Re: How to block offering SASL auth to clients based on RBL

2014-06-13 Thread Kai Krakow
Alex JOST schrieb: > Am 11.06.2014 21:17, schrieb Kai Krakow: >>* mbox server: handle pop3 and imap requests from users >>* accepts no external traffic, just from mailout / bulkmail >>* just a receiver for local domains >>* maybe handle dovecot outgoing mails (thou we

Re: How to block offering SASL auth to clients based on RBL

2014-06-12 Thread Alex JOST
Am 11.06.2014 21:17, schrieb Kai Krakow: * mbox server: handle pop3 and imap requests from users * accepts no external traffic, just from mailout / bulkmail * just a receiver for local domains * maybe handle dovecot outgoing mails (thou we didn't support anyway) Any ide

Re: How to block offering SASL auth to clients based on RBL

2014-06-11 Thread Thijssen
On Sat, Jun 7, 2014 at 3:33 PM, Kai Krakow wrote: > How is one supposed to automatically block such hijacked accounts within > postfix? A simple heuristic could be detecting unusual high mail volume for > that account, probably by detecting the always repeating or similar > subjects. What I do a

Re: How to block offering SASL auth to clients based on RBL

2014-06-11 Thread Kai Krakow
Stan Hoeppner schrieb: > On 6/10/2014 3:39 PM, Wietse Venema wrote: >> Kai Krakow: >>> BTW: In this context, what's the best approach to put mailboxes on a >>> separate machine? Let the LDA drop mails into NFS mounts, or let postfix >>> transport the mails via transport_map into a machine which h

Re: How to block offering SASL auth to clients based on RBL

2014-06-10 Thread Stan Hoeppner
On 6/10/2014 3:39 PM, Wietse Venema wrote: > Kai Krakow: >> BTW: In this context, what's the best approach to put mailboxes on a >> separate machine? Let the LDA drop mails into NFS mounts, or let postfix >> transport the mails via transport_map into a machine which hosts the LDA >> (dovecot in

Re: How to block offering SASL auth to clients based on RBL

2014-06-10 Thread Wietse Venema
Kai Krakow: > BTW: In this context, what's the best approach to put mailboxes on a > separate machine? Let the LDA drop mails into NFS mounts, or let postfix > transport the mails via transport_map into a machine which hosts the LDA > (dovecot in our case)? I recommend Dovecot via LMTP, but NFS

Re: How to block offering SASL auth to clients based on RBL

2014-06-10 Thread Charles Marcus
On 6/10/2014 1:24 PM, Kai Krakow wrote: > And those silly autodetection of older MUAs sticks to port 25 unencrypted. So even new customers who redo > their installations on their own silently go back to port 25. So... why on earth are you allowing UNENCRYPTED AUTH at ALL, let alone on port 2

Re: How to block offering SASL auth to clients based on RBL

2014-06-10 Thread Kai Krakow
Peter schrieb: > On 06/08/2014 08:17 PM, Kai Krakow wrote: >> MX and Submission machine are the same postfix instance (and even the >> same worker process on port 25), it won't work. I'm planning to maybe >> change this in the future. But as with migrating all people to not submit >> on port 25 i

Re: How to block offering SASL auth to clients based on RBL

2014-06-09 Thread Peter
On 06/08/2014 08:17 PM, Kai Krakow wrote: > MX and Submission machine are the same postfix instance (and even the same > worker process on port 25), it won't work. I'm planning to maybe change this > in the future. But as with migrating all people to not submit on port 25 it > is a long way to g

Re: How to block offering SASL auth to clients based on RBL

2014-06-09 Thread Peter
On 06/09/2014 04:56 PM, li...@rhsoft.net wrote: >>> well, one could say: block them from submission port and don't allow >>> SASL on 25, but that works only if you are a startup beginning from >>> scratch, >> >> If that's the case then you can put submission on a separate IP address, >> so that you

Re: How to block offering SASL auth to clients based on RBL

2014-06-08 Thread li...@rhsoft.net
Am 09.06.2014 03:45, schrieb Peter: > On 06/08/2014 03:53 AM, li...@rhsoft.net wrote: >> well, one could say: block them from submission port and don't allow >> SASL on 25, but that works only if you are a startup beginning from >> scratch, i condsidered that but it would take weeks and months to

Re: How to block offering SASL auth to clients based on RBL

2014-06-08 Thread Peter
On 06/08/2014 08:53 AM, LuKreme wrote: > >> the stupidity is trying 25 first > > That is still what most servers support or even require. I think the vast number of ESPs will accept submission on port 587. Only supporting port 25 for submission nowadays is a disaster considering the number of IS

Re: How to block offering SASL auth to clients based on RBL

2014-06-08 Thread Peter
On 06/08/2014 03:53 AM, li...@rhsoft.net wrote: > well, one could say: block them from submission port and don't allow > SASL on 25, but that works only if you are a startup beginning from > scratch, i condsidered that but it would take weeks and months to > explain all customers that they have to

Re: How to block offering SASL auth to clients based on RBL

2014-06-08 Thread Joe Laffey
On Sun, 8 Jun 2014, li...@rhsoft.net wrote: but why setup fail2ban at all if you have no sshd on standard ports and already a hyperfast "rbldnsd" running which scales over more than one server without touch any configuration frankly you can even use your RBL with web application firewalls http:

Re: How to block offering SASL auth to clients based on RBL

2014-06-08 Thread li...@rhsoft.net
Am 08.06.2014 18:27, schrieb Joe Laffey: > On Sun, 8 Jun 2014, li...@rhsoft.net wrote: >> Am 08.06.2014 17:18, schrieb Joe Laffey: >>> On Sun, 8 Jun 2014, Kai Krakow wrote: >>> Noel Jones schrieb: But I want to (automatically) block the suspicious networks and not first block

Re: How to block offering SASL auth to clients based on RBL

2014-06-08 Thread Joe Laffey
On Sun, 8 Jun 2014, li...@rhsoft.net wrote: Am 08.06.2014 17:18, schrieb Joe Laffey: On Sun, 8 Jun 2014, Kai Krakow wrote: Noel Jones schrieb: But I want to (automatically) block the suspicious networks and not first block all then whitelist the known-good. Not sure I completely underst

Re: How to block offering SASL auth to clients based on RBL

2014-06-08 Thread li...@rhsoft.net
Am 08.06.2014 17:18, schrieb Joe Laffey: > On Sun, 8 Jun 2014, Kai Krakow wrote: > >> Noel Jones schrieb: >> >> But I want to (automatically) block the suspicious networks and not first >> block all then whitelist the known-good. > > Not sure I completely understand the issue, but is this some

Re: How to block offering SASL auth to clients based on RBL

2014-06-08 Thread Joe Laffey
On Sun, 8 Jun 2014, Kai Krakow wrote: Noel Jones schrieb: But I want to (automatically) block the suspicious networks and not first block all then whitelist the known-good. Not sure I completely understand the issue, but is this something where you could use fail2ban to monitor your logs

Re: How to block offering SASL auth to clients based on RBL

2014-06-08 Thread Kai Krakow
Noel Jones schrieb: > On 6/7/2014 8:33 AM, Kai Krakow wrote: >> Wietse Venema schrieb: >> >>> Kai Krakow: Hello list! Is there a way to prevent postfix from offering SASL auth (and that includes denying open relaying) to clients based on DNS RBL lookups? I've discovered

Re: How to block offering SASL auth to clients based on RBL

2014-06-08 Thread Kai Krakow
Wietse Venema schrieb: > Kai Krakow: >> How is one supposed to automatically block such hijacked accounts within >> postfix? A simple heuristic could be detecting unusual high mail volume >> for that account, probably by detecting the always repeating or similar >> subjects. > > Typically, this

Re: How to block offering SASL auth to clients based on RBL

2014-06-08 Thread Kai Krakow
Noel Jones schrieb: > On 6/7/2014 10:53 AM, li...@rhsoft.net wrote: >> >> >> Am 07.06.2014 17:25, schrieb Noel Jones: >>> I wonder why you're just trying to stop SASL from those client... >>> Why not just use reject_rbl_client (and maybe other restrictions) >>> before permit_sasl_authenticated

Re: How to block offering SASL auth to clients based on RBL

2014-06-07 Thread li...@rhsoft.net
Am 07.06.2014 22:53, schrieb LuKreme: >> On 07 Jun 2014, at 10:39 , li...@rhsoft.net wrote: >> >> Am 07.06.2014 18:29, schrieb LuKreme: >>> >>> On 07 Jun 2014, at 09:53 , li...@rhsoft.net wrote: >>> i condsidered that but it would take weeks and months to explain all customers that they

Re: How to block offering SASL auth to clients based on RBL

2014-06-07 Thread LuKreme
> On 07 Jun 2014, at 10:39 , li...@rhsoft.net wrote: > > > > Am 07.06.2014 18:29, schrieb LuKreme: >> >> On 07 Jun 2014, at 09:53 , li...@rhsoft.net wrote: >> >>> i condsidered that but it would take weeks and months to >>> explain all customers that they have to fix their client configs >>>

Re: How to block offering SASL auth to clients based on RBL

2014-06-07 Thread Noel Jones
On 6/7/2014 10:53 AM, li...@rhsoft.net wrote: > > > Am 07.06.2014 17:25, schrieb Noel Jones: >> I wonder why you're just trying to stop SASL from those client... >> Why not just use reject_rbl_client (and maybe other restrictions) >> before permit_sasl_authenticated to reject all mail from them?

Re: How to block offering SASL auth to clients based on RBL

2014-06-07 Thread Robert Schetterer
Am 07.06.2014 09:59, schrieb Kai Krakow: > Hello list! > > Is there a way to prevent postfix from offering SASL auth (and that > includes > denying open relaying) to clients based on DNS RBL lookups? I've discovered > the option smtpd_sasl_exceptions_networks which allows to do that by adding

Re: How to block offering SASL auth to clients based on RBL

2014-06-07 Thread li...@rhsoft.net
Am 07.06.2014 18:29, schrieb LuKreme: > > On 07 Jun 2014, at 09:53 , li...@rhsoft.net wrote: > >> i condsidered that but it would take weeks and months to >> explain all customers that they have to fix their client configs >> and i see even new configured clients using 25 because the idiotic >>

Re: How to block offering SASL auth to clients based on RBL

2014-06-07 Thread LuKreme
On 07 Jun 2014, at 09:53 , li...@rhsoft.net wrote: > i condsidered that but it would take weeks and months to > explain all customers that they have to fix their client configs > and i see even new configured clients using 25 because the idiotic > MUA's still default to 25 and burrie the port set

Re: How to block offering SASL auth to clients based on RBL

2014-06-07 Thread li...@rhsoft.net
Am 07.06.2014 17:25, schrieb Noel Jones: > I wonder why you're just trying to stop SASL from those client... > Why not just use reject_rbl_client (and maybe other restrictions) > before permit_sasl_authenticated to reject all mail from them? If > you're unwilling to accept SASL credentials, why

Re: How to block offering SASL auth to clients based on RBL

2014-06-07 Thread Noel Jones
On 6/7/2014 8:33 AM, Kai Krakow wrote: > Wietse Venema schrieb: > >> Kai Krakow: >>> Hello list! >>> >>> Is there a way to prevent postfix from offering SASL auth (and >>> that includes denying open relaying) to clients based on DNS RBL >>> lookups? I've discovered the option smtpd_sasl_exception

Re: How to block offering SASL auth to clients based on RBL

2014-06-07 Thread Wietse Venema
Kai Krakow: > How is one supposed to automatically block such hijacked accounts within > postfix? A simple heuristic could be detecting unusual high mail volume for > that account, probably by detecting the always repeating or similar > subjects. Typically, this is done with postfwd (a third-pa

Re: How to block offering SASL auth to clients based on RBL

2014-06-07 Thread Kai Krakow
Wietse Venema schrieb: > Kai Krakow: >> Hello list! >> >> Is there a way to prevent postfix from offering SASL auth (and >> that includes denying open relaying) to clients based on DNS RBL >> lookups? I've discovered the option smtpd_sasl_exceptions_networks >> which allows to do that by adding

Re: How to block offering SASL auth to clients based on RBL

2014-06-07 Thread Wietse Venema
Kai Krakow: > Hello list! > > Is there a way to prevent postfix from offering SASL auth (and > that includes denying open relaying) to clients based on DNS RBL > lookups? I've discovered the option smtpd_sasl_exceptions_networks > which allows to do that by adding static subnet entries or adding >