Unwanted mail from Users (Backscatter mail)

2015-02-07 Thread Alamgir Shamim
Hi, We have an ISP. We have lots of users. They use our smtp server to send mail. Very often we are facing a problem. Sometimes huge unwanted mail comes from our users to smtp server who are basically behind nat IP and make our smtp server's IP listed in many black list sites like SORBS and

Re: Unwanted mail from Users (Backscatter mail)

2015-02-07 Thread Robert Schetterer
Am 07.02.2015 um 20:05 schrieb Alamgir Shamim: Hi, We have an ISP. We have lots of users. They use our smtp server to send mail. Very often we are facing a problem. Sometimes huge unwanted mail comes from our users to smtp server who are basically behind nat IP and make our smtp server's IP

Re: Mail flow clogged by postdrop

2015-02-07 Thread Patrick Ben Koetter
* James Moe ji...@sohnen-moe.com: opensuse 13.2 linux 3.16.7-7-desktop x86_64 postfix 2.11.0-5.2.2 I create a message using the mail command. When it is sent, the message below appears every 10 seconds. The same message is in /var/log/mail.err. I presume postdrop is a part of the postfix

AW: Mail flow clogged by postdrop

2015-02-07 Thread André Peters
Can you post the output of ls -l /var/spool/postfix please? Btw, for me it is: drwx-wx--T 2 postfixpostdrop 4096 Feb 8 07:29 maildrop André Am So., Febr. 8, 2015 07:20 schrieb James Moe : -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 opensuse 13.2 linux 3.16.7-7-desktop

TLSv1 and SSLv3

2015-02-07 Thread LuKreme
# postconf -n | grep _tls_ smtp_tls_security_level = may smtpd_tls_cert_file = /etc/ssl/certs/postfix.pem smtpd_tls_ciphers = high # is smtp_tls_exclude needed? smtpd_tls_exclude_ciphers = aNULL, DES, 3DES, MD5, DES+MD5, RC4 smtpd_tls_key_file = /etc/ssl/private/postfix.pem smtpd_tls_loglevel = 2

RHEL/CentOS Postfix 3.0.0-RC1 packages for testing

2015-02-07 Thread Peter
Hi everyone, I've built some Postfix 3.0 release candidate packages for EL5,6,7 (RHEL, CentOS, SL, etc). If anyone wants to install them on your EL system and give them a bit of testing I would greatly appreciate any feedback you have. Please note that currently these packages are considered to

Re: TLSv1 and SSLv3

2015-02-07 Thread Peter
On 02/08/2015 06:18 PM, LuKreme wrote: # openssl s_client -connect 127.0.0.1:993 Port 993 is IMAPS which is not provided by postfix. Peter

Re: TLSv1 and SSLv3

2015-02-07 Thread LuKreme
On 07 Feb 2015, at 22:28 , Peter pe...@pajamian.dhs.org wrote: On 02/08/2015 06:18 PM, LuKreme wrote: # openssl s_client -connect 127.0.0.1:993 Port 993 is IMAPS which is not provided by postfix. Yes, of course. Sorry. -- Gods don't like people not doing much work. People who aren't busy

Mail flow clogged by postdrop

2015-02-07 Thread James Moe
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 opensuse 13.2 linux 3.16.7-7-desktop x86_64 postfix 2.11.0-5.2.2 I create a message using the mail command. When it is sent, the message below appears every 10 seconds. The same message is in /var/log/mail.err. I presume postdrop is a part of the

Re: Mail flow clogged by postdrop

2015-02-07 Thread Viktor Dukhovni
On Sat, Feb 07, 2015 at 11:20:16PM -0700, James Moe wrote: postdrop: warning: mail_queue_enter: create file maildrop/546331.4026: Permission denied The postdrop(1) executable must be installed setgid() to the group corresponding to the main.cf setgid_group parameter. This group must have

Re: Tracking down a mail forwarding loop

2015-02-07 Thread LuKreme
On Feb 6, 2015, at 3:43 PM, LuKreme krem...@kreme.com wrote: On 06 Feb 2015, at 15:05 , Wietse Venema wie...@porcupine.org wrote: NORMALLY, that header is present AFTER mail is delivered to b...@covisp.net. If it is present BEFORE mail is delivered to b...@covisp.net, then you have a loop

Re: Unwanted mail from Users (Backscatter mail)

2015-02-07 Thread Wietse Venema
Alamgir Shamim: Hi, We have an ISP. We have lots of users. They use our smtp server to send mail. Very often we are facing a problem. Sometimes huge unwanted mail comes from our users to smtp server who are basically behind nat IP and make our smtp server's IP listed in many black list

Re: TLSv1 and SSLv3

2015-02-07 Thread Viktor Dukhovni
On Sat, Feb 07, 2015 at 10:18:11PM -0700, LuKreme wrote: # postconf -n | grep _tls_ smtp_tls_security_level = may smtpd_tls_cert_file = /etc/ssl/certs/postfix.pem Fine so far. smtpd_tls_ciphers = high This is too high for opportunistic TLS. Anything more than medium is too restrictive