On Wed, 5 Jul 2017 12:11:41 -0400 (EDT)
wie...@porcupine.org (Wietse Venema) wrote:
> I suggest that you remove the postscreen_cache_map file and do
> 'postfix reload'.
Im not sure this was but it looks normally again. So all mails
arrived.
Thank you for help & Nice day
Silvio
Hello,
I have a setup where a MTA will forward mail to another node, based on
ldap configuration.
It works well, but it uses ADH
Received: from corrin.geekwu.org (unknown [87.98.180.13])
(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
(No client certificate req
Bastien Durel:
> Hello,
>
> I have a setup where a MTA will forward mail to another node, based on
> ldap configuration.
> It works well, but it uses ADH
>
> Received: from corrin.geekwu.org (unknown [87.98.180.13])
> (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
>
Hi people,
I am looking for some plugin which is similar to smtp-limiter which is for
DirectAdmin. It would be nice if there would be any. If not, is there any
similar plugin which can be manage by the linux console?
--
*Pozdrawiam / Best Regards*
*Piotr Bracha*
*tel. 534 555 877*
*ser...@p
On Thu, Jul 06, 2017 at 03:01:22PM +0200, Poliman - Serwis wrote:
> I am looking for some plugin which is similar to smtp-limiter
> which is for DirectAdmin. It would be nice if there would be any.
What does that plugin do? What is the actual problem you're trying
to solve?
BTW, this is not the
On Thu, Jul 06, 2017 at 01:03:03PM +0200, Bastien Durel wrote:
> I have a setup where a MTA will forward mail to another node, based on ldap
> configuration.
> It works well, but it uses ADH
>
> Received: from corrin.geekwu.org (unknown [87.98.180.13])
> (using TLSv1.2 with cipher ADH-AES25
Thank you for answer. This plugin gives ability to limit number of sending
emails. Above some value user's account is blocked and mail is send to
administrator. I use postfix with ISP Config. It does not have to be plugin
for ISP. It can be something just for postfix which can be manage as shell
us
> On Jul 6, 2017, at 7:03 AM, Bastien Durel wrote:
>
> I have a setup where a MTA will forward mail to another node, based on ldap
> configuration.
> It works well, but it uses ADH
>
> Received: from corrin.geekwu.org (unknown [87.98.180.13])
> (using TLSv1.2 with cipher ADH-AES256-GCM-S
Dear Postfix folks,
There are several SMTP servers, where messages should only be sent over
a secure channel. But, the postmasters have set up the servers
differently. Some use CAs to sign their certificates and some DANE with
self-signed certificates.
To avoid maintaining two TLS policies,
On Thu, Jul 06, 2017 at 07:37:47PM +0200, Paul Menzel wrote:
> There are several SMTP servers, where messages should only be sent over a
> secure channel. But, the postmasters have set up the servers differently.
> Some use CAs to sign their certificates and some DANE with self-signed
> certificat
Dear Postfix users,
First I am sorry, for probably bringing up a topic, which has probably
discussed to end on this list, like [1], and in the end was probably a
user error. I’ll try to provide the information requested in [1]. Thank
you for your patience and help in advance.
The goal is to
When using virtual domains, is there a way to return a temp fail message for a
specific user in a domain? I am not finding anything about that in the
documentation.
I tried to implement RBL and postfwd. I placed everything in main.cf:
smtpd_recipient_restrictions =
check_policy_service inet:127.0.0.1:10040
reject_invalid_hostname,
reject_non_fqdn_sender,
reject_non_fqdn_recipient,
reject_unknown_sender_domain,
On 7/6/2017 1:45 PM, Doug Hardie wrote:
> When using virtual domains, is there a way to return a temp fail message for
> a specific user in a domain? I am not finding anything about that in the
> documentation.
>
You can use a check_{sender, recipient}_access map (whichever is
appropriate, or
On Thu, Jul 06, 2017 at 11:45:01AM -0700, Doug Hardie wrote:
> When using virtual domains,
(That part is not relevant.)
> is there a way to return a temp fail message for a specific
> user in a domain? I am not finding anything about that in the
> documentation.
http://www.postfix.org/SMTPD_ACC
On 7/6/2017 1:45 PM, Doug Hardie wrote:
> I tried to implement RBL and postfwd. I placed everything in main.cf:
>
> smtpd_recipient_restrictions =
> check_policy_service inet:127.0.0.1:10040
> reject_invalid_hostname,
> reject_non_fqdn_sender,
> reject_non_fqdn_recipient,
On Thu, Jul 06, 2017 at 08:27:35PM +0200, Paul Menzel wrote:
> $ sudo posttls-finger -t30 -T180 -c -L verbose,summary gwdg.de
There's no need to run posttls-finger as root. And "verbose"
is just distracting.
> posttls-finger: setting up TLS connection to
> mfilter-123-3-1.mx.srv.dfn.de[194.95.
Thanks for the pointers on that. I spent a couple days digging around and
never found it.
On 6 July 2017, at 12:06, /dev/rob0 wrote:
>
>
> On Thu, Jul 06, 2017 at 11:45:01AM -0700, Doug Hardie wrote:
>> When using virtual domains,
>
> (That part is not relevant.)
>
>> is there a way to ret
Doug Hardie:
> Thanks for the pointers on that. I spent a couple days digging
> around and never found it.
Alternative:
/etc/postfix/main.cf:
transport_maps = hash:/etc/postfix/transport
/etc/postfix/transport:
us...@example.com retry:This mailbox is temporarily unavailable
us...@ex
Le 06/07/2017 à 15:59, Viktor Dukhovni a écrit :
The reason ADH is used, is that the client is not bothering to authenticate
the server, and so does not bother to ask for a certificate it will anyhow
ignore. If you want secure transport, you need to set the client TLS
security level to "secure",
> On 6 July 2017, at 12:40, Doug Hardie wrote:
>
>>
>> On 6 July 2017, at 12:06, Noel Jones wrote:
>>
>> main.cf doesn't allow spaces in the options. The supported syntax
>> is to either use commas "," rather than spaces; enclose the option
>> in braces "{ ... }"; or the preferred method of
21 matches
Mail list logo