Re: My OpenBSD 5.0 installation experience (long rant)

2012-03-12 Thread Fredrik Staxeng
Dmitrij D. Czarkoff czark...@gmail.com writes:

So you state that the fact that if one chooses to use the whole disk,
the whole disk is used needs further documentation?

Once upon a time, mkfs used to make a 10-second pause before starting.
That's the way you do it.

-- 
Fredrik Stax\ang | rot13: s...@hcqngr.hh.fr
This is all you need to know about vi: ESC : q ! RET



Re: My OpenBSD 5.0 installation experience (long rant)

2012-03-12 Thread Fredrik Staxeng
Dmitrij D. Czarkoff czark...@gmail.com writes:

On Mon, 2012-03-12 at 08:55 +0100, Fredrik Staxeng wrote:
 Dmitrij D. Czarkoff czark...@gmail.com writes:
 
 So you state that the fact that if one chooses to use the whole disk,
 the whole disk is used needs further documentation?
 
 Once upon a time, mkfs used to make a 10-second pause before starting.
 That's the way you do it.

That is an answer to the question How? (actually a bad one, as if the
user didn't read messages before hitting [Enter], he probably won't do
it after doing so), while my statement implied more of Why? you didn't
address at all.

I jumped into the middle here, I know. I think the 10-second delay is
a brilliant solution. Much better than an are you sure? question. 

I think that there is a large probability that the user will spend that
time  reading the message, and consider whether he really wants to do it. 

-- 
Fredrik Stax\ang | rot13: s...@hcqngr.hh.fr
This is all you need to know about vi: ESC : q ! RET



Snappy Answers to Stupid Questions - WTF?

2012-03-08 Thread Fredrik Staxeng
Do you want users at all? Or was Linus right?
-- 
Fredrik Stax\ang | rot13: s...@hcqngr.hh.fr
This is all you need to know about vi: ESC : q ! RET



Re: Relaying denied. Trying to do TLS+SMTP AUTH. Do I really need SASL?

2007-07-01 Thread Fredrik Staxeng
Lyndon Nerenberg [EMAIL PROTECTED] writes:

 Well, that is exactly what I want to do. I use the system passwords
 for imap anyway, so why not? Of course, the channel must be protected
 by SSL/TLS when you do that.

Because there are a large number of IMAP clients that are not aware of
LOGINDISABLED, and which will blindly attempt LOGIN or AUTH PLAIN in
the absence of TLS (which they are not aware of, either).  Many IMAP
clients predate RFC3501.  So those passwords (with the matching
authentication ids) are going to be flying around the Internet in the
clear no matter what you do.  Using the UNIX account password for IMAP
(or POP) in this manner makes your system effectively password free.

You have a way with words, but I think you are exaggerating slighly. 

I have never allowed plaintext IMAP/POP. Wouldn't dream of it.

The client is Thunderbird. The default IMAP configuration will use
plaintext passwords, but only if it talks to an IMAP server that
does not support TLS, but see above.

Also, I always use imaps/993, and not TLS on 143. I don't fell comfortable
using a password over a connection that is encrypted, if possible.

But I must thank you for reminding me to disable port 143, 



-- 
Fredrik Stax\ang | rot13: [EMAIL PROTECTED]
This is all you need to know about vi: ESC : q ! RET



Relaying denied. Trying to do TLS+SMTP AUTH. Do I really need SASL?

2007-06-30 Thread Fredrik Staxeng
I have a server that runs OpenBSD 4.1, and a laptop running Windows. I want
to use Thunderbird on the laptop to send mail via the server. The laptop
connects from many different networks.

I would like to use port 587, since some isps blocks port 25.
I want to use my username/password to authenticate.
I want to use TLS to protect the password.

I get the dreaded 'Relaying denied. Proper authentication needed.'

The relevant parts of the mc file looks like this

dnl
dnl TLS/SSL support; uncomment and read starttls(8) to use.
dnl
define(`CERT_DIR', `/etc/ssl')dnl
define(`confCACERT_PATH', `CERT_DIR')dnl
define(`confCACERT', `CERT_DIR/CAcert.pem')dnl
define(`confSERVER_CERT', `CERT_DIR/sendmailcert.pem')dnl
define(`confSERVER_KEY', `CERT_DIR/private/sendmail.pem')dnl
define(`confCLIENT_CERT', `CERT_DIR/sendmailcert.pem')dnl
define(`confCLIENT_KEY', `CERT_DIR/private/sendmail.pem')dnl
dnl SMTP AUTH
define(`confAUTH_MECHANISMS', `PLAIN LOGIN')dnl
TRUST_AUTH_MECH(`PLAIN LOGIN')dnl
define(`confAUTH_OPTIONS', `A p')dnl

Googling gives a lot of references to SASL. Do I really have to go
down that road to do something as simple as this?

-- 
Fredrik Stax\ang | rot13: [EMAIL PROTECTED]
This is all you need to know about vi: ESC : q ! RET



Re: Relaying denied. Trying to do TLS+SMTP AUTH. Do I really need SASL?

2007-06-30 Thread Fredrik Staxeng
Stuart Henderson [EMAIL PROTECTED] writes:

On 2007/06/30 12:46, Fredrik Staxeng wrote:
 Googling gives a lot of references to SASL. Do I really have to go
 down that road to do something as simple as this?

for smtp auth, yes. 

OK. 


but for a simple use like this, why not just
ssh-tunnel instead?

Two answers:
a) Thunderbird does not support that natively, so that means more complex 
setup on the client side. (Especially since the client runs Windows).
b) I like using the standard way whenever that is adequate. All of the
mail clients my mother might have heard of supports port 587/tls/auth.   

On 4.0 I used the postfix-sasl package. But you see, I am really 
impessed by OpenBSD's proudest boast Only two remote holes in the default 
install, in more than 10 years!. But that caveat, in the default install,
excludes the packages. And you only need one vulnerability to get exploited.

So get the full benefit of the excellent security work of the OpenBSD
developers, I should not really have any code from packages in the
network services, either directly (postfix) or indirectly (cyrus-sasl).
Unfortunately, the default install does not support imap, so I need at
least one package anyway. I would like to avoid cyrus-sasl if possible
though, since that is way more complexity than I need.
 
I'll look through packages and try to find something that fits.
 

-- 
Fredrik Stax\ang | rot13: [EMAIL PROTECTED]
This is all you need to know about vi: ESC : q ! RET



Re: Relaying denied. Trying to do TLS+SMTP AUTH. Do I really need SASL?

2007-06-30 Thread Fredrik Staxeng
Claus Assmann [EMAIL PROTECTED] writes:

On Sat, Jun 30, 2007, Fredrik Staxeng wrote:

 I get the dreaded 'Relaying denied. Proper authentication needed.'

You don't need AUTH, STARTTLS is sufficient. See cf/README:

Relaying


SMTP STARTTLS can allow relaying for remote SMTP clients which have
successfully authenticated themselves.  If the verification of the cert
failed (${verify} != OK), relaying is subject to the usual rules.
Otherwise the DN of the issuer is looked up in the access map using the
tag CERTISSUER.  If the resulting value is RELAY, relaying is allowed.
If it is SUBJECT, the DN of the cert subject is looked up next in the
access map using the tag CERTSUBJECT.  If the value is RELAY, relaying
is allowed.


Then I would need client certificates, wouldn't I? 

-- 
Fredrik Stax\ang | rot13: [EMAIL PROTECTED]
This is all you need to know about vi: ESC : q ! RET



Re: Relaying denied. Trying to do TLS+SMTP AUTH. Do I really need SASL?

2007-06-30 Thread Fredrik Staxeng
Claus Assmann [EMAIL PROTECTED] writes:

On Sat, Jun 30, 2007, Fredrik Staxeng wrote:
 Claus Assmann [EMAIL PROTECTED] writes:

  I get the dreaded 'Relaying denied. Proper authentication needed.'

 You don't need AUTH, STARTTLS is sufficient. See cf/README:

 Then I would need client certificates, wouldn't I? 

Yes.  As you have a cert for your server, why not create
one for your client? It's barely more complicated than
exchanging the credentials for AUTH, but STARTTLS is
much simpler to set up than AUTH (i.e., Cyrus-SASL).

I have a self-signed server cert that I created using commands that
I barely understand. I have no idea where to start.

I guess I need a CA key, and CA cert. Then I need to make sendmail
trust the new cert? Then I can generate a key, signing request,
and certificate, and make a PKCS12 file, which seems to be what 
Thunderbird wants.

Would it be something like this:

openssl dsaparam 1024 -out dsa1024.pem
openssl gendsa -out client.key dsa1024.pem
openssl req -new -key client.key -out client.csr
openssl x509 -req -days 365 -in client.csr -signkey 
/etc/ssl/private/sendmail.pme -out client.crt
openssl pkcs12 -export -in client.crt -inkey client.key -out client.p12

-- 
Fredrik Stax\ang | rot13: [EMAIL PROTECTED]
This is all you need to know about vi: ESC : q ! RET



Re: Relaying denied. Trying to do TLS+SMTP AUTH. Do I really need SASL?

2007-06-30 Thread Fredrik Staxeng
Claus Assmann [EMAIL PROTECTED] writes:

On Sat, Jun 30, 2007, Fredrik Staxeng wrote:

 I have a self-signed server cert that I created using commands that
 I barely understand. I have no idea where to start.

By reading the fine instructions :-)
man starttls

I have read that, done that. Nothing about client certs there.  

sendmail operations guide: doc/op/op.*

Section 6.6? Nor there.

Earlier you wrote:

Yes.  As you have a cert for your server, why not create
one for your client? It's barely more complicated than
exchanging the credentials for AUTH, but STARTTLS is
much simpler to set up than AUTH (i.e., Cyrus-SASL).

I am not optimistic that it will be as simple as that implies. 
I have tried to understand x509 and openssl before. 

Anyway, you are the maintainer of the free version of sendmail?
Would you consider putting in LOGIN/PLAIN support without SASL?
It would improve the functionality of the OpenBSD default install.


-- 
Fredrik Stax\ang | rot13: [EMAIL PROTECTED]
This is all you need to know about vi: ESC : q ! RET



Re: Relaying denied. Trying to do TLS+SMTP AUTH. Do I really need SASL?

2007-06-30 Thread Fredrik Staxeng
Claus Assmann [EMAIL PROTECTED] writes:

On Sat, Jun 30, 2007, Fredrik Staxeng wrote:

 man starttls
 
 I have read that, done that. Nothing about client certs there.  

sendmail doesn't care as long as it is a cert.

Surely it has to be signed with some key trusted by the particular 
sendmail server? 


 Anyway, you are the maintainer of the free version of sendmail?

Yes.

 Would you consider putting in LOGIN/PLAIN support without SASL?

If someone sends a good patch: yes (see the website for the
correct address where to sent patches). Note that this isn't
as simple as it might seem: the problem is where you store
the passwords for PLAIN. You certainly don't want to reuse
the existing system passwords.

Well, that is exactly what I want to do. I use the system passwords 
for imap anyway, so why not? Of course, the channel must be protected
by SSL/TLS when you do that.  

-- 
Fredrik Stax\ang | rot13: [EMAIL PROTECTED]
This is all you need to know about vi: ESC : q ! RET