Olá pessoal...

Tenho um servidor com postfix e saslauthd funcionando aqui....
Esse servidor é virtual e está num VMWare ESXi...

Está acontecendo que o saslauthd perde a autenticação e os usuários não 
conseguem ler suas mensagens nem enviar...
Meus usuários se autenticam em um AD 2008....


Alguém já teve problema parecido e como resolveu??

Segue os arquivos de configuração.

Obrigado


main.cf:
...
...

smtpd_sasl_local_domain =
smtpd_sasl_auth_enable = yes
smtpd_sasl_security_options = noanonymous
broken_sasl_auth_clients = yes
inet_interfaces = all

smtpd_recipient_restrictions = reject_unknown_sender_domain, 
reject_unknown_recipient_domain, reject_unauth_pipelining, permit_mynetworks, 
permit_sasl_authenticated, reject_unauth_destination
smtpd_sender_restrictions = reject_unknown_sender_domain, 
permit_sasl_authenticated
#mailbox_command = /usr/lib/dovecot/deliver -c /etc/dovecot/conf.d/01-dovecot-
postfix.conf -n -m "${EXTENSION}"
mailbox_command = /usr/bin/procmail -a "$USER"
#mailbox_command = /usr/bin/procmail -a "$EXTENSION" DEFAULT=$HOME/Maildir/ 
MAILDIR=$HOME/Maildir

smtpd_recipient_restrictions =  reject_unauth_pipelining,
                                permit_mynetworks,
                                permit_sasl_authenticated,
                                reject_non_fqdn_recipient,
                                reject_unknown_recipient_domain,
                                reject_unauth_destination,
                                reject_rbl_client bl.spamcop.net,
                                reject_rbl_client zen.spamhaus.org,
                                reject_rbl_client cbl.abuseat.org,
                                check_policy_service inet:127.0.0.1:10023,
                                check_policy_service unix:private/policyd-spf
                                #check_recipient_access hash:/etc/postfix/deny,
                                #check_client_access 
hash:/etc/postfix/client_access,
                                permit

smtpd_sender_restrictions =     reject_unauth_pipelining,
                                permit_mynetworks,
                                permit_sasl_authenticated,
                                reject_non_fqdn_sender,
                                reject_unknown_sender_domain,
                                reject_sender_login_mismatch,
                                reject_unauth_destination,
                                permit

smtpd_helo_restrictions = permit_sasl_authenticated,
                          permit_mynetworks,
                          reject_non_fqdn_sender,
                          reject_unknown_sender_domain,
                          reject_invalid_hostname,
                          permit

smtpd_client_restrictions = permit_sasl_authenticated,
                            permit_mynetworks,
                            reject_rbl_client bl.spamcop.net,
                            reject_rbl_client zen.spamhaus.org,
                            reject_rbl_client cbl.abuseat.org,
                            reject_rbl_client sbl-xbl.spamhaus.org,
                            reject_rbl_client bl.spamcop.net,
                            reject_rhsbl_sender dsn.rfc-ignorant.org,
#                            check_client_access hash:/etc/postfix/ip-reject,
                            permit
...

/etc/postfix/sasl/smtpd.conf:
pwcheck_method: saslauthd
mech_list: plain login

/etc/default/saslauthd:

START=yes


DESC="SASL Authentication Daemon"


NAME="saslauthd"


MECHANISMS="pam"

MECH_OPTIONS=""

THREADS=5

OPTIONS="-c -m /var/spool/postfix/var/run/saslauthd"


-- 


Gilberto Nunes Ferreira

[TI]

(47) 3441-6004
(47) 8861-6672

_______________________________________________
Postfix-BR mailing list
[email protected]
http://listas.softwarelivre.org/mailman/listinfo/postfix-br

Responder a