On Tue, Aug 15, 2023 at 11:51:07AM -0400, Wietse Venema via Postfix-users wrote:
> > That's my instinct also. Waiting out transient glitches by retrying on
> > the next delivery attempt is not an option for probes. And probes don't
> > leak message content in the clear, nor even the full envelop
Viktor Dukhovni via Postfix-users:
> On Tue, Aug 15, 2023 at 11:33:08AM -0400, Wietse Venema via Postfix-users
> wrote:
>
> > With that, the condition evaluates to:
> >
> > 1: session->tls_context == 0 true
> > 2: state->tls->level == TLS_LEV_MAYpresumably t
Well, in my case this is recipient verification - I am sending abuse complaints
in bulk and to eliminate tons of email bounces I have enabled address
verification.
On 8/15/23 15:43, Viktor Dukhovni via Postfix-users wrote:
So it seems that legitimate domains (from which one actually cares to
r
On Tue, Aug 15, 2023 at 11:33:08AM -0400, Wietse Venema via Postfix-users wrote:
> With that, the condition evaluates to:
>
> 1: session->tls_context == 0 true
> 2: state->tls->level == TLS_LEV_MAYpresumably true
> 3: PREACTIVE_DELAY >= var_min_backoff_ti
Viktor Dukhovni via Postfix-users:
> > > Aug 15 12:22:18 flopster postfix/cleanup[9839]: 5058916E081A:
> > > message-id=<20230815092218.5058916e0...@flopster.at.encryp.ch>
> > > Aug 15 12:22:18 flopster postfix/qmgr[11478]: 5058916E081A:
> > > from=, size=316, nrcpt=1 (queue active)
> > > Aug 15
On 8/15/23 14:49, Viktor Dukhovni via Postfix-users wrote:
smtp_tls_loglevel = 0
Level 1 is typically more informative at negligible additional cost.
I have set this option and tried to send email once again:
Aug 15 18:11:48 flopster postfix/smtp[6025]: warning: TLS library problem:
error
[ $subject would have been more clear had the OP mentioned that he's
talking about address verification probes. ]
On Tue, Aug 15, 2023 at 01:29:14PM +, Serg via Postfix-users wrote:
> > admin@flopster ~ $ sudo postconf | grep ^smtp_tls
> > smtp_tls_cert_file = /etc/ssl/domains/flopster.at.e