Am 14.03.2013 21:47, schrieb The Doctor:
I want to avoid perl-ware like amavisd and MailScanner
Any recommendations for a milter that would drop high spam?
spamass-milter
http://savannah.nongnu.org/projects/spamass-milt/
works nice here
Best Regards
MfG Robert Schetterer
--
[*] sys4 AG
I have a postfix server sending out mails and we are creating reports by
parsing the maillogs using a couple of perl cron scripts
(linux machine with mysql )
Now the requirement is of realtime reporting.
I tried using rsyslog with a mysql table. But the performance is far too
bad. Rsyslog
On 3/15/2013 1:59 AM, Ram wrote:
I have a postfix server sending out mails and we are creating reports by
parsing the maillogs using a couple of perl cron scripts
(linux machine with mysql )
Now the requirement is of realtime reporting.
I tried using rsyslog with a mysql table. But the
Am 15.03.2013 07:59, schrieb Ram:
I have a postfix server sending out mails and we are creating reports by
parsing the maillogs using a couple of perl cron scripts
(linux machine with mysql )
Now the requirement is of realtime reporting.
I tried using rsyslog with a mysql table. But the
On 03/14/2013 05:07 PM, Kris Deugau wrote:
Jerry wrote:
Personally, I have no idea why anyone uses procmail. For relatively
fine grain sorting of mail upon delivery, I use Dovecot and Sieve. From
what I can ascertain, procmail hasn't even been maintained in over a
decade.
Sieve can't call
Please keep this on-list. I'm not doing personal support for free.
On 2013-03-14 Littlefield, Tyler wrote:
On 3/14/2013 2:51 AM, Ansgar Wiechers wrote:
On 2013-03-13 Littlefield, Tyler wrote:
I'd also like to be able to use procmail on these.
Procmail is designed for local delivery. It looks
Hi,
if i use
smtp_tls_security_level = may
is
smtp_tls_policy_maps honored ?
background , i want all outgoing mail encrypt if possible with fallback
to plain ( this should be may )
but to special domains in
smtp_tls_policy_maps
i want them always encrypt, with no fallback to plain ( mail
Am 15.03.2013 10:34, schrieb Robert Schetterer:
Hi,
if i use
smtp_tls_security_level = may
is
smtp_tls_policy_maps honored ?
background , i want all outgoing mail encrypt if possible with fallback
to plain ( this should be may )
but to special domains in
smtp_tls_policy_maps
[- Thu 14.Mar'13 at 12:07:14 -0400 Kris Deugau :-]
Jerry wrote:
Personally, I have no idea why anyone uses procmail. For relatively
fine grain sorting of mail upon delivery, I use Dovecot and Sieve. From
what I can ascertain, procmail hasn't even been maintained in over a
On Fri, 15 Mar 2013 11:27:59 +
James Griffin articulated:
[- Thu 14.Mar'13 at 12:07:14 -0400 Kris Deugau :-]
Jerry wrote:
Personally, I have no idea why anyone uses procmail. For
relatively fine grain sorting of mail upon delivery, I use
Dovecot and Sieve. From
The Doctor skrev den 2013-03-14 21:47:
I want to avoid perl-ware like amavisd and MailScanner
Any recommendations for a milter that would drop high spam?
clamav-milter with 3dr party signatures
http://www.sanesecurity.com/
Robert Schetterer:
Hi,
if i use
smtp_tls_security_level = may
is
smtp_tls_policy_maps honored ?
As a general rule, per-destination SMTP/TLS policy lookup results
override main.cf (and master.cf) settings.
You enable smtp_tls_policy_maps lookups by specifying a non-empty
value (there
Am 15.03.2013 13:11, schrieb Wietse Venema:
Robert Schetterer:
Hi,
if i use
smtp_tls_security_level = may
is
smtp_tls_policy_maps honored ?
As a general rule, per-destination SMTP/TLS policy lookup results
override main.cf (and master.cf) settings.
You enable smtp_tls_policy_maps
Robert Schetterer:
Am 15.03.2013 13:11, schrieb Wietse Venema:
Robert Schetterer:
Hi,
if i use
smtp_tls_security_level = may
is
smtp_tls_policy_maps honored ?
As a general rule, per-destination SMTP/TLS policy lookup results
override main.cf (and master.cf) settings.
I have a very similar issue, although my goal is not to negotiate TLS with
specific domains. I have:
main.cf
smtp_tls_security_level = may
smtp_tls_policy_maps = hash:/etc/postfix/tls_policy
/etc/postfix/tls_policy
example.com none
.example.com none
From the documentation I
Am 15.03.2013 15:06, schrieb Wietse Venema:
Robert Schetterer:
Am 15.03.2013 13:11, schrieb Wietse Venema:
Robert Schetterer:
Hi,
if i use
smtp_tls_security_level = may
is
smtp_tls_policy_maps honored ?
As a general rule, per-destination SMTP/TLS policy lookup results
override
On Fri, Mar 15, 2013 at 10:09:17AM -0400, JL Hill wrote:
/etc/postfix/tls_policy
example.com none
.example.com none
From the documentation I read, I thought postfix would not try negotiating
TLS with the example.com mail server, but it does.
(I posted this question
Thank you for your response. I assume I have something wrong, or I
misunderstood the documentation.
I have tested sending mail to example.com. A dig example.com MX gives:
example.com. 2546 IN MX 10 smtp1.example.com.
example.com. 2546 IN MX 20 smtp2.example.com.
example.com. 2546 IN MX 30
On Fri, Mar 15, 2013 at 04:09:47PM -0400, JL Hill wrote:
Thank you for your response. I assume I have something wrong, or I
misunderstood the documentation.
I have tested sending mail to example.com. A dig example.com MX gives:
example.com. 2546 IN MX 10 smtp1.example.com.
example.com.
I feel more confused. I had originally tested
example.com none
and it failed. I searched the documentation, and found .example.com to use
for subdomains, so I thought that would fit my case as the negotiation is
with smtp2.example.com, even though I am emailing john@example.com
When I
On Fri, Mar 15, 2013 at 05:19:30PM -0400, JL Hill wrote:
I feel more confused. I had originally tested
example.com none
and it failed. I searched the documentation, and found .example.com to use
for subdomains, so I thought that would fit my case as the negotiation is
with
My apologies, I grabbed the wrong snippet of log file (same host, different
server). Here is the entire connection log (I changed only the domain name
and xxx'd the ip address):
Mar 3 06:36:10 host postfix/smtp[4]: initializing the client-side TLS
engine
Mar 3 06:36:11 host
://www.freebsd.org/cgi/query-pr.cgi?pr=174007 has been closed.
I have updated the Postfix patch for lmdb databases. This is now
included in snapshot 20130315.
However, this code has several unexpected limitations. I documented
the ones that I discovered today in LMDB_README. Because of the
limitations
On Fri, Mar 15, 2013 at 07:20:24PM -0400, JL Hill wrote:
My apologies, I grabbed the wrong snippet of log file (same host, different
server). Here is the entire connection log (I changed only the domain name
and xxx'd the ip address):
No, don't apologize, in fact you grabbed exactly the right
24 matches
Mail list logo