[pfx] Re: new waves of connect/disconnect from *.outlook.com; any add'l pfx configs useful for further remediation?

2023-08-16 Thread pgnd via Postfix-users
There is currently a similar thread on "mailop" mailing list about connections from MS to *submission* ports, that connect, do valid AUTH (using proper credentials!) and then hang up. People in that thread suspect that this behavior might be associated with connections from Outlook mobile app bei

[pfx] Re: new waves of connect/disconnect from *.outlook.com; any add'l pfx configs useful for further remediation?

2023-08-16 Thread pgnd via Postfix-users
BTW I explicitly allow mail from their IP ranges at postscreen level: ... #outlook.com 40.92.0.0/15permit 40.107.0.0/16 permit 52.100.0.0/14 permit 104.47.0.0/17 permit they published some more ranges but when I checked, I haven't noticed mail from oth

[pfx] Re: new waves of connect/disconnect from *.outlook.com; any add'l pfx configs useful for further remediation?

2023-08-15 Thread pgnd via Postfix-users
OK mail from outlook does make it's way thru; e.g., since Monday, xzegrep "250 2.0.0 Queued as.*outbound.protection.outlook.com" /var/log/postfix/postfix.log | wc -l 4343 Isn't that outbound mail*to* Microsoft-hosted domains? I wouldn't expect that to appear in logs of incoming ma

[pfx] Re: new waves of connect/disconnect from *.outlook.com; any add'l pfx configs useful for further remediation?

2023-08-15 Thread pgnd via Postfix-users
There is no protection you can add to prevent this fair enuf other than firewalling them completely. the wishful-thinking of fw'ing MS's entire ASN has crossed my mind more than once ;-) Why do they do this? Only they know. if they do, they certainly don't respond to @support/etc inqui

[pfx] new waves of connect/disconnect from *.outlook.com; any add'l pfx configs useful for further remediation?

2023-08-15 Thread pgnd via Postfix-users
my "BFFs" @ M$'s *.outlook.com have decided over the last month or so to send many 10K's of these 2023-08-14T13:11:53.782611-04:00 svr01 postfix/postscreen[27910]: CONNECT from [52.101.56.17]:32607 to [209.123.234.54]:25 2023-08-14T13:11:59.860098-04:00 svr01 postfix/postscreen[

[pfx] Re: identifying sender failing ssl/tls cipher (ECDSA server certificate???)

2023-08-12 Thread pgnd via Postfix-users
Consider (after carefully reading over the docs explaining the required ordering of the content) switching to consolidated preferred syntax: smtpd_tls_chain_files = >> This feature is available in Postfix 3.4 and later. that one snuck by me :-/ convenient, tho, thx! No tool. J

[pfx] Re: identifying sender failing ssl/tls cipher (ECDSA server certificate???)

2023-08-12 Thread pgnd via Postfix-users
That'd then be the file to analyse: # tshark -nr /tmp/tls.pcap -V ssl thx for the ez tutorial after the key file cleanup, ... Untrusted TLS connection established from esa.hc2802-61.iphmx.com[68.232.155.227]: TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 ... This explain

[pfx] Re: identifying sender failing ssl/tls cipher (ECDSA server certificate???)

2023-08-12 Thread pgnd via Postfix-users
one'd hope that banks and hospitals might be a bit more up-to-date on their end. after the key file cleanup, ... Untrusted TLS connection established from esa.hc2802-61.iphmx.com[68.232.155.227]: TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 ... seems, in fact, EC-ready

[pfx] Re: identifying sender failing ssl/tls cipher (ECDSA server certificate???)

2023-08-12 Thread pgnd via Postfix-users
As background, the RELEASE_NOTES for 3.8 mention:...>> postfix/psint/smtpd[27820]: esa.hc2802-61.iphmx.com[139.138.32.157]: TLS cipher list "aNULL:-aNULL:HIGH:MEDIUM:!SEED:!IDEA:!3DES:!RC2:!RC4:!RC5:!kDH:!kECDH:!aDSS:!MD5:+RC4:@STRENGTH:!aNULL" yep Which is most of the above, but you

[pfx] Re: identifying sender failing ssl/tls cipher ?

2023-08-12 Thread pgnd via Postfix-users
why? not my own server/config Can you explain how each of these is better than the Postfix defaults? all but two _are_ at defaults postconf -n | grep -i tls | grep -i cipher | sort @D smtpd_tls_ciphers = medium @D smtpd_tls_exclude_ciphers = @D

[pfx] identifying sender failing ssl/tls cipher ?

2023-08-12 Thread pgnd via Postfix-users
 in postconf mail_version mail_version = 3.8.1 i just caught the following TLS error in postfix logs, 2023-08-12T09:33:07.064713-04:00 cmx0024 postfix/postscreen[27816]: cache lmdb:/var/lib/postfix/postscreen_cache full cleanup: retained=0 dropped=0 entries

Re: postscreen dnsbl weighting with new(est) spamhaus return codes -- experiences/data?

2015-08-07 Thread PGNd
On Thu, Aug 6, 2015, at 10:22 AM, Chris Adams wrote: > Those are dbl response codes, not zen. You are mixing the two up And you'd be correct! pebkac. thanks.

postscreen dnsbl weighting with new(est) spamhaus return codes -- experiences/data?

2015-08-06 Thread PGNd
Some time ago, I'd cribbed the following postscreen dnsbl weights from an experienced users' post ... iirc, it was on this list ... postscreen_dnsbl_threshold = 5 postscreen_dnsbl_sites = b.barracudacentral.org=127.0.0.2*7 zen.spamhaus.org=127.0.0.[10;1

Re: tracing a bad-actor's rejected submission+extensions; seeing 2 IPs and don't see why?

2015-07-06 Thread PGNd
On Mon, Jul 6, 2015, at 08:18 PM, Noel Jones wrote: > I'm done providing free consulting for your system. Best wishes. Back to this again, are we? Petuiant drama's really quite unnecessary. Not a single solitary soul has twisted your arm to participate. Best wishes.

tracing a bad-actor's rejected submission+extensions; seeing 2 IPs and don't see why?

2015-07-06 Thread PGNd
I'm walking through a week's worth of "leaks" through my filters etc., closing the holes. Most have been clear enough to trace & remediate. This one has me a bit stymied. I'm not sure I have enough info to make out what's in fact going on. I'm seeing 2 different IPs in play, and can't unwind

Re: appropriate notificaton back to Postfix by contennt-filters that DISCARD?

2015-06-29 Thread PGNd
On Mon, Jun 29, 2015, at 09:32 PM, Noel Jones wrote: > When mail is discarded, no one is notified. From the end-user's > point of view -- both the sender and receiver -- the mail is > silently lost, and mail is unreliable. Although I find users tend to squeak if the server isn't trashing "known

Re: appropriate notificaton back to Postfix by contennt-filters that DISCARD?

2015-06-29 Thread PGNd
On Mon, Jun 29, 2015, at 08:55 PM, Peter wrote: > > I continue to waffle re: the advantages/disadvantages of moving clamav &/or > > SA postqueue. I've found bits-and-pieces of both pro & con arguments, but > > nothing yet that's tilted strongly one way or the other. > > What I do ... and reco

Re: appropriate notificaton back to Postfix by contennt-filters that DISCARD?

2015-06-29 Thread PGNd
On Mon, Jun 29, 2015, at 08:23 PM, Noel Jones wrote: > > That DISCARD action is logged in the amavisd logs, but occurs silently from > > Postfix's perspective -- it's not notified, and does not log the message > > disposition in its log. > > > This is correct. From postfix's perspective, the mes

appropriate notificaton back to Postfix by contennt-filters that DISCARD?

2015-06-29 Thread PGNd
I've amavisd+spamassassin setup as a post-queue content-filter. If a message PASSes postscreen+smtpd_mumble_restrictions, it's handed off to amavisd+SA for content analysis. Currently, amavisd is configured to 'D_DISCARD' mail that scores above a specified level. It works as intended. That DI

Re: added milter (opendmarc). not processing, postfix logs show "abort all milters"?

2015-06-27 Thread PGNd
On Sat, Jun 27, 2015, at 12:37 PM, Viktor Dukhovni wrote: > On Sat, Jun 27, 2015 at 12:34:06PM -0700, PGNd wrote: > > > > turn off the postmaster notices. > > > > To what specifically are you referring? My testmail was TO my postmaster > > address, so we see

Re: added milter (opendmarc). not processing, postfix logs show "abort all milters"?

2015-06-27 Thread PGNd
On Sat, Jun 27, 2015, at 10:21 AM, Viktor Dukhovni wrote: > The Postfix logs will contain more specific details. Always look > there, Certainly. Poking at it now. > turn off the postmaster notices. To what specifically are you referring? My testmail was TO my postmaster address, so we see

Re: added milter (opendmarc). not processing, postfix logs show "abort all milters"?

2015-06-27 Thread PGNd
On Sat, Jun 27, 2015, at 08:18 AM, Steve Jenkins wrote: > And now that OpenDMARC can use libspf2, I don't use a separate SPF checker > in my Postfix setup. Just running OpenDKIM and OpenDMARC milters. Good point. Unfortunately, after rebuilding opendmarc with spf enabled, using libspf2, on exe

Re: added milter (opendmarc). not processing, postfix logs show "abort all milters"?

2015-06-27 Thread PGNd
On Sat, Jun 27, 2015, at 01:35 AM, A. Schulze wrote: > just answerd on opendmarc-users but for reference here too: > opendmarc defaults to ignore connections from localhost. That was it. Obvious, now ... On received messages, ... DMARC-Filter: OpenDMARC Filter v1.3.1 mailhost..com 73D121

Re: added milter (opendmarc). not processing, postfix logs show "abort all milters"?

2015-06-26 Thread PGNd
On Fri, Jun 26, 2015, at 07:02 PM, Benny Pedersen wrote: > i forgot to tell remove non_smtpd_milters, since it is not used in smtpd > listners Thanks for the cleanup. Although, no add'l effect on the issue. > > milter8_abort: skip milter inet:[127.0.0.1]:8893 > > disconnect event to all milte

Re: added milter (opendmarc). not processing, postfix logs show "abort all milters"?

2015-06-26 Thread PGNd
On Fri, Jun 26, 2015, at 06:12 PM, Benny Pedersen wrote: > change smtpd_milters= to be inet:[127.0.0.1]:8893 so it does not use > ipv6 there, this should all needed Did that. Unfortunately, there's no change in behavior or logs, other than the reference, now, to 127.0.0.1 specifically, ... m

added milter (opendmarc). not processing, postfix logs show "abort all milters"?

2015-06-26 Thread PGNd
I've added an opendmarc milter to a service [127.0.0.1]:10031 inet n-n-- smtpd -o syslog_name=postfix/postQ-rcv >-o milter_protocol=6 >-o smtpd_milters=inet:localhost:8893 >-o non_smtpd_milters=inet:localhost:8893

Re: referencing main.cf data inside a lookup table?

2015-06-23 Thread PGNd
On Tue, Jun 23, 2015, at 08:07 AM, Noel Jones wrote: > You have it backwards. > > relay_domains = lmdb:/etc/postfix/relay_transports > transport_maps = >lmdb:/etc/postfix/relay_transports >lmdb:/etc/postfix/external_transports > > Note the use of two transport_maps entries; one for the

referencing main.cf data inside a lookup table?

2015-06-23 Thread PGNd
In config, I've defined allowed relay_domains /main.cf ... relay_domains = 1.com 2.com ... n.com and also use transport_maps=lmdb:/u

Re: restrict execution of remote address verification probes for canonical, local-only domain?

2015-06-21 Thread PGNd
On Sun, Jun 21, 2015, at 08:19 PM, Noel Jones wrote: > For local addresses, use an alias maps entry to pipe the mail to a > program during local delivery. > > main.cf > alias_maps = hash:/path/aliases > > # aliases > spam: | /path/spam > ham: | /path/ham It's made no difference here; still

Re: restrict execution of remote address verification probes for canonical, local-only domain?

2015-06-21 Thread PGNd
On Sun, Jun 21, 2015, at 03:15 PM, PGNd wrote: > The link references will surely provide the solution; just not obvious quite > yet. Attempting to design a config for mail sent from backend valid user (us...@1.com) to 'spam@' address on frontend, specifically to "sp

Re: restrict execution of remote address verification probes for canonical, local-only domain?

2015-06-21 Thread PGNd
On Sat, Jun 20, 2015, at 04:15 PM, Noel Jones wrote: > > should do the trick. (?) > Yes, that should work as expected. > > Still ok here? > That's fine. This doesn't have any direct effect on rejecting unknown users. Appreciate the confirmations. > > Suggest that I need the spam.1234@ and ha

Re: restrict execution of remote address verification probes for canonical, local-only domain?

2015-06-19 Thread PGNd
On Fri, Jun 19, 2015, at 06:44 PM, Noel Jones wrote: > You can control it with a check_recipient_access map in place of > your blanket reject_unverified_recipient. Ah. My goal is: -- for {spam,ham}.1...@mail..com accept & pipe to FILTER 'sa-spam'/'sa-ham', respectively --

restrict execution of remote address verification probes for canonical, local-only domain?

2015-06-19 Thread PGNd
I've a postfix frontend instance that -- relays only for specific domains -- uses remote address verification to a postfix backend. Frontend config includes /main.cf myhostname= mailhost..com mydomain = mail..com

Re: mail address-rewritten & redirected to a pipe service faiis to hit the pipe?

2015-06-19 Thread PGNd
> On Fri, Jun 19, 2015, at 07:56 AM, Viktor Dukhovni wrote: Thanks for digging into this. > As soon as I saw this, I said to myself "it'll loop". Not > surprisingly, it does. I'll trust the stmt, and need to stare at the flow more closely to be able to come to the same immediate conclusion.

mail address-rewritten & redirected to a pipe service faiis to hit the pipe?

2015-06-18 Thread PGNd
I've setup a Postfix store & forward frontend gateway that forwards all mail for valid domains (DDD1.com -> DDDN.com) to a Postfix backend. -- The frontend serves as an outbound smarthost for all backend domains. -- Transport, and recipient verification, TO the backend, and all smarthost sends F

Re: WIth postscreen working so well, still using fail2ban?

2015-06-18 Thread PGNd
On Thu, Jun 18, 2015, at 09:00 AM, Bill Cole wrote: > It varies from site to site, but if you have the wrong sort of target > domains you can see things like ... ... > A tool like fail2ban may not be able to act fast enough to cut off > the first attack from bots acting like Cutwail, but if con

Securely opening store-and-forward only gateway to system- & MUA- submission?

2015-06-18 Thread PGNd
I've a 2-postfix setup. The frontend is open to 'net only on port 25 receives email for my domains from 'net applies restrictions forwards to backend if PASS serves as outbound SMARTHOST to backend; accepts no direct submission generates log entries

Re: WIth postscreen working so well, still using fail2ban?

2015-06-17 Thread PGNd
> postscreen is one layer in a multi-layer defense. It does not have > to stop all unwanted email. That is what the other layers are for. Certainly. That does not warrant blindly stacking layers upon one another simply because one can. There are certainly layers that postscreen clearly renders

WIth postscreen working so well, still using fail2ban?

2015-06-17 Thread PGNd
The introduction of Postfix's postscreen into edge mail-defense, particularly with a well thought out set of DNSBLs has fairly dramatically cut down on my spam rates. Additional pre- & post-queue filtering downstream of postscreen is down to a easily manageable trickle. Prior to postscreen, fa

Re: store & forward behavior in case of remote address verification & temporary connection failure?

2015-06-13 Thread PGNd
On Sat, Jun 13, 2015, at 08:41 PM, Noel Jones wrote: > Your reading is essentially correct. Postfix does not support "if > this lookup fails, look there instead". I had hoped that some variant of the available sequential lookups through multiple sources might do the trick; seems not. Then I'll

Re: control execution order of prequeue proxy filters and policy milters?

2015-06-13 Thread PGNd
On Sat, Jun 13, 2015, at 05:09 PM, Wietse Venema wrote: > Postfix implements multiple layers of defense to block mail: the > order of these is postscreen, smtpd_mumble_restrictions, milter > SMTP command inspection, smtpd_proxy_filter, header/body_checks, > milter header/body inspection, content_

Re: control execution order of prequeue proxy filters and policy milters?

2015-06-13 Thread PGNd
On Sat, Jun 13, 2015, at 03:45 PM, Wietse Venema wrote: > > Can I similarly control the relative order of execution of the spf > > policy milters and the prequeue amavis proxy filter? > > Postfix documentation does not promise that this is possible, therefore it is > not supported. There's a fau

Re: store & forward behavior in case of remote address verification & temporary connection failure?

2015-06-13 Thread PGNd
With config relay_recipient_maps = address_verify_map = ${dbtype}:${datadir}/verify_cache address_verify_transport_maps = static:relay-remote:[internal..com]:25 relay_transport = relay-remote:[internal..com]:10587 remote recipient verification, and subsequ

control execution order of prequeue proxy filters and policy milters?

2015-06-13 Thread PGNd
I'm moving some msg filtering prequeue /master.cf smtp inet n - n - 1 postscreen ps-handoff pass - - n - - smtpd -o syslog_name=postfix/in-from-ext -o smtpd_proxy_filter=127.0.0.1:10001

Re: store & forward behavior in case of remote address verification & temporary connection failure?

2015-06-13 Thread PGNd
On 06/13/2015 06:06 AM, Viktor Dukhovni wrote: > If the expected maximum downtime for the backend system is well > below the positive cache time on the frontend, you can ignore the > possibility of backend downtime. Once the cache is primed with > all the addresses that routinely receive email, the

Re: store & forward behavior in case of remote address verification & temporary connection failure?

2015-06-12 Thread PGNd
On Fri, Jun 12, 2015, at 09:33 PM, Noel Jones wrote: > I don't intend to insult you, and apologize if you interpreted it > that way. If you have a question, please ask it. Thanks. Moving on. Goal I don't want to lose mail if the back-end server connection is offline for an extended pe

Re: store & forward behavior in case of remote address verification & temporary connection failure?

2015-06-12 Thread PGNd
On Fri, Jun 12, 2015, at 05:57 PM, Noel Jones wrote: > I think a careful reading of > http://www.postfix.org/ADDRESS_VERIFICATION_README.html > will answer all your questions. Actually, no. It was a careful reading of that document, including each of the references that you've made -- as pointed

store & forward behavior in case of remote address verification & temporary connection failure?

2015-06-12 Thread PGNd
The general gist of my lengthy question is -- I have 2 physically separated Postfix instances, the 1st uses remote address verification queries agains the 2nd. What happens when the connection between them goes down? Currently, the remote postfix instance provides postscreen -- smtpd_*_

Re: smarthost forwarding, restricted by TLS-no-SASL, rejecting outbound recipient.

2015-06-10 Thread PGNd
On Wed, Jun 10, 2015, at 08:15 PM, Viktor Dukhovni wrote: > You should not need that. You can safely replace "smtpd_tls_req_ccert" > with "smtpd_tls_ask_ccert". Clients that don't present a certificate > will be denied access anyway. > Also IIRC your logging reported > "Trusted" client connect

Re: smarthost forwarding, restricted by TLS-no-SASL, rejecting outbound recipient.

2015-06-10 Thread PGNd
On Wed, Jun 10, 2015, at 06:53 PM, Viktor Dukhovni wrote: > > -o permit_tls_clientcerts=yes > > No such parameter. Yes, caught that. It's correctly in -o smtpd_relay_restrictions=permit_tls_clientcerts,reject Not clear how I ended up with that. Gone now. > > -o relay_clientce

Re: smarthost forwarding, restricted by TLS-no-SASL, rejecting outbound recipient.

2015-06-10 Thread PGNd
On Wed, Jun 10, 2015, at 03:19 PM, A. Schulze wrote: > > openssl x509 -pubkey -noout -in /etc/ssh/mail/commercial.crt | > > openssl pkey -pubin -outform DER | openssl dgst -sha1 -c > > take the output of "openssl x509 -sha1 -fingerprint -noout -in cert.pem" To what end? That will extract the

smarthost forwarding, restricted by TLS-no-SASL, rejecting outbound recipient.

2015-06-10 Thread PGNd
I'm next configuring a service to provide outbound smarthosting to a local server. As with several of my other services, the goal is to use TLS cert check/auth only, no SASL. Sending a test message via the local server, log at the smarthost shows message reject "Recipient address rejected: Acce

Re: Trust in TLS cert auth'd connections. One end, or both?

2015-06-09 Thread PGNd
> Yes, the key question is what's in the server certificate. You'll > want "match=". And if you're using the > policy table, you don't also need "smtp_tls_security_level=secure", > the policy table preempts that. Back to CLIENT/master.cf -o smtp_tls_CAfile=/etc/ssl/mai

Re: Trust in TLS cert auth'd connections. One end, or both?

2015-06-09 Thread PGNd
On Tue, Jun 9, 2015, at 07:57 PM, Viktor Dukhovni wrote: > This requires some operational discipline, but avoids trusting third parties. If I also control the CA, which in this case I do, I gather that point is moot. Still, the FP method seems cleaner in this case.

Re: Trust in TLS cert auth'd connections. One end, or both?

2015-06-09 Thread PGNd
> But you're still not authenticating the server. For that you'll need: > smtp_tls_security_level=secure so that the client verifies the server > hostname also and > refuses to proceed when authentication fails. A simpler alternative for my case may be -o smtp_tls_CAfile=/etc

Re: Trust in TLS cert auth'd connections. One end, or both?

2015-06-09 Thread PGNd
On Tue, Jun 9, 2015, at 06:25 PM, Viktor Dukhovni wrote: > This sets the client's certificate chain file, not its list of trusted CAs. Misunderstood, now clear. > But you're still not authenticating the server. For that you'll need: > smtp_tls_security_level=secure so that the client verifies t

Re: Trust in TLS cert auth'd connections. One end, or both?

2015-06-09 Thread PGNd
> On Tue, Jun 9, 2015, at 05:08 PM, Viktor Dukhovni wrote: Zeroing in on > This means that the server's certificate is not issued by a CA trusted by the > client In configs CLIENT/master.cf ... relay-remoteunix--n--smtp

Trust in TLS cert auth'd connections. One end, or both?

2015-06-09 Thread PGNd
I'm forwarding specific mail from a remote Postfix instance to a local one. I'm switching from SASL auth to high-encryption tls cert auth'd connection. It works to the extent that (1) connections without the TLS cert in place are rejected (2) a Trusted TLS connection is establish