On 5/10/2015 5:22 PM, Bill Cole wrote:
> On 10 May 2015, at 13:45, SH Development wrote:
>
>> Here is the postconf -n output:
>
> Also: Since your documentation directories include '2.6.6' I'm
> guessing that's your Postfix version and that you are using such an
> antique because your distributio
Considering we just came from Postfix 2.15, I think I’m doing better. :)
2.6.6 is the default install for CentOS 6.6.
Jeff
> On May 10, 2015, at 5:22 PM, Bill Cole
> wrote:
>
> On 10 May 2015, at 13:45, SH Development wrote:
>
>> Here is the postconf -n output:
> [...]
>> mynetworks = 127
On 10 May 2015, at 13:45, SH Development wrote:
Here is the postconf -n output:
[...]
mynetworks = 127.0.0.0/8
This means that the only network-based trust you have is for the local
machine itself. That's often adequate, but it means that you can't
permit mail from your separate spam filte
Here is the postconf -n output:
alias_database = hash:/etc/aliases
alias_maps = hash:/etc/aliases
broken_sasl_auth_clients = yes
command_directory = /usr/sbin
config_directory = /etc/postfix
daemon_directory = /usr/libexec/postfix
data_directory = /var/lib/postfix
debug_peer_level = 2
html_directo
On 10 May 2015, at 1:07, SH Development wrote:
We use a separate server for our spam filtering which sends filtered
mail to our postfix server. Lately, however, the spammers have been
bypassing our spam server by sending mail directly to the postfix
server.
I thought I had it set up right,
We use a separate server for our spam filtering which sends filtered mail to
our postfix server. Lately, however, the spammers have been bypassing our spam
server by sending mail directly to the postfix server.
I thought I had it set up right, but I am still able to telnet in from an
outside I