On July 8, 2020 11:01:20 AM AKDT, Alexander Dalloz wrote:
>Am 08.07.2020 um 20:28 schrieb Kishore Potnuru:
>> Thank you for the reply.
>>
>> As per our current infrastructure, I can go maximum of the redhat 7.7
>> version. Not more than that. Am I able to install or upgrade to
>dovecot 2.3
>>
Hello,
I have been running my own mail server with Dovecot, Postfix, and Cyrus-SASL
for authentication.
= dovecot22u.x86_64 1:2.2.36.4-1.el7.ius @ius
I am basically trying to tune the system for better performance. The flat files
"/var/mail/justina" etc exhibit locking issues and conflicts
It's generally a good thing to be reminded to upgrade. Regardless of whether or
not a certain release is considered Long Term Service — if there are major
unresolved problems with the platform or supported software that are not fixed
— then it will be necessary and appropriate to upgrade as
On Wednesday, April 21, 2021 2:13:01 AM AKDT Aki Tuomi wrote:
> Hi!
>
> This is unfortunately a bug, see note in
> https://doc.dovecot.org/configuration_manual/authentication/proxies/
>
> "ssl_client_ca_dir or ssl_client_ca_file aren’t currently used for verifying
> the remote certificate,
On Wednesday, April 28, 2021 9:41:17 PM AKDT @lbutlr wrote:
> On 28 Apr 2021, at 11:28, White, Daniel E. (GSFC-770.0)[NICS]
wrote:
> > only be accessed by POP3(s)/IMAP(s
>
> There is no reason to support POP3 on a new mail service. IMAP is suppserior
> in every way, both for the user and for
On Tuesday, May 4, 2021 11:27:28 AM AKDT Dan Egli wrote:
> Aki, That's what I'm saying. The only place pop3 IS listed is in
> doveconf protocols. I'm going to try settiing the ports to 0 and see if
> that does the trick.
>
> And for those who keep mentioning the firewall, understand that I'm
>
Well ain't that rich? To use an allegory of sorts, we're going to have start
using staples rather than paperclips ️ with our email attachments, and one
unified digital signature on the whole message as sent rather than a separate
signature for each enclosure as commonly "done" with PGP,
I have configured postfix so it will deliver mail to virtual mailboxes. For
some reason, the mail is not delivered to the virtual mailboxes unless both
$virtual_alias_domains and $virtual_alias_maps are left undefined: these
directives are apparently for aliasing virtual users "@" virtual
On Sunday, March 21, 2021 12:16:28 PM AKDT María Arrea wrote:
> Hello.
>
> We are running dovecot 2.3.13. Full doveconf -n output below
>
> In 2.3.14 Changelog I found this:
>
> * Remove XZ/LZMA write support. Read support will be removed in future
> release.
> We are using mdbox + XZ/LZMA
I have not yet enabled imapsieve -- so far I have had fairly good luck avoiding
spam simply by using SPF+DKIM+DMARC and enabling basic verification of incoming
mail with opendkim and opendmarc.
Lately I have been reading some books on "fuzzy logic" and "fuzzy sets" with
quite serious
Is this a new zero-day denial-of-service attack or a new CVE being exploited?
Dovecot suddenly started acting really strangely on my system lately. PAM
authentication started failing randomly, so I reconfigured for shadow
authentication instead, which works now, but messages I have received
On Friday, April 9, 2021 5:19:20 AM AKDT PGNet Dev wrote:
> And it's a bad assumption that since the host is dual-stack that all
> services on it will be.
That's right. Email stuff that's supposed to work has to be crippled and
disabled somehow so that it does not actually work as it is supposed
Interesting.
Assuming your "Kali" tools are in fact up to date to test with newer protocols
TLS1.2+, is Dovecot compiled against a recent version of the OpenSSL or GnuTLS
library or whatever it uses to support the newer TLS protocols?
Definitely an outdated cipher issue, on Postfix as well as
I am quite curious about the circumstances of this question. I was not aware
that Dovecot actually offered mail submission service. If Dovecot does offer
such a service, then it will have to relay the submitted mail to the real MTA,
which is very likely not Dovecot. At the moment I have Postfix
Thank you for the pointers. People say RTFM, as if that's rude, but it's good
to know, especially if there is documentation of ongoing development or a "road
map" for future work.
On July 28, 2021 10:51:50 AM AKDT, Antonio Leding wrote:
>Making no assertions\judgements as to the goal or
Interesting. Have you looked at this?
https://serverfault.com/questions/133190/host-wildcard-subdomains-using-postfix
[People have too much "flair" and rep points and I can't participate in those
stackexchange discussions or ask or answer like I used to.]
On October 27, 2021 3:15:01 PM AKDT,
Random bit-flipping due to aurora borealis from recent X1 class solar flares.
Do expect soft errors, hard errors, some temporary and some permanent damage to
computer hardware.
On November 4, 2021 6:41:36 AM AKDT, Joan Moreau wrote:
>
>
>Hi
>
>Anyone can help on those memory leaks since 2.3.17
I think it's only 12 steps. There are people who need to sober up
On July 15, 2021 8:54:16 AM AKDT, Sebastian wrote:
>The thing is, that people must stop expecting "being able to access
>mail whenever you are" without extra steps.
>
>Best solution is to offer a webmail with TOTP or SQRL or
I want better explanations of the maths.
If RSA and DSA algorithms based on standard arithmetic exponentiation modulo
the product of two large primes are "deprecated" -- that means that there have
been or are expected to be major mathematical and algorithmic advances in
factoring large
What's with the "AW: AW: AW:" business? It sounds for all the world like a guy
outbid at the Sotheby's auction or something like that. There's got to be a lot
of artwork online with that fancy lz4 compression algorithm.
On March 16, 2022 2:32:32 AM AKDT, Joachim Lindenberg
wrote:
>What might
So presumably the entire contents of the ssl public and/or private key could be
included verbatim in the configuration file without the "<" input pipeline
redirection symbol.
On February 19, 2022 5:25:15 AM AKST, Bernardo Reino wrote:
>On Sat, 19 Feb 2022, necktwi wrote:
>
>> After adding “<“
The ".top" TLD is popular among Russian spammers, ".ru" is a little too obvious
and honest for what it is, unless that's part of Biden's sanctions, the others
you mention look like vice domains, but looking at GitHub:
* https://github.com/dovecot
There's an "Oy" which is a Finnish
Google's corporate web page, Alphabet, Inc., is on the ".xyz" top level domain.
* https://abc.xyz/
I suppose Sergey Brin is Russian as well, so what have you there?
Perhaps you have inadvertently confused ".xyz" with the ".xxx" TLD. The popular
grade school acronym for "eXamine Your Zipper" is
On February 26, 2022 9:07:12 AM AKST, John Stoffel wrote:
>Dimitri> My Dovecot version: 2.3.18
>Dimitri> My Mariadb version: 10.6.5
>Dimitri> My OS: Ubuntu 20.04
>
>Why aren't you just using the Ubuntu 20.04 packaged version instead?
That's the beauty of free and open source software. We want
Something about this a little bit ominous.
There's a new type of "architecture" unrolling with a certain flavor, and it is
becoming, by and by, irremediably complex. I'm not really sure where the
stopping or turning point is, or perhaps there are other "tools" for memory
leak detection and
That is a test user on a private network. Not publicly accessible at all.
Anyways, I have had the best luck on dovecot and postfix with the unix/linux
utility "pass" to generate fairly long alphanumeric-only passwords as I have
found that any special characters in passwords are ending up
On January 27, 2022 6:17:05 AM AKST, "Daniel Ryšlink"
wrote:
>
>RFC 5322 clearly states that mail messages SHOULD contain a Message ID
>identifier, but if the do contain it, it MUST be globally unique.
>
That's nice polite behavior, all right, but the enforcement of it is another
matter
30, 2022 6:30:44 PM AKST, Sam Kuper wrote:
>On Sun, Jan 30, 2022 at 06:17:49PM -0900, justina colmena ~biz wrote:
>> On January 30, 2022 5:46:53 PM AKST, dove...@ptld.com wrote:
>>> Storing mail in a db... at the end of the day isn't it still just a
>>> file (.db file) o
You'll get better indexing and fast full text search by storing your emails in
a database rather than a flat file, hopefully after decoding any attachments.
Especially for spam scoring, analysis, and classification. Much better
performance deleting or moving specific messages, too.
On January
I see. People make money outsourcing, consulting, and hooking up companies with
the best solutions for email, office collaboration, CRM, etc., etc., which is
great, but I didn't quite realize that look like a paid offering on the table
and this isn't the right list to discuss potential free
In general:
Lots of mail servers out in the wild do not require TLS or even bother to
verifying TLS certificates when connecting to a remote server on port 25.
However, desktop and mobile email *clients* tend to be much stricter about
verifying server certificates when connecting via SSL or
iculty is still saying he gets a
>self-signed cert… but as I showed in my last email after I added Intermediate
>to the certificate, everything was ok.
>
>
>
>So ServerCert, Intermediate, Root in same file should solve this?
>
>
>
>Wayne
>
>From: dovecot On Beha
On February 4, 2022 11:56:53 AM AKST, Lev Serebryakov
wrote:
> After that I've got several DMARC reports about "spam" from my domain. All
> these reports are about my mailing list post.
>
Interesting. That's exactly how DMARC is supposed to work with reporting
enabled. So you've got that
Google, Yahoo and Microsoft, the big providers all use ARC, and have used it
for years. But Wikipedia doesn't have much nice to say about it.
--> allows a receiving service to validate an email when the email's SPF and
DKIM records are rendered invalid by an intermediate server's processing.
Good question. This looks like a unix socket set up for dovecot to provide
authentication services to postfix and anyways postfix would be listening on
TCP port 587 for authenticated mail submission. Normally you do not want to
offer any user authentication or login on port 25, but that is all
On January 24, 2022 1:33:46 PM AKST, John Stoffel wrote:
>steph> 1) How can I says sendmail to use the same passwd file ( with MD5) than
>dovecot ?
>
>Ah... just saw this. And I don't know how to configure sendmail for
>this. I would suggest you look on the sendmail.org site for help.
On January 12, 2022 4:22:00 PM AKST, Joseph Tam wrote:
>
> - perfect forward secrecy: the disclosure of a private
> key will not compromise past traffic. This is probably the
> more compelling reason.
>
As to ECC vs. the "old fashioned" RSA paradigm based on the difficulty
I have no idea what that's all about!
But my dovecot system keeps bogging down & lot of my emails are disappearing
and being eaten alive before I can read them ...
On April 20, 2022 4:01:38 AM AKDT, Marc wrote:
>>
>> Currently I have such special-userdb file
>>
>>
So the file "/var/mail/username" is a "system inbox" for the user, typically a
flat file that will accept new mail no matter what as long as it isn't too
large, which would indicate that the user's mailbox is full.
Some of the early text clients, mutt etc. would move any mail in the
So there's an "honest abe" -- with a "dv" attached the name -- and it's time to
change the locks on the doors -- because apparently a couple of girls at the
bank are working overtime doing loans and repossessions online and something is
being served at a local bar or pub and a SWAT team is
What? No user serviceable parts inside your car? It's a federal felony to raise
the hood for any reason. You've got to see an authorized dealer or a
professional mechanic for every little thing on a used car because cars are
closed source proprietary and it's illegal to circumvent anything etc.
I don't see why not.
Dovecot and Postfix are entirely configurable to connect to and use any
desired authentication mechanism through certain basic interfaces.
The main problem I have experienced with MFA is a continual battle with
extortion, "long cons," and thievery in law -- that the
Guns are banned and there's a night guard with a Big Mag flashlight or a
billy club walking the beat around the bank, kicking a homeless man who
fell asleep on the sidewalk to tell him wake up or your pocket's going be
picked clean by morning, because you've got too much money in your name for
Thank you. I will have to look at "basic configuration" for sieving although I
don't want things crashing on production.
I get too much mail at a publicly available address -- and while SPF+DKIM+DMARC
does cut down on the bulk of obvious spam -- the spam that does get through is
a little bit
You still need in some sense one coherent file system to store and retrieve
the mail messages. Although a load-balance cluster would still be quite
useful for rejecting the bulk of unauthorized connections.
I am sure in many cases a small/medium server can in fact sit and function
quite
Nginx is an excellent suggestion for the purpose. However I do not like
German client certificates. That is far too much "proof" of identification
18/21++ on a public network with nowhere to hide and those of us who are
not German citizens and do not have the advantage of a friendly local
Trojitá, a fast Qt IMAP e-mail client
http://www.trojita.flaska.net/
I also use
http://opendkim.org/
http://www.trusteddomain.org/opendmarc/
as milters on Postfix
Active development, I'm sure they could all use some help, or forks for
alternatives, I don't know, I'm not involved in
These are real people with bank accounts? Get paid? Have money for breakfast
lunch dinner and a roof over their heads?
Just asking because my own bank account stupidly enough requires a phone number
to log in online whether or not I even have an email address.
And the POTS (Plain Old Telephone
Is that a divorce? Or else a little bit better spelling and respect for the
lady is called for? And I don't like criminals serving bogus law papers and
hacking into my mail any more than anyone else does.
On October 10, 2022 6:57:39 AM AKDT, Ian Evans wrote:
>I run a small email server for me
Yeah. You get a better spam score and a better rep for your server if the
hostname you use as an MX record matches the reverse DNS for its IP
address(es) as well and everything is correct as recommended by rfc docs.
If there's outgoing mail it's all going to use the same hostname as the
"ehlo"
/_!_\
The connection to ghettoforge.org is not secure
You are seeing this warning because this site does not support HTTPS. _Learn
more_
[Go back]
[Continue to site]
On August 5, 2022 4:06:46 AM AKDT, Peter wrote:
>For those who have been asking, GhettoForge 9 is now released with dovecot23
On August 5, 2022 3:30:57 PM AKDT, Peter wrote:
>The main site doesn't currently support https but the repositories do, also
>all packages are cryptographically signed and the signing keys are served off
>of a secure server.
>
>The info on the site is public information that doesn't really
On August 14, 2022 9:46:54 AM AKDT, lutz.niede...@gmx.net wrote:
>Yes, you are right. The problems are not of technical nature.
>...
>We do what the customer wants us to do. And yes, they pay pretty well for
>working on weekends.
>...
I'm sure there are more than enough professional mental
*My* inbox gets filled with thousands of emails, more or less commercial
content and trivial notifications from shopping online, and postfix crashes and
will not accept new messages if the file "/var/mail/justina" becomes too large.
Configuring postfix to deliver the mail to "~/Maildir" solved
On Thursday, December 29, 2022 10:17:08 PM AKST Aki Tuomi wrote:
> > On 30/12/2022 05:25 EET James Moe wrote:
> > Permission is still denied.
> > Where do I find information about "status=80/n/a"?
> >
> > I did not include all two of the syslog entries in the previous message:
> >
On Thursday, January 5, 2023 10:53:13 PM AKST Aki Tuomi wrote:
> On January 6, 2023 3:56:39 AM GMT+02:00, Gerben Wierda
wrote:
> >Jan 06 00:50:31 replicator: Panic: data stack: Out of memory when
> >allocating 268435496 bytes Jan 06 00:50:32 replicator: Fatal: master:
> ...
> service replicator
Mails stored as individual files in a "Maildir/" can conceivably be "moved"
within the O/S file system rather than copied, but the default flatfile
Mailbox format does require a copy-and-purge, as far as I know.
/etc/postfix/main.cf:
# DELIVERY TO MAILBOX
#
# The home_mailbox
On Wednesday, December 7, 2022 7:53:43 PM AKST, Henry R wrote:
can dovecot run as a general sasl service for other apps? such as webdav.
Thanks.
For some reason I use cyrus-sasl with postfix, but I can't get it to work
with dovecot. Ideas? Pointers to docs online?
, Robert Schetterer wrote:
Am 08.12.22 um 06:14 schrieb justina colmena ~biz:
On Wednesday, December 7, 2022 7:53:43 PM AKST, Henry R wrote:
can dovecot run as a general sasl service for other apps? such as webdav.
Thanks.
For some reason I use cyrus-sasl with postfix, but I can't get
it to work
https://doc.dovecot.org/configuration_manual/authentication/sql/#password-verification-by-sql-server
Perfect. However on Postfix it is more finicky.
https://www.postfix.org/SASL_README.html#auxprop_sql
Tip
If you must store encrypted passwords, you cannot use the sql auxprop plugin. Instead,
So this should allow postfix to piggyback on top of whatever dovecot auth
is being used.
On Thursday, December 8, 2022 4:49:06 AM AKST, Shawn Heisey wrote:
On 12/7/22 21:53, Henry R wrote:
can dovecot run as a general sasl service for other apps? such as webdav.
I am using dovecot to
Okay. Let's try this. With the snippet you posted from
"/etc/dovecot/conf.d/10-master.conf "
inside the "service auth {...}" section.
This is from my "/etc/postfix/master.cf"
> submission inet n - n - - smtpd
> # -o syslog_name=postfix/submission
>
> -o
a mail. mdbox format retains deleted messages, even if they
result from moving. It's not a queue as such.
With mdbox format you are supposed to run purge periodically in any case.
I am not sure what justina is again rambling about...
Aki
On 30/11/2022 19:34 EET justina colmena ~biz wrote
Sounds like a boss at work. An "admin" doing off-beat SQL-like stuff on
people's email. I'm a little disconcerted. I don't really use these
commands myself or see a good use case for them, or the whole
infrastructure built up on "doveadm" commands.
These are general purpose mailbox utilities.
On Tuesday, November 22, 2022 8:25:19 AM AKST, PGNet Dev wrote:
first, confirm that you can connect/authenticate to Dovecot's
managesieve server without Roundcube in the picture.
e.g., show the output of a successful 'openssl s_client ...'
sieve authentication session
Subject line says it
Something I can't quite place finger on here. Altogether too much Mafia, in the
bulk email business generally, and I know Switzerland borders on Italy ...
This sounds, (albeit vaguely,) altogether too much like the thieves I seem to
have fallen amongst lately. Two stolen trucks, three stolen
On February 24, 2023 10:19:54 AM EST, Timo Sirainen wrote:
> If you want, you can post them publicly here in case someone else wants to
> verify.
Who are you doxxing? What other crimes are you confessing to publicly?
--
https://justina.abeja.colmena.biz/
67 matches
Mail list logo