Dear list,
i subscribed today to list and the welcome instruction really does not contain
the preferred posting address.
In fact i was not sure that the message would make its way the the list.
Coming back to real issue, i have already initiated password policy control.
But i feel its not
Sorry missed to say that it is not shared password system.
Sent from my Nokia phone
-Original Message-
From: Evan Platt
Sent: 24/04/2011, 8:04 AM
To: Daniel Bromberg
Cc: postfix-users@postfix.org
Subject: Re: need help for controlling authenticated realy
On Sat, Apr 23, 2011 at 7:17
Rajesh Kumar Mallah:
[ Charset ISO-8859-1 unsupported, converting... ]
Hi,
We allow relaying of email via our server to our clients using authentication.
The problem is that some miscreants have got hold of our clients password
and are using our email server to send SPAM after successfully
On Sun, Apr 24, 2011 at 07:15:34AM +0530, Rajesh Kumar Mallah wrote:
We allow relaying of email via our server to our clients using authentication.
The problem is that some miscreants have got hold of our clients password
and are using our email server to send SPAM after successfully
Sent from my Nokia phone
-Original Message-
From: Wietse Venema
Sent: 24/04/2011, 6:23 PM
To:
Subject: Re: need help for controlling authenticated realy
Rajesh Kumar Mallah:
[ Charset ISO-8859-1 unsupported, converting... ]
Hi,
We allow relaying of email via our server to our
Thanks bastian and everyone,
postfwd looks nice. i will heed the suggestions
most of suggestions asks to have better possword
policies basically.
Btw
i noticed that there was a typo
in the original posting , is it possible to correct the subject
line before it gets indexed ?
Sent from my Nokia
mallah.raj...@gmail.com mallah.raj...@gmail.com wrote:
Coming back to real issue,i have already initiated password policy
control. But i feel its not impossible for the enduser to somehow leak
the password, passwords are commonly
remembered by muas and possibility of virus and malware
* mallah.raj...@gmail.com mallah.raj...@gmail.com:
i am using policyd but it looks like it has no control once the initial
connection is established , authenticated and pipelining is being used to
pump spam . Is it really so?.
At least version 1 of policyd can throtte SASL authenticated
On 24/4/2011 5:09 πμ, Evan Platt wrote:
Enforce a better password policy - our work password policy is minimum
My 2c:
Check your server logs to see if someone found some password(s) by
brute-force (you'll see multiple failed logins).
* If yes, enforce a strict password policy as
hello postfix guru
hello Wieste and other develloper
I already post a question asking for more.
how to allow both HELO and EHLO. I currently only accept EHLO and I see that I
refuse a lot of legitimate mail
my postconf -n
r13151 ~]# postconf -n
alias_database = hash:/etc/aliases ,
I just changed this option
smtp_tls_note_starttls_offer = may
that it's OK or not OK
thanks
Le dimanche 24 avril 2011 22:10, fakessh a écrit :
hello postfix guru
hello Wieste and other develloper
I already post a question asking for more.
how to allow both HELO and EHLO. I currently
Le dimanche 24 avril 2011 22:37, fakessh a écrit :
I just changed this option
smtp_tls_note_starttls_offer = may
that it's OK or not OK
thanks
i just reread the doc and
I think he must use
smtpd_tls_security_level = may
it's OK wieste ?
thanks ...
s ///
Le dimanche 24 avril 2011
what have smtp_tls_note_starttls_offer to do with EHLO/HELO
and what have smtp_*-commands to do with receive?
why you are using so complex EHLO-restrictions?
the following should be enough!
smtpd_helo_required = yes
smtpd_helo_restrictions = permit_mynetworks
reject_non_fqdn_helo_hostname
i reread the doc
i just changed this option
smtpd_tls_security_level = may
Le dimanche 24 avril 2011 22:53, Reindl Harald a écrit :
what have smtp_tls_note_starttls_offer to do with EHLO/HELO
and what have smtp_*-commands to do with receive?
why you are using so complex EHLO-restrictions?
Le dimanche 24 avril 2011 22:53, Reindl Harald a écrit :
smtpd_helo_required = yes
I follow the advice given to me I just added this option
smtpd_helo_required = yes
--
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x092164A7
gpg --keyserver pgp.mit.edu --recv-key 092164A7
Am 24.04.2011 23:42, schrieb fakessh:
Le dimanche 24 avril 2011 22:53, Reindl Harald a écrit :
smtpd_helo_required = yes
I follow the advice given to me I just added this option
smtpd_helo_required = yes
you sould not only ADD this option because it makes nothing better
since your
Dear Patrixk,
I express my gratitude to this list . I am grateful for the people
in the list who contribute their gems. I am new to postfix (qmail migrant) ,
but with a lively list like this i am feeling home.
the postcat is very handy to print the headers and contents
i am sure i should be able
Hi,
This little script was developed which analyses output postqueue -p
and prints the report on the greatest abusers. It was developed
to quickly clear the queue of the deferred spam messages.
It is a stream processor and does not hogs memory , can analyze really
large volumes from postqueue -p.
Dear Patrick,
I did a testing and i was able to successful in linking the message to
the original username that was used in authenticating the connection
for message delivery.
the key was to grep '9A2E240330CE2' from the header
33 Received: from laptop.localnet (unknown [122.161.212.115])
34
given two lines in header_checks, both work when testing with postmap, but only
one works when processing actual mail. it's my sense that it's related to the
fact that the non working header check has to do with mail submitted via
sendmail(1), but i can't figure out what i'm doing wrong.
cat
On 4/24/2011 9:07 PM, ben thielsen wrote:
given two lines in header_checks, both work when testing with postmap, but only
one works when processing actual mail. it's my sense that it's related to the
fact that the non working header check has to do with mail submitted via
sendmail(1), but i
Please show postconf -n output and non-comment lines from master.cf.
[whitespace modified for readability]
postconf -n
alias_database =
alias_maps =
append_dot_mydomain = no
biff = no
body_checks = regexp:$config_directory/tables/body_checks
config_directory = /etc/postfix
content_filter =
22 matches
Mail list logo