> Use of this "intelligent" behavior of MTA we can handle mail
> transactions more accuracy. This is very simple and efficient way.
We use a similar approach. I wouldn't call it "simple". I wouldn't call
it "\"intelligent\"". It's simply hard work. We combine asn, hostname,
rbl and helo tests, dn
> Anyone remember? Or did that even go into the Wiki?
I attached our mime_acl.cf which includes some mime tests.
- oliver
Tom Kistner schrieb:
> Philip Hazel wrote:
>
>
>>>There appear two variables "mime_anomaly_text" and "mime_anomaly_level".
>>>Did the documentation get lost in the conversi
CPT TO-commands, add
> them to the headers AND beside the "static" ones (X-SMTP-src-IPv4,
> X-SMTP-dst-IPv4, X-SMTP-end)? Is it possible directly from without Exim or
> do I have to work with outside help (script)?
>
> I'm pretty experienced within Exim, but this
> Unfortunately, I can't read any acl_mXX in the Route,
I beg your pardon? From the Exim documentation: "Values can be placed in these
variables by the set modifier in an ACL. They retain their values while a
message is being received, but are reset afterwards. They are also reset by
MAIL
> Could some kind soul that has a working solution post the relevant
> configuration
You can use entries like this one:
# Example, Lists, dvz, Giessen, fh-giessen-friedberg.de
dn: uid=Example,ou=Lists,ou=dvz,ou=Giessen,dc=fh-giessen-friedberg,dc=de
objectClass: top
objectClass: rfc822mailgroup
ui
I get similar results in conjunction with Symantec and Norton anti-virus
tools. Tell your users to disable the email auto-protection of this
tools if they use TLS or SSL. Make sure that SSL is supported on port
465. Also some older build versions of outlook are irreparable broken.
In some cases som
> Tom Kistner <[EMAIL PROTECTED]> wrote:
> >
> > Tony Finch wrote:
> >
> > Repeat after me: SPF breaks forwarding.
> >
> It makes a good whitelisting method to work around some trigger-happy
> RBLs tho :) But that is all it is good for.
And SRS is apt to block collateral spam (bounces).
- olive
> I can change the transport all I like, but spamd still runs as root.
> Should this be the case?
Yes. Thats necessary for binding to port 783.
> Also, what about the autolearn failure? What can do to get autolearn working
> in spamd?
Dimmish. You don't post an error message which is specific e
: [EMAIL PROTECTED]
> Tel: +44 1223 376964Mobile: +44 7811 803377
>
>
>
> _
> This e-mail has been scanned for viruses by MCI's Internet Managed Scanning
> Services - powered by MessageLabs. For
Try this:
# Macro
BAD_ATTACHMENTS =
cmd|com|js|reg|chm|cnf|hta|ins|scf|sct|vbs|vbe|wsc|wsf|wsh|xnk|mad|maf|mag|mar|mas|mat|mav|maw|bat|pif|scr|exe
# MIME-ACL: File extension filtering.
deny message = This message contains a prohibited file extension
(${extract{-1}{.}{${lc:$mime_filename}}})
> I have no idea if malware tries to bypass scanners by hitting their
> limits until they stop scanning, or if there is some new popular, but
> broken, software.
>
It's an old trick called mailbomb. Google for 42.zip.
- oliver
--
## List details at http://www.exim.org/mailman/listinfo/exim-u
> Later, we'd expect a bona fide MTA to offer
> the remaining recipients in a separate transaction, and we'd accept
> those against *their* preferences profile.
This will drop away mail from one shot setups. Not any MTA will do a
second transaction. Also mail from t-online and other huge mail
pr
> While you're revising the docs, should we possibly add a size limit on
> the example spam = conditions?
>
Example:
deny condition = ${if <{$message_size}{300k}{1}{0}}
spam = spamcheck:true
- oliver
--
## List details at http://www.exim.org/mailman/listinfo/exim-users
## Exim detail
> > Quite frankly, it is obvious that many of you do not work for large
> > organizations, and don't even understand that there is another major
> > reason for disclaimers, such as the use of a company standard footer.
At least in germany particularly small organisations with an
insufficient unde
# Main Config
acl_smtp_connect = acl_check_connect
acl_check_connect:
delay = 10s
- oliver
--
## List details at http://www.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://www.exim.org/eximwiki/
> message: failed to expand "${lookup ldap
> {ldap:///?mail?sub?(otherMailbox=smtp\$${quote_ldap:[EMAIL
> PROTECTED]:$domain})}}":
> lookup type "ldap" is not available
> (not in the binary - check buildtime LOOKUP configuration)
^^
See L
>(I already do sender verification of
> incoming mail, but that
> doesn't catch fakes of real addresses), which then in turn stay in the
> queue for ages until
> they generate a bounce or bounce immediatly on a 550.
Try this (with caution) in your RCPT-ACL:
require verify= sender/c
[EMAIL PROTECTED] wrote:
> but when email comes is via smtp it just accepts the mail . I am sure
> it has something to do with my ACL setup I am including my ldap setup
> file maybe someone can help me.
Consider LDAP_LOOKUP_PEOPLE and LDAP_LOOKUP_GROUPS are marcos for your
LDAP lookups (user mai
> The main
> argument here is that a valid reason to reject all <> is for
> mailboxes/domains that don't send mail -- so when your callout fails
> and you reject the message its all good.
Yes, this may be true for the envelope sender callouts (as far as I can
see).
But at the last time we see co
> Which means, to anyone who understands English, that you have to have a
> pretty good reason to emit null-reverse-path mail for any reason other
> than the standards-track RFC (all of which, to my knowledge, are based on
> reverse paths of incoming messages).
It's advisable to do sender callout
I beg your pardon. I forgot to include my BAD_ATTACHMENTS macro:
BAD_ATTACHMENTS = cmd|com|js|reg|chm|cnf|hta|ins|scf|sct|vbs|vbe|\
wsc|wsf|wsh|xnk|mad|maf|mag|mar|mas|mat|mav|maw|bat|pif|scr|exe
This should make it clearer.
- oliver
Odhiambo Washingtonwrote wrote:
> > # File extension filter
Hello,
I found some useful MIME checks on the exim list (see the attached file
mime_acl.cf),
but there are certainly more. If you do MIME checking with Exims new MIME-ACL,
please have a look at the attached file and post your increments or
improvements
to the list.
regards
oliver
# $I
22 matches
Mail list logo