Re: Convert from basic to virtual

2012-10-22 Thread Noel Jones
On 10/15/2012 6:06 AM, Dominique wrote:
> Hi list(s),

You asked this last week; the answer is still the same.

http://www.mailinglistarchive.com/html/postfix-users@postfix.org/2012-10/msg00283.html




  -- Noel Jones




> 
> A few years ago we setup a simple postfix+Cyrus Mail server in the 
> office (running on Ubuntu server). Across the years, we configured it to 
> send and access our mails from various sources (in the office with tb, 
> on the road though webgui, and recently through smartphones). All is 
> well in the best of worlds. It is really basic configuration with its 
> own certificate with a single domain name.
> 
> Recently, we purchased two new domain names for a new project and wanted 
> to include them to our mail server. I went on reading the postfix doc 
> for virtual domains and got lost. Our mail users are independant from 
> the linux users (virtual users) and I found a configuration description 
> that looked like what I wanted. It seems the way to go, especially if we 
> want to continue to add more domains in the future. However, I am not 
> sure how to convert from our basic setup to a virtual domain setup, 
> especially since I cannot find where and how to configure certificates 
> per domain on a server with a single public IP.
> 
> Does anyone have experience in converting from one to the other, and 
> willing to give me pointers in my conversion process. Downtime is not a 
> problem, but not losing the mailboxes is.
> 
> I am cross posting on both Postfix and Cyrus list, since I am not sure 
> where to get the answer from.
> 
> My current configuration is as follow:
> 
> Postconf -n
> 
> alias_database = hash:/etc/aliases
> alias_maps = hash:/etc/aliases
> append_dot_mydomain = no
> biff = no
> broken_sasl_auth_clients = yes
> config_directory = /etc/postfix
> content_filter = smtp-amavis:[127.0.0.1]:10024
> disable_vrfy_command = yes
> inet_interfaces = all
> mailbox_size_limit = 0
> mailbox_transport = lmtp:unix:/var/run/cyrus/socket/lmtp
> message_size_limit = 2048
> mydestination = mail.solipym.com, solipym, localhost.localdomain, localhost
> myhostname = mail.solipym.com
> mynetworks = 127.0.0.0/8 [:::127.0.0.0]/104 [::1]/128,192.168.1.0/24
> myorigin = /etc/mailname
> policyd-spf_time_limit = 3600
> readme_directory = no
> recipient_delimiter = +
> relayhost = smtp.movistar.es
> sender_canonical_maps = mysql:/etc/postfix/mysql-canonical.cf
> smtp_cname_overrides_servername = no
> smtp_sasl_auth_enable = yes
> smtp_sasl_password_maps = hash:/etc/postfix/sasl_passwd
> smtp_sasl_security_options = noanonymous
> smtp_sasl_type = cyrus
> smtp_tls_session_cache_database = btree:${data_directory}/smtp_scache
> smtpd_banner = $myhostname ESMTP $mail_name (Ubuntu)
> smtpd_client_restrictions = permit_mynetworks, 
> permit_sasl_authenticated, check_client_access hash:/etc/postfix/access
> smtpd_delay_reject = yes
> smtpd_error_sleep_time = 15s
> smtpd_hard_error_limit = 20
> smtpd_helo_required = yes
> smtpd_recipient_restrictions = permit_sasl_authenticated, 
> permit_mynetworks, reject_unauth_destination, reject_invalid_hostname, 
> reject_non_fqdn_hostname, reject_non_fqdn_sender, 
> reject_non_fqdn_recipient, reject_unknown_sender_domain, 
> reject_unknown_recipient_domain, reject_unauth_pipelining, 
> reject_rbl_client bl.spamcop.net, reject_rbl_client zen.spamhaus.org, 
> reject_rbl_client blackholes.easynet.nl, reject_rbl_client 
> dnsbl.njabl.org, reject_rbl_client dul.dnsbl.sorbs.net, 
> check_policy_service unix:private/policyd-spf
> smtpd_sasl_auth_enable = yes
> smtpd_sasl_path = smtpd
> smtpd_sender_restrictions = reject_non_fqdn_sender, check_sender_access 
> hash:/etc/postfix/access, check_sender_mx_access hash:/etc/postfix/access
> smtpd_soft_error_limit = 10
> smtpd_tls_CAfile = /etc/ssl/certs/root.crt
> smtpd_tls_cert_file = /etc/ssl/certs/server_mail_solipym_com.pem
> smtpd_tls_key_file = /etc/ssl/private/server.key
> smtpd_tls_session_cache_database = btree:${data_directory}/smtpd_scache
> smtpd_use_tls = yes
> virtual_alias_maps = mysql:/etc/postfix/mysql-virtual.cf
> virtual_mailbox_domains = mysql:/etc/postfix/mysql-mydestination.cf
> virtual_mailbox_maps = mysql:/etc/postfix/mysql-virtual.cf
> virtual_transport = lmtp:unix:/var/run/cyrus/socket/lmtp
> 
> Thanks for your help,
> 
> Dominique
> 
> 
> Cyrus Home Page: http://www.cyrusimap.org/
> List Archives/Info: http://lists.andrew.cmu.edu/pipermail/info-cyrus/
> To Unsubscribe:
> https://lists.andrew.cmu.edu/mailman/listinfo/info-cyrus
> 



Re: stat=queue and /var/spool/clientmqueue

2012-10-22 Thread Simone Felici

Il 18/10/2012 17:45, Ralf Hildebrandt ha scritto:

* Simone Felici :




That's sendmail, not postfix.


I know this settings shoud be referred to sendmail and shouldn't have nothing 
to do with this issue.
BTW I'm asking here infos on how manage correctly these mails to
postfix. I'm not 100% sure the problem is on /bin/mail, or if postfix
simply could be configured to look on this queue too.


Maybe you have postfix and sendmail installed side by side and
/bin/mail is using the sendmail's sendmail command



Hi again,

I've found the issue. /bin/mail is by default set-up to use sendmail. I've installed everywhere 
postfix but on some servers I've the issue the server is logging an outgoing mail with sendmail 
process, then sent out by postfix. In case of delays sendmail uses it's own queue, not known by 
postfix. The sendmail binary is a sym-link to /etc/alternatives/mta and this is another sym-link to 
/usr/sbin/sendmail.sendmail for the servers where I'm registering the issue. On the other servers it 
links to /usr/sbin/sendmail.postfix. Changink the sym-link now I'm logging postfix/pickup instead 
sendmail process.


In case this could help someone in the future :)

Bye Simon


Fwd: Re: Fwd: Re: MX vs A records (SOLVED)

2012-10-22 Thread Tom Kinghorn



On 18/10/2012 14:41, Noel Jones wrote:

On 10/18/2012 5:04 AM, Tom Kinghorn wrote:


DO NOT send debug log files unless specifically requested.  Normal
log files are sufficient.


And a friendly reminder that splitting required troubleshooting info
up between multiple messages greatly reduces the chance of getting help.

   -- Noel Jones



Hi List.
Just to let you know that i had a typo in the main.cf which is why this was not 
working.

Thanks to all who replied.

Regards
Tom






Re: MX vs A records (SOLVED)

2012-10-22 Thread Reindl Harald


Am 22.10.2012 15:29, schrieb Tom Kinghorn:
> 
> 
> On 18/10/2012 14:41, Noel Jones wrote:
>> On 10/18/2012 5:04 AM, Tom Kinghorn wrote:
>>>
>>> DO NOT send debug log files unless specifically requested.  Normal
>>> log files are sufficient.
>>>
>>>
>>> And a friendly reminder that splitting required troubleshooting info
>>> up between multiple messages greatly reduces the chance of getting help.
>>>
>>>-- Noel Jones
>>>
> 
> Hi List.
> Just to let you know that i had a typo in the main.cf which is why this was 
> not working.
> 
> Thanks to all who replied.

it would be nice having at the end of the thread the example config
with corrected typo to help others which finding this in the archives!



signature.asc
Description: OpenPGP digital signature


Re: MX vs A records (SOLVED)

2012-10-22 Thread Tom Kinghorn

On 22/10/2012 15:32, Reindl Harald wrote:


Am 22.10.2012 15:29, schrieb Tom Kinghorn:


On 18/10/2012 14:41, Noel Jones wrote:

On 10/18/2012 5:04 AM, Tom Kinghorn wrote:

DO NOT send debug log files unless specifically requested.  Normal
log files are sufficient.


And a friendly reminder that splitting required troubleshooting info
up between multiple messages greatly reduces the chance of getting help.

-- Noel Jones


Hi List.
Just to let you know that i had a typo in the main.cf which is why this was not 
working.

Thanks to all who replied.

it would be nice having at the end of the thread the example config
with corrected typo to help others which finding this in the archives!


apologies.


smtpd_recipient_restrictions =
check_recipient_ns_access 
hash:/etc/postfix/recipient_nameserver_host,
check_recipient_access 
hash:/etc/postfix/recipient_access_whitelist,
check_recipient_access 
hash:/etc/postfix/recipient_access_blacklist,




I checked the config and found that the lines did not end with a comma.
As soon as I added it, the access rule started working and mails were 
redirected (i changed REJECT to REDIRECT)


Regards
Tom





Re: MX vs A records (SOLVED)

2012-10-22 Thread Wietse Venema
Tom Kinghorn:
> > it would be nice having at the end of the thread the example config
> > with corrected typo to help others which finding this in the archives!
> >
> apologies.
> 
> 
> smtpd_recipient_restrictions =
>  check_recipient_ns_access 
> hash:/etc/postfix/recipient_nameserver_host,
>  check_recipient_access 
> hash:/etc/postfix/recipient_access_whitelist,
>  check_recipient_access 
> hash:/etc/postfix/recipient_access_blacklist,
> 
> 
> 
> I checked the config and found that the lines did not end with a comma.
> As soon as I added it, the access rule started working and mails were 
> redirected (i changed REJECT to REDIRECT)

What program are you using to edit main.cf?

Wietse


Re: MX vs A records (SOLVED)

2012-10-22 Thread Noel Jones
On 10/22/2012 8:39 AM, Tom Kinghorn wrote:
> On 22/10/2012 15:32, Reindl Harald wrote:
>>
>> Am 22.10.2012 15:29, schrieb Tom Kinghorn:
>>>
>>> On 18/10/2012 14:41, Noel Jones wrote:
 On 10/18/2012 5:04 AM, Tom Kinghorn wrote:
> DO NOT send debug log files unless specifically requested.  Normal
> log files are sufficient.
>
>
> And a friendly reminder that splitting required troubleshooting
> info
> up between multiple messages greatly reduces the chance of
> getting help.
>
> -- Noel Jones
>
>>> Hi List.
>>> Just to let you know that i had a typo in the main.cf which is
>>> why this was not working.
>>>
>>> Thanks to all who replied.
>> it would be nice having at the end of the thread the example config
>> with corrected typo to help others which finding this in the
>> archives!
>>
> apologies.
> 
> 
> smtpd_recipient_restrictions =
> check_recipient_ns_access
> hash:/etc/postfix/recipient_nameserver_host,
> check_recipient_access
> hash:/etc/postfix/recipient_access_whitelist,
> check_recipient_access
> hash:/etc/postfix/recipient_access_blacklist,
> 
> 
> 
> I checked the config and found that the lines did not end with a comma.
> As soon as I added it, the access rule started working and mails
> were redirected (i changed REJECT to REDIRECT)

FALSE.  The commas are not required; adding them should have no
effect.

Maybe there was some garbage in the file that got removed when you
edited it, or maybe you're using some non-text editor that screws up
the line endings.




  -- Noel Jones


Re: MX vs A records (SOLVED)

2012-10-22 Thread Tom Kinghorn

On 22/10/2012 15:51, Wietse Venema wrote:

Tom Kinghorn:

it would be nice having at the end of the thread the example config
with corrected typo to help others which finding this in the archives!


apologies.


smtpd_recipient_restrictions =
  check_recipient_ns_access
hash:/etc/postfix/recipient_nameserver_host,
  check_recipient_access
hash:/etc/postfix/recipient_access_whitelist,
  check_recipient_access
hash:/etc/postfix/recipient_access_blacklist,



I checked the config and found that the lines did not end with a comma.
As soon as I added it, the access rule started working and mails were
redirected (i changed REJECT to REDIRECT)

What program are you using to edit main.cf?

Wietse


Hi Wietse.
This was an "inherited" system as the previous admin was laid-off.

As far as I know, they used VI (as do i, however i used vim)

thx
Tom


Re: MX vs A records (SOLVED)

2012-10-22 Thread Tom Kinghorn

On 22/10/2012 15:55, Noel Jones wrote:

On 10/22/2012 8:39 AM, Tom Kinghorn wrote:

On 22/10/2012 15:32, Reindl Harald wrote:

Am 22.10.2012 15:29, schrieb Tom Kinghorn:

On 18/10/2012 14:41, Noel Jones wrote:

On 10/18/2012 5:04 AM, Tom Kinghorn wrote:

DO NOT send debug log files unless specifically requested.  Normal
log files are sufficient.


And a friendly reminder that splitting required troubleshooting
info
up between multiple messages greatly reduces the chance of
getting help.

 -- Noel Jones


Hi List.
Just to let you know that i had a typo in the main.cf which is
why this was not working.

Thanks to all who replied.

it would be nice having at the end of the thread the example config
with corrected typo to help others which finding this in the
archives!


apologies.


smtpd_recipient_restrictions =
 check_recipient_ns_access
hash:/etc/postfix/recipient_nameserver_host,
 check_recipient_access
hash:/etc/postfix/recipient_access_whitelist,
 check_recipient_access
hash:/etc/postfix/recipient_access_blacklist,



I checked the config and found that the lines did not end with a comma.
As soon as I added it, the access rule started working and mails
were redirected (i changed REJECT to REDIRECT)

FALSE.  The commas are not required; adding them should have no
effect.

Maybe there was some garbage in the file that got removed when you
edited it, or maybe you're using some non-text editor that screws up
the line endings.




   -- Noel Jones


Thanks for the info.

I merely posted what was done and the result.

I am grateful to know they are not required,


Re: MX vs A records (SOLVED)

2012-10-22 Thread Wietse Venema
Tom Kinghorn:
> >> I checked the config and found that the lines did not end with a comma.
> >> As soon as I added it, the access rule started working and mails were
> >> redirected (i changed REJECT to REDIRECT)
> > What program are you using to edit main.cf?

> Hi Wietse.
> This was an "inherited" system as the previous admin was laid-off.
> 
> As far as I know, they used VI (as do i, however i used vim)

I suspect there was garbage at the end of lines. Postfix logs
warnings in the maillog file when smtpd_xxx_restrictions contains
unrecognized content.

Wietse


Re: MX vs A records (SOLVED)

2012-10-22 Thread Tom Kinghorn

On 22/10/2012 16:09, Wietse Venema wrote:

Tom Kinghorn:

I suspect there was garbage at the end of lines. Postfix logs
warnings in the maillog file when smtpd_xxx_restrictions contains
unrecognized content.

Wietse


Thanks for the response Wietse.

Thanks to all who helped.

regards
Tom


Latest package for RHEL6

2012-10-22 Thread Lima Union
Hi all! does anyone know where I can find the latest postfix release
(2.9.x) for RHEL 6 x86_64 from some 'trusted' source? unfortunately
Simon Mudd didn't post any package for this platform yet.
Thanks in advance.
LU


Re: Alert of unusually large queue

2012-10-22 Thread Jan P. Kessler

>> I'm not sure, if sending an e-mail about a "full mailqueue"-condition is
>> the best way to go ;-)
> depends
>
> if you have no bulk-mail on your server it will tak enot too long
> to find a good value to adjust the "50" and as example if i have
> 500 queued messages i like to look if there is soemthing going
> wrong


What I meant was, that there is a good chance, that you will not receive
this notification, because whatever condition causes your mails to stuck
in the queue could stop that notification, too ;-)

As mentioned by other posters you should set up a real monitoring
system, that periodically checks your queue or generates an alert (e.g.
snmp trap) on the server which does not rely on the mechanism that you
are trying to monitor (here smtp).

cheers, jpk



Re: Latest package for RHEL6

2012-10-22 Thread Morten Stevens

On 22.10.2012 16:40, Lima Union wrote:

Hi all! does anyone know where I can find the latest postfix release
(2.9.x) for RHEL 6 x86_64 from some 'trusted' source? unfortunately
Simon Mudd didn't post any package for this platform yet.
Thanks in advance.
LU


Hi,

I have backported Postfix 2.9.x for my company and I am also package 
maintainer for Fedora.


Here are my latest builds for el6:
http://mstevens.fedorapeople.org/el6/postfix/

Best regards,

Morten


Re: Alert of unusually large queue

2012-10-22 Thread Wietse Venema
Jan P. Kessler:
> As mentioned by other posters you should set up a real monitoring
> system, that periodically checks your queue or generates an alert (e.g.
> snmp trap) on the server which does not rely on the mechanism that you
> are trying to monitor (here smtp).

To monitor an SMTP server, try to send a test message into it, and
raise an alarm if that test message is not delivered to mailbox or
smtp within some deadline.

Wietse


Re: Latest package for RHEL6

2012-10-22 Thread Patrick Lists

On 10/22/2012 04:56 PM, Morten Stevens wrote:
[snip]
 > I have backported Postfix 2.9.x for my company and I am also package

maintainer for Fedora.

Here are my latest builds for el6:
http://mstevens.fedorapeople.org/el6/postfix/


Would you mind making the SRPM also available?

Regards,
Patrick



Re: Latest package for RHEL6

2012-10-22 Thread Patrick Lists

On 10/22/2012 05:29 PM, Patrick Lists wrote:

On 10/22/2012 04:56 PM, Morten Stevens wrote:
[snip]
  > I have backported Postfix 2.9.x for my company and I am also package

maintainer for Fedora.

Here are my latest builds for el6:
http://mstevens.fedorapeople.org/el6/postfix/


Would you mind making the SRPM also available?


Please ignore. The SRPM lives in the x86_64 directory while I was 
looking for the SRPM directory at the i386 & x86_64 level.


Regards,
Patrick




Re: Latest package for RHEL6

2012-10-22 Thread Lima Union
On Mon, Oct 22, 2012 at 11:56 AM, Morten Stevens
 wrote:
> On 22.10.2012 16:40, Lima Union wrote:
>>
>> Hi all! does anyone know where I can find the latest postfix release
>> (2.9.x) for RHEL 6 x86_64 from some 'trusted' source? unfortunately
>> Simon Mudd didn't post any package for this platform yet.
>> Thanks in advance.
>> LU
>
>
> Hi,
>
> I have backported Postfix 2.9.x for my company and I am also package
> maintainer for Fedora.
>
> Here are my latest builds for el6:
> http://mstevens.fedorapeople.org/el6/postfix/
>
> Best regards,
>
> Morten

cool!! thank you so much!


RE: Alert of unusually large queue

2012-10-22 Thread James Day


> -Original Message-
> From: owner-postfix-us...@postfix.org [mailto:owner-postfix-
> us...@postfix.org] On Behalf Of Jan P. Kessler
> Sent: 22 October 2012 15:44
> To: postfix-users@postfix.org
> Subject: Re: Alert of unusually large queue
> 
> 
> >> I'm not sure, if sending an e-mail about a "full mailqueue"-condition
> >> is the best way to go ;-)
> > depends
> >
> > if you have no bulk-mail on your server it will tak enot too long to
> > find a good value to adjust the "50" and as example if i have
> > 500 queued messages i like to look if there is soemthing going wrong
> 
> 
> What I meant was, that there is a good chance, that you will not receive
> this notification, because whatever condition causes your mails to stuck
> in the queue could stop that notification, too ;-)
> 
> As mentioned by other posters you should set up a real monitoring
> system, that periodically checks your queue or generates an alert (e.g.
> snmp trap) on the server which does not rely on the mechanism that you
> are trying to monitor (here smtp).
> 
> cheers, jpk

That's a good point, it might be worthwhile looking into something like a php 
script that interfaces with an SMS API. I've seen that done in the past.

Kind regards,

James Day
(IT Engineer)


Re: Any best practices for stacking filters?

2012-10-22 Thread Quanah Gibson-Mount
--On Wednesday, October 17, 2012 7:52 PM -0400 Wietse Venema 
 wrote:




It's much easier to tell people not to use Milters before a proxy
filter...


If you use the milter after the proxy server, which is what I'm currently 
doing, then I result in the following problem:


If Amavis is called before OpenDKIM via the filter trigger, then Amavis 
does DKIM verification on the message before it is actually signed by 
OpenDKIM.  So the message gets delivered without having the signing 
verified.  This only happens for email between users on the server itself. 
Since the filter regex overrides content_filter, I'm not sure how to force 
OpenDKIM to execute for signing prior to Amavis executing verification. :/


I.e., I need the OpenDKIM milter to be processed before the proxy filter so 
that the email is correctly signed before it is passed to the proxy filter. 
Then Amavis can correctly verify the signature prior to delivery.


--Quanah

--

Quanah Gibson-Mount
Sr. Member of Technical Staff
Zimbra, Inc
A Division of VMware, Inc.

Zimbra ::  the leader in open source messaging and collaboration


Re: Any best practices for stacking filters?

2012-10-22 Thread Wietse Venema
Quanah Gibson-Mount:
>  wrote:
> > It's much easier to tell people not to use Milters before a proxy
> > filter...
> 
> If you use the milter after the proxy server, which is what I'm currently 
> doing, then I result in the following problem:

You just confirmed the limitation that I explained at length, so I
won't repeat that diatribe.

One suggestion I can make is to avoid mixing mail streams from
outside with mail streams from inside, before your mail is signed.

For example,

- Use before-queue filters for mail from outside so that you can
  reject mail before it hits the queue.

- Use after-queue filters for mail from inside. Then, your mail
  from "inside" is not affected by the limitation. You can sign it
  with dkim-milter and the like.

I suspect that you could feed both mail streams into the same Amavis
content filter.

Wietse


ESMTP: keys and passwords

2012-10-22 Thread thorsopia
Hello,

I'm trying to configure ESMTP using this guide [1].

$ touch smtpd.key
$ chmod 600 smtpd.key
$ openssl genrsa 4096 > smtpd.key
$ openssl req -new -key smtpd.key -x509 -days 730 -out smtpd.crt
...
If you enter '.', the field will be left blank.
-
Country Name (2 letter code) [AU]:.
State or Province Name (full name) [Some-State]:.
Locality Name (eg, city) []:.
Organization Name (eg, company) [Internet Widgits Pty Ltd]:.
Organizational Unit Name (eg, section) []:.
Common Name (eg, YOUR name) []:mail.example.com
Email Address []:ad...@example.com

(I'm using example.com as a placeholder.)

$ openssl req -new -x509 -extensions v3_ca -keyout cakey.pem \
-out cacert.pem -days 730
...
-
Country Name (2 letter code) [AU]:.
State or Province Name (full name) [Some-State]:.
Locality Name (eg, city) []:.
Organization Name (eg, company) [Internet Widgits Pty Ltd]:.
Organizational Unit Name (eg, section) []:.
Common Name (eg, YOUR name) []:mail.example.com
Email Address []:ad...@example.com

The above generated a 1024 bit RSA private key. How to create a 4096 bit key?

I'm going to send messages via Gnus. My .gnus.el:

(setq message-send-mail-function 'smtpmail-send it)
(setq smtpmail-starttls-credentials '(("mail.example.com" 25 nil nil)))
(setq smtpmail-auth-credentioals '(("mail.example.com" 25 "admin" nil)))
(setq smtpmail-default-smtp-server "mail.example.com")
(setq smtpmail-smtp-service 25)
(setq starttls-use-gnutls t)

Docs say that I'll be prompted for a password. Which one should I use?
Should I specify the one for the RSA private key ($ openssl req \
-new -x509 -extensions v3_ca -keyout cakey.pem -out cacert.pem \
-days 730)?

[1] https://help.ubuntu.com/community/Postfix




Re: ESMTP: keys and passwords

2012-10-22 Thread Reindl Harald


Am 22.10.2012 21:45, schrieb thorso...@lavabit.com:
> Hello,
> The above generated a 1024 bit RSA private key. How to create a 4096 bit key?

the following is for 2048 bit
replace 2048 by whatever you want

alter the template for your needs (partly german)
this is a script/remplate i am using since xears for any http/mail-cert
regardless if it is used as self signed o the csr submitted to thawte

[root@buildserver:/buildserver/ssl-cert]$ cat generate-cert.sh
#!/bin/bash
WORKING_DIR="/buildserver/ssl-cert"
OUT_DIR="$WORKING_DIR/$1"
mkdir $OUT_DIR 2> /dev/null
chmod 700 $OUT_DIR
if [ "$1" == "" ]; then
 echo "MISSING SERVERNAME"
 echo ""
 exit
fi
rm -f $OUT_DIR/$1.key
rm -f $OUT_DIR/$1.csr
rm -f $OUT_DIR/$1.crt
rm -f $OUT_DIR/$1.pem
sed "s/my_common_name/$1/g" $WORKING_DIR/openssl.conf.template > 
$WORKING_DIR/openssl.conf
openssl genrsa -out $OUT_DIR/$1.key 2048
openssl req -config $WORKING_DIR/openssl.conf -new -key $OUT_DIR/$1.key -out 
$OUT_DIR/$1.csr
openssl x509 -req -days 3650 -in $OUT_DIR/$1.csr -signkey $OUT_DIR/$1.key -out 
$OUT_DIR/$1.crt
cat $OUT_DIR/$1.crt $OUT_DIR/$1.key > $OUT_DIR/$1.pem


[root@buildserver:/buildserver/ssl-cert]$ cat openssl.conf.template
[ req ]
prompt  = yes
default_bits= 1024
distinguished_name  = req_DN
string_mask = nombstr
[ req_DN ]
countryName = "1. Landeskennung  "
countryName_default = "AT"
countryName_min = 2
countryName_max = 2
stateOrProvinceName = "2. Bundesland  "
stateOrProvinceName_default = "your_province"
localityName= "3. Stadt  "
localityName_default= "your_city"
0.organizationName  = "4. Firmenname  "
0.organizationName_default  = "your_comapny"
organizationalUnitName  = "5. Abteilung  "
organizationalUnitName_default  = "your_department"
commonName  = "6. Server-Name  "
commonName_max  = 64
commonName_default  = "my_common_name"
emailAddress= "7. Mail-Adresse  "
emailAddress_max= 40
emailAddress_default= "your_email"

> Docs say that I'll be prompted for a password. Which one should I use?
> Should I specify the one for the RSA private key ($ openssl req \
> -new -x509 -extensions v3_ca -keyout cakey.pem -out cacert.pem \
> -days 730)?

you do NOt really want a pssword
how sould it be entered in the boot-process?
waht sense would it make if it is stored in cleartext on the server?



signature.asc
Description: OpenPGP digital signature


Re: Any best practices for stacking filters?

2012-10-22 Thread Quanah Gibson-Mount
--On Monday, October 22, 2012 3:33 PM -0400 Wietse Venema 
 wrote:



One suggestion I can make is to avoid mixing mail streams from
outside with mail streams from inside, before your mail is signed.

For example,

- Use before-queue filters for mail from outside so that you can
  reject mail before it hits the queue.

- Use after-queue filters for mail from inside. Then, your mail
  from "inside" is not affected by the limitation. You can sign it
  with dkim-milter and the like.


Hi Wieste,

As I noted in my original mail, I already use the filters to separate out 
the streams:


smtpd_sender_restrictions = check_sender_access 
regexp:/opt/zimbra/postfix/conf/tag_as_originating.re, permit_mynetworks, 
permit_sasl_authenticated, permit_tls_clientcerts, check_sender_access 
regexp:/opt/zimbra/postfix/conf/tag_as_foreign.re


zimbra@zre-ldap002:~/postfix/conf$ cat tag_as_originating.re
/^/  FILTER smtp-amavis:[127.0.0.1]:10026

zimbra@zre-ldap002:~/postfix/conf$ cat tag_as_foreign.re
/^/  FILTER smtp-amavis:[127.0.0.1]:10024


So I believe I am already, as you said, diverting the mail into different 
streams.  Both of which go to Amavis.  I.e., originating mail gets directed 
to amavis on port 10026.  Foreign mail goes to amavis on port 10024.  Which 
gets me into the entire problem I'm having now.  Or am I misunderstanding 
what you said?


Mail gets re-injected from Amavis to Postfix on port 10025.  Then it is 
signed.  The problem is, at that point, Amavis is already done with the 
mail.  So again, I think I'm doing what you suggest, but I can't figure out 
how to get it to sign the mail via OpenDKIM prior to Amavis processing.


Here's my master.cf again as well:

smtp  inet  n   -   n   -   -   smtpd
   -o content_filter=scan:[127.0.0.1]:10029
465inet  n   -   n   -   -   smtpd
   -o smtpd_tls_wrappermode=yes
   -o smtpd_sasl_auth_enable=yes
   -o content_filter=scan:[127.0.0.1]:10029
submission inet n  -   n   -   -   smtpd
   -o smtpd_etrn_restrictions=reject
   -o smtpd_sasl_auth_enable=yes
   -o smtpd_client_restrictions=permit_sasl_authenticated,reject
   -o smtpd_tls_security_level=may
scan  unix  -   -   n   -   10  smtp
   -o smtp_send_xforward_command=yes
   -o disable_mime_output_conversion=yes
   -o smtp_generic_maps=
pickupfifo  n   -   n   60  1   pickup
cleanup   unix  n   -   n   -   0   cleanup
qmgr  fifo  n   -   n   300 1   qmgr
tlsmgrunix  -   -   n   1000?   1   tlsmgr
rewrite   unix  -   -   n   -   -   trivial-rewrite
bounceunix  -   -   n   -   0   bounce
defer unix  -   -   n   -   0   bounce
trace unix  -   -   n   -   0   bounce
verifyunix  -   -   n   -   1   verify
flush unix  n   -   n   1000?   0   flush
proxymap  unix  -   -   n   -   -   proxymap
smtp  unix  -   -   n   -   -   smtp
relay unix  -   -   n   -   -   smtp
showq unix  n   -   n   -   -   showq
error unix  -   -   n   -   -   error
retry unix  -   -   n   -   -   error
discard   unix  -   -   n   -   -   discard
local unix  -   n   n   -   -   local
virtual   unix  -   n   n   -   -   virtual
lmtp  unix  -   -   n   -   -   lmtp
anvil unix  -   -   n   -   1   anvil
scacheunix  -   -   n   -   1   scache
maildrop  unix  -   n   n   -   -   pipe
 flags=DRhu user=vmail argv=/usr/local/bin/maildrop -d ${recipient}
old-cyrus unix  -   n   n   -   -   pipe
 flags=R user=cyrus argv=/cyrus/bin/deliver -e -m ${extension} ${user}
cyrus unix  -   n   n   -   -   pipe
 user=cyrus argv=/cyrus/bin/deliver -e -r ${sender} -m ${extension} ${user}
uucp  unix  -   n   n   -   -   pipe
 flags=Fqhu user=uucp argv=uux -r -n -z -a$sender - $nexthop!rmail 
($recipient)

ifmailunix  -   n   n   -   -   pipe
 flags=F user=ftn argv=/usr/lib/ifmail/ifmail -r $nexthop ($recipient)
bsmtp unix  -   n   n   -   -   pipe
 flags=Fq. user=foo argv=/usr/local/sbin/bsmtp -f $sender $nexthop 
$recipient

smtp-amavis unix -  -   n   -   10  smtp
   -o smtp_data_done_timeout=1200
   -o smtp_send_xforward_command=yes
   -o disable_dns_lookups=yes
   -o max_use=20
127.0.0.1:10025 inet n  -   n   -   -  smtpd
   -o content_filter=
   -o local_recipient_maps=
   -o virtual_mailbox_maps=
   -o virtual_alias_maps=
   -o relay_recipient_maps=
   -o smtpd_restriction_classes=
   -o smtpd_delay_reject=no
   -o smtpd_client_restrictio

Re: Any best practices for stacking filters?

2012-10-22 Thread Quanah Gibson-Mount
--On Monday, October 22, 2012 1:03 PM -0700 Quanah Gibson-Mount 
 wrote:




Hi Wieste,


Wietse even.  Sorry. ;)


--

Quanah Gibson-Mount
Sr. Member of Technical Staff
Zimbra, Inc
A Division of VMware, Inc.

Zimbra ::  the leader in open source messaging and collaboration


Re: Any best practices for stacking filters?

2012-10-22 Thread Wietse Venema
Quanah Gibson-Mount:
> --On Monday, October 22, 2012 3:33 PM -0400 Wietse Venema 
>  wrote:
> 
> > One suggestion I can make is to avoid mixing mail streams from
> > outside with mail streams from inside, before your mail is signed.
> >
> > For example,
> >
> > - Use before-queue filters for mail from outside so that you can
> >   reject mail before it hits the queue.
> >
> > - Use after-queue filters for mail from inside. Then, your mail
> >   from "inside" is not affected by the limitation. You can sign it
> >   with dkim-milter and the like.
> 
> As I noted in my original mail, I already use the filters to separate out 
> the streams:

My example CAN sign mail with dkim-milter before it hits the Amavis
filter.

Your example CANNOT sign mail with dkim-milter before it hits the
Amavis filter.

Wietse


Re: Any best practices for stacking filters?

2012-10-22 Thread Quanah Gibson-Mount
--On Monday, October 22, 2012 4:24 PM -0400 Wietse Venema 
 wrote:



My example CAN sign mail with dkim-milter before it hits the Amavis
filter.

Your example CANNOT sign mail with dkim-milter before it hits the
Amavis filter.


I believe what you are saying is that I should adjust my originating filter 
to go to another postfix agent, rather than amavis.  That postfix agent 
triggers signing, and then passes the mail on to amavis on port 10026. 
Correct?


--Quanah

--

Quanah Gibson-Mount
Sr. Member of Technical Staff
Zimbra, Inc
A Division of VMware, Inc.

Zimbra ::  the leader in open source messaging and collaboration


Re: Any best practices for stacking filters?

2012-10-22 Thread Wietse Venema
Quanah Gibson-Mount:
> --On Monday, October 22, 2012 4:24 PM -0400 Wietse Venema 
>  wrote:
> 
> > My example CAN sign mail with dkim-milter before it hits the Amavis
> > filter.
> >
> > Your example CANNOT sign mail with dkim-milter before it hits the
> > Amavis filter.
> 
> I believe what you are saying is that I should adjust my originating filter 
> to go to another postfix agent, rather than amavis.  That postfix agent 
> triggers signing, and then passes the mail on to amavis on port 10026. 
> Correct?

1) Use the before-queue filter for mail from outside:

external clients -> smtpd -> Amavis ...

2) Use the after-queue filter for mail from inside:

internal clients -> smtpd -> cleanup -> queue -> smtp -> Amavis ...

Wietse


Re: local_header_rewrite_clients behaving weird

2012-10-22 Thread Dominik George
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

> But as a matter of fact, both test clients are covered by 
> permit_inet_interfaces, the default for local_header_rewrite_cients. Plus, 
> rewrites stopped working without changing Postfix version or config.

OK, can it. I got it.


http://www.postfix.org/postconf.5.html#local_header_rewrite_clients

permit_inet_interfaces
Append the domain name in $myorigin or $mydomain when the client IP 
   address matches $inet_interfaces. This is enabled by default.


This says everything. However, what happened to that system is a complete 
mystery to me. The problem began to show within the last two weeks and we 
sure as hell weren't using Postfix <2.2 before that.

Oh well, never mind.

- -nik
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)

iQJOBAEBAgA4BQJQhb6YMRpodHRwczovL3d3dy5kb21pbmlrLWdlb3JnZS5kZS9n
cGctcG9saWN5LnR4dC5hc2MACgkQx86z/xVBKI4MGA//X9gz/q1g0izpQZPUSAGj
TENUJEjCisv4F9pCCCkCE9Zs+c7pZQyi/okPhBEFEhWenA1LA1WkGFYZyJCamzfC
4kj9cnIHeKjf6itw7oS316fbO9hcU4gmhOjkM6twD7QKwv86xvopbd1qgXMIUUI4
sjNh/A6x4fhVghZsjG5V89WfH3Wu7ujYVm6uWzzUYqyJNWqduFejAqlymIQ8jbn7
AUcC6FCsdNqdZA0ks6IsE8RETxVxb3tMiawAkpIOmb7jy1bgRXS83KeYz50NjVTJ
TmHou+YGaF4lFQgGlMo1AIz4xfrLDYRW5n0rN6aQTNtnc/1j605bL5ZClUSJzCqm
bHOFfxN3kVV5OthaKILJdYzDA0y2dGLip/l/z4E5TCqBfuUi53J2ajWGtkYUuqXB
4t3L5fzScttY254Dcc+hHQD+DeDpVpucYy2moTdYmfYgIWWU0wzrT4WTT4/GeMG6
l68ccOW50HC5Q19/KJnakwdPj/gBD4HzxwVEzCFHNBCsb6+pbBdHd6rkO4bLq3QU
uEnj4gxn4758SuHvb5TY/nY2/vHFAsqtgo5Ouu+luysdrZU7qqi6OBrZJVcPjE63
VpfaQQr1wRJSxeU94ueHSCTpp4gUXer+vTR4MWkl0PnPW0JfaimK7pA3wcKgfBKM
SzzGspDcux/zgfL9WNEn4ik=
=Yf40
-END PGP SIGNATURE-


Re: postfix SMTP AUTH

2012-10-22 Thread William Holt
Hi Rob, thanks. I use the reserved adresses because I'm testing the
box via local net (my laptop), I have everything setup straight
through GoDaddy to my router I just forward the ports when I'm ready.

I'll check out the smtpd_sasl_local_domain = $myhostname problem. By
the way, do you know of any docs which list and explain the sasl and
tls options?

this is the result of saslfinger...I'm looking at it now but I
forwarded it to you...


postfix start
postfix/postfix-script: starting the Postfix mail system
[root@messenger saslfinger-1.0.3]# saslfinger -s
saslfinger - postfix Cyrus sasl configuration Mon Oct 22 17:45:14 EDT 2012
version: 1.0.2
mode: server-side SMTP AUTH

-- basics --
Postfix: 2.9.4
System: Arch Linux \r (\l)

-- smtpd is linked to --
libsasl2.so.2 => /usr/lib/libsasl2.so.2 (0xb7712000)

-- active SMTP AUTH and TLS parameters for smtpd --
broken_sasl_auth_clients = yes
smtpd_sasl_auth_enable = yes
smtpd_sasl_local_domain = $myhostname
smtpd_sasl_security_options = noanonymous
smtpd_sasl_tls_security_options = $smtpd_sasl_security_options
smtpd_sasl_type = cyrus
smtpd_tls_CAfile = /etc/ssl/private/CA-Messenger-key.pem
smtpd_tls_cert_file = /etc/postfix/smtpd.crt
smtpd_tls_key_file = /etc/postfix/smtpdpub.key
smtpd_tls_security_level = may


-- listing of /usr/lib/sasl2 --
total 604
drwxr-xr-x  2 root root  4096 Oct 19 14:21 .
drwxr-xr-x 52 root root 20480 Oct 19 14:14 ..
-rwxr-xr-x  1 root root 17956 Jan  9  2012 libanonymous.so
-rwxr-xr-x  1 root root 17956 Jan  9  2012 libanonymous.so.2
-rwxr-xr-x  1 root root 17956 Jan  9  2012 libanonymous.so.2.0.23
-rwxr-xr-x  1 root root 17956 Jan  9  2012 libcrammd5.so
-rwxr-xr-x  1 root root 17956 Jan  9  2012 libcrammd5.so.2
-rwxr-xr-x  1 root root 17956 Jan  9  2012 libcrammd5.so.2.0.23
-rwxr-xr-x  1 root root 51012 Jan  9  2012 libdigestmd5.so
-rwxr-xr-x  1 root root 51012 Jan  9  2012 libdigestmd5.so.2
-rwxr-xr-x  1 root root 51012 Jan  9  2012 libdigestmd5.so.2.0.23
-rwxr-xr-x  1 root root 17956 Jan  9  2012 liblogin.so
-rwxr-xr-x  1 root root 17956 Jan  9  2012 liblogin.so.2
-rwxr-xr-x  1 root root 17956 Jan  9  2012 liblogin.so.2.0.23
-rwxr-xr-x  1 root root 34436 Jan  9  2012 libntlm.so
-rwxr-xr-x  1 root root 34436 Jan  9  2012 libntlm.so.2
-rwxr-xr-x  1 root root 34436 Jan  9  2012 libntlm.so.2.0.23
-rwxr-xr-x  1 root root 17956 Jan  9  2012 libplain.so
-rwxr-xr-x  1 root root 17956 Jan  9  2012 libplain.so.2
-rwxr-xr-x  1 root root 17956 Jan  9  2012 libplain.so.2.0.23
-rwxr-xr-x  1 root root 21940 Jan  9  2012 libsasldb.so
-rwxr-xr-x  1 root root 21940 Jan  9  2012 libsasldb.so.2
-rwxr-xr-x  1 root root 21940 Jan  9  2012 libsasldb.so.2.0.23
-rw-r--r--  1 root root   160 Oct 21 12:42 smtpd.conf




-- content of /usr/lib/sasl2/smtpd.conf --
##sasl authentication methods###
pwcheck_method: auxprop
#saslauthd_path: /var/run/saslauthd/mux
mech_list: plain login
auxprop_plugin: sasldb2
log_level: 7



-- active services in /etc/postfix/master.cf --
# service type  private unpriv  chroot  wakeup  maxproc command + args
#   (yes)   (yes)   (yes)   (never) (100)
smtp  inet  n   -   n   -   -   smtpd -v
pickupfifo  n   -   n   60  1   pickup
cleanup   unix  n   -   n   -   0   cleanup
qmgr  fifo  n   -   n   300 1   qmgr
tlsmgrunix  -   -   n   1000?   1   tlsmgr
rewrite   unix  -   -   n   -   -   trivial-rewrite
bounceunix  -   -   n   -   0   bounce
defer unix  -   -   n   -   0   bounce
trace unix  -   -   n   -   0   bounce
verifyunix  -   -   n   -   1   verify
flush unix  n   -   n   1000?   0   flush
proxymap  unix  -   -   n   -   -   proxymap
proxywrite unix -   -   n   -   1   proxymap
smtp  unix  -   -   n   -   -   smtp
relay unix  -   -   n   -   -   smtp
showq unix  n   -   n   -   -   showq
error unix  -   -   n   -   -   error
retry unix  -   -   n   -   -   error
discard   unix  -   -   n   -   -   discard
local unix  -   n   n   -   -   local
virtual   unix  -   n   n   -   -   virtual
lmtp  unix  -   -   n   -   -   lmtp
anvil unix  -   -   n   -   1   anvil
scacheunix  -   -   n   -   1   scache

-- mechanisms on localhost --
250-AUTH PLAIN LOGIN
250-AUTH=PLAIN LOGIN

-- end of saslfinger output --

[root@messenger saslfinger-1.0.3]#


Thanks.

On Sun, Oct 21, 2012 at 4:15 PM, /dev/rob0  wrote:
> On Sun, Oct 21, 2012 at 03:51:13PM -0400, William Holt wrote:
>> hi, new to the forum. I'm running arch and have postfix/cyrus.
>
> Generally I recommend Dovecot for SASL and IM

Re: Any best practices for stacking filters?

2012-10-22 Thread Quanah Gibson-Mount
--On Monday, October 22, 2012 5:09 PM -0400 Wietse Venema 
 wrote:



1) Use the before-queue filter for mail from outside:

external clients -> smtpd -> Amavis ...

2) Use the after-queue filter for mail from inside:

internal clients -> smtpd -> cleanup -> queue -> smtp -> Amavis ...

Wietse


I'm going to assume you mean something like this then:

smtp  inet  n   -   n   -   -   smtpd
   -o smtpd_proxy_filter=[127.0.0.1]:10029
   -o smtpd_client_connection_count_limit=10
   -o smtpd_proxy_options=speed_adjust



I already tried this, and it is not an acceptable solution, because postfix 
will not accept mail if OpenDKIM is not running.  I need Postfix to accept 
and queue the email in that scenario, rather than reject it.


Oct 22 14:54:35 zqa-398 postfix/smtpd[2854]: connect from 
zqa-398.eng.vmware.com[10.137.245.143]
Oct 22 14:54:35 zqa-398 postfix/smtpd[2854]: warning: access table 
regexp:/opt/zimbra/postfix/conf/tag_as_originating.re: with 
smtpd_proxy_filter specified, action FILTER is unavailable
Oct 22 14:54:35 zqa-398 postfix/smtpd[2854]: NOQUEUE: 
client=zqa-398.eng.vmware.com[10.137.245.143]
Oct 22 14:54:35 zqa-398 postfix/smtpd[2857]: connect from 
localhost[127.0.0.1]
Oct 22 14:54:35 zqa-398 postfix/smtpd[2857]: warning: connect to Milter 
service inet:localhost:8465: Connection refused
Oct 22 14:54:35 zqa-398 postfix/smtpd[2857]: NOQUEUE: milter-reject: 
CONNECT from localhost[127.0.0.1]: 451 4.7.1 Service unavailable - try 
again later; proto=SMTP
Oct 22 14:54:35 zqa-398 postfix/smtpd[2857]: NOQUEUE: milter-reject: EHLO 
from localhost[127.0.0.1]: 451 4.7.1 Service unavailable - try again later; 
proto=SMTP helo=
Oct 22 14:54:35 zqa-398 postfix/smtpd[2857]: NOQUEUE: milter-reject: MAIL 
from localhost[127.0.0.1]: 451 4.7.1 Service unavailable - try again later; 
from= proto=ESMTP 
helo=
Oct 22 14:54:35 zqa-398 postfix/smtpd[2854]: warning: proxy 
[127.0.0.1]:10029 rejected "MAIL FROM:": "451 
4.7.1 Service unavailable - try again later"
Oct 22 14:54:35 zqa-398 postfix/smtpd[2854]: proxy-reject: END-OF-MESSAGE: 
451 4.7.1 Service unavailable - try again later; 
from= to= 
proto=ESMTP helo=
Oct 22 14:54:35 zqa-398 postfix/smtpd[2857]: lost connection after MAIL 
from localhost[127.0.0.1]



--Quanah

--

Quanah Gibson-Mount
Sr. Member of Technical Staff
Zimbra, Inc
A Division of VMware, Inc.

Zimbra ::  the leader in open source messaging and collaboration


Re: Any best practices for stacking filters?

2012-10-22 Thread Wietse Venema
Quanah Gibson-Mount:
> --On Monday, October 22, 2012 5:09 PM -0400 Wietse Venema 
>  wrote:
> 
> > 1) Use the before-queue filter for mail from outside:
> >
> > external clients -> smtpd -> Amavis ...
> >
> > 2) Use the after-queue filter for mail from inside:
> >
> > internal clients -> smtpd -> cleanup -> queue -> smtp -> Amavis ...
> >
> > Wietse
> 
> I already tried this, and it is not an acceptable solution, because postfix 
> will not accept mail if OpenDKIM is not running.  I need Postfix to accept 
> and queue the email in that scenario, rather than reject it.

RTFM http://www.postfix.org/postconf.5.html#milter_default_action

Wietse


Re: Any best practices for stacking filters?

2012-10-22 Thread Quanah Gibson-Mount
--On Monday, October 22, 2012 6:17 PM -0400 Wietse Venema 
 wrote:



Quanah Gibson-Mount:

--On Monday, October 22, 2012 5:09 PM -0400 Wietse Venema
 wrote:

> 1) Use the before-queue filter for mail from outside:
>
>external clients -> smtpd -> Amavis ...
>
> 2) Use the after-queue filter for mail from inside:
>
> internal clients -> smtpd -> cleanup -> queue -> smtp -> Amavis ...
>
>Wietse

I already tried this, and it is not an acceptable solution, because
postfix  will not accept mail if OpenDKIM is not running.  I need
Postfix to accept  and queue the email in that scenario, rather than
reject it.


RTFM http://www.postfix.org/postconf.5.html#milter_default_action


I have read that before.  None of the actions it allows are desirable.

Changing the action to quarantine requires manual intervention on the admin 
side to ever get this to deliver.


"accept" is not acceptable, because it gets delivered instead of queued.

--Quanah


--

Quanah Gibson-Mount
Sr. Member of Technical Staff
Zimbra, Inc
A Division of VMware, Inc.

Zimbra ::  the leader in open source messaging and collaboration


Re: postfix SMTP AUTH

2012-10-22 Thread Patrick Ben Koetter
See below ...

* William Holt :
> Hi Rob, thanks. I use the reserved adresses because I'm testing the
> box via local net (my laptop), I have everything setup straight
> through GoDaddy to my router I just forward the ports when I'm ready.
> 
> I'll check out the smtpd_sasl_local_domain = $myhostname problem. By
> the way, do you know of any docs which list and explain the sasl and
> tls options?
> 
> this is the result of saslfinger...I'm looking at it now but I
> forwarded it to you...
> 
> 
> postfix start
> postfix/postfix-script: starting the Postfix mail system
> [root@messenger saslfinger-1.0.3]# saslfinger -s
> saslfinger - postfix Cyrus sasl configuration Mon Oct 22 17:45:14 EDT 2012
> version: 1.0.2
> mode: server-side SMTP AUTH
> 
> -- basics --
> Postfix: 2.9.4
> System: Arch Linux \r (\l)
> 
> -- smtpd is linked to --
>   libsasl2.so.2 => /usr/lib/libsasl2.so.2 (0xb7712000)
> 
> -- active SMTP AUTH and TLS parameters for smtpd --
> broken_sasl_auth_clients = yes
> smtpd_sasl_auth_enable = yes
> smtpd_sasl_local_domain = $myhostname
> smtpd_sasl_security_options = noanonymous
> smtpd_sasl_tls_security_options = $smtpd_sasl_security_options
> smtpd_sasl_type = cyrus
> smtpd_tls_CAfile = /etc/ssl/private/CA-Messenger-key.pem
> smtpd_tls_cert_file = /etc/postfix/smtpd.crt
> smtpd_tls_key_file = /etc/postfix/smtpdpub.key
> smtpd_tls_security_level = may
> 
> 
> -- listing of /usr/lib/sasl2 --
> total 604
> drwxr-xr-x  2 root root  4096 Oct 19 14:21 .
> drwxr-xr-x 52 root root 20480 Oct 19 14:14 ..
> -rwxr-xr-x  1 root root 17956 Jan  9  2012 libanonymous.so
> -rwxr-xr-x  1 root root 17956 Jan  9  2012 libanonymous.so.2
> -rwxr-xr-x  1 root root 17956 Jan  9  2012 libanonymous.so.2.0.23
> -rwxr-xr-x  1 root root 17956 Jan  9  2012 libcrammd5.so
> -rwxr-xr-x  1 root root 17956 Jan  9  2012 libcrammd5.so.2
> -rwxr-xr-x  1 root root 17956 Jan  9  2012 libcrammd5.so.2.0.23
> -rwxr-xr-x  1 root root 51012 Jan  9  2012 libdigestmd5.so
> -rwxr-xr-x  1 root root 51012 Jan  9  2012 libdigestmd5.so.2
> -rwxr-xr-x  1 root root 51012 Jan  9  2012 libdigestmd5.so.2.0.23
> -rwxr-xr-x  1 root root 17956 Jan  9  2012 liblogin.so
> -rwxr-xr-x  1 root root 17956 Jan  9  2012 liblogin.so.2
> -rwxr-xr-x  1 root root 17956 Jan  9  2012 liblogin.so.2.0.23
> -rwxr-xr-x  1 root root 34436 Jan  9  2012 libntlm.so
> -rwxr-xr-x  1 root root 34436 Jan  9  2012 libntlm.so.2
> -rwxr-xr-x  1 root root 34436 Jan  9  2012 libntlm.so.2.0.23
> -rwxr-xr-x  1 root root 17956 Jan  9  2012 libplain.so
> -rwxr-xr-x  1 root root 17956 Jan  9  2012 libplain.so.2
> -rwxr-xr-x  1 root root 17956 Jan  9  2012 libplain.so.2.0.23
> -rwxr-xr-x  1 root root 21940 Jan  9  2012 libsasldb.so
> -rwxr-xr-x  1 root root 21940 Jan  9  2012 libsasldb.so.2
> -rwxr-xr-x  1 root root 21940 Jan  9  2012 libsasldb.so.2.0.23
> -rw-r--r--  1 root root   160 Oct 21 12:42 smtpd.conf
> 
> 
> 
> 
> -- content of /usr/lib/sasl2/smtpd.conf --
> ##sasl authentication methods###
> pwcheck_method: auxprop
> #saslauthd_path: /var/run/saslauthd/mux
> mech_list: plain login
> auxprop_plugin: sasldb2
> log_level: 7

Remove '2' at the end of "auxprop_plugin:" and write this:

pwcheck_method: auxprop
mech_list: plain login
auxprop_plugin: sasldb
log_level: 7

Make sure you have no trailing garbage at the end of the lines!


> -- active services in /etc/postfix/master.cf --
> # service type  private unpriv  chroot  wakeup  maxproc command + args
> #   (yes)   (yes)   (yes)   (never) (100)
> smtp  inet  n   -   n   -   -   smtpd -v

...

> -- mechanisms on localhost --
> 250-AUTH PLAIN LOGIN
> 250-AUTH=PLAIN LOGIN
> 
> -- end of saslfinger output --

So far, so good.

What do you get if you run 'sasldblistusers2'?
Do the accounts have a domainpart you use when you create the authentication
string? If not, use an account as given from sasldblistusers2 output and test
with that.

p@rick


-- 
[*] sys4 AG

http://sys4.de, +49 (89) 30 90 46 64
Franziskanerstraße 15, 81669 München

Sitz der Gesellschaft: München, Amtsgericht München: HRB 199263
Vorstand: Patrick Ben Koetter, Axel von der Ohe, Marc Schiffbauer
Aufsichtsratsvorsitzender: Joerg Heidrich



Re: postfix SMTP AUTH

2012-10-22 Thread William Holt
P.S. I'm sorry I looked quickly and thought your name was Rob, forgive
me Patrick. I'm reading your book, I like it. I also use the postfix
web site and debian-wiki/arch-wiki.

On Mon, Oct 22, 2012 at 5:53 PM, William Holt
 wrote:
> Hi Rob, thanks. I use the reserved adresses because I'm testing the
> box via local net (my laptop), I have everything setup straight
> through GoDaddy to my router I just forward the ports when I'm ready.
>
> I'll check out the smtpd_sasl_local_domain = $myhostname problem. By
> the way, do you know of any docs which list and explain the sasl and
> tls options?
>
> this is the result of saslfinger...I'm looking at it now but I
> forwarded it to you...
>
> 
> postfix start
> postfix/postfix-script: starting the Postfix mail system
> [root@messenger saslfinger-1.0.3]# saslfinger -s
> saslfinger - postfix Cyrus sasl configuration Mon Oct 22 17:45:14 EDT 2012
> version: 1.0.2
> mode: server-side SMTP AUTH
>
> -- basics --
> Postfix: 2.9.4
> System: Arch Linux \r (\l)
>
> -- smtpd is linked to --
> libsasl2.so.2 => /usr/lib/libsasl2.so.2 (0xb7712000)
>
> -- active SMTP AUTH and TLS parameters for smtpd --
> broken_sasl_auth_clients = yes
> smtpd_sasl_auth_enable = yes
> smtpd_sasl_local_domain = $myhostname
> smtpd_sasl_security_options = noanonymous
> smtpd_sasl_tls_security_options = $smtpd_sasl_security_options
> smtpd_sasl_type = cyrus
> smtpd_tls_CAfile = /etc/ssl/private/CA-Messenger-key.pem
> smtpd_tls_cert_file = /etc/postfix/smtpd.crt
> smtpd_tls_key_file = /etc/postfix/smtpdpub.key
> smtpd_tls_security_level = may
>
>
> -- listing of /usr/lib/sasl2 --
> total 604
> drwxr-xr-x  2 root root  4096 Oct 19 14:21 .
> drwxr-xr-x 52 root root 20480 Oct 19 14:14 ..
> -rwxr-xr-x  1 root root 17956 Jan  9  2012 libanonymous.so
> -rwxr-xr-x  1 root root 17956 Jan  9  2012 libanonymous.so.2
> -rwxr-xr-x  1 root root 17956 Jan  9  2012 libanonymous.so.2.0.23
> -rwxr-xr-x  1 root root 17956 Jan  9  2012 libcrammd5.so
> -rwxr-xr-x  1 root root 17956 Jan  9  2012 libcrammd5.so.2
> -rwxr-xr-x  1 root root 17956 Jan  9  2012 libcrammd5.so.2.0.23
> -rwxr-xr-x  1 root root 51012 Jan  9  2012 libdigestmd5.so
> -rwxr-xr-x  1 root root 51012 Jan  9  2012 libdigestmd5.so.2
> -rwxr-xr-x  1 root root 51012 Jan  9  2012 libdigestmd5.so.2.0.23
> -rwxr-xr-x  1 root root 17956 Jan  9  2012 liblogin.so
> -rwxr-xr-x  1 root root 17956 Jan  9  2012 liblogin.so.2
> -rwxr-xr-x  1 root root 17956 Jan  9  2012 liblogin.so.2.0.23
> -rwxr-xr-x  1 root root 34436 Jan  9  2012 libntlm.so
> -rwxr-xr-x  1 root root 34436 Jan  9  2012 libntlm.so.2
> -rwxr-xr-x  1 root root 34436 Jan  9  2012 libntlm.so.2.0.23
> -rwxr-xr-x  1 root root 17956 Jan  9  2012 libplain.so
> -rwxr-xr-x  1 root root 17956 Jan  9  2012 libplain.so.2
> -rwxr-xr-x  1 root root 17956 Jan  9  2012 libplain.so.2.0.23
> -rwxr-xr-x  1 root root 21940 Jan  9  2012 libsasldb.so
> -rwxr-xr-x  1 root root 21940 Jan  9  2012 libsasldb.so.2
> -rwxr-xr-x  1 root root 21940 Jan  9  2012 libsasldb.so.2.0.23
> -rw-r--r--  1 root root   160 Oct 21 12:42 smtpd.conf
>
>
>
>
> -- content of /usr/lib/sasl2/smtpd.conf --
> ##sasl authentication methods###
> pwcheck_method: auxprop
> #saslauthd_path: /var/run/saslauthd/mux
> mech_list: plain login
> auxprop_plugin: sasldb2
> log_level: 7
>
>
>
> -- active services in /etc/postfix/master.cf --
> # service type  private unpriv  chroot  wakeup  maxproc command + args
> #   (yes)   (yes)   (yes)   (never) (100)
> smtp  inet  n   -   n   -   -   smtpd -v
> pickupfifo  n   -   n   60  1   pickup
> cleanup   unix  n   -   n   -   0   cleanup
> qmgr  fifo  n   -   n   300 1   qmgr
> tlsmgrunix  -   -   n   1000?   1   tlsmgr
> rewrite   unix  -   -   n   -   -   trivial-rewrite
> bounceunix  -   -   n   -   0   bounce
> defer unix  -   -   n   -   0   bounce
> trace unix  -   -   n   -   0   bounce
> verifyunix  -   -   n   -   1   verify
> flush unix  n   -   n   1000?   0   flush
> proxymap  unix  -   -   n   -   -   proxymap
> proxywrite unix -   -   n   -   1   proxymap
> smtp  unix  -   -   n   -   -   smtp
> relay unix  -   -   n   -   -   smtp
> showq unix  n   -   n   -   -   showq
> error unix  -   -   n   -   -   error
> retry unix  -   -   n   -   -   error
> discard   unix  -   -   n   -   -   discard
> local unix  -   n   n   -   -   local
> virtual   unix  -   n   n   -   -   virtual
> lmtp  unix  -   -   n   -   -   lmtp
> anvil unix  -   -   n   -   1   anvil
> scacheunix  -

Re: Any best practices for stacking filters?

2012-10-22 Thread Wietse Venema
Quanah Gibson-Mount:
> --On Monday, October 22, 2012 6:17 PM -0400 Wietse Venema 
>  wrote:
> 
> > Quanah Gibson-Mount:
> >> --On Monday, October 22, 2012 5:09 PM -0400 Wietse Venema
> >>  wrote:
> >>
> >> > 1) Use the before-queue filter for mail from outside:
> >> >
> >> >  external clients -> smtpd -> Amavis ...
> >> >
> >> > 2) Use the after-queue filter for mail from inside:
> >> >
> >> > internal clients -> smtpd -> cleanup -> queue -> smtp -> Amavis ...
> >> >
> >> >  Wietse
> >>
> >> I already tried this, and it is not an acceptable solution, because
> >> postfix  will not accept mail if OpenDKIM is not running.  I need
> >> Postfix to accept  and queue the email in that scenario, rather than
> >> reject it.
> >
> > RTFM http://www.postfix.org/postconf.5.html#milter_default_action
> 
> I have read that before.  None of the actions it allows are desirable.
> 
> Changing the action to quarantine requires manual intervention on the admin 
> side to ever get this to deliver.

You had a problem with not being able to sign mail with a Milter
before it enters your content filter.

I kindly provided an example that allows you to do that. It even
works with the same content filter.

Now you reject the solution. Not because it would fail to sign mail
as promised. Not because it wouldn't work with the filter as promised.

There is, and there will not be, a queue between the Postfix SMTP
server protocol engine and the Postfix Milter client protocol engine,
where email messages wait until a broken Milter server comes back.

Not in Postfix, not in Sendmail, not in other MTAs.  The Milter
protocol is designed for before-queue agents, so that they can
inspect the SMTP command stream as it happens.

Wietse


Re: Any best practices for stacking filters?

2012-10-22 Thread Quanah Gibson-Mount
--On Monday, October 22, 2012 7:09 PM -0400 Wietse Venema 
 wrote:




You had a problem with not being able to sign mail with a Milter
before it enters your content filter.

I kindly provided an example that allows you to do that. It even
works with the same content filter.

Now you reject the solution. Not because it would fail to sign mail
as promised. Not because it wouldn't work with the filter as promised.

There is, and there will not be, a queue between the Postfix SMTP
server protocol engine and the Postfix Milter client protocol engine,
where email messages wait until a broken Milter server comes back.

Not in Postfix, not in Sendmail, not in other MTAs.  The Milter
protocol is designed for before-queue agents, so that they can
inspect the SMTP command stream as it happens.


Ok.  So basically it is impossible to do what I want to do, thanks.  Let me 
go back to the OpenDKIM folks then. ;)


--Quanah

--

Quanah Gibson-Mount
Sr. Member of Technical Staff
Zimbra, Inc
A Division of VMware, Inc.

Zimbra ::  the leader in open source messaging and collaboration


Re: Any best practices for stacking filters?

2012-10-22 Thread Quanah Gibson-Mount
--On Monday, October 22, 2012 4:23 PM -0700 Quanah Gibson-Mount 
 wrote:




There is, and there will not be, a queue between the Postfix SMTP
server protocol engine and the Postfix Milter client protocol engine,
where email messages wait until a broken Milter server comes back.


By the way, as long as Amavis isn't involved, I can get Postfix to queue 
mail if the milter is down just fine, by setting things up as a content 
filter that fronts the milter.


I.e., this configuration *does* queue email being sent to the milter:

smtp  inet  n   -   n   -   -   smtpd
   -o content_filter=scan:[127.0.0.1]:10029
scan  unix  -   -   n   -   10  smtp
   -o smtp_send_xforward_command=yes
   -o disable_mime_output_conversion=yes
   -o smtp_generic_maps=
[127.0.0.1]:10029 inet n - n - - smtpd
   -o smtpd_milters=inet:localhost:8465


With this setup, if I stop OpenDKIM, the mail queues until OpenDKIM is 
restarted, even though OpenDKIM is being called as a milter.


--Quanah



--

Quanah Gibson-Mount
Sr. Member of Technical Staff
Zimbra, Inc
A Division of VMware, Inc.

Zimbra ::  the leader in open source messaging and collaboration


Re: Any best practices for stacking filters?

2012-10-22 Thread Wietse Venema
Quanah Gibson-Mount:
> --On Monday, October 22, 2012 4:23 PM -0700 Quanah Gibson-Mount 
>  wrote:
> 
> 
> >> There is, and there will not be, a queue between the Postfix SMTP
> >> server protocol engine and the Postfix Milter client protocol engine,
> >> where email messages wait until a broken Milter server comes back.
> 
> By the way, as long as Amavis isn't involved, I can get Postfix to queue 
> mail if the milter is down just fine, by setting things up as a content 
> filter that fronts the milter.

There is, however, no milter_default_action ON THE SMTP SERVER SIDE
that accepts mail and keeps it queued until the milter comes back.
That's what you objected to, and that's what will never exist.

Wietse


Re: Any best practices for stacking filters?

2012-10-22 Thread Quanah Gibson-Mount
--On Monday, October 22, 2012 7:39 PM -0400 Wietse Venema 
 wrote:



There is, however, no milter_default_action ON THE SMTP SERVER SIDE
that accepts mail and keeps it queued until the milter comes back.
That's what you objected to, and that's what will never exist.


All I want is to be able to send an email, have it processed and signed by 
OpenDKIM, and then handed off to Amavis.


It seems to me if this can work without Amavis in the picture, it should be 
possible to do it with Amavis in the picture too.


I understand the milter has to be fronted as a filter.  I understand I need 
the ability to route mail differently through amavis depending on whether 
or not it is originating or foreign email.  What I'm missing is how to get 
all this to play together the way I want it to.


I.e., it is fine with me if "milter" is not how the SMTP server "sees" 
things, just as it doesn't see it that way using the content filter.


So, is setting it up this way truly impossible as well, or is there some 
way to stack filters (not milters), which was my original question.



--Quanah


--

Quanah Gibson-Mount
Sr. Member of Technical Staff
Zimbra, Inc
A Division of VMware, Inc.

Zimbra ::  the leader in open source messaging and collaboration


Re: Any best practices for stacking filters?

2012-10-22 Thread Wietse Venema
Quanah Gibson-Mount:
> --On Monday, October 22, 2012 7:39 PM -0400 Wietse Venema 
>  wrote:
> 
> > There is, however, no milter_default_action ON THE SMTP SERVER SIDE
> > that accepts mail and keeps it queued until the milter comes back.
> > That's what you objected to, and that's what will never exist.
> 
> All I want is to be able to send an email, have it processed and signed by 
> OpenDKIM, and then handed off to Amavis.
> 
> It seems to me if this can work without Amavis in the picture, it should be 
> possible to do it with Amavis in the picture too.
> 
> I understand the milter has to be fronted as a filter.  I understand I need 
> the ability to route mail differently through amavis depending on whether 
> or not it is originating or foreign email.  What I'm missing is how to get 
> all this to play together the way I want it to.
> 
> I.e., it is fine with me if "milter" is not how the SMTP server "sees" 
> things, just as it doesn't see it that way using the content filter.
> 
> So, is setting it up this way truly impossible as well, or is there some 
> way to stack filters (not milters), which was my original question.

Use a before-queue filter for mail from outside.

Internet -> smtpd -> Amavis ...

Use a Postfix queue BEFORE and AFTER the signing Milter for mail
from inside.

... -> queue -> smtp -> smtpd -> cleanup -> queue -> smtp -> Amavis ...
||
signing
milter 

The part with "smtp -> smtpd" is a "null filter" where the two
programs talk directly to each other.

Instead of the above you could simply use Amavis's DKIM support to
sign the messages.

No doubt there will be some other objection, and never a thankyou.

Wietse


Re: Any best practices for stacking filters?

2012-10-22 Thread Quanah Gibson-Mount
--On Monday, October 22, 2012 8:32 PM -0400 Wietse Venema 
 wrote:




No doubt there will be some other objection, and never a thankyou.


Actually, I greatly appreciate your time and help with this.  So thank you, 
very much for your patience as well.


As for using Amavis to sign via DKIM, that is waiting on Amavisd to be 
scalable, a feature request I've had open with the Amavis author for 
several years, and which he is working on.  If that gets implemented then 
yes, I can switch to Amavis entirely, and my life will be much simpler.


--Quanah

--

Quanah Gibson-Mount
Sr. Member of Technical Staff
Zimbra, Inc
A Division of VMware, Inc.

Zimbra ::  the leader in open source messaging and collaboration


ot: iPhone smtp setup

2012-10-22 Thread lists
I have Postfix with smtp-auth, port 587, all works good

I'm having problems setting an iPhone with smtp-auth sending, hoping some
iPhone experts can point me in correct direction

on this iPhone, under SMTP, it has 'primary' SMTP server, correct host,
port 587, SSL;
under 'additional' there are ISP SMTPs (ADSL, cellular) servers, but, all
entries are disabled, only 'primary' is enabled

Emails are retrieved OK {same host as SMTP, IMAP, SSL)

When i tried sending, sending failed, got this error on iPhone:
'copy placed in outbox,sender rejected by server'

There is no apparent log entry at the SMTP server from this attempt;

Later, after iPhone device returned 'home' the outbox email got delivered
over WiFi/ISP's SMTP

So, it seems to me, there is another SMTP entry, of ISP, that takes
precedence??

again, under SMTP, only primary server is enabled (the one i'd like to
use), other SMTP servers are disabled, but, email was delivered via ADSL
ISP's smtp server to my Postfix server

Perplexed,
Voytek



Re: postfix SMTP AUTH

2012-10-22 Thread William Holt
i guessed it was a realm issue so I changed smtpd_sasl_local_domain =
$myhostname to smtpd_sasl_local_domain =  $mydomain

and added a u...@my.org
i believe auxprop is using sasldb (which I did change in smtpd.conf
from sasldb2 to sasldb) handind it "user" + "realm") correct?

and now I have thus new error:
535 5.7.8 Error: authentication failed: another step is needed in authentication

I commented out broken_clients



On Mon, Oct 22, 2012 at 6:33 PM, Patrick Ben Koetter  wrote:
> See below ...
>
> * William Holt :
>> Hi Rob, thanks. I use the reserved adresses because I'm testing the
>> box via local net (my laptop), I have everything setup straight
>> through GoDaddy to my router I just forward the ports when I'm ready.
>>
>> I'll check out the smtpd_sasl_local_domain = $myhostname problem. By
>> the way, do you know of any docs which list and explain the sasl and
>> tls options?
>>
>> this is the result of saslfinger...I'm looking at it now but I
>> forwarded it to you...
>>
>> 
>> postfix start
>> postfix/postfix-script: starting the Postfix mail system
>> [root@messenger saslfinger-1.0.3]# saslfinger -s
>> saslfinger - postfix Cyrus sasl configuration Mon Oct 22 17:45:14 EDT 2012
>> version: 1.0.2
>> mode: server-side SMTP AUTH
>>
>> -- basics --
>> Postfix: 2.9.4
>> System: Arch Linux \r (\l)
>>
>> -- smtpd is linked to --
>>   libsasl2.so.2 => /usr/lib/libsasl2.so.2 (0xb7712000)
>>
>> -- active SMTP AUTH and TLS parameters for smtpd --
>> broken_sasl_auth_clients = yes
>> smtpd_sasl_auth_enable = yes
>> smtpd_sasl_local_domain = $myhostname
>> smtpd_sasl_security_options = noanonymous
>> smtpd_sasl_tls_security_options = $smtpd_sasl_security_options
>> smtpd_sasl_type = cyrus
>> smtpd_tls_CAfile = /etc/ssl/private/CA-Messenger-key.pem
>> smtpd_tls_cert_file = /etc/postfix/smtpd.crt
>> smtpd_tls_key_file = /etc/postfix/smtpdpub.key
>> smtpd_tls_security_level = may
>>
>>
>> -- listing of /usr/lib/sasl2 --
>> total 604
>> drwxr-xr-x  2 root root  4096 Oct 19 14:21 .
>> drwxr-xr-x 52 root root 20480 Oct 19 14:14 ..
>> -rwxr-xr-x  1 root root 17956 Jan  9  2012 libanonymous.so
>> -rwxr-xr-x  1 root root 17956 Jan  9  2012 libanonymous.so.2
>> -rwxr-xr-x  1 root root 17956 Jan  9  2012 libanonymous.so.2.0.23
>> -rwxr-xr-x  1 root root 17956 Jan  9  2012 libcrammd5.so
>> -rwxr-xr-x  1 root root 17956 Jan  9  2012 libcrammd5.so.2
>> -rwxr-xr-x  1 root root 17956 Jan  9  2012 libcrammd5.so.2.0.23
>> -rwxr-xr-x  1 root root 51012 Jan  9  2012 libdigestmd5.so
>> -rwxr-xr-x  1 root root 51012 Jan  9  2012 libdigestmd5.so.2
>> -rwxr-xr-x  1 root root 51012 Jan  9  2012 libdigestmd5.so.2.0.23
>> -rwxr-xr-x  1 root root 17956 Jan  9  2012 liblogin.so
>> -rwxr-xr-x  1 root root 17956 Jan  9  2012 liblogin.so.2
>> -rwxr-xr-x  1 root root 17956 Jan  9  2012 liblogin.so.2.0.23
>> -rwxr-xr-x  1 root root 34436 Jan  9  2012 libntlm.so
>> -rwxr-xr-x  1 root root 34436 Jan  9  2012 libntlm.so.2
>> -rwxr-xr-x  1 root root 34436 Jan  9  2012 libntlm.so.2.0.23
>> -rwxr-xr-x  1 root root 17956 Jan  9  2012 libplain.so
>> -rwxr-xr-x  1 root root 17956 Jan  9  2012 libplain.so.2
>> -rwxr-xr-x  1 root root 17956 Jan  9  2012 libplain.so.2.0.23
>> -rwxr-xr-x  1 root root 21940 Jan  9  2012 libsasldb.so
>> -rwxr-xr-x  1 root root 21940 Jan  9  2012 libsasldb.so.2
>> -rwxr-xr-x  1 root root 21940 Jan  9  2012 libsasldb.so.2.0.23
>> -rw-r--r--  1 root root   160 Oct 21 12:42 smtpd.conf
>>
>>
>>
>>
>> -- content of /usr/lib/sasl2/smtpd.conf --
>> ##sasl authentication methods###
>> pwcheck_method: auxprop
>> #saslauthd_path: /var/run/saslauthd/mux
>> mech_list: plain login
>> auxprop_plugin: sasldb2
>> log_level: 7
>
> Remove '2' at the end of "auxprop_plugin:" and write this:
>
> pwcheck_method: auxprop
> mech_list: plain login
> auxprop_plugin: sasldb
> log_level: 7
>
> Make sure you have no trailing garbage at the end of the lines!
>
>
>> -- active services in /etc/postfix/master.cf --
>> # service type  private unpriv  chroot  wakeup  maxproc command + args
>> #   (yes)   (yes)   (yes)   (never) (100)
>> smtp  inet  n   -   n   -   -   smtpd -v
>
> ...
>
>> -- mechanisms on localhost --
>> 250-AUTH PLAIN LOGIN
>> 250-AUTH=PLAIN LOGIN
>>
>> -- end of saslfinger output --
>
> So far, so good.
>
> What do you get if you run 'sasldblistusers2'?
> Do the accounts have a domainpart you use when you create the authentication
> string? If not, use an account as given from sasldblistusers2 output and test
> with that.
>
> p@rick
>
>
> --
> [*] sys4 AG
>
> http://sys4.de, +49 (89) 30 90 46 64
> Franziskanerstraße 15, 81669 München
>
> Sitz der Gesellschaft: München, Amtsgericht München: HRB 199263
> Vorstand: Patrick Ben Koetter, Axel von der Ohe, Marc Schiffbauer
> Aufsichtsratsvorsitzender: Joerg Heidrich
>


Re: ESMTP: keys and passwords

2012-10-22 Thread Viktor Dukhovni
On Mon, Oct 22, 2012 at 03:45:22PM -0400, thorso...@lavabit.com wrote:

> I'm trying to configure ESMTP using this guide [1].
> 
> $ touch smtpd.key
> $ chmod 600 smtpd.key
> $ openssl genrsa 4096 > smtpd.key

This will generate a 4096 bit key, though you almost certainly
should not use a key this long, especially with SMTP. Grudgingly
deploy 2048-bit keys per the latest NIST guidelines if you must.
Otherwise, your security is just as good with 1024-bit keys, and
1280-bits is actually a good enough step-up if you want a bit of
a safety margin without network bloat and prohibitive performance
degradation.

> $ openssl req -new -key smtpd.key -x509 -days 730 -out smtpd.crt

This will use that same key to generate a self-signed certificate.

> $ openssl req -new -x509 -extensions v3_ca -keyout cakey.pem \
> -out cacert.pem -days 730

You did not specify a key to use for this operation. This writes
a new key to a default file (often privkey.pem) with insecure
permissions (0644) (even password protected keys should not
be world readable).

So use the "-key filename" option for a key you created, and don't
go for absurdly long keys that's just silly.

If your use-case is purely internal, you can use a 256-bit ECDSA
key if 1024-bit RSA is not good enough for you.

-- 
Viktor.