Re: About bounce nonexist mx server mails

2009-01-08 Thread Geert Hendrickx
On Thu, Jan 08, 2009 at 11:26:57AM +0800, tony liu wrote: > Hello, > > When my customers send mails with nonsexist domain(sometimes maybe typo > error, EX. u...@hotmail.org ), these mails will be rejected and in queue for > a long time(normally 5 days), Is there a way for postfix to remove these

Re: About bounce nonexist mx server mails

2009-01-08 Thread Geert Hendrickx
On Thu, Jan 08, 2009 at 09:59:54AM -0300, Reinaldo de Carvalho wrote: > On Thu, Jan 8, 2009 at 6:01 AM, Geert Hendrickx wrote: > > > > You can just refuse them: put "reject_unknown_recipient_domain" in your > > smtpd_recipient_restrictions -- assuming the typo do

Re: Properly Specifying RBL in main.cf

2009-01-16 Thread Geert Hendrickx
On Thu, Jan 15, 2009 at 01:56:11PM -0800, Rich Shepard wrote: > On Thu, 15 Jan 2009, mouss wrote: > >> if you forward DNS queries to your ISP, then the rate limit applies to >> your ISP. spamhaus don't see mail hitting your servers. They only see DNS >> queries. > > Ah, so! That explains it. I ru

Re: Mail certificate

2009-01-22 Thread Geert Hendrickx
On Thu, Jan 22, 2009 at 11:08:52AM +0200, Tolga wrote: >> http://www.google.com/search?q=self+signed+certificate > I have been reading > https://help.ubuntu.com/8.04/serverguide/C/postfix.html and I applied > some parts and skipped some (as I don't have SASL anywhere mentioned in > main.cf), and I

Re: XCLIENT question

2009-01-29 Thread Geert Hendrickx
On Thu, Jan 29, 2009 at 12:22:13PM +0100, mouss wrote: > Jan 29 00:38:17 imlil postmx/smtpd[26222]: NOQUEUE: reject: RCPT from > unknown[147.203.208.166]: 550 5.7.1 Client host rejected: cannot find > your hostname, [147.203.208.166]; > from=<3ff.4.69709687-17084...@cherryimprovise.com> to= > proto

Re: user getting spoofed

2009-02-19 Thread Geert Hendrickx
ta_restrictions = > check_sender_access hash:/etc/postfix/backscatterer > > # backscatterer > <> reject_rbl_client ips.backscatterer.org Just wondering; why do you apply this in smtpd_data_restrictions and not in smtpd_sender_restrictions? Geert -- Geert Hendrick

Re: Urgent Postfix User Unknown issue:

2009-05-08 Thread Geert Hendrickx
README. PS: you should post complete `postconf -n` output rather than just snippets from your main.cf file. Geert -- Geert Hendrickx -=- g...@telenet.be -=- PGP: 0xC4BB9E9F This e-mail was composed using 100% recycled spam messages!

Re: Proxying a policy service

2009-05-14 Thread Geert Hendrickx
server too, all connecting to a central (not replicated) MySQL. Policyd's behaviour when MySQL becomes unavailable is configurable, it can either tempfail (4xx) all incoming e-mail or "dunno" it. Geert -- Geert Hendrickx -=- g...@telenet.be -=- PGP: 0xC4BB9E9F This e-mail was composed using 100% recycled spam messages!

Re: Proxying a policy service

2009-05-14 Thread Geert Hendrickx
al well > with interrupted connections, from what I found on google. FWIW, policyd v2 uses innodb. Geert -- Geert Hendrickx -=- g...@telenet.be -=- PGP: 0xC4BB9E9F This e-mail was composed using 100% recycled spam messages!

Re: how to specify a "default key" in access(5)

2010-02-14 Thread Geert Hendrickx
are in the same domain, you can specify a catch-all address with the domain-default action: us...@example.com action1 us...@example.com action2 @example.com REJECT foobar Geert -- Geert Hendrickx -=- g...@telenet.be -=- PGP: 0xC4BB9E9F This e-mail was composed using 100% recycled spam messages!

Re: Exempting localhost from STARTTLS

2009-09-10 Thread Geert Hendrickx
by postfix and just want to drop the messages into your mailbox, you could just as well deliver directly via procmail, dovecot deliver or any other LDA. Or use Postfix' sendmail command line interface. Just add "mda /path/do/delivry/program" to your .fetchmailrc. Geert -

Re: run external command when new mail arrives

2009-10-20 Thread Geert Hendrickx
r, but a policy daemon would probably be more efficient for your case: http://www.postfix.org/SMTPD_POLICY_README.html Geert -- Geert Hendrickx -=- g...@telenet.be -=- PGP: 0xC4BB9E9F This e-mail was composed using 100% recycled spam messages!

Re: run external command when new mail arrives

2009-10-20 Thread Geert Hendrickx
ing "virtual_transport" to it. http://www.postfix.org/postconf.5.html#virtual_transport http://www.postfix.org/master.5.html Geert -- Geert Hendrickx -=- g...@telenet.be -=- PGP: 0xC4BB9E9F This e-mail was composed using 100% recycled spam messages!

Re: run external command when new mail arrives

2009-10-20 Thread Geert Hendrickx
Look for transport_* settings in postconf(5), you can all override them for "myprog" specifically with myprog_*. Geert -- Geert Hendrickx -=- g...@telenet.be -=- PGP: 0xC4BB9E9F This e-mail was composed using 100% recycled spam messages!

Re: run external command when new mail arrives

2009-10-20 Thread Geert Hendrickx
maildrop? :-) Geert -- Geert Hendrickx -=- g...@telenet.be -=- PGP: 0xC4BB9E9F This e-mail was composed using 100% recycled spam messages!

Re: run external command when new mail arrives

2009-10-20 Thread Geert Hendrickx
x27;s next release, couldn't it? "that way" is "via pipe". You can invoke maildrop via pipe as in: maildrop unix - n n - - pipe flags=DRhu user=vmail argv=/usr/local/bin/maildrop -d ${recipient} It was just an example. Gee

Re: run external command when new mail arrives

2009-10-21 Thread Geert Hendrickx
s.yourdomain.net smsnotif: Where you define smsnotif in master.cf with "pipe" to a script of your own. Be careful about error handling here, so you don't start bouncing mails to senders when the sms script doesn't work. For something non- essential as SMS notification

Re: run external command when new mail arrives

2009-10-21 Thread Geert Hendrickx
On Wed, Oct 21, 2009 at 06:52:21PM +0500, rihad wrote: > Geert Hendrickx wrote: > >In your case (SMS notifications) however, I would keep things simple > >and not try to integrate it so tightly into the delivery process, but > >just fork your incoming mails to two transports:

Re: Accept null HELO/EHLO

2009-10-22 Thread Geert Hendrickx
s that send incorrect MAIL FROM or RCPT TO addresses syntax. > > > > > > Similar mappings may solve problems with REMOTE SMTP server responses, > > > or with SMTP client or server outputs by Postfix itself. > > > > > > Wietse > > > > -- Geert Hendrickx -=- g...@telenet.be -=- PGP: 0xC4BB9E9F This e-mail was composed using 100% recycled spam messages!

Re: Accept null HELO/EHLO

2009-10-23 Thread Geert Hendrickx
; prefixes on some labels. > > This said, I would really discourage any attempts to do domain > replacement with regexp command editing. You're probably right, there are too many different cases to be handled by simple regexpes. But a separate "rewrite olddomain to newdomain" feat

Re: In-queue rejections

2009-12-30 Thread Geert Hendrickx
d_recipient_restrictions. This will make Postfix respond with: 450 4.1.2 : Recipient address rejected: Domain not found Geert -- Geert Hendrickx -=- g...@telenet.be -=- PGP: 0xC4BB9E9F This e-mail was composed using 100% recycled spam messages!

Re: *Slightly OT* DNSBL Opinions.

2008-08-22 Thread Geert Hendrickx
On Tue, Aug 19, 2008 at 09:27:39PM -0400, Adam C. Mathews wrote: > Presenting using the following blacklists... > > dul.dnsbl.sorbs.net > psbl.surriel.com > zen.spamhaus.org > > > These do a good job for me, but I wanted to look for opinions on a > couple additional ones. Specifically look for

Re: Chrooting smtp (non-d) client activity for resolv.conf segregation

2008-12-03 Thread Geert Hendrickx
On Wed, Dec 03, 2008 at 09:59:17PM -0500, brian dodds wrote: > On Wed, Dec 3, 2008 at 8:25 PM, Wietse Venema <[EMAIL PROTECTED]> wrote: > > > > Some third-party library is calling stuff before Postfix chroots. > > > > Postfix does not support chroot environments that are out of sync > > with the ho

Re: Domain emails from outside

2008-12-04 Thread Geert Hendrickx
On Thu, Dec 04, 2008 at 10:15:55AM -0500, Sahil Tandon wrote: > Gabriel Hahmann <[EMAIL PROTECTED]> wrote: > > > I'm new to the list and have a problem with my mail system. Recently I'm > > receiving a lot of spam emails coming from the internet but the sender is a > > user from my domain. Then I

Re: RBL

2008-12-07 Thread Geert Hendrickx
On Sun, Dec 07, 2008 at 11:13:15AM -0500, Sahil Tandon wrote: > Also consider rejecting machines that HELO (or EHLO) with "dynamic > looking" hostnames. As well as your own IP, hostname and domain(s). No-one shoud use those as their HELO, but some (stupid) spammers do (hoping to get whitelisted

Re: reject_unverified_recipient and control the route of probe messages

2008-12-10 Thread Geert Hendrickx
On Wed, Dec 10, 2008 at 04:38:17PM +0100, Dennis // [EMAIL PROTECTED] wrote: > My questions are: > As the spamscanners are the best or primary MX´s > for the customers domains, would postfix then just probe itself, and > always get a positive answer due to my catch-all entry ? > > Or would postfix

Re: reject_unverified_recipient and control the route of probe messages

2008-12-10 Thread Geert Hendrickx
On Wed, Dec 10, 2008 at 05:36:04PM +0100, Dennis // [EMAIL PROTECTED] wrote: > But how would recipient verification behave when the customers > mailserver is unavailable ? Postfix then sends a temporary failure (4xx) back to the client. > Would one have to rely on the cache or would postfix hol

egrep deprecation warning (Re: Urgent Postfix stable release 3.7.3 and non-urgent legacy releases 3.6.7, 3.5.17, 3.4.27)

2022-10-10 Thread Geert Hendrickx
On Mon, Oct 10, 2022 at 07:22:18 -0400, Wietse Venema wrote: > To find out if you have messages flagged as "corrupt", you can > use the "postfix check" command. > > Execute as root: > > postfix check > FYI, with grep 3.8, this triggers deprecation warnings on 'egrep': $ s

Re: submission configuration and RFC 6409

2022-10-12 Thread Geert Hendrickx
On Wed, Oct 12, 2022 at 10:41:36 -0400, Wietse Venema wrote: > local_header_rewrite_clients = permit_mynetworks, permit_sasl_authenticated > > Why it isn't the default I cannot remember. The HISTORY file says it is: > 20041014-23 > > Postfix still appends $@myorigin or .$mydomain to hea

[pfx] Re: Postfix stable release 3.8.1, and legacy releases 3.7.6, 3.6.10, 3.5.20

2023-06-06 Thread Geert Hendrickx via Postfix-users
On Tue, Jun 06, 2023 at 09:48:11 -0400, Wietse Venema via Postfix-users wrote: > * Optional: harden a Postfix SMTP server against remote SMTP > clients that violate RFC 2920 (or 5321) command pipelining > constraints. With "smtpd_forbid_unauth_pipelining = yes", the > server disconnec

[pfx] Re: Postfix stable release 3.8.1, and legacy releases 3.7.6, 3.6.10, 3.5.20

2023-06-06 Thread Geert Hendrickx via Postfix-users
On Tue, Jun 06, 2023 at 10:31:30 -0400, Wietse Venema via Postfix-users wrote: > Geert Hendrickx via Postfix-users: > > What is the relation between new "smtpd_forbid_unauth_pipelining" > > and existing "reject_unauth_pipelining" in smtpd_*_restrictions?

[pfx] Re: TAKE NOTE: "2 1 1" TLSA records vs. apparent change of Let's Encrypt default certificate chain

2023-11-15 Thread Geert Hendrickx via Postfix-users
On Wed, Nov 15, 2023 at 10:29:41 -0500, James Cloos via Postfix-users wrote: > LE announced a while back that they would not renew the cross cert. Yes, but dropping the cross-signed X1 root cert from the default chain last week was an accident: https://community.letsencrypt.org/t/shortening-the-l

[pfx] Re: Postfix authenticated sender and From: header verification

2023-12-20 Thread Geert Hendrickx via Postfix-users
On Mon, Dec 18, 2023 at 17:40:49 -0500, Wietse Venema via Postfix-users wrote: > Viktor Dukhovni via Postfix-users: > > - Postfix 3.9 (pending official release soon), rejects unuthorised > > pipelining by default: "smtpd_forbid_unauth_pipelining = yes". > > > > - Postfix 3.8.1, 3.7.6, 3.6.10 and

[pfx] Re: SMTP Smuggling disclosure process & VINCE

2023-12-24 Thread Geert Hendrickx via Postfix-users
On Sat, Dec 23, 2023 at 18:09:10 -0500, Wietse Venema via Postfix-users wrote: > Note that only the encapsulating message can contain a DKIM signature > by the authenticated sender's domain. The smuggled message caannot > contain a DKIM signature by the impersonated sender's domain unless > the att

[pfx] Re: SMTP Smuggling, workarounds and fix

2024-01-04 Thread Geert Hendrickx via Postfix-users
On Thu, Dec 21, 2023 at 07:51:31 -0500, Wietse Venema via Postfix-users wrote: > * With all Postfix versions, "smtpd_data_restrictions = > reject_unauth_pipelining" will stop the published exploit. Hi I just found an unexpected side effect of this particular configuration (unrelated to SMT

[pfx] Re: SMTP Smuggling, workarounds and fix

2024-01-04 Thread Geert Hendrickx via Postfix-users
On Thu, Jan 04, 2024 at 10:36:23 -0500, Wietse Venema via Postfix-users wrote: > Wietse Venema via Postfix-users: > > Geert Hendrickx via Postfix-users: > > > I just found an unexpected side effect of this particular configuration > > > (unrelated to SMTP smuggling). &g

[pfx] Re: SMTP Smuggling with long-term fix

2024-01-06 Thread Geert Hendrickx via Postfix-users
On Sat, Jan 06, 2024 at 14:47:59 -0500, Wietse Venema via Postfix-users wrote: > Damian: > > If I remember correctly, on the wire there was \r\n\r\n.\r\r\n > > Viktor Dukhovni: > > Does that also need to be more strict? :-( > > Indeed, and as usual the fix is trivial. This process is backwards,

[pfx] Re: SMTP Smuggling with long-term fix

2024-01-07 Thread Geert Hendrickx via Postfix-users
On Sat, Jan 06, 2024 at 20:10:34 -0500, Wietse Venema via Postfix-users wrote: > People are welcome to test tools against postfix-3.9-20240106. With postfix-3.9-20240106 (with smtpd_forbid_bare_newline=yes but smtpd_forbid_unauth_pipelining=no) all smuggling tests now fail, including CRCRL tests.

[pfx] Re: What features to deprecate

2024-02-13 Thread Geert Hendrickx via Postfix-users
On Tue, Feb 13, 2024 at 12:23:32 -0500, Wietse Venema via Postfix-users wrote: > - masquerade_domains complicates table-driven address validation. > Log a deprecation warning with compatibility_levels>=3.9. What's the alternative for masquerade_domains ? Geert

[pfx] Re: What features to deprecate

2024-02-14 Thread Geert Hendrickx via Postfix-users
On Tue, Feb 13, 2024 at 12:51:51 -0500, Viktor Dukhovni via Postfix-users wrote: > On Tue, Feb 13, 2024 at 06:32:14PM +0100, Geert Hendrickx via Postfix-users > wrote: > > What's the alternative for masquerade_domains ? > > It is canonical_maps, ideally with explicit map

[pfx] Re: Misunderstanging on masquerade_domains and rewriting in master.conf

2024-03-07 Thread Geert Hendrickx via Postfix-users
On Thu, Mar 07, 2024 at 00:22:31 +0100, Steffen Nurpmeso via Postfix-users wrote: > Thanks to the README i got it going with > > masquerade_domains = $mydomain > local_header_rewrite_clients = permit_mynetworks,permit_tls_clientcerts > > However, i first tried to add these via -o to the abov

[pfx] non_smtpd relayhost ?

2024-06-21 Thread Geert Hendrickx via Postfix-users
Hi We have few different sets of Postfix mailservers with different roles; inbound servers, outbound servers that DKIM sign outgoing mail with a milter, and some other servers that just relay mail that is already signed elsewhere. The first and third types of mailservers don't need to sign mail p

[pfx] Re: non_smtpd relayhost ?

2024-06-21 Thread Geert Hendrickx via Postfix-users
On Fri, Jun 21, 2024 at 16:22:24 -0400, Wietse Venema wrote: > Locally-generated bounces are generated by the Postfix bounce > daemon which talks to a cleanup service to queue a message. > One could run bounce daemons with a cleanup_service override > in master.cf: Thanks Wietse, that makes sens

[pfx] Re: struggling with smtpd_tls_security_level = encrypt - 5.7.0 Must issue a STARTTLS command first

2024-09-08 Thread Geert Hendrickx via Postfix-users
On Mon, Sep 09, 2024 at 00:17:08 +1000, Viktor Dukhovni via Postfix-users wrote: > And of course, I'd negligent to not mention that I don't recommend a hard > requirement of TLS on port 25, you may one day reject some important mail > and not even know it, and if STARTTLS stops working, you may be

[pfx] Re: struggling with smtpd_tls_security_level = encrypt - 5.7.0 Must issue a STARTTLS command first

2024-09-08 Thread Geert Hendrickx via Postfix-users
On Sun, Sep 08, 2024 at 19:39:43 +0200, hostmaster--- via Postfix-users wrote: > Interesting approach if i correctly understood what you do: You are running > STARTTLS, basically accepting unencrypted connections but with > "warn_if_reject reject_plaintext_session" you are rejecting unencrypted > s

[pfx] Re: Stop OS enumeration

2024-10-17 Thread Geert Hendrickx via Postfix-users
On Thu, Oct 17, 2024 at 12:18:54 +0200, Matus UHLAR - fantomas via Postfix-users wrote: > > On Tue, Oct 15, 2024 at 16:03:13 +0100, Paul Fowler via Postfix-users wrote: > > > Are there best practices for avoid OS username enumeration on a mail > > > relay? > > On 1

[pfx] Re: Stop OS enumeration

2024-10-16 Thread Geert Hendrickx via Postfix-users
On Tue, Oct 15, 2024 at 16:03:13 +0100, Paul Fowler via Postfix-users wrote: > Are there best practices for avoid OS username enumeration on a mail relay? Just set local_recipient_maps appropriately, without unix:passwd.byname if you don't need it. I set it to $alias_maps plus an inline:{} list

[pfx] OpenSSL compile vs. runtime version warning

2024-10-25 Thread Geert Hendrickx via Postfix-users
Hi > warning: run-time library vs. compile-time header version mismatch: > OpenSSL 3.4.0 may not be compatible with OpenSSL 3.3.0 Is this warning still relevant with OpenSSL's new versioning scheme, where OpenSSL 3.x releases are guaranteed[1] to be ABI compatible ? [1] https://openssl-library.

[pfx] Re: smtp_tls_security_level defaults question

2024-10-24 Thread Geert Hendrickx via Postfix-users
On Thu, Oct 24, 2024 at 11:33:22 -0400, Wietse Venema via Postfix-users wrote: > And for the Postfix SMTP server, this would add two guards > to Viktor's example: > > smtpd_tls_security_level = > ${{$compatibility_level} >=level {3.10} ? > {${built_with_tls ? >

[pfx] Re: Postfix and OpenSSL provider algorithms

2024-09-18 Thread Geert Hendrickx via Postfix-users
On Thu, Sep 19, 2024 at 02:02:50 +1000, Viktor Dukhovni via Postfix-users wrote: > This makes it possible to write "forward-looking" configs that will use > newer groups once they're available in the OpenSSL runtime. Well actually, in this case it achieves the opposite, as the individual checking

[pfx] Re: Patch: Postfix and OpenSSL provider algorithms

2024-09-23 Thread Geert Hendrickx via Postfix-users
On Mon, Sep 23, 2024 at 18:32:00 +1000, Viktor Dukhovni via Postfix-users wrote: > This is not a release-notes-worthy change, just avoids loss of minor forensic > detail for externally loaded kex "groups" (or, more generally, KEMs). That's only true for the very last change - but the entire chang

[pfx] Re: Patch: Postfix and OpenSSL provider algorithms

2024-09-23 Thread Geert Hendrickx via Postfix-users
On Fri, Sep 20, 2024 at 20:06:43 +1000, Viktor Dukhovni via Postfix-users wrote: > If it is possible to test kyber768 with OpenSSL 3.0 or 3.1, please do, > and post your findings to the list. Tested with OpenSSL 3.0 as well now (RHEL 9 version), with oqs-provider added. $ openssl version OpenSSL

[pfx] Re: Postfix and OpenSSL provider algorithms

2024-09-18 Thread Geert Hendrickx via Postfix-users
On Thu, Sep 19, 2024 at 01:01:42 +1000, Viktor Dukhovni via Postfix-users wrote: > The OBJ_sn2nid() function is not extensible, and not affected by loading > of providers. To actually be able to map this algorithm to a "nid", the > base OpenSSL code would have to know about "x25519_kyber768". Ok

[pfx] Re: Patch: Postfix and OpenSSL provider algorithms

2024-09-19 Thread Geert Hendrickx via Postfix-users
On Thu, Sep 19, 2024 at 08:26:53 +0200, Geert Hendrickx via Postfix-users wrote: > I confirm your patch works, I can now use these new key exchanges in Postfix. Could the reverse lookup be fixed as well, for Received headers and logging? > Anonymous TLS connection established from X: T

[pfx] Re: Patch: Postfix and OpenSSL provider algorithms

2024-09-19 Thread Geert Hendrickx via Postfix-users
On Thu, Sep 19, 2024 at 19:10:05 +1000, Viktor Dukhovni via Postfix-users wrote: > On Thu, Sep 19, 2024 at 10:01:16AM +0200, Geert Hendrickx via Postfix-users > wrote: > > > > Anonymous TLS connection established from X: TLSv1.3 with cipher > > > TLS_AES_128_GCM_SHA2

[pfx] Postfix and OpenSSL provider algorithms

2024-09-18 Thread Geert Hendrickx via Postfix-users
Hi Viktor I was recently playing around with oqs-provider[1] for PQC support in openssl, but couldn't get it to work with Postfix 3.9.0 for TLSv1.3 key exchange. Specifically, this provider implements new Key Encapsulation Methods like "x25519_kyber768", which I can use with `openssl s_server -gr

[pfx] Re: Patch: Postfix and OpenSSL provider algorithms

2024-09-18 Thread Geert Hendrickx via Postfix-users
On Thu, Sep 19, 2024 at 12:54:41 +1000, Viktor Dukhovni via Postfix-users wrote: > Not a problem, the proposed decoration would be part of the element, but > I'm arguing that it is not needed. > > https://github.com/openssl/openssl/issues/21633#issuecomment-2359871975 I agree the need is only on

[pfx] Re: Patch: Postfix and OpenSSL provider algorithms

2024-09-19 Thread Geert Hendrickx via Postfix-users
On Thu, Sep 19, 2024 at 17:44:36 +1000, Viktor Dukhovni via Postfix-users wrote: > Try the below: Perfect: > Anonymous TLS connection established from X: TLSv1.3 with cipher > TLS_AES_128_GCM_SHA256 > (128/128 bits) key-exchange x25519_kyber768 server-signature ECDSA > (prime256v1) > server-di

[pfx] Re: Postfix and OpenSSL provider algorithms

2024-09-18 Thread Geert Hendrickx via Postfix-users
On Wed, Sep 18, 2024 at 21:29:07 +1000, Viktor Dukhovni via Postfix-users wrote: > On Wed, Sep 18, 2024 at 01:04:58PM +0200, Geert Hendrickx wrote: > > > Specifically, this provider implements new Key Encapsulation Methods like > > "x25519_kyber768", which I can use wi

[pfx] Re: Postfix and OpenSSL provider algorithms

2024-09-18 Thread Geert Hendrickx via Postfix-users
On Wed, Sep 18, 2024 at 14:02:32 +0200, Geert Hendrickx via Postfix-users wrote: > On Wed, Sep 18, 2024 at 21:29:07 +1000, Viktor Dukhovni via Postfix-users > wrote: > > You should initially test with "posttls-finger", > > `posttls-finger -L ssl-debug` shows su

[pfx] Re: Patch: Postfix and OpenSSL provider algorithms

2024-09-19 Thread Geert Hendrickx via Postfix-users
On Fri, Sep 20, 2024 at 00:40:35 +1000, Viktor Dukhovni via Postfix-users wrote: > So you should be able to apply the top-most commit at: > > https://github.com/vdukhovni/postfix/commits/provider-kex/ > > to a Postfix 3.10-20240917 (or earlier, modulo the expected conflict in > the HISTORY

[pfx] Re: Patch: Postfix and OpenSSL provider algorithms

2024-09-19 Thread Geert Hendrickx via Postfix-users
On Thu, Sep 19, 2024 at 21:41:44 +1000, Viktor Dukhovni via Postfix-users wrote: > Can you build Postfix after running "makedefs" with "OPT='-g -ggdb3'", > and set a break-point in posttls-finger at line ~1054 of tls_misc.c: > > 1054 if (tls_get_peer_dh_pubkey(ssl, &dh_pkey)) { With a PQ

[pfx] Re: OpenSSL compile vs. runtime version warning

2024-10-24 Thread Geert Hendrickx via Postfix-users
On Thu, Oct 24, 2024 at 20:00:05 +1100, Viktor Dukhovni via Postfix-users wrote: > And this is the logic used in Postfix >= 3.10-20240612, but while you've > upgraded to a shiny new OpenSSL, you haven't also upgraded to a shiny new > Postfix snapshot. :-) This is using standard Arch Linux package

[pfx] Re: smtp_tls_security_level defaults question

2024-10-24 Thread Geert Hendrickx via Postfix-users
On Thu, Oct 24, 2024 at 16:24:04 +1100, Viktor Dukhovni via Postfix-users wrote: > Yes, of course, as documented. TLS is off by default, this is backwards- > compatible behaviour, and Postfix aims to not "surprise" operators with > unexpected new behaviour after an upgrade. This could be enabled

[pfx] Re: Is the bounce message text customisable?

2025-01-06 Thread Geert Hendrickx via Postfix-users
On Mon, Jan 06, 2025 at 22:09:27 +0100, Andreas Kuhlen via Postfix-users wrote: > A text that simply states that the user is unknown would be enough for me. I > don't want to reveal the fact that I use virtual mailboxes with this bounce > message. https://www.postfix.org/postconf.5.html#show_user

[pfx] Re: IP discard for authenticated e-mails

2025-02-05 Thread Geert Hendrickx via Postfix-users
On Wed, Feb 05, 2025 at 15:31:44 +0100, Ömer Güven via Postfix-users wrote: > At least the big companies like GMail never complained about it, the > Authenticated Received Chain (ARC) always passes without errors, even > for forwarding. :-) Yes, the message is still RFC 5322 compliant, as Viktor

[pfx] Re: IP discard for authenticated e-mails

2025-02-05 Thread Geert Hendrickx via Postfix-users
On Wed, Feb 05, 2025 at 14:58:48 +0100, Ömer Güven via Postfix-users wrote: > My solution does completely remove the Received header, so that the > next-hop adds an appropriate one, usually pointing to the sending MX‘ > ip address. Which is also not RFC 5321 compliant, just not visibly so :) >

[pfx] Re: IP discard for authenticated e-mails

2025-02-05 Thread Geert Hendrickx via Postfix-users
On Tue, Feb 04, 2025 at 17:09:52 -0500, Wietse Venema via Postfix-users wrote: > This reduces the Received: header from: > > Received: from > by servername (Postfix) with id yyy; server-date-stamp > > to: > > Received: by servername (Postfix) with id yyy; server-date

[pfx] Re: SSL Log Errors. Should worry?

2024-12-16 Thread Geert Hendrickx via Postfix-users
On Mon, Dec 16, 2024 at 16:32:27 +0100, Matus UHLAR - fantomas via Postfix-users wrote: > RH does not usually upgrade major versions of libraries, what's happened? RHEL 9.4 actually rebased OpenSSL 3.0.7 => 3.2.2. (which is not unusual in dot releases) But Postfix was rebuilt as well, at least

[pfx] Re: OpenDMARC question

2025-01-24 Thread Geert Hendrickx via Postfix-users
On Fri, Jan 24, 2025 at 22:56:40 +0100, Andreas Kuhlen via Postfix-users wrote: > I have set ‘RejectFailures true’ in /etc/opendmarc.conf. My expectation > was that mails without a dmarc signature would then be rejected. Only if the domain publishes a DMARC p=reject policy. > 2025-01-24T21:52:1

[pfx] Re: Log TLS Error Clarification

2025-01-22 Thread Geert Hendrickx via Postfix-users
On Wed, Jan 22, 2025 at 13:40:34 +1100, Viktor Dukhovni via Postfix-users wrote: > Nothing in the Postfix config, but do note that on RedHat / Fedora > systems there's also "crypto policy" that cranks up security to 11 to > protect users against fairly exotic threats, so you end up with > cleartext