OpenSMTPD explained

OpenBSD SMTP Server
Logo Size:300px
Logo Caption:"We deliver"
Logo Alt:Puffy, the mascot of OpenBSD, delivering mail to three fishbowls behind a fence.
Developer:The OpenBSD Project
Released:5.3 /
Latest Release Version:7.4.0p1
Latest Release Date:[1]
Programming Language:C
Operating System:OpenBSD, FreeBSD, NetBSD, Linux, macOS[2]
Platform:Cross-platform
Genre:Mail transfer agent
License:ISC
Standard:RFC 5321
Asof:July 2016

OpenSMTPD (also known as OpenBSD SMTP Server) is a Unix daemon implementing the Simple Mail Transfer Protocol to deliver messages on a local machine or to relay them to other SMTP servers. It was publicly released on 17 March 2013 with version number 5.3, after being in development since late 2008.

OpenSMTPD is primarily developed by Gilles Chehade, Eric Faurot and Charles Longeau as part of the OpenBSD project. Its design goals include security, reliability, ease of configuration, and support for common use cases. The source code is available under the ISC license.

Its portable version, like that of OpenSSH, is developed as a child project which adds the portability code to the OpenBSD version and releases it separately. The portable version was initiated by Charles Longeau and adds support for multiple operating systems including NetBSD, FreeBSD, DragonFly BSD, and several Linux distributions.

History

The development of OpenSMTPD was motivated by a combination of issues with current SMTP daemons: difficult configuration, complicated and difficult to audit code, and unsuitable licensing.[3] [4] OpenSMTPD was designed to solve these problems and make mail exchanges accessible to a wider user-base. After a period of development, OpenSMTPD first appeared in OpenBSD 4.6.[5] The first release shipped with OpenBSD 5.3.[6] [7] [8]

On 2 October 2015, the results of a security audit were released. Version 5.4.4p1 was audited, and nine issues were found.[9] As a result, OpenSMTPD 5.7.2 was released to address these issues.[10]

On 28 January 2020, a vulnerability in OpenSMTPD was disclosed that could be remotely exploited to run arbitrary shell commands as root. OpenSMTPD 6.6.2 was released to fix the vulnerability.[11] [12]

Goals

OpenSMTPD is an attempt by the OpenBSD team to produce an SMTP daemon implementation that is secure, reliable, high performance, simple to security audit and trivial to set up and administer. Code is designed to keep the memory, CPU and disk requirements as low as possible but it is admitted that large mail systems are not intended to be run on low-end machines, and trade-offs are made where higher memory usage would bring indisputable benefits.[13]

As such, the design goals for OpenSMTPD are: security, ease of use, and performance. Security in OpenSMTPD is achieved by robust validity check in the network input path, use of bounded buffer operations via strlcpy, and privilege separation to mitigate the effects of possible security bugs exploiting the daemon through privilege escalation. In order to simplify the use of SMTP, OpenSMTPD implements a smaller set of functionalities than those available in other SMTP daemons, the objective is to provide enough features to satisfy typical usage at the risk of unsuitability for esoteric or niche requirements.

External links

Notes and References

  1. OpenSMTPD 7.4.0p0 Released. openbsd-announce. 25 October 2023. 25 October 2023. Polo. Omar.
  2. Web site: OpenSMTPD Portable Release . OpenBSD . 15 October 2015.
  3. Web site: OpenSMTPD Goals. opensmtpd.org.
  4. Web site: Corbet . Jonathan . Coming soon: OpenSMTPD . Linux Weekly News (LWN) . 27 May 2009 . 6 April 2012.
  5. Web site: OpenBSD 4.6. openbsd.org.
  6. Web site: OpenBSD 5.3 introduces stable SMTPD. 1 May 2013. h-online.com.
  7. Web site: OpenSMTPD 5.3 released. poolp.org. 9 July 2015. 16 April 2016. https://web.archive.org/web/20160416072347/https://poolp.org/0x9162/OpenSMTPD-5.3-released. dead.
  8. Web site: OpenBSD 5.3. openbsd.org.
  9. Web site: OpenSMTPD Audit Report. Qualys. 2 October 2015. 11 October 2015.
  10. Web site: Announce: OpenSMTPD 5.7.2 released. 11 October 2015.
  11. Web site: Unpleasant vulnerability in OpenSMTPD . LWN.net . 30 January 2020.
  12. Web site: OpenSMTPD advisory dissected . 30 January 2020.
  13. Web site: OpenSMTPD Goals. opensmtpd.org.