On 11.07.18 17:51, Steve Atkins wrote:
I have a VM that's running two services. One of them is a vanilla postfix
smarthost - it accepts mail on port 587 and relays it out to the world.
The other is an unrelated smtp server that listens for inbound email on port
25. They use unrelated domains a
On Thu, Jul 12, 2018 at 02:27:06PM +0200, Matus UHLAR - fantomas wrote:
> Why do you run two different smtp servers on the same host?
Multi-instance configurations can be simpler to design, each instance
does one thing well. Whether my work-around for IP-address sharing
is sufficiently simple is
My postfix servers remain pretty busy throughout the day getting around
100 - 200 mails / second
I have seen that for every 100 k mails around 20 mails disappear from
the queue.
From maillogs , I can see smtpd accepting the connection , creating a
queue-id and then cleanup picking it up.
But
On Thu, Jul 12, 2018 at 07:20:26PM +0530, Ram wrote:
> My postfix servers remain pretty busy throughout the day getting around
> 100 - 200 mails / second
>
> I have seen that for every 100 k mails around 20 mails disappear from
> the queue.
> From maillogs , I can see smtpd accepting the conne
On 07/12/2018 07:36 PM, Viktor Dukhovni wrote:
On Thu, Jul 12, 2018 at 07:20:26PM +0530, Ram wrote:
My postfix servers remain pretty busy throughout the day getting around
100 - 200 mails / second
I have seen that for every 100 k mails around 20 mails disappear from
the queue.
From maillo
On Thu, Jul 12, 2018 at 08:08:17PM +0530, Ram wrote:
> On 07/12/2018 07:36 PM, Viktor Dukhovni wrote:
> > On Thu, Jul 12, 2018 at 07:20:26PM +0530, Ram wrote:
> >
> >> My postfix servers remain pretty busy throughout the day getting around
> >> 100 - 200 mails / second
> >>
> >> I have seen that f
Hello,
I intend to protect some internal email distribution lists in a way,
which is described here:
http://www.postfix.org/RESTRICTION_CLASS_README.html
I would need to add "check_recipient_access ..." to the parameter
"smtpd_recipient_restrictions". The actual value of this parameter in
I'm conducting a test to see if the URL rewrite issue is better, for me anyway.
Please ignore.
Test =
http://postfix.1071664.n5.nabble.com/new-strangeness-with-O365-td96344.html
Should be http:// postfix.1071664.n5.nabble.com
/new-strangeness-with-O365-td96344.html
-ANGELO FAZZINA
ITS Servi
On 7/12/2018 12:29 PM, rog7...@web.de wrote:
> Hello,
>
> I intend to protect some internal email distribution lists in a way,
> which is described here:
>
> http://www.postfix.org/RESTRICTION_CLASS_README.html
>
> I would need to add "check_recipient_access ..." to the parameter
> "smtpd_reci
Hello,
postfix-3.3.1 + openssl-1.1.1pre8
For fun I tried to disable all TLS protocol versions other then TLS1.3
master.cf:
submission.local inet n - - - - smtpd
-o smtpd_tls_protocols=!SSLv2,!SSLv3,!TLSv1,!TLSv1.1,!TLSv1.2
but I'm still able to connect using TLS1.2
$ openssl versi
A. Schulze:
> Hello,
>
> postfix-3.3.1 + openssl-1.1.1pre8
>
> For fun I tried to disable all TLS protocol versions other then TLS1.3
>
> master.cf:
> submission.local inet n - - - - smtpd
>-o smtpd_tls_protocols=!SSLv2,!SSLv3,!TLSv1,!TLSv1.1,!TLSv1.2
That setting is ONLY in effect with '
Am 12.07.2018 um 22:39 schrieb Wietse Venema:
> A. Schulze:
>> Hello,
>>
>> postfix-3.3.1 + openssl-1.1.1pre8
>>
>> For fun I tried to disable all TLS protocol versions other then TLS1.3
>>
>> master.cf:
>> submission.local inet n - - - - smtpd
>>-o smtpd_tls_protocols=!SSLv2,!SSLv3,!TLSv1
Am 12.07.2018 um 21:19 schrieb Noel Jones:
Yes, your simplified settings are fine.
Thank you.
One last question. In the following configuration the file
/etc/postfix/access contains the email addresses which should not be
accessible from outside:
smtpd_relay_restrictions =
permit_mynet
I've been successfully using Postfix 3.3.1 behind an Haproxy for a few
weeks now, and while this is a minor complaint, I just wondered if it
was known.
I have dual-stack ipv4/v6 support enabled and as a result most of my
mail that comes from Google comes from an ipv6 address.
The IP address is no
On 7/12/2018 4:18 PM, rog7...@web.de wrote:
> One last question. In the following configuration the file
> /etc/postfix/access contains the email addresses which should not be
> accessible from outside:
>
> smtpd_relay_restrictions =
> permit_mynetworks
> reject_unauth_destination
>
> smt
cvandesa...@opendmz.com:
> I've been successfully using Postfix 3.3.1 behind an Haproxy for a few
> weeks now, and while this is a minor complaint, I just wondered if it
> was known.
>
> I have dual-stack ipv4/v6 support enabled and as a result most of my
> mail that comes from Google comes from a
Thanks for the reply- information regarding the protocols can be found
here: https://www.haproxy.org/download/1.8/doc/proxy-protocol.txt
But to save time, they switched to a non-text format, as you said.
If I could code it I would :(
2.1. Human-readable header format (Version 1)
This is the for
cvandesa...@opendmz.com:
> Thanks for the reply- information regarding the protocols can be found
> here: https://www.haproxy.org/download/1.8/doc/proxy-protocol.txt
>
> But to save time, they switched to a non-text format, as you said.
>
> If I could code it I would :(
>
> 2.1. Human-readable h
On Thu, Jul 12, 2018 at 04:39:20PM -0400, Wietse Venema wrote:
> > For fun I tried to disable all TLS protocol versions other then TLS1.3
> >
> > master.cf:
> > submission.local inet n - - - - smtpd
> >-o smtpd_tls_protocols=!SSLv2,!SSLv3,!TLSv1,!TLSv1.1,!TLSv1.2
>
> That setting is ONLY i
19 matches
Mail list logo