April 12, 2024 5:18 PM, "Gilles Chehade" wrote:
> PONG !
>
> On Fri, Apr 12, 2024 at 5:14 PM wrote:
>
>> April 12, 2024 4:38 PM, gil...@poolp.org wrote:
>>
>>> Helo,
>>>
>>> The list server will be upgraded to OpenBSD 7.5 shortly,
PONG !
On Fri, Apr 12, 2024 at 5:14 PM wrote:
> April 12, 2024 4:38 PM, gil...@poolp.org wrote:
>
> > Helo,
> >
> > The list server will be upgraded to OpenBSD 7.5 shortly,
> > there may be minor disruptions and I'll send a mail when it's back to
> verify it is dispatched.
> >
> > Sorry for the
April 12, 2024 4:38 PM, gil...@poolp.org wrote:
> Helo,
>
> The list server will be upgraded to OpenBSD 7.5 shortly,
> there may be minor disruptions and I'll send a mail when it's back to verify
> it is dispatched.
>
> Sorry for the noise.
PING ?
Helo,
The list server will be upgraded to OpenBSD 7.5 shortly,
there may be minor disruptions and I'll send a mail when it's back to verify it
is dispatched.
Sorry for the noise.
April 11, 2024 11:37 PM, "Kirill A. Korinsky" wrote:
> Greetings,
>
Hello,
> I've noticed that my personal mail stop to working. After some digging in
> the log I discovered the magic line:
>
> Apr 10 23:37:43 mx1 smtpd[84358]: warn: Disabling incoming SMTP connections:
> Client limit
April 2, 2024 6:00 PM, "Tassilo Philipp" wrote:
> Hi,
>
> Find attached the first stab at a final patch making generated bounce mails
> follow more closely the
> RFCs 3461, 3464 and 6522. The attached file includes the patch from my
> previous mail in this
> thread.
>
> The patch is based on
April 2, 2024 4:47 AM, and...@tekrealm.net wrote:
> What signals a termination for smtpd filters?
>
> I'm using the code at
> https://github.com/Beutlin/howto-opensmtpd-filters-and-reports,
> Which works great, except for when smtpd gets shutdown. The script continues
> to run and
> consumes up
March 13, 2024 10:31 AM, "Tassilo Philipp" wrote:
> Hello,
>
> I noticed that DSNs generated by OpenSMTPd use "Content-Type:
> multipart/mixed", instead of
> "Content-Type: multipart/report", as defined by RFC3461 (and described in
> RFC3464 and RFC3462). I
> wonder if there's a reason for
I created a Wiki page on the public repository for OpenSMTPD:
https://github.com/OpenSMTPD/OpenSMTPD/wiki/OpenSMTPD-articles-and-posts
List to be completed ;-)
Since people are sharing posts / articles, if others have written such articles
feel free to share in this thread, I’m curious :-)
> On 8 Mar 2024, at 22:53, Peter Thurner | Blunix GmbH
> wrote:
>
> Hello misc@opensmtpd.org,
>
> I just wrote a blogpost that explains how to configure
thing in macOS.
March 10, 2024 4:19 AM, "ED Fochler" wrote:
> I can take that. Tell me what you need.
>
> ED.
>
>> On Mar 9, 2024, at 6:21 AM, gil...@poolp.org wrote:
>>
>> Hello,
>>
>> Anyone on the list has a MacOS that's not Sonoma and can help track a bug ?
>>
>> Gilles
Hello,
Anyone on the list has a MacOS that's not Sonoma and can help track a bug ?
Gilles
I somehow uploaded the correct sum.sig but an older version of the tarball,
let's pretend I did this to ensure someone made a verify test ;-)
Anyways... the tarball has been reuploaded:
$ signify -C -e -p opensmtpd-20181026.pub -x opensmtpd-7.5.0rc1.sum.sig
Signature Verified
March 5, 2024 4:19 PM, "Simon Hoffmann" wrote:
> gil...@poolp.org wrote:
>
>> Does your script exit with 0 ?
>
> If the curl output is "OK", then I exit with "exit 0". I have even removed
> the "if"
> and have just set a static "exit 0" at the end no matter if the curl before
> was
>
Does your script exit with 0 ?
March 5, 2024 10:49 AM, "Simon Hoffmann" wrote:
> Hey list,
>
> in my virtual users file, I have specified an external script additionally to
> delivery to mailboxes.
>
> emerge...@domain.tld user1,user2,|/etc/smtpd/send_sms.sh
>
> Local delivery to the
February 6, 2024 8:40 PM, "Otto Retter" wrote:
> Fantastic, thank you Gilles!
>
> - Otto
>
> On 2/6/2024 12:27 PM, Gilles Chehade wrote:
>
>> I’ll send a diff to update ports tonight or tomorrow
>> Cheers,
Took a bit more time because I forgot how to
ep things working. My setup isn't
> particularly complicated compared to enterprise environments, but I've
> had to go beyond the examples in the man pages to get things working.
>
> Anyway, I figured I'd join the mailing list, to both learn, and share
> where I can.
>
> Cheers,
>
Welcome !
--
Gilles Chehade
didn't break the mailing list while deploying
>> a new default MDA on the server.
>>
>> Gilles
Everything's fine,
There will be two more mails to test a behaviour change.
February 11, 2024 10:00 AM, gil...@poolp.org wrote:
> Hello misc@,
>
> Just a mail to make sure that I didn't break the mailing list while deploying
> a new default MDA on the server.
>
> Gilles
Hello misc@,
Just a mail to make sure that I didn't break the mailing list while deploying
a new default MDA on the server.
Gilles
I’ll send a diff to update ports tonight or tomorrow
Cheers,
> On 6 Feb 2024, at 18:02, Otto Retter wrote:
>
> Hi Folks,
>
> I'm running OpenSMTPD 7.4.0 on OpenBSD 7.4. I tried using the senderscore
> filter option "-allowlist", but it is not available in the filter version
> installed
January 26, 2024 10:22 PM, gil...@poolp.org wrote:
> January 25, 2024 9:23 PM, "Chris Brannon" wrote:
>
>> Well, maybe the thing I thought would be very stupid isn't so stupid
>> after all. In doas.conf:
>>
>> permit nopass smtpd as mlmmj cmd /usr/bin/mlmmj-receive
>> permit nopass smtpd as
January 25, 2024 9:23 PM, "Chris Brannon" wrote:
> Well, maybe the thing I thought would be very stupid isn't so stupid
> after all. In doas.conf:
>
> permit nopass smtpd as mlmmj cmd /usr/bin/mlmmj-receive
> permit nopass smtpd as inboxen cmd /usr/bin/public-inbox-mda
>
> And then in the
hello,
fyi,
if the first line of a file used to feed a table is @list, then
it forces parsing to consider content as a serie of values, not
a serie of key-value.
gilles
December 14, 2023 11:33 PM, "Omar Polo" wrote:
> On 2023/12/14 21:36:44 +0100, Kirill Miazine wrote:
>
I don't recall the exact exact rule as it is one shared by all OpenBSD
daemon through the common lexer, but basically if the string starts w/
a special character or contains some special ones, you need quotes:
table foobar /etc/mail/aliases
^ not a valid way to begin a
September 7, 2023 11:44 AM, "Sagar Acharya" wrote:
> In today's times of mature NLP, you will not be able to differentiate human
> mail from bot mail or
> spam. Only in person verification is trustworthy.
> No. Are you saying that only people who control the network should send
> mails? Well
Hello,
OpenBSD 7.3 ships with the code used to build OpenSMTPD 7.3.0 portable,
so you're not "affected" by this release: releases announced here are a
port of OpenSMTPD for other systems.
Gilles
June 17, 2023 6:21 PM, latin...@vcn.bc.ca wrote:
> Hello
>
> Please excuse m
thanks \o/
June 17, 2023 9:50 AM, "Omar Polo" wrote:
> OpenSMTPD 7.3.0p0 has just been released.
>
> OpenSMTPD is a FREE implementation of the SMTP protocol with some common
> extensions. It allows ordinary machines to exchange e-mails with systems
> speaking the SMTP protocol. It implements a
June 15, 2023 7:28 AM, "Omar Polo" wrote:
> Hello,
>
> just a small notice: the rspamd filter[0] got an update. It would
> quit after a login attempt with a "|" in the user name bringing down
> smtpd too along the way. The OpenBSD package was just updated (both
> -stable and -current) so a new
table tweaks, I've talked with Gilles and we
> both agree it's finally time for a release.
>
> I intend to release OpenSMTPD 7.3.0p0 in the next few weeks, around
> mid June, so I would appreciate if you could give the rc1 a try and
> confirm that it works as expected. Yo
May 18, 2023 4:45 PM, "Pēteris Caune" wrote:
> Hello,
>
Hello,
> Is it possible to configure OpenSMTPD in some way so that it would grab a
> specific header from an
> email message, and use it in the MAIL FROM field?
>
Nope, not doable but that's because DATA which contains the headers is
January 11, 2023 1:05 PM, "Wael Karram" wrote:
> Hello,
>
Hello,
> I tried to look it up online and went also through the mailing list but
> couldn't
> find what I needed, hence why I'm asking here:
>
> I am trying to setup a relay on an OpenSMTPd server which should only accept
> mail from
January 10, 2023 2:29 PM, "Илья Коскин" wrote:
> So, if I get you right, I can use expand-only for both "local" and
> "external", but how can the delivery method be specified?
>
> For example, if i has this in alias table:
> alice = foo
> bob = b...@example.com
>
> Then, I must have the user
to force recipients to be specified
in aliases
or forward file regardless of what they resolve to, and you use forward-only if
they must
resolve to an external address.
Gilles
January 10, 2023 9:00 AM, "Илья Коскин" wrote:
> Hello misc! I'm sorry for bothering you.
> I'
June 24, 2022 6:33 AM, "Demi Marie Obenour" wrote:
>
> Do you by any chance have the golang code you are using anywhere?
>
unsure I understand the question:
if you're meaning the SMTP golang code, I don't have any as I use OpenSMTPD.
if you mean other unrelated Golang, it's all on my github
June 23, 2022 9:02 PM, "Simon Harrison" wrote:
> On Thu, 23 Jun 2022 14:54:36 -0400
> Demi Marie Obenour wrote:
>
>> Is nooSMTPD available anywhere?
>
> That's weird. I'm sure it used to be on Gilles github:
>
> https://github.com/poolpOrg
>
> S
ttleneck
for volume ranging from hundreds of thousands to millions of enqueues.
I'm very biased towards "this is a useless feature" but I might very well be
wrong and you should not take my word for it, the diff to support pipelining
is quite simple and you should really test it if you think it may benefit.
Gilles
May 3, 2022 12:14 PM, "Demi Marie Obenour" wrote:
> Why does OpenSMTPD not support pipelining? Was it just never
> implemented, or is it a spam prevention feature?
>
There were multiple reasons but it most generally boiled down to:
It's not worth the effort.
Adding support for pipelining
April 16, 2022 2:50 AM, "Beau Ford" wrote:
> Gilles,
>
> Thank you for the time and energy you have spent on this. I appreciate it.
>
You're welcome :-)
> On Fri, 15 Apr 2022, gil...@poolp.org wrote:
>
>> Sorry but on a second thought, this is wrong for se
Sorry but on a second thought, this is wrong for several reasons.
The main one is that aliases transforms recipient addresses BEFORE they are
matched
to a local user, so imagine you have something like:
root: gilles
@: gilles
If I send mail to e...@poolp.org and there's a local user
Forget about the whole fallback idea, it can't work because an envelope can only
successfully match a single rule for _very_ good reasons that are not related to
the implementation itself but to how SMTP works more generally. The ruleset does
a first-match evaluation and once it found a rule that
I'm not active these days, but waking up because this thread is getting out of
hands :-)
Reponses inlined:
April 14, 2022 7:20 AM, "Beau Ford" wrote:
> On Mon, 11 Apr 2022, Reio Remma wrote:
>
>>> Am I misremembering or is that a possibility - to implement the '@' >>
>>> catchall directly
October 3, 2021 8:18 PM, "Constantine A. Murenin" wrote:
> Hello misc@OpenSMTPD,
>
Hello,
> Not too sure if https://github.com/OpenSMTPD/OpenSMTPD/issues/1145 is
> a place to file this or not, or whether mailing lists are preferred.
>
Mailing list is preferred :-)
> I'm looking into
DDRNAME|K_MAILADDRMAP|K_RELAYHOST|
>> + K_STRING|K_REGEX,
>> table_db_config,
>> NULL,
>> NULL,
>
> Thank you gilles. I tried the patch but unfortunately the behaviour is
> exactly the same as before.
>
> $ makemap -U myregex.db
> .*
>
> Th
> On 14 Jun 2021, at 19:20, François RONVAUX wrote:
>
> Thanks for the reply.
> I will have a look at smtpctl encrypt...
>
>
> According to this ressource (section "Credentials tables"):
> https://man.openbsd.org/OpenBSD-6.9/table.5
> --
>
June 14, 2021 9:19 AM, "François RONVAUX" wrote:
> Hello,
>
> I have a mail server "mx1" with this listening section :
> ---
> listen on egress inet4 \
> tls-require \
> auth
> ---
>
> I have also a server "test"
Hello,
A maintenance is in progress on the mailing list server, there may be minor
delays today
Gilles
Hellow,
There has been a hostile takeover of the freenode IRC network.
The new IRC channel for the project is #OpenSMTPD @ irc.libera.chat
Cheers,
Gilles
Hellow,
The mailing list was temporarily broken and refusing messages due to a bug in a
diff being tested.
Sorry for the inconvenience, things should be back to normal.
Gilles
OpenSMTPD 6.8.0p1 has just been released.
OpenSMTPD is a FREE implementation of the SMTP protocol with some common
extensions. It allows ordinary machines to exchange e-mails with systems
speaking the SMTP protocol. It implements a fairly large part of RFC5321
and can already cover a large range
from the 6.8.0p1-rc1 tag so that if you
test it, you're
also helping me prepare the next release.
Cheers,
Gilles
PS: if you want to sponsor a bit this dev too, I'd appreciate it ;-)
October 19, 2020 9:23 AM, "Sean Kamath" wrote:
> Hi all.
>
> Comcast is saying I’m throttled
> (http://postmaster.comcast.net/smtp-error-codes.php#RL01).
>
> About the only thing I can think of to do is try more often (“If the
> rate-limit is impacting your
> ability to deliver email,
October 23, 2020 6:03 PM, "Demi M. Obenour" wrote:
> Would it be reasonable to allow the admin to configure a list of
> directories MDAs may reside in? I would like to only allow custom MDAs
> (from ~/.forward files) to be run in if they are in /etc/mail/mdas
> or ~/.config/mail/mdas.
>
I'm
s, it becomes
possible to provoke a DoS by preventing deliveries from happening in a
relatively fair distribution. i.e: I could flood myself so that mda is
saturated with mail deliveries to gilles@ which will then cause parent
to call forkmda() exclusively for gilles@ and hit process limits which
will pr
October 23, 2020 9:39 AM, "Sean Kamath" wrote:
>> On Oct 19, 2020, at 00:23, Sean Kamath wrote:
>>
>> However, I can’t find anything in smtpd.conf about changing the interval for
>> retries. Is this
>> currently configurable?
>
> It’s been a bit, but haven’t seen a reply. Possible responses:
October 14, 2020 11:31 PM, "Demi M. Obenour" wrote:
> On 10/14/20 3:18 PM, gil...@poolp.org wrote:
>
>> October 12, 2020 10:06 PM, "Demi M. Obenour" wrote:
>>
>>> I created https://github.com/OpenSMTPD/OpenSMTPD/pull/1087, which
>>> fixes some bugs and avoids spawning shells when it isn’t
October 14, 2020 11:05 PM, "Demi M. Obenour" wrote:
> On 10/14/20 4:01 PM, gil...@poolp.org wrote:
>
>> October 9, 2020 1:29 AM, "Demi M. Obenour" wrote:
>>
>>> I was looking at the EuroBSDCon 2017 presentation on OpenSMTPD, and I
>>> was wondering how it differs from the dedicated
October 9, 2020 1:29 AM, "Demi M. Obenour" wrote:
> I was looking at the EuroBSDCon 2017 presentation on OpenSMTPD, and I
> was wondering how it differs from the dedicated high-volume MTA that
> wound up being written for the ESP. What are the features that are
> needed for high volume, but
make changes out of
smtpd/ subdirectory, or inside smtpd/ subdirectory when it fixes some
build issues on other systems. Any other change should go through the
OpenBSD developers via diffs sent to tech@.
I do look at the bug tracker still but will only handle portable bits
as I no longer commit to OpenBSD.
Gilles
July 25, 2020 2:26 PM, "Éloi Rivard" wrote:
>> In my opinion, table-ldap from extras is doomed as it relies on a lib
>> that
>> is barely maintained and doing LDAP asynchronously is painful.
>
> Are you saying the support for table-ldap may stop in a near future?
>
Nope, the table API has
g LDAP asynchronously is painful. I doubt the
code will go much further than it currently does.
If the table-procexec work I documented on my blog gets pushed to OpenBSD,
then it will ease the writing of a table-ldap with a modern library.
Gilles
June 30, 2020 12:25 PM, "Unicorn" wrote:
>> You have two methods to achieve what you want:
>>
>> 1- use a smarter mda, such as `fdm`, which allows you to specify
>> where mails are supposed to be delivrered based on rules. in this
>> case, you would simply have a rule that recipient address
fdm`, which allows you to specify where mails are
supposed to be delivrered based on rules. in this case, you would simply have
a rule that recipient address blog@ should land in .Blog
2- alias blog to admin+blog instead of admin, this way when smtpd extracts email
extension, it will check if a .blog folder exists and deliver there if exists
but this is more limited that a real classification.
Gilles
I'm going to investigate this, I don't recall anything change in there but
there's been tons of portable specific cleanup so it might just have introduced
a regression.
Gilles
June 26, 2020 8:33 PM, "Reio Remma" wrote:
> On 26.06.2020 18:03, Harald Dunkel wrote:
&
On my phone but I'll show you tomorrow if no one answers before, this is trivialGillesOn Jun 5, 2020 18:28, David Favor wrote:I've been wrestling with this for days with no progress.
Can someone drop me a v6.6.4 config to do something similar to the following.
da...@davidfavor.com -
I've done some maintenance on all mail servers this night,
it's going to be a bit shaky today
June 4, 2020 7:01 AM, ml+opensmtpd_m...@esmtp.org wrote:
> Happened again for me. Anyone else?
this is due to a short-coming with how inflight envelopes are handled:
when a mail is passed from scheduler to mta, it is marked as "inflight" and
can't be removed until it comes back to scheduler.
this is usually not a big deal because an envelope is marked inflight only
a few seconds
May 28, 2020 10:51 AM, drav...@dravionsoftware.com wrote:
> Hi,
>
Hi,
> I want to introduce myself to the list ;d
>
Welcome
> By the way, is there anybody out there, tried to make OpenSMTPD work on
> Cygwin/Windows?
>
> I was able to built OpenSMTPD under Windows Subsystem for Windows
May 27, 2020 2:27 AM, "Edgar Pettijohn" wrote:
>
> [...]
>
> Sweet. Looking at
> https://github.com/poolpOrg/go-opensmtpd/blob/master/table/table.go
> seems like it will be pretty simple to write some nice tables.
>
yes, I have also written a py-opensmtpd interface to table API ...
... and
operations of table API. A
sample table-example.go is available here to see how a backend looks like:
https://gist.github.com/poolpOrg/b3b97a65791a11a49f5e76ea51331ae4
If people are willing to help implement some backends, hit me up
Cheers,
Gilles
eason=quit
With this split, human log vs reporting api for tools, tomorrow we can decide
in the sample above to rename "message" into "msg" knowing that human readers
will not be affected and that scripts will not break as long as they use that
reporting API.
Hope it clarifies a bit,
Gilles
Hello,
Two bugs were spotted by package maintainers right after the 6.7.0p1 release:
a- a packaging issue causing asr.h to be installed on the host system
b- a possible crash when the MTA establishes an IPv6 connection
I have rolled a minor release with the two bug fixes applied.
don't have much experience with prometheus,
so if some of you are prometheus users and want to contribute let me know :-)
Gilles
OpenSMTPD 6.7.0p1 has just been released.
OpenSMTPD is a FREE implementation of the SMTP protocol with some common
extensions. It allows ordinary machines to exchange e-mails with systems
speaking the SMTP protocol. It implements a fairly large part of RFC5321
and can already cover a large range
Here is fine yes
May 19, 2020 3:46 AM, po...@protonmail.com (mailto:po...@protonmail.com) wrote:
OpenSMTPd 6.7.0
Based upon Filters(7) I have written a proof-of-concept filter which is
functioning properly
I have several questions about the details of the API.
Is this the most appropriate
ion methods relying on challenges.
OpenSMTPD supports PLAIN AUTH, what it doesn't support is authentication
outside of a TLS channel.
So yes, you can use OpenSMTPD with plain authentication BUT you can't use
authentication if you do
not setup TLS first.
Gilles
April 5, 2020 2:47 AM, "grmat" wrote:
> Hi there,
>
Hello,
> I'd like to setup GNU Mailman with OpenSMTPD. In #1040[1], poolpOrg told
> me command processing is to be done with a .forward file instead of
> aliases:
>
>> I think aliases should not support command processing at all as
February 26, 2020 8:30 AM, gil...@poolp.org wrote:
> February 24, 2020 9:08 PM, gil...@poolp.org wrote:
>
>> February 24, 2020 6:54 PM, ml+opensmtpd_m...@esmtp.org wrote:
>>
>>> On Mon, Feb 24, 2020, Peter J. Philipp wrote:
>>
>> I got another "bouncing messages from misc@opensmtpd.org"
m investigating but I suspect it is an issue with mlmmj,
> I get the same bounces ... and I'm local.
>
I can confirm it is an issue with mlmmj, there's no failed SMTP attempt
for any of you who reported getting this message.
Gilles
such a failed delivery (I asked for more info the previous
> time it happened but so far nobody replied) so together with this
> report it seems the problem might be on the server side?
I'm investigating but I suspect it is an issue with mlmmj,
I get the same bounces ... and I'm local.
Gilles
Hello,
I have just released the minor version 6.6.3p1 of OpenSMTPD.
Following the advisory from Qualys late January, I have discussed various
mitigation on my blog:
https://poolp.org/posts/2020-01-30/opensmtpd-advisory-dissected/
Several were implemented in OpenBSD -current and this new
mail.local needs to be updated too
February 3, 2020 6:11 PM, "Scott Vanderbilt" wrote:
> On 2/3/2020 8:11 AM, Gilles Chehade wrote:
>
>> On Mon, Feb 03, 2020 at 06:37:38AM -0800, Scott Vanderbilt wrote:
>>> I'm starting to get several log entries for several er
On Mon, Feb 03, 2020 at 06:37:38AM -0800, Scott Vanderbilt wrote:
> I'm starting to get several log entries for several errors of type:
>
> 553ORCPT address syntax error
>
> The error is intermittent since the server is able to process other incoming
> mails without error. For instance, I just
Hello,
I have written a detailed write-up about the recent event:
https://poolp.org/posts/2020-01-30/opensmtpd-advisory-dissected/
Hope it clarifies what happened and what we intend to do to avoid it in the
future.
Gilles
January 29, 2020 12:19 PM, "Andreas Broecking" wrote:
> Hi all,
>
> first of all, thanks Gilles for the heads-up and a fix on short notice.
>
> For people like me who relay on the portable version and for systems which
> relay on built packages
> as they l
Hello misc@,
Qualys has found a critical vulnerability leading to a possible privilege
escalation.
It is very important that you upgrade your setups AS SOON AS POSSIBLE.
We'll provide more details when the advisory will be out and I'll take time to
write
about how this bug was made possible,
January 27, 2020 8:00 PM, "Tassilo Philipp" wrote:
> Ok, I have a better idea now...
>
>>> a- an envelope is created for each RCPT TO in a transaction...
>>> b- ... and additional envelopes may be created by aliases _during_ that
>>> RCPT TO
>>
>> Thanks a ton for those two pointers, I'll
January 27, 2020 11:49 AM, "Tassilo Philipp"
wrote:
> Hello,
>
> I noticed that for most emails I submit through my instance of OpenSMTP,
> there are most of the time
> (but interestingly not always) two envelopes in the queue. However, mail
> delivery works fine, and
> only one copy arrives
January 25, 2020 9:21 PM, "Edgar Pettijohn" wrote:
> On 01/25/20 14:20, gil...@poolp.org wrote:
>
>> January 25, 2020 8:50 PM, "Edgar Pettijohn" wrote:
>>
>>> I haven't seen any mention of this, but for some reason in my limited
>>> "testing" of filters I have
>>> to use \r\n in my responses
January 25, 2020 8:50 PM, "Edgar Pettijohn" wrote:
> I haven't seen any mention of this, but for some reason in my limited
> "testing" of filters I have
> to use \r\n in my responses to smtpd. Is this normal? Doesn't seem to be
> documented and what
> filters I've looked at don't appear to be
The diff reads ok but I wonder why you removed this sentence:
-No decision is ever taken by the report stream.
I think it made it a bit more clear that reporting is informative only.
January 22, 2020 9:53 AM, "Éloi Rivard" wrote:
>> What about RFC 1891? Is there an option to disable use of additional
>> parameters such as ORCPT [1] to ensure compatibility with smtp tools that
>> does
>> not support this standard?
>
> Actually I was misunderstanding this. There is no issue
ORCPT is only emitted if peer advertises support for it:
if (s->ext & MTA_EXT_DSN) {
mta_send(s, "RCPT
January 15, 2020 6:03 PM, "Éloi Rivard" wrote:
> Hi,
>
> I would like to put a OpenSMTPD server in front of a sourcehut lists
> installation [1] (that is, a mailing list system for sourcehut).
> OpenSMTPD and sourcehut communicate through a lmtp unix socket. Here is
> my configuration (without
January 8, 2020 4:11 PM, "Mathieu Roy"
wrote:
> Hi there,
>
Hi,
> I'd be interested to replace my current exim setup (DKIM, SPF, greylisting,
> bogofilter,
> spamassassin, pyzor, etc) by opensmtpd.
>
> I am using exim since decades (and am satisfied) now but opensmtpd setup
> seems more
for the record, solved off-list on IRC:
permission on directories within the queue had been altered.
January 6, 2020 2:19 AM, "jrmu" wrote:
> Greetings,
>
> I am running OpenBSD 6.6 GENERIC#3 amd64 and getting an
> inexplicable 421 4.3.0 Temporary Error when using
> sendmail with opensmtpd.
January 4, 2020 12:25 AM, "Antonino Sidoti" wrote:
> Hello,
>
Hello,
> I have some basic questions about filters?
>
> What do we need to negate the rdns for the following command?
>
> filter f01 phase connect match !rdns disconnect "550 missing rDNS”
>
I'm unsure I understand this
??/* Recent system/libressl implementation; no need for explicit stir */
>
with this, your build is fixed ?
I've been fixing the .c part of openbsd-compat but haven't worked on the
.h part yet, will have look at it
--
Gilles Chehade @poolp
're using OpenBSD, it's technically possible but unlikely. You can
check by going through your logs and looking for user "-schallenge". The
bypass only makes sense for setups that expose auth and provide rules to
match auth users.
If you have questions, you can follow up to this mail,
Cheers,
e "real world" to exploit
> this to relay arbitrary messages (e.g. spam)?
>
Yes it would have been most definitely possible now if you have yourself
relayed spam, I'll tell you that it's very unlikely this was used.
--
Gilles Chehade
1 - 100 of 859 matches
Mail list logo