Re: postfix security configuration

2003-08-14 Thread Marcel Weber
Tarjei Huse wrote:
This might help:

http://jimsun.linxnet.com/misc/postfix-anti-UCE.txt

On Mon, 2003-08-11 at 13:37, Marcel Weber wrote:

Another good thing is the postfix ([EMAIL PROTECTED]) mailing 
list. It is quite a high traffic mailing list, but there are very 
expirienced people reading it... (I mean if Wietse doesn't know how this 
is most nicely done, who else?)

Regards

Marcel








pgp0.pgp
Description: PGP signature


Re: postfix security configuration

2003-08-14 Thread Tarjei Huse
This might help:


http://jimsun.linxnet.com/misc/postfix-anti-UCE.txt

On Mon, 2003-08-11 at 13:37, Marcel Weber wrote:
 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1
 
 
 Am Montag, 11.08.03, um 12:59 Uhr (Europe/Zurich) schrieb Tomasz 
 Papszun:
 
 
  If you want to prevent them from using non existing sender addresses
  from your domain, you can do it by creating a file (lookup table) for
  postmap(1), containing all allowed addresses with OK and another
  table containing your domainname with REJECT.
 
  If you want to prevent them from using sender addresses from other
  domain, it's also possible with properly prepared config.
 
  If you want to prevent them from using other (not their own) sender
  addresses from your domain, you must use SMTP AUTH, I'm afraid.
 
  -- 
   Tomasz Papszun   SysAdm @ TP S.A. Lodz, Poland  | And it's only
   [EMAIL PROTECTED]   http://www.lodz.tpsa.pl/   | ones and zeros.
 
 
  -- 
  To UNSUBSCRIBE, email to [EMAIL PROTECTED]
  with a subject of unsubscribe. Trouble? Contact 
  [EMAIL PROTECTED]
 
 
 Theoretically there is another possibility. Actually pop-before-smtp 
 does nothing than watching the log file, picking the ip address of the 
 pop client and putting this address for a certain time into a postmap 
 for postfix. If you would use the user's email address as his pop3 
 login name (within a sql or ldap db, for example), one could take this 
 information and write it into another postmap file. This would 
 necessite some modification of the pop-before-smtp script, but I think 
 it wouldn't be too hard to implement. It wouldn't be perfect, though: 
 Imagine two users logged in at the same time. Under this situation each 
 user could abuse the other user's email address.
 
 For a really secure system, there is no way around smtp auth. 
 pop-before-smtp relies on ip addresses. But what about NAT? Users 
 coming from a private masqueraded network, could misuse your server at 
 their pleasure, if one user from this network has logged into his pop3 
 account.
 
 Regards
 
 Marcel
 
 
 
 -BEGIN PGP SIGNATURE-
 
 iD8DBQE/N3/y1EXMUTKVE5URAjPsAKD1sVpkeqHSIcYnungYkuF/fNyumgCg7pmF
 o2GTZhfgn7NnZ63P8HLSpEI=
 =B+0b
 -END PGP SIGNATURE-
 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: postfix security configuration

2003-08-14 Thread Tomasz Papszun
On Sun, 10 Aug 2003 at 10:26:16 +, Fallen Angel wrote:
 
 my config:
 debian stable 3.0r1
 postfix
 qpopper 
 
 I have a small problem: 
 
 my smtp after pop3 configuration works fine, no open relay possible, but
 the authentificated users can fake their own e-mail address. 
 
 How can I stop it, so they can only use the adress which were set up for
 them. 
 
 thx for help 
 
 Konstantin 

If you want to prevent them from using non existing sender addresses
from your domain, you can do it by creating a file (lookup table) for
postmap(1), containing all allowed addresses with OK and another
table containing your domainname with REJECT.

If you want to prevent them from using sender addresses from other
domain, it's also possible with properly prepared config.

If you want to prevent them from using other (not their own) sender
addresses from your domain, you must use SMTP AUTH, I'm afraid.

-- 
 Tomasz Papszun   SysAdm @ TP S.A. Lodz, Poland  | And it's only
 [EMAIL PROTECTED]   http://www.lodz.tpsa.pl/   | ones and zeros.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: postfix security configuration

2003-08-14 Thread Wilfried Essig
Am Son, 2003-08-10 um 12.26 schrieb Fallen Angel:
 hi,
 
 my config:
 debian stable 3.0r1
 postfix
 qpopper 
 
 I have a small problem: 
 
 my smtp after pop3 configuration works fine, no open relay possible, but
 the authentificated users can fake their own e-mail address. 
 
 How can I stop it, so they can only use the adress which were set up for
 them. 

As i know, only by adding reject_sender_login_mismatch 
to smtpd_sender_restrictions. Be careful about the order of your
restrictions under  smtpd_sender_restrictions. Look for the exact
syntax in postfix docs on your machine. And : you'll need to smtp-auth
your smtp-clients with sasl for postfix-smtpd. 
This information is from postfix 2.0.3. Im using this with cyrus 2.1 and
sasl 2.2 from http://people.debian.org/~hmh.


-- 
Wilfried Essig



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: postfix security configuration

2003-08-11 Thread Marcel Weber
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Am Montag, 11.08.03, um 12:59 Uhr (Europe/Zurich) schrieb Tomasz 
Papszun:

If you want to prevent them from using non existing sender addresses
from your domain, you can do it by creating a file (lookup table) for
postmap(1), containing all allowed addresses with OK and another
table containing your domainname with REJECT.
If you want to prevent them from using sender addresses from other
domain, it's also possible with properly prepared config.
If you want to prevent them from using other (not their own) sender
addresses from your domain, you must use SMTP AUTH, I'm afraid.
--
 Tomasz Papszun   SysAdm @ TP S.A. Lodz, Poland  | And it's only
 [EMAIL PROTECTED]   http://www.lodz.tpsa.pl/   | ones and zeros.
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact 
[EMAIL PROTECTED]

Theoretically there is another possibility. Actually pop-before-smtp 
does nothing than watching the log file, picking the ip address of the 
pop client and putting this address for a certain time into a postmap 
for postfix. If you would use the user's email address as his pop3 
login name (within a sql or ldap db, for example), one could take this 
information and write it into another postmap file. This would 
necessite some modification of the pop-before-smtp script, but I think 
it wouldn't be too hard to implement. It wouldn't be perfect, though: 
Imagine two users logged in at the same time. Under this situation each 
user could abuse the other user's email address.

For a really secure system, there is no way around smtp auth. 
pop-before-smtp relies on ip addresses. But what about NAT? Users 
coming from a private masqueraded network, could misuse your server at 
their pleasure, if one user from this network has logged into his pop3 
account.

Regards

Marcel



-BEGIN PGP SIGNATURE-

iD8DBQE/N3/y1EXMUTKVE5URAjPsAKD1sVpkeqHSIcYnungYkuF/fNyumgCg7pmF
o2GTZhfgn7NnZ63P8HLSpEI=
=B+0b
-END PGP SIGNATURE-
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]


postfix security configuration

2003-08-11 Thread Fallen Angel
hi,

my config:
debian stable 3.0r1
postfix
qpopper 

I have a small problem: 

my smtp after pop3 configuration works fine, no open relay possible, but
the authentificated users can fake their own e-mail address. 

How can I stop it, so they can only use the adress which were set up for
them. 

thx for help 

Konstantin 

___
auf nummer sicher studieren: mit der semester-police der ace insurance sind
studenten auch bei studienunterbrechungen und -abbruch durch krankheit oder
unfall rundum gut abgesichert: http://www.firstcampus.com/de/semesterpolice
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]


Re: postfix security configuration

2003-08-11 Thread Tomasz Papszun
On Sun, 10 Aug 2003 at 10:26:16 +, Fallen Angel wrote:
 
 my config:
 debian stable 3.0r1
 postfix
 qpopper 
 
 I have a small problem: 
 
 my smtp after pop3 configuration works fine, no open relay possible, but
 the authentificated users can fake their own e-mail address. 
 
 How can I stop it, so they can only use the adress which were set up for
 them. 
 
 thx for help 
 
 Konstantin 

If you want to prevent them from using non existing sender addresses
from your domain, you can do it by creating a file (lookup table) for
postmap(1), containing all allowed addresses with OK and another
table containing your domainname with REJECT.

If you want to prevent them from using sender addresses from other
domain, it's also possible with properly prepared config.

If you want to prevent them from using other (not their own) sender
addresses from your domain, you must use SMTP AUTH, I'm afraid.

-- 
 Tomasz Papszun   SysAdm @ TP S.A. Lodz, Poland  | And it's only
 [EMAIL PROTECTED]   http://www.lodz.tpsa.pl/   | ones and zeros.



Re: postfix security configuration

2003-08-11 Thread Marcel Weber

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


Am Montag, 11.08.03, um 12:59 Uhr (Europe/Zurich) schrieb Tomasz 
Papszun:




If you want to prevent them from using non existing sender addresses
from your domain, you can do it by creating a file (lookup table) for
postmap(1), containing all allowed addresses with OK and another
table containing your domainname with REJECT.

If you want to prevent them from using sender addresses from other
domain, it's also possible with properly prepared config.

If you want to prevent them from using other (not their own) sender
addresses from your domain, you must use SMTP AUTH, I'm afraid.

--
 Tomasz Papszun   SysAdm @ TP S.A. Lodz, Poland  | And it's only
 [EMAIL PROTECTED]   http://www.lodz.tpsa.pl/   | ones and zeros.


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact 
[EMAIL PROTECTED]




Theoretically there is another possibility. Actually pop-before-smtp 
does nothing than watching the log file, picking the ip address of the 
pop client and putting this address for a certain time into a postmap 
for postfix. If you would use the user's email address as his pop3 
login name (within a sql or ldap db, for example), one could take this 
information and write it into another postmap file. This would 
necessite some modification of the pop-before-smtp script, but I think 
it wouldn't be too hard to implement. It wouldn't be perfect, though: 
Imagine two users logged in at the same time. Under this situation each 
user could abuse the other user's email address.


For a really secure system, there is no way around smtp auth. 
pop-before-smtp relies on ip addresses. But what about NAT? Users 
coming from a private masqueraded network, could misuse your server at 
their pleasure, if one user from this network has logged into his pop3 
account.


Regards

Marcel



-BEGIN PGP SIGNATURE-

iD8DBQE/N3/y1EXMUTKVE5URAjPsAKD1sVpkeqHSIcYnungYkuF/fNyumgCg7pmF
o2GTZhfgn7NnZ63P8HLSpEI=
=B+0b
-END PGP SIGNATURE-



Re: postfix security configuration

2003-08-11 Thread Tarjei Huse
This might help:


http://jimsun.linxnet.com/misc/postfix-anti-UCE.txt

On Mon, 2003-08-11 at 13:37, Marcel Weber wrote:
 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1
 
 
 Am Montag, 11.08.03, um 12:59 Uhr (Europe/Zurich) schrieb Tomasz 
 Papszun:
 
 
  If you want to prevent them from using non existing sender addresses
  from your domain, you can do it by creating a file (lookup table) for
  postmap(1), containing all allowed addresses with OK and another
  table containing your domainname with REJECT.
 
  If you want to prevent them from using sender addresses from other
  domain, it's also possible with properly prepared config.
 
  If you want to prevent them from using other (not their own) sender
  addresses from your domain, you must use SMTP AUTH, I'm afraid.
 
  -- 
   Tomasz Papszun   SysAdm @ TP S.A. Lodz, Poland  | And it's only
   [EMAIL PROTECTED]   http://www.lodz.tpsa.pl/   | ones and zeros.
 
 
  -- 
  To UNSUBSCRIBE, email to [EMAIL PROTECTED]
  with a subject of unsubscribe. Trouble? Contact 
  [EMAIL PROTECTED]
 
 
 Theoretically there is another possibility. Actually pop-before-smtp 
 does nothing than watching the log file, picking the ip address of the 
 pop client and putting this address for a certain time into a postmap 
 for postfix. If you would use the user's email address as his pop3 
 login name (within a sql or ldap db, for example), one could take this 
 information and write it into another postmap file. This would 
 necessite some modification of the pop-before-smtp script, but I think 
 it wouldn't be too hard to implement. It wouldn't be perfect, though: 
 Imagine two users logged in at the same time. Under this situation each 
 user could abuse the other user's email address.
 
 For a really secure system, there is no way around smtp auth. 
 pop-before-smtp relies on ip addresses. But what about NAT? Users 
 coming from a private masqueraded network, could misuse your server at 
 their pleasure, if one user from this network has logged into his pop3 
 account.
 
 Regards
 
 Marcel
 
 
 
 -BEGIN PGP SIGNATURE-
 
 iD8DBQE/N3/y1EXMUTKVE5URAjPsAKD1sVpkeqHSIcYnungYkuF/fNyumgCg7pmF
 o2GTZhfgn7NnZ63P8HLSpEI=
 =B+0b
 -END PGP SIGNATURE-
 



postfix security configuration

2003-08-10 Thread Fallen Angel

hi,

my config:
debian stable 3.0r1
postfix
qpopper 

I have a small problem: 


my smtp after pop3 configuration works fine, no open relay possible, but
the authentificated users can fake their own e-mail address. 


How can I stop it, so they can only use the adress which were set up for
them. 

thx for help 

Konstantin 


___
auf nummer sicher studieren: mit der semester-police der ace insurance sind
studenten auch bei studienunterbrechungen und -abbruch durch krankheit oder
unfall rundum gut abgesichert: http://www.firstcampus.com/de/semesterpolice