Re: Big problem with this mailing list and Majordomo regarding DMARC

2019-04-19 Thread @lbutlr
On 19 Apr 2019, at 23:04, Peter wrote: > But this is just one example of where a header might be signed and then is > later added or altered by the mailing list, The only headers that mailing lists often alter are subject (though i think that is dying off, hopefully) and the only non-list-mumbl

Re: Big problem with this mailing list and Majordomo regarding DMARC

2019-04-19 Thread Scott Kitterman
On Saturday, April 20, 2019 05:04:24 PM Peter wrote: > On 20/04/19 4:46 PM, Scott Kitterman wrote: > > RFC 6376 suggests signing the sender field if present. It says nothing > > about adding it. For that you want RFC 5322, Section 3.6.2. (Originator > > Fields). > > > > Unless a third party is

Re: Big problem with this mailing list and Majordomo regarding DMARC

2019-04-19 Thread Peter
On 20/04/19 4:46 PM, Scott Kitterman wrote: RFC 6376 suggests signing the sender field if present. It says nothing about adding it. For that you want RFC 5322, Section 3.6.2. (Originator Fields). Unless a third party is transmitting mails to a mailing list on your behalf, it shouldn't be th

Re: Big problem with this mailing list and Majordomo regarding DMARC

2019-04-19 Thread Scott Kitterman
On April 20, 2019 4:23:09 AM UTC, Peter wrote: >On 20/04/19 3:57 PM, Scott Kitterman wrote: >> Not at all. The unusual aspect of this case is the originator >including Sender in the mail sent to the list. Don't do that and it's >all fine. > >So we should expect people to do what we think is b

Re: Big problem with this mailing list and Majordomo regarding DMARC

2019-04-19 Thread Peter
On 20/04/19 3:57 PM, Scott Kitterman wrote: Not at all. The unusual aspect of this case is the originator including Sender in the mail sent to the list. Don't do that and it's all fine. So we should expect people to do what we think is best practice instead of what is recommended in the app

Re: Big problem with this mailing list and Majordomo regarding DMARC

2019-04-19 Thread Scott Kitterman
On April 20, 2019 3:15:18 AM UTC, Peter wrote: >On 20/04/19 2:50 PM, Richard Damon wrote: >> If you look at the background behind DKIM, one of the major impetuses >> was protecting transactional emails, and protection from attacks like >> phishing. For these sorts of emails, that stricter prote

Re: Big problem with this mailing list and Majordomo regarding DMARC

2019-04-19 Thread Peter
On 20/04/19 3:15 PM, Peter wrote: I'm not disagreeing with any of this.  It simply boils down to that when a current RFC recommends a certain practice you shouldn't be surprised that people will follow that recommendation.  What then follows is that people who use google, microsoft or other maj

Re: Big problem with this mailing list and Majordomo regarding DMARC

2019-04-19 Thread Bill Cole
On 19 Apr 2019, at 22:50, Richard Damon wrote: > Note also, these RFCs are just Standards Track, which says that they are > not yet 'full standards' but still evolving, and I believe that one of > the issues that needs to be worked out is to figure out how to improve > their interoperability for g

Re: Big problem with this mailing list and Majordomo regarding DMARC

2019-04-19 Thread Peter
On 20/04/19 2:50 PM, Richard Damon wrote: If you look at the background behind DKIM, one of the major impetuses was protecting transactional emails, and protection from attacks like phishing. For these sorts of emails, that stricter protection makes sense. These sorts of emails also aren't sent t

Re: Big problem with this mailing list and Majordomo regarding DMARC

2019-04-19 Thread Richard Damon
On 4/19/19 10:04 PM, Peter wrote: > On 19/04/19 11:16 PM, Nick wrote: >> You might want to consider reducing the list of headers in your DKIM >> signatures.  E.g. your signed-headers list includes 'sender' but the >> mailing list adds its own 'sender', which is enough to invalidate your >> signatur

Re: Big problem with this mailing list and Majordomo regarding DMARC

2019-04-19 Thread Peter
On 19/04/19 11:16 PM, Nick wrote: You might want to consider reducing the list of headers in your DKIM signatures. E.g. your signed-headers list includes 'sender' but the mailing list adds its own 'sender', which is enough to invalidate your signature. This is going to be an ongoing problem be

Re: TLS client certificates and auth external

2019-04-19 Thread Wietse Venema
Viktor Dukhovni: > > Cert revocation is not needed, as long as there is an an explicit > > mapping like: > > > >certificate identity -> permit/etc action > >certificate identity -> ersatz SASL login name > > > > By removing such a mapping, one can 'revoke' the privileges that > > were ass

Re: TLS client certificates and auth external

2019-04-19 Thread Michael Ströder
On 4/20/19 1:09 AM, Viktor Dukhovni wrote: On Apr 19, 2019, at 6:42 PM, Michael Ströder wrote: If a cert's key get compromised (e.g. laptop lost/stolen) I expect the user's cert to be revoked and a new cert to be issued for the *same* subject name. How to deal with that without revocation check

Re: Testing new server

2019-04-19 Thread Viktor Dukhovni
On Fri, Apr 19, 2019 at 03:35:03PM -0700, Daniel Miller wrote: > I've setup a new server - and it *was* working fine...but then I enabled > a few more settings... I was attempting to make hardenize.com happy > (and I'm glad I did - it exposed some stupid mistakes on my part). But now your serv

Re: TLS client certificates and auth external

2019-04-19 Thread Viktor Dukhovni
> On Apr 19, 2019, at 6:42 PM, Michael Ströder wrote: > > If a cert's key get compromised (e.g. laptop lost/stolen) I expect the user's > cert to be revoked and a new cert to be issued for the *same* subject name. > How to deal with that without revocation check? Delete the name match, and

Re: Testing new server

2019-04-19 Thread Daniel Miller
On 4/19/2019 3:35 PM, Daniel Miller wrote: If anyone wants to test - please try sending to the address "pubtest at danmarkreps.com". Well...I've gotten at least one test message (thank you Lazy G!) so I can't be *completely* broken. Which leaves me with two likely possibilities - either

Re: TLS client certificates and auth external

2019-04-19 Thread Michael Ströder
On 4/19/19 7:10 PM, Wietse Venema wrote: Michael Str?der: On 4/18/19 9:45 PM, Viktor Dukhovni wrote: On Apr 18, 2019, at 12:01 PM, Wietse Venema wrote: Eventually there will be a postfix--nonprod release that combines all the code (jay) and none of the guarantees (bleh). I am not convinc

Testing new server

2019-04-19 Thread Daniel Miller
I've setup a new server - and it *was* working fine...but then I enabled a few more settings... I was attempting to make hardenize.com happy (and I'm glad I did - it exposed some stupid mistakes on my part). I'm able to send without issue and receive from most other servers. But in particular

unknown tls certificate problem: EVP_MD_size:message digest is null

2019-04-19 Thread Chris Thomas
Hi, I am using a letsencrypt tls cert and whenever I receive email, I get the following error. Is this a problem with my certificate? Or with the configuration or something?? postfix/smtpd[526]: warning: TLS library problem: error:060A209F:digital envelope routines:EVP_MD_size:message digest is n

Re: TLS client certificates and auth external

2019-04-19 Thread Viktor Dukhovni
> On Apr 19, 2019, at 1:10 PM, Wietse Venema wrote: > >> Using a name instead of cert fingerprint also requires revocation checking. > > Cert revocation is not needed, as long as there is an an explicit > mapping like: > >certificate identity -> permit/etc action >certificate identity -

Re: TLS client certificates and auth external

2019-04-19 Thread Wietse Venema
Michael Str?der: > On 4/18/19 9:45 PM, Viktor Dukhovni wrote: > >> On Apr 18, 2019, at 12:01 PM, Wietse Venema wrote: > >> > >> Eventually there will be a postfix--nonprod release that combines > >> all the code (jay) and none of the guarantees (bleh). > >> > >> I am not convinced that stuffin

Re: TLS client certificates and auth external

2019-04-19 Thread Michael Ströder
On 4/18/19 9:45 PM, Viktor Dukhovni wrote: On Apr 18, 2019, at 12:01 PM, Wietse Venema wrote: Eventually there will be a postfix--nonprod release that combines all the code (jay) and none of the guarantees (bleh). I am not convinced that stuffing arbitrary PKI identities into a SASL identi

Re: Big problem with this mailing list and Majordomo regarding DMARC

2019-04-19 Thread Richard Damon
On 4/19/19 12:00 PM, Benny Pedersen wrote: > Scott Kitterman skrev den 2019-04-19 17:48: > >> I'd suggest reading RFC 6376, Section 5.4 (Determine the Header >> Fields to >> Sign) [1] directly.  I think it's advice holds up reasonably well. > > thanks for link, its just that mailman breaks that rfc

Re: Big problem with this mailing list and Majordomo regarding DMARC

2019-04-19 Thread TG Servers
yes it seems mailman changes reply-to, I just took the fields out of RFC6376 now... On 19/04/2019 17:47, Benny Pedersen wrote: > TG Servers skrev den 2019-04-19 16:48: >> according to RFC this would be the full list for rspamd >> >>  sign_headers = 'from:reply-to:subject:date:\ >>  to:cc:resent-to

Re: Big problem with this mailing list and Majordomo regarding DMARC

2019-04-19 Thread Benny Pedersen
Scott Kitterman skrev den 2019-04-19 17:48: I'd suggest reading RFC 6376, Section 5.4 (Determine the Header Fields to Sign) [1] directly. I think it's advice holds up reasonably well. thanks for link, its just that mailman breaks that rfc then, if changing reply-to

Re: Big problem with this mailing list and Majordomo regarding DMARC

2019-04-19 Thread Ralph Seichter
* B. Reino: > On Fri, 19 Apr 2019, Benny Pedersen wrote: > >> B. Reino skrev den 2019-04-19 15:48: >> >>> sign_headers = 'from:to:subject:date:message-id:in-reply-to:references'; >> >> man 5 opendkim.conf >> >> dont sign headers that are added or changed remotely > > I'm not sure I follow here. AF

Re: Big problem with this mailing list and Majordomo regarding DMARC

2019-04-19 Thread Scott Kitterman
On Friday, April 19, 2019 05:38:08 PM B. Reino wrote: > On Fri, 19 Apr 2019, TG Servers wrote: > > according to RFC this would be the full list for rspamd > > > > sign_headers = 'from:reply-to:subject:date:\ > > to:cc:resent-to:resent-cc:resent-from:resent-date\ > > in-reply-to:references: > be

Re: Big problem with this mailing list and Majordomo regarding DMARC

2019-04-19 Thread Benny Pedersen
TG Servers skrev den 2019-04-19 16:48: according to RFC this would be the full list for rspamd  sign_headers = 'from:reply-to:subject:date:\  to:cc:resent-to:resent-cc:resent-from:resent-date\  in-reply-to:references:'; mailman changes reply-to, no ? is it time to let rspamd solve its own pro

Re: Big problem with this mailing list and Majordomo regarding DMARC

2019-04-19 Thread B. Reino
On Fri, 19 Apr 2019, TG Servers wrote: according to RFC this would be the full list for rspamd  sign_headers = 'from:reply-to:subject:date:\  to:cc:resent-to:resent-cc:resent-from:resent-date\  in-reply-to:references:'; although they leave it open as "subjective" regarding message-id, in-reply

Re: Big problem with this mailing list and Majordomo regarding DMARC

2019-04-19 Thread TG Servers
according to RFC this would be the full list for rspamd  sign_headers = 'from:reply-to:subject:date:\  to:cc:resent-to:resent-cc:resent-from:resent-date\  in-reply-to:references:'; although they leave it open as "subjective" regarding message-id, in-reply-to and references On 19/04/2019 16:13, B

Re: Big problem with this mailing list and Majordomo regarding DMARC

2019-04-19 Thread B. Reino
On Fri, 19 Apr 2019, Benny Pedersen wrote: B. Reino skrev den 2019-04-19 15:48: sign_headers = 'from:to:subject:date:message-id:in-reply-to:references'; man 5 opendkim.conf dont sign headers that are added or changed remotely I'm not sure I follow here. AFAIK all of the headers I mentione

Re: TLS client certificates and auth external

2019-04-19 Thread Wietse Venema
lst_ho...@kwsoft.de: > > Zitat von Wietse Venema : > > > lst_ho...@kwsoft.de: > >> What is the way to go to take part of the feature development? I looks > >> like we need a slight modification of the auth external as described. > > > > Mailin glist discussions. > > > > Eventually there will be a

Re: Big problem with this mailing list and Majordomo regarding DMARC

2019-04-19 Thread Benny Pedersen
TG Servers skrev den 2019-04-19 15:56: Bernardo, yes, the problem is the defaults rspamd is using don't correspond to RFC6376, which is itself from 2011 but rather respect 4871 which is older and was obsoleted by RFC6376. Of course one is responsible himself but more sane defaults would be nice

Re: Big problem with this mailing list and Majordomo regarding DMARC

2019-04-19 Thread Benny Pedersen
B. Reino skrev den 2019-04-19 15:48: sign_headers = 'from:to:subject:date:message-id:in-reply-to:references'; man 5 opendkim.conf dont sign headers that are added or changed remotely

Re: Big problem with this mailing list and Majordomo regarding DMARC

2019-04-19 Thread TG Servers
Bernardo, yes, the problem is the defaults rspamd is using don't correspond to RFC6376, which is itself from 2011 but rather respect 4871 which is older and was obsoleted by RFC6376. Of course one is responsible himself but more sane defaults would be nice here... I will change that accordingly to

Re: Big problem with this mailing list and Majordomo regarding DMARC

2019-04-19 Thread B. Reino
On Fri, 19 Apr 2019, TG Servers wrote: Yes thanks Nick I am signing with rspamd and will have to check the signed headers there as this seems not compliant, I already checked that from the other mails, thanks for the hint to you, too I also use rspamd, and had exactly the same problem you're f

Re: Big problem with this mailing list and Majordomo regarding DMARC

2019-04-19 Thread TG Servers
Yes thanks Nick I am signing with rspamd and will have to check the signed headers there as this seems not compliant, I already checked that from the other mails, thanks for the hint to you, too On 19/04/2019 13:16, Nick wrote: > On 2019-04-19 10:43 BST, TG Servers wrote: >>    >>     prvtmail.ne

Re: Big problem with this mailing list and Majordomo regarding DMARC

2019-04-19 Thread Benny Pedersen
TG Servers skrev den 2019-04-19 13:50: The problem is the header that is appended by majordomo it seems according to this https://outofcontrol.ca/blog/patch-majordomo-to-work-with-dmarc and you still sign sender header ? no more help from me

Re: Big problem with this mailing list and Majordomo regarding DMARC

2019-04-19 Thread TG Servers
I am signing with rspamd, will have to check the options there # If true, multiple from headers are allowed (but only first is used) allow_hdrfrom_multiple = false; # Domain to use for DKIM signing: can be "header" (MIME From), "envelope" (SMTP From) or "auth" (SMTP username) use_domain = "header";

Re: Big problem with this mailing list and Majordomo regarding DMARC

2019-04-19 Thread TG Servers
The problem is the header that is appended by majordomo it seems according to this https://outofcontrol.ca/blog/patch-majordomo-to-work-with-dmarc The postfix sender IP from my mail server is 116.203.154.189 which is verified correctly against DKIM and SPF Then majordomo forwards the mails to the

Re: Big problem with this mailing list and Majordomo regarding DMARC

2019-04-19 Thread Benny Pedersen
TG Servers skrev den 2019-04-19 12:45: thanks for your reply. DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=prvtmail.net; s=def; t=1555670709; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:mime-version:mime-version: content-

Re: Big problem with this mailing list and Majordomo regarding DMARC

2019-04-19 Thread Benny Pedersen
Wietse Venema skrev den 2019-04-19 13:05: Sign your email with DKIM. The Postfix list is DKIM-safe. is there a diff on postfix sender ips ? on 2604:8d00:0:1::7 i get DKIM_ADSP_ALL on 168.100.1.3 i get DKIM_VALID_AU

Re: Big problem with this mailing list and Majordomo regarding DMARC

2019-04-19 Thread Benny Pedersen
TG Servers skrev den 2019-04-19 12:45: thanks for your reply. I get dmarc pass from everywhere normally and also from every tool. this is a majordomo problem well i dont care :=) # cat /etc/postfix/smtpd_milters_map.cidr # # postfix maillist disable all milters 168.100.1.3

Re: Big problem with this mailing list and Majordomo regarding DMARC

2019-04-19 Thread Nick
On 2019-04-19 10:43 BST, TG Servers wrote: >    >     prvtmail.net >     fail >    You might want to consider reducing the list of headers in your DKIM signatures. E.g. your signed-headers list includes 'sender' but the mailing list adds its own 'sender', which is enough to invalidate your sign

Re: Big problem with this mailing list and Majordomo regarding DMARC

2019-04-19 Thread Wietse Venema
Sign your email with DKIM. The Postfix list is DKIM-safe. Wietse

Re: Big problem with this mailing list and Majordomo regarding DMARC

2019-04-19 Thread TG Servers
thanks for your reply. I get dmarc pass from everywhere normally and also from every tool. this is a majordomo problem because with other lists that are not on majordomo there is no problem I can see. there are also articles existing regarding this "bug" I saw now. it just does not rewrite the from

Re: Big problem with this mailing list and Majordomo regarding DMARC

2019-04-19 Thread Benny Pedersen
change to dmarc policy away from reject i get dmarc pass from my own posts, but i have now dissabled milters from trusted maillists ips all the best, problem is solved if and when openarc and opendmarc test if its openarc sealed

Big problem with this mailing list and Majordomo regarding DMARC

2019-04-19 Thread TG Servers
Hi, since I first tposted yesterday to this mailing list I got 100s of rejected DMARC reports because Majordomo is not able to or configured correctly to handle DMARC records. The headers are not re-written correctly and so DKIM from my mail is expected in 100s of mails from different IPs (forward

Re: TLS client certificates and auth external

2019-04-19 Thread Emmanuel Fusté
Le 18/04/2019 à 21:45, Viktor Dukhovni a écrit : On Apr 18, 2019, at 12:01 PM, Wietse Venema wrote: Eventually there will be a postfix--nonprod release that combines all the code (jay) and none of the guarantees (bleh). I am not convinced that stuffing arbitrary PKI identities into a SASL

Re: Misconfiguration and documentation clarification help

2019-04-19 Thread ecsd
I am subscribed to the mailing list. I was using the web interface because errors in my mail system ate most of today's list traffic to me and I wanted to be sure I was up to date. It should have occurred to me that the replacements weren't the list's doing (I probably reasoned that the hiding m

Re: Misconfiguration and documentation clarification help

2019-04-19 Thread Philip Paeps
On 2019-04-19 00:28:31 (-0700), Eric Dynamic wrote: Ok, it's nabble doing it (suppressing anything that could be an email when viewing the postfix archives on their service.) People receiving the email (half dozen or so by now) have probably received the markup I intended. Sorry for my confusion.

Re: Misconfiguration and documentation clarification help

2019-04-19 Thread Eric Dynamic
Ok, it's nabble doing it (suppressing anything that could be an email when viewing the postfix archives on their service.) People receiving the email (half dozen or so by now) have probably received the markup I intended. Sorry for my confusion. -- Sent from: http://postfix.1071664.n5.nabble.com

Re: Misconfiguration and documentation clarification help

2019-04-19 Thread Eric Dynamic
God Dammit, what do I have to do to list human-parseable text in contexts where email addresses would be found? I feel like I'm dealing with an editor that writes "e" in place of any vowel I use. My diagnostics are not understandable if I can't write things out. I've never seen such a pest of a cen

Re: Misconfiguration and documentation clarification help

2019-04-19 Thread ecsd
Sorry for the repost, but "[mail hidden]" wiped out what I was trying to show from the logs. Damn, the thing is insistent. I have replaced "@" with " at " and then " xx " to no avail! I am going to replace all "<>" with "[]" and all @ with ?! in hopes to defeat the scanner. == This happens

Re: Misconfiguration and documentation clarification help

2019-04-19 Thread ecsd
Sorry for the repost, but [mail hidden] wiped out what I was trying to show from the logs. I have replaced all email addresses with "user xx domain". == This happens Apr 18 19:34:15 transbay postfix/qmgr[88661]: CC13326F54D2: from=bounce.email.vimeo.com>, size=33062, nrcpt=1 (queue active) Ap