Hi there.
On 3 September 2010 12:24, Noel Jones <njo...@megan.vbhcs.org> wrote: >> recipient_canonical_maps = pcre:/etc/postfix/canonical > > Careful, wildcard *canonical_maps defeat recipient validation. This is what it contains: /^(reg)-(.+)-(.+)@(.+)/ $...@${4} So any email like reg-user-ser...@domain.com are changed in u...@domain.com so I can create on the go email address and find out who leaks to spammers. Isn''t it the right way of doing so? I had read about recipient validation, but I didn't get a clear understanding of what it meant > I expect that this is the problem entry. It's not nice to reject your own > clients just because they're using some MUA that sends garbage for the HELO. > Change this to > smtpd_helo_restrictions = > permit_mynetworks > permit_sasl_authenticated > reject_invalid_helo_hostname > reject_non_fqdn_helo_hostname That did it.. Thank you. It's the postfix that ships with macos server, it looks like they did everything they could to block outlook client (starting by disabling port 465) with # Modern SMTP clients communicate securely over port 25 using the STARTTLS command. # Some older clients, such as Outlook 2000 and its predecessors, do not properly # support this command and instead assume a preconfigured secure connection # on port 465. This was sometimes called "smtps", but such usage was never # approved by the IANA and therefore conflicts with another, legitimate assignment. # For more details about managing secure SMTP connections with postfix, please see: # http://www.postfix.org/TLS_README.html # To read more about configuring secure connections with Outlook 2000, please read: # http://support.microsoft.com/default.aspx?scid=kb;en-us;Q307772 # Apple does not support the use of port 465 for this purpose.