Le 07/02/2011 19:18, Nikolaos Milas a écrit :
> OK Brian,
> 
> Per your advice, I modified it as below:
> 
>    smtpd_restriction_classes = allowed_list1
>    allowed_list1= check_client_access cidr:/etc/postfix/client.cidr,reject
>    smtpd_recipient_restrictions =
>   
> hash:/etc/postfix/protected_destinations,permit_mynetworks,permit_sasl_authenticated,reject_unauth_destination
> 

avoid using obsolete "notation". specify the check_*_access explicitely.

smtpd_recipient_restrictions =
        check_recipient_access hash:/etc/postfix/protected_destinations
        permit_sasl_authenticated
        permit_mynetworks
        reject_unauth_destination



> 
> and I found it works fine!
> 
> I only must reload postfix ("service postfix reload") in case of any
> changes in the client.cidr file.

or you can wait and the new file will be loaded when a new smtpd is
spawned.

> 
> It seems this set of settings is safe for mail server operation (of
> course it won't avoid IP spoofing).
> 
> By the way, I was thinking, would there be a way to restrict access to
> mail addresses based on *particular* authenticated users? The idea is: a
> user is trying to connect to our SMTP (postfix) to send email to
> ali...@example.com (which we want to control access to). He is
> authenticated by postfix as userY using SASL over our LDAP server (we
> are using virtual accounts only). Can I setup some
> "smtp_restriction_classes" based on authenticated usernames (for example
> a check_client_access lookup table saying userY OK)? I haven't been able
> to locate a similar subject in the documentation (except of course
> permit_sasl_authenticated which applies to all such users at the same
> time).
> 
> Thanks very much,
> Nick
> 
> 
> On 7/2/2011 7:37 μμ, Brian Evans - Postfix List wrote:
>>
>>> But, could I have used "allowed_list1= check_client_access
>>> cidr:/etc/postfix/client.cidr,reject" ? Is this feasible?
>>>
>> Yes
>>

Reply via email to