Hi,
I have a setup, where emails received by mail server(postfix) are taken on and
the resulting email's body(html or plain text) and attachments are parsed to
separate files and saved, for this I use javax mail api.
The problem occurs for email body when it is in Chinese (simple and
tradition
On Mon, Oct 4, 2010 at 1:56 PM, Jeroen Geilman wrote:
> On 10/04/2010 07:41 PM, Christopher Koeber wrote:
>
> Just to give an update for everyone who can help:
>
>
>1. The system uses an OpenLDAP database for virtual aliases. So my
>virtual_alias_maps points to an LDAP lookup for this.
>
On 10/04/2010 06:25 PM, pf at alt-ctrl-del.org wrote:
On 10/04/2010 02:48 PM, pf at alt-ctrl-del.org wrote:
Are there any existing scripts out there, that report connection counts by cidr
network?
Input:?
parse.pl /var/log/mail cidr_list.zone
Output:?
network count
10.10
On 10/04/2010 06:25 PM, pf at alt-ctrl-del.org wrote:
>
>> On 10/04/2010 02:48 PM, pf at alt-ctrl-del.org wrote:
>>> Are there any existing scripts out there, that report connection counts by
>>> cidr network?
>>>
>>> Input:?
>>> parse.pl /var/log/mail cidr_list.zone
>>>
>>> Output:?
>>> netw
Jeroen Geilman put forth on 10/4/2010 2:10 PM:
> The OP says in so many words that he sees connections WITH HIS IP: "who
> apparently connect to the MX *with the IP*"
>
> This does not happen.
Is this remotely plausible if he's behind a really funky NAT/masquerade?
I've seen some junk quality N
On 10/04/2010 02:48 PM, pf at alt-ctrl-del.org wrote:
Are there any existing scripts out there, that report connection counts by cidr
network?
Input:?
parse.pl /var/log/mail cidr_list.zone
Output:?
network count
10.10.128.0/19 983
10.144.48.0/20 121
On 10/04
On Mon, 2010-10-04 at 17:30 -0400, Victor Duchovni wrote:
> On Mon, Oct 04, 2010 at 03:43:44PM -0500, Vernon A. Fort wrote:
>
> Enable "core" file generation and report a backtrace.
>
I was just reading up on this. I will report once it happens.
Vernon
On Mon, Oct 04, 2010 at 03:43:44PM -0500, Vernon A. Fort wrote:
> I've noticed this:
>
> mail.log.1:Oct 3 03:32:43 ns postfix/master[3672]: warning:
> process //usr/lib/postfix/postscreen pid 19122 killed by signal 11
>
> and
>
> [457795.641083] postscreen[19122]: segfault at 1f ip 0804c463 sp
Thanks for your help, right now we use sasl auth and Works very good.
If the setup for example a gmail account and the change the gmail address for
some user on the postfix domain, postfix delivers that email.
I don't want to accept emails from our domain in our server if they don't
belong t
Hi,
I have sent this message almost verbatim to the OpenLDAP list as well
(since it is fundamentally about LDAP) but I am sure many people on this
list have extensive experience with virtual domain hosting in
conjunction with LDAP.
Short version: What is a recommended way to set up virtual ma
Configure postfix to use SPF, and setup an SPF record in DNS for that domain.
sent from my Telstra NEXTG™ handset
From: Alfonso Alejandro Reyes Jimenez
Sent: Tuesday, 5 October 2010 5:38 AM
To: postfix-users@postfix.org
Subject: ..::Spoofing Issues::..
Hi, eve
Le 04/10/2010 21:10, Jeroen Geilman a écrit :
On 10/04/2010 08:31 PM, Ralf Hildebrandt wrote:
* Jeroen Geilman:
The real client IP ? That can't be trivially spoofed, and so would
actually BE your server.
I have seen clients who apparently connect to my MX with the IP and
then send the IP aft
Le 04/10/2010 17:49, martin f krafft a écrit :
also sprach Noel Jones [2010.10.04.0507 +0200]:
Lots easier to just use
/^myhostname(\.mydomain)?$/ REJECT don't use my hostname
Thanks to everyone who responded. I am now going the suggested way.
However, it occurs to me that this is som
On 10/04/2010 02:48 PM, pf at alt-ctrl-del.org wrote:
> Are there any existing scripts out there, that report connection counts by
> cidr network?
>
> Input:?
> parse.pl /var/log/mail cidr_list.zone
>
> Output:?
> network count
> 10.10.128.0/19 983
> 10.144.48.0/20
Le 04/10/2010 21:37, Alfonso Alejandro Reyes Jimenez a écrit :
Hi, everyone.
I have an issue with some users that are spoofing our mail server,
rightnow we can restrict the spoofing on the same server.
But if they use another smtp server pretending that they are on our
domain the can send
I've noticed this:
mail.log.1:Oct 3 03:32:43 ns postfix/master[3672]: warning:
process //usr/lib/postfix/postscreen pid 19122 killed by signal 11
and
[457795.641083] postscreen[19122]: segfault at 1f ip 0804c463 sp
bfcf5e50 error 4 in postscreen[8048000+29000]
system info:
mail_version = 2.8
Le 29/09/2010 02:33, Jeroen Geilman a écrit :
On 09/28/2010 02:17 PM, Adam Tauno Williams wrote:
On Tue, 2010-09-28 at 00:15 +0200, mouss wrote:
Le 27/09/2010 13:25, Julien Vehent a écrit :
On Mon, 27 Sep 2010 13:06:46 +0200, David
Touzeau wrote:
I'm interested in this topic also, if anybo
hi all
i'd like to put a smarthost using postfix; what are the min.precautions i
shud put in? i've heard controls on outgoing mails are not that easily
effective unlike the controls on incoming mails; also i plan to use SA and
Amavis; appreciate valuable suggestions on this
ty
-bharathan
On 10/04/2010 09:37 PM, Alfonso Alejandro Reyes Jimenez wrote:
Hi, everyone.
I have an issue with some users that are spoofing our mail server,
Spoofing what ? how ?
Proper configuration and a submission setup can prevent sender domain
spoofing.
HELO "spoofing" can be limited or eliminat
Hi, everyone.
I have an issue with some users that are spoofing our mail server, rightnow we
can restrict the spoofing on the same server.
But if they use another smtp server pretending that they are on our domain the
can send those emails.
I use to work with websense which can be config
On 10/04/2010 08:31 PM, Ralf Hildebrandt wrote:
* Jeroen Geilman:
The real client IP ? That can't be trivially spoofed, and so would
actually BE your server.
I have seen clients who apparently connect to my MX with the IP and
then send the IP after HELO.
With YOUR IP ? T
i hijacked the server with the null sender
and the valid recipient
the mail go home
nb : hey madduck
Le lundi 04 octobre 2010 à 20:44 +0200, martin f krafft a écrit :
> also sprach Charles Marcus [2010.10.04.2029
> +0200]:
> > > Yes, with my IP.
> >
> > So your server is hacked?
>
> I am tal
Are there any existing scripts out there, that report connection counts by cidr
network?
Input:?
parse.pl /var/log/mail cidr_list.zone
Output:?
network count
10.10.128.0/19 983
10.144.48.0/20 121
Ralf Hildebrandt:
> > With YOUR IP ? That's highly unlikely, to the point of unbelievability.
>
> I've seen those as well; not from within my networks, but yes. I've
> seen them!
I see that all the time.
For me, blocking helo with with $inet_interfaces/$myhostname is
not sufficient, since Postfi
also sprach Charles Marcus [2010.10.04.2029 +0200]:
> > Yes, with my IP.
>
> So your server is hacked?
I am talking about the argument to HELO/EHLO. No, my server is not
hacked.
--
martin | http://madduck.net/ | http://two.sentenc.es/
"if english was good enough for jesus christ,
it's good
* Jeroen Geilman :
>
> Please don't send these redundant messages. It's a good indication of
> your general messaging skills.
>
>
> On 10/04/2010 07:56 PM, martin f krafft wrote:
> >also sprach Jeroen Geilman [2010.10.04.1822 +0200]:
> >>Where, exactly ?
> >The HELO greeting.
> >
> >>The real c
On 2010-10-04 2:15 PM, martin f krafft wrote:
>> With YOUR IP ? That's highly unlikely, to the point of unbelievability.
> Yes, with my IP.
So your server is hacked?
--
Best regards,
Charles
also sprach Jeroen Geilman [2010.10.04.2004 +0200]:
> >I have seen clients who apparently connect to my MX with the IP and
> >then send the IP after HELO.
>
> With YOUR IP ? That's highly unlikely, to the point of unbelievability.
Yes, with my IP.
--
martin | http://madduck.net/ | http://two.s
Please don't send these redundant messages. It's a good indication of
your general messaging skills.
On 10/04/2010 07:56 PM, martin f krafft wrote:
also sprach Jeroen Geilman [2010.10.04.1822 +0200]:
Where, exactly ?
The HELO greeting.
The real client IP ? That can't be tr
also sprach Jeroen Geilman [2010.10.04.1822 +0200]:
> Where, exactly ?
The HELO greeting.
> The real client IP ? That can't be trivially spoofed, and so would
> actually BE your server.
I have seen clients who apparently connect to my MX with the IP and
then send the IP after HELO.
> Personall
On 10/04/2010 07:41 PM, Christopher Koeber wrote:
Just to give an update for everyone who can help:
1. The system uses an OpenLDAP database for virtual aliases. So my
virtual_alias_maps points to an LDAP lookup for this.
2. The domain for the Mailman setup as well as the actual email
Just to give an update for everyone who can help:
1. The system uses an OpenLDAP database for virtual aliases. So my
virtual_alias_maps points to an LDAP lookup for this.
2. The domain for the Mailman setup as well as the actual email accounts
is the same:
1. For example: I will
On Thu, Sep 30, 2010 at 12:40 PM, brian moore wrote:
> On Wed, 29 Sep 2010 15:17:35 -0400
> Christopher Koeber wrote:
>
>
> > >
> > > *OK, everytime I send to the allstudents list I have I get this:
> > >
> > > Sep 29 13:42:57 WTS-ZIMBRA postfix/virtual[27388]: 0CE72322739: to=<
> > > allstude..
>> Thanks for the reply. Is there a way to query DNS if the specified MX is
>> present so I do not have to maintain the list of allowed domains?
>
> I send lots of spam, and I configure DNS such that the sender domain
> of my spam resolves to your MX (*). Would you please receive millions
> non-de
On 10/04/2010 05:49 PM, martin f krafft wrote:
also sprach Noel Jones [2010.10.04.0507 +0200]:
Lots easier to just use
/^myhostname(\.mydomain)?$/ REJECT don't use my hostname
Thanks to everyone who responded. I am now going the suggested way.
However, it occurs to me that th
On Mon, 4 Oct 2010 17:49:17 +0200
martin f krafft articulated:
> also sprach Noel Jones [2010.10.04.0507
> +0200]:
> > Lots easier to just use
> > /^myhostname(\.mydomain)?$/ REJECT don't use my hostname
>
> Thanks to everyone who responded. I am now going the suggested way.
>
> However,
Christoph Petersen:
> Hi Wietse,
>
> Thanks for the reply. Is there a way to query DNS if the specified MX is
> present so I do not have to maintain the list of allowed domains?
I send lots of spam, and I configure DNS such that the sender domain
of my spam resolves to your MX (*). Would you plea
also sprach Noel Jones [2010.10.04.0507 +0200]:
> Lots easier to just use
> /^myhostname(\.mydomain)?$/ REJECT don't use my hostname
Thanks to everyone who responded. I am now going the suggested way.
However, it occurs to me that this is something postfix could be
trivially doing itself,
On Mon, Oct 04, 2010 at 04:52:04PM +0200, Christoph Petersen wrote:
> Hi Wietse,
>
> Thanks for the reply. Is there a way to query DNS if the specified MX is
> present so I do not have to maintain the list of allowed domains?
> >
> > See:
> >
> > http://www.postfix.org/STANDARD_CONFIGURATION_RE
* Tom Kinghorn :
> Good afternoon list.
>
> I apologise for this post.
Hey, let's read your post first and decide later if you need to
apologize :)
> I am new to postfix and battling to block a sender who keeps changing
> digits in the sending address.
This sounds like a job for regex: or PCR
Hi Wietse,
Thanks for the reply. Is there a way to query DNS if the specified MX is
present so I do not have to maintain the list of allowed domains?
BR
Christoph
On 04.10.2010 16:38, Wietse Venema wrote:
> Christoph Petersen:
>> Hi guys,
>>
>> I was wondering if the following scenario is feasib
Christoph Petersen:
> Hi guys,
>
> I was wondering if the following scenario is feasible with Postfix. I
> would like to have Postfix acting as my fallback MX for emails which
> have an certain MX record.
>
> So for instance let's assume we have the domain example.org which has
> two MX mx1.examp
Hi guys,
I was wondering if the following scenario is feasible with Postfix. I
would like to have Postfix acting as my fallback MX for emails which
have an certain MX record.
So for instance let's assume we have the domain example.org which has
two MX mx1.example.org and mx.fallback.com.
Can I h
Hello,
Assuming that I had enabled SASL mechanism. Can I use a mysql: something list
(probably a custom query probing the user table for "1" in a particular column)
to restrict the access to SMTP relay to a very few users?
eg.
smtpd_sender_login_maps = mysql:/server/etc/postfix/allowrelay.sql
Hello Donovan
Thanks for your response
postfconf -n display below
# postconf -n
command_directory = /usr/local/sbin
config_directory = /usr/local/etc/postfix
daemon_directory = /usr/local/libexec/postfix
data_directory = /var/db/postfix
debug_peer_level = 2
html_directory = /usr/local/share/doc/pos
On 2010/10/04 02:11 PM, Ralf Hildebrandt wrote:
However, adding it to the smtpd_sender_restrictions is not working
/^westcoast[0-9]...@gmail\.com$/ DISCARD
or
/^westcoast[0-9]...@gmail\.com$/ REJECT
You're lacking the //
works 100%.
Thats 1 slap for me for missing the //'s
Thank you very
* Tom Kinghorn :
> Thats 1 slap for me for missing the //'s
Well, at least you got the rest of the syntax right.
:)
--
Ralf Hildebrandt
Geschäftsbereich IT | Abteilung Netzwerk
Charité - Universitätsmedizin Berlin
Campus Benjamin Franklin
Hindenburgdamm 30 | D-12203 Berlin
Tel. +49 30
Good afternoon list.
I apologise for this post.
I am new to postfix and battling to block a sender who keeps changing
digits in the sending address.
I would like to block the sender using the regex
westcoast[0-9]...@gmail.com (to block sender address of
westcoast...@gmail.com etc..).
How
On 10/4/2010 8:47 AM, Nicholas Sideris wrote:
> Hello,
>
> Assuming that I had enabled SASL mechanism. Can I use a mysql: something
> list (probably a custom query probing the user table for "1" in a
> particular column) to restrict the access to SMTP relay to a very few users?
>
> eg.
>
> *s
Hi,
The first solution is amavis. But if you don't want to install amavis, there's
another trick using shell scripts
Save the script below to some file which is accessible in your $PATH for my
example it is saved as postspam
#!/bin/sh
TEMPFILE=$$.$RANDOM.$RANDOM
SPAMKLVL=11
cat > /tmp/$TEMPFILE
50 matches
Mail list logo