Le 28/09/2022 à 19:36, Eric Grammatico a écrit :
Le 28/09/2022 à 18:40, Lena--- via Exim-users a écrit :
From: Eric Grammatico
In fact I tried to implement the wiki:
https://github.com/Exim/exim/wiki/AuthenticatedSmtpUsingPwauth
I edited that wiki: changed
server_condition = ${run{/bin/bash
On 29/09/2022 01:37, Jasen Betts via Exim-users wrote:
The documentation for ${run gives conflicting guidance on tainted values.
The "conflicting" sections are for different options on the expansion.
--
Cheers,
Jeremy
--
## List details at https://lists.exim.org/mailman/listinfo/exim-users
On 2022-09-28, Lena--- via Exim-users wrote:
>> From: Eric Grammatico
>
>> In fact I tried to implement the wiki:
>> https://github.com/Exim/exim/wiki/AuthenticatedSmtpUsingPwauth
>
> I edited that wiki: changed
>
> server_condition = ${run{/bin/bash -c "echo -e '$auth2\n$auth3' |
> /usr/local/b
Le 28/09/2022 à 18:40, Lena--- via Exim-users a écrit :
From: Eric Grammatico
In fact I tried to implement the wiki:
https://github.com/Exim/exim/wiki/AuthenticatedSmtpUsingPwauth
I edited that wiki: changed
server_condition = ${run{/bin/bash -c "echo -e '$auth2\n$auth3' |
/usr/local/bin/pwau
> From: Eric Grammatico
> In fact I tried to implement the wiki:
> https://github.com/Exim/exim/wiki/AuthenticatedSmtpUsingPwauth
I edited that wiki: changed
server_condition = ${run{/bin/bash -c "echo -e '$auth2\n$auth3' |
/usr/local/bin/pwauth"}{1}{0}}
to
server_condition = ${and {\
{!mat
Le 28/09/2022 à 15:34, Slavko via Exim-users a écrit :
Dňa 28. septembra 2022 12:59:20 UTC používateľ Eric Grammatico via Exim-users
napísal:
I'm in Docker, I'll investigate in that direction. Thanks.
Do you really need system users in docker? If not, use separate
file in user:password form
Dňa 28. septembra 2022 12:59:20 UTC používateľ Eric Grammatico via Exim-users
napísal:
>I'm in Docker, I'll investigate in that direction. Thanks.
Do you really need system users in docker? If not, use separate
file in user:password form, use encrypted password of course
(any system user's pas
Le 28/09/2022 à 15:12, Lena--- via Exim-users a écrit :
P.S. No, the culprit is the apostrophe in auth login-name:
A=login_server:#xxx'uuss+zzz
server_condition = ${run{/bin/sh -c "echo -e '$auth1\n$auth2' |
/usr/sbin/pwauth"}{1}{0}}
You need to add:
deny message = Restricted charact
Dňa 28. septembra 2022 12:59:20 UTC používateľ Eric Grammatico via Exim-users
napísal:
>I'm in Docker, I'll investigate in that direction. Thanks.
Do you really need system users in docker? If not, use separate
file in user:password form, use encrypted password of course
(any system user's pass
P.S. No, the culprit is the apostrophe in auth login-name:
> A=login_server:#xxx'uuss+zzz
> server_condition = ${run{/bin/sh -c "echo -e '$auth1\n$auth2' |
> /usr/sbin/pwauth"}{1}{0}}
You need to add:
deny message = Restricted characters in address
senders = ^.*['"$#]
--
## List
Le 28/09/2022 à 14:48, Slavko via Exim-users a écrit :
Dňa 26. septembra 2022 18:05:32 UTC používateľ Eric Grammatico via Exim-users
napísal:
2022-09-26 16:15:24 [10] 1ocotI-0A-0g <= #xxx'uuss+...@grammatico.me
H=(localhost) [45.123.190.53] P=esmtpsa X=TLS1.2:AES256-GCM-SHA384:256 C
Le 28/09/2022 à 14:36, Jeremy Harris via Exim-users a écrit :
On 28/09/2022 13:30, Eric Grammatico via Exim-users wrote:
Yes, but don't know where to look. I tested pwauth with no success
until now...
So, does this "pwauth" thing log anything? Could you modify it to do
that?
I'll have a lo
Dňa 26. septembra 2022 18:05:32 UTC používateľ Eric Grammatico via Exim-users
napísal:
>2022-09-26 16:15:24 [10] 1ocotI-0A-0g <= #xxx'uuss+...@grammatico.me
>H=(localhost) [45.123.190.53] P=esmtpsa X=TLS1.2:AES256-GCM-SHA384:256 CV=no
>A=login_server:#xxx'uuss+zzz S=736
...
>logi
Le 28/09/2022 à 14:22, Jeremy Harris via Exim-users a écrit :
On 26/09/2022 19:05, Eric Grammatico via Exim-users wrote:
2022-09-26 16:15:24 [10] 1ocotI-0A-0g <=
#xxx'uuss+...@grammatico.me H=(localhost) [45.123.190.53]
P=esmtpsa
X=TLS1.2:AES256-GCM-SHA384:256 CV=no A=login_server:#xx
On 28/09/2022 13:30, Eric Grammatico via Exim-users wrote:
Yes, but don't know where to look. I tested pwauth with no success until now...
So, does this "pwauth" thing log anything? Could you modify it to do that?
--
Cheers,
Jeremy
--
## List details at https://lists.exim.org/mailman/listi
Hi There,
Thanks Lena.
Le 28/09/2022 à 14:15, Lena--- via Exim-users a écrit :
From: Eric Grammatico
2022-09-26 16:15:24 [10] 1ocotI-0A-0g <=
#xxx'uuss+...@grammatico.me H=(localhost) [45.123.190.53] P=esmtpsa
X=TLS1.2:AES256-GCM-SHA384:256 CV=no A=login_server:#xxx'uuss+zzz S=736
2
On 26/09/2022 19:05, Eric Grammatico via Exim-users wrote:
2022-09-26 16:15:24 [10] 1ocotI-0A-0g <= #xxx'uuss+...@grammatico.me
H=(localhost) [45.123.190.53] P=esmtpsa X=TLS1.2:AES256-GCM-SHA384:256 CV=no
A=login_server:#xxx'uuss+zzz S=736
The A= (and also the a on the end of the
> From: Eric Grammatico
> 2022-09-26 16:15:24 [10] 1ocotI-0A-0g <=
> #xxx'uuss+...@grammatico.me H=(localhost) [45.123.190.53] P=esmtpsa
> X=TLS1.2:AES256-GCM-SHA384:256 CV=no A=login_server:#xxx'uuss+zzz S=736
> 2022-09-26 16:15:31 [12] 1ocotI-0A-0g => xxx.x...@.info
> R=d
Hi There,
I have an Exim server running, and it has been relaying spam
I cleaned up the spool, updated the Exim version, asked users to change
password and restarted. I didn't find how spamers were able to relay
through my server.
From now, relaying is stopped, but one remain able to rel
19 matches
Mail list logo