Re: Love the docs

2015-05-06 Thread Wietse Venema
Chris Stankevitz:
> http://www.postfix.org/STANDARD_CONFIGURATION_README.html
> 
> To whoever dreamed up the "configuration commands with line number 
> followed by a translation": thank you

I'm sure I must have gotten the idea from the days that computer
systems filled a room, they were hard to use, and therefore they
came with extensive documentation. Sometimes this was called the
grey wall, or whatever was the color of the manufacturer.

Wietse


Love the docs

2015-05-06 Thread Chris Stankevitz

http://www.postfix.org/STANDARD_CONFIGURATION_README.html

To whoever dreamed up the "configuration commands with line number 
followed by a translation": thank you


Chris


Re: proof-of-work principle applied to mail sending protocol(s) - spams

2015-05-06 Thread Sebastian Nielsen
Hashcash does already work on protocol level, but for a widely deployment to 
happen, senders must start using it "at own initiative", before receivers 
can start enforcing them.
Once senders have adopted the system, receivers can simply start enforcing 
hashcash.


Enforcing hashcash means rejecting all mails that have less than a certain 
bits on the hashcash stamp. (or no hashcash stamp)


So basically, its the chicken-and-egg problem.
Senders wont start using it before receivers do enforce it.
Receivers cant start enforcing it before senders start using it.
(same can be seen with chip'n'pin, you can't simply start enforcing chip 
cards because theres lots of issuers who use magstripe cards, thus all card 
readers today still have magstripe reader - and same with pin, theres lots 
of card readers who dont have a pinpad, thus you cannot enforce pin on the 
"issuer side", you have to accept signature transactions too - and theres 
lots of readers without chip slot, thus issuers have to issue chip+magstripe 
cards, not chip-only cards)


So this is a problem that exist everywhere, once a system is widely adopted, 
its hard to change the system without either adding backwards compatibility 
or breaking the system.


Even if you implement hashcash on the SMTP protocol level, you cannot simply 
"upgrade" your system because then you will start rejecting all mail from 
old systems. This still means that regardless on how you implement it, 
senders must start using the system at own initiative before receivers can 
start requiring it.
Just look at STARTTLS. Even if most mailservers do support it, theres still 
mailservers out there that wont support STARTTLS, thus you cannot require 
encryption.
Another thing to watch out for, is that lists, like this (postfix list) 
would have to generate *LOTS* of proof-of-work to be able to send mail to 
its users.
If lists would get whitelisted in a "hashcash-mandatory" system, and the 
list itself would require "hashcash", then spammers would simply use the 
list as a "spam amplification" system.
Nowadays, lists like "postfix users" are free of spam, just because its 
easier for spammers to send out spam themselves.


But a thing mail server owners with greylist can do, is to express-lane all 
hashcash-stamped mails with a sufficent bit amount through, eg they dont 
have to negotiate greylist and queue mail for the specified waiting period.

Same can be done for spam filters.

The good thing with hashcash is that it does not require any previous 
negotiation. You just generate a hashcash that is "sufficently strong" for 
your taste, and then you see if the receiver likes it or not.
This means you can also configure your greylist system to enforce different 
delay periods for different hashcash bit levels, so even "weak" hashcashes 
are accepted partially.



-Ursprungligt meddelande- 
From: Gergely Debreczeni

Sent: Thursday, May 07, 2015 12:31 AM
To: Sebastian Nielsen ; postfix-users@postfix.org
Subject: RE: proof-of-work principle applied to mail sending protocol(s) - 
spams


Thank you Sebastion ! i'll check on that better !

Though, it does not solve the part of spam generation. Spams are still 
generated but killed on the Receiver side. If all this could be implemented 
on the protocol level and 'on demand' than it would work much better.


Cheers,
Gergely


From: Sebastian Nielsen [sebast...@sebbe.eu]
Sent: 07 May 2015 00:20
To: Gergely Debreczeni; postfix-users@postfix.org
Subject: Re: proof-of-work principle applied to mail sending protocol(s) - 
spams


IT do already exist:
http://www.hashcash.org/

Im already using it.
See this mail, you find this header:
X-Hashcash:
1:26:150428:nielsen.sebast...@gmail.com::8G9E5dBe8isoyoyL:07iLtb

Thats a proof-of-work system with hashcash. Im currently have a module in my
outgoing mail server that generates such "hashcash" stamps with the help of
a milter.
Spamassassin in default config should reward such headers with a negative
spam score.

-Ursprungligt meddelande-
From: Gergely Debreczeni
Sent: Thursday, May 07, 2015 12:11 AM
To: postfix-users@postfix.org
Subject: proof-of-work principle applied to mail sending protocol(s) - spams

Dear List,

I was advised to come to this list with the idea below. I apologize if this
is not the right forum, in that case please point be to more appropriate
list. In any case i would appreciate any feedback on the thoughts below,
which I try to explain very densly and can of course eloborate in detail
later in case of interest.

A one liner:
An idea based on the proof-of-work principle to tremendously decrease mail
spam traffic.

A short extract:
The problem:
The problem of spam mails is still existing and current solutions are trying
to cure the issue on the wrong side of the problem. Despite the fact, that
due to state-of-art spam filters spams are not really problems for the end
user, spam mails are stil

RE: proof-of-work principle applied to mail sending protocol(s) - spams

2015-05-06 Thread Gergely Debreczeni
Thank you Sebastion ! i'll check on that better !

Though, it does not solve the part of spam generation. Spams are still 
generated but killed on the Receiver side. If all this could be implemented on 
the protocol level and 'on demand' than it would work much better.

Cheers,
Gergely


From: Sebastian Nielsen [sebast...@sebbe.eu]
Sent: 07 May 2015 00:20
To: Gergely Debreczeni; postfix-users@postfix.org
Subject: Re: proof-of-work principle applied to mail sending protocol(s) - spams

IT do already exist:
http://www.hashcash.org/

Im already using it.
See this mail, you find this header:
X-Hashcash:
1:26:150428:nielsen.sebast...@gmail.com::8G9E5dBe8isoyoyL:07iLtb

Thats a proof-of-work system with hashcash. Im currently have a module in my
outgoing mail server that generates such "hashcash" stamps with the help of
a milter.
Spamassassin in default config should reward such headers with a negative
spam score.

-Ursprungligt meddelande-
From: Gergely Debreczeni
Sent: Thursday, May 07, 2015 12:11 AM
To: postfix-users@postfix.org
Subject: proof-of-work principle applied to mail sending protocol(s) - spams

Dear List,

I was advised to come to this list with the idea below. I apologize if this
is not the right forum, in that case please point be to more appropriate
list. In any case i would appreciate any feedback on the thoughts below,
which I try to explain very densly and can of course eloborate in detail
later in case of interest.

A one liner:
An idea based on the proof-of-work principle to tremendously decrease mail
spam traffic.

A short extract:
The problem:
The problem of spam mails is still existing and current solutions are trying
to cure the issue on the wrong side of the problem. Despite the fact, that
due to state-of-art spam filters spams are not really problems for the end
user, spam mails are still generated, sent and generating malicious internet
traffic. This is because a.) it is virtually free for spammers to send the
mails and b.) spams are treated only after they arrived into their
destination.

The solution:
While keeping all the good properties of open message/mail sending
protocols, we need to change a.) and b.) and there is a way to do this in
one step, which is the following:

Let's imagine the following imaginary mail sending protocol.
1.) Sender contacts the Receiver
2.) Receiver verifies Sender's identity
3a.) If Sender identity is known to Receiver, then Receiver accepts Sender's
message.
3b.) If Sender's identity not know for the Receiver then Receiver says to
Sender: "I do not know You, but you can still send me a message if you solve
this problem!"
4.) The Receiver gives a computational problem to the Sender which
 a.) can be infinitely, trivially (or parallely) generated
 b.) can easily be verified
 c.) and can be solved only serially, i.e. unparalellizable (so
as to ensure that it takes more-or less the same time for everybody)
 d.) has a well estimable and tunable computational complexity
 e.) generated on the spot, has limited lifetime and used only
once so as to exclude any second or aftermarket of problem solvers and mail
senders
5.) If the Sender is really serious about to send the message it solves the
problem, i.e. it dedicates N seconds/minutes of computational time to solve
the problem and connects back the Receiver with the solution
6.) Having the solution presented to the Receiver the Receiver accepts the
message, since a proof-of-work was presented.
7.) The user who reads the mail can mark Sender as 'known' so next time
Sender does not have to perform calculation


What follows:
a.) This way anybody can contact anybody (no whitelist/blacklist) and it it
only the first contact which is "painful".
b.) No human labor intensive captcha solving is involved
c.) No money, 3rd party, administration or any legal regularisation involved
still working.
d.) Since this way it becomes several order of magnitudes more expensive to
spammers to contact unknown email adresses for the first time, it becomes
economically unfeasible to operate and manage spamming botnets or other
spamming machinery.
e.) Problem requiring can be optional and problem complexity can vary from
address to address.
f.) Problem can be sent as a 1 liner error message inside SMTP communication
g.) The idea can be implemented organically inside the SMPT protocol.
h.) In this way spams are not even generated and does not generate internet
traffic so spam issue is treated at the right side of the problem.

There is of course many more little but important details to discuss about,
this is just the brief overview of the idea.

Would appreciate any feedback and/or volunteer prototype implementation in
case of interest

Sincerely,
Gergely Debreczeni






Re: proof-of-work principle applied to mail sending protocol(s) - spams

2015-05-06 Thread Sebastian Nielsen

IT do already exist:
http://www.hashcash.org/

Im already using it.
See this mail, you find this header:
X-Hashcash: 
1:26:150428:nielsen.sebast...@gmail.com::8G9E5dBe8isoyoyL:07iLtb


Thats a proof-of-work system with hashcash. Im currently have a module in my 
outgoing mail server that generates such "hashcash" stamps with the help of 
a milter.
Spamassassin in default config should reward such headers with a negative 
spam score.


-Ursprungligt meddelande- 
From: Gergely Debreczeni

Sent: Thursday, May 07, 2015 12:11 AM
To: postfix-users@postfix.org
Subject: proof-of-work principle applied to mail sending protocol(s) - spams

Dear List,

I was advised to come to this list with the idea below. I apologize if this 
is not the right forum, in that case please point be to more appropriate 
list. In any case i would appreciate any feedback on the thoughts below, 
which I try to explain very densly and can of course eloborate in detail 
later in case of interest.


A one liner:
An idea based on the proof-of-work principle to tremendously decrease mail 
spam traffic.


A short extract:
The problem:
The problem of spam mails is still existing and current solutions are trying 
to cure the issue on the wrong side of the problem. Despite the fact, that 
due to state-of-art spam filters spams are not really problems for the end 
user, spam mails are still generated, sent and generating malicious internet 
traffic. This is because a.) it is virtually free for spammers to send the 
mails and b.) spams are treated only after they arrived into their 
destination.


The solution:
While keeping all the good properties of open message/mail sending 
protocols, we need to change a.) and b.) and there is a way to do this in 
one step, which is the following:


Let's imagine the following imaginary mail sending protocol.
1.) Sender contacts the Receiver
2.) Receiver verifies Sender's identity
3a.) If Sender identity is known to Receiver, then Receiver accepts Sender's 
message.
3b.) If Sender's identity not know for the Receiver then Receiver says to 
Sender: "I do not know You, but you can still send me a message if you solve 
this problem!"

4.) The Receiver gives a computational problem to the Sender which
a.) can be infinitely, trivially (or parallely) generated
b.) can easily be verified
c.) and can be solved only serially, i.e. unparalellizable (so 
as to ensure that it takes more-or less the same time for everybody)

d.) has a well estimable and tunable computational complexity
e.) generated on the spot, has limited lifetime and used only 
once so as to exclude any second or aftermarket of problem solvers and mail 
senders
5.) If the Sender is really serious about to send the message it solves the 
problem, i.e. it dedicates N seconds/minutes of computational time to solve 
the problem and connects back the Receiver with the solution
6.) Having the solution presented to the Receiver the Receiver accepts the 
message, since a proof-of-work was presented.
7.) The user who reads the mail can mark Sender as 'known' so next time 
Sender does not have to perform calculation



What follows:
a.) This way anybody can contact anybody (no whitelist/blacklist) and it it 
only the first contact which is "painful".

b.) No human labor intensive captcha solving is involved
c.) No money, 3rd party, administration or any legal regularisation involved 
still working.
d.) Since this way it becomes several order of magnitudes more expensive to 
spammers to contact unknown email adresses for the first time, it becomes 
economically unfeasible to operate and manage spamming botnets or other 
spamming machinery.
e.) Problem requiring can be optional and problem complexity can vary from 
address to address.

f.) Problem can be sent as a 1 liner error message inside SMTP communication
g.) The idea can be implemented organically inside the SMPT protocol.
h.) In this way spams are not even generated and does not generate internet 
traffic so spam issue is treated at the right side of the problem.


There is of course many more little but important details to discuss about, 
this is just the brief overview of the idea.


Would appreciate any feedback and/or volunteer prototype implementation in 
case of interest


Sincerely,
Gergely Debreczeni






smime.p7s
Description: S/MIME Cryptographic Signature


proof-of-work principle applied to mail sending protocol(s) - spams

2015-05-06 Thread Gergely Debreczeni
Dear List,
 
I was advised to come to this list with the idea below. I apologize if this is 
not the right forum, in that case please point be to more appropriate list. In 
any case i would appreciate any feedback on the thoughts below, which I try to 
explain very densly and can of course eloborate in detail later in case of 
interest.

A one liner:
An idea based on the proof-of-work principle to tremendously decrease mail spam 
traffic.

A short extract:
The problem:
The problem of spam mails is still existing and current solutions are trying to 
cure the issue on the wrong side of the problem. Despite the fact, that due to 
state-of-art spam filters spams are not really problems for the end user, spam 
mails are still generated, sent and generating malicious internet traffic. This 
is because a.) it is virtually free for spammers to send the mails and b.) 
spams are treated only after they arrived into their destination.

The solution:
While keeping all the good properties of open message/mail sending protocols, 
we need to change a.) and b.) and there is a way to do this in one step, which 
is the following:

Let's imagine the following imaginary mail sending protocol.
 1.) Sender contacts the Receiver
 2.) Receiver verifies Sender's identity
 3a.) If Sender identity is known to Receiver, then Receiver accepts Sender's 
message.
 3b.) If Sender's identity not know for the Receiver then Receiver says to 
Sender: "I do not know You, but you can still send me a message if you solve 
this problem!"
 4.) The Receiver gives a computational problem to the Sender which
 a.) can be infinitely, trivially (or parallely) generated
 b.) can easily be verified
 c.) and can be solved only serially, i.e. unparalellizable (so as 
to ensure that it takes more-or less the same time for everybody)
 d.) has a well estimable and tunable computational complexity
 e.) generated on the spot, has limited lifetime and used only once 
so as to exclude any second or aftermarket of problem solvers and mail senders
 5.) If the Sender is really serious about to send the message it solves the 
problem, i.e. it dedicates N seconds/minutes of computational time to solve the 
problem and connects back the Receiver with the solution
 6.) Having the solution presented to the Receiver the Receiver accepts the 
message, since a proof-of-work was presented.
 7.) The user who reads the mail can mark Sender as 'known' so next time Sender 
does not have to perform calculation


What follows:
 a.) This way anybody can contact anybody (no whitelist/blacklist) and it it 
only the first contact which is "painful".
 b.) No human labor intensive captcha solving is involved
 c.) No money, 3rd party, administration or any legal regularisation involved 
still working. 
 d.) Since this way it becomes several order of magnitudes more expensive to 
spammers to contact unknown email adresses for the first time, it becomes 
economically unfeasible to operate and manage spamming botnets or other 
spamming machinery.
 e.) Problem requiring can be optional and problem complexity can vary from  
address to address.
 f.) Problem can be sent as a 1 liner error message inside SMTP communication
 g.) The idea can be implemented organically inside the SMPT protocol.
 h.) In this way spams are not even generated and does not generate internet 
traffic so spam issue is treated at the right side of the problem.

There is of course many more little but important details to discuss about, 
this is just the brief overview of the idea.

Would appreciate any feedback and/or volunteer prototype implementation in case 
of interest

Sincerely,
Gergely Debreczeni



 


Re: postfix-policyd-spf-perl and troubles with Amazon? [SOLVED]

2015-05-06 Thread Scott Kitterman
On Wednesday, May 06, 2015 02:12:04 PM Chris Adams wrote:
> Once upon a time, Scott Kitterman  said:
> > Great.  Feel free to throw RFC 7208 Section 3.4 (Record Size) at them. 
> > The
> > SHOULD fit in a UDP packet is there for a reason.
> 
> I see your RFC and raise you RFC 6891.  "[f]it in a UDP packet" does not
> mean 512 bytes.

RFC 7208 is more precise in it's language them my mail here.  Bottom line is 
if your reply goes over 512 and it breaks, you get to keep both halves.

Scott K


Re: postfix-policyd-spf-perl and troubles with Amazon? [SOLVED]

2015-05-06 Thread Chris Adams
Once upon a time, Scott Kitterman  said:
> Great.  Feel free to throw RFC 7208 Section 3.4 (Record Size) at them.  The 
> SHOULD fit in a UDP packet is there for a reason.

I see your RFC and raise you RFC 6891.  "[f]it in a UDP packet" does not
mean 512 bytes.
-- 
Chris Adams 


Re: postfix-policyd-spf-perl and troubles with Amazon? [SOLVED]

2015-05-06 Thread Postfix User
On Wed, 06 May 2015 13:59:44 -0400, Scott Kitterman stated:

> Great.  Feel free to throw RFC 7208 Section 3.4 (Record Size) at them.  The 
> SHOULD fit in a UDP packet is there for a reason.

SHOULD ≠ MUST

-- 
Jerry


Re: postfix-policyd-spf-perl and troubles with Amazon? [SOLVED]

2015-05-06 Thread Scott Kitterman
On Wednesday, May 06, 2015 05:17:12 PM Tobi wrote:
> @Scott
> 
> thanks for putting me into the right direction :-)
> The answer for spf1.amazon.com TXT is indeed too big for UDP. So the
> query was retried in TCP mode.
> But the stupid admin (aka myself) forgot that he disabled tcp on the
> mailservers local resolvers (unbound). After enabling tcp mode for
> unbound the queries for spf1.amazon.com TXT were properly answered properly.
> Amazon did not retry yet, but I'm sure that this solved the problem.
> 
Great.  Feel free to throw RFC 7208 Section 3.4 (Record Size) at them.  The 
SHOULD fit in a UDP packet is there for a reason.

Scott K


Re: Stan Hoeppner's fqrdns.pcre file?

2015-05-06 Thread Steve Jenkins
On Wed, May 6, 2015 at 8:21 AM, Bill Cole <
postfixlists-070...@billmail.scconsult.com> wrote:

> On 6 May 2015, at 10:20, Steve Jenkins wrote:
>
>  On Tue, May 5, 2015 at 11:38 AM, Vijay Rajah  wrote:
>>
>>  There was a missing persons report on a Stanley D Hoeppner. This name no
>>> longer appears on the active missing persons list. Hope he is ok.  FYI:
>>> http://i.imgur.com/3oiR3ID.png
>>>
>>
>>
>> That's VERY concerning. He is from Missouri, so I think that is indeed
>> him.
>> I hope the fact that he's no longer on there doesn't mean the worst...
>>
>
> It would seem that it does not, and that in fact his location is under the
> capable control of the penal authorities of Los Angeles County California.
> I found the matching name last week but was dubious that it was him.
> Feeding suitable search terms to http://app4.lasd.org/iic/ajis_search.cfm
> (a site that seems to put a captcha on every link) and
> http://www.lacourt.org reveal that he has a 2nd pretrial hearing about 10
> minutes from now.
>
> And that's the last I'll post on Stan Hoeppner. I don't expect we'll be
> seeing him back here soon.
>

Thanks, Bill. Now I feel REALLY bad for even bringing it up, but will admit
that I'm glad the mystery is solved. I'm even more glad that Stan is not
missing... or worse.

Beyond that, whatever other issues may be facing him are his personal
business, and I hope nothing but the best for him.

SteveJ


Re: Stan Hoeppner's fqrdns.pcre file?

2015-05-06 Thread steffan
I have it on good authority that he is still in Missouri but is absent due to a 
personal nature.

I will share more if allowed in time. 

In the interim, I've been checking to see if I can get his domain back up for 
everyone again. 

Thanks,
Steffan

> On May 6, 2015, at 8:21 AM, Bill Cole 
>  wrote:
> 
>> On 6 May 2015, at 10:20, Steve Jenkins wrote:
>> 
>>> On Tue, May 5, 2015 at 11:38 AM, Vijay Rajah  wrote:
>>> 
>>> There was a missing persons report on a Stanley D Hoeppner. This name no
>>> longer appears on the active missing persons list. Hope he is ok.  FYI:
>>> http://i.imgur.com/3oiR3ID.png
>> 
>> 
>> That's VERY concerning. He is from Missouri, so I think that is indeed him.
>> I hope the fact that he's no longer on there doesn't mean the worst...
> 
> It would seem that it does not, and that in fact his location is under the 
> capable control of the penal authorities of Los Angeles County California. I 
> found the matching name last week but was dubious that it was him. Feeding 
> suitable search terms to http://app4.lasd.org/iic/ajis_search.cfm (a site 
> that seems to put a captcha on every link) and http://www.lacourt.org reveal 
> that he has a 2nd pretrial hearing about 10 minutes from now.
> 
> And that's the last I'll post on Stan Hoeppner. I don't expect we'll be 
> seeing him back here soon.
> 
On 6 May 2015, at 10:20, Steve Jenkins wrote:

> On Tue, May 5, 2015 at 11:38 AM, Vijay Rajah  wrote:
>
>> There was a missing persons report on a Stanley D Hoeppner. This name 
>> no
>> longer appears on the active missing persons list. Hope he is ok.  
>> FYI:
>> http://i.imgur.com/3oiR3ID.png
>
>
> That's VERY concerning. He is from Missouri, so I think that is indeed 
> him.
> I hope the fact that he's no longer on there doesn't mean the worst...

It would seem that it does not, and that in fact his location is under 
the capable control of the penal authorities of Los Angeles County 
California. I found the matching name last week but was dubious that it 
was him. Feeding suitable search terms to 
http://app4.lasd.org/iic/ajis_search.cfm (a site that seems to put a 
captcha on every link) and http://www.lacourt.org reveal that he has a 
2nd pretrial hearing about 10 minutes from now.

And that's the last I'll post on Stan Hoeppner. I don't expect we'll be 
seeing him back here soon.




Re: postfix-policyd-spf-perl and troubles with Amazon? [SOLVED]

2015-05-06 Thread Tobi

@Scott

thanks for putting me into the right direction :-)
The answer for spf1.amazon.com TXT is indeed too big for UDP. So the 
query was retried in TCP mode.
But the stupid admin (aka myself) forgot that he disabled tcp on the 
mailservers local resolvers (unbound). After enabling tcp mode for 
unbound the queries for spf1.amazon.com TXT were properly answered properly.

Amazon did not retry yet, but I'm sure that this solved the problem.

Thanks a iot

tobi

Am 06.05.2015 um 16:11 schrieb Scott Kitterman:

On Wednesday, May 06, 2015 09:58:57 AM James B. Byrne wrote:

On Wed, May 6, 2015 09:45, Tobi wrote:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Hi list

I know it's technically not a postfix issue :-) But maybe someone else
here on this list has the same problem.
I'm using Postfix with postfix-policyd-spf-perl About 4 or 5 days ago
I started to get error messages from postfix for mails from Amazon.
The log shows

<<
May  6 15:33:12 mail1 postfix/policy-spf[10692]: Policy
action=DEFER_IF_PERMIT SPF-Result=marketplace.amazon.de ...
spf1.amazon.com: Unknown error on DNS 'TXT' lookup of
'spf1.amazon.com'
May  6 15:33:12 mail1 postfix/smtpd[10069]: NOQUEUE: reject: RCPT from
a0-3.smtp-out.eu-west-1.amazonses.com[54.240.0.3]: 450 4.7.1
: Recipient address rejected:
SPF-Result=marketplace.amazon.de ... spf1.amazon.com: Unknown error on
DNS 'TXT' lookup of 'spf1.amazon.com';
from=
to= proto=ESMTP
helo=
May  6 15:33:37 mail1 postfix/smtpd[10069]: disconnect from
a0-3.smtp-out.eu-west-1.amazonses.com[54.240.0.3]


I did not change anything on the server side. I tried to verify the
SPF records from Amazon with
http://www.kitterman.com/spf/validate.html but the tests were always
successfull.
Does anyone have this problem too with Amazon? Or does anyone have an
idea how to solve it?

Thanks

dig spf1.amazon.com TXT

;; ANSWER SECTION:
spf1.amazon.com.900 IN  TXT "spf2.0/pra ip4:207.171.160.0/19
ip4:87.238.80.0/21 ip4:72.21.192.0/19 ip4:194.154.193.192/27
ip4:194.7.41.152/28 ip4:212.123.28.40/32 ip4:203.81.17.0/24
ip4:72.21.212.0/25 ip4:178.236.10.128/26 -all"
spf1.amazon.com.900 IN  TXT "v=spf1 ip4:207.171.160.0/19
ip4:87.238.80.0/21 ip4:72.21.192.0/19 ip4:194.154.193.192/27
ip4:194.7.41.152/28 ip4:212.123.28.40/32 ip4:203.81.17.0/24
ip4:72.21.212.0/25 ip4:178.236.10.128/26 -all"

Amazon has screwed up their spf records.  A DNS host can have only ONE
spf TXT RR and that must not contain or recursively resolve to more
than TEN tags.

You will have to contact the DNS maintainer for the amazon.com zone

;; AUTHORITY SECTION:
amazon.com. 60  IN  SOA dns-external-master.amazon.com.
root.amazon.com. 2010112764 180 60 3024000 60

Who evidently is reached via r...@amazon.com.  Good luck with that.

No.  That's not it.  One of those is a v=spf1 SPF record and the other is a
spf2.0 Sender ID record.

Much more likely the issue is the use of EDNS0.  In the part of the dig output
you didn't include, you probably got:

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096

and

;; MSG SIZE  rcvd: 611

I would guess that they published a new record that pushed them outside the
size of a UDP packet, so it used EDNS0, and there's some incompatible box in
the middle (and there wasn't such a box similarly in between amazon and my SPF
validator).

Followups should probably go to:

https://answers.launchpad.net/postfix-policyd-spf-perl

Scott K




Re: Stan Hoeppner's fqrdns.pcre file?

2015-05-06 Thread Bill Cole

On 6 May 2015, at 10:20, Steve Jenkins wrote:


On Tue, May 5, 2015 at 11:38 AM, Vijay Rajah  wrote:

There was a missing persons report on a Stanley D Hoeppner. This name 
no
longer appears on the active missing persons list. Hope he is ok.  
FYI:

http://i.imgur.com/3oiR3ID.png



That's VERY concerning. He is from Missouri, so I think that is indeed 
him.

I hope the fact that he's no longer on there doesn't mean the worst...


It would seem that it does not, and that in fact his location is under 
the capable control of the penal authorities of Los Angeles County 
California. I found the matching name last week but was dubious that it 
was him. Feeding suitable search terms to 
http://app4.lasd.org/iic/ajis_search.cfm (a site that seems to put a 
captcha on every link) and http://www.lacourt.org reveal that he has a 
2nd pretrial hearing about 10 minutes from now.


And that's the last I'll post on Stan Hoeppner. I don't expect we'll be 
seeing him back here soon.


Re: postfix-policyd-spf-perl and troubles with Amazon?

2015-05-06 Thread James B. Byrne

On Wed, May 6, 2015 10:11, Scott Kitterman wrote:
> On Wednesday, May 06, 2015 09:58:57 AM James B. Byrne wrote:
>>
>> Amazon has screwed up their spf records.  A DNS host can have only
>> ONE spf TXT RR and that must not contain or recursively resolve to
>> more than TEN tags.
>
> No.  That's not it.  One of those is a v=spf1 SPF record and the other
> is a spf2.0 Sender ID record.
>
> Much more likely the issue is the use of EDNS0.  In the part of the
> dig output you didn't include, you probably got:
>
> ;; OPT PSEUDOSECTION:
> ; EDNS: version: 0, flags:; udp: 4096
>
> and
>
> ;; MSG SIZE  rcvd: 611


Actually, no. I got this:

;; ANSWER SECTION:
spf1.amazon.com.900 IN  TXT "spf2.0/pra ip4:207.171.160.0/19
ip4:87.238.80.0/21 ip4:72.21.192.0/19 ip4:194.154.193.192/27
ip4:194.7.41.152/28 ip4:212.123.28.40/32 ip4:203.81.17.0/24
ip4:72.21.212.0/25 ip4:178.236.10.128/26 -all"
spf1.amazon.com.900 IN  TXT "v=spf1 ip4:207.171.160.0/19
ip4:87.238.80.0/21 ip4:72.21.192.0/19 ip4:194.154.193.192/27
ip4:194.7.41.152/28 ip4:212.123.28.40/32 ip4:203.81.17.0/24
ip4:72.21.212.0/25 ip4:178.236.10.128/26 -all"

;; AUTHORITY SECTION:
amazon.com. 2751IN  NS  ns3.p31.dynect.net.
amazon.com. 2751IN  NS  ns1.p31.dynect.net.
amazon.com. 2751IN  NS  ns4.p31.dynect.net.
amazon.com. 2751IN  NS  ns2.p31.dynect.net.
amazon.com. 2751IN  NS  pdns6.ultradns.co.uk.
amazon.com. 2751IN  NS  pdns1.ultradns.net.

;; Query time: 1 msec
;; SERVER: 216.185.71.33#53(216.185.71.33)
;; WHEN: Wed May  6 09:54:00 2015
;; MSG SIZE  rcvd: 600

And thanks for the correction.  I had never run into MS's Sender ID in
the wild before and had no recollection of its existence until you
reminded me.  One more thing to look for.




-- 
***  e-Mail is NOT a SECURE channel  ***
Do NOT transmit sensitive data via e-Mail
James B. Byrnemailto:byrn...@harte-lyne.ca
Harte & Lyne Limited  http://www.harte-lyne.ca
9 Brockley Drive  vox: +1 905 561 1241
Hamilton, Ontario fax: +1 905 561 0757
Canada  L8E 3C3



Re: Stan Hoeppner's fqrdns.pcre file?

2015-05-06 Thread Steve Jenkins
On Tue, May 5, 2015 at 11:38 AM, Vijay Rajah  wrote:

> There was a missing persons report on a Stanley D Hoeppner. This name no
> longer appears on the active missing persons list. Hope he is ok.  FYI:
> http://i.imgur.com/3oiR3ID.png


That's VERY concerning. He is from Missouri, so I think that is indeed him.
I hope the fact that he's no longer on there doesn't mean the worst...


> Also, It seems that his server is up and running. there is a single jpg
> file with you point the browser to his server IP.


> The fqrdns.pcre file is at http://65.41.216.221/fqrdns.pcre


Thanks, Vijay. I've confirmed that the 10/2/2014 version there is the same
as the one I stored on GitHub. His domain must have expired and got snapped
up, but his server is still active.

Steve J


Re: postfix-policyd-spf-perl and troubles with Amazon?

2015-05-06 Thread Scott Kitterman
On Wednesday, May 06, 2015 09:58:57 AM James B. Byrne wrote:
> On Wed, May 6, 2015 09:45, Tobi wrote:
> > -BEGIN PGP SIGNED MESSAGE-
> > Hash: SHA256
> > 
> > Hi list
> > 
> > I know it's technically not a postfix issue :-) But maybe someone else
> > here on this list has the same problem.
> > I'm using Postfix with postfix-policyd-spf-perl About 4 or 5 days ago
> > I started to get error messages from postfix for mails from Amazon.
> > The log shows
> > 
> > <<
> > May  6 15:33:12 mail1 postfix/policy-spf[10692]: Policy
> > action=DEFER_IF_PERMIT SPF-Result=marketplace.amazon.de ...
> > spf1.amazon.com: Unknown error on DNS 'TXT' lookup of
> > 'spf1.amazon.com'
> > May  6 15:33:12 mail1 postfix/smtpd[10069]: NOQUEUE: reject: RCPT from
> > a0-3.smtp-out.eu-west-1.amazonses.com[54.240.0.3]: 450 4.7.1
> > : Recipient address rejected:
> > SPF-Result=marketplace.amazon.de ... spf1.amazon.com: Unknown error on
> > DNS 'TXT' lookup of 'spf1.amazon.com';
> > from=
> > to= proto=ESMTP
> > helo=
> > May  6 15:33:37 mail1 postfix/smtpd[10069]: disconnect from
> > a0-3.smtp-out.eu-west-1.amazonses.com[54.240.0.3]
> > 
> > 
> > I did not change anything on the server side. I tried to verify the
> > SPF records from Amazon with
> > http://www.kitterman.com/spf/validate.html but the tests were always
> > successfull.
> > Does anyone have this problem too with Amazon? Or does anyone have an
> > idea how to solve it?
> > 
> > Thanks
> 
> dig spf1.amazon.com TXT
> 
> ;; ANSWER SECTION:
> spf1.amazon.com.  900 IN  TXT "spf2.0/pra ip4:207.171.160.0/19
> ip4:87.238.80.0/21 ip4:72.21.192.0/19 ip4:194.154.193.192/27
> ip4:194.7.41.152/28 ip4:212.123.28.40/32 ip4:203.81.17.0/24
> ip4:72.21.212.0/25 ip4:178.236.10.128/26 -all"
> spf1.amazon.com.  900 IN  TXT "v=spf1 ip4:207.171.160.0/19
> ip4:87.238.80.0/21 ip4:72.21.192.0/19 ip4:194.154.193.192/27
> ip4:194.7.41.152/28 ip4:212.123.28.40/32 ip4:203.81.17.0/24
> ip4:72.21.212.0/25 ip4:178.236.10.128/26 -all"
> 
> Amazon has screwed up their spf records.  A DNS host can have only ONE
> spf TXT RR and that must not contain or recursively resolve to more
> than TEN tags.
> 
> You will have to contact the DNS maintainer for the amazon.com zone
> 
> ;; AUTHORITY SECTION:
> amazon.com.   60  IN  SOA dns-external-master.amazon.com.
> root.amazon.com. 2010112764 180 60 3024000 60
> 
> Who evidently is reached via r...@amazon.com.  Good luck with that.

No.  That's not it.  One of those is a v=spf1 SPF record and the other is a 
spf2.0 Sender ID record.

Much more likely the issue is the use of EDNS0.  In the part of the dig output 
you didn't include, you probably got:

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096

and 

;; MSG SIZE  rcvd: 611

I would guess that they published a new record that pushed them outside the 
size of a UDP packet, so it used EDNS0, and there's some incompatible box in 
the middle (and there wasn't such a box similarly in between amazon and my SPF 
validator).

Followups should probably go to:

https://answers.launchpad.net/postfix-policyd-spf-perl

Scott K


Re: postfix-policyd-spf-perl and troubles with Amazon?

2015-05-06 Thread James B. Byrne

On Wed, May 6, 2015 09:45, Tobi wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
>
> Hi list
>
> I know it's technically not a postfix issue :-) But maybe someone else
> here on this list has the same problem.
> I'm using Postfix with postfix-policyd-spf-perl About 4 or 5 days ago
> I started to get error messages from postfix for mails from Amazon.
> The log shows
>
> <<
> May  6 15:33:12 mail1 postfix/policy-spf[10692]: Policy
> action=DEFER_IF_PERMIT SPF-Result=marketplace.amazon.de ...
> spf1.amazon.com: Unknown error on DNS 'TXT' lookup of
> 'spf1.amazon.com'
> May  6 15:33:12 mail1 postfix/smtpd[10069]: NOQUEUE: reject: RCPT from
> a0-3.smtp-out.eu-west-1.amazonses.com[54.240.0.3]: 450 4.7.1
> : Recipient address rejected:
> SPF-Result=marketplace.amazon.de ... spf1.amazon.com: Unknown error on
> DNS 'TXT' lookup of 'spf1.amazon.com';
> from=
> to= proto=ESMTP
> helo=
> May  6 15:33:37 mail1 postfix/smtpd[10069]: disconnect from
> a0-3.smtp-out.eu-west-1.amazonses.com[54.240.0.3]
>>>
>
> I did not change anything on the server side. I tried to verify the
> SPF records from Amazon with
> http://www.kitterman.com/spf/validate.html but the tests were always
> successfull.
> Does anyone have this problem too with Amazon? Or does anyone have an
> idea how to solve it?
>
> Thanks
>
dig spf1.amazon.com TXT

;; ANSWER SECTION:
spf1.amazon.com.900 IN  TXT "spf2.0/pra ip4:207.171.160.0/19
ip4:87.238.80.0/21 ip4:72.21.192.0/19 ip4:194.154.193.192/27
ip4:194.7.41.152/28 ip4:212.123.28.40/32 ip4:203.81.17.0/24
ip4:72.21.212.0/25 ip4:178.236.10.128/26 -all"
spf1.amazon.com.900 IN  TXT "v=spf1 ip4:207.171.160.0/19
ip4:87.238.80.0/21 ip4:72.21.192.0/19 ip4:194.154.193.192/27
ip4:194.7.41.152/28 ip4:212.123.28.40/32 ip4:203.81.17.0/24
ip4:72.21.212.0/25 ip4:178.236.10.128/26 -all"

Amazon has screwed up their spf records.  A DNS host can have only ONE
spf TXT RR and that must not contain or recursively resolve to more
than TEN tags.

You will have to contact the DNS maintainer for the amazon.com zone

;; AUTHORITY SECTION:
amazon.com. 60  IN  SOA dns-external-master.amazon.com.
root.amazon.com. 2010112764 180 60 3024000 60

Who evidently is reached via r...@amazon.com.  Good luck with that.


-- 
***  e-Mail is NOT a SECURE channel  ***
Do NOT transmit sensitive data via e-Mail
James B. Byrnemailto:byrn...@harte-lyne.ca
Harte & Lyne Limited  http://www.harte-lyne.ca
9 Brockley Drive  vox: +1 905 561 1241
Hamilton, Ontario fax: +1 905 561 0757
Canada  L8E 3C3



postfix-policyd-spf-perl and troubles with Amazon?

2015-05-06 Thread Tobi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Hi list

I know it's technically not a postfix issue :-) But maybe someone else
here on this list has the same problem.
I'm using Postfix with postfix-policyd-spf-perl About 4 or 5 days ago
I started to get error messages from postfix for mails from Amazon.
The log shows

<<
May  6 15:33:12 mail1 postfix/policy-spf[10692]: Policy
action=DEFER_IF_PERMIT SPF-Result=marketplace.amazon.de ...
spf1.amazon.com: Unknown error on DNS 'TXT' lookup of 'spf1.amazon.com'
May  6 15:33:12 mail1 postfix/smtpd[10069]: NOQUEUE: reject: RCPT from
a0-3.smtp-out.eu-west-1.amazonses.com[54.240.0.3]: 450 4.7.1
: Recipient address rejected:
SPF-Result=marketplace.amazon.de ... spf1.amazon.com: Unknown error on
DNS 'TXT' lookup of 'spf1.amazon.com';
from=
to= proto=ESMTP
helo=
May  6 15:33:37 mail1 postfix/smtpd[10069]: disconnect from
a0-3.smtp-out.eu-west-1.amazonses.com[54.240.0.3]
>> 

I did not change anything on the server side. I tried to verify the
SPF records from Amazon with
http://www.kitterman.com/spf/validate.html but the tests were always
successfull.
Does anyone have this problem too with Amazon? Or does anyone have an
idea how to solve it?

Thanks

tobi
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
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=2Xb7
-END PGP SIGNATURE-


Re: "smtp_sasl_auth_enable = yes" for specific peers only?

2015-05-06 Thread Robert Senger
Hi Viktor,

thank you very much, you gave me the right hint!

In the past, when we had a dynamic ip, we used the gmail relays for
sending mail from the local domains (those relays can be authorized to
send for any domain or email address).

I've commented these lines in the sender_dependent file later when we
got a static ip, but in the sasl_passwd file the login credentials for
the google relays were still present. 

So, when Postfix got AUTH from the peer, it tried to authenticate with
the gmail credentials, which of course failed.

Solved, thanks!

Cheers,

Robert


Am Dienstag, den 05.05.2015, 23:22 + schrieb Viktor Dukhovni:
> On Tue, May 05, 2015 at 10:22:42PM +0200, Robert Senger wrote:
> 
> > I am having trouble sending mail to a specific smtp host, which is
> > configured for sasl authentication on port 25.
> 
> This should have no impact on your machine, unless you also configure
> smtp_sasl_password_maps non-empty, and configure a table entry that
> matches the nexthop domain (the smtp host in question).
> 
> > I have configured Postfix to send smtp mail from a small number of local
> > domains to the recipient domain's mail exchanger, and to send mail from
> > non local domains such as gmx.de and gmail.com via the appropriate
> > relays using sender_dependent lists. All worked fine until today.
> 
> If you do configure sender-dependent SASL authentication, then you
> MUST either ensure that all outbound mail from the sender in question
> goes through the expected relay (for which the sender has credentials),
> via sender_dependent_relayhost_maps, or via a different transport
> via sender_dependent_default_transport_maps, so that you never
> connect to some other relay expecting to authenticate because you've
> configured a sender-specific SASL password.
> 
> > The peer that causes trouble is using sasl authentication on port 25, to
> > allow authenticated users sending mail via smtp instead of submission. 
> 
> The trouble is not the peer.  It is your server's misconfiguration.
> Postfix happily ignores remote "AUTH" by default, unless you've
> configured a password for the destination or the sender.
> 
> > So, my own Postfix tries to authenticate to this server, but of course
> > fails as it does not have any credentials. 
> 
> It does, for the sender.
> 
> > I see that this seems to be caused by the smtp_sasl_auth_enable = yes
> > flag set in main.cf, which I need because without this, Postfix will
> > never try to authenticate to the sender_dependent relays, e.g. for
> > gmail.com.
> 
> No, that's not the reason.  Even with that on, authentication only
> happens to destinations (or for senders) for which you've set a
> password.
> 
> > I don't know what to do about this, is there a way to tell Postfix to
> > only authenticate to those relays defined in sender_dependent, or only
> > when connecting to the submission port?
> > 
> > Or can this be a misconfiguration at the peer's side?
> 
> Misconfiguration on your side.
> 

-- 
Robert Senger 
PGP/GPG Public Key ID: 24E78B5E


signature.asc
Description: This is a digitally signed message part