[pfx] Re: SASL options

2024-12-21 Thread Peter via Postfix-users
On 22/12/24 02:54, Michael Tokarev via Postfix-users wrote: However, there are other mechanisms being developed, for example OAUTH2, which, in terms of Cyrus SASL, does not work with saslauthd at all, I don't see why it wouldn't. so needs direct integration within postfix in a form of plugin

[pfx] Re: SASL options

2024-12-21 Thread Peter via Postfix-users
On 22/12/24 03:19, Tomasz Pala via Postfix-users wrote: What's worth mentioning is that PLAIN/LOGIN also requires cleartext password storage - on the client side. This is not entirely true. It is possible for a client to store passwords in an encrypted db which is decrypted with its own pass

[pfx] Re: PoC: `postfix chroot' command

2024-12-21 Thread Wietse Venema via Postfix-users
Michael Tokarev via Postfix-users: > 21.12.2024 20:55, Viktor Dukhovni via Postfix-users wrote: > > On Sat, Dec 21, 2024 at 08:35:29PM +0300, Michael Tokarev via Postfix-users > > wrote: > > > >> 21.12.2024 20:15, Michael Tokarev via Postfix-users wrote: > >> > >>> plus a few other workarounds fo

[pfx] Re: PoC: `postfix chroot' command

2024-12-21 Thread Michael Tokarev via Postfix-users
21.12.2024 16:30, Tomasz Pala via Postfix-users wrote: The real problem is I can't really confine local, as it's the same CGroup as the rest of postfix, so the holes punched for example for postfix-script cannot be sealed and are kept for good. As I demonstrated before, it's rather trivial to

[pfx] Re: PoC: `postfix chroot' command

2024-12-21 Thread Wietse Venema via Postfix-users
Tomasz Pala via Postfix-users: > On 2024-12-20 19:02, Wietse Venema via Postfix-users wrote: > > > >> You say "local is non-chrootable" - I say local is the mostly exposed, > >> running user-provided content, binary and environment. It's the local > >> which can exploit CVE in your kernel. You're

[pfx] Re: SASL options

2024-12-21 Thread Michael Tokarev via Postfix-users
21.12.2024 18:31, Wietse Venema via Postfix-users wrote: Michael Tokarev via Postfix-users: It *feels* like postfix needs some separation of this sasl stuff into its own process somehow, similar to how proxymap is done, so that eg cyrus sasl code is not linked directly into smtp[d] with all it

[pfx] Re: PoC: `postfix chroot' command

2024-12-21 Thread Michael Tokarev via Postfix-users
21.12.2024 20:15, Michael Tokarev via Postfix-users wrote: plus a few other workarounds for lack of cap-dac-override. It looks like it's hardly possible to get away from cap_dac_override, because it is relied on in a number of other places. Currently postfix happily opens non-root-owned maps b

[pfx] Re: PoC: `postfix chroot' command

2024-12-21 Thread Michael Tokarev via Postfix-users
21.12.2024 20:55, Viktor Dukhovni via Postfix-users wrote: On Sat, Dec 21, 2024 at 08:35:29PM +0300, Michael Tokarev via Postfix-users wrote: 21.12.2024 20:15, Michael Tokarev via Postfix-users wrote: plus a few other workarounds for lack of cap-dac-override. It looks like it's hardly poss

[pfx] Re: SASL options

2024-12-21 Thread Wietse Venema via Postfix-users
Michael Tokarev via Postfix-users: > I still yet to see the reason for this, besides a statement "chroot is > painless for freebsd but for linux is unsupportable", which is nothing > but a big old myth, since the two works the same. That is a myth, because we already discussed that glibc needs fil

[pfx] Re: SASL options

2024-12-21 Thread Michael Tokarev via Postfix-users
21.12.2024 19:51, Wietse Venema via Postfix-users wrote: Michael Tokarev via Postfix-users: I still yet to see the reason for this, besides a statement "chroot is painless for freebsd but for linux is unsupportable", which is nothing but a big old myth, since the two works the same. That is a

[pfx] Re: SASL options

2024-12-21 Thread Tomasz Pala via Postfix-users
On 2024-12-21 14:54, Michael Tokarev via Postfix-users wrote: > > cleartext password (storage) is required for many SASL mechanisms over > than PLAIN. And none of these mechanisms work with -a pam or with [...] > However, there are other mechanisms being developed, for example OAUTH2, What's wor

[pfx] Re: SASL options

2024-12-21 Thread Tomasz Pala via Postfix-users
On 2024-12-21 11:51, Michael Tokarev via Postfix-users wrote: > > We've basically two big kinds of SASL mechanisms: plaintext > (which are login and plain) and non-plaintest (everything else). [...] > There's nothing in the docs saying if dovecot sasl can work with > non-plaintext mechanisms. In

[pfx] Re: SASL options

2024-12-21 Thread Michael Tokarev via Postfix-users
21.12.2024 16:16, Viktor Dukhovni via Postfix-users wrote: On Sat, Dec 21, 2024 at 01:51:46PM +0300, Michael Tokarev via Postfix-users wrote: ... As far as I can see, Cyrus SASL can work with plaintext methods using saslauthd (which has very simple username,password => ok|bad protocol), and ca

[pfx] Re: PoC: `postfix chroot' command

2024-12-21 Thread Viktor Dukhovni via Postfix-users
On Sat, Dec 21, 2024 at 08:35:29PM +0300, Michael Tokarev via Postfix-users wrote: > 21.12.2024 20:15, Michael Tokarev via Postfix-users wrote: > > > plus a few other workarounds for lack of cap-dac-override. > > It looks like it's hardly possible to get away from cap_dac_override, > because it

[pfx] Re: PoC: `postfix chroot' command

2024-12-21 Thread Tomasz Pala via Postfix-users
On 2024-12-20 19:02, Wietse Venema via Postfix-users wrote: > >> You say "local is non-chrootable" - I say local is the mostly exposed, >> running user-provided content, binary and environment. It's the local >> which can exploit CVE in your kernel. You're not preventing any of this. > > I think

[pfx] Re: SASL options

2024-12-21 Thread Viktor Dukhovni via Postfix-users
On Sat, Dec 21, 2024 at 01:51:46PM +0300, Michael Tokarev via Postfix-users wrote: > Hi! > > I'm trying to get a "big picture" about how postfix works with > various SASL options. It looks like there's a big overview > missing in the docs somehow. > > We've basically two big kinds of SASL mecha

[pfx] Re: PoC: `postfix chroot' command

2024-12-21 Thread Michael Tokarev via Postfix-users
22.12.2024 01:10, Wietse Venema via Postfix-users wrote: Michael Tokarev via Postfix-users: 21.12.2024 20:55, Viktor Dukhovni via Postfix-users wrote: It looks like it's hardly possible to get away from cap_dac_override, because it is relied on in a number of other places. Currently postfix

[pfx] Re: PoC: `postfix chroot' command

2024-12-21 Thread Michael Tokarev via Postfix-users
21.12.2024 22:16, Michael Tokarev via Postfix-users wrote: 21.12.2024 20:55, Viktor Dukhovni via Postfix-users wrote: I suggest you take a break from high-volume extemporising, and come back with narrow, carefully thought out issues or questions tackled one at a time to a conclusion, with some

[pfx] Re: SASL options

2024-12-21 Thread Michael Tokarev via Postfix-users
22.12.2024 03:39, Peter via Postfix-users wrote: On 22/12/24 02:54, Michael Tokarev via Postfix-users wrote: However, there are other mechanisms being developed, for example OAUTH2, which, in terms of Cyrus SASL, does not work with saslauthd at all, I don't see why it wouldn't. saslauthd ha

[pfx] Re: maillog_file Setting Breaks SELinux on RHEL

2024-12-21 Thread Peter via Postfix-users
On 21/12/24 12:37, E R via Postfix-users wrote: Curious if there are others using the maillog_file setting who have found that "out of the box" RHEL 8+ or 9+ will not allow Postfix to start? I worked around the issue by creating a policy module for testing purposes thanks to the help the SELInux

[pfx] SASL options

2024-12-21 Thread Michael Tokarev via Postfix-users
Hi! I'm trying to get a "big picture" about how postfix works with various SASL options. It looks like there's a big overview missing in the docs somehow. We've basically two big kinds of SASL mechanisms: plaintext (which are login and plain) and non-plaintest (everything else). The "everything

[pfx] Re: SASL options

2024-12-21 Thread Wietse Venema via Postfix-users
Michael Tokarev via Postfix-users: > There's nothing in the docs saying if dovecot sasl can work with > non-plaintext mechanisms. In almost all docs and examples I've > found, dovecot side of the config is configured with > "auth_mechanisms = plain login". There are some vague references > to usa