Hi,
You might want to 'replace' the postfix sendmail command with
mini_sendmail or something alike, and have that actually forward to
localhost:25 using SMTP. Then you can apply throttling on the localhost
ip, but lose the ability to see which local user was the source.
Tom
On 11-11-15 08:41, B
* on the Tue, Nov 10, 2015 at 10:51:10AM -0500, Phil Stracchino wrote:
> I'm not even ready to look at TLSA yet. I'm actually still working on
> finishing up my DKIM setup. Does anyone have a favorite preferred
> information resource for a how-to on getting started with DNSSEC?
I wrote an overv
Hi
I've got a client who wants to do mandatory TLS for e-amils to as well
as from several parties, identified by their domains. Outbound mandatory
TLS is easy enough using smtp_tls_policy_maps. We have also enabled
opportunistic TLS on the smtpd and have explained to our client that
he'd be in con
Tobias Reckhard:
> Is there any parameter signalling the TLS state that I can use in
> smtpd_sender_restrictions (or later)?
See: reject_plaintext_session
http://www.postfix.org/postconf.5.html#reject_plaintext_session
Wietse
Hi
On 11.11.2015 14:51, Wietse Venema wrote:
> See: reject_plaintext_session
> http://www.postfix.org/postconf.5.html#reject_plaintext_session
Cool, thanks a lot, I'd missed that.
Cheers,
Tobias
On Wed, Nov 11, 2015 at 12:59:49PM +0100, Tobias Reckhard wrote:
> I've got a client who wants to do mandatory TLS for e-amils to as well
> as from several parties, identified by their domains. Outbound mandatory
> TLS is easy enough using smtp_tls_policy_maps. We have also enabled
> opportunistic
On Wed, Nov 11, 2015 at 09:28:56AM +, Mike Cardwell wrote:
> I wrote an overview of how it works a while ago on my blog which a few
> people have told me helped with their understanding:
>
> https://grepular.com/Understanding_DNSSEC
Thanks for publishing! A couple of the items are a bit dat