Am 03.12.2014 um 14:41 schrieb mancyb...@gmail.com:
On Wed, 03 Dec 2014 14:11:44 +0100
"li...@rhsoft.net" <li...@rhsoft.net> wrote:

Am 03.12.2014 um 13:40 schrieb mancyb...@gmail.com:
On Wed, 03 Dec 2014 13:18:45 +0100
"li...@rhsoft.net" <li...@rhsoft.net> wrote:
put the exchange host in "mynetworks" and just add "permit_mynetworks"
*before* "reject_authenticated_sender_login_mismatch"

Hi, my whole 'smtpd_recipient_restrictions' is:

smtpd_recipient_restrictions =
   permit_mynetworks,
   check_policy_service inet:127.0.0.1:10031,
   check_sender_access hash:/etc/postfix/sender_access,
   check_recipient_access 
hash:/etc/postfix/check_recipient_access_skip_blacklists,
   reject_authenticated_sender_login_mismatch,
   reject_unauthenticated_sender_login_mismatch,
   permit_sasl_authenticated,
   reject_non_fqdn_hostname,
   reject_non_fqdn_sender,
   reject_non_fqdn_recipient,
   reject_unauth_destination,
   reject_unauth_pipelining,
   reject_invalid_hostname,
   check_client_access hash:/etc/postfix/rbl_override
   reject_rbl_client zen.spamhaus.org,
   reject_rbl_client cbl.abuseat.org,
   reject_rbl_client bl.spamcop.net,

this is a server with many domains and users (and filters, also custom antispam 
filters).

Wouldn't your suggested modification disable all the rest of the processing 
logic ?
I mean .. would reject_rbl_client zen.spamhaus.org still be considered ?
If that's the case, wouldn't be easy to spoof the domain and abuse the server?

if the sending host is controlled by you it makes no sense to do RBL
checks for one of your own machines and so it should be safe add the
host to "mynetworks"

Hi, the Exchange server is not controlled by me

than i would not allow any relay without autentication at all and place a policyd only allowing authenticated relay but permit in context of authentication *before* "reject_authenticated_sender_login_mismatch" as possible solution

to be honest the best solution is most likely a own instance in master.cf on a different port only opened in the firewall by that host with it's own restrictions instead try to combine completly different needs

 nor are the clients. I agree that skipping RBLs checks is ok but what about 
the other rules, will they be skipped ?
I need policyd to track sending, together with amavis and spamd.

anything after a "permit" is skipped, so you can re-order if possible the restrictions , there is no hard need to put "permit_mynetworks" on top and if it is not possible with re-ordering consider a policy daemon

the following as example is wrong because "reject_non_fqdn_sender" and "reject_non_fqdn_recipient" should be applied also for authenticated users (a non fqdn rcpt happens often by mistake and would be delivered with "mydomain" appened and there is no reason for a non-fq sender)

and that's just an example

>>>    permit_sasl_authenticated,
>>>    reject_non_fqdn_hostname,
>>>    reject_non_fqdn_sender,
>>>    reject_non_fqdn_recipient,

Reply via email to