Quoting Viktor Dukhovni :
On Tue, Feb 02, 2021 at 06:12:01PM -0800, david wrote:
At 06:07 PM 2/2/2021, Viktor Dukhovni wrote:
>On Tue, Feb 02, 2021 at 06:46:32PM -0700, Bob Proulx wrote:
>
> > >
> > > a...@d1.tldd1_a
> > > b...@d1.tldd1_b
> > > @d1.tld owner_d1
> > > @d2.tld
Upstream RHEL, and therefore CentOS, don't update version numbers when
they roll security patches.
Latest release though:
2016-10-31 - Jaroslav Škarvada - 2:2.6.6-8
- Backported support for TLS 1.1, TLS 1.2
Not insanely old...
Quoting "@lbutlr" :
On 03 Jun 2018, at 16:08, Proxy wrote:
I'm
Quoting Daniele Nicolodi :
On 5/17/18 3:59 PM, Mike Guelfi wrote:
Quoting Noel Jones :
It seems counterproductive to rewrite a plain-text link... I don't
know it there's a setting in the O365 controls to avoid mangling
plain text, so you may have to live with it.
-- Noel J
Quoting Noel Jones :
On 5/17/2018 9:40 AM, Fazzina, Angelo wrote:
Hi, wanted to ask if anyone has this issue and how they deal with it ?
My work email is on O365 and we just turned ATP and EOP on so emails
with URLS
are being rewritten. That is fine, but my issue is with plain text
emails
postmap is a lookup management tool; doing a query on an IP in a
subnet isn't going to succeed.
You probably just forgot to enable client_access or reload postfix
What does this return?
# postconf smtpd_client_restrictions
Default is:
smtpd_client_restrictions =
enabled would be:
smtpd_clien
Sounds like GFS2 operating normally.
Do you have any metrics on for the performance of the SAN during these events?
Quoting Durga Prasad Malyala :
Hello all,
I am seeing consistent delays in writing to disk (my System redhat 7.2
using GFS2 file system cluster)
May 4 10:03:34 mail1 postfix/l
The m3u contains a link to: http://audio.icann.org/meetings/sju61/sju61-OPEN-2018-03-14-T1732-208bc-zYhNI147Nrs4gtkXUVItrT4uukdYi3nR-en-02.mp3Which does work...On 19 Mar. 2018 19:50, Dominic Raferd wrote:On 17 March 2018 at 19:42, Viktor Dukhovni wrote:
[ Also posted t
postconf -nWould be more useful...
Our alternative was always to just set relays for "poorly behaved" domains to go through the ISP email servers. It was slower but more reliable since the ISP had an artificially inflated reputation and more time to complain when it's email was.blocked.
Assuming the header check works, I'd run that on a different instance
of postfix and route the specific outside servers to that instance via
the firewall...
Quoting John Stoffel :
Well, I've confirmed that EOP (protection.outloko.com, our external
Spam filter provider) is adding in the "Del
Surely that's going to need to be:
/^Subject:(.*)\[MASSMAIL\](.*)/ REPLACE Subject: $1$2
Quoting Ralf Hildebrandt :
* Zalezny Niezalezny :
As I see here header_checks can do it. There is only one problem. This rule
searching for a subject with string [MASSMAIL] and replacing complete
subject l
If people want to use a non RFC compliant verification system, then
they're going to have problems with false positives on their spam
filter.
The operative word being: they.
Your customer needs to get their email vendor to whitelist your trac
instance. You don't need to do anything
-
12 matches
Mail list logo