xref: /netbsd-src/external/ibm-public/postfix/dist/proto/POSTSCREEN_README.html (revision c3ab26950fe8540fb553d1d1dcae454bc98e5a25)
1<!doctype html public "-//W3C//DTD HTML 4.01 Transitional//EN"
2        "http://www.w3.org/TR/html4/loose.dtd">
3
4<head>
5
6<title>Postfix Postscreen Howto</title>
7
8<meta http-equiv="Content-Type" content="text/html; charset=us-ascii">
9
10</head>
11
12<body>
13
14<h1><img src="postfix-logo.jpg" width="203" height="98" ALT="">Postfix Postscreen Howto</h1>
15
16<hr>
17
18<h2> <a name="intro">Introduction</a> </h2>
19
20<p> This document describes features that are available in Postfix
212.8 and later. </p>
22
23<p> The Postfix postscreen(8) daemon provides additional protection
24against mail server overload. One postscreen(8) process handles
25multiple inbound SMTP connections, and decides which clients may
26talk to a Postfix SMTP server process.  By keeping spambots away,
27postscreen(8) leaves more SMTP server processes available for
28legitimate clients, and delays the onset of <a
29href="STRESS_README.html">server overload</a> conditions. </p>
30
31<p> postscreen(8) should not be used on SMTP ports that receive
32mail from end-user clients (MUAs). In a typical deployment,
33postscreen(8) handles the MX service on TCP port 25, while MUA
34clients submit mail via the submission service on TCP port 587 which
35requires client authentication. Alternatively, a site could set up
36a dedicated, non-postscreen, "port 25" server that provides submission
37service and client authentication, but no MX service.  </p>
38
39<p> postscreen(8) maintains a temporary whitelist for clients that
40pass its tests; by allowing whitelisted clients to skip tests,
41postscreen(8) minimizes its impact on legitimate email traffic.
42</p>
43
44<p> postscreen(8) is part of a multi-layer defense. <p>
45
46<ul>
47
48<li> <p> As the first layer, postscreen(8) blocks connections from
49zombies and other spambots that are responsible for about 90% of
50all spam.  It is implemented as a single process to make this defense
51as inexpensive as possible. </p>
52
53<li> <p> The second layer implements more complex SMTP-level access
54checks with <a href="SMTPD_ACCESS_README.html">Postfix SMTP servers</a>,
55<a href="SMTPD_POLICY_README.html">policy daemons</a>, and
56<a href="MILTER_README.html">Milter applications</a>. </p>
57
58<li> <p> The third layer performs light-weight content inspection
59with the Postfix built-in header_checks and body_checks. This can
60block unacceptable attachments such as executable programs, and
61worms or viruses with easy-to-recognize signatures. </p>
62
63<li> <p> The fourth layer provides heavy-weight content inspection
64with external content filters. Typical examples are <a
65href="http://www.ijs.si/software/amavisd/">Amavisd-new</a>, <a
66href="http://spamassassin.apache.org/">SpamAssassin</a>, and <a
67href="MILTER_README.html">Milter applications</a>. </p>
68
69</ul>
70
71<p> Each layer reduces the spam volume. The general strategy is to
72use the less expensive defenses first, and to use the more expensive
73defenses only for the spam that remains. </p>
74
75<p> Topics in this document: </p>
76
77<ul>
78
79<li> <a href="#intro">Introduction</a>
80
81<li> <a href="#basic">The basic idea behind postscreen(8)</a>
82
83<li> <a href="#general"> General operation </a>
84
85<li> <a href="#quick">Quick tests before everything else</a>
86
87<li> <a href="#before_220"> Tests before the 220 SMTP server greeting </a>
88
89<li> <a href="#after_220">Tests after the 220 SMTP server greeting</a>
90
91<li> <a href="#other_error">Other errors</a>
92
93<li> <a href="#victory">When all tests succeed</a>
94
95<li> <a href="#config"> Configuring the postscreen(8) service</a>
96
97<li> <a href="#historical"> Historical notes and credits </a>
98
99</ul>
100
101<h2> <a name="basic">The basic idea behind postscreen(8)</a> </h2>
102
103<p> Most email is spam, and most spam is sent out by zombies (malware
104on compromised end-user computers).  Wietse expects that the zombie
105problem will get worse before things improve, if ever. Without a
106tool like postscreen(8) that keeps the zombies away, Postfix would be
107spending most of its resources not receiving email. </p>
108
109<p> The main challenge for postscreen(8) is to make an is-it-a-zombie
110decision based on a single measurement. This is necessary because
111many zombies try to fly under the radar and avoid spamming the same
112site repeatedly.  Once postscreen(8) decides that a client is
113not-a-zombie, it whitelists the client temporarily to avoid further
114delays for legitimate mail. </p>
115
116<p> Zombies have challenges too: they have only a limited amount
117of time to deliver spam before their IP address becomes blacklisted.
118To speed up spam deliveries, zombies make compromises in their SMTP
119protocol implementation.  For example, they speak before their turn,
120or they ignore responses from SMTP servers and continue sending
121mail even when the server tells them to go away. </p>
122
123<p> postscreen(8) uses a variety of measurements to recognize
124zombies.  First, postscreen(8) determines if the remote SMTP client
125IP address is blacklisted.  Second, postscreen(8) looks for protocol
126compromises that are made to speed up delivery.  These are good
127indicators for making is-it-a-zombie decisions based on single
128measurements.  </p>
129
130<p> postscreen(8) does not inspect message content. Message content
131can vary from one delivery to the next, especially with clients
132that (also) send legitimate email.  Content is not a good indicator
133for making is-it-a-zombie decisions based on single measurements,
134and that is the problem that postscreen(8) is focused on.  </p>
135
136<h2> <a name="general"> General operation </a> </h2>
137
138<p> For each connection from an SMTP client, postscreen(8) performs
139a number of tests
140in the order as described below.  Some tests introduce a delay of
141a few seconds.  postscreen(8) maintains a temporary whitelist for
142clients that pass its tests; by allowing whitelisted clients to
143skip tests, postscreen(8) minimizes its impact on legitimate email
144traffic.  </p>
145
146<p> By default, postscreen(8) hands off all connections to a Postfix
147SMTP server process after logging its findings. This mode is useful
148for non-destructive testing. </p>
149
150<p> In a typical production setting, postscreen(8) is configured
151to reject mail from clients that fail one or more tests, after
152logging the helo, sender and recipient information. </p>
153
154<p> Note: postscreen(8) is not an SMTP proxy; this is intentional.
155The purpose is to keep zombies away from Postfix, with minimal
156overhead for legitimate clients. </p>
157
158<h2> <a name="quick">Quick tests before everything else</a> </h2>
159
160<p> Before engaging in SMTP-level tests. postscreen(8) queries a
161number of local black and whitelists. These tests speed up the
162handling of known clients. </p>
163
164<ul>
165
166<li> <a href="#perm_white_black"> Permanent white/blacklist test </a>
167
168<li> <a href="#temp_white"> Temporary whitelist test </a>
169
170<li> <a href="#white_veto"> MX Policy test </a>
171
172</ul>
173
174<h3> <a name="perm_white_black"> Permanent white/blacklist test </a> </h3>
175
176<p> The postscreen_access_list parameter (default: permit_mynetworks)
177specifies a permanent access list for SMTP client IP addresses. Typically
178one would specify something that whitelists local networks, followed
179by a CIDR table for selective white- and blacklisting. </p>
180
181<p> Example: </p>
182
183<pre>
184/etc/postfix/main.cf:
185    postscreen_access_list = permit_mynetworks,
186        cidr:/etc/postfix/postscreen_access.cidr
187
188/etc/postfix/postscreen_access.cidr:
189   # Rules are evaluated in the order as specified.
190   # Blacklist 192.168.* except 192.168.0.1.
191   192.168.0.1          permit
192   192.168.0.0/16       reject
193</pre>
194
195<p> See the postscreen_access_list manpage documentation for more
196details.  </p>
197
198<p> When the SMTP client address matches a "permit" action,
199postscreen(8) logs this with the client address and port number as:
200</p>
201
202<pre>
203    <b>WHITELISTED</b> <i>[address]:port</i>
204</pre>
205
206<p> The whitelist action is not configurable: immediately hand off the
207connection to a Postfix SMTP server process. </p>
208
209<p> When the SMTP client address matches a "reject" action,
210postscreen(8) logs this with the client address and port number as:
211</p>
212
213<pre>
214    <b>BLACKLISTED</b> <i>[address]:port</i>
215</pre>
216
217<p> The postscreen_blacklist_action parameter specifies the action
218that is taken next.  See "<a href="#fail_before_220">When tests
219fail before the 220 SMTP server greeting</a>" below. </p>
220
221<h3> <a name="temp_white"> Temporary whitelist test </a> </h3>
222
223<p> The postscreen(8) daemon maintains a <i>temporary</i>
224whitelist for SMTP client IP addresses that have passed all
225the tests described below. The postscreen_cache_map parameter
226specifies the location of the temporary whitelist.  The
227temporary whitelist is not used for SMTP client addresses
228that appear on the <i>permanent</i> access list. </p>
229
230<blockquote>
231
232    <p> NOTE: To share a postscreen(8) cache between multiple
233    postscreen(8) instances under the same master(8) daemon, use
234    "<tt>postscreen_cache_map =
235    proxy:btree:$data_directory/postscreen_cache</tt>", and disable
236    cache cleanup (postscreen_cache_cleanup_interval = 0) in all
237    postscreen(8) instances except one that is responsible for cache
238    cleanup. </p>
239
240    <p> postscreen(8) cache sharing requires Postfix 2.9 or later;
241    earlier proxymap(8) implementations don't support cache cleanup.
242    </p>
243
244    <p>  For an alternative postscreen(8) cache sharing approach,
245    see the memcache_table(5) manpage. </p>
246
247</blockquote>
248
249<p> When the SMTP client address appears on the temporary
250whitelist, postscreen(8) logs this with the client address and port
251number as: </p>
252
253<pre>
254    <b>PASS OLD</b> <i>[address]:port</i>
255</pre>
256
257<p> The action is not configurable: immediately hand off the
258connection to a Postfix SMTP server process.  The client is
259excluded from further tests until its temporary whitelist
260entry expires, as controlled with the postscreen_*_ttl
261parameters.  Expired entries are silently renewed if possible. </p>
262
263<h3> <a name="white_veto"> MX Policy test </a> </h3>
264
265<p> When the remote SMTP client is not on the static access list
266or temporary whitelist, postscreen(8) can implement a number of
267whitelist tests, before it grants the client a temporary whitelist
268status that allows it to talk to a Postfix SMTP server process. </p>
269
270<p> When postscreen(8) is configured to monitor all primary and
271backup MX addresses, it can refuse to whitelist clients that connect
272to a backup MX address only (an old spammer trick to take advantage
273of backup MX hosts with weaker anti-spam policies than primary MX
274hosts). </p>
275
276<blockquote> <p> NOTE: The following solution is for small sites.
277Larger sites would have to share the postscreen(8) cache between
278primary and backup MTAs, which would introduce a common point of
279failure.  </p> </blockquote>
280
281<ul>
282
283<li> <p> First, configure the host to listen on both primary and
284backup MX addresses. Use the appropriate <tt>ifconfig</tt> command
285for the local operating system, or update the appropriate configuration
286files and "refresh" the network protocol stack. </p>
287
288<p> <p> Second, configure Postfix to listen on the new IP address
289(this step is needed when you have specified inet_interfaces in
290main.cf). </p>
291
292<li> <p> Then, configure postscreen(8) to deny the temporary whitelist
293status on the backup MX address(es).  An example for Wietse's
294server is: </p>
295
296<pre>
297/etc/postfix/main.cf:
298    postscreen_whitelist_interfaces = !168.100.189.8 static:all
299</pre>
300
301<p> Translation: allow clients to obtain the temporary whitelist
302status on all server IP addresses except 168.100.189.8, which is a
303backup MX address.  </p>
304
305</ul>
306
307<p> When a non-whitelisted client connects the backup MX address,
308postscreen(8) logs this with the client address and port number as:
309</p>
310
311<pre>
312    <b>CONNECT from</b> <i>[address]:port</i> <b>to [168.100.189.8]:25</b>
313    <b>WHITELIST VETO</b> <i>[address]:port</i>
314</pre>
315
316<p> Translation: the client at <i>[address]:port</i> connected to
317the backup MX address 168.100.189.8 while it was not whitelisted.
318The client will not be granted the temporary whitelist status, even
319if passes all the whitelist tests described below. </p>
320
321<h2> <a name="before_220"> Tests before the 220 SMTP server greeting </a> </h2>
322
323<p> The postscreen_greet_wait parameter specifies a short time
324interval before the "220 <i>text</i>..." server greeting, where
325postscreen(8) can run a number of tests in parallel. </p>
326
327<p> When a good client passes these tests, and no "<a
328href="#after_220">deep protocol tests</a>" are configured, postscreen(8)
329adds the client to the temporary whitelist and hands off the "live"
330connection to a Postfix SMTP server process.  The client can then
331continue as if postscreen(8) never even existed (except of course
332for the short postscreen_greet_wait delay).  </p>
333
334<ul>
335
336<li> <a href="#pregreet"> Pregreet test </a>
337
338<li> <a href="#dnsbl"> DNS White/blacklist test </a>
339
340<li> <a href="#fail_before_220">When tests fail before the 220 SMTP server greeting</a>
341
342</ul>
343
344<h3> <a name="pregreet"> Pregreet test </a> </h3>
345
346<p> The SMTP protocol is a classic example of a protocol where the
347server speaks before the client. postscreen(8) detects zombies
348that are in a hurry and that speak before their turn. This test is
349enabled by default. </p>
350
351<p> The postscreen_greet_banner parameter specifies the <i>text</i>
352portion of a "220-<i>text</i>..." teaser banner (default: $smtpd_banner).
353Note that this becomes the first part of a multi-line server greeting.
354The postscreen(8) daemon sends this before the postscreen_greet_wait
355timer is started.  The purpose of the teaser banner is to confuse
356zombies so that they speak before their turn. It has no effect on
357SMTP clients that correctly implement the protocol.  </p>
358
359<p> To avoid problems with poorly-implemented SMTP engines in network
360appliances or network testing tools, either exclude them from all
361tests with the postscreen_access_list feature or else specify
362an empty teaser banner: </p>
363
364<pre>
365/etc/postfix/main.cf:
366    # Exclude broken clients by whitelisting. Clients in mynetworks
367    # should always be whitelisted.
368    postscreen_access_list = permit_mynetworks,
369        cidr:/etc/postfix/postscreen_access.cidr
370
371/etc/postfix/postscreen_access.cidr:
372    192.168.254.0/24 permit
373</pre>
374
375<pre>
376/etc/postfix/main.cf:
377    # Disable the teaser banner (try whitelisting first if you can).
378    postscreen_greet_banner =
379</pre>
380
381<p> When an SMTP client sends a command before the
382postscreen_greet_wait time has elapsed, postscreen(8) logs this as:
383</p>
384
385<pre>
386    <b>PREGREET</b> <i>count</i> <b>after</b> <i>time</i> <b>from</b> <i>[address]:port text...</i>
387</pre>
388
389<p> Translation: the client at <i>[address]:port</i> sent <i>count</i>
390bytes before its turn to speak. This happened <i>time</i> seconds
391after the postscreen_greet_wait timer was started.  The <i>text</i>
392is what the client sent (truncated to 100 bytes, and with non-printable
393characters replaced with C-style escapes such as \r for carriage-return
394and \n for newline). </p>
395
396<p> The postscreen_greet_action parameter specifies the action that
397is taken next.  See "<a href="#fail_before_220">When tests fail
398before the 220 SMTP server greeting</a>" below. </p>
399
400<h3> <a name="dnsbl"> DNS White/blacklist test </a> </h3>
401
402<p> The postscreen_dnsbl_sites parameter (default: empty) specifies
403a list of DNS blocklist servers with optional filters and weight
404factors (positive weights for blacklisting, negative for whitelisting).
405These servers will be queried in parallel with the reverse client
406IP address.  This test is disabled by default. </p>
407
408<blockquote>
409<p>
410CAUTION: when postscreen rejects mail, its SMTP reply contains the
411DNSBL domain name. Use the postscreen_dnsbl_reply_map feature to
412hide "password" information in DNSBL domain names.
413</p>
414</blockquote>
415
416<p> When the postscreen_greet_wait time has elapsed, and the combined
417DNSBL score is equal to or greater than the postscreen_dnsbl_threshold
418parameter value, postscreen(8) logs this as: </p>
419
420<pre>
421    <b>DNSBL rank</b> <i>count</i> <b>for</b> <i>[address]:port</i>
422</pre>
423
424<p> Translation: the SMTP client at <i>[address]:port</i> has a combined
425DNSBL score of <i>count</i>. </p>
426
427<p> The postscreen_dnsbl_action parameter specifies the action that
428is taken when the combined DNSBL score is equal to or greater than
429the threshold.  See "<a href="#fail_before_220">When tests fail
430before the 220 SMTP server greeting</a>" below. </p>
431
432<h3> <a name="fail_before_220">When tests fail before the 220 SMTP server greeting</a> </h3>
433
434<p> When the client address matches the permanent blacklist, or
435when the client fails the pregreet or DNSBL tests, the action is
436specified with postscreen_blacklist_action, postscreen_greet_action,
437or postscreen_dnsbl_action, respectively. </p>
438
439<dl>
440
441<dt> <b>ignore</b> (default) </dt>
442
443<dd> Ignore the failure of this test. Allow other tests to complete.
444Repeat this test the next time the client connects.  This option
445is useful for testing and collecting statistics without blocking
446mail. </dd>
447
448<dt> <b>enforce</b> </dt>
449
450<dd> Allow other tests to complete.  Reject attempts to deliver mail
451with a 550 SMTP reply, and log the helo/sender/recipient information.
452Repeat this test the next time the client connects. </dd>
453
454<dt> <b>drop</b> </dt>
455
456<dd> Drop the connection immediately with a 521 SMTP reply.  Repeat
457this test the next time the client connects. </dd>
458
459</dl>
460
461<h2> <a name="after_220">Tests after the 220 SMTP server greeting</a> </h2>
462
463<p> In this phase of the protocol, postscreen(8) implements a
464number of "deep protocol" tests. These tests use an SMTP protocol
465engine that is built into the postscreen(8) server. </p>
466
467<p> Important note: deep protocol tests are disabled by default.
468They are more intrusive than the pregreet and DNSBL tests, and they
469have limitations as discussed next. </p>
470
471<ul>
472
473<li> <p> When a good client passes the <a href="#after_220">deep
474protocol tests</a>, postscreen(8) adds the client to the temporary
475whitelist but it cannot hand off the "live" connection to a Postfix
476SMTP server process in the middle of the session. Instead, postscreen(8)
477defers mail delivery attempts with a 4XX status, logs the
478helo/sender/recipient information, and waits for the client to
479disconnect. </p>
480
481<p> The next time the client connects it will be allowed to talk
482to a Postfix SMTP server process to deliver its mail.  To minimize the
483impact of this limitation, postscreen(8) gives deep protocol tests
484a relatively long expiration time. </p>
485
486<li> <p> postscreen(8)'s built-in SMTP engine does not implement
487the AUTH, XCLIENT, and XFORWARD features.  AUTH support may be added
488in a future version. In the mean time, if you need to make these
489services available on port 25, then do not enable the tests after
490the 220 server greeting. </p>
491
492</ul>
493
494<p> End-user clients should connect directly to the submission
495service, so that they never have to deal with postscreen(8)'s tests.
496</p>
497
498<ul>
499
500<li> <a href="#pipelining">Command pipelining test</a>
501
502<li> <a href="#non_smtp">Non-SMTP command test</a>
503
504<li> <a href="#barelf">Bare newline test</a>
505
506<li> <a href="#fail_after_220">When tests fail after the 220 SMTP server greeting</a>
507
508</ul>
509
510<h3> <a name="pipelining">Command pipelining test</a> </h3>
511
512<p> By default, SMTP is a half-duplex protocol: the sender and
513receiver send one command and one response at a time.  Unlike the
514Postfix SMTP server, postscreen(8) does not announce support
515for ESMTP command pipelining.  Therefore, clients are not allowed
516to send multiple commands. postscreen(8)'s <a href="#after_220">deep
517protocol test</a> for this is disabled by default. </p>
518
519<p> With "postscreen_pipelining_enable = yes", postscreen(8) detects
520zombies that send multiple commands, instead of sending one command
521and waiting for the server to reply.  </p>
522
523<p> This test is opportunistically enabled when postscreen(8) has
524to use the built-in SMTP engine anyway. This is to make postscreen(8)
525logging more informative. </p>
526
527<p> When a client sends multiple commands, postscreen(8) logs this
528as: </p>
529
530<pre>
531    <b>COMMAND PIPELINING from</b> <i>[address]:port</i> <b>after</b> <i>command</i>: <i>text</i>
532</pre>
533
534<p> Translation: the SMTP client at <i>[address]:port</i> sent
535multiple SMTP commands, instead of sending one command and then
536waiting for the server to reply. This happened after the client
537sent <i>command</i>. The <i>text</i> shows part of the input that
538was sent too early; it is not logged with Postfix 2.8. </p>
539
540<p> The postscreen_pipelining_action parameter specifies the action
541that is taken next.  See "<a href="#fail_after_220">When tests fail
542after the 220 SMTP server greeting</a>" below. </p>
543
544<h3> <a name="non_smtp">Non-SMTP command test</a> </h3>
545
546<p> Some spambots send their mail through open proxies. A symptom
547of this is the usage of commands such as CONNECT and other non-SMTP
548commands. Just like the Postfix SMTP server's smtpd_forbidden_commands
549feature, postscreen(8) has an equivalent postscreen_forbidden_commands
550feature to block these clients. postscreen(8)'s <a href="#after_220">deep
551protocol test</a> for this is disabled by default.  </p>
552
553<p> With "postscreen_non_smtp_command_enable = yes", postscreen(8)
554detects zombies that send commands specified with the
555postscreen_forbidden_commands parameter. This also detects commands
556with the syntax of a message header label. The latter is a symptom
557that the client is sending message content after ignoring all the
558responses from postscreen(8) that reject mail. </p>
559
560<p> This test is opportunistically enabled when postscreen(8) has
561to use the built-in SMTP engine anyway. This is to make postscreen(8)
562logging more informative.  </p>
563
564<p> When a client sends non-SMTP commands, postscreen(8) logs this
565as: </p>
566
567<pre>
568    <b>NON-SMTP COMMAND from</b> <i>[address]:port</i> <b>after</b> <i>command: text</i>
569</pre>
570
571<p> Translation: the SMTP client at <i>[address]:port</i> sent a
572command that matches the postscreen_forbidden_commands
573parameter, or that has the syntax of a message header label (text
574followed by optional space and ":").
575The "<tt><b>after</b> <i>command</i></tt>" portion is logged with
576Postfix 2.10 and later. </p>
577
578<p> The postscreen_non_smtp_command_action parameter specifies
579the action that is taken next.  See "<a href="#fail_after_220">When
580tests fail after the 220 SMTP server greeting</a>" below. </p>
581
582<h3> <a name="barelf">Bare newline test</a> </h3>
583
584<p> SMTP is a line-oriented protocol: lines have a limited length,
585and are terminated with &lt;CR&gt;&lt;LF&gt;. Lines ending in a
586"bare" &lt;LF&gt;, that is newline not preceded by carriage return,
587are not allowed in SMTP.  postscreen(8)'s <a href="#after_220">deep
588protocol test</a> for this is disabled by default.  </p>
589
590<p> With "postscreen_bare_newline_enable = yes", postscreen(8)
591detects clients that send lines ending in bare newline characters.
592</p>
593
594<p> This test is opportunistically enabled when postscreen(8) has
595to use the built-in SMTP engine anyway. This is to make postscreen(8)
596logging more informative.  </p>
597
598<p> When a client sends bare newline characters, postscreen(8) logs
599this as:
600</p>
601
602<pre>
603    <b>BARE NEWLINE from</b> <i>[address]:port</i> <b>after</b> <i>command</i>
604</pre>
605
606<p> Translation: the SMTP client at <i>[address]:port</i> sent a bare
607newline character, that is newline not preceded by carriage
608return.
609The "<tt><b>after</b> <i>command</i></tt>" portion is logged with
610Postfix 2.10 and later. </p>
611
612<p> The postscreen_bare_newline_action parameter specifies the
613action that is taken next.  See "<a href="#fail_after_220">When
614tests fail after the 220 SMTP server greeting</a>" below. </p>
615
616<h3> <a name="fail_after_220">When tests fail after the 220 SMTP server greeting</a> </h3>
617
618<p> When the client fails the pipelining, non-SMTP command or bare
619newline tests, the action is specified with postscreen_pipelining_action,
620postscreen_non_smtp_command_action or postscreen_bare_newline_action,
621respectively. </p>
622
623<dl>
624
625<dt> <b>ignore</b> (default for bare newline) </dt>
626
627<dd> Ignore the failure of this test. Allow other tests to complete.
628Do NOT repeat this test before the result from some other test
629expires.
630
631This option is useful for testing and collecting statistics without
632blocking mail permanently. </dd>
633
634<dt> <b>enforce</b> (default for pipelining) </dt>
635
636<dd> Allow other tests to complete.  Reject attempts to deliver
637mail with a 550 SMTP reply, and log the helo/sender/recipient
638information.  Repeat this test the next time the client connects.
639</dd>
640
641<dt> <b>drop</b> (default for non-SMTP commands) </dt>
642
643<dd> Drop the connection immediately with a 521 SMTP reply.  Repeat
644this test the next time the client connects.  This action is
645compatible with the Postfix SMTP server's smtpd_forbidden_commands
646feature. </dd>
647
648</dl>
649
650<h2> <a name="other_error">Other errors</a> </h2>
651
652<p> When an SMTP client hangs up unexpectedly, postscreen(8) logs
653this as: </p>
654
655<pre>
656    <b>HANGUP after</b> <i>time</i> <b>from</b> <i>[address]:port</i> <b>in</b> <i>test name</i>
657</pre>
658
659<p> Translation: the SMTP client at <i>[address]:port</i> disconnected
660unexpectedly, <i>time</i> seconds after the start of the
661test named <i>test name</i>. </p>
662
663<p> There is no punishment for hanging up. A client that hangs up
664without sending the QUIT command can still pass all postscreen(8)
665tests. </p>
666
667<!--
668
669<p> While an unexpired penalty is in effect, an SMTP client is not
670allowed to pass any tests, and  postscreen(8) logs each connection
671with the remaining amount of penalty time as: </p>
672
673<pre>
674    <b>PENALTY</b> <i>time</i> <b>for</b> <i>[address]:port</i>
675</pre>
676
677<p> During this time, all attempts by the client to deliver mail
678will be deferred with a 450 SMTP status.  </p>
679
680-->
681
682<p> The following errors are reported by the built-in SMTP engine.
683This engine never accepts mail, therefore it has per-session limits
684on the number of commands and on the session length. </p>
685
686<pre>
687    <b>COMMAND TIME LIMIT</b> <b>from</b> <i>[address]:port</i> <b>after</b> <i>command</i>
688</pre>
689
690<p> Translation: the SMTP client at <i>[address]:port</i> reached the
691per-command time limit as specified with the postscreen_command_time_limit
692parameter.  The session is terminated immediately.
693The "<tt><b>after</b> <i>command</i></tt>" portion is logged with
694Postfix 2.10 and later. </p>
695
696<pre>
697    <b>COMMAND COUNT LIMIT from</b> <i>[address]:port</i> <b>after</b> <i>command</i>
698</pre>
699
700<p> Translation: the SMTP client at <i>[address]:port</i> reached the
701per-session command count limit as specified with the
702postscreen_command_count_limit parameter.  The session is terminated
703immediately.
704The "<tt><b>after</b> <i>command</i></tt>" portion is logged with
705Postfix 2.10 and later. </p>
706
707<pre>
708    <b>COMMAND LENGTH LIMIT from</b> <i>[address]:port</i> <b>after</b> <i>command</i>
709</pre>
710
711<p> Translation: the SMTP client at <i>[address]:port</i> reached the
712per-command length limit, as specified with the line_length_limit
713parameter.  The session is terminated immediately.
714The "<tt><b>after</b> <i>command</i></tt>" portion is logged with
715Postfix 2.10 and later. </p>
716
717<p> When an SMTP client makes too many connections at the same time,
718or when all postscreen(8) ports are busy, postscreen(8) rejects the
719connection with a 421 status code and logs: </p>
720
721<pre>
722    <b>NOQUEUE: reject: CONNECT from</b> <i>[address]:port</i><b>: too many connections</b>
723    <b>NOQUEUE: reject: CONNECT from</b> <i>[address]:port</i><b>: all server ports busy</b>
724</pre>
725
726<p> The postscreen_client_connection_count_limit and
727postscreen_pre_queue_limit parameters control these limits.  </p>
728
729<h2> <a name="victory">When all tests succeed</a> </h2>
730
731<p> When a new SMTP client passes all tests (i.e. it is not whitelisted
732via some mechanism), postscreen(8) logs this as: </p>
733
734<pre>
735    <b>PASS NEW</b> <i>[address]:port</i>
736</pre>
737
738<p> Where <i>[address]:port</i> are the client IP address and port.
739Then, postscreen(8)
740creates a temporary whitelist entry that excludes the client IP
741address from further tests until the temporary whitelist entry
742expires, as controlled with the postscreen_*_ttl parameters. </p>
743
744<p> When no "<a href="#after_220">deep protocol tests</a>" are
745configured, postscreen(8) hands off the "live" connection to a Postfix
746SMTP server process.  The client can then continue as if postscreen(8)
747never even existed (except for the short postscreen_greet_wait delay).
748</p>
749
750<p> When any "<a href="#after_220">deep protocol tests</a>" are
751configured, postscreen(8) cannot hand off the "live" connection to
752a Postfix SMTP server process in the middle of the session.  Instead,
753postscreen(8) defers mail delivery attempts with a 4XX status, logs
754the helo/sender/recipient information, and waits for the client to
755disconnect.  The next time the client connects it will be allowed
756to talk to a Postfix SMTP server process to deliver its mail.
757postscreen(8) mitigates the impact of this limitation by giving
758<a href="#after_220">deep protocol tests</a> a long expiration
759time. </p>
760
761<h2> <a name="config"> Configuring the postscreen(8) service</a>
762</h2>
763
764<p> postscreen(8) has been tested on FreeBSD [4-8], Linux 2.[4-6]
765and Solaris 9 systems. </p>
766
767<ul>
768
769<li> <a href="#enable"> Turning on postscreen(8) without blocking
770mail</a>
771
772<li> <a href="#starttls"> postscreen(8) TLS configuration </a>
773
774<li> <a href="#blocking"> Blocking mail with postscreen(8) </a>
775
776<li> <a href="#turnoff"> Turning off postscreen(8) </a>
777
778</ul>
779
780<h3> <a name="enable"> Turning on postscreen(8) without blocking mail</a> </h3>
781
782<p> To enable the postscreen(8) service and log client information
783without blocking mail: </p>
784
785<ol>
786
787<li> <p> Make sure that local clients and systems with non-standard
788SMTP implementations are excluded from any postscreen(8) tests. The
789default is to exclude all clients in mynetworks. To exclude additional
790clients, for example, third-party performance monitoring tools (these
791tend to have broken SMTP implementations): </p>
792
793<pre>
794/etc/postfix/main.cf:
795    # Exclude broken clients by whitelisting. Clients in mynetworks
796    # should always be whitelisted.
797    postscreen_access_list = permit_mynetworks,
798        cidr:/etc/postfix/postscreen_access.cidr
799
800/etc/postfix/postscreen_access.cidr:
801    192.168.254.0/24 permit
802</pre>
803
804<li> <p> Comment out the "<tt>smtp  inet ... smtpd</tt>" service
805in master.cf, including any "<tt>-o parameter=value</tt>" entries
806that follow.  </p>
807
808<pre>
809/etc/postfix/master.cf:
810    #smtp      inet  n       -       n       -       -       smtpd
811    #    -o parameter=value ...
812</pre>
813
814<li> <p> Uncomment the new "<tt>smtpd pass ... smtpd</tt>" service
815in master.cf, and duplicate any "<tt>-o parameter=value</tt>" entries
816from the smtpd service that was commented out in the previous step.
817</p>
818
819<pre>
820/etc/postfix/master.cf:
821    smtpd     pass  -       -       n       -       -       smtpd
822        -o parameter=value ...
823</pre>
824
825<li> <p> Uncomment the new "<tt>smtp inet ... postscreen</tt>"
826service in master.cf. </p>
827
828<pre>
829/etc/postfix/master.cf:
830    smtp      inet  n       -       n       -       1       postscreen
831</pre>
832
833<li> <p> Uncomment the new "<tt>tlsproxy unix ... tlsproxy</tt>"
834service in master.cf.  This service implements STARTTLS support for
835postscreen(8). </p>
836
837<pre>
838/etc/postfix/master.cf:
839    tlsproxy  unix  -       -       n       -       0       tlsproxy
840</pre>
841
842<li> <p> Uncomment the new "<tt>dnsblog  unix ... dnsblog</tt>"
843service in master.cf.  This service does DNSBL lookups for postscreen(8)
844and logs results. </p>
845
846<pre>
847/etc/postfix/master.cf:
848    dnsblog   unix  -       -       n       -       0       dnsblog
849</pre>
850
851<li> <p> To enable DNSBL lookups, list some DNS blocklist sites in
852main.cf, separated by whitespace. Different sites can have different
853weights. For example:
854
855<pre>
856/etc/postfix/main.cf:
857    postscreen_dnsbl_threshold = 2
858    postscreen_dnsbl_sites = zen.spamhaus.org*2
859        bl.spamcop.net*1 b.barracudacentral.org*1
860</pre>
861
862<p> Note: if your DNSBL queries have a "secret" in the domain name,
863you must censor this information from the postscreen(8) SMTP replies.
864For example: </p>
865
866<pre>
867/etc/postfix/main.cf:
868    postscreen_dnsbl_reply_map = texthash:/etc/postfix/dnsbl_reply
869</pre>
870
871<pre>
872/etc/postfix/dnsbl_reply:
873    # Secret DNSBL name        Name in postscreen(8) replies
874    secret.zen.spamhaus.org    zen.spamhaus.org
875</pre>
876
877<p> The texthash: format is similar to hash: except that there is
878no need to run postmap(1) before the file can be used, and that it
879does not detect changes after the file is read. It is new with
880Postfix version 2.8. </p>
881
882<li> <p> Read the new configuration with "<tt>postfix reload</tt>".
883</p>
884
885</ol>
886
887<p> Notes: </p>
888
889<ul>
890
891<li> <p> Some postscreen(8) configuration parameters implement
892stress-dependent behavior. This is supported only when the default
893value is stress-dependent (that is, "postconf -d <i>parametername</i>"
894output shows "<i>parametername</i> =
895${stress?<i>something</i>}${stress:<i>something</i>}").
896Other parameters always evaluate as if the stress value is the empty
897string. </p>
898
899<li> <p> See "<a href="#before_220">Tests before the 220 SMTP server
900greeting</a>" for details about the logging from these postscreen(8)
901tests. </p>
902
903<li> <p> If you run Postfix 2.6 or earlier you must stop and start
904the master daemon ("<tt>postfix stop; postfix start</tt>").  This
905is needed because the Postfix "pass" master service type did not
906work reliably on all systems. </p>
907
908</ul>
909
910<h3> <a name="starttls"> postscreen(8) TLS configuration </a> </h3>
911
912<p> postscreen(8) TLS support is available for remote SMTP clients
913that aren't whitelisted, including clients that need to renew their
914temporary whitelist status.  When a remote SMTP client requests TLS
915service, postscreen(8) invisibly hands off the connection to a
916tlsproxy(8) process. Then, tlsproxy(8) encrypts and decrypts the
917traffic between postscreen(8) and the remote SMTP client. One
918tlsproxy(8) process can handle multiple SMTP sessions. The number
919of tlsproxy(8) processes slowly increases with server load, but it
920should always be much smaller than the number of postscreen(8) TLS
921sessions.  </p>
922
923<p> TLS support for postscreen(8) and tlsproxy(8) uses the same
924parameters as with smtpd(8). We recommend that you keep the relevant
925configuration parameters in main.cf.  If you must specify "-o
926smtpd_mumble=value" parameter overrides in master.cf for a
927postscreen-protected smtpd(8) service, then you should specify those
928same parameter overrides for the postscreen(8) and tlsproxy(8)
929services. </p>
930
931<h3> <a name="blocking"> Blocking mail with postscreen(8) </a> </h3>
932
933<p> For compatibility with smtpd(8), postscreen(8) implements the
934soft_bounce safety feature. This causes Postfix to reject mail with
935a "try again" reply code. </p>
936
937<ul>
938
939<li> <p> To turn this on for all of Postfix, specify "<tt>soft_bounce
940= yes</tt>" in main.cf. </p>
941
942<li> <p> To turn this on for postscreen(8) only, append "<tt>-o
943soft_bounce=yes</tt>" (note: NO SPACES around '=') to the postscreen
944entry in master.cf. <p>
945
946</ul>
947
948<p> Execute "<tt>postfix reload</tt>" to make the change effective. </p>
949
950<p> After testing, do not forget to remove the soft_bounce feature,
951otherwise senders won't receive their non-delivery notification
952until many days later.  </p>
953
954<p> To use the postscreen(8) service to block mail, edit main.cf and
955specify one or more of: </p>
956
957<ul>
958
959<li> <p> "<tt>postscreen_dnsbl_action = enforce</tt>", to reject
960clients that are on DNS blocklists, and to log the helo/sender/recipient
961information. With good DNSBLs this reduces the amount of load on
962Postfix SMTP servers dramatically.  </p>
963
964<li> <p> "<tt>postscreen_greet_action = enforce</tt>", to reject
965clients that talk before their turn, and to log the helo/sender/recipient
966information. This stops over half of all known-to-be illegitimate
967connections to Wietse's mail server. It is backup protection for
968zombies that haven't yet been blacklisted. </p>
969
970<li> <p> You can also enable "<a href="#after_220">deep protocol
971tests</a>", but these are more intrusive than the pregreet or DNSBL
972tests. </p>
973
974<p> When a good client passes the "<a href="#after_220">deep
975protocol tests</a>", postscreen(8) adds the client to the temporary
976whitelist but it cannot hand off the "live" connection to a Postfix
977SMTP server process in the middle of the session. Instead, postscreen(8)
978defers mail delivery attempts with a 4XX status, logs the
979helo/sender/recipient information, and waits for the client to
980disconnect. </p>
981
982<p> When the good client comes back in a later session, it is allowed
983to talk directly to a Postfix SMTP server.  See "after_220 <a
984href="#after_220">Tests after the 220 SMTP server greeting</a> above
985for limitations with AUTH and other features that clients may need.
986</p>
987
988<p> An unexpected benefit from "<a href="#after_220">deep protocol
989tests</a>" is that some "good" clients don't return after the 4XX
990reply; these clients were not so good after all.  Wietse enables
991"<a href="#after_220">deep protocol tests</a>" on his own internet-facing
992mail server.  </p>
993
994<li> <p> There is also support for permanent blacklisting and
995whitelisting; see the description of the postscreen_access_list
996parameter for details. </p>
997
998</ul>
999
1000<h3> <a name="turnoff"> Turning off postscreen(8) </a> </h3>
1001
1002<p> To turn off postscreen(8) and handle mail directly with Postfix
1003SMTP server processes: </p>
1004
1005<ol>
1006
1007<li> <p> Comment out the "<tt>smtp inet ... postscreen</tt>" service
1008in master.cf, including any "<tt>-o parameter=value</tt>" entries
1009that follow. </p>
1010
1011<pre>
1012/etc/postfix/master.cf:
1013    #smtp      inet  n       -       n       -       1       postscreen
1014    #    -o parameter=value ...
1015</pre>
1016
1017<li> <p> Comment out the "<tt>dnsblog  unix ... dnsblog</tt>" service
1018in master.cf.  </p>
1019
1020<pre>
1021/etc/postfix/master.cf:
1022    #dnsblog   unix  -       -       n       -       0       dnsblog
1023</pre>
1024
1025<li> <p> Comment out the "<tt>smtpd pass ... smtpd</tt>" service
1026in master.cf, including any "<tt>-o parameter=value</tt>" entries
1027that follow. </p>
1028
1029<pre>
1030/etc/postfix/master.cf:
1031    #smtpd     pass  -       -       n       -       -       smtpd
1032    #    -o parameter=value ...
1033</pre>
1034
1035<li> <p> Comment out the "<tt>tlsproxy unix ... tlsproxy</tt>"
1036service in master.cf, including any "<tt>-o parameter=value</tt>"
1037entries that follow. </p>
1038
1039<pre>
1040/etc/postfix/master.cf:
1041    #tlsproxy  unix  -       -       n       -       0       tlsproxy
1042    #    -o parameter=value ...
1043</pre>
1044
1045<li> <p> Uncomment the "<tt>smtp  inet ... smtpd</tt>" service in
1046master.cf, including any "<tt>-o parameter=value</tt>" entries that
1047may follow.  </p>
1048
1049<pre>
1050/etc/postfix/master.cf:
1051    smtp       inet  n       -       n       -       -       smtpd
1052        -o parameter=value ...
1053</pre>
1054
1055<li> <p> Read the new configuration with "<tt>postfix reload</tt>".
1056</p>
1057
1058</ol>
1059
1060<h2> <a name="historical"> Historical notes and credits </a> </h2>
1061
1062<p> Many ideas in postscreen(8) were explored in earlier work by
1063Michael Tokarev, in OpenBSD spamd, and in MailChannels Traffic
1064Control. </p>
1065
1066<p> Wietse threw together a crude prototype with pregreet and dnsbl
1067support in June 2009, because he needed something new for a Mailserver
1068conference presentation in July. Ralf Hildebrandt ran this code on
1069several servers to collect real-world statistics. This version used
1070the dnsblog(8) ad-hoc DNS client program. </p>
1071
1072<p> Wietse needed new material for a LISA conference presentation
1073in November 2010, so he added support for DNSBL weights and filters
1074in August, followed by a major code rewrite, deep protocol tests,
1075helo/sender/recipient logging, and stress-adaptive behavior in
1076September. Ralf Hildebrandt ran this code on several servers to
1077collect real-world statistics. This version still used the embarrassing
1078dnsblog(8) ad-hoc DNS client program.  </p>
1079
1080<p> Wietse added STARTTLS support in December 2010. This makes
1081postscreen(8) usable for sites that require TLS support.  The
1082implementation introduces the tlsproxy(8) event-driven TLS proxy
1083that decrypts/encrypts the sessions for multiple SMTP clients. </p>
1084
1085<p> The tlsproxy(8) implementation led to the discovery of a "new"
1086class of vulnerability (<a
1087href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0411"
1088>CVE-2011-0411</a>) that affected multiple implementations of SMTP,
1089POP, IMAP, NNTP, and FTP over TLS. </p>
1090
1091<p> postscreen(8) was officially released as part of the Postfix
10922.8 stable release in January 2011.</p>
1093
1094</body>
1095
1096</html>
1097
1098