Re: Postfix-fg and maillog_file to stdout

2021-11-05 Thread Michael Ströder
On 11/5/21 21:49, Viktor Dukhovni wrote: Therefore, I would like to see reports of what you find: [..] * With AppArmor on or off [..] If auditd is installed and running AppArmor logs to audit logs. So examining these logs might help to check whether AppArmor is blocking something: grep

Re: Mail system is down

2022-01-02 Thread Michael Ströder
On 1/2/22 17:16, Wietse Venema wrote: Ken Wright: On Sat, 2022-01-01 at 18:50 -0500, Wietse Venema wrote: Ken Wright: I did a quick Google search, and ran sudo apparmor_status. There don't appear to be any postfix-related programs listed. Then that leaves the cron related profiles. None o

Re: Mail and mail traces lost (?)

2022-03-30 Thread Michael Ströder
On 3/30/22 18:04, Viktor Dukhovni wrote: More likely systemd-journald has elected to not write the log entries to disk. Consider a Linux distribution that does not use systemd, or a recent version of Postfix that writes its own log files bypassing syslog. Or simply set in /etc/systemd/journald

Re: Mail and mail traces lost (?)

2022-03-30 Thread Michael Ströder
On 3/30/22 18:36, Viktor Dukhovni wrote: On Wed, Mar 30, 2022 at 06:11:33PM +0200, Michael Ströder wrote: Or simply set in /etc/systemd/journald.conf: [Journal] Storage=none ForwardToSyslog=yes That does not fully solve the problem, since IIRC rate limits and performance limitations still

Re: Mail and mail traces lost (?)

2022-03-30 Thread Michael Ströder
On 3/30/22 20:37, Viktor Dukhovni wrote: On Wed, Mar 30, 2022 at 07:10:09PM +0200, Emmanuel Fusté wrote: ForwardToSyslog and other similar journald options activate raw message forwarding before any journald processing. This is pure socket to socket forwarding without any processing. Well, "wi

Re: Mail and mail traces lost (?)

2022-03-30 Thread Michael Ströder
On 3/30/22 23:09, Nikolaos Milas wrote: I am a bit confused (not surprisingly, as I am no expert). Well, Linux distros change all the time...so we get confused all the time... In my CentOS 7,in /usr/lib/systemd/system/systemd-journald.socket I see: [Socket] ListenStream=/run/systemd/journal/

Re: warning: process /usr/local/libexec/postfix/postscreen pid xxxxx killed by signal 11

2022-04-23 Thread Michael Ströder
On 4/23/22 20:14, Michael Grimm wrote: 1) Is smtputf8_enable=yes essential in email traffic as of today? Good question. Is there any other MTA besides postfix supporting SMTPUTF8? Ciao, Michael.

Re: password security

2022-04-27 Thread Michael Ströder
On 4/27/22 12:27, Jaroslaw Rafa wrote: Dnia 27.04.2022 o godz. 17:47:06 AndrewHardy pisze: I’m very interested in what options / solutions (if any) exist that allow you to use a passwordless approach to authenticating your users against imaps/pop3/smtps/submission services (tls encrypted of cou

Re: password security

2022-04-27 Thread Michael Ströder
On 4/27/22 14:37, Jahnke-Zumbusch, Dirk wrote: I’m very interested in what options / solutions (if any) exist that allow you to use a passwordless approach to authenticating your users against imaps/pop3/smtps/submission services (tls encrypted of course) one way to authenticate may be using Ke

Re: password security

2022-04-27 Thread Michael Ströder
On 4/27/22 17:28, lists wrote: The TOTP built into Linux has a 30 second time limit but most implementations approve the stale code making it effectively 60 seconds. > Hackers have either implemented [..] a man in the middle attack intercepted the token. An implementation taking the "one-time"

Re: password security

2022-04-27 Thread Michael Ströder
On 4/27/22 18:36, Viktor Dukhovni wrote: On 27 Apr 2022, at 12:27 pm, Michael Ströder wrote: one way to authenticate may be using Kerberos. Not recommended for roaming users accessing submission service via public Internet. Suitability depends on the user base, ... my personal mail

Re: password security

2022-04-27 Thread Michael Ströder
On 4/27/22 18:39, Demi Marie Obenour wrote: On 4/27/22 12:27, Michael Ströder wrote: On 4/27/22 14:37, Jahnke-Zumbusch, Dirk wrote: I’m very interested in what options / solutions (if any) exist that allow you to use a passwordless approach to authenticating your users against imaps/pop3/smtps

Re: password security

2022-04-27 Thread Michael Ströder
On 4/27/22 18:50, Antonio Leding wrote: On 27 Apr 2022, at 9:45, Michael Ströder wrote: > “On my personal to-do list is to implement a simple X.509-CA for issuing > short-term client certs, with a CLI tool to directly manipulate > Thunderbird and Firefox key/cert DB.” As in you are

Re: password security

2022-04-27 Thread Michael Ströder
On 4/27/22 18:38, Demi Marie Obenour wrote: On 4/27/22 07:58, Michael Ströder wrote: Mozilla hunked out all features for PKI client cert enrollment from Firefox and Thunderbird. So today it's easier to issue client certs to Outlook users than to Thunderbird users. :-( Please report a b

Re: password security

2022-04-27 Thread Michael Ströder
On 4/27/22 19:03, Viktor Dukhovni wrote: On 27 Apr 2022, at 12:45 pm, Michael Ströder wrote: But my concern is rather that I would not connect my KDC to the Internet (for now leaving aside approaches like proxy KCM). >> In general I'm leaning more towards using asymmetric keys for a

Re: password security

2022-04-27 Thread Michael Ströder
On 4/27/22 20:01, Wietse Venema wrote: Michael Stroeder: Either way a compromised CA or a compromise KDC is bad news... Yes! And one of my biggest concerns are bad operational practices. That's why admins should not have to manually deal with crypto key files like service keytabs or TLS serve

Re: password security

2022-04-27 Thread Michael Ströder
On 4/27/22 21:30, Wietse Venema wrote: Michael Stroeder: So even if you cannot afford a HSM you can e.g. use ssh-agent via Unix domain socket for your SSH-CA to avoid having to grant direct read access to the SSH-CA's private key to your SSH-CA service. Simple solutions, which you can isolate a

DKIM signing after virtual_alias_maps

2022-12-17 Thread Michael Ströder
HI! I've added DKIM signing with this config snippet: # DKIM signing milter_default_action = accept milter_protocol = 6 smtpd_milters = unix:/run/opendkim/opendkim.socket non_smtpd_milters = unix:/run/opendkim/opendkim.socket That's working fine for me in case of sending simple mails. But I al

Re: Are there plans for a buld-in support of REDIS-tables?

2020-01-10 Thread Michael Ströder
On 1/9/20 5:12 PM, kris_h wrote: > We distribute the more dynamic tables - e.g. cidr-tables with self-harvested > current spammer's IPs - actually by simply distributing those files with > rsync. > [..] > I searching for pros/cons for: postfix supports LDAP lookups out-of-the-box. Is using LDAP

Re: Postfix as a backup MX

2020-03-29 Thread Michael Ströder
On 3/29/20 4:26 AM, Linda Pagillo wrote: > Hi everyone. I hope all of you are staying healthy and safe. I want to > set up Postfix as a backup MX for a few of my Windows-based mail > servers. I have never done this before so I have been researching to see > what I could find. So far, the most compl

Re: [RFE] - Resolving of SRV records

2020-07-29 Thread Michael Ströder
On 7/29/20 9:53 AM, Bastian Blank wrote: > However, please describe how you would implement the requirements of RFC > 6125 section 6[2]? You can't use SRV records without support for useful > server authentication. Full ack. That's something most people overlook / ignore when naively asking for

Re: lower case email address for delivery

2020-11-29 Thread Michael Ströder
On 11/29/20 3:48 PM, Nikolai Lusan wrote: > Traditionally SMTP systems forced everything to be lower case ... but > then people like Microsoft started making MTA's that where case > sensitive for the reciever part of the email address (at the time this > was not RFC complianat behaviour). IIRC the

shared lib for Berkeley-DB table types

2020-12-10 Thread Michael Ströder
HI! Is it possible to compile postfix without support for tables based on Berkeley's libdb statically linked in? Just like building lmdb support into shared lib /usr/lib/postfix/postfix-lmdb.so. I read through README_FILES/DB_README but did not find advice similar to that using AUXLIBS_LMDB (as d

Re: shared lib for Berkeley-DB table types

2020-12-10 Thread Michael Ströder
On 12/10/20 6:55 PM, Wietse Venema wrote: > Michael Str?der: >> Is it possible to compile postfix without support for tables based on >> Berkeley's libdb statically linked in? Just like building lmdb support >> into shared lib >> /usr/lib/postfix/postfix-lmdb.so. > > To enable/disable build option

Re: LDAP map: %S doesn't preserve case

2021-02-05 Thread Michael Ströder
On 2/5/21 8:03 PM, Viktor Dukhovni wrote: > I am not 100% sure that all LDAP lookups would necessarily > be using lookup keys with case-insensitive matching rules. This is declared in matching rules of the attribute type description found in the subschema. > For example, maps that query accounts

Re: User script for modifying main.cf and other config files

2021-02-08 Thread Michael Ströder
On 2/8/21 2:28 PM, @lbutlr wrote: > Use a tool like Webmin¹. IIRC webmin has a long history of security issues. > It is, in my opinion a very very bad idea, I don't understand why you recommend something you consider a bad idea. > For user management, including admin access to hosted > domains,

SMTPUTF8 usage

2015-08-20 Thread Michael Ströder
HI! Does anybody here have experience with current usage of SMTPUTF8? I have a discussion whether that's already used in the wild or not. Given that e.g. SUSE Linux builds of postfix are currently not linked to libicu I assume that SMTPUTF8 is currently not widely used. How about other platforms?

Re: SMTPUTF8 usage

2015-08-20 Thread Michael Ströder
wie...@porcupine.org (Wietse Venema) wrote: > Michael Str?der: >> Does anybody here have experience with current usage of SMTPUTF8? >> I have a discussion whether that's already used in the wild or not. >> >> Given that e.g. SUSE Linux builds of postfix are currently not linked to >> libicu I assum

Re: SMTPUTF8 usage

2015-08-20 Thread Michael Ströder
wie...@porcupine.org (Wietse Venema) wrote: > Michael Str?der: >> So I interpret your question it as an answer: >> SMTPUTF8 is currently not widely used. ;-) > > 10 years ago, IPv6 implementation was driven by the concern that > everyone was going to suffer from unavailable IP addresses. > > SMTP

Require DNSSEC signed MX RRs

2015-09-10 Thread Michael Ströder
HI! Looking at [1] it's not clear to me whether it's possible to require MX RRs of a recipient domain to be DNSSEC signed. Any other configuration option for that? Ciao, Michael. [1] http://www.postfix.org/postconf.5.html#smtp_tls_policy_maps smime.p7s Description: S/MIME Cryptographic Signat

Re: Require DNSSEC signed MX RRs

2015-09-10 Thread Michael Ströder
Viktor Dukhovni wrote: > On Thu, Sep 10, 2015 at 07:44:19PM +0200, Michael Ströder wrote: > >> Looking at [1] it's not clear to me whether it's possible to require MX RRs >> of >> a recipient domain to be DNSSEC signed. Any other configuration option for >&

Re: Require DNSSEC signed MX RRs

2015-09-10 Thread Michael Ströder
Viktor Dukhovni wrote: > On Thu, Sep 10, 2015 at 08:39:38PM +0200, Michael Ströder wrote: > >> Maybe there should be some additional text for 'dane-only' in [1]? >> I'm not sure about the correct wording though. > > I think it is fine as-is. The "dane

Re: postfix and multiple TLS certificates (SNI support?)

2015-12-15 Thread Michael Ströder
Viktor Dukhovni wrote: > So, we've managed to hold off on offering SNI support for a decade > since TLS was integrated into Postfix 2.2. I just wanted to see > whether anyone still wanted it in Postfix, but perhaps if they > really did they've moved on to other solutions. SNI is a prerequisite fo

Re: postfix and multiple TLS certificates (SNI support?)

2015-12-15 Thread Michael Ströder
Sebastian Nielsen wrote: > The certificate is normally validated against the MX name, not recipient > domain. Did you read the referenced I-D before replying? https://tools.ietf.org/html/draft-friedl-uta-smtp-mta-certs-00#section-4.1.4.1 Ciao, Michael. > "Michael Ströder"

Re: postfix and multiple TLS certificates (SNI support?)

2015-12-15 Thread Michael Ströder
n detail is not appropriate on this mailing list. Still I can imagine that SNI support in postfix could be useful for implementing special TLS usage policies even if it does not scale to millions of certs. Ciao, Michael. > -Ursprungligt meddelande- From: Michael Ströder > Sent: Tu

Re: postfix and multiple TLS certificates (SNI support?)

2015-12-15 Thread Michael Ströder
Wietse Venema wrote: > Wietse: >> This session has multiple recipients, in different domains that >> have the same MX host. Whose SNI [domain] shall be used? > > Michael Storz: > [Examples that do not use SNI] > > Nice try, but that did not answer the question. > >> On the other side: if you do

Re: postfix and multiple TLS certificates (SNI support?)

2015-12-15 Thread Michael Ströder
Alice Wonder wrote: > On 12/15/2015 07:40 AM, Michael Storz wrote: >> Sorry for not writing it explicitly. In the case I described, you use >> the domain of the recipient address, because this is the only >> information you can trust (and this domain must be included in the SAN). >> Since you have

Re: "Fail Safe" on LDAP failure

2016-02-15 Thread Michael Ströder
s health-check would be customizable. Example: When a fresh OpenLDAP replica during initialization is not fully functional yet the contextCSN attribute in the root entry of the database is not present. Would be nice to have LDAP map parameters to define a health-check for that. Ciao, Michael.

Re: SV: Security: How to limit authentication attempts?

2016-02-22 Thread Michael Ströder
Kiss Gábor wrote: >>> My colleagues need authenticated channel to submit mails when traveling. >>> So disabling sasl is not an option. >> >> read again i just say disalbe it on port 25 >> >> and convense users to use submission port 587, or 465 as users se fits > > Can you guarantee that hotel fir

Re: Feature request

2016-05-07 Thread Michael Ströder
Christian Rößner wrote: > I use OpenLDAP with Postfix. Today I tried to make OpenLDAP more secure by > requiring TLSv1.2. At this point Postfix stopped working. I set TLSProtocolMin 3.3 (requires TLS 1.2) in my slapd.conf and ldap table of postfix 2.11.7 still works (both running on openSUSE Facto

smtp_tls_policy_maps: Restrict CA certs

2014-10-25 Thread Michael Ströder
HI! Can I define a special CA cert bundle in smtp_tls_policy_maps for a certain recipient domain? Which keyword(s) to use? For example I have a line like this in the map for recipient domain 'example.com': example.com verify protocols=TLSv1 ciphers=high Can I add to this line something like "C

Re: smtp_tls_policy_maps: Restrict CA certs

2014-10-25 Thread Michael Ströder
li...@rhsoft.net wrote: > > Am 25.10.2014 um 15:29 schrieb Michael Ströder: >> Can I define a special CA cert bundle in smtp_tls_policy_maps for a certain >> recipient domain? Which keyword(s) to use? >> >> For example I have a line like this in the map for re

Re: smtp_tls_policy_maps: Restrict CA certs

2014-10-25 Thread Michael Ströder
Wietse Venema wrote: > Michael Str?der: >> Quote from http://www.postfix.org/postconf.5.html#smtp_tls_policy_maps >> >> "The lookup result is a security level, followed by an optional list of >> whitespace and/or comma separated name=value attributes that override related >> main.cf settings." >> >

Re: smtp_tls_policy_maps: Restrict CA certs

2014-10-25 Thread Michael Ströder
Wietse Venema wrote: > Michael Str?der: >> Well, I have read the docs (see quote from postfix web site above). But the >> statement in the docs is pretty broad/unprecise: >> >> "followed by an optional list of whitespace and/or comma separated name=value >> attributes that override related main.cf

Re: smtp_tls_policy_maps: Restrict CA certs

2014-10-26 Thread Michael Ströder
Viktor Dukhovni wrote: > Note, when you "pin" the issuer if a domain's certificate chain > you have the luxury of more time between updates, but eventually > the site will obtain a certificate from some other CA or a new > issuer key from the same CA. Yupp. I'm aware of that. For those sites I'm

Re: TLS SNI support

2014-11-07 Thread Michael Ströder
Peter wrote: > It's pointless for MX hosts because they don't validate the certificate > anyways. Which has to be changed. Ciao, Michael. smime.p7s Description: S/MIME Cryptographic Signature

Re: TLS SNI support

2014-11-07 Thread Michael Ströder
li...@rhsoft.net wrote: > until now nobody was able to tell me any benefit of multiple server names for > a mailserver instead 1 hostname, 1 certificate and 1 PTR matching the A-record > and HELO name with 100, 200, 300, 500 MX records in different domains pointing > there https://tools.ietf.org/h

Re: TLS SNI support

2014-11-07 Thread Michael Ströder
lst_ho...@kwsoft.de wrote > Zitat von Michael Ströder : > > > Peter wrote: > >> It's pointless for MX hosts because they don't validate the certificate > >> anyways. > > > > Which has to be changed. > > http://www.postfix.org/TLS_README.h

Re: TLS SNI support

2014-11-07 Thread Michael Ströder
li...@rhsoft.net wrote: > > Am 07.11.2014 um 09:36 schrieb Michael Ströder: >> li...@rhsoft.net wrote: >>> until now nobody was able to tell me any benefit of multiple server names >>> for >>> a mailserver instead 1 hostname, 1 certificate and 1 PTR match

Re: TLS SNI support

2014-11-07 Thread Michael Ströder
Viktor Dukhovni wrote: > On Fri, Nov 07, 2014 at 09:36:12AM +0100, Michael Str?der wrote: > >> li...@rhsoft.net wrote: >>> until now nobody was able to tell me any benefit of multiple server names >>> for >>> a mailserver instead 1 hostname, 1 certificate and 1 PTR matching the >>> A-record >>>

Re: TLS SNI support

2014-11-07 Thread Michael Ströder
Viktor Dukhovni wrote: > The rationale for the DANE work is in: > > http://tools.ietf.org/html/draft-ietf-dane-smtp-with-dane-13#section-1.3 I've already read/analyzed all DANE related RFCs and almost all drafts in detail. Also some IETF presentation slides. As already mentioned on the IETF

Re: TLS SNI support

2014-11-07 Thread Michael Ströder
li...@rhsoft.net wrote: > Am 07.11.2014 um 18:22 schrieb Michael Ströder: >> Viktor Dukhovni wrote: >>> The rationale for the DANE work is in: >>> >>> >>> http://tools.ietf.org/html/draft-ietf-dane-smtp-with-dane-13#section-1.3 >> >

Re: TLS SNI support

2014-11-07 Thread Michael Ströder
li...@rhsoft.net wrote: > Am 07.11.2014 um 19:19 schrieb Michael Ströder: >> So ask yourself: >> If everybody uses the same sort of crappy registration interfaces for their >> DNS entries while simply auto-signing DNS zone entries. Is there a real >> chance >&g

Re: sender login maps and alias domains

2014-11-20 Thread Michael Ströder
li...@rhsoft.net wrote: > but LDAP is a very limited database missing things like joins, views and a lot > of other things you can easily do with a SQL query While you're right you don't recommend using joins for productive use, do you? > - don't blame the messenger > and just setup a wrapper fet

Re: rfc5322 compliance of Date: field

2014-12-10 Thread Michael Ströder
li...@rhsoft.net wrote: > Am 10.12.2014 um 20:17 schrieb Peter Volkov: >> We use smtplib in python to send mail through postfix. As I saw from >> tcpdump smtplib does not set "Date:" field, so I suspect postfix does >> that. Now, as I see postfix sets date as: >> Date: Wed, 10 Dec 2014 05:40:50 -08

Re: A highly goofed installation Postfix/Dovecot/Squirrelmail

2014-12-14 Thread Michael Ströder
ghalvor...@hushmail.com wrote: > A HOWTO that has been around for a few months is still nice, especially if > the author maintains it so that the flaws and errors are corrected as > people point them out. I am really surprised at how no one really adopts > the crowd-source wiki approach. It seems

tcp_table with SSL/TLS

2015-01-10 Thread Michael Ströder
HI! Are there any plans to support encrypted connections with tcp_table(5) maps? Something like a stcp: map? Of course I can use stunnel -c but it would be nice if it's possible without another moving part. Ciao, Michael. smime.p7s Description: S/MIME Cryptographic Signature

Re: tcp_table with SSL/TLS

2015-01-10 Thread Michael Ströder
wie...@porcupine.org (Wietse Venema) wrote: > Viktor Dukhovni: >> On Sat, Jan 10, 2015 at 08:22:17PM +0100, Michael Str?der wrote: >> >>> Are there any plans to support encrypted connections with tcp_table(5) maps? >>> Something like a stcp: map? >>> >>> Of course I can use stunnel -c but it would

Re: tcp_table with SSL/TLS

2015-01-12 Thread Michael Ströder
DTNX Postmaster wrote: > OpenSSH is also an > option, the latest release even supports Unix domain socket forwarding. Uurrgs! I definitely don't want to give SSH access! Yes, I could start another restricted sshd but that's too complex given that I can very easily implement SSL/TLS support at th

Re: DMARC

2015-01-19 Thread Michael Ströder
James, that sounds like you should write an I-D "DMARC considered harmful". ;-) Ciao, Michael. James B. Byrne wrote: > > On Sun, January 18, 2015 20:14, John wrote: >> I am not sure about implementing DMARC on my servers. >> However, is it worth adding a DMARC record to the DNS? What, if >> any

Re: custom script adds header

2015-01-19 Thread Michael Ströder
wie...@porcupine.org (Wietse Venema) wrote: > m...@ruggedinbox.com: >> and the header is still there. > > By default, Postfix REMOVES Return-Path headers from email messages. > The default setting is: > > message_drop_headers = bcc, content-length, resent-bcc, return-path From http://www.pos

Re: is there a 'typical' smtpd resend delay ? do you use Deep Protocol Tests in your production?

2015-01-23 Thread Michael Ströder
rogt3...@proinbox.com wrote: > Perhaps you might want to hang out with a email crowd. Over the years, > been on the exim list? Ever had the pleasure of dealing with > [..snipped..] IMO it's not fair to mention another person who cannot answer. Please, everybody should calm down, step back for n

Re: How to detect the receiving of mail for sure from only that relay and then make action only in that case?

2015-01-30 Thread Michael Ströder
Viktor Dukhovni wrote: > On Fri, Jan 30, 2015 at 05:27:59AM +, srach wrote: > ?1. Know for sure that the relay mail comes from the #1 server.? A added header can be made fake so I look for a better way that is not possible to fake. >> >>> Restrict access to the non-default port

Re: detecting encryption for outgoing mail

2015-02-16 Thread Michael Ströder
LuKreme wrote: > I’d assume there would be something in the headers to indicate the message > was encrypted. Probably some sort of milter running on your submission port > would be able to check this? I'd implement a milter or similar which looks at the Content-Type header. Typically it looks lik

Re: detecting encryption for outgoing mail

2015-02-16 Thread Michael Ströder
Erwan David wrote: > Le 16/02/2015 14:09, Michael Ströder a écrit : >> LuKreme wrote: >>> I’d assume there would be something in the headers to indicate the message >>> was encrypted. Probably some sort of milter running on your submission port >>> would be ab

Re: using a simpler form than transport_maps for forwarding mail -- what and where in main.cf does it go?

2015-05-19 Thread Michael Ströder
aleph2...@gmx.com wrote: > Hehe. Yeah, *I'M* the problem. Hint: take a read through some of your > posting history here. Look for patterns. Oops, I mean PATTERNS. The pattern is that some people are able to read the very extensive postfix docs, get their even complex setups running, and never

Re: encrypt incoming emails with my public gpg key

2015-06-04 Thread Michael Ströder
Sebastian Nielsen wrote: > I would suggest using Ciphermail / Djigzo for this. > But I think you are solving your problem in a very incorrect way. Since the > hosting company do have access to the VM, they could easy listen on the memory > before the mail is encrypted, just after it has been decryp

Re: Update to recommended TLS settings

2015-08-06 Thread Michael Ströder
Viktor Dukhovni wrote: > On Thu, Aug 06, 2015 at 09:13:53AM +0200, Sven Schwedas wrote: >> Why medium and not high, while we're at it? What clients would have >> problems with it? > > Because cleartext is not stronger than medium. If you make TLS > impossible for peers that only support medium, t

Re: Update to recommended TLS settings

2015-08-06 Thread Michael Ströder
Viktor Dukhovni wrote: > On Thu, Aug 06, 2015 at 10:25:04AM +0200, Michael Str?der wrote: > >>> On Thu, Aug 06, 2015 at 09:13:53AM +0200, Sven Schwedas wrote: Why medium and not high, while we're at it? What clients would have problems with it? >>> >>> Because cleartext is not stronger t

Re: starttls connection to LDAP server for postmap

2015-08-14 Thread Michael Ströder
Frederic Van Espen wrote: > When receiving a mail we lookup in ldap where the mail needs to go. > This works fine for a simple unsecured ldap connection, but when I try to > enable > start_tls I consistently receive this error when receiving a mail: > warning: dict_ldap_set_tls_options: Unable to

Re: Postfix and Mailman 2 virtual alias domain integration

2015-08-18 Thread Michael Ströder
Ron Wheeler wrote: > The MX record has to point to an A or CNAME that maps to the actual machine > where your main service (Postfix) runs. IIRC the MX should not point to a CNAME as target host to make proper loop detection work. Or am I wrong? See https://tools.ietf.org/html/rfc5321#section-5.1:

Re: Why no List-ID header in the postfix-users posts?

2017-02-12 Thread Michael Ströder
Josh Good wrote: > On 2017 Feb 11, 19:18, li...@lazygranch.com wrote: >> So technically integrity is assured from server to server, but not between >> clients >> and server. > > That is correct. DKIM is for MTA-to-MTA integrity. There are no widely used MUA implementations making use of DKIM but

Re: Why no List-ID header in the postfix-users posts?

2017-02-12 Thread Michael Ströder
Josh Good wrote: > On 2017 Feb 12, 16:17, Michael Ströder wrote: >> Josh Good wrote: >>> On 2017 Feb 11, 19:18, li...@lazygranch.com wrote: >>>> So technically integrity is assured from server to server, but not between >>>> clients >>>> and s

Re: Postfix 20 years ago

2017-02-12 Thread Michael Ströder
Wietse Venema wrote: > Last month it was 20 years ago that I started writing Postfix code. Wietse, don't remember the exact date but probably a couple of months after your first release I've migrated a company's mail servers to postfix. postfix was chosen after reading some of your comments som

Re: smtpd_recipient_restrictions with ldap

2017-04-04 Thread Michael Ströder
Paolo Barbato wrote: > postmap: warning: dict_ldap_lookup: > /opt/trend/imss/OpenLDAP/etc/openldap/myBad.cf: > Search base 'dc=cgprouter' not found: 32: No such object As Brett already said: Most likely this configuration line is wrong: ldaprfx_search_base = dc=cgprouter Make sure to put the ri

Re: OT? - Blocking attachments

2017-05-14 Thread Michael Ströder
john wrote: > 1. block all email with attachments - a little too drastic for some as there > are legit > reasons for attachments. > block all email that is in any format that can hide executable code. IMO this won't work. > 2. rename attachments so that they will not/cannot be executed/

Re: using postfix mta with ldap

2017-06-02 Thread Michael Ströder
Joshua Bonneville wrote: > I am attempting to build a postfix mta server to act as a mail router based > on ldap > queries to route users to one of two mail environments we have that are on > the same > domain, but different providers. I have been unsuccessful in finding a proper > way of > sett

Re: SASL vs. TLS

2017-08-15 Thread Michael Ströder
Marat Khalili wrote: > On 15/08/17 15:55, Tom Browder wrote: >> (2) use TLS client certs for the authentication of the relay clients, and > > I see problem with this part. Nothing in docs says postfix uses or at least > properly > traces and logs client CNs from presented certificates. Therefore

Re: SASL vs. TLS

2017-08-15 Thread Michael Ströder
Tom Browder wrote: > On Tue, Aug 15, 2017 at 10:48 Marat Khalili wrote: > >> I think your thanks should certainly go to Michael! > > You are correct! > > Many thanks, Michael! I hope to use that TLS capability soon. You're welcome. But credits go to Wietse, Viktor, Lutz, et al who have implem

Re: Authenticating clients based on CA/CN-match

2017-09-18 Thread Michael Ströder
martin f krafft wrote: also sprach Viktor Dukhovni [2017-09-18 00:31 +0200]: So your certral system generates the keys, and obtains the LE certificates on behalf of the far-flung hosts? And then pushes these keys to the hosts over an SSH tunnel? Is that only for the initial key issuance? An

Re: Authenticating clients based on CA/CN-match

2017-09-18 Thread Michael Ströder
martin f krafft wrote: In fact, there are three options right now: a/ collect and deploy the fingerprints, as you say b/ use a self-signed certificate with life-time 99 years just for this purpose c/ use public key fingerprints instead of the cert fingerprints I think (a) is really j

Re: Click tracker removal ideas?

2019-02-14 Thread Michael Ströder
On 2/14/19 6:30 PM, Jan P. Kessler wrote: >>> Does anyone have any suggestions for a tool for filtering out click >>> trackers from links in email bodies and rewriting the links without >>> the click tracking? >> Anything that does this will also break DKIM, if the email has it >> (which many do).

SSL_CTX_set_mode(client_ctx, SSL_MODE_RELEASE_BUFFERS);

2019-03-23 Thread Michael Ströder
HI! Could someone please have a look at this RPM patch: https://build.opensuse.org/package/view_file/server:mail/postfix/postfix-ssl-release-buffers.patch?expand=1 I'm currently trying to update the RPM to 3.4.4 and I'd like to know whether the above makes sense or whether it might even cause is

Re: Which LDAP schema contains objeclass ldapgroup

2019-04-13 Thread Michael Ströder
On 4/12/19 5:11 AM, luckydog xf wrote:   As listed http://ftp.uma.es/mirror/postfix/doc/LDAP_README.html and mentioned an objeclass  objectclass: ldapgroup - Which Schema contains this objectclass? It's pretty hard to google it, all are related with bais knowledge of LDAP if I use k

Re: TLS client certificates and auth external

2019-04-19 Thread Michael Ströder
On 4/18/19 9:45 PM, Viktor Dukhovni wrote: On Apr 18, 2019, at 12:01 PM, Wietse Venema wrote: Eventually there will be a postfix--nonprod release that combines all the code (jay) and none of the guarantees (bleh). I am not convinced that stuffing arbitrary PKI identities into a SASL identi

Re: TLS client certificates and auth external

2019-04-19 Thread Michael Ströder
On 4/19/19 7:10 PM, Wietse Venema wrote: Michael Str?der: On 4/18/19 9:45 PM, Viktor Dukhovni wrote: On Apr 18, 2019, at 12:01 PM, Wietse Venema wrote: Eventually there will be a postfix--nonprod release that combines all the code (jay) and none of the guarantees (bleh). I am not convinc

Re: TLS client certificates and auth external

2019-04-19 Thread Michael Ströder
On 4/20/19 1:09 AM, Viktor Dukhovni wrote: On Apr 19, 2019, at 6:42 PM, Michael Ströder wrote: If a cert's key get compromised (e.g. laptop lost/stolen) I expect the user's cert to be revoked and a new cert to be issued for the *same* subject name. How to deal with that without