Hu I've a strange problem with my #postfix #smtpd (I presume?) . Trying to send a mail trough it with #thunderbird , it fails with the error:

> Peer’s Certificate issuer is not recognized.

my cert is issued by Let's Encrypt and is not expired.

In postfix's logs I get this:

> smtpd[552582]: SSL_accept error from unknown[176.x.x.x]: -1
> smtpd[552582]: warning: TLS library problem: error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:../ssl/record/rec_layer_s3.c:1571:SSL

@solene 💖 I can't believe it, again. If you ever end up in #Berlin or we meet somewhere, you will get a free meal and/or drink of your choice!

https://dataswamp.org/~solene/2023-06-22-opensmtpd-block-attempts.html #BSD #smtpd

You may want to add "gsub(/\[|\]/, "", ip)" before "print ip" to handle the brackets around ipv6 addresses in maillog.

Solene'% : Ban scanners IPs from OpenSMTP logs

In this article you will find a script to parse OpenSMTP logs to ban IP which failed too many login attempts

Solene's Percent %

 I completely forgot to post about the OpenSMTPD 7.6 release! I'm so late that we also did 7.6.0p1 in the meantime, but that's only because I forgot a few files in the tarball  

https://www.opensmtpd.org/

Among a few goodies, please remember to update the external tables if you're using any. The OpenSMTPD-extras package was split into per-tables repositories, and the communication protocol was changed. Once the executables are updated, no further changes are needed!

On OpenBSD, that means a `pkg_delete opensmtpd-extra` and then install right table, for example `pkg_add opensmtpd-table-passwd` for table-passwd.

#OpenSMTPD #smtpd

OpenSMTPD

the main OpenSMTPD page

OpenSMTPD 7.4.0p0 is out! 

No new features but some bug fixes and portability improvements: https://www.mail-archive.com/misc@opensmtpd.org/msg06018.html

#opensmtpd #smtpd #mail

OpenSMTPD 7.4.0p0 Released

OpenSMTPD 7.3.0p2 is out! 

https://github.com/OpenSMTPD/OpenSMTPD/releases/tag/7.3.0p2

It fixes a bug in the bundled copy of ASN1_time_parse that can lead to STARTTLS to fail, and backports the ENGINE removal to allow building with latest LibreSSL.

#opensmtpd #smtpd #mail

Release OpenSMTPD 7.3.0p2 · OpenSMTPD/OpenSMTPD

Portable-only changes: avoid potential use of uninitialized the bundled copy of ASN1_time_parse This could lead to a failure during STARTTLS and a subsequent downgrade to plaintext. backport th...

GitHub

OpenSMTPD-portable 7.3.0 RC1 

The first RC of the 7.3 series was just tagged. It contains *years* of development on OpenBSD. This is a perfect time to help: please test and report back if it works as expected. Thank you!

https://www.mail-archive.com/misc@opensmtpd.org/msg05844.html

#opensmtpd #smtpd

OpenSMTPD 7.3.0p0 rc1 -- please test!

encountered a weird #smtpd out in the wild: it lets you HELO and then EHLO and then HELO again, implements HELP, responds to VRFY with hardcoded success, does not implement EXPN, responds to unknown commands with 500 #5.5.1 command not recognized, and its accept message is 250 ok: Message 29897905 accepted (actual number replaced with one of equal length)

haven't seen one quite like this.

Hey friends, it's #TestClinic time! Join me over at https://twitch.tv/wayneswonderarium as I review and maybe do some test writing for #aiosmtpd

#python #smtpd

wayneswonderarium - Twitch

wayneswonderarium streams live on Twitch! Check out their videos, sign up to chat, and join their community.

Twitch

@0 Almost every service has a email interface of some kind. So that would be the most common. If there is nothing on stock I would write a little #python script with #smtpd and #xmpppy. Only problem I see so far is #OMEMO integration. I haven't found something simple on that topic, yet. And anyhow typically someone has already had the same idea and I don't have to reinvent the wheel.

@Goffi