On Sun, Jan 24, 2021 at 12:42:49PM +0100, Jeff Abrahamson wrote:

> 1.  Users need to provide user + password to send (smtps) and receive
> (imaps).  I see where I've configured this for dovecot, which is
> /etc/dovecot/passwd.db.  That file contains lines like this:
> 
>     j...@mobilitains.fr:{BLF-CRYPT}$2y$05$c...

With this, dovecot can act as an oracle for the SASL PLAIN mechanism.

> I do not see how postfix knows who is allowed to connect, however.  Does
> postfix delegate SASL to dovecot?  This is the relevant config, I think:

Yes, when you use dovecot as a SASL backend.

>     broken_sasl_auth_clients = yes

This should no longer be necessary.

>     smtpd_sasl_auth_enable = yes
>     smtpd_sasl_authenticated_header = yes
>     smtpd_sasl_local_domain =
>     smtpd_sasl_path = private/auth
>     smtpd_sasl_security_options = noanonymous
>     smtpd_sasl_type = dovecot

The above looks fine.  Just in case, make sure that plaintext mechanisms
are allowed over TLS:

    smtpd_sasl_security_options = noanonymous, noplaintext
    smtpd_sasl_tls_security_options = noanonymous

(though the second is the expected default).

> 2.  Any suggestions on how to test this (and continue testing it)? 
> First, about today, as in, are there good commandline tools to poke at a
> postfix instance?

You can test it with "swaks".  I've not added SASL client support to
posttls-finger, so while it's pretty good for testing TLS, it is not
suitable for debugging SASL.

-- 
    Viktor.

Reply via email to