Re: Exclude non-existing subdomains from checking

2022-04-26 Thread Varadi Gabor
2022. 04. 27. 8:16 keltezéssel, Ludi Cree írta: Hi all, I would like to exclude non-existing subdomains from this rule: "reject_unknown_sender_domain" that I have on the end of my sender-restrictions here: smtpd_sender_restrictions = check_sender_access hash:/var/spool/pos

Exclude non-existing subdomains from checking

2022-04-26 Thread Ludi Cree
Hi all, I would like to exclude non-existing subdomains from this rule: "reject_unknown_sender_domain" that I have on the end of my sender-restrictions here: smtpd_sender_restrictions = check_sender_access hash:/var/spool/postfix/plesk/blacklists, permit_sasl_authenticated, reject_n

Re: password security

2022-04-26 Thread AndrewHardy
Hi, Following this thread has been quite intriguing. Interesting conversation indeed. On a similar topic but probably more focused on addressing root cause (which in mind is just passwords = the devil of security) and the inherent insecurities with using them. I’m very interested in what opti

Re: TLS reporting

2022-04-26 Thread Viktor Dukhovni
> On 26 Apr 2022, at 9:27 pm, Dan Mahoney wrote: > > So, alternate question then -- is there any level of debug logging that > postfix can emit that would let one construct these reports based a log trawl? I think the answer is still no. -- Viktor.

Re: Postfix stable release 3.7.1 and legacy releases 3.6.6, 3.5.16, 3.4.26

2022-04-26 Thread Byung-Hee HWANG
Greg Klanderman writes: >> On April 18, 2022 Wietse Venema wrote: > >> * (problem introduced: Postfix 3.0) With dynamic map loading >> enabled, an attempt to create a map with "postmap regexp:path" >> would result in a bogus error message "Is the postfix-regexp >> package insta

Re: password security

2022-04-26 Thread lists
https://www.reddit.com/r/postfix/Well there is a subreddit for postfix. News to me but I just joined it. I do my best to stay out of these "conversations" on the listserv and reserve my posts for when I am really stumped. But since I am posting put me in the firewall geofence crowd. I have done t

Re: password security

2022-04-26 Thread Shawn Heisey
On 4/26/2022 7:15 PM, Demi Marie Obenour wrote: On 4/26/22 01:35, Antonio Leding wrote: Anyone who thinks that F2B merely “quiets logs” unfortunately has no idea what F2B actually does… Would you mind explaining? TL;DR for many: The fail2ban service watches logfiles for things that indicate

Re: Postfix stable release 3.7.1 and legacy releases 3.6.6, 3.5.16, 3.4.26

2022-04-26 Thread Greg Klanderman
> On April 18, 2022 Wietse Venema wrote: > * (problem introduced: Postfix 3.0) With dynamic map loading > enabled, an attempt to create a map with "postmap regexp:path" > would result in a bogus error message "Is the postfix-regexp > package installed?" instead of "unsupported

Re: TLS reporting

2022-04-26 Thread Dan Mahoney
> On Apr 19, 2022, at 6:08 PM, Viktor Dukhovni > wrote: > > On Tue, Apr 19, 2022 at 05:33:50PM -0700, Dan Mahoney wrote: > >> Does postfix have any support for TLS reporting (RFC8460)? >> >> Technically, one need not be using MTA-STS to benefit from this. We >> get monitoring of this with

Re: password security

2022-04-26 Thread Demi Marie Obenour
On 4/26/22 01:35, Antonio Leding wrote: > Anyone who thinks that F2B merely “quiets logs” unfortunately has no > idea what F2B actually does… Would you mind explaining? -- Sincerely, Demi Marie Obenour (she/her/hers) OpenPGP_0xB288B55FFF9C22C1.asc Description: OpenPGP public key OpenPGP_sign

Re: password security

2022-04-26 Thread Antonio Leding
Good feedback - typically I’d have some comments but since we’ve wandered a fair bit off the reserve here, I will refrain. If anyone wants to continue this at Reddit or somewhere else more appropo, let me know… - - - On 26 Apr 2022, at 11:56, Lefteris Tsintjelis wrote: On 26/4/2022 20:11,

Re: password security

2022-04-26 Thread Lefteris Tsintjelis
On 26/4/2022 20:11, Antonio Leding wrote: “…I'm just saying it's [F2B] not a solution to modern brute-force attack on passwords/accounts….” It’s actually staggering that you say this because of how incredibly inaccurate this statement is… Presume someone goes brute-force against a PostFix se

Re: password security

2022-04-26 Thread Fred Morris
In other words... On Tue, 26 Apr 2022, Antonio Leding wrote: [...] Blocking an IP is the single cheapest most effective thing one can do re: undesired traffic. blocking an address is just a rude form of graylisting, based on observed rudeness. (I do it too. And other things. Security is a

Re: warning: process /usr/local/libexec/postfix/postscreen pid xxxxx killed by signal 11

2022-04-26 Thread Michael Grimm
John Fawcett wrote: > On 20/04/2022 22:20, Michael Grimm wrote: >> this is postfix 3.8-20220325 (FreeBSD port postfix-current) on FreeBSD >> 13.1-STABLE. > > is this problem happening on one of the RC versions of FreeBSD 13.1? > > On the FreeBSD site at the moment, unless I'm misreading it, I

Re: password security

2022-04-26 Thread Antonio Leding
“…I'm just saying it's [F2B] not a solution to modern brute-force attack on passwords/accounts….” It’s actually staggering that you say this because of how incredibly inaccurate this statement is… Presume someone goes brute-force against a PostFix server via v6 only - so tons of addresses at

Re: password security

2022-04-26 Thread Antonio Leding
I’m not really sure if you understand that F2B is just a set of scripts wrapped around iptables (a firewall) - but that’s all it is - the real-work is being done by iptables which can be very effective against DDoS. Plenty of articles, papers, etc. on this very topic so your assertion that F2B

Re: warning: process /usr/local/libexec/postfix/postscreen pid xxxxx killed by signal 11

2022-04-26 Thread John Fawcett
On 20/04/2022 22:20, Michael Grimm wrote: Hi, this is postfix 3.8-20220325 (FreeBSD port postfix-current) on FreeBSD 13.1-STABLE. Michael is this problem happening on one of the RC versions of FreeBSD 13.1? On the FreeBSD site at the moment, unless I'm misreading it, I see the latest 13.1

Re: password security

2022-04-26 Thread Byung-Hee HWANG
Dear Viktor, Viktor Dukhovni writes: > On Tue, Apr 26, 2022 at 11:54:21PM +0900, Byung-Hee HWANG wrote: > >> > There is obviously a point where the server won't be capable of >> > handling the load, always. But what are the odds with "just" a >> > brute-force on passwords/accounts? >> > Our outb

Re: password security

2022-04-26 Thread Viktor Dukhovni
On Tue, Apr 26, 2022 at 11:54:21PM +0900, Byung-Hee HWANG wrote: > > There is obviously a point where the server won't be capable of > > handling the load, always. But what are the odds with "just" a > > brute-force on passwords/accounts? > > Our outbound/internal mail gateway handles the traffic

Re: password security

2022-04-26 Thread Byung-Hee HWANG
> There is obviously a point where the server won't be capable of > handling the load, always. But what are the odds with "just" a > brute-force on passwords/accounts? > Our outbound/internal mail gateway handles the traffic for +2K > every-day users +28K occasional users. Millions emails per month

Re: password security

2022-04-26 Thread patpro
April 26, 2022 3:13 PM, "Bill Cole" wrote: > On 2022-04-26 at 07:09:41 UTC-0400 (Tue, 26 Apr 2022 11:09:41 +) > > is rumored to have said: >> Unless you run postfix on a 10 years old Raspberry, it can handle the > load. > > Not always true. There is obviously a point where the server won

Closed: postscreen signal 11

2022-04-26 Thread Wietse Venema
This is a site-specific problem. I ran "openssl s_client" and "posttls-finger -w" against one of the affected servers, and reliably crashed their postscreen daemon. I've been doing similar tests against my own servers without any problems. Unless proven otherwise, this is no longer a Postfix probl

Re: password security

2022-04-26 Thread Bill Cole
On 2022-04-26 at 07:09:41 UTC-0400 (Tue, 26 Apr 2022 11:09:41 +) is rumored to have said: Brute-forcing passwords/account as nothing to do with DDoS. Purpose of brute(forcing password is gaining access to a service in order to exploit it (steal data, send spam, etc.). Purpose of DDoS is t

Re: HELO regexp file not working to block unwanted sender

2022-04-26 Thread Viktor Dukhovni
On Mon, Apr 25, 2022 at 09:38:50PM -0700, Greg Earle wrote: > >> All of the sending hostnames are of the form > >> > >> www-data@vNNN-NNN-NNN-NNN.*.static.cnode.io > > > > That's not a hostname, it is an email address, and not clear whether > > the > > envelope sender or the "From:" message heade

Re: sender restrictions after milter ?

2022-04-26 Thread Wietse Venema
Use reject_authenticated_sender_login_mismatch (on the port 25 service or post-milter). reject_authenticated_sender_login_mismatch Enforces the reject_sender_login_mismatch restriction for au- thenticated clients only. This feature is available in Postfix

Re: password security

2022-04-26 Thread patpro
April 26, 2022 12:16 PM, "Mauricio Tavares" wrote: > Please explain how certificate authentication is, as you said, > 100% efficient against brute-force attacks. No password = no possible brute-forced password. > If these 100s ou 1000s of IP addresses are sending each thousands of > connectio

Re: HELO regexp file not working to block unwanted sender

2022-04-26 Thread Wietse Venema
Greg Earle: > On 25 Apr 2022, at 16:35, Wietse Venema wrote: > > > Greg Earle: > > > >> [root@isolar postfix]# grep smtpd_helo_ master.cf > > > > What is the output from: > > > > postconf -Px |grep check_helo_access > > > > I suspect that you made a mistake, such as configuring > > the wrong S

Re: password security

2022-04-26 Thread Mauricio Tavares
On Tue, Apr 26, 2022 at 1:54 AM wrote: > > Hello, > > This is off topic anyway but I think you're right. Fail2ban is not for the > lazy, it's for people who have a lot of time to lose in an inefficient > solution. Before cloud era F2B was a really great solution, but as it's been > pointed out,