Re: Spam milters

2013-03-15 Thread Robert Schetterer
Am 14.03.2013 21:47, schrieb The Doctor: I want to avoid perl-ware like amavisd and MailScanner Any recommendations for a milter that would drop high spam? spamass-milter http://savannah.nongnu.org/projects/spamass-milt/ works nice here Best Regards MfG Robert Schetterer -- [*] sys4 AG

Realtime log reporting when postfix delivers mails

2013-03-15 Thread Ram
I have a postfix server sending out mails and we are creating reports by parsing the maillogs using a couple of perl cron scripts (linux machine with mysql ) Now the requirement is of realtime reporting. I tried using rsyslog with a mysql table. But the performance is far too bad. Rsyslog

Re: Realtime log reporting when postfix delivers mails

2013-03-15 Thread Stan Hoeppner
On 3/15/2013 1:59 AM, Ram wrote: I have a postfix server sending out mails and we are creating reports by parsing the maillogs using a couple of perl cron scripts (linux machine with mysql ) Now the requirement is of realtime reporting. I tried using rsyslog with a mysql table. But the

Re: Realtime log reporting when postfix delivers mails

2013-03-15 Thread Robert Schetterer
Am 15.03.2013 07:59, schrieb Ram: I have a postfix server sending out mails and we are creating reports by parsing the maillogs using a couple of perl cron scripts (linux machine with mysql ) Now the requirement is of realtime reporting. I tried using rsyslog with a mysql table. But the

Re: LDA understanding

2013-03-15 Thread Tom Hendrikx
On 03/14/2013 05:07 PM, Kris Deugau wrote: Jerry wrote: Personally, I have no idea why anyone uses procmail. For relatively fine grain sorting of mail upon delivery, I use Dovecot and Sieve. From what I can ascertain, procmail hasn't even been maintained in over a decade. Sieve can't call

Re: a few questions:new to postfix

2013-03-15 Thread Ansgar Wiechers
Please keep this on-list. I'm not doing personal support for free. On 2013-03-14 Littlefield, Tyler wrote: On 3/14/2013 2:51 AM, Ansgar Wiechers wrote: On 2013-03-13 Littlefield, Tyler wrote: I'd also like to be able to use procmail on these. Procmail is designed for local delivery. It looks

smtp_tls_security_level = may combined wit smtp_tls_policy_maps.

2013-03-15 Thread Robert Schetterer
Hi, if i use smtp_tls_security_level = may is smtp_tls_policy_maps honored ? background , i want all outgoing mail encrypt if possible with fallback to plain ( this should be may ) but to special domains in smtp_tls_policy_maps i want them always encrypt, with no fallback to plain ( mail

Re: smtp_tls_security_level = may combined wit smtp_tls_policy_maps.

2013-03-15 Thread Robert Schetterer
Am 15.03.2013 10:34, schrieb Robert Schetterer: Hi, if i use smtp_tls_security_level = may is smtp_tls_policy_maps honored ? background , i want all outgoing mail encrypt if possible with fallback to plain ( this should be may ) but to special domains in smtp_tls_policy_maps

Re: LDA understanding

2013-03-15 Thread James Griffin
[- Thu 14.Mar'13 at 12:07:14 -0400 Kris Deugau :-] Jerry wrote: Personally, I have no idea why anyone uses procmail. For relatively fine grain sorting of mail upon delivery, I use Dovecot and Sieve. From what I can ascertain, procmail hasn't even been maintained in over a

Re: LDA understanding

2013-03-15 Thread Jerry
On Fri, 15 Mar 2013 11:27:59 + James Griffin articulated: [- Thu 14.Mar'13 at 12:07:14 -0400 Kris Deugau :-] Jerry wrote: Personally, I have no idea why anyone uses procmail. For relatively fine grain sorting of mail upon delivery, I use Dovecot and Sieve. From

Re: Spam milters

2013-03-15 Thread Benny Pedersen
The Doctor skrev den 2013-03-14 21:47: I want to avoid perl-ware like amavisd and MailScanner Any recommendations for a milter that would drop high spam? clamav-milter with 3dr party signatures http://www.sanesecurity.com/

Re: smtp_tls_security_level = may combined wit smtp_tls_policy_maps.

2013-03-15 Thread Wietse Venema
Robert Schetterer: Hi, if i use smtp_tls_security_level = may is smtp_tls_policy_maps honored ? As a general rule, per-destination SMTP/TLS policy lookup results override main.cf (and master.cf) settings. You enable smtp_tls_policy_maps lookups by specifying a non-empty value (there

Re: smtp_tls_security_level = may combined wit smtp_tls_policy_maps.

2013-03-15 Thread Robert Schetterer
Am 15.03.2013 13:11, schrieb Wietse Venema: Robert Schetterer: Hi, if i use smtp_tls_security_level = may is smtp_tls_policy_maps honored ? As a general rule, per-destination SMTP/TLS policy lookup results override main.cf (and master.cf) settings. You enable smtp_tls_policy_maps

Re: smtp_tls_security_level = may combined wit smtp_tls_policy_maps.

2013-03-15 Thread Wietse Venema
Robert Schetterer: Am 15.03.2013 13:11, schrieb Wietse Venema: Robert Schetterer: Hi, if i use smtp_tls_security_level = may is smtp_tls_policy_maps honored ? As a general rule, per-destination SMTP/TLS policy lookup results override main.cf (and master.cf) settings.

Re: smtp_tls_security_level = may combined wit smtp_tls_policy_maps

2013-03-15 Thread JL Hill
I have a very similar issue, although my goal is not to negotiate TLS with specific domains. I have: main.cf smtp_tls_security_level = may smtp_tls_policy_maps = hash:/etc/postfix/tls_policy /etc/postfix/tls_policy example.com none .example.com none From the documentation I

Re: smtp_tls_security_level = may combined wit smtp_tls_policy_maps.

2013-03-15 Thread Robert Schetterer
Am 15.03.2013 15:06, schrieb Wietse Venema: Robert Schetterer: Am 15.03.2013 13:11, schrieb Wietse Venema: Robert Schetterer: Hi, if i use smtp_tls_security_level = may is smtp_tls_policy_maps honored ? As a general rule, per-destination SMTP/TLS policy lookup results override

Re: smtp_tls_security_level = may combined wit smtp_tls_policy_maps

2013-03-15 Thread Viktor Dukhovni
On Fri, Mar 15, 2013 at 10:09:17AM -0400, JL Hill wrote: /etc/postfix/tls_policy example.com none .example.com none From the documentation I read, I thought postfix would not try negotiating TLS with the example.com mail server, but it does. (I posted this question

Re: smtp_tls_security_level = may combined wit smtp_tls_policy_maps

2013-03-15 Thread JL Hill
Thank you for your response. I assume I have something wrong, or I misunderstood the documentation. I have tested sending mail to example.com. A dig example.com MX gives: example.com. 2546 IN MX 10 smtp1.example.com. example.com. 2546 IN MX 20 smtp2.example.com. example.com. 2546 IN MX 30

Re: smtp_tls_security_level = may combined wit smtp_tls_policy_maps

2013-03-15 Thread Viktor Dukhovni
On Fri, Mar 15, 2013 at 04:09:47PM -0400, JL Hill wrote: Thank you for your response. I assume I have something wrong, or I misunderstood the documentation. I have tested sending mail to example.com. A dig example.com MX gives: example.com. 2546 IN MX 10 smtp1.example.com. example.com.

Re: smtp_tls_security_level = may combined wit smtp_tls_policy_maps

2013-03-15 Thread JL Hill
I feel more confused. I had originally tested example.com none and it failed. I searched the documentation, and found .example.com to use for subdomains, so I thought that would fit my case as the negotiation is with smtp2.example.com, even though I am emailing john@example.com When I

Re: smtp_tls_security_level = may combined wit smtp_tls_policy_maps

2013-03-15 Thread Viktor Dukhovni
On Fri, Mar 15, 2013 at 05:19:30PM -0400, JL Hill wrote: I feel more confused. I had originally tested example.com none and it failed. I searched the documentation, and found .example.com to use for subdomains, so I thought that would fit my case as the negotiation is with

Re: smtp_tls_security_level = may combined wit smtp_tls_policy_maps

2013-03-15 Thread JL Hill
My apologies, I grabbed the wrong snippet of log file (same host, different server). Here is the entire connection log (I changed only the domain name and xxx'd the ip address): Mar 3 06:36:10 host postfix/smtp[4]: initializing the client-side TLS engine Mar 3 06:36:11 host

Re: Support for MDB in postfix 2.10?

2013-03-15 Thread Wietse Venema
://www.freebsd.org/cgi/query-pr.cgi?pr=174007 has been closed. I have updated the Postfix patch for lmdb databases. This is now included in snapshot 20130315. However, this code has several unexpected limitations. I documented the ones that I discovered today in LMDB_README. Because of the limitations

Re: smtp_tls_security_level = may combined wit smtp_tls_policy_maps

2013-03-15 Thread Viktor Dukhovni
On Fri, Mar 15, 2013 at 07:20:24PM -0400, JL Hill wrote: My apologies, I grabbed the wrong snippet of log file (same host, different server). Here is the entire connection log (I changed only the domain name and xxx'd the ip address): No, don't apologize, in fact you grabbed exactly the right