Am 06.09.2011 11:24, schrieb Patrick Ben Koetter:
* Heiko Wundram<modeln...@modelnine.org>:
As the title says: is there a possibility to set different
smtpd_sasl_security_options depending on the connecting IP (or
rather subnet) of the client that tries to do authentication?

No, you can't. Which problem are you trying to solve? Maybe there's another
way to do it.

Thought so; the problem I'm trying to solve is getting software which is connected via LAN to a mail relay to be able to use the relay. :-)

The software (which is a Java-based backup solution) is neither able to use TLS/SSL when using the smarthost to send out its notifications, nor is it able to do any non-plaintext authentication (i.e., only LOGIN), and as such I need to set up smtpd_sasl_security_options = noanonymous to allow the software to function. Security-wise, this is somewhat "okay": the server hosting the backup software is connected via MAC/IP-firewalled switches to the mail relays, and as such I'm not too concerned having people eavesdrop on the traffic that's exchanged between the two systems, so that allowing plaintext auth for this specific case even without TLS should be okay.

I'm not too happy with that, though, in the general case: the smarthost is also used by external systems to relay, and these should always use either non-TLS with non-plaintext authentication (CRAM-MD5 in the specific case), or use TLS. Enforcing this policy for external users of the mail system was straightforward with different configurations of smtpd_(tls_)sasl_security_options, but now means that I have to rely on the external users to "do the right thing" because I'm required to allow plaintext auth also for the non-TLS case.

Anyway, maybe I'll try to hack together a patch for this if I've got the time to do so, I just wanted to know whether there's the possibility to do this out of the box.

Thanks!

--
--- Heiko.

Reply via email to