Displaying 20 results from an estimated 3000 matches similar to: "Worthwile to use quotas?"
2020 Aug 20
2
dovecot-SASL for Postfix: EXTERNAL does not work.
Hello and good evening.
Sorry for responding so late, it is midsummer and i spend as much
time as possible on the outside (bicycle, mostly). (Just one more
day, then 10 degrees colder!!)
I Cc: Wietse Venema, because i quote a message of him.
(this is "set quote-add-cc" here.)
Aki Tuomi wrote in
<84881193.5398.1597934431687 at appsuite-dev-gw2.open-xchange.com>:
The dovecot
2002 Feb 03
1
[wietse@porcupine.org: Re: syncronous directory operation for linux (ext2)]
There's a big thread about filesystems on postfix-users@postfix.org
Could you shed some light on that issue?
----- Forwarded message from Wietse Venema <wietse@porcupine.org> -----
From: wietse@porcupine.org (Wietse Venema)
Date: Sun, 3 Feb 2002 07:53:26 -0500 (EST)
To: Lawrence Greenfield <leg+@andrew.cmu.edu>
Cc: Wietse Venema <wietse@porcupine.org>,
2002 Feb 04
2
ext3 and chattr +S on postfix spools
Postfix <http://www.postfix.org> does a chattr +S on its spool directory
when it is installed on Linux.
This is what is written in the postfix startup script
--
#
# LINUX by default does not synchronously update directories -
# that's dangerous for mail.
#
if [ -f /usr/bin/chattr ]
then
CHATTR="/usr/bin/chattr +S"
else
CHATTR=echo
fi
--
Is this still required on ext3 ?
2020 Aug 20
3
dovecot-SASL for Postfix: EXTERNAL does not work.
Hello.
I am not subscribed and new here, so first of all i want to thank
you for dovecot. I personally do not use it in "production"
(yet), but it is my sole point of interaction for testing the
little MUA i maintain for quite some years. I also have used its
code for affirmation purposes. (Interesting that OAUTHBEARER
treats hostname and port as optional. I currently do
2005 Sep 14
3
mailbox corruption
Hello,
Here is the description of a problem we habe been having for some time.
Originally posted on the postfix-users mailing list, but no solution
found to date.
>>>> We have been having problems with our mail system for a couple of
>>>> months. Every now and then, some mailboxes get corrupted: a
>>>> half-truncated message, usually without headers, is at
2020 Aug 21
4
[EXT] Re: dovecot-SASL for Postfix: EXTERNAL does not work.
Aki Tuomi wrote in
<1907575568.4364.1597984769802 at appsuite-dev-gw1.open-xchange.com>:
|> On 21/08/2020 02:17 Steffen Nurpmeso <steffen at sdaoden.eu> wrote:
...
|> Wietse Venema wrote in
|> <4BXSTk189nzJrP3 at spike.porcupine.org>:
|> ...
|>|Steffen Nurpmeso:
|> ...
|>|> until SASL says it is done?!. How could EXTERNAL ever work
2002 May 01
4
Using openssh 3.1p1 on Solaris with tcp wrappers 7.6
Dear Open SSH and TCP Wrappers Colleagues,
We are trying to use open ssh 3.1p1 on SPARC platforms
under Solaris 2.8 using gcc 2.95.2, in conjunction with
tcp wrappers 7.6 (IPv6 version). The wrapping of open ssh
is not too well documented but I think we have figured
most of this out (hearty thanks to Wietse Venema, Jim
Mintha & Niels Provos for their helpful email exchanges) --
but have one
1998 Aug 05
6
Problem with TCP_wrappers
Hi,
I''m running into something weird here.
I''m using RH5.1 with tcp_wrappers 7.6.
The syntax for hosts.allow and hosts.deny is:
<service list> : <access list> [ : <shell_command> ]
Everything works when I _don''t_ use the shell_command.
I used the _exact_ line as in the man-pages utilising "safe_finger" (comes
with tcp_wrappers), tcpdchk
2004 Feb 15
6
Rooted system
Howyd all? Seems that I have been routed. Possibly
by a physical B&E, but who knows? Probably some
of you do.... anyways, some politically sensitive
email was deleted from a user account and the
line
low -tr &
inserted into my .xinitrc .
Duncan (Dhu) Campbell
2017 Mar 31
2
Sendmail is considered deprecated
On Fri, March 31, 2017 4:46 pm, Alice Wonder wrote:
> On 03/31/2017 02:40 PM, Kenneth Porter wrote:
>> On 3/31/2017 2:15 PM, Valeri Galtsev wrote:
>>> Well, it sounds like you are one of the companies with whose effort I
>>> have
>>> to fight constantly in my own effort to protect our users from spam...
>>
>> What makes Postfix superior in fighting
2006 Mar 01
1
sshd blocking SIGALARM turns out to be due to tcpd
Ian Jackson:
> I recently encountered a bug where some ssh login sessions would
> apparently inherit a blocked SIGALRM. A web search showed up two
> relevant threads:
> http://lists.suse.com/archive/suse-linux-e/2005-Dec/2628.html
> http://marc.theaimsgroup.com/?l=openssh-unix-dev&m=113533337923128&w=2
> et seq - but sadly no answers.
>
> Experimentation with
2002 Jul 29
1
Valgrind
http://developer.kde.org/~sewardj/
Valgrind is a GPL'd tool to help you find memory-management problems in
your programs. When a program is run under Valgrind's supervision, all
reads and writes of memory are checked, and calls to
malloc/new/free/delete are intercepted. As a result, Valgrind can detect
problems such as:
* Use of uninitialised memory
* Reading/writing memory after
1998 Dec 15
1
portmap & tcpwrappers
I don't know if this is RedHat 5.1 specific, but be aware that the version
of portmap distributed is the enhanced (Wietse Venema) version. That's
great, except for two things. The first is documented, but easy to overlook:
"In order to avoid deadlocks, the portmap program does not attempt to look
up the remote host name or user name...The upshot of all this is that only
network
2023 Nov 09
1
2.8.1 build buglet: sockdebug.c
Jim Klimov <jimklimov+nut at gmail.com> writes:
> By the way, on the NUT CI farm the libwrap is present on some (though not
> all) systems - covering linux, freebsd, openindiana... and neither
> complained about `sockdebug` :\
>
> What version do you have? Maybe it is some alternate implementation?
Looks like 7.4, as amended in NetBSD over the years. Looks like the
2013 Jan 15
2
Using postfix in CentOS 6 to relay mails to First.Last@gmail.com
Hello fellow CentOS users,
I'm using:
# cat /etc/*release
CentOS release 6.3 (Final)
# rpm -qa | grep post
postfix-2.6.6-2.2.el6_1.x86_64
on 2 servers: preferans.de and (yes, funny name)
static.103.78.9.176.clients.your-server.de
I own several domains and would like all
incoming mails addressing those domains
to be forwarded to my Gmail address.
So I have setup the MX-records for my
1998 Sep 01
5
/bin/login problem
I would be surprised if someone hasn''t encountered this already, but I
haven''t found any discussion of the nature of this problem. I run RehHat
5.0. If a user makes a mistake in the login process such as the
following:
login: mistake
password: xxx
Login incorrect!
login: username
password xxxx
bash$
a ps will show, among other things,
2333 /bin/login --mistake.
Since
1998 May 08
4
Lightning fast attacks?
RH4.2 Linux Intel
Last night I got three of these log messages: Two in a row, one a bit later.
May 8 00:35:15 osg-gw imapd[4307]: warning: can''t get client address:
Connectio
n reset by peer
May 8 00:35:15 osg-gw imapd[4307]: refused connect from unknown
Now, I have imapd blocked to non-local users using tcpd wrappers, so
tcpd is trying to find the address of the remote machine (all
2015 Feb 17
2
how to run dovecot imap on separate server from postfix?
Hello again Reindl Harald
I always thought Wietse Venema was only as smart as me ;-)
seriously thank you for the help.
On Tue, Feb 17, 2015 at 4:57 PM, Reindl Harald <h.reindl at thelounge.net>
wrote:
>
> Am 17.02.2015 um 22:51 schrieb Robert Fantini:
>
>> I want to make sure that the postfix delivery does not give up trying to
>> get the email delivered when the
2003 Jul 25
2
Is dovecot NFS safe?
I'm migrating our mailserver from cyrus 2.0 to Postfix and Dovecot.
We're using maildirs delivered to /var/maildir, which is mounted via NFS
from a Netapp. My understanding was that maildir was completely happy
in an NFS environment but I've seen a couple messages here recently
which mention the dovecot index files not being NFS safe.
Are their any caveats or gotcha's that I
1998 Jul 01
4
tcpd anomaly
Salve,
I''m protecting hades with the tcpd wrappers and had no problems so far,
at least none that I noticed.
Today happend something strange. An attacker got a connect on a
protected port from a not allowed IP:
> Unusual System Events
> =-=-=-=-=-=-=-=-=-=-=
BTW, thanks for that tool.
> Jul 1 03:34:56 hades in.null[18321]: twist
> slip139-92-93-124.hol.ch.ibm.net to