Re: [vchkpw] dot qmail processing

2004-06-10 Thread Tom Collins
On Jun 9, 2004, at 5:46 PM, Paul Oehler wrote:
Out of curiosity, is this a documented feature?  I don't remember ever
reading this anywhere.
It's in the qmail docs.
man dot-qmail
It isn't in there explicitly, but it says that lines starting with # 
are ignored, and that qmail-local will only process .qmail files that 
aren't empty.

--
Tom Collins  -  [EMAIL PROTECTED]
QmailAdmin: http://qmailadmin.sf.net/  Vpopmail: http://vpopmail.sf.net/
Info on the Sniffter hand-held Network Tester: http://sniffter.com/


Re: [vchkpw] problems after upgrading vpomail 5.2.2 to vpopmail 5.4.0

2004-06-10 Thread Tom Collins
On Jun 9, 2004, at 4:12 PM, Mario Vazquez wrote:
I got a patch for horde-passwd to enable crypt-md5  
http://article.gmane.org/gmane.comp.horde.sork/1114/ 
match=passwd+vpopmail
If it links to libvpopmail, you need to recompile it after installing  
vpopmail 5.4.0.

If it still doesn't work, post a bug report on vpopmail.sf.net, and  
(hopefully) one of the developers will find time to look into it.

--
Tom Collins  -  [EMAIL PROTECTED]
QmailAdmin: http://qmailadmin.sf.net/  Vpopmail: http://vpopmail.sf.net/
Info on the Sniffter hand-held Network Tester: http://sniffter.com/


Re: [vchkpw] Problem with bounce-no-mailbox

2004-06-10 Thread tonix (Antonio Nati)
Is that domain unique in your system, or do you have other domains (working 
fine)?

What did you change in the last times?
Install a new version of vpopmail? Change system user for that domain? Move 
from cdb to MySQL?

Tonino
At 10/06/2004 10/06/2004 +0100, you wrote:
Hi
I'm having a problem with Vpopmail 5.4.1 on Redhat. I don't think it has 
been happening until recently.

In a nutshell, for domains that have .qmail-default set as
| /home/vpopmail/bin/vdelivermail '' bounce-no-mailbox
*all* email to that domain is bouncing with
550 sorry, no mailbox here by that name (#5.1.1 - chkusr)
If I change the .qmail-default to read
| /home/vpopmail/bin/vdelivermail '' 
/home/vpopmail/domains/vegasforums.com/postmaster
mail is delivered without error

Any suggestions gratefully received.
--
Cheers
Alastair
--^--^--

[EMAIL PROTECTED]Interazioni di Antonio Nati
   http://www.interazioni.it  [EMAIL PROTECTED]



[vchkpw] Possible enhancements to help protect qmail server reources against spam processing

2004-06-10 Thread Eric Ziegast
I'd like to run some features by you.  If you think they're good,
you might want to include it as part of an optimized openfilter
solution.


 Layer 1

A problem that I (and others?) have with rblsmtpd is that it's too
coarse.  It either rejects mail or lets it through.  I would much
rather kung-fu finesse the whole process by allowing non-blacklisted
mail to go through quickly and pass suspected spam into a seperate
purgatory queue (the slow road from china).

I implemented a simple improvement to rblsmtpd.c that adds a -s
(soft) option.  It takes an additional argument for what you'd like
to set QMAILQUEUE to instead of using the default bin/qmail-queue.
I might, for example, compile /var/qmail/bin/qmail-queue2 to use
/var/qmail/queue2 instead of /var/qmail/queue as its mail queue.
A seperate program might look through this purgatory queue in a
slow serialized manner and pass more scrutiny on whether to deliver
and/or bounce the messages in that queue or not (or use spamassassin,
etc.).  In the meantime, mail from servers not listed in the RBLs
passes quickly to the recipients.

To some degree it has some advantages similar to the OpenBSD+pf+RBL
efforts to preserve CPU processing for normal mail and redirect
processing from RBL-listed servers to alternate processing, especially
if end-user processing is expensive (like procmail or perl-based filters
like spamassassin).  The advantage to implementing it this way is that
you don't need to install an extra OpenBSD box and learn pf.

Here's an example of using Qmail-Scanner to bypass normal processing
if (and only if) it comes from a suspected spam server...

  rblsmtpd -s/var/qmail/bin/qmail-scanner-queue.pl -rlocalrbl.mydomain.com 
-rbl.spamcop.net -rdnsbl.sorbs.net -rsbl-xbl.spamhaus.org /var/qmail/bin/qmail-smtpd

... though, my idea of a purgatory queue (/var/qmail/bin/qmail-queue2)
might be a better approach toward protecting inbound mail servers.

Prerequisite: QMAILQUEUE patch.



 Layer 2

A problem that I have with the Layer 2 chk-user method is that
spammers are not only sending spam, but they are also harvesting
addresses by checking for bounces after trying every user
combination against a domain.  Once they find an addres that
doesn't bounce, it's marked as a lucrative address in their
mailing lists (assuming all other addresses bounced).

I prefer not to bounce any mis-addressed mail to help protect
my users from being found.  As a policy, all user domains
get a catch-all postmaster account installed.  Handing out
passwords for the postmaster account is part of the installation
process, and the policy is that all mail in the postmaster
mailboxes is deleted after 14 days.  If someone thinks a
message was missed, they can retrieve it.  Otherwise, misdirected
mail just doesn't get seen, nor bounced.  It also helps prevent
spammers from using my domains as bounce-relays where mailing
to an unknown mailing address makes my server bounce messages
to real envelope-from addresses.


 Bounced messages for forwarded accounts

Something else I need to help protect delivery is a way to
rewrite the sender envelope address to use my mail server
instead of the original address.  This will become important
later as people implement SPF to ensure that forwarded mail is
recieved by SPF-enforcing servers.  I'd like to use
[EMAIL PROTECTED] as the return
address on forwarded mail.  This will ensure that if mail
forwarding breaks, mail is rejected to a place where a customer
domain representative can do something with it if they catch the
problem within two weeks.  Scripts can be rewritted to redeliver
bounced mail for a user after their forwarding alias is fixed.

I've had enough run-ins with being blacklisted for forwarded
spam that wasn't my responsibility that I need something to
help me detect the fact that mail is bouncing for a forwarded
user.  I haven't figured out implementation details yet, though.


 AOL message tagging

In addition to the above, the AOL whitelist bounce policy makes me
want to implement message tagging and tracking that let's me know
which abuse-reported messages are attached to which forwarding
accounts.  I might add a word to the Subject line, for example:
   Subject: original subject line [fwd: [EMAIL PROTECTED]
that would come back to me in an AOL abose report.  I could then
correspond the id to a forwarder to figure out who is mis-reporting
spam.  I'd have a mapping of addresses to IDs.  Seeing the tag,
they might not quickly tag a message as This is spam if they knew
that doing it often enough would cause me to kill their forwarding
to protect the AOL-integrity of my servers.

I think a modification to qmail-remote or vdelivermail on my primary
inbound mail server is problably the best way to implement this.
What do you think?



 Local spam RBL generation

When a spammer wants to send spam to users on your server, they usually
send several messages (perhaps even hundreds) of the same messages or
send to many 

Re: [vchkpw] Problem with bounce-no-mailbox

2004-06-10 Thread Alastair Battrick
Hi Antonio

That domain is in the system, as I said, when I change bounce-no-mailbox
to 'catchall to postmaster' there is no problem at all. I have many
domains running without a problem, but it is all 4 that are using
bounce-no-mailbox that are having all mail rejected with 5.1.1

Nothing has changed on the system recently, and I am only aware that this
problem existed in the last 4 or 5 days

I am using mysql to store the vpopmail information. I am also using
qmail-scanner to run f-prot and spamassassin on mail

I'd rather not have to reinstall vpopmail unless this is a known issue
with version 5.4.1, and I am not aware that it is

Cheers
Alastair


tonix (Antonio Nati) said:

 Is that domain unique in your system, or do you have other domains
 (working fine)?

 What did you change in the last times?

 Install a new version of vpopmail? Change system user for that domain?
 Move
 from cdb to MySQL?

 Tonino

 At 10/06/2004 10/06/2004 +0100, you wrote:
Hi

I'm having a problem with Vpopmail 5.4.1 on Redhat. I don't think it has
been happening until recently.

In a nutshell, for domains that have .qmail-default set as
| /home/vpopmail/bin/vdelivermail '' bounce-no-mailbox
*all* email to that domain is bouncing with
550 sorry, no mailbox here by that name (#5.1.1 - chkusr)

If I change the .qmail-default to read
| /home/vpopmail/bin/vdelivermail ''
/home/vpopmail/domains/vegasforums.com/postmaster
mail is delivered without error

Any suggestions gratefully received.

--
Cheers
Alastair
--^--^--

 
  [EMAIL PROTECTED]Interazioni di Antonio Nati
 http://www.interazioni.it  [EMAIL PROTECTED]
 





Re: [vchkpw] SMTP Authenticated user is able to anyone in rcpthos ts

2004-06-10 Thread Nick Harring
Title: Re: [vchkpw] SMTP Authenticated user is able to anyone in rcpthosts





On Wed, 2004-06-09 at 00:13, Devendra Singh wrote:
 At 08/06/04 11:41 (), Tom Collins wrote:
 On Jun 7, 2004, at 9:28 PM, Devendra Singh wrote:
 I would like to re-frame my Subject: SMTP Authenticated user is
 able to 
 impersonate anyone in rcpthosts.
 
 You could re-frame it even more. Authenticated SMTP users can use
 any 
 FROM address and submit mail for any host.
 
 Some clients may have multiple from addresses going through a single 
 authenticated session. Limiting them to the address they
 authenticated as 
 may be too strict. Including it in the Received header is probably a
 more 
 useful option.
 
 Dear Tom,
 
 Thanks, that you understood. (Sorry, the issue is not related to
 Vpopmail, 
 but may be of interest to most).
 
 Including the authenticated ID in the Received header is good, but
 still it 
 would not be able to stop the menace of Spamming from your own users
 (who 
 is going to monitor the logs of mails sent by users). Also, in the
 days of 
 virus outbreak and users having password saved in their outlook
 express, 
 the feature can be saviour.
 
 BTW, Shouguan Lin had pointed to a link 
 http://night.rdslink.ro/dudu/qmail/http://night.rdslink.ro/dudu/qmail/
 with features
 
 o Added my own patch, that checks whether the 'mail
 from' 
 value is
 different from the username used for SMTP AUTH, thus 
 preventing
 source address spoofing. Useful for ISP's that only
 relay 
 mails
 from authenticated users.
 o The 'mail from' verification is now configurable
 through a 
 knob
 defined in /var/qmail/control/spoofcheck or in the
 environment
 variable $SPOOFCHECK
 
 But, this is part of unified patch which is difficult situation for
 me.
 
 It's my request to Dr Erwin Hoffmann through this list that if he adds
 the 
 feature into his authentication patch which is also included into the 
 Vpopmail contrib, we all would get benefited.
 
This is problematic for ISP customers whose ISPs block outbound port 25,
therefor forcing relaying through their servers, but who also have a
vanity domain or similar provided by a third party. ISPs would then be
disallowing any form of sending mail with that From: field, which is
pretty bogus. 
Many of these so-called anti-spam measures are approaching throwing not
just the baby out with the bathwater, but the entire tub.
Why don't I reiterate the question Jeremy Kitchen so accurately asked,
What problem are you solving?. Forged From fields server a
legitimate purpose, just like doing the same in the To field can (think
BCC mailing lists with Undisclosed Recipients in the To). Yes,
spammers abuse this, as do virus writers. 
I definitely recommend this functionality be made optional, hard to
turn on, and as unadvertised as possible. Those few people who know
they'd benefit and not suffer can then find it, and those people who
think they'd benefit but wouldn't realize the consequences wouldn't
clobber their users.


Nick Harring
Webley Systems





Re: [vchkpw] Problem with bounce-no-mailbox

2004-06-10 Thread tonix (Antonio Nati)



Did you make any change of this kind?
Did you recompile qmail after updating vpopmail? You should link the new
vpopmail library.
Did you make the following changes?
 From
www.interazioni.it/qmail:
Note on vpopmail 5.3.25 
following
Starting from version 5.3.25, vpopmail has dismissed the function
vget_real_domain().
The function making the work of vget_real_domain() is already
existing within chkusr, so the lines related to vget_real_domain()
may be commented out, without losing any functionality.
Just delete or comment out these lines in red:
/* Check if domain is a real domain */


if (!stralloc_0 (domain)) die_nomem();

vget_real_domain(domain.s, domain.a);
 domain.len = strlen
(domain.s);
 if (domain.len 
(domain.a - 1)) die_nomem();

/* Let's get domain's real path */

Ciao,
Tonino
At 10/06/2004 10/06/2004 +0100, you wrote:
Hi Antonio
That domain is in the system, as I said, when I change
bounce-no-mailbox
to 'catchall to postmaster' there is no problem at all. I have many
domains running without a problem, but it is all 4 that are using
bounce-no-mailbox that are having all mail rejected with 5.1.1
Nothing has changed on the system recently, and I am only aware that
this
problem existed in the last 4 or 5 days
I am using mysql to store the vpopmail information. I am also using
qmail-scanner to run f-prot and spamassassin on mail
I'd rather not have to reinstall vpopmail unless this is a known
issue
with version 5.4.1, and I am not aware that it is
Cheers
Alastair

tonix (Antonio Nati) said:

 Is that domain unique in your system, or do you have other
domains
 (working fine)?

 What did you change in the last times?

 Install a new version of vpopmail? Change system user for that
domain?
 Move
 from cdb to MySQL?

 Tonino

 At 10/06/2004 10/06/2004 +0100, you wrote:
Hi

I'm having a problem with Vpopmail 5.4.1 on Redhat. I don't think
it has
been happening until recently.

In a nutshell, for domains that have .qmail-default set as
| /home/vpopmail/bin/vdelivermail '' bounce-no-mailbox
*all* email to that domain is bouncing with
550 sorry, no mailbox here by that name (#5.1.1 - chkusr)

If I change the .qmail-default to read
| /home/vpopmail/bin/vdelivermail ''
/home/vpopmail/domains/vegasforums.com/postmaster
mail is delivered without error

Any suggestions gratefully received.

--
Cheers
Alastair
--^--^--

 

[EMAIL PROTECTED]
Interazioni di Antonio Nati

http://www.interazioni.it
 [EMAIL PROTECTED]
 





[EMAIL PROTECTED]
Interazioni di Antonio Nati 

http://www.interazioni.it
[EMAIL PROTECTED]






[vchkpw] Can't get rid of authmysql!

2004-06-10 Thread nednieuws | charles
I've installed and reinstalled courier-imap/vqadmin, and I keep
getting the mysql auth errors. How do I get rid of them?

I'm running FreeBSD 4.9 RELEASE and have installed courier-imap and
vqadmin using the ports collection.

portinstall -m -DWITH_CRAM -DWITH_VPOPMAIL -DWITH_FAM -DWITH_TRASHQUOTA courier-imap

locate authmysql gives me nothing, i.e. there is no such file.

portinstall vqadmin

Both ports compile fine.

And here come the error:

[EMAIL PROTECTED] ~ # /usr/local/vpopmail/bin/vadddomain example.com password
vmysql: sql error[c]: MySQL server has gone away
vmysql: sql error[b]: MySQL server has gone away
vmysql: sql error[3]: MySQL server has gone away
vmysql: sql error[c]: MySQL server has gone away
vmysql: sql error[c]: MySQL server has gone away
vmysql: sql error[b]: MySQL server has gone away
vmysql: sql error[3]: MySQL server has gone away
vmysql: sql error[2]: MySQL server has gone away
Failed while attempting to add user to auth backend
Error: (vadduser) no auth connection

-- 
Regards, Charles.



Re: [vchkpw] Can't get rid of authmysql!

2004-06-10 Thread nednieuws | charles
Accidently sent the message ...

/usr/local/etc/courier-imap/authdaemonrc
authmodulelist=authpam authcustom authcram authuserdb authvchkpw

/usr/local/etc/courier-imap/imapd
AUTHMODULES=authdaemon

courier-imap v2.2.1
vqadmin v2.3.5

-- 
Regards, Charles.



[vchkpw] vpopmail-bin (vpopmail package for Debian linux)

2004-06-10 Thread Lars E. D. Jensen
Hi
Does anyone have experience with the vpopmail-bin package for Debian?
I have installed it, but clearopensmtp seems to cause heavy CPU load, 
and I don't know why.

Further I can't get mysql support work with libvpopmail-mysql package.
Maybe a bit off topic, but if someone use these package I would like to 
know how you get mysql support and clearopensmtp to work properly.

Thanks.
/Lars


Re: [vchkpw] vpopmail-bin (vpopmail package for Debian linux)

2004-06-10 Thread Patrick Donker
Lars E. D. Jensen wrote:
Hi
Does anyone have experience with the vpopmail-bin package for Debian?
I have installed it, but clearopensmtp seems to cause heavy CPU load, 
and I don't know why.

Further I can't get mysql support work with libvpopmail-mysql package.
Maybe a bit off topic, but if someone use these package I would like 
to know how you get mysql support and clearopensmtp to work properly.

Thanks.
/Lars

I tried it and dropped it. Just install from source, so you know what it 
happening and everything is installed in the right places


Re: [vchkpw] SMTP Authenticated user is able to anyone in rcpthos ts

2004-06-10 Thread Devendra Singh
At 10/06/04 19:11 (), you wrote:
On Wed, 2004-06-09 at 00:13, Devendra Singh wrote:
 At 08/06/04 11:41 (), Tom Collins wrote:
 On Jun 7, 2004, at 9:28 PM, Devendra Singh wrote:
 I would like to re-frame my Subject: SMTP Authenticated user is
 able to
 impersonate anyone in rcpthosts.
 
 You could re-frame it even more.  Authenticated SMTP users can use
 any
 FROM address and submit mail for any host.
 
 Some clients may have multiple from addresses going through a single
 authenticated session.  Limiting them to the address they
 authenticated as
 may be too strict.  Including it in the Received header is probably a
 more
 useful option.

 Dear Tom,

 Thanks, that you understood. (Sorry, the issue is not related to
 Vpopmail,
 but may be of interest to most).

 Including the authenticated ID in the Received header is good, but
 still it
 would not be able to stop the menace of Spamming from your own users
 (who
 is going to monitor the logs of mails sent by users). Also, in the
 days of
 virus outbreak and users having password saved in their outlook
 express,
 the feature can be saviour.

 BTW, Shouguan Lin had pointed to a link
 
http://night.rdslink.ro/dudu/qmail/http://night.rdslink.ro/dudu/qmail/http://night.rdslink.ro/dudu/qmail/ 

 with features

  o   Added my own patch, that checks whether the 'mail
 from'
 value is
  different from the username used for SMTP AUTH, thus
 preventing
  source address spoofing. Useful for ISP's that only
 relay
 mails
  from authenticated users.
  o   The 'mail from' verification is now configurable
 through a
 knob
  defined in /var/qmail/control/spoofcheck or in the
 environment
  variable $SPOOFCHECK

 But, this is part of unified patch which is difficult situation for
 me.

 It's my request to Dr Erwin Hoffmann through this list that if he adds
 the
 feature into his authentication patch which is also included into the
 Vpopmail contrib, we all would get benefited.

This is problematic for ISP customers whose ISPs block outbound port 25,
therefor forcing relaying through their servers, but who also have a
vanity domain or similar provided by a third party. ISPs would then be
disallowing any form of sending mail with that From: field, which is
pretty bogus.
Many of these so-called anti-spam measures are approaching throwing not
just the baby out with the bathwater, but the entire tub.
Why don't I reiterate the question Jeremy Kitchen so accurately asked,
What problem are you solving?. Forged From fields server a
legitimate purpose, just like doing the same in the To field can (think
BCC mailing lists with Undisclosed Recipients in the To). Yes,
spammers abuse this, as do virus writers.
I definitely recommend this functionality be made optional, hard to
turn on, and as unadvertised as possible. Those few people who know
they'd benefit and not suffer can then find it, and those people who
think they'd benefit but wouldn't realize the consequences wouldn't
clobber their users.
Nick Harring
Webley Systems
Any AntiSpamming measure onto SMTP Authenticatted mail sending has to be 
optional like all other such means.

Devendra Singh
__
Devendra Singh
IndiaMART InterMESH Limited
(Global Gateway to Indian Market Place)
B-1, Sector 8, Noida, UP - 201301, India
EPABX : +91-120-2424945, +91-120-3094634, +91-9810646342
Fax: +91-120-2424943
http://www.indiamart.com
http://www.indiangiftsportal.com
http://www.indiantravelportal.com
__ 



[vchkpw] Anyone using 5.5.x in production?

2004-06-10 Thread Tom Collins
Can anyone report on performance of the MySQL and/or Postgres backends in 5.5.0 or later on a production machine?  I made some significant changes related to building SQL queries which should make them more secure.  I also fixed some outstanding bugs in Postgres code and consolidated some code in MySQL and Postgres.

I'd like to be sure that the new code works before I push it into the 5.4 series.

--
Tom Collins  -  [EMAIL PROTECTED]
QmailAdmin: http://qmailadmin.sf.net/  Vpopmail: http://vpopmail.sf.net/ 
Info on the Sniffter hand-held Network Tester: http://sniffter.com/