On 14-03-06 12:15 PM, Nathan Coulson wrote:
On 14-03-06 11:25 AM, Wietse Venema wrote:
Nathan Coulson:
In testing, we were seeing the following results:
smtpd_tls_security_level=may
AUTH#0111#011PLAIN#011service=smtp#011nologin#011lip=1.6.0.5#011rip=1.6.41.1#011resp=
smtpd_tls_security_lev
The source code does not lie. I suppose someone down-stream improved it.
Wietse
On 14-03-06 11:25 AM, Wietse Venema wrote:
Nathan Coulson:
In testing, we were seeing the following results:
smtpd_tls_security_level=may
AUTH#0111#011PLAIN#011service=smtp#011nologin#011lip=1.6.0.5#011rip=1.6.41.1#011resp=
smtpd_tls_security_level=encrypt
AUTH#0111#011PLAIN#011service=smtp#01
Nathan Coulson:
> In testing, we were seeing the following results:
>
> smtpd_tls_security_level=may
> AUTH#0111#011PLAIN#011service=smtp#011nologin#011lip=1.6.0.5#011rip=1.6.41.1#011resp=
>
>
> smtpd_tls_security_level=encrypt
> AUTH#0111#011PLAIN#011service=smtp#011nologin#011lip=1.6.0.5#011r
I wanted users to have the choice between connecting via TLS or not.
By default, users would require TLS unless they choose otherwise.
There is an existing userbase where some users use SSL/TLS, and others
do not.
We use dovecot for authentication. The auth protocol as mentioned at
http
Am 06.03.2014 18:04, schrieb Adam Moffett:
> Two steps eliminated this problem for us:
>
> 1) Accounts with more than 6 failed login attempts in a 10 minute period are
> disabled for 10 minutes. This makes
> brute force methods to find passwords almost impossible.
that is fine
> 2) Limit to
You were quite right - typo !! - all working now - thanks very much.
pappin
--
View this message in context:
http://postfix.1071664.n5.nabble.com/Postfix-Spamassassin-and-always-bcc-tp65835p65844.html
Sent from the Postfix Users mailing list archive at Nabble.com.
On 06 Mar 2014, at 18:04, Adam Moffett wrote:
> Two steps eliminated this problem for us:
>
> 1) Accounts with more than 6 failed login attempts in a 10 minute period are
> disabled for 10 minutes. This makes brute force methods to find passwords
> almost impossible.
>
> 2) Limit to 200 outg
On 3/6/2014 11:08 AM, Jay G. Scott wrote:
>
> The maillog says this, and I believe it:
>
> Mar 5 08:22:02 ns5.arlut.utexas.edu sendmail[5427]: s25EM0Zg005419:
> to=, delay=00:00:01, xdelay=00:00:00, mailer=relay,
> pri=1081946, relay=ns2.arlut.utexas.edu. [146.6.211.1], dsn=5.1.3,
> stat=Servi
The maillog says this, and I believe it:
Mar 5 08:22:02 ns5.arlut.utexas.edu sendmail[5427]: s25EM0Zg005419:
to=, delay=00:00:01, xdelay=00:00:00, mailer=relay,
pri=1081946, relay=ns2.arlut.utexas.edu. [146.6.211.1], dsn=5.1.3, stat=Service
unavailable
But the user's bounce msg said:
ns2.ar
pappin:
> Thanks very much for the prompt reply.
>
> I tried as you suggested
>
> smtp inet n - - - - smtpd
> -o content_filter=spamassassin
> -o receive_override_options=no_address_mappings
>
> I am now getting an error in my email log
>
> postfix/qm
Homer:
Two steps eliminated this problem for us:
1) Accounts with more than 6 failed login attempts in a 10 minute period
are disabled for 10 minutes. This makes brute force methods to find
passwords almost impossible.
2) Limit to 200 outgoing messages per day per user. We'll raise it to
Thanks very much for the prompt reply.
I tried as you suggested
smtp inet n - - - - smtpd
-o content_filter=spamassassin
-o receive_override_options=no_address_mappings
I am now getting an error in my email log
postfix/qmgr[7975]: warning: connect to
pappin:
> Hello,
>
> Could anyone please help with a Postfix/Spamassassin configuration problem.
>
> I have a small debian wheezy server running Fetchmail 6.3.21-4, Postfix
> 2.9.6-2 & Spamassassin 3.3.2-5.
>
> I have set the always_bcc in the main.cf as below and this works fine
> without spama
Hello,
Could anyone please help with a Postfix/Spamassassin configuration problem.
I have a small debian wheezy server running Fetchmail 6.3.21-4, Postfix
2.9.6-2 & Spamassassin 3.3.2-5.
I have set the always_bcc in the main.cf as below and this works fine
without spamassassin. With spamassassin
15 matches
Mail list logo