On Mon, 14 Sep 2009 19:18:36 +0200 bsd <b...@todoo.biz> wrote:
>Hello,
>
>I am using two postfix server and quite often some misconfigured mail  
>server are sending mail to the backup MX instead of the primary.
>Both server have postfix implemented using the 'classic' conf:
>
>in main.cf
>
>> smtpd_recipient_restrictions =
>>            permit_mynetworks,
>>            permit_sasl_authenticated,
>>            check_recipient_access hash:/usr/local/etc/postfix/access
>>            reject_unauth_destination,
>>            reject_invalid_hostname,
>>            reject_unknown_sender_domain,
>>            # SPF implementation
>>            check_policy_service unix:private/policy
>>            # Greylisting implementation
>>            check_policy_service inet:127.0.0.1:10023
>
>and in master.cf :
>
>> # SPF policy implementation /usr/ports/mail/postfix-policyd-spf
>> policy  unix  -       n       n       -       -       spawn
>>   user=nobody argv=/usr/local/sbin/postfix-policyd-spf
>>
>
>
>The problem is that I sometimes have (quite often in fact) rejected  
>mail because they are using spf and the mail is transfered from my  
>backup MX to my master server and my server is considering that second  
>server as the issuer.
>
>Is there any option that I can activate on master.cf or main.cf to  
>avoid that… my initial reading and googling have not been very  
>successful.
>
Not exactly the question you asked, but if you are using one of the policy 
servers from http://www.openspf.org/Software , both provide their own mechanism 
for bypassing SPF checks for specific relays (like secondary MX).

The Python implementation provides this in a proper config file.  The Perl 
implementation is much more primative and you have to edit the actual 
executable script (patches welcome).  In either case, the documentation shipped 
with the packages should explain how to do it.

Scott K

Reply via email to