On 8/4/2016 4:08 PM, Dave Jones wrote:
> Thank you for the response.
>
> I do have a submission setup but you reminded me to
> look in he master.conf and disable rate limiting:
>
> submission inet n - n - - smtpd
> -o syslog_name=postfix/submission
> -o smtpd_tls
Thank you for the response.
I do have a submission setup but you reminded me to
look in he master.conf and disable rate limiting:
submission inet n - n - - smtpd
-o syslog_name=postfix/submission
-o smtpd_tls_security_level=encrypt
-o smtpd_sasl_auth_enable=yes
On Thu, Aug 04, 2016 at 02:25:19PM -0500, Dave Jones wrote:
> Is there something like permit_sasl_authenticated that
> could be put in the postscreen_access_list and the
> smtpd_client_event_limit_exceptions that could bypass
> dnsbl and rate limiting for SASL authenticated senders?
No, since the
The ... was many lines above and below in that file.
The output shows 'permit' like expected. I keep
forgetting about that very handy postmap -q command
for troubleshooting.
This may have been a typ-o I just found. Sorry for
the false alarm.
I have been trying to bypass dnsbl and rate limiting
Dave Jones:
> I have to be overlooking something here but I have tripple
> checked everything and read the documentation multiple
> times.
>
> I am trying to use https://github.com/stevejenkins/postwhite
> to bypass postscreen checks, primarily dnsbl checks. It
> appears that postscreen is not by
I have to be overlooking something here but I have tripple
checked everything and read the documentation multiple
times.
I am trying to use https://github.com/stevejenkins/postwhite
to bypass postscreen checks, primarily dnsbl checks. It
appears that postscreen is not bypassing dnsbl checks:
mai