Re: dictionary-attack

2013-04-07 Thread Benny Pedersen
On 2013-03-27 23:11, Matthew Hall wrote: I ran into a bit of an issue trying out fqrdns.pcre as recommended here in this thread. The header in the file recommended adding it into smtpd_client_restrictions. However if I place it there, I end up rejecting mail even from SASL authenticated client

Re: dictionary-attack

2013-03-29 Thread /dev/rob0
On Thu, Mar 28, 2013 at 11:09:58PM -0500, Stan Hoeppner wrote: > On 3/28/2013 8:03 AM, /dev/rob0 wrote: > > If postscreen DNSBLs are your only protection, what happens if > > your DNS breaks? Spam flood! Here too, Stan's PCRE list can help, > > again, at least as a HELO check (client name checks

Re: dictionary-attack

2013-03-28 Thread Stan Hoeppner
On 3/28/2013 8:03 AM, /dev/rob0 wrote: > "... maintaining it ..." see? I would think that something which is > maintained generally isn't outdated. Depends how well the maintainer > maintains it, of course. Precisely. Let me add that ISPs introduce new consumer rDNS strings very infrequently.

Re: dictionary-attack

2013-03-28 Thread Matthew Hall
On Thu, Mar 28, 2013 at 1:19 PM, Stan Hoeppner wrote: > I don't have the thread archived (it's been 8 years or so), so I'm > guessing here, but IIRC it took at least a half dozen or more emails > back-forth before I understood this lack or inheritance. Once I did, > and realized how much I'd have

Re: dictionary-attack

2013-03-28 Thread Stan Hoeppner
On 3/28/2013 12:12 AM, Noel Jones wrote: > Yes, first match wins. This needs to be *immediately* followed by what you stated way down below, copied here: > - each smtpd_*_restrictions section must resolve to "permit" (or > empty) to accept mail. A "permit" in one smtpd_*_restrictions > section

Re: dictionary-attack

2013-03-28 Thread /dev/rob0
On Thu, Mar 28, 2013 at 11:15:02AM +0100, Marko Weber | ZBF wrote: > "The table was created many years ago over an extended period of > time,...::" That was what Stan said, yes. > so, its outdated? Let's scroll down through the mass of quoting over which you top-posted and see w

Re: dictionary-attack

2013-03-28 Thread Marko Weber | ZBF
"The table was created many years ago over an extended period of time,...::" so, its outdated? i think its better to use postscreen and a regular updated file like DROP from spamhaus. i refresh this DROP every hour. so maybe wrong listed candidates are deleted in the refreshe

Re: dictionary-attack

2013-03-27 Thread Noel Jones
On 3/27/2013 10:07 PM, Matthew Hall wrote: > One other question here. So, if I have a host which matches > permit_sasl_authenticated, but also matches one of the rejections > present in check_reverse_client_hostname_access, but > permit_sasl_authenticated comes first in recipient_restrictions, then

Re: dictionary-attack

2013-03-27 Thread Matthew Hall
On Wed, Mar 27, 2013 at 7:20 PM, Noel Jones wrote: > On 3/27/2013 7:18 PM, Matthew Hall wrote: >> I altered the restrictions according to the new advice: >> >> relay_restrictions - removed > > there's no reason to remove the safety net. Makes sense. Corrected. > Your smtpd_recipient_restrictions

Re: dictionary-attack

2013-03-27 Thread Noel Jones
On 3/27/2013 7:18 PM, Matthew Hall wrote: > I altered the restrictions according to the new advice: > > relay_restrictions - removed there's no reason to remove the safety net. smtpd_relay_restrictions = permit_mynetworks permit_sasl_authenticated reject_unauth_destination Yes, these are

Re: dictionary-attack

2013-03-27 Thread Noel Jones
On 3/27/2013 7:07 PM, Matthew Hall wrote: > > smtpd_relay_restrictions = > permit_sasl_authenticated, > permit_mynetworks, > #check_reverse_client_hostname_access pcre:/etc/postfix/fqrdns.pcre, > reject_unauth_destination The above is wrong in two ways. First, anti-spam access li

Re: dictionary-attack

2013-03-27 Thread Noel Jones
On 3/27/2013 6:15 PM, Stan Hoeppner wrote: > On 3/27/2013 5:39 PM, Noel Jones wrote: > >> One could argue the example included in the file should >> be clearer > > I'm open to suggestions. As long as the doc section doesn't end up > longer than the expression list. I would suggest a fully-work

Re: dictionary-attack

2013-03-27 Thread Matthew Hall
I altered the restrictions according to the new advice: relay_restrictions - removed smtpd_recipient_restrictions = permit_mynetworks, permit_sasl_authenticated, reject_unauth_destination, reject_invalid_hostname, reject_non_fqdn_hostname, reject_non_fqdn_sender, rejec

Re: dictionary-attack

2013-03-27 Thread Matthew Hall
On Wed, Mar 27, 2013 at 3:56 PM, Stan Hoeppner wrote: > It seems pretty clear you need to convert to putting everything under > smtpd_recipient_restrictions. Makes things a lot easier. I give an > example of this in the instructions as well. Doing so gives you precise > control of restriction e

Re: dictionary-attack

2013-03-27 Thread Stan Hoeppner
On 3/27/2013 5:39 PM, Noel Jones wrote: > One could argue the example included in the file should > be clearer I'm open to suggestions. As long as the doc section doesn't end up longer than the expression list. > (and it's missing the required '='). Fixed. Thanks for catching this oversight

Re: dictionary-attack

2013-03-27 Thread /dev/rob0
On Wed, Mar 27, 2013 at 05:56:03PM -0500, Stan Hoeppner wrote: > Frankly I'm surprised anyone still uses the old multi-section > restrictions configuration these days. Sometimes it's necessary for complex restrictions, but I think the worst I've ever needed was 2-3 mumbles of smtpd_mumble_restri

Re: dictionary-attack

2013-03-27 Thread Stan Hoeppner
On 3/27/2013 5:11 PM, Matthew Hall wrote: > I ran into a bit of an issue trying out fqrdns.pcre as recommended > here in this thread. The header in the file recommended adding it into > smtpd_client_restrictions. The instructions I provide are examples, not a concise how-to. As with any restric

Re: dictionary-attack

2013-03-27 Thread Noel Jones
On 3/27/2013 5:11 PM, Matthew Hall wrote: > Hello, > > I ran into a bit of an issue trying out fqrdns.pcre as recommended > here in this thread. The header in the file recommended adding it into > smtpd_client_restrictions. However if I place it there, I end up > rejecting mail even from SASL auth

AW: dictionary-attack

2013-03-27 Thread Uwe Drießen
Im Auftrag von Matthew Hall > Hello, > > I ran into a bit of an issue trying out fqrdns.pcre as recommended > here in this thread. The header in the file recommended adding it into > smtpd_client_restrictions. However if I place it there, I end up > rejecting mail even from SASL authenticated clie

Re: dictionary-attack

2013-03-27 Thread Matthew Hall
Hello, I ran into a bit of an issue trying out fqrdns.pcre as recommended here in this thread. The header in the file recommended adding it into smtpd_client_restrictions. However if I place it there, I end up rejecting mail even from SASL authenticated client devices, if they also match a rule in

Re: dictionary-attack

2013-03-27 Thread Stan Hoeppner
On 3/26/2013 1:29 PM, Lima Union wrote: > No ipv6 here and pdnsd is using 8.8.8.8 as DNS server. Instead of using a caching DNS proxy daemon querying Google's public DNS servers, I recommend you run a recursing caching resolver on your Postfix host, such as PowerDNS recursor (I've been using it f

Re: dictionary-attack

2013-03-27 Thread Stan Hoeppner
On 3/27/2013 7:30 AM, Lima Union wrote: > Wietse, there's something I don't understand. I've commented out the > check_reverse_client_hostname_access, Re-enable it. > reloaded postfix and am still > finding those DNS warnings (ie: hostname > 77-121-229-206.dhcp.kram-city.net verification failed

Re: dictionary-attack

2013-03-27 Thread Wietse Venema
Lima Union: > >> Mar 26 15:56:34 relay1 postfix/smtpd[2021]: warning: 64.191.105.74: > >> hostname 64-191-105-74.static.hostnoc.net verification failed: Name or > >> service not known > > > > Yes, broken DNS happens. Instead of reject_unknown_client_hostname > > you could use reject_unknown_reverse

Re: dictionary-attack

2013-03-27 Thread Lima Union
On Tue, Mar 26, 2013 at 4:16 PM, Wietse Venema wrote: > Lima Union: > [ Charset ISO-8859-1 unsupported, converting... ] >> > Am 26.03.2013 19:36, schrieb Lima Union: >> >>> >> >> Wietse, ok, I'll disable the fqrdns check for now and check the chroot >> >> configuration after I return from holidays

Re: dictionary-attack

2013-03-26 Thread Wietse Venema
Lima Union: [ Charset ISO-8859-1 unsupported, converting... ] > > Am 26.03.2013 19:36, schrieb Lima Union: > >>> > >> Wietse, ok, I'll disable the fqrdns check for now and check the chroot > >> configuration after I return from holidays > > > > this is ONE char in the master.cf and if i where you i

Re: dictionary-attack

2013-03-26 Thread Lima Union
> Am 26.03.2013 19:36, schrieb Lima Union: >>> >> Wietse, ok, I'll disable the fqrdns check for now and check the chroot >> configuration after I return from holidays > > this is ONE char in the master.cf and if i where you i > would not make holidays as long a production server is > known misconfi

Re: dictionary-attack

2013-03-26 Thread Reindl Harald
Am 26.03.2013 19:36, schrieb Lima Union: > On Tue, Mar 26, 2013 at 3:21 PM, Wietse Venema wrote: >> A common mistake is to turn on chroot operation in the master.cf >> file without going through all the necessary steps to set up a >> chroot environment. This causes Postfix daemon processes to fa

Re: dictionary-attack

2013-03-26 Thread Lima Union
On Tue, Mar 26, 2013 at 3:21 PM, Wietse Venema wrote: > Lima Union: >> working. This MTA is behing a firewall, in a DMZ with a bidirectional >> mapping (1:1). I issued a grep ': connect from' and everything shown >> is 'connect from unknown[ip.add.re.ss]'. I'm using pdnsd for caching >> purposes.

Re: dictionary-attack

2013-03-26 Thread Lima Union
On Tue, Mar 26, 2013 at 3:20 PM, Benny Pedersen wrote: > Lima Union skrev den 2013-03-26 18:59: >> >> what can I check? > > > dig +trace ipv4.google.com > > are the trace with hostnames all places ? > > if you are on ipv6 change ipv4 to ipv6 > > are you using forwarders that does not support dnsse

Re: dictionary-attack

2013-03-26 Thread Lima Union
On Tue, Mar 26, 2013 at 3:14 PM, Benny Pedersen wrote: > Lima Union skrev den 2013-03-26 13:04: >> >>853 #reject_unverified_recipient, > > > postconf -n > > not just content listning from main.cf > > your error might just be that you have # at random lines ok, here it's (hostname/ip

Re: dictionary-attack

2013-03-26 Thread Wietse Venema
Lima Union: > working. This MTA is behing a firewall, in a DMZ with a bidirectional > mapping (1:1). I issued a grep ': connect from' and everything shown > is 'connect from unknown[ip.add.re.ss]'. I'm using pdnsd for caching > purposes. My resolv.conf points to 127.0.0.1 and seems to be working >

Re: dictionary-attack

2013-03-26 Thread Benny Pedersen
Lima Union skrev den 2013-03-26 18:59: what can I check? dig +trace ipv4.google.com are the trace with hostnames all places ? if you are on ipv6 change ipv4 to ipv6 are you using forwarders that does not support dnssec ? is it working if you use nameserver 8.8.8.8 in resolv.conf ?

Re: dictionary-attack

2013-03-26 Thread Benny Pedersen
Lima Union skrev den 2013-03-26 13:04: 853 #reject_unverified_recipient, postconf -n not just content listning from main.cf your error might just be that you have # at random lines

Re: dictionary-attack

2013-03-26 Thread Lima Union
On Tue, Mar 26, 2013 at 1:17 PM, Stan Hoeppner wrote: > On 3/26/2013 7:04 AM, Lima Union wrote: > ... >> ok, it seems that for some reason the check is not being triggered >> (#847) after a postfix reload and 24 hours of operation in a busy >> server, any ideas? > > So when you grep "Please relay

Re: dictionary-attack

2013-03-26 Thread Stan Hoeppner
On 3/26/2013 7:04 AM, Lima Union wrote: ... > ok, it seems that for some reason the check is not being triggered > (#847) after a postfix reload and 24 hours of operation in a busy > server, any ideas? So when you grep "Please relay via ISP" against your mail log you get nothing? Do you have any

Re: dictionary-attack

2013-03-26 Thread Noel Jones
On 3/26/2013 7:04 AM, Lima Union wrote: > On Mon, Mar 25, 2013 at 10:52 AM, Noel Jones wrote: >> On 3/25/2013 7:55 AM, Lima Union wrote: >>> On Sat, Mar 23, 2013 at 11:31 AM, Benny Pedersen wrote: Ejaz skrev den 2013-03-23 11:49: >> ... are you missing http://www.hardwarefreak

Re: dictionary-attack

2013-03-26 Thread Lima Union
On Mon, Mar 25, 2013 at 10:52 AM, Noel Jones wrote: > On 3/25/2013 7:55 AM, Lima Union wrote: >> On Sat, Mar 23, 2013 at 11:31 AM, Benny Pedersen wrote: >>> Ejaz skrev den 2013-03-23 11:49: >>> > ... >>> >>> are you missing http://www.hardwarefreak.com/fqrdns.pcre ? :) >> >> very interesting link

Re: dictionary-attack

2013-03-25 Thread Stan Hoeppner
On 3/25/2013 11:06 AM, Abhijeet Rastogi wrote: > How clever would it be to deploy in production? I've been using it for over 3 years, the original REGEXP version for a few months, then my PCRE 'version' after that. AFAIK the ISP crew who created the original have had it in production for more tha

Re: dictionary-attack

2013-03-25 Thread Stan Hoeppner
On 3/25/2013 8:52 AM, Noel Jones wrote: ... >>> are you missing http://www.hardwarefreak.com/fqrdns.pcre ? :) >> >> very interesting link, as I understand my postfix is not prepared for >> pcre thus I won't be able to use it, right? ... > You can use this file as a regexp: type. > > pcre is recomm

Re: dictionary-attack

2013-03-25 Thread Noel Jones
> On Sat, Mar 23, 2013 at 8:01 PM, Benny Pedersen wrote: >> >> are you missing http://www.hardwarefreak.com/fqrdns.pcre ? :) > On 3/25/2013 11:06 AM, Abhijeet Rastogi wrote:> How clever would it be to deploy in production? > > For every mail, checking 1600 regexes doesn't seem efficient to me. >

Re: dictionary-attack

2013-03-25 Thread Abhijeet Rastogi
How clever would it be to deploy in production? For every mail, checking 1600 regexes doesn't seem efficient to me. Will it have any significant CPU usage? On Sat, Mar 23, 2013 at 8:01 PM, Benny Pedersen wrote: > > are you missing http://www.hardwarefreak.com/fqrdns.pcre ? :) -- Regards, Abh

Re: dictionary-attack

2013-03-25 Thread Noel Jones
On 3/25/2013 7:55 AM, Lima Union wrote: > On Sat, Mar 23, 2013 at 11:31 AM, Benny Pedersen wrote: >> Ejaz skrev den 2013-03-23 11:49: >> ... >> >> are you missing http://www.hardwarefreak.com/fqrdns.pcre ? :) > > very interesting link, as I understand my postfix is not prepared for > pcre thus I

Re: dictionary-attack

2013-03-25 Thread Lima Union
On Sat, Mar 23, 2013 at 11:31 AM, Benny Pedersen wrote: > Ejaz skrev den 2013-03-23 11:49: > >> How do I configure my postfix not to accept the emails which sent on >> invalid address?, since morning we have been noticed that there huge >> spam dictionary attack on ou

Re: dictionary-attack

2013-03-23 Thread Robert Schetterer
Am 23.03.2013 11:49, schrieb Ejaz: > How do I configure my postfix not to accept the emails which sent on > invalid address?, since morning we have been noticed that there huge > spam dictionary attack on our server, all originated emails are from > random IPs and random from ad

Re: dictionary-attack

2013-03-23 Thread Stan Hoeppner
On 3/23/2013 9:31 AM, Benny Pedersen wrote: > Ejaz skrev den 2013-03-23 11:49: >> How do I configure my postfix not to accept the emails which sent on >> invalid address?, since morning we have been noticed that there huge >> spam dictionary attack on our server, all origi

Re: dictionary-attack

2013-03-23 Thread Benny Pedersen
Ejaz skrev den 2013-03-23 11:49: How do I configure my postfix not to accept the emails which sent on invalid address?, since morning we have been noticed that there huge spam dictionary attack on our server, all originated emails are from random IPs and random from address to the invalid

Re: dictionary-attack

2013-03-23 Thread Wietse Venema
g we have been noticed that there huge spam > dictionary attack on our server, all originated emails are from random IPs > and random from address to the invalid recipient. See http://www.postfix.org/STRESS_README.html if this is slowing down your mail delivery, or just wait until it is over. Wietse

dictionary-attack

2013-03-23 Thread Ejaz
How do I configure my postfix not to accept the emails which sent on invalid address?, since morning we have been noticed that there huge spam dictionary attack on our server, all originated emails are from random IPs and random from address to the invalid recipient. Thanks in advance for