Dear List,
        Using E2B with Extended Scripts, I have an email server sitting in a 
private address DMZ (172.20.x.x) with two internal networks 
(192.168.x.y). Connections from the internal network to an SMTP server 
in the DMZ are masqueraded so they look like connections from the 
firewall address on the 172.20. network. The SMTP server is also port 
forwarded from the outside world for mail delivery etc.

In trying to lock down the server against being an unsecured relay, 
Postfix offers a few options for clients wishing to send email. One is 
to only allow clients from given networks or domains to send, another to 
only allow sending to a limited range of domains. :-(

As far as I can see, all traffic to the server (from internal or 

external hosts) appears to come from the 172.20. network so I can't 

use this to discriminate against external senders (networks or domains).

Restricting the destination domains is likewise not an option.

Short of SMTP authorisation, what is the best/normal way to tackle this

either on the firewall or email server?

Is it possible/sensible to not masquerade this traffic from the internal 
networks to the SMTP port and block outside users from sending in this 
way? Are NOMASQ_DEST_BYPASS or NOMASQ_DEST of interest here? Seem to be 
oriented towards a different problem.

Any suggetions?

Thanks and regards,

   matt


_______________________________________________
Leaf-user mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user

Reply via email to