Hi,
The first solution is amavis. But if you don't want to install amavis, there's
another trick using shell scripts
Save the script below to some file which is accessible in your $PATH for my
example it is saved as postspam
#!/bin/sh
TEMPFILE=$$.$RANDOM.$RANDOM
SPAMKLVL=11
cat /tmp/$TEMPFILE
Good afternoon list.
I apologise for this post.
I am new to postfix and battling to block a sender who keeps changing
digits in the sending address.
I would like to block the sender using the regex
westcoast[0-9]...@gmail.com (to block sender address of
westcoast...@gmail.com etc..).
* Tom Kinghorn thomas.kingh...@gmail.com:
Thats 1 slap for me for missing the //'s
Well, at least you got the rest of the syntax right.
:)
--
Ralf Hildebrandt
Geschäftsbereich IT | Abteilung Netzwerk
Charité - Universitätsmedizin Berlin
Campus Benjamin Franklin
Hindenburgdamm 30 |
On 10/4/2010 8:47 AM, Nicholas Sideris wrote:
Hello,
Assuming that I had enabled SASL mechanism. Can I use a mysql: something
list (probably a custom query probing the user table for 1 in a
particular column) to restrict the access to SMTP relay to a very few users?
eg.
On 2010/10/04 02:11 PM, Ralf Hildebrandt wrote:
However, adding it to the smtpd_sender_restrictions is not working
/^westcoast[0-9]...@gmail\.com$/ DISCARD
or
/^westcoast[0-9]...@gmail\.com$/ REJECT
You're lacking the //
works 100%.
Thats 1 slap for me for missing the //'s
Thank you very
Hello Donovan
Thanks for your response
postfconf -n display below
# postconf -n
command_directory = /usr/local/sbin
config_directory = /usr/local/etc/postfix
daemon_directory = /usr/local/libexec/postfix
data_directory = /var/db/postfix
debug_peer_level = 2
html_directory =
Hello,
Assuming that I had enabled SASL mechanism. Can I use a mysql: something list
(probably a custom query probing the user table for 1 in a particular column)
to restrict the access to SMTP relay to a very few users?
eg.
smtpd_sender_login_maps = mysql:/server/etc/postfix/allowrelay.sql
Hi guys,
I was wondering if the following scenario is feasible with Postfix. I
would like to have Postfix acting as my fallback MX for emails which
have an certain MX record.
So for instance let's assume we have the domain example.org which has
two MX mx1.example.org and mx.fallback.com.
Can I
Christoph Petersen:
Hi guys,
I was wondering if the following scenario is feasible with Postfix. I
would like to have Postfix acting as my fallback MX for emails which
have an certain MX record.
So for instance let's assume we have the domain example.org which has
two MX mx1.example.org
Hi Wietse,
Thanks for the reply. Is there a way to query DNS if the specified MX is
present so I do not have to maintain the list of allowed domains?
BR
Christoph
On 04.10.2010 16:38, Wietse Venema wrote:
Christoph Petersen:
Hi guys,
I was wondering if the following scenario is feasible
* Tom Kinghorn thomas.kingh...@gmail.com:
Good afternoon list.
I apologise for this post.
Hey, let's read your post first and decide later if you need to
apologize :)
I am new to postfix and battling to block a sender who keeps changing
digits in the sending address.
This sounds like a
On Mon, Oct 04, 2010 at 04:52:04PM +0200, Christoph Petersen wrote:
Hi Wietse,
Thanks for the reply. Is there a way to query DNS if the specified MX is
present so I do not have to maintain the list of allowed domains?
See:
Christoph Petersen:
Hi Wietse,
Thanks for the reply. Is there a way to query DNS if the specified MX is
present so I do not have to maintain the list of allowed domains?
I send lots of spam, and I configure DNS such that the sender domain
of my spam resolves to your MX (*). Would you please
On Mon, 4 Oct 2010 17:49:17 +0200
martin f krafft madd...@madduck.net articulated:
also sprach Noel Jones njo...@megan.vbhcs.org [2010.10.04.0507
+0200]:
Lots easier to just use
/^myhostname(\.mydomain)?$/ REJECT don't use my hostname
Thanks to everyone who responded. I am now
On 10/04/2010 05:49 PM, martin f krafft wrote:
also sprach Noel Jonesnjo...@megan.vbhcs.org [2010.10.04.0507 +0200]:
Lots easier to just use
/^myhostname(\.mydomain)?$/ REJECT don't use my hostname
Thanks to everyone who responded. I am now going the suggested way.
However,
On Thu, Sep 30, 2010 at 12:40 PM, brian moore b...@cmc.net wrote:
On Wed, 29 Sep 2010 15:17:35 -0400
Christopher Koeber ckoe...@gmail.com wrote:
*OK, everytime I send to the allstudents list I have I get this:
Sep 29 13:42:57 WTS-ZIMBRA postfix/virtual[27388]: 0CE72322739: to=
Just to give an update for everyone who can help:
1. The system uses an OpenLDAP database for virtual aliases. So my
virtual_alias_maps points to an LDAP lookup for this.
2. The domain for the Mailman setup as well as the actual email accounts
is the same:
1. For example: I
On 10/04/2010 07:41 PM, Christopher Koeber wrote:
Just to give an update for everyone who can help:
1. The system uses an OpenLDAP database for virtual aliases. So my
virtual_alias_maps points to an LDAP lookup for this.
2. The domain for the Mailman setup as well as the actual
also sprach Jeroen Geilman jer...@adaptr.nl [2010.10.04.1822 +0200]:
Where, exactly ?
The HELO greeting.
The real client IP ? That can't be trivially spoofed, and so would
actually BE your server.
I have seen clients who apparently connect to my MX with the IP and
then send the IP after
Please don't send these redundant messages. It's a good indication of
your general messaging skills.
On 10/04/2010 07:56 PM, martin f krafft wrote:
also sprach Jeroen Geilmanjer...@adaptr.nl [2010.10.04.1822 +0200]:
Where, exactly ?
The HELO greeting.
The real client IP ?
also sprach Jeroen Geilman jer...@adaptr.nl [2010.10.04.2004 +0200]:
I have seen clients who apparently connect to my MX with the IP and
then send the IP after HELO.
With YOUR IP ? That's highly unlikely, to the point of unbelievability.
Yes, with my IP.
--
martin | http://madduck.net/ |
On 2010-10-04 2:15 PM, martin f krafft wrote:
With YOUR IP ? That's highly unlikely, to the point of unbelievability.
Yes, with my IP.
So your server is hacked?
--
Best regards,
Charles
* Jeroen Geilman jer...@adaptr.nl:
Please don't send these redundant messages. It's a good indication of
your general messaging skills.
On 10/04/2010 07:56 PM, martin f krafft wrote:
also sprach Jeroen Geilmanjer...@adaptr.nl [2010.10.04.1822 +0200]:
Where, exactly ?
The HELO
also sprach Charles Marcus cmar...@media-brokers.com [2010.10.04.2029 +0200]:
Yes, with my IP.
So your server is hacked?
I am talking about the argument to HELO/EHLO. No, my server is not
hacked.
--
martin | http://madduck.net/ | http://two.sentenc.es/
if english was good enough for
Ralf Hildebrandt:
With YOUR IP ? That's highly unlikely, to the point of unbelievability.
I've seen those as well; not from within my networks, but yes. I've
seen them!
I see that all the time.
For me, blocking helo with with $inet_interfaces/$myhostname is
not sufficient, since Postfix
Are there any existing scripts out there, that report connection counts by cidr
network?
Input:?
parse.pl /var/log/mail cidr_list.zone
Output:?
network count
10.10.128.0/19 983
10.144.48.0/20 121
i hijacked the server with the null sender
and the valid recipient
the mail go home
anonymous
nb : hey madduck
Le lundi 04 octobre 2010 à 20:44 +0200, martin f krafft a écrit :
also sprach Charles Marcus cmar...@media-brokers.com [2010.10.04.2029
+0200]:
Yes, with my IP.
So your
On 10/04/2010 08:31 PM, Ralf Hildebrandt wrote:
* Jeroen Geilmanjer...@adaptr.nl:
The real client IP ? That can't be trivially spoofed, and so would
actually BE your server.
I have seen clients who apparently connect to my MX with the IP and
then send the IP after HELO.
On 10/04/2010 09:37 PM, Alfonso Alejandro Reyes Jimenez wrote:
Hi, everyone.
I have an issue with some users that are spoofing our mail server,
Spoofing what ? how ?
Proper configuration and a submission setup can prevent sender domain
spoofing.
HELO spoofing can be limited or
hi all
i'd like to put a smarthost using postfix; what are the min.precautions i
shud put in? i've heard controls on outgoing mails are not that easily
effective unlike the controls on incoming mails; also i plan to use SA and
Amavis; appreciate valuable suggestions on this
ty
-bharathan
Le 29/09/2010 02:33, Jeroen Geilman a écrit :
On 09/28/2010 02:17 PM, Adam Tauno Williams wrote:
On Tue, 2010-09-28 at 00:15 +0200, mouss wrote:
Le 27/09/2010 13:25, Julien Vehent a écrit :
On Mon, 27 Sep 2010 13:06:46 +0200, David
Touzeauda...@touzeau.eu wrote:
I'm interested in this
I've noticed this:
mail.log.1:Oct 3 03:32:43 ns postfix/master[3672]: warning:
process //usr/lib/postfix/postscreen pid 19122 killed by signal 11
and
[457795.641083] postscreen[19122]: segfault at 1f ip 0804c463 sp
bfcf5e50 error 4 in postscreen[8048000+29000]
system info:
mail_version =
Le 04/10/2010 21:37, Alfonso Alejandro Reyes Jimenez a écrit :
Hi, everyone.
I have an issue with some users that are spoofing our mail server,
rightnow we can restrict the spoofing on the same server.
But if they use another smtp server pretending that they are on our
domain the can send
On 10/04/2010 02:48 PM, pf at alt-ctrl-del.org wrote:
Are there any existing scripts out there, that report connection counts by
cidr network?
Input:?
parse.pl /var/log/mail cidr_list.zone
Output:?
network count
10.10.128.0/19 983
10.144.48.0/20 121
Le 04/10/2010 17:49, martin f krafft a écrit :
also sprach Noel Jonesnjo...@megan.vbhcs.org [2010.10.04.0507 +0200]:
Lots easier to just use
/^myhostname(\.mydomain)?$/ REJECT don't use my hostname
Thanks to everyone who responded. I am now going the suggested way.
However, it occurs
Le 04/10/2010 21:10, Jeroen Geilman a écrit :
On 10/04/2010 08:31 PM, Ralf Hildebrandt wrote:
* Jeroen Geilmanjer...@adaptr.nl:
The real client IP ? That can't be trivially spoofed, and so would
actually BE your server.
I have seen clients who apparently connect to my MX with the IP and
Hi,
I have sent this message almost verbatim to the OpenLDAP list as well
(since it is fundamentally about LDAP) but I am sure many people on this
list have extensive experience with virtual domain hosting in
conjunction with LDAP.
Short version: What is a recommended way to set up virtual
Thanks for your help, right now we use sasl auth and Works very good.
If the setup for example a gmail account and the change the gmail address for
some user on the postfix domain, postfix delivers that email.
I don't want to accept emails from our domain in our server if they don't
belong
On Mon, Oct 04, 2010 at 03:43:44PM -0500, Vernon A. Fort wrote:
I've noticed this:
mail.log.1:Oct 3 03:32:43 ns postfix/master[3672]: warning:
process //usr/lib/postfix/postscreen pid 19122 killed by signal 11
and
[457795.641083] postscreen[19122]: segfault at 1f ip 0804c463 sp
On Mon, 2010-10-04 at 17:30 -0400, Victor Duchovni wrote:
On Mon, Oct 04, 2010 at 03:43:44PM -0500, Vernon A. Fort wrote:
Enable core file generation and report a backtrace.
I was just reading up on this. I will report once it happens.
Vernon
On 10/04/2010 02:48 PM, pf at alt-ctrl-del.org wrote:
Are there any existing scripts out there, that report connection counts by cidr
network?
Input:?
parse.pl /var/log/mail cidr_list.zone
Output:?
network count
10.10.128.0/19 983
10.144.48.0/20 121
On
Jeroen Geilman put forth on 10/4/2010 2:10 PM:
The OP says in so many words that he sees connections WITH HIS IP: who
apparently connect to the MX *with the IP*
This does not happen.
Is this remotely plausible if he's behind a really funky NAT/masquerade?
I've seen some junk quality NAT
On 10/04/2010 06:25 PM, pf at alt-ctrl-del.org wrote:
On 10/04/2010 02:48 PM, pf at alt-ctrl-del.org wrote:
Are there any existing scripts out there, that report connection counts by
cidr network?
Input:?
parse.pl /var/log/mail cidr_list.zone
Output:?
network count
43 matches
Mail list logo