Spare your breath. I have solved my issue AWS-SES, and it behaves well now with 
Pigeonhole Sieve Vacation (s. patch attached)

Many thanks for all your thoughts. I will leave the list now.

Best regards

Rolf

Attachment: pigeonhole-vacation-sender-fix.patch
Description: Binary data


> Am 11.02.2023 um 09:01 schrieb Paul Kudla <p...@scom.ca>:
> 
> 
> Ok again just trying to help
> 
> ___
> The question on why I use AWS-SES as my outbound mail relays can be simply 
> answered with the attribute „superior reputation“.
> ___
> 
> 
> that being said, again an experience thing that most people do not know about 
> !
> 
> opensrs (i use them for my domain registration thus i had a wholesale account 
> setup and could interact with tech support on other issues, this being an 
> example of one.)
> 
> that being said ....
> 
> reputations are mostly purchased now a days, people do not block server's 
> based on reputation that in most cases is actually paid for.
> 
> For example years ago I had a customer receive an email from a supplier in 
> china
> 
> Suppliers MUST have a bank transfer etc before they will ship
> 
> My customer lost 15000.00 us in a bogus transfer because opensrs's email 
> servers were on a spf whitelist?
> 
> What can i say experience, spf is designed to prevent spam emails but more so 
> verify that they came from an authorized server.
> 
> Believe it or not, the supplier got hacked, the hacker setup a duplicate 
> email with the same email address on an opensrs server.
> 
> SPF would have caught it except opensrs's email server are whitelisted !
> 
> Customer lost the money, unable to recover and opensrs denied any 
> responsibilty for paying to be whitelisted.
> 
> My SPF system is now patched to skip any whitelist via SPF as it functions as 
> it should now.
> 
> Microsoft, Google etc are also other culprites on bypassing things in the 
> name of saving some bandwidth.
> 
> Anything within there systems are generally automatically whitelisted, Again 
> another customer, they are on Outlook 365, I received an email that said our 
> domains were suspended etc, nothing new there get those all the time, the 
> worrisom part was someone setup an email server, then proxied through 
> microsoft in a way that was very clever, had an spf record and everything 
> setup, but they were using microsoft as a proxy to a microsoft account so the 
> mail got delivered when again it should have bounced back as invalid sender.
> 
> I understand this is not directly related but reputations are paid for and 
> relays will never fully work upstream as it is dependant on what the upstream 
> provider changes from time to time
> 
> Its a cat and mouse game that will never end.
> 
> 
> Again just trying to help.
> 
> 
> Happy Saturday !!!
> Thanks - paul
> 
> Paul Kudla
> 
> 
> Scom.ca Internet Services <http://www.scom.ca>
> 004-1009 Byron Street South
> Whitby, Ontario - Canada
> L1N 4S3
> 
> Toronto 416.642.7266
> Main 1.866.411.7266
> Fax 1.888.892.7266
> Email p...@scom.ca
> 
> On 2/10/2023 9:27 AM, Dr. Rolf Jansen wrote:
>> As stated elsewhere, the severe problem of incomprehensible OoO notice comes 
>> not because I relay MY outbound mails via Amazon’s SES but because some of 
>> MY PEERS (senders of the original messages and receivers of OoO notices) do 
>> or perhaps other relays which do funny manipulations of envelope sender and 
>> some headers in the message body as well. That said, my usage of AWS-SES may 
>> probably raise similar problems to the receivers of our mails wanting to 
>> return OoO notices to our users.
>> The question on why I use AWS-SES as my outbound mail relays can be simply 
>> answered with the attribute „superior reputation“. My experience is that SES 
>> is blocked nowhere, except perhaps in North Korea, I didn’t try yet. For 
>> professional emails this is mission critical, and you cannot even get close 
>> to this if you setup somewhere, somehow your best practice own relay.
>> This reputation has of course to do with SES controlling bounces. SES does 
>> control outgoing rate. SES does control the domain of the sender's address 
>> (envelop and From:) has been registered with the service. They do everything 
>> that SES ist not being compromised by any criminals. For me this is 
>> important, and then I need to live with the peculiarities and annoyances and 
>> perhaps find workarounds.
>> Best regards
>> Rolf
>>> Am 10.02.2023 um 10:30 schrieb Paul Kudla <p...@scom.ca>:
>>> 
>>> Good morning,
>>> I have been following this post for a bit and would like to share 
>>> experience please and thanks.
>>> 
>>> This is not meant to give a solution but save some massive frustration with 
>>> other system as i have gone through the same issues overall.
>>> 
>>> In general I found found over the past few years all the big boys are 
>>> forcing all the private systems into standards that are not really defined 
>>> and get implemented willy nilly.
>>> 
>>> Just because microsoft starts a standard, then google picks up on it then 
>>> AWS and then yahoo etc etc in any order does not mean its a proper approach.
>>> 
>>> That being said is there any reason why you are not sending the emails 
>>> directly yourself, ie why are you using a proxy.
>>> 
>>> I found (for example) when forwarding an email from @scom.ca to gmail for 
>>> example all the headers, dkim, spf records are all passed along which 
>>> resulted in emails never being allowed to be delivered.
>>> 
>>> Although this may be your issue directly or indirectly what i found is to 
>>> forward to a gmail.com account i had to program the gmail.com account to 
>>> pop my server. This does work well but only for gmail.com
>>> 
>>> I have other customers where i try to pop the email from whatever system 
>>> (which does work) but when i forward to an account on my system postfix 
>>> rewrite the header from address to the mailxx.scom.ca email server name 
>>> being used to forward the email which generates the same issues you are 
>>> having in the headers being rewritten not showing the from address?
>>> 
>>> My server's are setup with custom python programming filters developed over 
>>> ten years and i can not seem to control anything either?
>>> 
>>> I get you do production stuff (so do my customers) which is why it might be 
>>> better to send via a postfix instance that you are in control of
>>> 
>>> of couse this does require a static ip etc which i dont know if you have 
>>> access to or not?
>>> 
>>> but i think this would save a lot of frustration trying to be "COMPATIBLE" 
>>> with everyone else out there that do not even follow their own standards?
>>> 
>>> 
>>> Just though i would pass this info along, trying to help ?
>>> 
>>> 
>>> 
>>> Happy Friday !!!
>>> Thanks - paul
>>> 
>>> Paul Kudla
>>> 
>>> 
>>> Scom.ca Internet Services <http://www.scom.ca>
>>> 004-1009 Byron Street South
>>> Whitby, Ontario - Canada
>>> L1N 4S3
>>> 
>>> Toronto 416.642.7266
>>> Main 1.866.411.7266
>>> Fax 1.888.892.7266
>>> Email p...@scom.ca
>>> 
>>> On 2/10/2023 7:18 AM, Dr. Rolf Jansen wrote:
>>>>> Am 08.02.2023 um 20:03 schrieb Michael Peddemors <mich...@linuxmagic.com>:
>>>>> 
>>>>> Dovecot vacation message issues..
>>>>> Tough for any system to do correctly.
>>>>> 
>>>>>> The problem here is that inbound mails from third parties utilizing 
>>>>>> AWS-SES come in with an unpersonalized envelope address and SES takes 
>>>>>> returns to this as bounce messages and changes the body's From: to 
>>>>>> „mailer-dae...@xx-zzzz-1.amazonses.com“, which is not even our 
>>>>>> MAILER-DAEMON but the one of the receiver of our reply. So the receiver 
>>>>>> gets no chance to know from the headers the identity of whom replied - 
>>>>>> he may assume it from the context the actual message, though.
>>>>> 
>>>>> We addressed this by NOT returning vacation messages to systems that 
>>>>> don't use 'proper' values in the MAIL FROM.. Eg Mailing Lists, Sender 
>>>>> Rewrite schemes, and a slurry of other rules.
>>>> Who is we? Your organization or the Pigeonhole developers? Actually, the 
>>>> question is, whether this is addressed somewhere in Pigeonhole’s code 
>>>> already?
>>>>> But the problem is that if you are using the header From, or Reply-To 
>>>>> etc, it's too easy to be sending to forged email addresses.
>>>>> 
>>>>> Vacation bombing attacks for instance..
>>>> You got a point here, and of course I want to prevent this.
>>>>> Now, there are legitimate cases of the MAIL FROM and header from not 
>>>>> aligning, so it is best to send to the MAIL FROM addresses.. IF you don't 
>>>>> send it to certain MAIL FROM formats, usually by not responding to 
>>>>> anything with mailing list identifiers, auto-suppress headers, and a few 
>>>>> others, you only end up with clean MAIL FROM to respond to.
>>>> From the point of the view of our industrial customers, who are operating 
>>>> processes with our chemicals, this consideration is irrelevant. If they 
>>>> inform a production issue by mail to the responsible service technician, 
>>>> they expect an immediate response, since a production stop is 
>>>> unacceptable. OoO notices play a role here, because we would inform 
>>>> alternative addresses and fone numbers for attending the support case.
>>>> That said, with Pigeonhole, we are almost there.
>>>>> But if you have an example that is particularly bothering you, and 
>>>>> represents your problem, we can walk through that as an example.
>>>> I send an email from an account of a mail server (Postfix/Dovecot - 
>>>> outbound relay SES) running on an AWS-EC2 instance in São Paulo (Brazil) 
>>>> to another mail address of mine of a mail server (Postfix/Dovecot direct 
>>>> MX) on an AWS-EC2 instance in Frankfurt Germany, and here the Pigeonhole’s 
>>>> vacation reply is activated.
>>>> In the following I changed my real mail address in Brazil to 
>>>> r...@example.br and the real one in Germany to r...@example.de:
>>>> The Point of view of the both involved Postfixes of said transactions are:
>>>> Sender (Brazil):
>>>> postfix/submission/smtpd[29165]: 97006638E8: 
>>>> client=201-68-62-42.dsl.telesp.net.br[201.68.62.42], sasl_method=CRAM-MD5, 
>>>> sasl_username=r...@example.br
>>>> postfix/cleanup[29182]: 97006638E8: 
>>>> message-id=<707a1777-8f09-4335-99ba-70c0367c1...@example.br>
>>>> postfix/qmgr[2058]: 97006638E8: from=<r...@example.br>, size=39626, 
>>>> nrcpt=1 (queue active)
>>>> postfix/smtp[29183]: 97006638E8: to=<r...@example.de>, 
>>>> relay=email-smtp.sa-east-1.amazonaws.com[52.67.192.29]:587, delay=0.37, 
>>>> delays=0.05/0.01/0.13/0.18, dsn=2.0.0, status=sent (250 Ok 
>>>> 010301863b0211fe-9416f5b2-7e18-4c03-a5e5-2204dd7946f8-000000)
>>>> Receiver (Germany):
>>>> postfix/smtpd[86956]: connect from 
>>>> d215-2.smtp-out.sa-east-1.amazonses.com[23.249.215.2]
>>>> postfix/smtpd[86956]: A44AB676E3: 
>>>> client=d215-2.smtp-out.sa-east-1.amazonses.com[23.249.215.2]
>>>> postfix/cleanup[86957]: A44AB676E3: 
>>>> message-id=<010301863b0211fe-9416f5b2-7e18-4c03-a5e5-2204dd7946f8-000...@sa-east-1.amazonses.com>
>>>> postfix/qmgr[915]: A44AB676E3: 
>>>> from=<010301863b0211fe-9416f5b2-7e18-4c03-a5e5-2204dd7946f8-000...@sa-east-1.amazonses.com>,
>>>>  size=40862, nrcpt=1 (queue active)
>>>> postfix/local[86958]: A44AB676E3: passing <r...@example.de> to 
>>>> transport=lmtp
>>>> postfix/lmtp[86959]: A44AB676E3: to=<r...@example.de>, 
>>>> relay=mail.example.de[private/dovecot-lmtp], delay=0.94, 
>>>> delays=0.83/0.01/0.04/0.07, dsn=2.0.0, status=sent (250 2.0.0 
>>>> <r...@example.de> +/goFGgl5mOwUwEAEYr/fg Saved)
>>>> Sender of the OoO (Germany):
>>>> postfix/qmgr[915]: 60242676F0: from=<r...@example.de>, size=1177, nrcpt=1 
>>>> (queue active)
>>>> postfix/cleanup[86957]: 60242676F0: 
>>>> message-id=<dovecot-sieve-1676027240-34335...@example.de>
>>>> postfix/pickup[62932]: 60242676F0: uid=xxxx from=<r...@example.de>
>>>> postfix/smtp[86963]: 60242676F0: 
>>>> to=<010301863b0211fe-9416f5b2-7e18-4c03-a5e5-2204dd7946f8-000...@sa-east-1.amazonses.com>,
>>>>  relay=email-smtp.eu-central-1.amazonaws.com[3.74.180.161]:587, 
>>>> delay=0.31, delays=0.01/0.02/0.13/0.15, dsn=2.0.0, status=sent (250 Ok 
>>>> 010701863b022070-bb3e4541-8306-4438-b649-8879ec8ff666-000000)
>>>> Receiver of the OoO notice (Brazil):
>>>> postfix/smtpd[29184]: connect from 
>>>> d215-244.smtp-out.sa-east-1.amazonses.com[23.249.215.244]
>>>> postfix/smtpd[29184]: 5F1346394E: 
>>>> client=d215-244.smtp-out.sa-east-1.amazonses.com[23.249.215.244]
>>>> postfix/cleanup[29182]: 5F1346394E: 
>>>> message-id=<010301863b022c93-9842f45a-85ec-419f-8199-00e027888394-000...@sa-east-1.amazonses.com>
>>>> postfix/qmgr[2058]: 5F1346394E: from=<>, size=3150, nrcpt=1 (queue active)
>>>> postfix/local[29185]: 5F1346394E: passing <r...@example.br> to 
>>>> transport=lmtp
>>>> postfix/lmtp[29186]: 5F1346394E: to=<r...@example.br>, 
>>>> relay=mail.example.br[private/dovecot-lmtp], delay=0.05, 
>>>> delays=0.01/0.01/0.02/0.01, dsn=2.0.0, status=sent (250 2.0.0 
>>>> <r...@example.br> RRZHGWwl5mMDcgAAjZNhtw Saved)
>>>> The headers of the received OoO message (I removed the DKIM stuff for 
>>>> clarity) are:
>>>> Return-Path: <>
>>>> Delivered-To: r...@example.br
>>>> Received: from mail.example.br
>>>>    by example.br with LMTP
>>>>    id RRZHGWwl5mMDcgAAjZNhtw
>>>>    (envelope-from <>)
>>>>    for <r...@example.br>; Fri, 10 Feb 2023 08:07:24 -0300
>>>> Received: from d215-244.smtp-out.sa-east-1.amazonses.com 
>>>> (d215-244.smtp-out.sa-east-1.amazonses.com [23.249.215.244])
>>>>    (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
>>>>    (No client certificate requested)
>>>>    by mail.example.br (Postfix) with ESMTPS id 5F1346394E
>>>>    for <r...@example.br>; Fri, 10 Feb 2023 08:07:24 -0300 (-03)
>>>> DKIM-Signature: ...
>>>> X-Sieve: Pigeonhole Sieve 0.5.20 (149edcf2)
>>>> Message-ID: 
>>>> <010301863b022c93-9842f45a-85ec-419f-8199-00e027888394-000...@sa-east-1.amazonses.com>
>>>> Date: Fri, 10 Feb 2023 11:07:23 +0000
>>>> From: mailer-dae...@sa-east-1.amazonses.com
>>>> To: r...@example.br
>>>> Subject: Out of Office - automatic notice
>>>> In-Reply-To: 
>>>> <010301863b0211fe-9416f5b2-7e18-4c03-a5e5-2204dd7946f8-000...@sa-east-1.amazonses.com>
>>>> References: 
>>>> <010301863b0211fe-9416f5b2-7e18-4c03-a5e5-2204dd7946f8-000...@sa-east-1.amazonses.com>
>>>> Auto-Submitted: auto-replied (vacation)
>>>> Precedence: bulk
>>>> X-Auto-Response-Suppress: All
>>>> MIME-Version: 1.0
>>>> Content-Type: text/plain; charset=utf-8
>>>> Content-Transfer-Encoding: 8bit
>>>> Feedback-ID: 
>>>> 1.sa-east-1.E7DnIghDRHBvwjrx2QL73gyWAj+NYISxiq7bqOVD27E=:AmazonSES
>>>> X-SES-Outgoing: 2023.02.10-23.249.215.244
>>>> Note how there is not a single reference of the real origin of the OoO 
>>>> message, r...@example.de. Instead we see From: 
>>>> mailer-dae...@sa-east-1.amazonses.com. The receiver of this message need 
>>>> to guess the real address from the outside context.
>>>> The actual problem is that Pigeonhole responds to 
>>>> to=<010301863b0211fe-9416f5b2-7e18-4c03-a5e5-2204dd7946f8-000...@sa-east-1.amazonses.com>
>>>>  instead of to=<r...@example.de>. Amazon SES of the original sender (not 
>>>> our relay) takes this as a bounce and changes the relevant headers. This 
>>>> is not under our control.
>>>> Perhaps this could be mitigated by adding a Reply-To: header which informs 
>>>> the original sender. Then the receiver of the OoO noice would at least 
>>>> have a reference to what and whom this is about.
>>>> Best regards
>>>> Rolf
>>>>> On 2023-02-08 13:21, Dr. Rolf Jansen wrote:
>>>>>> Am 08.02.2023 um 12:57 schrieb Michael Peddemors 
>>>>>> <mich...@linuxmagic.com>:
>>>>>>> On 2023-02-08 07:47, Dr. Rolf Jansen wrote:
>>>>>>>> Am 08.02.2023 um 12:23 schrieb Michael Peddemors 
>>>>>>>> <mich...@linuxmagic.com>:
>>>>>>>>> On 2023-02-07 14:57, Dr. Rolf Jansen wrote:
>>>>>>>>>> Am 07.02.2023 um 19:49 schrieb Michael Peddemors 
>>>>>>>>>> <mich...@linuxmagic.com>:
>>>>>>>>>>> On 2023-02-07 13:33, jeremy ardley wrote:
>>>>>>>>>>>> On 8/2/23 05:08, Dr. Rolf Jansen wrote:
>>>>>>>>>>>>> Am 07.02.2023 um 17:54 schrieb jeremy ardley<jer...@ardley.org>:
>>>>>>>>>>>>>> On 7/2/23 22:01, Dr. Rolf Jansen wrote:
>>>>>>>>>>>>>> To begin with, usage of Amazons Simple Email Service (SES) is 
>>>>>>>>>>>>>> mandatory for outgoing mails from AWS-EC2 instances.
>>>>>>>>>>>>>> I run AWS-EC2 instances using postfix to send a receive mail. 
>>>>>>>>>>>>>> They can send direct assuming I set up suitable SPF, but they 
>>>>>>>>>>>>>> typically forward mail to another host under my  control that is 
>>>>>>>>>>>>>> not on AWS to use as the outgoing server.
>>>>>>>>>>>>> OK, that’s another use case. Many do use a full fledged 
>>>>>>>>>>>>> Postfix/Dovecot installation. However the outgoing port 25 into 
>>>>>>>>>>>>> the internet is blocked by AWS, and therefore we may either use a 
>>>>>>>>>>>>> third party relay for our outgoing emails or may use SES, which 
>>>>>>>>>>>>> is not that bad - except some unusual peculiarities.
>>>>>>>>>>>>> 
>>>>>>>>>>>> This is off topic, but to be precise:
>>>>>>>>>>>> - AWS throttles but does not block traffic to a *destination* port 
>>>>>>>>>>>> 25.
>>>>>>>>>>>> - The *origin* port on the EC2 instance is an unprivilged port, 
>>>>>>>>>>>> not port 25
>>>>>>>>>>>> - If you use a relayhost you typically send from an unprivilged 
>>>>>>>>>>>> EC2 port to port 587 on the relay host
>>>>>>>>>>>> Jeremy
>>>>>>>>>>> 
>>>>>>>>>>> And if you DO intend to send out to port 25, remember to update the 
>>>>>>>>>>> PTR on your EC2 instance.
>>>>>>>>>> I respond off-list. Generally a good hint but it’s like trying to 
>>>>>>>>>> bath salts (https://en.wikipedia.org/wiki/Bath_salts) when you are 
>>>>>>>>>> taking a shower.
>>>>>>>>>> https://aws.amazon.com/premiumsupport/knowledge-center/ec2-port-25-throttle/
>>>>>>>>>> Although the link text (ec2-port-25-throttle) suggests throttling, 
>>>>>>>>>> it is actually blocking - read the text. This cannot be removed from 
>>>>>>>>>> standard EC2 instances.
>>>>>>>>>> This also corresponds to my experience. On the console of an AWS-EC2 
>>>>>>>>>> instance, I entered just now:
>>>>>>>>>>    telnet cyclaero.com 25
>>>>>>>>>> This hangs until timeout. At the same time cyclaero.com received 
>>>>>>>>>> emails from the internet on port 25.
>>>>>>>>>>    Trying 3.126.110.101...
>>>>>>>>>>    telnet: connect to address 3.126.110.101: Operation timed out
>>>>>>>>>>    telnet: Unable to connect to remote host
>>>>>>>>> 
>>>>>>>>> There are a lot of malicous or compromised EC2 instances..It is good 
>>>>>>>>> they block port by default, and the one day delay before unblocking 
>>>>>>>>> (you can request it) helps stop those short term spam instances.
>>>>>>>>> 
>>>>>>>>> Now, wish they blocked port 587 by default ;)
>>>>>>>>> 
>>>>>>>>> Or at least tracked the attacks.
>>>>>>>>> 
>>>>>>>>> Strange though, that people still try to set up email on EC2, doesn't 
>>>>>>>>> make sense, and it isn't the cheapest alternative.

Reply via email to