Misplaced Pages

qmail

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.
(Redirected from Quick Mail Queuing Protocol) Mail transfer agent for Unix
qmail
Original author(s)Daniel J. Bernstein
Final release1.03 / June 15, 1998; 26 years ago (1998-06-15)
Repositorycr.yp.to/software/qmail-1.03.tar.gz
Written inC
Operating systemUnix-like
TypeMail transfer agent
Licensepublic domain
Websitecr.yp.to/qmail.html
netqmail
Final release1.06 / November 30, 2007; 17 years ago (2007-11-30)
Repositorynetqmail.org/netqmail-1.06.tar.gz
Websitenetqmail.org
s/qmail
Stable release4.2.29a / February 26, 2024; 9 months ago (2024-02-26)
Websitefehcom.de/sqmail/sqmail.html
notqmail
Stable release1.09 / May 6, 2024; 7 months ago (2024-05-06)
Repositorygithub.com/notqmail/notqmail
Websitenotqmail.org

qmail is a mail transfer agent (MTA) that runs on Unix. It was written, starting December 1995, by Daniel J. Bernstein as a more secure alternative to the popular Sendmail program. Originally license-free software, qmail's source code was later dedicated to the public domain by the author.

Features

This section does not cite any sources. Please help improve this section by adding citations to reliable sources. Unsourced material may be challenged and removed. (March 2015) (Learn how and when to remove this message)

Security

When first published, qmail was the first security-aware mail transport agent; since then, other security-aware MTAs have been published. The most popular predecessor to qmail, Sendmail, was not designed with security as a goal and, as a result, has been a perennial target for attackers. In contrast to sendmail, qmail has a modular architecture composed of mutually untrusting components; for instance, the SMTP listener component of qmail runs with different credentials from the queue manager or the SMTP sender. qmail was also implemented with a security-aware replacement to the C standard library and, as a result, has not been vulnerable to stack and heap overflows, format string attacks or temporary file race conditions.

Performance

When it was released, qmail was significantly faster than Sendmail, particularly for bulk mail tasks such as mailing list servers. qmail was originally designed as a way to manage large mailing lists.

Simplicity

At the time of qmail's introduction, Sendmail configuration was notoriously complex, while qmail was simple to configure and deploy.

Innovations

qmail encourages the use of several innovations in mail (some originated by Bernstein, others not):

Maildir
Bernstein invented the Maildir format for qmail, which splits individual email messages into separate files. Unlike the de facto standard mbox format, which stored all messages in a single file, Maildir avoids many locking and concurrency problems, and can safely be provisioned over NFS. qmail also delivers to mbox mailboxes.
Wildcard mailboxes
qmail introduced the concept of user-controlled wildcards. Out of the box, mail addressed to "user-wildcard" on qmail hosts is delivered to separate mailboxes, allowing users to publish multiple mail addresses for mailing lists and spam management.

qmail also introduces the Quick Mail Transport Protocol (QMTP), an e-mail transmission protocol that is designed to have better performance than Simple Mail Transfer Protocol (SMTP), the de facto standard; and Quick Mail Queuing Protocol (QMQP), a network protocol designed to share e-mail queues between several hosts.

Modularity

qmail is nearly a completely modular system in which each major function is separated from the other major functions. It is easy to replace any part of the qmail system with a different module as long as the new module retains the same interface as the original.

Controversy

Security reward and Georgi Guninski's vulnerability

In 1997, Bernstein offered a US$500 reward for the first person to publish a verifiable security hole in the latest software version.

In 2005, security researcher Georgi Guninski found an integer overflow in qmail. On 64-bit platforms, in default configurations with sufficient virtual memory, the delivery of huge amounts of data to certain qmail components may allow remote code execution. Bernstein disputes that this is a practical attack, arguing that no real-world deployment of qmail would be susceptible. Configuration of resource limits for qmail components mitigates the vulnerability.

On November 1, 2007, Bernstein raised the reward to US$1000. At a slide presentation the following day, Bernstein stated that there were 4 "known bugs" in the ten-year-old qmail-1.03, none of which were "security holes". He characterized the bug found by Guninski as a "potential overflow of an unchecked counter". "Fortunately, counter growth was limited by memory and thus by configuration, but this was pure luck."

On May 19, 2020, a working exploit for Guninski's vulnerability was published by Qualys but exploit authors' state they were denied the reward because it contains additional environmental restrictions.

Frequency of updates

The core qmail package has not been updated for many years. New features were initially provided by third-party patches, from which the most important at the time were brought together in a single meta-patch called netqmail.

Standards compliance

qmail was not designed as a drop-in replacement for Sendmail, and does not behave exactly as Sendmail did in all situations. In some cases, these differences in behavior have become grounds for criticism. For instance, qmail's approach to bounce messages (a format called QSBMF) differs from the standard format of delivery status notifications specified by the IETF in RFC 1894, meanwhile advanced to draft standard as RFC 3464, and recommended in the SMTP specification.

Some qmail features have been criticized for introducing mail forwarding complications; for instance, qmail's "wildcard" delivery mechanism and security design prevents it from rejecting messages from forged or nonexistent senders during SMTP transactions. In the past, these differences may have made qmail behave differently when abused as a spam relay, though modern spam delivery techniques are less influenced by bounce behavior.

Copyright status

qmail was released to the public domain in November 2007. Until November 2007, qmail was license-free software, with permission granted for distribution in source form or in pre-compiled form (a "var-qmail package") only if certain restrictions (primarily involving compatibility) were met. This unusual licensing arrangement made qmail non-free according to some guidelines (such as the DFSG) and was a cause of controversy.

qmail is the only broadly deployed public domain software message transfer agent (MTA).

See also

References

  1. ^ "Some thoughts on security after ten years of qmail 1.0" (PDF). Retrieved 2007-12-01.
  2. Announcing notqmail
  3. Bernstein, Daniel J. "Some thoughts on security after ten years of qmail 1.0" (PDF).
  4. "Qmail Explained".
  5. "Information for distributors". I hereby place the qmail package (in particular, qmail-1.03.tar.gz, with MD5 checksum 622f65f982e380dbe86e6574f3abcb7c) into the public domain. You are free to modify the package, distribute modified versions, etc.
  6. "Quick Mail Transfer Protocol (QMTP)". February 1, 1997. Retrieved 6 May 2023.
  7. "QMQP: Quick Mail Queueing Protocol". Retrieved 6 May 2023.
  8. "The qmail security guarantee". Retrieved 2007-10-05.
  9. Georgi Guninski. "Georgi Guninski security advisory #74, 2005". Retrieved 2007-10-05.
  10. "Some thoughts on security after ten years of qmail 1.0 [Slide presentation]" (PDF). Retrieved 2008-01-17.
  11. "'[oss-security] Remote Code Execution in qmail (CVE-2005-1513)' - MARC". marc.info. Retrieved 2021-03-03.
  12. "Life with qmail; History". Retrieved 2007-12-01.
  13. "netqmail". netqmail.org. Retrieved 2021-03-03.
  14. Vaudreuil, Gregory M.; Moore, Keith (1996). "An Extensible Message Format for Delivery Status Notifications". tools.ietf.org. doi:10.17487/RFC1894. Retrieved 2021-03-03.
  15. Vaudreuil, Gregory M.; Moore, Keith (2003). "An Extensible Message Format for Delivery Status Notifications". tools.ietf.org. doi:10.17487/RFC3464. Retrieved 2021-03-03.
  16. Moen, Rick (October 2006). "On Qmail, Forged Mail, and SPF Records". Linux Gazette (131).
  17. "Bernstein releases code into the public domain". Retrieved 2007-11-30.

External links

Email servers
Open source
Current
Discontinued
Email
Proprietary
Related technologies
Related articles
Categories: