From 8611ab80eddafb72bdd217509c2b80891dd2b5fc Mon Sep 17 00:00:00 2001 From: Stephen Smoogen Date: Wed, 29 May 2019 15:57:22 +0000 Subject: [PATCH] put in proper checks like we have for other domains --- handlers/restart_services.yml | 3 - roles/base/files/postfix/header_checks | 496 ------------------ .../base/files/postfix/header_checks.gateway | 496 ------------------ .../base/files/postfix/header_checks.mm-smtp | 496 ------------------ .../files/postfix/main.cf/main.cf.gateway | 6 +- roles/base/tasks/postfix.yml | 20 +- 6 files changed, 8 insertions(+), 1509 deletions(-) delete mode 100644 roles/base/files/postfix/header_checks delete mode 100644 roles/base/files/postfix/header_checks.gateway delete mode 100644 roles/base/files/postfix/header_checks.mm-smtp diff --git a/handlers/restart_services.yml b/handlers/restart_services.yml index 9e9b563c9a..d59dc9f783 100644 --- a/handlers/restart_services.yml +++ b/handlers/restart_services.yml @@ -95,9 +95,6 @@ - name: rebuild postfix tls_policy command: /usr/sbin/postmap /etc/postfix/tls_policy -- name: rebuild postfix header_checks - command: /usr/sbin/postmap /etc/postfix/header_checks - - name: restart postfix service: name=postfix state=restarted diff --git a/roles/base/files/postfix/header_checks b/roles/base/files/postfix/header_checks deleted file mode 100644 index 490e214c72..0000000000 --- a/roles/base/files/postfix/header_checks +++ /dev/null @@ -1,496 +0,0 @@ -# HEADER_CHECKS(5) HEADER_CHECKS(5) -# -# NAME -# header_checks - Postfix built-in content inspection -# -# SYNOPSIS -# header_checks = pcre:/etc/postfix/header_checks -# mime_header_checks = pcre:/etc/postfix/mime_header_checks -# nested_header_checks = pcre:/etc/postfix/nested_header_checks -# body_checks = pcre:/etc/postfix/body_checks -# -# milter_header_checks = pcre:/etc/postfix/milter_header_checks -# -# smtp_header_checks = pcre:/etc/postfix/smtp_header_checks -# smtp_mime_header_checks = pcre:/etc/postfix/smtp_mime_header_checks -# smtp_nested_header_checks = pcre:/etc/postfix/smtp_nested_header_checks -# smtp_body_checks = pcre:/etc/postfix/smtp_body_checks -# -# postmap -q "string" pcre:/etc/postfix/filename -# postmap -q - pcre:/etc/postfix/filename $/ -# REJECT IFRAME vulnerability exploit -# -# SEE ALSO -# cleanup(8), canonicalize and enqueue Postfix message -# pcre_table(5), format of PCRE lookup tables -# regexp_table(5), format of POSIX regular expression tables -# postconf(1), Postfix configuration utility -# postmap(1), Postfix lookup table management -# postsuper(1), Postfix janitor -# postcat(1), show Postfix queue file contents -# RFC 2045, base64 and quoted-printable encoding rules -# RFC 2047, message header encoding for non-ASCII text -# -# README FILES -# Use "postconf readme_directory" or "postconf html_direc- -# tory" to locate this information. -# DATABASE_README, Postfix lookup table overview -# CONTENT_INSPECTION_README, Postfix content inspection overview -# BUILTIN_FILTER_README, Postfix built-in content inspection -# BACKSCATTER_README, blocking returned forged mail -# -# LICENSE -# The Secure Mailer license must be distributed with this -# software. -# -# AUTHOR(S) -# Wietse Venema -# IBM T.J. Watson Research -# P.O. Box 704 -# Yorktown Heights, NY 10598, USA -# -# HEADER_CHECKS(5) diff --git a/roles/base/files/postfix/header_checks.gateway b/roles/base/files/postfix/header_checks.gateway deleted file mode 100644 index 490e214c72..0000000000 --- a/roles/base/files/postfix/header_checks.gateway +++ /dev/null @@ -1,496 +0,0 @@ -# HEADER_CHECKS(5) HEADER_CHECKS(5) -# -# NAME -# header_checks - Postfix built-in content inspection -# -# SYNOPSIS -# header_checks = pcre:/etc/postfix/header_checks -# mime_header_checks = pcre:/etc/postfix/mime_header_checks -# nested_header_checks = pcre:/etc/postfix/nested_header_checks -# body_checks = pcre:/etc/postfix/body_checks -# -# milter_header_checks = pcre:/etc/postfix/milter_header_checks -# -# smtp_header_checks = pcre:/etc/postfix/smtp_header_checks -# smtp_mime_header_checks = pcre:/etc/postfix/smtp_mime_header_checks -# smtp_nested_header_checks = pcre:/etc/postfix/smtp_nested_header_checks -# smtp_body_checks = pcre:/etc/postfix/smtp_body_checks -# -# postmap -q "string" pcre:/etc/postfix/filename -# postmap -q - pcre:/etc/postfix/filename $/ -# REJECT IFRAME vulnerability exploit -# -# SEE ALSO -# cleanup(8), canonicalize and enqueue Postfix message -# pcre_table(5), format of PCRE lookup tables -# regexp_table(5), format of POSIX regular expression tables -# postconf(1), Postfix configuration utility -# postmap(1), Postfix lookup table management -# postsuper(1), Postfix janitor -# postcat(1), show Postfix queue file contents -# RFC 2045, base64 and quoted-printable encoding rules -# RFC 2047, message header encoding for non-ASCII text -# -# README FILES -# Use "postconf readme_directory" or "postconf html_direc- -# tory" to locate this information. -# DATABASE_README, Postfix lookup table overview -# CONTENT_INSPECTION_README, Postfix content inspection overview -# BUILTIN_FILTER_README, Postfix built-in content inspection -# BACKSCATTER_README, blocking returned forged mail -# -# LICENSE -# The Secure Mailer license must be distributed with this -# software. -# -# AUTHOR(S) -# Wietse Venema -# IBM T.J. Watson Research -# P.O. Box 704 -# Yorktown Heights, NY 10598, USA -# -# HEADER_CHECKS(5) diff --git a/roles/base/files/postfix/header_checks.mm-smtp b/roles/base/files/postfix/header_checks.mm-smtp deleted file mode 100644 index 490e214c72..0000000000 --- a/roles/base/files/postfix/header_checks.mm-smtp +++ /dev/null @@ -1,496 +0,0 @@ -# HEADER_CHECKS(5) HEADER_CHECKS(5) -# -# NAME -# header_checks - Postfix built-in content inspection -# -# SYNOPSIS -# header_checks = pcre:/etc/postfix/header_checks -# mime_header_checks = pcre:/etc/postfix/mime_header_checks -# nested_header_checks = pcre:/etc/postfix/nested_header_checks -# body_checks = pcre:/etc/postfix/body_checks -# -# milter_header_checks = pcre:/etc/postfix/milter_header_checks -# -# smtp_header_checks = pcre:/etc/postfix/smtp_header_checks -# smtp_mime_header_checks = pcre:/etc/postfix/smtp_mime_header_checks -# smtp_nested_header_checks = pcre:/etc/postfix/smtp_nested_header_checks -# smtp_body_checks = pcre:/etc/postfix/smtp_body_checks -# -# postmap -q "string" pcre:/etc/postfix/filename -# postmap -q - pcre:/etc/postfix/filename $/ -# REJECT IFRAME vulnerability exploit -# -# SEE ALSO -# cleanup(8), canonicalize and enqueue Postfix message -# pcre_table(5), format of PCRE lookup tables -# regexp_table(5), format of POSIX regular expression tables -# postconf(1), Postfix configuration utility -# postmap(1), Postfix lookup table management -# postsuper(1), Postfix janitor -# postcat(1), show Postfix queue file contents -# RFC 2045, base64 and quoted-printable encoding rules -# RFC 2047, message header encoding for non-ASCII text -# -# README FILES -# Use "postconf readme_directory" or "postconf html_direc- -# tory" to locate this information. -# DATABASE_README, Postfix lookup table overview -# CONTENT_INSPECTION_README, Postfix content inspection overview -# BUILTIN_FILTER_README, Postfix built-in content inspection -# BACKSCATTER_README, blocking returned forged mail -# -# LICENSE -# The Secure Mailer license must be distributed with this -# software. -# -# AUTHOR(S) -# Wietse Venema -# IBM T.J. Watson Research -# P.O. Box 704 -# Yorktown Heights, NY 10598, USA -# -# HEADER_CHECKS(5) diff --git a/roles/base/files/postfix/main.cf/main.cf.gateway b/roles/base/files/postfix/main.cf/main.cf.gateway index ed97d93344..294a6e6bd2 100644 --- a/roles/base/files/postfix/main.cf/main.cf.gateway +++ b/roles/base/files/postfix/main.cf/main.cf.gateway @@ -561,7 +561,7 @@ recipient_delimiter = + # # For details, see "man header_checks". # -header_checks = regexp:/etc/postfix/header_checks +#header_checks = regexp:/etc/postfix/header_checks # FAST ETRN SERVICE # @@ -745,3 +745,7 @@ smtp_tls_CAfile = /etc/pki/tls/certs/ca-bundle.crt smtpd_milters = inet:localhost:8891 milter_default_action = accept inet_protocols = ipv4 + +# Deny email from some domains +smtpd_sender_restrictions = regexp:/etc/postfix/sender_access + diff --git a/roles/base/tasks/postfix.yml b/roles/base/tasks/postfix.yml index 6e8162de66..e6c93a98d6 100644 --- a/roles/base/tasks/postfix.yml +++ b/roles/base/tasks/postfix.yml @@ -32,7 +32,9 @@ - name: Deploy sender_access file copy: src="{{private}}/files/smtpd/sender_access.{{postfix_group}}" dest="/etc/postfix/sender_access" - when: postfix_group == "smtp-mm" or postfix_group == "mailman" + when: postfix_group == "smtp-mm" or postfix_group == "mailman" or postfix_group == "gateway" + notify: + - restart postfix tags: - postfix - config @@ -55,22 +57,6 @@ - base - config -- name: install /etc/postfix/header_checks file - copy: src={{ item }} dest=/etc/postfix/header_checks - with_first_found: - - "postfix/header_checks.{{ inventory_hostname }}" - - "postfix/header_checks.{{ host_group }}" - - "postfix/header_checks.{{ postfix_group }}" - - "postfix/header_checks.{{ datacenter }}" - - "postfix/header_checks" - notify: - - rebuild postfix header_checks - - restart postfix - tags: - - postfix - - config - - base - - name: create /etc/postfix/tls_policy copy: src="postfix/tls_policy" dest=/etc/postfix/tls_policy when: inventory_hostname.startswith(('bastion','smtp-mm'))