| Commit message (Collapse) | Author | Age | Files | 
| |  | 
 | 
| | 
| 
| 
| 
| 
| 
| 
| 
| 
|  | 
We already removed it from the MX:es (see 32e605d4); we need to remove
it from the MDA and outgoing SMTP as well, otherwise mails could bounce
or get stuck in the middle (the're rejected with 450: deferred by
default).
However we can keep the restriction on the entry points (MSA and
webmail).
 | 
| | 
| 
| 
| 
| 
| 
| 
| 
| 
| 
|  | 
See http://www.postfix.org/POSTSCREEN_README.html and
    http://rob0.nodns4.us/postscreen.html
It's infortunate that smtpd(8) cannot be chrooted any longer, which
means that we have to un-chroot cleanup(8) as well.  Indeed, currently
smtpd(8) uses $virtual_alias_maps for recipient validation; later
cleanup(8) uses it again for rewriting.  So these processes need to be
both chrooted, or both not.
 | 
| |  | 
 | 
| | 
| 
| 
| 
|  | 
First generate all certs (-t genkey), then build the TLS policy maps (
-t tls_policy).
 | 
| |  | 
 | 
| | 
| 
| 
| 
| 
|  | 
(Unless a new instance is created, or the master.cf change is modified.)
Changing some variables, such as inet_protocols, require a full restart,
but most of the time it's overkill.
 | 
| | 
| 
| 
| 
| 
|  | 
And don't restart or reload either upon change of pcre: files that are
used by smtpd(8), cleanup(8) or local(8), following the suggestion from
http://www.postfix.org/DATABASE_README.html#detect .
 | 
| | 
| 
| 
|  | 
For DKIM signing and virus checking.
 | 
| | 
| 
| 
| 
|  | 
For some reason giraff doesn't like IPSec.  App-level TLS sessions are
less efficient, but thanks to ansible it still scales well.
 | 
|    | 
 |