So I have the following lines in main.cf:

smtpd_recipient_restrictions =
        reject_non_fqdn_recipient
        reject_non_fqdn_sender
        reject_unknown_sender_domain
        permit_mynetworks
        permit_sasl_authenticated
        reject_unauth_destination
        reject_unknown_reverse_client_hostname
        check_helo_access regexp:/etc/postfix/helo_checks
        check_sender_mx_access cidr:/etc/postfix/bogus_mx
        reject_rbl_client zen.spamhaus.org
        permit

I hope that block is OK.

However, this post is about the 'check_sender_mx_access' line.

Contents of 'bogus_mx':

# bogus networks
0.0.0.0/8               550 Mail server in broadcast network
10.0.0.0/8              550 No route to your RFC 1918 network
127.0.0.0/8             550 Mail server in loopback network
224.0.0.0/4             550 Mail server in class D multicast network
192.168.0.0/16          550 No route to your RFC 1918 network

Now I see in my logs:

postfix/smtpd[10896]: connect from toq1-srv.bellnexxia.net[209.226.175.120]
postfix/smtpd[10896]: NOQUEUE: reject: RCPT from
toq1-srv.bellnexxia.net[209.226.175.120]: 550 5.7.1
<[EMAIL PROTECTED]>: Sender address rejected: Mail server in loopback
network; from=<[EMAIL PROTECTED]> to=<[EMAIL PROTECTED]> proto=ESMTP
helo=<toq1-srv.bellnexxia.net>
postfix/smtpd[10896]: disconnect from toq1-srv.bellnexxia.net[209.226.175.120]
postfix/smtpd[10896]: connect from toq1-srv.bellnexxia.net[209.226.175.120]
postfix/smtpd[10896]: 0CA7F20EEE15:
client=toq1-srv.bellnexxia.net[209.226.175.120]
postfix/cleanup[4433]: 0CA7F20EEE15:
message-id=<[EMAIL PROTECTED]>

So here we have a user sending mail to another user in the same
domain.  It makes sense that the mailserver uses its loopback address.
 I just thought that what I'm doing is standard but obviously it
breaks in such a common scenario.  Comments?

/juan

Reply via email to