Hi ,
The connection between Postfix and the archive is over SMTP.
In my example with the smtpd_milter, will the email also go to the hold
queue if only one archive connection is down?
Or will it deliver the email to the archive which is online? This is an
important question for me, to get both in
Viktor Dukhovni wrote the following on 23.10.2013 16:23:
> If your Postfix version is 2.9.0--2.9.5 DO NOT USE public key
> fingerprints, or upgrade to 2.9.6 or later.
That wasn't the problem, the documentation is quite clear in this
regard. I mistakenly used the public key instructions for a pre-2
Am 23.10.2013 22:57, schrieb Viktor Dukhovni:
> On Tue, Oct 22, 2013 at 06:07:49AM +, Viktor Dukhovni wrote:
>
> Follow-up, comments after a brief email discussion with Paul Wouters
> of RedHat:
thank you so much for that!
>> * Firstly, client TLS extensions are not possible when the client
On Tue, Oct 22, 2013 at 06:07:49AM +, Viktor Dukhovni wrote:
Follow-up, comments after a brief email discussion with Paul Wouters
of RedHat:
> * Firstly, client TLS extensions are not possible when the client starts
> with an SSLv2 compatible SSL HELLO. So the list of supported curves
>
On Wed, Oct 23, 2013 at 07:25:29PM +0200, Pol Hallen wrote:
Wietse:
> > Try: postfwd or policyd rate limiting.
>
> Sure! Thanks! A last question:
>
> real situation: sasl+tls user accounts.
>
> supposed situation: someone hack an account and take user+pass.
> That person do a script like this:
> Try: postfwd or policyd rate limiting.
Sure! Thanks! A last question:
real situation: sasl+tls user accounts.
supposed situation: someone hack an account and take user+pass. That
person do a script like this:
i=0
while [ $i != 50 ]; do
echo test | /usr/bin/mail -s "test message$i" "vic...@dom
Pol Hallen:
> Hi all :-)
>
> I read a lot but not enough...
>
> I need a something to block the spam when an account email has violated...
> so the spammer can use that account to relay spam emails to "the world"
>
> Are there postfix options to block this (or slowing down) or I need use
> third
Hi all :-)
I read a lot but not enough...
I need a something to block the spam when an account email has violated...
so the spammer can use that account to relay spam emails to "the world"
Are there postfix options to block this (or slowing down) or I need use
third parts software?
Need I work
On Wed, Oct 23, 2013 at 11:24:13AM -0400, btb wrote:
> i'm wondering if this could be done in a different manner, that
> wouldn't require the explicit smtp reference for foo.example.com -
> for example:
>
> example.com example-internal:
> .example.com!foo.example.com example-in
this stems from another discussion
[http://archives.neohapsis.com/archives/postfix/2013-10/0454.html].
i'm currently doing:
transport_maps = hash:$table_directory/transports
>cat transports
example.com example-internal:
foo.example.com smtp:
.example.com
On Wed, Oct 23, 2013 at 09:39:36AM +0200, Tobias Reckhard wrote:
> > with instructions on how to extract public key digests from X.509
> > certs also at:
> >
> > http://www.postfix.org/postconf.5.html#smtp_tls_fingerprint_digest
>
> Those instructions had me confused a bit, I think I now see
Roland de Lepper:
> Hi Wietse,
>
> Thanks for the reply.
>
> What about milter_default_action = quarantine ?
As documented, this leaves the message in the "hold" queue. If the
Milter should have done something with the message, then those
things will never happen. The message is now in the que
On 10/23/2013 8:40 AM, Roland de Lepper wrote:
> Hi Wietse,
>
> Thanks for the reply.
>
> What about milter_default_action = quarantine ?
>
The quarantine action accepts mail and puts it in the hold queue
when the milter cannot run.
Once mail is on hold, manual intervention is required.
The
On 10/23/2013 6:22 AM, Kovács Albert wrote:
> On the QSHAPE_REAME page you say that "try to keep the volume of
> local mail injection to a moderate level."
>
> Can you give me a rough estimation on "moderate level" for such an
> environment where the only source of messages
> is the local injectio
Hi Wietse,
Thanks for the reply.
What about milter_default_action = quarantine ?
regards,
Roland de Lepper
On Wed, Oct 23, 2013 at 1:24 PM, Wietse Venema wrote:
> Roland de Lepper:
> > smtpd_milters = inet:81.x.x.x:8092 inet:217.x.x.x:8092
> > milter_default_action = tempfail
> > milter_co
Roland de Lepper:
> smtpd_milters = inet:81.x.x.x:8092 inet:217.x.x.x:8092
> milter_default_action = tempfail
> milter_connect_timeout = 10s
>
> This works perfectly without any problems. the question raised, what if the
> connection between the mailserver and location B is down. Is the email
As
Kov?cs Albert:
> Hello Wietse,
>thanks for the clarification, I'd stick to a stable and supported
>method.
Thanks. And I with I had a better answer.
Speaking which, Postfix supports QMQP. This protocol is simpler
than SMTP, designed by Dan Bernstein, and is based on netstrings.
Netstrings are sim
Hi there,
We're using Postfix for quite a while now as our default mailsystem for our
world-wide organisation.
We are very happy with the setup and working without any problem.
Recently we purchased a Mailarchive systen (mailarchiva) to create an
archive of our mails. We installed two of them; on
Try postfix, dovecot, forced ssl/tls, with gpg-mailgate. I only allow imaps
connections then gpg-mailgate encrypts all messages with the users public key.
Works perfectly. Just my 2c.
Bruce
Hello Wietse,
thanks for the clarification, I'd stick to a stable and supported method.
On the QSHAPE_REAME page you say that "try to keep the volume of local mail
injection to a moderate level."
Can you give me a rough estimation on "moderate level" for such an environment
where the only sour
Kov?cs Albert:
>I wouldn't use a regular smtp chat with the postfix smtpd daemon,
>because I don't want to block the application until smtpd receives
>the message.
There is no need to "block the application". Use parallism.
>My next idea is to just modify the application, and drop (with the
>link
Hello,
I have an application that during its operation it generates lots of RFC-822
format emails.
My task is to send them to a single remote email address, and I've decided that
I rely on
postfix to do the job.
I wouldn't use a regular smtp chat with the postfix smtpd daemon, because I
don't
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Am 23.10.2013 08:44, schrieb BONNET, Frank:
> Hello
>
> I have to setup a "secured" email server
>
> - encrypted filesystem - SSL or TLS only for SMTP and IMAPS -
> Talking only to some known other same-secured servers
from the tec side thats possib
On 2013.10.23 08:44:10 +0200, BONNET, Frank wrote:
> Hello
>
> I have to setup a "secured" email server
>
> - encrypted filesystem
> - SSL or TLS only for SMTP and IMAPS
> - Talking only to some known other same-secured servers
>
> Any info/links welcome !
http://www.postfix.org/TLS_README.
24 matches
Mail list logo