.
Thanks very much,
best regards,
Martin,
sudo nano /etc/smtpd/smtpd.conf
table aliases file:/etc/smtpd/aliases
table creds "/etc/smtpd/creds"
pki kk.fritz.box certificate "/etc/smtpd/ec_smtpd.crt"
pki kk.fritz.box key "/etc/smtpd/ec_smtpd.key"
ciphers
Hello list,
Undefined problem with mail infinite looping if I send messages from mail
server's localhost to any domains outside.
If I sent mail from mail server itself (from localhost) to aliased
addresses and virtuals on the same mail's server domain, all the
messages delivered fine even sent
ion "virtual-users"
match tag DKIM_OUT for any action "outbound"
match auth from any for any action "outbound"
Martin
> > On 10/03/2020 15:18, Martin wrote:
> >
> > > Hello list,
> > > Undefined problem with mail infinite looping if I s
0.0.1:1030
match from local for any action "dkim-sign"
match tag DKIM_OUT for any action "outbound"
Martin
‐‐‐ Original Message ‐‐‐
On Tuesday, March 10, 2020 1:46 PM, Reio Remma wrote:
> Try running 'smt
ny action "dkim-sign"
Martin
‐‐‐ Original Message ‐‐‐
On Tuesday, March 10, 2020 6:13 PM, Martin wrote:
> Finally fixed smtpd looping behavior.
>
> /etc/dkimproxy_out.conf points to message signing keys which have
> insufficient permissions to read.
>
> Affected
Am Tue, 7 Jan 2014 19:27:13 +0100
schrieb Gilles Chehade gil...@poolp.org:
On Tue, Jan 07, 2014 at 07:19:10PM +0100, Martin Kropfinger wrote:
Care to share your ifconfig output ?
This is the ifconfig output from within the jail. The host holds
five IPs on one interface distributing them
Am Tue, 7 Jan 2014 19:09:53 +
schrieb James Polera pol...@mubsd.org:
On Tue, Jan 07, 2014 at 08:03:35PM +0100, Martin Kropfinger wrote:
Is security.jail.allow_raw_sockets and/or
security.jail.sysvipc_allowed set to 0?
Yes, both are set to 0. But Using 0.0.0.0 instead of localhost
there is no active
sendmail but OpenSMTPd.
Do I have to set there something special? I know this is a
procmail-specific question, but as beeing related to OpenSMTPd I asked
it here. Sorry if this bothers you.
Thanks Martin
--
You received this mail because you are subscribed to misc@opensmtpd.org
spamassassin in conjunction with OpenSMTPd and
dovecot without the use of Amavis?
Thank you!
Martin
--
You received this mail because you are subscribed to misc@opensmtpd.org
To unsubscribe, send a mail to: misc+unsubscr...@opensmtpd.org
Am Fri, 10 Jan 2014 22:51:37 +0100
schrieb Michiel van Es m...@protegam.nl:
One simple and flexible way is to use the MDA procmail and forward
all mail for every user or per user to procmail and call
spamassassin/clamav from the procmail config.
I also create something using clamsmtpd and
Am Sat, 11 Jan 2014 09:54:47 +0100
schrieb Olaf Mersmann ol...@p-value.net:
Hi Martin,
I don't run that setup anymore and instead have each user (I have no
virtual users) use procmail or maildrop to hook up spamassasin. If I
remember correctly it was something along the lines
-device. Cause OpenSMTPd is an SMTP-server (you can use it for
sending and receiving mails) you will need an additional IMAP-server
(e.g. dovecot) if you want to access your mails using the imap-protocol.
Greetings
Martin
--
You received this mail because you are subscribed to misc@opensmtpd.org
Am 23.02.2014 15:28, schrieb JiEC- NavrC!til:
I did
listen on vic0 tls certificate vic0 auth hostname my.server.bla
listen on vic0 port 587 tls certificate vic0 auth hostname
my.server.bla
I've done it this way and it's working well (with actual versions):
pki mail.example.com certificate
I have situation in which OpenSMTPD crashes. I don't know if this is due to
misconfiguration or something else.
I really think we need some more configuration samples on how to integrate
with other known MDA's used on the Internet.
Before integrating stuff with Dovecot I wanted to make things
I finally got OpenSMTPD talking with Dovecot. I am using a users.db
file which OpenSMTPD has no problems reading and authenticating
against, but I am getting really tired of Dovecot and its HUGE
configuration mess (IMHO).
So foo sends an email to bar and when OpenSMTPD sends the mail
through to
It was such a pleasure working with and experimenting on OpenSMTPD.
Had it up and running so fast due to the absolutely fantastic and
logical PF-like configuration.
As soon as Dovecot enteren ento the equation pleasure - slowly but
surely - turned into pain and frustration (having been at it for
Actually setting all users in vuser to vmail worked! I had missed a
% sign infront of {dest}
Gonna share my setup once I get my notes validated.
It would be really cool to have LMTP working too :)
2014-04-17 1:30 GMT+02:00 Martin Braun yellowgoldm...@gmail.com:
Okay.. so I finally figured out
I have now (finally) a successful setup in which opensmtpd delivers
mail to dovecot-lda and dovecot handles imap, but I tried to have
opensmtpd deliver the mail directly into the maildir, and NOT to
dovecot, and just have dovecot serve IMAP.
Keeping them separated and using OpenSMTPDs own MDA
In the documentation http://opensmtpd.org/table.5.html it doesn't use
the shell in the passwd file.
The documentation uses the following example:
In a listener context, the credentials are a mapping of username and
encrypted passwords:
user1
Thank you very much for explaining this! :)
2014-04-17 6:48 GMT+02:00 Bryan Vyhmeister br...@bsdjournal.net:
The advantage in dovecot delivering the mail directly is that the indexes are
updated at delivery rather than later scanned when the user checks their
mail. Also, sieve scripts work
In the documentation http://opensmtpd.org/table.5.html it doesn't use
the shell in the passwd file.
table(5) describes the format of file, static and db tables which is
the internal format used by every table we support.
when you are using another table backend, you should read the
IMHO spam should be dealt with only on the client, not on the server.
It is not the task of the server to determine what is spam and what is
not. I know everyone does it, I used to do it too, but it is wrong.
2014-04-26 16:26 GMT+02:00 Stéphane Guedon steph...@22decembre.eu:
Le samedi 26 avril
as fast, much better at recognizing spam, and it
can be run on old or weak hardware without problems.
2014-05-01 5:37 GMT+02:00 Hugo Osvaldo Barrera h...@barrera.io:
On 2014-05-01 03:59, Martin Braun wrote:
IMHO spam should be dealt with only on the client, not on the server.
It is not the task
than on the users machine. If a payload has reached the user you are already
too late to deal with it. \
Yeah.. that's the modern practice now a days alright, but that doesn't
make it right.
On Wed, Apr 30, 2014 at 8:58 PM, Martin Braun yellowgoldm...@gmail.com
wrote:
In theroy that idea isnt
Am 05.06.2014 20:41, schrieb Gilles Chehade:
Actually:
As you can see the spam-sender sends a mail to info@MYDOMAIN.
But info is no valid recepient on my server.
That's not right.
You have the following rule:
accept tagged erstes_eintreffen from any for domain domains
unsubscribe
On 8/16/2023 8:14 AM, William Mimart wrote:
unsubscribe
OpenPGP_0xCB87D5427864E937.asc
Description: OpenPGP public key
OpenPGP_signature
Description: OpenPGP digital signature
Hello.
Ist there any good beginner howto the filter in the add-on package
should work?
Thx.
Martin
smime.p7s
Description: S/MIME Cryptographic Signature
Hi.
Same issue at my side when using this syntax in smtpd.conf. Just change
it to
table email file:/etc/mail/email
then it is working
Martin
Am 15.12.2015 um 03:38 schrieb Scott Vanderbilt:
table senders file:/etc/mail/senders
smime.p7s
Description: S/MIME Cryptographic Signature
(as e.g. self signed)
incoming from amazon tls only from IP X
incoming emails from any tls required
Thx for ideas.
Martin
smime.p7s
Description: S/MIME Cryptographic Signature
Greetings,
smtpd.conf filter question:
I want to check inbound SMTP connections
to verify that the HELO/EHLO name matches
the associated rDNS entry.
I failed and ask for guidance.
I looked at the mail archives and found
some discussion, but it did not apply.
MY FILTER
filter "HELO_FQDN" phase
* username, enum osmtpd_auth status));
I wan't to monitor amount of failed auth attempts and block IP/port
temporarily based on statistics.
Do you consider it a bad or unneeded feature, or would you accept the
feature if I write a patch;
/Martin
patch
> which is up to par I'm willing to add it to my repo.
>
> martijn@
>
> On Tue, 2022-10-18 at 10:34 +0200, Martin Kjær Jørgensen wrote:
>> Hello,
>>
>> I came across your libopensmtpd while developing a relative simple
>> reporting plugin for smtpd. I see t
I didn't implement it.
> It should be relatively straight forward, if you have a patch
> which is up to par I'm willing to add it to my repo.
>
> martijn@
>
> On Tue, 2022-10-18 at 10:34 +0200, Martin Kjær Jørgensen wrote:
>> Hello,
>>
>> I came across your libopensmtpd wh
33 matches
Mail list logo