Most likely you are visiting this page due to issues with our mail systems. Please refer to the information below for help, and contact postmaster@ipfire.org only if your question was not answered.
IP address | FQDN and PTR | Location |
81.3.27.42 |
mail01.ipfire.org |
Hanover, DE |
2001:678:b28::25 |
mail01.ipfire.org |
Hanover, DE |
Our mail infrastructure processes up to 100 MiB per message. Please consider alternate submission channels (mirror, rsync, ...) for bigger files.
Our mail servers support transport encryption via STARTTLS
using TLSv1.2
to TLSv1.3
(preferred) with opportunistic DANE support enabled. RSA
and ECDSA
(preferred) certificates are provided in both SMTP server and client scenario, and can be validated by using DANE. ipfire.org
and most other domains served by the project's mail infrastructure are DNSSEC-signed.
We enforce TLSv1.2
or better and Forward Secrecy for inbound and outbound SMTP traffic. Fallback to plaintext is possible unless the destination announces DANE support; please ensure your mail systems are capable of modern transport encryption.
For security reasons, TLSv1.0 and TLSv1.1 are not supported.
Our mail infrastructure applies the following criteria on both incoming and outgoing messages (except for the first one for obvious technical reasons) and refuses to deliver mails that violate one of these:
Reply-To
header, DKIM signatures, the HELO
/EHLO
banner of the submitting server and the PTR of its IP address.document.pdf.exe
.ade
(Microsoft Access Project Extension)adp
(Microsoft Access Project)asx
(Windows Media Audio/Video)bas
(Microsoft Visual Basic class module)bat
(batch file)cmd
(Microsoft Windows NT Command Script)com
(MS-DOS executable file)cpl
(system control file)exe
(executable file)hlp
(Microsoft Help file)hta
(HTML program)inf
(setup information)ins
(Internet Naming Service)iso
(ISO images)isp
(Internet Communication Settings)jnlp
(Java Network Launching Protocol)js
(JavaScript file)jse
(JavaScript encoded file)msc
(Microsoft Console Program) msi
(Microsoft Installation Package)msp
(Microsoft Installation Patch)mst
(Microsoft Installation Program or Visual Test Source file)pcd
(Photo CD file or Visual compiled script)pif
(MS-DOS Shortcut)prf
(Microsoft Outlook Profile file)rpmsg
(restricted-permission message)scf
(Windows Explorer file)scr
(Microsoft Screensaver program)sct
(Windows Script File)sfx
(self-extracting Zip-archive)shb
(Shell Scrap File)shs
(Shell Scrap Object)vb
(VBScript file)vbe
(encoded VBScript file)vbs
(VBScript file)vsmacros
(Visual Studio .NET binary-based macro project)vss
(Visio Stencil)vst
(Visio Template)vsw
(Visio Workspace file)ws
(Windows Script file)wsc
(Windows Script component)wsf
(Windows Script file)wsh
(Windows Scripting Host settings)xll
(Excel add-in file)reject
policy will be rejected, with some exceptions for popular mailing lists breaking both SPF and DKIM. As mentioned above, we generally honour DMARC reject
policies unless this causes automated unsubscribing due to excessive bounces. ipfire.org
and other domains handled by our mail infrastructure are either announcing a DMARC quarantine
or reject
policy, depending on the mail characteristics for the domain in question.
Suspicious and potentially dangerous messages will be greylisted to give our content scanners more time to classify them. If your MTA has a slightest clue of RFCs, there is no need to ask us for being "whitelisted" from greylisting.
Our mail servers are covered by ID 58468 at DNSWL.org. We strive for a good reputation of these, and honor DNSWL listings of SMTP clients as well in order to reduce false positives.
Repeated user complaints will lead to appropriate escalation blacklistings of the senders' IP networks and domains. Should this affect you, please do not contact us; if you don't want to be treated as a spammer, don't behave like one.
Older Revisions • May 23 at 8:26 pm • Peter Müller