Dnia 1.04.2021 o godz. 18:02:19 Michael Grimm pisze:
One of the bigger email providers in Germany (t-online.de = TOL) started
to block my IPv4 address. I do assume that this has to do with being
blocklisted (see
http://www.uceprotect.net/en/rblcheck.php?ipr=135.125.211.209), although
my IP addre
Dnia 2.04.2021 o godz. 13:41:40 Matus UHLAR - fantomas pisze:
>
> using their L2 and L3 lists shouldn't be used as exclusive spam signs, but
> their L1 list should be quite reliable.
>
> Their L2 and L3 are just indicators that IP comes from problematic source
> (e.g. spam-friendly company/ISP o
On 01.04.21 21:58, DEPRÉ Gaëtan - NGServers.com wrote:
Default for tls_wrappermode is 'no'. I changed the values.
I hope you only changed value of tls_wrappermode for smtps/465.
...and I hope you learned to read docs anr proposed configs instead of blindly
configuring something to master.cf ;-
On 2021-04-01 11:02, Michael Grimm wrote:
Background of my question:
One of the bigger email providers in Germany (t-online.de = TOL)
started to block my IPv4 address. I do assume that this has to do with
being blocklisted (see
http://www.uceprotect.net/en/rblcheck.php?ipr=135.125.211.209),
alth
Please read CVE-2019-20790, and tell me you’ve found a way to tell
PyPolicyd not to trust the SMTP HELO to generate a passing AR
header.
This is possibly off-topic for the Postfix list... maybe not.
…with tongue in cheek, I’ll take all the discussion about mail
filtering over any about p
On Sat, 3 Apr 2021, Simon Wilson wrote:
Please read CVE-2019-20790, and tell me you’ve found a way to tell
PyPolicyd not to trust the SMTP HELO to generate a passing AR header.
This is possibly off-topic for the Postfix list... maybe not.
…with tongue in cheek, I’ll take all the discussion