Displaying 20 results from an estimated 2000 matches similar to: "Bug#617530: log format changed for postfix/smtpd when using XFORWARD"
2011 Mar 09
1
Bug#617530: logcheck-database: log format changed for postfix/smtpd when using XFORWARD
Package: logcheck-database
Version: 1.3.13
Severity: wishlist
Hi,
after upgrading Postfix from 2.7.1-1 to 2.8.1-1 (using testing)
parts of the log format from postfix/smtpd have changed.
This problem only seems to trigger when accepting connections
in smtpd using XFORWARD (http://www.postfix.org/XFORWARD_README.html),
for example when Amavisd-new reinjects mail to postfix.
The new log lines
2013 Feb 18
0
Bug#700851: logcheck-database: postfix ignore.d.server now logs on the same line sasl_method, sasl_username AND sasl_sender, rule must be updated
Package: logcheck-database
Severity: normal
postfix has changed log formats, now it includes sasl_sender in log lines.
The rule at ./ignore.d.server/postfix:109
^\w{3} [ :[:digit:]]{11} [._[:alnum:]-]+ postfix/smtpd\[[[:digit:]]+\]:
[[:alnum:]]+: client=[^[:space:]]+, sasl_method=[-[:alnum:]]+,
sasl_username=[-_.@[:alnum:]]+$
must be updated with:
^\w{3} [ :[:digit:]]{11} [._[:alnum:]-]+
2004 Aug 10
1
one = sign to much?
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hi,
I think I found a mistake in the postfix file
in /etc/logcheck/ignore.d.server. There is one equal sign to much in this
line:
^\w{3} [ :0-9]{11} [._[:alnum:]-]+ postfix/smtpd\[[0-9]+\]: [[:alnum:]]+:
client=[^[:space:]]+, sasl_method=[[:alnum:]]+,
sasl_username==[-_.@[:alnum:]]+$
I think it should be:
^\w{3} [ :0-9]{11} [._[:alnum:]-]+
2010 Nov 10
1
dovecot dictionary attacks
Hi, I been using dovecot for awhile and its been solid, however I been
having some issues with dictionary attacks.
I installed fail2ban and for the most part is working fine. However today I
got another spammer relaying through my server.
Looking at the logs I see the following dictonary attack from 94.242.206.37
Nov 10 03:04:38 pop dovecot: pop3-login: Disconnected: rip=94.242.206.37,
2010 Nov 10
1
dictonary attacks
Hi hoping someone can help me a little with this one.
I have 2 mail servers, the incoming mail server runs dovecot and the
outgoing mail server runs postfix with sasl.
Lately I noticed a lot of spammers are running dictionary attacks on my
incoming server and then using that user/password for sasl on the outgoing
server.
The weird thing is I never see on the logs the guessed
2013 Dec 24
0
Patch for Dovecot's quota policy daemon
Hi Timo,
we wrote a simple Patch for the Dovecot quota policy daemon.
If a user is over quota, I prefer blocking the user sending e-mails, so
I need a policy daemon, that's able to use the envelope or sasl sender
as lookup key.
I'd be happy if that patch can become part of the normale Dovecot releases.
Peer
-------- Original-Nachricht --------
Betreff: Re: Fwd: Quota-Patch
Datum:
2016 Jan 28
1
C7 postfix problem
Hi Timo,
Am 28.01.2016 um 15:27 schrieb Timo Schoeler:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA256
> smtp inet n - n - - smtpd -v <= !!!
> #smtp inet n - n - 1 postscreen
> #smtpd pass - - n - - smtpd
>
> smtpd -v instead of smtpd -- that will hopefully give
2014 Feb 28
1
Logging authentication failures when Dovecot's auth service used to authenticate postfix smtpd
Hello,
tl;dr: Is there a way to get dovecot's auth to log failed smtp
authentications without having to switch on "auth_verbose"?
postfix version 2.11.0 and dovecot version 2.2.12
I'm currently migrating my postfix+courier to postfix+dovecot and so
far it's working as expected. Except for logging smtp login failures.
Despite Postfix logging successful authentications (see
2013 Jun 27
0
NTLM authentication mechanism with Postfix
I'm working on getting authentication for Postfix smtpd clients
working with Dovecot. I've got both plain text and GSSAPI mechanisms
working. Winbind also works for shell access and the command line
test work fine.
If I can get NTLM authentication working I can use Postfix as a drop
in replacement for a MS MTA I want get rid of.
I'm hoping the community might be able to offer some
2013 Jun 27
1
Dovecot NTLM Authentication
I'm working on getting authentication for Postfix smtpd clients
working with Dovecot. I've got both plain text and GSSAPI mechanisms
working. Winbind also works for shell access and the command line
test work fine.
If I can get NTLM authentication working I can use Postfix as a drop
in replacement for a MS MTA I want get rid of.
I'm hoping the community might be able to offer some
2011 Mar 09
1
Bug#617527: logcheck-database: incomplete rules for scponly-full
Package: logcheck-database
Version: 1.3.13
Severity: wishlist
Hi,
scponly-full (using 4.8-4.1) in Debian is compiled with additional support for rsync, unison and SVN.
However, the logcheck rule is based on the original version and doesn't include those commands in
the regexp.
Please add those three commands to the regexp.
Best regards,
Markus
-- System Information:
Debian Release:
2010 Jun 18
1
Help with a generated sieve rule
Hi all,
Can some kind soul please help me find why this rule did not work,
what's wrong? I am using dovecot 1:1.2.10-0xk1.
## Generated by RoundCube Webmail SieveRules Plugin ##
require ["vacation","variables"];
set "subject" "";
if header :matches "subject" "*" {
set "subject" "${1}";
}
#
2014 Aug 13
1
(Again) Some trouble with dovecot 2.1(.7) and SASL
The parentheses in the subject are due to referral to this discussion on the mailing list: http://dovecot.org/list/dovecot/2012-February/063851.html
At first I thought I found the problem, but then realized this was 2012 and the suggested patch already is applied in dovecot.
I also have segault messages in my kernel log; not too many, but it was enough to dig for it:
> Wed Jun 25 08:29:05
2009 Aug 18
2
Bug#542265: sendmail-base and logcheck-database: error when trying to install together
Package: logcheck-database,sendmail-base
Version: logcheck-database/1.2.69
Version: sendmail-base/8.14.3-9
Severity: serious
User: treinen at debian.org
Usertags: edos-file-overwrite
Date: 2009-08-18
Architecture: amd64
Distribution: sid
Hi,
automatic installation tests of packages that share a file and at the
same time do not conflict by their package dependency relationships has
detected the
2010 May 12
2
auth: Error: PLAIN(user): Request 27511.1 timeouted after 150 secs, state=3
Since upgrading from Dovecot 2.0.beta4 + patches
http://hg.dovecot.org/dovecot-2.0/rev/96496e1d3d12 and
http://hg.dovecot.org/dovecot-2.0/rev/aefa279e2c70 to Dovecot 2.0.beta
5, I have started to see the subject error from Dovecot for SASL
authentications. It doesn't happen every time, but it happens more often
than not. It doesn't seem to affect Postfix's acceptance of the message.
2013 Apr 07
1
[Dovecot-de] Dovecot Quota via policy service abfragen
Hallo Waffenmeister!
Ralf Hildebrandt <Ralf.Hildebrandt at charite.de> wrote:
> > Apr 7 14:07:52 delta postfix/qmgr[19078]: 1D8921B31260: from=<anmeyer at anup.de>, size=1492149, nrcpt=1 (queue active)
> > Apr 7 14:07:53 delta postfix/pipe[19091]: 1D8921B31260: to=<miles at anup.de>, relay=dovecot, delay=2542, delays=2542/0.01/0/0.29, dsn=4.3.0, status=deferred
2010 Jul 03
1
dovecot created mailbox empty - all mail forwarded to main MX server and cyrus-dovecot conflict
Hi all
after lots of trial and error and the help of THIS mail list, finally my
dovecot-postfix combination seems to work
yet
the dovecot mail spool always is empty
all mail forwarded to my main mail server - but i have no mail relay
configured.
why is the mail NOT in the dovecot inbox but forwarded to another mail
server ??
and why does postconf -A show cyrus and NOT dovecot ??
below some
2009 Feb 19
1
LDA dovecot with Postfix not workin :-(
Hi, tried to use postfix with virtual users and dovecot
imaps/imap pop3/pop3s workin fine lokal smtp too,
but a remote host is not able to send mail
Debian Etch
uname -a Linux mail 2.6.18-6-xen-amd64
#virtual user
vmail:x:5000:8::/home/vmail:/bin/sh
#master.cf added
dovecot unix - n n - - pipe
flags=DRhu user=vmail:mail argv=/usr/lib/dovecot/deliver -d
2004 Jun 21
2
Bug#255560: logcheck-database: More Postfix rules
Package: logcheck-database
Version: 1.2.22a
Severity: normal
Thanks to the upgrade to Postfix 2.1 and deploying a newer logcheck
ruleset on a busier server I've found a bunch more rules for Postfix.
I've attached new rules files and patches are inline.
The following patch is for violations.ignore.d:
--- logcheck-postfix.orig 2004-06-21 20:11:14.000000000 +0100
+++ logcheck-postfix
2008 Apr 09
1
postfix virtual maildir
my postfix setup
http://code.google.com/p/appwsgi/wiki/smtp
my dovecot setup
http://code.google.com/p/appwsgi/wiki/imap
root at localhost:~# /etc/postfix/test/root
220 localhost.localdomain ESMTP Postfix (Ubuntu)
250-localhost.localdomain
250-PIPELINING
250-SIZE 10240000
250-VRFY
250-ETRN
250-STARTTLS
250-AUTH PLAIN
250-ENHANCEDSTATUSCODES
250-8BITMIME
250 DSN
235 2.7.0 Authentication successful