Chris Turan wrote:
Thank you to everyone. I'm getting some great suggestions. I didn't
know about several of the features postfix provides and have been
relying mostly on spamassassin to do the work for me.
I don't see the smtpd_*_restrictions. Sensible ones there cut down on
acres of spam and take load off the content scanner, without much in
the way of false positives (in fact, I have none).
Well, my smtpd_*_restrictions aren't really used on my exterior mx
routers. My users do not talk to those servers ever. Mine are
exceedingly simple.
For the ports the mx gateways connect to:
smtpd_recipient_restrictions = permit_mynetworks, reject
For ports the users connect to:
smtpd_recipient_restrictions = permit_sasl_authenticated, reject
I suggest (after permit_mynetworks, for each set):
reject_invalid_helo_hostname, reject_non_fqdn_helo_hostname,
reject_non_fqdn_hostname, reject_unknown_reverse_client_hostname,
reject_unknown_client_hostname, reject_non_fqdn_sender,
reject_unknown_sender_domain, reject_unauth_destination,
reject_non_fqdn_recipient, reject_rbl_client zen.spamhaus.org,
reject_unauth_pipelining
I do have a concern for some of these. I pretty much have to support
tons of mail clients from roaming users around the states. I have the
whole run of microsoft mail clients, plus apple, and a significant linux
user base as well. In addition, I have no control over the networks
they're coming from, trust me their dns is severely messed up over
there. I'll have to be relatively conservative in which ones I use here.
I definitely can't use reject_unknown_reverse_client_hostname and
reject_unknown_client_hostname. reject_unauth_destination is
superfluous for my servers since there is a clean divide on the ports
that users and regular incoming mail uses. reject_unknown_sender_domain
also looks like a no-go since some users have non-resolvable internal
domains. They do stuff like my-company-name.local instead of
my-company-name.com.
Here's a list of the ones that look ok for my setup.
reject_invalid_helo_hostname
reject_non_fqdn_helo_hostname,
reject_non_fqdn_hostname
reject_non_fqdn_sender,
reject_non_fqdn_recipient
reject_unauth_pipelining
I can't use the PBL, so I'll probably have to use this instead.
reject_rbl_client sbl-xbl.spamhaus.org
Has anyone seen any weird issues when using the ones I've listed above.
I'd rather pass the mail than risk a false positive.
Any non-compliant microsoft products? :-)
Thanks for all the help again!
You misunderstand -- You don't subject your authenticated
users to those suggested checks, only outsiders.
These checks go on the MX gateway.
Any port that an authenticated user might connect to should
have permit_sasl_authenticated as one of the first
restrictions listed. This will exempt them from any further
checks.
--
Noel Jones