Dear Frank,
Thanks a lot for responding. I am now reading through the net and trying to
implement things as suggested. Just a few queries:
1) As I am interested in sending bulk mails, I am contemplating modification
of my DNS zone file with SPF record. Some articles in the net talk about
reconfig
Hello
1 - configure your DNS SPF record
2 - Use DKIM to sign your emails
3 - Use a mailing lists software ( LISTSERV Mailman ... etc )
We have been in trouble with gmail yahoo hotmail before doing this
after configuring Postfix and Bind like this we do not have blacklist
troubles with those emai
Dear List,
We are running our mailing system using Postfix (postfix-2.0.16-14.RHEL3).
We need to send communications to our shareholders (around 15000 of them)
using the mailing system. If we simply send the mails using things like
phpmailer etc. then we fear that
1) 1) There could be
On 06/04/2011 02:50 AM, Kendrick wrote:
I am trying to make it so that postfix takes specific actions when
spam "from" my domian externally arrives.
smtpd_recipient_restrictions / reject_unknown_... looked prommising
but I dont see how to work it with the information given.
When a new messag
On 06/04/2011 02:59 AM, Eric Smith wrote:
Hello postfix world,
I seem to be receiving all of my emails excepting some from people who
have emails with yahoo email acounts.They are either taking up to 20 hours
in yahoo's queue or being returned.
The postfix is a spam filter (amavis/clamscan/SA)
Hello postfix world,
I seem to be receiving all of my emails excepting some from people who
have emails with yahoo email acounts.They are either taking up to 20 hours
in yahoo's queue or being returned.
The postfix is a spam filter (amavis/clamscan/SA) for an exchange forest
of 55 users, not many
I am trying to make it so that postfix takes specific actions when spam
"from" my domian externally arrives. smtpd_recipient_restrictions /
reject_unknown_... looked prommising but I dont see how to work it with
the information given.
When a new message arrives with [from: somt...@mydomain.co
Other than the Spamhaus DWL, is anyone here aware of any publically-queryable
domain-based whitelists?
If so, I'd like to know their names and, wheer applicable, web URLs for any
pages that describe them.
Thanks.
Regards,
rfg
On Fri, Jun 03, 2011 at 03:33:33PM -0400, Charles Marcus wrote:
> On 2011-06-03 1:47 PM, Justin Tocci wrote:
> > If anyone knows of a decent firewall in the $300 or less range let me know.
>
> Far be it from me to challenge Victor on a recommendation like this, but
> if money is tight, for home/s
On 2011-06-03 1:47 PM, Justin Tocci wrote:
> If anyone knows of a decent firewall in the $300 or less range let me know.
Far be it from me to challenge Victor on a recommendation like this, but
if money is tight, for home/small business networks, I have only good
things to say about this combinati
On Fri, Jun 03, 2011 at 12:47:31PM -0500, Justin Tocci wrote:
> If anyone knows of a decent firewall in the $300 or less range let me know.
Under $300, you generally get what you pay for. Quality firewalls tend to
be $400+, a good place to start is perhaps:
http://www.google.com/products/catalo
I am on Mac OS X Server so the command to turn off window scaling is sysctl -w
net.inet.tcp.rfc1323=0. I did that and it worked!
Thank you Victor for the suggestion and your patience. And thank you very much
Wietse for pointing out that I had not done it! I thought I had done that but
it turns
/dev/rob0:
> The postconf(5) manual entry for postscreen_whitelist_interfaces
> includes this text:
>
> "When postscreen(8) listens on both primary and backup MX addresses,
> the postscreen_whitelist_interfaces parameter can be used to disable
> whitelisting on backup MX addresses. With this co
The postconf(5) manual entry for postscreen_whitelist_interfaces
includes this text:
"When postscreen(8) listens on both primary and backup MX addresses,
the postscreen_whitelist_interfaces parameter can be used to disable
whitelisting on backup MX addresses. With this configuration,
postscree
il test\n\n"; yes test | head -c 1000) | /usr/sbin/sendmail -t
> sendmail: fatal: henson(1005): internal protocol error
I missed that. Below is the final patch.
Instead of yesterday's patch which adds (duplicated) input validation
support after write error, the final version simpl
Justin Tocci:
> On Jun 2, 2011, at 7:44 PM, Wietse Venema wrote:
>
> > Justin Tocci:
> >> I did find out how to dump fancier output which I think someone wanted.
> >>
> >> tcpdump -AXXr /opt/mail/dump10.txt
> >>
> >> 17:08:23.323379 IP server.workflowproducts.com.smtp >
> >> mx-ecom.netflix.co
16 matches
Mail list logo