milter | A powerful pymilter based anti-spam milter used by BMS

 by   sdgathman Python Version: milter-0.9 License: GPL-2.0

kandi X-RAY | milter Summary

kandi X-RAY | milter Summary

milter is a Python library. milter has no bugs, it has no vulnerabilities, it has build file available, it has a Strong Copyleft License and it has low support. You can download it from GitHub.

This repo has three python milter packages.
Support
    Quality
      Security
        License
          Reuse

            kandi-support Support

              milter has a low active ecosystem.
              It has 5 star(s) with 0 fork(s). There are 1 watchers for this library.
              OutlinedDot
              It had no major release in the last 12 months.
              There are 2 open issues and 0 have been closed. On average issues are closed in 944 days. There are no pull requests.
              It has a neutral sentiment in the developer community.
              The latest version of milter is milter-0.9

            kandi-Quality Quality

              milter has no bugs reported.

            kandi-Security Security

              milter has no vulnerabilities reported, and its dependent libraries have no vulnerabilities reported.

            kandi-License License

              milter is licensed under the GPL-2.0 License. This license is Strong Copyleft.
              Strong Copyleft licenses enforce sharing, and you can use them when creating open source projects.

            kandi-Reuse Reuse

              milter releases are available to install and integrate.
              Build file is available. You can build the component from source.

            Top functions reviewed by kandi - BETA

            kandi has reviewed milter and discovered the below as its top functions. This is intended to give you an instant insight into milter implemented functionality, and help decide if they suit your requirements.
            • Set email from file
            • Check to see if trusted_forwarder is set
            • Get the spf - pass policy
            • Add a recipient
            • Sets rcpt parameter
            • Get a greylist object
            • Return the network mask of an IP address
            • Convert a string to a dictionary
            • Send eom process
            • Check the DKIM signature
            • Alters recipients based on discard_list
            • Apply new headers
            • Read the mail from the server
            • Send a forged mail
            • Return the response
            • Return a greylist instance
            • Send hello message
            • Send hello message
            • Send a chunk of body
            • Output the template
            • Establish a connection
            • Set mailfrom
            • Initialize connection
            • Handle a single header
            • Read configuration file
            • Abort the message
            Get all kandi verified functions for this library.

            milter Key Features

            No Key Features are available at this moment for milter.

            milter Examples and Code Snippets

            No Code Snippets are available at this moment for milter.

            Community Discussions

            QUESTION

            Don't want that Postfix+Dovecot reject "recipient not found" mails
            Asked 2021-Jun-01 at 15:13

            I'm writing a Milter for Postfix, that handles incoming messages in a server (Postfix+Dovecot) with virtual domains and users. Communication beetweend Postfix and the Milter are done with the Sendmail Milter Protocol V 2

            I really need that Dovecot (and Postfix by consequence) does not reject messages with invalid recipient, because I need the Milter to do this check (and reject as weel).

            This is needed because i'm writing a PEC mail server (Pec stand for Posta Elettronica Certificata, that is an Italian implementation for certified mail).

            When receiving mails with incorrect recipient, I need to produce a specific receipt in a form of an e-mail.

            But Postfix in this case (told by dovecot) reject the mail BEFORE sending it to the Milter.

            I've tried to search this in the documentation, but were not able to find this specific need.

            I've attached PostFix configuration....

            ...

            ANSWER

            Answered 2021-Jun-01 at 15:13

            I've found a solution:

            I need to set in main.cf

            Source https://stackoverflow.com/questions/67722896

            QUESTION

            Ubuntu 20.04 Installation of Spamassassin fails on "chmod: cannot access '/var/lib/spamassassin/compiled'"
            Asked 2021-Jan-28 at 17:06

            for a while now I am trying to install Spamassassin properly as root user with 'apt install spamassassin spamc'. The installation fails when it runs sa-compile producing following output:

            ...

            ANSWER

            Answered 2021-Jan-15 at 09:01

            This seems like apt's problem (not SpamAssasin's). Please follow the general steps for solving this type of problems and let us know if they helped.

            Source https://stackoverflow.com/questions/65728142

            QUESTION

            Django + Postfix + Gmail + openDKIM -avamis > dkim = neutral (body hash did not verify)
            Asked 2018-Apr-24 at 09:52

            I have followed this tutorial to configure DKIM and Postfix on Debian 7 wheezy. These instructions are pretty much a standard on the interwebz.

            I am using Gmail to send and receive emails using my own domain. I followed this instructions to achieve that.

            My problem

            I can send and receive emails but I can't manage to pass the DKIM test (at least with Gmail). After searching and struggling for a while I have come to the conclusion that the reason of my woes is that my message is getting multiple DKIM signatures (see mail.log below). And this, according to the DKIM directives is enough for the DKIM to fail.

            But after reading about on how to solve the multiple signatures problem I found that absolutely all of these solutions refer to having 'amavis' installed. Thing is...I don't have it installed!

            In any case these solutions mention changing postfix configurations related to the milters in master.cnf and/or main.cfn. For example, adding this to the 'receive_override_options' (again, I don't have that variable since I don't have amavis installed) should solve the issue:

            ...

            ANSWER

            Answered 2018-Apr-24 at 09:52

            I managed to fix this some time ago after several trails and errors. Problem is I don't remember what exactly I did to solve it. I was playing with several parameters -sometimes simultaneously- without keeping any track (my bad). However, at some point everything worked!

            Here are my configuration files. Hope they can guide/help someone.

            /etc/postfix/master.cf

            Source https://stackoverflow.com/questions/45886766

            QUESTION

            postfix: Milter being notified that a client authentication has failed?
            Asked 2017-Nov-27 at 17:08

            Is there any way that a milter under postfix can be told that a given client connection attempt failed specifically because of an authentication error?

            Sometimes, my email server gets blasted with repeated SMTP authentication attempts from the same client, presumably in order to try to break through my security. I'm running a milter, and these attempts show up as a CONNECT followed by a CLOSE, with an error message in my postfix log that contains info like this:

            ...

            ANSWER

            Answered 2017-Nov-27 at 17:08

            Well, after a week, I've gotten no responses, and I haven't found any way to make this happen. I will now assume that the answer to my question is "no".

            Source https://stackoverflow.com/questions/47403089

            QUESTION

            postfix: timing of client responses in a milter and in after-queue processing?
            Asked 2017-Nov-25 at 00:03

            I'm currently using postfix-2.11.3, and I am doing a lot of message processing through a milter. This processing takes place before the client is notified that the message is accepted, and it sometimes involves enough work that it delays the client's receipt of the initial SMTP 250 2.0.0 Ok: queued as xxxxxxxxxxx message.

            During large email blasts to my server, this milter processing can cause a backlog, and in some cases, the client connections time out while waiting for that initial 250 ... message.

            My question is this: if I rewrite my milter as a postfix after-queue filter with no before-queue processing, will clients indeed get the initial 250 messages right away, with perhaps subsequent SMTP messages coming later? Or will the 250 message still be deferred until after postfix completes the after-queue filtering?

            And is it possible for an initial 250 message to be received by the client with a subsequent 4xx or 5xx message received and processed later by that same client, in case the after-queue filter decides to subsequently reject the message?

            I know I could test this by writing an after-queue filter. However, my email server is busy, and I don't have a test server available, and so I'd like to know in advance whether an after-queue filter can behave in this manner.

            Thank you for any wisdom you could share about this.

            ...

            ANSWER

            Answered 2017-Nov-25 at 00:03

            I managed to set up a postfix instance on a test machine, and I was able to install a dummy after-queue filter. This allowed me to figure out the answer to my question. It turns out that postfix indeed sends the 250 2.0.0 Ok: queued as xxxxxxxxxxx message before the after-queue filter completes.

            This means that I can indeed move my slower milter processing to the after-queue filter in order give senders a quicker SMTP response.

            Source https://stackoverflow.com/questions/47458732

            QUESTION

            Spam on my mail server
            Asked 2017-Mar-26 at 18:59

            I've created myself a mailserver with postfix, dovecot, spamasasin.. Was looking in the logs today and found a lot of this

            ...

            ANSWER

            Answered 2017-Mar-09 at 11:50

            Remove this
            mynetworks = 0.0.0.0/0 [::ffff:127.0.0.0]/104 [::1]/128
            And put only your networks
            Your server is working as open relay

            Source https://stackoverflow.com/questions/42651482

            Community Discussions, Code Snippets contain sources that include Stack Exchange Network

            Vulnerabilities

            No vulnerabilities reported

            Install milter

            You can download it from GitHub.
            You can use milter like any standard Python library. You will need to make sure that you have a development environment consisting of a Python distribution including header files, a compiler, pip, and git installed. Make sure that your pip, setuptools, and wheel are up to date. When using pip it is generally recommended to install packages in a virtual environment to avoid changes to the system.

            Support

            For any new features, suggestions and bugs create an issue on GitHub. If you have any questions check and ask questions on community page Stack Overflow .
            Find more information at:

            Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items

            Find more libraries
            CLONE
          • HTTPS

            https://github.com/sdgathman/milter.git

          • CLI

            gh repo clone sdgathman/milter

          • sshUrl

            git@github.com:sdgathman/milter.git

          • Stay Updated

            Subscribe to our newsletter for trending solutions and developer bootcamps

            Agree to Sign up and Terms & Conditions

            Share this Page

            share link