- Timestamp:
- 12/30/2023 05:33:09 AM (4 months ago)
- Branches:
- 12.1, ken/TL2024, lazarus, plabs/newcss, rahul/power-profiles-daemon, trunk, xry111/llvm18
- Children:
- d8ce086
- Parents:
- 418dddd
- File:
-
- 1 edited
Legend:
- Unmodified
- Added
- Removed
-
server/mail/postfix.xml
r418dddd rd524862 10 10 <!ENTITY postfix-download-http "https://ghostarchive.org/postfix/postfix-release/official/postfix-&postfix-version;.tar.gz"> 11 11 <!ENTITY postfix-download-ftp " "> 12 <!ENTITY postfix-md5sum " 7edfadf15fafe73523266829172d890f">12 <!ENTITY postfix-md5sum "f2e5ac23387a5824bc365675697277e9"> 13 13 <!ENTITY postfix-size "4.6 MB"> 14 <!ENTITY postfix-buildsize " 156MB">14 <!ENTITY postfix-buildsize "208 MB"> 15 15 <!ENTITY postfix-time "0.2 SBU (Using parallelism=4)"> 16 16 ]> … … 407 407 echo 'alias_database = lmdb:/etc/aliases' >> /etc/postfix/main.cf && 408 408 echo 'alias_maps = lmdb:/etc/aliases' >> /etc/postfix/main.cf</userinput></screen> 409 410 <para> 411 To protect your server against the recent SMTP smuggling attacks, 412 additonal steps are required. Add two lines into 413 <filename>/etc/postfix/mail.cf</filename> to disconnect remote SMTP 414 clients that send bare newlines, while also allowing clients on your 415 network with non-standard SMTP implementations to still send mail: 416 </para> 417 418 <screen role="root"><userinput>echo 'smtpd_forbid_bare_newline = yes' >> /etc/postfix/main.cf && 419 echo 'smtpd_forbid_bare_newline_exclusions = $mynetworks' >> /etc/postfix/main.cf</userinput></screen> 409 420 410 421 <para>
Note:
See TracChangeset
for help on using the changeset viewer.