Using:
smtpd_tls_security_level = may
(so only want opportunistic encryption, no cert validation, etc) the
TLS_README suggests that it's best to just leave blank
smtpd_tls_cert_file
smtpd_tls_key_file
smtp_tls_CAfile/path
Question: so then does Postfix use some kind of internally generated
self
As next your users Cry for iPads. Then you remove their Windows
Workstations?
ok, i would have a look "WHY" Amavis rejects these PDF's. If there are
bad macros
in it, you should be lucky that these pdfs dont get opened by your
users.
I guess Amavis uses Clamav in you Setup, right?
Most PDF
Hello wietse,
This is working fine. Now i have to do one more thing which is "i used to
send mails from a php application.when i send mails from php application to
server using sasl authentication. I use multiple or different-2 from
address in php application for a single sasl user Now by using se
Wietse:
> > http://www.postfix.org/postconf.5.html#sender_dependent_relayhost_maps
Naval saini:
> Hello wietse,
> This is working fine. Now i have to do one more thing which is "i used to
> send mails from a php application.when i send mails from php application to
> server using sasl authenticati
On Tue, Nov 06, 2012 at 01:06:22AM -0800, Ori Bani wrote:
> smtpd_tls_security_level = may
>
> (so only want opportunistic encryption, no cert validation, etc) the
> TLS_README suggests that it's best to just leave blank
>
> smtpd_tls_cert_file
> smtpd_tls_key_file
Can you site the specific tex
On Tue, Nov 6, 2012 at 8:37 AM, Viktor Dukhovni
wrote:
> On Tue, Nov 06, 2012 at 01:06:22AM -0800, Ori Bani wrote:
>
>> smtpd_tls_security_level = may
>>
>> (so only want opportunistic encryption, no cert validation, etc) the
>> TLS_README suggests that it's best to just leave blank
>>
>> smtpd_tl
>> smtp_tls_CAfile
>
> As for this, you typically don't need it and can leave it blank.
Same goes for smtp_tls_CApath I presume
Thanks again
On Tue, Nov 06, 2012 at 09:08:02AM -0800, Ori Bani wrote:
> >> (so only want opportunistic encryption, no cert validation, etc) the
> >> TLS_README suggests that it's best to just leave blank
> >>
> >> smtpd_tls_cert_file
> >> smtpd_tls_key_file
> >
> > Can you site the specific text? I don't reca
> This text is about CLIENT certificates, that is:
>
> smtp_tls_cert_file
> smtp_tls_key_file
>
> You're making a concerted effort
Why do you say something like this?
> to confuse these with SERVER certificates,
> that is:
>
> smtpd_tls_cert_file
> smtpd_tls_key_fi
Hi all
I have a virtual alias which currently forwards to a list of email
addresses however this is getting unwieldy. (This is one address
amongst a bunch of other virtual aliases on multiple virtual domains).
virtual_alias_maps = hash:/etc/postfix/virtual
eg.
/etc/postfix/virtual contains:
myl
* Jeremy Bowen :
> Hi all
>
> I have a virtual alias which currently forwards to a list of email
> addresses however this is getting unwieldy. (This is one address
> amongst a bunch of other virtual aliases on multiple virtual domains).
> virtual_alias_maps = hash:/etc/postfix/virtual
> eg.
> /etc
Hi All,
I would like to know how to block mail to alias from external networks and
allow from trusted domain.
presently we have alias a...@xyz.com will redirect to all employee's.
allow: u...@xyz.com to a...@xyz.com
block: u...@anydomain.com to a...@xyz.com
Appreciate suggesti
On 7/11/2012 8:07 πμ, Ramesh wrote:
to block mail to alias from external n
Hi,
See: http://www.postfix.org/RESTRICTION_CLASS_README.html
Regards,
Nick
13 matches
Mail list logo