On 22 Jun 2023, at 14:18, Wietse Venema via Postfix-users wrote:Postfix does not implement SASL auth. It proxies the bits betwenthe remote SMTP client and (SASL library or Dovecot). If you mustsee SASL details, use Dovecot "auth_debug=yes" logging, and run atool that acts on that information.
On 6/19/23 22:05, Scott Kitterman via Postfix-users wrote:
On June 19, 2023 9:44:59 PM UTC, Viktor Dukhovni via Postfix-users
wrote:
On Mon, Jun 19, 2023 at 09:12:29PM +, Anton Hvornum via Postfix-users wrote:
Yea found libmilter, appears to have some python bindings too.
You don
On 6/19/23 20:23, Wietse Venema via Postfix-users wrote:
Jaroslaw Rafa via Postfix-users:
Dnia 19.06.2023 o godz. 16:53:58 Anton Hvornum via Postfix-users pisze:
Thank you, yes that one slipped by me entirely.
I'll have to re-evaluate how to mark mails as spam with multiple
headers when S
On 6/19/23 16:10, Viktor Dukhovni via Postfix-users wrote:
On Mon, Jun 19, 2023 at 03:36:13PM +, Anton Hvornum via Postfix-users wrote:
> When more than one PREPEND action executes, the first prepended header
> appears before the second etc. prepended header.
On 6/19/23 16:33, Viktor Dukhovni via Postfix-users wrote:
On Mon, Jun 19, 2023 at 04:10:46PM +, Anton Hvornum via Postfix-users wrote:
My understanding was that the "check_policy_service
unix:private/policy-spf" would hand over key=value pairs, I would use
that information to p
The format of access maps and header_body_checks is:
Key Value
=== =
pattern action
As documented, there can be only ONE action per pattern, and there
can be only ONE match per table lookup.
I think my issue here is that I don't fully understand what constitutes
a p
Hi.
I'm quite new to postfix and it's policy framework but I wanted to learn
more about it.
I thought a good way to learn about policy frameworks/services would be
to read the docs and write a simple script that performs a SPF check on
incoming emails.
A snippet from the script/attempt where