Smtp auth

From finninday
Jump to navigation Jump to search

Postfix config for smtp auth[edit]

Here is an Ubuntu-specific recipe that looks like it will do the job:

https://help.ubuntu.com/7.04/server/C/postfix.html

Currently, my mail service is working as long as I don't try to send mail from a remote machine. For instance, if I have a laptop configured to send mail outgoing mail to my server and am connecting through an untrusted network in a coffee shop or a friend's house, I am unable to connect to the server. This must be fixed.

There are several differences between my existing /etc/postfix/main.cf config and the recipe linked above:

Current Proposed
smtpd_sasl2_auth_enable = yes smtpd_sasl_auth_enable = yes
smtpd_sasl_local_domain = finninday.net smtpd_sasl_local_domain =
broken_sasl_auth_clients = yes
smtp_use_tls = yes
smtp_tls_note_starttls_offer = yes


However, my server currently generates the correct list of available services when starting a transaction:

root@weasel:/etc/default# telnet localhost 25
Trying 127.0.0.1...
Connected to localhost.localdomain.
Escape character is '^]'.
220 weasel.finninday.net ESMTP Postfix (Ubuntu)
ehlo weasel.finninday.net
250-weasel.finninday.net
250-PIPELINING
250-SIZE 10240000
250-VRFY
250-ETRN
250-STARTTLS
250-AUTH LOGIN PLAIN DIGEST-MD5 CRAM-MD5
250 8BITMIME
quit

It even offers the correct services to remote machines:

[rday@snapper ~]$ telnet finninday.net 25
Trying 24.21.185.50...
Connected to finninday.net.
Escape character is '^]'.
220 weasel.finninday.net ESMTP Postfix (Ubuntu)
ehlo weasel.finninday.net
250-weasel.finninday.net
250-PIPELINING
250-SIZE 10240000
250-VRFY
250-ETRN
250-STARTTLS
250-AUTH LOGIN PLAIN DIGEST-MD5 CRAM-MD5
250 8BITMIME
quit

UPDATE:

This is the valid output from the server now:

[rday@servo ~]$ telnet finninday.net 25
Trying 64.184.245.226...
Connected to finninday.net.
Escape character is '^]'.
220 weasel.finninday.net ESMTP Postfix (Ubuntu)
ehlo localhost
250-weasel.finninday.net
250-PIPELINING
250-SIZE 10240000
250-VRFY
250-ETRN
250-STARTTLS
250-ENHANCEDSTATUSCODES
250-8BITMIME
250 DSN

It doesn't offer AUTH until after a TLS session is created.

Use this to test auth:

[rday@servo ~]$ openssl s_client -starttls smtp -crlf -connect finninday.net:25
CONNECTED(00000003)
depth=0 C = US, ST = Oregon, L = Portland, O = finninday.net, CN = weasel.finninday.net, emailAddress = rday@finninday.net
verify error:num=18:self signed certificate
verify return:1
depth=0 C = US, ST = Oregon, L = Portland, O = finninday.net, CN = weasel.finninday.net, emailAddress = rday@finninday.net
verify return:1
---
Certificate chain
 0 s:/C=US/ST=Oregon/L=Portland/O=finninday.net/CN=weasel.finninday.net/emailAddress=rday@finninday.net
   i:/C=US/ST=Oregon/L=Portland/O=finninday.net/CN=weasel.finninday.net/emailAddress=rday@finninday.net
---
Server certificate
-----BEGIN CERTIFICATE-----
MIICjzCCAfgCCQDPyDTOpEeKtDANBgkqhkiG9w0BAQUFADCBizELMAkGA1UEBhMC
VVMxDzANBgNVBAgTBk9yZWdvbjERMA8GA1UEBxMIUG9ydGxhbmQxFjAUBgNVBAoT
DWZpbm5pbmRheS5uZXQxHTAbBgNVBAMTFHdlYXNlbC5maW5uaW5kYXkubmV0MSEw
...
gYEAYKTSLBAkhfSQ06JAoIF2EeAD6mhzQSCjjIkVTI8Cd/kwXcVqiwRhx7KHp+Nm
/6dIb7jDApOSPoMmlmEkxnOKP6QJZStt/E+FKDiTyPjzTZ11EU/Da6l4/RS62SIc
kfIffwbovjBzkbURSU0VWccASuCqjZ1Cj6LhDCoAQLtnCr0=
-----END CERTIFICATE-----
subject=/C=US/ST=Oregon/L=Portland/O=finninday.net/CN=weasel.finninday.net/emailAddress=rday@finninday.net
issuer=/C=US/ST=Oregon/L=Portland/O=finninday.net/CN=weasel.finninday.net/emailAddress=rday@finninday.net
---
Acceptable client certificate CA names
/C=US/ST=Oregon/L=Portland/O=finninday.net/CN=weasel.finninday.net/emailAddress=rday@finninday.net
Server Temp Key: ECDH, prime256v1, 256 bits
---
SSL handshake has read 1598 bytes and written 380 bytes
---
New, TLSv1/SSLv3, Cipher is ECDHE-RSA-AES128-GCM-SHA256
Server public key is 1024 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
SSL-Session:
    Protocol  : TLSv1.2
    Cipher    : ECDHE-RSA-AES128-GCM-SHA256
    Session-ID: 64AAAC886FF95DE6A594CF0F645115BC65BD5DA49FD7CB3988D6CB0ACBBBAFD7
    Session-ID-ctx: 
    Master-Key: E134CB4EFF4557FF12487...7FD0D6E0329DE578DB8AC79D9
    Key-Arg   : None
    Krb5 Principal: None
    PSK identity: None
    PSK identity hint: None
    TLS session ticket lifetime hint: 7200 (seconds)
    TLS session ticket:
    0000 - 2d 6c 01 36 d2 bf 3a b5-18 f8 0b b4 aa 8b f4 0f   -l.6..:.........
    0010 - 6e d3 3d ef cf 41 c3 94-21 c8 df e0 4a fc 23 5c   n.=..A..!...J.#\
    0020 - bf 54 95 35 38 19 73 95-05 80 b4 70 bf 4d 65 55   .T.58.s....p.MeU
    0030 - 38 94 e1 4d a7 61 c2 43-d6 a0 64 49 e7 33 b3 82   8..M.a.C..dI.3..
    0040 - 0c c9 3c 16 77 c9 8d 19-6e f9 8c b4 26 ab 5e 2c   ..<.w...n...&.^,
    0050 - da c1 d5 e7 6f 16 fd 5b-d9 26 4b ba 8a 61 35 bf   ....o..[.&K..a5.
    0060 - ff 5b 7a 05 3c 50 37 a5-62 84 da f2 00 68 aa 0f   .[z.<P7.b....h..
    0070 - e2 fb c6 0d 9a 22 f8 69-1a 28 66 71 f5 a8 82 98   .....".i.(fq....
    0080 - f9 20 1e 53 43 7a 3e 17-c0 22 a2 33 8c 9a 31 5f   . .SCz>..".3..1_
    0090 - 98 9b 98 ab 93 ac f7 d2-00 b6 5a 4c bb 61 4d 96   ..........ZL.aM.

    Start Time: 1443127762
    Timeout   : 300 (sec)
    Verify return code: 18 (self signed certificate)
---
250 DSN
ehlo localhost
250-weasel.finninday.net
250-PIPELINING
250-SIZE 10240000
250-VRFY
250-ETRN
250-AUTH PLAIN LOGIN
250-ENHANCEDSTATUSCODES
250-8BITMIME
250 DSN
AUTH PLAIN {paste the result of echo -ne "\0user\0password" | base64 }
235 2.7.0 Authentication successful
quit
221 2.0.0 Bye
closed


I found another recipe that said it was actually tested on Dapper Drake and correctly identified the sasl2 package that I stumbled over before.

https://help.ubuntu.com/community/Postfix

So I followed that recipe and made these changes to my main.cf:

root@weasel:/etc/postfix# diff main.cf.orig main.cf
40,41c40,41
< #smtpd_sasl_auth_enable = yes
< smtpd_sasl2_auth_enable = yes
---
> smtpd_sasl_auth_enable = yes
> #smtpd_sasl2_auth_enable = yes
55c55
< smtpd_sasl_local_domain = $mydomain
---
> smtpd_sasl_local_domain = 
59a60,61
> smtp_use_tls = yes
> smtp_tls_note_starttls_offer = yes

And restarted postfix.

When I try to send an email, I get this in the logs:

Apr 21 15:52:15 localhost postfix/smtpd[26421]: connect from PSMFC-fwgt.psmfc.org[205.230.28.193]
Apr 21 15:52:15 localhost postfix/smtpd[26421]: setting up TLS connection from PSMFC-fwgt.psmfc.org[205.230.28.193]
Apr 21 15:52:15 localhost postfix/smtpd[26421]: TLS connection established from PSMFC-fwgt.psmfc.org[205.230.28.193]: TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)
Apr 21 15:52:23 localhost postfix/smtpd[26421]: warning: SASL authentication failure: no secret in database
Apr 21 15:52:23 localhost postfix/smtpd[26421]: warning: PSMFC-fwgt.psmfc.org[205.230.28.193]: SASL CRAM-MD5 authentication failed
Apr 21 15:52:23 localhost postfix/smtpd[26421]: warning: SASL authentication failure: cannot connect to saslauthd server: No such file or directory
Apr 21 15:52:23 localhost postfix/smtpd[26421]: warning: SASL authentication failure: Password verification failed
Apr 21 15:52:23 localhost postfix/smtpd[26421]: warning: PSMFC-fwgt.psmfc.org[205.230.28.193]: SASL PLAIN authentication failed
Apr 21 15:52:23 localhost postfix/smtpd[26421]: warning: SASL authentication failure: cannot connect to saslauthd server: No such file or directory
Apr 21 15:52:23 localhost postfix/smtpd[26421]: warning: PSMFC-fwgt.psmfc.org[205.230.28.193]: SASL LOGIN authentication failed
Apr 21 15:52:46 localhost postfix/smtpd[26421]: disconnect from PSMFC-fwgt.psmfc.org[205.230.28.193]


Made a few other changes to /etc/default/saslauthd:

root@weasel:/etc/default# diff saslauthd.orig saslauthd
3a4,7
> PWDIR="/var/spool/postfix/var/run/saslauthd"
> PARAMS="-m ${PWDIR}"
> PIDFILE="${PWDIR}/saslauthd.pid"
> 
10,11c14,15
< #PARAMS="-m /var/spool/postfix/var/run/saslauthd -r"
< PARAMS="-m /var/run/saslauthd"
---
> 
> OPTIONS="-c -m /var/spool/postfix/var/run/saslauthd"

That got things working and I could suddenly see that my certificate is expired. But I found that attempts to send TLS to my upstream provider, comcast were failing, so I took out the smtp_enable_tls.

This is the config that I've wanted. Now I can configure our Thunderbird on the laptop to be able to send mail wherever it is on the net:

outgoing server: weasel.finninday.net
port: 25
secure connection: TLS
Use username and password.

Going further, I took out md5 from the ciphers listed in /etc/postfix/sasl/smtpd.conf and commented out

#allow_plaintext:true

Another postfix reload.

Looks good. Now the logs are pretty clean:

Apr 21 16:22:02 localhost postfix/smtpd[28590]: connect from PSMFC-fwgt.psmfc.org[205.230.28.193]
Apr 21 16:22:02 localhost postfix/smtpd[28590]: setting up TLS connection from PSMFC-fwgt.psmfc.org[205.230.28.193]
Apr 21 16:22:04 localhost postfix/smtpd[28590]: TLS connection established from PSMFC-fwgt.psmfc.org[205.230.28.193]: TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)
Apr 21 16:22:05 localhost postfix/smtpd[28590]: 18DBC1334439: client=PSMFC-fwgt.psmfc.org[205.230.28.193], sasl_method=PLAIN, sasl_username=xxxx
Apr 21 16:22:05 localhost postfix/cleanup[28597]: 18DBC1334439: message-id=<480D2198.6020507@finninday.net>
Apr 21 16:22:05 localhost postfix/qmgr[28565]: 18DBC1334439: from=<xxxx@finninday.net>, size=649, nrcpt=1 (queue active)
Apr 21 16:22:05 localhost postfix/smtpd[28590]: disconnect from PSMFC-fwgt.psmfc.org[205.230.28.193]
Apr 21 16:22:19 localhost postfix/smtpd[28607]: connect from localhost.localdomain[127.0.0.1]
Apr 21 16:22:19 localhost postfix/smtpd[28607]: 9676713348D9: client=localhost.localdomain[127.0.0.1]
Apr 21 16:22:19 localhost postfix/cleanup[28597]: 9676713348D9: message-id=<480D2198.6020507@finninday.net>
Apr 21 16:22:19 localhost postfix/qmgr[28565]: 9676713348D9: from=<xxxx@finninday.net>, size=1112, nrcpt=1 (queue active)
Apr 21 16:22:19 localhost postfix/smtpd[28607]: disconnect from localhost.localdomain[127.0.0.1]
Apr 21 16:22:19 localhost amavis[19645]: (19645-06) Passed CLEAN, [205.230.28.193] [205.230.28.193] <xxxx@finninday.net> -> <xxxx@psmfc.org>, Message-ID: <480D2198.6020507@finninday.net>, mail_id: o1siW-0+w6ed, Hits: -3.343, 14426 ms
Apr 21 16:22:19 localhost postfix/smtp[28598]: 18DBC1334439: to=<xxxx@psmfc.org>, relay=127.0.0.1[127.0.0.1], delay=15, status=sent (250 2.6.0 Ok, id=19645-06, from MTA([127.0.0.1]:10025): 250 Ok: queued as 9676713348D9)
Apr 21 16:22:19 localhost postfix/qmgr[28565]: 18DBC1334439: removed
Apr 21 16:22:20 localhost postfix/smtp[28608]: Host offered STARTTLS: [smtp.g.comcast.net]
Apr 21 16:22:20 localhost postfix/smtp[28608]: 9676713348D9: to=<xxxx@psmfc.org>, relay=smtp.g.comcast.net[76.96.30.117], delay=1, status=sent (250 2.0.0 GPNK1Z00P15fmCg8U00000 mail accepted for delivery)
Apr 21 16:22:20 localhost postfix/qmgr[28565]: 9676713348D9: removed

Troubleshooting[edit]

Can't send mail from Dad's house in San Diego[edit]

Attempts to send mail from remote locations just hang and eventually time out. There are no entries in the mail logs about failures. The connection must be not even reaching the machine. The firewall is set to allow connections to port 25, but nmap says this:

Interesting ports on c-24-21-185-50.hsd1.mn.comcast.net (24.21.185.50):
Not shown: 1706 filtered ports
PORT    STATE  SERVICE
21/tcp  open   ftp
22/tcp  open   ssh
80/tcp  open   http
143/tcp open   imap
389/tcp open   ldap
443/tcp open   https
445/tcp closed microsoft-ds
993/tcp open   imaps

So the firewall isn't really allowing port 25 through.

Ahah, the problem was that the ISP that my father-in-law uses is blocking outbound port 25 traffic. Does it actually reduce spam or just annoy people? They also block outbound traffic on all unprivileged ports. My proposed solution is to use one of the ports they don't block, like ftp, and try to redirect smtp from that port to my port 25. SSH has a way to do this:

ssh -R 21:localhost:25 rday@localhost

But that doesn't quite work since it is a privileged port, so I have to be root, but then there is some config option that is preventing root from redirecting ports. If I can't figure out the ssh config, I'll have to use some other option.

Redirecting to a non-privileged port works just fine:

ssh -R 2025:localhost:25 rday@localhost

But unfortunately, that is blocked by the ISP.

I may resort to using iptables to do the redirect using something like this:

iptables -t nat -A PREROUTING -i eth0 -p tcp --dport 21 -j REDIRECT --to-port 25

Blocked by my own ISP[edit]

For my own protection, Comcast shut off my email.

Subject: Customer Security Assurance Notice

ACTION REQUIRED: Comcast has determined that your computer(s) have been used to send 
unsolicited email ("spam"), which is generally an indicator of a virus. For your own 
protection and that of other Comcast customers, we have taken steps to prevent further
transmission of spam from your computer(s).

According to my mail server logs I've sent 100 emails in the previous 24 hours. The email says nothing of the amount of mail that triggers the spam warning, but I've heard other people say it is 1000 in a 24 hour period. All my anti-virus reports are clean. I think the problem was that I've been sending mail to smtp.comcast.net:25 for the past few years. At some point they changed policy and said that mail should go to port 587, but I didn't get the memo.

By the way, I talked to Comcast tech support before I knew what was happening and he told me that the problem was my yahoo mail account (which I don't have) or my home mail server. I asked if it might have something to do with being blacklisted for sending spam and he said no, definitely not that. He asked if I had checked the message boards to answer this problem and I said yes, everyone else with my symptoms has been blocked for sending too many emails. He said Comcast has a policy of not filtering ports. One useful thing (that is, one thing that wasn't completely false) that I got out of him was the details I needed to log into my long-unused Comcast webmail account which was how I found the email that I quoted above.

Now when I try to connect to comcast to send mail, it looks like this:

rday@weasel:~$ telnet smtp.comcast.net 25
Trying 76.96.30.117...

But if I try the same thing from work, I get this:

[rday@snapper bin]$ telnet smtp.comcast.net 25
Trying 76.96.30.117...
Connected to smtp.comcast.net.
Escape character is '^]'.
ehlo localhost
220 OMTA09.emeryville.ca.mail.comcast.net comcast ESMTP server ready
250-OMTA09.emeryville.ca.mail.comcast.net hello [69.30.63.162], pleased to meet you
250-HELP
250-AUTH LOGIN PLAIN CRAM-MD5
250-SIZE 15728640
250-ENHANCEDSTATUSCODES
250-8BITMIME
250-STARTTLS
250 OK
quit
221 2.0.0 OMTA09.emeryville.ca.mail.comcast.net comcast closing connection
Connection closed by foreign host.

So I'm on some kind of blacklist for talking to port 25. Current Comcast documentation says that you should use port 587 for sending mail. But I can't find their instructions on how to do that on their website.

I was able to verify that my home machine can connect to smtp.comcast.net:587 if I authenticate via TLS:

rday@weasel:~$ telnet smtp.comcast.net 587
Trying 76.96.62.117...
Connected to smtp.g.comcast.net.
Escape character is '^]'.
220 OMTA04.westchester.pa.mail.comcast.net comcast ESMTP server ready
ehlo localhost
250-OMTA04.westchester.pa.mail.comcast.net hello [24.21.185.50], pleased to meet you
250-HELP
250-AUTH LOGIN PLAIN CRAM-MD5
250-SIZE 15728640
250-ENHANCEDSTATUSCODES
250-8BITMIME
250-STARTTLS
250 OK
auth plain {magic-mmencoded-token}
235 2.7.0 ... authentication succeeded
quit
221 2.0.0 OMTA04.westchester.pa.mail.comcast.net comcast closing connection
Connection closed by foreign host.

To come up with the magic auth token, I used this formula:

[rday@snapper bin]$ perl -MMIME::Base64 -e \
> 'print encode_base64("\0username\0password");'

Now I need to tell postfix to connect that way for sending mail. I was able to direct postfix to use that port by these directives in main.cf (note the key word "submission" to indicate port 587):

relayhost = [smtp.comcast.net]:submission
smtp_use_tls = yes
smtp_tls_note_starttls_offer = yes
smtp_sasl_password_maps = hash:/etc/postfix/sasl_passwd
smtp_sasl_auth_enable = yes

After putting the username and password in sasl_password, I had to make it a db file like so:

postmap /etc/postfix/sasl_passwd

More details about how that works are here: http://www.postfix.org/SASL_README.html#client_sasl

In order to receive mail, I'll have to probably buy a port deflector service like they describe in this post: http://www.lockergnome.com/usrbingeek/2007/04/12/comcast-blocking-port-25/ Here is a better link to the no-ip reflector service: http://www.no-ip.com/support/guides/email/blocked_port_25.html

I spent a quick $40 on no-ip.com reflector service, repointed the MX records for my domain to no-ip.com, and started up mail service on a non-standard port. And it works! Now Comcast has to go to a lot more trouble to shut off my email. And in the mean time, it looks like it will be feasible to switch to business class DSL with a static IP address and non-filtered ports and everything. Yay. Thanks Comcast, for finally pushing me into better, cheaper service with a different provider.

After a few weeks of using the mail reflector service, I was considering using it even after I switch to a non-filtered ISP because the spam filtering they do made a drastic reduction in the spam filtering I had to do. I was bouncing around 95% of all inbound mail because it didn't follow mail specifications. Now I am bouncing between 0 and 1%. But alas, a real email was bounced by the mail reflector, so I guess I'll have to save my $40 and do my own filtering so I don't have to worry about false positives.

postfix config for relaying outbound mail to gmail[edit]

My ISP (TDS) is dropping mail relaying service for my business-class account. And, by they way, they block all outbound port 25 traffic that doesn't go to their mail relay. So I'm screwed^H^H^H^H^H^H^H motivated to come up with a different way to inject my outbound mail into the internets.

My strategy is to instruct postfix to deliver mail to gmail like this:

main.cf:
relayhost = [smtp.gmail.com]:587

But it is not quite so easy as that, since I have to authenticate to gmail. Hopefully the following steps will take care of all the fiddly details of doing the authentication properly.

My recipe is based on these documents:

First step, does my current ISP block outbound port 587?[edit]

I wouldn't put it past them, but this looks like it is not a problem.

rday@weasel:~$ nc smtp.gmail.com 587
220 mx.google.com ESMTP n9sm13393068wag.23

changes to main.cf[edit]

The following suggested lines for main.cf assume that there are multiple local mail servers and that only the upstream server (gmail.com) should be firmly encrypted. I don't have multiple local mail servers, so I'll tweak it a bit. These are the relevant differences between my current main.cf and the proposed main.cf:

smtp_generic_maps = hash:/etc/postfix/generic
smtp_sasl_security_options = noanonymous
smtp_sasl_tls_security_options = noanonymous
smtp_tls_CAfile = /etc/postfix/cacert.pem
smtp_tls_cert_file = /etc/postfix/FOO-cert.pem
smtp_tls_key_file = /etc/postfix/FOO-key.pem
smtp_tls_loglevel = 1
smtp_tls_per_site = hash:/etc/postfix/tls_per_site
smtp_tls_session_cache_database = btree:/var/run/smtp_tls_session_cache
smtpd_enforce_tls = no
smtpd_sasl_application_name = smtpd
smtpd_sasl_auth_enable = no
smtpd_sasl_local_domain = $myhostname
smtpd_tls_ask_ccert = yes
smtpd_tls_session_cache_database = btree:/var/run/smtpd_tls_session_cache
transport_maps = hash:/etc/postfix/transport

Specifically, I'll drop smtp_tls_per_site, smtp_generic_maps, and transport_maps. I'll modify smtpd_enforce_tls to yes.

changes to master.cf[edit]

I'm assuming that no changes are necessary to master.cf, but I'm not sure about this:

relay     unix  -       -       n       -       -       smtp
       -o smtp_generic_maps=

I don't have any other mail servers on my network, so I'm not going to make any changes to master.cf. I want all outbound mail to go to gmail and to have the address translation happen appropriately.

certificates[edit]

I'm assuming that I can continue to use my existing certificates, with the small addition of the Thawte credentials.

smtpd_tls_CAfile = /etc/postfix/cacert.pem
smtpd_tls_cert_file = /etc/postfix/newcert.pem
smtpd_tls_key_file = /etc/postfix/newreq.pem

I'll just add the following entries to main.cf:

smtp_tls_CAfile = /etc/postfix/cacert.pem
smtp_tls_cert_file = /etc/postfix/newcert.pem
smtp_tls_key_file = /etc/postfix/newreq.pem

update sasl_passwd[edit]

I added my gmail username and password to the sasl_password file and then did a postmap on it to create the sasl_passwd.db. I verified that the permissions on these two files allow root and postfix to read them and no one else.

troubleshooting[edit]

My first try looks like this:

Aug 18 15:39:58 weasel postfix/smtp[22555]: certificate verification failed for smtp.gmail.com[209.85.147.109]:587: untrusted issuer /C=US/O=Equifax/OU=Equifax Secure Certificate Authority
Aug 18 15:39:58 weasel postfix/smtp[22555]: warning: SASL authentication failure: No worthy mechs found
Aug 18 15:39:58 weasel postfix/smtp[22555]: 8B3E61238F96: to=<rday@psmfc.org>, relay=smtp.gmail.com[209.85.147.109]:587, delay=1, delays=0.01/0.03/1/0, dsn=4.7.0, status=deferred (SASL authentication failed; cannot authenticate to server smtp.gmail.com[209.85.147.109]: no mechanism available)

So what is wrong with my cert?

After a few tweaks to main.cf, I tried again and got this:

Aug 18 15:52:06 weasel postfix/smtp[24505]: setting up TLS connection to smtp.gmail.com[209.85.147.109]:587
Aug 18 15:52:06 weasel postfix/smtp[24505]: certificate verification failed for smtp.gmail.com[209.85.147.109]:587: untrusted issuer /C=US/O=Equifax/OU=Equifax Secure Certificate Authority
Aug 18 15:52:06 weasel postfix/smtp[24505]: Untrusted TLS connection established to smtp.gmail.com[209.85.147.109]:587: TLSv1 with cipher RC4-MD5 (128/128 bits)
Aug 18 15:52:11 weasel postfix/smtp[24505]: 69CE01238F96: to=<rday@psmfc.org>, relay=smtp.gmail.com[209.85.147.109]:587, delay=6.1, delays=0.01/0.03/1.7/4.3, dsn=2.0.0, status=sent (250 2.0.0 OK 1250635931 m30sm13533773wag.69)
Aug 18 15:52:11 weasel postfix/qmgr[23857]: 69CE01238F96: removed

The mail got sent, but I want to get rid of the "certificate verification failed" error. I think the error is indicating that my server doesn't trust the body that issued google's certification. That means I have to import some cert somewhere to get it to be trusted. But I think gmail saw no problems on their side, so I have a working config with a wart in the logs that I need to clean up.

summary of changes[edit]

rday@weasel:~$ diff prior.txt now.txt
21c21
< relayhost = [smtp.tds.net]
---
> relayhost = [smtp.gmail.com]:submission
23a24,29
> smtp_sasl_security_options = noanonymous
> smtp_sasl_tls_security_options = noanonymous
> smtp_tls_CAfile = /etc/postfix/cacert.pem
> smtp_tls_cert_file = /etc/postfix/newcert.pem
> smtp_tls_key_file = /etc/postfix/newreq.pem
> smtp_tls_loglevel = 1
24a31
> smtp_tls_session_cache_database = btree:/var/run/smtp_tls_session_cache

From address rewriting[edit]

Sending mail through TDS results in a proper header like this:

From: rday@myhost.net 

but sending via gmail results in

From: mygmailaccount@gmail.com

Bummer. Luckily my postfix configuration makes it easy to switch back and forth between relayhosts by changing a single line in main.cf.

From what I understand of the documentation provided by Google, you can only send mail through gmail servers for an account that has been registered (with server, username, and password) with the sending gmail account. There are quite a few accounts on my home mail server and I don't feel good about putting all those passwords into Google's keeping. This is where I guess I have to admit that it was too good to be true that gmail would allow me to inject my server's mail into their system.

My next option is to set up an SSH tunnel to work. After that, I think I have to go back to no-ip.com and use their mail server.

SSH tunnel to snapper[edit]

The idea is to have weasel's mail server send mail to snapper which will then forward it on to the world. But I have to jump around the firewall between the two mail servers. I can ssh between the two.

The idea is that snapper is running postfix and weasel is running postfix. Weasel's config looks like this:

relayhost = [snapper.psmfc.org]:submission

Submit email to spiritone.com[edit]

Ahh, I am back to dealing with a sane ISP. I was issued a static IP address and don't have to do anything weird to route my mail around. I only had to make these changes to get it to work:

main.cf:

relayhost = [mail.spiritone.com]:submission

sasl_passwd:

[mail.spiritone.com]:submission user:password

And then issue these commands:

postmap sasl_passwd
/etc/init.d/postfix restart


relay access denied for mobile clients to external domains[edit]

Thunderbird reports this when I try to write to a gmail account:

An error occurred while sending mail. The mail server responded:  5.7.1 <xxx@gmail.com>: Relay access denied. Please check the message recipient xxx@gmail.com and try again.

And this in postfix mail.log:

May 16 12:51:09 weasel postfix/smtpd[27347]: connect from unknown[70.98.171.2]
May 16 12:51:10 weasel postfix/smtpd[27347]: Anonymous TLS connection established from unknown[70.98.171.2]: TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)
May 16 12:51:10 weasel postfix/smtpd[27347]: NOQUEUE: reject: RCPT from unknown[70.98.171.2]: 554 5.7.1 <xxx@gmail.com>: Relay access denied; from=<xxx@finninday.net> to=<xxx@gmail.com> proto=ESMTP helo=<etli.localdomain>

This used to work for authorized mobile clients, but began to fail recently. Postfix upgrade? Postfix config mangling related to spam countermeasures?

I believe the relevant configuration is in main.cf:

smtpd_recipient_restrictions =
    reject_invalid_hostname,
    reject_non_fqdn_hostname,
    reject_non_fqdn_sender,
    reject_non_fqdn_recipient,
    reject_unknown_sender_domain,
    reject_unknown_recipient_domain,
    reject_unauth_pipelining,
    permit_mynetworks,
    permit_sasl_authenticated,
    reject_unauth_destination,
    reject_rbl_client bl.spamcop.net,
    check_policy_service inet:127.0.0.1:10023,
    check_policy_service unix:private/policy-spf

The error occurs whether I have my default outbound smtp host set to be home or work.

My relay_domains is not explicitly set, so it takes the value of mydestination as a default:

mydestination = weasel.finninday.net, localhost.localdomain, localhost, $mydomain

So I added a relay_domains:

relay_domains = gmail.com

And that let the mail through:

May 16 13:22:05 weasel postfix/smtp[30758]: 340B3123814F: to=<xxx@gmail.com>, relay=mail.spiritone.com[216.99.193.7]:587, delay=7.5, delays=1.6/0.03/2.7/3.2, dsn=2.0.0, status=sent (250 2.0.0 Ok: queued as D2A4E7340CBF)
May 16 13:22:05 weasel postfix/qmgr[30634]: 340B3123814F: removed

But that bandaid fix is lame because I don't want to keep a list of every domain that I want to send mail to.

new version of postfix breaks relaying from mobile clients?[edit]

I'm currently running version 2.10. I should probably check to see what version was current with the last version of Ubuntu, but for now I'll assume that the version is relevant.

Version 2.10 is interesting because the relay config changed with that version as described here:

If I choose to allow relaying for authenticated users, I need to also come up to speed on this:

The TLS documentation looks particularly interesting with regard to client certs as a way to allow relaying. Implementing this means keeping a list of client certs on the server so it can see who is allowed to relay through my server. So I have to learn how to collect client certs. And if my mail clients can be configured to offer a cert.

This is from viewing the source on a message:

Received: from etli.localdomain (mail.nwea.org [70.98.171.2])
	(using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits))
	(Client did not present a certificate)
	by xxx.finninday.net (Postfix) with ESMTPSA id 06D411238156
	for <xxx@finninday.net>; Fri, 31 May 2013 10:08:54 -0700 (PDT)

That "client did not present a cert" is troubling.

So the facts I have are:

  • mobile clients can authenticate well enough to send mail to local domains
  • local clients can send mail to any external domain
  • mobile clients cannot send mail to an external domain but should because they are TLS authenticated

Here is a a successful transaction for sending from a mobile client to a local domain:

Jul 19 13:56:29 weasel postfix/smtpd[15027]: connect from c-71-234-96-227.hsd1.ma.comcast.net[71.234.96.227]
Jul 19 13:56:30 weasel postfix/smtpd[15027]: Anonymous TLS connection established from c-71-234-96-227.hsd1.ma.comcast.net[71.234.96.227]: TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)
Jul 19 13:56:31 weasel policyd-spf[15030]: None; identity=helo; client-ip=71.234.96.227; helo=localhost.localdomain; envelope-from=xxxx@finninday.net; receiver=xxxx@finninday.net 
Jul 19 13:56:31 weasel policyd-spf[15030]: None; identity=mailfrom; client-ip=71.234.96.227; helo=localhost.localdomain; envelope-from=xxxx@finninday.net; receiver=xxxx@finninday.net 
Jul 19 13:56:31 weasel postfix/smtpd[15027]: DAD401238168: client=c-71-234-96-227.hsd1.ma.comcast.net[71.234.96.227], sasl_method=PLAIN, sasl_username=xxxx
Jul 19 13:56:32 weasel postfix/cleanup[15031]: DAD401238168: message-id=<51E9A7FC.2030708@finninday.net>
Jul 19 13:56:32 weasel postfix/qmgr[22259]: DAD401238168: from=<xxxx@finninday.net>, size=887, nrcpt=1 (queue active)
Jul 19 13:56:32 weasel postfix/local[15032]: DAD401238168: to=<xxxx@finninday.net>, relay=local, delay=1.6, delays=1.6/0.01/0/0.04, dsn=2.0.0, status=sent (delivered to maildir)
Jul 19 13:56:32 weasel postfix/qmgr[22259]: DAD401238168: removed
Jul 19 13:56:32 weasel postfix/smtpd[15027]: disconnect from c-71-234-96-227.hsd1.ma.comcast.net[71.234.96.227]

And here is a failed attempt to send to an external domain from a mobile client:

Jul 19 14:08:33 weasel postfix/smtpd[15774]: connect from c-71-234-96-227.hsd1.ma.comcast.net[71.234.96.227]
Jul 19 14:08:33 weasel postfix/smtpd[15774]: Anonymous TLS connection established from c-71-234-96-227.hsd1.ma.comcast.net[71.234.96.227]: TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)
Jul 19 14:08:34 weasel postfix/smtpd[15774]: NOQUEUE: reject: RCPT from c-71-234-96-227.hsd1.ma.comcast.net[71.234.96.227]: 554 5.7.1 <xxxx@nwea.org>: Relay access denied; from=<xxxx@finninday.net> to=<xxxx@nwea.org> proto=ESMTP helo=<localhost.localdomain>

The logs tell me:

  • I should really set my laptop hostname to something other than localhost.localdomain
  • both a good and a bad transaction have successful anonymous TLS connections established
  • only a good transaction has a successful sasl authentication

Why isn't my mobile to external domain transaction using sasl authentication?

Time to go back to reading the SASL documentation. http://www.postfix.org/SASL_README.html

sasl broken?[edit]

I need to keep making new sections or else editing gets too unwieldy.

So I tried a simple debug session with my sasl config and it looks good:

root@weasel:~# testsaslauthd -u xxxx -p xxxx -f /var/spool/postfix/var/run/saslauthd/mux
0: OK "Success."

Careful reading of the documentation led me to make these changes:

root@weasel:/etc/postfix# diff -u main.cf main.cf.new
--- main.cf	2013-07-19 13:08:46.000000000 -0700
+++ main.cf.new	2013-07-19 16:27:24.000000000 -0700
@@ -36,7 +36,7 @@
 #enable_sasl_authentication = yes
 
 smtpd_use_tls = yes
-smtpd_tls_auth_only = no
+smtpd_tls_auth_only = yes
 smtpd_tls_cert_file = /etc/postfix/newcert.pem
 smtpd_tls_key_file = /etc/postfix/newreq.pem
 smtpd_tls_CAfile = /etc/postfix/cacert.pem
@@ -75,7 +75,8 @@
 #	check_policy_service inet:127.0.0.1:10023, 
 	check_policy_service unix:private/policy-spf
 
-smtpd_sasl_security_options = noanonymous
+smtpd_sasl_security_options = noanonymous, noplaintext
+smtpd_sasl_tls_security_options = noanonymous
 smtpd_sasl_local_domain = 
 
 content_filter = smtp-amavis:[localhost]:10024

Based on this snippet from the docs:

 A more sophisticated policy allows plaintext mechanisms, but only over a TLS-encrypted connection:

    /etc/postfix/main.cf:
        smtpd_sasl_security_options = noanonymous, noplaintext
        smtpd_sasl_tls_security_options = noanonymous

To offer SASL authentication only after a TLS-encrypted session has been established specify this:

    /etc/postfix/main.cf:
        smtpd_tls_auth_only = yes

Those changes didn't fix my relay problem, but they didn't break anything either, so they can stay.

test ssl connection[edit]

If I were running full SSL instead of STARTTLS, I could use this:

openssl s_client -connect weasel:993

found the relay problem[edit]

This documentation confused me:

 With permit_sasl_authenticated the Postfix SMTP server can allow SASL-authenticated SMTP clients to send mail to remote destinations. Examples:

    # With Postfix 2.10 and later, the mail relay policy is
    # preferably specified under smtpd_relay_restrictions.
    /etc/postfix/main.cf:
        smtpd_relay_restrictions =
    	permit_mynetworks
    	permit_sasl_authenticated
    	reject_unauth_destination

    # Older configurations combine relay control and spam control under
    # smtpd_recipient_restrictions. To use this example with Postfix ≥
    # 2.10 specify "smtpd_relay_restrictions=".
    /etc/postfix/main.cf:
        smtpd_recipient_restrictions =
    	permit_mynetworks
    	permit_sasl_authenticated
    	reject_unauth_destination
    	...other rules...

I took that to mean that I need to specify permit_sasl_authenticated in the new smtpd_relay_restrictions property instead of the old smtpd_recipient_restrictions property as it used to be. But that is exactly the change that lead to my broken mobile client relays. My understanding was that in 2.10 (my version), I should separate spam control and relay control, but the fix for my broken relays was to put permit_sasl_authenticated into the spam control and the relay control. I suppose that the relay control is being ignored. But the spam and relay properties are doing the job, so I'll wait until my config options are deprecated (and the documentation is clearer) before I make any changes.