On Tue, Dec 31, 2024 at 09:51:01PM +0100, Gerd Hoerst via Postfix-users wrote:

> So here also the right sender address

> > Yes its the file.... if i change only the file postfix croaks that
> > /etc/aliases is newer then /etc/aliases.db  (after i ran postalias
> > /etc/aliases it has an older timestamp

Well, now you need to post the outputs of:

    $ postconf -Mf unix/local
    $ postmap -q g $(postconf -xh alias_maps)
    $ postmap -q g unix:passwd.byname

And fresh logging of a delivery failure, now that (perhaps) the desired
aliases entry is in place.


> > > postconf -nf

> > alias_database = hash:/etc/aliases
> > alias_maps = hash:/etc/aliases

Fine.  Presumably the default_database_type is "hash".

> > debug_peer_level = 10

I doubt you want anything higher than 2 here, though for now it does not
matter given debug_peer_list is empty.

> > mailbox_command = procmail -a "$EXTENSION"

Handles local users with shell accounts, after alias expansion.

> > masquerade_domains = hoerst.net

Best avoided, breaks recipient validation by wildcarding subdomains.

> > mydestination = $myhostname, smtp.hoerst.net virgo.hoerst.net,
> >     localhost.hoerst.net, localhost, $mydomain
> > mydomain = hoerst.net
> > myorigin = $mydomain

As expected.

> > qmgr_message_active_limit = 150
> > qmgr_message_recipient_limit = 150

That's remarkably small, but if you never have more than a handful of
messages in the queue, fine...

> > relay_domains = hoerst.net
> > relay_recipient_maps = hash:/etc/postfix/relay_recipients

Just set these empty instead. This is a local domain.

> > smtp_tls_mandatory_exclude_ciphers = MD5, DES, ADH, RC4, PSD, SRP,
> > 3DES,eNULL,
> >     aNULL, ADH-AES256-GCM-SHA384
> > smtpd_tls_mandatory_exclude_ciphers = MD5, DES, ADH, RC4, PSD, SRP,
> > 3DES,eNULL,
> >     aNULL, ADH-AES256-GCM-SHA384

The "eNULL" and "ADH-AES256-GCM-SHA384" exclusions are redundant.
No idea what "PSD" is supposed to be (perhaps "PSK", which along
with "SRP" are merely "cosmetic" exclusions, because these require
additional configuration before they're actually usable).

> > smtp_tls_mandatory_protocols = !SSLv2, !SSLv3, !TLSv1, !TLSv1.1
> > smtpd_tls_mandatory_protocols = !SSLv2, !SSLv3, !TLSv1.1, !TLSv1
> > smtp_tls_protocols = !SSLv2, !SSLv3, !TLSv1, !TLSv1.1, !TLSv1.1
> > smtpd_tls_protocols = !SSLv2, !SSLv3, !TLSv1.1, !TLSv1

The preferred syntax is ">=TLSv1.2" (no space or "," after ">=").[

> > smtpd_sasl_auth_enable = yes

Best in master.cf only for the submission services, and not enabled
on port 25.

> > smtpd_tls_eecdh_grade = ultra

This is a obsolete, and now a bad idea.  Use the default "auto" instead,
with TLS 1.3 this is ignored, but it limits interoperability and
degrades performance (~17x costlier key exchange relative to P-256) with
TLS 1.2.

> > smtpd_tls_session_cache_database = btree:${data_directory}/smtpd_scache

Obsoleted by session tickets, best left empty.

> > smtpd_use_tls = yes

Obsoleted by "smtpd_tls_security_level".

> > tls_high_cipherlist = !aNULL:!eNULL:!CAMELLIA:HIGH:@STRENGTH

The "eNULL" exclusion is redundant.  Unclear why you disable aNULL,
though with TLS not having any anonymous ciphers and TLS 1.2 becoming
increasingly less commmon, it hardly matters.

> > tls_random_source = dev:/dev/urandom

Best to let this default.

-- 
    Viktor.
_______________________________________________
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an email to postfix-users-le...@postfix.org

Reply via email to