[pfx] Re: Postfix stable release 3.8.1, and legacy releases 3.7.6, 3.6.10, 3.5.20

2023-06-06 Thread Geert Hendrickx via Postfix-users
On Tue, Jun 06, 2023 at 09:48:11 -0400, Wietse Venema via Postfix-users wrote: > * Optional: harden a Postfix SMTP server against remote SMTP > clients that violate RFC 2920 (or 5321) command pipelining > constraints. With "smtpd_forbid_unauth_pipelining = yes", the > server disconnec

[pfx] Re: Postfix stable release 3.8.1, and legacy releases 3.7.6, 3.6.10, 3.5.20

2023-06-06 Thread Geert Hendrickx via Postfix-users
On Tue, Jun 06, 2023 at 10:31:30 -0400, Wietse Venema via Postfix-users wrote: > Geert Hendrickx via Postfix-users: > > What is the relation between new "smtpd_forbid_unauth_pipelining" > > and existing "reject_unauth_pipelining" in smtpd_*_restrictions?

[pfx] Re: TAKE NOTE: "2 1 1" TLSA records vs. apparent change of Let's Encrypt default certificate chain

2023-11-15 Thread Geert Hendrickx via Postfix-users
On Wed, Nov 15, 2023 at 10:29:41 -0500, James Cloos via Postfix-users wrote: > LE announced a while back that they would not renew the cross cert. Yes, but dropping the cross-signed X1 root cert from the default chain last week was an accident: https://community.letsencrypt.org/t/shortening-the-l

[pfx] Re: Postfix authenticated sender and From: header verification

2023-12-20 Thread Geert Hendrickx via Postfix-users
On Mon, Dec 18, 2023 at 17:40:49 -0500, Wietse Venema via Postfix-users wrote: > Viktor Dukhovni via Postfix-users: > > - Postfix 3.9 (pending official release soon), rejects unuthorised > > pipelining by default: "smtpd_forbid_unauth_pipelining = yes". > > > > - Postfix 3.8.1, 3.7.6, 3.6.10 and

[pfx] Re: SMTP Smuggling disclosure process & VINCE

2023-12-24 Thread Geert Hendrickx via Postfix-users
On Sat, Dec 23, 2023 at 18:09:10 -0500, Wietse Venema via Postfix-users wrote: > Note that only the encapsulating message can contain a DKIM signature > by the authenticated sender's domain. The smuggled message caannot > contain a DKIM signature by the impersonated sender's domain unless > the att

[pfx] Re: SMTP Smuggling, workarounds and fix

2024-01-04 Thread Geert Hendrickx via Postfix-users
On Thu, Dec 21, 2023 at 07:51:31 -0500, Wietse Venema via Postfix-users wrote: > * With all Postfix versions, "smtpd_data_restrictions = > reject_unauth_pipelining" will stop the published exploit. Hi I just found an unexpected side effect of this particular configuration (unrelated to SMT

[pfx] Re: SMTP Smuggling, workarounds and fix

2024-01-04 Thread Geert Hendrickx via Postfix-users
On Thu, Jan 04, 2024 at 10:36:23 -0500, Wietse Venema via Postfix-users wrote: > Wietse Venema via Postfix-users: > > Geert Hendrickx via Postfix-users: > > > I just found an unexpected side effect of this particular configuration > > > (unrelated to SMTP smuggling). &g

[pfx] Re: SMTP Smuggling with long-term fix

2024-01-06 Thread Geert Hendrickx via Postfix-users
On Sat, Jan 06, 2024 at 14:47:59 -0500, Wietse Venema via Postfix-users wrote: > Damian: > > If I remember correctly, on the wire there was \r\n\r\n.\r\r\n > > Viktor Dukhovni: > > Does that also need to be more strict? :-( > > Indeed, and as usual the fix is trivial. This process is backwards,

[pfx] Re: SMTP Smuggling with long-term fix

2024-01-07 Thread Geert Hendrickx via Postfix-users
On Sat, Jan 06, 2024 at 20:10:34 -0500, Wietse Venema via Postfix-users wrote: > People are welcome to test tools against postfix-3.9-20240106. With postfix-3.9-20240106 (with smtpd_forbid_bare_newline=yes but smtpd_forbid_unauth_pipelining=no) all smuggling tests now fail, including CRCRL tests.

[pfx] Re: What features to deprecate

2024-02-13 Thread Geert Hendrickx via Postfix-users
On Tue, Feb 13, 2024 at 12:23:32 -0500, Wietse Venema via Postfix-users wrote: > - masquerade_domains complicates table-driven address validation. > Log a deprecation warning with compatibility_levels>=3.9. What's the alternative for masquerade_domains ? Geert

[pfx] Re: What features to deprecate

2024-02-14 Thread Geert Hendrickx via Postfix-users
On Tue, Feb 13, 2024 at 12:51:51 -0500, Viktor Dukhovni via Postfix-users wrote: > On Tue, Feb 13, 2024 at 06:32:14PM +0100, Geert Hendrickx via Postfix-users > wrote: > > What's the alternative for masquerade_domains ? > > It is canonical_maps, ideally with explicit map

[pfx] Re: Misunderstanging on masquerade_domains and rewriting in master.conf

2024-03-07 Thread Geert Hendrickx via Postfix-users
On Thu, Mar 07, 2024 at 00:22:31 +0100, Steffen Nurpmeso via Postfix-users wrote: > Thanks to the README i got it going with > > masquerade_domains = $mydomain > local_header_rewrite_clients = permit_mynetworks,permit_tls_clientcerts > > However, i first tried to add these via -o to the abov

[pfx] non_smtpd relayhost ?

2024-06-21 Thread Geert Hendrickx via Postfix-users
Hi We have few different sets of Postfix mailservers with different roles; inbound servers, outbound servers that DKIM sign outgoing mail with a milter, and some other servers that just relay mail that is already signed elsewhere. The first and third types of mailservers don't need to sign mail p

[pfx] Re: non_smtpd relayhost ?

2024-06-21 Thread Geert Hendrickx via Postfix-users
On Fri, Jun 21, 2024 at 16:22:24 -0400, Wietse Venema wrote: > Locally-generated bounces are generated by the Postfix bounce > daemon which talks to a cleanup service to queue a message. > One could run bounce daemons with a cleanup_service override > in master.cf: Thanks Wietse, that makes sens

[pfx] Re: struggling with smtpd_tls_security_level = encrypt - 5.7.0 Must issue a STARTTLS command first

2024-09-08 Thread Geert Hendrickx via Postfix-users
On Mon, Sep 09, 2024 at 00:17:08 +1000, Viktor Dukhovni via Postfix-users wrote: > And of course, I'd negligent to not mention that I don't recommend a hard > requirement of TLS on port 25, you may one day reject some important mail > and not even know it, and if STARTTLS stops working, you may be

[pfx] Re: struggling with smtpd_tls_security_level = encrypt - 5.7.0 Must issue a STARTTLS command first

2024-09-08 Thread Geert Hendrickx via Postfix-users
On Sun, Sep 08, 2024 at 19:39:43 +0200, hostmaster--- via Postfix-users wrote: > Interesting approach if i correctly understood what you do: You are running > STARTTLS, basically accepting unencrypted connections but with > "warn_if_reject reject_plaintext_session" you are rejecting unencrypted > s

[pfx] Re: Stop OS enumeration

2024-10-17 Thread Geert Hendrickx via Postfix-users
6.10.24 23:54, Geert Hendrickx via Postfix-users wrote: > > Just set local_recipient_maps appropriately, without unix:passwd.byname if > > you > > don't need it. > > > - but mail recipient enumeration is still possible. Oh, ok. I thought you wanted to avoid

[pfx] Re: Stop OS enumeration

2024-10-16 Thread Geert Hendrickx via Postfix-users
On Tue, Oct 15, 2024 at 16:03:13 +0100, Paul Fowler via Postfix-users wrote: > Are there best practices for avoid OS username enumeration on a mail relay? Just set local_recipient_maps appropriately, without unix:passwd.byname if you don't need it. I set it to $alias_maps plus an inline:{} list

[pfx] OpenSSL compile vs. runtime version warning

2024-10-25 Thread Geert Hendrickx via Postfix-users
Hi > warning: run-time library vs. compile-time header version mismatch: > OpenSSL 3.4.0 may not be compatible with OpenSSL 3.3.0 Is this warning still relevant with OpenSSL's new versioning scheme, where OpenSSL 3.x releases are guaranteed[1] to be ABI compatible ? [1] https://openssl-library.

[pfx] Re: smtp_tls_security_level defaults question

2024-10-24 Thread Geert Hendrickx via Postfix-users
On Thu, Oct 24, 2024 at 11:33:22 -0400, Wietse Venema via Postfix-users wrote: > And for the Postfix SMTP server, this would add two guards > to Viktor's example: > > smtpd_tls_security_level = > ${{$compatibility_level} >=level {3.10} ? > {${built_with_tls ? >

[pfx] Re: Postfix and OpenSSL provider algorithms

2024-09-18 Thread Geert Hendrickx via Postfix-users
On Thu, Sep 19, 2024 at 02:02:50 +1000, Viktor Dukhovni via Postfix-users wrote: > This makes it possible to write "forward-looking" configs that will use > newer groups once they're available in the OpenSSL runtime. Well actually, in this case it achieves the opposite, as the individual checking

[pfx] Re: Patch: Postfix and OpenSSL provider algorithms

2024-09-23 Thread Geert Hendrickx via Postfix-users
On Mon, Sep 23, 2024 at 18:32:00 +1000, Viktor Dukhovni via Postfix-users wrote: > This is not a release-notes-worthy change, just avoids loss of minor forensic > detail for externally loaded kex "groups" (or, more generally, KEMs). That's only true for the very last change - but the entire chang

[pfx] Re: Patch: Postfix and OpenSSL provider algorithms

2024-09-23 Thread Geert Hendrickx via Postfix-users
On Fri, Sep 20, 2024 at 20:06:43 +1000, Viktor Dukhovni via Postfix-users wrote: > If it is possible to test kyber768 with OpenSSL 3.0 or 3.1, please do, > and post your findings to the list. Tested with OpenSSL 3.0 as well now (RHEL 9 version), with oqs-provider added. $ openssl version OpenSSL

[pfx] Re: Postfix and OpenSSL provider algorithms

2024-09-18 Thread Geert Hendrickx via Postfix-users
On Thu, Sep 19, 2024 at 01:01:42 +1000, Viktor Dukhovni via Postfix-users wrote: > The OBJ_sn2nid() function is not extensible, and not affected by loading > of providers. To actually be able to map this algorithm to a "nid", the > base OpenSSL code would have to know about "x25519_kyber768". Ok

[pfx] Re: Patch: Postfix and OpenSSL provider algorithms

2024-09-19 Thread Geert Hendrickx via Postfix-users
On Thu, Sep 19, 2024 at 08:26:53 +0200, Geert Hendrickx via Postfix-users wrote: > I confirm your patch works, I can now use these new key exchanges in Postfix. Could the reverse lookup be fixed as well, for Received headers and logging? > Anonymous TLS connection established from X: T

[pfx] Re: Patch: Postfix and OpenSSL provider algorithms

2024-09-19 Thread Geert Hendrickx via Postfix-users
On Thu, Sep 19, 2024 at 19:10:05 +1000, Viktor Dukhovni via Postfix-users wrote: > On Thu, Sep 19, 2024 at 10:01:16AM +0200, Geert Hendrickx via Postfix-users > wrote: > > > > Anonymous TLS connection established from X: TLSv1.3 with cipher > > > TLS_AES_128_GCM_SHA2

[pfx] Postfix and OpenSSL provider algorithms

2024-09-18 Thread Geert Hendrickx via Postfix-users
Hi Viktor I was recently playing around with oqs-provider[1] for PQC support in openssl, but couldn't get it to work with Postfix 3.9.0 for TLSv1.3 key exchange. Specifically, this provider implements new Key Encapsulation Methods like "x25519_kyber768", which I can use with `openssl s_server -gr

[pfx] Re: Patch: Postfix and OpenSSL provider algorithms

2024-09-18 Thread Geert Hendrickx via Postfix-users
On Thu, Sep 19, 2024 at 12:54:41 +1000, Viktor Dukhovni via Postfix-users wrote: > Not a problem, the proposed decoration would be part of the element, but > I'm arguing that it is not needed. > > https://github.com/openssl/openssl/issues/21633#issuecomment-2359871975 I agree the need is only on

[pfx] Re: Patch: Postfix and OpenSSL provider algorithms

2024-09-19 Thread Geert Hendrickx via Postfix-users
On Thu, Sep 19, 2024 at 17:44:36 +1000, Viktor Dukhovni via Postfix-users wrote: > Try the below: Perfect: > Anonymous TLS connection established from X: TLSv1.3 with cipher > TLS_AES_128_GCM_SHA256 > (128/128 bits) key-exchange x25519_kyber768 server-signature ECDSA > (prime256v1) > server-di

[pfx] Re: Postfix and OpenSSL provider algorithms

2024-09-18 Thread Geert Hendrickx via Postfix-users
On Wed, Sep 18, 2024 at 21:29:07 +1000, Viktor Dukhovni via Postfix-users wrote: > On Wed, Sep 18, 2024 at 01:04:58PM +0200, Geert Hendrickx wrote: > > > Specifically, this provider implements new Key Encapsulation Methods like > > "x25519_kyber768", which I can use with `openssl s_server -groups`

[pfx] Re: Postfix and OpenSSL provider algorithms

2024-09-18 Thread Geert Hendrickx via Postfix-users
On Wed, Sep 18, 2024 at 14:02:32 +0200, Geert Hendrickx via Postfix-users wrote: > On Wed, Sep 18, 2024 at 21:29:07 +1000, Viktor Dukhovni via Postfix-users > wrote: > > You should initially test with "posttls-finger", > > `posttls-finger -L ssl-debug` shows su

[pfx] Re: Patch: Postfix and OpenSSL provider algorithms

2024-09-19 Thread Geert Hendrickx via Postfix-users
On Fri, Sep 20, 2024 at 00:40:35 +1000, Viktor Dukhovni via Postfix-users wrote: > So you should be able to apply the top-most commit at: > > https://github.com/vdukhovni/postfix/commits/provider-kex/ > > to a Postfix 3.10-20240917 (or earlier, modulo the expected conflict in > the HISTORY

[pfx] Re: Patch: Postfix and OpenSSL provider algorithms

2024-09-19 Thread Geert Hendrickx via Postfix-users
On Thu, Sep 19, 2024 at 21:41:44 +1000, Viktor Dukhovni via Postfix-users wrote: > Can you build Postfix after running "makedefs" with "OPT='-g -ggdb3'", > and set a break-point in posttls-finger at line ~1054 of tls_misc.c: > > 1054 if (tls_get_peer_dh_pubkey(ssl, &dh_pkey)) { With a PQ

[pfx] Re: OpenSSL compile vs. runtime version warning

2024-10-24 Thread Geert Hendrickx via Postfix-users
On Thu, Oct 24, 2024 at 20:00:05 +1100, Viktor Dukhovni via Postfix-users wrote: > And this is the logic used in Postfix >= 3.10-20240612, but while you've > upgraded to a shiny new OpenSSL, you haven't also upgraded to a shiny new > Postfix snapshot. :-) This is using standard Arch Linux package

[pfx] Re: smtp_tls_security_level defaults question

2024-10-24 Thread Geert Hendrickx via Postfix-users
On Thu, Oct 24, 2024 at 16:24:04 +1100, Viktor Dukhovni via Postfix-users wrote: > Yes, of course, as documented. TLS is off by default, this is backwards- > compatible behaviour, and Postfix aims to not "surprise" operators with > unexpected new behaviour after an upgrade. This could be enabled

[pfx] Re: Is the bounce message text customisable?

2025-01-06 Thread Geert Hendrickx via Postfix-users
On Mon, Jan 06, 2025 at 22:09:27 +0100, Andreas Kuhlen via Postfix-users wrote: > A text that simply states that the user is unknown would be enough for me. I > don't want to reveal the fact that I use virtual mailboxes with this bounce > message. https://www.postfix.org/postconf.5.html#show_user

[pfx] Re: IP discard for authenticated e-mails

2025-02-05 Thread Geert Hendrickx via Postfix-users
On Wed, Feb 05, 2025 at 15:31:44 +0100, Ömer Güven via Postfix-users wrote: > At least the big companies like GMail never complained about it, the > Authenticated Received Chain (ARC) always passes without errors, even > for forwarding. :-) Yes, the message is still RFC 5322 compliant, as Viktor

[pfx] Re: IP discard for authenticated e-mails

2025-02-05 Thread Geert Hendrickx via Postfix-users
On Wed, Feb 05, 2025 at 14:58:48 +0100, Ömer Güven via Postfix-users wrote: > My solution does completely remove the Received header, so that the > next-hop adds an appropriate one, usually pointing to the sending MX‘ > ip address. Which is also not RFC 5321 compliant, just not visibly so :) >

[pfx] Re: IP discard for authenticated e-mails

2025-02-05 Thread Geert Hendrickx via Postfix-users
On Tue, Feb 04, 2025 at 17:09:52 -0500, Wietse Venema via Postfix-users wrote: > This reduces the Received: header from: > > Received: from > by servername (Postfix) with id yyy; server-date-stamp > > to: > > Received: by servername (Postfix) with id yyy; server-date

[pfx] Re: SSL Log Errors. Should worry?

2024-12-16 Thread Geert Hendrickx via Postfix-users
On Mon, Dec 16, 2024 at 16:32:27 +0100, Matus UHLAR - fantomas via Postfix-users wrote: > RH does not usually upgrade major versions of libraries, what's happened? RHEL 9.4 actually rebased OpenSSL 3.0.7 => 3.2.2. (which is not unusual in dot releases) But Postfix was rebuilt as well, at least

[pfx] Re: OpenDMARC question

2025-01-24 Thread Geert Hendrickx via Postfix-users
On Fri, Jan 24, 2025 at 22:56:40 +0100, Andreas Kuhlen via Postfix-users wrote: > I have set ‘RejectFailures true’ in /etc/opendmarc.conf. My expectation > was that mails without a dmarc signature would then be rejected. Only if the domain publishes a DMARC p=reject policy. > 2025-01-24T21:52:1

[pfx] Re: Log TLS Error Clarification

2025-01-22 Thread Geert Hendrickx via Postfix-users
On Wed, Jan 22, 2025 at 13:40:34 +1100, Viktor Dukhovni via Postfix-users wrote: > Nothing in the Postfix config, but do note that on RedHat / Fedora > systems there's also "crypto policy" that cranks up security to 11 to > protect users against fairly exotic threats, so you end up with > cleartext

[pfx] Re: smtp_tls_security_level defaults question

2025-06-08 Thread Geert Hendrickx via Postfix-users
On Mon, Jun 09, 2025 at 00:42:20 +1000, Viktor Dukhovni via Postfix-users wrote: > On Sun, Jun 08, 2025 at 09:29:17AM -0400, Wietse Venema via Postfix-users > wrote: > > > > Can the default be decided at build-time (#ifdef), instead of with > > > run-time conditional configuration? > > > > That

[pfx] Re: smtp_tls_security_level defaults question

2025-06-08 Thread Geert Hendrickx via Postfix-users
On Sat, Jun 07, 2025 at 18:51:21 -0400, Wietse Venema via Postfix-users wrote: > > > For the Postfix SMTP client the new default would look like: > > > > > > smtp_tls_security_level = > > > ${{$compatibility_level} >=level {3.10}? > > > {${built_with_tls ? {may > > > >

[pfx] Re: smtp_tls_security_level defaults question

2025-06-23 Thread Geert Hendrickx via Postfix-users
On Mon, Jun 23, 2025 at 13:24:49 -0400, Wietse Venema via Postfix-users wrote: > Conclusion: there is no benefit from to changing the SMTP server default > TLS level. I agree. The server-side TLS cannot work without some external process to generate and configure the certificate(s), so it can ju

[pfx] Re: smtp_tls_security_level defaults question

2025-06-07 Thread Geert Hendrickx via Postfix-users
On Thu, Oct 24, 2024 at 11:33:22 -0400, Wietse Venema via Postfix-users wrote: > The compatibility-level guard is a good idea. To take out some of the > guesswork, I'm considering to add a read-only configuration parameter > that indicates whether Postfix is built with TLS support. > > For the Pos