Closed chriscroome closed 10 months ago
smtpd_data_restrictions
is probably not worth it as it does not stop all forms of this attack. However, a new stable version of Postfix was just released with a proper fix:
A long-term fix is now available for Postfix 3.8.4, 3.7.9, 3.6.13 and 3.5.23. This stops all forms of the smuggling attacks on recipients at a Postfix server. It introduces a new optional feature that is disabled by default.
With "smtpd_forbid_bare_newline = yes", the Postfix SMTP server disconnects a remote SMTP client that sends a line ending in a 'bare newline'. The default setting is "no".
I believe we are using Postfix from Debian Bullseye, so it might be another day before the updated package is available: https://security-tracker.debian.org/tracker/source-package/postfix
Debian Bullseye still hasn't received an updated Postfix package. Neither has Bookworm, for that matter, so rebuilding the image with a newer Debian version won't help either. We'll have to continue waiting. Comments on https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059230 suggest that the update should be coming today.
There is a Postfix update now available for Debian Bullseye version 3.5.23-0+deb11u1
.
Should be fixed in https://github.com/mailcow/mailcow-dockerized/pull/5623
Summary
Update the Postfix configuration with the suggested short-term workarounds.
Motivation
Security and spoofing.
Additional context