Re: How do I stop getting multiple copies of emails from "always_bcc" option?

2021-03-03 Thread Steve Dondley
Thanks for your help Wietse. I had actually started reading it a few minutes ago. It's a tough read for a new guy. I'm having to learn mostly with a lot of trial, error and experimentation. I gotta go track down that postfix book I downloaded a while ago. On Wed, Mar 3, 2021 at 6:53 PM Wietse

Re: MAIL FROM: <""> ??

2021-03-03 Thread Noel Jones
On 3/3/2021 1:39 PM, Marek Kozlowski wrote: One user's password has been compromised. Someone had authenticated as this user (SASL) and was able to send mail with: Return-Path: <> These are bounces or Non Delivery Notices. You should not disable these. Quite possibly the mail originated

Re: How do I stop getting multiple copies of emails from "always_bcc" option?

2021-03-03 Thread Wietse Venema
Steve Dondley: > OK, I found some guidance here: > http://www.postfix.org/ADDRESS_REWRITING_README.html > > Adding in "-o receive_override_options=no_address_mappings" to the > smtpd section worked. > > I really don't understand the master configuration file at all, > however. Is there a good

Re: How do I stop getting multiple copies of emails from "always_bcc" option?

2021-03-03 Thread Wietse Venema
Steve Dondley: > I have enabled the always_bcc setting with: > > always_bcc = exam...@example.org > > It works, but I'm getting everything three times. How do I prevent duplicates? Postfix by default deduplicates if one message has multiple identical recipients. However Postfix cannot

Re: How do I stop getting multiple copies of emails from "always_bcc" option?

2021-03-03 Thread Steve Dondley
OK, I found some guidance here: http://www.postfix.org/ADDRESS_REWRITING_README.html Adding in "-o receive_override_options=no_address_mappings" to the smtpd section worked. I really don't understand the master configuration file at all, however. Is there a good basic tutorial that explains it?

How do I stop getting multiple copies of emails from "always_bcc" option?

2021-03-03 Thread Steve Dondley
I have enabled the always_bcc setting with: always_bcc = exam...@example.org It works, but I'm getting everything three times. How do I prevent duplicates?

Re: restricting MAIL FROM:

2021-03-03 Thread @lbutlr
On 03 Mar 2021, at 12:45, @lbutlr wrote: > csmtpd_helo_restrictions = reject_invalid_helo_hostname Paste error. That should, of course, be smtpd_helo_restrictions = reject_invalid_helo_hostname check_helo_access pcre:/etc/postfix/helo_checks.pcre permit -- 'That's blasphemy,' said the

Re: restricting MAIL FROM:

2021-03-03 Thread @lbutlr
> On 03 Mar 2021, at 09:33, Paul Netpresto wrote: > > Hi > > What is the best way to block MAIL FROM: addresses where the username > component begins with a '$' character. Is this recommended or bad practice?. Why would you want to do that? The local part of the email address is defined

Re: MAIL FROM: <""> ??

2021-03-03 Thread Marek Kozlowski
:-) On 3/3/21 5:18 PM, Bill Cole wrote: On 3 Mar 2021, at 9:51, Marek Kozlowski wrote: :-) When testing my server via telnet ... 25 it works: MAIL FROM: <""> 250 2.1.0 Ok Rejections in SMTP based on client, helo, and sender policy criteria are normally postponed until the RCPT stage of the

Re: Settings for limiting abuse

2021-03-03 Thread Viktor Dukhovni
> On Mar 3, 2021, at 10:24 AM, Marek Kozlowski > wrote: > > One more question just for sure: 'a client' means 'an IP address' for the > setting mentioned in the previous mail? If so - postfix must store them > somewhere. Isn't there a risk of too much memory allocated for that purpose? > How

Re: Settings for limiting abuse

2021-03-03 Thread Jörg Backschues
Am 03.03.21 um 13:09 schrieb Marek Kozlowski: I mean protecting from the situation that one user's password has been compromised and it results in a lot of spam in being sent by our server (human's reaction takes a few minutes and it my be too much, I'm afraid). postfwd

restricting MAIL FROM:

2021-03-03 Thread Paul Netpresto
Hi What is the best way to block MAIL FROM: addresses where the username component begins with a '$' character. Is this recommended  or bad practice?. Thanks Paul

Re: MAIL FROM: <""> ??

2021-03-03 Thread Bill Cole
On 3 Mar 2021, at 9:51, Marek Kozlowski wrote: :-) When testing my server via telnet ... 25 it works: MAIL FROM: <""> 250 2.1.0 Ok Rejections in SMTP based on client, helo, and sender policy criteria are normally postponed until the RCPT stage of the transaction, no matter what the reason

Re: MAILER-DAEMON and time

2021-03-03 Thread Matus UHLAR - fantomas
On 2021-03-03 16:03, Matus UHLAR - fantomas wrote: On 2021-03-03 10:45, natan wrote: This is server for incomming e-mail with many vdomain and vusers On 03.03.21 11:38, Benny Pedersen wrote: number of domains is irrelevant for backscatter I check rbl in smtpd_recipient_restrictions ..  

Re: Rootless postfix

2021-03-03 Thread Emond Papegaaij
On Wed, Mar 3, 2021 at 4:15 PM Roberto Ragusa wrote: > On 2/25/21 10:43 AM, Emond Papegaaij wrote: > > We are hardening our services and would like to run postfix as a > > non-root user. All our primary services, including postfix run as > > docker containers. > > If you are inside a container,

Re: MAILER-DAEMON and time

2021-03-03 Thread Benny Pedersen
On 2021-03-03 16:03, Matus UHLAR - fantomas wrote: On 2021-03-03 10:45, natan wrote: This is server for incomming e-mail with many vdomain and vusers On 03.03.21 11:38, Benny Pedersen wrote: number of domains is irrelevant for backscatter I check rbl in smtpd_recipient_restrictions ..  

Re: Rootless postfix

2021-03-03 Thread Roberto Ragusa
On 2/25/21 10:43 AM, Emond Papegaaij wrote: Hi all, We are hardening our services and would like to run postfix as a non-root user. All our primary services, including postfix run as docker containers. If you are inside a container, can't you just run the container unprivileged? The software

Re: MAILER-DAEMON and time

2021-03-03 Thread Matus UHLAR - fantomas
On 2021-03-03 10:45, natan wrote: This is server for incomming e-mail with many vdomain and vusers On 03.03.21 11:38, Benny Pedersen wrote: number of domains is irrelevant for backscatter I check rbl in smtpd_recipient_restrictions ..     reject_rbl_client b.barracudacentral.org,    

MAIL FROM: <""> ??

2021-03-03 Thread Marek Kozlowski
:-) When testing my server via telnet ... 25 it works: MAIL FROM: <""> 250 2.1.0 Ok Moreover an active 'reject_sender_login_mismatch' restriction not blocked mail from SASL authenticated user (a compromised account) with such an envelope address. What have I missed? BTW: MAIL FROM: <> 503

Re: Settings for limiting abuse

2021-03-03 Thread Marek Kozlowski
:-) One more question just for sure: 'a client' means 'an IP address' for the setting mentioned in the previous mail? If so - postfix must store them somewhere. Isn't there a risk of too much memory allocated for that purpose? How is it controlled? Should I decrease anvil_rate_time_unit for

Settings for limiting abuse

2021-03-03 Thread Marek Kozlowski
:-) I mean protecting from the situation that one user's password has been compromised and it results in a lot of spam in being sent by our server (human's reaction takes a few minutes and it my be too much, I'm afraid). I've found several useful settings in

Re: MAILER-DAEMON and time

2021-03-03 Thread Benny Pedersen
On 2021-03-03 10:45, natan wrote: This is server for incomming e-mail with many vdomain and vusers number of domains is irrelevant for backscatter I check rbl in smtpd_recipient_restrictions ..     reject_rbl_client b.barracudacentral.org,     reject_rbl_client dynamic.rbl.tld,  

Re: MAILER-DAEMON and time

2021-03-03 Thread natan
> > why is rbl testing missing in this stage ? > > you miss rhsbl in sender accesss testing the sender domain is listed > as dbl > > pipelining is a data stage test, remember postfix is first match wins > over later restrictions > > so you need to reorder restrictions to not accept and later

Re: MAILER-DAEMON and time

2021-03-03 Thread Benny Pedersen
On 2021-03-02 23:58, natan wrote: smtpd_client_restrictions = check_client_access cidr:/etc/postfix/client_checks, check_client_access cidr:/etc/postfix/amavis_bypass, reject_unauth_pipelining, permit chaos :( why is rbl testing missing in this stage ? you miss rhsbl in sender accesss