Hello everybody,
I'm struggling to stop abusing SASL usernames. My idea is to allow any
particular SASL username send only from his domain, that is "
u...@example.com" can send from "anyth...@example.com", but not from "
u...@otherexample.com".
I know it should be done with "reject_authenticated_
This the second lookup table introduced with postfix-2.12-20140618.
Wietse
As the name suggests, the "pipeline" table implements a pipeline
of lookup tables. The name of the table specifies the pipeline as
a sequence of tables. For example, the following prevents SMTP mail
This the first of two new tables introduced with postfix-2.12-20140618.
Wietse
The "random" lookup table performs random selection. This may be
used to implement load balancing, for example:
/etc/postfix/transport:
# Deliver my own domain as usual.
example.com :
.e
Luigi Cirillo:
> telnet smtp.mydomain.com 25
That's port 25.
> submission inet n - - - - smtpd
> -o syslog_name=postfix/submission
> # -o smtpd_tls_security_level=encrypt
> -o smtpd_sasl_auth_enable=yes
> -o smtpd_client_restrictions=permit_sasl_authenticated,
Am 18.06.2014 20:42, schrieb Luigi Cirillo:
> Ok, sorry Wietse,
> this is the telnet output I changed the domain (mydomain),
> host(myhost), the computer I connect with telnet
> (myremote-client-telnet) and my ip(0.0.0.0)... for privacy:
>
> telnet smt
Ok, sorry Wietse,
this is the telnet output I changed the domain (mydomain),
host(myhost), the computer I connect with telnet
(myremote-client-telnet) and my ip(0.0.0.0)... for privacy:
telnet smtp.mydomain.com 25
Trying 81.4.108.167...
Connected to mydo
Luigi Cirillo:
> Thank you Wietse, I have the option "-o
> smtpd_client_restrictions=permit_sasl_authenticated,reject enabled"
> for submission "inet n - - - - smtpd", I
> think it is the same.
> I continue to send emails from telnet and postfix does not ask for auth.
Thank you Wietse, I have the option "-o
smtpd_client_restrictions=permit_sasl_authenticated,reject enabled"
for submission "inet n - - - - smtpd", I
think it is the same.
I continue to send emails from telnet and postfix does not ask for auth.
On Wed, Jun 18, 2014 at
We are the mailbox provider.
Sorry if my knowledge and understanding of Postfix is nowhere near yours. I am
still learning, and the only way that happens is to ask questions. Your
suggestion of arranging a PCAP file, comparing inbound to outbound is something
I have never had to do in 12 year
On 06/18/2014 11:07 AM, Jim Reid wrote:
> On 18 Jun 2014, at 15:45, Michael Orlitzky
> wrote:
>
>> Nitpick: the ".local" TLD is reserved by RFC 6762, ".invalid" may
>> be a better long-term choice.
>
> I'll raise you another nitpick. .invalid is reserved by RFC6761 and
> in the IANA registry of
On Wed, Jun 18, 2014 at 10:18:54AM -0500, SH Development wrote:
> I have a customer that is claiming that their customers are
> getting emails without the attachments.
Anecdotal claims are useless. Some evidence needs to be presented
that the attachment was removed en-route.
> I can see in the
Luigi Cirillo:
> How can I enable the authentication before the "MAIL FROM:
> du...@dummy.com" command?
smtpd_client_restrictions = permit_sasl_authenticated, reject
This will reject all RCPT TO commands. That is good enough.
Wietse
How can I enable the authentication before the "MAIL FROM:
du...@dummy.com" command?
I tried with:
smtpd_tls_auth_only = yes in main.cf
and in master.cf:
-o smtpd_client_restrictions=permit_sasl_authenticated,reject
-o smtpd_sasl_auth_enable=yes
But it not work, I can still send any email from re
I have a customer that is claiming that their customers are getting emails
without the attachments.
I can see in the log that the receiving server has accepted the message, and
the message size indicates there is "something" attached.
We do have a size limit set of 20MB, but usually when someth
On 6/18/2014 4:36 AM, mailing lists wrote:
> Hello all
>
> I'm trying to limit big mails to local lists using postfix+postfwd but I must
> be missing something because it seems too complex to me.
>
> Mail size is available in END-OF-MESSAGE (E-O-M) so I do size checks in this
> phase of the pr
On 18 Jun 2014, at 15:45, Michael Orlitzky wrote:
> Nitpick: the ".local" TLD is reserved by RFC 6762, ".invalid" may be a
> better long-term choice.
I'll raise you another nitpick. .invalid is reserved by RFC6761 and in the IANA
registry of Special-Use Domain Names, just like .local:
http://w
Am 18.06.2014 16:19, schrieb wie...@porcupine.org:
J?rgen Herrmann:
I have a problem with the following pcre table:
if !/X-Spam-Level:.*\*{7,}/
/X-Spam-Flag:.*YES/ HOLD
endif
Wietse:
> As documented in pcre_table(5) and other places:
>
> if /pattern/flags
>
> endif Match the input st
J?rgen Herrmann:
> Am 18.06.2014 16:19, schrieb wie...@porcupine.org:
> > J?rgen Herrmann:
> >> I have a problem with the following pcre table:
> >>
> >> if !/X-Spam-Level:.*\*{7,}/
> >> /X-Spam-Flag:.*YES/ HOLD
> >> endif
As documented, this processes input one line at a time.
As documented, ac
On 06/17/2014 11:58 PM, Jose Borges Ferreira wrote:
> If you wanto to deliver do 1.2.3.4 and , if fails, then try 8.9.10.11
> then you can create a dns entry with those IP an MX
>
> ex:
> some_entry.local IN MX 10 1.2.3.4
> some_entry.local IN MX 20 8.9.10.11
>
> then setup transport_maps to:
>
Am 18.06.2014 16:17, schrieb Jürgen Herrmann:
> Am 18.06.2014 15:59, schrieb li...@rhsoft.net:
>> Am 18.06.2014 15:49, schrieb Jürgen Herrmann:
>>> I have a problem with the following pcre table:
>>>
>>> if !/X-Spam-Level:.*\*{7,}/
>>> /X-Spam-Flag:.*YES/ HOLD
>>> endif
>>> /X-Spam-Level:.*\*{7,}
J?rgen Herrmann:
> I have a problem with the following pcre table:
>
> if !/X-Spam-Level:.*\*{7,}/
> /X-Spam-Flag:.*YES/ HOLD
> endif
Wietse:
> > As documented in pcre_table(5) and other places:
> >
> > if /pattern/flags
> >
> > endif Match the input string against the patterns betw
Am 18.06.2014 15:59, schrieb li...@rhsoft.net:
Am 18.06.2014 15:49, schrieb Jürgen Herrmann:
I have a problem with the following pcre table:
if !/X-Spam-Level:.*\*{7,}/
/X-Spam-Flag:.*YES/ HOLD
endif
/X-Spam-Level:.*\*{7,}/ DISCARD
the HOLD part of it is executed. the DISCARD part never matche
Am 18.06.2014 15:58, schrieb wie...@porcupine.org:
J?rgen Herrmann:
Hi there!
I have a problem with the following pcre table:
if !/X-Spam-Level:.*\*{7,}/
/X-Spam-Flag:.*YES/ HOLD
endif
As documented in pcre_table(5) and other places:
if /pattern/flags
endif Match the input string
Am 18.06.2014 15:49, schrieb Jürgen Herrmann:
> I have a problem with the following pcre table:
>
> if !/X-Spam-Level:.*\*{7,}/
> /X-Spam-Flag:.*YES/ HOLD
> endif
> /X-Spam-Level:.*\*{7,}/ DISCARD
>
> the HOLD part of it is executed. the DISCARD part never matches.
>
> I also had a version with
J?rgen Herrmann:
> Hi there!
>
> I have a problem with the following pcre table:
>
> if !/X-Spam-Level:.*\*{7,}/
> /X-Spam-Flag:.*YES/ HOLD
> endif
As documented in pcre_table(5) and other places:
if /pattern/flags
endif Match the input string against the patterns between if and
Hi there!
I have a problem with the following pcre table:
if !/X-Spam-Level:.*\*{7,}/
/X-Spam-Flag:.*YES/ HOLD
endif
/X-Spam-Level:.*\*{7,}/ DISCARD
the HOLD part of it is executed. the DISCARD part never matches.
I also had a version with
/X-Spam-Level: \*{7,}/
instead of
/X-Spam-Level:.*\*{7
Hello all
I'm trying to limit big mails to local lists using postfix+postfwd but I must
be missing something because it seems too complex to me.
Mail size is available in END-OF-MESSAGE (E-O-M) so I do size checks in this
phase of the protocol. With single recipient mails all works as expected
27 matches
Mail list logo