Thanks Erik for the suggesion. If I understand correctly, you're suggesting this as an alternative to what Gary V said.

I'm not using sasl, so I guess that would make it a little bit easier still.

Mike


Erik Petersen wrote:
Setup port 587 for this (aka submission) in master.cf:

smtp    inet  n       -       n       -       -       smtpd
        -o content_filter=amavis:[127.0.0.1]:10024
        -o receive_override_options=no_address_mappings
        -o smtpd_client_restrictions=cidr:/etc/postfix/client.cidr

submission inet n     -       n       -       -       smtpd
        -o content_filter=
        -o smtpd_etrn_restrictions=reject
-o smtpd_client_restrictions=permit_sasl_authenticated,permit_mynetworks,reject
        -o smtpd_sasl_auth_enable=yes

This way you have port 25 which does local SMTP delivery with RBL checks and
filtering (incoming) and port 587 which does no filtering but only from
clients connection with SASL or those defined as local network hosts
(outgoing). Consider 587 your relay port. This also conveniently bypasses
SMTP port blocking by residential ISPs or corporate firewalls, allowing
authorized accounts to relay from anywhere. Splitting these two type of
traffic is not a bad idea.

HTH

On 12/11/05 9:49 PM, "M. Lewis" <[EMAIL PROTECTED]> wrote:


In the last few days, someone had written in and asked how to do this. I
believe the answer was from Gary. Gary gave two options for doing this.
I chose to do the latter of his two options. But it isn't working for
some reason.

The original thread is here:
http://marc.theaimsgroup.com/?l=amavis-user&m=113415019700881&w=2


I am getting this in the maillog when I try the second method:

Dec 12 00:40:57 moe postfix/smtpd[23856]: warning: access table
hash:/etc/postfix/amavis_internal: with smtpd_proxy_filter specified,
action FILTER is unavailable


Gary's second suggestion was this:


Another way is more specific:

smtpd_recipient_restrictions =
      check_client_access hash:/etc/postfix/amavis_internal
      permit_mynetworks
      reject_unauth_destination

contents of /etc/postfix/amavis_internal
(ip address of the internal server is listed here):
192.168.1.17 FILTER smtp-amavis:[127.0.0.1]:10026

Then in amavisd.conf:

$inet_socket_port = [10024, 10026];

$interface_policy{'10026'} = 'INTERNAL';

$policy_bank{'INTERNAL'} = {  # mail originating from the internal server
bypass_spam_checks_maps   => [1],  # don't spam-check outgoing mail
bypass_banned_checks_maps => [1],  # don't banned-check outgoing mail
final_spam_destiny   => D_PASS, # insure spam passes
final_banned_destiny => D_PASS, # insure banned files pass
};





--

 IBM: Idiots Being Mental
  21:05:01 up  4:14,  3 users,  load average: 0.09, 0.10, 0.04

 Linux Registered User #241685  http://counter.li.org


-------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc. Do you grep through log files
for problems?  Stop!  Download the new AJAX search engine that makes
searching your log files as easy as surfing the  web.  DOWNLOAD SPLUNK!
http://ads.osdn.com/?ad_id=7637&alloc_id=16865&op=click
_______________________________________________
AMaViS-user mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/amavis-user
AMaViS-FAQ:http://www.amavis.org/amavis-faq.php3
AMaViS-HowTos:http://www.amavis.org/howto/

Reply via email to