On Wed, Aug 18, 2021 at 08:53:40AM +0200, Marcel de Riedmatten
wrote:
> Le mercredi 18 août 2021 à 14:32 +1000, raf a écrit :
> >
> > It would be great if certbot supported multiple simultaneous
> > certificates
> > for a domain, so that the next certificate could be ready in advance.
> > Then
Le mercredi 18 août 2021 à 17:45 +1000, raf a écrit :
>
> I'll need to find out how to replace one certificate
> with the other as well.
Keep in mind that both certificates will have a different path. It goes
so:
1) create the new certificate
2) add a TLSA record to the zone for the new key and
Dnia 17.08.2021 o godz. 17:35:18 Viktor Dukhovni pisze:
>
> Unless you have friends in high places at Gmail, or manage to get law
> enforcement interested, you're unlikely to get much feedback.
I think it would be good to forward all this thread to mai...@mailop.org
mailing list (details at https
Ron Garret:
> Is there an easy way to tell postfix to send a copy of every message
> it receives to a ?shadow server? in a way that preserves the SMTP
> envelope? I?m trying to tune a spam filter on actual data, but I
> don?t want to do it on my production server because the tuning is
> likely to
Wietse Venema:
> Ron Garret:
> > Is there an easy way to tell postfix to send a copy of every message
> > it receives to a ?shadow server? in a way that preserves the SMTP
> > envelope? I?m trying to tune a spam filter on actual data, but I
> > don?t want to do it on my production server because t
On Wed, 2021-08-18 at 00:43 -0400, Viktor Dukhovni wrote:
> On Tue, Aug 17, 2021 at 09:18:08PM -0400, fp145 wrote:
>
> > Aug 18 02:58:09 libertyfp postfix/lmtp[11706]: D0C4941E97:
> > to=, orig_to=,
> > relay=mail.libertyfp.org[private/dovecot-lmtp], delay=0.96,
> > delays=0.91/0.02/0.02/
On Wed, 2021-08-18 at 15:59 +1000, raf wrote:
>
> Database files used with
> sender_dependent_relayhost_maps need either an email
> address or a @domain on the left hand side.
>
> You are trying to use shell glob-style patterns instead
> of email addresses or @domains. I don't think
> glob-style
Heya Folks,
When managing the master.cf file with postconf, specific services requiring
additional options not using "-o" fail.
I want to have an end state of:
policyd-spf unix - n n - 0 spawn
user=policyd-spf argv=/usr/bin/policyd-spf
Currently I can create t
Robert Pufky:
> Currently I can create the service:
> $ postconf -M 'policyd-spf/unix=policyd-spf unix - n n - 0 spawn'
>
> But attempting to add additional args not using "-o" fails:
> $ postconf -M 'policyd-spf/unix=policyd-spf unix - n n - 0 spawn'
> $ postconf -P 'policyd-spf/unix/user=policyd
>
> Why not:
> # postconf -M 'policyd-spf/unix=policyd-spf unix - n n - 0 spawn
> argv=/usr/bin/policyd-spf ...'
>
> As documented "postconf -P" is for '-o parameter=value' not for
> other command-line arguments.
Thanks! Definitely a case of asking the question and discovering the right
answer a
Im confused by this situation. Two separate independent servers both
running same version of postfix and both setup the same way with virtual
users and alias address stored in SQL.
main.cf:
virtual_transport = lmtp:unix:private/dovecot-lmtp
virtual_mailbox_maps = proxy:mysql:/etc/postf
Im confused by this situation. Two separate independent servers both
running same version of postfix and both setup the same way with
virtual users and alias address stored in SQL.
Okay, i think i figured out what is going on. On the second server that
im sending email to, im sending from a thi
post...@ptld.com:
> Im confused by this situation. Two separate independent servers both
> running same version of postfix and both setup the same way with virtual
> users and alias address stored in SQL.
>
> main.cf:
> virtual_transport = lmtp:unix:private/dovecot-lmtp
> virtual_mai
post...@ptld.com:
> > Im confused by this situation. Two separate independent servers both
> > running same version of postfix and both setup the same way with
> > virtual users and alias address stored in SQL.
>
> Okay, i think i figured out what is going on. On the second server that
> im sendi
Is there anyway to prevent this behavior? Have the third server just
send the email to who it was told to send it to, the alias address.
Don't expand the alias.
I don't understand this. As far as i know, *IM* not expanding the alias.
Is this a setting in postfix? Is this a default behavior?
> On 18 Aug 2021, at 2:41 pm, post...@ptld.com wrote:
>
>> Don't expand the alias.
>
> I don't understand this. As far as i know, *IM* not expanding the alias.
> Is this a setting in postfix? Is this a default behavior?
You are expanding the alias, by configuring a virtual(5) alias table
entry w
Don't expand the alias.
I don't understand this. As far as i know, *IM* not expanding the
alias.
Is this a setting in postfix? Is this a default behavior?
You are expanding the alias, by configuring a virtual(5) alias table
entry with an expansion for the alias. To not expand the alias, use
> On 18 Aug 2021, at 2:50 pm, post...@ptld.com wrote:
>
> It is an all or nothing situation? To not "expand" that means not having
> alias lookup at all even for incoming messages? The fact i have virtual alias
> lookup for incoming that means postfix will by default use that for outgoing?
> No
A useful rubric to keep in mind is:
* There's no such thing as outbound mail,
all mail comes in, and then it goes out...
Any notion of incoming or outgoing is a mental model you overlay on
your use of the Postfix MTA, the actual MTA is just a message switch.
The expansion of virtual alias
On Aug 18, 2021, at 11:55 AM, Viktor Dukhovni
wrote:
> If you want different processing for inbound and outbound mail,
> use separate Postfix instances configured appropriately to the
> task at hand.
There is a useful distinction to be made between mail that is injected into the
system by an
> On 18 Aug 2021, at 3:01 pm, post...@ptld.com wrote:
>
>> A useful rubric to keep in mind is:
>> * There's no such thing as outbound mail,
>>all mail comes in, and then it goes out...
>> Any notion of incoming or outgoing is a mental model you overlay on
>> your use of the Postfix MTA, the a
> On 18 Aug 2021, at 3:07 pm, Ron Garret wrote:
>
>> If you want different processing for inbound and outbound mail,
>> use separate Postfix instances configured appropriately to the
>> task at hand.
>
> There is a useful distinction to be made between mail that is injected into
> the system by
On Aug 18, 2021, at 12:13 PM, Viktor Dukhovni
wrote:
>> On 18 Aug 2021, at 3:07 pm, Ron Garret wrote:
>>
>>> If you want different processing for inbound and outbound mail,
>>> use separate Postfix instances configured appropriately to the
>>> task at hand.
>>
>> There is a useful distincti
On Wed, Aug 18, 2021 at 12:27:36PM -0700, Ron Garret wrote:
> > Milters are primarily for content filtering,
>
> Sure, but...
>
> > they don't or shouldn’t affect address rewriting and message routing.
>
> That doesn’t make sense to me. One of the main uses of a milter is to
> sequester mail w
* Ken N.:
> does ubuntu linux have the keystone chain management? thanks.
"Keychain" is Apple's name for an application that deals with
system-wide and user-specific passwords, certificates, and other
sensitive information. Ubuntu uses a different mechanism, as do the
other Linux distributions. S
* raf:
> If you don't mind having a key that lasts "forever", you only need
> one(!) extra line in Bind's zone config, and one(!) manual interaction
> with your domain registrar.
Well, sort of. As per default settings, BIND does not appear to create a
key signing key (KSK) / zone signing key (ZSK
> On 18 Aug 2021, at 3:52 pm, Ralph Seichter wrote:
>
> Well, sort of. As per default settings, BIND does not appear to create a
> key signing key (KSK) / zone signing key (ZSK) pair, but instead one
> single key to sign each zone. That's sufficient from a technical
> perspective, but whenever th
* Viktor Dukhovni:
> With ECDSA P256(13) as the DNSKEY (signature) algorithm, the incentive
> to rotate keys frequently (~90 days) is substantially lower [...]
I still use RSA keys (algorithm 8). My main point is that I find it more
convenient to only roll ZSK, and to only place KSK data into the
> On 18 Aug 2021, at 4:35 pm, Ralph Seichter wrote:
>
> I still use RSA keys (algorithm 8). My main point is that I find it more
> convenient to only roll ZSK, and to only place KSK data into the parent
> zone. The latter requires me to ask my hosting provider to manually
> update key material in
On Wed, Aug 18, 2021 at 09:52:38PM +0200, Ralph Seichter
wrote:
> * raf:
>
> > If you don't mind having a key that lasts "forever", you only
> > need one(!) extra line in Bind's zone config, and one(!) manual
> > interaction with your domain registrar.
>
> Well, sort of. As per default setting
The adoption of DNSSEC seems to have increased a lot in
the past 12 months (~30% increase).
Is google / gmail using it yet?
Last i knew they weren't using DNSSEC or DANE.
On Wed, Aug 18, 2021 at 11:04:10AM +0200, Marcel de Riedmatten
wrote:
> Le mercredi 18 août 2021 à 17:45 +1000, raf a écrit :
> >
> > I'll need to find out how to replace one certificate
> > with the other as well.
>
> Keep in mind that both certificates will have a different path. It goes
> s
On Wed, Aug 18, 2021 at 10:03:06PM -0400, post...@ptld.com wrote:
> > The adoption of DNSSEC seems to have increased a lot in
> > the past 12 months (~30% increase).
>
> Is google / gmail using it yet?
There are 4 GMail MX hosts that are not publicised by Google,
but are DNSSEC signed:
mx[1
On Wed, Aug 18, 2021 at 10:03:06PM -0400, post...@ptld.com wrote:
> > The adoption of DNSSEC seems to have increased a lot in
> > the past 12 months (~30% increase).
>
> Is google / gmail using it yet?
> Last i knew they weren't using DNSSEC or DANE.
Nope.
> host -t ds google.com
google.com
On Thu, Aug 19, 2021 at 02:44:44PM +1000, raf wrote:
> > Is google / gmail using it yet?
> > Last i knew they weren't using DNSSEC or DANE.
>
> Nope.
Actually, yes to some extent. See my more detailed response.
> But it's still a very small percentage overall.
I'm tracking ~15.8 million DNSSE
35 matches
Mail list logo