On 2012.04.20 06:36, Sam Varshavchik wrote:
> Yes, well, it's really more than just that. I now understand what's
> going on here, and there's a bit more stuff here in play. You can listen
> on multiple IPs just fine. What also needs to be done is also to save
> which IP address each message was re
Mark Constable writes:
> No, this should not happen. Courier should not be doing an SPF check if
this
> is your client, authenticated, with relaying privileges.
The above example was from the message recipients final destination
mailserver.
> Well, I thought what you were talking about is
On 20/04/12 09:20, Sam Varshavchik wrote:
>> eth0 = xx.xx.xx.1 = primarydomain.com = esmtpd.pem
>> eth0:0 = xx.xx.xx.10 = vdomain0.com = esmtpd.pem.xx.xx.xx.10
>> eth0:1 = xx.xx.xx.11 = vdomain1.com = esmtpd.pem.xx.xx.xx.11
>> eth0:2 = xx.xx.xx.12 = vdomain2.com = esmtpd.pem.xx.xx.xx.12
>
> Ther
Mark Constable writes:
eth0 = xx.xx.xx.1 = primarydomain.com = esmtpd.pem
eth0:0 = xx.xx.xx.10 = vdomain0.com = esmtpd.pem.xx.xx.xx.10
eth0:1 = xx.xx.xx.11 = vdomain1.com = esmtpd.pem.xx.xx.xx.11
eth0:2 = xx.xx.xx.12 = vdomain2.com = esmtpd.pem.xx.xx.xx.12
[...]
The above works fine with co
Woops, copy n paste error...
xx.xx.xx.11:smtps inet n - - - - smtpd
-o myhostname=vdomain1.com
-o smtpd_tls_cert_file=/etc/ssl/vdomain0.com.pem
-o smtpd_tls_key_file=/etc/ssl/vdomain0.com.pem
the above was meant to be...
xx.xx.xx.11:smtps inet n - - - - smtpd
-o myhostname=vdomain1.com
-o s
On 19/04/12 21:16, Sam Varshavchik wrote:
>> The "magic" is that there can be MULTIPLE virtual hosts on the same
>> physical server all providing their own masqueraded identities with the
>> sending clients connecting to what they think is their own mailserver
>> and for all intents and purposes, t
Mark Constable writes:
On 19/04/12 14:26, Sam Varshavchik wrote:
>> That postfix config example allowed for MULTIPLE bindings to
>> MULTIPLE IPs with each providing it's own outgoing hostname and
>> SSL certificate.
>
> You're using client certificates to authenticate your outbound SSL
> connect