On 12/11/21 00:46, Wietse Venema wrote:
Jorgen Lundman:
I suppose there is probably nothing I can do about it?
http://www.postfix.org/postconf.5.html#prepend_delivered_header
currenly immplements (and detects loops) with delivery to "|command",
/file/name, or !$HOME/.forward.
Doing this also
On 2021-11-15 11:36:00 (+0800), Benny Pedersen wrote:
plantmarknaden.com
https://dane.sys4.de/smtp/plantmarknaden.com
https://dnsviz.net/d/plantmarknaden.com/dnssec/
why diffrent results ?
I don't see 'different' results. That domain is broken.
Neither of the listed DNS servers are returnin
On 2021-11-08 09:43:01 +0100, Ansgar Wiechers wrote:
> On 2021-11-06 Wietse Venema wrote:
> > li...@lazygranch.com:
> >> Reply-To: jm84450...@gmail.com
> >
> > Use header_checks (not body_checks) if you want to block that.
> > Still, I would be concerned about rejecting legitimate email.
>
> It's
plantmarknaden.com
https://dane.sys4.de/smtp/plantmarknaden.com
https://dnsviz.net/d/plantmarknaden.com/dnssec/
why diffrent results ?
Under Debian, after the postfix upgrade from 3.5.6 to 3.5.13,
postconf now outputs duplicate bounce_notice_recipient lines:
zira:~> postconf | grep '^bounce_notice_recipient'
bounce_notice_recipient = postmaster
bounce_notice_recipient = postmaster
Can you reproduce this?
--
Vincent Lefèvre -
Scott Kitterman:
> The original PCRE library that Postfix uses is no longer maintained:
>
> https://pcre.org/
>
> It's been replaced by PCRE2, which has a notably different API, so Postfix
> PCRE
> support would need porting. I've looked and it's beyond my limited skills.
> Is there any chan