#SMTPSmuggling

We're pleased to announce notqmail 1.09.

notqmail is the collaborative Open Source successor to qmail and netqmail. It begins with stable, compatible, small releases to which existing qmail users can safely update, and aims to become a more extensible, more easily packaged, and more modern Mail Transport Agent suitable for most needs.

qmail's design principles haven't _always_ prevented bugs or holes, nor have they _always_ made adding new functionality easy. But pretty often we get both. And that's why we continue to invest in this codebase.

Project goals that have made particular progress in the 1.09 release:

- Preserve qmail's hard-earned security properties
- Reduce marginal cost of development
- Make packaging easier
- Provide sensible defaults

Some well-known patches have been merged; others will need some adjustment.

Full release notes: https://notqmail.org/releases/1.09

It's been almost four years since 1.08. Thanks for your patience. With continued focus on making development safer and faster, our next release will arrive much sooner. Feedback welcome, as always.

#email #selfhosting #qmail #netqmail #notqmail #smtp #smtpsmuggling #mailserver
Arthur Lutz (Zenika)arthurzenika@pouet.chapril.org
2024-03-13

Pour le détail technique du SMTP Smuggling : smtpsmuggling.com/

Et l'excellente présentation au CCC en décembre dernier : media.ccc.de/v/37c3-11782-smtp

#smtpSmuggling #smtp #security

Arthur Lutz (Zenika)arthurzenika@pouet.chapril.org
2024-03-13

🏆 Achievement unlocked : être crédité comme "Reporter" sur un advisory de sécurité Github 🔒

github.com/postalserver/postal

👏 to @login for all the hard work

#smtpSmuggling #smtp #postal #email #security #CVE

Christoph Enderchrender
2024-03-03

Only noticed today that there's a new long-term fix for in for versions ≥ 3.5.24 using “smtpd_forbid_bare_newline = normalize”. The old “yes” setting for this option is now an alias for the new “normalize”. Also took some time for extended testing using the “SMTP-Smuggling-Tools” from github.com/The-Login/SMTP-Smug.

2024-02-19

Timo Longin @login introduces SMTP smuggling, a novel technique to spoof fully SPF-validated emails from various popular domains including @microsoft.com.

Wow. It's incredible nobody found this before. It's the first of its kind. Probably not the last...!

youtu.be/V8KPV96g1To

Related:
media.ccc.de/v/37c3-11782-smtp
postfix.org/smtp-smuggling.htm
malwarebytes.com/blog/news/202

#SmtpSmuggling #37C3 #SMTP #vulnerability #infosec #TimoLongin #security

Florian Bierhoffxdc33@infosec.exchange
2024-02-16

It's a wrap! 🌯 Our technical guideline "BSI TR-03108 (Secure Email Transport)" is now accompanied by "BSI TR-03182 (Email Authentication)" providing guidance for email services to protect their users against impersonation attacks like Spoofing and Phishing :flan_mask:​

bsi.bund.de/dok/tr-03182-en

#TeamBSI #EmailAuthentication #DNSSEC #DMARC #DKIM #SPF #SMTP #SMTPSmuggling

d0rk ✅drwetter
2024-01-31

Finally the two missing options against arrived in buster this morning.

security-tracker.debian.org/tr

smtpd_forbid_bare_newline = normalize

and if needed:

smtpd_forbid_bare_newline_exclusions = $mynetworks

see

postfix.org/smtp-smuggling.html

2024-01-05

SPF-valid spoofed mail from admin@microsoft.com 😈 ?

Timo Longin @login stumbled upon SMTP Smuggling while looking for vulnerabilities in the Simple Mail Transfer Protocol.

Great work and great talk!

#Smtp #SmtpSmuggling #TimoLongin #37c3

media.ccc.de/v/37c3-11782-smtp

2024-01-05

Ich: »Ich habe gerade mal getestet, ob Ihr für #SmtpSmuggling anfällig seid, aber anscheinend kann ich auch einfach so Mails als jeder beliebige Absender über Eure Server verschicken.«

Mail-Provider: »Ja, das ist ganz normales Phishing, aber das ist so gewollt, damit man mit mehreren Absendern dasselbe Sammelpostfach bedienen kann.«

Ich: »Es ist gewollt, dass ich mich als Ihr oder jeder Eurer anderen Kunden ausgeben kann? Inklusive gültiger DKIM-Signatur?«

Mail-Provider: 🤷‍♂️

Es gibt so Tage...

2024-01-05

@ParadeGrotesque
The patch for CVE-2023-51766, #SMTPSmuggling in Exim4, just landed in Debian.
security-tracker.debian.org/tr

2024-01-04

Możliwy atak SMTP Smuggling na popularne serwery pocztowe

Tim Longin, znany z ataków na protokół DNS, we współpracy z SEC Consult, opublikował informację o możliwości ataku SMPT Smuggling na popularne serwery i usługi pocztowe. Cała historia rozpoczyna się w czerwcu 2023 roku, kiedy to przedstawiono pierwszy PoC (Proof of Concept) ataku SMPT Smuggling działającego w systemie pocztowym firmy...

#Aktualności #Atak #Smtp #SmtpSmuggling

sekurak.pl/mozliwy-atak-smtp-s

#smtpsmuggling ... Zumindest für #Debian #Bullseye ist die gefixte #postfix 3.5.23 in den Repos...

postfix.org/smtp-smuggling.htm

2024-01-02

Long planned, but now with enhanced motivation due to #SMTPSmuggling attack I finally replaced my old #EMailServer based on #Postfix and applied the workarounds.

Beside that I completely replaced the server hardware and all the VMs for Calendar, Files and Web (last one still WIP).

🔗 sec-consult.com/blog/detail/sm

🔗 media.ccc.de/v/37c3-11782-smtp

🔗 postfix.org/smtp-smuggling.htm

Marcel SIneM(S)USsimsus@social.tchncs.de
2024-01-01
2023-12-31

@ParadeGrotesque
The patch for #SMTPSmuggling just landed in Debian Bullseye:
* 3.5.23 (Closes: #1059230)
- Addresses CVE-2023-51764, requires configuration change
- Security: with "smtpd_forbid_bare_newline = yes" (default "no" for Postfix < 3.9), reply with "Error: bare <LF> received" and disconnect when an SMTP client sends a line ending in <LF>, violating the RFC 5321 requirement that lines must end in <CR><LF>. This prevents SMTP smuggling attacks that target ...
bugs.debian.org/cgi-bin/bugrep

Gemma ⭐️🔰🇺🇸 🇵🇭 🎐gcvsa@mstdn.plus
2023-12-29

@Daojoan In order for this to be a truly viable reality, the FOSS community needs to massively step up their code privacy, security, and reliability practices. The average user cannot be put into the position of self-hosting insecure software without risking disaster.

Are you aware of the recent #SMTPSmuggling revelation scandal? That is the future to which you would doom everyone.

bert hubert 🇺🇦🇪🇺🇺🇦bert_hubert@fosstodon.org
2023-12-28

Prescient words from RFC 2821, "Simple Mail Transfer Protocol". #smtpsmuggling ietf.org/rfc/rfc2821.txt

2023-12-28

So, all in all, the whole #smtpsmuggling issue was based on clear-text protocols and servers/OSes that handle line ends differently? wow.. makes me even more a fan of binary protocols

#37c3
fahrplan.events.ccc.de/congres

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst