Community Discussions and Support
Bug?

[quote user="Barius"]Hmm, who's definition of 'soon' are we going by here...?[/quote]

Where did you get 'soon' from?  Did you read the original thread?  Nobody made any promises of when it would be done.

 

<P>[quote user="Barius"]Hmm, who's definition of 'soon' are we going by here...?[/quote]</P><P>Where did you get 'soon' from?  Did you read the original thread?  Nobody made any promises of when it would be done.</P><P> </P>

I don't see a bug forum, so I'm posting this here.

Since upgrading our Mercury server to v4.6x (from v4.5x) our POP3 server has developed a strange problem.  Every few days the POP3 process will prevent users from getting their mail with the following message in the log window:

Connection refused short-term from <ip address>, <date>

These are valid users, with the correct passwords.  They are not accidentally using the wrong username or password.  Connecting clients include Pegasus, Thunderbird and Outlook.

Symptoms of the problem are the following:

- When it starts happening it prevents about 4 in 5 users but lets 1 in 5 through.

- The problem goes away simply by stopping and restarting Mercury.

- I am not entirely sure, but I think that the only users affected are all behind the same IP address (users behind our firewall/gateway).  I will have to watch for this the next time it happens, and I'll update this post.

- Other modules (e.g. MercuryS) do not seem to be affected.

The system config is:

- Standard Intel x86 workstation

- Windows XP Sp3 w/ regular patches.

- Just the standard WinXP firewall.

My understanding is that David has added multi-threading code in the 4.6x branch of Mercury.  Could this have anything to do with it?
Whatever the culprit, it's a fairly annoying new 'feature'.

&lt;p&gt;I don&#039;t see a bug forum, so I&#039;m posting this here.&lt;/p&gt;&lt;p&gt;Since upgrading our Mercury server to v4.6x (from v4.5x) our POP3 server has developed a strange problem.&amp;nbsp; Every few days the POP3 process will prevent users from getting their mail with the following message in the log window:&lt;/p&gt;&lt;p&gt;Connection refused short-term from &amp;lt;ip address&amp;gt;, &amp;lt;date&amp;gt;&lt;/p&gt;&lt;p&gt;These are valid users, with the correct passwords.&amp;nbsp; They are not accidentally using the wrong username or password.&amp;nbsp; Connecting clients include Pegasus, Thunderbird and Outlook. &lt;/p&gt;&lt;p&gt;Symptoms of the problem are the following: &lt;/p&gt;&lt;p&gt;- When it starts happening it prevents about 4 in 5 users but lets 1 in 5 through. &lt;/p&gt;&lt;p&gt;- The problem goes away simply by stopping and restarting Mercury.&lt;/p&gt;&lt;p&gt;- I am not entirely sure, but I think that the only users affected are all behind the same IP address (users behind our firewall/gateway).&amp;nbsp; I will have to watch for this the next time it happens, and I&#039;ll update this post. &lt;/p&gt;&lt;p&gt;- Other modules (e.g. MercuryS) do not seem to be affected. &lt;/p&gt;&lt;p&gt;The system config is:&lt;/p&gt;&lt;p&gt;- Standard Intel x86 workstation&lt;/p&gt;&lt;p&gt;- Windows XP Sp3 w/ regular patches.&lt;/p&gt;&lt;p&gt;- Just the standard WinXP firewall. &lt;/p&gt;&lt;p&gt;My understanding is that David has added multi-threading code in the 4.6x branch of Mercury.&amp;nbsp; Could this have anything to do with it? Whatever the culprit, it&#039;s a fairly annoying new &#039;feature&#039;. &lt;/p&gt;

This almost sounds like MercuryP is set to refuse connections after x number of failures and you are getting connection failures.  IIRC v4.62 implemented a limit on the number of password failures and put the connection on the short term black list.  This means that all connections from that IP address would be blocked for 30 minutes.  . 

This almost sounds like MercuryP is set to refuse connections after x number of failures and you are getting connection failures.&amp;nbsp; IIRC v4.62 implemented a limit on the number of password failures and put the connection on the short term black list.&amp;nbsp; This means that all connections from that IP address would be blocked for 30 minutes.&amp;nbsp; .&amp;nbsp;

Turn on session logging in MercP to find the culprit. Don't forget to turn it off when you are finished.

Turn on session logging in MercP to find the culprit. Don&#039;t forget to turn it off when you are finished.

That certainly sounds like a possible culprit.  I'll check the session logs to verify, but in the mean time is there a way to disable this new feature?

&lt;p&gt;That certainly sounds like a possible culprit.&amp;nbsp; I&#039;ll check the session logs to verify, but in the mean time is there a way to disable this new feature? &lt;/p&gt;

Yup, that seems to be the problem.  There were a couple of users with older clients that hadn't been updated, though I have no idea why they are even using said clients when they can't have been working for months...

Eitherway, this new 'feature' needs to be configurable.  In fact, I don't think it was a good idea in the first place.  I could understand temp-banning a specific username but not an IP address.  Too many networks rely on IP masquerading to make this feature useful as is.  It could potentially be made relevant if it respected the Connection Control settings, but currently it does not and I'd still find it more useful if based on login name.

Thanks for you help.

&lt;p&gt;Yup, that seems to be the problem.&amp;nbsp; There were a couple of users with older clients that hadn&#039;t been updated, though I have no idea why they are even using said clients when they can&#039;t have been working for months...&lt;/p&gt;&lt;p&gt;Eitherway, this new &#039;feature&#039; needs to be configurable.&amp;nbsp; In fact, I don&#039;t think it was a good idea in the first place.&amp;nbsp; I could understand temp-banning a specific username but not an IP address.&amp;nbsp; Too many networks rely on IP masquerading to make this feature useful as is.&amp;nbsp; It could potentially be made relevant if it respected the Connection Control settings, but currently it does not and I&#039;d still find it more useful if based on login name.&lt;/p&gt;&lt;p&gt;Thanks for you help. &lt;/p&gt;

In fact, I don't think it was a good idea in the first place.  I could

understand temp-banning a specific username but not an IP address.

Some were getting all sorts of attacks on the server from specific IP addresses trying all sorts of usernames and passwords.  I believe the IP blocking was a result, it might alow be blocking on the username after x number of tries as well.  I do not know if there is a way to either turn it off or whitelist specific IP addresses but there is a connection control that you can use to allow certain IP addresses.  Maybe the IP addresses in the allow list are not blocked.

 

&lt;blockquote&gt;&lt;p&gt;In fact, I don&#039;t think it was a good idea in the first place.&amp;nbsp; I could understand temp-banning a specific username but not an IP address.&lt;/p&gt;&lt;/blockquote&gt;&lt;p&gt;Some were getting all sorts of attacks on the server from specific IP addresses trying all sorts of usernames and passwords.&amp;nbsp; I believe the IP blocking was a result, it might alow be blocking on the username after x number of tries as well.&amp;nbsp; I do not know if there is a way to either turn it off or whitelist specific IP addresses but there is a connection control that you can use to allow certain IP addresses.&amp;nbsp; Maybe the IP addresses in the allow list are not blocked.&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;

some of us have massive attacks against MercuryS, MercuryP and MercuryI that try to harvest account information.

The simplest way to stop them trying is to ban the IP they use in short term automatically.

&lt;P&gt;some of us have massive attacks against MercuryS, MercuryP and MercuryI that try to harvest account information. &lt;/P&gt; &lt;P&gt;The simplest way to stop them trying is to ban the IP they use in short term automatically.&lt;/P&gt;

That's fine, but the rest of us still need an on/off switch.

Also, as stated before, this 'feature' does not respect the connection control settings.  If it did, it would not have been a problem for me since I already have the IP address explicitly allowed.

&lt;p&gt;That&#039;s fine, but the rest of us still need an on/off switch.&lt;/p&gt;&lt;p&gt;Also, as stated before, this &#039;feature&#039; does not respect the connection control settings.&amp;nbsp; If it did, it would not have been a problem for me since I already have the IP address explicitly allowed. &lt;/p&gt;

Yes that's true. It is on the wish list that the connection control settings have some more settings. F.ex. for MercuryS to let through only authenticated connections - but this is not likely to be adopted until the next major overhaul of the Mercury feature-set. But in any case,, the wrong password submisison of a POP3 client only triggers if the poll frequencey is high, and under all cases the short term ban is lifted automatically - and that is not a bug.

To answer your initial question: No there is no "bug forum". What happens is that when someone from the beta test teams can confim a flaw or suspect a flaw, we then report that back to David.

&lt;P&gt;Yes that&#039;s true. It is on the wish list that the connection control settings have some more settings. F.ex. for MercuryS to let through only authenticated connections - but this is not likely to be adopted until the next major overhaul of the Mercury feature-set. But in any case,, the wrong password submisison of a POP3 client only triggers if the poll frequencey is high, and under all cases the short term ban is lifted automatically - and that is not a bug.&lt;/P&gt; &lt;P&gt;To answer your initial question: No there is no &quot;bug forum&quot;. What happens is that when someone&amp;nbsp;from the beta test teams can confim a flaw or suspect a flaw, we then report that back to David.&lt;/P&gt;

>> But in any case,, the wrong password submisison of a POP3 client only

triggers if the poll frequencey is high, and under all cases the short

term ban is lifted automatically - and that is not a bug.

The problem is that it is banning an IP behind which there are 200 users all trying to connect approx. every 5 mins.  Wrong passwords are bound to happen, it's simply a fact of life.  Banning the IP, even for 30 seconds, is a bug in my situation.  Without the ability to properly configure this, my only choice is to downgrade back to v4.5 because clearly this feature was implemented too hastily and without proper investigation of the consequences.

I don't want to sound ungrateful, but I am a programmer myself and I know how easily an on/off switch could have been implemented.   It is frustrating to be told to wait for the next *major* release, which could be more than a year from now given past release history.  I really think David should give consideration to providing a patch.

&lt;p&gt;&amp;gt;&amp;gt; But in any case,, the wrong password submisison of a POP3 client only triggers if the poll frequencey is high, and under all cases the short term ban is lifted automatically - and that is not a bug.&lt;/p&gt;&lt;p&gt;The problem is that it is banning an IP behind which there are 200 users all trying to connect approx. every 5 mins.&amp;nbsp; Wrong passwords are bound to happen, it&#039;s simply a fact of life.&amp;nbsp; Banning the IP, even for 30 seconds, is a bug in my situation.&amp;nbsp; Without the ability to properly configure this, my only choice is to downgrade back to v4.5 because clearly this feature was implemented too hastily and without proper investigation of the consequences.&lt;/p&gt;&lt;p&gt;I don&#039;t want to sound ungrateful, but I am a programmer myself and I know how easily an on/off switch could have been implemented.&amp;nbsp;&amp;nbsp; It is frustrating to be told to wait for the next *major* release, which could be more than a year from now given past release history.&amp;nbsp; I really think David should give consideration to providing a patch. &lt;/p&gt;

Hmm, never thought of the connection scenario you have, with many users behind a NAT/PAT and not the opposite, meaning one mistyping user can ruin for so many - of course you're absolutely right about the urgency regarding your scenario. Could you draw me the network topology with DMZ and gateway settings. Your scenario should have more ramifications than just the POP3 blacklisting. Fex. SMTP but maybe you don't authenticate them - or? Are you using graywall or do you have separate instances for inboud/outbound?

When I feel I have a clear picture I'll pass the information and urgency along to David.

Thank you for clarifying this.

&lt;P&gt;Hmm, never thought of the connection scenario you have, with many users behind a NAT/PAT and not the opposite, meaning one mistyping user can ruin for so many - of course you&#039;re absolutely right about the urgency regarding your scenario. Could you draw me the network topology with DMZ and gateway settings. Your scenario should have more ramifications than just the POP3 blacklisting. Fex. SMTP but maybe you don&#039;t authenticate them - or? Are you using graywall or do you have separate instances for inboud/outbound?&lt;/P&gt; &lt;P&gt;When I feel I have a clear picture I&#039;ll pass the information and urgency along to David.&lt;/P&gt; &lt;P&gt;Thank you for clarifying this.&lt;/P&gt;

No DMZ, the server has it's own address on the 'net, it was just easier this way 10 (15?) years ago when my predecessor set it up (before today's point-and-click DMZ configuration GUIs).  It serves a small office of users who are all behind a single gateway firewall.  They usually connect from the office, but mobile users may connect from anywhere.  It probably should have been setup within a proper DMZ in the first place, but doing so now would require significant hardware changes so I've been putting it off.

The connection controls for both POP3 and SMTP have the external gateway address 'allowed'.  Authentication for POP3 is per-user and verifies against a Novell Netware server.  SMTP is encrypted via TLS and requires authentication, but has only one user/pass which is shared by all (Note that I've requested Novell Netware/LDAP per-user SMTP authentication in the wishlist previously).

Aside from this glitch with POP3, everything else works fine.  Graywall doesn't seem to have any issues, though Spamwall does occasionally blacklist internal users.  It doesn't recognize them as internal because we use shortened aliases of their Netware usernames and Spamwall isn't programmed to respect the aliases file setting.

E.g.

Full Internal name: <username>.<organizational unit>.<organization>@<our domain>.com
External name: <username>@<our domain>.com

I'm not concerned about the Spamwall thing though, we're phasing it out in favour of client-side filtering.

&lt;p&gt;No DMZ, the server has it&#039;s own address on the &#039;net, it was just easier this way 10 (15?) years ago when my predecessor set it up (before today&#039;s point-and-click DMZ configuration GUIs).&amp;nbsp; It serves a small office of users who are all behind a single gateway firewall.&amp;nbsp; They usually connect from the office, but mobile users may connect from anywhere.&amp;nbsp; It probably should have been setup within a proper DMZ in the first place, but doing so now would require significant hardware changes so I&#039;ve been putting it off. &lt;/p&gt;&lt;p&gt;The connection controls for both POP3 and SMTP have the external gateway address &#039;allowed&#039;.&amp;nbsp; Authentication for POP3 is per-user and verifies against a Novell Netware server.&amp;nbsp; SMTP is encrypted via TLS and requires authentication, but has only one user/pass which is shared by all (Note that I&#039;ve requested Novell Netware/LDAP per-user SMTP authentication in the wishlist previously).&lt;/p&gt;&lt;p&gt;Aside from this glitch with POP3, everything else works fine.&amp;nbsp; Graywall doesn&#039;t seem to have any issues, though Spamwall does occasionally blacklist internal users.&amp;nbsp; It doesn&#039;t recognize them as internal because we use shortened aliases of their Netware usernames and Spamwall isn&#039;t programmed to respect the aliases file setting. &lt;/p&gt;&lt;p&gt;E.g. &lt;/p&gt;&lt;p&gt;Full Internal name: &amp;lt;username&amp;gt;.&amp;lt;organizational unit&amp;gt;.&amp;lt;organization&amp;gt;@&amp;lt;our domain&amp;gt;.com External name: &amp;lt;username&amp;gt;@&amp;lt;our domain&amp;gt;.com &lt;/p&gt;&lt;p&gt;I&#039;m not concerned about the Spamwall thing though, we&#039;re phasing it out in favour of client-side filtering. &lt;/p&gt;

Thanks.

Just FYI:

We normally set up a CISCO ASA5505 for customer environments like yours. It is not expensive (all is relative of course) and is a proper fw with IDS and has capabilities to allow multiple subnets, multiple ISPs and full VPN support. The smallest product you'd need has art. no: ASA5505-UL-BUN-K9, and costs about 420EUR. I have ready config scripts I can share with you if you'd like. But it's just a suggestion.

For clients behind DSL lines we install a small IP-reporting tool on their server that reports back to a web-service we have, telling us their external IP-nbr. We can then connect over VPN to their ASA equipment and save hours by not having to drive all over Sweden. It also makes it very easy to maintain their machinery during off-hours without the need to access their physical location. Saved hours and increased efficiency and security is very easy to sell to the management.

&lt;P&gt;Thanks.&lt;/P&gt; &lt;P&gt;Just FYI:&lt;/P&gt; &lt;P&gt;We normally set up a CISCO ASA5505 for customer environments like yours. It is not expensive (all is relative of course) and is a proper fw with IDS and has capabilities to allow multiple subnets, multiple ISPs and full VPN support. The smallest product you&#039;d need has art. no: ASA5505-UL-BUN-K9, and costs about 420EUR. I have ready config scripts I can share with you if you&#039;d like. But it&#039;s just a suggestion.&lt;/P&gt; &lt;P&gt;For clients behind DSL lines we install a small IP-reporting tool on their server that reports back to a web-service we have, telling us their external IP-nbr. We can then connect over VPN to their ASA equipment and save hours by not having to drive all over Sweden. It also makes it very easy to maintain their machinery during off-hours without the need to access their physical location. Saved hours and increased efficiency and security&amp;nbsp;is very easy to sell to the management.&lt;/P&gt;

[quote user="Barius"]I really think David should give consideration to providing a patch.[/quote]

This issue was discussed back in July soon after 4.62 was released.  David replied in the thread and said he would look into providing a patch.  See  http://pmail.praktit.se/forums/thread/10291.aspx

 

&lt;p&gt;[quote user=&quot;Barius&quot;]I really think David should give consideration to providing a patch.[/quote]&lt;/p&gt;&lt;p&gt;This issue was discussed back in July soon after 4.62 was released.&amp;nbsp; David replied in the thread and said he would look into providing a patch.&amp;nbsp; See&amp;nbsp; http://pmail.praktit.se/forums/thread/10291.aspx&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;

Thx Paul, reliable memory neurons as always [:D]

Thx Paul, reliable memory neurons as always [:D]

Hmm, who's definition of 'soon' are we going by here...?

Hmm, who&#039;s definition of &#039;soon&#039; are we going by here...?

To be honest, and this is just a guess, is maybe this year. I believe David focuses on releasing Pegasus Mail.

To be honest, and this is just a guess, is maybe this year. I believe David focuses on releasing Pegasus Mail.
live preview
enter atleast 10 characters
WARNING: You mentioned %MENTIONS%, but they cannot see this message and will not be notified
Saving...
Saved
With selected deselect posts show selected posts
All posts under this topic will be deleted ?
Pending draft ... Click to resume editing
Discard draft