FYI it was a Microsoft O365 configuration issue, indeed. In our hybrid
environment (O365 + Postfix) a routing configuration that is commonly
enabled in O365 (called "inbound connector") generated that loop.
After a few weeks of mail exchanges with Microsoft support they gave
us the solution. If you
On 4/26/20 11:47 PM, Peter wrote:
> On 27/04/20 2:02 am, Richard Damon wrote:
>> On 4/26/20 8:15 AM, Peter wrote:
>>> On 27/04/20 12:00 am, Richard Damon wrote:
Except that if the sender is sending from a domain with an email
policy
that effectively says, "This domain is intended to
Hello I need help to using header_checks, I create a rule
/^Subject:.*hacked*/ DISCARD
that work propertly, but a want to know it is posible to email me o to alert
me when this rule occur or is aplicated. For some way. Oviusly I see that on
the mail.log
regards
--
Sent from: http://postfix.1
jmpatagonia:
> Hello I need help to using header_checks, I create a rule
>
> /^Subject:.*hacked*/ DISCARD
An alternative is to use HOLD action, assuming you aren't using
software that hijacks the HOLD feature for other purposes, such as
mailscanner. Then you can review the email with "postcat -q
Hello Witse do you mean to use HOLD action on header_checks ?
like this ?
/^Subject:.*hacked*/ HOLD
And that whats suppose to do ?
It is holded the email on the queue ? and I can check with mailq command ?
and later detele from queue and email me a alert
Sorry for ask and not try, because we
On 27.04.20 13:27, Juan Manuel P wrote:
Hello Witse do you mean to use HOLD action on header_checks ?
like this ?
/^Subject:.*hacked*/ HOLD
And that whats suppose to do ?
if Wietse's message wasn't enough for you, I recommend looking at
http://www.postfix.org/header_checks.5.html
It is hol
Juan Manuel P:
> Hello Witse do you mean to use HOLD action on header_checks ?
>
> like this ?
>
> /^Subject:.*hacked*/ HOLD
By the way that "*" at the end is useless.
> And that whats suppose to do ?
>
> It is holded the email on the queue ? and I can check with mailq command ?
> and later d
* pe...@pajamian.dhs.org:
> DKIM is not required for DMARC.
Now you're just being ridiculous, and have earned yourself a membership
in my killfile. "DMARC [...] builds on the widely deployed SPF and DKIM
protocols" (https://dmarc.org "What is DMARC?").
-Ralph
https://dmarc.org/2017/03/can-i-use-dmarc-if-i-have-only-deployed-spf/
"...
you can use DMARC with only SPF – and absolutely should, at least as far as
enabling reporting –
..."
On Mon, Apr 27, 2020, 3:55 PM Ralph Seichter wrote:
> * pe...@pajamian.dhs.org:
>
> > DKIM is not required for DMAR
On Sun, Apr 19, 2020 at 02:16:01PM -0400, Viktor Dukhovni wrote:
> On Sun, Apr 19, 2020 at 08:02:41PM +0200, Matus UHLAR - fantomas wrote:
>
> > On 19.04.20 13:11, Wietse Venema wrote:
> >
> > >Warning: libc-musl breaks DANE/TLSA security.
> > >Use a glibc-based Linux distribution instead.
> > >Re
10 matches
Mail list logo