]: disconnect from
remotehost.example.com[1.2.3.4] ehlo=1 mail=1 rcpt=0/1 commands=2/3
conn_time=13
(connection took 13 seconds)
Would this be usefull for others too and should it be considered for
inclusion in postfix?
Markus
--
Markus Benning, https://markusbenning.de/
Am Mittwoch, den 15.06.2016, 17:01 +0100 schrieb Rob Maidment:
> I am intending to replace Sendmail with Postfix as the MTA component
> in a secure email appliance. One of the features of the appliance is
> the ability to search for messages by subject, sender, etc, and show
> the progress of thos
Am Montag, den 04.01.2016, 20:40 +0100 schrieb Markus Benning:
> My log analyser "saftpresse" implements this:
>
> https://metacpan.org/release/Log-Saftpresse
>
> Theres a commandline interface "saftsumm" which tries to provide the
> classic pflogsumm
Am Montag, den 04.01.2016, 10:21 -0500 schrieb Wietse Venema:
> > > No, but you could use a better stateful logfile analyzer. The TLS
> > > session status is always logged with the name of the remote MTA
> > > example.com[x.x.x.x]:25, and it is always logged before the
> > > status=
> > > record.
>
te-limit"
This will overwrite the threshold option if there is a value for
"rate-limit" defined in the current session.
In my option the time slice is a little bit small with 1 minute.
I would use a per hour or per day limit.
Markus
--
Markus Benning, https://markusbenning.de/
cyd
and release a new version after some testing.
BTW: is it possible to add a link to mtpolicyd.org on
<http://www.postfix.org/addon.html>?
Markus
--
Markus Benning, https://markusbenning.de/
diff --git a/postfix/src/global/mail_params.h b/postfix/src/global/mail_params.h
index 9abc4fa..03ff
accounting
protocol_state=RCPT
protocol_name=ESMTP
May be the patch could be further improved to use the same connection
for both lookups.
Markus
--
Markus Benning, https://markusbenning.de/
diff --git a/postfix/src/global/mail_params.h b/postfix/src/global/mail_params.h
index 9abc4fa..88ef714 100644
---
ing "to=" lines with the
same queue ID.
Looks good:
TLS Statistics
--
1 outgoing tls connections
4 outgoing tls messages (80.00% of 5)
You can find the code at:
https://github.com/benningm/saftpresse/blob/master/lib/Log/Saftpresse/Plugin/TlsStatistics.pm
Markus
--
Markus Benning, https://markusbenning.de/
nect lines in my log.
I tried debug_peer* but it is too verbose and still missing a
clear connect/disconnect log message.
Is there a switch to enable connection logging i missed?
Markus
--
Markus Benning, https://markusbenning.de/
fail2ban.
The mtpolicyd is able to talk directly to the fail2ban daemon without
the way over the log:
https://www.mtpolicyd.org/documentation.html#Mail::MtPolicyd::Plugin::Fail2Ban
Markus
--
Markus Benning, https://markusbenning.de/
On Tue, Nov 04, 2014 at 02:59:21PM +0200, Konstantin wrote:
> Now postfix log only first 3 records. Current limit is about 200
> characters.
You may want to patch the following line:
https://github.com/vdukhovni/postfix/blob/master/postfix/src/global/header_body_checks.c#L457
Markus
Hello,
i'm using a before queue content filter setup with smtpd_proxy_filter and
smtp_send_xforward_command=yes. So far no problem.
But now i want to implement a whitelisting for some checks based on
the client IP address in the content filter.
The content filter supports both XFORWARD and XCLIENT
Am Donnerstag, den 23.10.2014, 09:42 -0400 schrieb Wietse Venema:
> Markus Benning:
> > Hello,
> >
> > i'm using a lot of automated tests to test my postfix configuration.
> > The XCLIENT command is very handy for such checks.
> > I thought about adding a
Hello,
i'm using a lot of automated tests to test my postfix configuration.
The XCLIENT command is very handy for such checks.
I thought about adding a STRESS parameter to the command to be
able to also write test plans to test under-stress-behavior.
It was easy to add the parameters to the XCLIE
On Sun, Oct 12, 2014 at 03:27:41AM -0300, Julio Cesar Covolato wrote:
> Hi People!
> Anyone has a good rule for postfix smtpd whit fail2ban?
> Sorry for the OT:))
The mtpolicyd policy daemon has a plugin for directly adding IPs to
a fail2ban target without the logging/parsing.
It directly uses the
On Wed, Sep 10, 2014 at 10:30:03AM +0200, Markus Benning wrote:
> On Tue, Sep 09, 2014 at 10:52:38PM -0500, Noel Jones wrote:
> > But it's not too hard to make such a feature with either a policy
> > service (eg. postfwd) or a log scraper (eg. fail2ban or just a shell
>
On Tue, Sep 09, 2014 at 10:52:38PM -0500, Noel Jones wrote:
> But it's not too hard to make such a feature with either a policy
> service (eg. postfwd) or a log scraper (eg. fail2ban or just a shell
> script) to update a blacklist file.
I'm currently setting up an project for a policy daemon at
h
17 matches
Mail list logo