On 9/2/2010 10:08 PM, Jean-Yves Avenard wrote:
Hi there.


On 3 September 2010 12:24, Noel Jones<njo...@megan.vbhcs.org>  wrote:
recipient_canonical_maps = pcre:/etc/postfix/canonical

Careful, wildcard *canonical_maps defeat recipient validation.

This is what it contains:
/^(reg)-(.+)-(.+)@(.+)/ $...@${4}

This tells postfix to accept any re...@* address, for any domain postfix accepts mail for. If postfix can't deliver to the computed recipient, it will be bounced. Not good. Worst case: your server is blacklisted as a backscatter source and your queue is so clogged with undeliverable mail that it takes hours to deliver legit mail.

You may be able to minimize the problem by using
smtpd_recipient_restrictions =
  permit_mynetworks
  permit_sasl_authenticated
  reject_unauth_destination
  reject_unverified_recipient
  ... other local rules ...

http://www.postfix.org/ADDRESS_VERIFICATION_README.html#recipient

but that's just lipstick on a pig.
The real solution is to make sure your canonical maps (and virtual_alias_maps) only match deliverable recipients.

It's the postfix that ships with macos server, it looks like they did
everything they could to block outlook client (starting by disabling
port 465)


You can add smtps support to master.cf pretty easily.

465  inet  n  - n  -  -  smtpd
  -o smtpd_tls_wrappermode=yes
  -o smtpd_sasl_auth_enable=yes
  -o smtpd_client_restrictions=
  -o smtpd_helo_restrictions=
  -o smtpd_sender_restrictions=
-o smtpd_recipient_restrictions=permit_sasl_authenticated,reject
  -o smtpd_data_restrictions=



  -- Noel Jones

Reply via email to