/postconf.5.html#smtpd_sender_restrictions, but
none of the options seemed right for this use case. Maybe if i scratched
my head a bit, i could come up with some "tricky" SQL query as a
workaround and use reject_sender_login_mismatch, but maybe i have just
overlooked some simple setting, thus i ask for any input.
Thank you!
Best wishes,
Janis
Postfix users receive spam pretending to be sent from their accounts.
in main.cf I have put:
smtpd_sender_login_maps = mysql:/etc/postfix/mysql_virtual_mailbox_maps.cf,
mysql:/etc/postfix/mysql_virtual_alias_maps.cf
smtpd_sender_restrictions = permit_mynetworks,
pe
(Is it the same as spoofing Header From or is it something
else)
How do I test against these all 3 (4?) spoofing methods? Against which
does my method test?
Thanks.
On 08.04.19 18:56, Dominic Raferd wrote:
On Mon, 8 Apr 2019 at 16:22, Ralph Seichter <mailto:ab...@monksofcool.net>>
Why do use
inet:localhost:8891
Instead of a socket?
I conf'ed it using this tutorial:
https://www.linode.com/docs/email/postfix/configure-spf-and-dkim-in-postfix-on-debian-8/
smtpd_milters = local:opendkim/opendkim.sock
non_smtpd_milters = local:opendkim/opendkim.sock
The sockets are relative p
What's your key-size?
My DNS provider does not support 2048, I found it out the hard way. 1024
seems to be the most popular size and google demands at least 1024.
Ounce you get the signing working you can regen a 2048 and check if you
can feed it in DNS TXT, but for first testing stick to 1024
Apr 9 09:40:14 rx200 mail.info opendkim[4396]: C03DE1014429:
foobar.example.com [192.0.2.10] not internal
It seems that the domain you want to sign is not in the KeyTable or
SigningTable! Note that if you put "refile:" before config file path in
/etc/opendkim.conf the syntax changes!
If
Si