You have uncommented the bypass instructions in amavis conf file, so it will
bypass the scan. Keep them commented and amavis will scan.
To test that amavis works well :
https://gist.github.com/ychaouche/9b32bda037afb9eaaa2f4809dcfb2ec0
(can't paste the content here otherwise this e-mail will b
:-)
I've had some problems with using unionmaps. Finally it showed that they
were caused by improper configuration of services in the `master.cf'. So
I have decided to improve my knowledge by studying how postfix services
really work and cooperate more thoroughly. I've started with:
http://www.po
Thanks for the reply.
chaouche yacine wrote
> You have uncommented the bypass instructions in amavis conf file, so it
> will bypass the scan. Keep them commented and amavis will scan.
I find that a bit confusing as every document I've read about setting this
up says to uncomment those lines. Her
I have been fooled too. See this link :
http://shisaa.jp/postset/mailserver-3.html it says there :
"Lets first check to see if anti-virus and spam filtering are enabled. Check if
the two lines that start with @bypass_spam_checks and @bypass_virus_checks are
commented out. If you uncomment the
> On Feb 26, 2017, at 11:37 AM, Marek Kozlowski
> wrote:
>
> Let's assume that services defined in `master.cf' are as follows:
> ---
> smtp inet n - n - - smtpd
> -o content_filter=spamassas
I see you did not post your /etc/amavis/conf.d/15-av_scanners file, you need to
uncomment clamav there otherwise no scanner will run for you I guess.
It should look something like this :
['ClamAV-clamd',
\&ask_daemon, ["CONTSCAN {}\n", "/var/run/clamav/clamd.sock"],
qr/\bOK$/, qr/\bFOUND$/
On 02/26/2017 06:18 PM, Viktor Dukhovni wrote:
>
>> On Feb 26, 2017, at 11:37 AM, Marek Kozlowski
>> wrote:
>>
>> Let's assume that services defined in `master.cf' are as follows:
>> ---
>> smtp inet n - n
> On Feb 26, 2017, at 12:26 PM, Marek Kozlowski
> wrote:
>
>>> smtp inet n - n - - smtpd
>>> -o content_filter=spamassassin
>>> -o receive_override_options=no_address_mappings
>>
>> Mail that comes in via SMTP is (initially) force-routed to the
>> above spec
I tried using the following in /etc/amavis/conf.d/15-15-content_filter_mode:
@bypass_virus_checks_maps = ();
@bypass_spam_checks_maps = ();
This didn't help. Also, with the configs I originally posted, I do get spam
checking when from the server console I telnet to port 10024 and
On 02/26/2017 06:40 PM, Viktor Dukhovni wrote:
[...]
Thank you (and Wietse) very much for clarification!
Best regars,
Marek
smime.p7s
Description: S/MIME Cryptographic Signature
Here is the relevant section of 15-av_scanners:
['ClamAV-clamd',
\&ask_daemon, ["CONTSCAN {}\n", "/var/run/clamav/clamd.ctl"],
qr/\bOK$/, qr/\bFOUND$/,
qr/^.*?: (?!Infected Archive)(.*) FOUND$/ ],
--
View this message in context:
http://postfix.1071664.n5.nabble.com/postfix-amavis-
Hello list,
I would highly appreciate it if someone advised on the following, please.
I have these settings:
postscreen_greet_action = enforce
postscreen_dnsbl_action = drop
postscreen_dnsbl_threshold = 1
postscreen_dnsbl_sites = zen.spamhaus.org bl.spamcop.net
b.barracudacentral.org
The IP add
On Feb 22, 2017 6:46 PM, wrote:
On Feb 22, 2017, at 16.21, Ian Evans wrote:
>
> Background: Have a postfix/dovecot/amavisd-new system that has been
running smoothly for several years. Just a handful of virtual users, ie:
> /home/vmail/example.com/ianevans/Maildir
>
> As we are starting to use mu
Suspecting a mail routing issue, here is a summary of port assignments from
various config files (full config files are in original post). Maybe this
will allow someone to see a problem that I am missing.
Also, a bit of history may help... this server has been migrated from a
functional installat
This is my guess :
When a mail arrives at the postfix queue, it is picked up by the pickup
process. You have configured pickup to use dkimsign on port 10026 as a content
filter (in masster.cf).
port 10026 is the configured port for dkimproxy_in, which forwards to 10029.
postfix listens on por
That makes sense and seems to have done the trick. Thanks!!
What I still don't get (and maybe never will), is why...
1) On the Lenny server, the main.cf content_filter sent mail to 10028, the
relay port for dkim_proxy_out, and this system worked! I might be able to
accept sending to the listeni
Ahh, ok, now i got it.
I thought, a similar question was already answered but it seems I missed the
answer
on my own question, sorry. It stayed in my outgoing box an I assumed, there was
a
delivery problem. That's why I sent it twice.
Back to the problem, as I pointed out, the delivery attempt
> On Feb 26, 2017, at 5:56 PM, Thomas Minor wrote:
>
> And, on the other side, postfix as a client
> should not reuse a dead connection.
Postfix (somewhat obviously) cannot "reuse" a closed connection.
The other server must have kept open.
It is in principle possible to add a feature to limit
By the way, as a test I put the bypass lines in
/etc/amavis/conf.d/15-15-content_filter_mode back to their default settings
and enabled them - mail is still being checked for spam and viri. So it
appears that piece also remains a bit mysterious.
--
View this message in context:
http://postfix.
Den1:
> 22:19:13 postfix/postscreen[14390]: CONNECT from [46.22.210.20]:58953 to
> [1.1.1.1]:25
> 22:19:13 postfix/dnsblog[14391]: addr 46.22.210.20 listed by domain
> zen.spamhaus.org as 127.0.0.3
> 22:19:17 postfix/postscreen[14390]: DNSBL rank 1 for [46.22.210.20]:58953
> 22:19:17 postfix/postsc
Hi Viktor,
thanks for the answer. I'll try to suggest this to the other servers admin team.
Since I do not know if they consider this, I'll stick to disabled default
connection reuse.
I'm interested which end of the connection is responsible of the problem, I'll
setup a test
for this sometime.
Wietse Venema wrote
> Den1:
>> 22:19:13 postfix/postscreen[14390]: CONNECT from [46.22.210.20]:58953 to
>> [1.1.1.1]:25
>> 22:19:13 postfix/dnsblog[14391]: addr 46.22.210.20 listed by domain
>> zen.spamhaus.org as 127.0.0.3
>> 22:19:17 postfix/postscreen[14390]: DNSBL rank 1 for [46.22.210.20]:5895
Hello
My setup running with Postfix+Dovecot+Roundcube+Mysql
Now I need to add the Password function to roundcube and are available now
with the Passwd plugin, but I need to know
with what hash I need to do this? How will postfixadmin generate the
passwort to add mysql db.
In the meantime
23 matches
Mail list logo