====== OpenBSD SMTPd ======
> **(!) NOTE:**
> //My words about maturity and documentation are rendered void by the development that has been happening since 4.6-release. By following -current, you will have access to better documentation, added features and a more stable smtpd.\\
Please read http://www.openbsd.org/faq/current.html for information on following -current.//
As of version 4.6 of [[http://www.openbsd.org/|OpenBSD]], a new alternative MTA is available.
The new smtpd daemon is named according to the simple naming scheme of most
other OpenBSD packages; it's name is simply 'smtpd'.
Assuming this will be ported to other *nixes like so many other OpenBSD projects,
this will probably in time also be know under the name OpenSMTPd.
What fascinated me about this new MTA, and made me want to try it out, is its
relatively simple, and very much OpenBSD-like configuration syntax. Stealing
the first example config from the man-page of [[http://www.openbsd.org/cgi-bin/man.cgi?query=smtpd.conf&sektion=5&arch=i386&apropos=0&manpath=OpenBSD+Current|smtpd.conf]], it may look somewhat similar to:
listen on lo0
accept for local deliver to mbox
accept for domain "example.org" relay via "mx1.example.org"
accept for domain "example.net" relay
This kind of syntax should be really familiar to people having touched pf.conf, snmpd.conf,
ntpd.conf and other OpenBSD BNF-based config files.
The documentation is at the moment slightly less-than-optimal in my personal view. smtpd is currently
still getting new features added, and code is still maturing, so it is not unexpected, and documentation
will most likely improve as the project matures. I am willing to accept the lack of early documentation,
and dive in nonetheless.
A note of caution: the version that shipped along with OpenBSD 4.6 is deemed secure, but the project is quite new,
and there is bound to be flaws exploitable for DoS on smtp. I would probably not put this MTA as my
frontline SMTP on a production environment quite yet.
This ingress was written 24. oct 2009. If you are reading this at a later time, do assume that
claims about documentation and flaws have been rendered void.
===== My use of smtpd =====
Currently I am running smtpd on my gateway system, where I also do packet filtering, nat and rdr.
The following is my uses of smtpd:
* In the home network, all port-25 traffic is transparently redirected to smtpd
* No authentication internally is required, but all outgoing mail is relayed via a relay-host that requires auth.
* This allows visitors to use any pre-existing MTA setup in their mail clients, I will simply "override" their settings, as long as they do not require TLS Auth.
* Externally, smtpd is listening to SMTPS with authentication required.
* I am running multiple mutt setups on multiple computers outside my home network. I wanted to have one MTA that I could configure for all those setups, without having to fiddle too much.
===== The setup =====
==== Remove the old mailer ====
First, we need to change from the default MTA, sendmail, to our new shiny smtpd. Start off by killing sendmail:
pkill sendmail
Next, change /etc/mailer.conf to reflect smtpd in stead of sendmail:
mv /etc/mailer.conf /etc/mailer.conf.sendmail
cat > /etc/mailer.conf << EOF
# Replacing sendmail with smtpd:
sendmail /usr/sbin/smtpctl
send-mail /usr/sbin/smtpctl
mailq /usr/sbin/smtpctl
makemap /usr/libexec/smtpd/makemap
newaliases /usr/libexec/smtpd/makemap
EOF
Rebuild the aliases database:
newaliases
Append the following to rc.conf.local to disable sendmail, and enable smtpd, at boot:
echo "sendmail_flags=NO" >> /etc/rc.conf.local
echo "smtpd_flags=" >> /etc/rc.conf.local
==== First config, trying things out: ====
The following sets smtpd up to listen on standard SMTP port 25 on the local loopback interface and the interface rl1,
which is an internal interface. All mail created lcoally, destined to "localhost", is to be delivered locally,
in mbox format. All mail coming in from the internal IP-range is to be relayed via a relayhost.
No authentication is used; not for incoming, and not for relaying.
# /etc/mail/smtpd.conf simple example
int_if = "rl1"
int_net = "10.0.3.0/24"
ext_if = "rl0"
listen on lo0
listen on $int_if
map "aliases" { source db "/etc/mail/aliases.db" }
accept for local deliver to mbox
accept from $int_net for all relay via smtp.example.com
Testing this out, start smtpd with the dead simple command:
smtpd
==== Adding authentication for relayhost ====
To add support for SMTP authentication when talking with a relay host, things get a little, but not much,
more involved.
SMTP relay username/password configuration is not stored in smtpd.conf. Instead, we need to add a secrets file.
Create the file /etc/mail/secrets:
touch /etc/mail/secrets
chown root:_smtpd /etc/mail/secrets
chmod 640 /etc/mail/secrets
The format of this file allows us to store username/password pairs for multiple SMTP hosts that we
want smtpd to talk authenticated TLS/SSL/SMTPS with. The format is to have definitions line by line:
smtp.host.name username:password
So, in a setup where we only talk to smtp.example.com, with username "theuser" and password "53cre37":
echo "smtp.example.com theuser:53cre37" > /etc/mail/secrets
After creating the file, with content, we need to make a data map of it:
makemap /etc/mail/secrets
This map needs to be added to our configuration, along with a statement that makes the relay
use authentication:
# /etc/mail/smtpd.conf simple relay authentication example
int_if = "rl1"
int_net = "10.0.3.0/24"
ext_if = "rl0"
listen on lo0
listen on $int_if
map aliases { source db "/etc/mail/aliases.db" }
map secrets { source db "/etc/mail/secrets.db" }
accept for local deliver to mbox
accept from $int_net for all relay via smtp.example.com tls enable auth
For sake of clarity, the available options to "relay via" at the moment are:
relay via host [port port] [ [tls | smtps | ssl] [certificate name] [enable auth] ]
==== Adding SMTPS with authentication ====
To be able to do authentication of clients connecting, at least a certificate for the interface
where the clients will be connecting is required. In my case, the interface that I want
to connect to using SMTPS and Auth is rl0.
mkdir -p /etc/mail/certs
openssl genrsa -out /etc/mail/certs/rl0.key 4096
openssl req -new -x509 -key /etc/mail/certs/rl0.key -out /etc/mail/certs/rl0.crt -days 365
Before adding configuration to use authentication, note the following detail: All authenticated users
will be treated as local! This means that all "accept" or "reject" lines in your config needs to
account for that.
# /etc/mail/smtpd.conf simple relay authentication example
int_if = "rl1"
int_net = "10.0.3.0/24"
ext_if = "rl0"
listen on lo0
listen on $int_if
listen on $ext_if smtps enable auth
map aliases { source db "/etc/mail/aliases.db" }
map secrets { source db "/etc/mail/secrets.db" }
accept for local deliver to mbox
accept from $int_net for all relay via smtp.example.com tls enable auth
accept for all relay via smtp.example.com tls enable auth
As far as I can tell, there is one significant limitation to SMTP Auth in smtpd currently:
users are authenticated against the local user database. This means that all users that
are to be authenticating their SMTP connections, have to have some form of local authentication
on the OpenBSD box serving SMTP. Yes, these accounts may be non-login-accounts, and yes,
external authentication mechanisms may be plugged into the OpenBSD auth system. But I personally would
really like to be able to have SMTP user accounts separate from user accounts on my SMTP gateway.
> //**Update**//: Different authentication backends are in the works!
> Posted the same day I wrote the article, gilles@ comments that mapping to db's and other backends is to come: http://undeadly.org/cgi?action=article&sid=20091013122256&pid=2
==== Adding SMTPS without authentication ====
I have a single host where I do not have the option of running TLS, SSL or SMTPS authentication (Mutt setup with limited SMTP support, and no option of installing an MTA helper). So, in addition to accepting SMTPS with authentication, I need to allow
this single host to send mail without auth. But, due to firewall restrictions, I need to run on a different port because of firewalling/packetfiltering between my system, and the computer in question. I am still using SMTPS for the heck of it; my mutt does support smtps/tls/ssl, it just does not understand auth...
So, expanding on the previous example, with 172.17.18.19 being my strange client:
# /etc/mail/smtpd.conf simple relay authentication example
int_if = "rl1"
int_net = "10.0.3.0/24"
ext_if = "rl0"
listen on lo0
listen on $int_if
listen on $ext_if port 587 smtps enable auth
map aliases { source db "/etc/mail/aliases.db" }
map secrets { source db "/etc/mail/secrets.db" }
accept for local deliver to mbox
accept from $int_net for all relay via smtp.example.com tls enable auth
accept for all relay via smtp.example.com tls enable auth
accept from 172.17.18.19 for all relay via smtp.example.com tls enable auth
So, the trick here is that authenticated users are treated as local users, while non-authenticated connections are treated as remote ones, and will have to match an "accept from" rule to pass.
To this config set, I have also thrown in a change to what port we are listening on on the external interface. SMTPS by default listens on port 465, here I have changed it to 587.
==== Different relays for different recipients ====
I want to use different relayhosts depending on where I deliver mail to, specifically, I want to deliver mails destined for GMail users directly to GMail. This additions showcases the fact that rules are selected on a first-match basis, so order does count when one or more of your rules contain "for all"...
# /etc/mail/smtpd.conf simple relay authentication example
int_if = "rl1"
int_net = "10.0.3.0/24"
ext_if = "rl0"
listen on lo0
listen on $int_if
listen on $ext_if port 587 smtps enable auth
map aliases { source db "/etc/mail/aliases.db" }
map secrets { source db "/etc/mail/secrets.db" }
accept for local deliver to mbox
accept from $int_net for all relay via smtp.example.com tls enable auth
accept for all relay via smtp.gmail.com tls enable auth
accept for all relay via smtp.example.com tls enable auth
accept from 172.17.18.19 for gmail.com relay via smtp.gmail.com tls enable auth
accept from 172.17.18.19 for all relay via smtp.example.com tls enable auth
By adding a new relay-host that uses SMTP auth, /etc/mail/secrets needs to be updated,
and makemap needs to be run.
echo "smtp.gmail.com gmail.username:passw0rd" >> /etc/mail/secrets
makemap /etc/mail/secrets
When working with different relays for different recipients, I also discovered some peculiarity.
The documentation tells that wildcards are supported. Make sure that you check the following if you
want to do wildcards:
Quotes are required on wildcards. Follow the syntax:
accept for domain example.com # <- This is valid, as it involves no wildcard.
accept for domain *.example.com # <- This is INvalid, wildcards require quotes
accept for domain "*.example.com" # <- This is valid syntax with wildcards.
... so it is probably best to get in the habit of adding quotes to all domains...
Check the scope of your wildcard. If you are running "mail.com", you probably do not
want your wildcard to glob "gmail.com" and "hotmail.com". So, add that dot. But when you
add that dot, your wildcard no longer matches the "stem". So, to match all "mail.com" adresses
without globbing too much, you need two "accept .. for" rules:
accept ... for domain "*.mail.com" ...
accept ... for domain "mail.com" ...
Also make sure you have your relaying chains set up for all __from__ definitions you have...
==== Multiple external IP addresses ====
My setup has several IP adresses on the external interface, yet I only want to listen
for connections on one of them. Selecting a single IP means we can no longer listen
on the interface, as smtpd will listen on all IP's by default. In stead we need to listen
to connections on the specific IP. For this to work with SMTPS/SSL/TLS, a certificate
valid for that IP, as well as a key file for the cert, needs to exist in
/etc/mail/certs. Assuming the global IP I want to listen for connections on is 172.20.0.12:
openssl genrsa -out /etc/mail/certs/172.20.0.12.key 4096
openssl req -new -x509 -key /etc/mail/certs/172.20.0.12.key -out /etc/mail/certs/172.20.0.12.crt -days 365
Next, we change from listening on an interface, to listening on an IP. In this config, I have dropped
using the macros (you could still stuff the IP in a macro):
# /etc/mail/smtpd.conf simple relay authentication example
listen on lo0
listen on rl1
listen on 172.20.0.12 port 587 smtps enable auth
map aliases { source db "/etc/mail/aliases.db" }
map secrets { source db "/etc/mail/secrets.db" }
accept for local deliver to mbox
accept from 10.0.3.0/24 for all relay via smtp.example.com tls enable auth
accept for all relay via smtp.gmail.com tls enable auth
accept for all relay via smtp.example.com tls enable auth
accept from 172.17.18.19 for gmail.com relay via smtp.gmail.com tls enable auth
accept from 172.17.18.19 for all relay via smtp.example.com tls enable auth
The trick to this, is that smtpd will not select a single IP from an interface, so you have
to configure the listening for the IP directly. By doing so, you have to have both .crt and .key
certificate data reflecting the IP in your /etc/mail/certs. There is an alternative to this autoselection,
but I think the documentation is really flaky on this.
Create your key, with a name you select, and the suffix .key, Then generate the certificate, with the
same name and suffix .crt. Now add the name of the certificate, with no path and no suffix, to
the "listen on ..." line. I created the files:
* /etc/mail/certs/smtp.example.com.key
* /etc/mail/certs/smtp.example.com.crt
Then I modified the listen-statement to:
listen on 172.20.0.12 port 587 smtps certificate smtp.example.com enable auth
If Gilles@ or any of the guys working on the code reads this: please update the documentation,
neither starttls(8), smtpd(8) or smtpd.conf(8) informs the user that smtpd does not handle full patchs
to the "certificate" option, and that certs need to live in /etc/mail/certs, regardless of wether the
cert is auto-located or manually defined.
==== Transparent redirection of SMTP ====
As mentioned early, I intended to do transparent redirection of internally generated mail.
This is naturally handled by pf. The configurations I am splaying now are closer to reality
than the previous ones, so it is probably also appropriate to add some info about my home setup:
=== The setup ===
* My connection to the world is handled by an OpenBSD installation with pf and NAT.
* My external connection has several IP-adresses on the interface rl0. For sake of example, let us call these:
* 172.16.81.241
* 172.16.81.242
* 172.16.81.243
* 172.16.81.244
* 172.16.81.245
* The first address is used for NAT of my internal "home" network
* The following addresses are binat'ed to my "DMZ" network
* I am running VLAN tagging to separate my networks:
* VLAN id 1 is used for netboxes, no user equipment. IP-range 10.0.1.0/24
* VLAN id 2 is used for DMZ, IP-range 10.0.2.0/24
* VLAN id 3 is used for my internal net, IP-range 10.0.3.0/24
* All VLAN's are mapped directly numeric to interface names.
* The internal network is fully nat'ed.
* The OpenBSD box holds the .1 IP-adress inn all VLANs.
* My troublesome external client has the IP 172.16.17.18
=== The smtpd.conf ===
listen on lo0
listen on vlan1
listen on vlan1 smtps certificate home.defcon.no
listen on 172.16.81.241 port 465 smtps certificate home.defcon.no enable auth
map "aliases" { source db "/etc/mail/aliases.db" }
map secrets { source db "/etc/mail/secrets.db" }
accept for local deliver to mbox
# I really would have liked the "from local" keyword.
# That one is available in CVS, but I am not running CVS -current :(
accept for domain "rt.defcon.no" relay via rt.home.defcon.no
accept for domain "*.defcon.no" relay via mail.defcon.no
accept for domain "defcon.no" relay via mail.defcon.no
# For the internal networks
accept from 10.0.0.0/22 for domain "rt.defcon.no" relay via rt.home.defcon.no
accept from 10.0.0.0/22 for domain "*.defcon.no" relay via mail.defcon.no
accept from 10.0.0.0/22 for domain "defcon.no" relay via mail.defcon.no
accept from 10.0.0.0/22 for domain gmail.com relay via smtp.gmail.com ssl enable auth
accept from 10.0.0.0/22 for all relay via smtp.hig.no tls enable auth
# For troublehost
accept from 172.16.17.18 for domain "rt.defcon.no" relay via rt.home.defcon.no
accept from 172.16.17.18 for domain "*.defcon.no" relay via mail.defcon.no
accept from 172.16.17.18 for domain "defcon.no" relay via mail.defcon.no
accept from 172.16.17.18 for domain gmail.com relay via smtp.gmail.com ssl enable auth
accept from 172.16.17.18 for all relay via smtp.hig.no tls enable auth
# All other (local) mail, including authenticated.
accept for all relay via smtp.hig.no tls enable auth
=== The pf.conf ===
# The internal network is NAT'ed
nat on rl0 from 10.0.3.0/24 -> 172.16.81.241
# ...while the 'DMZ' is binat'ed
binat on rl0 from 10.0.2.2 to any -> 172.16.81.242
binat on rl0 from 10.0.2.3 to any -> 172.16.81.243
binat on rl0 from 10.0.2.4 to any -> 172.16.81.244
binat on rl0 from 10.0.2.5 to any -> 172.16.81.245
# This is the transparent redirect! I am running smtpd on my
# VLAN1 IP so that the box it self is not trapped by rdr ;)
# I am also transparently redirecting SSL/SMTPS on both "standard" ports..
rdr pass on vlan2 proto tcp to any port 25 -> 10.0.1.1 port 25
rdr pass on vlan2 proto tcp to any port 465 -> 10.0.1.1 port 465
rdr pass on vlan2 proto tcp to any port 587 -> 10.0.1.1 port 465
rdr pass on vlan3 proto tcp to any port 25 -> 10.0.1.1 port 25
rdr pass on vlan3 proto tcp to any port 465 -> 10.0.1.1 port 465
rdr pass on vlan3 proto tcp to any port 587 -> 10.0.1.1 port 465
# Some filter rules for good measure... Nothe, this is absolutely not what
# is running in prod, but it is a minimum that works ;)
# Block all unknown traffic
block in log
# Permit all "known" traffic, unless we block it again later. And keep state!
pass in log on vlan2 keep state
pass in log on vlan3 keep state
# No, DMZ is not allowed to communicate with internal computers,
# unless asked to do so...
block in log on vlan2 inet to 10.0.3.0/24
# Allow rdr'ed and binat'ed traffic in to the DMZ
pass in log on rl0 inet from any to 10.0.2.2 keep state
pass in log on rl0 inet from any to 10.0.2.3 keep state
pass in log on rl0 inet from any to 10.0.2.4 keep state
pass in log on rl0 inet from any to 10.0.2.5 keep state
# Permit incoming SMTPS to gw.home.defcon.no from the world.
pass in log on rl0 inet proto tcp from any to 172.16.81.241 port 465
pass in log on rl0 inet proto tcp from any to 172.16.81.241 port 587
# But block any unsolicited SMTP
block in log on rl0 inet proto tcp from any to 10.0.2.0/24 port 25
So, that was a bit more pf.conf listing that strictly needed for the smtpd
example, so here are the relevant parts separated:
rdr pass on vlan2 proto tcp to any port 25 -> 10.0.1.1 port 25
rdr pass on vlan2 proto tcp to any port 465 -> 10.0.1.1 port 465
rdr pass on vlan2 proto tcp to any port 587 -> 10.0.1.1 port 465
rdr pass on vlan3 proto tcp to any port 25 -> 10.0.1.1 port 25
rdr pass on vlan3 proto tcp to any port 465 -> 10.0.1.1 port 465
rdr pass on vlan3 proto tcp to any port 587 -> 10.0.1.1 port 465
pass in log on rl0 inet proto tcp from any to 172.16.81.241 port 465
pass in log on rl0 inet proto tcp from any to 172.16.81.241 port 587
===== Final words =====
The new smtpd in OpenBSD is, as you hopefull have seen through my examples, really very
simple to set up and configure. It has tolerated my stress-testing really well, and shows
great promise.
The version that ships with OpenBSD 4.6 is probably not something I personally would put
into production for a large-scale system quite yet, but work is progressing with good
updates in CVS, and I am expecting this to be "large-scale capable" by the time 4.7 is
out. But to achieve main-stream adoption, the documentation really needs more content
and more examples.
For a smaller setup, like a small to medium company, or home use, smtpd is really quite
complete, and a lot less pain to get running than most other MTA's.
In this walk-through, I have not touched on virtual domains at all, and that is
probably for the better, as the implementation if virtual domains in 4.6 (release) and
CVS (current) is quite different.
My next step is to re-introduce my old spamd setup, and get spamd and smtpd to "talk nice"
with each other, while still maintaining separate logic for internal and external use.
I would really love to see a sensible way to handle authentication for non-local user accounts.
This may really already be supported somehow, and if that is the case, my knowledge of
BSD Auth is apparently not aboce "newb" level...
> //**Update**//: Different authentication backends are in the works!
> Check the comment under the heading [[#Adding SMTPS with authentication]].
> **(!) NOTE:**\\
> //My words about maturity and documentation are rendered void by the
> development that has been happening since 4.6-release. By following -current,
> you will have access to better documentation, added features and a more stable smtpd.
> Please read http://www.openbsd.org/faq/current.html for information on following -current.//