And here are the log lines from mail.log when I send a test message, just in
case that helps anyone.
Jun 18 03:15:40 mail postfix/submission/smtpd[21926]: connect from
97-123-96-141.albq.qwest.net[97.123.96.141]
Jun 18 03:15:42 mail postfix/submission/smtpd[21926]: 4E16C17A09B:
client=97-123-96
On Sat, Jun 18, 2022 at 09:05:07AM +1000, raf wrote:
> Even if the middle pair were in the right order, and
> even if they successfully replaced the first pair (which
> might not be a thing anyway), it would still end up with
> a single RSA certificate, not both.
Correct. For multiple MTA person
On Fri, Jun 17, 2022 at 01:20:05PM -0400, Viktor Dukhovni
wrote:
> On Fri, Jun 17, 2022 at 04:03:52PM +1000, raf wrote:
>
> > > Out: 454 4.7.0 TLS not available due to local problem
> >
> > Try deleting the middle two files (nmail.calm-ness.ch),
> > or swapping them around. They are in the wr
On 2022-06-17 18:53, Gomes, Rich wrote:
Not sure what direction to go in, what does everyone think?
unsure requirement, hmm :)
homepage https://fuglu.org/
source https://gitlab.com/fumail/fuglu/-/tree/master
fuglu uses dkimpy
On 17.06.22 16:53, Gomes, Rich wrote:
We have a requirement to sign outbound messages with DKIM keys. I have
seen discussions on this list for people using dkim-milter as well as
opendkim.
dkim-milter hasn't been updated since 2009 while opendkim hasn't been
updated since 2015. dkimpy is more
Hello all!
I have a server running dovecot & postfix. I have a user on my server who is
sending email via smtp on an HP printer and because of that, a copy of the
email is not placed in the sent folder like usually happens with clients like
outlook and thunderbird.
I posted this problem on the
On Fri, Jun 17, 2022 at 04:03:52PM +1000, raf wrote:
> > Out: 454 4.7.0 TLS not available due to local problem
>
> Try deleting the middle two files (nmail.calm-ness.ch),
> or swapping them around. They are in the wrong order.
Swapping them won't have the desired effect. There can be at most o
On 17/6/2022 10:23 pm, Gomes, Rich wrote:
Are there any other solutions out there to should be considered as well?
Not sure what direction to go in, what does everyone think?
Take a look at rspamd.
https://rspamd.com
P.V.Anthony
We have a requirement to sign outbound messages with DKIM keys. I have seen
discussions on this list for people using dkim-milter as well as opendkim.
dkim-milter hasn't been updated since 2009 while opendkim hasn't been updated
since 2015. dkimpy is more actively maintained but hasn't been updat
On 2022-06-17 at 04:51:08 UTC-0400 (Fri, 17 Jun 2022 09:51:08 +0100)
Eduardo Maia
is rumored to have said:
Hi,
I need to block emails with fake FROM like :
From: "Nick Blue "
The postfix has the feature header_checks and mime_header_checks. When
the FROM is with plain text, it works fine,
On 17.06.22 09:51, Eduardo Maia wrote:
I need to block emails with fake FROM like :
From: "Nick Blue "
if you use spamassassin as spam filter, you can load plugin
Mail::SpamAssassin::Plugin::FromNameSpoof
and define rule that will catch these:
header L_FROMNAME_SPOOF eval:check_fromname_spo
Eduardo Maia:
> Hi,
>
> I need to block emails with fake FROM like :
>
> From: "Nick Blue "
>
>
> The postfix has the feature header_checks and mime_header_checks. When
> the FROM is with plain text, it works fine, but when the FROM is mime
> encoded like this:
>
> From: =?UTF-8?B?PElQQlJJQ
On 2022-06-17 at 03:27:15 UTC-0400 (Fri, 17 Jun 2022 09:27:15 +0200)
Jan Ceuleers
is rumored to have said:
I would add that there are also legitimate reasons why emails might
contain links and why the recipient would not want those links visited
automatically.
Sure, but avoiding that is relat
Viktor Dukhovni:
> On Thu, Jun 16, 2022 at 07:35:20PM -0400, Wietse Venema wrote:
>
> > Bob Proulx:
> > > Is there a transport mapping equivalent to match against the MX host
> > > instead of against the the recipient address? That's really what is
> > > desired here. I didn't think such a featu
Hi,
I need to block emails with fake FROM like :
From: "Nick Blue "
The postfix has the feature header_checks and mime_header_checks. When
the FROM is with plain text, it works fine, but when the FROM is mime
encoded like this:
From: =?UTF-8?B?PElQQlJJQ0sgbsK6IDMyNTc0PiBhc2FudG9zQGlwYnJpY
On 17/6/2022 12:11 pm, raf wrote:
Something like the following should do it (after making
the renewal config changes that Viktor mentioned (or
including them in the command)):
certbot renew --force-renewal --cert-name XXX
Also note that there is a very useful forum for help with
letsencrypt
Dnia 17.06.2022 o godz. 09:27:15 Jan Ceuleers pisze:
> I would add that there are also legitimate reasons why emails might
> contain links and why the recipient would not want those links visited
> automatically.
>
> A recent example that comes to mind is where I requested a quote from a
> nearby
On 16/06/2022 22:39, Bill Cole wrote:
>
>> I realize links would have to be pulled to generate the image but
>> ultimately I would like the end user to just get an image
>> representation of what the html email would look like with no links
>> or link following by the MUA.
>
> Therein lies the badn
18 matches
Mail list logo