Backtrack:  
 
showing posts tagged with 'mail'
 
edited by on June 2nd 2015, at 14:01

MXToolBox now also checks DKIM:

http://mxtoolbox.com/dkim.aspx

To use, enter your domain name follow by a colon (:), then the DKIM selector to check (e.g. default)

Example:
mydomain.com:default
edited by on December 10th 2014, at 13:16

Found this online blacklist lookup tool. It checks even more lists than the one at mxtoolbox.com:

http://multirbl.valli.org/lookup/

edited by on September 4th 2014, at 11:52

To generate an SPF-record for your domain with the proper syntax, you can use the wizard at:

http://www.spfwizard.net/

To verify an SPF-record after it's in place:

http://mxtoolbox.com/spf.aspx

Read more on SPF: http://www.openspf.org/

edited by on December 5th 2013, at 09:08

By default, when using a Telenet address on your smartphone, the Telenet mailserver (uit.telenet.be will not accept messages if they're not sent from within the Telenet network (e.g. when using Proximus, Mobistar or some other ISP or cellular operator).

You can resolve the issue by adding SMTP authentication to your outgoing mailserver settings. Simply add your username and password, and you will be able to send mail using Telenet SMTP.

edited by on November 14th 2011, at 14:52
While unsupported, iCloud still allows access to your e-mail via IMAP, and sending via SMTP. Apple has published the necessary parameters for manually configuring your e-mail client to use the iCloud service.

Server name: imap.mail.me.com

SSL required: yes

Port: 993 (is set by default)

Username: example@me.com (use your @me.com address from your iCloud account)

Password: Your iCloud password

Server name: smtp.mail.me.com

SSL required: yes

Port: 587

SMTP authentication required: Yes

Username: example@me.com (use your @me.com address from your iCloud account)

Password: Your iCloud password

SSL is required for both IMAP and SMTP. POP3 is not supported.

Source: http://support.apple.  ...
edited by on September 28th 2011, at 12:23
If you wish to restrict SMTP access via IP addresses or a network range, one way to do it would be via Postfix configuration. You can set up restrictions using a Postfix hash-table or via a cidr file. You can choose one or both methods to perform the restrictions. The end-result will be the same.

Create a text file with the addresses you would like to reject. You can choose whatever file name you wish. E.g.: /etc/postfix/smtp_client_access

Its content should be something like:

192.168.0.1 REJECT Stop mailing us192.168.0.2 REJECT Stop mailing us192.168.1 REJECT Stop mailing us

Next, postmap it by running:

postmap /etc/postfix/smtp_client_access

Then add/edit this in your main.cf:

smtpd  ...
edited by on June 8th 2011, at 14:41

A good explanation about setting up SPF-records for domains can be found here:

http://www.openspf.org/SPF_Record_Syntax

edited by on April 14th 2010, at 20:31
When you yourself are sending out e-mail to others, your recipients might complain about them not being able to open this e-mail. This is because you're probably using Outlook (with Exchange) and are sending e-mail in RTF-format.
Using RTF in a mail is generally a bad idea, because it's not an internet standard for e-mail layouting. RTF was introduced a while back by Microsoft, but has since been superseded for the widely adopted HTML; even Outlook 2007 now defaults to HTML.

So, to get rid of the winmail.dat, simply set your mail format to HTML (instead of RTF).

In Outlook, on the Tools menu, click Options.

Click the Mail Format (or Send tab).

See the message format list. Change it to ei  ...
edited by on April 14th 2010, at 20:22

Like any other MTA, Postfix has a maximum message size that it allows to pass through. By default, when not defined, it is set to 10 MB.
To change it, add/change the following in main.cf:

message_size_limit = 15728640

This sets the limit to 15 MB. To make it unlimited, set it to 0.

edited by on January 6th 2010, at 10:18
Versions 3.2 of SpamAssassin have (until very recently) a bug in their rules which would mark mails dated 2010 (this year) as being spam.

The reason for this is that a rule exists which would add an additional score of 3.2 to mails with a date set to 2010, because when the rule was created, the date would be in the very far future. Of course, this is no longer the case.

The bug was already discovered in 2008, and resolved in the SpamAssassin repositories, but was not backported to 3.2 until 2010-01-01, when the issue was discovered by Mike Cardwell, a developer in the UK.

Users with this problem can easily resolve it by updating the rules:

sa-update

This changes the regexp so it exclude  ...
edited by on August 8th 2007, at 13:15

In absence of a decent article, here's a good resource page for performance tuning of DSPAM:

http://dspamwiki.expass.de/Performance_Tuning

edited by on April 23rd 2007, at 23:33
Spam nowadays is a real pain. While linux users are fairly safe against most common viiri and spyware, spam mail affects everyone.
While there are many spamfilters out there, I've found that only one is pretty effective, on the long run as well. This guide provides a solution to implementing this filter into KMail for local scanning, filtering and retraining.

A working KMail configuration for scanning and retraining spamfilter with POP3 accounts (IMAP is not supported because mail doesn't really get "downloaded").

A DSPAM 3.6.x using the hash_drv, with training data stored in the user's homedir (~/.dspam)

KMail (of course)

A sane build environment (gcc and co)

Superuser access (for DSPA  ...
edited by on November 27th 2006, at 21:28

Got this link from a colleague:
http://www.linuxjournal.com/article/9454

It describes the inner workings of Postfix, the well-known mailserver for Linux.

 
showing posts tagged with 'mail'
 
 
« December 2024»
SunMonTueWedThuFriSat
1234567
891011121314
15161718192021
22232425262728
293031    
 
Links
 
Quote
« Most people tend to avoid true conflict. Ironically this breeds more conflict. »