On 22/10/20 6:13 am, PGNet Dev wrote:
Before I take this up as an opendmarc question (my config &/or bug), &
do more thorough digging re: intuit's published records,
(1) Is there anything obviously wrong/missing in that^ XCLIENT usage
generally, or in the specific intuit.com case above, that w
On 23/10/20 2:26 pm, Bob Proulx wrote:
The tragicomical thing is that Gmail does follow policy and when the
policy of the sending site is strict DMARC and the mailing list does
not rewrite then Gmail subscribers to mailing lists will get
automatically unsubscribed when/if the bounce ratio exceeds
On 23/10/2020 09:27, Nick Tait wrote:
On 22/10/20 6:13 am, PGNet Dev wrote:
Before I take this up as an opendmarc question (my config &/or bug),
& do more thorough digging re: intuit's published records,
(1) Is there anything obviously wrong/missing in that^ XCLIENT usage
generally, or in the
We divided our outbound email into two streams: transactional and
bulk. Each of the streams uses different ip addresses. One ip for
transactional email and a randmap group of four ips for bulk email.
The transactional email is sent from domain @raystedman.org. The bulk
email is sent from a subdo
On 10/22/20 12:47 PM, Aki Tuomi wrote:
> Hi!
>
> I stumbled upon a possible bug with postfix. I am using postfix 3.4.14, and
> when I use XCLIENT command over smtps (not starttls), the session gets stuck
> until further input, which causes it to abort the connection due to
> unexpected SSL pack
On Fri, Oct 23, 2020 at 11:55:20AM -0400, Demi M. Obenour wrote:
> On 10/22/20 12:47 PM, Aki Tuomi wrote:
> > I stumbled upon a possible bug with postfix. I am using postfix 3.4.14, and
> > when I use XCLIENT command over smtps (not starttls), the session gets
> > stuck until further input, which
Greg Sims:
> We divided our outbound email into two streams: transactional and
> bulk. Each of the streams uses different ip addresses. One ip for
> transactional email and a randmap group of four ips for bulk email.
> The transactional email is sent from domain @raystedman.org. The bulk
> email
Wietse Venema:
> The exact message, incluing the name 'alph765' of the cluster with
> broken reverse DNS:
> https://forums.att.com/conversations/att-internet-email-security/prodigynet-reverse-dns-lookup-is-broken/5f07b53ac17a063d9bfecdb8
>
> It affects multiple domains hosted at AT&T:
> https://co
On Fri, Oct 23, 2020 at 3:26 PM Demi M. Obenour wrote:
> >> "p=quarantine" might be a better choice, but I do consider lack of
> >> DMARC to be a security hole. I certainly don't want someone to be
> >> able to forge mail that claims to be from me. There are all sorts of
> >> nasty social engin
> A more targeted approach is to use smtp_delivery_status_filter with
> a regexp that targets that exact error message, and that changes a
> 'hard' reject into a soft one.
> For inspiration to turn hard into soft rejects, see examples at
> http://www.postfixlorg/postconf.5.html#default_delivery_st
Greg Sims:
> > A more targeted approach is to use smtp_delivery_status_filter with
> > a regexp that targets that exact error message, and that changes a
> > 'hard' reject into a soft one.
>
> > For inspiration to turn hard into soft rejects, see examples at
> > http://www.postfixlorg/postconf.5.h
>> Oct 21 20:22:39 memoryalpha dovecot: imap-login: Aborted login (no auth
>> attempts in 0 secs): user=<>, rip=127.0.0.1, lip=127.0.0.1, secured,
>> session=
>
> But note also "dovecot" showing up here. It looks like the spammer is
> using some feature of Dovecot to originate a connection to t
On Fri, Oct 23, 2020 at 12:57:06PM -0700, Rich Wales wrote:
> > But note also "dovecot" showing up here. It looks like the spammer is
> > using some feature of Dovecot to originate a connection to the Postfix
> > SMTP server.
>
> Actually, it's most likely a log entry from a periodic probe of my
On 23/10/20 6:26 pm, Nick Tait wrote:
In summary, you'd want to create a script in a language of your
choice, which in the simplest case does this:
1. Reads in lines until a blank line.
2. Then sees if the lines that it read included the line
"client_address=127.0.0.1".
3. If it did, the
14 matches
Mail list logo