101010.pl is one of the many independent Mastodon servers you can use to participate in the fediverse.
101010.pl czyli najstarszy polski serwer Mastodon. Posiadamy wpisy do 2048 znaków.

Server stats:

483
active users

#opensmtpd

0 posts0 participants0 posts today
Tom<p><span class="h-card" translate="no"><a href="https://mastodon.bsd.cafe/@stefano" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>stefano</span></a></span> <span class="h-card" translate="no"><a href="https://exquisite.social/@h3artbl33d" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>h3artbl33d</span></a></span> <span class="h-card" translate="no"><a href="https://pleroma.anduin.net/users/ltning" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>ltning</span></a></span> <span class="h-card" translate="no"><a href="https://justfollow.me.uk/@sborrill" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>sborrill</span></a></span> yeah I run Dovecot on my <a href="https://mastodon.bsd.cafe/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenBSD</span></a> mail server (with <a href="https://mastodon.bsd.cafe/tags/opensmtpd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensmtpd</span></a> of course). Will be dreading the 2.4 "upgrade" unless I can find something better.</p>
h3artbl33d :openbsd: :ve:<p><span class="h-card" translate="no"><a href="https://mastodon.bsd.cafe/@fosdembsd" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>fosdembsd</span></a></span> <span class="h-card" translate="no"><a href="https://mastodon.bsd.cafe/@stefano" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>stefano</span></a></span> <span class="h-card" translate="no"><a href="https://io.mwl.io/@mwl" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>mwl</span></a></span> </p><p>I read that book while travelling to EuroBSDcon. Totally alleviated my pains - by realizing how much I like <a href="https://exquisite.social/tags/OpenSMTPD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSMTPD</span></a> :flan_hacker:</p>
horia<p>Meta ignores RFC 2920; can't send mail to servers running <a class="mention u-url" href="https://honk.vedetta.com/o/opensmtpd" rel="nofollow noopener" target="_blank">#OpenSMTPD</a> <a class="mention u-url" href="https://marc.info/?l=openbsd-misc&amp;m=174990790228139&amp;w=2" rel="nofollow noopener" target="_blank">https://marc.info/?l=openbsd-misc&amp;m=174990790228139&amp;w=2</a></p>
Tom<p>Hey <a href="https://mastodon.bsd.cafe/tags/BSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BSD</span></a> friends! </p><p>Is there a way to set up oauth2 on Dovecot for authentication? (All local Auth, no Google or Microsoft involved). Do I have to run some big chunky java blob like keycloak or is there a much lighter weight implementation C somewhere? </p><p><a href="https://mastodon.bsd.cafe/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenBSD</span></a> <a href="https://mastodon.bsd.cafe/tags/dovecot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dovecot</span></a> <a href="https://mastodon.bsd.cafe/tags/opensmtpd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensmtpd</span></a> <a href="https://mastodon.bsd.cafe/tags/oauth2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>oauth2</span></a></p>
h3artbl33d :openbsd: :ve:<p>The SSD in my mailserver has 19,782 power on hours (which is 825 days, little over two years) with 'just' 13 powercycles. And let me tell you, those 13 powercycles are solely because I rebooted the system (upgrade, maintenance).</p><p>That is how rock-stable <a href="https://exquisite.social/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenBSD</span></a> and <a href="https://exquisite.social/tags/OpenSMTPD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSMTPD</span></a> are.</p>
kuijsten<p>I've released an SPF filter for OpenSMTPD: <a class="mention u-url" href="https://netsend.nl/opensmtpd-filter-spf/" rel="nofollow noopener" target="_blank">https://netsend.nl/opensmtpd-filter-spf/</a></p> <p><a class="mention u-url" href="https://honk.netsend.nl/o/opensmtpd" rel="nofollow noopener" target="_blank">#opensmtpd</a> <a class="mention u-url" href="https://honk.netsend.nl/o/milter" rel="nofollow noopener" target="_blank">#milter</a> <a class="mention u-url" href="https://honk.netsend.nl/o/spf" rel="nofollow noopener" target="_blank">#spf</a></p>
Laurent Cimon<p>Just had a huge fight with <a href="https://mastodon.bsd.cafe/tags/OpenSMTPD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSMTPD</span></a> about lmtp rcpt-to not expanding my aliases. I had to remove the rcpt-to but we made up and we’re in love again.</p><p>This could potentially be a bug. I don’t understand enough about mail to affirm that it’s a bug though.</p>
Michael Boelen<p>Working on another <a href="https://mastodon.social/tags/systemd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>systemd</span></a> hardening profile: OpenSMTPD</p><p><a href="https://linux-audit.com/systemd/hardening-profiles/opensmtpd/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">linux-audit.com/systemd/harden</span><span class="invisible">ing-profiles/opensmtpd/</span></a></p><p>Are you running <a href="https://mastodon.social/tags/opensmtpd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensmtpd</span></a> and got a little bit of time to test? Let's get this thing known to more <a href="https://mastodon.social/tags/sysadmin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sysadmin</span></a> and help them secure their <a href="https://mastodon.social/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> systems 💪</p>

Finished migrating the last service to my us-east openbsd hetzner vps from the previous finland freebsd vps (for much better latency). All that's left is setting up spamd. I previously used rspamd, but I wanted to try using what was already in base. :flan_thumbs:

:flan_announcer: I completely forgot to post about the OpenSMTPD 7.6 release! I'm so late that we also did 7.6.0p1 in the meantime, but that's only because I forgot a few files in the tarball :flan_disappointed:

opensmtpd.org/

Among a few goodies, please remember to update the external tables if you're using any. The OpenSMTPD-extras package was split into per-tables repositories, and the communication protocol was changed. Once the executables are updated, no further changes are needed!

On OpenBSD, that means a `pkg_delete opensmtpd-extra` and then install right table, for example `pkg_add opensmtpd-table-passwd` for table-passwd.

www.opensmtpd.orgOpenSMTPDthe main OpenSMTPD page

OK #opensmtpd aficionados. I've read the docs, but can' figure this out. Help!

I send a colleague and email the other day, but he didn't get it due to some DNS-related breakage on his side.

On my side this triggered an immediate:
```
... result="PermFail" stat="Domain does not exist"
```

But I didn't get any bounce email telling me that the email had been dropped.

Is there a way to have opensmtpd send me an email informing me of the permfail?

Sharing some technical details about how I'm setting up the hosted email service. It will not be a service of BSD Cafe but tied to my own business. It will run entirely on BSD systems and on bare metal, NOT on "cloud" VPS. It will use FreeBSD jails or OpenBSD or NetBSD VMs (but on bhyve, on a leased server - I do not want user data to be stored on disks managed by others). The services (opensmtpd and rspamd, dovecot, redis, mysql, etc.) will run on separate jails/VMs, so compromising one service will NOT put the others at risk. Emails will be stored on encrypted ZFS datasets - so all emails are encrypted at rest - and only dovecot will have access to the mail datasets. I'm also considering the possibility of encrypting individual emails with the user's login password - but I still have to thoroughly test this. The setup will be fully redundant (double mx for SMTP, a domain for external IMAP access that will be managed through smart DNS - which will distribute the connections on the DNS side and, in case of a server down, will stop resolving its IP, sending all the connections to the other. Obviously, everything will be accessible in both ipv4 and ipv6 and in two different European countries, on two different providers. Synchronization will occur through dovecot's native sync (extremely stable and tested). All technical choices will be clearly explained - the goal of this service is to provide maximum transparency to users on how things will be handled.

#BSD#FreeBSD#OpenBSD