PONG !
On Fri, Apr 12, 2024 at 5:14 PM wrote:
> April 12, 2024 4:38 PM, gil...@poolp.org wrote:
>
> > Helo,
> >
> > The list server will be upgraded to OpenBSD 7.5 shortly,
> > there may be minor disruptions and I'll send a mail when it's back to
> verify it is dispatched.
> >
> > Sorry for the
Since people are sharing posts / articles, if others have written such articles
feel free to share in this thread, I’m curious :-)
> On 8 Mar 2024, at 22:53, Peter Thurner | Blunix GmbH
> wrote:
>
> Hello misc@opensmtpd.org,
>
> I just wrote a blogpost that explains how to configure OpenSMTP
S records to keep things working. My setup isn't
> particularly complicated compared to enterprise environments, but I've
> had to go beyond the examples in the man pages to get things working.
>
> Anyway, I figured I'd join the mailing list, to both learn, and share
> where I can.
>
> Cheers,
>
Welcome !
--
Gilles Chehade
I’ll send a diff to update ports tonight or tomorrow
Cheers,
> On 6 Feb 2024, at 18:02, Otto Retter wrote:
>
> Hi Folks,
>
> I'm running OpenSMTPD 7.4.0 on OpenBSD 7.4. I tried using the senderscore
> filter option "-allowlist", but it is not available in the filter version
> installed from
> On 14 Jun 2021, at 19:20, François RONVAUX wrote:
>
> Thanks for the reply.
> I will have a look at smtpctl encrypt...
>
>
> According to this ressource (section "Credentials tables"):
> https://man.openbsd.org/OpenBSD-6.9/table.5
> --
> I
this is due to a short-coming with how inflight envelopes are handled:
when a mail is passed from scheduler to mta, it is marked as "inflight" and
can't be removed until it comes back to scheduler.
this is usually not a big deal because an envelope is marked inflight only
a few seconds usually...
On Mon, Feb 03, 2020 at 06:37:38AM -0800, Scott Vanderbilt wrote:
> I'm starting to get several log entries for several errors of type:
>
> 553ORCPT address syntax error
>
> The error is intermittent since the server is able to process other incoming
> mails without error. For instance, I just se
??/* Recent system/libressl implementation; no need for explicit stir */
>
with this, your build is fixed ?
I've been fixing the .c part of openbsd-compat but haven't worked on the
.h part yet, will have look at it
--
Gilles Chehade
d to send spam ?
If you're not using OpenBSD, nope.
If you're using OpenBSD, it's technically possible but unlikely. You can
check by going through your logs and looking for user "-schallenge". The
bypass only makes sense for setups that expose auth and provide rules to
match a
ible in the "real world" to exploit
> this to relay arbitrary messages (e.g. spam)?
>
Yes it would have been most definitely possible now if you have yourself
relayed spam, I'll tell you that it's very unlikely this was used.
--
Gilles Chehade
e-effects because the openbsd-compat setresuid() function will do
some funny things.
The portable branch should work again for all.
Writing this from a Debian/arm64 with a working smtpd
--
Gilles Chehade @poolpOrg
https://www.poolp.org
Try using the 6.6.1p1 tag, I'm currently reworking the dev branch to completely revamp compat layer, things will be shaky for the next few daysOn Nov 15, 2019 11:22, Martijn van Duren wrote:EHLO,
I'm currently trying to port filter-dnsbl to ubuntu, but I'm stuck at
not being able to startup sm
with headers and such. This
may be the case here ?
I'm on my openbsd laptop right now, as soon as I boot on a Linux one I
will try to build on void linux and get back to you, cheers.
--
Gilles Chehade @poolpOrg
https://www.poolp.org
Very likely libevent is missing...
I fixed a configure bug where missing libevent caused a SSL test to fail and
thus lead to a confusing error.
> On 12 Nov 2019, at 00:28, epektasis wrote:
>
> I'm trying to build opensmtpd-6.6.1p1 on an updated Void Linux. Already
> overcame a couple of mis
e-mail or on IRC for more informations.
Reporting Bugs:
===
Please read http://www.opensmtpd.org/report.html
Security bugs should be reported directly to secur...@opensmtpd.org
Other bugs may be reported to b...@opensmtpd.org
--
Gilles Chehade
penBSD and portable but we're kind of
in a time warp right now in between two versions.
On Tue, Oct 22, 2019, 16:23 Gilles Chehade wrote:
> LibreSSL is supported and recommended, this really needs to be fixed
> before the 6.6.0p1 portable release.
>
> On Tue, Oct 22, 2019, 14:44 Jo
LibreSSL is supported and recommended, this really needs to be fixed before
the 6.6.0p1 portable release.
On Tue, Oct 22, 2019, 14:44 John Smith wrote:
> Hello,
>
> thanks very much for all your replies. In deed, I rebuild world replacing
> openssl with libressl, basically only for opensmtpd. So
On Thu, Oct 17, 2019 at 03:07:45PM +0300, Reio Remma wrote:
> On 17/10/2019 15:06, Gilles Chehade wrote:
> > On Thu, Oct 17, 2019 at 02:54:26PM +0300, Reio Remma wrote:
> > > On 17/10/2019 14:20, gil...@poolp.org wrote:
> > > > Hello misc@,
> > > >
>
this as I had unexpected hand surgery and
> > doing the tests myself is extremely long.
> >
> > Please report as a follow up to this mail what you did test,
> >
> >
>
> Hello! Do you have any pointers as to what an SRS key should look like?
>
just make it something hard to guess :-)
--
Gilles Chehade @poolpOrg
https://www.poolp.orgpatreon: https://www.patreon.com/gilles
Feeding it to Rspamd like that made DKIM alignment tests
> fail, because body hash came out wrong.
>
> A pull request has been submitted with a fix.
>
nice catch :-)
--
Gilles Chehade @poolpOrg
https://www.poolp.orgpatreon: https://www.patreon.com/gilles
Very likely yes, can you give it a try ?
On Sun, Oct 13, 2019, 15:15 Reio Remma wrote:
> On 13.10.2019 16:09, Reio Remma wrote:
>
> On 13.10.2019 16:05, Gilles Chehade wrote:
>
> I don't think that is the issue, it is probably the filter-rspamd
> reconstruction of the me
I don't think that is the issue, it is probably the filter-rspamd
reconstruction of the message that is incorrect.
On Sun, Oct 13, 2019, 15:00 Martijn van Duren
wrote:
> On 10/13/19 1:59 PM, Reio Remma wrote:
> > Hello!
> >
> > I finally moved to Rspamd (2.0) on my production server and I'm seei
s not created because soneone
had overlooked the first few lines of the Dovecot documentation stating:
"For a password database, it's enough to have only the user and password
fields."
--
Gilles Chehade @poolpOrg
https://www.poolp.or
e but it mostly comes from compromised hosts
so filtering on !rdns, !fcrdns and matching some common dynamic patterns
kills the bulk of them.
--
Gilles Chehade @poolpOrg
https://www.poolp.orgpatreon: https://www.patreon.com/gilles
"!#$%&'*/?^`{|}~+-=_"
-#defineMAILADDR_ESCAPE "!#$%&'*/?^`{|}~"
-
+#define MAILADDR_ESCAPE "!#$&*?^`{|}"
#define F_STARTTLS 0x01
#define F_SMTPS0x02
--
Gilles Chehade @poolpOrg
https://www.poolp.orgpatreon: https://www.patreon.com/gilles
OS 7 has OpenSSL 1.0.2k as the max version and with OpenSSL 1.1.1c
> compiled into OpenSMTPD I can run the new OpenSMTPD version on a machine
> with CentOS 7's old OpenSSL version.
>
> I had to add -pthreads and -ldl to pass 'make' with the static OpenSSL
> libraries. Without these I ran into errors hinting at threads and dl.
>
> I'm a little wary of just forcibly replacing the whole OpenSSL 1.0.2k on a
> production machine. :)
>
Understood !
OpenSSL 1.0.x is going to be supported until 2019-12-31 so this will get
solved by itself soon ;-)
--
Gilles Chehade @poolpOrg
https://www.poolp.orgpatreon: https://www.patreon.com/gilles
On Sun, Aug 25, 2019 at 07:16:23AM +0200, Harald Dunkel wrote:
> Hi Gilles,
>
> On 8/24/19 9:14 PM, Gilles Chehade wrote:
> >
> > This is expected.
> >
> > Version 6.4.x only builds with LibreSSL or OpenSSL 1.0.x
> >
>
> do you think it would be
-only \
> > virtual
> > action deliver_virtual_set \
> > maildir \
> > userbase
> >
> > # MATCHES
> > # ---
> > match from any \
> > for domain
On Sat, Aug 24, 2019 at 10:16:26PM +0200, Martijn van Duren wrote:
> On 8/24/19 10:06 PM, Gilles Chehade wrote:
> > On Sat, Aug 24, 2019 at 12:32:05PM -0700, Darren S. wrote:
> >> OpenBSD 6.5 amd64
> >> OpenSMTPD 6.5.0
> >>
> >> port [port]
> &g
urious that `submission` may be used in place of a port
> number but not the other service names.
>
this is because `smtp' and `smtps` are keywords, so they must be quoted:
listen on lo port "smtp"
--
Gilles Chehade @poolpOrg
https://www.poolp.orgpatreon: https://www.patreon.com/gilles
attached.
>
This is expected.
Version 6.4.x only builds with LibreSSL or OpenSSL 1.0.x
See:
https://poolp.org/posts/2019-07-27/july-2019-report-tons-of-smtpd-work-mostly/
--
Gilles Chehade @poolpOrg
https://www.poolp.orgpatreon: https://www.patreon.com/gilles
al" source
> package for Debian and Fedora/RedHat.
>
you mean like this ? :-)
https://github.com/OpenSMTPD/OpenSMTPD/releases/tag/opensmtpd-6.4.2p1
--
Gilles Chehade @poolpOrg
https://www.poolp.orgpatreon: https://www.patreon.com/gilles
On Wed, Aug 21, 2019 at 08:06:58PM +, Thomas Smith wrote:
>
> ? Original Message ?
> On Wednesday, August 21, 2019 8:28 AM, Gilles Chehade
> wrote:
>
> > On Wed, Aug 21, 2019 at 03:22:39PM +, Thomas Smith wrote:
> >
Hello everyone,
I was invited to talk a bit about SMTP and OpenSMTPD in FLOSS Weekly.
Here is the link in case you're interested:
https://twit.tv/shows/floss-weekly/episodes/543
Cheers
--
Gilles Chehade @poolpOrg
https://www.pool
domain pki $mx_domain filter "rspamd"
>
> 'smtpd -d -v':
> debug: smtp: listen on x.x.x.x port 25 flags 0x2401 pki "" ca ""
>
> I also don't see any debug messages regarding rspamd.
>
your config is correct
--
Gilles Chehade @poolpOrg
https://www.poolp.orgpatreon: https://www.patreon.com/gilles
pragmasec.nl hostname
> server.pragmasec.nl auth
> table vdomains file:/etc/mail/domains
> table vusers file:/etc/mail/vusers
> expire 7d
> limit mta inet4
> accept from any for domain virtual deliver to mda
> "/usr/lib/dovecot/dovecot-lda -f %{sender} -a %{rcpt}&qu
uthentication, see 'cred' file.
> accept from any for ! domain 486.hu relay via
> tls+auth://t-onl...@mail.t-online.hu auth
>
That last rule is essentially "accept from any for (pretty much) any" so
you have created an open relay.
Replace the "from any" w
d: Message is not RFC 2822 compliant
>
> I see the same from a telnet session as well.
>
> So there are 2 problems. First my script doesn't appear to acurately
> determine that the headers are finished. Second mail
> doesn'
t APIs.
it is technically doable but 1.0.z will be EOL a month or so after we'll
release our next major version so the work isn't worth it.
--
Gilles Chehade @poolpOrg
https://www.poolp.orgpatreon: https://www.patreon.com/gilles
://twit.tv/live
I'm looking forward to this interview!
Thanks for being on the show, Gilles.
Best,
j.b.
- End forwarded message -
--
Gilles Chehade @poolpOrg
https://www.poolp.orgpatreon: https://www.patreon.com/gilles
time, including maybe some
milter interface on top of our implementation if someone feels like it.
Looking forward to see what the community builds with this !
--
Gilles Chehade @poolpOrg
https://www.poolp.orgpatreon: https://www.patreon.com/gilles
On Sun, Aug 18, 2019 at 10:39:29AM +0200, Gilles Chehade wrote:
> Hello,
>
> I have written a second filter:
>
> https://github.com/poolpOrg/filter-senderscore
>
> Senderscore is the reputation scoring built by Return-Path which some of
> the Big Mailers Corp feed
real, bad reputations generally mean sender is bad for real.
I'd appreciate some testing and reporting ;-)
--
Gilles Chehade @poolpOrg
https://www.poolp.orgpatreon: https://www.patreon.com/gilles
're not enqueuing the mail through the local socket ?
Note that 'listen on lo0' is a network listener and does not catch mails
that are submitted through the 'mail' command for instance.
Try adding 'listen on socket' and let me know if it works better.
> P.S.: misc+get-04...@opensmtpd.org doesn't work.
>
never used it, i'll look
--
Gilles Chehade @poolpOrg
https://www.poolp.orgpatreon: https://www.patreon.com/gilles
Hu, this doesn't look like latest checkout from portable, can you double
check ?
Le mer. 14 août 2019 à 22:17, Denis Fateyev a écrit :
> Hello Gilles,
>
> Tried to rebuild on Fedora 30, but got compile errors (providing below
> with warnings in case if you find them useful):
> --- < cut
since then, the port has been committed to OpenBSD !
--
Gilles Chehade @poolpOrg
https://www.poolp.orgpatreon: https://www.patreon.com/gilles
On Sat, Aug 10, 2019 at 02:24:57PM -0500, Edgar Pettijohn wrote:
>
> On Aug 10, 2019 1:05 PM, Gilles Chehade wrote:
> >
> > On Mon, Jul 22, 2019 at 11:52:45AM -0500, Edgar Pettijohn wrote:
> > >
> > > On Jul 22, 2019 8:17 AM, Andreas Karlsson wrote:
> &
SQL from
> the command line works. Plus dovecot is using the same without error.
>
> Thanks,
>
Once I tag OpenSMTPD 6.6.0 in August, I'll have a look at extras because
they've been out of my sight for a while.
--
Gilles Chehade @poolpOrg
https://www.poolp.orgpatreon: https://www.patreon.com/gilles
We're very close to 6.6 freeze so I'm not comfortable addressing this in
the current timeframe.
A possible fix to your issue would be to add ' to the allowed charset in
util.c, can you try and see if it is enough to solve your issue ?
--
Gilles Chehade
On Fri, Aug 09, 2019 at 01:19:25AM +0200, Michael Warmuth-Uhl wrote:
> Hi Gilles,
>
> On 8/8/19 9:30 AM, Gilles Chehade wrote:
> > What happens if you call mail.local directly, bypassing smtpd altogether ?
>
> Thanks for your hint. It helped finding the issue.
&g
Since its mail related, here is fine.What happens if you call mail.local directly, bypassing smtpd altogether ?Are other people on the list experiencing this ?Le 8 août 2019 10:50, Michael Warmuth a écrit :Hello,
> Very weird because mail.local which is used for mbox delivery
> adds the line
Very weird because mail.local which is used for mbox delivery adds the line unconditionally.How did you update ?Le 8 août 2019 00:30, Michael Warmuth-Uhl a écrit :Hello,
since my yesterday's update to OpenBSD 6.5 (from 6.3 via 6.4),
smtpd does create invalid mbox entries for one of my mailboxe
are as follow:
smtp limit max-mails = max number of mails per session
smtp limit max-rcpt = max number of recipient per transaction
--
Gilles Chehade @poolpOrg
https://www.poolp.orgpatreon: https://www.patreon.com/gilles
m
>
>
> AFAICS the syntax follows the man page, so why does it complain?
> I don't see it. Every helpful hint is highly appreciated.
>
you're using an auth label but this requires a secure transport.
from smtpd.conf(5):
The label corresponds to an entry in a cred
You have to send a mail to misc+unsubscr...@opensmtpd.org from the e-mail address you want to unsubscribe.You can't unsubscribe other addresses.If you need help, contact me off listLe 6 août 2019 11:30, Harald Dunkel a écrit :Hi folks,
https://www.opensmtpd.org/list.html doesn't tell how to uns
have updated our website front page to provide the tarball and signature
as direct links.
Alternatively, you can grab the release from our github mirror under the
tag opensmtpd-6.4.2p1:
https://github.com/OpenSMTPD/OpenSMTPD/tree/opensmtpd-6.4.2p1
--
Gilles Chehade
I'm working pretty much alone on smtpd these days and I'm not full-time,
so unless an issue is security related, it can take a bit of time before
I tackle it.
Patience.
--
Gilles Chehade @poolpOrg
https://www.poolp.orgpatr
craft logs to ease creation of dashboards,
I suck at actaully creating these dashboards.
If there are a few people around with ELK knowledge, it would be nice to
give me some help in showcasing what can be achieved with this feature.
--
Gilles Ch
other intrusive/ugly
> workaround, is there any way I could force a CA for those connections?
>
Your expectations are also mine.
Please open an issue on our bug tracker, I'll have a look at it shortly
as I recently did work in that area a
ng unusual !
--
Gilles Chehade @poolpOrg
https://www.poolp.orgpatreon: https://www.patreon.com/gilles
--
You received this mail because you are subscribed to misc@opensmtpd.org
To unsubscribe, send a mail to: misc+unsubscr...@opensmtpd.org
On Wed, Jul 24, 2019 at 10:29:34AM +0200, Harald Dunkel wrote:
> Hi Gilles,
>
> On 7/23/19 11:58 AM, Gilles Chehade wrote:
> > Hello people,
> >
> > The portable branch of OpenSMTPD should build with OpenSSL again as long
> > as your system is using >= 1.1.x
th LibreSSL and OpenSSL with same code as far as I know. I will get
into this when time allows but until then ECDSA server certificate is
only supported with LibreSSL.
OpenSMTPD portable has been built and tested with Ubuntu only, please do
provide fe
out 1- and 2-, because it means we
are now VERY VERY VERY sysadmin friendly when it comes to monitoring and
alerting: pushing useful metrics to elasticsearch has become trivial. It
is likely I'll release a filter-elastic if there is interest.
St
ho were still trying to avoid LibreSSL through local patches,
but once we've switched to libtls, work can start to create a version
of libtls that works with OpenSSL, this will keep most complexity out
of OpenSMTPD and make us work again with OpenSSL without hacks.
Ch
On Fri, Jul 05, 2019 at 04:57:51PM +0200, Gilles Chehade wrote:
> helo,
>
> this is just a question out of curiosity
>
> I know plenty of people use the lmtp action to deliver mail through LMTP
> and I'm genuinely curious: what is your use-case ?
>
> Why do you del
helo,
this is just a question out of curiosity
I know plenty of people use the lmtp action to deliver mail through LMTP
and I'm genuinely curious: what is your use-case ?
Why do you deliver to LMTP ?
--
Gilles Chehade @poolpOrg
opportunistic tls, so it'll do tls no-verify
but will fallback to plaintext if no tls is available.
tls no-verify won't hard fail if certificate is invalid, but it won't go
to plaintext either.
--
Gilles Chehade
https://www.poolp.org @poolpOrg
authenticated user to be a "local" user, so if you
read my blog post with that perspective, it makes sense.
Nowadays, authenticated users and local users are considered differently
so you need to match 'auth' to catch authenticated users.
> Thank you for any suggestions you m
t;
> smtp-out: Server certificate verification failed on session 3ba547f4f7b77d56c
>
>
> What am I doing wrong?
>
nothing
no-verify only means that if certificate does not validate, connection
will be dropped, the log will still be visible.
--
Gilles Chehade
x27;t find anything on opensmtpd.org. Or
> should I just check the source code of already existing filters as example?
>
the filter API is not yet documented, i'm working on it at the moment.
if you plan on working on filters, you should join our IRC channel or be
prepared to fac
D will not advertise AUTH over plaintext channels.
it is not an SMTP limitation, it is a decision we made years ago and you
will not have a work-around for this.
there's no excuse in 2019 to allow AUTH over plaintext :-)
--
Gilles Chehade @poolpOrg
On Tue, Jul 02, 2019 at 06:54:02AM +, mabi wrote:
> ? Original Message ?
> On Sunday, June 30, 2019 1:46 PM, Gilles Chehade wrote:
>
> > I'm currently working on bringing a filter-rspamd to life, see:
> >
> > https:/
nice but I don't understand how it works.I'm looking
> forward to have something native with opensmtpd, spam is a pain.
>
I don't understand what you mean by "native".
--
Gilles Chehade @poolpOrg
https://www.poolp.org
rds seems to work flawlessly, except for
> unexplained Proofpoint blocks.
>
These happen even to the best of us.
> Hope you all are having a wonderful day.
>
Enjoy your stay around,
--
Gilles Chehade @poolpOrg
https://www.poolp.org
On Wed, May 29, 2019 at 09:54:36AM +0200, Pierre-Edouard wrote:
>
> Le 26/05/2019 ?? 17:22, Gilles Chehade a ??crit??:
> > On Sun, May 26, 2019 at 09:53:46AM +0200, Pierre-Edouard wrote:
> > > Hi All,
> > >
> > Hi,
> >
> >
> > > I a
re still able to send me
> mail :(
>
> Any ideas ?
>
the 'from rdns' criteria will fail to match if the client doesn't have a
reverse dns, so a way to catch them would be:
match !from rdns regex '^.*$' [...]
i'll have a look at how to
Recipient ok
RCPT TO:
250 2.1.5 Destination address valid: Recipient ok
RCPT TO:
250 2.1.5 Destination address valid: Recipient ok
RCPT TO:
250 2.1.5 Destination address valid: Recipient ok
RCPT TO:
250 2.1.5 Destination address valid: Recipient ok
^C
I think your issues isn't with Ope
On Sun, May 19, 2019 at 04:52:39PM +0200, David Flatz wrote:
> Gilles Chehade (2019-05-19 14:31+0200):
> > On Sun, May 19, 2019 at 12:16:40PM +0200, David Flatz wrote:
> > > Gilles Chehade (2019-05-19 10:39+0200):
> > > > On Sun, May 19, 2019 at 10:24:07AM +0200, Gill
On Sun, May 19, 2019 at 12:16:40PM +0200, David Flatz wrote:
> Gilles Chehade (2019-05-19 10:39+0200):
> > On Sun, May 19, 2019 at 10:24:07AM +0200, Gilles Chehade wrote:
> > > On Sat, May 18, 2019 at 02:55:05PM +0200, David Flatz wrote:
> > > > Delivery to doveco
On Sun, May 19, 2019 at 10:24:07AM +0200, Gilles Chehade wrote:
> On Sat, May 18, 2019 at 02:55:05PM +0200, David Flatz wrote:
> > Hello everybody
> >
>
> Hello,
>
>
> > Delivery to dovecot works pretty good for normal mails locally with sendmail
> > an
to dovecot) or add a domain?
>
> Thanks again and have a great weekend!
>
Yup, the fix will be committed to -current today
--
Gilles Chehade @poolpOrg
https://www.poolp.org tip me: https://paypal.me/poolpOrg
--
You re
inish, I had someone tell me in private that he did not want to rely
on LibreSSL because he didn't trust it... some of the commits to our TLS
layer were actually done or suggested by the LibreSSL folks. We have the
same code standards, to trust us but not LibreSSL is really absurd :-)
--
Gil
.
If you have diffs that allow OpenSMTPD to build with latest LibreSSL and
latest stock OpenSSL (no weird enable/disable configure flags) and which
only achieve so through use of common APIs, I'll accept them happily.
--
Gilles Chehade @poolpO
ing EMails.
>
without your configuration it's hard to determine what's wrong
--
Gilles Chehade
https://www.poolp.org @poolpOrg
--
You received this mail because you are subscribed to misc@opensmtpd.org
To unsubscribe, send a mail to: misc+unsubscr...@opensmtpd.org
> > ab
> > [1] - https://man.openbsd.org/OpenBSD-6.5/smtpd.conf
> > [2] - https://man.openbsd.org/smtpd.conf
> > [3] - https://www.openbsd.org/65.html
> > -|-|-|-|-|-|-|--
> >
>
>
IP address for mail with correct rDNS and fc-rDNS
- setup the mta to support TLS (if needed, not the case on OpenSMTPD)
- setup the mta to use a EHLO name matching DNS for the IP
- setup SPF
- setup DKIM
That would be my very very very very minimum requirements.
--
Gilles Chehade
On Wed, Feb 20, 2019 at 04:57:08PM +0100, Mischa wrote:
>
>
> > On 6 Feb 2019, at 17:24, Mischa wrote:
> >
> >> On 6 Feb 2019, at 15:38, Gilles Chehade wrote:
> >>
> >> On Wed, Feb 06, 2019 at 11:42:19AM +0100, Mischa wrote:
> >>> Hi
th from any mail-from "@opensmtpd.org" reject
there are other ways too
--
Gilles Chehade @poolpOrg
https://www.poolp.org tip me: https://paypal.me/poolpOrg
--
You received this mail because you are subscribed to misc@opensmtpd.org
To unsubscribe, send a mail to: misc+unsubscr...@opensmtpd.org
On Tue, Feb 05, 2019 at 05:35:56PM +0100, Tor Houghton wrote:
> On Tue, Feb 05, 2019 at 04:40:20PM +0100, Gilles Chehade wrote:
> >
> > You should really avoid using mlmmj from the config or aliases file.
> >
> > You can easily plug mlmmj from .forward files which is
in action "mlmmj"
> >
> >
>
You should really avoid using mlmmj from the config or aliases file.
You can easily plug mlmmj from .forward files which is much safer.
--
Gilles Chehade @poolpOrg
https://www.poolp.org
On Tue, Jan 29, 2019 at 04:23:23PM +0100, Mischa wrote:
> > On 29 Jan 2019, at 16:20, Gilles Chehade wrote:
> >
> > On Tue, Jan 29, 2019 at 01:10:47PM +0100, Mischa wrote:
> >> Hi Gilles,
> >>
> >>> well, providing the full session log from conne
m src mail-from action "relay"
> action "relay" relay
>
for starters, you lack a 'for any' in that rule, so it will only match
for recipients that are on a local domain (ie: `hostname` & localhost)
--
Gilles Chehade
On Tue, Jan 29, 2019 at 12:41:17PM +0100, Mischa wrote:
>
>
> > On 29 Jan 2019, at 12:30, Gilles Chehade wrote:
> >
> > On Fri, Jan 25, 2019 at 02:08:41PM +0100, Mischa wrote:
> >> Hi All,
> >>
> >
> > Hi,
> >
> >
>
ost=46-23-xx-yy.domain1.nl
> Jan 18 15:56:13 mx1 smtpd[36743]: 00a1b263550db3c7 smtp failed-command
> command="RCPT TO:" result="550 Invalid recipient"
> Jan 18 15:56:13 mx1 smtpd[36743]: 00a1b263550db3c7 smtp disconnected
> reason=disconnect
>
>
#x27;t really help to figure it out though.
>
yes :-/
the problem is that the SMTP engine expects an SMTP session, and instead
it receives a blob which violates the protocol and likely contains a new
line that triggers pipeline violation mechan
On Tue, Jan 22, 2019 at 01:11:44AM +0100, Eric Elena wrote:
> On Mon, 21 Jan 2019 11:08:02 +0100 Gilles Chehade wrote:
> > I may sound a bit harsh, but starting a thread with "this is my last try
> > or I'll switch" (as if it actually matters) right before telling som
t want to be "that asshole", although it seems I've succeeded again -
> sorry.
>
> Thank you for taking the time to reply. Now I'm going to go check that mail
> server a 7,000,000th time, this time to see what MTA is actually *running*,
On Fri, Jan 18, 2019 at 02:56:10PM +0300, Tevfik Ceydeliler wrote:
> Hi
>
> Is there anu way to add diclaimer?? into?? mail by using smtpd?
>
Not yet possible easily, no
Will be doable with the next release
--
Gilles Chehade @poo
you actually tried _nothing_ then blaming the
code improvements for a use-case that could have never worked because it
not only uses the wrong _documented_ mechanism but also because the code
to make your use-case work has never existed, kinds of irritates me.
I don't get royalties on s
cope, it can only expand it.
What you are describing has never existed in smtpd, there's never been
code to translate sender addresses and there's a good reason for that:
it not considered doable before the grammar change...
But sure, blame it on the grammar.
> (If anyone cares, the bad
1 - 100 of 1023 matches
Mail list logo