06-06-2004
blocking their ip at the firewall is the right thing to do. however theres gonna be other people that are gonna try the same thing. you could write a daemon to moniter the mail log file, and for every relay request that is denied you could add the originating ip to the list of ip's to be blocked.
7 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
I just wanted to know when dealing with key loggers, What would be a normal routine for searching them out. I really don't know what I am looking for other than odd process. Also packet sniffers. What are signs? (0 Replies)
Discussion started by: blanks
0 Replies
2. Cybersecurity
Hi there,
Due to limited resource available in my network, I had to allow users comming from internet to telnet my SCO UNIXWARE box directly, like:
telnet 23.1.1.2, anyone can access. I can't make it secure based on IP addresses or hostnames since IP address is dynamic. I have made all the... (9 Replies)
Discussion started by: tayyabq8
9 Replies
3. IP Networking
hi all.
Am using smtpd_recipient_restrictions & check_recipient_access in postfix.
The hash file looks like this:
emailaddress1 HOLD
emailaddress2 HOLD
The aim is to place email from these recipients in the hold directory,check them then reinject them back in postfix on some... (0 Replies)
Discussion started by: coolatt
0 Replies
4. UNIX for Dummies Questions & Answers
Hi guys
One of our clients have a problem with sending email to a certain domain. No matter what we try, the mails just dont get delivered.
What I did then, is created a new connector on their Exchange server, pointing all mail sent to their client at "domain1" to relay to our Postfix mail... (0 Replies)
Discussion started by: wbdevilliers
0 Replies
5. Ubuntu
Guys, if i want to set a mail server for sending to internet users, what i should add to mydestination = in postfix main.cf ?
Thanks so much. (1 Reply)
Discussion started by: XP_2600
1 Replies
6. UNIX for Dummies Questions & Answers
In an effort to adapt to best security practices, it has been suggested that a number of scripts that are going to be distributed to multiple machines across an internal network use be modified to replace instances of rsh and rcp with openSSH ssh and scp. Since there are so many references to rsh... (1 Reply)
Discussion started by: jasondj
1 Replies
7. UNIX and Linux Applications
I have a mailserver with postfix
i want to alias all mail for administrator@domain.fqdn
to root@domain.fqdn
I have the aliases configured,and i did newliases
but doesn't work.
How to did this?Postfix is configured for virtual domain on ad server. (2 Replies)
Discussion started by: Linusolaradm1
2 Replies
LEARN ABOUT CENTOS
doveadm-log
DOVEADM-LOG(1) Dovecot DOVEADM-LOG(1)
NAME
doveadm-log - Locate, test or reopen Dovecot's log files
SYNOPSIS
doveadm [-Dv] log errors [-s min_timestamp]
doveadm [-Dv] log find [directory]
doveadm [-Dv] log reopen
doveadm [-Dv] log test
DESCRIPTION
The doveadm log commands are used to locate and reopen the log files of dovecot(1). It's also possible to test the configured targets of
the *log_path settings.
OPTIONS
Global doveadm(1) options:
-D Enables verbosity and debug messages.
-v Enables verbosity, including progress counter.
COMMANDS
log errors
doveadm log errors [-s min_timestamp]
The log errors command is used to show the last - up to 1,000 - errors and warnings. If no output is generated, no errors have occurred
since the last start.
-s min_timestamp
An integer value, representing seconds since the epoch - also known as Unix timestamp. When a min_timestamp was given, doveadm(1)
will only show errors occurred since that point in time.
log find
doveadm log find [directory]
The log find command is used to show the location of the log files, to which dovecot(1) sends its log messages. If dovecot(1) logs its
messages through syslogd(8) and doveadm(1) could not find any log files, you can specify the directory where your syslogd writes its log
files.
log reopen
doveadm log reopen
This command causes doveadm to reopen all log files, configured in the log_path, info_log_path and debug_log_path settings. These settings
are configured in /etc/dovecot/conf.d/10-logging.conf.
This is for example useful after manually rotating the log files.
log test
doveadm log test
This command causes doveadm to write the message "This is Dovecot's priority log (timestamp)" to the configured log files. The used prior-
ities are: debug, info, warning, error and fatal.
EXAMPLE
This example shows how to locate the log files used by dovecot(1).
doveadm log find
Looking for log files from /var/log
Debug: /var/log/dovecot.debug
Info: /var/log/mail.log
Warning: /var/log/mail.log
Error: /var/log/mail.log
Fatal: /var/log/mail.log
REPORTING BUGS
Report bugs, including doveconf -n output, to the Dovecot Mailing List <dovecot@dovecot.org>. Information about reporting bugs is avail-
able at: http://dovecot.org/bugreport.html
SEE ALSO
doveadm(1)
Dovecot v2.2 2013-11-24 DOVEADM-LOG(1)