Re: password security

2022-04-27 Thread Demi Marie Obenour
On 4/27/22 14:01, Wietse Venema wrote: > Michael Stroeder: >>> Either way a compromised CA or a compromise KDC is bad news... >> >> Yes! >> >> And one of my biggest concerns are bad operational practices. That's why >> admins should not have to manually deal with crypto key files like >> service

Re: password security

2022-04-27 Thread Michael Ströder
On 4/27/22 21:30, Wietse Venema wrote: Michael Stroeder: So even if you cannot afford a HSM you can e.g. use ssh-agent via Unix domain socket for your SSH-CA to avoid having to grant direct read access to the SSH-CA's private key to your SSH-CA service. Simple solutions, which you can isolate a

Re: password security

2022-04-27 Thread Wietse Venema
Michael Stroeder: > So even if you cannot afford a HSM you can e.g. use ssh-agent via Unix > domain socket for your SSH-CA to avoid having to grant direct read > access to the SSH-CA's private key to your SSH-CA service. Simple > solutions, which you can isolate a bit more with stuff already ava

Re: password security

2022-04-27 Thread Michael Ströder
On 4/27/22 20:01, Wietse Venema wrote: Michael Stroeder: Either way a compromised CA or a compromise KDC is bad news... Yes! And one of my biggest concerns are bad operational practices. That's why admins should not have to manually deal with crypto key files like service keytabs or TLS serve

Re: password security

2022-04-27 Thread Wietse Venema
Michael Stroeder: > > Either way a compromised CA or a compromise KDC is bad news... > > Yes! > > And one of my biggest concerns are bad operational practices. That's why > admins should not have to manually deal with crypto key files like > service keytabs or TLS server keys. To implement str

Re: password security

2022-04-27 Thread Michael Ströder
On 4/27/22 19:03, Viktor Dukhovni wrote: On 27 Apr 2022, at 12:45 pm, Michael Ströder wrote: But my concern is rather that I would not connect my KDC to the Internet (for now leaving aside approaches like proxy KCM). >> In general I'm leaning more towards using asymmetric keys for authc. On my

Re: password security

2022-04-27 Thread Viktor Dukhovni
> On 27 Apr 2022, at 12:45 pm, Michael Ströder wrote: > > But my concern is rather that I would not connect my KDC to the Internet (for > now leaving aside approaches like proxy KCM). > > In general I'm leaning more towards using asymmetric keys for authc. On my > personal to-do list is to imp

Re: password security

2022-04-27 Thread Michael Ströder
On 4/27/22 18:38, Demi Marie Obenour wrote: On 4/27/22 07:58, Michael Ströder wrote: Mozilla hunked out all features for PKI client cert enrollment from Firefox and Thunderbird. So today it's easier to issue client certs to Outlook users than to Thunderbird users. :-( Please report a bug on ht

Re: password security

2022-04-27 Thread Antonio Leding
“Well, if you believe that it's ok for you to use it.” Not sure if you mean I’m being presumptuous (not intended) or actually that I would see value in using it - I think you meant the latter but again, not sure…(lol) Anyway, I would see value in at least checking it out - seems interesting…

Re: password security

2022-04-27 Thread Michael Ströder
On 4/27/22 18:50, Antonio Leding wrote: On 27 Apr 2022, at 9:45, Michael Ströder wrote: > “On my personal to-do list is to implement a simple X.509-CA for issuing > short-term client certs, with a CLI tool to directly manipulate > Thunderbird and Firefox key/cert DB.” As in you are planning t

Re: password security

2022-04-27 Thread Michael Ströder
On 4/27/22 18:39, Demi Marie Obenour wrote: On 4/27/22 12:27, Michael Ströder wrote: On 4/27/22 14:37, Jahnke-Zumbusch, Dirk wrote: I’m very interested in what options / solutions (if any) exist that allow you to use a passwordless approach to authenticating your users against imaps/pop3/smtps/

Re: password security

2022-04-27 Thread Antonio Leding
“On my personal to-do list is to implement a simple X.509-CA for issuing short-term client certs, with a CLI tool to directly manipulate Thunderbird and Firefox key/cert DB.” As in you are planning to build such a suite and put up on GH for all of us to use as well??? If so, would love to le

Re: password security

2022-04-27 Thread Michael Ströder
On 4/27/22 18:36, Viktor Dukhovni wrote: On 27 Apr 2022, at 12:27 pm, Michael Ströder wrote: one way to authenticate may be using Kerberos. Not recommended for roaming users accessing submission service via public Internet. Suitability depends on the user base, ... my personal mail server

Re: password security

2022-04-27 Thread Demi Marie Obenour
On 4/27/22 12:27, Michael Ströder wrote: > On 4/27/22 14:37, Jahnke-Zumbusch, Dirk wrote: > I’m very interested in what options / solutions (if any) exist that allow > you to use a passwordless approach to authenticating your users against > imaps/pop3/smtps/submission services (tls enc

Re: password security

2022-04-27 Thread Demi Marie Obenour
On 4/27/22 08:37, Jahnke-Zumbusch, Dirk wrote: > Hi everybody, > I’m very interested in what options / solutions (if any) exist that allow you to use a passwordless approach to authenticating your users against imaps/pop3/smtps/submission services (tls encrypted of course) > > one

Re: password security

2022-04-27 Thread Demi Marie Obenour
On 4/27/22 07:58, Michael Ströder wrote: > On 4/27/22 12:27, Jaroslaw Rafa wrote: >> Dnia 27.04.2022 o godz. 17:47:06 AndrewHardy pisze: >>> >>> I’m very interested in what options / solutions (if any) exist that allow >>> you to use a passwordless approach to authenticating your users against >>>

Re: password security

2022-04-27 Thread Michael Ströder
On 4/27/22 17:28, lists wrote: The TOTP built into Linux has a 30 second time limit but most implementations approve the stale code making it effectively 60 seconds. > Hackers have either implemented [..] a man in the middle attack intercepted the token. An implementation taking the "one-time"

Re: password security

2022-04-27 Thread Viktor Dukhovni
> On 27 Apr 2022, at 12:27 pm, Michael Ströder wrote: > >> one way to authenticate may be using Kerberos. > > Not recommended for roaming users accessing submission service via public > Internet. Suitability depends on the user base, ... my personal mail server indeed supports SASL GSSAPI subm

Re: password security

2022-04-27 Thread Michael Ströder
On 4/27/22 14:37, Jahnke-Zumbusch, Dirk wrote: I’m very interested in what options / solutions (if any) exist that allow you to use a passwordless approach to authenticating your users against imaps/pop3/smtps/submission services (tls encrypted of course) one way to authenticate may be using Ke

Re: password security

2022-04-27 Thread lists
to occur with a web page Auth where the MITM presents a fake page.   Original Message   From: postfixlists-070...@billmail.scconsult.com Sent: April 27, 2022 8:04 AM To: postfix-users@postfix.org Subject: Re: password security On 2022-04-27 at 01:47:06 UTC-0400 (Wed, 27 Apr 2022 17:47:06

Re: password security

2022-04-27 Thread Bill Cole
On 2022-04-27 at 01:47:06 UTC-0400 (Wed, 27 Apr 2022 17:47:06 +1200) AndrewHardy is rumored to have said: Hi, Following this thread has been quite intriguing. Interesting conversation indeed. On a similar topic but probably more focused on addressing root cause (which in mind is just passw

Re: password security

2022-04-27 Thread Jahnke-Zumbusch, Dirk
Hi everybody, >>> I’m very interested in what options / solutions (if any) exist that allow >>> you to use a passwordless approach to authenticating your users against >>> imaps/pop3/smtps/submission services (tls encrypted of course) one way to authenticate may be using Kerberos. Get your K5-Tic

Re: password security

2022-04-27 Thread Michael Ströder
On 4/27/22 12:27, Jaroslaw Rafa wrote: Dnia 27.04.2022 o godz. 17:47:06 AndrewHardy pisze: I’m very interested in what options / solutions (if any) exist that allow you to use a passwordless approach to authenticating your users against imaps/pop3/smtps/submission services (tls encrypted of cou

Re: password security

2022-04-27 Thread Jaroslaw Rafa
Dnia 26.04.2022 o godz. 18:59:35 lists pisze: > I see the snowshoe hackers on my web server and I > assume they are on my email but I don't read the postfix logs as often. I > haven't seen a hacker hammer my server in a long time. It is all snowshoe > these days. I also have a personal server and

Re: password security

2022-04-27 Thread Jaroslaw Rafa
Dnia 27.04.2022 o godz. 17:47:06 AndrewHardy pisze: > > I’m very interested in what options / solutions (if any) exist that allow > you to use a passwordless approach to authenticating your users against > imaps/pop3/smtps/submission services (tls encrypted of course) To my knowledge, Thunderbird

Re: password security

2022-04-27 Thread Shardul Adhikari
One more important thing is to educate the users to not click on any unknown links because many a times spammers get hold of the account by the way of phishing emails. Fail2ban works in case there are brute force attempts. but if the password is valid then the server will authenticate. On Mon,

Re: password security

2022-04-27 Thread Ansgar Wiechers
On 2022-04-27 lists wrote: > Steve Gibson spent four years developing a passwordless Auth system. > Open sourced it. Provided APIs. Nobody bought into it. Steve Gibson? The same Steve Gibson who claimed that raw sockets in Windows XP are evil because ... reasons? The same Steve Gibson who successf

Re: password security

2022-04-27 Thread lists
like a WAF. From: andrewha...@andrewhardy.co.nzSent: April 26, 2022 10:47 PMTo: li...@lazygranch.comCc: postfix-users@postfix.orgSubject: Re: password security Hi,Following this thread has

Re: password security

2022-04-26 Thread AndrewHardy
he man pages for postfix and Dovecot to set up an email server. Too many > options. > > Back to lurker mode. > > From: t...@leding.net > Sent: April 26, 2022 12:45 PM > To: le...@spes.gr > Cc: postfix-users@postfix.org > Subject: Re: password security > > Good fe

Re: password security

2022-04-26 Thread lists
y options. Back to lurker mode. From: t...@leding.netSent: April 26, 2022 12:45 PMTo: le...@spes.grCc: postfix-users@postfix.orgSubject: Re: password security Good feed

Re: password security

2022-04-26 Thread Shawn Heisey
On 4/26/2022 7:15 PM, Demi Marie Obenour wrote: On 4/26/22 01:35, Antonio Leding wrote: Anyone who thinks that F2B merely “quiets logs” unfortunately has no idea what F2B actually does… Would you mind explaining? TL;DR for many: The fail2ban service watches logfiles for things that indicate

Re: password security

2022-04-26 Thread Demi Marie Obenour
On 4/26/22 01:35, Antonio Leding wrote: > Anyone who thinks that F2B merely “quiets logs” unfortunately has no > idea what F2B actually does… Would you mind explaining? -- Sincerely, Demi Marie Obenour (she/her/hers) OpenPGP_0xB288B55FFF9C22C1.asc Description: OpenPGP public key OpenPGP_sign

Re: password security

2022-04-26 Thread Antonio Leding
Good feedback - typically I’d have some comments but since we’ve wandered a fair bit off the reserve here, I will refrain. If anyone wants to continue this at Reddit or somewhere else more appropo, let me know… - - - On 26 Apr 2022, at 11:56, Lefteris Tsintjelis wrote: On 26/4/2022 20:11,

Re: password security

2022-04-26 Thread Lefteris Tsintjelis
On 26/4/2022 20:11, Antonio Leding wrote: “…I'm just saying it's [F2B] not a solution to modern brute-force attack on passwords/accounts….” It’s actually staggering that you say this because of how incredibly inaccurate this statement is… Presume someone goes brute-force against a PostFix se

Re: password security

2022-04-26 Thread Fred Morris
In other words... On Tue, 26 Apr 2022, Antonio Leding wrote: [...] Blocking an IP is the single cheapest most effective thing one can do re: undesired traffic. blocking an address is just a rude form of graylisting, based on observed rudeness. (I do it too. And other things. Security is a

Re: password security

2022-04-26 Thread Antonio Leding
“…I'm just saying it's [F2B] not a solution to modern brute-force attack on passwords/accounts….” It’s actually staggering that you say this because of how incredibly inaccurate this statement is… Presume someone goes brute-force against a PostFix server via v6 only - so tons of addresses at

Re: password security

2022-04-26 Thread Antonio Leding
I’m not really sure if you understand that F2B is just a set of scripts wrapped around iptables (a firewall) - but that’s all it is - the real-work is being done by iptables which can be very effective against DDoS. Plenty of articles, papers, etc. on this very topic so your assertion that F2B

Re: password security

2022-04-26 Thread Byung-Hee HWANG
Dear Viktor, Viktor Dukhovni writes: > On Tue, Apr 26, 2022 at 11:54:21PM +0900, Byung-Hee HWANG wrote: > >> > There is obviously a point where the server won't be capable of >> > handling the load, always. But what are the odds with "just" a >> > brute-force on passwords/accounts? >> > Our outb

Re: password security

2022-04-26 Thread Viktor Dukhovni
On Tue, Apr 26, 2022 at 11:54:21PM +0900, Byung-Hee HWANG wrote: > > There is obviously a point where the server won't be capable of > > handling the load, always. But what are the odds with "just" a > > brute-force on passwords/accounts? > > Our outbound/internal mail gateway handles the traffic

Re: password security

2022-04-26 Thread Byung-Hee HWANG
> There is obviously a point where the server won't be capable of > handling the load, always. But what are the odds with "just" a > brute-force on passwords/accounts? > Our outbound/internal mail gateway handles the traffic for +2K > every-day users +28K occasional users. Millions emails per month

Re: password security

2022-04-26 Thread patpro
April 26, 2022 3:13 PM, "Bill Cole" wrote: > On 2022-04-26 at 07:09:41 UTC-0400 (Tue, 26 Apr 2022 11:09:41 +) > > is rumored to have said: >> Unless you run postfix on a 10 years old Raspberry, it can handle the > load. > > Not always true. There is obviously a point where the server won

Re: password security

2022-04-26 Thread Bill Cole
On 2022-04-26 at 07:09:41 UTC-0400 (Tue, 26 Apr 2022 11:09:41 +) is rumored to have said: Brute-forcing passwords/account as nothing to do with DDoS. Purpose of brute(forcing password is gaining access to a service in order to exploit it (steal data, send spam, etc.). Purpose of DDoS is t

Re: password security

2022-04-26 Thread patpro
April 26, 2022 12:16 PM, "Mauricio Tavares" wrote: > Please explain how certificate authentication is, as you said, > 100% efficient against brute-force attacks. No password = no possible brute-forced password. > If these 100s ou 1000s of IP addresses are sending each thousands of > connectio

Re: password security

2022-04-26 Thread Mauricio Tavares
On Tue, Apr 26, 2022 at 1:54 AM wrote: > > Hello, > > This is off topic anyway but I think you're right. Fail2ban is not for the > lazy, it's for people who have a lot of time to lose in an inefficient > solution. Before cloud era F2B was a really great solution, but as it's been > pointed out,

Re: password security

2022-04-25 Thread patpro
Hello, This is off topic anyway but I think you're right. Fail2ban is not for the lazy, it's for people who have a lot of time to lose in an inefficient solution. Before cloud era F2B was a really great solution, but as it's been pointed out, current attackers can leverage 100s ou 1000s of IP a

Re: password security

2022-04-25 Thread Antonio Leding
Anyone who thinks that F2B merely “quiets logs” unfortunately has no idea what F2B actually does… - - - On 25 Apr 2022, at 1:00, Laura Smith wrote: Sent with ProtonMail secure email. --- Original Message --- On Monday, April 25th, 2022 at 08:50, Dan Mahoney wrote: Even if fail2ban

Re: password security

2022-04-25 Thread Antonio Leding
I’ve been using F2B for over 4-5 years and it’s fantastic. F2B is just one of many very useful tools in the belt of any knowledgable infosec practitioner. To consider F2B as “only for the lazy” speaks more to a lack of truly understanding infosec than it does of the tool itself… - - - On

Re: password security

2022-04-25 Thread patpro
Hello, I find it quite fascinating that so many people will push solutions without context. Can you tell us how many users / user accounts are you trying to protect? Are those work accounts? Family & friends? What do you really want to achieve: - no brute-force attempts? - no brute-force succe

Re: password security

2022-04-25 Thread alice
that needs a secondary development? due to my limited knowledge I don't know there is the opensource implementation. thank you Mauricio Tavares wrote: What about multifactor authentication?

Re: password security

2022-04-25 Thread Ron Wheeler
If you google "fail2ban postfix", you will get a large number of links to ideas about using fail2ban to prevent this. On 2022-04-25 11:29, Mauricio Tavares wrote: On Mon, Apr 25, 2022 at 12:28 AM ミユナ (alice) wrote: do you know how to stop passwords from being brute-forced for a mailserver? do

Re: password security

2022-04-25 Thread Mauricio Tavares
On Mon, Apr 25, 2022 at 12:28 AM ミユナ (alice) wrote: > > do you know how to stop passwords from being brute-forced for a > mailserver? do you have any practical guide? > What about multifactor authentication? > thank you.

Re: AW: password security

2022-04-25 Thread natan
Hi Or use allow_nets (geoip) for dovecot-auth (in mysql) and fail2ban or ipset + hashlimit + geoip or 2fa - It's a bit of fun in configurations W dniu 25.04.2022 o 12:44, Ludi Cree pisze: Hi, Even if fail2ban is “whack a mole”, you could also feed the data on auth spammers to an abuse-compa

AW: password security

2022-04-25 Thread Ludi Cree
Hi, >> Even if fail2ban is “whack a mole”, you could also feed the data on auth >> spammers to an abuse-compaint script, and do your part to make the internet >> a little cleaner. >And we all know how fabulously well abuse reports have worked with preventing >spam, don't we !! >As I said. Fai

Re: password security

2022-04-25 Thread alice
may people are used to use a VPN today. so blocking based on IP is not acceptable. Allen Coates wrote: You could use an Access Control List to include all your "customers", and banning everybody else.

Re: password security

2022-04-25 Thread Allen Coates
On 25/04/2022 05:26, ミユナ (alice) wrote: do you know how to stop passwords from being brute-forced for a mailserver? do you have any practical guide? thank you. You could use an Access Control List to include all your "customers", and banning everybody else. In my case, any submission or

Re: password security

2022-04-25 Thread Matus UHLAR - fantomas
On Monday, April 25th, 2022 at 08:50, Dan Mahoney wrote: Even if fail2ban is “whack a mole”, you could also feed the data on auth spammers to an abuse-compaint script, and do your part to make the internet a little cleaner. On 25.04.22 08:00, Laura Smith wrote: And we all know how fabulously

Re: password security

2022-04-25 Thread Laura Smith
Sent with ProtonMail secure email. --- Original Message --- On Monday, April 25th, 2022 at 08:50, Dan Mahoney wrote: > Even if fail2ban is “whack a mole”, you could also feed the data on auth > spammers to an abuse-compaint script, and do your part to make the internet a > little

Re: password security

2022-04-25 Thread Dan Mahoney
> On Apr 25, 2022, at 12:07 AM, Laura Smith > wrote: > > > --- Original Message --- > On Monday, April 25th, 2022 at 05:26, ミユナ wrote: > >> do you know how to stop passwords from being brute-forced for a >> mailserver? do you have any practical guide? >> > > Simple. You've got tw

Re: password security

2022-04-25 Thread natan
Hi Probably fail2ban resolve your problem about brute-force auth W dniu 25.04.2022 o 09:07, Laura Smith pisze: --- Original Message --- On Monday, April 25th, 2022 at 05:26, ミユナ wrote: do you know how to stop passwords from being brute-forced for a mailserver? do you have any practica

AW: password security

2022-04-25 Thread Ludi Cree
Check out fail2ban Greets, Ludi -Ursprüngliche Nachricht- Von: owner-postfix-us...@postfix.org Im Auftrag von ??? (alice) Gesendet: Montag, 25. April 2022 06:27 An: Postfix users Betreff: password security do you know how to stop passwords from being brute-forced for a mailserver? do

Re: password security

2022-04-25 Thread Laura Smith
--- Original Message --- On Monday, April 25th, 2022 at 05:26, ミユナ wrote: > do you know how to stop passwords from being brute-forced for a > mailserver? do you have any practical guide? > Simple. You've got two options: a) Use strong passwords (and if you run an automated password ch

Re: password security

2022-04-24 Thread Claus R. Wickinghoff
Hi, do you know how to stop passwords from being brute-forced for a mailserver? do you have any practical guide? fail2ban is a proper solution on Linux machines against brute force login attempts. Groetjes Claus -- Claus R. Wickinghoff, Dipl.-Ing. using Linux since 1994 and still happy

password security

2022-04-24 Thread alice
do you know how to stop passwords from being brute-forced for a mailserver? do you have any practical guide? thank you.