On Thu, Jan 08, 2009 at 11:26:57AM +0800, tony liu wrote:
> Hello,
>
> When my customers send mails with nonsexist domain(sometimes maybe typo
> error, EX. u...@hotmail.org ), these mails will be rejected and in queue for
> a long time(normally 5 days), Is there a way for postfix to remove these
On Thu, Jan 08, 2009 at 09:59:54AM -0300, Reinaldo de Carvalho wrote:
> On Thu, Jan 8, 2009 at 6:01 AM, Geert Hendrickx wrote:
> >
> > You can just refuse them: put "reject_unknown_recipient_domain" in your
> > smtpd_recipient_restrictions -- assuming the typo do
On Thu, Jan 15, 2009 at 01:56:11PM -0800, Rich Shepard wrote:
> On Thu, 15 Jan 2009, mouss wrote:
>
>> if you forward DNS queries to your ISP, then the rate limit applies to
>> your ISP. spamhaus don't see mail hitting your servers. They only see DNS
>> queries.
>
> Ah, so! That explains it. I ru
On Thu, Jan 22, 2009 at 11:08:52AM +0200, Tolga wrote:
>> http://www.google.com/search?q=self+signed+certificate
> I have been reading
> https://help.ubuntu.com/8.04/serverguide/C/postfix.html and I applied
> some parts and skipped some (as I don't have SASL anywhere mentioned in
> main.cf), and I
On Thu, Jan 29, 2009 at 12:22:13PM +0100, mouss wrote:
> Jan 29 00:38:17 imlil postmx/smtpd[26222]: NOQUEUE: reject: RCPT from
> unknown[147.203.208.166]: 550 5.7.1 Client host rejected: cannot find
> your hostname, [147.203.208.166];
> from=<3ff.4.69709687-17084...@cherryimprovise.com> to=
> proto
ta_restrictions =
> check_sender_access hash:/etc/postfix/backscatterer
>
> # backscatterer
> <> reject_rbl_client ips.backscatterer.org
Just wondering; why do you apply this in smtpd_data_restrictions and not in
smtpd_sender_restrictions?
Geert
--
Geert Hendrick
README.
PS: you should post complete `postconf -n` output rather than just snippets
from your main.cf file.
Geert
--
Geert Hendrickx -=- g...@telenet.be -=- PGP: 0xC4BB9E9F
This e-mail was composed using 100% recycled spam messages!
server too, all connecting to a central (not replicated) MySQL.
Policyd's behaviour when MySQL becomes unavailable is configurable, it can
either tempfail (4xx) all incoming e-mail or "dunno" it.
Geert
--
Geert Hendrickx -=- g...@telenet.be -=- PGP: 0xC4BB9E9F
This e-mail was composed using 100% recycled spam messages!
al well
> with interrupted connections, from what I found on google.
FWIW, policyd v2 uses innodb.
Geert
--
Geert Hendrickx -=- g...@telenet.be -=- PGP: 0xC4BB9E9F
This e-mail was composed using 100% recycled spam messages!
are in the same domain, you can specify a catch-all
address with the domain-default action:
us...@example.com action1
us...@example.com action2
@example.com REJECT foobar
Geert
--
Geert Hendrickx -=- g...@telenet.be -=- PGP: 0xC4BB9E9F
This e-mail was composed using 100% recycled spam messages!
by postfix and just want to drop the messages into
your mailbox, you could just as well deliver directly via procmail,
dovecot deliver or any other LDA. Or use Postfix' sendmail command line
interface.
Just add "mda /path/do/delivry/program" to your .fetchmailrc.
Geert
-
r, but a policy daemon would probably be more efficient for your case:
http://www.postfix.org/SMTPD_POLICY_README.html
Geert
--
Geert Hendrickx -=- g...@telenet.be -=- PGP: 0xC4BB9E9F
This e-mail was composed using 100% recycled spam messages!
ing "virtual_transport" to it.
http://www.postfix.org/postconf.5.html#virtual_transport
http://www.postfix.org/master.5.html
Geert
--
Geert Hendrickx -=- g...@telenet.be -=- PGP: 0xC4BB9E9F
This e-mail was composed using 100% recycled spam messages!
Look for transport_* settings in postconf(5), you
can all override them for "myprog" specifically with myprog_*.
Geert
--
Geert Hendrickx -=- g...@telenet.be -=- PGP: 0xC4BB9E9F
This e-mail was composed using 100% recycled spam messages!
maildrop? :-)
Geert
--
Geert Hendrickx -=- g...@telenet.be -=- PGP: 0xC4BB9E9F
This e-mail was composed using 100% recycled spam messages!
x27;s next release, couldn't it?
"that way" is "via pipe". You can invoke maildrop via pipe as in:
maildrop unix - n n - - pipe
flags=DRhu user=vmail argv=/usr/local/bin/maildrop -d ${recipient}
It was just an example.
Gee
s.yourdomain.net smsnotif:
Where you define smsnotif in master.cf with "pipe" to a script of your
own. Be careful about error handling here, so you don't start bouncing
mails to senders when the sms script doesn't work. For something non-
essential as SMS notification
On Wed, Oct 21, 2009 at 06:52:21PM +0500, rihad wrote:
> Geert Hendrickx wrote:
> >In your case (SMS notifications) however, I would keep things simple
> >and not try to integrate it so tightly into the delivery process, but
> >just fork your incoming mails to two transports:
s that send incorrect MAIL FROM or RCPT TO addresses syntax.
> > >
> > > Similar mappings may solve problems with REMOTE SMTP server responses,
> > > or with SMTP client or server outputs by Postfix itself.
> > >
> > > Wietse
> >
>
>
--
Geert Hendrickx -=- g...@telenet.be -=- PGP: 0xC4BB9E9F
This e-mail was composed using 100% recycled spam messages!
; prefixes on some labels.
>
> This said, I would really discourage any attempts to do domain
> replacement with regexp command editing.
You're probably right, there are too many different cases to be handled by
simple regexpes. But a separate "rewrite olddomain to newdomain" feat
d_recipient_restrictions. This will make Postfix respond with:
450 4.1.2 : Recipient address rejected: Domain not found
Geert
--
Geert Hendrickx -=- g...@telenet.be -=- PGP: 0xC4BB9E9F
This e-mail was composed using 100% recycled spam messages!
On Tue, Aug 19, 2008 at 09:27:39PM -0400, Adam C. Mathews wrote:
> Presenting using the following blacklists...
>
> dul.dnsbl.sorbs.net
> psbl.surriel.com
> zen.spamhaus.org
>
>
> These do a good job for me, but I wanted to look for opinions on a
> couple additional ones. Specifically look for
On Wed, Dec 03, 2008 at 09:59:17PM -0500, brian dodds wrote:
> On Wed, Dec 3, 2008 at 8:25 PM, Wietse Venema <[EMAIL PROTECTED]> wrote:
> >
> > Some third-party library is calling stuff before Postfix chroots.
> >
> > Postfix does not support chroot environments that are out of sync
> > with the ho
On Thu, Dec 04, 2008 at 10:15:55AM -0500, Sahil Tandon wrote:
> Gabriel Hahmann <[EMAIL PROTECTED]> wrote:
>
> > I'm new to the list and have a problem with my mail system. Recently I'm
> > receiving a lot of spam emails coming from the internet but the sender is a
> > user from my domain. Then I
On Sun, Dec 07, 2008 at 11:13:15AM -0500, Sahil Tandon wrote:
> Also consider rejecting machines that HELO (or EHLO) with "dynamic
> looking" hostnames.
As well as your own IP, hostname and domain(s). No-one shoud use those
as their HELO, but some (stupid) spammers do (hoping to get whitelisted
On Wed, Dec 10, 2008 at 04:38:17PM +0100, Dennis // [EMAIL PROTECTED] wrote:
> My questions are:
> As the spamscanners are the best or primary MX´s
> for the customers domains, would postfix then just probe itself, and
> always get a positive answer due to my catch-all entry ?
>
> Or would postfix
On Wed, Dec 10, 2008 at 05:36:04PM +0100, Dennis // [EMAIL PROTECTED] wrote:
> But how would recipient verification behave when the customers
> mailserver is unavailable ?
Postfix then sends a temporary failure (4xx) back to the client.
> Would one have to rely on the cache or would postfix hol
On Mon, Oct 10, 2022 at 07:22:18 -0400, Wietse Venema wrote:
> To find out if you have messages flagged as "corrupt", you can
> use the "postfix check" command.
>
> Execute as root:
>
> postfix check
>
FYI, with grep 3.8, this triggers deprecation warnings on 'egrep':
$ s
On Wed, Oct 12, 2022 at 10:41:36 -0400, Wietse Venema wrote:
> local_header_rewrite_clients = permit_mynetworks, permit_sasl_authenticated
>
> Why it isn't the default I cannot remember.
The HISTORY file says it is:
> 20041014-23
>
> Postfix still appends $@myorigin or .$mydomain to hea
On Tue, Jun 06, 2023 at 09:48:11 -0400, Wietse Venema via Postfix-users wrote:
> * Optional: harden a Postfix SMTP server against remote SMTP
> clients that violate RFC 2920 (or 5321) command pipelining
> constraints. With "smtpd_forbid_unauth_pipelining = yes", the
> server disconnec
On Tue, Jun 06, 2023 at 10:31:30 -0400, Wietse Venema via Postfix-users wrote:
> Geert Hendrickx via Postfix-users:
> > What is the relation between new "smtpd_forbid_unauth_pipelining"
> > and existing "reject_unauth_pipelining" in smtpd_*_restrictions?
On Wed, Nov 15, 2023 at 10:29:41 -0500, James Cloos via Postfix-users wrote:
> LE announced a while back that they would not renew the cross cert.
Yes, but dropping the cross-signed X1 root cert from the default chain
last week was an accident:
https://community.letsencrypt.org/t/shortening-the-l
On Mon, Dec 18, 2023 at 17:40:49 -0500, Wietse Venema via Postfix-users wrote:
> Viktor Dukhovni via Postfix-users:
> > - Postfix 3.9 (pending official release soon), rejects unuthorised
> > pipelining by default: "smtpd_forbid_unauth_pipelining = yes".
> >
> > - Postfix 3.8.1, 3.7.6, 3.6.10 and
On Sat, Dec 23, 2023 at 18:09:10 -0500, Wietse Venema via Postfix-users wrote:
> Note that only the encapsulating message can contain a DKIM signature
> by the authenticated sender's domain. The smuggled message caannot
> contain a DKIM signature by the impersonated sender's domain unless
> the att
On Thu, Dec 21, 2023 at 07:51:31 -0500, Wietse Venema via Postfix-users wrote:
> * With all Postfix versions, "smtpd_data_restrictions =
> reject_unauth_pipelining" will stop the published exploit.
Hi
I just found an unexpected side effect of this particular configuration
(unrelated to SMT
On Thu, Jan 04, 2024 at 10:36:23 -0500, Wietse Venema via Postfix-users wrote:
> Wietse Venema via Postfix-users:
> > Geert Hendrickx via Postfix-users:
> > > I just found an unexpected side effect of this particular configuration
> > > (unrelated to SMTP smuggling).
&g
On Sat, Jan 06, 2024 at 14:47:59 -0500, Wietse Venema via Postfix-users wrote:
> Damian:
> > If I remember correctly, on the wire there was \r\n\r\n.\r\r\n
>
> Viktor Dukhovni:
> > Does that also need to be more strict? :-(
>
> Indeed, and as usual the fix is trivial. This process is backwards,
On Sat, Jan 06, 2024 at 20:10:34 -0500, Wietse Venema via Postfix-users wrote:
> People are welcome to test tools against postfix-3.9-20240106.
With postfix-3.9-20240106 (with smtpd_forbid_bare_newline=yes but
smtpd_forbid_unauth_pipelining=no) all smuggling tests now fail,
including CRCRL tests.
On Tue, Feb 13, 2024 at 12:23:32 -0500, Wietse Venema via Postfix-users wrote:
> - masquerade_domains complicates table-driven address validation.
> Log a deprecation warning with compatibility_levels>=3.9.
What's the alternative for masquerade_domains ?
Geert
On Tue, Feb 13, 2024 at 12:51:51 -0500, Viktor Dukhovni via Postfix-users wrote:
> On Tue, Feb 13, 2024 at 06:32:14PM +0100, Geert Hendrickx via Postfix-users
> wrote:
> > What's the alternative for masquerade_domains ?
>
> It is canonical_maps, ideally with explicit map
On Thu, Mar 07, 2024 at 00:22:31 +0100, Steffen Nurpmeso via Postfix-users
wrote:
> Thanks to the README i got it going with
>
> masquerade_domains = $mydomain
> local_header_rewrite_clients = permit_mynetworks,permit_tls_clientcerts
>
> However, i first tried to add these via -o to the abov
Hi
We have few different sets of Postfix mailservers with different roles;
inbound servers, outbound servers that DKIM sign outgoing mail with a
milter, and some other servers that just relay mail that is already signed
elsewhere.
The first and third types of mailservers don't need to sign mail p
On Fri, Jun 21, 2024 at 16:22:24 -0400, Wietse Venema wrote:
> Locally-generated bounces are generated by the Postfix bounce
> daemon which talks to a cleanup service to queue a message.
> One could run bounce daemons with a cleanup_service override
> in master.cf:
Thanks Wietse, that makes sens
On Mon, Sep 09, 2024 at 00:17:08 +1000, Viktor Dukhovni via Postfix-users wrote:
> And of course, I'd negligent to not mention that I don't recommend a hard
> requirement of TLS on port 25, you may one day reject some important mail
> and not even know it, and if STARTTLS stops working, you may be
On Sun, Sep 08, 2024 at 19:39:43 +0200, hostmaster--- via Postfix-users wrote:
> Interesting approach if i correctly understood what you do: You are running
> STARTTLS, basically accepting unencrypted connections but with
> "warn_if_reject reject_plaintext_session" you are rejecting unencrypted
> s
On Thu, Oct 17, 2024 at 12:18:54 +0200, Matus UHLAR - fantomas via
Postfix-users wrote:
> > On Tue, Oct 15, 2024 at 16:03:13 +0100, Paul Fowler via Postfix-users wrote:
> > > Are there best practices for avoid OS username enumeration on a mail
> > > relay?
>
> On 1
On Tue, Oct 15, 2024 at 16:03:13 +0100, Paul Fowler via Postfix-users wrote:
> Are there best practices for avoid OS username enumeration on a mail relay?
Just set local_recipient_maps appropriately, without unix:passwd.byname if you
don't need it.
I set it to $alias_maps plus an inline:{} list
Hi
> warning: run-time library vs. compile-time header version mismatch:
> OpenSSL 3.4.0 may not be compatible with OpenSSL 3.3.0
Is this warning still relevant with OpenSSL's new versioning scheme,
where OpenSSL 3.x releases are guaranteed[1] to be ABI compatible ?
[1] https://openssl-library.
On Thu, Oct 24, 2024 at 11:33:22 -0400, Wietse Venema via Postfix-users wrote:
> And for the Postfix SMTP server, this would add two guards
> to Viktor's example:
>
> smtpd_tls_security_level =
> ${{$compatibility_level} >=level {3.10} ?
> {${built_with_tls ?
>
On Thu, Sep 19, 2024 at 02:02:50 +1000, Viktor Dukhovni via Postfix-users wrote:
> This makes it possible to write "forward-looking" configs that will use
> newer groups once they're available in the OpenSSL runtime.
Well actually, in this case it achieves the opposite, as the individual
checking
On Mon, Sep 23, 2024 at 18:32:00 +1000, Viktor Dukhovni via Postfix-users wrote:
> This is not a release-notes-worthy change, just avoids loss of minor forensic
> detail for externally loaded kex "groups" (or, more generally, KEMs).
That's only true for the very last change - but the entire chang
On Fri, Sep 20, 2024 at 20:06:43 +1000, Viktor Dukhovni via Postfix-users wrote:
> If it is possible to test kyber768 with OpenSSL 3.0 or 3.1, please do,
> and post your findings to the list.
Tested with OpenSSL 3.0 as well now (RHEL 9 version), with oqs-provider added.
$ openssl version
OpenSSL
On Thu, Sep 19, 2024 at 01:01:42 +1000, Viktor Dukhovni via Postfix-users wrote:
> The OBJ_sn2nid() function is not extensible, and not affected by loading
> of providers. To actually be able to map this algorithm to a "nid", the
> base OpenSSL code would have to know about "x25519_kyber768".
Ok
On Thu, Sep 19, 2024 at 08:26:53 +0200, Geert Hendrickx via Postfix-users wrote:
> I confirm your patch works, I can now use these new key exchanges in Postfix.
Could the reverse lookup be fixed as well, for Received headers and logging?
> Anonymous TLS connection established from X: T
On Thu, Sep 19, 2024 at 19:10:05 +1000, Viktor Dukhovni via Postfix-users wrote:
> On Thu, Sep 19, 2024 at 10:01:16AM +0200, Geert Hendrickx via Postfix-users
> wrote:
>
> > > Anonymous TLS connection established from X: TLSv1.3 with cipher
> > > TLS_AES_128_GCM_SHA2
Hi Viktor
I was recently playing around with oqs-provider[1] for PQC support in openssl,
but couldn't get it to work with Postfix 3.9.0 for TLSv1.3 key exchange.
Specifically, this provider implements new Key Encapsulation Methods like
"x25519_kyber768", which I can use with `openssl s_server -gr
On Thu, Sep 19, 2024 at 12:54:41 +1000, Viktor Dukhovni via Postfix-users wrote:
> Not a problem, the proposed decoration would be part of the element, but
> I'm arguing that it is not needed.
>
> https://github.com/openssl/openssl/issues/21633#issuecomment-2359871975
I agree the need is only on
On Thu, Sep 19, 2024 at 17:44:36 +1000, Viktor Dukhovni via Postfix-users wrote:
> Try the below:
Perfect:
> Anonymous TLS connection established from X: TLSv1.3 with cipher
> TLS_AES_128_GCM_SHA256
> (128/128 bits) key-exchange x25519_kyber768 server-signature ECDSA
> (prime256v1)
> server-di
On Wed, Sep 18, 2024 at 21:29:07 +1000, Viktor Dukhovni via Postfix-users wrote:
> On Wed, Sep 18, 2024 at 01:04:58PM +0200, Geert Hendrickx wrote:
>
> > Specifically, this provider implements new Key Encapsulation Methods like
> > "x25519_kyber768", which I can use wi
On Wed, Sep 18, 2024 at 14:02:32 +0200, Geert Hendrickx via Postfix-users wrote:
> On Wed, Sep 18, 2024 at 21:29:07 +1000, Viktor Dukhovni via Postfix-users
> wrote:
> > You should initially test with "posttls-finger",
>
> `posttls-finger -L ssl-debug` shows su
On Fri, Sep 20, 2024 at 00:40:35 +1000, Viktor Dukhovni via Postfix-users wrote:
> So you should be able to apply the top-most commit at:
>
> https://github.com/vdukhovni/postfix/commits/provider-kex/
>
> to a Postfix 3.10-20240917 (or earlier, modulo the expected conflict in
> the HISTORY
On Thu, Sep 19, 2024 at 21:41:44 +1000, Viktor Dukhovni via Postfix-users wrote:
> Can you build Postfix after running "makedefs" with "OPT='-g -ggdb3'",
> and set a break-point in posttls-finger at line ~1054 of tls_misc.c:
>
> 1054 if (tls_get_peer_dh_pubkey(ssl, &dh_pkey)) {
With a PQ
On Thu, Oct 24, 2024 at 20:00:05 +1100, Viktor Dukhovni via Postfix-users wrote:
> And this is the logic used in Postfix >= 3.10-20240612, but while you've
> upgraded to a shiny new OpenSSL, you haven't also upgraded to a shiny new
> Postfix snapshot. :-)
This is using standard Arch Linux package
On Thu, Oct 24, 2024 at 16:24:04 +1100, Viktor Dukhovni via Postfix-users wrote:
> Yes, of course, as documented. TLS is off by default, this is backwards-
> compatible behaviour, and Postfix aims to not "surprise" operators with
> unexpected new behaviour after an upgrade.
This could be enabled
On Mon, Jan 06, 2025 at 22:09:27 +0100, Andreas Kuhlen via Postfix-users wrote:
> A text that simply states that the user is unknown would be enough for me. I
> don't want to reveal the fact that I use virtual mailboxes with this bounce
> message.
https://www.postfix.org/postconf.5.html#show_user
On Wed, Feb 05, 2025 at 15:31:44 +0100, Ömer Güven via Postfix-users wrote:
> At least the big companies like GMail never complained about it, the
> Authenticated Received Chain (ARC) always passes without errors, even
> for forwarding. :-)
Yes, the message is still RFC 5322 compliant, as Viktor
On Wed, Feb 05, 2025 at 14:58:48 +0100, Ömer Güven via Postfix-users wrote:
> My solution does completely remove the Received header, so that the
> next-hop adds an appropriate one, usually pointing to the sending MX‘
> ip address.
Which is also not RFC 5321 compliant, just not visibly so :)
>
On Tue, Feb 04, 2025 at 17:09:52 -0500, Wietse Venema via Postfix-users wrote:
> This reduces the Received: header from:
>
> Received: from
> by servername (Postfix) with id yyy; server-date-stamp
>
> to:
>
> Received: by servername (Postfix) with id yyy; server-date
On Mon, Dec 16, 2024 at 16:32:27 +0100, Matus UHLAR - fantomas via
Postfix-users wrote:
> RH does not usually upgrade major versions of libraries, what's happened?
RHEL 9.4 actually rebased OpenSSL 3.0.7 => 3.2.2.
(which is not unusual in dot releases)
But Postfix was rebuilt as well, at least
On Fri, Jan 24, 2025 at 22:56:40 +0100, Andreas Kuhlen via Postfix-users wrote:
> I have set ‘RejectFailures true’ in /etc/opendmarc.conf. My expectation
> was that mails without a dmarc signature would then be rejected.
Only if the domain publishes a DMARC p=reject policy.
> 2025-01-24T21:52:1
On Wed, Jan 22, 2025 at 13:40:34 +1100, Viktor Dukhovni via Postfix-users wrote:
> Nothing in the Postfix config, but do note that on RedHat / Fedora
> systems there's also "crypto policy" that cranks up security to 11 to
> protect users against fairly exotic threats, so you end up with
> cleartext
71 matches
Mail list logo