Viktor Dukhovni:
> On Thu, Nov 19, 2015 at 03:26:27PM -0800, Vicki Brown wrote:
>
> > The only program that uses /usr/local/cutedge/postfix/etc is.. postfix.
>
> Well, the real Postfix uses /etc/postfix, as evidenced by the errors
> logged by postdrop(1). Whatever is asking sendmail(1) and postd
Wietse Venema:
> Viktor Dukhovni:
> > On Thu, Nov 19, 2015 at 03:26:27PM -0800, Vicki Brown wrote:
> >
> > > The only program that uses /usr/local/cutedge/postfix/etc is.. postfix.
> >
> > Well, the real Postfix uses /etc/postfix, as evidenced by the errors
> > logged by postdrop(1). Whatever is
On 18 November 2015 at 16:18, Wietse Venema wrote:
>
> This ends with:
>
> Nov 18 10:28:52 mailserver postfix/smtpd[31664]: < unknown[1.1.1.1]:
> RCPT TO:
> ...
> Nov 18 10:28:52 mailserver postfix/smtpd[31664]: > unknown[1.1.1.1]:
> 250 2.1.5 Ok
> ...
> Nov 18 10:28:52 mailse
Wietse:
> Note that the last RCPT TO command was not delivered to Postfix. I
> therefore suspect that you have some anti-malware system that breaks
> connections when a client sends suspicious email.
Matt Bayliss:
> I checked the hardware firewall config, which does have a threat detection
> & shu
On 18 Nov 2015, at 10:34, Matt Bayliss wrote:
[4] TCP stream decoded acket capture of above session
http://pastebin.centos.org/36261/
The first line there which should be a SMTP greeting banner is instead:
220
That matches what I see when telnetti
On Fri, Nov 20, 2015 at 11:44:25AM -0800, Terry Barnum wrote:
> I'm trying to be a little more specific in a body_check to reject certain
> spoofed spam. I have it currently working when searching for just a single
> line but would like to learn how to expand the search to multiple lines.
Not pos
Viktor Dukhovni:
> On Fri, Nov 20, 2015 at 11:44:25AM -0800, Terry Barnum wrote:
>
> > I'm trying to be a little more specific in a body_check to reject certain
> > spoofed spam. I have it currently working when searching for just a single
> > line but would like to learn how to expand the search
I'm trying to be a little more specific in a body_check to reject certain
spoofed spam. I have it currently working when searching for just a single line
but would like to learn how to expand the search to multiple lines. The spam
looks like (modified to prevent being rejected by the body_checks
Looking at message_size_limit and mailbox_size_limit, if I want to allow
internal users the ability to send 100M emails it seems like 1) applies to all
messages both in-bound and out-bound and 2) I'll need to increase
mailbox_size_limit to what factor of message_size_limit?
On Fri, Nov 20, 2015 at 05:42:13PM -0600, Chris Boylan wrote:
> Looking at message_size_limit and mailbox_size_limit, if I want to allow
> internal users the ability to send 100M emails it seems like 1) applies to all
> messages both in-bound and out-bound
Your internal users can use an MSA and m
10 matches
Mail list logo