Always "Untrusted TLS" for own Postfix instances

2014-02-23 Thread Dirk Stöcker
Hello, I'm lost and don't find any solution anymore, so I now need to ask. I'm running three mail-servers with Postfix 2.9.6 (valid TLS cert), 2.7.2 (self-signed), 2.11.0 (self-signed). And whatever I do I'm unable to get any of these three to show a trusted connection to any of the others.

Re: Aw: Re: Problem with filtering GMX emails in sender_access

2014-02-23 Thread Wolfgang Zeikat
In an older episode, on 2014-02-23 00:38, Peter Marius wrote: So it is just a coincidence that the "MAIL FROM" and "From:" match for web.de? Both ways of usage are common and legitimate, so I would not call it a coincidence. See https://de.wikipedia.org/wiki/SMTP#Protokoll Nothing wrong/fis

Re: Always "Untrusted TLS" for own Postfix instances

2014-02-23 Thread Wietse Venema
Dirk St?cker: > Hello, > > I'm lost and don't find any solution anymore, so I now need to ask. If in doubt, turn off chroot. Some Linux distributions mistakenly turn it on and make Postfix unnecessarily difficult to use. Wietse http://www.postfix.org/DEBUG_README.html#no_chroot TRY TUR

Aw: Re: Re: Problem with filtering GMX emails in sender_access

2014-02-23 Thread Peter Marius
I might switch from Dovecot to Courier or something else one day, but will probably always use Postfix, so it is less work and I like to catch the "bad guys" as early as possible in the chain, will try header_checks now. :-) Yeah, discarding feels little harsh, but the last 10-15 years the mails

TLS client logging PATCH: (was: Always "Untrusted TLS" for own Postfix instances)

2014-02-23 Thread Viktor Dukhovni
On Sun, Feb 23, 2014 at 02:28:07PM +0100, Dirk St?cker wrote: > And whatever I do I'm unable to get any of these three to show a > trusted connection to any of the others. It trusts Google and GMX > and whatever, but not my own servers. That's disturbing. > > Here the configs I use essentially E

Re: TLS client logging PATCH: (was: Always "Untrusted TLS" for own Postfix instances)

2014-02-23 Thread Wietse Venema
Viktor Dukhovni: > diff --git a/src/tls/tls_client.c b/src/tls/tls_client.c > --- a/src/tls/tls_client.c > +++ b/src/tls/tls_client.c > @@ -1045,7 +1045,9 @@ TLS_SESS_STATE *tls_client_start(const > TLS_CLIENT_START_PROPS *props) > */ > if (log_mask & TLS_LOG_SUMMARY) > msg_info("

notify by email mail queue

2014-02-23 Thread Pol Hallen
Hi all :-) I'm searching for how notify by email the mail queue... (if there're emails inside queue). Any idea? thanks! Pol

Re: notify by email mail queue

2014-02-23 Thread li...@rhsoft.net
Am 23.02.2014 19:22, schrieb Pol Hallen: > Hi all :-) I'm searching for how notify by email the mail queue... (if > there're emails inside queue). Any idea? will not help much if it's too late and you reveive no mails at all but in most caes enough to realize that there is a problem growing /et

Re: notify by email mail queue

2014-02-23 Thread Pol Hallen
Cheers! Very thanks boy :-) Pol > Am 23.02.2014 19:22, schrieb Pol Hallen: >> Hi all :-) I'm searching for how notify by email the mail queue... (if >> there're emails inside queue). Any idea? > > will not help much if it's too late and you reveive > no mails at all but in most caes enough to rea

Re: Always "Untrusted TLS" for own Postfix instances

2014-02-23 Thread Viktor Dukhovni
On Sun, Feb 23, 2014 at 12:38:26PM -0500, Wietse Venema wrote: > Applied to Postfix 2.8 and onwards. Thanks. Returning to the OP's question, disabling anonymous cipher-suites will no substantially help to (after the fact) detect MITM attacks. All the attacker has to do is present some other cer

defer problem

2014-02-23 Thread Pol Hallen
I'm not sure if anyone use policyd (postfix cluebringer) but I can't solve a noise problem. policyd put limits to a number of emails, so reading this post from policyd: http://lists.policyd.org/pipermail/users_lists.policyd.org/2013-December/004283.html "I think You want postfix to accept all mai

Re: defer problem

2014-02-23 Thread Wietse Venema
Postfix has built-in rate limiting for outbound mail. See the rate_delay example in http://www.postfix.org/QSHAPE_README.html#backlog Wietse

Re: TLS client logging PATCH

2014-02-23 Thread Dirk Stöcker
On Sun, 23 Feb 2014, Viktor Dukhovni wrote: On Sun, Feb 23, 2014 at 02:28:07PM +0100, Dirk St?cker wrote: And whatever I do I'm unable to get any of these three to show a trusted connection to any of the others. It trusts Google and GMX and whatever, but not my own servers. That's disturbing.

Re: TLS client logging PATCH

2014-02-23 Thread li...@rhsoft.net
Am 23.02.2014 23:57, schrieb Dirk Stöcker: > Seems Postfix still need to learn a lot about secure connections seems you need to do so in case of opportunistic there is not real trust trusted in case of a secure connection means both sides know each other - opportunistic means the other side nee

Re: TLS client logging PATCH

2014-02-23 Thread Dirk Stöcker
On Mon, 24 Feb 2014, li...@rhsoft.net wrote: Seems Postfix still need to learn a lot about secure connections seems you need to do so in case of opportunistic there is not real trust trusted in case of a secure connection means both sides know each other - opportunistic means the other side

Re: TLS client logging PATCH

2014-02-23 Thread Dirk Stöcker
On Sun, 23 Feb 2014, Dirk Stöcker wrote: If this is important to you, set: smtp_tls_exclude_ciphers=aNULL for the transport that delivers mail between your internal systems. Does not sound like what I want. I don't want to hardcode a specific handling for some servers, I want that the "

Re: TLS client logging PATCH

2014-02-23 Thread Viktor Dukhovni
On Sun, Feb 23, 2014 at 11:57:35PM +0100, Dirk St?cker wrote: > >When both sides are Postfix, and the client is opportunistic, the > >server and client typically agree to a cipher-suite without any > >certificates. Why bother, if the client does not check anyway. > > Because it allows to at to l

Re: TLS client logging PATCH

2014-02-23 Thread Viktor Dukhovni
On Mon, Feb 24, 2014 at 12:25:50AM +0100, Dirk St?cker wrote: > >> smtp_tls_exclude_ciphers=aNULL > >> > >> for the transport that delivers mail between your internal systems. > > > >Does not sound like what I want. I don't want to hardcode a > >specific handling for some servers, I want that the

Re: TLS client logging PATCH

2014-02-23 Thread Dirk Stöcker
On Sun, 23 Feb 2014, Viktor Dukhovni wrote: smtp_tls_verify_certs=whenpossible SMTP is not HTTP. Due to MX indirection, peer authentication is not possible without explicit per-destination configuration. Once you've gone to all that trouble, you may as well configure a "secure" channel. I

Re: TLS client logging PATCH

2014-02-23 Thread Dirk Stöcker
On Sun, 23 Feb 2014, Viktor Dukhovni wrote: I hope there aren't any TLS capable mailservers, which fallback to unencrypted transmission, when I use this. Fallback is up the client. I am not aware of any Internet facing MX hosts that offer STARTTLS without any server certificate. Lots of SMTP

Re: TLS client logging PATCH

2014-02-23 Thread li...@rhsoft.net
Am 24.02.2014 01:16, schrieb Dirk Stöcker: > On Sun, 23 Feb 2014, Viktor Dukhovni wrote: >>> smtp_tls_verify_certs=whenpossible >> >> SMTP is not HTTP. Due to MX indirection, peer authentication is >> not possible without explicit per-destination configuration. Once >> you've gone to all that

Re: TLS client logging PATCH

2014-02-23 Thread LuKreme
On 23 Feb 2014, at 15:57 , Dirk Stöcker wrote: > Seems Postfix still need to learn a lot about secure connections. Your No, you are simply not understanding the purpose of opportunistic TLS. The purpose is not to verify identity, but simply to encrypt the transmission channel. Identity is meani

Re: TLS client logging PATCH

2014-02-23 Thread Wietse Venema
Dirk St?cker: > On Sun, 23 Feb 2014, Viktor Dukhovni wrote: > > >> I hope there aren't any TLS capable mailservers, which fallback to > >> unencrypted transmission, when I use this. > > > > Fallback is up the client. I am not aware of any Internet facing > > MX hosts that offer STARTTLS without a

Re: TLS client logging PATCH

2014-02-23 Thread Viktor Dukhovni
On Mon, Feb 24, 2014 at 01:16:39AM +0100, Dirk St?cker wrote: > >SMTP is not HTTP. Due to MX indirection, peer authentication is > >not possible without explicit per-destination configuration. Once > >you've gone to all that trouble, you may as well configure a "secure" > >channel. > > I know t

Re: qmgr_queue_throttle not fired up in 2.12.20140209

2014-02-23 Thread Wietse Venema
hould not rely on this old bug forever. It will eventually > > > be fixed. > > > > > Get it. > > Thank you > > Moreover, snapshot 20140219 does not change anything: the test that > I added is a NOOP. Thus, the 20140219 SMTP client behaves the same > way as

Finding source of illegal address from localhost

2014-02-23 Thread john
I have the following log entry: (Slightly modified to protect the innocent, changed actual name to user and domain to example) " 2014-02-24T16:45:12.836244+11:00 penguin postfix/smtpd[6520]: warning: Illegal address syntax from localhost[127.0.0.1] in MAIL command: <-timeshare.escape.artist-use