How to Install and Uninstall postgrey.noarch Package on Red Hat Enterprise Linux 9 (RHEL 9)
Last updated: November 29,2024
1. Install "postgrey.noarch" package
This guide covers the steps necessary to install postgrey.noarch on Red Hat Enterprise Linux 9 (RHEL 9)
$
sudo dnf update
Copied
$
sudo dnf install
postgrey.noarch
Copied
2. Uninstall "postgrey.noarch" package
Please follow the instructions below to uninstall postgrey.noarch on Red Hat Enterprise Linux 9 (RHEL 9):
$
sudo dnf remove
postgrey.noarch
Copied
$
sudo dnf autoremove
Copied
3. Information about the postgrey.noarch package on Red Hat Enterprise Linux 9 (RHEL 9)
Last metadata expiration check: 0:06:11 ago on Mon Feb 26 07:04:30 2024.
Available Packages
Name : postgrey
Version : 1.37
Release : 17.el9
Architecture : noarch
Size : 51 k
Source : postgrey-1.37-17.el9.src.rpm
Repository : epel
Summary : Postfix Greylisting Policy Server
URL : http://postgrey.schweikert.ch/
License : GPLv2+
Description : Postgrey is a Postfix policy server implementing greylisting. When a request
: for delivery of a mail is received by Postfix via SMTP, the triplet CLIENT_IP /
: SENDER / RECIPIENT is built. If it is the first time that this triplet is
: seen, or if the triplet was first seen less than 5 minutes, then the mail gets
: rejected with a temporary error. Hopefully spammers or viruses will not try
: again later, as it is however required per RFC.
Available Packages
Name : postgrey
Version : 1.37
Release : 17.el9
Architecture : noarch
Size : 51 k
Source : postgrey-1.37-17.el9.src.rpm
Repository : epel
Summary : Postfix Greylisting Policy Server
URL : http://postgrey.schweikert.ch/
License : GPLv2+
Description : Postgrey is a Postfix policy server implementing greylisting. When a request
: for delivery of a mail is received by Postfix via SMTP, the triplet CLIENT_IP /
: SENDER / RECIPIENT is built. If it is the first time that this triplet is
: seen, or if the triplet was first seen less than 5 minutes, then the mail gets
: rejected with a temporary error. Hopefully spammers or viruses will not try
: again later, as it is however required per RFC.