-
-
Notifications
You must be signed in to change notification settings - Fork 845
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Every mail is tagged by RSPAMD as RCVD_NO_TLS_LAST #1705
Comments
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions. |
This issue has not seen activity since as it has become stale. It will now be automatically closed. Please note that this is an automatic action, and not meant in any offensive way. |
The faulty code is at https://github.com/rspamd/rspamd/blob/0b88d35b45dcea804e47a9236a5e0244b9b70c4e/rules/misc.lua#L263 ... It should filter out LMTP |
As clarified by @ghostwheel42, the problem is that nginx does the SSL termination and the PROXY protocol used in between nginx and postfix looses the information. Options are:
|
2033: Misc r=mergify[bot] a=nextgens ## What type of PR? bug-fix ## What does this PR do? - Remove /dkim from the rspamd container in setup as that's not necessary anymore; `@micw` helms-chart should probably be updated too. There is an open question on whether we want to keep it on admin. We can either have DKIM keys auto-imported to the DB on upgrade (if they exist) or provide a facility to manually import them (so that the directory can be removed altogether). Having the former doesn't allow for removing /dkim from admin. `@Diman0` any opinion on what we want for 1.9? - Remove spam points from RCVD_NO_TLS_LAST as we don't detect whether TLS was used or not. ### Related issue(s) - close #1705 ## Prerequisites Before we can consider review and merge, please make sure the following list is done and checked. If an entry in not applicable, you can check it or remove it from the list. - [x] In case of feature or enhancement: documentation updated accordingly - [x] Unless it's docs or a minor change: add [changelog](https://mailu.io/master/contributors/workflow.html#changelog) entry file. Co-authored-by: Florent Daigniere <nextgens@freenetproject.org>
This should enable postfix to have visibility on TLS usage and fix the following: Mailu#1705
2603: Enable HAPROXY protocol on SUBNET r=mergify[bot] a=nextgens ## What type of PR? bug-fix ## What does this PR do? - Enable HAPROXY in between front and imap: With this we avoid running into the limitations of ``mail_max_userip_connections`` and the logfiles reflect the real IP. - Enable HAPROXY in between front and smtp: with this postfix and rspamd are aware of whether TLS was used or not on the last hop. In practice this won't work as nginx doesn't send PROTO yet. - Discard redundant log messages from postfix With all of this, not only are the logs easier to understand but ``doveadm who`` also works as one would expect. ### Related issue(s) - closes #894 - #1328 - closes #1364 - #1705 ## Prerequisites Before we can consider review and merge, please make sure the following list is done and checked. If an entry in not applicable, you can check it or remove it from the list. - [ ] In case of feature or enhancement: documentation updated accordingly - [x] Unless it's docs or a minor change: add [changelog](https://mailu.io/master/contributors/workflow.html#changelog) entry file. Co-authored-by: Florent Daigniere <nextgens@freenetproject.org>
This should enable postfix to have visibility on TLS usage and fix the following: Mailu#1705
This should enable postfix to have visibility on TLS usage and fix the following: Mailu#1705
Thank you for opening an issue with Mailu. Please understand that issues are meant for bugs and enhancement-requests.
For user-support questions, reach out to us on matrix.
To be able to help you best, we need some more information.
Before you open your issue
Mailu
is made by volunteers in their free time — be conscise, civil and accept that delays can occur.Environment & Versions
Environment
Versions
My version is 1.7
Description
Every mail received also from GMAIL is marked by RSPAMD as RCVD_NO_TLS_LAST.
Is normal because I think that mail from famous provider use TLS
Replication Steps
Simply send an email from gmail anch check RSPAMD history
Expected behaviour
I expected to recieve an email with TLS in each step.
Thanks
Thank you very much for this wonderful project that makes it possible for everyone to build a mail server
The text was updated successfully, but these errors were encountered: