Viktor Dukhovni:
> Though dkimpy-milter is likely the more future-proof choice, perhaps
> OpenDKIM is slightly more polished at present, be it also dated (
> lacking some of the newer algorithms).
>
> For signing, lack of bleeding-edge algorithms is less important, so if
> you're not also
https://crates.io/crates/dkim-milter is yet another option that I’m
working on.
___
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an email to postfix-users-le...@postfix.org
OpenDMARC only uses libspf2 if
(a) it was compiled with SPF support and with libspf2 includes
(configure options --with-spf --with-spf2-include --with-spf2-lib)
and
(b) configuration parameter SPFSelfValidate is enabled.
Item (a) is the case for example in the Debian and Ubuntu package,
EML:
> I can run the milter as a service, if necessary, instead of adding an entry
> in master.cf, but this feels like the wrong way to do this. Thanks.
But note that this is how milters are normally operated, eg milters
installed from a distro package.
Jaroslaw Rafa:
> Dnia 12.04.2023 o godz. 15:43:07 Fourhundred Thecat via Postfix-users pisze:
>> OK, I see.
>> So should the client (mail.example.com) then have it's own SPF record,
>> in addition to the domain itself (example.com) ?
>
> If you plan to send mail with senders addresses as
>
Gerd Hoerst:
> question 1st : is it a good idea to reject any email which is not sent from a
> domain (means sen...@domain.tld) any other like sen...@sub.domain.tld or
> sub.sub.domain.tld is rejected ?
>
> at least i tried with header checks in pcre
>
> /^From:\.*@.*\.*\.*/ DISCARD NO
To find out why a milter signs or does not sign, it would be helpful to
see the milter’s configuration. With OpenDKIM, the setting ‘LogWhy yes’
is useful for debugging such issues.
___
Postfix-users mailing list -- postfix-users@postfix.org
To
Matus UHLAR - fantomas:
> Do you remove those headers on your servers?
In my chain of milters, the very first one simply deletes incoming
Authentication-Results whose authserv-id equals $myhostname … The rest
of the milters can then assume that no such headers are present.
Matus UHLAR - fantomas:
> Which milter is that?
> Does it support trusted hosts?
Yes, I think so. It’s my https://crates.io/crates/spf-milter
Ciao,
___
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an email to
Michael Storz:
> FWS = ([*WSP CRLF] 1*WSP) / obs-FWS
>
> A FWS can be a single WSP or a folded line.
>
> Therefore the date "Fri, 5 Jan 2024 16:48:37 -0500 (EST)" is syntactically
> incorrect, because there can be only one blank between "," and "5", not two
> by the syntax of
Note: OpenDKIM does not require the (ancient, obsolete) setting
‘milter_protocol = 2’. It’s a cargo cult setting. Just drop it and leave
it at the default.
___
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an email to
Remember that Postfix has supported DKIM via various milters for
15+ years without issues. So no, practically there is no problem with
DKIM and header folding in Postfix.
___
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an
Gerben Wierda:
> Aliases are nice, to receive mail. But when you reply, the address behind the
> alias is exposed.
I’m puzzling a bit over this statement … I also use aliases but was not
aware that they would expose my real address?
As a test I’m sending this message from a virtual alias
13 matches
Mail list logo