Hi list,
I have a quick question regarding SMTP pipelining:
I'd like to stop remote clients from using unauthorized pipelining. On
an older server, I had the following restriction:
/etc/postfix/main.cf
smtpd_data_restrictions = reject_unauth_pipelining
J Doe via Postfix-users:
> Hi list,
>
> I have a quick question regarding SMTP pipelining:
>
> I'd like to stop remote clients from using unauthorized pipelining. On
> an older server, I had the following restriction:
>
> /etc/postfix/main.cf
> smtpd_data_restrictions = reje
Christophe Kalt via Postfix-users:
> > > # postconf smtp_dns_support_level
> > > smtp_dns_support_level =
> > > # postconf -nf | egrep \^smtp
> > > smtp_destination_concurrency_limit = 1
> > > smtp_tls_CAfile = /etc/ssl/certs/ca-certificates.crt
> > > smtp_tls_connection_reuse = yes
> > > smtp_tls_
On Fri, Feb 21, 2025 at 11:46:16AM +0100, Florian Piekert wrote:
> Understanding correctly, what I defined in the smtp_tls_policy_maps has what
> function then?
> https://www.postfix.org/postconf.5.html#smtp_tls_policy_maps
> I tell pf to send mail for this domain via "secure"d TLS to - probably
Hello all,
$ posttls-finger -F/etc/pki/tls/cert.pem -c -lsecure "[theater.piekert.de]"
...
posttls-finger: Verified TLS connection established to
theater.piekert.de[81.169.233.252]:25: TLSv1.3 with cipher
TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange x25519 server-signature
R
On Fri, Feb 21, 2025 at 08:51:47AM +0100, Florian Piekert via Postfix-users
wrote:
> testmail to e.g.postmas...@renraku-software.de delivers:
>
> MX 2 is the example sending host itself.
> Feb 21 08:19:20 theater postfix/local[536980]: 257561229F34:
> to=, relay=local, delay=1.6,
> delays=1.6/
Good morning gentlefolks,
I am trying to figure out where my error is, using MTA-STS for virtually hosted
domains on my postfix server.
Environment: ubuntu 24, pf3.11snap (or pf3.10snap same), apache2, letsencrypt
certs, bind9 on same machine
The main server is sonne.floppy.org, all other dom