* Benny Pedersen :
> On 2016-09-20 23:41, Patrick Ben Koetter wrote:
>
> >Please describe what you did.
>
> once this maillist here was not breaking dkim, its seems that it
> still does :(
>
> i think sys4 can make it work :=)
*SIGH* Yes, we can! ;)
Please be patient until we
On 2016-09-22 13:49, Benny Pedersen wrote:
On 2016-09-21 15:03, Ralf Hildebrandt wrote:
The mailman qrunner was only running in fragments and those could not
be killed
using kill. I had to kill -9 it and restart. I hope it's working
again.
Authentication-Results: linode.junc.eu; dmarc=pass
On 2016-09-21 15:03, Ralf Hildebrandt wrote:
The mailman qrunner was only running in fragments and those could not
be killed
using kill. I had to kill -9 it and restart. I hope it's working again.
Authentication-Results: linode.junc.eu; dmarc=pass
header.from=charite.de
On 2016-09-20 23:41, Patrick Ben Koetter wrote:
Please describe what you did.
once this maillist here was not breaking dkim, its seems that it still
does :(
i think sys4 can make it work :=)
add the regex to spamassassin
I have alreday added in this way
cat /etc/mail/spamassassin/SPAM_19Sep2016_Message_ID_1.cf
header SPAM19SepMID1 Message-ID =~ /(fanex-us\.local)\b/i
describe SPAM19SepMID1 Message-ID header matches the above pattern
score SPAM19SepMID1 5
--
cat /etc/motd
>
> i would prefer a working policy_bank MYNETS which bypasses spam checks
>
> $policy_bank{'MYNETS'} = { # mail originating from @mynetworks
> originating => 1, # is true in MYNETS by default, but let's make it
> explicit
> os_fingerprint_method => undef, # don't query p0f for internal
Am 22.09.2016 um 04:51 schrieb Indunil Jayasooriya:
but somehow amavis is ignoring the bypass_header_checks_maps for
$policy_bank{'MYNETS'}
anymore ideas to get things working would be awesome ;)
do you have these lines
$mydomain = 'yourdomain.com