On 05-03-2025 21:23, Bill Cole via Postfix-users wrote:
You can use the Spamhaus DNSBLs for free if your query volume is low and your
DNS resolver isn't public. DROP is also available free as a JSON file which
gets changes every few days. As of this morning it had just 1359 entries, so
your sp
Wietse Venema via Postfix-users:
> Stephan Seitz via Postfix-users:
> > Hello!
> >
> > According to the manpage relayhost can have more than one host.
> >
> > If you have more than one, how is the host chosen? Always the first
> > until it fails? Or always randomly?
>
> In the specified order. U
Stephan Seitz via Postfix-users:
> Hello!
>
> According to the manpage relayhost can have more than one host.
>
> If you have more than one, how is the host chosen? Always the first
> until it fails? Or always randomly?
In the specified order. Using multiple relayhosts is rare, using
them random
Hello!
According to the manpage relayhost can have more than one host.
If you have more than one, how is the host chosen? Always the first until
it fails? Or always randomly?
Can I configure Postfix to use the relay hosts randomly?
Many greetings,
Stephan
--
|If your life was a
Georg Faerber via Postfix-users:
> postfix/trivial-rewrite[1041973]: fatal: dict_sqlite_lookup:
> /etc/postfix/schleuder_domain_sqlite.cf: SQL prepare failed: disk I/O error?
> postfix/smtpd[1041595]: warning: problem talking to service rewrite:
> Application error
>
> which is thrown via po
Hi all,
In the process of debugging problems Postfix (3.9.1) runs into, if
trying to access / read a SQLite database:
postfix/trivial-rewrite[1041973]: fatal: dict_sqlite_lookup:
/etc/postfix/schleuder_domain_sqlite.cf: SQL prepare failed: disk I/O error?
postfix/smtpd[1041595]: warning: pro
Wietse Venema via Postfix-users:
> Herbert J. Skuhra via Postfix-users:
> > On Mon, 28 Jan 2019 13:59:23 +0100, Stefan Bauer wrote:
> > >
> > > Hi,
> > >
> > > we would like to go the next step, enable smtp_tls_security_level = dane.
> > > Currently we have encrypt site-wide.
> > >
> > > But in
Herbert J. Skuhra via Postfix-users:
> On Mon, 28 Jan 2019 13:59:23 +0100, Stefan Bauer wrote:
> >
> > Hi,
> >
> > we would like to go the next step, enable smtp_tls_security_level = dane.
> > Currently we have encrypt site-wide.
> >
> > But in cases where remote sites do not have published key
Hi!
If you use postfix-tlspol, you can set `smtp_tls_security_level = encrypt` as
default. The socketmap will return dane-only or secure for DANE and MTA-STS
respectively.
Opportunistic DANE (dane) will only be returned if an (external) MX server
supports DANE, but the original domain is not si
On Wed, Mar 05, 2025 at 12:30:46PM +0100, Herbert J. Skuhra via Postfix-users
wrote:
> On Mon, 28 Jan 2019 13:59:23 +0100, Stefan Bauer wrote:
> > we would like to go the next step, enable smtp_tls_security_level = dane.
> > Currently we have encrypt site-wide.
> >
> > But in cases where remote
On Mon, 28 Jan 2019 13:59:23 +0100, Stefan Bauer wrote:
>
> Hi,
>
> we would like to go the next step, enable smtp_tls_security_level = dane.
> Currently we have encrypt site-wide.
>
> But in cases where remote sites do not have published key material, the
> fallback is may with dane, which is a
11 matches
Mail list logo