hi all how can i whitelist a particular user (infact it's a user account which send virusalerts from the relays to the pop server) from smtp authentication.
i've attached the postconf output ty help appreciated -bharathan
inet_protocols = all myhostname = mail.exmaple.com myorigin = mail.example.com mydomain = example.com mail_name = ExMail mail_version = 0.5.0 biff = no relay_domains = , mysql:/etc/postfix/mysql_relay_domains.cf mynetworks = 127.0.0.0/8 mynetworks_style = subnet receive_override_options = no_address_mappings smtpd_data_restrictions = reject_unauth_pipelining smtpd_reject_unlisted_recipient = yes smtpd_sender_restrictions = permit_mynetworks, reject_sender_login_mismatch, permit_sasl_authenticated delay_warning_time = 0h policy_time_limit = 3600 maximal_queue_lifetime = 1d bounce_queue_lifetime = 1d smtpd_helo_required = yes smtpd_helo_restrictions = permit_mynetworks,permit_sasl_authenticated, check_helo_access pcre:/etc/postfix/helo_access.pcre queue_run_delay = 300s minimal_backoff_time = 300s maximal_backoff_time = 4000s enable_original_recipient = no disable_vrfy_command = yes home_mailbox = Maildir/ allow_min_user = no mailbox_size_limit = 15728640 message_size_limit = 15728640 virtual_mailbox_limit_override = yes virtual_overquota_bounce = yes virtual_mailbox_limit_message = Sorry, the user's maildir has overdrawn the disk quota, please notice the user and try again later. virtual_minimum_uid = 500 virtual_uid_maps = static:500 virtual_gid_maps = static:500 virtual_mailbox_base = /var/vmail/vmail01 check_sender_access = hash:/etc/postfix/sender_access header_checks = pcre:/etc/postfix/header_checks.pcre transport_maps = mysql:/etc/postfix/mysql_transport_maps_user.cf, mysql:/etc/postfix/mysql_transport_maps_domain.cf virtual_mailbox_domains = mysql:/etc/postfix/mysql_virtual_mailbox_domains.cf virtual_mailbox_maps = mysql:/etc/postfix/mysql_virtual_mailbox_maps.cf virtual_mailbox_limit_maps = mysql:/etc/postfix/mysql_virtual_mailbox_limit_maps.cf virtual_alias_maps = mysql:/etc/postfix/mysql_virtual_alias_maps.cf sender_bcc_maps = mysql:/etc/postfix/mysql_sender_bcc_maps_domain.cf, mysql:/etc/postfix/mysql_sender_bcc_maps_user.cf recipient_bcc_maps = mysql:/etc/postfix/mysql_recipient_bcc_maps_domain.cf, mysql:/etc/postfix/mysql_recipient_bcc_maps_user.cf relay_recipient_maps = mysql:/etc/postfix/mysql_virtual_mailbox_maps.cf smtpd_sender_login_maps = mysql:/etc/postfix/mysql_sender_login_maps.cf smtpd_reject_unlisted_sender = yes smtpd_sasl_auth_enable = yes smtpd_sasl_local_domain = smtpd_sasl_security_options = noanonymous broken_sasl_auth_clients = yes smtpd_sasl_authenticated_header = no smtpd_recipient_restrictions = reject_unknown_sender_domain, reject_unknown_recipient_domain, reject_non_fqdn_sender, reject_non_fqdn_recipient, reject_unlisted_recipient, permit_mynetworks, permit_sasl_authenticated, reject_unauth_destination, reject_non_fqdn_helo_hostname, reject_invalid_helo_hostname, reject_rbl_client zen.spamhaus.org #check_policy_service inet:127.0.0.1:10031 smtpd_tls_security_level = may smtpd_enforce_tls = no smtpd_tls_loglevel = 0 smtpd_tls_key_file = /etc/pki/tls/private/Mail.key smtpd_tls_cert_file = /etc/pki/tls/certs/Mail_CA.pem tls_random_source = dev:/dev/urandom tls_daemon_random_source = dev:/dev/urandom # # Uncomment the following line to enable policyd sender throttle. # #smtpd_end_of_data_restrictions = check_policy_service inet:127.0.0.1:10032 mailbox_command = /usr/libexec/dovecot/deliver virtual_transport = dovecot dovecot_destination_recipient_limit = 1 smtpd_sasl_type = dovecot smtpd_sasl_path = dovecot-auth content_filter = smtp-amavis:[127.0.0.1]:10024