Hi guys,
I went through the TLS Readme but I couldn't find a clear answer to the
following question:
Can you configure postfix in a way that it connects using TLS to another
SMTP server, if TLS is available on the other side? For example if the
destination server supports TLS then postfix op
On 17/08/2013 22:03, Wietse Venema wrote:
Ben:
What is the output from: "postmulti -l"? In my case I see:
- - y /etc/postfix
postfix-test- n /etc/postfix-test
postfix-foo - n /etc/postfix-f
Ben:
> > What is the output from: "postmulti -l"? In my case I see:
> >
> > - - y /etc/postfix
> > postfix-test- n /etc/postfix-test
> > postfix-foo - n /etc/postfix-foo
> >
> > Here, postfix-test
On 16.08.2013, at 08:50, Titanus Eramius wrote:
[DNS]
> I tend to simply use "v=spf1 mx -all" since my setup is simple, but you
> can see the entire syntax here http://www.openspf.org/SPF_Record_Syntax
Hmm, I used to have just that configuration in my DNS for more than a year,
but very recently
>> Do you use that config on a commercial mail server? I don't mean to
>> say that you shouldn't, I'm just wondering if you do. In a commercial
>> environment, the penalty for a false positive is a customer unable to
>> reach the company behind the server which just isn't tolerable
>
> there is *
Am 17.08.2013 19:39, schrieb Grant:
> Do you use that config on a commercial mail server? I don't mean to
> say that you shouldn't, I'm just wondering if you do. In a commercial
> environment, the penalty for a false positive is a customer unable to
> reach the company behind the server which j
On 17/08/2013 15:23, Wietse Venema wrote:
Ben:
Hi Wietse,
> You removed the third instance name from the main.cf file of the
> "primary" Postfix instance (for example, the /etc/postfix/main.cf).
Its still listed right there in multi_instance_directories if that's
what you mean ?
postmulti
> [attribution of quotes reconstructed]
> On Sat, Aug 17, 2013 at 12:54:44AM -0700, Grant wrote:
> Noel:
>> > However, I wonder why you don't have any dns blacklists such
>> > as zen.spamhaus.org defined there. The ability of postscreen
>> > to reject known bad sites without using precious smtpd
>
Hi
On Wed, 14 Aug 2013 19:34:25 +0200, Bernhard Schmidt
> Your description sounds suspiciously like a Path-MTU discovery issue.
> Without TLS the server will never send a large packet towards you, but
> when you enable TLS it has to send its certificate, which is often
> larger than 1500 Bytes.
Ben:
> Hi Wietse,
>
> > You removed the third instance name from the main.cf file of the
> > "primary" Postfix instance (for example, the /etc/postfix/main.cf).
>
> Its still listed right there in multi_instance_directories if that's
> what you mean ?
>
> postmulti -l also shows it ?
What i
On Saturday, August 17, 2013 12:16:03 Hans Spaans wrote:
> Scott Kitterman schreef op 2013-08-16 21:06:
> > b...@bitrate.net wrote:
> >> On Aug 16, 2013, at 01.56, Rob Tanner wrote:
> >>> What is it, besides adding the correct the DNS TXT records
> >>
> >> as there is a formal dns rr type for spf
[attribution of quotes reconstructed]
On Sat, Aug 17, 2013 at 12:54:44AM -0700, Grant wrote:
Noel:
> > However, I wonder why you don't have any dns blacklists such
> > as zen.spamhaus.org defined there. The ability of postscreen
> > to reject known bad sites without using precious smtpd
> > proces
On 08/16/2013 03:58 PM, Carlos L wrote:
Ok since my explanation of the problem is poor at best I'll give an
example
Please don't top-post.
Incoming mail comes in like this (actual headers):
Provide postfix mail logs showing the processing of a single message
that exhibits the problem.
Pos
Scott Kitterman schreef op 2013-08-16 21:06:
b...@bitrate.net wrote:
On Aug 16, 2013, at 01.56, Rob Tanner wrote:
What is it, besides adding the correct the DNS TXT records
as there is a formal dns rr type for spf defined in rfc4408, you'll of
course want to include that as well.
I wouldn
> Yes, that should whitelist known good sites from deep inspection,
> certainly all the big mailers such as google, yahoo, comcast, etc.
>
> However, I wonder why you don't have any dns blacklists such as
> zen.spamhaus.org defined there. The ability of postscreen to reject
> known bad sites witho
15 matches
Mail list logo