Re: smtp auth over ssl for smartrelay configuration

2010-01-25 Thread Jelle de Jong
Victor Duchovni wrote, on 23-01-10 20:27:
 On Sat, Jan 23, 2010 at 05:59:37PM +0100, Jelle de Jong wrote:
 
 postconf -e 'smtp_tls_mandatory_protocols = !SSLv2, !TLSv1'
 Why disable both SSLv2 and TLSv1?! Leave this setting at its default
 value, or disable just SSLv2. Does your client or server correctly handle
 SSLv3, but fail to interoperate via TLSv1?
 Well my server supports SSLv3 just fine, so I thought I disable
 everything lower, and if better protocols come around postfix will
 update and will still be able to use the newer stuff since I did not
 force it to only use SSLv3.
 
 The default settings for advanced TLS features were chosen with care.
 It is unwise to change them unless you are a TLS expert. TLSv 1.0 is
 SSL 3.1. TLS 1.1 is SSL 3.2, ... There is no plan for TLSv2 at this
 time, but it would be SSL version 4.
 
 Don't change advanced TLS settings until you have read the relevant
 OpenSSL documentation and/or RFCs and in some cases the OpenSSL source
 code (sadly OpenSSL documentation is not as complete as the Postfix
 documentation).

Thanks for the explanations, I changed the settings back to it's defaults.

Does somebody know the differences between using SSL over port 465 and
TLS over port 25 in the settings for the Debian icedove MUA? (I want
to make postfix use port 465 for its smtp auth mailrelaying)

Thanks in advance,

Kind regards,

Jelle


Re: smtp auth over ssl for smartrelay configuration

2010-01-25 Thread Charles Marcus
On 2010-01-25 8:56 AM, Jelle de Jong wrote:
 Does somebody know the differences between using SSL over port 465
 and TLS over port 25 in the settings for the Debian icedove MUA? (I
 want to make postfix use port 465 for its smtp auth mailrelaying)

SMTPS over Port 465 is deprecated. Best is TLS on the submission port - 587.

-- 

Best regards,

Charles


Re: smtp auth over ssl for smartrelay configuration

2010-01-25 Thread Noel Jones

On 1/25/2010 7:56 AM, Jelle de Jong wrote:

Does somebody know the differences between using SSL over port 465 and
TLS over port 25 in the settings for the Debian icedove MUA? (I want
to make postfix use port 465 for its smtp auth mailrelaying)


There's some overlap of terms here -- it's understandable to 
be confused.


First, SSL vs. TLS can refer to the encryption standard.  SSL 
is the name first used for https: web encryption.  As the 
protocol matured and became a standard, it was renamed to TLS.


Secondly, SSL vs. TLS can refer to *when* the encryption takes 
place.  The older SSL was commonly (at first, only) used as a 
wrapper; the encrypted tunnel was established before any 
other communication took place, and the communications were 
wrapped in the encryption protocol.  Newer TLS allows a 
standard connection to be made, then request an encrypted 
tunnel be created.  This allows both encrypted and 
non-encrypted traffic to co-exist on the same port.


With email, SSL usually refers to wrapper mode SSL over port 
465 -- negotiate the encrypted connection before sending any 
data.  This was never a standard protocol, and has been 
deprecated for many years.  And even though it's called SSL it 
commonly uses the newer TLS encryption.


So most mail clients expect wrapper mode when you click the 
SSL box, but will have a separate TLS or encrypt this 
connection box to enable standard STARTTLS support.  It 
doesn't help that everyone seems to call it something different.


Some older mail programs only support wrapper mode SSL, so the 
postfix smtpd server can receive mail from such clients with 
the -o smtpd_tls_wrappermode=yes option in master.cf on a 
dedicated port, commonly 465.  The postfix default master.cf 
includes a commented-out entry for this.

http://www.postfix.org/TLS_README.html#server_enable

The postfix smtp client does not support sending mail using 
the deprecated wrapper mode.  If postfix must send mail to an 
antique server that only supports wrapper mode, you can use 
stunnel to create a wrapper.  An example is in the documentation:

http://www.postfix.org/TLS_README.html#client_smtps

TLS over port 25 or 587 establishes a normal SMTP connection 
and then issues the STARTTLS command (usually as the first 
command sent) to establish encryption.  This is fully 
supported by postfix, and by virtually all other modern mail 
software.  And even though it's called TLS, clients are still 
allowed to use older SSL encryption.

Documentation here:  http://www.postfix.org/TLS_README.html

  -- Noel Jones


smtp auth over ssl for smartrelay configuration

2010-01-23 Thread Jelle de Jong
Hello everybody,

I got a hole set 20 of Debian systems connected to mobile broadband
internet. They are behind a NAT of with dynamic ip's.

I want these systems to be able to sent emails to my server for all
kind of reasons like monitoring, security updates etcetera.

I want to use postfix to authorise to my secured SMTP server to be
able to deliver mail. The authorisation should be like the one's used
on my MTA's like Mozilla Thunderbird with SMTP authorisation.

Configuration option I made up:

authuser=usern...@powercraft.nl
authpass=password
authmethod=plain
mailhub=secure.powercraft.nl:465
usessl=true

Can somebody show me an example how to setup up a simple outgoing only
email configuration that uses SMTP AUTH over SSL?

Thanks in advance,

Kind regards,

Jelle



Re: smtp auth over ssl for smartrelay configuration

2010-01-23 Thread Wietse Venema
Jelle de Jong:
 Hello everybody,
 
 I got a hole set 20 of Debian systems connected to mobile broadband
 internet. They are behind a NAT of with dynamic ip's.
 
 I want these systems to be able to sent emails to my server for all
 kind of reasons like monitoring, security updates etcetera.
 
 I want to use postfix to authorise to my secured SMTP server to be
 able to deliver mail. The authorisation should be like the one's used
 on my MTA's like Mozilla Thunderbird with SMTP authorisation.
 
 Configuration option I made up:
 
 authuser=usern...@powercraft.nl
 authpass=password
 authmethod=plain
 mailhub=secure.powercraft.nl:465
 usessl=true
 
 Can somebody show me an example how to setup up a simple outgoing only
 email configuration that uses SMTP AUTH over SSL?

Postfix SASL: http://www.postfix.org/SASL_README.html

Postfix TLS:  http://www.postfix.org/TLS_README.html

These are organized in client and server sections, with examples.
There is no need to repeat this information on the mailing list.

Wietse


Re: smtp auth over ssl for smartrelay configuration

2010-01-23 Thread Jelle de Jong
Victor Duchovni wrote, on 23-01-10 17:48:
 On Sat, Jan 23, 2010 at 05:31:47PM +0100, Jelle de Jong wrote:
 
 postconf -e 'smtp_tls_security_level = encrypt'
 
 Is this SMTP client going to send all mail to a small set of TLS enabled
 relay hosts? Or are you choosing to not be able to send any email to
 the vast majority of domains whose MX hosts don't offer TLS?

The system is a satellite system that is only sending mail to one
secure mail server, the mailrelay is only affable for smtp auth over
ssl. the hostname of the sender will fail every sane check if it sent
to other machines, because it has no fixed ip, and is behind a series
of nat's.

 postconf -e 'smtp_tls_mandatory_protocols = !SSLv2, !TLSv1'
 
 Why disable both SSLv2 and TLSv1?! Leave this setting at its default
 value, or disable just SSLv2. Does your client or server correctly handle
 SSLv3, but fail to interoperate via TLSv1?

Well my server supports SSLv3 just fine, so I thought I disable
everything lower, and if better protocols come around postfix will
update and will still be able to use the newer stuff since I did not
force it to only use SSLv3.

 Hope that helps some people :)
 
 And does not mislead too many. A tutorial needs to not only provide
 working settings, but also explain the use-case to which they apply
 and why the settings are the right ones to the use-case at hand.

All true, that sad the pointer I gave were not related to above and
the documentation handles these points quite well.

Best regards,

Jelle


Re: smtp auth over ssl for smartrelay configuration

2010-01-23 Thread Michael Orlitzky

Jelle de Jong wrote:

Victor Duchovni wrote, on 23-01-10 17:48:

On Sat, Jan 23, 2010 at 05:31:47PM +0100, Jelle de Jong wrote:


postconf -e 'smtp_tls_security_level = encrypt'

Is this SMTP client going to send all mail to a small set of TLS enabled
relay hosts? Or are you choosing to not be able to send any email to
the vast majority of domains whose MX hosts don't offer TLS?


The system is a satellite system that is only sending mail to one
secure mail server, the mailrelay is only affable for smtp auth over
ssl. the hostname of the sender will fail every sane check if it sent
to other machines, because it has no fixed ip, and is behind a series
of nat's.


postconf -e 'smtp_tls_mandatory_protocols = !SSLv2, !TLSv1'

Why disable both SSLv2 and TLSv1?! Leave this setting at its default
value, or disable just SSLv2. Does your client or server correctly handle
SSLv3, but fail to interoperate via TLSv1?


Well my server supports SSLv3 just fine, so I thought I disable
everything lower, and if better protocols come around postfix will
update and will still be able to use the newer stuff since I did not
force it to only use SSLv3.


TLSv1 is newer stuff.


Re: smtp auth over ssl for smartrelay configuration

2010-01-23 Thread Victor Duchovni
On Sat, Jan 23, 2010 at 05:59:37PM +0100, Jelle de Jong wrote:

  postconf -e 'smtp_tls_mandatory_protocols = !SSLv2, !TLSv1'
  
  Why disable both SSLv2 and TLSv1?! Leave this setting at its default
  value, or disable just SSLv2. Does your client or server correctly handle
  SSLv3, but fail to interoperate via TLSv1?
 
 Well my server supports SSLv3 just fine, so I thought I disable
 everything lower, and if better protocols come around postfix will
 update and will still be able to use the newer stuff since I did not
 force it to only use SSLv3.

The default settings for advanced TLS features were chosen with care.
It is unwise to change them unless you are a TLS expert. TLSv 1.0 is
SSL 3.1. TLS 1.1 is SSL 3.2, ... There is no plan for TLSv2 at this
time, but it would be SSL version 4.

Don't change advanced TLS settings until you have read the relevant
OpenSSL documentation and/or RFCs and in some cases the OpenSSL source
code (sadly OpenSSL documentation is not as complete as the Postfix
documentation).

-- 
Viktor.

Disclaimer: off-list followups get on-list replies or get ignored.
Please do not ignore the Reply-To header.

To unsubscribe from the postfix-users list, visit
http://www.postfix.org/lists.html or click the link below:
mailto:majord...@postfix.org?body=unsubscribe%20postfix-users

If my response solves your problem, the best way to thank me is to not
send an it worked, thanks follow-up. If you must respond, please put
It worked, thanks in the Subject so I can delete these quickly.