On 2013-10-27 1:13 PM, Charles Marcus cmar...@media-brokers.com wrote:
Based on Noel's suggestion above I currently have:
# submission_clients_banned
linkedin.com REJECT Intro hijacker not welcome here
rapportive.com REJECT Intro hijacker not welcome here
Just added blackberry.net and
On 2013-10-25 4:51 PM, Noel Jones njo...@megan.vbhcs.org wrote:
Blackberry has done pretty much this same thing for years, and not
too many people have been bent out of shape about it. Or maybe the
different business model of BB convinced folks their email wasn't
being mined. Mostly a moot
Ok, first attempt isn't working properly...
On 2013-10-25 3:21 PM, Noel Jones njo...@megan.vbhcs.org wrote:
# banned_clients
linkedin.com REJECT mail from LinkedIn not welcome here
I have (changed cidr to hash for obvious - after I got the 'bad address
pattern' error on first try with the
On 2013-10-27 1:13 PM, Charles Marcus cmar...@media-brokers.com wrote:
Ok, first attempt isn't working properly...
Sorry - started that email before I fixed the 'bad address pattern' error...
Current hashed version seems to be working...
--
Best regards,
*/Charles/***
On 10/27/2013 10:38 AM, Charles Marcus wrote:
On 2013-10-25 4:51 PM, Noel Jones njo...@megan.vbhcs.org wrote:
Blackberry has done pretty much this same thing for years, and not
too many people have been bent out of shape about it. Or maybe the
different business model of BB convinced folks
On 2013-10-27 3:58 PM, Noel Jones njo...@megan.vbhcs.org wrote:
(disclaimer - no BB users left here, so this is based on past
behavior. They could have changed, but I doubt it.)
Yes, BB would fetch all IMAP messages from the company server, then
push them to the client.
Outbound would
Hello,
I'm really hoping this is either a hoax or I'm seriously
misunderstanding something...
If it is true, how can they legally do this? And more importantly, how
can SASL_AUTH attempts be blocked? Maybe block all SASL attempts from
LinkedIn networks?
Anyway, article here:
Fri, 25 Oct 2013 12:53:08 -0400 skrev Charles Marcus
cmar...@media-brokers.com:
Once you install the Intro app
Well, if the app is not installed, it might solve the problem. Other
than that, I think this is a bit off-topic for Postfix, since it only
applys to Apples hand-held devices.
Cheers,
On 25 Oct 2013 18:54, Charles Marcus cmar...@media-brokers.com wrote:
Hello,
I'm really hoping this is either a hoax or I'm seriously misunderstanding
something...
If it is true, how can they legally do this? And more importantly, how
can SASL_AUTH attempts be blocked? Maybe block all SASL
On 2013-10-25 1:29 PM, Titanus Eramius tita...@aptget.dk wrote:
Well, if the app is not installed, it might solve the problem. Other
than that, I think this is a bit off-topic for Postfix, since it only
applys to Apples hand-held devices.
Whether it is iOS specific or not (apparently it is, at
On 10/25/2013 1:42 PM, Charles Marcus wrote:
On 2013-10-25 1:29 PM, Titanus Eramius tita...@aptget.dk wrote:
Well, if the app is not installed, it might solve the problem. Other
than that, I think this is a bit off-topic for Postfix, since it only
applys to Apples hand-held devices.
Whether
On Sat, Oct 26, 2013, at 06:21 AM, Noel Jones wrote:
1. block all *.linkedin.com clients BEFORE any
permit_sasl_authenticated statement. This will also have the effect
of blocking all incoming linkedin mail. That may be a little too
strict for some folks, or maybe just fine with others.
2.
On Fri, Oct 25, 2013 at 02:21:11PM -0500, Noel Jones wrote:
1. block all *.linkedin.com clients BEFORE any
permit_sasl_authenticated statement. This will also have the effect
of blocking all incoming linkedin mail. That may be a little too
strict for some folks, or maybe just fine with
On 2013.10.25 14:21:11 -0500, Noel Jones wrote:
Apparently it is not a hoax, so the question remains, for those of
us who do not have the enterprise tools to lock down iPhones and
iPads, what is the best/most reliable way to simply block LinkedIn
from being able to successfully connect to
On 2013-10-25 3:41 PM, Viktor Dukhovni postfix-us...@dukhovni.org wrote:
On Fri, Oct 25, 2013 at 02:21:11PM -0500, Noel Jones wrote:
1. block all *.linkedin.com clients BEFORE any
permit_sasl_authenticated statement. This will also have the effect
of blocking all incoming linkedin mail. That
On Fri, Oct 25, 2013 at 04:07:11PM -0400, Charles Marcus wrote:
But should this check go directly on the submission service, ie:
submission inet n - n - - smtpd
-o syslog_name=postfix-587 -o smtpd_tls_security_level=encrypt
-o smtpd_tls_auth_only=yes
On 25 October 2013 14:42, Charles Marcus cmar...@media-brokers.com wrote:
Whether it is iOS specific or not (apparently it is, at least for the time
being, iOS specific), it also applies to the smtp connection to my
*postfix* server, so I disagree that it is OT.
Apparently it is not a hoax,
On 2013-10-25 4:17 PM, Viktor Dukhovni postfix-us...@dukhovni.org wrote:
You've been on this list long enough to know that verbatim restriction
definitions don't belong in master.cf:
master.cf:
submission inet n ... smtpd
-o
On 2013-10-25 4:28 PM, Harald Koch c...@pobox.com wrote:
On 25 October 2013 14:42, Charles Marcus cmar...@media-brokers.com
mailto:cmar...@media-brokers.com wrote:
Whether it is iOS specific or not (apparently it is, at least for
the time being, iOS specific), it also applies to the
On 10/25/2013 3:34 PM, Charles Marcus wrote:
On 2013-10-25 4:28 PM, Harald Koch c...@pobox.com wrote:
On 25 October 2013 14:42, Charles
Marcus cmar...@media-brokers.com
mailto:cmar...@media-brokers.com wrote:
Whether it is iOS specific or not (apparently it is, at least
for the time
On 25 October 2013 16:34, Charles Marcus cmar...@media-brokers.com wrote:
Not according to this (from the second paragraph of the linked article):
Once you install the Intro app, all of your emails, both sent and
received, are transmitted via LinkedIn’s servers. LinkedIn is forcing all
your
21 matches
Mail list logo