Koozali.org: home of the SME Server

Upgrading qpsmtpd from 0.84 to 0.93?

Offline holck

  • *
  • 322
  • +1/-0
Upgrading qpsmtpd from 0.84 to 0.93?
« on: December 25, 2013, 08:10:39 PM »
It seems a lot has been happening with qpsmtpd since version 0.84, the one used in SME 8.0. The newest version, 0.93 (https://github.com/smtpd/qpsmtpd/releases/tag/v0.93) was released quite recently. Is anyone considering an upgrade? What are the pros and cons?

Glædelig jul :-)

Jesper,
Denmark
......

Offline idp_qbn

  • *****
  • 347
  • +0/-0
Re: Upgrading qpsmtpd from 0.84 to 0.93?
« Reply #1 on: December 27, 2013, 09:22:18 PM »
SME 8.0 is based on CENTOS 5.8.
If qpsmtd v0.93 is not in CENTOS 5.8, it won't be in SME 8.0

Cheers :-)
Ian
___________________
Sydney, NSW, Australia

Offline janet

  • *****
  • 4,812
  • +0/-0
Re: Upgrading qpsmtpd from 0.84 to 0.93?
« Reply #2 on: December 27, 2013, 11:43:17 PM »
holck

SME 9beta2 only has
qpsmtpd-0.84-7.el6.sme.noarch.rpm
&
smeserver-qpsmtpd-2.4.0-4.el6.sme.noarch.rpm
as it relies on upstream sources of CentOS6.x.

If you want a newer version it will really be something that is/has to be packaged by SME developers & regularly updated & released with each qpsmtpd update, so the best place to request this is in bugzilla, or you could start a conversation on devinfo mailing lists discussing the pros & cons. There is probably a lot of integration required, so you would have to show good reasons why the latest & greatest should be used.

IMO it is highly unlikely to be included in SME8, & as SME9 is being developed based on SME8 specifications, then it would only be something that may go into a SME9.1 release, so lodge a NFR for SME9.1 in bugzilla.

SME9beta3 (not released but being tested) has
qpsmtpd-0.84-8.el6.sme.noarch.rpm
&
smeserver-qpsmtpd-2.4.0-4.el6.sme.noarch.rpm

Why do you think the 0.93 version of qpsmtpd should be included in SME server ?
Please search before asking, an answer may already exist.
The Search & other links to useful information are at top of Forum.

Offline holck

  • *
  • 322
  • +1/-0
Re: Upgrading qpsmtpd from 0.84 to 0.93?
« Reply #3 on: December 29, 2013, 09:34:10 AM »
Thank you for your replies. I can see the problems and extra work that will result from not just inheriting qpsmtpd from CentOS.

For me, one reason for raising the discussion has been that I see new problems showing up in the qpsmtpd log files: attacks where outside clients try thousands of different passwords for standard user names like "payments", "company" etc., with qpsmtpd just politely denying each new password. And problems with handling IPv6 connections, especially from linkedin.com .

Another reason is that after a long period of very low activity, a lot has been happening with qpsmtpd since 2012. I must admit that I'm not sure the new versions will handle the problems, I've been seeing, but it seems like all the effort from the qpsmtpd developers is focused on the newest versions.

Best,
Jesper
......

Offline janet

  • *****
  • 4,812
  • +0/-0
Re: Upgrading qpsmtpd from 0.84 to 0.93?
« Reply #4 on: December 29, 2013, 03:30:55 PM »
holck

I suggest you lodge a NFR bug report, against Future release of SME server, as it is the only way to start the process.
Refer to this forum thread & restate your reasons.
You never know, developers may agree with you.
Please search before asking, an answer may already exist.
The Search & other links to useful information are at top of Forum.

Offline stephdl

  • *
  • 1,523
  • +0/-0
    • Linux et Geekeries
Re: Upgrading qpsmtpd from 0.84 to 0.93?
« Reply #5 on: December 30, 2013, 12:41:15 AM »
For me, one reason for raising the discussion has been that I see new problems showing up in the qpsmtpd log files: attacks where outside clients try thousands of different passwords for standard user names like "payments", "company" etc., with qpsmtpd just politely denying each new password. And problems with handling IPv6 connections, especially from linkedin.com .

Please try smeserver-fail2ban, it is made against this kind of attack http://forums.contribs.org/index.php/topic,50162.msg252195.html#msg252195

http://wiki.contribs.org/Fail2ban
See http://wiki.contribs.org/Koozali_Foundation
irc : Freenode #sme_server #sme-fr

!!! Please write your knowledge to the Wiki !!!

Offline CharlieBrady

  • *
  • 6,918
  • +3/-0
Re: Upgrading qpsmtpd from 0.84 to 0.93?
« Reply #6 on: December 31, 2013, 08:36:51 PM »
And problems with handling IPv6 connections, especially from linkedin.com .

As far as I've ever seen, all mail from linkedin.com is just spam :-)

IPv6 connection problems should be easily handled by not publishing any AAAA records for your MX records.

Do you have an IPv6 modified version of SME server?

Offline holck

  • *
  • 322
  • +1/-0
Re: Upgrading qpsmtpd from 0.84 to 0.93?
« Reply #7 on: January 01, 2014, 10:33:17 PM »
@Charlie:

Quote
As far as I've ever seen, all mail from linkedin.com is just spam :-)
Agree !
Quote
Do you have an IPv6 modified version of SME server?
No, I don't think so. I do receive the spam from linkedin.com, but qpsmtpd complains every time with messages like this:
Code: [Select]
2014-01-01 11:14:05.067528500 Use of uninitialized value in bitwise and (&) at /usr/share/qpsmtpd/plugins/require_resolvable_fromhost line 111.

@stephdl:

I do run fail2ban, but unfortunately fail2ban can't prevent the password attacks on qpsmtpd, because for some reason this version doesn't log the IP addresses. The messages in /var/log/qpsmtpd/current looks like this:
Code: [Select]
2013-12-11 11:50:19.150369500 13420 Authentication failed for payments^@^@^@^@^@^@^@^@^@^@^@^@ - where the trailing garbage are x00 bytes.

@janet:
Thanks, I will lodge a bug report

Thanks for all your help,
Jesper
......