Re: Anti spam filtering tools

2015-03-06 Thread b...@todoo.biz
Le 6 mars 2015 à 00:48, Noel Jones  a écrit :
> 
> All anti-spam tools require configuration and updating.
> 
> Updating (via the FreeBSD ports system or the various linux package
> management tools) should be fairly painless for any antispam tool
> you choose, or at least they should all have a similar level of pain.
> 
> Amavisd-new does not stand out as particularly difficult to use.
> All the antispam tools I'm aware of require some level of expertise
> along with periodic care and feeding.
> 
> So mostly "what spam tool do you prefer" is an open-ended discussion
> with no real right or wrong, and most folks on this list don't have
> time for a pointless argument.
> 
> The one suggestion I have is to use the amavisd-new built-in SPF
> tools instead of a separate program.
> 

Ok 

Thanks for your answer. 

We are using a flat file for one server and an integrated PostgreSQL solution 
for the other. 


I’ll follow your advice for SPF. 


Thanks. 


> 
> 
>  -- Noel Jones


«?»¥«?»§«?»¥«?»§«?»¥«?»§«?»¥«?»§«?»¥«?»§«?»¥«?»§

Your provider of OpenSource Appliances

www.osnet.eu

«?»¥«?»§«?»¥«?»§«?»¥«?»§«?»¥«?»§«?»¥«?»§«?»¥«?»§

PGP ID --> 0x1BA3C2FD



Re: Trying to forward root's email to the sysadmins who need it

2015-03-06 Thread Viktor Dukhovni
On Thu, Mar 05, 2015 at 05:36:20PM -0800, Kai Lanz wrote:
> 
> We have an RHEL-6 host on which jobs like cron and logwatch generate emails
> to the local root user. No one logs into this host as root to read those
> emails; we want to forward them to the managers (like me) who need to see
> them. I can get postfix working to send emails to remote users, but I can't
> seem to get it to forward root's email.

http://www.postfix.org/MULTI_INSTANCE_README.html#split

With simple null-clients you can stop after setting up the
null-client without adding an MTA instance.

> I initially made the following changes to the freshly-installed postfix 
> config:
> 
> # postconf -e myorigin=stanford.edu
> # postconf -e 'relayhost=[smtp.stanford.edu]
> # postconf -e local_transport="error:local delivery disabled"
> # postconf -e smtp_use_tls=yes

With "myorigin" remote, rewriting needs to use virtual(5) not
aliases(5), as explained in the null-client example.

> I then edited /etc/aliases and added the alias for the root user:
> 
> root:   manag...@sesmail.stanford.edu

Local aliases have no effect on mail that is relayed, rather
than delivered locally.

-- 
 Kai Lanz Stanford University  School of Earth Sciences

P.S.  The stanford.edu domain is one of the few .edu domains with
  DNSSEC enabled.  I'd like to see Stanford be the first ".edu"
  with DANE TLSA records.  The postmaster for stanford.edu can
  contacting me off-list for guidance if there any questions.


Re: Adding a Reply-To header to forwarded e-mails

2015-03-06 Thread Wietse Venema
MegaBrutal:
> I use a virtual alias to create a simple distribution list to make
> communication easier within our group. I'd like to add a "Reply-To"
> header to e-mails being forwarded through the virtual alias, because
> I'd like to direct replies back to the list by default.
> 
> How can I configure Postfix to add a "Reply-To" header?

This is a standard mailing list manager feature.

You could try to use the PREPEND action in an SMTP server access(5)
table, but you will be missing other features are common with mailing
list managers such as loop detection.

listn...@example.comprepend Reply-To: listn...@example.com

> I only want to add a Reply-To to e-mails sent to a specific virtual
> address. I would not like to use a dedicated mailing list software.

You want a mailing list manager feature. Use a mailing list manager.

Wietes


Re: Policy attributes to PERL script

2015-03-06 Thread Paul Hoffman
On Fri, Mar 06, 2015 at 01:54:54AM +, Mick wrote:
> Hi Markus,
> 
> I am pleased to say my 'moonshine' perl based policy is now up and running.
> 
> 
> Benning, Markus wrote:
> >The reject_sender_login_mismatch in smtpd_sender_restriction
> >already does that
> >as a native postfix check:
> I didn't know that. There is a lot I don't know or understand, which
> is why I decided to try to come up with something myself. Regarding
> blocking sender login mismatch, I will keep that in the policy. I
> added an extra field to the policy mysql DB table enabling mailboxes
> to be group linked by an administrator. This means that an SMTP
> login within a specific group, can send messages on behalf of anyone
> else provided that has the same group code.  A very simple addition
> where both the sender and sasl-username are cross checked with the
> group name (if any).
> 
> $action= "action=DUNNO\n\n";
> if ($sasl_username ne $sender)
>  {
> if(length($sasllink)>0 && length($senderlink)>0 && $sasllink eq
> $senderlink) {}
> else { $action= "action=REJECT Not authorised\n\n";}
>  }
> }

Suggestion:

$action =
$sasl_username eq $sender || (length($sasllink) && $sasllink eq 
$senderlink)
? "action=DUNNO\n\n";
: "action=REJECT Not authorised\n\n"

Paul.

-- 
Paul Hoffman 
Systems Librarian
Fenway Libraries Online
c/o Wentworth Institute of Technology
550 Huntington Ave.
Boston, MA 02115
(617) 442-2384 (FLO main number)


Re: Policy attributes to PERL script

2015-03-06 Thread Mick

Paul Hoffman wrote:

$action= "action=DUNNO\n\n";
if ($sasl_username ne $sender)
 {
if(length($sasllink)>0 && length($senderlink)>0 && $sasllink eq
$senderlink) {}
else { $action= "action=REJECT Not authorised\n\n";}
 }
}



Suggestion:

$action =
$sasl_username eq $sender || (length($sasllink) && $sasllink eq 
$senderlink)
? "action=DUNNO\n\n";
: "action=REJECT Not authorised\n\n"

Paul.

  

Hi Paul,

I like your suggestion. I didn't realise you could format a TRUE / FALSE 
statement like that so I have replaced that particular part of the 
script with yours so I have something to refer to later. It was a bit a 
bit misleading of me stating $action is declared where it is shown to 
be, as it goes through the quota and already blocked sections first 
where it can be changed to reject. I have adjusted your suggested script 
to keep original $action value if TRUE is returned.
I guess this is sloppy programming on my part. As soon as a rejection is 
spotted, I suppose I could just add;


print"action=REJECT reason being..";
exit(0);

.. and end the program.

Here is how that part of the script looks now ;

if($sasl_username ne "\n")
{
 $action = $sasl_username eq $sender || (length($sasllink) && $sasllink 
eq $senderlink)

   ? "$action"
   : "action=REJECT Not authorised\n\n";
}

Much neater than my burn offerings. Thanks again. The' if($sasl_username 
ne "\n") ' is still needed as non SASL authenticated incoming mail would 
be rejected otherwise.


Cheers,

Mick.


Re: Trying to forward root's email to the sysadmins who need it

2015-03-06 Thread Kai Lanz

On Mar 5, 2015, at 8:49 PM, Noel Jones  wrote:

> maybe this will help.
> http://www.postfix.org/STANDARD_CONFIGURATION_README.html#some_local

I’ve solved our problem. Turns out we were missing the virtual_alias_maps line 
in main.cf.
Once I added that, things started working much better.

To summarize, our current main.cf now contains the following lines:

relayhost = [smtp.stanford.edu]
local_transport = error:local delivery disabled
smtp_use_tls = yes
myhostname = seswsbackup.stanford.edu
myorigin = stanford.edu
virtual_alias_maps = hash:/etc/postfix/virtual

And in /etc/postfix/virtual, we have just:

rootmanag...@sesmail.stanford.edu

Entries in maillog now show that r...@stanford.edu is being rewritten the way 
we want:

Mar  6 10:38:30 seswsbackup postfix/smtp[4085]: 4B6ECC0A7D: 
to=, orig_to=, 
relay=smtp.stanford.edu[171.64.13.8]:25, delay=0.32, 
delays=0.11/0.13/0.05/0.03, dsn=2.0.0, status=sent (250 2.0.0 Ok: queued as 
83D73341215)

— 
Kai Lanz   Stanford University  School of Earth Sciences