-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi all,
Unfortunately, I'm finding this singularly unhelpful:
- Original Message
Subject: Postfix SMTP server: errors from unknown[209.85.212.69]
Date: Thu, 22 Aug 2013 23:39:49 -0700 (PDT)
From: mailer-dae...@mail.parts-unknown.or
It depends on MTA. From the log, AOL may not use Postifx or customized the
checking on RCPT_TO stage (PolicyD or milter, etc).
However, the result is that AOL MTA don't accept it for your MAIL FROM,
RCPT TO parameters.
Regards,
King
2013/8/23 DTNX Postmaster
> On Aug 23, 2013, at 07:54, Grant
On Aug 23, 2013, at 09:20, David Benfell wrote:
> Unfortunately, I'm finding this singularly unhelpful:
>
> - Original Message
> Subject: Postfix SMTP server: errors from unknown[209.85.212.69]
Check your DNS configuration; that IP address has matching forward and reverse
rec
On Aug 23, 2013, at 09:25, King Cao wrote:
> It depends on MTA. From the log, AOL may not use Postifx or customized the
> checking on RCPT_TO stage (PolicyD or milter, etc).
>
> However, the result is that AOL MTA don't accept it for your MAIL FROM, RCPT
> TO parameters.
http://postmaster.ao
Probably trivial, but I am in holiday and using an emergency connection,
so I ask instead of searching again.
Problem: a website in a multidomain server is spamming probably due to a
bug in the site code.
The owners are also in holiday; I can't stop the website; I can't stop
postfix :-(
All
On Aug 23, 2013, at 10:01, Barbara M. wrote:
> Probably trivial, but I am in holiday and using an emergency connection, so I
> ask instead of searching again.
> Problem: a website in a multidomain server is spamming probably due to a bug
> in the site code.
> The owners are also in holiday; I c
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 08/23/2013 12:55 AM, DTNX Postmaster wrote:
> On Aug 23, 2013, at 09:20, David Benfell
> wrote:
>
>> Unfortunately, I'm finding this singularly unhelpful:
>>
>> - Original Message Subject: Postfix SMTP
>> server: errors from unk
>> It depends on MTA. From the log, AOL may not use Postifx or customized the
>> checking on RCPT_TO stage (PolicyD or milter, etc).
>>
>> However, the result is that AOL MTA don't accept it for your MAIL FROM, RCPT
>> TO parameters.
>
> http://postmaster.aol.com/Postmaster.Errors.php
>
> The AOL
On 08/22/2013 01:51 PM, Charles Marcus wrote:
[snip]
>
> The simple fact is, we do not have any users based *anywhere* but the
> US, so, is what is the simplest way to block any/all non-US based client
> connections on my submission port?
>
[snip]
Hi,
Sometimes it seems like a good solution to f
David Benfell:
> Why is this line not working?
>
> smtp_tls_key_file = /big/www/ssl/munich/munich.parts-unknown.org.key
http://www.postfix.org/DEBUG_README.html#no_chroot
Try turning off chroot operation in master.cf
A common mistake is to turn on chroot operation in the master.cf
file without
Barbara M.:
> smtpd_sender_restrictions = check_sender_access
> hash:/etc/postfix/sender_access
That is for mail received via SMTP.
In your case use authorized_submit_users instead.
http://www.postfix.org/postconf.5.html#authorized_submit_users
Wietse
On 08/23/2013 12:47 PM, Mikael Bak wrote:
[snip]
In fact it's not a good idea at all IMO.
People do travel and they need to read and write email while they are
abroad.
Laptop and/or smartphone users will not like your new restriction policy
when they try to get some work done while visiting a pa
How can I disable postfix from sending administrator email
notifications. ie from: r...@domain.com to: r...@domain.com?
Thanks in advance
Am 23.08.2013 14:29, schrieb Roman Gelfand:
> How can I disable postfix from sending administrator email
> notifications. ie from: r...@domain.com to: r...@domain.com?
why would you want to do this?
disable the root cause producing the messages
instead break the MTA - postfix job is to send
mes
You are right. Stupid me. I just realized, I don't want to do this.
Please, ignore.
On Fri, Aug 23, 2013 at 8:31 AM, li...@rhsoft.net wrote:
>
>
> Am 23.08.2013 14:29, schrieb Roman Gelfand:
>> How can I disable postfix from sending administrator email
>> notifications. ie from: r...@domain.com
Op 19/08/2013 om 13:11:04 -0400, schreef Wietse Venema:
> Leo Baltus:
> > > > However, I did notice that postfix exec()'s new processes using the
> > > > path to the binaries it got from
> > > > 'PATH=symlink_to_postfix/sbin postfix start'
> > > > instead of compile-time arguments DEF_COM
On 23/08/2013 13:42, Roman Gelfand wrote:
You are right. Stupid me. I just realized, I don't want to do this.
Please, ignore.
On Fri, Aug 23, 2013 at 8:31 AM, li...@rhsoft.net wrote:
Am 23.08.2013 14:29, schrieb Roman Gelfand:
How can I disable postfix from sending administrator email
noti
Leo Baltus:
> Op 19/08/2013 om 13:11:04 -0400, schreef Wietse Venema:
> > Leo Baltus:
> > > > > However, I did notice that postfix exec()'s new processes using the
> > > > > path to the binaries it got from
> > > > > 'PATH=symlink_to_postfix/sbin postfix start'
> > > > > instead of compil
On Aug 23, 2013, at 12:16, Grant wrote:
>>> It depends on MTA. From the log, AOL may not use Postifx or customized the
>>> checking on RCPT_TO stage (PolicyD or milter, etc).
>>>
>>> However, the result is that AOL MTA don't accept it for your MAIL FROM,
>>> RCPT TO parameters.
>>
>> http://p
On Aug 23, 2013, at 10:36, David Benfell wrote:
>> Have you tested your server with 'openssl s_client'? This is what I
>> am getting;
>>
>> $ openssl s_client -connect mail.parts-unknown.org:25 -starttls
>> smtp CONNECTED(0003) 4851:error:140770FC:SSL
>> routines:SSL23_GET_SERVER_HELLO:unkno
Wietse Venema:
> Leo Baltus:
> > Op 19/08/2013 om 13:11:04 -0400, schreef Wietse Venema:
> > > Leo Baltus:
> > > > > > However, I did notice that postfix exec()'s new processes using the
> > > > > > path to the binaries it got from
> > > > > > 'PATH=symlink_to_postfix/sbin postfix start'
On 19/08/13 23:15, Viktor Dukhovni wrote:
On Mon, Aug 19, 2013 at 10:32:27PM +0100, Rowland Penny wrote:
If you want to return
a particular single address for each user, you need to select a
result attribute that contains *only* that address.
That is what I was trying to do, do a search of a g
It depends on MTA. From the log, AOL may not use Postifx or customized the
checking on RCPT_TO stage (PolicyD or milter, etc).
However, the result is that AOL MTA don't accept it for your MAIL FROM,
RCPT TO parameters.
>>>
>>> http://postmaster.aol.com/Postmaster.Errors.p
On Fri, 23 Aug 2013, Wietse Venema wrote:
Barbara M.:
smtpd_sender_restrictions = check_sender_access hash:/etc/postfix/sender_access
That is for mail received via SMTP.
In your case use authorized_submit_users instead.
http://www.postfix.org/postconf.5.html#authorized_submit_users
Thanks
Barbara M.:
> On Fri, 23 Aug 2013, Wietse Venema wrote:
>
> > Barbara M.:
> >> smtpd_sender_restrictions = check_sender_access
> >> hash:/etc/postfix/sender_access
> >
> > That is for mail received via SMTP.
> >
> > In your case use authorized_submit_users instead.
> >
> > http://www.postfix.org/
I apologize in advance for the long post. I started working for a small ISP
with around 3000 mailboxes and inherited a Postfix server that I've been
auditing. It's based on Ubuntu 8.04 LTS, Postfix 2.51, and runs Courier for
pop and imap authentication. It has encrypted passwords in a MySQL databa
David Hulsebus:
> But without the ability to use CRAM-MD5, DIGEST-MD5, NTLM, how can
> I use TLS to make the connection and authorize the clients?
TLS (formerly known as SSL) encrypts the SMTP session. This uses
the STARTTLS command.
SASL authenticates the user. This uses the AUTH command. With
On Aug 23, 2013, at 21:38, David Hulsebus wrote:
> I apologize in advance for the long post. I started working for a small ISP
> with around 3000 mailboxes and inherited a Postfix server that I've been
> auditing. It's based on Ubuntu 8.04 LTS, Postfix 2.51, and runs Courier for
> pop and imap a
On Friday, August 23, 2013 15:38:38 David Hulsebus wrote:
> I apologize in advance for the long post. I started working for a small ISP
> with around 3000 mailboxes and inherited a Postfix server that I've been
> auditing. It's based on Ubuntu 8.04 LTS, Postfix 2.51, and runs Courier for
> pop and
When I added "noplaintext" as a security option and because MD5 was in the
mech list SASL complained about no auth mechanism when it started. MD5 was
already in the mech list but never failed because auth never reached it in
the past, plain took precedence.
I removed "noplaintext" and removed eve
On Fri, Aug 23, 2013 at 03:01:52PM +0100, Rowland Penny wrote:
> dn: CN=albert,CN=Users,DC=example,DC=com
> otherMailbox: alb...@example.com
> otherMailbox: alb...@domain1.com
> otherMailbox: alb...@domain2.com
>
> The only problem that I have found is, any LDAP search with
> 'result_attribute =
On Wed, Aug 21, 2013 at 10:44:40PM +0200, Sebastian Wiesinger wrote:
> I just did, here is the PCAP:
>
> http://www.karotte.org/smtp-gmx.pcap
The client sends an "internal error" alert. It is not clear what
problem it is encountering. The server elects:
Cipher Suite: TLS_ECDHE_ECDSA_WITH_
On 08/24/2013 04:35 AM, David Hulsebus wrote:
Why shouldn't I require TLS to encrypt all sessions for any clients who
authenticates to send mail out. Isn't that what following parameter
accomplishes ?
smtpd_tls_security_level = encrypt
The manual says "Encrypt - MUST NOT be applied in case of a
On 8/23/2013 9:35 PM, David Hulsebus wrote:
>
> When I added "noplaintext" as a security option and because MD5 was in the
> mech list SASL complained about no auth mechanism when it started. MD5 was
> already in the mech list but never failed because auth never reached it in
> the past, plain too
34 matches
Mail list logo