Re: smtp disobeying smtp_bind_address

2021-10-25 Thread Vincent Pelletier
e, I will follow what Viktor suggests: monitoring and dynamically deferring emails, and notify me of the issue while at it. The email rate on this system should be low enough that the monitor will notice the issue before any significant volume went through. Regards, -- Vincent Pelletier ERP5 - op

smtp disobeying smtp_bind_address

2021-10-25 Thread Vincent Pelletier
stfix just stop sending emails altogether in such case, than send them from an unexpected ip: a delay is preferable to me to uncertainty as to how the emails were processed by recipient SMTPs. Is there something else I should set so postfix stops falling back to no binding ? Regards, -- Vi

Re: xsasl_cyrus_client_get_passwd signature is inconsistent with sasl_getcallback_t

2021-03-11 Thread Vincent Pelletier
opened on their tracker: https://bugs.kde.org/show_bug.cgi?id=434234 Regards, -- Vincent Pelletier GPG fingerprint 983A E8B7 3B91 1598 7A92 3845 CAC9 3691 4257 B0C1

Re: xsasl_cyrus_client_get_passwd signature is inconsistent with sasl_getcallback_t

2021-03-10 Thread Vincent Pelletier
Mechanisms must ignore callbacks with id's they don't recognize. */ unsigned long id; int (*proc)(void); /* Callback function. Types of arguments vary by 'id' */ void *context; } sasl_callback_t; So any callback "proc" member has to be explicitly cast as any parameter at all will trigger a warning. Which seems an unfortunate decision to my very limited C experience, but is not postfix' responsibility. Regards, -- Vincent Pelletier GPG fingerprint 983A E8B7 3B91 1598 7A92 3845 CAC9 3691 4257 B0C1

Re: xsasl_cyrus_client_get_passwd signature is inconsistent with sasl_getcallback_t

2021-03-10 Thread Vincent Pelletier
On Wed, 10 Mar 2021 00:31:18 +, Vincent Pelletier wrote: > Note how the caller (here, libkdexoauth2.so) is calling with: > - context > - id > - result > - null > but xsasl_cyrus_client_get_passwd's signature is: > sasl_conn_t *conn, void *context, int id, sasl_

Re: xsasl_cyrus_client_get_passwd signature is inconsistent with sasl_getcallback_t

2021-03-09 Thread Vincent Pelletier
On Wed, 10 Mar 2021 00:31:18 +, Vincent Pelletier wrote: > While debugging an smtp process segfault during sasl authentication > with gmail servers in xoauth2 (xoauth2 authentication which I am in the > process of setting up, so I have no idea if this is a recent > regression)

xsasl_cyrus_client_get_passwd signature is inconsistent with sasl_getcallback_t

2021-03-09 Thread Vincent Pelletier
lly, I'm sending this email using the very same postfix build, using libxoauth2.so from https://github.com/moriyoshi/cyrus-sasl-xoauth2 and with libkdexoauth2.so.3 out of the way, and authentication worked. I do not like magic in my authentication. Regards, -- Vincent Pelletier GPG fingerprint 983A E8B7 3B91 1598 7A92 3845 CAC9 3691 4257 B0C1

Re: spamsources.fabel.dk

2020-12-10 Thread Vincent Pelletier
the contract: sender can complain that recipient is losing their emails, which prevents them from fulfilling the contract. Recipient puts their email admin in relation with the unhappy sender, they are now not anonymous anymore, useful details get exchanged, the badmouthing DNSBL nobody has a contract with anyway is finally cast away, the cowboy gallops towards the setting sun, the end. -- Vincent Pelletier

Re: spamsources.fabel.dk

2020-12-03 Thread Vincent Pelletier
list (without even realising it) ? Sure, they can count on it and drink water. -- Vincent Pelletier

Re: Fail if unable to bind to IP

2020-06-08 Thread Vincent Pelletier
o monitor on-hold postfix queue. The alternative would be "on tunnel up" script to release all on-hold emails, which will eventually bite me if I ever have other reasons to put mails on-hold. Regards, -- Vincent Pelletier

Fail if unable to bind to IP

2020-06-08 Thread Vincent Pelletier
ntain and monitor, and an extra SMTP hop, all of which I would very much like to avoid. Has the situation evolved since then (not that I can find in the documentation) ? Is there a reason for it not to evolve ? Regards, -- Vincent Pelletier

Re: Preferred/maintained greylisting options?

2020-05-24 Thread Vincent Pelletier
leasing the source, it's really an ugly milter, but I'm putting the idea out here - and maybe I'll learn it has already been done and properly implemented... Regards, -- Vincent Pelletier

Milter vs. *_restrictions: evaluation order

2019-06-18 Thread Vincent Pelletier
umented ? Is it a small-enough implementation detail that it does not justify documenting it (which would be perfectly fine for me) ? Regards, -- Vincent Pelletier ERP5 - open source ERP/CRM for flexible enterprises

Re: Mailing list sending mail to server with strong anti-spoofing setting

2015-08-10 Thread Vincent Pelletier
> Google for "dmarc mailman fix". Thanks a lot for the pointers. It's good to know there is a mailman-level fix already, it will be very useful once I updated this ageing setup. Regards, -- Vincent Pelletier ERP5 - open source ERP/CRM for flexible enterprises smime.p7s Description: S/MIME cryptographic signature

Re: Mailing list sending mail to server with strong anti-spoofing setting

2015-08-10 Thread Vincent Pelletier
this part now does work as I intended. I still have to check envelope sender value, and see if it matters. Regards, -- Vincent Pelletier ERP5 - open source ERP/CRM for flexible enterprises smime.p7s Description: S/MIME cryptographic signature

Re: Mailing list sending mail to server with strong anti-spoofing setting

2015-08-07 Thread Vincent Pelletier
ke he's > violating some really important rfc's. This is my understanding of the issue so far, indeed. Regards, -- Vincent Pelletier ERP5 - open source ERP/CRM for flexible enterprises smime.p7s Description: S/MIME cryptographic signature

Re: Mailing list sending mail to server with strong anti-spoofing setting

2015-08-07 Thread Vincent Pelletier
@foo.com pushes to their SMTP a mail for nob...@nexedi.com - which they rightfully reject as a relay attempt. Or I botched my configuration and/or missed an extra option. Regards, -- Vincent Pelletier ERP5 - open source ERP/CRM for flexible enterprises smime.p7s Description: S/MIME cryptographic signature

Mailing list sending mail to server with strong anti-spoofing setting

2015-08-07 Thread Vincent Pelletier
gle_from socket: malformed response What did I do wrong ? Can I do anything without having to upgrade right now ? Regards, -- Vincent Pelletier ERP5 - open source ERP/CRM for flexible enterprises smime.p7s Description: S/MIME cryptographic signature

Re: sasl on smtps: allowing plaintext

2013-07-17 Thread Vincent Pelletier
h both roles would need your initial suggestion (which I setup successfully before noticing the second reply). Regards, -- Vincent Pelletier

Re: sasl on smtps: allowing plaintext

2013-07-16 Thread Vincent Pelletier
r than smtp_tls_security_level = may without also having separate transports (if I understand correctly). So if I do not set noplaintext and someday one of the usually-TLS-enabled relays doesn't offer TLS (config hickup...), postfix will AUTH. -- Vincent Pelletier

sasl on smtps: allowing plaintext

2013-07-16 Thread Vincent Pelletier
e, I would like to keep plaintext auth disallowed anywhere else. Regards, -- Vincent Pelletier