Re: XCLIENT + SASL + TLS, possible ?

2015-05-24 Thread furio ercolessi
On Mon, May 25, 2015 at 12:21:18AM +, Viktor Dukhovni wrote: > On Mon, May 25, 2015 at 01:28:09AM +0200, furio ercolessi wrote: > > > Now, I would like to add the XCLIENT facility to do some > > antispam testing on B, using the original IPs that > > connected to A. So I put A's IP address in

Re: chacha20 cipher_algbits is 0

2015-05-24 Thread Viktor Dukhovni
On Sun, May 24, 2015 at 06:16:42PM +0200, Tim Kuijsten wrote: > Since I'm running postfix with LibreSSL, some clients encrypt the connection > using ECDHE-RSA-CHACHA20-POLY1305. Now I'm used to seeing headers like > "using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)" . But > the

Re: Logging local port used for connection

2015-05-24 Thread Viktor Dukhovni
On Sun, May 24, 2015 at 09:22:44PM +0200, Yannik Sembritzki wrote: > The default of syslog_name is > ${multi_instance_name:postfix}${multi_instance_name?$multi_instance_name} > (atleast > on ubuntu). > > Is it possible to somehow use something like "-o > syslog_name=${syslog_name}-submission" to

Re: XCLIENT + SASL + TLS, possible ?

2015-05-24 Thread Viktor Dukhovni
On Mon, May 25, 2015 at 01:28:09AM +0200, furio ercolessi wrote: > Now, I would like to add the XCLIENT facility to do some > antispam testing on B, using the original IPs that > connected to A. So I put A's IP address in > smtpd_authorized_xclient_hosts in the B's config, > and verified that B

Re: Security & Compatibility

2015-05-24 Thread Viktor Dukhovni
On Sun, May 24, 2015 at 08:00:30PM +0200, DTNX Postmaster wrote: > Assuming you are talking about the MSA (submission) and not MTA to MTA > traffic, you can cover the vast majority of the scenarios with the > following cipher selection string; > > EECDH+AES128:EECDH+AES256:EDH+AES128+SHA:RSA+AE

XCLIENT + SASL + TLS, possible ?

2015-05-24 Thread furio ercolessi
Dear group, I have a system A forwarding a mail flow - that it receives being the MX for some domains - to a system B using SASL and TLS on port 587. Both systems are running Postfix 2.9.6 (coming packaged with Debian Wheezy). Postscreen is not used. Everything works flawlessly. Now, I would l

Re: Logging local port used for connection

2015-05-24 Thread Yannik Sembritzki
Hi Noel, > If you have postfix listening on several ports and want to know > which port the client connected to, you can set a different syslog > name to differentiate them in the logs. For example, it's common to > set ' -o syslog_name=postfix/submission' on the port 587 submission > listener. I

Re: Security & Compatibility

2015-05-24 Thread DTNX Postmaster
On 24 May 2015, at 18:09, CSS wrote: >>> I thought I saw that listed on this forum earlier this year. >> >> Don't believe all the nonsense posted on the Internet. > > Related to the previous paragraph, I know that when I fiddle with > SSL settings on a web server, I can easily dig up informatio

chacha20 cipher_algbits is 0

2015-05-24 Thread Tim Kuijsten
Since I'm running postfix with LibreSSL, some clients encrypt the connection using ECDHE-RSA-CHACHA20-POLY1305. Now I'm used to seeing headers like "using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)" . But these ChaCha20 headers look like "using TLSv1.2 with cipher ECDHE-RSA-

Re: Security & Compatibility

2015-05-24 Thread CSS
On May 24, 2015, at 9:28 AM, Viktor Dukhovni wrote: > On Sun, May 24, 2015 at 06:38:50AM -0400, Postfix User wrote: > >>> smtpd_tls_protocols = !SSLv2, !SSLv3 >>> smtp_tls_protocols = !SSLv2, !SSLv3 >> >> Wouldn't the following be more secure: >> >> smtpd_tls_protocols=!SSLv2, !SSLv3,

Re: Security & Compatibility

2015-05-24 Thread Viktor Dukhovni
On Sat, May 23, 2015 at 08:01:15AM -0700, Grant wrote: > Currently I have the following in main.cf: > > smtp_tls_exclude_ciphers = aNULL > smtpd_tls_exclude_ciphers = aNULL This is unnecessary. > According to weakdh.org/sysadmin.html, I should have this: Some clueless people post cargo-cult no

Re: Security & Compatibility

2015-05-24 Thread Viktor Dukhovni
On Sun, May 24, 2015 at 06:38:50AM -0400, Postfix User wrote: > > smtpd_tls_protocols = !SSLv2, !SSLv3 > > smtp_tls_protocols = !SSLv2, !SSLv3 > > Wouldn't the following be more secure: > > smtpd_tls_protocols=!SSLv2, !SSLv3, !TLSv1, !TLSv1.1 > smtpd_tls_protocols=!SSLv2, !SSLv3, !TLSv1,

Re: Security & Compatibility

2015-05-24 Thread Noel Jones
On 5/24/2015 5:38 AM, Postfix User wrote: > On Sat, 23 May 2015 12:13:33 -0500, Noel Jones stated: > >> # Avoid obsolete protocol versions >> # >> smtpd_tls_protocols = !SSLv2, !SSLv3 >> smtp_tls_protocols = !SSLv2, !SSLv3 > > Wouldn't the following be more secure: > > smtpd_

RE: problem with spam

2015-05-24 Thread Marius Gologan
According to you SPF, you are allowing any host (A record in the DNS) to send messages. I think you should limit your Domain to your genuine email servers only, and not allow any server in your farm to send messages while clients (other domains) include your SPF. However, I'm a bit confused why ser

Re: problem with spam

2015-05-24 Thread Christos Chatzaras
We have some customers that use their gmail account for SMTP, but on port 587 and not port 25. So I don't think it will cause any problem. If it cause any problem I can enable smtp to port 25 for specific customers.

Re: problem with spam

2015-05-24 Thread Yannik Sembritzki
just out of curiosity: wouldn't this also block legitimate users who use a third party mailserver on port 25? Am 24. Mai 2015 13:23:01 MESZ, schrieb Christos Chatzaras : >Thank you everyone for the replies. I think I found the problem. The >spambot (uploaded by hacked websites) does direct conne

Re: problem with spam

2015-05-24 Thread Christos Chatzaras
Thank you everyone for the replies. I think I found the problem. The spambot (uploaded by hacked websites) does direct connections to port 25 to other mail providers. That's why I don't see any logs for outgoing e-mails but I get backscatter from hotmail and other providers. I will try to use th

Re: problem with spam

2015-05-24 Thread Michael
On 24.05.2015 13:10, Christos Chatzaras wrote: > What I try to find out is how spam is sent out if only users that > authenticate can send e-mail and when no user e-mail accounts credentials are > hacked. > Instead of searching for mails sent to the address sir...@hotmail.com, I would rather se

Re: problem with spam

2015-05-24 Thread Sebastian Nielsen
Are you entirely sure that no user credentials are hacked? Note that a dictionary-attacked or bruteforced password is undetectable, and could have happened months ago. Eg, a bot could have cracked the password, saved it into a database, and then the owner of that bot sold the accounts to a spam

Re: problem with spam

2015-05-24 Thread Christos Chatzaras
What I try to find out is how spam is sent out if only users that authenticate can send e-mail and when no user e-mail accounts credentials are hacked.

Re: problem with spam

2015-05-24 Thread Sebastian Nielsen
Aaah, then its a bit worser problem. Are all your customers from a specific country? Then you can add a geoIP block to your firewall so customers can only send email from their country. Else: My suggestion is then that you open up a web interface (I guess you already have a web interface where y

Re: problem with spam

2015-05-24 Thread Michael
On 24.05.2015 13:01, Christos Chatzaras wrote: > I do shared hosting, so users should be able to use any ISP to connect. Filter outgoing mail with a spam scanner before they leave your server. If it is detected as Spam, just reject it with an according message. Michael

Re: problem with spam

2015-05-24 Thread Christos Chatzaras
I do shared hosting, so users should be able to use any ISP to connect. postconf -Mf : smtp inet n - n - - smtpd submission inet n - n - - smtpd -o smtpd_tls_security_level=may -o smtpd_sasl_auth_enable=yes -o smtpd_clie

Re: problem with spam

2015-05-24 Thread Sebastian Nielsen
I suspect any of your authenticated users are compromised, eg that a dictionary-attacking or brute-forcing bot managed to figure out the password for one of your accounts. I had authentication enabled on my server once, and you know, the logs were HUGE with 'bots' trying to authenticate with

Re: Security & Compatibility

2015-05-24 Thread Postfix User
On Sat, 23 May 2015 12:13:33 -0500, Noel Jones stated: > # Avoid obsolete protocol versions > # > smtpd_tls_protocols = !SSLv2, !SSLv3 > smtp_tls_protocols = !SSLv2, !SSLv3 Wouldn't the following be more secure: smtpd_tls_protocols=!SSLv2, !SSLv3, !TLSv1, !TLSv1.1 smtpd_t

problem with spam

2015-05-24 Thread Christos Chatzaras
Μy server with IP 178.63.64.86 is blacklisted at http://cbl.abuseat.org for stealrat spambot. My mail server is configured to send only e-mail from authenticated users. Also local users (from shell) can't send e-mail and also mail() php function is disabled too. I got this e-mail from hotmail (