- Edited
There is a new attack against Postfix: SMTP Smuggling, please read: https://www.postfix.org/smtp-smuggling.html
Debian already implemented the fix, but we need to modify /etc/postfix/main.cf
and restart Postfix.
Add this lines at the end of the file
/etc/postfix/main.cf
:# SMTP Smuggling - https://www.postfix.org/smtp-smuggling.html # Optionally disconnect remote SMTP clients that send bare newlines, # but allow local clients with non-standard SMTP implementations # such as netcat, fax machines, or load balancer health checks. smtpd_forbid_bare_newline = yes smtpd_forbid_bare_newline_exclusions = $mynetworks #
Please note: SuSE did not implement this fix up to today (1.1.2024). I hope, SuSE will implement the fix in the next days. If you are on an SuSE system, please read the article mentioned above, for some suggestions how to implement a temporary fix on your system. You my add this lines also to an Postfix on SuSE, when SuSE implements the fix, the configuration is already in place.
Set the compatibility level to 3.7 (a requirement):
postconf compatibility_level=3.7
Check the Postfix configuration:
postfix check
Please not, Debian should not report any issues, SuSE should report two unused parameters (smtpd_forbid_bare_newline=yes and smtpd_forbid_bare_newline_exclusions=$mynetworks) as long as SuSE did not implement the fix.Restart Postfix:
systemctl restart postfix
Debian, the fix is now active. SuSE see above.
For the fix on Open SuSE 15.6, see the post #. 12: https://community.grommunio.com/d/1393-postfix-smtp-smuggling-attack/12