Noel Jones escribió:
Miguel Da Silva - Centro de Matemática wrote:
Dear users, I realized today that the local SMTP server is not working as expected.

I found these lines in the log files:

Mar  2 22:42:48 smtp postfix/smtpd[30427]: 1A66913105B:
client=r190-134-zz-xx.dialup.adsl.anteldata.net.uy[190.134.zz.xx], sa
sl_method=PLAIN, sasl_username=usuario1
Mar  2 22:42:49 mordred postfix/cleanup[30478]: 1A66913105B:
message-id=<49ac7fbf.1050...@cmat.edu.uy>

Mar  2 18:41:59 smtp postfix/smtpd[15652]: TLS connection established
from r190-134-zz-xx.dialup.adsl.anteldata.net.uy[190.134
.zz.xx]: TLSv1 with cipher RC4-MD5 (128/128 bits)
Mar  2 18:42:02 smtp postfix/smtpd[15652]: NOQUEUE: reject: RCPT from
r190-134-zz-xx.dialup.adsl.anteldata.net.uy[190.134.zz.
xx]: 450 4.7.1 <dest...@cmat.edu.uy>: Recipient address rejected:
Greylisting in action, please come back later.; from=<usuar...@c
mat.edu.uy> to=<dest...@cmat.edu.uy> proto=ESMTP helo=<UserPC>

So, the first 2 lines shows usuario1 sending mail through this server and everything goes fine. His client is using SASL authentication and that's ok. On the other hand, the last 2 lines shows usuario2 can not use the SMTP server. The mail he is sending is being rejected. But, the rejection is due to greylisting (postgrey is being used), not due to lack of authentication. Note both users are sending mails from their homes.

Obviously usuario2 did not authenticate.


Here goes some lines from main.cf:

smtpd_recipient_restrictions =
        reject_rbl_client sbl.spamhaus.org
        reject_rbl_client bl.spamcop.net

Do you really want to subject authenticated users to the above checks? Many users' home ISPs will be listed in spamhaus and/or spamcop and won't be able to submit mail. These checks should be moved below reject_unauth_destination. and you should probably use zen.spamhaus.org rather than sbl.

        check_recipient_access hash:/etc/postfix/bloqueados

It's generally unwise to put access tables before reject_unauth_destination. Accidental entries can make you an open relay.
http://www.postfix.org/SMTPD_ACCESS_README.html#danger

        permit_sasl_authenticated
        permit_mynetworks
        reject_unauth_destination
        reject_unknown_recipient_domain
        reject_unverified_recipient
        check_policy_service inet:127.0.0.1:10026

smtpd_sender_restrictions =
        regexp:/etc/postfix/sender.regexp,
        reject_non_fqdn_sender,
        reject_unknown_sender_domain

Sugestions?! My idea is, if you are not part to $mynetworks, then authenticating is the only way to get mail relaid trough this server.

Greetings.

  -- Noel Jones

Thank you for your advices. I changed the position of those restrictions and now it is:

smtpd_recipient_restrictions =
        check_recipient_access hash:/etc/postfix/bloqueados
        permit_mynetworks
        permit_sasl_authenticated
        reject_unauth_destination
        reject_rbl_client zen.spamhaus.org
        reject_rbl_client bl.spamcop.net
        reject_unknown_recipient_domain
        reject_unverified_recipient
        check_policy_service inet:127.0.0.1:10026

By the way, I kept check_recipient_access as the first one because it is written correctly and all it does is reject mail to 2 local users that must not recieve any message no matter how send it.

But, the main issue remains... I could not enforce authentication.

Let's keep reading...

Greetings.
--
Miguel Da Silva
Administrador Junior de Sistemas Unix
Centro de Matemática - http://www.cmat.edu.uy
Facultad de Ciencias - http://www.fcien.edu.uy
Universidad de la República - http://www.rau.edu.uy

Reply via email to