On Sat, 01 Jun 2024 08:45:00 +0100,
"Corey Hickman" wrote:
>
> does it have policy server included? for instance, when DKIM fails, the
> policy can be set up to deny the message.
>
Right now it ignores DMARC as if it doesn't exist.
Doing a DMARC lookup for domain and inserting it's results
June 1, 2024 at 7:34 AM, "Kirill A. Korinsky" wrote:
>
> Greetings,
>
> I'd like to announce a two new filters for OpenSMTD which better to use
>
> together: auth and sign.
>
does it have policy server included? for instance, when DKIM fails, the policy
ca
On Sat, 01 Jun 2024 00:34:41 +0100,
Kirill A. Korinsky wrote:
>
> Greetings,
>
> I'd like to announce a two new filters for OpenSMTD which better to use
> together: auth and sign.
>
Oops, wrong list. It should be m...@opensmtpd.org.
Sorry for nosy.
--
wbr, Kirill
Greetings,
I'd like to announce a two new filters for OpenSMTD which better to use
together: auth and sign.
auth is a filter which verify DKMI, ARC and SPF, and iprev. It adds
Authentication-Results header or ARC-Authentication-Results.
sign is a filter which adds DKMI or ARC signature, or ARC
> On 8/12/21 5:09 AM, latin...@vcn.bc.ca wrote:
>> Hello
>>
>> After:
>> # pkg_add redis rspamd opensmtpd-filter-rspamd successfully
>>
>> i got:
>> # rcctl start rspamd
>> rspamd(failed)
>>
>> then I did:
>> # rspamd -d
>> 2021-08-12 09:23:41 #0(main) ; main; detect_priv: cannot run
>> rspamd
On 8/12/21 5:09 AM, latin...@vcn.bc.ca wrote:
Hello
After:
# pkg_add redis rspamd opensmtpd-filter-rspamd successfully
i got:
# rcctl start rspamd
rspamd(failed)
then I did:
# rspamd -d
2021-08-12 09:23:41 #0(main) ; main; detect_priv: cannot run
rspamd workers as root user, please add -u and
Hello
After:
# pkg_add redis rspamd opensmtpd-filter-rspamd successfully
i got:
# rcctl start rspamd
rspamd(failed)
then I did:
# rspamd -d
2021-08-12 09:23:41 #0(main) ; main; detect_priv: cannot run
rspamd workers as root user, please add -u and -g options to select a
proper unprivilleged
Hello,
This is a short patch to let acme-client accept ECDSA keys now that
letsencrypt accepts signing certificates with those keys. This
functionality is present in certbot, so it might be a good idea to let
acme-client accept that too.
The key needs to be generated manually
i.e.: openssl
ning.
> So for now I sign and send email (prepared in message.txt) with this:
>
> openssl smime -sign -in message.txt -text -signer sec/certCVUT.mycrt.pem \
> -inkey sec/certCVUT.mykey.pem -certfile sec/certCVUT.caChain.pem \
> -from rudolf.syk...@cvut.cz -to rsyk...@disroot.org \
>
.
Even snail is way too complex.
So for now I sign and send email (prepared in message.txt) with this:
openssl smime -sign -in message.txt -text -signer sec/certCVUT.mycrt.pem \
-inkey sec/certCVUT.mykey.pem -certfile sec/certCVUT.caChain.pem \
-from rudolf.syk...@cvut.cz -to rsyk...@disroot.org \
-s
On 05/05/18 08:31, Tony Boston wrote:
> On 05/03/18 10:30, Rudolf Sykora wrote:
>> Hello misc,
>>
>> I'd like to be able to optionally
>> - sign my email,
>> - encrypt the email.
>>
>> I have a certificate in the .p12 form,
>> containing my pr
On 05/03/18 10:30, Rudolf Sykora wrote:
> Hello misc,
>
> I'd like to be able to optionally
> - sign my email,
> - encrypt the email.
>
> I have a certificate in the .p12 form,
> containing my private key and two certificates,
> one of them mine.
>
> I want to
Hello again Rudolf.
Rudolf Sykora <rudolf.syk...@gmail.com> wrote:
|I'd like to be able to optionally
|- sign my email,
|- encrypt the email.
|
|I have a certificate in the .p12 form,
|containing my private key and two certificates,
|one of them mine.
|
|I want to prepare mail l
Hello misc,
I'd like to be able to optionally
- sign my email,
- encrypt the email.
I have a certificate in the .p12 form,
containing my private key and two certificates,
one of them mine.
I want to prepare mail locally, i.e. to use
some simple locally installed MUA.
Is there a way
uilt just once with the signature inside.
Now that the signature is outside, there is no gain to having pkg_create(1)
sign directly, so that was scraped out.
dpb no longer does.
Use pkg_sign(1) directly like sthen says.
Before, signing directly during pkg_create(1) made some sense, since
the archive was built just once with the signature inside.
Now that the signature is outside, there is no gain to having pkg_create(1)
sign directly, so
On 2017-04-04, Noth <nothingn...@citycable.ch> wrote:
>I'm trying to use dpb in 6.1-current, and my setup works till it
> tries to sign the package it makes and then fails with this message:
..
> I've updated my signify keys and placed them in $CHROOT/etc/signify. I
> can't
Hi all,
I'm trying to use dpb in 6.1-current, and my setup works till it
tries to sign the package it makes and then fails with this message:
==> Building package for bzip2-1.0.6p8
Create /data/packages/amd64/all/bzip2-1.0.6p8.tgz
^Mreading plist|ESC[KESC[K^Mchecking
dependencies|
On Wed, Nov 09, 2016 at 06:13:47PM +0100, Walter Alejandro Iglesias wrote:
> Taking in care /etc/rc.d/dkimproxy_out flags:
>
> daemon_flags="--conf_file=/etc/dkimproxy_out.conf --user=_dkimproxy
> --group=_dkimproxy"
>
> These files should be owned by _dkimproxy user and group.
>
It worked!
On Wed, Nov 09, 2016 at 11:57:18AM -0500, trondd wrote:
> Should also be in the maillog.
Hey, I think I found the problem:
Nov 9 10:37:12 server dkimproxy.out[38514]: signing error: Error: cannot read
/var/dkimproxy/default.private: Permission denied
The permissions are:
# ls -l
trondd,
Your response was also useful to me in another more important way.
I took a look to the headers of your message and I observe gmail says
your dkim is correct:
Authentication-Results: mx.google.com;
dkim=pass header.i=@kagu-tsuchi.com;
However, I had to rescue your message from
On Wed, November 9, 2016 11:39 am, Walter Alejandro Iglesias wrote:
> On Wed, Nov 09, 2016 at 09:27:58AM -0500, trondd wrote:
>> On Wed, November 9, 2016 9:14 am, Walter Alejandro Iglesias wrote:
>> > Hi everyone,
>> >
>> > First of all, is dkimproxy a work in progress?
>> >
>> > If it's not, then
On Wed, Nov 09, 2016 at 09:27:58AM -0500, trondd wrote:
> On Wed, November 9, 2016 9:14 am, Walter Alejandro Iglesias wrote:
> > Hi everyone,
> >
> > First of all, is dkimproxy a work in progress?
> >
> > If it's not, then the long one. I've tried something similar to
> > the example in
On Wed, November 9, 2016 9:14 am, Walter Alejandro Iglesias wrote:
> Hi everyone,
>
> First of all, is dkimproxy a work in progress?
>
> If it's not, then the long one. I've tried something similar to
> the example in smtpd.conf(5). Outgoing messages don't get signed.
>
>
> # dkim-genkey -s
Hi everyone,
First of all, is dkimproxy a work in progress?
If it's not, then the long one. I've tried something similar to
the example in smtpd.conf(5). Outgoing messages don't get signed.
# dkim-genkey -s default -d mydomain.com -r -D /var/dkimproxy
/etc/dkimproxy_out.conf
Hi guys!
In Enghlish_US way, you have no certainties.
# symbol, I've always named 'hash',
but from recent research I found which is also named:
number, pound, octothorpe, octothorp, octothorn...
which is the exact name for it? (In computer way naturally...)
Thanks for reply.
On 6/17/2015 12:52 PM, Max Power wrote:
Hi guys!
In Enghlish_US way, you have no certainties.
# symbol, I've always named 'hash',
but from recent research I found which is also named:
number, pound, octothorpe, octothorp, octothorn...
which is the exact name for it? (In computer way
hash
Wikipedia says that he use of hash for this sign may have come
from Baudot, which predated both ASCII and EBCDIC.
I thought everyone here knew that this sign is actually historically
called `sliced unicorn hearts' after the specific pattern their heart
display when thinly sliced.
Oh
Max Power wrote:
which is the exact name for it? (In computer way naturally...)
Havelåge - the Danish way.
Best regards,
Mikkel C. Simonsen
name for it? (In computer way naturally...)
Thanks for reply.
Computer way? Which computer?
If you mean ASCII representation, # would be 0010 0011.
If instead you prefer EBCDIC, # would be 0111 1011.
hash
Wikipedia says that he use of hash for this sign may have come
from Baudot, which
Well I guess that explains :S
Thanks
On Sun, Mar 15, 2015 at 7:24 PM, Antoine Jacoutot ajacou...@bsdfrog.org
wrote:
On Sun, Mar 15, 2015 at 07:08:52PM +0200, Igor Konforti wrote:
I was writing Deamon by name /etc/rc.d/example-client and all a time I
was getting error that ${daemon_user} is
I was writing Deamon by name /etc/rc.d/example-client and all a time I
was getting error that ${daemon_user} is client
After looking at source code of rc.subr
http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/etc/rc.d/rc.subr?rev=1.92content-type=text/x-cvsweb-markup
I
saw the following:
```
On Sun, Mar 15, 2015 at 07:08:52PM +0200, Igor Konforti wrote:
I was writing Deamon by name /etc/rc.d/example-client and all a time I
was getting error that ${daemon_user} is client
After looking at source code of rc.subr
Si ce message ne s'affiche pas correctement, cliquez ICI (
http://www.benoitfougerais.fr/Franchise/Signarama/Emailing/SAR-NewsLetter201
0.html )
(
https://spreadsheets.google.com/viewform?hl=frcfg=trueformkey=dEFkaDNXWXNn
TDRMOHRiSXFXOVJLa2c6MA )
Votre parcours vous donne maintenant la confiance
Marc Balmer wrote:
Richard Stallman wrote:
I doubt someone who is truly unfriendly could organize a
hackathon, a friendly social event.
He may be perfectly friendly to others. What is relevant is that he
tends to be unfriendly to me.
What is relevant is that you are a hypocrite
I doubt someone who is truly unfriendly could organize a hackathon, a
friendly social event.
He may be perfectly friendly to others. What is relevant is that he
tends to be unfriendly to me.
The same argument could be made about your unfriendliness. We could not
talk to you
Richard Stallman wrote:
I doubt someone who is truly unfriendly could organize a hackathon, a
friendly social event.
He may be perfectly friendly to others. What is relevant is that he
tends to be unfriendly to me.
What is relevant is that you are a hypocrite and come to our
Not calling someone unfriendly and just focusing on the
conversation/technical details at hand, would be much more friendly..
even considering friendship wasn't the subject of discussion in the
first place.
Someone else attacked me on this list for not discussing this with
On Thu, Oct 04, 2007 at 05:03:41PM +0200, G?bri M?t? wrote:
There'll be two main servers, a web server and a sql server. We have to
insert a timestamp and a signature in the specified rows of tables.
Periodically the sql server will make pdf documents from the data and we
have to sign
On Wed, Oct 03, 2007 at 05:21:09PM -0700, Ted Unangst wrote:
On 10/3/07, Gabri Mati [EMAIL PROTECTED] wrote:
I've read a lot about timestamping a document, but dunno how it works in
practice. How can i apply a timestamp to a digitally signed or encrypted
document? Like i encrypt or sign
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
There'll be two main servers, a web server and a sql server. We have to
insert a timestamp and a signature in the specified rows of tables.
Periodically the sql server will make pdf documents from the data and we
have to sign and timestamp these docs
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hey there!
I've read a lot about timestamping a document, but dunno how it works in
practice. How can i apply a timestamp to a digitally signed or encrypted
document? Like i encrypt or sign a document with gnupg, but before the
process how can i
mrta:
On Wed, Oct 03, 2007 at 06:21:53PM +0200, G??bri M??t?? wrote:
I've read a lot about timestamping a document, but dunno how it works in
practice. How can i apply a timestamp to a digitally signed or encrypted
document? Like i encrypt or sign a document with gnupg, but before the
process how
On Wed, Oct 03, 2007 at 06:21:53PM +0200, G??bri M??t?? wrote:
I've read a lot about timestamping a document, but dunno how it works in
practice. How can i apply a timestamp to a digitally signed or encrypted
document? Like i encrypt or sign a document with gnupg, but before the
process how
it works in
practice. How can i apply a timestamp to a digitally signed or encrypted
document? Like i encrypt or sign a document with gnupg, but before the
process how can i timestamp it?
Sorry for the stupid question but i really can't imagine it.
I suppose the first question
On Wed, Oct 03, 2007 at 06:21:53PM +0200, G??bri M??t?? wrote:
Hey there!
I've read a lot about timestamping a document, but dunno how it works in
practice. How can i apply a timestamp to a digitally signed or encrypted
document? Like i encrypt or sign a document with gnupg, but before
?rta:
On Wed, Oct 03, 2007 at 06:21:53PM +0200, G??bri M??t?? wrote:
I've read a lot about timestamping a document, but dunno how it works in
practice. How can i apply a timestamp to a digitally signed or encrypted
document? Like i encrypt or sign a document with gnupg, but before the
process
encrypt or sign a document with gnupg, but before the
process how can i timestamp it?
google/patent search: haber stornetta
dead trees: there's a little section in Applied Cryptography
(surprise!), the basics are fairly obvious (send TTP a hash, they
append a timestamp and sign the lot
a lot about timestamping a document, but dunno how it works in
practice. How can i apply a timestamp to a digitally signed or encrypted
document? Like i encrypt or sign a document with gnupg, but before the
process how can i timestamp it?
Sorry for the stupid question but i really can't imagine
I don't know if there's an accepted strategy, but if I had to create one
from scratch, off the top of my head I'm thinking some time of time
server. It would have to publish a signed file of the current time, say
once per minute, so that you could include the hash in the above noted
tarball.
:
Hey there!
I've read a lot about timestamping a document, but dunno how it works in
practice. How can i apply a timestamp to a digitally signed or encrypted
document? Like i encrypt or sign a document with gnupg, but before the
process how can i timestamp it?
Sorry for the stupid question
On 10/3/07, Gabri Mati [EMAIL PROTECTED] wrote:
I've read a lot about timestamping a document, but dunno how it works in
practice. How can i apply a timestamp to a digitally signed or encrypted
document? Like i encrypt or sign a document with gnupg, but before the
process how can i timestamp
correclty: Database the data-gatherer can query. You
set up a dedicated, physically secure box and provide it with a secure
source of time (GPS?).
Assuming that you don't want the latency for them to email the box a
hash, have the box append a time stamp, sign it, and mail it back. You
need
-10 minutes out of your online experience and
renew service.
Once you have updated your records, your USAA session will not be
interrupted
and will continue as normal.
Please sign in your USAA account, verify and update your profile by
clicking this link:
https://www.usaa.com/inet/ent_logon
On Wed, Nov 02, 2005 at 12:34:29AM +0100, per engelbrecht wrote:
Hi all
[20051019 snap i386]
I've made a setup with two identical bgp routers. On each router there's
3 peers (BGP and eBGP), one failover (carp/iBGP/ospf) interconnecting
these routers and finally pipes backwards to the
Claudio Jeker wrote:
On Wed, Nov 02, 2005 at 12:34:29AM +0100, per engelbrecht wrote:
Hi all
[20051019 snap i386]
I've made a setup with two identical bgp routers. On each router there's
3 peers (BGP and eBGP), one failover (carp/iBGP/ospf) interconnecting
these routers and finally pipes
* per engelbrecht [EMAIL PROTECTED] [2005-11-02 00:52]:
I've made a setup with two identical bgp routers. On each router there's
3 peers (BGP and eBGP), one failover (carp/iBGP/ospf) interconnecting
these routers and finally pipes backwards to the internal nets. Part of
bgpd.conf further
Hi all
[20051019 snap i386]
I've made a setup with two identical bgp routers. On each router there's
3 peers (BGP and eBGP), one failover (carp/iBGP/ospf) interconnecting
these routers and finally pipes backwards to the internal nets. Part of
bgpd.conf further down.
I'm replacing a single
58 matches
Mail list logo