continues the effort to
> turn fatal table lookup/update errors into warnings (graceful
> degradation).
Postfix snapshot 20120114 cleans up error handling such that a
daemon process will keep running even when a lookup table can't be
opened.
Instead of terminating immediately with a fatal e
On 1/14/2012 6:43 AM, Charles Marcus wrote:
> Also, Stan - would would be interested in seeing some comparisons of
> postscreen configurations. I haven't implemented it yet (we use an
> outsourced anti-spam service currently), but am interested in trying it
> out to see if we can lose that service
On 1/14/2012 6:40 AM, Charles Marcus wrote:
> I was more interested in what specific changes he made in order to use
> it as a HELO blacklist, and how and why it avoided false positives when
> it is used the way we have been using it
It wouldn't really require any changes. You could use it with
On 1/14/2012 6:40 AM, Charles Marcus wrote:
> I was more interested in what specific changes he made in order to
> use it as a HELO blacklist, and how and why it avoided false
> positives when it is used the way we have been using it
>
To use it as a HELO blacklist, you simply call it with
chec
Plain text as you put it or unsecured SMTP will work "out of the box" with some
minor configuration.
* I was asking about using noplaintext and not plain, so how I can use
noplaintext? Is there any required package to be installed at the server?
Regards
Bilal
--- On Sat, 1/14/12, Peter L. Be
bilal ghayyad:
> Hi All;
>
> Is it required to have the cert to be able to use the TLS?
It depends primarily on the role: client or server.
> To be able to use noplaintext, what is required for this to be existed?
This is described in http://www.postfix.org/TLS_README.html.
If the document is i
On Sat, 2012-01-14 at 05:52 -0800, bilal ghayyad wrote:
> Is it required to have the cert to be able to use the TLS?
Short answer: yes
More detail: this can either be a self signed cert or one purchased
from any number of cert suppliers. Problem with a self signed cert is
nobody is going to
Hi All;
Is it required to have the cert to be able to use the TLS?
To be able to use noplaintext, what is required for this to be existed?
Regards
Bilal
OK thanks, so no need for Cyrus SASL if I am going to use Dovecot?
But why the noplaintext is not working? What is the missing libraries or
mechanism that I have to install or add?
One more thing, I telnet for the smpt server and I did not see the TLS stated,
although I have the following confi
Zitat von Robert Krig :
On 01/13/2012 09:52 AM, lst_ho...@kwsoft.de wrote:
Zitat von Robert Krig :
On 01/11/2012 08:38 PM, Gary Smith wrote:
Restarting postfix, saslauthd and authdaemon seems to get it
working again,
at least for a while.
Are you using pam_mysql by chance?
Yes, I am.
On 2012-01-13 6:18 PM, Stan Hoeppner wrote:
As fqrdns.pcre has been a topic recently, I feel this needs to be stated
again, for those of you who have missed previous threads on this topic.
1. Postscreen rejects most bots BEFORE they reach smtpd processes
(fqrdns.pcre is evaluated by smtpd
On 2012-01-13 6:05 PM, Stan Hoeppner wrote:
On 1/13/2012 2:13 PM, email builder wrote:
We use a modified version as a HELO blacklist. This avoids the false
Interesting... can you provide specific details on what you mean by
'modified version'?
I second that. I'm feeling convinced enoug
Please do not top-post your replies here. Thank you.
On Saturday 14 January 2012 06:04:10 bilal ghayyad wrote:
> What I have to set mech_list: in the smtpd.conf if I used the below
> commands? And do I need to restart postfix service after do a
> changes in smtpd.conf?
smtpd.conf is a Cyrus SASL
Dear Patric;
What I have to set mech_list: in the smtpd.conf if I used the below commands?
And do I need to restart postfix service after do a changes in smtpd.conf?
smtpd_sasl_security_options = noanonymous, noplaintext
smtpd_tls_sasl_security_options = noanonymous
Currently I see the followi
On 13 jan. 2012, at 21:13, email builder wrote:
>>> We use a modified version as a HELO blacklist. This avoids the false
>>> positives we saw while testing it as a reverse DNS restriction but,
>>> because the use of the reverse hostname as the HELO string is a
>>> common pattern in spam attempts f
Thanks a lot for your advise.
What is the difference between noplaintext and the plaintext encrypted?
Also, what will happen if I did not set this mech_list: cram-md5? For what it
used the cram-md5?
Regards
Bilal
--- On Fri, 1/13/12, Patrick Ben Koetter wrote:
> From: Patrick Ben Koetter
>
Am 14.01.2012 04:40, schrieb Benny Pedersen:
> On Thu, 12 Jan 2012 17:31:17 +0100, Jiri Vitek wrote:
>
>>> slow_destination_concurrency_limit = 2
>>> slow_destination_concurrency_limit = 2
>
> ymvw, only one line is needed :)
>
>
>
ups , yes youre right, some copy paste stuff
thx !!!
--
Bes
17 matches
Mail list logo