Hi list,

I have added on the bottom of my "header_check" file:

/^(cc|to): undisclosed-recipients:;/            REJECT

to prevent many SPAM from hotmail and yahoo, this works fine.

Now I need to allow some senders (like WSUS) to override this rule.

I have tried some combinaison without success, like to put
/$From:....@domain\.com/ at the top of the file.

How can I override this rule ?

Tkanks,

Sebastien WENSKE


There is my main.cf :

smtpd_banner = $myhostname Tu veux la drooooogue (DTC version)
biff = no
append_dot_mydomain = no
readme_directory = no
myhostname = mail.xxxxxxxxx.com
alias_maps = hash:/etc/aliases
alias_database = hash:/etc/aliases
local_recipient_maps =
relay_recipient_maps = hash:/etc/postfix/valid_admail
show_user_unknown_table_name = no
header_checks = pcre:/etc/postfix/header_checks
body_checks = pcre:/etc/postfix/body_checks
transport_maps = hash:/etc/postfix/transport
myorigin = /etc/mailname
mydestination = sl07.wenske.local, localhost.wenske.local, localhost,
wenske.local
relay_domains = $mydestination, xxxxxxx.com
relayhost = [10.0.4.14]
mynetworks = 127.0.0.0/8, 10.0.1.0/24, 10.0.4.0/24, 172.17.1.25,
xxxxxxxxxxx, xxxxxxxxxxxxx
content_filter = amavis:[127.0.0.1]:10024
mailbox_size_limit = 0
message_size_limit = 20480000
mailbox_command = procmail -a "$EXTENSION"
recipient_delimiter = +
inet_interfaces = all

#Restriction
smtpd_helo_required = yes
strict_rfc821_envelopes = yes
disable_vrfy_command = yes
smtpd_delay_reject = no

smtpd_recipient_restrictions =
        reject_invalid_hostname,
        reject_non_fqdn_hostname,
        check_client_access cidr:/etc/postfix/client.cidr,
        check_client_access pcre:/etc/postfix/client.pcre,
        sleep 15,
        reject_non_fqdn_sender,
        reject_non_fqdn_recipient,
        reject_unknown_sender_domain,
        reject_unknown_recipient_domain,
        #check_recipient_access pcre:/etc/postfix/recipient_checks.pcre,
        check_policy_service inet:127.0.0.1:60000,
        permit_mynetworks,
        reject_unauth_destination,
        reject_unknown_reverse_client_hostname,
        reject_rbl_client bl.spamcop.net,
        reject_rbl_client sbl-xbl.spamhaus.org,
        reject_rbl_client cbl.abuseat.org,
        check_policy_service unix:private/policy-spf,
        permit

smtpd_data_restrictions =
        reject_unauth_pipelining,
        permit

spf-policyd_time_limit = 3600s

Attachment: smime.p7s
Description: S/MIME cryptographic signature

Reply via email to