On Mon, Nov 21, 2022 at 10:18:38PM +, Scott Kitterman
wrote:
> On November 21, 2022 8:50:51 PM UTC, raf wrote:
> >On Mon, Nov 21, 2022 at 12:48:49AM +, Scott Kitterman
> > wrote:
> >
> >> On November 20, 2022 11:47:02 PM UTC, raf wrote:
> >> >
> >> >There are also Debian packages for
On Mon, Nov 21, 2022 at 12:48:49AM +, Scott Kitterman
wrote:
> On November 20, 2022 11:47:02 PM UTC, raf wrote:
> >
> >There are also Debian packages for policy server versions:
> >
> > postfix-policyd-spf-perl
> > postfix-policyd-spf-python
>
> The Perl implementation is very rudimentar
On November 20, 2022 11:47:02 PM UTC, raf wrote:
>On Sun, Nov 20, 2022 at 03:29:33PM +0100, Matus UHLAR - fantomas
> wrote:
>
>> > On 16/11/2022 11:45, Matus UHLAR - fantomas wrote:
>> > > I use:
>> > > spf-milter (the same source as policyd-spf-python)
>> > > opendkim
>> > > openarc
>> > > op
On Sun, Nov 20, 2022 at 03:29:33PM +0100, Matus UHLAR - fantomas
wrote:
> > On 16/11/2022 11:45, Matus UHLAR - fantomas wrote:
> > > I use:
> > > spf-milter (the same source as policyd-spf-python)
> > > opendkim
> > > openarc
> > > opendmarc
> > >
> > > so far in soft mode (no rejections)
> > >
On 16/11/2022 11:45, Matus UHLAR - fantomas wrote:
I use:
spf-milter (the same source as policyd-spf-python)
opendkim
openarc
opendmarc
so far in soft mode (no rejections)
opendmarc can use results of previous three in its decisions.
On 20.11.22 08:21, Dominic Raferd wrote:
Does spf-milter ha
On 16/11/2022 11:45, Matus UHLAR - fantomas wrote:
I use:
spf-milter (the same source as policyd-spf-python)
opendkim
openarc
opendmarc
so far in soft mode (no rejections)
opendmarc can use results of previous three in its decisions.
Does spf-milter have the same source as policyd-spf-python? I
On Wed, Nov 16, 2022 at 08:39:48AM +, supp...@openmbox.net wrote:
> Sorry for inception.
> How can I configure postfix to cause an instant message returned,
> rather than 4xx code to make peer MTA retry many times?
>
> Thanks
I think it's OpenDMARC that needs to be configured to cause this
On 16.11.22 02:47, supp...@openmbox.net wrote:
@raf is right. if you have enabled opendkim and policyd-spf on postfix, that
headers related to spf and dkim will be added automatically.
I use:
spf-milter (the same source as policyd-spf-python)
opendkim
openarc
opendmarc
so far in soft mode (no
Sorry for inception.
How can I configure postfix to cause an instant message returned, rather than
4xx code to make peer MTA retry many times?
Thanks
November 16, 2022, 8:09 AM, "raf" wrote:
>
> On Mon, Nov 14, 2022 at 12:33:02PM -0700, Bryan Arenal
> wrote:
>
> >
> > Hi there,
> >
@raf is right. if you have enabled opendkim and policyd-spf on postfix, that
headers related to spf and dkim will be added automatically.
regards
November 16, 2022 at 8:09 AM, "raf" wrote:
>
> On Mon, Nov 14, 2022 at 12:33:02PM -0700, Bryan Arenal
> wrote:
>
> >
> > Hi there,
> >
> >
On Mon, Nov 14, 2022 at 12:33:02PM -0700, Bryan Arenal
wrote:
> Hi there,
>
> Is Postfix capable of checking DKIM and SPF records on incoming email
> and adding headers based upon its findings? For example, an email
> with a valid DKIM signature shows these headers sent to O365:
>
> ARC-Authe
Is Postfix capable of checking DKIM and SPF records on incoming email
and adding headers based upon its findings?
Not the postfix code itself, but postfix supports milters which do this.
My google searches have only returned results on how to do DKIM
signing on outbound email and not how to v
Is Postfix capable of checking DKIM and SPF records on incoming email
and adding headers based upon its findings?
Not the postfix code itself, but postfix supports milters which do this.
My google searches have only returned results on how to do DKIM
signing on outbound email and not how to v
Hi there,
Is Postfix capable of checking DKIM and SPF records on incoming email
and adding headers based upon its findings? For example, an email
with a valid DKIM signature shows these headers sent to O365:
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
smtp.mailfrom=example.com
14 matches
Mail list logo