hi all
how can i whitelist a particular user (infact it's a user account  which
send virusalerts from the relays to the pop server) from smtp
authentication.

i've attached the postconf output

ty
help appreciated

 -bharathan
inet_protocols = all
myhostname = mail.exmaple.com
myorigin = mail.example.com
mydomain = example.com
mail_name = ExMail
mail_version = 0.5.0
biff = no
relay_domains = , mysql:/etc/postfix/mysql_relay_domains.cf
mynetworks = 127.0.0.0/8
mynetworks_style = subnet
receive_override_options = no_address_mappings
smtpd_data_restrictions = reject_unauth_pipelining
smtpd_reject_unlisted_recipient = yes
smtpd_sender_restrictions = permit_mynetworks, reject_sender_login_mismatch, 
permit_sasl_authenticated
delay_warning_time = 0h
policy_time_limit = 3600
maximal_queue_lifetime = 1d
bounce_queue_lifetime = 1d
smtpd_helo_required = yes
smtpd_helo_restrictions = permit_mynetworks,permit_sasl_authenticated, 
check_helo_access pcre:/etc/postfix/helo_access.pcre
queue_run_delay = 300s
minimal_backoff_time = 300s
maximal_backoff_time = 4000s
enable_original_recipient = no
disable_vrfy_command = yes
home_mailbox = Maildir/
allow_min_user = no
mailbox_size_limit = 15728640
message_size_limit = 15728640
virtual_mailbox_limit_override = yes
virtual_overquota_bounce = yes
virtual_mailbox_limit_message = Sorry, the user's maildir has overdrawn the 
disk quota, please notice the user and try again later.
virtual_minimum_uid = 500
virtual_uid_maps = static:500
virtual_gid_maps = static:500
virtual_mailbox_base = /var/vmail/vmail01
check_sender_access = hash:/etc/postfix/sender_access
header_checks = pcre:/etc/postfix/header_checks.pcre
transport_maps = mysql:/etc/postfix/mysql_transport_maps_user.cf, 
mysql:/etc/postfix/mysql_transport_maps_domain.cf
virtual_mailbox_domains = mysql:/etc/postfix/mysql_virtual_mailbox_domains.cf
virtual_mailbox_maps = mysql:/etc/postfix/mysql_virtual_mailbox_maps.cf
virtual_mailbox_limit_maps = 
mysql:/etc/postfix/mysql_virtual_mailbox_limit_maps.cf
virtual_alias_maps = mysql:/etc/postfix/mysql_virtual_alias_maps.cf
sender_bcc_maps = mysql:/etc/postfix/mysql_sender_bcc_maps_domain.cf, 
mysql:/etc/postfix/mysql_sender_bcc_maps_user.cf
recipient_bcc_maps = mysql:/etc/postfix/mysql_recipient_bcc_maps_domain.cf, 
mysql:/etc/postfix/mysql_recipient_bcc_maps_user.cf

relay_recipient_maps = mysql:/etc/postfix/mysql_virtual_mailbox_maps.cf
smtpd_sender_login_maps = mysql:/etc/postfix/mysql_sender_login_maps.cf
smtpd_reject_unlisted_sender = yes
smtpd_sasl_auth_enable = yes
smtpd_sasl_local_domain =
smtpd_sasl_security_options = noanonymous
broken_sasl_auth_clients = yes
smtpd_sasl_authenticated_header = no

smtpd_recipient_restrictions = reject_unknown_sender_domain, 
reject_unknown_recipient_domain, reject_non_fqdn_sender, 
reject_non_fqdn_recipient, reject_unlisted_recipient, permit_mynetworks, 
permit_sasl_authenticated, reject_unauth_destination, 
reject_non_fqdn_helo_hostname, reject_invalid_helo_hostname,  reject_rbl_client 
 zen.spamhaus.org


#check_policy_service inet:127.0.0.1:10031
smtpd_tls_security_level = may
smtpd_enforce_tls = no
smtpd_tls_loglevel = 0
smtpd_tls_key_file = /etc/pki/tls/private/Mail.key
smtpd_tls_cert_file = /etc/pki/tls/certs/Mail_CA.pem
tls_random_source = dev:/dev/urandom
tls_daemon_random_source = dev:/dev/urandom
#
# Uncomment the following line to enable policyd sender throttle.
#
#smtpd_end_of_data_restrictions = check_policy_service inet:127.0.0.1:10032
mailbox_command = /usr/libexec/dovecot/deliver
virtual_transport = dovecot
dovecot_destination_recipient_limit = 1
smtpd_sasl_type = dovecot
smtpd_sasl_path = dovecot-auth
content_filter = smtp-amavis:[127.0.0.1]:10024

Reply via email to