You posted the error about opendmarc, so I thought you wanted to figure that out. You are right though, it should not be keeping you from signing outgoing emails. You'll need to look at the logs to figure out why it's not working, there should be other clues in there. What else have you done...
Thanks Stoiko, I can see your point as to why this is a tricky issue. As a edit to my original request, I guess what I am really after is a envelope-from and from domain match. Any legitimate emails should match on the domain.
Taking a simpler approach, I may be able to just create a incoming...
Thanks, but I did find that link earlier and already implemented it. This will work for this specific email I posted and probably some/most others, but sometimes the spammers use just one envelope-from and just one from. The link you provided will not cover a single envelope-from and single...
I'd like to discard emails that have a envelope-from that does not match the from email. It's pretty common for us to receive emails like this that pass SPF and appear to come from internal email addresses. Is there a mail filter rule that I can set up for this, or does it have to be something...
You also have to add:
submission inet n - - - 100 smtpd
-o content_filter=scan:127.0.0.1:10023
-o smtpd_enforce_tls=yes
-o smtpd_sasl_auth_enable=yes
-o smtpd_client_restrictions=permit_sasl_authenticated,reject
-o...
Signed:
Feb 15 09:48:24 mg1 postfix/smtpd[1451]: connect from unknown[x.x.x.x]
Feb 15 09:48:24 mg1 postfix/smtpd[1451]: Anonymous TLS connection established from unknown[x.x.x.x]: TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)
Feb 15 09:48:24 mg1 postfix/smtpd[1451]: 58997220A38...
For the permission issues it's just that. In the logs I was seeing: warning: connect to Milter service unix:/var/run/opendkim/signer.sock: Permission denied and same for verifier. I'm assuming if I would have just set the permissions on the files it would work, but I chose to just follow what...
There are a couple issues with this Tutorial when Proxmox is installed from the ISO:
cat <<_EOF > /etc/opendkim/verifier should be cat <<_EOF > /etc/opendkim/verifier.conf
There are permission issues with sockets for verifier and signer. These can be fixed with the info here...
After learning a bit more about the templates what I had above probably wouldn't have worked anyway. I added the internal_mail_filter_classes = bounce line to /etc/pmg/templates/main.cf.in but still am not getting the messages signed.
I guess my next question is, won't this render the GUI useless for making config changes? Is there already a way to sync these files or do we need to do it manually?
Ok, I understand now. I thought these files appended to the config, not overwrite it. Seems odd to do it this way... Definitely explains why things were not working.
Hmm...It could have been because I was scrambling to get the server delivering mail again, but when I had the SPF/DKIM check in /etc/pmg/templates/init.pre.in uncommented it was denying emails from my exchange server. It may have been a combination of a few things but when I commented that out...
I didn't get much when I ran spamassassin --lint but it was enough to point me to the file I posed about above. The only errors I could find:
(over 100 lines similar to the one below complaining about a description missing)
Feb 14 14:48:43.542 [19129] dbg: config: warning: no description set...
To answer my first problem, I had to comment lines 4531-4538 (anything to do with __KAM_SPF_NONE) in /usr/share/spamassassin-extra/KAM.cf. Does this file get updated hourly by sa-update?
I added internal_mail_filter_classes = bounce to the bottom of /etc/postfix/main.cf but it did not make a difference. I also tried editing the bounce line in /etc/pmg/templates/master.cf.in to
bounce unix - - - - 0 bounce
-o...
I have followed through your guide and have most things working that I want. Because I didn't install everything there are some errors I am dealing with that I was hoping you could help with.
First one is:
Feb 14 11:37:03 mg1 pmg-smtp-filter[1375]: WARNING: rules: failed to run...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.