Re: postscreen_cache_retention_time

2015-05-28 Thread Rich Wales
> Perhaps. This would be a reason to use the actual reply TTL, > and to use postscreen_dnsbl_ttl as an upper bound. Just so I'm sure I understand, then, is the following correct? postscreen_dnsbl_ttl is the minimum period of time during which the result of a DNS lookup will be treated as

Re: postscreen_cache_retention_time

2015-05-28 Thread Wietse Venema
Rich Wales: > > That is not entirely correct - different tests have different > > expiration times. postscreen_cache_retention_time says what > > happens with an IP address after *all* its tests expire. > > So, then, if I want to be able to respond more quickly to changes in an > SMTP client's DNS

Re: postscreen_cache_retention_time

2015-05-28 Thread Rich Wales
> That is not entirely correct - different tests have different > expiration times. postscreen_cache_retention_time says what > happens with an IP address after *all* its tests expire. So, then, if I want to be able to respond more quickly to changes in an SMTP client's DNSBL status, should I be

Re: postscreen_cache_retention_time

2015-05-28 Thread furio ercolessi
On Thu, May 28, 2015 at 10:42:09AM -0700, Rich Wales wrote: > [...] > I think what might be happening in some cases is that a new spam site > sends me something (which I accept because the site is new and hasn't > made it onto any DNSBLs yet) -- and soon thereafter, that site gets > picked up by Sp

Re: How to extract information from postscreen_cache

2015-05-28 Thread Bryan K. Walton
On Thu, May 28, 2015 at 04:43:50PM -0400, Wietse Venema wrote: > > The format is not documented because it is Postfix internal and > subject to change without warning. The table is locked for exclusive > access; if you try to read the table anywan, then you may read > garbage. The only exception

Re: How to extract information from postscreen_cache

2015-05-28 Thread Wietse Venema
Bryan K. Walton: > Hi, > > Is there a way to extract the information stored in the postscreen_cache > that postscreen uses for its temporary whitelist? We'd like to > be able to see what domains/IPs are whitelisted at a given time. The format is not documented because it is Postfix internal and

Re: postscreen_cache_retention_time

2015-05-28 Thread Wietse Venema
Rich Wales: > I'm running Postfix 2.11.0 on Ubuntu 14.04.2 LTS. > > I wonder whether the default value for postscreen_cache_retention_time > (7 days) may be too high for my situation. Making the table smaller has a negligible impact on access speed. Garbage collection will take longer, but that i

How to extract information from postscreen_cache

2015-05-28 Thread Bryan K. Walton
Hi, Is there a way to extract the information stored in the postscreen_cache that postscreen uses for its temporary whitelist? We'd like to be able to see what domains/IPs are whitelisted at a given time. Thanks, Bryan

postscreen_cache_retention_time

2015-05-28 Thread Rich Wales
I'm running Postfix 2.11.0 on Ubuntu 14.04.2 LTS. I wonder whether the default value for postscreen_cache_retention_time (7 days) may be too high for my situation. I get a lot of spam despite using postscreen, and when I manually look up the IP addresses of some of the sites that send me spam, I

Re: logjam & SMTP

2015-05-28 Thread Viktor Dukhovni
On Thu, May 28, 2015 at 02:09:37PM +0200, DTNX Postmaster wrote: > > I would love to see postfix smtp client reject connections to my weak > > Server. > > > > And *that* is the point... > > Also, remember that SMTP is based on opportunistic encryption, triggered > by the presence of 'STARTTLS'

Re: logjam & SMTP

2015-05-28 Thread DTNX Postmaster
On 28 May 2015, at 12:16, A. Schulze wrote: >> There are several problems with your configuration. Please refer to the >> mailinglist archive for how to configure Postfix to deal with Logjam. >> It has been discussed extensively in this thread; >> >> http://marc.info/?t=14323933481&r=1&w=2 >

Re: logjam & SMTP

2015-05-28 Thread Viktor Dukhovni
On Thu, May 28, 2015 at 12:21:42PM +0200, A. Schulze wrote: > >When the server is authenticated, it is not going to send weak DH > >keys with strong ciphers. > > why? Authenticated servers don't go out of their way to present artificially weak keys. If they relly want to disclose the session co

Re: logjam & SMTP

2015-05-28 Thread A. Schulze
Viktor Dukhovni: Indeed, because such a policy would properly be an OpenSSL feature, not a Postfix feature. However, the whole attack is largely irrelevant for SMTP. Unless you're authenticating the server (DANE or Web PKI) you're subject to MiTM attacks with or without logjam. correct. W

Re: logjam & SMTP

2015-05-28 Thread A. Schulze
DTNX Postmaster: There are several problems with your configuration. Please refer to the mailinglist archive for how to configure Postfix to deal with Logjam. It has been discussed extensively in this thread; http://marc.info/?t=14323933481&r=1&w=2 I read this as "how do I provide strong

Re: logjam & SMTP

2015-05-28 Thread Viktor Dukhovni
On Thu, May 28, 2015 at 11:38:35AM +0200, A. Schulze wrote: > The crypto weakness of the month is named "logjam". > If you could connect to https://dhe512.zmap.io your SSL-Client / Browser > support weak crypto. > What does that mean for postfix? Postfix SMTP servers should disable "export" ciphe

Re: logjam & SMTP

2015-05-28 Thread DTNX Postmaster
On 28 May 2015, at 11:38, A. Schulze wrote: > the crypto weakness of the month is named "logjam". > If you could connect to https://dhe512.zmap.io your SSL-Client / Browser > support weak crypto. > What does that mean for postfix? > > We setup a postfix smtp server with > >smtpd_tls_dh1024

logjam & SMTP

2015-05-28 Thread A. Schulze
Hello, the crypto weakness of the month is named "logjam". If you could connect to https://dhe512.zmap.io your SSL-Client / Browser support weak crypto. What does that mean for postfix? We setup a postfix smtp server with smtpd_tls_dh1024_param_file = /path/to/dh_512.pem smtpd_tls_e