Hi,
>I also posted a question about pypolicyd-spf, so I posted it here, not at
> >the above link. Is this related?
> >
> >My question involves understanding how the whitelist works - hosts seem to
> >be whitelisted even though they're not in my Domain_Whitelist or
> >skip_addresses list in my
From: owner-postfix-us...@postfix.org <> On Behalf Of Matus UHLAR - fantomas
perhaps a but I don't see
On 15.05.22 14:21, Dino Edwards wrote:
So you agree, it should be passing but it's not for some reason.
it was supposed to be a "bug I don't see".
can you install with current policyd-spf
-Original Message-
From: owner-postfix-us...@postfix.org <> On Behalf Of Matus UHLAR - fantomas
>perhaps a but I don't see
So you agree, it should be passing but it's not for some reason.
On 13.05.22 12:40, Dino Edwards wrote:
NOQUEUE: reject: RCPT from
smtp15-ia5-sp1.mta.salesforce.com[13.110.78.238]: 550 5.7.23 :
Recipient address rejected: Message rejected due to: SPF fail - not
authorized. Please see
On 5/13/2022 9:41 AM, Matus UHLAR - fantomas wrote:
perhaps you can post logs? local part of mail address may be censored...
Sure.
NOQUEUE: reject: RCPT from
smtp15-ia5-sp1.mta.salesforce.com[13.110.78.238]: 550 5.7.23 : Recipient
address rejected: Message rejected due to: SPF fail - not
On 12.05.22 21:03, Dino Edwards wrote:
Not sure if this is the right place to post the question concerning
postfix-policyd-spf-python but I can't seem to find any working links for
the openspf project.
Our postfix-policyd-spf-python server recently rejected an e-mail from a
sender
On May 13, 2022 12:14:38 PM UTC, Alex wrote:
>> >> Not sure if this is the right place to post the question concerning
>> >> postfix-policyd-spf-python but I can't seem to find any working links
>> >> for the openspf project.
>> >>
> >> Not sure if this is the right place to post the question concerning
> >> postfix-policyd-spf-python but I can't seem to find any working links
> >> for the openspf project.
> >>
> >
> >You should start here,
> >
> > https://launchp
On May 12, 2022 9:12:44 PM UTC, Michael Orlitzky wrote:
>On Thu, 2022-05-12 at 21:03 +, Dino Edwards wrote:
>> Hi,
>>
>> Not sure if this is the right place to post the question concerning
>> postfix-policyd-spf-python but I can't seem to find any working links
On May 12, 2022 9:03:32 PM UTC, Dino Edwards
wrote:
>Hi,
>
>Not sure if this is the right place to post the question concerning
>postfix-policyd-spf-python but I can't seem to find any working links for the
>openspf project.
>
>Our postfix-policyd-spf-python server r
On Thu, 2022-05-12 at 21:03 +, Dino Edwards wrote:
> Hi,
>
> Not sure if this is the right place to post the question concerning
> postfix-policyd-spf-python but I can't seem to find any working links
> for the openspf project.
>
You should start here,
https://launch
Hi,
Not sure if this is the right place to post the question concerning
postfix-policyd-spf-python but I can't seem to find any working links for the
openspf project.
Our postfix-policyd-spf-python server recently rejected an e-mail from a sender
that was using SPF macros. I tried to find out
On 2021-05-12 21:27, Noel Jones wrote:
Oh, and remove any permit_sasl_authenticated from the entries in
main.cf - assuming that no authenticated users should be using port
25.
and make sure main.cf does not have smtpd_sasl_auth_enable=yes
common mistakes
On 5/12/2021 2:21 PM, Noel Jones wrote:
On 5/12/2021 2:11 PM, David Mehler wrote:
Hello,
Thanks. Here's my master.cf submission entry:
submission inet n - n - - smtpd
-o syslog_name=postfix/submission
-o smtpd_tls_security_level=encrypt
-o
On 5/12/2021 2:11 PM, David Mehler wrote:
Hello,
Thanks. Here's my master.cf submission entry:
submission inet n - n - - smtpd
-o syslog_name=postfix/submission
-o smtpd_tls_security_level=encrypt
-o smtpd_sasl_auth_enable=yes
-o
Hello,
Thanks. Here's my master.cf submission entry:
submission inet n - n - - smtpd
-o syslog_name=postfix/submission
-o smtpd_tls_security_level=encrypt
-o smtpd_sasl_auth_enable=yes
-o smtpd_client_restrictions=permit_sasl_authenticated,reject
-o
On 5/12/2021 12:26 PM, David Mehler wrote:
Hello,
I'm running Postfix 3.6, I just upgraded. I do not know if this issue
occurred because of the upgrade or prior to it as I hadn't sent any
mail through this account lately.
I'm having an issue with spf, error log below, if I comment out check
Hello,
I'm running Postfix 3.6, I just upgraded. I do not know if this issue
occurred because of the upgrade or prior to it as I hadn't sent any
mail through this account lately.
I'm having an issue with spf, error log below, if I comment out check
policy for spf under recipient_restrictions
Postfix with postfix-policyd-spf-perl About 4 or 5 days ago
I started to get error messages from postfix for mails from Amazon.
The log shows
May 6 15:33:12 mail1 postfix/policy-spf[10692]: Policy
action=DEFER_IF_PERMIT SPF-Result=marketplace.amazon.de ...
spf1.amazon.com: Unknown
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hi list
I know it's technically not a postfix issue :-) But maybe someone else
here on this list has the same problem.
I'm using Postfix with postfix-policyd-spf-perl About 4 or 5 days ago
I started to get error messages from postfix for mails from
On Wed, May 6, 2015 09:45, Tobi wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hi list
I know it's technically not a postfix issue :-) But maybe someone else
here on this list has the same problem.
I'm using Postfix with postfix-policyd-spf-perl About 4 or 5 days ago
I started
On Wed, May 6, 2015 10:11, Scott Kitterman wrote:
On Wednesday, May 06, 2015 09:58:57 AM James B. Byrne wrote:
Amazon has screwed up their spf records. A DNS host can have only
ONE spf TXT RR and that must not contain or recursively resolve to
more than TEN tags.
No. That's not it. One
On Wednesday, May 06, 2015 02:12:04 PM Chris Adams wrote:
Once upon a time, Scott Kitterman post...@kitterman.com said:
Great. Feel free to throw RFC 7208 Section 3.4 (Record Size) at them.
The
SHOULD fit in a UDP packet is there for a reason.
I see your RFC and raise you RFC 6891.
On Wed, 06 May 2015 13:59:44 -0400, Scott Kitterman stated:
Great. Feel free to throw RFC 7208 Section 3.4 (Record Size) at them. The
SHOULD fit in a UDP packet is there for a reason.
SHOULD ≠ MUST
--
Jerry
Once upon a time, Scott Kitterman post...@kitterman.com said:
Great. Feel free to throw RFC 7208 Section 3.4 (Record Size) at them. The
SHOULD fit in a UDP packet is there for a reason.
I see your RFC and raise you RFC 6891. [f]it in a UDP packet does not
mean 512 bytes.
--
Chris Adams
On Wednesday, May 06, 2015 05:17:12 PM Tobi wrote:
@Scott
thanks for putting me into the right direction :-)
The answer for spf1.amazon.com TXT is indeed too big for UDP. So the
query was retried in TCP mode.
But the stupid admin (aka myself) forgot that he disabled tcp on the
mailservers
09:45, Tobi wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hi list
I know it's technically not a postfix issue :-) But maybe someone else
here on this list has the same problem.
I'm using Postfix with postfix-policyd-spf-perl About 4 or 5 days ago
I started to get error messages from
Hi folks,
I am running postfix mail gateways on several UNIXes, and they have the
same or similar configurations.
On my NetBSD gateway I get lots of these errors in the mail log:
spawn[18506]: fatal: spawn_comand: execvp
/usr/local/lib/postfix-policyd-spf-perl: No such file or directory
Dirk H. Schulz:
Hi folks,
I am running postfix mail gateways on several UNIXes, and they have the
same or similar configurations.
On my NetBSD gateway I get lots of these errors in the mail log:
spawn[18506]: fatal: spawn_comand: execvp
/usr/local/lib/postfix-policyd-spf-perl
/lib/postfix-policyd-spf-perl: No such file or directory
You have a bad pathname in the first line of the script file,
You are right. I had to adjust the perl path.
Thanks a lot!
Dirk
On 21-Aug-2008, at 11:26, mouss wrote:
Erm... at least that was in postfix22, not sure if it's in 2.5.x
That's the third-party spf patch. It's still available in the ports.
I don't see it. must be an old ports tree?
# cd /usr/ports/mail/postfix; make config
LuKreme wrote:
On 20-Aug-2008, at 09:42, mouss wrote:
LuKreme wrote:
I installed postfix-policyd-spf (postfix-policyd-spf-1.0.1_2 via
portinstall) and added the following to master.cf and main.cf:
main.cf Added
check_policy_service unix:private/policy
(this is immediately after
Noel Jones wrote:
LuKreme wrote:
On 20-Aug-2008, at 09:42, mouss wrote:
LuKreme wrote:
I installed postfix-policyd-spf (postfix-policyd-spf-1.0.1_2 via
portinstall) and added the following to master.cf and main.cf:
main.cf Added
check_policy_service unix:private/policy
(this is immediately
mouss wrote:
Noel Jones wrote:
LuKreme wrote:
On 20-Aug-2008, at 09:42, mouss wrote:
LuKreme wrote:
I installed postfix-policyd-spf (postfix-policyd-spf-1.0.1_2 via
portinstall) and added the following to master.cf and main.cf:
main.cf Added
check_policy_service unix:private/policy
I installed postfix-policyd-spf (postfix-policyd-spf-1.0.1_2 via
portinstall) and added the following to master.cf and main.cf:
main.cf Added
check_policy_service unix:private/policy
(this is immediately after reject_unauth_destination)
master.cf Added
policy unix - n n
LuKreme wrote:
I installed postfix-policyd-spf (postfix-policyd-spf-1.0.1_2 via
portinstall) and added the following to master.cf and main.cf:
main.cf Added
check_policy_service unix:private/policy
(this is immediately after reject_unauth_destination)
master.cf Added
policy unix
LuKreme wrote:
I installed postfix-policyd-spf (postfix-policyd-spf-1.0.1_2 via
portinstall) and added the following to master.cf and main.cf:
main.cf Added
check_policy_service unix:private/policy
(this is immediately after reject_unauth_destination)
master.cf Added
policy unix
On Wednesday 20 August 2008 11:30, LuKreme wrote:
I installed postfix-policyd-spf (postfix-policyd-spf-1.0.1_2 via
portinstall) and added the following to master.cf and main.cf:
main.cf Added
check_policy_service unix:private/policy
(this is immediately after reject_unauth_destination
On 20-Aug-2008, at 09:42, mouss wrote:
LuKreme wrote:
I installed postfix-policyd-spf (postfix-policyd-spf-1.0.1_2 via
portinstall) and added the following to master.cf and main.cf:
main.cf Added
check_policy_service unix:private/policy
(this is immediately after reject_unauth_destination
39 matches
Mail list logo