On Tue, Oct 17, 2017 at 01:56:39PM +1030, Mal wrote:
> This MTA is a dual stack postfix machine, which also has a dual stack
> resolver running.
Not clear how this is relevant...
> When testing DANE to a remove IPv4 only MTA, I see an attempt to lookup
> a non-existent record by posttls-fin
Le 16/10/2017 à 19:07, Noel Jones a écrit :
To use as an advanced content filter, your prog must be able to talk
SMTP. A simple way to do this might be to use a command line SMTP
agent such as "mini_sendmail" rather than the sendmail command.
Other - and more robust - solutions would to use a
Hello
This MTA is a dual stack postfix machine, which also has a dual stack
resolver running.
When testing DANE to a remove IPv4 only MTA, i see an attempt to lookup
a non-existent record by posttls-finger. The remote site has only
IPv4 records in the zone, except for the zone NS records,
On Mon, Oct 16, 2017 at 10:05:07PM -0400, J Doe wrote:
> My questions are:
>
> 1. When using Postfix and virtual domain hosting in this fashion, is
> there any way to pass SPF when mail from a sending account is forwarded
> to another host (ie: Gmail) ?
This requires SRS, and fairly effective a
I solved this particular problem (forwarding third-party email to google)
using "postsrsd" https://github.com/roehling/postsrsd. SRS (Sender
Rewriting Scheme) rewrites the envelope sender address so that it appears
to be from your domain (allowing SPF to work). This is the scheme used by
forwarders
Hi,
I have two questions regarding using SPF when I am using Postfix with virtual
domain hosting.
I currently have an SPF record in my DNS:
example.comTXT“v=spf1 ip4:1.2.3.4/32 ip6:1:2:3::4/128 ?all”
I virtually host a domain (in this example case, example.com), that is set to
forward
On 16/10/17 15:19, Phil Stracchino wrote:
> On 10/16/17 14:50, Viktor Dukhovni wrote:
>> On Mon, Oct 16, 2017 at 02:00:00PM -0400, Phil Stracchino wrote:
>>
>>> On 10/16/17 13:34, cac...@quantum-equities.com wrote:
Anyone have handy the openssl commands to generate my own key and cert
for
Viktor Dukhovni:
> No issues. Postfix processes long lines in chunks, and can handle
> arbitrarily many chunks. The message size limit will ultimately
> limit the longest message line.
>
> You can set smtp_line_length_limit to 0, which means "no limit".
> On a 32-bit system, Postfix would then b
On 10/16/17 14:50, Viktor Dukhovni wrote:
> On Mon, Oct 16, 2017 at 02:00:00PM -0400, Phil Stracchino wrote:
>
>> On 10/16/17 13:34, cac...@quantum-equities.com wrote:
>>> Anyone have handy the openssl commands to generate my own key and cert
>>> for Postfix?
>>
>> Have you considered using letsen
On 16 Oct 2017, at 13:13, Curtis wrote:
Yes, I understand that setting smtp_line_length_limit above 998 is not
recommend.
I agree that for most Postfix installations, where mail is relayed to
the outside world, this recommendation is your best bet for email
deliverability because lines longe
On Mon, Oct 16, 2017 at 11:13:22AM -0600, Curtis wrote:
> I am experimenting with setting the
> smtp_line_length_limit to 999 (almost 10MB). I had wondered if I might
> run into an internal upper limit that Postfix might not allow, but it seemed
> to accept 999 without complaint. This h
On Mon, Oct 16, 2017 at 02:00:00PM -0400, Phil Stracchino wrote:
> On 10/16/17 13:34, cac...@quantum-equities.com wrote:
> > Anyone have handy the openssl commands to generate my own key and cert
> > for Postfix?
>
> Have you considered using letsencrypt instead of a self-signed key that
> many s
On Mon, Oct 16, 2017 at 10:34:32AM -0700, cac...@quantum-equities.com wrote:
> Anyone have handy the openssl commands to generate my own key and cert
> for Postfix?
See:
http://www.postfix.org/TLS_README.html#quick-start
--
Viktor.
On 10/16/17 13:34, cac...@quantum-equities.com wrote:
> Anyone have handy the openssl commands to generate my own key and cert
> for Postfix?
Have you considered using letsencrypt instead of a self-signed key that
many sites may reject as untrusted?
Try https://www.upcloud.com/support/secure-post
Anyone have handy the openssl commands to generate my own key and cert
for Postfix?
0x946C680E.asc
Description: application/pgp-keys
Yes, I understand that setting smtp_line_length_limit above 998 is not
recommend.
I agree that for most Postfix installations, where mail is relayed to
the outside world, this recommendation is your best bet for email
deliverability because lines longer than 1000 violates RFC 5321. I
totally
On 10/16/2017 10:15 AM, Mickael DEQUIDT wrote:
> Hi everyone,
>
> in trying to tinker a little with my postfix, I stumbled on an issue
> regarding filtering with header_checks.
>
> I am trying to filter a few emails according to their From: header
> (and not their envelope-from). So, basically,
Am 16.10.2017 um 18:51 schrieb Davide Marchi:
> SOCKET="local:/var/spool/postfix/var/run/opendkim/opendkim.sock"
vs.
> smtpd_milters = unix:/var/run/opendkim/opendkim.sock
> non_smtpd_milters = unix:/var/run/opendkim/opendkim.sock
postfix and sendmail/milter use different notation to describe th
Hi Friends,
I've set on (Debian Jessie, Posfix 2.11.3-1, Opendkim 2.9.2-2)
/etc/default/opendkim:
SOCKET="local:/var/spool/postfix/var/run/opendkim/opendkim.sock"
and on /etc/postfix/main.cf:
smtpd_milters = unix:/var/run/opendkim/opendkim.sock
non_smtpd_milters = unix:/var/run/opendkim/ope
Hi everyone,
in trying to tinker a little with my postfix, I stumbled on an issue
regarding filtering with header_checks.
I am trying to filter a few emails according to their From: header (and
not their envelope-from). So, basically, what I did was to add a
header_checks in my main.cf, lik
Allen Coates:
[ Charset windows-1252 converted... ]
> To limit repeating offenders, you might like to try playing with
>
> smtpd_client_connection_count_limit,
> smtpd_client_connection_rate_limit, and
> anvil_rate_time_unit
You can add smtpd_client_auth_rate_limit to that (Postfix 3.1 and later)
To limit repeating offenders, you might like to try playing with
smtpd_client_connection_count_limit,
smtpd_client_connection_rate_limit, and
anvil_rate_time_unit
For my quiet (domestic) server, I have set limits of two simultaneous
connections, and twelve connections per hour.
If a remote host
On Mon, Oct 16, 2017 at 7:32 AM, Maurizio Caloro wrote:
> Hello Together
> Please i have a lot of this messages, exist here any possibilities to ban
> this ip or host, so this will try every view min.
>
>
>
> Oct 16 12:33:59 mail postfix/smtpd[23436]: warning: hostname walkerj235.com
> does not re
Okay, will do it that way then.
Thank you!
Best regards,
Jozef.
On 16. 10. 2017 0:42, Wietse Venema wrote:
Jozef Matick?:
Hello Wietse,
Not sure I understand.
The problem I have is when I have address_verify_negative_cache = no.
Postfix is then deferring sender with 450 Address verification
Hello Together
Please i have a lot of this messages, exist here any possibilities to ban
this ip or host, so this will try every view min.
Oct 16 12:33:59 mail postfix/smtpd[23436]: warning: hostname walkerj235.com
does not resolve to address 91.200.12.56
Oct 16 12:34:03 mail postfix/smtpd[234
On 16 October 2017 at 11:38, Matus UHLAR - fantomas
wrote:
> On 15.10.17 16:52, Bill Shirley wrote:
>
>> /.*@mydomain.tld/ REJECT
>>>
>>
>> The leading .* is not needed. You should escape the period before tld
>> (\.). You can
>> also send a message:
>> /@.*example\.com$/REJECT You are
On 15.10.17 16:52, Bill Shirley wrote:
/.*@mydomain.tld/ REJECT
The leading .* is not needed. You should escape the period before tld (\.).
You can
also send a message:
/@.*example\.com$/ REJECT You are not me (40,000).
This works for me. Note: I'm using pcre instead of regexp.
and
27 matches
Mail list logo