Pascal Maes:
>
> > Le 10 mars 2016 ? 18:49, Wietse Venema a ?crit :
> >
> > Pascal Maes:
> >> Would it be possible to test only the existence of the MAIL FROM ?
> >
> > With "smtpd_sender_restrictions = reject_unlisted_sender",
> > or with "smtpd_reject_unlisted_sender = yes".
> >
> > http://w
> Le 10 mars 2016 à 18:49, Wietse Venema a écrit :
>
> Pascal Maes:
>> Would it be possible to test only the existence of the MAIL FROM ?
>
> With "smtpd_sender_restrictions = reject_unlisted_sender",
> or with "smtpd_reject_unlisted_sender = yes".
>
> http://www.postfix.org/postconf.5.html#re
> Le 14 mars 2016 à 22:24, Sebastian Nielsen a écrit :
>
> SPF and DKIM is mail tools to prevent spoofing of non-local domains.
> OP was out after tools to prevent local spoofing.
>
> One is for example:
> 1: reject_sender_login_mismatch
> 2: Other is a check_sender_access table containing "you
...@postfix.org]
För Matthias Fechner
Skickat: den 14 mars 2016 21:05
Till: postfix-users@postfix.org
Ämne: Re: MAIL FROM validiity
Am 14.03.2016 um 12:50 schrieb Pascal Maes:
> I would like that everybody who is sending mail from outside our network and
> identified with sasl u
Am 14.03.2016 um 12:50 schrieb Pascal Maes:
I would like that everybody who is sending mail from outside our network and
identified with sasl uses the email address corresponding to the uid.
The mail should be rejected if the uid and the email address do not match.
I think a good start here is
: owner-postfix-us...@postfix.org [mailto:owner-postfix-us...@postfix.org]
För Pascal Maes
Skickat: den 14 mars 2016 12:50
Till: postfix-users@postfix.org
Ämne: Re: MAIL FROM validiity
> Le 12 mars 2016 à 17:28, @lbutlr a écrit :
>
> On Mar 10, 2016, at 10:14 AM, Sebastian Nielsen wrote:
> Le 12 mars 2016 à 17:28, @lbutlr a écrit :
>
> On Mar 10, 2016, at 10:14 AM, Sebastian Nielsen wrote:
>> Create a file containing the following (where yourdomain.com is the domain
>> your authenticated users send from):
>>
>> yourdomain.com: permit_sasl_authenticated, reject
>>
>> postmap t
On Mar 10, 2016, at 10:14 AM, Sebastian Nielsen wrote:
> Create a file containing the following (where yourdomain.com is the domain
> your authenticated users send from):
>
> yourdomain.com: permit_sasl_authenticated, reject
>
> postmap the file.
>
> Then use:
> smtpd_recipient_restrictions =
> Le 10 mars 2016 à 18:18, /dev/rob0 a écrit :
>
> On Thu, Mar 10, 2016 at 01:54:12PM +, Pascal Maes wrote:
>> From time to time, one of our users is caught by a phishing
>> attempt. His account is then used to send spam and generally
>> the MAIL FROM does not match one of our addresses.
> s
Pascal Maes:
> Would it be possible to test only the existence of the MAIL FROM ?
With "smtpd_sender_restrictions = reject_unlisted_sender",
or with "smtpd_reject_unlisted_sender = yes".
http://www.postfix.org/postconf.5.html#reject_unlisted_sender
http://www.postfix.org/postconf.5.html#smtpd_rej
On Thu, Mar 10, 2016 at 01:54:12PM +, Pascal Maes wrote:
> From time to time, one of our users is caught by a phishing
> attempt. His account is then used to send spam and generally
> the MAIL FROM does not match one of our addresses.
snip
> Would it be possible to test only the existence of th
x.org
[mailto:owner-postfix-us...@postfix.org] För Pascal Maes
Skickat: den 10 mars 2016 14:54
Till: postfix-users@postfix.org
Ämne: MAIL FROM validiity
Hello,
>From time to time, one of our users is caught by a phishing attempt.
His account is then used to send spam and generally the MAIL FROM do
Hello,
>From time to time, one of our users is caught by a phishing attempt.
His account is then used to send spam and generally the MAIL FROM does not
match one of our addresses.
I found this to test the validity of the MAIL FROM
/etc/postfix/main.cf :
smtpd_sender_login_maps = hash:/etc/
13 matches
Mail list logo