On Tue, May 24, 2011 at 04:08:36PM -0400, Ryan Buffa wrote:

> mydestination = $myhostname, localhost.$mydomain, localhost, mail2.4nova.net,
> $mydomain

So 4nova.net is your domain.

> mynetworks = 74.84.205.0/24, 74.95.99.16/28, 65.254.210.137, 74.84.205.84

And these are your trusted client networks.

> smtpd_recipient_restrictions =
>       permit_sasl_authenticated,
>       permit_mynetworks,
>       check_sender_access hash:/etc/postfix/sender_access,
>       reject_unauth_destination
>       permit

This is broken. DO NOT use "check_sender_access" *above*
reject_unauth_destination. This can create an open-relay with
forged sender addresses. Move the "check_sender_access" below
"reject_unauth_destination" and make sure it only contains "REJECT"
rules (contains no OK rules).

> May 24 15:59:08 mail2 postfix/smtpd[20542]: AA561359557D:
> client=localhost[127.0.0.1]

Wrong queue-id, instead find the logs for "610E03595566:"
which is the upstream for "AA561359557D".

> May 24 15:59:08 mail2 postfix/smtp[20897]: 610E03595566: to=<jyfr...@163.com>,
> relay=127.0.0.1[127.0.0.1]:10024, delay=2.6, delays=2.4/0/0.01/0.11,
> dsn=2.0.0, status=sent (250 2.0.0 Ok, id=21180-02, from
> MTA([127.0.0.1]:10025): 250 2.0.0 Ok: queued as AA561359557D)

-- 
        Viktor.

Reply via email to