header_checks - replace and flip mail addreses in To field for multiple recipients

2014-06-09 Thread Stefan Bauer
Dear Users,   I'm facing a problem with the header_checks. I want to flip the domainpart / userpart in the To: field of the mail header, strip off spaces/parentheses, add a custom domainpart and replace international number scheme ++49 -> 0049.   My input string is, recipients can vary - it mig

maximal_queue_lifetime has no effect on mails already queued - howto change?

2017-12-21 Thread Stefan Bauer
Dear Users, i changed maximal_queue_lifetime from 5d to 1h but mails already in queue are not affected by this change. How can i remove mails from the queue and send non-delivery-notifications to senders? i dont want to wait more days. my queue shows: root@mailserver:/home/cwadmin# mailq -Queu

Re: maximal_queue_lifetime has no effect on mails already queued - howto change?

2017-12-21 Thread Stefan Bauer
resend it with correnct recipient. Thank you! Stefan -Ursprüngliche Nachricht- Von: Motty Cruz  Gesendet: Donnerstag 21 Dezember 2017 21:23 An: Stefan Bauer ; postfix-users@postfix.org Betreff: Re: maximal_queue_lifetime has no effect on mails already queued - howto change? I'

maximal_queue_lifetime has no effect on mails already queued - howto change?

2017-12-21 Thread Stefan Bauer
: Donnerstag 21 Dezember 2017 21:23 An: Stefan Bauer ; postfix-users@postfix.org Betreff: Re: maximal_queue_lifetime has no effect on mails already queued - howto change? I'm not sure if I understand you questions correctly. have you try re-queue the email with the following command: postsup

check rcpt to, from and destination in one session - nested smtpd_restriction_classes?

2018-05-15 Thread Stefan Bauer
Hi, postfix is configured as relay server. Other systems relay with postfix. Here i want to allow for a specific group of hosts, when they use a specific mail from address only a few specific destination domains. Other hosts should not be bothered. This is only a need to limit a group of hosts to

Re: check rcpt to, from and destination in one session - nested smtpd_restriction_classes?

2018-05-15 Thread Stefan Bauer
Sorry for beeing unclear: my criterias are if (from 10.8.1.1-3 and mail from: benachrichtigung@) then only allow rcpt to: example.org, example.net, example.edu) If from 10.8.1.1-3 and mail from anything else, no limitation should take place. 2018-05-16 0:14 GMT+02:00 Jan P. Kessler < ml-postfi

Re: check rcpt to, from and destination in one session - nested smtpd_restriction_classes?

2018-05-15 Thread Stefan Bauer
That works. thank you very much guys for your help! 2018-05-15 18:10 GMT+02:00 Viktor Dukhovni : > > > > On May 15, 2018, at 11:38 AM, Stefan Bauer > wrote: > > > > I can not think of a way to achieve this. > > It is unclear what combination of criteria you

custom reject message for reject_sender_login_mismatch

2018-09-08 Thread Stefan Bauer
Hi, using smtpd_sender_restrictions = reject_authenticated_sender_login_mismatch smtpd_sender_login_maps = hash:/etc/postfix/login_maps rejects user with invalid mail from domain with : Sender address rejected: not owned by user abc; from= to= proto=ESMTP helo=<[192.168.0.173]> How can i custo

Re: custom reject message for reject_sender_login_mismatch

2018-09-09 Thread Stefan Bauer
> On Sat, Sep 8, 2018 at 3:18 PM Stefan Bauer > wrote: > > > > Hi, > > > > using > > > > smtpd_sender_restrictions = reject_authenticated_sender_login_mismatch > > smtpd_sender_login_maps = hash:/etc/postfix/login_maps > > > > rejects

Host offered STARTTLS: [mxlb... without relation to destination domain

2018-09-09 Thread Stefan Bauer
I like the option smtp_tls_note_starttls_offer = yes but when a host is logged, it's hard to keep track to which recipient domain that host belong without doing dns-lookups against all listed in smtp_tls_policy_maps. Can this be improved to maybe also list the appropriate recipient domain?

smtp_tls_policy_maps on a per tls user basis

2018-09-09 Thread Stefan Bauer
Hi, is there a way to specify on a per user basis (sasl authenticated user) if TLS should be none or may or encrypted for a specific recipient domain? I would like to have the user to decide if his mail to a specific domain should be TLS encrypted and then maybe bounce back but let other users ma

Re: smtp_tls_policy_maps on a per tls user basis

2018-09-09 Thread Stefan Bauer
that correct? Am So., 9. Sep. 2018 um 16:28 Uhr schrieb Wietse Venema < wie...@porcupine.org>: > Stefan Bauer: > > Hi, > > > > is there a way to specify on a per user basis (sasl authenticated user) > if > > TLS should be none or may or encrypted for a specif

postfix does not bounce instantly when remote party does not offer TLS

2018-09-09 Thread Stefan Bauer
Hi, delays=422/0.03/0.09/0, dsn=4.7.4, status=deferred (TLS is required, but was not offered by host seems to me like a permanent error - postfix sees it as a temporary one. I would like to have instant bounce message for this case when TLS is not available. sending postfix is configured 'encryp

Re: postfix does not bounce instantly when remote party does not offer TLS

2018-09-09 Thread Stefan Bauer
any way to inform my users about TLS fails via bounce without waiting queue lifetime? Am So., 9. Sep. 2018 um 18:58 Uhr schrieb Viktor Dukhovni < postfix-us...@dukhovni.org>: > > > > On Sep 9, 2018, at 12:49 PM, Stefan Bauer > wrote: > > > > delays=422/0.03/0

Re: postfix does not bounce instantly when remote party does not offer TLS

2018-09-09 Thread Stefan Bauer
seems to only work when postfix is server. I need this for postfix as client when remote site is not offering tls. Am So., 9. Sep. 2018 um 18:59 Uhr schrieb Herbert J. Skuhra < herb...@gojira.at>: > On Sun, Sep 09, 2018 at 06:49:07PM +0200, Stefan Bauer wrote: > > Hi, > >

Re: Host offered STARTTLS: [mxlb... without relation to destination domain

2018-09-09 Thread Stefan Bauer
That would be great to have this as part of the log string! Thank you for considering my request. Am So., 9. Sep. 2018 um 19:03 Uhr schrieb Viktor Dukhovni < postfix-us...@dukhovni.org>: > > > > On Sep 9, 2018, at 9:46 AM, Stefan Bauer > wrote: >

Re: postfix does not bounce instantly when remote party does not offer TLS

2018-09-09 Thread Stefan Bauer
our system is only outbound but here when TLS fails so remote sites, we would be happy to have an option to instantly bounce as this is mostly a fixed state. Am So., 9. Sep. 2018 um 19:27 Uhr schrieb Viktor Dukhovni < postfix-us...@dukhovni.org>: > > > > On Sep 9, 2018, at 1:0

Re: smtp_tls_policy_maps on a per tls user basis

2018-09-09 Thread Stefan Bauer
Am Sonntag, 9. September 2018 schrieb Wietse Venema : > Instead, you can use transport_maps to choose between different > Postfix SMTP clients (with different configurations) based on the > recipient address or domain. > > You can use the access map or header/body_checks FILTER action > ("FILTER na

Re: smtp_tls_policy_maps on a per tls user basis

2018-09-09 Thread Stefan Bauer
Am So., 9. Sep. 2018 um 21:51 Uhr schrieb Viktor Dukhovni < postfix-us...@dukhovni.org>: > > > > On Sep 9, 2018, at 3:39 PM, Stefan Bauer > wrote: > > > > I see no way to combine both. I want to enforce tls for sender1 to > google.com but not for sender2 to goo

Re: postfix does not bounce instantly when remote party does not offer TLS

2018-09-10 Thread Stefan Bauer
, 2018, at 1:01 PM, Stefan Bauer > wrote: > > > > any way to inform my users about TLS fails via bounce without waiting > queue lifetime? > > http://www.postfix.org/postconf.5.html#delay_warning_time > > In corporate systems I tend to split the mail plant into separate

reject_unverified_recipient and /ect/aliases delay/issue

2018-09-14 Thread Stefan Bauer
Hi, we use reject_unverified_recipient and have alias_database = hash:/etc/aliases alias_maps = hash:/etc/aliases after changes in aliases and issuing postalias /etc/aliases verify_cache.db seems to get corrupted or at least not updated properly as new/updated entries do not get correctly verif

Re: reject_unverified_recipient and /ect/aliases delay/issue

2018-09-14 Thread Stefan Bauer
Am Freitag, 14. September 2018 schrieb Wietse Venema : > Stefan Bauer: >> verify_cache.db seems to get corrupted or at least not updated properly as >> new/updated entries do not get correctly verified and postfix logs: >> >> close database /var/lib/postfix/verif

best practice anti virus integration & custom reject messages

2018-09-16 Thread Stefan Bauer
Hi, I like the clean and easy milter way and having clamd this way integrated in postfix. But i can not use custom reject message in case clamd detects virus. postfix/cleanup[4292]: BD6BA80ACA: milter-reject: END-OF-MESSAGE from (...): 5.7.1 Command rejected; from= to= proto=ESMTP helo= This mes

Re: reject_unverified_recipient and /ect/aliases delay/issue

2018-09-17 Thread Stefan Bauer
to be refreshed. Am Fr., 14. Sep. 2018 um 20:25 Uhr schrieb Wietse Venema < wie...@porcupine.org>: > Stefan Bauer: > > Am Freitag, 14. September 2018 schrieb Wietse Venema : > > > Stefan Bauer: > > >> verify_cache.db seems to get corrupted or at least not up

Re: best practice anti virus integration & custom reject messages

2018-09-18 Thread Stefan Bauer
Thank you! I was too stupid to RTFM. Clamd can provide custom reject messages. Am Mo., 17. Sep. 2018 um 16:18 Uhr schrieb Wietse Venema < wie...@porcupine.org>: > Stefan Bauer: > > Hi, > > > > I like the clean and easy milter way and having clamd this way integrated &g

smtp_tls_security_level = encrypt and MX-serves with mixed support for encryption

2018-09-18 Thread Stefan Bauer
Hi, i noticed the following today. Is this part of the standard? For recipient domain: MX 5 mx1.recipient.com - does not support TLS and refused delivery with temp error MX 10 mx2.recipient.com - does support TLS and took the mail Sep 18 10:36:29 B245080E75: TLS is required, but was not offered

Re: smtp_tls_security_level = encrypt and MX-serves with mixed support for encryption

2018-09-18 Thread Stefan Bauer
org>: > Stefan Bauer: > > Hi, > > > > i noticed the following today. Is this part of the standard? > > There is no standard that requires TLS for MTA-to-MTA deliveries. > > > For recipient domain: > > > > MX 5 mx1.recipient.com - does not support TLS

Re: smtp_tls_security_level = encrypt and MX-serves with mixed support for encryption

2018-09-18 Thread Stefan Bauer
2018 schrieb Matus UHLAR - fantomas : > On 18.09.18 14:43, Stefan Bauer wrote: >> >> I was expecting that the mail would bounce as the first MX refuses to talk >> TLS and i mapped that to a perm error. But postfix skips the one with >> temporary/temp error and delivered to

Re: smtp_tls_security_level = encrypt and MX-serves with mixed support for encryption

2018-09-18 Thread Stefan Bauer
thank you. this is awesome! Am Dienstag, 18. September 2018 schrieb Viktor Dukhovni : >> On Sep 18, 2018, at 5:58 AM, Stefan Bauer wrote: >> >> I noticed the following today. Is this part of the standard? > > You should have asked "is this expected behaviour in P

empty MAIL FROM and check_sender_access

2018-09-25 Thread Stefan Bauer
Hi, I'm using smtpd_sender_restrictions = check_sender_access hash:/etc/postfix/allowed_sender to make sure, my senders only send out with pre-defined and allowed domains. Now i noticed, that if my users acknowledge "read confirmations" in clients, mails in the following form arrive at postfix:

empty MAIL FROM and check_sender_access

2018-09-25 Thread Stefan Bauer
I was more asking if it's even a good idea to add the null entry to the table? i would like to be a good postmaster but not want to relax policies for allowed sender addresses. Am Di., 25. Sep. 2018 um 13:26 Uhr schrieb Wietse Venema < wie...@porcupine.org>: > > Stefan Bauer: &g

Re: empty MAIL FROM and check_sender_access

2018-09-25 Thread Stefan Bauer
25, 2018, at 10:13 AM, Stefan Bauer > wrote: > > > > I was more asking if it's even a good idea to add the null entry to the > table? i would like to be a good postmaster but not want to relax policies > for allowed sender addresses. > > You need to allow mail

check if envelope from and from is the same

2018-10-02 Thread Stefan Bauer
Hi, we're running a small smtp send only service for authenticated users only. Even though we only accept allowed combinations of authenticated user and pre-defined envelope from addresses with access_maps, some smartasses started to spoof From: addresses so we got bad reputation at receiver sites

Re: Authenticating 'From' header to match envelope

2018-10-03 Thread Stefan Bauer
Johannes, did you double check if your planned setup will not break other things? Have similar needs but am not yet deep enough into mail to see possible pitfalls. Stefan Am Dienstag, 2. Oktober 2018 schrieb Johannes Bauer : > Hi list, > > I'm having an issue with my Postfix configuration: Curr

making unverified_recipient_reject_code safe for temp errors

2018-10-11 Thread Stefan Bauer
Dear Users, we have the following in place: smtpd_recipient_restrictions = reject_unknown_recipient_domain, reject_unverified_recipient unverified_recipient_reject_code = 550 unknown_address_reject_code = 550 today, we had an issue with our groupware so the following was happening: NOQUEUE: rej

Re: making unverified_recipient_reject_code safe for temp errors

2018-10-11 Thread Stefan Bauer
127.0.0.1[127.0.0.1] refused to talk to me: 421 internal error: OpenResolveAddrFolder failed) Isn't status=undeliverable a 5xx reject? Am Do., 11. Okt. 2018 um 19:14 Uhr schrieb Wietse Venema < wie...@porcupine.org>: > Stefan Bauer: > > Dear Users, > >

Re: making unverified_recipient_reject_code safe for temp errors

2018-10-11 Thread Stefan Bauer
d. Am Do., 11. Okt. 2018 um 22:12 Uhr schrieb Wietse Venema < wie...@porcupine.org>: > Stefan Bauer: > > We just noticed, that senders got several "550 5.1.0 Address rejected" > > bounces even though postfix logs no permanent errors. > > > > Oct 11 17:

Re: making unverified_recipient_reject_code safe for temp errors

2018-10-12 Thread Stefan Bauer
Yes, that's it. Thank you! Am Fr., 12. Okt. 2018 um 14:27 Uhr schrieb Wietse Venema < wie...@porcupine.org>: > That's the probe's 421 result: > > > Oct 11 17:19:13 kop01 postfix/lmtp[5711]: E759E301412: > to=, > > relay=127.0.0.1[127.0.0.1]:2003, delay=13, delays=0/0.01/13/0, dsn=4.0.0, > > statu

best practice - integrating spamassassin/clamav in postfix - amavis yes/no?

2018-10-18 Thread Stefan Bauer
Dear Users, I'm building a simple pair of front MX-servers to get rid of our cisco ironports. For spam and virus-scanning i'd like to have spamassassin and clamav doing pre-filtering during smtp-dialog rejecting bad mails and forwarding good mails to internal mail-farm. Is it best practice to use

Re: best practice - integrating spamassassin/clamav in postfix - amavis yes/no?

2018-10-18 Thread Stefan Bauer
Thank you for your feedback. Seems like smtpd_milters are also used before any other check_*_access and rbl checks/header checks etc., so it's expensive this way, to pipe every mail through virus scan. I'm just testing if i could plug in clamav by check_policy_service. Am Fr., 19. Okt. 2018 um 05:

Re: best practice - integrating spamassassin/clamav in postfix - amavis yes/no?

2018-10-19 Thread Stefan Bauer
or sender and recipient. > > Have a look to amavis-milter (+spamassassin+clamav) or even rspamd. > > > Carsten > > On 19.10.18 07:15, Stefan Bauer wrote: > > Thank you for your feedback. Seems like smtpd_milters are also used > > before any other check_*_access and

Re: best practice - integrating spamassassin/clamav in postfix - amavis yes/no?

2018-10-19 Thread Stefan Bauer
s > triggered. But ClamAV can't do anything before the content is > transfered. So the performance impact should be insignificant. > > amavis-milter is just a wrapper script from milter to amavis protocol. > As long amavis is not dead this is fine. > > Carsten > > >

Re: best practice - integrating spamassassin/clamav in postfix - amavis yes/no?

2018-10-19 Thread Stefan Bauer
Hi Andreas, i really like postscreen. There are quite some nice tricks buikd in so thanks again for pushing me in this direction. i just bundled it now with clamav-milter so the expensive checks are only triggered when a client survives postscreen and all my additional sender/recipient checks and

Re: Monitoring amount of smtpd processes

2018-10-20 Thread Stefan Bauer
We simply monitor established tcp sessions to smtpd port. if client flies away, tcp session does as well: lsof -i tcp:25 | grep ESTABLISHED | wc -l Am Samstag, 20. Oktober 2018 schrieb Peer Heinlein : > > > > Hi, > > we're monitoring the amount of active smtpd processes to make sure, that > we do

Thank you Wietse, supporters and contributors for Postfix

2018-10-26 Thread Stefan Bauer
We just noticed once again, that postfix is so well designed in a way, that often we did not even think of "corner cases" that are already handled by default in a way, that is in most cases exactly how is should be setup. Just picking a random setup - relaying mails to external relayhosts by sende

sender_dependent_relayhost_maps with different credentials for same relayhost

2018-11-05 Thread Stefan Bauer
Hi, i have: sender_dependent_relayhost_maps = hash:/etc/postfix/relayhost_maps smtp_sasl_password_maps = hash:/etc/postfix/smtp_auth more /etc/postfix/relayhost_maps @mydomain.de[smtp.1und1.de]:587 @my2domain.de [smtp.1und1.de]:587 more /etc/postfix/smtp_auth [smtp.1und1.de]:587mydomain:

Re: sender_dependent_relayhost_maps with different credentials for same relayhost

2018-11-06 Thread Stefan Bauer
Thank you! Am Montag, 5. November 2018 schrieb Wietse Venema : > Stefan Bauer: >> Hi, >> >> i have: >> sender_dependent_relayhost_maps = hash:/etc/postfix/relayhost_maps >> smtp_sasl_password_maps = hash:/etc/postfix/smtp_auth >> >> more /etc/postfix/

Re: Best way of synchronizing configs for multiple relay servers?

2018-11-07 Thread Stefan Bauer
i have similar case and set the first relayseever inmy pool as the one on which changes ar eonly allowed. then i do scp + service restart to the others with bash oneliner on demand. for the future i plan to check in config from any host to central svn/git repo and check frequently for changes from

Re: sender_dependent_relayhost_maps with different credentials for same relayhost

2018-11-22 Thread Stefan Bauer
ietse Venema < wie...@porcupine.org>: > Stefan Bauer: > > Hi, > > > > i have: > > sender_dependent_relayhost_maps = hash:/etc/postfix/relayhost_maps > > smtp_sasl_password_maps = hash:/etc/postfix/smtp_auth > > > > more /etc/postfix/relayhost_maps >

Re: sender_dependent_relayhost_maps with different credentials for same relayhost

2018-11-22 Thread Stefan Bauer
Found it. Was required to modify smtp_auth to customer1.de user1:password customer2.de user2:password. Am Do., 22. Nov. 2018 um 10:22 Uhr schrieb Stefan Bauer < cubew...@googlemail.com>: > After setting > > smtp_sender_dependent_authentication = yes > > and adding a

cisco pix TLS is required, but was not offere STARTTLS issue

2018-11-26 Thread Stefan Bauer
Dear Users, we trying to deliver mail to remote party with enforced encrcyption. 63FFB80805: TLS is required, but was not offered by host mx0.esb.de [194.77.230.138] But looks like, remote device is announcing TLS and can handle it: # telnet mx0.esb.de 25 Trying 194.77.230.138... Connected to m

Re: cisco pix TLS is required, but was not offere STARTTLS issue

2018-11-26 Thread Stefan Bauer
en Koetter : > * Stefan Bauer : > > Dear Users, > > > > we trying to deliver mail to remote party with enforced encrcyption. > > > > 63FFB80805: TLS is required, but was not offered by host mx0.esb.de > > [194.77.230.138] > > > > But looks like, remote dev

Re: cisco pix TLS is required, but was not offere STARTTLS issue

2018-11-26 Thread Stefan Bauer
esmtp' is set by default. Am Mo., 26. Nov. 2018 um 11:21 Uhr schrieb Stefan Bauer < cubew...@googlemail.com>: > Hi, > > log shows: > > enabling PIX workarounds: disable_esmtp delay_dotcrlf for mx0.esb.de > > But the specific workaround 'disable_esmtp' l

forwarding mail like before queue filtering to remote mta

2018-11-28 Thread Stefan Bauer
Hi, is there a way to keep an smtp session open and do before queue filtering AND final delivery to remote mta? do only sent 250 if we have already received 250. if not send temp error. we would like to only accept mails if we can deliver them at the same time. a local queue is not wanted due to

Re: forwarding mail like before queue filtering to remote mta

2018-11-28 Thread Stefan Bauer
2018 schrieb Wietse Venema : > Stefan Bauer: >> Hi, >> >> is there a way to keep an smtp session open and do before queue filtering >> AND final delivery to remote mta? do only sent 250 if we have already >> received 250. if not send temp error. > > How would t

Best practice - concurrent delivery to remote sites

2018-12-06 Thread Stefan Bauer
Hi, we're running a small relay-service and looking for best practice to deliver mails to remote sites regarding concurrent delivery and so on. Sometimes, we have customers that are sending several mails per second to same recipients. What is best practice to handle this? We would like to avoid

Re: Best practice - concurrent delivery to remote sites

2018-12-06 Thread Stefan Bauer
Its no user issue. Its a real and legal use case that customers send several mails / second to same recipient over a long period (software tests whatever). Am Do., 6. Dez. 2018 um 12:50 Uhr schrieb Andrey Repin : > Greetings, Stefan Bauer! > > > Hi, > > > > we're

Re: Best practice - concurrent delivery to remote sites

2018-12-06 Thread Stefan Bauer
that remote sites prefer one way over the other. Stefan Am Donnerstag, 6. Dezember 2018 schrieb Andrey Repin : > Greetings, Stefan Bauer! > > >>> we're running a small relay-service and looking for best practice to > >>> deliver mails to remote sites

Re: Best practice - concurrent delivery to remote sites

2018-12-06 Thread Stefan Bauer
nema < wie...@porcupine.org>: > Stefan Bauer: > > stuff/best practice that makes the process more effective. > > > > i'm certain that remote sites prefer one way over the other. > > I don't think that there is a 'standard' policy that 'works' fo

ignore SASL/Auth to specific server (internal exchange relay)

2018-12-11 Thread Stefan Bauer
Hi, we receive mails from $world and forward them to internal exchange server. Exchange is offering STARTTLS and AUTH root@gate01:~# telnet 192.168.124.5 2525 Trying 192.168.124.5... Connected to 192.168.124.5. Escape character is '^]'. 220 ex01 Microsoft ESMTP MAIL Service ready at Tue, 11 Dec

Re: ignore SASL/Auth to specific server (internal exchange relay)

2018-12-11 Thread Stefan Bauer
So howto not use AUTH&TLS at all to 192.168.124.5:2525 ? Am Di., 11. Dez. 2018 um 20:32 Uhr schrieb Wietse Venema < wie...@porcupine.org>: > Stefan Bauer: > > Hi, > > > > we receive mails from $world and forward them to internal exchange > server. > >

Re: ignore SASL/Auth to specific server (internal exchange relay)

2018-12-11 Thread Stefan Bauer
eparate transport for the relay(s) in question, > with "smtp_sender_dependent_authentication = no" for that > transport. > > > On Dec 11, 2018, at 2:37 PM, Stefan Bauer > wrote: > > > > I dont see a way to have AUTH&T

Re: ignore SASL/Auth to specific server (internal exchange relay)

2018-12-11 Thread Stefan Bauer
org>: > > On Dec 11, 2018, at 3:41 PM, Stefan Bauer > wrote: > > > > Can you recommend appropriate manual(s)? I dont understand what you mean > with separate transport. > > http://www.postfix.org/master.5.html > http://www.postfix.org/tr

Re: ignore SASL/Auth to specific server (internal exchange relay)

2018-12-11 Thread Stefan Bauer
org>: > > On Dec 11, 2018, at 4:40 PM, Stefan Bauer > wrote: > > > > exchange unix - - n - - smtp > > -o smtp_sender_dependent_authentication=no > > -o transport_maps=hash:/etc/postfix/transport_internal > > No the "t

Re: ignore SASL/Auth to specific server (internal exchange relay)

2018-12-13 Thread Stefan Bauer
uot; behavior you need for the exchange > transport is no sasl: > exchange unix - - n - - smtp > -o smtp_sender_dependent_authentication=no > > Daniel > > > On 12/11/2018 1:40 PM, Stefan Bauer wrote: > > thank you for your help! > >

dnsbl postscreen - not blocking

2018-12-19 Thread Stefan Bauer
Hi, Dec 19 13:04:36 mx1 postfix/postscreen[4770]: CONNECT from [209.85.166.196]:52168 to [public-ip]:25 Dec 19 13:04:42 mx1 postfix/dnsblog[4774]: addr 209.85.166.196 listed by domain dnsbl.sorbs.net as 127.0.0.6 Dec 19 13:04:42 mx1 postfix/postscreen[4770]: PASS NEW [209.85.166.196]:52168 Dec 19

Re: dnsbl postscreen - not blocking

2018-12-19 Thread Stefan Bauer
the threshold is at default, so 1. but the dns timeout, Wietse mentioned, might be the real cause. gonna check manuals, if this is configurable. Thank you. Am Mittwoch, 19. Dezember 2018 schrieb Viktor Dukhovni < postfix-us...@dukhovni.org>: > On Wed, Dec 19, 2018 at 02:00:34PM +010

detect fake mx, tls security encrypt

2018-12-20 Thread Stefan Bauer
Hi, i use smtp_tls_security_level = encrypt - if remote site have mx like mx 10 mail1 without tls mx 100 mail2 fake-mx with no open port postfix detects lack of tls on mx10goes to mx100 and waits maximal_queue_lifetime. i don't like fake mx as they create a long delay. i could reduce queue lif

Re: detect fake mx, tls security encrypt

2018-12-20 Thread Stefan Bauer
. Am Donnerstag, 20. Dezember 2018 schrieb Viktor Dukhovni < postfix-us...@dukhovni.org>: >> On Dec 20, 2018, at 12:42 PM, Stefan Bauer wrote: >> >> I use smtp_tls_security_level = encrypt > > The cost of that choice is that you must also have: > > main.cf

Re: detect fake mx, tls security encrypt

2018-12-20 Thread Stefan Bauer
thats a nice approach! thank you. will test. Am Donnerstag, 20. Dezember 2018 schrieb Viktor Dukhovni < postfix-us...@dukhovni.org>: >> On Dec 20, 2018, at 1:25 PM, Stefan Bauer wrote: >> >> I'm aware of such exceptions but I don't like to set them. Our pol

Re: detect fake mx, tls security encrypt

2018-12-21 Thread Stefan Bauer
>: >> On Dec 20, 2018, at 1:25 PM, Stefan Bauer wrote: >> >> I'm aware of such exceptions but I don't like to set them. Our policy is safe or not at all via mail. > > That policy has a cost. You don't like the cost, but there it is... > >> I

Re: detect fake mx, tls security encrypt

2018-12-22 Thread Stefan Bauer
Hi Robert, thanks. already saw that but i dont want to bother remote sites with a 'full verify'. still like the policy server approach. should be no big thing for a coder - familiar with perl. Am Samstag, 22. Dezember 2018 schrieb Robert Schetterer : > Am 22.12.18 um 07:55 schrieb

policy server, TLS only exeptions and restrictions

2019-01-04 Thread Stefan Bauer
Hi, we have enforced TLS to all remote sites and have appropriate tls policy server, that checks if TLS is avail before accepting mails. That works as expected. we also only accept users with auth. smtpd_relay_restrictions = permit_mynetworks permit_sasl_authenticated reject_unauth_destination s

Re: policy server, TLS only exeptions and restrictions

2019-01-04 Thread Stefan Bauer
Understood. Thank you. Am Fr., 4. Jan. 2019 um 15:11 Uhr schrieb Matus UHLAR - fantomas < uh...@fantomas.sk>: > On 04.01.19 14:44, Stefan Bauer wrote: > >we have enforced TLS to all remote sites and have appropriate tls policy > >server, that checks if TLS is avail before

bypass policy server in recipient_restrictions when subject contains string

2019-01-04 Thread Stefan Bauer
Hi, is there a way to bypass policy server in smtp_recipient_restrictions, in case, subject contains special string? smtpd_recipient_restrictions = check_policy_service unix:private/policy header_checks: /^Subject: .*string.*/ FILTER no-policy-service: header_checks could reroute by subject bu

Re: bypass policy server in recipient_restrictions when subject contains string

2019-01-04 Thread Stefan Bauer
Jan 2019, at 9:36, Stefan Bauer wrote: > > > is there a way to bypass policy server in smtp_recipient_restrictions, > > in > > case, subject contains special string? > > No. As documented, smtp_recipient_restrictions is evaluated for each > RCPT command, all of which

Re: policy server, TLS only exeptions and restrictions

2019-01-04 Thread Stefan Bauer
great idea, but recipient verification is not something, remote servers like.really like. Am Freitag, 4. Januar 2019 schrieb Viktor Dukhovni < postfix-us...@dukhovni.org>: >> On Jan 4, 2019, at 9:10 AM, Matus UHLAR - fantomas wrote: >> >> this looks to me that you search for connection between sm

Re: bypass policy server in recipient_restrictions when subject contains string

2019-01-05 Thread Stefan Bauer
with special subject. Am Freitag, 4. Januar 2019 schrieb Bill Cole < postfixlists-070...@billmail.scconsult.com>: > On 4 Jan 2019, at 10:36, Stefan Bauer wrote: > >> Would it be possible to have FILTER as action in policy server > > Yes, but FILTER behaves as documented in the

Re: bypass policy server in recipient_restrictions when subject contains string

2019-01-05 Thread Stefan Bauer
=ESMTP helo=: tls_whitelist_check: mail gets delivered, but policy service is not used/called. What am i missing? Am Sa., 5. Jan. 2019 um 11:05 Uhr schrieb Stefan Bauer < cubew...@googlemail.com>: > Understood. Would it be possible to have header_checks in main.cf that > send mails

Re: bypass policy server in recipient_restrictions when subject contains string

2019-01-05 Thread Stefan Bauer
Thank you. That explains it! Am Sa., 5. Jan. 2019 um 15:03 Uhr schrieb Benny Pedersen : > Stefan Bauer skrev den 2019-01-05 14:08: > > > tls_whitelist_check unix- - n - - > > smtp > >-o header_checks= > >-o

DSN behavior unclear - clarification needed

2019-01-15 Thread Stefan Bauer
Hi, i would like that postfix always sends DSN, when requested by client and mail got forwarded to next-hop / final destination. Thats works on some recipients, but not on all. postfix always sends DSN on specific destinations (e.g. web.de) : delivery via mx-ha02.web.de[212.227.17.8]:25: 250 Req

Re: DSN behavior unclear - clarification needed

2019-01-15 Thread Stefan Bauer
Awesome. Thank you. That did the trick. Am Di., 15. Jan. 2019 um 13:22 Uhr schrieb Wietse Venema < wie...@porcupine.org>: > Stefan Bauer: > > Hi, > > > > i would like that postfix always sends DSN, when requested by client and > > mail got forwarded to next-hop

tls_high_cipherlist with !SEED is ignored

2019-01-15 Thread Stefan Bauer
Nessus reports for example TLS_RSA_WITH_SEED_CBC_SHA as weak on our submission port. So i was using the following to disable all SEED ciphers on submission port but it has no effect: -o smtpd_tls_mandatory_ciphers=high -o tls_preempt_cipherlist=yes -o tls_high_cipherlist=EDH+CAMELLIA:EDH+aRSA:E

Re: tls_high_cipherlist with !SEED is ignored

2019-01-15 Thread Stefan Bauer
I just want to set allowed ciphers but can not enforce encryption generally. this seems to be a limitation and not possible right? Am Dienstag, 15. Januar 2019 schrieb Viktor Dukhovni < postfix-us...@dukhovni.org>: >> On Jan 15, 2019, at 8:39 AM, Stefan Bauer wrot

Re: tls_high_cipherlist with !SEED is ignored

2019-01-15 Thread Stefan Bauer
now i got it. sorry and thank you for your help. Am Dienstag, 15. Januar 2019 schrieb Viktor Dukhovni < postfix-us...@dukhovni.org>: >> On Jan 15, 2019, at 8:39 AM, Stefan Bauer wrote: >> >> -o smtpd_tls_mandatory_ciphers=high >> -o tls_preempt_cipherlist=yes

detecting TLS issues in delivery - Cannot start TLS: handshake failure

2019-01-16 Thread Stefan Bauer
Hi, how can the following error be detected and an instant bounce/reject will be send to the sender? -- 880 Kbytes in 3 Requests. root@mx1:~# mailq -Queue ID- --Size-- Arrival Time -Sender/Recipient--- A97288008B 776694 Sun Jan 13 13:14:29 sender@sender

Re: detecting TLS issues in delivery - Cannot start TLS: handshake failure

2019-01-16 Thread Stefan Bauer
reject_unverified_recipient is no option as remote sites don't like probing/verify requests. After rechecking, i had a typo in my regex. Damn! It was working as documented. Sorry. Am Mi., 16. Jan. 2019 um 13:17 Uhr schrieb Wietse Venema < wie...@porcupine.org>: > Stefan

Re: detecting TLS issues in delivery - Cannot start TLS: handshake failure

2019-01-16 Thread Stefan Bauer
"Some sites may blacklist you when you are probing them too often (a probe is an SMTP session that does not deliver mail), or when you are probing them too often for a non-existent address. This is one reason why you should use sender address verification sparingly, if at all, when your site receiv

address_verify_negative_refresh_time = 30m is ignored

2019-01-25 Thread Stefan Bauer
hi, we have address_verify_negative_refresh_time = 30m active (root@mx2:/var/lib/postfix# postconf -n | grep verify address_verify_negative_refresh_time = 30m) but the verify behavior is strange. Jan 23 21:15:21 mx2 postfix/postscreen[Jan 25 15:31:14 mx2 postfix/smtpd[10119]: NOQUEUE: reject: R

Re: address_verify_negative_refresh_time = 30m is ignored

2019-01-25 Thread Stefan Bauer
porcupine.org>: > Stefan Bauer: > > Jan 25 15:31:14 mx2 postfix/smtpd[10117]: NOQUEUE: reject: RCPT from > > opsmail.colo.comodo.com[91.209.196.133]: 550 5.1.1 > > > address: host IP[IP] said: 550 5.1.1 > address rejected: User unknown in virtual mailbox table (in reply to

Re: address_verify_negative_refresh_time = 30m is ignored

2019-01-25 Thread Stefan Bauer
Thank you Wietse for taking the time to explain things. I really appreciate this. now all is clear. Am Freitag, 25. Januar 2019 schrieb Wietse Venema : > Stefan Bauer: >> thank you. seems to be that >> >> if address_verify_negative_refresh_time = 30m, the next attempt t

smtp_tls_security_level = dane but have encrypt as fallback

2019-01-28 Thread Stefan Bauer
Hi, we would like to go the next step, enable smtp_tls_security_level = dane. Currently we have encrypt site-wide. But in cases where remote sites do not have published key material, the fallback is may with dane, which is a step back in terms of security and not wanted. How can we specify: 1,

disable logging of header_checks FILTER action

2019-01-30 Thread Stefan Bauer
hi, smtp_header_checks = pcre:/etc/postfix/header_chk /^Subject: .*test.*/ FILTER test: Postfix then logs: Jan 30 12:44:16 mx2 postfix/cleanup[19243]: 096B95EAE2: filter: header Subject: some text test from mail-cloud-01.asdfasdf.tld[1.2.3.4];(...) How to disable logging of this events? I simp

retrigger MX lookup for undeliverable mails in mailqueue

2019-02-25 Thread Stefan Bauer
Hi, our outgoing mails sometimes end up undeliverable in postfix queue and bounce back after 5 days, when remote sites change MX entries and postfix has the old informations. It seems that postfix is not doing another round of lookups when destination MX was already discoverd for remote domain wh

re-route mails on demand during block of ip address

2019-05-30 Thread Stefan Bauer
Hi, I'm running a pair of postfix-servers in different data-centers (different ip networks) for outgoing-only delivery. once in a while my providers /22 appear on public blacklists, so mails from my nodes also gets rejected. For this, i have now a third backup-instance in another data center that

Re: re-route mails on demand during block of ip address

2019-05-31 Thread Stefan Bauer
aving 7000-8000 mails / day. Stefan Am Fr., 31. Mai 2019 um 18:37 Uhr schrieb Noel Jones : > On 5/31/2019 1:48 AM, Stefan Bauer wrote: > > Hi, > > > > I'm running a pair of postfix-servers in different data-centers > > (different ip networks) for outgoing-only delive

authenticate o365 users with postfix without smtp auth

2019-06-16 Thread Stefan Bauer
Hi, we are running a small smtp relay service with postfix for authenticated users. Unfortunately office 365 does not offer any smtp authentication mechanism when sending mails via connectors to smarthosts. how could one protect smtp submission in another way? without authentication, everyone fr

Re: authenticate o365 users with postfix without smtp auth

2019-06-16 Thread Stefan Bauer
onntag, 16. Juni 2019 schrieb Viktor Dukhovni < postfix-us...@dukhovni.org>: > On Sun, Jun 16, 2019 at 04:00:38PM +0200, Stefan Bauer wrote: > >> We are running a small smtp relay service with postfix for authenticated >> users. Unfortunately office 365 does not offer any smt

Re: authenticate o365 users with postfix without smtp auth

2019-06-16 Thread Stefan Bauer
our users send/receive via o365. the last mile o365->recipient should go through our service like o365->postfix->recipient here, o365 does not offer smtp auth against postfix. Am Sonntag, 16. Juni 2019 schrieb @lbutlr : > On 16 Jun2019, at 09:46, Stefan Bauer wrote: >> som

Re: authenticate o365 users with postfix without smtp auth

2019-06-16 Thread Stefan Bauer
its like the first: end-user client -> microsoft server -> postfix server -> remote recipient Am Sonntag, 16. Juni 2019 schrieb Wietse Venema : > Stefan Bauer: >> our users send/receive via o365. the last mile o365->recipient should go >> through our service li

  1   2   >