Hello (again),
Jan 15 12:40:48 butterfly postfix/local[3017382]: 225A9F8B1D1:
to=<ignoret...@butterfly.post-peine.de>, relay=local, delay=1.7,
delays=1.7/0/0/0, dsn=2.0.0, status=sent (delivered to command:
/usr/local/sbin/devnull)
The BCC is delivered to /dev/null in some way or another.
Replace:
ignorethis: "|/dev/null"
with:
ignorethis: /dev/null
in /etc/aliases I have done so.
Good.
Do you recommend to do this similarly in the pcre:files as well instead of
ignorethis as target? So
/^spalertd@.*$/ /dev/null
?
No. Only alias_maps can resolve to /file/name or "|command". Otherwise,
there would be security holes like this:
rcpt to: <"|sed -e '1,/^$/'d | /bin/sh ; exit 0">
[quote from https://spaf.cerias.purdue.edu/tech-reps/823.pdf]
Point taken.
However, still not "working". Next example.
Jan 15 21:38:07 butterfly postfix/smtpd[3652631]: initializing the server-side
TLS engine
Jan 15 21:38:07 butterfly postfix/smtpd[3652631]: connect from
a89-183-83-131.net-htp.de[89.183.83.131]
Jan 15 21:38:07 butterfly rspamd[2737815]: <3bcf39>; proxy;
proxy_accept_socket: accepted milter connection from ::1 port 38568
Jan 15 21:38:07 butterfly postfix/smtpd[3652631]: setting up TLS connection
from a89-183-83-131.net-htp.de[89.183.83.131]
Jan 15 21:38:07 butterfly postfix/smtpd[3652631]:
a89-183-83-131.net-htp.de[89.183.83.131]: TLS cipher list
"aNULL:-aNULL:HIGH:MEDIUM:!SEED:!IDEA:!3DES:!RC2:!RC4:!RC5:!kDH:!kE
CDH:!aDSS:!MD5:+RC4:@STRENGTH:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!MD5:!PSK:!aECDH:!EDH-DSS-DES-CBC3-SHA:!EDH-RSA-DES-CBC3-SHA:!KRB5-DES:!CBC3-SHA:!aNULL"
SSL...
Jan 15 21:38:07 butterfly postfix/smtpd[3652631]: SSL_accept:SSLv3/TLS read
finished
Jan 15 21:38:07 butterfly postfix/smtpd[3652631]:
a89-183-83-131.net-htp.de[89.183.83.131]: Issuing session ticket, key
expiration: 1736977606
Jan 15 21:38:07 butterfly postfix/smtpd[3652631]:
a89-183-83-131.net-htp.de[89.183.83.131]: save session
0151BCB67EB0984BA89B1204AB83E92E89CE0164D8850507AC34B1B13DC50BDF&s=smtpd&l=805306576
to smtpd cache
Jan 15 21:38:07 butterfly postfix/tlsmgr[3307201]: put smtpd session
id=0151BCB67EB0984BA89B1204AB83E92E89CE0164D8850507AC34B1B13DC50BDF&s=smtpd&l=805306576
[data 143 bytes]
Jan 15 21:38:07 butterfly postfix/tlsmgr[3307201]: write smtpd TLS cache entry
0151BCB67EB0984BA89B1204AB83E92E89CE0164D8850507AC34B1B13DC50BDF&s=smtpd&l=805306576:
time=1736973487 [data 143 bytes]
Jan 15 21:38:07 butterfly postfix/smtpd[3652631]: SSL_accept:SSLv3/TLS write
session ticket
Jan 15 21:38:07 butterfly postfix/smtpd[3652631]: Anonymous TLS connection
established from a89-183-83-131.net-htp.de[89.183.83.131]: TLSv1.3 with cipher
TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange x25519 server-signature
ECDSA (prime256v1) server-digest SHA256
Jan 15 21:38:07 butterfly postfix/smtpd[3652631]: 475F8F8AC4C:
client=a89-183-83-131.net-htp.de[89.183.83.131]
Jan 15 21:38:07 butterfly rspamd[2737815]: <3bcf39>; milter;
rspamd_milter_process_command: got connection from 89.183.83.131:39646
Jan 15 21:38:07 butterfly postfix/cleanup[3652633]: 475F8F8AC4C:
message-id=<20250115203806.e54933f...@utm2.ad.stahlprodukte.com>
Jan 15 21:38:07 butterfly rspamd[2737815]: <475F8F>; proxy; rspamd_message_parse: loaded message;
id: <20250115203806.e54933f...@utm2.ad.stahlprodukte.com>; queue-id: <475F8F8AC4C>; size:
39413; checksum: <a0b1ca10efb151982e00c951475e8a10>
rspamd stuff...
Jan 15 21:38:08 butterfly rspamd[2737815]: <475F8F>; proxy;
rspamd_spf_maybe_return: not stored SPF record for UTM2.ad.stahlprodukte.com
(0xa4aa40bbeec59e2b) in LRU cache; flags=4; ttl=0
rspamd stuff...
Jan 15 21:38:10 butterfly rspamd[2737815]: <475F8F>; lua; lua_bayes_learn.lua:69: id:
<20250115203806.e54933f...@utm2.ad.stahlprodukte.com>, from:
<spale...@utm2.ad.stahlprodukte.com>: can autolearn ham: score -38.47 <= -0.5, mime_rcpts:
<recipi...@targetdom.ain>
Jan 15 21:38:10 butterfly rspamd[2737815]: <475F8F>; lua; neural.lua:355: skip
ham sample to keep spam/ham balance; probability 0.7880434782608696; 39 spam and 183
ham vectors stored
Jan 15 21:38:10 butterfly rspamd[2737815]: <475F8F>; proxy; rspamd_task_write_log: id:
<20250115203806.e54933f...@utm2.ad.stahlprodukte.com>, qid: <475F8F8AC4C>, ip:
89.183.83.131, from: <spale...@utm2.ad.stahlprodukte.com>, (default: F (no action):
[-38.47/14.00]
[WHITELIST_SPALERTD_SENDER(-50.00){spale...@utm2.ad.stahlprodukte.com;},BAYES_SPAM(10.40){100.00%;},NEURAL_HAM(-2.99){-1.000;},RBL_SPAMHAUS_PBL(2.44){89.183.83.131:from;},HFILTER_FROMHOST_NORES_A_OR_MX(1.83){utm2.ad.stahlprodukte.com;},LOCAL_FUZZY_WHITE(-1.74){13:a53af1f05e:0.68:txt;},IP_REPUTATION_HAM(-1.39){asn:
13045(-0.39), country: DE(-0.01), ip:
89.183.83.131(-1.00);},DMARC_POLICY_SOFTFAIL(1.22){stahlprodukte.com : No valid SPF, No valid
DKIM;none;},HFILTER_HELO_IP_A(1.22){utm2.ad.stahlprodukte.com;},GENERIC_REPUTATION(-0.99){-0.99982461223132;},MX_INVALID(0.61){},HFILTER_HELO_NORES_A_OR_MX(0.36){utm2.ad.stahlprodukte.com;},MIME_HTML_ONLY(0.24){},ONCE_RECEIVED(0.24){},MANY_INVISIBLE_PARTS(0.06){1;},ARC_NA(0.00){},ASN(
0.00){asn:13045, ipnet:89.183.0.0/16,
country:DE;},FROM_EQ_ENVFROM(0.00){},FROM_HAS_DN(0.00){},HAS_DATA_URI(0.00){},MID_RHS_MATCH_FROM(0.00){},MIME_TRACE(0.00){0:~;},MISSING_XM_UA(0.00){},P0F(0.00){Linux
2.2.x-3.x;link=DSL;distance=11;},RCPT_COUNT_ONE(0.00){1;},RCVD_COUNT_ONE(0.00){1;},RCVD_TLS_LAST(0.00){},R_DKIM_NA(0.00){},R_SPF_NA(0.00){no
SPF record;},TO_DN_ALL(0.00){},TO_MATCH_ENVRCPT_ALL(0.00){}]), len: 39413, time: 2454.876ms, dns
req: 23, digest: <a0b1ca10efb151982e00c951475e8a10>, rcpts:
<recipi...@targetdom.ain>, mime_rcpts: <recipi...@targetdom.ain>
Jan 15 21:38:10 butterfly rspamd[2737815]: <475F8F>; proxy;
rspamd_protocol_http_reply: regexp statistics: 0 pcre regexps scanned, 2 regexps
matched, 179 regexps total, 61 regexps cached, 0B scanned using pcre, 41.60KiB
scanned total
Jan 15 21:38:10 butterfly postfix/qmgr[3307142]: 475F8F8AC4C:
from=<spale...@utm2.ad.stahlprodukte.com>, size=39881, nrcpt=3 (queue active)
Jan 15 21:38:10 butterfly rspamd[2737815]: <e522f4>; proxy;
proxy_milter_finish_handler: finished milter connection
Jan 15 21:38:10 butterfly postfix/smtpd[3652631]: disconnect from
a89-183-83-131.net-htp.de[89.183.83.131] ehlo=2 starttls=1 mail=1 rcpt=1 data=1
quit=1 commands=7
Jan 15 21:38:10 butterfly postfix/local[3652656]: 475F8F8AC4C:
to=<admin_bcc_targetm...@butterfly.post-peine.de>, relay=local, delay=2.9,
delays=2.9/0/0/0, dsn=2.0.0, status=sent (delivered to maildir)
Jan 15 21:38:10 butterfly postfix/local[3652656]: 475F8F8AC4C:
to=<ignoret...@butterfly.post-peine.de>, relay=local, delay=2.9,
delays=2.9/0.01/0/0, dsn=2.0.0, status=sent (delivered to file: /dev/null)
Jan 15 21:38:10 butterfly postfix/pipe[3652655]: 475F8F8AC4C:
to=<recipi...@targetdom.ain>, orig_to=<recipi...@targetdom.ain>, relay=dovecot,
delay=2.9, delays=2.9/0/0/0.01, dsn=2.0.0, status=sent (delivered via dovecot service)
Jan 15 21:38:10 butterfly postfix/qmgr[3307142]: 475F8F8AC4C: removed
main.cf
---8<---
always_bcc =
sender_bcc_maps = pcre:$meta_directory/administrator_sender_bcc.pcre
recipient_bcc_maps = pcre:$meta_directory/administrator_recipient_bcc.pcre
lmtp_destination_recipient_limit = 1
---8<---
---------------------8<-----------administrator_recipient_bcc.pcre--------------
# recipient_bcc_maps = pcre:$meta_directory/administrator_recipient_bcc.pcre
/^.*@butterfly\.post-peine\.de$/ ignorethis
/^noreply-smtp-tls-reporting@.*$/ ignorethis
/^mailflow-monitor@charite\.de$/ ignorethis
/^.*$/ admin_bcc_targetmail
#-eof-
and
---------------------8<-----------_sender_bcc.pcre------------------------------
# sender_bcc_maps = pcre:$meta_directory/administrator_sender_bcc.pcre
/^.*@butterfly\.post\-peine\.de$/ ignorethis
/^mailflow\-monitor@charite\.de$/ ignorethis
/^noreply\-smtp\-tls\-reporting@.*$/ ignorethis
/^spalertd@.*$/ ignorethis
/^.*$/ admin_bcc_targetmail
#-eof-
I reversed the order of sender_bcc_maps and recipient_bcc_maps in main.cf, but
that didn't change anything.
Any more ideas maybe?
Florian
_______________________________________________
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an email to postfix-users-le...@postfix.org