I have a postfix server sending out mails and we are creating reports by
parsing the maillogs using a couple of perl cron scripts
(linux machine with mysql )
Now the requirement is of realtime reporting.
I tried using rsyslog with a mysql table. But the performance is far too
bad. Rsyslog seems
On 3/15/2013 1:59 AM, Ram wrote:
> I have a postfix server sending out mails and we are creating reports by
> parsing the maillogs using a couple of perl cron scripts
> (linux machine with mysql )
>
> Now the requirement is of realtime reporting.
>
> I tried using rsyslog with a mysql table. But t
Am 15.03.2013 07:59, schrieb Ram:
> I have a postfix server sending out mails and we are creating reports by
> parsing the maillogs using a couple of perl cron scripts
> (linux machine with mysql )
>
> Now the requirement is of realtime reporting.
> I tried using rsyslog with a mysql table. But th
On 03/14/2013 05:07 PM, Kris Deugau wrote:
> Jerry wrote:
>> Personally, I have no idea why anyone uses "procmail". For relatively
>> fine grain sorting of mail upon delivery, I use Dovecot and Sieve. From
>> what I can ascertain, procmail hasn't even been maintained in over a
>> decade.
>
> Sieve
Please keep this on-list. I'm not doing personal support for free.
On 2013-03-14 Littlefield, Tyler wrote:
> On 3/14/2013 2:51 AM, Ansgar Wiechers wrote:
>>On 2013-03-13 Littlefield, Tyler wrote:
>>> I'd also like to be able to use procmail on these.
>>
>> Procmail is designed for local delivery.
Hi,
if i use
smtp_tls_security_level = may
is
smtp_tls_policy_maps honored ?
background , i want all outgoing mail encrypt if possible with fallback
to plain ( this should be "may" )
but to special domains in
smtp_tls_policy_maps
i want them always encrypt, with no fallback to plain ( mail
Am 15.03.2013 10:34, schrieb Robert Schetterer:
> Hi,
>
> if i use
>
> smtp_tls_security_level = may
>
> is
>
> smtp_tls_policy_maps honored ?
>
> background , i want all outgoing mail encrypt if possible with fallback
> to plain ( this should be "may" )
>
> but to special domains in
>
> smt
[- Thu 14.Mar'13 at 12:07:14 -0400 Kris Deugau :-]
> Jerry wrote:
> > Personally, I have no idea why anyone uses "procmail". For relatively
> > fine grain sorting of mail upon delivery, I use Dovecot and Sieve. From
> > what I can ascertain, procmail hasn't even been maintained in
On Fri, 15 Mar 2013 11:27:59 +
James Griffin articulated:
> [- Thu 14.Mar'13 at 12:07:14 -0400 Kris Deugau :-]
>
> > Jerry wrote:
> > > Personally, I have no idea why anyone uses "procmail". For
> > > relatively fine grain sorting of mail upon delivery, I use
> > > Dovecot an
The Doctor skrev den 2013-03-14 21:47:
I want to avoid perl-ware like amavisd and MailScanner
Any recommendations for a milter that would drop high spam?
clamav-milter with 3dr party signatures
http://www.sanesecurity.com/
Robert Schetterer:
> Hi,
>
> if i use
>
> smtp_tls_security_level = may
>
> is
>
> smtp_tls_policy_maps honored ?
As a general rule, per-destination SMTP/TLS policy lookup results
override main.cf (and master.cf) settings.
You enable smtp_tls_policy_maps lookups by specifying a non-empty
valu
Am 15.03.2013 13:11, schrieb Wietse Venema:
> Robert Schetterer:
>> Hi,
>>
>> if i use
>>
>> smtp_tls_security_level = may
>>
>> is
>>
>> smtp_tls_policy_maps honored ?
>
> As a general rule, per-destination SMTP/TLS policy lookup results
> override main.cf (and master.cf) settings.
>
> You enabl
Robert Schetterer:
> Am 15.03.2013 13:11, schrieb Wietse Venema:
> > Robert Schetterer:
> >> Hi,
> >>
> >> if i use
> >>
> >> smtp_tls_security_level = may
> >>
> >> is
> >>
> >> smtp_tls_policy_maps honored ?
> >
> > As a general rule, per-destination SMTP/TLS policy lookup results
> > override m
I have a very similar issue, although my goal is not to negotiate TLS with
specific domains. I have:
main.cf
smtp_tls_security_level = may
smtp_tls_policy_maps = hash:/etc/postfix/tls_policy
/etc/postfix/tls_policy
example.com none
.example.com none
>From the documentation I
Am 15.03.2013 15:06, schrieb Wietse Venema:
> Robert Schetterer:
>> Am 15.03.2013 13:11, schrieb Wietse Venema:
>>> Robert Schetterer:
Hi,
if i use
smtp_tls_security_level = may
is
smtp_tls_policy_maps honored ?
>>>
>>> As a general rule, per-destination
On Fri, Mar 15, 2013 at 10:09:17AM -0400, JL Hill wrote:
> /etc/postfix/tls_policy
>
> example.com none
> .example.com none
>
> From the documentation I read, I thought postfix would not try negotiating
> TLS with the example.com mail server, but it does.
>
> (I posted this qu
Thank you for your response. I assume I have something wrong, or I
misunderstood the documentation.
I have tested sending mail to example.com. A "dig example.com MX" gives:
example.com. 2546 IN MX 10 smtp1.example.com.
example.com. 2546 IN MX 20 smtp2.example.com.
example.com. 2546 IN MX 30 smtp3
On Fri, Mar 15, 2013 at 04:09:47PM -0400, JL Hill wrote:
> Thank you for your response. I assume I have something wrong, or I
> misunderstood the documentation.
>
> I have tested sending mail to example.com. A "dig example.com MX" gives:
>
> example.com. 2546 IN MX 10 smtp1.example.com.
> exampl
I feel more confused. I had originally tested
example.com none
and it failed. I searched the documentation, and found .example.com to use
for subdomains, so I thought that would fit my case as the negotiation is
with smtp2.example.com, even though I am emailing john@example.com
When I
On Fri, Mar 15, 2013 at 05:19:30PM -0400, JL Hill wrote:
> I feel more confused. I had originally tested
>
> example.com none
>
> and it failed. I searched the documentation, and found .example.com to use
> for subdomains, so I thought that would fit my case as the negotiation is
> with sm
My apologies, I grabbed the wrong snippet of log file (same host, different
server). Here is the entire connection log (I changed only the domain name
and xxx'd the ip address):
Mar 3 06:36:10 host postfix/smtp[4]: initializing the client-side TLS
engine
Mar 3 06:36:11 host postfix/smtp[
ge.
> <http://www.freebsd.org/cgi/query-pr.cgi?pr=174007> has been closed.
I have updated the Postfix patch for "lmdb" databases. This is now
included in snapshot 20130315.
However, this code has several unexpected limitations. I documented
the ones that I discovered today in L
On Fri, Mar 15, 2013 at 07:20:24PM -0400, JL Hill wrote:
> My apologies, I grabbed the wrong snippet of log file (same host, different
> server). Here is the entire connection log (I changed only the domain name
> and xxx'd the ip address):
No, don't apologize, in fact you grabbed exactly the rig
23 matches
Mail list logo