<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:media="http://search.yahoo.com/mrss/" 
	>
<channel>
	<title>
	Comments for Random thoughts	</title>
	<atom:link href="https://random.sphere.ro/comments/feed/" rel="self" type="application/rss+xml" />
	<link>https://random.sphere.ro</link>
	<description>for when you get older and memory does&#039;t help you further</description>
	<lastBuildDate>Fri, 16 Aug 2024 17:17:12 +0000</lastBuildDate>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.7.5</generator>
	<item>
		<title>
		Comment on Photoshop to Epson L850 printing by innentüren		</title>
		<link>https://random.sphere.ro/photoshop-to-epson-l850-printing/#comment-2288</link>

		<dc:creator><![CDATA[innentüren]]></dc:creator>
		<pubDate>Fri, 16 Aug 2024 17:17:12 +0000</pubDate>
		<guid isPermaLink="false">https://random.sphere.ro/?p=19#comment-2288</guid>

					<description><![CDATA[Nice answer back in return of this question with solid arguments 
and explaining all about that.]]></description>
			<content:encoded><![CDATA[<p>Nice answer back in return of this question with solid arguments<br />
and explaining all about that.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		Comment on DMARC / Spamassassin / Qmail by iulian		</title>
		<link>https://random.sphere.ro/dmarc-on-spamassassin/#comment-767</link>

		<dc:creator><![CDATA[iulian]]></dc:creator>
		<pubDate>Wed, 19 Oct 2022 08:37:17 +0000</pubDate>
		<guid isPermaLink="false">https://random.sphere.ro/?p=93#comment-767</guid>

					<description><![CDATA[In reply to &lt;a href=&quot;https://random.sphere.ro/dmarc-on-spamassassin/#comment-499&quot;&gt;Chris&lt;/a&gt;.

Sorry but i don&#039;t get your point. This post is not about what is visible to end-user but more about combining different technologies ( SPF, DKIM and DMARC) in such way to add more value to Spammassassin. 
Since DMARC was not present in  Spammassasin  by default trough a plugin this was/is a technique to bring also DMARC in equation. It doesn&#039;t mean that you don&#039;t check anymore anything else.]]></description>
			<content:encoded><![CDATA[<p>In reply to <a href="https://random.sphere.ro/dmarc-on-spamassassin/#comment-499">Chris</a>.</p>
<p>Sorry but i don&#8217;t get your point. This post is not about what is visible to end-user but more about combining different technologies ( SPF, DKIM and DMARC) in such way to add more value to Spammassassin.<br />
Since DMARC was not present in  Spammassasin  by default trough a plugin this was/is a technique to bring also DMARC in equation. It doesn&#8217;t mean that you don&#8217;t check anymore anything else.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		Comment on DMARC / Spamassassin / Qmail by Chris		</title>
		<link>https://random.sphere.ro/dmarc-on-spamassassin/#comment-499</link>

		<dc:creator><![CDATA[Chris]]></dc:creator>
		<pubDate>Fri, 25 Feb 2022 12:59:47 +0000</pubDate>
		<guid isPermaLink="false">https://random.sphere.ro/?p=93#comment-499</guid>

					<description><![CDATA[Am I right that these rules don&#039;t work correctly (and might be quite easy to avoid by spammers) when it comes to mails that use different domains in the &quot;From&quot; header address and the envelope sender?

Ordinary SPF (and therefore the spamassassin SPF_PASS test) only works with the envelope sender, which is often not visible to users. DKIM and DMARC are supposed to check the &quot;From&quot; header address, however the rules in this blog post will ignore this address if only the envelope sender address passes the SPF checks.]]></description>
			<content:encoded><![CDATA[<p>Am I right that these rules don&#8217;t work correctly (and might be quite easy to avoid by spammers) when it comes to mails that use different domains in the &#8220;From&#8221; header address and the envelope sender?</p>
<p>Ordinary SPF (and therefore the spamassassin SPF_PASS test) only works with the envelope sender, which is often not visible to users. DKIM and DMARC are supposed to check the &#8220;From&#8221; header address, however the rules in this blog post will ignore this address if only the envelope sender address passes the SPF checks.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		Comment on dovecot block login per country / ip2location / geoip by iulian		</title>
		<link>https://random.sphere.ro/dovecot-block-login-per-country-ip2location-geoip/#comment-199</link>

		<dc:creator><![CDATA[iulian]]></dc:creator>
		<pubDate>Tue, 02 Feb 2021 21:35:53 +0000</pubDate>
		<guid isPermaLink="false">https://random.sphere.ro/?p=105#comment-199</guid>

					<description><![CDATA[In reply to &lt;a href=&quot;https://random.sphere.ro/dovecot-block-login-per-country-ip2location-geoip/#comment-198&quot;&gt;J&lt;/a&gt;.

Hello,

The idea was have a restriction per country per email. For example one user can access his email from DE but another user have DE banned.
The above cannot be done with iptables/ipset. It is useful indeed when you want to block certain countries for all emails. For example you know that nobody will login to your email server from CN and you want to block it.]]></description>
			<content:encoded><![CDATA[<p>In reply to <a href="https://random.sphere.ro/dovecot-block-login-per-country-ip2location-geoip/#comment-198">J</a>.</p>
<p>Hello,</p>
<p>The idea was have a restriction per country per email. For example one user can access his email from DE but another user have DE banned.<br />
The above cannot be done with iptables/ipset. It is useful indeed when you want to block certain countries for all emails. For example you know that nobody will login to your email server from CN and you want to block it.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		Comment on dovecot block login per country / ip2location / geoip by J		</title>
		<link>https://random.sphere.ro/dovecot-block-login-per-country-ip2location-geoip/#comment-198</link>

		<dc:creator><![CDATA[J]]></dc:creator>
		<pubDate>Mon, 01 Feb 2021 03:52:28 +0000</pubDate>
		<guid isPermaLink="false">https://random.sphere.ro/?p=105#comment-198</guid>

					<description><![CDATA[Have recently discovered iptables + ipset + country lists
Seems very fast and doesn&#039;t require mysql. You might wish to compare]]></description>
			<content:encoded><![CDATA[<p>Have recently discovered iptables + ipset + country lists<br />
Seems very fast and doesn&#8217;t require mysql. You might wish to compare</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		Comment on qmail to exim migration (thoughts and not commands) by iulian		</title>
		<link>https://random.sphere.ro/qmail-to-exim-migration-thoughts-and-not-commands/#comment-192</link>

		<dc:creator><![CDATA[iulian]]></dc:creator>
		<pubDate>Wed, 13 Jan 2021 11:29:07 +0000</pubDate>
		<guid isPermaLink="false">https://random.sphere.ro/?p=117#comment-192</guid>

					<description><![CDATA[In reply to &lt;a href=&quot;https://random.sphere.ro/qmail-to-exim-migration-thoughts-and-not-commands/#comment-189&quot;&gt;Erwin Hoffmann&lt;/a&gt;.

Thanks for writing. I am not an expert on s/qmail and if i said something which is not true I prefer to that everyone will raise a flag and i will correct it asap.
Now, regarding s/qmail and qmail-spp functionality i usually use my own scripts/logic on different stages.
Just some examples: 
1) i want to reject connections if HELO/EHLO is not RFC2821 and i want to do this as soon as possible ( connection/helo stage)
2) for some reasons (maybe better logging) i will temporary move the same on the [mail] stage or even when [rcpt] is presented.
3) maybe i don&#039;t want to use RBL on connection because i want better logging (ex: who send to whom, etc)
4) maybe based on some other checks executed on earlier stages i want to tarpit / greylist / whatever before going further. 

Those can be easily achieved in exim and even with qmail/qmail-spp. If you said that you can implement the same with s/qmail than i am very happy to hear and i will obviously change what i wrote months ago.

Btw, do you plan to include it in distros where anyway software is compiled when install ? (ex: Gentoo )]]></description>
			<content:encoded><![CDATA[<p>In reply to <a href="https://random.sphere.ro/qmail-to-exim-migration-thoughts-and-not-commands/#comment-189">Erwin Hoffmann</a>.</p>
<p>Thanks for writing. I am not an expert on s/qmail and if i said something which is not true I prefer to that everyone will raise a flag and i will correct it asap.<br />
Now, regarding s/qmail and qmail-spp functionality i usually use my own scripts/logic on different stages.<br />
Just some examples:<br />
1) i want to reject connections if HELO/EHLO is not RFC2821 and i want to do this as soon as possible ( connection/helo stage)<br />
2) for some reasons (maybe better logging) i will temporary move the same on the [mail] stage or even when [rcpt] is presented.<br />
3) maybe i don&#8217;t want to use RBL on connection because i want better logging (ex: who send to whom, etc)<br />
4) maybe based on some other checks executed on earlier stages i want to tarpit / greylist / whatever before going further. </p>
<p>Those can be easily achieved in exim and even with qmail/qmail-spp. If you said that you can implement the same with s/qmail than i am very happy to hear and i will obviously change what i wrote months ago.</p>
<p>Btw, do you plan to include it in distros where anyway software is compiled when install ? (ex: Gentoo )</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		Comment on qmail to exim migration (thoughts and not commands) by Erwin Hoffmann		</title>
		<link>https://random.sphere.ro/qmail-to-exim-migration-thoughts-and-not-commands/#comment-189</link>

		<dc:creator><![CDATA[Erwin Hoffmann]]></dc:creator>
		<pubDate>Sun, 10 Jan 2021 21:16:30 +0000</pubDate>
		<guid isPermaLink="false">https://random.sphere.ro/?p=117#comment-189</guid>

					<description><![CDATA[Hi, 
using your own set of patches for any (open source product) is not a good choice IMHO. 
s/qmail does not need the qmail-spp patch. It provides those functions out of the box.
Of course, any new product has its strong learning curve. (--eh).]]></description>
			<content:encoded><![CDATA[<p>Hi,<br />
using your own set of patches for any (open source product) is not a good choice IMHO.<br />
s/qmail does not need the qmail-spp patch. It provides those functions out of the box.<br />
Of course, any new product has its strong learning curve. (&#8211;eh).</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		Comment on DMARC / Spamassassin / Qmail by iulian		</title>
		<link>https://random.sphere.ro/dmarc-on-spamassassin/#comment-113</link>

		<dc:creator><![CDATA[iulian]]></dc:creator>
		<pubDate>Fri, 04 Sep 2020 06:53:51 +0000</pubDate>
		<guid isPermaLink="false">https://random.sphere.ro/?p=93#comment-113</guid>

					<description><![CDATA[In reply to &lt;a href=&quot;https://random.sphere.ro/dmarc-on-spamassassin/#comment-112&quot;&gt;A&lt;/a&gt;.

It was never about the math. 
You math is fine and i understand your point but you started your investigation from the fact that in order for DMARC to pass you should have DKIM OR(and not AND) SPF to pass.

Actually the DMARC specs ( if you read &lt;a href=&quot;https://tools.ietf.org/html/rfc7489&quot; rel=&quot;nofollow ugc&quot;&gt;RFC7489&lt;/a&gt;) is leaving a lot of space for interpretation. Plus this is not a standard but an informational RFC.

Just two examples:
&lt;strong&gt;1)&lt;/strong&gt; is actually is enforcing that DMARC  should not replace local policy.
I quote: &quot;&lt;em&gt;Mail Receivers MAY choose to reject or quarantine email even if email passes the DMARC mechanism check.  The DMARC mechanism does not inform Mail Receivers whether an email stream is &quot;good&quot;.  Mail Receivers are encouraged to maintain anti-abuse technologies to combat the possibility of DMARC-enabled criminal campaigns.&lt;/em&gt;&quot;
&lt;strong&gt;2)&lt;/strong&gt; is saying that &quot;&lt;em&gt;different treatment of messages that are not authenticated versus those that fail authentication&lt;/em&gt;&quot; is not in the scope of this RFC.

It was never about &quot;&#038;&#038; &#124;&#124;&quot; but about how sure i am when i want to reject. Since both DKIM and SPF have their own flows which can be exploited in the benefit of a rogue actor i want to be very sure when i REJECT that message. Moreover my approach(which you might think is more relaxed) is also covering the situation when you don&#039;t have the correct information about a DKIM/SPF due to a DNS issue at that time.

Long story short i prefer to build on a scoring mechanism and double check the info(in my case DKIM and SPF must fail for a DMARC rejection) rather than immediately rejecting based on only one of them.
In an ideal world where all the e-mail/domain administrator will correctly cover DKIM/SPF/DMARC than you might think to put &#038;&#038; instead &#124;&#124;. In this world where false positive can be easily created due to unmaintained/incorrectly configuration i prefer to double check. Hope that make more sense now.]]></description>
			<content:encoded><![CDATA[<p>In reply to <a href="https://random.sphere.ro/dmarc-on-spamassassin/#comment-112">A</a>.</p>
<p>It was never about the math.<br />
You math is fine and i understand your point but you started your investigation from the fact that in order for DMARC to pass you should have DKIM OR(and not AND) SPF to pass.</p>
<p>Actually the DMARC specs ( if you read <a href="https://tools.ietf.org/html/rfc7489" rel="nofollow ugc">RFC7489</a>) is leaving a lot of space for interpretation. Plus this is not a standard but an informational RFC.</p>
<p>Just two examples:<br />
<strong>1)</strong> is actually is enforcing that DMARC  should not replace local policy.<br />
I quote: &#8220;<em>Mail Receivers MAY choose to reject or quarantine email even if email passes the DMARC mechanism check.  The DMARC mechanism does not inform Mail Receivers whether an email stream is &#8220;good&#8221;.  Mail Receivers are encouraged to maintain anti-abuse technologies to combat the possibility of DMARC-enabled criminal campaigns.</em>&#8221;<br />
<strong>2)</strong> is saying that &#8220;<em>different treatment of messages that are not authenticated versus those that fail authentication</em>&#8221; is not in the scope of this RFC.</p>
<p>It was never about &#8220;&amp;&amp; ||&#8221; but about how sure i am when i want to reject. Since both DKIM and SPF have their own flows which can be exploited in the benefit of a rogue actor i want to be very sure when i REJECT that message. Moreover my approach(which you might think is more relaxed) is also covering the situation when you don&#8217;t have the correct information about a DKIM/SPF due to a DNS issue at that time.</p>
<p>Long story short i prefer to build on a scoring mechanism and double check the info(in my case DKIM and SPF must fail for a DMARC rejection) rather than immediately rejecting based on only one of them.<br />
In an ideal world where all the e-mail/domain administrator will correctly cover DKIM/SPF/DMARC than you might think to put &amp;&amp; instead ||. In this world where false positive can be easily created due to unmaintained/incorrectly configuration i prefer to double check. Hope that make more sense now.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		Comment on DMARC / Spamassassin / Qmail by A		</title>
		<link>https://random.sphere.ro/dmarc-on-spamassassin/#comment-112</link>

		<dc:creator><![CDATA[A]]></dc:creator>
		<pubDate>Wed, 02 Sep 2020 17:21:58 +0000</pubDate>
		<guid isPermaLink="false">https://random.sphere.ro/?p=93#comment-112</guid>

					<description><![CDATA[Well setting p=none is your outbound policy, what you expect others to do. What we are talking about here is what you will do with email you&#039;re receiving given another domains policy instruction. The DMARC spec reads if EITHER fails you should do what the domain instructs you to do. but if you&#039;d like to make it so BOTH must fail you can, the beauty of the comment above is the explanation of the logic and therefor choice, but to be compliant with what should be happening it should be if either one fails. so the &#038;&#038; logic. If you want to take into account the domain alignment and such this method wont work, but it&#039;s quick and dirty and will work for most email.]]></description>
			<content:encoded><![CDATA[<p>Well setting p=none is your outbound policy, what you expect others to do. What we are talking about here is what you will do with email you&#8217;re receiving given another domains policy instruction. The DMARC spec reads if EITHER fails you should do what the domain instructs you to do. but if you&#8217;d like to make it so BOTH must fail you can, the beauty of the comment above is the explanation of the logic and therefor choice, but to be compliant with what should be happening it should be if either one fails. so the &amp;&amp; logic. If you want to take into account the domain alignment and such this method wont work, but it&#8217;s quick and dirty and will work for most email.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		Comment on DMARC / Spamassassin / Qmail by iulian		</title>
		<link>https://random.sphere.ro/dmarc-on-spamassassin/#comment-111</link>

		<dc:creator><![CDATA[iulian]]></dc:creator>
		<pubDate>Wed, 02 Sep 2020 10:55:24 +0000</pubDate>
		<guid isPermaLink="false">https://random.sphere.ro/?p=93#comment-111</guid>

					<description><![CDATA[Unfortunately you started from the assumption that you need to configure either DKIM or SPF in order to have DMARC working properly.
I want that both SPF and DKIM to fail especially when it&#039;s about such a punitive action as REJECT. Moreover SPF and DKIM may be altered during transit(forward for example) and we don&#039;t want to discard a perfect valid email because of that.
For the above reasons when you start to deploy DMARC you start with &quot;p=none&quot;. In this way no punitive action will be made when errors are occurring in SPF or DKIM.

Please see other details on: https://dmarc.org/wiki/FAQ#How_does_DMARC_work.2C_briefly.2C_and_in_non-technical_terms.3F]]></description>
			<content:encoded><![CDATA[<p>Unfortunately you started from the assumption that you need to configure either DKIM or SPF in order to have DMARC working properly.<br />
I want that both SPF and DKIM to fail especially when it&#8217;s about such a punitive action as REJECT. Moreover SPF and DKIM may be altered during transit(forward for example) and we don&#8217;t want to discard a perfect valid email because of that.<br />
For the above reasons when you start to deploy DMARC you start with &#8220;p=none&#8221;. In this way no punitive action will be made when errors are occurring in SPF or DKIM.</p>
<p>Please see other details on: <a href="https://dmarc.org/wiki/FAQ#How_does_DMARC_work.2C_briefly.2C_and_in_non-technical_terms.3F" rel="nofollow ugc">https://dmarc.org/wiki/FAQ#How_does_DMARC_work.2C_briefly.2C_and_in_non-technical_terms.3F</a></p>
]]></content:encoded>
		
			</item>
	</channel>
</rss>
