On 9/28/06, Henrik Ostergaard <[EMAIL PROTECTED]> wrote:
This sounds promissing! But I have distributed, moving users and therefore
uses pop-before-smtp for authentication, which means that my IP list is in a
hash table, which is not in CIDR format. :-(

Your best choice is to set up SASL authentication.  I don't think
these milters will play nice with pop-before-smtp.  At best you would
have to restart the milter evertime someone checked their mail.

I came to think of something else - the approach described in the original
post suggests all mails are verified, but only authenticated mails are
signed.

No, the program chooses which to do based on parameters already
discussed.  Authorized clients get signed, all others get verified.

It could probably rather easily be changed to sending the
non-locally submitted mails through the verification AFTER the content
filter. Ie in master.cf moving the lines
         -o milter_default_action=accept
         -o milter_macro_daemon_name=MTA
         -o smtpd_milters=inet:127.0.0.1:4442,inet:127.0.0.1:4443

from the section
          smtp      inet  n       -       -       -       -       smtpd
to the section
          localhost:10025 inet  n  -      n       -       10      smtpd


This looses the client information, and thinks localhost submitted all
the mail.  Mail with forged sender address (or from a mail list) would
be signed.

Will this approach break the signatures if (when) the content filter
(amavis) adds headers?

Amavisd-new adds the headers on top so as to not break signatures.
Also using the -H option when signing tells dk-filter which headers to
use when verifying.  But you shouldn't sign mail after the
content_filter, mail should only be signed at the point it first
enters your network.

This is way off topic for this list, post any followup questions to
the amavis-users or postfix-users list.

--
Noel Jones

Reply via email to