Re: Submission service capabilities listing

2020-11-12 Thread Stephan Bosch




On 13/11/2020 00:48, Dan wrote:

Hello all,

I'm attempting to implement a submission server with questions in 
regards to how Dovecot handles the backend hosts capabilities. To my 
understanding, Dovecot will connect to the host specified in either 
submission_host or submission_relay_host, and gather a list of 
capabilities. Once gathered, after the client sends the EHLO greeting 
Dovecot will respond back with capabilities that the backend host is 
capable of.


The submission_host setting is not relevant to this topic. It is only 
used for sending messages produced by Dovecot itself, e.g. from Sieve.



My question is, When does this occur?


The automated part only works after AUTH. The initial EHLO is not 
necessarily accurate.


You can configure |submission_backend_capabilities to set the backend 
(=relay in this case) capabilities directly. In that case the backend 
EHLO reply is not used.|


Running a tcpdump with the filter set to the relay host IP, I don't 
see any traffic until after I send the EHLO command. Dovecot states 
that CHUNKING is available, but the backend host does not have that 
capability.


CHUNKING does not need backend support. The mail can be accepted using 
BDAT command at the frontend and relayed to the backend using classic 
DATA command.



Is there a way to disable CHUNKING explicitly?


You cannot currently disable CHUNKING support at the frontend. Why would 
you want to?


Regards,

Stephan.



Thanks.


submission_relay_host = x.x.x.x
submission_host   = x.x.x.x
submission_relay_ssl  = no
submission_relay_ssl_verify = no

protocol submission {
  passdb {
    driver = static
    args   = host=x.x.x.x proxy=y nopassword=y port=587
  }
}





Submission service capabilities listing

2020-11-12 Thread Dan

Hello all,

I'm attempting to implement a submission server with questions in 
regards to how Dovecot handles the backend hosts capabilities. To my 
understanding, Dovecot will connect to the host specified in either 
submission_host or submission_relay_host, and gather a list of 
capabilities. Once gathered, after the client sends the EHLO greeting 
Dovecot will respond back with capabilities that the backend host is 
capable of.


My question is, When does this occur? Running a tcpdump with the filter 
set to the relay host IP, I don't see any traffic until after I send the 
EHLO command. Dovecot states that CHUNKING is available, but the backend 
host does not have that capability.


Is there a way to disable CHUNKING explicitly?


Thanks.


submission_relay_host = x.x.x.x
submission_host   = x.x.x.x
submission_relay_ssl  = no
submission_relay_ssl_verify = no

protocol submission {
  passdb {
    driver = static
    args   = host=x.x.x.x proxy=y nopassword=y port=587
  }
}



Re: How do Cerbot files map to Dovecot?

2020-11-12 Thread lists
https://github.com/acmesh-official/acme.sh
I used the Neilpang bash script on Centos 7. 

No drama. It just works. The only thing is because it works so well I am pretty 
much useless to provide help with it because it has been so flawless. The only 
way I know it is running is I have to accept new certs on my mail clients. 

There is a mod to the script I added to restart dovecot to enable the new cert 
to be used. It may be stock now. 





  Original Message  


From: m...@tdiehl.org
Sent: November 12, 2020 12:28 PM
To: raym...@forcewise.com
Reply-to: m...@tdiehl.org
Cc: dovecot@dovecot.org
Subject: Re: How do Cerbot files map to Dovecot?


On Thu, 12 Nov 2020, Raymond Herrera wrote:

> I am postponing the Apache plugin issue (CentOS is not Certbot friendly) and

For the record, certbot works just fine on CentOS. It just requires that you
understand how things work. :-)

The plugin which you seek is called python2-certbot-apache.noarch. You can
see all of the available plugins on CentOS 7 by running the following:
yum list \*certbot\*

In addition there are MANY other packages available for generating LE certs.
Most are not included in CentOS or EPEL. Some are easier to configure some not
so much. It really depends on your requirements and skill level.

> requesting a standalone, generic certificate. After the command "1: Spin up a
> temporary webserver" I have the following 2 files in the folder
> /etc/letsencrypt:
>
> -rw-r--r-- 1 root root  924 Nov 12 11:14 csr/_csr-certbot.pem
> -rw--- 1 root root 1708 Nov 12 11:14 keys/_key-certbot.pem
>
> The "key" is probably a direct replacement for the file in the distribution.
> What about the "csr" file? It seems to be a request, not the certificate
> itself.

You have something mis-configured or something is running on port 80 when 
Certbot
is trying to install a tmp web server on port 80. What is mis-configured or what
is running on port 80, I cannot tell with the information you have provided. I
can tell you I have been running Certbot for the last 3 or 4 years without
issue on various CentOS systems I maintain.

In addition, I suspect this whole thread is off topic for the Dovecot list.

If you want further help, I suggest asking on the CentOS list.

Regards,

--
Tom m...@tdiehl.org

Re: How do Cerbot files map to Dovecot?

2020-11-12 Thread me

On Thu, 12 Nov 2020, Raymond Herrera wrote:


I am postponing the Apache plugin issue (CentOS is not Certbot friendly) and


For the record, certbot works just fine on CentOS. It just requires that you
understand how things work. :-)

The plugin which you seek is called python2-certbot-apache.noarch. You can 
see all of the available plugins on CentOS 7 by running the following:

yum list \*certbot\*

In addition there are MANY other packages available for generating LE certs.
Most are not included in CentOS or EPEL. Some are easier to configure some not
so much. It really depends on your requirements and skill level.

requesting a standalone, generic certificate. After the command "1: Spin up a 
temporary webserver" I have the following 2 files in the folder 
/etc/letsencrypt:


-rw-r--r-- 1 root root  924 Nov 12 11:14 csr/_csr-certbot.pem
-rw--- 1 root root 1708 Nov 12 11:14 keys/_key-certbot.pem

The "key" is probably a direct replacement for the file in the distribution. 
What about the "csr" file? It seems to be a request, not the certificate 
itself.


You have something mis-configured or something is running on port 80 when 
Certbot
is trying to install a tmp web server on port 80. What is mis-configured or what
is running on port 80, I cannot tell with the information you have provided. I
can tell you I have been running Certbot for the last 3 or 4 years without
issue on various CentOS systems I maintain.

In addition, I suspect this whole thread is off topic for the Dovecot list.

If you want further help, I suggest asking on the CentOS list.

Regards,

--
Tom m...@tdiehl.org

Re: Fwd: Trying to install certbot on CentOS

2020-11-12 Thread michael Schumacher
Raymond,


> # certbot certonly --apache

> Saving debug log to /var/log/letsencrypt/letsencrypt.log
> Could not choose appropriate plugin: The requested apache plugin does not 
> appear to be installed
> The requested apache plugin does not appear to be installed
> I am trying to find which is the "requested apache plugin". The log mentions 
> "authenticator".

just wondering: Do you have an apache webserver running on this machine?
If not, run

# certbot certonly --standalone

or read https://certbot.eff.org/docs/using.html

and don't forget to open port 80 in your firewall. letsencrypt wants to access 
that port.

> I am hoping that an Apache Certificate will be useful for Dovecot.

you can bet :-)

Michael



How do Cerbot files map to Dovecot?

2020-11-12 Thread Raymond Herrera
I am postponing the Apache plugin issue (CentOS is not Certbot friendly) 
and requesting a standalone, generic certificate. After the command "1: 
Spin up a temporary webserver" I have the following 2 files in the 
folder /etc/letsencrypt:


-rw-r--r-- 1 root root  924 Nov 12 11:14 csr/_csr-certbot.pem
-rw--- 1 root root 1708 Nov 12 11:14 keys/_key-certbot.pem

The "key" is probably a direct replacement for the file in the 
distribution. What about the "csr" file? It seems to be a request, not 
the certificate itself.


TIA




Re: Guide on Renewing SSL Certificate for Apache, Postfix and Dovecot on CentOS 6.8 Linux

2020-11-12 Thread Alexander Dalloz

Am 12.11.2020 um 12:25 schrieb Turritopsis Dohrnii Teo En Ming:

Good day from Singapore,

Please check out the following link for my guide.


Please, not here on this list too!

Setup your own website or blog to spread your doubtful manuals.

Alexander


P.S. CentOS 6.8 is outdated as hell (current would be 6.10) and major 
release 6 will become EOL by end of this month.





Fwd: Trying to install certbot on CentOS

2020-11-12 Thread Raymond Herrera


On 11/12/2020 10:44 AM, Raymond Herrera wrote:

Following the advice obtained here, I am trying to get a LetsEncrypt 
certificate.


These are the instructions:

Step 1:
https://snapcraft.io/docs/installing-snapd

Step 2:
https://certbot.eff.org/lets-encrypt/centosrhel7-apache

My problem is this error message:

# snap install --classic certbot

error: system does not fully support snapd: cannot mount squashfs 
image using "squashfs": mount:
   /tmp/sanity-squashfs-881328484: failed to setup loop device: No 
such file or directory


Apparently, RedHat/CentOS are not supporters of snap.

TIA

OS: CentOS 7



Thanks to Leonardo and Michael,

I have made some progress. The snaps application is not supported by 
RedHat/CentOS. The solution is simple,  just use:


# yum install certbot

The new error message is this:

# certbot certonly --apache

Saving debug log to /var/log/letsencrypt/letsencrypt.log
Could not choose appropriate plugin: The requested apache plugin does 
not appear to be installed

The requested apache plugin does not appear to be installed

I am trying to find which is the "requested apache plugin". The log 
mentions "authenticator".


I am hoping that an Apache Certificate will be useful for Dovecot.




Re: Trying to install certbot on CentOS

2020-11-12 Thread michael Schumacher
Raymond,

> https://snapcraft.io/docs/installing-snapd
> https://certbot.eff.org/lets-encrypt/centosrhel7-apache
> # snap install --classic certbot
> error: system does not fully support snapd: cannot mount squashfs image using 
> "squashfs": mount:
>     /tmp/sanity-squashfs-881328484: failed to setup loop device: No such 
> file or directory
> Apparently, RedHat/CentOS are not supporters of snap.

What's the problem? 


Certbot is in epel.

install the epel-repository and run a simple yum install certbot. :-)

Apparently, the epel-version is 1.9.0, which seems to be the most recent 
version anyway.

Michael




Re: Trying to install certbot on CentOS

2020-11-12 Thread Leonardo Rodrigues

Em 12/11/2020 13:44, Raymond Herrera escreveu:


Apparently, RedHat/CentOS are not supporters of snap.




    You can always install the certbot RPM package for the CentOS 7, 
it's on the epel repository.


[root@firewall ~]# cat /etc/redhat-release
CentOS Linux release 7.8.2003 (Core)

[root@firewall ~]# yum info certbot
[  ]Available Packages
Name    : certbot
Arch    : noarch
Version : 1.9.0
Release : 1.el7
Size    : 46 k
Repo    : epel/x86_64
Summary : A free, automated certificate authority client
URL : https://pypi.python.org/pypi/certbot
License : ASL 2.0
Description : certbot is a free, automated certificate authority that aims
    : to lower the barriers to entry for encrypting all HTTP 
traffic on the internet.



--


Atenciosamente / Sincerily,
Leonardo Rodrigues
Solutti Tecnologia
http://www.solutti.com.br

Minha armadilha de SPAM, NÃO mandem email
gertru...@solutti.com.br
My SPAMTRAP, do not email it




Trying to install certbot on CentOS

2020-11-12 Thread Raymond Herrera
Following the advice obtained here, I am trying to get a LetsEncrypt 
certificate.


These are the instructions:

Step 1:
https://snapcraft.io/docs/installing-snapd

Step 2:
https://certbot.eff.org/lets-encrypt/centosrhel7-apache

My problem is this error message:

# snap install --classic certbot

error: system does not fully support snapd: cannot mount squashfs image 
using "squashfs": mount:
   /tmp/sanity-squashfs-881328484: failed to setup loop device: No 
such file or directory


Apparently, RedHat/CentOS are not supporters of snap.

TIA

OS: CentOS 7





Guide on Renewing SSL Certificate for Apache, Postfix and Dovecot on CentOS 6.8 Linux

2020-11-12 Thread Turritopsis Dohrnii Teo En Ming
Good day from Singapore,

Please check out the following link for my guide.

https://marc.info/?l=postfix-users&m=160517863730596&w=2

Thank you very much.




-BEGIN EMAIL SIGNATURE-

The Gospel for all Targeted Individuals (TIs):

[The New York Times] Microwave Weapons Are Prime Suspect in Ills of
U.S. Embassy Workers

Link: 
https://www.nytimes.com/2018/09/01/science/sonic-attack-cuba-microwave.html



Singaporean Targeted Individual Mr. Turritopsis Dohrnii Teo En Ming's Academic
Qualifications as at 14 Feb 2019 and refugee seeking attempts at the
United Nations Refugee Agency Bangkok (21 Mar 2017), in Taiwan (5 Aug
2019) and Australia (25 Dec 2019 to 9 Jan 2020):

[1] https://tdtemcerts.wordpress.com/

[2] https://tdtemcerts.blogspot.sg/

[3] https://www.scribd.com/user/270125049/Teo-En-Ming

-END EMAIL SIGNATURE-


Testing

2020-11-12 Thread Turritopsis Dohrnii Teo En Ming
Testing

-BEGIN EMAIL SIGNATURE-

The Gospel for all Targeted Individuals (TIs):

[The New York Times] Microwave Weapons Are Prime Suspect in Ills of
U.S. Embassy Workers

Link: 
https://www.nytimes.com/2018/09/01/science/sonic-attack-cuba-microwave.html



Singaporean Targeted Individual Mr. Turritopsis Dohrnii Teo En Ming's Academic
Qualifications as at 14 Feb 2019 and refugee seeking attempts at the
United Nations Refugee Agency Bangkok (21 Mar 2017), in Taiwan (5 Aug
2019) and Australia (25 Dec 2019 to 9 Jan 2020):

[1] https://tdtemcerts.wordpress.com/

[2] https://tdtemcerts.blogspot.sg/

[3] https://www.scribd.com/user/270125049/Teo-En-Ming

-END EMAIL SIGNATURE-