[pfx] Re: SASL options

2024-12-22 Thread Alexander Leidinger via Postfix-users
Am 2024-12-22 01:39, schrieb Peter via Postfix-users: On 22/12/24 02:54, Michael Tokarev via Postfix-users wrote: However, there are other mechanisms being developed, for example OAUTH2, which, in terms of Cyrus SASL, does not work with saslauthd at all, I don't see why it wouldn't. so ne

[pfx] Re: SASL options

2024-12-22 Thread Peter via Postfix-users
On 22/12/24 23:22, Michael Tokarev via Postfix-users wrote: Cyrus SASL is a separate thing in people minds because it is a separate, independent library/subsystem.  You can install a separate package named this way.  But in Dovecot it is an integral part of a larger system, it is not viewed like

[pfx] Re: SASL options

2024-12-22 Thread Michael Tokarev via Postfix-users
22.12.2024 13:13, Tomasz Pala via Postfix-users wrote: Well, Cyrus is also not SASL-only... https://doc.dovecot.org/2.3/admin_manual/sasl/ is what I mean. Cyrus SASL is a separate thing in people minds because it is a separate, independent library/subsystem. You can install a separate packag

[pfx] Re: SASL options

2024-12-22 Thread Tomasz Pala via Postfix-users
On 2024-12-22 07:53, Michael Tokarev via Postfix-users wrote: > > It is not true for you, but not for most others who treat dovecot like > a mailbox storage/access solution (IMAP/POP/etc). Sure it is capable > to provide just the auth part, it's just not what people think about it. Well, Cyrus i

[pfx] Re: SASL options

2024-12-22 Thread Michael Tokarev via Postfix-users
22.12.2024 11:53, Peter via Postfix-users wrote: On 22/12/24 19:53, Michael Tokarev via Postfix-users wrote: However, there are other mechanisms being developed, for example OAUTH2, which, in terms of Cyrus SASL, does not work with saslauthd at all, I don't see why it wouldn't. saslauthd h

[pfx] Re: SASL options

2024-12-22 Thread Tomasz Pala via Postfix-users
On 2024-12-22 01:42, Peter via Postfix-users wrote: >> >> What's worth mentioning is that PLAIN/LOGIN also requires cleartext >> password storage - on the client side. > > This is not entirely true. It is possible for a client to store > passwords in an encrypted db which is decrypted with its o

[pfx] Re: SASL options

2024-12-22 Thread Michael Tokarev via Postfix-users
22.12.2024 11:53, Peter via Postfix-users wrote: [people treat dovecot sasl as part of dovecot] I realize that, but it's fairly easy to implement and easy to configure dovecot to only provide the SASL backend plus it does appear to be the most comprehensive, easiest to implement solution for SA

[pfx] Re: SASL options

2024-12-22 Thread Peter via Postfix-users
On 22/12/24 19:53, Michael Tokarev via Postfix-users wrote: 22.12.2024 03:39, Peter via Postfix-users wrote: On 22/12/24 02:54, Michael Tokarev via Postfix-users wrote: However, there are other mechanisms being developed, for example OAUTH2, which, in terms of Cyrus SASL, does not work with sa

[pfx] Re: SASL options

2024-12-21 Thread Michael Tokarev via Postfix-users
22.12.2024 03:39, Peter via Postfix-users wrote: On 22/12/24 02:54, Michael Tokarev via Postfix-users wrote: However, there are other mechanisms being developed, for example OAUTH2, which, in terms of Cyrus SASL, does not work with saslauthd at all, I don't see why it wouldn't. saslauthd ha

[pfx] Re: SASL options

2024-12-21 Thread Peter via Postfix-users
On 22/12/24 03:19, Tomasz Pala via Postfix-users wrote: What's worth mentioning is that PLAIN/LOGIN also requires cleartext password storage - on the client side. This is not entirely true. It is possible for a client to store passwords in an encrypted db which is decrypted with its own pass

[pfx] Re: SASL options

2024-12-21 Thread Peter via Postfix-users
On 22/12/24 02:54, Michael Tokarev via Postfix-users wrote: However, there are other mechanisms being developed, for example OAUTH2, which, in terms of Cyrus SASL, does not work with saslauthd at all, I don't see why it wouldn't. so needs direct integration within postfix in a form of plugin

[pfx] Re: SASL options

2024-12-21 Thread Michael Tokarev via Postfix-users
21.12.2024 19:51, Wietse Venema via Postfix-users wrote: Michael Tokarev via Postfix-users: I still yet to see the reason for this, besides a statement "chroot is painless for freebsd but for linux is unsupportable", which is nothing but a big old myth, since the two works the same. That is a

[pfx] Re: SASL options

2024-12-21 Thread Wietse Venema via Postfix-users
Michael Tokarev via Postfix-users: > I still yet to see the reason for this, besides a statement "chroot is > painless for freebsd but for linux is unsupportable", which is nothing > but a big old myth, since the two works the same. That is a myth, because we already discussed that glibc needs fil

[pfx] Re: SASL options

2024-12-21 Thread Michael Tokarev via Postfix-users
21.12.2024 18:31, Wietse Venema via Postfix-users wrote: Michael Tokarev via Postfix-users: It *feels* like postfix needs some separation of this sasl stuff into its own process somehow, similar to how proxymap is done, so that eg cyrus sasl code is not linked directly into smtp[d] with all it

[pfx] Re: SASL options

2024-12-21 Thread Wietse Venema via Postfix-users
Michael Tokarev via Postfix-users: > There's nothing in the docs saying if dovecot sasl can work with > non-plaintext mechanisms. In almost all docs and examples I've > found, dovecot side of the config is configured with > "auth_mechanisms = plain login". There are some vague references > to usa

[pfx] Re: SASL options

2024-12-21 Thread Tomasz Pala via Postfix-users
On 2024-12-21 14:54, Michael Tokarev via Postfix-users wrote: > > cleartext password (storage) is required for many SASL mechanisms over > than PLAIN. And none of these mechanisms work with -a pam or with [...] > However, there are other mechanisms being developed, for example OAUTH2, What's wor

[pfx] Re: SASL options

2024-12-21 Thread Michael Tokarev via Postfix-users
21.12.2024 16:16, Viktor Dukhovni via Postfix-users wrote: On Sat, Dec 21, 2024 at 01:51:46PM +0300, Michael Tokarev via Postfix-users wrote: ... As far as I can see, Cyrus SASL can work with plaintext methods using saslauthd (which has very simple username,password => ok|bad protocol), and ca

[pfx] Re: SASL options

2024-12-21 Thread Tomasz Pala via Postfix-users
On 2024-12-21 11:51, Michael Tokarev via Postfix-users wrote: > > We've basically two big kinds of SASL mechanisms: plaintext > (which are login and plain) and non-plaintest (everything else). [...] > There's nothing in the docs saying if dovecot sasl can work with > non-plaintext mechanisms. In

[pfx] Re: SASL options

2024-12-21 Thread Viktor Dukhovni via Postfix-users
On Sat, Dec 21, 2024 at 01:51:46PM +0300, Michael Tokarev via Postfix-users wrote: > Hi! > > I'm trying to get a "big picture" about how postfix works with > various SASL options. It looks like there's a big overview > missing in the docs somehow. > > We've basically two big kinds of SASL mecha

[pfx] Re: SASL authentication - first try local and then AD in postfix

2024-07-08 Thread Viktor Dukhovni via Postfix-users
[ No need to "Cc:" me in replies, just reply to the list. It is unfortunate that mailman moves my address from "From:" to "Reply-To:", that's very much not my intent. ] On Tue, Jul 09, 2024 at 11:50:40AM +1000, hkhk_exact10 wrote: > > with much additional configuration needed for pam_ldap. >

[pfx] Re: SASL authentication - first try local and then AD in postfix

2024-07-08 Thread hkhk_exact10 via Postfix-users
> > with much additional configuration needed for pam_ldap. > Can you please provide some details about the configuration for this part. As mentioned, I have configure ldap via saslauthd by below configurations ]# egrep -v "^#|^$" /etc/sysconfig/saslauthd SOCKETDIR=/run/saslauthd MECH=ldap FLAGS=

[pfx] Re: SASL authentication - first try local and then AD in postfix

2024-07-08 Thread hkhk_exact10 via Postfix-users
Hi Patrick, Cyrus SASL is able to use saslauthd in order to authenticate users in > /etc/passwd. I don’t know what you did with Cyrus SASL to configure AD > authentication, but assuming it would be a method called foobar you would > configure Cyrus SASL to use the following list of password verifi

[pfx] Re: SASL authentication - first try local and then AD in postfix

2024-07-08 Thread Viktor Dukhovni via Postfix-users
On Mon, Jul 08, 2024 at 08:39:54AM +0200, Patrick Ben Koetter via Postfix-users wrote: > > I want to setup SMTP authentication in such a way that the user > > should first be looked locally (/etc/passwd) and then in AD. Is it > > possible to do so? I was able to configure AD auth via sasl (cyrus)

[pfx] Re: SASL authentication - first try local and then AD in postfix

2024-07-07 Thread Patrick Ben Koetter via Postfix-users
Sandeep, > Am 08.07.2024 um 07:37 schrieb hkhk_exact10 via Postfix-users > : > > Hi All, > > I want to setup SMTP authentication in such a way that the user should first > be looked locally (/etc/passwd) and then in AD. Is it possible to do so? I > was able to configure AD auth via sasl (cyru

[pfx] Re: SASL login username in log

2024-05-28 Thread Northwind via Postfix-users
Wietse Venema via Postfix-users: Fixed with Postfix 3.8.3, 3.7.8, 3.6.12, 3.5.22: that's all right. thank you Wietse. ___ Postfix-users mailing list -- postfix-users@postfix.org To unsubscribe send an email to postfix-users-le...@postfix.org

[pfx] Re: SASL login username in log

2024-05-28 Thread Wietse Venema via Postfix-users
Northwind via Postfix-users: > Hello, > > Is it possible to set mail.log for recording sasl login usernames? > > May 29 06:52:45 mx postfix/smtps/smtpd[3022855]: warning: > unknown[138.185.193.64]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 > May 29 06:52:57 mx postfix/smtpd[3023133]: warnin

[pfx] Re: SASL reject force disconnect

2024-05-28 Thread John Hill via Postfix-users
On 5/28/24 5:39 AM, Christophe Kalt via Postfix-users wrote: smtpd_delay_reject to no I had it at yes. Changed it. --john ___ Postfix-users mailing list -- postfix-users@postfix.org To unsubscribe send an email to postfix-users-le...@postfix.org

[pfx] Re: SASL reject force disconnect

2024-05-28 Thread John Fawcett via Postfix-users
On 28/05/2024 11:39, Christophe Kalt via Postfix-users wrote: On Sun, May 26, 2024 at 5:57 AM John Fawcett via Postfix-users wrote: For submission I only use xbl (return code 127.0.0.4) excluding other other data contained in zen like pbl that lists isp dynamic ip ranges from whic

[pfx] Re: SASL reject force disconnect

2024-05-28 Thread Matus UHLAR - fantomas via Postfix-users
On Sun, May 26, 2024 at 5:57 AM John Fawcett via Postfix-users < postfix-users@postfix.org> wrote: For submission I only use xbl (return code 127.0.0.4) excluding other other data contained in zen like pbl that lists isp dynamic ip ranges from which you would normally expect to get connections t

[pfx] Re: SASL reject force disconnect

2024-05-28 Thread Christophe Kalt via Postfix-users
On Sun, May 26, 2024 at 5:57 AM John Fawcett via Postfix-users < postfix-users@postfix.org> wrote: > For submission I only use xbl (return code 127.0.0.4) excluding other > other data contained in zen like pbl that lists isp dynamic ip ranges from > which you would normally expect to get connectio

[pfx] Re: SASL reject force disconnect

2024-05-28 Thread Matus UHLAR - fantomas via Postfix-users
postscreen_dnsbl_sites = zen.spamhaus.org=127.0.0.[2..11] John Hill via Postfix-users: Is this the same thing? On 25.05.24 15:54, Wietse Venema via Postfix-users wrote: See https://www.spamhaus.org/faqs/dnsbl-usage/#200 for a table with the purpose of different lookup results. To block xbl

[pfx] Re: SASL reject force disconnect

2024-05-27 Thread John Fawcett via Postfix-users
On 27/05/2024 13:31, John Hill via Postfix-users wrote: On 5/27/24 4:13 AM, Matus UHLAR - fantomas via Postfix-users wrote: > postscreen_dnsbl_sites = zen.spamhaus.org=127.0.0.[2..11] John Hill via Postfix-users: Is this the same thing? On 25.05.24 15:54, Wietse Venema via Postfix-users

[pfx] Re: SASL reject force disconnect

2024-05-27 Thread John Hill via Postfix-users
On 5/27/24 4:13 AM, Matus UHLAR - fantomas via Postfix-users wrote: > postscreen_dnsbl_sites = zen.spamhaus.org=127.0.0.[2..11] John Hill via Postfix-users: Is this the same thing? On 25.05.24 15:54, Wietse Venema via Postfix-users wrote: See https://www.spamhaus.org/faqs/dnsbl-usage/#200

[pfx] Re: SASL reject force disconnect

2024-05-27 Thread Matus UHLAR - fantomas via Postfix-users
> postscreen_dnsbl_sites = zen.spamhaus.org=127.0.0.[2..11] John Hill via Postfix-users: Is this the same thing? On 25.05.24 15:54, Wietse Venema via Postfix-users wrote: See https://www.spamhaus.org/faqs/dnsbl-usage/#200 for a table with the purpose of different lookup results. To block x

[pfx] Re: SASL reject force disconnect

2024-05-26 Thread John Fawcett via Postfix-users
On 25/05/2024 20:50, John Hill via Postfix-users wrote: On 5/25/24 11:22 AM, John Fawcett via Postfix-users wrote: On 24/05/2024 03:03, John Hill via Postfix-users wrote: I learn something every time I read this group, when I can keep up with the conversation! I had auth on ports I did no

[pfx] Re: SASL reject force disconnect

2024-05-25 Thread John Hill via Postfix-users
On 5/25/24 3:54 PM, Wietse Venema via Postfix-users wrote: John Hill via Postfix-users: postscreen_dnsbl_sites = zen.spamhaus.org=127.0.0.[2..11] Is this the same thing? See https://www.spamhaus.org/faqs/dnsbl-usage/#200 for a table with the purpose of different lookup results. To block xbl

[pfx] Re: SASL reject force disconnect

2024-05-25 Thread Wietse Venema via Postfix-users
John Hill via Postfix-users: > > postscreen_dnsbl_sites = zen.spamhaus.org=127.0.0.[2..11] > Is this the same thing? See https://www.spamhaus.org/faqs/dnsbl-usage/#200 for a table with the purpose of different lookup results. To block xbl listed clients with postscreen, one would configure xbl.sp

[pfx] Re: SASL reject force disconnect

2024-05-25 Thread John Hill via Postfix-users
On 5/25/24 11:22 AM, John Fawcett via Postfix-users wrote: On 24/05/2024 03:03, John Hill via Postfix-users wrote: I learn something every time I read this group, when I can keep up with the conversation! I had auth on ports I did not need. I use auth on submission port 587, for users acces

[pfx] Re: SASL reject force disconnect

2024-05-25 Thread John Fawcett via Postfix-users
On 24/05/2024 03:03, John Hill via Postfix-users wrote: I learn something every time I read this group, when I can keep up with the conversation! I had auth on ports I did not need. I use auth on submission port 587, for users access. I do get a boat load of failed login attempts on 587. F

[pfx] Re: SASL reject force disconnect

2024-05-24 Thread John Hill via Postfix-users
On 5/24/24 9:33 AM, Matus UHLAR - fantomas via Postfix-users wrote: On 24.05.24 07:36, John Hill via Postfix-users wrote: What command do you use to reset the connection? no command, just rule in OUTPUT chain:  1710  649K REJECT 6    --  *  * 0.0.0.0/0    0.0.0.0/0  

[pfx] Re: SASL reject force disconnect

2024-05-24 Thread Matus UHLAR - fantomas via Postfix-users
On 24.05.24 07:36, John Hill via Postfix-users wrote: What command do you use to reset the connection? no command, just rule in OUTPUT chain: 1710 649K REJECT 6-- * * 0.0.0.0/00.0.0.0/0 tcp spt:25 match-set block-smtp dst reject-with icmp-port-unre

[pfx] Re: SASL reject force disconnect

2024-05-24 Thread John Hill via Postfix-users
What command do you use to reset the connection? On 5/24/24 6:18 AM, Matus UHLAR - fantomas via Postfix-users wrote: On 23.05.24 21:03, John Hill via Postfix-users wrote: I use Fail2Ban to block the failed IP. The script writes it into the nftables table immediately. I think this keeps Postfi

[pfx] Re: SASL reject force disconnect

2024-05-24 Thread Matus UHLAR - fantomas via Postfix-users
On 23.05.24 21:03, John Hill via Postfix-users wrote: I use Fail2Ban to block the failed IP. The script writes it into the nftables table immediately. I think this keeps Postfix waiting and times out, not a big deal. Is there a cli that my bash script could force disconnect the ip from Postfi

[pfx] Re: SASL reject force disconnect

2024-05-23 Thread John Hill via Postfix-users
Will do it. Tonight. Thanks On May 23, 2024 9:11 PM, Wietse Venema via Postfix-users wrote: John Hill via Postfix-users: > I learn something every time I read this group, when I can keep up with > the conversation! > > I had auth on ports I did not need. I use auth on submission port 5

[pfx] Re: SASL reject force disconnect

2024-05-23 Thread Wietse Venema via Postfix-users
John Hill via Postfix-users: > I learn something every time I read this group, when I can keep up with > the conversation! > > I had auth on ports I did not need. I use auth on submission port 587, > for users access. > > I do get a boat load of failed login attempts on 587. Funny how a China,

[pfx] Re: SASL username logging for failed authentications

2023-10-08 Thread Wietse Venema via Postfix-users
Wietse Venema via Postfix-users: > Viktor Dukhovni via Postfix-users: > > On Fri, Oct 06, 2023 at 06:50:38PM -0400, Wietse Venema via Postfix-users > > wrote: > > > > > +} else { > > > + server->username = mystrdup(serverout); > > > + printable(server->username, '?'); > > > > I might note th

[pfx] Re: SASL username logging for failed authentications

2023-10-08 Thread Jozsef Kadlecsik via Postfix-users
On Fri, 6 Oct 2023, Wietse Venema via Postfix-users wrote: > Jozsef Kadlecsik via Postfix-users: > > +sasl_username = xsasl_server_get_username(state->sasl_server); > > +if (sasl_username != 0) { > > + state->sasl_username = mystrdup(sasl_username); > > + printable(stat

[pfx] Re: SASL username logging for failed authentications

2023-10-08 Thread Jozsef Kadlecsik via Postfix-users
Hello, On Fri, 6 Oct 2023, Wietse Venema via Postfix-users wrote: > Has this been tested: > > - With Cyrus SASL? > > - With Dovecot auth? It was tested with Cyrus SASL only. > - With malformed AUTH commands? No, I tested valid AUTH commands with successful and unsuccessful authentications

[pfx] Re: SASL username logging for failed authentications

2023-10-07 Thread Wietse Venema via Postfix-users
Viktor Dukhovni via Postfix-users: > On Fri, Oct 06, 2023 at 06:50:38PM -0400, Wietse Venema via Postfix-users > wrote: > > > +} else { > > + server->username = mystrdup(serverout); > > + printable(server->username, '?'); > > I might note that when UTF8 is enabled, this does correctly le

[pfx] Re: SASL username logging for failed authentications

2023-10-06 Thread Viktor Dukhovni via Postfix-users
On Fri, Oct 06, 2023 at 06:50:38PM -0400, Wietse Venema via Postfix-users wrote: > +} else { > + server->username = mystrdup(serverout); > + printable(server->username, '?'); I might note that when UTF8 is enabled, this does correctly leaves valid UTF8 characters undisturbed. However

[pfx] Re: SASL username logging for failed authentications

2023-10-06 Thread Wietse Venema via Postfix-users
Wietse Venema via Postfix-users: > I think I can take it from here. Wietse 20231006 Clenaup: attempt to log the SASL username after authentication failure. This appends ", sasl_username=xxx" to SASL authentication failure logging. Based on code by Jozsef Kadlecsik

[pfx] Re: SASL username logging for failed authentications

2023-10-06 Thread Wietse Venema via Postfix-users
Jozsef Kadlecsik via Postfix-users: > +sasl_username = xsasl_server_get_username(state->sasl_server); > +if (sasl_username != 0) { > + state->sasl_username = mystrdup(sasl_username); > + printable(state->sasl_username, '?'); 1) There is no corresponding myfree() call. 2) There is

[pfx] Re: SASL username logging for failed authentications

2023-10-06 Thread Wietse Venema via Postfix-users
Jozsef Kadlecsik: > If I increase the log_level to 4 in the sasl config for smtpd and add -v > to smtpd in master.cf, then the username is reported in the log: Of course the login name is sent via the AUTH command, and it will show up in the raw protocol logging. Your example is for the LOGIN mec

[pfx] Re: SASL username logging for failed authentications

2023-10-06 Thread Jozsef Kadlecsik via Postfix-users
On Fri, 6 Oct 2023, Jozsef Kadlecsik via Postfix-users wrote: > However it's a debug mode, cannot be used in production. It is clear that > SASL protocol is not implemented and thus the messages have no meaning, > just reported. However, it seems the data is there and available. > > Would you c

[pfx] Re: SASL username logging for failed authentications

2023-10-06 Thread Jozsef Kadlecsik via Postfix-users
Hi Wietse, On Fri, 6 Oct 2023, Wietse Venema via Postfix-users wrote: > Jozsef Kadlecsik via Postfix-users: > > Hi, > > > > Is there a way to get the SASL username logged for the failed > > authentications together with the client IP data? Postfix can log half of > > the information the connec

[pfx] Re: SASL username logging for failed authentications

2023-10-06 Thread Wietse Venema via Postfix-users
Jozsef Kadlecsik via Postfix-users: > Hi, > > Is there a way to get the SASL username logged for the failed > authentications together with the client IP data? Postfix can log half of > the information the connecting client IP address, while Cyrus saslauthd > the second one the username. Howeve

[pfx] Re: SASL authentication with colon „:“ in username not possible

2023-08-20 Thread Wietse Venema via Postfix-users
Wietse Venema via Postfix-users: > If we change the syntax of smtp_sasl_password_maps entries, then > that will require a new configuration parameter to indicate how the > lookup result should be parsed. > > My preference would be: > > smtp_sasl_password_map_result_delimiter I implemented a sim

[pfx] Re: SASL authentication with colon „:“ in username not possible

2023-08-19 Thread zonie via Postfix-users
Hi, > Am 13.08.2023 um 02:06 schrieb Wietse Venema via Postfix-users > : > … > My preference would be: > > smtp_sasl_password_map_result_delimiter >printable character or C escape (like \t for TAB) >default = : (for backwards compatibility) >must not be empty >must not be multi

[pfx] Re: SASL authentication with colon „:“ in username not possible

2023-08-14 Thread Wietse Venema via Postfix-users
Wietse Venema via Postfix-users: > There is a tool that given a JSONschema will generate a parser in > C that populates a C structure, at github.com/badicsalex/json_schema_to_c > (~300 LOC). This depends on github.com/zserge/jsmn (~500 LOC). The > generated parser is much bigger, over 35 kLOC for t

[pfx] Re: SASL authentication with colon „:“ in username not possible

2023-08-13 Thread Wietse Venema via Postfix-users
Viktor Dukhovni via Postfix-users: > On Sun, Aug 13, 2023 at 01:47:05PM -0400, Wietse Venema via Postfix-users > wrote: > > > > Any votes for JSON? :-) > > > > > > { "account": "user:foo", "base64password": "" } > > > > Before other people start to chime in, let me set some expe

[pfx] Re: SASL authentication with colon „:“ in username not possible

2023-08-13 Thread Viktor Dukhovni via Postfix-users
On Sun, Aug 13, 2023 at 01:47:05PM -0400, Wietse Venema via Postfix-users wrote: > > Any votes for JSON? :-) > > > > { "account": "user:foo", "base64password": "" } > > Before other people start to chime in, let me set some expectations. My suggestion of JSON is largely in jest.

[pfx] Re: SASL authentication with colon „:“ in username not possible

2023-08-13 Thread Wietse Venema via Postfix-users
Viktor Dukhovni via Postfix-users: > On Sat, Aug 12, 2023 at 08:05:52PM -0400, Wietse Venema via Postfix-users > wrote: > > > My preference would be: > > > > smtp_sasl_password_map_result_delimiter > > printable character or C escape (like \t for TAB) > > default = : (for backwards comp

[pfx] Re: SASL authentication with colon „:“ in username not possible

2023-08-13 Thread Viktor Dukhovni via Postfix-users
On Sat, Aug 12, 2023 at 08:05:52PM -0400, Wietse Venema via Postfix-users wrote: > My preference would be: > > smtp_sasl_password_map_result_delimiter > printable character or C escape (like \t for TAB) > default = : (for backwards compatibility) > must not be empty > must not be

[pfx] Re: SASL authentication with colon „:“ in username not possible

2023-08-12 Thread Wietse Venema via Postfix-users
zonie via Postfix-users: > > > > Wietse Venema via Postfix-users : > > > > ?zonie via Postfix-users: > >> Hello, > >> > >> currently it's not possible to specify a username containing a colon ?:? > >> inside a ?smtp_sasl_password_map?, as the colon is used to split username > >> and password

[pfx] Re: SASL authentication with colon „:“ in username not possible

2023-08-12 Thread zonie via Postfix-users
> Wietse Venema via Postfix-users : > > zonie via Postfix-users: >> Hello, >> >> currently it's not possible to specify a username containing a colon ?:? >> inside a ?smtp_sasl_password_map?, as the colon is used to split username >> and password from each other. >> >> Is this limitation i

[pfx] Re: SASL authentication with colon „:“ in username not possible

2023-07-19 Thread zonie via Postfix-users
>> Hello, >> >> currently it's not possible to specify a username containing a colon ?:? >> inside a ?smtp_sasl_password_map?, as the colon is used to split username >> and password from each other. >> >> Is this limitation intentionally or was it just overlooked? > > Just like the UNIX login

[pfx] Re: SASL authentication with colon „:“ in username not possible

2023-07-19 Thread Wietse Venema via Postfix-users
zonie via Postfix-users: > Hello, > > currently it's not possible to specify a username containing a colon ?:? > inside a ?smtp_sasl_password_map?, as the colon is used to split username and > password from each other. > > Is this limitation intentionally or was it just overlooked? Just like t

Re: SASL error after login password change

2022-06-04 Thread Benny Pedersen
On 2022-06-04 02:01, Nathan Dehnel wrote: Found it, the old password was in /etc/nullmailer/remotes. +1

Re: SASL error after login password change

2022-06-04 Thread Benny Pedersen
On 2022-06-04 01:01, Nathan Dehnel wrote: The error is triggered by me running echo "test" | mail -s "test" log...@gentooserver.dehnel.info on another computer. I don't recall ever dealing with passwords when SENDING mail to an account. that mail command is done outside of permit_mynetworks on

Re: SASL error after login password change

2022-06-03 Thread Wietse Venema
> On Fri, Jun 3, 2022 at 5:38 PM Wietse Venema wrote: > > > > Nathan Dehnel: > > > Jun 03 17:14:51 gentooserver postfix/submission/smtpd[5]: < > > > unknown[10.0.0.152]: > > > > The Postfix SMTP server receives that password from the remote SMTP > > client. Nathan Dehnel: > The error is trig

Re: SASL error after login password change

2022-06-03 Thread Nathan Dehnel
Found it, the old password was in /etc/nullmailer/remotes. Thanks. On Fri, Jun 3, 2022 at 6:01 PM Nathan Dehnel wrote: > > The error is triggered by me running > echo "test" | mail -s "test" log...@gentooserver.dehnel.info > on another computer. I don't recall ever dealing with passwords when > S

Re: SASL error after login password change

2022-06-03 Thread Nathan Dehnel
The error is triggered by me running echo "test" | mail -s "test" log...@gentooserver.dehnel.info on another computer. I don't recall ever dealing with passwords when SENDING mail to an account. On Fri, Jun 3, 2022 at 5:38 PM Wietse Venema wrote: > > Nathan Dehnel: > > Jun 03 17:14:51 gentooserve

Re: SASL error after login password change

2022-06-03 Thread Wietse Venema
Nathan Dehnel: > Jun 03 17:14:51 gentooserver postfix/submission/smtpd[5]: < > unknown[10.0.0.152]: The Postfix SMTP server receives that password from the remote SMTP client. > So something is passing around the old password, and I need to know > how to change it. That depends on what the

Re: SASL error after login password change

2022-06-03 Thread Nathan Dehnel
I have fixed the opendkim error by mounting /run/opendkim into smtpd's chroot. However the SASL error is still present. I got this in the debug log: Jun 03 17:14:51 gentooserver postfix/submission/smtpd[5]: < unknown[10.0.0.152]: Jun 03 17:14:53 gentooserver postfix/submission/smtpd[5]: x

Re: SASL error after login password change

2022-06-03 Thread Benny Pedersen
On 2022-06-03 01:17, Nathan Dehnel wrote: I restarted it and that did not fix it. Here is my opendkim config: try change unix socket to inet , hope this atleast solve it, but unix socket should work aswell case could be that parent dir does not exists or is owned by another user

Re: SASL error after login password change

2022-06-02 Thread Nathan Dehnel
I restarted it and that did not fix it. Here is my opendkim config: # This is a simple config file for signing and verifying #LogWhy yes Syslog yes SyslogSuccess yes Canonicalizationrelaxed/relaxed Domainexample.com Selectordefa

Re: SASL error after login password change

2022-06-02 Thread Nathan Dehnel
I restarted it and that did not fix it. Here is my opendkim config: On Thu, Jun 2, 2022 at 4:36 AM Benny Pedersen wrote: > > On 2022-06-02 00:34, Nathan Dehnel wrote: > > I had a working email server until I changed the unix login password > > for a user, and now postfix errors when mail is sent

Re: SASL error after login password change

2022-06-02 Thread Benny Pedersen
On 2022-06-02 00:34, Nathan Dehnel wrote: I had a working email server until I changed the unix login password for a user, and now postfix errors when mail is sent to that user, and the mail does not appear in the inbox. How can I fix this? Thanks postfix.service: Jun 01 17:15:50 gentooserver p

Re: SASL error after login password change

2022-06-01 Thread Viktor Dukhovni
> On 1 Jun 2022, at 6:34 pm, Nathan Dehnel wrote: > > I had a working email server until I changed the unix login password > for a user, and now postfix errors when mail is sent to that user, and > the mail does not appear in the inbox. How can I fix this? Thanks You're mistaken, mail sent *to*

Re: SASL hacking ?

2022-02-22 Thread Nick Tait
On 20/02/22 05:35, Bill Cole wrote: We have listed all IPs. We can use a FW rule, but its heavy and hard to manage. A Postfix list may be easier. On Linux, using ipsets instead of putting IPs directly in rules helps a lot with managing large lists. Fail2ban can do its work via ipsets. An alt

Re: SASL hacking ?

2022-02-19 Thread Bill Cole
On 2022-02-19 at 06:43:59 UTC-0500 (Sat, 19 Feb 2022 12:43:59 +0100) Emmanuel BILLOT is rumored to have said: Hi, We have SMTPS server with SASL auth fro posting messages from external networks (internal xtoo). Since weeks we found a lot (very big) amount of SASL LOGIN authentication failed

Re: SASL hacking ?

2022-02-19 Thread Matus UHLAR - fantomas
On 19.02.22 12:43, Emmanuel BILLOT wrote: We have SMTPS server with SASL auth fro posting messages from external networks (internal xtoo). Since weeks we found a lot (very big) amount of SASL LOGIN authentication failed: authentication failure in our logs. Client IPs are foreigns and not real

Re: sasl dovecot postfix certificates

2022-02-06 Thread Viktor Dukhovni
On Mon, Feb 07, 2022 at 12:46:54AM -0500, Ruben Safir wrote: > I pulled dovecot off of 587 and turned on stmpd settings in master.cf > but not I need to assign the certs to the postfix settings. So I am > kind of lost. If postfix is sitting on 587 then it needs to to the > cryptography which see

Re: SASL questions

2022-01-22 Thread Joe Acquisto-j4
>> > On Sat, Jan 22, 2022 at 05:56:31PM -0500, Joe Acquisto-j4 wrote: > >> >> > noauth unix - - n - - smtp >> >> > -o smtp_sasl_enable=no >> >> > -o smtp_sender_dependent_authentication=no >> >> > -o smtp_sasl_password_maps= >> >> >>

Re: SASL questions

2022-01-22 Thread Viktor Dukhovni
On Sat, Jan 22, 2022 at 05:56:31PM -0500, Joe Acquisto-j4 wrote: > >> > noauth unix - - n - - smtp > >> > -o smtp_sasl_enable=no > >> > -o smtp_sender_dependent_authentication=no > >> > -o smtp_sasl_password_maps= > >> > >> My initial

Re: SASL questions

2022-01-22 Thread Joe Acquisto-j4
> On Sat, Jan 22, 2022 at 05:11:02PM -0500, Joe Acquisto-j4 wrote: > >> > Therefore your master.cf file needs to have an least one additional >> > smtp-based transport, with either SASL disabled entirely, and/or >> > sender-dependent authentication disabled, or perhaps a variant >> > password tab

Re: SASL questions

2022-01-22 Thread Viktor Dukhovni
On Sat, Jan 22, 2022 at 05:11:02PM -0500, Joe Acquisto-j4 wrote: > > Therefore your master.cf file needs to have an least one additional > > smtp-based transport, with either SASL disabled entirely, and/or > > sender-dependent authentication disabled, or perhaps a variant > > password table... B

Re: SASL questions

2022-01-22 Thread Joe Acquisto-j4
> On Sat, Jan 22, 2022 at 02:03:29PM -0500, Joe Acquisto-j4 wrote: > >> > IIRC Wietse already suggested a work-around, by making the >> > sender-dependent authentication settings be transport-specific. >> > >> > In particular the internal nexthop that does not do SASL should be >> > handled by a

Re: SASL questions

2022-01-22 Thread Viktor Dukhovni
On Sat, Jan 22, 2022 at 02:03:29PM -0500, Joe Acquisto-j4 wrote: > > IIRC Wietse already suggested a work-around, by making the > > sender-dependent authentication settings be transport-specific. > > > > In particular the internal nexthop that does not do SASL should be > > handled by a transport

Re: SASL questions

2022-01-22 Thread Joe Acquisto-j4
> On Sat, Jan 22, 2022 at 08:01:27AM +1100, raf wrote: > >> > It is an issue with email that postfix has received, via fetchmail, and is >> > attempting to deliver to another system. Authentication is being >> > attempted, without it being required or requested, at least as far as I >> > can >

Re: SASL questions

2022-01-21 Thread Viktor Dukhovni
On Sat, Jan 22, 2022 at 08:01:27AM +1100, raf wrote: > > It is an issue with email that postfix has received, via fetchmail, and is > > attempting to deliver to another system. Authentication is being > > attempted, without it being required or requested, at least as far as I can > > tell. > >

Re: SASL questions

2022-01-21 Thread raf
On Thu, Jan 20, 2022 at 12:01:46PM -0500, Joe Acquisto-j4 wrote: > > On Tue, Jan 18, 2022 at 07:22:40PM -0500, Joe Acquisto-j4 > > > > wrote: > > > >> . . . > >> > I would imagine that Postfix can only authenticate to > >> > servers that have entries in /etc/postfix/sasl_passwd. > >> > > >>

Re: SASL questions

2022-01-20 Thread Joe Acquisto-j4
> On Tue, Jan 18, 2022 at 07:22:40PM -0500, Joe Acquisto-j4 > > wrote: > >> . . . >> > I would imagine that Postfix can only authenticate to >> > servers that have entries in /etc/postfix/sasl_passwd. >> > >> > smtp_sasl_password_maps (default: empty) >> > >> > Optional Postfix SMTP cli

Re: SASL questions

2022-01-19 Thread raf
On Tue, Jan 18, 2022 at 07:22:40PM -0500, Joe Acquisto-j4 wrote: > . . . > > I would imagine that Postfix can only authenticate to > > servers that have entries in /etc/postfix/sasl_passwd. > > > > smtp_sasl_password_maps (default: empty) > > > > Optional Postfix SMTP client lookup table

Re: SASL per user or per host disable and, use of trace, strace

2022-01-18 Thread Joe Acquisto-j4
> Wietse Venema: >> Joe Acquisto-j4: >> > For version 3.7.4, is there a means of disabling for smtp per user, >> > per domain, per IP, when "smtp_sender_dependent_authentication = >> > yes"? >> >> Postfix will search smtp_sasl_password_maps by sender first, and >> if that is not found, then by des

Re: SASL questions

2022-01-18 Thread Joe Acquisto-j4
. . . > I would imagine that Postfix can only authenticate to > servers that have entries in /etc/postfix/sasl_passwd. > > smtp_sasl_password_maps (default: empty) > > Optional Postfix SMTP client lookup tables with one > username:password entry per sender, remote hostname > or next

Re: SASL per user or per host disable and, use of trace, strace

2022-01-18 Thread Joe Acquisto-j4
> Wietse Venema: >> Joe Acquisto-j4: >> > For version 3.7.4, is there a means of disabling for smtp per user, >> > per domain, per IP, when "smtp_sender_dependent_authentication = >> > yes"? >> >> Postfix will search smtp_sasl_password_maps by sender first, and >> if that is not found, then by des

Re: SASL per user or per host disable and, use of trace, strace

2022-01-18 Thread Wietse Venema
Wietse Venema: > Joe Acquisto-j4: > > For version 3.7.4, is there a means of disabling for smtp per user, > > per domain, per IP, when "smtp_sender_dependent_authentication = > > yes"? > > Postfix will search smtp_sasl_password_maps by sender first, and > if that is not found, then by destination.

Re: SASL per user or per host disable and, use of trace, strace

2022-01-18 Thread Wietse Venema
Joe Acquisto-j4: > For version 3.7.4, is there a means of disabling for smtp per user, > per domain, per IP, when "smtp_sender_dependent_authentication = > yes"? Postfix will search smtp_sasl_password_maps by sender first, and if that is not found, then by destination. If you don't want Postfix t

Re: SASL questions

2022-01-18 Thread raf
On Mon, Jan 17, 2022 at 10:04:13PM -0500, Joe Acquisto-j4 wrote: > > On 2022-01-17 at 20:09:55 UTC-0500 (Mon, 17 Jan 2022 20:09:55 -0500) > > Joe Acquisto-j4 > > is rumored to have said: > > > > > >> Sorry for the garbled message. Looking for the config files, etc that > >> are normally req

  1   2   3   4   5   6   >