Tom Diehl wrote:
> Hi,
>
> I have a machine running postfix 2.2.8. I recently noticed that it is
> putting
> messages in the queue for non-existent users and then trying to send
> bounce
> messages. Can someone please look at the following postconf -n output
> and tell
> me what I have screwed up? I really want to stop this but I am not
> seeing the problem.
>
> (foghorn pts2) # postconf -n alias_database =
> hash:/etc/postfix/aliases hash:/etc/postfix/local.maps/local.aliases
> alias_maps = hash:/etc/postfix/aliases
> hash:/etc/postfix/local.maps/local.aliases biff = no body_checks =
> pcre:/etc/postfix/common.maps/body_checks bounce_queue_lifetime = 6h
> content_filter = smtp-amavis:[127.0.0.1]:10024
> debug_peer_level = 2
> disable_vrfy_command = yes
> header_checks = pcre:/etc/postfix/common.maps/header_checks
> local_recipient_maps =
> mime_header_checks = regexp:/etc/postfix/common.maps/mime_header_checks
> mydestination = $myhostname localhost.$mydomain $mydomain
> mail.$mydomain myhostname = mail.tntechs.com
> mynetworks = 192.168.0.0/24 127.0.0.0/8
> myorigin = $mydomain
> newaliases_path = /usr/bin/newaliases.postfix
> queue_directory = /var/spool/postfix
> readme_directory = /usr/share/doc/postfix-2.2.8-documentation/readme
> relay_domains = $mydestination
> /etc/postfix/stnhbr.maps/relay_domains.stnhbr smtp_helo_name =
> mail.tntechs.com
> smtpd_client_restrictions =
> smtpd_helo_restrictions =
> smtpd_recipient_restrictions = permit_mynetworks
> check_recipient_access
> hash:/etc/postfix/common.maps/hosted_email_domains check_sender_access
> hash:/etc/postfix/common.maps/sender_checks reject_non_fqdn_sender
> reject_non_fqdn_recipient reject_unknown_sender_domain
> reject_unknown_recipient_domain reject_unauth_destination
> check_recipient_access hash:/etc/postfix/common.maps/spamtrap
> hash:/etc/postfix/tntechs.maps/recipient_checks
> hash:/etc/postfix/stnhbr.maps/recipient_checks
> hash:/etc/postfix/sitelink.maps/recipient_checks
> reject_unauth_pipelining reject_invalid_hostname
> reject_non_fqdn_hostname reject_rbl_client zen.spamhaus.org
> reject_rbl_client bl.spamcop.net reject_unauth_destination permit

This is a large one (formatting for readability:)
smtpd_recipient_restrictions =
>    permit_mynetworks
>    check_recipient_access
hash:/etc/postfix/common.maps/hosted_email_domains
>    check_sender_access hash:/etc/postfix/common.maps/sender_checks

I hope there are no OKs in those maps.  Doing so may lead to an open
relay especially in the check_sender_access.
This could also be the source of Backscatter.
What is in those maps? (if either of your restriction classes, please
post them as well)

>    reject_non_fqdn_sender
>    reject_non_fqdn_recipient
>    reject_unknown_sender_domain
>    reject_unknown_recipient_domain
>    reject_unauth_destination
>    check_recipient_access hash:/etc/postfix/common.maps/spamtrap
>    hash:/etc/postfix/tntechs.maps/recipient_checks
>    hash:/etc/postfix/stnhbr.maps/recipient_checks
>    hash:/etc/postfix/sitelink.maps/recipient_checks
These three are checking using the depreciated, implied access check.
check_*_access takes exactly 1 argument.

>    reject_unauth_pipelining

This is rather pointless in this setup and more effective in
data_restrictions.

>    reject_invalid_hostname
>    reject_non_fqdn_hostname
>    reject_rbl_client zen.spamhaus.org
>    reject_rbl_client bl.spamcop.net
>    reject_unauth_destination
>    permit

The last 2 lines have no effect because you already checked for
reject_unauth_destination and there is an explicit permit at the end.

> smtpd_restriction_classes = match_client_domain
> must_come_from_hosted_email
> smtpd_sender_restrictions = check_sender_access
> hash:/etc/postfix/common.maps/sender_whitelist
> hash:/etc/postfix/common.maps/spoof_sender_map
>
Are you trying to whitelist against your spoof_sender_map? If not, then
it has no purpose.

Brian

Reply via email to