Jump to content

Qmail: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
fix netqmail date
s/qmail -> 4.0.07
Line 34: Line 34:
{{Infobox software
{{Infobox software
| name = s/qmail
| name = s/qmail
| latest release version = 4.0.06
| latest release version = 4.0.07
| latest release date = {{release date|2020|05|04}}
| latest release date = {{release date|2020|05|20}}
| website = {{URL|fehcom.de/sqmail/}}
| website = {{URL|fehcom.de/sqmail/}}
}}
}}

Revision as of 12:10, 5 June 2020

qmail
Developer(s)Daniel J. Bernstein
Stable release
1.03 / June 15, 1998 (1998-06-15)
Repositorycr.yp.to/software/qmail-1.03.tar.gz
Written inC
Operating systemUnix-like
TypeMail transfer agent
Licensepublic domain[1]
Websitecr.yp.to/qmail.html


netqmail
Stable release
1.06 / November 30, 2007 (2007-11-30)
Repositorynetqmail.org/netqmail-1.06.tar.gz
Websitenetqmail.org


s/qmail
Stable release
4.0.07 / May 20, 2020 (2020-05-20)
Websitefehcom.de/sqmail/


notqmail[2]
Stable release
1.08 / May 20, 2020 (2020-05-20)
Repositorygithub.com/notqmail/notqmail
Websitenotqmail.org

qmail is a mail transfer agent (MTA) that runs on Unix. It was written, starting December 1995, by Daniel J. Bernstein as a more secure replacement for the popular Sendmail program. Originally license-free software, qmail's source code was later dedicated in the public domain by the author.[3]

Features

Security

When first published, qmail was the first security-aware mail transport agent; since then, other security-aware MTAs have been published. The most popular predecessor to qmail, Sendmail, was not designed with security as a goal, and as a result has been a perennial target for attackers. In contrast to sendmail, qmail has a modular architecture composed of mutually untrusting components; for instance, the SMTP listener component of qmail runs with different credentials from the queue manager or the SMTP sender. qmail was also implemented with a security-aware replacement to the C standard library, and as a result has not been vulnerable to stack and heap overflows, format string attacks, or temporary file race conditions.

Performance

When it was released, qmail was significantly faster than Sendmail, particularly for bulk mail tasks such as mailing list servers. qmail was originally designed as a way for managing large mailing lists.

Simplicity

At the time of qmail's introduction, Sendmail configuration was notoriously complex, while qmail was simple to configure and deploy.

Innovations

qmail encourages the use of several innovations in mail (some originated by Bernstein, others not):

Maildir
Bernstein invented the Maildir format for qmail, which splits individual email messages into separate files. Unlike the de facto standard mbox format, which stored all messages in a single file, Maildir avoids many locking and concurrency problems, and can safely be provisioned over NFS. qmail also delivers to mbox mailboxes.
Wildcard mailboxes
qmail introduced the concept of user-controlled wildcards. Out of the box, mail addressed to "user-wildcard" on qmail hosts is delivered to separate mailboxes, allowing users to publish multiple mail addresses for mailing lists and spam management.

qmail also introduces the Quick Mail Transport Protocol (QMTP) and Quick Mail Queuing Protocol (QMQP) protocols.

Modularity

qmail is nearly a completely modular system in which each major function is separated from the other major functions. It is easy to replace any part of the qmail system with a different module as long as the new module retains the same interface as the original.

Controversy

Security reward and Georgi Guninski's vulnerability

Bernstein offered in 1997 a US$500 reward for the first person to publish a verifiable security hole in the latest version of the software.[4]

In 2005, security researcher Georgi Guninski found an integer overflow in qmail. On 64-bit platforms, in default configurations with sufficient virtual memory, the delivery of huge amounts of data to certain qmail components may allow remote code execution. Bernstein disputes that this is a practical attack, arguing that no real-world deployment of qmail would be susceptible. Configuration of resource limits for qmail components mitigates the vulnerability. [5]

On November 1, 2007, Bernstein raised the reward to US$1000.[1] At a slide presentation the following day, Bernstein stated that there were 4 "known bugs" in the ten-year-old qmail-1.03, none of which were "security holes." He characterized the bug found by Guninski as a "potential overflow of an unchecked counter." "Fortunately, counter growth was limited by memory and thus by configuration, but this was pure luck."[6]

On May 19 2020, a working exploit for Guninski's vulnerability was published by Qualys [7] but exploit authors' state they were denied the reward because it contains additional environmental restrictions.

Frequency of updates

The core qmail package has not been updated for many years.[8] New features were initially provided by third party patches, from which the most important at the time were brought together in a single meta-patch called netqmail.[9]

Standards compliance

qmail was not designed to replace Sendmail, and does not behave exactly as Sendmail did in all situations. In some cases, these differences in behavior have become grounds for criticism. For instance, qmail's approach to bounce messages (a format called QSBMF) differs from the standard format of delivery status notifications specified by the IETF in RFC 1894, meanwhile advanced to draft standard as RFC 3464, and recommended in the SMTP specification.

Furthermore, some qmail features have been criticized for introducing mail forwarding complications; for instance, qmail's "wildcard" delivery mechanism and security design prevents it from rejecting messages from forged or nonexistent senders during SMTP transactions.[10] In the past, these differences may have made qmail behave differently when abused as a spam relay, though modern spam delivery techniques are less influenced by bounce behavior.

qmail was released to the public domain in November 2007.[11] Until November 2007, qmail was license-free software, with permission granted for distribution in source form or in pre-compiled form (a "var-qmail package") only if certain restrictions (primarily involving compatibility) were met. This unusual licensing arrangement made qmail non-free according to some guidelines (such as the DFSG), and was a cause of controversy.

qmail is the only broadly deployed public domain software message transfer agent (MTA).

See also

References

  1. ^ a b "Some thoughts on security after ten years of qmail 1.0" (PDF). Retrieved 2007-12-01.
  2. ^ Announcing notqmail
  3. ^ "Information for distributors". I hereby place the qmail package (in particular, qmail-1.03.tar.gz, with MD5 checksum 622f65f982e380dbe86e6574f3abcb7c) into the public domain. You are free to modify the package, distribute modified versions, etc.
  4. ^ "The qmail security guarantee". Retrieved 2007-10-05.
  5. ^ Georgi Guninski. "Georgi Guninski security advisory #74, 2005". Retrieved 2007-10-05.
  6. ^ "Some thoughts on security after ten years of qmail 1.0 [Slide presentation]" (PDF). Retrieved 2008-01-17.
  7. ^ https://marc.info/?l=oss-security&m=158990858630691&w=2
  8. ^ "Life with qmail; History". Retrieved 2007-12-01.
  9. ^ netqmail
  10. ^ Moen, Rick (October 2006). "On Qmail, Forged Mail, and SPF Records". Linux Gazette (131).
  11. ^ "Bernstein releases code into the public domain". Retrieved 2007-11-30.