• If you are still using CentOS 7.9, it's time to convert to Alma 8 with the free centos2alma tool by Plesk or Plesk Migrator. Please let us know your experiences or concerns in this thread:
    CentOS2Alma discussion

Resolved What plesk_saslauthd is for?

Cristian Rodriguez

New Pleskian
What is the goal of this line inside postfix/main.cf?

plesk_saslauthd unix y y n - 1 plesk_saslauthd status=5 listen=6 dbpath=/var/spool/postfix/plesk/passwd.db

i have notice today about a brute force attack, i had installed Fail2ban but it is not banning this attemps so i saw that this attemps were related to one process PID asociated with plesk_saslauthd after looking for a response in internet i did not find any important related with this issue. I went to postfix/master.cf and i saw this line that is the same appearing in the PID details, i deleted this line from the file and now these attemps disappeared from /var/log/maillog.

My questions what this line do? is this important and why is it there?

What call to my atenttion is that normal attemps are managed througth postfix/smtp not througth plesk_saslauthd, so i guess this attemps come from an script in a subscriition inside my server. email server is workin correctly so maybe i do not need to add this line in postfix/master.cf

Log from maillog

20:04:34 mail plesk_saslauthd[23595]: failed mail authentication attempt for user '[email protected]' (password len=13)

[root@mail xxxxx.xxx]# ps aux | grep 23595
postfix 23595 0.0 0.0 94764 5100 ? S 17:26 0:01 plesk_saslauthd -l -t unix -u status=5 listen=6 dbpath=/var/spool/postfix/plesk/passwd.db

UPDATE

After disable this line this logs are shown, may be the same login attempts

Jun 4 21:14:54 mail postfix/smtpd[20834]: warning: SASL authentication failure: cannot connect to saslauthd server: Connection refused

It seems it solved the problem

 
Last edited:
Thank you for your response

Regarding the link you provide i have no problems with sending, receiving emails and neither with pop3/imap/smtp authentication everything is working fine, my question in more related to what does this line is for?

plesk_saslauthd unix y y y - 1 plesk_saslauthd status=5 listen=6 dbpath=/var/spool/postfix/plesk/passwd.db

If i uncomment it on master.cf a lot of smtp login attemps are made from unknown locations, no IP address is asociated with every log i can not block them with fail2ban due to this fact, so, if i comment this line this attemps are banned, all these are brute force attacks.

All email users should be authenticated in order to send emails, in general email server works better without that line, no problem has been detected after 24 hour of being commented that line.


[root@mail xxxx.xx]# cat /usr/lib64/sasl2/smtpd.conf
pwcheck_method: auxprop saslauthd
auxprop_plugin: plesk
saslauthd_path: /var/spool/postfix/private/plesk_saslauthd
mech_list: DIGEST-MD5 CRAM-MD5 PLAIN LOGIN
auto_transition: yes
sql_engine: intentionally disabled
log_level: 4

[root@mail xxxxx.xx]# service saslauthd status
saslauthd (pid 13374) is running...
 
Looks like with this configuration you disabled ability using SMTP AUTH in your e-mail server.

That's why you don't see new warnings in logs about failed mail authentication attempt and that's why you see warning about smtpd can't connect to saslauthd server.

---

Errors like 'failed mail authentication attempt for user '[email protected]' show that viruses try brute-force login/password for the email accounts from the Internet.

This warning is not an error; you can enable fail2ban and it will ban such viruses by IP after few failed attempt (Fail2ban keeps banning IP address: warning: unknown[203.0.113.2]: SASL LOGIN authentication failed: authentication failure)
 
SMTP AUTH is working correcty in all the 70 server's subscriptions no problems has been reported, so i guess this line is not necesary, after delete line:

plesk_saslauthd unix y y y - 1 plesk_saslauthd status=5 listen=6 dbpath=/var/spool/postfix/plesk/passwd.db

After disable that line this log:
failed mail authentication attempt for user '[email protected]'

Has changed to this:
warning: SASL authentication failure: cannot connect to saslauthd server: Connection refused

So i think it helped to block this brute force atacks, Fail2ban needs an IP as referece but in the first log there is no IP the only thing i can get is a Process ID so fail2ban was not blocking this attemps, fail2ban only blocks attemps like unknown[203.0.113.2]: SASL LOGIN authentication failed.

I have tested every posible SMTP configuration and all of them works correctly, by now disabling this line seems to make my dedicate server safer.
 
Hey Christian,
Thanks for this solution.
Is this still valid?

In this way you stopped sending through webmail. Are you aware that?
 
Back
Top