_center/reference/vuln/smtp-ehlo.htm > Note that: > - the SMTP standard requires it > - it's rated as low-risk > - You can restrict the info it shows > SMTP daemon supports EHLO (EhloCheck) > > Vuln ID:323 > Risk Level: LowEhloCheck > Platforms:IBM AIX, WindRiver BSDOS, SGI IRIX, Linux Kernel, Sun Solaris, IETF > SMTP, IBM OS2, Microsoft Windows 95, Data General DG/UX, Microsoft Windows > NT: 4.0, Microsoft Windows 98, SCO SCO Unix, Microsoft Windows 98SE, > Microsoft Windows 2000, Microsoft Windows Me, Compaq Tru64, Microsoft Windows > XP, Apple Mac OS, Microsoft Windows 2003 Server, Microsoft Windows Vista > Description: > > SMTP daemons that support Extended HELO (EHLO) can release information that > could be useful to an attacker in performing an attack. Attackers have been > known to use the EHLO command to determine configuration information on SMTP > daemons. > > Remedy: > > SMTP as defined in RFC 2821 (see References) requires EHLO. Some SMTP > implementations allow you to disable EHLO, but this capability is neither > required nor consistent across products. > > If you are uncomfortable with the information that the Extended SMTP features > can reveal, you may choose to disable EHLO on your mail server (if > applicable), or switch to a mail server that allows EHLO to be disabled. > Consult your mail server documentation or contact your vendor for information > on whether it is possible to modify your mail server configuration to disable > EHLO.