Package: python-policyd-spf
Version: 0.4-3
Severity: important

I entered the RCPT TO twice as below and it was accepted after the second 
entry. The email is obviously spoofed and SPF knows it.

$ netcat 10.10.10.213 25
220 mail.cacert.org ESMTP mailserver
EHLO  controlledmail.com
250-mail.cacert.org
250-PIPELINING
250-SIZE 10240000
250-ETRN
250-STARTTLS
250-ENHANCEDSTATUSCODES
250-8BITMIME
250 DSN
MAIL FROM: [EMAIL PROTECTED]
250 2.1.0 Ok
RCPT TO: [EMAIL PROTECTED]
550 5.7.1 <[EMAIL PROTECTED]>: Recipient address rejected: Received-SPF: Fail 
(SPF fail - not authorized) Mail From client-ip=10.10.10.213; 
helo=controlledmail.com; [EMAIL PROTECTED]; [EMAIL PROTECTED];
RCPT TO: [EMAIL PROTECTED]
250 2.1.5 Ok
DATA
354 End data with <CR><LF>.<CR><LF>
this worked
..
250 2.0.0 Ok: queued as 4CDC1232A7


My postfix config includes:
main.cf
smtpd_recipient_restrictions =
        permit_mynetworks
        permit_tls_clientcerts
        reject_unauth_destination
        check_policy_service unix:private/policyd-spf
                                 
master.cf
        policyd-spf  unix  -       n       n       -       0       spawn
        user=nobody argv=/usr/bin/python /usr/bin/policyd-spf 
/etc/python-policyd-spf/policyd-spf.conf


# grep ^[^#] /etc/python-policyd-spf/policyd-spf.conf
debugLevel = 4
defaultSeedOnly = 1
HELO_reject = No_Check
Mail_From_reject = Fail
PermError_reject = False
TempError_Defer = False


/var/log/mail.log
Aug 12 03:29:32 mail policyd-spf[31138]: Starting
Aug 12 03:29:32 mail policyd-spf[31138]: Read line: 
"request=smtpd_access_policy"
Aug 12 03:29:32 mail policyd-spf[31138]: Read line: "protocol_state=RCPT"
Aug 12 03:29:32 mail policyd-spf[31138]: Read line: "protocol_name=ESMTP"
Aug 12 03:29:32 mail policyd-spf[31138]: Read line: 
"client_address=10.10.10.213"
Aug 12 03:29:32 mail policyd-spf[31138]: Read line: 
"client_name=mail.cacert.org"
Aug 12 03:29:32 mail policyd-spf[31138]: Read line: 
"reverse_client_name=mail.cacert.org"
Aug 12 03:29:32 mail policyd-spf[31138]: Read line: 
"helo_name=controlledmail.com"
Aug 12 03:29:32 mail policyd-spf[31138]: Read line: "[EMAIL PROTECTED]"
Aug 12 03:29:32 mail policyd-spf[31138]: Read line: "[EMAIL PROTECTED]"
Aug 12 03:29:32 mail policyd-spf[31138]: Read line: "recipient_count=0"
Aug 12 03:29:32 mail policyd-spf[31138]: Read line: "queue_id="
Aug 12 03:29:32 mail policyd-spf[31138]: Read line: 
"instance=7996.46be7e92.4a33.0"
Aug 12 03:29:32 mail policyd-spf[31138]: Read line: "size=0"
Aug 12 03:29:32 mail policyd-spf[31138]: Read line: "etrn_domain="
Aug 12 03:29:32 mail policyd-spf[31138]: Read line: "sasl_method="
Aug 12 03:29:32 mail policyd-spf[31138]: Read line: "sasl_username="
Aug 12 03:29:32 mail policyd-spf[31138]: Read line: "sasl_sender="
Aug 12 03:29:32 mail policyd-spf[31138]: Read line: "ccert_subject="
Aug 12 03:29:32 mail policyd-spf[31138]: Read line: "ccert_issuer="
Aug 12 03:29:32 mail policyd-spf[31138]: Read line: "ccert_fingerprint="
Aug 12 03:29:32 mail policyd-spf[31138]: Read line: "encryption_protocol="
Aug 12 03:29:32 mail policyd-spf[31138]: Read line: "encryption_cipher="
Aug 12 03:29:32 mail policyd-spf[31138]: Read line: "encryption_keysize=0"
Aug 12 03:29:32 mail policyd-spf[31138]: Read line: ""
Aug 12 03:29:32 mail policyd-spf[31138]: Found the end of entry
Aug 12 03:29:32 mail policyd-spf[31138]: Config: {'Mail_From_reject': 'Fail', 
'PermError_reject': 'False', 'HELO_reject': 'No_Check', 'defaultSeedOnly': 1, 
'debugLevel': 4, 'TempError_Defer': 'False'}
Aug 12 03:29:32 mail policyd-spf[31138]: spfcheck: pyspf result: "['fail', 'SPF 
fail - not authorized', 'Mail From']"
Aug 12 03:29:32 mail policyd-spf[31138]: SPF fail - not authorized:Mail From 
client-ip=10.10.10.213; helo=controlledmail.com; [EMAIL PROTECTED]; [EMAIL 
PROTECTED];
Aug 12 03:29:32 mail postfix/smtpd[31126]: NOQUEUE: reject: RCPT from 
mail.cacert.org[10.10.10.213]: 550 5.7.1 <[EMAIL PROTECTED]>: Recipient address 
rejected: Received-SPF: Fail (SPF fail - not authorized) Mail From 
client-ip=10.10.10.213; helo=controlledmail.com; [EMAIL PROTECTED]; [EMAIL 
PROTECTED]; ; from=<[EMAIL PROTECTED]> to=<[EMAIL PROTECTED]> proto=ESMTP 
helo=<controlledmail.com>


Aug 12 03:29:36 mail policyd-spf[31138]: Read line: 
"request=smtpd_access_policy"
Aug 12 03:29:36 mail policyd-spf[31138]: Read line: "protocol_state=RCPT"
Aug 12 03:29:36 mail policyd-spf[31138]: Read line: "protocol_name=ESMTP"
Aug 12 03:29:36 mail policyd-spf[31138]: Read line: 
"client_address=10.10.10.213"
Aug 12 03:29:36 mail policyd-spf[31138]: Read line: 
"client_name=mail.cacert.org"
Aug 12 03:29:36 mail policyd-spf[31138]: Read line: 
"reverse_client_name=mail.cacert.org"
Aug 12 03:29:36 mail policyd-spf[31138]: Read line: 
"helo_name=controlledmail.com"
Aug 12 03:29:36 mail policyd-spf[31138]: Read line: "[EMAIL PROTECTED]"
Aug 12 03:29:36 mail policyd-spf[31138]: Read line: "[EMAIL PROTECTED]"
Aug 12 03:29:36 mail policyd-spf[31138]: Read line: "recipient_count=0"
Aug 12 03:29:36 mail policyd-spf[31138]: Read line: "queue_id="
Aug 12 03:29:36 mail policyd-spf[31138]: Read line: 
"instance=7996.46be7e92.4a33.0"
Aug 12 03:29:36 mail policyd-spf[31138]: Read line: "size=0"
Aug 12 03:29:36 mail policyd-spf[31138]: Read line: "etrn_domain="
Aug 12 03:29:36 mail policyd-spf[31138]: Read line: "sasl_method="
Aug 12 03:29:36 mail policyd-spf[31138]: Read line: "sasl_username="
Aug 12 03:29:36 mail policyd-spf[31138]: Read line: "sasl_sender="
Aug 12 03:29:36 mail policyd-spf[31138]: Read line: "ccert_subject="
Aug 12 03:29:36 mail policyd-spf[31138]: Read line: "ccert_issuer="
Aug 12 03:29:36 mail policyd-spf[31138]: Read line: "ccert_fingerprint="
Aug 12 03:29:36 mail policyd-spf[31138]: Read line: "encryption_protocol="
Aug 12 03:29:36 mail policyd-spf[31138]: Read line: "encryption_cipher="
Aug 12 03:29:36 mail policyd-spf[31138]: Read line: "encryption_keysize=0"
Aug 12 03:29:36 mail policyd-spf[31138]: Read line: ""
Aug 12 03:29:36 mail policyd-spf[31138]: Found the end of entry
Aug 12 03:29:36 mail policyd-spf[31138]: Config: {'Mail_From_reject': 'Fail', 
'PermError_reject': 'False', 'HELO_reject': 'No_Check', 'defaultSeedOnly': 1, 
'debugLevel': 4, 'TempError_Defer': 'False'}
Aug 12 03:29:36 mail postfix/smtpd[31126]: 4CDC1232A7: 
client=mail.cacert.org[10.10.10.213]
Aug 12 03:29:48 mail postfix/cleanup[31139]: 4CDC1232A7: message-id=<[EMAIL 
PROTECTED]>
Aug 12 03:29:48 mail postfix/qmgr[30221]: 4CDC1232A7: from=<[EMAIL PROTECTED]>, 
size=397, nrcpt=1 (queue active)
Aug 12 03:29:48 mail postfix/local[31140]: warning: database /etc/aliases.db is 
older than source file /etc/aliases
Aug 12 03:29:48 mail postfix/local[31140]: 4CDC1232A7: to=<[EMAIL PROTECTED]>, 
relay=local, delay=26, delays=26/0.01/0/0.06, dsn=2.0.0, status=sent (delivered 
to mailbox)
Aug 12 03:29:48 mail postfix/qmgr[30221]: 4CDC1232A7: removed





-- System Information:
Debian Release: 4.0
  APT prefers stable
  APT policy: (990, 'stable'), (500, 'testing')
Architecture: amd64 (x86_64)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.20-vs2.2.0-gentoo
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)

Versions of packages python-policyd-spf depends on:
ii  python                        2.4.4-2    An interactive high-level object-o
ii  python-spf                    2.0.3-2    sender policy framework (SPF) modu
ii  python-support                0.5.6      automated rebuilding support for p

Versions of packages python-policyd-spf recommends:
ii  postfix                       2.3.8-2    A high-performance mail transport 

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to