Re: opensuse repo for working current stable/experimental postifx?

2012-09-29 Thread j debert
On 09/27/2012 12:17 PM, Robert Schetterer wrote:
 
 looks like 2.8.12 ist latest on
 http://software.opensuse.org
 

Thanks but it looks like it's not available for me.

jd
-- 



opensuse repo for working current stable/experimental postifx?

2012-09-27 Thread j debert
Searching for opensuse builds of the latest/current stable and
experimental releases of postfix. No luck. Seems as if everyone and
his dog has some postfix project. All of them seem to be unmaintained,
abandoned, obsoleted, broken, incomplete or not current.

Does anyone know where there is a valid repository of working current
stable and/or experimental versions for opensuse? One that is kept
current and up to date?

Thanks,
jd
-- 



Re: Transport table gone ?

2010-03-08 Thread j debert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Noel Jones さんは書きました:
 On 3/6/2010 8:29 AM, Xavier HUMBERT wrote:
 Hello, I make rather heavy use of transport_maps as explained in
 http://www.postfix.org/postconf.5.html#transport_maps  and in the
 transport(5) section of the man pages.

 Today I upgraded my dozen of servers to Postix 2.7 under FreeBSD 7.3,
 and got the waring below :

  Note: the following files or directories still exist but are
  no longer part of Postfix:

   /usr/local/etc/postfix/transport

 Nevertheless, I carefully read the 2.7 Release announcment, there's no
 mention of such a suppression.

 Does it mean that I *must* use another routing mechanism ?

 Thanks,

 
 That's just a note that the sample file is no longer supplied by postfix.
 
 You're still free to use that name, or any other valid filename, for
 your local transport table.
 

Perhaps that could be reworded to make it clear? As it is it does seem
to mean that the transport table file is no longer supported. it is
not ambiguous.


==
jd
Whom the gods wish to destroy they first call promising.
- --

-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.4-svn0 (GNU/Linux)

iD8DBQFLlQq2hpL3F+HeDrIRAor+AKCOJ9Y0P2yP6e6hxZebZFK9OZ933gCeM7r3
+3jiXMteYl2HzOsvw02UGw0=
=osKD
-END PGP SIGNATURE-



Re: suitable webmail

2010-02-01 Thread j debert
it seems that roundcube is popular.

It seems to be most popular among bots as well, according to what my
apache logs say. I don't have roundcube but there are frequent
attempts to get to php scripts down in the roundcube directories. I'd
probably see orders of magnitude more if it weren't for fail2ban. I
wonder what it is that makes it so popular?

-- 
jd
==



Re: suitable webmail

2010-02-01 Thread j debert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

mouss さんは書きました:
 
 you mean things like
   GET /roundcube-0.2//bin/msgimport
   GET /round//bin/msgimport

Not lately.

Most recently, they're looking for version info:
GET /rc/README
GET /webmail/README
GET /roundcube/README
GET /rcube/README
.
.
.
GET /roundcubemail/README
GET /roundcube/CHANGELOG
etc.

and not so recently:
GET /webmail/program/js/list.js
GET /roundcube/program/js/list.js
etc.

Some of the same IPs also probe port 25, connecting then disconnecting
w/o talking to the server. I don't think they like Postfix.

==
jd
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.4-svn0 (GNU/Linux)

iD8DBQFLZ1bChpL3F+HeDrIRAkCAAJ9HG9o4eI04VGV7lZF8Wp1kuN/MiACgg0qB
+W64ICtOaIlcIovhHAre/ds=
=hkCP
-END PGP SIGNATURE-



Re: Backscatter email

2009-10-30 Thread j debert
Matt Richards さんは書きました:
 Hello,
 
 I just want to check up on something ...
 
 I run my own mail servers, using postfix and a few years ago I use to
 get quite a lot of backscatter due to spam messages being sent out with
 forged from addresses.
 
 Today I still run my own mail server but I don't see any of this
 backscatter anymore, not that I'm complaining but I just wondered why?
 

Interesting that you are seeing bounce messages. Unless they are from
your own server.

I haven't seen any in the very recent past. I think the last one I
received was in June, from a qmail server.

The last round of backscatter was from servers bouncing variations of
my addresses altered for the target domains and virtually all were
qmail servers.

Perhaps qmail defaults to accept all mail then bounce have changed
lately and getting listed on rfc-ignorant, etc., has got the mail
admins' attention. I would suppose it sucks a little when outgoing
mail can't be delivered because of being a backscatterer. Spammers are
still trying to send mail to variations of whatever they use as a
From: address but they are being blocked.

-- 
jd



Re: SuSE repository - old postfix ?

2008-12-08 Thread j debert

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Alexander Grüner さんは書きました:
| Hello,
|
| I am installing a new server with SuSE Linux Enterprise SP2 and want to
| use the SuSE mail repository.
|
|
http://download.opensuse.org/repositories/server:/mail/SLE_10/x86_64/?C=M;O=D

|
|
| They offer a postfix24-2.4.5-1.1.x86_64.rpm which seems to be quite old
| from August 2007 and even unsecure (?).
|
|
http://download.opensuse.org/repositories/server:/mail/SLE_10/repodata/repoview/postfix24-0-2.4.5-1.1.html

|
|
| Is there a better rpm source available ? (Yes, I might compile it by
| myself...) Or is this the right release for a productive environment ?
|

There is a SuSE build service for Postfix. I can't check it at the
moment but it sould be in the list of community repositories. It is
usually a little closer to the current stable release than the other
repositories.

I started building Postfix from the latest release source on the main
Postfix site and there have been no dependency problems. Just be sure
to have SuSE's postfix installed so the deps are met and build with
the correct options. The only problem doing it this way is that any
update packages will overwrite your own build, so you must set postfix
as protected in yast/yum/whatever so it will not update. This is
unreliable so be sure to check the list of updates to be done. This
means you can't use auto-update, which is probably not a good idea to
use anyway.

==
~ jd
- --
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.4-svn0 (GNU/Linux)

iD8DBQFJPTSihpL3F+HeDrIRAnIvAJwOt/bLrLKIrHG1hYZeSYGoVIhK+gCdF+y7
SJpSEXEb81/7nSZR0YQgBfI=
=1mvU
-END PGP SIGNATURE-



Re: Finally blocking some spam

2008-10-19 Thread j debert

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Joey さんは書きました:

~  SNIP!

|
| Any suggestions you have to help me reduce the load on the servers,
| and the junk in the mailbox are welcome, and I can assure you I
| will try just about anything as you can see by my blanketed IP
| method which for reference has reduced spam by over 75%, and yes
| blocked a few legit users.
|
| Joey
|
|

I've read more of the messages subsequent to the one I replied to. I
see that you have been pretty frustrated by the problem.

I honestly can't see how you can do better with what you have. So
perhaps it would help to do something different.

Farming out your MX to a MX service with spam filtering will reduce
the load on your servers. It isn't cheap, though. But is it saves you
time and transfers the spam blocking duty to the service. This may be
the best solution as it saves you time, traffic load and aggro.

Fail2ban can be used with a blocklist by adding rules that block IP's
when a blocklist returns a spam result. A dedicated firewall will take
the load off your MX servers.

If the IP is the target and not your domain, which does not seem to be
the case, a VPS or dedicated server set up as your MX will help. In
the case of dedicated servers, it's again not cheap.

If your domain is the target I would be curious as to why. What makes
it so attractive? Or is it a DOS, harrassment, or what? Did someone
offend some spammer somehow? Perhaps the blocking method triggered a
more concentrated effort on their part? Do you block connections by
resetting them or by dropping them? Sending reset only results in more
persistent connection attempts. Dropping connections tends to cause
hosts to give up trying after a short time.

If they are concentrating on you because of your blocking policy, it
may help to let some connections succeed and deliver the known spam to
the bit bucket instead of users. Spammers don't care whether or not
you read their spam--it's the delivery that counts and pays for them.

I suspect that spammers may be concentrating on your domain because
you are blocking so much. If you allow most connections and drop the
spammers using various rules from blocklists, SPF, DKIM and so on, the
number of connections attempts will probably decrease. If you can't
handle the tens of thousands of connections per hour, hire an MX
service for a while until the traffic goes down, which it hopefully will.

I can see no way of totally eliminating spam traffic, except at the
source, with a Special Force. :) It's not going to be possible to 100%
eliminate spam and only spam any other way.

==
~ jd
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.4-svn0 (GNU/Linux)

iD8DBQFI+2XXhpL3F+HeDrIRAtUXAJ9L5KOcCntiI/rc3D3Wi1Ma5bELeQCfepFN
uUMtLz9bDiWmm61xj554m6A=
=WKkY
-END PGP SIGNATURE-